Colonial PipelineÒòÎ¥·´Çå¾²»®¶¨±»·£¿£¿£¿£¿î½ü100ÍòÃÀÔª
Ðû²¼Ê±¼ä 2022-05-12¾ÝýÌå5ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÒòÎ¥·´Áª°îÇå¾²¹æÔò£¬£¬£¬£¬£¬£¬£¬Colonial Pipeline±»ÃÀ¹úÔËÊ䲿¹ÜµÀºÍΣÏÕÖÊÁÏÇå¾²ÖÎÀí¾Ö(PHMSA)·£¿£¿£¿£¿î986400ÃÀÔª¡£¡£¡£¡£¡£¡£¡£¡£2021Äê5Ô³õ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú×î´óȼÁϹܵÀÔËÓªÉÌColonial PipelineÔâµ½DarkSideµÄÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ×ÔÈ»Æø¹©Ó¦ÖÐÖ¹£¬£¬£¬£¬£¬£¬£¬Ê¹17¸öÖݽøÈë½ôÆÈ״̬¡£¡£¡£¡£¡£¡£¡£¡£PHMSAÌåÏָù«Ë¾Î´µÐÊÖ¶¯¹Ø±ÕºÍÖØÐÂÆô¶¯Æä¹ÜµÀϵͳ×öºÃ³ä·ÖµÄÍýÏ룬£¬£¬£¬£¬£¬£¬Æä¹ÜµÀÔÚ2021Äê5ÔµĹ¥»÷ºóÎÞ·¨Ê¹ÓÃʱ£¬£¬£¬£¬£¬£¬£¬¶ÔÌìÏÂÔì³ÉÁËÑÏÖØÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/05/us-proposes-1-million-fine-on-colonial.html
2¡¢»ÝÆÕÐû²¼BIOS¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Ó°Ïì200¶à¸öÐͺŵÄÎó²î
5ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬»ÝÆÕÐû²¼5Ô·ÝBIOS¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁË2¸öÓ°Ïì´ó×ÚPCºÍÌõ¼Ç±¾²úÆ·µÄÎó²î¡£¡£¡£¡£¡£¡£¡£¡£Õâ2¸öÎó²î»®·ÖΪCVE-2021-3808ºÍCVE-2021-3809£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö¾ùΪ8.8¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬»ÝÆÕÉÐδÌṩÓйØÕâЩÎó²îµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¡£¡£¡£¾ÝÑо¿Ö°Ô±Í¸Â¶£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÎó²îÒÔÄں˼¶È¨ÏÞ£¨CPL==0£©Ö´ÐУ¬£¬£¬£¬£¬£¬£¬Éý¼¶µ½ÏµÍ³ÖÎÀíģʽ£¨SMM£©¡£¡£¡£¡£¡£¡£¡£¡£ÔÚSMMģʽÏÂÖ´ÐУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ»ñµÃ¶ÔÖ÷»úµÄËùÓÐȨÏÞ£¬£¬£¬£¬£¬£¬£¬´Ó¶øÖ´ÐнøÒ»²½µÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hp-fixes-bug-letting-attackers-overwrite-firmware-in-over-200-models/
3¡¢Ô¼2100Íò¸öVPNÓû§µÄСÎÒ˽¼ÒÐÅÏ¢ÔÚTelegramÉϱ»¹ûÕæ
¾ÝVPNMentorÔÚ5ÔÂ9Èյı¨µÀ£¬£¬£¬£¬£¬£¬£¬Ô¼2100Íò¸öVPNÓû§µÄСÎÒ˽¼ÒÐÅÏ¢Òѱ»Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£¡£¸ÃSQLת´¢ÓÚ5ÔÂ7ÈÕÔÚTelegramÉÏÐû²¼£¬£¬£¬£¬£¬£¬£¬¾ÞϸΪ10 GB£¬£¬£¬£¬£¬£¬£¬°üÀ¨GeckoVPN¡¢SuperVPNºÍChatVPNµÈ¶à¸öVPNЧÀ͵ÄÓû§µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Éæ¼°ÓʼþµØµã¡¢Óû§Ãû¡¢ÐÕÃû¡¢¹ú¼Ò¡¢ÃÜÂë×Ö·û´®¡¢½áËãÃ÷ϸºÍ״̬µÈ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬£¬VPNÓû§¸üÖØÊÓÒþ˽ºÍÄäÃûÐÔ£¬£¬£¬£¬£¬£¬£¬Òò´ËËûÃǵÄÊý¾Ý¸üÓмÛÖµ£¬£¬£¬£¬£¬£¬£¬µ±ÆäСÎÒ˽¼ÒÐÅϢй¶ʱ£¬£¬£¬£¬£¬£¬£¬ËûÃǸü¿ÉÄÜÔâµ½ÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£
https://www.vpnmentor.com/blog/vpns-leaked-on-telegram/
4¡¢NCSC-FIÐû²¼Android¶ñÒâÈí¼þFluBot»î¶¯¼¤ÔöµÄͨ¸æ
5ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬·ÒÀ¼¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ(NCSC-FI) Ðû²¼Í¨¸æ£¬£¬£¬£¬£¬£¬£¬³ÆAndroid¶ñÒâÈí¼þFluBotµÄ»î¶¯¼¤Ôö¡£¡£¡£¡£¡£¡£¡£¡£FluBotÔËÓªÍÅ»ïʹÓÃÁ˰üÀ¨ÓïÒôÓʼþÁ´½Ó¡¢Î´½ÓÀ´µç֪ͨ»òδ֪½ðÈÚÉúÒ⾯±¨µÄSMSÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ½«Ä¿µÄÖØ¶¨Ïòµ½ÍйÜFluBot APKµÄÍøÕ¾¡£¡£¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹»áʹÓÃÄ¿µÄµÄÁªÏµÈËÁбí´ÓÒѱ»Ñ¬È¾×°±¸ÖÐÍÆË͵ڶþ²¨SMSÐÂÎÅ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÈôÊÇ×°±¸ÒѾѬȾÁËFluBot£¬£¬£¬£¬£¬£¬£¬½«ÏµÍ³ÖØÖÃΪ³ö³§Ä¬ÈÏÉèÖÃÓ¦¸Ã¿ÉÒÔɨ³ý¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/flubot-android-malware-targets-finland-in-new-sms-campaigns/
5¡¢JFrogÔÚ½üÆÚ·¢Ã÷Ö÷ÒªÕë¶Ô¹¤¿ØÐÐÒµµÄ¶à¸ö¶ñÒânpm°ü
5ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬JFrogÐû²¼±¨¸æ³ÆÔÚ½üÆÚ·¢Ã÷Á˶à¸ö¶ñÒânpm°ü¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ¶Ôpayload¾ÙÐÐÑо¿Ê±£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ËüÃǸ߶ÈÕë¶ÔµÂ¹úµÄ×ÅÃû¹«Ë¾¡£¡£¡£¡£¡£¡£¡£¡£·¢Ã÷µÄ4¸ö¶ñÒâÈí¼þ°üµÄά»¤Õß»®·ÖΪbertelsmannnpm¡¢boschnodemodules¡¢stihlnodemodulesºÍdbschenkernpm¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁ˹ûÕæµÄjavascript-obfuscator°ü¶ÔdropperºÍpayload¾ÙÐлìÏý£¬£¬£¬£¬£¬£¬£¬ÕâÊǺܲ»³£¼ûµÄ¡£¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤5ÔÂ11ÈÕµÄ×îÐÂÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬Ò»¼ÒÃûΪCode WhiteµÄÉøÍ¸²âÊÔ¹«Ë¾Éù³Æ¶Ô´ËÊÂÈÏÕæ¡£¡£¡£¡£¡£¡£¡£¡£
https://jfrog.com/blog/npm-supply-chain-attack-targets-german-based-companies/
6¡¢Check PointÏêÊöÕë¶ÔµÂ¹úÆû³µÐÐÒµ³¤´ïÊýÔµĹ¥»÷»î¶¯
5ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬Check PointÐû²¼ÁËÕë¶ÔµÂ¹ú³¤´ïÊýÔµĹ¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÚ2021Äê7ÔÂ×óÓÒ×îÏÈ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔµÂ¹úµÄÆû³µÖÆÔìÉÌºÍÆû³µ¾ÏúÉÌ¡£¡£¡£¡£¡£¡£¡£¡£´¹ÂÚÓʼþÊÇÓõÂÓïдµÄ£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ò»¸ö±êÓС°³µÁ¾·¢Æ±¡±µÄISO¸½¼þ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ·Ö·¢ÇÔÈ¡ÃÜÂëµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þpayload±»ÍйÜÔÚÒÁÀÊ×¢²áµÄÍøÕ¾£¨"bornagroup[.]ir"£©ÉÏ£¬£¬£¬£¬£¬£¬£¬½áÌõÔ¼Ò»×¢²áÈËµÄÆäËü¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÍƲâ´Ë´Î¹¥»÷ÓëÒÁÀÊÓйء£¡£¡£¡£¡£¡£¡£¡£
https://blog.checkpoint.com/2022/05/10/a-german-car-attack-on-german-vehicle-businesses/


¾©¹«Íø°²±¸11010802024551ºÅ