12ÔÂWindows Server¸üе¼ÖÂHyper-VÐéÄâ»ú½¨Éè·ºÆðBug

Ðû²¼Ê±¼ä 2022-12-16
1¡¢12ÔÂWindows Server¸üе¼ÖÂHyper-VÐéÄâ»ú½¨Éè·ºÆðBug

      

¾Ý12ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬Î¢ÈíÌåÏÖ£¬£¬£¬£¬ £¬£¬12Ô·ݵÄWindows Server¸üлᵼÖÂÔÚ²¿·ÖHyper-VÖ÷»úÉϽ¨ÉèÐÂÐéÄâ»úʱ´¥·¢¹ýʧ¡£¡£¡£¡£¡£¡£ ¡£Õâ¸öÎÊÌâÖ»Ó°Ï쵽ʹÓÃϵͳÖÐÐÄÐéÄâ»úÖÎÀíÆ÷£¨SCVMM£©ÖÎÀíµÄSDNÇéÐÎÖеÄWindows Server/AzStack HCIÖ÷»ú¡£¡£¡£¡£¡£¡£ ¡£Î¢ÈíΪÊÜÓ°ÏìÓû§ÌṩÁË»º½â²½·¥£¬£¬£¬£¬ £¬£¬ÔÚPowerShell´°¿ÚÔËÐÐÒ»×éÏÂÁ£¬£¬£¬ £¬£¬»òʹÓÃרÓýÅÔ­À´ÅúÁ¿°²ÅŽâ¾öÒªÁì¡£¡£¡£¡£¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾ÕýÔÚÐÞ¸´ÎÊÌ⣬£¬£¬£¬ £¬£¬²¢½«ÔÚδÀ´µÄ°æ±¾ÖÐÌṩ¸üС£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-december-windows-server-updates-break-hyper-v-vm-creation/


2¡¢Ììϱ­°ë¾öÈüʱ´úFuboTV±»¹¥»÷Óû§ÎÞ·¨»á¼ûÁ÷ýÌåЧÀÍ

      

ýÌå12ÔÂ15Èճƣ¬£¬£¬£¬ £¬£¬±¾ÖÜÈýµ±FuboTVÓû§×¼±¸Ô¢Ä¿Ììϱ­·¨¹úÓëĦÂå¸çÖ®¼äµÄ°ë¾öÈüʱ£¬£¬£¬£¬ £¬£¬·¢Ã÷ËûÃÇÎÞ·¨µÇ¼Á÷ýÌåЧÀÍ¡£¡£¡£¡£¡£¡£ ¡£ËûÃÇÔÚʵÑéµÇ¼ʱÊÕµ½CB_ERR_OPEN¹ýʧÌáÐÑ£¬£¬£¬£¬ £¬£¬ÏÔʾ¡°ff: downstream not available¡±¡£¡£¡£¡£¡£¡£ ¡£FuboTVºÜ¿ì·¢ÎijÆËûÃÇÕýÔÚ½â¾öÕâ¸öÎÊÌ⣬£¬£¬£¬ £¬£¬²¢½¨ÒéÓû§Í¨¹ýFOXԢĿ½ÇÖ𡣡£¡£¡£¡£¡£ ¡£15ÈÕ£¬£¬£¬£¬ £¬£¬FuboTVÈ·ÈÏÖÐÖ¹ÊÇÓÉÓÚÍøÂç¹¥»÷µ¼ÖµÄ£¬£¬£¬£¬ £¬£¬ËûÃÇÏÖÔÚÕýÔÚÊÓ²ìºÍÓ¦¶ÔÕâÒ»ÊÂÎñ¡£¡£¡£¡£¡£¡£ ¡£FuboTV δ͸¶¹¥»÷ϸ½Ú£¬£¬£¬£¬ £¬£¬µ«ÌåÏÖ´ø¿íȱ·¦²¢Î´µ¼ÖÂÖÐÖ¹£¬£¬£¬£¬ £¬£¬Åú×¢Õâ²»ÊÇDDoS¹¥»÷£¬£¬£¬£¬ £¬£¬¹¥»÷ºÜ¿ÉÄÜÊǶÔËûÃǵÄÍøÂç»òЧÀÍÆ÷µÄÆÆË𡣡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/fubotv-says-world-cup-streaming-outage-caused-by-a-cyberattack/


3¡¢ESETÅû¶MirrorFaceÕë¶ÔÈÕ±¾Õþ¸®»ú¹¹µÄ´¹ÂÚ¹¥»÷ÏêÇé

     

 ESETÓÚ12ÔÂ14ÈÕÅû¶ÁËMirrorFaceÕë¶ÔÈÕ±¾Õþ¸®»ú¹¹µÄ´¹ÂÚ¹¥»÷»î¶¯Operation LiberalFace¡£¡£¡£¡£¡£¡£ ¡£´Ë´Î»î¶¯×îÏÈÓÚ2022Äê6ÔÂ⣬£¬£¬£¬ £¬£¬Î±×°³ÉÀ´×ÔÌØ¶¨ÈÕ±¾Õþµ³¹«¹Ø²¿·ÖµÄ¹Ù·½Í¨Ñ¶£¬£¬£¬£¬ £¬£¬±Þ²ßÊÕ¼þÈËÔÚ×Ô¼ºµÄÉ罻ýÌå×ÊÁÏÖзÖÏí¸½¼þÖеÄÊÓÆµ¡£¡£¡£¡£¡£¡£ ¡£¸½¼þÊÇÒ»¸ö×Ô½âѹµÄWinRARѹËõ°ü£¬£¬£¬£¬ £¬£¬·­¿ª¾Í»á×îÏÈѬȾLODEINFO¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷Õß»¹Ê¹ÓÃÁËÒ»¸öÐÂµÄÆ¾Ö¤ÇÔÈ¡³ÌÐòMirrorStealer£¬£¬£¬£¬ £¬£¬Ëü¿É´Ó¶à¸öÓ¦ÓÃÖÐÇÔȡƾ֤£¬£¬£¬£¬ £¬£¬°üÀ¨ä¯ÀÀÆ÷ºÍµç×ÓÓʼþ¿Í»§¶Ë¡£¡£¡£¡£¡£¡£ ¡£


https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities/


4¡¢ºÚ¿ÍÔÚ¶à¸ö¿ªÔ´´æ´¢¿âÉÏ´«Áè¼Ý14Íò¸ö°üÀ¨´¹ÂÚÁ´½ÓµÄ°ü

      

¾ÝýÌå12ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±·¢Ã÷ͳһ¸ö¹¥»÷ÕßÏòNuGet¡¢NPMºÍPyPiÉÏ´«ÁË144294¸ö°ü¡£¡£¡£¡£¡£¡£ ¡£ÊÓ²ìÕ¹ÏÖÁËÒ»ÖÖÐµĹ¥»÷ǰÑÔ£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßʹÓðüÀ¨´¹ÂÚ¹¥»÷Á´½ÓµÄÈí¼þ°üÏò¿ªÔ´Éú̬ϵͳ·¢ËÍÀ¬»øÓʼþ¡£¡£¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬ £¬£¬ËùÓаüºÍÏà¹ØÓû§ÕÊ»§ºÜ¿ÉÄÜÊÇʹÓÃ×Ô¶¯»¯½¨ÉèµÄ£¬£¬£¬£¬ £¬£¬ÕâЩ°üʹÓÃÁËÏàËÆµÄÏîÄ¿ÐÎòºÍ×Ô¶¯ÌìÉúµÄÃû³Æ¡£¡£¡£¡£¡£¡£ ¡£¸Ã´¹ÂڻÁ´½Óµ½90¸öÓòÉϵÄ65000¶à¸öΨһURL£¬£¬£¬£¬ £¬£¬Ã¿¸öÓòÔÚ²î±ð·¾¶Ï½¨ÉèÁ˶à¸ö´¹ÂÚÍøÒ³¡£¡£¡£¡£¡£¡£ ¡£


https://checkmarx.com/blog/how-140k-nuget-npm-and-pypi-packages-were-used-to-spread-phishing-links/


5¡¢Cisco½üÆÚ·¢Ã÷ʹÓÃÐÂÐÍHTML×ß˽ÊÖÒÕ·Ö·¢QBotµÄ»î¶¯

      

Cisco TalosÔÚ12ÔÂ13ÈÕ³ÆÆä·¢Ã÷ÁËʹÓÿÉËõ·ÅʸÁ¿Í¼ÐÎ(SVG)ͼÏñµÄÐÂHTML×ß˽ÊÖÒÕ¡£¡£¡£¡£¡£¡£ ¡£ÕâÖÖ¹¥»÷ÊÇͨ¹ýº¬ÓÐJavaScriptµÄǶÈëʽSVGÎļþ¾ÙÐеÄ£¬£¬£¬£¬ £¬£¬ÕâЩÎļþÖØÐÂ×éºÏ³ÉÒ»¸öBase64±àÂëµÄQBot¶ñÒâÈí¼þ×°ÖóÌÐò£¬£¬£¬£¬ £¬£¬Í¨¹ýÄ¿µÄµÄä¯ÀÀÆ÷×Ô¶¯ÏÂÔØ¡£¡£¡£¡£¡£¡£ ¡£ÓÉÓÚ¶ñÒâÈí¼þpayloadÊÇÖ±½ÓÔÚÄ¿µÄÖй¹½¨µÄ£¬£¬£¬£¬ £¬£¬¶ø²»ÊÇͨ¹ýÍøÂç´«ÊäµÄ£¬£¬£¬£¬ £¬£¬Òò´ËÕâÖÖHTML×ß˽ÊÖÒÕ¿ÉÒÔÈÆ¹ýÖ¼ÔÚ¹ýÂË´«ÊäÖеĶñÒâÄÚÈݵÄÇå¾²¼ì²â¡£¡£¡£¡£¡£¡£ ¡£ÎªµÖÓùHTML×ß˽¹¥»÷£¬£¬£¬£¬ £¬£¬¿É×èÖ¹¶ÔÏÂÔØÄÚÈÝÖ´ÐÐJavaScript»òVBScript¡£¡£¡£¡£¡£¡£ ¡£


https://blog.talosintelligence.com/html-smugglers-turn-to-svg-images/


6¡¢CybereasonÐû²¼¹ØÓÚÀÕË÷Èí¼þRoyalµÄÊÖÒÕÆÊÎö±¨¸æ

      

12ÔÂ14ÈÕ£¬£¬£¬£¬ £¬£¬CybereasonÐû²¼Á˹ØÓÚÀÕË÷Èí¼þRoyalµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£ ¡£RoyalÓÚ2022ÄêÍ··ºÆð£¬£¬£¬£¬ £¬£¬²¢×ÔÄêÖÐÒÔÀ´ÊÆÍ·Ç¿¾¢¡£¡£¡£¡£¡£¡£ ¡£¸Ã±¨¸æÖ¸³ö£¬£¬£¬£¬ £¬£¬RoyalÀ©Õ¹Á˲¿·Ö¼ÓÃܵĿ´·¨£¬£¬£¬£¬ £¬£¬ÕâÒâζ×ÅËü¿ÉÒÔ¼ÓÃÜÔ¤ÏÈÈ·¶¨µÄ²¿·ÖÎļþÄÚÈÝ£¬£¬£¬£¬ £¬£¬²¢»ùÓÚÎÞаµÄ°Ù·Ö±È½«Æä²¿·Ö¼ÓÃÜ£¬£¬£¬£¬ £¬£¬Ìá¸ßÁË·´ÀÕË÷Èí¼þ½â¾ö¼Æ»®µÄ¼ì²âÄѶȣ»£»£»Ê¹Óöà¸öÏß³ÌÀ´¼ÓËÙ¼ÓÃÜÀú³Ì£»£»£»ÔÚÈ«Çò¹æÄ£ÄÚ»îÔ¾£¬£¬£¬£¬ £¬£¬Ã»ÓÐʹÓÃRaaS£¬£¬£¬£¬ £¬£¬Ò²Ã»ÓÐÕë¶ÔÌØ¶¨ÐÐÒµ»òµØÇø£»£»£»Æä×î³õÒÔ²î±ðµÄ·½·¨Æô¶¯ºÍ×°Öᣡ£¡£¡£¡£¡£ ¡£


https://www.cybereason.com/blog/royal-ransomware-analysis