12ÔÂWindows Server¸üе¼ÖÂHyper-VÐéÄâ»ú½¨Éè·ºÆðBug
Ðû²¼Ê±¼ä 2022-12-16
¾Ý12ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬12Ô·ݵÄWindows Server¸üлᵼÖÂÔÚ²¿·ÖHyper-VÖ÷»úÉϽ¨ÉèÐÂÐéÄâ»úʱ´¥·¢¹ýʧ¡£¡£¡£¡£¡£¡£Õâ¸öÎÊÌâÖ»Ó°Ï쵽ʹÓÃϵͳÖÐÐÄÐéÄâ»úÖÎÀíÆ÷£¨SCVMM£©ÖÎÀíµÄSDNÇéÐÎÖеÄWindows Server/AzStack HCIÖ÷»ú¡£¡£¡£¡£¡£¡£Î¢ÈíΪÊÜÓ°ÏìÓû§ÌṩÁË»º½â²½·¥£¬£¬£¬£¬£¬£¬ÔÚPowerShell´°¿ÚÔËÐÐÒ»×éÏÂÁ£¬£¬£¬£¬£¬»òʹÓÃרÓýÅÔÀ´ÅúÁ¿°²ÅŽâ¾öÒªÁì¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÕýÔÚÐÞ¸´ÎÊÌ⣬£¬£¬£¬£¬£¬²¢½«ÔÚδÀ´µÄ°æ±¾ÖÐÌṩ¸üС£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-december-windows-server-updates-break-hyper-v-vm-creation/
2¡¢Ììϱ°ë¾öÈüʱ´úFuboTV±»¹¥»÷Óû§ÎÞ·¨»á¼ûÁ÷ýÌåЧÀÍ
ýÌå12ÔÂ15Èճƣ¬£¬£¬£¬£¬£¬±¾ÖÜÈýµ±FuboTVÓû§×¼±¸Ô¢Ä¿Ììϱ·¨¹úÓëĦÂå¸çÖ®¼äµÄ°ë¾öÈüʱ£¬£¬£¬£¬£¬£¬·¢Ã÷ËûÃÇÎÞ·¨µÇ¼Á÷ýÌåЧÀÍ¡£¡£¡£¡£¡£¡£ËûÃÇÔÚʵÑéµÇ¼ʱÊÕµ½CB_ERR_OPEN¹ýʧÌáÐÑ£¬£¬£¬£¬£¬£¬ÏÔʾ¡°ff: downstream not available¡±¡£¡£¡£¡£¡£¡£FuboTVºÜ¿ì·¢ÎijÆËûÃÇÕýÔÚ½â¾öÕâ¸öÎÊÌ⣬£¬£¬£¬£¬£¬²¢½¨ÒéÓû§Í¨¹ýFOXԢĿ½ÇÖ𡣡£¡£¡£¡£¡£15ÈÕ£¬£¬£¬£¬£¬£¬FuboTVÈ·ÈÏÖÐÖ¹ÊÇÓÉÓÚÍøÂç¹¥»÷µ¼Öµģ¬£¬£¬£¬£¬£¬ËûÃÇÏÖÔÚÕýÔÚÊÓ²ìºÍÓ¦¶ÔÕâÒ»ÊÂÎñ¡£¡£¡£¡£¡£¡£FuboTV δ͸¶¹¥»÷ϸ½Ú£¬£¬£¬£¬£¬£¬µ«ÌåÏÖ´ø¿íȱ·¦²¢Î´µ¼ÖÂÖÐÖ¹£¬£¬£¬£¬£¬£¬Åú×¢Õâ²»ÊÇDDoS¹¥»÷£¬£¬£¬£¬£¬£¬¹¥»÷ºÜ¿ÉÄÜÊǶÔËûÃǵÄÍøÂç»òЧÀÍÆ÷µÄÆÆË𡣡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fubotv-says-world-cup-streaming-outage-caused-by-a-cyberattack/
3¡¢ESETÅû¶MirrorFaceÕë¶ÔÈÕ±¾Õþ¸®»ú¹¹µÄ´¹ÂÚ¹¥»÷ÏêÇé
ESETÓÚ12ÔÂ14ÈÕÅû¶ÁËMirrorFaceÕë¶ÔÈÕ±¾Õþ¸®»ú¹¹µÄ´¹ÂÚ¹¥»÷»î¶¯Operation LiberalFace¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯×îÏÈÓÚ2022Äê6ÔÂ⣬£¬£¬£¬£¬£¬Î±×°³ÉÀ´×ÔÌØ¶¨ÈÕ±¾Õþµ³¹«¹Ø²¿·ÖµÄ¹Ù·½Í¨Ñ¶£¬£¬£¬£¬£¬£¬±Þ²ßÊÕ¼þÈËÔÚ×Ô¼ºµÄÉ罻ýÌå×ÊÁÏÖзÖÏí¸½¼þÖеÄÊÓÆµ¡£¡£¡£¡£¡£¡£¸½¼þÊÇÒ»¸ö×Ô½âѹµÄWinRARѹËõ°ü£¬£¬£¬£¬£¬£¬·¿ª¾Í»á×îÏÈѬȾLODEINFO¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃÁËÒ»¸öÐÂµÄÆ¾Ö¤ÇÔÈ¡³ÌÐòMirrorStealer£¬£¬£¬£¬£¬£¬Ëü¿É´Ó¶à¸öÓ¦ÓÃÖÐÇÔȡƾ֤£¬£¬£¬£¬£¬£¬°üÀ¨ä¯ÀÀÆ÷ºÍµç×ÓÓʼþ¿Í»§¶Ë¡£¡£¡£¡£¡£¡£
https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities/
4¡¢ºÚ¿ÍÔÚ¶à¸ö¿ªÔ´´æ´¢¿âÉÏ´«Áè¼Ý14Íò¸ö°üÀ¨´¹ÂÚÁ´½ÓµÄ°ü
¾ÝýÌå12ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ͳһ¸ö¹¥»÷ÕßÏòNuGet¡¢NPMºÍPyPiÉÏ´«ÁË144294¸ö°ü¡£¡£¡£¡£¡£¡£ÊÓ²ìÕ¹ÏÖÁËÒ»ÖÖÐµĹ¥»÷ǰÑÔ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓðüÀ¨´¹ÂÚ¹¥»÷Á´½ÓµÄÈí¼þ°üÏò¿ªÔ´Éú̬ϵͳ·¢ËÍÀ¬»øÓʼþ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬ËùÓаüºÍÏà¹ØÓû§ÕÊ»§ºÜ¿ÉÄÜÊÇʹÓÃ×Ô¶¯»¯½¨ÉèµÄ£¬£¬£¬£¬£¬£¬ÕâЩ°üʹÓÃÁËÏàËÆµÄÏîÄ¿ÐÎòºÍ×Ô¶¯ÌìÉúµÄÃû³Æ¡£¡£¡£¡£¡£¡£¸Ã´¹ÂڻÁ´½Óµ½90¸öÓòÉϵÄ65000¶à¸öΨһURL£¬£¬£¬£¬£¬£¬Ã¿¸öÓòÔÚ²î±ð·¾¶Ï½¨ÉèÁ˶à¸ö´¹ÂÚÍøÒ³¡£¡£¡£¡£¡£¡£
https://checkmarx.com/blog/how-140k-nuget-npm-and-pypi-packages-were-used-to-spread-phishing-links/
5¡¢Cisco½üÆÚ·¢Ã÷ʹÓÃÐÂÐÍHTML×ß˽ÊÖÒÕ·Ö·¢QBotµÄ»î¶¯
Cisco TalosÔÚ12ÔÂ13ÈÕ³ÆÆä·¢Ã÷ÁËʹÓÿÉËõ·ÅʸÁ¿Í¼ÐÎ(SVG)ͼÏñµÄÐÂHTML×ß˽ÊÖÒÕ¡£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷ÊÇͨ¹ýº¬ÓÐJavaScriptµÄǶÈëʽSVGÎļþ¾ÙÐе쬣¬£¬£¬£¬£¬ÕâЩÎļþÖØÐÂ×éºÏ³ÉÒ»¸öBase64±àÂëµÄQBot¶ñÒâÈí¼þ×°ÖóÌÐò£¬£¬£¬£¬£¬£¬Í¨¹ýÄ¿µÄµÄä¯ÀÀÆ÷×Ô¶¯ÏÂÔØ¡£¡£¡£¡£¡£¡£ÓÉÓÚ¶ñÒâÈí¼þpayloadÊÇÖ±½ÓÔÚÄ¿µÄÖй¹½¨µÄ£¬£¬£¬£¬£¬£¬¶ø²»ÊÇͨ¹ýÍøÂç´«ÊäµÄ£¬£¬£¬£¬£¬£¬Òò´ËÕâÖÖHTML×ß˽ÊÖÒÕ¿ÉÒÔÈÆ¹ýÖ¼ÔÚ¹ýÂË´«ÊäÖеĶñÒâÄÚÈݵÄÇå¾²¼ì²â¡£¡£¡£¡£¡£¡£ÎªµÖÓùHTML×ß˽¹¥»÷£¬£¬£¬£¬£¬£¬¿É×èÖ¹¶ÔÏÂÔØÄÚÈÝÖ´ÐÐJavaScript»òVBScript¡£¡£¡£¡£¡£¡£
https://blog.talosintelligence.com/html-smugglers-turn-to-svg-images/
6¡¢CybereasonÐû²¼¹ØÓÚÀÕË÷Èí¼þRoyalµÄÊÖÒÕÆÊÎö±¨¸æ
12ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬CybereasonÐû²¼Á˹ØÓÚÀÕË÷Èí¼þRoyalµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£RoyalÓÚ2022ÄêÍ··ºÆð£¬£¬£¬£¬£¬£¬²¢×ÔÄêÖÐÒÔÀ´ÊÆÍ·Ç¿¾¢¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬RoyalÀ©Õ¹Á˲¿·Ö¼ÓÃܵĿ´·¨£¬£¬£¬£¬£¬£¬ÕâÒâζ×ÅËü¿ÉÒÔ¼ÓÃÜÔ¤ÏÈÈ·¶¨µÄ²¿·ÖÎļþÄÚÈÝ£¬£¬£¬£¬£¬£¬²¢»ùÓÚÎÞаµÄ°Ù·Ö±È½«Æä²¿·Ö¼ÓÃÜ£¬£¬£¬£¬£¬£¬Ìá¸ßÁË·´ÀÕË÷Èí¼þ½â¾ö¼Æ»®µÄ¼ì²âÄѶȣ»£»£»£»£»£»Ê¹Óöà¸öÏß³ÌÀ´¼ÓËÙ¼ÓÃÜÀú³Ì£»£»£»£»£»£»ÔÚÈ«Çò¹æÄ£ÄÚ»îÔ¾£¬£¬£¬£¬£¬£¬Ã»ÓÐʹÓÃRaaS£¬£¬£¬£¬£¬£¬Ò²Ã»ÓÐÕë¶ÔÌØ¶¨ÐÐÒµ»òµØÇø£»£»£»£»£»£»Æä×î³õÒÔ²î±ðµÄ·½·¨Æô¶¯ºÍ×°Öᣡ£¡£¡£¡£¡£
https://www.cybereason.com/blog/royal-ransomware-analysis