whoAMI¹¥»÷ÀûÓÃAmazon AMIÃû³Æ»ìÏýÈëÇÖAWSÕË»§

Ðû²¼Ê±¼ä 2025-02-14

1. whoAMI¹¥»÷ÀûÓÃAmazon AMIÃû³Æ»ìÏýÈëÇÖAWSÕË»§


2ÔÂ13ÈÕ£¬Äþ¾²Ñо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪ¡°whoAMI¡±µÄ¹¥»÷·½Ê½£¬¸Ã¹¥»÷ÔÊÐíÈκÎÐû²¼¾ßÓÐÌØ¶¨Ãû³ÆµÄAmazonϵͳӳÏñ£¨AMI£©µÄÈË·ÃÎÊAmazon Web·þÎñÕÊ»§ ¡£´Ë¹¥»÷ÓÉDataDogÑо¿ÈËÔ±ÓÚ2024Äê8Ô³ïı£¬Í¨¹ýÀûÓÃÈí¼þÏîÄ¿¼ìË÷AMI IDÔÚAWSÕË»§ÄÚÖ´ÐдúÂë ¡£ÑÇÂíÑ·È·Èϸé¶´²¢ÓÚ9ÔÂÐû²¼ÐÞ¸´·¨Ê½£¬µ«²¿ÃÅδ¸üдúÂëµÄ×éÖ¯ÈÔÃæÁÙ·çÏÕ ¡£whoAMI¹¥»÷ÀûÓÃÁËAWS»·¾³ÖÐAMIÑ¡ÔñÅäÖõĴíÎó£¬Èçδָ¶¨ËùÓÐÕß¡¢Ê¹ÓÃͨÅä·ûÈ¡´úÌØ¶¨AMI ID»òʹÓá°most_recent=true¡±µÈʵ¼ù£¬Ê¹µÃ¹¥»÷ÕßÄܲåÈë¶ñÒâAMI ¡£¹¥»÷ÕßÖ»ÐèÐû²¼Ò»¸öÃû³ÆÇкϿÉÐÅËùÓÐÕßģʽµÄAMI£¬Óû§¾Í¿ÉÄÜÑ¡Ôñ²¢Æô¶¯Ëü ¡£DataDogµÄÒ£²âÊý¾ÝÏÔʾ£¬Ô¼1%µÄ×éÖ¯Ò×Êܹ¥»÷£¬¿ÉÄÜÓ°ÏìÊýǧ¸öAWSÕË»§ ¡£ÑÇÂíÑ·ÒÑÐÞ¸´¸ÃÎÊÌâ²¢ÍÆ³ö¡°ÔÊÐíµÄAMI¡±ÐÂÄþ¾²¿ØÖÆ£¬½¨Òé¿Í»§Ê¼ÖÕÖ¸¶¨AMIËùÓÐÕß²¢ÆôÓøù¦Ð§ ¡£´ËÍ⣬TerraformÒ²¿ªÊ¼¾¯¸æÎ´Ê¹ÓÃËùÓÐÕß¹ýÂËÆ÷µÄÇé¿ö£¬²¢¼Æ»®ÊµÊ©¸üÑϸñµÄÖ´ÐÐ ¡£ÏµÍ³¹ÜÀíÔ±ÐèÉóºËÅäÖò¢¸üдúÂëÒÔʵÏÖÄþ¾²µÄAMI¼ìË÷£¬Í¬Ê±ÆôÓÃAWSÉó¼ÆÄ£Ê½¼ì²é²»ÊÜÐÅÈεÄAMI ¡£DataDog»¹Ðû²¼ÁËɨÃ跨ʽ¹©Óû§¼ì²éAWSÕË»§ÖÐÊÇ·ñ´æÔÚ²»ÊÜÐÅÈεÄAMIʵÀý ¡£


https://www.bleepingcomputer.com/news/security/whoami-attacks-give-hackers-code-execution-on-amazon-ec2-instances/


2. DoxbinÊý¾Ý´óй¶£ºToodaºÚ¿Í×éÖ¯ÆØ¹â13.6ÍòÓû§¼Ç¼¼°ºÚÃûµ¥


2ÔÂ13ÈÕ£¬DoxbinÊÇÒ»¸öÉæ¼°ÍøÂçÈËÈâËÑË÷ºÍ¸öÈËÐÅϢй¶µÄÎÛÃûÕÑÖøÆ½Ì¨£¬½üÆÚ±»Ò»¸öÃûΪToodaµÄºÚ¿Í×éÖ¯¹¥ÏÝ£¬µ¼Ö´óÁ¿Óû§Êý¾Ýй¶ ¡£¾ÝHackread.com±¨µÀ£¬Tooda×éÖ¯Éù³Æ´Ë´Î¹¥»÷ÊÇ¶ÔÆäÖÐÒ»Ãû³ÉÔ±Ö¸¿ØµÄ»ØÓ¦£¬ËûÃÇÆÆ»µÁËDoxbinµÄ»ù´¡ÉèÊ©£¬Çå³ýÁËÓû§ÕÊ»§£¬Ëø¶¨Á˹ÜÀíÔ±£¬²¢Ð¹Â¶ÁËÔËÓª¸Ãƽ̨ÈËÔ±µÄ¸öÈËÐÅÏ¢ ¡£Ð¹Â¶µÄÊý¾Ý°üÂÞÁè¼Ý136,000ÌõÓû§¼Ç¼£¬ÈçID¡¢Óû§ÃûºÍµç×ÓÓʼþµØÖ·£¬ÒÔ¼°Ò»¸öÃûΪ¡°DoxbinºÚÃûµ¥¡±µÄÎļþ£¬¸ÃÎļþÊÕ¼¯ÁËÒѸ¶·Ñ×èÖ¹ÐÅÏ¢Ðû²¼ÔÚDoxbinÉϵÄÈËÔ±ÐÅÏ¢ ¡£´ËÍ⣬Tooda»¹Ðû²¼Á˾ݳÆÊôÓÚDoxbin¹ÜÀíÔ±River£¨ÕæÃûPaula£©µÄÏêϸ¸öÈËÊý¾Ý ¡£Õâ´ÎÊý¾Ýй¶¶ÔDoxbinÓû§À´Ëµ¼«ÎªÎ£ÏÕ£¬¼´Ê¹Ö»ÓÐÓû§ÃûºÍµç×ÓÓʼþµØÖ·Ð¹Â¶£¬ÕâЩÐÅÏ¢Ò²¿ÉÄÜÓëÆäËûйÃÜÐÅÏ¢½»²æÒýÓ㬵¼ÖÂÉí·Ý×·×ÙºÍÏÖʵÊÀ½çµÄÁªÏµ±»·¢ÏÖ ¡£Ä¿Ç°£¬Doxbin´¦ÓÚÀëÏß״̬£¬´Ë´Îʼþ½øÒ»²½±íÃ÷£¬¼´Ê¹ÊǶñÒâÆ½Ì¨Ò²¿ÉÄÜÊܵ½¾ºÕù¶ÔÊֵĹ¥»÷£¬DoxbinÓû§ÃæÁÙ̻¶·çÏÕ ¡£


https://hackread.com/doxbin-data-breach-hackers-leak-user-records-blacklist-file/


3. Zacks Investment ResearchÒÉÔâ1200ÍòÕË»§Êý¾Ýй¶


2ÔÂ13ÈÕ£¬Zacks Investment Research£¨Zacks£©ÊÇÒ»¼ÒÌṩÊý¾ÝÇý¶¯Í¶×ʼû½âµÄÃÀ¹ú¹«Ë¾£¬ÔÚ2024Äê6ÔÂÒÉËÆÔâÓöÁËÊý¾Ýй¶Ê¼þ£¬µ¼ÖÂԼĪ1200Íò¸öÕË»§µÄÃô¸ÐÐÅÏ¢±»Ð¹Â¶ ¡£ÕâЩÐÅÏ¢°üÂÞÈ«Ãû¡¢Óû§Ãû¡¢µç×ÓÓʼþµØÖ·¡¢Êµ¼ÊµØÖ·ºÍµç»°ºÅÂëµÈ ¡£Ò»ÃûÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳ÉÏÐû²¼ÁËÊý¾ÝÑù±¾£¬²¢Éù³Æ¶ÔZacks½øÐÐÁËÈëÇÖ ¡£¾¡¹ÜZacksÉÐδ»ØÓ¦¹ØÓÚÊý¾ÝÕæÊµÐÔµÄѯÎÊ£¬µ«Ð¹Â¶µÄÊý¾Ý¿âÒѱ»Ìí¼Óµ½Have I Been Pwned£¨HIBP£©ÍøÕ¾ÉϹ©Óû§¼ì²é ¡£HIBPÈ·ÈϸÃÎļþ°üÂÞ1200Íò¸öΨһµç×ÓÓʼþµØÖ·µÈÐÅÏ¢£¬²¢Ö¸³öÔ¼93%µÄй¶µç×ÓÓʼþµØÖ·ÒÑ´æÔÚÓÚÆäÊý¾Ý¿âÖУ¬¿ÉÄÜÀ´×Ô¹ýÈ¥¶Ôͬһƽ̨»òÆäËû·þÎñµÄÈëÇÖ ¡£Èç¹û´Ë´ÎÊý¾Ýй¶±»Ö¤ÊµÎªÐºڿ͹¥»÷µÄ½á¹û£¬Õ⽫ÊǹýÈ¥ËÄÄêÄÚÓ°ÏìZacksµÄµÚÈý´ÎÖØ´óÊý¾Ýй¶Ê¼þ ¡£´Ëǰ£¬ZacksÒÑÔÚ2023Äê1ÔÂÅû¶ÁËÒ»´ÎÉæ¼°820,000Ãû¿Í»§Ãô¸ÐÐÅÏ¢µÄй¶Ê¼þ£¬²¢ÔÚ2023Äê6Ô±»HIBPÑéÖ¤ÁËÒ»¸ö°üÂÞ880ÍòʹÓÃZacks·þÎñ¸öÈËÐÅÏ¢µÄµ¥¶ÀÊý¾Ý¿âй¶ ¡£ÖµµÃ×¢ÒâµÄÊÇ£¬´Ë´Îй¶Ê¼þÉÐδµÃµ½ZacksµÄ¹Ù·½Ö¤Êµ ¡£


https://www.bleepingcomputer.com/news/security/hacker-leaks-account-data-of-12-million-zacks-investment-users/


4. AstarothÍøÂçµöÓ㹤¾ß°ü£ºÐÂÐ͹¥»÷·½Ê½¿ÉÈÆ¹ý2FAÇÔÈ¡µÇ¼ƾ֤


2ÔÂ13ÈÕ£¬Ò»ÖÖÃûΪAstarothµÄÐÂÐ͸߼¶ÍøÂçµöÓ㹤¾ß°üÒÑ·ºÆðÔÚÍøÂç·¸×ïÍøÂçÖУ¬Ëüͨ¹ý·´ÏòÊðÀí¡¢ÊµÊ±Æ¾Ö¤²¶×½ºÍ»á»°½Ù³Ö¼¼Êõ£¬Äܹ»ÈƹýË«ÒòËØÉí·ÝÑéÖ¤£¨2FA£©£¬ÇÔÈ¡Gmail¡¢YahooºÍMicrosoftµÈ·þÎñµÄµÇ¼ƾ֤ ¡£AstarothʹÓöñÒâ·þÎñÆ÷×÷ΪÊܺ¦ÕߺͺϷ¨ÍøÕ¾Ö®¼äµÄÖн飬À¹½Ø²¢ÀûÓÃÁ÷Á¿£¬ÊµÊ±²¶×½µÇ¼ƾ¾Ý¡¢Éí·ÝÑéÖ¤ÁîÅÆºÍ»á»°cookie ¡£¹¥»÷Õß¿ÉÒÔͨ¹ýWebÃæ°å½çÃæºÍTelegram֪ͨʵʱ½ÓÊÕ²¶×½µÄÐÅÏ¢ ¡£¸Ã¹¤¾ß°üͨ¹ýTelegram³öÊÛ£¬²¢ÔÚÍøÂç·¸×ïÂÛ̳ºÍÊг¡ÉÏÍÆ¹ã£¬ÊÛ¼Û2000ÃÀÔª£¬°üÂÞÁù¸öÔµĸüкÍÖ§³Ö ¡£¾ÝÑо¿ÈËÔ±³Æ£¬AstarothµÄÅÓ´óˮƽÁîÈËÕ𾪣¬Óû§Ó¦¸ñÍâСÐĵç×ÓÓʼþÖеÄÁ´½Ó£¬Ö±½Ó·ÃÎÊÍøÕ¾ÒÔ¼ì²éÕË»§ÊÇ·ñ´æÔÚÎÊÌâ ¡£


https://hackread.com/astaroth-phishing-kit-bypasses-2fa-hijack-gmail-microsoft/


5. PostgreSQLÐÂÁãÈÕ©¶´³ÉBeyondTrust¹¥»÷Òªº¦£¬²ÆÕþ²¿ÔâºÚ¿ÍÈëÇÖ


2ÔÂ13ÈÕ£¬Rapid7µÄÄþ¾²Ñо¿ÈËÔ±ÖÜËijÂË߳ƣ¬ÔÚPostgreSQLÖз¢ÏÖÁËÒ»¸öеÄÁãÈÕ©¶´£¨CVE-2025-1094£©£¬¸Ã©¶´ÓëÕë¶ÔBeyondTrustÔ¶³ÌÖ§³Ö²úÎïµÄһϵÁй¥»÷ÃÜÇÐÏà¹Ø ¡£¸Ã©¶´Ó°ÏìPostgreSQL½»»¥Ê½ÖÕ¶Ëpsql£¬ÔÊÐí¾«ÐĽṹµÄSQLÓï¾ä´¥·¢SQL×¢Èë ¡£Rapid7Ö¸³ö£¬ºÚ¿ÍÒÑÀûÓôË©¶´ÀÖ³ÉÈëÇÖÃÀ¹ú²ÆÕþ²¿µÄ»úÆ÷ ¡£¾¡¹ÜBeyondTrustÒÑÕë¶ÔÆäÏà¹ØÂ©¶´Ðû²¼Á˲¹¶¡£¬µ«PostgreSQLÖеÄÕâ¸öDZÔÚ©¶´ÈÔÊǹ¥»÷ÕߵĹ¥»÷½¹µã ¡£¸Ã©¶´´æÔÚÓÚpsql´¦Öøñʽ´íÎóµÄUTF-8×Ö·ûµÄ·½Ê½ÖУ¬¾«ÐÄÉè¼ÆµÄÎÞЧÐòÁпÉÒÔ¹ýÔçÖÕÖ¹SQLÃüÁʹ¹¥»÷ÕßÄܹ»×¢ÈëÆäËûÓï¾ä£¬ÉõÖÁ´¥·¢shellÖ´ÐÐ ¡£PostgreSQLÍŶÓÒÑÐû²¼½ô¼±²¹¶¡£¬²¢¾¯¸æÁËÊÜÓ°Ïì°æ±¾ ¡£Í¬Ê±£¬Rapid7»¹Ðû²¼ÁËMetasploitÄ £¿é£¬ÓÃÓÚÖ¸ÎÆÊ¶±ðºÍ×Ô¶¯Ôغɴ«ËÍÒ×Êܹ¥»÷µÄBeyondTrustϵͳ ¡£


https://www.securityweek.com/rapid7-flags-new-postgresql-zero-day-connected-to-beyondtrust-exploitation/


6. CleanTalk WordPress²å¼þÏÖÑÏÖØÈÎÒâÎļþÉÏ´«Â©¶´£¬³¬3ÍòÍøÕ¾ÃæÁÙ·çÏÕ


2ÔÂ13ÈÕ£¬CleanTalk WordPress ²å¼þÖз¢ÏÖÁËÒ»¸ö±àºÅΪCVE-2024-13365µÄÑÏÖØÈÎÒâÎļþÉÏ´«Â©¶´£¬¸Ã©¶´¿ÉÄÜʹÁè¼Ý30,000¸öÍøÕ¾ÃæÁÙ±»ÍêÈ«¹¥ÏݵķçÏÕ ¡£´Ë©¶´µÄCVSSÆÀ·Ö¸ß´ï9.8£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢ÉÏ´«¶ñÒâÎļþ£¬½ø¶øÔÚ·þÎñÆ÷ÉÏÖ´ÐдúÂë ¡£Â©¶´Ô´ÓÚ²å¼þÔÚɨÃèZIP´æµµÊ±Î´ÄÜÕýÈ·ÑéÖ¤Óû§ÌṩµÄÊý¾Ý£¬µ¼Ö¹¥»÷Õß¿ÉÒÔÉÏ´«ÈÎÒâÎļþ£¬°üÂÞ¶ñÒâ½Å±¾ ¡£¼´Ê¹Î´¾­Éí·ÝÑéÖ¤µÄÓû§Í¨³£²»ÔÊÐíÉÏ´«Îļþ£¬¸Ã©¶´Ò²¿ÉÄܱ»ÀûÓ㬹¥»÷Õß¿ÉÄÜ»áÉÏ´«°üÂÞÒþ²ØÔÚÎÞº¦ÎļþÖеĶñÒâPHPÎļþµÄ´óÐÍZIPÎļþ£¬ÒÔѹ¿å·þÎñÆ÷×ÊÔ´²¢ÔÊÐíÖ´ÐжñÒâÎļþ ¡£WordfenceÄþ¾²¹«Ë¾·¢ÏÖÁ˸é¶´£¬²¢½¨ÒéËùÓÐʹÓÃCleanTalk²å¼þµÄÓû§¾¡¿ì¸üе½×îа汾2.150£¬ÒÔ±£»¤ÆäÍøÕ¾ÃâÊÜDZÔÚ¹¥»÷ ¡£Í¬Ê±£¬Äþ¾²Ñо¿Ô±Lucio S¨¢ÒòÂôÁ¦ÈεسÂË߸é¶´¶ø»ñµÃ1,716.00ÃÀÔªµÄÉͽð ¡£


https://securityonline.info/hackers-can-take-over-30000-wordpress-sites-due-to-critical-cleantalk-security-flaw-cve-2024-13365/