΢ÈíÅû¶LinuxÖÐͳ³ÆÎªNimbuspwnµÄ2¸öÌáȨÎó²îµÄÏêÇé
Ðû²¼Ê±¼ä 2022-04-28΢ÈíÔÚ4ÔÂ26ÈÕÅû¶ÁËLinuxÖÐÒ»×éÃûΪNimbuspwnµÄÎó²îµÄÏêÇé¡£¡£¡£¡£¡£¡£¡£Îó²î»®·ÖΪĿ¼±éÀúÎó²î(CVE-2022-29799)¡¢·ûºÅÁ´½Ó¾ºÕùÒÔ¼°Time-of-check-time-of-use(TOCTOU)¾ºÕùÌõ¼þÎó²î(CVE-2022-29800)£¬£¬£¬£¬£¬£¬£¬£¬¿É±»ÍâµØ¹¥»÷ÕßÓÃÀ´ÌáÉýȨÏÞ£¬£¬£¬£¬£¬£¬£¬£¬×°ÖúóÃźÍÀÕË÷Èí¼þµÈ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£ËüÃDZ£´æÓÚsystemd×é¼þnetworkd-dispatcherÖУ¬£¬£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öÓÃÓÚÍøÂçÖÎÀíÆ÷ϵͳЧÀ͵ÄÊØ»¤³ÌÐò¡£¡£¡£¡£¡£¡£¡£
https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/
2¡¢GoogleÐÞ¸´VirusTotalÖеÄRCEÎó²îCVE-2021-22204
ýÌå4ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬GoogleÒÑÐÞ¸´VirusTotalƽ̨ÖеÄRCEÎó²î£¨CVE-2021-22204£©¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇExifTool¶ÔDjVuÎļþ´¦Öóͷ£²»µ±µ¼Öµģ¬£¬£¬£¬£¬£¬£¬£¬¿É±»¹¥»÷ÕßÓÃÀ´ÎäÆ÷»¯VirusTotalƽ̨£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚʹÓÃɱ¶¾ÒýÇæµÄµÚÈý·½É³ºÐÉÏʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌáÐÑ£¬£¬£¬£¬£¬£¬£¬£¬Îó²î²¢²»Ó°ÏìVirusTotal£¬£¬£¬£¬£¬£¬£¬£¬´úÂëÖ´Ðв»±£´æÓÚÆ½Ì¨×Ô¼º£¬£¬£¬£¬£¬£¬£¬£¬¶øÊÇÔÚÆÊÎöºÍÖ´ÐÐÑù±¾µÄµÚÈý·½É¨Ãèϵͳ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÚ2021Äê4Ô±»Åû¶£¬£¬£¬£¬£¬£¬£¬£¬ÓÚ2021Äê5Ô±»½ÓÊÜ£¬£¬£¬£¬£¬£¬£¬£¬¶ø²¹¶¡Óڰ˸öÔºóµÄ2022Äê1ÔÂÐû²¼¡£¡£¡£¡£¡£¡£¡£
https://www.hackread.com/critical-rce-vulnerability-google-virustotal/
3¡¢StormousÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÊʿڿÉÀÖ¹«Ë¾161 GBµÄÊý¾Ý
¾Ý4ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïStormousÉù³ÆÒÑÇÔÈ¡ÊʿڿÉÀÖ¹«Ë¾Áè¼Ý161 GBµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÁгöÁË´ýÊÛÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬²¢ÏòÊʿڿÉÀÖ¹«Ë¾ÀÕË÷1.65±ÈÌØ±Ò£¨Ô¼ºÏ64000ÃÀÔª£©¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨Ñ¹ËõÎĵµ¡¢µç×ÓÓʼþºÍÃÜÂëµÄÎı¾Îļþ¡¢ÕÊ»§ºÍ¸¶¿îÏà¹ØZIPÎĵµµÈ¡£¡£¡£¡£¡£¡£¡£ÕâÊÇStormousÍÅ»ïµÚÒ»´Î¹ûÕæ±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£ÊʿڿÉÀÖ¹«Ë¾ÌåÏÖ֪ϤÓëÆäÏà¹ØµÄÍøÂç¹¥»÷µÄ±¨µÀºó£¬£¬£¬£¬£¬£¬£¬£¬ÕýÔÚÊÓ²ì´ËÊÂÎñ¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/130614/cyber-crime/stormous-ransomware-hit-coca-cola.html
4¡¢Hive0117ð³ä¶íÂÞ˹ִ·¨²¿·Ö¶Ô¶«Å·¹ú¼Ò¾ÙÐд¹ÂÚ¹¥»÷
ýÌå4ÔÂ27Èճƣ¬£¬£¬£¬£¬£¬£¬£¬IBMµÄX-ForceÍŶӷ¢Ã÷½üÆÚÕë¶Ô¶«Å·¹ú¼ÒµÄ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£´Ë´Î´¹Âڻ×îÏÈÓÚ2022Äê2Ô£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ·Ö·¢ÃûΪDarkWatchmanµÄÎÞÎļþ¶ñÒâÈí¼þ±äÖÖ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßð³ä¶íÂÞ˹µÄÖ´·¨²¿·Ö£¬£¬£¬£¬£¬£¬£¬£¬ÊÕ¼þÈËÊÇÁ¢ÌÕÍð¡¢°®É³ÄáÑǺͶíÂÞ˹µÄµçÐÅЧÀÍÌṩÉ̺͹¤Òµ¹«Ë¾¡£¡£¡£¡£¡£¡£¡£´¹ÂÚÓʼþÀ´×Ô˾·¨²¿µÄÕæÊµµØµã£¬£¬£¬£¬£¬£¬£¬£¬ÀýÈç¡°mail@r77[.]fssprus[.]ru¡±£¬£¬£¬£¬£¬£¬£¬£¬ÕýÎÄ»¹´øÓÐÕæÊµµÄ±ê¼Ç¡£¡£¡£¡£¡£¡£¡£Ëù¸½µÄZIPÎļþ°üÀ¨×°ÖÃDarkWatchmanµÄ¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬£¬£¬ºÍ¼ÓÃܵļüÅ̼ͼ³ÌÐò¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/russian-govt-impersonators-target-telcos-in-phishing-attacks/
5¡¢Secureworks³ÆConti±³ºóÍÅ»ïGold UlrickµÄ»î¶¯¼¤Ôö
ýÌå4ÔÂ26Èճƣ¬£¬£¬£¬£¬£¬£¬£¬ËäÈ»ÀÕË÷Èí¼þContiÔÚ²»¾Ãǰ±¬·¢ÁËÊý¾Ý×ß©ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬µ«Æä±³ºóÍÅ»ïGold UlrickµÄ¹¥»÷ÈÔÔÚ¼ÌÐø¡£¡£¡£¡£¡£¡£¡£ContiÊý¾ÝÐ¹Â¶ÍøÕ¾ÔÚ2021ÄêÆ½¾ùÿÔÂÁгö43¸ö±»¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ11Ôµִï·åÖµ£¬£¬£¬£¬£¬£¬£¬£¬Îª95¸ö¡£¡£¡£¡£¡£¡£¡£2022Äê2ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬@ContiLeaks¹ûÕæÁËGOLD ULRICKµÄÊý¾ÝºÍͨѶ£¬£¬£¬£¬£¬£¬£¬£¬µ«3Ô·ݱ»¹¥»÷Ä¿µÄµÄÊýÄ¿¼¤Ôö£¬£¬£¬£¬£¬£¬£¬£¬½ö´ÎÓÚÈ¥Äê11ÔµķåÖµ¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïµÄ³ÉÔ±¡°Jordan Conti¡±ÌåÏÖÊý¾Ýй¶¶ÔÆäÓ°ÏìºÜС£¬£¬£¬£¬£¬£¬£¬£¬ÆäÍøÕ¾ÔÚ4ÔµÄǰËÄÌì¾ÍÌí¼ÓÁË11¸ö±»¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/04/gold-ulrick-hackers-still-in-action.html
6¡¢KasperskyÐû²¼2022ÄêQ1 DDoS¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
2ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬KasperskyÐû²¼2022ÄêQ1 DDoS¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬2022ÄêµÚÒ»¼¾¶ÈµÄDDoSÃûÌÃÊܵ½¶íÂÞ˹ºÍÎÚ¿ËÀ¼Ö®¼äÒ»Á¬³åÍ»µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£KasperskyÔÚµÚÒ»¼¾¶È×ܹ²¼ì²âµ½ 91052´ÎDDoS¹¥»÷£»£»£»£»£»£»44.34%µÄ¹¥»÷Õë¶ÔÃÀ¹ú£¬£¬£¬£¬£¬£¬£¬£¬Õ¼ËùÓй¥»÷µÄ45.02%¡£¡£¡£¡£¡£¡£¡££»£»£»£»£»£»×î¶àµÄDDoS¹¥»÷(16.35%)±¬·¢ÔÚÖÜÈÕ£»£»£»£»£»£»´ó´ó¶¼¹¥»÷£¨94.95%£©Ò»Á¬²»µ½4Сʱ£¬£¬£¬£¬£¬£¬£¬£¬×µÄ¹¥»÷Ò»Á¬ÁË549Сʱ£»£»£»£»£»£»53.64%µÄ¹¥»÷ÊÇUDPºé·º£»£»£»£»£»£»55.53%µÄC&CЧÀÍÆ÷λÓÚÃÀ¹ú¡£¡£¡£¡£¡£¡£¡£
https://securelist.com/ddos-attacks-in-q1-2022/106358/


¾©¹«Íø°²±¸11010802024551ºÅ