GoogleÐÞ¸´ChromeÖÐÒѱ»Ê¹ÓõÄ0 day CVE-2022-1096

Ðû²¼Ê±¼ä 2022-03-29

GoogleÐÞ¸´ChromeÖÐÒѱ»Ê¹ÓõÄ0 day CVE-2022-1096


3ÔÂ25ÈÕ£¬£¬GoogleÐû²¼ÁËÒ»¸ö½ôÆÈ¸üУ¬£¬ÐÞ¸´ChromeÖÐÒѱ»Ê¹ÓõÄ0 day£¨CVE-2022-1096£©¡£¡£¡£ÕâÊÇV8 JavaScriptÒýÇæÖеÄÀàÐÍ»ìÏýÎó²î£¬£¬ÀÖ³ÉʹÓøÃÎó²î¿ÉÔÚ»º³åÇø½çÏßÍâ¶ÁÈ¡»òдÈëÄÚ´æ²¢µ¼ÖÂä¯ÀÀÆ÷Í߽⣬£¬µ«Ò²¿É±»ÓÃÀ´Ö´ÐÐí§Òâ´úÂë¡£¡£¡£Ö»¹ÜGoogleÌåÏÖÒÑÔÚÒ°Íâ¼ì²âµ½Ê¹ÓÃÕâ¸öʹÓøÃÎó²îµÄ¹¥»÷£¬£¬µ«Æä²¢Ã»ÓзÖÏí¹¥»÷»î¶¯µÄÊÖÒÕϸ½ÚµÈÐÅÏ¢¡£¡£¡£ÕâÊÇGoogleÔÚ2022ÄêÐÞ¸´µÄµÚ¶þ¸öChrome 0day£¬£¬µÚÒ»¸öÊÇÊͷźóʹÓÃÎó²î£¨CVE-2022-0609£©£¬£¬ÓÚ2ÔÂ14ÈÕÐÞ¸´¡£¡£¡£


https://thehackernews.com/2022/03/google-issues-urgent-chrome-update-to.html


Î÷²¿Êý¾ÝÐÞ¸´²úÆ·ÖÐÔ½½ç¶Ñ¶ÁдÎó²îCVE-2021-44142


¾ÝýÌå3ÔÂ26ÈÕ±¨µÀ£¬£¬Î÷²¿Êý¾Ý£¨Western Digital£©ÐÞ¸´ÁËÆäMy Cloud NASÉè±¹ØÁ¬ÄÎó²î£¨CVE-2021-44142£©¡£¡£¡£ÕâÊÇSamba vfs_fruit VFSÄ£¿£¿£¿£¿éÖеÄÔ½½ç¶Ñ¶Á/дÎó²î£¬£¬¹¥»÷Õß¿ÉʹÓÃÆäÔÚ×°±¸ÉÏÒÔrootȨÏÞÔ¶³ÌÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¸Ã¹«Ë¾Ú¹ÊͳÆ£¬£¬ÔÚsmbdÖз­¿ªÎļþʱ£¬£¬¸ÃÎó²î±£´æÓÚÀ©Õ¹ÊôÐÔ(EA)ÔªÊý¾ÝµÄÆÊÎöÖУ¬£¬ÒÑͨ¹ý´ÓÉèÖõÄVFS¹¤¾ßÁбíÖÐɾ³ý¡°fruit¡±VFSÄ£¿£¿£¿£¿é²¢¸ü¸ÄEAÖ§³ÖÉèÖþÙÐÐÐÞ¸´¡£¡£¡£


https://www.bleepingcomputer.com/news/security/western-digital-fixes-critical-bug-giving-root-on-my-cloud-nas-devices/


Sophos Firewall²úÆ·Öб£´æRCEÎó²îCVE-2022-1040


3ÔÂ25ÈÕ£¬£¬SophosÅû¶ӰÏìÆäFirewall°æ±¾18.5 MR3(18.5.3)¼°¸üµÍ°æ±¾µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-1040£©µÄϸ½Ú¡£¡£¡£ÕâÊÇÓÉÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îµ¼ÖµÄ£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬¹¥»÷ÕßʹÓøÃÎó²î¿ÉÒÔÔÚ»á¼û·À»ðǽµÄÓû§ÃÅ»§»òWebadmin½çÃæÊ±ÈÆ¹ýÉí·ÝÑéÖ¤²¢Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬ÆôÓÃÁËĬÈϹ¦Ð§¡°ÔÊÐí×Ô¶¯×°ÖÃÐÞ¸´³ÌÐò¡±µÄÓû§ÎÞÐèÌØÊâ²Ù×÷¼´¿ÉÐÞ¸´¸ÃÎó²î¡£¡£¡£Í³Ò»ÖÜ£¬£¬Sophos»¹ÐÞ¸´ÆäUTM×°±¸ÖеÄ2¸öÎó²î£¨CVE-2022-0386ºÍCVE-2022-0652£©¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-sophos-firewall-vulnerability-allows-remote-code-execution/


Â׶ؾ¯·½¾Ð²¶ÉæÏÓÓëLAPSUS$ÍÅ»ïÓйصÄ7ÃûÏÓÒÉÈË


¾Ý3ÔÂ25ÈÕ±¨µÀ³Æ£¬£¬Â׶ؾ¯·½¾Ð²¶ÁË7Ãû16ÖÁ21ËêµÄÏÓÒÉÈË£¬£¬ÉæÏÓÓë»îÔ¾µÄÀÕË÷ÍÅ»ïLAPSUS$ÓйØÁª¡£¡£¡£¸ÃÍÅ»ïÔÚ½üÆÚ¹¥»÷ÁËNVIDIA¡¢ÈýÐÇ¡¢Óý±Ì¡¢LG¡¢Î¢ÈíºÍOktaµÈ¹«Ë¾¡£¡£¡£¾ÝϤ£¬£¬Ò»¸ö16ËêµÄÅ£½òÉÙÄêÊǸÃÍÅ»ïµÄÖ÷ı£¬£¬ËûÒÔWhite»òBreachbaseµÄÃûÒåͨ¹ýºÚ¿Í¹¥»÷ÀÛ»ý»ñµÃÁËÔ¼1400ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£¡£ÔÚÓëÉÌҵͬ°é±¬·¢ÕùÖ´ºó£¬£¬Ëû£¨¡°White¡±£©µÄÐÕÃû¡¢µØµãºÍÉ罻ýÌåͼƬµÈСÎÒ˽¼ÒÐÅÏ¢±»ÆØ¹â¡£¡£¡£


https://thehackernews.com/2022/03/7-suspected-members-of-lapsus-hacker.html


JuniperÐû²¼MuhstikÕë¶ÔRedisЧÀÍÆ÷µÄÆÊÎö±¨¸æ


3ÔÂ24ÈÕ£¬£¬JuniperÐû²¼±¨¸æ³ÆMuhstikÕýÔÚÆð¾¢Ê¹ÓÃRedisÖеÄÎó²î£¨CVE-2022-0543£©¡£¡£¡£¸ÃÎó²îÓÚ½ñÄê2Ô·ݱ»·¢Ã÷£¬£¬ËüµÄÒ»¸öPoCÓÚ3ÔÂ10ÈÕÔÚGitHubÉϹûÕæ£¬£¬¿ÉʹÓøÃÎó²îÔ¶³ÌÖ´ÐÐí§ÒâLua¾ç±¾²¢ÊµÏÖɳÏäÌÓÒÝ¡£¡£¡£JuniperÌåÏÖ£¬£¬¾ÍÔÚPoCÐû²¼Ò»Ììºó£¬£¬Muhstik×îÏÈÆð¾¢Ê¹ÓøÃÎó²î·Ö·¢Æä¶ñÒâÈí¼þ¡£¡£¡£Muhstik½«ÆäpayloadÃüÃûΪ¡°russia.sh¡±£¬£¬Ê¹ÓÃwget»òcurl´ÓC2ÏÂÔØ£¬£¬ÉúÑÄΪ¡°/tmp.russ¡±£¬£¬²¢×îÖÕÖ´ÐС£¡£¡£


https://blogs.juniper.net/en-us/security/muhstik-gang-targets-redis-servers


SentinelLabsÐû²¼Scarab·Ö·¢ºóÃÅHeaderTipµÄ±¨¸æ


SentinelLabsÔÚ3ÔÂ24ÈÕÐû²¼±¨¸æ£¬£¬ÏêÊöÁËScarabÐÂÒ»ÂֵĴ¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£3ÔÂ22ÈÕ£¬£¬ÎÚ¿ËÀ¼CERT-UAÐû²¼ÁËÒ»·Ý¹ØÓÚ¹¥»÷ÍÅ»ïUAC-0026µÄÇ徲ͨ¸æ£¬£¬Åû¶ÁË·Ö·¢ÃûΪHeaderTipµÄ¶ñÒâDLLµÄÓã²æÊ½´¹ÂڻµÄϸ½Ú¡£¡£¡£SentinelLabs½«¸Ã¶ñÒâÈí¼þÓëScarab APT¹ØÁªÆðÀ´£¬£¬³ÆHeaderTipÓëScarabµÄ×Ô½ç˵ºóÃÅScironµÄ»ù´¡ÉèÊ©ÓÐÖØµþ£¬£¬ÇÒºóÕß¿ÉÄܾÍÊÇHeaderTipµÄǰÉí¡£¡£¡£HeaderTipÊÇÒ»¸öÓÃC++±àдµÄ32λDLLÎļþ£¬£¬¾ÞϸΪ9.7KB£¬£¬½öÓÃÓÚ»ñÈ¡ÏÂÒ»½×¶ÎµÄpayload¡£¡£¡£


https://www.sentinelone.com/labs/chinese-threat-actor-scarab-targeting-ukraine/




Çå¾²¹¤¾ß


Access Undenied


ErmeticÐû²¼ÁËÒ»¸ö¿ªÔ´¹¤¾ß£¬£¬ÓÃÓÚÖÎÀíAWSÖеÄAccessDeniedÊÂÎñ¡£¡£¡£


https://github.com/ermetic/access-undenied-aws


pdfrip


Óà Rust ±àдµÄ¿ìËÙµÄ PDF ÃÜÂëÆÆ½âÓ¦ÓóÌÐò£¬£¬Å䱸³£¼ûµÄÃÜÂëÃûÌù¹½¨Æ÷ºÍ×ֵ乥»÷¡£¡£¡£


https://github.com/mufeedvh/pdfrip


OffensiveNotion


»ùÓÚ Notion Ìõ¼ÇÓ¦ÓóÌÐò¹¹½¨µÄÈ«¹¦Ð§ C2 ƽ̨¡£¡£¡£


https://github.com/mttaggart/OffensiveNotion/


Tiktok Scraper


´Ó TikTok ץȡ²¢ÏÂÔØÓÐÓõÄÐÅÏ¢£¬£¬ÎÞÐèµÇ¼Ãû»òÃÜÂë¡£¡£¡£


https://github.com/soxoj/tiktok-scraper




Çå¾²ÆÊÎö


΢Èí£ºWindows 7 »Ö¸´¹âÅÌÔÚ×°Öà 1Ô·ݸüкó½«ÎÞ·¨Æô¶¯


https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-7-recovery-app-fails-after-january-updates/


ÃÀ¹ú³Æ¿¨°Í˹»ù¶Ô¹ú¼ÒÇå¾²×é³É²»¿É½ÓÊܵÄΣº¦


https://www.bleepingcomputer.com/news/security/us-says-kaspersky-poses-unacceptable-risk-to-national-security/


ÍøÂç´¹ÂÚ¹¤¾ß°üÒ»Ö±Éú³¤ÒÔÈÆ¹ýÇå¾²Èí¼þ


https://www.bleepingcomputer.com/news/security/phishing-kits-constantly-evolve-to-evade-security-software/


ÔõÑù¹¹½¨×Ô½ç˵¶ñÒâÈí¼þÆÊÎöɳÏä


https://thehackernews.com/2022/03/how-to-build-custom-malware-analysis.html


Elden RingÎó²îÊ¹Íæ¼ÒÏÝÈëÎÞÏÞéæÃüÑ­»·


https://blog.malwarebytes.com/hacking-2/2022/03/elden-ring-exploit-traps-players-in-infinite-death-loop/