΢ÈíÊÓ²ìDefender½«Õýµ±URLʶ±ðΪ¶ñÒâÁ´½ÓµÄÎÊÌâ
Ðû²¼Ê±¼ä 2023-03-311¡¢Î¢ÈíÊÓ²ìDefender½«Õýµ±URLʶ±ðΪ¶ñÒâÁ´½ÓµÄÎÊÌâ
¾ÝýÌå3ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬Î¢ÈíÔÚÊÓ²ìÕýµ±URLÁ´½Ó±»Microsoft DefenderЧÀÍʶ±ðΪ¶ñÒâÁ´½ÓµÄÎÊÌâ¡£¡£¡£¡£¡£¡£¡£×ÔÎÊÌâ·ºÆðµÄÎå¸ö¶àСʱÒÔÀ´£¬£¬£¬£¬Ò»Ð©¿Í»§ÒѾÊÕµ½ÁËÊýÊ®·âÖÒÑÔÓʼþ¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬Ö»¹Ü±£´æÎ󱨾¯±¨£¬£¬£¬£¬µ«Óû§ÈÔÈ»Äܹ»»á¼ûÕýµ±URL£¬£¬£¬£¬ÆäÒ²ÔÚÊÓ²ìЧÀ͵ÄÄÄÒ»²¿·ÖÍÉ»¯½«Õýµ±µÄURLʶ±ðΪ¶ñÒâ¡£¡£¡£¡£¡£¡£¡£3ÔÂ29ÈÕ15:08 EDT¸üÐÂÏÔʾ£¬£¬£¬£¬Îó±¨ÎÊÌâÒÑͨ¹ý»Ö¸´×î½ü¶ÔSafeLinks¹¦Ð§µÄ¸üнâ¾ö¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-mistakenly-tagging-urls-as-malicious/
2¡¢Ñо¿Ö°Ô±·¢Ã÷ʹÓÃľÂí»¯3CX×ÀÃæÓ¦ÓõũӦÁ´¹¥»÷
ýÌå3ÔÂ29ÈÕ±¨µÀ³Æ£¬£¬£¬£¬Ñо¿Ö°Ô±Åû¶ÁËʹÓÃľÂí»¯3CX×ÀÃæÓ¦ÓõũӦÁ´¹¥»÷¡£¡£¡£¡£¡£¡£¡£3CXÊÇÒ»¼ÒVoIP IPBXÈí¼þ¿ª·¢¹«Ë¾£¬£¬£¬£¬Æä3CX Phone System±»È«ÇòÁè¼Ý600000¼Ò¹«Ë¾Ê¹Óᣡ£¡£¡£¡£¡£¡£SentinelOne͸¶£¬£¬£¬£¬Ä¾Âí»¯3CXDesktopAppÊǹ¥»÷Á´ÖеĵÚÒ»½×¶Î£¬£¬£¬£¬Ëü´ÓGithubÖÐÌáÈ¡¸½¼ÓÁËbase64Êý¾ÝµÄICOÎļþ£¬£¬£¬£¬²¢×îÖÕµ¼ÖµÚÈý½×¶ÎµÄÐÅÏ¢ÇÔÈ¡³ÌÐòDLL¡£¡£¡£¡£¡£¡£¡£3CX CEO Nick GaleaÌåÏÖ£¬£¬£¬£¬ÆäʹÓõÄÉÏÓοâÒѱ»Ñ¬È¾£¬£¬£¬£¬AndroidºÍiOS°æ±¾²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£Ëû½¨ÒéËùÓÐÓû§Ð¶ÔØ×ÀÃæÓ¦ÓóÌÐò£¬£¬£¬£¬×ª¶øÊ¹ÓÃPWA¿Í»§¶Ë¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-compromise-3cx-desktop-app-in-a-supply-chain-attack/
3¡¢GoogleÅû¶ʹÓÃAndroidºÍiOSÖжà¸öÎó²îµÄ¹¥»÷»î¶¯
3ÔÂ29ÈÕ£¬£¬£¬£¬GoogleÅû¶ÁË×î½ü·¢Ã÷µÄÁ½¸ö¹¥»÷»î¶¯£¬£¬£¬£¬Ê¹ÓÃÁËAndroid¡¢iOSºÍChromeÖжà¸öÎó²î¡£¡£¡£¡£¡£¡£¡£µÚÒ»¸ö»î¶¯ÓÚ2022Äê11Ô±»·¢Ã÷£¬£¬£¬£¬Ê¹ÓÃÁËiOS WebKit RCEÎó²î(CVE-2022-42856)ºÍChrome GPUɳÏäÈÆ¹ýÎó²î(CVE-2022-4135)µÈ£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÒâ´óÀû¡¢ÂíÀ´Î÷ÑǺ͹þÈø¿Ë˹̹¡£¡£¡£¡£¡£¡£¡£2022Äê12Ô£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Á˵ڶþ¸ö»î¶¯£¬£¬£¬£¬Ê¹ÓÃÁËCVE-2022-4262ºÍCVE-2023-0266µÈÎó²î£¬£¬£¬£¬Õë¶Ô×îа汾µÄÈýÐÇä¯ÀÀÆ÷¡£¡£¡£¡£¡£¡£¡£ËüδÀ´×Ô°¢À²®ÁªºÏÇõ³¤¹ú(UAE)µÄÄ¿µÄÖØ¶¨Ïòµ½ÉÌÒµÌØ¹¤Èí¼þ¹©Ó¦ÉÌVariston¿ª·¢µÄHeliconia¿ò¼ÜÏàͬµÄÉϰ¶Ò³Ã棬£¬£¬£¬×îÖÕ×°ÖÃÒ»¸ö»ùÓÚC++µÄAndroidÌØ¹¤Èí¼þÌ×¼þ¡£¡£¡£¡£¡£¡£¡£
https://blog.google/threat-analysis-group/spyware-vendors-use-0-days-and-n-days-against-popular-platforms/
4¡¢Èí¼þ¹©Ó¦ÉÌNebuÒòй¶Լ200ÍòÓû§µÄÐÅÏ¢±»ÆðËß
3ÔÂ30ÈÕýÌ峯£¬£¬£¬£¬Ô¼200ÍòºÉÀ¼¹«ÃñµÄÊý¾Ý±»Ð¹Â¶£¬£¬£¬£¬É漰һЩʹÓÃNebuÈí¼þµÄÊг¡Ñо¿»ú¹¹¡£¡£¡£¡£¡£¡£¡£ÆäÖÐÒ»¼Ò»ú¹¹ÏÖ½«¸ÃÈí¼þ¹©Ó¦É̸æÉÏ·¨Í¥£¬£¬£¬£¬Êг¡Ñо¿»ú¹¹BlauwÏ£Íûͨ¹ý·¨ÔºÇ¿ÖÆÒªÇóNebuÌṩ¸ü¶à¹ØÓÚй¶ÊÂÎñµÄÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÄÄЩÊý¾ÝÒѱ»Ð¹Â¶ÒÔ¼°ÊÂÎñÊÇÔõÑù±¬·¢¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÓ°ÏìÁËDe Vrienden van Amstel LIVE¡¢ºÉÀ¼¸ß¶û·òÁªºÏ»á£¨NGF£©¡¢ÔËÓªÉÌNSºÍ¹©Ó¦ÉÌVodafoneZiggoµÈ¡£¡£¡£¡£¡£¡£¡£ºÉÀ¼Êý¾Ý±£»£»£»£»¤¾Ö£¨AP£©ÌåÏÖ£¬£¬£¬£¬²»É¨³ýÓиü¶àµÄ¹«Ë¾ºÍ×éÖ¯Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£
https://www.nu.nl/tech/6257515/data-van-2-miljoen-nederlanders-gelekt-softwareleverancier-voor-rechter-gesleept.html
5¡¢Ó¡¶ÈÖÆÒ©¹«Ë¾Sun PharmaceuticalsÔâµ½ÀÕË÷¹¥»÷
¾Ý3ÔÂ30ÈÕ±¨µÀ£¬£¬£¬£¬Ó¡¶È×î´óµÄÖÆÒ©¹«Ë¾Sun Pharmaceuticals͸¶ÆäÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬¹«Ë¾Êý¾ÝºÍСÎÒ˽¼ÒÐÅÏ¢±»µÁ¡£¡£¡£¡£¡£¡£¡£ÕâÊÇÈ«ÇòµÚËÄ´óÌØÖÖ·ÂÖÆÒ©¹«Ë¾£¬£¬£¬£¬2022ÄêÊÕÈë50ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬Ò»¸öÀÕË÷ÍÅ»ïÒÑÉù³Æ¶ÔÕâÆðÊÂÎñÈÏÕæ£¬£¬£¬£¬ËüûÓÐ͸¶¸ÃÍÅ»ïµÄÃû×Ö¡£¡£¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬ÀÕË÷ÍÅ»ïBlack CatÓÚ3ÔÂ24ÈÕÔÚÆäÍøÕ¾ÉÏÁгöÁ˸ù«Ë¾¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬×÷ΪÏìÓ¦²½·¥Æä¸ôÀëÁËÍøÂç²¢Æô¶¯Á˻ָ´³ÌÐò£¬£¬£¬£¬Òò´Ë¹«Ë¾µÄÓªÒµÔËÓªÊܵ½ÁËÓ°Ïì¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/sun-pharma-india-ransomware-attack
6¡¢KasperskyÐû²¼2022ÄêµÄ½ðÈÚÐÐÒµÍþÐ²Ì¬ÊÆµÄ±¨¸æ
3ÔÂ29ÈÕ£¬£¬£¬£¬KasperskyÐû²¼2022ÄêµÄ½ðÈÚÐÐÒµÍþÐ²Ì¬ÊÆµÄ±¨¸æ¡£¡£¡£¡£¡£¡£¡£2022Ä꣬£¬£¬£¬½ðÈÚ´¹ÂÚÕ¼ËùÓд¹ÂÚ¹¥»÷µÄ36.3%¡£¡£¡£¡£¡£¡£¡£ÍøµêÆ·ÅÆÊÇ×îÊܽӴýµÄÓÕ¶ü£¬£¬£¬£¬Õ¼´¹ÂÚÍøÕ¾»á¼û´ÎÊýµÄ15.56%¡£¡£¡£¡£¡£¡£¡£ÊܽðÈÚ¶ñÒâÈí¼þÓ°ÏìµÄÓû§ÊýÄ¿±È2021ÄêϽµÁË14%¡£¡£¡£¡£¡£¡£¡£RamnitÊÇ×îÊ¢ÐеĶñÒâÈí¼þ¼Ò×壬£¬£¬£¬Õ¼±ÈΪ34.4%£¬£¬£¬£¬Æä´ÎÊÇZbot£¬£¬£¬£¬Õ¼16.2%¡£¡£¡£¡£¡£¡£¡£Ôâµ½ÒøÐжñÒâÈí¼þ¹¥»÷µÄAndroidÓû§ÊýÄ¿±ÈÈ¥ÄêïÔÌÁË55%¡£¡£¡£¡£¡£¡£¡£BianÓâÔ½Agent³ÉΪ×î»îÔ¾µÄÒÆ¶¯¶ñÒâÈí¼þ£¬£¬£¬£¬Õ¼±È24.25%£¬£¬£¬£¬¶øAgentΪ21.57%¡£¡£¡£¡£¡£¡£¡£
https://securelist.com/financial-cyberthreats-in-2022/109219/


¾©¹«Íø°²±¸11010802024551ºÅ