ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷

Ðû²¼Ê±¼ä 2022-02-25

ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷


¾ÝýÌå2ÔÂ23ÈÕ³Æ £¬ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙ´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷ ¡£´Ë´ÎÊܵ½¹¥»÷µÄ×éÖ¯°üÂÞÎÚ¿ËÀ¼Íâ½»²¿¡¢¹ú·À²¿¡¢ÄÚÕþ²¿¡¢Äþ¾²¾ÖºÍÄÚ¸ó £¬ÒÔ¼°ÎÚ¿ËÀ¼×î´óµÄÒøÐÐPrivatbankºÍ¹ú¼Ò´¢ÐîÒøÐÐOschadbank ¡£ÎÚ¿ËÀ¼SSSCIPÌåÏÖ £¬¹¥»÷»î¶¯µ¼Ö²¿ÃÅϵͳ²»ÐÐÓûòÖ»Äܶ϶ÏÐøÐøµØÊÂÇé £¬ËûÃÇÕýÔÚŬÁ¦Ó¦¶Ô¹¥»÷²¢ÊÕ¼¯·ÖÎöÐÅÏ¢ ¡£ÉÏÖÜ £¬ÎÚ¿ËÀ¼µÄ¶à¸öÕþ¸®»ú¹¹ºÍÒøÐÐÔøÔâµ½DDoS¹¥»÷ ¡£


https://www.bleepingcomputer.com/news/security/ukrainian-government-and-banks-once-again-hit-by-ddos-attacks/


DevOpsÔÚ¹Ù·½NPM¿âÖз¢ÏÖ25¸ö¶ñÒâµÄJavaScript¿â


¾ÝýÌå2ÔÂ22ÈÕ±¨µÀ £¬Äþ¾²¹«Ë¾DevOpsÔÚ¹Ù·½NPM¿âÖз¢ÏÖÁË25¸ö¶ñÒâµÄJavaScript¿â ¡£ÕâЩ¶ñÒâµÄ¿âαװ³ÉºÏ·¨Èí¼þ°ü £¬ÀýÈçcolors.js¡¢crypto-js¡¢discord.js¡¢marked ºÍnoblox.jsµÈ £¬Ä¿µÄÊÇ´ÓÄ¿±êϵͳÖÐÇÔÈ¡DiscordÁîÅÆºÍ»·¾³±äÁ¿ ¡£Ä¿Ç° £¬ÕâЩJavaScript¿âÒѱ»É¾³ý ¡£ÔçÔÚ2021Äê12Ô·Ý £¬Ñо¿ÈËÔ±¾ÍÔÚNPM¿âÖз¢ÏÖ²¢É¾³ýÁË17¸öÀàËÆµÄ¶ñÒâ°ü ¡£  


https://thehackernews.com/2022/02/25-malicious-javascript-libraries.html


ÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÅäÖôíÎóй¶200GBÊý¾Ý


SafetyDetectivesÔÚ2ÔÂ21ÈÕ͸¶ £¬¶ùͯ·þ×°ÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÅäÖôíÎó ¡£´Ë´Îй¶Á˶à´ï200 GBµÄ½ü200Íò¸öÎļþ £¬Éæ¼°Ô¼20Íò¸öÓû§ ¡£Ñо¿ÈËÔ±×ܹ²·¢ÏÖÁË3¸öÊý¾Ý¼¯ £¬¹ØÓÚ¿Í»§µÄ¹ºÖÃÐÅÏ¢¡¢Æ«ºÃºÍÔ¸ÍûÇåµ¥ £¬°üÂÞÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢ÓʼþµØÖ·¡¢Ö§¸¶·½Ê½ºÍËÍ»õÐÅÏ¢µÈ ¡£¸Ã´æ´¢¿âÓÚ2021Äê11ÔÂ12ÈÕ±»·¢ÏÖ £¬Ö±µ½2022Äê2ÔÂ18Èղŵõ½± £»¤ ¡£


https://www.hackread.com/kids-luxury-clothing-store-melijoe-data-exposed/


SonarSource·¢ÏÖHorde WebmailÖдæÔÚ9ÄêµÄXSS©¶´


SonarSourceÔÚ2ÔÂ22ÈÕÅû¶ÁËHorde WebmailÖÐ×Ô2012Äêµ×Ò»Ö±´æÔÚµÄXSS©¶´µÄϸ½Ú ¡£Ñо¿ÈËÔ±³Æ £¬¹¥»÷Õß¿ÉÒÔͨ¹ý¶ñÒâOpenOfficeÎĵµÀûÓøÃ©¶´ £¬µ±Horde½«Æäת»»ÎªXHTMLÔ¤ÀÀʱ £¬¾Í»áÖ´ÐиÃÎĵµÖеĶñÒâJavaScript £¬´Ó¶øµ¼Ö´洢ÐÍXSS¹¥»÷ ¡£Òò´Ë £¬¸Ã©¶´¿ÉÓÃÀ´½Ù³ÖÓû§µÄÓʼþÕÊ»§ £¬ÉõÖÁÊÇ¿ØÖÆÕû¸öÓʼþ·þÎñÆ÷ ¡£×îºó £¬Ñо¿ÈËÔ±»¹ÌṩÁËÓйØÈçºÎ»º½â´Ë©¶´µÄ½¨Òé ¡£


https://therecord.media/unpatched-bug-allows-takeover-of-horde-webmail-accounts-servers/


ÎÚ¿ËÀ¼¾¯·½µ·»ÙÒ»¸öÍøÂçµöÓãÍŻﲢ´þ²¶5Ãû³ÉÔ±


¾Ý2ÔÂ22ÈÕ±¨µÀ £¬ÎÚ¿ËÀ¼¾¯·½ÆÆ»ñÁËÒ»¸öÍøÂçµöÓãÍŻﲢ´þ²¶ÁËÆä5Ãû³ÉÔ± ¡£¸ÃÍÅ»ïÓµÓÐ40¶à¸öµöÓãÍøÕ¾ £¬¹¥»÷ÁËÖÁÉÙ70000¶à¸öÄ¿±ê²¢ÀÖ³ÉÇÔÈ¡ÁËËûÃǵÄÖ§¸¶¿¨ÐÅÏ¢ ¡£¾¯·½Ô¤¼Æ¸ÃÍÅ»ï×ܹ²Ôì³É500Íò¸ñÀï·òÄÉ£¨175000ÃÀÔª£©µÄ¾­¼ÃËðʧ £¬Ä¿Ç°Ã»ÊÕÁËÆä200Íò¸ñÀï·òÄÉ ¡£±»´þ²¶µÄÏÓÒÉÈËÃæÁÙÎÚ¿ËÀ¼¡¶ÐÌ·¨¡·µÚ361ÌõµÚ2²¿Ãź͵Ú190ÌõµÚ3²¿ÃŵÄÐÌÊÂÖ¸¿Ø £¬×î¸ß¿ÉÅд¦8Äê¼à½û ¡£


https://www.bleepingcomputer.com/news/security/police-bust-phishing-group-that-used-40-sites-to-steal-credit-cards/


ProofpointÐû²¼2021ÄêÍøÂçµöÓãÌ¬ÊÆµÄ·ÖÎö³ÂËß


2ÔÂ22ÈÕ £¬ProofpointÐû²¼ÁË2021ÄêÍøÂçµöÓãÌ¬ÊÆµÄ·ÖÎö³ÂËß ¡£³ÂËßÖ¸³ö £¬È¥ÄêÁè¼Ý91%µÄÓ¢¹ú×éÖ¯±»µöÓã¹¥»÷ÈëÇÖ £¬78%µÄ×éÖ¯³ÉΪ»ùÓÚÓʼþµÄÀÕË÷¹¥»÷µÄÄ¿±ê £¬77%µÄ×éÖ¯Ôâµ½BEC¹¥»÷£¨Í¬±ÈÔö³¤18%£© ¡£Ñ¬È¾ÀÕË÷Èí¼þµÄ×éÖ¯ÖÐ £¬60%Ö§¸¶ÁËÊê½ð £¬32%»¹ÌرðÖ§¸¶ÁË×ʽðÒÔÖØ»ñ¶ÔÊý¾ÝºÍϵͳµÄ·ÃÎÊȨÏÞ ¡£Ñо¿ÈËÔ±ÈÏΪ £¬¹¥»÷µÄÊýÁ¿ºÍÀÖ³ÉÂʵÄÔö¼ÓÓëתÏò»ìºÏÊÂÇéģʽÓйØ £¬È¥ÄêÓдóÁ¿Ô±¹¤½øÐÐÔ¶³Ì°ì¹« £¬µ«Ö»ÓÐÉÙÊý×éÖ¯¶ÔÔ±¹¤½øÐÐÔ¶³ÌÊÂÇéµÄÄþ¾²½ÌÓý ¡£


https://www.proofpoint.com/us/resources/threat-reports/state-of-phish



Äþ¾²¹¤¾ß


Jatayu


ÒþÉí¶ÀÁ¢PHP Web Shell £¬»ùÓÚHttp±êÍ·µÄÉí·ÝÑéÖ¤ ¡£


https://github.com/SpiderMate/Jatayu


Chain Reactor


ÊÇÒ»¸ö¿ªÔ´¹¤¾ß £¬ÓÃÓÚÔÚLinux»úÆ÷ÉϲâÊÔ¼ì²âºÍÏìÓ¦ÁýÕÖÂÊ ¡£


https://github.com/redcanaryco/chain-reactor


Boko


ÊÊÓÃÓÚmacOSµÄÓ¦Ó÷¨Ê½É¨Ã跨ʽ £¬ÓÃÓÚËÑË÷ºÍʶ±ðDZÔÚdylib½Ù³ÖºÍÈõdylib©¶´ £¬ÒÔ¼°Ó¦ÓÿÉÄܱ»ºóÃÅ·ÃÎʵĽű¾ ¡£


https://github.com/bashexplode/boko


Android Disassembler


ÊÇÒ»¿îÄܹ»·ÖÎö¶àÖÖÀàÐÍÎļþµÄÓ¦Ó÷¨Ê½ £¬·ÖÎöÊÖ»úÉϵĶñÒâÓ¦Óà ¡£


https://github.com/KYHSGeekCode/Android-Disassembler


fastfinder


ÇáÁ¿¼¶¹¤¾ß £¬ÓÃÓÚÔÚ Windows ºÍ Linux ƽ̨ÉϽøÐÐÍþв׷×Ù¡¢ÊµÊ±È¡Ö¤ºÍ·ÖÀà ¡£


https://github.com/codeyourweb/fastfinder/



Äþ¾²·ÖÎö


GitHubÏòÉçÇø¿ª·ÅÄþ¾²Êý¾Ý¿â


https://www.darkreading.com/application-security/github-opens-security-database-to-community-contributions


¹È¸èä¯ÀÀÆ÷ÔÊÐíÓû§ÔÚÉú´æµÄÃÜÂëÖÐÌí¼Ó×¢ÊÍ


https://www.bleepingcomputer.com/news/google/google-chrome-to-allow-users-to-add-notes-to-saved-passwords/


еöÓãÒªÁìʹÓÃÔ¶³Ì·ÃÎÊÈí¼þÈÆ¹ýMFA


https://www.bleepingcomputer.com/news/security/devious-phishing-method-bypasses-mfa-using-remote-access-software/


Áª°îÁãÐÅÈÎÕ½ÂÔºÍMicrosoftµÄ²¿ÊðÖ¸ÄÏ


https://www.microsoft.com/security/blog/2022/02/22/the-federal-zero-trust-strategy-and-microsofts-deployment-guidance-for-all/


ÌÀ¼Óº£µ×µçÀÂÐÞ¸´ £¬Åç·¢ºó»¥ÁªÍøÖÕÓÚ»Ö¸´


https://therecord.media/tonga-submarine-cable-repaired-restoring-internet-after-eruption/


ASEC×î½ü·¢ÏÖαװ³É Microsoft µÄµöÓãÓʼþÔö¼Ó


https://asec.ahnlab.com/en/31994/