Î÷ÑÅͼ¸ÛºÍÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡ÒÉÔâÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2024-08-26
1. Î÷ÑÅͼ¸ÛºÍÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡ÒÉÔâÍøÂç¹¥»÷


8ÔÂ25ÈÕ£¬ £¬£¬£¬£¬£¬£¬Î÷ÑÅͼ¸ÛÓëÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡Í¬Ê±ÔËÓª£¬ £¬£¬£¬£¬£¬£¬½üÆÚÔâÓöÁËÑÏÖØµÄÐÅϢϵͳÌôÕ½£¬ £¬£¬£¬£¬£¬£¬ÒÉËÆÔâÓöÁËÍøÂç¹¥»÷¡£¡£¡£ÖÜÁùÇåÔ磬 £¬£¬£¬£¬£¬£¬¿Ú°¶Ê×ÏÈͨ¹ýÉ罻ýÌåÆ½Ì¨×ª´ïÁËЧÀÍÖÐÖ¹µÄÇéÐΣ¬ £¬£¬£¬£¬£¬£¬Ëæºó»ú³¡¹Ù·½È·ÈÏÔâÓöÁËϵͳÖÐÖ¹£¬ £¬£¬£¬£¬£¬£¬²¢ÌåÏÖÕâ¿ÉÄÜÔ´ÓÚÒ»´ÎÍøÂç¹¥»÷¡£¡£¡£Ëæ×ÅÊÂ̬Éú³¤ÖÁÖÜÁùÍí¼ä£¬ £¬£¬£¬£¬£¬£¬»ú³¡·½ÃæÌåÏÖЧÀÍÖÐֹ״̬ÒÀ¾Éδ½â£¬ £¬£¬£¬£¬£¬£¬ÇÒÎÞ·¨Ã÷È·¸ø³ö»Ö¸´ÖÜȫЧÀ͵Äʱ¼ä±í¡£¡£¡£ÃæÁÙÕâһͻ·¢×´Ì¬£¬ £¬£¬£¬£¬£¬£¬»ú³¡·½ÃæÆð¾¢Ó¦¶Ô£¬ £¬£¬£¬£¬£¬£¬½¨ÒéÓοÍʹÓú½¿Õ¹«Ë¾ÌṩµÄÊÖ»úÓ¦ÓóÌÐò°ìÀíµÇ»úÊÖÐø²¢´òÓ¡µÇ»úÅÆ¼°ÐÐÀî±êÇ©£¬ £¬£¬£¬£¬£¬£¬Í¬Ê±ÌáÐÑÂÿÍÌáǰµÖ´ï»ú³¡ÒÔÓ¦¶Ô¿ÉÄܵÄÑÓÎ󡣡£¡£¾ÝTechCrunchµÄÊÖÒÕÆÊÎö£¬ £¬£¬£¬£¬£¬£¬×èÖ¹ÖÜÈÕ̫ƽÑóʱ¼äÔ糿£¬ £¬£¬£¬£¬£¬£¬Î÷ÑÅͼ¸Û¶ÔÍâЧÀ͵ÄÍøÂç»ù´¡ÉèÊ©£¬ £¬£¬£¬£¬£¬£¬ÓÈÆäÊÇÆä¹Ù·½ÍøÕ¾£¬ £¬£¬£¬£¬£¬£¬ÈÔ´¦ÓÚ²»¿É»á¼ûµÄÀëÏß״̬£¬ £¬£¬£¬£¬£¬£¬ÏÔʾ³ö´Ë´ÎÍøÂç¹¥»÷¶Ô¿Ú°¶¼°»ú³¡ÔËÓªÔì³ÉÁËÏÔÖøÓ°Ïì¡£¡£¡£


https://techcrunch.com/2024/08/25/the-port-of-seattle-and-sea-tac-airport-say-theyve-been-hit-by-possible-cyberattack/


2. PEAKLIGHT ¶ñÒâÈí¼þ£ºÒ»ÖÖÐÂÐÍÒþÃØÄÚ´æÍþв·ºÆð


8ÔÂ24ÈÕ£¬ £¬£¬£¬£¬£¬£¬MandiantµÄÍøÂçÇå¾²ÍÅ¶Ó½ÒÆÆÁËÒ»ÖÖÃûΪPEAKLIGHTµÄÖØ´óÐÂÐͶñÒâÈí¼þ£¬ £¬£¬£¬£¬£¬£¬Ëüͨ¹ýһϵÁÐÈ«ÐÄÉè¼ÆµÄ¶à½×¶ÎѬȾÀú³Ì£¬ £¬£¬£¬£¬£¬£¬ÇÄÎÞÉùÏ¢µØÔÚÊܺ¦ÕßµÄϵͳÖÐÈö²¥°üÀ¨LUMMAC.V2¡¢SHADOWLADDERºÍCRYPTBOTÔÚÄڵĶàÖÖÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£PEAKLIGHTµÄÈëÇÖʼÓÚαװ³ÉµÁ°æÓ°Ï·µÄ¶ñÒâZIPÎļþ£¬ £¬£¬£¬£¬£¬£¬ÄÚº¬Î±×°³ÉýÌåͼ±êµÄLNK¿ì½Ý·½·¨Îļþ£¬ £¬£¬£¬£¬£¬£¬ÓÕµ¼Óû§Ö´ÐÐǶÈëµÄPowerShell¾ç±¾£¬ £¬£¬£¬£¬£¬£¬½ø¶øÏÂÔØ²¢Ö´ÐÐÄÚ´æÖеÄJavaScriptÖ²Èë³ÌÐò¡£¡£¡£¸ÃÖ²Èë³ÌÐòʹÓÃÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©Íйܣ¬ £¬£¬£¬£¬£¬£¬²¢½ÓÄÉ»ìÏýÊÖÒÕ¹æ±Ü¼ì²â£¬ £¬£¬£¬£¬£¬£¬×îÖÕÏÂÔØ²¢Ö´ÐÐPEAKLIGHTÏÂÔØ³ÌÐò£¬ £¬£¬£¬£¬£¬£¬¸Ã³ÌÐòƾ֤ϵͳÇéÐÎÏÂÔØÌØÁíÍâ¶ñÒâ¸ºÔØ¡£¡£¡£PEAKLIGHT±äÖÖ¶àÑù£¬ £¬£¬£¬£¬£¬£¬µ«½¹µãÄ¿µÄÒ»Ö£ºÒþ²ØµØ°²ÅÅÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£¡£¡£ÆÊÎöÏÔʾ£¬ £¬£¬£¬£¬£¬£¬PEAKLIGHTÏÂÔØµÄZIPÎļþ°üÀ¨SHADOWLADDERºÍCRYPTBOTµÈ¶ñÒâÈí¼þ£¬ £¬£¬£¬£¬£¬£¬Í¬Ê±Ê¹ÓÃÕýµ±ÊÓÆµÎļþ×÷ΪÓÕ¶ü¡£¡£¡£MandiantÇ¿µ÷£¬ £¬£¬£¬£¬£¬£¬´ËÀ๥»÷͹ÏÔÁ˼á³ÖСÐÄ¡¢½ÓÄɶàÌõÀíÇå¾²²½·¥µÄÖ÷ÒªÐÔ£¬ £¬£¬£¬£¬£¬£¬°üÀ¨Èí¼þ¸üС¢Ç¿ÃÜÂëºÍ¶àÒòËØÈÏÖ¤£¬ £¬£¬£¬£¬£¬£¬ÒÔ¼°°²ÅÅÓÐÓõĶ˵㱣»£»£»£»£»¤¡£¡£¡£


https://securityonline.info/peaklight-malware-a-new-stealthy-memory-only-threat-emerges/


3. CISAÖÒÑÔVersa NetworksÎó²îCVE-2024-39717Õý±»Æð¾¢Ê¹ÓÃ


8ÔÂ23ÈÕ£¬ £¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½üÆÚ½ôÆÈÐû²¼Á˹ØÓÚCVE-2024-39717Îó²îµÄÇå¾²¾¯±¨£¬ £¬£¬£¬£¬£¬£¬Ö¸³ö¸Ã¸ßÑÏÖØÐÔÎó²îÕý±»Æð¾¢Ê¹Ó㬠£¬£¬£¬£¬£¬£¬¶ÔʹÓÃVersa Networks Director GUIµÄϵͳ×é³ÉÖØ´óÍþв¡£¡£¡£´ËÎó²îÔÊÐí¾ßÓи߼¶ÖÎÀíȨÏÞµÄÓû§Í¨¹ýÉÏ´«Î±×°Îª.pngͼƬµÄ¶ñÒâÎļþ£¬ £¬£¬£¬£¬£¬£¬½ø¶ø¿ÉÄÜ»ñȡδÊÚȨ»á¼ûȨÏÞ»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ÕâÒ»Îó²îµÄÑÏÖØÐÔÔÚÓÚ£¬ £¬£¬£¬£¬£¬£¬ËüÒÑÈ·Èϱ»Ò°Íâ¹¥»÷ÕßʹÓ㬠£¬£¬£¬£¬£¬£¬²¿·ÖÔµ¹ÊÔ­ÓÉÊǿͻ§Î´×ñÕÕ֮ǰÐû²¼µÄ·À»ðǽָÄÏ¡£¡£¡£Ö»¹Ü¸Ã¶ñÒâÎļþÔÚ´ó¶¼Ö÷Á÷ä¯ÀÀÆ÷ÉÏÎÞ·¨Ö±½ÓÖ´ÐУ¬ £¬£¬£¬£¬£¬£¬µ«Ç±ÔÚµÄʹÓÃʵÀý¼°Î´Ö¤ÊµµÄ±¨¸æÈÔÅúעΣº¦Ò»Á¬±£´æ¡£¡£¡£CISAÒѽ«CVE-2024-39717ÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬ £¬£¬£¬£¬£¬£¬²¢±Þ²ßÁª°î»ú¹¹ÔÚ2024Äê9ÔÂ13ÈÕǰ°²ÅÅ×îÐÂÇå¾²²¹¶¡£¡£¡£¬ £¬£¬£¬£¬£¬£¬ÒÔÌá·ÀDZÔÚµÄÍøÂç¹¥»÷¡£¡£¡£Òò´Ë£¬ £¬£¬£¬£¬£¬£¬ËùÓÐʹÓÃVersa Networks Director GUIµÄ×é֯ӦѸËÙÉó²é²¢ÔöÇ¿ÆäÇ徲ЭÒ飬 £¬£¬£¬£¬£¬£¬Í¬Ê±Á¬Ã¦Ó¦ÓÃËùÓпÉÓõÄÇå¾²²¹¶¡ºÍ¸üУ¬ £¬£¬£¬£¬£¬£¬ÒÔÈ·±£ÍøÂçÇå¾²ÃâÊÜ´ËÎó²îµÄË𺦡£¡£¡£


https://securityonline.info/cve-2024-39717-versa-networks-director-gui-flaw-under-active-attack-cisa-issues-urgent-patching-directive/


4. еÄmacOS¶ñÒâÈí¼þCthulhu StealerÃé×¼AppleÓû§Êý¾Ý


8ÔÂ23ÈÕ£¬ £¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÕë¶ÔApple macOSµÄÐÂÐÍÐÅÏ¢ÇÔÈ¡³ÌÐòCthulhu Stealer£¬ £¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ×Ô2023Äêµ×ÆðÒÔÿÔÂ500ÃÀÔªµÄMaaS£¨¶ñÒâÈí¼þ¼´Ð§ÀÍ£©Ä£Ê½Ìṩ£¬ £¬£¬£¬£¬£¬£¬¿É¿çx86_64ÓëArm¼Ü¹¹ÔËÐС£¡£¡£Cthulhu Stealerαװ³ÉÕýµ±Èí¼þÈçCleanMyMacµÈ£¬ £¬£¬£¬£¬£¬£¬Ê¹ÓÃÓû§ÐÅÈÎÈÆ¹ýGatekeeper±£»£»£»£»£»¤£¬ £¬£¬£¬£¬£¬£¬ÓÕµ¼Óû§ÊäÈëÃÜÂ룬 £¬£¬£¬£¬£¬£¬½øÒ»²½ÇÔÈ¡MetaMaskÃÜÂë¡¢iCloud Keychain¼°ä¯ÀÀÆ÷cookieµÈÃô¸ÐÊý¾Ý¡£¡£¡£Ëü»¹Ê¹ÓÃChainbreakerµÈ¹¤¾ßÍøÂçϵͳÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬²¢½«Êý¾ÝѹËõºó·¢ËÍÖÁC2ЧÀÍÆ÷¡£¡£¡£Ö»¹ÜCthulhu StealerÔÚÊÖÒÕÉϲ¢²»ÖØ´ó£¬ £¬£¬£¬£¬£¬£¬È±·¦¸ß¼¶·´ÆÊÎöÊֶΣ¬ £¬£¬£¬£¬£¬£¬µ«ËüչʾÁËÍþвÐÐΪÕßÈÕÒæ¹Ø×¢macOSµÄÇ÷ÊÆ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ±³ºóµÄ¿ª·¢ÕßÒòÄÚ²¿¾À·×ÒÑÍ˳öÊг¡£¡£¡£¬ £¬£¬£¬£¬£¬£¬µ«Õâ²¢²»É¨³ýδÀ´ÀàËÆÍþвµÄÔÙÏÖ¡£¡£¡£ÃæÁÙÕâһΣº¦£¬ £¬£¬£¬£¬£¬£¬Æ»¹û¹«Ë¾ÒѽÓÄɲ½·¥£¬ £¬£¬£¬£¬£¬£¬ÍýÏëÔÚmacOS SequoiaÖÐÔöÇ¿¶ÔδÊðÃû»òδ¹«Ö¤Èí¼þµÄÏÞÖÆ£¬ £¬£¬£¬£¬£¬£¬Óû§Ðèͨ¹ýϵͳÉèÖöø·Ç¼òÆÓ²Ù×÷À´ÔÊÐíÈí¼þÔËÐУ¬ £¬£¬£¬£¬£¬£¬ÒÔÌá¸ßϵͳÇå¾²ÐÔ¡£¡£¡£Í¬Ê±£¬ £¬£¬£¬£¬£¬£¬×¨¼Ò½¨ÒémacOSÓû§½ö´Ó¿ÉÐÅȪԴÏÂÔØÈí¼þ£¬ £¬£¬£¬£¬£¬£¬¼á³Öϵͳ¸üÐÂÖÁ×îа汾¡£¡£¡£


https://thehackernews.com/2024/08/new-macos-malware-cthulhu-stealer.html?&web_view=true


5. QilinÀÕË÷Èí¼þж¯Ïò£ºÇÔÈ¡Chromeƾ֤


8ÔÂ23ÈÕ£¬ £¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²ÁìÓò·ºÆðÁËÒ»ÆðÒýÈËעĿµÄQilinÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ¡£¡£¡£¾ÝSophosÍøÂçÇå¾²¹«Ë¾±¨¸æ£¬ £¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷²»µ«ÏÞÓڹŰåµÄÎļþ¼ÓÃÜÓëÀÕË÷£¬ £¬£¬£¬£¬£¬£¬»¹ÓÐÊýµØÁ¬ÏµÁËÆ¾Ö¤ÍøÂçÊֶΣ¬ £¬£¬£¬£¬£¬£¬¶ÔÊܺ¦ÕßµÄGoogle Chromeä¯ÀÀÆ÷ÖеÄÃô¸ÐÐÅÏ¢×é³ÉÍþв¡£¡£¡£¹¥»÷ÕßʹÓÃVPNÃÅ»§Ð¹Â¶µÄ¡¢È±·¦¶àÒòËØÈÏÖ¤µÄƾ֤£¬ £¬£¬£¬£¬£¬£¬ÀÖ³ÉÉøÍ¸Ä¿µÄÍøÂ磬 £¬£¬£¬£¬£¬£¬²¢ÔÚÊ×´ÎÈëÇÖºóDZÔÚ18Ìì¾ÙÐÐÉî¶ÈºóʹÓᣡ£¡£¹¥»÷ÕßÇÉÃîµØ±à¼­ÁËÓò¿ØÖÆÆ÷ÖеÄĬÈÏÓòÕ½ÂÔ£¬ £¬£¬£¬£¬£¬£¬ÒýÈëÁËÁ½¸öÒªº¦¾ç±¾£ºÒ»ÊÇÓÃÓÚËѼ¯Chromeä¯ÀÀÆ÷´æ´¢Æ¾Ö¤µÄPowerShell¾ç±¾¡°IPScanner.ps1¡±£¬ £¬£¬£¬£¬£¬£¬¶þÊÇ´¥·¢¸Ã¾ç±¾Ö´ÐеÄÅú´¦Öóͷ£Îļþ¡°logon.bat¡±¡£¡£¡£ÕâЩ¾ç±¾Í¨¹ýµÇ¼ʱµÄ×éÕ½ÂÔ¹¤¾ß£¨GPO£©×Ô¶¯Ö´ÐУ¬ £¬£¬£¬£¬£¬£¬Ê¹µÃÿ´ÎÓû§µÇ¼ʱ¶¼¿ÉÄÜÔÚ²»ÖªÇéµÄÇéÐÎÏ´¥·¢Æ¾Ö¤ÇÔÈ¡£¡£¡£¬ £¬£¬£¬£¬£¬£¬Ò»Á¬ÈýÌìÖ®¾Ã£¬ £¬£¬£¬£¬£¬£¬¼«´óµØÔöÌíÁËÐÅϢй¶µÄΣº¦¡£¡£¡£Ëæºó£¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õß²»µ«¼ÓÃÜÁËÎļþ¡¢°²ÅÅÀÕË÷ÐÅ£¬ £¬£¬£¬£¬£¬£¬»¹ÇÔÈ¡ÁËÍøÂçµ½µÄƾ֤£¬ £¬£¬£¬£¬£¬£¬²¢É¨³ý»î¶¯ºÛ¼£¡£¡£¡£Chromeƾ֤µÄʧÔôÆÈʹÊܺ¦ÕßÐèÔÚ¶à¸öµÚÈý·½Ð§ÀÍÉÏÖØÖÃÕË»§ÃÜÂ룬 £¬£¬£¬£¬£¬£¬½øÒ»²½¼Ó¾çÁËÊÂÎñµÄÖØ´óÐÔºÍÓ°Ïì¹æÄ£¡£¡£¡£


https://thehackernews.com/2024/08/new-qilin-ransomware-attack-uses-vpn.html


6. Android¶ñÒâÈí¼þNGateʹÓÃNFCÊÖÒÕÓÃÓÚATMÈ¡¿î


8ÔÂ23ÈÕ£¬ £¬£¬£¬£¬£¬£¬ÔÚÒÑÍù¾Å¸öÔÂÖУ¬ £¬£¬£¬£¬£¬£¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESET½ÒÆÆÁËÒ»ÆðÕë¶Ô½Ý¿ËÈý¼ÒÒøÐеÄÖØ´óÍøÂç·¸·¨»î¶¯¡£¡£¡£·¸·¨·Ö×ÓʹÓÃÃûΪNGateµÄ¶ñÒâÈí¼þ£¬ £¬£¬£¬£¬£¬£¬Í¨¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÓʼþÓÕÆ­Android×°±¸Óû§ÏÂÔØÎ±×°³ÉÒøÐÐÓ¦ÓõĶñÒâ³ÌÐò¡£¡£¡£Õâ¿îÈí¼þ²»µ«ÄÜÇÔÈ¡Óû§µÄÒøÐÐÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬»¹½ÓÄÉÁËÒ»ÖÖØ¨¹ÅδÓеÄNFCÖмÌÊÖÒÕ£¬ £¬£¬£¬£¬£¬£¬ÄÜ´ÓÊܺ¦ÕßµÄʵÌåÖ§¸¶¿¨ÖÐÔ¶³Ì´«Êä½ü³¡Í¨Ñ¶Êý¾ÝÖÁ¹¥»÷Õß×°±¸£¬ £¬£¬£¬£¬£¬£¬½ø¶øÖ´ÐÐATMÉúÒâ»ò×ªÒÆ×ʽ𡣡£¡£´Ë¶ñÒâÈí¼þ´ÓδÉϼÜGoogle PlayÊÐËÁ£¬ £¬£¬£¬£¬£¬£¬Ö÷Ҫͨ¹ý´¹ÂÚÓʼþÖеķǹٷ½Á´½ÓÈö²¥¡£¡£¡£Êܺ¦Õß±»ÓÕµ¼¿ªÆôNFC¹¦Ð§²¢°²ÅÅÖ§¸¶¿¨ÓÚÊÖ»ú±³²¿£¬ £¬£¬£¬£¬£¬£¬ÒÔÍê³É¿¨ÐÅÏ¢µÄ²»·¨»ñÈ¡¡£¡£¡£ESET×Ô2023Äê11ÔÂÆð×·×Ù¸Ã×éÖ¯£¬ £¬£¬£¬£¬£¬£¬·¢Ã÷Æä»î¶¯ÔÚÒ»Ãû³ÉÔ±±»²¶ºó¶ÌÔÝÕϰ­£¬ £¬£¬£¬£¬£¬£¬µ«´ËÀàAndroid¶ñÒâÈí¼þµÄй¦Ð§ÈÔÊôÊ×´ÎÔÚÒ°Íâ±»·¢Ã÷¡£¡£¡£×¨¼ÒÖÒÑÔ¹«ÖÚÐèÌá¸ßСÐÄ£¬ £¬£¬£¬£¬£¬£¬¼ì²éÍøÕ¾URL¡¢Í×ÉÆ±£¹ÜPINÂ룬 £¬£¬£¬£¬£¬£¬²¢ÔÚ·ÇÐëҪʱ¹Ø±ÕNFC¹¦Ð§£¬ £¬£¬£¬£¬£¬£¬ÍƼöʹÓÃÐéÄ⿨ÒÔïÔ̭Σº¦¡£¡£¡£


https://therecord.media/android-malware-atm-stealing-czech-banks