LinuxÄÚºËÎó²îCVE-2023-32233¿ÉÌáÉýÖÁrootȨÏÞ

Ðû²¼Ê±¼ä 2023-05-11

1¡¢LinuxÄÚºËÎó²îCVE-2023-32233¿ÉÌáÉýÖÁrootȨÏÞ


¾ÝýÌå5ÔÂ9ÈÕ±¨µÀ£¬ £¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËLinuxÄں˵ÄNetFilter¿ò¼ÜÖеÄÐÂÎó²î£¨CVE-2023-32233£©¡£¡£¡£ ¡£¸ÃÎó²î¿É±»ÍâµØÓû§ÓÃÓÚ½«È¨ÏÞÌáÉýΪroot£¬ £¬£¬£¬£¬£¬£¬£¬²¢ÍêÈ«¿ØÖÆÏµÍ³¡£¡£¡£ ¡£ÎÊÌâµÄȪԴÔÚÓÚtfilter nf_tablesÊÇÈçÄÇÀïÖÃÅú´¦Öóͷ£ÇëÇóµÄ£¬ £¬£¬£¬£¬£¬£¬£¬¾­ÓÉÉí·ÝÑéÖ¤µÄÍâµØ¹¥»÷Õß¿Éͨ¹ý·¢ËÍÌØÖÆµÄÇëÇóÆÆËðNetfilter nf_tablesµÄÄÚ²¿×´Ì¬£¬ £¬£¬£¬£¬£¬£¬£¬´Ó¶ø»ñµÃ¸ü¸ßȨÏÞ¡£¡£¡£ ¡£¸ÃÎó²îÓ°Ïì¶à¸öLinuxÄں˰汾£¬ £¬£¬£¬£¬£¬£¬£¬°üÀ¨Ä¿½ñµÄÎȹ̰汾v6.3.1¡£¡£¡£ ¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹¿ª·¢ÁËÒ»¸öPoC¡£¡£¡£ ¡£


https://securityaffairs.com/145989/security/linux-netfilter-kernel-flaw.html


2¡¢RuckusÖеÄÎó²îCVE-2023-25717±»AndoryuBotʹÓÃ


¾Ý5ÔÂ9ÈÕ±¨µÀ£¬ £¬£¬£¬£¬£¬£¬£¬Fortinet·¢Ã÷DDoS½©Ê¬ÍøÂçAndoryuBotʹÓÃRuckus Wireless AdminÖÐRCEÎó²î£¨CVE-2023-25717£©µÄ¹¥»÷¼¤Ôö¡£¡£¡£ ¡£¶ñÒâÈí¼þͨ¹ýHTTP GETÇëÇóѬȾװ±¸£¬ £¬£¬£¬£¬£¬£¬£¬È»ºó´ÓÓ²±àÂëURLÏÂÔØÌØÁíÍâ¾ç±¾ÒÔ½øÒ»²½Èö²¥¡£¡£¡£ ¡£±äÌå¿ÉÒÔÕë¶Ô¶àÖÖϵͳ¼Ü¹¹£¬ £¬£¬£¬£¬£¬£¬£¬°üÀ¨x86¡¢arm¡¢spcºÍm68kµÈ¡£¡£¡£ ¡£Ñ¬È¾×°±¸ºó£¬ £¬£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þʹÓÃSOCKSÊðÀíЭÒéÓëC2ЧÀÍÆ÷½¨ÉèͨѶ£¬ £¬£¬£¬£¬£¬£¬£¬ÒÔÒþ²ØºÍÈÆ¹ý·À»ðǽ£¬ £¬£¬£¬£¬£¬£¬£¬È»ºóÆÚ´ýÏÂÁî¡£¡£¡£ ¡£¸ÃÎó²îÓÚ2ÔÂ8ÈÕ±»·¢Ã÷²¢ÐÞ¸´£¬ £¬£¬£¬£¬£¬£¬£¬PoCÒѹûÕæ£¬ £¬£¬£¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì×°Öò¹¶¡¡£¡£¡£ ¡£


https://securityaffairs.com/145980/cyber-crime/andoryubot-ddos-botnet.html


3¡¢CyberArkÐû²¼ÐµÄÀÕË÷Èí¼þ½âÃÜÆ÷White Phoenix


ýÌå5ÔÂ10Èճƣ¬ £¬£¬£¬£¬£¬£¬£¬CyberArkÔÚ¶Ô²¿·Ö¼ÓÃܵÄPDFÎļþ¾ÙÐÐÊÔÑéºó¿ª·¢ÁËеÄÀÕË÷Èí¼þ½âÃÜÆ÷White Phoenix¡£¡£¡£ ¡£Sentinel Labs³Æ£¬ £¬£¬£¬£¬£¬£¬£¬¼äЪÐÔ¼ÓÃÜÔÚÀÕË÷Èí¼þÁìÓòÔ½À´Ô½ÊܽӴý¡£¡£¡£ ¡£CyberArkÔòÌåÏÖÕâÖÖÕ½ÂÔ¸ø¼ÓÃÜ´øÀ´ÁËÈõµã£¬ £¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ²»¼ÓÃܲ¿·ÖԭʼÎļþʹ»Ö¸´Êý¾Ý±äµÃ¿ÉÄÜ¡£¡£¡£ ¡£¸Ã×Ô¶¯Êý¾Ý»Ö¸´¹¤¾ßÊÊÓÃÓÚBlackCat/ALPHV¡¢Play ransomware¡¢Qilin/Agenda¡¢BianLianºÍDarkBit¼ÓÃܵÄÎļþ¡£¡£¡£ ¡£µ«×ÝÈ»ÀíÂÛÉÏÖ§³Ö£¬ £¬£¬£¬£¬£¬£¬£¬White PhoenixÒ²²»»áÔÚËùÓÐÇéÐÎ϶¼±¬·¢ºÃµÄЧ¹û¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/new-ransomware-decryptor-recovers-data-from-partially-encrypted-files/


4¡¢Ê³Î﹫˾SyscoÔâµ½¹¥»÷¿Í»§ºÍÔ±¹¤µÄСÎÒ˽¼ÒÐÅϢй¶


ýÌå5ÔÂ9ÈÕ±¨µÀ£¬ £¬£¬£¬£¬£¬£¬£¬Ê³Îï·ÖÏú¹«Ë¾SyscoÔâµ½¹¥»÷µ¼Ö²¿·ÖÐÅϢй¶¡£¡£¡£ ¡£¹¥»÷»î¶¯Ê¼ÓÚ1ÔÂ14ÈÕ£¬ £¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßδ¾­ÊÚȨ»á¼ûÆäϵͳ²¢ÇÔÈ¡Á˲¿·ÖÊý¾Ý¡£¡£¡£ ¡£¸Ã¹«Ë¾Í¸Â¶£¬ £¬£¬£¬£¬£¬£¬£¬ÆäÃÀ¹úºÍ¼ÓÄôóµÄ¿Í»§ºÍ¹©Ó¦ÉÌÊý¾Ý£¬ £¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÃÀ¹úÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢ÔÚ¸ÃÊÂÎñÖÐÊܵ½Ó°Ïì¡£¡£¡£ ¡£µ«¸ÃÊÂÎñ²¢Î´Ó°ÏìÆäÓªÒµÔËÓª£¬ £¬£¬£¬£¬£¬£¬£¬¿Í»§Ð§ÀÍҲδÖÐÖ¹¡£¡£¡£ ¡£SyscoÌåÏÖ£¬ £¬£¬£¬£¬£¬£¬£¬ÆäÇå¾²ÍŶÓʵÑéÁËÌØÁíÍâ±£» £»£»£» £»¤²½·¥£¬ £¬£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâδÀ´±¬·¢ÀàËÆµÄÎ¥¹æÐÐΪ¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/food-distribution-giant-sysco-warns-of-data-breach-after-cyberattack/


5¡¢BlackBerry·¢Ã÷SideWinder¹¥»÷°Í»ù˹̹Õþ¸®»ú¹¹


5ÔÂ8ÈÕ£¬ £¬£¬£¬£¬£¬£¬£¬BlackBerry³ÆÆä·¢Ã÷ÁËSideWinderÕë¶Ô°Í»ù˹̹Õþ¸®»ú¹¹µÄ¹¥»÷»î¶¯¡£¡£¡£ ¡£» £»£»£» £»î¶¯ÓÚ2022Äê11ÔÂÏÂÑ®×îÏÈ£¬ £¬£¬£¬£¬£¬£¬£¬Ê¹Óðͻù˹̹ˮʦսÕùѧԺ£¨PNWC£©Ïà¹ØµÄÓÕ¶üÎļþ·Ö·¢Ò»¸ö»ùÓÚ.NETµÄÇáÁ¿¼¶ºóÃÅ£¨App.dll£©£¬ £¬£¬£¬£¬£¬£¬£¬Äܹ»´ÓÔ¶³ÌЧÀÍÆ÷¼ìË÷ºÍÖ´ÐÐÏÂÒ»´ú¶ñÒâÈí¼þ¡£¡£¡£ ¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁË»ùÓÚЧÀÍÆ÷µÄ¶à̬ÐÔÊÖÒÕÀ´Èƹý¹Å°åµÄ»ùÓÚÊðÃûµÄAV¼ì²â£¬ £¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýÏìÓ¦Á½¸ö²î±ð°æ±¾µÄÖÐÐÄRTFÎļþÀ´·Ö·¢ÌØÁíÍâpayload¡£¡£¡£ ¡£


https://blogs.blackberry.com/en/2023/05/sidewinder-uses-server-side-polymorphism-to-target-pakistan


6¡¢ESETÐû²¼2022ÄêQ4ÖÁ2023ÄêQ1 APT»î¶¯µÄÆÊÎö±¨¸æ


5ÔÂ9ÈÕ£¬ £¬£¬£¬£¬£¬£¬£¬ESETÐû²¼ÁË2022ÄêQ4ÖÁ2023ÄêQ1 APT»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£±¨¸æÖ¸³ö£¬ £¬£¬£¬£¬£¬£¬£¬²¿·Ö¹¥»÷ÍÅ»ï°ÑÖØµã·ÅÔÚÅ·ÖÞµÄ×éÖ¯ÉÏ£¬ £¬£¬£¬£¬£¬£¬£¬Ke3chang×°ÖÃÁËÒ»¸öеÄKetrican±äÌ壬 £¬£¬£¬£¬£¬£¬£¬Mustang PandaʹÓÃÁËÁ½¸öеĺóÃÅ¡£¡£¡£ ¡£MirrorFaceÕë¶ÔÈÕ±¾£¬ £¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËеĶñÒâÈí¼þ·Ö·¢ÒªÁ죬 £¬£¬£¬£¬£¬£¬£¬¶øOperation ChattyGoblinÔòÈëÇÖÁË·ÆÂɱöµÄÒ»¼Ò²©²Ê¹«Ë¾¡£¡£¡£ ¡£Ó¡¶ÈÏà¹Ø×éÖ¯SideWinderºÍDonot TeamÈÔÈ»Õë¶ÔÄÏÑǵÄÕþ¸®»ú¹¹£¬ £¬£¬£¬£¬£¬£¬£¬Ç°ÕßÕë¶Ô½ÌÓýÐÐÒµ£¬ £¬£¬£¬£¬£¬£¬£¬ºóÕß¼ÌÐø¿ª·¢Æäyty¿ò¼Ü¡£¡£¡£ ¡£ÔÚÄÏÑÇ£¬ £¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁË´ó×ÚµÄZimbraÓʼþ´¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£ ¡£


https://www.welivesecurity.com/2023/05/09/eset-apt-activity-report-q42022-q12023/