Google½¨¸´ChromeÖÐÒѱ»ÀûÓõÄ0 day CVE-2022-1096

°ä²¼¹¦·ò 2022-03-29

Google½¨¸´ChromeÖÐÒѱ»ÀûÓõÄ0 day CVE-2022-1096


3ÔÂ25ÈÕ£¬Google°ä²¼ÁËÒ»¸ö´¹Î£¸üУ¬½¨¸´ChromeÖÐÒѱ»ÀûÓõÄ0 day£¨CVE-2022-1096£©¡£ÕâÊÇV8 JavaScriptÒýÇæÖеÄÀàÐÍ»ìºÏ·ì϶£¬³É¹¦ÀûÓø÷ì϶¿ÉÔÚ»º³åÇøÌìǵ±í¶ÁÈ¡»òдÈëÄÚ´æ²¢µ¼ÖÂä¯ÀÀÆ÷±ÀÀ££¬µ«Ò²¿É±»ÓÃÀ´Ö´ÐÐËÁÒâ´úÂë¡£Ö»¹ÜGoogle°µÊ¾ÒÑÔÚÒ°±í¼ì²âµ½ÀûÓÃÕâ¸öÀûÓø÷ì϶µÄ¹¥»÷£¬µ«Æä²¢Ã»ÓзÖÏí¹¥»÷»î¶¯µÄ¼¼Êõϸ½ÚµÈÐÅÏ¢¡£ÕâÊÇGoogleÔÚ2022Ä꽨¸´µÄµÚ¶þ¸öChrome 0day£¬µÚÒ»¸öÊÇ¿ªÊͺóʹÓ÷ì϶£¨CVE-2022-0609£©£¬ÓÚ2ÔÂ14ÈÕ½¨¸´¡£


https://thehackernews.com/2022/03/google-issues-urgent-chrome-update-to.html


Î÷²¿Êý¾Ý½¨¸´²úÆ·ÖÐÔ½½ç¶Ñ¶Áд·ì϶CVE-2021-44142


¾ÝýÌå3ÔÂ26ÈÕ±¨Â·£¬Î÷²¿Êý¾Ý£¨Western Digital£©½¨¸´ÁËÆäMy Cloud NASÉ豸Éϵķì϶£¨CVE-2021-44142£©¡£ÕâÊÇSamba vfs_fruit VFSÄ£¿éÖеÄÔ½½ç¶Ñ¶Á/д·ì϶£¬¹¥»÷Õß¿ÉÀûÓÃÆäÔÚÉ豸ÉÏÒÔrootȨÏÞÔ¶³ÌÖ´ÐÐËÁÒâ´úÂë¡£¸Ã¹«Ë¾Ú¹ÊͳÆ£¬ÔÚsmbdÖдò¿ªÎļþʱ£¬¸Ã·ì϶´æÔÚÓÚÀ©´óÊôÐÔ(EA)ÔªÊý¾ÝµÄ½âÎöÖУ¬ÒÑͨ¹ý´ÓÅäÖõÄVFS¶ÔÏóÁбíÖÐɾ³ý¡°fruit¡±VFSÄ£¿é²¢¸ü¸ÄEAÖ§³ÖÅäÖýøÐн¨¸´¡£


https://www.bleepingcomputer.com/news/security/western-digital-fixes-critical-bug-giving-root-on-my-cloud-nas-devices/


Sophos Firewall²úÆ·ÖдæÔÚRCE·ì϶CVE-2022-1040


3ÔÂ25ÈÕ£¬SophosÅû¶ӰÏìÆäFirewall°æ±¾18.5 MR3(18.5.3)¼°¸üµÍ°æ±¾µÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2022-1040£©µÄϸ½Ú¡£ÕâÊÇÓÉÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶µ¼ÖµÄ£¬CVSSÆÀ·ÖΪ9.8£¬¹¥»÷ÕßÀûÓø÷ì϶Äܹ»ÔÚ½Ó¼û·À»ðǽµÄÓû§ÃÅ»§»òWebadmin½çÃæÊ±ÈÆ¹ýÉí·ÝÑéÖ¤²¢Ö´ÐÐËÁÒâ´úÂë¡£¸Ã¹«Ë¾³Æ£¬ÆôÓÃÁËĬÈÏÖ°ÄÜ¡°ÔÊÐí×Ô¶¯×°Öý¨¸´·¨Ê½¡±µÄÓû§ÎÞÐè¶î±í²Ù×÷¼´¿É½¨¸´¸Ã·ì϶¡£Í³Ò»ÖÜ£¬Sophos»¹½¨¸´ÆäUTMÉ豸ÖеÄ2¸ö·ì϶£¨CVE-2022-0386ºÍCVE-2022-0652£©¡£


https://www.bleepingcomputer.com/news/security/critical-sophos-firewall-vulnerability-allows-remote-code-execution/


Â׶ؾ¯·½¿ÛÁôÉæÏÓÓëLAPSUS$ÍÅ»ïÓйصÄ7ÃûÏÓÒÉÈË


¾Ý3ÔÂ25ÈÕ±¨Â·³Æ£¬Â׶ؾ¯·½¿ÛÁôÁË7Ãû16ÖÁ21ËêµÄÏÓÒÉÈË£¬ÉæÏÓÓë»îÔ¾µÄÀÕË÷ÍÅ»ïLAPSUS$ÓйØÁª¡£¸ÃÍÅ»ïÔÚ½üÆÚ¹¥»÷ÁËNVIDIA¡¢ÈýÐÇ¡¢Óý±Ì¡¢LG¡¢Î¢ÈíºÍOktaµÈ¹«Ë¾¡£¾ÝϤ£¬Ò»¸ö16ËêµÄÅ£½òÉÙÄêÊǸÃÍÅ»ïµÄÖ÷ı£¬ËûÒÔWhite»òBreachbaseµÄÃûÒåͨ¹ýºÚ¿Í¹¥»÷ÀÛ»ý»ñµÃÁËÔ¼1400ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£ÔÚÓëóÒ×ͬ°é²úÉúÕùÖ´ºó£¬Ëû£¨¡°White¡±£©µÄÐÕÃû¡¢µØÖ·ºÍÉ罻ýÌåͼƬµÈÓ×ÎÒÐÅÏ¢±»ÆØ¹â¡£


https://thehackernews.com/2022/03/7-suspected-members-of-lapsus-hacker.html


Juniper°ä²¼MuhstikÕë¶ÔRedis·þÎñÆ÷µÄ·ÖÎö»ã±¨


3ÔÂ24ÈÕ£¬Juniper°ä²¼»ã±¨³ÆMuhstikÔÚ»ý¼«ÀûÓÃRedisÖеķì϶£¨CVE-2022-0543£©¡£¸Ã·ì϶ÓÚ½ñÄê2Ô·ݱ»·¢ÏÖ£¬ËüµÄÒ»¸öPoCÓÚ3ÔÂ10ÈÕÔÚGitHubÉϹ«¿ª£¬¿ÉÀûÓø÷ì϶Զ³ÌÖ´ÐÐËÁÒâLua¾ç±¾²¢ÊµÏÖɳÏäÌÓÒÝ¡£Juniper°µÊ¾£¬¾ÍÔÚPoC°ä²¼Ò»Ììºó£¬MuhstikÆðÍ·»ý¼«ÀûÓø÷ì϶·Ö·¢Æä¶ñÒâÈí¼þ¡£Muhstik½«Æäpayload¶¨ÃûΪ¡°russia.sh¡±£¬Ê¹ÓÃwget»òcurl´ÓC2ÏÂÔØ£¬±£ÁôΪ¡°/tmp.russ¡±£¬²¢×îÖÕÖ´ÐС£


https://blogs.juniper.net/en-us/security/muhstik-gang-targets-redis-servers


SentinelLabs°ä²¼Scarab·Ö·¢ºóÃÅHeaderTipµÄ»ã±¨


SentinelLabsÔÚ3ÔÂ24ÈÕ°ä²¼»ã±¨£¬ÏêÊöÁËScarabÐÂÒ»ÂֵĴ¹µö¹¥»÷»î¶¯¡£3ÔÂ22ÈÕ£¬ÎÚ¿ËÀ¼CERT-UA°ä²¼ÁËÒ»·Ý¹ØÓÚ¹¥»÷ÍÅ»ïUAC-0026µÄ°²È«¹«¸æ£¬Åû¶ÁË·Ö·¢ÃûΪHeaderTipµÄ¶ñÒâDLLµÄÓã²æÊ½´¹µö»î¶¯µÄϸ½Ú¡£SentinelLabs½«¸Ã¶ñÒâÈí¼þÓëScarab APT¹ØÁªÆðÀ´£¬³ÆHeaderTipÓëScarabµÄ×Ô½ç˵ºóÃÅScironµÄ»ù´¡ÉèÊ©ÓгÁµþ£¬ÇÒºóÕß¿ÉÄܾÍÊÇHeaderTipµÄǰÉí¡£HeaderTipÊÇÒ»¸öÓÃC++±àдµÄ32λDLLÎļþ£¬´óÓ×Ϊ9.7KB£¬½öÓÃÓÚ»ñÈ¡ÏÂÒ»½×¶ÎµÄpayload¡£


https://www.sentinelone.com/labs/chinese-threat-actor-scarab-targeting-ukraine/




°²È«¹¤¾ß


Access Undenied


Ermetic°ä²¼ÁËÒ»¸ö¿ªÔ´¹¤¾ß£¬ÓÃÓÚÖÎÀíAWSÖеÄAccessDeniedÊÂÎñ¡£


https://github.com/ermetic/access-undenied-aws


pdfrip


Óà Rust ±àдµÄ¼±¾çµÄ PDF ÃÜÂëÆÆ½âÀûÓ÷¨Ê½£¬½¨Éè³£¼ûµÄÃÜÂëÌåʽ¹¹½¨Æ÷ºÍ×ֵ乥»÷¡£


https://github.com/mufeedvh/pdfrip


OffensiveNotion


»ùÓÚ Notion ±Ê¼ÇÀûÓ÷¨Ê½¹¹½¨µÄȫְÄÜ C2 ƽ̨¡£


https://github.com/mttaggart/OffensiveNotion/


Tiktok Scraper


´Ó TikTok ץȡ²¢ÏÂÔØÓÐЧµÄÐÅÏ¢£¬ÎÞÐèµÇ¼Ãû»òÃÜÂë¡£


https://github.com/soxoj/tiktok-scraper




°²È«·ÖÎö


΢Èí£ºWindows 7 ¸´Ô­¹âÅÌÔÚ×°Öà 1Ô·ݸüкó½«ÎÞ·¨Æô¶¯


https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-7-recovery-app-fails-after-january-updates/


ÃÀ¹ú³Æ¿¨°Í˹»ù¶Ô¹ú¶È°²È«×é³É²»³É½ÓÊܵķçÏÕ


https://www.bleepingcomputer.com/news/security/us-says-kaspersky-poses-unacceptable-risk-to-national-security/


ÍøÂç´¹µö¹¤¾ß°ü²»ÐÝ·¢Õ¹ÒÔÈÆ¹ý°²È«Èí¼þ


https://www.bleepingcomputer.com/news/security/phishing-kits-constantly-evolve-to-evade-security-software/


ÈôºÎ¹¹½¨×Ô½ç˵¶ñÒâÈí¼þ·ÖÎöɳÏä


https://thehackernews.com/2022/03/how-to-build-custom-malware-analysis.html


Elden Ring·ìÏ¶Ê¹Íæ¼ÒÏÝÈëÎÞÏÞéæÃüÑ­»·


https://blog.malwarebytes.com/hacking-2/2022/03/elden-ring-exploit-traps-players-in-infinite-death-loop/