RapperBot»Ø¹éͨ¹ýÎïÁªÍøÉ豸DDoS¹¥»÷ÓÎÏ··þÎñÆ÷

°ä²¼¹¦·ò 2022-11-18
1¡¢RapperBot»Ø¹éͨ¹ýÎïÁªÍøÉ豸DDoS¹¥»÷ÓÎÏ··þÎñÆ÷


FortinetÔÚ11ÔÂ15ÈÕ³ÆÆä·¢ÏÖÁËRapperBotµÄÐÂÑù±¾£¬ÖØÒªÕë¶ÔÓÎÏ··þÎñÆ÷Ö´ÐÐDDoS¹¥»÷¡£¸Ã¶ñÒâÈí¼þÓÚÈ¥Äê8Ô±»·¢ÏÖ£¬ÆäʱËüʹÓÃSSH±©Á¦¹¥»÷ÔÚLinux·þÎñÆ÷ÉÏ·Ö·¢¡£Í¨¹ý×·×ÙÆä»î¶¯£¬×êÑÐÈËÔ±·¢ÏÖRapperBot×Ô2021Äê5ÔÂÒÔÀ´Ò»ÏòÔÚÔËÐУ¬µ«ÆäÖ¸±ê¼«¶ÈÍÌÍ¡£×î½üµÄ±äÌåʹÓÃÁËTelnet×ÔÎÒ´«²¼»úÔ죬Õâ¸ü¿¿½üÓÚԭʼMirai¶ñÒâÈí¼þµÄ²½Öè¡£´Ë±í£¬µ±Ç°»î¶¯µÄÖ¸±êÔ½·¢ÏÔÖø£¬ÓÉÓÚ×îбäÌåÖеÄDoSºÅÁîÊÇרΪ¹¥»÷ÍйÜÔÚÏßÓÎÏ·µÄ·þÎñÆ÷¶øÉè¼Æ¡£


https://www.fortinet.com/blog/threat-research/new-rapperbot-campaign-ddos-attacks

2¡¢Sansec³ÆÕë¶ÔMagento 2ÍøÕ¾µÄTrojanOrders¹¥»÷¼¤Ôö


¾ÝýÌå11ÔÂ16ÈÕ±¨Â·£¬°²È«¹«Ë¾Sansec·¢ÏÖTrojanOrders¹¥»÷»î¶¯´ó¹æÄ£¼¤Ôö£¬½ü40%µÄMagento 2ÍøÕ¾Ôâµ½´ËÀ๥»÷¡£´Ë±í£¬×ܽá´Óǰ¼¸ÖܵĹ¥»÷ÊÂÎñ·¢ÏÖÓÐ7¸ö·ÖÆçµÄ¹¥»÷ÔØÌ壬ÕâÒâζ×Å´Ë¿ÌÖÁÉÙÓÐ7¸öºÚ¿Í¼¯ÌåÔÚ³¢ÊÔÖ´ÐÐTrojanOrders¹¥»÷¡£TrojanOrdersÊÇÒ»ÖÖÀûÓÃMagento 2·ì϶£¨CVE-2022-24086£©µÄ¹¥»÷·½Ê½£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÓÃÀ´Ö´ÐдúÂë²¢ÔÚÍøÕ¾ÉÏ×°ÖÃRAT¡£AdobeÔÚ2022Äê2Ô½¨¸´Á˸÷ì϶£¬µ«ºÜ¶àMagentoÍøÕ¾ÈÔδװÖò¹¶¡¡£


https://www.bleepingcomputer.com/news/security/magento-stores-targeted-in-massive-surge-of-trojanorders-attacks/

3¡¢Mitiga·¢ÏÖÊý°Ù¸öAmazon RDSÊ·ýй¶Óû§µÄPIIÊý¾Ý

11ÔÂ16ÈÕ±¨Â·£¬MitigaµÄÐÂ×êÑÐÏÔʾAmazon Relational Database Service(Amazon RDS)ÉϵÄÊý°Ù¸öÊý¾Ý¿âй¶ÁËÓû§µÄÓ×ÎÒÉí·ÝÐÅÏ¢¡£Ð¹Â¶Ô´ÓÚÒ»¸öÃûΪ¹«¹²RDS¿ìÕÕµÄÖ°ÄÜ£¬¸ÃÖ°ÄÜÔÊÐí´´½¨Ò»¸öÔÚÔÆÖÐÔËÐеÄÕû¸öÊý¾Ý¿â»·¾³µÄ±¸·Ý£¬²¢ÇÒËüÄܹ»±»ËùÓÐAWSÕË»§½Ó¼û¡£×êÑÐÈËÔ±´Ó2022Äê9ÔÂ21ÈÕµ½10ÔÂ20ÈÕ·¢ÏÖÁË810¸ö¹«¿ªµÄ¿ìÕÕ£¬ÆäÖг¬¹ý250¸öÒѾ­Â¶³öÁË30Ì죬ÕâÅú×¢ËüÃǺܿÉÄܱ»ÍüÈ´ÁË¡£

https://thehackernews.com/2022/11/researchers-discover-hundreds-of-amazon.html

4¡¢F5°ä²¼°²È«¸üн¨¸´Æä²úÆ·ÖеÄ2¸öÔ¶³Ì´úÂëÖ´Ðзì϶

¾Ý11ÔÂ16ÈÕ±¨Â·£¬Rapid7·¢ÏÖÁËF5 BIG-IPºÍBIG-IQÖеĶà¸ö·ì϶¡£ÆäÖнÏΪÑϳÁµÄÊÇͨ¹ýiControl SOAPµÄCSRF·ì϶£¨CVE-2022-41622£©£¬¿Éµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐС£ÒÔ¼°£¬Í¨¹ýפÁôÔÚÉ豸ģʽiControl RESTÖеÄRPM¹æ·¶×¢ÈëµÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2022-41800£©£¬¿ÉÓÃÀ´ÈƹýApplianceģʽÏÞ¶È¡£Ä¿Ç°£¬F5Òѽ¨¸´ÕâЩ·ì϶¡£´Ë±í£¬×êÑÐÈËÔ±»¹·¢ÏÖÁ˼¸¸öÈÆ¹ý°²È«½ÚÔìµÄ²½Ö裬µ«F5²¢Î´½«Æä¼ø±ðΪ¿ÉÀûÓõķì϶¡£

https://securityaffairs.co/wordpress/138631/security/2-rce-f5-products.html

5¡¢Î¢ÈíÅû¶DEV-0569·Ö·¢RoyalºÍ¶à¸öpayloadµÄв½Öè

΢ÈíÔÚ11ÔÂ17ÈÕ°ä²¼»ã±¨³Æ£¬Æä½üÆÚ·¢ÏÖÁËDEV-0569·Ö·¢¶à¸öpayloadµÄ»î¶¯£¬²¢×îÖÕ×°ÖÃÀÕË÷Èí¼þRoyal¡£DEV-0569ÖØÒªÒÀ¸½¶ñÒâ¸æ°×ºÍÖ¸Ïò¶ñÒâÈí¼þÏÂÔØ·¨Ê½µÄ´¹µöÁ´½Ó½øÐзַ¢£¬ÔÚ×î½ü¼¸¸öÔÂÀ΢Èí·¢ÏÖ¸ÃÍÅ»ïµÄ·Ö·¢²½ÖèÓÐÁ˵÷Õû£ºÔÚÖ¸±êÍøÕ¾ÉÏʹÓÃÁªÏµ±í¸ñ·Ö·¢´¹µöÁ´½Ó£¬ÔÚ¿´ÆðÀ´ºÏ·¨µÄÈí¼þÏÂÔØÍøÕ¾ºÍ×ÊÔ´¿âÉÏÍйÜαÔìµÄ×°ÖÃÎļþ£¬ÒÔ¼°Ê¹ÓÃGoogle AdsÀ´À©´óËûÃǵĶñÒâ¸æ°×¼¼Êõ¡£¸Ã»ã±¨»¹¹«¿ªÁËDEV-0569µÄTTPÒÔ¼°×éÖ¯Äܹ»²ÉÈ¡µÄ·ÀÓù´ëÊ©¡£

https://www.microsoft.com/en-us/security/blog/2022/11/17/dev-0569-finds-new-ways-to-deliver-royal-ransomware-various-payloads/

6¡¢Unit 42°ä²¼2022Äê5ÖÁ7ÔÂÍøÂç°²È«Ì¬ÊÆµÄ·ÖÎö»ã±¨

11ÔÂ16ÈÕ£¬Unit 42°ä²¼ÁË2022Äê5ÖÁ7ÔÂÍøÂç°²È«Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬ÔÚÕâÈý¸öÔÂÖУ¬¹²×¢²áÁË5976¸öеÄCVE±àºÅ£¬ÆäÖÐ23.5%±»¹éÀàΪ±¾µØ·ì϶£¬ÆäÓà76.5%ÊÇÔ¶³Ì·ì϶¡£¿çÕ¾¾ç±¾·ì϶ÈÔÊǻ㱨×î¶àµÄ·ì϶£¬SQL×¢Èë·ì϶ҲÓÐËùÔö³¤¡£¹¥»÷ÕßʱʱʹÓýüÆÚÅû¶µÄ·ì϶£¬ÓÈÆäÊÇ2021-2022ÄêµÄ·ì϶¡£°´¹¥»÷ÀàÐÍ·Ö£¬×î¶àµÄÊÇÔ¶³Ì´úÂëÖ´ÐУ¬Æä´ÎÊÇÐÅϢй¶ºÍ±éÀú¹¥»÷¡£´óÎÞÊý¹¥»÷ËÆºõ¶¼À´×ÔÃÀ¹ú£¬Æä´ÎÊǵ¹úºÍºÉÀ¼¡£

https://unit42.paloaltonetworks.com/network-security-trends-update/