΢Èí·¢Ã÷Windows Win32kÌáȨ0dayÒѱ»ÔÚҰʹÓ㻣»£»£»SonicWall¹Ì¼þ¸üÐÂÐÞ¸´SMA-100ÖÐÒѱ»Ê¹ÓõÄ0day

Ðû²¼Ê±¼ä 2021-02-22

1.΢Èí·¢Ã÷Windows Win32kÌáȨ0dayÒѱ»ÔÚҰʹÓÃ


1.jpg


΢Èí·¢Ã÷Windows Win32kÖеÄÌáȨ0day£¨CVE-2021-1732£©Òѱ»ÔÚҰʹÓᣠ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚwin32k.sys½¹µãÄÚºË×é¼þÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý´¥·¢ÊͷźóʹÓÃÎó²î½«ÆäȨÏÞÌáÉýµ½admin¼¶±ð£¬£¬£¬£¬£¬£¬£¬¾ßÓлù±¾Óû§È¨Ï޵Ĺ¥»÷Õß²»ÐèÒªÓëÓû§½»»¥¼´¿ÉʹÓøÃÎó²î¡£ ¡£¡£¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»APT×éÖ¯BitterºÍT-APT-17ʹÓ㬣¬£¬£¬£¬£¬£¬DBAPPSecurityÔò³ÆÆäÓÚ12Ô·¢Ã÷ÁË¿ª·¢ÈÕÆÚΪ2020Äê5ÔµÄÑù±¾¡£ ¡£¡£¡£¡£¡£¡£¡£¶ø×Ô2021Äê2ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÖ»ÔÚÉÙÊýÕë¶ÔÖж«µÄ¹¥»÷ÖÐʹÓÃÁËCVE-2021-1732Îó²î¡£ ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/recently-fixed-windows-zero-day-actively-exploited-since-mid-2020/


2.SonicWall¹Ì¼þ¸üÐÂÐÞ¸´SMA-100ÖÐÒѱ»Ê¹ÓõÄ0day


2.png


SonicWallÐû²¼Á˵ڶþ´Î¹Ì¼þ£¬£¬£¬£¬£¬£¬£¬ÒÔ¸üÐÂÐÞ¸´SMA-100ÖÐÒѱ»Ê¹ÓõÄ0day¡£ ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2021-20016£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö9.8£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂSonicWall SSLVPN SMA100²úÆ·ÖеÄSQLÏÂÁîÎÞЧ£¬£¬£¬£¬£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓÃÆäÔÚSMA100°æ±¾10.xÉϾÙÐÐÆ¾Ö¤»á¼û¡£ ¡£¡£¡£¡£¡£¡£¡£2ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬SonicwallÐû²¼ÁËÕë¶Ô¸ÃÎó²îµÄ²¹¶¡£¬£¬£¬£¬£¬£¬£¬ÓÖÓÚ2ÔÂ19ÈÕÐû²¼¸Ã¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬£¬ÒÔÌṩ×ÔÉϴθüкó·¢Ã÷µÄÆäËû·À»¤²½·¥¡£ ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/114818/security/sonicwall-firmware-updates-sma-100.html


3.Sequoia CapitalÔâµ½´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¿Í»§²ÆÎñÐÅϢй¶


3.png


ºìɼ×ÊÔ´£¨Sequoia Capital£©ÉÏÖÜÎ峯ÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢ºÍ²ÆÎñÐÅϢй¶¡£ ¡£¡£¡£¡£¡£¡£¡£ºìɼ×ÊÔ´Êǹè¹ÈÂÄÀú×ºñ£¬£¬£¬£¬£¬£¬£¬×îÀֳɵÄΣº¦Í¶×ʹ«Ë¾Ö®Ò»£¬£¬£¬£¬£¬£¬£¬ÖÎÀíµÄ×ʲúÁè¼Ý380ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬Í¶×ÊÁËAirbnb¡¢DoorDash¡¢FireEyeºÍ23andMeµÈ×éÖ¯¡£ ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ´Ë´Î¹¥»÷ÊÇ¶ÔÆäÒ»ÃûÔ±¹¤¾ÙÐÐÀֳɵÄÍøÂç´¹ÂÚ¹¥»÷µÄЧ¹û£¬£¬£¬£¬£¬£¬£¬¿Í»§µÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢¿ÉÄÜÒѱ»µÚÈý·½»á¼û£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÔÚ°µÍøÉÐδ·¢Ã÷±»µÁÊý¾ÝµÄÉúÒâÐÅÏ¢¡£ ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/02/sequoia-capital-told-investors-it-was.html


4.À³¿ËºÚµÂ´óѧÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ñ§Ð£Ð§ÀÍϵͳÔÝʱ¹Ø±Õ


4.png


¼ÓÄô󰲼òªʡµÄÀ³¿ËºÚµÂ´óѧ£¨Lakehead University£©³ÆÆäÉÏÖܶþÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚѧУÅÌËã»úϵͳÈÔ´¦ÓÚÍÑ»ú״̬¡£ ¡£¡£¡£¡£¡£¡£¡£¸Ã´óѧָ³ö¹¥»÷ÊÇÕë¶Ô´óѧµÄÎļþ¹²ÏíЧÀÍÆ÷µÄ£¬£¬£¬£¬£¬£¬£¬Æä¼ì²éµ½¹¥»÷ºóÁ¬Ã¦×ö³öÏìÓ¦£¬£¬£¬£¬£¬£¬£¬É¾³ýÁËÖ±½ÓÁ´½Óµ½Îļþ¹²ÏíЧÀÍÆ÷µÄËùÓлá¼û£¬£¬£¬£¬£¬£¬£¬²¢¹Ø±ÕÁËThunder BayºÍOrilliaÐ£ÇøµÄÍøÂç¡£ ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ¸ÃÊÂÎñÈÔÔÚÊÓ²ìÖУ¬£¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÄÄЩЧÀÍÆ÷ºÍÐÅÏ¢Êܵ½ÁËÓ°Ï죬£¬£¬£¬£¬£¬£¬¸ÃѧУÉÐδ͸©СÎÒ˽¼Ò»ò²ÆÎñÐÅÏ¢ÊÇ·ñ±»Ð¹Â¶¡£ ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/02/cyber-attack-computer-systems-of.html


5.ÁãÊÛ¹«Ë¾KrogerÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ô±¹¤ÐÅÏ¢ºÍÒ©·¿¼Í¼й¶


5.png


ÁãÊÛ¹«Ë¾KrogerÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ô±¹¤ÐÅÏ¢ºÍÒ©·¿¼Í¼й¶¡£ ¡£¡£¡£¡£¡£¡£¡£KrogerÊÇÈ«Çò×î´óµÄÁãÊÛÉÌÖ®Ò»£¬£¬£¬£¬£¬£¬£¬ÔÚ35¸öÖÝÓµÓнü2800¼ÒÊÐËÁ£¬£¬£¬£¬£¬£¬£¬2019ÄêµÄÏúÊÛ¶îÁè¼Ý1220ÒÚÃÀÔª¡£ ¡£¡£¡£¡£¡£¡£¡£Kroger³Æ´Ë´Î¹¥»÷ÊÇÓÉÓÚAccellion FTAÈí¼þÖеÄij¸öÇå¾²Îó²îËùµ¼Ö£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓøÃÎó²îÇÔÈ¡Á˹«Ë¾ÁËÈËÁ¦×ÊÔ´Êý¾ÝºÍÒ©·¿¼Í¼¡£ ¡£¡£¡£¡£¡£¡£¡£12ÔÂÖÐÑ®£¬£¬£¬£¬£¬£¬£¬Accelion·¢Ã÷ÆäFTAÇå¾²Îļþ´«ÊäЧÀÍÖб£´æÒѱ»Ê¹ÓõÄ0day¡£ ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/kroger-data-breach-exposes-pharmacy-and-employee-data/


6.F5Ðû²¼2021ÄêÆ¾Ö¤Ìî³ä¹¥»÷µÄÌ¬ÊÆÆÊÎö±¨¸æ


6.png


F5Ðû²¼ÁË2021ÄêÆ¾Ö¤Ìî³ä¹¥»÷µÄÌ¬ÊÆÆÊÎö±¨¸æ¡£ ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÔÚ2016ÄêÖÁ2020Äêʱ´ú£¬£¬£¬£¬£¬£¬£¬Äê¶Èƾ֤×ß©ÊÂÎñµÄÊýÄ¿ÏÕЩ·­ÁËÒ»·¬£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶Æ¾Ö¤µÄÊýĿȴÔÚϽµ£¬£¬£¬£¬£¬£¬£¬´Ó2016ÄêµÄ6300Íò¼Í¼Ï½µµ½2020ÄêµÄ1700Íò¼Í¼£»£»£»£»µ½ÏÖÔÚΪֹ£¬£¬£¬£¬£¬£¬£¬ÃÜÂëµÄ´¿Îı¾´æ´¢ÊÇÔì³Éйƾ֤й¶µÄÖ÷ÒªÔµ¹ÊÔ­ÓÉ£¬£¬£¬£¬£¬£¬£¬¶ø¹ãΪÈËÖªµÄ¹þÏ£Ëã·¨MD5ÈÔÈ»ºÜÊÇÊ¢ÐУ»£»£»£»×éÖ¯ÔÚ¼ì²âºÍ·¢Ã÷ÈëÇÖºÍÊý¾Ýй¶·½ÃæÈÔÈ»ºÜÈõ¡£ ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.f5.com/labs/articles/threat-intelligence/2021-credential-stuffing-report