ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ1ÖÜ
Ðû²¼Ê±¼ä 2021-01-04> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2020Äê12ÔÂ28ÈÕÖÁ2021Äê01ÔÂ03ÈÕ¹²ÊÕ¼Çå¾²Îó²î52¸ö£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇKLog Server actions/authenticate.phpÏÂÁî×¢ÈëÎó²î£»£»£»Solarwinds Orion Platform Request.PathInfoÇå¾²ÈÆ¹ýÎó²î£»£»£»Panasonic Security SystemÓ²±àÂëÎó²î£»£»£»Netgear NMS300 CVE-2020-35789ÏÂÁî×¢ÈëÎó²î£»£»£»NETGEAR D7800 CVE-2020-35791ÏÂÁî×¢ÈëÎó²î¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇApple iCloudÖÐÖ¹36Сʱ£¬£¬£¬£¬£¬£¬Éв»ÇåÎú¹ÊÕÏÔµ¹ÊÔÓÉ£»£»£»GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬²âÊÔÔ±¹¤µÄ·´Ó¦£»£»£»Ð¶ñÒâÈí¼þ¿ÉʹÓÃImgurÀ´½âÂëCobalt Strike¾ç±¾£»£»£»ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖØ¹¤Ôâµ½¹¥»÷£¬£¬£¬£¬£¬£¬»ò½«µ¼ÖÂÊý¾Ýй¶£»£»£»WasabiÔÆ´æ´¢Ð§ÀÍÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.KLog Server actions/authenticate.phpÏÂÁî×¢ÈëÎó²î
KLog Server actions/authenticate.php±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿É×¢Èëí§ÒâOSÏÂÁî²¢Ö´ÐС£¡£¡£¡£¡£
https://github.com/mustgundogdu/Research/blob/main/KLOG_SERVER/Exploit_Code
2.Solarwinds Orion Platform Request.PathInfoÇå¾²ÈÆ¹ýÎó²î
Solarwinds Orion Platform Request.PathInfo±£´æÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÖ´ÐÐδÊÚȨµÄAPIÏÂÁî¡£¡£¡£¡£¡£
https://www.kb.cert.org/vuls/id/843464
3.Panasonic Security SystemÓ²±àÂëÎó²î
Panasonic Security System±£´ælkjhgfdsaÓ²±àÂëÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£¡£¡£
https://security.panasonic.com/products_technology/products/wv-s2231l/
4.Netgear NMS300 CVE-2020-35789ÏÂÁî×¢ÈëÎó²î
Netgear NMS300±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£¡£¡£
https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559
5.NETGEAR D7800 CVE-2020-35791ÏÂÁî×¢ÈëÎó²î
NETGEAR D7800±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£¡£¡£
https://kb.netgear.com/000062714/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0079
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Apple iCloudÖÐÖ¹36Сʱ£¬£¬£¬£¬£¬£¬Éв»ÇåÎú¹ÊÕÏÔµ¹ÊÔÓÉ
Apple iCloudЧÀÍ·ºÆð¹ÊÕÏ£¬£¬£¬£¬£¬£¬Ê¹Óû§ÎÞ·¨µÇ¼¸ÃЧÀÍ»á¼ûÎļþ»òÉèÖÃÐÂ×°±¸¡£¡£¡£¡£¡£´Ë´ÎÖÐÖ¹´ÓÃÀ¹ú¶«²¿Ê±¼ä12ÔÂ25ÈÕÉÏÎç4:45×îÏÈ£¬£¬£¬£¬£¬£¬Ö±µ½12ÔÂ26ÈÕÏÂÖç4:35²Å±»ÐÞ¸´£¬£¬£¬£¬£¬£¬Àúʱ36Сʱ¡£¡£¡£¡£¡£ÖÐֹʱ´ú£¬£¬£¬£¬£¬£¬AppleµÄϵͳ״̬ҳÉϽöÏÔʾ¡°Óû§¿ÉÄÜÓöµ½´ËЧÀ͵ÄÎÊÌ⡱µÄÌáÐÑ£¬£¬£¬£¬£¬£¬Ã»Óиü¶àÓÐ¹ØÆäÖÐÖ¹µÄÐÅÏ¢¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Apple¹«Ë¾Ã»ÓÐÌṩÈκÎÒÔÕÏÔµ¹ÊÔÓÉ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/apple/apple-icloud-outage-prevents-device-activations-access-to-data/
2¡¢GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬²âÊÔÔ±¹¤µÄ·´Ó¦
GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬ÒÔ²âÊÔÔ±¹¤¶ÔÍøÂç´¹ÂڻµÄ·´Ó¦¡£¡£¡£¡£¡£¸Ã²âÊÔÓÚ12Ô¾ÙÐУ¬£¬£¬£¬£¬£¬ÓʼþÉù³Æ½«Ìṩ650ÃÀÔªµÄÊ¥µ®½Ú½±½ð£¬£¬£¬£¬£¬£¬ÒÔ×ÊÖúÔ±¹¤Ó¦¶ÔÒòCOVID-19±¬·¢¶øµ¼Öµľ¼ÃÎÊÌ⣬£¬£¬£¬£¬£¬²¢ÒªÇóËûÃÇÌîдСÎÒ˽¼ÒÐÅÏ¢±í¸ñ¡£¡£¡£¡£¡£Õâ´Î²âÊԻԼĪ500ÃûÔ±¹¤ÖÐÕУ¬£¬£¬£¬£¬£¬ËûÃǽ«±»ÒªÇóÖØÐ¼ÓÈëÉç»á¹¤³ÌÇå¾²ÒâʶµÄÅàѵ¡£¡£¡£¡£¡£ÓÉÓÚ²âÊÔÖÐʹÓõÄÓÕ¶üºÍÄ£Äâʱ¼äµÄÑ¡Ôñ£¬£¬£¬£¬£¬£¬¸ÃÒªÁìÊܵ½Á˲¿·ÖÍøÂçÇå¾²ÕûÌåµÄÆ·ÆÀ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/112664/security/godaddy-phishing-test-employees.html
3¡¢Ð¶ñÒâÈí¼þ¿ÉʹÓÃImgurÀ´½âÂëCobalt Strike¾ç±¾
жñÒâÈí¼þ¿ÉʹÓÃͼÏñÍйÜЧÀÍImgurÏÂÔØÕýµ±µÄͼÏñ£¬£¬£¬£¬£¬£¬À´½âÂëCobalt Strike¾ç±¾¡£¡£¡£¡£¡£ÐµĶñÒâÈí¼þʹÓôøÓкêµÄWordÎļþ´ÓGitHubÏÂÔØPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬¸Ã¾ç±¾½«´ÓImgurÏÂÔØÏÖʵPNGÎļþ¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬Ê¹ÓÃÏñInvoke-PSImageÕâÑùµÄ¹¤¾ßÀ´Ê¹ÓÃPNGÎļþÖеÄÏñËØÖµ±àÂëPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬²¢ÌìÉúÒ»ÐÐÏÂÁîÀ´Ö´ÐÐpayload£¬£¬£¬£¬£¬£¬×îÖÕ»ñµÃCobalt Strike¾ç±¾¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÍƲâ´Ë¶ñÒâÈí¼þ¿ÉÄÜÓëÖ÷ÒªÕë¶ÔÖж«ÊµÌåµÄAPT×éÖ¯MuddyWaterÓйء£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/github-hosted-malware-calculates-cobalt-strike-payload-from-imgur-pic/
4¡¢ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖØ¹¤Ôâµ½¹¥»÷£¬£¬£¬£¬£¬£¬»ò½«µ¼ÖÂÊý¾Ýй¶
ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖØ¹¤Ôâµ½¹¥»÷£¬£¬£¬£¬£¬£¬»ò½«µ¼ÖÂÊý¾Ýй¶¡£¡£¡£¡£¡£´¨ÆéÖØ¹¤£¨Kawasaki£©³Æ£¬£¬£¬£¬£¬£¬2020Äê6ÔÂ11ÈÕÓÐδ¾ÊÚȨµÄµÚÈý·½´ÓÌ©¹úЧÀÍ´¦»á¼ûÁËÈÕ±¾µÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÔÚ·¢Ã÷¸ÃÎÊÌâºóÁ½¸öÕ¾µãÖ®¼äµÄËùÓÐͨѶ¶¼±»×èÖ¹¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÓÖ·¢Ã÷ÁËÆäËûÍâÑóÕ¾µã£¨Ó¡¶ÈÄáÎ÷ÑÇ¡¢·ÆÂɱöºÍÃÀ¹ú£©Î´¾ÊÚȨ»á¼ûÈÕ±¾Ð§ÀÍÆ÷µÄÇéÐΣ¬£¬£¬£¬£¬£¬²¢ÇжÏͨѶ¡£¡£¡£¡£¡£´¨Æé³Æ´Ë´Î¹¥»÷ʹÓÃÁËÏȽøÊÖÒÕ¶øÃ»ÓÐÁôÏÂÈκκۼ£ºÍÖ¤¾Ý£¬£¬£¬£¬£¬£¬µ«¹«Ë¾Êý¾Ý»òÐíÒѾй¶¡£¡£¡£¡£¡£ËùÓб»ÖÕÖ¹µÄͨѶÓÚ11ÔÂ30ÈÕ»Ö¸´Õý³£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/112765/data-breach/kawasaki-heavy-industries-cyber-attack.html
5¡¢WasabiÔÆ´æ´¢Ð§ÀÍÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ
WasabiÔÆ´æ´¢Ð§ÀÍÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ¡£¡£¡£¡£¡£12ÔÂ28ÈÕÏÂÖç2:30 ESTÓû§·¢Ã÷ÎÞ·¨»á¼ûwasabisys.comÉϵĴ洢Ͱ£¬£¬£¬£¬£¬£¬WasabiÔÚÖÐÖ¹±¨¸æÖгÆÊÇÓÉÓÚDNSÆÊÎöÎÊÌâµ¼Ö¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬¸Ãƽ̨Óû§ÉÏ´«Á˶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÆäÓòÃû³Æ×¢²áÉÌ·¢Ã÷ºóÏëҪͨ¹ýµç×ÓÓʼþ֪ͨWasabi£¬£¬£¬£¬£¬£¬È´°Ñ±¨¸æ×ª·¢µ½Á˹ýʧµÄµØµã£¬£¬£¬£¬£¬£¬Ê¹µÃWasabiδ»ñµÃ֪ͨ¡£¡£¡£¡£¡£¶ø¸Ã×¢²áÉÌÒòδ»ñµÃ»Ø¸´¶øÔÝÍ£Á˸ÃÓò£¬£¬£¬£¬£¬£¬WasabiÔÚµÃÖª¸ÃÊÂÎñºóɾ³ýÁËÍйܶñÒâÈí¼þ²¢ÒªÇóÖØÐ¼¤»î¸ÃÓò£¬£¬£¬£¬£¬£¬Æ½Ì¨ÔÚ12ÔÂ29ÈÕÏÂÖç12:57 ESTÖÕÓÚ»ñµÃ»Ö¸´¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/wasabi-cloud-storage-service-knocked-offline-for-hosting-malware/