Microsoft 365ÒòECS°²ÅŹýʧȫÇò¹æÄ£ÄÚÖÐÖ¹5Сʱ
Ðû²¼Ê±¼ä 2022-07-25
¾Ý7ÔÂ23ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬£¬Î¢Èí͸¶ÉÏÖܳ¤´ï5СʱµÄMicrosoft 365È«Çò¹æÄ£ÄÚÖÐÖ¹ÊÇÓÉÆóÒµÉèÖÃЧÀÍ(ECS)°²ÅŹýʧµ¼Öµġ£¡£¡£ECSЧÀ͵ݲÅű£´æ´úÂëȱÏÝ£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÆäÏòºó¼æÈÝÐÔ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂʹÓÃECSµÄЧÀÍ£¬£¬£¬£¬£¬£¬£¬½«ÏòÆäËùÓеÄÏàÖúͬ°é·µ»Ø²»×¼È·µÄÉèÖᣡ£¡£Ò£²âÅú×¢£¬£¬£¬£¬£¬£¬£¬Ô¼ÄªÓÐ30Íò¸öºô½ÐÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬ÓÉÓÚӪҵʱ¼äÓëÓ°Ïì´°¿ÚÏàÎǺϣ¬£¬£¬£¬£¬£¬£¬ÑÇÌ«µØÇøÊܵ½µÄÓ°Ïì×î´ó¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Ö±½Ó·ÓɺÍSkype MFAÊÇÊÜÓ°Ïì×î´óµÄЧÀÍ¡£¡£¡£ÖÐÖ¹×îÏÈÓÚ7ÔÂ21ÈÕÆÆÏþ1:05 UTC×îÏÈ£¬£¬£¬£¬£¬£¬£¬µ±ÈÕÔçÉÏ6:00 UTC֮ǰ´ó²¿·ÖÒѱ»ÐÞ¸´¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/massive-microsoft-365-outage-caused-by-faulty-ecs-deployment/
2¡¢¹¥»÷ÕßÔÚ°µÍøÒÔ3ÍòÃÀÔª³öÊÛ540ÍòTwitterÓû§µÄÐÅÏ¢
¾ÝýÌå7ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÃûΪdevilµÄºÚ¿Í³ÆÆäʹÓÃÎó²î»á¼ûÁË5485636ÃûTwitterÓû§µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢ÒÔÖÁÉÙ30000ÃÀÔªµÄ¼ÛÇ®¾ÙÐгöÊÛ¡£¡£¡£ÓÃÓÚÍøÂçÊý¾ÝµÄÎó²îÓÚ1ÔÂ1±»Åû¶²¢ÓÚ1ÔÂ13ÈÕÐÞ¸´£¬£¬£¬£¬£¬£¬£¬¿É±»Î´¾Éí·ÝÑéÖ¤¹¥»÷ÕßÓÃÀ´Í¨¹ýµç»°ºÅÂëºÍÓʼþÀ´»ñÈ¡í§ÒâÓû§µÄTwitter ID¡£¡£¡£¹¥»÷ÕßÌåÏÖËûÃÇÔÚ2021Äê12Ô¾Í×îÏÈʹÓÃÎó²îÍøÂçÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÒÑÓиÐÐËȤµÄÂò¼ÒÓëËûÃǾÙÐÐÁªÏµ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬TwitterÉÐδȷÈÏ´Ë´Îй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬¶øÂô¼ÒÒÑɾ³ý¸Ã¹ã¸æ¡£¡£¡£
https://securityaffairs.co/wordpress/133593/data-breach/twitter-leaked-data.html
3¡¢Securonix·¢Ã÷APT37ʹÓÃKonni¹¥»÷Å·ÖÞ¶à¹úµÄ»î¶¯
7ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬Securonix³ÆÆä·¢Ã÷Á˳¯Ïʹ¥»÷ÕßAPT37ʹÓÃKonniÕë¶Ô½Ý¿ËºÍ²¨À¼µÈÅ·ÖÞ¹ú¼ÒµÄ¹¥»÷¡£¡£¡£Ôڴ˻ÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÔ¶³Ì»á¼ûľÂíKonni£¬£¬£¬£¬£¬£¬£¬¹¥»÷ʼÓÚÒ»·â°üÀ¨WordÎĵµ(missile.docx)ºÍWindows¿ì½Ý·½·¨Îļþ(weapons.doc.lnk.lnk)¸½¼þµÄ´¹ÂÚÓʼþ¡£¡£¡£·¿ªLNKºó»áÖ´ÐдúÂëÀ´ÔÚDOCXÎļþÖвéÕÒbase64±àÂëµÄPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬£¬È»ºó½¨ÉèC2ͨѶ²¢ÏÂÔØÁ½¸öÎļþ¡°weapons.doc¡±ºÍ¡°wp.vbs¡±¡£¡£¡£ÕâЩÎļþÖ»ÊÇÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬Í¬Ê±£¬£¬£¬£¬£¬£¬£¬ºǫ́»á¾²Ä¬µØÔËÐÐVBSÎļþ£¬£¬£¬£¬£¬£¬£¬×îÖÕÏÂÔØKonni¡£¡£¡£
https://www.securonix.com/blog/stiffbizon-detection-new-attack-campaign-observed/
4¡¢Êý×ÖÇå¾²¹«Ë¾EntrustÔâµ½¹¥»÷ºóÄÚ²¿ÏµÍ³Êý¾Ý±»µÁ
ýÌå7ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Entrust³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÄÚ²¿ÏµÍ³ÖеÄÊý¾Ý±»µÁ¡£¡£¡£EntrustÊÇÒ»¼ÒרעÓÚÔÚÏßÐÅÈκÍÉí·ÝÖÎÀíµÄÇå¾²¹«Ë¾£¬£¬£¬£¬£¬£¬£¬Ìṩ°üÀ¨¼ÓÃÜͨѶ¡¢Çå¾²Êý×ÖÖ§¸¶ºÍÉí·Ý֤ʵ½â¾ö¼Æ»®µÈЧÀÍ¡£¡£¡£¹¥»÷±¬·¢ÔÚ6ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾²¢Î´Ìṩ¹ØÓÚ¸ÃÊÂÎñµÄ¸ü¶àϸ½Ú£¬£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±Ïàʶµ½Ò»¸öÖøÃûµÄÀÕË÷ÍÅ»ïÊÇÄ»ºóºÚÊÖ¡£¡£¡£±»µÁÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜ»áÓ°Ïì´ó×ÚʹÓÃEntrust¾ÙÐÐÉí·ÝÖÎÀíºÍÉí·ÝÑéÖ¤µÄ×éÖ¯£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÃÀ¹úÕþ¸®»ú¹¹£¬£¬£¬£¬£¬£¬£¬ÈçÄÜÔ´²¿¡¢ÁìÍÁÇå¾²²¿¡¢²ÆÎñ²¿¡¢ÎÀÉúÓ빫ÖÚЧÀͲ¿¡¢ÍËÎéÎäÊ¿ÊÂÎñ²¿ºÍũҵ²¿µÈµÈ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/digital-security-giant-entrust-breached-by-ransomware-gang/
5¡¢Cisco͸¶Õë¶ÔÎÚ¿ËÀ¼Ä³´óÐÍÈí¼þ¹«Ë¾µÄ¹¥»÷µÄϸ½Ú
CiscoÔÚ7ÔÂ21ÈÕÅû¶ÁËÕë¶ÔÎÚ¿ËÀ¼Ä³´óÐÍÈí¼þ¹«Ë¾µÄ¹¥»÷»î¶¯µÄϸ½Ú¡£¡£¡£Õâ¼ÒÈí¼þ¹«Ë¾Éú²úµÄÈí¼þ¹©ÎÚ¿ËÀ¼¶à¸ö¹ú¼Ò»ú¹¹ËùʹÓ㬣¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñ¿ÉÄÜÓë¶íÂÞ˹Óйأ¬£¬£¬£¬£¬£¬£¬ÒԸù«Ë¾ÎªÄ¿µÄÍýÏë·¢¶¯¹©Ó¦Á´¹¥»÷¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓÃÁËÒ»¸öÃûΪGoMetµÄ¿ªÔ´ºóÃŵÄ×Ô½ç˵±äÌ壬£¬£¬£¬£¬£¬£¬Ö»ÓÐÁ½Æð¼Í¼ÔÚ°¸µÄ»î¶¯Ê¹Óùý¸ÃºóÃÅ£º2020Äê¹¥»÷ÕßʹÓÃF5 BIG-IPÖÐÎó²î£¨CVE-2020-5902£©ÈëÇÖϵͳ²¢×°ÖÃÕâ¸öºóÃÅ£»£»£»£»£»£»½üÆÚ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚʹÓÃSophos FirewallÖÐÎó²î£¨CVE-2022-1040£©ºó×°ÖúóÃÅ¡£¡£¡£
https://blog.talosintelligence.com/2022/07/attackers-target-ukraine-using-gomet.html
6¡¢SonicWalÐû²¼SQL×¢ÈëÎó²îCVE-2022-22280µÄÇ徲ͨ¸æ
SonicWallÔÚ7ÔÂ22ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬ÌáÐÑÓ°ÏìGMS£¨È«ÇòÖÎÀíϵͳ£©ºÍAnalytics On-Prem²úÆ·µÄSQL×¢ÈëÎó²î¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2022-22280£¬£¬£¬£¬£¬£¬£¬ÊǶÔSQLÏÂÁîÖÐʹÓõÄÌØÊâÔªËØµÄ²»×¼È·Öк͵¼Öµģ¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.4£¬£¬£¬£¬£¬£¬£¬ÎÞÐèÉí·ÝÑéÖ¤»òÓû§½»»¥¼´¿ÉʹÓᣡ£¡£SonicWallÌåÏÖ˵£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÉÐδ±»ÔÚҰʹÓ㬣¬£¬£¬£¬£¬£¬Ò²Ã»ÓÐÕë¶Ô´ËÎó²îµÄ¿´·¨Ö¤Êµ(PoC)¡£¡£¡£´ËÎó²îûÓпÉÓõĽâ¾öÒªÁ죬£¬£¬£¬£¬£¬£¬Òò´ËSonicWallÇ¿ÁÒ½¨ÒéʹÓÃÊÜÓ°Ïì²úÆ·µÄ×éÖ¯Á¬Ã¦Éý¼¶µ½ÏìÓ¦µÄÐÞ¸´°æ±¾¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sonicwall-patch-critical-sql-injection-bug-immediately/