΢ÈíÐû²¼8Ô·ÝÖܶþ²¹¶¡£¡£¡£ ¡£¡£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´121¸öÇå¾²Îó²î

Ðû²¼Ê±¼ä 2022-08-10
1¡¢Î¢ÈíÐû²¼8Ô·ÝÖܶþ²¹¶¡£¡£¡£ ¡£¡£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´121¸öÇå¾²Îó²î

      

8ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ ΢ÈíÐû²¼Á˱¾ÔµÄÖܶþ²¹¶¡£¡£¡£ ¡£¡£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´ÁË121¸öÎó²î¡£¡£¡£ ¡£¡£´Ë´Î¸üÐÂÐÞ¸´ÁËÁ½¸ö0 day£¬£¬£¬£¬£¬£¬»®·ÖΪMicrosoft WindowsÖ§³ÖÕï¶Ï¹¤¾ß(MSDT)ÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡°DogWalk¡±£¨CVE-2022-34713£©ºÍMicrosoft ExchangeÖеÄÐÅϢй¶Îó²î£¨CVE-2022-30134£©£¬£¬£¬£¬£¬£¬ÆäÖÐDogWalkÒÑÔÚ¹¥»÷Öб»Æð¾¢Ê¹Óᣡ£¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËActive DirectoryÓòЧÀÍÌáȨÎó²î£¨CVE-2022-34691£©ºÍWindows Hyper-VÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2022-34696£©µÈ½ÏΪÑÏÖØµÄÎó²î¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2022-patch-tuesday-fixes-exploited-zero-day-121-flaws/


2¡¢µ¤Âó7-11µÄÖ§¸¶ÏµÍ³Ôâµ½¹¥»÷£¬£¬£¬£¬£¬£¬ÌìÏÂÃŵêÔÝʱ¹Ø±Õ

      

¾ÝýÌå8ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬µ¤Âó7-11µÄÖ§¸¶ÏµÍ³Ôâµ½¹¥»÷ºó£¬£¬£¬£¬£¬£¬ÌìϹæÄ£ÄÚµÄËùÓÐÃŵêÔÝʱ¹Ø±Õ¡£¡£¡£ ¡£¡£¹¥»÷±¬·¢ÔÚ8ÔÂ8ÈÕÔçÉÏ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚFacebookÉÏ·¢Ìû³ÆËûÃÇ¿ÉÄÜÔâµ½Á˺ڿ͹¥»÷£¬£¬£¬£¬£¬£¬Ö§¸¶ºÍ½áÕËϵͳÎÞ·¨Ê¹Óᣡ£¡£ ¡£¡£7-11Ô±¹¤ÔÚRedditÉÏ͸¶³Æ£¬£¬£¬£¬£¬£¬ÓÉÓÚÌìϵÄ7-11¶¼Ê¹ÓÃÁËÏàͬµÄϵͳ£¬£¬£¬£¬£¬£¬ÒÔÊǵ¤ÂóËùÓÐ7-11ÃŵêÏÖÔÚ¶¼ÒѹرÕ¡£¡£¡£ ¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬»¹Ã»ÓйØÓÚÕâ´Î¹¥»÷µÄ½øÒ»²½Ï¸½Ú£¬£¬£¬£¬£¬£¬ÀýÈç¹¥»÷ÊÇ·ñÉæ¼°ÀÕË÷Èí¼þ¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/7-eleven-stores-in-denmark-closed-due-to-a-cyberattack/


3¡¢Twilio͸¶ÆäÔ±¹¤Ôâµ½´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§Êý¾Ýй¶

     

ýÌå8ÔÂ8Èճƣ¬£¬£¬£¬£¬£¬ÔÆÍ¨Ñ¶¹«Ë¾Twilio²¿·Ö¿Í»§µÄÊý¾ÝÒѾ­Ð¹Â¶¡£¡£¡£ ¡£¡£TwilioÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ8ÔÂ4ÈÕ·¢Ã÷ÆäÔ±¹¤Ôâµ½ÁËÖØ´óµÄ´¹ÂÚ¹¥»÷ºóƾ֤й¶£¬£¬£¬£¬£¬£¬È»ºó¹¥»÷ÕßʹÓÃÇÔÈ¡µÄƾ֤»á¼ûÁ˹«Ë¾µÄÄÚ²¿ÏµÍ³£¬£¬£¬£¬£¬£¬ÒÔ¼°²¿·Ö¿Í»§µÄÊý¾Ý¡£¡£¡£ ¡£¡£¹¥»÷Õßð³äTwilioµÄIT²¿·Ö£¬£¬£¬£¬£¬£¬ÒªÇóÄ¿µÄµã»÷°üÀ¨Twilio¡¢OktaºÍSSOÒªº¦×ÖµÄURL£¬£¬£¬£¬£¬£¬²¢½«ËûÃÇÖØ¶¨Ïòµ½Î±ÔìµÄTwilioµÇÂ¼Ò³Ãæ¡£¡£¡£ ¡£¡£TwilioÒÑ×÷·ÏÁ˹¥»÷ʱ´ú±»µÁµÄÔ±¹¤ÕË»§£¬£¬£¬£¬£¬£¬µ«ÉÐδȷ¶¨¹¥»÷ÕßÉí·Ý£¬£¬£¬£¬£¬£¬ÏÖÔÚÕýÔÚÓëÖ´·¨²¿·ÖÏàÖú¶Ô´ËÊÂÕö¿ªÊӲ졣¡£¡£ ¡£¡£


https://securityaffairs.co/wordpress/134147/data-breach/twilio-discloses-data-breach.html


4¡¢Ð½©Ê¬ÍøÂçOrchardʹÓÃÖб¾´ÏµÄÕË»§ÐÅÏ¢À´ÌìÉúDGAÓò

      

¾Ý8ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÃûΪOrchardµÄн©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬Ê¹ÓñÈÌØ±Ò½¨ÉèÕßSatoshi NakamotoµÄÕË»§ÉúÒâÐÅÏ¢ÌìÉúDGAÓòÀ´Òþ²ØÆäC2»ù´¡ÉèÊ©¡£¡£¡£ ¡£¡£×Ô2021Äê2ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬OrchardÂÄÀúÁËÈý´Î¸üС£¡£¡£ ¡£¡£¸Ã½©Ê¬ÍøÂç½ÓÄÉÁËÓ²±àÂëÓò+DGAµÄÈßÓàC2»úÖÆ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÿ¸ö°æ±¾¶¼°üÀ¨Ò»¸öΨһµÄÓ²±àÂëDuckDNS¶¯Ì¬ÓòÃû×÷ΪC2¡£¡£¡£ ¡£¡£ËüµÄÈý¸ö°æ±¾»ù±¾Ö§³ÖÏàͬµÄ¹¦Ð§£¬£¬£¬£¬£¬£¬°üÀ¨ÉÏ´«×°±¸ºÍÓû§ÐÅÏ¢¡¢ÏìÓ¦ÏÂÁî»òÏÂÔØÖ´ÐÐÄ£¿£¿£¿£¿£¿£¿éµÄÏÂÒ»¸ö½×¶ÎÒÔ¼°Ñ¬È¾USB´æ´¢×°±¸¡£¡£¡£ ¡£¡£


https://thehackernews.com/2022/08/new-orchard-botnet-uses-bitcoin.html


5¡¢KasperskyÅû¶TA428Õë¶Ô¾ü¹¤ÆóÒµºÍÕþ¸®»ú¹¹µÄ¹¥»÷

      

¾ÝKaspersky 8ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÆäÔÚ1Ô·ݼì²âµ½Ò»²¨Õë¶Ô¶«Å·¶à¸ö¹ú¼ÒµÄ¾ü¹¤ÆóÒµºÍ¹«¹²»ú¹¹µÄ¶¨Ïò¹¥»÷¡£¡£¡£ ¡£¡£¹¥»÷ÕßÒÑÀÖ³ÉÈëÇÖÁËÊýÊ®¸öÄ¿µÄ£¬£¬£¬£¬£¬£¬Ö÷ҪΪ°×¶íÂÞ˹¡¢¶íÂÞ˹ÎÚ¿ËÀ¼ºÍ°¢¸»º¹µÈ¹ú¼ÒµÄ¹¤Òµ¹¤³§¡¢Éè¼Æ¾Ö¡¢Ñо¿»ú¹¹ºÍÕþ¸®»ú¹¹µÈ¡£¡£¡£ ¡£¡£¹¥»÷»î¶¯Ê¹ÓÃÁËMicrosoft OfficeÎó²î£¨CVE-2017-11882£©À´×°ÖöñÒâÈí¼þPortDoor£¬£¬£¬£¬£¬£¬²¢ÔÚ½ÓÏÂÀ´µÄ¹¥»÷½×¶Î×°ÖÃÁË5¸öÌØÁíÍâºóÃÅnccTrojan¡¢Logtu¡¢Cotx¡¢DNSepºÍCotSam£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡϵͳÐÅÏ¢ºÍÎļþ¡£¡£¡£ ¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬£¬£¬¸Ã»î¶¯ÓëAPT TA428»î¶¯µÄTTP±£´æÏÔ×ÅÖØµþ¡£¡£¡£ ¡£¡£


https://securelist.com/targeted-attack-on-industrial-enterprises-and-public-institutions/107054/


6¡¢Group-IBÐû²¼¹ØÓÚÕ©Æ­»î¶¯ClassiscamµÄÆÊÎö±¨¸æ

      

8ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬Group-IBÐû²¼Á˹ØÓÚÕ©Æ­»î¶¯ClassiscamµÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£¡£ClassiscamÊÇÒ»ÖÖÖØ´óµÄÕ©Æ­¼´Ð§ÀÍÓªÒµ£¨scam-as-a-service£©£¬£¬£¬£¬£¬£¬ÒÑÓÚ2022Äê3ÔÂÉøÍ¸µ½ÐÂ¼ÓÆÂ¡£¡£¡£ ¡£¡£¸Ã»î¶¯×î³õÓÚ2020Äê±»·¢Ã÷£¬£¬£¬£¬£¬£¬¹¥»÷Õßð³äÕýµ±Âò¼Ò¿¿½üÂô¼Ò£¬£¬£¬£¬£¬£¬ÒªÇó´ÓËûÃǵÄÇåµ¥ÖйºÖÃÉÌÆ·£¬£¬£¬£¬£¬£¬À´ÇÔȡ֧¸¶Êý¾Ý¡£¡£¡£ ¡£¡£¸ÃÕ©Æ­»î¶¯ÒѾ­ÆÕ±éÅ·ÖÞ¡¢CISºÍÖж«µÄ64¸ö¹ú¼Ò£¬£¬£¬£¬£¬£¬2020Äê4Ôµ½2022Äê2ÔÂÒÑΪ¹¥»÷ÕßIJÀûÖÁÉÙ2950ÍòÃÀÔª¡£¡£¡£ ¡£¡£


https://www.group-ib.com/media/classiscam-singapore-global-scam-operation/