AnimkerÊý¾Ý¿âÉèÖùýʧÁè¼Ý70ÍòÓû§µÄÐÅϢй¶

Ðû²¼Ê±¼ä 2023-03-02

1¡¢AnimkerÊý¾Ý¿âÉèÖùýʧÁè¼Ý70ÍòÓû§µÄÐÅϢй¶


¾Ý3ÔÂ1ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚShodanÉÏ·¢Ã÷ÁËÒ»¸öÉèÖùýʧµÄÊý¾Ý¿â£¬£¬ £¬£¬£¬£¬Ð¹Â¶ÁËgetshow.ioºÍanimaker.comÍøÕ¾Áè¼Ý700000Óû§µÄ²âÊÔºÍСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Getshow.ioÊôÓÚAnimker.com£¬£¬ £¬£¬£¬£¬ÓÐÎÊÌâµÄЧÀÍÆ÷×¢²áÔÚÓòÃûgetshow.ioÏ£¬£¬ £¬£¬£¬£¬ÓÉanimaker.comÖÎÀí¡£¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÏÖÔÚ°üÀ¨5.3GBµÄÊý¾Ý£¬£¬ £¬£¬£¬£¬²¢ÇÒËæ×ÅÌìÌìÐÂÌí¼ÓµÄÊý¾ÝÔÚÒ»Ö±ÔöÌí£¬£¬ £¬£¬£¬£¬Éæ¼°Óû§ÐÕÃû¡¢×°±¸ÀàÐÍ¡¢IPµØµãºÍÊÖ»úºÅÂëµÈ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬AnimkerÒÑ»ñÖª´ËÊ£¬£¬ £¬£¬£¬£¬µ«ÈÔδ¾ÙÐлØÓ¦¡£¡£¡£¡£¡£¡£¡£


https://www.hackread.com/video-marketing-software-animker-data-leak/


2¡¢Aruba Networks¸üÐÂÐÞ¸´ÆäArubaOSÖеÄ6¸öÎó²î


ýÌå3ÔÂ1ÈÕ±¨µÀ³Æ£¬£¬ £¬£¬£¬£¬Aruba NetworksÐû²¼Çå¾²¸üУ¬£¬ £¬£¬£¬£¬ÐÞ¸´ÁËÓ°ÏìÆäרÓÐÍøÂç²Ù×÷ϵͳArubaOS¶à¸ö°æ±¾µÄ6¸öÎó²î¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²î¿ÉÒÔ·ÖΪÁ½ÀࣺPAPIЭÒ飨Aruba Networks½ÓÈëµãÖÎÀíЭÒ飩ÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2023-22747¡¢CVE-2023-22748¡¢CVE-2023-22749ºÍCVE-2023-22750£©ºÍ»ùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öÎó²î£¨CVE-2023-22751ºÍCVE-2023-22752£©¡£¡£¡£¡£¡£¡£¡£ËüÃǵÄCVSSÆÀ·Ö¾ùΪ9.8£¬£¬ £¬£¬£¬£¬¿Éͨ¹ýUDP¶Ë¿Ú8211ÏòPAPI·¢ËÍÌØÖÆÊý¾Ý°üÀ´Ê¹Ó㬣¬ £¬£¬£¬£¬´Ó¶øÒÔÌØÈ¨Óû§Éí·ÝÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/aruba-networks-fixes-six-critical-vulnerabilities-in-arubaos/


3¡¢Sysdig·¢Ã÷Ö÷ÒªÕë¶ÔÔÆÇéÐεÄSCARLETEEL¹¥»÷»î¶¯


SysdigÔÚ2ÔÂ28ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸öÃûΪSCARLETEELµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ»ñµÃÍйÜÔÚAWSÉϵÄKubernetes¼¯ÈºµÄÃæÏò¹«ÖÚµÄЧÀ͵ijõʼ»á¼ûȨÏÞ£¬£¬ £¬£¬£¬£¬Àֳɺ󹥻÷Õ߾ͻáÏÂÔØÒ»¸öXMRig coinminerºÍÒ»¸ö¾ç±¾£¬£¬ £¬£¬£¬£¬ÓÃÓÚ´ÓKubernetes podÖÐÇÔÈ¡ÕÊ»§Æ¾Ö¤¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß»áʹÓÃLambdaº¯Êýö¾ÙºÍ¼ìË÷ËùÓÐרÓдúÂëºÍÈí¼þ£¬£¬ £¬£¬£¬£¬ÒÔ¼°ÆäÖ´ÐÐÃÜÔ¿ºÍLambdaº¯ÊýÇéÐαäÁ¿£¬£¬ £¬£¬£¬£¬ÒÔÕÒµ½IAMÓû§Æ¾Ö¤¡£¡£¡£¡£¡£¡£¡£SysdigÒÔΪ¼ÓÃÜÐ®ÖÆ¹¥»÷±»ÓÃ×÷ÓÕ¶ü£¬£¬ £¬£¬£¬£¬Ö¼ÔÚµÖ´ï¹¥»÷ÕßµÄÕæÕýÄ¿µÄ£¬£¬ £¬£¬£¬£¬¼´ÍµÈ¡×¨ÓÐÈí¼þ¡£¡£¡£¡£¡£¡£¡£


https://sysdig.com/blog/cloud-breach-terraform-data-theft/


4¡¢Blind Eagleð³äÕþ¸®Ë°Îñ»ú¹¹Õë¶Ô¸çÂ×±ÈÑǵĻú¹¹


2ÔÂ27ÈÕ£¬£¬ £¬£¬£¬£¬BlackberryÅû¶ÁËBlind EagleÕë¶Ô¸çÂ×±ÈÑÇÒªº¦ÐÐÒµµÄÐÂÒ»ÂÖ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£BlackberryÓÚ2ÔÂ20ÈÕ¼ì²âµ½´Ë´Î¹¥»÷»î¶¯£¬£¬ £¬£¬£¬£¬¹¥»÷Õßð³äÕþ¸®Ë°Îñ»ú¹¹¹ú¼Ò˰ÎñºÍº£¹Ø×ÜÊð(DIAN)£¬£¬ £¬£¬£¬£¬Ö÷ÒªÕë¶Ô¸çÂ×±ÈÑǵÄÎÀÉú¡¢½ðÈÚ¡¢Ö´·¨¡¢ÒÆÃñºÍÈÏÕæÌ¸ÅеĻú¹¹¡£¡£¡£¡£¡£¡£¡£´¹ÂÚÓʼþ´øÓÐÒ»¸öÖ¸ÏòPDFÎļþµÄÁ´½Ó£¬£¬ £¬£¬£¬£¬¸ÃÎļþ¾Ý³ÆÍйÜÔÚDIANÍøÕ¾ÉÏ£¬£¬ £¬£¬£¬£¬ÏÖʵÉÏ»á×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£PayloadÊÇÒ»¸ö»ìÏýµÄVBS£¬£¬ £¬£¬£¬£¬ËüʹÓÃPowerShell¼ìË÷»ùÓÚ.NETµÄDLLÎļþ£¬£¬ £¬£¬£¬£¬×îÖÕ½«AsyncRAT¼ÓÔØµ½ÄÚ´æÖС£¡£¡£¡£¡£¡£¡£


https://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia


5¡¢FortiGuardÅû¶LockBitÐÂÒ»ÂÖ¹¥»÷µÄѬȾÁ´ºÍTTP


FortiGuardÓÚ2ÔÂ28ÈÕÐû²¼±¨¸æÏêÊöÁËLockBitÐÂÒ»ÂÖÀÕË÷¹¥»÷µÄѬȾÁ´ºÍTTP¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2022Äê12ÔºÍ2023Äê1Ô·¢Ã÷LockBitµÄ»î¶¯£¬£¬ £¬£¬£¬£¬Ö÷ÒªÕë¶ÔÄ«Î÷¸çºÍÎ÷°àÑÀµÄ×ÉѯºÍÖ´·¨ÐÐÒµµÄ¹«Ë¾¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃÁË¿ÉÓÐÓöԿ¹AVºÍEDR½â¾ö¼Æ»®µÄ·½·¨£¬£¬ £¬£¬£¬£¬Í¨¹ý.imgÈÝÆ÷·Ö·¢ÈƹýÁËWeb±ê¼Ç(MOTW)±£»£»£»£»£»£»£»¤»úÖÆ£¬£¬ £¬£¬£¬£¬¶à½×¶Î¾ç±¾ÌáÈ¡ÊÜÃÜÂë±£»£»£»£»£»£»£»¤µÄÀÕË÷Èí¼þ¿ÉÖ´ÐÐÎļþ£¨Ö»ÓÐÔÚʹÓÃÆæÒìÃÜÂëÔËÐÐʱ²Å»á±»½âѹ£©¿ÉÈÆ¹ý»ùÓÚÊðÃûµÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£VirusTotalÖÐÑù±¾µÄ¼ì²âÂʺܵÍ£¬£¬ £¬£¬£¬£¬Åú×¢¸Ã»î¶¯Ê¹ÓõÄÒªÁìÔÚ¼ì²âÈÆ¹ý·½ÃæÊÇÓÐÓõġ£¡£¡£¡£¡£¡£¡£


https://www.fortinet.com/blog/threat-research/emerging-lockbit-campaign


6¡¢SonicWallÐû²¼2023ÄêÍøÂçÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


ýÌå2ÔÂ28Èճƣ¬£¬ £¬£¬£¬£¬SonicWallÐû²¼ÁË2023ÄêÍøÂçÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬ £¬£¬£¬£¬SonicWallÔÚ2022Äê×ܹ²¼Í¼ÁË55ÒڴζñÒâÈí¼þ¹¥»÷£¬£¬ £¬£¬£¬£¬Í¬±ÈÔöÌí2%¡£¡£¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÔÚ2022Äê¼ÌÐøÏ½µ£¬£¬ £¬£¬£¬£¬ÊýĿϽµÖÁ4.933ÒÚ£¬£¬ £¬£¬£¬£¬Í¬±ÈϽµ21%¡£¡£¡£¡£¡£¡£¡£ÎïÁªÍø¶ñÒâÈí¼þÊýÄ¿ÔÚ´ó·ùÔ¾Éý£¬£¬ £¬£¬£¬£¬Ê×´ÎÍ»ÆÆ1ÒÚ´ó¹Ø£¬£¬ £¬£¬£¬£¬¹²1.123Òڴι¥»÷£¬£¬ £¬£¬£¬£¬Í¬±ÈÔöÌí87%¡£¡£¡£¡£¡£¡£¡£¼ÓÃÜÐ®ÖÆ¹¥»÷Ϊ1.393ÒڴΣ¬£¬ £¬£¬£¬£¬±È2021ÄêÔöÌíÁË43%¡£¡£¡£¡£¡£¡£¡£È¥Äê·¢Ã÷ÁË465501¸öеĶñÒâÈí¼þ±äÌ壬£¬ £¬£¬£¬£¬Æ½¾ùÌìÌì1279¸ö¡£¡£¡£¡£¡£¡£¡£


https://www.sonicwall.com/2023-cyber-threat-report/