IconBurstÕë¶ÔNPMµÄ¹©¸øÁ´¹¥»÷Ó°ÏìÊý°Ù¸öÍøÕ¾ºÍÀûÓÃ
°ä²¼¹¦·ò 2022-07-061¡¢IconBurstÕë¶ÔNPMµÄ¹©¸øÁ´¹¥»÷Ó°ÏìÊý°Ù¸öÍøÕ¾ºÍÀûÓÃ
7ÔÂ5ÈÕ£¬ReversingLabsÅû¶ÁËIconBurstÕë¶ÔNPMµÄ¹©¸øÁ´¹¥»÷»î¶¯µÄϸ½ÚÐÅÏ¢¡£¸Ã»î¶¯¿É×·Òäµ½2021Äê12Ô£¬¹¥»÷ÕßʹÓÃÁËÊýÊ®¸ö°ü·Ñ½âÏýJavascript´úÂëµÄ¶ñÒâNPMÀ´Ï°È¾Êý°Ù¸ö×ÀÃæÀûÓ÷¨Ê½ºÍÍøÕ¾¡£Óë֮ǰÀàËÆµÄ¹¥»÷Ò»Ñù£¬¸Ã»î¶¯Ò²ÖØÒªÒÀÀµÓÚÆ´Ð´ÃýÎ󣬼ÙÒâÊ¢ÐеÄNPMÄ£¿é£¬ÈçumbrellajsºÍionic.io NPMÄ£¿é¡£×êÑÐÈËÔ±»¹·¢ÏÖÁËÐͬ¹©¸øÁ´¹¥»÷µÄÖ¤¾Ý£¬´óÁ¿µÄNPM°üÔ̺¬jQuery¾ç±¾£¬Ö¼ÔÚ´ÓÔ̺¬ËüÃǵÄÀûÓ÷¨Ê½ÖÐÇÔÈ¡±íµ¥Êý¾Ý¡£
https://blog.reversinglabs.com/blog/iconburst-npm-software-supply-chain-attack-grabs-data-from-apps-websites
2¡¢ÀÕË÷ÍÅ»ïAstraLocker´òËãÖÕ³¡ÔËÓª²¢°ä²¼Æä½âÃÜÆ÷
¾ÝýÌå7ÔÂ4ÈÕ±¨Â·£¬ÀÕË÷ÍÅ»ïAstraLocker´òËãÖÕ³¡ÔËÓª£¬²¢ÔÚVirusTotalÌá½»ÁËÒ»¸öº¬ÓÐAstraLocker½âÃÜÆ÷µÄZIPÎļþ¡£´Ë±í£¬¸ÃÍŻﻹй©ËûÃÇ´òËãתÏò¼ÓÃܽٳֹ¥»÷»î¶¯¡£×êÑÐÈËÔ±ÏÂÔØ²¢È·ÈϸÃZIPÎļþÊǺϷ¨µÄ£¬¾¹ý²âÊÔºó֤ʵ½âÃÜÆ÷Ò²Äܹ»Õý³£¹¤×÷¡£¹ÌÈ»¹¥»÷ÕßûÓÐÃ÷È·ÖÕ³¡ÔËÓªµÄÔÒò£¬µ«ºÜ¿ÉÄÜÊÇÓÉÓÚ½üÆÚ¹ØÓÚËüµÄ±¨Â·ÒýÆðÁ˹«¼ÒµÄ¹Ø×¢£¬Ê¹Æä³ÉΪ·¨ÂÉ»ú¹¹µÄÖ¸±ê¡£
https://www.bleepingcomputer.com/news/security/astralocker-ransomware-shuts-down-and-releases-decryptors/
3¡¢ÈÕ±¾Kokikai YasueҽԺй¶ʮÍò¶à»¼ÕߺÍÔ±¹¤µÄÐÅÏ¢
ýÌå7ÔÂ4Èճƣ¬ÈÕ±¾Kokikai YasueҽԺй¶ÁË111191Ãû»¼ÕߺÍ715ÃûÔ±¹¤µÄÐÅÏ¢¡£¸ÃÒ½ÔºÓÚ5ÔÂ27ÈÕ·¢ÏÖ¶ÔÆäÍÆËã»úϵͳδ¾ÊÚȨµÄ½Ó¼û£¬ÆäʱÎÞ·¨½Ó¼û»¼ÕßÐÅÏ¢Êý¾Ý¿â£¬ÇÒµç×Ó²¡ÀúϵͳµÈ²¿ÃÅϵͳÖÕ³¡ÔËÐС£µ±Ìì²ÉÈ¡ÁËÏ޶Ȳ¿ÃÅÒµÎñµÄÕïÁÆÌåÔ죬²¢ÔÚ28ÈÕ¸´ÔÕý³£ÔËÓª¡£Õâ´ÎÊÂÎñй¶»¼ÕßµÄÐÕÃû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍÒßÃç½ÓÖÖÊ·µÈÐÅÏ¢£»ÒÔ¼°Ô±¹¤µÄÐÕÃû¡¢µØÖ·ºÍµç»°µÈ¡£
https://www.databreaches.net/jp-information-of-111191-patients-and-715-employees-at-kokikai-yasue-hospital-leaked/
4¡¢ÎÚ¿ËÀ¼¾¯·½¿ÛÁôµÁÈ¡³¬¹ý300ÍòÃÀÔªµÄ´¹µöÍÅ»ïµÄ³ÉÔ±
¾Ý7ÔÂ4ÈÕ±¨Â·£¬ÎÚ¿ËÀ¼¾¯·½³É¹¦¿ÛÁôÁËÒ»¸ö´¹µöÍÅ»ïµÄ9Ãû³ÉÔ±¡£·¨ÂÉÈËÔ±°µÊ¾£¬ËûÃÇ´´½¨ÁË400¶à¸ö´¹µöÍøÕ¾£¬ÒÔÍøÂçÖ¸±êµÄÒøÐп¨Êý¾Ý²¢´ÓËûÃǵÄÕË»§ÖеÁÈ¡×ʽð¡£Ä¿Ç°£¬ÏÓÒÉÈËÒÑ»ñµÃÁËÔ¼1ÒÚ¸ñÀï·òÄÉ£¨337ÍòÃÀÔª£©£¬¿ÉÄÜ»áÎî¶Ô³¤´ï15ÄêµÄçÐç¥Ö®ÔÖ¡£Õâ´Î·¨ÂÉÐж¯³ä¹«ÁËËûÃǵÄÍÆËã»ú¡¢ÊÖ»ú¡¢ÒøÐп¨ÒÔ¼°·¸·¨»ñµÃµÄÊÕÒæ¡£Éв»Ã÷ÏÔÆä´¹µöÁ´½ÓµÄ·Ö·¢õè¾¶£¬¿ÉÄÜÊǶÌÐÅ´¹µö£¨smishing£©¡¢À¬»øÓʼþ¡¢É罻ýÌåÀûÓÃÐÂÎźÍSEOÖж¾µÈ¡£
https://thehackernews.com/2022/07/ukrainian-authorities-arrested-phishing.html
5¡¢Cisco°ä²¼ÔÚ°µÍøÉ϶ÔÀÕË÷Èí¼þÓòÈ¥ÄäÃû»¯µÄ¼¼Êõ»ã±¨
ýÌå7ÔÂ5ÈÕ±¨Â·£¬Cisco¾ßÌå½éÉÜÁËÈôºÎÔÚ°µÍøÉ϶ÔÀÕË÷Èí¼þµÄÓò½øÐÐÈ¥ÄäÃû»¯¡£´óÎÞÊýÀÕË÷ÍÅ»ïʹÓÃʹÓÃÆäÔ¼®¹úÒÔ±íµÄÍйܹ©¸øÉÌ£¨ÈçÈðµä¡¢µÂ¹úºÍÐÂ¼ÓÆÂ£©À´ÍйÜËûÃǵÄÍøÕ¾£¬µ±ËûÃÇÏÎ½ÓÆä»ù´¡ÉèÊ©À´Ö´ÐÐÔ¶³ÌÖÎÀí¹¤×÷ʱ£¬»áʹÓÃVPSÌøµã×÷Ϊ´úÀíÀ´°µ²ØËûÃǵÄÕæÊµµØÎ»¡£×êÑÐÈËԱʹÓõÄÈ¥ÄäÃû·½Ê½Ô̺¬£ºTLSÖ¤Ê鯥Å䣬ͨ¹ý½«¹¥»÷ÕßµÄ×ÔÊðÃûTLSÖ¤ÊéÐòÁкźÍÒ³ÃæÔªËØÓëÍøÂçÉϵÄË÷ÒýµÄ½øÐÐÆ¥Åä£»ÍøÕ¾Í¼±êÆ¥Å䣬²éÕÒ°µÍøÉÏÌØ¶¨µÄÍøÕ¾Í¼±êÊÇ·ñÒ²³Ê´Ë¿Ì¹«ÍøÉÏ£»ÒÔ¼°OPSEC¹ÊÕÏ£¬¹¥»÷ÍÅ»ïÓÐʱ»á·¸¿àÄÑÐԵݲȫÃýÎ󣬵¼ÖÂÄäÃûʧЧ¡£
https://thehackernews.com/2022/07/researchers-share-techniques-to-uncover.html
6¡¢ÆÏÌÑÑÀ2022ÄêQ2Íþв»ã±¨³ÆÒøÐгÉÎªÖØÒª¹¥»÷Ö¸±ê
7ÔÂ4ÈÕ£¬Segran?a-Inform¨¢tica°ä²¼ÁËÆÏÌÑÑÀ2022ÄêµÚ¶þ¼¾¶ÈµÄÍþв·ÖÎö»ã±¨¡£»ã±¨ÏÔʾ£¬ÔÚµÚ¶þ¼¾¶È£¬ÍøÂç´¹µö»î¶¯(68.9%)±È¶ñÒâÈí¼þ(31.1%)¸ü³£¼û¡£QakbotľÂí¡¢Satori/Mirai½©Ê¬ÍøÂçºÍMS OfficeÎĵµ£¨ºê£©ÊÇÆÏÌÑÑÀÔÚµÚ¶þ¼¾¶ÈÃæ¶ÔµÄ×î³£¼ûµÄÍþв¡£´Ë±í£¬ÓдóÁ¿µÄ´¹µö»î¶¯Óë°ü¹üµÝËÍ·þÎñÓйأ¬Ô̺¬CTT¡¢DHL¡¢UPSºÍFedExµÈ¡£¹ØÓÚÊÜÓ°ÏìµÄÐÐÒµ£¬ÒøÐгÉÎªÖØÒª¹¥»÷Ö¸±ê£¬Æä´ÎÊÇÁãÊÛºÍÒ½Áƽ¡È«ÐÐÒµ¡£
https://seguranca-informatica.pt/threat-report-portugal-q2-2022/#.YsT3wnZBxPY


¾©¹«Íø°²±¸11010802024551ºÅ