΢ÈíÐû²¼´øÍâ¸üÐÂÒÔ½â¾ö1Ô·ÝÖܶþ²¹¶¡µ¼ÖµÄÎÊÌâ
Ðû²¼Ê±¼ä 2022-01-19΢ÈíÐû²¼´øÍâ¸üÐÂÒÔ½â¾ö1Ô·ÝÖܶþ²¹¶¡µ¼ÖµÄÎÊÌâ

1ÔÂ18ÈÕ£¬£¬£¬Î¢ÈíÐû²¼½ôÆÈ´øÍâ(OOB)¸üУ¬£¬£¬ÒÔ½â¾öÓÉ2021Äê1ÔµÄÖܶþ²¹¶¡µ¼ÖµÄÖî¶àÎÊÌâ¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬´Ë¸üнâ¾öÁËÓëVPNÅþÁ¬¡¢Windows ServerÓò¿ØÖÆÖØÊÓÐÂÆô¶¯¡¢ÐéÄâ»úÆô¶¯Ê§°ÜÒÔ¼°ReFSÃûÌõĿÉÒÆ¶¯Ã½ÌåÎÞ·¨×°ÖÃÏà¹ØµÄÎÊÌâ¡£¡£´Ë´ÎÐû²¼µÄËùÓÐOOB¸üж¼¿ÉÒÔÔÚMicrosoft Update CatalogÉÏÏÂÔØ£¬£¬£¬ÆäÖв¿·Ö»¹ÄÜ×÷Ϊ¿ÉÑ¡¸üÐÂÖ±½Óͨ¹ýWindows Update×°Öᣡ£
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-oob-updates-for-january-windows-update-issues/
AWSÐÞ¸´ÐÅϢй¶Îó²îSuperglueºÍBreakingFormation
¾ÝýÌå1ÔÂ14ÈÕ±¨µÀ£¬£¬£¬AWSÒÑÐÞ¸´Æä²úÆ·ÖеÄ2¸öÐÅϢй¶Îó²î¡£¡£Õâ2¸öÎó²î¾ùÊÇÓÉOrca SecurityÍŶӷ¢Ã÷µÄ£¬£¬£¬ÆäÖеÄSuperglue±£´æÓÚAWS GlueЧÀÍÖУ¬£¬£¬ÊÇÄÚ²¿Ð§ÀÍAPIÉèÖùýʧµ¼Öµģ¬£¬£¬¿É±»ÓÃÀ´ÌáÉýȨÏÞ»á¼û¸ÃµØÇøµÄËùÓÐЧÀÍ×ÊÔ´£»£»£»£»£»£»ÁíÒ»¸öÊÇAWS CloudFormationЧÀÍÖеÄBreakingFormation£¬£¬£¬ÕâÊÇÒ»¸öXXEÎó²î£¬£¬£¬¿Éµ¼ÖÂAWS»ù´¡ÉèʩЧÀ͵ÄÎļþºÍƾ֤й¶¡£¡£
https://www.infosecurity-magazine.com/news/aws-patches-glue-bug-customer-data/
Ñо¿Ö°Ô±ÑÝʾÔõÑùʹÓõÚÈý·½Ó¦ÓÃÖÐÎó²î½âËøÌØË¹ÀÆû³µ
ýÌå1ÔÂ13ÈÕ±¨µÀ£¬£¬£¬19ËêµÄDavid Colombo³ÆÆä¿ÉÒÔÔ¶³Ì¿ØÖƶà¸ö¹ú¼ÒµÄ25Á¾ÌØË¹ÀÆû³µ¡£¡£ColomboÔÚ¾ßÓиú×ÙÆû³µÒƶ¯ºÍÔ¶³Ì½âËø³µÃŵȹ¦Ð§µÄµÚÈý·½Ó¦ÓÃÖз¢Ã÷Ò»¸öÎó²î£¬£¬£¬¸ÃÎó²îÔ´ÓÚÓ¦ÓÃÒÔ²»Çå¾²µÄ·½·¨´æ´¢ÓÃÀ´ÅþÁ¬Æû³µµÄÃô¸ÐÐÅÏ¢¡£¡£ÀÖ³ÉʹÓÃÎó²îºó³ýÁË¿ÉÒÔ¿ØÖÆÆû³µ£¬£¬£¬»¹¿ÉÒÔ»ñÈ¡Óû§ÐÅÏ¢¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬ËûÔڵ¹ú¡¢Ó¢¹ú¡¢ÃÀ¹ú¡¢¼ÓÄôóºÍÖйúµÈ¹ú¼Ò»¹·¢Ã÷ÁËÁè¼Ý125Á¾¿É±»¿ØÖƵÄÌØË¹ÀÆû³µ¡£¡£
https://www.vice.com/en/article/akv7z5/how-a-hacker-controlled-dozens-of-teslas-using-a-flaw-in-third-party-app
NFTƽ̨Lympo±»²»·¨»á¼û£¬£¬£¬Ôì³ÉÔ¼1870ÍòÃÀÔªËðʧ
ýÌå1ÔÂ16Èճƣ¬£¬£¬NFTƽ̨LympoÔâµ½ÍøÂç¹¥»÷£¬£¬£¬Ôì³ÉÔ¼1870ÍòÃÀÔªËðʧ¡£¡£¸Ã¹«Ë¾Ðû²¼µÄ¾¯±¨ÌåÏÖ£¬£¬£¬¹¥»÷±¬·¢ÔÚ2022Äê1ÔÂ10ÈÕÏÂÖç2:32×óÓÒ£¨UTC+2£©£¬£¬£¬¹¥»÷ÕßÏë·¨»á¼ûÁËLympoµÄÈÈÇ®°ü£¬£¬£¬²¢´ÓÖÐÇÔÈ¡ÁËԼĪ1.652ÒÚ¸öLMT¡£¡£ÓÉÓÚÔâµ½ÍøÂç¹¥»÷£¬£¬£¬LMTµÄ¼ÛֵϵøÁè¼Ý92%¡£¡£±¬·¢¹¥»÷ºó¸Ãƽ̨Á¬Ã¦½ÓÄÉÁËÓ¦¼±²½·¥£¬£¬£¬²¢ÁгöÁËÆäÕýÔÚ¼à¿ØµÄºÚ¿ÍÇ®°üµÄµØµã¡£¡£
https://securityaffairs.co/wordpress/126766/cyber-crime/lympo-ntf-platform-hacked.html
ÐÂÄ«Î÷¸çÖÝÀÎÓüMDCÔâµ½ÀÕË÷¹¥»÷±»ÆÈ½øÈëËø¶¨×´Ì¬
¾ÝMalwarebytes 1ÔÂ13ÈÕ±¨µÀ£¬£¬£¬ÐÂÄ«Î÷¸çÖݲ®ÄÉÀûÂåÏØµÄ´ó¶¼»á¾ÐÁôÖÐÐÄ£¨MDC£©Ôâµ½ÀÕË÷¹¥»÷¡£¡£¹¥»÷±¬·¢ÔÚ1ÔÂ5ÈÕÎçÒ¹ÖÁ5:30×óÓÒ£¬£¬£¬µ¼ÖÂÀÎÓüÍøÂçÅþÁ¬ÖÐÖ¹£¬£¬£¬´ó²¿·ÖÊý¾Ýϵͳ¡¢Çå¾²¼à¿ØºÍ×Ô¶¯ÃÅÎÞ·¨Ê¹Ó㬣¬£¬Çô·¸Ò²±»¹ØÔÚÀη¿Àï¡£¡£±ðµÄ£¬£¬£¬MDCµÄ¶à¸öÊý¾Ý¿âÒÑË𻵣¬£¬£¬2¸öÖ÷ÒªµÄϵͳ£ºÊÂÎñ¸ú×Ùϵͳ(ITS)ºÍ×ï·¸ÖÎÀíϵͳ(OMS)Ò²ÎÞ·¨»á¼û¡£¡£¾ÝϤ£¬£¬£¬MDC×Ô¼º²¢·Ç´Ë´Î¹¥»÷µÄÄ¿µÄ£¬£¬£¬¸ÃÏØµÄÕû¸öÍøÂçϵͳ¶¼Êܵ½Á˹¥»÷¡£¡£
https://blog.malwarebytes.com/ransomware/2022/01/ransomware-cyberattack-forces-new-mexico-jail-to-lock-down/
ÎÚ¿ËÀ¼¾¯·½µ·»ÙÒѹ¥»÷Î÷Å·µØÇø50¶à¸ö×éÖ¯µÄºÚ¿ÍÍÅ»ï
1ÔÂ13ÈÕ£¬£¬£¬ÎÚ¿ËÀ¼¾¯·½Ðû²¼Í¨¸æ³Æ¾Ð²¶ÁËÒ»¸öÀÕË÷¹¥»÷ÍŻ¡£¾¯·½ÌåÏÖ£¬£¬£¬¸Ã×éÖ¯Òѹ¥»÷ÃÀ¹úºÍÅ·ÖÞµØÇøÁè¼Ý50¸ö¹«Ë¾£¬£¬£¬ÆäÖÐ36ËêµÄÎÚ¿ËÀ¼Ê×¶¼»ù¸¨×¡Ãñ±»È·¶¨Îª¸Ã×éÖ¯µÄÍ·Ä¿£¬£¬£¬³ÉÔ±°üÀ¨ËûµÄÆÞ×ÓºÍÆäËûÈýÃûÊìÈË£¬£¬£¬¾ÝÔ¤¼Æ¹¥»÷Ôì³ÉµÄ×ÜËðʧÁè¼ÝÒ»°ÙÍòÃÀÔª¡£¡£ÏÖÔÚÉв»ÇåÎú¸ÃÍÅ»ïʹÓúÎÖÖÀÕË÷Èí¼þÀ´¼ÓÃÜÄ¿µÄÅÌËã»úÉϵÄÊý¾Ý£¬£¬£¬µ«ËûÃÇͨ¹ýÀ¬»øÓʼþ·Ö·¢¶ñÒâÈí¼þ¡£¡£³ýÁËÀÕË÷¹¥»÷£¬£¬£¬¸ÃÍŻﻹÌṩIPµØµãÓÕÆÐ§ÀÍ¡£¡£
https://www.bleepingcomputer.com/news/security/ukranian-police-arrests-ransomware-gang-that-hit-over-50-firms/
Çå¾²¹¤¾ß
RAUDI
RAUDIͨ¹ýGitHub ActionsΪ¿ª·¢Ö°Ô±Î´ÌṩµÄ¹¤¾ß×Ô¶¯ÌìÉú²¢¼á³Ö¸üÐÂһϵÁÐDocker ¾µÏñ¡£¡£
https://github.com/cybersecsi/RAUDI
Driftwood
Driftwood ÊÇÒ»ÖÖ¹¤¾ß£¬£¬£¬¿ÉÈÃÄú²éÕÒ˽ԿÊÇ·ñÓÃÓÚ TLS µÈÓÃ;£¬£¬£¬»òÕßÓÃ×÷Óû§µÄ GitHub SSH ÃÜÔ¿¡£¡£
https://github.com/trufflesecurity/driftwood
SpoofThatMail
ÓÃÓÚ¼ì²éÊÇ·ñ¿ÉÒÔÆ¾Ö¤DMARC¼Í¼ÓÕÆÓò»òÓòÁбíµÄ Bash ¾ç±¾
https://github.com/v4d1/SpoofThatMail
Çå¾²ÆÊÎö
CVE-2022-0215:¿çÕ¾ÇëÇóαÔìÎó²î
3¸öWordPress ²å¼þÖеĿçÕ¾ÇëÇóαÔìÎó²îÓ°ÏìÁË 84,000 ¸öÍøÕ¾¡£¡£
https://thehackernews.com/2022/01/high-severity-vulnerability-in-3.html
Chromium ä¯ÀÀÆ÷×÷·Ïɾ³ýĬÈÏËÑË÷ÒýÇæµÄÑ¡Ïî
Chromium ä¯ÀÀÆ÷иü¸ÄʹÓû§ÎÞ·¨É¾³ýĬÈÏËÑË÷ÒýÇæ£¬£¬£¬°üÀ¨Edge¡¢Chrome ºÍ Vivaldi¡£¡£
https://news.softpedia.com/news/chromium-browsers-lose-option-to-remove-default-search-engines-534697.shtml
Ñо¿Ö°Ô±¿ª·¢ CAPTCHA Çó½âÆ÷ÒÔ×ÊÖú°µÍøÑо¿
Ñо¿Ö°Ô±¿ª·¢ÁËÒ»ÖÖ»ùÓÚ»úеѧϰµÄÑéÖ¤ÂëÇó½âÆ÷£¬£¬£¬ËûÃÇÉù³Æ¿ÉÒÔսʤÆáºÚÍøÕ¾ÉÏ 94.4% µÄÌôÕ½¡£¡£
https://www.bleepingcomputer.com/news/security/researchers-develop-captcha-solver-to-aid-dark-web-research/
Android Óû§ÏÖÔÚ¿ÉÒÔ½ûÓà 2G À´×èÖ¹ Stingray ¹¥»÷
¹È¸èÔÚ Android ÉÏÍÆ³öÁËÒ»¸öÑ¡Ï£¬£¬ÔÊÐíÓû§½ûÓà 2G ÅþÁ¬ÒÔ×èÖ¹±»Ðí¶à·äÎÑÕ¾µãÄ£ÄâÆ÷ʹÓõÄÒþ˽ºÍÇå¾²ÎÊÌâ¡£¡£
https://www.bleepingcomputer.com/news/security/android-users-can-now-disable-2g-to-block-stingray-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ