΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬£¬£¬×ܼÆÐÞ¸´84¸öÇå¾²Îó²î

Ðû²¼Ê±¼ä 2022-07-13
1¡¢Î¢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬£¬£¬×ܼÆÐÞ¸´84¸öÇå¾²Îó²î

      

7ÔÂ12ÈÕ£¬£¬£¬£¬£¬Î¢ÈíÐû²¼7Ô·ݵÄÖܶþ²¹¶¡£¬£¬£¬£¬£¬ÐÞ¸´Á˰üÀ¨Ò»¸öÒѱ»Ê¹ÓõÄ0 dayÔÚÄÚµÄ84¸öÎó²î¡£¡£¡£¡£´Ë´ÎÐÞ¸´ÁË52¸öÌáȨÎó²î¡¢4¸öÇå¾²¹¦Ð§ÈƹýÎó²î¡¢12¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡¢11¸öÐÅϢй¶Îó²îºÍ5¸ö¾Ü¾øÐ§ÀÍÎó²î¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬Òѱ»ÔÚҰʹÓõÄÎó²îÊÇWindows CSRSSȨÏÞÌáÉýÎó²î£¨CVE-2022-22047£©£¬£¬£¬£¬£¬Î¢ÈíÚ¹ÊͳÆÀÖ³ÉʹÓôËÎó²î¿É»ñµÃϵͳȨÏÞ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²î°üÀ¨WindowsͼÐÎ×é¼þÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-30221£©ºÍWindows ÍøÂçÎļþϵͳԶ³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-22029£©µÈ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2022-patch-tuesday-fixes-exploited-zero-day-84-flaws/


2¡¢ÐÂÀÕË÷Èí¼þHavanaCryptαװ³ÉGoogleÈí¼þ¸üÐÂÀ´·Ö·¢

     

Trend MicroÔÚ7ÔÂ6ÈÕÅû¶ÁËÐÂÀÕË÷Èí¼þHavanaCryptµÄ·Ö·¢»î¶¯¡£¡£¡£¡£Ôڴ˴λÖУ¬£¬£¬£¬£¬¶ñÒâÈí¼þαװ³ÉGoogleÈí¼þ¸üÐÂÓ¦ÓóÌÐò£¬£¬£¬£¬£¬²¢Ê¹ÓÃMicrosoftÍøÂçÍйÜЧÀÍIPµØµã×÷ΪÆäC2ЧÀÍÆ÷À´ÈƹýÇå¾²¼ì²â¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÔÚ¼ÓÃÜʱ´úʹÓÃÀ´×Ô¿ªÔ´ÃÜÔ¿ÖÎÀíÆ÷KeePass Password Safe´úÂ룬£¬£¬£¬£¬²¢Ê¹ÓÃÃûΪ¡°QueueUserWorkItem¡±µÄ.Netº¯ÊýÀ´¼ÓËÙ¼ÓÃÜ¡£¡£¡£¡£Trend MicroÖ¸³ö£¬£¬£¬£¬£¬HavanaCrypt¿ÉÄÜÈÔ´¦ÓÚ¿ª·¢½×¶Î£¬£¬£¬£¬£¬ÓÉÓÚËü²»»áÔÚ±»Ñ¬È¾µÄϵͳÉÏÁôÏÂÊê½ð¼Í¼¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/22/g/brand-new-havanacrypt-ransomware-poses-as-google-software-update.html


3¡¢Anubis NetworksÔٴλع飬£¬£¬£¬£¬Õë¶Ô°ÍÎ÷ºÍÆÏÌÑÑÀ´¹ÂÚ¹¥»÷ 

      

¾ÝSeguran?a Inform¨¢ticaÔÚ7ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬£¬Anubis NetworkÒÑ´ø×ÅеÄC2ЧÀÍÆ÷»Ø¹é¡£¡£¡£¡£´Ë´Î»î¶¯×Ô2022Äê3ÔÂ×îÏÈ£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô°ÍÎ÷ºÍÆÏÌÑÑÀµÄ»¥ÁªÍøÓû§¡£¡£¡£¡£¸Ã»î¶¯ÓÉÈý¸öÒªº¦µÄ²¿·Ö×é³É£ºÔÚÒ°Èö²¥ÐéαµÇÂ¼Ò³ÃæµÄ½»¸¶¹¤¾ß£¬£¬£¬£¬£¬Í¨³£Í¨¹ý¶ÌÐźʹ¹ÂÚµç×ÓÓʼþ¾ÙÐУ»£»£»£»£»£»ÍйÜÔÚÔÆÐ§ÀÍÆ÷ÉϵĶñÒâµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬ÓÉÓëÕæÊµÏµÍ³ºÜÊÇÏàËÆµÄÓû§½çÃæºÍ½á¹¹×é³É£»£»£»£»£»£»Ò»¸ö¿ØÖƺó¶Ë£¬£¬£¬£¬£¬±»¹¥»÷ÕßÓÃÓÚÖÎÀíÄ¿µÄÓû§µÄÏêϸÐÅÏ¢¡£¡£¡£¡£


https://seguranca-informatica.pt/anubis-networks-is-back-with-new-c2-server/#.Ys0jP3ZBxPa


4¡¢Ó¢¹ú½ðÈÚЧÀ͹«Ë¾Aon½ü15Íò¸ö±±ÃÀ¿Í»§µÄСÎÒ˽¼ÒÐÅϢй¶

      

¾ÝýÌå7ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ó¢¹ú¿ç¹ú½ðÈÚЧÀ͹«Ë¾âù°²£¨Aon£©145889¸ö±±ÃÀ¿Í»§µÄÐÅϢй¶¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬´Ó2020Äê12ÔÂ29ÈÕµ½2022Äê2ÔÂ26ÈÕ£¬£¬£¬£¬£¬ºÚ¿ÍÔÚ²î±ðʱ¼äÄÚÈëÇÖÁËÆäϵͳ¡£¡£¡£¡£ÊÜÓ°ÏìµÄÐÅÏ¢°üÀ¨¼ÝÕÕºÅÂë¡¢Éç»áÇå¾²ºÅÂëºÍ¸£Àû¹ÒºÅÐÅÏ¢µÈ¡£¡£¡£¡£AonÉù³ÆÒѽÓÄɲ½·¥È·ÈÏδ¾­ÊÚȨµÄµÚÈý·½²»ÔÙÓÐȨ»á¼ûÊý¾Ý£¬£¬£¬£¬£¬ÇÒÐÅÏ¢²¢Î´±»ÀÄÓᣡ£¡£¡£ÓÉÓÚÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬AonÃæÁÙÖÁÉÙÁ½ÆðÕûÌåËßËÏ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÎªÊÜÓ°ÏìµÄ¿Í»§ÌṩÁË24¸öÔµÄÉí·Ý±£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/aon-hack-sensitive-information/


5¡¢Resecurity³ÆÀÕË÷ÍÅ»ïALPHVÒªÇóµÄÊê½ðÒÑ´ï250ÍòÃÀÔª

     

¾Ý7ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïALPHV£¨ÓÖÃûBlackCat£©ÒªÇóµÄÊê½ðÒÑ´ï250ÍòÃÀÔª¡£¡£¡£¡£ALPHVÖÁÉÙ´ÓÈ¥Äê11Ô¾Í×îÏÈÔËÓªÁË£¬£¬£¬£¬£¬Ëü×îÏÈÒªÇó250ÍòÃÀÔªºÍ¿¿½üÒ»°ëµÄÕÛ¿Û£¬£¬£¬£¬£¬ÒÔ¼¤ÀøÄ¿µÄ¾¡¿ì¸¶Êê½ð£¬£¬£¬£¬£¬Áô¸øÄ¿µÄµÄÖ§¸¶Ê±¼äÔÚ5-7Ìì²»µÈ¡£¡£¡£¡£ResecurityÌåÏÖ£¬£¬£¬£¬£¬×Ô2020ÄêÒÔÀ´£¬£¬£¬£¬£¬Æ½¾ùÀÕË÷Êê½ð¶îÔöÌíÁË82%£¬£¬£¬£¬£¬ÖÁ2021ÄêÉϰëÄêΪ570000ÃÀÔª£¬£¬£¬£¬£¬µÖ´ïÀúʷиߣ¬£¬£¬£¬£¬È»ºóµ½2022ÄêÏÕЩ·­ÁËÒ»·¬¡£¡£¡£¡£×îÐÂÕ¹ÍûÊǵ½2031Ä꣬£¬£¬£¬£¬È«ÇòÀÕË÷»î¶¯½«µÖ´ï2650ÒÚÃÀÔª£¬£¬£¬£¬£¬¶ÔÈ«ÇòÆóÒµÔì³ÉµÄ×ÜËðʧ½«µÖ´ï10.5ÍòÒÚÃÀÔª¡£¡£¡£¡£


https://resecurity.com/blog/article/blackcat-aka-alphv-ransomware-is-increasing-stakes-up-to-25m-in-demands


6¡¢KasperskyÐû²¼ÓйػùÓÚÎı¾µÄڲƭ»î¶¯µÄÆÊÎö±¨¸æ

      

7ÔÂ11ÈÕ£¬£¬£¬£¬£¬KasperskyÐû²¼ÁËÓйػùÓÚÎı¾µÄڲƭ»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬»ùÓÚÎı¾µÄڲƭ¿ÉÒÔ·ÖΪ¼¸ÖÖÀàÐÍ£ºÔ¼»áÕ©Æ­¡¢419Õ©Æ­¡¢Ú²Æ­ÀÕË÷ºÍÓïÒôÍøÂç´¹ÂÚ¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬Ô¼»áÕ©Æ­ÊÇ×î²»³£¼ûµÄÀàÐÍ£¬£¬£¬£¬£¬´Ó2022Äê3Ôµ½6Ô£¬£¬£¬£¬£¬¼ì²âµ½49536Ìõ´ËÀàÐÂÎÅ£»£»£»£»£»£»419Õ©Æ­ÊÇ×î¹ÅÀϵÄÀàÐÍÖ®Ò»£¬£¬£¬£¬£¬Í¨³£ÊÇð³äµÄ״ʦ¼û¸æÄ¿µÄÒѹʵÄÇׯÝÒѽ«¾Þ¶î²Æ²úÒÅÔù¸øËûÃÇ£¬£¬£¬£¬£¬Ã¿Ô»á¼ì²âµ½ÊýÊ®ÍòÌõ´ËÀàÐÂÎÅ£»£»£»£»£»£»Ú²Æ­ÀÕË÷µÄÓʼþÒª±ÈÆäËüÀàÐͶàµÃ¶à£¬£¬£¬£¬£¬´Ó3Ôµ½6ÔÂÓÐÁè¼Ý1200ÍòÌõÀÕË÷ÐÅÏ¢£»£»£»£»£»£»3Ôµ½6Ô£¬£¬£¬£¬£¬Ñо¿Ö°Ô±¼ì²âµ½347141·âÓïÒô´¹ÂÚÓʼþ¡£¡£¡£¡£


https://securelist.com/mail-text-scam/106926/