΢ÈíÐû²¼6ÔÂÄþ¾²¸üÐÂÐÞ¸´FollinaÔÚÄÚµÄ55¸ö©¶´

Ðû²¼Ê±¼ä 2022-06-15
1¡¢Î¢ÈíÐû²¼6Ô·ÝÄþ¾²¸üÐÂÐÞ¸´FollinaÔÚÄÚµÄ55¸ö©¶´


6ÔÂ14ÈÕ£¬Î¢ÈíÐû²¼Á˱¾ÔµÄÖܶþ²¹¶¡£¬×ܼÆÐÞ¸´ÁË55¸ö©¶´¡£ÆäÖаüÂÞ12¸öÌáȨ©¶´¡¢1Äþ¾²¹¦Ð§Èƹý©¶´¡¢27¸öÔ¶³Ì´úÂëÖ´ÐЩ¶´¡¢11¸öÐÅϢй¶©¶´¡¢3¸ö¾Ü¾ø·þÎñ©¶´ºÍ1¸öÆÛƭ©¶´¡£ÆäÖÐ×îÑÏÖØµÄÊÇWindows MSDTÖеÄ©¶´Follina£¨CVE-2022-30190£©£¬Òѱ»¶à¸ö¹¥»÷ÍÅ»ïÀûÓᣴËÍ⣬»¹ÐÞ¸´ÁËWindows Hyper-VÔ¶³ÌÖ´ÐдúÂë©¶´£¨CVE-2022-30163£©¡¢WindowsÇáÁ¿¼¶Ä¿Â¼·ÃÎÊЭÒé(LDAP)Ô¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2022-30139£©ºÍWindowsÍøÂçÎļþϵͳԶ³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2022-30136£©µÈ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2022-patch-tuesday-fixes-1-zero-day-55-flaws/


2¡¢AvastÔÚÒ°·¢ÏÖÈÔÔÚ¿ª·¢ÖеÄLinux rootkit Syslogk


6ÔÂ13ÈÕ£¬AvastÅû¶ÁËÔÚÒ°·¢ÏÖµÄÒ»ÖÖÃûΪ¡°Syslogk¡±µÄÐÂLinux rootkitµÄ¼¼Êõϸ½Ú¡£Syslogk»ùÓÚ¿ªÔ´µÄLinuxÄÚºËrootkit Adore-Ng£¬Ä¿Ç°ÈÔÔÚ¿ª·¢ÖС£¸Ã¶ñÒâÈí¼þ Õë¶ÔLinuxÄÚºË3.x£¬¿ÉÒþ²ØÄ¿Â¼ºÍÍøÂçÁ÷Á¿£¬²¢¼ÓÔØÒ»¸öÃûΪ¡°Rekoobe¡±µÄºóÃÅ¡£Õâ¸öºóÃÅÔÚÄ¿±êϵͳÖн«Ê¼ÖÕ´¦ÓÚÐÝÃß״̬£¬Ö±µ½½ÓÊÕµ½À´×Ô¹¥»÷Õߵġ°magic packets¡±¡£ÆäÖ÷ҪĿµÄÊÇΪ¹¥»÷ÕßÌṩĿ±êÉè±¹ØÁ¬ÄÔ¶³Ìshell£¬¿Éµ¼ÖÂÐÅϢй¶¡¢Êý¾Ýй¶¡¢Îļþ²Ù×÷ºÍÕÊ»§½Ù³ÖµÈ¡£


https://decoded.avast.io/davidalvarez/linux-threat-hunting-syslogk-a-kernel-rootkit-found-under-development-in-the-wild/


3¡¢ÃÀ¹úKaiser Permanente³Æ½ü7ÍòÈ˵ÄÐÅÏ¢±»·Ç·¨·ÃÎÊ


¾ÝýÌå6ÔÂ13ÈÕ±¨µÀ£¬ÃÀ¹úÒ½ÁÆ»ú¹¹Kaiser Permanente³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷¡£¸Ã¹«Ë¾ÔÚÆä¹ÙÍøÉÏÐû²¼µÄ֪ͨ͸¶£¬2022Äê4ÔÂ5ÈÕ£¬¹¥»÷ÕßÔÚδ¾­ÊÚȨµÄÇé¿öÏ·ÃÎÊÁËÆäÔ±¹¤µÄµç×ÓÓÊÏ䣬ÆäÖÐÉæ¼°»¼ÕߵĽ¡¿µÐÅÏ¢£¨PHI£©¡£Kaiser PermanenteÓÚ6ÔÂ3ÈÕ֪ͨÊÜÓ°Ï컼Õߣ¬²¢ÌåÏÖй¶µÄÐÅÏ¢°üÂÞÐÕÃû¡¢²¡Àú±àºÅ¡¢·þÎñÈÕÆÚºÍ¼ì²â½á¹ûµÈ¡£¸Ã¹«Ë¾Ìá½»¸øÃÀ¹úÕþ¸®µÄ³ÂËßÏÔʾ£¬´ËʼþÒѵ¼ÖÂ69589È˵ÄPHIй¶¡£


https://www.bleepingcomputer.com/news/security/kaiser-permanente-data-breach-exposes-health-data-of-69k-people/


4¡¢GaliumÀûÓÃÐÂRAT PingPull¹¥»÷Å·ÖÞ¡¢·ÇÖ޺Ͷ«ÄÏÑÇ


Unit 42ÔÚ6ÔÂ13ÈÕ¹ûÈ»ÁËAPTÍÅ»ïGaliumÕë¶ÔÅ·ÖÞ¡¢·ÇÖ޺Ͷ«ÄÏÑǵÄй¥»÷»î¶¯¡£´Ë´Î»î¶¯Ö÷ÒªÕë¶ÔµçÐÅ¡¢Õþ¸®ºÍ½ðÈÚ»ú¹¹£¬ÀûÓÃÁËÒ»ÖÖÃûΪPingPullµÄÐÂRAT¡£PingPullÊÇ»ùÓÚVisual C++µÄ¶ñÒâÈí¼þ£¬ËüÖ¼ÔÚΪ¹¥»÷ÕßÌṩÔÚÄ¿±êϵͳÖеķ´Ïòshell£¬²¢Ö´ÐÐÈÎÒâÃüÁî¡£Unit42¶ÔÈý¸ö¾ßÓÐÏàËÆ¹¦Ð§µÄ²îÒì±äÌå½øÐвÉÑù£¬·¢ÏÖÕâЩ±äÌåʹÓÃÁ˲îÒìµÄC2ͨÐÅЭÒ飺ICMP¡¢HTTPSºÍTCP¡£Ñо¿ÈËÔ±»¹·¢ÏÖÁËÓëGalliumÓйصĻù´¡ÉèÊ©°üÂÞ170¶à¸öIPµØÖ·£¬ÓÐЩ¿ÉÒÔ×·Ëݵ½2020Äêµ×¡£


https://unit42.paloaltonetworks.com/pingpull-gallium/


5¡¢Confiant·¢ÏÖÇÔÈ¡Web3Ç®°ü×ʽðµÄSeaFlower»î¶¯


¾Ý6ÔÂ13ÈÕ±¨µÀ£¬Confiant·¢ÏÖÁËÕë¶ÔWeb3Ç®°üµÄSeaFlower»î¶¯¡£¸Ã»î¶¯ÓÚ½ñÄê3Ô³õ±»·¢ÏÖ£¬Ò»Ö±Õë¶ÔAndroidºÍiOSÓû§£¬Ä£·Â¹Ù·½¼ÓÃÜ»õ±ÒÇ®°üÍøÕ¾£¬²¢ÀûÓÃÁËSEO¼¼Êõ£¬À´·Ö·¢ÇÔȡĿ±ê×ʽðµÄºóÃÅÓ¦Óá£Ä¿Ç°£¬SeaFlowerÖ÷ҪʹÓúóÃÅ´úÂëÐÞ¸ÄWeb3Ç®°ü£¬²¢ÇÔÈ¡ÖÖ×ÓÃÜÂ루seed phrase£©¡£Ñо¿ÈËÔ±ÌåÏÖ£¬¸Ã»î¶¯µÄÄ¿±êÓ¦ÓðüÂÞAndroidºÍiOS°æ±¾µÄCoinbase Wallet¡¢MetaMask¡¢TokenPocketºÍimToken¡£


https://thehackernews.com/2022/06/chinese-hackers-distribute-backdoored.html


6¡¢Î¢ÈíÐû²¼¹ØÓÚÀÕË÷Èí¼þBlackCatµÄ¼¼Êõ·ÖÎö³ÂËß


΢ÈíÔÚ6ÔÂ13ÈÕÐû²¼Á˹ØÓÚÀÕË÷Èí¼þBlackCat£¨Ò²³ÆALPHV£©µÄ·ÖÎö³ÂËß¡£BlackCatÓÚ2021Äê11ÔÂÊ״α»·¢ÏÖ£¬ÊÇ×îÔçÓÃRust±àдµÄÀÕË÷Èí¼þÖ®Ò»£¬¿ÉÒÔ¹¥»÷WindowsºÍLinuxÉ豸£¬ÒÔ¼°VMWareʵÀý¡£½üÆÚ£¬Ñо¿ÈËÔ±ÊӲ쵽һ¸ö¹¥»÷ÕßÀûÓÃExchange·þÎñÆ÷©¶´À´»ñµÃÄ¿±êÍøÂç·ÃÎÊ¡£´ËÍ⣬ÖÁÉÙÓÐÁ½¸öÁ¥Êô×éÖ¯ÕýÔÚÀûÓÃBlackCat: DEV-0237ºÍDEV-0504¡£Æ¾¾Ý΢ÈíµÄÊý¾Ý£¬BlackCatÒÑÓ°ÏìÁË·ÇÖÞ¡¢ÃÀÖÞ¡¢ÑÇÖÞºÍÅ·Ö޵ĸ÷¸ö¹ú¼Ò²¢ÒýÆðÖØÊÓ¡£


https://www.microsoft.com/security/blog/2022/06/13/the-many-lives-of-blackcat-ransomware/