΢ÈíÐû²¼11ÔÂÇå¾²¸üÐÂÐÞ¸´3¸öÒѱ»Ê¹ÓõÄÎó²î

Ðû²¼Ê±¼ä 2023-11-15
1¡¢Î¢ÈíÐû²¼11ÔÂÇå¾²¸üÐÂÐÞ¸´3¸öÒѱ»Ê¹ÓõÄÎó²î


΢ÈíÔÚ11ÔÂ14ÈÕÐû²¼Á˱¾ÔµÄÖܶþ²¹¶¡£¡£¡£ ¡£¡£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´ÁË58¸öÎó²î£¬£¬£¬£¬£¬£¬°üÀ¨5¸ö0day¡£¡£¡£ ¡£¡£´Ë´ÎÐÞ¸´µÄ0dayÖУ¬£¬£¬£¬£¬£¬WindowsÔÆÎļþ΢ÐÍɸѡÆ÷Çý¶¯³ÌÐòÌáȨÎó²î£¨CVE-2023-36036£©¡¢Windows DWM½¹µã¿âÌáȨÎó²î£¨CVE-2023-36033£©ºÍWindows SmartScreenÇå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2023-36025£©Òѱ»Ê¹Ó㬣¬£¬£¬£¬£¬Microsoft OfficeÇå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2023-36413£©ºÍASP.NET Core¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2023-36038£©Ò²Òѱ»¹ûÕæÅû¶¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2023-patch-tuesday-fixes-5-zero-days-58-flaws/


2¡¢SektorCERTÅû¶µ¤ÂóµÄ»ù´¡ÉèÊ©Ôâµ½´ó¹æÄ£¹¥»÷


¾Ý11ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬µ¤ÂóÒªº¦²¿·ÖµÄ·ÇÓªÀûÍøÂçÇå¾²ÖÐÐÄSektorCERTÅû¶£¬£¬£¬£¬£¬£¬ÆäÒªº¦»ù´¡ÉèÊ©Ôâµ½ÁËÓÐÊ·ÒÔÀ´×î´ó¹æÄ£µÄÍøÂç¹¥»÷¡£¡£¡£ ¡£¡£µÚÒ»²¨¹¥»÷ÓÚ5ÔÂ11ÈÕÌᳫ£¬£¬£¬£¬£¬£¬¶ÌÔÝͣЪºó£¬£¬£¬£¬£¬£¬µÚ¶þ²¨¹¥»÷ÓÚ5ÔÂ22ÈÕ×îÏÈ£¬£¬£¬£¬£¬£¬SektorCERTÓÚ5ÔÂ22ÈÕÒâʶµ½ÕâЩ¹¥»÷¡£¡£¡£ ¡£¡£¹¥»÷ÕßʹÓÃZyxel·À»ðǽÖеÄÎó²î£¨CVE-2023-28771£©£¬£¬£¬£¬£¬£¬ÈëÇÖÁË22¼Ò´ÓÊÂÄÜÔ´»ù´¡ÉèÊ©ÔËÓªµÄ¹«Ë¾¡£¡£¡£ ¡£¡£SektorCERTÒÔΪ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÕÆÎÕÁËÄ¿µÄµÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬ºÜ¿ÉÄÜÊÇͨ¹ý֮ǰδ±»·¢Ã÷µÄÕì̽»î¶¯ÍøÂçµÄ¡£¡£¡£ ¡£¡£²¢ÇÒÕâЩ¹¥»÷¿ÉÄÜÊǶà¸öÍÅ»ïÖ´Ðе쬣¬£¬£¬£¬£¬ÆäÖÐÖÁÉÙÓÐÒ»¸ö¿É¹éÒòÓÚSandworm¡£¡£¡£ ¡£¡£


https://securityaffairs.com/154156/apt/denmark-critical-infrastructure-record-attacks.html


3¡¢RoyalÒÑÈëÇÖÖÁÉÙ350¸öÄ¿µÄ²¢ÀÕË÷Áè¼Ý2.75ÒÚÃÀÔª


11ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬FBIºÍCISAÐû²¼Á˹ØÓÚÀÕË÷Èí¼þRoyalµÄÁªºÏÍøÂçÇå¾²×Éѯ(CSA)¡£¡£¡£ ¡£¡£¸Ã×Éѯָ³ö£¬£¬£¬£¬£¬£¬×Ô2022Äê9ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬RoyalÒѹ¥»÷È«Çò350¶à¸öÄ¿µÄ£¬£¬£¬£¬£¬£¬Ìá³öÁËÁè¼Ý2.75ÒÚÃÀÔªµÄÀÕË÷ÒªÇ󡣡£¡£ ¡£¡£´¹ÂÚÓʼþÊÇRoyal¾ÙÐгõʼ»á¼ûµÄ×îÀֳɵÄÔØÌåÖ®Ò»¡£¡£¡£ ¡£¡£Óм£ÏóÅú×¢£¬£¬£¬£¬£¬£¬Royal¿ÉÄÜÕýÔÚÎªÆ·ÅÆÖØËܺÍ/»òÑÜÉú±äÌå×ö×¼±¸£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þBlacksuit¾ßÓÐÐí¶àÓëRoyalÏàËÆµÄ±àÂëÌØÕ÷¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/fbi-royal-ransomware-asked-350-victims-to-pay-275-million/


4¡¢HuntersÉù³ÆÒÑÍøÂçHomeland¹«Ë¾Áè¼Ý200GBµÄÊý¾Ý


¾ÝýÌå11ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Hunters International½«ÃÀ¹úÎïÒµÖÎÀí¹«Ë¾HomelandÌí¼Óµ½ÁËÆäÍøÕ¾ÖС£¡£¡£ ¡£¡£¹¥»÷ÕßÉù³ÆÒÑÍøÂç183793¸öÎļþ£¬£¬£¬£¬£¬£¬¹²204.1GB£¬£¬£¬£¬£¬£¬»¹ÔÚÍøÕ¾ÉÏÐû²¼ÁËÒ»·ÝÎļþÑù±¾×÷ΪÀÕË÷Ö¤¾Ý¡£¡£¡£ ¡£¡£Ñù±¾Îļþ°üÀ¨×â»§µÄ³öÉúÈÕÆÚ¡¢µØµã¡¢ÄêÊÕÈëºÍ×â½ðÏêϸÐÅÏ¢µÈСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£ ¡£¡£Hunters͸¶¹¥»÷±¬·¢ÓÚ10ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬ËûÃÇÖª×ãHomelandµÄÒªÇóÌṩ½âÃܹ¤¾ßÑÝʾºÍй¶Êý¾ÝÑù±¾ºóûÓÐÊÕµ½Èκλظ´£¬£¬£¬£¬£¬£¬»¹ÌåÏָù«Ë¾ÐèÒªÔÚ11ÔÂ18ÈÕ֮ǰ×ö³ö»ØÓ¦¡£¡£¡£ ¡£¡£


https://www.databreaches.net/property-management-firm-homeland-inc-allegedly-hacked-hackers-claim-to-have-hundreds-of-thousands-of-ssn-of-tenants/


5¡¢AhnLab¼ì²âµ½Ê¹ÓÃDdostf¹¥»÷MySQLЧÀÍÆ÷µÄ»î¶¯


AhnLabÓÚ11ÔÂ14Èճƣ¬£¬£¬£¬£¬£¬×î½ü·¢Ã÷ÔÚMySQLЧÀÍÆ÷ÉÏ×°ÖÃDdostfµÄ»î¶¯¡£¡£¡£ ¡£¡£DDdostfÊÇÒ»ÖÖDDoS bot£¬£¬£¬£¬£¬£¬¶ÔÌØ¶¨Ä¿µÄÖ´ÐÐDDoS¹¥»÷£¬£¬£¬£¬£¬£¬ÓÚ2016Äê×óÓÒÊ״α»·¢Ã÷¡£¡£¡£ ¡£¡£ÔڿɹûÕæ»á¼ûµÄϵͳÖУ¬£¬£¬£¬£¬£¬É¨Ãè³ÌÐò»áËÑË÷ʹÓÃ3306/TCP¶Ë¿ÚµÄϵͳ£¬£¬£¬£¬£¬£¬È»ºóÖ´Ðб©Á¦¹¥»÷»ò×ֵ乥»÷£¬£¬£¬£¬£¬£¬»¹¿ÉÄÜ»á¼ûÖÎÀíÔ±ÕÊ»§Æ¾Ö¤¡£¡£¡£ ¡£¡£ÈôÊÇϵͳÔËÐеÄÊDZ£´æÎó²îµÄδÐÞ¸´°æ±¾£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÀ´Ö´ÐÐÏÂÁ£¬£¬£¬£¬£¬¶øÎÞÐèÉÏÊöÀú³Ì¡£¡£¡£ ¡£¡£Ä¿µÄϵͳµÄѬȾÈÕÖ¾Åú×¢£¬£¬£¬£¬£¬£¬³ýÁËDdostfÖ®Í⣬£¬£¬£¬£¬£¬Ä¿µÄϵͳÉÏ»¹±»×°ÖÃÁ˶ñÒâUDF DLL¡£¡£¡£ ¡£¡£


https://asec.ahnlab.com/en/58878/


6¡¢Cado·¢Ã÷Õë¶ÔDocker Engine APIµÄ½©Ê¬ÍøÂçOracleIV 


11ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬CadoÅû¶ÁË×î½ü·¢Ã÷µÄÒ»ÆðÕë¶Ô¹ûÕæDocker Engine APIʵÀýµÄл¡£¡£¡£ ¡£¡£Ôڴ˻ÖУ¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃDockerÈÝÆ÷ÖеĹýʧÉèÖÃÀ´Èö²¥±àÒëΪELF¿ÉÖ´ÐÐÎļþµÄPython¶ñÒâÈí¼þ¡£¡£¡£ ¡£¡£¸Ã¶ñÒâÈí¼þ×Ô¼º³äµ±DDoS botÊðÀí£¬£¬£¬£¬£¬£¬Äܹ»Í¨¹ý¶àÖÖÒªÁì¾ÙÐÐDoS¹¥»÷¡£¡£¡£ ¡£¡£ÔÚеÄOracleIV DDoS½©Ê¬ÍøÂç¶ñÒâÈí¼þÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýHTTP POSTÇëÇóÆô¶¯¶ÔDocker APIµÄ»á¼û¡£¡£¡£ ¡£¡£Õâ»á´¥·¢docker pullÏÂÁ£¬£¬£¬£¬£¬´ÓDockerhub»ñȡָ¶¨¾µÏñ¡£¡£¡£ ¡£¡£


https://www.cadosecurity.com/oracleiv-a-dockerised-ddos-botnet/