΢Èí8Ô·ݵķÇÓ¢ÓïExchangeÇå¾²¸üб£´æBugÒѻعö

Ðû²¼Ê±¼ä 2023-08-11

1¡¢Î¢Èí8Ô·ݵķÇÓ¢ÓïExchangeÇå¾²¸üб£´æBugÒѻعö


¾ÝýÌå8ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Î¢Èí·¢Ã÷8Ô·ÝMicrosoft Exchange ServerÇå¾²¸üб£´æÎÊÌ⣬£¬£¬£¬£¬£¬£¬Òѽ«Æä´ÓWindows UpdateÖÐɾ³ý¡£ ¡£¡£¡£¡£Î¢ÈíÔÚ8ÔÂ8ÈÕÐû²¼Á˴˸üУ¬£¬£¬£¬£¬£¬£¬×ܹ²ÐÞ¸´ÁË6¸öÎó²î¡£ ¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬µ±ÖÎÀíÔ±ÔÚ·ÇÓ¢ÓïЧÀÍÆ÷ÉÏ×°Öøüк󣬣¬£¬£¬£¬£¬£¬·¢Ã÷Exchange WindowsЧÀÍÎÞ·¨Æô¶¯¡£ ¡£¡£¡£¡£×°ÖÃʧ°Ü£¬£¬£¬£¬£¬£¬£¬¹ýʧ´úÂëΪ1603£¬£¬£¬£¬£¬£¬£¬²¢ÁôϹýʧµÄExchange×°Öᣠ¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬£¬¸ÃÎÊÌâÊÇÓÉ¡°Exchange Server 2023Äê8ÔÂSU×°ÖóÌÐòÖеÄÍâµØ»¯ÎÊÌ⡱µ¼ÖµÄ¡£ ¡£¡£¡£¡£ÔÚ·ÇÓ¢Óï²Ù×÷ϵͳÉÏ×°ÖÃ΢ÈíExchange Server 2019»ò2016Çå¾²¸üÐÂʱ£¬£¬£¬£¬£¬£¬£¬×°ÖóÌÐò½«×èÖ¹²¢»Ø¹ö¸ü¸Ä£¬£¬£¬£¬£¬£¬£¬Ê¹Exchange ServerЧÀÍ´¦ÓÚ½ûÓÃ״̬¡£ ¡£¡£¡£¡£Îª´Ë£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÌṩÏàʶ¾ö²½·¥¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-updates-pulled-after-breaking-non-english-installs/


2¡¢Ñо¿Ö°Ô±·¢Ã÷´ó¹æÄ£Ð®ÖÆÔÆÕÊ»§µÄEvilProxy´¹ÂÚ¹¥»÷


ProofpointÔÚ8ÔÂ9ÈÕ³ÆÆä·¢Ã÷ÁËʹÓÃEvilProxy´ó¹æÄ£Ð®ÖÆÔÆÕÊ»§µÄ´¹Âڻ¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±Í¸Â¶£¬£¬£¬£¬£¬£¬£¬ÔÚ3ÔÂÖÁ6ÔÂʱ´ú£¬£¬£¬£¬£¬£¬£¬Ô¼Äª120000·â´¹ÂÚÓʼþ±»·¢Ë͵½È«ÇòÉϰٸöÄ¿µÄÆóÒµ£¬£¬£¬£¬£¬£¬£¬ÒÔÇÔÈ¡Microsoft 365ÕÊ»§¡£ ¡£¡£¡£¡£Ô¼39%µÄÄ¿µÄÊÇC¼¶¸ß¹Ü£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ17%ÊÇÊ×ϯ²ÆÎñ¹Ù£¬£¬£¬£¬£¬£¬£¬9%ÊÇ×ܲúÍÊ×ϯִÐйÙ¡£ ¡£¡£¡£¡£ÕâЩ¹¥»÷ʹÓÃÁË»ùÓÚ·´ÏòÊðÀí¼Ü¹¹µÄ´¹ÂÚ¹¤¾ßEvilProxy£¬£¬£¬£¬£¬£¬£¬²¢Á¬ÏµÊ¹ÓÃÁËÆ·ÅÆÃ°³ä¡¢»úеÈ˼ì²âÈÆ¹ýºÍ¿ª·ÅÖØ¶¨ÏòµÈÊÖÒÕ¡£ ¡£¡£¡£¡£


https://www.proofpoint.com/us/blog/email-and-cloud-threats/cloud-account-takeover-campaign-leveraging-evilproxy-targets-top-level


3¡¢LockBitÉù³ÆÒª¹ûÕæÍßÀï°²Ò½ÁÆÏµÍ³°©Ö¢»¼ÕßµÄÊý¾Ý


¾Ý8ÔÂ9ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïLockBitÉù³ÆÈëÇÖÁËÍßÀï°²Ò½ÁÆÏµÍ³(Varian Medical Systems)£¬£¬£¬£¬£¬£¬£¬²¢ÍþвҪ¹ûÕæ»¼ÕßµÄÒ½ÁÆÊý¾Ý¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾Á¥ÊôÓÚÎ÷ÃÅ×ÓÒ½ÁƼ¯ÍÅ£¬£¬£¬£¬£¬£¬£¬ÊÕÈë´ï30ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬Ö÷Òª¿ª·¢ºÍÏúÊÛÓÃÓÚÖÎÁư©Ö¢µÈ¼²²¡µÄÒ½ÁÆ×°±¸ºÍÈí¼þ¡£ ¡£¡£¡£¡£LockbitÔÚÍøÕ¾ÉÏдµÀ£¬£¬£¬£¬£¬£¬£¬ËùÓÐÊý¾Ý¿âºÍ»¼ÕßÊý¾Ý¶¼Òѱ»Ð¹Â¶²¢×¼±¸ÔÚ²©¿ÍÉÏÐû²¼£¬£¬£¬£¬£¬£¬£¬»¹½«¸¶Êê½ðµÄ×èÖ¹ÈÕÆÚ¶¨Îª8ÔÂ17ÈÕ¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾ÉÐδÅû¶´Ë´ÎÇå¾²ÊÂÎñ¡£ ¡£¡£¡£¡£


https://securityaffairs.com/149307/cyber-crime/varian-medical-systems-lockbit-ransomware.html


4¡¢Freeze.rsºÍSYK Crypter±»ÓÃÓÚ·Ö·¢XWormµÈ¶ñÒâÈí¼þ


FortinetÔÚ8ÔÂ9ÈÕÅû¶ÁËʹÓÃFreeze.rsºÍSYK Crypter·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ7ÔÂ13ÈÕ¼ì²âµ½´¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬¹¥»÷Á´Ê¼ÓÚ¶ñÒâPDFÎļþ¡£ ¡£¡£¡£¡£¸ÃÎļþÖØ¶¨Ïòµ½HTMLÎļþ£¬£¬£¬£¬£¬£¬£¬²¢Ê¹Óá°search-ms¡±Ð­Òé»á¼ûÔ¶³ÌЧÀÍÆ÷ÉϵÄLNKÎļþ¡£ ¡£¡£¡£¡£·­¿ªLNKÎļþºó£¬£¬£¬£¬£¬£¬£¬PowerShell¾ç±¾»áÖ´ÐÐFreeze.rsºÍSYK Crypter£¬£¬£¬£¬£¬£¬£¬ÒÔÖ´ÐнøÒ»²½µÄ¹¥»÷¡£ ¡£¡£¡£¡£×îÖÕ£¬£¬£¬£¬£¬£¬£¬»á¼ÓÔØXWormºÍRemcos£¬£¬£¬£¬£¬£¬£¬²¢ÓëC2ЧÀÍÆ÷½¨ÉèͨѶ¡£ ¡£¡£¡£¡£


https://www.fortinet.com/blog/threat-research/malware-distributed-via-freezers-and-syk-crypter


5¡¢Trend MicroÏêÊöRhysidaÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄ¹¥»÷


8ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬Trend Micro¸ÅÊöÁËÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄÐÂÐÍRhysidaÀÕË÷Èí¼þµÄ¹¥»÷»î¶¯¡£ ¡£¡£¡£¡£RhysidaÖ÷ÒªÕë¶ÔÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉúÆø¹¹£¬£¬£¬£¬£¬£¬£¬Í¨³£Ê×ÏÈͨ¹ý´¹ÂÚ¹¥»÷ÈëÇÖÄ¿µÄµÄÅÌËã»ú£¬£¬£¬£¬£¬£¬£¬È»ºóʹÓÃCobalt StrikeÔÚϵͳÄÚºáÏòÒÆ¶¯¡£ ¡£¡£¡£¡£¹¥»÷ÕßÖ´ÐÐPsExecÀ´×°ÖÃPowerShell¾ç±¾ºÍRhysida payload¡£ ¡£¡£¡£¡£PowerShell¾ç±¾±»ÓÃÓÚÖÕÖ¹AVÀú³Ì¡¢É¾³ý¾íÓ°¸±±¾²¢ÐÞ¸ÄRDPÉèÖ㬣¬£¬£¬£¬£¬£¬ÕâÅú×¢¼ÓÃܳÌÐòÈÔÔÚÆð¾¢¿ª·¢ÖС£ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ½ÓÄÉ4096λRSAÃÜÔ¿ºÍAES-CTRÀ´¼ÓÃÜÎļþ¡£ ¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/h/an-overview-of-the-new-rhysida-ransomware.html


6¡¢Check PointÐû²¼2023Äê7ÔÂÈ«ÇòÍþвָÊýµÄ±¨¸æ


8ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬Check PointÐû²¼ÁË2023Äê7ÔÂÈ«ÇòÍþвָÊýµÄÆÊÎö±¨¸æ¡£ ¡£¡£¡£¡£7Ô·Ý×îÊ¢ÐеĶñÒâÈí¼þÊÇQbot£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÈ«Çò5%µÄ×éÖ¯£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇFormbook£¨4%£©ºÍRemcos£¨2%£©¡£ ¡£¡£¡£¡£È«ÇòÔâµ½¹¥»÷×î¶àµÄÐÐÒµÊǽÌÓýºÍÑо¿ÐÐÒµ£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÕþ¸®ºÍ¾üÊÂÐÐÒµ£¬£¬£¬£¬£¬£¬£¬È»ºóÊÇÒ½ÁƱ£½¡ÐÐÒµ¡£ ¡£¡£¡£¡£×î³£±»Ê¹ÓõÄÎó²îWebЧÀÍÆ÷¶ñÒâURLĿ¼±éÀúÎó²î£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÈ«Çò49%µÄ×éÖ¯£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇApache Log4jÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨45%£©ºÍHTTP±êÍ·Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨42%£©¡£ ¡£¡£¡£¡£×î³£¼ûµÄÒÆ¶¯¶ñÒâÈí¼þAnubis£¬£¬£¬£¬£¬£¬£¬È»ºóÊÇSpinOkºÍAhMyth¡£ ¡£¡£¡£¡£


https://blog.checkpoint.com/security/july-2023s-most-wanted-malware-remote-access-trojan-rat-remcos-climbs-to-third-place-while-mobile-malware-anubis-returns-to-top-spot/