Western DigitalÔâµ½¹¥»÷My Cloud·þÎñÔÝʱÖÐÖ¹

Ðû²¼Ê±¼ä 2023-04-04

1¡¢Western DigitalÔâµ½¹¥»÷My Cloud·þÎñÔÝʱÖÐÖ¹


4ÔÂ3ÈÕ±¨µÀ £¬Western Digital³ÆÆäÔâµ½¹¥»÷ £¬Î´¾­ÊÚȨµÄµÚÈý·½»ñµÃÁËÆä¹«Ë¾¶à¸öϵͳµÄ»á¼ûȨÏÞ ¡£¾ÝϤ £¬¸ÃÊÂÎñÊÇÔÚ3ÔÂ26ÈÕ·¢Ã÷µÄ £¬ÏÖÔÚÊÓ²ìÉд¦ÓÚÔçÆÚ½×¶Î £¬¹«Ë¾ÕýÓëÖ´·¨²¿·ÖЭµ÷ÊÂÇé ¡£¾ÝÏÖ½×¶ÎÊÓ²ì £¬¹«Ë¾È·ÈϹ¥»÷Õß´ÓÆäϵͳÖлñÈ¡ÁËijЩÊý¾Ý £¬²¢ÔÚÆð¾¢ÏàʶÕâЩÊý¾ÝµÄÐÔ×Ӻ͹æÄ£ ¡£¸Ã¹«Ë¾³Æ £¬ÆäÓ¦¶Ô²½·¥¿ÉÄܵ¼Ö¹«Ë¾²¿·ÖÓªÒµÔËÓªÖÐÖ¹ ¡£×ÔÖÜÈÕÒÔÀ´ £¬¶à¸öMy CloudÓû§±¨¸æËûÃÇÎÞ·¨»á¼ûÔÆÍйÜýÌå´æ´¢¿â £¬µÇ¼ʱ»áÏÔʾ¡°503·þÎñÔÝʱ²»¿ÉÓá±¹ýʧ ¡£¾àÊ״α¨¸æÖÐÖ¹ÒÔÀ´ÒÑÁè¼Ý24Сʱ £¬ÔÆ¡¢´úÀí¡¢Web¡¢Éí·ÝÑéÖ¤¡¢µç×ÓÓʼþºÍÍÆËÍ֪ͨ¾ù²»¿ÉÓà ¡£


https://www.bleepingcomputer.com/news/security/western-digital-discloses-network-breach-my-cloud-service-down/


2¡¢Dish NetworkÒòÀÕË÷¹¥»÷ÊÂÎñÔâµ½¶àÆðÕûÌåËßËÏ


ýÌå4ÔÂ1ÈÕ³Æ £¬ÖÁÉÙÓÐÁù¼Ò״ʦÊÂÎñËùÕýÔÚ¶ÔDish NetworkÌáÆðÕûÌåËßËÏ £¬Ö¼ÔÚΪ2021Äê2ÔÂ22ÈÕÖÁ2023Äê2ÔÂ27ÈÕʱ´úÒòÉæÏÓ¡°Ö¤È¯Ú²Æ­¡±Êܵ½µ¹ÔËÓ°ÏìµÄDish¹É¶«×·»ØËðʧ ¡£ÃñÊÂËßËϳÆ £¬DISH NetworkÊÔͼÑÚÊÎÆäÍøÂçÇå¾²ºÍIT»ù´¡Éèʩȱ·¦µÄÊÂʵ £¬Í¬Ê±Ç¿µ÷ÆäÔËӪЧÂÊ ¡£ÓÉÓÚÉÏÊöÔµ¹ÊÔ­ÓÉ £¬¹«Ë¾ÎÞ·¨ÊÊÍâµØ±£»¤¿Í»§Êý¾Ý £¬Ê¹ÆäÈÝÒ×±»¹¥»÷Õß»á¼û ¡£2ÔÂ24ÈÕ×óÓÒ £¬DISHÉñÃØÏÂÏß £¬ÆäÍøÕ¾ºÍÓ¦ÓÃÍ£ÔËÊýÈÕ ¡£2ÔÂ28ÈÕ £¬DISH͸¶ÆäÔâµ½ÀÕË÷¹¥»÷ ¡£ÐÂÎÅ´«³öºó £¬Æä¹É¼Ûÿ¹Éϵø0.79ÃÀÔª ¡£


https://www.bleepingcomputer.com/news/security/dish-slapped-with-multiple-lawsuits-after-ransomware-cyber-attack/


3¡¢Winter VivernʹÓÃZimbraÎó²î¹¥»÷±±Ô¼¾üÕþºÍÍâ½»»ú¹¹


ProofpointÔÚ3ÔÂ30ÈÕÅû¶ÁËTA473£¨ÓÖÃûWinter Vivern£©Ê¹ÓÃZimbra Collaboration·þÎñÆ÷ÖÐÎó²î£¨CVE-2022-27926£©µÄ¹¥»÷»î¶¯ ¡£¹¥»÷ʼÓÚ2023Äê2Ô £¬Ö÷ÒªÕë¶ÔÓë±±Ô¼Ïà¹ØµÄÅ·ÖÞ¾üÊ¡¢Õþ¸®ºÍÍâ½»»ú¹¹ ¡£¹¥»÷ÕßʹÓÃAcunetixɨÃèδÐÞ¸´µÄÍøÂçÓʼþƽ̨²¢·¢ËÍ´¹ÂÚÓʼþ £¬ÓʼþÖеÄÁ´½Ó¿ÉʹÓÃZimbraÖÐÎó²î½«JavaScript payload×¢ÈëÍøÒ³ ¡£ÕâЩpayloadÓÃÓÚ´ÓÄ¿µÄÊÕµ½µÄcookieÖÐÇÔÈ¡Óû§Ãû¡¢ÃÜÂëºÍÁîÅÆ £¬À´»á¼ûÄ¿µÄµÄÓʼþÕÊ»§ ¡£×îºó £¬¹¥»÷Õß»á»á¼ûÓʼþÖеÄÃô¸ÐÐÅÏ¢ £¬»òÔÚÒ»¶Îʱ¼äÄÚ¼à¿ØÍ¨Ñ¶ ¡£


https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability


4¡¢¶à¸ö½©Ê¬ÍøÂçʹÓÃCactiºÍRealtekÎó²î·Ö·¢¶ñÒâÈí¼þ


3ÔÂ29ÈÕ £¬Fortinet³ÆÆäÔÚ½ñÄê1ÔÂÖÁ3Ô¼ì²âµ½¶à¸ö½©Ê¬ÍøÂçʹÓÃCactiºÍRealtekÎó²î £¬Ö¼ÔÚ·Ö·¢¶ñÒâÈí¼þShellBotºÍMoobot ¡£Îó²î»®·ÖΪRealtek Jungle SDKÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-35394£©ºÍCacti¹ÊÕϹÜÀí¼à¿Ø¹¤¾ßÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2022-46169£© ¡£MoobotÊÇMiraiµÄÒ»¸ö±äÖÖ £¬Ð°汾µÄÒ»¸öÏÔÖøÌØÕ÷ÊÇËüÃÇÄܹ»É¨Ã貢ɱËÀÆäËüÒÑÖªbotÀú³Ì £¬ÒÔ»ñµÃ×î´óÓ²¼þ¹¦ÂÊÀ´Ö´ÐÐDDoS¹¥»÷ ¡£ShellBotÓÚ½ñÄê1ÔÂÊ״α»·¢Ã÷ £¬Fortinet·¢Ã÷ÁËËüµÄÈý¸ö¼þ±äÌå £¬Åú×¢ËüÕýÔÚÆð¾¢¿ª·¢ÖÐ ¡£


https://www.fortinet.com/blog/threat-research/moobot-strikes-again-targeting-cacti-and-realtek-vulnerabilities


5¡¢Ñо¿Ö°Ô±Åû¶Azure SFXÖÐÎó²îSuper FabriXssµÄϸ½Ú


¾Ý3ÔÂ30ÈÕ±¨µÀ £¬Ñо¿Ö°Ô±Åû¶ÁËAzure Service Fabric Explorer(SFX)ÖÐÎó²îSuper FabriXssµÄϸ½Ú ¡£ÕâÊÇÒ»¸ö¿çÕ¾¾ç±¾Îó²î£¨CVE-2023-23383£© £¬Ãû×ÖȪԴÓÚ΢ÈíÔÚ2022Äê10ÔÂÐÞ¸´µÄFabriXssÎó²î£¨CVE-2022-35829£© ¡£Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓÃÆäÔÚService Fabric½ÚµãÉÏÍйܵÄÈÝÆ÷ÖÐʵÏÖÔ¶³Ì´úÂëÖ´ÐÐ £¬¶øÎÞÐèÉí·ÝÑéÖ¤ ¡£ÓëFabriXxs²î±ðµÄÊÇ £¬SuperFabriXxsÖ»±£´æÓÚWindows ClusterÖÐ £¬¿ÉÓÃÓÚ´ó¹æÄ£µÄ´úÂëÖ´Ðй¥»÷ ¡£Î¢ÈíÔÚ2023Äê3ÔµÄÖܶþ²¹¶¡ÖÐÐÞ¸´Á˸ÃÎó²î ¡£


https://orca.security/resources/blog/super-fabrixss-azure-vulnerability/


6¡¢Securonix·¢Ã÷Õë¶ÔÃÀ¹úµÄTACTICAL#OCTOPUS¹¥»÷»î¶¯


SecuronixÓÚ3ÔÂ30ÈÕ³ÆÆä·¢Ã÷ÁËÕë¶ÔÃÀ¹ú×éÖ¯µÄTACTICAL#OCTOPUS¹¥»÷»î¶¯ ¡£Ëæ×ÅÃÀ¹ú4ÔÂ15ÈÕÄÉ˰×èÖ¹ÈÕÆÚÁÚ½ü £¬Óë˰ÊÕÏà¹ØµÄ´¹ÂÚ¹¥»÷ÔöÌí ¡£¸Ã¹¥»÷»î¶¯Í¨³£Ê¼ÓÚÒ»¸öÊÜÃÜÂë±£»¤µÄ.zipÎļþ £¬ÆäÃû³ÆÓë˰ÎñÏà¹Ø ¡£.zipÎļþÖÐͨ³£°üÀ¨Ò»¸ö.pngºÍÒ»¸ö.lnk ¡£µ±Óû§Ë«»÷¿ì½Ý·½·¨Îļþʱ £¬´úÂë×îÏÈÖ´ÐÐ ¡£È»ºó £¬Ò»ÏµÁÐVBScriptºÍPowerShell stagers»á´ÓC2·þÎñÆ÷À­È¡¸ü¶àµÄpayload ¡£


https://www.securonix.com/blog/new-tacticaloctopus-attack-campaign-targets-us-entities-with-malware-bundled-in-tax-themed-documents/