CloudflareÈÕÖ¾·þÎñÑϳÁÖÐ¶Ï £¬³¬°ëÊýÈÕÖ¾Êý¾ÝÓÀÔ¼ûÔʧ

°ä²¼¹¦·ò 2024-11-28

1. CloudflareÈÕÖ¾·þÎñÑϳÁÖÐ¶Ï £¬³¬°ëÊýÈÕÖ¾Êý¾ÝÓÀÔ¼ûÔʧ


11ÔÂ27ÈÕ £¬»¥ÁªÍø»ù´¡ÉèÊ©¾ÞÍ·CloudflareÔÚ11ÔÂ14ÈÕÔâ·êÁËÒ»´ÎÑϳÁµÄ·þÎñÖÐ¶Ï £¬µ¼Ö³¬¹ýÒ»°ëµÄÈÕÖ¾Êý¾ÝÓÀÔ¼ûÔʧ¡£Õâ´Î±äÂÒÔ´ÓÚÒ»´ÎÈí¼þ¸üгöÏÖ¹ÊÕÏ £¬Ê¹CloudflareµÄÈÕÖ¾·þÎṉ̃»¾3.5Ó×ʱ £¬ÎÞ·¨Îª¿Í»§Ìṩ¹Ø¼üÊý¾Ý¡£ÈÕÖ¾·þÎñ¶ÔÍøÂçÔËÓªÖÁ¹Ø³ÁÒª £¬¿ÉÄÜÔ®ÊÔìóÒµ·ÖÎöÁ÷Á¿Ä£Ê½¡¢½â¾öÎÊÌâ²¢¼ì²â¶ñÒâ»î¶¯¡£¶øCloudflareµÄÈÕÖ¾·þÎñÒÀÀµÃûΪLogpushµÄ¹¤¾ßÀ´´¦Öò¢´«µÝ´óÁ¿Êý¾Ý¡£²»ÐÒµÄÊÇ £¬µ±ÈÕµÄLogpush¸üÐÂÖдæÔÚÑϳÁÃýÎó £¬µ¼ÖÂÍøÂçµ½µÄÈÕ־δ±»Õýȷת·¢²¢×îÖÕ±»ÓÀԶɾ³ý¡£CloudflareÔڻ㱨ÖÐÖ¸³ö £¬ÃýÎóÅäÖõ¼ÖÂÁËϵͳµÄ¼¶Áª¹ýÔØ £¬ÈôÊÇ¿ÉÄÜÕýÈ·ÅäÖà £¬¼´¿ÉÔ¤·ÀÈÕÖ¾ÃÔʧ¡£Ö»¹Ü¹¤³ÌʦѸËÙ·¢ÏÖÎÊÌâ²¢»Ø¹öÁ˸üР£¬µ«´Ë¾ÙÒý·¢ÁËÁ¬Ëø¹ÊÕÏ £¬´óÁ¿ÈÕÖ¾Êý¾ÝÓ¿Èëϵͳ £¬Ô̺¬Î´ÅäÖÃLogpushµÄÓû§Êý¾Ý £¬¼Ó¾çÁËÎÊÌâ¡£CloudflareÒѶÔÕâ´ÎÊÂÎñºÍÊý¾ÝÃÔʧ·Ǹ £¬²¢³ÐŵÔì¶©Ô¤·À´ëʩԤ·ÀÀàËÆÊÂÎñÔٴβúÉú £¬µ«Ä¿Ç°ÕâЩ´ëÊ©ÈÔÔÚÔì¶©ÖС£


https://securityonline.info/cloudflare-logs-suffer-critical-failure-losing-55-of-user-data/


2. ÐÂÐÍÐÅÓþ¿¨µÁË¢¶ñÒâÈí¼þ¹¥»÷MagentoÍøÕ¾


11ÔÂ28ÈÕ £¬½üÆÚ £¬Ò»ÖÖÐÂÐÍÐÅÓþ¿¨µÁË¢¶ñÒâÈí¼þÕë¶Ô Magento µç×ÓÉÌÎñÍøÕ¾ÌáÒé¹¥»÷ £¬¸Ã¶ñÒâÈí¼þÄÜÔÚ½áÕËÒ³Ãæ¶¯Ì¬ÇÔÈ¡¸¶¿îÐÅÏ¢¡£ÕâÒ»·¢ÏÖÓÉÍøÂ簲ȫ¹«Ë¾ Sucuri µÄ×êÑÐÈËÔ± Weston Henry ÔÚÐþÉ«ÐÇÆÚÎåǰϦ¸æ·¢¡£¶ñÒâÈí¼þÒÔ JavaScript ×¢Èë´ó¾Ö´æÔÚ £¬ÓµÓжà¸ö±äÌå £¬Í¨¹ý´´½¨ÐéαÐÅÓþ¿¨±íµ¥»òÖ±½ÓÌáȡ֧¸¶×Ö¶ÎÊý¾ÝÁ½ÖÖ·½Ê½ÇÔÊØÐÅÏ¢¡£Æä¶¯Ì¬²½ÖèºÍ¼ÓÃÜ»úÔìÔö³¤Á˼ì²âÄÑ¶È £¬Êý¾Ý±»¼ÓÃܺóй¶ÖÁ¹¥»÷Õß½ÚÔìµÄÔ¶³Ì·þÎñÆ÷¡£Magento ÍøÕ¾Òò¿í·ºÊ¹ÓÃÇÒ´¦ÖÃÃô¸Ð¿Í»§Êý¾Ý¶ø³ÉÎªÍøÂç·¸×ï·Ö×ÓÖ¸±ê¡£Õâ´Î¹¥»÷ÖÐ £¬¶ñÒâ¾ç±¾±»°µ²ØÔÚ XML ÎļþµÄÌØ¶¨Ö¸ÁîÄÚ £¬ÄÚÈݱ»»ìºÏÒÔÔ¤·À±»·¢ÏÖ £¬½öÔÚÔ̺¬¡°checkout¡±¶ø²»º¬¡°cart¡±µÄ URL Ò³ÃæÉϼ¤»î £¬ÒÔÌáÊØÐÅÓþ¿¨ÐÅÏ¢¡£Ëæºó £¬¸Ã¶ñÒâÈí¼þ»¹Í¨¹ý Magento API ÍøÂçÓû§µÄÆäËûÊý¾Ý¡£¹¥»÷ÕßʹÓöàÖÖ·´¼ì²â¼¼Êõ°µ²Ø»î¶¯ £¬Ô̺¬½«Êý¾Ý¼ÓÃÜ¡¢±àÂë £¬²¢Í¨¹ýÐű꼼ÊõÒþÃØ´«ÊäÖÁÔ¶³Ì·þÎñÆ÷¡£Îª±£»¤µç×ÓÉÌÎñÍøÕ¾ÃâÊÜ´ËÀ๥»÷ £¬Sucuri¸ø³öÁËÓйؽ¨Òé¡£


https://www.darkreading.com/application-security/sneaky-skimmer-malware-magento-sites-black-friday


3. »ô²©¿ÏÊÐÔâÀÕË÷Èí¼þ¹¥»÷ £¬µ±¾Ö°ì¹«Êҹعز¢Ô¤¾¯·þÎñÖжÏ


11ÔÂ28ÈÕ £¬»ô²©¿ÏÊÐÔÚ27ÈÕÁ賿Ôâ·êÁËÀÕË÷Èí¼þ¹¥»÷ £¬µ¼Öµ±¾Ö°ì¹«ÊÒ±»ÆÈ¹Ø¹Ø £¬²¢Òý·¢ÁËһϵÁзþÎñºÍ»î¶¯µÄÖжÏ¡£¹ÙÔ±ÃÇѸËÙͨ¹ýÊе±¾ÖÍøÕ¾ºÍÉ罻ýÌåÏò±¾µØ¾ÓÃñ·¢³öÖÒ¸æ £¬Ö¸³ö¸Ð¶÷½Ú¼ÙÆÚǰϦ½«³öÏÖÍ£µçºÍ·þÎñÖжϵÄÇé¿ö¡£ÊÐÕþÌü¡¢ÊÐÕþ·¨ÔººÍ½Ö·Åųý¹¤×÷±»È¡µÞ £¬µ«Í£³µ·¨Âɹ¤×÷ÈÔÔÚ³ÖÐø¡£Ö»¹ÜÈç´Ë £¬À¬»øÍøÂçºÍÓéÀֻÈÔ°´´òËã½øÐС£»ô²©¿Ï¾¯Ô±¾ÖÔÚÓëÊе±¾ÖºÍIT²¿ÃźÏ×÷ £¬µ÷²éÕâ´ÎÏ®»÷ÊÂÎñ £¬²¢Ñ°ÕÒ×î¼ÑµÄ°²È«¸´Ô­·þÎñ²½Ö衣ĿǰÉÐδÓÐÈκÎÀÕË÷Èí¼þÍÅ»ïÈϿɶÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£»ô²©¿ÏÊÐ×÷ΪÐÂÔóÎ÷ÖݵÄÒ»¸ö³ÁÒª³ÇÊÐ £¬½üÄêÀ´¸ÃÖÝÒÑÓжàËù»ú¹¹Ôâ·êÀÕË÷Èí¼þ¹¥»÷ £¬Ô̺¬ÐÂÔóÎ÷³ÇÊдóѧÔÚ7ÔÂÔâµ½µÄRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷¡£


https://therecord.media/hoboken-closes-city-hall-ransomware


4. GodLoader¶ñÒâÈí¼þÀûÓÃGodotÓÎÏ·ÒýÇæÌӱܼì²âϰȾÉÏÍòϵͳ


11ÔÂ27ÈÕ £¬ºÚ¿ÍÀûÓÃеÄGodLoader¶ñÒâÈí¼þ £¬Í¨¹ý¿í·ºÊ¹ÓõÄGodotÓÎÏ·ÒýÇæµÄÖ°ÄÜÀ´Ìӱܼì²âϵͳ £¬²¢Ôڶ̶ÌÈý¸öÔÂÄÚϰȾÁ˳¬¹ý17,000¸öϵͳ¡£¸Ã¶ñÒâÈí¼þ¿ÉÄܹ¥»÷ËùÓÐÖØÒªÆ½Ì¨µÄÓÎÏ·Íæ¼Ò £¬²¢ÀûÓÃGodotµÄ½Ã½ÝÐÔºÍGDScript¾ç±¾Ëµ»°Ö°ÄÜÖ´ÐÐËÁÒâ´úÂë¡£Ò»µ©¼ÓÔØ £¬¶ñÒâÎļþ¾Í»áÔÚÊܺ¦ÕßÉ豸ÉÏ´¥·¢¶ñÒâ´úÂë £¬Ê¹¹¥»÷Õß¿ÉÄÜÇÔȡʹ´¦»òÏÂÔØÆäËûÓÐЧ¸ºÔØ £¬ÈçXMRig¼ÓÃÜÍÚ¿ó·¨Ê½¡£¹¥»÷Õßͨ¹ýStargazers Ghost Network´«²¼GodLoader £¬ÕâÊÇÒ»ÖÖ¶ñÒâÈí¼þ·Ö·¢¼´·þÎñ£¨DaaS£© £¬ÀûÓÿ´ËƺϷ¨µÄGitHub´æ´¢¿â¸²¸ÇÆä»î¶¯¡£ÔÚÕû¸ö¹¥»÷»î¶¯ÖÐ £¬Check Point¼ì²âµ½Á˶ನÕë¶Ô¿ª·¢ÈËÔ±ºÍÓÎÏ·Íæ¼ÒµÄ¶ÀÁ¢¹¥»÷¡£¹ÌȻֻ·¢ÏÖÁËÕë¶ÔWindowsϵͳµÄGodLoaderÑù±¾ £¬µ«×êÑÐÈËÔ±»¹¿ª·¢ÁËGDScript¸ÅÏëÑéÖ¤·ì϶´úÂë £¬Õ¹Ê¾Á˸öñÒâÈí¼þÄܹ»ÇáËɹ¥»÷LinuxºÍmacOSϵͳ¡£Godot EngineÊØ»¤Õß°µÊ¾ £¬¸Ã·ì϶²¢·ÇGodotËùÌØÓÐ £¬¼¤ÀøÈËÃÇÖ»Ö´ÐÐÀ´×Ô¿ÉÐÅÆðÔ´µÄÈí¼þ¡£


https://www.bleepingcomputer.com/news/security/new-godloader-malware-infects-thousands-of-gamers-using-godot-scripts/


5. ProjectSendÉí·ÝÑéÖ¤·ì϶Ö·þÎñÆ÷Ãæ¶ÔÔ¶³Ì½Ó¼ûÍþв


11ÔÂ27ÈÕ £¬ÍþвÐÐΪÕßÔÚÀûÓÃProjectSendÖеÄÑϳÁÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2024-11680£©À´»ñÈ¡·þÎñÆ÷µÄÔ¶³Ì½Ó¼ûȨÏÞ¡£¸Ã·ì϶ӰÏìProjectSend r1720֮ǰµÄ°æ±¾ £¬ÔÊÐí¹¥»÷Õßͨ¹ý·¢ËÍÌØÔìHTTPÒªÇó¸ü¸ÄÀûÓ÷¨Ê½ÅäÖá£Ö»¹Ü¸Ã·ì϶ÒÑÓÚ2023Äê5Ô½¨¸´ £¬µ«Ö±µ½×î½ü²Å±»·ÖÅäCVE±àºÅ £¬µ¼ÖÂÓû§Î´ÊµÊ±¸üС£¾ÝVulnCheck³Æ £¬99%µÄProjectSendÊ·ýÈÔÔÚÔËÐдæÔÚ·ì϶µÄ°æ±¾¡£ProjectSendÊÇÒ»¸öÊ¢ÐеĿªÔ´Îļþ¹²ÏíÍøÂçÀûÓ÷¨Ê½ £¬±»ºÜ¶à×éÖ¯ÓÃÓÚ°²È«¡¢Ë½ÃܵÄÎļþ´«Êä¡£Censys»ã±¨³Æ £¬Ô¼ÓÐ4000¸öÔÚÏßÊ·ý £¬ÆäÖдóÎÞÊý´æÔÚ·ì϶¡£×Ô2024Äê9ÔÂMetasploitºÍNuclei°ä²¼¹«¿ª·ì϶ÀûÓÃÒÔÀ´ £¬¹¥»÷»î¶¯ÓÐËùÔö³¤¡£VulnCheck·¢ÏÖ £¬¹¥»÷Õß²»½öÀûÓ÷ì϶»ñȡδ¾­ÊÚȨµÄ½Ó¼û £¬»¹¸ü¸ÄϵͳÉèÖᢲ¿ÊðwebshellÒÔ½ÚÔìÊÜϰȾ·þÎñÆ÷¡£GreyNoiseÁгöÁËÓë´Ë»î¶¯ÓйصÄ121¸öIP £¬Åú×¢ÕâÊÇÒ»´Î¿í·º³¢ÊÔ¡£VulnCheckÖÒ¸æ³Æ £¬Webshell´æ´¢ÔÚÌØ¶¨Ä¿Â¼ÖÐ £¬¿ÉÖ±½Óͨ¹ýÍøÂç·þÎñÆ÷½Ó¼û £¬Åú×¢´æÔÚ×Ô¶¯¹¥»÷¡£×êÑÐÈËԱǿµ÷ £¬¾¡¿ìÉý¼¶µ½ProjectSend°æ±¾r1750ÖÁ¹Ø³ÁÒª £¬ÒÔ·À±¸¿í·º´«²¼µÄ¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-projectsend-flaw-to-backdoor-exposed-servers/


6. SL Data ServicesÊý¾Ý¿âÔâй¶ £¬60ÓàÍòÃô¸ÐÎļþÆØ¹â


11ÔÂ27ÈÕ £¬¾Ý°²È«×êÑÐÈËÔ±±¨Â· £¬Êý¾Ý¾­¼Í¹«Ë¾SL Data ServicesµÄÒ»¸öδÊÜÃÜÂë±£»¤µÄAmazon S3´æ´¢Í°ÖÐ £¬Â¶³öÁ˳¬¹ý600,000¸öÃô¸ÐÎļþ £¬Ô̺¬ÊýǧÈ˵ķ¸×ﺹÇà¡¢²¼¾°µ÷²é¡¢³µÁ¾ºÍ²Æ¸»¼Í¼µÈÓ×ÎÒÐÅÏ¢¡£ÕâЩÎļþ×Ü´óÓ×Ϊ713.1 GB £¬ÇÒδ¼ÓÃÜ¡£ÐÅÏ¢°²È«×¨¼ÒJeremiah FowlerÔÚ10Ô·ݷ¢ÏÖ´ËÎÊÌâºó £¬ÂÅ´Îͨ¹ýµç»°ºÍµç×ÓÓʼþÏòÊý¾ÝÍøÂ繫˾»ã±¨ £¬µ«Î´ÊÕµ½»Ø¸´¡£Ö»¹Ü×îÖÕ¸ÃÐÅÏ¢·þÎñÌṩÉ̹عØÁËS3´æ´¢Í° £¬µ«ÒѶ³öµÄÐÅÏ¢¿ÉÄܻᱻÓÃÓÚÍøÂç´¹µöºÍÉç»á¹¤³Ì¹¥»÷µÈ¶ñÒâÐÐΪ¡£SL Data ServicesÐû³ÆÌṩ²Æ¸»»ã±¨µÈ·þÎñ £¬µ«Fowler·¢Ïָù«Ë¾ËƺõÔËÓª×ÅÖÁÉÙ16¸ö·ÖÆçµÄÍøÕ¾ £¬ÌṩÔ̺¬·¸×ï¼Í¼²é³­¡¢»ú¶¯³µÖÎÀí²¿ÃżÍ¼µÈһϵÁÐÊý¾Ý¡£Ëû½¨Òé×é֯ʹÓÃËæ»úÇÒÉ¢ÁеÄΨһ±êʶ·û¶¨ÃûÎļþ £¬²¢¼à¿Ø½Ó¼ûÈÕÖ¾ÒÔ¼ø±ðÒ쳣ģʽ £¬Í¬Ê±Ê¹ÓÃÃÜÂëºÍ¼ÓÃܱ£»¤Ãô¸ÐÊý¾Ý¡£


https://www.theregister.com/2024/11/27/600k_sensitive_files_exposed/