ÍøÂç´¹ÂÚ¹¥»÷Ãé×¼GitHub  £¬½ü12000´æ´¢¿âÃæÁÙΣº¦

Ðû²¼Ê±¼ä 2025-03-17

1. ÍøÂç´¹ÂÚ¹¥»÷Ãé×¼GitHub  £¬½ü12000´æ´¢¿âÃæÁÙΣº¦


3ÔÂ16ÈÕ  £¬Ò»³¡´ó¹æÄ£µÄÍøÂç´¹ÂÚÔ˶¯Õë¶Ô½ü12,000¸öGitHub´æ´¢¿âÌᳫÁËÐéαµÄ¡°Çå¾²¾¯±¨¡±  £¬ÍýÏëÓÕÆ­¿ª·¢Ö°Ô±ÊÚȨһ¸ö¶ñÒâµÄOAuthÓ¦ÓóÌÐò¡£¸ÃÓ¦ÓóÌÐòÒ»µ©»ñµÃÊÚȨ  £¬½«¸¶Óë¹¥»÷Õß¶ÔÓû§ÕÊ»§ºÍ´úÂëµÄÍêÈ«¿ØÖÆÈ¨¡£ÕâÐ©ÍøÂç´¹ÂÚÎÊÌâ¶¼°üÀ¨ÏàͬµÄÎı¾  £¬Éù³Æ¼ì²âµ½À´×Ô±ùµºÀ׿ËÑÅδ¿ËºÍÌØ¶¨IPµØÖ·µÄÒì³£µÇ¼ʵÑé¡£ÍøÂçÇå¾²Ñо¿Ô±Luc4mÊ×ÏÈ·¢Ã÷ÁËÕâһȦÌ×  £¬ÆäÖÐÖÒÑÔÓû§Ó¦¸üÐÂÃÜÂë¡¢¼ì²éÔ˶¯»á»°²¢ÆôÓÃË«ÒòËØÉí·ÝÑéÖ¤  £¬µ«ËùÓÐÁ´½Ó¾ùÖ¸ÏòÒ»¸öÃûΪ¡°gitsecurityapp¡±µÄ¶ñÒâOAuthÓ¦ÓóÌÐò  £¬ÇëÇó´ó×ÚΣÏÕȨÏÞ¡£ÈôÓû§Ê§É÷ÊÚȨ  £¬¸ÃÓ¦Óý«»ñÈ¡¶Ô¹«¹²ºÍ˽Óд洢¿âµÄÍêÈ«»á¼û¡¢Óû§×ÊÁϹÜÀí¡¢×éÖ¯ÏîÄ¿¶ÁÈ¡¡¢ÌÖÂÛ¶Áд¡¢GitHub gist»á¼û¼°´æ´¢¿âɾ³ýµÈȨÏÞ¡£´Ë´ÎÔ˶¯Ê¼ÓÚ½ñÈÕÔçÉÏ6:52  £¬ÏÖÔÚÈÔÔÚÒ»Á¬  £¬ÊÜÓ°Ïì´æ´¢¿âÊýÄ¿ÓÐËù²¨¶¯  £¬ÌåÏÖGitHubÕýÔÚ½ÓÄɲ½·¥Ó¦¶Ô¡£ÈôÄúÊÜÓ°Ïì²¢ÒÑÊÚȨ¸Ã¶ñÒâÓ¦Óà  £¬ÇëÁ¬Ã¦ÔÚGitHubÉèÖÃÖÐ×÷·ÏÆä»á¼ûȨÏÞ  £¬²¢²éÕÒÈκβ»ÊìϤ»ò¿ÉÒɵÄÓ¦ÓóÌÐò¼°GitHub ActionsÊÂÇéÁ÷¡£±ðµÄ  £¬½¨ÒéÂÖ»»ÄúµÄƾ֤ºÍÊÚȨÁîÅÆÒÔÔöÇ¿ÕË»§Çå¾²¡£


https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/


2. ÃÜ¿ËÂÞÄáÎ÷ÑÇÑÅÆÖÖÝÕþ¸®ÎÀÉúÆø¹¹ÔâÀÕË÷Èí¼þ¹¥»÷Ö·þÎñÖÐÖ¹


3ÔÂ16ÈÕ  £¬ÃÜ¿ËÂÞÄáÎ÷ÑÇÑÅÆÖÖÝ  £¬×÷Ϊ̫ƽÑ󵺹úÃÜ¿ËÂÞÄáÎ÷ÑÇÁª°îµÄËĸöÖÝÖ®Ò»  £¬½üÆÚÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷¡£2025Äê3ÔÂ11ÈÕ  £¬ÑÅÆÖµºÎÀÉú²¿¼ì²âµ½ÕâÒ»¹¥»÷  £¬²¢Á¬Ã¦¹Ø±ÕÁËÆäÍøÂçºÍÊý×ÖÒ½ÁÆÏµÍ³ÒÔ±ÜÃâÍþвÀ©É¢¡£¸ÃÖÝÕþ¸®Í¨¹ýFacebookÐû²¼ÁËÇå¾²Îó²î֪ͨ  £¬Ðû²¼ËäÈ»·þÎñÈÔÔÚ¼ÌÐø  £¬µ«ËÙÂʽÏÂý¡£Í¨¸æÖ¸³ö  £¬Õû¸öÍøÂçÒѱ»ÍÑ»ú  £¬ËùÓÐÅÌËã»ú¶¼ÒÑ¹Ø±Õ  £¬ÁìÍÁÇå¾²²¿ÕýÓëÏà¹Ø²¿·Ö¼°Ë½ÈËIT³Ð°üÉ̺Ï×÷  £¬ÆÀ¹ÀÉøÍ¸Ë®Æ½  £¬È·¶¨Ãü¾Ýй¶ÇéÐÎ  £¬²¢Æð¾¢»Ö¸´·þÎñ¡£ÑÅÆÖÎÀÉú¾ÖÕýÔÚÆäËûÕþ¸®»ú¹¹ºÍÍⲿIT³Ð°üÉ̵ÄЭÖúÏÂÊÓ²ì´Ë´ÎÊÂÎñ  £¬²¢Æð¾¢»Ö¸´ÊÜÓ°ÏìµÄϵͳºÍ·þÎñ¡£ÏÖÔÚ  £¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£ÖµµÃ×¢ÖØµÄÊÇ  £¬Ì«Æ½ÑóµºÓìÒѶà´Î³ÉΪÀÕË÷Èí¼þ¹¥»÷µÄÄ¿µÄ  £¬°üÀ¨ÌÀ¼Ó¡¢ÍßŬ°¢Í¼ºÍ·ÆÂɱöµÈ¹ú¶¼ÔøÔâÊܹý´ËÀ๥»÷¡£


https://securityaffairs.com/175445/cyber-crime/a-ransomware-attack-hit-the-micronesian-state-of-yap.html


3. Çå¾²Ñо¿Ô±Ðû²¼AkiraÀÕË÷Èí¼þLinux±äÖÖGPU½âÃÜÆ÷


3ÔÂ15ÈÕ  £¬Çå¾²Ñо¿Ô±Yohanes NugrohoÀÖ³ÉÐû²¼ÁËAkiraÀÕË÷Èí¼þLinux±äÖֵĽâÃÜÆ÷¡£¸Ã½âÃÜÆ÷ʹÓÃGPUÄÜÁ¦¼ìË÷½âÃÜÃÜÔ¿  £¬ÎÞÐèÓû§ÌṩÃÜÔ¿¼´¿ÉÃ⺬»ìËøÎļþ¡£NugrohoºÍÅó٭ƾ֤AkiraʹÓÃʱ¼ä´ÁÌìÉú¼ÓÃÜÃÜÔ¿µÄ·½·¨  £¬Ô­±¾Ô¤¼ÆÒ»ÖÜÄÚÆÆ½â  £¬µ«ÒòÖØ´óÐÔÔöÌí  £¬×îÖÕºÄʱÈýÖÜ  £¬ÆÆ·Ñ1,200ÃÀÔª¹ºÖÃGPU×ÊÔ´¡£AkiraÀÕË÷Èí¼þʹÓÃËĸö²î±ðµÄʱ¼ä´ÁÖÖ×ÓÒÔÄÉÃ뾫¶ÈΪÿ¸öÎļþÌìÉúΨһµÄ¼ÓÃÜÃÜÔ¿  £¬²¢Í¨¹ý1,500ÂÖSHA-256¾ÙÐйþÏ£´¦Öóͷ£  £¬Ê¹ÓÃRSA-4096¼ÓÃܲ¢¸½¼ÓÔÚ¼ÓÃÜÎļþĩβ¡£Ñо¿Ö°Ô±Í¨¹ýÉó²éÈÕÖ¾ÎļþËõСÁ˱©Á¦ÆÆ½âµÄ¿ÉÄÜʱ¼ä´Á¹æÄ£  £¬²¢Ê¹ÓÃRunPodºÍVast.aiÔÆGPU·þÎñ  £¬×îÖÕʹÓÃ16¿éRTX 4090 GPUÔÚԼĪ10СʱÄÚÇ¿ÐÐÆÆ½âÏàʶÃÜÃÜÔ¿¡£µ«»Ö¸´¼ÓÃÜÎļþÊýÄ¿¶àµÄ»°  £¬¸ÃÀú³Ì¿ÉÄÜÐèÒª¼¸Ììʱ¼ä¡£NugrohoÒÑÔÚGitHubÉÏÌṩ½âÃÜÆ÷ºÍ»Ö¸´ÎļþµÄ˵Ã÷  £¬µ«Ê¹ÓÃʱÐè×ÔÐм縺Σº¦  £¬ÓÉÓÚBleepingComputerÉÐδ²âÊԸù¤¾ßµÄÇå¾²ÐÔ»òÓÐÓÃÐÔ¡£


https://www.bleepingcomputer.com/news/security/gpu-powered-akira-ransomware-decryptor-released-on-github/


4. Coinbase ´¹ÂÚµç×ÓÓʼþʹÓÃÐéαǮ°üǨáãÓÕÆ­Óû§


3ÔÂ14ÈÕ  £¬Ò»Æð´ó¹æÄ£µÄÍøÂç´¹ÂÚ¹¥»÷Õë¶ÔCoinbaseÓû§  £¬¹¥»÷Õßͨ¹ý·¢ËÍαװµÄµç×ÓÓʼþ  £¬Éù³ÆCoinbaseÒªÇóÓû§¹ý¶Éµ½×ÔÍйÜÇ®°ü  £¬²¢ÓÕµ¼Óû§Ê¹Óù¥»÷Õß¿ØÖƵÄÔ¤ÌìÉú»Ö¸´¶ÌÓïÉèÖÃÐÂÇ®°ü¡£ÕâЩÓʼþÉù³ÆÀ´×ÔCoinbase  £¬µ«ÓʼþµÄ»Ø¸´µØÖ·ºÍ·¢ËÍIPµØÖ·È´ÏÔʾÒì³£¡£Ö»¹ÜÓʼþͨ¹ýÁ˶àÏîµç×ÓÓʼþÇå¾²¼ì²é  £¬µ«ÏÖʵÉÏÊÇÍøÂç´¹ÂÚÕ©Æ­¡£´Ë´Î´¹ÂÚÔ˶¯µÄÌØµãÊÇÓʼþÖÐûÓд¹ÂÚÁ´½Ó  £¬¶øÊǰüÀ¨Ò»¸ö»Ö¸´¶ÌÓï  £¬ÓÕµ¼Óû§Ê¹ÓøöÌÓïÉèÖÃÐÂÇ®°ü¡£»Ö¸´¶ÌÓïÊǼÓÃÜÇ®±ÒÇ®°ü˽ԿµÄÈËÀà¿É¶Á°æ±¾  £¬ÕÆÎոöÌÓïµÄÈË¿ÉÒÔ»á¼ûÇ®°üÖеļÓÃÜÇ®±ÒºÍNFTs¡£È»¶ø  £¬¹¥»÷Õß²¢Î´ÇÔÈ¡Óû§µÄ»Ö¸´¶ÌÓï  £¬¶øÊÇÌṩÁËËûÃÇÒÑÖªºÍ¿ØÖƵĶÌÓï¡£Ò»µ©Óû§Ê¹ÓøöÌÓïÉèÖÃÐÂÇ®°ü²¢×ªÈë×ʽð  £¬ËùÓÐ×ʲú¶¼½«±»¹¥»÷ÕßÇÔÈ¡¡£CoinbaseÒÑÐû²¼ÖÒÑÔ  £¬³ÆËûÃÇÓÀÔ¶²»»áÏò¿Í»§·¢Ëͻָ´¶ÌÓï  £¬²¢ÌáÐÑÓû§Ð¡ÐÄ´ËÀàÕ©Æ­¡£¹ØÓÚÒÑÏÝÈëȦÌ×µÄÓû§  £¬½¨ÒéѸËÙ½«ÐÂÇ®°üÖеÄ×ʽðת»Ø×Ô¼ºµÄÇ®°ü¡£Í¬Ê±  £¬Óû§Ó¦Ìá¸ßСÐÄ  £¬ÓÀÔ¶²»ÒªÊ¹ÓÃͨ¹ýµç×ÓÓʼþºÍÍøÕ¾¹²ÏíµÄ»Ö¸´¶ÌÓï  £¬ÒÔ°ü¹Ü×Ô¼ºµÄ¼ÓÃÜÇ®±ÒÇå¾²¡£


https://www.bleepingcomputer.com/news/security/coinbase-phishing-email-tricks-users-with-fake-wallet-migration/


5. ΪÆÚÒ»ÖܵÄExchange OnlineÖÐÖ¹µ¼Öµç×ÓÓʼþʧ°Ü»òÑÓ³Ù


3ÔÂ14ÈÕ  £¬Î¢Èí½üÆÚÔâÓöÁ˳¤´ïÒ»ÖܵÄExchange OnlineÖÐÖ¹ÎÊÌâ  £¬µ¼ÖÂÈ«ÇòÓû§·¢ËÍ»òÎüÊÕµç×ÓÓʼþʱ·ºÆðÑÓ³Ù»òʧ°Ü¡£ËäȻ΢Èíδ¹ûÕæÍ¸Â¶ÏêϸÐÅÏ¢  £¬µ«È·ÈÏ´ËÊÂÎñΪMicrosoft 365¹ÜÀíÖÐÐĸú×ÙµÄÒªº¦·þÎñÎÊÌâEX1027675¡£ÖÐÖ¹Ó°ÏìÁËʹÓÃÊÜÓ°Ïì»ù´¡ÉèÊ©·þÎñµÄËùÓÐÓû§  £¬Ðí¶à¿Í»§ÊÕµ½Î´Ëʹﱨ¸æ  £¬ÏÔʾ¡°554 5.6.0 ÓʼþÄÚÈÝË𻵡±¹ýʧ¡£Î¢ÈíÔÚ3ÔÂ10ÈÕÊ×´ÎÈÏ¿ÉÎÊÌâ  £¬µ«±¨¸æ³ÆÖÐֹʼÓÚ3ÔÂ7ÈÕ¡£Î¢ÈíÌåÏÖ  £¬ÎÊÌâÔ´ÓÚÖ¼ÔÚ¸ÄÉÆÐÅÏ¢´«Êä·þÎñµÄ¸üÐÂÖеĴúÂë¹ýʧ  £¬Ó°ÏìÁ˲¿·Ö·þÎñ»ù´¡ÉèÊ©¡£Óû§·¢Ã÷ÎÞ·¨·¢ËÍ´ø¸½¼þµÄµç×ÓÓʼþ  £¬µ«Ê¹ÓÃZIPÎļþÐÎʽ·¢ËÍ¿ÉÈÆ¹ý´ËÎÊÌâ¡£Ö»¹Ü΢ÈíÒÑÍÆ³öÐÞ¸´³ÌÐò»º½âÁËEX1027675ÎÊÌâ  £¬µ«ÁíÒ»ÏÕЩÏàͬµÄÊÂÎñEX1030895ÈÔÔÚ±¬·¢  £¬´¥·¢Î´Ëʹﱨ¸æµÄ¹ýʧ½öÏÞÓÚһС²¿·ÖÐÂÎż°´øÓÐwinmail.dat¸½¼þµÄ¼äЪÐÔ´¿ÎĽñÈÕÀúÔ¼Çëµç×ÓÓʼþ¡£Î¢ÈíÕýÔÚ²âÊÔDZÔÚÐÞ¸´³ÌÐò  £¬²¢¶Ô°üÀ¨ÐÞ¸´³ÌÐòµÄ»úе¾ÙÐÐÓÐÕë¶ÔÐÔµÄÖØÆô  £¬Í¬Ê±Ç×½ü¼à¿ØÕï¶ÏÒ£²âÊý¾ÝÒÔÕÒ³öÎÊÌâȪԴ¡£


https://www.bleepingcomputer.com/news/microsoft/week-long-exchange-online-outage-causes-email-failures-delays/


6. ˼¿ÆÐÞ²¹¸ßÑÏÖØÐÔDoSÎó²î  £¬ÖÒÑÔBGPͬÃËÉèÖÃΣº¦


3ÔÂ14ÈÕ  £¬Ë¼¿Æ½üÆÚÐÞ²¹ÁËÒ»¸ö¾Ü¾ø·þÎñ(DoS)Îó²î  £¬¸ÃÎó²îÓ°ÏìIOS XR·ÓÉÆ÷ÉϵĽçÏßÍø¹ØÐ­Òé(BGP)Àú³Ì  £¬ÔÊÐí¹¥»÷Õßͨ¹ýµ¥¸öBGP¸üÐÂÐÂÎÅÆÆËðBGP¡£´Ë¸ßÑÏÖØÐÔÎó²î£¨CVE-2025-20115£©½öÔÚÉèÖÃÁËBGPͬÃ˵ÄÇéÐÎÏÂÓ°ÏìCisco IOS XR×°±¸  £¬¿ÉÄܵ¼ÖÂBGPÀú³ÌÖØÆô²¢Ô¶³Ì¹Ø±Õ×°±¸¡£Îó²îÔ´ÓÚBGP¸üÐÂʱÄÚ´æË𻵠 £¬¹¥»÷Õß¿Éͨ¹ý·¢ËÍÈ«ÐÄÉè¼ÆµÄÐÂÎÅ»òÉè¼ÆÍøÂçʹAS_CONFED_SEQUENCEÊôÐÔÔöÌíµ½255¸ö×ÔÖÎϵͳ±àºÅ»ò¸ü¶àÀ´Ê¹ÓôËÎó²î¡£Cisco IOS XRÈí¼þÓû§ÐèǨáãÖÁÀο¿°æ±¾ÒÔÐÞ¸´´ËÎÊÌâ  £¬Í¬Ê±½¨Ò齫BGP AS_CONFED_SEQUENCEÊôÐÔÏÞÖÆÎª254¸ö»ò¸üÉÙµÄAS±àºÅÒÔ¼õÇáDZÔÚ¹¥»÷Ó°Ï졣˼¿ÆÎ´·¢Ã÷¸ÃÎó²îÒѱ»Ò°ÍâʹÓà  £¬µ«APNIC²©¿ÍÉϵÄһƪÎÄÕÂÌṩÁ˸ü¶àÊÖÒÕϸ½Ú¡£±ðµÄ  £¬Ë¼¿Æ»¹ÖÒÑÔÁËWebex BroadWorksÖеÄÎó²îºÍCISA±ê¼ÇµÄÆð¾¢Ê¹ÓõÄVPN·ÓÉÆ÷Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î  £¬²¢½¨Òé¿Í»§Éý¼¶Ó²¼þÒÔÐÞ¸´ÕâЩÎó²î¡£


https://www.bleepingcomputer.com/news/security/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/