ÃÀ¹ú״ʦЭ»áABAÔâµ½¹¥»÷Ô¼140Íò»áÔ±µÄÐÅϢй¶

Ðû²¼Ê±¼ä 2023-04-23
1¡¢ÃÀ¹ú״ʦЭ»áABAÔâµ½¹¥»÷Ô¼140Íò»áÔ±µÄÐÅϢй¶


¾ÝýÌå4ÔÂ21ÈÕ±¨µÀ£¬ £¬£¬£¬£¬ £¬ÃÀ¹ú״ʦЭ»á(ABA)Ô¼1466000Ãû»áÔ±µÄƾ֤й¶¡£¡£¡£ABAÊÇÈ«Çò×î´óµÄ״ʦºÍÖ´·¨×¨ÒµÈËʿЭ»á£¬ £¬£¬£¬£¬ £¬×èÖ¹2022ÄêÓµÓÐ166000Ãû»áÔ±¡£¡£¡£¸Ã»ú¹¹Í¸Â¶£¬ £¬£¬£¬£¬ £¬ËûÃÇÓÚ3ÔÂ17ÈÕ¼ì²âµ½Òì³£» £»£»£»£»£»£»î¶¯£¬ £¬£¬£¬£¬ £¬ÊÓ²ìÈ·¶¨¹¥»÷Õß´Ó3ÔÂ6ÈÕǰºó×îÏÈ»á¼ûABAϵͳ£¬ £¬£¬£¬£¬ £¬²¢¿ÉÄÜ»ñµÃÁË2018ÄêÍ£ÓÃµÄ·ÅÆú»áԱϵͳµÄ»áÔ±µÇ¼ƾ֤¡£¡£¡£²¿·Ö»áÔ±¿ÉÄÜ»áÔÚÐÂϵͳʹÓÃÓë¾ÉϵͳÏàͬµÄƾ֤£¬ £¬£¬£¬£¬ £¬Òò´Ë£¬ £¬£¬£¬£¬ £¬ABA½¨Òé»áÔ±¸ü¸ÄÃÜÂë¡£¡£¡£


https://securityaffairs.com/145125/data-breach/american-bar-association-data-breach.html 


2¡¢VMwareÐÞ¸´vRealize Log InsightµÄ·´ÐòÁл¯Îó²î


ýÌå4ÔÂ20Èճƣ¬ £¬£¬£¬£¬ £¬VMwareÐÞ¸´ÁËvRealize Log Insight£¨ÏÖ³ÆÎªVMware Aria Operations for Logs£©Öеķ´ÐòÁл¯Îó²î£¨CVE-2023-20864£©¡£¡£¡£¸ÃÎó²î¿ÉÔÚµÍÖØ´óÐԵĹ¥»÷Öб»Ô¶³ÌʹÓ㬠£¬£¬£¬£¬ £¬ÒÔrootÉí·ÝÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£ÆäCVSSv3ÆÀ·ÖΪ9.8£¬ £¬£¬£¬£¬ £¬Ö»Óа汾8.10.2ÊÜ´ËÎó²îÓ°Ïì¡£¡£¡£´Ë´Î»¹ÐÞ¸´ÁËÒ»¸öÏÂÁî×¢ÈëÎó²î£¨CVE-2023-20865£©£¬ £¬£¬£¬£¬ £¬ÓµÓÐÖÎÀíȨÏ޵Ĺ¥»÷Õß¿ÉʹÓÃÆäÒÔrootÉí·ÝÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£


https://www.bleepingcomputer.com/news/security/vmware-fixes-vrealize-bug-that-let-attackers-run-code-as-root/


3¡¢Å·ÖÞ¿ÕÖк½ÐÐÇå¾²×éÖ¯Ôâµ½KillnetÍÅ»ïµÄDDoS¹¥»÷


¾Ý4ÔÂ22ÈÕ±¨µÀ£¬ £¬£¬£¬£¬ £¬Å·ÖÞ¿ÕÖн»Í¨¹ÜÖÆ²¿·ÖEUROCONTROLÔâµ½KillnetµÄ´ó¹æÄ£DDoS¹¥»÷¡£¡£¡£Eurocontrol³Æ£¬ £¬£¬£¬£¬ £¬ÆäÍøÕ¾×Ô4ÔÂ19ÈÕÒÔÀ´Ò»Ö±Ôâµ½¹¥»÷¡£¡£¡£¹¥»÷µ¼ÖÂÍøÕ¾ºÍÍøÂç¿ÉÓÃÐÔÖÐÖ¹£¬ £¬£¬£¬£¬ £¬¿ÉÊÇûÓÐÓ°ÏìÅ·ÖÞº½¿Õ¡£¡£¡£Eurocontrolij¹ÙԱ͸¶£¬ £¬£¬£¬£¬ £¬ºÚ¿ÍÎÞ·¨»á¼ûº½¿ÕÇ徲ϵͳ£¬ £¬£¬£¬£¬ £¬ÓÉÓÚÕâЩϵͳÊÇÆøÏ¶Ê½µÄ¡£¡£¡£KillnetÔøÍ¨¹ýÆäTelegramºôÓõÕë¶ÔEurocontrolµÄÐж¯£¬ £¬£¬£¬£¬ £¬³Æ¡°´Ó½ñÌì×îÏÈ£¬ £¬£¬£¬£¬ £¬½«¾ÙÐÐÒ»³¡EurocontrolÂíÀ­ËÉ£¬ £¬£¬£¬£¬ £¬Ò»Á¬100Сʱ¡±¡£¡£¡£¸Ã»ú¹¹µÄ½²»°ÈËûÓÐ͸¶ÄÄЩϵͳÊܵ½Ó°Ïì¡¢Ô¤¼ÆÍêÈ«»Ö¸´Ê±¼äÒÔ¼°KillnetÊÇ·ñ¶Ô´Ë´ÎDDoS¹¥»÷ÈÏÕæµÈÎÊÌâ¡£¡£¡£


https://www.theregister.com/2023/04/22/eurocontrol_russia_attack/


4¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃWP²å¼þEval PHPµÄ´ó¹æÄ£¹¥»÷»î¶¯


Ñо¿ÍŶÓÔÚ4ÔÂ19ÈÕ³ÆÆä·¢Ã÷´ó×ÚʹÓÃ·ÅÆúWP²å¼þEval PHPµÄ¹¥»÷»î¶¯¡£¡£¡£¸Ã²å¼þÔÚÒÑÍùÊ®ÄêûÓиüУ¬ £¬£¬£¬£¬ £¬µ«ÈÔ¿Éͨ¹ýWordPress²å¼þ´æ´¢¿â»ñµÃ¡£¡£¡£Sucuri³Æ£¬ £¬£¬£¬£¬ £¬Ê¹ÓÃEval PHP½«¶ñÒâ´úÂëǶÈëWordPressÒ³ÃæµÄÇ÷ÊÆÔÚ2023Äê4Ô¼¤Ôö£¬ £¬£¬£¬£¬ £¬¸Ã²å¼þÏÖÔÚÆ½¾ùÌìÌìÓÐ4000´Î¶ñÒâ×°Öᣡ£¡£¹¥»÷ÕßʹÓñ»ÈëÇÖ»òн¨ÉèµÄÖÎÀíÔ±ÕË»§À´×°ÖÃEval PHP£¬ £¬£¬£¬£¬ £¬È»ºóʹÓÃ[evalphp]¶Ì´úÂ뽫PHP´úÂë×¢Èë±»¹¥»÷ÍøÕ¾µÄÒ³ÃæºÍÌû×Ó¡£¡£¡£Ò»µ©´úÂëÖ´ÐÐºó£¬ £¬£¬£¬£¬ £¬Ëü»áÔÚÍøÕ¾¸ùĿ¼ÖÐ×¢ÈëºóÃÅ (3e9c0ca6bbe9.php)£¬ £¬£¬£¬£¬ £¬ºóÃÅÃû³Æ¿ÉÄÜÒò²î±ðµÄ¹¥»÷¶ø²î±ð¡£¡£¡£


https://blog.sucuri.net/2023/04/massive-abuse-of-abandoned-evalphp-wordpress-plugin.html


5¡¢Î¢Èí·ºÆð¹ÊÕϵ¼ÖÂÈ«ÇòÓû§ÎÞ·¨»á¼ûÆä²¿·ÖÓ¦ÓúÍЧÀÍ


ýÌå4ÔÂ20ÈÕ±¨µÀ³Æ£¬ £¬£¬£¬£¬ £¬Î¢Èí·ºÆð¹ÊÕÏ£¬ £¬£¬£¬£¬ £¬µ¼ÖÂÈ«ÇòÓû§ÎÞ·¨»á¼ûÆä²¿·ÖÓ¦ÓúÍЧÀÍ¡£¡£¡£ÊÜÓ°ÏìµÄЧÀͰüÀ¨Microsoft 365Ì×¼þ¡¢Exchange OnlineºÍSharePoint OnlineµÈ¡£¡£¡£Óû§ÔڵǼÕÊ»§Ê±Óöµ½ÁËÎÊÌ⣬ £¬£¬£¬£¬ £¬Ò»µ©½øÈë¾Í»á·¢Ã÷ûÓпÉÓõÄwebÓ¦Óᣡ£¡£¾ÝϤ£¬ £¬£¬£¬£¬ £¬´Ë´ÎÖÐÖ¹ÊÇÓÉÓÚ»º´æ»ù´¡ÉèÊ©µÄÐÔÄܵÍÓڿɽÓÊܵÄÐÔÄÜãÐÖµ²¢µ¼Ö³¬Ê±Òì³£ÒýÆðµÄ¡£¡£¡£¾Ý4ÔÂ20ÈÕ 19:52 EDTµÄ¸üУ¬ £¬£¬£¬£¬ £¬Î¢ÈíÌåÏÖ£¬ £¬£¬£¬£¬ £¬´Ë´ÎÖÐÖ¹µÄ»ù´¡ÎÊÌâÒѾ­½â¾ö£¬ £¬£¬£¬£¬ £¬ËùÓÐÓû§µÄЧÀͶ¼Òѻָ´¡£¡£¡£ 


https://www.bleepingcomputer.com/news/microsoft/microsoft-365-outage-blocks-access-to-web-apps-and-services/


6¡¢SymantecÅû¶DaggerflyÕë¶Ô·ÇÖÞµçÐŹ«Ë¾µÄ¹¥»÷»î¶¯


SymantecÔÚ4ÔÂ20ÈÕÅû¶ÁËAPTÍÅ»ïDaggerflyÕë¶Ô·ÇÖÞµçÐŹ«Ë¾µÄ¹¥»÷»î¶¯¡£¡£¡£¸Ã»î¶¯ÓÚ2022Äê11ÔÂÊ״α»·¢Ã÷£¬ £¬£¬£¬£¬ £¬²¢ÇÒÏÖÔÚ¿ÉÄÜÈÔÔÚ¾ÙÐÐÖС£¡£¡£¹¥»÷ÕßʹÓÃBITSAdminºÍPowerShellµÈLotL¹¤¾ßÀ´·Ö·¢ÏÂÒ»½×¶ÎµÄpayload£¬ £¬£¬£¬£¬ £¬°üÀ¨Õýµ±µÄAnyDesk¿ÉÖ´ÐÐÎļþºÍÆ¾Ö¤ÍøÂ繤¾ßGetCredManCreds¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷¹¥»÷ÕßʹÓÃMgBot¿ò¼Ü¿ª·¢ºÍ°²ÅŵÄвå¼þ¾ßÓжàÖÖÐÅÏ¢ÍøÂ繦Ч¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬ £¬Ãâ·Ñɱ¶¾Èí¼þRisingÒ²±»ÓÃÀ´¼ÓÔØPlugX loader¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/apt-attacks-telecoms-africa-mgbot