΢ÈíÅû¶LinuxÖÐͳ³ÆÎªNimbuspwnµÄ2¸öÌáȨÎó²îµÄÏêÇé

Ðû²¼Ê±¼ä 2022-04-28
1¡¢Î¢ÈíÅû¶LinuxÖÐͳ³ÆÎªNimbuspwnµÄ2¸öÌáȨÎó²îµÄÏêÇé

΢ÈíÔÚ4ÔÂ26ÈÕÅû¶ÁËLinuxÖÐÒ»×éÃûΪNimbuspwnµÄÎó²îµÄÏêÇé¡£¡£¡£¡£¡£Îó²î»®·ÖΪĿ¼±éÀúÎó²î(CVE-2022-29799)¡¢·ûºÅÁ´½Ó¾ºÕùÒÔ¼°Time-of-check-time-of-use(TOCTOU)¾ºÕùÌõ¼þÎó²î(CVE-2022-29800)£¬£¬£¬ £¬£¬£¬ £¬¿É±»ÍâµØ¹¥»÷ÕßÓÃÀ´ÌáÉýȨÏÞ£¬£¬£¬ £¬£¬£¬ £¬×°ÖúóÃźÍÀÕË÷Èí¼þµÈ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£ËüÃDZ£´æÓÚsystemd×é¼þnetworkd-dispatcherÖУ¬£¬£¬ £¬£¬£¬ £¬ÕâÊÇÒ»¸öÓÃÓÚÍøÂçÖÎÀíÆ÷ϵͳЧÀ͵ÄÊØ»¤³ÌÐò¡£¡£¡£¡£¡£


https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/


2¡¢GoogleÐÞ¸´VirusTotalÖеÄRCEÎó²îCVE-2021-22204


ýÌå4ÔÂ26ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬ £¬GoogleÒÑÐÞ¸´VirusTotalƽ̨ÖеÄRCEÎó²î£¨CVE-2021-22204£©¡£¡£¡£¡£¡£¸ÃÎó²îÊÇExifTool¶ÔDjVuÎļþ´¦Öóͷ£²»µ±µ¼Öµģ¬£¬£¬ £¬£¬£¬ £¬¿É±»¹¥»÷ÕßÓÃÀ´ÎäÆ÷»¯VirusTotalƽ̨£¬£¬£¬ £¬£¬£¬ £¬²¢ÔÚʹÓÃɱ¶¾ÒýÇæµÄµÚÈý·½É³ºÐÉÏʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌáÐÑ£¬£¬£¬ £¬£¬£¬ £¬Îó²î²¢²»Ó°ÏìVirusTotal£¬£¬£¬ £¬£¬£¬ £¬´úÂëÖ´Ðв»±£´æÓÚÆ½Ì¨×Ô¼º£¬£¬£¬ £¬£¬£¬ £¬¶øÊÇÔÚÆÊÎöºÍÖ´ÐÐÑù±¾µÄµÚÈý·½É¨Ãèϵͳ¡£¡£¡£¡£¡£¸ÃÎó²îÓÚ2021Äê4Ô±»Åû¶£¬£¬£¬ £¬£¬£¬ £¬ÓÚ2021Äê5Ô±»½ÓÊÜ£¬£¬£¬ £¬£¬£¬ £¬¶ø²¹¶¡Óڰ˸öÔºóµÄ2022Äê1ÔÂÐû²¼¡£¡£¡£¡£¡£


https://www.hackread.com/critical-rce-vulnerability-google-virustotal/


3¡¢StormousÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÊʿڿÉÀÖ¹«Ë¾161 GBµÄÊý¾Ý


¾Ý4ÔÂ26ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬ £¬ÀÕË÷ÍÅ»ïStormousÉù³ÆÒÑÇÔÈ¡ÊʿڿÉÀÖ¹«Ë¾Áè¼Ý161 GBµÄÊý¾Ý¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÁгöÁË´ýÊÛÊý¾Ý£¬£¬£¬ £¬£¬£¬ £¬²¢ÏòÊʿڿÉÀÖ¹«Ë¾ÀÕË÷1.65±ÈÌØ±Ò£¨Ô¼ºÏ64000ÃÀÔª£©¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨Ñ¹ËõÎĵµ¡¢µç×ÓÓʼþºÍÃÜÂëµÄÎı¾Îļþ¡¢ÕÊ»§ºÍ¸¶¿îÏà¹ØZIPÎĵµµÈ¡£¡£¡£¡£¡£ÕâÊÇStormousÍÅ»ïµÚÒ»´Î¹ûÕæ±»µÁÊý¾Ý¡£¡£¡£¡£¡ £¿£¿£¿£¿£¿£¿£ÊʿڿÉÀÖ¹«Ë¾ÌåÏÖ֪ϤÓëÆäÏà¹ØµÄÍøÂç¹¥»÷µÄ±¨µÀºó£¬£¬£¬ £¬£¬£¬ £¬ÕýÔÚÊÓ²ì´ËÊÂÎñ¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/130614/cyber-crime/stormous-ransomware-hit-coca-cola.html


4¡¢Hive0117ð³ä¶íÂÞ˹ִ·¨²¿·Ö¶Ô¶«Å·¹ú¼Ò¾ÙÐд¹ÂÚ¹¥»÷


ýÌå4ÔÂ27Èճƣ¬£¬£¬ £¬£¬£¬ £¬IBMµÄX-ForceÍŶӷ¢Ã÷½üÆÚÕë¶Ô¶«Å·¹ú¼ÒµÄ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£´Ë´Î´¹Âڻ×îÏÈÓÚ2022Äê2Ô£¬£¬£¬ £¬£¬£¬ £¬Ö¼ÔÚ·Ö·¢ÃûΪDarkWatchmanµÄÎÞÎļþ¶ñÒâÈí¼þ±äÖÖ¡£¡£¡£¡£¡£¹¥»÷Õßð³ä¶íÂÞ˹µÄÖ´·¨²¿·Ö£¬£¬£¬ £¬£¬£¬ £¬ÊÕ¼þÈËÊÇÁ¢ÌÕÍð¡¢°®É³ÄáÑǺͶíÂÞ˹µÄµçÐÅЧÀÍÌṩÉ̺͹¤Òµ¹«Ë¾¡£¡£¡£¡£¡£´¹ÂÚÓʼþÀ´×Ô˾·¨²¿µÄÕæÊµµØµã£¬£¬£¬ £¬£¬£¬ £¬ÀýÈç¡°mail@r77[.]fssprus[.]ru¡±£¬£¬£¬ £¬£¬£¬ £¬ÕýÎÄ»¹´øÓÐÕæÊµµÄ±ê¼Ç¡£¡£¡£¡£¡£Ëù¸½µÄZIPÎļþ°üÀ¨×°ÖÃDarkWatchmanµÄ¿ÉÖ´ÐÐÎļþ£¬£¬£¬ £¬£¬£¬ £¬ºÍ¼ÓÃܵļüÅ̼ͼ³ÌÐò¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/russian-govt-impersonators-target-telcos-in-phishing-attacks/


5¡¢Secureworks³ÆConti±³ºóÍÅ»ïGold UlrickµÄ»î¶¯¼¤Ôö


ýÌå4ÔÂ26Èճƣ¬£¬£¬ £¬£¬£¬ £¬ËäÈ»ÀÕË÷Èí¼þContiÔÚ²»¾Ãǰ±¬·¢ÁËÊý¾Ý×ß©ÊÂÎñ£¬£¬£¬ £¬£¬£¬ £¬µ«Æä±³ºóÍÅ»ïGold UlrickµÄ¹¥»÷ÈÔÔÚ¼ÌÐø¡£¡£¡£¡£¡£ContiÊý¾ÝÐ¹Â¶ÍøÕ¾ÔÚ2021ÄêÆ½¾ùÿÔÂÁгö43¸ö±»¹¥»÷Ä¿µÄ£¬£¬£¬ £¬£¬£¬ £¬ÔÚ11Ôµִï·åÖµ£¬£¬£¬ £¬£¬£¬ £¬Îª95¸ö¡£¡£¡£¡£¡£2022Äê2ÔÂ27ÈÕ£¬£¬£¬ £¬£¬£¬ £¬@ContiLeaks¹ûÕæÁËGOLD ULRICKµÄÊý¾ÝºÍͨѶ£¬£¬£¬ £¬£¬£¬ £¬µ«3Ô·ݱ»¹¥»÷Ä¿µÄµÄÊýÄ¿¼¤Ôö£¬£¬£¬ £¬£¬£¬ £¬½ö´ÎÓÚÈ¥Äê11ÔµķåÖµ¡£¡£¡£¡£¡£¸ÃÍÅ»ïµÄ³ÉÔ±¡°Jordan Conti¡±ÌåÏÖÊý¾Ýй¶¶ÔÆäÓ°ÏìºÜС£¡£¡£¡£¡£¬£¬£¬ £¬£¬£¬ £¬ÆäÍøÕ¾ÔÚ4ÔµÄǰËÄÌì¾ÍÌí¼ÓÁË11¸ö±»¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£


https://thehackernews.com/2022/04/gold-ulrick-hackers-still-in-action.html


6¡¢KasperskyÐû²¼2022ÄêQ1 DDoS¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


2ÔÂ25ÈÕ£¬£¬£¬ £¬£¬£¬ £¬KasperskyÐû²¼2022ÄêQ1 DDoS¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ £¬£¬£¬ £¬2022ÄêµÚÒ»¼¾¶ÈµÄDDoSÃûÌÃÊܵ½¶íÂÞ˹ºÍÎÚ¿ËÀ¼Ö®¼äÒ»Á¬³åÍ»µÄÓ°Ïì¡£¡£¡£¡£¡£KasperskyÔÚµÚÒ»¼¾¶È×ܹ²¼ì²âµ½ 91052´ÎDDoS¹¥»÷£»£»£»44.34%µÄ¹¥»÷Õë¶ÔÃÀ¹ú£¬£¬£¬ £¬£¬£¬ £¬Õ¼ËùÓй¥»÷µÄ45.02%¡£¡£¡£¡£¡££»£»£»×î¶àµÄDDoS¹¥»÷(16.35%)±¬·¢ÔÚÖÜÈÕ£»£»£»´ó´ó¶¼¹¥»÷£¨94.95%£©Ò»Á¬²»µ½4Сʱ£¬£¬£¬ £¬£¬£¬ £¬×µÄ¹¥»÷Ò»Á¬ÁË549Сʱ£»£»£»53.64%µÄ¹¥»÷ÊÇUDPºé·º£»£»£»55.53%µÄC&CЧÀÍÆ÷λÓÚÃÀ¹ú¡£¡£¡£¡£¡£


https://securelist.com/ddos-attacks-in-q1-2022/106358/