º«¹úÃÀױƽ̨PowderRoom½ü100ÍòÓû§µÄÐÅϢй¶
Ðû²¼Ê±¼ä 2023-03-281¡¢º«¹úÃÀױƽ̨PowderRoom½ü100ÍòÓû§µÄÐÅϢй¶
¾ÝýÌå3ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬º«¹ú×î´óÃÀ×±ÁìÓòµÄÉ罻ƽ̨PowderRoomÒòÉèÖùýʧй¶½ü100ÍòÓû§µÄÐÅÏ¢¡£¡£¡£12ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸ö¿É¹ûÕæ»á¼ûµÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨½ü140GBÊý¾Ý¡£¡£¡£Éæ¼°Óû§ÐÕÃû¡¢µç»°ºÅÂëºÍ¼ÒÍ¥µØµã£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÓÃÓÚ»á¼û¸ÃÍøÕ¾µÄÓû§×°±¸ºÍä¯ÀÀÆ÷µÄÔªÊý¾Ý¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÒ»°ÙÍò¸öÓÃÓÚÉí·ÝÑéÖ¤ºÍ»á¼ûÍøÕ¾µÄÁîÅÆ¡£¡£¡£¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÊý¾ÝÖ´Ðд¹ÂÚ¹¥»÷ºÍ×°±¸Ð®ÖÆ£¬£¬£¬£¬£¬£¬£¬¾ÙÐÐδ¾ÊÚȨµÄ¹ºÖûò¸ú×ÙÓû§¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÊý¾ÝÒѾ±»±£»£»£»¤ÆðÀ´¡£¡£¡£
https://cybernews.com/security/powder-room-data-leak/
2¡¢²¨¶àÀè¸÷PRASAÔâµ½Vice SocietyÍÅ»ïµÄÀÕË÷¹¥»÷
ýÌå3ÔÂ26Èճƣ¬£¬£¬£¬£¬£¬£¬²¨¶àÀè¸÷¶É²ÛºÍÏÂË®µÀÖÎÀí¾Ö(PRASA)Ôâµ½ÁËVice SocietyµÄÀÕË÷¹¥»÷¡£¡£¡£¸Ã¹¥»÷ÓÚ3ÔÂ19ÈÕ±»Åû¶£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ»á¼û¿Í»§ºÍÔ±¹¤ÐÅÏ¢¡£¡£¡£¸Ã»ú¹¹Ö¸³ö£¬£¬£¬£¬£¬£¬£¬ÆäÔÚ²¨¶àÀè¸÷ÖÎÀíµÄÒªº¦»ù´¡ÉèÊ©µÄÔËÓª²¢Î´Êܵ½Ó°Ïì¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸Ã»ú¹¹ÉÐδ͸¶¹¥»÷±³ºóµÄ×éÖ¯Ãû³Æ£¬£¬£¬£¬£¬£¬£¬µ«Vice SocietyÍÅ»ïÒѽ«ÆäÌí¼Óµ½ÍøÕ¾µÄ±»¹¥»÷Ãûµ¥ÖС£¡£¡£¸ÃÀÕË÷ÍÅ»ï¹ûÕæÁËÊÜÓ°ÏìСÎÒ˽¼ÒµÄ»¤ÕÕ¡¢¼ÝÕÕºÍÆäËüÎļþ¡£¡£¡£PRASAÏÖÔÚÕýÔÚFBIºÍCISAµÄ×ÊÖúÏÂÊÓ²ì´Ë´Î¹¥»÷¡£¡£¡£
https://securityaffairs.com/144022/hacking/puerto-rico-aqueduct-and-sewer-authority-attack.html
3¡¢PyPI¶ñÒâ°üonyxproxyʹÓÃUnicode×ÖÌåÀ´Èƹý¼ì²â
PhylumÓÚ3ÔÂ22ÈÕ͸¶Æä×î½üÔÚPyPIÉϼì²âµ½Ò»¸ö¶ñÒâ°üonyxproxy£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÍøÂçºÍй¶ƾ֤µÈÆäËüÃô¸ÐÊý¾Ý¡£¡£¡£¸Ã¶ñÒâ°üÖÐÓÐÒ»¸ösetup.py°ü£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Êýǧ¸ö»ìÏýʹÓÃUnicode×Ö·ûµÄ¿ÉÒÉ´úÂë×Ö·û´®¡£¡£¡£ËäÈ»ÕâЩÎı¾³ýÁË×ÖÌå²î±ðÖ®Í⣬£¬£¬£¬£¬£¬£¬¿´ÆðÀ´ÏÕЩÊÇÕý³£µÄ£¬£¬£¬£¬£¬£¬£¬µ«¹ØÓÚPythonÚ¹ÊÍÆ÷À´Ëµ±£´æÖØ´óµÄ²î±ð¡£¡£¡£Í¨¹ýÕâÖÖ·½·¨£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔÈÆ¹ý»ùÓÚ×Ö·û´®Æ¥ÅäÉè¼ÆµÄ·ÀÓù²½·¥¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâ°üÒÑ´ÓÆ½Ì¨ÉÑþ³Øý¡£¡£¡£
https://blog.phylum.io/malicious-actors-use-unicode-support-in-python-to-evade-detection
4¡¢IntezerÅû¶Bitter APTÍÅ»ïÕë¶ÔºËÄÜÐÐÒµµÄ¹¥»÷»î¶¯
IntezerÔÚ3ÔÂ24ÈÕÅû¶ÁËÓëÕë¶ÔÑÇÌ«µØÇøµÄBitter APTÏà¹ØµÄ¹¥»÷»î¶¯¡£¡£¡£´Ë´Î»î¶¯ÖУ¬£¬£¬£¬£¬£¬£¬Bitterαװ³É¼ª¶û¼ªË¹Ë¹Ì¹´óʹ¹Ý£¬£¬£¬£¬£¬£¬£¬ÏòÓëºËÄÜÁìÓòÏà¹ØµÄ¶à¼Ò¹«Ë¾ºÍѧÊõÖ°Ô±·¢Ë͵ç×ÓÓʼþ¡£¡£¡£ÓʼþÔ¼ÇëÊÕ¼þÈ˼ÓÈëÓëËûÃÇÏà¹ØµÄÖ÷Ìâ¾Û»á£¬£¬£¬£¬£¬£¬£¬²¢ÓÕʹÊÕ¼þÈËÏÂÔØ²¢·¿ª°üÀ¨Microsoft±àÒëµÄHTML×ÊÖúÎļþ(CHM)»ò¶ñÒâExcelÎĵµµÄRARÎļþ¡£¡£¡£ÈôÊÇʹÓÃCHM£¬£¬£¬£¬£¬£¬£¬ÔòµÚ¶þ½×¶ÎpayloadÊÇMSI»òPowerShellÎļþ£¬£¬£¬£¬£¬£¬£¬ÈôÊÇʹÓÃExcelÎĵµ£¬£¬£¬£¬£¬£¬£¬ÔòµÚ¶þ½×¶ÎpayloadÊÇEXEÎļþ¡£¡£¡£Intezer³Æ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄܸüϲ»¶CHM payload¡£¡£¡£
https://www.intezer.com/blog/research/phishing-campaign-targets-nuclear-energy-industry/
5¡¢WordPressÐÞ¸´WooCommerce²å¼þÖпÉÐ®ÖÆÍøÕ¾µÄÎó²î
¾Ý3ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬WordPress±³ºóµÄ¹«Ë¾AutomatticÔÚÁè¼Ý50Íò¸öÔËÐÐWooCommerceÖ§¸¶²å¼þµÄÍøÕ¾ÉÏ×Ô¶¯×°ÖÃÁËÒ»¸ö²¹¶¡¡£¡£¡£¸Ã²¹¶¡ÐÞ¸´ÁËÒ»¸ö¿É±»ÓÃÀ´»ñµÃÄ¿µÄÊÐËÁµÄÖÎÀíÔ±»á¼ûȨÏÞµÄÎó²î£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˲å¼þ°æ±¾4.8.0µ½5.6.1¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îð³äÖÎÀíÔ±²¢ÍêÈ«½ÓÊÜÍøÕ¾£¬£¬£¬£¬£¬£¬£¬¶øÎÞÐèÓëÓû§½»»¥¡£¡£¡£ÓÉÓÚ²»ÐèÒªÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬Òò´Ë¸ÃÎó²îºÜ¿ÉÄܻᱻ´ó¹æÄ£Ê¹Óᣡ£¡£¸Ã¸üÐÂÏÖÕýÔÚ×Ô¶¯Íƹ㵽¾¡¿ÉÄܶàµÄÊÐËÁ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/wordpress-force-patching-woocommerce-plugin-with-500k-installs/
6¡¢Î¢ÈíÐû²¼¼ì²âOutlookÎó²îCVE-2023-23397ʹÓõÄÖ¸ÄÏ
3ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼Á˹ØÓÚ¼ì²âºÍÊÓ²ìʹÓÃOutlookÎó²îCVE-2023-23397¹¥»÷»î¶¯µÄÖ¸ÄÏ¡£¡£¡£ÕâÊÇÒ»¸öÌáȨÎó²î£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÄܹ»ÔÚNTLMÖмÌÁãµã»÷¹¥»÷ÖÐÎÞÐèÓû§½»»¥¼´¿ÉÇÔÈ¡NTLM hash¡£¡£¡£¸ÃÎó²îÒѱ»Ê¹Ó㬣¬£¬£¬£¬£¬£¬ÔÚ2023Äê3ÔµÄÖܶþ²¹¶¡ÖÐÐÞ¸´¡£¡£¡£Ö¸ÄÏÌṩÁËÎó²î¸ÅÊö¡¢Îó²îµÄʹÓó¡¾°¡¢ÔÚ¹¥»÷ÖÐÊӲ쵽µÄʹÓû¡¢È·¶¨Ò»¸ö×éÖ¯ÊÇ·ñÊǸÃÎó²îµÄÄ¿µÄ»ò±»¹¥»÷µÄÊÖÒÕÒÔ¼°·ÀÓù´ËÀ๥»÷µÄ»º½â²½·¥¡£¡£¡£
https://www.microsoft.com/en-us/security/blog/2023/03/24/guidance-for-investigating-attacks-using-cve-2023-23397/