Î÷ÑÅͼ¸ÛºÍÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡ÒÉÔâÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2024-08-268ÔÂ25ÈÕ£¬£¬£¬£¬Î÷ÑÅͼ¸ÛÓëÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡Í¬Ê±ÔËÓª£¬£¬£¬£¬½üÆÚÔâÓöÁËÑÏÖØµÄÐÅϢϵͳÌôÕ½£¬£¬£¬£¬ÒÉËÆÔâÓöÁËÍøÂç¹¥»÷¡£¡£¡£ÖÜÁùÇåÔ磬£¬£¬£¬¿Ú°¶Ê×ÏÈͨ¹ýÉ罻ýÌåÆ½Ì¨×ª´ïÁËЧÀÍÖÐÖ¹µÄÇéÐΣ¬£¬£¬£¬Ëæºó»ú³¡¹Ù·½È·ÈÏÔâÓöÁËϵͳÖÐÖ¹£¬£¬£¬£¬²¢ÌåÏÖÕâ¿ÉÄÜÔ´ÓÚÒ»´ÎÍøÂç¹¥»÷¡£¡£¡£Ëæ×ÅÊÂ̬Éú³¤ÖÁÖÜÁùÍí¼ä£¬£¬£¬£¬»ú³¡·½ÃæÌåÏÖЧÀÍÖÐֹ״̬ÒÀ¾Éδ½â£¬£¬£¬£¬ÇÒÎÞ·¨Ã÷È·¸ø³ö»Ö¸´ÖÜȫЧÀ͵Äʱ¼ä±í¡£¡£¡£ÃæÁÙÕâһͻ·¢×´Ì¬£¬£¬£¬£¬»ú³¡·½ÃæÆð¾¢Ó¦¶Ô£¬£¬£¬£¬½¨ÒéÓοÍʹÓú½¿Õ¹«Ë¾ÌṩµÄÊÖ»úÓ¦ÓóÌÐò°ìÀíµÇ»úÊÖÐø²¢´òÓ¡µÇ»úÅÆ¼°ÐÐÀî±êÇ©£¬£¬£¬£¬Í¬Ê±ÌáÐÑÂÿÍÌáǰµÖ´ï»ú³¡ÒÔÓ¦¶Ô¿ÉÄܵÄÑÓÎ󡣡£¡£¾ÝTechCrunchµÄÊÖÒÕÆÊÎö£¬£¬£¬£¬×èÖ¹ÖÜÈÕ̫ƽÑóʱ¼äÔ糿£¬£¬£¬£¬Î÷ÑÅͼ¸Û¶ÔÍâЧÀ͵ÄÍøÂç»ù´¡ÉèÊ©£¬£¬£¬£¬ÓÈÆäÊÇÆä¹Ù·½ÍøÕ¾£¬£¬£¬£¬ÈÔ´¦ÓÚ²»¿É»á¼ûµÄÀëÏß״̬£¬£¬£¬£¬ÏÔʾ³ö´Ë´ÎÍøÂç¹¥»÷¶Ô¿Ú°¶¼°»ú³¡ÔËÓªÔì³ÉÁËÏÔÖøÓ°Ïì¡£¡£¡£
https://techcrunch.com/2024/08/25/the-port-of-seattle-and-sea-tac-airport-say-theyve-been-hit-by-possible-cyberattack/
2. PEAKLIGHT ¶ñÒâÈí¼þ£ºÒ»ÖÖÐÂÐÍÒþÃØÄÚ´æÍþв·ºÆð
8ÔÂ24ÈÕ£¬£¬£¬£¬MandiantµÄÍøÂçÇå¾²ÍÅ¶Ó½ÒÆÆÁËÒ»ÖÖÃûΪPEAKLIGHTµÄÖØ´óÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬Ëüͨ¹ýһϵÁÐÈ«ÐÄÉè¼ÆµÄ¶à½×¶ÎѬȾÀú³Ì£¬£¬£¬£¬ÇÄÎÞÉùÏ¢µØÔÚÊܺ¦ÕßµÄϵͳÖÐÈö²¥°üÀ¨LUMMAC.V2¡¢SHADOWLADDERºÍCRYPTBOTÔÚÄڵĶàÖÖÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£PEAKLIGHTµÄÈëÇÖʼÓÚαװ³ÉµÁ°æÓ°Ï·µÄ¶ñÒâZIPÎļþ£¬£¬£¬£¬ÄÚº¬Î±×°³ÉýÌåͼ±êµÄLNK¿ì½Ý·½·¨Îļþ£¬£¬£¬£¬ÓÕµ¼Óû§Ö´ÐÐǶÈëµÄPowerShell¾ç±¾£¬£¬£¬£¬½ø¶øÏÂÔØ²¢Ö´ÐÐÄÚ´æÖеÄJavaScriptÖ²Èë³ÌÐò¡£¡£¡£¸ÃÖ²Èë³ÌÐòʹÓÃÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©Íйܣ¬£¬£¬£¬²¢½ÓÄÉ»ìÏýÊÖÒÕ¹æ±Ü¼ì²â£¬£¬£¬£¬×îÖÕÏÂÔØ²¢Ö´ÐÐPEAKLIGHTÏÂÔØ³ÌÐò£¬£¬£¬£¬¸Ã³ÌÐòƾ֤ϵͳÇéÐÎÏÂÔØÌØÁíÍâ¶ñÒâ¸ºÔØ¡£¡£¡£PEAKLIGHT±äÖÖ¶àÑù£¬£¬£¬£¬µ«½¹µãÄ¿µÄÒ»Ö£ºÒþ²ØµØ°²ÅÅÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£¡£¡£ÆÊÎöÏÔʾ£¬£¬£¬£¬PEAKLIGHTÏÂÔØµÄZIPÎļþ°üÀ¨SHADOWLADDERºÍCRYPTBOTµÈ¶ñÒâÈí¼þ£¬£¬£¬£¬Í¬Ê±Ê¹ÓÃÕýµ±ÊÓÆµÎļþ×÷ΪÓÕ¶ü¡£¡£¡£MandiantÇ¿µ÷£¬£¬£¬£¬´ËÀ๥»÷͹ÏÔÁ˼á³ÖСÐÄ¡¢½ÓÄɶàÌõÀíÇå¾²²½·¥µÄÖ÷ÒªÐÔ£¬£¬£¬£¬°üÀ¨Èí¼þ¸üС¢Ç¿ÃÜÂëºÍ¶àÒòËØÈÏÖ¤£¬£¬£¬£¬ÒÔ¼°°²ÅÅÓÐÓõĶ˵㱣»£»£»£»¤¡£¡£¡£
https://securityonline.info/peaklight-malware-a-new-stealthy-memory-only-threat-emerges/
3. CISAÖÒÑÔVersa NetworksÎó²îCVE-2024-39717Õý±»Æð¾¢Ê¹ÓÃ
8ÔÂ23ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½üÆÚ½ôÆÈÐû²¼Á˹ØÓÚCVE-2024-39717Îó²îµÄÇå¾²¾¯±¨£¬£¬£¬£¬Ö¸³ö¸Ã¸ßÑÏÖØÐÔÎó²îÕý±»Æð¾¢Ê¹Ó㬣¬£¬£¬¶ÔʹÓÃVersa Networks Director GUIµÄϵͳ×é³ÉÖØ´óÍþв¡£¡£¡£´ËÎó²îÔÊÐí¾ßÓи߼¶ÖÎÀíȨÏÞµÄÓû§Í¨¹ýÉÏ´«Î±×°Îª.pngͼƬµÄ¶ñÒâÎļþ£¬£¬£¬£¬½ø¶ø¿ÉÄÜ»ñȡδÊÚȨ»á¼ûȨÏÞ»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ÕâÒ»Îó²îµÄÑÏÖØÐÔÔÚÓÚ£¬£¬£¬£¬ËüÒÑÈ·Èϱ»Ò°Íâ¹¥»÷ÕßʹÓ㬣¬£¬£¬²¿·ÖÔµ¹ÊÔÓÉÊǿͻ§Î´×ñÕÕ֮ǰÐû²¼µÄ·À»ðǽָÄÏ¡£¡£¡£Ö»¹Ü¸Ã¶ñÒâÎļþÔÚ´ó¶¼Ö÷Á÷ä¯ÀÀÆ÷ÉÏÎÞ·¨Ö±½ÓÖ´ÐУ¬£¬£¬£¬µ«Ç±ÔÚµÄʹÓÃʵÀý¼°Î´Ö¤ÊµµÄ±¨¸æÈÔÅúעΣº¦Ò»Á¬±£´æ¡£¡£¡£CISAÒѽ«CVE-2024-39717ÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬²¢±Þ²ßÁª°î»ú¹¹ÔÚ2024Äê9ÔÂ13ÈÕǰ°²ÅÅ×îÐÂÇå¾²²¹¶¡£¬£¬£¬£¬ÒÔÌá·ÀDZÔÚµÄÍøÂç¹¥»÷¡£¡£¡£Òò´Ë£¬£¬£¬£¬ËùÓÐʹÓÃVersa Networks Director GUIµÄ×é֯ӦѸËÙÉó²é²¢ÔöÇ¿ÆäÇå¾²ÐÒ飬£¬£¬£¬Í¬Ê±Á¬Ã¦Ó¦ÓÃËùÓпÉÓõÄÇå¾²²¹¶¡ºÍ¸üУ¬£¬£¬£¬ÒÔÈ·±£ÍøÂçÇå¾²ÃâÊÜ´ËÎó²îµÄË𺦡£¡£¡£
https://securityonline.info/cve-2024-39717-versa-networks-director-gui-flaw-under-active-attack-cisa-issues-urgent-patching-directive/
4. еÄmacOS¶ñÒâÈí¼þCthulhu StealerÃé×¼AppleÓû§Êý¾Ý
8ÔÂ23ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÕë¶ÔApple macOSµÄÐÂÐÍÐÅÏ¢ÇÔÈ¡³ÌÐòCthulhu Stealer£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ×Ô2023Äêµ×ÆðÒÔÿÔÂ500ÃÀÔªµÄMaaS£¨¶ñÒâÈí¼þ¼´Ð§ÀÍ£©Ä£Ê½Ìṩ£¬£¬£¬£¬¿É¿çx86_64ÓëArm¼Ü¹¹ÔËÐС£¡£¡£Cthulhu Stealerαװ³ÉÕýµ±Èí¼þÈçCleanMyMacµÈ£¬£¬£¬£¬Ê¹ÓÃÓû§ÐÅÈÎÈÆ¹ýGatekeeper±£»£»£»£»¤£¬£¬£¬£¬ÓÕµ¼Óû§ÊäÈëÃÜÂ룬£¬£¬£¬½øÒ»²½ÇÔÈ¡MetaMaskÃÜÂë¡¢iCloud Keychain¼°ä¯ÀÀÆ÷cookieµÈÃô¸ÐÊý¾Ý¡£¡£¡£Ëü»¹Ê¹ÓÃChainbreakerµÈ¹¤¾ßÍøÂçϵͳÐÅÏ¢£¬£¬£¬£¬²¢½«Êý¾ÝѹËõºó·¢ËÍÖÁC2ЧÀÍÆ÷¡£¡£¡£Ö»¹ÜCthulhu StealerÔÚÊÖÒÕÉϲ¢²»Öش󣬣¬£¬£¬È±·¦¸ß¼¶·´ÆÊÎöÊֶΣ¬£¬£¬£¬µ«ËüչʾÁËÍþвÐÐΪÕßÈÕÒæ¹Ø×¢macOSµÄÇ÷ÊÆ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ±³ºóµÄ¿ª·¢ÕßÒòÄÚ²¿¾À·×ÒÑÍ˳öÊг¡£¬£¬£¬£¬µ«Õâ²¢²»É¨³ýδÀ´ÀàËÆÍþвµÄÔÙÏÖ¡£¡£¡£ÃæÁÙÕâһΣº¦£¬£¬£¬£¬Æ»¹û¹«Ë¾ÒѽÓÄɲ½·¥£¬£¬£¬£¬ÍýÏëÔÚmacOS SequoiaÖÐÔöÇ¿¶ÔδÊðÃû»òδ¹«Ö¤Èí¼þµÄÏÞÖÆ£¬£¬£¬£¬Óû§Ðèͨ¹ýϵͳÉèÖöø·Ç¼òÆÓ²Ù×÷À´ÔÊÐíÈí¼þÔËÐУ¬£¬£¬£¬ÒÔÌá¸ßϵͳÇå¾²ÐÔ¡£¡£¡£Í¬Ê±£¬£¬£¬£¬×¨¼Ò½¨ÒémacOSÓû§½ö´Ó¿ÉÐÅȪԴÏÂÔØÈí¼þ£¬£¬£¬£¬¼á³Öϵͳ¸üÐÂÖÁ×îа汾¡£¡£¡£
https://thehackernews.com/2024/08/new-macos-malware-cthulhu-stealer.html?&web_view=true
5. QilinÀÕË÷Èí¼þж¯Ïò£ºÇÔÈ¡Chromeƾ֤
8ÔÂ23ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²ÁìÓò·ºÆðÁËÒ»ÆðÒýÈËעĿµÄQilinÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ¡£¡£¡£¾ÝSophosÍøÂçÇå¾²¹«Ë¾±¨¸æ£¬£¬£¬£¬´Ë´Î¹¥»÷²»µ«ÏÞÓڹŰåµÄÎļþ¼ÓÃÜÓëÀÕË÷£¬£¬£¬£¬»¹ÓÐÊýµØÁ¬ÏµÁËÆ¾Ö¤ÍøÂçÊֶΣ¬£¬£¬£¬¶ÔÊܺ¦ÕßµÄGoogle Chromeä¯ÀÀÆ÷ÖеÄÃô¸ÐÐÅÏ¢×é³ÉÍþв¡£¡£¡£¹¥»÷ÕßʹÓÃVPNÃÅ»§Ð¹Â¶µÄ¡¢È±·¦¶àÒòËØÈÏÖ¤µÄƾ֤£¬£¬£¬£¬ÀÖ³ÉÉøÍ¸Ä¿µÄÍøÂ磬£¬£¬£¬²¢ÔÚÊ×´ÎÈëÇÖºóDZÔÚ18Ìì¾ÙÐÐÉî¶ÈºóʹÓᣡ£¡£¹¥»÷ÕßÇÉÃîµØ±à¼ÁËÓò¿ØÖÆÆ÷ÖеÄĬÈÏÓòÕ½ÂÔ£¬£¬£¬£¬ÒýÈëÁËÁ½¸öÒªº¦¾ç±¾£ºÒ»ÊÇÓÃÓÚËѼ¯Chromeä¯ÀÀÆ÷´æ´¢Æ¾Ö¤µÄPowerShell¾ç±¾¡°IPScanner.ps1¡±£¬£¬£¬£¬¶þÊÇ´¥·¢¸Ã¾ç±¾Ö´ÐеÄÅú´¦Öóͷ£Îļþ¡°logon.bat¡±¡£¡£¡£ÕâЩ¾ç±¾Í¨¹ýµÇ¼ʱµÄ×éÕ½ÂÔ¹¤¾ß£¨GPO£©×Ô¶¯Ö´ÐУ¬£¬£¬£¬Ê¹µÃÿ´ÎÓû§µÇ¼ʱ¶¼¿ÉÄÜÔÚ²»ÖªÇéµÄÇéÐÎÏ´¥·¢Æ¾Ö¤ÇÔÈ¡£¬£¬£¬£¬Ò»Á¬ÈýÌìÖ®¾Ã£¬£¬£¬£¬¼«´óµØÔöÌíÁËÐÅϢй¶µÄΣº¦¡£¡£¡£Ëæºó£¬£¬£¬£¬¹¥»÷Õß²»µ«¼ÓÃÜÁËÎļþ¡¢°²ÅÅÀÕË÷ÐÅ£¬£¬£¬£¬»¹ÇÔÈ¡ÁËÍøÂçµ½µÄƾ֤£¬£¬£¬£¬²¢É¨³ý»î¶¯ºÛ¼£¡£¡£¡£Chromeƾ֤µÄʧÔôÆÈʹÊܺ¦ÕßÐèÔÚ¶à¸öµÚÈý·½Ð§ÀÍÉÏÖØÖÃÕË»§ÃÜÂ룬£¬£¬£¬½øÒ»²½¼Ó¾çÁËÊÂÎñµÄÖØ´óÐÔºÍÓ°Ïì¹æÄ£¡£¡£¡£
https://thehackernews.com/2024/08/new-qilin-ransomware-attack-uses-vpn.html
6. Android¶ñÒâÈí¼þNGateʹÓÃNFCÊÖÒÕÓÃÓÚATMÈ¡¿î
8ÔÂ23ÈÕ£¬£¬£¬£¬ÔÚÒÑÍù¾Å¸öÔÂÖУ¬£¬£¬£¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESET½ÒÆÆÁËÒ»ÆðÕë¶Ô½Ý¿ËÈý¼ÒÒøÐеÄÖØ´óÍøÂç·¸·¨»î¶¯¡£¡£¡£·¸·¨·Ö×ÓʹÓÃÃûΪNGateµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬Í¨¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÓʼþÓÕÆAndroid×°±¸Óû§ÏÂÔØÎ±×°³ÉÒøÐÐÓ¦ÓõĶñÒâ³ÌÐò¡£¡£¡£Õâ¿îÈí¼þ²»µ«ÄÜÇÔÈ¡Óû§µÄÒøÐÐÐÅÏ¢£¬£¬£¬£¬»¹½ÓÄÉÁËÒ»ÖÖØ¨¹ÅδÓеÄNFCÖмÌÊÖÒÕ£¬£¬£¬£¬ÄÜ´ÓÊܺ¦ÕßµÄʵÌåÖ§¸¶¿¨ÖÐÔ¶³Ì´«Êä½ü³¡Í¨Ñ¶Êý¾ÝÖÁ¹¥»÷Õß×°±¸£¬£¬£¬£¬½ø¶øÖ´ÐÐATMÉúÒâ»ò×ªÒÆ×ʽ𡣡£¡£´Ë¶ñÒâÈí¼þ´ÓδÉϼÜGoogle PlayÊÐËÁ£¬£¬£¬£¬Ö÷Ҫͨ¹ý´¹ÂÚÓʼþÖеķǹٷ½Á´½ÓÈö²¥¡£¡£¡£Êܺ¦Õß±»ÓÕµ¼¿ªÆôNFC¹¦Ð§²¢°²ÅÅÖ§¸¶¿¨ÓÚÊÖ»ú±³²¿£¬£¬£¬£¬ÒÔÍê³É¿¨ÐÅÏ¢µÄ²»·¨»ñÈ¡¡£¡£¡£ESET×Ô2023Äê11ÔÂÆð×·×Ù¸Ã×éÖ¯£¬£¬£¬£¬·¢Ã÷Æä»î¶¯ÔÚÒ»Ãû³ÉÔ±±»²¶ºó¶ÌÔÝÕϰ£¬£¬£¬£¬µ«´ËÀàAndroid¶ñÒâÈí¼þµÄй¦Ð§ÈÔÊôÊ×´ÎÔÚÒ°Íâ±»·¢Ã÷¡£¡£¡£×¨¼ÒÖÒÑÔ¹«ÖÚÐèÌá¸ßСÐÄ£¬£¬£¬£¬¼ì²éÍøÕ¾URL¡¢Í×ÉÆ±£¹ÜPINÂ룬£¬£¬£¬²¢ÔÚ·ÇÐëҪʱ¹Ø±ÕNFC¹¦Ð§£¬£¬£¬£¬ÍƼöʹÓÃÐéÄ⿨ÒÔïÔÌΣº¦¡£¡£¡£
https://therecord.media/android-malware-atm-stealing-czech-banks


¾©¹«Íø°²±¸11010802024551ºÅ