2Ô·ݸüе¼Ö²¿·ÖWindows Server 2022ÐéÄâ»úÎÞ·¨Æô¶¯

Ðû²¼Ê±¼ä 2023-02-17
1¡¢2Ô·ݸüе¼Ö²¿·ÖWindows Server 2022ÐéÄâ»úÎÞ·¨Æô¶¯

      

¾Ý2ÔÂ16ÈÕ±¨µÀ£¬£¬£¬Î¢ÈíÌåÏÖ£¬£¬£¬²¿·ÖWindows Server 2022ÐéÄâ»úÔÚ×°Öñ¾ÔµÄÖܶþ²¹¶¡ºó¿ÉÄÜÎÞ·¨Æô¶¯¡£¡£¡£¡£¡£´ËÎÊÌâ½öÓ°ÏìÆôÓÃÁËÇå¾²Æô¶¯²¢ÔÚvSphere ESXi 6.7 U2/U3»òvSphere ESXi 7.0.xÉÏÔËÐеÄÐéÄâ»ú¡£¡£¡£¡£¡£VMwareºÍRedmondÕýÔÚÊÓ²ì´ËÎÊÌ⣬£¬£¬ËäÈ»ÏÖÔÚûÓÐÐÞ¸´³ÌÐò£¬£¬£¬µ«VMwareΪÊÜÓ°ÏìµÄÖÎÀíÔ±ÌṩÁ˶àÖÖ»º½âÒªÁì¡£¡£¡£¡£¡£Òź¶µÄÊÇ£¬£¬£¬ÈôÊÇÒѾ­×°ÖÃÁ˱¾ÔµÄWindows Server 2022ÀÛ»ý¸üÐÂKB5022842£¬£¬£¬Ð¶ÔØËü²¢²»¿É½â¾öÎÊÌâ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-february-updates-break-some-windows-server-2022-vms/


2¡¢ÏÖ´úºÍÆðÑÇÍÆ³ö½ôÆÈ¸üÐÂÐÞ¸´Í¨¹ýUSBÊý¾ÝÏßµÁ³µµÄÎÊÌâ

      

ýÌå2ÔÂ15ÈÕ±¨µÀ³Æ£¬£¬£¬Æû³µÖÆÔìÉÌÏÖ´úºÍÆðÑǶÔËûÃǵļ¸¿î³µÐÍÍÆ³ö½ôÆÈÈí¼þ¸üУ¬£¬£¬ÒÔÐÞ¸´Í¨¹ýUSBÊý¾ÝÏßµÁ³µµÄÎÊÌâ¡£¡£¡£¡£¡£×Ô2022Äê7ÔÂÒÔÀ´£¬£¬£¬TikTok·ºÆðÁËÒ»ÏîÌôÕ½£¬£¬£¬ÑÝʾÁËÔõÑù²ðÏÂתÏòÖù¸Ç£¬£¬£¬Â¶³öÒ»¸öUSB-A²å²Û£¬£¬£¬ÓÃÓÚ¶Ì·ȼÉÕÆû³µ¡£¡£¡£¡£¡£ÕâÊÇÒ»¸öÂß¼­Îó²î£¬£¬£¬ÔÊÐíÔ¿³×Æô¶¯ÏµÍ³Èƹý·ÀµÁÆ÷£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÈκÎUSBÊý¾ÝÏßÇ¿Ð줻îȼÉÕÆø¸×À´Æô¶¯³µÁ¾¡£¡£¡£¡£¡£ÃÀ¹ú½»Í¨²¿³Æ£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÔ¼380ÍòÁ¾ÏÖ´úÆû³µºÍ450ÍòÁ¾ÆðÑÇÆû³µ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hyundai-kia-patch-bug-allowing-car-thefts-with-a-usb-cable/


3¡¢¼ÓÀû¸£ÄáÑDZ±ÖÝ´óѧÔâµ½AvosLockerÍÅ»ïµÄÀÕË÷¹¥»÷

      

2ÔÂ15ÈÕ±¨µÀ£¬£¬£¬ÀÕË÷ÍÅ»ïAvosLockerÔÚÆäÍøÕ¾ÁгöÁ˼ÓÀû¸£ÄáÑDZ±ÖÝ´óѧ¡£¡£¡£¡£¡£¹¥»÷Õß͸¶£¬£¬£¬ÒÑÇÔÈ¡°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂëºÍµç»°µÈÐÅÏ¢ÔÚÄÚµÄѧÉú¼ȡÊý¾Ý£¬£¬£¬ÒÔ¼°Éæ¼°ÐÕÃû¡¢»áÇå¾²ºÅÂë¡¢ÈËΪºÍ˰ÎñµÈÐÅÏ¢µÄÔ±¹¤Êý¾Ý¡£¡£¡£¡£¡£»£»£»£»£»£»¹Ðû²¼ÁË2022 W-2ѧԺԺ³¤¼æÊ×ϯִÐй١¢¸±Ôº³¤¼æÊ×ϯ²ÆÎñ¹ÙµÄÉùÃ÷ºÍÇóÖ°ÕßµÄÐÅÏ¢£¬£¬£¬×÷Ϊ¹¥»÷Ö¤¾Ý¡£¡£¡£¡£¡£¸ÃУÒÑÏò²¿·ÖÖÎÀíÖ°Ô±ºÍѧÉú·¢ËÍ´Ë´ÎÊÂÎñµÄ֪ͨ£¬£¬£¬¿ÉÊÇÆä¹ÙÍøÃ»ÓÐÈκιØÓÚÍøÂç¹¥»÷µÄÐÅÏ¢¡£¡£¡£¡£¡£


https://www.databreaches.net/california-northstate-university-student-and-employee-data-stolen/


4¡¢Ñо¿Ö°Ô±Åû¶ʩÄÍµÂµçÆø²¿·Ö²Ù×÷ϵͳÖÐÁ½¸öÎó²îµÄϸ½Ú

      

¾Ý2ÔÂ15ÈÕ±¨µÀ£¬£¬£¬Ñо¿Ö°Ô±Åû¶ÁËÓ°ÏìSchneider Electric Modicon¿É±à³ÌÂß¼­¿ØÖÆÆ÷(PLC)UnityϵÁеÄÁ½¸öÎó²î¡£¡£¡£¡£¡£»®·ÖΪÒì³£ÇéÐμì²é²»µ±Îó²î£¨CVE-2022-45788£©£¬£¬£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐС¢¾Ü¾øÐ§ÀÍ¡¢ÉñÃØÐÔºÍÍêÕûÐÔɥʧ¡£¡£¡£¡£¡£ÒÔ¼°Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-45789£©£¬£¬£¬¿ÉÄܻᵼÖÂÔÚ¿ØÖÆÆ÷ÉÏÖ´ÐÐδ¾­ÊÚȨµÄModbus¹¦Ð§¡£¡£¡£¡£¡£ÕâÊÇForescout×·×ÙµÄÎó²îÜöÝÍICEFALLµÄÒ»²¿·Ö£¬£¬£¬¿ÉÓëÆäËû¹©Ó¦É̵ÄÎó²î£¨ÈçCVE-2021-31886£©Á¬ÏµÊ¹Ó㬣¬£¬ÒÔʵÏÖOTÍøÂçÖеÄÉî¶ÈºáÏòÒÆ¶¯¡£¡£¡£¡£¡£


https://therecord.media/schneider-electric-modicon-vulnerabilities-forescout-icefall/


5¡¢Unit 42·¢Ã÷¶àÆðʹÓÃеÄMirai±äÌåV3G4µÄ¹¥»÷»î¶¯

      

2ÔÂ15ÈÕ£¬£¬£¬Unit 42Åû¶ÁËÐÂMirai±äÌåV3G4µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£×Ô2022Äê7ÔÂÒÔÀ´£¬£¬£¬Ñо¿Ö°Ô±ÊӲ쵽ÈýÆðʹÓÃMirai V3G4±äÌåµÄ»î¶¯¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁË13¸ö¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÎó²î£¬£¬£¬ÀÖ³ÉʹÓúó»á×Ô¶¯Ö´ÐÐwgetºÍcurl¹¤¾ß£¬£¬£¬´Ó¶ñÒâÈí¼þ»ù´¡ÉèÊ©ÏÂÔØMirai¿Í»§¶ËÑù±¾£¬£¬£¬È»ºóÖ´ÐÐÏÂÔØµÄbot¿Í»§¶Ë¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬Unit 42ÒÔΪÕâÈýÆð¹¥»÷¶¼À´×Ôͳһ¸ö¹¥»÷Õߣ¬£¬£¬ÓÉÓÚÓ²±àÂëµÄC2Óò°üÀ¨ÏàͬµÄ×Ö·û´®£¬£¬£¬shell¾ç±¾ÏÂÔØÏàËÆ£¬£¬£¬²¢ÇÒËùÓй¥»÷ÖÐʹÓõĽ©Ê¬ÍøÂç¿Í»§¶Ë¾ßÓÐÏàͬµÄ¹¦Ð§¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/mirai-variant-v3g4/


6¡¢Group-IBÐû²¼SideWinderÕë¶ÔÑÇÌ«µØÇø¹¥»÷µÄ±¨¸æ

      

Group-IBÔÚ2ÔÂ15ÈÕÐû²¼Á˹ØÓÚSideWinderÕë¶ÔÑÇÌ«µØÇø¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ÔÚ2021Äê6ÔÂÖÁ2021Äê11ÔÂʱ´ú£¬£¬£¬¹¥»÷ÕßÊÔͼÕë¶Ô°¢¸»º¹¡¢²»µ¤¡¢Ãåµé¡¢Äá²´¶ûºÍ˹ÀïÀ¼¿¨µÄ61¸öÕþ¸®¡¢¾ü¶Ó¡¢Ö´·¨²¿·ÖµÈÏà¹Ø×éÖ¯¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÓã²æÊ½´¹ÂÚÓʼþ£¬£¬£¬»áµ¼ÖÂÏÂÔØ¶ñÒâÎĵµ¡¢LNKÎļþ»ò¶ñÒâpayload¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÁ½¸öй¤¾ß£¬£¬£¬Ô¶³Ì»á¼ûľÂíSideWinder.RAT.bºÍÐÅÏ¢ÇÔÈ¡³ÌÐòSideWinder.StealerPy£¬£¬£¬ËüÃǶ¼Ê¹ÓÃTelegram¾ÙÐÐͨѶ£¬£¬£¬¶ø²»ÊǹŰåµÄC2¡£¡£¡£¡£¡£


https://www.group-ib.com/media-center/press-releases/sidewinder-apt-report/