AnimkerÊý¾Ý¿âÉèÖùýʧÁè¼Ý70ÍòÓû§µÄÐÅϢй¶
Ðû²¼Ê±¼ä 2023-03-021¡¢AnimkerÊý¾Ý¿âÉèÖùýʧÁè¼Ý70ÍòÓû§µÄÐÅϢй¶
¾Ý3ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚShodanÉÏ·¢Ã÷ÁËÒ»¸öÉèÖùýʧµÄÊý¾Ý¿â£¬£¬£¬£¬Ð¹Â¶ÁËgetshow.ioºÍanimaker.comÍøÕ¾Áè¼Ý700000Óû§µÄ²âÊÔºÍСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£Getshow.ioÊôÓÚAnimker.com£¬£¬£¬£¬ÓÐÎÊÌâµÄЧÀÍÆ÷×¢²áÔÚÓòÃûgetshow.ioÏ£¬£¬£¬£¬ÓÉanimaker.comÖÎÀí¡£¡£¡£¸ÃÊý¾Ý¿âÏÖÔÚ°üÀ¨5.3GBµÄÊý¾Ý£¬£¬£¬£¬²¢ÇÒËæ×ÅÌìÌìÐÂÌí¼ÓµÄÊý¾ÝÔÚÒ»Ö±ÔöÌí£¬£¬£¬£¬Éæ¼°Óû§ÐÕÃû¡¢×°±¸ÀàÐÍ¡¢IPµØµãºÍÊÖ»úºÅÂëµÈ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬AnimkerÒÑ»ñÖª´ËÊ£¬£¬£¬£¬µ«ÈÔδ¾ÙÐлØÓ¦¡£¡£¡£
https://www.hackread.com/video-marketing-software-animker-data-leak/
2¡¢Aruba Networks¸üÐÂÐÞ¸´ÆäArubaOSÖеÄ6¸öÎó²î
ýÌå3ÔÂ1ÈÕ±¨µÀ³Æ£¬£¬£¬£¬Aruba NetworksÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´ÁËÓ°ÏìÆäרÓÐÍøÂç²Ù×÷ϵͳArubaOS¶à¸ö°æ±¾µÄ6¸öÎó²î¡£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²î¿ÉÒÔ·ÖΪÁ½ÀࣺPAPIÐÒ飨Aruba Networks½ÓÈëµãÖÎÀíÐÒ飩ÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2023-22747¡¢CVE-2023-22748¡¢CVE-2023-22749ºÍCVE-2023-22750£©ºÍ»ùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öÎó²î£¨CVE-2023-22751ºÍCVE-2023-22752£©¡£¡£¡£ËüÃǵÄCVSSÆÀ·Ö¾ùΪ9.8£¬£¬£¬£¬¿Éͨ¹ýUDP¶Ë¿Ú8211ÏòPAPI·¢ËÍÌØÖÆÊý¾Ý°üÀ´Ê¹Ó㬣¬£¬£¬´Ó¶øÒÔÌØÈ¨Óû§Éí·ÝÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
https://www.bleepingcomputer.com/news/security/aruba-networks-fixes-six-critical-vulnerabilities-in-arubaos/
3¡¢Sysdig·¢Ã÷Ö÷ÒªÕë¶ÔÔÆÇéÐεÄSCARLETEEL¹¥»÷»î¶¯
SysdigÔÚ2ÔÂ28ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸öÃûΪSCARLETEELµÄ¹¥»÷»î¶¯¡£¡£¡£¹¥»÷ʼÓÚ»ñµÃÍйÜÔÚAWSÉϵÄKubernetes¼¯ÈºµÄÃæÏò¹«ÖÚµÄЧÀ͵ijõʼ»á¼ûȨÏÞ£¬£¬£¬£¬Àֳɺ󹥻÷Õ߾ͻáÏÂÔØÒ»¸öXMRig coinminerºÍÒ»¸ö¾ç±¾£¬£¬£¬£¬ÓÃÓÚ´ÓKubernetes podÖÐÇÔÈ¡ÕÊ»§Æ¾Ö¤¡£¡£¡£¹¥»÷Õß»áʹÓÃLambdaº¯Êýö¾ÙºÍ¼ìË÷ËùÓÐרÓдúÂëºÍÈí¼þ£¬£¬£¬£¬ÒÔ¼°ÆäÖ´ÐÐÃÜÔ¿ºÍLambdaº¯ÊýÇéÐαäÁ¿£¬£¬£¬£¬ÒÔÕÒµ½IAMÓû§Æ¾Ö¤¡£¡£¡£SysdigÒÔΪ¼ÓÃÜÐ®ÖÆ¹¥»÷±»ÓÃ×÷ÓÕ¶ü£¬£¬£¬£¬Ö¼ÔÚµÖ´ï¹¥»÷ÕßµÄÕæÕýÄ¿µÄ£¬£¬£¬£¬¼´ÍµÈ¡×¨ÓÐÈí¼þ¡£¡£¡£
https://sysdig.com/blog/cloud-breach-terraform-data-theft/
4¡¢Blind Eagleð³äÕþ¸®Ë°Îñ»ú¹¹Õë¶Ô¸çÂ×±ÈÑǵĻú¹¹
2ÔÂ27ÈÕ£¬£¬£¬£¬BlackberryÅû¶ÁËBlind EagleÕë¶Ô¸çÂ×±ÈÑÇÒªº¦ÐÐÒµµÄÐÂÒ»ÂÖ¹¥»÷»î¶¯¡£¡£¡£BlackberryÓÚ2ÔÂ20ÈÕ¼ì²âµ½´Ë´Î¹¥»÷»î¶¯£¬£¬£¬£¬¹¥»÷Õßð³äÕþ¸®Ë°Îñ»ú¹¹¹ú¼Ò˰ÎñºÍº£¹Ø×ÜÊð(DIAN)£¬£¬£¬£¬Ö÷ÒªÕë¶Ô¸çÂ×±ÈÑǵÄÎÀÉú¡¢½ðÈÚ¡¢Ö´·¨¡¢ÒÆÃñºÍÈÏÕæÌ¸ÅеĻú¹¹¡£¡£¡£´¹ÂÚÓʼþ´øÓÐÒ»¸öÖ¸ÏòPDFÎļþµÄÁ´½Ó£¬£¬£¬£¬¸ÃÎļþ¾Ý³ÆÍйÜÔÚDIANÍøÕ¾ÉÏ£¬£¬£¬£¬ÏÖʵÉÏ»á×°ÖöñÒâÈí¼þ¡£¡£¡£PayloadÊÇÒ»¸ö»ìÏýµÄVBS£¬£¬£¬£¬ËüʹÓÃPowerShell¼ìË÷»ùÓÚ.NETµÄDLLÎļþ£¬£¬£¬£¬×îÖÕ½«AsyncRAT¼ÓÔØµ½ÄÚ´æÖС£¡£¡£
https://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia
5¡¢FortiGuardÅû¶LockBitÐÂÒ»ÂÖ¹¥»÷µÄѬȾÁ´ºÍTTP
FortiGuardÓÚ2ÔÂ28ÈÕÐû²¼±¨¸æÏêÊöÁËLockBitÐÂÒ»ÂÖÀÕË÷¹¥»÷µÄѬȾÁ´ºÍTTP¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2022Äê12ÔºÍ2023Äê1Ô·¢Ã÷LockBitµÄ»î¶¯£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÄ«Î÷¸çºÍÎ÷°àÑÀµÄ×ÉѯºÍÖ´·¨ÐÐÒµµÄ¹«Ë¾¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃÁË¿ÉÓÐÓöԿ¹AVºÍEDR½â¾ö¼Æ»®µÄ·½·¨£¬£¬£¬£¬Í¨¹ý.imgÈÝÆ÷·Ö·¢ÈƹýÁËWeb±ê¼Ç(MOTW)±£»£»£»£»£»¤»úÖÆ£¬£¬£¬£¬¶à½×¶Î¾ç±¾ÌáÈ¡ÊÜÃÜÂë±£»£»£»£»£»¤µÄÀÕË÷Èí¼þ¿ÉÖ´ÐÐÎļþ£¨Ö»ÓÐÔÚʹÓÃÆæÒìÃÜÂëÔËÐÐʱ²Å»á±»½âѹ£©¿ÉÈÆ¹ý»ùÓÚÊðÃûµÄ¼ì²â¡£¡£¡£VirusTotalÖÐÑù±¾µÄ¼ì²âÂʺܵͣ¬£¬£¬£¬Åú×¢¸Ã»î¶¯Ê¹ÓõÄÒªÁìÔÚ¼ì²âÈÆ¹ý·½ÃæÊÇÓÐÓõġ£¡£¡£
https://www.fortinet.com/blog/threat-research/emerging-lockbit-campaign
6¡¢SonicWallÐû²¼2023ÄêÍøÂçÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ
ýÌå2ÔÂ28Èճƣ¬£¬£¬£¬SonicWallÐû²¼ÁË2023ÄêÍøÂçÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬SonicWallÔÚ2022Äê×ܹ²¼Í¼ÁË55ÒڴζñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬Í¬±ÈÔöÌí2%¡£¡£¡£ÀÕË÷Èí¼þÔÚ2022Äê¼ÌÐøÏ½µ£¬£¬£¬£¬ÊýĿϽµÖÁ4.933ÒÚ£¬£¬£¬£¬Í¬±ÈϽµ21%¡£¡£¡£ÎïÁªÍø¶ñÒâÈí¼þÊýÄ¿ÔÚ´ó·ùÔ¾Éý£¬£¬£¬£¬Ê×´ÎÍ»ÆÆ1ÒÚ´ó¹Ø£¬£¬£¬£¬¹²1.123Òڴι¥»÷£¬£¬£¬£¬Í¬±ÈÔöÌí87%¡£¡£¡£¼ÓÃÜÐ®ÖÆ¹¥»÷Ϊ1.393ÒڴΣ¬£¬£¬£¬±È2021ÄêÔöÌíÁË43%¡£¡£¡£È¥Äê·¢Ã÷ÁË465501¸öеĶñÒâÈí¼þ±äÌ壬£¬£¬£¬Æ½¾ùÌìÌì1279¸ö¡£¡£¡£
https://www.sonicwall.com/2023-cyber-threat-report/


¾©¹«Íø°²±¸11010802024551ºÅ