GoDaddy͸¶ÆäÔ´´úÂëй¶ÇÒЧÀÍÆ÷±»×°ÖöñÒâ³ÌÐò
Ðû²¼Ê±¼ä 2023-02-20
¾ÝýÌå2ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬ÍøÂçÍйܹ«Ë¾GoDaddy͸¶£¬£¬£¬£¬ÆäÔ´´úÂëй¶ÇÒЧÀÍÆ÷±»×°ÖöñÒâ³ÌÐò¡£¡£¡£¡£¡£¡£GoDaddyÔÚ2022Äê12ÔÂÌåÏÖ£¬£¬£¬£¬ÊÕµ½Á˲¿·Ö¿Í»§Í¶Ëߣ¬£¬£¬£¬³ÆËûÃǵÄÍøÕ¾ÎÞÒâ»á±»Öض¨Ïòµ½¶ñÒâÍøÕ¾¡£¡£¡£¡£¡£¡£ØÊºó·¢Ã÷ÕâÊÇÓÉÓÚ¹¥»÷Õß»ñµÃÁËÆäcPanelÇéÐÎÖÐÍйܵÄЧÀÍÆ÷µÄ»á¼ûȨÏÞ£¬£¬£¬£¬ÔÚÆäϵͳÉÏ×°ÖÃÁ˶ñÒâÈí¼þ²¢»ñÈ¡ÁËÓëGoDaddyÄÚ²¿·ÖЧÀÍÏà¹ØµÄ´úÂë¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÊӲ죬£¬£¬£¬GoDaddyÒÔΪÕâÊÇÒ»¸öÖØ´óµÄÒ»Á¬¶àÄêµÄ¹¥»÷»î¶¯µÄÒ»²¿·Ö£¬£¬£¬£¬Ö®Ç°ÔÚ2021Äê11ÔºÍ2020Äê3ÔÂÅû¶µÄÎ¥¹æÐÐΪҲÓëÕâÓйء£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/
2¡¢FortinetÐû²¼Çå¾²¸üÐÂÐÞ¸´Æä¶à¿î²úÆ·ÖеÄÊýÊ®¸öÎó²î
FortinetÔÚ2ÔÂ16ÈÕÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´ÁËÆäFortiNACºÍFortiWebµÈ²úÆ·ÖеÄ40¸öÎó²î¡£¡£¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÊÇFortiNACÍøÂç»á¼û¿ØÖƽâ¾ö¼Æ»®ÖеÄÎļþÃû»ò·¾¶µÄÍⲿ¿É¿ØÖÆÎó²î£¨CVE-2022-39952£©£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬£¬¹¥»÷Õß¿ÉÓÃÆäÔÚϵͳÉÏÖ´ÐÐí§ÒâдÈë¡£¡£¡£¡£¡£¡£Æä´ÎÊÇFortiWebÊðÀíÊØ»¤³ÌÐòÖеĻùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öÎó²î£¨CVE-2021-42756£©£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.3£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÆäͨ¹ýÌØÖÆµÄHTTPÇëÇóÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2023/02/fortinet-issues-patches-for-40-flaws.html
3¡¢¶þάÂëÌìÉúÍøÕ¾MyQRcodeÉèÖùýʧй¶Áè¼Ý128 GBÊý¾Ý
ýÌå2ÔÂ19Èճƣ¬£¬£¬£¬Ê¢ÐеĶþάÂëÌìÉúÍøÕ¾MyQRcodeй¶ÁËÆäÓû§µÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚËÑË÷ÉèÖùýʧµÄÔÆÊý¾Ý¿âʱÔÚShodanÉÏ·¢Ã÷Á˸ÃЧÀÍÆ÷£¬£¬£¬£¬Ëüй¶ÁËÁè¼Ý128 GBµÄÊý¾Ý£¬£¬£¬£¬ÆäÖаüÀ¨66000ÃûÓû§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£ÕâÊÇÓÉÉèÖùýʧµ¼Öµģ¬£¬£¬£¬¹«ÖÚ¿ÉÒÔÔÚûÓÐÈκÎÇå¾²Éí·ÝÑéÖ¤»òÃÜÂëµÄÇéÐÎϹûÕæ»á¼û´ËЧÀÍÆ÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ð¹Â¶ÊÂÎñʼÓÚ2ÔÂ4ÈÕ£¬£¬£¬£¬ÏÖÔÚÌìÌì¶¼ÔÚ×Ô¶¯¸üÐÂеļͼ£¬£¬£¬£¬ÕâÅúעй¶ÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£
https://www.hackread.com/qr-code-generator-my-qr-code-data-leak/
4¡¢Symantec·¢Ã÷ÐÂFrebniisʹÓÃMicrosoft IISµÄ»î¶¯
SymantecÔÚ2ÔÂ16ÈÕ³ÆÆä·¢Ã÷ÁËжñÒâÈí¼þFrebniisʹÓÃMicrosoft IIS¹¦Ð§½¨ÉèºóÃŵĻ¡£¡£¡£¡£¡£¡£FrebniisʹÓÃÁËÒ»¸öÃûΪʧ°ÜÇëÇóÊÂÎñ»º³å(FREB)µÄIIS¹¦Ð§£¬£¬£¬£¬½«¶ñÒâ´úÂë×¢Èëµ½¿ØÖÆ FREB£¨¡°iisfreb.dll¡±£©µÄDLLÎļþµÄÌØ¶¨º¯ÊýÖУ¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»×èµ²ºÍ¼à¿Ø·¢Ë͵½ISSЧÀÍÆ÷µÄËùÓÐHTTP POSTÇëÇ󡣡£¡£¡£¡£¡£×¢ÈëµÄ´úÂëÊÇÒ»¸ö.NETºóÃÅ£¬£¬£¬£¬Ö§³ÖÊðÀíºÍC#´úÂëÖ´ÐУ¬£¬£¬£¬ÎÞÐè½Ó´¥´ÅÅÌ£¬£¬£¬£¬Ê¹ÆäÍêÈ«Òþ²Ø¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¹¥»÷ÕßÓÃÓÚ»ñÈ¡IISЧÀÍÆ÷»á¼ûȨÏÞµÄÒªÁìÉв»ÇåÎú¡£¡£¡£¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/frebniis-malware-iis
5¡¢ÐºڿÍÍÅ»ïWIP26Ö÷ÒªÕë¶ÔÖж«µÄµçÐÅЧÀÍÌṩÉÌ
2ÔÂ16ÈÕ£¬£¬£¬£¬SentinelLabsÅû¶ÁËкڿÍÍÅ»ïWIP26Õë¶ÔÖж«µÄµçÐÅЧÀÍÌṩÉ̵Ĺ¥»÷»î¶¯¡£¡£¡£¡£¡£¡£WIP26µÄÌØµãÊÇÀÄÓù«¹²ÔÆ»ù´¡ÉèÊ©£¬£¬£¬£¬ÈçMicrosoft 365 Mail¡¢Azure¡¢Google FirebaseºÍDropbox£¬£¬£¬£¬¾ÙÐжñÒâÈí¼þ·Ö·¢¡¢Êý¾Ýй¶ºÍC2¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯Í¨¹ýWhatsApp¾«×¼¶¨Î»Ô±¹¤£¬£¬£¬£¬ÆäÖаüÀ¨Ö¸Ïò¶ñÒâÈí¼þ¼ÓÔØ³ÌÐòµÄDropboxÁ´½Ó¡£¡£¡£¡£¡£¡£×îÖÕ»á×°ÖúóÃÅCMD365ºÍCMDEmber£¬£¬£¬£¬ËüÃǵÄÖ÷Òª¹¦Ð§ÊÇʹÓÃWindowsÏÂÁîÚ¹ÊÍÆ÷Ö´Ðй¥»÷ÕßÌṩµÄϵͳÏÂÁî¡£¡£¡£¡£¡£¡£
https://www.sentinelone.com/labs/wip26-espionage-threat-actors-abuse-cloud-infrastructure-in-targeted-telco-attacks/
6¡¢Èí¼þ¹«Ë¾AtlassianÔ±¹¤Æ¾Ö¤±»µÁµ¼Ö²¿·ÖÊý¾Ýй¶
¾Ý2ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬Èí¼þ¹«Ë¾AtlassianÔ±¹¤Æ¾Ö¤±»µÁµ¼Ö²¿·ÖÊý¾Ýй¶¡£¡£¡£¡£¡£¡£Cyberscoop×îÏȱ¨µÀ£¬£¬£¬£¬ºÚ¿ÍSiegedSecÔÚTelegramÉÏй¶ÁË´ÓAtlassianÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬Check PointÆÊÎöÁ˱»µÁÊý¾Ý£¬£¬£¬£¬ÏÓÒɹ¥»÷Õß²¢Ã»ÓÐÖ±½ÓÈëÇÖAtlassian£¬£¬£¬£¬¶øÊǹ¥»÷Á˵ÚÈý·½¹©Ó¦ÉÌEnvoy¡£¡£¡£¡£¡£¡£¶øEnvoyÌåÏÖ£¬£¬£¬£¬Æäϵͳ²¢Î´Ôâµ½¹¥»÷£¬£¬£¬£¬ÊÇAtlassianÔ±¹¤µÄƾ֤±»µÁ£¬£¬£¬£¬´Ó¶øÊ¹¹¥»÷ÕßÄܹ»»á¼û´æ´¢ÔÚEnvoyÓ¦ÓóÌÐòÖеÄÊý¾Ý¡£¡£¡£¡£¡£¡£AtlassianÊӲ췢Ã÷£¬£¬£¬£¬Ò»ÃûÔ±¹¤µÄƾ֤±»¹ýʧµØÐû²¼µ½¹«¹²´æ´¢¿â£¬£¬£¬£¬Òò´Ë¹¥»÷Õß¿ÉÒÔͨ¹ýÔ±¹¤ÕÊ»§»á¼û¿É¼ûÊý¾Ý¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/atlassian-data-leak-caused-by-stolen-employee-credentials/