ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÔÝʱÖÐÖ¹
Ðû²¼Ê±¼ä 2023-04-251¡¢ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÔÝʱÖÐÖ¹
¾ÝýÌå4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÃÀ¹úˮʦ³Ð°üÉÌFincantieri Marine Group(FMG)Ôâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÆäµç×ÓÓʼþЧÀÍÆ÷ºÍ²¿·Öϵͳ¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ4ÔÂ12ÈÕÇåÔ磬£¬£¬£¬£¬£¬¸ÃÔì´¬³§Í¸Â¶£¬£¬£¬£¬£¬£¬¹¥»÷Õë¶ÔµÄЧÀÍÆ÷Ö÷ÒªÓÃÓÚÉúÑÄÏòÆäÅÌËã»úÊý¿ØÖÆÔì×°±¸ÌṩָÁîµÄÊý¾Ý£¬£¬£¬£¬£¬£¬µ¼ÖÂËüÃÇå´»úÊýÌì¡£¡£¡£¡£ÏÖÔÚûÓÐÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢Êܵ½Ó°Ïì¡£¡£¡£¡£ÃÀ¹úˮʦÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬FMGÒѽÓÄɲ½·¥¾ÙÐÐÏìÓ¦£¬£¬£¬£¬£¬£¬Ë®Ê¦ÕýÔÚÆð¾¢¼àÊÓÕâЩÊÂÇé¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/us-navy-contractor-cyberattack/
2¡¢Ë¹Ì¹¸£µÈ¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢FortniteÀ¬»øÓʼþ
¾Ý4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÃÀ¹ú¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢±¤ÀÝÖ®Ò¹£¨Fortnite£©ºÍÀñÎ│À¬»øÓʼþ¡£¡£¡£¡£É漰˹̹¸£´óѧ¡¢ÂéÊ¡Àí¹¤Ñ§Ôº¡¢²®¿ËÀû´óѧºÍ¼ÓÖÝÀí¹¤Ñ§ÔºµÈ´óѧ£¬£¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾ËÆºõÔÚÔËÐÐTWiki»òMediaWiki¡£¡£¡£¡£ÕâЩwikiÒ³Ãæ¾Ý³ÆÊÇÓÉÀ¬»øÓʼþ·¢ËÍÕßÉÏ´«µÄ£¬£¬£¬£¬£¬£¬Éù³ÆÌṩÃâ·ÑÀñÎ│¡¢Fortnite BucksºÍ×÷±×Æ÷µÈ¡£¡£¡£¡£ËüÃÇ»á¼ÓÔØÎ±×°³ÉFortniteÒ³ÃæµÄ´¹ÂÚÍøÒ³£¬£¬£¬£¬£¬£¬»òÔÊÐíÌṩÀñÎ│µÄÐéαµÄÊӲ졣¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸Ã»î¶¯»¹Õë¶Ô°ÍÎ÷ijÖÝÕþ¸®µÄÒ»¸öСÐÍÍøÕ¾£¬£¬£¬£¬£¬£¬ÒÔ¼°Å·Ã˵ÄEuropa.eu¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/university-websites-using-mediawiki-twiki-hacked-to-serve-fortnite-spam/
3¡¢Infobloxͨ¹ýÒì³£DNSÁ÷Á¿¼ì²â·¢Ã÷еÄDecoy Dog
InfobloxÓÚ4ÔÂ20Èճƣ¬£¬£¬£¬£¬£¬ËûÃÇÔÚ¼ì²âÒì³£DNSÁ÷Á¿ºó£¬£¬£¬£¬£¬£¬·¢Ã÷ÁËÒ»ÖÖеĶñÒâÈí¼þ¹¤¾ß°üDecoy Dog¡£¡£¡£¡£¸Ã¹¤¾ßÖ¼ÔÚ×ÊÖú¹¥»÷Õßͨ¹ýÕ½ÂÔÐÔµÄÓòÃûÀÏ»¯ºÍDNSÅÌÎÊÔËÔØÀ´Èƹý¼ì²â£¬£¬£¬£¬£¬£¬ÆäDNSÖ¸ÎÆÔÚ»¥ÁªÍøÉÏ3.7ÒÚ¸ö»îÔ¾ÓòÖм«ÎªÓÐÊý¡£¡£¡£¡£¶Ô¸Ã¹¤¾ß»ù´¡ÉèÊ©µÄÊӲ췢Ã÷Á˼¸¸öÓëͳһÐж¯ÓйصÄC2Óò£¬£¬£¬£¬£¬£¬ËüÃǵĴ󲿷ÖͨѶÀ´×Ô¶íÂÞ˹µÄÖ÷»ú¡£¡£¡£¡£ÕâЩÓòÃûµÄDNSËíµÀ¾ßÓÐÖ¸ÏòPupy RATµÄÌØÕ÷£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öÓÉDecoy Dog¹¤¾ß°ü°²ÅŵÄÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£
https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic/
4¡¢AquaÅû¶ʹÓÃKubernetes RBACµÄ´ó¹æÄ£ÍÚ¿ó»î¶¯
AquaÔÚ4ÔÂ21ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸ö´ó¹æÄ£µÄÍÚ¿ó»î¶¯£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËKubernetes(K8s)»ùÓÚ½ÇÉ«µÄ»á¼û¿ØÖÆ(RBAC)½¨ÉèºóÃŲ¢ÔËÐп󹤡£¡£¡£¡£Í¨¹ýʹÓÃRBACʵÑé¶ñÒâ»á¼û¿ØÖÆÕ½ÂÔ£¬£¬£¬£¬£¬£¬×ÝÈ»Ìṩ³õʼ»á¼ûµÄ¹ýʧÉèÖÃÔÚδÀ´»ñµÃÐÞ¸´£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒ²¿ÉÒÔÔÚ±»Ñ¬È¾µÄ¼¯ÈºÉÏÒ»Á¬±£´æ¡£¡£¡£¡£¹¥»÷Á´Ê¹ÓÃÉèÖùýʧµÄAPIЧÀÍÆ÷¾ÙÐгõʼ»á¼û£¬£¬£¬£¬£¬£¬È»ºó·¢ËÍHTTPÇëÇóÒÔÁгöÉñÃØ£¬£¬£¬£¬£¬£¬²¢·¢³öAPIÇëÇóÒÔͨ¹ýÁгöÃüÃû¿Õ¼äkube-systemÖеÄʵÌåÀ´ÍøÂçÓйؼ¯ÈºµÄÐÅÏ¢¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹×°ÖÃDaemonSetsÀ´½ÓÊܺÍÐ®ÖÆ±»¹¥»÷µÄK8s¼¯ÈºµÄ×ÊÔ´¡£¡£¡£¡£
https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters
5¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃGoogle Ads·Ö·¢BumbleBeeµÄ»î¶¯
4ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬SecureWorksÅû¶ÁËʹÓÃGoogle AdsºÍSEOÖж¾·Ö·¢BumbleBeeµÄ»î¶¯¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷Ò»¸öGoogle AdÐû´«ÁËÐéαµÄCisco AnyConnectÇå¾²ÒÆ¶¯¿Í»§¶ËÏÂÔØÒ³Ãæ£¬£¬£¬£¬£¬£¬Ëü½¨ÉèÓÚ2ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬ÍйÜÔÚappcisco[.]comÓòÉÏ¡£¡£¡£¡£¸ÃÒ³ÃæÍÆ¹ãľÂí»¯MSI×°ÖóÌÐòcisco-anyconnect-4_9_0195.msi£¬£¬£¬£¬£¬£¬Ëü»á×°ÖöñÒâÈí¼þBumbleBee¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÆäËü¾ßÓÐÀàËÆ¶ÔÓ¦ÎļþÃû³ÆµÄÈí¼þ°ü£¬£¬£¬£¬£¬£¬ÀýÈçZoomInstaller.exeºÍzoom.ps1£¬£¬£¬£¬£¬£¬ChatGPT.msiºÍchch.ps1£¬£¬£¬£¬£¬£¬ÒÔ¼°CitrixWorkspaceApp.exeºÍcitrix.ps1¡£¡£¡£¡£
https://www.secureworks.com/blog/bumblebee-malware-distributed-via-trojanized-installer-downloads
6¡¢HuntressÐû²¼PaperCutÎó²îʹÓûµÄÆÊÎö±¨¸æ
4ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬HuntressÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬³ÆÆä·¢Ã÷ÁËʹÓÃPaperCut MF/NGÎó²îµÄ»î¶¯¡£¡£¡£¡£ÕâÁ½¸öÎó²î£¨CVE-2023-27350ºÍCVE-2023-27351£©¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÓÚÒÔSYSTEMȨÏÞÔÚ±»Ñ¬È¾µÄPaperCutЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷´ÓPaperCutÈí¼þÖÐÌìÉúµÄPowerShellÏÂÁ£¬£¬£¬£¬£¬ÓÃÓÚ×°ÖÃAteraºÍSyncroµÈRMMÈí¼þ£¬£¬£¬£¬£¬£¬ÒÔ±ãÔÚÄ¿µÄÖ÷»úÒ»Á¬»á¼ûºÍÖ´ÐдúÂë¡£¡£¡£¡£»£»£»£»£»ù´¡ÉèÊ©ÆÊÎö·¢Ã÷£¬£¬£¬£¬£¬£¬ÍйÜÕâЩ¹¤¾ßµÄÓòÃûÓÚ4ÔÂ12ÈÕ×¢²á£¬£¬£¬£¬£¬£¬Ò²ÍйÜTrueBotµÈ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ºóÕßÓë¶íÂÞ˹SilenceÍÅ»ïÓйء£¡£¡£¡£
https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software


¾©¹«Íø°²±¸11010802024551ºÅ