·áÌïÒâ´óÀû¹«Ë¾ÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞй¶³¤´ïÒ»Äê°ë
Ðû²¼Ê±¼ä 2023-03-301¡¢·áÌïÒâ´óÀû¹«Ë¾ÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞй¶³¤´ïÒ»Äê°ë
ýÌå3ÔÂ29ÈÕ±¨µÀ³Æ£¬·áÌïÒâ´óÀû¹«Ë¾ÒâÍâй¶ÁËÆäÓªÏú¹¤¾ßµÄ»á¼ûȨÏÞ¡£2ÔÂ14ÈÕ£¬CybernewsÍŶÓÔÚ·áÌïÒâ´óÀû¹Ù·½ÍøÕ¾ÉÏ·¢Ã÷ÁËÒ»¸öÇéÐÎÎļþ(.env)¡£Ëü¹ûÕæÁËÆäSalesforce Marketing CloudºÍMapbox APIµÄƾ֤£¬¹¥»÷Õß¿ÉÄÜ»áÀÄÓôËÐÅÏ¢À´»ñÈ¡·áÌï¿Í»§µÄµç»°ºÅÂëºÍÓʼþµØµãµÈÐÅÏ¢£¬²¢Ö´Ðд¹ÂÚ¹¥»÷¡£¸ÃÇéÐÎÎļþÓÚ2021Äê5ÔÂ21ÈÕÊ״α»IoTËÑË÷ÒýÇæ±àÈëË÷Òý£¬ÕâÒâζ×ÅËüÒѹûÕæÁËÒ»Äê°ëÒÔÉÏ¡£ÏÖÔÚ£¬Ð¹Â¶Êý¾ÝÒѾ±»±£»¤ÆðÀ´¡£
https://cybernews.com/security/toyota-customer-data-leak/
2¡¢QNAPÐû²¼¸üУ¬ÐÞ¸´ÆäNAS×°±¸ÖеÄSudoÌáȨÎó²î
¾Ý3ÔÂ29ÈÕ±¨µÀ£¬QNAPÐÞ¸´ÁË»ùÓÚLinuxµÄÍøÂ總¼Ó´æ´¢(NAS)×°±¸ÖеÄSudoÌáȨÎó²î¡£¸ÃÎó²î×·×ÙΪCVE-2023-22809£¬±»ÐÎòΪ¡°ÔÚSudo1.9.12p1°æ±¾ÖÐʹÓÃsudoeditÊ±ÈÆ¹ýsudoersÕ½ÂÔ¡±¡£ÀÖ³ÉʹÓøÃÎó²î£¬¹¥»÷Õß¿ÉÒÔͨ¹ý½«í§ÒâÌõÄ¿Ìí¼Óµ½Òª´¦Öóͷ£µÄÎļþÁбíºó±à¼Î´¾ÊÚȨµÄÎļþÀ´ÌáÉýȨÏÞ¡£¸Ã¹«Ë¾ÒѾ½â¾öÁËQTSºÍQuTS heroƽ̨ÖеÄÎó²î£¬²¢ÔÚÆð¾¢ÌṩQuTScloudºÍQVPÇå¾²¸üС£
https://www.bleepingcomputer.com/news/security/qnap-warns-customers-to-patch-linux-sudo-flaw-in-nas-devices/
3¡¢ÃÀ¹ú¹ºÕ®¹«Ë¾NCBÔâµ½¹¥»÷½ü50Íò¿Í»§µÄ²ÆÎñÐÅϢй¶
¾ÝýÌå3ÔÂ29ÈÕ±¨µÀ£¬ÃÀ¹ú¹ºÕ®¹«Ë¾NCB Management ServicesÔâµ½¹¥»÷£¬½ü50Íò¿Í»§µÄ²ÆÎñÐÅϢй¶¡£NCBÓÚ2ÔÂ4ÈÕ·¢Ã÷£¬Î´¾ÊÚȨµÄµÚÈý·½ÓÚ2ÔÂ1ÈÕ»ñµÃÁËNCBϵͳµÄ»á¼ûȨÏÞ£¬²¢ÓÚ3ÔÂ8ÈÕÈ·ÈϿͻ§ÓëÃÀ¹úÒøÐÐÐÅÓÿ¨ÕË»§Ïà¹ØµÄһЩÐÅϢй¶¡£¸ÃÊÂÎñÉæ¼°494969È˵ÄÐÕÃû¡¢¼ÝÕÕºÅÂë¡¢Éç»áÇå¾²ºÅÂë¡¢ÐÅÓÿ¨ºÅÂ롢·ÓɺÅÂë¡¢ÕË»§Óà¶îºÍÕË»§×´Ì¬µÈ¡£ÃÀ¹úÒøÐн«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩExperian IdentityWorksSMÁ½ÄêµÄÉí·Ý͵ÇÔ±£»¤·þÎñ¡£
https://therecord.media/debt-buyer-cyberattack-data-breach
4¡¢ÐÂAPT43ÔÚÒÑÍùµÄ5ÄêÖÐÒ»Ö±¹¥»÷Î÷Å·ÈÕº«µÈµØÇøµÄ×éÖ¯
3ÔÂ28ÈÕ±¨µÀ³Æ£¬Ð·¢Ã÷µÄºÚ¿ÍÍÅ»ïAPT43×Ô2018ÄêÒÔÀ´Ò»Ö±Õë¶ÔÃÀ¹ú¡¢Å·ÖÞ¡¢ÈÕ±¾ºÍº«¹úµÄÕþ¸®¡¢Ñ§ÊõºÍÖÇÄÒÍÅÏà¹Ø×éÖ¯¡£APT43ʹÓÃÓã²æÊ½´¹ÂÚÓʼþÀ´ÇÔȡĿµÄµÄÕÊ»§Æ¾Ö¤£¬È»ºóÒÔÄ¿µÄÈËÎïµÄÉí·ÝµÇ¼²¢×ÔÐÐÖ´ÐÐÇé±¨ÍøÂç¡£APT43»¹Ê¹ÓöñÒâAndroidÓ¦Óã¬Õë¶Ô¼ÓÃÜÇ®±ÒÁìÓò¡£Mandiant±¨¸æËµ£¬ÆäËûÑо¿Ö°Ô±ÔÚÒÑÍùÔø·¢Ã÷ÁËAPT43Ô˶¯£¬µ«Í¨³£½«Æä¹éÒòÓÚKimsuky»òThalium¡£
https://www.mandiant.com/resources/reports/apt43-north-korea-cybercrime-espionage
5¡¢´ó×ÚľÂí»¯Torä¯ÀÀÆ÷×°ÖóÌÐòÕë¶Ô¶íÂÞ˹ºÍ¶«Å·µØÇø
3ÔÂ28ÈÕ£¬Kaspersky³ÆÆä·¢Ã÷ÁË´ó×ÚľÂí»¯Torä¯ÀÀÆ÷×°ÖóÌÐò£¬Ö÷ÒªÕë¶Ô¶íÂÞ˹ºÍ¶«Å·µØÇø¡£ÕâЩװÖóÌÐò°üÀ¨Ò»¸ö±ê×¼°æ±¾µÄTorä¯ÀÀÆ÷£¬ÒÔ¼°Ò»¸öÌØÁíÍâ¿ÉÖ´ÐÐÎļþ£¬Òþ²ØÔÚÊÜÃÜÂë±£»¤µÄRARÖС£Torä¯ÀÀÆ÷ÔÚǰ̨Æô¶¯Ê±£¬¸ÃÎļþÔÚºǫ́ÌáÈ¡¶ñÒâÈí¼þ¡£¸Ã¶ñÒâÈí¼þ»á¼àÊÓ¼ôÌù°åÖпÉʶ±ðµÄ¼ÓÃÜÇ®°üµØµã£¬²¢ÔÚ¼ì²âµ½Ê±½«ÆäÌæ»»Îª¹¥»÷ÕߵļÓÃÜÇ®±ÒµØµã¡£ÔÚ2022Äê8ÔÂÖÁ2023Äê2ÔÂʱ´ú£¬Ñо¿Ö°Ô±ÔÚ52¸ö¹ú¼Ò/µØÇø¼ì²âµ½16000¸ö´ËÀàTor×°ÖóÌÐòµÄ±äÌå¡£
https://securelist.com/copy-paste-heist-clipboard-injector-targeting-cryptowallets/109186/
6¡¢µçÐŹ«Ë¾LumenÅû¶Æä½üÆÚÔâµ½µÄÁ½Æð¹¥»÷ÊÂÎñµÄÏêÇé
3ÔÂ28ÈÕ±¨µÀ£¬µçÐŹ«Ë¾Lumen TechnologiesÅû¶ÁËÆä½üÆÚÔâµ½µÄÁ½Æð¹¥»÷ÊÂÎñ¡£Ê×ÏÈ£¬¸Ã¹«Ë¾ÔÚÉÏÖÜ·¢Ã÷Æä²¿·ÖÖ§³Ö·Ö¶ÎÍйܷþÎñµÄ·þÎñÆ÷ѬȾÁËÀÕË÷Èí¼þ¡£ÔÚ·¢Ã÷ÀÕË÷¹¥»÷ºó£¬¸Ã¹«Ë¾¼Ó¹ÌÁËÇå¾²Èí¼þ²¢·¢Ã÷ÁËÁíÒ»Æð¹¥»÷ÊÂÎñ¡£ÔÚÕâµÚ¶þ´ÎÊÂÎñÖУ¬¹¥»÷ÕßÈëÇÖÁ˹«Ë¾µÄÄÚ²¿ÐÅÏ¢ÊÖÒÕϵͳ£¬×°ÖöñÒâÈí¼þ²¢ÇÔÈ¡Êý¾Ý¡£LumenÒѽ«´ËÊÂִ֪ͨ·¨²¿·Ö£¬²¢ÏòÊÜÓ°ÏìµÄ¿Í»§±¨¸æÁËÕâÒ»ÊÂÎñ¡£
https://securityaffairs.com/144113/hacking/lumen-suffered-ransomware-attack.html


¾©¹«Íø°²±¸11010802024551ºÅ