Microsoft DNSÉèÖùýʧµ¼ÖÂHotmailÓʼþ·¢ËÍʧ°Ü
Ðû²¼Ê±¼ä 2023-08-221¡¢Microsoft DNSÉèÖùýʧµ¼ÖÂHotmailÓʼþ·¢ËÍʧ°Ü
¾ÝýÌå8ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬È«Çò¹æÄ£ÄÚµÄHotmailÓû§ÔÚ·¢Ë͵ç×ÓÓʼþʱÓöµ½ÎÊÌâ¡£¡£¡£¡£¡£¡£ÔÚMicrosoft¹ýʧÉèÖÃÓòµÄDNS SPF¼Í¼ºó£¬£¬£¬£¬£¬£¬Óʼþ±»±ê¼ÇΪÀ¬»øÓʼþ»òδËÍ´ï¡£¡£¡£¡£¡£¡£¸ÃÎÊÌâʼÓÚ17ÈÕÉîÒ¹£¬£¬£¬£¬£¬£¬ÏÔʾ¹ýʧÐÂÎÅ¡°´Ë¹ýʧÓë·¢¼þÈËÕ½ÂÔ¿ò¼Ü(SPF)Óйء£¡£¡£¡£¡£¡£Ä¿µÄÓʼþϵͳ¶ÔÓʼþµÄSPF¼Í¼µÄÆÀ¹Àµ¼Ö¹ýʧ¡£¡£¡£¡£¡£¡£ÇëÓëÄúµÄÓò×¢²áÉÌÏàÖú£¬£¬£¬£¬£¬£¬È·±£ÄúµÄSPF¼Í¼ÉèÖÃ׼ȷ¡±¡£¡£¡£¡£¡£¡£¸ÃÎÊÌâÔ´ÓÚMicrosoftɾ³ýÁËhotmail.com SPF¼Í¼ÖеÄ"include:spf.protection.outlook.com"¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸ÃÎÊÌâÒѾ»ñµÃ½â¾ö¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/hotmail-email-delivery-fails-after-microsoft-misconfigures-dns/
2¡¢Ivanti SentryÖеÄÎó²îCVE-2023-38035Òѱ»Ê¹ÓÃ
¾Ý8ÔÂ21ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬Ivanti Sentry£¨ÒÔǰ³ÆÎªMobileIron Sentry£©ÖеÄÒ»¸öAPIÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î(CVE-2023-38035)Òѱ»Ê¹Óᣡ£¡£¡£¡£¡£Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿Éͨ¹ýMobileIronÉèÖÃЧÀÍ(MICS)ʹÓõÄ8443¶Ë¿Ú»á¼ûÖÎÀíÃÅ»§ÉèÖÃAPI£¬£¬£¬£¬£¬£¬¿ÉÒÔʹÓÃÏÞÖÆÈ±·¦µÄApache HTTPDÉèÖÃÈÆ¹ýÉí·ÝÑéÖ¤¿ØÖÆÀ´ÊµÏÖ¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓú󣬣¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÔÚÔËÐÐIvanti Sentry 9.18¼°¸üµÍ°æ±¾µÄϵͳÉϸü¸ÄÉèÖá¢ÔËÐÐϵͳÏÂÁî»òдÈëÎļþ¡£¡£¡£¡£¡£¡£ÏÖÔÚ¹©Ó¦ÉÌÒÑÐû²¼Çå¾²¸üÐÂÐÞ¸´´ËÎó²î¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-actively-exploited-mobileiron-zero-day-bug/
3¡¢°Ä´óÀûÑÇauDA·ñ¶¨NoEscapeÇÔÈ¡Æä15 GBÊý¾ÝµÄ˵·¨
ýÌå8ÔÂ21Èճƣ¬£¬£¬£¬£¬£¬ÖÎÀí°Ä´óÀûÑÇÓòÃû.auµÄ»ú¹¹auDA·ñ¶¨Æä±¬·¢ÁËÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹±»ÊÓΪ°Ä´óÀûÑÇÒªº¦»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬ÓÐ400¶àÍò¸öÓòÃû×¢²áÔÚ.auÉÏ¡£¡£¡£¡£¡£¡£8ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïNoEscapeÉù³Æ¹¥»÷Á˸ûú¹¹²¢ÇÔÈ¡ÁË15 GBÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£auDA³ÆËûÃǼì²éÁËNoEscape¹ûÕæµÄÎļþ£¬£¬£¬£¬£¬£¬ÕâЩÎļþ²¢Ã»Óд洢ÔÚËûÃǵÄϵͳÉÏ¡£¡£¡£¡£¡£¡£²¢ÌåÏÖÊý¾Ýй¶µÄȪԴÊÇÒ»¸ö°Ä´óÀûÑǸöÌåÉÌ»§£¬£¬£¬£¬£¬£¬ÆäЧÀÍÆ÷ÓÚ8ÔÂ10ÈÕÔâµ½¹¥»÷¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÅúÅÐÁËauDAµÄ»ØÓ¦£¬£¬£¬£¬£¬£¬²¢Íþв"½«³öÊÛÓà¶îÁè¼Ý4000ÃÀÔªµÄÒøÐÐÕË»§µÄ»á¼ûȨÏÞ"¡£¡£¡£¡£¡£¡£
https://therecord.media/australia-domain-name-admin-denies-data-breach
4¡¢ESETÅû¶ּÔÚÇÔȡȫÇòZimbraÕË»§µÄ´ó¹æÄ£´¹Âڻ
8ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬ESETÅû¶ÁËÕë¶ÔZimbra Collaborationµç×ÓÓʼþЧÀÍÆ÷µÄ´ó¹æÄ£´¹Âڻ¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÖÁÉÙ´Ó4ÔÂÆð¾ÍÒ»Ö±ÔÚ¾ÙÐУ¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡȫÇò¹æÄ£ÄÚZimbraÕË»§µÄƾ֤¡£¡£¡£¡£¡£¡£±»¹¥»÷µÄÄ¿µÄÖ÷ҪλÓÚ²¨À¼£¬£¬£¬£¬£¬£¬Æä´ÎÊǶò¹Ï¶à¶ûºÍÒâ´óÀû¡£¡£¡£¡£¡£¡£´¹ÂÚÓʼþð³äZimbraÖÎÀíÔ±£¬£¬£¬£¬£¬£¬Í¨ÖªÓû§¼´½«¾ÙÐÐÓʼþЧÀÍÆ÷¸üУ¬£¬£¬£¬£¬£¬Õ⽫µ¼ÖÂÕÊ»§ÔÝʱͣÓ㬣¬£¬£¬£¬£¬²¢ÒªÇóÊÕ¼þÈË·¿ª¸½¼ÓµÄHTMLÎļþÏàʶ¸ü¶àÐÅÏ¢¡£¡£¡£¡£¡£¡£·¿ªºóÊÇÒ»¸öαÔìµÄZimbraµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬£¬ÓÕʹĿµÄÊäÈëÕË»§µÄƾ֤¡£¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬Óû§ÊäÈëµÄÐÅÏ¢½«Í¨¹ýHTTPS POSTÇëÇó·¢Ë͵½¹¥»÷ÕßµÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£
https://www.welivesecurity.com/en/eset-research/mass-spreading-campaign-targeting-zimbra-users/
5¡¢Sysdig·¢Ã÷Õë¶ÔGitLabµÄÍÚ¿óºÍÊðÀíÐ®ÖÆ»î¶¯LABRAT
SysdigÔÚ8ÔÂ17ÈÕ³ÆÆä·¢Ã÷Á˱»³ÆÎªLABRATµÄ¼ÓÃÜÇ®±ÒÍÚ¾òºÍÊðÀíÐ®ÖÆ»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃGitLabÎó²î£¨CVE-2021-22205£©»ñµÃ¶ÔÈÝÆ÷µÄ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬»¹Ê¹ÓÃδ±»¼ì²âµ½µÄ»ùÓÚÊðÃûµÄ¹¤¾ß¡¢ÖØ´óµÄ¿çƽ̨¶ñÒâÈí¼þ¡¢Èƹý·À»ðǽµÄC2¹¤¾ßÒÔ¼°»ùÓÚÄں˵ÄrootkitÀ´Òþ²ØÆä±£´æ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÀÄÓÃÕýµ±Ð§ÀÍTryCloudflareÀ´»ìÏýËûÃǵÄC2¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Ö÷Ҫͨ¹ýÊðÀíÐ®ÖÆºÍ¼ÓÃÜÇ®±ÒÍÚ¿óÀ´×¬È¡ÊÕÈë¡£¡£¡£¡£¡£¡£
https://sysdig.com/blog/labrat-cryptojacking-proxyjacking-campaign/
6¡¢Rapid7Ðû²¼¹ØÓÚ2023ÄêÄêÖÐÍþÐ²Ì¬ÊÆµÄ»ØÊ×±¨¸æ
8ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬Rapid7Ðû²¼ÁË2023ÄêÄêÖÐÍþÐ²Ì¬ÊÆµÄ»ØÊ×±¨¸æ¡£¡£¡£¡£¡£¡£2023ÄêÉϰëÄ꣬£¬£¬£¬£¬£¬Ñо¿ÍŶӸú×ÙÁË1500¶àÆðÀÕË÷¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷´ó²¿·ÖÊÇÓÉLockBit(35.3%)¡¢ALPHV/BlackCat(14.2%)ºÍClop(11.9%)Ö´Ðеġ£¡£¡£¡£¡£¡£×î³£¼ûµÄ³õʼ»á¼ûÊÖÒÕÊÇÔ¶³Ì»á¼û£¬£¬£¬£¬£¬£¬Õ¼±È39%£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÎó²îʹÓã¨27%£©¡£¡£¡£¡£¡£¡£40%µÄÊÂÎñÊÇÓÉÓÚMFAȱʧ»òÖ´ÐÐ·×ÆçÖµ¼Öµģ¬£¬£¬£¬£¬£¬ÓÈÆäÊÇÔÚVPN¡¢VDIºÍSaaS²úÆ·ÉÏ¡£¡£¡£¡£¡£¡£79Æð¹¥»÷¹éÒòÓÚÓë¹ú¼ÒÏà¹ØµÄ¹¥»÷Õߣ¬£¬£¬£¬£¬£¬ÆäÖÐÔ¼ËÄ·ÖÖ®Ò»(24%)ʹÓÃÁËÃæÏò¹«ÖÚµÄÓ¦ÓóÌÐòµÄÎó²î¡£¡£¡£¡£¡£¡£
https://www.rapid7.com/blog/post/2023/08/17/rapid7s-mid-year-threat-review/


¾©¹«Íø°²±¸11010802024551ºÅ