Microsoft 365ÒòECS°²ÅŹýʧȫÇò¹æÄ£ÄÚÖÐÖ¹5Сʱ
Ðû²¼Ê±¼ä 2022-07-25
¾Ý7ÔÂ23ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬Î¢Èí͸¶ÉÏÖܳ¤´ï5СʱµÄMicrosoft 365È«Çò¹æÄ£ÄÚÖÐÖ¹ÊÇÓÉÆóÒµÉèÖÃЧÀÍ(ECS)°²ÅŹýʧµ¼Öµġ£¡£¡£¡£ECSЧÀ͵ݲÅű£´æ´úÂëȱÏÝ£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÆäÏòºó¼æÈÝÐÔ£¬£¬£¬£¬£¬£¬µ¼ÖÂʹÓÃECSµÄЧÀÍ£¬£¬£¬£¬£¬£¬½«ÏòÆäËùÓеÄÏàÖúͬ°é·µ»Ø²»×¼È·µÄÉèÖᣡ£¡£¡£Ò£²âÅú×¢£¬£¬£¬£¬£¬£¬Ô¼ÄªÓÐ30Íò¸öºô½ÐÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬ÓÉÓÚӪҵʱ¼äÓëÓ°Ïì´°¿ÚÏàÎǺϣ¬£¬£¬£¬£¬£¬ÑÇÌ«µØÇøÊܵ½µÄÓ°Ïì×î´ó¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ö±½Ó·ÓɺÍSkype MFAÊÇÊÜÓ°Ïì×î´óµÄЧÀÍ¡£¡£¡£¡£ÖÐÖ¹×îÏÈÓÚ7ÔÂ21ÈÕÆÆÏþ1:05 UTC×îÏÈ£¬£¬£¬£¬£¬£¬µ±ÈÕÔçÉÏ6:00 UTC֮ǰ´ó²¿·ÖÒѱ»ÐÞ¸´¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/massive-microsoft-365-outage-caused-by-faulty-ecs-deployment/
2¡¢¹¥»÷ÕßÔÚ°µÍøÒÔ3ÍòÃÀÔª³öÊÛ540ÍòTwitterÓû§µÄÐÅÏ¢
¾ÝýÌå7ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÃûΪdevilµÄºÚ¿Í³ÆÆäʹÓÃÎó²î»á¼ûÁË5485636ÃûTwitterÓû§µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢ÒÔÖÁÉÙ30000ÃÀÔªµÄ¼ÛÇ®¾ÙÐгöÊÛ¡£¡£¡£¡£ÓÃÓÚÍøÂçÊý¾ÝµÄÎó²îÓÚ1ÔÂ1±»Åû¶²¢ÓÚ1ÔÂ13ÈÕÐÞ¸´£¬£¬£¬£¬£¬£¬¿É±»Î´¾Éí·ÝÑéÖ¤¹¥»÷ÕßÓÃÀ´Í¨¹ýµç»°ºÅÂëºÍÓʼþÀ´»ñÈ¡í§ÒâÓû§µÄTwitter ID¡£¡£¡£¡£¹¥»÷ÕßÌåÏÖËûÃÇÔÚ2021Äê12Ô¾Í×îÏÈʹÓÃÎó²îÍøÂçÊý¾Ý£¬£¬£¬£¬£¬£¬ÏÖÔÚÒÑÓиÐÐËȤµÄÂò¼ÒÓëËûÃǾÙÐÐÁªÏµ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬TwitterÉÐδȷÈÏ´Ë´Îй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬¶øÂô¼ÒÒÑɾ³ý¸Ã¹ã¸æ¡£¡£¡£¡£
https://securityaffairs.co/wordpress/133593/data-breach/twitter-leaked-data.html
3¡¢Securonix·¢Ã÷APT37ʹÓÃKonni¹¥»÷Å·ÖÞ¶à¹úµÄ»î¶¯
7ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬Securonix³ÆÆä·¢Ã÷Á˳¯Ïʹ¥»÷ÕßAPT37ʹÓÃKonniÕë¶Ô½Ý¿ËºÍ²¨À¼µÈÅ·ÖÞ¹ú¼ÒµÄ¹¥»÷¡£¡£¡£¡£Ôڴ˻ÖУ¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÔ¶³Ì»á¼ûľÂíKonni£¬£¬£¬£¬£¬£¬¹¥»÷ʼÓÚÒ»·â°üÀ¨WordÎĵµ(missile.docx)ºÍWindows¿ì½Ý·½·¨Îļþ(weapons.doc.lnk.lnk)¸½¼þµÄ´¹ÂÚÓʼþ¡£¡£¡£¡£·¿ªLNKºó»áÖ´ÐдúÂëÀ´ÔÚDOCXÎļþÖвéÕÒbase64±àÂëµÄPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬È»ºó½¨ÉèC2ͨѶ²¢ÏÂÔØÁ½¸öÎļþ¡°weapons.doc¡±ºÍ¡°wp.vbs¡±¡£¡£¡£¡£ÕâЩÎļþÖ»ÊÇÓÕ¶ü£¬£¬£¬£¬£¬£¬Í¬Ê±£¬£¬£¬£¬£¬£¬ºǫ́»á¾²Ä¬µØÔËÐÐVBSÎļþ£¬£¬£¬£¬£¬£¬×îÖÕÏÂÔØKonni¡£¡£¡£¡£
https://www.securonix.com/blog/stiffbizon-detection-new-attack-campaign-observed/
4¡¢Êý×ÖÇå¾²¹«Ë¾EntrustÔâµ½¹¥»÷ºóÄÚ²¿ÏµÍ³Êý¾Ý±»µÁ
ýÌå7ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Entrust³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ÄÚ²¿ÏµÍ³ÖеÄÊý¾Ý±»µÁ¡£¡£¡£¡£EntrustÊÇÒ»¼ÒרעÓÚÔÚÏßÐÅÈκÍÉí·ÝÖÎÀíµÄÇå¾²¹«Ë¾£¬£¬£¬£¬£¬£¬Ìṩ°üÀ¨¼ÓÃÜͨѶ¡¢Çå¾²Êý×ÖÖ§¸¶ºÍÉí·Ý֤ʵ½â¾ö¼Æ»®µÈЧÀÍ¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ6ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾²¢Î´Ìṩ¹ØÓÚ¸ÃÊÂÎñµÄ¸ü¶àϸ½Ú£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±Ïàʶµ½Ò»¸öÖøÃûµÄÀÕË÷ÍÅ»ïÊÇÄ»ºóºÚÊÖ¡£¡£¡£¡£±»µÁÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜ»áÓ°Ïì´ó×ÚʹÓÃEntrust¾ÙÐÐÉí·ÝÖÎÀíºÍÉí·ÝÑéÖ¤µÄ×éÖ¯£¬£¬£¬£¬£¬£¬°üÀ¨ÃÀ¹úÕþ¸®»ú¹¹£¬£¬£¬£¬£¬£¬ÈçÄÜÔ´²¿¡¢ÁìÍÁÇå¾²²¿¡¢²ÆÎñ²¿¡¢ÎÀÉúÓ빫ÖÚЧÀͲ¿¡¢ÍËÎéÎäÊ¿ÊÂÎñ²¿ºÍũҵ²¿µÈµÈ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/digital-security-giant-entrust-breached-by-ransomware-gang/
5¡¢Cisco͸¶Õë¶ÔÎÚ¿ËÀ¼Ä³´óÐÍÈí¼þ¹«Ë¾µÄ¹¥»÷µÄϸ½Ú
CiscoÔÚ7ÔÂ21ÈÕÅû¶ÁËÕë¶ÔÎÚ¿ËÀ¼Ä³´óÐÍÈí¼þ¹«Ë¾µÄ¹¥»÷»î¶¯µÄϸ½Ú¡£¡£¡£¡£Õâ¼ÒÈí¼þ¹«Ë¾Éú²úµÄÈí¼þ¹©ÎÚ¿ËÀ¼¶à¸ö¹ú¼Ò»ú¹¹ËùʹÓ㬣¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñ¿ÉÄÜÓë¶íÂÞ˹Óйأ¬£¬£¬£¬£¬£¬ÒԸù«Ë¾ÎªÄ¿µÄÍýÏë·¢¶¯¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓÃÁËÒ»¸öÃûΪGoMetµÄ¿ªÔ´ºóÃŵÄ×Ô½ç˵±äÌ壬£¬£¬£¬£¬£¬Ö»ÓÐÁ½Æð¼Í¼ÔÚ°¸µÄ»î¶¯Ê¹Óùý¸ÃºóÃÅ£º2020Äê¹¥»÷ÕßʹÓÃF5 BIG-IPÖÐÎó²î£¨CVE-2020-5902£©ÈëÇÖϵͳ²¢×°ÖÃÕâ¸öºóÃÅ£»£»£»£»£»½üÆÚ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚʹÓÃSophos FirewallÖÐÎó²î£¨CVE-2022-1040£©ºó×°ÖúóÃÅ¡£¡£¡£¡£
https://blog.talosintelligence.com/2022/07/attackers-target-ukraine-using-gomet.html
6¡¢SonicWalÐû²¼SQL×¢ÈëÎó²îCVE-2022-22280µÄÇ徲ͨ¸æ
SonicWallÔÚ7ÔÂ22ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬£¬ÌáÐÑÓ°ÏìGMS£¨È«ÇòÖÎÀíϵͳ£©ºÍAnalytics On-Prem²úÆ·µÄSQL×¢ÈëÎó²î¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2022-22280£¬£¬£¬£¬£¬£¬ÊǶÔSQLÏÂÁîÖÐʹÓõÄÌØÊâÔªËØµÄ²»×¼È·Öк͵¼Öµģ¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.4£¬£¬£¬£¬£¬£¬ÎÞÐèÉí·ÝÑéÖ¤»òÓû§½»»¥¼´¿ÉʹÓᣡ£¡£¡£SonicWallÌåÏÖ˵£¬£¬£¬£¬£¬£¬¸ÃÎó²îÉÐδ±»ÔÚҰʹÓ㬣¬£¬£¬£¬£¬Ò²Ã»ÓÐÕë¶Ô´ËÎó²îµÄ¿´·¨Ö¤Êµ(PoC)¡£¡£¡£¡£´ËÎó²îûÓпÉÓõĽâ¾öÒªÁ죬£¬£¬£¬£¬£¬Òò´ËSonicWallÇ¿ÁÒ½¨ÒéʹÓÃÊÜÓ°Ïì²úÆ·µÄ×éÖ¯Á¬Ã¦Éý¼¶µ½ÏìÓ¦µÄÐÞ¸´°æ±¾¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sonicwall-patch-critical-sql-injection-bug-immediately/


¾©¹«Íø°²±¸11010802024551ºÅ