JFrog·¢Ã÷ClickHouse DBMSÖеÄ7¸öRCEºÍDoSÎó²î

Ðû²¼Ê±¼ä 2022-03-21

JFrog·¢Ã÷ClickHouse DBMSÖеÄ7¸öRCEºÍDoSÎó²î


JFrogÑо¿ÍŶÓÔÚ3ÔÂ15ÈÕÐû²¼±¨¸æ£¬ÏêÊöÁË¿ªÔ´Êý¾Ý¿âÖÎÀíϵͳClickHouseÖеÄ7¸öÎó²î¡£ÆäÖаüÀ¨¿ÉÒÔµ¼Ö´úÂëÖ´ÐеĶѻº³åÇøÒç³öÎó²î£¨CVE-2021-43304ºÍCVE-2021-43305£© £»¿Éµ¼Ö¾ܾø·þÎñ»òÐÅϢй¶µÄ¶ÑÔ½½çÎó²î£¨CVE-2021-42387ºÍCVE-2021-42388£© £»ÒÔ¼°DoSÎó²î£¨CVE-2021-42389¡¢CVE-2021-42390ºÍCVE-2021-42391£©¡£¹¥»÷Õß¿ÉÒÔͨ¹ýʹÓöñÒâµÄѹËõÎļþʹÓÃÉÏÊöí§ÒâÎó²î£¬Ôì³ÉÊý¾Ý¿â·þÎñÆ÷Í߽⣬½¨ÒéÓû§Éý¼¶µ½v21.10.2.15-stable»ò¸ü¸ß°æ±¾ÒÔÐÞ¸´Îó²î¡£


https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms/


Ñо¿Ö°Ô±Åû¶CRI-OÖÐÎó²îcr8escapeµÄÏêϸÐÅÏ¢


3ÔÂ15ÈÕ£¬CrowdStrikeÍŶÓÅû¶ÁËCRI-OÖÐÎó²îcr8escape£¨CVE-2022-0811£©µÄÏêϸÐÅÏ¢¡£CRI-OÊÇÒ»¸öÇáÁ¿¼¶µÄ£¬×¨ÃŶÔKubernetes¾ÙÐÐÓÅ»¯µÄÈÝÆ÷ÔËÐÐʱÇéÐΡ£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ8.8£¬Ñо¿Ö°Ô±ÌåÏÖËü¿É±»ÓÃÀ´Èƹý± £»¤²½·¥²¢ÔÚÄ¿µÄÖ÷»úÉÏÉèÖÃí§ÒâÄں˲ÎÊý£¬ÈκÎÓÐȨÔÚʹÓÃCRI-OµÄKubernetesÉϰ²ÅÅpodµÄ¹¥»÷Õß¶¼¿ÉÒÔÀÄÓÃkernel.core_pattern²ÎÊý£¬ÔÚí§Òâ½ÚµãÉÏÒÔrootȨÏÞ¾ÙÐÐÈÝÆ÷ÌÓÒݺÍÖ´ÐÐí§Òâ´úÂë¡£¸ÃÎó²îÒÑÔÚ3ÔÂ15ÈÕÐû²¼µÄ1.23.2°æ±¾ÖÐÐÞ¸´¡£


https://thehackernews.com/2022/03/new-vulnerability-in-cri-o-engine-lets.html


Emotet»Ø¹é£¬Ã°³äÃÀ¹ú¹ú˰¾Ö·¢ËÍ´ó×Ú´¹ÂÚÓʼþ


¾ÝýÌå3ÔÂ16Èճƣ¬ÓʼþÇå¾²¹«Ë¾Cofense·¢Ã÷EmotetÐÂÒ»ÂֵĴ¹ÂÚÔ˶¯¡£ÃÀ¹úÏÖÔÚÕýÖµ±¨Ë°¼¾£¬¹¥»÷Õßð³ä»¥ÁªÍøË°Îñ¾Ö(IRS.gov)£¬ÏòÄ¿µÄ·¢ËÍ2021ÄêÄÉ˰É걨±í¡¢W-9±í¸ñºÍ±¨Ë°Ê±´ú³£ÓÃµÄÆäËü˰ÎñÎļþ¡£Ä¿µÄÖ´Ðи½¼þÖаüÀ¨¶ñÒâºêµÄÓÕ¶üÎļþºó£¬»áÏÂÔØ²¢×°ÖÃEmotet¡£Ö®ºó£¬¸Ã¶ñÒâÈí¼þ»áÏÂÔØÌØÁíÍâpayload£¬°üÀ¨Cobalt StrikeºÍÔ¶³Ì»á¼ûľÂíSystemBCµÈ¡£±ðµÄ£¬¸½¼þÖеÄzipÎļþÊÜÃÜÂë± £»¤£¬Òò´ËºÜÄѱ»Çå¾²ÓʼþÍø¹Ø¼ì²âµ½¡£


https://www.cyberscoop.com/cofense-emotet-irs-phishing/


AhnLabÐû²¼CirenegRAT½üÆÚ¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ


AhnLabÔÚ3ÔÂ16ÈÕÐû²¼Ò»·Ýб¨¸æ£¬¸ÅÊöÁËGhostCringeÔõÑùÕë¶ÔÒ×Êܹ¥»÷µÄÊý¾Ý¿â·þÎñÆ÷¡£GhostCringeÒ²³ÆÎªCirenegRAT£¬ÊÇ»ùÓÚGh0st RATµÄ´úÂëµÄ¶ñÒâÈí¼þÖ®Ò»£¬ÓÚ2018Äê12ÔÂÊ״α»·¢Ã÷£¬Í¨¹ýSMBÎó²î¾ÙÐзַ¢¡£´Ë´ÎÔ˶¯Ö÷ÒªÃé×¼MS-SQLºÍMySQL·þÎñÆ÷£¬¹¥»÷ÕßʹÓÃÀú³Ìmysqld.exe¡¢mysqld-nt.exeºÍsqlserver.exe½«¶ñÒâµÄmcsql.exe¿ÉÖ´ÐÐÎļþдÈë´ÅÅÌ¡£


https://asec.ahnlab.com/en/32572/


SophosÐû²¼¹ØÓÚCryptoRomÐÂÒ»ÂÖ¹¥»÷µÄÆÊÎö±¨¸æ


3ÔÂ16ÈÕ£¬SophosÐû²¼Á˹ØÓÚCryptoRomÕë¶ÔiPhoneºÍAndroidÓû§µÄ¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£CryptoRomÓÚ2021ÄêÊ״α»Åû¶£¬ÊÇÒ»¸öÔÚÑÇÖÞ¡¢ÃÀ¹úºÍÅ·ÖÞ»îÔ¾µÄ¹ú¼ÊÕ©Æ­ÍŻÑо¿ÌåÏÖ£¬CryptoRomÒѾ­Ë¢ÐÂÁËÊÖÒÕ£¬ËûÃÇʹÓÃiOS¹¦Ð§TestFlightºÍWebClips£¬ÈƹýÑÏ¿áµÄÉóÅúÁ÷³Ì½«¶ñÒâÓ¦ÓÃ×°ÖÃÔÚÄ¿µÄµÄÊÖ»úÉÏ¡£±¨¸æ³Æ£¬ÀֳɵÄCryptoRom¹¥»÷Ô˶¯¿ÉÄܸøÄ¿µÄÔì³ÉÎåλÊý¡¢ÁùλÊýÉõÖÁÆßλÊýµÄËðʧ¡£


https://news.sophos.com/en-us/2022/03/16/cryptorom-bitcoin-swindlers-continue-to-target-vulnerable-iphone-and-android-users/


»ªË¶³ÆÆä¶à¿î·ÓÉÆ÷Ò×ÊÜCyclops BlinkµÄ¹¥»÷


»ªË¶£¨ASUS£©ÔÚ3ÔÂ17ÈÕÐû²¼Ç徲ͨ¸æ£¬³ÆÆä¶à¿î·ÓÉÆ÷Ò×ÊÜCyclops BlinkµÄ¹¥»÷¡£Ç÷ÊÆ¿Æ¼¼ÌåÏָöñÒâÈí¼þÓÐÒ»¸öרÃÅÕë¶Ô»ªË¶Â·ÓÉÆ÷µÄÄ£¿é£¬¿É¶ÁÈ¡ÉÁ´æÀ´ÍøÂçÓйØÎļþ¡¢¿ÉÖ´ÐÐÎļþ¡¢Êý¾ÝºÍ¿âµÄÐÅÏ¢¡£È»ºó£¬Ëü»áÔÚÉÁ´æÖн¨É賤ÆÚ»¯£¬×ÝÈ»»Ö¸´³ö³§ÉèÖÃÒ²²»»áɾ³ý¡£ÏÖÔÚ£¬»ªË¶ÉÐδÐû²¼ÐµĹ̼þ¸üÐÂÒÔµÖÓùCyclops BlinkµÄ¹¥»÷£¬µ«Ðû²¼ÁËÓÃÓÚ± £»¤×°±¸µÄ»º½â²½·¥¡£


https://www.bleepingcomputer.com/news/security/asus-warns-of-cyclops-blink-malware-attacks-targeting-routers/



Çå¾²¹¤¾ß


RefleXXion


ÊÇÒ»¸öÊÊÓóÌÐò£¬Ö¼ÔÚ×ÊÖúÈÆ¹ý AV/EPP/EDR µÈʹÓõÄÓû§Ä£Ê½hook¡£


https://github.com/hlldz/RefleXXion


LDAP shell


Õâ¸ö´æ´¢¿â°üÀ¨Ò»¸ö´Ó ldap_shell ¼ÌÐøµÄС¹¤¾ß¡£


https://github.com/z-Riocool/ldap_shell/


Viper


ÊÇÒ»¸öͼÐλ¯µÄÄÚÍøÉøÍ¸¹¤¾ß¡£


https://github.com/FunnyWolf/Viper


Nivistealer 


ÓÃÓÚÇÔȡĿµÄͼÏñ¼òÖ±ÇÐλÖÃ×°±¸ÐÅÏ¢µÈµÈ¡£


https://github.com/swagkarna/Nivistealer




Çå¾²ÆÊÎö


¶íÂÞ˹ʹÓÃÎÚ¿ËÀ¼×ÜͳµÄdeepfakeÐû²¼ÐéαÐÅÏ¢


https://securityaffairs.co/wordpress/129124/intelligence/russia-deepfake-video-zelenskyy.html


΢ÈíÆô¶¯ 2022 Äê 3 Ô Windows 11 Bug Bash


https://news.softpedia.com/news/microsoft-kicks-off-the-march-2022-bug-bash-for-windows-11-535050.shtml


Cobalt Strike ÆÊÎöºÍ½Ì³Ì


https://unit42.paloaltonetworks.com/cobalt-strike-malleable-c2-profile/


αװ³É²úÆ·ÏÈÈݵĶñÒâWordÎļþ


https://asec.ahnlab.com/en/32609/


Ò»ÌìÄÚÊý°Ù¸öÍйÜÔÚGoDaddyµÄÍøÕ¾Ôâµ½ºóÃŹ¥»÷


https://www.wordfence.com/blog/2022/03/increase-in-malware-sightings-on-godaddy-managed-hosting/


Zimperium Ðû²¼ÁËÆäÄê¶ÈÒÆ¶¯Íþв±¨¸æ


https://www.bleepingcomputer.com/news/security/2021-mobile-security-android-more-vulnerabilities-ios-more-zero-days/