GoDaddyй©ÆäÔ´´úÂëй¶ÇÒ·þÎñÆ÷±»×°ÖöñÒⷨʽ
°ä²¼¹¦·ò 2023-02-20
¾ÝýÌå2ÔÂ17ÈÕ±¨Â·£¬ÍøÂçÍйܹ«Ë¾GoDaddyй©£¬ÆäÔ´´úÂëй¶ÇÒ·þÎñÆ÷±»×°ÖöñÒⷨʽ¡£GoDaddyÔÚ2022Äê12Ô°µÊ¾£¬ÊÕµ½Á˲¿Ãſͻ§Í¶Ëߣ¬³ÆËûÃǵÄÍøÕ¾Å¼È»»á±»³Á¶¨Ïòµ½¶ñÒâÍøÕ¾¡£ºóÀ´·¢ÏÖÕâÊÇÓÉÓÚ¹¥»÷Õß»ñµÃÁËÆäcPanel»·¾³ÖÐÍйܵķþÎñÆ÷µÄ½Ó¼ûȨÏÞ£¬ÔÚÆäϵͳÉÏ×°ÖÃÁ˶ñÒâÈí¼þ²¢»ñÈ¡ÁËÓëGoDaddyÄÚ²¿ÃÅ·þÎñÓйصĴúÂ롣ƾ¾Ýµ÷²é£¬GoDaddyÒÔΪÕâÊÇÒ»¸ö¸´ÔӵijÖÐø¶àÄêµÄ¹¥»÷»î¶¯µÄÒ»²¿ÃÅ£¬Ö®Ç°ÔÚ2021Äê11ÔºÍ2020Äê3ÔÂÅû¶µÄÎ¥¹æÐÐΪҲÓëÕâÓйء£
https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/
2¡¢Fortinet°ä²¼°²È«¸üн¨¸´Æä¶à¿î²úÆ·ÖеÄÊýÊ®¸ö·ì϶
FortinetÔÚ2ÔÂ16ÈÕ°ä²¼°²È«¸üУ¬½¨¸´ÁËÆäFortiNACºÍFortiWebµÈ²úÆ·ÖеÄ40¸ö·ì϶¡£ÆäÖÐ×îÑϳÁµÄÊÇFortiNACÍøÂç½Ó¼û½ÚÔì½â¾ö¹æ»®ÖеÄÎļþÃû»òõè¾¶µÄ±í²¿¿É½ÚÔì·ì϶£¨CVE-2022-39952£©£¬CVSSÆÀ·ÖΪ9.8£¬¹¥»÷Õß¿ÉÓÃÆäÔÚϵͳÉÏÖ´ÐÐËÁÒâдÈë¡£Æä´ÎÊÇFortiWeb´úÀíÊØ»¤·¨Ê½ÖеĻùÓÚ²Ö¿âµÄ»º³åÇøÒç¶Âí½Å£¨CVE-2021-42756£©£¬CVSSÆÀ·ÖΪ9.3£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓÃÆäͨ¹ýÌØÔìµÄHTTPÒªÇóÖ´ÐÐËÁÒâ´úÂë¡£
https://thehackernews.com/2023/02/fortinet-issues-patches-for-40-flaws.html
3¡¢¶þάÂëÌìÉúÍøÕ¾MyQRcodeÅäÖÃÃýÎóй¶³¬¹ý128 GBÊý¾Ý
ýÌå2ÔÂ19Èճƣ¬Ê¢ÐеĶþάÂëÌìÉúÍøÕ¾MyQRcodeй¶ÁËÆäÓû§µÄÓ×ÎÒÊý¾Ý¡£×êÑÐÈËÔ±ÔÚËÑË÷ÅäÖÃÃýÎóµÄÔÆÊý¾Ý¿âʱÔÚShodanÉÏ·¢ÏÖÁ˸÷þÎñÆ÷£¬Ëüй¶Á˳¬¹ý128 GBµÄÊý¾Ý£¬ÆäÖÐÔ̺¬66000ÃûÓû§µÄÓ×ÎÒÐÅÏ¢¡£ÕâÊÇÓÉÅäÖÃÃýÎóµ¼Öµģ¬¹«¼ÒÄܹ»ÔÚûÓÐÈκΰ²È«Éí·ÝÑéÖ¤»òÃÜÂëµÄÇé¿öϹ«¿ª½Ó¼û´Ë·þÎñÆ÷¡£´Ë±í£¬Ð¹Â¶ÊÂÎñʼÓÚ2ÔÂ4ÈÕ£¬´Ë¿ÌÿÌì¶¼ÔÚ×Ô¶¯¸üÐÂеļͼ£¬ÕâÅúעй¶ÈÔÔÚ½øÐÐÖС£
https://www.hackread.com/qr-code-generator-my-qr-code-data-leak/
4¡¢Symantec·¢ÏÖÐÂFrebniisÀûÓÃMicrosoft IISµÄ»î¶¯
SymantecÔÚ2ÔÂ16ÈÕ³ÆÆä·¢ÏÖÁËжñÒâÈí¼þFrebniisÀûÓÃMicrosoft IISÖ°ÄܳÉÁ¢ºóÃŵĻ¡£FrebniisÀûÓÃÁËÒ»¸öÃûΪʧ°ÜÒªÇóÊÂÎñ»º³å(FREB)µÄIISÖ°ÄÜ£¬½«¶ñÒâ´úÂë×¢Èëµ½½ÚÔì FREB£¨¡°iisfreb.dll¡±£©µÄDLLÎļþµÄÌØ¶¨º¯ÊýÖУ¬Ê¹¹¥»÷Õß¿ÉÄÜÀ¹½ØºÍ¼à¿Ø·¢Ë͵½ISS·þÎñÆ÷µÄËùÓÐHTTP POSTÒªÇó¡£×¢ÈëµÄ´úÂëÊÇÒ»¸ö.NETºóÃÅ£¬Ö§³Ö´úÀíºÍC#´úÂëÖ´ÐУ¬ÎÞÐè½Ó´¥´ÅÅÌ£¬Ê¹ÆäÆëÈ«Òñ±Î¡£´Ë±í£¬¹¥»÷ÕßÓÃÓÚ»ñÈ¡IIS·þÎñÆ÷½Ó¼ûȨÏ޵IJ½ÖèÉв»Ã÷ÏÔ¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/frebniis-malware-iis
5¡¢ÐºڿÍÍÅ»ïWIP26ÖØÒªÕë¶ÔÖж«µÄµçÕÛ·þÎñÌṩÉÌ
2ÔÂ16ÈÕ£¬SentinelLabsÅû¶ÁËкڿÍÍÅ»ïWIP26Õë¶ÔÖж«µÄµçÕÛ·þÎñÌṩÉ̵Ĺ¥»÷»î¶¯¡£WIP26µÄÌØµãÊÇÀÄÓù«¹²ÔÆ»ù´¡ÉèÊ©£¬ÈçMicrosoft 365 Mail¡¢Azure¡¢Google FirebaseºÍDropbox£¬½øÐжñÒâÈí¼þ·Ö·¢¡¢Êý¾Ýй¶ºÍC2¡£Õâ´Î»î¶¯Í¨¹ýWhatsApp¾«×¼¶¨Î»Ô±¹¤£¬ÆäÖÐÔ̺¬Ö¸Ïò¶ñÒâÈí¼þ¼ÓÔØ·¨Ê½µÄDropboxÁ´½Ó¡£×îÖÕ»á×°ÖúóÃÅCMD365ºÍCMDEmber£¬ËüÃǵÄÖØÒªÖ°ÄÜÊÇʹÓÃWindowsºÅÁîÚ¹ÊÍÆ÷Ö´Ðй¥»÷ÕßÌṩµÄϵͳºÅÁî¡£
https://www.sentinelone.com/labs/wip26-espionage-threat-actors-abuse-cloud-infrastructure-in-targeted-telco-attacks/
6¡¢Èí¼þ¹«Ë¾AtlassianÔ±¹¤Í´´¦±»µÁµ¼Ö²¿ÃÅÊý¾Ýй¶
¾Ý2ÔÂ16ÈÕ±¨Â·£¬Èí¼þ¹«Ë¾AtlassianÔ±¹¤Í´´¦±»µÁµ¼Ö²¿ÃÅÊý¾Ýй¶¡£Cyberscoop×îÏȱ¨Â·£¬ºÚ¿ÍSiegedSecÔÚTelegramÉÏй¶ÁË´ÓAtlassianÇÔÈ¡µÄÊý¾Ý¡£Ö®ºó£¬Check Point·ÖÎöÁ˱»µÁÊý¾Ý£¬Òɻ󹥻÷Õß²¢Ã»ÓÐÖ±½ÓÈëÇÖAtlassian£¬¶øÊǹ¥»÷Á˵ÚÈý·½¹©¸øÉÌEnvoy¡£¶øEnvoy°µÊ¾£¬Æäϵͳ²¢Î´Ôâµ½¹¥»÷£¬ÊÇAtlassianÔ±¹¤µÄÍ´´¦±»µÁ£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÄܽӼû´æ´¢ÔÚEnvoyÀûÓ÷¨Ê½ÖеÄÊý¾Ý¡£Atlassianµ÷²é·¢ÏÖ£¬Ò»ÃûÔ±¹¤µÄƾ֤±»ÃýÎ󵨰䲼µ½¹«¹²´æ´¢¿â£¬Òò¶ø¹¥»÷ÕßÄܹ»Í¨¹ýÔ±¹¤ÕÊ»§½Ó¼û¿É¼ûÊý¾Ý¡£
https://www.bleepingcomputer.com/news/security/atlassian-data-leak-caused-by-stolen-employee-credentials/


¾©¹«Íø°²±¸11010802024551ºÅ