΢ÈíÐû²¼·ÇÇå¾²¸üÐÂÐÞ¸´µ¼ÖÂSSL/TLSÎÕÊÖʧ°ÜµÄÎÊÌâ

Ðû²¼Ê±¼ä 2022-10-19

1¡¢Î¢ÈíÐû²¼·ÇÇå¾²¸üÐÂÐÞ¸´µ¼ÖÂSSL/TLSÎÕÊÖʧ°ÜµÄÎÊÌâ

      

¾Ý10ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬Î¢ÈíÒÑÐû²¼´øÍâ(OOB)·ÇÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´ÓÉ2022Äê10ÔÂWindowsÇå¾²¸üÐÂÒýÆðµÄÔÚ¿Í»§¶ËºÍЧÀÍÆ÷ƽ̨ÉÏ´¥·¢SSL/TLSÎÕÊÖʧ°ÜµÄÎÊÌâ¡£¡£¡£¡£¡£ÔÚ±»Ó°ÏìµÄ×°±¸ÉÏ£¬£¬£¬£¬µ±ÓëЧÀÍÆ÷µÄÅþÁ¬·ºÆðÎÊÌâʱ£¬£¬£¬£¬»áÏÔʾSEC_E_ILLEGAL_MESSAGE¹ýʧ¡£¡£¡£¡£¡£Î¢ÈíÌáÐÑ£¬£¬£¬£¬ÎÞ·¨Í¨¹ýWindows Update×°ÖøüеÄÓû§£¬£¬£¬£¬¿Éͨ¹ýMicrosoft Update Catalog ²¢ÊÖ¶¯½«ËüÃǵ¼ÈëWSUSºÍMicrosoft Endpoint Configuration ManagerÀ´×°Öᣡ£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-windows-tls-handshake-failures-in-out-of-band-updates/


2¡¢HelpSystems´øÍâ¸üÐÂÐÞ¸´Cobalt StrikeÖеÄRCEÎó²î

      

ýÌå10ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬HelpSystemsÐû²¼ÁËÒ»¸ö´øÍâÇå¾²¸üУ¬£¬£¬£¬ÒÔÐÞ¸´ÆäCobalt StrikeÖеÄRCEÎó²î¡£¡£¡£¡£¡£Îó²î×·×ÙΪCVE-2022-42948£¬£¬£¬£¬Ó°ÏìÁËCobalt Strike°æ±¾4.7.1¡£¡£¡£¡£¡£ÆäÔ´ÓÚ2022Äê9ÔÂ20ÈÕÐû²¼µÄÒ»¸ö²»ÍêÕûµÄ²¹¶¡£¬£¬£¬£¬¸Ã²¹¶¡ÓÃÓÚÐÞ¸´XSSÎó²î(CVE-2022-39197)¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ý²Ù¿Ø¿Í»§¶ËUIÊäÈë×ֶΡ¢Ä£ÄâCSÖ²Èë³ÌÐòÇ©Èë»òͨ¹ýhookÔÚÖ÷»úÉÏÔËÐеÄCSÖ²Èë³ÌÐòÀ´Ê¹ÓøÃXSSÎó²î¡£¡£¡£¡£¡£HelpSystems³Æ£¬£¬£¬£¬ÔÚÌØ¶¨ÇéÐÎÏ£¬£¬£¬£¬¿ÉÒÔʹÓÃJava Swing¿ò¼ÜÀ´´¥·¢Ô¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬Cobalt Strike 4.7.2ÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£¡£


https://thehackernews.com/2022/10/critical-rce-vulnerability-discovered.html


3¡¢¶à¹úÖ´·¨²¿·Öµ·»ÙרÃÅÈëÇÖÎÞÔ¿³×ϵͳµÄ³µÁ¾µÄ·¸·¨ÍÅ»ï

      

¾ÝýÌå10ÔÂ17Èճƣ¬£¬£¬£¬·¨¹ú¡¢À­ÍÑάÑǺÍÎ÷°àÑÀÖ´·¨²¿·Öµ·»ÙÁËÒ»¸öʹÓúڿ͹¤¾ßÇÔÈ¡Æû³µµÄÍøÂç·¸·¨ÍŻ£¬£¬£¬²¢¾Ð²¶ÁË31ÃûÏÓÒÉÈË¡£¡£¡£¡£¡£¹¥»÷ÕßÖ»Õë¶ÔʹÓÃÎÞÔ¿³×½øÈëºÍÆô¶¯ÏµÍ³µÄÆû³µ£¬£¬£¬£¬»áÔÚʹÓÃËûÃǵÄÎÞÔ¿³×ÊÖÒÕ½âËø³µÃŲ¢Æô¶¯·¢ÄîÍ·ºóµÁ×߯û³µ¡£¡£¡£¡£¡£´Ë´ÎÖ´·¨Ðж¯ÓÚ10ÔÂ10ÈÕ×îÏÈ£¬£¬£¬£¬¾Ð²¶ÁËÀ´×ÔÈý¸ö¹ú¼Ò22¸öËùÔÚµÄ31ÃûÏÓÒÉÈË£¬£¬£¬£¬ÆäÖаüÀ¨Èí¼þ¿ª·¢ÉÌ¡¢¾­ÏúÉÌÒÔ¼°Ê¹Óøù¤¾ßÈëÇÖÆû³µµÄ͵³µÔô£¬£¬£¬£¬»¹Ã»ÊÕÁ˼ÛÖµ1098500Å·ÔªµÄ·¸·¨×ʲú¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/police-dismantles-criminal-ring-that-hacked-keyless-cars/


4¡¢µÂ¹úHeilbronn StimmeÔâµ½ÀÕË÷¹¥»÷Ó°Ï챨ֽµÄ¿¯ÐÐ

      

10ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬µÂ¹ú±¨ÉçHeilbronn StimmeÔÚÔâµ½ÀÕË÷¹¥»÷ºó´òӡϵͳ̱»¾£¬£¬£¬£¬±»ÆÈÒÔµç×ÓÐÎʽ³öÊéеÄÒ»ÆÚ¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚÉÏÖÜÎ壬£¬£¬£¬Æäµç»°ºÍµç×ÓÓʼþϵͳÔÚÕû¸öÖÜĩʱ´úÒ»Ö±´¦ÓڹرÕ״̬¡£¡£¡£¡£¡£Ö÷±àUwe Ralf HeerÌåÏÖ£¬£¬£¬£¬´Ë´Î¹¥»÷Ó°ÏìÁËÕû¸öStimme MediengruppeýÌ弯ÍÅ£¬£¬£¬£¬ÆäÖаüÀ¨Pressedruck¡¢EchoºÍRegioMail¹«Ë¾¡£¡£¡£¡£¡£Heer»¹ÌåÏÖ£¬£¬£¬£¬×èÖ¹ÖÜÁùÏÂÖ磬£¬£¬£¬ºÚ¿Í¶¼Î´Ìá³öÏêϸµÄÊê½ðÒªÇ󡣡£¡£¡£¡£¹«Ë¾ÊÂÇéÖ°Ô±±»ÆÈÔÚ¼ÒÖÐʹÓÃСÎÒ˽¼ÒµçÄÔÊÂÇ飬£¬£¬£¬¸Ã¹«Ë¾ÕýÔÚÊÓ²ì´ËÊ£¬£¬£¬£¬²¢×·Çó½â¾öÊÖÒÕÎÊÌâµÄÒªÁì¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ransomware-attack-halts-circulation-of-some-german-newspapers/


5¡¢ÈÕ±¾¿Æ¼¼¹«Ë¾OomiyaµÄIT»ù´¡ÉèʩѬȾLockBit 3.0

      

¾ÝýÌå10ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬ÈÕ±¾¿Æ¼¼¹«Ë¾OomiyaÔâµ½ÁËLockBit 3.0µÄ¹¥»÷¡£¡£¡£¡£¡£OomiyaרעÓÚÉè¼ÆºÍÖÆÔì΢µç×ÓºÍÉèʩϵͳװ±¸£¬£¬£¬£¬ÆäÓªÒµ·ÖΪËÄ´óÁìÓò£ºÄ³Î´¾­ÊÚȨµÄµÚÈý·½²»·¨»á¼ûÁËËûÃÇÔÚÒ»¸ö²âÊÔÆ½Ì¨ÉϵÄÊý¾Ý¿â»¯Ñ§ºÍ¹¤Òµ²úÆ·µÄÖÆÔìºÍÉè¼Æ¡¢µç×ÓÖÊÁϵÄÉè¼Æ¡¢Ò©Î↑·¢ºÍ¹¤³§ÖÆÔì¡£¡£¡£¡£¡£Lockbit 3.0ÔËÓªÍÅ»ïÉù³ÆÒÑÇÔÈ¡¸Ã¹«Ë¾µÄÊý¾Ý£¬£¬£¬£¬²¢ÍþвÈôÊǹ«Ë¾²»¸¶Êê½ð½«ÔÚ10ÔÂ20ÈÕ֮ǰй¶±»µÁÊý¾Ý¡£¡£¡£¡£¡£ÓÉÓÚOomiyaλÓÚÈ«Çò¶à¸öÐÐÒµµÄÖ÷Òª×éÖ¯µÄ¹©Ó¦Á´ÖУ¬£¬£¬£¬ÒÔÊÇ´ËÊÂÎñ¿ÉÄÜ»á¶ÔµÚÈý·½×éÖ¯Ôì³ÉÖØ´óÓ°Ïì¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/137243/cyber-crime/oomiya-lockbit-3-0-ransomware.html


6¡¢°Ä´óÀûÑÇÆÏÌѾÆÁãÊÛÉÌVinomofoÔ¼50Íò¿Í»§µÄÐÅϢй¶

      

ýÌå10ÔÂ18Èճƣ¬£¬£¬£¬°Ä´óÀûÑÇµÄÆÏÌѾÆÁãÊÛÉÌVinomofoÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬¶à´ï50Íò¿Í»§µÄÐÅÏ¢¿ÉÄÜÒѾ­Ì»Â¶¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬Î´¾­ÊÚȨµÄµÚÈý·½ÔÚ²âÊÔÆ½Ì¨Éϲ»·¨»á¼ûÁËËûÃǵÄÊý¾Ý¿â£¬£¬£¬£¬Éæ¼°¿Í»§µÄÐÕÃû¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢µØµã¡¢ÓʼþµØµãºÍµç»°ºÅÂëµÈÐÅÏ¢¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÓм¸¶àÈËÊܵ½¸ÃÊÂÎñµÄÓ°Ï죬£¬£¬£¬µ«Óб¨µÀ³ÆVinomofoÓµÓÐÔ¼500000¸ö¿Í»§¡£¡£¡£¡£¡£²»¾Ãǰ£¬£¬£¬£¬°Ä´óÀûÑǵçÐÅÔËÓªÉÌOptusÔøÐ¹Â¶Áè¼Ý200Íò¿Í»§µÄÊý¾Ý¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/breaches-expose-millions-at-aussie/