Nitrogenαװ³É PuTTY »ò FileZilla °²ÅÅBlackCat
Ðû²¼Ê±¼ä 2024-04-114ÔÂ9ÈÕ£¬£¬£¬×î³õµÄÈëÇÖÊÇ´Óͨ¹ý Google ËÑË÷ÏÔʾµÄ¶ñÒâ¹ã¸æ×îÏȵġ£¡£¡£ÎÒÃÇÊӲ쵽Á˼¸¸ö²î±ðµÄ¹ã¸æ¿Í»§ÕÊ»§£¬£¬£¬ÕâЩÕÊ»§¶¼±¨¸æ¸øÁ˹ȸ衣¡£¡£ÕâЩÓÕ¶üÊÇ IT ÖÎÀíÔ±³£ÓõÄÊÊÓóÌÐò£¬£¬£¬ÀýÈç PuTTY ºÍ FileZilla¡£¡£¡£Nitrogen ÍþвÐÐΪÕß°²ÅŵĶñÒâ¹ã¸æ»ù´¡ÉèʩʹÓÃÎ±×°Ò³Ãæ£¬£¬£¬¸ÃÒ³Ãæ¿ÉÒÔÖØ¶¨Ïòµ½ÓÕ¶üÍøÕ¾»òÎÛÃûÕÑÖøµÄ Rick Astley ÊÓÆµ¡£¡£¡£ÈôÊǻÉÐδÎäÆ÷»¯»ò¶ñÒâЧÀÍÆ÷¼ì²âµ½ÎÞЧÁ÷Á¿£¨»úеÈË¡¢ÅÀ³æµÈ£©£¬£¬£¬Ôò¿ÉÒÔ¼¤»îµ½ÓÕ¶üÒ³ÃæµÄÖØ¶¨Ïò¡£¡£¡£¸Ã¶ñÒâ¹ã¸æÁ´µÄ×îºóÒ»²½°üÀ¨ÏÂÔØ²¢ÔËÐжñÒâÈí¼þÓÐÓøºÔØ¡£¡£¡£Nitrogen ʹÓÃÒ»ÖÖ³ÆÎª DLL ÅÔ¼ÓÔØµÄÊÖÒÕ£¬£¬£¬Í¨¹ý¸ÃÊÖÒÕ£¬£¬£¬Õýµ±ÇÒ¾ÓÉÊðÃûµÄ¿ÉÖ´ÐÐÎļþ»áÆô¶¯ DLL¡£¡£¡£ÔÚ±¾ÀýÖУ¬£¬£¬setup.exe£¨À´×Ô Python Software Foundation£©²àÔØpython311.dll (Nitrogen)¡£¡£¡£
https://www.malwarebytes.com/blog/threat-intelligence/2024/04/active-nitrogen-campaign-delivered-via-malicious-ads-for-putty-filezilla
2. ΢ÈíÐÞ¸´ÁË Windows Á½¸öÒѾ±»Ê¹ÓõÄÁãÈÕÎó²î
4ÔÂ9ÈÕ£¬£¬£¬Î¢ÈíÔÚ 2024 Äê 4 ÔµIJ¹¶¡ÐÇÆÚ¶þʱ´úÐÞ¸´ÁËÁ½¸ö±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î£¬£¬£¬Ö»¹Ü¸Ã¹«Ë¾×î³õδÄܶÔËüÃǾÙÐбê¼Ç¡£¡£¡£µÚÒ»¸öÎó²î±»¸ú×ÙΪCVE-2024-26234£¬£¬£¬±»ÐÎòΪÊðÀíÇý¶¯³ÌÐòÓÕÆÎó²î£¬£¬£¬Ö¼ÔÚ¸ú×٠ʹÓÃÓÐÓÃµÄ Microsoft Ó²¼þ¿¯ÐÐÉÌÖ¤ÊéÊðÃûµÄ¶ñÒâÇý¶¯³ÌÐò£¬£¬£¬¸Ã¶ñÒâÎļþ±»¡°Catalog Thales¡±±ê¼ÇΪ¡°Catalog Authentication Client Service¡±£¬£¬£¬¿ÉÄÜÊÇÊÔͼð³ä Thales Group¡£¡£¡£µÚ¶þ¸öÁãÈÕÎó²î±»×·×ÙΪCVE-2024-29988£¬£¬£¬±»ÐÎòΪÓɱ£»£»£»£»£»¤»úÖÆ¹ÊÕÏÈõµãµ¼ÖµÄSmartScreenÌáÐÑÇå¾²¹¦Ð§ÈƹýÎó²î¡£¡£¡£CVE-2024-29988 ÊÇ CVE-2024-21412 ȱÏݵÄÈÆ¹ýÒªÁ죬£¬£¬ÓÉÇ÷ÊÆ¿Æ¼¼ÁãÈÕÍýÏëµÄ Peter Girnus ÒÔ¼° Google ÍþвÆÊÎöС×é Dmitrij Lenz ºÍ Vlad Stolyarov ±¨¸æ¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-two-windows-zero-days-exploited-in-malware-attacks/
3. Áè¼Ý9.1Íǫ̀ LG ÖÇÄܵçÊÓÈÝÒ×Êܵ½ºÚ¿Í¹¥»÷
4ÔÂ9ÈÕ£¬£¬£¬Bitdefender Ñо¿Ö°Ô±ÔÚÖÇÄܵçÊÓÉÏÔËÐÐµÄ LG webOS Öз¢Ã÷Á˶à¸öÎó²î£¬£¬£¬ÕâЩÎó²î¿É±»ÓÃÀ´ÈƹýÊÚȨ²¢»ñµÃ×°±¸µÄ root »á¼ûȨÏÞ¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄÎó²îÓ°Ïì LG µçÊÓÉÏÔËÐÐµÄ WebOS °æ±¾ 4 ÖÁ 7¡£¡£¡£WebOS ÔÚ¶Ë¿Ú 3000/3001 (HTTP/HTTPS/WSS) ÉÏÔËÐÐÒ»ÏîЧÀÍ£¬£¬£¬LG ThinkQ ÖÇÄÜÊÖ»úÓ¦ÓóÌÐòʹÓøÃЧÀÍÀ´¿ØÖƵçÊÓ¡£¡£¡£ÒªÉèÖøÃÓ¦ÓóÌÐò£¬£¬£¬Óû§±ØÐèÔÚµçÊÓÆÁÄ»ÉÏÊäÈë PIN Âë¡£¡£¡£ÕÊ»§´¦Öóͷ£³ÌÐòÖеĹýʧʹ¹¥»÷Õß¿ÉÒÔÍêÈ«Ìø¹ý PIN ÑéÖ¤²¢½¨ÉèÌØÈ¨Óû§ÉèÖÃÎļþ¡£¡£¡£Ö»¹Ü¸ÃÒ×Êܹ¥»÷µÄЧÀͽöÓÃÓÚ LAN »á¼û£¬£¬£¬µ«Í¨¹ýÅÌÎÊ Shodan£¬£¬£¬ËûÃÇ·¢Ã÷ÁËÁè¼Ý 91000 ¸ö½«¸Ã ЧÀÍ̻¶µ½»¥ÁªÍøµÄ×°±¸¡£¡£¡£´Ëʱ£¬£¬£¬Ì»Â¶µÄ×°±¸ÊýÄ¿ïÔÌÖÁ88000¸ö¡£¡£¡£´ó´ó¶¼ÃæÏò»¥ÁªÍøµÄ×°±¸Î»ÓÚº«¹ú¡¢ÃÀ¹ú¡¢ÈðµäºÍ·ÒÀ¼µÈ¡£¡£¡£
https://securityaffairs.com/161651/hacking/lg-smart-tvs-vulnerable.html
4. GHC-SCW³ÆÀÕË÷Èí¼þÍÅ»ïÇÔÈ¡ÁËÆä53ÍòÈ˵Ŀµ½¡Êý¾Ý
4ÔÂ9ÈÕ£¬£¬£¬Íþ˹¿µÐÇÖÝÖÐÄϲ¿·ÇÓªÀûÐÔÒ½ÁÆÐ§ÀÍÌṩÉÌ Group Health Cooperative (GHC-SCW) Åû¶£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïÓÚ 1 Ô·ÝÇÖÈëÆäÍøÂ磬£¬£¬ÇÔÈ¡Á˰üÀ¨Áè¼Ý 50 ÍòÈ˵ÄСÎÒ˽¼ÒºÍÒ½ÁÆÐÅÏ¢µÄÎļþ¡£¡£¡£È»¶ø£¬£¬£¬¹¥»÷ÕßÎÞ·¨¼ÓÃÜÊÜѬȾµÄ×°±¸£¬£¬£¬ÕâʹµÃ GHC-SCW ÔÚÍâ²¿ÍøÂçÊÂÎñÏìӦר¼ÒµÄ×ÊÖúϱ£»£»£»£»£»¤Æäϵͳ£¬£¬£¬²¢ÔÚ¸ôÀëÕâЩװ±¸ÒÔ×èÖ¹Îó²îºó½«Æä»Ö¸´ÔÚÏß¡£¡£¡£Ò»Ô·ÝÀÕË÷Èí¼þ¹¥»÷ʱ´ú±»µÁµÄ¿µ½¡Êý¾Ý°üÀ¨ÊÜÓ°ÏìСÎÒ˽¼ÒµÄÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢³öÉúºÍ/»òéæÃüÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢»áÔ±ºÅÂëÒÔ¼°Ò½Áưü¹ÜºÍ/»òÒ½ÁƽòÌùºÅÂë¡£¡£¡£Ö»¹ÜûÓÐÌṩÊÜÓ°ÏìÈËÊýµÄÏêϸÊý×Ö£¬£¬£¬µ«ÓëÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿¹²ÏíµÄÆäËûÐÅÏ¢ÏÔʾ£¬£¬£¬Êý¾Ýй¶ӰÏìÁË 533809 ÈË¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ghc-scw-ransomware-gang-stole-health-data-of-533-000-people/
5. BatBadBut Rust Îó²îʹ Windows ÏµÍ³ÃæÁÙ¹¥»÷
4ÔÂ10ÈÕ£¬£¬£¬Rust ±ê×¼¿âÖеÄÒ»¸öÒªº¦Çå¾²Îó²î¿ÉÄܻᱻʹÓÃÀ´Õë¶Ô Windows Óû§²¢ÌᳫÏÂÁî×¢Èë¹¥»÷¡£¡£¡£¸ÃÎó²îµÄ±àºÅΪCVE-2024-24576£¬£¬£¬CVSS ÆÀ·ÖΪ 10.0£¬£¬£¬Åú×¢ÑÏÖØË®Æ½×î¸ß¡£¡£¡£Ò²¾ÍÊÇ˵£¬£¬£¬Ëü½öÓ°ÏìÔÚ Windows ÉÏʹÓò»ÊÜÐÅÈεIJÎÊýŲÓÃÅú´¦Öóͷ£ÎļþµÄ³¡¾°¡£¡£¡£Rust Çå¾²ÏìÓ¦ÊÂÇé×éÔÚ 2024 Äê 4 Ô 9 ÈÕÐû²¼µÄͨ¸æÖÐÌåÏÖ£ºÔÚ Windows ÉÏʹÓà Command API ŲÓÃÅú´¦Öóͷ£Îļþ£¨´øÓÐ bat ºÍ cmd À©Õ¹Ãû£©Ê±£¬£¬£¬Rust ±ê×¼¿âûÓÐ׼ȷתÒå²ÎÊý¡£¡£¡£Äܹ»¿ØÖÆ×ª´ï¸øÌìÉúÀú³ÌµÄ²ÎÊýµÄ¹¥»÷Õß¿ÉÒÔͨ¹ýÈÆ¹ýתÒåÀ´Ö´ÐÐí§Òâ shell ÏÂÁî¡£¡£¡£¸ÃȱÏÝÓ°Ïì 1.77.2 ֮ǰµÄËùÓÐ Rust °æ±¾¡£¡£¡£
https://thehackernews.com/2024/04/critical-batbadbut-rust-vulnerability.html
6. Medusa ÍÅ»ï³Æ¶ÔµÂ¿ËÈøË¹ÖÝijÕþ¸®»ú¹¹µÄ¹¥»÷ÈÏÕæ
4ÔÂ9ÈÕ£¬£¬£¬ËþÀ¼ÌØÏØÆÀ¹ÀÇø£¨Tarrant County Appraisal District£©ÈÏÕæÈ·¶¨ÎÖ˹±¤µØÇøÓÃÓÚ˰ÊÕÄ¿µÄµÄ·¿µØ²ú£¬£¬£¬Á½ÖÜǰÏò Recorded Future News ֤ʵ£¬£¬£¬¸ÃÏØÊÇÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õß¡£¡£¡£ÖÜÒ»£¬£¬£¬Medusa ÍøÂç·¸·¨ÍÅ»ïÉù³Æ¶ÔÕâÆðÊÂÎñÈÏÕæ£¬£¬£¬²¢Íþв³Æ£¬£¬£¬ÈôÊDz»Ö§¸¶ 10 ÍòÃÀÔªµÄÊê½ð£¬£¬£¬ËûÃǽ«ÔÚÁùÌìÄÚ¹ûÕæ½ü 218 GB µÄÊý¾Ý¡£¡£¡£ÏعÙԱûÓлØÓ¦ÓйØÊÇ·ñÖ§¸¶Êê½ðµÄÖÃÆÀÇëÇ󣬣¬£¬µ«ËûÃÇÓÚ 4 Ô 3 ÈÕÐû²¼ÖÒÑԳƣ¬£¬£¬ºÚ¿Í¹ûÕæÁËÔ¼ 300 È˵ÄÊý¾Ý¡£¡£¡£¸Ã×éÖ¯ÓÚ 2023 ÄêÊ״ηºÆð£¬£¬£¬ÆäÊܺ¦ÕßÃûµ¥Ñ¸ËÙÀ©´ó¡£¡£¡£ÃÀ¶ÅɯÒò¶Ô·áÌïºÍ¼ÓÄôóÁ½¼Ò×î´óÒøÐеĹ¥»÷¶ø³ÉΪͷÌõÐÂÎÅ¡£¡£¡£
https://therecord.media/tarrant-county-texas-ransomware-attack-medusa


¾©¹«Íø°²±¸11010802024551ºÅ