΢Èí7Ô·ݸüÐÂÔ̺¬6¸ö±»ÀûÓÃ0dayÔÚÄÚµÄ132¸ö·ì϶

°ä²¼¹¦·ò 2023-07-12

1¡¢Î¢Èí7Ô·ݸüÐÂÔ̺¬6¸ö±»ÀûÓÃ0dayÔÚÄÚµÄ132¸ö·ì϶


¾ÝýÌå7ÔÂ11ÈÕ±¨Â· £¬Î¢Èí°ä²¼ÁË7Ô·ݵÄÖܶþ²¹¶¡ £¬×ܼƽ¨¸´ÁË132¸ö·ì϶ £¬ÆäÖÐÔ̺¬6¸öÒѱ»ÀûÓõķì϶¡£Åû¶µÄ±»ÀûÓ÷ì϶Ô̺¬Windows MSHTMLƽ̨ÌáȨ·ì϶£¨CVE-2023-32046£©¡¢Windows SmartScreen°²È«Ö°ÄÜÈÆ¹ý·ì϶£¨CVE-2023-32049£©¡¢WindowsÃýÎó»ã±¨·þÎñÌáȨ·ì϶£¨CVE-2023-36874£©¡¢OfficeºÍWindows HTMLÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2023-36884£©ºÍOutlook°²È«Ö°ÄÜÈÆ¹ý·ì϶£¨CVE-2023-35311£©µÈ¡£ÆäÖÐ £¬ÉÐÎÞÕë¶ÔCVE-2023-36884µÄ¿ÉÓøüР£¬¸Ã·ì϶±»RomComÍÅ»ïÀûÓà £¬Ô¤¼Æ»áÔÚ´¹Î£¸üлò½«À´µÄÖܶþ²¹¶¡Öн¨¸´ £¬Óû§¿ÉÏȲÉÈ¡»º½â´ëÊ©¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2023-patch-tuesday-warns-of-6-zero-days-132-flaws/


2¡¢°Ä´óÀûÑÇVentiaÔâµ½ÍøÂç¹¥»÷µ¼Ö²¿ÃÅϵÍÂäÙʱ¹Ø¹Ø


¾Ý7ÔÂ11ÈÕ±¨Â· £¬°Ä´óÀûÑÇ»ù´¡ÉèÊ©·þÎñÌṩÉÌVentiaÔâµ½ÁËÍøÂç¹¥»÷¡£¸Ã¹«Ë¾ÔÚÉÏÖÜÁùй© £¬Æä¼ì²âµ½ÁËÈëÇֻ²¢¹Ø¹ØÁËһЩ¹Ø¼üϵͳÒÔÓ¦¶Ô¸ÃÊÂÎñ £¬Ä¿Ç°ÔÚ½øÐе÷²é¡£¸Ã¹«Ë¾ÔÚÉÏÖÜÈÕÓÖ°ä·¢Á˺óÐøÉêÃ÷ £¬³ÆËûÃÇÈÔÔÚÓ¦¶ÔÕâ´Î¹¥»÷ £¬ËùÓÐÔËÓªÔ¤¼Æ½«ÔÚ½ÓÏÂÀ´µÄ¼¸ÌìÄÚ¸´Ô­Õý³£¡£VentiaûÓлØÓ¦ÕâÊÇ·ñÊÇÀÕË÷¹¥»÷µÄѯÎÊ £¬µ«¹Ø¹ØÏµÍ³ÊÇÓ¦¶Ô´ËÀàÊÂÎñµÄ³£¼û´ëÊ©¡£


https://www.securityweek.com/critical-infrastructure-services-firm-ventia-takes-systems-offline-due-to-cyberattack/


3¡¢BlackBerry·¢ÏÖRomComÕë¶Ô±±Ô¼·å»á²Î»áÕߵĴ¹µö¹¥»÷


BlackBerryÔÚ7ÔÂ8ÈÕ³ÆÆä½üÆÚ·¢ÏÖÁËÁ½·Ý¶ñÒâÎļþ £¬¼ÙÒâÎÚ¿ËÀ¼ÊÀ½ç´ó»á×éÖ¯²¢Ê¹ÓÃÁËÓë±±Ô¼·å»áÓйصÄÖ÷Ìâ¡£·ÖÎö·¢ÏÖ £¬¸½¼Ó×é¼þÊÇÒ»¸öÀûÓÃ΢ÈíÖ§³ÖÕï¶Ï¹¤¾ß£¨MSDT£©Öзì϶Follina£¨CVE-2022-30190£©µÄ¾ç±¾ £¬³É¹¦ÀûÓ÷ì϶¿Éͨ¹ý¶ñÒâ.docx»ò.rtfÎĵµ½øÐÐRCE¹¥»÷¡£×îºó½×¶ÎµÄ¶ñÒâÈí¼þÊÇRomCom RAT £¬ËüÒÔx64 DLLÎļþCalc.exeµÄ´ó¾Ö³öÏÖ¡£×êÑÐÈËÔ±ÒÔΪ £¬Õâ´Î»î¶¯ÒªÃ´ÊdzÁж¨ÃûµÄRomComÐж¯ £¬ÒªÃ´ÊÇÓоÉÍÅ»ïµÄÖ÷Ìâ³ÉÔ±Ö§³ÖµÄл¡£


https://blogs.blackberry.com/en/2023/07/romcom-targets-ukraine-nato-membership-talks-at-nato-summit


4¡¢ºÚ¿ÍÀûÓÃRevolutÖ§¸¶ÏµÍ³Öзì϶µÁÈ¡³¬¹ý2000ÍòÃÀÔª


ýÌå7ÔÂ10ÈÕ±¨Â·³Æ £¬ºÚ¿ÍÀûÓÃRevolutÖ§¸¶ÏµÍ³Öзì϶ £¬µÁÈ¡Á˳¬¹ý2000ÍòÃÀÔª¡£¸ÃÊÂÎñ²úÉúÓÚ2022ËêÊ× £¬Ô´ÓÚÃÀ¹úºÍÅ·ÖÞÖ§¸¶ÏµÍ³Ö®¼äµÄ²î¾à¡£µ±Ò»Ð©ÂòÂô±»»Ø¾øÊ± £¬¸Ã¹«Ë¾»áÃýÎóµØÓÃ×Ô¼ºµÄÇ®ÍË»¹ÕË»§¡£¹¥»÷Õß»á½øÐи߼۹ºÎï £¬µ«ÕâЩ¹ºÎï»á±»»Ø¾ø £¬¶øºóÔÚATM»úÉÏÌáÈ¡Í˿¹¥»÷ÕßÀûÓø÷ì϶ÇÔÈ¡ÁËÔ¼2300ÍòÃÀÔª £¬ÆäÖв¿ÃŽð¶î±»ÊÕ»Ø £¬¾»ËðʧԼΪ2000ÍòÃÀÔª £¬Ï൱ÓÚRevaultÔÚ2021Äê¾»ÀûÈóµÄÈý·ÖÖ®¶þ¡£


https://securityaffairs.com/148315/breaking-news/revolut-payment-systems-flaw.html


5¡¢ZscalerÅû¶ÐÂľÂíTOITOINÕë¶ÔÀ­¶¡ÃÀÖÞÆóÒµµÄ¹¥»÷


ZscalerÔÚ7ÔÂ7ÈÕÅû¶ÁËÒ»ÖÖ»ùÓÚWindowsµÄÐÂÐÍľÂíTOITOIN £¬ÖØÒªÕë¶ÔÔÚÀ­¶¡ÃÀÖÞ(LATAM)µØÓòÔËÓªµÄÆóÒµ¡£¹¥»÷»î¶¯Ê¼ÓÚ5Ô·Ý £¬Ê¹ÓÃÁËÒ»¸ö×ñÑ­¶à½×¶ÎϰȾÁ´µÄľÂí £¬ÔÚÿ¸ö½×¶Î¶¼ÀûÓÃÁËÌØÔìµÄÄ£¿é¡£ÕâЩÄ£¿éÊǶ¨ÔìÉè¼ÆµÄ £¬ÓÃÓÚÖ´Ðи÷Àà¶ñÒâ»î¶¯ £¬ÈçÏòÔ¶³Ì¹ý³Ì×¢Èë¶ñÒâ´úÂ롢ͨ¹ýCOM Elevation MonikerÈÆ¹ýÓû§ÕÊ»§½ÚÔì £¬ÒÔ¼°Í¨¹ýϵͳ³ÁÆôºÍ¸¸¹ý³Ì²é³­µÈ¼¼ÊõÈÆ¹ýɳºÐ¼ì²âµÈ¡£¸Ã»î¶¯µÄ×îÖÕpayloadÊÇľÂíTOITOIN £¬Ëü»áÍøÂçϵͳÐÅÏ¢ £¬ÒÔ¼°Óëä¯ÀÀÆ÷ºÍTopaz OFD±£»¤Ä£¿éÓйصÄÊý¾Ý¡£


https://www.zscaler.com/blogs/security-research/toitoin-trojan-analyzing-new-multi-stage-attack-targeting-latam-region


6¡¢AhnLab°ä²¼ºóÃÅRekoobeÕë¶Ôº«¹úµÄ¹¥»÷µÄ·ÖÎö»ã±¨


7ÔÂ11ÈÕ £¬AhnLab°ä²¼ÁËAPT31ʹÓõĺóÃÅRekoobeÕë¶Ôº«¹úµÄ¹¥»÷µÄ·ÖÎö»ã±¨¡£ºóÃÅRekoobeÓÚ2015Äê³õ´Î±»·¢ÏÖ £¬ÊÇ»ùÓÚ¿ªÔ´·¨Ê½Tiny SHellµÄÔ´´úÂ뿪·¢µÄ¡£Rekoobeͨ¹ý½«Æä¹ý³ÌÃû³Æ¸ü¸ÄΪ/bin/bashÀ´¼Ù×°×Ô¼º £¬ËüÓëTiny SHellÖ®¼äµÄÏÔ×ÅÇø±ðÊǶÌȱÓÃÓÚ½Ó¹ÜC&CµØÖ·»òÃÜÂëµÄºÅÁîÐÐÑ¡Ïî £¬Òò¶øµØÖ·±»Ó²±àÂëÔÚ¶ñÒâÈí¼þÖС£Õë¶Ôº«¹úµÄËùÓÐÑù±¾¾ù»ùÓÚx64¼Ü¹¹ÇÒѡȡ·´Ïòshell´ó¾Ö £¬Åú×¢ËüÃÇÕë¶ÔµÄÊÇLinux·þÎñÆ÷¡£Æ¾¾ÝÏÕЩһÑùµÄÃÜÂ봧Ħ £¬ËüÃǾù±»Í³Ò»¸ö¹¥»÷ÕßʹÓá£


https://asec.ahnlab.com/en/55229/