Western DigitalÔâµ½¹¥»÷My CloudЧÀÍÔÝʱÖÐÖ¹

Ðû²¼Ê±¼ä 2023-04-04

1¡¢Western DigitalÔâµ½¹¥»÷My CloudЧÀÍÔÝʱÖÐÖ¹


4ÔÂ3ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Western Digital³ÆÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Î´¾­ÊÚȨµÄµÚÈý·½»ñµÃÁËÆä¹«Ë¾¶à¸öϵͳµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£ ¡£¾ÝϤ£¬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÊÇÔÚ3ÔÂ26ÈÕ·¢Ã÷µÄ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÊÓ²ìÉд¦ÓÚÔçÆÚ½×¶Î£¬£¬£¬£¬£¬£¬£¬¹«Ë¾ÕýÓëÖ´·¨²¿·ÖЭµ÷ÊÂÇé¡£¡£¡£¡£¡£ ¡£¾ÝÏÖ½×¶ÎÊӲ죬£¬£¬£¬£¬£¬£¬¹«Ë¾È·ÈϹ¥»÷Õß´ÓÆäϵͳÖлñÈ¡ÁËijЩÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÆð¾¢ÏàʶÕâЩÊý¾ÝµÄÐÔ×Ӻ͹æÄ£¡£¡£¡£¡£¡£ ¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬£¬£¬£¬ÆäÓ¦¶Ô²½·¥¿ÉÄܵ¼Ö¹«Ë¾²¿·ÖÓªÒµÔËÓªÖÐÖ¹¡£¡£¡£¡£¡£ ¡£×ÔÖÜÈÕÒÔÀ´£¬£¬£¬£¬£¬£¬£¬¶à¸öMy CloudÓû§±¨¸æËûÃÇÎÞ·¨»á¼ûÔÆÍйÜýÌå´æ´¢¿â£¬£¬£¬£¬£¬£¬£¬µÇ¼ʱ»áÏÔʾ¡°503ЧÀÍÔÝʱ²»¿ÉÓá±¹ýʧ¡£¡£¡£¡£¡£ ¡£¾àÊ״α¨¸æÖÐÖ¹ÒÔÀ´ÒÑÁè¼Ý24Сʱ£¬£¬£¬£¬£¬£¬£¬ÔÆ¡¢ÊðÀí¡¢Web¡¢Éí·ÝÑéÖ¤¡¢µç×ÓÓʼþºÍÍÆËÍ֪ͨ¾ù²»¿ÉÓᣡ£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/western-digital-discloses-network-breach-my-cloud-service-down/


2¡¢Dish NetworkÒòÀÕË÷¹¥»÷ÊÂÎñÔâµ½¶àÆðÕûÌåËßËÏ


ýÌå4ÔÂ1Èճƣ¬£¬£¬£¬£¬£¬£¬ÖÁÉÙÓÐÁù¼Ò״ʦÊÂÎñËùÕýÔÚ¶ÔDish NetworkÌáÆðÕûÌåËßËÏ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚΪ2021Äê2ÔÂ22ÈÕÖÁ2023Äê2ÔÂ27ÈÕʱ´úÒòÉæÏÓ¡°Ö¤È¯Ú²Æ­¡±Êܵ½µ¹ÔËÓ°ÏìµÄDish¹É¶«×·»ØËðʧ¡£¡£¡£¡£¡£ ¡£ÃñÊÂËßËϳÆ£¬£¬£¬£¬£¬£¬£¬DISH NetworkÊÔͼÑÚÊÎÆäÍøÂçÇå¾²ºÍIT»ù´¡Éèʩȱ·¦µÄÊÂʵ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Ç¿µ÷ÆäÔËӪЧÂÊ¡£¡£¡£¡£¡£ ¡£ÓÉÓÚÉÏÊöÔµ¹ÊÔ­ÓÉ£¬£¬£¬£¬£¬£¬£¬¹«Ë¾ÎÞ·¨ÊÊÍâµØ±£»£»£»£» £»£» £»¤¿Í»§Êý¾Ý£¬£¬£¬£¬£¬£¬£¬Ê¹ÆäÈÝÒ×±»¹¥»÷Õß»á¼û¡£¡£¡£¡£¡£ ¡£2ÔÂ24ÈÕ×óÓÒ£¬£¬£¬£¬£¬£¬£¬DISHÉñÃØÏÂÏߣ¬£¬£¬£¬£¬£¬£¬ÆäÍøÕ¾ºÍÓ¦ÓÃÍ£ÔËÊýÈÕ¡£¡£¡£¡£¡£ ¡£2ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬DISH͸¶ÆäÔâµ½ÀÕË÷¹¥»÷¡£¡£¡£¡£¡£ ¡£ÐÂÎÅ´«³öºó£¬£¬£¬£¬£¬£¬£¬Æä¹É¼Ûÿ¹Éϵø0.79ÃÀÔª¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/dish-slapped-with-multiple-lawsuits-after-ransomware-cyber-attack/


3¡¢Winter VivernʹÓÃZimbraÎó²î¹¥»÷±±Ô¼¾üÕþºÍÍâ½»»ú¹¹


ProofpointÔÚ3ÔÂ30ÈÕÅû¶ÁËTA473£¨ÓÖÃûWinter Vivern£©Ê¹ÓÃZimbra CollaborationЧÀÍÆ÷ÖÐÎó²î£¨CVE-2022-27926£©µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£ ¡£¹¥»÷ʼÓÚ2023Äê2Ô£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÓë±±Ô¼Ïà¹ØµÄÅ·ÖÞ¾üÊ¡¢Õþ¸®ºÍÍâ½»»ú¹¹¡£¡£¡£¡£¡£ ¡£¹¥»÷ÕßʹÓÃAcunetixɨÃèδÐÞ¸´µÄÍøÂçÓʼþƽ̨²¢·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬ÓʼþÖеÄÁ´½Ó¿ÉʹÓÃZimbraÖÐÎó²î½«JavaScript payload×¢ÈëÍøÒ³¡£¡£¡£¡£¡£ ¡£ÕâЩpayloadÓÃÓÚ´ÓÄ¿µÄÊÕµ½µÄcookieÖÐÇÔÈ¡Óû§Ãû¡¢ÃÜÂëºÍÁîÅÆ£¬£¬£¬£¬£¬£¬£¬À´»á¼ûÄ¿µÄµÄÓʼþÕÊ»§¡£¡£¡£¡£¡£ ¡£×îºó£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»á»á¼ûÓʼþÖеÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬»òÔÚÒ»¶Îʱ¼äÄÚ¼à¿ØÍ¨Ñ¶¡£¡£¡£¡£¡£ ¡£


https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability


4¡¢¶à¸ö½©Ê¬ÍøÂçʹÓÃCactiºÍRealtekÎó²î·Ö·¢¶ñÒâÈí¼þ


3ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬Fortinet³ÆÆäÔÚ½ñÄê1ÔÂÖÁ3Ô¼ì²âµ½¶à¸ö½©Ê¬ÍøÂçʹÓÃCactiºÍRealtekÎó²î£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ·Ö·¢¶ñÒâÈí¼þShellBotºÍMoobot¡£¡£¡£¡£¡£ ¡£Îó²î»®·ÖΪRealtek Jungle SDKÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-35394£©ºÍCacti¹ÊÕÏÖÎÀí¼à¿Ø¹¤¾ßÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2022-46169£©¡£¡£¡£¡£¡£ ¡£MoobotÊÇMiraiµÄÒ»¸ö±äÖÖ£¬£¬£¬£¬£¬£¬£¬Ð°汾µÄÒ»¸öÏÔÖøÌØÕ÷ÊÇËüÃÇÄܹ»É¨Ã貢ɱËÀÆäËüÒÑÖªbotÀú³Ì£¬£¬£¬£¬£¬£¬£¬ÒÔ»ñµÃ×î´óÓ²¼þ¹¦ÂÊÀ´Ö´ÐÐDDoS¹¥»÷¡£¡£¡£¡£¡£ ¡£ShellBotÓÚ½ñÄê1ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Fortinet·¢Ã÷ÁËËüµÄÈý¸ö¼þ±äÌ壬£¬£¬£¬£¬£¬£¬Åú×¢ËüÕýÔÚÆð¾¢¿ª·¢ÖС£¡£¡£¡£¡£ ¡£


https://www.fortinet.com/blog/threat-research/moobot-strikes-again-targeting-cacti-and-realtek-vulnerabilities


5¡¢Ñо¿Ö°Ô±Åû¶Azure SFXÖÐÎó²îSuper FabriXssµÄϸ½Ú


¾Ý3ÔÂ30ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Åû¶ÁËAzure Service Fabric Explorer(SFX)ÖÐÎó²îSuper FabriXssµÄϸ½Ú¡£¡£¡£¡£¡£ ¡£ÕâÊÇÒ»¸ö¿çÕ¾¾ç±¾Îó²î£¨CVE-2023-23383£©£¬£¬£¬£¬£¬£¬£¬Ãû×ÖȪԴÓÚ΢ÈíÔÚ2022Äê10ÔÂÐÞ¸´µÄFabriXssÎó²î£¨CVE-2022-35829£©¡£¡£¡£¡£¡£ ¡£Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓÃÆäÔÚService Fabric½ÚµãÉÏÍйܵÄÈÝÆ÷ÖÐʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬£¬¶øÎÞÐèÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£ ¡£ÓëFabriXxs²î±ðµÄÊÇ£¬£¬£¬£¬£¬£¬£¬SuperFabriXxsÖ»±£´æÓÚWindows ClusterÖУ¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚ´ó¹æÄ£µÄ´úÂëÖ´Ðй¥»÷¡£¡£¡£¡£¡£ ¡£Î¢ÈíÔÚ2023Äê3ÔµÄÖܶþ²¹¶¡ÖÐÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£¡£ ¡£


https://orca.security/resources/blog/super-fabrixss-azure-vulnerability/


6¡¢Securonix·¢Ã÷Õë¶ÔÃÀ¹úµÄTACTICAL#OCTOPUS¹¥»÷»î¶¯


SecuronixÓÚ3ÔÂ30ÈÕ³ÆÆä·¢Ã÷ÁËÕë¶ÔÃÀ¹ú×éÖ¯µÄTACTICAL#OCTOPUS¹¥»÷»î¶¯¡£¡£¡£¡£¡£ ¡£Ëæ×ÅÃÀ¹ú4ÔÂ15ÈÕÄÉ˰×èÖ¹ÈÕÆÚÁÚ½ü£¬£¬£¬£¬£¬£¬£¬Óë˰ÊÕÏà¹ØµÄ´¹ÂÚ¹¥»÷ÔöÌí¡£¡£¡£¡£¡£ ¡£¸Ã¹¥»÷»î¶¯Í¨³£Ê¼ÓÚÒ»¸öÊÜÃÜÂë±£»£»£»£» £»£» £»¤µÄ.zipÎļþ£¬£¬£¬£¬£¬£¬£¬ÆäÃû³ÆÓë˰ÎñÏà¹Ø¡£¡£¡£¡£¡£ ¡£.zipÎļþÖÐͨ³£°üÀ¨Ò»¸ö.pngºÍÒ»¸ö.lnk¡£¡£¡£¡£¡£ ¡£µ±Óû§Ë«»÷¿ì½Ý·½·¨Îļþʱ£¬£¬£¬£¬£¬£¬£¬´úÂë×îÏÈÖ´ÐС£¡£¡£¡£¡£ ¡£È»ºó£¬£¬£¬£¬£¬£¬£¬Ò»ÏµÁÐVBScriptºÍPowerShell stagers»á´ÓC2ЧÀÍÆ÷À­È¡¸ü¶àµÄpayload¡£¡£¡£¡£¡£ ¡£


https://www.securonix.com/blog/new-tacticaloctopus-attack-campaign-targets-us-entities-with-malware-bundled-in-tax-themed-documents/