RapperBot»Ø¹éͨ¹ýÎïÁªÍøÉ豸DDoS¹¥»÷ÓÎÏ··þÎñÆ÷

Ðû²¼Ê±¼ä 2022-11-18
1¡¢RapperBot»Ø¹éͨ¹ýÎïÁªÍøÉ豸DDoS¹¥»÷ÓÎÏ··þÎñÆ÷


FortinetÔÚ11ÔÂ15ÈÕ³ÆÆä·¢ÏÖÁËRapperBotµÄÐÂÑù±¾£¬Ö÷ÒªÕë¶ÔÓÎÏ··þÎñÆ÷Ö´ÐÐDDoS¹¥»÷¡£¸Ã¶ñÒâÈí¼þÓÚÈ¥Äê8Ô±»·¢ÏÖ£¬ÆäʱËüʹÓÃSSH±©Á¦¹¥»÷ÔÚLinux·þÎñÆ÷ÉÏ·Ö·¢¡£Í¨¹ý×·×ÙÆä»î¶¯£¬Ñо¿ÈËÔ±·¢ÏÖRapperBot×Ô2021Äê5ÔÂÒÔÀ´Ò»Ö±ÔÚÔËÐУ¬µ«ÆäÄ¿±ê·Ç³£Ä£ºý¡£×î½üµÄ±äÌåʹÓÃÁËTelnet×ÔÎÒÁ÷´«»úÖÆ£¬Õâ¸ü½Ó½üÓÚԭʼMirai¶ñÒâÈí¼þµÄÒªÁì¡£´ËÍ⣬µ±Ç°»î¶¯µÄÄ¿±êÔ½·¢Ã÷ÏÔ£¬ÒòΪ×îбäÌåÖеÄDoSÃüÁîÊÇרΪ¹¥»÷ÍйÜÔÚÏßÓÎÏ·µÄ·þÎñÆ÷¶øÉè¼Æ¡£


https://www.fortinet.com/blog/threat-research/new-rapperbot-campaign-ddos-attacks

2¡¢Sansec³ÆÕë¶ÔMagento 2ÍøÕ¾µÄTrojanOrders¹¥»÷¼¤Ôö


¾ÝýÌå11ÔÂ16ÈÕ±¨µÀ£¬Äþ¾²¹«Ë¾Sansec·¢ÏÖTrojanOrders¹¥»÷»î¶¯´ó¹æÄ£¼¤Ôö£¬½ü40%µÄMagento 2ÍøÕ¾Ôâµ½´ËÀ๥»÷¡£´ËÍ⣬×ܽá¹ýÈ¥¼¸ÖܵĹ¥»÷ʼþ·¢ÏÖÓÐ7¸ö²îÒìµÄ¹¥»÷ÔØÌ壬ÕâÒâζ×ÅÏÖÔÚÖÁÉÙÓÐ7¸öºÚ¿ÍÍÅÌåÔÚʵÑéÖ´ÐÐTrojanOrders¹¥»÷¡£TrojanOrdersÊÇÒ»ÖÖÀûÓÃMagento 2©¶´£¨CVE-2022-24086£©µÄ¹¥»÷·½Ê½£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÓÃÀ´Ö´ÐдúÂë²¢ÔÚÍøÕ¾Éϰ²×°RAT¡£AdobeÔÚ2022Äê2ÔÂÐÞ¸´Á˸é¶´£¬µ«Ðí¶àMagentoÍøÕ¾ÈÔδ°²×°²¹¶¡¡£


https://www.bleepingcomputer.com/news/security/magento-stores-targeted-in-massive-surge-of-trojanorders-attacks/

3¡¢Mitiga·¢ÏÖÊý°Ù¸öAmazon RDSʵÀýй¶Óû§µÄPIIÊý¾Ý

11ÔÂ16ÈÕ±¨µÀ£¬MitigaµÄÐÂÑо¿ÏÔʾAmazon Relational Database Service(Amazon RDS)ÉϵÄÊý°Ù¸öÊý¾Ý¿âй¶ÁËÓû§µÄ¸öÈËÉí·ÝÐÅÏ¢¡£Ð¹Â¶Ô´ÓÚÒ»¸öÃûΪ¹«¹²RDS¿ìÕյĹ¦Ð§£¬¸Ã¹¦Ð§ÔÊÐí´´½¨Ò»¸öÔÚÔÆÖÐÔËÐеÄÕû¸öÊý¾Ý¿â»·¾³µÄ±¸·Ý£¬¶øÇÒËü¿ÉÒÔ±»ËùÓÐAWSÕË»§·ÃÎÊ¡£Ñо¿ÈËÔ±´Ó2022Äê9ÔÂ21ÈÕµ½10ÔÂ20ÈÕ·¢ÏÖÁË810¸ö¹ûÈ»µÄ¿ìÕÕ£¬ÆäÖÐÁè¼Ý250¸öÒѾ­Ì»Â¶ÁË30Ì죬Õâ±íÃ÷ËüÃǺܿÉÄܱ»ÒÅÍüÁË¡£

https://thehackernews.com/2022/11/researchers-discover-hundreds-of-amazon.html

4¡¢F5Ðû²¼Äþ¾²¸üÐÂÐÞ¸´Æä²úÎïÖеÄ2¸öÔ¶³Ì´úÂëÖ´ÐЩ¶´

¾Ý11ÔÂ16ÈÕ±¨µÀ£¬Rapid7·¢ÏÖÁËF5 BIG-IPºÍBIG-IQÖеĶà¸ö©¶´¡£ÆäÖнÏΪÑÏÖØµÄÊÇͨ¹ýiControl SOAPµÄCSRF©¶´£¨CVE-2022-41622£©£¬¿Éµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐС£ÒÔ¼°£¬Í¨¹ýפÁôÔÚÉ豸ģʽiControl RESTÖеÄRPM¹æ·¶×¢ÈëµÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2022-41800£©£¬¿ÉÓÃÀ´ÈƹýApplianceģʽÏÞÖÆ¡£Ä¿Ç°£¬F5ÒÑÐÞ¸´ÕâЩ©¶´¡£´ËÍ⣬Ñо¿ÈËÔ±»¹·¢ÏÖÁ˼¸¸öÈÆ¹ýÄþ¾²¿ØÖƵÄÒªÁ죬µ«F5²¢Î´½«Æäʶ±ðΪ¿ÉÀûÓõÄ©¶´¡£

https://securityaffairs.co/wordpress/138631/security/2-rce-f5-products.html

5¡¢Î¢ÈíÅû¶DEV-0569·Ö·¢RoyalºÍ¶à¸öpayloadµÄÐÂÒªÁì

΢ÈíÔÚ11ÔÂ17ÈÕÐû²¼³ÂË߳ƣ¬Æä½üÆÚ·¢ÏÖÁËDEV-0569·Ö·¢¶à¸öpayloadµÄ»î¶¯£¬²¢×îÖÕ°²×°ÀÕË÷Èí¼þRoyal¡£DEV-0569Ö÷ÒªÒÀ¿¿¶ñÒâ¹ã¸æºÍÖ¸Ïò¶ñÒâÈí¼þÏÂÔØ·¨Ê½µÄµöÓãÁ´½Ó½øÐзַ¢£¬ÔÚ×î½ü¼¸¸öÔÂÀ΢Èí·¢ÏÖ¸ÃÍÅ»ïµÄ·Ö·¢ÒªÁìÓÐÁ˵÷Õû£ºÔÚÄ¿±êÍøÕ¾ÉÏʹÓÃÁªÏµ±í¸ñ·Ö·¢µöÓãÁ´½Ó£¬ÔÚ¿´ÆðÀ´ºÏ·¨µÄÈí¼þÏÂÔØÍøÕ¾ºÍ×ÊÔ´¿âÉÏÍйÜαÔìµÄ°²×°Îļþ£¬ÒÔ¼°Ê¹ÓÃGoogle AdsÀ´À©Õ¹ËûÃǵĶñÒâ¹ã¸æ¼¼Êõ¡£¸Ã³ÂËß»¹¹ûÈ»ÁËDEV-0569µÄTTPÒÔ¼°×éÖ¯¿ÉÒÔ½ÓÄɵķÀÓù´ëÊ©¡£

https://www.microsoft.com/en-us/security/blog/2022/11/17/dev-0569-finds-new-ways-to-deliver-royal-ransomware-various-payloads/

6¡¢Unit 42Ðû²¼2022Äê5ÖÁ7ÔÂÍøÂçÄþ¾²Ì¬ÊƵķÖÎö³ÂËß

11ÔÂ16ÈÕ£¬Unit 42Ðû²¼ÁË2022Äê5ÖÁ7ÔÂÍøÂçÄþ¾²Ì¬ÊƵķÖÎö³ÂËß¡£³ÂËßÖ¸³ö£¬ÔÚÕâÈý¸öÔÂÖУ¬¹²×¢²áÁË5976¸öеÄCVE±àºÅ£¬ÆäÖÐ23.5%±»¹éÀàΪµ±µØÂ©¶´£¬ÆäÓà76.5%ÊÇÔ¶³Ì©¶´¡£¿çÕ¾½Å±¾Â©¶´ÈÔÊdzÂËß×î¶àµÄ©¶´£¬SQL×¢Èë©¶´Ò²ÓÐËùÔö¼Ó¡£¹¥»÷Õß¾­³£Ê¹ÓýüÆÚÅû¶µÄ©¶´£¬ÓÈÆäÊÇ2021-2022ÄêµÄ©¶´¡£°´¹¥»÷ÀàÐÍ·Ö£¬×î¶àµÄÊÇÔ¶³Ì´úÂëÖ´ÐУ¬Æä´ÎÊÇÐÅϢй¶ºÍ±éÀú¹¥»÷¡£´ó¶àÊý¹¥»÷ËÆºõ¶¼À´×ÔÃÀ¹ú£¬Æä´ÎÊǵ¹úºÍºÉÀ¼¡£

https://unit42.paloaltonetworks.com/network-security-trends-update/