΢Èí·¢Ã÷Windows Win32kÌáȨ0dayÒѱ»ÔÚҰʹÓ㻣»£»£»SonicWall¹Ì¼þ¸üÐÂÐÞ¸´SMA-100ÖÐÒѱ»Ê¹ÓõÄ0day
Ðû²¼Ê±¼ä 2021-02-221.΢Èí·¢Ã÷Windows Win32kÌáȨ0dayÒѱ»ÔÚҰʹÓÃ

΢Èí·¢Ã÷Windows Win32kÖеÄÌáȨ0day£¨CVE-2021-1732£©Òѱ»ÔÚҰʹÓᣡ£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚwin32k.sys½¹µãÄÚºË×é¼þÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý´¥·¢ÊͷźóʹÓÃÎó²î½«ÆäȨÏÞÌáÉýµ½admin¼¶±ð£¬£¬£¬£¬£¬£¬£¬¾ßÓлù±¾Óû§È¨Ï޵Ĺ¥»÷Õß²»ÐèÒªÓëÓû§½»»¥¼´¿ÉʹÓøÃÎó²î¡£¡£¡£¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»APT×éÖ¯BitterºÍT-APT-17ʹÓ㬣¬£¬£¬£¬£¬£¬DBAPPSecurityÔò³ÆÆäÓÚ12Ô·¢Ã÷ÁË¿ª·¢ÈÕÆÚΪ2020Äê5ÔµÄÑù±¾¡£¡£¡£¡£¡£¡£¡£¡£¶ø×Ô2021Äê2ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÖ»ÔÚÉÙÊýÕë¶ÔÖж«µÄ¹¥»÷ÖÐʹÓÃÁËCVE-2021-1732Îó²î¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/recently-fixed-windows-zero-day-actively-exploited-since-mid-2020/
2.SonicWall¹Ì¼þ¸üÐÂÐÞ¸´SMA-100ÖÐÒѱ»Ê¹ÓõÄ0day

SonicWallÐû²¼Á˵ڶþ´Î¹Ì¼þ£¬£¬£¬£¬£¬£¬£¬ÒÔ¸üÐÂÐÞ¸´SMA-100ÖÐÒѱ»Ê¹ÓõÄ0day¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2021-20016£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö9.8£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂSonicWall SSLVPN SMA100²úÆ·ÖеÄSQLÏÂÁîÎÞЧ£¬£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓÃÆäÔÚSMA100°æ±¾10.xÉϾÙÐÐÆ¾Ö¤»á¼û¡£¡£¡£¡£¡£¡£¡£¡£2ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬SonicwallÐû²¼ÁËÕë¶Ô¸ÃÎó²îµÄ²¹¶¡£¬£¬£¬£¬£¬£¬£¬ÓÖÓÚ2ÔÂ19ÈÕÐû²¼¸Ã¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬£¬ÒÔÌṩ×ÔÉϴθüкó·¢Ã÷µÄÆäËû·À»¤²½·¥¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/114818/security/sonicwall-firmware-updates-sma-100.html
3.Sequoia CapitalÔâµ½´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¿Í»§²ÆÎñÐÅϢй¶

ºìɼ×ÊÔ´£¨Sequoia Capital£©ÉÏÖÜÎ峯ÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢ºÍ²ÆÎñÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£¡£ºìɼ×ÊÔ´Êǹè¹ÈÂÄÀú×ºñ£¬£¬£¬£¬£¬£¬£¬×îÀֳɵÄΣº¦Í¶×ʹ«Ë¾Ö®Ò»£¬£¬£¬£¬£¬£¬£¬ÖÎÀíµÄ×ʲúÁè¼Ý380ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬Í¶×ÊÁËAirbnb¡¢DoorDash¡¢FireEyeºÍ23andMeµÈ×éÖ¯¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ´Ë´Î¹¥»÷ÊÇ¶ÔÆäÒ»ÃûÔ±¹¤¾ÙÐÐÀֳɵÄÍøÂç´¹ÂÚ¹¥»÷µÄЧ¹û£¬£¬£¬£¬£¬£¬£¬¿Í»§µÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢¿ÉÄÜÒѱ»µÚÈý·½»á¼û£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÔÚ°µÍøÉÐδ·¢Ã÷±»µÁÊý¾ÝµÄÉúÒâÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2021/02/sequoia-capital-told-investors-it-was.html
4.À³¿ËºÚµÂ´óѧÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ñ§Ð£Ð§ÀÍϵͳÔÝʱ¹Ø±Õ

¼ÓÄô󰲼òªʡµÄÀ³¿ËºÚµÂ´óѧ£¨Lakehead University£©³ÆÆäÉÏÖܶþÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚѧУÅÌËã»úϵͳÈÔ´¦ÓÚÍÑ»ú״̬¡£¡£¡£¡£¡£¡£¡£¡£¸Ã´óѧָ³ö¹¥»÷ÊÇÕë¶Ô´óѧµÄÎļþ¹²ÏíЧÀÍÆ÷µÄ£¬£¬£¬£¬£¬£¬£¬Æä¼ì²éµ½¹¥»÷ºóÁ¬Ã¦×ö³öÏìÓ¦£¬£¬£¬£¬£¬£¬£¬É¾³ýÁËÖ±½ÓÁ´½Óµ½Îļþ¹²ÏíЧÀÍÆ÷µÄËùÓлá¼û£¬£¬£¬£¬£¬£¬£¬²¢¹Ø±ÕÁËThunder BayºÍOrilliaÐ£ÇøµÄÍøÂç¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ¸ÃÊÂÎñÈÔÔÚÊÓ²ìÖУ¬£¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÄÄЩЧÀÍÆ÷ºÍÐÅÏ¢Êܵ½ÁËÓ°Ï죬£¬£¬£¬£¬£¬£¬¸ÃѧУÉÐδ͸©СÎÒ˽¼Ò»ò²ÆÎñÐÅÏ¢ÊÇ·ñ±»Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2021/02/cyber-attack-computer-systems-of.html
5.ÁãÊÛ¹«Ë¾KrogerÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ô±¹¤ÐÅÏ¢ºÍÒ©·¿¼Í¼й¶

ÁãÊÛ¹«Ë¾KrogerÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ô±¹¤ÐÅÏ¢ºÍÒ©·¿¼Í¼й¶¡£¡£¡£¡£¡£¡£¡£¡£KrogerÊÇÈ«Çò×î´óµÄÁãÊÛÉÌÖ®Ò»£¬£¬£¬£¬£¬£¬£¬ÔÚ35¸öÖÝÓµÓнü2800¼ÒÊÐËÁ£¬£¬£¬£¬£¬£¬£¬2019ÄêµÄÏúÊÛ¶îÁè¼Ý1220ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£¡£¡£Kroger³Æ´Ë´Î¹¥»÷ÊÇÓÉÓÚAccellion FTAÈí¼þÖеÄij¸öÇå¾²Îó²îËùµ¼Ö£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓøÃÎó²îÇÔÈ¡Á˹«Ë¾ÁËÈËÁ¦×ÊÔ´Êý¾ÝºÍÒ©·¿¼Í¼¡£¡£¡£¡£¡£¡£¡£¡£12ÔÂÖÐÑ®£¬£¬£¬£¬£¬£¬£¬Accelion·¢Ã÷ÆäFTAÇå¾²Îļþ´«ÊäЧÀÍÖб£´æÒѱ»Ê¹ÓõÄ0day¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/kroger-data-breach-exposes-pharmacy-and-employee-data/
6.F5Ðû²¼2021ÄêÆ¾Ö¤Ìî³ä¹¥»÷µÄÌ¬ÊÆÆÊÎö±¨¸æ

F5Ðû²¼ÁË2021ÄêÆ¾Ö¤Ìî³ä¹¥»÷µÄÌ¬ÊÆÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÔÚ2016ÄêÖÁ2020Äêʱ´ú£¬£¬£¬£¬£¬£¬£¬Äê¶Èƾ֤×ß©ÊÂÎñµÄÊýÄ¿ÏÕЩ·ÁËÒ»·¬£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶Æ¾Ö¤µÄÊýĿȴÔÚϽµ£¬£¬£¬£¬£¬£¬£¬´Ó2016ÄêµÄ6300Íò¼Í¼Ï½µµ½2020ÄêµÄ1700Íò¼Í¼£»£»£»£»µ½ÏÖÔÚΪֹ£¬£¬£¬£¬£¬£¬£¬ÃÜÂëµÄ´¿Îı¾´æ´¢ÊÇÔì³Éйƾ֤й¶µÄÖ÷ÒªÔµ¹ÊÔÓÉ£¬£¬£¬£¬£¬£¬£¬¶ø¹ãΪÈËÖªµÄ¹þÏ£Ëã·¨MD5ÈÔÈ»ºÜÊÇÊ¢ÐУ»£»£»£»×éÖ¯ÔÚ¼ì²âºÍ·¢Ã÷ÈëÇÖºÍÊý¾Ýй¶·½ÃæÈÔÈ»ºÜÈõ¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.f5.com/labs/articles/threat-intelligence/2021-credential-stuffing-report


¾©¹«Íø°²±¸11010802024551ºÅ