Cisco°ä²¼°²È«¸üУ¬½¨¸´Æä¶à¿î²úÆ·ÖеÄ8¸ö·ì϶

°ä²¼¹¦·ò 2022-08-05
1¡¢Cisco°ä²¼°²È«¸üУ¬½¨¸´Æä¶à¿î²úÆ·ÖеÄ8¸ö·ì϶

      

8ÔÂ3ÈÕ£¬Cisco°ä²¼°²È«¸üУ¬×ܼƽ¨¸´ÁË8¸ö·ì϶¡£ÆäÖУ¬½ÏΪÑϳÁµÄÊÇCisco Small Business RVϵÁзÓÉÆ÷Öеķì϶CVE-2022-20842£¬CVSSÆÀ·ÖΪ9.8£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÓÃÀ´Ö´ÐÐËÁÒâ´úÂ룬»òʹÉ豸Òâ±í³ÁÆô´Ó¶øµ¼Ö»ؾø·þÎñ(DoS)£»»¹ÓÐWeb¹ýÂËÆ÷Êý¾Ý¿â¸üÐÂÖ°ÄÜÖеĺÅÁî×¢Èë·ì϶£¨CVE-2022-20827£©ºÍÊ¢¿ª¼´²å¼´ÓÃ(PnP)Ä£¿éºÅÁî×¢Èë·ì϶£¨CVE-2022-20841£©£¬ÒÔÉÏÈý¸ö·ì϶¾ùΪÊäÈëÑéÖ¤²»¼°µ¼ÖµÄ¡£´Ë±í£¬»¹½¨¸´ÁËWebex MeetingsºÍÉí·Ý·þÎñÒýÇæµÈ²úÆ·ÖеĶà¸ö·ì϶¡£


https://thehackernews.com/2022/08/cisco-business-routers-found-vulnerable.html


2¡¢µÂ¹ú¹¤ÉÌЭ»á³ÆÆäÔâµ½´ó¹æÄ£¹¥»÷±»ÆÈ¹Ø¹ØËùÓÐϵͳ

      

¾ÝýÌå8ÔÂ4ÈÕ±¨Â·£¬µÂ¹ú¹¤ÉÌЭ»á(DIHK)³ÆÆäÔâµ½ÁË´ó¹æÄ£µÄ¹¥»÷¡£DIHKÊÇÓÉ79¸ö´ú±íµÂ¹ú¹«Ë¾µÄÉÌ»á×é³ÉµÄͬÃË£¬Õ¼Óг¬¹ý300Íò»áÔ±¡£¹¥»÷²úÉúÔÚ8ÔÂ3ÈÕ£¬Ð­»á±»ÆÈ¹Ø¹ØÆäËùÓÐITϵͳ£¬ÒÔ¼°Êý×Ö·þÎñ¡¢µç»°ºÍµç×ÓÓʼþ·þÎñÆ÷À´Ó¦¶ÔÕâ´Î¹¥»÷¡£DIHKÉêÃ÷¹Ø¹ØÏµÍ³ÊÇÒ»ÖÖÔ¤·À´ëÊ©£¬Ò²ÊÇÈÃITÍŶÓÓй¦·òÌá³ö½â¾ö¹æ»®ºÍ³ÉÁ¢·ÀÓùµÄ·½Ê½¡£Ä¿Ç°£¬¸Ã»ú¹¹ÔÚÖ𲽸´Ô­Ò»Ð©·þÎñ£¬µ«ÎÞ·¨Ô¤²â±ØÒª¶à³¤¹¦·ò¡£


https://www.bleepingcomputer.com/news/security/german-chambers-of-industry-and-commerce-hit-by-massive-cyberattack/


3¡¢RobinhoodÒòÎ¥·´Å¦Ô¼ÍøÂ簲ȫÂÉÀý±»·£¿î3000ÍòÃÀÔª

      

ýÌå8ÔÂ3Èճƣ¬RobinhoodµÄ¼ÓÃÜÇ®±Ò²¿ÃÅÒòÎ¥·´ÍøÂ簲ȫºÍÏ´Ç®ÂÉÀý¶ø±»Å¦Ô¼½ðÈÚ·þÎñ²¿·£¿î3000ÍòÃÀÔª¡£Å¦Ô¼½ðÈÚ·þÎñ²¿µÄÉêÃ÷°µÊ¾£¬Robinhood CryptoÍøÂ簲ȫ´òËã´æÔÚÎÊÌ⣬ûÓÐÆëÈ«½â¾öRHCµÄÔËÓª·çÏÕ£¬²¢ÇҸôòËãÖеľßÌåÕþ²ß²»ÆëÈ«ÇкÏÍøÂ簲ȫºÍÐ鹹Ǯ±ÒÂÉÀýµÄ¼¸Ïî»®¶¨£¬ÇҸù«Ë¾µÄºÏ¹æ´òËãºÍÂòÂô¼à¿ØÏµÍ³ÖеĴæÔÚȱµã¡£³ýÁË3000ÍòÃÀÔªµÄ·£¿î±í£¬¸Ã¹«Ë¾»¹±ØÒªÀñƸһÃû¶ÀÁ¢ÕÕ·÷À´È«ÃæÆÀ¹ÀRobinhood CryptoÂÉÀýµÄ×ñÊØÇé¿ö£¬²¢½¨¸´ÒÑ·¢ÏÖµÄȱµãºÍÎ¥¹æÐÐΪ¡£


https://www.securityweek.com/robinhood-crypto-penalized-30m-violating-ny-cybersecurity-regulations


4¡¢Ô¼Äª35000¸öGitHub´æ´¢¿â±»¿Ë¡²¢Ôö³¤¶ñÒâ´úÂë

      

8ÔÂ3ÈÕ£¬Èí¼þ¿ª·¢ÈËÔ±Stephen LacyÐû³ÆÔÚGitHubÉÏ·¢ÏÖÁËÔ¼35000¸ö´æ´¢¿â±»¿Ë¡²¢Ôö³¤¶ñÒâ´úÂë¡£¿ª·¢ÈËÔ±James TuckerÖ¸³ö£¬Ô̺¬¶ñÒâURLµÄ¿Ë¡´æ´¢¿â²»½öй¶ÁËÓû§µÄ»·¾³±äÁ¿ £¬²¢ÇÒ»¹Ô̺¬Ò»¸öµ¥ÐкóÃÅ¡£ÆäÖоø´óÎÞÊý¿Ë¡µÄ´æ´¢¿âÔÚÉϸöÔ±»¶ñÒâ´úÂë´Û¸Ä£¬µ«Ò²µ½Ò»Ð©¿É×·Òäµ½2015ÄꡣĿǰ£¬GitHubÍŶÓÒÑ´ÓÆäÆ½Ì¨ÉÑþ³ØýÁ˶ñÒâ¿Ë¡´æ´¢¿â¡£


https://www.bleepingcomputer.com/news/security/35-000-code-repos-not-hacked-but-clones-flood-github-to-serve-malware/


5¡¢Zscaler·¢ÏÖÀûÓÃAiTM¼¼ÊõºÍ¶àÖÖÈÆ¹ýÕ½ÊõµÄ´¹µö¹¥»÷

      

ZscalerÔÚ8ÔÂ2ÈÕÅû¶ÁËÀûÓÃAiTM¼¼ÊõÒÔ¼°¶àÖÖÈÆ¹ýÕ½ÊõµÄ´ó¹æÄ£ÍøÂç´¹µö»î¶¯¡£Õâ´Î»î¶¯ÆðÍ·ÓÚ2022Äê6Ô£¬ÖØÒªÕë¶ÔÃÀ¹ú¡¢Ó¢¹ú¡¢ÐÂÎ÷À¼ºÍ°Ä´óÀûÑǵĽðÈڿƼ¼¡¢´û¿î¡¢¹ÜÕÊ¡¢±£ÏÕºÍÁª¹úÐÅÓþºÏ×÷Éç×éÖ¯¡£¹¥»÷»î¶¯ÀûÓÃÁË»ùÓÚ´úÀíµÄ×Ô½çËµÍøÂç´¹µö¹¤¾ß°üÈÆ¹ý¶à³É·ÖÈÏÖ¤£¨MFA£©£¬ÀûÓø÷Àà¼Ù×°ºÍä¯ÀÀÆ÷Ö¸ÎÆ¼¼ÊõÀ´Èƹý×Ô¶¯URL·ÖÎöϵͳ£¬ÀûÓÃURL³Á¶¨Ïò¼¼ÊõÈÆ¹ýÆóÒµµç×ÓÓʼþURL·ÖÎö½â¾ö¹æ»®£¬»¹ÀûÓÃÁ˺Ϸ¨µÄÔÚÏß´úÂë±à×ë·þÎñ£¨ÈçCodeSandboxºÍGlitch£©¡£


https://www.zscaler.com/blogs/security-research/large-scale-aitm-attack-targeting-enterprise-users-microsoft-email-services


6¡¢Kaspersky°ä²¼2022ÄêQ2 DDoS¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨

      

8ÔÂ3ÈÕ£¬Kaspersky°ä²¼ÁË2022ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬ÔÚµÚ¶þ¼¾¶È×ܹ²¼Í¼ÁË78558´ÎDDoS¹¥»÷£¬±ÈÉÏÒ»¼¾¶È½µÂäÁË13.72%¡£³¤¹¦·ò£¨20Ó×ʱ»ò¸ü³¤£©DDoS¹¥»÷µÄÕ¼±È½µÂ䣬´ÓµÚÒ»¼¾¶ÈµÄ½ü20%½µÖÁÔ¼7%£¬4Ó×ʱµÄ½Ï¶ÌDDoS¹¥»÷Õ¼×ܹ¥»÷ÊýÁ¿µÄ95.24%¡£46.17%µÄ½©Ê¬ÍøÂçC2·þÎñÆ÷λÓÚÃÀ¹ú£¬Æä´ÎÊǺÉÀ¼£¨14.49%£©ºÍµÂ¹ú£¨9.11%£©¡£ÖØÒªµÄDDoS¹¥»÷¼¼ÊõΪUDP flood£¬Õ¼±È62.53%£¬Æä´ÎÊÇSYN flood£¨20.25%£©¡£


https://securelist.com/ddos-attacks-in-q2-2022/107025/