Ñз¢ÍŶӽ¨¸´JavaScriptɳÏävm2·ì϶CVE-2022-36067
°ä²¼¹¦·ò 2022-10-13
¾Ý10ÔÂ11ÈÕ±¨Â·£¬ JavaScriptɳÏävm2´æÔÚÒ»¸öÑϳÁµÄÔ¶³Ì´úÂëÖ´Ðзì϶¡£vm2ÊÇÒ»¸öÊ¢ÐеÄNode¿â£¬ÓÃÓÚÔËÐдøÓб»ÁÐÈë°×Ãûµ¥µÄÄÚÖÃÄ£¿éµÄ²»ÊÜÐÅ´úÂ룬ÿÖÜÏÂÔØÁ¿¿¿½ü350Íò´Î¡£¸Ã·ì϶׷×ÙΪCVE-2022-36067£¬´úºÅΪSandbreak£¬CVSSÆÀ·ÖΪ10£¬¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÀ´ÌÓÒÝɳÏä²¢ÔÚÖ÷»úϵͳÉÏÖ´ÐÐËÁÒâºÅÁĿǰ£¬·ì϶ÒÑÔÚ2022Äê8ÔÂ28ÈÕ°ä²¼µÄ°æ±¾3.9.11Öеõ½½â¾ö¡£
https://www.bleepingcomputer.com/news/security/critical-vm2-flaw-lets-attackers-run-code-outside-the-sandbox/
2¡¢LockbitÍÅ»ïÀûÓÃExchangeÖеķì϶À´×°ÖöñÒâÈí¼þ
ýÌå10ÔÂ12Èճƣ¬LockbitÍÅ»ï½üÆÚÔÚͨ¹ý±»Ï°È¾µÄMicrosoft Exchange·þÎñÆ÷·Ö·¢¶ñÒâÈí¼þ¡£AhnLabй©£¬Ëûij¿Í»§µÄÁ½Ì¨·þÎñÆ÷ÔÚ7Ô·ÝϰȾÁËLockBit 3.0¡£¹¥»÷Õß×î³õÔÚ±»Ï°È¾µÄExchange·þÎñÆ÷ÉÏ×°ÖÃÁËWeb Shell£¬¶øºóÖ»ÓÃÁË7Ìì¾Í½«È¨ÏÞÌáÉýµ½Active DirectoryÖÎÀíÔ±£¬²¢ÔÚÇÔÈ¡ÁËÔ¼1.3 TBµÄÊý¾Ýºó¼ÓÃÜÁËÉ豸¡£×êÑÐÈËÔ±°µÊ¾£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÁËExchangeÖеÄδ¹«¿ªµÄ0 day¡£Ä¿Ç°£¬Î¢ÈíÔÚµ÷²é´ËÊÂÎñ¡£
https://securityaffairs.co/wordpress/136968/cyber-crime/microsoft-exchange-lockbit-ransomware.html
3¡¢Adobe 10Ô·ÝÖܶþ²¹¶¡½¨¸´¶à¸ö²úÆ·ÖеÄ29¸ö·ì϶
10ÔÂ11ÈÕ£¬Adobe°ä²¼Á˱¾ÔµÄÖܶþ²¹¶¡£¬½¨¸´Á˶à¸ö²úÆ·ÖеÄ29¸ö·ì϶¡£Õâ´Î½¨¸´µÄ×îΪÑϳÁµÄ¶ñ·ì϶ΪAdobe CommerceºÍMagentoÖеĴ洢ÐÍXSS·ì϶£¨CVE-2022-35698£©£¬CVSSÆÀ·ÖΪ10¡£Æä´ÎÊÇAdobe Cold FusionÖеĻùÓÚ²Ö¿âµÄ»º³åÇøÒç¶Âí½Å£¨CVE-2022-35710ºÍCVE-2022-35690£©ºÍ»ùÓڶѵĻº³åÇøÒç¶Âí½Å£¨CVE-2022-35711ºÍCVE-2022-35712£©£¬ËüÃǵÄCVSSÆÀ·Ö¾ùΪ9.8¡£´Ë±í£¬»¹½¨¸´ÁËAdobe AcrobatºÍReaderÒÔ¼°Adobe DimensionÖеĶà¸ö·ì϶¡£
https://www.securityweek.com/patch-tuesday-critical-flaws-coldfusion-adobe-commerce
4¡¢Fortinet·¢ÏÖÀûÓÃÎÚ¿ËÀ¼¾üÊÂÖ÷ÌâExcelµÄ¹¥»÷»î¶¯
FortinetÔÚ10ÔÂ11Èճƣ¬ÔÚ½üÆÚ¹Û²ìµ½Ô½À´Ô½¶àÀûÓöíÎÚì¶ÜÖ÷ÌâµÄ¹¥»÷»î¶¯¡£×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸ö´øÓжñÒâºêµÄExcelÎĵµ£¬Ëü¼Ù×°³ÉÒ»¸öÓÃÓÚÍÆËãÎÚ¿ËÀ¼¾üÊÂÈËԱнˮµÄµç×Ó±í¸ñ¹¤¾ß¡£¹¥»÷ʹÓõÄVBA´úÂëѡȡÁ˵¥Ò»µÄ»ìºÏ¼¼Êõ£¬Ô̺¬²»³É¶ÁµÄº¯ÊýºÍ±äÁ¿ÃûÀ´×ÌÈž²Ì¬·ÖÎö¡£´Ë±í£¬³ÁÒªÊý¾Ý±»±àÂëΪʮÁù½øÔì×Ö·û´®£¬Ô̺¬Ç¶ÈëµÄ¶ñÒâ¶þ½øÔìÎļþ¡£¹¥»÷»¹Ê¹ÓÃÁ˶à½×¶Î¼ÓÔØ·¨Ê½£¬²¢×îÖÕ×°ÖÃCobalt Strike Beacon¡£
https://www.fortinet.com/blog/threat-research/ukrainian-excel-file-delivers-multi-stage-cobalt-strike-loader
5¡¢ThreatFabricÅû¶Õë¶ÔÒâ´óÀû½ðÈÚ»ú¹¹µÄTOAD¹¥»÷»î¶¯
ThreatFabricÔÚ10ÔÂ12ÈÕµÄ×îÐÂ×êÑÐÏÔʾ£¬½«VishingÓëAndroidÒøÐжñÒâÈí¼þÏà½áºÏµÄÃæÏòµç»°µÄ¹¥»÷´«µÝ(TOAD)¹¥»÷ÔÚÕë¶ÔÒâ´óÀû½ðÈÚ»ú¹¹¡£½üÆÚ£¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öÕë¶ÔÒâ´óÀûÍøÉÏÒøÐÐÓû§µÄ´¹µöÍøÕ¾£¬Ö¼ÔÚÇÔÈ¡ËûÃǵÄÒøÐÐÆ¾Ö¤¡£×êÑÐÈËÔ±·ÖÎö³ÆÕâЩ»ùÓÚTOADµÄ»î¶¯ÒѾ³ÖÐøÁ˽üÒ»Ä꣬Ëü»á×°ÖÃÒ»¸öÒÆ¶¯Ä¾ÂíCopybara£¬ÆäÖØÒªÓÃÓÚͨ¹ý¶ÔÒâ´óÀûÓû§µÄ¸²¸Ç¹¥»÷À´Ö´ÐÐÉ豸ÉϵÄڲƻ¡£´Ë±í£¬¹¥»÷ÕßʹÓõĻù´¡ÉèÊ©»¹Äܹ»·Ö·¢¶ñÒâÈí¼þSMS Spy¡£
https://www.threatfabric.com/blogs/toad-fraud.html
6¡¢ESET°ä²¼POLONIUMÕë¶ÔÒÔÉ«ÁеĹ¥»÷»î¶¯µÄ·ÖÎö»ã±¨
10ÔÂ11ÈÕ£¬ESET°ä²¼Á˹ØÓÚESET°ä²¼POLONIUMÕë¶ÔÒÔÉ«ÁеĹ¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£×Ô2021Äê9ÔÂÒÔÀ´£¬POLONIUMÒѹ¥»÷Ê®¼¸¸öÒÔÉ«ÁеÄ×éÖ¯¡£×îеĻÔÚ2022Äê9Ô±»·¢ÏÖ£¬ÖØÒªÕë¶Ô¹¤³Ì¡¢ÐÅÏ¢¼¼Êõ¡¢Ë¾·¨¡¢Í¨Ñ¶¡¢Æ·ÅƺÍÓªÏú¡¢Ã½Ìå¡¢±£ÏÕºÍÉç»á·þÎñÐÐÒµ¡£POLONIUMµÄ¹¤¾ß¼¯ÓÉ7¸ö×Ô½ç˵ºóÃÅ×é³É£¬½ØÖÁĿǰËüÃÇÈÔ´¦Óڻ״̬¡£¸ÃÍŻﻹ¿ª·¢ÁËÓÃÓÚ½ØÆÁ¡¢¼üÅ̼ͼ¡¢Í¨¹ýÍøÂçÉãÏñÍ·½øÐмäµý»î¶¯¡¢´ò¿ªÄæÏòshellºÍÇÔÈ¡ÎļþµÈ×Ô½ç˵¹¤¾ß¡£C&CͨѶ·½Ã棬POLONIUMÀûÓÃÁËDropbox¡¢OneDriveºÍMegaµÈ³£¼ûµÄÔÆ·þÎñ¡£
https://www.welivesecurity.com/2022/10/11/polonium-targets-israel-creepy-malware/


¾©¹«Íø°²±¸11010802024551ºÅ