Credit Control CorporationÔ¼28ÍòÓû§µÄÐÅϢй¶
Ðû²¼Ê±¼ä 2023-05-181¡¢Credit Control CorporationÔ¼28ÍòÓû§µÄÐÅϢй¶
¾Ý5ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬£¬Õ®Îñ´ßÊÕ¹«Ë¾Credit Control Corporation(CCC)Ôâµ½¹¥»÷£¬£¬£¬£¬£¬Ð¹Â¶ÁË286699¸ö¿Í»§µÄÐÅÏ¢¡£¡£¡£¡£Ð¹Â¶ÊÂÎñ±¬·¢ÔÚ3ÔÂ2ÈÕÖÁ7ÈÕ£¬£¬£¬£¬£¬Éæ¼°ÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂëºÍÕÊ»§ÏêϸÐÅÏ¢µÈ¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ3ÔÂ7ÈÕÔÚÆäÍøÂçÖмì²âµ½Òì³£»£»£»£»£»£»î¶¯£¬£¬£¬£¬£¬ÊӲ췢Ã÷¹¥»÷Õß»ñµÃÁËÌØ¶¨ÏµÍ³µÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬²¢¸´ÖÆÁ˰üÀ¨¿Í»§ÐÅÏ¢µÄÖÖÖÖÎļþ¡£¡£¡£¡£ÕâÒ»ÊÂÎñÖ÷ÒªÓ°ÏìÁËÒÀÀµCCCÊÕծЧÀ͵ÄÒ½ÁÆ»ú¹¹£¬£¬£¬£¬£¬ÀýÈçUVAÎÀÉúϵͳ¡¢ValleyÎÀÉúϵͳºÍSentaraÎÀÉúϵͳµÈ¡£¡£¡£¡£
https://www.hackread.com/credit-control-corporation-data-breach/
2¡¢·¨¹úµç×Ó×°±¸ÖÆÔìÉÌLacroixÔâµ½¹¥»÷Èý¸ö¹¤³§ÔÝʱ¹Ø±Õ
¾ÝýÌå5ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬·¨¹úµç×Ó²úÆ·ÖÆÔìÉÌLacroix GroupÔâµ½¹¥»÷£¬£¬£¬£¬£¬¹Ø±ÕÁË·¨¹ú¡¢µÂ¹úºÍÍ»Äá˹µÄÈý¸ö¹¤³§¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ5ÔÂ7ÈÕ£¬£¬£¬£¬£¬LacroixÓÚ5ÔÂ12ÈÕÐû²¼¹Ø±ÕÕâЩ¹¤³§¡£¡£¡£¡£¸Ã¹«Ë¾Í¸Â¶ÕâÊÇÀÕË÷¹¥»÷£¬£¬£¬£¬£¬ËûÃÇÒѶԴËÎÊÌâÕö¿ªÊӲ죬£¬£¬£¬£¬ÒÔÈ·¶¨ÊÇ·ñÓÐÊý¾Ýй¶¡£¡£¡£¡£ÓÉÓÚ²¿·ÖÍâµØ»ù´¡ÉèÊ©±»¼ÓÃÜ£¬£¬£¬£¬£¬LacroixÍýÏëÓÚ5ÔÂ22ÈÕ»Ö¸´Éú²ú¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬ÊÜÓ°Ï칤³§Õ¼¹«Ë¾µÄºÜ´óÒ»²¿·Ö£¬£¬£¬£¬£¬Õ¼¼¯ÍÅ2022Äê×ÜÏúÊÛ¶îµÄ19%¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬»¹Ã»ÓÐÀÕË÷ÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£
https://securityaffairs.com/146335/cyber-crime/lacroix-group-ransomware-attack.html
3¡¢Trend Micro·¢Ã÷Water Orthrus½üÆÚµÄÁ½Ïîл
5ÔÂ15ÈÕ£¬£¬£¬£¬£¬Trend MicroÅû¶ÁËWater Orthrus½üÆÚµÄÁ½Ïîл¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÁË·Ö·¢Ð¶ñÒâÈí¼þCopperStealthºÍCopperPhishµÄ»î¶¯£¬£¬£¬£¬£¬ËüÃÇÓëCopperStealerÏàËÆ£¬£¬£¬£¬£¬¿ÉÄÜÀ´×Ôͳһ¸ö¿ª·¢Õߣ¬£¬£¬£¬£¬Òò´ËÕâ¿ÉÄÜÊÇWater OrthrusµÄл¡£¡£¡£¡£µÚÒ»¸ö»î¶¯Ê¼ÓÚ3ÔÂ8ÈÕ£¬£¬£¬£¬£¬Í¨¹ýÈí¼þ¹²ÏíÍøÕ¾ÉÏÌṩµÄ×°ÖóÌÐòÀ´·Ö·¢CopperStealth£¬£¬£¬£¬£¬ËüʹÓÃrootkitÔÚÄ¿µÄϵͳÉÏ×°ÖöñÒâÈí¼þ¡£¡£¡£¡£µÚ¶þ¸ö»î¶¯ÔÚ4Ô±»·¢Ã÷£¬£¬£¬£¬£¬Í¨¹ýÃâ·ÑÄäÃûÎļþ¹²ÏíÍøÕ¾ºóÃæµÄPPIÍøÂç·Ö·¢CopperPhish£¬£¬£¬£¬£¬Ëü¿ÉÇÔÊØÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£
https://www.trendmicro.com/en_us/research/23/e/water-orthrus-new-campaigns-deliver-rootkit-and-phishing-modules.html
4¡¢´óѧ¼ȡƽ̨Leverage EDUй¶´ó×ÚѧÉúµÄ»¤ÕÕµÈÐÅÏ¢
ýÌå5ÔÂ17Èճƣ¬£¬£¬£¬£¬´óѧ¼ȡƽ̨Leverage EDUй¶ÁËѧÉúµÄ»¤ÕÕ¡¢²ÆÎñÐÅÏ¢¡¢Ö¤ÊéºÍ¿¼ÊÔЧ¹ûµÈÊý¾Ý¡£¡£¡£¡£1ÔÂ31ÈÕ£¬£¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÉèÖùýʧ¿É¹ûÕæ»á¼ûµÄAmazon S3 ´æ´¢Í°¡£¡£¡£¡£¸Ã´æ´¢Í°°üÀ¨´ó×ÚzipÎļþ¼Ð£¬£¬£¬£¬£¬ÆäÖнü240000¸öÎļþй¶ÁËѧÉúµÄÃô¸ÐÊý¾ÝºÍPIIÐÅÏ¢¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢¿É±»¹¥»÷ÕßÓÃÀ´¾ÙÐÐÉí·ÝµÁÓúÍڲơ£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸Ã´æ´¢Í°Òѱ»±£»£»£»£»£»£»¤ÆðÀ´¡£¡£¡£¡£
https://securityaffairs.com/146329/data-breach/university-admission-platform-leverage-edu-exposed-student-passports.html
5¡¢Ñо¿Ö°Ô±¼ì²âµ½¶à¸ö¶ñÒâMicrosoft VSCodeÀ©Õ¹
Check PointÔÚ5ÔÂ16Èճƣ¬£¬£¬£¬£¬Æä¼à²âµ½ÁË3¸ö¶ñÒâMicrosoft VSCodeÀ©Õ¹£¬£¬£¬£¬£¬Òѱ»Windows¿ª·¢Ö°Ô±ÏÂÔØÁË46600´Î¡£¡£¡£¡£µÚÒ»¸öÀ©Õ¹ÊÇTheme Darcula dark£¬£¬£¬£¬£¬Ëü±»ÓÃÓÚÇÔÈ¡Óйؿª·¢Ö°Ô±ÏµÍ³µÄ»ù±¾ÐÅÏ¢¡£¡£¡£¡£µÚ¶þ¸öÃûΪpython-vscode£¬£¬£¬£¬£¬ËüÊÇÒ»¸öC# shell×¢Èë³ÌÐò£¬£¬£¬£¬£¬¿ÉÒÔÔÚÄ¿µÄϵͳִÐдúÂë»òÏÂÁî¡£¡£¡£¡£×îºóÒ»¸öÊÇprettiest java£¬£¬£¬£¬£¬¿É´Óä¯ÀÀÆ÷ÇÔȡƾ֤»òÉí·ÝÑéÖ¤ÁîÅÆ£¬£¬£¬£¬£¬²¢Í¨¹ýDiscord webhook·¢Ë͸ø¹¥»÷Õß¡£¡£¡£¡£ÕâЩÀ©Õ¹ÓÚ5ÔÂ4ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬²¢5ÔÂ14ÈÕ´ÓVSCodeÖÐɾ³ý¡£¡£¡£¡£
https://blog.checkpoint.com/securing-the-cloud/malicious-vscode-extensions-with-more-than-45k-downloads-steal-pii-and-enable-backdoors/
6¡¢KasperskyÐû²¼2022ÄêÍøÂç¹¥»÷ÊÂÎñµÄÆÊÎö±¨¸æ
5ÔÂ16ÈÕ£¬£¬£¬£¬£¬KasperskyÐû²¼Á˹ØÓÚ2022ÄêÍøÂç¹¥»÷ÊÂÎñµÄÆÊÎö±¨¸æ¡£¡£¡£¡£2022Ä꣬£¬£¬£¬£¬Ôâµ½ÍøÂç¹¥»÷ÊÂÎñµÄ×éÖ¯ÖУ¬£¬£¬£¬£¬ÓÐ45.9%λÓÚ¶íÂÞ˹ºÍCISµØÇø£¬£¬£¬£¬£¬Æä´ÎÊÇÖж«(22.5%)¡¢ÃÀÖÞ(14.3%)ºÍÅ·ÖÞ(13.3%)¡£¡£¡£¡£´ÓÐÐÒµ½Ç¶ÈÀ´¿´£¬£¬£¬£¬£¬Õþ¸®£¨19.39%£©¡¢½ðÈÚ£¨18.37%£©ºÍ¹¤Òµ£¨17.35%£©Ïà¹Ø×éÖ¯Ôâµ½µÄ¹¥»÷×î¶à¡£¡£¡£¡£2022Ä꣬£¬£¬£¬£¬¹¥»÷Õß×ͨ¹ýʹÓÃÃæÏò¹«ÖÚµÄÓ¦ÓÃÖеÄÖÖÖÖÎó²î(42.9%)À´ÈëÇÖ×éÖ¯µÄ»ù´¡ÉèÊ©¡£¡£¡£¡£39.8%µÄÊÂÎñÓëÀÕË÷¹¥»÷Óйء£¡£¡£¡£
https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2023/05/12154213/The_nature_of_cyberincidents_2022.pdf


¾©¹«Íø°²±¸11010802024551ºÅ