΢ÈíÐÞ¸´AzureÖпɷÃÎÊÆäËû¿Í»§Êý¾ÝµÄ©¶´AutoWarp

Ðû²¼Ê±¼ä 2022-03-10

΢ÈíÐÞ¸´AzureÖпɷÃÎÊÆäËû¿Í»§Êý¾ÝµÄ©¶´AutoWarp


¾ÝýÌå3ÔÂ7ÈÕ±¨µÀ £¬MicrosoftÒÑÐÞ¸´ÆäAzure×Ô¶¯»¯·þÎñÖеÄ©¶´AutoWarp  ¡£Azure¿ÉÌṩÁ÷³Ì×Ô¶¯»¯¡¢ÅäÖùÜÀíºÍ¸üйÜÀí¹¦Ð§ £¬Ã¿¸ö¼Æ»®×÷ÒµÔÚAzure¿Í»§µÄɳÏäÄÚÔËÐÐ  ¡£ÀûÓøÃ©¶´ £¬¹¥»÷Õß¿ÉÒÔ´Ó¹ÜÀíÆäËûÓû§É³ÏäµÄÄÚ²¿·þÎñÆ÷ÇÔÈ¡Azure¿Í»§µÄÍйÜÉí·ÝÑéÖ¤ÁîÅÆ £¬À´ÍêÈ«¿ØÖÆÆäÕÊ»§  ¡£12ÔÂ10ÈÕ £¬Î¢Èíͨ¹ý×èÖ¹¶ÔËùÓÐɳÏäµÄÈÏÖ¤ÁîÅÆ·ÃÎÊ(³ýÁ˾ßÓкϷ¨·ÃÎÊȨµÄɳÏ䣩ÐÞ¸´ÁË´Ë©¶´  ¡£


https://thehackernews.com/2022/03/microsoft-azure-autowarp-bug-could-have.html


»ÝÆÕÐÞ¸´Ó°ÏìÆäÊý°ÙÍǫ̀É豸µÄ16¸öUEFI¹Ì¼þ©¶´


BinarlyÔÚ3ÔÂ8ÈÕ¹ûÈ»ÁËÔÚ»ÝÆÕÆóÒµÉ豸Öз¢ÏÖµÄ16¸öЩ¶´  ¡£ÕâЩ©¶´´æÔÚÓÚͳһ¿ÉÀ©Õ¹¹Ì¼þ½Ó¿Ú(UEFI)¹Ì¼þÖÐ £¬¿É±»ÓÃÀ´»ñÈ¡¸ü¸ßȨÏÞ²¢ÔÚÉ豸Éϰ²×°¶ñÒâÈí¼þ £¬ÈƹýÄþ¾²Èí¼þµÄ¼ì²â  ¡£ÆäÖнÏΪÑÏÖØµÄÊÇÌáȨ©¶´£¨CVE-2021-23932£©¡¢µ¼ÖÂÈÎÒâ´úÂëÖ´ÐеĶѻº³åÇøÒç³ö©¶´£¨CVE-2021-23924£©ºÍµ¼ÖÂÈÎÒâ´úÂëÖ´ÐеÄÄÚ´æËð»µÂ©¶´£¨CVE-2021-23928£©  ¡£Ä¿Ç° £¬»ÝÆÕÒÑÐÞ¸´ÕâЩ©¶´  ¡£


https://thehackernews.com/2022/03/new-16-high-severity-uefi-firmware.html


FBI³ÆRagnar LockerÒÑÈëÇÖÃÀ¹ú52¸öÒªº¦»ù´¡ÉèÊ©µÄ»ú¹¹


3ÔÂ7ÈÕ £¬ÃÀ¹úFBIÓëÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾ÖÁªºÏÐû²¼ÁËÒ»·ÝTLP:WHITEͨ¸æ  ¡£¸Ã»ú¹¹Ö¸³ö £¬½ØÖÁ2022Äê1Ô £¬ÒÑÓÐ10¸öÒªº¦»ù´¡ÉèÊ©ÁìÓòµÄÖÁÉÙ52¸ö»ú¹¹Ôâµ½ÁËRagnarLockerÀÕË÷Èí¼þµÄ¹¥»÷ £¬Éæ¼°ÖÆÔì¡¢ÄÜÔ´¡¢½ðÈÚ·þÎñ¡¢Õþ¸®ºÍÐÅÏ¢¼¼ÊõµÈÐÐÒµ  ¡£Í¨¸æÆ«ÖØÓÚÌṩÓÃÀ´¼ì²âºÍ×èÖ¹Ragnar Locker¹¥»÷µÄÈëÇÖÖ¸±ê(IOC) £¬»¹¹ûÈ»ÁË·ÀÓù´ËÀ๥»÷µÄ»º½â´ëÊ©  ¡£FBI¶Ø´Ù±»¹¥»÷µÄ×éÖ¯Á¢¼´Éϱ¨´ËÀàʼþ £¬²»ÃãÀøÖ§¸¶Êê½ð  ¡£


https://www.documentcloud.org/documents/21397387-ragnarlocker-ransomware-indicators-of-compromise


¼ÓÄôóPressReader³ÆÕýÔÚ»Ö¸´ÒòÍøÂç¹¥»÷ÖжϵÄÔËÓª


ýÌå3ÔÂ7ÈÕ±¨µÀ £¬¼ÓÄôóPressReader³ÆÆäÕýÔÚŬÁ¦»Ö¸´ÒòÍøÂç¹¥»÷ÖжϵÄÔËÓª  ¡£PressReaderÊÇÈ«Çò×î´óµÄÊý×Ö±¨Ö½ºÍÔÓÖ¾·ÖÏúÉÌ £¬×ÔÉÏÖÜËÄ¿ªÊ¼·ºÆðÍøÂçÖÐ¶Ï £¬ÆäBranded EditionsÍøÕ¾¡¢Ó¦Ó÷¨Ê½ºÍPressReaderÍøÕ¾Êܵ½Ó°Ïì  ¡£ÖÜÎåÍíÉÏ £¬¸Ã¹«Ë¾È·ÈÏ´Ë´ÎÖжÏÊÇÒ»ÆðÍøÂçÄþ¾²Ê¼þ  ¡£PressReaderÔÚ3ÔÂ6ÈÕÐû²¼Óû§¸üР£¬³ÆÆäÍŶÓÕýÔÚŬÁ¦»Ö¸´ÔËÓª £¬ÏÖÒÑÄܹ»´¦ÖúÍÐû²¼µ±Ç°µÄ±¨Ö½ºÍÔÓÖ¾  ¡£


https://www.infosecurity-magazine.com/news/pressreader-suffers-cyber-attack/


ÂÞÂíÄáÑǵļÓÓÍÕ¾RompetrolÔâµ½À´×ÔHiveµÄÀÕË÷¹¥»÷


3ÔÂ7ÈÕ £¬ÂÞÂíÄáÑǵÄʯÓ͹©Ó¦ÉÌRompetrol³ÆÆäÔâµ½ÍøÂç¹¥»÷ £¬¹«Ë¾¹ÙÍøºÍ¼ÓÓÍÕ¾µÄFill&Go·þÎñ±»ÆÈ¹Ø±Õ  ¡£RompetrolÊÇKMG InternationalµÄ×Ó¹«Ë¾ £¬Ò²ÊÇÂÞÂíÄáÑÇ×î´óµÄÁ¶Óͳ§Petromidia NavodariµÄÔËÓªÉÌ £¬¸ÃÁ¶Óͳ§µÄÄê¼Ó¹¤ÄÜÁ¦Áè¼Ý500Íò¶Ö  ¡£¾ÝϤ £¬´Ë´Î¹¥»÷µÄÄ»ºóºÚÊÖÊÇHive £¬¸ÃÍÅ»ïÌá³öÁË200ÍòÃÀÔªµÄÊê½ðÒªÇó  ¡£HiveĿǰ·Ç³£»îÔ¾ºÍ¼¤½ø £¬×Ô2021Äê6ÔÂÏÂÑ®ÆØ¹âÒÔÀ´ £¬Æ½¾ùÿÌì¹¥»÷3¼Ò¹«Ë¾  ¡£


https://www.bleepingcomputer.com/news/security/rompetrol-gas-station-network-hit-by-hive-ransomware/


Ñо¿ÍŶÓÅû¶AxedaÖÐͳ³ÆÎªAccess:7µÄÒ»×é©¶´µÄÏêÇé


¾Ý3ÔÂ8ÈÕ±¨µÀ £¬ForescoutÑо¿ÍŶӷ¢ÏÖÁËPTC AxedaÖеÄ7¸ö©¶´Access:7  ¡£Axeda¿Éͨ¹ýµ±µØ²¿ÊðµÄÊðÀí £¬ÌṩÀ´×ÔÍøÂçÉÏÎïÁªÍøÉ豸µÄÒ£²âÊý¾ÝºÍÔ¶³Ì·þÎñ £¬Ö÷ÒªÓÃÓÚÒ½ÁƱ£½¡ÐÐÒµ  ¡£´Ë´ÎÅû¶µÄ×îÑÏÖØµÄÊÇ3¸ö´úÂëÖ´ÐЩ¶´CVE-2022-25251¡¢CVE-2022-25246ºÍCVE-2022-25247 £¬CVSSÆÀ·Ö·Ö±ðΪ9.4¡¢9.8ºÍ9.8  ¡£Forescout½âÊÍ˵ £¬¾ÍÒ½ÁÆÉ豸¶øÑÔ £¬¼´Ê¹ÊDz»Ì«ÑÏÖØµÄ©¶´Ò²»á·¢ÉúÖØ´óÓ°Ïì  ¡£Ä¿Ç° £¬AxedaÒÑÐÞ¸´ÁËËùÓеÄAccess:7©¶´  ¡£


https://www.bleepingcomputer.com/news/security/access-7-vulnerabilities-impact-medical-and-iot-devices/



Äþ¾²¹¤¾ß


GO/NET Scanner


´øÓÐ Arp ·¢ÏÖºÍ×Ô¼ºµÄ½âÎöÆ÷µÄ Golang ÍøÂçɨÃ跨ʽ  ¡£


https://github.com/luijait/GONET-Scanner


GraphQL Cop 


ÊÇÒ»¸öСÐÍ Python ʵÓ÷¨Ê½ £¬ÓÃÓÚÕë¶ÔGraphQL API ÔËÐг£¼ûµÄÄþ¾²²âÊÔ  ¡£


https://github.com/dolevf/graphql-cop


FastFuzz Chrome Extension


´øÓÐ chrome À©Õ¹µÄ¿ìËÙfuzzingÍøÕ¾  ¡£


https://github.com/tismayil/fastfuz-chrome-ext


s3sec


ÓÃÀ´²âÊÔ AWS S3 ´æ´¢Í°µÄ¶Á/д/ɾ³ý·ÃÎÊ  ¡£


https://github.com/0xmoot/s3sec


zkar


ÊÇÒ»¸öÓà Go ʵÏÖµÄ JavaÐòÁл¯Ð­Òé·ÖÎö¹¤¾ß £¬ÈÔÔÚ¿ª·¢ÖÐ  ¡£


https://github.com/phith0n/zkar



Äþ¾²·ÖÎö


Coinbase ×èÖ¹ÁËÁè¼Ý 25,000 ¸öÓë¶íÂÞ˹Ïà¹ØµÄ¼ÓÃܵØÖ·


https://www.bleepingcomputer.com/news/security/coinbase-blocks-over-25-000-russian-linked-crypto-addresses/


FBI£ºÕþ¸®¹ÙÔ±ÔÚ´óÁ¿ÀÕË÷»î¶¯Öб»Ã°³ä


https://www.bleepingcomputer.com/news/security/fbi-govt-officials-impersonated-in-widespread-extortion-schemes/


¶íÂÞ˹·Å¿íµÁ°æÈí¼þÐí¿É¹æÔò


https://www.bleepingcomputer.com/news/government/piracy-ok-russia-to-ease-software-licensing-rules-after-sanctions/


Á˽âºÚ¿ÍÈçºÎÕì²ì


https://thehackernews.com/2022/03/understanding-how-hackers-recon.html


ÈçºÎͨ¹ý Alexa µÄÓïÒôÈëÇÖ Alexa


https://www.schneier.com/blog/archives/2022/03/hacking-alexa-through-alexas-speech.html