ºÚ¿ÍÉù³ÆÒÑÇÔÈ¡µçÐŹ«Ë¾T-MobileÔ¼1ÒÚ¿Í»§µÄÐÅÏ¢£ºFortbridgeÅû¶cPanelºÍWHMÖжà¸öÇå¾²Îó²îµÄϸ½Ú
Ðû²¼Ê±¼ä 2021-08-16
![]()
¹¥»÷ÕßÉù³ÆÔÚÁ½ÖÜǰÈëÇÖÁËT-MobileµÄÓÃÓÚÉú²úºÍ¿ª·¢µÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ò»¸ö°üÀ¨Á˿ͻ§ÐÅÏ¢µÄOracleÊý¾Ý¿âЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶ÁËT-MobileµÄ1ÒÚ¸ö¿Í»§Ô¼106GBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨IMSI¡¢IMEI¡¢µç»°ºÅÂë¡¢¿Í»§ÐÕÃû¡¢Çå¾²PIN¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕºÅÂëºÍ³öÉúÈÕÆÚµÈÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£ÍþвÇ鱨¹«Ë¾Hudson RockÌåÏÖ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎºÚ¿ÍµÄ¹¥»÷ÐÐΪ¿ÉÄÜÊÇΪÁËÆÆËðÃÀ¹úµÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÅê»÷ÃÀ¹úÔøÓÚ2019Äê°ó¼Ü²¢ÕÛÄ¥ÁËJohn Erin Binns(CIA Raven-1)¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hacker-claims-to-steal-data-of-100-million-t-mobile-customers/

FortbridgeÅû¶cPanelºÍWHMÖжà¸öÇå¾²Îó²îµÄϸ½Ú
FortbridgeµÄÑо¿Ö°Ô±Åû¶ÁËÍøÂçÍÐ¹ÜÆ½Ì¨cPanelºÍWHMÖжà¸öÇå¾²Îó²îµÄϸ½Ú¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚÕë¶ÔcPanelºÍWHMµÄºÚºÐÉøÍ¸²âÊÔÖз¢Ã÷ÁËÕâЩÎó²î£¬£¬£¬£¬£¬£¬£¬Á¬ÏµÊ¹ÓÿÉÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£¡£¡£ÆäÖÐÒ»¸öÎó²îΪ¾ÏúÉÌÕÊ»§ÖеÄXMLÍⲿʵÌå(XXE)Îó²î£¬£¬£¬£¬£¬£¬£¬ÊÇÓÉÓÚ¸ÃÕÊ»§ÓµÓÐÒÔXML»òXLFÃûÌñ༺ÍÌí¼ÓÇøÓòÉèÖÃȨÏÞµ¼Öµġ£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹Åû¶ÁËÒ»¸ö´æ´¢ÐÍXSSÎó²îºÍCSRFÎó²î¡£¡£¡£¡£¡£¡£¡£¡£µ«ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¹©Ó¦ÉÌÖ»ÐÞ¸´ÁËXXEÎó²î£¬£¬£¬£¬£¬£¬£¬²¢¾Ü¾øÐÞ¸´ÆäËüÎó²î¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://latesthackingnews.com/2021/08/14/numerous-vulnerabilities-spotted-in-cpanel-and-whm-web-hosting-platform/

Unit42½üÆÚ·¢Ã÷´ó×ÚÈÆ¹ýCAPTCHA¼ì²âµÄ´¹Âڻ
Unit42µÄÑо¿Ö°Ô±½üÆÚ·¢Ã÷ÁË´ó×ÚÈÆ¹ýCAPTCHA¼ì²âµÄ´¹Âڻ¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß½«´¹ÂÚÒ³ÃæÒþ²ØÔÚCAPTCHAÖ®ºó¿É±ÜÃâÇå¾²ÅÀ³æ¼ì²âµ½¶ñÒâÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÒÔʹ´¹ÂÚµÇÂ¼Ò³Ãæ¿´ÆðÀ´Ô½·¢Õýµ±¡£¡£¡£¡£¡£¡£¡£¡£ËäÈ»Õâ²¢·Ç×îеÄÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬µ«ÔÚ½üÆÚÔ½À´Ô½Ê¢ÐУºÉϸöÔÂUnit42ÔÚ4088¸ö¸¶·ÑµÄÓòÖз¢Ã÷ÁË7572¸ö½ÓÄÉÁË»ìÏýÒªÁìµÄ¶ñÒâURL£¬£¬£¬£¬£¬£¬£¬Ò²¾ÍÊÇ˵ƽ¾ùÌìÌìÓÐ529¸öʹÓÃÁËCAPTCHAµÄ¶ñÒâ URL¡£¡£¡£¡£¡£¡£¡£¡£³ýÁË´¹ÂÚ¹¥»÷Ö®Í⣬£¬£¬£¬£¬£¬£¬Ê¹ÓÃCAPTCHAµÄթƻҲÔÚÔöÌí¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/captcha-protected-phishing/

Ñо¿ÍŶӷ¢Ã÷AggahÕë¶ÔÑÇÖÞÖÆÔìÒµµÄÓã²æÊ½´¹Âڻ
AnomaliµÄÑо¿ÍŶӷ¢Ã÷ÁËʼÓÚ2021Äê7ÔÂÉÏÑ®µÄÓã²æÊ½ÍøÂç´¹Âڻ£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÕû¸öÑÇÖÞµÄÖÆÔìÒµ¡£¡£¡£¡£¡£¡£¡£¡£Aggah×îÔçÓÚ2019Äê3ÔÂÓÉUnit 42µÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô°¢À²®ÁªºÏÇõ³¤¹ú(UAE)µÄ×éÖ¯¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯ÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßαװ³ÉÓ¢¹úFoodHub.co.uk·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬ÓÕʹÓû§µÇ¼Òѱ»ÈëÇÖµÄmail.hoteloscar.in/imagesÍøÕ¾£¬£¬£¬£¬£¬£¬£¬²¢·Ö·¢Warzone RAT¡£¡£¡£¡£¡£¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬£¬£¬£¬£¬Aggah×îÐµĹ¥»÷Ä¿µÄ°üÀ¨Öйų́ÍåµÄÖÆÔ칫˾Fon-starºÍ¹¤³Ì¹«Ë¾FomoTech£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°º«¹úµÄµçÁ¦¹«Ë¾ÏÖ´úµçÆø¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.anomali.com/blog/aggah-using-compromised-websites-to-target-businesses-across-asia-including-taiwan-manufacturing-industry

Check PointÐû²¼ºÚ¿ÍÍÅ»ïIndra¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
Check PointÐû²¼ÁËÓйغڿÍÍÅ»ïIndra¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÆÊÎöÁË2021Äê7ÔÂ9ÈÕÖÁ10ÈÕ¶ÔÒÁÀÊ»ð³µÏµÍ³µÄÍøÂç¹¥»÷Áôϵĺۼ££¬£¬£¬£¬£¬£¬£¬²¢½«´Ë´Î¹¥»÷¹éÒòÓÚÒ»¸ö×Ô³ÆÎªIndraµÄºÚ¿ÍÍŻ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬¸ÃÍŻﻹÓë2019ÄêºÍ2020ÄêÕë¶ÔÐðÀûÑǶà¼Ò¹«Ë¾µÄ¹¥»÷Óйأ¬£¬£¬£¬£¬£¬£¬°üÀ¨Katerji GroupºÍArfada Petroleum¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÕâЩÄ꿪·¢ÁËÖÁÉÙ3¸ö²î±ð°æ±¾µÄwiper£¬£¬£¬£¬£¬£¬£¬»®·Ö³ÆÎªMeteor¡¢StardustºÍComet£¬£¬£¬£¬£¬£¬£¬¸Ã±¨¸æ»¹ÏêϸÐÎòÁ˹¥»÷ÕßʹÓõŤ¾ßºÍTTPs¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://research.checkpoint.com/2021/indra-hackers-behind-recent-attacks-on-iran/

KasperskyÐû²¼2021ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ
KasperskyÐû²¼ÁË2021ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÆÊÎöÁË2021ÄêQ2µÄ¶à¸öÓÐÕë¶ÔÐԵĹ¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÓëCycldekÍÅ»ïÏà¹ØµÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬ÔÚÒ°ÍâʹÓÃ×ÀÃæ´°¿ÚÖÎÀíÆ÷ÖÐ0dayµÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬TunnelSnakeÐж¯£¬£¬£¬£¬£¬£¬£¬PuzzleMaker»î¶¯ºÍFerocious KittenÍÅ»ïÏà¹Ø»î¶¯µÈ¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬±¨¸æ»¹ÆÊÎöÁ˶à¸ö¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÀÕË÷Èí¼þJSWormºÍBlack Kingdom¡¢ÒøÐÐľÂíGootkitºÍBizarro¡¢APKPureÓ¦ÓÃÖжñÒâ´úÂëºÍBrowser lockersµÈ¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/it-threat-evolution-q2-2021/103597/


¾©¹«Íø°²±¸11010802024551ºÅ