ÐÂÀÕË÷Èí¼þGoodWillÒªÇóÄ¿µÄÍê³ÉÈýÏîÉç»á¾ÈÖú»î¶¯

Ðû²¼Ê±¼ä 2022-05-31

1¡¢ÐÂÀÕË÷Èí¼þGoodWillÒªÇóÄ¿µÄÍê³ÉÈýÏîÉç»á¾ÈÖú»î¶¯


¾Ý5ÔÂ29ÈÕ±¨µÀ£¬£¬£¬CloudSEKÅû¶ÁËÒ»ÖÖÃûΪGoodWillµÄÐÂÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÓÚ2022Äê3ÔÂÊ״α»·¢Ã÷£¬£¬£¬ÓÉ.NET±àд£¬£¬£¬Ê¹ÓÃAESËã·¨¾ÙÐмÓÃÜ£¬£¬£¬²¢Í¨¹ýÐÝÃß722.45ÃëÀ´×ÌÈŶ¯Ì¬ÆÊÎö¡£¡£¡£¡£¡£¡£¡£¡£Ëü²»ÊdzöÓÚ¾­¼ÃÄîÍ·µÄÀÕË÷»î¶¯£¬£¬£¬ÆäÊê½ð¼Í¼˵Ã÷£¬£¬£¬ÒªÇóÄ¿µÄ¾ÙÐÐÈýÏîÉç»á¾ÈÖú»î¶¯²Å»ª»ñµÃ½âÃܹ¤¾ß£¬£¬£¬°üÀ¨ÏòÎ޼ҿɹéÕß¾èÔùÐÂÒ·þºÍ̺×Ó£¬£¬£¬ÒÔ¼°´øÎå¸öƶÀ§¶ùͯȥÓ÷¹µÈ¡£¡£¡£¡£¡£¡£¡£¡£Ö®ºó»¹ÒªÇóÄ¿µÄÒÔÆÁÄ»½ØÍ¼ºÍ×ÔÅĵÄÐÎʽ¼Í¼»î¶¯£¬£¬£¬²¢Ðû²¼ÔÚËûÃǵÄÉ罻ýÌåÉÏ¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÉí·ÝÉв»Ã÷È·£¬£¬£¬µ«Í¨Ì«¹ýÎö·¢Ã÷ÔËÓªÖ°Ô±À´×ÔÓ¡¶È¡£¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/05/new-goodwill-ransomware-forces-victims.html


2¡¢EnemyBotµÄ±äÌåÐÂÔöVMwareºÍF5 BIG-IPµÈÎó²î


AT&T Alien LabsÔÚ5ÔÂ26ÈÕÐû²¼µÄÒ»·Ý±¨¸æÖ¸³ö£¬£¬£¬EnemyBotµÄ×îбäÌå°üÀ¨24¸öÎó²î¡£¡£¡£¡£¡£¡£¡£¡£ÆäÖдó´ó¶¼¶¼ÊÇÑÏÖØµÄÎó²î£¬£¬£¬Óм¸¸öÉõÖÁûÓÐCVE±àºÅ£¬£¬£¬ÕâʹµÃ·ÀÓù±äµÃÔ½·¢ÄÑÌâ¡£¡£¡£¡£¡£¡£¡£¡£¸Ã±äÌå°üÀ¨VMwareÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-22954£©¡¢SpringÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-22947£©ºÍF5 BIG-IPµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-1388£©¡£¡£¡£¡£¡£¡£¡£¡£EnemyBot±³ºóµÄÍÅ»ïKeksecÈÔÔÚÆð¾¢¿ª·¢¸Ã¶ñÒâÈí¼þ£¬£¬£¬¸ÃÍŻﻹӵÓÐTsunami¡¢Gafgyt¡¢DarkHTTP¡¢DarkIRCºÍNecro¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬AT&T³ÆEnemyBotµÄÔ´´úÂëÒѾ­¹ûÕæ£¬£¬£¬ÈκÎÈ˶¼¿ÉÒÔʹÓÃËü¡£¡£¡£¡£¡£¡£¡£¡£


https://cybersecurity.att.com/blogs/labs-research/rapidly-evolving-iot-malware-enemybot-now-targeting-content-management-system-servers


3¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùʹÓõç´ÅÐźÅÔ¶³Ì¿ØÖÆ´¥ÃþÆÁ


¾ÝýÌå5ÔÂ27ÈÕ±¨µÀ£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Ò»ÖÖÐµĹ¥»÷·½·¨GhostTouch£¬£¬£¬¿ÉʹÓõç´ÅÐźÅÔ¶³Ì¿ØÖÆ´¥ÃþÆÁ¡£¡£¡£¡£¡£¡£¡£¡£Æä½¹µãÍ·ÄÔÊÇʹÓõç´ÅÐźÅÀ´Ö´Ðлù±¾µÄ´¥Ãþ²Ù×÷£¬£¬£¬ÀýÈçС¿ÛºÍ»¬¶¯µ½´¥ÃþÆÁ£¬£¬£¬Ö¼ÔÚ½ÓÊÜÔ¶³Ì¿ØÖƺͲٿصײã×°±¸¡£¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷¿ÉÔÚ40ºÁÃ׵ľàÀëÄÚʩչ×÷Ó㬣¬£¬ÆäÒªº¦ÔÚÓÚµçÈÝʽ´¥ÃþÆÁ¶Ôµç´Å×ÌÈÅ£¨EMI£©µÄÃô¸ÐÐÔ£¬£¬£¬Ê¹ÓÃËü½«µç´ÅÐźÅ×¢ÈëÄÚÖÃÓÚ´¥ÃþÆÁÖеÄ͸Ã÷µç¼«¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬ÈËÃÇ¿ÉÄܻὫÖÇÄÜÊÖ»úÃæ³¯Ï·ÅÔÚ×À×ÓÉÏ£¬£¬£¬¹¥»÷Õ߾ͿÉÒÔ½«¹¥»÷×°±¸Ç¶Èë×ÀÃæÏ£¬£¬£¬ÌᳫԶ³Ì¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/05/attackers-can-use-electromagnetic.html


4¡¢¹ú¼ÊÐ̾¯×éÖ¯ÒѾв¶ÈýÃûʹÓÃRAT¾ÙÐнðÈÚ·¸·¨µÄÏÓÒÉÈË


ýÌå5ÔÂ30Èճƣ¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯ÒѾв¶ÈýÃûÄáÈÕÀûÑǵÄÍøÂç·¸·¨ÏÓÒÉÈË¡£¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯´úºÅΪKiller Bee£¬£¬£¬Óɹú¼ÊÐ̾¯×é֯ǣͷ£¬£¬£¬¶«ÄÏÑÇ11¹úµÄÖ´·¨»ú¹¹Ð­Öú¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÉæÏÓʹÓÃÔ¶³Ì»á¼ûľÂíAgent Tesla¸Ä¶¯½ðÈÚÉúÒâ²¢ÇÔÈ¡ÕË»§Æ¾Ö¤£¬£¬£¬Ä¿µÄ°üÀ¨Öж«¡¢±±·ÇºÍ¶«ÄÏÑǵĴóÐÍÆóÒµ×éÖ¯ºÍÓÍÆø¹«Ë¾¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬Ö´·¨»ú¹¹²¢Î´Í¸Â¶Æä´ÓÄ¿µÄ×éÖ¯ÄÇÀïÇÔÈ¡Á˼¸¶àÇ®¡£¡£¡£¡£¡£¡£¡£¡£ÉÏÖÜ£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯µÄÁíÒ»¸ö´úºÅΪDelilahµÄÐж¯Öов¶ÁËSilverTerrierÍÅ»ïµÄÍ·Ä¿¡£¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/three-nigerians-arrested-for-malware-assisted-financial-crimes/


5¡¢FBI³Æ¹¥»÷ÕßÔÚ°µÍøÉϳöÊÛÃÀ¹ú¸ßУµÄÍøÂç»á¼ûƾ֤


FBIÔÚ5ÔÂ26ÈÕÐû²¼µÄµÄͨ¸æ³Æ£¬£¬£¬ÃÀ¹ú¸ßУµÄÍøÂç»á¼ûƾ֤ºÍVPN»á¼ûȨÏÞÕýÔÚ°µÍøÉϳöÊÛ¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÓã²æÊ½´¹ÂÚ¹¥»÷ºÍÀÕË÷¹¥»÷µÈÕ½ÂÔÀ´ÍøÂçÆ¾Ö¤£¬£¬£¬È»ºó½«»ñµÃµÄƾ֤Ðû²¼ÔÚ¶íÂÞ˹µÄºÚ¿ÍÂÛ̳ÉÏ£¬£¬£¬ÒÔ¼¸ÃÀÔªµ½¼¸Ç§ÃÀÔª²»µÈµÄ¼ÛÇ®³öÊÛ¡£¡£¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹³Æ£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÕâЩµÇ¼ÐÅÏ¢¾ÙÐб©Á¦×²¿â¹¥»÷£¬£¬£¬¿É¿çÔ½²î±ðµÄÕË»§¡¢ÍøÕ¾ºÍЧÀÍÈëÇÖÄ¿µÄ£¬£¬£¬²¢½¨Òéͨ¹ýÏÞÖÆÕÊ»§µÄʹÓÃλÖÃºÍÆôÓÃÍâµØ×°±¸Æ¾Ö¤±£»£»£»£»£»¤»úÖÆÀ´ïÔ̭ƾ֤й¶¡£¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fbi-warns-of-hackers-selling-credentials-for-us-college-networks/


6¡¢KasperskyÐû²¼2022ÄêQ1ÒÆ¶¯¶ñÒâÈí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ


5ÔÂ27ÈÕ£¬£¬£¬KasperskyÐû²¼ÁË2022ÄêµÚÒ»¼¾¶ÈÒÆ¶¯¶ñÒâÈí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ÔÚµÚÒ»¼¾¶È¹²¼ì²âµ½516617¸ö¶ñÒâ×°Öðü£¬£¬£¬±ÈÉÏÒ»¼¾¶ÈïÔÌ­79448¸ö£¬£¬£¬ÆäÖÐ53947¸öÓëÊÖ»úÒøÐÐľÂíÓйØ£¬£¬£¬1942¸öÊÇÒÆ¶¯ÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£¡£ÔÚ¼ì²âµ½µÄËùÓÐÍþвÖУ¬£¬£¬Õ¼±È×î´óµÄÊÇRiskToolÓ¦ÓóÌÐò£¨48.75%£©£¬£¬£¬Æä´ÎÊÇ¹ã¸æÈí¼þÓ¦Óã¨16.92%£©¡£¡£¡£¡£¡£¡£¡£¡£Ö÷ÒªµÄÒÆ¶¯¶ñÒâÈí¼þ³ÌÐòÊÇDangerousObject.Multi.Generic (Õ¼±È20.45%)£¬£¬£¬Æä´ÎÊÇTrojan.AndroidOS.Fakemoney.d£¨10.73%£©ºÍTrojan-SMS.AndroidOS.Fakeapp.d£¨7.82 £©¡£¡£¡£¡£¡£¡£¡£¡£


https://securelist.com/it-threat-evolution-in-q1-2022-mobile-statistics/106589/