GoogleÐÞ¸´ChromeÖÐÒѱ»ÀûÓõÄ0 day CVE-2022-1096

Ðû²¼Ê±¼ä 2022-03-29

GoogleÐÞ¸´ChromeÖÐÒѱ»ÀûÓõÄ0 day CVE-2022-1096


3ÔÂ25ÈÕ£¬GoogleÐû²¼ÁËÒ»¸ö½ô¼±¸üУ¬ÐÞ¸´ChromeÖÐÒѱ»ÀûÓõÄ0 day£¨CVE-2022-1096£©¡£ÕâÊÇV8 JavaScriptÒýÇæÖеÄÀàÐÍ»ìÏý©¶´£¬ÀÖ³ÉÀûÓøÃ©¶´¿ÉÔÚ»º³åÇø½çÏÞÍâ¶ÁÈ¡»òдÈëÄÚ´æ²¢µ¼ÖÂä¯ÀÀÆ÷Í߽⣬µ«Ò²¿É±»ÓÃÀ´Ö´ÐÐÈÎÒâ´úÂë¡£¾¡¹ÜGoogleÌåÏÖÒÑÔÚÒ°Íâ¼ì²âµ½ÀûÓÃÕâ¸öÀûÓøÃ©¶´µÄ¹¥»÷£¬µ«Æä²¢Ã»ÓзÖÏí¹¥»÷»î¶¯µÄ¼¼Êõϸ½ÚµÈÐÅÏ¢¡£ÕâÊÇGoogleÔÚ2022ÄêÐÞ¸´µÄµÚ¶þ¸öChrome 0day£¬µÚÒ»¸öÊÇÊͷźóʹÓé¶´£¨CVE-2022-0609£©£¬ÓÚ2ÔÂ14ÈÕÐÞ¸´¡£


https://thehackernews.com/2022/03/google-issues-urgent-chrome-update-to.html


Î÷²¿Êý¾ÝÐÞ¸´²úÎïÖÐÔ½½ç¶Ñ¶Áд©¶´CVE-2021-44142


¾ÝýÌå3ÔÂ26ÈÕ±¨µÀ£¬Î÷²¿Êý¾Ý£¨Western Digital£©ÐÞ¸´ÁËÆäMy Cloud NASÉè±¹ØÁ¬Ä©¶´£¨CVE-2021-44142£©¡£ÕâÊÇSamba vfs_fruit VFSÄ£¿éÖеÄÔ½½ç¶Ñ¶Á/д©¶´£¬¹¥»÷Õß¿ÉÀûÓÃÆäÔÚÉ豸ÉÏÒÔrootȨÏÞÔ¶³ÌÖ´ÐÐÈÎÒâ´úÂë¡£¸Ã¹«Ë¾½âÊͳÆ£¬ÔÚsmbdÖдò¿ªÎļþʱ£¬¸Ã©¶´´æÔÚÓÚÀ©Õ¹ÊôÐÔ(EA)ÔªÊý¾ÝµÄ½âÎöÖУ¬ÒÑͨ¹ý´ÓÅäÖõÄVFS¹¤¾ßÁбíÖÐɾ³ý¡°fruit¡±VFSÄ£¿é²¢¸ü¸ÄEAÖ§³ÖÅäÖýøÐÐÐÞ¸´¡£


https://www.bleepingcomputer.com/news/security/western-digital-fixes-critical-bug-giving-root-on-my-cloud-nas-devices/


Sophos Firewall²úÎïÖдæÔÚRCE©¶´CVE-2022-1040


3ÔÂ25ÈÕ£¬SophosÅû¶ӰÏìÆäFirewall°æ±¾18.5 MR3(18.5.3)¼°¸üµÍ°æ±¾µÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2022-1040£©µÄϸ½Ú¡£ÕâÊÇÓÉÉí·ÝÑéÖ¤ÈÆ¹ý©¶´µ¼ÖµÄ£¬CVSSÆÀ·ÖΪ9.8£¬¹¥»÷ÕßÀûÓøÃ©¶´¿ÉÒÔÔÚ·ÃÎÊ·À»ðǽµÄÓû§ÃÅ»§»òWebadmin½çÃæÊ±ÈÆ¹ýÉí·ÝÑéÖ¤²¢Ö´ÐÐÈÎÒâ´úÂë¡£¸Ã¹«Ë¾³Æ£¬ÆôÓÃÁËĬÈϹ¦Ð§¡°ÔÊÐí×Ô¶¯°²×°ÐÞ¸´·¨Ê½¡±µÄÓû§ÎÞÐèÌØ±ð²Ù×÷¼´¿ÉÐÞ¸´¸Ã©¶´¡£Í¬Ò»ÖÜ£¬Sophos»¹ÐÞ¸´ÆäUTMÉ豸ÖеÄ2¸ö©¶´£¨CVE-2022-0386ºÍCVE-2022-0652£©¡£


https://www.bleepingcomputer.com/news/security/critical-sophos-firewall-vulnerability-allows-remote-code-execution/


Â׶ؾ¯·½´þ²¶ÉæÏÓÓëLAPSUS$ÍÅ»ïÓйصÄ7ÃûÏÓÒÉÈË


¾Ý3ÔÂ25ÈÕ±¨µÀ³Æ£¬Â׶ؾ¯·½´þ²¶ÁË7Ãû16ÖÁ21ËêµÄÏÓÒÉÈË£¬ÉæÏÓÓë»îÔ¾µÄÀÕË÷ÍÅ»ïLAPSUS$ÓйØÁª¡£¸ÃÍÅ»ïÔÚ½üÆÚ¹¥»÷ÁËNVIDIA¡¢ÈýÐÇ¡¢Óý±Ì¡¢LG¡¢Î¢ÈíºÍOktaµÈ¹«Ë¾¡£¾ÝϤ£¬Ò»¸ö16ËêµÄÅ£½òÉÙÄêÊǸÃÍÅ»ïµÄÖ÷ı£¬ËûÒÔWhite»òBreachbaseµÄÃûÒåͨ¹ýºÚ¿Í¹¥»÷ÀÛ»ý»ñµÃÁËÔ¼1400ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£ÔÚÓëÉÌÒµ»ï°é·¢ÉúÕùÖ´ºó£¬Ëû£¨¡°White¡±£©µÄÐÕÃû¡¢µØÖ·ºÍÉ罻ýÌåͼƬµÈ¸öÈËÐÅÏ¢±»ÆØ¹â¡£


https://thehackernews.com/2022/03/7-suspected-members-of-lapsus-hacker.html


JuniperÐû²¼MuhstikÕë¶ÔRedis·þÎñÆ÷µÄ·ÖÎö³ÂËß


3ÔÂ24ÈÕ£¬JuniperÐû²¼³ÂËß³ÆMuhstikÕýÔÚ»ý¼«ÀûÓÃRedisÖеÄ©¶´£¨CVE-2022-0543£©¡£¸Ã©¶´ÓÚ½ñÄê2Ô·ݱ»·¢ÏÖ£¬ËüµÄÒ»¸öPoCÓÚ3ÔÂ10ÈÕÔÚGitHubÉϹûÈ»£¬¿ÉÀûÓøÃ©¶´Ô¶³ÌÖ´ÐÐÈÎÒâLua½Å±¾²¢ÊµÏÖɳÏäÌÓÒÝ¡£JuniperÌåÏÖ£¬¾ÍÔÚPoCÐû²¼Ò»Ììºó£¬Muhstik¿ªÊ¼»ý¼«ÀûÓøÃ©¶´·Ö·¢Æä¶ñÒâÈí¼þ¡£Muhstik½«ÆäpayloadÃüÃûΪ¡°russia.sh¡±£¬Ê¹ÓÃwget»òcurl´ÓC2ÏÂÔØ£¬Éú´æÎª¡°/tmp.russ¡±£¬²¢×îÖÕÖ´ÐС£


https://blogs.juniper.net/en-us/security/muhstik-gang-targets-redis-servers


SentinelLabsÐû²¼Scarab·Ö·¢ºóÃÅHeaderTipµÄ³ÂËß


SentinelLabsÔÚ3ÔÂ24ÈÕÐû²¼³ÂËߣ¬ÏêÊöÁËScarabÐÂÒ»ÂֵĵöÓã¹¥»÷»î¶¯¡£3ÔÂ22ÈÕ£¬ÎÚ¿ËÀ¼CERT-UAÐû²¼ÁËÒ»·Ý¹ØÓÚ¹¥»÷ÍÅ»ïUAC-0026µÄÄþ¾²Í¨¸æ£¬Åû¶ÁË·Ö·¢ÃûΪHeaderTipµÄ¶ñÒâDLLµÄÓã²æÊ½µöÓã»î¶¯µÄϸ½Ú¡£SentinelLabs½«¸Ã¶ñÒâÈí¼þÓëScarab APT¹ØÁªÆðÀ´£¬³ÆHeaderTipÓëScarabµÄ×Ô½ç˵ºóÃÅScironµÄ»ù´¡ÉèÊ©ÓÐÖØµþ£¬ÇÒºóÕß¿ÉÄܾÍÊÇHeaderTipµÄǰÉí¡£HeaderTipÊÇÒ»¸öÓÃC++±àдµÄ32λDLLÎļþ£¬¾ÞϸΪ9.7KB£¬½öÓÃÓÚ»ñÈ¡ÏÂÒ»½×¶ÎµÄpayload¡£


https://www.sentinelone.com/labs/chinese-threat-actor-scarab-targeting-ukraine/




Äþ¾²¹¤¾ß


Access Undenied


ErmeticÐû²¼ÁËÒ»¸ö¿ªÔ´¹¤¾ß£¬ÓÃÓÚ¹ÜÀíAWSÖеÄAccessDeniedʼþ¡£


https://github.com/ermetic/access-undenied-aws


pdfrip


Óà Rust ±àдµÄ¿ìËÙµÄ PDF ÃÜÂëÆÆ½âÓ¦Ó÷¨Ê½£¬Å䱸³£¼ûµÄÃÜÂë¸ñʽ¹¹½¨Æ÷ºÍ×ֵ乥»÷¡£


https://github.com/mufeedvh/pdfrip


OffensiveNotion


»ùÓÚ Notion Ìõ¼ÇÓ¦Ó÷¨Ê½¹¹½¨µÄÈ«¹¦Ð§ C2 ƽ̨¡£


https://github.com/mttaggart/OffensiveNotion/


Tiktok Scraper


´Ó TikTok ץȡ²¢ÏÂÔØÓÐÓõÄÐÅÏ¢£¬ÎÞÐèµÇ¼Ãû»òÃÜÂë¡£


https://github.com/soxoj/tiktok-scraper




Äþ¾²·ÖÎö


΢Èí£ºWindows 7 »Ö¸´¹âÅÌÔÚ°²×° 1Ô·ݸüкó½«ÎÞ·¨Æô¶¯


https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-7-recovery-app-fails-after-january-updates/


ÃÀ¹ú³Æ¿¨°Í˹»ù¶Ô¹ú¼ÒÄþ¾²×é³É²»ÐнÓÊܵķçÏÕ


https://www.bleepingcomputer.com/news/security/us-says-kaspersky-poses-unacceptable-risk-to-national-security/


ÍøÂçµöÓ㹤¾ß°ü²»Í£Éú³¤ÒÔÈÆ¹ýÄþ¾²Èí¼þ


https://www.bleepingcomputer.com/news/security/phishing-kits-constantly-evolve-to-evade-security-software/


ÈçºÎ¹¹½¨×Ô½ç˵¶ñÒâÈí¼þ·ÖÎöɳÏä


https://thehackernews.com/2022/03/how-to-build-custom-malware-analysis.html


Elden Ring©¶´Ê¹Íæ¼ÒÏÝÈëÎÞÏÞËÀÍöÑ­»·


https://blog.malwarebytes.com/hacking-2/2022/03/elden-ring-exploit-traps-players-in-infinite-death-loop/