Aqua NautilusÔÚÅäÖÃÃýÎóµÄ×¢²á±íÖз¢ÏÖ2.5ÒÚ¸ö¹¤¼þ

°ä²¼¹¦·ò 2023-04-27

1¡¢Aqua NautilusÔÚÅäÖÃÃýÎóµÄ×¢²á±íÖз¢ÏÖ2.5ÒÚ¸ö¹¤¼þ


¾ÝAqua Nautilus 4ÔÂ24Èճƣ¬Æä¼ì²âµ½Êýǧ¸öÅäÖÃÃýÎóµÄ×¢²á±íºÍ´æ´¢¿â£¬ÆäÖÐÔ̺¬³¬¹ý2.5ÒÚ¸ö¹¤¼þºÍ³¬¹ý65000¸öÈÝÆ÷¾µÏñ¡£ÔÚijЩÇé¿öÏ£¬¹¥»÷Õ߿ɻñÈ¡Ãô¸ÐÐÅÏ¢£¬ÀýÈç»úÃÜ¡¢ÃÜÔ¿ºÍÃÜÂ룬Õâ¿ÉÄܵ¼ÖÂÈí¼þ¹©¸øÁ´¹¥»÷ºÍÈí¼þ¿ª²úÐÔÃüÖÜÆÚ(SDLC)Öж¾¡£×êÑÐÈËÔ±·¢ÏÖÁË57¸ö×¢²á±í´æÔÚÑϳÁ·ì϶£¬ÀýÈçĬÈϵÄÖÎÀíÔ±ÃÜÂ룬ÆäÖÐ15¸ö×¢²á±íÔÊÐíʹÓÃĬÈÏÃÜÂë½øÐÐÖÎÀíÔ±½Ó¼û¡ £»¹Óг¬¹ý2100¸öÓµÓÐÉÏ´«È¨Ï޵Ť¼þ×¢²á±í£¬¿É±»¹¥»÷ÕßÓÃÀ´Í¨¹ý¶ñÒâ´úÂëʹע²á±íÖж¾¡£


https://www.infosecurity-magazine.com/news/250-million-artifacts-exposed/


2¡¢CiscoÅû¶PCDÈí¼þÖеÄXSS·ì϶CVE-2023-20060


4ÔÂ26ÈÕ£¬CiscoÅû¶ÁËPrime Collaboration Deployment(PCD)Èí¼þÖеÄXSS·ì϶£¨CVE-2023-20060£©¡£¸Ã·ì϶ÊÇÓÉÓÚ»ùÓÚWebµÄÖÎÀí½çÃæÎÞ·¨ÕýÈ·ÑéÖ¤Óû§µÄÊäÈ룬¹¥»÷Õß¿Éͨ¹ýÓÕʹÓû§µ¥»÷¶ñÒâÁ´½ÓÀ´ÀûÓô˷ì϶¡£³É¹¦ÀûÓø÷ì϶¿ÉÔÚ±»Ó°ÏìµÄ½çÃæÉÏÖ´ÐÐËÁÒâ¾ç±¾´úÂ룬»ò½Ó¼û»ùÓÚä¯ÀÀÆ÷µÄÐÅÏ¢¡£¸Ã¹«Ë¾´òË㽫ϸöÔ°䲼°²È«¸üÐÂÀ´½¨¸´ÕâÒ»·ì϶£¬Ä¿Ç°Ã»Óнâ¾ö´ËÎÊÌâµÄ±äͨ·¨×Ó¡£


https://www.bleepingcomputer.com/news/security/cisco-discloses-xss-zero-day-flaw-in-server-management-tool/


3¡¢EDUCATED MANTICOREÀûÓÃй¤¾ß¹¥»÷ÒÔÉ«ÁеÄ×éÖ¯


4ÔÂ25ÈÕ£¬Check Point½ÒʾÁËEDUCATED MANTICOREÀûÓøĽøµÄÕ½ÊõºÍ¹¤¾ß¹¥»÷ÒÔÉ«ÁÐ×éÖ¯µÄ»î¶¯¡£¹¥»÷ʼÓÚÒ»¸öISO´ÅÅ̾µÏñÎļþ£¬¸ÃÎļþÀûÓÃÒÔÒÁÀ­¿ËΪÖ÷ÌâµÄµö¶üÀ´·Ö·¢×Ô½ç˵µÄÄÚ´æÏÂÔØ·¨Ê½£¬×îÖÕ»á×°ÖÃа汾µÄPowerLessÖ²È뷨ʽ£¬¸Ã¹¤¾ßÒѾ­±»¹éÒòÓÚPhosphorus¡£PowerLess payloadµÄ¼ÓÔØ»úÔìÓÐÁËÏÔÖøµÄ¸Ä½ø£¬Ñ¡È¡ÁËÔÚÒ°±íºÜÉÙ¼ûµÄ¼¼Êõ£¬ÈçʹÓÃÒÔ»ìºÏģʽ´´½¨µÄ.NET¶þ½øÔìÎļþºÍ»ã±à´úÂë¡£


https://research.checkpoint.com/2023/educated-manticore-iran-aligned-threat-actor-targeting-israel-via-improved-arsenal-of-tools/


4¡¢TP-Link Archer A21ÖкÅÁî×¢Èë·ì϶±»Mirai±äÌåÀûÓÃ


¾ÝýÌå4ÔÂ25ÈÕ±¨Â·£¬Ò»¸öеÄMirai±äÌåÆðÍ·ÀûÓÃTP-Link Archer A21Öеķì϶£¨CVE-2023-1389£©¡£¸Ã·ì϶ÓÚ1Ô±»Åû¶£¬TP-LinkÔÚ3ÔµĹ̼þ¸üÐÂÖн¨¸´Á˸÷ì϶¡£ZDI´Ó4ÔÂ11ÈÕÆðÍ·ÔÚÒ°±í¼ì²âµ½ÁËÀûÓø÷ì϶µÄ»î¶¯£¬×î³õ¼¯ÖÐÔÚ¶«Å·£¬´Ë¿ÌÏòÈ«ÇòÊæÕ¹¡£×êÑÐÈËÔ±³Æ£¬Ð°汾µÄMiraiÀûÓø÷ì϶»ñÈ¡¶ÔÉ豸µÄ½Ó¼ûȨÏÞ£¬¶øºóËü»áΪ·ÓÉÆ÷µÄ¼Ü¹¹ÏÂÔØÊʵ±µÄ¶þ½øÔìpayload£¬ÒÔ½«É豸²ÎÓëÆä½©Ê¬ÍøÂçÖС£¹¥»÷±³ºóµÄMiraiרһÓÚDDoS¹¥»÷£¬ÖØÒªÕë¶ÔÓÎÏ··þÎñÆ÷£¬ÓµÓÐÕë¶ÔValve Source Engine(VSE)µÄÖ°ÄÜ¡£


https://securityaffairs.com/145278/hacking/mirai-botnet-cve-2023-1389-tp-link-archer-a21.html


5¡¢×êÑÐÍŶÓÅû¶APT37ͨ¹ýLNKÎļþ·Ö·¢RokRATµÄ»î¶¯


×êÑÐÍŶÓÔÚ4ÔÂ26ÈÕÅû¶ÁËAPT37£¨Ò²³ÆAPT37ºÍScarCruft£©½üÆÚͨ¹ýLNKÎļþ·Ö·¢¶ñÒâÈí¼þRokRATµÄ»î¶¯¡£LNKÎļþ¼Ù×°³ÉPDFͼ±ê£¬²¢Ô̺¬¶ñÒâµÄPowerShellºÅÁÒÔ¼°Í¨³£µÄPDFÎļþµÄÊý¾ÝºÍ¶ñÒâ¾ç±¾´úÂë¡£×îÖÕ»áÏÂÔØ¶ñÒâÈí¼þRokRAT£¬Ëü¿ÉÄÜÍøÂçÓû§Æ¾Ö¤²¢ÏÂÔØ¶î±íµÄ¶ñÒâÈí¼þ¡£ÍøÂçµÄÐÅÏ¢±»·¢Ë͵½¹¥»÷ÕßµÄÔÆ·þÎñÆ÷£¬Ê¹ÓÃpcloudºÍyandexµÈÔÆ·þÎñ£¬ÒªÇóÍ·ÖеÄUserAgent±»¼Ù×°³ÉGooglebot¡£


https://asec.ahnlab.com/en/51751/


6¡¢Trend Micro°ä²¼¶ñÒâÈí¼þViperSoftXµÄ·ÖÎö»ã±¨


4ÔÂ24ÈÕ£¬Trend Micro°ä²¼ÁËа汾ÐÅÏ¢ÇÔÈ¡·¨Ê½ViperSoftXµÄ·ÖÎö»ã±¨¡£ViperSoftXÖØÒªÕë¶Ô¼ÓÃÜÇ®±Ò£¬Í¨³£ÒÔÈí¼þÆÆ½â¡¢¼¤»îÆ÷»ò½¨²¹·¨Ê½»òÃÜÔ¿ÌìÉúÆ÷(keygen)µÄ´ó¾Ö³öÏÖ¡£×êÑÐÈËÔ±·¢ÏÖ£¬ViperSoftXÓÃÓÚµÚ¶þ½×¶ÎÏÂÔØµÄÖØÒªC&C·þÎñÆ÷ÿÔ³ÇÊвúÉú±ä¶¯¡£´Ë±í£¬¸Ã¶ñÒâÈí¼þ»¹Ê¹ÓÃ×Ö½Ú³ÁÓ³ÉäÀ´È·±£ÔÚûÓÐÕýÈ·×Ö½ÚÓ³ÉäµÄÇé¿öÏÂÎÞ·¨µÈÏнâÃÜ shellcode£¬¿ÉÔ¤·ÀÇ¿Ôì½âÃÜ¡£Õâ´Îµ÷²é»¹·¢ÏÖ£¬ViperSoftX²»½ö²é³­¼ÓÃÜÇ®±Ò£¬»¹Äܹ»²é³­Ò»Ð©ÃÜÂëÖÎÀíÆ÷¡£


https://www.trendmicro.com/en_us/research/23/d/vipersoftx-updates-encryption-steals-data.html