ÃÀ¹úÕþ¸®È·ÈÏSolarWinds¹¥»÷Óë¶íÂÞ˹Ç鱨¾ÖSVRÓйأ»Ó¡¶ÈBizongoµÄ´æ´¢Í°ÉèÖùýʧ£¬Ð¹Â¶643 GBµÄÊý¾Ý
Ðû²¼Ê±¼ä 2021-04-161.ÃÀ¹úÕþ¸®È·ÈÏSolarWinds¹¥»÷Óë¶íÂÞ˹Ç鱨¾ÖSVRÓйØ

ÃÀ¹úÕþ¸®Õýʽָ¿Ø¶íÂÞ˹Õþ¸®ÌᳫÁËSolarWinds¹©Ó¦Á´¹¥»÷£¬Ó°ÏìÁËÃÀ¹úµÄ¶à¸ö×éÖ¯ºÍ¹«Ë¾ÊÖÒÕ²¿·ÖµÄÍøÂç¡£½ñÄê1Ô³õ£¬ÍøÂçͳһе÷С×飨UCG£©½«´Ë´Î¹¥»÷¹éÒòÓÚ¶íÂÞ˹Åä¾°µÄºÚ¿Í×éÖ¯£¬µ«Î´Ö¸³öÏêϸÃû³Æ¡£4ÔÂ15ÈÕ£¬°×¹¬ÕýʽȷÈ϶íÂÞ˹Íâ¹úÇ鱨¾ÖSVRÊǴ˴ι¥»÷µÄÄ»ºóºÚÊÖ£¬Í¨¹ýÆäºÚ¿Í²¿·ÖAPT29£¨ÓÖ³ÆCozy Bear£©¿ªÕ¹µÄÍøÂçÌØ¹¤Ô˶¯¡£±ðµÄ£¬ÃÀ¹úNSA¡¢CISAºÍFBIÍŽáÐû²¼ÁËÇå¾²×Éѯ£¬ÖÒÑÔSVRÔÚ¹¥»÷ÖÐʹÓõÄÎå¸öÖ÷ÒªµÄÎó²î¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/us-government-confirms-russian-svr-behind-the-solarwinds-hack/
2.Ó¡¶ÈBizongoµÄ´æ´¢Í°ÉèÖùýʧ£¬Ð¹Â¶643 GBµÄÊý¾Ý

Ó¡¶ÈB2B°ü×°Êг¡BizongoÒòAWS S3´æ´¢Í°ÉèÖùýʧ£¬Ð¹Â¶643 GBµÄÊý¾Ý¡£´Ë´Îй¶µÄÊý¾ÝÉæ¼°Óû§µÄPIIºÍBizongoµÄ¸¶¿îÐÅÏ¢£¬°üÀ¨Óû§µÄÐÕÃû¡¢µç»°ºÅÂë¡¢Õʵ¥µØµã¡¢ÊÕ»õµØµã¡¢ÔËËͺ͸ú×Ù±àºÅ¡¢Õʵ¥Ã÷ϸºÍ¿Í»§µÄ²ÆÎñÃ÷ϸµÈ¡£Website PlanetµÄÑо¿Ö°Ô±ÓÚ2020Äê12ÔÂÏÂÑ®·¢Ã÷¸Ã´æ´¢Í°£¬²¢Á¬Ã¦¾Í´ËÊÂÎñÓëBizongoÁªÏµ£¬µ«ÏÖÔÚÈÔδÊÕµ½ÈκλØÓ¦¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/india-bizongo-supply-chain-exposed-data/
3.SAPÐû²¼Çå¾²¸üУ¬ÐÞ¸´Æä²úÆ·ÖеĶà¸öÑÏÖØµÄÎó²î

±¾Öܶþ£¬SAPÐû²¼Çå¾²¸üУ¬ÐÞ¸´ÁËBusiness Client¡¢CommerceºÍNetWeaverÖеÄ×ܼƶà¸öÎó²î¡£ÆäÖнÏΪÑÏÖØµÄÊÇCommerceÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-27602£©£¬µÃ·ÖΪ9.8£»ÒÔ¼°NetWeaver¿ÍÕ»µÄMigration Service×é¼þÖеÄCVE-2021-21481£¬µÃ·ÖΪ9.6£¬Î´¾ÊÚȨµÄ¹¥»÷Õß¿ÉÒÔ»á¼ûÉèÖù¤¾ßÒÔ»ñµÃϵͳÉϵÄÖÎÀíȨÏÞ¡£±ðµÄ£¬»¹ÐÞ¸´ÁËCVE-2021-21482¡¢CVE-2021-21483ºÍCVE-2020-26832µÈÎó²î¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/sap-fixes-critical-bugs-in-business-client-commerce-and-netweaver/
4.Census LabsÅû¶°²×¿°æ±¾WhatsAppµÄ´úÂëÖ´ÐÐÎó²î

Census LabsµÄÑо¿Ö°Ô±Åû¶Á˰²×¿°æ±¾µÄWhatsAppÖеÄÁ½¸ö´úÂëÖ´ÐÐÎó²î£¬¿É±»ÓÃÀ´ÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐжñÒâ´úÂë²¢ÇÔÌýͨѶ¡£ÕâÁ½¸öÎó²î¿ÉÓÃÀ´Ô¶³ÌÍøÂçTLS 1.3ºÍTLS 1.2»á»°µÄTLS¼ÓÃÜÐÅÏ¢£¬²¢ÌᳫÖÐÐÄÈË£¨MitM£©¹¥»÷¡£ÓÈÆäÊÇCVE-2021-24027Îó²î£¬Ê¹ÓÃÁËChrome¶ÔAndroidÖÐÄÚÈÝÌṩÕßµÄÖ§³ÖÒÔ¼°ä¯ÀÀÆ÷ÖеÄͬԴսÂÔÈÆ¹ýÎó²î£¨CVE-2020-6516£©£¬Í¨¹ýWhatsApp½«ÌØÖƵÄHTMLÎļþ·¢Ë͸øÊܺ¦Õߣ¬µ±Êܺ¦ÕßÔÚä¯ÀÀÆ÷Öз¿ªºó£¬½«Ö´ÐиÃÎļþÖаüÀ¨µÄ´úÂë¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/116833/hacking/whatsapp-flaws-remote-hack.html
5.FireEyeÐû²¼ÃûΪM-Trend 2021µÄÄê¶ÈÆÊÎö±¨¸æ

FireEye»ùÓÚ¶ÔÆäÖÎÀíµÄÇå¾²ÊÂÎñ¾ÙÐÐÊÓ²ìʱ´úÍøÂçµÄÊý¾Ý£¬Ðû²¼ÁËÃûΪM-Trend 2021µÄÄêÆÊÎö¶È±¨¸æ¡£FireEye MandiantÊÓ²ìÁË246¸öºÚ¿Í×éÖ¯µÄ¹¥»÷Ô˶¯£¬ÆäÖаüÀ¨4¸ö²ÆÎñÍþв£¨FIN£©×éÖ¯£¬6¸ö¸ß¼¶Ò»Á¬Íþв£¨APT£©×éÖ¯ºÍ236¸öδ·ÖÀàÍþв£¨UNC£©×éÖ¯¡£±ðµÄ£¬Ç°5ÖÖ¶ñÒâÈí¼þÖÖ±ðÊǺóÃÅ£¨36£¥£©¡¢ÏÂÔØÆ÷£¨16£¥£©¡¢droppers£¨8£¥£©¡¢Æô¶¯Æ÷£¨7£¥£©ºÍÀÕË÷Èí¼þ£¨5£¥£©£¬Ç°5¸ö¶ñÒâÈí¼þ¼Ò×å»®·ÖÊÇBEACON¡¢EMPIRE¡¢MAZE¡¢NETWALKERºÍMetasploit¡£
ÔÎÄÁ´½Ó£º
https://content.fireeye.com/m-trends/rpt-m-trends-2021
6.CISAÐû²¼Õë¶ÔÍøÂçÇå¾²Ñо¿Ö°Ô±µÄAPTÔ˶¯µÄ¾¯±¨

CISAÐû²¼ÁËÕë¶ÔÍøÂçÇå¾²Ñо¿Ö°Ô±µÄAPTÔ˶¯µÄ¾¯±¨¡£¾¯±¨Ö¸³öAPT¹¥»÷ÕßÕýÔÚʹÓÃαÔìµÄÉ罻ýÌå×ÊÁϺÍÃ²ËÆÕýµ±µÄÍøÕ¾À´ÓÕ»óÇå¾²Ñо¿Ö°Ô±»á¼û¶ñÒâÍøÕ¾£¬ÒÔÇÔÈ¡°üÀ¨Îó²îʹÓúÍÁãÈÕÎó²îÔÚÄÚµÄÐÅÏ¢¡£±ðµÄ£¬GoogleºÍMicrosoft×î½ü¶¼Ðû²¼ÁËÕë¶Ô´ËÀ๥»÷µÄ±¨¸æ¡£CISA½¨ÒéÍøÂçÇå¾²´ÓÒµÖ°Ô±ÔÚ»á¼û²»ÊÜÐÅÍеĴúÂë»òÍøÕ¾Ê±£¬Ê¹ÓÃÓëÊÜÐÅÍеÄϵͳºÍÍøÂç¸ôÀëµÄɳºÐÇéÐΡ£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2021/04/14/threat-actors-targeting-cybersecurity-researchers


¾©¹«Íø°²±¸11010802024551ºÅ