΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬£¬×ܼÆÐÞ¸´84¸öÇå¾²Îó²î
Ðû²¼Ê±¼ä 2022-07-13
7ÔÂ12ÈÕ£¬£¬£¬£¬Î¢ÈíÐû²¼7Ô·ݵÄÖܶþ²¹¶¡£¬£¬£¬£¬ÐÞ¸´Á˰üÀ¨Ò»¸öÒѱ»Ê¹ÓõÄ0 dayÔÚÄÚµÄ84¸öÎó²î¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´ÁË52¸öÌáȨÎó²î¡¢4¸öÇå¾²¹¦Ð§ÈƹýÎó²î¡¢12¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡¢11¸öÐÅϢй¶Îó²îºÍ5¸ö¾Ü¾øÐ§ÀÍÎó²î¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬Òѱ»ÔÚҰʹÓõÄÎó²îÊÇWindows CSRSSȨÏÞÌáÉýÎó²î£¨CVE-2022-22047£©£¬£¬£¬£¬Î¢ÈíÚ¹ÊͳÆÀÖ³ÉʹÓôËÎó²î¿É»ñµÃϵͳȨÏÞ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²î°üÀ¨WindowsͼÐÎ×é¼þÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-30221£©ºÍWindows ÍøÂçÎļþϵͳԶ³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-22029£©µÈ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2022-patch-tuesday-fixes-exploited-zero-day-84-flaws/
2¡¢ÐÂÀÕË÷Èí¼þHavanaCryptαװ³ÉGoogleÈí¼þ¸üÐÂÀ´·Ö·¢
Trend MicroÔÚ7ÔÂ6ÈÕÅû¶ÁËÐÂÀÕË÷Èí¼þHavanaCryptµÄ·Ö·¢»î¶¯¡£¡£¡£¡£¡£¡£Ôڴ˴λÖУ¬£¬£¬£¬¶ñÒâÈí¼þαװ³ÉGoogleÈí¼þ¸üÐÂÓ¦ÓóÌÐò£¬£¬£¬£¬²¢Ê¹ÓÃMicrosoftÍøÂçÍйÜЧÀÍIPµØµã×÷ΪÆäC2ЧÀÍÆ÷À´ÈƹýÇå¾²¼ì²â¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬ÀÕË÷Èí¼þÔÚ¼ÓÃÜʱ´úʹÓÃÀ´×Ô¿ªÔ´ÃÜÔ¿ÖÎÀíÆ÷KeePass Password Safe´úÂ룬£¬£¬£¬²¢Ê¹ÓÃÃûΪ¡°QueueUserWorkItem¡±µÄ.Netº¯ÊýÀ´¼ÓËÙ¼ÓÃÜ¡£¡£¡£¡£¡£¡£Trend MicroÖ¸³ö£¬£¬£¬£¬HavanaCrypt¿ÉÄÜÈÔ´¦ÓÚ¿ª·¢½×¶Î£¬£¬£¬£¬ÓÉÓÚËü²»»áÔÚ±»Ñ¬È¾µÄϵͳÉÏÁôÏÂÊê½ð¼Í¼¡£¡£¡£¡£¡£¡£
https://www.trendmicro.com/en_us/research/22/g/brand-new-havanacrypt-ransomware-poses-as-google-software-update.html
3¡¢Anubis NetworksÔٴλع飬£¬£¬£¬Õë¶Ô°ÍÎ÷ºÍÆÏÌÑÑÀ´¹ÂÚ¹¥»÷
¾ÝSeguran?a Inform¨¢ticaÔÚ7ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬Anubis NetworkÒÑ´ø×ÅеÄC2ЧÀÍÆ÷»Ø¹é¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯×Ô2022Äê3ÔÂ×îÏÈ£¬£¬£¬£¬Ö÷ÒªÕë¶Ô°ÍÎ÷ºÍÆÏÌÑÑÀµÄ»¥ÁªÍøÓû§¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÉÈý¸öÒªº¦µÄ²¿·Ö×é³É£ºÔÚÒ°Èö²¥ÐéαµÇÂ¼Ò³ÃæµÄ½»¸¶¹¤¾ß£¬£¬£¬£¬Í¨³£Í¨¹ý¶ÌÐźʹ¹ÂÚµç×ÓÓʼþ¾ÙÐУ»£»£»£»£»ÍйÜÔÚÔÆÐ§ÀÍÆ÷ÉϵĶñÒâµÇÂ¼Ò³Ãæ£¬£¬£¬£¬ÓÉÓëÕæÊµÏµÍ³ºÜÊÇÏàËÆµÄÓû§½çÃæºÍ½á¹¹×é³É£»£»£»£»£»Ò»¸ö¿ØÖƺó¶Ë£¬£¬£¬£¬±»¹¥»÷ÕßÓÃÓÚÖÎÀíÄ¿µÄÓû§µÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://seguranca-informatica.pt/anubis-networks-is-back-with-new-c2-server/#.Ys0jP3ZBxPa
4¡¢Ó¢¹ú½ðÈÚЧÀ͹«Ë¾Aon½ü15Íò¸ö±±ÃÀ¿Í»§µÄСÎÒ˽¼ÒÐÅϢй¶
¾ÝýÌå7ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬Ó¢¹ú¿ç¹ú½ðÈÚЧÀ͹«Ë¾âù°²£¨Aon£©145889¸ö±±ÃÀ¿Í»§µÄÐÅϢй¶¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬´Ó2020Äê12ÔÂ29ÈÕµ½2022Äê2ÔÂ26ÈÕ£¬£¬£¬£¬ºÚ¿ÍÔÚ²î±ðʱ¼äÄÚÈëÇÖÁËÆäϵͳ¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÐÅÏ¢°üÀ¨¼ÝÕÕºÅÂë¡¢Éç»áÇå¾²ºÅÂëºÍ¸£Àû¹ÒºÅÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£AonÉù³ÆÒѽÓÄɲ½·¥È·ÈÏδ¾ÊÚȨµÄµÚÈý·½²»ÔÙÓÐȨ»á¼ûÊý¾Ý£¬£¬£¬£¬ÇÒÐÅÏ¢²¢Î´±»ÀÄÓᣡ£¡£¡£¡£¡£ÓÉÓÚÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬AonÃæÁÙÖÁÉÙÁ½ÆðÕûÌåËßËÏ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¸Ã¹«Ë¾ÎªÊÜÓ°ÏìµÄ¿Í»§ÌṩÁË24¸öÔµÄÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/aon-hack-sensitive-information/
5¡¢Resecurity³ÆÀÕË÷ÍÅ»ïALPHVÒªÇóµÄÊê½ðÒÑ´ï250ÍòÃÀÔª
¾Ý7ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬ÀÕË÷ÍÅ»ïALPHV£¨ÓÖÃûBlackCat£©ÒªÇóµÄÊê½ðÒÑ´ï250ÍòÃÀÔª¡£¡£¡£¡£¡£¡£ALPHVÖÁÉÙ´ÓÈ¥Äê11Ô¾Í×îÏÈÔËÓªÁË£¬£¬£¬£¬Ëü×îÏÈÒªÇó250ÍòÃÀÔªºÍ¿¿½üÒ»°ëµÄÕÛ¿Û£¬£¬£¬£¬ÒÔ¼¤ÀøÄ¿µÄ¾¡¿ì¸¶Êê½ð£¬£¬£¬£¬Áô¸øÄ¿µÄµÄÖ§¸¶Ê±¼äÔÚ5-7Ìì²»µÈ¡£¡£¡£¡£¡£¡£ResecurityÌåÏÖ£¬£¬£¬£¬×Ô2020ÄêÒÔÀ´£¬£¬£¬£¬Æ½¾ùÀÕË÷Êê½ð¶îÔöÌíÁË82%£¬£¬£¬£¬ÖÁ2021ÄêÉϰëÄêΪ570000ÃÀÔª£¬£¬£¬£¬µÖ´ïÀúʷиߣ¬£¬£¬£¬È»ºóµ½2022ÄêÏÕЩ·ÁËÒ»·¬¡£¡£¡£¡£¡£¡£×îÐÂÕ¹ÍûÊǵ½2031Ä꣬£¬£¬£¬È«ÇòÀÕË÷»î¶¯½«µÖ´ï2650ÒÚÃÀÔª£¬£¬£¬£¬¶ÔÈ«ÇòÆóÒµÔì³ÉµÄ×ÜËðʧ½«µÖ´ï10.5ÍòÒÚÃÀÔª¡£¡£¡£¡£¡£¡£
https://resecurity.com/blog/article/blackcat-aka-alphv-ransomware-is-increasing-stakes-up-to-25m-in-demands
6¡¢KasperskyÐû²¼ÓйػùÓÚÎı¾µÄڲƻµÄÆÊÎö±¨¸æ
7ÔÂ11ÈÕ£¬£¬£¬£¬KasperskyÐû²¼ÁËÓйػùÓÚÎı¾µÄڲƻµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬»ùÓÚÎı¾µÄڲƿÉÒÔ·ÖΪ¼¸ÖÖÀàÐÍ£ºÔ¼»áÕ©Æ¡¢419Õ©Æ¡¢Ú²ÆÀÕË÷ºÍÓïÒôÍøÂç´¹ÂÚ¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬Ô¼»áÕ©ÆÊÇ×î²»³£¼ûµÄÀàÐÍ£¬£¬£¬£¬´Ó2022Äê3Ôµ½6Ô£¬£¬£¬£¬¼ì²âµ½49536Ìõ´ËÀàÐÂÎÅ£»£»£»£»£»419Õ©ÆÊÇ×î¹ÅÀϵÄÀàÐÍÖ®Ò»£¬£¬£¬£¬Í¨³£ÊÇð³äµÄ״ʦ¼û¸æÄ¿µÄÒѹʵÄÇׯÝÒѽ«¾Þ¶î²Æ²úÒÅÔù¸øËûÃÇ£¬£¬£¬£¬Ã¿Ô»á¼ì²âµ½ÊýÊ®ÍòÌõ´ËÀàÐÂÎÅ£»£»£»£»£»Ú²ÆÀÕË÷µÄÓʼþÒª±ÈÆäËüÀàÐͶàµÃ¶à£¬£¬£¬£¬´Ó3Ôµ½6ÔÂÓÐÁè¼Ý1200ÍòÌõÀÕË÷ÐÅÏ¢£»£»£»£»£»3Ôµ½6Ô£¬£¬£¬£¬Ñо¿Ö°Ô±¼ì²âµ½347141·âÓïÒô´¹ÂÚÓʼþ¡£¡£¡£¡£¡£¡£
https://securelist.com/mail-text-scam/106926/