±¾Ìﲿ·Ö³µÐͱ£´æ¿Éͨ¹ýÖØ·¢¹¥»÷½âËø²¢Æô¶¯Æû³µµÄÎó²î

Ðû²¼Ê±¼ä 2022-03-30

±¾Ìﲿ·Ö³µÐͱ£´æ¿Éͨ¹ýÖØ·¢¹¥»÷½âËø²¢Æô¶¯Æû³µµÄÎó²î


¾ÝýÌå3ÔÂ25ÈÕ±¨µÀ£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±Åû¶Á˱¾ÌïÆû³µÖеÄÒ»¸öÎó²î£¨CVE-2022-27254£©µÄÏêÇé¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁ˲¿·Ö±¾ÌïºÍÚ©¸è³µÐÍ£¬£¬ £¬£¬£¬¿Éͨ¹ýÖØ·Å¹¥»÷½âËøÆû³µ£¬£¬ £¬£¬£¬ÉõÖÁÔں̵ܶľàÀëÄÚÒÔÎÞÏß·½·¨Æô¶¯Æû³µ¡£¡£¡£¡£ÕâÊÇÒ»ÖÖÖÐÐÄ(MitM) ¹¥»÷£¬£¬ £¬£¬£¬¹¥»÷Õß×èµ²´ÓÒ£¿£¿£¿£¿£¿£¿ØÔ¿³×·¢Ë͵ÄÉ䯵ÐźÅ£¬£¬ £¬£¬£¬È»ºóÖØÐ·¢ËÍÕâЩÐźÅ¡£¡£¡£¡£Ñо¿Ö°Ô±½¨Òé³µÖ÷ʹÓñ»¶¯ÎÞÔ¿³×½øÈë(PKE)¶ø²»ÊÇÔ¶³ÌÎÞÔ¿³×½øÈë(RKE)£¬£¬ £¬£¬£¬ÕâÑù½«Ê¹¹¥»÷ÕßÓÉÓÚ¾àÀë¹ý½ü¶øºÜÊÇÄѿˡºÍ¶ÁÊØÐźÅ¡£¡£¡£¡£  


https://www.bleepingcomputer.com/news/security/honda-bug-lets-a-hacker-unlock-and-start-your-car-via-replay-attack/


½ðÈÚЧÀ͹«Ë¾Ä¦¸ùÊ¿µ¤ÀûµÄ²¿·Ö¿Í»§Ôâµ½ÓïÒô´¹ÂÚ¹¥»÷


¾Ý2ÔÂ24ÈÕ±¨µÀ£¬£¬ £¬£¬£¬½ðÈÚЧÀ͹«Ë¾Ä¦¸ùÊ¿µ¤Àû£¨Morgan Stanley£©³ÆÆä²¿·Ö¿Í»§µÄÕÊ»§ÒѾ­Ð¹Â¶¡£¡£¡£¡£¸Ã¹«Ë¾Ðû²¼Í¨¸æ³Æ£¬£¬ £¬£¬£¬ÔÚ2022Äê2ÔÂ11ÈÕǰºó£¬£¬ £¬£¬£¬¹¥»÷Õßð³ä¸Ã¹«Ë¾Í¨¹ýÓïÒôͨ»°ÓÕÆ­Ä¿µÄÌṩÆäÔÚÏßÕË»§ÐÅÏ¢£¬£¬ £¬£¬£¬È»ºó»ñµÃÁ˶ÔÕâЩÕË»§µÄ»á¼ûȨÏÞ¡£¡£¡£¡£ÔÚÀÖ³ÉÈëÇÖÕâЩÕË»§ºó£¬£¬ £¬£¬£¬¹¥»÷Õßͨ¹ýÖ§¸¶Ð§ÀÍZelle£¬£¬ £¬£¬£¬½«Ä¿µÄµÄ×ʽðתÈëËûÃÇ×Ô¼ºµÄÒøÐÐÕË»§¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬¸Ã¹«Ë¾½ûÓÃÁËËùÓÐÊÜÓ°ÏìµÄÕË»§£¬£¬ £¬£¬£¬²¢ÌåÏÖÆäûÓÐÐÅϢй¶¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/morgan-stanley-client-accounts-breached-in-social-engineering-attacks/


Google³Æ¶à¸öÍÅ»ïʹÓÃChromeÖÐ0day¹¥»÷ÃÀ¹úµÄ×éÖ¯


3ÔÂ24ÈÕ£¬£¬ £¬£¬£¬¹È¸èµÄÍþвÆÊÎöС×é(TAG)Ðû²¼±¨¸æ³Æ2¸ö³¯ÏʵĺڿÍÍÅ»ïʹÓÃChromeÖÐ0day¹¥»÷ÃÀ¹úµÄ×éÖ¯¡£¡£¡£¡£ÕâÊÇÒ»¸öÊͷźóʹÓÃÎó²î£¨CVE-2022-0609£©£¬£¬ £¬£¬£¬ÒÑÓÚ½ñÄê2ÔÂ14ÈÕÐÞ¸´¡£¡£¡£¡£´Ë´Î·¢Ã÷µÄµÚÒ»¸ö»î¶¯ÓëClearSkyÔÚ2020Äê·¢Ã÷µÄOperation Dream JobµÄTTPÒ»Ö£¬£¬ £¬£¬£¬Ö÷ÒªÕë¶ÔÐÂÎÅýÌåºÍITÐÐÒµ£»£»£»£»£»£»µÚ¶þ¸ö»î¶¯ÎªOperation AppleJeus£¬£¬ £¬£¬£¬Ö÷ÒªÕë¶Ô¼ÓÃÜÇ®±ÒºÍ½ðÈڿƼ¼ÐÐÒµ¡£¡£¡£¡£Google½¨ÒéÓû§ÆôÓÃChromeÔöÇ¿Çå¾²ä¯ÀÀ¹¦Ð§£¬£¬ £¬£¬£¬²¢È·±£ËùÓÐ×°±¸¾ùÒѸüС£¡£¡£¡£


https://blog.google/threat-analysis-group/countering-threats-north-korea/


Ñо¿Ö°Ô±³Æ·¢Ã÷HiveµÄбäÌå½è¼øBlackCatµÄ¹¦Ð§


¾Ý3ÔÂ27ÈÕ±¨µÀ£¬£¬ £¬£¬£¬Group-IBÑо¿Ö°Ô±rivitna·¢Ã÷Hive±äÌåÌí¼ÓÁËÐµĹ¦Ð§¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬ £¬£¬£¬Hive½è¼øÁËBlackCatµÄÐí¶à¹¦Ð§ºÍÕ½ÂÔ£ºHive½«Ì¸ÅÐÓõÄÓû§ÃûºÍµÇ¼ÃÜÂë×÷ΪÏÂÁîÐвÎÊý¾ÙÐÐת´ï£¬£¬ £¬£¬£¬ÕâЩƾ֤ÏÖÔÚÖ»ÄÜÔÚ¹¥»÷ʱ´ú½¨ÉèµÄÊê½ð¼Í¼ÖÐʹÓ㬣¬ £¬£¬£¬Õ⽫ʹÑо¿Ö°Ô±ÎÞ·¨´ÓÑù±¾ÖоÙÐмìË÷£»£»£»£»£»£»½«Linux¼ÓÃܳÌÐò´ÓGolang¸Ä±àΪRust±àд£¬£¬ £¬£¬£¬Ê¹µÃÀÕË÷Èí¼þµÄ¸ßЧ¸ü¸ß£¬£¬ £¬£¬£¬¸üÄѾÙÐÐÄæÏò¹¤³Ì¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hive-ransomware-ports-its-linux-vmware-esxi-encryptor-to-rust/


ASECÐû²¼¹ØÓÚKimsukyÃé×¼º«¹úµÄ´¹ÂÚ¹¥»÷µÄÆÊÎö±¨¸æ


3ÔÂ28ÈÕ£¬£¬ £¬£¬£¬ASECÐû²¼Á˹ØÓÚKimsukyÃé×¼º«¹úµÄ´¹ÂÚ¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¹¥»÷ÕßÔÚ¶ñÒâÎļþµÄÀ©Õ¹ÃûǰÌí¼ÓÁË¡°.pdf¡±À´ÓÕÆ­Óû§£¬£¬ £¬£¬£¬Ê¹ÒÑÒþ²ØÀ©Õ¹ÃûµÄÓû§½«¸ÃVBSÎļþÎóÒÔΪÊÇPDFÎļþ¡£¡£¡£¡£Í¨¹ý¸ÃPDFÎļþµÄÃû×ÖÍÆ¶Ï£¬£¬ £¬£¬£¬¹¥»÷ÕßµÄÄ¿µÄËÆºõÊÇϸÄ廯ÐÐÒµ¡£¡£¡£¡£µ±Óû§ÔËÐÐVBSʱ£¬£¬ £¬£¬£¬»áÔÚ·¾¶¡°C:\ProgramData¡±Öн¨Éè²¢ÔËÐÐBase64±àÂëµÄDLL£¬£¬ £¬£¬£¬¸ÃDLL»á½¨Éècmd.exeÀú³Ì²¢ÆÚ´ýÓëC&CЧÀÍÆ÷µÄͨѶ¡£¡£¡£¡£Ñо¿Ö°Ô±½¨ÒéÓû§½ûÓá°Òþ²ØÒÑÖªÎļþÀàÐ͵ÄÀ©Õ¹¡±£¬£¬ £¬£¬£¬ÒÔ±ÜÃâ±»´ËÀàÊÖÒÕÓÕÆ­¡£¡£¡£¡£


https://asec.ahnlab.com/en/33032/


IntezerÐû²¼IcedIDµÄÐÂÒ»ÂÖ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


IntezerÔÚ3ÔÂ28ÈÕÐû²¼Ò»·Ý±¨¸æ£¬£¬ £¬£¬£¬ÏêÊöÁËIcedIDµÄжԻ°Ð®Öƹ¥»÷»î¶¯¡£¡£¡£¡£IcedIDÊÇÒ»ÖÖÄ£¿£¿£¿£¿£¿£¿é»¯ÒøÐÐľÂí£¬£¬ £¬£¬£¬ÓÚ2017ÄêÊ״α»·¢Ã÷¡£¡£¡£¡£Ôڴ˴λÖУ¬£¬ £¬£¬£¬¹¥»÷ÕßÕë¶ÔÒ×Êܹ¥»÷µÄMicrosoft ExchangeЧÀÍÆ÷ÇÔȡƾ֤£¬£¬ £¬£¬£¬²¢Ê¹ÓÃÕâЩ±»ºÚÕÊ»§·¢ËÍ´¹ÂÚÓʼþ¡£¡£¡£¡£´¹ÂÚÓʼþµÄZIP¸½¼þÖÐÊÇÒ»¸öISOÎļþ£¬£¬ £¬£¬£¬¸ÃÎļþÓÖ°üÀ¨Ò»¸öLNKºÍÒ»¸öDLLÎļþ¡£¡£¡£¡£µ±Ä¿µÄµã»÷document.lnkºó£¬£¬ £¬£¬£¬DLL½«Æô¶¯ÒÔ×°ÖÃIcedID¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±ÒѾ­¼ì²âµ½Õë¶ÔÄÜÔ´¡¢Ò½ÁƱ£½¡¡¢Ö´·¨ºÍÖÆÒ©ÐÐÒµµÄ¹¥»÷»î¶¯¡£¡£¡£¡£


https://www.intezer.com/blog/research/conversation-hijacking-campaign-delivering-icedid/



Çå¾²¹¤¾ß


Ostorlab


¿ªÔ´Ç徲ɨÃè³ÌÐò£¬£¬ £¬£¬£¬Äܹ»ÒÔ¼òÆÓ¡¢¿ÉÀ©Õ¹ºÍÂþÑÜʽµÄ·½·¨ÔËÐÐÉæ¼°¶à¸ö¹¤¾ßµÄÖØ´óÇ徲ɨÃèʹÃü¡£¡£¡£¡£


https://github.com/Ostorlab/ostorlab



CobaltBus


Cobalt Strike Óë Azure Servicebus¡¢C2 Á÷Á¿µÄÍⲿ C2 ¼¯³É¡£¡£¡£¡£


https://github.com/Flangvik/CobaltBus



KNX Bus Dump


KNX ´«¸ÐÆ÷¡¢Ö´ÐÐÆ÷ºÍÆäËû KNX ×°±¸µÄЭÒéÆÊÎö¹¤¾ß¡£¡£¡£¡£


https://github.com/ChrisM09/KNX-Bus-Dump




Çå¾²ÆÊÎö


Windows 11 22H2£ºµ½ÏÖÔÚΪֹÎÒÃÇËùÖªµÀµÄÒ»ÇÐ


https://www.bleepingcomputer.com/news/microsoft/windows-11-22h2-everything-we-know-so-far/


ÄÏ·ÇÏ£Íûͨ¹ýÉúÎïʶ±ð¼ì²éÀ´µÖÓù SIM ¿¨½»Á÷¹¥»÷


https://www.bleepingcomputer.com/news/security/south-africa-wants-to-fight-sim-swapping-with-biometric-checks/


Êý°Ù¸ö¶íÂÞ˹¥Óî¿ØÖÆÆ÷¿É±»Ô¶³ÌÈëÇÖ


https://securityaffairs.co/wordpress/129452/hacking/russian-building-controller-hack.html


Racoon Stealer ¶ñÒâÈí¼þÒòÎÚ¿ËÀ¼Õ½Õù¶øÔÝÍ£ÔËÓª


https://www.bleepingcomputer.com/news/security/racoon-stealer-malware-suspends-operations-due-to-war-in-ukraine/


Íþв¼ò½é£ºLapsus$ Group


https://unit42.paloaltonetworks.com/lapsus-group/