CloudflareÈÕÖ¾·þÎñÑÏÖØÖжÏ £¬³¬°ëÊýÈÕÖ¾Êý¾ÝÓÀ¾Ã¶ªÊ§

Ðû²¼Ê±¼ä 2024-11-28

1. CloudflareÈÕÖ¾·þÎñÑÏÖØÖжÏ £¬³¬°ëÊýÈÕÖ¾Êý¾ÝÓÀ¾Ã¶ªÊ§


11ÔÂ27ÈÕ £¬»¥ÁªÍø»ù´¡ÉèÊ©¾ÞÍ·CloudflareÔÚ11ÔÂ14ÈÕÔâÓöÁËÒ»´ÎÑÏÖصķþÎñÖжÏ £¬µ¼ÖÂÁè¼ÝÒ»°ëµÄÈÕÖ¾Êý¾ÝÓÀ¾Ã¶ªÊ§¡£´Ë´ÎʹÊÔ´ÓÚÒ»´ÎÈí¼þ¸üзºÆð¹ÊÕÏ £¬Ê¹CloudflareµÄÈÕÖ¾·þÎṉ̃»¾3.5Сʱ £¬ÎÞ·¨Îª¿Í»§ÌṩҪº¦Êý¾Ý¡£ÈÕÖ¾·þÎñ¶ÔÍøÂçÔËÓªÖÁ¹ØÖØÒª £¬Äܹ»×ÊÖúÆóÒµ·ÖÎöÁ÷Á¿Ä£Ê½¡¢½â¾öÎÊÌâ²¢¼ì²â¶ñÒâ»î¶¯¡£¶øCloudflareµÄÈÕÖ¾·þÎñÒÀÀµÃûΪLogpushµÄ¹¤¾ßÀ´´¦Öò¢Í¨±¨´óÁ¿Êý¾Ý¡£²»ÐÒµÄÊÇ £¬µ±ÈÕµÄLogpush¸üÐÂÖдæÔÚÑÏÖØ´íÎó £¬µ¼ÖÂÊÕ¼¯µ½µÄÈÕ־δ±»Õýȷת·¢²¢×îÖÕ±»ÓÀ¾Ãɾ³ý¡£CloudflareÔÚ³ÂËßÖÐÖ¸³ö £¬´íÎóÅäÖõ¼ÖÂÁËϵͳµÄ¼¶Áª¹ýÔØ £¬Èç¹ûÄܹ»ÕýÈ·ÅäÖà £¬¼´¿ÉÖÆÖ¹ÈÕÖ¾¶ªÊ§¡£¾¡¹Ü¹¤³ÌʦѸËÙ·¢ÏÖÎÊÌâ²¢»Ø¹öÁ˸üР£¬µ«´Ë¾ÙÒý·¢ÁËÁ¬Ëø¹ÊÕÏ £¬´óÁ¿ÈÕÖ¾Êý¾ÝÓ¿Èëϵͳ £¬°üÂÞδÅäÖÃLogpushµÄÓû§Êý¾Ý £¬¼Ó¾çÁËÎÊÌâ¡£CloudflareÒѶԴ˴ÎʼþºÍÊý¾Ý¶ªÊ§ÖÂǸ £¬²¢ÔÊÐíÖƶ¨Ô¤·À´ëÊ©ÖÆÖ¹ÀàËÆʼþÔٴη¢Éú £¬µ«Ä¿Ç°ÕâЩ´ëÊ©ÈÔÔÚÖƶ¨ÖС£


https://securityonline.info/cloudflare-logs-suffer-critical-failure-losing-55-of-user-data/


2. ÐÂÐÍÐÅÓÿ¨µÁË¢¶ñÒâÈí¼þ¹¥»÷MagentoÍøÕ¾


11ÔÂ28ÈÕ £¬½üÆÚ £¬Ò»ÖÖÐÂÐÍÐÅÓÿ¨µÁË¢¶ñÒâÈí¼þÕë¶Ô Magento µç×ÓÉÌÎñÍøÕ¾Ìᳫ¹¥»÷ £¬¸Ã¶ñÒâÈí¼þÄÜÔÚ½áÕËÒ³Ã涯̬ÇÔÈ¡¸¶¿îÐÅÏ¢¡£ÕâÒ»·¢ÏÖÓÉÍøÂçÄþ¾²¹«Ë¾ Sucuri µÄÑо¿ÈËÔ± Weston Henry ÔÚºÚÉ«ÐÇÆÚÎåǰϦ½Ò¶¡£¶ñÒâÈí¼þÒÔ JavaScript ×¢ÈëÐÎʽ´æÔÚ £¬¾ßÓжà¸ö±äÌå £¬Í¨¹ý´´½¨Ðé¼ÙÐÅÓÿ¨±íµ¥»òÖ±½ÓÌáÈ¡Ö§¸¶×Ö¶ÎÊý¾ÝÁ½ÖÖ·½Ê½ÇÔÈ¡ÐÅÏ¢¡£Æ䶯̬ҪÁìºÍ¼ÓÃÜ»úÖÆÔö¼ÓÁ˼ì²âÄѶÈ £¬Êý¾Ý±»¼ÓÃܺóй¶ÖÁ¹¥»÷Õß¿ØÖƵÄÔ¶³Ì·þÎñÆ÷¡£Magento ÍøÕ¾Òò¹ã·ºÊ¹ÓÃÇÒ´¦ÖÃÃô¸Ð¿Í»§Êý¾Ý¶ø³ÉΪÍøÂç·¸×ï·Ö×ÓÄ¿±ê¡£´Ë´Î¹¥»÷ÖÐ £¬¶ñÒâ½Å±¾±»Òþ²ØÔÚ XML ÎļþµÄÌض¨Ö¸ÁîÄÚ £¬ÄÚÈݱ»»ìÏýÒÔÖÆÖ¹±»·¢ÏÖ £¬½öÔÚ°üÂÞ¡°checkout¡±¶ø²»º¬¡°cart¡±µÄ URL Ò³ÃæÉϼ¤»î £¬ÒÔÌáÈ¡ÐÅÓÿ¨ÐÅÏ¢¡£Ëæºó £¬¸Ã¶ñÒâÈí¼þ»¹Í¨¹ý Magento API ÊÕ¼¯Óû§µÄÆäËûÊý¾Ý¡£¹¥»÷ÕßʹÓöàÖÖ·´¼ì²â¼¼ÊõÒþ²Ø»î¶¯ £¬°üÂÞ½«Êý¾Ý¼ÓÃÜ¡¢±àÂë £¬²¢Í¨¹ýÐű꼼ÊõÒþÃØ´«ÊäÖÁÔ¶³Ì·þÎñÆ÷¡£Îª±£»¤µç×ÓÉÌÎñÍøÕ¾ÃâÊÜ´ËÀ๥»÷ £¬Sucuri¸ø³öÁËÏà¹Ø½¨Òé¡£


https://www.darkreading.com/application-security/sneaky-skimmer-malware-magento-sites-black-friday


3. »ô²©¿ÏÊÐÔâÀÕË÷Èí¼þ¹¥»÷ £¬Õþ¸®°ì¹«Êҹرղ¢Ô¤¾¯·þÎñÖжÏ


11ÔÂ28ÈÕ £¬»ô²©¿ÏÊÐÔÚ27ÈÕÁ賿ÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷ £¬µ¼ÖÂÕþ¸®°ì¹«ÊÒ±»ÆȹرÕ £¬²¢Òý·¢ÁËһϵÁзþÎñºÍ»î¶¯µÄÖжϡ£¹ÙÔ±ÃÇѸËÙͨ¹ýÊÐÕþ¸®ÍøÕ¾ºÍÉ罻ýÌåÏòµ±µØ¾ÓÃñ·¢³ö¾¯¸æ £¬Ö¸³ö¸Ð¶÷½Ú¼ÙÆÚǰϦ½«·ºÆðÍ£µçºÍ·þÎñÖжϵÄÇé¿ö¡£ÊÐÕþÌü¡¢ÊÐÕþ·¨ÔººÍ½ÖµÀÇåɨÊÂÇ鱻ȡÏû £¬µ«Í£³µÖ´·¨ÊÂÇéÈÔÔÚ¼ÌÐø¡£¾¡¹ÜÈç´Ë £¬À¬»øÊÕ¼¯ºÍÓéÀֻÈÔ°´¼Æ»®½øÐС£»ô²©¿Ï¾¯²ì¾ÖÕýÔÚÓëÊÐÕþ¸®ºÍIT²¿ÃźÏ×÷ £¬ÊÓ²ì´Ë´ÎÏ®»÷ʼþ £¬²¢Ñ°ÕÒ×î¼ÑµÄÄþ¾²»Ö¸´·þÎñÒªÁ졣ĿǰÉÐδÓÐÈκÎÀÕË÷Èí¼þÍÅ»ïÈϿɶԴ˴ι¥»÷ÂôÁ¦¡£»ô²©¿ÏÊÐ×÷ΪÐÂÔóÎ÷ÖݵÄÒ»¸öÖØÒª¶¼ÊÐ £¬½üÄêÀ´¸ÃÖÝÒÑÓжàËù»ú¹¹ÔâÊÜÀÕË÷Èí¼þ¹¥»÷ £¬°üÂÞÐÂÔóÎ÷¶¼ÊдóѧÔÚ7ÔÂÔâµ½µÄRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷¡£


https://therecord.media/hoboken-closes-city-hall-ransomware


4. GodLoader¶ñÒâÈí¼þÀûÓÃGodotÓÎÏ·ÒýÇæÌӱܼì²âѬȾÉÏÍòϵͳ


11ÔÂ27ÈÕ £¬ºÚ¿ÍÀûÓÃеÄGodLoader¶ñÒâÈí¼þ £¬Í¨¹ý¹ã·ºÊ¹ÓõÄGodotÓÎÏ·ÒýÇæµÄ¹¦Ð§À´Ìӱܼì²âϵͳ £¬²¢Ôڶ̶ÌÈý¸öÔÂÄÚѬȾÁËÁè¼Ý17,000¸öϵͳ¡£¸Ã¶ñÒâÈí¼þÄܹ»¹¥»÷ËùÓÐÖ÷Ҫƽ̨µÄÓÎÏ·Íæ¼Ò £¬²¢ÀûÓÃGodotµÄÁé»îÐÔºÍGDScript½Å±¾ÓïÑÔ¹¦Ð§Ö´ÐÐÈÎÒâ´úÂë¡£Ò»µ©¼ÓÔØ £¬¶ñÒâÎļþ¾Í»áÔÚÊܺ¦ÕßÉ豸ÉÏ´¥·¢¶ñÒâ´úÂë £¬Ê¹¹¥»÷ÕßÄܹ»ÇÔȡƾ¾Ý»òÏÂÔØÆäËûÓÐЧ¸ºÔØ £¬ÈçXMRig¼ÓÃÜÍÚ¿ó·¨Ê½¡£¹¥»÷Õßͨ¹ýStargazers Ghost NetworkÁ÷´«GodLoader £¬ÕâÊÇÒ»ÖÖ¶ñÒâÈí¼þ·Ö·¢¼´·þÎñ£¨DaaS£© £¬ÀûÓÿ´ËƺϷ¨µÄGitHub´æ´¢¿âÑÚ¸ÇÆä»î¶¯¡£ÔÚÕû¸ö¹¥»÷»î¶¯ÖÐ £¬Check Point¼ì²âµ½Á˶ನÕë¶Ô¿ª·¢ÈËÔ±ºÍÓÎÏ·Íæ¼ÒµÄ¶ÀÁ¢¹¥»÷¡£ËäȻֻ·¢ÏÖÁËÕë¶ÔWindowsϵͳµÄGodLoaderÑù±¾ £¬µ«Ñо¿ÈËÔ±»¹¿ª·¢ÁËGDScript¿´·¨Ñé֤©¶´´úÂë £¬Õ¹Ê¾Á˸öñÒâÈí¼þ¿ÉÒÔÇáËɹ¥»÷LinuxºÍmacOSϵͳ¡£Godot Engineά»¤ÕßÌåÏÖ £¬¸Ã©¶´²¢·ÇGodotËùÌØÓÐ £¬ÃãÀøÈËÃÇÖ»Ö´ÐÐÀ´×Ô¿ÉÐÅÀ´Ô´µÄÈí¼þ¡£


https://www.bleepingcomputer.com/news/security/new-godloader-malware-infects-thousands-of-gamers-using-godot-scripts/


5. ProjectSendÉí·ÝÑé֤©¶´Ö·þÎñÆ÷ÃæÁÙÔ¶³Ì·ÃÎÊÍþв


11ÔÂ27ÈÕ £¬ÍþвÐÐΪÕßÕýÔÚÀûÓÃProjectSendÖеÄÑÏÖØÉí·ÝÑéÖ¤Èƹý©¶´£¨CVE-2024-11680£©À´»ñÈ¡·þÎñÆ÷µÄÔ¶³Ì·ÃÎÊȨÏÞ¡£¸Ã©¶´Ó°ÏìProjectSend r1720֮ǰµÄ°æ±¾ £¬ÔÊÐí¹¥»÷Õßͨ¹ý·¢ËÍÌØÖÆHTTPÇëÇó¸ü¸ÄÓ¦Ó÷¨Ê½ÅäÖ᣾¡¹Ü¸Ã©¶´ÒÑÓÚ2023Äê5ÔÂÐÞ¸´ £¬µ«Ö±µ½×î½ü²Å±»·ÖÅäCVE±àºÅ £¬µ¼ÖÂÓû§Î´¼°Ê±¸üС£¾ÝVulnCheck³Æ £¬99%µÄProjectSendʵÀýÈÔÔÚÔËÐдæÔÚ©¶´µÄ°æ±¾¡£ProjectSendÊÇÒ»¸öÁ÷ÐеĿªÔ´Îļþ¹²ÏíÍøÂçÓ¦Ó÷¨Ê½ £¬±»Ðí¶à×éÖ¯ÓÃÓÚÄþ¾²¡¢Ë½ÃܵÄÎļþ´«Êä¡£Censys³ÂËß³Æ £¬Ô¼ÓÐ4000¸öÔÚÏßʵÀý £¬ÆäÖдó¶àÊý´æÔÚ©¶´¡£×Ô2024Äê9ÔÂMetasploitºÍNucleiÐû²¼¹ûȻ©¶´ÀûÓÃÒÔÀ´ £¬¹¥»÷»î¶¯ÓÐËùÔö¼Ó¡£VulnCheck·¢ÏÖ £¬¹¥»÷Õß²»½öÀûÓ鶴»ñȡδ¾­ÊÚȨµÄ·ÃÎÊ £¬»¹¸ü¸ÄϵͳÉèÖᢲ¿ÊðwebshellÒÔ¿ØÖÆÊÜѬȾ·þÎñÆ÷¡£GreyNoiseÁгöÁËÓë´Ë»î¶¯Ïà¹ØµÄ121¸öIP £¬±íÃ÷ÕâÊÇÒ»´Î¹ã·ºÊµÑé¡£VulnCheck¾¯¸æ³Æ £¬Webshell´æ´¢ÔÚÌض¨Ä¿Â¼ÖÐ £¬¿ÉÖ±½Óͨ¹ýÍøÂç·þÎñÆ÷·ÃÎÊ £¬±íÃ÷´æÔÚÖ÷¶¯¹¥»÷¡£Ñо¿ÈËԱǿµ÷ £¬¾¡¿ìÉý¼¶µ½ProjectSend°æ±¾r1750ÖÁ¹ØÖØÒª £¬ÒÔ·À·¶¹ã·ºÁ÷´«µÄ¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-projectsend-flaw-to-backdoor-exposed-servers/


6. SL Data ServicesÊý¾Ý¿âÔâй¶ £¬60ÓàÍòÃô¸ÐÎļþÆعâ


11ÔÂ27ÈÕ £¬¾ÝÄþ¾²Ñо¿ÈËÔ±±¨µÀ £¬Êý¾Ý¾­¼Í¹«Ë¾SL Data ServicesµÄÒ»¸öδÊÜÃÜÂë±£»¤µÄAmazon S3´æ´¢Í°ÖÐ £¬Ì»Â¶ÁËÁè¼Ý600,000¸öÃô¸ÐÎļþ £¬°üÂÞÊýǧÈ˵ķ¸×ïÀúÊ·¡¢Åä¾°ÊӲ졢³µÁ¾ºÍ¹¤Òµ¼Ç¼µÈ¸öÈËÐÅÏ¢¡£ÕâЩÎļþ×ܾÞϸΪ713.1 GB £¬ÇÒδ¼ÓÃÜ¡£ÐÅÏ¢Äþ¾²×¨¼ÒJeremiah FowlerÔÚ10Ô·ݷ¢ÏÖ´ËÎÊÌâºó £¬¶à´Îͨ¹ýµç»°ºÍµç×ÓÓʼþÏòÊý¾ÝÊÕ¼¯¹«Ë¾³ÂËß £¬µ«Î´ÊÕµ½»Ø¸´¡£¾¡¹Ü×îÖÕ¸ÃÐÅÏ¢·þÎñÌṩÉ̹رÕÁËS3´æ´¢Í° £¬µ«ÒÑ̻¶µÄÐÅÏ¢¿ÉÄܻᱻÓÃÓÚÍøÂçµöÓãºÍÉç»á¹¤³Ì¹¥»÷µÈ¶ñÒâÐÐΪ¡£SL Data ServicesÉù³ÆÌṩ¹¤Òµ³ÂËߵȷþÎñ £¬µ«Fowler·¢Ïָù«Ë¾ËƺõÔËÓª×ÅÖÁÉÙ16¸ö²îÒìµÄÍøÕ¾ £¬Ìṩ°üÂÞ·¸×ï¼Ç¼¼ì²é¡¢»ú¶¯³µ¹ÜÀí²¿ÃżÇ¼µÈһϵÁÐÊý¾Ý¡£Ëû½¨Òé×é֯ʹÓÃËæ»úÇÒÉ¢ÁеÄΨһ±êʶ·ûÃüÃûÎļþ £¬²¢¼à¿Ø·ÃÎÊÈÕÖ¾ÒÔʶ±ðÒ쳣ģʽ £¬Í¬Ê±Ê¹ÓÃÃÜÂëºÍ¼ÓÃܱ£»¤Ãô¸ÐÊý¾Ý¡£


https://www.theregister.com/2024/11/27/600k_sensitive_files_exposed/