GoDaddy͸¶ÆäÔ´´úÂëй¶ÇÒ·þÎñÆ÷±»°²×°¶ñÒⷨʽ

Ðû²¼Ê±¼ä 2023-02-20
1¡¢GoDaddy͸¶ÆäÔ´´úÂëй¶ÇÒ·þÎñÆ÷±»°²×°¶ñÒⷨʽ

      

¾ÝýÌå2ÔÂ17ÈÕ±¨µÀ £¬ÍøÂçÍйܹ«Ë¾GoDaddy͸¶ £¬ÆäÔ´´úÂëй¶ÇÒ·þÎñÆ÷±»°²×°¶ñÒⷨʽ¡£GoDaddyÔÚ2022Äê12ÔÂÌåÏÖ £¬ÊÕµ½Á˲¿Ãſͻ§Í¶Ëß £¬³ÆËûÃǵÄÍøÕ¾Å¼¶û»á±»Öض¨Ïòµ½¶ñÒâÍøÕ¾¡£ºóÀ´·¢ÏÖÕâÊÇÓÉÓÚ¹¥»÷Õß»ñµÃÁËÆäcPanel»·¾³ÖÐÍйܵķþÎñÆ÷µÄ·ÃÎÊȨÏÞ £¬ÔÚÆäϵͳÉϰ²×°Á˶ñÒâÈí¼þ²¢»ñÈ¡ÁËÓëGoDaddyÄÚ²¿ÃÅ·þÎñÏà¹ØµÄ´úÂ롣ƾ¾ÝÊÓ²ì £¬GoDaddyÈÏΪÕâÊÇÒ»¸öÅÓ´óµÄÁ¬Ðø¶àÄêµÄ¹¥»÷»î¶¯µÄÒ»²¿ÃÅ £¬Ö®Ç°ÔÚ2021Äê11ÔºÍ2020Äê3ÔÂÅû¶µÄÎ¥¹æÐÐΪҲÓëÕâÓйØ¡£


https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/  


2¡¢FortinetÐû²¼Äþ¾²¸üÐÂÐÞ¸´Æä¶à¿î²úÎïÖеÄÊýÊ®¸ö©¶´

      

FortinetÔÚ2ÔÂ16ÈÕÐû²¼Äþ¾²¸üР£¬ÐÞ¸´ÁËÆäFortiNACºÍFortiWebµÈ²úÎïÖеÄ40¸ö©¶´¡£ÆäÖÐ×îÑÏÖØµÄÊÇFortiNACÍøÂç·ÃÎÊ¿ØÖƽâ¾ö·½°¸ÖеÄÎļþÃû»ò·¾¶µÄÍⲿ¿É¿ØÖÆÂ©¶´£¨CVE-2022-39952£© £¬CVSSÆÀ·ÖΪ9.8 £¬¹¥»÷Õß¿ÉÓÃÆäÔÚϵͳÉÏÖ´ÐÐÈÎÒâдÈë¡£Æä´ÎÊÇFortiWebÊðÀíÊØ»¤·¨Ê½ÖеĻùÓÚ¶ÑÕ»µÄ»º³åÇøÒç³ö©¶´£¨CVE-2021-42756£© £¬CVSSÆÀ·ÖΪ9.3 £¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓÃÆäͨ¹ýÌØÖÆµÄHTTPÇëÇóÖ´ÐÐÈÎÒâ´úÂë¡£


https://thehackernews.com/2023/02/fortinet-issues-patches-for-40-flaws.html


3¡¢¶þάÂëÉú³ÉÍøÕ¾MyQRcodeÅäÖôíÎóй¶Áè¼Ý128 GBÊý¾Ý

      

ýÌå2ÔÂ19ÈÕ³Æ £¬Á÷ÐеĶþάÂëÉú³ÉÍøÕ¾MyQRcodeй¶ÁËÆäÓû§µÄ¸öÈËÊý¾Ý¡£Ñо¿ÈËÔ±ÔÚËÑË÷ÅäÖôíÎóµÄÔÆÊý¾Ý¿âʱÔÚShodanÉÏ·¢ÏÖÁ˸÷þÎñÆ÷ £¬Ëüй¶ÁËÁè¼Ý128 GBµÄÊý¾Ý £¬ÆäÖаüÂÞ66000ÃûÓû§µÄ¸öÈËÐÅÏ¢¡£ÕâÊÇÓÉÅäÖôíÎóµ¼Ö嵀 £¬¹«ÖÚ¿ÉÒÔÔÚûÓÐÈκÎÄþ¾²Éí·ÝÑéÖ¤»òÃÜÂëµÄÇé¿öϹûÈ»·ÃÎÊ´Ë·þÎñÆ÷¡£´ËÍâ £¬Ð¹Â¶Ê¼þʼÓÚ2ÔÂ4ÈÕ £¬ÏÖÔÚÿÌì¶¼ÔÚÖ÷¶¯¸üÐÂеļǼ £¬Õâ±íÃ÷й¶ÈÔÔÚ½øÐÐÖС£


https://www.hackread.com/qr-code-generator-my-qr-code-data-leak/


4¡¢Symantec·¢ÏÖÐÂFrebniisÀûÓÃMicrosoft IISµÄ»î¶¯

      

SymantecÔÚ2ÔÂ16ÈÕ³ÆÆä·¢ÏÖÁËжñÒâÈí¼þFrebniisÀûÓÃMicrosoft IIS¹¦Ð§½¨Á¢ºóÃŵĻ¡£FrebniisÀûÓÃÁËÒ»¸öÃûΪʧ°ÜÇëÇóʼþ»º³å(FREB)µÄIIS¹¦Ð§ £¬½«¶ñÒâ´úÂë×¢Èëµ½¿ØÖÆ FREB£¨¡°iisfreb.dll¡±£©µÄDLLÎļþµÄÌØ¶¨º¯ÊýÖÐ £¬Ê¹¹¥»÷ÕßÄܹ»À¹½ØºÍ¼à¿Ø·¢Ë͵½ISS·þÎñÆ÷µÄËùÓÐHTTP POSTÇëÇó¡£×¢ÈëµÄ´úÂëÊÇÒ»¸ö.NETºóÃÅ £¬Ö§³ÖÊðÀíºÍC#´úÂëÖ´ÐÐ £¬ÎÞÐè½Ó´¥´ÅÅÌ £¬Ê¹ÆäÍêÈ«Òþ±Î¡£´ËÍâ £¬¹¥»÷ÕßÓÃÓÚ»ñÈ¡IIS·þÎñÆ÷·ÃÎÊȨÏÞµÄÒªÁìÉв»Çå³þ¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/frebniis-malware-iis


5¡¢ÐºڿÍÍÅ»ïWIP26Ö÷ÒªÕë¶ÔÖж«µÄµçÐÅ·þÎñÌṩÉÌ

      

2ÔÂ16ÈÕ £¬SentinelLabsÅû¶ÁËкڿÍÍÅ»ïWIP26Õë¶ÔÖж«µÄµçÐÅ·þÎñÌṩÉ̵Ĺ¥»÷»î¶¯¡£WIP26µÄÌØµãÊÇÀÄÓù«¹²ÔÆ»ù´¡ÉèÊ© £¬ÈçMicrosoft 365 Mail¡¢Azure¡¢Google FirebaseºÍDropbox £¬½øÐжñÒâÈí¼þ·Ö·¢¡¢Êý¾Ýй¶ºÍC2¡£´Ë´Î»î¶¯Í¨¹ýWhatsApp¾«×¼¶¨Î»Ô±¹¤ £¬ÆäÖаüÂÞÖ¸Ïò¶ñÒâÈí¼þ¼ÓÔØ·¨Ê½µÄDropboxÁ´½Ó¡£×îÖջᰲװºóÃÅCMD365ºÍCMDEmber £¬ËüÃǵÄÖ÷Òª¹¦Ð§ÊÇʹÓÃWindowsÃüÁî½âÊÍÆ÷Ö´Ðй¥»÷ÕßÌṩµÄϵͳÃüÁî¡£


https://www.sentinelone.com/labs/wip26-espionage-threat-actors-abuse-cloud-infrastructure-in-targeted-telco-attacks/


6¡¢Èí¼þ¹«Ë¾AtlassianÔ±¹¤Æ¾¾Ý±»µÁµ¼Ö²¿ÃÅÊý¾Ýй¶

      

¾Ý2ÔÂ16ÈÕ±¨µÀ £¬Èí¼þ¹«Ë¾AtlassianÔ±¹¤Æ¾¾Ý±»µÁµ¼Ö²¿ÃÅÊý¾Ýй¶¡£Cyberscoop×îÏȱ¨µÀ £¬ºÚ¿ÍSiegedSecÔÚTelegramÉÏй¶ÁË´ÓAtlassianÇÔÈ¡µÄÊý¾Ý¡£Ö®ºó £¬Check Point·ÖÎöÁ˱»µÁÊý¾Ý £¬»³Òɹ¥»÷Õß²¢Ã»ÓÐÖ±½ÓÈëÇÖAtlassian £¬¶øÊǹ¥»÷Á˵ÚÈý·½¹©Ó¦ÉÌEnvoy¡£¶øEnvoyÌåÏÖ £¬Æäϵͳ²¢Î´Ôâµ½¹¥»÷ £¬ÊÇAtlassianÔ±¹¤µÄƾ¾Ý±»µÁ £¬´Ó¶øÊ¹¹¥»÷ÕßÄܹ»·ÃÎÊ´æ´¢ÔÚEnvoyÓ¦Ó÷¨Ê½ÖеÄÊý¾Ý¡£AtlassianÊӲ췢ÏÖ £¬Ò»ÃûÔ±¹¤µÄƾ֤±»´íÎóµØÐû²¼µ½¹«¹²´æ´¢¿â £¬Òò´Ë¹¥»÷Õß¿ÉÒÔͨ¹ýÔ±¹¤ÕÊ»§·ÃÎʿɼûÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/atlassian-data-leak-caused-by-stolen-employee-credentials/