Western DigitalÔâµ½¹¥»÷My CloudЧÀÍÔÝʱÖÐÖ¹
Ðû²¼Ê±¼ä 2023-04-041¡¢Western DigitalÔâµ½¹¥»÷My CloudЧÀÍÔÝʱÖÐÖ¹
4ÔÂ3ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Western Digital³ÆÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Î´¾ÊÚȨµÄµÚÈý·½»ñµÃÁËÆä¹«Ë¾¶à¸öϵͳµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÊÇÔÚ3ÔÂ26ÈÕ·¢Ã÷µÄ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÊÓ²ìÉд¦ÓÚÔçÆÚ½×¶Î£¬£¬£¬£¬£¬£¬£¬¹«Ë¾ÕýÓëÖ´·¨²¿·Öе÷ÊÂÇé¡£¡£¡£¡£¡£¡£¾ÝÏÖ½×¶ÎÊӲ죬£¬£¬£¬£¬£¬£¬¹«Ë¾È·ÈϹ¥»÷Õß´ÓÆäϵͳÖлñÈ¡ÁËijЩÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÆð¾¢ÏàʶÕâЩÊý¾ÝµÄÐÔ×Ӻ͹æÄ£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬£¬£¬£¬ÆäÓ¦¶Ô²½·¥¿ÉÄܵ¼Ö¹«Ë¾²¿·ÖÓªÒµÔËÓªÖÐÖ¹¡£¡£¡£¡£¡£¡£×ÔÖÜÈÕÒÔÀ´£¬£¬£¬£¬£¬£¬£¬¶à¸öMy CloudÓû§±¨¸æËûÃÇÎÞ·¨»á¼ûÔÆÍйÜýÌå´æ´¢¿â£¬£¬£¬£¬£¬£¬£¬µÇ¼ʱ»áÏÔʾ¡°503ЧÀÍÔÝʱ²»¿ÉÓá±¹ýʧ¡£¡£¡£¡£¡£¡£¾àÊ״α¨¸æÖÐÖ¹ÒÔÀ´ÒÑÁè¼Ý24Сʱ£¬£¬£¬£¬£¬£¬£¬ÔÆ¡¢ÊðÀí¡¢Web¡¢Éí·ÝÑéÖ¤¡¢µç×ÓÓʼþºÍÍÆËÍ֪ͨ¾ù²»¿ÉÓᣡ£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/western-digital-discloses-network-breach-my-cloud-service-down/
2¡¢Dish NetworkÒòÀÕË÷¹¥»÷ÊÂÎñÔâµ½¶àÆðÕûÌåËßËÏ
ýÌå4ÔÂ1Èճƣ¬£¬£¬£¬£¬£¬£¬ÖÁÉÙÓÐÁù¼Ò״ʦÊÂÎñËùÕýÔÚ¶ÔDish NetworkÌáÆðÕûÌåËßËÏ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚΪ2021Äê2ÔÂ22ÈÕÖÁ2023Äê2ÔÂ27ÈÕʱ´úÒòÉæÏÓ¡°Ö¤È¯Ú²Æ¡±Êܵ½µ¹ÔËÓ°ÏìµÄDish¹É¶«×·»ØËðʧ¡£¡£¡£¡£¡£¡£ÃñÊÂËßËϳƣ¬£¬£¬£¬£¬£¬£¬DISH NetworkÊÔͼÑÚÊÎÆäÍøÂçÇå¾²ºÍIT»ù´¡Éèʩȱ·¦µÄÊÂʵ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Ç¿µ÷ÆäÔËӪЧÂÊ¡£¡£¡£¡£¡£¡£ÓÉÓÚÉÏÊöÔµ¹ÊÔÓÉ£¬£¬£¬£¬£¬£¬£¬¹«Ë¾ÎÞ·¨ÊÊÍâµØ±£»£»£»£»£»£»£»¤¿Í»§Êý¾Ý£¬£¬£¬£¬£¬£¬£¬Ê¹ÆäÈÝÒ×±»¹¥»÷Õß»á¼û¡£¡£¡£¡£¡£¡£2ÔÂ24ÈÕ×óÓÒ£¬£¬£¬£¬£¬£¬£¬DISHÉñÃØÏÂÏߣ¬£¬£¬£¬£¬£¬£¬ÆäÍøÕ¾ºÍÓ¦ÓÃÍ£ÔËÊýÈÕ¡£¡£¡£¡£¡£¡£2ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬DISH͸¶ÆäÔâµ½ÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£ÐÂÎÅ´«³öºó£¬£¬£¬£¬£¬£¬£¬Æä¹É¼Ûÿ¹Éϵø0.79ÃÀÔª¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/dish-slapped-with-multiple-lawsuits-after-ransomware-cyber-attack/
3¡¢Winter VivernʹÓÃZimbraÎó²î¹¥»÷±±Ô¼¾üÕþºÍÍâ½»»ú¹¹
ProofpointÔÚ3ÔÂ30ÈÕÅû¶ÁËTA473£¨ÓÖÃûWinter Vivern£©Ê¹ÓÃZimbra CollaborationЧÀÍÆ÷ÖÐÎó²î£¨CVE-2022-27926£©µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ2023Äê2Ô£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÓë±±Ô¼Ïà¹ØµÄÅ·ÖÞ¾üÊ¡¢Õþ¸®ºÍÍâ½»»ú¹¹¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃAcunetixɨÃèδÐÞ¸´µÄÍøÂçÓʼþƽ̨²¢·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬ÓʼþÖеÄÁ´½Ó¿ÉʹÓÃZimbraÖÐÎó²î½«JavaScript payload×¢ÈëÍøÒ³¡£¡£¡£¡£¡£¡£ÕâЩpayloadÓÃÓÚ´ÓÄ¿µÄÊÕµ½µÄcookieÖÐÇÔÈ¡Óû§Ãû¡¢ÃÜÂëºÍÁîÅÆ£¬£¬£¬£¬£¬£¬£¬À´»á¼ûÄ¿µÄµÄÓʼþÕÊ»§¡£¡£¡£¡£¡£¡£×îºó£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»á»á¼ûÓʼþÖеÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬»òÔÚÒ»¶Îʱ¼äÄÚ¼à¿ØÍ¨Ñ¶¡£¡£¡£¡£¡£¡£
https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability
4¡¢¶à¸ö½©Ê¬ÍøÂçʹÓÃCactiºÍRealtekÎó²î·Ö·¢¶ñÒâÈí¼þ
3ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬Fortinet³ÆÆäÔÚ½ñÄê1ÔÂÖÁ3Ô¼ì²âµ½¶à¸ö½©Ê¬ÍøÂçʹÓÃCactiºÍRealtekÎó²î£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ·Ö·¢¶ñÒâÈí¼þShellBotºÍMoobot¡£¡£¡£¡£¡£¡£Îó²î»®·ÖΪRealtek Jungle SDKÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-35394£©ºÍCacti¹ÊÕÏÖÎÀí¼à¿Ø¹¤¾ßÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2022-46169£©¡£¡£¡£¡£¡£¡£MoobotÊÇMiraiµÄÒ»¸ö±äÖÖ£¬£¬£¬£¬£¬£¬£¬Ð°汾µÄÒ»¸öÏÔÖøÌØÕ÷ÊÇËüÃÇÄܹ»É¨Ã貢ɱËÀÆäËüÒÑÖªbotÀú³Ì£¬£¬£¬£¬£¬£¬£¬ÒÔ»ñµÃ×î´óÓ²¼þ¹¦ÂÊÀ´Ö´ÐÐDDoS¹¥»÷¡£¡£¡£¡£¡£¡£ShellBotÓÚ½ñÄê1ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Fortinet·¢Ã÷ÁËËüµÄÈý¸ö¼þ±äÌ壬£¬£¬£¬£¬£¬£¬Åú×¢ËüÕýÔÚÆð¾¢¿ª·¢ÖС£¡£¡£¡£¡£¡£
https://www.fortinet.com/blog/threat-research/moobot-strikes-again-targeting-cacti-and-realtek-vulnerabilities
5¡¢Ñо¿Ö°Ô±Åû¶Azure SFXÖÐÎó²îSuper FabriXssµÄϸ½Ú
¾Ý3ÔÂ30ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Åû¶ÁËAzure Service Fabric Explorer(SFX)ÖÐÎó²îSuper FabriXssµÄϸ½Ú¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»¸ö¿çÕ¾¾ç±¾Îó²î£¨CVE-2023-23383£©£¬£¬£¬£¬£¬£¬£¬Ãû×ÖȪԴÓÚ΢ÈíÔÚ2022Äê10ÔÂÐÞ¸´µÄFabriXssÎó²î£¨CVE-2022-35829£©¡£¡£¡£¡£¡£¡£Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓÃÆäÔÚService Fabric½ÚµãÉÏÍйܵÄÈÝÆ÷ÖÐʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬£¬¶øÎÞÐèÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£ÓëFabriXxs²î±ðµÄÊÇ£¬£¬£¬£¬£¬£¬£¬SuperFabriXxsÖ»±£´æÓÚWindows ClusterÖУ¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚ´ó¹æÄ£µÄ´úÂëÖ´Ðй¥»÷¡£¡£¡£¡£¡£¡£Î¢ÈíÔÚ2023Äê3ÔµÄÖܶþ²¹¶¡ÖÐÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£¡£¡£
https://orca.security/resources/blog/super-fabrixss-azure-vulnerability/
6¡¢Securonix·¢Ã÷Õë¶ÔÃÀ¹úµÄTACTICAL#OCTOPUS¹¥»÷»î¶¯
SecuronixÓÚ3ÔÂ30ÈÕ³ÆÆä·¢Ã÷ÁËÕë¶ÔÃÀ¹ú×éÖ¯µÄTACTICAL#OCTOPUS¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£Ëæ×ÅÃÀ¹ú4ÔÂ15ÈÕÄÉ˰×èÖ¹ÈÕÆÚÁÚ½ü£¬£¬£¬£¬£¬£¬£¬Óë˰ÊÕÏà¹ØµÄ´¹ÂÚ¹¥»÷ÔöÌí¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯Í¨³£Ê¼ÓÚÒ»¸öÊÜÃÜÂë±£»£»£»£»£»£»£»¤µÄ.zipÎļþ£¬£¬£¬£¬£¬£¬£¬ÆäÃû³ÆÓë˰ÎñÏà¹Ø¡£¡£¡£¡£¡£¡£.zipÎļþÖÐͨ³£°üÀ¨Ò»¸ö.pngºÍÒ»¸ö.lnk¡£¡£¡£¡£¡£¡£µ±Óû§Ë«»÷¿ì½Ý·½·¨Îļþʱ£¬£¬£¬£¬£¬£¬£¬´úÂë×îÏÈÖ´ÐС£¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬£¬Ò»ÏµÁÐVBScriptºÍPowerShell stagers»á´ÓC2ЧÀÍÆ÷ÀÈ¡¸ü¶àµÄpayload¡£¡£¡£¡£¡£¡£
https://www.securonix.com/blog/new-tacticaloctopus-attack-campaign-targets-us-entities-with-malware-bundled-in-tax-themed-documents/


¾©¹«Íø°²±¸11010802024551ºÅ