΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬×ܼÆÐÞ¸´84¸öÇå¾²Îó²î

Ðû²¼Ê±¼ä 2022-07-13
1¡¢Î¢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬×ܼÆÐÞ¸´84¸öÇå¾²Îó²î

      

7ÔÂ12ÈÕ£¬£¬£¬Î¢ÈíÐû²¼7Ô·ݵÄÖܶþ²¹¶¡£¬£¬£¬ÐÞ¸´Á˰üÀ¨Ò»¸öÒѱ»Ê¹ÓõÄ0 dayÔÚÄÚµÄ84¸öÎó²î¡£¡£ ¡£¡£¡£´Ë´ÎÐÞ¸´ÁË52¸öÌáȨÎó²î¡¢4¸öÇå¾²¹¦Ð§ÈƹýÎó²î¡¢12¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡¢11¸öÐÅϢй¶Îó²îºÍ5¸ö¾Ü¾øÐ§ÀÍÎó²î¡£¡£ ¡£¡£¡£ÆäÖУ¬£¬£¬Òѱ»ÔÚҰʹÓõÄÎó²îÊÇWindows CSRSSȨÏÞÌáÉýÎó²î£¨CVE-2022-22047£©£¬£¬£¬Î¢ÈíÚ¹ÊͳÆÀÖ³ÉʹÓôËÎó²î¿É»ñµÃϵͳȨÏÞ¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬ÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²î°üÀ¨WindowsͼÐÎ×é¼þÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-30221£©ºÍWindows ÍøÂçÎļþϵͳԶ³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-22029£©µÈ¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2022-patch-tuesday-fixes-exploited-zero-day-84-flaws/


2¡¢ÐÂÀÕË÷Èí¼þHavanaCryptαװ³ÉGoogleÈí¼þ¸üÐÂÀ´·Ö·¢

     

Trend MicroÔÚ7ÔÂ6ÈÕÅû¶ÁËÐÂÀÕË÷Èí¼þHavanaCryptµÄ·Ö·¢»î¶¯¡£¡£ ¡£¡£¡£Ôڴ˴λÖУ¬£¬£¬¶ñÒâÈí¼þαװ³ÉGoogleÈí¼þ¸üÐÂÓ¦ÓóÌÐò£¬£¬£¬²¢Ê¹ÓÃMicrosoftÍøÂçÍйÜЧÀÍIPµØµã×÷ΪÆäC2ЧÀÍÆ÷À´ÈƹýÇå¾²¼ì²â¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬ÀÕË÷Èí¼þÔÚ¼ÓÃÜʱ´úʹÓÃÀ´×Ô¿ªÔ´ÃÜÔ¿ÖÎÀíÆ÷KeePass Password Safe´úÂ룬£¬£¬²¢Ê¹ÓÃÃûΪ¡°QueueUserWorkItem¡±µÄ.Netº¯ÊýÀ´¼ÓËÙ¼ÓÃÜ¡£¡£ ¡£¡£¡£Trend MicroÖ¸³ö£¬£¬£¬HavanaCrypt¿ÉÄÜÈÔ´¦ÓÚ¿ª·¢½×¶Î£¬£¬£¬ÓÉÓÚËü²»»áÔÚ±»Ñ¬È¾µÄϵͳÉÏÁôÏÂÊê½ð¼Í¼¡£¡£ ¡£¡£¡£


https://www.trendmicro.com/en_us/research/22/g/brand-new-havanacrypt-ransomware-poses-as-google-software-update.html


3¡¢Anubis NetworksÔٴλع飬£¬£¬Õë¶Ô°ÍÎ÷ºÍÆÏÌÑÑÀ´¹ÂÚ¹¥»÷ 

      

¾ÝSeguran?a Inform¨¢ticaÔÚ7ÔÂ10ÈÕ±¨µÀ£¬£¬£¬Anubis NetworkÒÑ´ø×ÅеÄC2ЧÀÍÆ÷»Ø¹é¡£¡£ ¡£¡£¡£´Ë´Î»î¶¯×Ô2022Äê3ÔÂ×îÏÈ£¬£¬£¬Ö÷ÒªÕë¶Ô°ÍÎ÷ºÍÆÏÌÑÑÀµÄ»¥ÁªÍøÓû§¡£¡£ ¡£¡£¡£¸Ã»î¶¯ÓÉÈý¸öÒªº¦µÄ²¿·Ö×é³É£ºÔÚÒ°Èö²¥ÐéαµÇÂ¼Ò³ÃæµÄ½»¸¶¹¤¾ß£¬£¬£¬Í¨³£Í¨¹ý¶ÌÐźʹ¹ÂÚµç×ÓÓʼþ¾ÙÐУ»£»£»£»ÍйÜÔÚÔÆÐ§ÀÍÆ÷ÉϵĶñÒâµÇÂ¼Ò³Ãæ£¬£¬£¬ÓÉÓëÕæÊµÏµÍ³ºÜÊÇÏàËÆµÄÓû§½çÃæºÍ½á¹¹×é³É£»£»£»£»Ò»¸ö¿ØÖƺó¶Ë£¬£¬£¬±»¹¥»÷ÕßÓÃÓÚÖÎÀíÄ¿µÄÓû§µÄÏêϸÐÅÏ¢¡£¡£ ¡£¡£¡£


https://seguranca-informatica.pt/anubis-networks-is-back-with-new-c2-server/#.Ys0jP3ZBxPa


4¡¢Ó¢¹ú½ðÈÚЧÀ͹«Ë¾Aon½ü15Íò¸ö±±ÃÀ¿Í»§µÄСÎÒ˽¼ÒÐÅϢй¶

      

¾ÝýÌå7ÔÂ8ÈÕ±¨µÀ£¬£¬£¬Ó¢¹ú¿ç¹ú½ðÈÚЧÀ͹«Ë¾âù°²£¨Aon£©145889¸ö±±ÃÀ¿Í»§µÄÐÅϢй¶¡£¡£ ¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬´Ó2020Äê12ÔÂ29ÈÕµ½2022Äê2ÔÂ26ÈÕ£¬£¬£¬ºÚ¿ÍÔÚ²î±ðʱ¼äÄÚÈëÇÖÁËÆäϵͳ¡£¡£ ¡£¡£¡£ÊÜÓ°ÏìµÄÐÅÏ¢°üÀ¨¼ÝÕÕºÅÂë¡¢Éç»áÇå¾²ºÅÂëºÍ¸£Àû¹ÒºÅÐÅÏ¢µÈ¡£¡£ ¡£¡£¡£AonÉù³ÆÒѽÓÄɲ½·¥È·ÈÏδ¾­ÊÚȨµÄµÚÈý·½²»ÔÙÓÐȨ»á¼ûÊý¾Ý£¬£¬£¬ÇÒÐÅÏ¢²¢Î´±»ÀÄÓᣡ£ ¡£¡£¡£ÓÉÓÚÊý¾Ýй¶ÊÂÎñ£¬£¬£¬AonÃæÁÙÖÁÉÙÁ½ÆðÕûÌåËßËÏ¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬¸Ã¹«Ë¾ÎªÊÜÓ°ÏìµÄ¿Í»§ÌṩÁË24¸öÔµÄÉí·Ý±£»£»£»£»¤Ð§ÀÍ¡£¡£ ¡£¡£¡£


https://www.infosecurity-magazine.com/news/aon-hack-sensitive-information/


5¡¢Resecurity³ÆÀÕË÷ÍÅ»ïALPHVÒªÇóµÄÊê½ðÒÑ´ï250ÍòÃÀÔª

     

¾Ý7ÔÂ10ÈÕ±¨µÀ£¬£¬£¬ÀÕË÷ÍÅ»ïALPHV£¨ÓÖÃûBlackCat£©ÒªÇóµÄÊê½ðÒÑ´ï250ÍòÃÀÔª¡£¡£ ¡£¡£¡£ALPHVÖÁÉÙ´ÓÈ¥Äê11Ô¾Í×îÏÈÔËÓªÁË£¬£¬£¬Ëü×îÏÈÒªÇó250ÍòÃÀÔªºÍ¿¿½üÒ»°ëµÄÕÛ¿Û£¬£¬£¬ÒÔ¼¤ÀøÄ¿µÄ¾¡¿ì¸¶Êê½ð£¬£¬£¬Áô¸øÄ¿µÄµÄÖ§¸¶Ê±¼äÔÚ5-7Ìì²»µÈ¡£¡£ ¡£¡£¡£ResecurityÌåÏÖ£¬£¬£¬×Ô2020ÄêÒÔÀ´£¬£¬£¬Æ½¾ùÀÕË÷Êê½ð¶îÔöÌíÁË82%£¬£¬£¬ÖÁ2021ÄêÉϰëÄêΪ570000ÃÀÔª£¬£¬£¬µÖ´ïÀúʷиߣ¬£¬£¬È»ºóµ½2022ÄêÏÕЩ·­ÁËÒ»·¬¡£¡£ ¡£¡£¡£×îÐÂÕ¹ÍûÊǵ½2031Ä꣬£¬£¬È«ÇòÀÕË÷»î¶¯½«µÖ´ï2650ÒÚÃÀÔª£¬£¬£¬¶ÔÈ«ÇòÆóÒµÔì³ÉµÄ×ÜËðʧ½«µÖ´ï10.5ÍòÒÚÃÀÔª¡£¡£ ¡£¡£¡£


https://resecurity.com/blog/article/blackcat-aka-alphv-ransomware-is-increasing-stakes-up-to-25m-in-demands


6¡¢KasperskyÐû²¼ÓйػùÓÚÎı¾µÄڲƭ»î¶¯µÄÆÊÎö±¨¸æ

      

7ÔÂ11ÈÕ£¬£¬£¬KasperskyÐû²¼ÁËÓйػùÓÚÎı¾µÄڲƭ»î¶¯µÄÆÊÎö±¨¸æ¡£¡£ ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬»ùÓÚÎı¾µÄڲƭ¿ÉÒÔ·ÖΪ¼¸ÖÖÀàÐÍ£ºÔ¼»áÕ©Æ­¡¢419Õ©Æ­¡¢Ú²Æ­ÀÕË÷ºÍÓïÒôÍøÂç´¹ÂÚ¡£¡£ ¡£¡£¡£ÆäÖУ¬£¬£¬Ô¼»áÕ©Æ­ÊÇ×î²»³£¼ûµÄÀàÐÍ£¬£¬£¬´Ó2022Äê3Ôµ½6Ô£¬£¬£¬¼ì²âµ½49536Ìõ´ËÀàÐÂÎÅ£»£»£»£»419Õ©Æ­ÊÇ×î¹ÅÀϵÄÀàÐÍÖ®Ò»£¬£¬£¬Í¨³£ÊÇð³äµÄ״ʦ¼û¸æÄ¿µÄÒѹʵÄÇׯÝÒѽ«¾Þ¶î²Æ²úÒÅÔù¸øËûÃÇ£¬£¬£¬Ã¿Ô»á¼ì²âµ½ÊýÊ®ÍòÌõ´ËÀàÐÂÎÅ£»£»£»£»Ú²Æ­ÀÕË÷µÄÓʼþÒª±ÈÆäËüÀàÐͶàµÃ¶à£¬£¬£¬´Ó3Ôµ½6ÔÂÓÐÁè¼Ý1200ÍòÌõÀÕË÷ÐÅÏ¢£»£»£»£»3Ôµ½6Ô£¬£¬£¬Ñо¿Ö°Ô±¼ì²âµ½347141·âÓïÒô´¹ÂÚÓʼþ¡£¡£ ¡£¡£¡£


https://securelist.com/mail-text-scam/106926/