΢Èí·¢ÏÖWindows Win32kÌáȨ0dayÒѱ»ÔÚÒ°ÀûÓã»SonicWall¹Ì¼þ¸üн¨¸´SMA-100ÖÐÒѱ»ÀûÓõÄ0day

°ä²¼¹¦·ò 2021-02-22

1.΢Èí·¢ÏÖWindows Win32kÌáȨ0dayÒѱ»ÔÚÒ°ÀûÓÃ


1.jpg


΢Èí·¢ÏÖWindows Win32kÖеÄÌáȨ0day£¨CVE-2021-1732£©Òѱ»ÔÚÒ°ÀûÓ᣸÷ì϶´æÔÚÓÚwin32k.sysÖ÷ÌâÄÚºË×é¼þÖУ¬¹¥»÷Õß¿Éͨ¹ý´¥·¢¿ªÊͺóʹÓ÷ì϶½«ÆäȨÏÞÌáÉýµ½admin¼¶±ð£¬ÓµÓиù»ùÓû§È¨Ï޵Ĺ¥»÷Õß²»±ØÒªÓëÓû§½»»¥¼´¿ÉÀûÓø÷ì϶¡£¾Ýµ÷²é£¬¸Ã·ì϶Òѱ»APT×éÖ¯BitterºÍT-APT-17ÀûÓã¬DBAPPSecurityÔò³ÆÆäÓÚ12Ô·¢ÏÖÁË¿ª·¢ÈÕÆÚΪ2020Äê5ÔµÄÑù±¾¡£¶ø×Ô2021Äê2ÔÂÆðÍ·£¬ºÚ¿ÍÖ»ÔÚÉÙÊýÕë¶ÔÖж«µÄ¹¥»÷ÖÐʹÓÃÁËCVE-2021-1732·ì϶¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/recently-fixed-windows-zero-day-actively-exploited-since-mid-2020/


2.SonicWall¹Ì¼þ¸üн¨¸´SMA-100ÖÐÒѱ»ÀûÓõÄ0day


2.png


SonicWall°ä²¼Á˵ڶþ´Î¹Ì¼þ£¬ÒÔ¸üн¨¸´SMA-100ÖÐÒѱ»ÀûÓõÄ0day¡£¸Ã·ì϶±»×·×ÙΪCVE-2021-20016£¬CVSSÆÀ·Ö9.8£¬¿Éµ¼ÖÂSonicWall SSLVPN SMA100²úÆ·ÖеÄSQLºÅÁîÎÞЧ£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÀûÓÃÆäÔÚSMA100°æ±¾10.xÉϽøÐÐÍ´´¦½Ó¼û¡£2ÔÂ3ÈÕ£¬Sonicwall°ä²¼ÁËÕë¶Ô¸Ã·ì϶µÄ²¹¶¡£¬ÓÖÓÚ2ÔÂ19ÈÕ°ä²¼¸Ã¹Ì¼þ¸üУ¬ÒÔÌṩ×ÔÉϴθüкó·¢ÏֵįäËû·À»¤´ëÊ©¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/114818/security/sonicwall-firmware-updates-sma-100.html


3.Sequoia CapitalÔâµ½´¹µö¹¥»÷£¬¿Í»§²ÆÕþÐÅϢй¶


3.png


ºìɼ±¾Ç®£¨Sequoia Capital£©ÉÏÖÜÎ峯ÆäÔâµ½¹¥»÷£¬¿Í»§Ó×ÎÒÐÅÏ¢ºÍ²ÆÕþÐÅϢй¶¡£ºìɼ±¾Ç®Êǹè¹È¾­Ñé×î·á˶£¬×î³É¹¦µÄ·çÏÕͶ×ʹ«Ë¾Ö®Ò»£¬ÖÎÀíµÄ×ʲú³¬¹ý380ÒÚÃÀÔª£¬Í¶×ÊÁËAirbnb¡¢DoorDash¡¢FireEyeºÍ23andMeµÈ×éÖ¯¡£¸Ã¹«Ë¾³ÆÕâ´Î¹¥»÷ÊÇ¶ÔÆäÒ»ÃûÔ±¹¤½øÐгɹ¦µÄÍøÂç´¹µö¹¥»÷µÄÁ˾Ö£¬¿Í»§µÄÓ×ÎҺͲÆÕþÐÅÏ¢¿ÉÄÜÒѱ»µÚÈý·½½Ó¼û£¬Ä¿Ç°ÔÚ°µÍøÉÐδ·¢ÏÖ±»µÁÊý¾ÝµÄÂòÂôÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/02/sequoia-capital-told-investors-it-was.html


4.À³¿ËºÚµÂ´óѧÔâµ½¹¥»÷£¬Ñ§Ì÷þÎñϵÍÂäÙʱ¹Ø¹Ø


4.png


¼ÓÄô󰲴ÖÂÔÊ¡µÄÀ³¿ËºÚµÂ´óѧ£¨Lakehead University£©³ÆÆäÉÏÖܶþÔâµ½¹¥»÷£¬Ä¿Ç°Ñ§ÌÃÍÆËã»úϵͳÈÔ´¦ÓÚÍÑ»ú״̬¡£¸Ã´óѧָ³ö¹¥»÷ÊÇÕë¶Ô´óѧµÄÎļþ¹²Ïí·þÎñÆ÷µÄ£¬Æä²é³­µ½¹¥»÷ºóµ±¼´×ö³öÏìÓ¦£¬É¾³ýÁËÖ±½ÓÁ´½Óµ½Îļþ¹²Ïí·þÎñÆ÷µÄËùÓнӼû£¬²¢¹Ø¹ØÁËThunder BayºÍOrilliaÐ£ÇøµÄÍøÂ硣Ŀǰ¸ÃÊÂÎñÈÔÔÚµ÷²éÖУ¬ÒÔÈ·¶¨ÄÄЩ·þÎñÆ÷ºÍÐÅÏ¢Êܵ½ÁËÓ°Ï죬¸ÃѧÌÃÉÐδ͸©Ó×ÎÒ»ò²ÆÕþÐÅÏ¢ÊÇ·ñ±»Ð¹Â¶¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/02/cyber-attack-computer-systems-of.html


5.ÁãÊÛ¹«Ë¾KrogerÔâµ½¹¥»÷£¬Ô±¹¤ÐÅÏ¢ºÍÒ©·¿¼Í¼й¶


5.png


ÁãÊÛ¹«Ë¾KrogerÔâµ½¹¥»÷£¬Ô±¹¤ÐÅÏ¢ºÍÒ©·¿¼Í¼й¶¡£KrogerÊÇÈ«Çò×î´óµÄÁãÊÛÉÌÖ®Ò»£¬ÔÚ35¸öÖÝÕ¼Óнü2800¼ÒÉ̵꣬2019ÄêµÄÏúÊ۶¹ý1220ÒÚÃÀÔª¡£Kroger³ÆÕâ´Î¹¥»÷ÊÇÓÉÓÚAccellion FTAÈí¼þÖеÄij¸ö°²È«·ì϶Ëùµ¼Ö£¬ºÚ¿ÍÀûÓø÷ì϶ÇÔÈ¡Á˹«Ë¾ÁËÈËÁ¦×ÊÔ´Êý¾ÝºÍÒ©·¿¼Í¼¡£12ÔÂÖÐÑ®£¬Accelion·¢ÏÔìäFTA°²È«Îļþ´«Êä·þÎñÖдæÔÚÒѱ»ÀûÓõÄ0day¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/kroger-data-breach-exposes-pharmacy-and-employee-data/


6.F5°ä²¼2021ÄêÆ¾Ö¤Ìî³ä¹¥»÷µÄÌ¬ÊÆ·ÖÎö»ã±¨


6.png


F5°ä²¼ÁË2021ÄêÆ¾Ö¤Ìî³ä¹¥»÷µÄÌ¬ÊÆ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬ÔÚ2016ÄêÖÁ2020ÄêÆÚ¼ä£¬Äê¶Èƾ֤й©ÊÂÎñµÄÊýÁ¿ÏÕЩ·­ÁËÒ»·¬£¬Ð¹Â¶Í´´¦µÄÊýÁ¿È´±ÉÈ˽µ£¬´Ó2016ÄêµÄ6300Íò¼Í¼½µÂäµ½2020ÄêµÄ1700Íò¼Í¼£»µ½Ä¿Ç°ÎªÖ¹£¬ÃÜÂëµÄ´¿Îı¾´æ´¢ÊÇÔì³Éйʹ´¦Ð¹Â¶µÄÖØÒªÔ­Òò£¬¶ø¹ãΪÈËÖªµÄ¹þÏ£Ëã·¨MD5ÒÀÈ»¼«¶ÈÊ¢ÐУ»×éÖ¯ÔÚ¼ì²âºÍ·¢ÏÖÈëÇÖºÍÊý¾Ýй¶·½ÃæÒÀÈ»ºÜÈõ¡£


Ô­ÎÄÁ´½Ó£º

https://www.f5.com/labs/articles/threat-intelligence/2021-credential-stuffing-report