ºÚ¿ÍÉù³ÆÒÑÇÔÈ¡µçÐŹ«Ë¾T-MobileÔ¼1ÒÚ¿Í»§µÄÐÅÏ¢£ºFortbridgeÅû¶cPanelºÍWHMÖжà¸öÇå¾²Îó²îµÄϸ½Ú

Ðû²¼Ê±¼ä 2021-08-16

T-Mobile.jpg1.jpg


  ¹¥»÷ÕßÉù³ÆÔÚÁ½ÖÜǰÈëÇÖÁËT-MobileµÄÓÃÓÚÉú²úºÍ¿ª·¢µÄЧÀÍÆ÷£¬£¬£¬ £¬ÒÔ¼°Ò»¸ö°üÀ¨Á˿ͻ§ÐÅÏ¢µÄOracleÊý¾Ý¿âЧÀÍÆ÷¡£¡£¡£´Ë´Îй¶ÁËT-MobileµÄ1ÒÚ¸ö¿Í»§Ô¼106GBµÄÊý¾Ý£¬£¬£¬ £¬°üÀ¨IMSI¡¢IMEI¡¢µç»°ºÅÂë¡¢¿Í»§ÐÕÃû¡¢Çå¾²PIN¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕºÅÂëºÍ³öÉúÈÕÆÚµÈÐÅÏ¢¡£¡£¡£ÍþвÇ鱨¹«Ë¾Hudson RockÌåÏÖ£¬£¬£¬ £¬´Ë´ÎºÚ¿ÍµÄ¹¥»÷ÐÐΪ¿ÉÄÜÊÇΪÁËÆÆËðÃÀ¹úµÄ»ù´¡ÉèÊ©£¬£¬£¬ £¬Ö¼ÔÚÅê»÷ÃÀ¹úÔøÓÚ2019Äê°ó¼Ü²¢ÕÛÄ¥ÁËJohn Erin Binns(CIA Raven-1)¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hacker-claims-to-steal-data-of-100-million-t-mobile-customers/

FortbridgeÅû¶cPanelºÍWHMÖжà¸öÇå¾²Îó²îµÄϸ½Ú.png


FortbridgeÅû¶cPanelºÍWHMÖжà¸öÇå¾²Îó²îµÄϸ½Ú


  FortbridgeµÄÑо¿Ö°Ô±Åû¶ÁËÍøÂçÍÐ¹ÜÆ½Ì¨cPanelºÍWHMÖжà¸öÇå¾²Îó²îµÄϸ½Ú¡£¡£¡£Ñо¿Ö°Ô±ÔÚÕë¶ÔcPanelºÍWHMµÄºÚºÐÉøÍ¸²âÊÔÖз¢Ã÷ÁËÕâЩÎó²î£¬£¬£¬ £¬Á¬ÏµÊ¹ÓÿÉÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£ÆäÖÐÒ»¸öÎó²îΪ¾­ÏúÉÌÕÊ»§ÖеÄXMLÍⲿʵÌå(XXE)Îó²î£¬£¬£¬ £¬ÊÇÓÉÓÚ¸ÃÕÊ»§ÓµÓÐÒÔXML»òXLFÃûÌñ༭ºÍÌí¼ÓÇøÓòÉèÖÃȨÏÞµ¼ÖµÄ¡£¡£¡£±ðµÄ£¬£¬£¬ £¬Ñо¿Ö°Ô±»¹Åû¶ÁËÒ»¸ö´æ´¢ÐÍXSSÎó²îºÍCSRFÎó²î¡£¡£¡£µ«ÏÖÔÚ£¬£¬£¬ £¬¹©Ó¦ÉÌÖ»ÐÞ¸´ÁËXXEÎó²î£¬£¬£¬ £¬²¢¾Ü¾øÐÞ¸´ÆäËüÎó²î¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2021/08/14/numerous-vulnerabilities-spotted-in-cpanel-and-whm-web-hosting-platform/


Unit42½üÆÚ·¢Ã÷´ó×ÚÈÆ¹ýCAPTCHA¼ì²âµÄ´¹Âڻ.png


Unit42½üÆÚ·¢Ã÷´ó×ÚÈÆ¹ýCAPTCHA¼ì²âµÄ´¹Âڻ


  Unit42µÄÑо¿Ö°Ô±½üÆÚ·¢Ã÷ÁË´ó×ÚÈÆ¹ýCAPTCHA¼ì²âµÄ´¹Âڻ¡£¡£¡£¹¥»÷Õß½«´¹ÂÚÒ³ÃæÒþ²ØÔÚCAPTCHAÖ®ºó¿É±ÜÃâÇå¾²ÅÀ³æ¼ì²âµ½¶ñÒâÄÚÈÝ£¬£¬£¬ £¬²¢¿ÉÒÔʹ´¹ÂÚµÇÂ¼Ò³Ãæ¿´ÆðÀ´Ô½·¢Õýµ±¡£¡£¡£ËäÈ»Õâ²¢·Ç×îеÄÊÖÒÕ£¬£¬£¬ £¬µ«ÔÚ½üÆÚÔ½À´Ô½Ê¢ÐУºÉϸöÔÂUnit42ÔÚ4088¸ö¸¶·ÑµÄÓòÖз¢Ã÷ÁË7572¸ö½ÓÄÉÁË»ìÏýÒªÁìµÄ¶ñÒâURL£¬£¬£¬ £¬Ò²¾ÍÊÇ˵ƽ¾ùÌìÌìÓÐ529¸öʹÓÃÁËCAPTCHAµÄ¶ñÒâ URL¡£¡£¡£³ýÁË´¹ÂÚ¹¥»÷Ö®Í⣬£¬£¬ £¬Ê¹ÓÃCAPTCHAµÄÕ©Æ­»î¶¯Ò²ÔÚÔöÌí¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/captcha-protected-phishing/


Ñо¿ÍŶӷ¢Ã÷AggahÕë¶ÔÑÇÖÞÖÆÔìÒµµÄÓã²æÊ½´¹Âڻ.png


Ñо¿ÍŶӷ¢Ã÷AggahÕë¶ÔÑÇÖÞÖÆÔìÒµµÄÓã²æÊ½´¹Âڻ


  AnomaliµÄÑо¿ÍŶӷ¢Ã÷ÁËʼÓÚ2021Äê7ÔÂÉÏÑ®µÄÓã²æÊ½ÍøÂç´¹Âڻ£¬£¬£¬ £¬Õë¶ÔÕû¸öÑÇÖÞµÄÖÆÔìÒµ¡£¡£¡£Aggah×îÔçÓÚ2019Äê3ÔÂÓÉUnit 42µÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬ £¬Ö÷ÒªÕë¶Ô°¢À­²®ÁªºÏÇõ³¤¹ú(UAE)µÄ×éÖ¯¡£¡£¡£´Ë´Î»î¶¯ÖУ¬£¬£¬ £¬¹¥»÷Õßαװ³ÉÓ¢¹úFoodHub.co.uk·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬ £¬ÓÕʹÓû§µÇ¼Òѱ»ÈëÇÖµÄmail.hoteloscar.in/imagesÍøÕ¾£¬£¬£¬ £¬²¢·Ö·¢Warzone RAT¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬ £¬Aggah×îÐµĹ¥»÷Ä¿µÄ°üÀ¨Öйų́ÍåµÄÖÆÔ칫˾Fon-starºÍ¹¤³Ì¹«Ë¾FomoTech£¬£¬£¬ £¬ÒÔ¼°º«¹úµÄµçÁ¦¹«Ë¾ÏÖ´úµçÆø¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry


Check PointÐû²¼ºÚ¿ÍÍÅ»ïIndra¹¥»÷»î¶¯.jpg


Check PointÐû²¼ºÚ¿ÍÍÅ»ïIndra¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


  Check PointÐû²¼ÁËÓйغڿÍÍÅ»ïIndra¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£Ñо¿Ö°Ô±ÆÊÎöÁË2021Äê7ÔÂ9ÈÕÖÁ10ÈÕ¶ÔÒÁÀÊ»ð³µÏµÍ³µÄÍøÂç¹¥»÷Áôϵĺۼ££¬£¬£¬ £¬²¢½«´Ë´Î¹¥»÷¹éÒòÓÚÒ»¸ö×Ô³ÆÎªIndraµÄºÚ¿ÍÍŻ¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ £¬¸ÃÍŻﻹÓë2019ÄêºÍ2020ÄêÕë¶ÔÐðÀûÑǶà¼Ò¹«Ë¾µÄ¹¥»÷ÓйØ£¬£¬£¬ £¬°üÀ¨Katerji GroupºÍArfada Petroleum¡£¡£¡£±ðµÄ£¬£¬£¬ £¬¹¥»÷ÕßÔÚÕâЩÄ꿪·¢ÁËÖÁÉÙ3¸ö²î±ð°æ±¾µÄwiper£¬£¬£¬ £¬»®·Ö³ÆÎªMeteor¡¢StardustºÍComet£¬£¬£¬ £¬¸Ã±¨¸æ»¹ÏêϸÐÎòÁ˹¥»÷ÕßʹÓõŤ¾ßºÍTTPs¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/2021/indra-hackers-behind-recent-attacks-on-iran/


KasperskyÐû²¼2021ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ.jpg


KasperskyÐû²¼2021ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


  KasperskyÐû²¼ÁË2021ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¸Ã±¨¸æÆÊÎöÁË2021ÄêQ2µÄ¶à¸öÓÐÕë¶ÔÐԵĹ¥»÷»î¶¯£¬£¬£¬ £¬°üÀ¨ÓëCycldekÍÅ»ïÏà¹ØµÄ¹¥»÷»î¶¯£¬£¬£¬ £¬ÔÚÒ°ÍâʹÓÃ×ÀÃæ´°¿ÚÖÎÀíÆ÷ÖÐ0dayµÄ¹¥»÷»î¶¯£¬£¬£¬ £¬TunnelSnakeÐж¯£¬£¬£¬ £¬PuzzleMaker»î¶¯ºÍFerocious KittenÍÅ»ïÏà¹Ø»î¶¯µÈ¡£¡£¡£±ðµÄ£¬£¬£¬ £¬±¨¸æ»¹ÆÊÎöÁ˶à¸ö¶ñÒâÈí¼þ£¬£¬£¬ £¬°üÀ¨ÀÕË÷Èí¼þJSWormºÍBlack Kingdom¡¢ÒøÐÐľÂíGootkitºÍBizarro¡¢APKPureÓ¦ÓÃÖжñÒâ´úÂëºÍBrowser lockersµÈ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º

https://securelist.com/it-threat-evolution-q2-2021/103597/