GoDaddy͸¶ÆäÔ´´úÂëй¶ÇÒ·þÎñÆ÷±»×°ÖöñÒâ³ÌÐò

Ðû²¼Ê±¼ä 2023-02-20
1¡¢GoDaddy͸¶ÆäÔ´´úÂëй¶ÇÒ·þÎñÆ÷±»×°ÖöñÒâ³ÌÐò

      

¾ÝýÌå2ÔÂ17ÈÕ±¨µÀ £¬ÍøÂçÍйܹ«Ë¾GoDaddy͸¶ £¬ÆäÔ´´úÂëй¶ÇÒ·þÎñÆ÷±»×°ÖöñÒâ³ÌÐò¡£GoDaddyÔÚ2022Äê12ÔÂÌåÏÖ £¬ÊÕµ½Á˲¿·Ö¿Í»§Í¶Ëß £¬³ÆËûÃǵÄÍøÕ¾ÎÞÒâ»á±»Öض¨Ïòµ½¶ñÒâÍøÕ¾¡£ØÊºó·¢Ã÷ÕâÊÇÓÉÓÚ¹¥»÷Õß»ñµÃÁËÆäcPanelÇéÐÎÖÐÍйܵķþÎñÆ÷µÄ»á¼ûȨÏÞ £¬ÔÚÆäϵͳÉÏ×°ÖÃÁ˶ñÒâÈí¼þ²¢»ñÈ¡ÁËÓëGoDaddyÄÚ²¿·Ö·þÎñÏà¹ØµÄ´úÂ롣ƾ֤ÊÓ²ì £¬GoDaddyÒÔΪÕâÊÇÒ»¸öÖØ´óµÄÒ»Á¬¶àÄêµÄ¹¥»÷Ô˶¯µÄÒ»²¿·Ö £¬Ö®Ç°ÔÚ2021Äê11ÔºÍ2020Äê3ÔÂÅû¶µÄÎ¥¹æÐÐΪҲÓëÕâÓйØ¡£


https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/  


2¡¢FortinetÐû²¼Çå¾²¸üÐÂÐÞ¸´Æä¶à¿î²úÆ·ÖеÄÊýÊ®¸öÎó²î

      

FortinetÔÚ2ÔÂ16ÈÕÐû²¼Çå¾²¸üР£¬ÐÞ¸´ÁËÆäFortiNACºÍFortiWebµÈ²úÆ·ÖеÄ40¸öÎó²î¡£ÆäÖÐ×îÑÏÖØµÄÊÇFortiNACÍøÂç»á¼û¿ØÖƽâ¾ö¼Æ»®ÖеÄÎļþÃû»ò·¾¶µÄÍⲿ¿É¿ØÖÆÎó²î£¨CVE-2022-39952£© £¬CVSSÆÀ·ÖΪ9.8 £¬¹¥»÷Õß¿ÉÓÃÆäÔÚϵͳÉÏÖ´ÐÐí§ÒâдÈë¡£Æä´ÎÊÇFortiWeb´úÀíÊØ»¤³ÌÐòÖеĻùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öÎó²î£¨CVE-2021-42756£© £¬CVSSÆÀ·ÖΪ9.3 £¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÆäͨ¹ýÌØÖÆµÄHTTPÇëÇóÖ´ÐÐí§Òâ´úÂë¡£


https://thehackernews.com/2023/02/fortinet-issues-patches-for-40-flaws.html


3¡¢¶þάÂëÌìÉúÍøÕ¾MyQRcodeÉèÖùýʧй¶Áè¼Ý128 GBÊý¾Ý

      

ýÌå2ÔÂ19ÈÕ³Æ £¬Ê¢ÐеĶþάÂëÌìÉúÍøÕ¾MyQRcodeй¶ÁËÆäÓû§µÄСÎÒ˽¼ÒÊý¾Ý¡£Ñо¿Ö°Ô±ÔÚËÑË÷ÉèÖùýʧµÄÔÆÊý¾Ý¿âʱÔÚShodanÉÏ·¢Ã÷Á˸÷þÎñÆ÷ £¬Ëüй¶ÁËÁè¼Ý128 GBµÄÊý¾Ý £¬ÆäÖаüÀ¨66000ÃûÓû§µÄСÎÒ˽¼ÒÐÅÏ¢¡£ÕâÊÇÓÉÉèÖùýʧµ¼ÖµÄ £¬¹«ÖÚ¿ÉÒÔÔÚûÓÐÈκÎÇå¾²Éí·ÝÑéÖ¤»òÃÜÂëµÄÇéÐÎϹûÕæ»á¼û´Ë·þÎñÆ÷¡£±ðµÄ £¬Ð¹Â¶ÊÂÎñʼÓÚ2ÔÂ4ÈÕ £¬ÏÖÔÚÌìÌì¶¼ÔÚ×Ô¶¯¸üÐÂеļͼ £¬ÕâÅúעй¶ÈÔÔÚ¾ÙÐÐÖС£


https://www.hackread.com/qr-code-generator-my-qr-code-data-leak/


4¡¢Symantec·¢Ã÷ÐÂFrebniisʹÓÃMicrosoft IISµÄÔ˶¯

      

SymantecÔÚ2ÔÂ16ÈÕ³ÆÆä·¢Ã÷ÁËжñÒâÈí¼þFrebniisʹÓÃMicrosoft IIS¹¦Ð§½¨ÉèºóÃŵÄÔ˶¯¡£FrebniisʹÓÃÁËÒ»¸öÃûΪʧ°ÜÇëÇóÊÂÎñ»º³å(FREB)µÄIIS¹¦Ð§ £¬½«¶ñÒâ´úÂë×¢Èëµ½¿ØÖÆ FREB£¨¡°iisfreb.dll¡±£©µÄDLLÎļþµÄÌØ¶¨º¯ÊýÖÐ £¬Ê¹¹¥»÷ÕßÄܹ»×èµ²ºÍ¼à¿Ø·¢Ë͵½ISS·þÎñÆ÷µÄËùÓÐHTTP POSTÇëÇó¡£×¢ÈëµÄ´úÂëÊÇÒ»¸ö.NETºóÃÅ £¬Ö§³Ö´úÀíºÍC#´úÂëÖ´ÐÐ £¬ÎÞÐè½Ó´¥´ÅÅÌ £¬Ê¹ÆäÍêÈ«Òþ²Ø¡£±ðµÄ £¬¹¥»÷ÕßÓÃÓÚ»ñÈ¡IIS·þÎñÆ÷»á¼ûȨÏÞµÄÒªÁìÉв»ÇåÎú¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/frebniis-malware-iis


5¡¢ÐºڿÍÍÅ»ïWIP26Ö÷ÒªÕë¶ÔÖж«µÄµçÐÅ·þÎñÌṩÉÌ

      

2ÔÂ16ÈÕ £¬SentinelLabsÅû¶ÁËкڿÍÍÅ»ïWIP26Õë¶ÔÖж«µÄµçÐÅ·þÎñÌṩÉ̵Ĺ¥»÷Ô˶¯¡£WIP26µÄÌØµãÊÇÀÄÓù«¹²ÔÆ»ù´¡ÉèÊ© £¬ÈçMicrosoft 365 Mail¡¢Azure¡¢Google FirebaseºÍDropbox £¬¾ÙÐжñÒâÈí¼þ·Ö·¢¡¢Êý¾Ýй¶ºÍC2¡£´Ë´ÎÔ˶¯Í¨¹ýWhatsApp¾«×¼¶¨Î»Ô±¹¤ £¬ÆäÖаüÀ¨Ö¸Ïò¶ñÒâÈí¼þ¼ÓÔØ³ÌÐòµÄDropboxÁ´½Ó¡£×îÖÕ»á×°ÖúóÃÅCMD365ºÍCMDEmber £¬ËüÃǵÄÖ÷Òª¹¦Ð§ÊÇʹÓÃWindowsÏÂÁîÚ¹ÊÍÆ÷Ö´Ðй¥»÷ÕßÌṩµÄϵͳÏÂÁî¡£


https://www.sentinelone.com/labs/wip26-espionage-threat-actors-abuse-cloud-infrastructure-in-targeted-telco-attacks/


6¡¢Èí¼þ¹«Ë¾AtlassianÔ±¹¤Æ¾Ö¤±»µÁµ¼Ö²¿·ÖÊý¾Ýй¶

      

¾Ý2ÔÂ16ÈÕ±¨µÀ £¬Èí¼þ¹«Ë¾AtlassianÔ±¹¤Æ¾Ö¤±»µÁµ¼Ö²¿·ÖÊý¾Ýй¶¡£Cyberscoop×îÏȱ¨µÀ £¬ºÚ¿ÍSiegedSecÔÚTelegramÉÏй¶ÁË´ÓAtlassianÇÔÈ¡µÄÊý¾Ý¡£Ö®ºó £¬Check PointÆÊÎöÁ˱»µÁÊý¾Ý £¬ÏÓÒɹ¥»÷Õß²¢Ã»ÓÐÖ±½ÓÈëÇÖAtlassian £¬¶øÊǹ¥»÷Á˵ÚÈý·½¹©Ó¦ÉÌEnvoy¡£¶øEnvoyÌåÏÖ £¬Æäϵͳ²¢Î´Ôâµ½¹¥»÷ £¬ÊÇAtlassianÔ±¹¤µÄƾ֤±»µÁ £¬´Ó¶øÊ¹¹¥»÷ÕßÄܹ»»á¼û´æ´¢ÔÚEnvoyÓ¦ÓóÌÐòÖеÄÊý¾Ý¡£AtlassianÊӲ췢Ã÷ £¬Ò»ÃûÔ±¹¤µÄƾ֤±»¹ýʧµØÐû²¼µ½¹«¹²´æ´¢¿â £¬Òò´Ë¹¥»÷Õß¿ÉÒÔͨ¹ýÔ±¹¤ÕÊ»§»á¼û¿É¼ûÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/atlassian-data-leak-caused-by-stolen-employee-credentials/