ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÔÝʱÖÐÖ¹
Ðû²¼Ê±¼ä 2023-04-251¡¢ÃÀ¹úˮʦ³Ð°üÉÌFMGÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÔËÓªÔÝʱÖÐÖ¹
¾ÝýÌå4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÃÀ¹úˮʦ³Ð°üÉÌFincantieri Marine Group(FMG)Ôâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬Ó°ÏìÁËÆäµç×ÓÓʼþЧÀÍÆ÷ºÍ²¿·Öϵͳ¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ4ÔÂ12ÈÕÇåÔ磬£¬£¬£¬£¬¸ÃÔì´¬³§Í¸Â¶£¬£¬£¬£¬£¬¹¥»÷Õë¶ÔµÄЧÀÍÆ÷Ö÷ÒªÓÃÓÚÉúÑÄÏòÆäÅÌËã»úÊý¿ØÖÆÔì×°±¸ÌṩָÁîµÄÊý¾Ý£¬£¬£¬£¬£¬µ¼ÖÂËüÃÇå´»úÊýÌì¡£¡£¡£¡£¡£ÏÖÔÚûÓÐÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢Êܵ½Ó°Ïì¡£¡£¡£¡£¡£ÃÀ¹úˮʦÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬£¬FMGÒѽÓÄɲ½·¥¾ÙÐÐÏìÓ¦£¬£¬£¬£¬£¬Ë®Ê¦ÕýÔÚÆð¾¢¼àÊÓÕâЩÊÂÇé¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/us-navy-contractor-cyberattack/
2¡¢Ë¹Ì¹¸£µÈ¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢FortniteÀ¬»øÓʼþ
¾Ý4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÃÀ¹ú¶àËù´óѧµÄÍøÕ¾±»ºÚ²¢·Ö·¢±¤ÀÝÖ®Ò¹£¨Fortnite£©ºÍÀñÎ│À¬»øÓʼþ¡£¡£¡£¡£¡£É漰˹̹¸£´óѧ¡¢ÂéÊ¡Àí¹¤Ñ§Ôº¡¢²®¿ËÀû´óѧºÍ¼ÓÖÝÀí¹¤Ñ§ÔºµÈ´óѧ£¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾ËÆºõÔÚÔËÐÐTWiki»òMediaWiki¡£¡£¡£¡£¡£ÕâЩwikiÒ³Ãæ¾Ý³ÆÊÇÓÉÀ¬»øÓʼþ·¢ËÍÕßÉÏ´«µÄ£¬£¬£¬£¬£¬Éù³ÆÌṩÃâ·ÑÀñÎ│¡¢Fortnite BucksºÍ×÷±×Æ÷µÈ¡£¡£¡£¡£¡£ËüÃÇ»á¼ÓÔØÎ±×°³ÉFortniteÒ³ÃæµÄ´¹ÂÚÍøÒ³£¬£¬£¬£¬£¬»òÔÊÐíÌṩÀñÎ│µÄÐéαµÄÊӲ졣¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸Ã»î¶¯»¹Õë¶Ô°ÍÎ÷ijÖÝÕþ¸®µÄÒ»¸öСÐÍÍøÕ¾£¬£¬£¬£¬£¬ÒÔ¼°Å·Ã˵ÄEuropa.eu¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/university-websites-using-mediawiki-twiki-hacked-to-serve-fortnite-spam/
3¡¢Infobloxͨ¹ýÒì³£DNSÁ÷Á¿¼ì²â·¢Ã÷еÄDecoy Dog
InfobloxÓÚ4ÔÂ20Èճƣ¬£¬£¬£¬£¬ËûÃÇÔÚ¼ì²âÒì³£DNSÁ÷Á¿ºó£¬£¬£¬£¬£¬·¢Ã÷ÁËÒ»ÖÖеĶñÒâÈí¼þ¹¤¾ß°üDecoy Dog¡£¡£¡£¡£¡£¸Ã¹¤¾ßÖ¼ÔÚ×ÊÖú¹¥»÷Õßͨ¹ýÕ½ÂÔÐÔµÄÓòÃûÀÏ»¯ºÍDNSÅÌÎÊÔËÔØÀ´Èƹý¼ì²â£¬£¬£¬£¬£¬ÆäDNSÖ¸ÎÆÔÚ»¥ÁªÍøÉÏ3.7ÒÚ¸ö»îÔ¾ÓòÖм«ÎªÓÐÊý¡£¡£¡£¡£¡£¶Ô¸Ã¹¤¾ß»ù´¡ÉèÊ©µÄÊӲ췢Ã÷Á˼¸¸öÓëͳһÐж¯ÓйصÄC2Óò£¬£¬£¬£¬£¬ËüÃǵĴ󲿷ÖͨѶÀ´×Ô¶íÂÞ˹µÄÖ÷»ú¡£¡£¡£¡£¡£ÕâЩÓòÃûµÄDNSËíµÀ¾ßÓÐÖ¸ÏòPupy RATµÄÌØÕ÷£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öÓÉDecoy Dog¹¤¾ß°ü°²ÅŵÄÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£¡£
https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic/
4¡¢AquaÅû¶ʹÓÃKubernetes RBACµÄ´ó¹æÄ£ÍÚ¿ó»î¶¯
AquaÔÚ4ÔÂ21ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸ö´ó¹æÄ£µÄÍÚ¿ó»î¶¯£¬£¬£¬£¬£¬Ê¹ÓÃÁËKubernetes(K8s)»ùÓÚ½ÇÉ«µÄ»á¼û¿ØÖÆ(RBAC)½¨ÉèºóÃŲ¢ÔËÐп󹤡£¡£¡£¡£¡£Í¨¹ýʹÓÃRBACʵÑé¶ñÒâ»á¼û¿ØÖÆÕ½ÂÔ£¬£¬£¬£¬£¬×ÝÈ»Ìṩ³õʼ»á¼ûµÄ¹ýʧÉèÖÃÔÚδÀ´»ñµÃÐÞ¸´£¬£¬£¬£¬£¬¹¥»÷ÕßÒ²¿ÉÒÔÔÚ±»Ñ¬È¾µÄ¼¯ÈºÉÏÒ»Á¬±£´æ¡£¡£¡£¡£¡£¹¥»÷Á´Ê¹ÓÃÉèÖùýʧµÄAPIЧÀÍÆ÷¾ÙÐгõʼ»á¼û£¬£¬£¬£¬£¬È»ºó·¢ËÍHTTPÇëÇóÒÔÁгöÉñÃØ£¬£¬£¬£¬£¬²¢·¢³öAPIÇëÇóÒÔͨ¹ýÁгöÃüÃû¿Õ¼äkube-systemÖеÄʵÌåÀ´ÍøÂçÓйؼ¯ÈºµÄÐÅÏ¢¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¹¥»÷Õß»¹×°ÖÃDaemonSetsÀ´½ÓÊܺÍÐ®ÖÆ±»¹¥»÷µÄK8s¼¯ÈºµÄ×ÊÔ´¡£¡£¡£¡£¡£
https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters
5¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃGoogle Ads·Ö·¢BumbleBeeµÄ»î¶¯
4ÔÂ20ÈÕ£¬£¬£¬£¬£¬SecureWorksÅû¶ÁËʹÓÃGoogle AdsºÍSEOÖж¾·Ö·¢BumbleBeeµÄ»î¶¯¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷Ò»¸öGoogle AdÐû´«ÁËÐéαµÄCisco AnyConnectÇå¾²ÒÆ¶¯¿Í»§¶ËÏÂÔØÒ³Ãæ£¬£¬£¬£¬£¬Ëü½¨ÉèÓÚ2ÔÂ16ÈÕ£¬£¬£¬£¬£¬ÍйÜÔÚappcisco[.]comÓòÉÏ¡£¡£¡£¡£¡£¸ÃÒ³ÃæÍÆ¹ãľÂí»¯MSI×°ÖóÌÐòcisco-anyconnect-4_9_0195.msi£¬£¬£¬£¬£¬Ëü»á×°ÖöñÒâÈí¼þBumbleBee¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÆäËü¾ßÓÐÀàËÆ¶ÔÓ¦ÎļþÃû³ÆµÄÈí¼þ°ü£¬£¬£¬£¬£¬ÀýÈçZoomInstaller.exeºÍzoom.ps1£¬£¬£¬£¬£¬ChatGPT.msiºÍchch.ps1£¬£¬£¬£¬£¬ÒÔ¼°CitrixWorkspaceApp.exeºÍcitrix.ps1¡£¡£¡£¡£¡£
https://www.secureworks.com/blog/bumblebee-malware-distributed-via-trojanized-installer-downloads
6¡¢HuntressÐû²¼PaperCutÎó²îʹÓûµÄÆÊÎö±¨¸æ
4ÔÂ21ÈÕ£¬£¬£¬£¬£¬HuntressÐû²¼±¨¸æ£¬£¬£¬£¬£¬³ÆÆä·¢Ã÷ÁËʹÓÃPaperCut MF/NGÎó²îµÄ»î¶¯¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²î£¨CVE-2023-27350ºÍCVE-2023-27351£©¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÓÚÒÔSYSTEMȨÏÞÔÚ±»Ñ¬È¾µÄPaperCutЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷´ÓPaperCutÈí¼þÖÐÌìÉúµÄPowerShellÏÂÁ£¬£¬£¬£¬ÓÃÓÚ×°ÖÃAteraºÍSyncroµÈRMMÈí¼þ£¬£¬£¬£¬£¬ÒÔ±ãÔÚÄ¿µÄÖ÷»úÒ»Á¬»á¼ûºÍÖ´ÐдúÂë¡£¡£¡£¡£¡£»£»£»£»£»ù´¡ÉèÊ©ÆÊÎö·¢Ã÷£¬£¬£¬£¬£¬ÍйÜÕâЩ¹¤¾ßµÄÓòÃûÓÚ4ÔÂ12ÈÕ×¢²á£¬£¬£¬£¬£¬Ò²ÍйÜTrueBotµÈ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬ºóÕßÓë¶íÂÞ˹SilenceÍÅ»ïÓйء£¡£¡£¡£¡£
https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software