Western DigitalÔâµ½¹¥»÷My Cloud·þÎñÔÝʱÖжÏ
Ðû²¼Ê±¼ä 2023-04-041¡¢Western DigitalÔâµ½¹¥»÷My Cloud·þÎñÔÝʱÖжÏ
4ÔÂ3ÈÕ±¨µÀ£¬Western Digital³ÆÆäÔâµ½¹¥»÷£¬Î´¾ÊÚȨµÄµÚÈý·½»ñµÃÁËÆ乫˾¶à¸öϵͳµÄ·ÃÎÊȨÏÞ¡£¾ÝϤ£¬¸ÃʼþÊÇÔÚ3ÔÂ26ÈÕ·¢Ïֵģ¬Ä¿Ç°ÊÓ²ìÉд¦ÓÚÔçÆڽ׶Σ¬¹«Ë¾ÕýÓëÖ´·¨²¿ÃÅе÷ÊÂÇé¡£¾ÝÏֽ׶ÎÊӲ죬¹«Ë¾È·ÈϹ¥»÷Õß´ÓÆäϵͳÖлñÈ¡ÁËijЩÊý¾Ý£¬²¢ÔÚŬÁ¦Á˽âÕâЩÊý¾ÝµÄÐÔÖʺͷ¶Î§¡£¸Ã¹«Ë¾³Æ£¬ÆäÓ¦¶Ô´ëÊ©¿ÉÄܵ¼Ö¹«Ë¾²¿ÃÅÒµÎñÔËÓªÖжϡ£×ÔÖÜÈÕÒÔÀ´£¬¶à¸öMy CloudÓû§³ÂËßËûÃÇÎÞ·¨·ÃÎÊÔÆÍйÜýÌå´æ´¢¿â£¬µÇ¼ʱ»áÏÔʾ¡°503·þÎñÔÝʱ²»ÐÐÓá±´íÎó¡£¾àÊ״γÂËßÖжÏÒÔÀ´ÒÑÁè¼Ý24Сʱ£¬ÔÆ¡¢ÊðÀí¡¢Web¡¢Éí·ÝÑéÖ¤¡¢µç×ÓÓʼþºÍÍÆËÍ֪ͨ¾ù²»ÐÐÓá£
https://www.bleepingcomputer.com/news/security/western-digital-discloses-network-breach-my-cloud-service-down/
2¡¢Dish NetworkÒòÀÕË÷¹¥»÷ʼþÔâµ½¶àÆð¼¯ÌåËßËÏ
ýÌå4ÔÂ1Èճƣ¬ÖÁÉÙÓÐÁù¼ÒÂÉʦÊÂÎñËùÕýÔÚ¶ÔDish NetworkÌáÆð¼¯ÌåËßËÏ£¬Ö¼ÔÚΪ2021Äê2ÔÂ22ÈÕÖÁ2023Äê2ÔÂ27ÈÕÆÚ¼äÒòÉæÏÓ¡°Ö¤È¯ÆÛÕ©¡±Êܵ½µ¹Ã¹Ó°ÏìµÄDish¹É¶«×·»ØËðʧ¡£ÃñÊÂËßËϳƣ¬DISH NetworkÊÔͼÑÚ¸ÇÆäÍøÂçÄþ¾²ºÍIT»ù´¡ÉèÊ©²»×ãµÄÊÂʵ£¬Í¬Ê±¿ä´óÆäÔËӪЧÂÊ¡£ÓÉÓÚÉÏÊöÔÒò£¬¹«Ë¾ÎÞ·¨Êʵ±µØ±£»¤¿Í»§Êý¾Ý£¬Ê¹ÆäÈÝÒ×±»¹¥»÷Õß·ÃÎÊ¡£2ÔÂ24ÈÕ×óÓÒ£¬DISHÉñÃØÏÂÏߣ¬ÆäÍøÕ¾ºÍÓ¦ÓÃÍ£ÔËÊýÈÕ¡£2ÔÂ28ÈÕ£¬DISH͸¶ÆäÔâµ½ÀÕË÷¹¥»÷¡£ÏûÏ¢´«³öºó£¬Æä¹É¼Ûÿ¹Éϵø0.79ÃÀÔª¡£
https://www.bleepingcomputer.com/news/security/dish-slapped-with-multiple-lawsuits-after-ransomware-cyber-attack/
3¡¢Winter VivernÀûÓÃZimbra©¶´¹¥»÷±±Ô¼¾üÕþºÍÍâ½»»ú¹¹
ProofpointÔÚ3ÔÂ30ÈÕÅû¶ÁËTA473£¨ÓÖÃûWinter Vivern£©ÀûÓÃZimbra Collaboration·þÎñÆ÷ÖЩ¶´£¨CVE-2022-27926£©µÄ¹¥»÷»î¶¯¡£¹¥»÷ʼÓÚ2023Äê2Ô£¬Ö÷ÒªÕë¶ÔÓë±±Ô¼Ïà¹ØµÄÅ·ÖÞ¾üÊ¡¢Õþ¸®ºÍÍâ½»»ú¹¹¡£¹¥»÷ÕßʹÓÃAcunetixɨÃèδÐÞ¸´µÄÍøÂçÓʼþƽ̨²¢·¢Ë͵öÓãÓʼþ£¬ÓʼþÖеÄÁ´½Ó¿ÉÀûÓÃZimbraÖЩ¶´½«JavaScript payload×¢ÈëÍøÒ³¡£ÕâЩpayloadÓÃÓÚ´ÓÄ¿±êÊÕµ½µÄcookieÖÐÇÔÈ¡Óû§Ãû¡¢ÃÜÂëºÍÁîÅÆ£¬À´·ÃÎÊÄ¿±êµÄÓʼþÕÊ»§¡£×îºó£¬¹¥»÷Õß»á·ÃÎÊÓʼþÖеÄÃô¸ÐÐÅÏ¢£¬»òÔÚÒ»¶Îʱ¼äÄÚ¼à¿ØͨÐÅ¡£
https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability
4¡¢¶à¸ö½©Ê¬ÍøÂçÀûÓÃCactiºÍRealtek©¶´·Ö·¢¶ñÒâÈí¼þ
3ÔÂ29ÈÕ£¬Fortinet³ÆÆäÔÚ½ñÄê1ÔÂÖÁ3Ô¼ì²âµ½¶à¸ö½©Ê¬ÍøÂçÀûÓÃCactiºÍRealtek©¶´£¬Ö¼ÔÚ·Ö·¢¶ñÒâÈí¼þShellBotºÍMoobot¡£Â©¶´·Ö±ðΪRealtek Jungle SDKÖеÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2021-35394£©ºÍCacti¹ÊÕϹÜÀí¼à¿Ø¹¤¾ßÖеÄÃüÁî×¢È멶´£¨CVE-2022-46169£©¡£MoobotÊÇMiraiµÄÒ»¸ö±äÖÖ£¬Ð°汾µÄÒ»¸öÏÔÖøÌØÕ÷ÊÇËüÃÇÄܹ»É¨Ã貢ɱËÀÆäËüÒÑÖªbot½ø³Ì£¬ÒÔ»ñµÃ×î´óÓ²¼þ¹¦ÂÊÀ´Ö´ÐÐDDoS¹¥»÷¡£ShellBotÓÚ½ñÄê1ÔÂÊ״α»·¢ÏÖ£¬Fortinet·¢ÏÖÁËËüµÄÈý¸ö¼þ±äÌ壬±íÃ÷ËüÕýÔÚ»ý¼«¿ª·¢ÖС£
https://www.fortinet.com/blog/threat-research/moobot-strikes-again-targeting-cacti-and-realtek-vulnerabilities
5¡¢Ñо¿ÈËÔ±Åû¶Azure SFXÖЩ¶´Super FabriXssµÄϸ½Ú
¾Ý3ÔÂ30ÈÕ±¨µÀ£¬Ñо¿ÈËÔ±Åû¶ÁËAzure Service Fabric Explorer(SFX)ÖЩ¶´Super FabriXssµÄϸ½Ú¡£ÕâÊÇÒ»¸ö¿çÕ¾½Å±¾Â©¶´£¨CVE-2023-23383£©£¬Ãû×ÖÀ´Ô´ÓÚ΢ÈíÔÚ2022Äê10ÔÂÐÞ¸´µÄFabriXss©¶´£¨CVE-2022-35829£©¡£Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÀûÓÃÆäÔÚService Fabric½ÚµãÉÏÍйܵÄÈÝÆ÷ÖÐʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬¶øÎÞÐèÉí·ÝÑéÖ¤¡£ÓëFabriXxs²îÒìµÄÊÇ£¬SuperFabriXxsÖ»´æÔÚÓÚWindows ClusterÖУ¬¿ÉÓÃÓÚ´ó¹æÄ£µÄ´úÂëÖ´Ðй¥»÷¡£Î¢ÈíÔÚ2023Äê3ÔµÄÖܶþ²¹¶¡ÖÐÐÞ¸´Á˸鶴¡£
https://orca.security/resources/blog/super-fabrixss-azure-vulnerability/
6¡¢Securonix·¢ÏÖÕë¶ÔÃÀ¹úµÄTACTICAL#OCTOPUS¹¥»÷»î¶¯
SecuronixÓÚ3ÔÂ30ÈÕ³ÆÆä·¢ÏÖÁËÕë¶ÔÃÀ¹ú×éÖ¯µÄTACTICAL#OCTOPUS¹¥»÷»î¶¯¡£Ëæ×ÅÃÀ¹ú4ÔÂ15ÈÕÄÉË°½ØÖ¹ÈÕÆÚÁÙ½ü£¬ÓëË°ÊÕÏà¹ØµÄµöÓã¹¥»÷Ôö¼Ó¡£¸Ã¹¥»÷»î¶¯Í¨³£Ê¼ÓÚÒ»¸öÊÜÃÜÂë±£»¤µÄ.zipÎļþ£¬ÆäÃû³ÆÓëË°ÎñÏà¹Ø¡£.zipÎļþÖÐͨ³£°üÂÞÒ»¸ö.pngºÍÒ»¸ö.lnk¡£µ±Óû§Ë«»÷¿ì½Ý·½Ê½Îļþʱ£¬´úÂ뿪ʼִÐС£È»ºó£¬Ò»ÏµÁÐVBScriptºÍPowerShell stagers»á´ÓC2·þÎñÆ÷ÀÈ¡¸ü¶àµÄpayload¡£
https://www.securonix.com/blog/new-tacticaloctopus-attack-campaign-targets-us-entities-with-malware-bundled-in-tax-themed-documents/