Î÷ÑÅͼ¸ÛºÍÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡ÒÉÔâÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2024-08-26
1. Î÷ÑÅͼ¸ÛºÍÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡ÒÉÔâÍøÂç¹¥»÷


8ÔÂ25ÈÕ£¬£¬£¬£¬ £¬Î÷ÑÅͼ¸ÛÓëÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡Í¬Ê±ÔËÓª£¬£¬£¬£¬ £¬½üÆÚÔâÓöÁËÑÏÖØµÄÐÅϢϵͳÌôÕ½£¬£¬£¬£¬ £¬ÒÉËÆÔâÓöÁËÍøÂç¹¥»÷¡£¡£¡£¡£ÖÜÁùÇåÔ磬£¬£¬£¬ £¬¿Ú°¶Ê×ÏÈͨ¹ýÉ罻ýÌåÆ½Ì¨×ª´ïÁËЧÀÍÖÐÖ¹µÄÇéÐΣ¬£¬£¬£¬ £¬Ëæºó»ú³¡¹Ù·½È·ÈÏÔâÓöÁËϵͳÖÐÖ¹£¬£¬£¬£¬ £¬²¢ÌåÏÖÕâ¿ÉÄÜÔ´ÓÚÒ»´ÎÍøÂç¹¥»÷¡£¡£¡£¡£Ëæ×ÅÊÂ̬Éú³¤ÖÁÖÜÁùÍí¼ä£¬£¬£¬£¬ £¬»ú³¡·½ÃæÌåÏÖЧÀÍÖÐֹ״̬ÒÀ¾Éδ½â£¬£¬£¬£¬ £¬ÇÒÎÞ·¨Ã÷È·¸ø³ö»Ö¸´ÖÜȫЧÀ͵Äʱ¼ä±í¡£¡£¡£¡£ÃæÁÙÕâһͻ·¢×´Ì¬£¬£¬£¬£¬ £¬»ú³¡·½ÃæÆð¾¢Ó¦¶Ô£¬£¬£¬£¬ £¬½¨ÒéÓοÍʹÓú½¿Õ¹«Ë¾ÌṩµÄÊÖ»úÓ¦ÓóÌÐò°ìÀíµÇ»úÊÖÐø²¢´òÓ¡µÇ»úÅÆ¼°ÐÐÀî±êÇ©£¬£¬£¬£¬ £¬Í¬Ê±ÌáÐÑÂÿÍÌáǰµÖ´ï»ú³¡ÒÔÓ¦¶Ô¿ÉÄܵÄÑÓÎ󡣡£¡£¡£¾ÝTechCrunchµÄÊÖÒÕÆÊÎö£¬£¬£¬£¬ £¬×èÖ¹ÖÜÈÕ̫ƽÑóʱ¼äÔ糿£¬£¬£¬£¬ £¬Î÷ÑÅͼ¸Û¶ÔÍâЧÀ͵ÄÍøÂç»ù´¡ÉèÊ©£¬£¬£¬£¬ £¬ÓÈÆäÊÇÆä¹Ù·½ÍøÕ¾£¬£¬£¬£¬ £¬ÈÔ´¦ÓÚ²»¿É»á¼ûµÄÀëÏß״̬£¬£¬£¬£¬ £¬ÏÔʾ³ö´Ë´ÎÍøÂç¹¥»÷¶Ô¿Ú°¶¼°»ú³¡ÔËÓªÔì³ÉÁËÏÔÖøÓ°Ïì¡£¡£¡£¡£


https://techcrunch.com/2024/08/25/the-port-of-seattle-and-sea-tac-airport-say-theyve-been-hit-by-possible-cyberattack/


2. PEAKLIGHT ¶ñÒâÈí¼þ£ºÒ»ÖÖÐÂÐÍÒþÃØÄÚ´æÍþв·ºÆð


8ÔÂ24ÈÕ£¬£¬£¬£¬ £¬MandiantµÄÍøÂçÇå¾²ÍÅ¶Ó½ÒÆÆÁËÒ»ÖÖÃûΪPEAKLIGHTµÄÖØ´óÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬ £¬Ëüͨ¹ýһϵÁÐÈ«ÐÄÉè¼ÆµÄ¶à½×¶ÎѬȾÀú³Ì£¬£¬£¬£¬ £¬ÇÄÎÞÉùÏ¢µØÔÚÊܺ¦ÕßµÄϵͳÖÐÈö²¥°üÀ¨LUMMAC.V2¡¢SHADOWLADDERºÍCRYPTBOTÔÚÄڵĶàÖÖÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£PEAKLIGHTµÄÈëÇÖʼÓÚαװ³ÉµÁ°æÓ°Ï·µÄ¶ñÒâZIPÎļþ£¬£¬£¬£¬ £¬ÄÚº¬Î±×°³ÉýÌåͼ±êµÄLNK¿ì½Ý·½·¨Îļþ£¬£¬£¬£¬ £¬ÓÕµ¼Óû§Ö´ÐÐǶÈëµÄPowerShell¾ç±¾£¬£¬£¬£¬ £¬½ø¶øÏÂÔØ²¢Ö´ÐÐÄÚ´æÖеÄJavaScriptÖ²Èë³ÌÐò¡£¡£¡£¡£¸ÃÖ²Èë³ÌÐòʹÓÃÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©Íйܣ¬£¬£¬£¬ £¬²¢½ÓÄÉ»ìÏýÊÖÒÕ¹æ±Ü¼ì²â£¬£¬£¬£¬ £¬×îÖÕÏÂÔØ²¢Ö´ÐÐPEAKLIGHTÏÂÔØ³ÌÐò£¬£¬£¬£¬ £¬¸Ã³ÌÐòƾ֤ϵͳÇéÐÎÏÂÔØÌØÁíÍâ¶ñÒâ¸ºÔØ¡£¡£¡£¡£PEAKLIGHT±äÖÖ¶àÑù£¬£¬£¬£¬ £¬µ«½¹µãÄ¿µÄÒ»Ö£ºÒþ²ØµØ°²ÅÅÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£¡£¡£¡£ÆÊÎöÏÔʾ£¬£¬£¬£¬ £¬PEAKLIGHTÏÂÔØµÄZIPÎļþ°üÀ¨SHADOWLADDERºÍCRYPTBOTµÈ¶ñÒâÈí¼þ£¬£¬£¬£¬ £¬Í¬Ê±Ê¹ÓÃÕýµ±ÊÓÆµÎļþ×÷ΪÓÕ¶ü¡£¡£¡£¡£MandiantÇ¿µ÷£¬£¬£¬£¬ £¬´ËÀ๥»÷͹ÏÔÁ˼á³ÖСÐÄ¡¢½ÓÄɶàÌõÀíÇå¾²²½·¥µÄÖ÷ÒªÐÔ£¬£¬£¬£¬ £¬°üÀ¨Èí¼þ¸üС¢Ç¿ÃÜÂëºÍ¶àÒòËØÈÏÖ¤£¬£¬£¬£¬ £¬ÒÔ¼°°²ÅÅÓÐÓõĶ˵㱣»£»£»¤¡£¡£¡£¡£


https://securityonline.info/peaklight-malware-a-new-stealthy-memory-only-threat-emerges/


3. CISAÖÒÑÔVersa NetworksÎó²îCVE-2024-39717Õý±»Æð¾¢Ê¹ÓÃ


8ÔÂ23ÈÕ£¬£¬£¬£¬ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½üÆÚ½ôÆÈÐû²¼Á˹ØÓÚCVE-2024-39717Îó²îµÄÇå¾²¾¯±¨£¬£¬£¬£¬ £¬Ö¸³ö¸Ã¸ßÑÏÖØÐÔÎó²îÕý±»Æð¾¢Ê¹Ó㬣¬£¬£¬ £¬¶ÔʹÓÃVersa Networks Director GUIµÄϵͳ×é³ÉÖØ´óÍþв¡£¡£¡£¡£´ËÎó²îÔÊÐí¾ßÓи߼¶ÖÎÀíȨÏÞµÄÓû§Í¨¹ýÉÏ´«Î±×°Îª.pngͼƬµÄ¶ñÒâÎļþ£¬£¬£¬£¬ £¬½ø¶ø¿ÉÄÜ»ñȡδÊÚȨ»á¼ûȨÏÞ»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£ÕâÒ»Îó²îµÄÑÏÖØÐÔÔÚÓÚ£¬£¬£¬£¬ £¬ËüÒÑÈ·Èϱ»Ò°Íâ¹¥»÷ÕßʹÓ㬣¬£¬£¬ £¬²¿·ÖÔµ¹ÊÔ­ÓÉÊǿͻ§Î´×ñÕÕ֮ǰÐû²¼µÄ·À»ðǽָÄÏ¡£¡£¡£¡£Ö»¹Ü¸Ã¶ñÒâÎļþÔÚ´ó¶¼Ö÷Á÷ä¯ÀÀÆ÷ÉÏÎÞ·¨Ö±½ÓÖ´ÐУ¬£¬£¬£¬ £¬µ«Ç±ÔÚµÄʹÓÃʵÀý¼°Î´Ö¤ÊµµÄ±¨¸æÈÔÅúעΣº¦Ò»Á¬±£´æ¡£¡£¡£¡£CISAÒѽ«CVE-2024-39717ÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬ £¬²¢±Þ²ßÁª°î»ú¹¹ÔÚ2024Äê9ÔÂ13ÈÕǰ°²ÅÅ×îÐÂÇå¾²²¹¶¡£¡£¡£¡£¬£¬£¬£¬ £¬ÒÔÌá·ÀDZÔÚµÄÍøÂç¹¥»÷¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬ £¬ËùÓÐʹÓÃVersa Networks Director GUIµÄ×é֯ӦѸËÙÉó²é²¢ÔöÇ¿ÆäÇ徲ЭÒ飬£¬£¬£¬ £¬Í¬Ê±Á¬Ã¦Ó¦ÓÃËùÓпÉÓõÄÇå¾²²¹¶¡ºÍ¸üУ¬£¬£¬£¬ £¬ÒÔÈ·±£ÍøÂçÇå¾²ÃâÊÜ´ËÎó²îµÄË𺦡£¡£¡£¡£


https://securityonline.info/cve-2024-39717-versa-networks-director-gui-flaw-under-active-attack-cisa-issues-urgent-patching-directive/


4. еÄmacOS¶ñÒâÈí¼þCthulhu StealerÃé×¼AppleÓû§Êý¾Ý


8ÔÂ23ÈÕ£¬£¬£¬£¬ £¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÕë¶ÔApple macOSµÄÐÂÐÍÐÅÏ¢ÇÔÈ¡³ÌÐòCthulhu Stealer£¬£¬£¬£¬ £¬¸Ã¶ñÒâÈí¼þ×Ô2023Äêµ×ÆðÒÔÿÔÂ500ÃÀÔªµÄMaaS£¨¶ñÒâÈí¼þ¼´Ð§ÀÍ£©Ä£Ê½Ìṩ£¬£¬£¬£¬ £¬¿É¿çx86_64ÓëArm¼Ü¹¹ÔËÐС£¡£¡£¡£Cthulhu Stealerαװ³ÉÕýµ±Èí¼þÈçCleanMyMacµÈ£¬£¬£¬£¬ £¬Ê¹ÓÃÓû§ÐÅÈÎÈÆ¹ýGatekeeper±£»£»£»¤£¬£¬£¬£¬ £¬ÓÕµ¼Óû§ÊäÈëÃÜÂ룬£¬£¬£¬ £¬½øÒ»²½ÇÔÈ¡MetaMaskÃÜÂë¡¢iCloud Keychain¼°ä¯ÀÀÆ÷cookieµÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£Ëü»¹Ê¹ÓÃChainbreakerµÈ¹¤¾ßÍøÂçϵͳÐÅÏ¢£¬£¬£¬£¬ £¬²¢½«Êý¾ÝѹËõºó·¢ËÍÖÁC2ЧÀÍÆ÷¡£¡£¡£¡£Ö»¹ÜCthulhu StealerÔÚÊÖÒÕÉϲ¢²»Öش󣬣¬£¬£¬ £¬È±·¦¸ß¼¶·´ÆÊÎöÊֶΣ¬£¬£¬£¬ £¬µ«ËüչʾÁËÍþвÐÐΪÕßÈÕÒæ¹Ø×¢macOSµÄÇ÷ÊÆ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ £¬¸Ã¶ñÒâÈí¼þ±³ºóµÄ¿ª·¢ÕßÒòÄÚ²¿¾À·×ÒÑÍ˳öÊг¡£¡£¡£¡£¬£¬£¬£¬ £¬µ«Õâ²¢²»É¨³ýδÀ´ÀàËÆÍþвµÄÔÙÏÖ¡£¡£¡£¡£ÃæÁÙÕâһΣº¦£¬£¬£¬£¬ £¬Æ»¹û¹«Ë¾ÒѽÓÄɲ½·¥£¬£¬£¬£¬ £¬ÍýÏëÔÚmacOS SequoiaÖÐÔöÇ¿¶ÔδÊðÃû»òδ¹«Ö¤Èí¼þµÄÏÞÖÆ£¬£¬£¬£¬ £¬Óû§Ðèͨ¹ýϵͳÉèÖöø·Ç¼òÆÓ²Ù×÷À´ÔÊÐíÈí¼þÔËÐУ¬£¬£¬£¬ £¬ÒÔÌá¸ßϵͳÇå¾²ÐÔ¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬ £¬×¨¼Ò½¨ÒémacOSÓû§½ö´Ó¿ÉÐÅȪԴÏÂÔØÈí¼þ£¬£¬£¬£¬ £¬¼á³Öϵͳ¸üÐÂÖÁ×îа汾¡£¡£¡£¡£


https://thehackernews.com/2024/08/new-macos-malware-cthulhu-stealer.html?&web_view=true


5. QilinÀÕË÷Èí¼þж¯Ïò£ºÇÔÈ¡Chromeƾ֤


8ÔÂ23ÈÕ£¬£¬£¬£¬ £¬ÍøÂçÇå¾²ÁìÓò·ºÆðÁËÒ»ÆðÒýÈËעĿµÄQilinÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ¡£¡£¡£¡£¾ÝSophosÍøÂçÇå¾²¹«Ë¾±¨¸æ£¬£¬£¬£¬ £¬´Ë´Î¹¥»÷²»µ«ÏÞÓڹŰåµÄÎļþ¼ÓÃÜÓëÀÕË÷£¬£¬£¬£¬ £¬»¹ÓÐÊýµØÁ¬ÏµÁËÆ¾Ö¤ÍøÂçÊֶΣ¬£¬£¬£¬ £¬¶ÔÊܺ¦ÕßµÄGoogle Chromeä¯ÀÀÆ÷ÖеÄÃô¸ÐÐÅÏ¢×é³ÉÍþв¡£¡£¡£¡£¹¥»÷ÕßʹÓÃVPNÃÅ»§Ð¹Â¶µÄ¡¢È±·¦¶àÒòËØÈÏÖ¤µÄƾ֤£¬£¬£¬£¬ £¬ÀÖ³ÉÉøÍ¸Ä¿µÄÍøÂ磬£¬£¬£¬ £¬²¢ÔÚÊ×´ÎÈëÇÖºóDZÔÚ18Ìì¾ÙÐÐÉî¶ÈºóʹÓᣡ£¡£¡£¹¥»÷ÕßÇÉÃîµØ±à¼­ÁËÓò¿ØÖÆÆ÷ÖеÄĬÈÏÓòÕ½ÂÔ£¬£¬£¬£¬ £¬ÒýÈëÁËÁ½¸öÒªº¦¾ç±¾£ºÒ»ÊÇÓÃÓÚËѼ¯Chromeä¯ÀÀÆ÷´æ´¢Æ¾Ö¤µÄPowerShell¾ç±¾¡°IPScanner.ps1¡±£¬£¬£¬£¬ £¬¶þÊÇ´¥·¢¸Ã¾ç±¾Ö´ÐеÄÅú´¦Öóͷ£Îļþ¡°logon.bat¡±¡£¡£¡£¡£ÕâЩ¾ç±¾Í¨¹ýµÇ¼ʱµÄ×éÕ½ÂÔ¹¤¾ß£¨GPO£©×Ô¶¯Ö´ÐУ¬£¬£¬£¬ £¬Ê¹µÃÿ´ÎÓû§µÇ¼ʱ¶¼¿ÉÄÜÔÚ²»ÖªÇéµÄÇéÐÎÏ´¥·¢Æ¾Ö¤ÇÔÈ¡£¡£¡£¡£¬£¬£¬£¬ £¬Ò»Á¬ÈýÌìÖ®¾Ã£¬£¬£¬£¬ £¬¼«´óµØÔöÌíÁËÐÅϢй¶µÄΣº¦¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬ £¬¹¥»÷Õß²»µ«¼ÓÃÜÁËÎļþ¡¢°²ÅÅÀÕË÷ÐÅ£¬£¬£¬£¬ £¬»¹ÇÔÈ¡ÁËÍøÂçµ½µÄƾ֤£¬£¬£¬£¬ £¬²¢É¨³ý»î¶¯ºÛ¼£¡£¡£¡£¡£Chromeƾ֤µÄʧÔôÆÈʹÊܺ¦ÕßÐèÔÚ¶à¸öµÚÈý·½Ð§ÀÍÉÏÖØÖÃÕË»§ÃÜÂ룬£¬£¬£¬ £¬½øÒ»²½¼Ó¾çÁËÊÂÎñµÄÖØ´óÐÔºÍÓ°Ïì¹æÄ£¡£¡£¡£¡£


https://thehackernews.com/2024/08/new-qilin-ransomware-attack-uses-vpn.html


6. Android¶ñÒâÈí¼þNGateʹÓÃNFCÊÖÒÕÓÃÓÚATMÈ¡¿î


8ÔÂ23ÈÕ£¬£¬£¬£¬ £¬ÔÚÒÑÍù¾Å¸öÔÂÖУ¬£¬£¬£¬ £¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESET½ÒÆÆÁËÒ»ÆðÕë¶Ô½Ý¿ËÈý¼ÒÒøÐеÄÖØ´óÍøÂç·¸·¨»î¶¯¡£¡£¡£¡£·¸·¨·Ö×ÓʹÓÃÃûΪNGateµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬ £¬Í¨¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÓʼþÓÕÆ­Android×°±¸Óû§ÏÂÔØÎ±×°³ÉÒøÐÐÓ¦ÓõĶñÒâ³ÌÐò¡£¡£¡£¡£Õâ¿îÈí¼þ²»µ«ÄÜÇÔÈ¡Óû§µÄÒøÐÐÐÅÏ¢£¬£¬£¬£¬ £¬»¹½ÓÄÉÁËÒ»ÖÖØ¨¹ÅδÓеÄNFCÖмÌÊÖÒÕ£¬£¬£¬£¬ £¬ÄÜ´ÓÊܺ¦ÕßµÄʵÌåÖ§¸¶¿¨ÖÐÔ¶³Ì´«Êä½ü³¡Í¨Ñ¶Êý¾ÝÖÁ¹¥»÷Õß×°±¸£¬£¬£¬£¬ £¬½ø¶øÖ´ÐÐATMÉúÒâ»ò×ªÒÆ×ʽ𡣡£¡£¡£´Ë¶ñÒâÈí¼þ´ÓδÉϼÜGoogle PlayÊÐËÁ£¬£¬£¬£¬ £¬Ö÷Ҫͨ¹ý´¹ÂÚÓʼþÖеķǹٷ½Á´½ÓÈö²¥¡£¡£¡£¡£Êܺ¦Õß±»ÓÕµ¼¿ªÆôNFC¹¦Ð§²¢°²ÅÅÖ§¸¶¿¨ÓÚÊÖ»ú±³²¿£¬£¬£¬£¬ £¬ÒÔÍê³É¿¨ÐÅÏ¢µÄ²»·¨»ñÈ¡¡£¡£¡£¡£ESET×Ô2023Äê11ÔÂÆð×·×Ù¸Ã×éÖ¯£¬£¬£¬£¬ £¬·¢Ã÷Æä»î¶¯ÔÚÒ»Ãû³ÉÔ±±»²¶ºó¶ÌÔÝÕϰ­£¬£¬£¬£¬ £¬µ«´ËÀàAndroid¶ñÒâÈí¼þµÄй¦Ð§ÈÔÊôÊ×´ÎÔÚÒ°Íâ±»·¢Ã÷¡£¡£¡£¡£×¨¼ÒÖÒÑÔ¹«ÖÚÐèÌá¸ßСÐÄ£¬£¬£¬£¬ £¬¼ì²éÍøÕ¾URL¡¢Í×ÉÆ±£¹ÜPINÂ룬£¬£¬£¬ £¬²¢ÔÚ·ÇÐëҪʱ¹Ø±ÕNFC¹¦Ð§£¬£¬£¬£¬ £¬ÍƼöʹÓÃÐéÄ⿨ÒÔïÔ̭Σº¦¡£¡£¡£¡£


https://therecord.media/android-malware-atm-stealing-czech-banks