΢Èí°ä²¼4Ô·ݰ²È«¸üР×ܼƽ¨¸´119¸ö·ì϶

°ä²¼¹¦·ò 2022-04-14

΢Èí°ä²¼4Ô·ݰ²È«¸üУ¬×ܼƽ¨¸´119¸ö·ì϶


΢ÈíÔÚ4ÔÂ12ÈÕ°ä²¼±¾Ôµİ²È«¸üУ¬×ܹ²½¨¸´ÁË119¸ö·ì϶£¨²»Ô̺¬26¸öMicrosoft Edge·ì϶£©¡£Õâ´Î½¨¸´µÄ2¸ö0day±ðÀëΪWindowsÓû§ÅäÖÃÎļþ·þÎñȨÏÞÌáÉý·ì϶£¨CVE-2022-26904£©ºÍWindowsͨÓÃÈÕÖ¾ÎļþϵͳÇý¶¯·¨Ê½È¨ÏÞÌáÉý·ì϶£¨CVE-2022-24521£©¡£ÆäËü½ÏΪÑϳÁ·ì϶Ô̺¬Windows LDAPÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2022-26919£©¡¢Microsoft Dynamics 365(on-premises)Ô¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2022-23259£©ºÍWindows Hyper-VÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2022-22008£©µÈ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2022-patch-tuesday-fixes-119-flaws-2-zero-days/


ÐÂAndroidľÂíFakecallsÖØÒªÕë¶Ôº«¹úµÄ½ðÈÚ»ú¹¹


4ÔÂ11ÈÕ£¬kasperskyÅû¶ÁËÐÂAndroidÒøÐÐľÂíFakecallsµÄ¾ßÌåÐÅÏ¢¡£Fakecalls¼Ù×°³ÉÒøÐеÄÒÆ¶¯ÀûÓ÷¨Ê½£¬ÖØÒªÕë¶Ôº«¹úµÄKakaoBankºÍKookmin Bank(KB)µÈÒøÐС£ÓëÆäËüÒøÐÐľÂí·ÖÆç£¬FakecallsÄܹ»·ÂÕÕÓë¿Í»§Ö§³ÖµÄµç»°£¬µ±Ö¸±êÊÔͼ´òµç»°¸øÒøÐÐʱ£¬Ëü»á¶Â½ØÍ¨»°²¢ÏÔʾÐéαµÄºô½Ð½çÃæ£¬Ö¼ÔÚͨ¹ý½Ù³Öͨ»°À´ÇÔȡָ±êµÄÐÅÏ¢¡£Ä¿Ç°£¬¸Ã¶ñÒâÈí¼þ½öÖ§³Öº«ÓÕâʹµÃʹÓÃÆäËüϵͳ˵»°µÄÓû§ºÜÈÝÒ×¾õ²ìµ½ÎÊÌâ¡£


https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/


BlackCatÐû³Æ¶Ô·ðÂÞÀï´ï¹ú¼Ê´óѧµÄ¹¥»÷ÊÂÎñÕÆ¹Ü


¾ÝýÌå4ÔÂ11ÈÕ±¨Â·£¬BlackCat(ALPHV)Ðû³ÆÆäÈëÇÖÁË·ðÂÞÀï´ï¹ú¼Ê´óѧ²¢ÒÑÇÔÈ¡1.2 TBµÄÊý¾Ý£¬Éæ¼°ºÏͬ¡¢¹ÜÕÊÎļþ¡¢Éç»á°²È«ºÅÂëºÍµç×ÓÓʼþÊý¾Ý¿âµÈÐÅÏ¢¡£¸Ã´óѧ»ØÓ¦³Æ£¬ËûÃÇÒ»ÏòÔÚµ÷²é´ËÊÂÎñ£¬µ½Ä¿Ç°ÎªÖ¹Ã»Óм£ÏóÅú×¢Ãô¸ÐÐÅÏ¢Òѱ»Ð¹Â¶¡£µ«×êÑÐÈËԱ֤ʵ£¬±»µÁÊý¾ÝÖеÄÈ·Ô̺¬´óѧ½ÌÈËÔ±¹¤ºÍѧÉúµÄÃô¸ÐÐÅÏ¢¡£Recorded Future°µÊ¾£¬½ØÖÁ½ñÄê3Ô£¬ÆäÒѼͼÁË37ÆðÕë¶ÔѧÌõÄÀÕË÷¹¥»÷£¬¶ø2021ÄêÕûÄêΪ127Æð¡£


https://therecord.media/blackcat-ransomware-group-claims-attack-on-florida-international-university/


Ñз¢ÍŶӽ¨¸´DirectusÖд洢ÐÍXSS·ì϶CVE-2022-24814


¾Ý4ÔÂ11Èյı¨Â·£¬Ñз¢ÍŶӽ¨¸´ÁËDirectusÖеĴ洢ÐÍXSS·ì϶£¨CVE-2022-24814£©¡£DirectusÊÇÒ»¸ö¿ªÔ´µÄÄ£¿é»¯ÄÚÈÝÖÎÀíϵͳ(CMS)£¬¿ÉÓÃÓÚʹÓÃGraphQLºÍREST API°ü×°SQLÊý¾Ý¿â¡£¸Ã·ì϶ӰÏìÁËDirectus v9.6.0¼°¸üÔç°æ±¾£¬´æÔÚÓÚCMSµÄÎļþÉÏ´«Ö°ÄÜÖС£DirectusÚ¹ÊͳÆ£¬¹¥»÷ÕßÄܹ»Í¨¹ý½«iframe²åÈ븻Îı¾HTML½çÃæÀ´Ö´ÐÐδ¾­ÊÚȨµÄJavaScript£¬¸Ã½çÃæÁ´½Óµ½ÎļþÉÏ´«µÄHTMLÎļþ£¬¸ÃÎļþÔÚÆä¾ç±¾±êÇ©ÖмÓÔØÁíÒ»¸öÉÏ´«µÄJSÎļþ¡£


https://www.zdnet.com/article/xss-vulnerability-patched-in-directus-data-engine-platform/


Atlassian°µÊ¾Æä·þÎñÖжÏÎÊÌâ¿ÉÄÜ»¹Ðè³ÖÐøÁ½ÖÜÒÔÉÏ


ýÌå4ÔÂ11Èճƣ¬¿ª·¢ºÍºÏ×÷Èí¼þ¹«Ë¾Atlassian¹À¼Æ£¬Æä·þÎñÖжÏÎÊÌâ¿ÉÄÜ»¹Ðè³ÖÐøÁ½ÖÜÒÔÉÏ¡£Ä¿Ç°AtlassianÒÑÖжÏÒ»ÖÜ£¬Æä×î³õ¹À¼Æ¸´Ô­¹¤×÷²»»á³¬¹ý¼¸Ì죬²¢È·ÈϸÃÊÂÎñ²»ÊÇÍøÂç¹¥»÷µ¼ÖµÄ¡£È»¶ø£¬ËüÔÚ½üÆÚ·¢Ë͸øÓû§µÄÓʼþÖгÆ£¬ÓÉÓÚÍøÕ¾³Á½¨µÄ¸´ÔÓÐÔ£¬¿ÉÄÜ»¹Ð賤´ïÁ½ÖܵŦ·ò¡£¸Ã¹«Ë¾°µÊ¾£¬ËûÃÇ´Ë¿ÌÒѾ­Îª³¬¹ý35%µÄÊÜÓ°ÏìÓû§ÊµÏÖÁ˳Á½¨£¬ÇÒûº±¼û¾ÝÃÔʧµÄÇé¿ö¡£


https://www.bleepingcomputer.com/news/technology/atlassian-says-ongoing-outage-might-last-two-more-weeks/


Unit42°ä²¼2021ÄêµÚËÄʱ¶ÈWebÍþÐ²Ì¬ÊÆµÄ·ÖÎö»ã±¨


4ÔÂ11ÈÕ£¬Unit42°ä²¼2021ÄêµÚËÄʱ¶ÈWebÍþÐ²Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬´Ó2021Äê10Ôµ½12Ô£¬Æä¼ì²âµ½Ô¼Äª533000Æð¶ñÒâµÇ¼URLÊÂÎñ£¬ÆäÖÐ120753¸öÊÇΨһURL£»»¹¼ì²âµ½Ô¼2900000¸ö¶ñÒâÖ÷»úURL£¬ÆäÖÐ165000¸öÊÇΨһURL¡£ÕâЩ¶ñÒâURLÖеĴó²¿ÃÅËÆºõÀ´×ÔÃÀ¹ú£¬Æä´ÎÊǶíÂÞ˹ºÍµÂ¹ú¡£11Ôµ½12ÔµĹ¥»÷»î¶¯±È9Ôµ½10Ô¸ü»îÔ¾£¬ÔÚ11Ô´ﵽ·åÖµ¡£¼ì²âµ½µÄ¶ñÒâÈí¼þÀàÐÍÖØÒªÎªcryptominers¡¢JS downloaders¡¢web skimmers¡¢web scamsºÍJS redirectors¡£


https://unit42.paloaltonetworks.com/web-threats-malicious-host-urls/




°²È«¹¤¾ß


Group3r


¼±¾çö¾Ù AD ×éÕ½ÊõÖеÄÓйØÉèÖ㬲¢¼ø±ðÆäÖпÉÀûÓõÄÃýÎóÅäÖá£


https://github.com/Group3r/Group3r/


batfish


ÍøÂçÑéÖ¤¹¤¾ß£¬Í¨¹ý¶ÈÎöÍøÂçÉ豸µÄÅäÖã¬Îª°²È«ÐÔ¡¢¿¿µÃסÐԺͺϹæÐÔÌṩÕýÈ·ÐÔ±£ÕÏ¡£


https://github.com/batfish/batfish


Smap


Smap ÊÇ Nmap µÄ¸´ÖÆÆ·£¬ËüʹÓà shodan.io µÄÃâ·Ñ API ½øÐж˿ÚɨÃè¡£


https://github.com/s0md3v/Smap



°²È«·ÖÎö


CISA ÖÒ¸æ¶íÂÞ˹ºÚ¿ÍÀûÓà WatchGuard ·ì϶


https://www.bleepingcomputer.com/news/security/cisa-warns-orgs-of-watchguard-bug-exploited-by-russian-state-hackers/


ڲƭÕßͨ¹ýÔ¶³Ì½Ó¼û¹¤¾ßÔÚ 2021 ÄêÇÔÈ¡ 5800 ÍòÓ¢°÷


https://www.infosecurity-magazine.com/news/fraudster-steal-58m-2021-via/


µÚÈý¸ö¶ñÒâ npm °ü'event-source-polyfill' 


https://www.bleepingcomputer.com/news/security/third-npm-protestware-event-source-polyfill-calls-russia-out/


SystemBC ±»¸÷À๥»÷ÕßʹÓÃ


https://asec.ahnlab.com/en/33600/


Anonymous¹¥»÷¶íÂÞ˹ 3 ¸ö×éÖ¯£¬Ð¹Â¶ 400 GB Êý¾Ý


https://www.hackread.com/anonymous-hits-russian-entities-leaks-400-gb-emails/


Qbot ¶ñÒâÈí¼þʹÓÃÐ嵀 Windows Installer ϰȾý½é


https://www.bleepingcomputer.com/news/security/qbot-malware-switches-to-new-windows-installer-infection-vector/