ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ1ÖÜ
Ðû²¼Ê±¼ä 2021-01-04> ±¾ÖÜÇ徲̬ÊÆ×ÛÊö
2020Äê12ÔÂ28ÈÕÖÁ2021Äê01ÔÂ03ÈÕ¹²ÊÕ¼Çå¾²Îó²î52¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇKLog Server actions/authenticate.phpÏÂÁî×¢ÈëÎó²î£»Solarwinds Orion Platform Request.PathInfoÇå¾²ÈƹýÎó²î£»Panasonic Security SystemÓ²±àÂëÎó²î£»Netgear NMS300 CVE-2020-35789ÏÂÁî×¢ÈëÎó²î£»NETGEAR D7800 CVE-2020-35791ÏÂÁî×¢ÈëÎó²î¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇApple iCloudÖÐÖ¹36Сʱ£¬Éв»ÇåÎú¹ÊÕÏÔµ¹ÊÔÓÉ£»GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬²âÊÔÔ±¹¤µÄ·´Ó¦£»Ð¶ñÒâÈí¼þ¿ÉʹÓÃImgurÀ´½âÂëCobalt Strike¾ç±¾£»ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖع¤Ôâµ½¹¥»÷£¬»ò½«µ¼ÖÂÊý¾Ýй¶£»WasabiÔÆ´æ´¢·þÎñÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.KLog Server actions/authenticate.phpÏÂÁî×¢ÈëÎó²î
KLog Server actions/authenticate.php±£´æÊäÈëÑéÖ¤Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿É×¢Èëí§ÒâOSÏÂÁî²¢Ö´ÐС£
https://github.com/mustgundogdu/Research/blob/main/KLOG_SERVER/Exploit_Code
2.Solarwinds Orion Platform Request.PathInfoÇå¾²ÈƹýÎó²î
Solarwinds Orion Platform Request.PathInfo±£´æÑéÖ¤ÈƹýÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐδÊÚȨµÄAPIÏÂÁî¡£
https://www.kb.cert.org/vuls/id/843464
3.Panasonic Security SystemÓ²±àÂëÎó²î
Panasonic Security System±£´ælkjhgfdsaÓ²±àÂëÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ»á¼û×°±¸¡£
https://security.panasonic.com/products_technology/products/wv-s2231l/
4.Netgear NMS300 CVE-2020-35789ÏÂÁî×¢ÈëÎó²î
Netgear NMS300±£´æÊäÈëÑéÖ¤Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ»á¼û×°±¸¡£
https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559
5.NETGEAR D7800 CVE-2020-35791ÏÂÁî×¢ÈëÎó²î
NETGEAR D7800±£´æÊäÈëÑéÖ¤Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ»á¼û×°±¸¡£
https://kb.netgear.com/000062714/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0079
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Apple iCloudÖÐÖ¹36Сʱ£¬Éв»ÇåÎú¹ÊÕÏÔµ¹ÊÔÓÉ
Apple iCloud·þÎñ·ºÆð¹ÊÕÏ£¬Ê¹Óû§ÎÞ·¨µÇ¼¸Ã·þÎñ»á¼ûÎļþ»òÉèÖÃÐÂ×°±¸¡£´Ë´ÎÖÐÖ¹´ÓÃÀ¹ú¶«²¿Ê±¼ä12ÔÂ25ÈÕÉÏÎç4:45×îÏÈ£¬Ö±µ½12ÔÂ26ÈÕÏÂÖç4:35²Å±»ÐÞ¸´£¬Àúʱ36Сʱ¡£ÖÐֹʱ´ú£¬AppleµÄϵͳ״̬ҳÉϽöÏÔʾ¡°Óû§¿ÉÄÜÓöµ½´Ë·þÎñµÄÎÊÌ⡱µÄÌáÐÑ£¬Ã»Óиü¶àÓйØÆäÖÐÖ¹µÄÐÅÏ¢¡£ÏÖÔÚ£¬Apple¹«Ë¾Ã»ÓÐÌṩÈκÎÒÔÕÏÔµ¹ÊÔÓÉ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/apple/apple-icloud-outage-prevents-device-activations-access-to-data/
2¡¢GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬²âÊÔÔ±¹¤µÄ·´Ó¦
GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬ÒÔ²âÊÔÔ±¹¤¶ÔÍøÂç´¹ÂÚÔ˶¯µÄ·´Ó¦¡£¸Ã²âÊÔÓÚ12Ô¾ÙÐУ¬ÓʼþÉù³Æ½«Ìṩ650ÃÀÔªµÄÊ¥µ®½Ú½±½ð£¬ÒÔ×ÊÖúÔ±¹¤Ó¦¶ÔÒòCOVID-19±¬·¢¶øµ¼Öµľ¼ÃÎÊÌ⣬²¢ÒªÇóËûÃÇÌîдСÎÒ˽¼ÒÐÅÏ¢±í¸ñ¡£Õâ´Î²âÊÔÔ˶¯Ô¼Äª500ÃûÔ±¹¤ÖÐÕУ¬ËûÃǽ«±»ÒªÇóÖØмÓÈëÉç»á¹¤³ÌÇå¾²ÒâʶµÄÅàѵ¡£ÓÉÓÚ²âÊÔÖÐʹÓõÄÓÕ¶üºÍÄ£Äâʱ¼äµÄÑ¡Ôñ£¬¸ÃÒªÁìÊܵ½Á˲¿·ÖÍøÂçÇå¾²ÕûÌåµÄÆ·ÆÀ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/112664/security/godaddy-phishing-test-employees.html
3¡¢Ð¶ñÒâÈí¼þ¿ÉʹÓÃImgurÀ´½âÂëCobalt Strike¾ç±¾
жñÒâÈí¼þ¿ÉʹÓÃͼÏñÍйܷþÎñImgurÏÂÔØÕýµ±µÄͼÏñ£¬À´½âÂëCobalt Strike¾ç±¾¡£ÐµĶñÒâÈí¼þʹÓôøÓкêµÄWordÎļþ´ÓGitHubÏÂÔØPowerShell¾ç±¾£¬¸Ã¾ç±¾½«´ÓImgurÏÂÔØÏÖʵPNGÎļþ¡£Ö®ºó£¬Ê¹ÓÃÏñInvoke-PSImageÕâÑùµÄ¹¤¾ßÀ´Ê¹ÓÃPNGÎļþÖеÄÏñËØÖµ±àÂëPowerShell¾ç±¾£¬²¢ÌìÉúÒ»ÐÐÏÂÁîÀ´Ö´ÐÐpayload£¬×îÖÕ»ñµÃCobalt Strike¾ç±¾¡£Ñо¿Ö°Ô±ÍƲâ´Ë¶ñÒâÈí¼þ¿ÉÄÜÓëÖ÷ÒªÕë¶ÔÖж«ÊµÌåµÄAPT×éÖ¯MuddyWaterÓйء£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/github-hosted-malware-calculates-cobalt-strike-payload-from-imgur-pic/
4¡¢ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖع¤Ôâµ½¹¥»÷£¬»ò½«µ¼ÖÂÊý¾Ýй¶
ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖع¤Ôâµ½¹¥»÷£¬»ò½«µ¼ÖÂÊý¾Ýй¶¡£´¨ÆéÖع¤£¨Kawasaki£©³Æ£¬2020Äê6ÔÂ11ÈÕÓÐδ¾ÊÚȨµÄµÚÈý·½´ÓÌ©¹ú·þÎñ´¦»á¼ûÁËÈÕ±¾µÄ·þÎñÆ÷£¬ÔÚ·¢Ã÷¸ÃÎÊÌâºóÁ½¸öÕ¾µãÖ®¼äµÄËùÓÐͨѶ¶¼±»×èÖ¹¡£Ëæºó£¬¸Ã¹«Ë¾ÓÖ·¢Ã÷ÁËÆäËûÍâÑóÕ¾µã£¨Ó¡¶ÈÄáÎ÷ÑÇ¡¢·ÆÂɱöºÍÃÀ¹ú£©Î´¾ÊÚȨ»á¼ûÈÕ±¾·þÎñÆ÷µÄÇéÐΣ¬²¢ÇжÏͨѶ¡£´¨Æé³Æ´Ë´Î¹¥»÷ʹÓÃÁËÏȽøÊÖÒÕ¶øûÓÐÁôÏÂÈκκۼ£ºÍÖ¤¾Ý£¬µ«¹«Ë¾Êý¾Ý»òÐíÒѾй¶¡£ËùÓб»ÖÕÖ¹µÄͨѶÓÚ11ÔÂ30ÈÕ»Ö¸´Õý³£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/112765/data-breach/kawasaki-heavy-industries-cyber-attack.html
5¡¢WasabiÔÆ´æ´¢·þÎñÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ
WasabiÔÆ´æ´¢·þÎñÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ¡£12ÔÂ28ÈÕÏÂÖç2:30 ESTÓû§·¢Ã÷ÎÞ·¨»á¼ûwasabisys.comÉϵĴ洢Ͱ£¬WasabiÔÚÖÐÖ¹±¨¸æÖгÆÊÇÓÉÓÚDNSÆÊÎöÎÊÌâµ¼Ö¡£¾ÝϤ£¬¸Ãƽ̨Óû§ÉÏ´«Á˶ñÒâÈí¼þ£¬ÆäÓòÃû³Æ×¢²áÉÌ·¢Ã÷ºóÏëҪͨ¹ýµç×ÓÓʼþ֪ͨWasabi£¬È´°Ñ±¨¸æת·¢µ½Á˹ýʧµÄµØµã£¬Ê¹µÃWasabiδ»ñµÃ֪ͨ¡£¶ø¸Ã×¢²áÉÌÒòδ»ñµÃ»Ø¸´¶øÔÝÍ£Á˸ÃÓò£¬WasabiÔÚµÃÖª¸ÃÊÂÎñºóɾ³ýÁËÍйܶñÒâÈí¼þ²¢ÒªÇóÖØ줻î¸ÃÓò£¬Æ½Ì¨ÔÚ12ÔÂ29ÈÕÏÂÖç12:57 ESTÖÕÓÚ»ñµÃ»Ö¸´¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/wasabi-cloud-storage-service-knocked-offline-for-hosting-malware/