whoAMI¹¥»÷ÀûÓÃAmazon AMIÃû³Æ»ìÏýÈëÇÖAWSÕË»§
Ðû²¼Ê±¼ä 2025-02-141. whoAMI¹¥»÷ÀûÓÃAmazon AMIÃû³Æ»ìÏýÈëÇÖAWSÕË»§
2ÔÂ13ÈÕ£¬Äþ¾²Ñо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪ¡°whoAMI¡±µÄ¹¥»÷·½Ê½£¬¸Ã¹¥»÷ÔÊÐíÈκÎÐû²¼¾ßÓÐÌØ¶¨Ãû³ÆµÄAmazonϵͳӳÏñ£¨AMI£©µÄÈË·ÃÎÊAmazon Web·þÎñÕÊ»§¡£´Ë¹¥»÷ÓÉDataDogÑо¿ÈËÔ±ÓÚ2024Äê8Ô³ïı£¬Í¨¹ýÀûÓÃÈí¼þÏîÄ¿¼ìË÷AMI IDÔÚAWSÕË»§ÄÚÖ´ÐдúÂë¡£ÑÇÂíÑ·È·Èϸé¶´²¢ÓÚ9ÔÂÐû²¼ÐÞ¸´·¨Ê½£¬µ«²¿ÃÅδ¸üдúÂëµÄ×éÖ¯ÈÔÃæÁÙ·çÏÕ¡£whoAMI¹¥»÷ÀûÓÃÁËAWS»·¾³ÖÐAMIÑ¡ÔñÅäÖõĴíÎó£¬Èçδָ¶¨ËùÓÐÕß¡¢Ê¹ÓÃͨÅä·ûÈ¡´úÌØ¶¨AMI ID»òʹÓá°most_recent=true¡±µÈʵ¼ù£¬Ê¹µÃ¹¥»÷ÕßÄܲåÈë¶ñÒâAMI¡£¹¥»÷ÕßÖ»ÐèÐû²¼Ò»¸öÃû³ÆÇкϿÉÐÅËùÓÐÕßģʽµÄAMI£¬Óû§¾Í¿ÉÄÜÑ¡Ôñ²¢Æô¶¯Ëü¡£DataDogµÄÒ£²âÊý¾ÝÏÔʾ£¬Ô¼1%µÄ×éÖ¯Ò×Êܹ¥»÷£¬¿ÉÄÜÓ°ÏìÊýǧ¸öAWSÕË»§¡£ÑÇÂíÑ·ÒÑÐÞ¸´¸ÃÎÊÌâ²¢ÍÆ³ö¡°ÔÊÐíµÄAMI¡±ÐÂÄþ¾²¿ØÖÆ£¬½¨Òé¿Í»§Ê¼ÖÕÖ¸¶¨AMIËùÓÐÕß²¢ÆôÓøù¦Ð§¡£´ËÍ⣬TerraformÒ²¿ªÊ¼¾¯¸æÎ´Ê¹ÓÃËùÓÐÕß¹ýÂËÆ÷µÄÇé¿ö£¬²¢¼Æ»®ÊµÊ©¸üÑϸñµÄÖ´ÐС£ÏµÍ³¹ÜÀíÔ±ÐèÉóºËÅäÖò¢¸üдúÂëÒÔʵÏÖÄþ¾²µÄAMI¼ìË÷£¬Í¬Ê±ÆôÓÃAWSÉó¼ÆÄ£Ê½¼ì²é²»ÊÜÐÅÈεÄAMI¡£DataDog»¹Ðû²¼ÁËɨÃ跨ʽ¹©Óû§¼ì²éAWSÕË»§ÖÐÊÇ·ñ´æÔÚ²»ÊÜÐÅÈεÄAMIʵÀý¡£
https://www.bleepingcomputer.com/news/security/whoami-attacks-give-hackers-code-execution-on-amazon-ec2-instances/
2. DoxbinÊý¾Ý´óй¶£ºToodaºÚ¿Í×éÖ¯ÆØ¹â13.6ÍòÓû§¼Ç¼¼°ºÚÃûµ¥
2ÔÂ13ÈÕ£¬DoxbinÊÇÒ»¸öÉæ¼°ÍøÂçÈËÈâËÑË÷ºÍ¸öÈËÐÅϢй¶µÄÎÛÃûÕÑÖøÆ½Ì¨£¬½üÆÚ±»Ò»¸öÃûΪToodaµÄºÚ¿Í×éÖ¯¹¥ÏÝ£¬µ¼Ö´óÁ¿Óû§Êý¾Ýй¶¡£¾ÝHackread.com±¨µÀ£¬Tooda×éÖ¯Éù³Æ´Ë´Î¹¥»÷ÊÇ¶ÔÆäÖÐÒ»Ãû³ÉÔ±Ö¸¿ØµÄ»ØÓ¦£¬ËûÃÇÆÆ»µÁËDoxbinµÄ»ù´¡ÉèÊ©£¬Çå³ýÁËÓû§ÕÊ»§£¬Ëø¶¨Á˹ÜÀíÔ±£¬²¢Ð¹Â¶ÁËÔËÓª¸Ãƽ̨ÈËÔ±µÄ¸öÈËÐÅÏ¢¡£Ð¹Â¶µÄÊý¾Ý°üÂÞÁè¼Ý136,000ÌõÓû§¼Ç¼£¬ÈçID¡¢Óû§ÃûºÍµç×ÓÓʼþµØÖ·£¬ÒÔ¼°Ò»¸öÃûΪ¡°DoxbinºÚÃûµ¥¡±µÄÎļþ£¬¸ÃÎļþÊÕ¼¯ÁËÒѸ¶·Ñ×èÖ¹ÐÅÏ¢Ðû²¼ÔÚDoxbinÉϵÄÈËÔ±ÐÅÏ¢¡£´ËÍ⣬Tooda»¹Ðû²¼Á˾ݳÆÊôÓÚDoxbin¹ÜÀíÔ±River£¨ÕæÃûPaula£©µÄÏêϸ¸öÈËÊý¾Ý¡£Õâ´ÎÊý¾Ýй¶¶ÔDoxbinÓû§À´Ëµ¼«ÎªÎ£ÏÕ£¬¼´Ê¹Ö»ÓÐÓû§ÃûºÍµç×ÓÓʼþµØÖ·Ð¹Â¶£¬ÕâЩÐÅÏ¢Ò²¿ÉÄÜÓëÆäËûйÃÜÐÅÏ¢½»²æÒýÓ㬵¼ÖÂÉí·Ý×·×ÙºÍÏÖʵÊÀ½çµÄÁªÏµ±»·¢ÏÖ¡£Ä¿Ç°£¬Doxbin´¦ÓÚÀëÏß״̬£¬´Ë´Îʼþ½øÒ»²½±íÃ÷£¬¼´Ê¹ÊǶñÒâÆ½Ì¨Ò²¿ÉÄÜÊܵ½¾ºÕù¶ÔÊֵĹ¥»÷£¬DoxbinÓû§ÃæÁÙ̻¶·çÏÕ¡£
https://hackread.com/doxbin-data-breach-hackers-leak-user-records-blacklist-file/
3. Zacks Investment ResearchÒÉÔâ1200ÍòÕË»§Êý¾Ýй¶
2ÔÂ13ÈÕ£¬Zacks Investment Research£¨Zacks£©ÊÇÒ»¼ÒÌṩÊý¾ÝÇý¶¯Í¶×ʼû½âµÄÃÀ¹ú¹«Ë¾£¬ÔÚ2024Äê6ÔÂÒÉËÆÔâÓöÁËÊý¾Ýй¶Ê¼þ£¬µ¼ÖÂԼĪ1200Íò¸öÕË»§µÄÃô¸ÐÐÅÏ¢±»Ð¹Â¶¡£ÕâЩÐÅÏ¢°üÂÞÈ«Ãû¡¢Óû§Ãû¡¢µç×ÓÓʼþµØÖ·¡¢Êµ¼ÊµØÖ·ºÍµç»°ºÅÂëµÈ¡£Ò»ÃûÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳ÉÏÐû²¼ÁËÊý¾ÝÑù±¾£¬²¢Éù³Æ¶ÔZacks½øÐÐÁËÈëÇÖ¡£¾¡¹ÜZacksÉÐδ»ØÓ¦¹ØÓÚÊý¾ÝÕæÊµÐÔµÄѯÎÊ£¬µ«Ð¹Â¶µÄÊý¾Ý¿âÒѱ»Ìí¼Óµ½Have I Been Pwned£¨HIBP£©ÍøÕ¾ÉϹ©Óû§¼ì²é¡£HIBPÈ·ÈϸÃÎļþ°üÂÞ1200Íò¸öΨһµç×ÓÓʼþµØÖ·µÈÐÅÏ¢£¬²¢Ö¸³öÔ¼93%µÄй¶µç×ÓÓʼþµØÖ·ÒÑ´æÔÚÓÚÆäÊý¾Ý¿âÖУ¬¿ÉÄÜÀ´×Ô¹ýÈ¥¶Ôͬһƽ̨»òÆäËû·þÎñµÄÈëÇÖ¡£Èç¹û´Ë´ÎÊý¾Ýй¶±»Ö¤ÊµÎªÐºڿ͹¥»÷µÄ½á¹û£¬Õ⽫ÊǹýÈ¥ËÄÄêÄÚÓ°ÏìZacksµÄµÚÈý´ÎÖØ´óÊý¾Ýй¶Ê¼þ¡£´Ëǰ£¬ZacksÒÑÔÚ2023Äê1ÔÂÅû¶ÁËÒ»´ÎÉæ¼°820,000Ãû¿Í»§Ãô¸ÐÐÅÏ¢µÄй¶Ê¼þ£¬²¢ÔÚ2023Äê6Ô±»HIBPÑéÖ¤ÁËÒ»¸ö°üÂÞ880ÍòʹÓÃZacks·þÎñ¸öÈËÐÅÏ¢µÄµ¥¶ÀÊý¾Ý¿âй¶¡£ÖµµÃ×¢ÒâµÄÊÇ£¬´Ë´Îй¶Ê¼þÉÐδµÃµ½ZacksµÄ¹Ù·½Ö¤Êµ¡£
https://www.bleepingcomputer.com/news/security/hacker-leaks-account-data-of-12-million-zacks-investment-users/
4. AstarothÍøÂçµöÓ㹤¾ß°ü£ºÐÂÐ͹¥»÷·½Ê½¿ÉÈÆ¹ý2FAÇÔÈ¡µÇ¼ƾ֤
2ÔÂ13ÈÕ£¬Ò»ÖÖÃûΪAstarothµÄÐÂÐ͸߼¶ÍøÂçµöÓ㹤¾ß°üÒÑ·ºÆðÔÚÍøÂç·¸×ïÍøÂçÖУ¬Ëüͨ¹ý·´ÏòÊðÀí¡¢ÊµÊ±Æ¾Ö¤²¶×½ºÍ»á»°½Ù³Ö¼¼Êõ£¬Äܹ»ÈƹýË«ÒòËØÉí·ÝÑéÖ¤£¨2FA£©£¬ÇÔÈ¡Gmail¡¢YahooºÍMicrosoftµÈ·þÎñµÄµÇ¼ƾ֤¡£AstarothʹÓöñÒâ·þÎñÆ÷×÷ΪÊܺ¦ÕߺͺϷ¨ÍøÕ¾Ö®¼äµÄÖн飬À¹½Ø²¢ÀûÓÃÁ÷Á¿£¬ÊµÊ±²¶×½µÇ¼ƾ¾Ý¡¢Éí·ÝÑéÖ¤ÁîÅÆºÍ»á»°cookie¡£¹¥»÷Õß¿ÉÒÔͨ¹ýWebÃæ°å½çÃæºÍTelegram֪ͨʵʱ½ÓÊÕ²¶×½µÄÐÅÏ¢¡£¸Ã¹¤¾ß°üͨ¹ýTelegram³öÊÛ£¬²¢ÔÚÍøÂç·¸×ïÂÛ̳ºÍÊг¡ÉÏÍÆ¹ã£¬ÊÛ¼Û2000ÃÀÔª£¬°üÂÞÁù¸öÔµĸüкÍÖ§³Ö¡£¾ÝÑо¿ÈËÔ±³Æ£¬AstarothµÄÅÓ´óˮƽÁîÈËÕ𾪣¬Óû§Ó¦¸ñÍâСÐĵç×ÓÓʼþÖеÄÁ´½Ó£¬Ö±½Ó·ÃÎÊÍøÕ¾ÒÔ¼ì²éÕË»§ÊÇ·ñ´æÔÚÎÊÌâ¡£
https://hackread.com/astaroth-phishing-kit-bypasses-2fa-hijack-gmail-microsoft/
5. PostgreSQLÐÂÁãÈÕ©¶´³ÉBeyondTrust¹¥»÷Òªº¦£¬²ÆÕþ²¿ÔâºÚ¿ÍÈëÇÖ
2ÔÂ13ÈÕ£¬Rapid7µÄÄþ¾²Ñо¿ÈËÔ±ÖÜËijÂË߳ƣ¬ÔÚPostgreSQLÖз¢ÏÖÁËÒ»¸öеÄÁãÈÕ©¶´£¨CVE-2025-1094£©£¬¸Ã©¶´ÓëÕë¶ÔBeyondTrustÔ¶³ÌÖ§³Ö²úÎïµÄһϵÁй¥»÷ÃÜÇÐÏà¹Ø¡£¸Ã©¶´Ó°ÏìPostgreSQL½»»¥Ê½ÖÕ¶Ëpsql£¬ÔÊÐí¾«ÐĽṹµÄSQLÓï¾ä´¥·¢SQL×¢Èë¡£Rapid7Ö¸³ö£¬ºÚ¿ÍÒÑÀûÓôË©¶´ÀÖ³ÉÈëÇÖÃÀ¹ú²ÆÕþ²¿µÄ»úÆ÷¡£¾¡¹ÜBeyondTrustÒÑÕë¶ÔÆäÏà¹ØÂ©¶´Ðû²¼Á˲¹¶¡£¬µ«PostgreSQLÖеÄÕâ¸öDZÔÚ©¶´ÈÔÊǹ¥»÷ÕߵĹ¥»÷½¹µã¡£¸Ã©¶´´æÔÚÓÚpsql´¦Öøñʽ´íÎóµÄUTF-8×Ö·ûµÄ·½Ê½ÖУ¬¾«ÐÄÉè¼ÆµÄÎÞЧÐòÁпÉÒÔ¹ýÔçÖÕÖ¹SQLÃüÁʹ¹¥»÷ÕßÄܹ»×¢ÈëÆäËûÓï¾ä£¬ÉõÖÁ´¥·¢shellÖ´ÐС£PostgreSQLÍŶÓÒÑÐû²¼½ô¼±²¹¶¡£¬²¢¾¯¸æÁËÊÜÓ°Ïì°æ±¾¡£Í¬Ê±£¬Rapid7»¹Ðû²¼ÁËMetasploitÄ£¿é£¬ÓÃÓÚÖ¸ÎÆÊ¶±ðºÍ×Ô¶¯Ôغɴ«ËÍÒ×Êܹ¥»÷µÄBeyondTrustϵͳ¡£
https://www.securityweek.com/rapid7-flags-new-postgresql-zero-day-connected-to-beyondtrust-exploitation/
6. CleanTalk WordPress²å¼þÏÖÑÏÖØÈÎÒâÎļþÉÏ´«Â©¶´£¬³¬3ÍòÍøÕ¾ÃæÁÙ·çÏÕ
2ÔÂ13ÈÕ£¬CleanTalk WordPress ²å¼þÖз¢ÏÖÁËÒ»¸ö±àºÅΪCVE-2024-13365µÄÑÏÖØÈÎÒâÎļþÉÏ´«Â©¶´£¬¸Ã©¶´¿ÉÄÜʹÁè¼Ý30,000¸öÍøÕ¾ÃæÁÙ±»ÍêÈ«¹¥ÏݵķçÏÕ¡£´Ë©¶´µÄCVSSÆÀ·Ö¸ß´ï9.8£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢ÉÏ´«¶ñÒâÎļþ£¬½ø¶øÔÚ·þÎñÆ÷ÉÏÖ´ÐдúÂ롣©¶´Ô´ÓÚ²å¼þÔÚɨÃèZIP´æµµÊ±Î´ÄÜÕýÈ·ÑéÖ¤Óû§ÌṩµÄÊý¾Ý£¬µ¼Ö¹¥»÷Õß¿ÉÒÔÉÏ´«ÈÎÒâÎļþ£¬°üÂÞ¶ñÒâ½Å±¾¡£¼´Ê¹Î´¾Éí·ÝÑéÖ¤µÄÓû§Í¨³£²»ÔÊÐíÉÏ´«Îļþ£¬¸Ã©¶´Ò²¿ÉÄܱ»ÀûÓ㬹¥»÷Õß¿ÉÄÜ»áÉÏ´«°üÂÞÒþ²ØÔÚÎÞº¦ÎļþÖеĶñÒâPHPÎļþµÄ´óÐÍZIPÎļþ£¬ÒÔѹ¿å·þÎñÆ÷×ÊÔ´²¢ÔÊÐíÖ´ÐжñÒâÎļþ¡£WordfenceÄþ¾²¹«Ë¾·¢ÏÖÁ˸é¶´£¬²¢½¨ÒéËùÓÐʹÓÃCleanTalk²å¼þµÄÓû§¾¡¿ì¸üе½×îа汾2.150£¬ÒÔ±£»¤ÆäÍøÕ¾ÃâÊÜDZÔÚ¹¥»÷¡£Í¬Ê±£¬Äþ¾²Ñо¿Ô±Lucio S¨¢ÒòÂôÁ¦ÈεسÂË߸é¶´¶ø»ñµÃ1,716.00ÃÀÔªµÄÉͽð¡£
https://securityonline.info/hackers-can-take-over-30000-wordpress-sites-due-to-critical-cleantalk-security-flaw-cve-2024-13365/