Óý±ÌÔâµ½LAPSUS$µÄ¹¥»÷ £¬ÆäÓÎÏ·¡¢ÏµÍ³ºÍ·þÎñÖÐÖ¹

Ðû²¼Ê±¼ä 2022-03-15

Óý±ÌÔâµ½LAPSUS$µÄ¹¥»÷ £¬ÆäÓÎÏ·¡¢ÏµÍ³ºÍ·þÎñÖÐÖ¹


¾ÝýÌå3ÔÂ12ÈÕ±¨µÀ £¬ÊÓÆµÓÎÏ·¿ª·¢ÉÌÓý±Ì£¨Ubisoft £©Ö¤Êµ £¬ËüÔÚÉÏÖÜÔâµ½ÍøÂç¹¥»÷ £¬µ¼ÖÂÆäÓÎÏ·¡¢ÏµÍ³ºÍ·þÎñÖÐÖ¹¡£¸Ã¹«Ë¾ÌåÏÖËûÃǵÄÍŶÓÕýÔÚÊÓ²ì´ËÎÊÌâ £¬ÏÖÒÑÈ·ÈÏûÓÐÊý¾Ýй¶¼£Ïó £¬²¢ÇÒÖØÖÃÁËÈ«¹«Ë¾µÄÃÜÂë¡£3ÔÂ4ÈÕ £¬¾ÍÓÐÓû§ÔÚTwitterºÍDowndetectorÉÏÌåÏÖËûÃÇÔÚ»á¼ûÓý±ÌµÄijЩ·þÎñʱ·ºÆðÎÊÌâ¡£ÏÖÔÚÉÐÎÞ¹ØÓڴ˴ι¥»÷µÄÏêϸÐÅÏ¢ £¬µ«Lapsus$Ðû²¼ÁËÐÂÎÅÌåÏÖ´ËÊÂÓëËüÓйء£


https://securityaffairs.co/wordpress/128929/hacking/ubisoft-cyber-security-incident.html


LockBitÉù³Æ¶ÔÆÕÀû˾ͨÃÀÖÞ¹«Ë¾µÄ¹¥»÷ÊÂÎñÈÏÕæ


LockBitÔÚ3ÔÂ11ÈÕÐû²¼ÐÂÎÅ £¬Éù³Æ¶ÔÆÕÀû˾ͨÃÀÖÞ¹«Ë¾£¨Bridgestone Americas£©µÄ¹¥»÷ÊÂÎñÈÏÕæ¡£ÕâÊÇÈ«Çò×î´óµÄÂÖÌ¥ÖÆÔìÉÌÖ®Ò» £¬ÔÚÈ«ÇòÓµÓÐÊýÊ®¸öÉú²úµ¥Î»ºÍÁè¼Ý130000¸öÔ±¹¤¡£ÆÕÀû˾ͨÐû²¼µÄÉùÃ÷³Æ £¬ËûÃÇÔÚ2ÔÂ27ÈÕ¼ì²âµ½Ò»ÆðITÇå¾²ÊÂÎñ £¬ÕýÔÚ¶ÔÊÂÎñµÄ¹æÄ£ºÍÐÔ×ÓÕö¿ªÊӲ졣LockBitÊǵ±½ñ×î»îÔ¾µÄÀÕË÷ÍÅ»ïÖ®Ò» £¬ÏÖÔÚÉв»ÇåÎúËü´ÓÆÕÀû˾ͨÇÔÈ¡ÁËÄÄЩÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/bridgestone-americas-confirms-ransomware-attack-lockbit-leaks-data/


Ñо¿Ö°Ô±·¢Ã÷¶à¸öÖ÷Á÷°ü¹ÜÀíÆ÷Öб£´æÇå¾²Îó²î


¾Ý3ÔÂ11ÈÕ±¨µÀ £¬SonarSourceµÄÑо¿Ö°Ô±·¢Ã÷¶à¸öÖ÷Á÷°ü¹ÜÀíÆ÷Öб£´æÇå¾²Îó²î¡£°ü¹ÜÀíÆ÷ÊÇÖ¸ÓÃÓÚ×Ô¶¯×°Öá¢Éý¼¶¡¢ÉèÖÿª·¢Ó¦ÓóÌÐòËùÐèµÄµÚÈý·½ÒÀÀµÏîµÄϵͳ»ò¹¤¾ß £¬±£´æÎó²îµÄÓ¦ÓðüÀ¨Composer¡¢Bundler¡¢Bower¡¢Poetry¡¢Yarn¡¢pnpm¡¢PipºÍPipenv¡£Ñо¿Ö°Ô±ÌåÏÖ £¬¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²îÀ´Ö´ÐÐí§Òâ´úÂë²¢´ÓÄ¿µÄ×°±¸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢ £¬°üÀ¨Ô´´úÂëºÍ»á¼ûÁîÅÆµÈ¡£


https://thehackernews.com/2022/03/multiple-security-flaws-discovered-in.html


¶íÂÞ˹¹ú·À¹«Ë¾RostecÒòÔâµ½DDoS¹¥»÷ÍøÕ¾¹Ø±Õ


3ÔÂ11ÈÕ £¬¶íÂÞ˹¹úÓк½¿Õº½ÌìºÍ¹ú·À¼¯ÍÅRostecÌåÏÖ £¬ÆäÍøÕ¾ÒòÔâµ½ÍøÂç¹¥»÷¶ø±»¹Ø±Õ¡£¸Ã¹«Ë¾ÌåÏÖ £¬×Ô2ÔÂÏÂÑ®ÒÔÀ´ÆäÍøÕ¾Ò»Ö±ÔâÊÜ×ÅΧ¹¥¡£×îеÄÒ»´Î¹¥»÷ʼÓÚµ±ÈÕÉÏÎç11µã30·Ö £¬À´×ÔÎÚ¿ËÀ¼Ð½¨ÉèµÄIT¾ü¶Ó¡£¸ÃÎÚ¿ËÀ¼×éÖ¯ÔçЩʱ¼äÔÚTelegramÖÐÐû²¼ÐÂÎÅ £¬½«RostecµÄ¶à¸öÓòÈ·ÒÔΪÆäÂþÑÜʽ¾Ü¾ø·þÎñ(DDoS)¹¥»÷µÄÄ¿µÄ¡£Rostec³ÆÍøÕ¾ºÜ¿ì¾Í»Ö¸´ÁËÕý³£ÔËÐÐ £¬ÏÖÔÚËùÓÐÐÅÏ¢¾ùÒÑ¿ÉÓá£


https://www.bleepingcomputer.com/news/security/russian-defense-firm-rostec-shuts-down-website-after-ddos-attack/


Anonymousй¶¶íÂÞ˹»ú¹¹RoskomnadzorµÄ820GBÊý¾Ý


¾ÝýÌå3ÔÂ11ÈÕ±¨µÀ £¬AnonymousÉù³ÆÈëÇÖÁ˶íÂÞ˹Ö÷ÒªµÄ¹Ù·½»ú¹¹Roskomnadzor£¨ÓÖÃûÁª°îͨѶ¡¢ÐÅÏ¢ÊÖÒպ͹«¹²Ã½Ìå¼àÊÓ¾Ö£©¡£¸ÃÍÅ»ï×ܹ²Ð¹Â¶ÁËÔ¼820GBµÄÊý¾Ý £¬ÆäÖаüÀ¨Áè¼Ý360000¸öÎļþ£¨536.9 GB£©ºÍ2¸ö°üÀ¨HR³ÌÐòµÄÊý¾Ý¿â£¨290.6 GB£©¡£±ðµÄ £¬AnonymousÔÚ½üÆÚ»¹ÈëÇÖÁ˶íÂÞ˹Լ90%µÄÉèÖùýʧµÄÔÆÊý¾Ý¿â¡£


https://www.hackread.com/anonymous-hacks-roskomnadzor-russia-agency/


¶«Ó³¶¯»­¹«Ë¾»òÒòÔâµ½ÀÕË÷¹¥»÷º£ÔôÍõµÈ¶¯ÂþÑÓ²¥


3ÔÂ11ÈÕ £¬ÈÕ±¾¶«Ó³¶¯»­¹«Ë¾£¨Toei£©Ðû²¼×îÐÂÐÂÎÅ £¬³ÆÓÉÓÚÍøÂç¹¥»÷µ¼ÖÂÄÚ²¿ÏµÍ³¹Ø±Õ £¬¶¯ÂþµÄÖÆ×÷Òѱ»ÍƳ١£Òò´Ë £¬¡¶ÓÂÕß¶·¶ñÁú´óÍõ½£¡·¡¢¡¶Delicious Party Precure¡·¡¢¡¶ÊýÂë·ÏÎïÓÄÁéÓÎÏ·¡·ºÍ¡¶º£ÔôÍõ¡·Ð¾缯µÄ²¥³ö½«ÑÓ³Ù £¬Ö±ÖÁÁíÐÐ֪ͨ¡£ÕâÁÔôÍõµÄ·ÛË¿ÃǺÜÊÇʧÍû £¬ËûÃÇÕýÆÚ´ý¸ÃϵÁеÚ1000ÕµÄÐû²¼¡£Æ¾Ö¤ToeiµÄͨ¸æ £¬ÆäÔÚ3ÔÂ6ÈÕ¼ì²âµ½Î´¾­ÊÚȨµÄ»á¼û £¬²¢ÔÚÔ½ÈչرÕÁËËùÓеÄÄÚ²¿ÏµÍ³ £¬¶Ô´ËÊÂÕö¿ªÊӲ졣ÖÖÖÖ¼£ÏóÅú×¢ÕâÊÇÒ»ÆðÀÕË÷¹¥»÷ÊÂÎñ £¬µ«ÏÖÔÚÑо¿Ö°Ô±»¹ÎÞ·¨Ö¤ÊµÕâÒ»µã¡£


https://www.bleepingcomputer.com/news/security/new-one-piece-anime-episodes-delayed-after-toei-cyberattack/




Çå¾²¹¤¾ß


ASSAMEE 


Anonfiles µÄÃâ·Ñ¸ß¼¶¼ÓÃÜÆ÷ £¬Ê¹Óø߼¶¼ÓÃÜÒªÁìʹÓà AES-256 ¼ÓÃÜĿ¼¡£


https://github.com/samhaxr/ASSAMEE


Scanmycode Ce


ËüÊÇÒ»ÖÖ´úÂëɨÃè/SAST/¾²Ì¬ÆÊÎö/Linting ½â¾ö¼Æ»® £¬Ê¹ÓÃÐí¶à¹¤¾ß/ɨÃèÒǺÍÒ»¸ö±¨¸æ¡£


https://github.com/marcinguy/scanmycode-ce


Oh365UserFinder


ÓÃÓÚʶ±ðÓÐÓÃµÄ o365 ÕÊ»§ºÍÓò £¬¶ø²»±£´æÕÊ»§Ëø¶¨µÄΣº¦¡£


https://github.com/dievus/Oh365UserFinder


ADExplorerSnapshot.py


ÊÇAD Explorer ¿ìÕÕÆÊÎöÆ÷ £¬×÷Ϊ BloodHound µÄ ingestor £¬»¹Ö§³Ö½«ÍêÕû¹¤¾ßת´¢µ½ NDJSON¡£


https://github.com/c3c/ADExplorerSnapshot.py



Çå¾²ÆÊÎö


AnonymousÈëÇÖÁ˶íÂÞ˹µÄ 400 ¸öÇå¾²ÉãÏñÍ·


https://www.hackread.com/anonymous-sent-texts-to-russians-hacked-security-cams/


Riverbed Èí¼þÖб£´æµÄ4¸öÑÏÖØµÄÎó²î


https://www.theregister.com/2022/03/11/riverbed_vulnerabilities/


ͨ¹ýËÙÂÊÏÞÖÆ RDP ±©Á¦¹¥»÷


https://blog.malwarebytes.com/explained/2022/03/blunting-rdp-brute-force-attacks-with-rate-limiting/


Kali Linux ΪÂã»ú×°ÖÃÌí¼ÓÁËÀàËÆ VM µÄ¿ìÕÕ¹¦Ð§


https://www.bleepingcomputer.com/news/linux/kali-linux-adds-vm-like-snapshot-feature-to-bare-metal-installs/


Å·Ä·Áú PLC ±à³ÌÈí¼þÖÐÐÞ²¹µÄ¸ßΣÎó²î


https://www.securityweek.com/high-severity-vulnerabilities-patched-omron-plc-programming-software