¹ú¶È»¥ÁªÍøÐÅÏ¢°ì¹«ÊÒ°ä²¼¡¶Êý×ÖÖйú·¢Õ¹»ã±¨£¨2021Ä꣩¡·

°ä²¼¹¦·ò 2022-08-04

1¡¢¹ú¶È»¥ÁªÍøÐÅÏ¢°ì¹«ÊÒ°ä²¼¡¶Êý×ÖÖйú·¢Õ¹»ã±¨£¨2021Ä꣩¡·

      

¹ú¶È»¥ÁªÍøÐÅÏ¢°ì¹«ÊÒÔÚ8ÔÂ2ÈÕ°ä²¼ÁË¡¶Êý×ÖÖйú·¢Õ¹»ã±¨£¨2021Ä꣩¡·¡£¡¶»ã±¨¡·×ܽáÁ˵³µÄÊ®¾Å´óÒÔÀ´Êý×ÖÖйú½¨Éè»ñµÃµÄÏÔÖø³É¾ÍºÍ2021ÄêµÄ³ÁÒª½øÕ¹¹¦Ð§£¬ÆÀ¹ÀÁË2021Äê¸÷µØÓòÊý×Ö»¯·¢Õ¹Ë®Æ½£¬²¢¶Ô2022ÄêÊý×ÖÖйú½¨Éè½øÐÐÁËÕ°Íû¡£½ØÖÁ2021Äêµ×£¬ÎÒ¹úÒѽ¨³É142.5Íò¸ö5G»ùÕ¾£¬×ÜÁ¿Õ¼È«Çò60%ÒÔÉÏ£¬5GÓû§Êý´ïµ½3.55ÒÚ»§¡£È«¹ú³¬300¸ö³ÇÊÐÆô¶¯Ç§Õ×¹âÏË¿í´øÍøÂ罨É裬ǧÕ×Óû§¹æÄ£´ï3456Íò»§¡£2017Äêµ½2021Ä꣬ÎÒ¹úÊý¾Ý²úÁ¿´Ó2.3ZBÔö³¤ÖÁ6.6ZB£¬È«ÇòÕ¼±È9.9%£¬Î»¾ÓÊÀ½çµÚ¶þ¡£


http://www.cac.gov.cn/2022-08/02/c_1661066515613920.htm


2¡¢µÂ¹úµçÁ¦µç×ÓÔì×÷ÉÌSemikronÔâµ½LVÀÕË÷Èí¼þµÄ¹¥»÷

      

¾ÝýÌå8ÔÂ2ÈÕ±¨Â·£¬µÂ¹úµçÁ¦µç×ÓÔì×÷ÉÌSemikronÔâµ½ÀÕË÷¹¥»÷£¬²¿ÃÅϵͳÒѱ»¼ÓÃÜ¡£¸Ã¹«Ë¾ÊÇÊÀ½çµ±ÏȵĵçÁ¦¹¤³Ì²¿¼þÔì×÷ÉÌÖ®Ò»£¬2020ÄêµÄ½»Ò×¶îԼΪ4.61ÒÚÃÀÔª£¬Ã¿Äê×°ÖõķçÁ¦ÎÐÂÖ»úÖÐÓÐ35%ʹÓÃËüµÄ¼¼ÊõÔËÐС£SemikronûÓй«¿ªÓйØÀÕË÷Èí¼þµÄÈκÎÐÅÏ¢£¬µ«×êÑÐÈËÔ±ÔÚ±»¼ÓÃÜϵͳÉϵÄÊê½ð¼Í¼Öз¢ÏÖÕâÊÇÀ´×ÔLVÀÕË÷Èí¼þµÄ¹¥»÷£¬¹¥»÷Õß»¹Ðû³ÆÒѾ­ÇÔÈ¡ÁË2TBµÄÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/semiconductor-manufacturer-semikron-hit-by-lv-ransomware-attack/


3¡¢Malwarebytes³Æ¶íÂÞ˹µÄ×éÖ¯Ô⵽еÄWoody RATµÄ¹¥»÷

      

ýÌå8ÔÂ3Èճƣ¬¹¥»÷ÕßʹÓÃWoody RAT¹¥»÷¶íÂÞ˹µÄʵÌå¡£Malwarebytes°µÊ¾£¬Æ¾¾Ý¹¥»÷Õß×¢²áµÄÓò£¬µÃÖªËûÃÇÊÔͼ¹¥»÷¶íÂÞ˹º½¿Õº½ÌìºÍ¹ú·À¹«Ë¾OAK¡£Woody RATÒѱ»ÓÃÓÚ¹¥»÷ÖÁÉÙÒ»Ä꣬ËüʹÓÃÁ½¸öDLL WoodySharpExecutorºÍWoodyPowerSessionÖ´ÐдÓC2½Ó¹ÜµÄ.NET´úÂëºÍPowerShellºÅÁîºÍ¾ç±¾¡£Ò»µ©Æô¶¯£¬¾Í»áͨ¹ýprocess hollowing½«×Ô¼º×¢Èëµ½ÔÝÍ£µÄ¼Çʱ¾¹ý³ÌÖÐÀ´Èƹý¼ì²â¡£RAT»¹Ê¹ÓÃRSA-4096ºÍAES-CBCµÄ×éºÏÀ´¼ÓÃÜC2ͨѶͨ·£¬ÒÔÈÆ¹ý»ùÓÚÍøÂçµÄ¼à¿Ø¡£Ä¿Ç°£¬ÉÐ佫¶ñÒâÈí¼þºÍ¹¥»÷»î¶¯¹éÒòÓÚÈκÎÒÑÖª¹¥»÷ÍŻ


https://www.bleepingcomputer.com/news/security/russian-organizations-attacked-with-new-woody-rat-malware/


4¡¢Cisco Talos½üÆÚÔÚÒ°·¢ÏÖÐµĹ¥»÷¿ò¼ÜManjusaka

      

8ÔÂ2ÈÕ£¬Cisco TalosÅû¶Á˽üÆÚÔÚÒ°·¢ÏÖÐµĹ¥»÷¿ò¼ÜManjusakaµÄ¼¼ÊõÐÅÏ¢¡£ManjusakaÊǶÔCobalt Strike¿ò¼ÜµÄ·ÂÕÕ£¬Ö²È뷨ʽÊÇÓÉRust˵»°¿ª·¢µÄ£¬ºÏÓÃÓÚWindowsºÍLinux£¬¶þ½øÔìÎļþÊÇÓÃGoLang¿ª·¢µÄ¡£Ö²È뷨ʽÔ̺¬Ò»¸öRATºÍÒ»¸öÎļþÖÎÀíÄ£¿é£¬Ã¿¸öÄ£¿é¶¼ÓµÓÐ·ÖÆçµÄÖ°ÄÜ¡£RATÖ§³Öͨ¹ý¡°cmd.exe¡±Ö´ÐÐËÁÒâºÅÁî£¬ÍøÂç´æ´¢ÔÚWebä¯ÀÀÆ÷ÖеÄÍ´´¦¡¢WiFi SSIDºÍÃÜÂ룬²¢·¢ÏÖÍøÂçÏνӣ¨TCPºÍUDP£©¡¢ÕÊ»§ÃûºÍ±¾µØ×éµÈ¡£Ä¿Ç°£¬ManjusakaËÆºõÊÇÔÚÊÔ̽ÐÔµØÔÚÒ°±í½øÐвâÊÔ£¬Òò¶ø´§¶ÈÆä¿ª·¢¿ÉÄÜ»¹Ã»ÓнøÈë×îºó½×¶Î¡£


https://blog.talosintelligence.com/2022/08/manjusaka-offensive-framework.html


5¡¢Google°ä²¼8Ô·ݰ²È«¸üУ¬½¨¸´ChromeÖжà¸ö·ì϶

      

GoogleÓÚ8ÔÂ2ÈÕ°ä²¼Á˱¾Ôµİ²È«¸üУ¬½¨¸´ÁËChromeÖжà¸ö·ì϶¡£ÆäÖнÏΪÑϳÁµÄ·ì϶Ϊ¶àÖ°ÄÜ¿òÖеĿªÊͺóʹÓ÷ì϶£¨CVE-2022-2603£©¡¢°²È«ä¯ÀÀÖеĿªÊͺóʹÓ÷ì϶(CVE-2022-2604)¡¢DawnÖеÄÔ½½ç¶ÁÈ¡·ì϶(CVE-2022-2605)¡¢Managed devices APIÖеĿªÊͺóʹÓ÷ì϶(CVE-2022-2606)ºÍTab StripÖеĿªÊͺóʹÓ÷ì϶(CVE-2022-2607)¡£Google°µÊ¾£¬ÕâЩ·ì϶²¢Î´±»ÔÚÒ°±íÀûÓá£


https://chromereleases.googleblog.com/


6¡¢OxeyeÅû¶»ùÓÚGolang¿ª·¢µÄÀûÓõÄзì϶ParseThru

      

¾Ý8ÔÂ2ÈÕ±¨Â·£¬OxeyeµÄ×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öÃûΪParseThruµÄзì϶£¬»áÓ°Ïì»ùÓÚGolangµÄÀûÓ÷¨Ê½¡£Õâ¸öÎÊÌâµÄÖ÷ÌâÔÚÓÚ£¬GolangµÄURL½âÎöÂß¼­±»ÒýÈëµ½"net/url "¿âÖеı䶯¶ø²úÉúµÄ²»Ò»Ö¡£¸Ã·ì϶¿É±»¹¥»÷ÕßÓÃÓÚÈÆ¹ý»ùÓÚHTTPÒªÇó²ÎÊýµÄÑéÖ¤¡£Oxeye°µÊ¾£¬ËüÔÚHarbour¡¢TraefikºÍSkipperµÈ¿ªÔ´ÏîÄ¿Öз¢ÏÖÁËParseThruÊ·ý£¬¿ÉÄܵ¼ÖÂÈÆ¹ýÏÖÓеÄÑéÖ¤²¢Ö´ÐÐδ¾­ÊÚȨµÄ²Ù×÷¡£Ä¿Ç°£¬ÕâЩÎÊÌâÒѱ»½â¾ö¡£


https://thehackernews.com/2022/08/new-parsethru-parameter-smuggling.html