΢Èí½¨¸´AzureÖпɽӼûÆäËû¿Í»§Êý¾ÝµÄ·ì϶AutoWarp

°ä²¼¹¦·ò 2022-03-10

΢Èí½¨¸´AzureÖпɽӼûÆäËû¿Í»§Êý¾ÝµÄ·ì϶AutoWarp


¾ÝýÌå3ÔÂ7ÈÕ±¨Â·£¬MicrosoftÒѽ¨¸´ÆäAzure×Ô¶¯»¯·þÎñÖеķì϶AutoWarp¡£Azure¿ÉÌṩÁ÷³Ì×Ô¶¯»¯¡¢ÅäÖÃÖÎÀíºÍ¸üÐÂÖÎÀíÖ°ÄÜ£¬Ã¿¸ö´òËã×÷ÒµÔÚAzure¿Í»§µÄɳÏäÄÚÔËÐС£ÀûÓø÷ì϶£¬¹¥»÷ÕßÄܹ»´ÓÖÎÀíÆäËûÓû§É³ÏäµÄÄÚ²¿·þÎñÆ÷ÇÔÈ¡Azure¿Í»§µÄÍйÜÉí·ÝÑéÖ¤ÁîÅÆ£¬À´ÆëÈ«½ÚÔìÆäÕÊ»§¡£12ÔÂ10ÈÕ£¬Î¢Èíͨ¹ý×èÖ¹¶ÔËùÓÐɳÏäµÄÈÏÖ¤ÁîÅÆ½Ó¼û(³ýÁËÓµÓкϷ¨½Ó¼ûȨµÄɳÏ䣩½¨¸´ÁË´Ë·ì϶¡£


https://thehackernews.com/2022/03/microsoft-azure-autowarp-bug-could-have.html


»ÝÆÕ½¨¸´Ó°ÏìÆäÊý°ÙÍǫ̀É豸µÄ16¸öUEFI¹Ì¼þ·ì϶


BinarlyÔÚ3ÔÂ8ÈÕ¹«¿ªÁËÔÚ»ÝÆÕÆóÒµÉ豸Öз¢ÏÖµÄ16¸öзì϶¡£ÕâЩ·ì϶´æÔÚÓÚͳһ¿ÉÀ©´ó¹Ì¼þ½Ó¿Ú(UEFI)¹Ì¼þÖУ¬¿É±»ÓÃÀ´»ñÈ¡¸ü¸ßȨÏÞ²¢ÔÚÉ豸ÉÏ×°ÖöñÒâÈí¼þ£¬Èƹý°²È«Èí¼þµÄ¼ì²â¡£ÆäÖнÏΪÑϳÁµÄÊÇÌáȨ·ì϶£¨CVE-2021-23932£©¡¢µ¼ÖÂËÁÒâ´úÂëÖ´ÐеĶѻº³åÇøÒç¶Âí½Å£¨CVE-2021-23924£©ºÍµ¼ÖÂËÁÒâ´úÂëÖ´ÐеÄÄÚ´æ°Ü»µ·ì϶£¨CVE-2021-23928£©¡£Ä¿Ç°£¬»ÝÆÕÒѽ¨¸´ÕâЩ·ì϶¡£


https://thehackernews.com/2022/03/new-16-high-severity-uefi-firmware.html


FBI³ÆRagnar LockerÒÑÈëÇÖÃÀ¹ú52¸ö¹Ø¼ü»ù´¡ÉèÊ©µÄ»ú¹¹


3ÔÂ7ÈÕ£¬ÃÀ¹úFBIÓëÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö½áºÏ°ä²¼ÁËÒ»·ÝTLP:WHITE¹«¸æ¡£¸Ã»ú¹¹Ö¸³ö£¬½ØÖÁ2022Äê1Ô£¬ÒÑÓÐ10¸ö¹Ø¼ü»ù´¡ÉèÊ©ÁìÓòµÄÖÁÉÙ52¸ö»ú¹¹Ôâµ½ÁËRagnarLockerÀÕË÷Èí¼þµÄ¹¥»÷£¬Éæ¼°Ôì×÷¡¢ÄÜÔ´¡¢½ðÈÚ·þÎñ¡¢µ±¾ÖºÍÐÅÏ¢¼¼ÊõµÈÐÐÒµ¡£¹«¸æ²à³ÁÓÚÌṩÓÃÀ´¼ì²âºÍ×èÖ¹Ragnar Locker¹¥»÷µÄÈëÇÖÖ¸±ê(IOC)£¬»¹¹«¿ªÁË·ÀÓù´ËÀ๥»÷µÄ»º½â´ëÊ©¡£FBI¶½´Ù±»¹¥»÷µÄ×éÖ¯µ±¼´Éϱ¨´ËÀàÊÂÎñ£¬²»¼¤ÀøÖ§¸¶Êê½ð¡£


https://www.documentcloud.org/documents/21397387-ragnarlocker-ransomware-indicators-of-compromise


¼ÓÄôóPressReader³ÆÔÚ¸´Ô­ÒòÍøÂç¹¥»÷ÖжϵÄÔËÓª


ýÌå3ÔÂ7ÈÕ±¨Â·£¬¼ÓÄôóPressReader³ÆÆäÔÚÖÂÁ¦¸´Ô­ÒòÍøÂç¹¥»÷ÖжϵÄÔËÓª¡£PressReaderÊÇÈ«Çò×î´óµÄÊý×Ö±¨Ö½ºÍÔÓÖ¾·ÖÏúÉÌ£¬×ÔÉÏÖÜËÄÆðÍ·³öÏÖÍøÂçÖжÏ£¬ÆäBranded EditionsÍøÕ¾¡¢ÀûÓ÷¨Ê½ºÍPressReaderÍøÕ¾Êܵ½Ó°Ïì¡£ÖÜÎåÍíÉÏ£¬¸Ã¹«Ë¾È·ÈÏÕâ´ÎÖжÏÊÇÒ»Â·ÍøÂ簲ȫÊÂÎñ¡£PressReaderÔÚ3ÔÂ6ÈÕ°ä²¼Óû§¸üУ¬³ÆÆäÍŶÓÔÚÖÂÁ¦¸´Ô­ÔËÓª£¬ÏÖÒÑ¿ÉÄÜ´¦ÖúͰ䲼µ±Ç°µÄ±¨Ö½ºÍÔÓÖ¾¡£


https://www.infosecurity-magazine.com/news/pressreader-suffers-cyber-attack/


ÂÞÂíÄáÑǵļÓÓÍÕ¾RompetrolÔâµ½À´×ÔHiveµÄÀÕË÷¹¥»÷


3ÔÂ7ÈÕ£¬ÂÞÂíÄáÑǵÄʯÓ͹©¸øÉÌRompetrol³ÆÆäÔâµ½ÍøÂç¹¥»÷£¬¹«Ë¾¹ÙÍøºÍ¼ÓÓÍÕ¾µÄFill&Go·þÎñ±»ÆÈ¹Ø¹Ø¡£RompetrolÊÇKMG InternationalµÄ×Ó¹«Ë¾£¬Ò²ÊÇÂÞÂíÄáÑÇ×î´óµÄÁ¶Óͳ§Petromidia NavodariµÄÔËÓªÉÌ£¬¸ÃÁ¶Óͳ§µÄÄê¼Ó¹¤ÄÜÁ¦³¬¹ý500Íò¶Ö¡£¾ÝϤ£¬Õâ´Î¹¥»÷µÄÄ»ºóºÚÊÖÊÇHive£¬¸ÃÍÅ»ïÌá³öÁË200ÍòÃÀÔªµÄÊê½ðÒªÇó¡£HiveĿǰ·Ç³£»îÔ¾ºÍ¼¤½ø£¬×Ô2021Äê6ÔÂÏÂÑ®ÆØ¹âÒÔÀ´£¬¾ùÔÈÿÌì¹¥»÷3¼Ò¹«Ë¾¡£


https://www.bleepingcomputer.com/news/security/rompetrol-gas-station-network-hit-by-hive-ransomware/


×êÑÐÍŶÓÅû¶AxedaÖÐͳ³ÆÎªAccess:7µÄÒ»×é·ì϶µÄÏêÇé


¾Ý3ÔÂ8ÈÕ±¨Â·£¬Forescout×êÑÐÍŶӷ¢ÏÖÁËPTC AxedaÖеÄ7¸ö·ì϶Access:7¡£Axeda¿Éͨ¹ý±¾µØ²¿ÊðµÄ´úÀí£¬ÌṩÀ´×ÔÍøÂçÉÏÎïÁªÍøÉ豸µÄÒ£²âÊý¾ÝºÍÔ¶³Ì·þÎñ£¬ÖØÒªÓÃÓÚÒ½ÁƱ£½¡ÐÐÒµ¡£Õâ´ÎÅû¶µÄ×îÑϳÁµÄÊÇ3¸ö´úÂëÖ´Ðзì϶CVE-2022-25251¡¢CVE-2022-25246ºÍCVE-2022-25247£¬CVSSÆÀ·Ö±ðÀëΪ9.4¡¢9.8ºÍ9.8¡£ForescoutÚ¹ÊÍ˵£¬¾ÍÒ½ÁÆÉ豸¶øÑÔ£¬¼´±ãÊDz»Ì«ÑϳÁµÄ·ì϶Ҳ»á²úÉú³Á´óÓ°Ï졣Ŀǰ£¬AxedaÒѽ¨¸´ÁËËùÓеÄAccess:7·ì϶¡£


https://www.bleepingcomputer.com/news/security/access-7-vulnerabilities-impact-medical-and-iot-devices/



°²È«¹¤¾ß


GO/NET Scanner


´øÓÐ Arp ·¢ÏÖºÍ×Ô¼ºµÄ½âÎöÆ÷µÄ Golang ÍøÂçɨÃ跨ʽ¡£


https://github.com/luijait/GONET-Scanner


GraphQL Cop 


ÊÇÒ»¸öÓ×ÐÍ Python ʵÓ÷¨Ê½£¬ÓÃÓÚÕë¶ÔGraphQL API ÔËÐг£¼ûµÄ°²È«²âÊÔ¡£


https://github.com/dolevf/graphql-cop


FastFuzz Chrome Extension


´øÓÐ chrome À©´óµÄ¼±¾çfuzzingÍøÕ¾¡£


https://github.com/tismayil/fastfuz-chrome-ext


s3sec


ÓÃÀ´²âÊÔ AWS S3 ´æ´¢Í°µÄ¶Á/д/ɾ³ý½Ó¼û¡£


https://github.com/0xmoot/s3sec


zkar


ÊÇÒ»¸öÓà Go ʵÏÖµÄ JavaÐòÁл¯ºÍ̸·ÖÎö¹¤¾ß£¬ÈÔÔÚ¿ª·¢ÖС£


https://github.com/phith0n/zkar



°²È«·ÖÎö


Coinbase ×èÖ¹Á˳¬¹ý 25,000 ¸öÓë¶íÂÞ˹ÓйصļÓÃܵØÖ·


https://www.bleepingcomputer.com/news/security/coinbase-blocks-over-25-000-russian-linked-crypto-addresses/


FBI£ºµ±¾Ö¹ÙÔ±ÔÚ´óÁ¿ÀÕË÷»î¶¯Öб»¼ÙÒâ


https://www.bleepingcomputer.com/news/security/fbi-govt-officials-impersonated-in-widespread-extortion-schemes/


¶íÂÞ˹·Å¿íµÁ°æÈí¼þÐí¿É¹æ¶¨


https://www.bleepingcomputer.com/news/government/piracy-ok-russia-to-ease-software-licensing-rules-after-sanctions/


ÏàʶºÚ¿ÍÈôºÎ¿úËÅ


https://thehackernews.com/2022/03/understanding-how-hackers-recon.html


ÈôºÎͨ¹ý Alexa µÄÓïÒôÈëÇÖ Alexa


https://www.schneier.com/blog/archives/2022/03/hacking-alexa-through-alexas-speech.html