¶íÂÞ˹ÒÉËÆʹÓÃNTLMÐÂÎó²î¶ÔÎÚ¿ËÀ¼·¢¶¯ÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2024-11-151. ¶íÂÞ˹ÒÉËÆʹÓÃNTLMÐÂÎó²î¶ÔÎÚ¿ËÀ¼·¢¶¯ÍøÂç¹¥»÷
11ÔÂ14ÈÕ£¬¿ËÈÕÒ»¸öÃûΪCVE-2024-43451µÄÐÂÇå¾²Îó²îÓ°ÏìÁËWindows NT LANÖÎÀíÆ÷£¨NTLM£©£¬¸ÃÎó²î±»ÒÉËÆÓë¶íÂÞ˹ÓйصÄÐÐΪÕßʹÓÃΪÁãÈÕÎó²î£¬¶ÔÎÚ¿ËÀ¼·¢¶¯ÍøÂç¹¥»÷¡£´ËÎó²î±»ÃüÃûΪNTLM¹þϣй¶ÓÕÆÎó²î£¬CVSSÆÀ·ÖΪ6.5£¬¿É±»ÓÃÀ´ÇÔÈ¡Óû§µÄNTLMv2¹þÏ£¡£Î¢ÈíÒÑʵʱÐÞ²¹Á˸ÃÎó²î£¬²¢Ö¸³öÓû§Óë¶ñÒâÎļþ¾ÙÐÐ×îС½»»¥¶¼¿ÉÄÜ´¥·¢Îó²î¡£ÒÔÉ«ÁÐÍøÂçÇå¾²¹«Ë¾ClearSky·¢Ã÷£¬¸ÃÎó²îÒѱ»ÓÃÓÚÈö²¥¿ªÔ´Spark RAT¶ñÒâÈí¼þµÄ¹¥»÷Á´ÖУ¬¶ñÒâÎļþÍйÜÔÚÎÚ¿ËÀ¼Õþ¸®¹Ù·½ÍøÕ¾ÉÏ¡£¹¥»÷Á´Éæ¼°·¢ËÍÍøÂç´¹ÂÚµç×ÓÓʼþ£¬ÌáÐÑÊÕ¼þÈ˵ã»÷ÏÝÚåURLÏÂÔØ°üÀ¨¶ñÒâ.URLÎļþµÄZIP´æµµ¡£µ±Êܺ¦ÕßÓëURLÎļþ½»»¥Ê±£¬¾Í»á´¥·¢Îó²î£¬µ¼ÖÂÏÂÔØÆäËûÓÐÓøºÔØ£¬°üÀ¨Spark RAT¡£ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±·´Ó¦Ð¡×é(CERT-UA)½«´ËÔ˶¯Óë¿ÉÄܵĶíÂÞ˹ÍþвÐÐΪÕßUAC-0194ÁªÏµÆðÀ´£¬²¢ÖÒÑԳƣ¬ÆóÒµÓëÔ¶³ÌÒøÐÐϵͳÐ×÷µÄ»á¼Æ´¦ÓÚ¸ßΣº¦Çø£¬×ʽð¿ÉÄÜÔÚ¶Ìʱ¼äÄÚ±»µÁ¡£
https://thehackernews.com/2024/11/russian-hackers-exploit-new-ntlm-flaw.html
2. ¹þÂí˹¹ØÁªÍøÂç×éÖ¯WIRTEÕë¶ÔÒÔÉ«ÁÐʵÑéÆÆËðÐÔ¹¥»÷
11ÔÂ13ÈÕ£¬¾ÝThe Hack News±¨µÀ£¬Óë¹þÂí˹ÓйØÁªµÄÍøÂç¹¥»÷Õß½üÆÚרÃÅÕë¶ÔÒÔÉ«ÁÐʵÌå¾ÙÐÐÆÆËðÐÔ¹¥»÷¡£Check PointµÄÆÊÎöÖ¸³ö£¬ÕâЩ¹¥»÷ÓëÒ»¸öÃûΪWIRTEµÄ×éÖ¯Óйأ¬¸Ã×éÖ¯×Ô2018Äê8ÔÂÒÔÀ´Ò»Ö±»îÔ¾ÓÚÖж«µØÇø£¬Õë¶ÔÆÕ±éʵÌå·¢¶¯¹¥»÷¡£WIRTEʹÓÃÖж«µÄµØÔµÕþÖÎÖ÷ҪʱÊƺÍÕ½ÂÒ£¬ÖÆ×÷¶ñÒâRARÎĵµ°²ÅÅHavocºóÆÚ¿ª·¢¿ò¼Ü£¬»òʹÓÃÀàËƵÄRARÎĵµ°²ÅÅIronWindÏÂÔØÆ÷¡£ÕâЩѬȾÐòÁÐͨ¹ýÈö²¥´øÓÐÓÕÆÐÔµÄPDFÎĵµ£¬Ê¹ÓÃÕýµ±µÄ¿ÉÖ´ÐÐÎļþ²àÔØ´øÓжñÒâÈí¼þµÄDLL¡£ÔÚ2024Äê10ÔÂÕë¶ÔÒÔÉ«ÁÐÒ½ÔººÍÊÐÕþÕþ¸®µÈ¶à¸ö×éÖ¯µÄÍøÂç´¹ÂÚÔ˶¯ÖУ¬ÉõÖÁ·ºÆðÁËð³äÍøÂçÇå¾²¹«Ë¾ESETÔÚÒÔÉ«ÁÐÏàÖúÉÌ·¢³öµÄ´¹ÂÚµç×ÓÓʼþ£¬ÆäÖаüÀ¨ÁËа汾µÄSameCoin Wiper£¬¸Ã°æ±¾³ýÁËÁýÕÖÎļþÍ⣬»¹»áÐÞ¸ÄÊܺ¦ÕßϵͳÅä¾°ÏÔʾ¹þÂí˹¾üÊ·ÖÖ§Al-Qassam BrigadesµÄͼÏñ¡£¾Ý³Æ£¬¸Ã¹¥»÷×éÖ¯µÄWindows¼ÓÔسÌÐòÑù±¾Ê±¼ä´Á±»¸ü¸ÄΪ¹þÂí˹¶ÔÒÔÉ«Áз¢¶¯Í»È»¹¥ÊƵÄÈÕÆÚ£¬¶ø³õʼ»á¼ûÇ°ÑÔÔòÊÇð³äÒÔÉ«Áйú¼ÒÍøÂç¾ÖµÄµç×ÓÓʼþ¡£
https://thehackernews.com/2024/11/hamas-affiliated-wirte-employs-samecoin.html
3. Glove Stealer¶ñÒâÈí¼þ£º¿ÉÈƹýChrome App-Bound¼ÓÃÜÇÔÈ¡Cookie
11ÔÂ14ÈÕ£¬Glove Stealer ÊÇÒ»¿îеĶñÒâÈí¼þ£¬Äܹ»Èƹý Google Chrome µÄ App-Bound ¼ÓÃÜ£¬ÇÔÈ¡ä¯ÀÀÆ÷ cookie¡£¸Ã¶ñÒâÈí¼þÓÉ Gen Digital Çå¾²Ñо¿Ö°Ô±ÔÚÊÓ²ìÍøÂç´¹ÂÚÔ˶¯Ê±Ê״η¢Ã÷£¬ËûÃÇÒÔΪËüÏà¶Ô¼òÆÓ£¬¿ÉÄÜ´¦ÓÚÔçÆÚ¿ª·¢½×¶Î¡£Glove Stealer ʹÓÃÉç»á¹¤³ÌÕ½ÂÔÓÕÆDZÔÚÊܺ¦Õß×°Ö㬿ÉÒÔ´Ó Firefox ºÍ»ùÓÚ Chromium µÄä¯ÀÀÆ÷£¨Èç Chrome¡¢Edge µÈ£©ÖÐÌáÈ¡ cookie£¬ÒÔ¼°ÇÔÈ¡ä¯ÀÀÆ÷À©Õ¹³ÌÐòÖеļÓÃÜÇ®±ÒÇ®°ü¡¢2FA »á»°ÁîÅÆ¡¢ÃÜÂëÊý¾ÝµÈÃô¸ÐÐÅÏ¢¡£±ðµÄ£¬Ëü»¹ÄÜ´Ó 280 ¸öä¯ÀÀÆ÷À©Õ¹ºÍ 80 ¶à¸öÍâµØÓ¦ÓóÌÐòÖÐÇÔÈ¡Êý¾Ý¡£ÎªÁËÈƹý Chrome µÄ App-Bound ¼ÓÃÜ£¬Glove Stealer ʹÓÃÁËÒ»¸öÖ§³ÖÄ£¿é£¬Ê¹Óà Chrome µÄ IElevator Windows ·þÎñÀ´½âÃܺͼìË÷¼ÓÃÜÃÜÔ¿£¬µ«ÐèÒªÏÈ»ñÊÊÍâµØÖÎÀíԱȨÏÞ¡£Ö»¹ÜÕâÖÖÒªÁìÔÚÊÖÒÕÉÏÏà¶Ô»ù´¡£¬µ«¶à¸öÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ²Ù×÷ÒѾÄܹ»ÈƹýеÄÇå¾²¹¦Ð§£¬ÒÔÇÔÈ¡Ï¢ÕùÃÜ Google Chrome cookie¡£×Թȸè 7 Ô·ÝʵÑé App-Bound ¼ÓÃÜÒÔÀ´£¬¹¥»÷´ÎÊý²¢Î´ïÔÌ£¬·´¶øÓÐËùÔöÌí£¬Í¨¹ýÖÖÖÖ·½·¨Ãé׼DZÔÚÊܺ¦Õß¡£
https://www.bleepingcomputer.com/news/security/new-glove-infostealer-malware-bypasses-google-chromes-cookie-encryption/
4. ÈðÊ¿ÍøÂç»ú¹¹¾¯Ê¾£º¼ÙÆøÏóÓʼþÈö²¥¶ñÒâÈí¼þ͵ȡÃô¸ÐÐÅÏ¢
11ÔÂ15ÈÕ£¬ÈðÊ¿Áª°îÍøÂçÇå¾²¾Ö£¨OFCS£©13ÈÕ·¢³öÖÒÑÔ£¬³Æ¸Ã¹úÆøÏó»ú¹¹µÄ¡°¼ÙÐżþ¡±±»ÓÃÀ´Èö²¥¶ñÒâÈí¼þ¡£ÕâЩÓʼþÉù³ÆÌṩһ¿îÐÂÌìÆøÓ¦ÓóÌÐòMeteoSwiss£¬µ«°üÀ¨Ò»¸ö¶þάÂ룬»áÖض¨Ïòµ½Ú²ÆÕß¿ª·¢µÄ¶ñÒâÓ¦ÓóÌÐò¡£É¨Ãè¶þάÂëºó£¬ÊÖ»úÓû§»áÏÂÔØÃûΪ¡°Coper¡±ºÍ¡°Octo2¡±µÄ¶ñÒâÈí¼þ£¬¸Ã³ÌÐòÊÔͼÇÔÈ¡°üÀ¨µç×ÓÒøÐÐÓ¦ÓóÌÐòÔÚÄÚµÄ383¶à¸öÒƶ¯Ó¦ÓóÌÐòµÄµÇ¼ÏêϸÐÅÏ¢¡£ËäȻʹÓÃÏÖʵÌìϵÄÓÕ¶üÀ´Ñ¬È¾¶ñÒâÈí¼þµÄÇéÐβ¢²»³£¼û£¬µ«²¢·ÇÎÅËùδÎÅ£¬Î¢Èí´ËÇ°Ò²ÔøÔâÓöÀàËÆÊÂÎñ¡£OFCSûÓÐ͸¶ÊÜÓ°ÏìµÄÈËÊý£¬µ«ÌåÏÖð³äÓ¦ÓóÌÐòÄ£ÄâÁËÕæÕýµÄ¡°Alertswiss¡±Ó¦ÓóÌÐò£¬½öÓ°Ï찲׿ÊÖ»ú¡£½¨Òé×°ÖÃÁËð³äÓ¦ÓóÌÐòµÄÓû§½«×°±¸»Ö¸´³ö³§ÉèÖ㬲¢±¨¸æ¸øOFCS¡£¸Ã»ú¹¹ÒѾ×îÏÈʵÑé±£»¤²½·¥¡£
https://therecord.media/malware-delivered-by-mail-swiss-cyber-agency
5. ÐÙÑÀÀû¹ú·À²É¹º»ú¹¹Ôâ¹ú¼ÊºÚ¿Í×éÖ¯¹¥»÷
11ÔÂ15ÈÕ£¬ÐÙÑÀÀû¹ú·À²É¹º»ú¹¹£¨VB¨¹£©¿ËÈÕÔâµ½ÃûΪINC Ransomware»òINC RansomµÄ¹ú¼ÊÍøÂç·¸·¨×éÖ¯µÄ¹¥»÷¡£¸Ã×éÖ¯Éù³Æ¿ÉÒÔ»á¼ûVB¨¹µÄÊý¾Ý£¬²¢ÔÚ°µÍøÃÅ»§ÍøÕ¾ÉÏÐû²¼ÁËʾÀý½Øͼ¡£ÐÙÑÀÀû¹ú·À²¿¾Ü¾ø͸¶¿ÉÄܵÄÐÅϢй¶ÇéÐΣ¬µ«È·ÈÏÊÓ²ìÕýÔÚ¾ÙÐÐÖУ¬²¢Ç¿µ÷VB¨¹²»´æ´¢Ãô¸ÐµÄ¾üÊÂÊý¾Ý¡£È»¶ø£¬×ÜÀíά¿ËÍС¤Å·¶û°àµÄÄ»Áų¤½«´Ë´ÎÏ®»÷¹é×ïÓÚ³ðÊÓµÄÍâ¹ú·Ç¹ú¼ÒºÚ¿Í×éÖ¯£¬Ö¸³ö¿ÉÄܱ»»á¼ûµÄ×îÃô¸ÐÊý¾Ý°üÀ¨ÓйؾüʲɹºµÄÍýÏëºÍÊý¾Ý¡£¾Ý±¨µÀ£¬ºÚ¿ÍÈëÇÖÁ˸ûú¹¹µÄ·þÎñÆ÷£¬ÏÂÔز¢¼ÓÃÜÁËËùÓÐÎļþ£¬²¢Ðû²¼ÁË°üÀ¨ÐÙÑÀÀû¾ü¶Ó¿ÕÖкͽµØÄÜÁ¦Êý¾ÝµÄÎļþ½Øͼ£¬ÒÔ¼°±êÓС°·Ç¹ûÕ桱µÄÎļþ£¬²¢Ë÷Òª500ÍòÃÀÔªÊê½ð¡£ÐÙÑÀÀû¹ÙԱδ¾ÍÊÇ·ñÓëºÚ¿Í̸ÅнÒÏþ̸ÂÛ¡£
https://therecord.media/hungary-defense-procurement-agency-hacked
6. Microsoft Power PagesÉèÖùýʧÖÂ700ÍòÌõ¼Í¼̻¶
11ÔÂ14ÈÕ£¬Ñо¿Ö°Ô±·¢Ã÷£¬Microsoft Power PagesÕâÒ»µÍ´úÂ빤¾ß±£´æ¶à¸öÉèÖùýʧʵÏÖµÄÎÊÌ⣬¿ÉÄܵ¼ÖÂÉñÃØÊý¾Ý±»ÎÞÒâ»á¼û¡£Power Pages±»ÆÕ±éÓ¦ÓÃÓÚÕþ¸®¡¢½ÌÓýºÍ˽ÈË×éÖ¯µÈÁìÓò£¬µ«ÔÚһЩװÖÃÖУ¬ÉèÖùýʧµ¼ÖÂÔ¼700ÍòÌõ¼Í¼̻¶¡£ÎÊÌâÔ´ÓÚÓû§¶ÔÉèÖõÄÃ÷ȷȱ·¦£¬¶ø·Ç΢Èí²úÆ·×Ô¼ºµÄÎÊÌ⡣΢ÈíÔÚDZÔÚÉèÖÃÎÊÌâʱ»á·¢³öÖÒÑÔ£¬µ«ÎÞ·¨È·±£Óû§×÷³ö·´Ó¦¡£ÏÖ´úÊÖÒÕʹµÃÃÅ»§¹¹½¨Ïà¶ÔÈÝÒ×£¬µ«Çå¾²ÐÔºÍά»¤ÈÔÈ»Öش󣬵¼ÖÂʵÑéºÍά»¤Ö®¼ä²»Æ¥Å䣬Áè¼ÝÏà¹Ø¹«Ë¾ÄÜÁ¦¹æÄ£µÄ³õʼ»òзºÆðµÄ¹ýʧÉèÖ᣿ª·¢ÍŶӺÍÇå¾²ÍŶÓÖ®¼äµÄÁæØê¹ØϵҲ¼Ó¾çÁËÕâÒ»ÎÊÌâ¡£AppOmni·¢Ã÷µÄÎÊÌâÒÑÏòÊÜÓ°Ï칫˾±¨¸æ²¢»ñµÃÐÞ¸´£¬µ«Ò»Á¬±£´æµÄ¹ýʧÉèÖÃÎÊÌâÈÔÐè½â¾ö¡£ÏÖ´úµÍ´úÂëÊÖÒÕʹµÃȱ·¦×¨ÒµÖªÊ¶µÄÓû§Äܹ»¿ª·¢ÖØ´óµÄ½â¾ö¼Æ»®£¬Òò´ËÎÊÌâ¿ÉÄÜ»áÒ»Á¬±£´æ¡£AppOmni½¨ÒéʹÓÃÄܹ»¼ì²â¹ýʧÉèÖõÄϵͳ¾ÙÐÐÒ»Á¬¼à¿Ø¡£
https://www.securityweek.com/low-code-high-risk-millions-of-records-exposed-via-misconfigured-microsoft-power-pages/