Ó¡¶Èº½¿Õ¹«Ë¾Akasa AirÒòÉèÖùýʧÓû§ÐÅϢй¶
Ðû²¼Ê±¼ä 2022-08-29
ýÌå8ÔÂ25Èճƣ¬Ó¡¶Èº½¿Õ¹«Ë¾Akasa Air±¬·¢Êý¾Ýй¶£¬Î´¾ÊÚȨµÄСÎÒ˽¼Ò¿É»á¼ûÓû§ÐÅÏ¢¡£¸Ãº½¿Õ¹«Ë¾³Æ£¬8ÔÂ25ÈÕ·¢Ã÷ÁËÒ»¸öÓëµÇ¼ºÍ×¢²á·þÎñÓйصÄÊÖÒÕÉèÖùýʧÎÊÌ⣬¿Éй¶ע²áÓû§ÐÅÏ¢£¬°üÀ¨ÐÕÃû¡¢ÐԱ𡢵ç×ÓÓʼþµØµãºÍµç»°ºÅÂ룬ÇÒÕâЩÐÅÏ¢¿ÉÄÜÒѾ±»Î´¾ÊÚȨµÄСÎÒ˽¼Ò»á¼û¡£¸Ãº½¿Õ¹«Ë¾ÓÚ8ÔÂ7ÈÕ×îÏÈÔËÓª£¬ÏÖÔÚÒѾʹËÊÂÏòÆä¿Í»§ÖÂǸ£¬²¢ÏòCERT-In±¨¸æ¡£
https://www.telegraphindia.com/business/akasa-air-suffers-data-breach/cid/1883016
2¡¢AtlassianÐÞ¸´BitbucketÖеÄRCEÎó²îCVE-2022-36804
8ÔÂ24ÈÕ£¬AtlassianÐû²¼Ç徲ͨ¸æ£¬ÐÞ¸´Bitbucket·þÎñÆ÷ºÍÊý¾ÝÖÐÐĵÄÇå¾²Îó²î£¨CVE-2022-36804£©¡£BitbucketÊÇÒ»¸ö»ùÓÚGitµÄ´úÂëÍйܡ¢ÖÎÀíºÍÐ×÷¹¤¾ß£¬¼¯³ÉÁËJiraºÍTrello¡£¸ÃÎó²îÊÇÈí¼þ²úÆ·µÄ¶à¸öAPI¶ËµãÖеÄÏÂÁî×¢ÈëÎó²î£¬CVSSÆÀ·ÖΪ9.9£¬¿Éͨ¹ýÌØÖÆµÄHTTPÇëÇóÀ´Ê¹Ó㬵¼ÖÂí§Òâ´úÂëµÄÖ´ÐС£½¨ÒéÎÞ·¨Ó¦ÓÃÇå¾²¸üеÄÓû§Í¨¹ýÉèÖÃfeature.public.access=false¹Ø±Õ¹«¹²´æ´¢¿âÀ´×÷Ϊ»º½â²½·¥¡£
https://thehackernews.com/2022/08/critical-vulnerability-discovered-in.html
3¡¢ÖÇÀû¹ú¼ÒÏûºÄÕß·þÎñÖÐÐÄSERNACµÄÍøÕ¾±»¹¥»÷ºó¹Ø±Õ
¾Ý8ÔÂ27ÈÕ±¨µÀ£¬ÖÇÀû¹ú¼ÒÏûºÄÕß·þÎñÖÐÐÄ(SERNAC)ÔÚ±»¹¥»÷ºó¹Ø±Õ¡£SERNACÊÇÖÇÀûÈÏÕæÎ¬»¤ºÍÔö½øÏûºÄÕßȨÁ¦µÄ¹«¹²·þÎñ»ú¹¹£¬ÔÚ·¢Ã÷¹¥»÷ºóÒѽ«´Ëʱ¨¸æ¸øÉó²é¹Ù°ì¹«ÊÒ¾ÙÐÐÐÌÊÂÊӲ졣SERNACÍøÕ¾ÏÔʾ¸ÃÍøÕ¾¼°Æäƽ̨ÕýÔÚά»¤ÖУ¬ÔÚÍøÕ¾ÎÞ·¨»á¼ûʱÏûºÄÕß¿ÉÒÔµ½SERNAC·þÎñ´¦»òÕßͨ¹ýÖµç»ñµÃ·þÎñ¡£ÏÖÔÚÒÑÈ·ÈÏÕâÊÇÒ»ÆðÀÕË÷¹¥»÷ÊÂÎñ£¬µ«ÖÇÀûÕþ¸®ÉÐδ˵Ã÷ËüÊÇʲôÀàÐ͵ÄÀÕË÷Èí¼þ¡£
https://www.databreaches.net/sernac-computer-services-hacked-chiles-interior-ministry-assessing-scope-of-cyberattack/
4¡¢DoorDashÓëÆäµÚÈý·½¹©Ó¦ÉÌÔ⵽ͳһºÚ¿ÍÍÅ»ïµÄ¹¥»÷
¾ÝýÌå8ÔÂ26ÈÕ±¨µÀ£¬Ê³ÎïÅäË͹«Ë¾DoorDashÓйصĿͻ§ºÍÔ±¹¤Êý¾Ýй¶¡£DoorDashÌåÏÖ£¬¹¥»÷ÕßʹÓÃÁË´ÓÆäµÚÈý·½¹©Ó¦ÉÌTwilio´¦ÇÔÈ¡µÄƾ֤»ñµÃÁ˶Թ«Ë¾ÄÚ²¿¹¤¾ßµÄ»á¼ûȨÏÞ£¬À´»á¼û¿Í»§ºÍÔ±¹¤µÄÊý¾Ý¡£Ð¹Â¶ÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢ÓʼþµØµã¡¢ÅäË͵ص㡢µç»°ºÅÂëÒÔ¼°²¿·ÖÖ§¸¶¿¨µÄºóËÄλ£»Ô±¹¤ÐÕÃû¡¢µç»°ºÅÂëºÍµç×ÓÓʼþµØµã¡£²»¾Ãºó£¬¸Ã¹«Ë¾³ÎÇå´Ë´Î»÷ÊÇÓɹ¥»÷TwilioµÄͳһÍÅ»ï¾ÙÐе쬵«²¢·ÇÊÇͨ¹ýTwilio¡£
https://www.bleepingcomputer.com/news/security/doordash-discloses-new-data-breach-tied-to-twilio-hackers/
5¡¢Trend Micro·¢Ã÷Õë¶ÔÑÇÖ޺ͷÇÖÞµÄÐÂÀÕË÷Èí¼þAgenda
Trend MicroÔÚ8ÔÂ25ÈÕÅû¶ÁËÕë¶ÔÑÇÖ޺ͷÇÖÞµÄÐÂÀÕË÷Èí¼þAgenda¡£¸ÃÀÕË÷Èí¼þÓÃÊÇÓÃGOÓïÑÔ¿ª·¢µÄ£¬Õë¶ÔÓ¡¶ÈÄáÎ÷ÑÇ¡¢É³Ìذ¢À²®¡¢ÄϷǺÍÌ©¹úµÄÒ½ÁƱ£½¡ºÍ½ÌÓý×éÖ¯¡£Agenda¿ÉÒÔÔÚÇ徲ģʽÏÂÖØÐÂÆô¶¯ÏµÍ³£¬ÊÔͼ×èÖ¹Ðí¶àÌØ¶¨µÄ·þÎñÆ÷Àú³ÌºÍ·þÎñ£¬²¢ÓжàÖÖģʽ¡£Ñо¿Ö°Ô±ÍøÂçµÄÿ¸öÀÕË÷Èí¼þµÄÑù±¾¶¼ÊÇÎªÌØ¶¨Ä¿µÄ¶¨ÖƵ쬰üÀ¨Î¨Ò»µÄ¹«Ë¾IDºÍй¶µÄÕË»§ÐÅÏ¢¡£ÆäÊê½ðÒò¹«Ë¾¶øÒ죬´Ó50000ÃÀÔªµ½800000ÃÀÔª²»µÈ¡£
https://www.trendmicro.com/en_us/research/22/h/new-golang-ransomware-agenda-customizes-attacks.html
6¡¢Î¢Èí͸¶APT29ʹÓÃеÄMagicWebÐ®ÖÆADFSµÄ¹¥»÷Ô˶¯
8ÔÂ24ÈÕ£¬Î¢ÈíÐû²¼Á˹ØÓÚ¶íÂÞ˹APT29½üÆÚ¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£¹¥»÷ÖÐʹÓõÄжñÒ⹤¾ßMagicWebÊÇFoggyWebµÄÑݱ䣬¿ÉÓÃÀ´ÇÔÈ¡±»Ñ¬È¾µÄActive DirectoryÍŽá·þÎñ(ADFS)·þÎñÆ÷µÄÉèÖÃÊý¾Ý¿â£¬½âÃÜÁîÅÆÊðÃûºÍÁîÅÆ½âÃÜÖ¤Ê飬²¢Í¨¹ýC2·þÎñÆ÷»ñÈ¡ÆäËüµÄpayload¡£MagicWeb¿É½«ADFSʹÓõÄÕýµ±DLLÌæ»»Îª¶ñÒâµÄ°æ±¾£¬À´²Ù¿ØÓû§Éí·ÝÑéÖ¤Ö¤Êé²¢Ð޸ı»Ñ¬È¾·þÎñÆ÷ÌìÉúµÄÁîÅÆÖÐת´ïµÄÉùÃ÷¡£MagicWeb¿ÉÒÔ×ÊÖúAPT29ÔÚWindowsÖÐÒÔËùÓÐÓû§µÄÉí·ÝµÇ¼¡£
https://www.microsoft.com/security/blog/2022/08/24/magicweb-nobeliums-post-compromise-trick-to-authenticate-as-anyone/


¾©¹«Íø°²±¸11010802024551ºÅ