MicroliseÔâÍøÂç¹¥»÷£¬ÖÂÀÎÓü³µºÍ¿ìµÝ³µÁ¾×·×Ùϵͳ̱»¾

Ðû²¼Ê±¼ä 2024-11-08

1. MicroliseÔâÍøÂç¹¥»÷£¬ÖÂÀÎÓü³µºÍ¿ìµÝ³µÁ¾×·×Ùϵͳ̱»¾


11ÔÂ7ÈÕ£¬MicroliseÊÇÒ»¼ÒΪ³µ¶ÓÔËÓªÉÌÌṩ³µÁ¾×·×Ù½â¾ö¼Æ»®µÄ¹«Ë¾£¬½üÆÚÔâÓöÁËÍøÂç¹¥»÷£¬µ¼ÖÂÆäÀÎÓü³µºÍ¿ìµÝ³µÁ¾µÄ×·×ÙϵͳºÍ¾¯±¨ÏµÍ³±»½ûÓ᣸ù«Ë¾ÔÚ10ÔÂ31ÈÕ֪ͨÂ׶Ø֤ȯÉúÒâËùÆäÍøÂçÉϱ¬·¢ÁË¡°Î´¾­ÊÚȨµÄÔ˶¯¡±£¬²¢Ô¼ÇëÁËÍⲿÍøÂçÇ徲ר¼Ò¾ÙÐÐÊÓ²ìºÍ»Ö¸´ÊÂÇé¡£×èÖ¹11ÔÂ6ÈÕ£¬MicroliseÌåÏÖÒÑÔÚ¿ØÖƺÍɨ³ýÍøÂçÍþв·½ÃæÈ¡µÃʵÖÊÐÔÏ£Íû£¬²¢»Ö¸´ÁËËùÓзþÎñ£¬Ô¤¼ÆÏÂÖÜÄ©½«ÖÜȫͶÈëÔËÓª¡£´Ë´Î¹¥»÷δË𺦿ͻ§ÏµÍ³Êý¾Ý£¬µ«²¿·ÖÔ±¹¤Êý¾ÝÊܵ½Ó°Ï죬ÊÜÓ°ÏìСÎÒ˽¼Ò½«Æ¾Ö¤¹«Ë¾î¿ÏµÒåÎñ»ñµÃ֪ͨ£¬²¢¼û¸æÏà¹Ø²¿·Ö¡£ÊÜÓ°ÏìµÄ¿Í»§°üÀ¨Ó¢¹úÕþ¸®³Ð°üÉÌSercoºÍ¿ìµÝ¹«Ë¾DHL£¬ÆäÖÐSercoÔÚÏ®»÷Ó°Ïì·¢Ã÷Ç°µÄ¼¸ÌìÄÚ£¬²¿·ÖÇô·¸»¤ËÍ·þÎñȱ·¦Î»Öøú×ÙºÍÇå¾²°ü¹Ü£¬¶øDHLµÄ²¿·Ö³µ¶ÓҲȱ·¦×·×Ù¹¦Ð§¡£Microliseδ͸¶ÍøÂç¹¥»÷ÀàÐͼ°ÊÜÓ°Ïì¿Í»§µÄÏêϸÐÅÏ¢¡£


https://www.securityweek.com/cyberattack-on-microlise-disables-tracking-in-prison-vans-courier-vehicles/


2. CISAÖÒÑÔ£ºPalo Alto Networks Expedition±£´æÉí·ÝÑéÖ¤Îó²îÔâ¹¥»÷


11ÔÂ7ÈÕ£¬CISA¿ËÈÕ·¢³öÖÒÑÔ£¬Ö¸³ö¹¥»÷ÕßÕýÔÚʹÓÃPalo Alto Networks ExpeditionÖеÄÑÏÖØÉí·ÝÑéÖ¤Îó²î¡£ExpeditionÊÇÒ»ÖÖǨá㹤¾ß£¬ÓÃÓÚ½«·À»ðǽÉèÖôÓCheckpoint¡¢CiscoµÈ¹©Ó¦ÉÌת»»ÎªPAN-OS¡£¸ÃÎó²î£¨CVE-2024-5910£©ÒÑÔÚ7Ô»ñµÃÐÞ¸´£¬µ«ÍþвÕßÈÔÄÜÔ¶³ÌʹÓÃËüÖØÖÃ̻¶ÔÚ»¥ÁªÍøÉϵÄExpedition·þÎñÆ÷ÉϵÄÓ¦ÓóÌÐòÖÎÀíԱƾ֤¡£CISAÖ¸³ö£¬´ËÎó²îÔÊÐí¹¥»÷Õß½ÓÊÜExpeditionÖÎÀíÔ±ÕÊ»§£¬²¢¿ÉÄÜ»á¼ûÉñÃØÉèÖá¢Æ¾Ö¤¼°ÆäËûÊý¾Ý¡£Ö»¹ÜÍøÂçÇå¾²»ú¹¹Î´Ìṩ¸ü¶à¹¥»÷ϸ½Ú£¬µ«Horizon3.aiÎó²îÑо¿Ô±Zach HanleyÐû²¼ÁËÒ»¸ö¿´·¨ÑéÖ¤Îó²î£¬¿ÉÍŽáÁíÒ»¸öÒÑÐÞ²¹µÄÏÂÁî×¢ÈëÎó²î£¨CVE-2024-9464£©£¬ÔÚÒ×Êܹ¥»÷µÄ·þÎñÆ÷ÉÏʵÏÖδ¾­Éí·ÝÑéÖ¤µÄí§ÒâÏÂÁîÖ´ÐС£Palo Alto Networks½¨ÒéÖÎÀíÔ±ÏÞÖÆExpeditionµÄÍøÂç»á¼û£¬²¢ÔÚÉý¼¶µ½Àο¿°æ±¾ºóÂÖ»»ËùÓÐÓû§Ãû¡¢ÃÜÂëºÍAPIÃÜÔ¿¡£CISAÒѽ«¸ÃÎó²îÌí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖУ¬ÒªÇóÃÀ¹úÁª°î»ú¹¹ÔÚÈýÖÜÄÚ£¨¼´11ÔÂ28ÈÕÇ°£©±£»¤ÆäÍøÂçÉϵÄÒ×Êܹ¥»÷·þÎñÆ÷¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-palo-alto-networks-bug-exploited-in-attacks/


3. Androxgh0stÓëMozi½©Ê¬ÍøÂ缯³É£¬ÍþвȫÇòWebºÍIoT×°±¸Çå¾²


11ÔÂ7ÈÕ£¬CloudSEK±¨¸æÖ¸³ö£¬Androxgh0st½©Ê¬ÍøÂçÒÑÓëMozi½©Ê¬ÍøÂ缯³É£¬Ê¹ÓÃWebÓ¦ÓóÌÐòºÍIoT×°±¸ÖеĶàÖÖÎó²î¾ÙÐй¥»÷¡£×Ô2024Äê1ÔÂÆð£¬Androxgh0stÕë¶ÔÍøÂç·þÎñÆ÷¾ÙÐÐˢкóÖØзºÆ𣬲¢¹²ÏíÁËMozi½©Ê¬ÍøÂçµÄ×é¼þ£¬´Ó¶øÄܹ»Ñ¬È¾¸ü¶àIoT×°±¸¡£Ñо¿Ö°Ô±·¢Ã÷£¬Androxgh0stµÄ¹¥»÷ÒªÁìÒÑÀ©Õ¹£¬Ãé×¼ÁË°üÀ¨Cisco ASA¡¢Atlassian JIRA¡¢PHP¿ò¼Ü¡¢Metabase¡¢Apache Web·þÎñÆ÷ºÍ¶àÖÖÎïÁªÍø×°±¸ÔÚÄڵĶà¸öÎó²î¡£Í¨¹ýÕûºÏMoziµÄ¹¦Ð§£¬Androxgh0stÄܹ»Ê¹ÓÃÉèÖùýʧµÄ·ÓÉÆ÷ºÍ×°±¸£¬ÔÚÈ«Çò¹æÄ£ÄÚѬȾװ±¸¡£±ðµÄ£¬¸Ã½©Ê¬ÍøÂ绹Õë¶Ô¶à¸ö¹ú¼ÒºÍµØÇøµÄ×°±¸¾ÙÐй¥»÷£¬µÂ¹úλ¾ÓÊÜѬȾװ±¸ÊýÄ¿°ñÊס£×éÖ¯Ó¦Á¬Ã¦ÐÞ²¹Ïà¹ØÎó²î£¬¼à¿ØÍøÂçÁ÷Á¿£¬²¢ÆÊÎöÈÕÖ¾ÒÔ²éÕÒÈëÇÖ¼£Ïó£¬ÒÔ±£»¤ÏµÍ³ÃâÊÜÕâÖÖÒ»Ö±ÑݱäµÄÍþв¡£


https://hackread.com/androxgh0st-botnet-integrate-mozi-iot-vulnerabilities/


4. ³¯ÏʺڿÍʹÓá°Òþ²ØΣº¦¡±¶ñÒâÈí¼þ¹¥»÷¼ÓÃÜÇ®±ÒÆóÒµ


11ÔÂ7ÈÕ£¬³¯ÏÊÕþ¸®Ö§³ÖµÄAPT×éÖ¯BlueNoroffÕýÔÚʹÓÃÒ»ÖÖÃûΪ¡°Òþ²ØΣº¦¡±µÄÐÂÐͶñÒâÈí¼þ¹¥»÷¼ÓÃÜÇ®±ÒÆóÒµ¡£¸Ã¹¥»÷ͨ¹ýÈ«ÐÄÖÆ×÷µÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬ÓÕʹÊܺ¦Õßµã»÷¶ñÒâÁ´½Ó£¬ÏÂÔØαװ³ÉPDFÔĶÁÆ÷µÄ¶ñÒâMacÓ¦ÓóÌÐò¡£Ò»µ©Ö´ÐУ¬¸ÃÓ¦ÓóÌÐò»áÉñÃØÏÂÔز¢Ö´ÐжñÒâ¶þ½øÖÆÎļþ£¬×°ÖúóÃŲ¢ÍøÂçϵͳÃô¸ÐÐÅÏ¢£¬ÓëÔ¶³Ì·þÎñÆ÷ͨѶ£¬ÎüÊÕ²¢Ö´ÐÐÏÂÁΪÁËÈ·¼á³¤ÆÚÐÔ£¬¹¥»÷Õß»¹ÐÞ¸ÄÁËZshÉèÖÃÎļþ£¬Ê¹ºóÃÅ¿ÉÒÔÔÚϵͳÆô¶¯Ê±×Ô¶¯Ö´ÐС£Ñо¿Ö°Ô±ÒÔΪ£¬´Ë´Î¹¥»÷Ô˶¯ÓëBlueNoroffÓйØÁª£¬ÒòÆäÊÖÒÕÓëBlueNoroffÒÑÍùµÄ¹¥»÷Ô˶¯ÀàËÆ£¬ÇÒʹÓÃÁËÓëÆäÏà¹ØµÄ¶ñÒâÈí¼þµÄÓû§ÊðÀí×Ö·û´®£¬²¢Ê¹Óÿª·¢ÕßÕÊ»§ÈÃApple¹«Ö¤¶ñÒâÈí¼þ£¬´Ó¶øÈƹýÇå¾²²½·¥¡£¼øÓÚBlueNoroff¶à´ÎÒÔ¼ÓÃÜÇ®±ÒÉúÒâËù¡¢Î£º¦Í¶×ʹ«Ë¾ºÍÒøÐÐΪĿµÄ£¬ÐÐÒµÓ¦¼á³ÖСÐÄ¡£Óû§Ó¦×Ðϸ¼ì²éµç×ÓÓʼþµØµã£¬×èÖ¹µã»÷δ֪µç×ÓÓʼþÖеÄÁ´½Ó£¬ÓÈÆäÊÇÒªÇóÏÂÔØÓ¦ÓóÌÐò/PDFµÄÁ´½Ó£¬ÒÔÈ·±£×ÔÉíÇå¾²¡£


https://hackread.com/north-korean-hackers-crypto-fake-news-hidden-risk-malware/


5. °×ñºÚ¿ÍSean Kahler½ÒÆƲ¢ÖúÐÞEAÕË»§ÏµÍ³ÑÏÖØÎó²î


11ÔÂ6ÈÕ£¬ÓÎÏ·¿ª·¢Õß¼æÄæÏò¹¤³ÌʦSean Kahler·¢Ã÷²¢Ê¹ÓÃÁËÒ»¸öÓ°Ïìµç×ÓÒս磨EA£©ÕË»§ÏµÍ³µÄÑÏÖØÎó²î£¬²»·¨»ñÈ¡ÁËÁè¼Ý7ÒÚEAÓû§ÕË»§ÐÅÏ¢£¬°üÀ¨ÓÎϷͳ¼ÆÊý¾Ý¡£Ëûͨ¹ýÔÚÓÎÏ·¿ÉÖ´ÐÐÎļþÖÐÕÒµ½Ó²±àÂëƾ֤£¬»ñµÃÁËEA¿ª·¢Ö°Ô±²âÊÔÇéÐÎÖеÄÌØȨ»á¼ûÁîÅÆ£¬½ø¶ø·¢Ã÷ÁËÒ»¸ö̻¶µÄÄÚ²¿·þÎñAPI£¬¸ÃAPIÔÊÐíÐÞ¸ÄÍæ¼Ò×ÊÁÏ¡£KahlerʹÓôËÎó²î½«EAÕË»§×´Ì¬¸ü¸ÄΪ¡°ÒÑեȡ¡±£¬×èÖ¹Óû§µÇ¼ÓÎÏ·£¬²¢Äܽ«Steam»òXboxÕË»§Á´½Óµ½ÆäËûÓû§µÄEAÕË»§£¬ÎÞÐèÑéÖ¤»òÃÜÂë¼´¿ÉµÇ¼ÆäËûÕË»§¡£ËûÒâʶµ½ÕâÒ»Îó²îµÄÑÏÖØÐÔºó£¬ÓÚ2024Äê6ÔÂ16ÈÕÏòEAÈÏÕæÈεØÅû¶ÁËÎó²î£¬EAÈ·ÈÏÁËÎó²î²¢Ðû²¼ÁËÎå¸ö²¹¶¡¾ÙÐÐÐÞ¸´¡£È»¶ø£¬KahlerÖ¸³öEA»¨Á˽ϳ¤Ê±¼ä²ÅÐÞ¸´Îó²î£¬ÇÒÉÐδÆô¶¯Îó²îÉͽðÍýÏ룬ȱ·¦±¨¸æÎó²îµÄ¶¯Á¦¡£


https://cybernews.com/security/whitehat-gains-access-to-over-700-million-ea-accounts/


6. GodFather¶ñÒâÈí¼þÈ«ÇòÀ©ÕÅ£ºÕë¶Ô500¶à¸ö½ðÈÚÓ¦ÓÃ


11ÔÂ7ÈÕ£¬Cyble Ñо¿ÓëÇ鱨ʵÑéÊÒ (CRIL) ±¨¸æÖ¸³ö£¬GodFather ¶ñÒâÈí¼þµÄ¹æÄ£ÒÑÀ©´óÖÁÈ«Çò 500 ¶à¸öÒøÐкͼÓÃÜÇ®±ÒÓ¦ÓóÌÐò£¬½ÓÄÉÖØ´óÊÖÒÕÈç±¾»ú´úÂëʵÏÖºÍ×îµÍȨÏÞ£¬Ê¹Æä±ÈÒÔÇ°Ô½·¢ÄÑÒÔ×½ÃþºÍΣÏÕ¡£¸Ã¶ñÒâÈí¼þʹÓô¹ÂÚÍøÕ¾·Ö·¢Î±×°³ÉÕýµ±Ó¦ÓóÌÐòµÄ¶ñÒâ APK Îļþ£¬Ö¼ÔÚÇÔÈ¡ÒøÐÐƾ֤¡£Ëü»¹ÄÜʹÓà Android ×°±¸µÄ Accessibility ·þÎñÖ´ÐÐÖÖÖÖ¶ñÒ⹦Ч£¬Èç×ÔÏÂÊÖÊÆ¡¢ÓëÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷½¨ÉèÅþÁ¬ÒÔ¼°¼üÅ̼ͼ¡£Ò»µ©¼ì²âµ½Ä¿µÄÓ¦ÓóÌÐò£¬GodFather ¾Í»á¹Ø±ÕÕýµ±Ó¦ÓóÌÐò²¢¼ÓÔØÐéαµÇ¼ҳÃæÒÔÇÔȡƾ֤¡£±ðµÄ£¬ÆäµØÀíÁýÕÖ¹æÄ£Ò²ÔÚÀ©´ó£¬ÏÖÒÑÕë¶ÔÈÕ±¾¡¢Ð¼ÓÆ¡¢°¢Èû°Ý½®ºÍÏ£À°µÄÓû§¡£CRIL ×ܽá³Æ£¬ÒÀ¸½ÆäеÄ×Ô¶¯»¯²Ù×÷ºÍÔÚ¸ü¶à¹ú¼Ò/µØÇøÕë¶ÔÓ¦ÓóÌÐòµÄ¸üÆÕ±éÄ¿µÄ£¬GodFather ¶ñÒâÈí¼þ¶ÔÈ«ÇòÓû§×é³ÉÁËÔ½À´Ô½´óµÄΣº¦£¬Òò´Ë¼á³ÖСÐIJ¢ÔÚÒƶ¯×°±¸ÉϽÓÄÉÇ¿Ê¢µÄÇå¾²²½·¥ÖÁ¹ØÖ÷Òª¡£


https://securityonline.info/godfather-malware-now-targets-500-banking-and-crypto-apps