FBI³Æ×Ô2016ÄêÒÔÀ´BEC¹¥»÷ÒÑÔì³É430ÒÚÃÀÔªµÄËðʧ

Ðû²¼Ê±¼ä 2022-05-06
1¡¢FBI³Æ×Ô2016ÄêÒÔÀ´BEC¹¥»÷ÒÑÔì³É430ÒÚÃÀÔªµÄËðʧ


¾Ý5ÔÂ4ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬FBIµÄÊý¾ÝÏÔʾÉÌÒµµç×ÓÓʼþй¶(BEC)¹¥»÷Ôì³ÉµÄËðʧ½ð¶îÿÄê¶¼ÔÚÔöÌí¡£¡£¡£ÔÚ2019Äê7ÔÂÖÁ2021Äê12ÔÂʱ´ú£¬£¬£¬£¬£¬£¬£¬ÒÑÈ·¶¨µÄËðʧ½ð¶îÔöÌíÁË65%¡£¡£¡£´Ó2016Äê6Ôµ½2019Äê7Ô£¬£¬£¬£¬£¬£¬£¬IC3ÊÕµ½ÁË241206Æðº£Äں͹ú¼ÊÊÂÎñµÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬Éæ¼°½ð¶î×ܼÆÎª43312749946ÃÀÔª¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤2021ÄêµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Î»ÓÚÌ©¹úºÍÏã¸ÛµÄÒøÐÐÊÇڲƭ×ʽðµÄÖ÷ҪĿµÄµØ¡£¡£¡£


https://therecord.media/fbi-business-email-compromise-attacks-led-to-more-than-43-billion-in-losses-since-2016/


2¡¢Windows 11¸üÐÂKB5012643Ó°Ï첿·ÖÓ¦ÓõÄÕý³£ÔËÐÐ


ýÌå5ÔÂ4Èճƣ¬£¬£¬£¬£¬£¬£¬Î¢Èí½üÆÚÐû²¼µÄWindows 11ÀۼƸüб£´æÎÊÌâ¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬×°ÖÃKB5012643ºó£¬£¬£¬£¬£¬£¬£¬²¿·Ö.NET Framework 3.5Ó¦ÓóÌÐò¿ÉÄ᷺ܻÆðÎÊÌâ»òÎÞ·¨·­¿ª¡£¡£¡£¸ÃÎÊÌâ½öÓ°ÏìÔËÐÐÁËWindows 11°æ±¾21H2µÄϵͳÇÒ×°ÖÃÁËKB5012643µÄÓû§¡£¡£¡£Î¢Èí½¨ÒéÊÜÓ°ÏìÓû§ÊÖ¶¯Ð¶ÔØÕâ¸öÓÐÎÊÌâµÄ¸üУ¬£¬£¬£¬£¬£¬£¬ÈôÊÇÎÞ·¨Ð¶ÔØ¿ÉÔÚWindows¹¦Ð§ÖÐÖØÐÂÆôÓÃ.NET Framework 3.5ºÍWindows Communication Foundation»º½â´ËÎÊÌâ¡£¡£¡£Î¢ÈíÕýÔÚÖÆ¶©´ËÎÊÌâµÄ½â¾ö¼Æ»®£¬£¬£¬£¬£¬£¬£¬Ô¤¼ÆÔÚ¼´½«Ðû²¼µÄ°æ±¾ÖÐÌṩ¸üС£¡£¡£


https://news.softpedia.com/news/microsoft-confirms-new-bug-in-windows-11-cumulative-update-kb5012643-535326.shtml


3¡¢Ó¢¹úNHSÉϰÙÃûÔ±¹¤µÄÓÊÏäÒѱ»Ð®ÖƲ¢ÓÃÓÚ´¹Âڻ


¾ÝýÌå5ÔÂ4ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÔÚ°ëÄêµÄʱ¼äÀ£¬£¬£¬£¬£¬£¬Ó¢¹ú¹ú¼ÒÎÀÉúϵͳ(NHS)µÄÉϰÙÃûÔ±¹¤µÄÓʼþÕÊ»§±»ÓÃÓÚ¶à´Î´¹Âڻ¡£¡£¡£¹¥»÷Õß´ÓÈ¥Äê10ÔÂ×îÏÈÐ®ÖÆÕýµ±µÄNHSÓʼþÕË»§£¬£¬£¬£¬£¬£¬£¬Ö±µ½2022Äê4ÔÂÈÔÔÚʹÓÃÕâЩÕË»§¾ÙÐд¹ÂÚ¹¥»÷¡£¡£¡£INKYÑо¿Ö°Ô±¸ú×ÙÁËÀ´×ÔNHSÁ½¸öIPµØµãµÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ËüÃÇÉæ¼°µ½NHSµÄ139ÃûÔ±¹¤µÄÕÊ»§£¬£¬£¬£¬£¬£¬£¬×ܹ²ÓÐ1157·â´¹ÂÚÓʼþ¡£¡£¡£ÔÚ´ó´ó¶¼ÇéÐÎÖУ¬£¬£¬£¬£¬£¬£¬´¹ÂÚÓʼþ»á·¢ËÍÐéα¾¯±¨£¬£¬£¬£¬£¬£¬£¬²¢»á½«Óû§Öض¨Ïòµ½ÇÔÈ¡Microsoftƾ֤µÄ´¹ÂÚÒ³Ãæ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/attackers-hijack-uk-nhs-email-accounts-to-steal-microsoft-logins/


4¡¢¶íÂÞ˹ºÍ°×¶íÂÞ˹µÄ¶à¸ö¹Ù·½ÍøÕ¾Ôâµ½DDoS¹¥»÷


CrowdStrikeÔÚ5ÔÂ4Èճƣ¬£¬£¬£¬£¬£¬£¬Docker¾µÏñÒѱ»ÓÃÓÚDDoS¹¥»÷¶íÂÞ˹ºÍ°×¶íÂÞ˹µÄÕþ¸®¡¢¾ü·½ºÍýÌå»ú¹¹µÄÊ®¼¸¸öÍøÕ¾¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷»¹Éæ¼°µ½Á¢ÌÕÍðµÄ3¸öýÌåÍøÕ¾¡£¡£¡£Ñо¿Ö°Ô±È·¶¨ÁË2¸öDocker¾µÏñ¡°erikmnkl/ stoppropaganda¡±ºÍ¡°abagayev/ stop-russia¡±£¬£¬£¬£¬£¬£¬£¬ËüÃÇÓÚ2022Äê2ÔÂÖÁ3Ô°²ÅÅ£¬£¬£¬£¬£¬£¬£¬Òѱ»ÏÂÔØÁè¼Ý150000´Î¡£¡£¡£¾ÝÐÅ£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷»î¶¯ÓëÎÚ¿ËÀ¼ÓйØ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÕâЩ¾µÏñµÄÄ¿µÄÁбíÓëÎÚ¿ËÀ¼UIA¹²ÏíµÄÓòÓÐÖØµþ¡£¡£¡£


https://securityaffairs.co/wordpress/130901/cyber-warfare-2/docker-images-ddos-attack-russia.html


5¡¢HerokuÇ¿ÖÆÖØÖÃËùÓÐÓû§µÄÃÜÂ룬£¬£¬£¬£¬£¬£¬²¢Î´Ú¹ÊÍÆäÖÐÔµ¹ÊÔ­ÓÉ


¾ÝýÌå5ÔÂ4Èճƣ¬£¬£¬£¬£¬£¬£¬SalesforceµÄ×Ó¹«Ë¾HerokuÇ¿ÖÆÖØÖÃÁËËùÓÐÓû§µÄÃÜÂë¡£¡£¡£¸Ã¹«Ë¾·¢Ë͸øÓû§µÄÇ徲ͨ¸æÖгÆ£¬£¬£¬£¬£¬£¬£¬5ÔÂ4ÈÕ½«Ç¿ÖÆÖØÖÃÃÜÂëÒÔÓ¦¶ÔÉϸöÔµÄÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬¿ÉÊDz¢Î´Ú¹ÊÍÏêϸԵ¹ÊÔ­ÓÉ¡£¡£¡£²¿·ÖÓû§·´Ó¦Heroku¶Ô¹¥»÷µÄ͸Ã÷¶È²»·ó£¬£¬£¬£¬£¬£¬£¬¸øÆäÔì³ÉÁËÒÉÐÄ¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚ5ÔÂ5ÈÕÐû²¼ÁË×îÐÂÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬ÌåÏÖÆä±»µÁµÄGitHub OAuthÁîÅÆÒѱ»ÓÃÓÚÈëÇÖÊý¾Ý¿â²¢Ð¹Â¶Óû§µÄÕË»§ºÍÃÜÂë¡£¡£¡£GitHubÓÚ4ÔÂ12ÈÕ·¢Ã÷Á˸ù¥»÷£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶Á˰üÀ¨NPMÔÚÄÚµÄÊýÊ®¸ö×éÖ¯µÄÊý¾Ý¡£¡£¡£


https://www.bleepingcomputer.com/news/security/heroku-forces-user-password-resets-but-fails-to-explain-why/


6¡¢GoogleÐû²¼5Ô·ÝAndroid¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÇå¾²Îó²î


5ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬£¬GoogleÐû²¼ÁË5Ô·ÝAndroid¸üеĵڶþ²¿·Ö£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Á˶à¸öÎó²î¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÊÇLinuxÄÚºËÖеÄÌáȨÎó²î£¨CVE-2021-22600£©£¬£¬£¬£¬£¬£¬£¬CISAÔÚ4ÔÂÐû²¼µÄÇ徲ͨ¸æÖгƸÃÎó²îÕý±»Æð¾¢Ê¹Óᣡ£¡£´Ë´Î¸üл¹ÐÞ¸´ÁËÄÚºË×é¼þÖеÄÌáȨÎó²î£¨CVE-2022-0847¡¢CVE-2022-20009ºÍCVE-2021-22600£©ºÍ¸ßͨ×é¼þÖеģ¨CVE-2022-22057ºÍCVE-2022-22064£©µÈ¶à¸öÎó²î¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Google»¹Ðû²¼ÁËÕë¶ÔPixel×°±¸ÖÐ11¸öÎó²îµÄ²¹¶¡¡£¡£¡£


https://www.securityweek.com/androids-may-2022-security-updates-patch-36-vulnerabilities