ºÚ¿ÍʹÓÃGoogleÔÆ´¹ÂÚ¹¥»÷ÇÔÈ¡Office 365ƾ֤ £»ºÚ¿ÍÈëÇÖTwilioÔÆ´æ´¢ÏµÍ³²¢ÐÞ¸ÄJavaScript SDK¸±±¾

Ðû²¼Ê±¼ä 2020-07-23

1.ºÚ¿ÍʹÓÃGoogleÔÆÌᳫ´¹ÂÚ¹¥»÷ £¬ÇÔÈ¡Office 365ƾ֤


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Check PointÑо¿Ö°Ô±·¢Ã÷ £¬ºÚ¿ÍʹÓÃGoogleÔÆÌᳫ´¹ÂÚ¹¥»÷ £¬Ö¼ÔÚÇÔÈ¡Office 365ƾ֤ ¡£ËûÃÇʹÓÃGoogleÔÆÓ²ÅÌÍйܶñÒâPDFÎĵµ £¬²¢Ê¹ÓÃGoogleµÄstorage.googleapis[.]comÍйÜÍøÂç´¹ÂÚÒ³Ãæ ¡£Check Point·¢Ã÷¶ñÒâPDF¿´ÆðÀ´ÏñÒ»¸ö¿ÉÒÔͨ¹ý»ùÓÚwebµÄЭ×÷ƽ̨»á¼ûSharePointÌṩÄÚÈݵÄÃÅ»§ £¬Ò»µ©Óû§µã»÷Access DocumentÁ´½Ó £¬ÍøÂç´¹ÂÚÒ³Ãæ¾Í»áÒªÇóÌá½»Office 365ƾ֤»ò×éÖ¯IDµÇ¼µÄÐÅÏ¢ ¡£ÓÉÓÚÒ³ÃæÊÇ´ÓÕýµ±ÈªÔ´¼ÓÔØµÄ £¬²¢ÇÒÔÚÁ÷³Ì¿¢ÊÂʱ¸Ã´¹ÂÚÍøÕ¾Ò²»á½»¸¶Õý°æPDFÎĵµ £¬Òò´ËÊܺ¦ÕߺÜÄÑ·¢Ã÷¸ÃȦÌ× ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-campaign-uses-google-cloud-services-to-steal-office-365-logins/    


2.ºÚ¿ÍÈëÇÖTwilioÔÆ´æ´¢ÏµÍ³²¢ÐÞ¸ÄJavaScript SDK¸±±¾


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Twilio֤ʵ £¬ÓкڿÍÈëÇÖÁËÆäÔÆ´æ´¢ÏµÍ³ £¬²¢ÐÞ¸ÄÁËÆä¿Í»§Ê¹ÓõÄJavaScript SDKµÄ¸±±¾ ¡£TwilioÚ¹ÊÍ £¬ÓÐÈ˽øÈëÁËTwilioµÄAmazon Web Services S3´æ´¢Í° £¬²¢¸Ä¶¯ÁËTaskRouter v1.20 SDK £¬ÔÚÆäÖмÓÈëÁËÒ»¶Î·Ç¶ñÒâ´úÂë £¬Ö¼ÔÚ×·×ÙÊÇ·ñÐÞ¸ÄÀÖ³É ¡£ÏêϸÀ´Ëµ £¬ºÚ¿Í½«´úÂëÌí¼Óµ½TaskRouter.js v1.20 SDKµÄĩβ £¬¸ÃSDKÏòhxxps://gold.platinumus.top/track/awswrite?q=dmn·¢³öHTTP GETÇëÇó £¬²¢×ñÕÕ¸ÃÇëÇóÔÚHTMLÖзµ»ØµÄURL ¡£¸Ã¹«Ë¾½²»°ÈËÌåÏÖ £¬ËûÃÇÔÚ·¢Ã÷¸ÃÊÂÎñºó¾ÍÁ¬Ã¦¹Ø±ÕÁËÉèÖùýʧµÄS3´æ´¢Í° £¬²¢ÉóºËÁËËùÓÐS3´æ´¢Í° ¡£


Ô­ÎÄÁ´½Ó£º

https://www.theregister.com/2020/07/21/twilio_sdk_code_injection/


3.Èí¼þ¹«Ë¾MacKievÔÆ·þÎñÆ÷ÉèÖùýʧй¶25GBÓû§Êý¾Ý


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÍøÂçÇå¾²¹«Ë¾WizCaseµÄÑо¿Ö°Ô±·¢Ã÷Èí¼þ¹«Ë¾MacKievÔÆ·þÎñÆ÷ÉèÖùýʧ £¬Ð¹Â¶25GBÓû§Êý¾Ý £¬¸Ã¹«Ë¾ÖÎÀí×ÅÖøÃûµÄÈí¼þFamily Tree Maker£¨Ò²³ÆÎªFTM£© ¡£´Ë´Îй¶µÄÊý¾Ý¿â°üÀ¨Ô¼Äª25GBµÄÊý¾Ý £¬¸ÃÊý¾Ý¿â»¹»áÓëAncestry.comµÄÓû§Êý¾Ý¾ÙÐÐͬ²½ ¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨IPµØµã¡¢Ê±¼ä´Á¼Ç¡¢µç×ÓÓʼþµØµã¡¢Í˿Óû§Ö§³ÖÐÅÏ¢¡¢ÄÚ²¿ÏµÍ³Óû§±êʶ¡¢¶©ÔÄÀàÐͺÍ״̬¡¢ÊÖÒÕÊý¾Ý£¨ÀýÈç¹ýʧÈÕÖ¾£©¡¢Óû§Î»ÖÃÊý¾Ý£¨°üÀ¨µØÀíλÖÃ×ø±êºÍ¶¼»á£© ¡£¾ÝÑо¿Ö°Ô±³Æ £¬¸Ã×ß©ÊÂÎñ¿ÉÄÜ»áÓ°ÏìԼĪ60000ÃûMacKievÓû§ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/software-firm-leaks-ancestry-com-user-data/


4.ºÚ¿Í¹¥»÷Dunzo²¢ÔÚShinyHunter¹ûÕæ11.2GB͵ȡµÄÊý¾Ý


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¹È¸èÔÞÖúµÄÍâÂô·þÎñ¹«Ë¾DunzoÌåÏÖÆäÔâµ½Á˹¥»÷ £¬²¢Ð¹Â¶ÁËÒ»¸ö°üÀ¨¿Í»§¼Í¼µÄÊý¾Ý¿â ¡£ÓÉÓÚDunzoûÓÐ͸¶ÊÜÓ°ÏìÓû§µÄÊýÄ¿ £¬Òò´ËÉÐδȷ¶¨Ãü¾Ýй¶µÄ¹æÄ£ £¬¿ÉÊÇ £¬¸Ã¹«Ë¾ÌåÏÖ²ÆÎñÊý¾ÝºÍÐÅÓÿ¨ÐÅÏ¢²¢Î´Ð¹Â¶ ¡£ÏÖÔÚ £¬±»µÁµÄ11.2GBÊý¾Ý±»ºÚ¿Í·ÅÔÚShinyHunter £¬×ܹ²ÓÐÁè¼Ý800ÍòÐеÄÐÅÏ¢ £¬°üÀ¨Óû§Ãû¡¢¹ú¼Ò¡¢×°±¸¡¢È«Ãû¡¢ÉñÒþÃØÔ¿¡¢µç×ÓÓʼþµØµã¡¢ÃÜÂëÉ¢ÁС¢µç»°ºÅÂë¡¢ÁîÅÆºÅÂë¡¢¼ÓÈëÈÕÆÚºÍµÚÒ»¸ö/×îºóÒ»¸öλÖõÈ ¡£¸Ã¹«Ë¾ÌåÏÖËûÃǵÄÊÖÒÕÍŶÓÒѾ­Ñ¸ËÙ½â¾öÁ˸ÃÎÊÌâ £¬ÐÞ¸´ÁËÎó²î²¢Ìí¼ÓÁËеÄÇ徲ЭÒé²ã ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/google-delivery-service-dunzo-hacked-data-leaked/


5.SkyboxÐû²¼±¨¸æ £¬Õ¹Íû2020Ä꽫ÓÐ2Íò¶à¸öÐÂÎó²î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Skybox SecurityÐû²¼±¨¸æ £¬×èÖ¹2020ÄêÉϰëÄêÒѾ­±¨¸æÁË9000¶à¸öÐÂÎó²î £¬¶øÆäÔ¤¼ÆÕûÄ꽫ÓÐ20000¶à¸öÐÂÎó²î ¡£±¨¸æÖ¸³ö £¬COVID-19¸Ä±äÁË×éÖ¯¼°ÆäÔ±¹¤µÄÊÂÇé·½·¨ £¬¼¯ÖÐÌåÏÖÎªÒÆ¶¯Îó²îÔöÌíÁË50£¥ £¬ÕâÍ»ÏÔÁ˹«Ë¾ÍøÂçÓëСÎÒ˽¼ÒÍøÂçÖ®¼ä½çÏßÄ£ºýµÄΣÏÕ £»ÀÕË÷Èí¼þÔÚCOVID-19´óÊ¢ÐÐʱ´ú±¬·¢ £¬ÐÂÑù±¾ÊýÄ¿ÔöÌíÁË72£¥ £»¶ÔÒªº¦»ù´¡ÉèÊ©£¨°üÀ¨Ò½ÁƱ£½¡¹«Ë¾ºÍÑо¿ÊµÑéÊÒ£©µÄ¹¥»÷¼Ó¾ç ¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/07/22/vulnerability-reports-2020/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+HelpNetSecurity+%28Help+Net+Security%29


6.A10 NetworksÐû²¼2020ÄêQ2 DDoS¹¥»÷Ç÷ÊÆÆÊÎö±¨¸æ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


A10 NetworksÐû²¼2020ÄêQ2 DDoS¹¥»÷Ç÷ÊÆÆÊÎö±¨¸æ £¬·¢Ã÷ÑÇÖÞÊÇDDoS½©Ê¬ÍøÂçÔ˶¯µÄÖ÷ҪȪԴ £¬Ö÷ҪʹÓÃÖÖÖÖ·Å´ó¹¥»÷ ¡£ÔÚ2020ÄêµÚ¶þ¼¾¶È £¬470Íò¶à¸öÀ´×ÔÃÀ¹ú¡¢Öйú¡¢º«¹ú¡¢¶íÂÞ˹ºÍÓ¡¶ÈÕâÎå¸ö¹ú¼Ò/µØÇøµÄIP±»ÓÃÓÚÌᳫÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷ £¬ÆäÖдó´ó¶¼Ê¹ÓÃÁËportmapЭÒé¾ÙÐзŴ󹥻÷ ¡£¸Ã±¨¸æÖ¸³ö £¬ÔÚ´ó´ó¶¼ÇéÐÎÏ £¬DDoS½©Ê¬ÍøÂç¿Í»§¶Ë£¨»òÎÞÈË»ú£©ÊÇÔÚÊÜËðµÄIoT×°±¸ÉϽ¨ÉèµÄ £¬ÓÃÓÚ½¨Éè´ËÀàIoT½©Ê¬ÍøÂçµÄ×î³£¼ûÎó²îÊÇÕë¶Ô̻¶telnetÅþÁ¬µÄ×°±¸ÖеÄÎó²î £¬Netgear·ÓÉÆ÷ÖÐδÐÞ²¹µÄÎó²îÒÔ¼°Êý×ÖÊÓÆµÂ¼Ïñ»úÖеÄÇå¾²ÐÔÎÊÌâ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/threat-intelligence/ddos-botnets-are-entrenched-in-asia-and-amplification-attacks-set-records/d/d-id/1338415?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple