IconBurstÕë¶ÔNPMµÄ¹©Ó¦Á´¹¥»÷Ó°ÏìÊý°Ù¸öÍøÕ¾ºÍÓ¦ÓÃ

Ðû²¼Ê±¼ä 2022-07-06

1¡¢IconBurstÕë¶ÔNPMµÄ¹©Ó¦Á´¹¥»÷Ó°ÏìÊý°Ù¸öÍøÕ¾ºÍÓ¦ÓÃ


7ÔÂ5ÈÕ£¬£¬ £¬ReversingLabsÅû¶ÁËIconBurstÕë¶ÔNPMµÄ¹©Ó¦Á´¹¥»÷»î¶¯µÄϸ½ÚÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯¿É×·Ëݵ½2021Äê12Ô£¬£¬ £¬¹¥»÷ÕßʹÓÃÁËÊýÊ®¸ö°üÀ¨»ìÏýJavascript´úÂëµÄ¶ñÒâNPMÀ´Ñ¬È¾Êý°Ù¸ö×ÀÃæÓ¦ÓóÌÐòºÍÍøÕ¾¡£¡£¡£¡£¡£¡£¡£Óë֮ǰÀàËÆµÄ¹¥»÷Ò»Ñù£¬£¬ £¬¸Ã»î¶¯Ò²Ö÷ÒªÒÀÀµÓÚÆ´Ð´¹ýʧ£¬£¬ £¬Ã°³äÊ¢ÐеÄNPMÄ£¿£¿£¿ £¿é£¬£¬ £¬ÈçumbrellajsºÍionic.io NPMÄ£¿£¿£¿ £¿é¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËЭͬ¹©Ó¦Á´¹¥»÷µÄÖ¤¾Ý£¬£¬ £¬´ó×ÚµÄNPM°ü°üÀ¨jQuery¾ç±¾£¬£¬ £¬Ö¼ÔÚ´Ó°üÀ¨ËüÃǵÄÓ¦ÓóÌÐòÖÐÇÔÈ¡±íµ¥Êý¾Ý¡£¡£¡£¡£¡£¡£¡£


https://blog.reversinglabs.com/blog/iconburst-npm-software-supply-chain-attack-grabs-data-from-apps-websites


2¡¢ÀÕË÷ÍÅ»ïAstraLockerÍýÏë×èÖ¹ÔËÓª²¢Ðû²¼Æä½âÃÜÆ÷


¾ÝýÌå7ÔÂ4ÈÕ±¨µÀ£¬£¬ £¬ÀÕË÷ÍÅ»ïAstraLockerÍýÏë×èÖ¹ÔËÓª£¬£¬ £¬²¢ÔÚVirusTotalÌá½»ÁËÒ»¸öº¬ÓÐAstraLocker½âÃÜÆ÷µÄZIPÎļþ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬¸ÃÍŻﻹ͸¶ËûÃÇÍýÏëתÏò¼ÓÃÜÐ®ÖÆ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÏÂÔØ²¢È·ÈϸÃZIPÎļþÊÇÕýµ±µÄ£¬£¬ £¬¾­ÓɲâÊÔºó֤ʵ½âÃÜÆ÷Ò²¿ÉÒÔÕý³£ÊÂÇé¡£¡£¡£¡£¡£¡£¡£ËäÈ»¹¥»÷ÕßûÓÐÃ÷È·×èÖ¹ÔËÓªµÄÔµ¹ÊÔ­ÓÉ£¬£¬ £¬µ«ºÜ¿ÉÄÜÊÇÓÉÓÚ½üÆÚ¹ØÓÚËüµÄ±¨µÀÒýÆðÁ˹«ÖڵĹØ×¢£¬£¬ £¬Ê¹Æä³ÉΪִ·¨»ú¹¹µÄÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£ 


https://www.bleepingcomputer.com/news/security/astralocker-ransomware-shuts-down-and-releases-decryptors/


3¡¢ÈÕ±¾Kokikai YasueҽԺй¶ʮÍò¶à»¼ÕߺÍÔ±¹¤µÄÐÅÏ¢


ýÌå7ÔÂ4Èճƣ¬£¬ £¬ÈÕ±¾Kokikai YasueҽԺй¶ÁË111191Ãû»¼ÕߺÍ715ÃûÔ±¹¤µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸ÃÒ½ÔºÓÚ5ÔÂ27ÈÕ·¢Ã÷¶ÔÆäÅÌËã»úϵͳδ¾­ÊÚȨµÄ»á¼û£¬£¬ £¬ÆäʱÎÞ·¨»á¼û»¼ÕßÐÅÏ¢Êý¾Ý¿â£¬£¬ £¬ÇÒµç×Ó²¡ÀúϵͳµÈ²¿·Öϵͳ×èÖ¹ÔËÐС£¡£¡£¡£¡£¡£¡£µ±Ìì½ÓÄÉÁËÏÞÖÆ²¿·ÖÓªÒµµÄÕïÁÆÌåÖÆ£¬£¬ £¬²¢ÔÚ28ÈÕ»Ö¸´Õý³£ÔËÓª¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñй¶»¼ÕßµÄÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍÒßÃç½ÓÖÖÊ·µÈÐÅÏ¢£»£»£»£»£»£»£»ÒÔ¼°Ô±¹¤µÄÐÕÃû¡¢µØµãºÍµç»°µÈ¡£¡£¡£¡£¡£¡£¡£


https://www.databreaches.net/jp-information-of-111191-patients-and-715-employees-at-kokikai-yasue-hospital-leaked/


4¡¢ÎÚ¿ËÀ¼¾¯·½¾Ð²¶ÍµÈ¡Áè¼Ý300ÍòÃÀÔªµÄ´¹ÂÚÍÅ»ïµÄ³ÉÔ±


¾Ý7ÔÂ4ÈÕ±¨µÀ£¬£¬ £¬ÎÚ¿ËÀ¼¾¯·½Àֳɾв¶ÁËÒ»¸ö´¹ÂÚÍÅ»ïµÄ9Ãû³ÉÔ±¡£¡£¡£¡£¡£¡£¡£Ö´·¨Ö°Ô±ÌåÏÖ£¬£¬ £¬ËûÃǽ¨ÉèÁË400¶à¸ö´¹ÂÚÍøÕ¾£¬£¬ £¬ÒÔÍøÂçÄ¿µÄµÄÒøÐп¨Êý¾Ý²¢´ÓËûÃǵÄÕË»§ÖÐ͵ȡ×ʽ𡣡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬ÏÓÒÉÈËÒÑ»ñµÃÁËÔ¼1ÒÚ¸ñÀï·òÄÉ£¨337ÍòÃÀÔª£©£¬£¬ £¬¿ÉÄÜÅöÃæÁÙ³¤´ï15ÄêµÄÀÎÓüÖ®ÔÖ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÖ´·¨Ðж¯Ã»ÊÕÁËËûÃǵÄÅÌËã»ú¡¢ÊÖ»ú¡¢ÒøÐп¨ÒÔ¼°²»·¨»ñµÃµÄÊÕÒæ¡£¡£¡£¡£¡£¡£¡£Éв»ÇåÎúÆä´¹ÂÚÁ´½ÓµÄ·Ö·¢Í¾¾¶£¬£¬ £¬¿ÉÄÜÊǶÌÐÅ´¹ÂÚ£¨smishing£©¡¢À¬»øÓʼþ¡¢É罻ýÌåÓ¦ÓÃÐÂÎźÍSEOÖж¾µÈ¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/07/ukrainian-authorities-arrested-phishing.html


5¡¢CiscoÐû²¼ÔÚ°µÍøÉ϶ÔÀÕË÷Èí¼þÓòÈ¥ÄäÃû»¯µÄÊÖÒÕ±¨¸æ


ýÌå7ÔÂ5ÈÕ±¨µÀ£¬£¬ £¬CiscoÏêϸÏÈÈÝÁËÔõÑùÔÚ°µÍøÉ϶ÔÀÕË÷Èí¼þµÄÓò¾ÙÐÐÈ¥ÄäÃû»¯¡£¡£¡£¡£¡£¡£¡£´ó´ó¶¼ÀÕË÷ÍÅ»ïʹÓÃʹÓÃÆäÔ­¼®¹úÒÔÍâµÄÍйܹ©Ó¦ÉÌ£¨ÈçÈðµä¡¢µÂ¹úºÍÐÂ¼ÓÆÂ£©À´ÍйÜËûÃǵÄÍøÕ¾£¬£¬ £¬µ±ËûÃÇÅþÁ¬Æä»ù´¡ÉèÊ©À´Ö´ÐÐÔ¶³ÌÖÎÀíʹÃüʱ£¬£¬ £¬»áʹÓÃVPSÌøµã×÷ΪÊðÀíÀ´Òþ²ØËûÃǵÄÕæÊµÎ»Öᣡ£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ê¹ÓõÄÈ¥ÄäÃû·½·¨°üÀ¨£ºTLSÖ¤Ê鯥Å䣬£¬ £¬Í¨¹ý½«¹¥»÷ÕßµÄ×ÔÊðÃûTLSÖ¤ÊéÐòÁкźÍÒ³ÃæÔªËØÓëÍøÂçÉϵÄË÷ÒýµÄ¾ÙÐÐÆ¥Å䣻£»£»£»£»£»£»ÍøÕ¾Í¼±êÆ¥Å䣬£¬ £¬²éÕÒ°µÍøÉÏÌØ¶¨µÄÍøÕ¾Í¼±êÊÇ·ñÒ²·ºÆðÔÚ¹«ÍøÉÏ£»£»£»£»£»£»£»ÒÔ¼°OPSEC¹ÊÕÏ£¬£¬ £¬¹¥»÷ÍÅ»ïÓÐʱ»á·¸ÔÖÄÑÐÔµÄÇå¾²¹ýʧ£¬£¬ £¬µ¼ÖÂÄäÃûʧЧ¡£¡£¡£¡£¡£¡£¡£   


https://thehackernews.com/2022/07/researchers-share-techniques-to-uncover.html


6¡¢ÆÏÌÑÑÀ2022ÄêQ2Íþв±¨¸æ³ÆÒøÐгÉΪÖ÷Òª¹¥»÷Ä¿µÄ


7ÔÂ4ÈÕ£¬£¬ £¬Segran?a-Inform¨¢ticaÐû²¼ÁËÆÏÌÑÑÀ2022ÄêµÚ¶þ¼¾¶ÈµÄÍþвÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬ £¬ÔÚµÚ¶þ¼¾¶È£¬£¬ £¬ÍøÂç´¹Âڻ(68.9%)±È¶ñÒâÈí¼þ(31.1%)¸ü³£¼û¡£¡£¡£¡£¡£¡£¡£QakbotľÂí¡¢Satori/Mirai½©Ê¬ÍøÂçºÍMS OfficeÎĵµ£¨ºê£©ÊÇÆÏÌÑÑÀÔÚµÚ¶þ¼¾¶ÈÃæÁÙµÄ×î³£¼ûµÄÍþв¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬Óдó×ڵĴ¹ÂڻÓë°ü¹üµÝËÍЧÀÍÓйأ¬£¬ £¬°üÀ¨CTT¡¢DHL¡¢UPSºÍFedExµÈ¡£¡£¡£¡£¡£¡£¡£¹ØÓÚÊÜÓ°ÏìµÄÐÐÒµ£¬£¬ £¬ÒøÐгÉΪÖ÷Òª¹¥»÷Ä¿µÄ£¬£¬ £¬Æä´ÎÊÇÁãÊÛºÍÒ½ÁÆ¿µ½¡ÐÐÒµ¡£¡£¡£¡£¡£¡£¡£  


https://seguranca-informatica.pt/threat-report-portugal-q2-2022/#.YsT3wnZBxPY