Western DigitalÔâµ½¹¥»÷My Cloud·þÎñÔÝʱÖÐÖ¹
Ðû²¼Ê±¼ä 2023-04-041¡¢Western DigitalÔâµ½¹¥»÷My Cloud·þÎñÔÝʱÖÐÖ¹
4ÔÂ3ÈÕ±¨µÀ£¬Western Digital³ÆÆäÔâµ½¹¥»÷£¬Î´¾ÊÚȨµÄµÚÈý·½»ñµÃÁËÆä¹«Ë¾¶à¸öϵͳµÄ»á¼ûȨÏÞ¡£¾ÝϤ£¬¸ÃÊÂÎñÊÇÔÚ3ÔÂ26ÈÕ·¢Ã÷µÄ£¬ÏÖÔÚÊÓ²ìÉд¦ÓÚÔçÆÚ½×¶Î£¬¹«Ë¾ÕýÓëÖ´·¨²¿·Öе÷ÊÂÇé¡£¾ÝÏÖ½×¶ÎÊӲ죬¹«Ë¾È·ÈϹ¥»÷Õß´ÓÆäϵͳÖлñÈ¡ÁËijЩÊý¾Ý£¬²¢ÔÚÆð¾¢ÏàʶÕâЩÊý¾ÝµÄÐÔ×Ӻ͹æÄ£¡£¸Ã¹«Ë¾³Æ£¬ÆäÓ¦¶Ô²½·¥¿ÉÄܵ¼Ö¹«Ë¾²¿·ÖÓªÒµÔËÓªÖÐÖ¹¡£×ÔÖÜÈÕÒÔÀ´£¬¶à¸öMy CloudÓû§±¨¸æËûÃÇÎÞ·¨»á¼ûÔÆÍйÜýÌå´æ´¢¿â£¬µÇ¼ʱ»áÏÔʾ¡°503·þÎñÔÝʱ²»¿ÉÓá±¹ýʧ¡£¾àÊ״α¨¸æÖÐÖ¹ÒÔÀ´ÒÑÁè¼Ý24Сʱ£¬ÔÆ¡¢ÊðÀí¡¢Web¡¢Éí·ÝÑéÖ¤¡¢µç×ÓÓʼþºÍÍÆËÍ֪ͨ¾ù²»¿ÉÓá£
https://www.bleepingcomputer.com/news/security/western-digital-discloses-network-breach-my-cloud-service-down/
2¡¢Dish NetworkÒòÀÕË÷¹¥»÷ÊÂÎñÔâµ½¶àÆðÕûÌåËßËÏ
ýÌå4ÔÂ1Èճƣ¬ÖÁÉÙÓÐÁù¼Ò״ʦÊÂÎñËùÕýÔÚ¶ÔDish NetworkÌáÆðÕûÌåËßËÏ£¬Ö¼ÔÚΪ2021Äê2ÔÂ22ÈÕÖÁ2023Äê2ÔÂ27ÈÕʱ´úÒòÉæÏÓ¡°Ö¤È¯Ú²Æ¡±Êܵ½µ¹ÔËÓ°ÏìµÄDish¹É¶«×·»ØËðʧ¡£ÃñÊÂËßËϳƣ¬DISH NetworkÊÔͼÑÚÊÎÆäÍøÂçÇå¾²ºÍIT»ù´¡Éèʩȱ·¦µÄÊÂʵ£¬Í¬Ê±Ç¿µ÷ÆäÔËӪЧÂÊ¡£ÓÉÓÚÉÏÊöÔµ¹ÊÔÓÉ£¬¹«Ë¾ÎÞ·¨ÊÊÍâµØ±£»¤¿Í»§Êý¾Ý£¬Ê¹ÆäÈÝÒ×±»¹¥»÷Õß»á¼û¡£2ÔÂ24ÈÕ×óÓÒ£¬DISHÉñÃØÏÂÏߣ¬ÆäÍøÕ¾ºÍÓ¦ÓÃÍ£ÔËÊýÈÕ¡£2ÔÂ28ÈÕ£¬DISH͸¶ÆäÔâµ½ÀÕË÷¹¥»÷¡£ÐÂÎÅ´«³öºó£¬Æä¹É¼Ûÿ¹Éϵø0.79ÃÀÔª¡£
https://www.bleepingcomputer.com/news/security/dish-slapped-with-multiple-lawsuits-after-ransomware-cyber-attack/
3¡¢Winter VivernʹÓÃZimbraÎó²î¹¥»÷±±Ô¼¾üÕþºÍÍâ½»»ú¹¹
ProofpointÔÚ3ÔÂ30ÈÕÅû¶ÁËTA473£¨ÓÖÃûWinter Vivern£©Ê¹ÓÃZimbra Collaboration·þÎñÆ÷ÖÐÎó²î£¨CVE-2022-27926£©µÄ¹¥»÷Ô˶¯¡£¹¥»÷ʼÓÚ2023Äê2Ô£¬Ö÷ÒªÕë¶ÔÓë±±Ô¼Ïà¹ØµÄÅ·ÖÞ¾üÊ¡¢Õþ¸®ºÍÍâ½»»ú¹¹¡£¹¥»÷ÕßʹÓÃAcunetixɨÃèδÐÞ¸´µÄÍøÂçÓʼþƽ̨²¢·¢ËÍ´¹ÂÚÓʼþ£¬ÓʼþÖеÄÁ´½Ó¿ÉʹÓÃZimbraÖÐÎó²î½«JavaScript payload×¢ÈëÍøÒ³¡£ÕâЩpayloadÓÃÓÚ´ÓÄ¿µÄÊÕµ½µÄcookieÖÐÇÔÈ¡Óû§Ãû¡¢ÃÜÂëºÍÁîÅÆ£¬À´»á¼ûÄ¿µÄµÄÓʼþÕÊ»§¡£×îºó£¬¹¥»÷Õß»á»á¼ûÓʼþÖеÄÃô¸ÐÐÅÏ¢£¬»òÔÚÒ»¶Îʱ¼äÄÚ¼à¿ØÍ¨Ñ¶¡£
https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability
4¡¢¶à¸ö½©Ê¬ÍøÂçʹÓÃCactiºÍRealtekÎó²î·Ö·¢¶ñÒâÈí¼þ
3ÔÂ29ÈÕ£¬Fortinet³ÆÆäÔÚ½ñÄê1ÔÂÖÁ3Ô¼ì²âµ½¶à¸ö½©Ê¬ÍøÂçʹÓÃCactiºÍRealtekÎó²î£¬Ö¼ÔÚ·Ö·¢¶ñÒâÈí¼þShellBotºÍMoobot¡£Îó²î»®·ÖΪRealtek Jungle SDKÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-35394£©ºÍCacti¹ÊÕÏÖÎÀí¼à¿Ø¹¤¾ßÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2022-46169£©¡£MoobotÊÇMiraiµÄÒ»¸ö±äÖÖ£¬Ð°汾µÄÒ»¸öÏÔÖøÌØÕ÷ÊÇËüÃÇÄܹ»É¨Ã貢ɱËÀÆäËüÒÑÖªbotÀú³Ì£¬ÒÔ»ñµÃ×î´óÓ²¼þ¹¦ÂÊÀ´Ö´ÐÐDDoS¹¥»÷¡£ShellBotÓÚ½ñÄê1ÔÂÊ״α»·¢Ã÷£¬Fortinet·¢Ã÷ÁËËüµÄÈý¸ö¼þ±äÌ壬Åú×¢ËüÕýÔÚÆð¾¢¿ª·¢ÖС£
https://www.fortinet.com/blog/threat-research/moobot-strikes-again-targeting-cacti-and-realtek-vulnerabilities
5¡¢Ñо¿Ö°Ô±Åû¶Azure SFXÖÐÎó²îSuper FabriXssµÄϸ½Ú
¾Ý3ÔÂ30ÈÕ±¨µÀ£¬Ñо¿Ö°Ô±Åû¶ÁËAzure Service Fabric Explorer(SFX)ÖÐÎó²îSuper FabriXssµÄϸ½Ú¡£ÕâÊÇÒ»¸ö¿çÕ¾¾ç±¾Îó²î£¨CVE-2023-23383£©£¬Ãû×ÖȪԴÓÚ΢ÈíÔÚ2022Äê10ÔÂÐÞ¸´µÄFabriXssÎó²î£¨CVE-2022-35829£©¡£Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓÃÆäÔÚService Fabric½ÚµãÉÏÍйܵÄÈÝÆ÷ÖÐʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬¶øÎÞÐèÉí·ÝÑéÖ¤¡£ÓëFabriXxs²î±ðµÄÊÇ£¬SuperFabriXxsÖ»±£´æÓÚWindows ClusterÖУ¬¿ÉÓÃÓÚ´ó¹æÄ£µÄ´úÂëÖ´Ðй¥»÷¡£Î¢ÈíÔÚ2023Äê3ÔµÄÖܶþ²¹¶¡ÖÐÐÞ¸´Á˸ÃÎó²î¡£
https://orca.security/resources/blog/super-fabrixss-azure-vulnerability/
6¡¢Securonix·¢Ã÷Õë¶ÔÃÀ¹úµÄTACTICAL#OCTOPUS¹¥»÷Ô˶¯
SecuronixÓÚ3ÔÂ30ÈÕ³ÆÆä·¢Ã÷ÁËÕë¶ÔÃÀ¹ú×éÖ¯µÄTACTICAL#OCTOPUS¹¥»÷Ô˶¯¡£Ëæ×ÅÃÀ¹ú4ÔÂ15ÈÕÄÉ˰×èÖ¹ÈÕÆÚÁÚ½ü£¬Óë˰ÊÕÏà¹ØµÄ´¹ÂÚ¹¥»÷ÔöÌí¡£¸Ã¹¥»÷Ô˶¯Í¨³£Ê¼ÓÚÒ»¸öÊÜÃÜÂë±£»¤µÄ.zipÎļþ£¬ÆäÃû³ÆÓë˰ÎñÏà¹Ø¡£.zipÎļþÖÐͨ³£°üÀ¨Ò»¸ö.pngºÍÒ»¸ö.lnk¡£µ±Óû§Ë«»÷¿ì½Ý·½·¨Îļþʱ£¬´úÂë×îÏÈÖ´ÐС£È»ºó£¬Ò»ÏµÁÐVBScriptºÍPowerShell stagers»á´ÓC2·þÎñÆ÷ÀÈ¡¸ü¶àµÄpayload¡£
https://www.securonix.com/blog/new-tacticaloctopus-attack-campaign-targets-us-entities-with-malware-bundled-in-tax-themed-documents/


¾©¹«Íø°²±¸11010802024551ºÅ