Ô½ÄϺڿÍ×éÖ¯°²ÅÅPXA Stealer£¬£¬£¬£¬ £¬£¬Õë¶ÔÅ·ÑÇÕþ¸®½ÌÓý»ú¹¹

Ðû²¼Ê±¼ä 2024-11-19

1. Ô½ÄϺڿÍ×éÖ¯°²ÅÅPXA Stealer£¬£¬£¬£¬ £¬£¬Õë¶ÔÅ·ÑÇÕþ¸®½ÌÓý»ú¹¹


11ÔÂ15ÈÕ£¬£¬£¬£¬ £¬£¬Ò»ÃûÉæÏÓÓëÔ½ÄÏÓйصÄÍþвÐÐΪÕßʹÓÃÃûΪPXA StealerµÄÐÂÐÍPython¶ñÒâÈí¼þ£¬£¬£¬£¬ £¬£¬Õë¶ÔÅ·ÖÞºÍÑÇÖÞÕþ¸®¼°½ÌÓý»ú¹¹ÌᳫÐÅÏ¢ÇÔÈ¡»î¶¯¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÄܽâÃÜä¯ÀÀÆ÷Ö÷ÃÜÂ룬£¬£¬£¬ £¬£¬ÇÔÈ¡ÔÚÏßÕË»§Æ¾Ö¤¡¢²ÆÎñÐÅÏ¢¡¢ä¯ÀÀÆ÷cookieµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬ £¬£¬°üÀ¨ZIPÎļþ¸½¼þ£¬£¬£¬£¬ £¬£¬´¥·¢¼ÓÔØÆ÷ºÍÅú´¦Öóͷ£¾ç±¾£¬£¬£¬£¬ £¬£¬ÔËÐÐPowerShellÏÂÁîÏÂÔØÓÐÓøºÔز¢°²ÅÅÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¡£PXA StealerÌØÊâ¹Ø×¢ÇÔÈ¡Facebook cookie£¬£¬£¬£¬ £¬£¬ÓÃÓÚÓëFacebook Ads ManagerºÍGraph API½»»¥ÍøÂçÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬ÆäËûÇÔÈ¡¶ñÒâÈí¼þÈçStrelaStealer¡¢RECORDSTEALER¡¢Rhadamanthys¡¢Amnesia StealerºÍGlove StealerµÈÒ²ÔÚÒ»Ö±Éú³¤ºÍÓ¿ÏÖ£¬£¬£¬£¬ £¬£¬Ö¤ÊµÎúÇÔÈ¡¶ñÒâÈí¼þµÄÊ¢ÐС£¡£¡£¡£¡£¡£Ö»¹ÜÖ´·¨²¿·ÖÆð¾¢¹¥»÷£¬£¬£¬£¬ £¬£¬µ«´ËÀà»î¶¯ÈÔÒ»Á¬±£´æ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2024/11/vietnamese-hacker-group-deploys-new-pxa.html


2. GitHubÏîĿƵÔâ¶ñÒâºóÃŹ¥»÷


11ÔÂ16ÈÕ£¬£¬£¬£¬ £¬£¬GitHubÏîÄ¿Õý³ÉΪ¶ñÒâÌá½»ºÍÀ­È¡ÇëÇóµÄÄ¿µÄ£¬£¬£¬£¬ £¬£¬Ö¼ÔÚÏòÕâЩÏîĿעÈëºóÃÅ¡£¡£¡£¡£¡£¡£×î½ü£¬£¬£¬£¬ £¬£¬Exo LabsµÄGitHub´æ´¢¿â¾ÍÔâµ½ÁË´ËÀ๥»÷£¬£¬£¬£¬ £¬£¬¹¥»÷Õßͨ¹ýÌá½»¿´ËÆÎÞº¦µÄ´úÂë¸ü¸Ä£¬£¬£¬£¬ £¬£¬ÊÔͼÔÚ´úÂëÖÐÖ²ÈëºóÃÅ£¬£¬£¬£¬ £¬£¬ÒÔÔ¶³ÌÖ´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ £¬£¬¸Ã´úÂë¸ü¸Ä²¢Î´±»Åú×¼ºÏ²¢µ½¹Ù·½´æ´¢¿â¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓõÄGitHubÕË»§¡°evildojo666¡±ÏÖÒѱ»É¾³ý£¬£¬£¬£¬ £¬£¬¶ø¸ÃÕË»§Ö¸ÏòµÄÇå¾²Ñо¿Ô±Mike BellÔò·ñ¶¨Óë´ËÊÂÓйأ¬£¬£¬£¬ £¬£¬²¢Éù³Æ×Ô¼ºÔâµ½ÁËð³ä¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬ÉÐÓÐÆäËûÏîĿҲ³ÉΪÁËÀàËÆµÄ¹¥»÷Ä¿µÄ£¬£¬£¬£¬ £¬£¬°üÀ¨Ê¢ÐеĿªÔ´ÒôƵºÍÊÓÆµÏÂÔØÆ÷¡°yt-dlp¡±¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÊÂÎñÌáÐÑ¿ªÔ´ÏîĿά»¤ÕßÒª×ÐϸÉó²é´«ÈëµÄÀ­È¡ÇëÇ󣬣¬£¬£¬ £¬£¬×ÝÈ»ËüÃÇÀ´×Ô¿´ËÆ¡°ÉÆÒ⡱µÄТ˳Õߣ¬£¬£¬£¬ £¬£¬Ò²Ó¦Ê¹ÓÃ×Ô¶¯»¯¹¤¾ßºÍ´ó×ÚÈ˹¤´úÂëÉó²éÀ´È·±£Çå¾²¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/github-projects-targeted-with-malicious-commits-to-frame-researcher/


3. Maxar Space SystemsÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬ £¬£¬Ô±¹¤Ð¡ÎÒ˽¼ÒÊý¾ÝÔâÇÔÈ¡


11ÔÂ18ÈÕ£¬£¬£¬£¬ £¬£¬ÃÀ¹úÎÀÐÇÖÆÔìÉÌMaxar Space SystemsÔâÊܺڿÍÈëÇÖ£¬£¬£¬£¬ £¬£¬µ¼ÖÂÔ±¹¤Ð¡ÎÒ˽¼ÒÊý¾Ý±»ÇÔÈ¡¡£¡£¡£¡£¡£¡£ºÚ¿ÍÔÚ2024Äê10ÔÂ11ÈÕ±»·¢Ã÷ǰÒÑÇÖÈë¹«Ë¾ÍøÂçÔ¼Ò»ÖÜʱ¼ä¡£¡£¡£¡£¡£¡£Maxar Space SystemsÊÇÃÀ¹úº½¿Õº½ÌìÒµµÄÖ÷Òª¼ÓÈëÕߣ¬£¬£¬£¬ £¬£¬ÒÑÖÆ×÷80¶à¿ÅÔÚ¹ìÎÀÐÇ£¬£¬£¬£¬ £¬£¬²¢ÎªNASAµÄPsycheʹÃüºÍArtemisÔÂÇò̽Ë÷ÍýÏëÌṩÁËÒªº¦ÊÖÒÕ¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÔ±¹¤ÐÅÏ¢°üÀ¨ÐÕÃû¡¢¼ÒÍ¥µØµã¡¢Éç»á°ü¹ÜºÅÂëµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬ £¬£¬µ«ÒøÐÐÕË»§ÐÅϢδÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìÔ±¹¤¿ÉÏíÊÜIDShieldÉí·Ý±£»£»£»£»£»£» £»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬ £¬£¬¶øÇ°ÈÎÔ±¹¤¿ÉÔÚ»®×¼Ê±¼äÄÚ×¢²áIDXµÄÉí·Ý͵ÇÔ±£»£»£»£»£»£» £»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬ÓÐÐÂÎųƺڿͻ¹Éù³ÆÇÔÈ¡ÁËMaxar Technologies¿ª·¢µÄµØÀí¿Õ¼äÇ鱨ƽ̨GeoHIVEµÄÓû§Èº£¬£¬£¬£¬ £¬£¬µ«Maxar TechnologiesÉÐδ¶Ô´Ë½ÒÏþ̸ÂÛ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-space-tech-giant-maxar-discloses-employee-data-breach/


4. ²©Í¨ÖÒÑÔ£ºVMware vCenter ServerÁ½´óÎó²îÕý±»¹¥»÷ÕßʹÓÃ


11ÔÂ18ÈÕ£¬£¬£¬£¬ £¬£¬²©Í¨¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬£¬ £¬£¬Ö¸³ö¹¥»÷ÕßÕýÔÚʹÓÃVMware vCenter ServerµÄÁ½¸öÇå¾²Îó²î£¬£¬£¬£¬ £¬£¬ÆäÖÐ֮һΪÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2024-38812£©£¬£¬£¬£¬ £¬£¬ÓÉTZLÇå¾²Ñо¿Ö°Ô±ÔÚÖйú2024 Matrix CupºÚ¿Í´óÈüʱ´ú±¨¸æ¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚvCenterµÄDCE/RPCЭÒéʵÏÖÖеĶÑÒç³öÎÊÌ⣬£¬£¬£¬ £¬£¬Ó°ÏìVMware vSphereºÍVMware Cloud FoundationµÈ²úÆ·¡£¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²î£¨CVE-2024-38813£©ÎªÈ¨ÏÞÌáÉýÎó²î£¬£¬£¬£¬ £¬£¬Í¬ÑùÓɸÃÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬ £¬£¬¹¥»÷Õß¿ÉʹÓÃÌØÖÆÍøÂçÊý¾Ý°üÌáÉýÖÁrootȨÏÞ¡£¡£¡£¡£¡£¡£²©Í¨È·ÈÏÕâÁ½¸öÎó²îÒѱ»Ê¹Ó㬣¬£¬£¬ £¬£¬²¢ÓÚ9ÔÂÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬ £¬£¬µ«Ëæºó·¢Ã÷CVE-2024-38812µÄ²¹¶¡²¢Î´ÍêÈ«½â¾öÎÊÌ⣬£¬£¬£¬ £¬£¬²¢Ç¿ÁÒ½¨ÒéÖÎÀíÔ±Ó¦ÓÃв¹¶¡¡£¡£¡£¡£¡£¡£ÊÜÓ°Ïì¿Í»§Ó¦Á¬Ã¦Ó¦ÓÃ×îиüÐÂÒÔÌá·À¹¥»÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬²©Í¨»¹Ðû²¼ÁËÔö²¹Í¨¸æ£¬£¬£¬£¬ £¬£¬Ìṩ¸ü¶àÇå¾²¸üÐÂÐÅÏ¢ºÍ¿ÉÄÜÓ°ÏìÒÑÉý¼¶Óû§µÄÒÑÖªÎÊÌâ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-vmware-vcenter-server-now-exploited-in-attacks/


5. DocuSignÍøÂç´¹ÂÚÕ©Æ­¼¤Ôö£¬£¬£¬£¬ £¬£¬Ã°³äÃÀÕþ¸®»ú¹¹ÇÔÈ¡Êý¾Ý


11ÔÂ18ÈÕ£¬£¬£¬£¬ £¬£¬DocuSignÍøÂç´¹ÂÚÕ©Æ­ÊýÄ¿½üÆÚ¼¤Ôö98%£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßʹÓÃÐÅÈÎÇÔÈ¡Êý¾Ý£¬£¬£¬£¬ £¬£¬Ã°³äÃÀ¹úÕþ¸®»ú¹¹ÈçÎÀÉúÓ빫ÖÚЧÀͲ¿(HHS)ºÍÂíÀïÀ¼Öݽ»Í¨²¿(MDOT)µÈ·¢ËÍ´¹ÂÚURL¡£¡£¡£¡£¡£¡£ÕâЩ´¹ÂÚURL±»Éè¼Æ³ÉÄ£Äâ¹Ù·½Í¨Ñ¶£¬£¬£¬£¬ £¬£¬Ê¹ÓÃÕæÕýµÄDocuSignÕÊ»§ºÍAPIαװ³ÉÕæÊµÇëÇ󡣡£¡£¡£¡£¡£Ò»µ©Ä¿µÄ·­¿ª¶ñÒâÎĵµ£¬£¬£¬£¬ £¬£¬¾Í»á±»ÒªÇóÌṩÃô¸ÐÐÅÏ¢»òÊÚȨڲƭÉúÒâ¡£¡£¡£¡£¡£¡£ÓÉÓÚÇëÇó¿´Ëƹٷ½£¬£¬£¬£¬ £¬£¬ÊÕ¼þÈ˸ü¿ÉÄÜδ¾­³¹µ×ÑéÖ¤¾Í×ñÊØÇëÇ󣬣¬£¬£¬ £¬£¬Î£¼°¹«Ë¾Çå¾²¡£¡£¡£¡£¡£¡£ÃÀ¹ú¹«Ãñ¡¢Õþ¸®»ú¹¹ºÍÊÐÕþ°ì¹«ÊÒÊÇÕâЩ¹¥»÷µÄÖ÷ҪĿµÄ¡£¡£¡£¡£¡£¡£×¨¼Ò½¨ÒéÆóҵʵÑé¶à²ãÇå¾²Õ½ÂÔ£¬£¬£¬£¬ £¬£¬ÓÉÓÚÊܺ¦Õß×ñÕÕµÄÊÇËûÃǽÓÊܹýÅàѵ²¢±»ÆÚÍû×ñÕÕµÄÁ÷³Ì£¬£¬£¬£¬ £¬£¬ÎÊÌâÔÚÓÚÎÞ·¨ÑéÖ¤ÇëÇóȪԴ£¬£¬£¬£¬ £¬£¬ÐèÒªÖØÐÂ˼Á¿ÔõÑùÌṩÊðÃûÇëÇ󣬣¬£¬£¬ £¬£¬²¢¿ÉÄܽÓÄÉǿʢµÄÉí·ÝÑéÖ¤ÒªÁì¡£¡£¡£¡£¡£¡£


https://hackread.com/us-govt-agencies-impersonate-docusign-phishing-scams/


6. ÃÀÒûÓÃˮϵͳ´æÍøÂçÇå¾²Îó²î£¬£¬£¬£¬ £¬£¬»òÖÂЧÀÍÖÐÖ¹


11ÔÂ18ÈÕ£¬£¬£¬£¬ £¬£¬ÃÀ¹úÇéÐα£»£»£»£»£»£» £»¤Êð£¨EPA£©¼à²ì³¤°ì¹«ÊÒ£¨OIG£©Ðû²¼µÄб¨¸æÏÔʾ£¬£¬£¬£¬ £¬£¬ÎªÃÀ¹úÔ¼1.1ÒÚÈËÌṩЧÀ͵Ä300¶à¸öÒûÓÃˮϵͳ±£´æÎó²î£¬£¬£¬£¬ £¬£¬¿ÉÄܵ¼ÖÂЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£ÆÀ¹Àº­¸Ç1062¸öÒûÓÃˮϵͳ£¬£¬£¬£¬ £¬£¬·¢Ã÷ÆäÖÐËÄ·ÖÖ®Ò»¿ÉÄܳÉΪ¹¥»÷Êܺ¦Õߣ¬£¬£¬£¬ £¬£¬µ¼Ö¹¦Ð§Ëðʧ¡¢¾Ü¾øÐ§À͵ÈÇéÐμ°¿Í»§ÐÅϢй¶¡£¡£¡£¡£¡£¡£97¸ö¹©Ë®ÏµÍ³±£´æÑÏÖØºÍ¸ß¶ÈÑÏÖØÎÊÌ⣬£¬£¬£¬ £¬£¬ÁýÕÖÔ¼2700ÍòÈË£»£»£»£»£»£» £»211¸öϵͳÊÜÖжȺ͵ͶÈȱÏÝÓ°Ï죬£¬£¬£¬ £¬£¬ÁýÕÖÔ¼8300ÍòÈË¡£¡£¡£¡£¡£¡£OIGÖ¸³ö£¬£¬£¬£¬ £¬£¬Èô¶ñÒâÐÐΪÕßʹÓÃÎó²î£¬£¬£¬£¬ £¬£¬¿ÉÄÜÆÆËðЧÀÍ»òÔì³ÉÎïÀíË𻵡£¡£¡£¡£¡£¡£ÆÀ¹ÀÉæ¼°Áè¼Ý75000¸öIPºÍ14400¸öÓòµÄÆÊÎö¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬EPAȱ·¦Ïò¸Ã»ú¹¹×ª´ïÍøÂçÇå¾²ÊÂÎñµÄ±¨¸æÏµÍ³£¬£¬£¬£¬ £¬£¬²¢ÒÀÀµÆäËû»ú¹¹¾ÙÐдËÀ౨¸æ£¬£¬£¬£¬ £¬£¬Í¬Ê±È±·¦ÓëÆäËûÁª°îºÍÖÝÕþ¸®µÄЭµ÷¼Í¼¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬ £¬£¬ÒÑÓÐË®Îñ¹«Ë¾ÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬ £¬£¬µ«¹©Ë®Ð§ÀÍδÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£½ñÄê5Ô£¬£¬£¬£¬ £¬£¬EPAÔøÖÒÑÔ³¬70%¹©Ë®ÏµÍ³²»Çкϡ¶Çå¾²ÒûÓÃË®·¨¡·£¬£¬£¬£¬ £¬£¬±£´æÑÏÖØÇå¾²ÎÊÌâ¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/300-drinking-water-systems-in-us-exposed-to-disruptive-damaging-hacker-attacks/