2Ô·ݸüе¼Ö²¿·ÖWindows Server 2022ÐéÄâ»úÎÞ·¨Æô¶¯

Ðû²¼Ê±¼ä 2023-02-17
1¡¢2Ô·ݸüе¼Ö²¿·ÖWindows Server 2022ÐéÄâ»úÎÞ·¨Æô¶¯

      

¾Ý2ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬²¿·ÖWindows Server 2022ÐéÄâ»úÔÚ×°Öñ¾ÔµÄÖܶþ²¹¶¡ºó¿ÉÄÜÎÞ·¨Æô¶¯¡£¡£¡£ ¡£¡£¡£´ËÎÊÌâ½öÓ°ÏìÆôÓÃÁËÇå¾²Æô¶¯²¢ÔÚvSphere ESXi 6.7 U2/U3»òvSphere ESXi 7.0.xÉÏÔËÐеÄÐéÄâ»ú¡£¡£¡£ ¡£¡£¡£VMwareºÍRedmondÕýÔÚÊÓ²ì´ËÎÊÌ⣬£¬£¬£¬£¬£¬ËäÈ»ÏÖÔÚûÓÐÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬£¬µ«VMwareΪÊÜÓ°ÏìµÄÖÎÀíÔ±ÌṩÁ˶àÖÖ»º½âÒªÁì¡£¡£¡£ ¡£¡£¡£Òź¶µÄÊÇ£¬£¬£¬£¬£¬£¬ÈôÊÇÒѾ­×°ÖÃÁ˱¾ÔµÄWindows Server 2022ÀÛ»ý¸üÐÂKB5022842£¬£¬£¬£¬£¬£¬Ð¶ÔØËü²¢²»¿É½â¾öÎÊÌâ¡£¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-february-updates-break-some-windows-server-2022-vms/


2¡¢ÏÖ´úºÍÆðÑÇÍÆ³ö½ôÆÈ¸üÐÂÐÞ¸´Í¨¹ýUSBÊý¾ÝÏßµÁ³µµÄÎÊÌâ

      

ýÌå2ÔÂ15ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬Æû³µÖÆÔìÉÌÏÖ´úºÍÆðÑǶÔËûÃǵļ¸¿î³µÐÍÍÆ³ö½ôÆÈÈí¼þ¸üУ¬£¬£¬£¬£¬£¬ÒÔÐÞ¸´Í¨¹ýUSBÊý¾ÝÏßµÁ³µµÄÎÊÌâ¡£¡£¡£ ¡£¡£¡£×Ô2022Äê7ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬TikTok·ºÆðÁËÒ»ÏîÌôÕ½£¬£¬£¬£¬£¬£¬ÑÝʾÁËÔõÑù²ðÏÂתÏòÖù¸Ç£¬£¬£¬£¬£¬£¬Â¶³öÒ»¸öUSB-A²å²Û£¬£¬£¬£¬£¬£¬ÓÃÓÚ¶Ì·ȼÉÕÆû³µ¡£¡£¡£ ¡£¡£¡£ÕâÊÇÒ»¸öÂß¼­Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¿³×Æô¶¯ÏµÍ³Èƹý·ÀµÁÆ÷£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÈκÎUSBÊý¾ÝÏßÇ¿Ð줻îȼÉÕÆø¸×À´Æô¶¯³µÁ¾¡£¡£¡£ ¡£¡£¡£ÃÀ¹ú½»Í¨²¿³Æ£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÔ¼380ÍòÁ¾ÏÖ´úÆû³µºÍ450ÍòÁ¾ÆðÑÇÆû³µ¡£¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hyundai-kia-patch-bug-allowing-car-thefts-with-a-usb-cable/


3¡¢¼ÓÀû¸£ÄáÑDZ±ÖÝ´óѧÔâµ½AvosLockerÍÅ»ïµÄÀÕË÷¹¥»÷

      

2ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïAvosLockerÔÚÆäÍøÕ¾ÁгöÁ˼ÓÀû¸£ÄáÑDZ±ÖÝ´óѧ¡£¡£¡£ ¡£¡£¡£¹¥»÷Õß͸¶£¬£¬£¬£¬£¬£¬ÒÑÇÔÈ¡°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂëºÍµç»°µÈÐÅÏ¢ÔÚÄÚµÄѧÉú¼ȡÊý¾Ý£¬£¬£¬£¬£¬£¬ÒÔ¼°Éæ¼°ÐÕÃû¡¢»áÇå¾²ºÅÂë¡¢ÈËΪºÍ˰ÎñµÈÐÅÏ¢µÄÔ±¹¤Êý¾Ý¡£¡£¡£ ¡£¡£¡£»£»£» £»£»£»£»¹Ðû²¼ÁË2022 W-2ѧԺԺ³¤¼æÊ×ϯִÐй١¢¸±Ôº³¤¼æÊ×ϯ²ÆÎñ¹ÙµÄÉùÃ÷ºÍÇóÖ°ÕßµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬×÷Ϊ¹¥»÷Ö¤¾Ý¡£¡£¡£ ¡£¡£¡£¸ÃУÒÑÏò²¿·ÖÖÎÀíÖ°Ô±ºÍѧÉú·¢ËÍ´Ë´ÎÊÂÎñµÄ֪ͨ£¬£¬£¬£¬£¬£¬¿ÉÊÇÆä¹ÙÍøÃ»ÓÐÈκιØÓÚÍøÂç¹¥»÷µÄÐÅÏ¢¡£¡£¡£ ¡£¡£¡£


https://www.databreaches.net/california-northstate-university-student-and-employee-data-stolen/


4¡¢Ñо¿Ö°Ô±Åû¶ʩÄÍµÂµçÆø²¿·Ö²Ù×÷ϵͳÖÐÁ½¸öÎó²îµÄϸ½Ú

      

¾Ý2ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Åû¶ÁËÓ°ÏìSchneider Electric Modicon¿É±à³ÌÂß¼­¿ØÖÆÆ÷(PLC)UnityϵÁеÄÁ½¸öÎó²î¡£¡£¡£ ¡£¡£¡£»®·ÖΪÒì³£ÇéÐμì²é²»µ±Îó²î£¨CVE-2022-45788£©£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐС¢¾Ü¾øÐ§ÀÍ¡¢ÉñÃØÐÔºÍÍêÕûÐÔɥʧ¡£¡£¡£ ¡£¡£¡£ÒÔ¼°Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-45789£©£¬£¬£¬£¬£¬£¬¿ÉÄܻᵼÖÂÔÚ¿ØÖÆÆ÷ÉÏÖ´ÐÐδ¾­ÊÚȨµÄModbus¹¦Ð§¡£¡£¡£ ¡£¡£¡£ÕâÊÇForescout×·×ÙµÄÎó²îÜöÝÍICEFALLµÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬¿ÉÓëÆäËû¹©Ó¦É̵ÄÎó²î£¨ÈçCVE-2021-31886£©Á¬ÏµÊ¹Ó㬣¬£¬£¬£¬£¬ÒÔʵÏÖOTÍøÂçÖеÄÉî¶ÈºáÏòÒÆ¶¯¡£¡£¡£ ¡£¡£¡£


https://therecord.media/schneider-electric-modicon-vulnerabilities-forescout-icefall/


5¡¢Unit 42·¢Ã÷¶àÆðʹÓÃеÄMirai±äÌåV3G4µÄ¹¥»÷»î¶¯

      

2ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬Unit 42Åû¶ÁËÐÂMirai±äÌåV3G4µÄ¹¥»÷»î¶¯¡£¡£¡£ ¡£¡£¡£×Ô2022Äê7ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÊӲ쵽ÈýÆðʹÓÃMirai V3G4±äÌåµÄ»î¶¯¡£¡£¡£ ¡£¡£¡£¹¥»÷ÕßʹÓÃÁË13¸ö¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÎó²î£¬£¬£¬£¬£¬£¬ÀÖ³ÉʹÓúó»á×Ô¶¯Ö´ÐÐwgetºÍcurl¹¤¾ß£¬£¬£¬£¬£¬£¬´Ó¶ñÒâÈí¼þ»ù´¡ÉèÊ©ÏÂÔØMirai¿Í»§¶ËÑù±¾£¬£¬£¬£¬£¬£¬È»ºóÖ´ÐÐÏÂÔØµÄbot¿Í»§¶Ë¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Unit 42ÒÔΪÕâÈýÆð¹¥»÷¶¼À´×Ôͳһ¸ö¹¥»÷Õߣ¬£¬£¬£¬£¬£¬ÓÉÓÚÓ²±àÂëµÄC2Óò°üÀ¨ÏàͬµÄ×Ö·û´®£¬£¬£¬£¬£¬£¬shell¾ç±¾ÏÂÔØÏàËÆ£¬£¬£¬£¬£¬£¬²¢ÇÒËùÓй¥»÷ÖÐʹÓõĽ©Ê¬ÍøÂç¿Í»§¶Ë¾ßÓÐÏàͬµÄ¹¦Ð§¡£¡£¡£ ¡£¡£¡£


https://unit42.paloaltonetworks.com/mirai-variant-v3g4/


6¡¢Group-IBÐû²¼SideWinderÕë¶ÔÑÇÌ«µØÇø¹¥»÷µÄ±¨¸æ

      

Group-IBÔÚ2ÔÂ15ÈÕÐû²¼Á˹ØÓÚSideWinderÕë¶ÔÑÇÌ«µØÇø¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬ÔÚ2021Äê6ÔÂÖÁ2021Äê11ÔÂʱ´ú£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊÔͼÕë¶Ô°¢¸»º¹¡¢²»µ¤¡¢Ãåµé¡¢Äá²´¶ûºÍ˹ÀïÀ¼¿¨µÄ61¸öÕþ¸®¡¢¾ü¶Ó¡¢Ö´·¨²¿·ÖµÈÏà¹Ø×éÖ¯¡£¡£¡£ ¡£¡£¡£¹¥»÷ʼÓÚÓã²æÊ½´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬»áµ¼ÖÂÏÂÔØ¶ñÒâÎĵµ¡¢LNKÎļþ»ò¶ñÒâpayload¡£¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÁ½¸öй¤¾ß£¬£¬£¬£¬£¬£¬Ô¶³Ì»á¼ûľÂíSideWinder.RAT.bºÍÐÅÏ¢ÇÔÈ¡³ÌÐòSideWinder.StealerPy£¬£¬£¬£¬£¬£¬ËüÃǶ¼Ê¹ÓÃTelegram¾ÙÐÐͨѶ£¬£¬£¬£¬£¬£¬¶ø²»ÊǹŰåµÄC2¡£¡£¡£ ¡£¡£¡£


https://www.group-ib.com/media-center/press-releases/sidewinder-apt-report/