΢ÈíÊÓ²ìDefender½«Õýµ±URLʶ±ðΪ¶ñÒâÁ´½ÓµÄÎÊÌâ
Ðû²¼Ê±¼ä 2023-03-311¡¢Î¢ÈíÊÓ²ìDefender½«Õýµ±URLʶ±ðΪ¶ñÒâÁ´½ÓµÄÎÊÌâ
¾ÝýÌå3ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Î¢ÈíÔÚÊÓ²ìÕýµ±URLÁ´½Ó±»Microsoft DefenderЧÀÍʶ±ðΪ¶ñÒâÁ´½ÓµÄÎÊÌâ¡£¡£¡£¡£×ÔÎÊÌâ·ºÆðµÄÎå¸ö¶àСʱÒÔÀ´£¬£¬£¬£¬£¬£¬Ò»Ð©¿Í»§ÒѾÊÕµ½ÁËÊýÊ®·âÖÒÑÔÓʼþ¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬Ö»¹Ü±£´æÎ󱨾¯±¨£¬£¬£¬£¬£¬£¬µ«Óû§ÈÔÈ»Äܹ»»á¼ûÕýµ±URL£¬£¬£¬£¬£¬£¬ÆäÒ²ÔÚÊÓ²ìЧÀ͵ÄÄÄÒ»²¿·ÖÍÉ»¯½«Õýµ±µÄURLʶ±ðΪ¶ñÒâ¡£¡£¡£¡£3ÔÂ29ÈÕ15:08 EDT¸üÐÂÏÔʾ£¬£¬£¬£¬£¬£¬Îó±¨ÎÊÌâÒÑͨ¹ý»Ö¸´×î½ü¶ÔSafeLinks¹¦Ð§µÄ¸üнâ¾ö¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-mistakenly-tagging-urls-as-malicious/
2¡¢Ñо¿Ö°Ô±·¢Ã÷ʹÓÃľÂí»¯3CX×ÀÃæÓ¦ÓõũӦÁ´¹¥»÷
ýÌå3ÔÂ29ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Åû¶ÁËʹÓÃľÂí»¯3CX×ÀÃæÓ¦ÓõũӦÁ´¹¥»÷¡£¡£¡£¡£3CXÊÇÒ»¼ÒVoIP IPBXÈí¼þ¿ª·¢¹«Ë¾£¬£¬£¬£¬£¬£¬Æä3CX Phone System±»È«ÇòÁè¼Ý600000¼Ò¹«Ë¾Ê¹Óᣡ£¡£¡£SentinelOne͸¶£¬£¬£¬£¬£¬£¬Ä¾Âí»¯3CXDesktopAppÊǹ¥»÷Á´ÖеĵÚÒ»½×¶Î£¬£¬£¬£¬£¬£¬Ëü´ÓGithubÖÐÌáÈ¡¸½¼ÓÁËbase64Êý¾ÝµÄICOÎļþ£¬£¬£¬£¬£¬£¬²¢×îÖÕµ¼ÖµÚÈý½×¶ÎµÄÐÅÏ¢ÇÔÈ¡³ÌÐòDLL¡£¡£¡£¡£3CX CEO Nick GaleaÌåÏÖ£¬£¬£¬£¬£¬£¬ÆäʹÓõÄÉÏÓοâÒѱ»Ñ¬È¾£¬£¬£¬£¬£¬£¬AndroidºÍiOS°æ±¾²»ÊÜÓ°Ïì¡£¡£¡£¡£Ëû½¨ÒéËùÓÐÓû§Ð¶ÔØ×ÀÃæÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬×ª¶øÊ¹ÓÃPWA¿Í»§¶Ë¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-compromise-3cx-desktop-app-in-a-supply-chain-attack/
3¡¢GoogleÅû¶ʹÓÃAndroidºÍiOSÖжà¸öÎó²îµÄ¹¥»÷»î¶¯
3ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬GoogleÅû¶ÁË×î½ü·¢Ã÷µÄÁ½¸ö¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËAndroid¡¢iOSºÍChromeÖжà¸öÎó²î¡£¡£¡£¡£µÚÒ»¸ö»î¶¯ÓÚ2022Äê11Ô±»·¢Ã÷£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËiOS WebKit RCEÎó²î(CVE-2022-42856)ºÍChrome GPUɳÏäÈÆ¹ýÎó²î(CVE-2022-4135)µÈ£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÒâ´óÀû¡¢ÂíÀ´Î÷ÑǺ͹þÈø¿Ë˹̹¡£¡£¡£¡£2022Äê12Ô£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Á˵ڶþ¸ö»î¶¯£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËCVE-2022-4262ºÍCVE-2023-0266µÈÎó²î£¬£¬£¬£¬£¬£¬Õë¶Ô×îа汾µÄÈýÐÇä¯ÀÀÆ÷¡£¡£¡£¡£ËüδÀ´×Ô°¢À²®ÁªºÏÇõ³¤¹ú(UAE)µÄÄ¿µÄÖØ¶¨Ïòµ½ÉÌÒµÌØ¹¤Èí¼þ¹©Ó¦ÉÌVariston¿ª·¢µÄHeliconia¿ò¼ÜÏàͬµÄÉϰ¶Ò³Ã棬£¬£¬£¬£¬£¬×îÖÕ×°ÖÃÒ»¸ö»ùÓÚC++µÄAndroidÌØ¹¤Èí¼þÌ×¼þ¡£¡£¡£¡£
https://blog.google/threat-analysis-group/spyware-vendors-use-0-days-and-n-days-against-popular-platforms/
4¡¢Èí¼þ¹©Ó¦ÉÌNebuÒòй¶Լ200ÍòÓû§µÄÐÅÏ¢±»ÆðËß
3ÔÂ30ÈÕýÌ峯£¬£¬£¬£¬£¬£¬Ô¼200ÍòºÉÀ¼¹«ÃñµÄÊý¾Ý±»Ð¹Â¶£¬£¬£¬£¬£¬£¬É漰һЩʹÓÃNebuÈí¼þµÄÊг¡Ñо¿»ú¹¹¡£¡£¡£¡£ÆäÖÐÒ»¼Ò»ú¹¹ÏÖ½«¸ÃÈí¼þ¹©Ó¦É̸æÉÏ·¨Í¥£¬£¬£¬£¬£¬£¬Êг¡Ñо¿»ú¹¹BlauwÏ£Íûͨ¹ý·¨ÔºÇ¿ÖÆÒªÇóNebuÌṩ¸ü¶à¹ØÓÚй¶ÊÂÎñµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÄÄЩÊý¾ÝÒѱ»Ð¹Â¶ÒÔ¼°ÊÂÎñÊÇÔõÑù±¬·¢¡£¡£¡£¡£¸ÃÊÂÎñÓ°ÏìÁËDe Vrienden van Amstel LIVE¡¢ºÉÀ¼¸ß¶û·òÁªºÏ»á£¨NGF£©¡¢ÔËÓªÉÌNSºÍ¹©Ó¦ÉÌVodafoneZiggoµÈ¡£¡£¡£¡£ºÉÀ¼Êý¾Ý±£»£»£»£»£»¤¾Ö£¨AP£©ÌåÏÖ£¬£¬£¬£¬£¬£¬²»É¨³ýÓиü¶àµÄ¹«Ë¾ºÍ×éÖ¯Êܵ½Ó°Ïì¡£¡£¡£¡£
https://www.nu.nl/tech/6257515/data-van-2-miljoen-nederlanders-gelekt-softwareleverancier-voor-rechter-gesleept.html
5¡¢Ó¡¶ÈÖÆÒ©¹«Ë¾Sun PharmaceuticalsÔâµ½ÀÕË÷¹¥»÷
¾Ý3ÔÂ30ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ó¡¶È×î´óµÄÖÆÒ©¹«Ë¾Sun Pharmaceuticals͸¶ÆäÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬¹«Ë¾Êý¾ÝºÍСÎÒ˽¼ÒÐÅÏ¢±»µÁ¡£¡£¡£¡£ÕâÊÇÈ«ÇòµÚËÄ´óÌØÖÖ·ÂÖÆÒ©¹«Ë¾£¬£¬£¬£¬£¬£¬2022ÄêÊÕÈë50ÒÚÃÀÔª¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬Ò»¸öÀÕË÷ÍÅ»ïÒÑÉù³Æ¶ÔÕâÆðÊÂÎñÈÏÕæ£¬£¬£¬£¬£¬£¬ËüûÓÐ͸¶¸ÃÍÅ»ïµÄÃû×Ö¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïBlack CatÓÚ3ÔÂ24ÈÕÔÚÆäÍøÕ¾ÉÏÁгöÁ˸ù«Ë¾¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬×÷ΪÏìÓ¦²½·¥Æä¸ôÀëÁËÍøÂç²¢Æô¶¯Á˻ָ´³ÌÐò£¬£¬£¬£¬£¬£¬Òò´Ë¹«Ë¾µÄÓªÒµÔËÓªÊܵ½ÁËÓ°Ïì¡£¡£¡£¡£
https://therecord.media/sun-pharma-india-ransomware-attack
6¡¢KasperskyÐû²¼2022ÄêµÄ½ðÈÚÐÐÒµÍþÐ²Ì¬ÊÆµÄ±¨¸æ
3ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬KasperskyÐû²¼2022ÄêµÄ½ðÈÚÐÐÒµÍþÐ²Ì¬ÊÆµÄ±¨¸æ¡£¡£¡£¡£2022Ä꣬£¬£¬£¬£¬£¬½ðÈÚ´¹ÂÚÕ¼ËùÓд¹ÂÚ¹¥»÷µÄ36.3%¡£¡£¡£¡£ÍøµêÆ·ÅÆÊÇ×îÊܽӴýµÄÓÕ¶ü£¬£¬£¬£¬£¬£¬Õ¼´¹ÂÚÍøÕ¾»á¼û´ÎÊýµÄ15.56%¡£¡£¡£¡£ÊܽðÈÚ¶ñÒâÈí¼þÓ°ÏìµÄÓû§ÊýÄ¿±È2021ÄêϽµÁË14%¡£¡£¡£¡£RamnitÊÇ×îÊ¢ÐеĶñÒâÈí¼þ¼Ò×壬£¬£¬£¬£¬£¬Õ¼±ÈΪ34.4%£¬£¬£¬£¬£¬£¬Æä´ÎÊÇZbot£¬£¬£¬£¬£¬£¬Õ¼16.2%¡£¡£¡£¡£Ôâµ½ÒøÐжñÒâÈí¼þ¹¥»÷µÄAndroidÓû§ÊýÄ¿±ÈÈ¥ÄêïÔÌÁË55%¡£¡£¡£¡£BianÓâÔ½Agent³ÉΪ×î»îÔ¾µÄÒÆ¶¯¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Õ¼±È24.25%£¬£¬£¬£¬£¬£¬¶øAgentΪ21.57%¡£¡£¡£¡£
https://securelist.com/financial-cyberthreats-in-2022/109219/