з¢Ã÷µÄ RustDoor ¶ñÒâÈí¼þð³ä Visual Studio ¸üÐÂ
Ðû²¼Ê±¼ä 2024-02-222ÔÂ20ÈÕ£¬Ð·¢Ã÷µÄ Apple macOS ºóÃÅÃûΪ RustDoor£¬Ëüͨ¹ýÖØ´óµÄ¶ñÒâÈí¼þÔ˶¯Õë¶Ô¼ÓÃÜÇ®±ÒÁìÓòµÄ¶à¼Ò¹«Ë¾¡£¸Ã¶ñÒâÈí¼þ½ÓÄÉ Rust ¿ª·¢£¬¿ÉÔÚ»ùÓÚ Intel µÄ¼Ü¹¹ºÍ ARM ¼Ü¹¹ÉÏÔËÐС£Bitdefender µÄÑо¿Ö°Ô±ÖÁÉÙ´Ó 2023 Äê 11 ÔÂÆð¾ÍÒ»Ö±ÔÚ¸ú×ٸöñÒâÈí¼þ£¬·¢Ã÷ËüÓëÓëÎÛÃûÕÑÖøµÄALPHV/BlackCat ÀÕË÷Èí¼þÍÅ»ïÏà¹ØµÄ C2 ·þÎñÆ÷¾ÙÐÐͨѶ¡£RustDoor Ö÷Òª×÷Ϊ Visual Studio for Mac µÄ¸üгÌÐò¾ÙÐзַ¢£¬¾ßÓвî±ðµÄÃû³Æ,Èç¡°zshrc2¡±¡¢¡°Previewers¡±¡¢¡°VisualStudioUpdater¡±¡¢¡°VisualStudioUpdater_Patch¡±¡¢¡°VisualStudioUpdating¡±¡¢¡°visualstudioupdate¡±ºÍ¡°DO_NOT_RUN_ChromeUpdates¡±¡£Ñ¬È¾ÏµÍ³ºó£¬¶ñÒâÈí¼þÓë C2 ·þÎñÆ÷ͨѶÒÔ¿ØÖÆÊÜѬȾµÄϵͳ¡¢Ö´ÐÐʹÃü²¢ÇÔÈ¡Êý¾Ý¡£
https://cyware.com/news/newly-discovered-rustdoor-malware-impersonates-visual-studio-update-148f6632/?web_view=true
2.Earth Preta Õë¶ÔÑÇÖ޵Ĺ¥»÷Ô˶¯£ºDOPLUGS ¶ñÒâÈí¼þÍþв
2ÔÂ20ÈÕ£¬Check Point µÄÉîÈëÍþвÆÊÎöÆÊÎöÁ˸߼¶Ò»Á¬Íþв (APT) ×éÖ¯ Earth Preta µÄÒ»Á¬Ðж¯¡£Ö»¹ÜÆäÅ·ÖÞÔ˶¯Êܵ½ÆÕ±é¼à¿Ø£¬µ«²»¿É·ñ¶¨µÄÊÇ£¬Æä¶ÔÑÇÖÞÄ¿µÄµÄ¸ß¶È¹Ø×¢¡£ÕâÒ»¶¨ÖÆÕ½ÂÔµÄÒªº¦ÊÇÒ»ÖÖÃûΪ DOPLUGS µÄ¶¨ÖƶñÒâÈí¼þ£¬ËüÊÇ×î½üһϵÁÐÈëÇÖÖÐʹÓõÄÒªº¦¹¤¾ß¡£ÆÊÎöÅú×¢£¬ÕâÖÖ¶¨ÖÆµÄ PlugX ±äÌåÔ¶·Çµä·¶¡£Check Point µÄÑо¿Ö°Ô±ÊìϤµ½ÆäÆæÒìµÄÊôÐÔ£¬²¢½«ÆäÃüÃûΪ DOPLUGS¡£Óë¾ßÓÐÈ«Ì׺óÃÅÏÂÁîµÄ¹Å°å PlugX ¶ñÒâÈí¼þ²î±ð¡£ÓÐȤµÄÊÇ£¬Check Point ·¢Ã÷ÁËÄܹ»Ê¹Óá°KillSomeOne¡±USB Èä³æ²¡¶¾µÄ DOPLUGS ±äÌ壨×î³õÓÚ 2020 ÄêÆع⣩¡£ÕâÒ»ÔöÌíµÄά¶ÈÓÐÖúÓÚÔÚÊÜѬȾµÄÍøÂçÖпìËÙÒƶ¯£¬Í¹ÏÔÁËÍþв×é֯׷Çó¸üÆÕ±éµÄÉø͸¡£
https://securityonline.info/earth-pretas-targeted-asian-campaigns-the-doplugs-malware-threat/
3.DNS Îó²î KeyTrap ¿Éµ¼Ö»¥ÁªÍø´ó¹æÄ£µÄÖÐÖ¹
2ÔÂ21ÈÕ£¬Ö»¹ÜËü×Ô 2000 ÄêÒÔÀ´¾ÍÒ»Ö±±£´æ£¬µ«Ñо¿Ö°Ô±×î½ü²Å·¢Ã÷ÓòÃûϵͳ (DNS) Çå¾²À©Õ¹ÖеÄÒ»¸ö»ù±¾Éè¼ÆȱÏÝ£¬¸ÃȱÏÝÔÚijЩÇéÐÎÏ¿ÉÄܻᱻʹÓÃÀ´´Ý»Ù´ó¹æÄ£µÄ»¥ÁªÍø¡£DNS ·þÎñÆ÷½«ÍøÕ¾ URL ת»»Îª IP µØµã£¬²¢ÇÒÔÚ´ó´ó¶¼ÇéÐÎϲ»¿É¿´·¨³ÐÔØËùÓл¥ÁªÍøÁ÷Á¿¡£ÕâÒ»·¢Ã÷±³ºóµÄÍŶÓÀ´×Ե¹ú ATHENE ¹ú¼ÒÓ¦ÓÃÍøÂçÇå¾²Ñо¿ÖÐÐÄ¡£ËûÃǽ«¸ÃÇå¾²Îó²îÃüÃûΪ¡°KeyTrap¡±£¬±àºÅΪCVE-2023-50387¡£Æ¾Ö¤ËûÃǹØÓÚ KeyTrap DNS ¹ýʧµÄб¨¸æ£¬Ñо¿Ö°Ô±·¢Ã÷£¬Ê¹Óà DNSSEC À©Õ¹·¢Ë͵½ DNS ·þÎñÆ÷ʵÏÖÀ´ÑéÖ¤Á÷Á¿µÄµ¥¸öÊý¾Ý°ü¿ÉÄÜ»áÆÈʹ·þÎñÆ÷½øÈëÆÊÎöÑ»·£¬´Ó¶øµ¼ÖÂÆäÏûºÄËùÓÐ×Ô¼ºµÄÅÌËãÄÜÁ¦¡£Æ¾Ö¤¸Ã±¨¸æºÍ ISC µÄ˵·¨£¬ºÃÐÂÎÅÊÇ£¬µ½ÏÖÔÚΪֹ£¬»¹Ã»ÓÐÈκÎ×Ô¶¯Ê¹ÓõÄÖ¤¾Ý¡£
https://www.darkreading.com/cloud-security/keytrap-dns-bug-threatens-widespread-internet-outages
4. Joomla Ô¶³Ì´úÂëÖ´ÐÐÎó²î CVE-2024-21726
2ÔÂ20ÈÕ£¬Ñо¿ÍŶÓ×î½üµÄÒ»Ïî·¢Ã÷̻¶ÁËÊ¢ÐеÄJoomlaÄÚÈÝÖÎÀíϵͳ (CMS)ÖеÄÒ»¸öÖ÷ÒªµÄÇå¾²ÎÊÌâ¡£´ËÎó²îÖ¸¶¨ÎªCVE-2024-21726£¬Îª¶àÖÖ¿çÕ¾¾ç±¾ (XSS) ¹¥»÷·¿ªÁË´óÃÅ£¬¹¥»÷Õß¿ÉÒÔʹÓôËȨÏÞÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢Öض¨ÏòÍøÕ¾Á÷Á¿¡¢ÆÆËðÍøÕ¾»ò×°Öó¤ÆÚÐÔ¶ñÒâÈí¼þÒÔ½øÒ»²½Î£º¦¡£Joomla Ðж¯Ñ¸ËÙ£¬Ðû²¼Á˲¹¶¡°æ±¾£¨5.0.3¡¢4.4.3¡¢3.10.15-elts£©£©¡£¿ÉÔöÌí Web Ó¦ÓóÌÐò·À»ðǽ (WAF) ºÍ°´ÆÚ¶ñÒâÈí¼þɨÃ裬ÒÔÔöÌíÕë¶Ô¹¥»÷µÄÌØÊâÆÁÕÏ¡£Ç¿ÖÆÖ´ÐС°×îСȨÏÞ¡±Õ½ÂÔ£¬½öÏòÐèÒªÍêÈ«ÍøÕ¾¿ØÖƵÄÖ°Ô±ÊÚÓèÖÎÆÊÎö¼ûȨÏÞ¡£
https://securityonline.info/cve-2024-21726-patch-now-to-stop-joomla-remote-code-execution/
5. VMware ±Þ²ßÓû§Ð¶ÔØÒÑÆúÓõÄÔöÇ¿ÐÍÉí·ÝÑéÖ¤²å¼þ
2ÔÂ21ÈÕ£¬ÔÚ·¢Ã÷ÑÏÖØÇå¾²Îó²îºó£¬VMware ±Þ²ßÓû§Ð¶ÔØÒÑÆúÓõÄÔöÇ¿ÐÍÉí·ÝÑéÖ¤²å¼þ (EAP)¡£¸ÃÎó²î±àºÅΪCVE-2024-22245£¨CVSS ÆÀ·Ö£º9.6£©£¬±»ÐÎòΪí§ÒâÉí·ÝÑéÖ¤Öм̹ýʧ¡£¶ñÒâÐÐΪÕß¿ÉÄÜ»áÓÕÆÔÚÍøÂçä¯ÀÀÆ÷ÖÐ×°ÖÃÁË EAP µÄÄ¿µÄÓòÓû§£¬ÇëÇó²¢×ª·¢í§Òâ Active Directory ·þÎñÖ÷ÌåÃû³Æ (SPN) µÄ·þÎñƱ֤¡£EAPÊÇÒ»¸öÈí¼þ°ü£¬Ö¼ÔÚÔÊÐíͨ¹ý Web ä¯ÀÀÆ÷Ö±½ÓµÇ¼ vSphere µÄÖÎÀí½çÃæºÍ¹¤¾ß£¬×Ô 2021 Äê 3 ÔÂÆðÒÑÆúÓá£Ä¬ÈÏÇéÐÎϲ»°üÀ¨Ëü£¬Ò²²»ÊôÓÚ vCenter Server¡¢ESXi »ò Cloud Foundation¡£ÖµµÃÖ¸³öµÄÊÇ£¬ÕâЩȱÏݽöÓ°ÏìÒѽ« EAP Ìí¼Óµ½ Microsoft Windows ϵͳÒÔͨ¹ý vSphere Client ÅþÁ¬µ½ VMware vSphere µÄÓû§¡£
https://thehackernews.com/2024/02/vmware-alert-uninstall-eap-now-critical.html
6. Linux ¶ñÒâÈí¼þÔ˶¯ Migo Ãé×¼ Redis ¾ÙÐÐÍÚ¿ó
2ÔÂ20ÈÕ£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÕë¶ÔÊ¢ÐÐÊý¾Ý´æ´¢ÏµÍ³ Redis µÄÖØ´ó¶ñÒâÈí¼þÔ˶¯¡£¸ÃÔ˶¯±»³ÆΪ¡°Migo¡±£¬½ÓÄÉÐÂÓ±µÄÕ½ÂÔÀ´ÆÆËð Redis ·þÎñÆ÷£¬×îÖÕÄ¿µÄÊÇÔÚ Linux Ö÷»úÉÏÍÚ¾ò¼ÓÃÜÇ®±Ò¡£ÌØÊâÊÇ£¬Cado Ç徲ʵÑéÊÒÑо¿Ö°Ô±ÊӲ쵽£¬Migo ʹÓÃÐ嵀 Redis ϵͳÈõ»¯ÏÂÁîÀ´Ê¹ÓÃÊý¾Ý´æ´¢¾ÙÐмÓÃÜЮÖÆ¡£Óë֮ǰÕë¶Ô Redis µÄ¹¥»÷²î±ð£¬´ËÔ˶¯ÒýÈëÁËÆæÒìµÄÊÖÒÕÀ´Î£º¦ÏµÍ³µÄÇå¾²¡£¹¥»÷µÄ³õʼ»á¼û½×¶ÎÉ漰ʹÓÃÌض¨µÄ CLI ÏÂÁî½ûÓà Redis µÄÖÖÖÖÉèÖÃÑ¡Ïî¡£ÀýÈ磬¹¥»÷Õ߹رձ£»¤Ä£Ê½ºÍ¸±±¾Ö»¶ÁµÈ¹¦Ð§ÒÔÔö½øÆä¶ñÒâÔ˶¯¡£»ñµÃ»á¼ûȨÏ޺󣬹¥»÷ÕßÉèÖÃÁËһϵÁÐÏÂÁîÀ´Ö´ÐÐ´Ó Transfer.sh ºÍ Pastebin µÈÍⲿȪԴ¼ìË÷µ½µÄ¶ñÒ⸺ÔØ¡£ÕâЩÓÐÓøºÔØÖ¼ÔÚÔÚºǫ́ÍÚ¾ò¼ÓÃÜÇ®±Ò£¬Í¬Ê±¼á³Ö²»±»·¢Ã÷¡£
https://www.infosecurity-magazine.com/news/linux-malware-migo-targets-redis/