12ÔÂWindows Server¸üе¼ÖÂHyper-VÐéÄâ»ú½¨Éè·ºÆðBug

Ðû²¼Ê±¼ä 2022-12-16
1¡¢12ÔÂWindows Server¸üе¼ÖÂHyper-VÐéÄâ»ú½¨Éè·ºÆðBug

      

¾Ý12ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬12Ô·ݵÄWindows Server¸üлᵼÖÂÔÚ²¿·ÖHyper-VÖ÷»úÉϽ¨ÉèÐÂÐéÄâ»úʱ´¥·¢¹ýʧ¡£¡£¡£¡£ ¡£Õâ¸öÎÊÌâÖ»Ó°Ï쵽ʹÓÃϵͳÖÐÐÄÐéÄâ»úÖÎÀíÆ÷£¨SCVMM£©ÖÎÀíµÄSDNÇéÐÎÖеÄWindows Server/AzStack HCIÖ÷»ú¡£¡£¡£¡£ ¡£Î¢ÈíΪÊÜÓ°ÏìÓû§ÌṩÁË»º½â²½·¥£¬£¬£¬£¬£¬£¬ÔÚPowerShell´°¿ÚÔËÐÐÒ»×éÏÂÁ£¬£¬£¬£¬£¬»òʹÓÃרÓýÅÔ­À´ÅúÁ¿°²ÅŽâ¾öÒªÁì¡£¡£¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÕýÔÚÐÞ¸´ÎÊÌ⣬£¬£¬£¬£¬£¬²¢½«ÔÚδÀ´µÄ°æ±¾ÖÐÌṩ¸üС£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-december-windows-server-updates-break-hyper-v-vm-creation/


2¡¢Ììϱ­°ë¾öÈüʱ´úFuboTV±»¹¥»÷Óû§ÎÞ·¨»á¼ûÁ÷ýÌåЧÀÍ

      

ýÌå12ÔÂ15Èճƣ¬£¬£¬£¬£¬£¬±¾ÖÜÈýµ±FuboTVÓû§×¼±¸Ô¢Ä¿Ììϱ­·¨¹úÓëĦÂå¸çÖ®¼äµÄ°ë¾öÈüʱ£¬£¬£¬£¬£¬£¬·¢Ã÷ËûÃÇÎÞ·¨µÇ¼Á÷ýÌåЧÀÍ¡£¡£¡£¡£ ¡£ËûÃÇÔÚʵÑéµÇ¼ʱÊÕµ½CB_ERR_OPEN¹ýʧÌáÐÑ£¬£¬£¬£¬£¬£¬ÏÔʾ¡°ff: downstream not available¡±¡£¡£¡£¡£ ¡£FuboTVºÜ¿ì·¢ÎijÆËûÃÇÕýÔÚ½â¾öÕâ¸öÎÊÌ⣬£¬£¬£¬£¬£¬²¢½¨ÒéÓû§Í¨¹ýFOXԢĿ½ÇÖ𡣡£¡£¡£ ¡£15ÈÕ£¬£¬£¬£¬£¬£¬FuboTVÈ·ÈÏÖÐÖ¹ÊÇÓÉÓÚÍøÂç¹¥»÷µ¼Öµģ¬£¬£¬£¬£¬£¬ËûÃÇÏÖÔÚÕýÔÚÊÓ²ìºÍÓ¦¶ÔÕâÒ»ÊÂÎñ¡£¡£¡£¡£ ¡£FuboTV δ͸¶¹¥»÷ϸ½Ú£¬£¬£¬£¬£¬£¬µ«ÌåÏÖ´ø¿íȱ·¦²¢Î´µ¼ÖÂÖÐÖ¹£¬£¬£¬£¬£¬£¬Åú×¢Õâ²»ÊÇDDoS¹¥»÷£¬£¬£¬£¬£¬£¬¹¥»÷ºÜ¿ÉÄÜÊǶÔËûÃǵÄÍøÂç»òЧÀÍÆ÷µÄÆÆË𡣡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/fubotv-says-world-cup-streaming-outage-caused-by-a-cyberattack/


3¡¢ESETÅû¶MirrorFaceÕë¶ÔÈÕ±¾Õþ¸®»ú¹¹µÄ´¹ÂÚ¹¥»÷ÏêÇé

     

 ESETÓÚ12ÔÂ14ÈÕÅû¶ÁËMirrorFaceÕë¶ÔÈÕ±¾Õþ¸®»ú¹¹µÄ´¹ÂÚ¹¥»÷»î¶¯Operation LiberalFace¡£¡£¡£¡£ ¡£´Ë´Î»î¶¯×îÏÈÓÚ2022Äê6ÔÂ⣬£¬£¬£¬£¬£¬Î±×°³ÉÀ´×ÔÌØ¶¨ÈÕ±¾Õþµ³¹«¹Ø²¿·ÖµÄ¹Ù·½Í¨Ñ¶£¬£¬£¬£¬£¬£¬±Þ²ßÊÕ¼þÈËÔÚ×Ô¼ºµÄÉ罻ýÌå×ÊÁÏÖзÖÏí¸½¼þÖеÄÊÓÆµ¡£¡£¡£¡£ ¡£¸½¼þÊÇÒ»¸ö×Ô½âѹµÄWinRARѹËõ°ü£¬£¬£¬£¬£¬£¬·­¿ª¾Í»á×îÏÈѬȾLODEINFO¡£¡£¡£¡£ ¡£¹¥»÷Õß»¹Ê¹ÓÃÁËÒ»¸öÐÂµÄÆ¾Ö¤ÇÔÈ¡³ÌÐòMirrorStealer£¬£¬£¬£¬£¬£¬Ëü¿É´Ó¶à¸öÓ¦ÓÃÖÐÇÔȡƾ֤£¬£¬£¬£¬£¬£¬°üÀ¨ä¯ÀÀÆ÷ºÍµç×ÓÓʼþ¿Í»§¶Ë¡£¡£¡£¡£ ¡£


https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities/


4¡¢ºÚ¿ÍÔÚ¶à¸ö¿ªÔ´´æ´¢¿âÉÏ´«Áè¼Ý14Íò¸ö°üÀ¨´¹ÂÚÁ´½ÓµÄ°ü

      

¾ÝýÌå12ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ͳһ¸ö¹¥»÷ÕßÏòNuGet¡¢NPMºÍPyPiÉÏ´«ÁË144294¸ö°ü¡£¡£¡£¡£ ¡£ÊÓ²ìÕ¹ÏÖÁËÒ»ÖÖÐµĹ¥»÷ǰÑÔ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓðüÀ¨´¹ÂÚ¹¥»÷Á´½ÓµÄÈí¼þ°üÏò¿ªÔ´Éú̬ϵͳ·¢ËÍÀ¬»øÓʼþ¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬ËùÓаüºÍÏà¹ØÓû§ÕÊ»§ºÜ¿ÉÄÜÊÇʹÓÃ×Ô¶¯»¯½¨ÉèµÄ£¬£¬£¬£¬£¬£¬ÕâЩ°üʹÓÃÁËÏàËÆµÄÏîÄ¿ÐÎòºÍ×Ô¶¯ÌìÉúµÄÃû³Æ¡£¡£¡£¡£ ¡£¸Ã´¹ÂڻÁ´½Óµ½90¸öÓòÉϵÄ65000¶à¸öΨһURL£¬£¬£¬£¬£¬£¬Ã¿¸öÓòÔÚ²î±ð·¾¶Ï½¨ÉèÁ˶à¸ö´¹ÂÚÍøÒ³¡£¡£¡£¡£ ¡£


https://checkmarx.com/blog/how-140k-nuget-npm-and-pypi-packages-were-used-to-spread-phishing-links/


5¡¢Cisco½üÆÚ·¢Ã÷ʹÓÃÐÂÐÍHTML×ß˽ÊÖÒÕ·Ö·¢QBotµÄ»î¶¯

      

Cisco TalosÔÚ12ÔÂ13ÈÕ³ÆÆä·¢Ã÷ÁËʹÓÿÉËõ·ÅʸÁ¿Í¼ÐÎ(SVG)ͼÏñµÄÐÂHTML×ß˽ÊÖÒÕ¡£¡£¡£¡£ ¡£ÕâÖÖ¹¥»÷ÊÇͨ¹ýº¬ÓÐJavaScriptµÄǶÈëʽSVGÎļþ¾ÙÐе쬣¬£¬£¬£¬£¬ÕâЩÎļþÖØÐÂ×éºÏ³ÉÒ»¸öBase64±àÂëµÄQBot¶ñÒâÈí¼þ×°ÖóÌÐò£¬£¬£¬£¬£¬£¬Í¨¹ýÄ¿µÄµÄä¯ÀÀÆ÷×Ô¶¯ÏÂÔØ¡£¡£¡£¡£ ¡£ÓÉÓÚ¶ñÒâÈí¼þpayloadÊÇÖ±½ÓÔÚÄ¿µÄÖй¹½¨µÄ£¬£¬£¬£¬£¬£¬¶ø²»ÊÇͨ¹ýÍøÂç´«ÊäµÄ£¬£¬£¬£¬£¬£¬Òò´ËÕâÖÖHTML×ß˽ÊÖÒÕ¿ÉÒÔÈÆ¹ýÖ¼ÔÚ¹ýÂË´«ÊäÖеĶñÒâÄÚÈݵÄÇå¾²¼ì²â¡£¡£¡£¡£ ¡£ÎªµÖÓùHTML×ß˽¹¥»÷£¬£¬£¬£¬£¬£¬¿É×èÖ¹¶ÔÏÂÔØÄÚÈÝÖ´ÐÐJavaScript»òVBScript¡£¡£¡£¡£ ¡£


https://blog.talosintelligence.com/html-smugglers-turn-to-svg-images/


6¡¢CybereasonÐû²¼¹ØÓÚÀÕË÷Èí¼þRoyalµÄÊÖÒÕÆÊÎö±¨¸æ

      

12ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬CybereasonÐû²¼Á˹ØÓÚÀÕË÷Èí¼þRoyalµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¡£¡£ ¡£RoyalÓÚ2022ÄêÍ··ºÆð£¬£¬£¬£¬£¬£¬²¢×ÔÄêÖÐÒÔÀ´ÊÆÍ·Ç¿¾¢¡£¡£¡£¡£ ¡£¸Ã±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬RoyalÀ©Õ¹Á˲¿·Ö¼ÓÃܵĿ´·¨£¬£¬£¬£¬£¬£¬ÕâÒâζ×ÅËü¿ÉÒÔ¼ÓÃÜÔ¤ÏÈÈ·¶¨µÄ²¿·ÖÎļþÄÚÈÝ£¬£¬£¬£¬£¬£¬²¢»ùÓÚÎÞаµÄ°Ù·Ö±È½«Æä²¿·Ö¼ÓÃÜ£¬£¬£¬£¬£¬£¬Ìá¸ßÁË·´ÀÕË÷Èí¼þ½â¾ö¼Æ»®µÄ¼ì²âÄѶȣ»£»£»Ê¹Óöà¸öÏß³ÌÀ´¼ÓËÙ¼ÓÃÜÀú³Ì£»£»£»ÔÚÈ«Çò¹æÄ£ÄÚ»îÔ¾£¬£¬£¬£¬£¬£¬Ã»ÓÐʹÓÃRaaS£¬£¬£¬£¬£¬£¬Ò²Ã»ÓÐÕë¶ÔÌØ¶¨ÐÐÒµ»òµØÇø£»£»£»Æä×î³õÒÔ²î±ðµÄ·½·¨Æô¶¯ºÍ×°Öᣡ£¡£¡£ ¡£


https://www.cybereason.com/blog/royal-ransomware-analysis