ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ1ÖÜ

Ðû²¼Ê±¼ä 2021-01-04

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê12ÔÂ28ÈÕÖÁ2021Äê01ÔÂ03ÈÕ¹²ÊÕ¼Çå¾²Îó²î52¸ö£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇKLog Server actions/authenticate.phpÏÂÁî×¢ÈëÎó²î£»£»£»£»£»£»£»£»Solarwinds Orion Platform Request.PathInfoÇå¾²ÈÆ¹ýÎó²î£»£»£»£»£»£»£»£»Panasonic Security SystemÓ²±àÂëÎó²î£»£»£»£»£»£»£»£»Netgear NMS300 CVE-2020-35789ÏÂÁî×¢ÈëÎó²î£»£»£»£»£»£»£»£»NETGEAR D7800 CVE-2020-35791ÏÂÁî×¢ÈëÎó²î¡£¡£¡£¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇApple iCloudÖÐÖ¹36Сʱ£¬£¬£¬£¬Éв»ÇåÎú¹ÊÕÏÔµ¹ÊÔ­ÓÉ£»£»£»£»£»£»£»£»GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬²âÊÔÔ±¹¤µÄ·´Ó¦£»£»£»£»£»£»£»£»Ð¶ñÒâÈí¼þ¿ÉʹÓÃImgurÀ´½âÂëCobalt Strike¾ç±¾£»£»£»£»£»£»£»£»ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖØ¹¤Ôâµ½¹¥»÷£¬£¬£¬£¬»ò½«µ¼ÖÂÊý¾Ýй¶£»£»£»£»£»£»£»£»WasabiÔÆ´æ´¢Ð§ÀÍÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ¡£¡£¡£¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.KLog Server actions/authenticate.phpÏÂÁî×¢ÈëÎó²î


KLog Server actions/authenticate.php±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿É×¢Èëí§ÒâOSÏÂÁî²¢Ö´ÐС£¡£¡£¡£¡£¡£¡£¡£

https://github.com/mustgundogdu/Research/blob/main/KLOG_SERVER/Exploit_Code


2.Solarwinds Orion Platform Request.PathInfoÇå¾²ÈÆ¹ýÎó²î


Solarwinds Orion Platform Request.PathInfo±£´æÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉÖ´ÐÐδÊÚȨµÄAPIÏÂÁî¡£¡£¡£¡£¡£¡£¡£¡£

https://www.kb.cert.org/vuls/id/843464


3.Panasonic Security SystemÓ²±àÂëÎó²î


Panasonic Security System±£´ælkjhgfdsaÓ²±àÂëÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£¡£¡£¡£¡£¡£

https://security.panasonic.com/products_technology/products/wv-s2231l/



4.Netgear NMS300 CVE-2020-35789ÏÂÁî×¢ÈëÎó²î


Netgear NMS300±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£¡£¡£¡£¡£¡£

https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559


5.NETGEAR D7800 CVE-2020-35791ÏÂÁî×¢ÈëÎó²î


NETGEAR D7800±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£¡£¡£¡£¡£¡£

https://kb.netgear.com/000062714/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0079


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Apple iCloudÖÐÖ¹36Сʱ£¬£¬£¬£¬Éв»ÇåÎú¹ÊÕÏÔµ¹ÊÔ­ÓÉ


1.jpg


Apple iCloudЧÀÍ·ºÆð¹ÊÕÏ£¬£¬£¬£¬Ê¹Óû§ÎÞ·¨µÇ¼¸ÃЧÀÍ»á¼ûÎļþ»òÉèÖÃÐÂ×°±¸¡£¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÖÐÖ¹´ÓÃÀ¹ú¶«²¿Ê±¼ä12ÔÂ25ÈÕÉÏÎç4:45×îÏÈ£¬£¬£¬£¬Ö±µ½12ÔÂ26ÈÕÏÂÖç4:35²Å±»ÐÞ¸´£¬£¬£¬£¬Àúʱ36Сʱ¡£¡£¡£¡£¡£¡£¡£¡£ÖÐֹʱ´ú£¬£¬£¬£¬AppleµÄϵͳ״̬ҳÉϽöÏÔʾ¡°Óû§¿ÉÄÜÓöµ½´ËЧÀ͵ÄÎÊÌ⡱µÄÌáÐÑ£¬£¬£¬£¬Ã»Óиü¶àÓÐ¹ØÆäÖÐÖ¹µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Apple¹«Ë¾Ã»ÓÐÌṩÈκÎÒÔÕÏÔµ¹ÊÔ­ÓÉ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/apple/apple-icloud-outage-prevents-device-activations-access-to-data/


2¡¢GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬²âÊÔÔ±¹¤µÄ·´Ó¦


2.jpg


GoDaddyÏòÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬ÒÔ²âÊÔÔ±¹¤¶ÔÍøÂç´¹ÂڻµÄ·´Ó¦¡£¡£¡£¡£¡£¡£¡£¡£¸Ã²âÊÔÓÚ12Ô¾ÙÐУ¬£¬£¬£¬ÓʼþÉù³Æ½«Ìṩ650ÃÀÔªµÄÊ¥µ®½Ú½±½ð£¬£¬£¬£¬ÒÔ×ÊÖúÔ±¹¤Ó¦¶ÔÒòCOVID-19±¬·¢¶øµ¼Öµľ­¼ÃÎÊÌ⣬£¬£¬£¬²¢ÒªÇóËûÃÇÌîдСÎÒ˽¼ÒÐÅÏ¢±í¸ñ¡£¡£¡£¡£¡£¡£¡£¡£Õâ´Î²âÊԻԼĪ500ÃûÔ±¹¤ÖÐÕУ¬£¬£¬£¬ËûÃǽ«±»ÒªÇóÖØÐ¼ÓÈëÉç»á¹¤³ÌÇå¾²ÒâʶµÄÅàѵ¡£¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚ²âÊÔÖÐʹÓõÄÓÕ¶üºÍÄ£Äâʱ¼äµÄÑ¡Ôñ£¬£¬£¬£¬¸ÃÒªÁìÊܵ½Á˲¿·ÖÍøÂçÇå¾²ÕûÌåµÄÆ·ÆÀ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112664/security/godaddy-phishing-test-employees.html


3¡¢Ð¶ñÒâÈí¼þ¿ÉʹÓÃImgurÀ´½âÂëCobalt Strike¾ç±¾


3.jpg


жñÒâÈí¼þ¿ÉʹÓÃͼÏñÍйÜЧÀÍImgurÏÂÔØÕýµ±µÄͼÏñ£¬£¬£¬£¬À´½âÂëCobalt Strike¾ç±¾¡£¡£¡£¡£¡£¡£¡£¡£ÐµĶñÒâÈí¼þʹÓôøÓкêµÄWordÎļþ´ÓGitHubÏÂÔØPowerShell¾ç±¾£¬£¬£¬£¬¸Ã¾ç±¾½«´ÓImgurÏÂÔØÏÖʵPNGÎļþ¡£¡£¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬Ê¹ÓÃÏñInvoke-PSImageÕâÑùµÄ¹¤¾ßÀ´Ê¹ÓÃPNGÎļþÖеÄÏñËØÖµ±àÂëPowerShell¾ç±¾£¬£¬£¬£¬²¢ÌìÉúÒ»ÐÐÏÂÁîÀ´Ö´ÐÐpayload£¬£¬£¬£¬×îÖÕ»ñµÃCobalt Strike¾ç±¾¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÍƲâ´Ë¶ñÒâÈí¼þ¿ÉÄÜÓëÖ÷ÒªÕë¶ÔÖж«ÊµÌåµÄAPT×éÖ¯MuddyWaterÓйØ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/github-hosted-malware-calculates-cobalt-strike-payload-from-imgur-pic/


4¡¢ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖØ¹¤Ôâµ½¹¥»÷£¬£¬£¬£¬»ò½«µ¼ÖÂÊý¾Ýй¶


4.png


ÈÕ±¾¾ü¹¤ÆóÒµ´¨ÆéÖØ¹¤Ôâµ½¹¥»÷£¬£¬£¬£¬»ò½«µ¼ÖÂÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£¡£´¨ÆéÖØ¹¤£¨Kawasaki£©³Æ£¬£¬£¬£¬2020Äê6ÔÂ11ÈÕÓÐδ¾­ÊÚȨµÄµÚÈý·½´ÓÌ©¹úЧÀÍ´¦»á¼ûÁËÈÕ±¾µÄЧÀÍÆ÷£¬£¬£¬£¬ÔÚ·¢Ã÷¸ÃÎÊÌâºóÁ½¸öÕ¾µãÖ®¼äµÄËùÓÐͨѶ¶¼±»×èÖ¹¡£¡£¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬¸Ã¹«Ë¾ÓÖ·¢Ã÷ÁËÆäËûÍâÑóÕ¾µã£¨Ó¡¶ÈÄáÎ÷ÑÇ¡¢·ÆÂɱöºÍÃÀ¹ú£©Î´¾­ÊÚȨ»á¼ûÈÕ±¾Ð§ÀÍÆ÷µÄÇéÐΣ¬£¬£¬£¬²¢ÇжÏͨѶ¡£¡£¡£¡£¡£¡£¡£¡£´¨Æé³Æ´Ë´Î¹¥»÷ʹÓÃÁËÏȽøÊÖÒÕ¶øÃ»ÓÐÁôÏÂÈκκۼ£ºÍÖ¤¾Ý£¬£¬£¬£¬µ«¹«Ë¾Êý¾Ý»òÐíÒѾ­Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£¡£ËùÓб»ÖÕÖ¹µÄͨѶÓÚ11ÔÂ30ÈÕ»Ö¸´Õý³£¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112765/data-breach/kawasaki-heavy-industries-cyber-attack.html


5¡¢WasabiÔÆ´æ´¢Ð§ÀÍÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ


5.png


WasabiÔÆ´æ´¢Ð§ÀÍÒòDNSÆÊÎöÎÊÌâµ¼ÖÂÖÐÖ¹13¸öСʱ¡£¡£¡£¡£¡£¡£¡£¡£12ÔÂ28ÈÕÏÂÖç2:30 ESTÓû§·¢Ã÷ÎÞ·¨»á¼ûwasabisys.comÉϵĴ洢Ͱ£¬£¬£¬£¬WasabiÔÚÖÐÖ¹±¨¸æÖгÆÊÇÓÉÓÚDNSÆÊÎöÎÊÌâµ¼Ö¡£¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬¸Ãƽ̨Óû§ÉÏ´«Á˶ñÒâÈí¼þ£¬£¬£¬£¬ÆäÓòÃû³Æ×¢²áÉÌ·¢Ã÷ºóÏëҪͨ¹ýµç×ÓÓʼþ֪ͨWasabi£¬£¬£¬£¬È´°Ñ±¨¸æ×ª·¢µ½Á˹ýʧµÄµØµã£¬£¬£¬£¬Ê¹µÃWasabiδ»ñµÃ֪ͨ¡£¡£¡£¡£¡£¡£¡£¡£¶ø¸Ã×¢²áÉÌÒòδ»ñµÃ»Ø¸´¶øÔÝÍ£Á˸ÃÓò£¬£¬£¬£¬WasabiÔÚµÃÖª¸ÃÊÂÎñºóɾ³ýÁËÍйܶñÒâÈí¼þ²¢ÒªÇóÖØÐ¼¤»î¸ÃÓò£¬£¬£¬£¬Æ½Ì¨ÔÚ12ÔÂ29ÈÕÏÂÖç12:57 ESTÖÕÓÚ»ñµÃ»Ö¸´¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/wasabi-cloud-storage-service-knocked-offline-for-hosting-malware/