ZyxelÐÞ¸´NASÖеÄRCEÎó²îCVE-2022-34747
Ðû²¼Ê±¼ä 2022-09-08
9ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂç×°±¸ÖÆÔìÉÌZyxel³ÆÒ»¸öеÄRCEÎó²î»áÓ°ÏìÆä²úÆ·NAS326¡¢NAS540ºÍNAS542¡£¡£¡£¡£¡£¡£¡£Í¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬ÕâÊÇÔÚZyxel NAS²úÆ·µÄÌØ¶¨¶þ½øÖÆÎļþÖз¢Ã÷µÄÒ»¸öÃûÌÃ×Ö·û´®Îó²î£¬£¬£¬£¬£¬£¬¿É±»ÓÃÀ´Í¨¹ýÌØÖÆµÄUDPÊý¾Ý°üʵÏÖδ¾ÊÚȨµÄÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2022-34747£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î¿ÉÓÃÓÚÇÔÈ¡Êý¾Ý¡¢É¾³ýÊý¾Ý»òÔÚ̻¶ÓÚ»¥ÁªÍøÉϵÄNAS×°±¸ÖÐ×°ÖÃÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬¹©Ó¦ÉÌÒѾÒԹ̼þ¸üеÄÐÎʽÐû²¼ÁËÊÜÓ°Ïì×°±¸µÄÇå¾²¸üС£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/zyxel-releases-new-nas-firmware-to-fix-critical-rce-vulnerability/
2¡¢North FaceÔâµ½´ó¹æÄ£µÄײ¿â¹¥»÷Ó°ÏìÔ¼20Íò¸öÕË»§
¾ÝýÌå9ÔÂ7Èճƣ¬£¬£¬£¬£¬£¬»§Íâ´ò°çÆ·ÅÆThe North FaceÔâµ½ÁË´ó¹æÄ£×²¿â¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂthenorthface.comÍøÕ¾ÉϵÄ194905¸öÕË»§±»ºÚ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯×îÏÈÓÚ2022Äê7ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬µ«ÍøÕ¾µÄÖÎÀíÔ±ÔÚ8ÔÂ11Èղżì²âµ½Òì³£»£»£»£»£»î¶¯£¬£¬£¬£¬£¬£¬²¢ÓÚ8ÔÂ19ÈÕ×èÖ¹Á˹¥»÷¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÕýÔÚÏòÊÜÓ°ÏìµÄ¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬£¬²¢ÖØÖÃÁËËùÓÐÓû§ÃÜÂë¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬ÕâÊÇThe North FaceµÚ¶þ´ÎÔ⵽ײ¿â¹¥»÷ºóÖØÖÃÃÜÂ룬£¬£¬£¬£¬£¬ÉÏÒ»´Î±¬·¢ÔÚ2020Äê11Ô¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/200-000-north-face-accounts-hacked-in-credential-stuffing-attack/
3¡¢AT&TÅû¶ͨ¹ý¶à½×¶ÎѬȾÁ´·Ö·¢Èƹý¼ì²âµÄShikitega
AT&T Alien LabsÓÚ9ÔÂ6ÈÕÅû¶ÁËеÄLinux¶ñÒâÈí¼þShikitega¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃϵͳÎó²î»ñÈ¡×î¸ßȨÏÞ£¬£¬£¬£¬£¬£¬Í¨¹ýcrontabÔÚÖ÷»úÉϼá³Ö³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬²¢×îÖÕÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐмÓÃܿ󹤡£¡£¡£¡£¡£¡£¡£ShikitegaºÜÊÇÒþ²Ø£¬£¬£¬£¬£¬£¬Ê¹Óöà̬±àÂëÆ÷ÈÆ¹ýɱ¶¾ÒýÇæµÄ¼ì²â£¬£¬£¬£¬£¬£¬ÕâʹµÃ¾²Ì¬¡¢»ùÓÚÊðÃûµÄ¼ì²âʧЧ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÆðԴѬȾҪÁ죬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þʹÓöà½×¶ÎѬȾÁ´£¬£¬£¬£¬£¬£¬ÆäÖÐÿһ²ã½öת´ï¼¸°Ù×Ö½Ú£¬£¬£¬£¬£¬£¬¼¤»îÒ»¸ö¼òÆÓÄ£¿£¿£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬È»ºóÒÆ¶¯µ½ÏÂÒ»¸öÄ£¿£¿£¿£¿£¿£¿£¿£¿é¡£¡£¡£¡£¡£¡£¡£
https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux
4¡¢ESET½üÆÚ·¢Ã÷Ö÷ÒªÕë¶ÔÑÇÖÞÕþ¸®»ú¹¹ºÍ´óÐ͹«Ë¾µÄWorok
9ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ESETÑо¿Ö°Ô±³ÆÆä×î½ü·¢Ã÷ÁËÖ÷ÒªÕë¶ÔÑÇÖ޵ĴóÐ͹«Ë¾ºÍµØ·½Õþ¸®µÄÕë¶ÔÐÔ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÓëÒ»¸öеÄÌØ¹¤×éÖ¯WorokÓйأ¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÖÁÉÙ×Ô2020ÄêÒÔÀ´Ò»Ö±´¦Óڻ״̬¡£¡£¡£¡£¡£¡£¡£WorokµÄ¹¤¾ß¼¯°üÀ¨Ò»¸öC++¼ÓÔØ³ÌÐòCLRLoad¡¢Ò»¸öPowerShellºóÃÅPowHeartBeatºÍÒ»¸öC#¼ÓÔØ³ÌÐòPNGLoad£¬£¬£¬£¬£¬£¬ËüʹÓÃÒþдÊõ´ÓPNGÎļþÖÐÌáÈ¡Òþ²ØµÄ¶ñÒâpayload¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬WorokÓë±»×·×ÙΪTA428µÄÍÅ»ïÔÚ¹¤¾ß¡¢»î¶¯Ê±¼äºÍÄ¿µÄÐÐÒµ·½Ãæ±£´æÖصþ¡£¡£¡£¡£¡£¡£¡£
https://www.welivesecurity.com/2022/09/06/worok-big-picture/
5¡¢TA505ÍÅ»ïʹÓÃTeslaGunÃæ°åÀ´ÖÎÀíÆäServHelperºóÃÅ
PRODAFTÔÚ9ÔÂ6ÈÕÐû²¼Á˹ØÓÚTA505ÍÅ»ïTeslaGunµÄÉî¶ÈÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£TA505ÓÖÃûEvil Corp£¬£¬£¬£¬£¬£¬×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÁãÊÛÐÐÒµºÍÒøÐеȡ£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃTeslaGun¿ØÖÆÃæ°åÀ´ÖÎÀíServHelperÖ²Èë³ÌÐò£¬£¬£¬£¬£¬£¬×÷ΪC2¿ò¼ÜÀ´¿ØÖƱ»Ñ¬È¾µÄ×°±¸¡£¡£¡£¡£¡£¡£¡£³ýÁËʹÓÃÃæ°åÍ⣬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃÔ¶³Ì×ÀÃæÐÒ鹤¾ßͨ¹ýRDPËíµÀÊÖ¶¯ÅþÁ¬µ½Ä¿µÄϵͳ¡£¡£¡£¡£¡£¡£¡£PRODAFTµÄÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬×Ô2020Äê7ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÒѹ¥»÷ÁËÖÁÉÙ8160¸öÄ¿µÄ£¬£¬£¬£¬£¬£¬ÆäÖдó´ó¶¼Ä¿µÄλÓÚÃÀ¹ú£¨3667¸ö£©¡£¡£¡£¡£¡£¡£¡£
https://www.prodaft.com/resource/detail/ta505-ta505-groups-tesla-gun-depth-analysis
6¡¢Check PointÐû²¼Õë¶Ô·ÇÖÞ´óÐͽðÈÚ»ú¹¹µÄ¹¥»÷µÄ±¨¸æ
9ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬Check Point ResearchÕ¹ÏÖÁËÕë¶Ô·ÇÖ޵Ĺ¥»÷»î¶¯DangerousSavanna¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÔÚÒÑÍùµÄÁ½ÄêÖÐÒ»Ö±Õë¶Ô·ÇÖÞ·¨ÓïÇøµÄ¶à¸öÖ÷ÒªµÄ½ðÈÚЧÀ͹«Ë¾¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÓã²æÊ½´¹ÂÚ¹¥»÷×÷Ϊ³õʼѬȾҪÁ죬£¬£¬£¬£¬£¬Ïò¿ÆÌصÏÍß¡¢Ä¦Âå¸ç¡¢¿¦Âó¡¡¢ÈûÄÚ¼Ó¶ûºÍ¶à¸çµÄÔ±¹¤·¢ËͶñÒâÓʼþ¡£¡£¡£¡£¡£¡£¡£ÕâЩÓʼþµÄ¸½¼þҪôÊÇ´øÓкêµÄWordÎĵµ£¬£¬£¬£¬£¬£¬ÒªÃ´ÊÇ´øÓÐÔ¶³ÌÄ£°åµÄÎĵµ£¬£¬£¬£¬£¬£¬»òÕßÊÇÓÕʹĿµÄÏÂÔØ²¢ÊÖ¶¯Ö´ÐÐÏÂÒ»½×¶ÎµÄPDFÎĵµ¡£¡£¡£¡£¡£¡£¡£ËùÓÐÎĵµ£¬£¬£¬£¬£¬£¬ÎÞÂÛÊÇMS OfficeÕÕ¾ÉPDF£¬£¬£¬£¬£¬£¬¶¼ÊÇÓ÷¨ÓïдµÄ£¬£¬£¬£¬£¬£¬²¢ÇÒʹÓÃÀàËÆµÄÔªÊý¾Ý¡£¡£¡£¡£¡£¡£¡£
https://blog.checkpoint.com/2022/09/06/in-the-mighty-savana-check-point-research-reveals-a-2-year-campaign-targeting-large-financial-institutions-in-french-speaking-african-countries/


¾©¹«Íø°²±¸11010802024551ºÅ