΢Èí7Ô·ݸüаüÂÞ6¸ö±»ÀûÓÃ0dayÔÚÄÚµÄ132¸ö©¶´

Ðû²¼Ê±¼ä 2023-07-12

1¡¢Î¢Èí7Ô·ݸüаüÂÞ6¸ö±»ÀûÓÃ0dayÔÚÄÚµÄ132¸ö©¶´


¾ÝýÌå7ÔÂ11ÈÕ±¨µÀ £¬Î¢ÈíÐû²¼ÁË7Ô·ݵÄÖܶþ²¹¶¡ £¬×ܼÆÐÞ¸´ÁË132¸ö©¶´ £¬ÆäÖаüÂÞ6¸öÒѱ»ÀûÓõÄ©¶´ ¡£Åû¶µÄ±»ÀûÓ鶴°üÂÞWindows MSHTMLƽ̨ÌáȨ©¶´£¨CVE-2023-32046£©¡¢Windows SmartScreenÄþ¾²¹¦Ð§Èƹý©¶´£¨CVE-2023-32049£©¡¢Windows´íÎó³ÂËß·þÎñÌáȨ©¶´£¨CVE-2023-36874£©¡¢OfficeºÍWindows HTMLÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2023-36884£©ºÍOutlookÄþ¾²¹¦Ð§Èƹý©¶´£¨CVE-2023-35311£©µÈ ¡£ÆäÖÐ £¬ÉÐÎÞÕë¶ÔCVE-2023-36884µÄ¿ÉÓøüР£¬¸Ã©¶´±»RomComÍÅ»ïÀûÓà £¬Ô¤¼Æ»áÔÚ½ô¼±¸üлòδÀ´µÄÖܶþ²¹¶¡ÖÐÐÞ¸´ £¬Óû§¿ÉÏȽÓÄÉ»º½â´ëÊ© ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2023-patch-tuesday-warns-of-6-zero-days-132-flaws/


2¡¢°Ä´óÀûÑÇVentiaÔâµ½ÍøÂç¹¥»÷µ¼Ö²¿ÃÅϵͳÔÝʱ¹Ø±Õ


¾Ý7ÔÂ11ÈÕ±¨µÀ £¬°Ä´óÀûÑÇ»ù´¡ÉèÊ©·þÎñÌṩÉÌVentiaÔâµ½ÁËÍøÂç¹¥»÷ ¡£¸Ã¹«Ë¾ÔÚÉÏÖÜÁù͸¶ £¬Æä¼ì²âµ½ÁËÈëÇֻ²¢¹Ø±ÕÁËһЩҪº¦ÏµÍ³ÒÔÓ¦¶Ô¸Ãʼþ £¬Ä¿Ç°ÕýÔÚ½øÐÐÊÓ²ì ¡£¸Ã¹«Ë¾ÔÚÉÏÖÜÈÕÓÖ·¢±íÁ˺óÐøÉùÃ÷ £¬³ÆËûÃÇÈÔÔÚÓ¦¶Ô´Ë´Î¹¥»÷ £¬ËùÓÐÔËÓªÔ¤¼Æ½«ÔÚ½ÓÏÂÀ´µÄ¼¸ÌìÄÚ»Ö¸´Õý³£ ¡£VentiaûÓлØÓ¦ÕâÊÇ·ñÊÇÀÕË÷¹¥»÷µÄѯÎÊ £¬µ«¹Ø±ÕϵͳÊÇÓ¦¶Ô´ËÀàʼþµÄ³£¼û´ëÊ© ¡£


https://www.securityweek.com/critical-infrastructure-services-firm-ventia-takes-systems-offline-due-to-cyberattack/


3¡¢BlackBerry·¢ÏÖRomComÕë¶Ô±±Ô¼·å»á²Î»áÕߵĵöÓã¹¥»÷


BlackBerryÔÚ7ÔÂ8ÈÕ³ÆÆä½üÆÚ·¢ÏÖÁËÁ½·Ý¶ñÒâÎļþ £¬Ã°³äÎÚ¿ËÀ¼ÊÀ½ç´ó»á×éÖ¯²¢Ê¹ÓÃÁËÓë±±Ô¼·å»áÏà¹ØµÄÖ÷Ìâ ¡£·ÖÎö·¢ÏÖ £¬¸½¼Ó×é¼þÊÇÒ»¸öÀûÓÃ΢ÈíÖ§³ÖÕï¶Ï¹¤¾ß£¨MSDT£©ÖЩ¶´Follina£¨CVE-2022-30190£©µÄ½Å±¾ £¬ÀÖ³ÉÀûÓ鶴¿Éͨ¹ý¶ñÒâ.docx»ò.rtfÎĵµ½øÐÐRCE¹¥»÷ ¡£×îºó½×¶ÎµÄ¶ñÒâÈí¼þÊÇRomCom RAT £¬ËüÒÔx64 DLLÎļþCalc.exeµÄÐÎʽ·ºÆð ¡£Ñо¿ÈËÔ±ÈÏΪ £¬´Ë´Î»î¶¯ÒªÃ´ÊÇÖØÐÂÃüÃûµÄRomComÐж¯ £¬ÒªÃ´ÊÇÓоÉÍÅ»ïµÄºËÐijÉÔ±Ö§³ÖµÄл ¡£


https://blogs.blackberry.com/en/2023/07/romcom-targets-ukraine-nato-membership-talks-at-nato-summit


4¡¢ºÚ¿ÍÀûÓÃRevolutÖ§¸¶ÏµÍ³ÖЩ¶´ÍµÈ¡Áè¼Ý2000ÍòÃÀÔª


ýÌå7ÔÂ10ÈÕ±¨µÀ³Æ £¬ºÚ¿ÍÀûÓÃRevolutÖ§¸¶ÏµÍ³ÖЩ¶´ £¬ÍµÈ¡ÁËÁè¼Ý2000ÍòÃÀÔª ¡£¸Ãʼþ·¢ÉúÓÚ2022Äê³õ £¬Ô´ÓÚÃÀ¹úºÍÅ·ÖÞÖ§¸¶ÏµÍ³Ö®¼äµÄ²îÒì ¡£µ±Ò»Ð©½»Ò×±»¾Ü¾øʱ £¬¸Ã¹«Ë¾»á´íÎóµØÓÃ×Ô¼ºµÄÇ®ÍË»¹ÕË»§ ¡£¹¥»÷Õß»á½øÐи߼۹ºÎï £¬µ«ÕâЩ¹ºÎï»á±»¾Ü¾ø £¬È»ºóÔÚATM»úÉÏÌáÈ¡ÍË¿î ¡£¹¥»÷ÕßÀûÓø鶴ÇÔÈ¡ÁËÔ¼2300ÍòÃÀÔª £¬ÆäÖв¿ÃŽð¶î±»ÊÕ»Ø £¬¾»ËðʧԼΪ2000ÍòÃÀÔª £¬Ï൱ÓÚRevaultÔÚ2021Äê¾»ÀûÈóµÄÈý·ÖÖ®¶þ ¡£


https://securityaffairs.com/148315/breaking-news/revolut-payment-systems-flaw.html


5¡¢ZscalerÅû¶ÐÂľÂíTOITOINÕë¶ÔÀ­¶¡ÃÀÖÞÆóÒµµÄ¹¥»÷


ZscalerÔÚ7ÔÂ7ÈÕÅû¶ÁËÒ»ÖÖ»ùÓÚWindowsµÄÐÂÐÍľÂíTOITOIN £¬Ö÷ÒªÕë¶ÔÔÚÀ­¶¡ÃÀÖÞ(LATAM)µØÓòÔËÓªµÄÆóÒµ ¡£¹¥»÷»î¶¯Ê¼ÓÚ5Ô·Ý £¬Ê¹ÓÃÁËÒ»¸ö×ñÑ­¶à½×¶ÎѬȾÁ´µÄľÂí £¬ÔÚÿ¸ö½×¶Î¶¼ÀûÓÃÁËÌØÖƵÄÄ£¿é ¡£ÕâЩÄ£¿éÊǶ¨ÖÆÉè¼ÆµÄ £¬ÓÃÓÚÖ´ÐÐÖÖÖÖ¶ñÒâ»î¶¯ £¬ÈçÏòÔ¶³Ì½ø³Ì×¢Èë¶ñÒâ´úÂ롢ͨ¹ýCOM Elevation MonikerÈƹýÓû§ÕÊ»§¿ØÖÆ £¬ÒÔ¼°Í¨¹ýϵͳÖØÆôºÍ¸¸½ø³Ì¼ì²éµÈ¼¼ÊõÈƹýɳºÐ¼ì²âµÈ ¡£¸Ã»î¶¯µÄ×îÖÕpayloadÊÇľÂíTOITOIN £¬Ëü»áÊÕ¼¯ÏµÍ³ÐÅÏ¢ £¬ÒÔ¼°Óëä¯ÀÀÆ÷ºÍTopaz OFD± £»¤Ä£¿éÏà¹ØµÄÊý¾Ý ¡£


https://www.zscaler.com/blogs/security-research/toitoin-trojan-analyzing-new-multi-stage-attack-targeting-latam-region


6¡¢AhnLabÐû²¼ºóÃÅRekoobeÕë¶Ôº«¹úµÄ¹¥»÷µÄ·ÖÎö³ÂËß


7ÔÂ11ÈÕ £¬AhnLabÐû²¼ÁËAPT31ʹÓõĺóÃÅRekoobeÕë¶Ôº«¹úµÄ¹¥»÷µÄ·ÖÎö³ÂËß ¡£ºóÃÅRekoobeÓÚ2015ÄêÊ״α»·¢ÏÖ £¬ÊÇ»ùÓÚ¿ªÔ´·¨Ê½Tiny SHellµÄÔ´´úÂ뿪·¢µÄ ¡£Rekoobeͨ¹ý½«Æä½ø³ÌÃû³Æ¸ü¸ÄΪ/bin/bashÀ´Î±×°×Ô¼º £¬ËüÓëTiny SHellÖ®¼äµÄÏÔ×ÅÇø±ðÊÇȱÉÙÓÃÓÚ½ÓÊÕC&CµØÖ·»òÃÜÂëµÄÃüÁîÐÐÑ¡Ïî £¬Òò´ËµØÖ·±»Ó²±àÂëÔÚ¶ñÒâÈí¼þÖÐ ¡£Õë¶Ôº«¹úµÄËùÓÐÑù±¾¾ù»ùÓÚx64¼Ü¹¹ÇÒ½ÓÄÉ·´ÏòshellÐÎʽ £¬±íÃ÷ËüÃÇÕë¶ÔµÄÊÇLinux·þÎñÆ÷ ¡£Æ¾¾Ý¼¸ºõÏàͬµÄÃÜÂëÍƲâ £¬ËüÃǾù±»Í¬Ò»¸ö¹¥»÷ÕßʹÓà ¡£


https://asec.ahnlab.com/en/55229/