Coffee Meets BagelµÄϵͳÔâµ½¹¥»÷¹«Ë¾Êý¾Ý±»É¾
Ðû²¼Ê±¼ä 2023-09-071¡¢Coffee Meets BagelµÄϵͳÔâµ½¹¥»÷¹«Ë¾Êý¾Ý±»É¾
¾Ý9ÔÂ5ÈÕ±¨µÀ£¬Coffee Meets Bagel(CMB)͸¶ÉÏÖܵķþÎñÖÐÖ¹ÊÇÓÉÓÚºÚ¿ÍÈëÇÖ¹«Ë¾ÏµÍ³²¢É¾³ýÊý¾Ýµ¼Öµġ£ÉÏÖÜ£¬CMB±¬·¢ÁËÈ«Çò¹æÄ£ÄÚµÄå´»ú£¬ÊÓ²ìÈ·¶¨ºÚ¿Í¶ñÒâɾ³ýÁ˹«Ë¾Êý¾ÝºÍÎļþ¡£ÏÖÔÚ£¬¸Ã¹«Ë¾ÉÐδÓÐÈ·ÈÏÕâ´Î¹¥»÷ÊÇÀÕË÷Èí¼þ¼ÓÃÜÁËÊý¾Ý£¬µ¼ÖÂÊý¾ÝÎÞ·¨Ê¹Óã¬Õվɹ¥»÷Õß¾ÓÐÄɾ³ýÊý¾Ý£¬µ¼ÖÂå´»ú¡£CMB×Ô9ÔÂ3ÈÕÆðÖØÐÂÉÏÏߣ¬Ã»ÓÐ͸¶¹ØÓÚ¹¥»÷µÄ¸ü¶àÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/coffee-meets-bagel-says-recent-outage-caused-by-destructive-cyberattack/
2¡¢GoogleÐû²¼9Ô·ÝAndroid¸üÐÂÐÞ¸´Òѱ»Ê¹ÓõÄÎó²î
GoogleÓÚ9ÔÂ5ÈÕÐû²¼ÁË9Ô·ݵÄAndroidÇå¾²¸üУ¬×ܼÆÐÞ¸´ÁË33¸öÎó²î¡£ÆäÖаüÀ¨¿ÉÄÜÒѱ»Ê¹ÓõÄÎó²î(CVE-2023-35674)£¬ËüλÓÚAndroid¿ò¼ÜÖУ¬¹¥»÷Õß¿ÉʹÓÃÆäÔÚÎÞÐèÓëÓû§½»»¥»òÌØÊâÖ´ÐÐȨÏÞµÄÇéÐÎÏÂÌáȨ¡£±ðµÄ£¬¸üл¹ÐÞ¸´Á˼¸¸ö½ÏΪÑÏÖصÄÎó²î£¬»®·ÖÊÇϵͳ×é¼þÖеÄ3¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-35658¡¢CVE-2023-35673ºÍCVE-2023-35681£©£¬ÒÔ¼°¸ßͨ±ÕÔ´×é¼þÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-28581£©¡£
https://securityaffairs.com/150440/hacking/september-2023-android-security-updates-0day.html
3¡¢Stake.comÔâµ½¹¥»÷Áè¼Ý4100ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ
9ÔÂ5ÈÕ±¨µÀ£¬Stake.com³ÆÆäETH/BSCÈÈÇ®°üÔâµ½ÈëÇÖ£¬Áè¼Ý4100ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ¡£¹¥»÷±¬·¢ÓÚ9ÔÂ4ÈÕ£¬ºÚ¿Í´ÓEthereumÇÔÈ¡ÁË1570ÍòÃÀÔª£¬ÔÚBSCÇÔÈ¡ÁË1780ÍòÃÀÔª£¬ÔÚPolygonÇÔÈ¡ÁË780ÍòÃÀÔª¡£ÔÚÔâµ½¹¥»÷ºó¸Ãƽ̨Á¬Ã¦ÏòÓû§°ü¹Ü£¬ËûÃǵÄ×ʽðÊÇÇå¾²µÄ£¬ËùÓÐδÊܹ¥»÷Ö±½ÓÓ°ÏìµÄÇ®°ü£¬°üÀ¨BTC¡¢LTC¡¢XRP¡¢EOSºÍTRXµÄÇ®°ü£¬ÈÔÈ»¿ÉÒÔÕý³£ÔËÐС£µ«ÈÔÓÐЩÓû§ÔÚXÉÏ·¢Ìû³ÆÎÞ·¨´æ¿î»òÈ¡¿î¡£9ÔÂ5ÈÕ£¬Stake.com֪ͨÆä·þÎñÒѻָ´£¬Óû§ÏÖÔÚ¿ÉÒÔÔÙ´ÎʹÓÃËùÓÐÇ®±Ò¾ÙÐдæÈ¡¿î¡£
https://securityaffairs.com/150401/hacking/crypto-gambling-firm-stake-hacked.html
4¡¢Morphisec·¢Ã÷Õë¶Ô½ðÈÚºÍÎïÊ¢ÐÐÒµµÄChaesбäÌå
MorphisecÔÚ9ÔÂ5ÈÕÅû¶ÁËÕë¶Ô½ðÈÚºÍÎïÊ¢ÐÐÒµµÄChaesбäÌåChae$ 4¡£×îÐÂÔ˶¯µÄѬȾÁ´ÓëÒÑÍùÏàͬ£¬É漰αÔìµÄMSI×°ÖóÌÐò£¬»á´¥·¢¶à°ì·¨Ñ¬È¾£¬²¢Ê¹ÓÃ7¸öÄ£¿éÀ´Ö´ÐÐÖÖÖÖ¹¦Ð§¡£±ðµÄ£¬Õâ¸öбäÌ屬·¢ÁËÖØ´óת±ä£¬°üÀ¨Ë¢ÐµĴúÂë¼Ü¹¹¡¢¶à²ã¼ÓÃܺÍˢеÄÒþÄäÊÖÒÕ¡¢¸ÄÓÃPython¾ÙÐнâÃܺÍÄÚ´æÖ´ÐС¢Ê¹ÓÃChrome DevToolsÌæ»»ÓÃÓÚ¼à¿ØChromiumä¯ÀÀÆ÷Ô˶¯µÄPuppeteer¡¢À©´óÕë¶Ôƾ֤͵ÇԵĶ¨Ïò·þÎñ¡¢Ê¹ÓÃWebSocketsÈ¡´úHTTP¾ÙÐÐͨѶÒÔ¼°½ÓÄÉDGA¶¯Ì¬ÆÊÎöC2·þÎñÆ÷µØµãµÈ¡£
https://blog.morphisec.com/chaes4-new-chaes-malware-variant-targeting-financial-and-logistics-customers
5¡¢CERT-UA¼ì²âµ½Fancy BearÕë¶ÔijÄÜÔ´»ù´¡ÉèÊ©µÄ¹¥»÷
¾ÝýÌå9ÔÂ6ÈÕ±¨µÀ£¬CERT-UA¼ì²âµ½Fancy BearÕë¶ÔÎÚ¿ËÀ¼Ä³ÄÜÔ´»ù´¡ÉèÊ©µÄ¹¥»÷¡£¹¥»÷ʹÓÃÁË°üÀ¨BATÎļþµÄ´¹ÂÚÓʼþÀ´»ñµÃÄ¿µÄϵͳµÄ³õʼ»á¼ûȨÏÞ¡£ÔËÐÐCMDÎļþ½«½¨Éè.batºÍ.vbsÎļþ£¬²¢Æô¶¯Ò»¸öVBSÎļþ£¬¸ÃÎļþ½«ÒÀ´ÎÖ´ÐÐBATÎļþ¡£¹¥»÷Õß»¹ÔÚÄ¿µÄÅÌËã»úÖÐ×°ÖÃÁËTorÓ¦Ó㬲¢Í¨¹ýÕýµ±µÄwebhook.site·þÎñAPIʹÓá°curl¡±ÊµÏÖÔ¶³ÌÏÂÁîÖ´ÐУ¬Í¨¹ý½¨ÉèÍýÏëʹÃüÔËÐÐÒÔBATÎļþ×÷Ϊ²ÎÊýµÄVBS½ÅÔÀ´È·¼á³¤ÆÚÐÔ¡£CERT-UA³Æ£¬¸ÃÄÜÔ´»ù´¡ÉèÊ©µÄÇå¾²Ö°Ô±½ÓÄÉÁËÏìÓ¦²½·¥×èÖ¹Á˴˴ι¥»÷Ô˶¯¡£
https://therecord.media/ukraine-energy-facility-cyberattack-fancy-bear-email
6¡¢Ñо¿Ö°Ô±¹ûÕæAtlas VPNÖÐй¶Óû§ÕæʵIPµØµãµÄÎó²î
ýÌå9ÔÂ5Èճƣ¬Ó°ÏìLinux¿Í»§¶ËµÄAtlas VPNÎó²î£¬½öͨ¹ý»á¼ûÍøÕ¾¼´¿Éй¶Óû§µÄÕæʵIPµØµã¡£Óû§Educational-Map-8145ÔÚRedditÉÏÐû²¼ÁËÒ»¸öPoC£¬ÑÝʾÔõÑùʹÓÃAtlas VPN Linux APIÀ´Ð¹Â¶Óû§µÄIPµØµã¡£¸ÃPoC½¨ÉèÁËÒ»¸öÓÉJavaScript×Ô¶¯Ìá½»µÄÒþ²Ø±íµ¥£¬ÅþÁ¬µ½APIÖÕ¶ËURL http://127.0.0.1:8076/connection/stop¡£»á¼û¸ÃAPIÖÕ¶Ëʱ£¬Ëü»á×Ô¶¯ÖÕÖ¹Òþ²ØÓû§IPµØµãµÄAtlas VPN»á»°¡£Ò»µ©VPNÅþÁ¬¶Ï¿ª£¬PoC¾Í»áÅþÁ¬µ½api.ipify.org£¬¼Í¼»á¼ûÕßµÄÏÖʵIPµØµã¡£Atlas VPNÔÊÐí½«¾¡¿ìÐû²¼ÐÞ¸´³ÌÐò¡£
https://www.bleepingcomputer.com/news/security/atlas-vpn-zero-day-vulnerability-leaks-users-real-ip-address/