CloudflareÈÕÖ¾·þÎñÑÏÖØÖжÏ£¬³¬°ëÊýÈÕÖ¾Êý¾ÝÓÀ¾Ã¶ªÊ§

Ðû²¼Ê±¼ä 2024-11-28

1. CloudflareÈÕÖ¾·þÎñÑÏÖØÖжÏ£¬³¬°ëÊýÈÕÖ¾Êý¾ÝÓÀ¾Ã¶ªÊ§


11ÔÂ27ÈÕ£¬»¥ÁªÍø»ù´¡ÉèÊ©¾ÞÍ·CloudflareÔÚ11ÔÂ14ÈÕÔâÓöÁËÒ»´ÎÑÏÖصķþÎñÖжÏ£¬µ¼ÖÂÁè¼ÝÒ»°ëµÄÈÕÖ¾Êý¾ÝÓÀ¾Ã¶ªÊ§¡£´Ë´ÎʹÊÔ´ÓÚÒ»´ÎÈí¼þ¸üзºÆð¹ÊÕÏ£¬Ê¹CloudflareµÄÈÕÖ¾·þÎṉ̃»¾3.5Сʱ£¬ÎÞ·¨Îª¿Í»§ÌṩҪº¦Êý¾Ý¡£ÈÕÖ¾·þÎñ¶ÔÍøÂçÔËÓªÖÁ¹ØÖØÒª£¬Äܹ»×ÊÖúÆóÒµ·ÖÎöÁ÷Á¿Ä£Ê½¡¢½â¾öÎÊÌâ²¢¼ì²â¶ñÒâ»î¶¯¡£¶øCloudflareµÄÈÕÖ¾·þÎñÒÀÀµÃûΪLogpushµÄ¹¤¾ßÀ´´¦Öò¢Í¨±¨´óÁ¿Êý¾Ý¡£²»ÐÒµÄÊÇ£¬µ±ÈÕµÄLogpush¸üÐÂÖдæÔÚÑÏÖØ´íÎ󣬵¼ÖÂÊÕ¼¯µ½µÄÈÕ־δ±»Õýȷת·¢²¢×îÖÕ±»ÓÀ¾Ãɾ³ý¡£CloudflareÔÚ³ÂËßÖÐÖ¸³ö£¬´íÎóÅäÖõ¼ÖÂÁËϵͳµÄ¼¶Áª¹ýÔØ£¬Èç¹ûÄܹ»ÕýÈ·ÅäÖ㬼´¿ÉÖÆÖ¹ÈÕÖ¾¶ªÊ§¡£¾¡¹Ü¹¤³ÌʦѸËÙ·¢ÏÖÎÊÌâ²¢»Ø¹öÁ˸üУ¬µ«´Ë¾ÙÒý·¢ÁËÁ¬Ëø¹ÊÕÏ£¬´óÁ¿ÈÕÖ¾Êý¾ÝÓ¿Èëϵͳ£¬°üÂÞδÅäÖÃLogpushµÄÓû§Êý¾Ý£¬¼Ó¾çÁËÎÊÌâ¡£CloudflareÒѶԴ˴ÎʼþºÍÊý¾Ý¶ªÊ§ÖÂǸ£¬²¢ÔÊÐíÖƶ¨Ô¤·À´ëÊ©ÖÆÖ¹ÀàËÆʼþÔٴη¢Éú£¬µ«Ä¿Ç°ÕâЩ´ëÊ©ÈÔÔÚÖƶ¨ÖС£


https://securityonline.info/cloudflare-logs-suffer-critical-failure-losing-55-of-user-data/


2. ÐÂÐÍÐÅÓÿ¨µÁË¢¶ñÒâÈí¼þ¹¥»÷MagentoÍøÕ¾


11ÔÂ28ÈÕ£¬½üÆÚ£¬Ò»ÖÖÐÂÐÍÐÅÓÿ¨µÁË¢¶ñÒâÈí¼þÕë¶Ô Magento µç×ÓÉÌÎñÍøÕ¾Ìᳫ¹¥»÷£¬¸Ã¶ñÒâÈí¼þÄÜÔÚ½áÕËÒ³Ã涯̬ÇÔÈ¡¸¶¿îÐÅÏ¢¡£ÕâÒ»·¢ÏÖÓÉÍøÂçÄþ¾²¹«Ë¾ Sucuri µÄÑо¿ÈËÔ± Weston Henry ÔÚºÚÉ«ÐÇÆÚÎåǰϦ½Ò¶¡£¶ñÒâÈí¼þÒÔ JavaScript ×¢ÈëÐÎʽ´æÔÚ£¬¾ßÓжà¸ö±äÌ壬ͨ¹ý´´½¨Ðé¼ÙÐÅÓÿ¨±íµ¥»òÖ±½ÓÌáÈ¡Ö§¸¶×Ö¶ÎÊý¾ÝÁ½ÖÖ·½Ê½ÇÔÈ¡ÐÅÏ¢¡£Æ䶯̬ҪÁìºÍ¼ÓÃÜ»úÖÆÔö¼ÓÁ˼ì²âÄѶÈ£¬Êý¾Ý±»¼ÓÃܺóй¶ÖÁ¹¥»÷Õß¿ØÖƵÄÔ¶³Ì·þÎñÆ÷¡£Magento ÍøÕ¾Òò¹ã·ºÊ¹ÓÃÇÒ´¦ÖÃÃô¸Ð¿Í»§Êý¾Ý¶ø³ÉΪÍøÂç·¸×ï·Ö×ÓÄ¿±ê¡£´Ë´Î¹¥»÷ÖУ¬¶ñÒâ½Å±¾±»Òþ²ØÔÚ XML ÎļþµÄÌض¨Ö¸ÁîÄÚ£¬ÄÚÈݱ»»ìÏýÒÔÖÆÖ¹±»·¢ÏÖ£¬½öÔÚ°üÂÞ¡°checkout¡±¶ø²»º¬¡°cart¡±µÄ URL Ò³ÃæÉϼ¤»î£¬ÒÔÌáÈ¡ÐÅÓÿ¨ÐÅÏ¢¡£Ëæºó£¬¸Ã¶ñÒâÈí¼þ»¹Í¨¹ý Magento API ÊÕ¼¯Óû§µÄÆäËûÊý¾Ý¡£¹¥»÷ÕßʹÓöàÖÖ·´¼ì²â¼¼ÊõÒþ²Ø»î¶¯£¬°üÂÞ½«Êý¾Ý¼ÓÃÜ¡¢±àÂ룬²¢Í¨¹ýÐű꼼ÊõÒþÃØ´«ÊäÖÁÔ¶³Ì·þÎñÆ÷¡£Îª±£»¤µç×ÓÉÌÎñÍøÕ¾ÃâÊÜ´ËÀ๥»÷£¬Sucuri¸ø³öÁËÏà¹Ø½¨Òé¡£


https://www.darkreading.com/application-security/sneaky-skimmer-malware-magento-sites-black-friday


3. »ô²©¿ÏÊÐÔâÀÕË÷Èí¼þ¹¥»÷£¬Õþ¸®°ì¹«Êҹرղ¢Ô¤¾¯·þÎñÖжÏ


11ÔÂ28ÈÕ£¬»ô²©¿ÏÊÐÔÚ27ÈÕÁ賿ÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÕþ¸®°ì¹«ÊÒ±»ÆȹرÕ£¬²¢Òý·¢ÁËһϵÁзþÎñºÍ»î¶¯µÄÖжÏ¡£¹ÙÔ±ÃÇѸËÙͨ¹ýÊÐÕþ¸®ÍøÕ¾ºÍÉ罻ýÌåÏòµ±µØ¾ÓÃñ·¢³ö¾¯¸æ£¬Ö¸³ö¸Ð¶÷½Ú¼ÙÆÚǰϦ½«·ºÆðÍ£µçºÍ·þÎñÖжϵÄÇé¿ö¡£ÊÐÕþÌü¡¢ÊÐÕþ·¨ÔººÍ½ÖµÀÇåɨÊÂÇ鱻ȡÏû£¬µ«Í£³µÖ´·¨ÊÂÇéÈÔÔÚ¼ÌÐø¡£¾¡¹ÜÈç´Ë£¬À¬»øÊÕ¼¯ºÍÓéÀֻÈÔ°´¼Æ»®½øÐС£»ô²©¿Ï¾¯²ì¾ÖÕýÔÚÓëÊÐÕþ¸®ºÍIT²¿ÃźÏ×÷£¬ÊÓ²ì´Ë´ÎÏ®»÷ʼþ£¬²¢Ñ°ÕÒ×î¼ÑµÄÄþ¾²»Ö¸´·þÎñÒªÁ졣ĿǰÉÐδÓÐÈκÎÀÕË÷Èí¼þÍÅ»ïÈϿɶԴ˴ι¥»÷ÂôÁ¦¡£»ô²©¿ÏÊÐ×÷ΪÐÂÔóÎ÷ÖݵÄÒ»¸öÖØÒª¶¼ÊУ¬½üÄêÀ´¸ÃÖÝÒÑÓжàËù»ú¹¹ÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬°üÂÞÐÂÔóÎ÷¶¼ÊдóѧÔÚ7ÔÂÔâµ½µÄRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷¡£


https://therecord.media/hoboken-closes-city-hall-ransomware


4. GodLoader¶ñÒâÈí¼þÀûÓÃGodotÓÎÏ·ÒýÇæÌӱܼì²âѬȾÉÏÍòϵͳ


11ÔÂ27ÈÕ£¬ºÚ¿ÍÀûÓÃеÄGodLoader¶ñÒâÈí¼þ£¬Í¨¹ý¹ã·ºÊ¹ÓõÄGodotÓÎÏ·ÒýÇæµÄ¹¦Ð§À´Ìӱܼì²âϵͳ£¬²¢Ôڶ̶ÌÈý¸öÔÂÄÚѬȾÁËÁè¼Ý17,000¸öϵͳ¡£¸Ã¶ñÒâÈí¼þÄܹ»¹¥»÷ËùÓÐÖ÷Ҫƽ̨µÄÓÎÏ·Íæ¼Ò£¬²¢ÀûÓÃGodotµÄÁé»îÐÔºÍGDScript½Å±¾ÓïÑÔ¹¦Ð§Ö´ÐÐÈÎÒâ´úÂë¡£Ò»µ©¼ÓÔØ£¬¶ñÒâÎļþ¾Í»áÔÚÊܺ¦ÕßÉ豸ÉÏ´¥·¢¶ñÒâ´úÂ룬ʹ¹¥»÷ÕßÄܹ»ÇÔȡƾ¾Ý»òÏÂÔØÆäËûÓÐЧ¸ºÔØ£¬ÈçXMRig¼ÓÃÜÍÚ¿ó·¨Ê½¡£¹¥»÷Õßͨ¹ýStargazers Ghost NetworkÁ÷´«GodLoader£¬ÕâÊÇÒ»ÖÖ¶ñÒâÈí¼þ·Ö·¢¼´·þÎñ£¨DaaS£©£¬ÀûÓÿ´ËƺϷ¨µÄGitHub´æ´¢¿âÑÚ¸ÇÆä»î¶¯¡£ÔÚÕû¸ö¹¥»÷»î¶¯ÖУ¬Check Point¼ì²âµ½Á˶ನÕë¶Ô¿ª·¢ÈËÔ±ºÍÓÎÏ·Íæ¼ÒµÄ¶ÀÁ¢¹¥»÷¡£ËäȻֻ·¢ÏÖÁËÕë¶ÔWindowsϵͳµÄGodLoaderÑù±¾£¬µ«Ñо¿ÈËÔ±»¹¿ª·¢ÁËGDScript¿´·¨Ñé֤©¶´´úÂ룬չʾÁ˸öñÒâÈí¼þ¿ÉÒÔÇáËɹ¥»÷LinuxºÍmacOSϵͳ¡£Godot Engineά»¤ÕßÌåÏÖ£¬¸Ã©¶´²¢·ÇGodotËùÌØÓУ¬ÃãÀøÈËÃÇÖ»Ö´ÐÐÀ´×Ô¿ÉÐÅÀ´Ô´µÄÈí¼þ¡£


https://www.bleepingcomputer.com/news/security/new-godloader-malware-infects-thousands-of-gamers-using-godot-scripts/


5. ProjectSendÉí·ÝÑé֤©¶´Ö·þÎñÆ÷ÃæÁÙÔ¶³Ì·ÃÎÊÍþв


11ÔÂ27ÈÕ£¬ÍþвÐÐΪÕßÕýÔÚÀûÓÃProjectSendÖеÄÑÏÖØÉí·ÝÑéÖ¤Èƹý©¶´£¨CVE-2024-11680£©À´»ñÈ¡·þÎñÆ÷µÄÔ¶³Ì·ÃÎÊȨÏÞ¡£¸Ã©¶´Ó°ÏìProjectSend r1720֮ǰµÄ°æ±¾£¬ÔÊÐí¹¥»÷Õßͨ¹ý·¢ËÍÌØÖÆHTTPÇëÇó¸ü¸ÄÓ¦Ó÷¨Ê½ÅäÖ᣾¡¹Ü¸Ã©¶´ÒÑÓÚ2023Äê5ÔÂÐÞ¸´£¬µ«Ö±µ½×î½ü²Å±»·ÖÅäCVE±àºÅ£¬µ¼ÖÂÓû§Î´¼°Ê±¸üС£¾ÝVulnCheck³Æ£¬99%µÄProjectSendʵÀýÈÔÔÚÔËÐдæÔÚ©¶´µÄ°æ±¾¡£ProjectSendÊÇÒ»¸öÁ÷ÐеĿªÔ´Îļþ¹²ÏíÍøÂçÓ¦Ó÷¨Ê½£¬±»Ðí¶à×éÖ¯ÓÃÓÚÄþ¾²¡¢Ë½ÃܵÄÎļþ´«Êä¡£Censys³ÂË߳ƣ¬Ô¼ÓÐ4000¸öÔÚÏßʵÀý£¬ÆäÖдó¶àÊý´æÔÚ©¶´¡£×Ô2024Äê9ÔÂMetasploitºÍNucleiÐû²¼¹ûȻ©¶´ÀûÓÃÒÔÀ´£¬¹¥»÷»î¶¯ÓÐËùÔö¼Ó¡£VulnCheck·¢ÏÖ£¬¹¥»÷Õß²»½öÀûÓ鶴»ñȡδ¾­ÊÚȨµÄ·ÃÎÊ£¬»¹¸ü¸ÄϵͳÉèÖᢲ¿ÊðwebshellÒÔ¿ØÖÆÊÜѬȾ·þÎñÆ÷¡£GreyNoiseÁгöÁËÓë´Ë»î¶¯Ïà¹ØµÄ121¸öIP£¬±íÃ÷ÕâÊÇÒ»´Î¹ã·ºÊµÑé¡£VulnCheck¾¯¸æ³Æ£¬Webshell´æ´¢ÔÚÌض¨Ä¿Â¼ÖУ¬¿ÉÖ±½Óͨ¹ýÍøÂç·þÎñÆ÷·ÃÎÊ£¬±íÃ÷´æÔÚÖ÷¶¯¹¥»÷¡£Ñо¿ÈËԱǿµ÷£¬¾¡¿ìÉý¼¶µ½ProjectSend°æ±¾r1750ÖÁ¹ØÖØÒª£¬ÒÔ·À·¶¹ã·ºÁ÷´«µÄ¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-projectsend-flaw-to-backdoor-exposed-servers/


6. SL Data ServicesÊý¾Ý¿âÔâй¶£¬60ÓàÍòÃô¸ÐÎļþÆعâ


11ÔÂ27ÈÕ£¬¾ÝÄþ¾²Ñо¿ÈËÔ±±¨µÀ£¬Êý¾Ý¾­¼Í¹«Ë¾SL Data ServicesµÄÒ»¸öδÊÜÃÜÂë±£»¤µÄAmazon S3´æ´¢Í°ÖУ¬Ì»Â¶ÁËÁè¼Ý600,000¸öÃô¸ÐÎļþ£¬°üÂÞÊýǧÈ˵ķ¸×ïÀúÊ·¡¢Åä¾°ÊӲ졢³µÁ¾ºÍ¹¤Òµ¼Ç¼µÈ¸öÈËÐÅÏ¢¡£ÕâЩÎļþ×ܾÞϸΪ713.1 GB£¬ÇÒδ¼ÓÃÜ¡£ÐÅÏ¢Äþ¾²×¨¼ÒJeremiah FowlerÔÚ10Ô·ݷ¢ÏÖ´ËÎÊÌâºó£¬¶à´Îͨ¹ýµç»°ºÍµç×ÓÓʼþÏòÊý¾ÝÊÕ¼¯¹«Ë¾³ÂËߣ¬µ«Î´ÊÕµ½»Ø¸´¡£¾¡¹Ü×îÖÕ¸ÃÐÅÏ¢·þÎñÌṩÉ̹رÕÁËS3´æ´¢Í°£¬µ«ÒÑ̻¶µÄÐÅÏ¢¿ÉÄܻᱻÓÃÓÚÍøÂçµöÓãºÍÉç»á¹¤³Ì¹¥»÷µÈ¶ñÒâÐÐΪ¡£SL Data ServicesÉù³ÆÌṩ¹¤Òµ³ÂËߵȷþÎñ£¬µ«Fowler·¢Ïָù«Ë¾ËƺõÔËÓª×ÅÖÁÉÙ16¸ö²îÒìµÄÍøÕ¾£¬Ìṩ°üÂÞ·¸×ï¼Ç¼¼ì²é¡¢»ú¶¯³µ¹ÜÀí²¿ÃżÇ¼µÈһϵÁÐÊý¾Ý¡£Ëû½¨Òé×é֯ʹÓÃËæ»úÇÒÉ¢ÁеÄΨһ±êʶ·ûÃüÃûÎļþ£¬²¢¼à¿Ø·ÃÎÊÈÕÖ¾ÒÔʶ±ðÒ쳣ģʽ£¬Í¬Ê±Ê¹ÓÃÃÜÂëºÍ¼ÓÃܱ£»¤Ãô¸ÐÊý¾Ý¡£


https://www.theregister.com/2024/11/27/600k_sensitive_files_exposed/