2Ô·ݸüе¼Ö²¿·ÖWindows Server 2022ÐéÄâ»úÎÞ·¨Æô¶¯

Ðû²¼Ê±¼ä 2023-02-17
1¡¢2Ô·ݸüе¼Ö²¿·ÖWindows Server 2022ÐéÄâ»úÎÞ·¨Æô¶¯

      

¾Ý2ÔÂ16ÈÕ±¨µÀ £¬ £¬£¬Î¢ÈíÌåÏÖ £¬ £¬£¬²¿·ÖWindows Server 2022ÐéÄâ»úÔÚ×°Öñ¾ÔµÄÖܶþ²¹¶¡ºó¿ÉÄÜÎÞ·¨Æô¶¯¡£¡£¡£¡£¡£´ËÎÊÌâ½öÓ°ÏìÆôÓÃÁËÇå¾²Æô¶¯²¢ÔÚvSphere ESXi 6.7 U2/U3»òvSphere ESXi 7.0.xÉÏÔËÐеÄÐéÄâ»ú¡£¡£¡£¡£¡£VMwareºÍRedmondÕýÔÚÊÓ²ì´ËÎÊÌâ £¬ £¬£¬ËäÈ»ÏÖÔÚûÓÐÐÞ¸´³ÌÐò £¬ £¬£¬µ«VMwareΪÊÜÓ°ÏìµÄÖÎÀíÔ±ÌṩÁ˶àÖÖ»º½âÒªÁì¡£¡£¡£¡£¡£Òź¶µÄÊÇ £¬ £¬£¬ÈôÊÇÒѾ­×°ÖÃÁ˱¾ÔµÄWindows Server 2022ÀÛ»ý¸üÐÂKB5022842 £¬ £¬£¬Ð¶ÔØËü²¢²»¿É½â¾öÎÊÌâ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-february-updates-break-some-windows-server-2022-vms/


2¡¢ÏÖ´úºÍÆðÑÇÍÆ³ö½ôÆÈ¸üÐÂÐÞ¸´Í¨¹ýUSBÊý¾ÝÏßµÁ³µµÄÎÊÌâ

      

ýÌå2ÔÂ15ÈÕ±¨µÀ³Æ £¬ £¬£¬Æû³µÖÆÔìÉÌÏÖ´úºÍÆðÑǶÔËûÃǵļ¸¿î³µÐÍÍÆ³ö½ôÆÈÈí¼þ¸üР£¬ £¬£¬ÒÔÐÞ¸´Í¨¹ýUSBÊý¾ÝÏßµÁ³µµÄÎÊÌâ¡£¡£¡£¡£¡£×Ô2022Äê7ÔÂÒÔÀ´ £¬ £¬£¬TikTok·ºÆðÁËÒ»ÏîÌôÕ½ £¬ £¬£¬ÑÝʾÁËÔõÑù²ðÏÂתÏòÖù¸Ç £¬ £¬£¬Â¶³öÒ»¸öUSB-A²å²Û £¬ £¬£¬ÓÃÓÚ¶Ì·ȼÉÕÆû³µ¡£¡£¡£¡£¡£ÕâÊÇÒ»¸öÂß¼­Îó²î £¬ £¬£¬ÔÊÐíÔ¿³×Æô¶¯ÏµÍ³Èƹý·ÀµÁÆ÷ £¬ £¬£¬¹¥»÷Õß¿ÉʹÓÃÈκÎUSBÊý¾ÝÏßÇ¿Ð줻îȼÉÕÆø¸×À´Æô¶¯³µÁ¾¡£¡£¡£¡£¡£ÃÀ¹ú½»Í¨²¿³Æ £¬ £¬£¬¸ÃÎó²îÓ°ÏìÁËÔ¼380ÍòÁ¾ÏÖ´úÆû³µºÍ450ÍòÁ¾ÆðÑÇÆû³µ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hyundai-kia-patch-bug-allowing-car-thefts-with-a-usb-cable/


3¡¢¼ÓÀû¸£ÄáÑDZ±ÖÝ´óѧÔâµ½AvosLockerÍÅ»ïµÄÀÕË÷¹¥»÷

      

2ÔÂ15ÈÕ±¨µÀ £¬ £¬£¬ÀÕË÷ÍÅ»ïAvosLockerÔÚÆäÍøÕ¾ÁгöÁ˼ÓÀû¸£ÄáÑDZ±ÖÝ´óѧ¡£¡£¡£¡£¡£¹¥»÷Õß͸¶ £¬ £¬£¬ÒÑÇÔÈ¡°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂëºÍµç»°µÈÐÅÏ¢ÔÚÄÚµÄѧÉú¼ȡÊý¾Ý £¬ £¬£¬ÒÔ¼°Éæ¼°ÐÕÃû¡¢»áÇå¾²ºÅÂë¡¢ÈËΪºÍ˰ÎñµÈÐÅÏ¢µÄÔ±¹¤Êý¾Ý¡£¡£¡£¡£¡£»£»£»£»¹Ðû²¼ÁË2022 W-2ѧԺԺ³¤¼æÊ×ϯִÐй١¢¸±Ôº³¤¼æÊ×ϯ²ÆÎñ¹ÙµÄÉùÃ÷ºÍÇóÖ°ÕßµÄÐÅÏ¢ £¬ £¬£¬×÷Ϊ¹¥»÷Ö¤¾Ý¡£¡£¡£¡£¡£¸ÃУÒÑÏò²¿·ÖÖÎÀíÖ°Ô±ºÍѧÉú·¢ËÍ´Ë´ÎÊÂÎñµÄ֪ͨ £¬ £¬£¬¿ÉÊÇÆä¹ÙÍøÃ»ÓÐÈκιØÓÚÍøÂç¹¥»÷µÄÐÅÏ¢¡£¡£¡£¡£¡£


https://www.databreaches.net/california-northstate-university-student-and-employee-data-stolen/


4¡¢Ñо¿Ö°Ô±Åû¶ʩÄÍµÂµçÆø²¿·Ö²Ù×÷ϵͳÖÐÁ½¸öÎó²îµÄϸ½Ú

      

¾Ý2ÔÂ15ÈÕ±¨µÀ £¬ £¬£¬Ñо¿Ö°Ô±Åû¶ÁËÓ°ÏìSchneider Electric Modicon¿É±à³ÌÂß¼­¿ØÖÆÆ÷(PLC)UnityϵÁеÄÁ½¸öÎó²î¡£¡£¡£¡£¡£»®·ÖΪÒì³£ÇéÐμì²é²»µ±Îó²î£¨CVE-2022-45788£© £¬ £¬£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐС¢¾Ü¾øÐ§ÀÍ¡¢ÉñÃØÐÔºÍÍêÕûÐÔɥʧ¡£¡£¡£¡£¡£ÒÔ¼°Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-45789£© £¬ £¬£¬¿ÉÄܻᵼÖÂÔÚ¿ØÖÆÆ÷ÉÏÖ´ÐÐδ¾­ÊÚȨµÄModbus¹¦Ð§¡£¡£¡£¡£¡£ÕâÊÇForescout×·×ÙµÄÎó²îÜöÝÍICEFALLµÄÒ»²¿·Ö £¬ £¬£¬¿ÉÓëÆäËû¹©Ó¦É̵ÄÎó²î£¨ÈçCVE-2021-31886£©Á¬ÏµÊ¹Óà £¬ £¬£¬ÒÔʵÏÖOTÍøÂçÖеÄÉî¶ÈºáÏòÒÆ¶¯¡£¡£¡£¡£¡£


https://therecord.media/schneider-electric-modicon-vulnerabilities-forescout-icefall/


5¡¢Unit 42·¢Ã÷¶àÆðʹÓÃеÄMirai±äÌåV3G4µÄ¹¥»÷»î¶¯

      

2ÔÂ15ÈÕ £¬ £¬£¬Unit 42Åû¶ÁËÐÂMirai±äÌåV3G4µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£×Ô2022Äê7ÔÂÒÔÀ´ £¬ £¬£¬Ñо¿Ö°Ô±ÊӲ쵽ÈýÆðʹÓÃMirai V3G4±äÌåµÄ»î¶¯¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁË13¸ö¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÎó²î £¬ £¬£¬ÀÖ³ÉʹÓúó»á×Ô¶¯Ö´ÐÐwgetºÍcurl¹¤¾ß £¬ £¬£¬´Ó¶ñÒâÈí¼þ»ù´¡ÉèÊ©ÏÂÔØMirai¿Í»§¶ËÑù±¾ £¬ £¬£¬È»ºóÖ´ÐÐÏÂÔØµÄbot¿Í»§¶Ë¡£¡£¡£¡£¡£±ðµÄ £¬ £¬£¬Unit 42ÒÔΪÕâÈýÆð¹¥»÷¶¼À´×Ôͳһ¸ö¹¥»÷Õß £¬ £¬£¬ÓÉÓÚÓ²±àÂëµÄC2Óò°üÀ¨ÏàͬµÄ×Ö·û´® £¬ £¬£¬shell¾ç±¾ÏÂÔØÏàËÆ £¬ £¬£¬²¢ÇÒËùÓй¥»÷ÖÐʹÓõĽ©Ê¬ÍøÂç¿Í»§¶Ë¾ßÓÐÏàͬµÄ¹¦Ð§¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/mirai-variant-v3g4/


6¡¢Group-IBÐû²¼SideWinderÕë¶ÔÑÇÌ«µØÇø¹¥»÷µÄ±¨¸æ

      

Group-IBÔÚ2ÔÂ15ÈÕÐû²¼Á˹ØÓÚSideWinderÕë¶ÔÑÇÌ«µØÇø¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö £¬ £¬£¬ÔÚ2021Äê6ÔÂÖÁ2021Äê11ÔÂʱ´ú £¬ £¬£¬¹¥»÷ÕßÊÔͼÕë¶Ô°¢¸»º¹¡¢²»µ¤¡¢Ãåµé¡¢Äá²´¶ûºÍ˹ÀïÀ¼¿¨µÄ61¸öÕþ¸®¡¢¾ü¶Ó¡¢Ö´·¨²¿·ÖµÈÏà¹Ø×éÖ¯¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÓã²æÊ½´¹ÂÚÓʼþ £¬ £¬£¬»áµ¼ÖÂÏÂÔØ¶ñÒâÎĵµ¡¢LNKÎļþ»ò¶ñÒâpayload¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÁ½¸öй¤¾ß £¬ £¬£¬Ô¶³Ì»á¼ûľÂíSideWinder.RAT.bºÍÐÅÏ¢ÇÔÈ¡³ÌÐòSideWinder.StealerPy £¬ £¬£¬ËüÃǶ¼Ê¹ÓÃTelegram¾ÙÐÐͨѶ £¬ £¬£¬¶ø²»ÊǹŰåµÄC2¡£¡£¡£¡£¡£


https://www.group-ib.com/media-center/press-releases/sidewinder-apt-report/