΢ÈíÐû²¼4Ô·ÝÇå¾²¸üР×ܼÆÐÞ¸´119¸öÎó²î

Ðû²¼Ê±¼ä 2022-04-14

΢ÈíÐû²¼4Ô·ÝÇå¾²¸üУ¬×ܼÆÐÞ¸´119¸öÎó²î


΢ÈíÔÚ4ÔÂ12ÈÕÐû²¼±¾ÔµÄÇå¾²¸üУ¬×ܹ²ÐÞ¸´ÁË119¸öÎó²î£¨²»°üÀ¨26¸öMicrosoft EdgeÎó²î£© ¡£´Ë´ÎÐÞ¸´µÄ2¸ö0day»®·ÖΪWindowsÓû§ÉèÖÃÎļþ·þÎñȨÏÞÌáÉýÎó²î£¨CVE-2022-26904£©ºÍWindowsͨÓÃÈÕÖ¾ÎļþϵͳÇý¶¯³ÌÐòȨÏÞÌáÉýÎó²î£¨CVE-2022-24521£© ¡£ÆäËü½ÏΪÑÏÖØÎó²î°üÀ¨Windows LDAPÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-26919£©¡¢Microsoft Dynamics 365(on-premises)Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-23259£©ºÍWindows Hyper-VÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2022-22008£©µÈ ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2022-patch-tuesday-fixes-119-flaws-2-zero-days/


ÐÂAndroidľÂíFakecallsÖ÷ÒªÕë¶Ôº«¹úµÄ½ðÈÚ»ú¹¹


4ÔÂ11ÈÕ£¬kasperskyÅû¶ÁËÐÂAndroidÒøÐÐľÂíFakecallsµÄÏêϸÐÅÏ¢ ¡£Fakecallsαװ³ÉÒøÐеÄÒÆ¶¯Ó¦ÓóÌÐò£¬Ö÷ÒªÕë¶Ôº«¹úµÄKakaoBankºÍKookmin Bank(KB)µÈÒøÐÐ ¡£ÓëÆäËüÒøÐÐľÂí²î±ð£¬Fakecalls¿ÉÒÔÄ£ÄâÓë¿Í»§Ö§³ÖµÄµç»°£¬µ±Ä¿µÄÊÔͼ´òµç»°¸øÒøÐÐʱ£¬Ëü»áÇжÏͨ»°²¢ÏÔʾÐéαµÄºô½Ð½çÃæ£¬Ö¼ÔÚͨ¹ýÐ®ÖÆÍ¨»°À´ÇÔȡĿµÄµÄÐÅÏ¢ ¡£ÏÖÔÚ£¬¸Ã¶ñÒâÈí¼þ½öÖ§³Öº«ÓÕâʹµÃʹÓÃÆäËüϵͳÓïÑÔµÄÓû§ºÜÈÝÒײì¾õµ½ÎÊÌâ ¡£


https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/


BlackCatÉù³Æ¶Ô·ðÂÞÀï´ï¹ú¼Ê´óѧµÄ¹¥»÷ÊÂÎñÈÏÕæ


¾ÝýÌå4ÔÂ11ÈÕ±¨µÀ£¬BlackCat(ALPHV)Éù³ÆÆäÈëÇÖÁË·ðÂÞÀï´ï¹ú¼Ê´óѧ²¢ÒÑÇÔÈ¡1.2 TBµÄÊý¾Ý£¬Éæ¼°ÌõÔ¼¡¢»á¼ÆÎļþ¡¢Éç»áÇå¾²ºÅÂëºÍµç×ÓÓʼþÊý¾Ý¿âµÈÐÅÏ¢ ¡£¸Ã´óѧ»ØÓ¦³Æ£¬ËûÃÇÒ»Ö±ÔÚÊÓ²ì´ËÊÂÎñ£¬µ½ÏÖÔÚΪֹûÓм£ÏóÅú×¢Ãô¸ÐÐÅÏ¢Òѱ»Ð¹Â¶ ¡£µ«Ñо¿Ö°Ô±Ö¤Êµ£¬±»µÁÊý¾ÝÖÐȷʵ°üÀ¨´óѧ½ÌÖ°Ô±¹¤ºÍѧÉúµÄÃô¸ÐÐÅÏ¢ ¡£Recorded FutureÌåÏÖ£¬×èÖ¹½ñÄê3Ô£¬ÆäÒѼͼÁË37ÆðÕë¶ÔѧУµÄÀÕË÷¹¥»÷£¬¶ø2021ÄêÕûÄêΪ127Æð ¡£


https://therecord.media/blackcat-ransomware-group-claims-attack-on-florida-international-university/


Ñз¢ÍŶÓÐÞ¸´DirectusÖд洢ÐÍXSSÎó²îCVE-2022-24814


¾Ý4ÔÂ11Èյı¨µÀ£¬Ñз¢ÍŶÓÐÞ¸´ÁËDirectusÖеĴ洢ÐÍXSSÎó²î£¨CVE-2022-24814£© ¡£DirectusÊÇÒ»¸ö¿ªÔ´µÄÄ£¿é»¯ÄÚÈÝÖÎÀíϵͳ(CMS)£¬¿ÉÓÃÓÚʹÓÃGraphQLºÍREST API°ü×°SQLÊý¾Ý¿â ¡£¸ÃÎó²îÓ°ÏìÁËDirectus v9.6.0¼°¸üÔç°æ±¾£¬±£´æÓÚCMSµÄÎļþÉÏ´«¹¦Ð§ÖÐ ¡£DirectusÚ¹ÊͳÆ£¬¹¥»÷Õß¿ÉÒÔͨ¹ý½«iframe²åÈ븻Îı¾HTML½çÃæÀ´Ö´ÐÐδ¾­ÊÚȨµÄJavaScript£¬¸Ã½çÃæÁ´½Óµ½ÎļþÉÏ´«µÄHTMLÎļþ£¬¸ÃÎļþÔÚÆä¾ç±¾±êÇ©ÖмÓÔØÁíÒ»¸öÉÏ´«µÄJSÎļþ ¡£


https://www.zdnet.com/article/xss-vulnerability-patched-in-directus-data-engine-platform/


AtlassianÌåÏÖÆä·þÎñÖÐÖ¹ÎÊÌâ¿ÉÄÜ»¹ÐèÒ»Á¬Á½ÖÜÒÔÉÏ


ýÌå4ÔÂ11Èճƣ¬¿ª·¢ºÍЭ×÷Èí¼þ¹«Ë¾AtlassianÔ¤¼Æ£¬Æä·þÎñÖÐÖ¹ÎÊÌâ¿ÉÄÜ»¹ÐèÒ»Á¬Á½ÖÜÒÔÉÏ ¡£ÏÖÔÚAtlassianÒÑÖÐÖ¹Ò»ÖÜ£¬Æä×î³õÔ¤¼Æ»Ö¸´ÊÂÇé²»»áÁè¼Ý¼¸Ì죬²¢È·ÈϸÃÊÂÎñ²»ÊÇÍøÂç¹¥»÷µ¼ÖµÄ ¡£È»¶ø£¬ËüÔÚ½üÆÚ·¢Ë͸øÓû§µÄÓʼþÖгÆ£¬ÓÉÓÚÍøÕ¾ÖØÐÞµÄÖØ´óÐÔ£¬¿ÉÄÜ»¹Ð賤´ïÁ½ÖܵÄʱ¼ä ¡£¸Ã¹«Ë¾ÌåÏÖ£¬ËûÃÇÏÖÔÚÒѾ­ÎªÁè¼Ý35%µÄÊÜÓ°ÏìÓû§Íê³ÉÁËÖØÐÞ£¬ÇÒûÓÐÊý¾ÝɥʧµÄÇéÐÎ ¡£


https://www.bleepingcomputer.com/news/technology/atlassian-says-ongoing-outage-might-last-two-more-weeks/


Unit42Ðû²¼2021ÄêµÚËÄÐò¶ÈWebÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


4ÔÂ11ÈÕ£¬Unit42Ðû²¼2021ÄêµÚËÄÐò¶ÈWebÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ ¡£±¨¸æÖ¸³ö£¬´Ó2021Äê10Ôµ½12Ô£¬Æä¼ì²âµ½Ô¼Äª533000Æð¶ñÒâµÇ¼URLÊÂÎñ£¬ÆäÖÐ120753¸öÊÇΨһURL£»»¹¼ì²âµ½Ô¼2900000¸ö¶ñÒâÖ÷»úURL£¬ÆäÖÐ165000¸öÊÇΨһURL ¡£ÕâЩ¶ñÒâURLÖеĴ󲿷ÖËÆºõÀ´×ÔÃÀ¹ú£¬Æä´ÎÊǶíÂÞ˹ºÍµÂ¹ú ¡£11Ôµ½12ÔµĹ¥»÷Ô˶¯±È9Ôµ½10Ô¸ü»îÔ¾£¬ÔÚ11Ôµִï·åÖµ ¡£¼ì²âµ½µÄ¶ñÒâÈí¼þÀàÐÍÖ÷ҪΪcryptominers¡¢JS downloaders¡¢web skimmers¡¢web scamsºÍJS redirectors ¡£


https://unit42.paloaltonetworks.com/web-threats-malicious-host-urls/




Çå¾²¹¤¾ß


Group3r


¿ìËÙö¾Ù AD ×éÕ½ÂÔÖеÄÏà¹ØÉèÖ㬲¢Ê¶±ðÆäÖпÉʹÓõĹýʧÉèÖà ¡£


https://github.com/Group3r/Group3r/


batfish


ÍøÂçÑéÖ¤¹¤¾ß£¬Í¨Ì«¹ýÎöÍøÂç×°±¸µÄÉèÖã¬ÎªÇå¾²ÐÔ¡¢¿É¿¿ÐԺͺϹæÐÔÌṩ׼ȷÐÔ°ü¹Ü ¡£


https://github.com/batfish/batfish


Smap


Smap ÊÇ Nmap µÄ¸´ÖÆÆ·£¬ËüʹÓà shodan.io µÄÃâ·Ñ API ¾ÙÐж˿ÚɨÃè ¡£


https://github.com/s0md3v/Smap



Çå¾²ÆÊÎö


CISA ÖÒÑÔ¶íÂÞ˹ºÚ¿ÍʹÓà WatchGuard Îó²î


https://www.bleepingcomputer.com/news/security/cisa-warns-orgs-of-watchguard-bug-exploited-by-russian-state-hackers/


ڲƭÕßͨ¹ýÔ¶³Ì»á¼û¹¤¾ßÔÚ 2021 ÄêÇÔÈ¡ 5800 ÍòÓ¢°÷


https://www.infosecurity-magazine.com/news/fraudster-steal-58m-2021-via/


µÚÈý¸ö¶ñÒâ npm °ü'event-source-polyfill' 


https://www.bleepingcomputer.com/news/security/third-npm-protestware-event-source-polyfill-calls-russia-out/


SystemBC ±»ÖÖÖÖ¹¥»÷ÕßʹÓÃ


https://asec.ahnlab.com/en/33600/


Anonymous¹¥»÷¶íÂÞ˹ 3 ¸ö×éÖ¯£¬Ð¹Â¶ 400 GB Êý¾Ý


https://www.hackread.com/anonymous-hits-russian-entities-leaks-400-gb-emails/


Qbot ¶ñÒâÈí¼þʹÓÃÐ嵀 Windows Installer ѬȾǰÑÔ


https://www.bleepingcomputer.com/news/security/qbot-malware-switches-to-new-windows-installer-infection-vector/