Click StudiosÔ⹩ӦÁ´¹¥»÷£¬ £¬£¬²úÆ·¸üÐÂЧÀÍÆ÷±»Ð®ÖÆ £» £»£»£»£»£»£»HashiCorpÔâCodecov¹©Ó¦Á´¹¥»÷£¬ £¬£¬GPGÊðÃûÃÜԿй¶

Ðû²¼Ê±¼ä 2021-04-25

1.Click StudiosÔ⹩ӦÁ´¹¥»÷£¬ £¬£¬²úÆ·¸üÐÂЧÀÍÆ÷±»Ð®ÖÆ


1.jpg


Click Studios֪ͨ¿Í»§ÆäÔâµ½Á˹©Ó¦Á´¹¥»÷£¬ £¬£¬ÆäPasswordstateµÄ¸üÐÂЧÀÍÆ÷±»Ð®ÖÆ¡£¡£¡£¡£¡£PasswordstateÊÇÒ»ÖÖÍâµØÃÜÂëÖÎÃ÷È·¾ö¼Æ»®£¬ £¬£¬Òѱ»È«Çò29000¼Ò¹«Ë¾µÄ370000¶àÃûÇå¾²ºÍITְԱʹÓ㬠£¬£¬Éæ¼°Õþ¸®¡¢¹ú·À¡¢½ðÈÚ¡¢º½¿Õº½Ìì¡¢Ò½ÁƱ£½¡¡¢Ö´·¨ºÍýÌåµÈÐÐÒµ¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬ £¬£¬ºÚ¿ÍÔÚPasswordstateµÄԭʼ´úÂëÖÐÔöÌíÁËÒ»¶ÎÖ¼ÔÚ´ÓC2ÖÐÏÂÔØpayloadµÄ'Loader'´úÂ룬 £¬£¬Òò´ËÆä¿Í»§¿ÉÄÜÔÚ4ÔÂ20ÈÕÖÁ4ÔÂ22ÈÕÖ®¼äÏÂÔØÁËÒѱ»¸Ä¶¯µÄÉý¼¶³ÌÐò¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/passwordstate-password-manager-hacked-in-supply-chain-attack/


2.HashiCorpÔâCodecov¹©Ó¦Á´¹¥»÷£¬ £¬£¬GPGÊðÃûÃÜԿй¶


2.jpg


¿ªÔ´Èí¼þ¹¤¾ßºÍ»ù´¡ÉèÊ©ÌṩÉÌHashiCorpÔâµ½Codecov¹©Ó¦Á´¹¥»÷£¬ £¬£¬GPGÊðÃûÃÜԿй¶¡£¡£¡£¡£¡£¾ÝÊӲ죬 £¬£¬´Ë´Î¹©Ó¦Á´¹¥»÷×î³õΣº¦±¬·¢ÔÚ1ÔÂ31ÈÕ£¬ £¬£¬²¢Ò»Á¬ÁËԼĪÁ½¸öÔ£¬ £¬£¬HashiCorpÓÃÓÚÊðÃûÀ´ÑéÖ¤HashiCorpµÄ²úÆ·µÄGPG˽Կ¼´ÊÇÔÚÕâ¶Îʱ¼äй¶µÄ¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬ £¬£¬ÏÖÔÚÉÐδÓÐÖ¤¾ÝÅú×¢ÓÐÈËʹÓÃÁ˸ÃÃÜÔ¿£¬ £¬£¬µ«ÔÚÇå¾²Æð¼ûÈÔ¶ÔÆä¾ÙÐÐÁËÌæ»»£¬ £¬£¬ÏÖÒÑÐû²¼ÐµÄGPGÃÜÔ¿¶Ô£ºC874 011F 0AB4 0511 0D02 1055 3436 5D94 72D7 468F¡£¡£¡£¡£¡£¿ÉÊÇ£¬ £¬£¬ÆäTerraform²úÆ·ÉÐδ´ò²¹¶¡À´Ê¹ÓÃеÄGPGÃÜÔ¿¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hashicorp-is-the-latest-victim-of-codecov-supply-chain-attack/


3.°¢¸ùÍ¢µÄ¹È¸èËÑË÷ÒýÇæÒòÓòÃû±»ÒâÍâ³öÊÛ¶øÌ±»¾ÊýСʱ


3.jpg


ÉÏÖÜÈý£¬ £¬£¬°¢¸ùÍ¢µÄ¹È¸èËÑË÷ÒýÇæÌ±»¾Á˽üÈý¸öСʱ¡£¡£¡£¡£¡£Æ¾Ö¤MercoPressµÄ×ÊÁÏÏÔʾ£¬ £¬£¬´Ë´ÎÖÐÖ¹µÄÔµ¹ÊÔ­ÓÉÊÇÒ»¸öÃûΪNicolas DavidKuro?aµÄ°¢¸ùÍ¢¹«ÃñÒÔ540°¢¸ùÍ¢±ÈË÷£¨Ô¼ºÏ5.81ÃÀÔª£©µÄ¼ÛÇ®¹ºÖÃÁËgoogle.com.arÓòÃûµÄËùÓÐȨ¡£¡£¡£¡£¡£Kuro?aÔÚµ±ÈÕÍíÉÏ10:45×óÓÒÐû²¼ÍÆÎÄÌåÏÖ£¬ £¬£¬ËûÊÇÕýµ±µÄ¹ºÖÃÁ˸ÃÓòÃû¡£¡£¡£¡£¡£Õâ¸öÓòÃûÖ®ÒÔÊÇ¿ÉÒÔʹÓ㬠£¬£¬ÊÇÓÉÓڹȸ谢¸ùÍ¢¹«Ë¾Ã»ÓÐÔÚµ½ÆÚºóÐøÆÚ£¬ £¬£¬Ê¹µÃÓû§¿ÉÒÔÕýµ±ÇÀ×¢¡£¡£¡£¡£¡£¿ÉÊǸÃÓòµÄÓâÆÚÈÕÆÚÊÇ7Ô£¬ £¬£¬ÏÖÔÚÉÐδÓâÆÚ£¬ £¬£¬Òò´Ë¸Ã¹«ÃñÔõÑùÕýµ±µÄ¹ºÖÃËü³ÉΪÁËÒ»¸öÃÕ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/google-argentina-domain-bought/


4.ÐÂLinux½©Ê¬ÍøÂçʹÓÃIaCºÍDevOpsµÈ¹¤¾ßÍÚ¾òÃÅÂÞ±Ò


4.jpg


Ç÷ÊÆ¿Æ¼¼µÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öеÄLinux½©Ê¬ÍøÂ磬 £¬£¬Ê¹ÓÃÁË»ù´¡¼Ü¹¹´úÂ루IaC£©¹¤¾ß¡¢TorÊðÀíºÍÕýµ±µÄDevOps¹¤¾ßÀ´ÍÚ¾òXMRig Monero¡£¡£¡£¡£¡£¸ÃLinux½©Ê¬ÍøÂç´ÓTorÍøÂçÏÂÔØËüËùÐèµÄËùÓÐÎļþ£¬ £¬£¬°üÀ¨ss¡¢psºÍcurlµÈÕýµ±µÄ¶þ½øÖÆÎļþ£¬ £¬£¬»¹Ê¹ÓÃÁËShell¾ç±¾ºÍUnixϵͳÉè¼ÆÖ´ÐÐHTTPÇëÇó£¬ £¬£¬ÒÔ»ñÈ¡ÓйØÊÜѬȾϵͳµÄ¸ü¶àÐÅÏ¢¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬Ñо¿Ö°Ô±³ÆÕâÊǵÚÒ»¸öʹÓÃÁË»ù´¡¼Ü¹¹´úÂ루IaC£©¹¤¾ß£¬ £¬£¬ÖîÈçAnsible¡¢ChefºÍSalt Stack¾ÙÐÐÈö²¥µÄ½©Ê¬ÍøÂç¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/117155/malware/linux-botnet-emerging-techniques.html


5.д¹Âڻαװ³ÉÁÔÍ·¹«Ë¾Michael Page·Ö·¢Ursnif


5.jpg


ÐÂÒ»ÂÖ´¹Âڻαװ³ÉÖ°ÒµÏÈÈÝËùMichael Page·Ö·¢Êý¾ÝÇÔÈ¡¶ñÒâÈí¼þUrsnif¡£¡£¡£¡£¡£Michael PageµÄÓªÒµÆÕ±éÃÀÖÞ¡¢Ó¢¹ú¡¢Å·Ö޴󽡢ÑÇÌ«µØÇøºÍ·ÇÖÞ£¬ £¬£¬ÊÇÓ¢¹úµÄPageGroupµÄ×Ó¹«Ë¾¡£¡£¡£¡£¡£PageGroup³Æ£¬ £¬£¬ÆäITϵͳ²¢Î´Ôâµ½¹¥»÷£¬ £¬£¬ÕâЩ´¹ÂÚÓʼþÊÇʹÓùûÕæÐÅÏ¢ÌìÉúµÄÈ»ºóËæ»ú·¢Ë͸øÄ¿µÄµÄ¡£¡£¡£¡£¡£ÕâЩÓʼþʹÓÃǶÈëʽÁ´½Ó½«Êܺ¦ÕßÖØ¶¨Ïòµ½¾ßÓÐGeoIPºÍ·´»úеÈ˼ì²é¹¦Ð§µÄ´¹ÂÚÒ³Ãæ£¬ £¬£¬È»ºó£¬ £¬£¬ÒªÇóÆäÏÂÔØÆôÓÃÁ˺êµÄXSLMÎļþ²¢¾ßÓÐDocuSign±ê¼ÇµÄÎĵµ£¬ £¬£¬×îºóÏÂÔØUrsnif¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-impersonates-global-recruitment-firm-to-push-malware/


6.Ñо¿Ö°Ô±Åû¶Homebrew Cask´æ´¢¿âÖеĴúÂëÖ´ÐÐÎó²î


6.jpg


ÈÕ±¾Çå¾²Ñо¿Ö°Ô±RyotaKÓÚ4ÔÂ18ÈÕÅû¶Homebrew Cask´æ´¢¿âÖб£´æ´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£HomebrewÊÇÒ»¸ö¿ªÔ´Èí¼þ°ü¹ÜÀíÆ÷½â¾ö¼Æ»®£¬ £¬£¬¿ÉÔÚAppleµÄmacOS²Ù×÷ϵͳºÍLinuxÉÏ×°ÖÃÈí¼þ¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÓÉÓÚreview- cask -pr GitHub ActionµÄgit_diffÖÐÓÃÓÚÆÊÎöpullÇëÇóµÄdiffÒÀÀµÏî±£´æÈ±ÏÝ£¬ £¬£¬Òò´ËÆÊÎöÆ÷¿ÉÄܻᱻÓÕÆ­¶øÅú×¼¶ñÒâµÄpullÇëÇó£¬ £¬£¬¿É±»ÓÃÀ´½«í§Òâ´úÂë×¢Èëµ½ÈÝÆ÷ÖС£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬¸ÃÎó²îÒÑÓÚ4ÔÂ19ÈÕ±»ÐÞ¸´¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/04/critical-rce-bug-found-in-homebrew.html