º«¹úÃÀױƽ̨PowderRoom½ü100ÍòÓû§µÄÐÅϢй¶

Ðû²¼Ê±¼ä 2023-03-28

1¡¢º«¹úÃÀױƽ̨PowderRoom½ü100ÍòÓû§µÄÐÅϢй¶


¾ÝýÌå3ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬ £¬º«¹ú×î´óÃÀ×±ÁìÓòµÄÉ罻ƽ̨PowderRoomÒòÉèÖùýʧй¶½ü100ÍòÓû§µÄÐÅÏ¢¡£¡£¡£12ÔÂ15ÈÕ£¬£¬£¬£¬ £¬£¬ £¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸ö¿É¹ûÕæ»á¼ûµÄÊý¾Ý¿â£¬£¬£¬£¬ £¬£¬ £¬ÆäÖаüÀ¨½ü140GBÊý¾Ý¡£¡£¡£Éæ¼°Óû§ÐÕÃû¡¢µç»°ºÅÂëºÍ¼ÒÍ¥µØµã£¬£¬£¬£¬ £¬£¬ £¬ÒÔ¼°ÓÃÓÚ»á¼û¸ÃÍøÕ¾µÄÓû§×°±¸ºÍä¯ÀÀÆ÷µÄÔªÊý¾Ý¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÒ»°ÙÍò¸öÓÃÓÚÉí·ÝÑéÖ¤ºÍ»á¼ûÍøÕ¾µÄÁîÅÆ¡£¡£¡£¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÊý¾ÝÖ´Ðд¹ÂÚ¹¥»÷ºÍ×°±¸Ð®ÖÆ£¬£¬£¬£¬ £¬£¬ £¬¾ÙÐÐδ¾­ÊÚȨµÄ¹ºÖûò¸ú×ÙÓû§¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬£¬ £¬Ð¹Â¶µÄÊý¾ÝÒѾ­±»±£» £»£»¤ÆðÀ´¡£¡£¡£


https://cybernews.com/security/powder-room-data-leak/


2¡¢²¨¶àÀè¸÷PRASAÔâµ½Vice SocietyÍÅ»ïµÄÀÕË÷¹¥»÷


ýÌå3ÔÂ26Èճƣ¬£¬£¬£¬ £¬£¬ £¬²¨¶àÀè¸÷¶É²ÛºÍÏÂË®µÀÖÎÀí¾Ö(PRASA)Ôâµ½ÁËVice SocietyµÄÀÕË÷¹¥»÷¡£¡£¡£¸Ã¹¥»÷ÓÚ3ÔÂ19ÈÕ±»Åû¶£¬£¬£¬£¬ £¬£¬ £¬¹¥»÷Õß¿ÉÒÔ»á¼û¿Í»§ºÍÔ±¹¤ÐÅÏ¢¡£¡£¡£¸Ã»ú¹¹Ö¸³ö£¬£¬£¬£¬ £¬£¬ £¬ÆäÔÚ²¨¶àÀè¸÷ÖÎÀíµÄÒªº¦»ù´¡ÉèÊ©µÄÔËÓª²¢Î´Êܵ½Ó°Ïì¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬£¬ £¬¸Ã»ú¹¹ÉÐδ͸¶¹¥»÷±³ºóµÄ×éÖ¯Ãû³Æ£¬£¬£¬£¬ £¬£¬ £¬µ«Vice SocietyÍÅ»ïÒѽ«ÆäÌí¼Óµ½ÍøÕ¾µÄ±»¹¥»÷Ãûµ¥ÖС£¡£¡£¸ÃÀÕË÷ÍÅ»ï¹ûÕæÁËÊÜÓ°ÏìСÎÒ˽¼ÒµÄ»¤ÕÕ¡¢¼ÝÕÕºÍÆäËüÎļþ¡£¡£¡£PRASAÏÖÔÚÕýÔÚFBIºÍCISAµÄ×ÊÖúÏÂÊÓ²ì´Ë´Î¹¥»÷¡£¡£¡£


https://securityaffairs.com/144022/hacking/puerto-rico-aqueduct-and-sewer-authority-attack.html


3¡¢PyPI¶ñÒâ°üonyxproxyʹÓÃUnicode×ÖÌåÀ´Èƹý¼ì²â


PhylumÓÚ3ÔÂ22ÈÕ͸¶Æä×î½üÔÚPyPIÉϼì²âµ½Ò»¸ö¶ñÒâ°üonyxproxy£¬£¬£¬£¬ £¬£¬ £¬Ö¼ÔÚÍøÂçºÍй¶ƾ֤µÈÆäËüÃô¸ÐÊý¾Ý¡£¡£¡£¸Ã¶ñÒâ°üÖÐÓÐÒ»¸ösetup.py°ü£¬£¬£¬£¬ £¬£¬ £¬ÆäÖаüÀ¨Êýǧ¸ö»ìÏýʹÓÃUnicode×Ö·ûµÄ¿ÉÒÉ´úÂë×Ö·û´®¡£¡£¡£ËäÈ»ÕâЩÎı¾³ýÁË×ÖÌå²î±ðÖ®Í⣬£¬£¬£¬ £¬£¬ £¬¿´ÆðÀ´ÏÕЩÊÇÕý³£µÄ£¬£¬£¬£¬ £¬£¬ £¬µ«¹ØÓÚPythonÚ¹ÊÍÆ÷À´Ëµ±£´æÖØ´óµÄ²î±ð¡£¡£¡£Í¨¹ýÕâÖÖ·½·¨£¬£¬£¬£¬ £¬£¬ £¬¿ÉÒÔÈÆ¹ý»ùÓÚ×Ö·û´®Æ¥ÅäÉè¼ÆµÄ·ÀÓù²½·¥¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬£¬ £¬¸Ã¶ñÒâ°üÒÑ´ÓÆ½Ì¨ÉÑþ³Øý¡£¡£¡£


https://blog.phylum.io/malicious-actors-use-unicode-support-in-python-to-evade-detection


4¡¢IntezerÅû¶Bitter APTÍÅ»ïÕë¶ÔºËÄÜÐÐÒµµÄ¹¥»÷»î¶¯


IntezerÔÚ3ÔÂ24ÈÕÅû¶ÁËÓëÕë¶ÔÑÇÌ«µØÇøµÄBitter APTÏà¹ØµÄ¹¥»÷»î¶¯¡£¡£¡£´Ë´Î»î¶¯ÖУ¬£¬£¬£¬ £¬£¬ £¬Bitterαװ³É¼ª¶û¼ªË¹Ë¹Ì¹´óʹ¹Ý£¬£¬£¬£¬ £¬£¬ £¬ÏòÓëºËÄÜÁìÓòÏà¹ØµÄ¶à¼Ò¹«Ë¾ºÍѧÊõÖ°Ô±·¢Ë͵ç×ÓÓʼþ¡£¡£¡£ÓʼþÔ¼ÇëÊÕ¼þÈ˼ÓÈëÓëËûÃÇÏà¹ØµÄÖ÷Ìâ¾Û»á£¬£¬£¬£¬ £¬£¬ £¬²¢ÓÕʹÊÕ¼þÈËÏÂÔØ²¢·­¿ª°üÀ¨Microsoft±àÒëµÄHTML×ÊÖúÎļþ(CHM)»ò¶ñÒâExcelÎĵµµÄRARÎļþ¡£¡£¡£ÈôÊÇʹÓÃCHM£¬£¬£¬£¬ £¬£¬ £¬ÔòµÚ¶þ½×¶ÎpayloadÊÇMSI»òPowerShellÎļþ£¬£¬£¬£¬ £¬£¬ £¬ÈôÊÇʹÓÃExcelÎĵµ£¬£¬£¬£¬ £¬£¬ £¬ÔòµÚ¶þ½×¶ÎpayloadÊÇEXEÎļþ¡£¡£¡£Intezer³Æ£¬£¬£¬£¬ £¬£¬ £¬¹¥»÷Õß¿ÉÄܸüϲ»¶CHM payload¡£¡£¡£


https://www.intezer.com/blog/research/phishing-campaign-targets-nuclear-energy-industry/


5¡¢WordPressÐÞ¸´WooCommerce²å¼þÖпÉÐ®ÖÆÍøÕ¾µÄÎó²î


¾Ý3ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬ £¬WordPress±³ºóµÄ¹«Ë¾AutomatticÔÚÁè¼Ý50Íò¸öÔËÐÐWooCommerceÖ§¸¶²å¼þµÄÍøÕ¾ÉÏ×Ô¶¯×°ÖÃÁËÒ»¸ö²¹¶¡¡£¡£¡£¸Ã²¹¶¡ÐÞ¸´ÁËÒ»¸ö¿É±»ÓÃÀ´»ñµÃÄ¿µÄÊÐËÁµÄÖÎÀíÔ±»á¼ûȨÏÞµÄÎó²î£¬£¬£¬£¬ £¬£¬ £¬Ó°ÏìÁ˲å¼þ°æ±¾4.8.0µ½5.6.1¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬ £¬£¬ £¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îð³äÖÎÀíÔ±²¢ÍêÈ«½ÓÊÜÍøÕ¾£¬£¬£¬£¬ £¬£¬ £¬¶øÎÞÐèÓëÓû§½»»¥¡£¡£¡£ÓÉÓÚ²»ÐèÒªÉí·ÝÑéÖ¤£¬£¬£¬£¬ £¬£¬ £¬Òò´Ë¸ÃÎó²îºÜ¿ÉÄܻᱻ´ó¹æÄ£Ê¹Óᣡ£¡£¸Ã¸üÐÂÏÖÕýÔÚ×Ô¶¯Íƹ㵽¾¡¿ÉÄܶàµÄÊÐËÁ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/wordpress-force-patching-woocommerce-plugin-with-500k-installs/


6¡¢Î¢ÈíÐû²¼¼ì²âOutlookÎó²îCVE-2023-23397ʹÓõÄÖ¸ÄÏ


3ÔÂ24ÈÕ£¬£¬£¬£¬ £¬£¬ £¬Î¢ÈíÐû²¼Á˹ØÓÚ¼ì²âºÍÊÓ²ìʹÓÃOutlookÎó²îCVE-2023-23397¹¥»÷»î¶¯µÄÖ¸ÄÏ¡£¡£¡£ÕâÊÇÒ»¸öÌáȨÎó²î£¬£¬£¬£¬ £¬£¬ £¬¹¥»÷ÕßÄܹ»ÔÚNTLMÖмÌÁãµã»÷¹¥»÷ÖÐÎÞÐèÓû§½»»¥¼´¿ÉÇÔÈ¡NTLM hash¡£¡£¡£¸ÃÎó²îÒѱ»Ê¹Ó㬣¬£¬£¬ £¬£¬ £¬ÔÚ2023Äê3ÔµÄÖܶþ²¹¶¡ÖÐÐÞ¸´¡£¡£¡£Ö¸ÄÏÌṩÁËÎó²î¸ÅÊö¡¢Îó²îµÄʹÓó¡¾°¡¢ÔÚ¹¥»÷ÖÐÊӲ쵽µÄʹÓû¡¢È·¶¨Ò»¸ö×éÖ¯ÊÇ·ñÊǸÃÎó²îµÄÄ¿µÄ»ò±»¹¥»÷µÄÊÖÒÕÒÔ¼°·ÀÓù´ËÀ๥»÷µÄ»º½â²½·¥¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2023/03/24/guidance-for-investigating-attacks-using-cve-2023-23397/