¼ÓÄôóʯÓ͹«Ë¾Ôâµ½¹¥»÷µ¼Ö¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÐÅÓÿ¨¸¶¿î
Ðû²¼Ê±¼ä 2023-06-271¡¢¼ÓÄôóʯÓ͹«Ë¾Ôâµ½¹¥»÷µ¼Ö¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÐÅÓÿ¨¸¶¿î
¾Ý6ÔÂ26ÈÕ±¨µÀ£¬¼ÓÄôóʯÓ͹«Ë¾(Petro-Canada)¼ÓÓÍÕ¾µÄ¿Í»§ÎÞ·¨Ê¹ÓÃÐÅÓÿ¨»ò½±Àø»ý·Ö¸¶¿î£¬Æäĸ¹«Ë¾Suncor Energy͸¶ËûÃÇÔâµ½Á˹¥»÷¡£Suncor EnergyÊÇÊǼÓÄôó×î´óµÄºÏ³ÉÔÓÍÉú²úÉÌÖ®Ò»£¬ÄêÊÕÈë´ï310ÒÚÃÀÔª£¬Æä×Ó¹«Ë¾Petro-CanadaÔÚ¼ÓÄôó¸÷µØı»®1500¶à¸ö¼ÓÓÍÕ¾¡£Suncor͸¶£¬¿Í»§ÎÞ·¨Í¨¹ýÓ¦ÓûòÍøÕ¾µÇ¼ÕÊ»§£¬Ò²ÎÞ·¨ÔÚ¼ÓÓÍʱ»ñµÃ»ý·Ö¡£È»¶ø£¬ÕæÕæÏàÐÎËƺõ±È֪ͨµÄÒªÔã¸â£¬ÏÖÔÚ¼ÓÓÍÕ¾ÎÞ·¨Ê¹ÓÃÒøÐп¨Ö§¸¶£¬Ö»ÄÜʹÓÃÏÖ½ð£¬ÓµÓÐÏ´³µ¼¾¿¨µÄ¿Í»§Ò²ÎÞ·¨ÏíÊÜȨÒ棬ËûÃÇÏÖÔÚÒªÇóÍË¿î¡£
https://www.bleepingcomputer.com/news/security/suncor-energy-cyberattack-impacts-petro-canada-gas-stations/
2¡¢iOttieÍøÕ¾±»ÈëÇÖÏßÉϹºÎïÕßµÄÒøÐп¨ºÍСÎÒ˽¼ÒÐÅϢй¶
¾ÝýÌå6ÔÂ21ÈÕ±¨µÀ£¬Æû³µÖ§¼ÜºÍÒƶ¯Åä¼þÖÆÔìÉÌiOttie³Æ£¬ÆäÍøÕ¾ÔÚ½üÁ½¸öÔ±»ÈëÇÖ£¬ÍøÉϹºÎïÕßµÄÐÅÓÿ¨ºÍСÎÒ˽¼ÒÐÅϢй¶¡£iOttieÌåÏÖ£¬ËûÃÇÓÚ6ÔÂ13ÈÕ·¢Ã÷ÆäÔÚÏßÊÐËÁÔÚ4ÔÂ12ÈÕÖÁ6ÔÂ2ÈÕÔâµ½¶ñÒâ¾ç±¾¹¥»÷¡£ÕâÖÖÀàÐ͵Ĺ¥»÷³ÆΪMageCart£¬ÏÖÔÚ¶ñÒâ´úÂëÒÑͨ¹ý²å¼þ¸üÐÂɾ³ý£¬µ«¹¥»÷Õß¿ÉÄÜÒѾ»ñµÃÁËÓû§µÄÐÅÓÿ¨ÐÅÏ¢£¬Éæ¼°Õʺš¢¿¨ºÅ¡¢Çå¾²Âë¡¢»á¼ûÂë¡¢ÃÜÂëºÍPINµÈ¡£ËäÈ»iOttieûÓÐ͸¶ËûÃÇÊÇÔõÑù±»¹¥»÷µÄ£¬µ«ËûÃǵÄÔÚÏßÊÐËÁÊÇÒ»¸ö´øÓÐWooCommerce²å¼þµÄWordPressÍøÕ¾¡£
https://www.bleepingcomputer.com/news/security/iottie-discloses-data-breach-after-site-hacked-to-steal-credit-cards/
3¡¢Unit 42·¢Ã÷Muddled LibraÕë¶ÔBPOÐÐÒµµÄ¹¥»÷Ô˶¯
Unit 42ÔÚ6ÔÂ21ÈÕÅû¶ÁËMuddled LibraÕýÔÚÕë¶ÔÓªÒµÁ÷³ÌÍâ°ü(BPO)ÐÐÒµµÄÒ»Á¬¹¥»÷Ô˶¯¡£2022Äêµ×£¬Ëæ×Å0ktapus´¹ÂÚ¹¤¾ß°üµÄÐû²¼£¬Muddled LibraµÄ¹¥»÷Æø¸Å¸¡³öË®Ãæ¡£Ñо¿Ö°Ô±ÊÓ²ìÁË2022ÄêÖÐÖÁ2023ÄêÍ·µÄ6ÆðÏà¹ØÊÂÎñ£¬·¢Ã÷¸Ã×éÖ¯µÄÌصãÊÇʹÓÃ0ktapusÌ×¼þ¡¢ÍçÇ¿¡¢¹¥»÷Õ½ÂÔÎÞа¡¢Õë¶ÔBPOÐÐÒµ¡¢ÇÔÈ¡Êý¾ÝÒÔ¼°ÔÚÏÂÓι¥»÷ÖÐʹÓñ»ÈëÇֵĻù´¡ÉèÊ©µÈ¡£±ðµÄ£¬¸Ã×éÖ¯µÄÉ繤¹¥»÷ºÜÊÇÀֳɣ¬ÔÚ¶à¸ö°¸ÀýÖÐ˵·þÁËÄ¿µÄ¾ÙÐв»Çå¾²µÄÐÐΪ¡£
https://unit42.paloaltonetworks.com/muddled-libra/
4¡¢CERT-UA³Æ¶à¸öÎÚ¿ËÀ¼×éÖ¯µÄRoundcubeÓʼþ·þÎñÆ÷±»ºÚ
ýÌå6ÔÂ21ÈÕ±¨µÀ£¬ÎÚ¿ËÀ¼CERT-UAºÍRecorded FutureÍŽáÊÓ²ìÏÔʾ£¬APT28ÈëÇÖÁ˶à¸öÎÚ¿ËÀ¼×éÖ¯µÄRoundcubeÓʼþ·þÎñÆ÷¡£´Ë´ÎÔ˶¯ÖУ¬¹¥»÷ÕßÒÔ¶íÎÚ³åÍ»µÄÐÂÎÅΪÓÕ¶ü·¢ËͶñÒâÓʼþ£¬ÕâЩÓʼþ½«Ê¹ÓÃRoundcube WebmailÎó²î£¨CVE-2021-44026µÈ£©ÈëÇÖδ´ò²¹¶¡µÄ·þÎñÆ÷¡£È»ºó£¬¹¥»÷Õß»á×°ÖöñÒâ¾ç±¾£¬½«Ä¿µÄµÄ´«ÈëÓʼþÖض¨Ïòµ½¹¥»÷Õߵĵص㣬»¹ÇÔÈ¡µØµã²¾¡¢»á»°cookieÒÔ¼°´æ´¢ÔÚRoundcubeÊý¾Ý¿âÖеÄÆäËüÐÅÏ¢¡£¾ÝÔ¤¼Æ£¬APT28ÔÚÕâЩ¹¥»÷ÖÐʹÓõĻù´¡ÉèʩԼĪ×Ô2021Äê11ÔÂÆð¾Í×îÏÈÔËÐС£
https://securityaffairs.com/147681/apt/apt28-hacked-roundcube-ukraine.html
5¡¢Êý°ÙÍò¸öGitHub´æ´¢¿âÈÝÒ×Ôâµ½RepoJacking¹¥»÷
AquaSecÔÚ6ÔÂ21Èճƣ¬´ó×ÚGitHub´æ´¢¿âÈÝÒ×Ôâµ½ÒÀÀµÏî´æ´¢¿âЮÖÆ£¨Ò²³ÆΪ¡°RepoJacking¡±£©¹¥»÷£¬¿ÉÄܵ¼Ö¹©Ó¦Á´¹¥»÷¡£Ñо¿Ö°Ô±ÆÊÎöÁË125Íò¸öGitHubÑù±¾£¬·¢Ã÷Ô¼2.95%Ò×ÊÜRepoJacking¹¥»÷¡£½«´Ë°Ù·Ö±ÈÍƹ㵽GitHubÁè¼Ý3ÒڵĴ洢¿â£¬Ô¤¼Æ¸ÃÎÊÌâÓ°ÏìÁËԼĪ900Íò¸öÏîÄ¿¡£AquaSecɨÃèÁË×ÅÃû×éÖ¯ÖеĴ洢¿â£¬²¢ÔÚGoogleºÍLyftÖÎÀíµÄ´æ´¢¿âÖз¢Ã÷ÁË¿ÉʹÓõݸÀý¡£²»ÐÒµÄÊÇ£¬RepoJackingºÜÊÇÆÕ±éÇÒÄÑÒÔ»º½â£¬ÏîÄ¿ËùÓÐÕßÓ¦¾¡¿ÉÄÜïÔÌ´ÓÍⲿ´æ´¢¿â»ñÈ¡×ÊÔ´¡£
https://blog.aquasec.com/github-dataset-research-reveals-millions-potentially-vulnerable-to-repojacking
6¡¢½©Ê¬ÍøÂçCondiͨ¹ýTP-LinkÎó²îCVE-2023-1389Èö²¥
6ÔÂ20ÈÕ£¬Fortinet³ÆÆä·¢Ã÷ÁËÒ»¸öеÄDDoS½©Ê¬ÍøÂçCondi£¬Ö÷ÒªÕë¶ÔTP-Link Archer AX21 (AX1800)·ÓÉÆ÷¡£¸Ã¶ñÒâÈí¼þʹÓÃÁË·ÓÉÆ÷WebÖÎÀí½çÃæAPIÖеÄÒ»¸öÏÂÁî×¢ÈëÎó²î£¨CVE-2023-1389£©£¬¸ÃÎó²îÒÑÓÚ3Ô·ݱ»ÐÞ¸´¡£Condi»¹»áɱËÀ¾ºÕù¹ØϵµÄÆäËü½©Ê¬ÍøÂçµÄÏà¹ØÀú³Ì£¬Ò²»á×èÖ¹Æä×ÔÉíµÄ¾É°æ±¾¡£¹ØÓÚCondiµÄDDoS¹¥»÷ÄÜÁ¦£¬ÆäÖ§³ÖÓëMiraiÀàËƵÄÖÖÖÖTCPºÍUDP¹¥»÷ÒªÁì¡£
https://www.fortinet.com/blog/threat-research/condi-ddos-botnet-spreads-via-tp-links-cve-2023-1389