GoogleÐÞ¸´ChromeÖÐÒѱ»Ê¹ÓõÄ0 day CVE-2022-1096

Ðû²¼Ê±¼ä 2022-03-29

GoogleÐÞ¸´ChromeÖÐÒѱ»Ê¹ÓõÄ0 day CVE-2022-1096


3ÔÂ25ÈÕ£¬ £¬GoogleÐû²¼ÁËÒ»¸ö½ôÆÈ¸üУ¬ £¬ÐÞ¸´ChromeÖÐÒѱ»Ê¹ÓõÄ0 day£¨CVE-2022-1096£©¡£¡£ÕâÊÇV8 JavaScriptÒýÇæÖеÄÀàÐÍ»ìÏýÎó²î£¬ £¬ÀÖ³ÉʹÓøÃÎó²î¿ÉÔÚ»º³åÇø½çÏßÍâ¶ÁÈ¡»òдÈëÄÚ´æ²¢µ¼ÖÂä¯ÀÀÆ÷Í߽⣬ £¬µ«Ò²¿É±»ÓÃÀ´Ö´ÐÐí§Òâ´úÂë¡£¡£Ö»¹ÜGoogleÌåÏÖÒÑÔÚÒ°Íâ¼ì²âµ½Ê¹ÓÃÕâ¸öʹÓøÃÎó²îµÄ¹¥»÷£¬ £¬µ«Æä²¢Ã»ÓзÖÏí¹¥»÷»î¶¯µÄÊÖÒÕϸ½ÚµÈÐÅÏ¢¡£¡£ÕâÊÇGoogleÔÚ2022ÄêÐÞ¸´µÄµÚ¶þ¸öChrome 0day£¬ £¬µÚÒ»¸öÊÇÊͷźóʹÓÃÎó²î£¨CVE-2022-0609£©£¬ £¬ÓÚ2ÔÂ14ÈÕÐÞ¸´¡£¡£


https://thehackernews.com/2022/03/google-issues-urgent-chrome-update-to.html


Î÷²¿Êý¾ÝÐÞ¸´²úÆ·ÖÐÔ½½ç¶Ñ¶ÁдÎó²îCVE-2021-44142


¾ÝýÌå3ÔÂ26ÈÕ±¨µÀ£¬ £¬Î÷²¿Êý¾Ý£¨Western Digital£©ÐÞ¸´ÁËÆäMy Cloud NASÉè±¹ØÁ¬ÄÎó²î£¨CVE-2021-44142£©¡£¡£ÕâÊÇSamba vfs_fruit VFSÄ£¿£¿éÖеÄÔ½½ç¶Ñ¶Á/дÎó²î£¬ £¬¹¥»÷Õß¿ÉʹÓÃÆäÔÚ×°±¸ÉÏÒÔrootȨÏÞÔ¶³ÌÖ´ÐÐí§Òâ´úÂë¡£¡£¸Ã¹«Ë¾Ú¹Êͳƣ¬ £¬ÔÚsmbdÖз­¿ªÎļþʱ£¬ £¬¸ÃÎó²î±£´æÓÚÀ©Õ¹ÊôÐÔ(EA)ÔªÊý¾ÝµÄÆÊÎöÖУ¬ £¬ÒÑͨ¹ý´ÓÉèÖõÄVFS¹¤¾ßÁбíÖÐɾ³ý¡°fruit¡±VFSÄ£¿£¿é²¢¸ü¸ÄEAÖ§³ÖÉèÖþÙÐÐÐÞ¸´¡£¡£


https://www.bleepingcomputer.com/news/security/western-digital-fixes-critical-bug-giving-root-on-my-cloud-nas-devices/


Sophos Firewall²úÆ·Öб£´æRCEÎó²îCVE-2022-1040


3ÔÂ25ÈÕ£¬ £¬SophosÅû¶ӰÏìÆäFirewall°æ±¾18.5 MR3(18.5.3)¼°¸üµÍ°æ±¾µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-1040£©µÄϸ½Ú¡£¡£ÕâÊÇÓÉÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îµ¼Öµģ¬ £¬CVSSÆÀ·ÖΪ9.8£¬ £¬¹¥»÷ÕßʹÓøÃÎó²î¿ÉÒÔÔÚ»á¼û·À»ðǽµÄÓû§ÃÅ»§»òWebadmin½çÃæÊ±ÈÆ¹ýÉí·ÝÑéÖ¤²¢Ö´ÐÐí§Òâ´úÂë¡£¡£¸Ã¹«Ë¾³Æ£¬ £¬ÆôÓÃÁËĬÈϹ¦Ð§¡°ÔÊÐí×Ô¶¯×°ÖÃÐÞ¸´³ÌÐò¡±µÄÓû§ÎÞÐèÌØÊâ²Ù×÷¼´¿ÉÐÞ¸´¸ÃÎó²î¡£¡£Í³Ò»ÖÜ£¬ £¬Sophos»¹ÐÞ¸´ÆäUTM×°±¸ÖеÄ2¸öÎó²î£¨CVE-2022-0386ºÍCVE-2022-0652£©¡£¡£


https://www.bleepingcomputer.com/news/security/critical-sophos-firewall-vulnerability-allows-remote-code-execution/


Â׶ؾ¯·½¾Ð²¶ÉæÏÓÓëLAPSUS$ÍÅ»ïÓйصÄ7ÃûÏÓÒÉÈË


¾Ý3ÔÂ25ÈÕ±¨µÀ³Æ£¬ £¬Â׶ؾ¯·½¾Ð²¶ÁË7Ãû16ÖÁ21ËêµÄÏÓÒÉÈË£¬ £¬ÉæÏÓÓë»îÔ¾µÄÀÕË÷ÍÅ»ïLAPSUS$ÓйØÁª¡£¡£¸ÃÍÅ»ïÔÚ½üÆÚ¹¥»÷ÁËNVIDIA¡¢ÈýÐÇ¡¢Óý±Ì¡¢LG¡¢Î¢ÈíºÍOktaµÈ¹«Ë¾¡£¡£¾ÝϤ£¬ £¬Ò»¸ö16ËêµÄÅ£½òÉÙÄêÊǸÃÍÅ»ïµÄÖ÷ı£¬ £¬ËûÒÔWhite»òBreachbaseµÄÃûÒåͨ¹ýºÚ¿Í¹¥»÷ÀÛ»ý»ñµÃÁËÔ¼1400ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£ÔÚÓëÉÌҵͬ°é±¬·¢ÕùÖ´ºó£¬ £¬Ëû£¨¡°White¡±£©µÄÐÕÃû¡¢µØµãºÍÉ罻ýÌåͼƬµÈСÎÒ˽¼ÒÐÅÏ¢±»ÆØ¹â¡£¡£


https://thehackernews.com/2022/03/7-suspected-members-of-lapsus-hacker.html


JuniperÐû²¼MuhstikÕë¶ÔRedisЧÀÍÆ÷µÄÆÊÎö±¨¸æ


3ÔÂ24ÈÕ£¬ £¬JuniperÐû²¼±¨¸æ³ÆMuhstikÕýÔÚÆð¾¢Ê¹ÓÃRedisÖеÄÎó²î£¨CVE-2022-0543£©¡£¡£¸ÃÎó²îÓÚ½ñÄê2Ô·ݱ»·¢Ã÷£¬ £¬ËüµÄÒ»¸öPoCÓÚ3ÔÂ10ÈÕÔÚGitHubÉϹûÕæ£¬ £¬¿ÉʹÓøÃÎó²îÔ¶³ÌÖ´ÐÐí§ÒâLua¾ç±¾²¢ÊµÏÖɳÏäÌÓÒÝ¡£¡£JuniperÌåÏÖ£¬ £¬¾ÍÔÚPoCÐû²¼Ò»Ììºó£¬ £¬Muhstik×îÏÈÆð¾¢Ê¹ÓøÃÎó²î·Ö·¢Æä¶ñÒâÈí¼þ¡£¡£Muhstik½«ÆäpayloadÃüÃûΪ¡°russia.sh¡±£¬ £¬Ê¹ÓÃwget»òcurl´ÓC2ÏÂÔØ£¬ £¬ÉúÑÄΪ¡°/tmp.russ¡±£¬ £¬²¢×îÖÕÖ´ÐС£¡£


https://blogs.juniper.net/en-us/security/muhstik-gang-targets-redis-servers


SentinelLabsÐû²¼Scarab·Ö·¢ºóÃÅHeaderTipµÄ±¨¸æ


SentinelLabsÔÚ3ÔÂ24ÈÕÐû²¼±¨¸æ£¬ £¬ÏêÊöÁËScarabÐÂÒ»ÂֵĴ¹ÂÚ¹¥»÷»î¶¯¡£¡£3ÔÂ22ÈÕ£¬ £¬ÎÚ¿ËÀ¼CERT-UAÐû²¼ÁËÒ»·Ý¹ØÓÚ¹¥»÷ÍÅ»ïUAC-0026µÄÇ徲ͨ¸æ£¬ £¬Åû¶ÁË·Ö·¢ÃûΪHeaderTipµÄ¶ñÒâDLLµÄÓã²æÊ½´¹ÂڻµÄϸ½Ú¡£¡£SentinelLabs½«¸Ã¶ñÒâÈí¼þÓëScarab APT¹ØÁªÆðÀ´£¬ £¬³ÆHeaderTipÓëScarabµÄ×Ô½ç˵ºóÃÅScironµÄ»ù´¡ÉèÊ©ÓÐÖØµþ£¬ £¬ÇÒºóÕß¿ÉÄܾÍÊÇHeaderTipµÄǰÉí¡£¡£HeaderTipÊÇÒ»¸öÓÃC++±àдµÄ32λDLLÎļþ£¬ £¬¾ÞϸΪ9.7KB£¬ £¬½öÓÃÓÚ»ñÈ¡ÏÂÒ»½×¶ÎµÄpayload¡£¡£


https://www.sentinelone.com/labs/chinese-threat-actor-scarab-targeting-ukraine/




Çå¾²¹¤¾ß


Access Undenied


ErmeticÐû²¼ÁËÒ»¸ö¿ªÔ´¹¤¾ß£¬ £¬ÓÃÓÚÖÎÀíAWSÖеÄAccessDeniedÊÂÎñ¡£¡£


https://github.com/ermetic/access-undenied-aws


pdfrip


Óà Rust ±àдµÄ¿ìËÙµÄ PDF ÃÜÂëÆÆ½âÓ¦ÓóÌÐò£¬ £¬Å䱸³£¼ûµÄÃÜÂëÃûÌù¹½¨Æ÷ºÍ×ֵ乥»÷¡£¡£


https://github.com/mufeedvh/pdfrip


OffensiveNotion


»ùÓÚ Notion Ìõ¼ÇÓ¦ÓóÌÐò¹¹½¨µÄÈ«¹¦Ð§ C2 ƽ̨¡£¡£


https://github.com/mttaggart/OffensiveNotion/


Tiktok Scraper


´Ó TikTok ץȡ²¢ÏÂÔØÓÐÓõÄÐÅÏ¢£¬ £¬ÎÞÐèµÇ¼Ãû»òÃÜÂë¡£¡£


https://github.com/soxoj/tiktok-scraper




Çå¾²ÆÊÎö


΢Èí£ºWindows 7 »Ö¸´¹âÅÌÔÚ×°Öà 1Ô·ݸüкó½«ÎÞ·¨Æô¶¯


https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-7-recovery-app-fails-after-january-updates/


ÃÀ¹ú³Æ¿¨°Í˹»ù¶Ô¹ú¼ÒÇå¾²×é³É²»¿É½ÓÊܵÄΣº¦


https://www.bleepingcomputer.com/news/security/us-says-kaspersky-poses-unacceptable-risk-to-national-security/


ÍøÂç´¹ÂÚ¹¤¾ß°üÒ»Ö±Éú³¤ÒÔÈÆ¹ýÇå¾²Èí¼þ


https://www.bleepingcomputer.com/news/security/phishing-kits-constantly-evolve-to-evade-security-software/


ÔõÑù¹¹½¨×Ô½ç˵¶ñÒâÈí¼þÆÊÎöɳÏä


https://thehackernews.com/2022/03/how-to-build-custom-malware-analysis.html


Elden RingÎó²îÊ¹Íæ¼ÒÏÝÈëÎÞÏÞéæÃüÑ­»·


https://blog.malwarebytes.com/hacking-2/2022/03/elden-ring-exploit-traps-players-in-infinite-death-loop/