AnimkerÊý¾Ý¿âÉèÖùýʧÁè¼Ý70ÍòÓû§µÄÐÅϢй¶

Ðû²¼Ê±¼ä 2023-03-02

1¡¢AnimkerÊý¾Ý¿âÉèÖùýʧÁè¼Ý70ÍòÓû§µÄÐÅϢй¶


¾Ý3ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚShodanÉÏ·¢Ã÷ÁËÒ»¸öÉèÖùýʧµÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬Ð¹Â¶ÁËgetshow.ioºÍanimaker.comÍøÕ¾Áè¼Ý700000Óû§µÄ²âÊÔºÍСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£Getshow.ioÊôÓÚAnimker.com£¬£¬£¬£¬£¬£¬ÓÐÎÊÌâµÄЧÀÍÆ÷×¢²áÔÚÓòÃûgetshow.ioÏ£¬£¬£¬£¬£¬£¬ÓÉanimaker.comÖÎÀí¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÏÖÔÚ°üÀ¨5.3GBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬²¢ÇÒËæ×ÅÌìÌìÐÂÌí¼ÓµÄÊý¾ÝÔÚÒ»Ö±ÔöÌí£¬£¬£¬£¬£¬£¬Éæ¼°Óû§ÐÕÃû¡¢×°±¸ÀàÐÍ¡¢IPµØµãºÍÊÖ»úºÅÂëµÈ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬AnimkerÒÑ»ñÖª´ËÊ£¬£¬£¬£¬£¬£¬µ«ÈÔδ¾ÙÐлØÓ¦¡£¡£¡£¡£¡£¡£


https://www.hackread.com/video-marketing-software-animker-data-leak/


2¡¢Aruba Networks¸üÐÂÐÞ¸´ÆäArubaOSÖеÄ6¸öÎó²î


ýÌå3ÔÂ1ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬Aruba NetworksÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÓ°ÏìÆäרÓÐÍøÂç²Ù×÷ϵͳArubaOS¶à¸ö°æ±¾µÄ6¸öÎó²î¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²î¿ÉÒÔ·ÖΪÁ½ÀࣺPAPIЭÒ飨Aruba Networks½ÓÈëµãÖÎÀíЭÒ飩ÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2023-22747¡¢CVE-2023-22748¡¢CVE-2023-22749ºÍCVE-2023-22750£©ºÍ»ùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öÎó²î£¨CVE-2023-22751ºÍCVE-2023-22752£©¡£¡£¡£¡£¡£¡£ËüÃǵÄCVSSÆÀ·Ö¾ùΪ9.8£¬£¬£¬£¬£¬£¬¿Éͨ¹ýUDP¶Ë¿Ú8211ÏòPAPI·¢ËÍÌØÖÆÊý¾Ý°üÀ´Ê¹Ó㬣¬£¬£¬£¬£¬´Ó¶øÒÔÌØÈ¨Óû§Éí·ÝÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/aruba-networks-fixes-six-critical-vulnerabilities-in-arubaos/


3¡¢Sysdig·¢Ã÷Ö÷ÒªÕë¶ÔÔÆÇéÐεÄSCARLETEEL¹¥»÷»î¶¯


SysdigÔÚ2ÔÂ28ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸öÃûΪSCARLETEELµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ»ñµÃÍйÜÔÚAWSÉϵÄKubernetes¼¯ÈºµÄÃæÏò¹«ÖÚµÄЧÀ͵ijõʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬Àֳɺ󹥻÷Õ߾ͻáÏÂÔØÒ»¸öXMRig coinminerºÍÒ»¸ö¾ç±¾£¬£¬£¬£¬£¬£¬ÓÃÓÚ´ÓKubernetes podÖÐÇÔÈ¡ÕÊ»§Æ¾Ö¤¡£¡£¡£¡£¡£¡£¹¥»÷Õß»áʹÓÃLambdaº¯Êýö¾ÙºÍ¼ìË÷ËùÓÐרÓдúÂëºÍÈí¼þ£¬£¬£¬£¬£¬£¬ÒÔ¼°ÆäÖ´ÐÐÃÜÔ¿ºÍLambdaº¯ÊýÇéÐαäÁ¿£¬£¬£¬£¬£¬£¬ÒÔÕÒµ½IAMÓû§Æ¾Ö¤¡£¡£¡£¡£¡£¡£SysdigÒÔΪ¼ÓÃÜÐ®ÖÆ¹¥»÷±»ÓÃ×÷ÓÕ¶ü£¬£¬£¬£¬£¬£¬Ö¼ÔÚµÖ´ï¹¥»÷ÕßµÄÕæÕýÄ¿µÄ£¬£¬£¬£¬£¬£¬¼´ÍµÈ¡×¨ÓÐÈí¼þ¡£¡£¡£¡£¡£¡£


https://sysdig.com/blog/cloud-breach-terraform-data-theft/


4¡¢Blind Eagleð³äÕþ¸®Ë°Îñ»ú¹¹Õë¶Ô¸çÂ×±ÈÑǵĻú¹¹


2ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬BlackberryÅû¶ÁËBlind EagleÕë¶Ô¸çÂ×±ÈÑÇÒªº¦ÐÐÒµµÄÐÂÒ»ÂÖ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£BlackberryÓÚ2ÔÂ20ÈÕ¼ì²âµ½´Ë´Î¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬¹¥»÷Õßð³äÕþ¸®Ë°Îñ»ú¹¹¹ú¼Ò˰ÎñºÍº£¹Ø×ÜÊð(DIAN)£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô¸çÂ×±ÈÑǵÄÎÀÉú¡¢½ðÈÚ¡¢Ö´·¨¡¢ÒÆÃñºÍÈÏÕæÌ¸ÅеĻú¹¹¡£¡£¡£¡£¡£¡£´¹ÂÚÓʼþ´øÓÐÒ»¸öÖ¸ÏòPDFÎļþµÄÁ´½Ó£¬£¬£¬£¬£¬£¬¸ÃÎļþ¾Ý³ÆÍйÜÔÚDIANÍøÕ¾ÉÏ£¬£¬£¬£¬£¬£¬ÏÖʵÉÏ»á×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£¡£PayloadÊÇÒ»¸ö»ìÏýµÄVBS£¬£¬£¬£¬£¬£¬ËüʹÓÃPowerShell¼ìË÷»ùÓÚ.NETµÄDLLÎļþ£¬£¬£¬£¬£¬£¬×îÖÕ½«AsyncRAT¼ÓÔØµ½ÄÚ´æÖС£¡£¡£¡£¡£¡£


https://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia


5¡¢FortiGuardÅû¶LockBitÐÂÒ»ÂÖ¹¥»÷µÄѬȾÁ´ºÍTTP


FortiGuardÓÚ2ÔÂ28ÈÕÐû²¼±¨¸æÏêÊöÁËLockBitÐÂÒ»ÂÖÀÕË÷¹¥»÷µÄѬȾÁ´ºÍTTP¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2022Äê12ÔºÍ2023Äê1Ô·¢Ã÷LockBitµÄ»î¶¯£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÄ«Î÷¸çºÍÎ÷°àÑÀµÄ×ÉѯºÍÖ´·¨ÐÐÒµµÄ¹«Ë¾¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃÁË¿ÉÓÐÓöԿ¹AVºÍEDR½â¾ö¼Æ»®µÄ·½·¨£¬£¬£¬£¬£¬£¬Í¨¹ý.imgÈÝÆ÷·Ö·¢ÈƹýÁËWeb±ê¼Ç(MOTW)± £»£»£»£»¤»úÖÆ£¬£¬£¬£¬£¬£¬¶à½×¶Î¾ç±¾ÌáÈ¡ÊÜÃÜÂë± £»£»£»£»¤µÄÀÕË÷Èí¼þ¿ÉÖ´ÐÐÎļþ£¨Ö»ÓÐÔÚʹÓÃÆæÒìÃÜÂëÔËÐÐʱ²Å»á±»½âѹ£©¿ÉÈÆ¹ý»ùÓÚÊðÃûµÄ¼ì²â¡£¡£¡£¡£¡£¡£VirusTotalÖÐÑù±¾µÄ¼ì²âÂʺܵÍ£¬£¬£¬£¬£¬£¬Åú×¢¸Ã»î¶¯Ê¹ÓõÄÒªÁìÔÚ¼ì²âÈÆ¹ý·½ÃæÊÇÓÐÓõÄ¡£¡£¡£¡£¡£¡£


https://www.fortinet.com/blog/threat-research/emerging-lockbit-campaign


6¡¢SonicWallÐû²¼2023ÄêÍøÂçÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


ýÌå2ÔÂ28Èճƣ¬£¬£¬£¬£¬£¬SonicWallÐû²¼ÁË2023ÄêÍøÂçÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬SonicWallÔÚ2022Äê×ܹ²¼Í¼ÁË55ÒڴζñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Í¬±ÈÔöÌí2%¡£¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÔÚ2022Äê¼ÌÐøÏ½µ£¬£¬£¬£¬£¬£¬ÊýĿϽµÖÁ4.933ÒÚ£¬£¬£¬£¬£¬£¬Í¬±ÈϽµ21%¡£¡£¡£¡£¡£¡£ÎïÁªÍø¶ñÒâÈí¼þÊýÄ¿ÔÚ´ó·ùÔ¾Éý£¬£¬£¬£¬£¬£¬Ê×´ÎÍ»ÆÆ1ÒÚ´ó¹Ø£¬£¬£¬£¬£¬£¬¹²1.123Òڴι¥»÷£¬£¬£¬£¬£¬£¬Í¬±ÈÔöÌí87%¡£¡£¡£¡£¡£¡£¼ÓÃÜÐ®ÖÆ¹¥»÷Ϊ1.393ÒڴΣ¬£¬£¬£¬£¬£¬±È2021ÄêÔöÌíÁË43%¡£¡£¡£¡£¡£¡£È¥Äê·¢Ã÷ÁË465501¸öеĶñÒâÈí¼þ±äÌ壬£¬£¬£¬£¬£¬Æ½¾ùÌìÌì1279¸ö¡£¡£¡£¡£¡£¡£


https://www.sonicwall.com/2023-cyber-threat-report/