Western DigitalÔâµ½¹¥»÷My Cloud·þÎñÁÙʱÖжÏ

°ä²¼¹¦·ò 2023-04-04

1¡¢Western DigitalÔâµ½¹¥»÷My Cloud·þÎñÁÙʱÖжÏ


4ÔÂ3ÈÕ±¨Â·£¬Western Digital³ÆÆäÔâµ½¹¥»÷£¬Î´¾­ÊÚȨµÄµÚÈý·½»ñµÃÁËÆä¹«Ë¾¶à¸öϵͳµÄ½Ó¼ûȨÏÞ¡£¾ÝϤ£¬¸ÃÊÂÎñÊÇÔÚ3ÔÂ26ÈÕ·¢Ïֵģ¬Ä¿Ç°µ÷²éÉд¦ÓÚÔçÆÚ½×¶Î£¬¹«Ë¾ÕýÓë·¨Âɲ¿ÃÅЭµ÷¹¤×÷¡£¾ÝÏֽ׶ε÷²é£¬¹«Ë¾È·ÈϹ¥»÷Õß´ÓÆäϵͳÖлñÈ¡ÁËijЩÊý¾Ý£¬²¢ÔÚÖÂÁ¦ÏàʶÕâЩÊý¾ÝµÄÐÔÖʺÍÁìÓò¡£¸Ã¹«Ë¾³Æ£¬ÆäÓ¦¶Ô´ëÊ©¿ÉÄܵ¼Ö¹«Ë¾²¿ÃÅÒµÎñÔËÓªÖжÏ¡£×ÔÖÜÈÕÒÔÀ´£¬¶à¸öMy CloudÓû§»ã±¨ËûÃÇÎÞ·¨½Ó¼ûÔÆÍйÜýÌå´æ´¢¿â£¬µÇ¼ʱ»áÏÔʾ¡°503·þÎñÁÙʱ²»³ÉÓá±ÃýÎó¡£¾à³õ´Î»ã±¨ÖжÏÒÔÀ´Òѳ¬¹ý24Ó×ʱ£¬ÔÆ¡¢´úÀí¡¢Web¡¢Éí·ÝÑéÖ¤¡¢µç×ÓÓʼþºÍÍÆËÍ֪ͨ¾ù²»³ÉÓá£


https://www.bleepingcomputer.com/news/security/western-digital-discloses-network-breach-my-cloud-service-down/


2¡¢Dish NetworkÒòÀÕË÷¹¥»÷ÊÂÎñÔâµ½¶àÆð¼¯ÌåËßËÏ


ýÌå4ÔÂ1Èճƣ¬ÖÁÉÙÓÐÁù¼ÒÂÉʦÊÂÎñµØµã¶ÔDish NetworkÌáÆð¼¯ÌåËßËÏ£¬Ö¼ÔÚΪ2021Äê2ÔÂ22ÈÕÖÁ2023Äê2ÔÂ27ÈÕÆÚ¼äÒòÉæÏÓ¡°Ö¤È¯Ú²Æ­¡±Êܵ½²»ÀûÓ°ÏìµÄDish¹É¶«×·»ØËðʧ¡£ÃñÊÂËßËϳÆ£¬DISH NetworkÊÔͼ¸²¸ÇÆäÍøÂ簲ȫºÍIT»ù´¡ÉèÊ©²»¼°µÄÊÂʵ£¬Í¬Ê±¿ä´óÆäÔËӪЧÄÜ¡£ÓÉÓÚÉÏÊöÔ­Òò£¬¹«Ë¾ÎÞ·¨Êʱ¾µØ± £»¤¿Í»§Êý¾Ý£¬Ê¹ÆäÈÝÒ×±»¹¥»÷Õß½Ó¼û¡£2ÔÂ24ÈÕ×óÓÒ£¬DISHÉñÃØÏÂÏߣ¬ÆäÍøÕ¾ºÍÀûÓÃÍ£ÔËÊýÈÕ¡£2ÔÂ28ÈÕ£¬DISHй©ÆäÔâµ½ÀÕË÷¹¥»÷¡£ÐÂÎÅ´«³öºó£¬Æä¹É¼Ûÿ¹É×ÅÂä0.79ÃÀÔª¡£


https://www.bleepingcomputer.com/news/security/dish-slapped-with-multiple-lawsuits-after-ransomware-cyber-attack/


3¡¢Winter VivernÀûÓÃZimbra·ì϶¹¥»÷±±Ô¼¾üÕþºÍ±í½»»ú¹¹


ProofpointÔÚ3ÔÂ30ÈÕÅû¶ÁËTA473£¨±ðÃûWinter Vivern£©ÀûÓÃZimbra Collaboration·þÎñÆ÷Öзì϶£¨CVE-2022-27926£©µÄ¹¥»÷»î¶¯¡£¹¥»÷ʼÓÚ2023Äê2Ô£¬ÖØÒªÕë¶ÔÓë±±Ô¼ÓйصÄÅ·ÖÞ¾üÊ¡¢µ±¾ÖºÍ±í½»»ú¹¹¡£¹¥»÷ÕßʹÓÃAcunetixɨÃè佨¸´µÄÍøÂçÓʼþƽ̨²¢·¢ËÍ´¹µöÓʼþ£¬ÓʼþÖеÄÁ´½Ó¿ÉÀûÓÃZimbraÖзì϶½«JavaScript payload×¢ÈëÍøÒ³¡£ÕâЩpayloadÓÃÓÚ´ÓÖ¸±êÊÕµ½µÄcookieÖÐÇÔÈ¡Óû§Ãû¡¢ÃÜÂëºÍÁîÅÆ£¬À´½Ó¼ûÖ¸±êµÄÓʼþÕÊ»§¡£×îºó£¬¹¥»÷Õß»á½Ó¼ûÓʼþÖеÄÃô¸ÐÐÅÏ¢£¬»òÔÚÒ»¶Î¹¦·òÄÚ¼à¿ØÍ¨Ñ¶¡£


https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability


4¡¢¶à¸ö½©Ê¬ÍøÂçÀûÓÃCactiºÍRealtek·ì϶·Ö·¢¶ñÒâÈí¼þ


3ÔÂ29ÈÕ£¬Fortinet³ÆÆäÔÚ½ñÄê1ÔÂÖÁ3Ô¼ì²âµ½¶à¸ö½©Ê¬ÍøÂçÀûÓÃCactiºÍRealtek·ì϶£¬Ö¼ÔÚ·Ö·¢¶ñÒâÈí¼þShellBotºÍMoobot¡£·ì϶±ðÀëΪRealtek Jungle SDKÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2021-35394£©ºÍCacti¹ÊÕÏÖÎÀí¼à¿Ø¹¤¾ßÖеĺÅÁî×¢Èë·ì϶£¨CVE-2022-46169£©¡£MoobotÊÇMiraiµÄÒ»¸ö±äÖÖ£¬Ð°汾µÄÒ»¸öÏÔÖøÌØµãÊÇËüÃÇ¿ÉÄÜɨÃ貢ɱËÀÆäËüÒÑÖªbot¹ý³Ì£¬ÒÔ»ñµÃ×î´óÓ²¼þ¹¦ÂÊÀ´Ö´ÐÐDDoS¹¥»÷¡£ShellBotÓÚ½ñÄê1Ô³õ´Î±»·¢ÏÖ£¬Fortinet·¢ÏÖÁËËüµÄÈý¸ö¼þ±äÌ壬Åú×¢ËüÔÚ»ý¼«¿ª·¢ÖС£


https://www.fortinet.com/blog/threat-research/moobot-strikes-again-targeting-cacti-and-realtek-vulnerabilities


5¡¢×êÑÐÈËÔ±Åû¶Azure SFXÖзì϶Super FabriXssµÄϸ½Ú


¾Ý3ÔÂ30ÈÕ±¨Â·£¬×êÑÐÈËÔ±Åû¶ÁËAzure Service Fabric Explorer(SFX)Öзì϶Super FabriXssµÄϸ½Ú¡£ÕâÊÇÒ»¸ö¿çÕ¾¾ç±¾·ì϶£¨CVE-2023-23383£©£¬Ãû×ÖÆðÔ´ÓÚ΢ÈíÔÚ2022Äê10Ô½¨¸´µÄFabriXss·ì϶£¨CVE-2022-35829£©¡£Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÀûÓÃÆäÔÚService Fabric½ÚµãÉÏÍйܵÄÈÝÆ÷ÖÐʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬¶øÎÞÐèÉí·ÝÑéÖ¤¡£ÓëFabriXxs·ÖÆçµÄÊÇ£¬SuperFabriXxsÖ»´æÔÚÓÚWindows ClusterÖУ¬¿ÉÓÃÓÚ´ó¹æÄ£µÄ´úÂëÖ´Ðй¥»÷¡£Î¢ÈíÔÚ2023Äê3ÔµÄÖܶþ²¹¶¡Öн¨¸´Á˸÷ì϶¡£


https://orca.security/resources/blog/super-fabrixss-azure-vulnerability/


6¡¢Securonix·¢ÏÖÕë¶ÔÃÀ¹úµÄTACTICAL#OCTOPUS¹¥»÷»î¶¯


SecuronixÓÚ3ÔÂ30ÈÕ³ÆÆä·¢ÏÖÁËÕë¶ÔÃÀ¹ú×éÖ¯µÄTACTICAL#OCTOPUS¹¥»÷»î¶¯¡£Ëæ×ÅÃÀ¹ú4ÔÂ15ÈÕÄÉ˰½ØÖ¹ÈÕÆÚÁÚ½ü£¬Óë˰ÊÕÓйصĴ¹µö¹¥»÷Ôö³¤¡£¸Ã¹¥»÷»î¶¯Í¨³£Ê¼ÓÚÒ»¸öÊÜÃÜÂë± £»¤µÄ.zipÎļþ£¬ÆäÃû³ÆÓë˰ÎñÓйØ¡£.zipÎļþÖÐͨ³£Ô̺¬Ò»¸ö.pngºÍÒ»¸ö.lnk¡£µ±Óû§Ë«»÷¿ì½Ý·½Ê½Îļþʱ£¬´úÂëÆðÍ·Ö´ÐС£¶øºó£¬Ò»ÏµÁÐVBScriptºÍPowerShell stagers»á´ÓC2·þÎñÆ÷À­È¡¸ü¶àµÄpayload¡£


https://www.securonix.com/blog/new-tacticaloctopus-attack-campaign-targets-us-entities-with-malware-bundled-in-tax-themed-documents/