΢Èí8Ô·ݵķÇÓ¢ÓïExchange°²È«¸üдæÔÚBugÒѻعö
°ä²¼¹¦·ò 2023-08-111¡¢Î¢Èí8Ô·ݵķÇÓ¢ÓïExchange°²È«¸üдæÔÚBugÒѻعö
¾ÝýÌå8ÔÂ10ÈÕ±¨Â·£¬Î¢Èí·¢ÏÖ8Ô·ÝMicrosoft Exchange Server°²È«¸üдæÔÚÎÊÌ⣬Òѽ«Æä´ÓWindows UpdateÖÐɾ³ý¡£Î¢ÈíÔÚ8ÔÂ8ÈÕ°ä²¼Á˴˸üУ¬×ܹ²½¨¸´ÁË6¸ö·ì϶¡£È»¶ø£¬µ±ÖÎÀíÔ±ÔÚ·ÇÓ¢Óï·þÎñÆ÷ÉÏ×°Öøüк󣬷¢ÏÖExchange Windows·þÎñÎÞ·¨Æô¶¯¡£×°ÖÃʧ°Ü£¬ÃýÎó´úÂëΪ1603£¬²¢ÁôÏÂÃýÎóµÄExchange×°Öá£×êÑÐÈËÔ±Ö¸³ö£¬¸ÃÎÊÌâÊÇÓÉ¡°Exchange Server 2023Äê8ÔÂSU×°Ö÷¨Ê½Öеı¾µØ»¯ÎÊÌ⡱µ¼Öµġ£ÔÚ·ÇÓ¢Óï²Ù×÷ϵͳÉÏ×°ÖÃ΢ÈíExchange Server 2019»ò2016°²È«¸üÐÂʱ£¬×°Ö÷¨Ê½½«ÖÕ³¡²¢»Ø¹ö¸ü¸Ä£¬Ê¹Exchange Server·þÎñ´¦ÓÚ½ûÓÃ״̬¡£Îª´Ë£¬Î¢ÈíÌṩÏàʶ¾ö·¨×Ó¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-updates-pulled-after-breaking-non-english-installs/
2¡¢×êÑÐÈËÔ±·¢ÏÖ´ó¹æÄ£½Ù³ÖÔÆÕÊ»§µÄEvilProxy´¹µö¹¥»÷
ProofpointÔÚ8ÔÂ9ÈÕ³ÆÆä·¢ÏÖÁËÀûÓÃEvilProxy´ó¹æÄ£½Ù³ÖÔÆÕÊ»§µÄ´¹µö»î¶¯¡£×êÑÐÈËԱй©£¬ÔÚ3ÔÂÖÁ6ÔÂÆÚ¼ä£¬Ô¼Äª120000·â´¹µöÓʼþ±»·¢Ë͵½È«ÇòÉϰٸöÖ¸±êÆóÒµ£¬ÒÔÇÔÈ¡Microsoft 365ÕÊ»§¡£Ô¼39%µÄÖ¸±êÊÇC¼¶¸ß¹Ü£¬ÆäÖÐ17%ÊÇÊ×ϯ²ÆÕþ¹Ù£¬9%ÊÇ×ܲúÍÊ×ϯִÐй١£ÕâЩ¹¥»÷ÀûÓÃÁË»ùÓÚ·´Ïò´úÀí¼Ü¹¹µÄ´¹µö¹¤¾ßEvilProxy£¬²¢½áºÏʹÓÃÁËÆ·ÅƼÙÒâ¡¢»úеÈ˼ì²âÈÆ¹ýºÍÊ¢¿ª³Á¶¨ÏòµÈ¼¼Êõ¡£
https://www.proofpoint.com/us/blog/email-and-cloud-threats/cloud-account-takeover-campaign-leveraging-evilproxy-targets-top-level
3¡¢LockBitÐû³ÆÒª¹«¿ªÍßÀï°²Ò½ÁÆÏµÍ³°©Ö¢»¼ÕßµÄÊý¾Ý
¾Ý8ÔÂ9ÈÕ±¨Â·£¬ÀÕË÷ÍÅ»ïLockBitÐû³ÆÈëÇÖÁËÍßÀï°²Ò½ÁÆÏµÍ³(Varian Medical Systems)£¬²¢ÍþвҪ¹«¿ª»¼ÕßµÄÒ½ÁÆÊý¾Ý¡£¸Ã¹«Ë¾´ÓÊôÓÚÎ÷ÃÅ×ÓÒ½ÁƼ¯ÍÅ£¬ÊÕÈë´ï30ÒÚÃÀÔª£¬ÖØÒª¿ª·¢ºÍÏúÊÛÓÃÓÚÒ½Öΰ©Ö¢µÈ¼²²¡µÄÒ½ÁÆÉ豸ºÍÈí¼þ¡£LockbitÔÚÍøÕ¾ÉÏд·£¬Ëùº±¼û¾Ý¿âºÍ»¼ÕßÊý¾Ý¶¼Òѱ»Ð¹Â¶²¢³ï±¸ÔÚ²©¿ÍÉϰ䲼£¬»¹½«¸¶Êê½ðµÄ½ØÖ¹ÈÕÆÚ¶¨Îª8ÔÂ17ÈÕ¡£¸Ã¹«Ë¾ÉÐδÅû¶Õâ´Î°²È«ÊÂÎñ¡£
https://securityaffairs.com/149307/cyber-crime/varian-medical-systems-lockbit-ransomware.html
4¡¢Freeze.rsºÍSYK Crypter±»ÓÃÓÚ·Ö·¢XWormµÈ¶ñÒâÈí¼þ
FortinetÔÚ8ÔÂ9ÈÕÅû¶ÁËÀûÓÃFreeze.rsºÍSYK Crypter·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯¡£×êÑÐÈËÔ±ÓÚ7ÔÂ13ÈÕ¼ì²âµ½´¹µö¹¥»÷»î¶¯£¬¹¥»÷Á´Ê¼ÓÚ¶ñÒâPDFÎļþ¡£¸ÃÎļþ³Á¶¨Ïòµ½HTMLÎļþ£¬²¢ÀûÓá°search-ms¡±ºÍ̸½Ó¼ûÔ¶³Ì·þÎñÆ÷ÉϵÄLNKÎļþ¡£´ò¿ªLNKÎļþºó£¬PowerShell¾ç±¾»áÖ´ÐÐFreeze.rsºÍSYK Crypter£¬ÒÔִǰ½øÒ»²½µÄ¹¥»÷¡£×îÖÕ£¬»á¼ÓÔØXWormºÍRemcos£¬²¢ÓëC2·þÎñÆ÷³ÉÁ¢Í¨Ñ¶¡£
https://www.fortinet.com/blog/threat-research/malware-distributed-via-freezers-and-syk-crypter
5¡¢Trend MicroÏêÊöRhysidaÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄ¹¥»÷
8ÔÂ9ÈÕ£¬Trend Micro¸ÅÊöÁËÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄÐÂÐÍRhysidaÀÕË÷Èí¼þµÄ¹¥»÷»î¶¯¡£RhysidaÖØÒªÕë¶ÔÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀ³¯Æø¹¹£¬Í¨³£Ê×ÏÈͨ¹ý´¹µö¹¥»÷ÈëÇÖÖ¸±êµÄÍÆËã»ú£¬¶øºóʹÓÃCobalt StrikeÔÚϵͳÄÚºáÏòÒÆ¶¯¡£¹¥»÷ÕßÖ´ÐÐPsExecÀ´×°ÖÃPowerShell¾ç±¾ºÍRhysida payload¡£PowerShell¾ç±¾±»ÓÃÓÚÖÕÖ¹AV¹ý³Ì¡¢É¾³ý¾íÓ°¸±±¾²¢Åú¸ÄRDPÅäÖã¬ÕâÅú×¢¼ÓÃÜ·¨Ê½ÈÔÔÚ»ý¼«¿ª·¢ÖС£´Ë±í£¬ÀÕË÷Èí¼þѡȡ4096λRSAÃÜÔ¿ºÍAES-CTRÀ´¼ÓÃÜÎļþ¡£
https://www.trendmicro.com/en_us/research/23/h/an-overview-of-the-new-rhysida-ransomware.html
6¡¢Check Point°ä²¼2023Äê7ÔÂÈ«ÇòÍþвָÊýµÄ»ã±¨
8ÔÂ9ÈÕ£¬Check Point°ä²¼ÁË2023Äê7ÔÂÈ«ÇòÍþвָÊýµÄ·ÖÎö»ã±¨¡£7Ô·Ý×îÊ¢ÐеĶñÒâÈí¼þÊÇQbot£¬Ó°ÏìÁËÈ«Çò5%µÄ×éÖ¯£¬Æä´ÎÊÇFormbook£¨4%£©ºÍRemcos£¨2%£©¡£È«ÇòÔâµ½¹¥»÷×î¶àµÄÐÐÒµÊǽÌÓýºÍ×êÑÐÐÐÒµ£¬Æä´ÎÊǵ±¾ÖºÍ¾üÊÂÐÐÒµ£¬¶øºóÊÇÒ½ÁƱ£½¡ÐÐÒµ¡£×î³£±»ÀûÓõķì϶Web·þÎñÆ÷¶ñÒâURLĿ¼±éÀú·ì϶£¬Ó°ÏìÁËÈ«Çò49%µÄ×éÖ¯£¬Æä´ÎÊÇApache Log4jÔ¶³Ì´úÂëÖ´Ðзì϶£¨45%£©ºÍHTTP±êÍ·Ô¶³Ì´úÂëÖ´Ðзì϶£¨42%£©¡£×î³£¼ûµÄÒÆ¶¯¶ñÒâÈí¼þAnubis£¬¶øºóÊÇSpinOkºÍAhMyth¡£
https://blog.checkpoint.com/security/july-2023s-most-wanted-malware-remote-access-trojan-rat-remcos-climbs-to-third-place-while-mobile-malware-anubis-returns-to-top-spot/


¾©¹«Íø°²±¸11010802024551ºÅ