Atlassian¸üÐÂÐÞ¸´ÆäCrowdºÍBitbucketÖеÄ©¶´

Ðû²¼Ê±¼ä 2022-11-21
1¡¢AtlassianÐû²¼¸üÐÂÐÞ¸´ÆäCrowdºÍBitbucketÖеÄ©¶´

¾ÝýÌå11ÔÂ18ÈÕ±¨µÀ£¬AtlassianÐû²¼¸üУ¬ÒÔÐÞ¸´Æä¼¯ÖÐʽÉí·Ý¹ÜÀíÆ½Ì¨Crowd Server and Data Center,ÒÔ¼°Git´æ´¢¿â¹ÜÀí½â¾ö·½°¸Bitbucket Server and Data CenterÖеÄ©¶´¡£ÆäÖÐÖ®Ò»ÊÇÃüÁî×¢Èë©¶´£¨CVE-2022-43781£©£¬¾ßÓпØÖÆÆäÓû§ÃûȨÏ޵Ĺ¥»÷ÕßÔÚÌØ¶¨Ìõ¼þÏ¿ÉÔÚÄ¿±êϵͳÉÏÖ´ÐдúÂë¡£ÁíÒ»¸öÊÇÄþ¾²ÅäÖôíÎóÎÊÌ⣨CVE-2022-43782£©£¬¹¥»÷Õß¿ÉÔÚÈÏ֤ΪCrowdÓ¦Ó÷¨Ê½Ê±ÈƹýÃÜÂë¼ì²é£¬²¢µ÷ÓÃÓÐÌØÈ¨µÄAPI¶Ëµã¡£

https://securityaffairs.co/wordpress/138716/security/atlassian-critical-flaws-crowd-bitbucket.html

2¡¢Earth PretaÀûÓÃGoogle DriveµöÓã¹¥»÷È«ÇòÕþ¸®×éÖ¯

TrendMicroÔÚ11ÔÂ18ÈÕÅû¶ÁËEarth PretaÕë¶ÔÈ«ÇòµÄÓã²æÊ½µöÓã¹¥»÷¡£´Ë´Î´ó¹æÄ£»î¶¯Ê¼ÓÚ½ñÄê3ÔÂ×óÓÒ£¬Éæ¼°Ãåµé¡¢°Ä´óÀûÑÇ¡¢·ÆÂɱö¡¢ÈÕ±¾ºÍÖйų́ÍåµÈµØ¡£Earth PretaÀûÓÃÁËÐé¼ÙµÄGoogleÕÊ»§£¬Í¨¹ýµöÓãÓʼþ·Ö·¢¶ñÒâÈí¼þ¡£Ëü×î³õ´æ´¢ÔÚ´æµµÎļþ£¨ÀýÈç rar/zip/jar£©ÖУ¬²¢Í¨¹ýGoogle DriveÁ´½Ó·Ö·¢¡£´ËÍ⣬¹¥»÷Õß»¹ÀûÓøïеÄÈÆ¹ý¼ì²âºÍ·ÖÎöµÄ¼¼Êõ£¬ÀýÈç´úÂë»ìÏýºÍ×Ô½ç˵Òì³£´¦Ö÷¨Ê½£¬À´·Ö·¢¶¨ÖƵĶñÒâÈí¼þϵÁУ¬ÈçTONEINS¡¢TONESHELLºÍPUBLOAD¡£

https://www.trendmicro.com/en_us/research/22/k/earth-preta-spear-phishing-governments-worldwide.html

3¡¢Ä³ÅäÖôíÎóµÄES·þÎñÆ÷й¶15ÍòÌõMastodonÓû§ÐÅÏ¢

ýÌå11ÔÂ18Èճƣ¬Ñо¿ÍŶӷ¢ÏÖijÅäÖôíÎóµÄElasticsearch·þÎñÆ÷й¶ÁËÁè¼Ý15ÍòÌõMastodonÓû§µÄÐÅÏ¢¡£Ñо¿ÈËÔ±ÓÚ2022Äê11ÔÂ15ÈÕ¼ì²âµ½¸Ã·þÎñÆ÷£¬µ«Éв»Çå³þËü¼Ç¼Óû§ÐÅÏ¢µÄʱ¼äÓж೤¡£ÖµµÃ×¢ÒâµÄÊÇ£¬¸Ã·þÎñÆ÷ÊôÓÚµÚÈý·½¶ø²»ÊÇMastodon¹Ù·½£¬Ö¼ÔÚ´ÓMastodonÓû§ÄÇÀïץȡÐÅÏ¢¡£Ð¹Â¶ÐÅÏ¢°üÂÞÕÊ»§Ãû³Æ¡¢¸öÈË×ÊÁÏͼƬ¡¢·ÛË¿ÊýºÍ¹Ø×¢ÊýµÈ£¬Ä¿Ç°ÈÔÎÞ·¨È·¶¨·þÎñÆ÷µÄËùÓÐÕß¡£

https://www.hackread.com/leaky-server-mastodon-users-data/

4¡¢CISA͸¶HiveÒÑ´Ó1300¶à¼Ò¹«Ë¾ÀÕË÷Áè¼Ý1ÒÚÃÀÔªÊê½ð

11ÔÂ18ÈÕ£¬FBI¡¢CISAºÍHHSÁªºÏÐû²¼Á˹ØÓÚHiveÀÕË÷Èí¼þµÄÄþ¾²×Éѯ¡£Æ¾¾ÝFBIµÄÐÅÏ¢£¬½ØÖÁ2022Äê11Ô£¬HiveÒѹ¥»÷È«Çò1300¶à¸ö×éÖ¯£¬²¢ÀÖ³ÉÀÕË÷Ô¼1ÒÚÃÀÔªµÄÊê½ð¡£¹¥»÷ÕßÕë¶Ô¹ã·ºµÄÐÐÒµºÍÒªº¦»ù´¡ÉèÊ©²¿ÃÅ£¬ÀýÈçÕþ¸®×éÖ¯¡¢Í¨ÐÅ¡¢ÖÆÔì¡¢ÐÅÏ¢¼¼ÊõÒÔ¼°Ò½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú(HPH)ÐÐÒµ¡£Hiveͨ¹ýRDP¡¢VPNºÍÆäËüÔ¶³ÌÍøÂçÁ¬½ÓЭÒ飬ʹÓõ¥ÒòËØµÇ¼»ñµÃ¶ÔÄ¿±êÍøÂçµÄ³õʼ·ÃÎÊȨÏÞ¡£ÓÐʱ£¬Ëû»¹ÈƹýÁËMFA£¬²¢Í¨¹ýÀûÓó£¼û©¶´CVE-2020-12812»ñµÃ¶ÔFortiOS·þÎñÆ÷µÄ·ÃÎÊȨÏÞ¡£¸Ã×Éѯ¹ûÈ»Á˹ØÓÚHive IOCºÍTTPµÄÏêϸÐÅÏ¢¡£

https://www.cisa.gov/uscert/ncas/alerts/aa22-321a

5¡¢ÀÕË÷ÍÅ»ïDaixinÉù³Æ¶ÔÂíÀ´Î÷ÑǵÄÑǺ½¼¯ÍŵĹ¥»÷ÂôÁ¦

¾Ý11ÔÂ19ÈÕ±¨µÀ£¬ÂíÀ´Î÷Ñǵͳɱ¾º½¿Õ¹«Ë¾ÑǺ½¼¯ÍÅÔâµ½DaixinµÄ¹¥»÷¡£¹¥»÷·¢ÉúÔÚ11ÔÂ11ÈÕÖÁ12ÈÕ£¬¹¥»÷Õß³ÆÒÑÇÔÈ¡500Íò´î¿ÍºÍËùÓÐÔ±¹¤µÄ¸öÈËÐÅÏ¢¡£DaixinÌṩÁËÁ½¸öÎļþ£¬Ò»·ÝÎļþ°üÂÞÓйØÖ¸¶¨´î¿ÍµÄÐÅÏ¢£¬ÁíÒ»·Ý°üÂÞÔ±¹¤ÐÅÏ¢¡£¾Ý±¨µÀ£¬ÑǺ½ÔÚ̸ÅÐʱûÓÐʵÑéЭÉÌÊê½ð½ð¶î£¬Õâ¿ÉÄܱíÃ÷ËûÃÇ¿ÉÄÜ´Ó묒»®Ö§¸¶ÈκÎÓöÈ¡£´ËÍ⣬Daixin·¢ÑÔÈËÇ¿µ÷£¬ÔÚ¼ÓÃÜÎļþʱ£¬ÆäÈÆ¹ýÁË"XEN¡¢RHEL--·ÉÐÐÉ豸µÄÖ÷»ú£¨À×´ï¡¢¿ÕÖн»Í¨¹ÜÖÆµÈ£©"¡£DaixinÔøÉùÃ÷£¬Èç¹û½á¹û¿ÉÄÜΣ¼°ÉúÃü£¬ËûÃǽ«ÖÆÖ¹¼ÓÃÜ»òÏú»ÙÈκι¤¾ß¡£

https://www.databreaches.net/airasia-victim-of-ransomware-attack-passenger-and-employee-data-acquired/

6¡¢CiscoÐû²¼¹ØÓÚÔÚÒ°·¢ÏÖµÄLodaRATбäÌåµÄ·ÖÎö³ÂËß

11ÔÂ17ÈÕ£¬Cisco TalosÐû²¼Á˹ØÓÚLodaRATбäÌåµÄ·ÖÎö³ÂËß¡£Ñо¿ÈËÔ±ÔÚ2022ÄêÆÚ¼ä¶ÔLodaRAT¶ñÒâÈí¼þ½øÐмà²â£¬ÔÚ½üÆÚ·¢ÏÖÁËËüÓëÆäËü¶ñÒâÈí¼þ£¨°üÂÞRedLineºÍNeshta£©Ò»Æð·Ö·¢µÄа汾¡£LodaRATÊÇÓÃAutoIt¿ª·¢µÄ£¬Í¨³£»áÀûÓú¯Êý»ìÏýÒÔ¼°×Ö·û´®±àÂëÀ´Èƹý·ÖÎö¡£´ËÍ⣬а汾һ¸öÖØ´óµÄ¸Ä¶¯ÊÇÍêÈ«ÖØÐ´Á˼ì²â·´¶ñÒâÈí¼þ½ø³ÌµÄº¯Êý£¬Ðº¯ÊýËÑË÷ÈýÊ®¸ö²îÒìµÄ½ø³ÌÃû³Æ£¬¶øÔ­À´µÄ±äÌåÖ´ÐÐWMI²éѯÒÔö¾ÙËùÓÐAV½ø³Ì¡£µ«Õâ¸öк¯ÊýµÄЧ¹ûÔ¶²»Èçǰһ¸ö£¬ÒòΪ¸Ã¹¦Ð§²»»á¼ì²âδ°üÂÞÔÚÒªËÑË÷µÄ½ø³ÌÁбíÖеIJúÎï¡£

https://blog.talosintelligence.com/get-a-loda-this/