Microsoft Windows DWM ÁãÈÕÎó²î±»´ó¹æÄ£Ê¹ÓÃ
Ðû²¼Ê±¼ä 2024-05-165ÔÂ15ÈÕ£¬£¬£¬Î¢ÈíÐû²¼ÎåÔ²¹¶¡¸üУ¬£¬£¬×ܹ² 59 ¸ö CVE £¬£¬£¬ÖÁÉÙÓÐÒ»¸öÖÚËùÖÜÖªµÄÎó²îÒѱ»´ó¹æÄ£Ê¹Ó㬣¬£¬²¢ÇÒȷʵÒѾ±» QakBot ËùʹÓᣡ£¡£¡£¡£¡£±¾ÔÂÅû¶µÄȱÏÝÓ°ÏìÁËÅÌËã kahuna µÄÕû¸ö²úÆ·×éºÏ£¬£¬£¬°üÀ¨ Windows¡¢Office¡¢.NET Framework ºÍ Visual Studio£»£»£»£»£»£»Î¢Èí365£»£»£»£»£»£»µçÁ¦ÉÌÒµÖÇÄÜ£»£»£»£»£»£»DHCP ЧÀÍÆ÷£»£»£»£»£»£»Microsoft Edge£¨»ùÓÚ Chromium£©£»£»£»£»£»£»ºÍ Windows ÒÆ¶¯¿í´ø¡£¡£¡£¡£¡£¡£»£»£»£»£»£»ùÓÚ Chromium µÄ Edge ä¯ÀÀÆ÷Êܵ½ CVE-2024-4761 µÄÓ°Ï죬£¬£¬ÕâÊÇ Google ½ñÌìÐÞ²¹µÄÒ»¸ö×Ô¶¯Ê¹ÓÃµÄ Chrome ÁãÈÕÎó²î£¬£¬£¬ÕâÊÇÒ»¸öÑÏÖØµÄɳÏäÌÓÒݹýʧ£¬£¬£¬Ó¦Á¬Ã¦ÐÞ²¹¡£¡£¡£¡£¡£¡£
https://www.darkreading.com/vulnerabilities-threats/microsoft-windows-dwm-zero-day-mass-exploit
2. Î÷ÃÅ×Ó Ruggedcom Crossbow Öжà¸öí§Òâ´úÂëÖ´ÐÐÎó²î
5ÔÂ14ÈÕ£¬£¬£¬Î÷ÃÅ×Ó Ruggedcom Crossbow Öз¢Ã÷Á˶à¸öÎó²î£¬£¬£¬ÆäÖÐ×îÑÏÖØµÄÎó²î¿ÉÄÜÔÊÐíí§Òâ´úÂëÖ´ÐС£¡£¡£¡£¡£¡£Î÷ÃÅ×Ó Ruggedcom Crossbow »á¼ûÖÎÃ÷È·¾ö¼Æ»®Ö¼ÔÚΪ¹¤Òµ¿ØÖÆÏµÍ³Ìá¹©ÍøÂçÇå¾²ºÏ¹æÐÔ¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓÃÆäÖÐ×îÑÏÖØµÄÎó²î¿ÉÄÜ»áÔÊÐíÔÚµÇÈÎÃü»§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÓëÓû§¹ØÁªµÄȨÏÞ£¬£¬£¬¹¥»÷Õß¿ÉÒÔ×°ÖóÌÐò£»£»£»£»£»£»Éó²é¡¢¸ü¸Ä»òɾ³ýÊý¾Ý£»£»£»£»£»£»»ò½¨Éè¾ßÓÐÍêÈ«Óû§È¨ÏÞµÄÐÂÕÊ»§¡£¡£¡£¡£¡£¡£Óë¾ßÓÐÖÎÀíÓû§È¨ÏÞµÄÓû§Ïà±È£¬£¬£¬ÆäÕÊ»§ÉèÖÃΪÔÚϵͳÉÏÓµÓнÏÉÙÓû§È¨ÏÞµÄÓû§Êܵ½µÄÓ°Ïì¿ÉÄܸüС¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄϵͳ°üÀ¨Ruggedcom Crossbow 5.5 ֮ǰµÄ°æ±¾¡£¡£¡£¡£¡£¡£
https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-siemens-ruggedcom-crossbow-could-allow-for-arbitrary-code-execution_2024-055
3. ·ðÃÉÌØÖÝͨ¹ýÊý¾ÝÒþ˽·¨ÔÊÐíÏûºÄÕ߯ðËß¹«Ë¾
5ÔÂ14ÈÕ£¬£¬£¬·ðÃÉÌØÖÝÁ¢·¨»ú¹¹ÖÜÎåͨ¹ýÁ˸ùú×îǿʢµÄ×ÛºÏÊý¾ÝÒþ˽·¨Ö®Ò»£¬£¬£¬ÆäÖÐÔÊÐíСÎÒ˽¼ÒÆðËßÇÖÕ¼ÆäÒþ˽ȨµÄ¹«Ë¾¡ª¡ªÕâÊÇÏÖÓÐÀàËÆÖÝÖ´·¨ÖÐØ¨¹ÅδÓеĻ®¶¨¡£¡£¡£¡£¡£¡£¸Ã·¨°¸°üÀ¨Êý¾Ý×îС»¯ÒªÇ󣬣¬£¬Õ⼫´óµØÏÞÖÆÁ˹«Ë¾¿ÉÒÔÍøÂçºÍʹÓõÄСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬²¢Õ¥È¡¹«Ë¾³öÊÛÏûºÄÕßµÄÃô¸ÐÊý¾Ý£¬£¬£¬ÔÊÐíСÎÒ˽¼ÒÔÚÒÔΪÆóÒµÕâÑù×öʱÌáÆðËßËÏ¡£¡£¡£¡£¡£¡£Ë½ÈËËßËÏȨÔÊÐíСÎÒ˽¼ÒÒªÇóËûÃÇÒÔΪÇÖÕ¼ÆäȨÁ¦µÄ¹«Ë¾¼ç¸ºÔðÈΣ¬£¬£¬¶øÎÞÐèÒÀÀµ¹ú¼ÒÕþ¸®½ÓÄÉÐж¯¡£¡£¡£¡£¡£¡£ÒÁÀûŵÒÁÖÝÉúÎïʶ±ðÒþ˽·¨ÖаüÀ¨µÄÀàËÆÌõ¿îÒý·¢ÁËÒ»²¨Ö¸¿ØÆóÒµäÂÖ°µÄÕûÌåËßËÏ¡£¡£¡£¡£¡£¡£·ðÃÉÌØÖÝ·¨°¸µÄ˽ÈËËßËÏȨÐèÒªÔÚÁ½ÄêºóÖØÐÂÊÚȨ£¬£¬£¬²¢ÊÊÓÃÓÚ´¦Öóͷ£Áè¼Ý 100,000 ÌõÏûºÄÕ߼ͼµÄÈÎºÎÆóÒµ»òСÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£¸ÃÁ¢·¨»¹Öƶ©ÁËÑÏ¿áµÄ¹«ÃñȨÁ¦°ü¹Ü²½·¥ÒÔ±ÜÃâÆçÊÓ¡£¡£¡£¡£¡£¡£¼ÓÖÝǿʢµÄ×ÛºÏÊý¾ÝÒþ˽·¨»¹ÔÊÐíСÎÒ˽¼ÒÆðËßËûÃÇÒÔΪÇÖÕ¼ÆäȨÁ¦µÄÆóÒµ£¬£¬£¬µ«¸ÃÌõ¿î½öÊÊÓÃÓÚÊý¾Ýй¶£¬£¬£¬²»ÊÊÓÃÓÚÊý×ÖÒþ˽¡£¡£¡£¡£¡£¡£
https://therecord.media/vermont-passes-data-privacy-law?&web_view=true
4. Android ¶ñÒâÈí¼þð³ä WhatsApp µÈAPPÇÔÈ¡Êý¾Ý
5ÔÂ15ÈÕ£¬£¬£¬SonicWall Capture Labs ÍþвÑо¿ÍŶӱ¨¸æ³Æ£¬£¬£¬ÍþвÐÐΪÕßÕýÔÚʹÓöñÒâ Android Ó¦ÓóÌÐòÀ´Ã°³ä Google¡¢Instagram¡¢Snapchat¡¢WhatsApp ºÍ X µÈÊ¢ÐеÄÔÚÏßЧÀÍ¡£¡£¡£¡£¡£¡£ÕâЩӦÓóÌÐòÖ¼ÔÚ´ÓÒ×Êܹ¥»÷µÄ Android ÊÖ»úÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬°üÀ¨ÁªÏµÈË¡¢¶ÌÐÅ¡¢Í¨»°¼Í¼ºÍÃÜÂë¡£¡£¡£¡£¡£¡£ÕâЩӦÓóÌÐò¿´ÆðÀ´Õýµ±£¬£¬£¬ÓÉÓÚËüÃÇʹÓÃÊìϤµÄ»Õ±êºÍÃû³ÆÀ´ÓÕÆºÁÎÞ½äÐĵÄÓû§²¢Òþ²ØÔÚÖÚÄ¿î¥î¥Ö®Ï¡£¡£¡£¡£¡£¡£·¿ªÊ±£¬£¬£¬Ó¦ÓóÌÐòÇëÇó»á¼ûÁ½¸öȨÏÞ£ºAndroid Accessibility Service ºÍ×°±¸ÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¡£ÈôÊÇÊܺ¦ÕßÊÚÓèÕâЩȨÏÞ£¬£¬£¬Ó¦ÓóÌÐò¾Í¿ÉÒÔ»ñµÃ×°±¸µÄÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£È»ºó£¬£¬£¬¶ñÒâÓ¦ÓóÌÐòÓëºÚ¿Í¿ØÖÆµÄ C2 ЧÀÍÆ÷½¨ÉèÅþÁ¬£¬£¬£¬ÎüÊÕ¸½¼ÓÖ¸Áî¡£¡£¡£¡£¡£¡£Ëü¿ÉÒÔ¶ÁÈ¡ÐÂÎÅ¡¢Í¨»°¼Í¼¡¢»á¼û֪ͨÊý¾Ý¡¢·¢ËÍÐÂÎÅ¡¢×°ÖöñÒâÈí¼þÒÔ¼°·¿ª¶ñÒâÍøÕ¾ÒÔ¾ÙÐÐÍøÂç´¹ÂÚ¡£¡£¡£¡£¡£¡£
https://www.hackread.com/android-malware-whatsapp-instagram-snapchat-data/
5. Ebury½©Ê¬ÍøÂç¶ñÒâÈí¼þÒÑѬȾ40Íǫ̀LinuxЧÀÍÆ÷
5ÔÂ14ÈÕ£¬£¬£¬Ò»¸öÃûΪ¡°Ebury¡±µÄ¶ñÒâÈí¼þ½©Ê¬ÍøÂçÒÑѬȾÁ˽ü 400,000 ̨ Linux ЧÀÍÆ÷£¬£¬£¬×èÖ¹ 2023 Äêµ×£¬£¬£¬Ô¼ÓÐ 100,000 ̨ЧÀÍÆ÷ÈÔÊܵ½Íþв¡£¡£¡£¡£¡£¡£ESET Ñо¿Ö°Ô±Ê®¶àÄêÀ´Ò»Ö±ÔÚ¸ú×ÙÕâÖÖ³öÓÚ¾¼ÃÄîÍ·µÄ¶ñÒâÈí¼þ²Ù×÷£¬£¬£¬²¢ÔÚ 2014 ÄêºÍ 2017 ÄêÔÙ´ÎÖÒÑÔÓÐÓøºÔع¦Ð§µÄÖØ´ó¸üС£¡£¡£¡£¡£¡£ESET ×Ô 2009 ÄêÒÔÀ´Ò»Ö±¹Ø×¢µÄ Ebury ѬȾÇéÐΣ¬£¬£¬ÏÔʾѬȾÁ¿Ëæ×Åʱ¼äµÄÍÆÒÆ¶øÔöÌí¡£¡£¡£¡£¡£¡£×î½üµÄ Ebury ¹¥»÷Åú×¢£¬£¬£¬¹¥»÷ÍÅ»ïÇãÏòÓÚÆÆËðÍйÜÌṩÉÌ£¬£¬£¬²¢¶ÔÔÚÊÜѬȾÌṩÉÌÉÏ×âÓÃÐéÄâЧÀÍÆ÷µÄ¿Í»§¾ÙÐй©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£¡£×î³õµÄΣº¦ÊÇͨ¹ýƾ֤Ìî³ä¹¥»÷¾ÙÐе쬣¬£¬Ê¹ÓÃÇÔÈ¡µÄƾ֤µÇ¼ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£Ò»µ©Ð§ÀÍÆ÷Êܵ½Íþв£¬£¬£¬¶ñÒâÈí¼þ¾Í»á´Ówtmp ºÍ known_hosts ÎļþÖÐÇÔÈ¡ÈëÕ¾/´øÍâ SSH ÅþÁ¬ÁÐ±í£¬£¬£¬²¢ÇÔÈ¡ SSH Éí·ÝÑéÖ¤ÃÜÔ¿£¬£¬£¬È»ºóʹÓÃÕâЩÃÜԿʵÑéµÇ¼ÆäËûϵͳ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ebury-botnet-malware-infected-400-000-linux-servers-since-2009/
6. ºÚ¿ÍÀÄÓà GoTo ¾Û»á¹¤¾ß°²ÅÅ Remcos RAT
5ÔÂ14ÈÕ£¬£¬£¬ÔÚÒ»´ÎÖØ´óµÄÍøÂç¹¥»÷»î¶¯Öз¢Ã÷ºÚ¿ÍʹÓÃÔÚÏß¾Û»áÆ½Ì¨ GoToMeeting Èö²¥ÃûΪ Remcos µÄÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£¡£¡£ÕâÒ»ÁîÈËÕ𾪵ÄÉú³¤Í»ÏÔÁËÍøÂç·¸·¨·Ö×ÓʹÓÿÉÐÅÈí¼þÍ»ÆÆÇå¾²·ÀÓù²¢Î´¾ÊÚȨ»á¼ûÊܺ¦ÕßϵͳµÄÒ»Ö±ÑݱäµÄÕ½ÂÔ¡£¡£¡£¡£¡£¡£¹¥»÷»úÖÆÉæ¼°Ê¹Óà GoToMeeting£¨Ò»ÖÖ±»ÆóÒµÆÕ±éÓÃÓÚÐéÄâ¾Û»áµÄ¹¤¾ß£©×÷Ϊ Remcos RAT µÄÇþµÀ¡£¡£¡£¡£¡£¡£Remcos ÊÇÒ»ÖÖǿʢµÄ¶ñÒâÈí¼þ£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃËüÔ¶³Ì¿ØÖÆÊÜѬȾµÄÅÌËã»ú¡¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬ÉõÖÁ°²ÅÅÆäËû¶ñÒâ¸ºÔØ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÇÉÃîµØÔÚ¿´ËÆÕýµ±µÄ GoToMeeting ֪ͨÖÐαװÁË Remcos ÓÐÓøºÔØ¡£¡£¡£¡£¡£¡£ºÁÎÞ½äÐĵÄÓû§ÏàÐÅÕâЩ֪ͨÊÇÕæÊµµÄ£¬£¬£¬Òò´Ë±»ÓÕÆÔÚËûÃǵÄϵͳÉÏÖ´ÐжñÒâÈí¼þ¡£¡£¡£¡£¡£¡£Ò»µ©×°Ö㬣¬£¬Remcos ¾Í»áÊÚÓè¹¥»÷Õß¶ÔÊÜѬȾÅÌËã»úµÄÍêÈ«¿ØÖÆÈ¨£¬£¬£¬Ê¹ËûÃÇÄܹ»ÔÚ²»±»·¢Ã÷µÄÇéÐÎϾÙÐÐÌØ¹¤»î¶¯¡¢Êý¾Ý͵ÇԺͽøÒ»²½µÄ¶ñÒâ»î¶¯¡£¡£¡£¡£¡£¡£Remcos µÄÒþÃØÐÔºÍÖØ´óÐÔ£¬£¬£¬¼ÓÉÏ¶Ô GoToMeeting µÄÆÕ±éÐÅÈΣ¬£¬£¬Ê¹µÃÕâÖÖ¹¥»÷ÌØÊâÒõÏÕÇÒÄÑÒÔÓ¦¶Ô¡£¡£¡£¡£¡£¡£
https://gbhackers.com/hackers-abuse-goto-meeting-tool/


¾©¹«Íø°²±¸11010802024551ºÅ