220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÏà¹ØµÄƾ֤ÔÚ°µÍøÉÏй¶

Ðû²¼Ê±¼ä 2023-06-21

1¡¢220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÏà¹ØµÄƾ֤ÔÚ°µÍøÉÏй¶


¾Ý6ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬CrosswordÔÚ°µÍøÉÏ·¢Ã÷Á˽ü220Íò¸öÓëÓ¢¹ú100Ëù¶¥¼â´óѧÏà¹ØµÄƾ֤£¬£¬£¬£¬£¬ÆäÖÐ57%ÊôÓÚ24ËùÂÞËØ¼¯ÍÅ´óѧ ¡£¡£¡£¡£´óѧµÄλÖú͹æÄ£¶Ôй¶µÄˮƽҲÓÐÓ°Ï죬£¬£¬£¬£¬Â׶صÄΣº¦Òª´óµÃ¶à£¬£¬£¬£¬£¬ÓÐ506330(20%)¸öÖ¤Ê鱻й¶£¬£¬£¬£¬£¬Æä´ÎÊǶ«Äϲ¿(334251£¬£¬£¬£¬£¬Õ¼±È13%)ºÍËÕ¸ñÀ¼(306873£¬£¬£¬£¬£¬12%) ¡£¡£¡£¡£Ñо¿Ö°Ô±»¹Í¸Â¶£¬£¬£¬£¬£¬Áè¼ÝÒ»°ë£¨54%£©µÄй¿à´×ÔÓµÓÐÑо¿ÉèÊ©µÄÓ¢¹ú´óѧ£¬£¬£¬£¬£¬Õþ¸®×ÊÖúµÄºËÄܺ͹ú·ÀµÈÁìÓòµÄÏîÄ¿¿ÉÄÜÃæÁÙΣº¦ ¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/millions-uk-university-credentials/


2¡¢Cyfirma·¢Ã÷DoNotαװ³ÉVPNºÍ̸ÌìÓ¦ÓõÄÌØ¹¤Èí¼þ


¾Ý6ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬Cyfirma³ÆÆäÔÚGoogle PlayÉÏ·¢Ã÷ÁË¿ÉÒɵÄÓ¦ÓÃnSure ChatºÍiKHfaa VPN£¬£¬£¬£¬£¬ËüÃǶ¼ÊÇ´ÓSecurITY IndustryÉÏ´«µÄ ¡£¡£¡£¡£½øÒ»²½µÄÆÊÎö֤ʵËüÃǾßÓжñÒâÈí¼þÌØÕ÷£¬£¬£¬£¬£¬²¢±»¹éÒòÓÚÓ¡¶ÈÏà¹ØºÚ¿ÍÍÅ»ïDoNot ¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯Ö÷ÒªÕë¶Ô°Í»ù˹̹£¬£¬£¬£¬£¬Ö¼ÔÚ´ÓÄ¿µÄ×°±¸ÍøÂçÇ鱨£¬£¬£¬£¬£¬ÀýÈçλÖÃÊý¾ÝºÍÁªÏµÈËÁÐ±í ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÓëÕâÁ½¿îÓ¦ÓÃÀ´×Ôͳһ¿¯ÐÐÉ̵ĵÚÈý¿îÓ¦ÓÃËÆºõûÓжñÒ⣬£¬£¬£¬£¬µ«ÈÔ¿ÉÔÚGoogle PlayÉÏʹÓà ¡£¡£¡£¡£


https://www.cyfirma.com/outofband/donot-apt-elevates-its-tactics-by-deploying-malicious-android-apps-on-google-play-store/


3¡¢BitdefenderÅû¶Õë¶ÔmacOSµÄ¹¤¾ß°üµÄ×é¼þµÄϸ½Ú


BitdefenderÔÚ6ÔÂ16ÈÕ͸¶Æä·¢Ã÷ÁËÒ»×é¾ßÓкóÃŹ¦Ð§µÄ¶ñÒâÎļþ£¬£¬£¬£¬£¬²¢ÍƶÏÊÇÕë¶ÔApple macOSϵͳµÄÖØ´ó¹¤¾ß°üµÄÒ»²¿·Ö ¡£¡£¡£¡£ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬Ñù±¾µÄ´ó²¿·ÖÈÔδ±»·¢Ã÷ ¡£¡£¡£¡£Ñо¿Ö°Ô±¹²ÆÊÎöÁËÉÏ´«µ½VirusTotalµÄËĸöÑù±¾£¬£¬£¬£¬£¬ÆäÖÐ×îÔçµÄÓÚ4ÔÂ18ÈÕÓÉÄäÃûÓû§ÉÏ´« ¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄ¶ñÒâÎļþ»®·ÖÊÇÒ»¸öͨÓõÄPythonºóÃÅshared.dat£¬£¬£¬£¬£¬Ò»¸öǿʢµÄºóÃÅsh.py£¬£¬£¬£¬£¬ÒÔ¼°Ò»¸öFAT¶þ½øÖÆÎļþxcc ¡£¡£¡£¡£Bitdefender½«Python×é¼þ¸ú×ÙΪJokerSpy ¡£¡£¡£¡£


https://www.bitdefender.com/blog/labs/fragments-of-cross-platform-backdoor-hint-at-larger-mac-os-attack/


4¡¢eSentire¼ì²âµ½Ê¹ÓÃOnlyFansÒ³Ãæ·Ö·¢DcRATµÄ»î¶¯


6ÔÂ15ÈÕ£¬£¬£¬£¬£¬eSentire³ÆÆä¼ì²âµ½ÁËʹÓÃαÔìµÄOnlyFansµÈÓÕ¶ü·Ö·¢DcRATµÄ»î¶¯ ¡£¡£¡£¡£¸Ã»î¶¯×Ô1ÔÂÒÔÀ´Ò»Ö±ÔÚ»îÔ¾£¬£¬£¬£¬£¬Èö²¥°üÀ¨VBScript¼ÓÔØ³ÌÐòµÄZIPÎļþ£¬£¬£¬£¬£¬È»ºóÓÕʹĿµÄÊÖ¶¯Ö´ÐÐ ¡£¡£¡£¡£VBScript¼ÓÔØ³ÌÐòÆô¶¯Ê±£¬£¬£¬£¬£¬»áʹÓÃWMI¼ì²é²Ù×÷ϵͳ¼Ü¹¹²¢ÌìÉú32λÀú³Ì ¡£¡£¡£¡£Õâʹ¶ñÒâÈí¼þÄܹ»»á¼ûDynamicWrapperX ¡£¡£¡£¡£×îÖÕ£¬£¬£¬£¬£¬ÃûΪBinaryDataµÄpayload»á±»¼ÓÔØµ½Äڴ棬£¬£¬£¬£¬²¢×¢ÈëRegAsm.exeÀú³Ì ¡£¡£¡£¡£×¢ÈëµÄpayloadÊÇDcRAT£¬£¬£¬£¬£¬ËüÊÇAsyncRATµÄÐ޸İ汾£¬£¬£¬£¬£¬¿ÉÔÚGitHubÉÏÃâ·Ñ»ñµÃ ¡£¡£¡£¡£


https://www.esentire.com/blog/onlydcratfans-malware-distributed-using-explicit-lures-of-onlyfans-pages-and-other-adult-content


5¡¢Ñо¿Ö°Ô±Åû¶΢ÈíAzure ADÉí·ÝÑéÖ¤Îó²înOAuth


¾ÝýÌå6ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬DescopeÅû¶ÁËMicrosoft Azure AD OAuthÓ¦ÓóÌÐòÖеÄÒ»¸öÑÏÖØµÄ¹ýʧÉèÖà ¡£¡£¡£¡£Ëü±»³ÆÎªnOAuth£¬£¬£¬£¬£¬ÊÇÒ»¸öÉí·ÝÑéÖ¤Îó²î ¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ýÐÞ¸ÄAzure ADÕÊ»§Öеĵç×ÓÓʼþÊôÐÔ£¬£¬£¬£¬£¬²¢Ê¹ÓÃËûÃÇÏëҪð³äµÄÄ¿µÄµÄµç×ÓÓʼþµØµãÀ´Ê¹ÓÃÒ»¼üʽµÄ¡°Ê¹ÓÃMicrosoftµÇ¼¡±¹¦Ð§£¬£¬£¬£¬£¬´Ó¶øÍêÈ«½Ó»á¼Æ»§ ¡£¡£¡£¡£Microsoft½«¸ÃÎÊÌâÐÎòΪ"Azure ADÓ¦ÓóÌÐòÖÐʹÓõIJ»Çå¾²µÄ·´Ä£Ê½"£¬£¬£¬£¬£¬ÒÑͨ¹ýÐû²¼»º½â²½·¥½â¾öÁËÕâÒ»ÎÊÌâ ¡£¡£¡£¡£


https://www.securityweek.com/researchers-flag-account-takeover-flaw-in-microsoft-azure-ad-oauth-apps/


6¡¢Check PointÐû²¼ÏÖÔÚÈÔÔÚ¾ÙÐеĴ¹ÂڻµÄ±¨¸æ


6ÔÂ19ÈÕ£¬£¬£¬£¬£¬Check Point Research(CPR)Ðû²¼±¨¸æ³Æ¼ì²âµ½ÁËÒ»¸öÕýÔÚ¾ÙÐеĴ¹Âڻ ¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃÁ˶à¸ö°æ±¾µÄÓʼþºÍһЩ²î±ðµÄHTMLÄ£°å ¡£¡£¡£¡£ÎªÁËʹµÇÂ¼Ò³Ãæ¿´ÆðÀ´¸üÕýµ±£¬£¬£¬£¬£¬¹¥»÷ÕßÒѾ­ÔÚ±íµ¥ÖÐÌîдÁËÄ¿µÄµÄµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬ÕâÊÇÓ²±àÂëÔÚHTMLÎļþÖÐµÄ ¡£¡£¡£¡£Ò»µ©Ä¿µÄÊäÈëÁËÆ¾Ö¤²¢ÊÔͼµÇ¼£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢¾Í»áÖ±½Ó·¢Ë͵½¹¥»÷ÕßµÄÓÊÏäÀï ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¹¥»÷Õß¶ÔÕýµ±Ð§À͵ÄʹÓÃÓÐËùÔöÌí£¬£¬£¬£¬£¬ÕâÔöÌíÁ˵ÖÓù´ËÀ๥»÷µÄÄÑÌâ ¡£¡£¡£¡£


https://blog.checkpoint.com/security/sign-in-to-continue-and-suffer-attackers-abusing-legitimate-services-for-credential-theft/