¼ÓÄôó5¼Ò´óÐÍÒøÐÐÒòδ֪Ե¹ÊÔ­ÓÉЧÀÍÖÐÖ¹ÊýСʱ

Ðû²¼Ê±¼ä 2022-02-21

¼ÓÄôó5¼Ò´óÐÍÒøÐÐÒòδ֪Ե¹ÊÔ­ÓÉЧÀÍÖÐÖ¹ÊýСʱ


¾ÝýÌå2ÔÂ17ÈÕ±¨µÀ£¬£¬¼ÓÄôó5¼Ò´óÐÍÒøÐÐЧÀÍÖÐÖ¹ÊýСʱ ¡£ ¡£¡£¡£ÖÐÖ¹±¬·¢ÔÚ±¾ÖÜÈýÏÂÖç5µãµ½6µãÖ®¼ä£¬£¬°üÀ¨¼ÓÄôó»Ê¼ÒÒøÐУ¨RBC£©¡¢ÃÉÌØÀû¶ûÒøÐУ¨BMO£©¡¢·áÒµÒøÐС¢µÀÃ÷ÒøÐУ¨TD£©ºÍ¼ÓÄôóµÛ¹úÉÌÒµÒøÐУ¨CIBC£© ¡£ ¡£¡£¡£RBC³ÆÓöµ½ÁËÊÖÒÕÎÊÌ⣬£¬BMOÈ«Çò»ã¿îЧÀÍÈ«Ìì¹Ø±Õ£¬£¬CIBCÉÐδÈÏ¿ÉËûÃǵÄÍøÉÏÒøÐб£´æÎÊÌ⣬£¬TD BankµÄÒÆ¶¯ÒøÐÐÎÞ·¨»á¼ûµ«Ðû²¼ÉùÃ÷³ÆÃ»ÓÐÓöµ½ÈκÎÖÐÖ¹ÎÊÌâ ¡£ ¡£¡£¡£ÏÖÔÚ£¬£¬´Ë´ÎÖÐÖ¹ÊÂÎñµÄÔµ¹ÊÔ­ÓÉÉв»Ã÷È· ¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/canadas-major-banks-go-offline-in-mysterious-hours-long-outage/


FBI¡¢NSAºÍCISAÐû²¼¶íÂÞ˹ºÚ¿ÍÃé×¼ÃÀ¹ú¹ú·ÀÐÐÒµµÄͨ¸æ


2ÔÂ16ÈÕ£¬£¬ÃÀ¹úFBI¡¢NSAºÍCISAÁªºÏÐû²¼Á˶íÂÞ˹ºÚ¿ÍÃé×¼ÃÀ¹ú¹ú·ÀÐÐÒµµÄͨ¸æ ¡£ ¡£¡£¡£Í¨¸æ³Æ£¬£¬¸Ã»î¶¯×îÏÈÓÚ2020Äê1Ô£¬£¬Ê¹ÓÃÁËÓã²æÊ½ÍøÂç´¹ÂÚ¡¢Æ¾Ö¤ÍøÂç¡¢±©Á¦ÆÆ½âµÈÊÖÒÕºÍ VPN ×°±¸ÖеÄÒÑÖªÎó²î£¬£¬¹¥»÷¹ú¼ÒÅú×¼µÄ¹ú·À³Ð°üÉÌ(CDC)£¬£¬ÒÔ»ñÈ¡Óë¹ú·ÀºÍÇ鱨ÁìÓòÓйصÄÉñÃØÐÅÏ¢ ¡£ ¡£¡£¡£¹¥»÷ÕßÓÃÓÚ³õʼ»á¼ûºÍȨÏÞÌáÉýµÄÎó²î°üÀ¨CVE-2018-13379¡¢CVE-2020-0688ºÍCVE-2020-17144 ¡£ ¡£¡£¡£


https://www.cisa.gov/news/2022/02/16/new-cybersecurity-advisory-protecting-cleared-defense-contractor-networks-against


Egress³Æ×Ô2Ô·Ýð³äLinkedInµÄ´¹ÂÚ¹¥»÷ÔöÌí232%


¾Ý2ÔÂ16ÈÕ±¨µÀ£¬£¬Egress·¢Ã÷×Ô2ÔÂ1ÈÕÒÔÀ´£¬£¬Ã°³äLinkedInµÄ´¹ÂÚ¹¥»÷ÔöÌíÁË232% ¡£ ¡£¡£¡£¹¥»÷ÕßʹÓÃÁË¿´ÆðÀ´ºÜÊÇÕæÊµµÄHTMLÄ£°å£¬£¬ÒÔ¼°´øÓÐLinkedInÃû³ÆµÄÓʼþµØµã£¬£¬Ö¼ÔÚÓÕʹÓû§µã»÷´¹ÂÚÁ´½Ó²¢ÊäÈëÆ¾Ö¤ ¡£ ¡£¡£¡£´Ë´Î»î¶¯Ö÷ÒªÕë¶ÔÓ¢¹úºÍ±±ÃÀµØÇø£¬£¬Ê¹ÓÃÁËOutlook 365ƽ̨£¬£¬²¢¿ÉÒÔÈÆ¹ý¹Å°åµÄµç×ÓÓʼþÇå¾²·ÀÓù»úÖÆ ¡£ ¡£¡£¡£


https://www.egress.com/resources/cybersecurity-information/phishing/linkedin-phishing-attacks


ÃÀ¹úÁ½¼ÒÒ½ÔºSSHºÍFCHCй¶½ü15Íò»¼ÕßµÄСÎÒ˽¼ÒÐÅÏ¢


ýÌå2ÔÂ16Èճƣ¬£¬ÃÀ¹úÒÁÀûŵÒÁÖݽü150000¸öסÃñµÄPHIÐÅϢй¶ ¡£ ¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢Ô´ÓÚÁ½¼ÒÒ½Ôº£ºÖ¥¼Ó¸çµÄÄϰ¶Ò½Ôº(SSH)³ÆËûÃÇÓÚ2021Äê12ÔÂ10ÈÕ·¢Ã÷¿ÉÒɻ£¬£¬¾­ÊÓ²ìÈ·¶¨½ü116000¸ö»¼ÕߺÍÔ±¹¤µÄÐÅϢй¶£»£» £»ÒÁÀûŵÒÁÖݹþάµÄÒ½ÔºFCHCÔÚ2021Äê11ÔÂ18ÈÕ×óÓÒÔâµ½ÀÕË÷¹¥»÷£¬£¬µ«Ö±µ½11ÔÂ30Èղŷ¢Ã÷Êý¾Ýй¶£¬£¬Éæ¼°31000¸ö»¼Õß ¡£ ¡£¡£¡£ÆäÖУ¬£¬SSH³Æ½«ÎªËùÓÐÊÜÓ°ÏìµÄסÃñÌṩÉí·Ý͵ÇÔ±£»£» £»¤Ð§ÀÍ ¡£ ¡£¡£¡£ 


https://www.infosecurity-magazine.com/news/healthcare-data-breaches-impact/


CiscoÐÞ¸´ÆäÓʼþÇå¾²×°±¸ÖÐDoSÎó²îCVE-2022-20653


CiscoÔÚ2ÔÂ16ÈÕÐû²¼Çå¾²¸üУ¬£¬ÐÞ¸´ÆäÓʼþÇå¾²×°±¸ÖÐDoSÎó²î£¨CVE-2022-20653£© ¡£ ¡£¡£¡£¸ÃÎó²î±£´æÓÚAsyncOSÈí¼þµÄ»ùÓÚDNSµÄÃüÃûʵÌåÉí·ÝÑéÖ¤(DANE)×é¼þÖУ¬£¬ÊÇÓÉÓÚ¶ÔDNSÃû³ÆÆÊÎöµÄ¹ýʧ´¦Öóͷ£È±·¦µ¼Ö嵀 ¡£ ¡£¡£¡£CiscoÐû²¼µÄͨ¸æ³Æ£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËÍÌØÊâÃûÌõĵç×ÓÓʼþÀ´Ê¹ÓôËÎó²î£¬£¬ÀÖ³ÉʹÓÿɵ¼ÖÂÎÞ·¨»á¼ûÖÎÀí½çÃæ»ò´¦Öóͷ£ÌØÁíÍâÓʼþÐÂÎÅ£¬£¬´Ó¶ø´¥·¢DoS ¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisco-bug-can-let-hackers-crash-cisco-secure-email-gateways/


CrowdStrikeÐû²¼2021ÄêÈ«ÇòÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


2ÔÂ15ÈÕ£¬£¬CrowdStrikeÐû²¼ÁË2021ÄêÈ«ÇòÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ ¡£ ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬ÓëÀÕË÷Èí¼þÏà¹ØµÄÊý¾Ýй¶ÔÚ2021Äêͬ±ÈÔöÌíÁË82%£¬£¬´Ó1474ÆðÉÏÉýµ½2686Æð£»£» £»62% µÄ¹¥»÷ûÓÐʹÓõ½¶ñÒâÈí¼þ£»£» £»×îÒýÈËעĿµÄÎó²îÊÇLog4Shell£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÆä×¢ÈëJava´úÂ룻£» £»Ê¹ÓÃÔÆÐ§À͵Ĺ¥»÷»î¶¯Ôö¶à£»£» £»Ð·ºÆðÁË21¸öºÚ¿ÍÍŻ£» £»½»»¥ÈëÇֻÔöÌí45%£»£» £»¹©Ó¦µÄƽ¾ùʱ³¤Îª1Сʱ38·ÖÖÓ ¡£ ¡£¡£¡£


https://www.crowdstrike.com/global-threat-report/



Çå¾²¹¤¾ß


Unredacter


¸Ã¹¤¾ß¿É´ÓÄ£ºýµÄÏñËØ»¯Í¼ÏñÖÐÖØÐÞÎı¾ ¡£ ¡£¡£¡£


https://github.com/bishopfox/unredacter


Macrome


ÓÃÓÚºì¶ÓºÍÆÊÎöʦµÄ Excel ºêÎĵµÔĶÁÆ÷/±àдÆ÷ ¡£ ¡£¡£¡£


https://github.com/michaelweber/Macrome


FakeLogonScreen


ÊÇÒ»¸öαÔì Windows µÇ¼ÆÁÄ»ÒÔ»ñÈ¡Óû§ÃÜÂëµÄÊÊÓóÌÐò ¡£ ¡£¡£¡£


https://github.com/bitsadmin/fakelogonscreen


WELA


Windows ÊÂÎñÈÕÖ¾ÆÊÎöÆ÷£¬£¬×î´ó¹¦Ð§Êǽ¨ÉèÒ×ÓÚÆÊÎöµÄµÇ¼ʱ¼äÏߣ¬£¬ÒÔ×ÊÖú¿ìËÙȡ֤ºÍÊÂÎñÏìÓ¦ ¡£ ¡£¡£¡£


https://github.com/Yamato-Security/WELA/


jwt-hack


ÊÇÓÃÓÚ¶ÔJWT¾ÙÐкڿÍ/Çå¾²²âÊԵŤ¾ß ¡£ ¡£¡£¡£


https://github.com/hahwul/jwt-hack/



Çå¾²ÆÊÎö


Mozilla ÖÒÑÔ Chrome¡¢Firefox '100' Óû§ÊðÀí¿ÉÄÜ»áÆÆËðÍøÕ¾


https://www.bleepingcomputer.com/news/software/mozilla-warns-chrome-firefox-100-user-agents-may-break-sites/


Å·ÃËÒþ˽î¿Ïµ»ú¹¹Ï£Íûեȡ Pegasus ÌØ¹¤Èí¼þ


https://www.bleepingcomputer.com/news/security/blackcat-alphv-claims-swissport-ransomware-attack-leaks-data/


FBI ÖÒÑÔ BEC ¹¥»÷ÕßÔÚÐéÄâ¾Û»áÖÐð³ä CEO


https://www.bleepingcomputer.com/news/security/fbi-warns-of-bec-attackers-impersonating-ceos-in-virtual-meetings/


Á¢ÌÕÍðºÍ²¨À¼Ðû²¼ÍøÂç¹¥»÷ÖÒÑÔ


https://www.infosecurity-magazine.com/news/lithuania-poland-cyber-attack/


¹ú¼ÊºìÊ®×ÖίԱ»áÌåÏÖºÚ¿ÍʹÓà Zoho Îó²îÈëÇÖÆäÍøÂç


https://www.bleepingcomputer.com/news/security/red-cross-state-hackers-breached-our-network-using-zoho-bug/


Microsoft£ºÇø¿éÁ´Éϵġ°Ice phishing¡±


https://www.microsoft.com/security/blog/2022/02/16/ice-phishing-on-the-blockchain/