Î÷ÑÅͼ¸ÛºÍÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡ÒÉÔâÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2024-08-26
1. Î÷ÑÅͼ¸ÛºÍÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡ÒÉÔâÍøÂç¹¥»÷


8ÔÂ25ÈÕ £¬£¬£¬£¬Î÷ÑÅͼ¸ÛÓëÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡Í¬Ê±ÔËÓª £¬£¬£¬£¬½üÆÚÔâÓöÁËÑÏÖØµÄÐÅϢϵͳÌôÕ½ £¬£¬£¬£¬ÒÉËÆÔâÓöÁËÍøÂç¹¥»÷¡£¡£¡£ÖÜÁùÇåÔç £¬£¬£¬£¬¿Ú°¶Ê×ÏÈͨ¹ýÉ罻ýÌåÆ½Ì¨×ª´ïÁËЧÀÍÖÐÖ¹µÄÇéÐÎ £¬£¬£¬£¬Ëæºó»ú³¡¹Ù·½È·ÈÏÔâÓöÁËϵͳÖÐÖ¹ £¬£¬£¬£¬²¢ÌåÏÖÕâ¿ÉÄÜÔ´ÓÚÒ»´ÎÍøÂç¹¥»÷¡£¡£¡£Ëæ×ÅÊÂ̬Éú³¤ÖÁÖÜÁùÍí¼ä £¬£¬£¬£¬»ú³¡·½ÃæÌåÏÖЧÀÍÖÐֹ״̬ÒÀ¾Éδ½â £¬£¬£¬£¬ÇÒÎÞ·¨Ã÷È·¸ø³ö»Ö¸´ÖÜȫЧÀ͵Äʱ¼ä±í¡£¡£¡£ÃæÁÙÕâһͻ·¢×´Ì¬ £¬£¬£¬£¬»ú³¡·½ÃæÆð¾¢Ó¦¶Ô £¬£¬£¬£¬½¨ÒéÓοÍʹÓú½¿Õ¹«Ë¾ÌṩµÄÊÖ»úÓ¦ÓóÌÐò°ìÀíµÇ»úÊÖÐø²¢´òÓ¡µÇ»úÅÆ¼°ÐÐÀî±êÇ© £¬£¬£¬£¬Í¬Ê±ÌáÐÑÂÿÍÌáǰµÖ´ï»ú³¡ÒÔÓ¦¶Ô¿ÉÄܵÄÑÓÎ󡣡£¡£¾ÝTechCrunchµÄÊÖÒÕÆÊÎö £¬£¬£¬£¬×èÖ¹ÖÜÈÕ̫ƽÑóʱ¼äÔ糿 £¬£¬£¬£¬Î÷ÑÅͼ¸Û¶ÔÍâЧÀ͵ÄÍøÂç»ù´¡ÉèÊ© £¬£¬£¬£¬ÓÈÆäÊÇÆä¹Ù·½ÍøÕ¾ £¬£¬£¬£¬ÈÔ´¦ÓÚ²»¿É»á¼ûµÄÀëÏß״̬ £¬£¬£¬£¬ÏÔʾ³ö´Ë´ÎÍøÂç¹¥»÷¶Ô¿Ú°¶¼°»ú³¡ÔËÓªÔì³ÉÁËÏÔÖøÓ°Ïì¡£¡£¡£


https://techcrunch.com/2024/08/25/the-port-of-seattle-and-sea-tac-airport-say-theyve-been-hit-by-possible-cyberattack/


2. PEAKLIGHT ¶ñÒâÈí¼þ£ºÒ»ÖÖÐÂÐÍÒþÃØÄÚ´æÍþв·ºÆð


8ÔÂ24ÈÕ £¬£¬£¬£¬MandiantµÄÍøÂçÇå¾²ÍÅ¶Ó½ÒÆÆÁËÒ»ÖÖÃûΪPEAKLIGHTµÄÖØ´óÐÂÐͶñÒâÈí¼þ £¬£¬£¬£¬Ëüͨ¹ýһϵÁÐÈ«ÐÄÉè¼ÆµÄ¶à½×¶ÎѬȾÀú³Ì £¬£¬£¬£¬ÇÄÎÞÉùÏ¢µØÔÚÊܺ¦ÕßµÄϵͳÖÐÈö²¥°üÀ¨LUMMAC.V2¡¢SHADOWLADDERºÍCRYPTBOTÔÚÄڵĶàÖÖÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£PEAKLIGHTµÄÈëÇÖʼÓÚαװ³ÉµÁ°æÓ°Ï·µÄ¶ñÒâZIPÎļþ £¬£¬£¬£¬ÄÚº¬Î±×°³ÉýÌåͼ±êµÄLNK¿ì½Ý·½·¨Îļþ £¬£¬£¬£¬ÓÕµ¼Óû§Ö´ÐÐǶÈëµÄPowerShell¾ç±¾ £¬£¬£¬£¬½ø¶øÏÂÔØ²¢Ö´ÐÐÄÚ´æÖеÄJavaScriptÖ²Èë³ÌÐò¡£¡£¡£¸ÃÖ²Èë³ÌÐòʹÓÃÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©ÍÐ¹Ü £¬£¬£¬£¬²¢½ÓÄÉ»ìÏýÊÖÒÕ¹æ±Ü¼ì²â £¬£¬£¬£¬×îÖÕÏÂÔØ²¢Ö´ÐÐPEAKLIGHTÏÂÔØ³ÌÐò £¬£¬£¬£¬¸Ã³ÌÐòƾ֤ϵͳÇéÐÎÏÂÔØÌØÁíÍâ¶ñÒâ¸ºÔØ¡£¡£¡£PEAKLIGHT±äÖÖ¶àÑù £¬£¬£¬£¬µ«½¹µãÄ¿µÄÒ»Ö£ºÒþ²ØµØ°²ÅÅÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£¡£¡£ÆÊÎöÏÔʾ £¬£¬£¬£¬PEAKLIGHTÏÂÔØµÄZIPÎļþ°üÀ¨SHADOWLADDERºÍCRYPTBOTµÈ¶ñÒâÈí¼þ £¬£¬£¬£¬Í¬Ê±Ê¹ÓÃÕýµ±ÊÓÆµÎļþ×÷ΪÓÕ¶ü¡£¡£¡£MandiantÇ¿µ÷ £¬£¬£¬£¬´ËÀ๥»÷͹ÏÔÁ˼á³ÖСÐÄ¡¢½ÓÄɶàÌõÀíÇå¾²²½·¥µÄÖ÷ÒªÐÔ £¬£¬£¬£¬°üÀ¨Èí¼þ¸üС¢Ç¿ÃÜÂëºÍ¶àÒòËØÈÏÖ¤ £¬£¬£¬£¬ÒÔ¼°°²ÅÅÓÐÓõĶ˵ã±£»£»£»£»¤¡£¡£¡£


https://securityonline.info/peaklight-malware-a-new-stealthy-memory-only-threat-emerges/


3. CISAÖÒÑÔVersa NetworksÎó²îCVE-2024-39717Õý±»Æð¾¢Ê¹ÓÃ


8ÔÂ23ÈÕ £¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½üÆÚ½ôÆÈÐû²¼Á˹ØÓÚCVE-2024-39717Îó²îµÄÇå¾²¾¯±¨ £¬£¬£¬£¬Ö¸³ö¸Ã¸ßÑÏÖØÐÔÎó²îÕý±»Æð¾¢Ê¹Óà £¬£¬£¬£¬¶ÔʹÓÃVersa Networks Director GUIµÄϵͳ×é³ÉÖØ´óÍþв¡£¡£¡£´ËÎó²îÔÊÐí¾ßÓи߼¶ÖÎÀíȨÏÞµÄÓû§Í¨¹ýÉÏ´«Î±×°Îª.pngͼƬµÄ¶ñÒâÎļþ £¬£¬£¬£¬½ø¶ø¿ÉÄÜ»ñȡδÊÚȨ»á¼ûȨÏÞ»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ÕâÒ»Îó²îµÄÑÏÖØÐÔÔÚÓÚ £¬£¬£¬£¬ËüÒÑÈ·Èϱ»Ò°Íâ¹¥»÷ÕßʹÓà £¬£¬£¬£¬²¿·ÖÔµ¹ÊÔ­ÓÉÊǿͻ§Î´×ñÕÕ֮ǰÐû²¼µÄ·À»ðǽָÄÏ¡£¡£¡£Ö»¹Ü¸Ã¶ñÒâÎļþÔÚ´ó¶¼Ö÷Á÷ä¯ÀÀÆ÷ÉÏÎÞ·¨Ö±½ÓÖ´ÐÐ £¬£¬£¬£¬µ«Ç±ÔÚµÄʹÓÃʵÀý¼°Î´Ö¤ÊµµÄ±¨¸æÈÔÅúעΣº¦Ò»Á¬±£´æ¡£¡£¡£CISAÒѽ«CVE-2024-39717ÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ £¬£¬£¬£¬²¢±Þ²ßÁª°î»ú¹¹ÔÚ2024Äê9ÔÂ13ÈÕǰ°²ÅÅ×îÐÂÇå¾²²¹¶¡ £¬£¬£¬£¬ÒÔÌá·ÀDZÔÚµÄÍøÂç¹¥»÷¡£¡£¡£Òò´Ë £¬£¬£¬£¬ËùÓÐʹÓÃVersa Networks Director GUIµÄ×é֯ӦѸËÙÉó²é²¢ÔöÇ¿ÆäÇ徲ЭÒé £¬£¬£¬£¬Í¬Ê±Á¬Ã¦Ó¦ÓÃËùÓпÉÓõÄÇå¾²²¹¶¡ºÍ¸üР£¬£¬£¬£¬ÒÔÈ·±£ÍøÂçÇå¾²ÃâÊÜ´ËÎó²îµÄË𺦡£¡£¡£


https://securityonline.info/cve-2024-39717-versa-networks-director-gui-flaw-under-active-attack-cisa-issues-urgent-patching-directive/


4. еÄmacOS¶ñÒâÈí¼þCthulhu StealerÃé×¼AppleÓû§Êý¾Ý


8ÔÂ23ÈÕ £¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÕë¶ÔApple macOSµÄÐÂÐÍÐÅÏ¢ÇÔÈ¡³ÌÐòCthulhu Stealer £¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ×Ô2023Äêµ×ÆðÒÔÿÔÂ500ÃÀÔªµÄMaaS£¨¶ñÒâÈí¼þ¼´Ð§ÀÍ£©Ä£Ê½Ìṩ £¬£¬£¬£¬¿É¿çx86_64ÓëArm¼Ü¹¹ÔËÐС£¡£¡£Cthulhu Stealerαװ³ÉÕýµ±Èí¼þÈçCleanMyMacµÈ £¬£¬£¬£¬Ê¹ÓÃÓû§ÐÅÈÎÈÆ¹ýGatekeeper±£»£»£»£»¤ £¬£¬£¬£¬ÓÕµ¼Óû§ÊäÈëÃÜÂë £¬£¬£¬£¬½øÒ»²½ÇÔÈ¡MetaMaskÃÜÂë¡¢iCloud Keychain¼°ä¯ÀÀÆ÷cookieµÈÃô¸ÐÊý¾Ý¡£¡£¡£Ëü»¹Ê¹ÓÃChainbreakerµÈ¹¤¾ßÍøÂçϵͳÐÅÏ¢ £¬£¬£¬£¬²¢½«Êý¾ÝѹËõºó·¢ËÍÖÁC2ЧÀÍÆ÷¡£¡£¡£Ö»¹ÜCthulhu StealerÔÚÊÖÒÕÉϲ¢²»ÖØ´ó £¬£¬£¬£¬È±·¦¸ß¼¶·´ÆÊÎöÊÖ¶Î £¬£¬£¬£¬µ«ËüչʾÁËÍþвÐÐΪÕßÈÕÒæ¹Ø×¢macOSµÄÇ÷ÊÆ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ±³ºóµÄ¿ª·¢ÕßÒòÄÚ²¿¾À·×ÒÑÍ˳öÊг¡ £¬£¬£¬£¬µ«Õâ²¢²»É¨³ýδÀ´ÀàËÆÍþвµÄÔÙÏÖ¡£¡£¡£ÃæÁÙÕâһΣº¦ £¬£¬£¬£¬Æ»¹û¹«Ë¾ÒѽÓÄɲ½·¥ £¬£¬£¬£¬ÍýÏëÔÚmacOS SequoiaÖÐÔöÇ¿¶ÔδÊðÃû»òδ¹«Ö¤Èí¼þµÄÏÞÖÆ £¬£¬£¬£¬Óû§Ðèͨ¹ýϵͳÉèÖöø·Ç¼òÆÓ²Ù×÷À´ÔÊÐíÈí¼þÔËÐÐ £¬£¬£¬£¬ÒÔÌá¸ßϵͳÇå¾²ÐÔ¡£¡£¡£Í¬Ê± £¬£¬£¬£¬×¨¼Ò½¨ÒémacOSÓû§½ö´Ó¿ÉÐÅȪԴÏÂÔØÈí¼þ £¬£¬£¬£¬¼á³Öϵͳ¸üÐÂÖÁ×îа汾¡£¡£¡£


https://thehackernews.com/2024/08/new-macos-malware-cthulhu-stealer.html?&web_view=true


5. QilinÀÕË÷Èí¼þж¯Ïò£ºÇÔÈ¡Chromeƾ֤


8ÔÂ23ÈÕ £¬£¬£¬£¬ÍøÂçÇå¾²ÁìÓò·ºÆðÁËÒ»ÆðÒýÈËעĿµÄQilinÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ¡£¡£¡£¾ÝSophosÍøÂçÇå¾²¹«Ë¾±¨¸æ £¬£¬£¬£¬´Ë´Î¹¥»÷²»µ«ÏÞÓڹŰåµÄÎļþ¼ÓÃÜÓëÀÕË÷ £¬£¬£¬£¬»¹ÓÐÊýµØÁ¬ÏµÁËÆ¾Ö¤ÍøÂçÊÖ¶Î £¬£¬£¬£¬¶ÔÊܺ¦ÕßµÄGoogle Chromeä¯ÀÀÆ÷ÖеÄÃô¸ÐÐÅÏ¢×é³ÉÍþв¡£¡£¡£¹¥»÷ÕßʹÓÃVPNÃÅ»§Ð¹Â¶µÄ¡¢È±·¦¶àÒòËØÈÏÖ¤µÄƾ֤ £¬£¬£¬£¬ÀÖ³ÉÉøÍ¸Ä¿µÄÍøÂç £¬£¬£¬£¬²¢ÔÚÊ×´ÎÈëÇÖºóDZÔÚ18Ìì¾ÙÐÐÉî¶ÈºóʹÓᣡ£¡£¹¥»÷ÕßÇÉÃîµØ±à¼­ÁËÓò¿ØÖÆÆ÷ÖеÄĬÈÏÓòÕ½ÂÔ £¬£¬£¬£¬ÒýÈëÁËÁ½¸öÒªº¦¾ç±¾£ºÒ»ÊÇÓÃÓÚËѼ¯Chromeä¯ÀÀÆ÷´æ´¢Æ¾Ö¤µÄPowerShell¾ç±¾¡°IPScanner.ps1¡± £¬£¬£¬£¬¶þÊÇ´¥·¢¸Ã¾ç±¾Ö´ÐеÄÅú´¦Öóͷ£Îļþ¡°logon.bat¡±¡£¡£¡£ÕâЩ¾ç±¾Í¨¹ýµÇ¼ʱµÄ×éÕ½ÂÔ¹¤¾ß£¨GPO£©×Ô¶¯Ö´ÐÐ £¬£¬£¬£¬Ê¹µÃÿ´ÎÓû§µÇ¼ʱ¶¼¿ÉÄÜÔÚ²»ÖªÇéµÄÇéÐÎÏ´¥·¢Æ¾Ö¤ÇÔÈ¡ £¬£¬£¬£¬Ò»Á¬ÈýÌìÖ®¾Ã £¬£¬£¬£¬¼«´óµØÔöÌíÁËÐÅϢй¶µÄΣº¦¡£¡£¡£Ëæºó £¬£¬£¬£¬¹¥»÷Õß²»µ«¼ÓÃÜÁËÎļþ¡¢°²ÅÅÀÕË÷ÐÅ £¬£¬£¬£¬»¹ÇÔÈ¡ÁËÍøÂçµ½µÄƾ֤ £¬£¬£¬£¬²¢É¨³ý»î¶¯ºÛ¼£¡£¡£¡£Chromeƾ֤µÄʧÔôÆÈʹÊܺ¦ÕßÐèÔÚ¶à¸öµÚÈý·½Ð§ÀÍÉÏÖØÖÃÕË»§ÃÜÂë £¬£¬£¬£¬½øÒ»²½¼Ó¾çÁËÊÂÎñµÄÖØ´óÐÔºÍÓ°Ïì¹æÄ£¡£¡£¡£


https://thehackernews.com/2024/08/new-qilin-ransomware-attack-uses-vpn.html


6. Android¶ñÒâÈí¼þNGateʹÓÃNFCÊÖÒÕÓÃÓÚATMÈ¡¿î


8ÔÂ23ÈÕ £¬£¬£¬£¬ÔÚÒÑÍù¾Å¸öÔÂÖÐ £¬£¬£¬£¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESET½ÒÆÆÁËÒ»ÆðÕë¶Ô½Ý¿ËÈý¼ÒÒøÐеÄÖØ´óÍøÂç·¸·¨»î¶¯¡£¡£¡£·¸·¨·Ö×ÓʹÓÃÃûΪNGateµÄ¶ñÒâÈí¼þ £¬£¬£¬£¬Í¨¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÓʼþÓÕÆ­Android×°±¸Óû§ÏÂÔØÎ±×°³ÉÒøÐÐÓ¦ÓõĶñÒâ³ÌÐò¡£¡£¡£Õâ¿îÈí¼þ²»µ«ÄÜÇÔÈ¡Óû§µÄÒøÐÐÐÅÏ¢ £¬£¬£¬£¬»¹½ÓÄÉÁËÒ»ÖÖØ¨¹ÅδÓеÄNFCÖмÌÊÖÒÕ £¬£¬£¬£¬ÄÜ´ÓÊܺ¦ÕßµÄʵÌåÖ§¸¶¿¨ÖÐÔ¶³Ì´«Êä½ü³¡Í¨Ñ¶Êý¾ÝÖÁ¹¥»÷Õß×°±¸ £¬£¬£¬£¬½ø¶øÖ´ÐÐATMÉúÒâ»ò×ªÒÆ×ʽ𡣡£¡£´Ë¶ñÒâÈí¼þ´ÓδÉϼÜGoogle PlayÊÐËÁ £¬£¬£¬£¬Ö÷Ҫͨ¹ý´¹ÂÚÓʼþÖеķǹٷ½Á´½ÓÈö²¥¡£¡£¡£Êܺ¦Õß±»ÓÕµ¼¿ªÆôNFC¹¦Ð§²¢°²ÅÅÖ§¸¶¿¨ÓÚÊÖ»ú±³²¿ £¬£¬£¬£¬ÒÔÍê³É¿¨ÐÅÏ¢µÄ²»·¨»ñÈ¡¡£¡£¡£ESET×Ô2023Äê11ÔÂÆð×·×Ù¸Ã×éÖ¯ £¬£¬£¬£¬·¢Ã÷Æä»î¶¯ÔÚÒ»Ãû³ÉÔ±±»²¶ºó¶ÌÔÝÕϰ­ £¬£¬£¬£¬µ«´ËÀàAndroid¶ñÒâÈí¼þµÄй¦Ð§ÈÔÊôÊ×´ÎÔÚÒ°Íâ±»·¢Ã÷¡£¡£¡£×¨¼ÒÖÒÑÔ¹«ÖÚÐèÌá¸ßСÐÄ £¬£¬£¬£¬¼ì²éÍøÕ¾URL¡¢Í×ÉÆ±£¹ÜPINÂë £¬£¬£¬£¬²¢ÔÚ·ÇÐëҪʱ¹Ø±ÕNFC¹¦Ð§ £¬£¬£¬£¬ÍƼöʹÓÃÐéÄ⿨ÒÔïÔ̭Σº¦¡£¡£¡£


https://therecord.media/android-malware-atm-stealing-czech-banks