whoAMI¹¥»÷ÀûÓÃAmazon AMIÃû³Æ»ìºÏÈëÇÖAWSÕË»§

°ä²¼¹¦·ò 2025-02-14

1. whoAMI¹¥»÷ÀûÓÃAmazon AMIÃû³Æ»ìºÏÈëÇÖAWSÕË»§


2ÔÂ13ÈÕ  £¬°²È«×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪ¡°whoAMI¡±µÄ¹¥»÷·½Ê½  £¬¸Ã¹¥»÷ÔÊÐíÈκΰ䲼ӵÓÐÌØ¶¨Ãû³ÆµÄAmazonϵͳӳÏñ£¨AMI£©µÄÈ˽ӼûAmazon Web·þÎñÕÊ»§¡£´Ë¹¥»÷ÓÉDataDog×êÑÐÈËÔ±ÓÚ2024Äê8Ô²߶¯  £¬Í¨¹ýÀûÓÃÈí¼þÏîÄ¿¼ìË÷AMI IDÔÚAWSÕË»§ÄÚÖ´ÐдúÂë¡£ÑÇÂíÑ·È·Èϸ÷ì϶²¢ÓÚ9Ô°䲼½¨¸´·¨Ê½  £¬µ«²¿ÃÅδ¸üдúÂëµÄ×éÖ¯ÈÔÃæ¶Ô·çÏÕ¡£whoAMI¹¥»÷ÀûÓÃÁËAWS»·¾³ÖÐAMIÑ¡ÔñÅäÖõÄÃýÎó  £¬Èçδָ¶¨ËùÓÐÕß¡¢Ê¹ÓÃͨÅä·û°ü°ìÌØ¶¨AMI ID»òʹÓá°most_recent=true¡±µÈʵ¼Ê  £¬Ê¹µÃ¹¥»÷ÕßÄܲåÈë¶ñÒâAMI¡£¹¥»÷ÕßÖ»Ðè°ä²¼Ò»¸öÃû³ÆÇкϿÉÐÅËùÓÐÕßģʽµÄAMI  £¬Óû§¾Í¿ÉÄÜÑ¡Ôñ²¢Æô¶¯Ëü¡£DataDogµÄÒ£²âÊý¾ÝÏÔʾ  £¬Ô¼1%µÄ×éÖ¯Ò×Êܹ¥»÷  £¬¿ÉÄÜÓ°ÏìÊýǧ¸öAWSÕË»§¡£ÑÇÂíÑ·Òѽ¨¸´¸ÃÎÊÌâ²¢ÍÆ³ö¡°ÔÊÐíµÄAMI¡±Ð°²È«½ÚÔì  £¬½¨Òé¿Í»§Ê¼ÖÕÖ¸¶¨AMIËùÓÐÕß²¢ÆôÓøÃÖ°ÄÜ¡£´Ë±í  £¬TerraformÒ²ÆðÍ·ÖÒ¸æÎ´Ê¹ÓÃËùÓÐÕß¹ýÂËÆ÷µÄÇé¿ö  £¬²¢´òËãÖ´ÐиüÑϸñµÄÖ´ÐС£ÏµÍ³ÖÎÀíÔ±ÐèÉóºËÅäÖò¢¸üдúÂëÒÔʵÏÖ°²È«µÄAMI¼ìË÷  £¬Í¬Ê±ÆôÓÃAWSÉó¼ÆÄ£Ê½²é³­²»ÊÜÐÅÀµµÄAMI¡£DataDog»¹°ä²¼ÁËɨÃ跨ʽ¹©Óû§²é³­AWSÕË»§ÖÐÊÇ·ñ´æÔÚ²»ÊÜÐÅÀµµÄAMIÊ·ý¡£


https://www.bleepingcomputer.com/news/security/whoami-attacks-give-hackers-code-execution-on-amazon-ec2-instances/


2. DoxbinÊý¾Ý´óй¶£ºToodaºÚ¿Í×éÖ¯ÆØ¹â13.6ÍòÓû§¼Í¼¼°ºÚÃûµ¥


2ÔÂ13ÈÕ  £¬DoxbinÊÇÒ»¸öÉæ¼°ÍøÂçÈËÈâËÑË÷ºÍÓ×ÎÒÐÅϢй¶µÄ³ôÃûÔ¶ÑïÆ½Ì¨  £¬½üÆÚ±»Ò»¸öÃûΪToodaµÄºÚ¿Í×éÖ¯¹¥Ï  £¬µ¼Ö´óÁ¿Óû§Êý¾Ýй¶¡£¾ÝHackread.com±¨Â·  £¬Tooda×éÖ¯Ðû³ÆÕâ´Î¹¥»÷ÊÇ¶ÔÆäÖÐÒ»Ãû³ÉÔ±Ö¸¿ØµÄ»ØÓ¦  £¬ËûÃÇ·ÛËéÁËDoxbinµÄ»ù´¡ÉèÊ©  £¬¶Ï¸ùÁËÓû§ÕÊ»§  £¬Ëø¶¨ÁËÖÎÀíÔ±  £¬²¢Ð¹Â¶ÁËÔËÓª¸Ãƽ̨ÈËÔ±µÄÓ×ÎÒÐÅÏ¢¡£Ð¹Â¶µÄÊý¾ÝÔ̺¬³¬¹ý136,000ÌõÓû§¼Í¼  £¬ÈçID¡¢Óû§ÃûºÍµç×ÓÓʼþµØÖ·  £¬ÒÔ¼°Ò»¸öÃûΪ¡°DoxbinºÚÃûµ¥¡±µÄÎļþ  £¬¸ÃÎļþÍøÂçÁËÒѸ¶·Ñ×èÖ¹ÐÅÏ¢°ä²¼ÔÚDoxbinÉϵÄÈËÔ±ÐÅÏ¢¡£´Ë±í  £¬Tooda»¹°ä²¼Á˾ݳÆÊôÓÚDoxbinÖÎÀíÔ±River£¨ÕæÃûPaula£©µÄ¾ßÌåÓ×ÎÒÊý¾Ý¡£Õâ´ÎÊý¾Ýй¶¶ÔDoxbinÓû§À´Ëµ¼«ÎªÎ£ÏÕ  £¬¼´±ãÖ»ÓÐЧ»§ÃûºÍµç×ÓÓʼþµØÖ·Ð¹Â¶  £¬ÕâЩÐÅÏ¢Ò²¿ÉÄÜÓëÆäËûйÃÜÐÅÏ¢½»²æÒýÓà  £¬µ¼ÖÂÉí·Ý×·×ÙºÍÏÖʵÊÀ½çµÄÁªÏµ±»·¢ÏÖ¡£Ä¿Ç°  £¬Doxbin´¦ÓÚÀëÏß״̬  £¬Õâ´ÎÊÂÎñ½øÒ»²½Åú×¢  £¬¼´±ãÊǶñÒâÆ½Ì¨Ò²¿ÉÄÜÊܵ½¾ºÕùµÐÊֵĹ¥»÷  £¬DoxbinÓû§Ãæ¶Ô¶³ö·çÏÕ¡£


https://hackread.com/doxbin-data-breach-hackers-leak-user-records-blacklist-file/


3. Zacks Investment ResearchÒÉÔâ1200ÍòÕË»§Êý¾Ýй¶


2ÔÂ13ÈÕ  £¬Zacks Investment Research£¨Zacks£©ÊÇÒ»¼ÒÌṩÊý¾ÝÇý¶¯Í¶×ʼû½âµÄÃÀ¹ú¹«Ë¾  £¬ÔÚ2024Äê6ÔÂÒÉËÆÔâ·êÁËÊý¾Ýй¶ÊÂÎñ  £¬µ¼ÖÂԼĪ1200Íò¸öÕË»§µÄÃô¸ÐÐÅÏ¢±»Ð¹Â¶¡£ÕâЩÐÅÏ¢Ô̺¬È«Ãû¡¢Óû§Ãû¡¢µç×ÓÓʼþµØÖ·¡¢ÏÖʵµØÖ·ºÍµç»°ºÅÂëµÈ¡£Ò»ÃûÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳Éϰ䲼ÁËÊý¾ÝÑù±¾  £¬²¢Ðû³Æ¶ÔZacks½øÐÐÁËÈëÇÖ¡£Ö»¹ÜZacksÉÐδ»ØÓ¦¹ØÓÚÊý¾ÝÕæÊµÐÔµÄѯÎÊ  £¬µ«Ð¹Â¶µÄÊý¾Ý¿âÒѱ»Ôö³¤µ½Have I Been Pwned£¨HIBP£©ÍøÕ¾ÉϹ©Óû§²é³­¡£HIBPÈ·ÈϸÃÎļþÔ̺¬1200Íò¸öΨһµç×ÓÓʼþµØÖ·µÈÐÅÏ¢  £¬²¢Ö¸³öÔ¼93%µÄй¶µç×ÓÓʼþµØÖ·ÒÑ´æÔÚÓÚÆäÊý¾Ý¿âÖÐ  £¬¿ÉÄÜÀ´×Ô´Óǰ¶Ôͳһƽ̨»òÆäËû·þÎñµÄÈëÇÖ¡£ÈôÊÇÕâ´ÎÊý¾Ýй¶±»Ö¤ÊµÎªÐºڿ͹¥»÷µÄÁ˾Ö  £¬Õ⽫ÊÇ´ÓǰËÄÄêÄÚÓ°ÏìZacksµÄµÚÈý´Î³Á´óÊý¾Ýй¶ÊÂÎñ¡£´Ëǰ  £¬ZacksÒÑÔÚ2023Äê1ÔÂÅû¶ÁËÒ»´ÎÉæ¼°820,000Ãû¿Í»§Ãô¸ÐÐÅÏ¢µÄй¶ÊÂÎñ  £¬²¢ÔÚ2023Äê6Ô±»HIBPÑéÖ¤ÁËÒ»¸öÔ̺¬880ÍòʹÓÃZacks·þÎñÓ×ÎÒÐÅÏ¢µÄµ¥¶ÀÊý¾Ý¿âй¶¡£ÖµÍ×ÌùÐĵÄÊÇ  £¬Õâ´Îй¶ÊÂÎñÉÐδµÃµ½ZacksµÄ¹Ù·½Ö¤Êµ¡£


https://www.bleepingcomputer.com/news/security/hacker-leaks-account-data-of-12-million-zacks-investment-users/


4. AstarothÍøÂç´¹µö¹¤¾ß°ü£ºÐÂÐ͹¥»÷·½Ê½¿ÉÈÆ¹ý2FAÇÔÈ¡µÇ¼ƾ֤


2ÔÂ13ÈÕ  £¬Ò»ÖÖÃûΪAstarothµÄÐÂÐ͸߼¶ÍøÂç´¹µö¹¤¾ß°üÒѳʴ˿ÌÍøÂç·¸×ïÍøÂçÖÐ  £¬Ëüͨ¹ý·´Ïò´úÀí¡¢ÊµÊ±Æ¾Ö¤²¶»ñºÍ»á»°½Ù³Ö¼¼Êõ  £¬¿ÉÄÜÈÆ¹ýË«³É·ÖÉí·ÝÑéÖ¤£¨2FA£©  £¬ÇÔÈ¡Gmail¡¢YahooºÍMicrosoftµÈ·þÎñµÄµÇ¼ƾ֤¡£AstarothʹÓöñÒâ·þÎñÆ÷×÷ΪÊܺ¦ÕߺͺϷ¨ÍøÕ¾Ö®¼äµÄÖнé  £¬À¹½Ø²¢°Ñ³ÖÁ÷Á¿  £¬ÊµÊ±²¶»ñµÇ¼ʹ´¦¡¢Éí·ÝÑéÖ¤ÁîÅÆºÍ»á»°cookie¡£¹¥»÷ÕßÄܹ»Í¨¹ýWebÃæ°å½çÃæºÍTelegram֪ͨʵʱ½Ó¹Ü²¶»ñµÄÐÅÏ¢¡£¸Ã¹¤¾ß°üͨ¹ýTelegramÏúÊÛ  £¬²¢ÔÚÍøÂç·¸×ïÂÛ̳ºÍÊг¡ÉÏÍÆ¹ã  £¬ÊÛ¼Û2000ÃÀÔª  £¬Ô̺¬Áù¸öÔµĸüкÍÖ§³Ö¡£¾Ý×êÑÐÈËÔ±³Æ  £¬AstarothµÄ¸´ÔÓˮƽÁîÈËÕ𾪠 £¬Óû§Ó¦¸ñ±íÓ×Ðĵç×ÓÓʼþÖеÄÁ´½Ó  £¬Ö±½Ó½Ó¼ûÍøÕ¾ÒԲ鳭ÕË»§ÊÇ·ñ´æÔÚÎÊÌâ¡£


https://hackread.com/astaroth-phishing-kit-bypasses-2fa-hijack-gmail-microsoft/


5. PostgreSQLÐÂÁãÈÕ·ì϶³ÉBeyondTrust¹¥»÷¹Ø¼ü  £¬²ÆÕþ²¿ÔâºÚ¿ÍÈëÇÖ


2ÔÂ13ÈÕ  £¬Rapid7µÄ°²È«×êÑÐÈËÔ±ÖÜËĻ㱨³Æ  £¬ÔÚPostgreSQLÖз¢ÏÖÁËÒ»¸öеÄÁãÈÕ·ì϶£¨CVE-2025-1094£©  £¬¸Ã·ì϶ÓëÕë¶ÔBeyondTrustÔ¶³ÌÖ§³Ö²úÆ·µÄһϵÁй¥»÷Ç×êÇÓйØ¡£¸Ã·ì϶ӰÏìPostgreSQL½»»¥Ê½ÖÕ¶Ëpsql  £¬ÔÊÐí¾«ÐÄ»ú¹ØµÄSQLÓï¾ä´¥·¢SQL×¢Èë¡£Rapid7Ö¸³ö  £¬ºÚ¿ÍÒÑÀûÓô˷ì϶³É¹¦ÈëÇÖÃÀ¹ú²ÆÕþ²¿µÄ»úе¡£Ö»¹ÜBeyondTrustÒÑÕë¶ÔÆäÓйطì϶°ä²¼Á˲¹¶¡  £¬µ«PostgreSQLÖеÄÕâ¸öDZÔÚ·ì϶ÈÔÊǹ¥»÷ÕߵĹ¥»÷½¹µã¡£¸Ã·ì϶´æÔÚÓÚpsql´¦ÖÃÌåʽÃýÎóµÄUTF-8×Ö·ûµÄ·½Ê½ÖÐ  £¬¾«ÐÄÉè¼ÆµÄÎÞЧÐòÁÐÄܹ»¹ýÔçÖÕÖ¹SQLºÅÁî  £¬Ê¹¹¥»÷Õß¿ÉÄÜ×¢ÈëÆäËûÓï¾ä  £¬ÉõÖÁ´¥·¢shellÖ´ÐС£PostgreSQLÍŶÓÒѰ䲼´¹Î£²¹¶¡  £¬²¢ÖÒ¸æÁËÊÜÓ°Ïì°æ±¾¡£Í¬Ê±  £¬Rapid7»¹°ä²¼ÁËMetasploitÄ£¿é  £¬ÓÃÓÚÖ¸ÎÆ¼ø±ðºÍ×Ô¶¯Ôغɴ«ËÍÒ×Êܹ¥»÷µÄBeyondTrustϵͳ¡£


https://www.securityweek.com/rapid7-flags-new-postgresql-zero-day-connected-to-beyondtrust-exploitation/


6. CleanTalk WordPress²å¼þÏÖÑϳÁËÁÒâÎļþÉÏ´«·ì϶  £¬³¬3ÍòÍøÕ¾Ãæ¶Ô·çÏÕ


2ÔÂ13ÈÕ  £¬CleanTalk WordPress ²å¼þÖз¢ÏÖÁËÒ»¸ö±àºÅΪCVE-2024-13365µÄÑϳÁËÁÒâÎļþÉÏ´«·ì϶  £¬¸Ã·ì϶¿ÉÄÜʹ³¬¹ý30,000¸öÍøÕ¾Ãæ¶Ô±»ÆëÈ«¹¥ÏµķçÏÕ¡£´Ë·ì϶µÄCVSSÆÀ·Ö¸ß´ï9.8  £¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢ÉÏ´«¶ñÒâÎļþ  £¬½ø¶øÔÚ·þÎñÆ÷ÉÏÖ´ÐдúÂë¡£·ì϶ԴÓÚ²å¼þÔÚɨÃèZIP´æµµÊ±Î´ÄÜÕýÈ·ÑéÖ¤Óû§ÌṩµÄÊý¾Ý  £¬µ¼Ö¹¥»÷ÕßÄܹ»ÉÏ´«ËÁÒâÎļþ  £¬Ô̺¬¶ñÒâ¾ç±¾¡£¼´±ãδ¾­Éí·ÝÑéÖ¤µÄÓû§Í¨³£²»ÔÊÐíÉÏ´«Îļþ  £¬¸Ã·ì϶Ҳ¿ÉÄܱ»ÀûÓà  £¬¹¥»÷Õß¿ÉÄÜ»áÉÏ´«Ô̺¬°µ²ØÔÚÎÞº¦ÎļþÖеĶñÒâPHPÎļþµÄ´óÐÍZIPÎļþ  £¬ÒÔѹ¿å·þÎñÆ÷×ÊÔ´²¢ÔÊÐíÖ´ÐжñÒâÎļþ¡£Wordfence°²È«¹«Ë¾·¢ÏÖÁ˸÷ì϶  £¬²¢½¨ÒéËùÓÐʹÓÃCleanTalk²å¼þµÄÓû§¾¡¿ì¸üе½×îа汾2.150  £¬ÒÔ±£»¤ÆäÍøÕ¾ÃâÊÜDZÔÚ¹¥»÷¡£Í¬Ê±  £¬°²È«×êÑÐÔ±Lucio S¨¢ÒòÕÆ¹ÜÈεػ㱨¸Ã·ì϶¶ø»ñµÃ1,716.00ÃÀÔªµÄÉͽð¡£


https://securityonline.info/hackers-can-take-over-30000-wordpress-sites-due-to-critical-cleantalk-security-flaw-cve-2024-13365/