ÃÀ¹úÂÉʦЭ»áABAÔâµ½¹¥»÷Ô¼140Íò»áÔ±µÄÐÅϢй¶

Ðû²¼Ê±¼ä 2023-04-23
1¡¢ÃÀ¹úÂÉʦЭ»áABAÔâµ½¹¥»÷Ô¼140Íò»áÔ±µÄÐÅϢй¶


¾ÝýÌå4ÔÂ21ÈÕ±¨µÀ £¬ÃÀ¹úÂÉʦЭ»á(ABA)Ô¼1466000Ãû»áÔ±µÄƾ¾Ýй¶¡£ABAÊÇÈ«Çò×î´óµÄÂÉʦºÍÖ´·¨×¨ÒµÈËʿЭ»á £¬½ØÖÁ2022ÄêÓµÓÐ166000Ãû»áÔ±¡£¸Ã»ú¹¹Í¸Â¶ £¬ËûÃÇÓÚ3ÔÂ17ÈÕ¼ì²âµ½Òì³£»î¶¯ £¬ÊÓ²ìÈ·¶¨¹¥»÷Õß´Ó3ÔÂ6ÈÕǰºó¿ªÊ¼·ÃÎÊABAϵͳ £¬²¢¿ÉÄÜ»ñµÃÁË2018ÄêÍ£ÓÃµÄ·ÏÆú»áԱϵͳµÄ»áÔ±µÇ¼ƾ¾Ý¡£²¿ÃÅ»áÔ±¿ÉÄÜ»áÔÚÐÂϵͳʹÓÃÓë¾ÉϵͳÏàͬµÄƾ¾Ý £¬Òò´Ë £¬ABA½¨Òé»áÔ±¸ü¸ÄÃÜÂë¡£


https://securityaffairs.com/145125/data-breach/american-bar-association-data-breach.html 


2¡¢VMwareÐÞ¸´vRealize Log InsightµÄ·´ÐòÁл¯Â©¶´


ýÌå4ÔÂ20ÈÕ³Æ £¬VMwareÐÞ¸´ÁËvRealize Log Insight£¨ÏÖ³ÆÎªVMware Aria Operations for Logs£©Öеķ´ÐòÁл¯Â©¶´£¨CVE-2023-20864£©¡£¸Ã©¶´¿ÉÔÚµÍÅÓ´óÐԵĹ¥»÷Öб»Ô¶³ÌÀûÓà £¬ÒÔrootÉí·ÝÖ´ÐÐÈÎÒâÃüÁî¡£ÆäCVSSv3ÆÀ·ÖΪ9.8 £¬Ö»Óа汾8.10.2ÊÜ´Ë©¶´Ó°Ïì¡£´Ë´Î»¹ÐÞ¸´ÁËÒ»¸öÃüÁî×¢Èë©¶´£¨CVE-2023-20865£© £¬ÓµÓйÜÀíȨÏ޵Ĺ¥»÷Õß¿ÉÀûÓÃÆäÒÔrootÉí·ÝÖ´ÐÐÈÎÒâÃüÁî¡£


https://www.bleepingcomputer.com/news/security/vmware-fixes-vrealize-bug-that-let-attackers-run-code-as-root/


3¡¢Å·ÖÞ¿ÕÖк½ÐÐÄþ¾²×éÖ¯Ôâµ½KillnetÍÅ»ïµÄDDoS¹¥»÷


¾Ý4ÔÂ22ÈÕ±¨µÀ £¬Å·ÖÞ¿ÕÖн»Í¨¹ÜÖÆ²¿ÃÅEUROCONTROLÔâµ½KillnetµÄ´ó¹æÄ£DDoS¹¥»÷¡£Eurocontrol³Æ £¬ÆäÍøÕ¾×Ô4ÔÂ19ÈÕÒÔÀ´Ò»Ö±Ôâµ½¹¥»÷¡£¹¥»÷µ¼ÖÂÍøÕ¾ºÍÍøÂç¿ÉÓÃÐÔÖжÏ £¬µ«ÊÇûÓÐÓ°ÏìÅ·ÖÞº½¿Õ¡£Eurocontrolij¹ÙԱ͸¶ £¬ºÚ¿ÍÎÞ·¨·ÃÎʺ½¿ÕÄþ¾²ÏµÍ³ £¬ÒòΪÕâЩϵͳÊÇÆøÏ¶Ê½µÄ¡£KillnetÔøÍ¨¹ýÆäTelegramºôÓõÕë¶ÔEurocontrolµÄÐж¯ £¬³Æ¡°´Ó½ñÌ쿪ʼ £¬½«¾ÙÐÐÒ»³¡EurocontrolÂíÀ­ËÉ £¬Á¬Ðø100Сʱ¡±¡£¸Ã»ú¹¹µÄ·¢ÑÔÈËûÓÐ͸¶ÄÄЩϵͳÊܵ½Ó°Ïì¡¢Ô¤¼ÆÍêÈ«»Ö¸´Ê±¼äÒÔ¼°KillnetÊÇ·ñ¶Ô´Ë´ÎDDoS¹¥»÷ÂôÁ¦µÈÎÊÌâ¡£


https://www.theregister.com/2023/04/22/eurocontrol_russia_attack/


4¡¢Ñо¿ÍŶӷ¢ÏÖÀûÓÃWP²å¼þEval PHPµÄ´ó¹æÄ£¹¥»÷»î¶¯


Ñо¿ÍŶÓÔÚ4ÔÂ19ÈÕ³ÆÆä·¢ÏÖ´óÁ¿ÀûÓÃ·ÏÆúWP²å¼þEval PHPµÄ¹¥»÷»î¶¯¡£¸Ã²å¼þÔÚ¹ýȥʮÄêûÓиüР£¬µ«ÈÔ¿Éͨ¹ýWordPress²å¼þ´æ´¢¿â»ñµÃ¡£Sucuri³Æ £¬Ê¹ÓÃEval PHP½«¶ñÒâ´úÂëǶÈëWordPressÒ³ÃæµÄÇ÷ÊÆÔÚ2023Äê4Ô¼¤Ôö £¬¸Ã²å¼þÏÖÔÚÆ½¾ùÿÌìÓÐ4000´Î¶ñÒâ°²×°¡£¹¥»÷ÕßʹÓñ»ÈëÇÖ»òд´½¨µÄ¹ÜÀíÔ±ÕË»§À´°²×°Eval PHP £¬È»ºóʹÓÃ[evalphp]¶Ì´úÂ뽫PHP´úÂë×¢Èë±»¹¥»÷ÍøÕ¾µÄÒ³ÃæºÍÌû×Ó¡£Ò»µ©´úÂëÖ´Ðкó £¬Ëü»áÔÚÍøÕ¾¸ùĿ¼ÖÐ×¢ÈëºóÃÅ (3e9c0ca6bbe9.php) £¬ºóÃÅÃû³Æ¿ÉÄÜÒò²îÒìµÄ¹¥»÷¶ø²îÒì¡£


https://blog.sucuri.net/2023/04/massive-abuse-of-abandoned-evalphp-wordpress-plugin.html


5¡¢Î¢Èí·ºÆð¹ÊÕϵ¼ÖÂÈ«ÇòÓû§ÎÞ·¨·ÃÎÊÆä²¿ÃÅÓ¦ÓúͷþÎñ


ýÌå4ÔÂ20ÈÕ±¨µÀ³Æ £¬Î¢Èí·ºÆð¹ÊÕÏ £¬µ¼ÖÂÈ«ÇòÓû§ÎÞ·¨·ÃÎÊÆä²¿ÃÅÓ¦ÓúͷþÎñ¡£ÊÜÓ°ÏìµÄ·þÎñ°üÂÞMicrosoft 365Ì×¼þ¡¢Exchange OnlineºÍSharePoint OnlineµÈ¡£Óû§ÔڵǼÕÊ»§Ê±Óöµ½ÁËÎÊÌâ £¬Ò»µ©½øÈë¾Í»á·¢ÏÖûÓпÉÓõÄwebÓ¦Ó᣾ÝϤ £¬´Ë´ÎÖжÏÊÇÓÉÓÚ»º´æ»ù´¡ÉèÊ©µÄÐÔÄܵÍÓڿɽÓÊܵÄÐÔÄÜãÐÖµ²¢µ¼Ö³¬Ê±Òì³£ÒýÆðµÄ¡£¾Ý4ÔÂ20ÈÕ 19:52 EDTµÄ¸üР£¬Î¢ÈíÌåÏÖ £¬´Ë´ÎÖжϵĻù´¡ÎÊÌâÒѾ­½â¾ö £¬ËùÓÐÓû§µÄ·þÎñ¶¼Òѻָ´¡£ 


https://www.bleepingcomputer.com/news/microsoft/microsoft-365-outage-blocks-access-to-web-apps-and-services/


6¡¢SymantecÅû¶DaggerflyÕë¶Ô·ÇÖÞµçÐŹ«Ë¾µÄ¹¥»÷»î¶¯


SymantecÔÚ4ÔÂ20ÈÕÅû¶ÁËAPTÍÅ»ïDaggerflyÕë¶Ô·ÇÖÞµçÐŹ«Ë¾µÄ¹¥»÷»î¶¯¡£¸Ã»î¶¯ÓÚ2022Äê11ÔÂÊ״α»·¢ÏÖ £¬¶øÇÒÏÖÔÚ¿ÉÄÜÈÔÔÚ½øÐÐÖС£¹¥»÷ÕßʹÓÃBITSAdminºÍPowerShellµÈLotL¹¤¾ßÀ´·Ö·¢ÏÂÒ»½×¶ÎµÄpayload £¬°üÂ޺Ϸ¨µÄAnyDesk¿ÉÖ´ÐÐÎļþºÍƾ¾ÝÊÕ¼¯¹¤¾ßGetCredManCreds¡£Ñо¿ÈËÔ±·¢ÏÖ¹¥»÷ÕßÀûÓÃMgBot¿ò¼Ü¿ª·¢ºÍ²¿ÊðµÄвå¼þ¾ßÓжàÖÖÐÅÏ¢ÊÕ¼¯¹¦Ð§¡£´ËÍâ £¬Ãâ·Ñɱ¶¾Èí¼þRisingÒ²±»ÓÃÀ´¼ÓÔØPlugX loader¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/apt-attacks-telecoms-africa-mgbot