ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ1ÖÜ

Ðû²¼Ê±¼ä 2021-01-04

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê12ÔÂ28ÈÕÖÁ2021Äê01ÔÂ03ÈÕ¹²ÊÕ¼Çå¾²Îó²î52¸ö£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇKLog Server actions/authenticate.phpÏÂÁî×¢ÈëÎó²î£»£»£»Solarwinds Orion Platform Request.PathInfoÇå¾²ÈÆ¹ýÎó²î£»£»£»Panasonic Security SystemÓ²±àÂëÎó²î£»£»£»Netgear NMS300 CVE-2020-35789ÏÂÁî×¢ÈëÎó²î£»£»£»NETGEAR D7800 CVE-2020-35791ÏÂÁî×¢ÈëÎó²î¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇApple iCloudÖÐÖ¹36Сʱ£¬£¬£¬£¬£¬£¬Éв»ÇåÎú¹ÊÕÏÔµ¹ÊÔ­ÓÉ£»£»£»GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬²âÊÔÔ±¹¤µÄ·´Ó¦£»£»£»Ð¶ñÒâÈí¼þ¿ÉʹÓÃImgurÀ´½âÂëCobalt Strike¾ç±¾£»£»£»ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖØ¹¤Ôâµ½¹¥»÷£¬£¬£¬£¬£¬£¬»ò½«µ¼ÖÂÊý¾Ýй¶£»£»£»WasabiÔÆ´æ´¢Ð§ÀÍÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.KLog Server actions/authenticate.phpÏÂÁî×¢ÈëÎó²î


KLog Server actions/authenticate.php±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿É×¢Èëí§ÒâOSÏÂÁî²¢Ö´ÐС£¡£¡£¡£¡£

https://github.com/mustgundogdu/Research/blob/main/KLOG_SERVER/Exploit_Code


2.Solarwinds Orion Platform Request.PathInfoÇå¾²ÈÆ¹ýÎó²î


Solarwinds Orion Platform Request.PathInfo±£´æÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÖ´ÐÐδÊÚȨµÄAPIÏÂÁî¡£¡£¡£¡£¡£

https://www.kb.cert.org/vuls/id/843464


3.Panasonic Security SystemÓ²±àÂëÎó²î


Panasonic Security System±£´ælkjhgfdsaÓ²±àÂëÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£¡£¡£

https://security.panasonic.com/products_technology/products/wv-s2231l/



4.Netgear NMS300 CVE-2020-35789ÏÂÁî×¢ÈëÎó²î


Netgear NMS300±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£¡£¡£

https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559


5.NETGEAR D7800 CVE-2020-35791ÏÂÁî×¢ÈëÎó²î


NETGEAR D7800±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£¡£¡£

https://kb.netgear.com/000062714/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0079


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Apple iCloudÖÐÖ¹36Сʱ£¬£¬£¬£¬£¬£¬Éв»ÇåÎú¹ÊÕÏÔµ¹ÊÔ­ÓÉ


1.jpg


Apple iCloudЧÀÍ·ºÆð¹ÊÕÏ£¬£¬£¬£¬£¬£¬Ê¹Óû§ÎÞ·¨µÇ¼¸ÃЧÀÍ»á¼ûÎļþ»òÉèÖÃÐÂ×°±¸¡£¡£¡£¡£¡£´Ë´ÎÖÐÖ¹´ÓÃÀ¹ú¶«²¿Ê±¼ä12ÔÂ25ÈÕÉÏÎç4:45×îÏÈ£¬£¬£¬£¬£¬£¬Ö±µ½12ÔÂ26ÈÕÏÂÖç4:35²Å±»ÐÞ¸´£¬£¬£¬£¬£¬£¬Àúʱ36Сʱ¡£¡£¡£¡£¡£ÖÐֹʱ´ú£¬£¬£¬£¬£¬£¬AppleµÄϵͳ״̬ҳÉϽöÏÔʾ¡°Óû§¿ÉÄÜÓöµ½´ËЧÀ͵ÄÎÊÌ⡱µÄÌáÐÑ£¬£¬£¬£¬£¬£¬Ã»Óиü¶àÓÐ¹ØÆäÖÐÖ¹µÄÐÅÏ¢¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Apple¹«Ë¾Ã»ÓÐÌṩÈκÎÒÔÕÏÔµ¹ÊÔ­ÓÉ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/apple/apple-icloud-outage-prevents-device-activations-access-to-data/


2¡¢GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬²âÊÔÔ±¹¤µÄ·´Ó¦


2.jpg


GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬ÒÔ²âÊÔÔ±¹¤¶ÔÍøÂç´¹ÂڻµÄ·´Ó¦¡£¡£¡£¡£¡£¸Ã²âÊÔÓÚ12Ô¾ÙÐУ¬£¬£¬£¬£¬£¬ÓʼþÉù³Æ½«Ìṩ650ÃÀÔªµÄÊ¥µ®½Ú½±½ð£¬£¬£¬£¬£¬£¬ÒÔ×ÊÖúÔ±¹¤Ó¦¶ÔÒòCOVID-19±¬·¢¶øµ¼Öµľ­¼ÃÎÊÌ⣬£¬£¬£¬£¬£¬²¢ÒªÇóËûÃÇÌîдСÎÒ˽¼ÒÐÅÏ¢±í¸ñ¡£¡£¡£¡£¡£Õâ´Î²âÊԻԼĪ500ÃûÔ±¹¤ÖÐÕУ¬£¬£¬£¬£¬£¬ËûÃǽ«±»ÒªÇóÖØÐ¼ÓÈëÉç»á¹¤³ÌÇå¾²ÒâʶµÄÅàѵ¡£¡£¡£¡£¡£ÓÉÓÚ²âÊÔÖÐʹÓõÄÓÕ¶üºÍÄ£Äâʱ¼äµÄÑ¡Ôñ£¬£¬£¬£¬£¬£¬¸ÃÒªÁìÊܵ½Á˲¿·ÖÍøÂçÇå¾²ÕûÌåµÄÆ·ÆÀ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112664/security/godaddy-phishing-test-employees.html


3¡¢Ð¶ñÒâÈí¼þ¿ÉʹÓÃImgurÀ´½âÂëCobalt Strike¾ç±¾


3.jpg


жñÒâÈí¼þ¿ÉʹÓÃͼÏñÍйÜЧÀÍImgurÏÂÔØÕýµ±µÄͼÏñ£¬£¬£¬£¬£¬£¬À´½âÂëCobalt Strike¾ç±¾¡£¡£¡£¡£¡£ÐµĶñÒâÈí¼þʹÓôøÓкêµÄWordÎļþ´ÓGitHubÏÂÔØPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬¸Ã¾ç±¾½«´ÓImgurÏÂÔØÏÖʵPNGÎļþ¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬Ê¹ÓÃÏñInvoke-PSImageÕâÑùµÄ¹¤¾ßÀ´Ê¹ÓÃPNGÎļþÖеÄÏñËØÖµ±àÂëPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬²¢ÌìÉúÒ»ÐÐÏÂÁîÀ´Ö´ÐÐpayload£¬£¬£¬£¬£¬£¬×îÖÕ»ñµÃCobalt Strike¾ç±¾¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÍƲâ´Ë¶ñÒâÈí¼þ¿ÉÄÜÓëÖ÷ÒªÕë¶ÔÖж«ÊµÌåµÄAPT×éÖ¯MuddyWaterÓйØ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/github-hosted-malware-calculates-cobalt-strike-payload-from-imgur-pic/


4¡¢ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖØ¹¤Ôâµ½¹¥»÷£¬£¬£¬£¬£¬£¬»ò½«µ¼ÖÂÊý¾Ýй¶


4.png


ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖØ¹¤Ôâµ½¹¥»÷£¬£¬£¬£¬£¬£¬»ò½«µ¼ÖÂÊý¾Ýй¶¡£¡£¡£¡£¡£´¨ÆéÖØ¹¤£¨Kawasaki£©³Æ£¬£¬£¬£¬£¬£¬2020Äê6ÔÂ11ÈÕÓÐδ¾­ÊÚȨµÄµÚÈý·½´ÓÌ©¹úЧÀÍ´¦»á¼ûÁËÈÕ±¾µÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÔÚ·¢Ã÷¸ÃÎÊÌâºóÁ½¸öÕ¾µãÖ®¼äµÄËùÓÐͨѶ¶¼±»×èÖ¹¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÓÖ·¢Ã÷ÁËÆäËûÍâÑóÕ¾µã£¨Ó¡¶ÈÄáÎ÷ÑÇ¡¢·ÆÂɱöºÍÃÀ¹ú£©Î´¾­ÊÚȨ»á¼ûÈÕ±¾Ð§ÀÍÆ÷µÄÇéÐΣ¬£¬£¬£¬£¬£¬²¢ÇжÏͨѶ¡£¡£¡£¡£¡£´¨Æé³Æ´Ë´Î¹¥»÷ʹÓÃÁËÏȽøÊÖÒÕ¶øÃ»ÓÐÁôÏÂÈκκۼ£ºÍÖ¤¾Ý£¬£¬£¬£¬£¬£¬µ«¹«Ë¾Êý¾Ý»òÐíÒѾ­Ð¹Â¶¡£¡£¡£¡£¡£ËùÓб»ÖÕÖ¹µÄͨѶÓÚ11ÔÂ30ÈÕ»Ö¸´Õý³£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112765/data-breach/kawasaki-heavy-industries-cyber-attack.html


5¡¢WasabiÔÆ´æ´¢Ð§ÀÍÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ


5.png


WasabiÔÆ´æ´¢Ð§ÀÍÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ¡£¡£¡£¡£¡£12ÔÂ28ÈÕÏÂÖç2:30 ESTÓû§·¢Ã÷ÎÞ·¨»á¼ûwasabisys.comÉϵĴ洢Ͱ£¬£¬£¬£¬£¬£¬WasabiÔÚÖÐÖ¹±¨¸æÖгÆÊÇÓÉÓÚDNSÆÊÎöÎÊÌâµ¼Ö¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬¸Ãƽ̨Óû§ÉÏ´«Á˶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÆäÓòÃû³Æ×¢²áÉÌ·¢Ã÷ºóÏëҪͨ¹ýµç×ÓÓʼþ֪ͨWasabi£¬£¬£¬£¬£¬£¬È´°Ñ±¨¸æ×ª·¢µ½Á˹ýʧµÄµØµã£¬£¬£¬£¬£¬£¬Ê¹µÃWasabiδ»ñµÃ֪ͨ¡£¡£¡£¡£¡£¶ø¸Ã×¢²áÉÌÒòδ»ñµÃ»Ø¸´¶øÔÝÍ£Á˸ÃÓò£¬£¬£¬£¬£¬£¬WasabiÔÚµÃÖª¸ÃÊÂÎñºóɾ³ýÁËÍйܶñÒâÈí¼þ²¢ÒªÇóÖØÐ¼¤»î¸ÃÓò£¬£¬£¬£¬£¬£¬Æ½Ì¨ÔÚ12ÔÂ29ÈÕÏÂÖç12:57 ESTÖÕÓÚ»ñµÃ»Ö¸´¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/wasabi-cloud-storage-service-knocked-offline-for-hosting-malware/