LinuxÄں˷ì϶CVE-2023-32233¿ÉÌáÉýÖÁrootȨÏÞ
°ä²¼¹¦·ò 2023-05-111¡¢LinuxÄں˷ì϶CVE-2023-32233¿ÉÌáÉýÖÁrootȨÏÞ
¾ÝýÌå5ÔÂ9ÈÕ±¨Â·£¬×êÑÐÈËÔ±·¢ÏÖÁËLinuxÄں˵ÄNetFilter¿ò¼ÜÖеÄзì϶£¨CVE-2023-32233£©¡£¸Ã·ì϶¿É±»±¾µØÓû§ÓÃÓÚ½«È¨ÏÞÌáÉýΪroot£¬²¢ÆëÈ«½ÚÔìϵͳ¡£ÎÊÌâµÄ±¾ÔÔÚÓÚtfilter nf_tablesÊÇÈôºÎ´¦ÖÃÅú´¦ÖÃÒªÇóµÄ£¬¾¹ýÉí·ÝÑéÖ¤µÄ±¾µØ¹¥»÷Õß¿Éͨ¹ý·¢ËÍÌØÔìµÄÒªÇó·ÛËéNetfilter nf_tablesµÄÄÚ²¿×´Ì¬£¬´Ó¶ø»ñµÃ¸ü¸ßȨÏÞ¡£¸Ã·ì϶ӰÏì¶à¸öLinuxÄں˰汾£¬Ô̺¬µ±Ç°µÄ²»±ä°æ±¾v6.3.1¡£Ä¿Ç°£¬×êÑÐÈËÔ±»¹¿ª·¢ÁËÒ»¸öPoC¡£
https://securityaffairs.com/145989/security/linux-netfilter-kernel-flaw.html
2¡¢RuckusÖеķì϶CVE-2023-25717±»AndoryuBotÀûÓÃ
¾Ý5ÔÂ9ÈÕ±¨Â·£¬Fortinet·¢ÏÖDDoS½©Ê¬ÍøÂçAndoryuBotÀûÓÃRuckus Wireless AdminÖÐRCE·ì϶£¨CVE-2023-25717£©µÄ¹¥»÷¼¤Ôö¡£¶ñÒâÈí¼þͨ¹ýHTTP GETÒªÇóϰȾÉ豸£¬¶øºó´ÓÓ²±àÂëURLÏÂÔØ¶î±íµÄ¾ç±¾ÒÔ½øÒ»²½´«²¼¡£±äÌåÄܹ»Õë¶Ô¶àÖÖϵͳ¼Ü¹¹£¬Ô̺¬x86¡¢arm¡¢spcºÍm68kµÈ¡£Ï°È¾É豸ºó£¬¶ñÒâÈí¼þʹÓÃSOCKS´úÀíºÍ̸ÓëC2·þÎñÆ÷³ÉÁ¢Í¨Ñ¶£¬ÒÔÒñ±ÎºÍÈÆ¹ý·À»ðǽ£¬¶øºóÆÚ´ýºÅÁî¡£¸Ã·ì϶ÓÚ2ÔÂ8ÈÕ±»·¢ÏÖ²¢½¨¸´£¬PoCÒѹ«¿ª£¬½¨ÒéÓû§¾¡¿ì×°Öò¹¶¡¡£
https://securityaffairs.com/145980/cyber-crime/andoryubot-ddos-botnet.html
3¡¢CyberArk°ä²¼ÐµÄÀÕË÷Èí¼þ½âÃÜÆ÷White Phoenix
ýÌå5ÔÂ10Èճƣ¬CyberArkÔÚ¶Ô²¿ÃżÓÃܵÄPDFÎļþ½øÐÐÊÔÑéºó¿ª·¢ÁËеÄÀÕË÷Èí¼þ½âÃÜÆ÷White Phoenix¡£Sentinel Labs³Æ£¬¼äЪÐÔ¼ÓÃÜÔÚÀÕË÷Èí¼þÁìÓòÔ½À´Ô½ÊÜÓ½Ó¡£CyberArkÔò°µÊ¾ÕâÖÖÕ½Êõ¸ø¼ÓÃÜ´øÀ´ÁËÈõµã£¬ÓÉÓÚ²»¼ÓÃܲ¿ÃÅÔʼÎļþʹ¸´ÔÊý¾Ý±äµÃ¿ÉÄÜ¡£¸Ã×Ô¶¯Êý¾Ý¸´Ô¹¤¾ßºÏÓÃÓÚBlackCat/ALPHV¡¢Play ransomware¡¢Qilin/Agenda¡¢BianLianºÍDarkBit¼ÓÃܵÄÎļþ¡£µ«¼´±ãÀíÂÛÉÏÖ§³Ö£¬White PhoenixÒ²²»»áÔÚËùÓÐÇé¿ö϶¼²úÉúºÃµÄÁ˾֡£
https://www.bleepingcomputer.com/news/security/new-ransomware-decryptor-recovers-data-from-partially-encrypted-files/
4¡¢Ê³Æ·¹«Ë¾SyscoÔâµ½¹¥»÷¿Í»§ºÍÔ±¹¤µÄÓ×ÎÒÐÅϢй¶
ýÌå5ÔÂ9ÈÕ±¨Â·£¬Ê³Æ··ÖÏú¹«Ë¾SyscoÔâµ½¹¥»÷µ¼Ö²¿ÃÅÐÅϢй¶¡£¹¥»÷»î¶¯Ê¼ÓÚ1ÔÂ14ÈÕ£¬¹¥»÷Õßδ¾ÊÚȨ½Ó¼ûÆäϵͳ²¢ÇÔÈ¡Á˲¿ÃÅÊý¾Ý¡£¸Ã¹«Ë¾Ð¹Â©£¬ÆäÃÀ¹úºÍ¼ÓÄôóµÄ¿Í»§ºÍ¹©¸øÉÌÊý¾Ý£¬ÒÔ¼°ÃÀ¹úÔ±¹¤µÄÓ×ÎÒÐÅÏ¢ÔÚ¸ÃÊÂÎñÖÐÊܵ½Ó°Ïì¡£µ«¸ÃÊÂÎñ²¢Î´Ó°ÏìÆäÒµÎñÔËÓª£¬¿Í»§·þÎñҲδÖжϡ£Sysco°µÊ¾£¬Æä°²È«ÍŶÓÖ´ÐÐÁ˶î±íµÄ±£»¤´ëÊ©£¬ÒÔÔ¤·À½«À´²úÉúÀàËÆµÄÎ¥¹æÐÐΪ¡£
https://www.bleepingcomputer.com/news/security/food-distribution-giant-sysco-warns-of-data-breach-after-cyberattack/
5¡¢BlackBerry·¢ÏÖSideWinder¹¥»÷°Í»ù˹̹µ±¾Ö»ú¹¹
5ÔÂ8ÈÕ£¬BlackBerry³ÆÆä·¢ÏÖÁËSideWinderÕë¶Ô°Í»ù˹̹µ±¾Ö»ú¹¹µÄ¹¥»÷»î¶¯¡£»î¶¯ÓÚ2022Äê11ÔÂÏÂÑ®ÆðÍ·£¬Ê¹Óðͻù˹̹ˮʦսÕùѧԺ£¨PNWC£©Óйصĵö¶üÎļþ·Ö·¢Ò»¸ö»ùÓÚ.NETµÄÇáÁ¿¼¶ºóÃÅ£¨App.dll£©£¬¿ÉÄÜ´ÓÔ¶³Ì·þÎñÆ÷¼ìË÷ºÍÖ´ÐÐÏÂÒ»´ú¶ñÒâÈí¼þ¡£´Ë±í£¬¹¥»÷ÕßʹÓÃÁË»ùÓÚ·þÎñÆ÷µÄ¶à̬ÐÔ¼¼ÊõÀ´Èƹý´«Í³µÄ»ùÓÚÊðÃûµÄAV¼ì²â£¬²¢Í¨¹ýÏìÓ¦Á½¸ö·ÖÆç°æ±¾µÄÖÐÑëRTFÎļþÀ´·Ö·¢¶î±íµÄpayload¡£
https://blogs.blackberry.com/en/2023/05/sidewinder-uses-server-side-polymorphism-to-target-pakistan
6¡¢ESET°ä²¼2022ÄêQ4ÖÁ2023ÄêQ1 APT»î¶¯µÄ·ÖÎö»ã±¨
5ÔÂ9ÈÕ£¬ESET°ä²¼ÁË2022ÄêQ4ÖÁ2023ÄêQ1 APT»î¶¯µÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬²¿ÃŹ¥»÷ÍÅ»ï°Ñ³Áµã·ÅÔÚÅ·ÖÞµÄ×éÖ¯ÉÏ£¬Ke3chang×°ÖÃÁËÒ»¸öеÄKetrican±äÌ壬Mustang PandaÀûÓÃÁËÁ½¸öеĺóÃÅ¡£MirrorFaceÕë¶ÔÈÕ±¾£¬Ê¹ÓÃÁËеĶñÒâÈí¼þ·Ö·¢²½Ö裬¶øOperation ChattyGoblinÔòÈëÇÖÁË·ÆÂɱöµÄÒ»¼Ò²©²Ê¹«Ë¾¡£Ó¡¶ÈÓйØ×éÖ¯SideWinderºÍDonot TeamÒÀÈ»Õë¶ÔÄÏÑÇÈ·µ±¾Ö»ú¹¹£¬Ç°ÕßÕë¶Ô½ÌÓýÐÐÒµ£¬ºóÕß³ÖÐø¿ª·¢Æäyty¿ò¼Ü¡£ÔÚÄÏÑÇ£¬×êÑÐÈËÔ±»¹·¢ÏÖÁË´óÁ¿µÄZimbraÓʼþ´¹µö¹¥»÷»î¶¯¡£
https://www.welivesecurity.com/2023/05/09/eset-apt-activity-report-q42022-q12023/


¾©¹«Íø°²±¸11010802024551ºÅ