VeeamÐû²¼¸üÐÂÐÞ¸´Veeam ONE¼à¿ØÆ½Ì¨Öжà¸öÎó²î

Ðû²¼Ê±¼ä 2023-11-08

1¡¢VeeamÐû²¼¸üÐÂÐÞ¸´Veeam ONE¼à¿ØÆ½Ì¨Öжà¸öÎó²î


11ÔÂ6ÈÕ £¬£¬£¬VeeamÐû²¼ÁËÇå¾²¸üÐÂÒÔÐÞ¸´Veeam ONE IT»ù´¡ÉèÊ©¼à¿ØºÍÆÊÎöƽ̨ÖеÄ4¸öÎó²î¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÊÇCVE-2023-38547(CVSSÆÀ·Ö9.9) £¬£¬£¬¿ÉÓÃÀ´»ñÈ¡ÓйØVeeam ONEÓÃÓÚ»á¼ûÆäÉèÖÃÊý¾Ý¿âµÄSQLЧÀÍÆ÷ÅþÁ¬µÄÐÅÏ¢ £¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ»£»£»£»£»ÒÔ¼°CVE-2023-38548£¨CVSSÆÀ·Ö9.8£© £¬£¬£¬¿É»ñÈ¡Veeam ONE Reporting ServiceËùʹÓÃÕÊ»§µÄNTLM¹þÏ£¡£¡£¡£ÁíÍâÁ½¸öÊÇ¿Éͨ¹ýXSS¹¥»÷ÇÔÈ¡ÖÎÀíÔ±ÁîÅÆµÄÎó²î£¨CVE-2023-38549£©ºÍ¿É»á¼ûDashboard ScheduleµÄÎó²î£¨CVE-2023-41723£©¡£¡£¡£


https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-bugs-in-veeam-one-monitoring-platform/


2¡¢ÈÕ±¾º½¿Õµç×Ó¹«Ë¾Ôâµ½AlphVµÄ¹¥»÷ÔËÓªÊܵ½Ó°Ïì


¾Ý11ÔÂ8ÈÕ±¨µÀ £¬£¬£¬ÈÕ±¾º½¿Õµç×Ó¹«Ë¾Í¸Â¶ £¬£¬£¬ÆäϵͳÔâµ½ÍøÂç¹¥»÷ £¬£¬£¬ÍøÕ¾±»ÆÈ¹Ø±Õ¡£¡£¡£ÖÜÒ»ÍíÉÏ £¬£¬£¬¸Ã¹«Ë¾µÄÍøÕ¾ÏÔʾÁËÒ»ÌõÐÂÎÅ £¬£¬£¬Åú×¢Æä²¿·ÖЧÀÍÆ÷ÔÚÉÏÖÜËı»ºÚ¡£¡£¡£Õâ¼Ò¹«Ë¾ÌåÏÖ £¬£¬£¬ËûÃÇÏÖÔÚÕýÔÚÊÓ²ìÈëÇÖÇéÐβ¢»Ö¸´ÔËÓª £¬£¬£¬µ«Ò»Ð©ÏµÍ³ÒѾ­ÖÐÖ¹ £¬£¬£¬ÊÕ·¢µç×ÓÓʼþÒ²·ºÆðÁËһЩÑÓÎó £¬£¬£¬ÉÐδ·¢Ã÷ÐÅϢй¶¡£¡£¡£AlphVÔÚ±¾ÖÜÒ»½«ÈÕ±¾º½¿Õµç×Ó¹«Ë¾¼ÓÈëÆäÍøÕ¾ £¬£¬£¬µ«¸Ã¹«Ë¾ÉÐδ͸¶ÊÇ·ñÕýÔÚÓ¦¶ÔÀÕË÷¹¥»÷¡£¡£¡£


https://therecord.media/japan-aviation-electronics-says-servers-accessed-during-cyberattack


3¡¢Unit 42·¢Ã÷AgriusÕë¶ÔÒÔÉ«ÁнÌÓýºÍ¿Æ¼¼ÐÐÒµµÄ¹¥»÷


Unit 42ÔÚ11ÔÂ6ÈÕ³ÆÆä·¢Ã÷ÁËAgriusÕë¶ÔÒÔÉ«ÁнÌÓýºÍ¿Æ¼¼ÐÐÒµµÄ¹¥»÷¡£¡£¡£ÕâЩ¹¥»÷´Ó1ÔÂÒ»Ö±Ò»Á¬µ½10Ô £¬£¬£¬Ö¼ÔÚÇÔÈ¡PIIºÍ֪ʶ²úȨµÈÃô¸ÐÐÅÏ¢¡£¡£¡£Ò»µ©ÇÔÈ¡ÁËÐÅÏ¢ £¬£¬£¬¹¥»÷Õ߾ͻá×°ÖÃÖݪֲÁ³ý³ÌÐò £¬£¬£¬À´ÑÚÊÎÆä×Ù¼£²¢Ê¹±»Ñ¬È¾µÄÖÕ¶ËÎÞ·¨Ê¹Óᣡ£¡£×î½üµÄ¹¥»÷»¹Ê¹ÓõÄ3ÖÖеIJÁ³ý³ÌÐò £¬£¬£¬MultiLayer Wiper¡¢PartialWasherºÍBFG Agonizer Wiper £¬£¬£¬ÒÔ¼°Ò»¸ö´ÓÊý¾Ý¿âЧÀÍÆ÷ÌáÊØÐÅÏ¢µÄ×Ô½ç˵¹¤¾ßSqlextractor¡£¡£¡£


https://unit42.paloaltonetworks.com/agonizing-serpens-targets-israeli-tech-higher-ed-sectors/


4¡¢Google³Æ¶à¸öÍÅ»ïÊÔͼ½«ÆäÈÕÀúЧÀÍÓÃ×÷C2»ù´¡ÉèÊ©


¾ÝýÌå11ÔÂ6ÈÕ±¨µÀ £¬£¬£¬GoogleÌáÐѶà¸ö¹¥»÷ÍÅ»ïÕýÔÚ¹²ÏíÒ»¸öÃûΪGoogle Calendar RAT(GCR)µÄPoC £¬£¬£¬ËüʹÓÃÈÕÀúЧÀÍÀ´ÍйÜÏÂÁîºÍ¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©¡£¡£¡£Æä¿ª·¢ÕßÌåÏÖ £¬£¬£¬¸Ã¾ç±¾Í¨¹ýʹÓÃGoogleÈÕÀúÖеÄÊÂÎñÐÎò½¨ÉèÁËÒ»¸ö¡°Òþ²ØÍ¨µÀ¡± £¬£¬£¬Ä¿µÄ½«Ö±½ÓÅþÁ¬µ½Google¡£¡£¡£Google³ÆÉÐδ·¢Ã÷GCRÔÚÒ°ÍâµÄʹÓÃÇéÐÎ £¬£¬£¬µ«Mandiant×¢ÖØµ½¶à¸öÍÅ»ïÔÚºÚ¿ÍÂÛ̳ÉÏ·ÖÏíÁËPoC £¬£¬£¬Õâ˵Ã÷ÎúËûÃǶÔÀÄÓÃÔÆÐ§À͸ÐÐËȤ¡£¡£¡£


https://securityaffairs.com/153700/hacking/google-calendar-rat-attacks.html


5¡¢VMwareÅû¶JupyterбäÌåÔÚ½üÆÚ¼¤ÔöµÄ¹¥»÷»î¶¯


VMwareÔÚ11ÔÂ6ÈÕÅû¶ÁËJupyter Infostealer±äÌåÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÚ2020Äêµ×Ê״α»·¢Ã÷ £¬£¬£¬Ö÷ÒªÕë¶Ô½ÌÓýºÍÎÀÉú²¿·Ö¡£¡£¡£ÒÑÍùÁ½ÖÜ £¬£¬£¬Ñо¿Ö°Ô±ÊӲ쵽µÄJupyter InfostealerѬȾÊýÄ¿Öð²½ÉÏÉý £¬£¬£¬ÏÖÔÚѬȾ×ÜÊýΪ26Àý¡£¡£¡£ËüÕë¶ÔChrome¡¢EdgeºÍFirefoxä¯ÀÀÆ÷ £¬£¬£¬Ê¹ÓÃSEOÖж¾ºÍËÑË÷ÒýÇæÖØ¶¨ÏòÀ´Èö²¥¡£¡£¡£ÐÂÒ»ÂֵĹ¥»÷ʹÓÃÁËPowerShellÏÂÁîÀ´Ð޸ĺÍÊðÃû˽Կ £¬£¬£¬ÊÔͼ½«¶ñÒâÈí¼þð³äΪÕýµ±ÊðÃûµÄÎļþ¡£¡£¡£


https://blogs.vmware.com/security/2023/11/jupyter-rising-an-update-on-jupyter-infostealer.html


6¡¢KasperskyÐû²¼2023ÄêÓëÓÎÏ·Ïà¹ØµÄÍøÂçÍþвµÄ±¨¸æ


11ÔÂ6ÈÕ £¬£¬£¬KasperskyÐû²¼ÁË2023ÄêÓëÓÎÏ·Ïà¹ØµÄÍøÂçÍþвµÄÆÊÎö±¨¸æ¡£¡£¡£¸Ã±¨¸æÆÊÎöÁË2022Äê7ÔÂ1ÈÕÖÁ2023Äê7ÔÂ1ÈÕʱ´úÍøÂçµÄÊý¾Ý¡£¡£¡£±¨¸æÖ¸³ö £¬£¬£¬Kaspersky×ܹ²¼ì²âµ½4076530´ÎÓëÓÎÏ·Ïà¹ØµÄ×ÀÃæÑ¬È¾ÊµÑé £¬£¬£¬Ó°ÏìÁËÈ«Çò192456ÃûÓÎÏ·Íæ¼Ò¡£¡£¡£×î³£¼ûµÄÍþвÊÇÏÂÔØ³ÌÐò£¨89.70%£© £¬£¬£¬Æä´ÎÊÇ¹ã¸æÈí¼þ£¨5.25%£©ºÍľÂí£¨2.39%£©¡£¡£¡£×î³£±»ÓÃ×÷ÓÕ¶üµÄÊÇÎÒµÄÌìÏ£¨70.29%£© £¬£¬£¬Æä´ÎÊÇRoblox£¨20.37%£©¡¢·´¿Ö¾«Ó¢£ºÈ«Çò¹¥ÊÆ£¨4.78%£©ºÍ¾øµØÇóÉú£¨2.85%£©¡£¡£¡£


https://securelist.com/game-related-threat-report-2023/110960/