Ñо¿ÍŶӷ¢Ã÷¡®keep¡®µÈPyPI°üÖб£´æÇÔÈ¡ÃÜÂëµÄľÂí

Ðû²¼Ê±¼ä 2022-06-14

1¡¢Ñо¿ÍŶӷ¢Ã÷'keep'µÈPyPI°üÖб£´æÇÔÈ¡ÃÜÂëµÄľÂí


¾ÝýÌå6ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ñо¿ÍŶÓÔÚPyPI°ü¡°keep¡±¡¢¡°pyanxdns¡±ºÍ¡°api-res-py¡±Öз¢Ã÷Á˺óÃÅ£¬£¬£¬£¬£¬£¬ËüÃǶ¼Ê¹ÓÃÁ˶ñÒâÒÀÀµÏî¡°request¡±¡£¡£¡£¡£ÌØÊâÊÇ¡°keep¡±°ü£¬£¬£¬£¬£¬£¬Ã¿ÖܵÄÏÂÔØÁ¿¸ß´ï8000¶à´Î¡£¡£¡£¡£ÆäÖд󲿷ְ汾µÄ¡°keep¡±Ê¹ÓÃÁËÕýµ±µÄPythonÄ£¿£¿£¿£¿£¿£¿é¡°requests¡±£¬£¬£¬£¬£¬£¬µ«¡°keep¡±v.1.2ʹÓÃÁËÆ´Ð´¹ýʧµÄ¡°request¡±¡£¡£¡£¡£¾­ÆÊÎö£¬£¬£¬£¬£¬£¬¶ñÒâµÄ¡°request¡±ÖаüÀ¨Á½¸öURL£¬£¬£¬£¬£¬£¬ÆäÖÐÒ»¸öÖ¸ÏòÌṩRATµÄ¶ñÒâÈí¼þcheck.so£¬£¬£¬£¬£¬£¬¶øÁíÒ»¸öÔòÖ¸Ïòx.pyx£¬£¬£¬£¬£¬£¬°üÀ¨¿ÉÇÔÈ¡ä¯ÀÀÆ÷ÖеǼÃûºÍÃÜÂëµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pypi-package-keep-mistakenly-included-a-password-stealer/


2¡¢Îڸɴï֤ȯÉúÒâËù£¨USE£©Ð¹Â¶Áè¼Ý32 GBµÄÓû§ÐÅÏ¢


¾Ý6ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ AnuragÔÚɨÃèShodanÉÏÉèÖùýʧµÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬·¢Ã÷ÁËһ̨̻¶µÄЧÀÍÆ÷°üÀ¨Áè¼Ý32GBµÄÊý¾Ý¡£¡£¡£¡£¾­ÆÊÎö£¬£¬£¬£¬£¬£¬¸ÃЧÀÍÆ÷ÊôÓÚÎڸɴï֤ȯÉúÒâËù£¨USE£©µÄEasy Portal£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öÔÚÏßЧÀÍÃÅ»§£¬£¬£¬£¬£¬£¬Óû§¿Éͨ¹ýÆäÉó²é¹ÉƱ¡¢±¨±íºÍ¼à¿ØÕË»§Óà¶î¡£¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢Óû§Ãû¡¢µØµã¡¢»á¼ûÁîÅÆ¡¢µç»°ºÅÂë¡¢Ã÷ÎÄÃÜÂëºÍÒøÐÐÏêϸÐÅÏ¢µÈ¡£¡£¡£¡£ÎڸɴïÕþ¸®Ò»Ö±Î´¶Ô´ËÊÂ×÷³ö»ØÓ¦£¬£¬£¬£¬£¬£¬µ«6ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬Ì»Â¶µÄÊý¾Ý´Ó32 GBïÔÌ­µ½ÁËMBs¡£¡£¡£¡£


https://www.hackread.com/scoop-uganda-security-exchange-leaking-sensitive-records/


3¡¢Ñо¿Ö°Ô±Õ¹ÏÖÔõÑù¶ÔÀ¶ÑÀÐźžÙÐÐÖ¸ÎÆÊ¶±ðÀ´¸ú×ÙÊÖ»ú


ýÌå6ÔÂ10Èճƣ¬£¬£¬£¬£¬£¬¼ÓÀû¸£ÄáÑÇ´óѧʥµØÑǸç·ÖУµÄ¾ÙÐеÄÒ»ÏîÐÂÑо¿Ê×´ÎÕ¹ÏÖÁËÀ¶ÑÀÐźſÉÒÔ±»Ö¸ÎÆÊ¶±ðÒÔ¸ú×ÙÖÇÄÜÊÖ»ú¡£¡£¡£¡£¸ÃÒªÁìµÄ½¹µãʹÓÃÀ¶ÑÀоƬ×éÓ²¼þµÄÎó²î£¬£¬£¬£¬£¬£¬´Ó¶ø±¬·¢¡°ÆæÒìµÄÎïÀí²ãÖ¸ÎÆ¡±¡£¡£¡£¡£ÓÉÓÚÀ¶ÑÀµÍ¹¦ºÄ(BLE)ÐűêÎÞ´¦²»ÔÚ£¬£¬£¬£¬£¬£¬ÏÖ´ú×°±¸Ò»Ö±´«ÊäÕâЩÐűêÀ´ÆôÓÃÒªº¦¹¦Ð§£¬£¬£¬£¬£¬£¬Ê¹µÃ¹¥»÷³ÉΪ¿ÉÄÜ¡£¡£¡£¡£ÁíÒ»·½Ã棬£¬£¬£¬£¬£¬Ó²¼þÖеÄÎó²îÔ´ÓÚWiFiºÍµÍ¹¦ºÄÀ¶ÑÀ×é¼þͨ³£¼¯³ÉÔÚÒ»Æð£¬£¬£¬£¬£¬£¬¿ÉÒÔͨ¹ýÔØ²¨ÆµÂÊÆ«ÒƺÍIQÎÞÏßµçÐźŲ»Æ½ºâÀ´ÌìÉúʶ±ðÖ¸ÎÆ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÒªÖ´ÐÐÎïÀí²ãÖ¸ÎÆ¹¥»÷£¬£¬£¬£¬£¬£¬±ØÐèÅ䱸»ùÓÚÈí¼þµÄÎÞÏßµçÐá̽Æ÷£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»ÖÖÄܹ»¼Í¼ԭʼIQÎÞÏßµçÐźŵÄÎÞÏßµçÎüÊÕÆ÷¡£¡£¡£¡£


https://thehackernews.com/2022/06/researchers-find-bluetooth-signals-can.html


4¡¢MyEasyDocsÒòЧÀÍÆ÷ÉèÖùýʧй¶Áè¼Ý30 GBµÄÊý¾Ý


6ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬vpnMentor³ÆÓ¡¶ÈMyEasyDocsµÄMicrosoft AzureЧÀÍÆ÷ÉèÖùýʧ£¬£¬£¬£¬£¬£¬Ð¹Â¶30.5 GBµÄÊý¾Ý¡£¡£¡£¡£ÕâÊÇÒ»¸öÔÚÏßÎĵµÑé֤ƽ̨£¬£¬£¬£¬£¬£¬Ö÷ÒªÓÃÓÚÑéÖ¤ÓëÒøÐС¢Ñ§Ôº¡¢´óѧ¡¢Õþ¸®»ú¹¹ºÍÖ´·¨»ú¹¹Ïà¹ØµÄÎļþ¡£¡£¡£¡£´Ë´Îй¶ÁËÀ´×ÔÓ¡¶ÈºÍÒÔÉ«ÁеÄ57000¶à¸öѧÉúµÄСÎÒ˽¼ÒÐÅÏ¢ºÍ½ÌÓý¼Í¼£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢Ð§¹û¡¢Éí·ÝÖ¤ºÍ´óѧע²áºÅµÈ¡£¡£¡£¡£Ì»Â¶µÄЧÀÍÆ÷ÓÚ2022Äê2ÔÂ2ÈÕÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬ÓÚ2ÔÂ14ÈÕ±»±£»£» £»£» £» £»£»¤ÆðÀ´£¬£¬£¬£¬£¬£¬ÊÂÎñµÄϸ½ÚÐÅÏ¢Ö±µ½6ÔÂ9Èղű»Åû¶¡£¡£¡£¡£


https://www.hackread.com/myeasydocs-exposed-30gb-israel-india-students-pii-data/


5¡¢ÐµÄWannaFriendMeͨ¹ýÓÎϷƽ̨Robux³öÊÛÆä½âÃܳÌÐò


6ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬MalwareHunterTeamµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÃûΪ¡°WannaFriendMe¡±µÄÐÂÀÕË÷Èí¼þ¡£¡£¡£¡£ËüÄ£ÄâÁËRyuk£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÊÇChaosµÄ±äÖÖ¡£¡£¡£¡£ÆäÓëÖÚ²î±ðÖ®´¦ÔÚÓÚ£¬£¬£¬£¬£¬£¬ÒªÇóÄ¿µÄʹÓÃRobux´ÓRobloxµÄGame PassÊÐËÁ¹ºÖýâÃÜÆ÷£¬£¬£¬£¬£¬£¬¶ø²»ÊÇʹÓüÓÃÜÇ®±Ò×÷ΪÊê½ð¡£¡£¡£¡£»á¼ûRoblox Game PassÊÐËÁµÄURLʱ£¬£¬£¬£¬£¬£¬¾Í¿ÉÒÔ¿´µ½ÃûΪ¡°iRazormind¡±µÄÓû§ÕýÔÚÒÔ1499 RobuxµÄ¼ÛÇ®³öÊÛ¡°Ryuk Decrypter¡±£¬£¬£¬£¬£¬£¬×îºóÒ»´Î¸üÐÂÊÇÔÚ6ÔÂ5ÈÕ¡£¡£¡£¡£µ«ÈκδóÓÚ2MBµÄÎļþ¶¼½«±»Ëæ»úÊý¾ÝÁýÕÖ£¬£¬£¬£¬£¬£¬ÕâÒâζ×Å×ÝȻĿµÄ¹ºÖÃÏàʶÃÜÆ÷£¬£¬£¬£¬£¬£¬Ò²Ö»Äָܻ´Ð¡ÓÚ2MBµÄÎļþ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬RobloxÒÑɾ³ýÁËÏà¹ØÕÊ»§¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/roblox-game-pass-store-used-to-sell-ransomware-decryptor/


6¡¢ProofpointÐû²¼2022Äê¼ÓÃÜÇ®±Ò¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


ProofpointÔÚ6ÔÂ9ÈÕÐû²¼Á˹ØÓÚ2022Äê¼ÓÃÜÇ®±Ò¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬Õë¶Ô¼ÓÃÜÇ®±ÒµÄ´¹ÂÚ¹¥»÷ƾ֤»ùÀ´Ô´Àí¿ÉÒÔ´óÖ·ÖΪÈýÀࣺ¼ÓÃÜÇ®±ÒÆ¾Ö¤ÍøÂç¡¢¼ÓÃÜÇ®±ÒתÕËÇëÇóºÍÕë¶Ô¼ÓÃÜÇ®±ÒµÄÉÌÆ·ÇÔÈ¡¡£¡£¡£¡£Í¨¹ý´¹Âڻ¾ÙÐеÄÁíÒ»ÖÖ·¸·¨ÐÎʽÊÇBEC¹¥»÷£¬£¬£¬£¬£¬£¬2022ÄêProofpoint»á°´ÆÚÊÓ²ìBECʵÑéÖеļÓÃÜÇ®±Ò×ªÒÆ£¬£¬£¬£¬£¬£¬ÌåÏÖÈôÊÇûÓмÓÃÜÇ®±Ò£¬£¬£¬£¬£¬£¬BEC·ÖÀàÖеÄÀÕË÷²¿·Ö²»»áÏñ½ñÌìÕâÑùÀֳɡ£¡£¡£¡£Proofpointƽ¾ùÌìÌì»á×èÖ¹100Íò·âÀÕË÷Óʼþ£¬£¬£¬£¬£¬£¬×î¸ßʱ¿É´ïÌìÌì½ü200Íò·â£¬£¬£¬£¬£¬£¬´ó´ó¶¼ÒªÇóÄ¿µÄÓüÓÃÜÇ®±Ò¸¶¿î¡£¡£¡£¡£


https://www.proofpoint.com/us/blog/threat-insight/how-cyber-criminals-target-cryptocurrency