΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬£¬£¬×ܼÆÐÞ¸´84¸öÇå¾²Îó²î
Ðû²¼Ê±¼ä 2022-07-13
7ÔÂ12ÈÕ£¬£¬£¬£¬£¬Î¢ÈíÐû²¼7Ô·ݵÄÖܶþ²¹¶¡£¬£¬£¬£¬£¬ÐÞ¸´Á˰üÀ¨Ò»¸öÒѱ»Ê¹ÓõÄ0 dayÔÚÄÚµÄ84¸öÎó²î¡£¡£¡£¡£´Ë´ÎÐÞ¸´ÁË52¸öÌáȨÎó²î¡¢4¸öÇå¾²¹¦Ð§ÈƹýÎó²î¡¢12¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡¢11¸öÐÅϢй¶Îó²îºÍ5¸ö¾Ü¾øÐ§ÀÍÎó²î¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬Òѱ»ÔÚҰʹÓõÄÎó²îÊÇWindows CSRSSȨÏÞÌáÉýÎó²î£¨CVE-2022-22047£©£¬£¬£¬£¬£¬Î¢ÈíÚ¹ÊͳÆÀÖ³ÉʹÓôËÎó²î¿É»ñµÃϵͳȨÏÞ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²î°üÀ¨WindowsͼÐÎ×é¼þÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-30221£©ºÍWindows ÍøÂçÎļþϵͳԶ³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-22029£©µÈ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2022-patch-tuesday-fixes-exploited-zero-day-84-flaws/
2¡¢ÐÂÀÕË÷Èí¼þHavanaCryptαװ³ÉGoogleÈí¼þ¸üÐÂÀ´·Ö·¢
Trend MicroÔÚ7ÔÂ6ÈÕÅû¶ÁËÐÂÀÕË÷Èí¼þHavanaCryptµÄ·Ö·¢»î¶¯¡£¡£¡£¡£Ôڴ˴λÖУ¬£¬£¬£¬£¬¶ñÒâÈí¼þαװ³ÉGoogleÈí¼þ¸üÐÂÓ¦ÓóÌÐò£¬£¬£¬£¬£¬²¢Ê¹ÓÃMicrosoftÍøÂçÍйÜЧÀÍIPµØµã×÷ΪÆäC2ЧÀÍÆ÷À´ÈƹýÇå¾²¼ì²â¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÔÚ¼ÓÃÜʱ´úʹÓÃÀ´×Ô¿ªÔ´ÃÜÔ¿ÖÎÀíÆ÷KeePass Password Safe´úÂ룬£¬£¬£¬£¬²¢Ê¹ÓÃÃûΪ¡°QueueUserWorkItem¡±µÄ.Netº¯ÊýÀ´¼ÓËÙ¼ÓÃÜ¡£¡£¡£¡£Trend MicroÖ¸³ö£¬£¬£¬£¬£¬HavanaCrypt¿ÉÄÜÈÔ´¦ÓÚ¿ª·¢½×¶Î£¬£¬£¬£¬£¬ÓÉÓÚËü²»»áÔÚ±»Ñ¬È¾µÄϵͳÉÏÁôÏÂÊê½ð¼Í¼¡£¡£¡£¡£
https://www.trendmicro.com/en_us/research/22/g/brand-new-havanacrypt-ransomware-poses-as-google-software-update.html
3¡¢Anubis NetworksÔٴλع飬£¬£¬£¬£¬Õë¶Ô°ÍÎ÷ºÍÆÏÌÑÑÀ´¹ÂÚ¹¥»÷
¾ÝSeguran?a Inform¨¢ticaÔÚ7ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬£¬Anubis NetworkÒÑ´ø×ÅеÄC2ЧÀÍÆ÷»Ø¹é¡£¡£¡£¡£´Ë´Î»î¶¯×Ô2022Äê3ÔÂ×îÏÈ£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô°ÍÎ÷ºÍÆÏÌÑÑÀµÄ»¥ÁªÍøÓû§¡£¡£¡£¡£¸Ã»î¶¯ÓÉÈý¸öÒªº¦µÄ²¿·Ö×é³É£ºÔÚÒ°Èö²¥ÐéαµÇÂ¼Ò³ÃæµÄ½»¸¶¹¤¾ß£¬£¬£¬£¬£¬Í¨³£Í¨¹ý¶ÌÐźʹ¹ÂÚµç×ÓÓʼþ¾ÙÐУ»£»£»£»£»£»ÍйÜÔÚÔÆÐ§ÀÍÆ÷ÉϵĶñÒâµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬ÓÉÓëÕæÊµÏµÍ³ºÜÊÇÏàËÆµÄÓû§½çÃæºÍ½á¹¹×é³É£»£»£»£»£»£»Ò»¸ö¿ØÖƺó¶Ë£¬£¬£¬£¬£¬±»¹¥»÷ÕßÓÃÓÚÖÎÀíÄ¿µÄÓû§µÄÏêϸÐÅÏ¢¡£¡£¡£¡£
https://seguranca-informatica.pt/anubis-networks-is-back-with-new-c2-server/#.Ys0jP3ZBxPa
4¡¢Ó¢¹ú½ðÈÚЧÀ͹«Ë¾Aon½ü15Íò¸ö±±ÃÀ¿Í»§µÄСÎÒ˽¼ÒÐÅϢй¶
¾ÝýÌå7ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ó¢¹ú¿ç¹ú½ðÈÚЧÀ͹«Ë¾âù°²£¨Aon£©145889¸ö±±ÃÀ¿Í»§µÄÐÅϢй¶¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬´Ó2020Äê12ÔÂ29ÈÕµ½2022Äê2ÔÂ26ÈÕ£¬£¬£¬£¬£¬ºÚ¿ÍÔÚ²î±ðʱ¼äÄÚÈëÇÖÁËÆäϵͳ¡£¡£¡£¡£ÊÜÓ°ÏìµÄÐÅÏ¢°üÀ¨¼ÝÕÕºÅÂë¡¢Éç»áÇå¾²ºÅÂëºÍ¸£Àû¹ÒºÅÐÅÏ¢µÈ¡£¡£¡£¡£AonÉù³ÆÒѽÓÄɲ½·¥È·ÈÏδ¾ÊÚȨµÄµÚÈý·½²»ÔÙÓÐȨ»á¼ûÊý¾Ý£¬£¬£¬£¬£¬ÇÒÐÅÏ¢²¢Î´±»ÀÄÓᣡ£¡£¡£ÓÉÓÚÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬AonÃæÁÙÖÁÉÙÁ½ÆðÕûÌåËßËÏ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÎªÊÜÓ°ÏìµÄ¿Í»§ÌṩÁË24¸öÔµÄÉí·Ý±£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/aon-hack-sensitive-information/
5¡¢Resecurity³ÆÀÕË÷ÍÅ»ïALPHVÒªÇóµÄÊê½ðÒÑ´ï250ÍòÃÀÔª
¾Ý7ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïALPHV£¨ÓÖÃûBlackCat£©ÒªÇóµÄÊê½ðÒÑ´ï250ÍòÃÀÔª¡£¡£¡£¡£ALPHVÖÁÉÙ´ÓÈ¥Äê11Ô¾Í×îÏÈÔËÓªÁË£¬£¬£¬£¬£¬Ëü×îÏÈÒªÇó250ÍòÃÀÔªºÍ¿¿½üÒ»°ëµÄÕÛ¿Û£¬£¬£¬£¬£¬ÒÔ¼¤ÀøÄ¿µÄ¾¡¿ì¸¶Êê½ð£¬£¬£¬£¬£¬Áô¸øÄ¿µÄµÄÖ§¸¶Ê±¼äÔÚ5-7Ìì²»µÈ¡£¡£¡£¡£ResecurityÌåÏÖ£¬£¬£¬£¬£¬×Ô2020ÄêÒÔÀ´£¬£¬£¬£¬£¬Æ½¾ùÀÕË÷Êê½ð¶îÔöÌíÁË82%£¬£¬£¬£¬£¬ÖÁ2021ÄêÉϰëÄêΪ570000ÃÀÔª£¬£¬£¬£¬£¬µÖ´ïÀúʷиߣ¬£¬£¬£¬£¬È»ºóµ½2022ÄêÏÕЩ·ÁËÒ»·¬¡£¡£¡£¡£×îÐÂÕ¹ÍûÊǵ½2031Ä꣬£¬£¬£¬£¬È«ÇòÀÕË÷»î¶¯½«µÖ´ï2650ÒÚÃÀÔª£¬£¬£¬£¬£¬¶ÔÈ«ÇòÆóÒµÔì³ÉµÄ×ÜËðʧ½«µÖ´ï10.5ÍòÒÚÃÀÔª¡£¡£¡£¡£
https://resecurity.com/blog/article/blackcat-aka-alphv-ransomware-is-increasing-stakes-up-to-25m-in-demands
6¡¢KasperskyÐû²¼ÓйػùÓÚÎı¾µÄڲƻµÄÆÊÎö±¨¸æ
7ÔÂ11ÈÕ£¬£¬£¬£¬£¬KasperskyÐû²¼ÁËÓйػùÓÚÎı¾µÄڲƻµÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬»ùÓÚÎı¾µÄڲƿÉÒÔ·ÖΪ¼¸ÖÖÀàÐÍ£ºÔ¼»áÕ©Æ¡¢419Õ©Æ¡¢Ú²ÆÀÕË÷ºÍÓïÒôÍøÂç´¹ÂÚ¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬Ô¼»áÕ©ÆÊÇ×î²»³£¼ûµÄÀàÐÍ£¬£¬£¬£¬£¬´Ó2022Äê3Ôµ½6Ô£¬£¬£¬£¬£¬¼ì²âµ½49536Ìõ´ËÀàÐÂÎÅ£»£»£»£»£»£»419Õ©ÆÊÇ×î¹ÅÀϵÄÀàÐÍÖ®Ò»£¬£¬£¬£¬£¬Í¨³£ÊÇð³äµÄ״ʦ¼û¸æÄ¿µÄÒѹʵÄÇׯÝÒѽ«¾Þ¶î²Æ²úÒÅÔù¸øËûÃÇ£¬£¬£¬£¬£¬Ã¿Ô»á¼ì²âµ½ÊýÊ®ÍòÌõ´ËÀàÐÂÎÅ£»£»£»£»£»£»Ú²ÆÀÕË÷µÄÓʼþÒª±ÈÆäËüÀàÐͶàµÃ¶à£¬£¬£¬£¬£¬´Ó3Ôµ½6ÔÂÓÐÁè¼Ý1200ÍòÌõÀÕË÷ÐÅÏ¢£»£»£»£»£»£»3Ôµ½6Ô£¬£¬£¬£¬£¬Ñо¿Ö°Ô±¼ì²âµ½347141·âÓïÒô´¹ÂÚÓʼþ¡£¡£¡£¡£
https://securelist.com/mail-text-scam/106926/


¾©¹«Íø°²±¸11010802024551ºÅ