whoAMI¹¥»÷ʹÓÃAmazon AMIÃû³Æ»ìÏýÈëÇÖAWSÕË»§
Ðû²¼Ê±¼ä 2025-02-141. whoAMI¹¥»÷ʹÓÃAmazon AMIÃû³Æ»ìÏýÈëÇÖAWSÕË»§
2ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪ¡°whoAMI¡±µÄ¹¥»÷·½·¨£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÔÊÐíÈκÎÐû²¼¾ßÓÐÌØÃüÃû³ÆµÄAmazonϵͳӳÏñ£¨AMI£©µÄÈË»á¼ûAmazon WebЧÀÍÕÊ»§¡£¡£¡£¡£¡£¡£´Ë¹¥»÷ÓÉDataDogÑо¿Ö°Ô±ÓÚ2024Äê8Ô²߻®£¬£¬£¬£¬£¬£¬£¬Í¨¹ýʹÓÃÈí¼þÏîÄ¿¼ìË÷AMI IDÔÚAWSÕË»§ÄÚÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£ÑÇÂíÑ·È·ÈϸÃÎó²î²¢ÓÚ9ÔÂÐû²¼ÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬£¬£¬µ«²¿·Öδ¸üдúÂëµÄ×éÖ¯ÈÔÃæÁÙΣº¦¡£¡£¡£¡£¡£¡£whoAMI¹¥»÷ʹÓÃÁËAWSÇéÐÎÖÐAMIÑ¡ÔñÉèÖõĹýʧ£¬£¬£¬£¬£¬£¬£¬Èçδָ¶¨ËùÓÐÕß¡¢Ê¹ÓÃͨÅä·ûÈ¡´úÌØ¶¨AMI ID»òʹÓá°most_recent=true¡±µÈʵ¼ù£¬£¬£¬£¬£¬£¬£¬Ê¹µÃ¹¥»÷ÕßÄܲåÈë¶ñÒâAMI¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÖ»ÐèÐû²¼Ò»¸öÃû³ÆÇкϿÉÐÅËùÓÐÕßģʽµÄAMI£¬£¬£¬£¬£¬£¬£¬Óû§¾Í¿ÉÄÜÑ¡Ôñ²¢Æô¶¯Ëü¡£¡£¡£¡£¡£¡£DataDogµÄÒ£²âÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬£¬Ô¼1%µÄ×éÖ¯Ò×Êܹ¥»÷£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÓ°ÏìÊýǧ¸öAWSÕË»§¡£¡£¡£¡£¡£¡£ÑÇÂíÑ·ÒÑÐÞ¸´¸ÃÎÊÌâ²¢ÍÆ³ö¡°ÔÊÐíµÄAMI¡±ÐÂÇå¾²¿ØÖÆ£¬£¬£¬£¬£¬£¬£¬½¨Òé¿Í»§Ê¼ÖÕÖ¸¶¨AMIËùÓÐÕß²¢ÆôÓøù¦Ð§¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬TerraformÒ²×îÏÈÖÒÑÔδʹÓÃËùÓÐÕß¹ýÂËÆ÷µÄÇéÐΣ¬£¬£¬£¬£¬£¬£¬²¢ÍýÏëʵÑé¸üÑÏ¿áµÄÖ´ÐС£¡£¡£¡£¡£¡£ÏµÍ³ÖÎÀíÔ±ÐèÉóºËÉèÖò¢¸üдúÂëÒÔʵÏÖÇå¾²µÄAMI¼ìË÷£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÆôÓÃAWSÉó¼ÆÄ£Ê½¼ì²é²»ÊÜÐÅÈεÄAMI¡£¡£¡£¡£¡£¡£DataDog»¹Ðû²¼ÁËɨÃè³ÌÐò¹©Óû§¼ì²éAWSÕË»§ÖÐÊÇ·ñ±£´æ²»ÊÜÐÅÈεÄAMIʵÀý¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/whoami-attacks-give-hackers-code-execution-on-amazon-ec2-instances/
2. DoxbinÊý¾Ý´óй¶£ºToodaºÚ¿Í×éÖ¯ÆØ¹â13.6ÍòÓû§¼Í¼¼°ºÚÃûµ¥
2ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬DoxbinÊÇÒ»¸öÉæ¼°ÍøÂçÈËÈâËÑË÷ºÍСÎÒ˽¼ÒÐÅϢй¶µÄÎÛÃûÕÑÖøÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬½üÆÚ±»Ò»¸öÃûΪToodaµÄºÚ¿Í×éÖ¯¹¥ÏÝ£¬£¬£¬£¬£¬£¬£¬µ¼Ö´ó×ÚÓû§Êý¾Ýй¶¡£¡£¡£¡£¡£¡£¾ÝHackread.com±¨µÀ£¬£¬£¬£¬£¬£¬£¬Tooda×éÖ¯Éù³Æ´Ë´Î¹¥»÷ÊÇ¶ÔÆäÖÐÒ»Ãû³ÉÔ±Ö¸¿ØµÄ»ØÓ¦£¬£¬£¬£¬£¬£¬£¬ËûÃÇÆÆËðÁËDoxbinµÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬É¨³ýÁËÓû§ÕÊ»§£¬£¬£¬£¬£¬£¬£¬Ëø¶¨ÁËÖÎÀíÔ±£¬£¬£¬£¬£¬£¬£¬²¢Ð¹Â¶ÁËÔËÓª¸Ãƽְ̨ԱµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨Áè¼Ý136,000ÌõÓû§¼Í¼£¬£¬£¬£¬£¬£¬£¬ÈçID¡¢Óû§ÃûºÍµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ò»¸öÃûΪ¡°DoxbinºÚÃûµ¥¡±µÄÎļþ£¬£¬£¬£¬£¬£¬£¬¸ÃÎļþÍøÂçÁËÒѸ¶·Ñ×èÖ¹ÐÅÏ¢Ðû²¼ÔÚDoxbinÉϵÄÖ°Ô±ÐÅÏ¢¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Tooda»¹Ðû²¼Á˾ݳÆÊôÓÚDoxbinÖÎÀíÔ±River£¨ÕæÃûPaula£©µÄÏêϸСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£Õâ´ÎÊý¾Ýй¶¶ÔDoxbinÓû§À´Ëµ¼«ÎªÎ£ÏÕ£¬£¬£¬£¬£¬£¬£¬×ÝȻֻÓÐÓû§ÃûºÍµç×ÓÓʼþµØµãй¶£¬£¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢Ò²¿ÉÄÜÓëÆäËûйÃÜÐÅÏ¢½»Ö¯ÒýÓ㬣¬£¬£¬£¬£¬£¬µ¼ÖÂÉí·Ý×·×ÙºÍÏÖʵÌìϵÄÁªÏµ±»·¢Ã÷¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬Doxbin´¦ÓÚÀëÏß״̬£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ½øÒ»²½Åú×¢£¬£¬£¬£¬£¬£¬£¬×ÝÈ»ÊǶñÒâÆ½Ì¨Ò²¿ÉÄÜÊܵ½¾ºÕùµÐÊֵĹ¥»÷£¬£¬£¬£¬£¬£¬£¬DoxbinÓû§ÃæÁÙ̻¶Σº¦¡£¡£¡£¡£¡£¡£
https://hackread.com/doxbin-data-breach-hackers-leak-user-records-blacklist-file/
3. Zacks Investment ResearchÒÉÔâ1200ÍòÕË»§Êý¾Ýй¶
2ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬Zacks Investment Research£¨Zacks£©ÊÇÒ»¼ÒÌṩÊý¾ÝÇý¶¯Í¶×Ê¿´·¨µÄÃÀ¹ú¹«Ë¾£¬£¬£¬£¬£¬£¬£¬ÔÚ2024Äê6ÔÂÒÉËÆÔâÓöÁËÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂԼĪ1200Íò¸öÕË»§µÄÃô¸ÐÐÅÏ¢±»Ð¹Â¶¡£¡£¡£¡£¡£¡£ÕâЩÐÅÏ¢°üÀ¨È«Ãû¡¢Óû§Ãû¡¢µç×ÓÓʼþµØµã¡¢ÏÖʵµØµãºÍµç»°ºÅÂëµÈ¡£¡£¡£¡£¡£¡£Ò»ÃûÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳ÉÏÐû²¼ÁËÊý¾ÝÑù±¾£¬£¬£¬£¬£¬£¬£¬²¢Éù³Æ¶ÔZacks¾ÙÐÐÁËÈëÇÖ¡£¡£¡£¡£¡£¡£Ö»¹ÜZacksÉÐδ»ØÓ¦¹ØÓÚÊý¾ÝÕæÊµÐÔµÄѯÎÊ£¬£¬£¬£¬£¬£¬£¬µ«Ð¹Â¶µÄÊý¾Ý¿âÒѱ»Ìí¼Óµ½Have I Been Pwned£¨HIBP£©ÍøÕ¾ÉϹ©Óû§¼ì²é¡£¡£¡£¡£¡£¡£HIBPÈ·ÈϸÃÎļþ°üÀ¨1200Íò¸öΨһµç×ÓÓʼþµØµãµÈÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢Ö¸³öÔ¼93%µÄй¶µç×ÓÓʼþµØµãÒѱ£´æÓÚÆäÊý¾Ý¿âÖУ¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÀ´×ÔÒÑÍù¶Ôͳһƽ̨»òÆäËûЧÀ͵ÄÈëÇÖ¡£¡£¡£¡£¡£¡£ÈôÊÇ´Ë´ÎÊý¾Ýй¶±»Ö¤ÊµÎªÐºڿ͹¥»÷µÄЧ¹û£¬£¬£¬£¬£¬£¬£¬Õ⽫ÊÇÒÑÍùËÄÄêÄÚÓ°ÏìZacksµÄµÚÈý´ÎÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬ZacksÒÑÔÚ2023Äê1ÔÂÅû¶ÁËÒ»´ÎÉæ¼°820,000Ãû¿Í»§Ãô¸ÐÐÅÏ¢µÄй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ2023Äê6Ô±»HIBPÑéÖ¤ÁËÒ»¸ö°üÀ¨880ÍòʹÓÃZacksЧÀÍСÎÒ˽¼ÒÐÅÏ¢µÄµ¥¶ÀÊý¾Ý¿âй¶¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬´Ë´Îй¶ÊÂÎñÉÐδ»ñµÃZacksµÄ¹Ù·½Ö¤Êµ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hacker-leaks-account-data-of-12-million-zacks-investment-users/
4. AstarothÍøÂç´¹ÂÚ¹¤¾ß°ü£ºÐÂÐ͹¥»÷·½·¨¿ÉÈÆ¹ý2FAÇÔÈ¡µÇ¼ƾ֤
2ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪAstarothµÄÐÂÐ͸߼¶ÍøÂç´¹ÂÚ¹¤¾ß°üÒÑ·ºÆðÔÚÍøÂç·¸·¨ÍøÂçÖУ¬£¬£¬£¬£¬£¬£¬Ëüͨ¹ý·´ÏòÊðÀí¡¢ÊµÊ±Æ¾Ö¤²¶»ñºÍ»á»°Ð®ÖÆÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬Äܹ»ÈƹýË«ÒòËØÉí·ÝÑéÖ¤£¨2FA£©£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡Gmail¡¢YahooºÍMicrosoftµÈЧÀ͵ĵǼƾ֤¡£¡£¡£¡£¡£¡£AstarothʹÓöñÒâЧÀÍÆ÷×÷ΪÊܺ¦ÕߺÍÕýµ±ÍøÕ¾Ö®¼äµÄÖн飬£¬£¬£¬£¬£¬£¬×èµ²²¢Ê¹ÓÃÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬ÊµÊ±²¶»ñµÇ¼ƾ֤¡¢Éí·ÝÑéÖ¤ÁîÅÆºÍ»á»°cookie¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ýWebÃæ°å½çÃæºÍTelegram֪ͨʵʱÎüÊÕ²¶»ñµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ß°üͨ¹ýTelegram³öÊÛ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÍøÂç·¸·¨ÂÛ̳ºÍÊг¡ÉÏÍÆ¹ã£¬£¬£¬£¬£¬£¬£¬ÊÛ¼Û2000ÃÀÔª£¬£¬£¬£¬£¬£¬£¬°üÀ¨Áù¸öÔµĸüкÍÖ§³Ö¡£¡£¡£¡£¡£¡£¾ÝÑо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬AstarothµÄÅÓºéˮƽÁîÈËÕ𾪣¬£¬£¬£¬£¬£¬£¬Óû§Ó¦¸ñÍâСÐĵç×ÓÓʼþÖеÄÁ´½Ó£¬£¬£¬£¬£¬£¬£¬Ö±½Ó»á¼ûÍøÕ¾ÒÔ¼ì²éÕË»§ÊÇ·ñ±£´æÎÊÌâ¡£¡£¡£¡£¡£¡£
https://hackread.com/astaroth-phishing-kit-bypasses-2fa-hijack-gmail-microsoft/
5. PostgreSQLÐÂÁãÈÕÎó²î³ÉBeyondTrust¹¥»÷Òªº¦£¬£¬£¬£¬£¬£¬£¬²ÆÎñ²¿ÔâºÚ¿ÍÈëÇÖ
2ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬Rapid7µÄÇå¾²Ñо¿Ö°Ô±ÖÜËı¨¸æ³Æ£¬£¬£¬£¬£¬£¬£¬ÔÚPostgreSQLÖз¢Ã÷ÁËÒ»¸öеÄÁãÈÕÎó²î£¨CVE-2025-1094£©£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓëÕë¶ÔBeyondTrustÔ¶³ÌÖ§³Ö²úÆ·µÄһϵÁй¥»÷Ç×½üÏà¹Ø¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìPostgreSQL½»»¥Ê½ÖÕ¶Ëpsql£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÈ«ÐĽṹµÄSQLÓï¾ä´¥·¢SQL×¢Èë¡£¡£¡£¡£¡£¡£Rapid7Ö¸³ö£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÒÑʹÓôËÎó²îÀÖ³ÉÈëÇÖÃÀ¹ú²ÆÎñ²¿µÄ»úе¡£¡£¡£¡£¡£¡£Ö»¹ÜBeyondTrustÒÑÕë¶ÔÆäÏà¹ØÎó²îÐû²¼Á˲¹¶¡£¬£¬£¬£¬£¬£¬£¬µ«PostgreSQLÖеÄÕâ¸öDZÔÚÎó²îÈÔÊǹ¥»÷ÕߵĹ¥»÷½¹µã¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚpsql´¦Öóͷ£ÃûÌùýʧµÄUTF-8×Ö·ûµÄ·½·¨ÖУ¬£¬£¬£¬£¬£¬£¬È«ÐÄÉè¼ÆµÄÎÞЧÐòÁпÉÒÔ¹ýÔçÖÕÖ¹SQLÏÂÁ£¬£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»×¢ÈëÆäËûÓï¾ä£¬£¬£¬£¬£¬£¬£¬ÉõÖÁ´¥·¢shellÖ´ÐС£¡£¡£¡£¡£¡£PostgreSQLÍŶÓÒÑÐû²¼½ôÆÈ²¹¶¡£¬£¬£¬£¬£¬£¬£¬²¢ÖÒÑÔÁËÊÜÓ°Ïì°æ±¾¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬Rapid7»¹Ðû²¼ÁËMetasploitÄ£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÖ¸ÎÆÊ¶±ðºÍ×Ô¶¯Ôغɴ«ËÍÒ×Êܹ¥»÷µÄBeyondTrustϵͳ¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/rapid7-flags-new-postgresql-zero-day-connected-to-beyondtrust-exploitation/
6. CleanTalk WordPress²å¼þÏÖÑÏÖØí§ÒâÎļþÉÏ´«Îó²î£¬£¬£¬£¬£¬£¬£¬³¬3ÍòÍøÕ¾ÃæÁÙΣº¦
2ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬CleanTalk WordPress ²å¼þÖз¢Ã÷ÁËÒ»¸ö±àºÅΪCVE-2024-13365µÄÑÏÖØí§ÒâÎļþÉÏ´«Îó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÄÜʹÁè¼Ý30,000¸öÍøÕ¾ÃæÁÙ±»ÍêÈ«¹¥ÏݵÄΣº¦¡£¡£¡£¡£¡£¡£´ËÎó²îµÄCVSSÆÀ·Ö¸ß´ï9.8£¬£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢ÉÏ´«¶ñÒâÎļþ£¬£¬£¬£¬£¬£¬£¬½ø¶øÔÚЧÀÍÆ÷ÉÏÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£Îó²îÔ´ÓÚ²å¼þÔÚɨÃèZIP´æµµÊ±Î´ÄÜ׼ȷÑéÖ¤Óû§ÌṩµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õß¿ÉÒÔÉÏ´«í§ÒâÎļþ£¬£¬£¬£¬£¬£¬£¬°üÀ¨¶ñÒâ¾ç±¾¡£¡£¡£¡£¡£¡£×ÝȻδ¾Éí·ÝÑéÖ¤µÄÓû§Í¨³£²»ÔÊÐíÉÏ´«Îļþ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒ²¿ÉÄܱ»Ê¹Ó㬣¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜ»áÉÏ´«°üÀ¨Òþ²ØÔÚÎÞº¦ÎļþÖеĶñÒâPHPÎļþµÄ´óÐÍZIPÎļþ£¬£¬£¬£¬£¬£¬£¬ÒÔѹ¿åЧÀÍÆ÷×ÊÔ´²¢ÔÊÐíÖ´ÐжñÒâÎļþ¡£¡£¡£¡£¡£¡£WordfenceÇå¾²¹«Ë¾·¢Ã÷Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬²¢½¨ÒéËùÓÐʹÓÃCleanTalk²å¼þµÄÓû§¾¡¿ì¸üе½×îа汾2.150£¬£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»£»£»¤ÆäÍøÕ¾ÃâÊÜDZÔÚ¹¥»÷¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±Lucio S¨¢ÒòÈÏÕæÈεر¨¸æ¸ÃÎó²î¶ø»ñµÃ1,716.00ÃÀÔªµÄÉͽ𡣡£¡£¡£¡£¡£
https://securityonline.info/hackers-can-take-over-30000-wordpress-sites-due-to-critical-cleantalk-security-flaw-cve-2024-13365/


¾©¹«Íø°²±¸11010802024551ºÅ