AnimkerÊý¾Ý¿âÉèÖùýʧÁè¼Ý70ÍòÓû§µÄÐÅϢй¶

Ðû²¼Ê±¼ä 2023-03-02

1¡¢AnimkerÊý¾Ý¿âÉèÖùýʧÁè¼Ý70ÍòÓû§µÄÐÅϢй¶


¾Ý3ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚShodanÉÏ·¢Ã÷ÁËÒ»¸öÉèÖùýʧµÄÊý¾Ý¿â£¬£¬£¬£¬Ð¹Â¶ÁËgetshow.ioºÍanimaker.comÍøÕ¾Áè¼Ý700000Óû§µÄ²âÊÔºÍСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£Getshow.ioÊôÓÚAnimker.com£¬£¬£¬£¬ÓÐÎÊÌâµÄЧÀÍÆ÷×¢²áÔÚÓòÃûgetshow.ioÏ£¬£¬£¬£¬ÓÉanimaker.comÖÎÀí¡£¡£¡£¡£¸ÃÊý¾Ý¿âÏÖÔÚ°üÀ¨5.3GBµÄÊý¾Ý£¬£¬£¬£¬²¢ÇÒËæ×ÅÌìÌìÐÂÌí¼ÓµÄÊý¾ÝÔÚÒ»Ö±ÔöÌí£¬£¬£¬£¬Éæ¼°Óû§ÐÕÃû¡¢×°±¸ÀàÐÍ¡¢IPµØµãºÍÊÖ»úºÅÂëµÈ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬AnimkerÒÑ»ñÖª´ËÊ£¬£¬£¬£¬µ«ÈÔδ¾ÙÐлØÓ¦¡£¡£¡£¡£


https://www.hackread.com/video-marketing-software-animker-data-leak/


2¡¢Aruba Networks¸üÐÂÐÞ¸´ÆäArubaOSÖеÄ6¸öÎó²î


ýÌå3ÔÂ1ÈÕ±¨µÀ³Æ£¬£¬£¬£¬Aruba NetworksÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´ÁËÓ°ÏìÆäרÓÐÍøÂç²Ù×÷ϵͳArubaOS¶à¸ö°æ±¾µÄ6¸öÎó²î¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²î¿ÉÒÔ·ÖΪÁ½ÀࣺPAPIЭÒ飨Aruba Networks½ÓÈëµãÖÎÀíЭÒ飩ÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2023-22747¡¢CVE-2023-22748¡¢CVE-2023-22749ºÍCVE-2023-22750£©ºÍ»ùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öÎó²î£¨CVE-2023-22751ºÍCVE-2023-22752£©¡£¡£¡£¡£ËüÃǵÄCVSSÆÀ·Ö¾ùΪ9.8£¬£¬£¬£¬¿Éͨ¹ýUDP¶Ë¿Ú8211ÏòPAPI·¢ËÍÌØÖÆÊý¾Ý°üÀ´Ê¹Ó㬣¬£¬£¬´Ó¶øÒÔÌØÈ¨Óû§Éí·ÝÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/aruba-networks-fixes-six-critical-vulnerabilities-in-arubaos/


3¡¢Sysdig·¢Ã÷Ö÷ÒªÕë¶ÔÔÆÇéÐεÄSCARLETEEL¹¥»÷»î¶¯


SysdigÔÚ2ÔÂ28ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸öÃûΪSCARLETEELµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¹¥»÷ʼÓÚ»ñµÃÍйÜÔÚAWSÉϵÄKubernetes¼¯ÈºµÄÃæÏò¹«ÖÚµÄЧÀ͵ijõʼ»á¼ûȨÏÞ£¬£¬£¬£¬Àֳɺ󹥻÷Õ߾ͻáÏÂÔØÒ»¸öXMRig coinminerºÍÒ»¸ö¾ç±¾£¬£¬£¬£¬ÓÃÓÚ´ÓKubernetes podÖÐÇÔÈ¡ÕÊ»§Æ¾Ö¤¡£¡£¡£¡£¹¥»÷Õß»áʹÓÃLambdaº¯Êýö¾ÙºÍ¼ìË÷ËùÓÐרÓдúÂëºÍÈí¼þ£¬£¬£¬£¬ÒÔ¼°ÆäÖ´ÐÐÃÜÔ¿ºÍLambdaº¯ÊýÇéÐαäÁ¿£¬£¬£¬£¬ÒÔÕÒµ½IAMÓû§Æ¾Ö¤¡£¡£¡£¡£SysdigÒÔΪ¼ÓÃÜÐ®ÖÆ¹¥»÷±»ÓÃ×÷ÓÕ¶ü£¬£¬£¬£¬Ö¼ÔÚµÖ´ï¹¥»÷ÕßµÄÕæÕýÄ¿µÄ£¬£¬£¬£¬¼´ÍµÈ¡×¨ÓÐÈí¼þ¡£¡£¡£¡£


https://sysdig.com/blog/cloud-breach-terraform-data-theft/


4¡¢Blind Eagleð³äÕþ¸®Ë°Îñ»ú¹¹Õë¶Ô¸çÂ×±ÈÑǵĻú¹¹


2ÔÂ27ÈÕ£¬£¬£¬£¬BlackberryÅû¶ÁËBlind EagleÕë¶Ô¸çÂ×±ÈÑÇÒªº¦ÐÐÒµµÄÐÂÒ»ÂÖ¹¥»÷»î¶¯¡£¡£¡£¡£BlackberryÓÚ2ÔÂ20ÈÕ¼ì²âµ½´Ë´Î¹¥»÷»î¶¯£¬£¬£¬£¬¹¥»÷Õßð³äÕþ¸®Ë°Îñ»ú¹¹¹ú¼Ò˰ÎñºÍº£¹Ø×ÜÊð(DIAN)£¬£¬£¬£¬Ö÷ÒªÕë¶Ô¸çÂ×±ÈÑǵÄÎÀÉú¡¢½ðÈÚ¡¢Ö´·¨¡¢ÒÆÃñºÍÈÏÕæÌ¸ÅеĻú¹¹¡£¡£¡£¡£´¹ÂÚÓʼþ´øÓÐÒ»¸öÖ¸ÏòPDFÎļþµÄÁ´½Ó£¬£¬£¬£¬¸ÃÎļþ¾Ý³ÆÍйÜÔÚDIANÍøÕ¾ÉÏ£¬£¬£¬£¬ÏÖʵÉÏ»á×°ÖöñÒâÈí¼þ¡£¡£¡£¡£PayloadÊÇÒ»¸ö»ìÏýµÄVBS£¬£¬£¬£¬ËüʹÓÃPowerShell¼ìË÷»ùÓÚ.NETµÄDLLÎļþ£¬£¬£¬£¬×îÖÕ½«AsyncRAT¼ÓÔØµ½ÄÚ´æÖС£¡£¡£¡£


https://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia


5¡¢FortiGuardÅû¶LockBitÐÂÒ»ÂÖ¹¥»÷µÄѬȾÁ´ºÍTTP


FortiGuardÓÚ2ÔÂ28ÈÕÐû²¼±¨¸æÏêÊöÁËLockBitÐÂÒ»ÂÖÀÕË÷¹¥»÷µÄѬȾÁ´ºÍTTP¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2022Äê12ÔºÍ2023Äê1Ô·¢Ã÷LockBitµÄ»î¶¯£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÄ«Î÷¸çºÍÎ÷°àÑÀµÄ×ÉѯºÍÖ´·¨ÐÐÒµµÄ¹«Ë¾¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃÁË¿ÉÓÐÓöԿ¹AVºÍEDR½â¾ö¼Æ»®µÄ·½·¨£¬£¬£¬£¬Í¨¹ý.imgÈÝÆ÷·Ö·¢ÈƹýÁËWeb±ê¼Ç(MOTW)±£»£»£»£»£»£»¤»úÖÆ£¬£¬£¬£¬¶à½×¶Î¾ç±¾ÌáÈ¡ÊÜÃÜÂë±£»£»£»£»£»£»¤µÄÀÕË÷Èí¼þ¿ÉÖ´ÐÐÎļþ£¨Ö»ÓÐÔÚʹÓÃÆæÒìÃÜÂëÔËÐÐʱ²Å»á±»½âѹ£©¿ÉÈÆ¹ý»ùÓÚÊðÃûµÄ¼ì²â¡£¡£¡£¡£VirusTotalÖÐÑù±¾µÄ¼ì²âÂʺܵÍ£¬£¬£¬£¬Åú×¢¸Ã»î¶¯Ê¹ÓõÄÒªÁìÔÚ¼ì²âÈÆ¹ý·½ÃæÊÇÓÐÓõġ£¡£¡£¡£


https://www.fortinet.com/blog/threat-research/emerging-lockbit-campaign


6¡¢SonicWallÐû²¼2023ÄêÍøÂçÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


ýÌå2ÔÂ28Èճƣ¬£¬£¬£¬SonicWallÐû²¼ÁË2023ÄêÍøÂçÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬SonicWallÔÚ2022Äê×ܹ²¼Í¼ÁË55ÒڴζñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬Í¬±ÈÔöÌí2%¡£¡£¡£¡£ÀÕË÷Èí¼þÔÚ2022Äê¼ÌÐøÏ½µ£¬£¬£¬£¬ÊýĿϽµÖÁ4.933ÒÚ£¬£¬£¬£¬Í¬±ÈϽµ21%¡£¡£¡£¡£ÎïÁªÍø¶ñÒâÈí¼þÊýÄ¿ÔÚ´ó·ùÔ¾Éý£¬£¬£¬£¬Ê×´ÎÍ»ÆÆ1ÒÚ´ó¹Ø£¬£¬£¬£¬¹²1.123Òڴι¥»÷£¬£¬£¬£¬Í¬±ÈÔöÌí87%¡£¡£¡£¡£¼ÓÃÜÐ®ÖÆ¹¥»÷Ϊ1.393ÒڴΣ¬£¬£¬£¬±È2021ÄêÔöÌíÁË43%¡£¡£¡£¡£È¥Äê·¢Ã÷ÁË465501¸öеĶñÒâÈí¼þ±äÌ壬£¬£¬£¬Æ½¾ùÌìÌì1279¸ö¡£¡£¡£¡£


https://www.sonicwall.com/2023-cyber-threat-report/