΢ÈíÅû¶LinuxÖÐͳ³ÆÎªNimbuspwnµÄ2¸öÌáȨÎó²îµÄÏêÇé
Ðû²¼Ê±¼ä 2022-04-28΢ÈíÔÚ4ÔÂ26ÈÕÅû¶ÁËLinuxÖÐÒ»×éÃûΪNimbuspwnµÄÎó²îµÄÏêÇé¡£¡£¡£¡£¡£Îó²î»®·ÖΪĿ¼±éÀúÎó²î(CVE-2022-29799)¡¢·ûºÅÁ´½Ó¾ºÕùÒÔ¼°Time-of-check-time-of-use(TOCTOU)¾ºÕùÌõ¼þÎó²î(CVE-2022-29800)£¬£¬£¬£¬£¬£¬£¬¿É±»ÍâµØ¹¥»÷ÕßÓÃÀ´ÌáÉýȨÏÞ£¬£¬£¬£¬£¬£¬£¬×°ÖúóÃźÍÀÕË÷Èí¼þµÈ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£ËüÃDZ£´æÓÚsystemd×é¼þnetworkd-dispatcherÖУ¬£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öÓÃÓÚÍøÂçÖÎÀíÆ÷ϵͳЧÀ͵ÄÊØ»¤³ÌÐò¡£¡£¡£¡£¡£
https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/
2¡¢GoogleÐÞ¸´VirusTotalÖеÄRCEÎó²îCVE-2021-22204
ýÌå4ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬GoogleÒÑÐÞ¸´VirusTotalƽ̨ÖеÄRCEÎó²î£¨CVE-2021-22204£©¡£¡£¡£¡£¡£¸ÃÎó²îÊÇExifTool¶ÔDjVuÎļþ´¦Öóͷ£²»µ±µ¼Öµģ¬£¬£¬£¬£¬£¬£¬¿É±»¹¥»÷ÕßÓÃÀ´ÎäÆ÷»¯VirusTotalƽ̨£¬£¬£¬£¬£¬£¬£¬²¢ÔÚʹÓÃɱ¶¾ÒýÇæµÄµÚÈý·½É³ºÐÉÏʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌáÐÑ£¬£¬£¬£¬£¬£¬£¬Îó²î²¢²»Ó°ÏìVirusTotal£¬£¬£¬£¬£¬£¬£¬´úÂëÖ´Ðв»±£´æÓÚÆ½Ì¨×Ô¼º£¬£¬£¬£¬£¬£¬£¬¶øÊÇÔÚÆÊÎöºÍÖ´ÐÐÑù±¾µÄµÚÈý·½É¨Ãèϵͳ¡£¡£¡£¡£¡£¸ÃÎó²îÓÚ2021Äê4Ô±»Åû¶£¬£¬£¬£¬£¬£¬£¬ÓÚ2021Äê5Ô±»½ÓÊÜ£¬£¬£¬£¬£¬£¬£¬¶ø²¹¶¡Óڰ˸öÔºóµÄ2022Äê1ÔÂÐû²¼¡£¡£¡£¡£¡£
https://www.hackread.com/critical-rce-vulnerability-google-virustotal/
3¡¢StormousÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÊʿڿÉÀÖ¹«Ë¾161 GBµÄÊý¾Ý
¾Ý4ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïStormousÉù³ÆÒÑÇÔÈ¡ÊʿڿÉÀÖ¹«Ë¾Áè¼Ý161 GBµÄÊý¾Ý¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÁгöÁË´ýÊÛÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢ÏòÊʿڿÉÀÖ¹«Ë¾ÀÕË÷1.65±ÈÌØ±Ò£¨Ô¼ºÏ64000ÃÀÔª£©¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨Ñ¹ËõÎĵµ¡¢µç×ÓÓʼþºÍÃÜÂëµÄÎı¾Îļþ¡¢ÕÊ»§ºÍ¸¶¿îÏà¹ØZIPÎĵµµÈ¡£¡£¡£¡£¡£ÕâÊÇStormousÍÅ»ïµÚÒ»´Î¹ûÕæ±»µÁÊý¾Ý¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£ÊʿڿÉÀÖ¹«Ë¾ÌåÏÖ֪ϤÓëÆäÏà¹ØµÄÍøÂç¹¥»÷µÄ±¨µÀºó£¬£¬£¬£¬£¬£¬£¬ÕýÔÚÊÓ²ì´ËÊÂÎñ¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/130614/cyber-crime/stormous-ransomware-hit-coca-cola.html
4¡¢Hive0117ð³ä¶íÂÞ˹ִ·¨²¿·Ö¶Ô¶«Å·¹ú¼Ò¾ÙÐд¹ÂÚ¹¥»÷
ýÌå4ÔÂ27Èճƣ¬£¬£¬£¬£¬£¬£¬IBMµÄX-ForceÍŶӷ¢Ã÷½üÆÚÕë¶Ô¶«Å·¹ú¼ÒµÄ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£´Ë´Î´¹Âڻ×îÏÈÓÚ2022Äê2Ô£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ·Ö·¢ÃûΪDarkWatchmanµÄÎÞÎļþ¶ñÒâÈí¼þ±äÖÖ¡£¡£¡£¡£¡£¹¥»÷Õßð³ä¶íÂÞ˹µÄÖ´·¨²¿·Ö£¬£¬£¬£¬£¬£¬£¬ÊÕ¼þÈËÊÇÁ¢ÌÕÍð¡¢°®É³ÄáÑǺͶíÂÞ˹µÄµçÐÅЧÀÍÌṩÉ̺͹¤Òµ¹«Ë¾¡£¡£¡£¡£¡£´¹ÂÚÓʼþÀ´×Ô˾·¨²¿µÄÕæÊµµØµã£¬£¬£¬£¬£¬£¬£¬ÀýÈç¡°mail@r77[.]fssprus[.]ru¡±£¬£¬£¬£¬£¬£¬£¬ÕýÎÄ»¹´øÓÐÕæÊµµÄ±ê¼Ç¡£¡£¡£¡£¡£Ëù¸½µÄZIPÎļþ°üÀ¨×°ÖÃDarkWatchmanµÄ¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬£¬ºÍ¼ÓÃܵļüÅ̼ͼ³ÌÐò¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/russian-govt-impersonators-target-telcos-in-phishing-attacks/
5¡¢Secureworks³ÆConti±³ºóÍÅ»ïGold UlrickµÄ»î¶¯¼¤Ôö
ýÌå4ÔÂ26Èճƣ¬£¬£¬£¬£¬£¬£¬ËäÈ»ÀÕË÷Èí¼þContiÔÚ²»¾Ãǰ±¬·¢ÁËÊý¾Ý×ß©ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬µ«Æä±³ºóÍÅ»ïGold UlrickµÄ¹¥»÷ÈÔÔÚ¼ÌÐø¡£¡£¡£¡£¡£ContiÊý¾ÝÐ¹Â¶ÍøÕ¾ÔÚ2021ÄêÆ½¾ùÿÔÂÁгö43¸ö±»¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬ÔÚ11Ôµִï·åÖµ£¬£¬£¬£¬£¬£¬£¬Îª95¸ö¡£¡£¡£¡£¡£2022Äê2ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬@ContiLeaks¹ûÕæÁËGOLD ULRICKµÄÊý¾ÝºÍͨѶ£¬£¬£¬£¬£¬£¬£¬µ«3Ô·ݱ»¹¥»÷Ä¿µÄµÄÊýÄ¿¼¤Ôö£¬£¬£¬£¬£¬£¬£¬½ö´ÎÓÚÈ¥Äê11ÔµķåÖµ¡£¡£¡£¡£¡£¸ÃÍÅ»ïµÄ³ÉÔ±¡°Jordan Conti¡±ÌåÏÖÊý¾Ýй¶¶ÔÆäÓ°ÏìºÜС£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬ÆäÍøÕ¾ÔÚ4ÔµÄǰËÄÌì¾ÍÌí¼ÓÁË11¸ö±»¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£
https://thehackernews.com/2022/04/gold-ulrick-hackers-still-in-action.html
6¡¢KasperskyÐû²¼2022ÄêQ1 DDoS¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
2ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬KasperskyÐû²¼2022ÄêQ1 DDoS¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬2022ÄêµÚÒ»¼¾¶ÈµÄDDoSÃûÌÃÊܵ½¶íÂÞ˹ºÍÎÚ¿ËÀ¼Ö®¼äÒ»Á¬³åÍ»µÄÓ°Ïì¡£¡£¡£¡£¡£KasperskyÔÚµÚÒ»¼¾¶È×ܹ²¼ì²âµ½ 91052´ÎDDoS¹¥»÷£»£»£»44.34%µÄ¹¥»÷Õë¶ÔÃÀ¹ú£¬£¬£¬£¬£¬£¬£¬Õ¼ËùÓй¥»÷µÄ45.02%¡£¡£¡£¡£¡££»£»£»×î¶àµÄDDoS¹¥»÷(16.35%)±¬·¢ÔÚÖÜÈÕ£»£»£»´ó´ó¶¼¹¥»÷£¨94.95%£©Ò»Á¬²»µ½4Сʱ£¬£¬£¬£¬£¬£¬£¬×µÄ¹¥»÷Ò»Á¬ÁË549Сʱ£»£»£»53.64%µÄ¹¥»÷ÊÇUDPºé·º£»£»£»55.53%µÄC&CЧÀÍÆ÷λÓÚÃÀ¹ú¡£¡£¡£¡£¡£
https://securelist.com/ddos-attacks-in-q1-2022/106358/