Zyxel½¨¸´NASÖеÄRCE·ì϶CVE-2022-34747

°ä²¼¹¦·ò 2022-09-08
1¡¢Zyxel°ä²¼¸üн¨¸´NASÖеÄRCE·ì϶CVE-2022-34747

      

9ÔÂ6ÈÕ £¬ÍøÂçÉ豸Ôì×÷ÉÌZyxel³ÆÒ»¸öеÄRCE·ì϶»áÓ°ÏìÆä²úÆ·NAS326¡¢NAS540ºÍNAS542¡£¹«¸æÖ¸³ö £¬ÕâÊÇÔÚZyxel NAS²úÆ·µÄÌØ¶¨¶þ½øÔìÎļþÖз¢ÏÖµÄÒ»¸ö±ðʽ×Ö·û´®·ì϶ £¬¿É±»ÓÃÀ´Í¨¹ýÌØÔìµÄUDPÊý¾Ý°üʵÏÖδ¾­ÊÚȨµÄÔ¶³Ì´úÂëÖ´ÐС£¸Ã·ì϶׷×ÙΪCVE-2022-34747 £¬CVSSÆÀ·ÖΪ9.8¡£¸Ã·ì϶¿ÉÓÃÓÚÇÔÈ¡Êý¾Ý¡¢É¾³ýÊý¾Ý»òÔÚ¶³öÓÚ»¥ÁªÍøÉϵÄNASÉ豸ÖÐ×°ÖÃÀÕË÷Èí¼þ £¬¹©¸øÉÌÒѾ­ÒԹ̼þ¸üеĴó¾Ö°ä²¼ÁËÊÜÓ°ÏìÉ豸µÄ°²È«¸üС£


https://www.bleepingcomputer.com/news/security/zyxel-releases-new-nas-firmware-to-fix-critical-rce-vulnerability/


2¡¢North FaceÔâµ½´ó¹æÄ£µÄײ¿â¹¥»÷Ó°ÏìÔ¼20Íò¸öÕË»§

      

¾ÝýÌå9ÔÂ7ÈÕ³Æ £¬»§±í·þ×°Æ·ÅÆThe North FaceÔâµ½ÁË´ó¹æÄ£×²¿â¹¥»÷ £¬µ¼ÖÂthenorthface.comÍøÕ¾ÉϵÄ194905¸öÕË»§±»ºÚ¡£Õâ´Î¹¥»÷»î¶¯ÆðÍ·ÓÚ2022Äê7ÔÂ26ÈÕ £¬µ«ÍøÕ¾µÄÖÎÀíÔ±ÔÚ8ÔÂ11Èղżì²âµ½Òì³£»î¶¯ £¬²¢ÓÚ8ÔÂ19ÈÕ×èÖ¹Á˹¥»÷¡£Ä¿Ç° £¬¸Ã¹«Ë¾ÔÚÏòÊÜÓ°ÏìµÄ¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ £¬²¢³ÁÖÃÁËËùÓÐЧ»§ÃÜÂë¡£ÖµÍ×ÌùÐĵÄÊÇ £¬ÕâÊÇThe North FaceµÚ¶þ´ÎÔ⵽ײ¿â¹¥»÷ºó³ÁÖÃÃÜÂë £¬ÉÏÒ»´Î²úÉúÔÚ2020Äê11Ô¡£


https://www.bleepingcomputer.com/news/security/200-000-north-face-accounts-hacked-in-credential-stuffing-attack/


3¡¢AT&TÅû¶ͨ¹ý¶à½×¶ÎϰȾÁ´·Ö·¢Èƹý¼ì²âµÄShikitega

      

AT&T Alien LabsÓÚ9ÔÂ6ÈÕÅû¶ÁËеÄLinux¶ñÒâÈí¼þShikitega¡£¸Ã¶ñÒâÈí¼þÀûÓÃϵͳ·ì϶»ñÈ¡×î¸ßȨÏÞ £¬Í¨¹ýcrontabÔÚÖ÷»úÉÏά³ÖÓÆ¾ÃÐÔ £¬²¢×îÖÕÔÚÖ¸±êÉ豸ÉÏÖ´ÐмÓÃܿ󹤡£Shikitega¼«¶ÈÒñ±Î £¬ÀûÓöà̬±àÂëÆ÷ÈÆ¹ýɱ¶¾ÒýÇæµÄ¼ì²â £¬ÕâʹµÃ¾²Ì¬¡¢»ùÓÚÊðÃûµÄ¼ì²âʧЧ¡£Ä¿Ç°Éв»Ã÷ÏÔ³õ²½Ï°È¾²½Öè £¬µ«×êÑÐÈËÔ±°µÊ¾ £¬¸Ã¶ñÒâÈí¼þʹÓöà½×¶ÎϰȾÁ´ £¬ÆäÖÐÿһ²ã½ö´«µÝ¼¸°Ù×Ö½Ú £¬¼¤»îÒ»¸öµ¥Ò»Ä £¿é £¬¶øºóÒÆ¶¯µ½ÏÂÒ»¸öÄ £¿é¡£


https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux


4¡¢ESET½üÆÚ·¢ÏÖÖØÒªÕë¶ÔÑÇÖÞµ±¾Ö»ú¹¹ºÍ´óÐ͹«Ë¾µÄWorok

      

9ÔÂ6ÈÕ £¬ESET×êÑÐÈËÔ±³ÆÆä×î½ü·¢ÏÖÁËÖØÒªÕë¶ÔÑÇÖ޵ĴóÐ͹«Ë¾ºÍ´¦Ëùµ±¾ÖµÄÕë¶ÔÐÔ¹¥»÷»î¶¯¡£ÕâЩ¹¥»÷ÓëÒ»¸öеļäµý×éÖ¯WorokÓйØ £¬¸ÃÍÅ»ïÖÁÉÙ×Ô2020ÄêÒÔÀ´Ò»Ïò´¦Óڻ״̬¡£WorokµÄ¹¤¾ß¼¯Ô̺¬Ò»¸öC++¼ÓÔØ·¨Ê½CLRLoad¡¢Ò»¸öPowerShellºóÃÅPowHeartBeatºÍÒ»¸öC#¼ÓÔØ·¨Ê½PNGLoad £¬ËüʹÓÃÒþдÊõ´ÓPNGÎļþÖÐÌáÈ¡°µ²ØµÄ¶ñÒâpayload¡£´Ë±í £¬WorokÓë±»×·×ÙΪTA428µÄÍÅ»ïÔÚ¹¤¾ß¡¢»î¶¯¹¦·òºÍÖ¸±êÐÐÒµ·½Ãæ´æÔÚ³Áµþ¡£


https://www.welivesecurity.com/2022/09/06/worok-big-picture/


5¡¢TA505ÍÅ»ïʹÓÃTeslaGunÃæ°åÀ´ÖÎÀíÆäServHelperºóÃÅ

      

PRODAFTÔÚ9ÔÂ6ÈÕ°ä²¼Á˹ØÓÚTA505ÍÅ»ïTeslaGunµÄÉî¶È·ÖÎö»ã±¨¡£TA505±ðÃûEvil Corp £¬×Ô2014ÄêÒÔÀ´Ò»Ïò»îÔ¾ £¬ÖØÒªÕë¶ÔÁãÊÛÐÐÒµºÍÒøÐеÈ¡£»ã±¨Ö¸³ö £¬¹¥»÷ÕßʹÓÃTeslaGun½ÚÔìÃæ°åÀ´ÖÎÀíServHelperÖ²È뷨ʽ £¬×÷ΪC2¿ò¼ÜÀ´½ÚÔ챻ϰȾµÄÉ豸¡£³ýÁËʹÓÃÃæ°å±í £¬¹¥»÷Õß»¹Ê¹ÓÃÔ¶³Ì×ÀÃæºÍ̸¹¤¾ßͨ¹ýRDPËí·ÊÖ¶¯Ïνӵ½Ö¸±êϵͳ¡£PRODAFTµÄ·ÖÎöÏÔʾ £¬×Ô2020Äê7ÔÂÒÔÀ´ £¬¸ÃÍÅ»ïÒѹ¥»÷ÁËÖÁÉÙ8160¸öÖ¸±ê £¬ÆäÖдóÎÞÊýÖ¸±êλÓÚÃÀ¹ú£¨3667¸ö£©¡£


https://www.prodaft.com/resource/detail/ta505-ta505-groups-tesla-gun-depth-analysis


6¡¢Check Point°ä²¼Õë¶Ô·ÇÖÞ´óÐͽðÈÚ»ú¹¹µÄ¹¥»÷µÄ»ã±¨

      

9ÔÂ6ÈÕ £¬Check Point Research½ÒʾÁËÕë¶Ô·ÇÖ޵Ĺ¥»÷»î¶¯DangerousSavanna¡£¸Ã»î¶¯ÔÚ´ÓǰµÄÁ½ÄêÖÐÒ»Ö¹Øë¶Ô·ÇÖÞ·¨ÓïÇøµÄ¶à¸öÖØÒªµÄ½ðÈÚ·þÎñ¹«Ë¾¡£¹¥»÷ÕßʹÓÃÓã²æÊ½´¹µö¹¥»÷×÷Ϊ³õʼϰȾ²½Öè £¬Ïò¿ÆÌصÏÍß¡¢Ä¦Âå¸ç¡¢¿¦Âó¡¡¢ÈûÄÚ¼Ó¶ûºÍ¶à¸çµÄÔ±¹¤·¢ËͶñÒâÓʼþ¡£ÕâЩÓʼþµÄ¸½¼þҪôÊÇ´øÓкêµÄWordÎĵµ £¬ÒªÃ´ÊÇ´øÓÐÔ¶³ÌÄ£°åµÄÎĵµ £¬»òÕßÊÇÓÕʹָ±êÏÂÔØ²¢ÊÖ¶¯Ö´ÐÐÏÂÒ»½×¶ÎµÄPDFÎĵµ¡£ËùÓÐÎĵµ £¬ÎÞÂÛÊÇMS Office»¹ÊÇPDF £¬¶¼ÊÇÓ÷¨ÓïдµÄ £¬²¢ÇÒʹÓÃÀàËÆµÄÔªÊý¾Ý¡£


https://blog.checkpoint.com/2022/09/06/in-the-mighty-savana-check-point-research-reveals-a-2-year-campaign-targeting-large-financial-institutions-in-french-speaking-african-countries/