ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷

Ðû²¼Ê±¼ä 2022-02-25

ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷


¾ÝýÌå2ÔÂ23Èճƣ¬£¬£¬ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙ´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷¡£¡£¡£´Ë´ÎÊܵ½¹¥»÷µÄ×éÖ¯°üÀ¨ÎÚ¿ËÀ¼Íâ½»²¿¡¢¹ú·À²¿¡¢ÄÚÕþ²¿¡¢Çå¾²¾ÖºÍÄڸ󣬣¬£¬ÒÔ¼°ÎÚ¿ËÀ¼×î´óµÄÒøÐÐPrivatbankºÍ¹ú¼Ò´¢±¸ÒøÐÐOschadbank¡£¡£¡£ÎÚ¿ËÀ¼SSSCIPÌåÏÖ£¬£¬£¬¹¥»÷»î¶¯µ¼Ö²¿·Öϵͳ²»¿ÉÓûòÖ»Äܶ϶ÏÐøÐøµØÊÂÇ飬£¬£¬ËûÃÇÕýÔÚÆð¾¢Ó¦¶Ô¹¥»÷²¢ÍøÂçÆÊÎöÐÅÏ¢¡£¡£¡£ÉÏÖÜ£¬£¬£¬ÎÚ¿ËÀ¼µÄ¶à¸öÕþ¸®»ú¹¹ºÍÒøÐÐÔøÔâµ½DDoS¹¥»÷¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ukrainian-government-and-banks-once-again-hit-by-ddos-attacks/


DevOpsÔÚ¹Ù·½NPM¿âÖз¢Ã÷25¸ö¶ñÒâµÄJavaScript¿â


¾ÝýÌå2ÔÂ22ÈÕ±¨µÀ£¬£¬£¬Çå¾²¹«Ë¾DevOpsÔÚ¹Ù·½NPM¿âÖз¢Ã÷ÁË25¸ö¶ñÒâµÄJavaScript¿â¡£¡£¡£ÕâЩ¶ñÒâµÄ¿âαװ³ÉÕýµ±Èí¼þ°ü£¬£¬£¬ÀýÈçcolors.js¡¢crypto-js¡¢discord.js¡¢marked ºÍnoblox.jsµÈ£¬£¬£¬Ä¿µÄÊÇ´ÓÄ¿µÄϵͳÖÐÇÔÈ¡DiscordÁîÅÆºÍÇéÐαäÁ¿¡£¡£¡£ÏÖÔÚ£¬£¬£¬ÕâЩJavaScript¿âÒѱ»É¾³ý¡£¡£¡£ÔçÔÚ2021Äê12Ô·ݣ¬£¬£¬Ñо¿Ö°Ô±¾ÍÔÚNPM¿âÖз¢Ã÷²¢É¾³ýÁË17¸öÀàËÆµÄ¶ñÒâ°ü¡£¡£¡£  


https://thehackernews.com/2022/02/25-malicious-javascript-libraries.html


ÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÉèÖùýʧй¶200GBÊý¾Ý


SafetyDetectivesÔÚ2ÔÂ21ÈÕ͸¶£¬£¬£¬¶ùͯ´ò°çÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÉèÖùýʧ¡£¡£¡£´Ë´Îй¶Á˶à´ï200 GBµÄ½ü200Íò¸öÎļþ£¬£¬£¬Éæ¼°Ô¼20Íò¸öÓû§¡£¡£¡£Ñо¿Ö°Ô±×ܹ²·¢Ã÷ÁË3¸öÊý¾Ý¼¯£¬£¬£¬¹ØÓÚ¿Í»§µÄ¹ºÖÃÐÅÏ¢¡¢Æ«ºÃºÍÔ¸ÍûÇåµ¥£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢ÓʼþµØµã¡¢Ö§¸¶·½·¨ºÍËÍ»õÐÅÏ¢µÈ¡£¡£¡£¸Ã´æ´¢¿âÓÚ2021Äê11ÔÂ12ÈÕ±»·¢Ã÷£¬£¬£¬Ö±µ½2022Äê2ÔÂ18ÈղŻñµÃ± £»£»£»¤¡£¡£¡£


https://www.hackread.com/kids-luxury-clothing-store-melijoe-data-exposed/


SonarSource·¢Ã÷Horde WebmailÖб£´æ9ÄêµÄXSSÎó²î


SonarSourceÔÚ2ÔÂ22ÈÕÅû¶ÁËHorde WebmailÖÐ×Ô2012Äêµ×Ò»Ö±±£´æµÄXSSÎó²îµÄϸ½Ú¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý¶ñÒâOpenOfficeÎĵµÊ¹ÓøÃÎó²î£¬£¬£¬µ±Horde½«Æäת»»ÎªXHTMLÔ¤ÀÀʱ£¬£¬£¬¾Í»áÖ´ÐиÃÎĵµÖеĶñÒâJavaScript£¬£¬£¬´Ó¶øµ¼Ö´洢ÐÍXSS¹¥»÷¡£¡£¡£Òò´Ë£¬£¬£¬¸ÃÎó²î¿ÉÓÃÀ´Ð®ÖÆÓû§µÄÓʼþÕÊ»§£¬£¬£¬ÉõÖÁÊÇ¿ØÖÆÕû¸öÓʼþЧÀÍÆ÷¡£¡£¡£×îºó£¬£¬£¬Ñо¿Ö°Ô±»¹ÌṩÁËÓйØÔõÑù»º½â´ËÎó²îµÄ½¨Òé¡£¡£¡£


https://therecord.media/unpatched-bug-allows-takeover-of-horde-webmail-accounts-servers/


ÎÚ¿ËÀ¼¾¯·½µ·»ÙÒ»¸öÍøÂç´¹ÂÚÍŻﲢ¾Ð²¶5Ãû³ÉÔ±


¾Ý2ÔÂ22ÈÕ±¨µÀ£¬£¬£¬ÎÚ¿ËÀ¼¾¯·½ÆÆ»ñÁËÒ»¸öÍøÂç´¹ÂÚÍŻﲢ¾Ð²¶ÁËÆä5Ãû³ÉÔ±¡£¡£¡£¸ÃÍÅ»ïÓµÓÐ40¶à¸ö´¹ÂÚÍøÕ¾£¬£¬£¬¹¥»÷ÁËÖÁÉÙ70000¶à¸öÄ¿µÄ²¢ÀÖ³ÉÇÔÈ¡ÁËËûÃǵÄÖ§¸¶¿¨ÐÅÏ¢¡£¡£¡£¾¯·½Ô¤¼Æ¸ÃÍÅ»ï×ܹ²Ôì³É500Íò¸ñÀï·òÄÉ£¨175000ÃÀÔª£©µÄ¾­¼ÃËðʧ£¬£¬£¬ÏÖÔÚûÊÕÁËÆä200Íò¸ñÀï·òÄÉ¡£¡£¡£±»¾Ð²¶µÄÏÓÒÉÈËÃæÁÙÎÚ¿ËÀ¼¡¶ÐÌ·¨¡·µÚ361ÌõµÚ2²¿·ÖºÍµÚ190ÌõµÚ3²¿·ÖµÄÐÌÊÂÖ¸¿Ø£¬£¬£¬×î¸ß¿ÉÅд¦8Äêî¿Ïµ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/police-bust-phishing-group-that-used-40-sites-to-steal-credit-cards/


ProofpointÐû²¼2021ÄêÍøÂç´¹ÂÚÌ¬ÊÆµÄÆÊÎö±¨¸æ


2ÔÂ22ÈÕ£¬£¬£¬ProofpointÐû²¼ÁË2021ÄêÍøÂç´¹ÂÚÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬È¥ÄêÁè¼Ý91%µÄÓ¢¹ú×éÖ¯±»´¹ÂÚ¹¥»÷ÈëÇÖ£¬£¬£¬78%µÄ×éÖ¯³ÉΪ»ùÓÚÓʼþµÄÀÕË÷¹¥»÷µÄÄ¿µÄ£¬£¬£¬77%µÄ×éÖ¯Ôâµ½BEC¹¥»÷£¨Í¬±ÈÔöÌí18%£©¡£¡£¡£Ñ¬È¾ÀÕË÷Èí¼þµÄ×éÖ¯ÖУ¬£¬£¬60%Ö§¸¶ÁËÊê½ð£¬£¬£¬32%»¹ÌØÊâÖ§¸¶ÁË×ʽðÒÔÖØ»ñ¶ÔÊý¾ÝºÍϵͳµÄ»á¼ûȨÏÞ¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬¹¥»÷µÄÊýÄ¿ºÍÀÖ³ÉÂʵÄÔöÌíÓëתÏò»ìÏýÊÂÇéģʽÓйأ¬£¬£¬È¥ÄêÓдó×ÚÔ±¹¤¾ÙÐÐÔ¶³Ì°ì¹«£¬£¬£¬µ«Ö»ÓÐÉÙÊý×éÖ¯¶ÔÔ±¹¤¾ÙÐÐÔ¶³ÌÊÂÇéµÄÇå¾²½ÌÓý¡£¡£¡£


https://www.proofpoint.com/us/resources/threat-reports/state-of-phish



Çå¾²¹¤¾ß


Jatayu


ÒþÉí×ÔÁ¦PHP Web Shell£¬£¬£¬»ùÓÚHttp±êÍ·µÄÉí·ÝÑéÖ¤¡£¡£¡£


https://github.com/SpiderMate/Jatayu


Chain Reactor


ÊÇÒ»¸ö¿ªÔ´¹¤¾ß£¬£¬£¬ÓÃÓÚÔÚLinux»úеÉϲâÊÔ¼ì²âºÍÏìÓ¦ÁýÕÖÂÊ¡£¡£¡£


https://github.com/redcanaryco/chain-reactor


Boko


ÊÊÓÃÓÚmacOSµÄÓ¦ÓóÌÐòɨÃè³ÌÐò£¬£¬£¬ÓÃÓÚËÑË÷ºÍʶ±ðDZÔÚdylibÐ®ÖÆºÍÈõdylibÎó²î£¬£¬£¬ÒÔ¼°Ó¦ÓÿÉÄܱ»ºóÃÅ»á¼ûµÄ¾ç±¾¡£¡£¡£


https://github.com/bashexplode/boko


Android Disassembler


ÊÇÒ»¿îÄܹ»ÆÊÎö¶àÖÖÀàÐÍÎļþµÄÓ¦ÓóÌÐò£¬£¬£¬ÆÊÎöÊÖ»úÉϵĶñÒâÓ¦Óᣡ£¡£


https://github.com/KYHSGeekCode/Android-Disassembler


fastfinder


ÇáÁ¿¼¶¹¤¾ß£¬£¬£¬ÓÃÓÚÔÚ Windows ºÍ Linux ƽ̨ÉϾÙÐÐÍþв׷×Ù¡¢ÊµÊ±È¡Ö¤ºÍ·ÖÀà¡£¡£¡£


https://github.com/codeyourweb/fastfinder/



Çå¾²ÆÊÎö


GitHubÏòÉçÇø¿ª·ÅÇå¾²Êý¾Ý¿â


https://www.darkreading.com/application-security/github-opens-security-database-to-community-contributions


¹È¸èä¯ÀÀÆ÷ÔÊÐíÓû§ÔÚÉúÑĵÄÃÜÂëÖÐÌí¼Ó×¢ÊÍ


https://www.bleepingcomputer.com/news/google/google-chrome-to-allow-users-to-add-notes-to-saved-passwords/


д¹ÂÚÒªÁìʹÓÃÔ¶³Ì»á¼ûÈí¼þÈÆ¹ýMFA


https://www.bleepingcomputer.com/news/security/devious-phishing-method-bypasses-mfa-using-remote-access-software/


Áª°îÁãÐÅÈÎÕ½ÂÔºÍMicrosoftµÄ°²ÅÅÖ¸ÄÏ


https://www.microsoft.com/security/blog/2022/02/22/the-federal-zero-trust-strategy-and-microsofts-deployment-guidance-for-all/


ÌÀ¼Óº£µ×µçÀÂÐÞ¸´£¬£¬£¬Åç·¢ºó»¥ÁªÍøÖÕÓÚ»Ö¸´


https://therecord.media/tonga-submarine-cable-repaired-restoring-internet-after-eruption/


ASEC×î½ü·¢Ã÷αװ³É Microsoft µÄ´¹ÂÚÓʼþÔöÌí


https://asec.ahnlab.com/en/31994/