ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ1ÖÜ

Ðû²¼Ê±¼ä 2021-01-04

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê12ÔÂ28ÈÕÖÁ2021Äê01ÔÂ03ÈÕ¹²ÊÕ¼Çå¾²Îó²î52¸ö£¬£¬ £¬£¬ÖµµÃ¹Ø×¢µÄÊÇKLog Server actions/authenticate.phpÏÂÁî×¢ÈëÎó²î£»£»£»Solarwinds Orion Platform Request.PathInfoÇå¾²ÈÆ¹ýÎó²î£»£»£»Panasonic Security SystemÓ²±àÂëÎó²î£»£»£»Netgear NMS300 CVE-2020-35789ÏÂÁî×¢ÈëÎó²î£»£»£»NETGEAR D7800 CVE-2020-35791ÏÂÁî×¢ÈëÎó²î¡£ ¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇApple iCloudÖÐÖ¹36Сʱ£¬£¬ £¬£¬Éв»ÇåÎú¹ÊÕÏÔµ¹ÊÔ­ÓÉ£»£»£»GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬ £¬£¬²âÊÔÔ±¹¤µÄ·´Ó¦£»£»£»Ð¶ñÒâÈí¼þ¿ÉʹÓÃImgurÀ´½âÂëCobalt Strike¾ç±¾£»£»£»ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖØ¹¤Ôâµ½¹¥»÷£¬£¬ £¬£¬»ò½«µ¼ÖÂÊý¾Ýй¶£»£»£»WasabiÔÆ´æ´¢Ð§ÀÍÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ¡£ ¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬ £¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£ ¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.KLog Server actions/authenticate.phpÏÂÁî×¢ÈëÎó²î


KLog Server actions/authenticate.php±£´æÊäÈëÑéÖ¤Îó²î£¬£¬ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬¿É×¢Èëí§ÒâOSÏÂÁî²¢Ö´ÐС£ ¡£¡£

https://github.com/mustgundogdu/Research/blob/main/KLOG_SERVER/Exploit_Code


2.Solarwinds Orion Platform Request.PathInfoÇå¾²ÈÆ¹ýÎó²î


Solarwinds Orion Platform Request.PathInfo±£´æÑéÖ¤ÈÆ¹ýÎó²î£¬£¬ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬¿ÉÖ´ÐÐδÊÚȨµÄAPIÏÂÁî¡£ ¡£¡£

https://www.kb.cert.org/vuls/id/843464


3.Panasonic Security SystemÓ²±àÂëÎó²î


Panasonic Security System±£´ælkjhgfdsaÓ²±àÂëÎó²î£¬£¬ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£ ¡£¡£

https://security.panasonic.com/products_technology/products/wv-s2231l/



4.Netgear NMS300 CVE-2020-35789ÏÂÁî×¢ÈëÎó²î


Netgear NMS300±£´æÊäÈëÑéÖ¤Îó²î£¬£¬ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£ ¡£¡£

https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559


5.NETGEAR D7800 CVE-2020-35791ÏÂÁî×¢ÈëÎó²î


NETGEAR D7800±£´æÊäÈëÑéÖ¤Îó²î£¬£¬ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£ ¡£¡£

https://kb.netgear.com/000062714/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0079


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Apple iCloudÖÐÖ¹36Сʱ£¬£¬ £¬£¬Éв»ÇåÎú¹ÊÕÏÔµ¹ÊÔ­ÓÉ


1.jpg


Apple iCloudЧÀÍ·ºÆð¹ÊÕÏ£¬£¬ £¬£¬Ê¹Óû§ÎÞ·¨µÇ¼¸ÃЧÀÍ»á¼ûÎļþ»òÉèÖÃÐÂ×°±¸¡£ ¡£¡£´Ë´ÎÖÐÖ¹´ÓÃÀ¹ú¶«²¿Ê±¼ä12ÔÂ25ÈÕÉÏÎç4:45×îÏÈ£¬£¬ £¬£¬Ö±µ½12ÔÂ26ÈÕÏÂÖç4:35²Å±»ÐÞ¸´£¬£¬ £¬£¬Àúʱ36Сʱ¡£ ¡£¡£ÖÐֹʱ´ú£¬£¬ £¬£¬AppleµÄϵͳ״̬ҳÉϽöÏÔʾ¡°Óû§¿ÉÄÜÓöµ½´ËЧÀ͵ÄÎÊÌ⡱µÄÌáÐÑ£¬£¬ £¬£¬Ã»Óиü¶àÓÐ¹ØÆäÖÐÖ¹µÄÐÅÏ¢¡£ ¡£¡£ÏÖÔÚ£¬£¬ £¬£¬Apple¹«Ë¾Ã»ÓÐÌṩÈκÎÒÔÕÏÔµ¹ÊÔ­ÓÉ¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/apple/apple-icloud-outage-prevents-device-activations-access-to-data/


2¡¢GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬ £¬£¬²âÊÔÔ±¹¤µÄ·´Ó¦


2.jpg


GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬ £¬£¬ÒÔ²âÊÔÔ±¹¤¶ÔÍøÂç´¹ÂڻµÄ·´Ó¦¡£ ¡£¡£¸Ã²âÊÔÓÚ12Ô¾ÙÐУ¬£¬ £¬£¬ÓʼþÉù³Æ½«Ìṩ650ÃÀÔªµÄÊ¥µ®½Ú½±½ð£¬£¬ £¬£¬ÒÔ×ÊÖúÔ±¹¤Ó¦¶ÔÒòCOVID-19±¬·¢¶øµ¼Öµľ­¼ÃÎÊÌ⣬£¬ £¬£¬²¢ÒªÇóËûÃÇÌîдСÎÒ˽¼ÒÐÅÏ¢±í¸ñ¡£ ¡£¡£Õâ´Î²âÊԻԼĪ500ÃûÔ±¹¤ÖÐÕУ¬£¬ £¬£¬ËûÃǽ«±»ÒªÇóÖØÐ¼ÓÈëÉç»á¹¤³ÌÇå¾²ÒâʶµÄÅàѵ¡£ ¡£¡£ÓÉÓÚ²âÊÔÖÐʹÓõÄÓÕ¶üºÍÄ£Äâʱ¼äµÄÑ¡Ôñ£¬£¬ £¬£¬¸ÃÒªÁìÊܵ½Á˲¿·ÖÍøÂçÇå¾²ÕûÌåµÄÆ·ÆÀ¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112664/security/godaddy-phishing-test-employees.html


3¡¢Ð¶ñÒâÈí¼þ¿ÉʹÓÃImgurÀ´½âÂëCobalt Strike¾ç±¾


3.jpg


жñÒâÈí¼þ¿ÉʹÓÃͼÏñÍйÜЧÀÍImgurÏÂÔØÕýµ±µÄͼÏñ£¬£¬ £¬£¬À´½âÂëCobalt Strike¾ç±¾¡£ ¡£¡£ÐµĶñÒâÈí¼þʹÓôøÓкêµÄWordÎļþ´ÓGitHubÏÂÔØPowerShell¾ç±¾£¬£¬ £¬£¬¸Ã¾ç±¾½«´ÓImgurÏÂÔØÏÖʵPNGÎļþ¡£ ¡£¡£Ö®ºó£¬£¬ £¬£¬Ê¹ÓÃÏñInvoke-PSImageÕâÑùµÄ¹¤¾ßÀ´Ê¹ÓÃPNGÎļþÖеÄÏñËØÖµ±àÂëPowerShell¾ç±¾£¬£¬ £¬£¬²¢ÌìÉúÒ»ÐÐÏÂÁîÀ´Ö´ÐÐpayload£¬£¬ £¬£¬×îÖÕ»ñµÃCobalt Strike¾ç±¾¡£ ¡£¡£Ñо¿Ö°Ô±ÍƲâ´Ë¶ñÒâÈí¼þ¿ÉÄÜÓëÖ÷ÒªÕë¶ÔÖж«ÊµÌåµÄAPT×éÖ¯MuddyWaterÓйØ¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/github-hosted-malware-calculates-cobalt-strike-payload-from-imgur-pic/


4¡¢ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖØ¹¤Ôâµ½¹¥»÷£¬£¬ £¬£¬»ò½«µ¼ÖÂÊý¾Ýй¶


4.png


ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖØ¹¤Ôâµ½¹¥»÷£¬£¬ £¬£¬»ò½«µ¼ÖÂÊý¾Ýй¶¡£ ¡£¡£´¨ÆéÖØ¹¤£¨Kawasaki£©³Æ£¬£¬ £¬£¬2020Äê6ÔÂ11ÈÕÓÐδ¾­ÊÚȨµÄµÚÈý·½´ÓÌ©¹úЧÀÍ´¦»á¼ûÁËÈÕ±¾µÄЧÀÍÆ÷£¬£¬ £¬£¬ÔÚ·¢Ã÷¸ÃÎÊÌâºóÁ½¸öÕ¾µãÖ®¼äµÄËùÓÐͨѶ¶¼±»×èÖ¹¡£ ¡£¡£Ëæºó£¬£¬ £¬£¬¸Ã¹«Ë¾ÓÖ·¢Ã÷ÁËÆäËûÍâÑóÕ¾µã£¨Ó¡¶ÈÄáÎ÷ÑÇ¡¢·ÆÂɱöºÍÃÀ¹ú£©Î´¾­ÊÚȨ»á¼ûÈÕ±¾Ð§ÀÍÆ÷µÄÇéÐΣ¬£¬ £¬£¬²¢ÇжÏͨѶ¡£ ¡£¡£´¨Æé³Æ´Ë´Î¹¥»÷ʹÓÃÁËÏȽøÊÖÒÕ¶øÃ»ÓÐÁôÏÂÈκκۼ£ºÍÖ¤¾Ý£¬£¬ £¬£¬µ«¹«Ë¾Êý¾Ý»òÐíÒѾ­Ð¹Â¶¡£ ¡£¡£ËùÓб»ÖÕÖ¹µÄͨѶÓÚ11ÔÂ30ÈÕ»Ö¸´Õý³£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112765/data-breach/kawasaki-heavy-industries-cyber-attack.html


5¡¢WasabiÔÆ´æ´¢Ð§ÀÍÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ


5.png


WasabiÔÆ´æ´¢Ð§ÀÍÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ¡£ ¡£¡£12ÔÂ28ÈÕÏÂÖç2:30 ESTÓû§·¢Ã÷ÎÞ·¨»á¼ûwasabisys.comÉϵĴ洢Ͱ£¬£¬ £¬£¬WasabiÔÚÖÐÖ¹±¨¸æÖгÆÊÇÓÉÓÚDNSÆÊÎöÎÊÌâµ¼Ö¡£ ¡£¡£¾ÝϤ£¬£¬ £¬£¬¸Ãƽ̨Óû§ÉÏ´«Á˶ñÒâÈí¼þ£¬£¬ £¬£¬ÆäÓòÃû³Æ×¢²áÉÌ·¢Ã÷ºóÏëҪͨ¹ýµç×ÓÓʼþ֪ͨWasabi£¬£¬ £¬£¬È´°Ñ±¨¸æ×ª·¢µ½Á˹ýʧµÄµØµã£¬£¬ £¬£¬Ê¹µÃWasabiδ»ñµÃ֪ͨ¡£ ¡£¡£¶ø¸Ã×¢²áÉÌÒòδ»ñµÃ»Ø¸´¶øÔÝÍ£Á˸ÃÓò£¬£¬ £¬£¬WasabiÔÚµÃÖª¸ÃÊÂÎñºóɾ³ýÁËÍйܶñÒâÈí¼þ²¢ÒªÇóÖØÐ¼¤»î¸ÃÓò£¬£¬ £¬£¬Æ½Ì¨ÔÚ12ÔÂ29ÈÕÏÂÖç12:57 ESTÖÕÓÚ»ñµÃ»Ö¸´¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/wasabi-cloud-storage-service-knocked-offline-for-hosting-malware/