΢Èí·¢Ã÷Windows Win32kÌáȨ0dayÒѱ»ÔÚҰʹÓà £»SonicWall¹Ì¼þ¸üÐÂÐÞ¸´SMA-100ÖÐÒѱ»Ê¹ÓõÄ0day

Ðû²¼Ê±¼ä 2021-02-22

1.΢Èí·¢Ã÷Windows Win32kÌáȨ0dayÒѱ»ÔÚҰʹÓÃ


1.jpg


΢Èí·¢Ã÷Windows Win32kÖеÄÌáȨ0day£¨CVE-2021-1732£©Òѱ»ÔÚҰʹÓ᣸ÃÎó²î±£´æÓÚwin32k.sys½¹µãÄÚºË×é¼þÖУ¬¹¥»÷Õß¿Éͨ¹ý´¥·¢ÊͷźóʹÓÃÎó²î½«ÆäȨÏÞÌáÉýµ½admin¼¶±ð£¬¾ßÓлù±¾Óû§È¨Ï޵Ĺ¥»÷Õß²»ÐèÒªÓëÓû§½»»¥¼´¿ÉʹÓøÃÎó²î¡£¾ÝÊӲ죬¸ÃÎó²îÒѱ»APT×éÖ¯BitterºÍT-APT-17ʹÓã¬DBAPPSecurityÔò³ÆÆäÓÚ12Ô·¢Ã÷ÁË¿ª·¢ÈÕÆÚΪ2020Äê5ÔµÄÑù±¾¡£¶ø×Ô2021Äê2ÔÂ×îÏÈ£¬ºÚ¿ÍÖ»ÔÚÉÙÊýÕë¶ÔÖж«µÄ¹¥»÷ÖÐʹÓÃÁËCVE-2021-1732Îó²î¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/recently-fixed-windows-zero-day-actively-exploited-since-mid-2020/


2.SonicWall¹Ì¼þ¸üÐÂÐÞ¸´SMA-100ÖÐÒѱ»Ê¹ÓõÄ0day


2.png


SonicWallÐû²¼Á˵ڶþ´Î¹Ì¼þ£¬ÒÔ¸üÐÂÐÞ¸´SMA-100ÖÐÒѱ»Ê¹ÓõÄ0day¡£¸ÃÎó²î±»×·×ÙΪCVE-2021-20016£¬CVSSÆÀ·Ö9.8£¬¿Éµ¼ÖÂSonicWall SSLVPN SMA100²úÆ·ÖеÄSQLÏÂÁîÎÞЧ£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓÃÆäÔÚSMA100°æ±¾10.xÉϾÙÐÐÆ¾Ö¤»á¼û¡£2ÔÂ3ÈÕ£¬SonicwallÐû²¼ÁËÕë¶Ô¸ÃÎó²îµÄ²¹¶¡£¬ÓÖÓÚ2ÔÂ19ÈÕÐû²¼¸Ã¹Ì¼þ¸üУ¬ÒÔÌṩ×ÔÉϴθüкó·¢Ã÷µÄÆäËû·À»¤²½·¥¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/114818/security/sonicwall-firmware-updates-sma-100.html


3.Sequoia CapitalÔâµ½´¹ÂÚ¹¥»÷£¬¿Í»§²ÆÎñÐÅϢй¶


3.png


ºìɼ×ÊÔ´£¨Sequoia Capital£©ÉÏÖÜÎ峯ÆäÔâµ½¹¥»÷£¬¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢ºÍ²ÆÎñÐÅϢй¶¡£ºìɼ×ÊÔ´Êǹè¹ÈÂÄÀú×ºñ£¬×îÀֳɵÄΣº¦Í¶×ʹ«Ë¾Ö®Ò»£¬ÖÎÀíµÄ×ʲúÁè¼Ý380ÒÚÃÀÔª£¬Í¶×ÊÁËAirbnb¡¢DoorDash¡¢FireEyeºÍ23andMeµÈ×éÖ¯¡£¸Ã¹«Ë¾³Æ´Ë´Î¹¥»÷ÊÇ¶ÔÆäÒ»ÃûÔ±¹¤¾ÙÐÐÀֳɵÄÍøÂç´¹ÂÚ¹¥»÷µÄЧ¹û£¬¿Í»§µÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢¿ÉÄÜÒѱ»µÚÈý·½»á¼û£¬ÏÖÔÚÔÚ°µÍøÉÐδ·¢Ã÷±»µÁÊý¾ÝµÄÉúÒâÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/02/sequoia-capital-told-investors-it-was.html


4.À³¿ËºÚµÂ´óѧÔâµ½¹¥»÷£¬Ñ§Ð£·þÎñϵͳÔÝʱ¹Ø±Õ


4.png


¼ÓÄô󰲼òªʡµÄÀ³¿ËºÚµÂ´óѧ£¨Lakehead University£©³ÆÆäÉÏÖܶþÔâµ½¹¥»÷£¬ÏÖÔÚѧУÅÌËã»úϵͳÈÔ´¦ÓÚÍÑ»ú״̬¡£¸Ã´óѧָ³ö¹¥»÷ÊÇÕë¶Ô´óѧµÄÎļþ¹²Ïí·þÎñÆ÷µÄ£¬Æä¼ì²éµ½¹¥»÷ºóÁ¬Ã¦×ö³öÏìÓ¦£¬É¾³ýÁËÖ±½ÓÁ´½Óµ½Îļþ¹²Ïí·þÎñÆ÷µÄËùÓлá¼û£¬²¢¹Ø±ÕÁËThunder BayºÍOrilliaÐ£ÇøµÄÍøÂç¡£ÏÖÔÚ¸ÃÊÂÎñÈÔÔÚÊÓ²ìÖУ¬ÒÔÈ·¶¨ÄÄЩ·þÎñÆ÷ºÍÐÅÏ¢Êܵ½ÁËÓ°Ï죬¸ÃѧУÉÐδ͸©СÎÒ˽¼Ò»ò²ÆÎñÐÅÏ¢ÊÇ·ñ±»Ð¹Â¶¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/02/cyber-attack-computer-systems-of.html


5.ÁãÊÛ¹«Ë¾KrogerÔâµ½¹¥»÷£¬Ô±¹¤ÐÅÏ¢ºÍÒ©·¿¼Í¼й¶


5.png


ÁãÊÛ¹«Ë¾KrogerÔâµ½¹¥»÷£¬Ô±¹¤ÐÅÏ¢ºÍÒ©·¿¼Í¼й¶¡£KrogerÊÇÈ«Çò×î´óµÄÁãÊÛÉÌÖ®Ò»£¬ÔÚ35¸öÖÝÓµÓнü2800¼ÒÊÐËÁ£¬2019ÄêµÄÏúÊÛ¶îÁè¼Ý1220ÒÚÃÀÔª¡£Kroger³Æ´Ë´Î¹¥»÷ÊÇÓÉÓÚAccellion FTAÈí¼þÖеÄij¸öÇå¾²Îó²îËùµ¼Ö£¬ºÚ¿ÍʹÓøÃÎó²îÇÔÈ¡Á˹«Ë¾ÁËÈËÁ¦×ÊÔ´Êý¾ÝºÍÒ©·¿¼Í¼¡£12ÔÂÖÐÑ®£¬Accelion·¢Ã÷ÆäFTAÇå¾²Îļþ´«Êä·þÎñÖб£´æÒѱ»Ê¹ÓõÄ0day¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/kroger-data-breach-exposes-pharmacy-and-employee-data/


6.F5Ðû²¼2021ÄêÆ¾Ö¤Ìî³ä¹¥»÷µÄÌ¬ÊÆÆÊÎö±¨¸æ


6.png


F5Ðû²¼ÁË2021ÄêÆ¾Ö¤Ìî³ä¹¥»÷µÄÌ¬ÊÆÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö£¬ÔÚ2016ÄêÖÁ2020Äêʱ´ú£¬Äê¶Èƾ֤×ß©ÊÂÎñµÄÊýÄ¿ÏÕЩ·­ÁËÒ»·¬£¬Ð¹Â¶Æ¾Ö¤µÄÊýĿȴÔÚϽµ£¬´Ó2016ÄêµÄ6300Íò¼Í¼Ï½µµ½2020ÄêµÄ1700Íò¼Í¼ £»µ½ÏÖÔÚΪֹ£¬ÃÜÂëµÄ´¿Îı¾´æ´¢ÊÇÔì³Éйƾ֤й¶µÄÖ÷ÒªÔµ¹ÊÔ­ÓÉ£¬¶ø¹ãΪÈËÖªµÄ¹þÏ£Ëã·¨MD5ÈÔÈ»ºÜÊÇÊ¢ÐÐ £»×éÖ¯ÔÚ¼ì²âºÍ·¢Ã÷ÈëÇÖºÍÊý¾Ýй¶·½ÃæÈÔÈ»ºÜÈõ¡£


Ô­ÎÄÁ´½Ó£º

https://www.f5.com/labs/articles/threat-intelligence/2021-credential-stuffing-report