whoAMI¹¥»÷ÀûÓÃAmazon AMIÃû³Æ»ìºÏÈëÇÖAWSÕË»§
°ä²¼¹¦·ò 2025-02-141. whoAMI¹¥»÷ÀûÓÃAmazon AMIÃû³Æ»ìºÏÈëÇÖAWSÕË»§
2ÔÂ13ÈÕ£¬°²È«×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪ¡°whoAMI¡±µÄ¹¥»÷·½Ê½£¬¸Ã¹¥»÷ÔÊÐíÈκΰ䲼ӵÓÐÌØ¶¨Ãû³ÆµÄAmazonϵͳӳÏñ£¨AMI£©µÄÈ˽ӼûAmazon Web·þÎñÕÊ»§¡£´Ë¹¥»÷ÓÉDataDog×êÑÐÈËÔ±ÓÚ2024Äê8Ô²߶¯£¬Í¨¹ýÀûÓÃÈí¼þÏîÄ¿¼ìË÷AMI IDÔÚAWSÕË»§ÄÚÖ´ÐдúÂë¡£ÑÇÂíÑ·È·Èϸ÷ì϶²¢ÓÚ9Ô°䲼½¨¸´·¨Ê½£¬µ«²¿ÃÅδ¸üдúÂëµÄ×éÖ¯ÈÔÃæ¶Ô·çÏÕ¡£whoAMI¹¥»÷ÀûÓÃÁËAWS»·¾³ÖÐAMIÑ¡ÔñÅäÖõÄÃýÎó£¬Èçδָ¶¨ËùÓÐÕß¡¢Ê¹ÓÃͨÅä·û°ü°ìÌØ¶¨AMI ID»òʹÓá°most_recent=true¡±µÈʵ¼Ê£¬Ê¹µÃ¹¥»÷ÕßÄܲåÈë¶ñÒâAMI¡£¹¥»÷ÕßÖ»Ðè°ä²¼Ò»¸öÃû³ÆÇкϿÉÐÅËùÓÐÕßģʽµÄAMI£¬Óû§¾Í¿ÉÄÜÑ¡Ôñ²¢Æô¶¯Ëü¡£DataDogµÄÒ£²âÊý¾ÝÏÔʾ£¬Ô¼1%µÄ×éÖ¯Ò×Êܹ¥»÷£¬¿ÉÄÜÓ°ÏìÊýǧ¸öAWSÕË»§¡£ÑÇÂíÑ·Òѽ¨¸´¸ÃÎÊÌâ²¢ÍÆ³ö¡°ÔÊÐíµÄAMI¡±Ð°²È«½ÚÔ죬½¨Òé¿Í»§Ê¼ÖÕÖ¸¶¨AMIËùÓÐÕß²¢ÆôÓøÃÖ°ÄÜ¡£´Ë±í£¬TerraformÒ²ÆðÍ·ÖÒ¸æÎ´Ê¹ÓÃËùÓÐÕß¹ýÂËÆ÷µÄÇé¿ö£¬²¢´òËãÖ´ÐиüÑϸñµÄÖ´ÐС£ÏµÍ³ÖÎÀíÔ±ÐèÉóºËÅäÖò¢¸üдúÂëÒÔʵÏÖ°²È«µÄAMI¼ìË÷£¬Í¬Ê±ÆôÓÃAWSÉó¼ÆÄ£Ê½²é³²»ÊÜÐÅÀµµÄAMI¡£DataDog»¹°ä²¼ÁËɨÃ跨ʽ¹©Óû§²é³AWSÕË»§ÖÐÊÇ·ñ´æÔÚ²»ÊÜÐÅÀµµÄAMIÊ·ý¡£
https://www.bleepingcomputer.com/news/security/whoami-attacks-give-hackers-code-execution-on-amazon-ec2-instances/
2. DoxbinÊý¾Ý´óй¶£ºToodaºÚ¿Í×éÖ¯ÆØ¹â13.6ÍòÓû§¼Í¼¼°ºÚÃûµ¥
2ÔÂ13ÈÕ£¬DoxbinÊÇÒ»¸öÉæ¼°ÍøÂçÈËÈâËÑË÷ºÍÓ×ÎÒÐÅϢй¶µÄ³ôÃûÔ¶ÑïÆ½Ì¨£¬½üÆÚ±»Ò»¸öÃûΪToodaµÄºÚ¿Í×éÖ¯¹¥Ï£¬µ¼Ö´óÁ¿Óû§Êý¾Ýй¶¡£¾ÝHackread.com±¨Â·£¬Tooda×éÖ¯Ðû³ÆÕâ´Î¹¥»÷ÊÇ¶ÔÆäÖÐÒ»Ãû³ÉÔ±Ö¸¿ØµÄ»ØÓ¦£¬ËûÃÇ·ÛËéÁËDoxbinµÄ»ù´¡ÉèÊ©£¬¶Ï¸ùÁËÓû§ÕÊ»§£¬Ëø¶¨ÁËÖÎÀíÔ±£¬²¢Ð¹Â¶ÁËÔËÓª¸Ãƽ̨ÈËÔ±µÄÓ×ÎÒÐÅÏ¢¡£Ð¹Â¶µÄÊý¾ÝÔ̺¬³¬¹ý136,000ÌõÓû§¼Í¼£¬ÈçID¡¢Óû§ÃûºÍµç×ÓÓʼþµØÖ·£¬ÒÔ¼°Ò»¸öÃûΪ¡°DoxbinºÚÃûµ¥¡±µÄÎļþ£¬¸ÃÎļþÍøÂçÁËÒѸ¶·Ñ×èÖ¹ÐÅÏ¢°ä²¼ÔÚDoxbinÉϵÄÈËÔ±ÐÅÏ¢¡£´Ë±í£¬Tooda»¹°ä²¼Á˾ݳÆÊôÓÚDoxbinÖÎÀíÔ±River£¨ÕæÃûPaula£©µÄ¾ßÌåÓ×ÎÒÊý¾Ý¡£Õâ´ÎÊý¾Ýй¶¶ÔDoxbinÓû§À´Ëµ¼«ÎªÎ£ÏÕ£¬¼´±ãÖ»ÓÐЧ»§ÃûºÍµç×ÓÓʼþµØÖ·Ð¹Â¶£¬ÕâЩÐÅÏ¢Ò²¿ÉÄÜÓëÆäËûйÃÜÐÅÏ¢½»²æÒýÓ㬵¼ÖÂÉí·Ý×·×ÙºÍÏÖʵÊÀ½çµÄÁªÏµ±»·¢ÏÖ¡£Ä¿Ç°£¬Doxbin´¦ÓÚÀëÏß״̬£¬Õâ´ÎÊÂÎñ½øÒ»²½Åú×¢£¬¼´±ãÊǶñÒâÆ½Ì¨Ò²¿ÉÄÜÊܵ½¾ºÕùµÐÊֵĹ¥»÷£¬DoxbinÓû§Ãæ¶Ô¶³ö·çÏÕ¡£
https://hackread.com/doxbin-data-breach-hackers-leak-user-records-blacklist-file/
3. Zacks Investment ResearchÒÉÔâ1200ÍòÕË»§Êý¾Ýй¶
2ÔÂ13ÈÕ£¬Zacks Investment Research£¨Zacks£©ÊÇÒ»¼ÒÌṩÊý¾ÝÇý¶¯Í¶×ʼû½âµÄÃÀ¹ú¹«Ë¾£¬ÔÚ2024Äê6ÔÂÒÉËÆÔâ·êÁËÊý¾Ýй¶ÊÂÎñ£¬µ¼ÖÂԼĪ1200Íò¸öÕË»§µÄÃô¸ÐÐÅÏ¢±»Ð¹Â¶¡£ÕâЩÐÅÏ¢Ô̺¬È«Ãû¡¢Óû§Ãû¡¢µç×ÓÓʼþµØÖ·¡¢ÏÖʵµØÖ·ºÍµç»°ºÅÂëµÈ¡£Ò»ÃûÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳Éϰ䲼ÁËÊý¾ÝÑù±¾£¬²¢Ðû³Æ¶ÔZacks½øÐÐÁËÈëÇÖ¡£Ö»¹ÜZacksÉÐδ»ØÓ¦¹ØÓÚÊý¾ÝÕæÊµÐÔµÄѯÎÊ£¬µ«Ð¹Â¶µÄÊý¾Ý¿âÒѱ»Ôö³¤µ½Have I Been Pwned£¨HIBP£©ÍøÕ¾ÉϹ©Óû§²é³¡£HIBPÈ·ÈϸÃÎļþÔ̺¬1200Íò¸öΨһµç×ÓÓʼþµØÖ·µÈÐÅÏ¢£¬²¢Ö¸³öÔ¼93%µÄй¶µç×ÓÓʼþµØÖ·ÒÑ´æÔÚÓÚÆäÊý¾Ý¿âÖУ¬¿ÉÄÜÀ´×Ô´Óǰ¶Ôͳһƽ̨»òÆäËû·þÎñµÄÈëÇÖ¡£ÈôÊÇÕâ´ÎÊý¾Ýй¶±»Ö¤ÊµÎªÐºڿ͹¥»÷µÄÁ˾֣¬Õ⽫ÊÇ´ÓǰËÄÄêÄÚÓ°ÏìZacksµÄµÚÈý´Î³Á´óÊý¾Ýй¶ÊÂÎñ¡£´Ëǰ£¬ZacksÒÑÔÚ2023Äê1ÔÂÅû¶ÁËÒ»´ÎÉæ¼°820,000Ãû¿Í»§Ãô¸ÐÐÅÏ¢µÄй¶ÊÂÎñ£¬²¢ÔÚ2023Äê6Ô±»HIBPÑéÖ¤ÁËÒ»¸öÔ̺¬880ÍòʹÓÃZacks·þÎñÓ×ÎÒÐÅÏ¢µÄµ¥¶ÀÊý¾Ý¿âй¶¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Õâ´Îй¶ÊÂÎñÉÐδµÃµ½ZacksµÄ¹Ù·½Ö¤Êµ¡£
https://www.bleepingcomputer.com/news/security/hacker-leaks-account-data-of-12-million-zacks-investment-users/
4. AstarothÍøÂç´¹µö¹¤¾ß°ü£ºÐÂÐ͹¥»÷·½Ê½¿ÉÈÆ¹ý2FAÇÔÈ¡µÇ¼ƾ֤
2ÔÂ13ÈÕ£¬Ò»ÖÖÃûΪAstarothµÄÐÂÐ͸߼¶ÍøÂç´¹µö¹¤¾ß°üÒѳʴ˿ÌÍøÂç·¸×ïÍøÂçÖУ¬Ëüͨ¹ý·´Ïò´úÀí¡¢ÊµÊ±Æ¾Ö¤²¶»ñºÍ»á»°½Ù³Ö¼¼Êõ£¬¿ÉÄÜÈÆ¹ýË«³É·ÖÉí·ÝÑéÖ¤£¨2FA£©£¬ÇÔÈ¡Gmail¡¢YahooºÍMicrosoftµÈ·þÎñµÄµÇ¼ƾ֤¡£AstarothʹÓöñÒâ·þÎñÆ÷×÷ΪÊܺ¦ÕߺͺϷ¨ÍøÕ¾Ö®¼äµÄÖн飬À¹½Ø²¢°Ñ³ÖÁ÷Á¿£¬ÊµÊ±²¶»ñµÇ¼ʹ´¦¡¢Éí·ÝÑéÖ¤ÁîÅÆºÍ»á»°cookie¡£¹¥»÷ÕßÄܹ»Í¨¹ýWebÃæ°å½çÃæºÍTelegram֪ͨʵʱ½Ó¹Ü²¶»ñµÄÐÅÏ¢¡£¸Ã¹¤¾ß°üͨ¹ýTelegramÏúÊÛ£¬²¢ÔÚÍøÂç·¸×ïÂÛ̳ºÍÊг¡ÉÏÍÆ¹ã£¬ÊÛ¼Û2000ÃÀÔª£¬Ô̺¬Áù¸öÔµĸüкÍÖ§³Ö¡£¾Ý×êÑÐÈËÔ±³Æ£¬AstarothµÄ¸´ÔÓˮƽÁîÈËÕ𾪣¬Óû§Ó¦¸ñ±íÓ×Ðĵç×ÓÓʼþÖеÄÁ´½Ó£¬Ö±½Ó½Ó¼ûÍøÕ¾ÒÔ²é³ÕË»§ÊÇ·ñ´æÔÚÎÊÌâ¡£
https://hackread.com/astaroth-phishing-kit-bypasses-2fa-hijack-gmail-microsoft/
5. PostgreSQLÐÂÁãÈÕ·ì϶³ÉBeyondTrust¹¥»÷¹Ø¼ü£¬²ÆÕþ²¿ÔâºÚ¿ÍÈëÇÖ
2ÔÂ13ÈÕ£¬Rapid7µÄ°²È«×êÑÐÈËÔ±ÖÜËĻ㱨³Æ£¬ÔÚPostgreSQLÖз¢ÏÖÁËÒ»¸öеÄÁãÈÕ·ì϶£¨CVE-2025-1094£©£¬¸Ã·ì϶ÓëÕë¶ÔBeyondTrustÔ¶³ÌÖ§³Ö²úÆ·µÄһϵÁй¥»÷Ç×êÇÓйء£¸Ã·ì϶ӰÏìPostgreSQL½»»¥Ê½ÖÕ¶Ëpsql£¬ÔÊÐí¾«ÐÄ»ú¹ØµÄSQLÓï¾ä´¥·¢SQL×¢Èë¡£Rapid7Ö¸³ö£¬ºÚ¿ÍÒÑÀûÓô˷ì϶³É¹¦ÈëÇÖÃÀ¹ú²ÆÕþ²¿µÄ»úе¡£Ö»¹ÜBeyondTrustÒÑÕë¶ÔÆäÓйطì϶°ä²¼Á˲¹¶¡£¬µ«PostgreSQLÖеÄÕâ¸öDZÔÚ·ì϶ÈÔÊǹ¥»÷ÕߵĹ¥»÷½¹µã¡£¸Ã·ì϶´æÔÚÓÚpsql´¦ÖÃÌåʽÃýÎóµÄUTF-8×Ö·ûµÄ·½Ê½ÖУ¬¾«ÐÄÉè¼ÆµÄÎÞЧÐòÁÐÄܹ»¹ýÔçÖÕÖ¹SQLºÅÁʹ¹¥»÷Õß¿ÉÄÜ×¢ÈëÆäËûÓï¾ä£¬ÉõÖÁ´¥·¢shellÖ´ÐС£PostgreSQLÍŶÓÒѰ䲼´¹Î£²¹¶¡£¬²¢ÖÒ¸æÁËÊÜÓ°Ïì°æ±¾¡£Í¬Ê±£¬Rapid7»¹°ä²¼ÁËMetasploitÄ£¿é£¬ÓÃÓÚÖ¸ÎÆ¼ø±ðºÍ×Ô¶¯Ôغɴ«ËÍÒ×Êܹ¥»÷µÄBeyondTrustϵͳ¡£
https://www.securityweek.com/rapid7-flags-new-postgresql-zero-day-connected-to-beyondtrust-exploitation/
6. CleanTalk WordPress²å¼þÏÖÑϳÁËÁÒâÎļþÉÏ´«·ì϶£¬³¬3ÍòÍøÕ¾Ãæ¶Ô·çÏÕ
2ÔÂ13ÈÕ£¬CleanTalk WordPress ²å¼þÖз¢ÏÖÁËÒ»¸ö±àºÅΪCVE-2024-13365µÄÑϳÁËÁÒâÎļþÉÏ´«·ì϶£¬¸Ã·ì϶¿ÉÄÜʹ³¬¹ý30,000¸öÍøÕ¾Ãæ¶Ô±»ÆëÈ«¹¥ÏµķçÏÕ¡£´Ë·ì϶µÄCVSSÆÀ·Ö¸ß´ï9.8£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢ÉÏ´«¶ñÒâÎļþ£¬½ø¶øÔÚ·þÎñÆ÷ÉÏÖ´ÐдúÂë¡£·ì϶ԴÓÚ²å¼þÔÚɨÃèZIP´æµµÊ±Î´ÄÜÕýÈ·ÑéÖ¤Óû§ÌṩµÄÊý¾Ý£¬µ¼Ö¹¥»÷ÕßÄܹ»ÉÏ´«ËÁÒâÎļþ£¬Ô̺¬¶ñÒâ¾ç±¾¡£¼´±ãδ¾Éí·ÝÑéÖ¤µÄÓû§Í¨³£²»ÔÊÐíÉÏ´«Îļþ£¬¸Ã·ì϶Ҳ¿ÉÄܱ»ÀûÓ㬹¥»÷Õß¿ÉÄÜ»áÉÏ´«Ô̺¬°µ²ØÔÚÎÞº¦ÎļþÖеĶñÒâPHPÎļþµÄ´óÐÍZIPÎļþ£¬ÒÔѹ¿å·þÎñÆ÷×ÊÔ´²¢ÔÊÐíÖ´ÐжñÒâÎļþ¡£Wordfence°²È«¹«Ë¾·¢ÏÖÁ˸÷ì϶£¬²¢½¨ÒéËùÓÐʹÓÃCleanTalk²å¼þµÄÓû§¾¡¿ì¸üе½×îа汾2.150£¬ÒÔ±£»¤ÆäÍøÕ¾ÃâÊÜDZÔÚ¹¥»÷¡£Í¬Ê±£¬°²È«×êÑÐÔ±Lucio S¨¢ÒòÕÆ¹ÜÈεػ㱨¸Ã·ì϶¶ø»ñµÃ1,716.00ÃÀÔªµÄÉͽð¡£
https://securityonline.info/hackers-can-take-over-30000-wordpress-sites-due-to-critical-cleantalk-security-flaw-cve-2024-13365/


¾©¹«Íø°²±¸11010802024551ºÅ