Ô½ÄϺڿÍ×éÖ¯°²ÅÅPXA Stealer£¬£¬£¬£¬£¬£¬Õë¶ÔÅ·ÑÇÕþ¸®½ÌÓý»ú¹¹

Ðû²¼Ê±¼ä 2024-11-19

1. Ô½ÄϺڿÍ×éÖ¯°²ÅÅPXA Stealer£¬£¬£¬£¬£¬£¬Õë¶ÔÅ·ÑÇÕþ¸®½ÌÓý»ú¹¹


11ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÃûÉæÏÓÓëÔ½ÄÏÓйصÄÍþвÐÐΪÕßʹÓÃÃûΪPXA StealerµÄÐÂÐÍPython¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Õë¶ÔÅ·ÖÞºÍÑÇÖÞÕþ¸®¼°½ÌÓý»ú¹¹ÌᳫÐÅÏ¢ÇÔÈ¡»î¶¯¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÄܽâÃÜä¯ÀÀÆ÷Ö÷ÃÜÂ룬£¬£¬£¬£¬£¬ÇÔÈ¡ÔÚÏßÕË»§Æ¾Ö¤¡¢²ÆÎñÐÅÏ¢¡¢ä¯ÀÀÆ÷cookieµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬°üÀ¨ZIPÎļþ¸½¼þ£¬£¬£¬£¬£¬£¬´¥·¢¼ÓÔØÆ÷ºÍÅú´¦Öóͷ£¾ç±¾£¬£¬£¬£¬£¬£¬ÔËÐÐPowerShellÏÂÁîÏÂÔØÓÐÓøºÔز¢°²ÅÅÇÔÈ¡³ÌÐò¡£¡£¡£¡£PXA StealerÌØÊâ¹Ø×¢ÇÔÈ¡Facebook cookie£¬£¬£¬£¬£¬£¬ÓÃÓÚÓëFacebook Ads ManagerºÍGraph API½»»¥ÍøÂçÏêϸÐÅÏ¢¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÆäËûÇÔÈ¡¶ñÒâÈí¼þÈçStrelaStealer¡¢RECORDSTEALER¡¢Rhadamanthys¡¢Amnesia StealerºÍGlove StealerµÈÒ²ÔÚÒ»Ö±Éú³¤ºÍÓ¿ÏÖ£¬£¬£¬£¬£¬£¬Ö¤ÊµÎúÇÔÈ¡¶ñÒâÈí¼þµÄÊ¢ÐС£¡£¡£¡£Ö»¹ÜÖ´·¨²¿·ÖÆð¾¢¹¥»÷£¬£¬£¬£¬£¬£¬µ«´ËÀà»î¶¯ÈÔÒ»Á¬±£´æ¡£¡£¡£¡£


https://thehackernews.com/2024/11/vietnamese-hacker-group-deploys-new-pxa.html


2. GitHubÏîĿƵÔâ¶ñÒâºóÃŹ¥»÷


11ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬GitHubÏîÄ¿Õý³ÉΪ¶ñÒâÌá½»ºÍÀ­È¡ÇëÇóµÄÄ¿µÄ£¬£¬£¬£¬£¬£¬Ö¼ÔÚÏòÕâЩÏîĿעÈëºóÃÅ¡£¡£¡£¡£×î½ü£¬£¬£¬£¬£¬£¬Exo LabsµÄGitHub´æ´¢¿â¾ÍÔâµ½ÁË´ËÀ๥»÷£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÌá½»¿´ËÆÎÞº¦µÄ´úÂë¸ü¸Ä£¬£¬£¬£¬£¬£¬ÊÔͼÔÚ´úÂëÖÐÖ²ÈëºóÃÅ£¬£¬£¬£¬£¬£¬ÒÔÔ¶³ÌÖ´ÐжñÒâ´úÂë¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬¸Ã´úÂë¸ü¸Ä²¢Î´±»Åú×¼ºÏ²¢µ½¹Ù·½´æ´¢¿â¡£¡£¡£¡£¹¥»÷ÕßʹÓõÄGitHubÕË»§¡°evildojo666¡±ÏÖÒѱ»É¾³ý£¬£¬£¬£¬£¬£¬¶ø¸ÃÕË»§Ö¸ÏòµÄÇå¾²Ñо¿Ô±Mike BellÔò·ñ¶¨Óë´ËÊÂÓйØ£¬£¬£¬£¬£¬£¬²¢Éù³Æ×Ô¼ºÔâµ½ÁËð³ä¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÉÐÓÐÆäËûÏîĿҲ³ÉΪÁËÀàËÆµÄ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬°üÀ¨Ê¢ÐеĿªÔ´ÒôƵºÍÊÓÆµÏÂÔØÆ÷¡°yt-dlp¡±¡£¡£¡£¡£ÕâЩ¹¥»÷ÊÂÎñÌáÐÑ¿ªÔ´ÏîĿά»¤ÕßÒª×ÐϸÉó²é´«ÈëµÄÀ­È¡ÇëÇ󣬣¬£¬£¬£¬£¬×ÝÈ»ËüÃÇÀ´×Ô¿´ËÆ¡°ÉÆÒ⡱µÄТ˳Õߣ¬£¬£¬£¬£¬£¬Ò²Ó¦Ê¹ÓÃ×Ô¶¯»¯¹¤¾ßºÍ´ó×ÚÈ˹¤´úÂëÉó²éÀ´È·±£Çå¾²¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/github-projects-targeted-with-malicious-commits-to-frame-researcher/


3. Maxar Space SystemsÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬Ô±¹¤Ð¡ÎÒ˽¼ÒÊý¾ÝÔâÇÔÈ¡


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÎÀÐÇÖÆÔìÉÌMaxar Space SystemsÔâÊܺڿÍÈëÇÖ£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ±¹¤Ð¡ÎÒ˽¼ÒÊý¾Ý±»ÇÔÈ¡¡£¡£¡£¡£ºÚ¿ÍÔÚ2024Äê10ÔÂ11ÈÕ±»·¢Ã÷ǰÒÑÇÖÈë¹«Ë¾ÍøÂçÔ¼Ò»ÖÜʱ¼ä¡£¡£¡£¡£Maxar Space SystemsÊÇÃÀ¹úº½¿Õº½ÌìÒµµÄÖ÷Òª¼ÓÈëÕߣ¬£¬£¬£¬£¬£¬ÒÑÖÆ×÷80¶à¿ÅÔÚ¹ìÎÀÐÇ£¬£¬£¬£¬£¬£¬²¢ÎªNASAµÄPsycheʹÃüºÍArtemisÔÂÇò̽Ë÷ÍýÏëÌṩÁËÒªº¦ÊÖÒÕ¡£¡£¡£¡£Ð¹Â¶µÄÔ±¹¤ÐÅÏ¢°üÀ¨ÐÕÃû¡¢¼ÒÍ¥µØµã¡¢Éç»á°ü¹ÜºÅÂëµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«ÒøÐÐÕË»§ÐÅϢδÊÜÓ°Ïì¡£¡£¡£¡£ÊÜÓ°ÏìÔ±¹¤¿ÉÏíÊÜIDShieldÉí·Ý±£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬¶øÇ°ÈÎÔ±¹¤¿ÉÔÚ»®×¼Ê±¼äÄÚ×¢²áIDXµÄÉí·Ý͵ÇÔ±£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÓÐÐÂÎųƺڿͻ¹Éù³ÆÇÔÈ¡ÁËMaxar Technologies¿ª·¢µÄµØÀí¿Õ¼äÇ鱨ƽ̨GeoHIVEµÄÓû§Èº£¬£¬£¬£¬£¬£¬µ«Maxar TechnologiesÉÐδ¶Ô´Ë½ÒÏþ̸ÂÛ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-space-tech-giant-maxar-discloses-employee-data-breach/


4. ²©Í¨ÖÒÑÔ£ºVMware vCenter ServerÁ½´óÎó²îÕý±»¹¥»÷ÕßʹÓÃ


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬²©Í¨¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬Ö¸³ö¹¥»÷ÕßÕýÔÚʹÓÃVMware vCenter ServerµÄÁ½¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÆäÖÐ֮һΪÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2024-38812£©£¬£¬£¬£¬£¬£¬ÓÉTZLÇå¾²Ñо¿Ö°Ô±ÔÚÖйú2024 Matrix CupºÚ¿Í´óÈüʱ´ú±¨¸æ¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚvCenterµÄDCE/RPCЭÒéʵÏÖÖеĶÑÒç³öÎÊÌ⣬£¬£¬£¬£¬£¬Ó°ÏìVMware vSphereºÍVMware Cloud FoundationµÈ²úÆ·¡£¡£¡£¡£ÁíÒ»¸öÎó²î£¨CVE-2024-38813£©ÎªÈ¨ÏÞÌáÉýÎó²î£¬£¬£¬£¬£¬£¬Í¬ÑùÓɸÃÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÌØÖÆÍøÂçÊý¾Ý°üÌáÉýÖÁrootȨÏÞ¡£¡£¡£¡£²©Í¨È·ÈÏÕâÁ½¸öÎó²îÒѱ»Ê¹Ó㬣¬£¬£¬£¬£¬²¢ÓÚ9ÔÂÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬µ«Ëæºó·¢Ã÷CVE-2024-38812µÄ²¹¶¡²¢Î´ÍêÈ«½â¾öÎÊÌ⣬£¬£¬£¬£¬£¬²¢Ç¿ÁÒ½¨ÒéÖÎÀíÔ±Ó¦ÓÃв¹¶¡¡£¡£¡£¡£ÊÜÓ°Ïì¿Í»§Ó¦Á¬Ã¦Ó¦ÓÃ×îиüÐÂÒÔÌá·À¹¥»÷¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬²©Í¨»¹Ðû²¼ÁËÔö²¹Í¨¸æ£¬£¬£¬£¬£¬£¬Ìṩ¸ü¶àÇå¾²¸üÐÂÐÅÏ¢ºÍ¿ÉÄÜÓ°ÏìÒÑÉý¼¶Óû§µÄÒÑÖªÎÊÌâ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-vmware-vcenter-server-now-exploited-in-attacks/


5. DocuSignÍøÂç´¹ÂÚÕ©Æ­¼¤Ôö£¬£¬£¬£¬£¬£¬Ã°³äÃÀÕþ¸®»ú¹¹ÇÔÈ¡Êý¾Ý


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬DocuSignÍøÂç´¹ÂÚÕ©Æ­ÊýÄ¿½üÆÚ¼¤Ôö98%£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÐÅÈÎÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬Ã°³äÃÀ¹úÕþ¸®»ú¹¹ÈçÎÀÉúÓ빫ÖÚЧÀͲ¿(HHS)ºÍÂíÀïÀ¼Öݽ»Í¨²¿(MDOT)µÈ·¢ËÍ´¹ÂÚURL¡£¡£¡£¡£ÕâЩ´¹ÂÚURL±»Éè¼Æ³ÉÄ£Äâ¹Ù·½Í¨Ñ¶£¬£¬£¬£¬£¬£¬Ê¹ÓÃÕæÕýµÄDocuSignÕÊ»§ºÍAPIαװ³ÉÕæÊµÇëÇ󡣡£¡£¡£Ò»µ©Ä¿µÄ·­¿ª¶ñÒâÎĵµ£¬£¬£¬£¬£¬£¬¾Í»á±»ÒªÇóÌṩÃô¸ÐÐÅÏ¢»òÊÚȨڲƭÉúÒâ¡£¡£¡£¡£ÓÉÓÚÇëÇó¿´Ëƹٷ½£¬£¬£¬£¬£¬£¬ÊÕ¼þÈ˸ü¿ÉÄÜδ¾­³¹µ×ÑéÖ¤¾Í×ñÊØÇëÇ󣬣¬£¬£¬£¬£¬Î£¼°¹«Ë¾Çå¾²¡£¡£¡£¡£ÃÀ¹ú¹«Ãñ¡¢Õþ¸®»ú¹¹ºÍÊÐÕþ°ì¹«ÊÒÊÇÕâЩ¹¥»÷µÄÖ÷ҪĿµÄ¡£¡£¡£¡£×¨¼Ò½¨ÒéÆóҵʵÑé¶à²ãÇå¾²Õ½ÂÔ£¬£¬£¬£¬£¬£¬ÓÉÓÚÊܺ¦Õß×ñÕÕµÄÊÇËûÃǽÓÊܹýÅàѵ²¢±»ÆÚÍû×ñÕÕµÄÁ÷³Ì£¬£¬£¬£¬£¬£¬ÎÊÌâÔÚÓÚÎÞ·¨ÑéÖ¤ÇëÇóȪԴ£¬£¬£¬£¬£¬£¬ÐèÒªÖØÐÂ˼Á¿ÔõÑùÌṩÊðÃûÇëÇ󣬣¬£¬£¬£¬£¬²¢¿ÉÄܽÓÄÉǿʢµÄÉí·ÝÑéÖ¤ÒªÁì¡£¡£¡£¡£


https://hackread.com/us-govt-agencies-impersonate-docusign-phishing-scams/


6. ÃÀÒûÓÃˮϵͳ´æÍøÂçÇå¾²Îó²î£¬£¬£¬£¬£¬£¬»òÖÂЧÀÍÖÐÖ¹


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÇéÐα£»£»£»¤Êð£¨EPA£©¼à²ì³¤°ì¹«ÊÒ£¨OIG£©Ðû²¼µÄб¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬ÎªÃÀ¹úÔ¼1.1ÒÚÈËÌṩЧÀ͵Ä300¶à¸öÒûÓÃˮϵͳ±£´æÎó²î£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂЧÀÍÖÐÖ¹¡£¡£¡£¡£ÆÀ¹Àº­¸Ç1062¸öÒûÓÃˮϵͳ£¬£¬£¬£¬£¬£¬·¢Ã÷ÆäÖÐËÄ·ÖÖ®Ò»¿ÉÄܳÉΪ¹¥»÷Êܺ¦Õߣ¬£¬£¬£¬£¬£¬µ¼Ö¹¦Ð§Ëðʧ¡¢¾Ü¾øÐ§À͵ÈÇéÐμ°¿Í»§ÐÅϢй¶¡£¡£¡£¡£97¸ö¹©Ë®ÏµÍ³±£´æÑÏÖØºÍ¸ß¶ÈÑÏÖØÎÊÌ⣬£¬£¬£¬£¬£¬ÁýÕÖÔ¼2700ÍòÈË£»£»£»211¸öϵͳÊÜÖжȺ͵ͶÈȱÏÝÓ°Ï죬£¬£¬£¬£¬£¬ÁýÕÖÔ¼8300ÍòÈË¡£¡£¡£¡£OIGÖ¸³ö£¬£¬£¬£¬£¬£¬Èô¶ñÒâÐÐΪÕßʹÓÃÎó²î£¬£¬£¬£¬£¬£¬¿ÉÄÜÆÆËðЧÀÍ»òÔì³ÉÎïÀíË𻵡£¡£¡£¡£ÆÀ¹ÀÉæ¼°Áè¼Ý75000¸öIPºÍ14400¸öÓòµÄÆÊÎö¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬EPAȱ·¦Ïò¸Ã»ú¹¹×ª´ïÍøÂçÇå¾²ÊÂÎñµÄ±¨¸æÏµÍ³£¬£¬£¬£¬£¬£¬²¢ÒÀÀµÆäËû»ú¹¹¾ÙÐдËÀ౨¸æ£¬£¬£¬£¬£¬£¬Í¬Ê±È±·¦ÓëÆäËûÁª°îºÍÖÝÕþ¸®µÄЭµ÷¼Í¼¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬ÒÑÓÐË®Îñ¹«Ë¾ÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ«¹©Ë®Ð§ÀÍδÊÜÓ°Ïì¡£¡£¡£¡£½ñÄê5Ô£¬£¬£¬£¬£¬£¬EPAÔøÖÒÑÔ³¬70%¹©Ë®ÏµÍ³²»Çкϡ¶Çå¾²ÒûÓÃË®·¨¡·£¬£¬£¬£¬£¬£¬±£´æÑÏÖØÇå¾²ÎÊÌâ¡£¡£¡£¡£


https://www.securityweek.com/300-drinking-water-systems-in-us-exposed-to-disruptive-damaging-hacker-attacks/