CiscoÐû²¼Çå¾²¸üУ¬£¬ £¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄ8¸öÎó²î

Ðû²¼Ê±¼ä 2022-08-05
1¡¢CiscoÐû²¼Çå¾²¸üУ¬£¬ £¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄ8¸öÎó²î

      

8ÔÂ3ÈÕ£¬£¬ £¬CiscoÐû²¼Çå¾²¸üУ¬£¬ £¬×ܼÆÐÞ¸´ÁË8¸öÎó²î¡£¡£¡£¡£ÆäÖУ¬£¬ £¬½ÏΪÑÏÖØµÄÊÇCisco Small Business RVϵÁзÓÉÆ÷ÖеÄÎó²îCVE-2022-20842£¬£¬ £¬CVSSÆÀ·ÖΪ9.8£¬£¬ £¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÓÃÀ´Ö´ÐÐí§Òâ´úÂ룬£¬ £¬»òʹװ±¸ÒâÍâÖØÆô´Ó¶øµ¼Ö¾ܾøÐ§ÀÍ(DoS)£» £»£»£»£»ÉÐÓÐWeb¹ýÂËÆ÷Êý¾Ý¿â¸üй¦Ð§ÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2022-20827£©ºÍ¿ª·Å¼´²å¼´ÓÃ(PnP)Ä£¿£¿£¿£¿éÏÂÁî×¢ÈëÎó²î£¨CVE-2022-20841£©£¬£¬ £¬ÒÔÉÏÈý¸öÎó²î¾ùΪÊäÈëÑé֤ȱ·¦µ¼ÖµÄ¡£¡£¡£¡£±ðµÄ£¬£¬ £¬»¹ÐÞ¸´ÁËWebex MeetingsºÍÉí·ÝЧÀÍÒýÇæµÈ²úÆ·ÖеĶà¸öÎó²î¡£¡£¡£¡£


https://thehackernews.com/2022/08/cisco-business-routers-found-vulnerable.html


2¡¢µÂ¹ú¹¤ÉÌЭ»á³ÆÆäÔâµ½´ó¹æÄ£¹¥»÷±»ÆÈ¹Ø±ÕËùÓÐϵͳ

      

¾ÝýÌå8ÔÂ4ÈÕ±¨µÀ£¬£¬ £¬µÂ¹ú¹¤ÉÌЭ»á(DIHK)³ÆÆäÔâµ½ÁË´ó¹æÄ£µÄ¹¥»÷¡£¡£¡£¡£DIHKÊÇÓÉ79¸ö´ú±íµÂ¹ú¹«Ë¾µÄÉÌ»á×é³ÉµÄͬÃË£¬£¬ £¬ÓµÓÐÁè¼Ý300Íò»áÔ±¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ8ÔÂ3ÈÕ£¬£¬ £¬Ð­»á±»ÆÈ¹Ø±ÕÆäËùÓÐITϵͳ£¬£¬ £¬ÒÔ¼°Êý×ÖЧÀÍ¡¢µç»°ºÍµç×ÓÓʼþЧÀÍÆ÷À´Ó¦¶Ô´Ë´Î¹¥»÷¡£¡£¡£¡£DIHKÉùÃ÷¹Ø±ÕϵͳÊÇÒ»ÖÖÔ¤·À²½·¥£¬£¬ £¬Ò²ÊÇÈÃITÍŶÓÓÐʱ¼äÌá³ö½â¾ö¼Æ»®ºÍ½¨Éè·ÀÓùµÄ·½·¨¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬¸Ã»ú¹¹ÕýÔÚÖð²½»Ö¸´Ò»Ð©Ð§ÀÍ£¬£¬ £¬µ«ÎÞ·¨Õ¹ÍûÐèÒª¶à³¤Ê±¼ä¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/german-chambers-of-industry-and-commerce-hit-by-massive-cyberattack/


3¡¢RobinhoodÒòÎ¥·´Å¦Ô¼ÍøÂçÇå¾²¹æÔò±»·£¿£¿£¿£¿î3000ÍòÃÀÔª

      

ýÌå8ÔÂ3Èճƣ¬£¬ £¬RobinhoodµÄ¼ÓÃÜÇ®±Ò²¿·ÖÒòÎ¥·´ÍøÂçÇå¾²ºÍÏ´Ç®¹æÔò¶ø±»Å¦Ô¼½ðÈÚЧÀͲ¿·£¿£¿£¿£¿î3000ÍòÃÀÔª¡£¡£¡£¡£Å¦Ô¼½ðÈÚЧÀͲ¿µÄÉùÃ÷ÌåÏÖ£¬£¬ £¬Robinhood CryptoÍøÂçÇå¾²ÍýÏë±£´æÎÊÌ⣬£¬ £¬Ã»ÓÐÍêÈ«½â¾öRHCµÄÔËӪΣº¦£¬£¬ £¬²¢ÇÒ¸ÃÍýÏëÖеÄÏêϸÕþ²ß²»ÍêÈ«ÇкÏÍøÂçÇå¾²ºÍÐéÄâÇ®±Ò¹æÔòµÄ¼¸Ïî»®¶¨£¬£¬ £¬ÇҸù«Ë¾µÄºÏ¹æÍýÏëºÍÉúÒâ¼à¿ØÏµÍ³Öеı£´æÈ±ÏÝ¡£¡£¡£¡£³ýÁË3000ÍòÃÀÔªµÄ·£¿£¿£¿£¿îÍ⣬£¬ £¬¸Ã¹«Ë¾»¹ÐèÒªÔ¼ÇëÒ»Ãû×ÔÁ¦ÕÕÁÏÀ´ÖÜÈ«ÆÀ¹ÀRobinhood Crypto¹æÔòµÄ×ñÊØÇéÐΣ¬£¬ £¬²¢ÐÞ¸´ÒÑ·¢Ã÷µÄȱÏݺÍÎ¥¹æÐÐΪ¡£¡£¡£¡£


https://www.securityweek.com/robinhood-crypto-penalized-30m-violating-ny-cybersecurity-regulations


4¡¢Ô¼Äª35000¸öGitHub´æ´¢¿â±»¿Ë¡²¢Ìí¼Ó¶ñÒâ´úÂë

      

8ÔÂ3ÈÕ£¬£¬ £¬Èí¼þ¿ª·¢Ö°Ô±Stephen LacyÉù³ÆÔÚGitHubÉÏ·¢Ã÷ÁËÔ¼35000¸ö´æ´¢¿â±»¿Ë¡²¢Ìí¼Ó¶ñÒâ´úÂë¡£¡£¡£¡£¿£¿£¿£¿ª·¢Ö°Ô±James TuckerÖ¸³ö£¬£¬ £¬°üÀ¨¶ñÒâURLµÄ¿Ë¡´æ´¢¿â²»µ«Ð¹Â¶ÁËÓû§µÄÇéÐαäÁ¿ £¬£¬ £¬²¢ÇÒ»¹°üÀ¨Ò»¸öµ¥ÐкóÃÅ¡£¡£¡£¡£ÆäÖоø´ó´ó¶¼¿Ë¡µÄ´æ´¢¿âÔÚÉϸöÔ±»¶ñÒâ´úÂë¸Ä¶¯£¬£¬ £¬µ«Ò²µ½Ò»Ð©¿É×·Ëݵ½2015Äê¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬GitHubÍŶÓÒÑ´ÓÆäÆ½Ì¨ÉÑþ³ØýÁ˶ñÒâ¿Ë¡´æ´¢¿â¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/35-000-code-repos-not-hacked-but-clones-flood-github-to-serve-malware/


5¡¢Zscaler·¢Ã÷ʹÓÃAiTMÊÖÒպͶàÖÖÈÆ¹ýÕ½ÂԵĴ¹ÂÚ¹¥»÷

      

ZscalerÔÚ8ÔÂ2ÈÕÅû¶ÁËʹÓÃAiTMÊÖÒÕÒÔ¼°¶àÖÖÈÆ¹ýÕ½ÂԵĴó¹æÄ£ÍøÂç´¹Âڻ¡£¡£¡£¡£´Ë´Î»î¶¯×îÏÈÓÚ2022Äê6Ô£¬£¬ £¬Ö÷ÒªÕë¶ÔÃÀ¹ú¡¢Ó¢¹ú¡¢ÐÂÎ÷À¼ºÍ°Ä´óÀûÑǵĽðÈڿƼ¼¡¢´û¿î¡¢»á¼Æ¡¢°ü¹ÜºÍÁª°îÐÅÓÃÏàÖúÉç×éÖ¯¡£¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓÃÁË»ùÓÚÊðÀíµÄ×Ô½çËµÍøÂç´¹ÂÚ¹¤¾ß°üÈÆ¹ý¶àÒòËØÈÏÖ¤£¨MFA£©£¬£¬ £¬Ê¹ÓÃÖÖÖÖαװºÍä¯ÀÀÆ÷Ö¸ÎÆÊÖÒÕÀ´Èƹý×Ô¶¯URLÆÊÎöϵͳ£¬£¬ £¬Ê¹ÓÃURLÖØ¶¨ÏòÊÖÒÕÈÆ¹ýÆóÒµµç×ÓÓʼþURLÆÊÎö½â¾ö¼Æ»®£¬£¬ £¬»¹Ê¹ÓÃÁËÕýµ±µÄÔÚÏß´úÂë±à¼­Ð§ÀÍ£¨ÈçCodeSandboxºÍGlitch£©¡£¡£¡£¡£


https://www.zscaler.com/blogs/security-research/large-scale-aitm-attack-targeting-enterprise-users-microsoft-email-services


6¡¢KasperskyÐû²¼2022ÄêQ2 DDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ

      

8ÔÂ3ÈÕ£¬£¬ £¬KasperskyÐû²¼ÁË2022ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬ £¬ÔÚµÚ¶þ¼¾¶È×ܹ²¼Í¼ÁË78558´ÎDDoS¹¥»÷£¬£¬ £¬±ÈÉÏÒ»¼¾¶ÈϽµÁË13.72%¡£¡£¡£¡£³¤Ê±¼ä£¨20Сʱ»ò¸ü³¤£©DDoS¹¥»÷µÄÕ¼±ÈϽµ£¬£¬ £¬´ÓµÚÒ»¼¾¶ÈµÄ½ü20%½µÖÁÔ¼7%£¬£¬ £¬4СʱµÄ½Ï¶ÌDDoS¹¥»÷Õ¼×ܹ¥»÷ÊýÄ¿µÄ95.24%¡£¡£¡£¡£46.17%µÄ½©Ê¬ÍøÂçC2ЧÀÍÆ÷λÓÚÃÀ¹ú£¬£¬ £¬Æä´ÎÊǺÉÀ¼£¨14.49%£©ºÍµÂ¹ú£¨9.11%£©¡£¡£¡£¡£Ö÷ÒªµÄDDoS¹¥»÷ÊÖÒÕΪUDP flood£¬£¬ £¬Õ¼±È62.53%£¬£¬ £¬Æä´ÎÊÇSYN flood£¨20.25%£©¡£¡£¡£¡£


https://securelist.com/ddos-attacks-in-q2-2022/107025/