ÐÂÎó²îDirty PipeÓ°ÏìËùÓÐÖ÷Á÷µÄLinux¿¯Ðа汾
Ðû²¼Ê±¼ä 2022-03-09ÐÂÎó²îDirty PipeÓ°ÏìËùÓÐÖ÷Á÷µÄLinux¿¯Ðа汾
3ÔÂ7ÈÕ£¬Ñо¿Ö°Ô±Max KellermannÅû¶ÁËDirty PipeÎó²î£¨CVE-2022-0847£©µÄϸ½Ú£¬ÒÔ¼°Ò»¸ö¿´·¨ÑéÖ¤ (PoC) ¡£¹¥»÷Õß¿Éͨ¹ý×¢ÈëºÍÁýÕÖÖ»¶ÁÎļþÖеÄÊý¾Ý£¬»ñµÃrootȨÏÞ¡£¸ÃÎó²îÓ°ÏìÁËLinux Kernel 5.8¼°¸ü¸ß°æ±¾£¬ÉõÖÁ°üÀ¨Android×°±¸¡£KellermanÌåÏÖ£¬¸ÃÎó²îÀàËÆÓÚ2016ÄêÐÞ¸´µÄDirty COWÎó²î(CVE-2016-5195)¡£ÏÖÔÚ£¬ËüÒÑÔÚLinuxÄÚºË5.16.11¡¢5.15.25ºÍ5.10.102ÖÐÐÞ¸´¡£
https://www.bleepingcomputer.com/news/security/new-linux-bug-gives-root-on-all-major-distros-exploit-released/
¿ªÔ´Ó²¼þ¹«Ë¾Adafruitǰ¹ÍԱй¶Æä¿Í»§µÄ²¿·ÖÊý¾Ý
3ÔÂ4ÈÕ£¬¿ªÔ´Ó²¼þ¹«Ë¾AdafruitÈ·ÈÏÒ»¸ö¹ûÕæµÄGitHub´æ´¢¿âÖаüÀ¨Æä¿Í»§µÄ²¿·ÖÐÅÏ¢¡£ÕâЩÐÅÏ¢°üÀ¨ÐÕÃû¡¢ÓʼþµØµã¡¢Õ˵¥µØµã¡¢¶©µ¥ÏêϸÐÅÏ¢ºÍ¶©µ¥µÄ״̬µÈ¡£ÓÐȤµÄÊÇ£¬Ð¹Â¶Êý¾Ý²¢·ÇÀ´×ÔAdafruitµÄGitHub´æ´¢¿â£¬¶øÊÇÀ´×Ըù«Ë¾µÄÒ»Ãûǰ¹ÍÔ±£¬¸ÃÔ±¹¤ÔÚÆäGitHub´æ´¢¿âÖÐʹÓÃÁËÕæÊµµÄ¿Í»§ÐÅÏ¢¾ÙÐÐÅàѵºÍÊý¾ÝÆÊÎö²Ù×÷¡£ÏÖÔÚ£¬AdafruitÒÑ֪ͨ¸ÃÔ±¹¤É¾³ýÁËÏà¹ØµÄGitHub´æ´¢¿â¡£
https://www.bleepingcomputer.com/news/security/adafruit-discloses-data-leak-from-ex-employees-github-repo/
ASEC·¢Ã÷αװ³É˰Îñ·¢Æ±µÄ´¹ÂÚÓʼþ·Ö·¢Remcos RAT
ASECÔÚ3ÔÂ7ÈÕÐû²¼±¨¸æ£¬ÏêÊöÁËαװ³É˰Îñ·¢Æ±µÄ´¹ÂÚÓʼþ·Ö·¢Remcos RATµÄÔ˶¯¡£´¹ÂÚÓʼþµÄ¸½¼þTax.gz¿É±»½âѹËõ³ÉÃûΪTax.comµÄ¿ÉÖ´ÐÐÎļþ£¬ÈôÊÇÖ´ÐÐÇéÐÎÊÇ64λ±ã»áÖ±½ÓÏÂÔØ²¢Ö´ÐжñÒâÈí¼þ£»²»È»£¬»áÏÂÔØÒ»¸öpowershellÎļþ3xp1r3Exp.ps1¡£powershell¾ç±¾°üÀ¨ÎªUAC BypassÏÂÔØ¸Ô¶×ãļþ(version.dll)µÄÄÚÈÝ£¬Ëü»¹»á½¨ÉèÒ»¸ötrickÎļþ¼Ð(Mock Directory)£¬²¢Ê¹ÓÃDLLÐ®ÖÆÒªÁì¡£×îÖÕ£¬¸ÃÔ˶¯»á×°ÖÃRemcos RAT¡£
https://asec.ahnlab.com/en/32376/
Cluster25·¢Ã÷Õë¶ÔÃÀ¹úýÌåÐÐÒµ·Ö·¢RuRATµÄ´¹ÂÚÔ˶¯
Cluster25ÔÚ3ÔÂ3ÈÕ¹ûÕæÁËÐÂÒ»ÂÖ´¹ÂÚÔ˶¯µÄÏêϸÐÅÏ¢¡£2ÔÂ23ÈÕ£¬ÐÂÎÅýÌå×éÖ¯BleepingComputerÊÕµ½×Ô³ÆÊÇΣº¦×ÊÔ´¼ÒµÄÓʼþ£¬Éù³ÆÏ£ÍûͶ×Ê»ò¹ºÖÃÊÕ¼þÈ˵ÄÍøÕ¾¡£¾ÆÊÎö£¬ÕâÊÇÒ»´ÎÓã²æÊ½´¹ÂÚÔ˶¯¡£ÓʼþÀ´×ÔÀ´×ÔÓ¢¹úÐéÄâ·þÎñÆ÷¹«Ë¾IPµØµã£¬²¢ÒªÇóÄ¿µÄÏÂÔØVuxnerChat¾ÙÐÐ̸Ìì¡£Ò»µ©Ä¿µÄµã»÷¡°ÏÂÔØVuxner¡±£¬¾Í»áÏÂÔØÃûΪVuxnerChat.exeµÄÎļþ£¨55MB£©¡£Ö´ÐиÃexeÎļþºó£¬»áÊ×ÏÈ×°ÖÃÒ»¸öÕýµ±Èí¼þTrillian£¬×îÖÕʹÓøÃÈí¼þ×°ÖÃRuRAT¡£
https://cluster25.io/2022/03/03/rurat-used-in-spear-phishing-attacks-against-media-organisations-in-united-states/
KasperskyÐû²¼2021ϰëÄêICSÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ
3ÔÂ3ÈÕ£¬KasperskyÐû²¼ÁË2021ϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³£¨ICS£©ÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö£¬ÔÚ2021ÄêH2KasperskyÔÚICS×ܹ²×èÖ¹ÁËÀ´×Ô5230¸ö¼Ò×åµÄ20000¶à¸ö¶ñÒâÈí¼þ±äÖÖ£»Ö÷ÒªÍþвȪԴÈÔÊÇ»¥ÁªÍø£¬Æä´ÎÊÇ¿ÉÒÆ¶¯×°±¸ºÍµç×ÓÓʼþ¿Í»§¶Ë£»ÔÚICSÅÌËã»úÖмì²âµ½µÄÌØ¹¤Èí¼þ¡¢¶ñÒâ¾ç±¾ºÍÍøÂç´¹ÂÚÒ³Ãæ¡¢¼ÓÃÜÇ®±Ò¿ó¹¤ºÍÀÕË÷Èí¼þµÄ°Ù·Ö±ÈÓÐËùÔöÌí£»Êܹ¥»÷ICSÅÌËã»úÕ¼±È×î¶àµÄµØÇøÎª¶«ÄÏÑÇ£¨47.6%£©£¬Æä´ÎÊÇ·ÇÖÞ£¨43.4%£©ºÍ¶«ÑÇ£¨40.5%£©¡£
https://ics-cert.kaspersky.com/publications/reports/2022/03/03/threat-landscape-for-industrial-automation-systems-statistics-for-h2-2021/
Rapid7Ðû²¼¹ØÓÚGitLabÖÐÎó²îCVE-2021-4191µÄ±¨¸æ
Rapid7ÔÚ3ÔÂ3ÈÕÐû²¼ÁË¿ªÔ´DevOpsÈí¼þGitLabÖÐÎó²îCVE-2021-4191µÄÆÊÎö±¨¸æ¡£¸ÃÎó²îÊÇÔÚÖ´ÐÐijЩGitLab GraphQL APIÅÌÎÊʱȱÉÙÉí·ÝÑéÖ¤¼ì²éµ¼Öµģ¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓÃÆä»Ö¸´ÓëÓû§Ïà¹ØµÄÐÅÏ¢£¬ÈçGitLabÓû§Ãû¡¢Ãû³ÆºÍµç×ÓÓʼþµØµãµÈ¡£ËüÓ°ÏìÁË×Ô13.0ÒÔÀ´µÄGitLab°æ±¾£¬¿ÉÓ뱩Á¦ÆÆ½âºÍƾ֤Ìî³ä¹¥»÷ÍŽáʹÓá£2ÔÂ25ÈÕ£¬GitLabÐû²¼Á˸ÃÎó²îµÄÐÞ¸´³ÌÐò¡£
https://www.rapid7.com/blog/post/2022/03/03/cve-2021-4191-gitlab-graphql-api-user-enumeration-fixed/
Çå¾²¹¤¾ß
IOC Scraper
ʹÓÃIOCPARSER·þÎñ´Ó²î±ðµÄ¹©Ó¦É̲©¿Í¡¢PDF ºÍ CSV ÎļþÖлñÈ¡ IOC¡£
https://github.com/chaitanyakrishna/iocscraper
Chaya
Ëüͨ¹ýÒþдÊõ¡¢ÃÜÂëѧºÍѹËõÀ´±£»¤Óû§µÄÒþ˽¡£
https://github.com/xerohackcom/chaya
Ocr Recon
´Ë¹¤¾ß¿ÉÓÃÓÚʹÓà tesseract µÄ OCR ¹¦Ð§ÔÚ URL ÁбíÖвéÕÒÌØ¶¨×Ö·û´®¡£
https://github.com/stark0de/ocr-recon
Project Ares
»ùÓÚ Transacted Hollowing ÊÖÒÕÓà C/C++ ±àдµÄ PoC ¼ÓÔØÆ÷¡£
https://github.com/Cerbersec/Ares
Epagneul
Epagneul ÊÇÒ»¸ö¿ÉÊÓ»¯ºÍÊÓ²ì Windows ÊÂÎñÈÕÖ¾µÄ¹¤¾ß¡£
Çå¾²ÆÊÎö
Windows 11 °æ±¾ 22H2 È·ÈϽñÄêÍíЩʱ¼äÍÆ³ö
https://news.softpedia.com/news/windows-11-version-22h2-confirmed-launch-later-this-year-534989.shtml
Æ»¹û±¾ÖÜ¿ÉÄÜÍÆ³ö M2 оƬ
https://news.softpedia.com/news/apple-could-launch-the-m2-chip-this-week-534990.shtml
Ñо¿Ö°Ô±Õ¹Ê¾Á˶Ô̬ͬ¼ÓÃܵÄвàÐŵÀ¹¥»÷
https://news.ncsu.edu/2022/03/stealing-homomorphic-encryption-data/
ÎÚ¿ËÀ¼´ó×ÚÍøÕ¾ÔâÊÜ´ó¹æÄ£¹¥»÷
https://securityaffairs.co/wordpress/128613/cyber-warfare-2/ukrainian-wordpress-sites-attacks.html
Ñо¿Ö°Ô±ÌåÏÖÉÙÓÚÆß¸ö×Ö·ûµÄÃÜÂë¿É¡°Á¬Ã¦¡±±»ÆÆ½â
https://www.darkreading.com/attacks-breaches/8-character-passwords-can-be-cracked-in-less-than-60-minutes


¾©¹«Íø°²±¸11010802024551ºÅ