Aqua NautilusÔÚÅäÖôíÎóµÄ×¢²á±íÖз¢ÏÖ2.5ÒÚ¸ö¹¤¼þ
Ðû²¼Ê±¼ä 2023-04-271¡¢Aqua NautilusÔÚÅäÖôíÎóµÄ×¢²á±íÖз¢ÏÖ2.5ÒÚ¸ö¹¤¼þ
¾ÝAqua Nautilus 4ÔÂ24Èճƣ¬Æä¼ì²âµ½Êýǧ¸öÅäÖôíÎóµÄ×¢²á±íºÍ´æ´¢¿â£¬ÆäÖаüÂÞÁè¼Ý2.5ÒÚ¸ö¹¤¼þºÍÁè¼Ý65000¸öÈÝÆ÷¾µÏñ¡£ÔÚijЩÇé¿öÏ£¬¹¥»÷Õ߿ɻñÈ¡Ãô¸ÐÐÅÏ¢£¬ÀýÈç»úÃÜ¡¢ÃÜÔ¿ºÍÃÜÂ룬Õâ¿ÉÄܵ¼ÖÂÈí¼þ¹©Ó¦Á´¹¥»÷ºÍÈí¼þ¿ª·¢ÉúÃüÖÜÆÚ(SDLC)Öж¾¡£Ñо¿ÈËÔ±·¢ÏÖÁË57¸ö×¢²á±í´æÔÚÑÏÖØÂ©¶´£¬ÀýÈçĬÈϵĹÜÀíÔ±ÃÜÂ룬ÆäÖÐ15¸ö×¢²á±íÔÊÐíʹÓÃĬÈÏÃÜÂë½øÐйÜÀíÔ±·ÃÎÊ¡£»¹ÓÐÁè¼Ý2100¸ö¾ßÓÐÉÏ´«È¨Ï޵Ť¼þ×¢²á±í£¬¿É±»¹¥»÷ÕßÓÃÀ´Í¨¹ý¶ñÒâ´úÂëʹע²á±íÖж¾¡£
https://www.infosecurity-magazine.com/news/250-million-artifacts-exposed/
2¡¢CiscoÅû¶PCDÈí¼þÖеÄXSS©¶´CVE-2023-20060
4ÔÂ26ÈÕ£¬CiscoÅû¶ÁËPrime Collaboration Deployment(PCD)Èí¼þÖеÄXSS©¶´£¨CVE-2023-20060£©¡£¸Ã©¶´ÊÇÒòΪ»ùÓÚWebµÄ¹ÜÀí½çÃæÎÞ·¨ÕýÈ·ÑéÖ¤Óû§µÄÊäÈ룬¹¥»÷Õß¿Éͨ¹ýÓÕʹÓû§µ¥»÷¶ñÒâÁ´½ÓÀ´ÀûÓôË©¶´¡£ÀÖ³ÉÀûÓøÃ©¶´¿ÉÔÚ±»Ó°ÏìµÄ½çÃæÉÏÖ´ÐÐÈÎÒâ½Å±¾´úÂ룬»ò·ÃÎÊ»ùÓÚä¯ÀÀÆ÷µÄÐÅÏ¢¡£¸Ã¹«Ë¾¼Æ»®½«Ï¸öÔÂÐû²¼Äþ¾²¸üÐÂÀ´ÐÞ¸´Õâһ©¶´£¬Ä¿Ç°Ã»Óнâ¾ö´ËÎÊÌâµÄ±äͨ´ëÊ©¡£
https://www.bleepingcomputer.com/news/security/cisco-discloses-xss-zero-day-flaw-in-server-management-tool/
3¡¢EDUCATED MANTICOREÀûÓÃй¤¾ß¹¥»÷ÒÔÉ«ÁеÄ×éÖ¯
4ÔÂ25ÈÕ£¬Check Point½ÒʾÁËEDUCATED MANTICOREÀûÓøïеļÆÄ±ºÍ¹¤¾ß¹¥»÷ÒÔÉ«ÁÐ×éÖ¯µÄ»î¶¯¡£¹¥»÷ʼÓÚÒ»¸öISO´ÅÅ̾µÏñÎļþ£¬¸ÃÎļþÀûÓÃÒÔÒÁÀ¿ËΪÖ÷ÌâµÄÓÕ¶üÀ´·Ö·¢×Ô½ç˵µÄÄÚ´æÏÂÔØ·¨Ê½£¬×îÖջᰲװа汾µÄPowerLessÖ²È뷨ʽ£¬¸Ã¹¤¾ßÔø¾±»¹éÒòÓÚPhosphorus¡£PowerLess payloadµÄ¼ÓÔØ»úÖÆÓÐÁËÃ÷ÏԵĸïУ¬½ÓÄÉÁËÔÚÒ°ÍâºÜÉÙ¼ûµÄ¼¼Êõ£¬ÈçʹÓÃÒÔ»ìºÏģʽ´´½¨µÄ.NET¶þ½øÖÆÎļþºÍ»ã±à´úÂë¡£
https://research.checkpoint.com/2023/educated-manticore-iran-aligned-threat-actor-targeting-israel-via-improved-arsenal-of-tools/
4¡¢TP-Link Archer A21ÖÐÃüÁî×¢Èë©¶´±»Mirai±äÌåÀûÓÃ
¾ÝýÌå4ÔÂ25ÈÕ±¨µÀ£¬Ò»¸öеÄMirai±äÌ忪ʼÀûÓÃTP-Link Archer A21ÖеÄ©¶´£¨CVE-2023-1389£©¡£¸Ã©¶´ÓÚ1Ô±»Åû¶£¬TP-LinkÔÚ3ÔµĹ̼þ¸üÐÂÖÐÐÞ¸´Á˸é¶´¡£ZDI´Ó4ÔÂ11ÈÕ¿ªÊ¼ÔÚÒ°Íâ¼ì²âµ½ÁËÀûÓøÃ©¶´µÄ»î¶¯£¬×î³õ¼¯ÖÐÔÚ¶«Å·£¬ÏÖÔÚÏòÈ«ÇòÂûÑÓ¡£Ñо¿ÈËÔ±³Æ£¬Ð°汾µÄMiraiÀûÓøÃ©¶´»ñÈ¡¶ÔÉ豸µÄ·ÃÎÊȨÏÞ£¬È»ºóËü»áΪ·ÓÉÆ÷µÄ¼Ü¹¹ÏÂÔØÊʵ±µÄ¶þ½øÖÆpayload£¬ÒÔ½«É豸¼ÓÈëÆä½©Ê¬ÍøÂçÖС£¹¥»÷±³ºóµÄMiraiרעÓÚDDoS¹¥»÷£¬Ö÷ÒªÕë¶ÔÓÎÏ··þÎñÆ÷£¬¾ßÓÐÕë¶ÔValve Source Engine(VSE)µÄ¹¦Ð§¡£
https://securityaffairs.com/145278/hacking/mirai-botnet-cve-2023-1389-tp-link-archer-a21.html
5¡¢Ñо¿ÍŶÓÅû¶APT37ͨ¹ýLNKÎļþ·Ö·¢RokRATµÄ»î¶¯
Ñо¿ÍŶÓÔÚ4ÔÂ26ÈÕÅû¶ÁËAPT37£¨Ò²³ÆAPT37ºÍScarCruft£©½üÆÚͨ¹ýLNKÎļþ·Ö·¢¶ñÒâÈí¼þRokRATµÄ»î¶¯¡£LNKÎļþαװ³ÉPDFͼ±ê£¬²¢°üÂÞ¶ñÒâµÄPowerShellÃüÁÒÔ¼°ÆÕͨµÄPDFÎļþµÄÊý¾ÝºÍ¶ñÒâ½Å±¾´úÂë¡£×îÖÕ»áÏÂÔØ¶ñÒâÈí¼þRokRAT£¬ËüÄܹ»ÊÕ¼¯Óû§Æ¾Ö¤²¢ÏÂÔØÌØ±ðµÄ¶ñÒâÈí¼þ¡£ÊÕ¼¯µÄÐÅÏ¢±»·¢Ë͵½¹¥»÷ÕßµÄÔÆ·þÎñÆ÷£¬Ê¹ÓÃpcloudºÍyandexµÈÔÆ·þÎñ£¬ÇëÇóÍ·ÖеÄUserAgent±»Î±×°³ÉGooglebot¡£
https://asec.ahnlab.com/en/51751/
6¡¢Trend MicroÐû²¼¶ñÒâÈí¼þViperSoftXµÄ·ÖÎö³ÂËß
4ÔÂ24ÈÕ£¬Trend MicroÐû²¼ÁËа汾ÐÅÏ¢ÇÔÈ¡·¨Ê½ViperSoftXµÄ·ÖÎö³ÂËß¡£ViperSoftXÖ÷ÒªÕë¶Ô¼ÓÃÜ»õ±Ò£¬Í¨³£ÒÔÈí¼þÆÆ½â¡¢¼¤»îÆ÷»òÐÞ²¹·¨Ê½»òÃÜÔ¿Éú³ÉÆ÷(keygen)µÄÐÎʽ·ºÆð¡£Ñо¿ÈËÔ±·¢ÏÖ£¬ViperSoftXÓÃÓÚµÚ¶þ½×¶ÎÏÂÔØµÄÖ÷ÒªC&C·þÎñÆ÷ÿÔ¶¼Êз¢Éú±ä»¯¡£´ËÍ⣬¸Ã¶ñÒâÈí¼þ»¹Ê¹ÓÃ×Ö½ÚÖØÓ³ÉäÀ´È·±£ÔÚûÓÐÕýÈ·×Ö½ÚÓ³ÉäµÄÇé¿öÏÂÎÞ·¨ÇáÒ×½âÃÜ shellcode£¬¿É·ÀÖ¹Ç¿ÖÆ½âÃÜ¡£´Ë´ÎÊӲ컹·¢ÏÖ£¬ViperSoftX²»½ö¼ì²é¼ÓÃÜ»õ±Ò£¬»¹¿ÉÒÔ¼ì²éһЩÃÜÂë¹ÜÀíÆ÷¡£
https://www.trendmicro.com/en_us/research/23/d/vipersoftx-updates-encryption-steals-data.html