·¨À­ÀûÔâµ½ÀÕË÷¹¥»÷µ¼Ö²¿·Ö¿Í»§µÄÏêϸÐÅϢй¶

Ðû²¼Ê±¼ä 2023-03-22

1¡¢·¨À­ÀûÔâµ½ÀÕË÷¹¥»÷µ¼Ö²¿·Ö¿Í»§µÄÏêϸÐÅϢй¶


¾ÝýÌå3ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ £¬£¬Òâ´óÀûÅܳµÖÆÔìÉÌ·¨À­ÀûÔâµ½ÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ¹¥»÷Õß»ñµÃÁËÆä²¿·ÖITϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬ £¬£¬¿Í»§ÐÕÃû¡¢µØµãºÍµç»°ºÅÂëµÈÐÅϢй¶¡£¡£¡£¡£¡£¡£·¨À­ÀûÌåÏÖÒѽÓÄɲ½·¥±£»£»£»£»£» £»¤ÊÜÓ°Ïìϵͳ£¬£¬£¬£¬£¬£¬ £¬£¬ÇҴ˴ι¥»÷¶Ô¹«Ë¾µÄÔËӪûÓÐÓ°Ïì¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐ˵Ã÷¹¥»÷±¬·¢µÄʱ¼ä£¬£¬£¬£¬£¬£¬ £¬£¬µ«Õâ¿ÉÄÜÓë2022Äê10Ô±¨µÀµÄÀÕË÷¹¥»÷ÓйØ£¬£¬£¬£¬£¬£¬ £¬£¬ÆäʱRansomEXXÉù³ÆÇÔÈ¡ÁË·¨À­ÀûµÄ7 GBÊý¾Ý¡£¡£¡£¡£¡£¡£¾ÝÐÂÎÅÈËÊ¿³Æ£¬£¬£¬£¬£¬£¬ £¬£¬×î³õµÄÊê½ðÒªÇóÊÇ100ÍòÃÀÔª¡£¡£¡£¡£¡£¡£·¨À­ÀûÔÚ3ÔÂ20ÈÕµÄÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬ £¬£¬²»»á¸¶Êê½ð¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/ferrari-says-ransomware-attack-exposed-customer-data/


2¡¢Ñо¿Ö°Ô±·¢Ã÷Win 11½ØÍ¼¹¤¾ßÒ²ÊÜAcropalypseÎó²îÓ°Ïì


3ÔÂ21ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±·¢Ã÷Windows 11½ØÍ¼¹¤¾ßÒ²ÊÜAcropalypseÇå¾²Îó²îµÄÓ°Ïì¡£¡£¡£¡£¡£¡£ÉÏÖÜ£¬£¬£¬£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±ÔÚGoogle Pixel±ê¼Ç¹¤¾ßÖз¢Ã÷¸ÃÎó²î£¬£¬£¬£¬£¬£¬ £¬£¬µ¼ÖÂԭʼͼÏñÊý¾Ý×ÝÈ»±»±à¼­»ò²Ã¼ôÒ²Äܱ£´æÏÂÀ´¡£¡£¡£¡£¡£¡£Windows 11½ØÍ¼¹¤¾ßÓòüôºóµÄ°æ±¾ÁýÕÖԭʼͼÏñʱ£¬£¬£¬£¬£¬£¬ £¬£¬³ÌÐòûÓÐ׼ȷ½Ø¶ÏδʹÓõÄÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬£¬¶øÊDZ£±£´æIENDÊý¾Ý¿éÖ®ºó¡£¡£¡£¡£¡£¡£ÔÚͼÏñÉó²éÆ÷Öз­¿ªÎļþÖ»»áÏÔʾ²Ã¼ôºóµÄͼÏñ£¬£¬£¬£¬£¬£¬ £¬£¬¿ÉÊÇδ½Ø¶ÏµÄÊý¾Ý¿ÉÓÃÓÚÖØÐÞԭʼͼÏñ£¬£¬£¬£¬£¬£¬ £¬£¬´Ó¶ø¿ÉÄܵ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/windows-11-snipping-tool-privacy-bug-exposes-cropped-image-content/


3¡¢Ñо¿ÍŶÓÏêÊöÀÕË÷Èí¼þCatBʹÓÃMSDTCЧÀ͵ÄÈÆ¹ýÕ½ÂÔ


¾Ý3ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ £¬£¬Ñо¿ÍŶÓÏêÊöÁËÀÕË÷Èí¼þCatBµÄÈÆ¹ýÕ½ÂÔ¡¢¼ÓÃÜÐÐΪÒÔ¼°ÇÔȡƾ֤ºÍä¯ÀÀÆ÷Êý¾ÝµÄʵÑé¡£¡£¡£¡£¡£¡£CatB£¨Ò²³ÆCatB99ºÍBaxtoy£©ÓÚ2022Äêµ×Ê״α»·¢Ã÷£¬£¬£¬£¬£¬£¬ £¬£¬Ëü¿ÉÄÜÊÇÀÕË÷Èí¼þPandoraµÄÑݱä»òÖ±½Ó¸üÃû£¬£¬£¬£¬£¬£¬ £¬£¬ºóÕßÖ÷ÒªÕë¶ÔÆû³µÐÐÒµ¡£¡£¡£¡£¡£¡£CatBµÄÖ÷ÒªÌØÕ÷ÊÇͨ¹ýMicrosoftÂþÑÜʽÊÂÎñ´¦Öóͷ£Ð­µ÷Æ÷(MSDTC)µÄÕýµ±Ð§ÀÍÐ®ÖÆDLL£¬£¬£¬£¬£¬£¬ £¬£¬À´ÌáÈ¡ºÍÆô¶¯ÀÕË÷Èí¼þpayload¡£¡£¡£¡£¡£¡£³ýÁËÎļþ¼ÓÃܺͻìÏýÖ®Í⣬£¬£¬£¬£¬£¬ £¬£¬CatB»¹»áʵÑé´ÓÄ¿µÄÏµÍ³ÍøÂçÌØ¶¨µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2023/03/researchers-shed-light-on-catb.html


4¡¢°Ä´óÀûÑÇ˰Îñ¾ÖʹÓõÄÓïÒôʶ±ðϵͳ¿É±»AIºÏ³ÉÉùÒôÈÆ¹ý


¾ÝÎÀ±¨3ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ £¬£¬CentrelinkºÍ°Ä´óÀûÑÇ˰Îñ¾Ö(ATO)ʹÓõÄÓïÒôʶ±ðϵͳ±£´æÎó²î¡£¡£¡£¡£¡£¡£¼Ì±¨µÀ³Æ¾­ÓÉѵÁ·µÄAIºÏ³ÉÉùÒô¿ÉÓÃÓÚ»á¼ûÍâÑóµç»°ÒøÐÐЧÀͺ󣬣¬£¬£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±·¢Ã÷ÉùÎÆÏµÍ³Ò²¿ÉÒÔ±»AIÉùÒôËùÓÕÆ­¡£¡£¡£¡£¡£¡£Ò»ÃûÎÀ±¨µÄ¼ÇÕß½öÓÃËÄ·ÖÖÓµÄÒôƵ£¬£¬£¬£¬£¬£¬ £¬£¬¾ÍÌìÉúÒ»¸ö×Ô¼ºµÄ¿Ë¡ÉùÒô£¬£¬£¬£¬£¬£¬ £¬£¬È»ºó¾ÍÄÜÓÃÕâ¸öÉùÒôÁ¬Ïµ×Ô¼ºµÄ¿Í»§²Î¿¼ºÅÂ룬£¬£¬£¬£¬£¬ £¬£¬½øÈëÁËCentrelink×ÔÖúЧÀÍÕË»§¡£¡£¡£¡£¡£¡£ATOµÄ½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬ £¬£¬¸Ã»ú¹¹ÒѽÓÄɲ½·¥À´±£»£»£»£»£» £»¤ÏµÍ³ÃâÊÜAIÓïÒô¿Ë¡֮ÀàµÄÍþв¡£¡£¡£¡£¡£¡£


https://www.theguardian.com/technology/2023/mar/16/voice-system-used-to-verify-identity-by-centrelink-can-be-fooled-by-ai


5¡¢MandiantÐû²¼¹ØÓÚ2022ÄêÁãÈÕÎó²î¹¥»÷µÄÆÊÎö±¨¸æ


3ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬MandiantÐû²¼Á˹ØÓÚ2022ÄêÁãÈÕÎó²î¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬ £¬£¬2022ÄêÓÐ55¸öÁãÈÕÎó²î±»Ê¹Ó㬣¬£¬£¬£¬£¬ £¬£¬Õâ¸öÊý×ÖµÍÓÚ2021ÄêµÄ81¸ö¡£¡£¡£¡£¡£¡£ÓëÍùÄêÒ»Ö£¬£¬£¬£¬£¬£¬ £¬£¬´ó²¿·ÖÎó²îÀ´×ÔMicrosoft¡¢GoogleºÍApple²úÆ·£¬£¬£¬£¬£¬£¬ £¬£¬±»Ê¹ÓÃ×î¶àµÄ²úÆ·ÀàÐÍÊDzÙ×÷ϵͳ£¨19¸ö£©£¬£¬£¬£¬£¬£¬ £¬£¬Æä´ÎÊÇä¯ÀÀÆ÷£¨11¸ö£©ÒÔ¼°Çå¾²¡¢ITºÍÍøÂçÖÎÀí²úÆ·£¨10£©¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÖеĴó´ó¶¼£¨55ÆäÖеÄ53¸ö£©Äܱ»ÓÃÓÚÔÚÄ¿µÄ×°±¸ÉÏÌáÉýȨÏÞ»òÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£


https://www.mandiant.com/resources/blog/zero-days-exploited-2022


6¡¢JumpsecÐû²¼2022ÄêÓ¢¹úÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ


ýÌå3ÔÂ20Èճƣ¬£¬£¬£¬£¬£¬ £¬£¬JumpsecÐû²¼ÁË2022ÄêÓ¢¹úÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£Óë2021ÄêÏà±È£¬£¬£¬£¬£¬£¬ £¬£¬2022ÄêÓ¢¹ú±¨¸æµÄ¹¥»÷×ÜÊýÔöÌíÁË17%¡£¡£¡£¡£¡£¡£Ð·ºÆðµÄSpring4Shell¡¢FollinaºÍProxyNotShellµÈÎó²î¿ÉÄÜ»áÔöÌíÀÕË÷ÍÅ»ï¶Ô×éÖ¯µÄ¹¥»÷¡£¡£¡£¡£¡£¡£Ëæ×ÅContiºÍREvilµÄ½âÌ壬£¬£¬£¬£¬£¬ £¬£¬ÐµĹ¥»÷ÕßÔÚÀÕË÷Èí¼þÁìÓò±äµÃÔ½·¢Í»³ö¡£¡£¡£¡£¡£¡£Lockbit¼ÌÐøÁËContiµÄÍ·ÏΣ¬£¬£¬£¬£¬£¬ £¬£¬³ÉΪȫÇò×î³£¼ûµÄÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬ £¬£¬Õ¼¹¥»÷µÄ52%¡£¡£¡£¡£¡£¡£Êý¾ÝÅú×¢£¬£¬£¬£¬£¬£¬ £¬£¬½ÌÓý¡¢Ö´·¨ÒÔ¼°ÁãÊÛºÍÅú·¢ÉÌÒµÐÐÒµÔâµ½µÄ¹¥»÷×î¶à¡£¡£¡£¡£¡£¡£


https://www.jumpsec.com/uk-ransomware-trends-lessons-for-2023/