CiscoÐû²¼Çå¾²¸üÐÂÐÞ¸´IP PhoneϵÁвúÆ·ÖÐÎó²î

Ðû²¼Ê±¼ä 2023-03-03

1¡¢CiscoÐû²¼Çå¾²¸üÐÂÐÞ¸´IP PhoneϵÁвúÆ·ÖÐÎó²î


CiscoÔÚ3ÔÂ1ÈÕÐû²¼Çå¾²¸üУ¬£¬ £¬£¬£¬£¬£¬ÐÞ¸´Ó°ÏìÆäIP Phone 6800¡¢7800¡¢7900ºÍ8800ϵÁвúÆ·µÄÎó²î ¡£¡£¡£¡£ÕâÊÇ»ùÓÚWebµÄÖÎÀí½çÃæÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2023-20078£©£¬£¬ £¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬ £¬£¬£¬£¬£¬ÊÇÓÉÓÚ¶ÔÓû§ÌṩµÄÊäÈëµÄÑéÖ¤²»³ä·Öµ¼ÖµÄ£¬£¬ £¬£¬£¬£¬£¬ÀֳɵÄʹÓôËÎó²î¿ÉÔÚÊÜÓ°Ïì×°±¸µÄµ×²ã²Ù×÷ϵͳÉÏÖ´ÐÐí§ÒâÏÂÁî ¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾»¹Åû¶ÁËDoSÎó²î£¨CVE-2023-20079£©£¬£¬ £¬£¬£¬£¬£¬Ò²ÊǶÔÓû§ÌṩµÄÊäÈëµÄÑéÖ¤²»³ä·Öµ¼ÖµÄ£¬£¬ £¬£¬£¬£¬£¬¿É±»ÓÃÀ´´¥·¢DoSÌõ¼þ ¡£¡£¡£¡£


https://thehackernews.com/2023/03/critical-flaw-in-cisco-ip-phone-series.html


2¡¢Exchange Online·ºÆðBugµ¼ÖÂÈ«ÇòÓû§ÎÞ·¨»á¼û


¾ÝýÌå3ÔÂ1ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬£¬MicrosoftÕýÔÚÊÓ²ìÈ«ÇòExchange OnlineÓû§ÎÞ·¨»á¼ûÆäÓÊÏäµÄÎÊÌâ ¡£¡£¡£¡£´Ó3ÔÂ1ÈÕ1:11 PM UTC×îÏÈ£¬£¬ £¬£¬£¬£¬£¬ÊÜÓ°ÏìÓû§ÔÚ·¢ËÍ»òÎüÊÕÓʼþʱ»á¿´µ½"550 5.4.1 Recipient address rejected: Access denied"µÄ¹ýʧÌáÐÑ ¡£¡£¡£¡£MicrosoftÔÚ5:22 PM UTC³ÆÒѾ­·¢Ã÷ÁËÒ»¸öDZÔڵĻùÓÚĿ¼µÄ±ßÑØ·â±Õ£¨DBEB£©ÎÊÌâ ¡£¡£¡£¡£16:01 EST£¬£¬ £¬£¬£¬£¬£¬MicrosoftÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬Í¨¹ýExchange Online Protection(EOP)Á÷Á¿ÔÚÊÜÓ°ÏìµÄ»ù´¡ÉèÊ©ÖÐÖØÐÂÉèÖ÷ÓÉ£¬£¬ £¬£¬£¬£¬£¬½â¾öÁ˸ÃÎÊÌâ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-exchange-online-outage-blocks-access-to-mailboxes-worldwide/


3¡¢eSentireÅû¶Õë¶Ô¶à¸ö״ʦÊÂÎñËùµÄ¹¥»÷»î¶¯µÄÏêÇé


eSentireÓÚ2ÔÂ28ÈÕÅû¶ÁËÔÚ2023Äê1ÔºÍ2ÔÂÕë¶Ô6¼Ò²î±ðµÄ״ʦÊÂÎñËùµÄ¹¥»÷ ¡£¡£¡£¡£ÕâЩ¹¥»÷Ô´×ÔÁ½¸ö²î±ðµÄ¹¥»÷»î¶¯£¬£¬ £¬£¬£¬£¬£¬ÆäÖÐÖ®Ò»ÊÔͼÓöñÒâÈí¼þGootLoaderѬȾ״ʦÊÂÎñËùµÄÔ±¹¤£¬£¬ £¬£¬£¬£¬£¬ÁíÒ»³¡»î¶¯Ê¹ÓöñÒâÈí¼þSocGholish¹¥»÷״ʦÊÂÎñËùÔ±¹¤ºÍÆäËüÄ¿µÄ ¡£¡£¡£¡£GootLoader»î¶¯Ê¹ÓÃËÑË÷ÒýÇæÓÅ»¯(SEO)Öж¾£¬£¬ £¬£¬£¬£¬£¬ÆäÈëÇÖÁËÕýµ±µÄWordPressÍøÕ¾£¬£¬ £¬£¬£¬£¬£¬²¢Ê¹Óá°Ð­Ò顱µÈÒªº¦×ÖÓÕʹĿµÄÏÂÔØ¶ñÒâÈí¼þ ¡£¡£¡£¡£SocGholish»î¶¯Ê¹ÓÃÁË״ʦÊÂÎñËù¾­³£»Ý¹ËµÄÍøÕ¾¾ÙÐÐË®¿Ó¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ÒÔÐéαµÄä¯ÀÀÆ÷¸üÐÂΪÓÕ¶üÈö²¥¶ñÒâÈí¼þ ¡£¡£¡£¡£


https://www.esentire.com/blog/hackers-attack-employees-from-six-law-firms-with-the-gootloader-and-socgholish-malware-using-fake-legal-agreements-and-malicious-watering-hole-s-reports-esentire


4¡¢°µÍøBidenCashÖÜÄê»î¶¯¹ûÕæ200¶àÍòÕÅÐÅÓÿ¨µÄÐÅÏ¢


¾Ý3ÔÂ2ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬£¬Ò»¸ö°µÍøÐÅÓÿ¨Êг¡BidenCash¹ûÕæÁËÁè¼Ý200ÍòÕÅÓÐÓÃÐÅÓÿ¨µÄÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬×÷ΪÆäÖÜÄê´ÙÏú»î¶¯µÄÒ»²¿·Ö ¡£¡£¡£¡£ÕâЩÐÅÓÿ¨À´×ÔÌìϸ÷µØ£¬£¬ £¬£¬£¬£¬£¬ÆäÖд󲿷ÖÊÇÔÚÃÀ¹ú¡¢Ä«Î÷¸ç¡¢Ó¡¶È¡¢¼ÓÄôóºÍÓ¢¹ú¿¯ÐÐµÄ ¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨³Ö¿¨È˵ÄÐÕÃû¡¢¿¨ºÅ¡¢ÒøÐÐÏêϸÐÅÏ¢¡¢ÓÐÓÃÆÚ¡¢¿¨ÑéÖ¤Öµ(CVV)¡¢¼ÒͥסַºÍÁè¼Ý500000¸öÓʼþµØµã ¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬£¬BidenCashÇÔÊØÐÅÏ¢µÄ·½·¨Éв»Ã÷È·£¬£¬ £¬£¬£¬£¬£¬Õþ¸®ÕýÔÚÊÓ²ìÕâÆðÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬²¢½¨ÒéÊÜÓ°ÏìµÄ³Ö¿¨ÈË¼à¿ØËûÃǵÄÕË»§ ¡£¡£¡£¡£


https://www.hackread.com/bidencash-leaks-2-million-credit-cards/


5¡¢Ó¢¹úÁãÊÛÊÐËÁWH Smith³ÆÆäÔ±¹¤Êý¾ÝÔâµ½²»·¨»á¼û


ýÌå3ÔÂ2Èճƣ¬£¬ £¬£¬£¬£¬£¬Ó¢¹úÁãÊÛÊÐËÁWH SmithÔâµ½¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ÏÖÔ±¹¤ºÍǰԱ¹¤µÄÐÅϢй¶ ¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÓ¢¹úı»®×Å1700¸öÊÐËÁ£¬£¬ £¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý12500ÃûÔ±¹¤£¬£¬ £¬£¬£¬£¬£¬2022ÄêµÄÊÕÈëΪ16.7ÒÚÃÀÔª ¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬´Ë´ÎÊÂÎñµ¼Ö¹«Ë¾µÄ²¿·ÖÊý¾Ý±»²»·¨»á¼û£¬£¬ £¬£¬£¬£¬£¬µ«²¢Î´Ó°ÏìÆäÉÌÒµÓªÒµ ¡£¡£¡£¡£¿£¿£¿£¿Í»§ÐÅϢûÓÐÊܵ½Ó°Ï죬£¬ £¬£¬£¬£¬£¬ÓÉÓÚÕâЩÐÅÏ¢´æ´¢ÔÚµ¥¶ÀµÄϵͳÉÏ ¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐ͸¶ÊÂÎñµÄÐÔ×Ó£¬£¬ £¬£¬£¬£¬£¬µ«¿ÉÄÜÊÇÀÕË÷Èí¼þ¹¥»÷ ¡£¡£¡£¡£ËäȻûÓйØÓÚ¹¥»÷ÈÕÆÚµÄÏêϸÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬µ«¹¥»÷Ó¦¸ÃÊDZ¬·¢ÔÚ1ÔÂ18ÈÕÖ®ºó ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/british-retail-chain-wh-smith-says-data-stolen-in-cyberattack/


6¡¢TrendMicroÐû²¼APT27¶ñÒâÈí¼þSysUpdateµÄÆÊÎö±¨¸æ


3ÔÂ1ÈÕ£¬£¬ £¬£¬£¬£¬£¬Trend MicroÐû²¼ÁËAPT27£¨Iron Tiger£©Linux°æ±¾×Ô½ç˵¶ñÒâÈí¼þSysUpdateµÄÆÊÎö±¨¸æ ¡£¡£¡£¡£ºÚ¿ÍÓÚ2022Äê7ÔÂÊ״βâÊÔÁËLinux°æ±¾£¬£¬ £¬£¬£¬£¬£¬È»¶øÖ±µ½2022Äê10Ô£¬£¬ £¬£¬£¬£¬£¬¶à¸öpayload²Å×îÏÈÔÚÒ°ÍâÈö²¥ ¡£¡£¡£¡£¸ÃLinux±äÌåÊÇÒ»¸öELF¿ÉÖ´ÐÐÎļþ£¬£¬ £¬£¬£¬£¬£¬Ê¹ÓÃAsio¿âÓÃC++¿ª·¢£¬£¬ £¬£¬£¬£¬£¬Æä¹¦Ð§ÓëWindows°æSysUpdateºÜÊÇÏàËÆ£¬£¬ £¬£¬£¬£¬£¬ÐÂÔöÁËDNSËíµÀ¹¦Ð§ ¡£¡£¡£¡£Trend MicroÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬Ñ¡ÔñAsio¿âÀ´¿ª·¢Linux°æ±¾µÄSysUpdate¿ÉÄÜÊÇÓÉÓÚËüµÄ¶àƽ̨¿ÉÒÆÖ²ÐÔ£¬£¬ £¬£¬£¬£¬£¬²¢Õ¹ÍûmacOS°æ±¾¿ÉÄܺܿì¾Í»á·ºÆð ¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html