LinuxÄں˷ì϶CVE-2023-32233¿ÉÌáÉýÖÁrootȨÏÞ

°ä²¼¹¦·ò 2023-05-11

1¡¢LinuxÄں˷ì϶CVE-2023-32233¿ÉÌáÉýÖÁrootȨÏÞ


¾ÝýÌå5ÔÂ9ÈÕ±¨Â· £¬×êÑÐÈËÔ±·¢ÏÖÁËLinuxÄں˵ÄNetFilter¿ò¼ÜÖеÄзì϶£¨CVE-2023-32233£©¡£¸Ã·ì϶¿É±»±¾µØÓû§ÓÃÓÚ½«È¨ÏÞÌáÉýΪroot £¬²¢ÆëÈ«½ÚÔìϵͳ¡£ÎÊÌâµÄ±¾Ô­ÔÚÓÚtfilter nf_tablesÊÇÈôºÎ´¦ÖÃÅú´¦ÖÃÒªÇóµÄ £¬¾­¹ýÉí·ÝÑéÖ¤µÄ±¾µØ¹¥»÷Õß¿Éͨ¹ý·¢ËÍÌØÔìµÄÒªÇó·ÛËéNetfilter nf_tablesµÄÄÚ²¿×´Ì¬ £¬´Ó¶ø»ñµÃ¸ü¸ßȨÏÞ¡£¸Ã·ì϶ӰÏì¶à¸öLinuxÄں˰汾 £¬Ô̺¬µ±Ç°µÄ²»±ä°æ±¾v6.3.1¡£Ä¿Ç° £¬×êÑÐÈËÔ±»¹¿ª·¢ÁËÒ»¸öPoC¡£


https://securityaffairs.com/145989/security/linux-netfilter-kernel-flaw.html


2¡¢RuckusÖеķì϶CVE-2023-25717±»AndoryuBotÀûÓÃ


¾Ý5ÔÂ9ÈÕ±¨Â· £¬Fortinet·¢ÏÖDDoS½©Ê¬ÍøÂçAndoryuBotÀûÓÃRuckus Wireless AdminÖÐRCE·ì϶£¨CVE-2023-25717£©µÄ¹¥»÷¼¤Ôö¡£¶ñÒâÈí¼þͨ¹ýHTTP GETÒªÇóϰȾÉ豸 £¬¶øºó´ÓÓ²±àÂëURLÏÂÔØ¶î±íµÄ¾ç±¾ÒÔ½øÒ»²½´«²¼¡£±äÌåÄܹ»Õë¶Ô¶àÖÖϵͳ¼Ü¹¹ £¬Ô̺¬x86¡¢arm¡¢spcºÍm68kµÈ¡£Ï°È¾É豸ºó £¬¶ñÒâÈí¼þʹÓÃSOCKS´úÀíºÍ̸ÓëC2·þÎñÆ÷³ÉÁ¢Í¨Ñ¶ £¬ÒÔÒñ±ÎºÍÈÆ¹ý·À»ðǽ £¬¶øºóÆÚ´ýºÅÁî¡£¸Ã·ì϶ÓÚ2ÔÂ8ÈÕ±»·¢ÏÖ²¢½¨¸´ £¬PoCÒѹ«¿ª £¬½¨ÒéÓû§¾¡¿ì×°Öò¹¶¡¡£


https://securityaffairs.com/145980/cyber-crime/andoryubot-ddos-botnet.html


3¡¢CyberArk°ä²¼ÐµÄÀÕË÷Èí¼þ½âÃÜÆ÷White Phoenix


ýÌå5ÔÂ10ÈÕ³Æ £¬CyberArkÔÚ¶Ô²¿ÃżÓÃܵÄPDFÎļþ½øÐÐÊÔÑéºó¿ª·¢ÁËеÄÀÕË÷Èí¼þ½âÃÜÆ÷White Phoenix¡£Sentinel Labs³Æ £¬¼äЪÐÔ¼ÓÃÜÔÚÀÕË÷Èí¼þÁìÓòÔ½À´Ô½ÊÜÓ­½Ó¡£CyberArkÔò°µÊ¾ÕâÖÖÕ½Êõ¸ø¼ÓÃÜ´øÀ´ÁËÈõµã £¬ÓÉÓÚ²»¼ÓÃܲ¿ÃÅԭʼÎļþʹ¸´Ô­Êý¾Ý±äµÃ¿ÉÄÜ¡£¸Ã×Ô¶¯Êý¾Ý¸´Ô­¹¤¾ßºÏÓÃÓÚBlackCat/ALPHV¡¢Play ransomware¡¢Qilin/Agenda¡¢BianLianºÍDarkBit¼ÓÃܵÄÎļþ¡£µ«¼´±ãÀíÂÛÉÏÖ§³Ö £¬White PhoenixÒ²²»»áÔÚËùÓÐÇé¿ö϶¼²úÉúºÃµÄÁ˾Ö¡£


https://www.bleepingcomputer.com/news/security/new-ransomware-decryptor-recovers-data-from-partially-encrypted-files/


4¡¢Ê³Æ·¹«Ë¾SyscoÔâµ½¹¥»÷¿Í»§ºÍÔ±¹¤µÄÓ×ÎÒÐÅϢй¶


ýÌå5ÔÂ9ÈÕ±¨Â· £¬Ê³Æ··ÖÏú¹«Ë¾SyscoÔâµ½¹¥»÷µ¼Ö²¿ÃÅÐÅϢй¶¡£¹¥»÷»î¶¯Ê¼ÓÚ1ÔÂ14ÈÕ £¬¹¥»÷Õßδ¾­ÊÚȨ½Ó¼ûÆäϵͳ²¢ÇÔÈ¡Á˲¿ÃÅÊý¾Ý¡£¸Ã¹«Ë¾Ð¹Â© £¬ÆäÃÀ¹úºÍ¼ÓÄôóµÄ¿Í»§ºÍ¹©¸øÉÌÊý¾Ý £¬ÒÔ¼°ÃÀ¹úÔ±¹¤µÄÓ×ÎÒÐÅÏ¢ÔÚ¸ÃÊÂÎñÖÐÊܵ½Ó°Ïì¡£µ«¸ÃÊÂÎñ²¢Î´Ó°ÏìÆäÒµÎñÔËÓª £¬¿Í»§·þÎñҲδÖжÏ¡£Sysco°µÊ¾ £¬Æä°²È«ÍŶÓÖ´ÐÐÁ˶î±íµÄ± £»¤´ëÊ© £¬ÒÔÔ¤·À½«À´²úÉúÀàËÆµÄÎ¥¹æÐÐΪ¡£


https://www.bleepingcomputer.com/news/security/food-distribution-giant-sysco-warns-of-data-breach-after-cyberattack/


5¡¢BlackBerry·¢ÏÖSideWinder¹¥»÷°Í»ù˹̹µ±¾Ö»ú¹¹


5ÔÂ8ÈÕ £¬BlackBerry³ÆÆä·¢ÏÖÁËSideWinderÕë¶Ô°Í»ù˹̹µ±¾Ö»ú¹¹µÄ¹¥»÷»î¶¯¡ £»î¶¯ÓÚ2022Äê11ÔÂÏÂÑ®ÆðÍ· £¬Ê¹Óðͻù˹̹ˮʦսÕùѧԺ£¨PNWC£©Óйصĵö¶üÎļþ·Ö·¢Ò»¸ö»ùÓÚ.NETµÄÇáÁ¿¼¶ºóÃÅ£¨App.dll£© £¬¿ÉÄÜ´ÓÔ¶³Ì·þÎñÆ÷¼ìË÷ºÍÖ´ÐÐÏÂÒ»´ú¶ñÒâÈí¼þ¡£´Ë±í £¬¹¥»÷ÕßʹÓÃÁË»ùÓÚ·þÎñÆ÷µÄ¶à̬ÐÔ¼¼ÊõÀ´Èƹý´«Í³µÄ»ùÓÚÊðÃûµÄAV¼ì²â £¬²¢Í¨¹ýÏìÓ¦Á½¸ö·ÖÆç°æ±¾µÄÖÐÑëRTFÎļþÀ´·Ö·¢¶î±íµÄpayload¡£


https://blogs.blackberry.com/en/2023/05/sidewinder-uses-server-side-polymorphism-to-target-pakistan


6¡¢ESET°ä²¼2022ÄêQ4ÖÁ2023ÄêQ1 APT»î¶¯µÄ·ÖÎö»ã±¨


5ÔÂ9ÈÕ £¬ESET°ä²¼ÁË2022ÄêQ4ÖÁ2023ÄêQ1 APT»î¶¯µÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö £¬²¿ÃŹ¥»÷ÍÅ»ï°Ñ³Áµã·ÅÔÚÅ·ÖÞµÄ×éÖ¯ÉÏ £¬Ke3chang×°ÖÃÁËÒ»¸öеÄKetrican±äÌå £¬Mustang PandaÀûÓÃÁËÁ½¸öеĺóÃÅ¡£MirrorFaceÕë¶ÔÈÕ±¾ £¬Ê¹ÓÃÁËеĶñÒâÈí¼þ·Ö·¢²½Öè £¬¶øOperation ChattyGoblinÔòÈëÇÖÁË·ÆÂɱöµÄÒ»¼Ò²©²Ê¹«Ë¾¡£Ó¡¶ÈÓйØ×éÖ¯SideWinderºÍDonot TeamÒÀÈ»Õë¶ÔÄÏÑÇÈ·µ±¾Ö»ú¹¹ £¬Ç°ÕßÕë¶Ô½ÌÓýÐÐÒµ £¬ºóÕß³ÖÐø¿ª·¢Æäyty¿ò¼Ü¡£ÔÚÄÏÑÇ £¬×êÑÐÈËÔ±»¹·¢ÏÖÁË´óÁ¿µÄZimbraÓʼþ´¹µö¹¥»÷»î¶¯¡£


https://www.welivesecurity.com/2023/05/09/eset-apt-activity-report-q42022-q12023/