ÃÀ¹úÂÉʦлáABAÔâµ½¹¥»÷Ô¼140Íò»áÔ±µÄÐÅϢй¶
°ä²¼¹¦·ò 2023-04-23¾ÝýÌå4ÔÂ21ÈÕ±¨Â·£¬ÃÀ¹úÂÉʦлá(ABA)Ô¼1466000Ãû»áÔ±µÄÍ´´¦Ð¹Â¶¡£ABAÊÇÈ«Çò×î´óµÄÂÉʦºÍ˾·¨×¨ÒµÈËʿлᣬ½ØÖÁ2022ÄêÕ¼ÓÐ166000Ãû»áÔ±¡£¸Ã»ú¹¹Ð¹Â©£¬ËûÃÇÓÚ3ÔÂ17ÈÕ¼ì²âµ½Òì³£»î¶¯£¬µ÷²éÈ·¶¨¹¥»÷Õß´Ó3ÔÂ6ÈÕǰºóÆðÍ·½Ó¼ûABAϵͳ£¬²¢¿ÉÄÜ»ñµÃÁË2018ÄêÍ£Óõİγý»áԱϵͳµÄ»áÔ±µÇ¼ʹ´¦¡£²¿ÃÅ»áÔ±¿ÉÄÜ»áÔÚÐÂϵͳʹÓÃÓë¾ÉϵͳһÑùµÄÍ´´¦£¬Òò¶ø£¬ABA½¨Òé»áÔ±¸ü¸ÄÃÜÂë¡£
https://securityaffairs.com/145125/data-breach/american-bar-association-data-breach.html
2¡¢VMware½¨¸´vRealize Log InsightµÄ·´ÐòÁл¯·ì϶
ýÌå4ÔÂ20Èճƣ¬VMware½¨¸´ÁËvRealize Log Insight£¨ÏÖ³ÆÎªVMware Aria Operations for Logs£©Öеķ´ÐòÁл¯·ì϶£¨CVE-2023-20864£©¡£¸Ã·ì϶¿ÉÔڵ͸´ÔÓÐԵĹ¥»÷Öб»Ô¶³ÌÀûÓã¬ÒÔrootÉí·ÝÖ´ÐÐËÁÒâºÅÁî¡£ÆäCVSSv3ÆÀ·ÖΪ9.8£¬Ö»Óа汾8.10.2ÊÜ´Ë·ì϶ӰÏì¡£Õâ´Î»¹½¨¸´ÁËÒ»¸öºÅÁî×¢Èë·ì϶£¨CVE-2023-20865£©£¬Õ¼ÓÐÖÎÀíȨÏ޵Ĺ¥»÷Õß¿ÉÀûÓÃÆäÒÔrootÉí·ÝÖ´ÐÐËÁÒâºÅÁî¡£
https://www.bleepingcomputer.com/news/security/vmware-fixes-vrealize-bug-that-let-attackers-run-code-as-root/
3¡¢Å·ÖÞ¿ÕÖк½Ðа²È«×éÖ¯Ôâµ½KillnetÍÅ»ïµÄDDoS¹¥»÷
¾Ý4ÔÂ22ÈÕ±¨Â·£¬Å·ÖÞ¿ÕÖн»Í¨¹ÜÔ첿ÃÅEUROCONTROLÔâµ½KillnetµÄ´ó¹æÄ£DDoS¹¥»÷¡£Eurocontrol³Æ£¬ÆäÍøÕ¾×Ô4ÔÂ19ÈÕÒÔÀ´Ò»ÏòÔâµ½¹¥»÷¡£¹¥»÷µ¼ÖÂÍøÕ¾ºÍÍøÂç¿ÉÓÃÐÔÖжϣ¬µ«ÊÇûÓÐÓ°ÏìÅ·ÖÞº½¿Õ¡£Eurocontrolij¹ÙԱй©£¬ºÚ¿ÍÎÞ·¨½Ó¼ûº½¿Õ°²Õûϵͳ£¬ÓÉÓÚÕâЩϵͳÊÇÆøÏ¶Ê½µÄ¡£KillnetÔøÍ¨¹ýÆäTelegramºôÓõÕë¶ÔEurocontrolµÄÐж¯£¬³Æ¡°´Ó½ñÌìÆðÍ·£¬½«½øÐÐÒ»³¡EurocontrolÂíÀËÉ£¬³ÖÐø100Ó×ʱ¡±¡£¸Ã»ú¹¹µÄ½²»°ÈËûÓÐй©ÄÄЩϵͳÊܵ½Ó°Ïì¡¢Ô¤¼ÆÆëÈ«¸´Ô¹¦·òÒÔ¼°KillnetÊÇ·ñ¶ÔÕâ´ÎDDoS¹¥»÷ÕÆ¹ÜµÈÎÊÌâ¡£
https://www.theregister.com/2023/04/22/eurocontrol_russia_attack/
4¡¢×êÑÐÍŶӷ¢ÏÖÀûÓÃWP²å¼þEval PHPµÄ´ó¹æÄ£¹¥»÷»î¶¯
×êÑÐÍŶÓÔÚ4ÔÂ19ÈÕ³ÆÆä·¢ÏÖ´óÁ¿ÀûÓðγýWP²å¼þEval PHPµÄ¹¥»÷»î¶¯¡£¸Ã²å¼þÔÚ´ÓǰʮÄêûÓиüУ¬µ«ÈÔ¿Éͨ¹ýWordPress²å¼þ´æ´¢¿â»ñµÃ¡£Sucuri³Æ£¬Ê¹ÓÃEval PHP½«¶ñÒâ´úÂëǶÈëWordPressÒ³ÃæµÄÇ÷ÏòÔÚ2023Äê4Ô¼¤Ôö£¬¸Ã²å¼þ´Ë¿Ì¾ùÔÈÿÌìÓÐ4000´Î¶ñÒâ×°Ö᣹¥»÷ÕßʹÓñ»ÈëÇÖ»òд´½¨µÄÖÎÀíÔ¹ØË»§À´×°ÖÃEval PHP£¬¶øºóʹÓÃ[evalphp]¶Ì´úÂ뽫PHP´úÂë×¢Èë±»¹¥»÷ÍøÕ¾µÄÒ³ÃæºÍÌû×Ó¡£Ò»µ©´úÂëÖ´Ðкó£¬Ëü»áÔÚÍøÕ¾¸ùĿ¼ÖÐ×¢ÈëºóÃÅ (3e9c0ca6bbe9.php)£¬ºóÃÅÃû³Æ¿ÉÄÜÒò·ÖÆçµÄ¹¥»÷¶ø·ÖÆç¡£
https://blog.sucuri.net/2023/04/massive-abuse-of-abandoned-evalphp-wordpress-plugin.html
5¡¢Î¢Èí³öÏÖ¹ÊÕϵ¼ÖÂÈ«ÇòÓû§ÎÞ·¨½Ó¼ûÆä²¿ÃÅÀûÓúͷþÎñ
ýÌå4ÔÂ20ÈÕ±¨Â·³Æ£¬Î¢Èí³öÏÖ¹ÊÕÏ£¬µ¼ÖÂÈ«ÇòÓû§ÎÞ·¨½Ó¼ûÆä²¿ÃÅÀûÓúͷþÎñ¡£ÊÜÓ°ÏìµÄ·þÎñÔ̺¬Microsoft 365Ì×¼þ¡¢Exchange OnlineºÍSharePoint OnlineµÈ¡£Óû§ÔڵǼÕÊ»§Ê±Óöµ½ÁËÎÊÌ⣬һµ©½øÈë¾Í»á·¢ÏÖûÓпÉÓõÄwebÀûÓ᣾ÝϤ£¬Õâ´ÎÖжÏÊÇÓÉÓÚ»º´æ»ù´¡ÉèÊ©µÄ»úÄܵÍÓڿɽÓÊܵĻúÄÜãÐÖµ²¢µ¼Ö³¬Ê±Òì³£ÒýÆðµÄ¡£¾Ý4ÔÂ20ÈÕ 19:52 EDTµÄ¸üУ¬Î¢Èí°µÊ¾£¬Õâ´ÎÖжϵĵ××ÓÎÊÌâÒѾ½â¾ö£¬ËùÓÐЧ»§µÄ·þÎñ¶¼ÒѸ´Ô¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-365-outage-blocks-access-to-web-apps-and-services/
6¡¢SymantecÅû¶DaggerflyÕë¶Ô·ÇÖÞµçÐŹ«Ë¾µÄ¹¥»÷»î¶¯
SymantecÔÚ4ÔÂ20ÈÕÅû¶ÁËAPTÍÅ»ïDaggerflyÕë¶Ô·ÇÖÞµçÐŹ«Ë¾µÄ¹¥»÷»î¶¯¡£¸Ã»î¶¯ÓÚ2022Äê11Ô³õ´Î±»·¢ÏÖ£¬²¢ÇҴ˿̿ÉÄÜÈÔÔÚ½øÐÐÖС£¹¥»÷ÕßʹÓÃBITSAdminºÍPowerShellµÈLotL¹¤¾ßÀ´·Ö·¢ÏÂÒ»½×¶ÎµÄpayload£¬Ô̺¬ºÏ·¨µÄAnyDesk¿ÉÖ´ÐÐÎļþºÍÍ´´¦ÍøÂ繤¾ßGetCredManCreds¡£×êÑÐÈËÔ±·¢ÏÖ¹¥»÷ÕßÀûÓÃMgBot¿ò¼Ü¿ª·¢ºÍ²¿ÊðµÄвå¼þÓµÓжàÖÖÐÅÏ¢ÍøÂçÖ°ÄÜ¡£´Ë±í£¬Ãâ·Ñɱ¶¾Èí¼þRisingÒ²±»ÓÃÀ´¼ÓÔØPlugX loader¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/apt-attacks-telecoms-africa-mgbot


¾©¹«Íø°²±¸11010802024551ºÅ