Proofpoint·¢ÏÖÕë¶Ô·¨¹ú·Ö·¢ºóÃÅSerpentµÄ¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2022-03-24

Proofpoint·¢ÏÖÕë¶Ô·¨¹ú·Ö·¢ºóÃÅSerpentµÄ¹¥»÷»î¶¯


3ÔÂ21ÈÕ £¬ProofpointÅû¶ÁËÕë¶Ô·¨¹ú·Ö·¢ºóÃÅSerpentµÄ¹¥»÷»î¶¯µÄÏêÇé¡£´Ë´Î»î¶¯Ã°³äGDPR»ú¹¹ £¬ÀûÓÃÁËWindowsµÄ¿ªÔ´±£Ö¤ÀíÆ÷Chocolatey £¬Ö¼ÔÚÏò·¨¹úÕþ¸®»ú¹¹¡¢½¨ÖþºÍ·¿µØ²ú¹«Ë¾µÄϵͳÉϰ²×°ÐµĺóÃÅSerpent¡£³ýÁË×Ô½ç˵ºóÃÅSerpentºÍChocolateyÖ®Íâ £¬»¹ÓÐÒ»¸öÓÃschtasks.exe½øÐÐÇ©Ãû¶þ½øÖÆÊðÀíÖ´ÐеÄз¨Ê½£¨±¾ÖÊÉÏÊÇÒ»ÖÖеļì²âÈÆ¹ý¼¼Êõ£©¡£ÕâЩ֤¾Ý±íÃ÷ £¬Õâ¿ÉÄÜÊÇÒ»¸öÐÂ×éÖ¯ £¬¾ßÓи߾«¼âµÄ¼¼ÊõºÍÄÜÁ¦ £¬ÇÒÓëÆäËûµÄÒÑÖªÍÅ»ïûÓÐÁªÏµ¡£ 


https://www.proofpoint.com/us/blog/threat-insight/serpent-no-swiping-new-backdoor-targets-french-entities-unique-attack-chain


ľÂíFaceStealerÒÑѬȾÁè¼Ý10Íò¸öAndroidÉ豸


Äþ¾²¹«Ë¾PradeoÔÚ3ÔÂ21ÈÕ³Æ £¬Ä¾ÂíFaceStealerÒÑͨ¹ýGoogle PlayÉ̵갲װÁËÁè¼Ý100000´Î¡£¸Ã¶ñÒâÈí¼þαװ³ÉÒ»¸öÃûΪ¡°Craftsart Cartoon Photo Tools¡±µÄ¿¨Í¨»¯Ó¦Ó÷¨Ê½ £¬Ö¼ÔÚÇÔÈ¡Óû§µÄFacebookƾ¾Ý¡£Ñо¿ÈËÔ±ÌåÏÖ £¬µ±Óû§ÊäÈëÆ¾¾Ýʱ £¬¸ÃÓ¦ÓûὫÆä·¢Ë͵½Î»ÓÚzutuu[.]infoµÄC2 £¬²¢Ïòwww.dozenorms[.]club·¢ËͽøÒ»²½µÄÊý¾Ý¡£Ä¿Ç° £¬GoogleÒѽ«¸ÃÓ¦ÓÃÒÆ³ý¡£


https://blog.pradeo.com/spyware-facestealer-google-play


0patchÐû²¼ÌáȨ©¶´CVE-2021-34484µÄ·Ç¹Ù·½²¹¶¡


¾ÝýÌå3ÔÂ21ÈÕ±¨µÀ £¬0patchÐû²¼ÁËWindowsÌáȨ©¶´CVE-2021-34484µÄ·Ç¹Ù·½²¹¶¡¡£¸Ã©¶´×îÔçÓÉAbdelhamid Naceri·¢ÏÖ £¬²¢ÓÚ2021Äê8ÔÂͨ¹ý΢ÈíµÄÖܶþ²¹¶¡ÐÞ¸´¡£Naceri·¢Ïָò¹¶¡¿É±»Èƹý £¬Ö®ºó0patchÐû²¼Á˷ǹٷ½²¹¶¡¡£Î¢ÈíÓÖÓÚ2022Äê1ÔÂÐû²¼Á˵ڶþ¸ö¸üР£¬²¢ÎªÆä·ÖÅäÁËеÄCVE-2022-21919¡£µ«¸Ã²¹¶¡ÈԿɱ»Èƹý £¬ÇÒ΢ÈíµÄµÚ¶þ´Î¸üÐÂÌæ»»ÁË¡°profext.dll¡±Îļþ £¬µ¼ÖÂ0patchµÄ·Ç¹Ù·½²¹¶¡¾ù±»É¾³ý¡£ÏÖÔÚ £¬0patchÓÖ½«¸ÃÐÞ¸´·¨Ê½ÒÆÖ²µ½2022Äê3ÔµÄÖܶþ²¹¶¡ÖÐ £¬¹©ËùÓÐÓû§Ãâ·ÑʹÓá£


https://www.bleepingcomputer.com/news/microsoft/windows-zero-day-flaw-giving-admin-rights-gets-unofficial-patch-again/


HPÐû²¼¸üР£¬ÐÞ¸´Ó°ÏìÆäÊý°Ù¿î´òÓ¡»úµÄ¶à¸ö©¶´


3ÔÂ21ÈÕ £¬HPÒÑÕë¶ÔÓ°ÏìÆäÊý°Ù¿îLaserJet Pro¡¢Pagewide Pro¡¢OfficeJet¡¢Enterprise¡¢Large FormatºÍDeskJet´òÓ¡»úÐͺŵĶà¸ö©¶´Ðû²¼ÁËÁ½·ÝÄþ¾²Í¨¸æ¡£µÚÒ»·Ýͨ¸æ°üÂÞÁ˿ɵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеĻº³åÇøÒç³ö©¶´£¨CVE-2022-3942£© £¬HPÒÑΪ´ó¶àÊýÊÜÓ°Ïì²úÎïÐû²¼¹Ì¼þ¸üР£¬²¢¶ÔûÓв¹¶¡µÄÉ豸ÌṩÁË»º½âÒªÁì £»µÚ¶þ·ÝÄþ¾²Í¨¸æ°üÂÞCVE-2022-24291¡¢CVE-2022-24292ºÍCVE-2022-24293 £¬ËüÃǿɱ»ÓÃÓÚÐÅϢй¶¡¢Ô¶³Ì´úÂëÖ´Ðк;ܾø·þÎñ¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/hundreds-of-hp-printer-models-vulnerable-to-remote-code-execution/


ÃÀ¹úÑÀ¿ÆÒ½ÔºJDCѬȾ¶ñÒâÈí¼þÉϰÙÍò»¼ÕßµÄÐÅϢй¶


ýÌå3ÔÂ21ÈÕ±¨µÀ £¬JDC Healthcare Management LLC(JDC)й¶ÁËÁè¼Ý100ÍòµÂ¿ËÈøË¹¹«ÃñµÄÐÅÏ¢¡£JDC×ܲ¿Î»ÓÚ´ïÀ­Ë¹ £¬ÊÇ´óÐÍÑÀ¿Æ±£½¡ÌṩÉÌ¡£¸Ã¹«Ë¾ÌåÏÖ £¬ËûÃÇÔÚ2021Äê8ÔÂ9ÈÕ×óÓÒ·¢ÏÖÆä²¿ÃÅϵͳѬȾÀ´Á˶ñÒâÈí¼þ £¬¾­¹ýÊÓ²ìÈ·¶¨ÔÚ2021Äê7ÔÂ27ÈÕÖÁ8ÔÂ16ÈÕ £¬´æ´¢ÔÚJDCµÄ²¿ÃÅÎļþÒѱ»·ÃÎÊ»òÏÂÔØ¡£´Ë´Îй¶µÄÐÅÏ¢Éæ¼°Éç»áÄþ¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂëºÍ²ÆÕþÐÅÏ¢µÈ¡£ 


https://www.infosecurity-magazine.com/news/dental-care-data-breach-may-impact/


Ñо¿ÈËÔ±ÑÝʾÈçºÎÀûÓÃÐµĹ¥»÷·½Ê½BitB½øÐеöÓã


¾Ý3ÔÂ21ÈÕ±¨µÀ £¬Ñо¿ÈËÔ±·¢ÏÖÁËÐµĹ¥»÷·½Ê½Browser-in-the Browser (BITB)¡£ÕâÖÖÒªÁìÀûÓÃÁËǶÈëÔÚÍøÕ¾ÉϵĵÚÈý·½µ¥µãµÇ¼(SSO)Ñ¡Ïî £¬È硰ʹÓùȸèµÇ¼¡±(»òFacebook¡¢AppleºÍMicrosoft)¡£ËäÈ»µ±Óû§ÊµÑéͨ¹ýÕâЩҪÁìµÇ¼ʱ £¬Ä¬ÈÏÊÇͨ¹ýµ¯³ö´°¿ÚÍê³ÉÉí·ÝÑéÖ¤ £¬µ«BitB¹¥»÷Ö¼ÔÚʹÓÃHTMLºÍCSS´úÂëµÄÀ´¸´ÖÆÕû¸ö¹ý³Ì £¬ÒÔ´´½¨Ò»¸öÍêÈ«Ðé¹¹µÄä¯ÀÀÆ÷´°¿Ú¡£Õâ¿ÉÓÃÀ´½øÐÐÁîÈËÐÅ·þµÄµöÓã¹¥»÷ £¬ÇÒ¼¸ºõÎÞ·¨±»¼ì²âµ½¡£


https://thehackernews.com/2022/03/new-browser-in-browser-bitb-attack.html



Äþ¾²¹¤¾ß


Adversary3


Adversary3 ÊÇÒ»ÖÖµ¼º½ÅÓ´óµÄ www.malvuln.com ¶ñÒâÈí¼þ©¶´Êý¾Ý¼¯µÄ¹¤¾ß¡£


https://packetstormsecurity.com/files/166384/Adversary3-main.zip


Nuclei


Ò»¸öNuclei Ä£°åÉú³ÉÆ÷ BurpSuite ²å¼þ¡£


https://github.com/projectdiscovery/nuclei-burp-plugin


C0deVari4nt


ÊÇÒ»ÖÖ±äÌå·ÖÎöºÍ¿ÉÊÓ»¯¹¤¾ß £¬¿É¼ì²é´úÂë¿âÖеÄÀàËÆÂ©¶´¡£


https://github.com/whitesquirrell/C0deVari4nt


uncover


ʹÓöà¸öËÑË÷ÒýÇæ¿ìËÙ·¢ÏÖ»¥ÁªÍøÉÏ̻¶µÄÖ÷»ú¡£


https://github.com/projectdiscovery/uncover




Äþ¾²·ÖÎö


Sandworm: Ò»¸öµß¸²ÐԵĹÊÊÂÖØÊö


https://www.welivesecurity.com/2022/03/21/sandworm-tale-disruption-told-anew/


ÈýÐÇ Galaxy S22 Ultra ÏÖÔÚ·ºÆð GPS ´íÎó


https://news.softpedia.com/news/samsung-galaxy-s22-ultra-now-hitting-gps-errors-because-why-not-535080.shtml


Òâ´óÀûÊý¾ÝÒþ˽¼à¹Ü»ú¹¹¶Ô¿¨°Í˹»ùÏà¹ØµÄDZÔÚ·çÏÕÕ¹¿ªÊÓ²ì


https://securityaffairs.co/wordpress/129304/digital-id/italys-data-privacy-watchdog-investigats-kaspersky.html


ÎÚ¿ËÀ¼Ðû²¼InvisiMoleÓã²æÊ½µöÓã¹¥»÷µÄ¾¯±¨


https://securityaffairs.co/wordpress/129337/apt/invisimole-targets-ukraine-government.html