12ÔÂWindows Server¸üе¼ÖÂHyper-VÐéÄâ»ú´´½¨·ºÆðBug
Ðû²¼Ê±¼ä 2022-12-16
¾Ý12ÔÂ14ÈÕ±¨µÀ£¬Î¢ÈíÌåÏÖ£¬12Ô·ݵÄWindows Server¸üлᵼÖÂÔÚ²¿ÃÅHyper-VÖ÷»úÉÏ´´½¨ÐÂÐéÄâ»úʱ´¥·¢´íÎó¡£Õâ¸öÎÊÌâÖ»Ó°Ï쵽ʹÓÃϵͳÖÐÐÄÐéÄâ»ú¹ÜÀíÆ÷£¨SCVMM£©¹ÜÀíµÄSDN»·¾³ÖеÄWindows Server/AzStack HCIÖ÷»ú¡£Î¢ÈíΪÊÜÓ°ÏìÓû§ÌṩÁË»º½â´ëÊ©£¬ÔÚPowerShell´°¿ÚÔËÐÐÒ»×éÃüÁ»òʹÓÃרÓýÅÔÀ´ÅúÁ¿²¿Êð½â¾öÒªÁ졣Ŀǰ£¬¸Ã¹«Ë¾ÕýÔÚÐÞ¸´ÎÊÌ⣬²¢½«ÔÚδÀ´µÄ°æ±¾ÖÐÌṩ¸üС£
https://www.bleepingcomputer.com/news/microsoft/microsoft-december-windows-server-updates-break-hyper-v-vm-creation/
2¡¢ÊÀ½ç±°ë¾öÈüÆÚ¼äFuboTV±»¹¥»÷Óû§ÎÞ·¨·ÃÎÊÁ÷ýÌå·þÎñ
ýÌå12ÔÂ15Èճƣ¬±¾ÖÜÈýµ±FuboTVÓû§×¼±¸Ô¢Ä¿ÊÀ½ç±·¨¹úÓëĦÂå¸çÖ®¼äµÄ°ë¾öÈüʱ£¬·¢ÏÖËûÃÇÎÞ·¨µÇ¼Á÷ýÌå·þÎñ¡£ËûÃÇÔÚʵÑéµÇ¼ʱÊÕµ½CB_ERR_OPEN´íÎóÌáʾ£¬ÏÔʾ¡°ff: downstream not available¡±¡£FuboTVºÜ¿ì·¢ÎijÆËûÃÇÕýÔÚ½â¾öÕâ¸öÎÊÌ⣬²¢½¨ÒéÓû§Í¨¹ýFOXԢĿ½ÇÖð¡£15ÈÕ£¬FuboTVÈ·ÈÏÖжÏÊÇÓÉÓÚÍøÂç¹¥»÷µ¼Öµģ¬ËûÃÇĿǰÕýÔÚÊÓ²ìºÍÓ¦¶ÔÕâһʼþ¡£FuboTV δ͸¶¹¥»÷ϸ½Ú£¬µ«ÌåÏÖ´ø¿í²»×㲢δµ¼ÖÂÖжϣ¬±íÃ÷Õâ²»ÊÇDDoS¹¥»÷£¬¹¥»÷ºÜ¿ÉÄÜÊǶÔËûÃǵÄÍøÂç»ò·þÎñÆ÷µÄÆÆ»µ¡£
https://www.bleepingcomputer.com/news/security/fubotv-says-world-cup-streaming-outage-caused-by-a-cyberattack/
3¡¢ESETÅû¶MirrorFaceÕë¶ÔÈÕ±¾Õþ¸®»ú¹¹µÄµöÓã¹¥»÷ÏêÇé
ESETÓÚ12ÔÂ14ÈÕÅû¶ÁËMirrorFaceÕë¶ÔÈÕ±¾Õþ¸®»ú¹¹µÄµöÓã¹¥»÷»î¶¯Operation LiberalFace¡£´Ë´Î»î¶¯¿ªÊ¼ÓÚ2022Äê6Ôµף¬Î±×°³ÉÀ´×ÔÌØ¶¨ÈÕ±¾Õþµ³¹«¹Ø²¿ÃŵĹٷ½Í¨Ñ¶£¬¶Ø´ÙÊÕ¼þÈËÔÚ×Ô¼ºµÄÉ罻ýÌå×ÊÁÏÖзÖÏí¸½¼þÖеÄÊÓÆµ¡£¸½¼þÊÇÒ»¸ö×Ô½âѹµÄWinRARѹËõ°ü£¬´ò¿ª¾Í»á¿ªÊ¼Ñ¬È¾LODEINFO¡£¹¥»÷Õß»¹Ê¹ÓÃÁËÒ»¸öÐÂµÄÆ¾Ö¤ÇÔÈ¡·¨Ê½MirrorStealer£¬Ëü¿É´Ó¶à¸öÓ¦ÓÃÖÐÇÔȡƾ֤£¬°üÂÞä¯ÀÀÆ÷ºÍµç×ÓÓʼþ¿Í»§¶Ë¡£
https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities/
4¡¢ºÚ¿ÍÔÚ¶à¸ö¿ªÔ´´æ´¢¿âÉÏ´«Áè¼Ý14Íò¸ö°üÂÞµöÓãÁ´½ÓµÄ°ü
¾ÝýÌå12ÔÂ14ÈÕ±¨µÀ£¬Ñо¿ÈËÔ±·¢ÏÖͬһ¸ö¹¥»÷ÕßÏòNuGet¡¢NPMºÍPyPiÉÏ´«ÁË144294¸ö°ü¡£ÊÓ²ì½ÒʾÁËÒ»ÖÖÐµĹ¥»÷ý½é£¬¹¥»÷ÕßʹÓðüÂÞµöÓã¹¥»÷Á´½ÓµÄÈí¼þ°üÏò¿ªÔ´Éú̬ϵͳ·¢ËÍÀ¬»øÓʼþ¡£Ñо¿ÈËÔ±ÌåÏÖ£¬ËùÓаüºÍÏà¹ØÓû§ÕÊ»§ºÜ¿ÉÄÜÊÇʹÓÃ×Ô¶¯»¯´´½¨µÄ£¬ÕâЩ°üʹÓÃÁËÏàËÆµÄÏîÄ¿ÃèÊöºÍ×Ô¶¯Éú³ÉµÄÃû³Æ¡£¸ÃµöÓã»î¶¯Á´½Óµ½90¸öÓòÉϵÄ65000¶à¸öΨһURL£¬Ã¿¸öÓòÔÚ²îÒì·¾¶Ï´´½¨Á˶à¸öµöÓãÍøÒ³¡£
https://checkmarx.com/blog/how-140k-nuget-npm-and-pypi-packages-were-used-to-spread-phishing-links/
5¡¢Cisco½üÆÚ·¢ÏÖʹÓÃÐÂÐÍHTML×ß˽¼¼Êõ·Ö·¢QBotµÄ»î¶¯
Cisco TalosÔÚ12ÔÂ13ÈÕ³ÆÆä·¢ÏÖÁËʹÓÿÉËõ·ÅʸÁ¿Í¼ÐÎ(SVG)ͼÏñµÄÐÂHTML×ß˽¼¼Êõ¡£ÕâÖÖ¹¥»÷ÊÇͨ¹ýº¬ÓÐJavaScriptµÄǶÈëʽSVGÎļþ½øÐеģ¬ÕâЩÎļþÖØÐÂ×éºÏ³ÉÒ»¸öBase64±àÂëµÄQBot¶ñÒâÈí¼þ°²×°·¨Ê½£¬Í¨¹ýÄ¿±êµÄä¯ÀÀÆ÷×Ô¶¯ÏÂÔØ¡£ÓÉÓÚ¶ñÒâÈí¼þpayloadÊÇÖ±½ÓÔÚÄ¿±êÖй¹½¨µÄ£¬¶ø²»ÊÇͨ¹ýÍøÂç´«ÊäµÄ£¬Òò´ËÕâÖÖHTML×ß˽¼¼Êõ¿ÉÒÔÈÆ¹ýÖ¼ÔÚ¹ýÂË´«ÊäÖеĶñÒâÄÚÈݵÄÄþ¾²¼ì²â¡£ÎªµÖÓùHTML×ß˽¹¥»÷£¬¿É×èÖ¹¶ÔÏÂÔØÄÚÈÝÖ´ÐÐJavaScript»òVBScript¡£
https://blog.talosintelligence.com/html-smugglers-turn-to-svg-images/
6¡¢CybereasonÐû²¼¹ØÓÚÀÕË÷Èí¼þRoyalµÄ¼¼Êõ·ÖÎö³ÂËß
12ÔÂ14ÈÕ£¬CybereasonÐû²¼Á˹ØÓÚÀÕË÷Èí¼þRoyalµÄ¼¼Êõ·ÖÎö³ÂËß¡£RoyalÓÚ2022Äê³õ·ºÆð£¬²¢×ÔÄêÖÐÒÔÀ´ÊÆÍ·Ç¿¾¢¡£¸Ã³ÂËßÖ¸³ö£¬RoyalÀ©Õ¹Á˲¿ÃżÓÃܵĿ´·¨£¬ÕâÒâζ×ÅËü¿ÉÒÔ¼ÓÃÜÔ¤ÏÈÈ·¶¨µÄ²¿ÃÅÎļþÄÚÈÝ£¬²¢»ùÓÚÁé»îµÄ°Ù·Ö±È½«Æä²¿ÃżÓÃÜ£¬Ìá¸ßÁË·´ÀÕË÷Èí¼þ½â¾ö·½°¸µÄ¼ì²âÄѶȣ»Ê¹Óöà¸öÏß³ÌÀ´¼ÓËÙ¼ÓÃܹý³Ì£»ÔÚÈ«Çò·¶Î§ÄÚ»îÔ¾£¬Ã»ÓÐʹÓÃRaaS£¬Ò²Ã»ÓÐÕë¶ÔÌØ¶¨ÐÐÒµ»òµØÓò£»Æä×î³õÒÔ²îÒìµÄ·½Ê½Æô¶¯ºÍ°²×°¡£
https://www.cybereason.com/blog/royal-ransomware-analysis