΢ÈíAzure App Serviceй¶²¿ÃÅÓû§Ô´´úÂ볤´ï4Äê

°ä²¼¹¦·ò 2021-12-23

×êÑÐÍŶÓÔÚAuerswald VoIPϵͳÖмì²âµ½2¸ö°µ²ØºóÃÅ


×êÑÐÍŶÓÔÚAuerswald VoIPϵͳÖмì²âµ½2¸ö°µ²ØºóÃÅ.png


RedTeam PentestingÔÚ12ÔÂ20ÈÕй©µÂ¹úµçÐÅÓ²¼þÔì×÷ÉÌAuerswaldʹÓõĻ¥ÁªÍøºÍ̸ÓïÒô(VoIP)ϵͳÖдæÔÚ2¸ö°µ²ØºóÃÅ¡£×êÑÐÈËÔ±³ÆËûÃÇÔÚCOMpact 5500R PBXµÄ¹Ì¼þÖз¢ÏÖÁËÕâ2¸öºóÃŵÄÃÜÂ룬һ¸öÊôÓÚ°ÂÃØÓû§Schandelah£¬ÁíÒ»¸öÊôÓÚÖÎÀíÔ±admin£¬Ä¿Ç°Ã»Óз¢ÏÖ½ûÓÃÕâЩºóÃŵIJ½Öè¡£¸Ã·ì϶׷×ÙΪCVE-2021-40859£¬CVSSΪ9.8£¬ÓÚ9ÔÂ10ÈÕ±»¹«¿ª£¬AuerswaldÔÚ11ÔµĹ̼þ¸üУ¨8.2B°æ£©Öн¨¸´ÁËÕâÒ»·ì϶¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/12/secret-backdoors-found-in-german-made.html



еĽ©Ê¬ÍøÂçAbcbotÖØÒªÕë¶ÔÖйúµÄÔÆ·þÎñÌṩÉÌ


еĽ©Ê¬ÍøÂçAbcbotÖØÒªÕë¶ÔÖйúµÄÔÆ·þÎñÌṩÉÌ.png


12ÔÂ21ÈÕ£¬Cado Security·¢ÏÖн©Ê¬ÍøÂçAbcbotÔÚ´Óǰ¼¸¸öÔÂÖØÒªÕë¶ÔÖйúÔÆ·þÎñÌṩÉÌ£¬Ô̺¬°¢ÀïÔÆ¡¢°Ù¶È¡¢ÌÚѶºÍ»ªÎªÔƵÈ¡£AbcbotÊ×ÏÈ»á×°ÖÃÒ»¸öLinux bash¾ç±¾£¬À´½ûÓÃSELinux°²È«±£»¤£¬²¢´´½¨ºóÃÅ¡£¶øºóɨÃèÖ¸±êÖ÷»úÖÐÊÇ·ñ´æÔÚÆäËü¶ñÒâÈí¼þ£¬ÈôÊÇ·¢ÏÖÔò»áɾ³ýÆäËü¶ñÒâÈí¼þµÄÓйعý³Ì¡£³ý´ËÖ®±í£¬Abcbot»¹»áɾ³ýSSHÃÜÔ¿²¢½ö±£Áô×Ô¼ºµÄÃÜÔ¿£¬ÒÔ±£ÕÏÆä¶ÔÖ¸±êÖ÷»úµÄ¶ÀÕ¼½Ó¼û¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/125872/malware/abcbot-botnet-chinese-providers.html



Ç÷Ïò¿Æ¼¼·¢ÏÖTropic TrooperÕë¶ÔÔËÊäÐÐÒµµÄ¹¥»÷»î¶¯


Ç÷Ïò¿Æ¼¼·¢ÏÖTropic TrooperÕë¶ÔÔËÊäÐÐÒµµÄ¹¥»÷»î¶¯.png

Ç÷Ïò¿Æ¼¼ÔÚ12ÔÂ14ÈÕ·¢ÏÖ¼äµý×éÖ¯Tropic Trooper£¨Ò²³ÆEarth Centaur£©Õë¶ÔÔËÊäÐÐÒµµÄ¹¥»÷»î¶¯¡£Õâ´Î»î¶¯Ê¼ÓÚ2020Äê7Ô£¬¶Ô×¼ÁËÔËÊäÐÐÒµµÄ¹«Ë¾ºÍ¹Ù·½»ú¹¹¡£×êÑÐÈËÔ±½«ÈëÇÖ¹ý³Ì·ÖΪ¶à¸ö½×¶Î£º¹¥»÷´æÔÚ·ì϶µÄIIS·þÎñÆ÷ºÍExchange²¢×°ÖÃshell£»ÀûÓøÃshell×°ÖÃ.NET¼ÓÔØ·¨Ê½NerapackºÍµÚÒ»½×¶ÎºóÃÅQuasar£»¶øºó£¬Æ¾¾ÝÊܺ¦ÕßÀàÐÍ·Ö·¢µÚ¶þ½×¶ÎºóÃÅ£¬Ô̺¬ChiserClientºÍSmileSvrµÈ£»×îºó£¬»¹»áÊÔͼ·ÛËéÄÚÍø¡¢×ª´¢Í´´¦²¢¶Ï¸ùÈÕÖ¾¡£


Ô­ÎÄÁ´½Ó£º

https://www.trendmicro.com/en_us/research/21/l/collecting-in-the-dark-tropic-trooper-targets-transportation-and-government-organizations.html



Group-IB³Æ´ó¹æÄ£Ú¿Æ­»î¶¯Ã¿ÔÂÔì³ÉÔ¼8000ÍòÃÀÔªËðʧ


Group-IB³Æ´ó¹æÄ£Ú¿Æ­»î¶¯Ã¿ÔÂÔì³ÉÔ¼8000ÍòÃÀÔªËðʧ.png


12ÔÂ21ÈÕ£¬Group-IB·¢ÏÖÒ»³¡Õë¶ÔÈ«Çò90¶à¸ö¹ú¶È/µØÓòµÄÓû§µÄÚ¿Æ­»î¶¯¡£×êÑÐÈËÔ±³Æ£¬Ä¿Ç°ÒѼì²âµ½ÖÁÉÙ60¸ö·ÖÆçµÄÚ¿Æ­ÍøÂ磬ÔËÐÐÓÐÕë¶ÔÐÔµÄÁ´½Ó£¬¾ùÔÈÿ¸öÍøÂçʹÓÃÁË70¸ö·ÖÆçµÄÓòÃû¡£Õâ´Î»î¶¯¼ÙÒâ121¸öÆ·ÅÆ£¬ÒªÇóÓû§²Î¼Óµ÷²é²¢»î¶¯ÔùÆ·£¬ÆäÖе¥¸öÚ¿Æ­ÍøÂçµÄDZÔÚÖ¸±êԼΪ1000ÍòÈË¡£Í¨¹ý¶ÈÎö½Ó¼ûÕߵįðÔ´·¢ÏÖ£¬ÖØÒªÁ÷Á¿À´×ÔÓ¡¶È£¨42.2%£©¡¢Ì©¹ú£¨7%£©ºÍÓ¡¶ÈÄáÎ÷ÑÇ£¨4.4%£©µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.group-ib.com/media/target-links-2021/



΢ÈíAzure App Serviceй¶²¿ÃÅÓû§Ô´´úÂ볤´ï4Äê


΢ÈíAzure App Serviceй¶²¿ÃÅÓû§Ô´´úÂ볤´ï4Äê.png


12ÔÂ21ÈÕ£¬Wiz.io³ÆÎ¢ÈíAzure App Serviceƽ̨´æÔÚ·ì϶£¬Ð¹Â¶Á˽ü4ÄêËùÓÐʹÓÃPHP¡¢Node¡¢Python¡¢RubyºÍJava¿ª·¢µÄÀûÓõÄÔ´´úÂë¡£¸ÃÆ½Ì¨ÖØÒªÓÃÓÚ¹¹½¨ºÍÍйÜWebÀûÓ÷¨Ê½£¬ÓÉÓÚÓû§ÎÞÒâÖÐÅäÖñØÒªÔÚÄÚÈݸùĿ¼Öд´½¨µÄ.gitÎļþ¼Ðµ¼ÖÂÐÅϢй¶¡£×êÑÐÈËÔ±½«·ì϶Ϸ³ÆÎªNotLegit£¬³ÆÆä×Ô2017Äê9Ô¾ÍÒ»Ïò´æÔÚ£¬¿ÉÄÜÒѱ»ÔÚÒ°ÀûÓá£12ÔÂ22ÈÕ£¬Î¢Èí°ä²¼²¼¸æ³ÆÎÊÌâÒѽâ¾ö¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-azure-app-service-flaw-exposed-customer-source-code/



Unit 42°ä²¼2021ÄêµÚÈý¼¾¶ÈÍøÂ簲ȫÇ÷ÏòµÄ·ÖÎö»ã±¨


Unit 42°ä²¼2021ÄêµÚÈý¼¾¶ÈÍøÂ簲ȫÇ÷ÏòµÄ·ÖÎö»ã±¨.png


Unit 42ÔÚ12ÔÂ21ÈÕ°ä²¼ÁË2021ÄêµÚÈý¼¾¶ÈÍøÂ簲ȫÇ÷ÏòµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬µÚÈý¼¾¶È×ܹ²ÓÐ7064¸öеÄCVE£¬ÆäÖÐ594¸öÊôÓÚ¸ßΣ·ì϶£¬Õ¼±È13.6%£¬1965¸ö¸ßÑϳÁÐÔ·ì϶£¨45.1%£©ºÍ2542¸öÖеÈÑϳÁÐÔ·ì϶£¨41.3%£©£»ÆäÖÐ25.6%ÊDZ¾µØ·ì϶£¬ÆäÓàµÄ74.4%ÊÇÔ¶³Ì·ì϶£»×î³£¼û·ì϶ÀàÐÍΪ¿çÕ¾¾ç±¾¡¢»Ø¾ø·þÎñºÍÐÅϢй¶·ì϶£¬×î³£¼ûµÄ¹¥»÷ÀàÐÍΪÐÅϢй¶¡¢´úÂëÖ´ÐкÍĿ¼±éÀú¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/network-attacks-trends-august-october-2021/