΢ÈíÐû²¼4Ô·ÝÄþ¾²¸üР×ܼÆÐÞ¸´119¸ö©¶´

Ðû²¼Ê±¼ä 2022-04-14

΢ÈíÐû²¼4Ô·ÝÄþ¾²¸üУ¬×ܼÆÐÞ¸´119¸ö©¶´


΢ÈíÔÚ4ÔÂ12ÈÕÐû²¼±¾ÔµÄÄþ¾²¸üУ¬×ܹ²ÐÞ¸´ÁË119¸ö©¶´£¨²»°üÂÞ26¸öMicrosoft Edge©¶´£©¡£´Ë´ÎÐÞ¸´µÄ2¸ö0day·Ö±ðΪWindowsÓû§ÅäÖÃÎļþ·þÎñȨÏÞÌáÉý©¶´£¨CVE-2022-26904£©ºÍWindowsͨÓÃÈÕÖ¾ÎļþϵͳÇý¶¯·¨Ê½È¨ÏÞÌáÉý©¶´£¨CVE-2022-24521£©¡£ÆäËü½ÏΪÑÏÖØ©¶´°üÂÞWindows LDAPÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2022-26919£©¡¢Microsoft Dynamics 365(on-premises)Ô¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2022-23259£©ºÍWindows Hyper-VÔ¶³ÌÖ´ÐдúÂ멶´£¨CVE-2022-22008£©µÈ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2022-patch-tuesday-fixes-119-flaws-2-zero-days/


ÐÂAndroidľÂíFakecallsÖ÷ÒªÕë¶Ôº«¹úµÄ½ðÈÚ»ú¹¹


4ÔÂ11ÈÕ£¬kasperskyÅû¶ÁËÐÂAndroidÒøÐÐľÂíFakecallsµÄÏêϸÐÅÏ¢¡£Fakecallsαװ³ÉÒøÐеÄÒƶ¯Ó¦Ó÷¨Ê½£¬Ö÷ÒªÕë¶Ôº«¹úµÄKakaoBankºÍKookmin Bank(KB)µÈÒøÐС£ÓëÆäËüÒøÐÐľÂí²îÒ죬Fakecalls¿ÉÒÔÄ£·ÂÓë¿Í»§Ö§³ÖµÄµç»°£¬µ±Ä¿±êÊÔͼ´òµç»°¸øÒøÐÐʱ£¬Ëü»áÇжÏͨ»°²¢ÏÔʾÐé¼ÙµÄºô½Ð½çÃ棬ּÔÚͨ¹ý½Ù³Öͨ»°À´ÇÔÈ¡Ä¿±êµÄÐÅÏ¢¡£Ä¿Ç°£¬¸Ã¶ñÒâÈí¼þ½öÖ§³Öº«ÓÕâʹµÃʹÓÃÆäËüϵͳÓïÑÔµÄÓû§ºÜÈÝÒײì¾õµ½ÎÊÌâ¡£


https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/


BlackCatÉù³Æ¶Ô·ðÂÞÀï´ï¹ú¼Ê´óѧµÄ¹¥»÷ʼþÂôÁ¦


¾ÝýÌå4ÔÂ11ÈÕ±¨µÀ£¬BlackCat(ALPHV)Éù³ÆÆäÈëÇÖÁË·ðÂÞÀï´ï¹ú¼Ê´óѧ²¢ÒÑÇÔÈ¡1.2 TBµÄÊý¾Ý£¬Éæ¼°ºÏͬ¡¢»á¼ÆÎļþ¡¢Éç»áÄþ¾²ºÅÂëºÍµç×ÓÓʼþÊý¾Ý¿âµÈÐÅÏ¢¡£¸Ã´óѧ»ØÓ¦³Æ£¬ËûÃÇÒ»Ö±ÔÚÊÓ²ì´Ëʼþ£¬µ½Ä¿Ç°ÎªÖ¹Ã»Óм£Ïó±íÃ÷Ãô¸ÐÐÅÏ¢Òѱ»Ð¹Â¶¡£µ«Ñо¿ÈËԱ֤ʵ£¬±»µÁÊý¾ÝÖÐȷʵ°üÂÞ´óѧ½ÌÖ°Ô±¹¤ºÍѧÉúµÄÃô¸ÐÐÅÏ¢¡£Recorded FutureÌåÏÖ£¬½ØÖÁ½ñÄê3Ô£¬ÆäÒѼǼÁË37ÆðÕë¶ÔѧУµÄÀÕË÷¹¥»÷£¬¶ø2021ÄêÈ«ÄêΪ127Æð¡£


https://therecord.media/blackcat-ransomware-group-claims-attack-on-florida-international-university/


Ñз¢ÍŶÓÐÞ¸´DirectusÖд洢ÐÍXSS©¶´CVE-2022-24814


¾Ý4ÔÂ11Èյı¨µÀ£¬Ñз¢ÍŶÓÐÞ¸´ÁËDirectusÖеĴ洢ÐÍXSS©¶´£¨CVE-2022-24814£©¡£DirectusÊÇÒ»¸ö¿ªÔ´µÄÄ£¿é»¯ÄÚÈݹÜÀíϵͳ(CMS)£¬¿ÉÓÃÓÚʹÓÃGraphQLºÍREST API°ü×°SQLÊý¾Ý¿â¡£¸Ã©¶´Ó°ÏìÁËDirectus v9.6.0¼°¸üÔç°æ±¾£¬´æÔÚÓÚCMSµÄÎļþÉÏ´«¹¦Ð§ÖС£Directus½âÊͳÆ£¬¹¥»÷Õß¿ÉÒÔͨ¹ý½«iframe²åÈ븻Îı¾HTML½çÃæÀ´Ö´ÐÐδ¾­ÊÚȨµÄJavaScript£¬¸Ã½çÃæÁ´½Óµ½ÎļþÉÏ´«µÄHTMLÎļþ£¬¸ÃÎļþÔÚÆä½Å±¾±êÇ©ÖмÓÔØÁíÒ»¸öÉÏ´«µÄJSÎļþ¡£


https://www.zdnet.com/article/xss-vulnerability-patched-in-directus-data-engine-platform/


AtlassianÌåÏÖÆä·þÎñÖжÏÎÊÌâ¿ÉÄÜ»¹ÐèÁ¬ÐøÁ½ÖÜÒÔÉÏ


ýÌå4ÔÂ11Èճƣ¬¿ª·¢ºÍЭ×÷Èí¼þ¹«Ë¾AtlassianÔ¤¼Æ£¬Æä·þÎñÖжÏÎÊÌâ¿ÉÄÜ»¹ÐèÁ¬ÐøÁ½ÖÜÒÔÉÏ¡£Ä¿Ç°AtlassianÒÑÖжÏÒ»ÖÜ£¬Æä×î³õÔ¤¼Æ»Ö¸´ÊÂÇé²»»áÁè¼Ý¼¸Ì죬²¢È·ÈϸÃʼþ²»ÊÇÍøÂç¹¥»÷µ¼ÖµÄ¡£È»¶ø£¬ËüÔÚ½üÆÚ·¢Ë͸øÓû§µÄÓʼþÖгÆ£¬ÓÉÓÚÍøÕ¾Öؽ¨µÄÅÓ´óÐÔ£¬¿ÉÄÜ»¹Ð賤´ïÁ½ÖܵÄʱ¼ä¡£¸Ã¹«Ë¾ÌåÏÖ£¬ËûÃÇÏÖÔÚÒѾ­ÎªÁè¼Ý35%µÄÊÜÓ°ÏìÓû§Íê³ÉÁËÖؽ¨£¬ÇÒûÓÐÊý¾Ý¶ªÊ§µÄÇé¿ö¡£


https://www.bleepingcomputer.com/news/technology/atlassian-says-ongoing-outage-might-last-two-more-weeks/


Unit42Ðû²¼2021ÄêµÚËļ¾¶ÈWebÍþв̬ÊƵķÖÎö³ÂËß


4ÔÂ11ÈÕ£¬Unit42Ðû²¼2021ÄêµÚËļ¾¶ÈWebÍþв̬ÊƵķÖÎö³ÂËß¡£³ÂËßÖ¸³ö£¬´Ó2021Äê10Ôµ½12Ô£¬Æä¼ì²âµ½Ô¼Äª533000Æð¶ñÒâµÇ¼URLʼþ£¬ÆäÖÐ120753¸öÊÇΨһURL£»»¹¼ì²âµ½Ô¼2900000¸ö¶ñÒâÖ÷»úURL£¬ÆäÖÐ165000¸öÊÇΨһURL¡£ÕâЩ¶ñÒâURLÖеĴó²¿ÃÅËƺõÀ´×ÔÃÀ¹ú£¬Æä´ÎÊǶíÂÞ˹ºÍµÂ¹ú¡£11Ôµ½12ÔµĹ¥»÷»î¶¯±È9Ôµ½10Ô¸ü»îÔ¾£¬ÔÚ11Ôµ½´ï·åÖµ¡£¼ì²âµ½µÄ¶ñÒâÈí¼þÀàÐÍÖ÷ҪΪcryptominers¡¢JS downloaders¡¢web skimmers¡¢web scamsºÍJS redirectors¡£


https://unit42.paloaltonetworks.com/web-threats-malicious-host-urls/




Äþ¾²¹¤¾ß


Group3r


¿ìËÙö¾Ù AD ×é¼ÆıÖеÄÏà¹ØÉèÖ㬲¢Ê¶±ðÆäÖпÉÀûÓõĴíÎóÅäÖá£


https://github.com/Group3r/Group3r/


batfish


ÍøÂçÑéÖ¤¹¤¾ß£¬Í¨¹ý·ÖÎöÍøÂçÉ豸µÄÅäÖã¬ÎªÄþ¾²ÐÔ¡¢¿É¿¿ÐԺͺϹæÐÔÌṩÕýÈ·ÐÔ±£Ö¤¡£


https://github.com/batfish/batfish


Smap


Smap ÊÇ Nmap µÄ¸´ÖÆÆ·£¬ËüʹÓà shodan.io µÄÃâ·Ñ API ½øÐж˿ÚɨÃè¡£


https://github.com/s0md3v/Smap



Äþ¾²·ÖÎö


CISA ¾¯¸æ¶íÂÞ˹ºÚ¿ÍÀûÓà WatchGuard ©¶´


https://www.bleepingcomputer.com/news/security/cisa-warns-orgs-of-watchguard-bug-exploited-by-russian-state-hackers/


ÆÛÕ©Õßͨ¹ýÔ¶³Ì·ÃÎʹ¤¾ßÔÚ 2021 ÄêÇÔÈ¡ 5800 ÍòÓ¢°÷


https://www.infosecurity-magazine.com/news/fraudster-steal-58m-2021-via/


µÚÈý¸ö¶ñÒâ npm °ü'event-source-polyfill' 


https://www.bleepingcomputer.com/news/security/third-npm-protestware-event-source-polyfill-calls-russia-out/


SystemBC ±»ÖÖÖÖ¹¥»÷ÕßʹÓÃ


https://asec.ahnlab.com/en/33600/


Anonymous¹¥»÷¶íÂÞ˹ 3 ¸ö×éÖ¯£¬Ð¹Â¶ 400 GB Êý¾Ý


https://www.hackread.com/anonymous-hits-russian-entities-leaks-400-gb-emails/


Qbot ¶ñÒâÈí¼þʹÓÃÐ嵀 Windows Installer ѬȾý½é


https://www.bleepingcomputer.com/news/security/qbot-malware-switches-to-new-windows-installer-infection-vector/