¹È¸èÐÞ¸´ÆäÔÆÆ½Ì¨ÖпÉÒþ²Ø¶ñÒâÈí¼þµÄGhostTokenÎó²î
Ðû²¼Ê±¼ä 2023-04-241¡¢¹È¸èÐÞ¸´ÆäÔÆÆ½Ì¨ÖпÉÒþ²Ø¶ñÒâÈí¼þµÄGhostTokenÎó²î
¾ÝýÌå4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¹È¸èÔÆÆ½Ì¨(GCP)Öб£´æÒ»¸öGhostTokenÎó²î£¬£¬£¬£¬£¬£¬¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâÓ¦Óøü¸ÄΪ²»¿É¼ûÇÒ²»¿Éɾ³ý¡£¡£¡£Astrix SecurityÓÚ2022Äê6Ô²¢Ïò¹È¸è±¨¸æÁËÕâÒ»Îó²î£¬£¬£¬£¬£¬£¬¹È¸èÔÚ2023Äê4ÔÂÐû²¼Á˲¹¶¡¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿É±»¹¥»÷ÕßÓÃÀ´Í¨¹ý½«ÒÑÊÚȨµÄµÚÈý·½Ó¦ÓÃת»»Îª¶ñÒâľÂíÓ¦Ó㬣¬£¬£¬£¬£¬´Ó¶ø»ñµÃÄ¿µÄGoogleÕÊ»§µÄÓÀÊÀÇÒ²»¿ÉÒÆ³ýµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬È»ºóй¶ĿµÄµÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£Õâ¿ÉÄܰüÀ¨´æ´¢ÔÚGmail¡¢Drive¡¢DocsºÍPhotosµÈ¹È¸èÓ¦ÓÃÖеÄÊý¾Ý¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ghosttoken-gcp-flaw-let-attackers-backdoor-google-accounts/
2¡¢SymantecÅû¶Õë¶ÔÎ÷Å·»ù´¡ÉèÊ©µÄX_Trader¹©Ó¦Á´¹¥»÷
4ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬SymantecÅû¶ÁËÕë¶ÔÎ÷Å·Òªº¦»ù´¡ÉèÊ©×éÖ¯µÄX_Trader¹©Ó¦Á´¹¥»÷¡£¡£¡£µ¼ÖÂÉϸöÔÂ3CXÇå¾²ÊÂÎñµÄX_TraderÈí¼þ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬»¹Ó°ÏìÁËλÓÚÃÀ¹úºÍÅ·ÖÞµÄÄÜÔ´ÁìÓòµÄÁ½¸öÒªº¦»ù´¡ÉèÊ©×éÖ¯¡£¡£¡£¹¥»÷ÕßʹÓÃľÂí»¯X_Trader×°ÖóÌÐò£¬£¬£¬£¬£¬£¬½«VEILEDSIGNAL¶à½×¶ÎÄ£¿£¿£¿£¿é»¯ºóÃÅ×°Öõ½Ä¿µÄϵͳÉÏ¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔÖ´ÐжñÒâshellcode»ò½«Í¨Ñ¶Ä£¿£¿£¿£¿é×¢ÈëÔÚ±»¹¥»÷ϵͳÉÏÔËÐеÄChrome¡¢Firefox»òEdgeÀú³Ì¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬ÉÐÓÐÁ½¸öÉæ¼°½ðÈÚÉúÒâµÄ×éÖ¯Ò²Ôâµ½¹¥»÷¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain
3¡¢Ç°CFPBÔ±¹¤½«Áè¼Ý25ÍòÏûºÄÕßµÄÐÅϢת·¢µ½Ð¡ÎÒ˽¼ÒÓÊÏä
¾Ý4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÃÀ¹úÏûºÄÕß½ðÈÚ±£»£»£»£»£»£»¤¾Ö(CFPB)Åû¶ÁËÒ»ÆðÉæ¼°256000ÈËÐÅÏ¢µÄй¶ÊÂÎñ¡£¡£¡£CFPBµÄÔ±¹¤Í¸Â¶£¬£¬£¬£¬£¬£¬ËûÃÇ·¢Ã÷һǰԱ¹¤ÓÃ14·â²î±ðµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬½«Ô¼Äª25.6ÍòÃûÏûºÄÕߵļͼºÍԼĪ50¼Ò»ú¹¹µÄî¿ÏµÐÅϢת·¢µ½Ð¡ÎÒ˽¼Òµç×ÓÓʼþÕË»§¡£¡£¡£ÕâÃûÔ±¹¤Òѱ»ÆÈÁîɾ³ýÕâЩµç×ÓÓʼþ²¢Ìṩ֤¾Ý֤ʵËüÃÇÒѱ»É¾³ý£¬£¬£¬£¬£¬£¬µ«¹Ù·½Ö¤ÊµÕâ¸ÃÔ±¹¤ÉÐδ×ñÊØ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã»ú¹¹ÈÔÔÚÊÓ²ì´ËÊÂÎñ¡£¡£¡£
https://www.infosecurity-magazine.com/news/cfpb-employee-sends-consumers-data/
4¡¢ESET·¢Ã÷¶þÊÖÊг¡Öдó×ÚÆóÒµ¼¶ÍøÂç×°±¸°üÀ¨Ãô¸ÐÐÅÏ¢
¾ÝýÌå4ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¶þÊÖÊг¡ÉÏµÄÆóÒµ¼¶ÍøÂç×°±¸°üÀ¨¿É±»ºÚ¿ÍÓÃÀ´ÈëÇÖÆóҵϵͳ»ò»ñÈ¡¿Í»§ÐÅÏ¢µÄÃô¸ÐÊý¾Ý¡£¡£¡£ESETÑо¿Ö°Ô±¹ºÖÃÁË18̨¶þÊÖ½¹µã·ÓÉÆ÷£¬£¬£¬£¬£¬£¬·¢Ã÷ÆäÖÐÒ»°ëÒÔÉÏÄÜÕý³£ÊÂÇéµÄ·ÓÉÆ÷ÈÔÈ»¿ÉÒÔ»á¼ûËùÓÐÉèÖÃÊý¾Ý¡£¡£¡£Ò»Ð©Â·ÓÉÆ÷±£´æÁ˿ͻ§ÐÅÏ¢ºÍÔÊÐíµÚÈý·½ÅþÁ¬µ½ÍøÂçµÄÊý¾Ý£¬£¬£¬£¬£¬£¬ÉõÖÁ°üÀ¨×÷Ϊ¿ÉÐÅ·½ÅþÁ¬µ½ÆäËûÍøÂçµÄƾ֤¡£¡£¡£Æ¾Ö¤Â·ÓÉÆ÷ÖÐϸ½Ú£¬£¬£¬£¬£¬£¬ÆäÖÐһЩ·ÓÉÆ÷´¦ÓÚÍйÜITÌṩÉ̵ÄÇéÐÎÖУ¬£¬£¬£¬£¬£¬ÉÐÓÐһ̨ÉõÖÁÊôÓÚMSSP¡£¡£¡£Ñо¿Ö°Ô±¹ØÓÚÕâÖÖÇéÐεĽ¨ÒéÊÇ£¬£¬£¬£¬£¬£¬ÕûÀíÉè±¹ØÁ¬ÄÃô¸ÐÊý¾Ý²¢½«Æä»Ö¸´µ½³ö³§Ä¬ÈÏ״̬¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-can-breach-networks-using-data-on-resold-corporate-routers/
5¡¢Unit 42³ÆÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÄ¿³ÊÉÏÉýÇ÷ÊÆ
Unit 42ÔÚ4ÔÂ20ÈÕ͸¶£¬£¬£¬£¬£¬£¬ÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÄ¿³ÊÉÏÉýÇ÷ÊÆ¡£¡£¡£´Ó2022Äê11Ôµ½2023Äê4ÔÂÉÏÑ®£¬£¬£¬£¬£¬£¬ÓëChatGPTÏà¹ØÓòµÄÿÔÂ×¢²áÁ¿ÔöÌíÁË910%£¬£¬£¬£¬£¬£¬Ïà¹ØÇÀ×¢ÓòÃûÔöÌíÁË17818%¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÌìÌìÓжà´ï118¸öÓëChatGPTÓйصĶñÒâURL±»¼ì²âµ½¡£¡£¡£Ñо¿·¢Ã÷¶à¸öÊÔͼð³äOpenAI¹Ù·½ÍøÕ¾µÄ´¹ÂÚURL¡£¡£¡£Í¨³££¬£¬£¬£¬£¬£¬¹¥»÷Õ߻ὨÉèÒ»¸öÓëChatGPT¹ÙÍøºÜÏñµÄÐéÎ±ÍøÕ¾£¬£¬£¬£¬£¬£¬È»ºóÓÕÆÓû§ÏÂÔØ¶ñÒâÈí¼þ»ò¹²ÏíÃô¸ÐÐÅÏ¢¡£¡£¡£
https://unit42.paloaltonetworks.com/chatgpt-scam-attacks-increasing/
6¡¢FortinetÐû²¼¹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄÆÊÎö±¨¸æ
4ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬FortinetÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄÆÊÎö±¨¸æ¡£¡£¡£¸Ã¹¤¾ßÓÉKodex¹«Ë¾¿ª·¢£¬£¬£¬£¬£¬£¬Éù³ÆÊÇÒ»¿î½ÌÓý¹¤¾ß¡£¡£¡£ÒÔÿÔÂ59ÃÀÔªµÄ¼ÛÇ®³öÊÛ£¬£¬£¬£¬£¬£¬¾ßÓÐÆß¸ö¹¥»÷Ä£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬°üÀ¨ÀÕË÷Èí¼þ¡¢Æ¾Ö¤ÇÔÈ¡ºÍWindows Defender¡£¡£¡£Ñо¿Åú×¢£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢µØ½«ÆäÓÃ×÷ÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£¡£¡£EvilExtractorµÄ¹¥»÷»î¶¯ÓÚ½ñÄê3ÔÂÏÔÖøÔöÌí£¬£¬£¬£¬£¬£¬Í¨¹ýαװ³ÉÕË»§È·ÈÏÇëÇóµÄ´¹ÂÚÓʼþ¾ÙÐзַ¢£¬£¬£¬£¬£¬£¬´ó´ó¶¼±»¹¥»÷Ä¿µÄλÓÚÅ·ÖÞºÍÃÀ¹ú¡£¡£¡£
https://www.fortinet.com/blog/threat-research/evil-extractor-all-in-one-stealer


¾©¹«Íø°²±¸11010802024551ºÅ