IconBurstÕë¶ÔNPMµÄ¹©Ó¦Á´¹¥»÷Ó°ÏìÊý°Ù¸öÍøÕ¾ºÍÓ¦ÓÃ

Ðû²¼Ê±¼ä 2022-07-06

1¡¢IconBurstÕë¶ÔNPMµÄ¹©Ó¦Á´¹¥»÷Ó°ÏìÊý°Ù¸öÍøÕ¾ºÍÓ¦ÓÃ


7ÔÂ5ÈÕ £¬£¬£¬£¬£¬£¬ReversingLabsÅû¶ÁËIconBurstÕë¶ÔNPMµÄ¹©Ó¦Á´¹¥»÷»î¶¯µÄϸ½ÚÐÅÏ¢¡£¡£ ¡£¸Ã»î¶¯¿É×·Ëݵ½2021Äê12Ô £¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÊýÊ®¸ö°üÀ¨»ìÏýJavascript´úÂëµÄ¶ñÒâNPMÀ´Ñ¬È¾Êý°Ù¸ö×ÀÃæÓ¦ÓóÌÐòºÍÍøÕ¾¡£¡£ ¡£Óë֮ǰÀàËÆµÄ¹¥»÷Ò»Ñù £¬£¬£¬£¬£¬£¬¸Ã»î¶¯Ò²Ö÷ÒªÒÀÀµÓÚÆ´Ð´¹ýʧ £¬£¬£¬£¬£¬£¬Ã°³äÊ¢ÐеÄNPMÄ £¿£¿£¿é £¬£¬£¬£¬£¬£¬ÈçumbrellajsºÍionic.io NPMÄ £¿£¿£¿é¡£¡£ ¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËЭͬ¹©Ó¦Á´¹¥»÷µÄÖ¤¾Ý £¬£¬£¬£¬£¬£¬´ó×ÚµÄNPM°ü°üÀ¨jQuery¾ç±¾ £¬£¬£¬£¬£¬£¬Ö¼ÔÚ´Ó°üÀ¨ËüÃǵÄÓ¦ÓóÌÐòÖÐÇÔÈ¡±íµ¥Êý¾Ý¡£¡£ ¡£


https://blog.reversinglabs.com/blog/iconburst-npm-software-supply-chain-attack-grabs-data-from-apps-websites


2¡¢ÀÕË÷ÍÅ»ïAstraLockerÍýÏë×èÖ¹ÔËÓª²¢Ðû²¼Æä½âÃÜÆ÷


¾ÝýÌå7ÔÂ4ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïAstraLockerÍýÏë×èÖ¹ÔËÓª £¬£¬£¬£¬£¬£¬²¢ÔÚVirusTotalÌá½»ÁËÒ»¸öº¬ÓÐAstraLocker½âÃÜÆ÷µÄZIPÎļþ¡£¡£ ¡£±ðµÄ £¬£¬£¬£¬£¬£¬¸ÃÍŻﻹ͸¶ËûÃÇÍýÏëתÏò¼ÓÃÜÐ®ÖÆ¹¥»÷»î¶¯¡£¡£ ¡£Ñо¿Ö°Ô±ÏÂÔØ²¢È·ÈϸÃZIPÎļþÊÇÕýµ±µÄ £¬£¬£¬£¬£¬£¬¾­ÓɲâÊÔºó֤ʵ½âÃÜÆ÷Ò²¿ÉÒÔÕý³£ÊÂÇé¡£¡£ ¡£ËäÈ»¹¥»÷ÕßûÓÐÃ÷È·×èÖ¹ÔËÓªµÄÔµ¹ÊÔ­ÓÉ £¬£¬£¬£¬£¬£¬µ«ºÜ¿ÉÄÜÊÇÓÉÓÚ½üÆÚ¹ØÓÚËüµÄ±¨µÀÒýÆðÁ˹«ÖڵĹØ×¢ £¬£¬£¬£¬£¬£¬Ê¹Æä³ÉΪִ·¨»ú¹¹µÄÄ¿µÄ¡£¡£ ¡£ 


https://www.bleepingcomputer.com/news/security/astralocker-ransomware-shuts-down-and-releases-decryptors/


3¡¢ÈÕ±¾Kokikai YasueҽԺй¶ʮÍò¶à»¼ÕߺÍÔ±¹¤µÄÐÅÏ¢


ýÌå7ÔÂ4ÈÕ³Æ £¬£¬£¬£¬£¬£¬ÈÕ±¾Kokikai YasueҽԺй¶ÁË111191Ãû»¼ÕߺÍ715ÃûÔ±¹¤µÄÐÅÏ¢¡£¡£ ¡£¸ÃÒ½ÔºÓÚ5ÔÂ27ÈÕ·¢Ã÷¶ÔÆäÅÌËã»úϵͳδ¾­ÊÚȨµÄ»á¼û £¬£¬£¬£¬£¬£¬ÆäʱÎÞ·¨»á¼û»¼ÕßÐÅÏ¢Êý¾Ý¿â £¬£¬£¬£¬£¬£¬ÇÒµç×Ó²¡ÀúϵͳµÈ²¿·Öϵͳ×èÖ¹ÔËÐС£¡£ ¡£µ±Ìì½ÓÄÉÁËÏÞÖÆ²¿·ÖÓªÒµµÄÕïÁÆÌåÖÆ £¬£¬£¬£¬£¬£¬²¢ÔÚ28ÈÕ»Ö¸´Õý³£ÔËÓª¡£¡£ ¡£´Ë´ÎÊÂÎñй¶»¼ÕßµÄÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍÒßÃç½ÓÖÖÊ·µÈÐÅÏ¢£»£»£»ÒÔ¼°Ô±¹¤µÄÐÕÃû¡¢µØµãºÍµç»°µÈ¡£¡£ ¡£


https://www.databreaches.net/jp-information-of-111191-patients-and-715-employees-at-kokikai-yasue-hospital-leaked/


4¡¢ÎÚ¿ËÀ¼¾¯·½¾Ð²¶ÍµÈ¡Áè¼Ý300ÍòÃÀÔªµÄ´¹ÂÚÍÅ»ïµÄ³ÉÔ±


¾Ý7ÔÂ4ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼¾¯·½Àֳɾв¶ÁËÒ»¸ö´¹ÂÚÍÅ»ïµÄ9Ãû³ÉÔ±¡£¡£ ¡£Ö´·¨Ö°Ô±ÌåÏÖ £¬£¬£¬£¬£¬£¬ËûÃǽ¨ÉèÁË400¶à¸ö´¹ÂÚÍøÕ¾ £¬£¬£¬£¬£¬£¬ÒÔÍøÂçÄ¿µÄµÄÒøÐп¨Êý¾Ý²¢´ÓËûÃǵÄÕË»§ÖÐ͵ȡ×ʽ𡣡£ ¡£ÏÖÔÚ £¬£¬£¬£¬£¬£¬ÏÓÒÉÈËÒÑ»ñµÃÁËÔ¼1ÒÚ¸ñÀï·òÄÉ£¨337ÍòÃÀÔª£© £¬£¬£¬£¬£¬£¬¿ÉÄÜÅöÃæÁÙ³¤´ï15ÄêµÄÀÎÓüÖ®ÔÖ¡£¡£ ¡£´Ë´ÎÖ´·¨Ðж¯Ã»ÊÕÁËËûÃǵÄÅÌËã»ú¡¢ÊÖ»ú¡¢ÒøÐп¨ÒÔ¼°²»·¨»ñµÃµÄÊÕÒæ¡£¡£ ¡£Éв»ÇåÎúÆä´¹ÂÚÁ´½ÓµÄ·Ö·¢Í¾¾¶ £¬£¬£¬£¬£¬£¬¿ÉÄÜÊǶÌÐÅ´¹ÂÚ£¨smishing£©¡¢À¬»øÓʼþ¡¢É罻ýÌåÓ¦ÓÃÐÂÎźÍSEOÖж¾µÈ¡£¡£ ¡£


https://thehackernews.com/2022/07/ukrainian-authorities-arrested-phishing.html


5¡¢CiscoÐû²¼ÔÚ°µÍøÉ϶ÔÀÕË÷Èí¼þÓòÈ¥ÄäÃû»¯µÄÊÖÒÕ±¨¸æ


ýÌå7ÔÂ5ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬CiscoÏêϸÏÈÈÝÁËÔõÑùÔÚ°µÍøÉ϶ÔÀÕË÷Èí¼þµÄÓò¾ÙÐÐÈ¥ÄäÃû»¯¡£¡£ ¡£´ó´ó¶¼ÀÕË÷ÍÅ»ïʹÓÃʹÓÃÆäÔ­¼®¹úÒÔÍâµÄÍйܹ©Ó¦ÉÌ£¨ÈçÈðµä¡¢µÂ¹úºÍÐÂ¼ÓÆÂ£©À´ÍйÜËûÃǵÄÍøÕ¾ £¬£¬£¬£¬£¬£¬µ±ËûÃÇÅþÁ¬Æä»ù´¡ÉèÊ©À´Ö´ÐÐÔ¶³ÌÖÎÀíʹÃüʱ £¬£¬£¬£¬£¬£¬»áʹÓÃVPSÌøµã×÷ΪÊðÀíÀ´Òþ²ØËûÃǵÄÕæÊµÎ»Öᣡ£ ¡£Ñо¿Ö°Ô±Ê¹ÓõÄÈ¥ÄäÃû·½·¨°üÀ¨£ºTLSÖ¤Ê鯥Åä £¬£¬£¬£¬£¬£¬Í¨¹ý½«¹¥»÷ÕßµÄ×ÔÊðÃûTLSÖ¤ÊéÐòÁкźÍÒ³ÃæÔªËØÓëÍøÂçÉϵÄË÷ÒýµÄ¾ÙÐÐÆ¥Å䣻£»£»ÍøÕ¾Í¼±êÆ¥Åä £¬£¬£¬£¬£¬£¬²éÕÒ°µÍøÉÏÌØ¶¨µÄÍøÕ¾Í¼±êÊÇ·ñÒ²·ºÆðÔÚ¹«ÍøÉÏ£»£»£»ÒÔ¼°OPSEC¹ÊÕÏ £¬£¬£¬£¬£¬£¬¹¥»÷ÍÅ»ïÓÐʱ»á·¸ÔÖÄÑÐÔµÄÇå¾²¹ýʧ £¬£¬£¬£¬£¬£¬µ¼ÖÂÄäÃûʧЧ¡£¡£ ¡£   


https://thehackernews.com/2022/07/researchers-share-techniques-to-uncover.html


6¡¢ÆÏÌÑÑÀ2022ÄêQ2Íþв±¨¸æ³ÆÒøÐгÉΪÖ÷Òª¹¥»÷Ä¿µÄ


7ÔÂ4ÈÕ £¬£¬£¬£¬£¬£¬Segran?a-Inform¨¢ticaÐû²¼ÁËÆÏÌÑÑÀ2022ÄêµÚ¶þ¼¾¶ÈµÄÍþвÆÊÎö±¨¸æ¡£¡£ ¡£±¨¸æÏÔʾ £¬£¬£¬£¬£¬£¬ÔÚµÚ¶þ¼¾¶È £¬£¬£¬£¬£¬£¬ÍøÂç´¹Âڻ(68.9%)±È¶ñÒâÈí¼þ(31.1%)¸ü³£¼û¡£¡£ ¡£QakbotľÂí¡¢Satori/Mirai½©Ê¬ÍøÂçºÍMS OfficeÎĵµ£¨ºê£©ÊÇÆÏÌÑÑÀÔÚµÚ¶þ¼¾¶ÈÃæÁÙµÄ×î³£¼ûµÄÍþв¡£¡£ ¡£±ðµÄ £¬£¬£¬£¬£¬£¬Óдó×ڵĴ¹ÂڻÓë°ü¹üµÝËÍЧÀÍÓÐ¹Ø £¬£¬£¬£¬£¬£¬°üÀ¨CTT¡¢DHL¡¢UPSºÍFedExµÈ¡£¡£ ¡£¹ØÓÚÊÜÓ°ÏìµÄÐÐÒµ £¬£¬£¬£¬£¬£¬ÒøÐгÉΪÖ÷Òª¹¥»÷Ä¿µÄ £¬£¬£¬£¬£¬£¬Æä´ÎÊÇÁãÊÛºÍÒ½ÁÆ¿µ½¡ÐÐÒµ¡£¡£ ¡£  


https://seguranca-informatica.pt/threat-report-portugal-q2-2022/#.YsT3wnZBxPY