΢ÈíÐû²¼6ÔÂÇå¾²¸üÐÂÐÞ¸´FollinaÔÚÄÚµÄ55¸öÎó²î

Ðû²¼Ê±¼ä 2022-06-15
1¡¢Î¢ÈíÐû²¼6Ô·ÝÇå¾²¸üÐÂÐÞ¸´FollinaÔÚÄÚµÄ55¸öÎó²î


6ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼Á˱¾ÔµÄÖܶþ²¹¶¡£¬£¬£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´ÁË55¸öÎó²î¡£¡£¡£¡£¡£ ¡£ÆäÖаüÀ¨12¸öÌáȨÎó²î¡¢1Çå¾²¹¦Ð§ÈƹýÎó²î¡¢27¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡¢11¸öÐÅϢй¶Îó²î¡¢3¸ö¾Ü¾øÐ§ÀÍÎó²îºÍ1¸öÓÕÆ­Îó²î¡£¡£¡£¡£¡£ ¡£ÆäÖÐ×îÑÏÖØµÄÊÇWindows MSDTÖеÄÎó²îFollina£¨CVE-2022-30190£©£¬£¬£¬£¬£¬£¬£¬£¬Òѱ»¶à¸ö¹¥»÷ÍÅ»ïʹÓᣡ£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËWindows Hyper-VÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2022-30163£©¡¢WindowsÇáÁ¿¼¶Ä¿Â¼»á¼ûЭÒé(LDAP)Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-30139£©ºÍWindowsÍøÂçÎļþϵͳԶ³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-30136£©µÈ¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2022-patch-tuesday-fixes-1-zero-day-55-flaws/


2¡¢AvastÔÚÒ°·¢Ã÷ÈÔÔÚ¿ª·¢ÖеÄLinux rootkit Syslogk


6ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬AvastÅû¶ÁËÔÚÒ°·¢Ã÷µÄÒ»ÖÖÃûΪ¡°Syslogk¡±µÄÐÂLinux rootkitµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£ ¡£Syslogk»ùÓÚ¿ªÔ´µÄLinuxÄÚºËrootkit Adore-Ng£¬£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÈÔÔÚ¿ª·¢ÖС£¡£¡£¡£¡£ ¡£¸Ã¶ñÒâÈí¼þ Õë¶ÔLinuxÄÚºË3.x£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÒþ²ØÄ¿Â¼ºÍÍøÂçÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬£¬²¢¼ÓÔØÒ»¸öÃûΪ¡°Rekoobe¡±µÄºóÃÅ¡£¡£¡£¡£¡£ ¡£Õâ¸öºóÃÅÔÚÄ¿µÄϵͳÖн«Ê¼ÖÕ´¦ÓÚÐÝÃß״̬£¬£¬£¬£¬£¬£¬£¬£¬Ö±µ½ÎüÊÕµ½À´×Ô¹¥»÷Õߵġ°magic packets¡±¡£¡£¡£¡£¡£ ¡£ÆäÖ÷ҪĿµÄÊÇΪ¹¥»÷ÕßÌṩĿµÄÉè±¹ØÁ¬ÄÔ¶³Ìshell£¬£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÐÅϢй¶¡¢Êý¾Ýй¶¡¢Îļþ²Ù×÷ºÍÕÊ»§Ð®ÖƵÈ¡£¡£¡£¡£¡£ ¡£


https://decoded.avast.io/davidalvarez/linux-threat-hunting-syslogk-a-kernel-rootkit-found-under-development-in-the-wild/


3¡¢ÃÀ¹úKaiser Permanente³Æ½ü7ÍòÈ˵ÄÐÅÏ¢±»²»·¨»á¼û


¾ÝýÌå6ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÒ½ÁÆ»ú¹¹Kaiser Permanente³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£ ¡£¸Ã¹«Ë¾ÔÚÆä¹ÙÍøÉÏÐû²¼µÄ֪ͨ͸¶£¬£¬£¬£¬£¬£¬£¬£¬2022Äê4ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚδ¾­ÊÚȨµÄÇéÐÎÏ»á¼ûÁËÆäÔ±¹¤µÄµç×ÓÓÊÏ䣬£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÉæ¼°»¼ÕߵĿµ½¡ÐÅÏ¢£¨PHI£©¡£¡£¡£¡£¡£ ¡£Kaiser PermanenteÓÚ6ÔÂ3ÈÕ֪ͨÊÜÓ°Ï컼Õߣ¬£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖй¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢²¡Àú±àºÅ¡¢Ð§ÀÍÈÕÆÚºÍ¼ì²âЧ¹ûµÈ¡£¡£¡£¡£¡£ ¡£¸Ã¹«Ë¾Ìá½»¸øÃÀ¹úÕþ¸®µÄ±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬´ËÊÂÎñÒѵ¼ÖÂ69589È˵ÄPHIй¶¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/kaiser-permanente-data-breach-exposes-health-data-of-69k-people/


4¡¢GaliumʹÓÃÐÂRAT PingPull¹¥»÷Å·ÖÞ¡¢·ÇÖ޺Ͷ«ÄÏÑÇ


Unit 42ÔÚ6ÔÂ13ÈÕ¹ûÕæÁËAPTÍÅ»ïGaliumÕë¶ÔÅ·ÖÞ¡¢·ÇÖ޺Ͷ«ÄÏÑǵÄй¥»÷»î¶¯¡£¡£¡£¡£¡£ ¡£´Ë´Î»î¶¯Ö÷ÒªÕë¶ÔµçÐÅ¡¢Õþ¸®ºÍ½ðÈÚ»ú¹¹£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËÒ»ÖÖÃûΪPingPullµÄÐÂRAT¡£¡£¡£¡£¡£ ¡£PingPullÊÇ»ùÓÚVisual C++µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬ËüÖ¼ÔÚΪ¹¥»÷ÕßÌṩÔÚÄ¿µÄϵͳÖеķ´Ïòshell£¬£¬£¬£¬£¬£¬£¬£¬²¢Ö´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£ ¡£Unit42¶ÔÈý¸ö¾ßÓÐÏàËÆ¹¦Ð§µÄ²î±ð±äÌå¾ÙÐвÉÑù£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÕâЩ±äÌåʹÓÃÁ˲î±ðµÄC2ͨѶЭÒ飺ICMP¡¢HTTPSºÍTCP¡£¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÓëGalliumÓйصĻù´¡ÉèÊ©°üÀ¨170¶à¸öIPµØµã£¬£¬£¬£¬£¬£¬£¬£¬ÓÐЩ¿ÉÒÔ×·Ëݵ½2020Äêµ×¡£¡£¡£¡£¡£ ¡£


https://unit42.paloaltonetworks.com/pingpull-gallium/


5¡¢Confiant·¢Ã÷ÇÔÈ¡Web3Ç®°ü×ʽðµÄSeaFlower»î¶¯


¾Ý6ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬Confiant·¢Ã÷ÁËÕë¶ÔWeb3Ç®°üµÄSeaFlower»î¶¯¡£¡£¡£¡£¡£ ¡£¸Ã»î¶¯ÓÚ½ñÄê3Ô³õ±»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬Ò»Ö±Õë¶ÔAndroidºÍiOSÓû§£¬£¬£¬£¬£¬£¬£¬£¬Ä£Äâ¹Ù·½¼ÓÃÜÇ®±ÒÇ®°üÍøÕ¾£¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÁËSEOÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬£¬À´·Ö·¢ÇÔȡĿµÄ×ʽðµÄºóÃÅÓ¦Óᣡ£¡£¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬SeaFlowerÖ÷ҪʹÓúóÃÅ´úÂëÐÞ¸ÄWeb3Ç®°ü£¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÖÖ×ÓÃÜÂ루seed phrase£©¡£¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯µÄÄ¿µÄÓ¦ÓðüÀ¨AndroidºÍiOS°æ±¾µÄCoinbase Wallet¡¢MetaMask¡¢TokenPocketºÍimToken¡£¡£¡£¡£¡£ ¡£


https://thehackernews.com/2022/06/chinese-hackers-distribute-backdoored.html


6¡¢Î¢ÈíÐû²¼¹ØÓÚÀÕË÷Èí¼þBlackCatµÄÊÖÒÕÆÊÎö±¨¸æ


΢ÈíÔÚ6ÔÂ13ÈÕÐû²¼Á˹ØÓÚÀÕË÷Èí¼þBlackCat£¨Ò²³ÆALPHV£©µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£ ¡£BlackCatÓÚ2021Äê11ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬ÊÇ×îÔçÓÃRust±àдµÄÀÕË÷Èí¼þÖ®Ò»£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔ¹¥»÷WindowsºÍLinux×°±¸£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°VMWareʵÀý¡£¡£¡£¡£¡£ ¡£½üÆÚ£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÊӲ쵽һ¸ö¹¥»÷ÕßʹÓÃExchangeЧÀÍÆ÷Îó²îÀ´»ñµÃÄ¿µÄÍøÂç»á¼û¡£¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬ÖÁÉÙÓÐÁ½¸öÁ¥Êô×éÖ¯ÕýÔÚʹÓÃBlackCat: DEV-0237ºÍDEV-0504¡£¡£¡£¡£¡£ ¡£Æ¾Ö¤Î¢ÈíµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬BlackCatÒÑÓ°ÏìÁË·ÇÖÞ¡¢ÃÀÖÞ¡¢ÑÇÖÞºÍÅ·Ö޵ĸ÷¸ö¹ú¼Ò²¢ÒýÆðÖØÊÓ¡£¡£¡£¡£¡£ ¡£


https://www.microsoft.com/security/blog/2022/06/13/the-many-lives-of-blackcat-ransomware/