΢Èí7Ô·ݸüаüÀ¨6¸ö±»Ê¹ÓÃ0dayÔÚÄÚµÄ132¸öÎó²î
Ðû²¼Ê±¼ä 2023-07-121¡¢Î¢Èí7Ô·ݸüаüÀ¨6¸ö±»Ê¹ÓÃ0dayÔÚÄÚµÄ132¸öÎó²î
¾ÝýÌå7ÔÂ11ÈÕ±¨µÀ£¬Î¢ÈíÐû²¼ÁË7Ô·ݵÄÖܶþ²¹¶¡£¬×ܼÆÐÞ¸´ÁË132¸öÎó²î£¬ÆäÖаüÀ¨6¸öÒѱ»Ê¹ÓõÄÎó²î¡£Åû¶µÄ±»Ê¹ÓÃÎó²î°üÀ¨Windows MSHTMLƽ̨ÌáȨÎó²î£¨CVE-2023-32046£©¡¢Windows SmartScreenÇå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2023-32049£©¡¢Windows¹ýʧ±¨¸æ·þÎñÌáȨÎó²î£¨CVE-2023-36874£©¡¢OfficeºÍWindows HTMLÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-36884£©ºÍOutlookÇå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2023-35311£©µÈ¡£ÆäÖУ¬ÉÐÎÞÕë¶ÔCVE-2023-36884µÄ¿ÉÓøüУ¬¸ÃÎó²î±»RomComÍÅ»ïʹÓã¬Ô¤¼Æ»áÔÚ½ôÆȸüлòδÀ´µÄÖܶþ²¹¶¡ÖÐÐÞ¸´£¬Óû§¿ÉÏȽÓÄÉ»º½â²½·¥¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2023-patch-tuesday-warns-of-6-zero-days-132-flaws/
2¡¢°Ä´óÀûÑÇVentiaÔâµ½ÍøÂç¹¥»÷µ¼Ö²¿·ÖϵͳÔÝʱ¹Ø±Õ
¾Ý7ÔÂ11ÈÕ±¨µÀ£¬°Ä´óÀûÑÇ»ù´¡ÉèÊ©·þÎñÌṩÉÌVentiaÔâµ½ÁËÍøÂç¹¥»÷¡£¸Ã¹«Ë¾ÔÚÉÏÖÜÁù͸¶£¬Æä¼ì²âµ½ÁËÈëÇÖÔ˶¯²¢¹Ø±ÕÁËһЩҪº¦ÏµÍ³ÒÔÓ¦¶Ô¸ÃÊÂÎñ£¬ÏÖÔÚÕýÔÚ¾ÙÐÐÊӲ졣¸Ã¹«Ë¾ÔÚÉÏÖÜÈÕÓÖ½ÒÏþÁ˺óÐøÉùÃ÷£¬³ÆËûÃÇÈÔÔÚÓ¦¶Ô´Ë´Î¹¥»÷£¬ËùÓÐÔËÓªÔ¤¼Æ½«ÔÚ½ÓÏÂÀ´µÄ¼¸ÌìÄÚ»Ö¸´Õý³£¡£VentiaûÓлØÓ¦ÕâÊÇ·ñÊÇÀÕË÷¹¥»÷µÄѯÎÊ£¬µ«¹Ø±ÕϵͳÊÇÓ¦¶Ô´ËÀàÊÂÎñµÄ³£¼û²½·¥¡£
https://www.securityweek.com/critical-infrastructure-services-firm-ventia-takes-systems-offline-due-to-cyberattack/
3¡¢BlackBerry·¢Ã÷RomComÕë¶Ô±±Ô¼·å»á²Î»áÕߵĴ¹ÂÚ¹¥»÷
BlackBerryÔÚ7ÔÂ8ÈÕ³ÆÆä½üÆÚ·¢Ã÷ÁËÁ½·Ý¶ñÒâÎļþ£¬Ã°³äÎÚ¿ËÀ¼ÌìÏ´ó»á×éÖ¯²¢Ê¹ÓÃÁËÓë±±Ô¼·å»áÏà¹ØµÄÖ÷Ìâ¡£ÆÊÎö·¢Ã÷£¬¸½¼Ó×é¼þÊÇÒ»¸öʹÓÃ΢ÈíÖ§³ÖÕï¶Ï¹¤¾ß£¨MSDT£©ÖÐÎó²îFollina£¨CVE-2022-30190£©µÄ¾ç±¾£¬ÀÖ³ÉʹÓÃÎó²î¿Éͨ¹ý¶ñÒâ.docx»ò.rtfÎĵµ¾ÙÐÐRCE¹¥»÷¡£×îºó½×¶ÎµÄ¶ñÒâÈí¼þÊÇRomCom RAT£¬ËüÒÔx64 DLLÎļþCalc.exeµÄÐÎʽ·ºÆð¡£Ñо¿Ö°Ô±ÒÔΪ£¬´Ë´ÎÔ˶¯ÒªÃ´ÊÇÖØÐÂÃüÃûµÄRomComÐж¯£¬ÒªÃ´ÊÇÓоÉÍÅ»ïµÄ½¹µã³ÉÔ±Ö§³ÖµÄÐÂÔ˶¯¡£
https://blogs.blackberry.com/en/2023/07/romcom-targets-ukraine-nato-membership-talks-at-nato-summit
4¡¢ºÚ¿ÍʹÓÃRevolutÖ§¸¶ÏµÍ³ÖÐÎó²î͵ȡÁè¼Ý2000ÍòÃÀÔª
ýÌå7ÔÂ10ÈÕ±¨µÀ³Æ£¬ºÚ¿ÍʹÓÃRevolutÖ§¸¶ÏµÍ³ÖÐÎó²î£¬ÍµÈ¡ÁËÁè¼Ý2000ÍòÃÀÔª¡£¸ÃÊÂÎñ±¬·¢ÓÚ2022ÄêÍ·£¬Ô´ÓÚÃÀ¹úºÍÅ·ÖÞÖ§¸¶ÏµÍ³Ö®¼äµÄ²î±ð¡£µ±Ò»Ð©ÉúÒâ±»¾Ü¾øʱ£¬¸Ã¹«Ë¾»á¹ýʧµØÓÃ×Ô¼ºµÄÇ®ÍË»¹ÕË»§¡£¹¥»÷Õß»á¾ÙÐи߼۹ºÎµ«ÕâЩ¹ºÎï»á±»¾Ü¾ø£¬È»ºóÔÚATM»úÉÏÌáÈ¡ÍË¿î¡£¹¥»÷ÕßʹÓøÃÎó²îÇÔÈ¡ÁËÔ¼2300ÍòÃÀÔª£¬ÆäÖв¿·Ö½ð¶î±»Êջأ¬¾»ËðʧԼΪ2000ÍòÃÀÔª£¬Ï൱ÓÚRevaultÔÚ2021Äê¾»ÀûÈóµÄÈý·ÖÖ®¶þ¡£
https://securityaffairs.com/148315/breaking-news/revolut-payment-systems-flaw.html
5¡¢ZscalerÅû¶ÐÂľÂíTOITOINÕë¶ÔÀ¶¡ÃÀÖÞÆóÒµµÄ¹¥»÷
ZscalerÔÚ7ÔÂ7ÈÕÅû¶ÁËÒ»ÖÖ»ùÓÚWindowsµÄÐÂÐÍľÂíTOITOIN£¬Ö÷ÒªÕë¶ÔÔÚÀ¶¡ÃÀÖÞ(LATAM)µØÇøÔËÓªµÄÆóÒµ¡£¹¥»÷Ô˶¯Ê¼ÓÚ5Ô·ݣ¬Ê¹ÓÃÁËÒ»¸ö×ñÕÕ¶à½×¶ÎѬȾÁ´µÄľÂí£¬ÔÚÿ¸ö½×¶Î¶¼Ê¹ÓÃÁËÌØÖƵÄÄ£¿é¡£ÕâЩģ¿éÊǶ¨ÖÆÉè¼ÆµÄ£¬ÓÃÓÚÖ´ÐÐÖÖÖÖ¶ñÒâÔ˶¯£¬ÈçÏòÔ¶³ÌÀú³Ì×¢Èë¶ñÒâ´úÂ롢ͨ¹ýCOM Elevation MonikerÈƹýÓû§ÕÊ»§¿ØÖÆ£¬ÒÔ¼°Í¨¹ýϵͳÖØÆôºÍ¸¸Àú³Ì¼ì²éµÈÊÖÒÕÈƹýɳºÐ¼ì²âµÈ¡£¸ÃÔ˶¯µÄ×îÖÕpayloadÊÇľÂíTOITOIN£¬Ëü»áÍøÂçϵͳÐÅÏ¢£¬ÒÔ¼°Óëä¯ÀÀÆ÷ºÍTopaz OFD±£»¤Ä£¿éÏà¹ØµÄÊý¾Ý¡£
https://www.zscaler.com/blogs/security-research/toitoin-trojan-analyzing-new-multi-stage-attack-targeting-latam-region
6¡¢AhnLabÐû²¼ºóÃÅRekoobeÕë¶Ôº«¹úµÄ¹¥»÷µÄÆÊÎö±¨¸æ
7ÔÂ11ÈÕ£¬AhnLabÐû²¼ÁËAPT31ʹÓõĺóÃÅRekoobeÕë¶Ôº«¹úµÄ¹¥»÷µÄÆÊÎö±¨¸æ¡£ºóÃÅRekoobeÓÚ2015ÄêÊ״α»·¢Ã÷£¬ÊÇ»ùÓÚ¿ªÔ´³ÌÐòTiny SHellµÄÔ´´úÂ뿪·¢µÄ¡£Rekoobeͨ¹ý½«ÆäÀú³ÌÃû³Æ¸ü¸ÄΪ/bin/bashÀ´Î±×°×Ô¼º£¬ËüÓëTiny SHellÖ®¼äµÄÏÔ×ÅÇø±ðÊÇȱÉÙÓÃÓÚÎüÊÕC&CµØµã»òÃÜÂëµÄÏÂÁîÐÐÑ¡ÏÒò´ËµØµã±»Ó²±àÂëÔÚ¶ñÒâÈí¼þÖС£Õë¶Ôº«¹úµÄËùÓÐÑù±¾¾ù»ùÓÚx64¼Ü¹¹ÇÒ½ÓÄÉ·´ÏòshellÐÎʽ£¬Åú×¢ËüÃÇÕë¶ÔµÄÊÇLinux·þÎñÆ÷¡£Æ¾Ö¤ÏÕЩÏàͬµÄÃÜÂëÍƲ⣬ËüÃǾù±»Í³Ò»¸ö¹¥»÷ÕßʹÓá£
https://asec.ahnlab.com/en/55229/