΢Èí7Ô·ݸüаüÀ¨6¸ö±»Ê¹ÓÃ0dayÔÚÄÚµÄ132¸öÎó²î

Ðû²¼Ê±¼ä 2023-07-12

1¡¢Î¢Èí7Ô·ݸüаüÀ¨6¸ö±»Ê¹ÓÃ0dayÔÚÄÚµÄ132¸öÎó²î


¾ÝýÌå7ÔÂ11ÈÕ±¨µÀ£¬ £¬Î¢ÈíÐû²¼ÁË7Ô·ݵÄÖܶþ²¹¶¡£¬ £¬×ܼÆÐÞ¸´ÁË132¸öÎó²î£¬ £¬ÆäÖаüÀ¨6¸öÒѱ»Ê¹ÓõÄÎó²î ¡£¡£¡£¡£Åû¶µÄ±»Ê¹ÓÃÎó²î°üÀ¨Windows MSHTMLƽ̨ÌáȨÎó²î£¨CVE-2023-32046£©¡¢Windows SmartScreenÇå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2023-32049£©¡¢Windows¹ýʧ±¨¸æÐ§ÀÍÌáȨÎó²î£¨CVE-2023-36874£©¡¢OfficeºÍWindows HTMLÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-36884£©ºÍOutlookÇå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2023-35311£©µÈ ¡£¡£¡£¡£ÆäÖУ¬ £¬ÉÐÎÞÕë¶ÔCVE-2023-36884µÄ¿ÉÓøüУ¬ £¬¸ÃÎó²î±»RomComÍÅ»ïʹÓ㬠£¬Ô¤¼Æ»áÔÚ½ôÆÈ¸üлòδÀ´µÄÖܶþ²¹¶¡ÖÐÐÞ¸´£¬ £¬Óû§¿ÉÏȽÓÄÉ»º½â²½·¥ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2023-patch-tuesday-warns-of-6-zero-days-132-flaws/


2¡¢°Ä´óÀûÑÇVentiaÔâµ½ÍøÂç¹¥»÷µ¼Ö²¿·ÖϵͳÔÝʱ¹Ø±Õ


¾Ý7ÔÂ11ÈÕ±¨µÀ£¬ £¬°Ä´óÀûÑÇ»ù´¡ÉèʩЧÀÍÌṩÉÌVentiaÔâµ½ÁËÍøÂç¹¥»÷ ¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÉÏÖÜÁù͸¶£¬ £¬Æä¼ì²âµ½ÁËÈëÇֻ²¢¹Ø±ÕÁËһЩҪº¦ÏµÍ³ÒÔÓ¦¶Ô¸ÃÊÂÎñ£¬ £¬ÏÖÔÚÕýÔÚ¾ÙÐÐÊÓ²ì ¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÉÏÖÜÈÕÓÖ½ÒÏþÁ˺óÐøÉùÃ÷£¬ £¬³ÆËûÃÇÈÔÔÚÓ¦¶Ô´Ë´Î¹¥»÷£¬ £¬ËùÓÐÔËÓªÔ¤¼Æ½«ÔÚ½ÓÏÂÀ´µÄ¼¸ÌìÄÚ»Ö¸´Õý³£ ¡£¡£¡£¡£VentiaûÓлØÓ¦ÕâÊÇ·ñÊÇÀÕË÷¹¥»÷µÄѯÎÊ£¬ £¬µ«¹Ø±ÕϵͳÊÇÓ¦¶Ô´ËÀàÊÂÎñµÄ³£¼û²½·¥ ¡£¡£¡£¡£


https://www.securityweek.com/critical-infrastructure-services-firm-ventia-takes-systems-offline-due-to-cyberattack/


3¡¢BlackBerry·¢Ã÷RomComÕë¶Ô±±Ô¼·å»á²Î»áÕߵĴ¹ÂÚ¹¥»÷


BlackBerryÔÚ7ÔÂ8ÈÕ³ÆÆä½üÆÚ·¢Ã÷ÁËÁ½·Ý¶ñÒâÎļþ£¬ £¬Ã°³äÎÚ¿ËÀ¼ÌìÏ´ó»á×éÖ¯²¢Ê¹ÓÃÁËÓë±±Ô¼·å»áÏà¹ØµÄÖ÷Ìâ ¡£¡£¡£¡£ÆÊÎö·¢Ã÷£¬ £¬¸½¼Ó×é¼þÊÇÒ»¸öʹÓÃ΢ÈíÖ§³ÖÕï¶Ï¹¤¾ß£¨MSDT£©ÖÐÎó²îFollina£¨CVE-2022-30190£©µÄ¾ç±¾£¬ £¬ÀÖ³ÉʹÓÃÎó²î¿Éͨ¹ý¶ñÒâ.docx»ò.rtfÎĵµ¾ÙÐÐRCE¹¥»÷ ¡£¡£¡£¡£×îºó½×¶ÎµÄ¶ñÒâÈí¼þÊÇRomCom RAT£¬ £¬ËüÒÔx64 DLLÎļþCalc.exeµÄÐÎʽ·ºÆð ¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬ £¬´Ë´Î»î¶¯ÒªÃ´ÊÇÖØÐÂÃüÃûµÄRomComÐж¯£¬ £¬ÒªÃ´ÊÇÓоÉÍÅ»ïµÄ½¹µã³ÉÔ±Ö§³ÖµÄл ¡£¡£¡£¡£


https://blogs.blackberry.com/en/2023/07/romcom-targets-ukraine-nato-membership-talks-at-nato-summit


4¡¢ºÚ¿ÍʹÓÃRevolutÖ§¸¶ÏµÍ³ÖÐÎó²î͵ȡÁè¼Ý2000ÍòÃÀÔª


ýÌå7ÔÂ10ÈÕ±¨µÀ³Æ£¬ £¬ºÚ¿ÍʹÓÃRevolutÖ§¸¶ÏµÍ³ÖÐÎó²î£¬ £¬ÍµÈ¡ÁËÁè¼Ý2000ÍòÃÀÔª ¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÓÚ2022ÄêÍ·£¬ £¬Ô´ÓÚÃÀ¹úºÍÅ·ÖÞÖ§¸¶ÏµÍ³Ö®¼äµÄ²î±ð ¡£¡£¡£¡£µ±Ò»Ð©ÉúÒâ±»¾Ü¾øÊ±£¬ £¬¸Ã¹«Ë¾»á¹ýʧµØÓÃ×Ô¼ºµÄÇ®ÍË»¹ÕË»§ ¡£¡£¡£¡£¹¥»÷Õß»á¾ÙÐи߼۹ºÎ £¬µ«ÕâЩ¹ºÎï»á±»¾Ü¾ø£¬ £¬È»ºóÔÚATM»úÉÏÌáÈ¡ÍË¿î ¡£¡£¡£¡£¹¥»÷ÕßʹÓøÃÎó²îÇÔÈ¡ÁËÔ¼2300ÍòÃÀÔª£¬ £¬ÆäÖв¿·Ö½ð¶î±»Êջأ¬ £¬¾»ËðʧԼΪ2000ÍòÃÀÔª£¬ £¬Ï൱ÓÚRevaultÔÚ2021Äê¾»ÀûÈóµÄÈý·ÖÖ®¶þ ¡£¡£¡£¡£


https://securityaffairs.com/148315/breaking-news/revolut-payment-systems-flaw.html


5¡¢ZscalerÅû¶ÐÂľÂíTOITOINÕë¶ÔÀ­¶¡ÃÀÖÞÆóÒµµÄ¹¥»÷


ZscalerÔÚ7ÔÂ7ÈÕÅû¶ÁËÒ»ÖÖ»ùÓÚWindowsµÄÐÂÐÍľÂíTOITOIN£¬ £¬Ö÷ÒªÕë¶ÔÔÚÀ­¶¡ÃÀÖÞ(LATAM)µØÇøÔËÓªµÄÆóÒµ ¡£¡£¡£¡£¹¥»÷»î¶¯Ê¼ÓÚ5Ô·Ý£¬ £¬Ê¹ÓÃÁËÒ»¸ö×ñÕÕ¶à½×¶ÎѬȾÁ´µÄľÂí£¬ £¬ÔÚÿ¸ö½×¶Î¶¼Ê¹ÓÃÁËÌØÖÆµÄÄ£¿£¿£¿£¿é ¡£¡£¡£¡£ÕâЩģ¿£¿£¿£¿éÊǶ¨ÖÆÉè¼ÆµÄ£¬ £¬ÓÃÓÚÖ´ÐÐÖÖÖÖ¶ñÒâ»î¶¯£¬ £¬ÈçÏòÔ¶³ÌÀú³Ì×¢Èë¶ñÒâ´úÂ롢ͨ¹ýCOM Elevation MonikerÈÆ¹ýÓû§ÕÊ»§¿ØÖÆ£¬ £¬ÒÔ¼°Í¨¹ýÏµÍ³ÖØÆôºÍ¸¸Àú³Ì¼ì²éµÈÊÖÒÕÈÆ¹ýɳºÐ¼ì²âµÈ ¡£¡£¡£¡£¸Ã»î¶¯µÄ×îÖÕpayloadÊÇľÂíTOITOIN£¬ £¬Ëü»áÍøÂçϵͳÐÅÏ¢£¬ £¬ÒÔ¼°Óëä¯ÀÀÆ÷ºÍTopaz OFD±£»£»£»£»¤Ä£¿£¿£¿£¿éÏà¹ØµÄÊý¾Ý ¡£¡£¡£¡£


https://www.zscaler.com/blogs/security-research/toitoin-trojan-analyzing-new-multi-stage-attack-targeting-latam-region


6¡¢AhnLabÐû²¼ºóÃÅRekoobeÕë¶Ôº«¹úµÄ¹¥»÷µÄÆÊÎö±¨¸æ


7ÔÂ11ÈÕ£¬ £¬AhnLabÐû²¼ÁËAPT31ʹÓõĺóÃÅRekoobeÕë¶Ôº«¹úµÄ¹¥»÷µÄÆÊÎö±¨¸æ ¡£¡£¡£¡£ºóÃÅRekoobeÓÚ2015ÄêÊ״α»·¢Ã÷£¬ £¬ÊÇ»ùÓÚ¿ªÔ´³ÌÐòTiny SHellµÄÔ´´úÂ뿪·¢µÄ ¡£¡£¡£¡£Rekoobeͨ¹ý½«ÆäÀú³ÌÃû³Æ¸ü¸ÄΪ/bin/bashÀ´Î±×°×Ô¼º£¬ £¬ËüÓëTiny SHellÖ®¼äµÄÏÔ×ÅÇø±ðÊÇȱÉÙÓÃÓÚÎüÊÕC&CµØµã»òÃÜÂëµÄÏÂÁîÐÐÑ¡Ï £¬Òò´ËµØµã±»Ó²±àÂëÔÚ¶ñÒâÈí¼þÖÐ ¡£¡£¡£¡£Õë¶Ôº«¹úµÄËùÓÐÑù±¾¾ù»ùÓÚx64¼Ü¹¹ÇÒ½ÓÄÉ·´ÏòshellÐÎʽ£¬ £¬Åú×¢ËüÃÇÕë¶ÔµÄÊÇLinuxЧÀÍÆ÷ ¡£¡£¡£¡£Æ¾Ö¤ÏÕЩÏàͬµÄÃÜÂëÍÆ²â£¬ £¬ËüÃǾù±»Í³Ò»¸ö¹¥»÷ÕßʹÓà ¡£¡£¡£¡£


https://asec.ahnlab.com/en/55229/