ÃÀ¹úÔËͨѶÓÿ¨ÔâÓöµÚÈý·½Êý¾Ýй¶
Ðû²¼Ê±¼ä 2024-03-063ÔÂ4ÈÕ£¬£¬£¬ÃÀ¹úÔËͨÖÒÑÔ¿Í»§£¬£¬£¬ÔÚÉÌ»§´¦Öóͷ£Æ÷Ôâµ½ºÚ¿Í¹¥»÷ºó£¬£¬£¬ÐÅÓÿ¨ÔÚµÚÈý·½Êý¾Ýй¶ÖÐ̻¶¡£¡£¡£¡£¸ÃÊÂÎñ²¢·ÇÓÉÃÀ¹úÔËͨ¿¨µÄÊý¾Ýй¶Ôì³É£¬£¬£¬¶øÊÇÓÉ´¦Öóͷ£ÃÀ¹úÔËͨ¿¨»áÔ±Êý¾ÝµÄÉ̼Ҵ¦Öóͷ£Æ÷Ôì³É¡£¡£¡£¡£´Ë´Îй¶µ¼Ö¿ͻ§µÄÃÀ¹úÔËͨ¿¨Õʺš¢ÐÕÃûºÍ¿¨ÓâÆÚÊý¾Ý±»ºÚ¿Í»ñÈ¡¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÓм¸¶à¿Í»§Êܵ½Ó°Ïì¡¢ÄĸöÉ̼Ҵ¦Öóͷ£Æ÷Ôâµ½ÆÆËðÒÔ¼°¹¥»÷±¬·¢µÄʱ¼ä¡£¡£¡£¡£µ± BleepingComputer ÏòÃÀ¹úÔËͨѯÎÊÓйش˴Îй¶µÄ¸ü¶àÐÅϢʱ£¬£¬£¬ÎÒÃDZ»¼û¸æËûÃDz»»á͸¶ÆäÓªÒµ¹ØÏµºÍÉÌÒµÏàÖúͬ°éµÄÏêϸÐÅÏ¢£¬£¬£¬ÏÖÔÚҲûÓиü¶àÐÅÏ¢¿É¹©·ÖÏí¡£¡£¡£¡£²»¹ý£¬£¬£¬ÃÀ¹úÔËͨȷʵÌåÏÖ£¬£¬£¬ËûÃÇÒÑ֪ͨËùÐèµÄî¿Ïµ»ú¹¹£¬£¬£¬²¢ÏòÊÜÓ°ÏìµÄ¿Í»§·¢³ö¾¯±¨¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/american-express-credit-cards-exposed-in-third-party-data-breach/#google_vignette
2. JetBrains TeamCity ÑÏÖØÈ±ÏÝ¿ÉÄܵ¼ÖÂЧÀÍÆ÷±»½ÓÊÜ
3ÔÂ5ÈÕ£¬£¬£¬JetBrains TeamCity On-Premises Èí¼þÖÐÅû¶ÁËÒ»¶ÔеÄÇå¾²Îó²î£¬£¬£¬ÍþвÐÐΪÕß¿ÉʹÓÃÕâЩÎó²îÀ´¿ØÖÆÊÜÓ°ÏìµÄϵͳ¡£¡£¡£¡£ÕâЩȱÏݱàºÅΪ CVE-2024-27198£¨CVSS ÆÀ·Ö£º9.8£©ºÍ CVE-2024-27199£¨CVSS ÆÀ·Ö£º7.3£©£¬£¬£¬ÒÑÔÚ°æ±¾ 2023.11.4 ÖлñµÃ½â¾ö¡£¡£¡£¡£ËüÃÇ»áÓ°Ïì 2023 Äê 11 Ô 3 ÈÕ֮ǰµÄËùÓÐ TeamCity On-Premises °æ±¾¡£¡£¡£¡£JetBrainsÔÚÖÜÒ»Ðû²¼µÄͨ¸æÖÐÌåÏÖ£º¡°ÕâЩÎó²î¿ÉÄÜʹδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»Í¨¹ý HTTP(S) »á¼û TeamCity ЧÀÍÆ÷À´ÈƹýÉí·ÝÑéÖ¤¼ì²é²¢»ñµÃ¶Ô¸Ã TeamCity ЧÀÍÆ÷µÄÖÎÀí¿ØÖÆ¡£¡£¡£¡£¡±TeamCity Cloud ʵÀýÒÑÕë¶ÔÕâÁ½¸öȱÏݾÙÐÐÁËÐÞ²¹¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾ Rapid7 ÓÚ 2024 Äê 2 Ô 20 ÈÕ·¢Ã÷²¢±¨¸æÁËÕâЩÎÊÌ⣬£¬£¬¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬CVE-2024-27198 ÊÇÒ»ÖÖÉí·ÝÑéÖ¤ÈÆ¹ý°¸Àý£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÍêÈ«ÆÆËðÒ×Êܹ¥»÷µÄЧÀÍÆ÷¡£¡£¡£¡£
https://thehackernews.com/2024/03/critical-jetbrains-teamcity-on-premises.html
3. ÄϺ«Ç鱨»ú¹¹³Æ£¬£¬£¬±±³¯ÏʺڿÍ͵ÇÔÁ˰뵼ÌåÐÅÏ¢
3ÔÂ5ÈÕ£¬£¬£¬±±³¯ÏʺڿÍ×éÖ¯ÈëÇÖÁËÖÁÉÙÁ½¼ÒÄϺ«°ëµ¼ÌåÖÆÔì×°±¸Éú²úÉÌ£¬£¬£¬ÒÔÌÓ±ÜÖÆ²Ã²¢Éú²ú×Ô¼ºµÄ°ëµ¼Ì壬£¬£¬ÓÃÓÚÎäÆ÷ÏîÄ¿¡£¡£¡£¡£ÕâÒ»ÐÂÎÅ´«³öºó£¬£¬£¬ÄϺ«×ÜͳÖÒÑÔ˵£¬£¬£¬±±³¯ÏÊ¿ÉÄÜ»á½ÓÄÉÑ°ÐÆÐÐΪ£¬£¬£¬Èç¾ÙÐÐÍøÂç¹¥»÷»òÉ¢²¼ÐéαÐÂÎÅ£¬£¬£¬×ÌÈÅËÄÔµÄÒé»áÑ¡¾Ù¡£¡£¡£¡£Ç鱨»ú¹¹ÌåÏÖ£¬£¬£¬ÄϺ«¹«Ë¾×ÔÈ¥Äêµ×¾Í³ÉΪ±±³¯Ïʺڿ͵ÄÖØµãÄ¿µÄ£¬£¬£¬²¢ºôÓõÔöÇ¿Çå¾²ÐÔ¡£¡£¡£¡£Ç鱨»ú¹¹ÌåÏÖ£¬£¬£¬±±³¯ÏÊÔÚ12ÔºÍ2Ô»®·ÖÈëÇÖÁËÁ½¼Ò¹«Ë¾µÄЧÀÍÆ÷£¬£¬£¬ÍµÈ¡Á˲úÆ·Éè¼ÆÍ¼Ö½ºÍ¹¤³§ÕÕÆ¬¡£¡£¡£¡£
https://news.hitb.org/content/seoul-spies-say-north-korea-hackers-stole-semiconductor-secrets
4. WogRAT ºóÃÅ£ºÇ±ÔÚÔÚÔÚÏß¼Çʱ¾ÖеÄÒþÐζñÒâÈí¼þ
3ÔÂ4ÈÕ£¬£¬£¬Ò»ÖÖз¢Ã÷µÄÃûΪ¡°WogRAT¡±µÄºóÃŶñÒâÈí¼þÕýÔÚÏò Windows ºÍ Linux Óû§·¢³ö¾¯±¨¡£¡£¡£¡£WogRAT ÓÉAhnLab Çå¾²Ç鱨ÖÐÐÄ(ASEC)·¢Ã÷£¬£¬£¬ÒòÆäÄܹ»Õë¶ÔÁ½ÖÖÊ¢ÐвÙ×÷ϵͳ¶øÍÑÓ±¶ø³ö¡£¡£¡£¡£WogRAT ËÆºõαװ³ÉÎļþ¹²ÏíÍøÕ¾ÉϵÄÕýµ±ÊÊÓù¤¾ß£¬£¬£¬ÓÕÆºÁÎÞ½äÐĵÄÓû§ÏÂÔØËü¡£¡£¡£¡£ÓÐȤµÄÊÇ£¬£¬£¬¸Ã¶ñÒâÈí¼þαװ³ÉÓÕÈ˵ÄÃû³Æ£¬£¬£¬ÀýÈç¡°BrowserFixup.exe¡±ºÍ¡°ChromeFixup.exe¡±¡£¡£¡£¡£ASEC µÄÆÊÎöÅú×¢£¬£¬£¬WogRAT ×Ô 2022 Äêµ×ÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬ËƺõÖ÷Òª¹Ø×¢ÑÇÖÞ¹ú¼ÒµÄÄ¿µÄ¡£¡£¡£¡£Windows °æ±¾µÄ WogRAT ÇÉÃîµØ½«×Ô¼ºÎ±×°³É Adobe ¹¤¾ß£¬£¬£¬²¢Óà .NET ±àд¡£¡£¡£¡£
https://securityonline.info/wograt-backdoor-the-stealthy-malware-lurking-in-online-notepads/
5. Õë¶ÔÒ½Áƹ«Ë¾ Change Healthcare µÄÀÕË÷¹¥»÷ÊÕµ½2200 ÍòÃÀÔªÊê½ð
3ÔÂ5ÈÕ£¬£¬£¬Ò½Áƹ«Ë¾Change HealthcareµÄÀÕË÷Èí¼þ¹¥»÷ÊǶàÄêÀ´×î¾ßÆÆËðÐÔµÄÖ®Ò»£¬£¬£¬Ê¹ÃÀ¹ú¸÷µØµÄÒ©µê£¨°üÀ¨Ò½ÔºÄÚµÄÒ©µê£©ÏÝÈë̱»¾×´Ì¬£¬£¬£¬µ¼ÖÂÒ©ÎïÅäËͺ£ÄÚÊ®ÌìÒÔÉϵÄÑÏÖØÕϰ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬·¸·¨ÌìÏÂÄÚ²¿µÄÒ»³¡ÕùÖ´Õ¹ÏÖÁËÕâ¸öÒ»Ö±Éú³¤µÄΣ»£»£»£»úµÄÐÂÏ£Íû£º¹¥»÷±³ºóµÄºÚ¿ÍµÄһλÏàÖúͬ°éÖ¸³ö£¬£¬£¬ÕâЩºÚ¿Í£¬£¬£¬Ò»¸öÃûΪAlphV»òBlackCatµÄ×éÖ¯£¬£¬£¬ÊÕµ½ÁËÒ»±Ê¿´ÆðÀ´ÏñÊǾ޶îÊê½ðÖ§¸¶µÄ2200ÍòÃÀÔªÉúÒâ¡£¡£¡£¡£3ÔÂ1ÈÕ£¬£¬£¬ÓëAlphVÏà¹ØÁªµÄ±ÈÌØ±ÒµØµãÔÚµ¥±ÊÉúÒâÖÐÊÕµ½ÁË350¸ö±ÈÌØ±Ò£¬£¬£¬»òÕ߯¾Ö¤ÆäʱµÄ»ãÂÊ¿¿½ü2200ÍòÃÀÔª¡£¡£¡£¡£È»ºó£¬£¬£¬Á½Ììºó£¬£¬£¬Ä³ÈËÔÚRAMPÕâ¸ö°µÍøÂÛ̳ÉÏÉù³Æ×Ô¼ºÊÇAlphVµÄÁ¥Êô³ÉÔ±Ö®Ò»£¬£¬£¬²¢Ö¸¿ØAlphVÓÕÆÁËËûÃÇÓ¦µÃµÄChange HealthcareÊê½ðµÄ·Ý¶î£¬£¬£¬²¢Ö¸Ïò±ÈÌØ±ÒÇø¿éÁ´ÉϹûÕæ¿É¼ûµÄ2200ÍòÃÀÔªÉúÒâ×÷Ϊ֤ʵ¡£¡£¡£¡£
https://news.hitb.org/content/hackers-behind-change-healthcare-ransomware-attack-just-received-22-million-payment
6. Ñо¿Ö°Ô±Ñз¢³öµÚÒ»¸ö GenAI È䳿
3ÔÂ4ÈÕ£¬£¬£¬Ñо¿Ö°Ô±ÒѾ½¨ÉèÁ˵ÚÒ»´úÈ˹¤ÖÇÄÜÈ䳿£¬£¬£¬Ëü¿ÉÒÔÇÔÈ¡Êý¾Ý¡¢Èö²¥¶ñÒâÈí¼þ²¢Í¨¹ýµç×ÓÓʼþÈö²¥¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿µÄζûÀí¹¤Ñ§ÔºµÄ Ben Nassi¡¢ÒÔÉ«ÁÐÀí¹¤Ñ§ÔºµÄ Stav Cohen ºÍ Intuit µÄ Ron Bitton ½¨ÉèÁËÕâÖÖ×ÔÎÒ¸´ÖÆÈ䳿£¬£¬£¬²¢ÒÔ 1980 ÄêÔÂѬȾϵͳµÄÎÛÃûÕÑÖøµÄÈ䳿ÃüÃûΪ¡°Morris II¡±¡£¡£¡£¡£ËûÃǵĴ´×÷Ä¿µÄÊÇÈ˹¤ÖÇÄÜÓ¦ÓóÌÐòºÍÖ§³ÖÈ˹¤ÖÇÄܵĵç×ÓÓʼþÖúÊÖ¡£¡£¡£¡£ËûÃǽÒÏþÁËһƪÑо¿ÂÛÎĺÍÊÓÆµ£¬£¬£¬Õ¹Ê¾ÁËÇÔÈ¡Êý¾ÝºÍÓ°ÏìÆäËûµç×ÓÓʼþϵͳµÄÒªÁì¡£¡£¡£¡£¸ÃÈ䳿²¡¶¾»ù±¾ÉϽ«¶Ô¿¹ÐÔÀàÐ͵ÄÊý¾ÝǶÈëµ½¶ñÒâµç×ÓÓʼþÖУ¬£¬£¬Ê¹ÓÃÊܺ¦ÕßµÄϵͳÀ´Èö²¥ÐÂÎÅ¡¢Ö´ÐжñÒâ»î¶¯²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£´ÓÕ½ÂÔÉϽ²£¬£¬£¬ÕâÒ»Ò»Ö±Éú³¤µÄÎÊÌâµÄÒªº¦ÔÚÓÚ£¬£¬£¬ÎªÁË×·Çó GenAI ºÍ LLM ϵͳµÄ¸ü¶à¹¦Ð§ºÍºóÐø¼ÛÖµ£¬£¬£¬ËüÃÇÐèÒª¸ü¶àµÄ»á¼ûºÍȨÏ޲ŻªÔÚÆäËùÔÚµÄÊý×ÖÉú̬ϵͳÖÐ×öÊ¡£¡£¡£¡£Òò´Ë£¬£¬£¬ÈôÊÇÊܵ½¶ñÒâ·½µÄָʾ£¬£¬£¬ËüÃǾͻá³ÉΪһ¸ö¼«ÆäǿʢµÄ¹¤¾ß£¬£¬£¬ÎÞÂÛÊǺõÄÕվɻµµÄ¡£¡£¡£¡£
https://securityboulevard.com/2024/03/researchers-give-birth-to-the-first-genai-worm/