΢ÈíÐû²¼6Ô·ݵÄÇå¾²¸üУ¬£¬£¬£¬£¬ £¬£¬×ܼÆÐÞ¸´78¸öÎó²î

Ðû²¼Ê±¼ä 2023-06-14

1¡¢Î¢ÈíÐû²¼6Ô·ݵÄÇå¾²¸üУ¬£¬£¬£¬£¬ £¬£¬×ܼÆÐÞ¸´78¸öÎó²î


¾Ý6ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬£¬Î¢ÈíÐû²¼ÁË2023Äê6ÔµÄÖܶþ²¹¶¡£¬£¬£¬£¬£¬ £¬£¬ÐÞ¸´ÁË78¸öÎó²î£¬£¬£¬£¬£¬ £¬£¬ÆäÖаüÀ¨38¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£ ¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪWindows Pragmatic General Multicast(PGM)ÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-29363¡¢CVE-2023-32014ºÍCVE-2023-32015£©ÒÔ¼°Microsoft SharePoint ServerÖеÄȨÏÞÌáÉýÎó²î£¨CVE-2023-29357£©µÈ¡£¡£¡£ ¡£¡£¡£¡£´Ë´Î¸üв»°üÀ¨ÁãÈÕÎó²î»òÒѱ»Ê¹ÓõÄÎó²î¡£¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2023-patch-tuesday-fixes-78-flaws-38-rce-bugs/


2¡¢ÈðÊ¿Áª°îÖÎÀí¾ÖÔâµ½DDoS¹¥»÷¶à¸öÍøÕ¾ºÍÓ¦Óò»¿ÉÓÃ


ÈðÊ¿Áª°îÖÎÀí¾ÖÔÚ6ÔÂ12ÈÕ͸¶£¬£¬£¬£¬£¬ £¬£¬ÓÉÓÚϵͳÔâµ½DDoS¹¥»÷£¬£¬£¬£¬£¬ £¬£¬Æä¶à¸öÍøÕ¾¼°ÔÚÏßЧÀͲ»¿É»á¼û¡£¡£¡£ ¡£¡£¡£¡£Óë¶íÂÞ˹Ïà¹ØµÄºÚ¿ÍÍÅ»ïNoNameÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬ £¬£¬Ëü×Ô2022ÄêÍ·ÒÔÀ´Ò»Ö±Õë¶ÔÅ·ÖÞ¡¢ÎÚ¿ËÀ¼ºÍ±±ÃÀµÄ¹ú¼ÒºÍ×éÖ¯£¬£¬£¬£¬£¬ £¬£¬ÔÚÉÏÖÜ»¹¹¥»÷ÁËparlament.ch¡£¡£¡£ ¡£¡£¡£¡£¸Ã»ú¹¹³Æ£¬£¬£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±ºÜ¿ì¾Í×¢ÖØµ½Á˴˴ι¥»÷£¬£¬£¬£¬£¬ £¬£¬²¢ÔÚ½ÓÄɲ½·¥¾¡¿ì»Ö¸´ÍøÕ¾ºÍÓ¦ÓõĿÉÓÃÐÔ¡£¡£¡£ ¡£¡£¡£¡£6ÔÂ1ÈÕ£¬£¬£¬£¬£¬ £¬£¬ÀÕË÷ÍÅ»ïPlayÔø¹ûÕæÁË´ÓÈðÊ¿¾üÕþ×éÖ¯µÄÊÖÒÕÌṩÉÌXplainÇÔÈ¡µÄÐÅÏ¢¡£¡£¡£ ¡£¡£¡£¡£


https://www.admin.ch/gov/en/start/documentation/media-releases.msg-id-95641.html


3¡¢HIBPÅû¶ӰÏìÔ¼890ÍòÓû§µÄZacksÊý¾Ýй¶ÊÂÎñ


¾ÝýÌå6ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬£¬Êý¾Ýй¶֪ͨЧÀÍHave I Been Pwned(HIBP)Åû¶ÁËÒ»Æð½ÏÔçµÄZacksÊý¾Ýй¶ÊÂÎñ¡£¡£¡£ ¡£¡£¡£¡£HIBPÊÕµ½ÁËÒ»¸ö°üÀ¨8929503ÌõÓû§¼Í¼µÄÊý¾Ý¿â£¬£¬£¬£¬£¬ £¬£¬ÆäÖаüÀ¨ÐÕÃû¡¢ÓʼþµØµã¡¢Óû§ÃûºÍSHA256ÃÜÂëµÈÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬Êý¾Ý¿âÖÐ×îмͼµÄÈÕÆÚΪ2020Äê5Ô¡£¡£¡£ ¡£¡£¡£¡£¸ÃЧÀÍ֪ͨÁËZecks£¬£¬£¬£¬£¬ £¬£¬ºóÕ߳ƹ¥»÷ÕßÖ»ÄÜ»á¼û¼ÓÃܵÄÃÜÂëÀ´µ­»¯´Ë´ÎÇå¾²ÊÂÎñ¡£¡£¡£ ¡£¡£¡£¡£ÔÚHIBPÅû¶¸ÃÊÂÎñºó²»¾Ã£¬£¬£¬£¬£¬ £¬£¬ZacksÊý¾Ý¿âÓÚ6ÔÂ10ÈÕ±»Ðû²¼ÔÚºÚ¿ÍÂÛ̳ExposedÉÏ¡£¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/have-i-been-pwned-warns-of-new-zacks-data-breach-impacting-8-million/


4¡¢Ó¢¹úͨѶî¿Ïµ»ú¹¹OfcomÔâµ½¹¥»÷²¿·ÖÉñÃØÐÅϢй¶


ýÌå6ÔÂ12Èճƣ¬£¬£¬£¬£¬ £¬£¬Ó¢¹úͨѶî¿Ïµ»ú¹¹OfcomÔâµ½ÁËÁËÀÕË÷ÍÅ»ïClopµÄ¹¥»÷¡£¡£¡£ ¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁËMOVEitÎļþ´«ÊäÖеÄÎó²î(CVE-2023-34362)À´»á¼û¸Ã»ú¹¹µÄ»ù´¡ÉèÊ©¡£¡£¡£ ¡£¡£¡£¡£½²»°ÈË͸¶£¬£¬£¬£¬£¬ £¬£¬¹¥»÷Õ߿ɻá¼ûî¿Ïµ»ú¹¹³ÖÓÐµÄÆäî¿ÏµµÄ¹«Ë¾µÄÉñÃØÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬ÒÔ¼°²¿·ÖOfcomÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£ ¡£¡£¡£¡£ClopÓÚÉÏÖÜÈýÐû²¼ÁËÒ»·ÝÀÕË÷˵Ã÷£¬£¬£¬£¬£¬ £¬£¬Éù³ÆÕÆÎÕÁËÊý°Ù¼ÒÆóÒµµÄÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬²¢ÒªÇóÕâЩ×éÖ¯×Ô¶¯ÁªÏµÆäÀ´Ð­ÉÌÊê½ð£¬£¬£¬£¬£¬ £¬£¬²»È»ÕâЩ×éÖ¯½«ÓÚ6ÔÂ14ÈÕ±»Áгö¡£¡£¡£ ¡£¡£¡£¡£


https://therecord.media/ofcom-cyberattack-uk-regulator-moveit-vulnerability


5¡¢KasperskyÐû²¼¶à½×¶Î¼ÓÔØ³ÌÐòDoubleFingerµÄ±¨¸æ


6ÔÂ12ÈÕ£¬£¬£¬£¬£¬ £¬£¬KasperskyÐû²¼Á˹ØÓÚʹÓÃÐÂÐͶà½×¶Î¼ÓÔØ³ÌÐòDoubleFinger¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£¡£¡£¡£¹¥»÷ʼÓÚespexe.exeµÄÐ޸İ汾£¬£¬£¬£¬£¬ £¬£¬¿É´ÓͼÏñÍйÜЧÀÍImgur¼ìË÷αװ³ÉPNGµÄ¼ÓÃܵÄpayload¡£¡£¡£ ¡£¡£¡£¡£¸Ãpayload»á´¥·¢Ò»¸ö°üÀ¨Ëĸö½×¶ÎµÄ¹¥»÷Á´£¬£¬£¬£¬£¬ £¬£¬×îÖÕ»áÔÚÄ¿µÄÖ÷»úÉÏÖ´ÐÐGreetingGhoul¡£¡£¡£ ¡£¡£¡£¡£GreetingGhoulÊÇÒ»¸öÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬ £¬£¬Ö¼ÔÚÇÔÈ¡Óë¼ÓÃÜÇ®±ÒÏà¹ØµÄƾ֤¡£¡£¡£ ¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯Ö÷ÒªÕë¶ÔÅ·ÖÞ¡¢ÃÀ¹úºÍÀ­¶¡ÃÀÖÞ¡£¡£¡£ ¡£¡£¡£¡£


https://securelist.com/doublefinger-loader-delivering-greetingghoul-cryptocurrency-stealer/109982/


6¡¢Åµ»ùÑÇÐû²¼¹ØÓÚ2023ÄêÈ«ÇòÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


6ÔÂ9ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬ £¬£¬Åµ»ùÑÇÐû²¼Á˹ØÓÚ2023ÄêÈ«ÇòÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£¡£¡£¡£¸Ã±¨¸æÉîÈëÆÊÎöÁË4GºÍ5GÇå¾²¹¥»÷¡¢¶ñÒâÈí¼þ¹¥»÷¡¢DDoS¹¥»÷ÒÔ¼°Õë¶ÔÈ«ÇòÀο¿ºÍÒÆ¶¯ÍøÂçµÄÆäËüÐÎʽµçÐÅÍøÂç¹¥»÷µÄÇ÷ÊÆ¡£¡£¡£ ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬ £¬£¬»ùÓÚ½©Ê¬ÍøÂçµÄDDoS¹¥»÷Éý¼¶£¬£¬£¬£¬£¬ £¬£¬Ê¹Óõı»Ñ¬È¾ÎïÁªÍø×°±¸ÊýÄ¿´Ó200000¼¤ÔöÖÁÔ¼100Íò£¬£¬£¬£¬£¬ £¬£¬ÏÖÔÚÕ¼ËùÓÐDDoSÁ÷Á¿µÄ40%ÒÔÉÏ¡£¡£¡£ ¡£¡£¡£¡£ÒÔÒÆ¶¯Éè±¹ØÁ¬ÄÒøÐÐÐÅϢΪĿµÄµÄľÂíÊýÄ¿·­ÁËÒ»·¬£¬£¬£¬£¬£¬ £¬£¬ÏÖÔÚÕ¼ËùÓÐѬȾµÄ9%¡£¡£¡£ ¡£¡£¡£¡£¼ÒÍ¥ÍøÂçÖеĶñÒâÈí¼þѬȾÓÐËùϽµ£¬£¬£¬£¬£¬ £¬£¬´ÓCovid-19ʱ´úµÄ3%Ͻµµ½1.5%¡£¡£¡£ ¡£¡£¡£¡£


https://www.nokia.com/networks/security-portfolio/threat-intelligence-report/