CiscoÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄ8¸öÎó²î
Ðû²¼Ê±¼ä 2022-08-05
8ÔÂ3ÈÕ£¬£¬£¬CiscoÐû²¼Çå¾²¸üУ¬£¬£¬×ܼÆÐÞ¸´ÁË8¸öÎó²î¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬½ÏΪÑÏÖØµÄÊÇCisco Small Business RVϵÁзÓÉÆ÷ÖеÄÎó²îCVE-2022-20842£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬¿É±»Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÓÃÀ´Ö´ÐÐí§Òâ´úÂ룬£¬£¬»òʹװ±¸ÒâÍâÖØÆô´Ó¶øµ¼Ö¾ܾøÐ§ÀÍ(DoS)£»£»£»ÉÐÓÐWeb¹ýÂËÆ÷Êý¾Ý¿â¸üй¦Ð§ÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2022-20827£©ºÍ¿ª·Å¼´²å¼´ÓÃ(PnP)Ä£¿£¿£¿éÏÂÁî×¢ÈëÎó²î£¨CVE-2022-20841£©£¬£¬£¬ÒÔÉÏÈý¸öÎó²î¾ùΪÊäÈëÑé֤ȱ·¦µ¼Öµġ£¡£¡£¡£¡£±ðµÄ£¬£¬£¬»¹ÐÞ¸´ÁËWebex MeetingsºÍÉí·ÝЧÀÍÒýÇæµÈ²úÆ·ÖеĶà¸öÎó²î¡£¡£¡£¡£¡£
https://thehackernews.com/2022/08/cisco-business-routers-found-vulnerable.html
2¡¢µÂ¹ú¹¤ÉÌÐ»á³ÆÆäÔâµ½´ó¹æÄ£¹¥»÷±»ÆÈ¹Ø±ÕËùÓÐϵͳ
¾ÝýÌå8ÔÂ4ÈÕ±¨µÀ£¬£¬£¬µÂ¹ú¹¤ÉÌлá(DIHK)³ÆÆäÔâµ½ÁË´ó¹æÄ£µÄ¹¥»÷¡£¡£¡£¡£¡£DIHKÊÇÓÉ79¸ö´ú±íµÂ¹ú¹«Ë¾µÄÉÌ»á×é³ÉµÄͬÃË£¬£¬£¬ÓµÓÐÁè¼Ý300Íò»áÔ±¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ8ÔÂ3ÈÕ£¬£¬£¬Ð»á±»ÆÈ¹Ø±ÕÆäËùÓÐITϵͳ£¬£¬£¬ÒÔ¼°Êý×ÖЧÀÍ¡¢µç»°ºÍµç×ÓÓʼþЧÀÍÆ÷À´Ó¦¶Ô´Ë´Î¹¥»÷¡£¡£¡£¡£¡£DIHKÉùÃ÷¹Ø±ÕϵͳÊÇÒ»ÖÖÔ¤·À²½·¥£¬£¬£¬Ò²ÊÇÈÃITÍŶÓÓÐʱ¼äÌá³ö½â¾ö¼Æ»®ºÍ½¨Éè·ÀÓùµÄ·½·¨¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸Ã»ú¹¹ÕýÔÚÖð²½»Ö¸´Ò»Ð©Ð§ÀÍ£¬£¬£¬µ«ÎÞ·¨Õ¹ÍûÐèÒª¶à³¤Ê±¼ä¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/german-chambers-of-industry-and-commerce-hit-by-massive-cyberattack/
3¡¢RobinhoodÒòÎ¥·´Å¦Ô¼ÍøÂçÇå¾²¹æÔò±»·£¿£¿£¿î3000ÍòÃÀÔª
ýÌå8ÔÂ3Èճƣ¬£¬£¬RobinhoodµÄ¼ÓÃÜÇ®±Ò²¿·ÖÒòÎ¥·´ÍøÂçÇå¾²ºÍÏ´Ç®¹æÔò¶ø±»Å¦Ô¼½ðÈÚЧÀͲ¿·£¿£¿£¿î3000ÍòÃÀÔª¡£¡£¡£¡£¡£Å¦Ô¼½ðÈÚЧÀͲ¿µÄÉùÃ÷ÌåÏÖ£¬£¬£¬Robinhood CryptoÍøÂçÇå¾²ÍýÏë±£´æÎÊÌ⣬£¬£¬Ã»ÓÐÍêÈ«½â¾öRHCµÄÔËӪΣº¦£¬£¬£¬²¢ÇÒ¸ÃÍýÏëÖеÄÏêϸÕþ²ß²»ÍêÈ«ÇкÏÍøÂçÇå¾²ºÍÐéÄâÇ®±Ò¹æÔòµÄ¼¸Ïî»®¶¨£¬£¬£¬ÇҸù«Ë¾µÄºÏ¹æÍýÏëºÍÉúÒâ¼à¿ØÏµÍ³Öеı£´æÈ±ÏÝ¡£¡£¡£¡£¡£³ýÁË3000ÍòÃÀÔªµÄ·£¿£¿£¿îÍ⣬£¬£¬¸Ã¹«Ë¾»¹ÐèÒªÔ¼ÇëÒ»Ãû×ÔÁ¦ÕÕÁÏÀ´ÖÜÈ«ÆÀ¹ÀRobinhood Crypto¹æÔòµÄ×ñÊØÇéÐΣ¬£¬£¬²¢ÐÞ¸´ÒÑ·¢Ã÷µÄȱÏݺÍÎ¥¹æÐÐΪ¡£¡£¡£¡£¡£
https://www.securityweek.com/robinhood-crypto-penalized-30m-violating-ny-cybersecurity-regulations
4¡¢Ô¼Äª35000¸öGitHub´æ´¢¿â±»¿Ë¡²¢Ìí¼Ó¶ñÒâ´úÂë
8ÔÂ3ÈÕ£¬£¬£¬Èí¼þ¿ª·¢Ö°Ô±Stephen LacyÉù³ÆÔÚGitHubÉÏ·¢Ã÷ÁËÔ¼35000¸ö´æ´¢¿â±»¿Ë¡²¢Ìí¼Ó¶ñÒâ´úÂë¡£¡£¡£¡£¡£¿£¿£¿ª·¢Ö°Ô±James TuckerÖ¸³ö£¬£¬£¬°üÀ¨¶ñÒâURLµÄ¿Ë¡´æ´¢¿â²»µ«Ð¹Â¶ÁËÓû§µÄÇéÐαäÁ¿ £¬£¬£¬²¢ÇÒ»¹°üÀ¨Ò»¸öµ¥ÐкóÃÅ¡£¡£¡£¡£¡£ÆäÖоø´ó´ó¶¼¿Ë¡µÄ´æ´¢¿âÔÚÉϸöÔ±»¶ñÒâ´úÂë¸Ä¶¯£¬£¬£¬µ«Ò²µ½Ò»Ð©¿É×·Ëݵ½2015Äê¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬GitHubÍŶÓÒÑ´ÓÆäÆ½Ì¨ÉÑþ³ØýÁ˶ñÒâ¿Ë¡´æ´¢¿â¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/35-000-code-repos-not-hacked-but-clones-flood-github-to-serve-malware/
5¡¢Zscaler·¢Ã÷ʹÓÃAiTMÊÖÒպͶàÖÖÈÆ¹ýÕ½ÂԵĴ¹ÂÚ¹¥»÷
ZscalerÔÚ8ÔÂ2ÈÕÅû¶ÁËʹÓÃAiTMÊÖÒÕÒÔ¼°¶àÖÖÈÆ¹ýÕ½ÂԵĴó¹æÄ£ÍøÂç´¹Âڻ¡£¡£¡£¡£¡£´Ë´Î»î¶¯×îÏÈÓÚ2022Äê6Ô£¬£¬£¬Ö÷ÒªÕë¶ÔÃÀ¹ú¡¢Ó¢¹ú¡¢ÐÂÎ÷À¼ºÍ°Ä´óÀûÑǵĽðÈڿƼ¼¡¢´û¿î¡¢»á¼Æ¡¢°ü¹ÜºÍÁª°îÐÅÓÃÏàÖúÉç×éÖ¯¡£¡£¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓÃÁË»ùÓÚÊðÀíµÄ×Ô½çËµÍøÂç´¹ÂÚ¹¤¾ß°üÈÆ¹ý¶àÒòËØÈÏÖ¤£¨MFA£©£¬£¬£¬Ê¹ÓÃÖÖÖÖαװºÍä¯ÀÀÆ÷Ö¸ÎÆÊÖÒÕÀ´Èƹý×Ô¶¯URLÆÊÎöϵͳ£¬£¬£¬Ê¹ÓÃURLÖØ¶¨ÏòÊÖÒÕÈÆ¹ýÆóÒµµç×ÓÓʼþURLÆÊÎö½â¾ö¼Æ»®£¬£¬£¬»¹Ê¹ÓÃÁËÕýµ±µÄÔÚÏß´úÂë±à¼Ð§ÀÍ£¨ÈçCodeSandboxºÍGlitch£©¡£¡£¡£¡£¡£
https://www.zscaler.com/blogs/security-research/large-scale-aitm-attack-targeting-enterprise-users-microsoft-email-services
6¡¢KasperskyÐû²¼2022ÄêQ2 DDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ
8ÔÂ3ÈÕ£¬£¬£¬KasperskyÐû²¼ÁË2022ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ÔÚµÚ¶þ¼¾¶È×ܹ²¼Í¼ÁË78558´ÎDDoS¹¥»÷£¬£¬£¬±ÈÉÏÒ»¼¾¶ÈϽµÁË13.72%¡£¡£¡£¡£¡£³¤Ê±¼ä£¨20Сʱ»ò¸ü³¤£©DDoS¹¥»÷µÄÕ¼±ÈϽµ£¬£¬£¬´ÓµÚÒ»¼¾¶ÈµÄ½ü20%½µÖÁÔ¼7%£¬£¬£¬4СʱµÄ½Ï¶ÌDDoS¹¥»÷Õ¼×ܹ¥»÷ÊýÄ¿µÄ95.24%¡£¡£¡£¡£¡£46.17%µÄ½©Ê¬ÍøÂçC2ЧÀÍÆ÷λÓÚÃÀ¹ú£¬£¬£¬Æä´ÎÊǺÉÀ¼£¨14.49%£©ºÍµÂ¹ú£¨9.11%£©¡£¡£¡£¡£¡£Ö÷ÒªµÄDDoS¹¥»÷ÊÖÒÕΪUDP flood£¬£¬£¬Õ¼±È62.53%£¬£¬£¬Æä´ÎÊÇSYN flood£¨20.25%£©¡£¡£¡£¡£¡£
https://securelist.com/ddos-attacks-in-q2-2022/107025/