CloudflareÈÕÖ¾·þÎñÑÏÖØÖÐÖ¹£¬³¬°ëÊýÈÕÖ¾Êý¾ÝÓÀÊÀɥʧ
Ðû²¼Ê±¼ä 2024-11-281. CloudflareÈÕÖ¾·þÎñÑÏÖØÖÐÖ¹£¬³¬°ëÊýÈÕÖ¾Êý¾ÝÓÀÊÀɥʧ
11ÔÂ27ÈÕ£¬»¥ÁªÍø»ù´¡ÉèÊ©¾ÞÍ·CloudflareÔÚ11ÔÂ14ÈÕÔâÓöÁËÒ»´ÎÑÏÖصķþÎñÖÐÖ¹£¬µ¼ÖÂÁè¼ÝÒ»°ëµÄÈÕÖ¾Êý¾ÝÓÀÊÀɥʧ¡£´Ë´ÎʹÊÔ´ÓÚÒ»´ÎÈí¼þ¸üзºÆð¹ÊÕÏ£¬Ê¹CloudflareµÄÈÕÖ¾·þÎṉ̃»¾3.5Сʱ£¬ÎÞ·¨Îª¿Í»§ÌṩҪº¦Êý¾Ý¡£ÈÕÖ¾·þÎñ¶ÔÍøÂçÔËÓªÖÁ¹ØÖ÷Òª£¬Äܹ»×ÊÖúÆóÒµÆÊÎöÁ÷Á¿Ä£Ê½¡¢½â¾öÎÊÌâ²¢¼ì²â¶ñÒâÔ˶¯¡£¶øCloudflareµÄÈÕÖ¾·þÎñÒÀÀµÃûΪLogpushµÄ¹¤¾ßÀ´´¦Öóͷ£²¢×ª´ï´ó×ÚÊý¾Ý¡£²»ÐÒµÄÊÇ£¬µ±ÈÕµÄLogpush¸üÐÂÖб£´æÑÏÖعýʧ£¬µ¼ÖÂÍøÂçµ½µÄÈÕ־δ±»×¼È·×ª·¢²¢×îÖÕ±»ÓÀÊÀɾ³ý¡£CloudflareÔÚ±¨¸æÖÐÖ¸³ö£¬¹ýʧÉèÖõ¼ÖÂÁËϵͳµÄ¼¶Áª¹ýÔØ£¬ÈôÊÇÄܹ»×¼È·ÉèÖ㬼´¿É×èÖ¹ÈÕ־ɥʧ¡£Ö»¹Ü¹¤³ÌʦѸËÙ·¢Ã÷ÎÊÌâ²¢»Ø¹öÁ˸üУ¬µ«´Ë¾ÙÒý·¢ÁËÁ¬Ëø¹ÊÕÏ£¬´ó×ÚÈÕÖ¾Êý¾ÝÓ¿Èëϵͳ£¬°üÀ¨Î´ÉèÖÃLogpushµÄÓû§Êý¾Ý£¬¼Ó¾çÁËÎÊÌâ¡£CloudflareÒѶԴ˴ÎÊÂÎñºÍÊý¾ÝɥʧÖÂǸ£¬²¢ÔÊÐíÖƶ©Ô¤·À²½·¥×èÖ¹ÀàËÆÊÂÎñÔٴα¬·¢£¬µ«ÏÖÔÚÕâЩ²½·¥ÈÔÔÚÖƶ©ÖС£
https://securityonline.info/cloudflare-logs-suffer-critical-failure-losing-55-of-user-data/
2. ÐÂÐÍÐÅÓÿ¨µÁË¢¶ñÒâÈí¼þ¹¥»÷MagentoÍøÕ¾
11ÔÂ28ÈÕ£¬½üÆÚ£¬Ò»ÖÖÐÂÐÍÐÅÓÿ¨µÁË¢¶ñÒâÈí¼þÕë¶Ô Magento µç×ÓÉÌÎñÍøÕ¾Ìᳫ¹¥»÷£¬¸Ã¶ñÒâÈí¼þÄÜÔÚ½áÕËÒ³Ã涯̬ÇÔÈ¡¸¶¿îÐÅÏ¢¡£ÕâÒ»·¢Ã÷ÓÉÍøÂçÇå¾²¹«Ë¾ Sucuri µÄÑо¿Ö°Ô± Weston Henry ÔÚÐþÉ«ÐÇÆÚÎåǰϦ½ÒÆÆ¡£¶ñÒâÈí¼þÒÔ JavaScript ×¢ÈëÐÎʽ±£´æ£¬¾ßÓжà¸ö±äÌ壬ͨ¹ý½¨ÉèÐéαÐÅÓÿ¨±íµ¥»òÖ±½ÓÌáÈ¡Ö§¸¶×Ö¶ÎÊý¾ÝÁ½ÖÖ·½·¨ÇÔÊØÐÅÏ¢¡£Æ䶯̬ҪÁìºÍ¼ÓÃÜ»úÖÆÔöÌíÁ˼ì²âÄѶȣ¬Êý¾Ý±»¼ÓÃܺóй¶ÖÁ¹¥»÷Õß¿ØÖƵÄÔ¶³Ì·þÎñÆ÷¡£Magento ÍøÕ¾ÒòÆÕ±éʹÓÃÇÒ´¦Öóͷ£Ãô¸Ð¿Í»§Êý¾Ý¶ø³ÉΪÍøÂç·¸·¨·Ö×ÓÄ¿µÄ¡£´Ë´Î¹¥»÷ÖУ¬¶ñÒâ¾ç±¾±»Òþ²ØÔÚ XML ÎļþµÄÌض¨Ö¸ÁîÄÚ£¬ÄÚÈݱ»»ìÏýÒÔ×èÖ¹±»·¢Ã÷£¬½öÔÚ°üÀ¨¡°checkout¡±¶ø²»º¬¡°cart¡±µÄ URL Ò³ÃæÉϼ¤»î£¬ÒÔÌáÊØÐÅÓÿ¨ÐÅÏ¢¡£Ëæºó£¬¸Ã¶ñÒâÈí¼þ»¹Í¨¹ý Magento API ÍøÂçÓû§µÄÆäËûÊý¾Ý¡£¹¥»÷ÕßʹÓöàÖÖ·´¼ì²âÊÖÒÕÒþ²ØÔ˶¯£¬°üÀ¨½«Êý¾Ý¼ÓÃÜ¡¢±àÂ룬²¢Í¨¹ýÐűêÊÖÒÕÒþÃØ´«ÊäÖÁÔ¶³Ì·þÎñÆ÷¡£Îª±£»¤µç×ÓÉÌÎñÍøÕ¾ÃâÊÜ´ËÀ๥»÷£¬Sucuri¸ø³öÁËÏà¹Ø½¨Òé¡£
https://www.darkreading.com/application-security/sneaky-skimmer-malware-magento-sites-black-friday
3. »ô²©¿ÏÊÐÔâÀÕË÷Èí¼þ¹¥»÷£¬Õþ¸®°ì¹«Êҹرղ¢Ô¤¾¯·þÎñÖÐÖ¹
11ÔÂ28ÈÕ£¬»ô²©¿ÏÊÐÔÚ27ÈÕÆÆÏþÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÕþ¸®°ì¹«ÊÒ±»Æȹرգ¬²¢Òý·¢ÁËһϵÁзþÎñºÍÔ˶¯µÄÖÐÖ¹¡£¹ÙÔ±ÃÇѸËÙͨ¹ýÊÐÕþ¸®ÍøÕ¾ºÍÉ罻ýÌåÏòÍâµØסÃñ·¢³öÖÒÑÔ£¬Ö¸³ö¸Ð¶÷½Ú¼ÙÆÚǰϦ½«·ºÆðÍ£µçºÍ·þÎñÖÐÖ¹µÄÇéÐΡ£ÊÐÕþÌü¡¢ÊÐÕþ·¨ÔººÍ½ÖµÀÇåɨÊÂÇé±»×÷·Ï£¬µ«Í£³µÖ´·¨ÊÂÇéÈÔÔÚ¼ÌÐø¡£Ö»¹ÜÔÆÔÆ£¬À¬»øÍøÂçºÍÓéÀÖÔ˶¯ÈÔ°´ÍýÏë¾ÙÐС£»ô²©¿Ï¾¯Ô±¾ÖÕýÔÚÓëÊÐÕþ¸®ºÍIT²¿·ÖÏàÖú£¬ÊÓ²ì´Ë´ÎÏ®»÷ÊÂÎñ£¬²¢Ñ°ÕÒ×î¼ÑµÄÇå¾²»Ö¸´·þÎñÒªÁì¡£ÏÖÔÚÉÐδÓÐÈκÎÀÕË÷Èí¼þÍÅ»ïÈϿɶԴ˴ι¥»÷ÈÏÕæ¡£»ô²©¿ÏÊÐ×÷ΪÐÂÔóÎ÷ÖݵÄÒ»¸öÖ÷Òª¶¼»á£¬½üÄêÀ´¸ÃÖÝÒÑÓжàËù»ú¹¹ÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬°üÀ¨ÐÂÔóÎ÷¶¼»á´óѧÔÚ7ÔÂÔâµ½µÄRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷¡£
https://therecord.media/hoboken-closes-city-hall-ransomware
4. GodLoader¶ñÒâÈí¼þʹÓÃGodotÓÎÏ·ÒýÇæÌӱܼì²âѬȾÉÏÍòϵͳ
11ÔÂ27ÈÕ£¬ºÚ¿ÍʹÓÃеÄGodLoader¶ñÒâÈí¼þ£¬Í¨¹ýÆÕ±éʹÓõÄGodotÓÎÏ·ÒýÇæµÄ¹¦Ð§À´Ìӱܼì²âϵͳ£¬²¢Ôڶ̶ÌÈý¸öÔÂÄÚѬȾÁËÁè¼Ý17,000¸öϵͳ¡£¸Ã¶ñÒâÈí¼þÄܹ»¹¥»÷ËùÓÐÖ÷Ҫƽ̨µÄÓÎÏ·Íæ¼Ò£¬²¢Ê¹ÓÃGodotµÄÎÞаÐÔºÍGDScript¾ç±¾ÓïÑÔ¹¦Ð§Ö´ÐÐí§Òâ´úÂë¡£Ò»µ©¼ÓÔØ£¬¶ñÒâÎļþ¾Í»áÔÚÊܺ¦Õß×°±¸ÉÏ´¥·¢¶ñÒâ´úÂ룬ʹ¹¥»÷ÕßÄܹ»ÇÔȡƾ֤»òÏÂÔØÆäËûÓÐÓøºÔØ£¬ÈçXMRig¼ÓÃÜÍÚ¿ó³ÌÐò¡£¹¥»÷Õßͨ¹ýStargazers Ghost NetworkÈö²¥GodLoader£¬ÕâÊÇÒ»ÖÖ¶ñÒâÈí¼þ·Ö·¢¼´·þÎñ£¨DaaS£©£¬Ê¹Óÿ´ËÆÕýµ±µÄGitHub´æ´¢¿âÑÚÊÎÆäÔ˶¯¡£ÔÚÕû¸ö¹¥»÷Ô˶¯ÖУ¬Check Point¼ì²âµ½Á˶ನÕë¶Ô¿ª·¢Ö°Ô±ºÍÓÎÏ·Íæ¼ÒµÄ×ÔÁ¦¹¥»÷¡£ËäȻֻ·¢Ã÷ÁËÕë¶ÔWindowsϵͳµÄGodLoaderÑù±¾£¬µ«Ñо¿Ö°Ô±»¹¿ª·¢ÁËGDScript¿´·¨ÑéÖ¤Îó²î´úÂ룬չʾÁ˸öñÒâÈí¼þ¿ÉÒÔÇáËɹ¥»÷LinuxºÍmacOSϵͳ¡£Godot Engineά»¤ÕßÌåÏÖ£¬¸ÃÎó²î²¢·ÇGodotËùÌØÓУ¬ÃãÀøÈËÃÇÖ»Ö´ÐÐÀ´×Ô¿ÉÐÅȪԴµÄÈí¼þ¡£
https://www.bleepingcomputer.com/news/security/new-godloader-malware-infects-thousands-of-gamers-using-godot-scripts/
5. ProjectSendÉí·ÝÑéÖ¤Îó²îÖ·þÎñÆ÷ÃæÁÙÔ¶³Ì»á¼ûÍþв
11ÔÂ27ÈÕ£¬ÍþвÐÐΪÕßÕýÔÚʹÓÃProjectSendÖеÄÑÏÖØÉí·ÝÑéÖ¤ÈƹýÎó²î£¨CVE-2024-11680£©À´»ñÈ¡·þÎñÆ÷µÄÔ¶³Ì»á¼ûȨÏÞ¡£¸ÃÎó²îÓ°ÏìProjectSend r1720֮ǰµÄ°æ±¾£¬ÔÊÐí¹¥»÷Õßͨ¹ý·¢ËÍÌØÖÆHTTPÇëÇó¸ü¸ÄÓ¦ÓóÌÐòÉèÖá£Ö»¹Ü¸ÃÎó²îÒÑÓÚ2023Äê5ÔÂÐÞ¸´£¬µ«Ö±µ½×î½ü²Å±»·ÖÅÉCVE±àºÅ£¬µ¼ÖÂÓû§Î´ÊµÊ±¸üС£¾ÝVulnCheck³Æ£¬99%µÄProjectSendʵÀýÈÔÔÚÔËÐб£´æÎó²îµÄ°æ±¾¡£ProjectSendÊÇÒ»¸öÊ¢ÐеĿªÔ´Îļþ¹²ÏíÍøÂçÓ¦ÓóÌÐò£¬±»Ðí¶à×éÖ¯ÓÃÓÚÇå¾²¡¢Ë½ÃܵÄÎļþ´«Êä¡£Censys±¨¸æ³Æ£¬Ô¼ÓÐ4000¸öÔÚÏßʵÀý£¬ÆäÖдó´ó¶¼±£´æÎó²î¡£×Ô2024Äê9ÔÂMetasploitºÍNucleiÐû²¼¹ûÕæÎó²îʹÓÃÒÔÀ´£¬¹¥»÷Ô˶¯ÓÐËùÔöÌí¡£VulnCheck·¢Ã÷£¬¹¥»÷Õß²»µ«Ê¹ÓÃÎó²î»ñȡδ¾ÊÚȨµÄ»á¼û£¬»¹¸ü¸ÄϵͳÉèÖᢰ²ÅÅwebshellÒÔ¿ØÖÆÊÜѬȾ·þÎñÆ÷¡£GreyNoiseÁгöÁËÓë´ËÔ˶¯Ïà¹ØµÄ121¸öIP£¬Åú×¢ÕâÊÇÒ»´ÎÆÕ±éʵÑé¡£VulnCheckÖÒÑԳƣ¬Webshell´æ´¢ÔÚÌض¨Ä¿Â¼ÖУ¬¿ÉÖ±½Óͨ¹ýÍøÂç·þÎñÆ÷»á¼û£¬Åú×¢±£´æ×Ô¶¯¹¥»÷¡£Ñо¿Ö°Ô±Ç¿µ÷£¬¾¡¿ìÉý¼¶µ½ProjectSend°æ±¾r1750ÖÁ¹ØÖ÷Òª£¬ÒÔÌá·ÀÆÕ±éÈö²¥µÄ¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-projectsend-flaw-to-backdoor-exposed-servers/
6. SL Data ServicesÊý¾Ý¿âÔâй¶£¬60ÓàÍòÃô¸ÐÎļþÆعâ
11ÔÂ27ÈÕ£¬¾ÝÇå¾²Ñо¿Ö°Ô±±¨µÀ£¬Êý¾Ý¾¼Í¹«Ë¾SL Data ServicesµÄÒ»¸öδÊÜÃÜÂë±£»¤µÄAmazon S3´æ´¢Í°ÖУ¬Ì»Â¶ÁËÁè¼Ý600,000¸öÃô¸ÐÎļþ£¬°üÀ¨ÊýǧÈ˵ķ¸·¨ÀúÊ·¡¢Åä¾°ÊӲ졢³µÁ¾ºÍ¹¤Òµ¼Í¼µÈСÎÒ˽¼ÒÐÅÏ¢¡£ÕâЩÎļþ×ܾÞϸΪ713.1 GB£¬ÇÒδ¼ÓÃÜ¡£ÐÅÏ¢Ç徲ר¼ÒJeremiah FowlerÔÚ10Ô·ݷ¢Ã÷´ËÎÊÌâºó£¬¶à´Îͨ¹ýµç»°ºÍµç×ÓÓʼþÏòÊý¾ÝÍøÂ繫˾±¨¸æ£¬µ«Î´ÊÕµ½»Ø¸´¡£Ö»¹Ü×îÖÕ¸ÃÐÅÏ¢·þÎñÌṩÉ̹رÕÁËS3´æ´¢Í°£¬µ«ÒÑ̻¶µÄÐÅÏ¢¿ÉÄܻᱻÓÃÓÚÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷µÈ¶ñÒâÐÐΪ¡£SL Data ServicesÉù³ÆÌṩ¹¤Òµ±¨¸æµÈ·þÎñ£¬µ«Fowler·¢Ã÷¸Ã¹«Ë¾ËƺõÔËÓª×ÅÖÁÉÙ16¸ö²î±ðµÄÍøÕ¾£¬Ìṩ°üÀ¨·¸·¨¼Í¼¼ì²é¡¢ÎÞа³µÖÎÀí²¿·Ö¼Í¼µÈһϵÁÐÊý¾Ý¡£Ëû½¨Òé×é֯ʹÓÃËæ»úÇÒÉ¢ÁеÄΨһ±êʶ·ûÃüÃûÎļþ£¬²¢¼à¿Ø»á¼ûÈÕÖ¾ÒÔʶ±ðÒ쳣ģʽ£¬Í¬Ê±Ê¹ÓÃÃÜÂëºÍ¼ÓÃܱ£»¤Ãô¸ÐÊý¾Ý¡£
https://www.theregister.com/2024/11/27/600k_sensitive_files_exposed/