Proofpoint·¢Ã÷Õë¶Ô·¨¹ú·Ö·¢ºóÃÅSerpentµÄ¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2022-03-24

Proofpoint·¢Ã÷Õë¶Ô·¨¹ú·Ö·¢ºóÃÅSerpentµÄ¹¥»÷»î¶¯


3ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬ProofpointÅû¶ÁËÕë¶Ô·¨¹ú·Ö·¢ºóÃÅSerpentµÄ¹¥»÷»î¶¯µÄÏêÇé¡£¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯Ã°³äGDPR»ú¹¹£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËWindowsµÄ¿ªÔ´°ü¹ÜÀíÆ÷Chocolatey£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÏò·¨¹úÕþ¸®»ú¹¹¡¢ÐÞ½¨ºÍ·¿µØ²ú¹«Ë¾µÄϵͳÉÏ×°ÖÃеĺóÃÅSerpent¡£¡£¡£¡£¡£¡£¡£³ýÁË×Ô½ç˵ºóÃÅSerpentºÍChocolateyÖ®Í⣬£¬£¬£¬£¬£¬£¬ÉÐÓÐÒ»¸öÓÃschtasks.exe¾ÙÐÐÊðÃû¶þ½øÖÆÊðÀíÖ´ÐеÄгÌÐò£¨ÊµÖÊÉÏÊÇÒ»ÖÖеļì²âÈÆ¹ýÊÖÒÕ£©¡£¡£¡£¡£¡£¡£¡£ÕâЩ֤¾ÝÅú×¢£¬£¬£¬£¬£¬£¬£¬Õâ¿ÉÄÜÊÇÒ»¸öÐÂ×éÖ¯£¬£¬£¬£¬£¬£¬£¬¾ßÓи߾«¼âµÄÊÖÒÕºÍÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬ÇÒÓëÆäËûµÄÒÑÖªÍÅ»ïûÓÐÁªÏµ¡£¡£¡£¡£¡£¡£¡£ 


https://www.proofpoint.com/us/blog/threat-insight/serpent-no-swiping-new-backdoor-targets-french-entities-unique-attack-chain


ľÂíFaceStealerÒÑѬȾÁè¼Ý10Íò¸öAndroid×°±¸


Çå¾²¹«Ë¾PradeoÔÚ3ÔÂ21Èճƣ¬£¬£¬£¬£¬£¬£¬Ä¾ÂíFaceStealerÒÑͨ¹ýGoogle PlayÊÐËÁ×°ÖÃÁËÁè¼Ý100000´Î¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þαװ³ÉÒ»¸öÃûΪ¡°Craftsart Cartoon Photo Tools¡±µÄ¿¨Í¨»¯Ó¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Óû§µÄFacebookƾ֤¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬µ±Óû§ÊäÈëÆ¾Ö¤Ê±£¬£¬£¬£¬£¬£¬£¬¸ÃÓ¦ÓûὫÆä·¢Ë͵½Î»ÓÚzutuu[.]infoµÄC2£¬£¬£¬£¬£¬£¬£¬²¢Ïòwww.dozenorms[.]club·¢ËͽøÒ»²½µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬GoogleÒѽ«¸ÃÓ¦ÓÃÒÆ³ý¡£¡£¡£¡£¡£¡£¡£


https://blog.pradeo.com/spyware-facestealer-google-play


0patchÐû²¼ÌáȨÎó²îCVE-2021-34484µÄ·Ç¹Ù·½²¹¶¡


¾ÝýÌå3ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬0patchÐû²¼ÁËWindowsÌáȨÎó²îCVE-2021-34484µÄ·Ç¹Ù·½²¹¶¡¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î×îÔçÓÉAbdelhamid Naceri·¢Ã÷£¬£¬£¬£¬£¬£¬£¬²¢ÓÚ2021Äê8ÔÂͨ¹ý΢ÈíµÄÖܶþ²¹¶¡ÐÞ¸´¡£¡£¡£¡£¡£¡£¡£Naceri·¢Ã÷¸Ã²¹¶¡¿É±»Èƹý£¬£¬£¬£¬£¬£¬£¬Ö®ºó0patchÐû²¼Á˷ǹٷ½²¹¶¡¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÓÖÓÚ2022Äê1ÔÂÐû²¼Á˵ڶþ¸ö¸üУ¬£¬£¬£¬£¬£¬£¬²¢ÎªÆä·ÖÅÉÁËеÄCVE-2022-21919¡£¡£¡£¡£¡£¡£¡£µ«¸Ã²¹¶¡ÈԿɱ»Èƹý£¬£¬£¬£¬£¬£¬£¬ÇÒ΢ÈíµÄµÚ¶þ´Î¸üÐÂÌæ»»ÁË¡°profext.dll¡±Îļþ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ0patchµÄ·Ç¹Ù·½²¹¶¡¾ù±»É¾³ý¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬0patchÓÖ½«¸ÃÐÞ¸´³ÌÐòÒÆÖ²µ½2022Äê3ÔµÄÖܶþ²¹¶¡ÖУ¬£¬£¬£¬£¬£¬£¬¹©ËùÓÐÓû§Ãâ·ÑʹÓᣡ£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/windows-zero-day-flaw-giving-admin-rights-gets-unofficial-patch-again/


HPÐû²¼¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Ó°ÏìÆäÊý°Ù¿î´òÓ¡»úµÄ¶à¸öÎó²î


3ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬HPÒÑÕë¶ÔÓ°ÏìÆäÊý°Ù¿îLaserJet Pro¡¢Pagewide Pro¡¢OfficeJet¡¢Enterprise¡¢Large FormatºÍDeskJet´òÓ¡»úÐͺŵĶà¸öÎó²îÐû²¼ÁËÁ½·ÝÇ徲ͨ¸æ¡£¡£¡£¡£¡£¡£¡£µÚÒ»·Ýͨ¸æ°üÀ¨Á˿ɵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеĻº³åÇøÒç³öÎó²î£¨CVE-2022-3942£©£¬£¬£¬£¬£¬£¬£¬HPÒÑΪ´ó´ó¶¼ÊÜÓ°Ïì²úÆ·Ðû²¼¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬£¬²¢¶ÔûÓв¹¶¡µÄ×°±¸ÌṩÁË»º½âÒªÁ죻£»£»£»£»£»µÚ¶þ·ÝÇ徲ͨ¸æ°üÀ¨CVE-2022-24291¡¢CVE-2022-24292ºÍCVE-2022-24293£¬£¬£¬£¬£¬£¬£¬ËüÃǿɱ»ÓÃÓÚÐÅϢй¶¡¢Ô¶³Ì´úÂëÖ´Ðк;ܾøÐ§À͹¥»÷¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hundreds-of-hp-printer-models-vulnerable-to-remote-code-execution/


ÃÀ¹úÑÀ¿ÆÒ½ÔºJDCѬȾ¶ñÒâÈí¼þÉϰÙÍò»¼ÕßµÄÐÅϢй¶


ýÌå3ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬JDC Healthcare Management LLC(JDC)й¶ÁËÁè¼Ý100ÍòµÂ¿ËÈøË¹¹«ÃñµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£JDC×ܲ¿Î»ÓÚ´ïÀ­Ë¹£¬£¬£¬£¬£¬£¬£¬ÊÇ´óÐÍÑÀ¿Æ±£½¡ÌṩÉÌ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ2021Äê8ÔÂ9ÈÕ×óÓÒ·¢Ã÷Æä²¿·ÖϵͳѬȾÀ´Á˶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬¾­ÓÉÊÓ²ìÈ·¶¨ÔÚ2021Äê7ÔÂ27ÈÕÖÁ8ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬´æ´¢ÔÚJDCµÄ²¿·ÖÎļþÒѱ»»á¼û»òÏÂÔØ¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢Éæ¼°Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂëºÍ²ÆÎñÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£¡£ 


https://www.infosecurity-magazine.com/news/dental-care-data-breach-may-impact/


Ñо¿Ö°Ô±ÑÝʾÔõÑùʹÓÃÐµĹ¥»÷·½·¨BitB¾ÙÐд¹ÂÚ


¾Ý3ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÐµĹ¥»÷·½·¨Browser-in-the Browser (BITB)¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÒªÁìʹÓÃÁËǶÈëÔÚÍøÕ¾ÉϵĵÚÈý·½µ¥µãµÇ¼(SSO)Ñ¡Ï£¬£¬£¬£¬£¬£¬È硰ʹÓùȸèµÇ¼¡±(»òFacebook¡¢AppleºÍMicrosoft)¡£¡£¡£¡£¡£¡£¡£ËäÈ»µ±Óû§ÊµÑéͨ¹ýÕâЩҪÁìµÇ¼ʱ£¬£¬£¬£¬£¬£¬£¬Ä¬ÈÏÊÇͨ¹ýµ¯³ö´°¿ÚÍê³ÉÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬µ«BitB¹¥»÷Ö¼ÔÚʹÓÃHTMLºÍCSS´úÂëµÄÀ´¸´ÖÆÕû¸öÀú³Ì£¬£¬£¬£¬£¬£¬£¬ÒÔ½¨ÉèÒ»¸öÍêÈ«Ðé¹¹µÄä¯ÀÀÆ÷´°¿Ú¡£¡£¡£¡£¡£¡£¡£Õâ¿ÉÓÃÀ´¾ÙÐÐÁîÈËÐÅ·þµÄ´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÇÒÏÕЩÎÞ·¨±»¼ì²âµ½¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/03/new-browser-in-browser-bitb-attack.html



Çå¾²¹¤¾ß


Adversary3


Adversary3 ÊÇÒ»ÖÖµ¼º½ÖØ´óµÄ www.malvuln.com ¶ñÒâÈí¼þÎó²îÊý¾Ý¼¯µÄ¹¤¾ß¡£¡£¡£¡£¡£¡£¡£


https://packetstormsecurity.com/files/166384/Adversary3-main.zip


Nuclei


Ò»¸öNuclei Ä£°åÌìÉúÆ÷ BurpSuite ²å¼þ¡£¡£¡£¡£¡£¡£¡£


https://github.com/projectdiscovery/nuclei-burp-plugin


C0deVari4nt


ÊÇÒ»ÖÖ±äÌåÆÊÎöºÍ¿ÉÊÓ»¯¹¤¾ß£¬£¬£¬£¬£¬£¬£¬¿É¼ì²é´úÂë¿âÖеÄÀàËÆÎó²î¡£¡£¡£¡£¡£¡£¡£


https://github.com/whitesquirrell/C0deVari4nt


uncover


ʹÓöà¸öËÑË÷ÒýÇæ¿ìËÙ·¢Ã÷»¥ÁªÍøÉÏ̻¶µÄÖ÷»ú¡£¡£¡£¡£¡£¡£¡£


https://github.com/projectdiscovery/uncover




Çå¾²ÆÊÎö


Sandworm: Ò»¸öÇ㸲ÐԵĹÊÊÂÖØÊö


https://www.welivesecurity.com/2022/03/21/sandworm-tale-disruption-told-anew/


ÈýÐÇ Galaxy S22 Ultra ÏÖÔÚ·ºÆð GPS ¹ýʧ


https://news.softpedia.com/news/samsung-galaxy-s22-ultra-now-hitting-gps-errors-because-why-not-535080.shtml


Òâ´óÀûÊý¾ÝÒþ˽î¿Ïµ»ú¹¹¶Ô¿¨°Í˹»ùÏà¹ØµÄDZÔÚΣº¦Õö¿ªÊÓ²ì


https://securityaffairs.co/wordpress/129304/digital-id/italys-data-privacy-watchdog-investigats-kaspersky.html


ÎÚ¿ËÀ¼Ðû²¼InvisiMoleÓã²æÊ½´¹ÂÚ¹¥»÷µÄ¾¯±¨


https://securityaffairs.co/wordpress/129337/apt/invisimole-targets-ukraine-government.html