΢Èí·¢Ã÷Windows Win32kÌáȨ0dayÒѱ»ÔÚҰʹÓ㻣»£»£»£»SonicWall¹Ì¼þ¸üÐÂÐÞ¸´SMA-100ÖÐÒѱ»Ê¹ÓõÄ0day

Ðû²¼Ê±¼ä 2021-02-22

1.΢Èí·¢Ã÷Windows Win32kÌáȨ0dayÒѱ»ÔÚҰʹÓÃ


1.jpg


΢Èí·¢Ã÷Windows Win32kÖеÄÌáȨ0day£¨CVE-2021-1732£©Òѱ»ÔÚҰʹÓᣡ£¡£¡£¸ÃÎó²î±£´æÓÚwin32k.sys½¹µãÄÚºË×é¼þÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý´¥·¢ÊͷźóʹÓÃÎó²î½«ÆäȨÏÞÌáÉýµ½admin¼¶±ð£¬£¬£¬£¬£¬£¬¾ßÓлù±¾Óû§È¨Ï޵Ĺ¥»÷Õß²»ÐèÒªÓëÓû§½»»¥¼´¿ÉʹÓøÃÎó²î¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»APT×éÖ¯BitterºÍT-APT-17ʹÓ㬣¬£¬£¬£¬£¬DBAPPSecurityÔò³ÆÆäÓÚ12Ô·¢Ã÷ÁË¿ª·¢ÈÕÆÚΪ2020Äê5ÔµÄÑù±¾¡£¡£¡£¡£¶ø×Ô2021Äê2ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÖ»ÔÚÉÙÊýÕë¶ÔÖж«µÄ¹¥»÷ÖÐʹÓÃÁËCVE-2021-1732Îó²î¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/recently-fixed-windows-zero-day-actively-exploited-since-mid-2020/


2.SonicWall¹Ì¼þ¸üÐÂÐÞ¸´SMA-100ÖÐÒѱ»Ê¹ÓõÄ0day


2.png


SonicWallÐû²¼Á˵ڶþ´Î¹Ì¼þ£¬£¬£¬£¬£¬£¬ÒÔ¸üÐÂÐÞ¸´SMA-100ÖÐÒѱ»Ê¹ÓõÄ0day¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2021-20016£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö9.8£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂSonicWall SSLVPN SMA100²úÆ·ÖеÄSQLÏÂÁîÎÞЧ£¬£¬£¬£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓÃÆäÔÚSMA100°æ±¾10.xÉϾÙÐÐÆ¾Ö¤»á¼û¡£¡£¡£¡£2ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬SonicwallÐû²¼ÁËÕë¶Ô¸ÃÎó²îµÄ²¹¶¡£¬£¬£¬£¬£¬£¬ÓÖÓÚ2ÔÂ19ÈÕÐû²¼¸Ã¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬ÒÔÌṩ×ÔÉϴθüкó·¢Ã÷µÄÆäËû·À»¤²½·¥¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/114818/security/sonicwall-firmware-updates-sma-100.html


3.Sequoia CapitalÔâµ½´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬¿Í»§²ÆÎñÐÅϢй¶


3.png


ºìɼ×ÊÔ´£¨Sequoia Capital£©ÉÏÖÜÎ峯ÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢ºÍ²ÆÎñÐÅϢй¶¡£¡£¡£¡£ºìɼ×ÊÔ´Êǹè¹ÈÂÄÀú×ºñ£¬£¬£¬£¬£¬£¬×îÀֳɵÄΣº¦Í¶×ʹ«Ë¾Ö®Ò»£¬£¬£¬£¬£¬£¬ÖÎÀíµÄ×ʲúÁè¼Ý380ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬Í¶×ÊÁËAirbnb¡¢DoorDash¡¢FireEyeºÍ23andMeµÈ×éÖ¯¡£¡£¡£¡£¸Ã¹«Ë¾³Æ´Ë´Î¹¥»÷ÊÇ¶ÔÆäÒ»ÃûÔ±¹¤¾ÙÐÐÀֳɵÄÍøÂç´¹ÂÚ¹¥»÷µÄЧ¹û£¬£¬£¬£¬£¬£¬¿Í»§µÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢¿ÉÄÜÒѱ»µÚÈý·½»á¼û£¬£¬£¬£¬£¬£¬ÏÖÔÚÔÚ°µÍøÉÐδ·¢Ã÷±»µÁÊý¾ÝµÄÉúÒâÐÅÏ¢¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/02/sequoia-capital-told-investors-it-was.html


4.À³¿ËºÚµÂ´óѧÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬Ñ§Ð£Ð§ÀÍϵͳÔÝʱ¹Ø±Õ


4.png


¼ÓÄô󰲼òªʡµÄÀ³¿ËºÚµÂ´óѧ£¨Lakehead University£©³ÆÆäÉÏÖܶþÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬ÏÖÔÚѧУÅÌËã»úϵͳÈÔ´¦ÓÚÍÑ»ú״̬¡£¡£¡£¡£¸Ã´óѧָ³ö¹¥»÷ÊÇÕë¶Ô´óѧµÄÎļþ¹²ÏíЧÀÍÆ÷µÄ£¬£¬£¬£¬£¬£¬Æä¼ì²éµ½¹¥»÷ºóÁ¬Ã¦×ö³öÏìÓ¦£¬£¬£¬£¬£¬£¬É¾³ýÁËÖ±½ÓÁ´½Óµ½Îļþ¹²ÏíЧÀÍÆ÷µÄËùÓлá¼û£¬£¬£¬£¬£¬£¬²¢¹Ø±ÕÁËThunder BayºÍOrilliaÐ£ÇøµÄÍøÂç¡£¡£¡£¡£ÏÖÔÚ¸ÃÊÂÎñÈÔÔÚÊÓ²ìÖУ¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÄÄЩЧÀÍÆ÷ºÍÐÅÏ¢Êܵ½ÁËÓ°Ï죬£¬£¬£¬£¬£¬¸ÃѧУÉÐδ͸©СÎÒ˽¼Ò»ò²ÆÎñÐÅÏ¢ÊÇ·ñ±»Ð¹Â¶¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/02/cyber-attack-computer-systems-of.html


5.ÁãÊÛ¹«Ë¾KrogerÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬Ô±¹¤ÐÅÏ¢ºÍÒ©·¿¼Í¼й¶


5.png


ÁãÊÛ¹«Ë¾KrogerÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬Ô±¹¤ÐÅÏ¢ºÍÒ©·¿¼Í¼й¶¡£¡£¡£¡£KrogerÊÇÈ«Çò×î´óµÄÁãÊÛÉÌÖ®Ò»£¬£¬£¬£¬£¬£¬ÔÚ35¸öÖÝÓµÓнü2800¼ÒÊÐËÁ£¬£¬£¬£¬£¬£¬2019ÄêµÄÏúÊÛ¶îÁè¼Ý1220ÒÚÃÀÔª¡£¡£¡£¡£Kroger³Æ´Ë´Î¹¥»÷ÊÇÓÉÓÚAccellion FTAÈí¼þÖеÄij¸öÇå¾²Îó²îËùµ¼Ö£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓøÃÎó²îÇÔÈ¡Á˹«Ë¾ÁËÈËÁ¦×ÊÔ´Êý¾ÝºÍÒ©·¿¼Í¼¡£¡£¡£¡£12ÔÂÖÐÑ®£¬£¬£¬£¬£¬£¬Accelion·¢Ã÷ÆäFTAÇå¾²Îļþ´«ÊäЧÀÍÖб£´æÒѱ»Ê¹ÓõÄ0day¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/kroger-data-breach-exposes-pharmacy-and-employee-data/


6.F5Ðû²¼2021ÄêÆ¾Ö¤Ìî³ä¹¥»÷µÄÌ¬ÊÆÆÊÎö±¨¸æ


6.png


F5Ðû²¼ÁË2021ÄêÆ¾Ö¤Ìî³ä¹¥»÷µÄÌ¬ÊÆÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬ÔÚ2016ÄêÖÁ2020Äêʱ´ú£¬£¬£¬£¬£¬£¬Äê¶Èƾ֤×ß©ÊÂÎñµÄÊýÄ¿ÏÕЩ·­ÁËÒ»·¬£¬£¬£¬£¬£¬£¬Ð¹Â¶Æ¾Ö¤µÄÊýĿȴÔÚϽµ£¬£¬£¬£¬£¬£¬´Ó2016ÄêµÄ6300Íò¼Í¼Ï½µµ½2020ÄêµÄ1700Íò¼Í¼£»£»£»£»£»µ½ÏÖÔÚΪֹ£¬£¬£¬£¬£¬£¬ÃÜÂëµÄ´¿Îı¾´æ´¢ÊÇÔì³Éйƾ֤й¶µÄÖ÷ÒªÔµ¹ÊÔ­ÓÉ£¬£¬£¬£¬£¬£¬¶ø¹ãΪÈËÖªµÄ¹þÏ£Ëã·¨MD5ÈÔÈ»ºÜÊÇÊ¢ÐУ»£»£»£»£»×éÖ¯ÔÚ¼ì²âºÍ·¢Ã÷ÈëÇÖºÍÊý¾Ýй¶·½ÃæÈÔÈ»ºÜÈõ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.f5.com/labs/articles/threat-intelligence/2021-credential-stuffing-report