VeeamÐû²¼¸üÐÂÐÞ¸´Veeam ONE¼à¿ØÆ½Ì¨Öжà¸öÎó²î
Ðû²¼Ê±¼ä 2023-11-081¡¢VeeamÐû²¼¸üÐÂÐÞ¸´Veeam ONE¼à¿ØÆ½Ì¨Öжà¸öÎó²î
11ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬VeeamÐû²¼ÁËÇå¾²¸üÐÂÒÔÐÞ¸´Veeam ONE IT»ù´¡ÉèÊ©¼à¿ØºÍÆÊÎöƽ̨ÖеÄ4¸öÎó²î¡£¡£¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÊÇCVE-2023-38547(CVSSÆÀ·Ö9.9)£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÀ´»ñÈ¡ÓйØVeeam ONEÓÃÓÚ»á¼ûÆäÉèÖÃÊý¾Ý¿âµÄSQLЧÀÍÆ÷ÅþÁ¬µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ»£»£»£»£»£»ÒÔ¼°CVE-2023-38548£¨CVSSÆÀ·Ö9.8£©£¬£¬£¬£¬£¬£¬£¬¿É»ñÈ¡Veeam ONE Reporting ServiceËùʹÓÃÕÊ»§µÄNTLM¹þÏ£¡£¡£¡£¡£¡£ÁíÍâÁ½¸öÊÇ¿Éͨ¹ýXSS¹¥»÷ÇÔÈ¡ÖÎÀíÔ±ÁîÅÆµÄÎó²î£¨CVE-2023-38549£©ºÍ¿É»á¼ûDashboard ScheduleµÄÎó²î£¨CVE-2023-41723£©¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-bugs-in-veeam-one-monitoring-platform/
2¡¢ÈÕ±¾º½¿Õµç×Ó¹«Ë¾Ôâµ½AlphVµÄ¹¥»÷ÔËÓªÊܵ½Ó°Ïì
¾Ý11ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÈÕ±¾º½¿Õµç×Ó¹«Ë¾Í¸Â¶£¬£¬£¬£¬£¬£¬£¬ÆäϵͳÔâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÍøÕ¾±»ÆÈ¹Ø±Õ¡£¡£¡£¡£¡£ÖÜÒ»ÍíÉÏ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾µÄÍøÕ¾ÏÔʾÁËÒ»ÌõÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬Åú×¢Æä²¿·ÖЧÀÍÆ÷ÔÚÉÏÖÜËı»ºÚ¡£¡£¡£¡£¡£Õâ¼Ò¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÏÖÔÚÕýÔÚÊÓ²ìÈëÇÖÇéÐβ¢»Ö¸´ÔËÓª£¬£¬£¬£¬£¬£¬£¬µ«Ò»Ð©ÏµÍ³ÒѾÖÐÖ¹£¬£¬£¬£¬£¬£¬£¬ÊÕ·¢µç×ÓÓʼþÒ²·ºÆðÁËһЩÑÓÎ󣬣¬£¬£¬£¬£¬£¬ÉÐδ·¢Ã÷ÐÅϢй¶¡£¡£¡£¡£¡£AlphVÔÚ±¾ÖÜÒ»½«ÈÕ±¾º½¿Õµç×Ó¹«Ë¾¼ÓÈëÆäÍøÕ¾£¬£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾ÉÐδ͸¶ÊÇ·ñÕýÔÚÓ¦¶ÔÀÕË÷¹¥»÷¡£¡£¡£¡£¡£
https://therecord.media/japan-aviation-electronics-says-servers-accessed-during-cyberattack
3¡¢Unit 42·¢Ã÷AgriusÕë¶ÔÒÔÉ«ÁнÌÓýºÍ¿Æ¼¼ÐÐÒµµÄ¹¥»÷
Unit 42ÔÚ11ÔÂ6ÈÕ³ÆÆä·¢Ã÷ÁËAgriusÕë¶ÔÒÔÉ«ÁнÌÓýºÍ¿Æ¼¼ÐÐÒµµÄ¹¥»÷¡£¡£¡£¡£¡£ÕâЩ¹¥»÷´Ó1ÔÂÒ»Ö±Ò»Á¬µ½10Ô£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡PIIºÍ֪ʶ²úȨµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£Ò»µ©ÇÔÈ¡ÁËÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õ߾ͻá×°ÖÃÖݪֲÁ³ý³ÌÐò£¬£¬£¬£¬£¬£¬£¬À´ÑÚÊÎÆä×Ù¼£²¢Ê¹±»Ñ¬È¾µÄÖÕ¶ËÎÞ·¨Ê¹Óᣡ£¡£¡£¡£×î½üµÄ¹¥»÷»¹Ê¹ÓõÄ3ÖÖеIJÁ³ý³ÌÐò£¬£¬£¬£¬£¬£¬£¬MultiLayer Wiper¡¢PartialWasherºÍBFG Agonizer Wiper£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ò»¸ö´ÓÊý¾Ý¿âЧÀÍÆ÷ÌáÊØÐÅÏ¢µÄ×Ô½ç˵¹¤¾ßSqlextractor¡£¡£¡£¡£¡£
https://unit42.paloaltonetworks.com/agonizing-serpens-targets-israeli-tech-higher-ed-sectors/
4¡¢Google³Æ¶à¸öÍÅ»ïÊÔͼ½«ÆäÈÕÀúЧÀÍÓÃ×÷C2»ù´¡ÉèÊ©
¾ÝýÌå11ÔÂ6ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬GoogleÌáÐѶà¸ö¹¥»÷ÍÅ»ïÕýÔÚ¹²ÏíÒ»¸öÃûΪGoogle Calendar RAT(GCR)µÄPoC£¬£¬£¬£¬£¬£¬£¬ËüʹÓÃÈÕÀúЧÀÍÀ´ÍйÜÏÂÁîºÍ¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©¡£¡£¡£¡£¡£Æä¿ª·¢ÕßÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¸Ã¾ç±¾Í¨¹ýʹÓÃGoogleÈÕÀúÖеÄÊÂÎñÐÎò½¨ÉèÁËÒ»¸ö¡°Òþ²ØÍ¨µÀ¡±£¬£¬£¬£¬£¬£¬£¬Ä¿µÄ½«Ö±½ÓÅþÁ¬µ½Google¡£¡£¡£¡£¡£Google³ÆÉÐδ·¢Ã÷GCRÔÚÒ°ÍâµÄʹÓÃÇéÐΣ¬£¬£¬£¬£¬£¬£¬µ«Mandiant×¢ÖØµ½¶à¸öÍÅ»ïÔÚºÚ¿ÍÂÛ̳ÉÏ·ÖÏíÁËPoC£¬£¬£¬£¬£¬£¬£¬Õâ˵Ã÷ÎúËûÃǶÔÀÄÓÃÔÆÐ§À͸ÐÐËȤ¡£¡£¡£¡£¡£
https://securityaffairs.com/153700/hacking/google-calendar-rat-attacks.html
5¡¢VMwareÅû¶JupyterбäÌåÔÚ½üÆÚ¼¤ÔöµÄ¹¥»÷»î¶¯
VMwareÔÚ11ÔÂ6ÈÕÅû¶ÁËJupyter Infostealer±äÌåÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÚ2020Äêµ×Ê״α»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô½ÌÓýºÍÎÀÉú²¿·Ö¡£¡£¡£¡£¡£ÒÑÍùÁ½ÖÜ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÊӲ쵽µÄJupyter InfostealerѬȾÊýÄ¿Öð²½ÉÏÉý£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚѬȾ×ÜÊýΪ26Àý¡£¡£¡£¡£¡£ËüÕë¶ÔChrome¡¢EdgeºÍFirefoxä¯ÀÀÆ÷£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃSEOÖж¾ºÍËÑË÷ÒýÇæÖØ¶¨ÏòÀ´Èö²¥¡£¡£¡£¡£¡£ÐÂÒ»ÂֵĹ¥»÷ʹÓÃÁËPowerShellÏÂÁîÀ´Ð޸ĺÍÊðÃû˽Կ£¬£¬£¬£¬£¬£¬£¬ÊÔͼ½«¶ñÒâÈí¼þð³äΪÕýµ±ÊðÃûµÄÎļþ¡£¡£¡£¡£¡£
https://blogs.vmware.com/security/2023/11/jupyter-rising-an-update-on-jupyter-infostealer.html
6¡¢KasperskyÐû²¼2023ÄêÓëÓÎÏ·Ïà¹ØµÄÍøÂçÍþвµÄ±¨¸æ
11ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬KasperskyÐû²¼ÁË2023ÄêÓëÓÎÏ·Ïà¹ØµÄÍøÂçÍþвµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¸Ã±¨¸æÆÊÎöÁË2022Äê7ÔÂ1ÈÕÖÁ2023Äê7ÔÂ1ÈÕʱ´úÍøÂçµÄÊý¾Ý¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Kaspersky×ܹ²¼ì²âµ½4076530´ÎÓëÓÎÏ·Ïà¹ØµÄ×ÀÃæÑ¬È¾ÊµÑ飬£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÈ«Çò192456ÃûÓÎÏ·Íæ¼Ò¡£¡£¡£¡£¡£×î³£¼ûµÄÍþвÊÇÏÂÔØ³ÌÐò£¨89.70%£©£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇ¹ã¸æÈí¼þ£¨5.25%£©ºÍľÂí£¨2.39%£©¡£¡£¡£¡£¡£×î³£±»ÓÃ×÷ÓÕ¶üµÄÊÇÎÒµÄÌìÏ£¨70.29%£©£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇRoblox£¨20.37%£©¡¢·´¿Ö¾«Ó¢£ºÈ«Çò¹¥ÊÆ£¨4.78%£©ºÍ¾øµØÇóÉú£¨2.85%£©¡£¡£¡£¡£¡£
https://securelist.com/game-related-threat-report-2023/110960/