΢Èí·¢ÏÖWindows Win32kÌáȨ0dayÒѱ»ÔÚÒ°ÀûÓã»SonicWall¹Ì¼þ¸üн¨¸´SMA-100ÖÐÒѱ»ÀûÓõÄ0day
°ä²¼¹¦·ò 2021-02-221.΢Èí·¢ÏÖWindows Win32kÌáȨ0dayÒѱ»ÔÚÒ°ÀûÓÃ

΢Èí·¢ÏÖWindows Win32kÖеÄÌáȨ0day£¨CVE-2021-1732£©Òѱ»ÔÚÒ°ÀûÓ᣸÷ì϶´æÔÚÓÚwin32k.sysÖ÷ÌâÄÚºË×é¼þÖУ¬¹¥»÷Õß¿Éͨ¹ý´¥·¢¿ªÊͺóʹÓ÷ì϶½«ÆäȨÏÞÌáÉýµ½admin¼¶±ð£¬ÓµÓиù»ùÓû§È¨Ï޵Ĺ¥»÷Õß²»±ØÒªÓëÓû§½»»¥¼´¿ÉÀûÓø÷ì϶¡£¾Ýµ÷²é£¬¸Ã·ì϶Òѱ»APT×éÖ¯BitterºÍT-APT-17ÀûÓã¬DBAPPSecurityÔò³ÆÆäÓÚ12Ô·¢ÏÖÁË¿ª·¢ÈÕÆÚΪ2020Äê5ÔµÄÑù±¾¡£¶ø×Ô2021Äê2ÔÂÆðÍ·£¬ºÚ¿ÍÖ»ÔÚÉÙÊýÕë¶ÔÖж«µÄ¹¥»÷ÖÐʹÓÃÁËCVE-2021-1732·ì϶¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/recently-fixed-windows-zero-day-actively-exploited-since-mid-2020/
2.SonicWall¹Ì¼þ¸üн¨¸´SMA-100ÖÐÒѱ»ÀûÓõÄ0day

SonicWall°ä²¼Á˵ڶþ´Î¹Ì¼þ£¬ÒÔ¸üн¨¸´SMA-100ÖÐÒѱ»ÀûÓõÄ0day¡£¸Ã·ì϶±»×·×ÙΪCVE-2021-20016£¬CVSSÆÀ·Ö9.8£¬¿Éµ¼ÖÂSonicWall SSLVPN SMA100²úÆ·ÖеÄSQLºÅÁîÎÞЧ£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÀûÓÃÆäÔÚSMA100°æ±¾10.xÉϽøÐÐÍ´´¦½Ó¼û¡£2ÔÂ3ÈÕ£¬Sonicwall°ä²¼ÁËÕë¶Ô¸Ã·ì϶µÄ²¹¶¡£¬ÓÖÓÚ2ÔÂ19ÈÕ°ä²¼¸Ã¹Ì¼þ¸üУ¬ÒÔÌṩ×ÔÉϴθüкó·¢ÏֵįäËû·À»¤´ëÊ©¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/114818/security/sonicwall-firmware-updates-sma-100.html
3.Sequoia CapitalÔâµ½´¹µö¹¥»÷£¬¿Í»§²ÆÕþÐÅϢй¶

ºìɼ±¾Ç®£¨Sequoia Capital£©ÉÏÖÜÎ峯ÆäÔâµ½¹¥»÷£¬¿Í»§Ó×ÎÒÐÅÏ¢ºÍ²ÆÕþÐÅϢй¶¡£ºìɼ±¾Ç®Êǹè¹È¾Ñé×î·á˶£¬×î³É¹¦µÄ·çÏÕͶ×ʹ«Ë¾Ö®Ò»£¬ÖÎÀíµÄ×ʲú³¬¹ý380ÒÚÃÀÔª£¬Í¶×ÊÁËAirbnb¡¢DoorDash¡¢FireEyeºÍ23andMeµÈ×éÖ¯¡£¸Ã¹«Ë¾³ÆÕâ´Î¹¥»÷ÊÇ¶ÔÆäÒ»ÃûÔ±¹¤½øÐгɹ¦µÄÍøÂç´¹µö¹¥»÷µÄÁ˾֣¬¿Í»§µÄÓ×ÎҺͲÆÕþÐÅÏ¢¿ÉÄÜÒѱ»µÚÈý·½½Ó¼û£¬Ä¿Ç°ÔÚ°µÍøÉÐδ·¢ÏÖ±»µÁÊý¾ÝµÄÂòÂôÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2021/02/sequoia-capital-told-investors-it-was.html
4.À³¿ËºÚµÂ´óѧÔâµ½¹¥»÷£¬Ñ§Ì÷þÎñϵÍÂäÙʱ¹Ø¹Ø

¼ÓÄô󰲴ÖÂÔÊ¡µÄÀ³¿ËºÚµÂ´óѧ£¨Lakehead University£©³ÆÆäÉÏÖܶþÔâµ½¹¥»÷£¬Ä¿Ç°Ñ§ÌÃÍÆËã»úϵͳÈÔ´¦ÓÚÍÑ»ú״̬¡£¸Ã´óѧָ³ö¹¥»÷ÊÇÕë¶Ô´óѧµÄÎļþ¹²Ïí·þÎñÆ÷µÄ£¬Æä²é³µ½¹¥»÷ºóµ±¼´×ö³öÏìÓ¦£¬É¾³ýÁËÖ±½ÓÁ´½Óµ½Îļþ¹²Ïí·þÎñÆ÷µÄËùÓнӼû£¬²¢¹Ø¹ØÁËThunder BayºÍOrilliaÐ£ÇøµÄÍøÂ硣Ŀǰ¸ÃÊÂÎñÈÔÔÚµ÷²éÖУ¬ÒÔÈ·¶¨ÄÄЩ·þÎñÆ÷ºÍÐÅÏ¢Êܵ½ÁËÓ°Ï죬¸ÃѧÌÃÉÐδ͸©Ó×ÎÒ»ò²ÆÕþÐÅÏ¢ÊÇ·ñ±»Ð¹Â¶¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2021/02/cyber-attack-computer-systems-of.html
5.ÁãÊÛ¹«Ë¾KrogerÔâµ½¹¥»÷£¬Ô±¹¤ÐÅÏ¢ºÍÒ©·¿¼Í¼й¶

ÁãÊÛ¹«Ë¾KrogerÔâµ½¹¥»÷£¬Ô±¹¤ÐÅÏ¢ºÍÒ©·¿¼Í¼й¶¡£KrogerÊÇÈ«Çò×î´óµÄÁãÊÛÉÌÖ®Ò»£¬ÔÚ35¸öÖÝÕ¼Óнü2800¼ÒÉ̵꣬2019ÄêµÄÏúÊ۶¹ý1220ÒÚÃÀÔª¡£Kroger³ÆÕâ´Î¹¥»÷ÊÇÓÉÓÚAccellion FTAÈí¼þÖеÄij¸ö°²È«·ì϶Ëùµ¼Ö£¬ºÚ¿ÍÀûÓø÷ì϶ÇÔÈ¡Á˹«Ë¾ÁËÈËÁ¦×ÊÔ´Êý¾ÝºÍÒ©·¿¼Í¼¡£12ÔÂÖÐÑ®£¬Accelion·¢ÏÔìäFTA°²È«Îļþ´«Êä·þÎñÖдæÔÚÒѱ»ÀûÓõÄ0day¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/kroger-data-breach-exposes-pharmacy-and-employee-data/
6.F5°ä²¼2021ÄêÆ¾Ö¤Ìî³ä¹¥»÷µÄÌ¬ÊÆ·ÖÎö»ã±¨

F5°ä²¼ÁË2021ÄêÆ¾Ö¤Ìî³ä¹¥»÷µÄÌ¬ÊÆ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬ÔÚ2016ÄêÖÁ2020ÄêÆÚ¼ä£¬Äê¶Èƾ֤й©ÊÂÎñµÄÊýÁ¿ÏÕЩ·ÁËÒ»·¬£¬Ð¹Â¶Í´´¦µÄÊýÁ¿È´±ÉÈ˽µ£¬´Ó2016ÄêµÄ6300Íò¼Í¼½µÂäµ½2020ÄêµÄ1700Íò¼Í¼£»µ½Ä¿Ç°ÎªÖ¹£¬ÃÜÂëµÄ´¿Îı¾´æ´¢ÊÇÔì³Éйʹ´¦Ð¹Â¶µÄÖØÒªÔÒò£¬¶ø¹ãΪÈËÖªµÄ¹þÏ£Ëã·¨MD5ÒÀÈ»¼«¶ÈÊ¢ÐУ»×éÖ¯ÔÚ¼ì²âºÍ·¢ÏÖÈëÇÖºÍÊý¾Ýй¶·½ÃæÒÀÈ»ºÜÈõ¡£
ÔÎÄÁ´½Ó£º
https://www.f5.com/labs/articles/threat-intelligence/2021-credential-stuffing-report


¾©¹«Íø°²±¸11010802024551ºÅ