΢ÈíÒò´óÁ¿ÃýÎóÈ¡µÞWindows ServerµÄ1Ô·ݸüÐÂ

°ä²¼¹¦·ò 2022-01-17

΢ÈíÒò´óÁ¿ÃýÎóÈ¡µÞWindows ServerµÄ1Ô·ݸüÐÂ


΢ÈíÒò´óÁ¿ÃýÎóÈ¡µÞWindows ServerµÄ1Ô·ݸüÐÂ.png


¾ÝýÌå1ÔÂ13ÈÕ±¨Â·£¬Î¢ÈíÈ¡µÞÁËWindows Server 1Ô·ݵÄÀÛ»ý¸üР¡£Î¢ÈíÔÚ1ÔÂ11ÈÕ°ä²¼ÁËWindows Server 2022Äê1ÔµÄÖܶþ²¹¶¡£¬Óû§ÔÚ×°Öúó·¢ÏÖ´óÁ¿ÎÊÌ⣬Ô̺¬Óò½ÚÔìÆ÷ÎÞÐÝÖ¹µÄ³ÁÆôÑ­»·¡¢ReFSϵͳ±äµÃ²»³É½Ó¼û²¢ÏÔʾΪRAWÎļþϵͳ£¬ÒÔ¼°·þÎñÆ÷ÉϵÄHyper-V²»ÔÙÆô¶¯ ¡£Ä¿Ç°£¬¸üб»È¡µÞºóÒÑÎÞ·¨Í¨¹ýWindows Update½Ó¼û£¬µ«ÈÔ¿É´ÓMicrosoft CatalogÖлñµÃ ¡£1Ô·ݸüл¹ÖжÏÁËL2TP VPNÏνÓ£¬µ«Î¢ÈíÉÐδȡµÞ´Ë²¹¶¡ ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-pulls-new-windows-server-updates-due-to-critical-bugs/


Apple°ä²¼¸üУ¬½¨¸´iOSºÍiPadOSÖзì϶doorLock


1ÔÂ12ÈÕ£¬Apple°ä²¼±¾Ôµİ²È«¸üУ¬½¨¸´HomeKitÖеĻؾø·þÎñ (DoS)·ì϶doorLock ¡£HomeKitÊÇAppleµÄÒ»ÖÖºÍ̸ºÍ¿ò¼Ü£¬iOSºÍiPadOSÓû§¿ÉÓÃÆäÔÚÍøÂçÉÏ·¢ÏֺͽÚÔìÖÇÄܼҵç ¡£¸Ã·ì϶׷×ÙΪCVE-2022-22588£¬Ö»Ð轫HomeKitÉ豸µÄÃû³ÆµÄ³¤¶È¸ü¸ÄΪ³¬¹ý500000¸ö×Ö·û²¢ÓÕʹָ±ê½ÓÊܶñÒâHomeÔ¼Ç룬¾ÍÄܹ»Ê¹iPhoneºÍiPad¾Í»á½øÈëDoS״̬ ¡£Spiniolas°µÊ¾Apple×Ô2021Äê8Ô¾Í֪·doorLock£¬Ö±µ½¼¸¸öÔºó²Å½¨¸´ ¡£


https://thehackernews.com/2022/01/apple-releases-iphone-and-ipad-updates.html


TransCreditÊý¾Ý¿âÅäÖÃÃýÎ󹫿ª50Íò¿Í»§µÄ²ÆÕþÐÅÏ¢


¾ÝýÌå1ÔÂ12ÈÕ±¨Â·£¬Website Planet·¢ÏÖÒ»¸öÅäÖÃÃýÎóµÄÊý¾Ý¿â¹«¿ªÁ˳¬¹ý50Íò¿Í»§µÄ²ÆÕþÐÅÏ¢ ¡£¸ÃÊý¾Ý¿âÊôÓÚ·ðÂÞÀï´ïÖݵÄÔËÊäÐÐҵóÒ×ÐÅÓþ»ã±¨»ú¹¹TransCredit£¬´æ´¢Á˼ÓÄôóºÍÃÀ¹úÔËÊ乫˾¿Í»§µÄ²ÆÕþºÍÓ×ÎÒÐÅÏ¢ ¡£¾ÝϤ£¬Õâ´Î×ܹ²Ð¹Â¶ÁË822789±Ê¼Í¼£¬ÆäÖÐ600000ÌõÊǿͻ§µÄÐÅÓþ¼Í¼£¬³ý´ËÖ®±í»¹ÓÐÐÕÃû¡¢Ë°ºÅ¡¢ÓʼþµØÖ·¡¢¸¶¿îº¹Çà¡¢ÒøÐÐÐÅÏ¢¡¢Éç»á°²È«ºÅÂë¡¢IDºÍÃÜÂëµÈ ¡£


https://www.hackread.com/transcredit-exposed-financial-data-americans-canadians/


ÃÀ¹úÍøÂç˾ÁȷÈÏMuddyWatterÓëÒÁÀÊMOISÓйØ


1ÔÂ12ÈÕ£¬ÃÀ¹úÍøÂç˾Á(USCYBERCOM)°ä²¼¹«¸æ£¬³ÆºÚ¿Í×éÖ¯MuddyWatterÓëÒÁÀʵý±¨Ó밲ȫÊý(MOIS)ÓйØ ¡£MOISÊÇÒÁÀʵ±¾ÖµÄÖØÒªµý±¨»ú¹¹£¬ÕƹÜЭµ÷¸Ã¹úµÄµý±¨ºÍ·´¼äµý»î¶¯£¬ÒÔ¼°Ö§³ÖÔÚÒÁÀʾ³±íµÄ°ÂÃØÐж¯ ¡£MuddyWatterÓÚ2017Äê³õ´Î±»·¢ÏÖ£¬ÖØÒªÕë¶ÔÖж«¹ú¶È£¬Ò²Õë¶ÔÅ·Ö޺ͱ±ÃÀ¹ú¶È£¬´Ë¿ÌÀ©´óµ½ÁËÖÐÑǺÍÎ÷ÄÏÑǵĹٷ½ºÍ¹ú·À»ú¹¹ ¡£¹«¸æ»¹¹«¿ªÁ˸Ã×éÖ¯ÔÚ¹¥»÷»î¶¯ÖÐʹÓõĶà¸ö¶ñÒâÈí¼þÑù±¾ ¡£


https://www.bleepingcomputer.com/news/security/us-links-muddywater-hacking-group-to-iranian-intelligence-agency/


ÀÕË÷Èí¼þMagniber¼Ù×°³ÉEdgeºÍChrome¸üнøÐзַ¢


°²È«¹«Ë¾AhnLabÔÚ1ÔÂ12ÈÕ°ä²¼µÄ»ã±¨½ÒʾÁËMagniber½üÆÚµÄ¹¥»÷»î¶¯ ¡£¹¥»÷ÕßÊ×ÏÅ×ÕʹÓû§ÏÂÔØ¼Ù×°³ÉChromeºÍEdge¸üеÄWindowsÀûÓ÷¨Ê½°üÎļþ(.appx)£¬ÖµÍ×ÌùÐĵÄÊǸÃAPPXÎļþÄÚ²¿Ô̺¬ÓÐЧ֤Ê飬Òò¶ø²»»á´¥·¢ÈκÎÖÒ¸æ ¡£Ö´ÐиÃÎļþºó»á×°ÖöñÒâÎļþ¡°wjoiyyxzllm.exe¡±ºÍ¡°wjoiyyxzllm.dll¡±£¬²¢ÏÂÔØpayload ¡£»ã±¨Ö¸³ö£¬Magniber¹ÌȻʹÓÃÓ¢ÎÄ×¢½â£¬µ«Èç½ñÖØÒªÕë¶ÔÑÇÖÞµØÓò ¡£


https://asec.ahnlab.com/en/30645/



Cisco·¢ÏÖÀûÓÃÔÆ·þÎñ·Ö·¢AsyncRATµÈ¶ñÒâÈí¼þµÄ»î¶¯


1ÔÂ12ÈÕ£¬Cisco Talos°ä²¼¹ØÓÚÀûÓÃÔÆ·þÎñµÄ¶ñÒâÈí¼þ·Ö·¢»î¶¯µÄ·ÖÎö»ã±¨ ¡£¹¥»÷ʼÓÚ2021Äê10ÔÂ26ÈÕ×óÓÒ£¬¹¥»÷ÕßÀûÓÃMicrosoft AzureºÍAmazon Web ServicesµÈÔÆ·þÎñ£¬·Ö·¢Nanocore¡¢NetwireºÍAsyncRAT ¡£Ò£²âÊý¾ÝÏÔʾ£¬Õâ´Î»î¶¯µÄÖ¸±êÖØÒªÉ¢²¼ÔÚÃÀ¹ú¡¢Òâ´óÀûºÍÐÂ¼ÓÆÂ ¡£×î³õµÄϰȾý½éÊÇ´øÓжñÒâZIP¸½¼þµÄ´¹µöÓʼþ£¬ÆäÖÐÔ̺¬´øÓжñÒâ¼ÓÔØ·¨Ê½µÄISO¾µÏñ£¬ÓÃÀ´ÏÂÔØÍйÜÔÚÔÆ·þÎñƽ̨ÉϵĶñÒâÈí¼þ ¡£


https://blog.talosintelligence.com/2022/01/nanocore-netwire-and-asyncrat-spreading.html


°²È«¹¤¾ß


Ox4Shell


Oxeye ÍÆ³ö¿ªÔ´ Payload ·´»ìºÏ¹¤¾ßOx4Shell ¡£


https://www.darkreading.com/vulnerabilities-threats/oxeye-introduce-open-source-payload-deobfuscation-tool


ShellcodeEncryptor


 Ò»¸öµ¥Ò»µÄShellcode¼ÓÃÜÆ÷/½âÃÜÆ÷/Ö´ÐÐÆ÷£¬À´Èƹý·À²¡¶¾¼ì²â ¡£


https://github.com/plackyhacker/Shellcode-Encryptor


rathole


Ò»¸ö°²È«¡¢²»±ä¡¢¸ß»úÄÜµÄ NAT ±éÀú·´Ïò´úÀí£¬Óà Rust ±àд ¡£


https://github.com/rapiz1/rathole


°²È«·ÖÎö


Adobe°²È«¸üн¨¸´ 41 ¸ö·ì϶


Adobe1Ô·ݰ²È«¸üн¨¸´Acrobat ºÍ Reader ²úÆ·¡¢Illustrator¡¢Adobe Bridge¡¢InCopy ºÍ InDesign ÖÐµÄ 41 ¸ö·ì϶ ¡£


https://securityaffairs.co/wordpress/126593/security/adobe-reader-tianfu-cup.html


ICS Öܶþ²¹¶ ¡£ºÎ÷ÃÅ×Ó¡¢Ê©ÄÍµÂµçÆø½¨¸´ 40 ¸ö·ì϶


Î÷ÃÅ×Ó×ܹ²½¨¸´ 14 ¸ö·ì϶£¬Ê©ÄÍµÂµçÆø½¨¸´ÁË 26 ¸ö·ì϶ ¡£


https://www.securityweek.com/ics-patch-tuesday-siemens-schneider-electric-address-40-vulnerabilities


OceanLotus¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨


ºÚ¿Í×éÖ¯OceanLotus´Ë¿ÌÔÚʹÓà Web ´æµµÎļþÌåʽ£¨.MHT ºÍ .MHTML£©½«·Ö·¢ºóÃÅ ¡£


https://www.netskope.com/blog/abusing-microsoft-office-using-malicious-web-archive-files