ÃÀ¹úMCNAÔâµ½LockbitµÄÀÕË÷¹¥»÷Ó°ÏìÔ¼890Íò»¼Õß
Ðû²¼Ê±¼ä 2023-05-311¡¢ÃÀ¹úMCNAÔâµ½LockbitµÄÀÕË÷¹¥»÷Ó°ÏìÔ¼890Íò»¼Õß
¾ÝýÌå5ÔÂ29ÈÕ±¨µÀ£¬±±ÃÀÑÀ¿Æ±£ÏÕÌṩÉÌMCNA DentalÔâµ½LockbitµÄÀÕË÷¹¥»÷£¬Ó°ÏìÁË8923662Ãû»¼Õß¡£¸Ã¹«Ë¾ÔÚ3ÔÂ6ÈÕÒâʶµ½ÆäϵͳÔâµ½ÁËδ¾ÊÚȨ·ÃÎÊ£¬ÊÓ²ìÏÔʾºÚ¿ÍÓÚ2ÔÂ26ÈÕÊ״λñµÃÁËMCNAÍøÂçµÄ·ÃÎÊȨÏÞ¡£LockBitÉù³ÆÔÚ3ÔÂ7ÈÕ¹¥»÷ÁËMCNA²¢¹ûÈ»Á˵ÚÒ»ÅúÊý¾ÝÑù±¾£¬»¹ÌåÏÖÈç¹ûMCNA²»½»1000ÍòÃÀÔªµÄÊê½ð£¬¾Í¹ûÈ»Æä700 GBµÄ»úÃÜÐÅÏ¢¡£4ÔÂ7ÈÕ£¬LockBitÔÚÆäÍøÕ¾ÉÏÐû²¼ÁËËùÓÐÊý¾Ý£¬ÈκÎÈ˶¼¿ÉÒÔÏÂÔØ¡£
https://securityaffairs.com/146804/data-breach/mcna-data-breach.html
2¡¢WordPressÔÚ½ü500Íò¸öÍøÕ¾×Ô¶¯°²×°²å¼þJetpackµÄ²¹¶¡
¾Ý5ÔÂ30ÈÕ±¨µÀ£¬WordPress±³ºóµÄ¹«Ë¾AutomatticÔÚÊý°ÙÍò¸öÍøÕ¾ÉÏÇ¿ÖÆ°²×°ÁËÄþ¾²²¹¶¡£¬ÒÔÐÞ¸´²å¼þJetpackÖеÄÒ»¸ö©¶´¡£Ñо¿ÈËÔ±³Æ£¬ÔÚÄÚ²¿Äþ¾²Éó¼ÆÆÚ¼ä·¢ÏÖJetpackµÄAPI´æÔÚ©¶´£¬ÍøÕ¾µÄ¿ª·¢Õß¿ÉÒÔʹÓôË©¶´À´¿ØÖÆWordPress°²×°ÖеÄÈÎÒâÎļþ¡£JetpackÏÖÔÚ¿ªÊ¼×Ô¶¯ÏòËùÓÐʹÓøòå¼þµÄÍøÕ¾ÍÆËÍÄþ¾²²¹¶¡£¬Ä¿Ç°ÒÑÔÚÁè¼Ý413Íò¸öÍøÕ¾ÉϽøÐÐÁ˰²×°¡£AutomatticÒѶà´ÎʹÓÃÕâÖÖ×Ô¶¯¸üеķ½Ê½²¿Êð²¹¶¡¡£
https://www.bleepingcomputer.com/news/security/wordpress-force-installs-critical-jetpack-patch-on-5-million-sites/
3¡¢Ñо¿ÈËÔ±·¢ÏÖ±©Á¦ÆÆ½âÊÖ»úÖ¸ÎÆµÄ¹¥»÷·½Ê½BrutePrint
ýÌå5ÔÂ29Èճƣ¬Ñо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪBrutePrintµÄ¹¥»÷·½Ê½£¬¿ÉÒÔͨ¹ý±©Á¦ÆÆ½âÖÇÄÜÊÖ»úÉϵÄÖ¸ÎÆÀ´ÈƹýÓû§Éí·ÝÑéÖ¤¡£¸Ã¹¥»÷¼¼ÊõÀûÓÃÁËÖÇÄÜÊÖ»úÖ¸ÎÆÈÏÖ¤(SFA)¿ò¼ÜÖеÄÁ½¸öÁãÈÕ©¶´£¬Cancel-After-Match-Fail(CAMF)ºÍMatch-After-Lock(MAL)¡£ÕâÁ½¸ö©¶´ÀûÓÃÁËÈÏÖ¤¿ò¼ÜÖеÄÂ߼©¶´£¬Ô´ÓÚ¶ÔÖ¸ÎÆ´«¸ÐÆ÷µÄ´®ÐÐÍâÉè½Ó¿Ú£¨SPI£©ÉϵÄÖ¸ÎÆÊý¾Ý±£»¤²»Á¦¡£
https://thehackernews.com/2023/05/new-bruteprint-attack-lets-attackers.html
4¡¢Jimbos ProtocolÔâµ½ÉÁµç´û¹¥»÷ËðʧÁè¼Ý750ÍòÃÀÔª
5ÔÂ29ÈÕ±¨µÀ³Æ£¬»ùÓÚArbitrumµÄDeFiÏîÄ¿Jimbos ProtocolÔâµ½ÁËÉÁµç´û¹¥»÷£¬ËðʧÁè¼Ý7500000ÃÀÔª¡£¹¥»÷·¢ÉúÔÚ¸ÃÆ½Ì¨Æô¶¯ÆäV2ÐÒéµÄÈýÌìºó£¬ÆäʱÐí¶àÈ˸ոÕͶ×Êjimbo´ú±Ò£¬¹¥»÷ÕßÉè·¨ÇÔÈ¡ÁË4090¸öETH´ú±Ò¡£Ñо¿ÈËÔ±³Æ£¬´Ë´Î¹¥»÷ÀûÓÃÁËÒ»¸öÓëÁ÷¶¯ÐÔת»»È±·¦»¬µã¿ØÖÆÏà¹ØµÄ©¶´¡£ÔÚ±»ÈëÇÖÖ®ºó£¬jimboµÄ¼Û¸ñѸËÙ±©µø£¬´Ó0.238ÃÀÔªµøÖÁ0.0001ÃÀÔª¡£Jimbos ProtocolÒÑÏò¹¥»÷Õß·¢³öÐÅÏ¢£¬ÒªÇóËûÃǹ黹90%µÄ±»µÁ×ʽð£¬ÒÔ»»È¡²î³ØÆäÌáÆðÖ´·¨ËßËϵÄÔÊÐí¡£
https://www.bleepingcomputer.com/news/security/flash-loan-attack-on-jimbos-protocol-steals-over-75-million/
5¡¢AndroidľÂíDogeRATαװ³ÉÁ÷ÐÐÓ¦ÓÃÕë¶ÔÓ¡¶È¶à¸öÐÐÒµ
5ÔÂ29ÈÕ£¬CloudSEKÅû¶ÁËAndroid¶ñÒâÈí¼þDogeRATÕë¶ÔÓ¡¶È¶à¸öÐÐÒµµÄ¹¥»÷»î¶¯£¬ÓÈÆäÊÇÒøÐÐÒµºÍÓéÀÖÒµ¡£¸Ã¶ñÒâÈí¼þαװ³ÉOpera Mini¡¢OpenAI ChatGOT¡¢YouTube¡¢NetflixºÍInstagramµÄµÈºÏ·¨Ó¦Óã¬Í¨¹ýÉ罻ýÌåºÍÏûϢƽ̨½øÐзַ¢¡£°²×°ºó£¬Ëü»á´ÓÄ¿±êÉ豸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬ÀýÈçÁªÏµÈË¡¢ÏûÏ¢ºÍÒøÐÐÆ¾Ö¤¡£»¹¿ÉÓÃÓÚ¿ØÖÆÄ¿±êÉ豸ִÐжñÒâ»î¶¯£¬Èç·¢ËÍÀ¬»øÓʼþ¡¢½øÐÐδ¾ÊÚȨµÄÖ§¸¶¡¢ÐÞ¸ÄÎļþºÍ¼ì²ìͨ»°¼Ç¼£¬ÉõÖÁ¿ÉÒÔͨ¹ýÉ豸µÄÉãÏñÍ·Ô¶³ÌÅÄÕÕ¡£
https://cloudsek.com/blog/dogerat-the-android-malware-campaign-targeting-users-across-multiple-industries
6¡¢JPCERTÌáÐÑÐÂÐÍľÂíGobRATÕë¶ÔÈÕ±¾µÄ¹¥»÷»î¶¯
JPCERTе÷ÖÐÐÄÔÚ5ÔÂ29ÈÕÐû²¼Í¨¸æ£¬ÌáÐÑÐÂÐÍGolangľÂíGobRATÕë¶ÔÈÕ±¾µÄ¹¥»÷»î¶¯¡£¹¥»÷·¢ÉúÔÚ2ÔÂ×óÓÒ£¬¹¥»÷ÕßÊ×ÏÈÕë¶ÔÒ»¸öWEBUI¶ÔÍ⿪·ÅµÄ·ÓÉÆ÷£¬ÀûÓÃÁË©¶´Ö´ÐнÅÔÀ´°²×°GobRAT¡£¹¥»÷ÕßÔÚÈëÇÖ̻¶µÄ·ÓÉÆ÷ºó£¬»á°²×°Ò»¸ö¼ÓÔØ·¨Ê½½Å±¾£¬³äµ±½»¸¶GobRATµÄ¹ÜµÀ£¬¸Ã½Å±¾ÔÚÆô¶¯Ê±Î±×°³ÉApacheÊØ»¤½ø³Ì(apached)À´Èƹý¼ì²â¡£´ËÍ⣬GobRATͨ¹ý´«Êä²ãÄþ¾²(TLS)ÐÒéÓëÔ¶³Ì·þÎñÆ÷ͨÐÅ£¬À´½ÓÊÕ¶à´ï22ÖÖ²îÒìµÄ¼ÓÃÜÃüÁî¡£
https://thehackernews.com/2023/05/new-gobrat-remote-access-trojan.html