Atlassian¸üÐÂÐÞ¸´ÆäCrowdºÍBitbucketÖеÄÎó²î

Ðû²¼Ê±¼ä 2022-11-21
1¡¢AtlassianÐû²¼¸üÐÂÐÞ¸´ÆäCrowdºÍBitbucketÖеÄÎó²î

¾ÝýÌå11ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬AtlassianÐû²¼¸üУ¬£¬£¬£¬£¬ £¬ÒÔÐÞ¸´Æä¼¯ÖÐʽÉí·ÝÖÎÀíÆ½Ì¨Crowd Server and Data Center,ÒÔ¼°Git´æ´¢¿âÖÎÃ÷È·¾ö¼Æ»®Bitbucket Server and Data CenterÖеÄÎó²î¡£¡£¡£¡£¡£ÆäÖÐÖ®Ò»ÊÇÏÂÁî×¢ÈëÎó²î£¨CVE-2022-43781£©£¬£¬£¬£¬£¬ £¬¾ßÓпØÖÆÆäÓû§ÃûȨÏ޵Ĺ¥»÷ÕßÔÚÌØ¶¨Ìõ¼þÏ¿ÉÔÚÄ¿µÄϵͳÉÏÖ´ÐдúÂë¡£¡£¡£¡£¡£ÁíÒ»¸öÊÇÇå¾²ÉèÖùýʧÎÊÌ⣨CVE-2022-43782£©£¬£¬£¬£¬£¬ £¬¹¥»÷Õß¿ÉÔÚÈÏ֤ΪCrowdÓ¦ÓóÌÐòÊ±ÈÆ¹ýÃÜÂë¼ì²é£¬£¬£¬£¬£¬ £¬²¢Å²ÓÃÓÐÌØÈ¨µÄAPI¶Ëµã¡£¡£¡£¡£¡£

https://securityaffairs.co/wordpress/138716/security/atlassian-critical-flaws-crowd-bitbucket.html

2¡¢Earth PretaʹÓÃGoogle Drive´¹ÂÚ¹¥»÷È«ÇòÕþ¸®×éÖ¯

TrendMicroÔÚ11ÔÂ18ÈÕÅû¶ÁËEarth PretaÕë¶ÔÈ«ÇòµÄÓã²æÊ½´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£´Ë´Î´ó¹æÄ£»£»£»£»£»£»£»î¶¯Ê¼ÓÚ½ñÄê3ÔÂ×óÓÒ£¬£¬£¬£¬£¬ £¬Éæ¼°Ãåµé¡¢°Ä´óÀûÑÇ¡¢·ÆÂɱö¡¢ÈÕ±¾ºÍÖйų́ÍåµÈµØ¡£¡£¡£¡£¡£Earth PretaʹÓÃÁËÐéαµÄGoogleÕÊ»§£¬£¬£¬£¬£¬ £¬Í¨¹ý´¹ÂÚÓʼþ·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¡£Ëü×î³õ´æ´¢ÔÚ´æµµÎļþ£¨ÀýÈç rar/zip/jar£©ÖУ¬£¬£¬£¬£¬ £¬²¢Í¨¹ýGoogle DriveÁ´½Ó·Ö·¢¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬¹¥»÷Õß»¹Ê¹ÓÃˢеÄÈÆ¹ý¼ì²âºÍÆÊÎöµÄÊÖÒÕ£¬£¬£¬£¬£¬ £¬ÀýÈç´úÂë»ìÏýºÍ×Ô½ç˵Òì³£´¦Öóͷ£³ÌÐò£¬£¬£¬£¬£¬ £¬À´·Ö·¢¶¨ÖƵĶñÒâÈí¼þϵÁУ¬£¬£¬£¬£¬ £¬ÈçTONEINS¡¢TONESHELLºÍPUBLOAD¡£¡£¡£¡£¡£

https://www.trendmicro.com/en_us/research/22/k/earth-preta-spear-phishing-governments-worldwide.html

3¡¢Ä³ÉèÖùýʧµÄESЧÀÍÆ÷й¶15ÍòÌõMastodonÓû§ÐÅÏ¢

ýÌå11ÔÂ18Èճƣ¬£¬£¬£¬£¬ £¬Ñо¿ÍŶӷ¢Ã÷ijÉèÖùýʧµÄElasticsearchЧÀÍÆ÷й¶ÁËÁè¼Ý15ÍòÌõMastodonÓû§µÄÐÅÏ¢¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2022Äê11ÔÂ15ÈÕ¼ì²âµ½¸ÃЧÀÍÆ÷£¬£¬£¬£¬£¬ £¬µ«Éв»ÇåÎúËü¼ÍÈÎÃü»§ÐÅÏ¢µÄʱ¼äÓж೤¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ £¬¸ÃЧÀÍÆ÷ÊôÓÚµÚÈý·½¶ø²»ÊÇMastodon¹Ù·½£¬£¬£¬£¬£¬ £¬Ö¼ÔÚ´ÓMastodonÓû§ÄÇÀï×¥ÊØÐÅÏ¢¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨ÕÊ»§Ãû³Æ¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼƬ¡¢·ÛË¿ÊýºÍ¹Ø×¢ÊýµÈ£¬£¬£¬£¬£¬ £¬ÏÖÔÚÈÔÎÞ·¨È·¶¨Ð§ÀÍÆ÷µÄËùÓÐÕß¡£¡£¡£¡£¡£

https://www.hackread.com/leaky-server-mastodon-users-data/

4¡¢CISA͸¶HiveÒÑ´Ó1300¶à¼Ò¹«Ë¾ÀÕË÷Áè¼Ý1ÒÚÃÀÔªÊê½ð

11ÔÂ18ÈÕ£¬£¬£¬£¬£¬ £¬FBI¡¢CISAºÍHHSÁªºÏÐû²¼Á˹ØÓÚHiveÀÕË÷Èí¼þµÄÇå¾²×Éѯ¡£¡£¡£¡£¡£Æ¾Ö¤FBIµÄÐÅÏ¢£¬£¬£¬£¬£¬ £¬×èÖ¹2022Äê11Ô£¬£¬£¬£¬£¬ £¬HiveÒѹ¥»÷È«Çò1300¶à¸ö×éÖ¯£¬£¬£¬£¬£¬ £¬²¢ÀÖ³ÉÀÕË÷Ô¼1ÒÚÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£¹¥»÷ÕßÕë¶ÔÆÕ±éµÄÐÐÒµºÍÒªº¦»ù´¡ÉèÊ©²¿·Ö£¬£¬£¬£¬£¬ £¬ÀýÈçÕþ¸®×éÖ¯¡¢Í¨Ñ¶¡¢ÖÆÔì¡¢ÐÅÏ¢ÊÖÒÕÒÔ¼°Ò½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú(HPH)ÐÐÒµ¡£¡£¡£¡£¡£Hiveͨ¹ýRDP¡¢VPNºÍÆäËüÔ¶³ÌÍøÂçÅþÁ¬Ð­Ò飬£¬£¬£¬£¬ £¬Ê¹Óõ¥ÒòËØµÇ¼»ñµÃ¶ÔÄ¿µÄÍøÂçµÄ³õʼ»á¼ûȨÏÞ¡£¡£¡£¡£¡£ÓÐʱ£¬£¬£¬£¬£¬ £¬Ëû»¹ÈƹýÁËMFA£¬£¬£¬£¬£¬ £¬²¢Í¨¹ýʹÓó£¼ûÎó²îCVE-2020-12812»ñµÃ¶ÔFortiOSЧÀÍÆ÷µÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¸Ã×Éѯ¹ûÕæÁ˹ØÓÚHive IOCºÍTTPµÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£

https://www.cisa.gov/uscert/ncas/alerts/aa22-321a

5¡¢ÀÕË÷ÍÅ»ïDaixinÉù³Æ¶ÔÂíÀ´Î÷ÑǵÄÑǺ½¼¯ÍŵĹ¥»÷ÈÏÕæ

¾Ý11ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬ÂíÀ´Î÷Ñǵͱ¾Ç®º½¿Õ¹«Ë¾ÑǺ½¼¯ÍÅÔâµ½DaixinµÄ¹¥»÷¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ11ÔÂ11ÈÕÖÁ12ÈÕ£¬£¬£¬£¬£¬ £¬¹¥»÷Õß³ÆÒÑÇÔÈ¡500ÍòÂÿͺÍËùÓÐÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£DaixinÌṩÁËÁ½¸öÎļþ£¬£¬£¬£¬£¬ £¬Ò»·ÝÎļþ°üÀ¨ÓйØÖ¸¶¨Âÿ͵ÄÐÅÏ¢£¬£¬£¬£¬£¬ £¬ÁíÒ»·Ý°üÀ¨Ô±¹¤ÐÅÏ¢¡£¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬£¬ £¬ÑǺ½ÔÚ̸ÅÐʱûÓÐʵÑéЭÉÌÊê½ð½ð¶î£¬£¬£¬£¬£¬ £¬Õâ¿ÉÄÜÅú×¢ËûÃÇ¿ÉÄÜ´ÓδÍýÏëÖ§¸¶ÈκÎÓöȡ£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬Daixin½²»°ÈËÇ¿µ÷£¬£¬£¬£¬£¬ £¬ÔÚ¼ÓÃÜÎļþʱ£¬£¬£¬£¬£¬ £¬ÆäÈÆ¹ýÁË"XEN¡¢RHEL--º½ÐÐ×°±¸µÄÖ÷»ú£¨À×´ï¡¢¿ÕÖн»Í¨¹ÜÖÆµÈ£©"¡£¡£¡£¡£¡£DaixinÔøÉùÃ÷£¬£¬£¬£¬£¬ £¬ÈôÊÇЧ¹û¿ÉÄÜΣ¼°ÉúÃü£¬£¬£¬£¬£¬ £¬ËûÃǽ«×èÖ¹¼ÓÃÜ»òÏú»ÙÈκι¤¾ß¡£¡£¡£¡£¡£

https://www.databreaches.net/airasia-victim-of-ransomware-attack-passenger-and-employee-data-acquired/

6¡¢CiscoÐû²¼¹ØÓÚÔÚÒ°·¢Ã÷µÄLodaRATбäÌåµÄÆÊÎö±¨¸æ

11ÔÂ17ÈÕ£¬£¬£¬£¬£¬ £¬Cisco TalosÐû²¼Á˹ØÓÚLodaRATбäÌåµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2022Äêʱ´ú¶ÔLodaRAT¶ñÒâÈí¼þ¾ÙÐмà²â£¬£¬£¬£¬£¬ £¬ÔÚ½üÆÚ·¢Ã÷ÁËËüÓëÆäËü¶ñÒâÈí¼þ£¨°üÀ¨RedLineºÍNeshta£©Ò»Æð·Ö·¢µÄа汾¡£¡£¡£¡£¡£LodaRATÊÇÓÃAutoIt¿ª·¢µÄ£¬£¬£¬£¬£¬ £¬Í¨³£»£»£»£»£»£»£»áʹÓú¯Êý»ìÏýÒÔ¼°×Ö·û´®±àÂëÀ´ÈÆÌ«¹ýÎö¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬Ð°汾һ¸öÖØ´óµÄ¸Ä¶¯ÊÇÍêÈ«ÖØÐ´Á˼ì²â·´¶ñÒâÈí¼þÀú³ÌµÄº¯Êý£¬£¬£¬£¬£¬ £¬Ðº¯ÊýËÑË÷ÈýÊ®¸ö²î±ðµÄÀú³ÌÃû³Æ£¬£¬£¬£¬£¬ £¬¶øÔ­À´µÄ±äÌåÖ´ÐÐWMIÅÌÎÊÒÔö¾ÙËùÓÐAVÀú³Ì¡£¡£¡£¡£¡£µ«Õâ¸öк¯ÊýµÄЧ¹ûÔ¶²»Èçǰһ¸ö£¬£¬£¬£¬£¬ £¬ÓÉÓڸù¦Ð§²»»á¼ì²âδ°üÀ¨ÔÚÒªËÑË÷µÄÀú³ÌÁбíÖеIJúÆ·¡£¡£¡£¡£¡£

https://blog.talosintelligence.com/get-a-loda-this/