Start-Rite¶ùͯЬÖÆÔìÉÌÔÙ´ÎÔâÓö¿Í»§Ö§¸¶ÐÅϢй¶ÊÂÎñ
Ðû²¼Ê±¼ä 2024-11-1811ÔÂ14ÈÕ£¬¶ùͯЬÖÆÔìÉÌStart-Rite¿ËÈÕÔâÓöÁËÉæ¼°¿Í»§Ö§¸¶¿¨ÏêϸÐÅÏ¢µÄÑÏÖØÇå¾²ÊÂÎñ£¬ÕâÊǸù«Ë¾ÔÚÒÑÍù°ËÄêÖеڶþ´Î±¬·¢´ËÀàÖØ´óʧÎ󡣾ݷ¢Ë͸ø¿Í»§µÄ֪ͨ³Æ£¬ÈëÇÖÊÂÎñ±¬·¢ÔÚ10ÔÂ14ÈÕÖÁ11ÔÂ7ÈÕÖ®¼ä£¬¿ÉÄÜ鶵ÄÐÅÏ¢°üÀ¨Ö§¸¶¿¨ÉϵĿͻ§ÐÕÃû¡¢¿¨×¢²áµØµã¡¢¿¨ºÅ¡¢ÓÐÓÃÆںͿ¨ÑéÖ¤Öµ(CVV)¡£Start-Rite½¨Òé¿Í»§ÁªÏµÒøÐлòÐÅÓÿ¨ÌṩÉÌÍ£Óò¢Ìæ»»ÐÅÓÿ¨£¬²¢¼á³ÖСÐļìºË¶ÔÕ˵¥¡£¸Ã¹«Ë¾ÒÑÏòÓ¢¹úÊý¾Ý±£»¤î¿Ïµ»ú¹¹ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©±¨¸æ´ËÊ£¬²¢ÌåÏÖ½«È«Á¦ÅäºÏ¾¯·½ÊÂÇé¡£Ö»¹ÜStart-RiteÏò¡¶The Register¡·Ö¤ÊµÁ˴˴ι¥»÷£¬µ«ÉÐδ¹ûÕæÈÏ¿É´ËÊ¡£Ó¦ÓÃÇ徲ר¼ÒÌåÏÖ£¬´ËÊÂÎñÒý·¢Á˶ÔStart-RiteÇ徲̬ÊƵÄÖÊÒÉ£¬ÒÔ¼°Êý¾ÝÔõÑù±»ÇÔÈ¡µÄÎÊÌâ¡£ICO½²»°ÈËÔÚ±¨µÀºó͸¶£¬Start-RiteÒÑÏòÆäת´ïÁËÕâÒ»ÊÂÎñ£¬²¢ÕýÔÚÆÀ¹ÀËùÌṩµÄÐÅÏ¢¡£
https://www.theregister.com/2024/11/14/smartrite_breach/
2. CISAÖÒÑÔ£ºPalo Alto Networks Expedition¶à¸öÎó²î±»Æð¾¢Ê¹ÓÃ
11ÔÂ15ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÖÒÑÔ£¬Ö¸³öÓ°ÏìPalo Alto Networks ExpeditionµÄÁ½¸öÐÂÎó²îCVE-2024-9463ºÍCVE-2024-9465ÕýÔÚ±»Æð¾¢Ê¹Óá£ÕâÁ½¸öÎó²î»®·ÖÉæ¼°ÏÂÁî×¢ÈëºÍSQL×¢È룬CVSSÆÀ·Ö»®·Ö¸ß´ï9.9ºÍ9.3£¬Èô±»ÀÖ³ÉʹÓ㬹¥»÷Õß¿ÉÔÚExpeditionǨá㹤¾ßÖÐÒÔrootÉí·ÝÖ´ÐÐí§ÒâÏÂÁî»òй¶Êý¾Ý¿âÄÚÈÝ£¬½ø¶ø¿ÉÄܵ¼ÖÂPAN-OS·À»ðǽµÄÓû§Ãû¡¢ÃÜÂë¡¢ÉèÖúÍAPIÃÜԿй¶£¬»òÔÚÒ×Êܹ¥»÷µÄϵͳÉϽ¨ÉèºÍ¶ÁÈ¡Îļþ¡£CISAÒѽ«ÕâЩÎó²îÄÉÈëÒÑÖª±»Ê¹ÓõÄÎó²îĿ¼£¬²¢ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö»ú¹¹ÔÚ2024Äê12ÔÂ5ÈÕÇ°Ó¦ÓÃÐëÒª¸üС£Palo Alto NetworksÔÚ2024Äê10ÔÂ9ÈÕÐû²¼µÄÇå¾²¸üÐÂÖÐÐÞ¸´ÁËÕâЩÎó²î£¬²¢È·ÈÏÊÕµ½CISA±¨¸æ³ÆÕâЩÎó²îÕýÔÚ±»Ê¹ÓᣱðµÄ£¬Ò»ÖÜÇ°CISA»¹×ª´ïÁËÁíÒ»¸öÓ°ÏìExpeditionµÄÑÏÖØÎó²îCVE-2024-5910ÕýÔÚ±»Ê¹Ó㬸ÃÎó²î¿Éµ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄÔ¶³ÌÏÂÁîÖ´ÐУ¬Õë¶Ô»¥ÁªÍøÉÏ̻¶µÄ·À»ðǽÖÎÀí½Ó¿Ú¡£
https://thehackernews.com/2024/11/cisa-flags-critical-palo-alto-network.html
3. RecraftÄ£×Ó´æÇå¾²Îó²î£ºÎÞÒâÖÐй¶Ãô¸ÐϵͳָÁîÒý·¢¹Ø×¢
11ÔÂ14ÈÕ£¬¾ÝCyber Security News±¨µÀ£¬Ñо¿Ö°Ô±Ôڸ߼¶È˹¤ÖÇÄÜͼÏñÌìÉúÄ£×ÓÖз¢Ã÷ÁËDZÔÚµÄÇå¾²Îó²î£¬ÌØÊâÊÇÔÚRecraftÄ£×ÓÖУ¬¸ÃÄ£×ÓÔÚÎı¾µ½Í¼Æ¬ÅÅÐаñÉÏ´¦ÓÚÁìÏÈְλ¡£Recraft½ÓÄÉÁ½¼¶¼Ü¹¹£¬ÍŽáÁË´óÐÍÓïÑÔÄ£×ÓºÍÀ©É¢Ä£×Ó£¬Äܹ»´¦Öóͷ£ÖØ´óÅÌÎʲ¢ÌìÉú¸ü׼ȷ¡¢¸üÄܸÐÖªÉÏÏÂÎĵÄͼÏñ¡£È»¶ø£¬Ñо¿Ö°Ô±·¢Ã÷£¬Í¨¹ýijЩÌض¨ÌáÐÑ£¬¿ÉÒÔÓÕʹRecraftй¶²¿·ÖÄÚ²¿Ö¸Á°üÀ¨ÏµÍ³ÌáÐÑƬ¶ÏºÍÏêϸָµ¼´óÄ£×ÓÐÐΪµÄ˵Ã÷¡£ÕâЩ鶵ÄÖ¸Áî°üÀ¨ÐÎòÆø¸Å¡¢ÎïÌåºÍÈËÎïµÄÏêϸÐÎò¡¢ÐÎòÐÔ¾ä×Ó¡¢¹¹Í¼Ï¸½ÚÒÔ¼°×èֹʹÓõĴÊÓïµÈ¡£ÕâÖÖÎÞÒâÖÐй¶ϵͳÌáÐѵÄÐÐΪÒý·¢ÁËÈËÃǶÔÈ˹¤ÖÇÄÜÄ£×ÓÇå¾²ÐÔºÍÒþ˽ÐԵĵ£ÐÄ¡£ÈôÊǶñÒâÐÐΪÕßÄܹ»ÌáÈ¡ÕâЩÃô¸ÐÖ¸ÁËûÃÇ¿ÉÄÜ»áʹÓÃϵͳ¡¢ÈƹýÇå¾²²½·¥»òÉîÈëÏàʶרÓеÄÈ˹¤ÖÇÄÜÊÖÒÕ¡£Òò´Ë£¬ÕâÒ»ÊÂÎñΪAI¿ª·¢Ö°Ô±ºÍÑо¿Ö°Ô±ÇÃÏìÁ˾¯ÖÓ£¬ÌáÐÑËûÃDZØÐèÈ·±£ÕâЩϵͳµÄÇå¾²ÐÔºÍÍêÕûÐÔ£¬Ëæ×ÅAIÊÖÒÕµÄһֱǰ½øºÍ¸üÉîÈëµØÈÚÈëÎÒÃÇÉúÑĵĸ÷¸ö·½Ã棬ÕâÒ»µã±äµÃÓÈΪÖ÷Òª¡£
https://cybersecuritynews.com/researchers-warn-of-ai-image-generators/#google_vignette
4. ð³äAI±à¼Æ÷Íƶ¯ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þѬȾWindowsºÍmacOS
11ÔÂ16ÈÕ£¬½üÆÚð³äAIͼÏñºÍÊÓƵÌìÉúÆ÷³ÉΪÍøÂç¹¥»÷µÄÐÂÊֶΣ¬Í¨¹ýʹÓÃLumma Stealer£¨Õë¶ÔWindows£©ºÍAMOS£¨Õë¶ÔmacOS£©ÕâÁ½ÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬Ñ¬È¾Óû§×°±¸²¢ÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°ü¡¢Æ¾Ö¤¡¢ÃÜÂë¡¢ÐÅÓÿ¨ÐÅÏ¢¼°ä¯ÀÀÀúÊ·µÈÃô¸ÐÊý¾Ý¡£ÕâЩ±»ÇÔÈ¡µÄÊý¾Ý»á±»´ò°ü·¢Ëͻع¥»÷Õߣ¬ÓÃÓÚ½øÒ»²½¹¥»÷»òÔÚºÚÊÐÉϳöÊÛ¡£ÍøÂçÇå¾²Ñо¿Ô±·¢Ã÷£¬¹¥»÷Õß½¨ÉèÁËð³äEditPro AI±à¼Æ÷µÄÐéαÍøÕ¾£¬Í¨¹ýËÑË÷Ч¹ûºÍ¹ã¸æÍƹãÉî¶ÈαÔìµÄÕþÖÎÊÓƵ£¬ÓÕµ¼Óû§ÏÂÔØαװ³ÉEditProAIÓ¦ÓóÌÐòµÄ¶ñÒâÈí¼þ¡£WindowsºÍmacOSÓû§»®·Ö»áÊÕµ½ÃûΪ¡°Edit-ProAI-Setup-newest_release.exe¡±ºÍ¡°EditProAi_v.4.36.dmg¡±µÄÎļþ¡£ÕâЩÎļþÓÉÇÔÈ¡µÄ´úÂëÊðÃûÖ¤ÊéÊðÃû£¬²¢Í¨¹ýÌض¨Ãæ°å·¢Ëͱ»µÁÊý¾Ý¡£ÍøÂçÇ徲ר¼Ò½¨Ò飬ÈôÔøÏÂÔظóÌÐò£¬Ó¦Á¬Ã¦ÖØÖÃËùÓÐÃÜÂë²¢ÆôÓöàÒòËØÉí·ÝÑéÖ¤¡£
https://www.bleepingcomputer.com/news/security/fake-ai-video-generators-infect-windows-macos-with-infostealers/
5. ÃÀµäÖÊ´û¿î»ú¹¹ÔâÊý¾Ýй¶£¬17Íò¿Í»§SSNµÈÐÅÏ¢±»µÁ
11ÔÂ15ÈÕ£¬ÃÀ¹úÉçÇøµäÖÊ´û¿îÊÜÀí¹«Ë¾£¨ÒÔAnnieMac Home MortgageÃûÒåÔËÓª£©ÔâÓöÊý¾Ýй¶ÊÂÎñ£¬Ò»ÃûÈëÇÖÕßÔÚ8ÔÂ21ÈÕÖÁ23ÈÕʱ´úÈëÇÖÆäϵͳ£¬ÇÔÈ¡ÁË171,000Ãû¿Í»§µÄСÎÒ˽¼ÒÊý¾Ý£¬°üÀ¨ÐÕÃûºÍÉç»áÇå¾²ºÅÂë(SSN)¡£Ö»¹ÜÏÖÔÚûÓÐÖ¤¾ÝÅú×¢ÕâЩÊý¾ÝÒÑÔÚ°µÍøÉϱ»ÀÄÓ㬵«AnnieMacÒѽÓÄÉÌØÊâÇå¾²²½·¥±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢£¬²¢ÏòÊÜÓ°Ïì¿Í»§Ìṩ12¸öÔµÄÐÅÓüà¿ØºÍÉí·Ý͵ÇÔ±£»¤¡£¸Ã»ú¹¹Ìṩ¶àÖÖµäÖÊ´û¿î²úÆ·£¬°üÀ¨Õë¶ÔµÍÊÕÈë»òÐÅÓÃÆÀ¼¶½Ï²î¹º·¿ÕßµÄÍýÏ룬ÈçOneUPÍýÏëÔÊÐíÂò¼Ò½öÓÃ1%µÄÊ׸¶¹º·¿¡£Óë¸üÆÕ±éµÄÊý¾Ýй¶Ïà±È£¬´Ë´Î鶵ÄÊý¾ÝÀàÐÍÏà¶Ô½ÏÉÙ£¬µ«SSNµÄй¶ÈÔ±£´æΣº¦£¬¿ÉÄÜË𺦿ͻ§µÄÐÅÓÃÆÀ·Ö£¬ÌØÊâÊÇÄÇЩÐÅÓÃÆÀ·ÖÔÀ´¾ÍÒ»Ñùƽ³£µÄ¿Í»§¡£
https://www.theregister.com/2024/11/15/anniemac_data_breach/
6. GeoVision±¨·Ï×°±¸ÁãÈÕÎó²îÔâʹÓ㬽©Ê¬ÍøÂçÈëÇÖΣº¦¾çÔö
11ÔÂ15ÈÕ£¬¶ñÒâÈí¼þ½©Ê¬ÍøÂçÕýÔÚʹÓÃGeoVision±¨·Ï×°±¸ÖеĸßΣÁãÈÕÎó²îCVE-2024-11120¾ÙÐÐÈëÇÖ£¬²¢ÕÐļÕâЩװ±¸¾ÙÐпÉÄܵÄDDoS¹¥»÷»ò¼ÓÃÜÍÚ¾ò¡£¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚ×°±¸ÉÏÖ´ÐÐí§ÒâϵͳÏÂÁÒÑÓ°Ïì¶à¿î²»ÔÙÊܹ©Ó¦ÉÌÖ§³ÖµÄGeoVision×°±¸Ðͺš£¾ÝÍþв¼à¿Øƽ̨Shadowserver Foundation±¨¸æ£¬Ô¼ÓÐ17,000̨GeoVision×°±¸ÔÚÏß̻¶£¬Ò×Êܹ¥»÷£¬ÆäÖдó´ó¶¼Î»ÓÚÃÀ¹ú¡£¸Ã½©Ê¬ÍøÂçÒÉΪMiraiµÄ±äÖÖ¡£ÈôÊÇ·¢Ã÷×°±¸¹ýÈÈ¡¢ÔËÐлºÂý¡¢ÎÞÏìÓ¦»òÉèÖñ»¸ü¸ÄµÈ¼£Ï󣬽¨ÒéÖØÖÃ×°±¸¡¢¸ü¸ÄÃÜÂë¡¢¹Ø±ÕÔ¶³Ì»á¼û²¢ÖÃÓÚ·À»ðǽºó¡£ÀíÏëÇéÐÎÏ£¬Ó¦Ìæ»»ÕâЩװ±¸£¬Èô²»¿ÉÄÜ£¬ÔòÓ¦¸ôÀë²¢Ç×½ü¼à¿Ø¡£
https://www.bleepingcomputer.com/news/security/botnet-exploits-geovision-zero-day-to-install-mirai-malware/