ÃÀ¹ú»ªÊ¢¶ÙÌØÇøºÍ3¸öÖݸæ×´¹È¸è¼Óº¦Ïû·ÑÕßÒþÖÔ

°ä²¼¹¦·ò 2022-01-27

ÃÀ¹ú»ªÊ¢¶ÙÌØÇøºÍ3¸öÖݸæ×´¹È¸è¼Óº¦Ïû·ÑÕßÒþÖÔ


1ÔÂ24ÈÕ£¬»ªÊ¢¶Ù¸çÂ×±ÈÑÇÌØÇø¡¢µÂ¿ËÈøË¹ÖÝ¡¢»ªÊ¢¶ÙÖݺÍÓ¡µÚ°²ÄÉÖݵÄ×ܼì²ì³¤¶Ô¹È¸èÌá¸æ×´ËÏ¡£ËßËϳÆ£¬¹È¸èµÄÒµÎñ¹æÄ£´ï1.7ÍòÒÚÃÀÔª£¬²¿ÃÅÔ­ÒòÊÇËüÍøÂçÓû§ÐÅÏ¢²¢´ÓÖлñÀû¡£µ÷²éÏÔʾ£¬ÖÁÉÙ´Ó2014ÄêÆð£¬¹È¸è¾ÍÏòÏû·ÑÕß·¢³öÁËÐéαµÄÒþÖÔÉêÃ÷£¬ÔÚ´ËÉêÃ÷µÄ»ù´¡ÉÏ£¬»¹Ê¹ÓÃÁËÃûΪ¡°ÒõÓôģʽ¡±µÄÉè¼Æ£¬ÆÈʹÓû§ÔÊÐíËûÃǽӼû¸üÎÞÊý¾Ý¡£¹È¸èÐû³Æ¸ü¸ÄÉèÖÃÄܹ»±£»¤ÒþÖÔ£¬ÊÂʵÊÇ×Ô2014ÄêÒÔÀ´£¬ÎÞÂÛÓû§Ñ¡ÔñºÎÖÖÉèÖ㬹ȸ趼ϵͳµØ¼à¿ØÁËÓû§¡£


https://therecord.media/four-attorneys-general-sue-google-for-allegedly-deceiving-users-over-location-data/


¼ÓÄôó±í½»²¿Ôâµ½ÍøÂç¹¥»÷µ¼Ö²¿ÃÅ·þÎñÁÙʱÖжÏ


¾ÝýÌå1ÔÂ25ÈÕ±¨Â·£¬¼ÓÄôóÈ«ÇòÊÂÎñ²¿(GAC)µÄϵͳÔÚÉÏÖÜÔâµ½ÍøÂç¹¥»÷ºóÃæ¶ÔÍøÂçÖжÏ¡£GACÊǼÓÄôó¹Ù·½×éÖ¯£¬Õƹܴ¦ÖøùúµÄ±í½»ºÍÁìʹØÏµ¡¢¹ú¼ÊÒµÎñÒÔ¼°¸¨µ¼¹ú¼Ê·¢Õ¹ºÍÈË·Ö÷ÒåÔöÔ®´òËã¡£¹¥»÷ÓÚ1ÔÂ19ÈÕ±»¼ì²âµ½£¬ÏÖÒѲÉÈ¡ÁË»º½â´ëÊ©ÇÒϵͳÔÚ¸´Ô­£¬µ«²¿ÃÅ·þÎñÈÔ²»³ÉÓá£Ëæ×ŵ÷²éµÄ³ÖÐø£¬¹Ù·½ÐÂÎÅÆðÔ´ÉÐδй©¹¥»÷µÄÔ­Òò»ò±³ºóµÄ¹¥»÷ÕßÊÇË­¡£


https://www.bleepingcomputer.com/news/security/canadas-foreign-affairs-ministry-hacked-some-services-down/


ºÚ¿Í×éÖ¯Ðû³ÆÒÑÈëÇÖ²¢¼ÓÃܰ׶íÂÞ˹¹ú¶ÈÌú·¾ÖµÄϵͳ


ýÌå1ÔÂ24ÈÕ±¨Â·£¬Belarusian Cyber-PartisansÐû³ÆÒÑÈëÇÖ²¢¼ÓÃܰ׶íÂÞ˹¹ú¶ÈÌú·¾Ö£¨Belarusian Railway£©µÄϵͳ¡£¸ÃÍŻﰵʾ£¬ËûÃÇÒѾ­¼ÓÃÜÁËBRµÄ²¿ÃÅ·þÎñÆ÷¡¢Êý¾Ý¿âºÍ¹¤×÷Õ¾ÒÔÖÐ¶ÏÆäÔËÓª£¬µ«²¢Î´¹¥»÷×Ô¶¯»¯ºÍ°²ÕûϵͳÒÔ·À³öÏÖ´¹Î£Çé¿ö¡£¹¥»÷Õß°ä²¼µÄ½ØÍ¼»¹ÏÔʾÁËÔÚÏßÊÛÆ±·þÎñÔÚ½øÐÐSQL²éÎÊʱ±¨´í¡£¸Ã¹«Ë¾ÉÐδ°ä²¼ÉêÃ÷£¬µ«ÆäÔÚÍøÕ¾ÉϳÆ£¬ÓÉÓÚ¼¼ÊõÔ­Òòµç×Ó¹Û¹âÖ¤¼þÇ©·¢·þÎñÁÙʱ²»³ÉÓá£


https://www.securityweek.com/belarus-hacktivists-target-railway-anti-russia-effort


¹¥»÷ÕßÀûÓÃPowerPoint·Ö·¢WarzoneºÍAgentTesla


ýÌå1ÔÂ24Èճƣ¬Netskope·¢ÏÖÁËÀûÓÃPowerPoint·Ö·¢WarzoneºÍAgentTeslaµÄ»î¶¯¡£¹¥»÷ʹÓõĶñÒâPowerPoint¸½¼þÔ̺¬ÁËͨ¹ýPowerShellºÍMSHTAÖ´Ðеĺ꣬¶øºóVBS¾ç±¾»á±»½øÐнâ³ýÍÌÍ´¦Ö㬲¢Ôö³¤ÐµÄWindows×¢²á±íÏîÒÔʵÏÖÓÆ¾Ã»¯£¬´Ó¶øÖ´ÐÐÁ½¸ö¾ç±¾£ºÒ»¸ö´Ó±í²¿URL»ñÈ¡AgentTesla£¬Áí¸ö½ûÓÃWindows Defender¡£Õâ´Î¹¥»÷Öеĵڶþ¸öpayloadÊÇWarzone£¬µ«Netskope²¢Ã»ÓÐÌṩÓйØËüµÄ¸ü¶àϸ½Ú¡£


https://www.bleepingcomputer.com/news/security/malicious-powerpoint-files-used-to-push-remote-access-trojans/


ÓÎÏ·ÒõÓôÖ®»ê3´æÔÚRCE·ì϶£¬¹Ù·½¹Ø¹ØÁª»ú·þÎñÆ÷


1ÔÂ24Èյı¨Â·³Æ£¬Bandai NamcoÒѹعØÒõÓôÖ®»ê3£¨Dark Souls III£©µÄPvPģʽ£¬²¢½«Æä·þÎñÆ÷ÀëÏß¡£Æ¾¾ÝRedditÉϵĻ㱨£¬¸ÃÓÎÏ·ÖдæÔÚÒ»¸öÔ¶³Ì´úÂëÖ´Ðзì϶£¬Äܹ»Èù¥»÷Õß½ÚÔìϵͳ¡¢½Ó¼ûÃô¸ÐÐÅÏ¢£¬ÉõÖÁÖ²Èë¶ñÒâÈí¼þ»òʹÓÃ×ÊÔ´½øÐÐÍڿ󡣿ª·¢ÈËÔ±°µÊ¾£¬¸Ã·ì϶½öÓëPCÓû§ÓйØ£¬XboxºÍPlayStationÓÎÏ·»ú²»ÊÜÓ°Ïì¡£¾ÝϤ£¬¸Ã·ì϶¿ÉÄÜÒ²´æÔÚÓÚ¼´½«ÍƳöµÄBandai NamcoÓÎÏ·Elden RingÖС£


https://threatpost.com/dark-souls-servers-down-rce-bug/177896/


pkexecÖеÄÌáȨ·ì϶PwnKitÓ°Ïì2009ÄêÒÔÀ´ËùÓа汾


1ÔÂ25ÈÕ£¬×êÑÐÈËÔ±Åû¶ÁËPolkitµÄpkexec×é¼þÖзì϶PwnKitµÄϸ½Ú¡£Polkit´æÔÚÓÚËùÓÐÖØÒªLinux¿¯Ðа汾µÄĬÈÏÅäÖÃÖС£PwnKit×·×ÙΪCVE-2021-4034£¬ÊÇÒ»¸öÄÚ´æ°Ü»µ·ì϶£¬ÔÊÐíËùÓзÇÌØÈ¨Óû§Ê¹ÓÃĬÈÏpolkitÅäÖûñµÃÖ¸±êϵͳµÄrootȨÏÞ¡£×êÑÐÈËÔ±Ö¸³ö£¬Õâ¸ö·ì϶ÒѾ­´æÔÚÁË12Ä꣬ӰÏìÁË×Ô2009Äê5ÔµÚÒ»¸ö°æ±¾°ä²¼ÒÔÀ´µÄËùÓÐpkexec¡£Polkit¿ª·¢ÈËÔ±ÒѾ­ÔÚGitLabÉϰ䲼¿ÉÓò¹¶¡¡£


https://www.bleepingcomputer.com/news/security/linux-system-service-bug-gives-root-on-all-major-distros-exploit-released/


°²È«¹¤¾ß


reFlutter


Flutter ÄæÏò¹¤³Ì¿ò¼Ü£¬Åú¸ÄÁË¿ìÕÕ·´ÐòÁл¯¹ý³Ì£¬ÒÔ·½±ãµÄ·½Ê½Ö´Ðж¯Ì¬·ÖÎö¡£


https://github.com/ptswarm/reFlutter


goCabrito


ÓÃÓÚ·¢ËÍÍøÂç´¹µö»î¶¯µÄ³¬µÈ×éÖ¯ºÍ½Ã½ÝµÄ¾ç±¾¡£


https://github.com/KINGSABRI/goCabrito


volana


ÌṩһÖÖµ¥Ò»µÄ²½ÖèÀ´°µ²ØÔÚÊÜϰȾ»úеÉÏÖ´ÐеĺÅÁî¡£


https://github.com/ariary/volana


Jira-Lens


ÊÇÒ»¸ö»ùÓÚ Python µÄ JIRA ·ì϶ɨÃèÆ÷¡£


https://github.com/MayankPandey01/Jira-Lens


weakpass


»ùÓÚ Weakpass ¹æ¶¨µÄÔÚÏßÌìÉúÆ÷£¬Æ¾¾ÝÓû§ÊäÈëµÄÒ»×éµ¥´ÊÌìÉúÒ»¸öµ¥´ÊÁбí¡£


https://github.com/zzzteph/weakpass


°²È«·ÖÎö


¹¥»÷Õß´Ë¿ÌÕý×Ô¶¯Õë¶Ô SonicWall RCE ·ì϶


https://www.bleepingcomputer.com/news/security/attackers-now-actively-targeting-critical-sonicwall-rce-bug/


΢Èí°ä·¢ Surface Duo µÄ Android 11 ¸üÐÂ


https://news.softpedia.com/news/microsoft-announces-android-11-update-for-surface-duo-534741.shtml


Trickbot ×¢Èë±äµÃ¸üÄѼì²âºÍ·ÖÎö


https://www.darkreading.com/vulnerabilities-threats/trickbot-injections-get-harder-to-detect-analyze


ÀÕË÷Èí¼þÍÅ»ï¼Ó´óÁ¦¶ÈÕÐļÄÚ²¿ÈËÔ±


https://www.bleepingcomputer.com/news/security/ransomware-gangs-increase-efforts-to-enlist-insiders-for-attacks/


Emotet À¬»øÓʼþʹÓü«¶È¹æµÄ IP µØÖ·ÌåʽÀ´Ìӱܼì²â


https://securityaffairs.co/wordpress/127108/malware/emotet-evasion-technique.html


Õë¶ÔÎÚ¿ËÀ¼µÄ NotPetya ºÍ WhisperGate ¹¥»÷µÄÕ½ÊõÓÐÀàËÆÖ®´¦


https://thehackernews.com/2022/01/experts-find-strategic-similarities-bw.html