ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÔÝʱÖÐÖ¹

Ðû²¼Ê±¼ä 2023-04-25

1¡¢ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÔÝʱÖÐÖ¹


¾ÝýÌå4ÔÂ21ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬ÃÀ¹úˮʦ³Ð°üÉÌFincantieri Marine Group(FMG)Ôâµ½ÀÕË÷¹¥»÷ £¬£¬£¬£¬£¬£¬Ó°ÏìÁËÆäµç×ÓÓʼþЧÀÍÆ÷ºÍ²¿·Öϵͳ¡£¡£¹¥»÷±¬·¢ÔÚ4ÔÂ12ÈÕÇåÔç £¬£¬£¬£¬£¬£¬¸ÃÔì´¬³§Í¸Â¶ £¬£¬£¬£¬£¬£¬¹¥»÷Õë¶ÔµÄЧÀÍÆ÷Ö÷ÒªÓÃÓÚÉúÑÄÏòÆäÅÌËã»úÊý¿ØÖÆÔì×°±¸ÌṩָÁîµÄÊý¾Ý £¬£¬£¬£¬£¬£¬µ¼ÖÂËüÃÇå´»úÊýÌì¡£¡£ÏÖÔÚûÓÐÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢Êܵ½Ó°Ïì¡£¡£ÃÀ¹úˮʦÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ £¬£¬£¬£¬£¬£¬FMGÒѽÓÄɲ½·¥¾ÙÐÐÏìÓ¦ £¬£¬£¬£¬£¬£¬Ë®Ê¦ÕýÔÚÆð¾¢¼àÊÓÕâЩÊÂÇé¡£¡£


https://www.infosecurity-magazine.com/news/us-navy-contractor-cyberattack/


2¡¢Ë¹Ì¹¸£µÈ¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢FortniteÀ¬»øÓʼþ


¾Ý4ÔÂ21ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬ÃÀ¹ú¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢±¤ÀÝÖ®Ò¹£¨Fortnite£©ºÍÀñÎ│À¬»øÓʼþ¡£¡£É漰˹̹¸£´óѧ¡¢ÂéÊ¡Àí¹¤Ñ§Ôº¡¢²®¿ËÀû´óѧºÍ¼ÓÖÝÀí¹¤Ñ§ÔºµÈ´óѧ £¬£¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾ËÆºõÔÚÔËÐÐTWiki»òMediaWiki¡£¡£ÕâЩwikiÒ³Ãæ¾Ý³ÆÊÇÓÉÀ¬»øÓʼþ·¢ËÍÕßÉÏ´«µÄ £¬£¬£¬£¬£¬£¬Éù³ÆÌṩÃâ·ÑÀñÎ│¡¢Fortnite BucksºÍ×÷±×Æ÷µÈ¡£¡£ËüÃÇ»á¼ÓÔØÎ±×°³ÉFortniteÒ³ÃæµÄ´¹ÂÚÍøÒ³ £¬£¬£¬£¬£¬£¬»òÔÊÐíÌṩÀñÎ│µÄÐéαµÄÊӲ졣¡£±ðµÄ £¬£¬£¬£¬£¬£¬¸Ã»î¶¯»¹Õë¶Ô°ÍÎ÷ijÖÝÕþ¸®µÄÒ»¸öСÐÍÍøÕ¾ £¬£¬£¬£¬£¬£¬ÒÔ¼°Å·Ã˵ÄEuropa.eu¡£¡£


https://www.bleepingcomputer.com/news/security/university-websites-using-mediawiki-twiki-hacked-to-serve-fortnite-spam/


3¡¢Infobloxͨ¹ýÒì³£DNSÁ÷Á¿¼ì²â·¢Ã÷еÄDecoy Dog


InfobloxÓÚ4ÔÂ20ÈÕ³Æ £¬£¬£¬£¬£¬£¬ËûÃÇÔÚ¼ì²âÒì³£DNSÁ÷Á¿ºó £¬£¬£¬£¬£¬£¬·¢Ã÷ÁËÒ»ÖÖеĶñÒâÈí¼þ¹¤¾ß°üDecoy Dog¡£¡£¸Ã¹¤¾ßÖ¼ÔÚ×ÊÖú¹¥»÷Õßͨ¹ýÕ½ÂÔÐÔµÄÓòÃûÀÏ»¯ºÍDNSÅÌÎÊÔËÔØÀ´Èƹý¼ì²â £¬£¬£¬£¬£¬£¬ÆäDNSÖ¸ÎÆÔÚ»¥ÁªÍøÉÏ3.7ÒÚ¸ö»îÔ¾ÓòÖм«ÎªÓÐÊý¡£¡£¶Ô¸Ã¹¤¾ß»ù´¡ÉèÊ©µÄÊӲ췢Ã÷Á˼¸¸öÓëͳһÐж¯ÓйصÄC2Óò £¬£¬£¬£¬£¬£¬ËüÃǵĴ󲿷ÖͨѶÀ´×Ô¶íÂÞ˹µÄÖ÷»ú¡£¡£ÕâЩÓòÃûµÄDNSËíµÀ¾ßÓÐÖ¸ÏòPupy RATµÄÌØÕ÷ £¬£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öÓÉDecoy Dog¹¤¾ß°ü°²ÅŵÄÔ¶³Ì»á¼ûľÂí¡£¡£


https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic/


4¡¢AquaÅû¶ʹÓÃKubernetes RBACµÄ´ó¹æÄ£ÍÚ¿ó»î¶¯


AquaÔÚ4ÔÂ21ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸ö´ó¹æÄ£µÄÍÚ¿ó»î¶¯ £¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËKubernetes(K8s)»ùÓÚ½ÇÉ«µÄ»á¼û¿ØÖÆ(RBAC)½¨ÉèºóÃŲ¢ÔËÐп󹤡£¡£Í¨¹ýʹÓÃRBACʵÑé¶ñÒâ»á¼û¿ØÖÆÕ½ÂÔ £¬£¬£¬£¬£¬£¬×ÝÈ»Ìṩ³õʼ»á¼ûµÄ¹ýʧÉèÖÃÔÚδÀ´»ñµÃÐÞ¸´ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒ²¿ÉÒÔÔÚ±»Ñ¬È¾µÄ¼¯ÈºÉÏÒ»Á¬±£´æ¡£¡£¹¥»÷Á´Ê¹ÓÃÉèÖùýʧµÄAPIЧÀÍÆ÷¾ÙÐгõʼ»á¼û £¬£¬£¬£¬£¬£¬È»ºó·¢ËÍHTTPÇëÇóÒÔÁгöÉñÃØ £¬£¬£¬£¬£¬£¬²¢·¢³öAPIÇëÇóÒÔͨ¹ýÁгöÃüÃû¿Õ¼äkube-systemÖеÄʵÌåÀ´ÍøÂçÓйؼ¯ÈºµÄÐÅÏ¢¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹×°ÖÃDaemonSetsÀ´½ÓÊܺÍÐ®ÖÆ±»¹¥»÷µÄK8s¼¯ÈºµÄ×ÊÔ´¡£¡£


https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters


5¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃGoogle Ads·Ö·¢BumbleBeeµÄ»î¶¯


4ÔÂ20ÈÕ £¬£¬£¬£¬£¬£¬SecureWorksÅû¶ÁËʹÓÃGoogle AdsºÍSEOÖж¾·Ö·¢BumbleBeeµÄ»î¶¯¡£¡£Ñо¿Ö°Ô±·¢Ã÷Ò»¸öGoogle AdÐû´«ÁËÐéαµÄCisco AnyConnectÇå¾²ÒÆ¶¯¿Í»§¶ËÏÂÔØÒ³Ãæ £¬£¬£¬£¬£¬£¬Ëü½¨ÉèÓÚ2ÔÂ16ÈÕ £¬£¬£¬£¬£¬£¬ÍйÜÔÚappcisco[.]comÓòÉÏ¡£¡£¸ÃÒ³ÃæÍÆ¹ãľÂí»¯MSI×°ÖóÌÐòcisco-anyconnect-4_9_0195.msi £¬£¬£¬£¬£¬£¬Ëü»á×°ÖöñÒâÈí¼þBumbleBee¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÆäËü¾ßÓÐÀàËÆ¶ÔÓ¦ÎļþÃû³ÆµÄÈí¼þ°ü £¬£¬£¬£¬£¬£¬ÀýÈçZoomInstaller.exeºÍzoom.ps1 £¬£¬£¬£¬£¬£¬ChatGPT.msiºÍchch.ps1 £¬£¬£¬£¬£¬£¬ÒÔ¼°CitrixWorkspaceApp.exeºÍcitrix.ps1¡£¡£


https://www.secureworks.com/blog/bumblebee-malware-distributed-via-trojanized-installer-downloads


6¡¢HuntressÐû²¼PaperCutÎó²îʹÓûµÄÆÊÎö±¨¸æ


4ÔÂ21ÈÕ £¬£¬£¬£¬£¬£¬HuntressÐû²¼±¨¸æ £¬£¬£¬£¬£¬£¬³ÆÆä·¢Ã÷ÁËʹÓÃPaperCut MF/NGÎó²îµÄ»î¶¯¡£¡£ÕâÁ½¸öÎó²î£¨CVE-2023-27350ºÍCVE-2023-27351£©¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÓÚÒÔSYSTEMȨÏÞÔÚ±»Ñ¬È¾µÄPaperCutЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£Ñо¿Ö°Ô±·¢Ã÷´ÓPaperCutÈí¼þÖÐÌìÉúµÄPowerShellÏÂÁî £¬£¬£¬£¬£¬£¬ÓÃÓÚ×°ÖÃAteraºÍSyncroµÈRMMÈí¼þ £¬£¬£¬£¬£¬£¬ÒÔ±ãÔÚÄ¿µÄÖ÷»úÒ»Á¬»á¼ûºÍÖ´ÐдúÂë¡£¡£»£»£»ù´¡ÉèÊ©ÆÊÎö·¢Ã÷ £¬£¬£¬£¬£¬£¬ÍйÜÕâЩ¹¤¾ßµÄÓòÃûÓÚ4ÔÂ12ÈÕ×¢²á £¬£¬£¬£¬£¬£¬Ò²ÍйÜTrueBotµÈ¶ñÒâÈí¼þ £¬£¬£¬£¬£¬£¬ºóÕßÓë¶íÂÞ˹SilenceÍÅ»ïÓйØ¡£¡£


https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software