ºÚ¿ÍÉù³Æ·þÎñÆ÷Ôâµ½ÈëÇÖ£¬µÂÇÚ³ÆÃô¸ÐÊý¾ÝδÊܵ½Íþв

Ðû²¼Ê±¼ä 2024-09-25
1. ºÚ¿ÍÉù³Æ·þÎñÆ÷Ôâµ½ÈëÇÖ£¬µÂÇÚ³ÆÃô¸ÐÊý¾ÝδÊܵ½Íþв


9ÔÂ24ÈÕ£¬µÂÇÚ¹«Ë¾½üÆÚÔâÓöÁËÒ»ÆðÓÉÎÛÃûÕÑÖøµÄºÚ¿Í×éÖ¯IntelBrokerÌᳫµÄÍøÂç¹¥»÷ÊÂÎñ£¬¸ÃºÚ¿ÍÔÚBreachForums·¸·¨ÂÛ̳ÉÏÉù³ÆÒÑÀֳɻñÈ¡Á˵ÂÇÚδÍ×ÉÆ·À»¤µÄApache Solr·þÎñÆ÷Éϵġ°ÄÚ²¿Í¨Ñ¶¡±Êý¾Ý¡£¾ÝºÚ¿ÍÐÎò£¬ÕâЩÊý¾ÝÉæ¼°µç×ÓÓʼþµØµã¡¢¹«Ë¾ÄÚ²¿Ô±¹¤¼äµÄͨѶ¼Í¼ÒÔ¼°²¿·ÖÄÚ²¿ÉèÖã¬ÇÒ¿Éͨ¹ýĬÈÏƾ֤ÇáËÉ»á¼û¡£Ö»¹ÜÕâЩÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳¹ûÕ棬¹©¸¶ÓöȻ§ÏÂÔØ£¬µ«µÂÇÚѸËÙ×÷³ö»ØÓ¦£¬È·ÈÏȷʵ±¬·¢ÁËÊý¾Ýй¶£¬µ«Ç¿µ÷¾­ÊÓ²ìºóÈ·ÈÏ£¬´Ë´ÎÊÂÎñ²¢Î´²¨¼°Æä¿Í»§Êý¾Ý»òÆäËûÈκÎÃô¸ÐÐÅÏ¢£¬Òò´ËÓ°Ïì±»ÏÞÖÆÔÚÁËÒ»¶¨¹æÄ£ÄÚ¡£µÂÇÚµÄʵʱÉùÃ÷Ö¼ÔÚ¿íο¹«ÖںͿͻ§µÄµ£ÐÄ£¬Í¬Ê±Í¹ÏÔÁËÆäÔÚÍøÂçÇå¾²ÁìÓòµÄ¾¯ÐÑÐÔºÍÓ¦¶ÔÄÜÁ¦¡£


https://www.securityweek.com/deloitte-says-no-threat-to-sensitive-data-after-hacker-claims-server-breach/


2. Diddy³óÎųÉÓÕ¶ü£ºÐÂÐÍPDiddySploit¶ñÒâÈí¼þËÁÅ°É罻ýÌå


9ÔÂ25ÈÕ£¬ÍøÂç·¸·¨·Ö×ÓÕý³Ã»úʹÓÃSean ¡°Diddy¡± CombsµÄ³óÎÅ£¬Èö²¥ÐÂÐͶñÒâÈí¼þPDiddySploit£¬Ä¿µÄËø¶¨ÔÚ³äÂúºÃÆæÇÒÎÞÔ¤·ÀµÄÉ罻ýÌåÓû§£¬ÓÈÆäÊÇX.com£¨Ç°Twitter£©Óû§¡£Õâ¿î¶ñÒâÈí¼þÊôÓÚPySilon RATϵÁУ¬ÒÔÆäÇ¿Ê¢µÄÊý¾ÝÇÔÈ¡¡¢¼üÅ̼à¿Ø¡¢ÆÁÄ»¼Í¼¼°Ô¶³Ì¿ØÖƹ¦Ð§Öø³Æ¡£ÍøÂç·¸·¨·Ö×Óͨ¹ýÉÏ´«Î±×°³É°üÀ¨DiddyÒÑɾ³ýÉ罻ýÌåÌû×ÓµÄÎļþ£¬ÓÕÆ­Óû§ÏÂÔØ£¬½ø¶øѬȾÆä×°±¸¡£´ËÀ๥»÷ʹÓÃÁ˹«ÖÚ¶ÔÃûÈ˳óÎŵĺÃÆæÐÄÀí£¬ÌØÊâÊǵ±³óÎÅÊܵ½Ã½Ìå¸ß¶È¹Øעʱ£¬Êܺ¦ÕßÍùÍùÄÑÒÔ¿¹¾Ü̽Ë÷δ֪ÐÅÏ¢µÄÓÕ»ó¡£ÖµµÃ×¢ÖصÄÊÇ£¬PDiddySploit²¢·ÇDiddyÓë¶ñÒâÈí¼þ¹ØÁªµÄÊ×Àý£¬ÀúÊ·ÉÏÓжà´ÎÀàËÆÊÂÎñ£¬¾ùÒÔÃûÈËÏà¹ØÄÚÈÝΪÓÕ¶ü¡£Ëæ×ÅPySilon RATµÈ¶ñÒâÈí¼þµÄÒ»Ö±½ø»¯£¬ÒÔ¼°ÍøÂç·¸·¨·Ö×ӵĽÆÕ©ÊֶΣ¬¹«ÖÚÐèÌá¸ßСÐÄ£¬×èÖ¹ÈúÃÆæÐijÉΪÍøÂçÇå¾²µÄÈíÀß¡£ÔÚÉ罻ýÌåÉÏä¯ÀÀÈÈÃÅ»°Ìâʱ£¬¼á³ÖÀíÐÔÅжÏ£¬ÉóÉ÷ÏÂÔز»Ã÷ȪԴµÄÎļþ£¬ÊDZ£»¤×Ô¼ºÃâÊÜ´ËÀ๥»÷µÄÒªº¦¡£


https://hackread.com/pdiddysploit-malware-hidden-files-deleted-diddy-posts/


3. AutoCanadaÔ±¹¤Êý¾ÝÒÉÔâHunters InternationalÀÕË÷ÍÅ»ïй¶


9ÔÂ24ÈÕ£¬AutoCanada½üÆÚÔâÓöÁËÒ»³¡ÓÉHunters InternationalÀÕË÷Èí¼þÍÅ»ïÌᳫµÄÍøÂç¹¥»÷£¬ÖÒÑÔ³ÆÔ±¹¤Êý¾Ý¿ÉÄÜÒÑÔÚ8Ô·ݵĹ¥»÷Öб»Ð¹Â¶¡£Ö»¹Ü¹«Ë¾ÉÐδ·¢Ã÷Õë¶ÔÊÜÓ°ÏìÔ±¹¤µÄڲƭÔ˶¯£¬µ«ÈÔÆð¾¢·¢ËÍ֪ͨÒÔÌáÐÑDZÔÚΣº¦¡£´Ë´Î¹¥»÷ÆÈʹAutoCanada¹Ø±Õ²¿·ÖÄÚ²¿ITϵͳ£¬µ¼ÖÂÔËÓªÖÐÖ¹£¬Ö»¹ÜÆä66¼Ò¾­ÏúµêÓªÒµÈÔÔÚ¼ÌÐø£¬µ«²¿·Ö¿Í»§·þÎñÊܵ½ÑÓÎó¡£Hunters InternationalËæºóÔÚÀÕË÷ÃÅ»§ÉÏÈ·ÈϹ¥»÷£¬²¢Éù³ÆÇÔÈ¡ÁËÊýTBÊý¾Ý£¬°üÀ¨¸ß¹ÜÐÅÏ¢¡¢²ÆÎñÎļþºÍÈËÁ¦×ÊÔ´Êý¾ÝµÈÃô¸ÐÐÅÏ¢¡£AutoCanadaͨ¹ýÐû²¼³£¼ûÎÊÌâ½â´ðÒ³Ãæ»ØÓ¦¹«ÖÚ¹ØÇУ¬Ö¸³ö¼ÓÃÜ·þÎñÆ÷ÄÚÈÝÕýÔÚ»Ö¸´ºÍÆÊÎöÖУ¬²¢ÈÏ¿É¿ÉÄÜÉæ¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅϢй¶¡£ÒÑ鶵ÄÔ±¹¤Êý¾ÝÏ꾡£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢ÈËΪÐÅÏ¢¡¢Éç±£ºÅÂë¼°ÒøÐÐÕ˺ŵÈÃô¸Ð×ÊÁÏ£¬¹«Ë¾Îª´ËÌṩΪÆÚÈýÄêµÄÃâ·ÑÉí·Ý͵ÇÔ±£»¤ºÍÐÅÓüà¿Ø¡£ÎªÌá·ÀδÀ´¹¥»÷£¬AutoCanadaÒѽÓÄÉһϵÁÐÇå¾²²½·¥£¬°üÀ¨¸ôÀëÊÜѬȾϵͳ¡¢ÖØÖÃÃÜÂ롢ʵÑéÍþв¼ì²âºÍÏìӦϵͳ£¬²¢ÔöÇ¿Ô±¹¤ÍøÂçÇå¾²Åàѵ¡£


https://www.bleepingcomputer.com/news/security/autocanada-says-ransomware-attack-may-impact-employee-data/


4. CISA¾¯Ê¾Ivanti vTMÉí·ÝÑéÖ¤ÈƹýÎó²îCVE-2024-7593±»Æð¾¢Ê¹ÓÃ


9ÔÂ24ÈÕ£¬CISA£¨ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£©×î½üÕ¹ÏÖÁËIvantiÐéÄâÁ÷Á¿ÖÎÀíÆ÷£¨vTM£©ÖеÄÒ»¸öÑÏÖØÇå¾²Îó²îCVE-2024-7593£¬¸ÃÎó²îÔÊÐíδ¾­ÊÚȨµÄ¹¥»÷ÕßÈƹýÉí·ÝÑéÖ¤£¬ÔÚÊÜÓ°ÏìµÄvTM×°±¸ÉϽ¨Éè¶ñÒâÖÎÀíÔ±ÕË»§¡£vTMÊÇIvantiÌṩµÄÓ¦ÓóÌÐò½»¸¶¿ØÖÆÆ÷£¬ÈÏÕæÒªº¦·þÎñµÄ¸ºÔØƽºâºÍÁ÷Á¿ÖÎÀí¡£¸ÃÎó²îÔ´ÓÚÉí·ÝÑéÖ¤Ëã·¨µÄ¹ýʧʵÏÖ£¬Ê¹Ô¶³Ì¹¥»÷ÕßÄܹ»ÈÝÒ×»á¼û²¢¿ØÖÆ×°±¸¡£Ö»¹ÜIvantiÔÚ8ÔÂÒÑÐû²¼²¹¶¡ÐÞ¸´´ËÎÊÌ⣬µ«CISAÈ·ÈϸÃÎó²îÒѱ»×Ô¶¯Ê¹Ó㬲¢½ôÆȽ«ÆäÁÐÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡£ÊÜÓ°ÏìµÄÁª°î»ú¹¹±»ÒªÇóÔÚ10ÔÂ15ÈÕÇ°½ÓÄÉÐж¯£¬±£»¤ÆäÍøÂçÖеÄvTM×°±¸¡£±ðµÄ£¬CISAÒ²½¨ÒéÈ«Çò˽ÓÐ×éÖ¯ÓÅÏÈ´¦Öóͷ£´ËÎó²î£¬ÒÔÌá·ÀDZÔÚ¹¥»÷¡£¼øÓÚIvantiÔÚÈ«ÇòÓµÓÐÖØ´óµÄÏàÖúͬ°éÍøÂçºÍÓû§»ù´¡£¬´Ë´ÎÎó²îµÄÆÕ±éÓ°Ïì½ûÖ¹ºöÊÓ¡£


https://www.bleepingcomputer.com/news/security/critical-ivanti-vtm-auth-bypass-bug-now-exploited-in-attacks/


5. Èø˹ÖÝ°¢¿ÏÉ«³ÇË®´¦Öóͷ£ÉèÊ©ÔâÍøÂç¹¥»÷£¬ÏµÍ³ÔÝתÊÖ¶¯²Ù×÷


9ÔÂ24ÈÕ£¬Èø˹ÖÝ°¢¿ÏÉ«³ÇµÄË®´¦Öóͷ£ÉèÊ©ÓÚ2024Äê9ÔÂ22ÈÕÔâÓöÍøÂçÇå¾²ÊÂÎñ£¬µ¼ÖÂϵͳÔÝʱתΪÊÖ¶¯²Ù×÷¡£Ö»¹ÜÕâÒ»ÊÂÎñÒýÆðÁ˹Ø×¢£¬µ«Êг¤À¼µÏ¡¤¸¥À×ÔóѸËÙÐû²¼Í¨¸æ¿íοÃñÖÚ£¬Ç¿µ÷¹©Ë®·þÎñδÊÜÓ°Ï죬ˮÖÊÇå¾²ÎÞÓÇ¡£Õþ¸®Ñ¸ËÙÏìÓ¦£¬Ô¼ÇëÍøÂçÇ徲ר¼Ò½éÈ룬²¢ÔöÇ¿Ç徲ЭÒéÒÔ°ü¹Ü¹©Ë®Çå¾²¡£ÆðÔ´¼£ÏóÖ¸ÏòÀÕË÷Èí¼þ¹¥»÷£¬´ÙʹÉèÊ©½ÓÄÉÊÖ¶¯²Ù×÷ÒÔ·ÀÊÂ̬À©´ó¡£°¢¿ÏÉ«ÊйÙÔ±ÕýÈ«Á¦ÊӲ죬ȷ±£Ë®ÖʺͷþÎñÎȹÌ¡£´Ë´ÎÊÂÎñÔÙ´ÎÇÃÏìÁ˹«ÓÃÊÂÒµ²¿·ÖÍøÂçÇå¾²¾¯ÖÓ£¬ÓÈÆäÊÇË®ÎñϵͳÃæÁÙµÄÑÏËàÌôÕ½¡£ÃÀ¹úÕþ¸®Õý¼Ó¶¦Á¦´ó¾Ù¶ÈÌáÉýË®ÎñÉèÊ©µÄÍøÂç·ÀÓùÄÜÁ¦£¬Ô¤·ÀδÀ´¹¥»÷¡£ÎªÓ¦¶Ô´ËÀàÍþв£¬Ë®Îñ¹«Ë¾Ðè¹¹½¨ÖÜÈ«µÄÍøÂçÇ徲ϵͳ£¬°üÀ¨°´ÆÚÇå¾²Éó²é¡¢Ô±¹¤Çå¾²Åàѵ¡¢Êý¾Ý¼ÓÃܼ°¶àÒòËØÉí·ÝÑéÖ¤µÈ²½·¥¡£Í¬Ê±£¬¼á³Öϵͳ¸üв¢Öƶ©Ó¦¼±ÏìÓ¦ÍýÏ룬ÊÇ¿ìËÙÓ¦¶Ô²¢¼õÇáDZÔÚË𺦵ÄÒªº¦¡£


https://www.infosecurity-magazine.com/news/incident-arkansas-city-water/


6. Octo2¶ñÒâÈí¼þа汾αװÈÈÃÅÓ¦ÓÃÔÚÅ·ÖÞËÁÅ°


9ÔÂ24ÈÕ£¬Ò»ÖÖÃûΪ¡°Octo2¡±µÄÐÂÐÍAndroid¶ñÒâÈí¼þ±äÖÖÔÚÅ·ÖÞÇÄÈ»ÉìÕÅ£¬Î±×°³ÉNordVPN¡¢Google Chrome¼°Å·ÖÞÆóÒµÓ¦ÓõÈÈÈÃÅÈí¼þ£¬Ö¼ÔÚÓÕÆ­Óû§ÏÂÔØ¡£Õâ¿îÈí¼þÓÉÔçÆÚµÄExoCompactºÍExoBotľÂíÑݱä¶øÀ´£¬Õ¹Ê¾ÁËÆäÍçÇ¿µÄÉúÃüÁ¦ºÍÒ»Á¬µÄÊÖÒÕˢС£Octo2²»µ«¼ÌÐøÁËÇ°´úµÄÇ¿Ê¢¹¦Ð§£¬Èç¼üÅ̼ͼ¡¢×°±¸¿ØÖƵÈ£¬»¹ÏÔÖøÌáÉýÁËÔËÐÐÎȹÌÐÔ¡¢·´ÆÊÎöÄÜÁ¦ºÍͨѶÎÞаÐÔ£¬ÒýÈëÁËÓòÌìÉúËã·¨£¨DGA£©ÒÔÔöÇ¿ÏÂÁîÓë¿ØÖÆ£¨C2£©µÄµ¯ÐÔ¡£ThreatFabricµÄÑо¿Õ¹ÏÖÁËOcto2µÄÖØ´óÐԺͽÆÕ©ÐÔ£¬Æäͨ¹ýZombider·þÎñǶÈë¶ñÒ⸺ÔØ£¬ÉõÖÁÄÜÈƹýAndroid 13µÄÇå¾²ÏÞÖÆ¡£Ð°汾ÔÚÅþÁ¬ÓÅ»¯¡¢Êý¾Ý¼ÓÃܺͶ¯Ì¬¼ÓÔØÊÖÒÕÉϵÄÇ°½ø£¬Ê¹Æä¸üÄѱ»¼ì²âºÍÆÊÎö¡£ÌØÊâµØ£¬Ð¼ÓÈëµÄ¡°SHIT_QUALITY¡±ÉèÖÃÈ·±£Á˵ÍÍøÂçÇéÐÎϵÄÎȹÌͨѶ£¬¶ø»ùÓÚDGAµÄC2ϵͳÔò´ó·ùÌáÉýÁË·þÎñÆ÷µÄÎÞаÐԺͿ¹¹¥»÷ÄÜÁ¦¡£ÏÖÔÚ£¬Octo2µÄ¹¥»÷Ô˶¯Ö÷Òª¼¯ÖÐÔÚÅ·ÖÞ¼¸¸ö¹ú¼Ò£¬µ«¼øÓÚÆäMaaSƽ̨µÄÈ«ÇòÓ°ÏìÁ¦£¬Î´À´ÓпÉÄÜÀ©Õ¹µ½ÆäËûµØÇø¡£


https://www.bleepingcomputer.com/news/security/new-octo-android-malware-version-impersonates-nordvpn-google-chrome/