Microsoft DNSÉèÖùýʧµ¼ÖÂHotmailÓʼþ·¢ËÍʧ°Ü
Ðû²¼Ê±¼ä 2023-08-221¡¢Microsoft DNSÉèÖùýʧµ¼ÖÂHotmailÓʼþ·¢ËÍʧ°Ü
¾ÝýÌå8ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬È«Çò¹æÄ£ÄÚµÄHotmailÓû§ÔÚ·¢Ë͵ç×ÓÓʼþʱÓöµ½ÎÊÌâ¡£¡£¡£¡£¡£ÔÚMicrosoft¹ýʧÉèÖÃÓòµÄDNS SPF¼Í¼ºó£¬£¬£¬£¬£¬£¬£¬Óʼþ±»±ê¼ÇΪÀ¬»øÓʼþ»òδËÍ´ï¡£¡£¡£¡£¡£¸ÃÎÊÌâʼÓÚ17ÈÕÉîÒ¹£¬£¬£¬£¬£¬£¬£¬ÏÔʾ¹ýʧÐÂÎÅ¡°´Ë¹ýʧÓë·¢¼þÈËÕ½ÂÔ¿ò¼Ü(SPF)Óйء£¡£¡£¡£¡£Ä¿µÄÓʼþϵͳ¶ÔÓʼþµÄSPF¼Í¼µÄÆÀ¹Àµ¼Ö¹ýʧ¡£¡£¡£¡£¡£ÇëÓëÄúµÄÓò×¢²áÉÌÏàÖú£¬£¬£¬£¬£¬£¬£¬È·±£ÄúµÄSPF¼Í¼ÉèÖÃ׼ȷ¡±¡£¡£¡£¡£¡£¸ÃÎÊÌâÔ´ÓÚMicrosoftɾ³ýÁËhotmail.com SPF¼Í¼ÖеÄ"include:spf.protection.outlook.com"¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸ÃÎÊÌâÒѾ»ñµÃ½â¾ö¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/hotmail-email-delivery-fails-after-microsoft-misconfigures-dns/
2¡¢Ivanti SentryÖеÄÎó²îCVE-2023-38035Òѱ»Ê¹ÓÃ
¾Ý8ÔÂ21ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬Ivanti Sentry£¨ÒÔǰ³ÆÎªMobileIron Sentry£©ÖеÄÒ»¸öAPIÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î(CVE-2023-38035)Òѱ»Ê¹Óᣡ£¡£¡£¡£Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿Éͨ¹ýMobileIronÉèÖÃЧÀÍ(MICS)ʹÓõÄ8443¶Ë¿Ú»á¼ûÖÎÀíÃÅ»§ÉèÖÃAPI£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔʹÓÃÏÞÖÆÈ±·¦µÄApache HTTPDÉèÖÃÈÆ¹ýÉí·ÝÑéÖ¤¿ØÖÆÀ´ÊµÏÖ¡£¡£¡£¡£¡£ÀÖ³ÉʹÓú󣬣¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÔÚÔËÐÐIvanti Sentry 9.18¼°¸üµÍ°æ±¾µÄϵͳÉϸü¸ÄÉèÖá¢ÔËÐÐϵͳÏÂÁî»òдÈëÎļþ¡£¡£¡£¡£¡£ÏÖÔÚ¹©Ó¦ÉÌÒÑÐû²¼Çå¾²¸üÐÂÐÞ¸´´ËÎó²î¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-actively-exploited-mobileiron-zero-day-bug/
3¡¢°Ä´óÀûÑÇauDA·ñ¶¨NoEscapeÇÔÈ¡Æä15 GBÊý¾ÝµÄ˵·¨
ýÌå8ÔÂ21Èճƣ¬£¬£¬£¬£¬£¬£¬ÖÎÀí°Ä´óÀûÑÇÓòÃû.auµÄ»ú¹¹auDA·ñ¶¨Æä±¬·¢ÁËÊý¾Ýй¶¡£¡£¡£¡£¡£¸Ã»ú¹¹±»ÊÓΪ°Ä´óÀûÑÇÒªº¦»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬ÓÐ400¶àÍò¸öÓòÃû×¢²áÔÚ.auÉÏ¡£¡£¡£¡£¡£8ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïNoEscapeÉù³Æ¹¥»÷Á˸ûú¹¹²¢ÇÔÈ¡ÁË15 GBÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢µÈ¡£¡£¡£¡£¡£auDA³ÆËûÃǼì²éÁËNoEscape¹ûÕæµÄÎļþ£¬£¬£¬£¬£¬£¬£¬ÕâЩÎļþ²¢Ã»Óд洢ÔÚËûÃǵÄϵͳÉÏ¡£¡£¡£¡£¡£²¢ÌåÏÖÊý¾Ýй¶µÄȪԴÊÇÒ»¸ö°Ä´óÀûÑǸöÌåÉÌ»§£¬£¬£¬£¬£¬£¬£¬ÆäЧÀÍÆ÷ÓÚ8ÔÂ10ÈÕÔâµ½¹¥»÷¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÅúÅÐÁËauDAµÄ»ØÓ¦£¬£¬£¬£¬£¬£¬£¬²¢Íþв"½«³öÊÛÓà¶îÁè¼Ý4000ÃÀÔªµÄÒøÐÐÕË»§µÄ»á¼ûȨÏÞ"¡£¡£¡£¡£¡£
https://therecord.media/australia-domain-name-admin-denies-data-breach
4¡¢ESETÅû¶ּÔÚÇÔȡȫÇòZimbraÕË»§µÄ´ó¹æÄ£´¹Âڻ
8ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ESETÅû¶ÁËÕë¶ÔZimbra Collaborationµç×ÓÓʼþЧÀÍÆ÷µÄ´ó¹æÄ£´¹Âڻ¡£¡£¡£¡£¡£¸Ã»î¶¯ÖÁÉÙ´Ó4ÔÂÆð¾ÍÒ»Ö±ÔÚ¾ÙÐУ¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡȫÇò¹æÄ£ÄÚZimbraÕË»§µÄƾ֤¡£¡£¡£¡£¡£±»¹¥»÷µÄÄ¿µÄÖ÷ҪλÓÚ²¨À¼£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊǶò¹Ï¶à¶ûºÍÒâ´óÀû¡£¡£¡£¡£¡£´¹ÂÚÓʼþð³äZimbraÖÎÀíÔ±£¬£¬£¬£¬£¬£¬£¬Í¨ÖªÓû§¼´½«¾ÙÐÐÓʼþЧÀÍÆ÷¸üУ¬£¬£¬£¬£¬£¬£¬Õ⽫µ¼ÖÂÕÊ»§ÔÝʱͣÓ㬣¬£¬£¬£¬£¬£¬²¢ÒªÇóÊÕ¼þÈË·¿ª¸½¼ÓµÄHTMLÎļþÏàʶ¸ü¶àÐÅÏ¢¡£¡£¡£¡£¡£·¿ªºóÊÇÒ»¸öαÔìµÄZimbraµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬£¬£¬ÓÕʹĿµÄÊäÈëÕË»§µÄƾ֤¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬£¬Óû§ÊäÈëµÄÐÅÏ¢½«Í¨¹ýHTTPS POSTÇëÇó·¢Ë͵½¹¥»÷ÕßµÄЧÀÍÆ÷¡£¡£¡£¡£¡£
https://www.welivesecurity.com/en/eset-research/mass-spreading-campaign-targeting-zimbra-users/
5¡¢Sysdig·¢Ã÷Õë¶ÔGitLabµÄÍÚ¿óºÍÊðÀíÐ®ÖÆ»î¶¯LABRAT
SysdigÔÚ8ÔÂ17ÈÕ³ÆÆä·¢Ã÷Á˱»³ÆÎªLABRATµÄ¼ÓÃÜÇ®±ÒÍÚ¾òºÍÊðÀíÐ®ÖÆ»î¶¯¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃGitLabÎó²î£¨CVE-2021-22205£©»ñµÃ¶ÔÈÝÆ÷µÄ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬»¹Ê¹ÓÃδ±»¼ì²âµ½µÄ»ùÓÚÊðÃûµÄ¹¤¾ß¡¢ÖØ´óµÄ¿çƽ̨¶ñÒâÈí¼þ¡¢Èƹý·À»ðǽµÄC2¹¤¾ßÒÔ¼°»ùÓÚÄں˵ÄrootkitÀ´Òþ²ØÆä±£´æ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÀÄÓÃÕýµ±Ð§ÀÍTryCloudflareÀ´»ìÏýËûÃǵÄC2¡£¡£¡£¡£¡£¸Ã»î¶¯Ö÷Ҫͨ¹ýÊðÀíÐ®ÖÆºÍ¼ÓÃÜÇ®±ÒÍÚ¿óÀ´×¬È¡ÊÕÈë¡£¡£¡£¡£¡£
https://sysdig.com/blog/labrat-cryptojacking-proxyjacking-campaign/
6¡¢Rapid7Ðû²¼¹ØÓÚ2023ÄêÄêÖÐÍþÐ²Ì¬ÊÆµÄ»ØÊ×±¨¸æ
8ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Rapid7Ðû²¼ÁË2023ÄêÄêÖÐÍþÐ²Ì¬ÊÆµÄ»ØÊ×±¨¸æ¡£¡£¡£¡£¡£2023ÄêÉϰëÄ꣬£¬£¬£¬£¬£¬£¬Ñо¿ÍŶӸú×ÙÁË1500¶àÆðÀÕË÷¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷´ó²¿·ÖÊÇÓÉLockBit(35.3%)¡¢ALPHV/BlackCat(14.2%)ºÍClop(11.9%)Ö´Ðеġ£¡£¡£¡£¡£×î³£¼ûµÄ³õʼ»á¼ûÊÖÒÕÊÇÔ¶³Ì»á¼û£¬£¬£¬£¬£¬£¬£¬Õ¼±È39%£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÎó²îʹÓã¨27%£©¡£¡£¡£¡£¡£40%µÄÊÂÎñÊÇÓÉÓÚMFAȱʧ»òÖ´ÐÐ·×ÆçÖµ¼Öµģ¬£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇÔÚVPN¡¢VDIºÍSaaS²úÆ·ÉÏ¡£¡£¡£¡£¡£79Æð¹¥»÷¹éÒòÓÚÓë¹ú¼ÒÏà¹ØµÄ¹¥»÷Õߣ¬£¬£¬£¬£¬£¬£¬ÆäÖÐÔ¼ËÄ·ÖÖ®Ò»(24%)ʹÓÃÁËÃæÏò¹«ÖÚµÄÓ¦ÓóÌÐòµÄÎó²î¡£¡£¡£¡£¡£
https://www.rapid7.com/blog/post/2023/08/17/rapid7s-mid-year-threat-review/


¾©¹«Íø°²±¸11010802024551ºÅ