AnimkerÊý¾Ý¿âÉèÖùýʧÁè¼Ý70ÍòÓû§µÄÐÅϢй¶
Ðû²¼Ê±¼ä 2023-03-021¡¢AnimkerÊý¾Ý¿âÉèÖùýʧÁè¼Ý70ÍòÓû§µÄÐÅϢй¶
¾Ý3ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚShodanÉÏ·¢Ã÷ÁËÒ»¸öÉèÖùýʧµÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶ÁËgetshow.ioºÍanimaker.comÍøÕ¾Áè¼Ý700000Óû§µÄ²âÊÔºÍСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£Getshow.ioÊôÓÚAnimker.com£¬£¬£¬£¬£¬£¬£¬ÓÐÎÊÌâµÄЧÀÍÆ÷×¢²áÔÚÓòÃûgetshow.ioÏ£¬£¬£¬£¬£¬£¬£¬ÓÉanimaker.comÖÎÀí¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÏÖÔÚ°üÀ¨5.3GBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢ÇÒËæ×ÅÌìÌìÐÂÌí¼ÓµÄÊý¾ÝÔÚÒ»Ö±ÔöÌí£¬£¬£¬£¬£¬£¬£¬Éæ¼°Óû§ÐÕÃû¡¢×°±¸ÀàÐÍ¡¢IPµØµãºÍÊÖ»úºÅÂëµÈ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬AnimkerÒÑ»ñÖª´ËÊ£¬£¬£¬£¬£¬£¬£¬µ«ÈÔδ¾ÙÐлØÓ¦¡£¡£¡£¡£¡£
https://www.hackread.com/video-marketing-software-animker-data-leak/
2¡¢Aruba Networks¸üÐÂÐÞ¸´ÆäArubaOSÖеÄ6¸öÎó²î
ýÌå3ÔÂ1ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬Aruba NetworksÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÓ°ÏìÆäרÓÐÍøÂç²Ù×÷ϵͳArubaOS¶à¸ö°æ±¾µÄ6¸öÎó²î¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²î¿ÉÒÔ·ÖΪÁ½ÀࣺPAPIÐÒ飨Aruba Networks½ÓÈëµãÖÎÀíÐÒ飩ÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2023-22747¡¢CVE-2023-22748¡¢CVE-2023-22749ºÍCVE-2023-22750£©ºÍ»ùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öÎó²î£¨CVE-2023-22751ºÍCVE-2023-22752£©¡£¡£¡£¡£¡£ËüÃǵÄCVSSÆÀ·Ö¾ùΪ9.8£¬£¬£¬£¬£¬£¬£¬¿Éͨ¹ýUDP¶Ë¿Ú8211ÏòPAPI·¢ËÍÌØÖÆÊý¾Ý°üÀ´Ê¹Ó㬣¬£¬£¬£¬£¬£¬´Ó¶øÒÔÌØÈ¨Óû§Éí·ÝÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/aruba-networks-fixes-six-critical-vulnerabilities-in-arubaos/
3¡¢Sysdig·¢Ã÷Ö÷ÒªÕë¶ÔÔÆÇéÐεÄSCARLETEEL¹¥»÷»î¶¯
SysdigÔÚ2ÔÂ28ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸öÃûΪSCARLETEELµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ»ñµÃÍйÜÔÚAWSÉϵÄKubernetes¼¯ÈºµÄÃæÏò¹«ÖÚµÄЧÀ͵ijõʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬Àֳɺ󹥻÷Õ߾ͻáÏÂÔØÒ»¸öXMRig coinminerºÍÒ»¸ö¾ç±¾£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚ´ÓKubernetes podÖÐÇÔÈ¡ÕÊ»§Æ¾Ö¤¡£¡£¡£¡£¡£¹¥»÷Õß»áʹÓÃLambdaº¯Êýö¾ÙºÍ¼ìË÷ËùÓÐרÓдúÂëºÍÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÆäÖ´ÐÐÃÜÔ¿ºÍLambdaº¯ÊýÇéÐαäÁ¿£¬£¬£¬£¬£¬£¬£¬ÒÔÕÒµ½IAMÓû§Æ¾Ö¤¡£¡£¡£¡£¡£SysdigÒÔΪ¼ÓÃÜÐ®ÖÆ¹¥»÷±»ÓÃ×÷ÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚµÖ´ï¹¥»÷ÕßµÄÕæÕýÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬¼´ÍµÈ¡×¨ÓÐÈí¼þ¡£¡£¡£¡£¡£
https://sysdig.com/blog/cloud-breach-terraform-data-theft/
4¡¢Blind Eagleð³äÕþ¸®Ë°Îñ»ú¹¹Õë¶Ô¸çÂ×±ÈÑǵĻú¹¹
2ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬BlackberryÅû¶ÁËBlind EagleÕë¶Ô¸çÂ×±ÈÑÇÒªº¦ÐÐÒµµÄÐÂÒ»ÂÖ¹¥»÷»î¶¯¡£¡£¡£¡£¡£BlackberryÓÚ2ÔÂ20ÈÕ¼ì²âµ½´Ë´Î¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßð³äÕþ¸®Ë°Îñ»ú¹¹¹ú¼Ò˰ÎñºÍº£¹Ø×ÜÊð(DIAN)£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô¸çÂ×±ÈÑǵÄÎÀÉú¡¢½ðÈÚ¡¢Ö´·¨¡¢ÒÆÃñºÍÈÏÕæÌ¸ÅеĻú¹¹¡£¡£¡£¡£¡£´¹ÂÚÓʼþ´øÓÐÒ»¸öÖ¸ÏòPDFÎļþµÄÁ´½Ó£¬£¬£¬£¬£¬£¬£¬¸ÃÎļþ¾Ý³ÆÍйÜÔÚDIANÍøÕ¾ÉÏ£¬£¬£¬£¬£¬£¬£¬ÏÖʵÉÏ»á×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£PayloadÊÇÒ»¸ö»ìÏýµÄVBS£¬£¬£¬£¬£¬£¬£¬ËüʹÓÃPowerShell¼ìË÷»ùÓÚ.NETµÄDLLÎļþ£¬£¬£¬£¬£¬£¬£¬×îÖÕ½«AsyncRAT¼ÓÔØµ½ÄÚ´æÖС£¡£¡£¡£¡£
https://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia
5¡¢FortiGuardÅû¶LockBitÐÂÒ»ÂÖ¹¥»÷µÄѬȾÁ´ºÍTTP
FortiGuardÓÚ2ÔÂ28ÈÕÐû²¼±¨¸æÏêÊöÁËLockBitÐÂÒ»ÂÖÀÕË÷¹¥»÷µÄѬȾÁ´ºÍTTP¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2022Äê12ÔºÍ2023Äê1Ô·¢Ã÷LockBitµÄ»î¶¯£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÄ«Î÷¸çºÍÎ÷°àÑÀµÄ×ÉѯºÍÖ´·¨ÐÐÒµµÄ¹«Ë¾¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃÁË¿ÉÓÐÓöԿ¹AVºÍEDR½â¾ö¼Æ»®µÄ·½·¨£¬£¬£¬£¬£¬£¬£¬Í¨¹ý.imgÈÝÆ÷·Ö·¢ÈƹýÁËWeb±ê¼Ç(MOTW)±£»£»£»£»¤»úÖÆ£¬£¬£¬£¬£¬£¬£¬¶à½×¶Î¾ç±¾ÌáÈ¡ÊÜÃÜÂë±£»£»£»£»¤µÄÀÕË÷Èí¼þ¿ÉÖ´ÐÐÎļþ£¨Ö»ÓÐÔÚʹÓÃÆæÒìÃÜÂëÔËÐÐʱ²Å»á±»½âѹ£©¿ÉÈÆ¹ý»ùÓÚÊðÃûµÄ¼ì²â¡£¡£¡£¡£¡£VirusTotalÖÐÑù±¾µÄ¼ì²âÂʺܵͣ¬£¬£¬£¬£¬£¬£¬Åú×¢¸Ã»î¶¯Ê¹ÓõÄÒªÁìÔÚ¼ì²âÈÆ¹ý·½ÃæÊÇÓÐÓõġ£¡£¡£¡£¡£
https://www.fortinet.com/blog/threat-research/emerging-lockbit-campaign
6¡¢SonicWallÐû²¼2023ÄêÍøÂçÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ
ýÌå2ÔÂ28Èճƣ¬£¬£¬£¬£¬£¬£¬SonicWallÐû²¼ÁË2023ÄêÍøÂçÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬SonicWallÔÚ2022Äê×ܹ²¼Í¼ÁË55ÒڴζñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Í¬±ÈÔöÌí2%¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÔÚ2022Äê¼ÌÐøÏ½µ£¬£¬£¬£¬£¬£¬£¬ÊýĿϽµÖÁ4.933ÒÚ£¬£¬£¬£¬£¬£¬£¬Í¬±ÈϽµ21%¡£¡£¡£¡£¡£ÎïÁªÍø¶ñÒâÈí¼þÊýÄ¿ÔÚ´ó·ùÔ¾Éý£¬£¬£¬£¬£¬£¬£¬Ê×´ÎÍ»ÆÆ1ÒÚ´ó¹Ø£¬£¬£¬£¬£¬£¬£¬¹²1.123Òڴι¥»÷£¬£¬£¬£¬£¬£¬£¬Í¬±ÈÔöÌí87%¡£¡£¡£¡£¡£¼ÓÃÜÐ®ÖÆ¹¥»÷Ϊ1.393ÒڴΣ¬£¬£¬£¬£¬£¬£¬±È2021ÄêÔöÌíÁË43%¡£¡£¡£¡£¡£È¥Äê·¢Ã÷ÁË465501¸öеĶñÒâÈí¼þ±äÌ壬£¬£¬£¬£¬£¬£¬Æ½¾ùÌìÌì1279¸ö¡£¡£¡£¡£¡£
https://www.sonicwall.com/2023-cyber-threat-report/