ºÚ¿ÍʹÓÃGoogleÔÆ´¹ÂÚ¹¥»÷ÇÔÈ¡Office 365ƾ֤£»ºÚ¿ÍÈëÇÖTwilioÔÆ´æ´¢ÏµÍ³²¢ÐÞ¸ÄJavaScript SDK¸±±¾
Ðû²¼Ê±¼ä 2020-07-231.ºÚ¿ÍʹÓÃGoogleÔÆÌᳫ´¹ÂÚ¹¥»÷£¬ÇÔÈ¡Office 365ƾ֤
Check PointÑо¿Ö°Ô±·¢Ã÷£¬ºÚ¿ÍʹÓÃGoogleÔÆÌᳫ´¹ÂÚ¹¥»÷£¬Ö¼ÔÚÇÔÈ¡Office 365ƾ֤¡£ËûÃÇʹÓÃGoogleÔÆÓ²ÅÌÍйܶñÒâPDFÎĵµ£¬²¢Ê¹ÓÃGoogleµÄstorage.googleapis[.]comÍйÜÍøÂç´¹ÂÚÒ³Ãæ¡£Check Point·¢Ã÷¶ñÒâPDF¿´ÆðÀ´ÏñÒ»¸ö¿ÉÒÔͨ¹ý»ùÓÚwebµÄÐ×÷ƽ̨»á¼ûSharePointÌṩÄÚÈݵÄÃÅ»§£¬Ò»µ©Óû§µã»÷Access DocumentÁ´½Ó£¬ÍøÂç´¹ÂÚÒ³Ãæ¾Í»áÒªÇóÌá½»Office 365ƾ֤»ò×éÖ¯IDµÇ¼µÄÐÅÏ¢¡£ÓÉÓÚÒ³ÃæÊÇ´ÓÕýµ±ÈªÔ´¼ÓÔØµÄ£¬²¢ÇÒÔÚÁ÷³Ì¿¢ÊÂʱ¸Ã´¹ÂÚÍøÕ¾Ò²»á½»¸¶Õý°æPDFÎĵµ£¬Òò´ËÊܺ¦ÕߺÜÄÑ·¢Ã÷¸ÃȦÌס£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/phishing-campaign-uses-google-cloud-services-to-steal-office-365-logins/
2.ºÚ¿ÍÈëÇÖTwilioÔÆ´æ´¢ÏµÍ³²¢ÐÞ¸ÄJavaScript SDK¸±±¾
Twilio֤ʵ£¬ÓкڿÍÈëÇÖÁËÆäÔÆ´æ´¢ÏµÍ³£¬²¢ÐÞ¸ÄÁËÆä¿Í»§Ê¹ÓõÄJavaScript SDKµÄ¸±±¾¡£TwilioÚ¹ÊÍ£¬ÓÐÈ˽øÈëÁËTwilioµÄAmazon Web Services S3´æ´¢Í°£¬²¢¸Ä¶¯ÁËTaskRouter v1.20 SDK£¬ÔÚÆäÖмÓÈëÁËÒ»¶Î·Ç¶ñÒâ´úÂ룬ּÔÚ×·×ÙÊÇ·ñÐÞ¸ÄÀֳɡ£ÏêϸÀ´Ëµ£¬ºÚ¿Í½«´úÂëÌí¼Óµ½TaskRouter.js v1.20 SDKµÄĩ⣬¸ÃSDKÏòhxxps://gold.platinumus.top/track/awswrite?q=dmn·¢³öHTTP GETÇëÇ󣬲¢×ñÕÕ¸ÃÇëÇóÔÚHTMLÖзµ»ØµÄURL¡£¸Ã¹«Ë¾½²»°ÈËÌåÏÖ£¬ËûÃÇÔÚ·¢Ã÷¸ÃÊÂÎñºó¾ÍÁ¬Ã¦¹Ø±ÕÁËÉèÖùýʧµÄS3´æ´¢Í°£¬²¢ÉóºËÁËËùÓÐS3´æ´¢Í°¡£
ÔÎÄÁ´½Ó£º
https://www.theregister.com/2020/07/21/twilio_sdk_code_injection/
3.Èí¼þ¹«Ë¾MacKievÔÆ·þÎñÆ÷ÉèÖùýʧй¶25GBÓû§Êý¾Ý
ÍøÂçÇå¾²¹«Ë¾WizCaseµÄÑо¿Ö°Ô±·¢Ã÷Èí¼þ¹«Ë¾MacKievÔÆ·þÎñÆ÷ÉèÖùýʧ£¬Ð¹Â¶25GBÓû§Êý¾Ý£¬¸Ã¹«Ë¾ÖÎÀí×ÅÖøÃûµÄÈí¼þFamily Tree Maker£¨Ò²³ÆÎªFTM£©¡£´Ë´Îй¶µÄÊý¾Ý¿â°üÀ¨Ô¼Äª25GBµÄÊý¾Ý£¬¸ÃÊý¾Ý¿â»¹»áÓëAncestry.comµÄÓû§Êý¾Ý¾ÙÐÐͬ²½¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨IPµØµã¡¢Ê±¼ä´Á¼Ç¡¢µç×ÓÓʼþµØµã¡¢Í˿Óû§Ö§³ÖÐÅÏ¢¡¢ÄÚ²¿ÏµÍ³Óû§±êʶ¡¢¶©ÔÄÀàÐͺÍ״̬¡¢ÊÖÒÕÊý¾Ý£¨ÀýÈç¹ýʧÈÕÖ¾£©¡¢Óû§Î»ÖÃÊý¾Ý£¨°üÀ¨µØÀíλÖÃ×ø±êºÍ¶¼»á£©¡£¾ÝÑо¿Ö°Ô±³Æ£¬¸Ã×ß©ÊÂÎñ¿ÉÄÜ»áÓ°ÏìԼĪ60000ÃûMacKievÓû§¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/software-firm-leaks-ancestry-com-user-data/
4.ºÚ¿Í¹¥»÷Dunzo²¢ÔÚShinyHunter¹ûÕæ11.2GB͵ȡµÄÊý¾Ý
¹È¸èÔÞÖúµÄÍâÂô·þÎñ¹«Ë¾DunzoÌåÏÖÆäÔâµ½Á˹¥»÷£¬²¢Ð¹Â¶ÁËÒ»¸ö°üÀ¨¿Í»§¼Í¼µÄÊý¾Ý¿â¡£ÓÉÓÚDunzoûÓÐ͸¶ÊÜÓ°ÏìÓû§µÄÊýÄ¿£¬Òò´ËÉÐδȷ¶¨Ãü¾Ýй¶µÄ¹æÄ££¬¿ÉÊÇ£¬¸Ã¹«Ë¾ÌåÏÖ²ÆÎñÊý¾ÝºÍÐÅÓÿ¨ÐÅÏ¢²¢Î´Ð¹Â¶¡£ÏÖÔÚ£¬±»µÁµÄ11.2GBÊý¾Ý±»ºÚ¿Í·ÅÔÚShinyHunter£¬×ܹ²ÓÐÁè¼Ý800ÍòÐеÄÐÅÏ¢£¬°üÀ¨Óû§Ãû¡¢¹ú¼Ò¡¢×°±¸¡¢È«Ãû¡¢ÉñÒþÃØÔ¿¡¢µç×ÓÓʼþµØµã¡¢ÃÜÂëÉ¢ÁС¢µç»°ºÅÂë¡¢ÁîÅÆºÅÂë¡¢¼ÓÈëÈÕÆÚºÍµÚÒ»¸ö/×îºóÒ»¸öλÖõȡ£¸Ã¹«Ë¾ÌåÏÖËûÃǵÄÊÖÒÕÍŶÓÒѾѸËÙ½â¾öÁ˸ÃÎÊÌ⣬ÐÞ¸´ÁËÎó²î²¢Ìí¼ÓÁËеÄÇå¾²ÐÒé²ã¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/google-delivery-service-dunzo-hacked-data-leaked/
5.SkyboxÐû²¼±¨¸æ£¬Õ¹Íû2020Ä꽫ÓÐ2Íò¶à¸öÐÂÎó²î
Skybox SecurityÐû²¼±¨¸æ£¬×èÖ¹2020ÄêÉϰëÄêÒѾ±¨¸æÁË9000¶à¸öÐÂÎó²î£¬¶øÆäÔ¤¼ÆÕûÄ꽫ÓÐ20000¶à¸öÐÂÎó²î¡£±¨¸æÖ¸³ö£¬COVID-19¸Ä±äÁË×éÖ¯¼°ÆäÔ±¹¤µÄÊÂÇé·½·¨£¬¼¯ÖÐÌåÏÖÎªÒÆ¶¯Îó²îÔöÌíÁË50£¥£¬ÕâÍ»ÏÔÁ˹«Ë¾ÍøÂçÓëСÎÒ˽¼ÒÍøÂçÖ®¼ä½çÏßÄ£ºýµÄΣÏÕ£»ÀÕË÷Èí¼þÔÚCOVID-19´óÊ¢ÐÐʱ´ú±¬·¢£¬ÐÂÑù±¾ÊýÄ¿ÔöÌíÁË72£¥£»¶ÔÒªº¦»ù´¡ÉèÊ©£¨°üÀ¨Ò½ÁƱ£½¡¹«Ë¾ºÍÑо¿ÊµÑéÊÒ£©µÄ¹¥»÷¼Ó¾ç¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/07/22/vulnerability-reports-2020/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+HelpNetSecurity+%28Help+Net+Security%29
6.A10 NetworksÐû²¼2020ÄêQ2 DDoS¹¥»÷Ç÷ÊÆÆÊÎö±¨¸æ
A10 NetworksÐû²¼2020ÄêQ2 DDoS¹¥»÷Ç÷ÊÆÆÊÎö±¨¸æ£¬·¢Ã÷ÑÇÖÞÊÇDDoS½©Ê¬ÍøÂçÔ˶¯µÄÖ÷ҪȪԴ£¬Ö÷ҪʹÓÃÖÖÖÖ·Å´ó¹¥»÷¡£ÔÚ2020ÄêµÚ¶þ¼¾¶È£¬470Íò¶à¸öÀ´×ÔÃÀ¹ú¡¢Öйú¡¢º«¹ú¡¢¶íÂÞ˹ºÍÓ¡¶ÈÕâÎå¸ö¹ú¼Ò/µØÇøµÄIP±»ÓÃÓÚÌᳫÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷£¬ÆäÖдó´ó¶¼Ê¹ÓÃÁËportmapÐÒé¾ÙÐзŴ󹥻÷¡£¸Ã±¨¸æÖ¸³ö£¬ÔÚ´ó´ó¶¼ÇéÐÎÏ£¬DDoS½©Ê¬ÍøÂç¿Í»§¶Ë£¨»òÎÞÈË»ú£©ÊÇÔÚÊÜËðµÄIoT×°±¸ÉϽ¨ÉèµÄ£¬ÓÃÓÚ½¨Éè´ËÀàIoT½©Ê¬ÍøÂçµÄ×î³£¼ûÎó²îÊÇÕë¶Ô̻¶telnetÅþÁ¬µÄ×°±¸ÖеÄÎó²î£¬Netgear·ÓÉÆ÷ÖÐδÐÞ²¹µÄÎó²îÒÔ¼°Êý×ÖÊÓÆµÂ¼Ïñ»úÖеÄÇå¾²ÐÔÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/threat-intelligence/ddos-botnets-are-entrenched-in-asia-and-amplification-attacks-set-records/d/d-id/1338415?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple


¾©¹«Íø°²±¸11010802024551ºÅ