΢ÈíÐû²¼4Ô·ÝÇå¾²¸üР×ܼÆÐÞ¸´119¸öÎó²î
Ðû²¼Ê±¼ä 2022-04-14΢ÈíÐû²¼4Ô·ÝÇå¾²¸üУ¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´119¸öÎó²î
΢ÈíÔÚ4ÔÂ12ÈÕÐû²¼±¾ÔµÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬×ܹ²ÐÞ¸´ÁË119¸öÎó²î£¨²»°üÀ¨26¸öMicrosoft EdgeÎó²î£©¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ2¸ö0day»®·ÖΪWindowsÓû§ÉèÖÃÎļþЧÀÍȨÏÞÌáÉýÎó²î£¨CVE-2022-26904£©ºÍWindowsͨÓÃÈÕÖ¾ÎļþϵͳÇý¶¯³ÌÐòȨÏÞÌáÉýÎó²î£¨CVE-2022-24521£©¡£¡£¡£¡£ÆäËü½ÏΪÑÏÖØÎó²î°üÀ¨Windows LDAPÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-26919£©¡¢Microsoft Dynamics 365(on-premises)Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-23259£©ºÍWindows Hyper-VÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2022-22008£©µÈ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2022-patch-tuesday-fixes-119-flaws-2-zero-days/
ÐÂAndroidľÂíFakecallsÖ÷ÒªÕë¶Ôº«¹úµÄ½ðÈÚ»ú¹¹
4ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬kasperskyÅû¶ÁËÐÂAndroidÒøÐÐľÂíFakecallsµÄÏêϸÐÅÏ¢¡£¡£¡£¡£Fakecallsαװ³ÉÒøÐеÄÒÆ¶¯Ó¦ÓóÌÐò£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ôº«¹úµÄKakaoBankºÍKookmin Bank(KB)µÈÒøÐС£¡£¡£¡£ÓëÆäËüÒøÐÐľÂí²î±ð£¬£¬£¬£¬£¬£¬Fakecalls¿ÉÒÔÄ£ÄâÓë¿Í»§Ö§³ÖµÄµç»°£¬£¬£¬£¬£¬£¬µ±Ä¿µÄÊÔͼ´òµç»°¸øÒøÐÐʱ£¬£¬£¬£¬£¬£¬Ëü»áÇжÏͨ»°²¢ÏÔʾÐéαµÄºô½Ð½çÃæ£¬£¬£¬£¬£¬£¬Ö¼ÔÚͨ¹ýÐ®ÖÆÍ¨»°À´ÇÔȡĿµÄµÄÐÅÏ¢¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ½öÖ§³Öº«Ó£¬£¬£¬£¬£¬ÕâʹµÃʹÓÃÆäËüϵͳÓïÑÔµÄÓû§ºÜÈÝÒײì¾õµ½ÎÊÌâ¡£¡£¡£¡£
https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/
BlackCatÉù³Æ¶Ô·ðÂÞÀï´ï¹ú¼Ê´óѧµÄ¹¥»÷ÊÂÎñÈÏÕæ
¾ÝýÌå4ÔÂ11ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬BlackCat(ALPHV)Éù³ÆÆäÈëÇÖÁË·ðÂÞÀï´ï¹ú¼Ê´óѧ²¢ÒÑÇÔÈ¡1.2 TBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬Éæ¼°ÌõÔ¼¡¢»á¼ÆÎļþ¡¢Éç»áÇå¾²ºÅÂëºÍµç×ÓÓʼþÊý¾Ý¿âµÈÐÅÏ¢¡£¡£¡£¡£¸Ã´óѧ»ØÓ¦³Æ£¬£¬£¬£¬£¬£¬ËûÃÇÒ»Ö±ÔÚÊÓ²ì´ËÊÂÎñ£¬£¬£¬£¬£¬£¬µ½ÏÖÔÚΪֹûÓм£ÏóÅú×¢Ãô¸ÐÐÅÏ¢Òѱ»Ð¹Â¶¡£¡£¡£¡£µ«Ñо¿Ö°Ô±Ö¤Êµ£¬£¬£¬£¬£¬£¬±»µÁÊý¾ÝÖÐȷʵ°üÀ¨´óѧ½ÌÖ°Ô±¹¤ºÍѧÉúµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£Recorded FutureÌåÏÖ£¬£¬£¬£¬£¬£¬×èÖ¹½ñÄê3Ô£¬£¬£¬£¬£¬£¬ÆäÒѼͼÁË37ÆðÕë¶ÔѧУµÄÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬¶ø2021ÄêÕûÄêΪ127Æð¡£¡£¡£¡£
https://therecord.media/blackcat-ransomware-group-claims-attack-on-florida-international-university/
Ñз¢ÍŶÓÐÞ¸´DirectusÖд洢ÐÍXSSÎó²îCVE-2022-24814
¾Ý4ÔÂ11Èյı¨µÀ£¬£¬£¬£¬£¬£¬Ñз¢ÍŶÓÐÞ¸´ÁËDirectusÖеĴ洢ÐÍXSSÎó²î£¨CVE-2022-24814£©¡£¡£¡£¡£DirectusÊÇÒ»¸ö¿ªÔ´µÄÄ£¿£¿£¿£¿£¿£¿£¿é»¯ÄÚÈÝÖÎÀíϵͳ(CMS)£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚʹÓÃGraphQLºÍREST API°ü×°SQLÊý¾Ý¿â¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËDirectus v9.6.0¼°¸üÔç°æ±¾£¬£¬£¬£¬£¬£¬±£´æÓÚCMSµÄÎļþÉÏ´«¹¦Ð§ÖС£¡£¡£¡£DirectusÚ¹Êͳƣ¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý½«iframe²åÈ븻Îı¾HTML½çÃæÀ´Ö´ÐÐδ¾ÊÚȨµÄJavaScript£¬£¬£¬£¬£¬£¬¸Ã½çÃæÁ´½Óµ½ÎļþÉÏ´«µÄHTMLÎļþ£¬£¬£¬£¬£¬£¬¸ÃÎļþÔÚÆä¾ç±¾±êÇ©ÖмÓÔØÁíÒ»¸öÉÏ´«µÄJSÎļþ¡£¡£¡£¡£
https://www.zdnet.com/article/xss-vulnerability-patched-in-directus-data-engine-platform/
AtlassianÌåÏÖÆäЧÀÍÖÐÖ¹ÎÊÌâ¿ÉÄÜ»¹ÐèÒ»Á¬Á½ÖÜÒÔÉÏ
ýÌå4ÔÂ11Èճƣ¬£¬£¬£¬£¬£¬¿ª·¢ºÍÐ×÷Èí¼þ¹«Ë¾AtlassianÔ¤¼Æ£¬£¬£¬£¬£¬£¬ÆäЧÀÍÖÐÖ¹ÎÊÌâ¿ÉÄÜ»¹ÐèÒ»Á¬Á½ÖÜÒÔÉÏ¡£¡£¡£¡£ÏÖÔÚAtlassianÒÑÖÐÖ¹Ò»ÖÜ£¬£¬£¬£¬£¬£¬Æä×î³õÔ¤¼Æ»Ö¸´ÊÂÇé²»»áÁè¼Ý¼¸Ì죬£¬£¬£¬£¬£¬²¢È·ÈϸÃÊÂÎñ²»ÊÇÍøÂç¹¥»÷µ¼Öµġ£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬ËüÔÚ½üÆÚ·¢Ë͸øÓû§µÄÓʼþÖгƣ¬£¬£¬£¬£¬£¬ÓÉÓÚÍøÕ¾ÖØÐÞµÄÖØ´óÐÔ£¬£¬£¬£¬£¬£¬¿ÉÄÜ»¹Ð賤´ïÁ½ÖܵÄʱ¼ä¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇÏÖÔÚÒѾΪÁè¼Ý35%µÄÊÜÓ°ÏìÓû§Íê³ÉÁËÖØÐÞ£¬£¬£¬£¬£¬£¬ÇÒûÓÐÊý¾ÝɥʧµÄÇéÐΡ£¡£¡£¡£
https://www.bleepingcomputer.com/news/technology/atlassian-says-ongoing-outage-might-last-two-more-weeks/
Unit42Ðû²¼2021ÄêµÚËÄÐò¶ÈWebÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ
4ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬Unit42Ðû²¼2021ÄêµÚËÄÐò¶ÈWebÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬´Ó2021Äê10Ôµ½12Ô£¬£¬£¬£¬£¬£¬Æä¼ì²âµ½Ô¼Äª533000Æð¶ñÒâµÇ¼URLÊÂÎñ£¬£¬£¬£¬£¬£¬ÆäÖÐ120753¸öÊÇΨһURL£»£»£»£»»¹¼ì²âµ½Ô¼2900000¸ö¶ñÒâÖ÷»úURL£¬£¬£¬£¬£¬£¬ÆäÖÐ165000¸öÊÇΨһURL¡£¡£¡£¡£ÕâЩ¶ñÒâURLÖеĴ󲿷ÖËÆºõÀ´×ÔÃÀ¹ú£¬£¬£¬£¬£¬£¬Æä´ÎÊǶíÂÞ˹ºÍµÂ¹ú¡£¡£¡£¡£11Ôµ½12ÔµĹ¥»÷»î¶¯±È9Ôµ½10Ô¸ü»îÔ¾£¬£¬£¬£¬£¬£¬ÔÚ11Ôµִï·åÖµ¡£¡£¡£¡£¼ì²âµ½µÄ¶ñÒâÈí¼þÀàÐÍÖ÷ҪΪcryptominers¡¢JS downloaders¡¢web skimmers¡¢web scamsºÍJS redirectors¡£¡£¡£¡£
https://unit42.paloaltonetworks.com/web-threats-malicious-host-urls/
Çå¾²¹¤¾ß
Group3r
¿ìËÙö¾Ù AD ×éÕ½ÂÔÖеÄÏà¹ØÉèÖ㬣¬£¬£¬£¬£¬²¢Ê¶±ðÆäÖпÉʹÓõĹýʧÉèÖᣡ£¡£¡£
https://github.com/Group3r/Group3r/
batfish
ÍøÂçÑéÖ¤¹¤¾ß£¬£¬£¬£¬£¬£¬Í¨Ì«¹ýÎöÍøÂç×°±¸µÄÉèÖ㬣¬£¬£¬£¬£¬ÎªÇå¾²ÐÔ¡¢¿É¿¿ÐԺͺϹæÐÔÌṩ׼ȷÐÔ°ü¹Ü¡£¡£¡£¡£
https://github.com/batfish/batfish
Smap
Smap ÊÇ Nmap µÄ¸´ÖÆÆ·£¬£¬£¬£¬£¬£¬ËüʹÓà shodan.io µÄÃâ·Ñ API ¾ÙÐж˿ÚɨÃè¡£¡£¡£¡£
https://github.com/s0md3v/Smap
Çå¾²ÆÊÎö
CISA ÖÒÑÔ¶íÂÞ˹ºÚ¿ÍʹÓà WatchGuard Îó²î
https://www.bleepingcomputer.com/news/security/cisa-warns-orgs-of-watchguard-bug-exploited-by-russian-state-hackers/
Ú²ÆÕßͨ¹ýÔ¶³Ì»á¼û¹¤¾ßÔÚ 2021 ÄêÇÔÈ¡ 5800 ÍòÓ¢°÷
https://www.infosecurity-magazine.com/news/fraudster-steal-58m-2021-via/
µÚÈý¸ö¶ñÒâ npm °ü'event-source-polyfill'
https://www.bleepingcomputer.com/news/security/third-npm-protestware-event-source-polyfill-calls-russia-out/
SystemBC ±»ÖÖÖÖ¹¥»÷ÕßʹÓÃ
https://asec.ahnlab.com/en/33600/
Anonymous¹¥»÷¶íÂÞ˹ 3 ¸ö×éÖ¯£¬£¬£¬£¬£¬£¬Ð¹Â¶ 400 GB Êý¾Ý
https://www.hackread.com/anonymous-hits-russian-entities-leaks-400-gb-emails/
Qbot ¶ñÒâÈí¼þʹÓÃÐ嵀 Windows Installer ѬȾǰÑÔ
https://www.bleepingcomputer.com/news/security/qbot-malware-switches-to-new-windows-installer-infection-vector/