SonatypeÔÚPyPI´æ´¢¿âÖз¢Ã÷¶à¸ö¿ÉÇÔÈ¡AWSƾ֤µÄ°ü

Ðû²¼Ê±¼ä 2022-06-27

1¡¢SonatypeÔÚPyPI´æ´¢¿âÖз¢Ã÷¶à¸ö¿ÉÇÔÈ¡AWSƾ֤µÄ°ü


¾ÝýÌå6ÔÂ25ÈÕ±¨µÀ £¬£¬£¬PyPI´æ´¢¿âÖб£´æ¶à¸ö¶ñÒâPython°ü £¬£¬£¬¿ÉÓÃÀ´ÇÔÈ¡AWSƾ֤µÈÐÅÏ¢¡£¡£¡£¡£¡£¡£Æ¾Ö¤SonatypeµÄ˵·¨ £¬£¬£¬¶ñÒâ³ÌÐò°ü»®·ÖÊÇloglib-modules¡¢pyg-modules¡¢pygrata¡¢pygrata-utilsºÍhkg-sol-utils¡£¡£¡£¡£¡£¡£ÆäÖÐ £¬£¬£¬loglib-modulesºÍpygrata-utils°ü¿ÉÇÔÈ¡AWSƾ֤¡¢ÍøÂç½Ó¿ÚÐÅÏ¢ºÍÇéÐαäÁ¿ £¬£¬£¬²¢½«ËüÃǵ¼³öµ½Ô¶³Ì¶Ëµãhxxp://graph.pygrata[.] com:8000//upload¡£¡£¡£¡£¡£¡£ÏñpygrataÕâÑùµÄ°ü×Ô¼º²»°üÀ¨¶ñÒâ´úÂë £¬£¬£¬µ«ÐèҪʹÓÃÉÏÊöÁ½¸öÄ£¿£¿£¿éÖ®Ò»×÷ΪÒÀÀµÏî¡£¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬ÕâЩ¶ñÒâ°üÒѱ»É¾³ý¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/132598/hacking/pypi-malicious-packages-2.html


2¡¢ÈÕ±¾TB KawashimaµÄ×Ó¹«Ë¾Ôâµ½LockBitµÄÀÕË÷¹¥»÷


¾Ý6ÔÂ25ÈÕ±¨µÀ £¬£¬£¬ÈÕ±¾Æû³µÁ㲿¼þÖÆÔìÉÌ·áÌï·ÄÖ¯ÆìϵÄTB KawashimaÐû²¼ £¬£¬£¬Æä×Ó¹«Ë¾Ôâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚÉÏÖÜËÄ £¬£¬£¬TB KawashimaµÄÌ©¹úÏúÊÛ¹«Ë¾±»¹¥»÷ £¬£¬£¬¸Ã¹«Ë¾¹Ø±ÕÁ˹¥»÷Õß»á¼ûµÄ×°±¸¡£¡£¡£¡£¡£¡£¹«Ë¾³ÆÆäÉú²úºÍÏúÊۻûÓÐÊܵ½Ó°Ïì £¬£¬£¬ËùÓÐÓªÒµ¶¼ÔÚÕý³£ÔËÐÐ £¬£¬£¬µ«ÆäÍøÕ¾ÒѹرÕ¡£¡£¡£¡£¡£¡£ËäÈ»ÏÖÔÚûÓйØÓÚÕâ´Î¹¥»÷µÄ¹Ù·½ÐÅÏ¢ £¬£¬£¬µ«LockBitÍÅ»ïÔÚ6ÔÂ17ÈÕÐû²¼ £¬£¬£¬ËûÃǶÔTB KawashimaµÄ¹¥»÷ÊÂÎñÈÏÕæ¡£¡£¡£¡£¡£¡£6ÔÂ25ÈÕ £¬£¬£¬¹¥»÷ÕßÒѾ­×îÏÈй¶±»µÁµÄÊý¾Ý¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/automotive-fabric-supplier-tb-kawashima-announces-cyberattack/


3¡¢¹È¸èÒòÈö²¥²»¿É¿¿ÐÅÏ¢±»¶íÂÞ˹î¿Ïµ»ú¹¹·£¿£¿£¿î120ÍòÃÀÔª


ýÌå6ÔÂ24ÈÕ³Æ £¬£¬£¬¶íÂÞ˹µçÐÅî¿Ïµ»ú¹¹Roskomnadzor¶Ô¹È¸è´¦ÒÔ6800Íò¬²¼£¨Ô¼ºÏ120ÍòÃÀÔª£©µÄ·£¿£¿£¿î¡£¡£¡£¡£¡£¡£´Ë´Î·£¿£¿£¿îµÄÔµ¹ÊÔ­ÓÉÊǹȸè×ÊÖúÈö²¥ÓйØÕ½ÕùµÄ²»¿É¿¿ÐÅÏ¢ £¬£¬£¬²¢ÇÒûÓн«ÕâЩÐÅÏ¢´ÓËüµÄƽ̨ÉÑþ³Øý¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹ÌåÏÖ £¬£¬£¬¹È¸èµÄYouTubeÔÚÏßÊÓÆµ¹²ÏíÆ½Ì¨¡°¾ÓÐÄÖú³¤¡±Èö²¥½û¾øÈ·µÄÐÅÏ¢ £¬£¬£¬´Ó¶øÀë¼ä¶íÂÞ˹¡£¡£¡£¡£¡£¡£ÓÉÓÚÒ»ÔÙδÄÜÏÞÖÆ¶Ô¶íÂÞ˹եȡÐÅÏ¢µÄ»á¼û £¬£¬£¬¹È¸èÏÖÔÚ»¹ÃæÁٸߴïÆäÔÚ¶íÂÞ˹ÄêÓªÒµ¶îµÄ10%µÄ·£¿£¿£¿î¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/google/russia-fines-google-for-spreading-unreliable-info-defaming-its-army/


4¡¢CrowdStrikeÅû¶ÀÄÓÃMitel VOIPÎó²îµÄ¹¥»÷µÄÏêÇé


CrowdStrikeÔÚ6ÔÂ23ÈÕÅû¶ÁËÀÄÓÃMitel VOIPÖÐÐÂÎó²îµÄÀÕË÷¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£´Ë´Î±»Ê¹ÓõÄÊÇÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-29499 £¬£¬£¬CVSSÆÀ·ÖΪ9.8£© £¬£¬£¬ÓÉÓÚÕï¶Ï¾ç±¾µÄÊý¾ÝÑé֤ȱ·¦µ¼Ö嵀 £¬£¬£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÓÃÀ´Í¨¹ýÌØÖÆÇëÇó×¢ÈëÏÂÁî¡£¡£¡£¡£¡£¡£Îó²îµÄʹÓÃÉæ¼°Á½¸öGETÇëÇó £¬£¬£¬Ò»¸ö·¢Ë͵½×°±¸ÉÏ £¬£¬£¬Ä¿µÄÊÇÒ»¸öPHPÎļþµÄ"get_url"²ÎÊý£»£»£»£»µÚ¶þ¸öÔÚ×°±¸ÉÏÌìÉú £¬£¬£¬µ¼ÖÂÏÂÁî×¢Èë £¬£¬£¬Ïò¹¥»÷ÕߵĻù´¡ÉèʩִÐÐHTTP GETÇëÇ󡣡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ £¬£¬£¬ÍøÉÏÓÐÁè¼Ý21000̨¿É¹ûÕæ»á¼ûµÄMitel×°±¸ £¬£¬£¬ÆäÖд󲿷ÖλÓÚÃÀ¹ú £¬£¬£¬Æä´ÎÊÇÓ¢¹ú¡£¡£¡£¡£¡£¡£


https://www.crowdstrike.com/blog/novel-exploit-detected-in-mitel-voip-appliance/


5¡¢Ñо¿ÍŶӷ¢Ã÷Bronze StarlightÍÅ»ï½üÆÚµÄ¹¥»÷»î¶¯


6ÔÂ23ÈÕ £¬£¬£¬SecureworksµÄÑо¿ÍŶӹûÕæÁËAPT×éÖ¯Bronze Starlight(APT10)½üÆÚµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£ÖÁÉÙ´Ó2015Äê×îÏÈ £¬£¬£¬¹¥»÷Õß¾ÍʹÓÃHUI LoaderÔÚÄ¿µÄÖ÷»úÉϼÓÔØÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£¡£¡£¶ø´Ë´Î»î¶¯ÖÐ £¬£¬£¬¹¥»÷ÕßÔÚÈëÇÖºó»á×°ÖÃÀÕË÷Èí¼þ £¬£¬£¬ÈçLockFile¡¢Atom Silo¡¢Rook¡¢Night Sky¡¢PandoraºÍLockBit 2.0µÈ¡£¡£¡£¡£¡£¡£ÆÊÎöÅú×¢ £¬£¬£¬BRONZE STARLIGHTµÄÖ÷ÒªÄîÍ·¿ÉÄÜÊÇÇÔȡ֪ʶ²úȨ»ò¾ÙÐÐÌØ¹¤»î¶¯ £¬£¬£¬¶ø·Ç¾­¼ÃÀûÒæ £¬£¬£¬ÀÕË÷Èí¼þ¿ÉÄÜÊÇΪÁËÊèɢĿµÄµÄ×¢ÖØÁ¦¡£¡£¡£¡£¡£¡£±»¹¥»÷µÄÄ¿µÄ°üÀ¨Î÷ºÍÃÀ¹úµÄÖÆÒ©¹«Ë¾¡¢ÃÀ¹úýÌå»ú¹¹¡¢Á¢ÌÕÍðºÍÈÕ±¾µÄµç×ÓÔª¼þÉè¼ÆºÍÖÆÔìÉ̵È¡£¡£¡£¡£¡£¡£


https://www.secureworks.com/research/bronze-starlight-ransomware-operations-use-hui-loader


6¡¢KasperskyÐû²¼¹ØÓÚ8¸öÖ÷ÒªÀÕË÷ÍÅ»ïµÄTTPµÄÆÊÎö±¨¸æ


KasperskyÔÚ6ÔÂ23ÈÕÐû²¼Á˹ØÓÚ8¸öÖ÷ÒªÀÕË÷ÍÅ»ïµÄTTPµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖаüÀ¨µÄÀÕË÷ÍŻﻮ·ÖΪConti/Ryuk¡¢Pysa¡¢Clop(TA505)¡¢Hive¡¢Lockbit2.0¡¢RagnarLocker¡¢BlackByteºÍBlackCat¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ³£ÊÔͼÕÒµ½¹ýʧÉèÖúͱ£´æÎó²îµÄÃæÏò¹«ÖÚµÄÓ¦ÓóÌÐò £¬£¬£¬ÒÔ±ã»ñµÃ³õʼ»á¼ûȨ £¬£¬£¬³£¼ûµÄÄ¿µÄ°üÀ¨Î¢ÈíExchangeЧÀÍÆ÷¡¢SharepointЧÀÍÆ÷¡¢VPNºÍÆäËüÍøÂçЧÀÍ£»£»£»£»×î³£±»Ê¹ÓõÄÎó²îÊÇProxyShell Îó²îCVE-2021-34473¡¢CVE-2021-34523ºÍCVE-2021-31207¡£¡£¡£¡£¡£¡£


https://securelist.com/modern-ransomware-groups-ttps/106824/