Colonial PipelineÒòÎ¥·´Äþ¾²¹æ¶¨±»· £¿î½ü100ÍòÃÀÔª

Ðû²¼Ê±¼ä 2022-05-12
1¡¢Colonial PipelineÒòÎ¥·´Äþ¾²¹æ¶¨±»· £¿î½ü100ÍòÃÀÔª


¾ÝýÌå5ÔÂ10ÈÕ±¨µÀ £¬ÒòÎ¥·´Áª°îÄþ¾²¹æÔò £¬Colonial Pipeline±»ÃÀ¹úÔËÊ䲿¹ÜµÀºÍΣÏÕÖÊÁÏÄþ¾²¹ÜÀí¾Ö(PHMSA)· £¿î986400ÃÀÔª¡£2021Äê5Ô³õ £¬ÃÀ¹ú×î´óȼÁϹܵÀÔËÓªÉÌColonial PipelineÔâµ½DarkSideµÄÀÕË÷¹¥»÷ £¬µ¼ÖÂÌìÈ»Æø¹©Ó¦ÖжÏ £¬Ê¹17¸öÖݽøÈë½ô¼±×´Ì¬¡£PHMSAÌåÏָù«Ë¾Î´¶ÔÊÖ¶¯¹Ø±ÕºÍÖØÐÂÆô¶¯Æä¹ÜµÀϵͳ×öºÃ³äʵµÄ¼Æ»® £¬Æä¹ÜµÀÔÚ2021Äê5ÔµĹ¥»÷ºóÎÞ·¨Ê¹ÓÃʱ £¬¶ÔÈ«¹úÔì³ÉÁËÑÏÖØÓ°Ïì¡£


https://thehackernews.com/2022/05/us-proposes-1-million-fine-on-colonial.html


2¡¢»ÝÆÕÐû²¼BIOS¸üР£¬ÐÞ¸´Ó°Ïì200¶à¸öÐͺŵÄ©¶´


5ÔÂ11ÈÕ £¬»ÝÆÕÐû²¼5Ô·ÝBIOS¸üР£¬ÐÞ¸´ÁË2¸öÓ°Ïì´óÁ¿PCºÍÌõ¼Ç±¾²úÎïµÄ©¶´¡£Õâ2¸ö©¶´·Ö±ðΪCVE-2021-3808ºÍCVE-2021-3809 £¬CVSSÆÀ·Ö¾ùΪ8.8¡£Ä¿Ç° £¬»ÝÆÕÉÐδÌṩÓйØÕâЩ©¶´µÄ¼¼Êõϸ½Ú¡£¾ÝÑо¿ÈËԱ͸¶ £¬¹¥»÷Õß¿ÉÀûÓé¶´ÒÔÄں˼¶È¨ÏÞ£¨CPL==0£©Ö´ÐÐ £¬Éý¼¶µ½ÏµÍ³¹ÜÀíģʽ£¨SMM£©¡£ÔÚSMMģʽÏÂÖ´ÐÐ £¬¹¥»÷Õß¿ÉÒÔ»ñµÃ¶ÔÖ÷»úµÄÈ«²¿È¨ÏÞ £¬´Ó¶øÖ´ÐнøÒ»²½µÄ¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/hp-fixes-bug-letting-attackers-overwrite-firmware-in-over-200-models/


3¡¢Ô¼2100Íò¸öVPNÓû§µÄ¸öÈËÐÅÏ¢ÔÚTelegramÉϱ»¹ûÈ»


¾ÝVPNMentorÔÚ5ÔÂ9Èյı¨µÀ £¬Ô¼2100Íò¸öVPNÓû§µÄ¸öÈËÐÅÏ¢Òѱ»Ð¹Â¶¡£¸ÃSQLת´¢ÓÚ5ÔÂ7ÈÕÔÚTelegramÉÏÐû²¼ £¬¾ÞϸΪ10 GB £¬°üÂÞGeckoVPN¡¢SuperVPNºÍChatVPNµÈ¶à¸öVPN·þÎñµÄÓû§µÄÐÅÏ¢ £¬Éæ¼°ÓʼþµØÖ·¡¢Óû§Ãû¡¢ÐÕÃû¡¢¹ú¼Ò¡¢ÃÜÂë×Ö·û´®¡¢½áËãÃ÷ϸºÍ״̬µÈ¡£Ñо¿ÈËÔ±Ö¸³ö £¬VPNÓû§¸üÖØÊÓÒþ˽ºÍÄäÃûÐÔ £¬Òò´ËËûÃǵÄÊý¾Ý¸üÓмÛÖµ £¬µ±Æä¸öÈËÐÅϢй¶ʱ £¬ËûÃǸü¿ÉÄÜÔâµ½ÀÕË÷¹¥»÷¡£


https://www.vpnmentor.com/blog/vpns-leaked-on-telegram/


4¡¢NCSC-FIÐû²¼Android¶ñÒâÈí¼þFluBot»î¶¯¼¤ÔöµÄͨ¸æ


5ÔÂ10ÈÕ £¬·ÒÀ¼¹ú¼ÒÍøÂçÄþ¾²ÖÐÐÄ(NCSC-FI) Ðû²¼Í¨¸æ £¬³ÆAndroid¶ñÒâÈí¼þFluBotµÄ»î¶¯¼¤Ôö¡£FluBotÔËÓªÍÅ»ïʹÓÃÁ˰üÂÞÓïÒôÓʼþÁ´½Ó¡¢Î´½ÓÀ´µç֪ͨ»òδ֪½ðÈÚ½»Ò×¾¯±¨µÄSMSÏûÏ¢ £¬Ö¼ÔÚ½«Ä¿±êÖØ¶¨Ïòµ½ÍйÜFluBot APKµÄÍøÕ¾¡£Ö®ºó £¬¹¥»÷Õß»¹»áʹÓÃÄ¿±êµÄÁªÏµÈËÁбí´ÓÒѱ»Ñ¬È¾É豸ÖÐÍÆË͵ڶþ²¨SMSÏûÏ¢¡£Ñо¿ÈËÔ±ÌåÏÖ £¬Èç¹ûÉ豸ÒѾ­Ñ¬È¾ÁËFluBot £¬½«ÏµÍ³ÖØÖÃΪ³ö³§Ä¬ÈÏÉèÖÃÓ¦¸Ã¿ÉÒÔÇå³ý¶ñÒâÈí¼þ¡£


https://www.bleepingcomputer.com/news/security/flubot-android-malware-targets-finland-in-new-sms-campaigns/


5¡¢JFrogÔÚ½üÆÚ·¢ÏÖÖ÷ÒªÕë¶Ô¹¤¿ØÐÐÒµµÄ¶à¸ö¶ñÒânpm°ü


5ÔÂ10ÈÕ £¬JFrogÐû²¼³ÂËß³ÆÔÚ½üÆÚ·¢ÏÖÁ˶à¸ö¶ñÒânpm°ü¡£Ñо¿ÈËÔ±ÔÚ¶Ôpayload½øÐÐÑо¿Ê± £¬·¢ÏÖËüÃǸ߶ÈÕë¶ÔµÂ¹úµÄÖªÃû¹«Ë¾¡£·¢ÏÖµÄ4¸ö¶ñÒâÈí¼þ°üµÄά»¤Õß·Ö±ðΪbertelsmannnpm¡¢boschnodemodules¡¢stihlnodemodulesºÍdbschenkernpm¡£´ËÍâ £¬¹¥»÷ÕßʹÓÃÁ˹ûÈ»µÄjavascript-obfuscator°ü¶ÔdropperºÍpayload½øÐлìÏý £¬ÕâÊǺܲ»³£¼ûµÄ¡£Æ¾¾Ý5ÔÂ11ÈÕµÄ×îÐÂÏûÏ¢ £¬Ò»¼ÒÃûΪCode WhiteµÄÉøÍ¸²âÊÔ¹«Ë¾Éù³Æ¶Ô´ËÊÂÂôÁ¦¡£


https://jfrog.com/blog/npm-supply-chain-attack-targets-german-based-companies/


6¡¢Check PointÏêÊöÕë¶ÔµÂ¹úÆû³µÐÐÒµ³¤´ïÊýÔµĹ¥»÷»î¶¯


5ÔÂ10ÈÕ £¬Check PointÐû²¼ÁËÕë¶ÔµÂ¹ú³¤´ïÊýÔµĹ¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£¸Ã»î¶¯ÓÚ2021Äê7ÔÂ×óÓÒ¿ªÊ¼ £¬Ä¿Ç°ÈÔÔÚ½øÐÐÖÐ £¬Ö÷ÒªÕë¶ÔµÂ¹úµÄÆû³µÖÆÔìÉÌºÍÆû³µ¾­ÏúÉÌ¡£µöÓãÓʼþÊÇÓõÂÓïдµÄ £¬ÆäÖаüÂÞÒ»¸ö±êÓС°³µÁ¾·¢Æ±¡±µÄISO¸½¼þ £¬Ö¼ÔÚ·Ö·¢ÇÔÈ¡ÃÜÂëµÄ¶ñÒâÈí¼þ¡£¶ñÒâÈí¼þpayload±»ÍйÜÔÚÒÁÀÊ×¢²áµÄÍøÕ¾£¨"bornagroup[.]ir"£©ÉÏ £¬½áºÏͬһע²áÈËµÄÆäËü¹¥»÷»î¶¯ £¬Ñо¿ÈËÔ±ÍÆ²â´Ë´Î¹¥»÷ÓëÒÁÀÊÓйØ¡£


https://blog.checkpoint.com/2022/05/10/a-german-car-attack-on-german-vehicle-businesses/