Proofpoint·¢ÏÖÕë¶Ô·¨¹ú·Ö·¢ºóÃÅSerpentµÄ¹¥»÷»î¶¯

°ä²¼¹¦·ò 2022-03-24

Proofpoint·¢ÏÖÕë¶Ô·¨¹ú·Ö·¢ºóÃÅSerpentµÄ¹¥»÷»î¶¯


3ÔÂ21ÈÕ£¬ProofpointÅû¶ÁËÕë¶Ô·¨¹ú·Ö·¢ºóÃÅSerpentµÄ¹¥»÷»î¶¯µÄÏêÇé¡£Õâ´Î»î¶¯¼ÙÒâGDPR»ú¹¹£¬ÀûÓÃÁËWindowsµÄ¿ªÔ´°üÖÎÀíÆ÷Chocolatey£¬Ö¼ÔÚÏò·¨¹úµ±¾Ö»ú¹¹¡¢¹¹ÖþºÍ·¿µØ²ú¹«Ë¾µÄϵͳÉÏ×°ÖÃеĺóÃÅSerpent¡£³ýÁË×Ô½ç˵ºóÃÅSerpentºÍChocolateyÖ®±í£¬»¹ÓÐÒ»¸öÓÃschtasks.exe½øÐÐÊðÃû¶þ½øÔì´úÀíÖ´ÐеÄз¨Ê½£¨ÐÔÖÊÉÏÊÇÒ»ÖÖеļì²âÈÆ¹ý¼¼Êõ£©¡£ÕâЩ֤¾ÝÅú×¢£¬Õâ¿ÉÄÜÊÇÒ»¸öÐÂ×éÖ¯£¬ÓµÓи߾«¼âµÄ¼¼ÊõºÍÄÜÁ¦£¬ÇÒÓëÆäËûµÄÒÑÖªÍÅ»ïûÓÐÁªÏµ¡£ 


https://www.proofpoint.com/us/blog/threat-insight/serpent-no-swiping-new-backdoor-targets-french-entities-unique-attack-chain


ľÂíFaceStealerÒÑϰȾ³¬¹ý10Íò¸öAndroidÉ豸


°²È«¹«Ë¾PradeoÔÚ3ÔÂ21Èճƣ¬Ä¾ÂíFaceStealerÒÑͨ¹ýGoogle PlayÉ̵ê×°ÖÃÁ˳¬¹ý100000´Î¡£¸Ã¶ñÒâÈí¼þ¼Ù×°³ÉÒ»¸öÃûΪ¡°Craftsart Cartoon Photo Tools¡±µÄ¿¨Í¨»¯ÀûÓ÷¨Ê½£¬Ö¼ÔÚÇÔÈ¡Óû§µÄFacebookÍ´´¦¡£×êÑÐÈËÔ±°µÊ¾£¬µ±Óû§ÊäÈëÍ´´¦Ê±£¬¸ÃÀûÓûὫÆä·¢Ë͵½Î»ÓÚzutuu[.]infoµÄC2£¬²¢Ïòwww.dozenorms[.]club·¢ËͽøÒ»²½µÄÊý¾Ý¡£Ä¿Ç°£¬GoogleÒѽ«¸ÃÀûÓÃÒÆ³ý¡£


https://blog.pradeo.com/spyware-facestealer-google-play


0patch°ä²¼ÌáȨ·ì϶CVE-2021-34484µÄ·Ç¹Ù·½²¹¶¡


¾ÝýÌå3ÔÂ21ÈÕ±¨Â·£¬0patch°ä²¼ÁËWindowsÌáȨ·ì϶CVE-2021-34484µÄ·Ç¹Ù·½²¹¶¡¡£¸Ã·ì϶×îÔçÓÉAbdelhamid Naceri·¢ÏÖ£¬²¢ÓÚ2021Äê8ÔÂͨ¹ý΢ÈíµÄÖܶþ²¹¶¡½¨¸´¡£Naceri·¢Ïָò¹¶¡¿É±»Èƹý£¬Ö®ºó0patch°ä²¼Á˷ǹٷ½²¹¶¡¡£Î¢ÈíÓÖÓÚ2022Äê1Ô°䲼Á˵ڶþ¸ö¸üУ¬²¢ÎªÆä·ÖÅäÁËеÄCVE-2022-21919¡£µ«¸Ã²¹¶¡ÈԿɱ»Èƹý£¬ÇÒ΢ÈíµÄµÚ¶þ´Î¸üдúÌæÁË¡°profext.dll¡±Îļþ£¬µ¼ÖÂ0patchµÄ·Ç¹Ù·½²¹¶¡¾ù±»É¾³ý¡£´Ë¿Ì£¬0patchÓÖ½«¸Ã½¨¸´·¨Ê½ÒÆÖ²µ½2022Äê3ÔµÄÖܶþ²¹¶¡ÖУ¬¹©ËùÓÐЧ»§Ãâ·ÑʹÓá£


https://www.bleepingcomputer.com/news/microsoft/windows-zero-day-flaw-giving-admin-rights-gets-unofficial-patch-again/


HP°ä²¼¸üУ¬½¨¸´Ó°ÏìÆäÊý°Ù¿î´òÓ¡»úµÄ¶à¸ö·ì϶


3ÔÂ21ÈÕ£¬HPÒÑÕë¶ÔÓ°ÏìÆäÊý°Ù¿îLaserJet Pro¡¢Pagewide Pro¡¢OfficeJet¡¢Enterprise¡¢Large FormatºÍDeskJet´òÓ¡»úÐͺŵĶà¸ö·ì϶°ä²¼ÁËÁ½·Ý°²È«²¼¸æ¡£µÚÒ»·Ý²¼¸æÔ̺¬Á˿ɵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеĻº³åÇøÒç¶Âí½Å£¨CVE-2022-3942£©£¬HPÒÑΪ´óÎÞÊýÊÜÓ°Ïì²úÆ·°ä²¼¹Ì¼þ¸üУ¬²¢¶ÔûÓв¹¶¡µÄÉ豸ÌṩÁË»º½â²½Öè £»µÚ¶þ·Ý°²È«²¼¸æÔ̺¬CVE-2022-24291¡¢CVE-2022-24292ºÍCVE-2022-24293£¬ËüÃǿɱ»ÓÃÓÚÐÅϢй¶¡¢Ô¶³Ì´úÂëÖ´Ðкͻؾø·þÎñ¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/hundreds-of-hp-printer-models-vulnerable-to-remote-code-execution/


ÃÀ¹úÑÀ¿ÆÒ½ÔºJDCϰȾ¶ñÒâÈí¼þÉϰÙÍò»¼ÕßµÄÐÅϢй¶


ýÌå3ÔÂ21ÈÕ±¨Â·£¬JDC Healthcare Management LLC(JDC)й¶Á˳¬¹ý100ÍòµÂ¿ËÈøË¹¹«ÃñµÄÐÅÏ¢¡£JDC×ܲ¿Î»ÓÚ´ïÀ­Ë¹£¬ÊÇ´óÐÍÑÀ¿Æ±£½¡ÌṩÉÌ¡£¸Ã¹«Ë¾°µÊ¾£¬ËûÃÇÔÚ2021Äê8ÔÂ9ÈÕ×óÓÒ·¢ÏÔì䲿ÃÅϵͳϰȾÀ´Á˶ñÒâÈí¼þ£¬¾­¹ýµ÷²éÈ·¶¨ÔÚ2021Äê7ÔÂ27ÈÕÖÁ8ÔÂ16ÈÕ£¬´æ´¢ÔÚJDCµÄ²¿ÃÅÎļþÒѱ»½Ó¼û»òÏÂÔØ¡£Õâ´Îй¶µÄÐÅÏ¢Éæ¼°Éç»á°²È«ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢¼ÝÊ»ÅÆÕÕºÅÂëºÍ²ÆÕþÐÅÏ¢µÈ¡£ 


https://www.infosecurity-magazine.com/news/dental-care-data-breach-may-impact/


×êÑÐÈËÔ±ÑÝʾÈôºÎÀûÓÃÐµĹ¥»÷·½Ê½BitB½øÐд¹µö


¾Ý3ÔÂ21ÈÕ±¨Â·£¬×êÑÐÈËÔ±·¢ÏÖÁËÐµĹ¥»÷·½Ê½Browser-in-the Browser (BITB)¡£ÕâÖÖ²½ÖèÀûÓÃÁËǶÈëÔÚÍøÕ¾ÉϵĵÚÈýµØÆõµãµÇ¼(SSO)Ñ¡ÏÈ硰ʹÓùȸèµÇ¼¡±(»òFacebook¡¢AppleºÍMicrosoft)¡£¹ÌÈ»µ±Óû§³¢ÊÔͨ¹ýÕâЩ²½ÖèµÇ¼ʱ£¬Ä¬ÈÏÊÇͨ¹ýµ¯³ö´°¿ÚʵÏÖÉí·ÝÑéÖ¤£¬µ«BitB¹¥»÷Ö¼ÔÚʹÓÃHTMLºÍCSS´úÂëµÄÀ´¸´ÔìÕû¸ö¹ý³Ì£¬ÒÔ´´½¨Ò»¸öÆëÈ«Ðé¹¹µÄä¯ÀÀÆ÷´°¿Ú¡£Õâ¿ÉÓÃÀ´½øÐÐÁîÈËÕÛ·þµÄ´¹µö¹¥»÷£¬ÇÒÏÕЩÎÞ·¨±»¼ì²âµ½¡£


https://thehackernews.com/2022/03/new-browser-in-browser-bitb-attack.html



°²È«¹¤¾ß


Adversary3


Adversary3 ÊÇÒ»ÖÖµ¼º½ÖØ´óµÄ www.malvuln.com ¶ñÒâÈí¼þ·ì϶Êý¾Ý¼¯µÄ¹¤¾ß¡£


https://packetstormsecurity.com/files/166384/Adversary3-main.zip


Nuclei


Ò»¸öNuclei Ä£°åÌìÉúÆ÷ BurpSuite ²å¼þ¡£


https://github.com/projectdiscovery/nuclei-burp-plugin


C0deVari4nt


ÊÇÒ»ÖÖ±äÌå·ÖÎöºÍ¿ÉÊÓ»¯¹¤¾ß£¬¿É²é³­´úÂë¿âÖеÄÀàËÆ·ì϶¡£


https://github.com/whitesquirrell/C0deVari4nt


uncover


ʹÓöà¸öËÑË÷ÒýÇæ¼±¾ç·¢ÏÖ»¥ÁªÍøÉ϶³öµÄÖ÷»ú¡£


https://github.com/projectdiscovery/uncover




°²È«·ÖÎö


Sandworm: Ò»¸öµß¸²ÐԵĹÊʳÁÊö


https://www.welivesecurity.com/2022/03/21/sandworm-tale-disruption-told-anew/


ÈýÐÇ Galaxy S22 Ultra ´Ë¿Ì³öÏÖ GPS ÃýÎó


https://news.softpedia.com/news/samsung-galaxy-s22-ultra-now-hitting-gps-errors-because-why-not-535080.shtml


Òâ´óÀûÊý¾ÝÒþÖÔ¼à¹Ü»ú¹¹¶Ô¿¨°Í˹»ùÓйصÄDZÔÚ·çÏÕ·¢Õ¹µ÷²é


https://securityaffairs.co/wordpress/129304/digital-id/italys-data-privacy-watchdog-investigats-kaspersky.html


ÎÚ¿ËÀ¼°ä²¼InvisiMoleÓã²æÊ½´¹µö¹¥»÷µÄ¾¯±¨


https://securityaffairs.co/wordpress/129337/apt/invisimole-targets-ukraine-government.html