VulnCheckÅû¶ӰÏì90¶àÍǫ̀MikroTik×°±¸µÄÌáȨÎó²î

Ðû²¼Ê±¼ä 2023-07-27

1¡¢VulnCheckÅû¶ӰÏì90¶àÍǫ̀MikroTik×°±¸µÄÌáȨÎó²î


VulnCheckÔÚ7ÔÂ25ÈÕÅû¶ÁËMikroTik RouterOS·ÓÉÆ÷µÄÖеÄÌáȨÎó²î£¨CVE-2023-30799£©¡£¡£¡£¡£¡£¡£¸ÃÎó²î¿É±»ÓµÓÐÖÎÀíÔ±ÕÊ»§µÄÔ¶³Ì¹¥»÷Õßͨ¹ý×°±¸µÄWinbox»òHTTP½Ó¿Ú£¬£¬ £¬£¬£¬£¬£¬£¬½«È¨ÏÞÌáÉýΪ³¬µÈÖÎÀíÔ±¡£¡£¡£¡£¡£¡£ÕâÊÇÓÉÓÚMikrotik RouterOS²Ù×÷ϵͳÎÞ·¨±ÜÃâÃÜÂëµÄ±©Á¦¹¥»÷£¬£¬ £¬£¬£¬£¬£¬£¬²¢ÇÒ»¹×Ô´øÄ¬ÈÏ"admin"Óû§¡£¡£¡£¡£¡£¡£Ô¤¼ÆÔ¼ÓÐ50ÍòºÍ90Íò¸öRouterOSÏµÍ³ÃæÁÙͨ¹ýWebºÍWinbox½Ó¿Ú±»Ê¹ÓõÄΣº¦¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½¨ÒéÓû§¾¡¿ìÓ¦ÓÃ×îиüÐÂÀ´ÐÞ¸´¸ÃÎó²î¡£¡£¡£¡£¡£¡£


https://vulncheck.com/blog/mikrotik-foisted-revisited


2¡¢ºÚ¿ÍÔÚ°µÍø³öÊÛÉù³Æ´Ó°£¼°ÎÀÉú²¿ÇÔÈ¡µÄ200ÍòÌõ¼Í¼


ýÌå7ÔÂ25ÈÕ±¨µÀ³Æ£¬£¬ £¬£¬£¬£¬£¬£¬Ä³ºÚ¿ÍÍÅ»ïÉù³Æ´Ó°£¼°ÎÀÉúºÍÉú³Ý²¿·ÖÇÔÈ¡ÁËÁ½°ÙÍòÌõ¼Í¼¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ7ÔÂ25ÈÕÔÚºÚ¿ÍÂÛ̳Pop¨¹rlerÉÏ·¢Ã÷ÁËÕâÒ»Ìû×Ó¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬ £¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨»¼ÕßµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬£¬Éæ¼°ÐÕÃû¡¢ID¡¢µç»°¡¢µØµã¡¢ÊÖÊõ·ÖÀàÏêÇé¡¢Õï¶ÏºÍÖÎÁÆÏêϸÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬£¬£¬ºÚ¿Í»¹ÌṩÁË1000È˵ÄÊý¾Ý×÷ΪÑù±¾£¬£¬ £¬£¬£¬£¬£¬£¬À´Ö§³ÖÕâһ˵·¨¡£¡£¡£¡£¡£¡£ÕâÃûºÚ¿Í»¹ÔÚÉÏÖܳöÊÛÁËÊôÓÚÓ¡¶ÈÄáÎ÷ÑÇʵÌåµÄÊý¾Ý¿â¡£¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/hacker-stolen-medical-records/


3¡¢SentinelOne·¢Ã÷Mac¶ñÒâÈí¼þRealstµÄ´ó¹æÄ£¹¥»÷»î¶¯


7ÔÂ25ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬SentinelOne³ÆÆä·¢Ã÷ÁËMac¶ñÒâÈí¼þRealstµÄ´ó¹æÄ£¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÆÊÎöÁË59¸ö RealstÑù±¾£¬£¬ £¬£¬£¬£¬£¬£¬·¢Ã÷һЩÑù±¾ÒѾ­Õë¶ÔApple¼´½«Ðû²¼µÄ²Ù×÷ϵͳ°æ±¾macOS 14 Sonoma¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þͨ¹ýαÔìµÄÓÎÏ·ÍøÕ¾·Ö·¢£¬£¬ £¬£¬£¬£¬£¬£¬ÒÔPKG×°ÖóÌÐò»òDMG´ÅÅÌÎļþµÄÐÎʽÕë¶ÔMac×°±¸£¬£¬ £¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨¶ñÒâMach-OÎļþ£¬£¬ £¬£¬£¬£¬£¬£¬µ«Ã»ÓÐÕæÕýµÄÓÎÏ·»òÆäËüÓÕ¶üÈí¼þ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬£¬£¬ÓÉÓÚÕâЩÓÎÏ·Õë¶ÔµÄÊǼÓÃÜÇ®±ÒÓû§£¬£¬ £¬£¬£¬£¬£¬£¬Òò´ËÆäÖ÷ҪĿµÄ¿ÉÄÜÊÇÇÔÈ¡¼ÓÃÜÇ®°ü¼°ÆäÄÚµÄ×ʽ𡣡£¡£¡£¡£¡£


https://www.sentinelone.com/blog/apple-crimeware-massive-rust-infostealer-campaign-aiming-for-macos-sonoma-ahead-of-public-release/


4¡¢FortinetÔÚMicrosoftÐÂÎÅÐÐÁÐЧÀÍÖз¢Ã÷¶à¸öÎó²î


FortinetÓÚ7ÔÂ24ÈÕ³ÆÆäÔÚMicrosoftÐÂÎÅÐÐÁÐ(MSMQ)ЧÀÍÖз¢Ã÷Á˶à¸öÎó²î£¬£¬ £¬£¬£¬£¬£¬£¬¿ÉÄܻᵼÖÂÔ¶³Ì´úÂëÖ´ÐкÍDoS¹¥»÷¡£¡£¡£¡£¡£¡£ÆäÖаüÀ¨ÔÚÐÂÎÅÍ·ÆÊÎö³ÌÐòÖлá¼ûijЩҪº¦º¯Êý֮ǰδÑéÖ¤µ¼ÖµÄÔ½½ç¶ÁÈ¡Îó²î£¬£¬ £¬£¬£¬£¬£¬£¬Î´ÑéÖ¤í§Òâ¾ÞϸµÄÐÂÎÅÍ·µ¼ÖµÄÔ½½çдÈëÎó²î£¬£¬ £¬£¬£¬£¬£¬£¬ÒÔ¼°CompoundMessageͷδÄÜ¶ÔÆäÊý¾Ý½á¹¹¾ÙÐÐ׼ȷÐÔ¼ì²éµ¼ÖµÄÔ½½çдÈëÎó²î¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬£¬£¬Î¢ÈíÒÑÔÚ4ÔºÍ7ÔµÄÇå¾²¸üÐÂÐÞ¸´ÁËÕâЩÎó²î¡£¡£¡£¡£¡£¡£


https://www.fortinet.com/blog/threat-research/microsoft-message-queuing-service-vulnerabilities


5¡¢Èí¼þ¹«Ë¾OrtivusÔâµ½¹¥»÷Ó°ÏìÓ¢¹ú¾È»¤³µÐ§ÀÍ»ú¹¹


¾Ý7ÔÂ26ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬£¬£¬ÈðµäÈí¼þ¹«Ë¾OrtivusÔâµ½ÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬£¬£¬µ¼ÖÂÖÁÉÙÁ½¼ÒÓ¢¹ú¾È»¤³µÐ§ÀÍ»ú¹¹ÎÞ·¨»á¼ûµç×Ó²¡Àú¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÓÚ7ÔÂ18ÈÕÍíÉÏ£¬£¬ £¬£¬£¬£¬£¬£¬Ó°ÏìÁËÆäÍйÜÊý¾ÝÖÐÐÄÇéÐÎÖеÄÓ¢¹ú¿Í»§ÏµÍ³£¬£¬ £¬£¬£¬£¬£¬£¬µ¼Öµç×Ó²¡ÀúÎÞ·¨Ê¹Ó㬣¬ £¬£¬£¬£¬£¬£¬ÏÖÔÚ±»ÆÈʹÓÃÊÖ¶¯ÏµÍ³¾ÙÐд¦Öóͷ£¡£¡£¡£¡£¡£¡£Ortivus³Æ£¬£¬ £¬£¬£¬£¬£¬£¬Ì滻ϵͳÔÚ¹¥»÷±¬·¢ºó24СʱÄÚ¾Í×¼±¸ºÃÁË£¬£¬ £¬£¬£¬£¬£¬£¬Ã»Óпͻ§ÐÅϢй¶¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐ͸¶ÊÜÓ°Ïì¾È»¤³µÐ§À͵ÄÃû³Æ£¬£¬ £¬£¬£¬£¬£¬£¬µ«¾Ý͸¶£¬£¬ £¬£¬£¬£¬£¬£¬»®·ÖÊÇSouth Western Ambulance Service TrustºÍSouth Central Ambulance Service Trust£¬£¬ £¬£¬£¬£¬£¬£¬ËüÃÇΪԼ1200Íò³£×¡Éú³ÝÌṩЧÀÍ¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/148847/cyber-crime/ambulance-services-cyberattack.html


6¡¢SygniaÏêÊöCasbaneiroÖ÷ÒªÕë¶ÔÄÏÃÀºÍ±±ÃÀµÄ¹¥»÷»î¶¯


7ÔÂ25ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬Sygnia¹ûÕæÁËÒøÐÐľÂíCasbaneiro¹¥»÷»î¶¯µÄÏêÇé¡£¡£¡£¡£¡£¡£CasbaneiroÓÚ2018Ê״α»·¢Ã÷£¬£¬ £¬£¬£¬£¬£¬£¬Ö÷ÒªÓÃÓÚ¹¥»÷À­¶¡ÃÀÖÞ½ðÈÚÐÐÒµµÄ×éÖ¯¡£¡£¡£¡£¡£¡£ÔÚ×î½üÊӲ쵽µÄ¹¥»÷ÖУ¬£¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÊÇÓÉǶÈëHTMLÎļþÁ´½ÓµÄÓã²æÊ½´¹ÂÚÓʼþÆô¶¯µÄ£¬£¬ £¬£¬£¬£¬£¬£¬»áÖØ¶¨ÏòÄ¿µÄ²¢ÏÂÔØRARÎļþ¡£¡£¡£¡£¡£¡£ÁíÒ»¸öת±äÉæ¼°Ê¹ÓÃfodhelper.exeÀ´ÊµÏÖUACÈÆ¹ý£¬£¬ £¬£¬£¬£¬£¬£¬²¢»ñµÃÍêÕûµÄÅÌËã»úÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¡£¶ÔÉÏ´«µ½VirusTotalµÄÑù±¾¾ÙÐÐÆÊÎö£¬£¬ £¬£¬£¬£¬£¬£¬·¢Ã÷ËüÃÇÕýÔÚÏòÄÏÃÀºÍ±±ÃÀ¼¯ÖС£¡£¡£¡£¡£¡£


https://blog.sygnia.co/breaking-down-casbaneiro-infection-chain-part2