Óý±ÌÔâµ½LAPSUS$µÄ¹¥»÷£¬£¬ £¬£¬£¬ÆäÓÎÏ·¡¢ÏµÍ³ºÍЧÀÍÖÐÖ¹

Ðû²¼Ê±¼ä 2022-03-15

Óý±ÌÔâµ½LAPSUS$µÄ¹¥»÷£¬£¬ £¬£¬£¬ÆäÓÎÏ·¡¢ÏµÍ³ºÍЧÀÍÖÐÖ¹


¾ÝýÌå3ÔÂ12ÈÕ±¨µÀ£¬£¬ £¬£¬£¬ÊÓÆµÓÎÏ·¿ª·¢ÉÌÓý±Ì£¨Ubisoft £©Ö¤Êµ£¬£¬ £¬£¬£¬ËüÔÚÉÏÖÜÔâµ½ÍøÂç¹¥»÷£¬£¬ £¬£¬£¬µ¼ÖÂÆäÓÎÏ·¡¢ÏµÍ³ºÍЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£ ¡£¸Ã¹«Ë¾ÌåÏÖËûÃǵÄÍŶÓÕýÔÚÊÓ²ì´ËÎÊÌ⣬£¬ £¬£¬£¬ÏÖÒÑÈ·ÈÏûÓÐÊý¾Ýй¶¼£Ï󣬣¬ £¬£¬£¬²¢ÇÒÖØÖÃÁËÈ«¹«Ë¾µÄÃÜÂë¡£¡£¡£¡£¡£¡£ ¡£3ÔÂ4ÈÕ£¬£¬ £¬£¬£¬¾ÍÓÐÓû§ÔÚTwitterºÍDowndetectorÉÏÌåÏÖËûÃÇÔÚ»á¼ûÓý±ÌµÄijЩЧÀÍʱ·ºÆðÎÊÌâ¡£¡£¡£¡£¡£¡£ ¡£ÏÖÔÚÉÐÎÞ¹ØÓڴ˴ι¥»÷µÄÏêϸÐÅÏ¢£¬£¬ £¬£¬£¬µ«Lapsus$Ðû²¼ÁËÐÂÎÅÌåÏÖ´ËÊÂÓëËüÓйØ¡£¡£¡£¡£¡£¡£ ¡£


https://securityaffairs.co/wordpress/128929/hacking/ubisoft-cyber-security-incident.html


LockBitÉù³Æ¶ÔÆÕÀû˾ͨÃÀÖÞ¹«Ë¾µÄ¹¥»÷ÊÂÎñÈÏÕæ


LockBitÔÚ3ÔÂ11ÈÕÐû²¼ÐÂÎÅ£¬£¬ £¬£¬£¬Éù³Æ¶ÔÆÕÀû˾ͨÃÀÖÞ¹«Ë¾£¨Bridgestone Americas£©µÄ¹¥»÷ÊÂÎñÈÏÕæ¡£¡£¡£¡£¡£¡£ ¡£ÕâÊÇÈ«Çò×î´óµÄÂÖÌ¥ÖÆÔìÉÌÖ®Ò»£¬£¬ £¬£¬£¬ÔÚÈ«ÇòÓµÓÐÊýÊ®¸öÉú²úµ¥Î»ºÍÁè¼Ý130000¸öÔ±¹¤¡£¡£¡£¡£¡£¡£ ¡£ÆÕÀû˾ͨÐû²¼µÄÉùÃ÷³Æ£¬£¬ £¬£¬£¬ËûÃÇÔÚ2ÔÂ27ÈÕ¼ì²âµ½Ò»ÆðITÇå¾²ÊÂÎñ£¬£¬ £¬£¬£¬ÕýÔÚ¶ÔÊÂÎñµÄ¹æÄ£ºÍÐÔ×ÓÕö¿ªÊӲ졣¡£¡£¡£¡£¡£ ¡£LockBitÊǵ±½ñ×î»îÔ¾µÄÀÕË÷ÍÅ»ïÖ®Ò»£¬£¬ £¬£¬£¬ÏÖÔÚÉв»ÇåÎúËü´ÓÆÕÀû˾ͨÇÔÈ¡ÁËÄÄЩÊý¾Ý¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/bridgestone-americas-confirms-ransomware-attack-lockbit-leaks-data/


Ñо¿Ö°Ô±·¢Ã÷¶à¸öÖ÷Á÷°ü¹ÜÀíÆ÷Öб£´æÇå¾²Îó²î


¾Ý3ÔÂ11ÈÕ±¨µÀ£¬£¬ £¬£¬£¬SonarSourceµÄÑо¿Ö°Ô±·¢Ã÷¶à¸öÖ÷Á÷°ü¹ÜÀíÆ÷Öб£´æÇå¾²Îó²î¡£¡£¡£¡£¡£¡£ ¡£°ü¹ÜÀíÆ÷ÊÇÖ¸ÓÃÓÚ×Ô¶¯×°Öá¢Éý¼¶¡¢ÉèÖÿª·¢Ó¦ÓóÌÐòËùÐèµÄµÚÈý·½ÒÀÀµÏîµÄϵͳ»ò¹¤¾ß£¬£¬ £¬£¬£¬±£´æÎó²îµÄÓ¦ÓðüÀ¨Composer¡¢Bundler¡¢Bower¡¢Poetry¡¢Yarn¡¢pnpm¡¢PipºÍPipenv¡£¡£¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²îÀ´Ö´ÐÐí§Òâ´úÂë²¢´ÓÄ¿µÄ×°±¸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬ £¬£¬£¬°üÀ¨Ô´´úÂëºÍ»á¼ûÁîÅÆµÈ¡£¡£¡£¡£¡£¡£ ¡£


https://thehackernews.com/2022/03/multiple-security-flaws-discovered-in.html


¶íÂÞ˹¹ú·À¹«Ë¾RostecÒòÔâµ½DDoS¹¥»÷ÍøÕ¾¹Ø±Õ


3ÔÂ11ÈÕ£¬£¬ £¬£¬£¬¶íÂÞ˹¹úÓк½¿Õº½ÌìºÍ¹ú·À¼¯ÍÅRostecÌåÏÖ£¬£¬ £¬£¬£¬ÆäÍøÕ¾ÒòÔâµ½ÍøÂç¹¥»÷¶ø±»¹Ø±Õ¡£¡£¡£¡£¡£¡£ ¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬ £¬£¬£¬×Ô2ÔÂÏÂÑ®ÒÔÀ´ÆäÍøÕ¾Ò»Ö±ÔâÊÜ×ÅΧ¹¥¡£¡£¡£¡£¡£¡£ ¡£×îеÄÒ»´Î¹¥»÷ʼÓÚµ±ÈÕÉÏÎç11µã30·Ö£¬£¬ £¬£¬£¬À´×ÔÎÚ¿ËÀ¼Ð½¨ÉèµÄIT¾ü¶Ó¡£¡£¡£¡£¡£¡£ ¡£¸ÃÎÚ¿ËÀ¼×éÖ¯ÔçЩʱ¼äÔÚTelegramÖÐÐû²¼ÐÂÎÅ£¬£¬ £¬£¬£¬½«RostecµÄ¶à¸öÓòÈ·ÒÔΪÆäÂþÑÜʽ¾Ü¾øÐ§ÀÍ(DDoS)¹¥»÷µÄÄ¿µÄ¡£¡£¡£¡£¡£¡£ ¡£Rostec³ÆÍøÕ¾ºÜ¿ì¾Í»Ö¸´ÁËÕý³£ÔËÐУ¬£¬ £¬£¬£¬ÏÖÔÚËùÓÐÐÅÏ¢¾ùÒÑ¿ÉÓᣡ£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/russian-defense-firm-rostec-shuts-down-website-after-ddos-attack/


Anonymousй¶¶íÂÞ˹»ú¹¹RoskomnadzorµÄ820GBÊý¾Ý


¾ÝýÌå3ÔÂ11ÈÕ±¨µÀ£¬£¬ £¬£¬£¬AnonymousÉù³ÆÈëÇÖÁ˶íÂÞ˹Ö÷ÒªµÄ¹Ù·½»ú¹¹Roskomnadzor£¨ÓÖÃûÁª°îͨѶ¡¢ÐÅÏ¢ÊÖÒպ͹«¹²Ã½Ìå¼àÊÓ¾Ö£©¡£¡£¡£¡£¡£¡£ ¡£¸ÃÍÅ»ï×ܹ²Ð¹Â¶ÁËÔ¼820GBµÄÊý¾Ý£¬£¬ £¬£¬£¬ÆäÖаüÀ¨Áè¼Ý360000¸öÎļþ£¨536.9 GB£©ºÍ2¸ö°üÀ¨HR³ÌÐòµÄÊý¾Ý¿â£¨290.6 GB£©¡£¡£¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬ £¬£¬£¬AnonymousÔÚ½üÆÚ»¹ÈëÇÖÁ˶íÂÞ˹Լ90%µÄÉèÖùýʧµÄÔÆÊý¾Ý¿â¡£¡£¡£¡£¡£¡£ ¡£


https://www.hackread.com/anonymous-hacks-roskomnadzor-russia-agency/


¶«Ó³¶¯»­¹«Ë¾»òÒòÔâµ½ÀÕË÷¹¥»÷º£ÔôÍõµÈ¶¯ÂþÑÓ²¥


3ÔÂ11ÈÕ£¬£¬ £¬£¬£¬ÈÕ±¾¶«Ó³¶¯»­¹«Ë¾£¨Toei£©Ðû²¼×îÐÂÐÂÎÅ£¬£¬ £¬£¬£¬³ÆÓÉÓÚÍøÂç¹¥»÷µ¼ÖÂÄÚ²¿ÏµÍ³¹Ø±Õ£¬£¬ £¬£¬£¬¶¯ÂþµÄÖÆ×÷Òѱ»ÍƳÙ¡£¡£¡£¡£¡£¡£ ¡£Òò´Ë£¬£¬ £¬£¬£¬¡¶ÓÂÕß¶·¶ñÁú´óÍõ½£¡·¡¢¡¶Delicious Party Precure¡·¡¢¡¶ÊýÂë·ÏÎïÓÄÁéÓÎÏ·¡·ºÍ¡¶º£ÔôÍõ¡·Ð¾缯µÄ²¥³ö½«ÑÓ³Ù£¬£¬ £¬£¬£¬Ö±ÖÁÁíÐÐ֪ͨ¡£¡£¡£¡£¡£¡£ ¡£ÕâÁÔôÍõµÄ·ÛË¿ÃǺÜÊÇʧÍû£¬£¬ £¬£¬£¬ËûÃÇÕýÆÚ´ý¸ÃϵÁеÚ1000ÕµÄÐû²¼¡£¡£¡£¡£¡£¡£ ¡£Æ¾Ö¤ToeiµÄͨ¸æ£¬£¬ £¬£¬£¬ÆäÔÚ3ÔÂ6ÈÕ¼ì²âµ½Î´¾­ÊÚȨµÄ»á¼û£¬£¬ £¬£¬£¬²¢ÔÚÔ½ÈչرÕÁËËùÓеÄÄÚ²¿ÏµÍ³£¬£¬ £¬£¬£¬¶Ô´ËÊÂÕö¿ªÊӲ졣¡£¡£¡£¡£¡£ ¡£ÖÖÖÖ¼£ÏóÅú×¢ÕâÊÇÒ»ÆðÀÕË÷¹¥»÷ÊÂÎñ£¬£¬ £¬£¬£¬µ«ÏÖÔÚÑо¿Ö°Ô±»¹ÎÞ·¨Ö¤ÊµÕâÒ»µã¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/new-one-piece-anime-episodes-delayed-after-toei-cyberattack/




Çå¾²¹¤¾ß


ASSAMEE 


Anonfiles µÄÃâ·Ñ¸ß¼¶¼ÓÃÜÆ÷£¬£¬ £¬£¬£¬Ê¹Óø߼¶¼ÓÃÜÒªÁìʹÓà AES-256 ¼ÓÃÜĿ¼¡£¡£¡£¡£¡£¡£ ¡£


https://github.com/samhaxr/ASSAMEE


Scanmycode Ce


ËüÊÇÒ»ÖÖ´úÂëɨÃè/SAST/¾²Ì¬ÆÊÎö/Linting ½â¾ö¼Æ»®£¬£¬ £¬£¬£¬Ê¹ÓÃÐí¶à¹¤¾ß/ɨÃèÒǺÍÒ»¸ö±¨¸æ¡£¡£¡£¡£¡£¡£ ¡£


https://github.com/marcinguy/scanmycode-ce


Oh365UserFinder


ÓÃÓÚʶ±ðÓÐÓÃµÄ o365 ÕÊ»§ºÍÓò£¬£¬ £¬£¬£¬¶ø²»±£´æÕÊ»§Ëø¶¨µÄΣº¦¡£¡£¡£¡£¡£¡£ ¡£


https://github.com/dievus/Oh365UserFinder


ADExplorerSnapshot.py


ÊÇAD Explorer ¿ìÕÕÆÊÎöÆ÷£¬£¬ £¬£¬£¬×÷Ϊ BloodHound µÄ ingestor£¬£¬ £¬£¬£¬»¹Ö§³Ö½«ÍêÕû¹¤¾ßת´¢µ½ NDJSON¡£¡£¡£¡£¡£¡£ ¡£


https://github.com/c3c/ADExplorerSnapshot.py



Çå¾²ÆÊÎö


AnonymousÈëÇÖÁ˶íÂÞ˹µÄ 400 ¸öÇå¾²ÉãÏñÍ·


https://www.hackread.com/anonymous-sent-texts-to-russians-hacked-security-cams/


Riverbed Èí¼þÖб£´æµÄ4¸öÑÏÖØµÄÎó²î


https://www.theregister.com/2022/03/11/riverbed_vulnerabilities/


ͨ¹ýËÙÂÊÏÞÖÆ RDP ±©Á¦¹¥»÷


https://blog.malwarebytes.com/explained/2022/03/blunting-rdp-brute-force-attacks-with-rate-limiting/


Kali Linux ΪÂã»ú×°ÖÃÌí¼ÓÁËÀàËÆ VM µÄ¿ìÕÕ¹¦Ð§


https://www.bleepingcomputer.com/news/linux/kali-linux-adds-vm-like-snapshot-feature-to-bare-metal-installs/


Å·Ä·Áú PLC ±à³ÌÈí¼þÖÐÐÞ²¹µÄ¸ßΣÎó²î


https://www.securityweek.com/high-severity-vulnerabilities-patched-omron-plc-programming-software