΢ÈíÅû¶LinuxÖÐͳ³ÆÎªNimbuspwnµÄ2¸öÌáȨÎó²îµÄÏêÇé
Ðû²¼Ê±¼ä 2022-04-28΢ÈíÔÚ4ÔÂ26ÈÕÅû¶ÁËLinuxÖÐÒ»×éÃûΪNimbuspwnµÄÎó²îµÄÏêÇé¡£¡£¡£¡£¡£¡£¡£¡£Îó²î»®·ÖΪĿ¼±éÀúÎó²î(CVE-2022-29799)¡¢·ûºÅÁ´½Ó¾ºÕùÒÔ¼°Time-of-check-time-of-use(TOCTOU)¾ºÕùÌõ¼þÎó²î(CVE-2022-29800)£¬£¬£¬£¬£¬£¬¿É±»ÍâµØ¹¥»÷ÕßÓÃÀ´ÌáÉýȨÏÞ£¬£¬£¬£¬£¬£¬×°ÖúóÃźÍÀÕË÷Èí¼þµÈ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¡£ËüÃDZ£´æÓÚsystemd×é¼þnetworkd-dispatcherÖУ¬£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öÓÃÓÚÍøÂçÖÎÀíÆ÷ϵͳЧÀ͵ÄÊØ»¤³ÌÐò¡£¡£¡£¡£¡£¡£¡£¡£
https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/
2¡¢GoogleÐÞ¸´VirusTotalÖеÄRCEÎó²îCVE-2021-22204
ýÌå4ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬GoogleÒÑÐÞ¸´VirusTotalƽ̨ÖеÄRCEÎó²î£¨CVE-2021-22204£©¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇExifTool¶ÔDjVuÎļþ´¦Öóͷ£²»µ±µ¼Öµģ¬£¬£¬£¬£¬£¬¿É±»¹¥»÷ÕßÓÃÀ´ÎäÆ÷»¯VirusTotalƽ̨£¬£¬£¬£¬£¬£¬²¢ÔÚʹÓÃɱ¶¾ÒýÇæµÄµÚÈý·½É³ºÐÉÏʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌáÐÑ£¬£¬£¬£¬£¬£¬Îó²î²¢²»Ó°ÏìVirusTotal£¬£¬£¬£¬£¬£¬´úÂëÖ´Ðв»±£´æÓÚÆ½Ì¨×Ô¼º£¬£¬£¬£¬£¬£¬¶øÊÇÔÚÆÊÎöºÍÖ´ÐÐÑù±¾µÄµÚÈý·½É¨Ãèϵͳ¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÚ2021Äê4Ô±»Åû¶£¬£¬£¬£¬£¬£¬ÓÚ2021Äê5Ô±»½ÓÊÜ£¬£¬£¬£¬£¬£¬¶ø²¹¶¡Óڰ˸öÔºóµÄ2022Äê1ÔÂÐû²¼¡£¡£¡£¡£¡£¡£¡£¡£
https://www.hackread.com/critical-rce-vulnerability-google-virustotal/
3¡¢StormousÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÊʿڿÉÀÖ¹«Ë¾161 GBµÄÊý¾Ý
¾Ý4ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïStormousÉù³ÆÒÑÇÔÈ¡ÊʿڿÉÀÖ¹«Ë¾Áè¼Ý161 GBµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÁгöÁË´ýÊÛÊý¾Ý£¬£¬£¬£¬£¬£¬²¢ÏòÊʿڿÉÀÖ¹«Ë¾ÀÕË÷1.65±ÈÌØ±Ò£¨Ô¼ºÏ64000ÃÀÔª£©¡£¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨Ñ¹ËõÎĵµ¡¢µç×ÓÓʼþºÍÃÜÂëµÄÎı¾Îļþ¡¢ÕÊ»§ºÍ¸¶¿îÏà¹ØZIPÎĵµµÈ¡£¡£¡£¡£¡£¡£¡£¡£ÕâÊÇStormousÍÅ»ïµÚÒ»´Î¹ûÕæ±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£ÊʿڿÉÀÖ¹«Ë¾ÌåÏÖ֪ϤÓëÆäÏà¹ØµÄÍøÂç¹¥»÷µÄ±¨µÀºó£¬£¬£¬£¬£¬£¬ÕýÔÚÊÓ²ì´ËÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/130614/cyber-crime/stormous-ransomware-hit-coca-cola.html
4¡¢Hive0117ð³ä¶íÂÞ˹ִ·¨²¿·Ö¶Ô¶«Å·¹ú¼Ò¾ÙÐд¹ÂÚ¹¥»÷
ýÌå4ÔÂ27Èճƣ¬£¬£¬£¬£¬£¬IBMµÄX-ForceÍŶӷ¢Ã÷½üÆÚÕë¶Ô¶«Å·¹ú¼ÒµÄ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Î´¹Âڻ×îÏÈÓÚ2022Äê2Ô£¬£¬£¬£¬£¬£¬Ö¼ÔÚ·Ö·¢ÃûΪDarkWatchmanµÄÎÞÎļþ¶ñÒâÈí¼þ±äÖÖ¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßð³ä¶íÂÞ˹µÄÖ´·¨²¿·Ö£¬£¬£¬£¬£¬£¬ÊÕ¼þÈËÊÇÁ¢ÌÕÍð¡¢°®É³ÄáÑǺͶíÂÞ˹µÄµçÐÅЧÀÍÌṩÉ̺͹¤Òµ¹«Ë¾¡£¡£¡£¡£¡£¡£¡£¡£´¹ÂÚÓʼþÀ´×Ô˾·¨²¿µÄÕæÊµµØµã£¬£¬£¬£¬£¬£¬ÀýÈç¡°mail@r77[.]fssprus[.]ru¡±£¬£¬£¬£¬£¬£¬ÕýÎÄ»¹´øÓÐÕæÊµµÄ±ê¼Ç¡£¡£¡£¡£¡£¡£¡£¡£Ëù¸½µÄZIPÎļþ°üÀ¨×°ÖÃDarkWatchmanµÄ¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬ºÍ¼ÓÃܵļüÅ̼ͼ³ÌÐò¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/russian-govt-impersonators-target-telcos-in-phishing-attacks/
5¡¢Secureworks³ÆConti±³ºóÍÅ»ïGold UlrickµÄ»î¶¯¼¤Ôö
ýÌå4ÔÂ26Èճƣ¬£¬£¬£¬£¬£¬ËäÈ»ÀÕË÷Èí¼þContiÔÚ²»¾Ãǰ±¬·¢ÁËÊý¾Ý×ß©ÊÂÎñ£¬£¬£¬£¬£¬£¬µ«Æä±³ºóÍÅ»ïGold UlrickµÄ¹¥»÷ÈÔÔÚ¼ÌÐø¡£¡£¡£¡£¡£¡£¡£¡£ContiÊý¾ÝÐ¹Â¶ÍøÕ¾ÔÚ2021ÄêÆ½¾ùÿÔÂÁгö43¸ö±»¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬ÔÚ11Ôµִï·åÖµ£¬£¬£¬£¬£¬£¬Îª95¸ö¡£¡£¡£¡£¡£¡£¡£¡£2022Äê2ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬@ContiLeaks¹ûÕæÁËGOLD ULRICKµÄÊý¾ÝºÍͨѶ£¬£¬£¬£¬£¬£¬µ«3Ô·ݱ»¹¥»÷Ä¿µÄµÄÊýÄ¿¼¤Ôö£¬£¬£¬£¬£¬£¬½ö´ÎÓÚÈ¥Äê11ÔµķåÖµ¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïµÄ³ÉÔ±¡°Jordan Conti¡±ÌåÏÖÊý¾Ýй¶¶ÔÆäÓ°ÏìºÜС£¬£¬£¬£¬£¬£¬ÆäÍøÕ¾ÔÚ4ÔµÄǰËÄÌì¾ÍÌí¼ÓÁË11¸ö±»¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/04/gold-ulrick-hackers-still-in-action.html
6¡¢KasperskyÐû²¼2022ÄêQ1 DDoS¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
2ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬KasperskyÐû²¼2022ÄêQ1 DDoS¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬2022ÄêµÚÒ»¼¾¶ÈµÄDDoSÃûÌÃÊܵ½¶íÂÞ˹ºÍÎÚ¿ËÀ¼Ö®¼äÒ»Á¬³åÍ»µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£KasperskyÔÚµÚÒ»¼¾¶È×ܹ²¼ì²âµ½ 91052´ÎDDoS¹¥»÷£»£»£»£»£»£»44.34%µÄ¹¥»÷Õë¶ÔÃÀ¹ú£¬£¬£¬£¬£¬£¬Õ¼ËùÓй¥»÷µÄ45.02%¡£¡£¡£¡£¡£¡£¡£¡££»£»£»£»£»£»×î¶àµÄDDoS¹¥»÷(16.35%)±¬·¢ÔÚÖÜÈÕ£»£»£»£»£»£»´ó´ó¶¼¹¥»÷£¨94.95%£©Ò»Á¬²»µ½4Сʱ£¬£¬£¬£¬£¬£¬×µÄ¹¥»÷Ò»Á¬ÁË549Сʱ£»£»£»£»£»£»53.64%µÄ¹¥»÷ÊÇUDPºé·º£»£»£»£»£»£»55.53%µÄC&CЧÀÍÆ÷λÓÚÃÀ¹ú¡£¡£¡£¡£¡£¡£¡£¡£
https://securelist.com/ddos-attacks-in-q1-2022/106358/


¾©¹«Íø°²±¸11010802024551ºÅ