ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷

°ä²¼¹¦·ò 2022-02-25

ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷


¾ÝýÌå2ÔÂ23ÈÕ³Æ  £¬ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙ´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷ ¡£Õâ´ÎÊܵ½¹¥»÷µÄ×éÖ¯Ô̺¬ÎÚ¿ËÀ¼±í½»²¿¡¢¹ú·À²¿¡¢ÄÚÕþ²¿¡¢°²È«¾ÖºÍÄÚ¸ó  £¬ÒÔ¼°ÎÚ¿ËÀ¼×î´óµÄÒøÐÐPrivatbankºÍ¹ú¶È´¢ÐîÒøÐÐOschadbank ¡£ÎÚ¿ËÀ¼SSSCIP°µÊ¾  £¬¹¥»÷»î¶¯µ¼Ö²¿ÃÅϵͳ²»³ÉÓûòÖ»Äܶ϶ÏÐøÐøµØ¹¤×÷  £¬ËûÃÇÔÚÖÂÁ¦Ó¦¶Ô¹¥»÷²¢ÍøÂç·ÖÎöÐÅÏ¢ ¡£ÉÏÖÜ  £¬ÎÚ¿ËÀ¼µÄ¶à¸öµ±¾Ö»ú¹¹ºÍÒøÐÐÔøÔâµ½DDoS¹¥»÷ ¡£


https://www.bleepingcomputer.com/news/security/ukrainian-government-and-banks-once-again-hit-by-ddos-attacks/


DevOpsÔÚ¹Ù·½NPM¿âÖз¢ÏÖ25¸ö¶ñÒâµÄJavaScript¿â


¾ÝýÌå2ÔÂ22ÈÕ±¨Â·  £¬°²È«¹«Ë¾DevOpsÔÚ¹Ù·½NPM¿âÖз¢ÏÖÁË25¸ö¶ñÒâµÄJavaScript¿â ¡£ÕâЩ¶ñÒâµÄ¿â¼Ù×°³ÉºÏ·¨Èí¼þ°ü  £¬ÀýÈçcolors.js¡¢crypto-js¡¢discord.js¡¢marked ºÍnoblox.jsµÈ  £¬Ö÷ÕÅÊÇ´ÓÖ¸±êϵͳÖÐÇÔÈ¡DiscordÁîÅÆºÍ»·¾³±äÁ¿ ¡£Ä¿Ç°  £¬ÕâЩJavaScript¿âÒѱ»É¾³ý ¡£ÔçÔÚ2021Äê12Ô·Ý  £¬×êÑÐÈËÔ±¾ÍÔÚNPM¿âÖз¢ÏÖ²¢É¾³ýÁË17¸öÀàËÆµÄ¶ñÒâ°ü ¡£  


https://thehackernews.com/2022/02/25-malicious-javascript-libraries.html


ÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÅäÖÃÃýÎóй¶200GBÊý¾Ý


SafetyDetectivesÔÚ2ÔÂ21ÈÕй©  £¬¶ùͯ·þ×°ÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÅäÖÃÃýÎó ¡£Õâ´Îй¶Á˶à´ï200 GBµÄ½ü200Íò¸öÎļþ  £¬Éæ¼°Ô¼20Íò¸öÓû§ ¡£×êÑÐÈËÔ±×ܹ²·¢ÏÖÁË3¸öÊý¾Ý¼¯  £¬¹ØÓÚ¿Í»§µÄ²É°ìÐÅÏ¢¡¢Æ«ºÃºÍÓûÍûÇåµ¥  £¬Ô̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢ÓʼþµØÖ·¡¢Ö§¸¶·½Ê½ºÍËÍ»õÐÅÏ¢µÈ ¡£¸Ã´æ´¢¿âÓÚ2021Äê11ÔÂ12ÈÕ±»·¢ÏÖ  £¬Ö±µ½2022Äê2ÔÂ18Èղŵõ½±£»¤ ¡£


https://www.hackread.com/kids-luxury-clothing-store-melijoe-data-exposed/


SonarSource·¢ÏÖHorde WebmailÖдæÔÚ9ÄêµÄXSS·ì϶


SonarSourceÔÚ2ÔÂ22ÈÕÅû¶ÁËHorde WebmailÖÐ×Ô2012Äêµ×Ò»Ïò´æÔÚµÄXSS·ì϶µÄϸ½Ú ¡£×êÑÐÈËÔ±³Æ  £¬¹¥»÷ÕßÄܹ»Í¨¹ý¶ñÒâOpenOfficeÎĵ·ûÓø÷ì϶  £¬µ±Horde½«Æäת»»ÎªXHTMLÔ¤ÀÀʱ  £¬¾Í»áÖ´ÐиÃÎĵµÖеĶñÒâJavaScript  £¬´Ó¶øµ¼Ö´洢ÐÍXSS¹¥»÷ ¡£Òò¶ø  £¬¸Ã·ì϶¿ÉÓÃÀ´½Ù³ÖÓû§µÄÓʼþÕÊ»§  £¬ÉõÖÁÊǽÚÔìÕû¸öÓʼþ·þÎñÆ÷ ¡£×îºó  £¬×êÑÐÈËÔ±»¹ÌṩÁËÓйØÈôºÎ»º½â´Ë·ì϶µÄ½¨Òé ¡£


https://therecord.media/unpatched-bug-allows-takeover-of-horde-webmail-accounts-servers/


ÎÚ¿ËÀ¼¾¯·½µ·»ÙÒ»¸öÍøÂç´¹µöÍŻﲢ¿ÛÁô5Ãû³ÉÔ±


¾Ý2ÔÂ22ÈÕ±¨Â·  £¬ÎÚ¿ËÀ¼¾¯·½ÆÆ»ñÁËÒ»¸öÍøÂç´¹µöÍŻﲢ¿ÛÁôÁËÆä5Ãû³ÉÔ± ¡£¸ÃÍÅ»ïÕ¼ÓÐ40¶à¸ö´¹µöÍøÕ¾  £¬¹¥»÷ÁËÖÁÉÙ70000¶à¸öÖ¸±ê²¢³É¹¦ÇÔÈ¡ÁËËûÃǵÄÖ§¸¶¿¨ÐÅÏ¢ ¡£¾¯·½¹À¼Æ¸ÃÍÅ»ï×ܹ²Ôì³É500Íò¸ñÀï·òÄÉ£¨175000ÃÀÔª£©µÄ¾­¼ÃËðʧ  £¬Ä¿Ç°³ä¹«ÁËÆä200Íò¸ñÀï·òÄÉ ¡£±»¿ÛÁôµÄÏÓÒÉÈËÃæ¶ÔÎÚ¿ËÀ¼¡¶ÐÌ·¨¡·µÚ361ÌõµÚ2²¿Ãź͵Ú190ÌõµÚ3²¿ÃŵÄÐÌÊÂÖ¸¿Ø  £¬×î¸ß¿ÉÅд¦8Äê½ûïÀ ¡£


https://www.bleepingcomputer.com/news/security/police-bust-phishing-group-that-used-40-sites-to-steal-credit-cards/


Proofpoint°ä²¼2021ÄêÍøÂç´¹µöÌ¬ÊÆµÄ·ÖÎö»ã±¨


2ÔÂ22ÈÕ  £¬Proofpoint°ä²¼ÁË2021ÄêÍøÂç´¹µöÌ¬ÊÆµÄ·ÖÎö»ã±¨ ¡£»ã±¨Ö¸³ö  £¬È¥Ä곬¹ý91%µÄÓ¢¹ú×éÖ¯±»´¹µö¹¥»÷ÈëÇÖ  £¬78%µÄ×éÖ¯³ÉΪ»ùÓÚÓʼþµÄÀÕË÷¹¥»÷µÄÖ¸±ê  £¬77%µÄ×éÖ¯Ôâµ½BEC¹¥»÷£¨Í¬±ÈÔö³¤18%£© ¡£Ï°È¾ÀÕË÷Èí¼þµÄ×éÖ¯ÖÐ  £¬60%Ö§¸¶ÁËÊê½ð  £¬32%»¹¶î±íÖ§¸¶ÁË×ʽðÒÔ³Á»ñ¶ÔÊý¾ÝºÍϵͳµÄ½Ó¼ûȨÏÞ ¡£×êÑÐÈËÔ±ÒÔΪ  £¬¹¥»÷µÄÊýÁ¿ºÍ³É¹¦ÂʵÄÔö³¤ÓëתÏò»ìºÏ¹¤×÷ģʽÓйØ  £¬È¥ÄêÓдóÁ¿Ô±¹¤½øÐÐÔ¶³Ì°ì¹«  £¬µ«Ö»ÓÐÉÙÊý×éÖ¯¶ÔÔ±¹¤½øÐÐÔ¶³Ì¹¤×÷µÄ°²È«½ÌÓý ¡£


https://www.proofpoint.com/us/resources/threat-reports/state-of-phish



°²È«¹¤¾ß


Jatayu


ÒþÉí¶ÀÁ¢PHP Web Shell  £¬»ùÓÚHttp±êÍ·µÄÉí·ÝÑéÖ¤ ¡£


https://github.com/SpiderMate/Jatayu


Chain Reactor


ÊÇÒ»¸ö¿ªÔ´¹¤¾ß  £¬ÓÃÓÚÔÚLinux»úеÉϲâÊÔ¼ì²âºÍÏìÓ¦¸²¸ÇÂÊ ¡£


https://github.com/redcanaryco/chain-reactor


Boko


ºÏÓÃÓÚmacOSµÄÀûÓ÷¨Ê½É¨Ã跨ʽ  £¬ÓÃÓÚËÑË÷ºÍ¼ø±ðDZÔÚdylib½Ù³ÖºÍÈõdylib·ì϶  £¬ÒÔ¼°ÀûÓÿÉÄܱ»ºóÃŽӼûµÄ¾ç±¾ ¡£


https://github.com/bashexplode/boko


Android Disassembler


ÊÇÒ»¿î¿ÉÄÜ·ÖÎö¶àÖÖÀàÐÍÎļþµÄÀûÓ÷¨Ê½  £¬·ÖÎöÊÖ»úÉϵĶñÒâÀûÓà ¡£


https://github.com/KYHSGeekCode/Android-Disassembler


fastfinder


ÇáÁ¿¼¶¹¤¾ß  £¬ÓÃÓÚÔÚ Windows ºÍ Linux ƽ̨ÉϽøÐÐÍþв׷×Ù¡¢ÊµÊ±È¡Ö¤ºÍ·ÖÀà ¡£


https://github.com/codeyourweb/fastfinder/



°²È«·ÖÎö


GitHubÏòÉçÇøÊ¢¿ª°²È«Êý¾Ý¿â


https://www.darkreading.com/application-security/github-opens-security-database-to-community-contributions


¹È¸èä¯ÀÀÆ÷ÔÊÐíÓû§ÔÚ±£ÁôµÄÃÜÂëÖÐÔö³¤×¢½â


https://www.bleepingcomputer.com/news/google/google-chrome-to-allow-users-to-add-notes-to-saved-passwords/


д¹µö²½ÖèʹÓÃÔ¶³Ì½Ó¼ûÈí¼þÈÆ¹ýMFA


https://www.bleepingcomputer.com/news/security/devious-phishing-method-bypasses-mfa-using-remote-access-software/


Áª¹úÁãÐÅÀµÕ½ÊõºÍMicrosoftµÄ²¿ÊðÖ¸ÄÏ


https://www.microsoft.com/security/blog/2022/02/22/the-federal-zero-trust-strategy-and-microsofts-deployment-guidance-for-all/


ÌÀ¼Óº£µ×µçÀ½¨¸´  £¬Åç·¢ºó»¥ÁªÍøÖÕÓÚ¸´Ô­


https://therecord.media/tonga-submarine-cable-repaired-restoring-internet-after-eruption/


ASEC×î½ü·¢ÏÖ¼Ù×°³É Microsoft µÄ´¹µöÓʼþÔö³¤


https://asec.ahnlab.com/en/31994/