΢Èí11Ô·ݵÄÖܶþ²¹¶¡µ¼ÖÂODBCÊý¾Ý¿âÅþÁ¬±£´æBug
Ðû²¼Ê±¼ä 2022-12-09¾ÝýÌå12ÔÂ7ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÕýÔÚÆð¾¢½â¾ö2022Äê11ÔÂÖܶþ²¹¶¡µ¼ÖµÄODBCÊý¾Ý¿âÅþÁ¬ÎÊÌâ¡£¡£¡£¡£¡£¡£×°Öô˸üк󣬣¬£¬£¬£¬£¬£¬Í¨¹ý΢ÈíODBC SQL ServerÇý¶¯³ÌÐò£¨sqlsrv32.dll£©Ê¹ÓÃODBCÅþÁ¬À´»á¼ûÊý¾Ý¿âµÄÓ¦ÓÿÉÄÜ»áÎÞ·¨ÅþÁ¬¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Óû§¿ÉÄÜÔÚÓ¦ÓÃÖÐÊÕµ½Ò»¸ö¹ýʧ£¬£¬£¬£¬£¬£¬£¬»òÕßÔÚSQLЧÀÍÆ÷ÊÕµ½Ò»¸ö¹ýʧ¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÆäÏÖÔÚÕýÔÚÖÆ¶©½â¾ö¼Æ»®£¬£¬£¬£¬£¬£¬£¬ÓйشËÎÊÌâµÄ¸ü¶àÏêϸÐÅÏ¢½«ÔÚδÀ´µÄ¸üÐÂÖÐÐû²¼¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-november-updates-break-odbc-database-connections/
2¡¢ÐÂÎ÷À¼¶à¸öÕþ¸®»ú¹¹µÄMSP Mercury ITÔâµ½ÀÕË÷¹¥»÷
¾ÝýÌå12ÔÂ7Èճƣ¬£¬£¬£¬£¬£¬£¬ÍйÜЧÀÍÌṩÉÌ(MSP)Mercury ITÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˸ùúµÄÊýÊ®¸ö¹«Ë¾ºÍÕþ¸®»ú¹¹¡£¡£¡£¡£¡£¡£Ë¾·¨²¿ºÍÐÂÎ÷À¼ÎÀÉú²¿Í¸Â¶ÓÉÓڴ˴ι¥»÷£¬£¬£¬£¬£¬£¬£¬ËûÃǵIJ¿·ÖÎļþÎÞ·¨»á¼û¡£¡£¡£¡£¡£¡£ÎÀÉú²¿»¹³ÆÏÖ½×¶ÎÕâЩÎļþ²¢Î´Êܵ½Î´¾ÊÚȨµÄ»á¼û»òÏÂÔØ£¬£¬£¬£¬£¬£¬£¬ÇÒÎÀÉúЧÀÍҲûÓÐÖÐÖ¹¡£¡£¡£¡£¡£¡£·ÇÓªÀûÐÔ¿µ½¡°ü¹ÜÌṩÉÌBusinessNZÒ²Ðû²¼ÆäÒ»Ñùƽ³£ÔËÓªºÍ¿Í»§Ð§ÀÍÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÐÂÎ÷À¼Ïà¹Ø²¿·ÖÕýÔÚ¿ªÕ¹½ôÆÈÊÂÇ飬£¬£¬£¬£¬£¬£¬ÒÔÏàʶÊÜÓ°ÏìµÄ×éÖ¯ÊýÄ¿¡¢ËùÉæ¼°ÐÅÏ¢µÄÐÔ×ÓÒÔ¼°ÐÅϢй¶Ö鯽¡£¡£¡£¡£¡£¡£
https://therecord.media/multiple-government-departments-in-new-zealand-affected-by-ransomware-attack-on-it-provider/
3¡¢SophosÐû²¼¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÆäFirewall 19.5ÖеÄ7¸öÎó²î
¾Ý12ÔÂ7ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬SophosÐû²¼ÁËÇå¾²¸üÐÂÒÔÐÞ¸´ÆäFirewall°æ±¾19.5ÖеÄ7¸öÎó²î¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬×îÑÏÖØµÄÊÇÓû§ÃÅ»§ºÍWebadminÖеĴúÂë×¢ÈëÎó²î£¨CVE-2022-3236£©£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÀ´Ô¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£SophosÒÑÊӲ쵽´ËÎó²îÔÚÒ°ÍⱻʹÓõÄÇéÐΣ¬£¬£¬£¬£¬£¬£¬Ö÷ҪλÓÚÄÏÑǵØÇø¡£¡£¡£¡£¡£¡£Æä´ÎΪÏÂÁî×¢ÈëÎó²î£¨CVE-2022-3226£©¡¢´úÂë×¢ÈëÎó²î£¨CVE-2022-3713£©ÒÔ¼°´úÂë×¢ÈëÎó²î£¨CVE-2022-3696£©µÈ¡£¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/139362/security/sophos-firewall-critical-flaw.html
4¡¢APT 37ʹÓÃIEÖеÄÁãÈÕÎó²îCVE-2022-41128¹¥»÷º«¹ú
GoogleÓÚ12ÔÂ7ÈÕÅû¶Á˳¯ÏÊÍÅ»ïAPT 37Õë¶Ôº«¹úµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈÒÔÊ×¶ûÀæÌ©ÔºÊ¹ÊΪÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬·Ö·¢°üÀ¨¶ñÒâÈí¼þµÄMicrosoft OfficeÎĵµ£¬£¬£¬£¬£¬£¬£¬¸ÃÎĵµ»áÏÂÔØÒ»¸ö¸»Îı¾Îļþ(RTF)Ô¶³ÌÄ£°å£¬£¬£¬£¬£¬£¬£¬È»ºó»ñȡԶ³ÌHTMLÄÚÈÝ¡£¡£¡£¡£¡£¡£¼ÓÔØÔ¶³ÌHTMLÄÚÈÝÔÊÐí¹¥»÷ÕßʹÓÃIEÁãÈÕÎó²î£¨CVE-2022-41128£©£¬£¬£¬£¬£¬£¬£¬×ÝȻĿµÄûÓн«Æä×÷ΪĬÈÏä¯ÀÀÆ÷¡£¡£¡£¡£¡£¡£ÕâÊÇIEµÄJavaScriptÒýÇæµÄÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬£¬ÀÖ³ÉʹÓÃËüµÄ¹¥»÷ÕßÔÚ·ºÆð¶ñÒâÍøÕ¾Ê±¿ÉÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬£¬ÒÑÓÚ11ÔÂ8ÈÕÔÚ΢ÈíÐû²¼µÄÖܶþ²¹¶¡ÖÐÐÞ¸´¡£¡£¡£¡£¡£¡£
https://blog.google/threat-analysis-group/internet-explorer-0-day-exploited-by-north-korean-actor-apt37/
5¡¢ÔÚÏßÁãÊÛÆ½Ì¨VevorЧÀÍÆ÷ÉèÖùýʧй¶Áè¼Ý1ÒÚÌõ¼Í¼
ýÌå12ÔÂ8ÈÕ͸¶£¬£¬£¬£¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÎÞÃÜÂë±£»£»£»£»¤µÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÊý¾Ý¼¯×ܾÞϸΪ601.84 GB£¬£¬£¬£¬£¬£¬£¬Îĵµ×ÜÊýÁè¼Ý1.16ÒÚ¡£¡£¡£¡£¡£¡£¾ÊӲ죬£¬£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÊôÓÚ¼ÓÀû¸£ÄáÑǵÄÔÚÏßÁãÊÛÉÌVevor£¬£¬£¬£¬£¬£¬£¬Ò»¸öרעÓÚ×°±¸ºÍ¹¤¾ßµÄÆ·ÅÆ¡£¡£¡£¡£¡£¡£¸ÃЧÀÍÆ÷ÊÇÔÚ2022Äê4ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬È»ºóÑо¿Ö°Ô±ÔÚ2022Äê7ÔÂÔٴη¢Ã÷²»Çå¾²µÄAWSЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬±»ÍйÜÔÚ²î±ðµÄIPµØµãÉÏ¡£¡£¡£¡£¡£¡£2022Äê4ÔµÄÊÂÎñй¶ÁË406.79 GBÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨706206770¸öÎļþ£»£»£»£»2022Äê7ÔÂй¶ÁË601.84 GBÊý¾Ý£¬£¬£¬£¬£¬£¬£¬1166293742¸öÎĵµ¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬£¬ÕâÊÇÓÉÓÚЧÀÍÆ÷ËùÓÐÕßÉèÖùýʧµ¼Öµġ£¡£¡£¡£¡£¡£
https://www.websiteplanet.com/blog/vevor-breach-report/
6¡¢ESET·¢Ã÷ÒÁÀÊAgriusʹÓÃÐÂFantasyµÄ¹©Ó¦Á´¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£
12ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬ESET³ÆÆä·¢Ã÷ÁËÒÁÀÊAgriusµÄ¹©Ó¦Á´¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÚ½ñÄê2ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬£¬ÓÚ3ÔÂÖÜÈ«Õö¿ª£¬£¬£¬£¬£¬£¬£¬ÒÑÈëÇÖÒ»¼ÒITÖ§³ÖЧÀ͹«Ë¾¡¢Ò»¼Ò×êʯÅú·¢ÉÌ¡¢Ò»¼ÒÖ鱦É̺ÍÒ»¼ÒÈËÁ¦×ÊÔ´×Éѯ¹«Ë¾¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃÁËÒ»¸öеÄFantasy Wiper£¬£¬£¬£¬£¬£¬£¬ËüµÄ´ó²¿·Ö´úÂë¿âÀ´×ÔAgriusÔÚ֮ǰµÄ¹¥»÷ÖÐʹÓõÄApostle Wiper¡£¡£¡£¡£¡£¡£Fantasy»áÓÃËæ»úÊý¾ÝÁýÕÖÿ¸öÎļþµÄÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬½«Ê±¼ä´ÁÉèÖÃΪ2037ÄêÎçÒ¹²¢É¾³ý£¬£¬£¬£¬£¬£¬£¬´Ë¾ÙÊÇΪÁ˱ÜÃâÎļþ±»Êý¾Ý»Ö¸´¹¤¾ß»Ö¸´¡£¡£¡£¡£¡£¡£³ýÁËFantasy£¬£¬£¬£¬£¬£¬£¬Agrius»¹·Ö·¢ÁËÒ»ÖÖеÄÓÃÓÚºáÏòÒÆ¶¯ºÍÖ´ÐÐFantasyµÄ¹¤¾ßSandals¡£¡£¡£¡£¡£¡£
https://www.welivesecurity.com/2022/12/07/fantasy-new-agrius-wiper-supply-chain-attack/