·¨À­ÀûÔâµ½ÀÕË÷¹¥»÷µ¼Ö²¿·Ö¿Í»§µÄÏêϸÐÅϢй¶

Ðû²¼Ê±¼ä 2023-03-22

1¡¢·¨À­ÀûÔâµ½ÀÕË÷¹¥»÷µ¼Ö²¿·Ö¿Í»§µÄÏêϸÐÅϢй¶


¾ÝýÌå3ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬Òâ´óÀûÅܳµÖÆÔìÉÌ·¨À­ÀûÔâµ½ÀÕË÷¹¥»÷¡£¡£¡£¡£¸Ã¹«Ë¾³Æ¹¥»÷Õß»ñµÃÁËÆä²¿·ÖITϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬¿Í»§ÐÕÃû¡¢µØµãºÍµç»°ºÅÂëµÈÐÅϢй¶¡£¡£¡£¡£·¨À­ÀûÌåÏÖÒѽÓÄɲ½·¥±£»£»£»£»£»£»¤ÊÜÓ°Ïìϵͳ£¬£¬£¬£¬£¬ÇҴ˴ι¥»÷¶Ô¹«Ë¾µÄÔËӪûÓÐÓ°Ïì¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐ˵Ã÷¹¥»÷±¬·¢µÄʱ¼ä£¬£¬£¬£¬£¬µ«Õâ¿ÉÄÜÓë2022Äê10Ô±¨µÀµÄÀÕË÷¹¥»÷ÓйØ£¬£¬£¬£¬£¬ÆäʱRansomEXXÉù³ÆÇÔÈ¡ÁË·¨À­ÀûµÄ7 GBÊý¾Ý¡£¡£¡£¡£¾ÝÐÂÎÅÈËÊ¿³Æ£¬£¬£¬£¬£¬×î³õµÄÊê½ðÒªÇóÊÇ100ÍòÃÀÔª¡£¡£¡£¡£·¨À­ÀûÔÚ3ÔÂ20ÈÕµÄÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬£¬²»»á¸¶Êê½ð¡£¡£¡£¡£


https://www.securityweek.com/ferrari-says-ransomware-attack-exposed-customer-data/


2¡¢Ñо¿Ö°Ô±·¢Ã÷Win 11½ØÍ¼¹¤¾ßÒ²ÊÜAcropalypseÎó²îÓ°Ïì


3ÔÂ21ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Windows 11½ØÍ¼¹¤¾ßÒ²ÊÜAcropalypseÇå¾²Îó²îµÄÓ°Ïì¡£¡£¡£¡£ÉÏÖÜ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚGoogle Pixel±ê¼Ç¹¤¾ßÖз¢Ã÷¸ÃÎó²î£¬£¬£¬£¬£¬µ¼ÖÂԭʼͼÏñÊý¾Ý×ÝÈ»±»±à¼­»ò²Ã¼ôÒ²Äܱ£´æÏÂÀ´¡£¡£¡£¡£Windows 11½ØÍ¼¹¤¾ßÓòüôºóµÄ°æ±¾ÁýÕÖԭʼͼÏñʱ£¬£¬£¬£¬£¬³ÌÐòûÓÐ׼ȷ½Ø¶ÏδʹÓõÄÊý¾Ý£¬£¬£¬£¬£¬¶øÊDZ£±£´æIENDÊý¾Ý¿éÖ®ºó¡£¡£¡£¡£ÔÚͼÏñÉó²éÆ÷Öз­¿ªÎļþÖ»»áÏÔʾ²Ã¼ôºóµÄͼÏñ£¬£¬£¬£¬£¬¿ÉÊÇδ½Ø¶ÏµÄÊý¾Ý¿ÉÓÃÓÚÖØÐÞԭʼͼÏñ£¬£¬£¬£¬£¬´Ó¶ø¿ÉÄܵ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/windows-11-snipping-tool-privacy-bug-exposes-cropped-image-content/


3¡¢Ñо¿ÍŶÓÏêÊöÀÕË÷Èí¼þCatBʹÓÃMSDTCЧÀ͵ÄÈÆ¹ýÕ½ÂÔ


¾Ý3ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ñо¿ÍŶÓÏêÊöÁËÀÕË÷Èí¼þCatBµÄÈÆ¹ýÕ½ÂÔ¡¢¼ÓÃÜÐÐΪÒÔ¼°ÇÔȡƾ֤ºÍä¯ÀÀÆ÷Êý¾ÝµÄʵÑé¡£¡£¡£¡£CatB£¨Ò²³ÆCatB99ºÍBaxtoy£©ÓÚ2022Äêµ×Ê״α»·¢Ã÷£¬£¬£¬£¬£¬Ëü¿ÉÄÜÊÇÀÕË÷Èí¼þPandoraµÄÑݱä»òÖ±½Ó¸üÃû£¬£¬£¬£¬£¬ºóÕßÖ÷ÒªÕë¶ÔÆû³µÐÐÒµ¡£¡£¡£¡£CatBµÄÖ÷ÒªÌØÕ÷ÊÇͨ¹ýMicrosoftÂþÑÜʽÊÂÎñ´¦Öóͷ£Ð­µ÷Æ÷(MSDTC)µÄÕýµ±Ð§ÀÍÐ®ÖÆDLL£¬£¬£¬£¬£¬À´ÌáÈ¡ºÍÆô¶¯ÀÕË÷Èí¼þpayload¡£¡£¡£¡£³ýÁËÎļþ¼ÓÃܺͻìÏýÖ®Í⣬£¬£¬£¬£¬CatB»¹»áʵÑé´ÓÄ¿µÄÏµÍ³ÍøÂçÌØ¶¨µÄÐÅÏ¢¡£¡£¡£¡£


https://thehackernews.com/2023/03/researchers-shed-light-on-catb.html


4¡¢°Ä´óÀûÑÇ˰Îñ¾ÖʹÓõÄÓïÒôʶ±ðϵͳ¿É±»AIºÏ³ÉÉùÒôÈÆ¹ý


¾ÝÎÀ±¨3ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬CentrelinkºÍ°Ä´óÀûÑÇ˰Îñ¾Ö(ATO)ʹÓõÄÓïÒôʶ±ðϵͳ±£´æÎó²î¡£¡£¡£¡£¼Ì±¨µÀ³Æ¾­ÓÉѵÁ·µÄAIºÏ³ÉÉùÒô¿ÉÓÃÓÚ»á¼ûÍâÑóµç»°ÒøÐÐЧÀͺ󣬣¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÉùÎÆÏµÍ³Ò²¿ÉÒÔ±»AIÉùÒôËùÓÕÆ­¡£¡£¡£¡£Ò»ÃûÎÀ±¨µÄ¼ÇÕß½öÓÃËÄ·ÖÖÓµÄÒôƵ£¬£¬£¬£¬£¬¾ÍÌìÉúÒ»¸ö×Ô¼ºµÄ¿Ë¡ÉùÒô£¬£¬£¬£¬£¬È»ºó¾ÍÄÜÓÃÕâ¸öÉùÒôÁ¬Ïµ×Ô¼ºµÄ¿Í»§²Î¿¼ºÅÂ룬£¬£¬£¬£¬½øÈëÁËCentrelink×ÔÖúЧÀÍÕË»§¡£¡£¡£¡£ATOµÄ½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬¸Ã»ú¹¹ÒѽÓÄɲ½·¥À´±£»£»£»£»£»£»¤ÏµÍ³ÃâÊÜAIÓïÒô¿Ë¡֮ÀàµÄÍþв¡£¡£¡£¡£


https://www.theguardian.com/technology/2023/mar/16/voice-system-used-to-verify-identity-by-centrelink-can-be-fooled-by-ai


5¡¢MandiantÐû²¼¹ØÓÚ2022ÄêÁãÈÕÎó²î¹¥»÷µÄÆÊÎö±¨¸æ


3ÔÂ20ÈÕ£¬£¬£¬£¬£¬MandiantÐû²¼Á˹ØÓÚ2022ÄêÁãÈÕÎó²î¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬2022ÄêÓÐ55¸öÁãÈÕÎó²î±»Ê¹Ó㬣¬£¬£¬£¬Õâ¸öÊý×ÖµÍÓÚ2021ÄêµÄ81¸ö¡£¡£¡£¡£ÓëÍùÄêÒ»Ö£¬£¬£¬£¬£¬´ó²¿·ÖÎó²îÀ´×ÔMicrosoft¡¢GoogleºÍApple²úÆ·£¬£¬£¬£¬£¬±»Ê¹ÓÃ×î¶àµÄ²úÆ·ÀàÐÍÊDzÙ×÷ϵͳ£¨19¸ö£©£¬£¬£¬£¬£¬Æä´ÎÊÇä¯ÀÀÆ÷£¨11¸ö£©ÒÔ¼°Çå¾²¡¢ITºÍÍøÂçÖÎÀí²úÆ·£¨10£©¡£¡£¡£¡£ÕâЩÎó²îÖеĴó´ó¶¼£¨55ÆäÖеÄ53¸ö£©Äܱ»ÓÃÓÚÔÚÄ¿µÄ×°±¸ÉÏÌáÉýȨÏÞ»òÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£


https://www.mandiant.com/resources/blog/zero-days-exploited-2022


6¡¢JumpsecÐû²¼2022ÄêÓ¢¹úÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ


ýÌå3ÔÂ20Èճƣ¬£¬£¬£¬£¬JumpsecÐû²¼ÁË2022ÄêÓ¢¹úÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£Óë2021ÄêÏà±È£¬£¬£¬£¬£¬2022ÄêÓ¢¹ú±¨¸æµÄ¹¥»÷×ÜÊýÔöÌíÁË17%¡£¡£¡£¡£Ð·ºÆðµÄSpring4Shell¡¢FollinaºÍProxyNotShellµÈÎó²î¿ÉÄÜ»áÔöÌíÀÕË÷ÍÅ»ï¶Ô×éÖ¯µÄ¹¥»÷¡£¡£¡£¡£Ëæ×ÅContiºÍREvilµÄ½âÌ壬£¬£¬£¬£¬ÐµĹ¥»÷ÕßÔÚÀÕË÷Èí¼þÁìÓò±äµÃÔ½·¢Í»³ö¡£¡£¡£¡£Lockbit¼ÌÐøÁËContiµÄÍ·ÏΣ¬£¬£¬£¬£¬³ÉΪȫÇò×î³£¼ûµÄÀÕË÷Èí¼þ£¬£¬£¬£¬£¬Õ¼¹¥»÷µÄ52%¡£¡£¡£¡£Êý¾ÝÅú×¢£¬£¬£¬£¬£¬½ÌÓý¡¢Ö´·¨ÒÔ¼°ÁãÊÛºÍÅú·¢ÉÌÒµÐÐÒµÔâµ½µÄ¹¥»÷×î¶à¡£¡£¡£¡£


https://www.jumpsec.com/uk-ransomware-trends-lessons-for-2023/