Öж«AIºô½ÐÖÐÐÄÆ½Ì¨Ôâ´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬Ì»Â¶Çå¾²Òþ»¼
Ðû²¼Ê±¼ä 2024-10-1210ÔÂ10ÈÕ£¬£¬£¬£¬Ò»´Î´ó¹æÄ£Êý¾Ýй¶ÊÂÎñÔÚÖж«µØÇøÆØ¹â£¬£¬£¬£¬É漰һСÎÒ˽¼Ò¹¤ÖÇÄܺô½ÐÖÐÐÄÆ½Ì¨£¬£¬£¬£¬Áè¼Ý1020ÍòÌõ¶Ô»°¼Í¼±»µÁ¡£¡£¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Resecurity³Æ£¬£¬£¬£¬´Ë´ÎÎó²îʹ¹¥»÷ÕßÄܹ»Î´¾ÊÚȨ»á¼û¸Ãƽ̨µÄÖÎÀíÒDZí°å£¬£¬£¬£¬ÍøÂçÏûºÄÕß¡¢ÔËÓªÉ̺ÍAIÊðÀíÖ®¼äµÄ´ó×Ú»¥¶¯Êý¾Ý¡£¡£¡£¡£¡£¡£ÕâЩÊý¾Ý¿ÉÄܱ»ÓÃÓڸ߼¶Ú²Æ¡¢ÍøÂç´¹ÂÚÍýÏëºÍÆäËû¶ñÒâ»î¶¯£¬£¬£¬£¬ÓÈÆäÊÇСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©µÄй¶£¬£¬£¬£¬ÔöÌíÁËÄ£ÄâÕýµ±¿Í»§Ð§Àͽ»Á÷¾ÙÐÐڲƵÄΣº¦¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñ͹ÏÔÁËÈ˹¤ÖÇÄÜÆ½Ì¨ÔÚÌá¸ßЧÂʵÄͬʱ£¬£¬£¬£¬Ò²´øÀ´ÁËÊý¾ÝÒþ˽µÄÖØ´óÍþв¡£¡£¡£¡£¡£¡£ËäÈ»ÈëÇÖÒÑ»ñµÃ»º½â£¬£¬£¬£¬µ«ÈËÃǶԵÚÈý·½È˹¤ÖÇÄÜϵͳµÄÇå¾²ÐԺʹ¦Öóͷ£Ãô¸Ð¿Í»§Êý¾ÝµÄÄÜÁ¦ÌåÏÖµ£ÐÄ¡£¡£¡£¡£¡£¡£ResecurityÇ¿µ÷£¬£¬£¬£¬¶Ô»°Ê½AIƽ̨ÒѳÉΪ´óÐÍÆóÒµºÍÕþ¸®»ú¹¹ÏÖ´úIT¹©Ó¦Á´µÄÒªº¦ÒªËØ£¬£¬£¬£¬ÐèҪƽºâ¹Å°åÍøÂçÇå¾²²½·¥ºÍÕë¶ÔAIÏêϸÇéÐεÄרÃŲ½·¥À´±£»£»£»£»£»¤ËüÃÇ¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/10m-exposed-ai-call-center-hack/
2. APT29ºÚ¿Í´ó¹æÄ£¹¥»÷ZimbraºÍTeamCityЧÀÍÆ÷
10ÔÂ10ÈÕ£¬£¬£¬£¬ÃÀÓ¢ÍøÂç»ú¹¹½ñÈÕÁªºÏÖÒÑԳƣ¬£¬£¬£¬Óë¶íÂÞ˹¶ÔÍâÇ鱨¾Ö(SVR)Ïà¹ØµÄAPT29ºÚ¿Í×éÖ¯ÕýÔÚ¡°´ó¹æÄ£¡±¹¥»÷È«Çò¹æÄ£ÄÚδ´ò²¹¶¡µÄZimbraºÍJetBrains TeamCityЧÀÍÆ÷¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ʹÓÃÁËCVE-2022-27924ºÍCVE-2023-42793Îó²î£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡µç×ÓÓʼþÕÊ»§Æ¾Ö¤ºÍ¾ÙÐÐÔ¶³Ì´úÂëÖ´ÐеȶñÒâ»î¶¯¡£¡£¡£¡£¡£¡£SVRºÚ¿Í×éÖ¯£¬£¬£¬£¬Ò²±»³ÆÎªCozy Bear¡¢Midnight BlizzardºÍDukes£¬£¬£¬£¬¶àÄêÀ´Ò»Ö±Õë¶ÔÃÀ¹úºÍÅ·ÖÞµÄÕþ¸®ºÍ˽ÈË×éÖ¯¡£¡£¡£¡£¡£¡£´Ë´ÎÖÒÑÔÒªÇóÍøÂç·ÀÓùÕßÁ¬Ã¦ÐÞ²¹Ì»Â¶µÄЧÀÍÆ÷£¬£¬£¬£¬²¢°²ÅÅÇå¾²²¹¶¡»ººÍ½â²½·¥ÒÔ±ÜÃâÇå¾²Îó²î¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬APT29ºÚ¿ÍÒѲ߻®ÁËSolarWinds¹©Ó¦Á´¹¥»÷²¢¹¥ÆÆÁ˶à¸öÃÀ¹úÁª°î»ú¹¹£¬£¬£¬£¬»¹ÈëÇÖÁ˱±Ô¼¹ú¼ÒµÄMicrosoft 365ÕË»§ºÍ΢Èí¸ß¹ÜµÈ¹«Ë¾µÄExchange OnlineÕË»§¡£¡£¡£¡£¡£¡£ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÍøÂçÇå¾²Ö÷¹ÜÌåÏÖ£¬£¬£¬£¬ÕâÒ»»î¶¯¶ÔÕþ¸®ºÍ˽Ӫ²¿·Ö×é³ÉÁËÈ«ÇòÍþв£¬£¬£¬£¬ÐèÒª³¹µ×Éó²éÇå¾²¿ØÖƲ½·¥¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/us-uk-warn-of-russian-apt29-hackers-targeting-zimbra-teamcity-servers/
3. ºÚ¿ÍʹÓÃYouTubeƽ̨Èö²¥ÖØ´óµÄ¶ñÒâÈí¼þ
10ÔÂ10ÈÕ£¬£¬£¬£¬¿¨°Í˹»ù½üÆÚ·¢Ã÷ºÚ¿ÍƵÈÔʹÓÃYouTubeƽ̨Èö²¥ÖØ´ó¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ºÚ¿Íͨ¹ýÐ®ÖÆÈÈÃÅÆµµÀαװ³ÉÔʼ´´×÷Õߣ¬£¬£¬£¬Ðû²¼¶ñÒâÁ´½Ó¶ÔÓû§ÊµÑéÕ©Æ¡£¡£¡£¡£¡£¡£2022ÄêºÚ¿ÍÔøÕë¶Ô¶íÂÞ˹Óû§ÊµÑé¼ÓÃÜÇ®±ÒÍÚ¾ò»î¶¯£¬£¬£¬£¬Ê¹Óñ»Ð®ÖƵÄYouTubeÕË»§·Ö·¢Î±×°³ÉÊ¢ÐÐÓ¦ÓõĶñÒâÎļþ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶à½×¶Î¹¥»÷ÐòÁÐѬȾϵͳ£¬£¬£¬£¬½ÓÄÉÒþ²Ø¶ñÒâ´úÂë²¢¼á³ÖÊðÃûÓÐÓÃÐÔµÄÊÖÒÕ£¬£¬£¬£¬Ê¹ÓöàÖÖ»úÖÆ½¨É賤ÆÚÐÔ£¬£¬£¬£¬²¢ÊµÑéÖØ´óµÄ·ÀÓù¹æ±ÜÊÖÒÕÒþ²Ø¶ñÒâ×é¼þ¡£¡£¡£¡£¡£¡£×îÖÕÓÐÓÃÔØºÉΪSilentCryptoMiner£¬£¬£¬£¬ÓÃÓÚÍÚ¾òÒþ˽¼ÓÃÜÇ®±Ò£¬£¬£¬£¬²¢ÍøÂçϵͳң²âÊý¾Ýͨ¹ýTelegram»úеÈËAPI´«Êä¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¸Ã¶ñÒâ»î¶¯»¹Õë¶ÔÀ´×Ô°×¶íÂÞ˹¡¢Ó¡¶ÈµÈ¶à¸ö¹ú¼ÒµÄÓû§£¬£¬£¬£¬ÕâЩÓû§Òò³£½ûÓÃAV¹¤¾ß±£»£»£»£»£»¤ºÍÇå¾²²½·¥¶øÒ×Êܹ¥»÷¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷µÄÖØ´óÐÔÌåÏÖÔÚÄ£¿£¿£¿£¿£¿£¿é»¯½á¹¹ÉÏ£¬£¬£¬£¬¿Éƾ֤ĿµÄ¶¯Ì¬¼ÓÔØ²î±ðÓÐÓÃÔØºÉ×é¼þ£¬£¬£¬£¬½ÓÄÉÏȽø»ìÏýÒªÁìºÍ·´ÆÊÎö¹¦Ð§¼á³ÖÒþ²ØÐÔ£¬£¬£¬£¬ÈÚÈëÖØ´óµÄÆóÒµ¼¶¹¥»÷ÊÖÒÕ¡£¡£¡£¡£¡£¡£
https://cybersecuritynews.com/hackers-using-youtube-videos-to-deliver-sophisticated-malware/
4. LynxÀÕË÷Èí¼þ£ºINCÀÕË÷Èí¼þµÄбäÖÖÓëË«ÖØÀÕË÷Íþв
10ÔÂ11ÈÕ£¬£¬£¬£¬Palo Alto Networks ½üÆÚ·¢Ã÷ÁËÒ»ÖÖÃûΪ¡°Lynx¡±µÄÐÂÀÕË÷Èí¼þ£¬£¬£¬£¬ËüÏÖʵÉÏÊǶÔ2023Äê8Ô·ºÆðµÄINCÀÕË÷Èí¼þµÄ¸üÃû£¬£¬£¬£¬Á½Õß´úÂëÏàËÆ¶È¸ß´ï48%£¬£¬£¬£¬ÇÒÔ¼70.8%µÄ½¹µã¹¦Ð§±»Öظ´Ê¹Óᣡ£¡£¡£¡£¡£LynxÀÕË÷Èí¼þÖ÷ÒªÕë¶ÔÃÀ¹úºÍÓ¢¹ú¸÷ÐÐÒµ×éÖ¯£¬£¬£¬£¬°üÀ¨ÁãÊÛ¡¢·¿µØ²ú¡¢ÐÞ½¨ºÍ½ðÈÚЧÀ͵ȣ¬£¬£¬£¬ÒÔÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©ÐÎʽ¹©ÆäËûÍøÂç·¸·¨·Ö×ÓʹÓᣡ£¡£¡£¡£¡£Æä×îΣÏյķ½ÃæÖ®Ò»ÊÇʵÑéË«ÖØÀÕË÷Õ½ÂÔ£¬£¬£¬£¬¼´ÔÚ¼ÓÃÜÎļþǰÇÔÈ¡Êܺ¦ÕßÊý¾Ý£¬£¬£¬£¬Èô²»Ö§¸¶Êê½ð£¬£¬£¬£¬Ôò¿ÉÄÜй¶»ò³öÊÛÕâЩÊý¾Ý¡£¡£¡£¡£¡£¡£LynxÀÕË÷Èí¼þÉù³ÆÒÑÈëÇÖ¶à¼Ò¹«Ë¾£¬£¬£¬£¬²¢ÔÚ¹«¹²ÍøÕ¾ÉÏչʾ±»µÁÊý¾Ý£¬£¬£¬£¬Ö»¹ÜÉù³Æ±Ü¿ªÁËÕþ¸®»ú¹¹¡¢Ò½ÔººÍ·ÇÓªÀû×éÖ¯£¬£¬£¬£¬µ«Æä¹¥»÷ÈÔ¶ÔÐí¶àÐÐÒµ×é³ÉÖØ´óÍþв¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þʹÓø߼¶¼ÓÃÜËã·¨£¬£¬£¬£¬ÈçAES-128ºÍCurve25519 Donna£¬£¬£¬£¬½âÃÜÄѶȼ«´ó£¬£¬£¬£¬ÇÒרÃÅÕë¶ÔWindowsϵͳ£¬£¬£¬£¬Ê¹ÓÃRestart Manager APIÌá¸ß¼ÓÃÜЧÂÊ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬LynxÀÕË÷Èí¼þÉè¼ÆÎÞа£¬£¬£¬£¬ÔÊÐí¹¥»÷Õßͨ¹ýÏÂÁîÐвÎÊý×Ô½ç˵ִÐУ¬£¬£¬£¬ÒÔÖª×ãÌØ¶¨ÐèÇ󡣡£¡£¡£¡£¡£
https://securityonline.info/lynx-ransomware-the-evolution-of-inc-ransomware-into-a-potent-cyber-threat/
5. CISAÖÒÑÔ£ºÎ´¼ÓÃÜF5 BIG-IP Cookie±»ÀÄÓþÙÐÐÍøÂç¹¥»÷
10ÔÂ11ÈÕ£¬£¬£¬£¬CISA·¢³öÖÒÑÔ£¬£¬£¬£¬Ö¸³öÍøÂçÍþвÐÐΪÕßÕýÔÚÀÄÓÃδ¼ÓÃܵÄF5 BIG-IP³¤ÆÚcookieÀ´Ê¶±ðºÍ¶¨Î»Ä¿µÄÍøÂçÉÏµÄÆäËûÄÚ²¿×°±¸¡£¡£¡£¡£¡£¡£ËûÃÇͨ¹ý»æÖÆÄÚ²¿×°±¸Í¼£¬£¬£¬£¬ÔÚÍøÂç¹¥»÷µÄÍýÏë½×¶Îʶ±ðÒ×Êܹ¥»÷µÄ×°±¸¡£¡£¡£¡£¡£¡£F5 BIG-IPÊÇÒ»Ì×Ó¦ÓóÌÐò½»¸¶ºÍÁ÷Á¿ÖÎÀí¹¤¾ß£¬£¬£¬£¬ÆäÍâµØÁ÷Á¿ÖÎÀíÆ÷£¨LTM£©Ä£¿£¿£¿£¿£¿£¿éʹÓó¤ÆÚcookieÀ´Î¬³Ö»á»°Ò»ÖÂÐÔ£¬£¬£¬£¬µ«ÕâЩcookieĬÈÏδ¼ÓÃÜ¡£¡£¡£¡£¡£¡£´Ó11.5.0°æ×îÏÈ£¬£¬£¬£¬ÖÎÀíÔ±¿ÉÑ¡ÔñÇ¿ÖÆ¶ÔËùÓÐcookie¾ÙÐмÓÃÜ£¬£¬£¬£¬µ«Ñ¡Ôñ²»ÆôÓõÄÓû§½«ÃæÁÙÇ徲Σº¦¡£¡£¡£¡£¡£¡£ÕâЩcookie°üÀ¨±àÂëµÄIPµØµã¡¢¶Ë¿ÚºÅºÍÄÚ²¿¸ºÔØÆ½ºâЧÀÍÆ÷µÄÉèÖ㬣¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¶àÄêǰÒÑ·ÖÏíÔõÑùʹÓÃδ¼ÓÃܵÄcookieÀ´²éÕÒÒþ²ØµÄÄÚ²¿Ð§ÀÍÆ÷¡£¡£¡£¡£¡£¡£CISA½¨ÒéF5 BIG-IPÖÎÀíÔ±Éó²é¹©Ó¦É̹ØÓÚÔõÑù¼ÓÃÜÕâЩ³¤ÆÚcookieµÄ˵Ã÷£¬£¬£¬£¬²¢Ö¸³öF5ÒÑ¿ª·¢³öÒ»ÖÖÃûΪ¡°BIG-IP iHealth¡±µÄÕï¶Ï¹¤¾ß£¬£¬£¬£¬ÓÃÓÚ¼ì²â²úÆ·µÄ¹ýʧÉèÖò¢ÏòÖÎÀíÔ±·¢³öÖÒÑÔ¡£¡£¡£¡£¡£¡£µ±ÉèÖÃΪ¡°±ØÐ衱ʱ£¬£¬£¬£¬ËùÓг¤ÆÚÐÔcookie¶¼Ê¹ÓÃÇ¿AES-192¼ÓÃܾÙÐмÓÃÜ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-hackers-abuse-f5-big-ip-cookies-to-map-internal-servers/
6. Mozilla½ôÆÈÐû²¼FirefoxÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´ÑÏÖØÎó²îCVE-2024-9680
10ÔÂ11ÈÕ£¬£¬£¬£¬MozillaΪÆäFirefoxä¯ÀÀÆ÷Ðû²¼Á˽ôÆÈÇå¾²¸üУ¬£¬£¬£¬ÒÔ½â¾öÒ»¸ö±»ÆÕ±éʹÓõÄÑÏÖØÎó²î£¬£¬£¬£¬¸ÃÎó²î±»×·×ÙΪCVE-2024-9680£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬£¬¿ÉÄÜÔÊÐí¹¥»÷ÕßÔÚÓû§ÏµÍ³ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£Îó²îλÓÚFirefoxµÄ¶¯»Ê±¼äÖá×é¼þÖУ¬£¬£¬£¬ÊÇWeb Animations APIµÄÒ»ÖÖ»úÖÆ£¬£¬£¬£¬ÏêϸΪÊͷźóʹÓÃÎó²î£¬£¬£¬£¬¿Éµ¼ÖÂÄÚ´æË𻵡£¡£¡£¡£¡£¡£MozillaÔÚÊÕµ½·´²¡¶¾¹«Ë¾ESETµÄÖÒÑԺ󣬣¬£¬£¬Ñ¸ËÙÕÙ¼¯ÍŶӶÔÎó²î¾ÙÐÐÄæÏò¹¤³Ì£¬£¬£¬£¬²¢ÔÚ25СʱÄÚ¿ª·¢²¢Ðû²¼ÁËÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£¡£ÐÞ²¹µÄ°æ±¾°üÀ¨Firefox 131.0.2µÈ¶à¸ö°æ±¾¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬MozillaÒÑÈ·ÈϸÃÎó²îÕýÔÚ±»Æð¾¢Ê¹ÓÃÀ´¹¥»÷Torä¯ÀÀÆ÷Óû§£¬£¬£¬£¬µ«¹ØÓÚ¹¥»÷µÄÏêϸϸ½ÚÈÔ²»µÃ¶øÖª¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬Óû§Ó¦Á¬Ã¦¸üÐÂÖÁ×îа汾µÄFirefoxÒÔ±£»£»£»£»£»¤×Ô¼ºµÄϵͳÇå¾²¡£¡£¡£¡£¡£¡£
https://securityonline.info/mozilla-confirms-active-attacks-on-tor-browser-via-firefox-vulnerability/


¾©¹«Íø°²±¸11010802024551ºÅ