Ñо¿ÍŶӷ¢ÏÖ¡®keep¡®µÈPyPI°üÖдæÔÚÇÔÈ¡ÃÜÂëµÄľÂí

Ðû²¼Ê±¼ä 2022-06-14

1¡¢Ñо¿ÍŶӷ¢ÏÖ'keep'µÈPyPI°üÖдæÔÚÇÔÈ¡ÃÜÂëµÄľÂí


¾ÝýÌå6ÔÂ12ÈÕ±¨µÀ£¬Ñо¿ÍŶÓÔÚPyPI°ü¡°keep¡±¡¢¡°pyanxdns¡±ºÍ¡°api-res-py¡±Öз¢ÏÖÁ˺óÃÅ£¬ËüÃǶ¼Ê¹ÓÃÁ˶ñÒâÒÀÀµÏî¡°request¡±¡£ÌرðÊÇ¡°keep¡±°ü£¬Ã¿ÖܵÄÏÂÔØÁ¿¸ß´ï8000¶à´Î¡£ÆäÖдó²¿ÃŰ汾µÄ¡°keep¡±Ê¹ÓÃÁ˺Ϸ¨µÄPythonÄ£¿é¡°requests¡±£¬µ«¡°keep¡±v.1.2ʹÓÃÁËÆ´Ð´´íÎóµÄ¡°request¡±¡£¾­·ÖÎö£¬¶ñÒâµÄ¡°request¡±ÖаüÂÞÁ½¸öURL£¬ÆäÖÐÒ»¸öÖ¸ÏòÌṩRATµÄ¶ñÒâÈí¼þcheck.so£¬¶øÁíÒ»¸öÔòÖ¸Ïòx.pyx£¬°üÂÞ¿ÉÇÔÈ¡ä¯ÀÀÆ÷ÖеǼÃûºÍÃÜÂëµÄ¶ñÒâÈí¼þ¡£


https://www.bleepingcomputer.com/news/security/pypi-package-keep-mistakenly-included-a-password-stealer/


2¡¢Îڸɴï֤ȯ½»Ò×Ëù£¨USE£©Ð¹Â¶Áè¼Ý32 GBµÄÓû§ÐÅÏ¢


¾Ý6ÔÂ13ÈÕ±¨µÀ£¬ AnuragÔÚɨÃèShodanÉÏÅäÖôíÎóµÄÊý¾Ý¿â£¬·¢ÏÖÁËһ̨̻¶µÄ·þÎñÆ÷°üÂÞÁè¼Ý32GBµÄÊý¾Ý¡£¾­·ÖÎö£¬¸Ã·þÎñÆ÷ÊôÓÚÎڸɴï֤ȯ½»Ò×Ëù£¨USE£©µÄEasy Portal£¬ÕâÊÇÒ»¸öÔÚÏß·þÎñÃÅ»§£¬Óû§¿Éͨ¹ýÆä¼ì²ì¹ÉƱ¡¢±¨±íºÍ¼à¿ØÕË»§Óà¶î¡£´Ë´Îй¶µÄÐÅÏ¢°üÂÞÐÕÃû¡¢Óû§Ãû¡¢µØÖ·¡¢·ÃÎÊÁîÅÆ¡¢µç»°ºÅÂë¡¢Ã÷ÎÄÃÜÂëºÍÒøÐÐÏêϸÐÅÏ¢µÈ¡£ÎڸɴïÕþ¸®Ò»Ö±Î´¶Ô´ËÊÂ×÷³ö»ØÓ¦£¬µ«6ÔÂ12ÈÕ£¬Ì»Â¶µÄÊý¾Ý´Ó32 GB¼õÉÙµ½ÁËMBs¡£


https://www.hackread.com/scoop-uganda-security-exchange-leaking-sensitive-records/


3¡¢Ñо¿ÈËÔ±½ÒʾÈçºÎ¶ÔÀ¶ÑÀÐźŽøÐÐÖ¸ÎÆÊ¶±ðÀ´¸ú×ÙÊÖ»ú


ýÌå6ÔÂ10Èճƣ¬¼ÓÀû¸£ÄáÑÇ´óѧʥµØÑǸç·ÖУµÄ½øÐеÄÒ»ÏîÐÂÑо¿Ê״νÒʾÁËÀ¶ÑÀÐźſÉÒÔ±»Ö¸ÎÆÊ¶±ðÒÔ¸ú×ÙÖÇÄÜÊÖ»ú¡£¸ÃÒªÁìµÄºËÐÄÀûÓÃÀ¶ÑÀоƬ×éÓ²¼þµÄ©¶´£¬´Ó¶ø·¢Éú¡°ÆæÌصÄÎïÀí²ãÖ¸ÎÆ¡±¡£ÓÉÓÚÀ¶ÑÀµÍ¹¦ºÄ(BLE)ÐűêÎÞ´¦²»ÔÚ£¬ÏÖ´úÉ豸²»Í£´«ÊäÕâЩÐűêÀ´ÆôÓÃÒªº¦¹¦Ð§£¬Ê¹µÃ¹¥»÷³ÉΪ¿ÉÄÜ¡£ÁíÒ»·½Ã棬Ӳ¼þÖеÄ©¶´Ô´ÓÚWiFiºÍµÍ¹¦ºÄÀ¶ÑÀ×é¼þͨ³£¼¯³ÉÔÚÒ»Æð£¬¿ÉÒÔͨ¹ýÔØ²¨ÆµÂÊÆ«ÒƺÍIQÎÞÏßµçÐźŲ»Æ½ºâÀ´Éú³Éʶ±ðÖ¸ÎÆ¡£´ËÍ⣬ҪִÐÐÎïÀí²ãÖ¸ÎÆ¹¥»÷£¬±ØÐëÅ䱸»ùÓÚÈí¼þµÄÎÞÏßµçÐá̽Æ÷£¬ÕâÊÇÒ»ÖÖÄܹ»¼Ç¼ԭʼIQÎÞÏßµçÐźŵÄÎÞÏßµç½ÓÊÕÆ÷¡£


https://thehackernews.com/2022/06/researchers-find-bluetooth-signals-can.html


4¡¢MyEasyDocsÒò·þÎñÆ÷ÅäÖôíÎóй¶Áè¼Ý30 GBµÄÊý¾Ý


6ÔÂ9ÈÕ£¬vpnMentor³ÆÓ¡¶ÈMyEasyDocsµÄMicrosoft Azure·þÎñÆ÷ÅäÖôíÎó£¬Ð¹Â¶30.5 GBµÄÊý¾Ý¡£ÕâÊÇÒ»¸öÔÚÏßÎĵµÑé֤ƽ̨£¬Ö÷ÒªÓÃÓÚÑéÖ¤ÓëÒøÐС¢Ñ§Ôº¡¢´óѧ¡¢Õþ¸®»ú¹¹ºÍÖ´·¨»ú¹¹Ïà¹ØµÄÎļþ¡£´Ë´Îй¶ÁËÀ´×ÔÓ¡¶ÈºÍÒÔÉ«ÁеÄ57000¶à¸öѧÉúµÄ¸öÈËÐÅÏ¢ºÍ½ÌÓý¼Ç¼£¬°üÂÞÐÕÃû¡¢½á¹û¡¢Éí·ÝÖ¤ºÍ´óѧע²áºÅµÈ¡£Ì»Â¶µÄ·þÎñÆ÷ÓÚ2022Äê2ÔÂ2ÈÕÊ״α»·¢ÏÖ£¬ÓÚ2ÔÂ14ÈÕ±»±£»¤ÆðÀ´£¬Ê¼þµÄϸ½ÚÐÅÏ¢Ö±µ½6ÔÂ9Èղű»Åû¶¡£


https://www.hackread.com/myeasydocs-exposed-30gb-israel-india-students-pii-data/


5¡¢ÐµÄWannaFriendMeͨ¹ýÓÎϷƽ̨Robux³öÊÛÆä½âÃÜ·¨Ê½


6ÔÂ9ÈÕ£¬MalwareHunterTeamµÄÑо¿ÈËÔ±·¢ÏÖÁËÒ»¸öÃûΪ¡°WannaFriendMe¡±µÄÐÂÀÕË÷Èí¼þ¡£ËüÄ£·ÂÁËRyuk£¬µ«Êµ¼ÊÉÏÊÇChaosµÄ±äÖÖ¡£ÆäÓëÖÚ²îÒìÖ®´¦ÔÚÓÚ£¬ÒªÇóÄ¿±êʹÓÃRobux´ÓRobloxµÄGame PassÉ̵깺ÖýâÃÜÆ÷£¬¶ø²»ÊÇʹÓüÓÃÜ»õ±Ò×÷ΪÊê½ð¡£·ÃÎÊRoblox Game PassÉ̵êµÄURLʱ£¬¾Í¿ÉÒÔ¿´µ½ÃûΪ¡°iRazormind¡±µÄÓû§ÕýÔÚÒÔ1499 RobuxµÄ¼Û¸ñ³öÊÛ¡°Ryuk Decrypter¡±£¬×îºóÒ»´Î¸üÐÂÊÇÔÚ6ÔÂ5ÈÕ¡£µ«ÈκδóÓÚ2MBµÄÎļþ¶¼½«±»Ëæ»úÊý¾ÝÁýÕÖ£¬ÕâÒâζ׿´Ê¹Ä¿±ê¹ºÖÃÁ˽âÃÜÆ÷£¬Ò²Ö»Äָܻ´Ð¡ÓÚ2MBµÄÎļþ¡£Ä¿Ç°£¬RobloxÒÑɾ³ýÁËÏà¹ØÕÊ»§¡£


https://www.bleepingcomputer.com/news/security/roblox-game-pass-store-used-to-sell-ransomware-decryptor/


6¡¢ProofpointÐû²¼2022Äê¼ÓÃÜ»õ±Ò¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß


ProofpointÔÚ6ÔÂ9ÈÕÐû²¼Á˹ØÓÚ2022Äê¼ÓÃÜ»õ±Ò¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£³ÂËßÖ¸³ö£¬Õë¶Ô¼ÓÃÜ»õ±ÒµÄµöÓã¹¥»÷ƾ¾Ý»ù±¾Ô­Àí¿ÉÒÔ´óÖ·ÖΪÈýÀࣺ¼ÓÃÜ»õ±Òƾ֤ÊÕ¼¯¡¢¼ÓÃÜ»õ±ÒתÕËÇëÇóºÍÕë¶Ô¼ÓÃÜ»õ±ÒµÄÉÌÆ·ÇÔÈ¡¡£Í¨¹ýµöÓã»î¶¯½øÐеÄÁíÒ»ÖÖ·¸×ïÐÎʽÊÇBEC¹¥»÷£¬2022ÄêProofpoint»á¶¨ÆÚÊÓ²ìBECʵÑéÖеļÓÃÜ»õ±Ò×ªÒÆ£¬ÌåÏÖÈç¹ûûÓмÓÃÜ»õ±Ò£¬BEC·ÖÀàÖеÄÀÕË÷²¿ÃŲ»»áÏñ½ñÌìÕâÑùÀֳɡ£Proofpointƽ¾ùÿÌì»á×èÖ¹100Íò·âÀÕË÷Óʼþ£¬×î¸ßʱ¿É´ïÿÌì½ü200Íò·â£¬´ó¶àÊýÒªÇóÄ¿±êÓüÓÃÜ»õ±Ò¸¶¿î¡£


https://www.proofpoint.com/us/blog/threat-insight/how-cyber-criminals-target-cryptocurrency