Atlassian¸üн¨¸´ÆäCrowdºÍBitbucketÖеķì϶
°ä²¼¹¦·ò 2022-11-21¾ÝýÌå11ÔÂ18ÈÕ±¨Â·£¬Atlassian°ä²¼¸üУ¬ÒÔ½¨¸´Æä¼¯ÖÐʽÉí·ÝÖÎÀíÆ½Ì¨Crowd Server and Data Center,ÒÔ¼°Git´æ´¢¿âÖÎÀí½â¾ö¹æ»®Bitbucket Server and Data CenterÖеķì϶¡£ÆäÖÐÖ®Ò»ÊǺÅÁî×¢Èë·ì϶£¨CVE-2022-43781£©£¬ÓµÓнÚÔìÆäÓû§ÃûȨÏ޵Ĺ¥»÷ÕßÔÚÌØ¶¨Ç°ÌáÏ¿ÉÔÚÖ¸±êϵͳÉÏÖ´ÐдúÂë¡£ÁíÒ»¸öÊǰ²È«ÅäÖÃÃýÎóÎÊÌ⣨CVE-2022-43782£©£¬¹¥»÷Õß¿ÉÔÚÈÏ֤ΪCrowdÀûÓ÷¨Ê½Ê±ÈƹýÃÜÂë²é³£¬²¢Å²ÓÃÓÐÌØÈ¨µÄAPI¶Ëµã¡£
https://securityaffairs.co/wordpress/138716/security/atlassian-critical-flaws-crowd-bitbucket.html
2¡¢Earth PretaÀûÓÃGoogle Drive´¹µö¹¥»÷È«Çòµ±¾Ö×éÖ¯
TrendMicroÔÚ11ÔÂ18ÈÕÅû¶ÁËEarth PretaÕë¶ÔÈ«ÇòµÄÓã²æÊ½´¹µö¹¥»÷¡£Õâ´Î´ó¹æÄ£»î¶¯Ê¼ÓÚ½ñÄê3ÔÂ×óÓÒ£¬Éæ¼°Ãåµé¡¢°Ä´óÀûÑÇ¡¢·ÆÂɱö¡¢ÈÕ±¾ºÍÖйų́ÍåµÈµØ¡£Earth PretaÀûÓÃÁËÐéαµÄGoogleÕÊ»§£¬Í¨¹ý´¹µöÓʼþ·Ö·¢¶ñÒâÈí¼þ¡£Ëü×î³õ´æ´¢ÔÚ´æµµÎļþ£¨ÀýÈç rar/zip/jar£©ÖУ¬²¢Í¨¹ýGoogle DriveÁ´½Ó·Ö·¢¡£´Ë±í£¬¹¥»÷Õß»¹ÀûÓøĽøµÄÈÆ¹ý¼ì²âºÍ·ÖÎöµÄ¼¼Êõ£¬ÀýÈç´úÂë»ìºÏºÍ×Ô½ç˵Òì³£´¦Ö÷¨Ê½£¬À´·Ö·¢¶¨ÔìµÄ¶ñÒâÈí¼þϵÁУ¬ÈçTONEINS¡¢TONESHELLºÍPUBLOAD¡£
https://www.trendmicro.com/en_us/research/22/k/earth-preta-spear-phishing-governments-worldwide.html
3¡¢Ä³ÅäÖÃÃýÎóµÄES·þÎñÆ÷й¶15ÍòÌõMastodonÓû§ÐÅÏ¢
ýÌå11ÔÂ18Èճƣ¬×êÑÐÍŶӷ¢ÏÖijÅäÖÃÃýÎóµÄElasticsearch·þÎñÆ÷й¶Á˳¬¹ý15ÍòÌõMastodonÓû§µÄÐÅÏ¢¡£×êÑÐÈËÔ±ÓÚ2022Äê11ÔÂ15ÈÕ¼ì²âµ½¸Ã·þÎñÆ÷£¬µ«Éв»Ã÷ÏÔËü¼Í¼Óû§ÐÅÏ¢µÄ¹¦·òÓж೤¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¸Ã·þÎñÆ÷ÊôÓÚµÚÈý·½¶ø²»ÊÇMastodon¹Ù·½£¬Ö¼ÔÚ´ÓMastodonÓû§ÄÇÀï×¥ÊØÐÅÏ¢¡£Ð¹Â¶ÐÅÏ¢Ô̺¬ÕÊ»§Ãû³Æ¡¢Ó×ÎÒ×ÊÁÏͼƬ¡¢·ÛË¿ÊýºÍ¹Ø×¢ÊýµÈ£¬Ä¿Ç°ÈÔÎÞ·¨È·¶¨·þÎñÆ÷µÄËùÓÐÕß¡£
https://www.hackread.com/leaky-server-mastodon-users-data/
4¡¢CISAй©HiveÒÑ´Ó1300¶à¼Ò¹«Ë¾ÀÕË÷³¬¹ý1ÒÚÃÀÔªÊê½ð
11ÔÂ18ÈÕ£¬FBI¡¢CISAºÍHHS½áºÏ°ä²¼Á˹ØÓÚHiveÀÕË÷Èí¼þµÄ°²È«Õ÷ѯ¡£Æ¾¾ÝFBIµÄÐÅÏ¢£¬½ØÖÁ2022Äê11Ô£¬HiveÒѹ¥»÷È«Çò1300¶à¸ö×éÖ¯£¬²¢³É¹¦ÀÕË÷Ô¼1ÒÚÃÀÔªµÄÊê½ð¡£¹¥»÷ÕßÕë¶Ô¿í·ºµÄÐÐÒµºÍ¹Ø¼ü»ù´¡ÉèÊ©²¿ÃÅ£¬ÀýÈçµ±¾Ö×éÖ¯¡¢Í¨Ñ¶¡¢Ôì×÷¡¢ÐÅÏ¢¼¼ÊõÒÔ¼°Ò½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú(HPH)ÐÐÒµ¡£Hiveͨ¹ýRDP¡¢VPNºÍÆäËüÔ¶³ÌÍøÂçÏνӺÍ̸£¬Ê¹Óõ¥³É·ÖµÇ¼»ñµÃ¶ÔÖ¸±êÍøÂçµÄ³õʼ½Ó¼ûȨÏÞ¡£ÓÐʱ£¬Ëû»¹ÈƹýÁËMFA£¬²¢Í¨¹ýÀûÓó£¼û·ì϶CVE-2020-12812»ñµÃ¶ÔFortiOS·þÎñÆ÷µÄ½Ó¼ûȨÏÞ¡£¸ÃÕ÷ѯ¹«¿ªÁ˹ØÓÚHive IOCºÍTTPµÄ¾ßÌåÐÅÏ¢¡£
https://www.cisa.gov/uscert/ncas/alerts/aa22-321a
5¡¢ÀÕË÷ÍÅ»ïDaixinÐû³Æ¶ÔÂíÀ´Î÷ÑǵÄÑǺ½¼¯ÍŵĹ¥»÷ÕÆ¹Ü
¾Ý11ÔÂ19ÈÕ±¨Â·£¬ÂíÀ´Î÷Ñǵͳɱ¾º½¿Õ¹«Ë¾ÑǺ½¼¯ÍÅÔâµ½DaixinµÄ¹¥»÷¡£¹¥»÷²úÉúÔÚ11ÔÂ11ÈÕÖÁ12ÈÕ£¬¹¥»÷Õß³ÆÒÑÇÔÈ¡500Íò³Ë¿ÍºÍËùÓÐÔ±¹¤µÄÓ×ÎÒÐÅÏ¢¡£DaixinÌṩÁËÁ½¸öÎļþ£¬Ò»·ÝÎļþÔ̺¬ÓйØÖ¸¶¨³Ë¿ÍµÄÐÅÏ¢£¬ÁíÒ»·ÝÔ̺¬Ô±¹¤ÐÅÏ¢¡£¾Ý±¨Â·£¬ÑǺ½ÔÚ½»ÉæÊ±Ã»Óг¢ÊÔÐÉÌÊê½ð½ð¶î£¬Õâ¿ÉÄÜÅú×¢ËûÃÇ¿ÉÄÜ´Óδ³ïËãÖ§¸¶ÈκÎÓöȡ£´Ë±í£¬Daixin½²»°ÈËÇ¿µ÷£¬ÔÚ¼ÓÃÜÎļþʱ£¬ÆäÈÆ¹ýÁË"XEN¡¢RHEL--·ÉÐÐÉ豸µÄÖ÷»ú£¨À×´ï¡¢¿ÕÖн»Í¨¹ÜÔìµÈ£©"¡£DaixinÔøÉêÃ÷£¬ÈôÊÇÁ˾ֿÉÄÜΣ¼°ÐÔÃü£¬ËûÃǽ«Ô¤·À¼ÓÃÜ»òÏú»ÙÈÎºÎÆ÷²Ä¡£
https://www.databreaches.net/airasia-victim-of-ransomware-attack-passenger-and-employee-data-acquired/
6¡¢Cisco°ä²¼¹ØÓÚÔÚÒ°·¢ÏÖµÄLodaRATбäÌåµÄ·ÖÎö»ã±¨
11ÔÂ17ÈÕ£¬Cisco Talos°ä²¼Á˹ØÓÚLodaRATбäÌåµÄ·ÖÎö»ã±¨¡£×êÑÐÈËÔ±ÔÚ2022ÄêÆÚ¼ä¶ÔLodaRAT¶ñÒâÈí¼þ½øÐмà²â£¬ÔÚ½üÆÚ·¢ÏÖÁËËüÓëÆäËü¶ñÒâÈí¼þ£¨Ô̺¬RedLineºÍNeshta£©Ò»Â··Ö·¢µÄа汾¡£LodaRATÊÇÓÃAutoIt¿ª·¢µÄ£¬Í¨³£»áÀûÓú¯Êý»ìºÏÒÔ¼°×Ö·û´®±àÂëÀ´Èƹý¶ÈÎö¡£´Ë±í£¬Ð°汾һ¸ö³Á´óµÄŤתÊÇÆëÈ«³ÁдÁ˼ì²â·´¶ñÒâÈí¼þ¹ý³ÌµÄº¯Êý£¬Ðº¯ÊýËÑË÷ÈýÊ®¸ö·ÖÆçµÄ¹ý³ÌÃû³Æ£¬¶øÔÀ´µÄ±äÌåÖ´ÐÐWMI²éÎÊÒÔö¾ÙËùÓÐAV¹ý³Ì¡£µ«Õâ¸öк¯ÊýµÄ³ÉЧԶ²»Èçǰһ¸ö£¬ÓÉÓÚ¸ÃÖ°Äܲ»»á¼ì²âδÔ̺¬ÔÚÒªËÑË÷µÄ¹ý³ÌÁбíÖеIJúÆ·¡£
https://blog.talosintelligence.com/get-a-loda-this/


¾©¹«Íø°²±¸11010802024551ºÅ