GoogleÐÞ¸´ChromeÖÐÒѱ»Ê¹ÓõÄ0 day CVE-2022-1096
Ðû²¼Ê±¼ä 2022-03-29GoogleÐÞ¸´ChromeÖÐÒѱ»Ê¹ÓõÄ0 day CVE-2022-1096
3ÔÂ25ÈÕ£¬£¬£¬GoogleÐû²¼ÁËÒ»¸ö½ôÆÈ¸üУ¬£¬£¬ÐÞ¸´ChromeÖÐÒѱ»Ê¹ÓõÄ0 day£¨CVE-2022-1096£©¡£¡£¡£ÕâÊÇV8 JavaScriptÒýÇæÖеÄÀàÐÍ»ìÏýÎó²î£¬£¬£¬ÀÖ³ÉʹÓøÃÎó²î¿ÉÔÚ»º³åÇø½çÏßÍâ¶ÁÈ¡»òдÈëÄÚ´æ²¢µ¼ÖÂä¯ÀÀÆ÷Í߽⣬£¬£¬µ«Ò²¿É±»ÓÃÀ´Ö´ÐÐí§Òâ´úÂë¡£¡£¡£Ö»¹ÜGoogleÌåÏÖÒÑÔÚÒ°Íâ¼ì²âµ½Ê¹ÓÃÕâ¸öʹÓøÃÎó²îµÄ¹¥»÷£¬£¬£¬µ«Æä²¢Ã»ÓзÖÏí¹¥»÷»î¶¯µÄÊÖÒÕϸ½ÚµÈÐÅÏ¢¡£¡£¡£ÕâÊÇGoogleÔÚ2022ÄêÐÞ¸´µÄµÚ¶þ¸öChrome 0day£¬£¬£¬µÚÒ»¸öÊÇÊͷźóʹÓÃÎó²î£¨CVE-2022-0609£©£¬£¬£¬ÓÚ2ÔÂ14ÈÕÐÞ¸´¡£¡£¡£
https://thehackernews.com/2022/03/google-issues-urgent-chrome-update-to.html
Î÷²¿Êý¾ÝÐÞ¸´²úÆ·ÖÐÔ½½ç¶Ñ¶ÁдÎó²îCVE-2021-44142
¾ÝýÌå3ÔÂ26ÈÕ±¨µÀ£¬£¬£¬Î÷²¿Êý¾Ý£¨Western Digital£©ÐÞ¸´ÁËÆäMy Cloud NASÉè±¹ØÁ¬ÄÎó²î£¨CVE-2021-44142£©¡£¡£¡£ÕâÊÇSamba vfs_fruit VFSÄ£¿£¿£¿£¿£¿éÖеÄÔ½½ç¶Ñ¶Á/дÎó²î£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÆäÔÚ×°±¸ÉÏÒÔrootȨÏÞÔ¶³ÌÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¸Ã¹«Ë¾Ú¹Êͳƣ¬£¬£¬ÔÚsmbdÖз¿ªÎļþʱ£¬£¬£¬¸ÃÎó²î±£´æÓÚÀ©Õ¹ÊôÐÔ(EA)ÔªÊý¾ÝµÄÆÊÎöÖУ¬£¬£¬ÒÑͨ¹ý´ÓÉèÖõÄVFS¹¤¾ßÁбíÖÐɾ³ý¡°fruit¡±VFSÄ£¿£¿£¿£¿£¿é²¢¸ü¸ÄEAÖ§³ÖÉèÖþÙÐÐÐÞ¸´¡£¡£¡£
https://www.bleepingcomputer.com/news/security/western-digital-fixes-critical-bug-giving-root-on-my-cloud-nas-devices/
Sophos Firewall²úÆ·Öб£´æRCEÎó²îCVE-2022-1040
3ÔÂ25ÈÕ£¬£¬£¬SophosÅû¶ӰÏìÆäFirewall°æ±¾18.5 MR3(18.5.3)¼°¸üµÍ°æ±¾µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-1040£©µÄϸ½Ú¡£¡£¡£ÕâÊÇÓÉÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îµ¼Öµģ¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬¹¥»÷ÕßʹÓøÃÎó²î¿ÉÒÔÔÚ»á¼û·À»ðǽµÄÓû§ÃÅ»§»òWebadmin½çÃæÊ±ÈÆ¹ýÉí·ÝÑéÖ¤²¢Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬ÆôÓÃÁËĬÈϹ¦Ð§¡°ÔÊÐí×Ô¶¯×°ÖÃÐÞ¸´³ÌÐò¡±µÄÓû§ÎÞÐèÌØÊâ²Ù×÷¼´¿ÉÐÞ¸´¸ÃÎó²î¡£¡£¡£Í³Ò»ÖÜ£¬£¬£¬Sophos»¹ÐÞ¸´ÆäUTM×°±¸ÖеÄ2¸öÎó²î£¨CVE-2022-0386ºÍCVE-2022-0652£©¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-sophos-firewall-vulnerability-allows-remote-code-execution/
Â׶ؾ¯·½¾Ð²¶ÉæÏÓÓëLAPSUS$ÍÅ»ïÓйصÄ7ÃûÏÓÒÉÈË
¾Ý3ÔÂ25ÈÕ±¨µÀ³Æ£¬£¬£¬Â׶ؾ¯·½¾Ð²¶ÁË7Ãû16ÖÁ21ËêµÄÏÓÒÉÈË£¬£¬£¬ÉæÏÓÓë»îÔ¾µÄÀÕË÷ÍÅ»ïLAPSUS$ÓйØÁª¡£¡£¡£¸ÃÍÅ»ïÔÚ½üÆÚ¹¥»÷ÁËNVIDIA¡¢ÈýÐÇ¡¢Óý±Ì¡¢LG¡¢Î¢ÈíºÍOktaµÈ¹«Ë¾¡£¡£¡£¾ÝϤ£¬£¬£¬Ò»¸ö16ËêµÄÅ£½òÉÙÄêÊǸÃÍÅ»ïµÄÖ÷ı£¬£¬£¬ËûÒÔWhite»òBreachbaseµÄÃûÒåͨ¹ýºÚ¿Í¹¥»÷ÀÛ»ý»ñµÃÁËÔ¼1400ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£¡£ÔÚÓëÉÌҵͬ°é±¬·¢ÕùÖ´ºó£¬£¬£¬Ëû£¨¡°White¡±£©µÄÐÕÃû¡¢µØµãºÍÉ罻ýÌåͼƬµÈСÎÒ˽¼ÒÐÅÏ¢±»ÆØ¹â¡£¡£¡£
https://thehackernews.com/2022/03/7-suspected-members-of-lapsus-hacker.html
JuniperÐû²¼MuhstikÕë¶ÔRedisЧÀÍÆ÷µÄÆÊÎö±¨¸æ
3ÔÂ24ÈÕ£¬£¬£¬JuniperÐû²¼±¨¸æ³ÆMuhstikÕýÔÚÆð¾¢Ê¹ÓÃRedisÖеÄÎó²î£¨CVE-2022-0543£©¡£¡£¡£¸ÃÎó²îÓÚ½ñÄê2Ô·ݱ»·¢Ã÷£¬£¬£¬ËüµÄÒ»¸öPoCÓÚ3ÔÂ10ÈÕÔÚGitHubÉϹûÕæ£¬£¬£¬¿ÉʹÓøÃÎó²îÔ¶³ÌÖ´ÐÐí§ÒâLua¾ç±¾²¢ÊµÏÖɳÏäÌÓÒÝ¡£¡£¡£JuniperÌåÏÖ£¬£¬£¬¾ÍÔÚPoCÐû²¼Ò»Ììºó£¬£¬£¬Muhstik×îÏÈÆð¾¢Ê¹ÓøÃÎó²î·Ö·¢Æä¶ñÒâÈí¼þ¡£¡£¡£Muhstik½«ÆäpayloadÃüÃûΪ¡°russia.sh¡±£¬£¬£¬Ê¹ÓÃwget»òcurl´ÓC2ÏÂÔØ£¬£¬£¬ÉúÑÄΪ¡°/tmp.russ¡±£¬£¬£¬²¢×îÖÕÖ´ÐС£¡£¡£
https://blogs.juniper.net/en-us/security/muhstik-gang-targets-redis-servers
SentinelLabsÐû²¼Scarab·Ö·¢ºóÃÅHeaderTipµÄ±¨¸æ
SentinelLabsÔÚ3ÔÂ24ÈÕÐû²¼±¨¸æ£¬£¬£¬ÏêÊöÁËScarabÐÂÒ»ÂֵĴ¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£3ÔÂ22ÈÕ£¬£¬£¬ÎÚ¿ËÀ¼CERT-UAÐû²¼ÁËÒ»·Ý¹ØÓÚ¹¥»÷ÍÅ»ïUAC-0026µÄÇ徲ͨ¸æ£¬£¬£¬Åû¶ÁË·Ö·¢ÃûΪHeaderTipµÄ¶ñÒâDLLµÄÓã²æÊ½´¹ÂڻµÄϸ½Ú¡£¡£¡£SentinelLabs½«¸Ã¶ñÒâÈí¼þÓëScarab APT¹ØÁªÆðÀ´£¬£¬£¬³ÆHeaderTipÓëScarabµÄ×Ô½ç˵ºóÃÅScironµÄ»ù´¡ÉèÊ©ÓÐÖØµþ£¬£¬£¬ÇÒºóÕß¿ÉÄܾÍÊÇHeaderTipµÄǰÉí¡£¡£¡£HeaderTipÊÇÒ»¸öÓÃC++±àдµÄ32λDLLÎļþ£¬£¬£¬¾ÞϸΪ9.7KB£¬£¬£¬½öÓÃÓÚ»ñÈ¡ÏÂÒ»½×¶ÎµÄpayload¡£¡£¡£
https://www.sentinelone.com/labs/chinese-threat-actor-scarab-targeting-ukraine/
Çå¾²¹¤¾ß
Access Undenied
ErmeticÐû²¼ÁËÒ»¸ö¿ªÔ´¹¤¾ß£¬£¬£¬ÓÃÓÚÖÎÀíAWSÖеÄAccessDeniedÊÂÎñ¡£¡£¡£
https://github.com/ermetic/access-undenied-aws
pdfrip
Óà Rust ±àдµÄ¿ìËÙµÄ PDF ÃÜÂëÆÆ½âÓ¦ÓóÌÐò£¬£¬£¬Å䱸³£¼ûµÄÃÜÂëÃûÌù¹½¨Æ÷ºÍ×ֵ乥»÷¡£¡£¡£
https://github.com/mufeedvh/pdfrip
OffensiveNotion
»ùÓÚ Notion Ìõ¼ÇÓ¦ÓóÌÐò¹¹½¨µÄÈ«¹¦Ð§ C2 ƽ̨¡£¡£¡£
https://github.com/mttaggart/OffensiveNotion/
Tiktok Scraper
´Ó TikTok ץȡ²¢ÏÂÔØÓÐÓõÄÐÅÏ¢£¬£¬£¬ÎÞÐèµÇ¼Ãû»òÃÜÂë¡£¡£¡£
https://github.com/soxoj/tiktok-scraper
Çå¾²ÆÊÎö
΢Èí£ºWindows 7 »Ö¸´¹âÅÌÔÚ×°Öà 1Ô·ݸüкó½«ÎÞ·¨Æô¶¯
https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-7-recovery-app-fails-after-january-updates/
ÃÀ¹ú³Æ¿¨°Í˹»ù¶Ô¹ú¼ÒÇå¾²×é³É²»¿É½ÓÊܵÄΣº¦
https://www.bleepingcomputer.com/news/security/us-says-kaspersky-poses-unacceptable-risk-to-national-security/
ÍøÂç´¹ÂÚ¹¤¾ß°üÒ»Ö±Éú³¤ÒÔÈÆ¹ýÇå¾²Èí¼þ
https://www.bleepingcomputer.com/news/security/phishing-kits-constantly-evolve-to-evade-security-software/
ÔõÑù¹¹½¨×Ô½ç˵¶ñÒâÈí¼þÆÊÎöɳÏä
https://thehackernews.com/2022/03/how-to-build-custom-malware-analysis.html
Elden RingÎó²îÊ¹Íæ¼ÒÏÝÈëÎÞÏÞéæÃüÑ»·
https://blog.malwarebytes.com/hacking-2/2022/03/elden-ring-exploit-traps-players-in-infinite-death-loop/