΢ÈíÊÓ²ìDefender½«Õýµ±URLʶ±ðΪ¶ñÒâÁ´½ÓµÄÎÊÌâ

Ðû²¼Ê±¼ä 2023-03-31

1¡¢Î¢ÈíÊÓ²ìDefender½«Õýµ±URLʶ±ðΪ¶ñÒâÁ´½ÓµÄÎÊÌâ


¾ÝýÌå3ÔÂ29ÈÕ±¨µÀ £¬£¬ £¬£¬£¬£¬Î¢ÈíÔÚÊÓ²ìÕýµ±URLÁ´½Ó±»Microsoft DefenderЧÀÍʶ±ðΪ¶ñÒâÁ´½ÓµÄÎÊÌâ¡£¡£¡£¡£×ÔÎÊÌâ·ºÆðµÄÎå¸ö¶àСʱÒÔÀ´ £¬£¬ £¬£¬£¬£¬Ò»Ð©¿Í»§ÒѾ­ÊÕµ½ÁËÊýÊ®·âÖÒÑÔÓʼþ¡£¡£¡£¡£Î¢ÈíÌåÏÖ £¬£¬ £¬£¬£¬£¬Ö»¹Ü±£´æÎ󱨾¯±¨ £¬£¬ £¬£¬£¬£¬µ«Óû§ÈÔÈ»Äܹ»»á¼ûÕýµ±URL £¬£¬ £¬£¬£¬£¬ÆäÒ²ÔÚÊÓ²ìЧÀ͵ÄÄÄÒ»²¿·ÖÍÉ»¯½«Õýµ±µÄURLʶ±ðΪ¶ñÒâ¡£¡£¡£¡£3ÔÂ29ÈÕ15:08 EDT¸üÐÂÏÔʾ £¬£¬ £¬£¬£¬£¬Îó±¨ÎÊÌâÒÑͨ¹ý»Ö¸´×î½ü¶ÔSafeLinks¹¦Ð§µÄ¸üнâ¾ö¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-mistakenly-tagging-urls-as-malicious/


2¡¢Ñо¿Ö°Ô±·¢Ã÷ʹÓÃľÂí»¯3CX×ÀÃæÓ¦ÓõũӦÁ´¹¥»÷


ýÌå3ÔÂ29ÈÕ±¨µÀ³Æ £¬£¬ £¬£¬£¬£¬Ñо¿Ö°Ô±Åû¶ÁËʹÓÃľÂí»¯3CX×ÀÃæÓ¦ÓõũӦÁ´¹¥»÷¡£¡£¡£¡£3CXÊÇÒ»¼ÒVoIP IPBXÈí¼þ¿ª·¢¹«Ë¾ £¬£¬ £¬£¬£¬£¬Æä3CX Phone System±»È«ÇòÁè¼Ý600000¼Ò¹«Ë¾Ê¹Óᣡ£¡£¡£SentinelOne͸¶ £¬£¬ £¬£¬£¬£¬Ä¾Âí»¯3CXDesktopAppÊǹ¥»÷Á´ÖеĵÚÒ»½×¶Î £¬£¬ £¬£¬£¬£¬Ëü´ÓGithubÖÐÌáÈ¡¸½¼ÓÁËbase64Êý¾ÝµÄICOÎļþ £¬£¬ £¬£¬£¬£¬²¢×îÖÕµ¼ÖµÚÈý½×¶ÎµÄÐÅÏ¢ÇÔÈ¡³ÌÐòDLL¡£¡£¡£¡£3CX CEO Nick GaleaÌåÏÖ £¬£¬ £¬£¬£¬£¬ÆäʹÓõÄÉÏÓοâÒѱ»Ñ¬È¾ £¬£¬ £¬£¬£¬£¬AndroidºÍiOS°æ±¾²»ÊÜÓ°Ïì¡£¡£¡£¡£Ëû½¨ÒéËùÓÐÓû§Ð¶ÔØ×ÀÃæÓ¦ÓóÌÐò £¬£¬ £¬£¬£¬£¬×ª¶øÊ¹ÓÃPWA¿Í»§¶Ë¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-compromise-3cx-desktop-app-in-a-supply-chain-attack/


3¡¢GoogleÅû¶ʹÓÃAndroidºÍiOSÖжà¸öÎó²îµÄ¹¥»÷»î¶¯


3ÔÂ29ÈÕ £¬£¬ £¬£¬£¬£¬GoogleÅû¶ÁË×î½ü·¢Ã÷µÄÁ½¸ö¹¥»÷»î¶¯ £¬£¬ £¬£¬£¬£¬Ê¹ÓÃÁËAndroid¡¢iOSºÍChromeÖжà¸öÎó²î¡£¡£¡£¡£µÚÒ»¸ö»î¶¯ÓÚ2022Äê11Ô±»·¢Ã÷ £¬£¬ £¬£¬£¬£¬Ê¹ÓÃÁËiOS WebKit RCEÎó²î(CVE-2022-42856)ºÍChrome GPUɳÏäÈÆ¹ýÎó²î(CVE-2022-4135)µÈ £¬£¬ £¬£¬£¬£¬Ö÷ÒªÕë¶ÔÒâ´óÀû¡¢ÂíÀ´Î÷ÑǺ͹þÈø¿Ë˹̹¡£¡£¡£¡£2022Äê12Ô £¬£¬ £¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Á˵ڶþ¸ö»î¶¯ £¬£¬ £¬£¬£¬£¬Ê¹ÓÃÁËCVE-2022-4262ºÍCVE-2023-0266µÈÎó²î £¬£¬ £¬£¬£¬£¬Õë¶Ô×îа汾µÄÈýÐÇä¯ÀÀÆ÷¡£¡£¡£¡£ËüδÀ´×Ô°¢À­²®ÁªºÏÇõ³¤¹ú(UAE)µÄÄ¿µÄÖØ¶¨Ïòµ½ÉÌÒµÌØ¹¤Èí¼þ¹©Ó¦ÉÌVariston¿ª·¢µÄHeliconia¿ò¼ÜÏàͬµÄÉϰ¶Ò³Ãæ £¬£¬ £¬£¬£¬£¬×îÖÕ×°ÖÃÒ»¸ö»ùÓÚC++µÄAndroidÌØ¹¤Èí¼þÌ×¼þ¡£¡£¡£¡£


https://blog.google/threat-analysis-group/spyware-vendors-use-0-days-and-n-days-against-popular-platforms/


4¡¢Èí¼þ¹©Ó¦ÉÌNebuÒòй¶Լ200ÍòÓû§µÄÐÅÏ¢±»ÆðËß


3ÔÂ30ÈÕýÌ峯 £¬£¬ £¬£¬£¬£¬Ô¼200ÍòºÉÀ¼¹«ÃñµÄÊý¾Ý±»Ð¹Â¶ £¬£¬ £¬£¬£¬£¬É漰һЩʹÓÃNebuÈí¼þµÄÊг¡Ñо¿»ú¹¹¡£¡£¡£¡£ÆäÖÐÒ»¼Ò»ú¹¹ÏÖ½«¸ÃÈí¼þ¹©Ó¦É̸æÉÏ·¨Í¥ £¬£¬ £¬£¬£¬£¬Êг¡Ñо¿»ú¹¹BlauwÏ£Íûͨ¹ý·¨ÔºÇ¿ÖÆÒªÇóNebuÌṩ¸ü¶à¹ØÓÚй¶ÊÂÎñµÄÐÅÏ¢ £¬£¬ £¬£¬£¬£¬°üÀ¨ÄÄЩÊý¾ÝÒѱ»Ð¹Â¶ÒÔ¼°ÊÂÎñÊÇÔõÑù±¬·¢¡£¡£¡£¡£¸ÃÊÂÎñÓ°ÏìÁËDe Vrienden van Amstel LIVE¡¢ºÉÀ¼¸ß¶û·òÁªºÏ»á£¨NGF£©¡¢ÔËÓªÉÌNSºÍ¹©Ó¦ÉÌVodafoneZiggoµÈ¡£¡£¡£¡£ºÉÀ¼Êý¾Ý±£»£»£»£»£»¤¾Ö£¨AP£©ÌåÏÖ £¬£¬ £¬£¬£¬£¬²»É¨³ýÓиü¶àµÄ¹«Ë¾ºÍ×éÖ¯Êܵ½Ó°Ïì¡£¡£¡£¡£


https://www.nu.nl/tech/6257515/data-van-2-miljoen-nederlanders-gelekt-softwareleverancier-voor-rechter-gesleept.html


5¡¢Ó¡¶ÈÖÆÒ©¹«Ë¾Sun PharmaceuticalsÔâµ½ÀÕË÷¹¥»÷


¾Ý3ÔÂ30ÈÕ±¨µÀ £¬£¬ £¬£¬£¬£¬Ó¡¶È×î´óµÄÖÆÒ©¹«Ë¾Sun Pharmaceuticals͸¶ÆäÔâµ½ÀÕË÷¹¥»÷ £¬£¬ £¬£¬£¬£¬¹«Ë¾Êý¾ÝºÍСÎÒ˽¼ÒÐÅÏ¢±»µÁ¡£¡£¡£¡£ÕâÊÇÈ«ÇòµÚËÄ´óÌØÖÖ·ÂÖÆÒ©¹«Ë¾ £¬£¬ £¬£¬£¬£¬2022ÄêÊÕÈë50ÒÚÃÀÔª¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ £¬£¬ £¬£¬£¬£¬Ò»¸öÀÕË÷ÍÅ»ïÒÑÉù³Æ¶ÔÕâÆðÊÂÎñÈÏÕæ £¬£¬ £¬£¬£¬£¬ËüûÓÐ͸¶¸ÃÍÅ»ïµÄÃû×Ö¡£¡£¡£¡£¿ÉÊÇ £¬£¬ £¬£¬£¬£¬ÀÕË÷ÍÅ»ïBlack CatÓÚ3ÔÂ24ÈÕÔÚÆäÍøÕ¾ÉÏÁгöÁ˸ù«Ë¾¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ £¬£¬ £¬£¬£¬£¬×÷ΪÏìÓ¦²½·¥Æä¸ôÀëÁËÍøÂç²¢Æô¶¯Á˻ָ´³ÌÐò £¬£¬ £¬£¬£¬£¬Òò´Ë¹«Ë¾µÄÓªÒµÔËÓªÊܵ½ÁËÓ°Ïì¡£¡£¡£¡£


https://therecord.media/sun-pharma-india-ransomware-attack


6¡¢KasperskyÐû²¼2022ÄêµÄ½ðÈÚÐÐÒµÍþÐ²Ì¬ÊÆµÄ±¨¸æ


3ÔÂ29ÈÕ £¬£¬ £¬£¬£¬£¬KasperskyÐû²¼2022ÄêµÄ½ðÈÚÐÐÒµÍþÐ²Ì¬ÊÆµÄ±¨¸æ¡£¡£¡£¡£2022Äê £¬£¬ £¬£¬£¬£¬½ðÈÚ´¹ÂÚÕ¼ËùÓд¹ÂÚ¹¥»÷µÄ36.3%¡£¡£¡£¡£ÍøµêÆ·ÅÆÊÇ×îÊܽӴýµÄÓÕ¶ü £¬£¬ £¬£¬£¬£¬Õ¼´¹ÂÚÍøÕ¾»á¼û´ÎÊýµÄ15.56%¡£¡£¡£¡£ÊܽðÈÚ¶ñÒâÈí¼þÓ°ÏìµÄÓû§ÊýÄ¿±È2021ÄêϽµÁË14%¡£¡£¡£¡£RamnitÊÇ×îÊ¢ÐеĶñÒâÈí¼þ¼Ò×å £¬£¬ £¬£¬£¬£¬Õ¼±ÈΪ34.4% £¬£¬ £¬£¬£¬£¬Æä´ÎÊÇZbot £¬£¬ £¬£¬£¬£¬Õ¼16.2%¡£¡£¡£¡£Ôâµ½ÒøÐжñÒâÈí¼þ¹¥»÷µÄAndroidÓû§ÊýÄ¿±ÈÈ¥ÄêïÔÌ­ÁË55%¡£¡£¡£¡£BianÓâÔ½Agent³ÉΪ×î»îÔ¾µÄÒÆ¶¯¶ñÒâÈí¼þ £¬£¬ £¬£¬£¬£¬Õ¼±È24.25% £¬£¬ £¬£¬£¬£¬¶øAgentΪ21.57%¡£¡£¡£¡£


https://securelist.com/financial-cyberthreats-in-2022/109219/