΢ÈíAzure App Serviceй¶²¿·ÖÓû§Ô´´úÂ볤´ï4Äê

Ðû²¼Ê±¼ä 2021-12-23

Ñо¿ÍŶÓÔÚAuerswald VoIPϵͳÖмì²âµ½2¸öÒþ²ØºóÃÅ


Ñо¿ÍŶÓÔÚAuerswald VoIPϵͳÖмì²âµ½2¸öÒþ²ØºóÃÅ.png


RedTeam PentestingÔÚ12ÔÂ20ÈÕ͸¶µÂ¹úµçÐÅÓ²¼þÖÆÔìÉÌAuerswaldʹÓõĻ¥ÁªÍøÐ­ÒéÓïÒô(VoIP)ϵͳÖб£´æ2¸öÒþ²ØºóÃÅ¡£¡£¡£ ¡£Ñо¿Ö°Ô±³ÆËûÃÇÔÚCOMpact 5500R PBXµÄ¹Ì¼þÖз¢Ã÷ÁËÕâ2¸öºóÃŵÄÃÜÂ룬£¬£¬£¬£¬£¬£¬Ò»¸öÊôÓÚÉñÃØÓû§Schandelah£¬£¬£¬£¬£¬£¬£¬ÁíÒ»¸öÊôÓÚÖÎÀíÔ±admin£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚûÓз¢Ã÷½ûÓÃÕâЩºóÃŵÄÒªÁì¡£¡£¡£ ¡£¸ÃÎó²î×·×ÙΪCVE-2021-40859£¬£¬£¬£¬£¬£¬£¬CVSSΪ9.8£¬£¬£¬£¬£¬£¬£¬ÓÚ9ÔÂ10ÈÕ±»¹ûÕæ£¬£¬£¬£¬£¬£¬£¬AuerswaldÔÚ11ÔµĹ̼þ¸üУ¨8.2B°æ£©ÖÐÐÞ¸´ÁËÕâÒ»Îó²î¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/12/secret-backdoors-found-in-german-made.html



еĽ©Ê¬ÍøÂçAbcbotÖ÷ÒªÕë¶ÔÖйúµÄÔÆÐ§ÀÍÌṩÉÌ


еĽ©Ê¬ÍøÂçAbcbotÖ÷ÒªÕë¶ÔÖйúµÄÔÆÐ§ÀÍÌṩÉÌ.png


12ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬Cado Security·¢Ã÷н©Ê¬ÍøÂçAbcbotÔÚÒÑÍù¼¸¸öÔÂÖ÷ÒªÕë¶ÔÖйúÔÆÐ§ÀÍÌṩÉÌ£¬£¬£¬£¬£¬£¬£¬°üÀ¨°¢ÀïÔÆ¡¢°Ù¶È¡¢ÌÚѶºÍ»ªÎªÔƵÈ¡£¡£¡£ ¡£AbcbotÊ×ÏÈ»á×°ÖÃÒ»¸öLinux bash¾ç±¾£¬£¬£¬£¬£¬£¬£¬À´½ûÓÃSELinuxÇå¾²±£»£»£» £»£» £»£»¤£¬£¬£¬£¬£¬£¬£¬²¢½¨ÉèºóÃÅ¡£¡£¡£ ¡£È»ºóɨÃèÄ¿µÄÖ÷»úÖÐÊÇ·ñ±£´æÆäËü¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÈôÊÇ·¢Ã÷Ôò»áɾ³ýÆäËü¶ñÒâÈí¼þµÄÏà¹ØÀú³Ì¡£¡£¡£ ¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬£¬Abcbot»¹»áɾ³ýSSHÃÜÔ¿²¢½ö±£´æ×Ô¼ºµÄÃÜÔ¿£¬£¬£¬£¬£¬£¬£¬ÒÔ°ü¹ÜÆä¶ÔÄ¿µÄÖ÷»úµÄ¶ÀÍÌ»á¼û¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/125872/malware/abcbot-botnet-chinese-providers.html



Ç÷ÊÆ¿Æ¼¼·¢Ã÷Tropic TrooperÕë¶ÔÔËÊäÐÐÒµµÄ¹¥»÷»î¶¯


Ç÷ÊÆ¿Æ¼¼·¢Ã÷Tropic TrooperÕë¶ÔÔËÊäÐÐÒµµÄ¹¥»÷»î¶¯.png

Ç÷ÊÆ¿Æ¼¼ÔÚ12ÔÂ14ÈÕ·¢Ã÷ÌØ¹¤×éÖ¯Tropic Trooper£¨Ò²³ÆEarth Centaur£©Õë¶ÔÔËÊäÐÐÒµµÄ¹¥»÷»î¶¯¡£¡£¡£ ¡£´Ë´Î»î¶¯Ê¼ÓÚ2020Äê7Ô£¬£¬£¬£¬£¬£¬£¬Ãé×¼ÁËÔËÊäÐÐÒµµÄ¹«Ë¾ºÍ¹Ù·½»ú¹¹¡£¡£¡£ ¡£Ñо¿Ö°Ô±½«ÈëÇÖÀú³Ì·ÖΪ¶à¸ö½×¶Î£º¹¥»÷±£´æÎó²îµÄIISЧÀÍÆ÷ºÍExchange²¢×°ÖÃshell£»£»£» £»£» £»£»Ê¹ÓøÃshell×°ÖÃ.NET¼ÓÔØ³ÌÐòNerapackºÍµÚÒ»½×¶ÎºóÃÅQuasar£»£»£» £»£» £»£»È»ºó£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤Êܺ¦ÕßÀàÐÍ·Ö·¢µÚ¶þ½×¶ÎºóÃÅ£¬£¬£¬£¬£¬£¬£¬°üÀ¨ChiserClientºÍSmileSvrµÈ£»£»£» £»£» £»£»×îºó£¬£¬£¬£¬£¬£¬£¬»¹»áÊÔÍ¼ÆÆËðÄÚÍø¡¢×ª´¢Æ¾Ö¤²¢É¨³ýÈÕÖ¾¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.trendmicro.com/en_us/research/21/l/collecting-in-the-dark-tropic-trooper-targets-transportation-and-government-organizations.html



Group-IB³Æ´ó¹æÄ£Õ©Æ­»î¶¯Ã¿ÔÂÔì³ÉÔ¼8000ÍòÃÀÔªËðʧ


Group-IB³Æ´ó¹æÄ£Õ©Æ­»î¶¯Ã¿ÔÂÔì³ÉÔ¼8000ÍòÃÀÔªËðʧ.png


12ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬Group-IB·¢Ã÷Ò»³¡Õë¶ÔÈ«Çò90¶à¸ö¹ú¼Ò/µØÇøµÄÓû§µÄÕ©Æ­»î¶¯¡£¡£¡£ ¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÒѼì²âµ½ÖÁÉÙ60¸ö²î±ðµÄÕ©Æ­ÍøÂ磬£¬£¬£¬£¬£¬£¬ÔËÐÐÓÐÕë¶ÔÐÔµÄÁ´½Ó£¬£¬£¬£¬£¬£¬£¬Æ½¾ùÿ¸öÍøÂçʹÓÃÁË70¸ö²î±ðµÄÓòÃû¡£¡£¡£ ¡£´Ë´Î»î¶¯Ã°³ä121¸öÆ·ÅÆ£¬£¬£¬£¬£¬£¬£¬ÒªÇóÓû§¼ÓÈëÊӲ첢»î¶¯ÔùÆ·£¬£¬£¬£¬£¬£¬£¬ÆäÖе¥¸öÕ©Æ­ÍøÂçµÄDZÔÚÄ¿µÄԼΪ1000ÍòÈË¡£¡£¡£ ¡£Í¨Ì«¹ýÎö»á¼ûÕßµÄȪԴ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÁ÷Á¿À´×ÔÓ¡¶È£¨42.2%£©¡¢Ì©¹ú£¨7%£©ºÍÓ¡¶ÈÄáÎ÷ÑÇ£¨4.4%£©µÈ¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.group-ib.com/media/target-links-2021/



΢ÈíAzure App Serviceй¶²¿·ÖÓû§Ô´´úÂ볤´ï4Äê


΢ÈíAzure App Serviceй¶²¿·ÖÓû§Ô´´úÂ볤´ï4Äê.png


12ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬Wiz.io³ÆÎ¢ÈíAzure App Serviceƽ̨±£´æÎó²î£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶Á˽ü4ÄêËùÓÐʹÓÃPHP¡¢Node¡¢Python¡¢RubyºÍJava¿ª·¢µÄÓ¦ÓõÄÔ´´úÂë¡£¡£¡£ ¡£¸Ãƽ̨Ö÷ÒªÓÃÓÚ¹¹½¨ºÍÍйÜWebÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÓû§ÎÞÒâÖÐÉèÖÃÐèÒªÔÚÄÚÈݸùĿ¼Öн¨ÉèµÄ.gitÎļþ¼Ðµ¼ÖÂÐÅϢй¶¡£¡£¡£ ¡£Ñо¿Ö°Ô±½«Îó²îÏ·³ÆÎªNotLegit£¬£¬£¬£¬£¬£¬£¬³ÆÆä×Ô2017Äê9Ô¾ÍÒ»Ö±±£´æ£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÒѱ»ÔÚҰʹÓᣡ£¡£ ¡£12ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼Í¨¸æ³ÆÎÊÌâÒѽâ¾ö¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-azure-app-service-flaw-exposed-customer-source-code/



Unit 42Ðû²¼2021ÄêµÚÈý¼¾¶ÈÍøÂçÇå¾²Ç÷ÊÆµÄÆÊÎö±¨¸æ


Unit 42Ðû²¼2021ÄêµÚÈý¼¾¶ÈÍøÂçÇå¾²Ç÷ÊÆµÄÆÊÎö±¨¸æ.png


Unit 42ÔÚ12ÔÂ21ÈÕÐû²¼ÁË2021ÄêµÚÈý¼¾¶ÈÍøÂçÇå¾²Ç÷ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬µÚÈý¼¾¶È×ܹ²ÓÐ7064¸öеÄCVE£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ594¸öÊôÓÚ¸ßΣÎó²î£¬£¬£¬£¬£¬£¬£¬Õ¼±È13.6%£¬£¬£¬£¬£¬£¬£¬1965¸ö¸ßÑÏÖØÐÔÎó²î£¨45.1%£©ºÍ2542ÆäÖеÈÑÏÖØÐÔÎó²î£¨41.3%£©£»£»£» £»£» £»£»ÆäÖÐ25.6%ÊÇÍâµØÎó²î£¬£¬£¬£¬£¬£¬£¬ÆäÓàµÄ74.4%ÊÇÔ¶³ÌÎó²î£»£»£» £»£» £»£»×î³£¼ûÎó²îÀàÐÍΪ¿çÕ¾¾ç±¾¡¢¾Ü¾øÐ§ÀͺÍÐÅϢй¶Îó²î£¬£¬£¬£¬£¬£¬£¬×î³£¼ûµÄ¹¥»÷ÀàÐÍΪÐÅϢй¶¡¢´úÂëÖ´ÐкÍĿ¼±éÀú¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/network-attacks-trends-august-october-2021/