Ñо¿Ö°Ô±·¢Ã÷4Íò¶à¸ö·ÓÉÆ÷ºÍÎïÁª×°±¸×齨µÄ½©Ê¬ÍøÂç
Ðû²¼Ê±¼ä 2024-03-283ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬¸Ã·ÓÉÆ÷½©Ê¬ÍøÂçÓÚ 2014 ÄêÊ״ηºÆð£¬£¬£¬£¬£¬£¬£¬Ò»Ö±ÔÚÇÄÇÄÔËÐУ¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÔÚ 2024 Äê 1 ÔÂºÍ 2 ÔÂÔöÌíµ½À´×Ô 88 ¸ö¹ú¼ÒµÄ 40000 ¶à¸ö½©Ê¬ÍøÂç¡£¡£¡£¡£¡£ÕâЩ»úеÈËÖеĴó´ó¶¼¶¼±»ÓÃ×÷ÎÛÃûÕÑÖøµÄ¡¢Õë¶ÔÍøÂç·¸·¨µÄÊðÀíЧÀ͵Ļù´¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬¸ÃЧÀͱ»³ÆÎª Faceless¡£¡£¡£¡£¡£Black Lotus Labs µÄÑо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÈ·¶¨Á˸Ã×éÖ¯ÊðÀíЧÀ͵ÄÂ߼ͼ£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ 2024 Äê 3 ÔµÚÒ»ÖÜ×îÏȵÄÒ»Ïî»î¶¯£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯ÔÚ²»µ½ 72 СʱÄÚÕë¶Ô 6000 ¶à¸ö»ªË¶Â·ÓÉÆ÷¾ÙÐÐÁ˹¥»÷¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬£¬È«Çò¹æÄ£ÄÚÕë¶Ô±¨·ÏÎïÁªÍø×°±¸µÄ¹¥»÷ÊǾÓÐĵ쬣¬£¬£¬£¬£¬£¬ÓÉÓÚËüÃDz»ÔÙÊܵ½ÖÆÔìÉ̵ÄÖ§³Ö£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÒÑÖªµÄÇå¾²Îó²îҲûÓлñµÃÐÞ¸´¡£¡£¡£¡£¡£
https://www.securityweek.com/researchers-discover-40000-strong-eol-router-iot-botnet/
2. MispaduÒøÐÐľÂíÀ©´óÓ°Ïì¹æÄ££¬£¬£¬£¬£¬£¬£¬Ãé׼ŷÖÞ¼°ÆäËüµØÇø
3ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬Mispadu ÒøÐÐľÂíÒò¹¥»÷À¶¡ÃÀÖÞ¹ú¼Ò¶øÎÛÃûÕÑÖø£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÕýÔÚÆð¾¢À©´óÆäÄ¿µÄ¡£¡£¡£¡£¡£ÐÎ̬Ç徲ʵÑéÊÒÒÑ·¢Ã÷Õû¸öÅ·ÖÞµÄ Mispadu »î¶¯¼¤Ôö£¬£¬£¬£¬£¬£¬£¬±ê¼Ç×ÅÍþв¹æÄ£±¬·¢ÁËÁîÈ˵£ÐĵÄת±ä¡£¡£¡£¡£¡£Mispadu µÄ×îй¥»÷²»ÊÜÐÐÒµÏÞÖÆ¡£¡£¡£¡£¡£´ÓÆû³µÖÆÔì¾ÞÍ·Ëæ´¦Öóͷ£Ãô¸ÐÊý¾ÝµÄ״ʦÊÂÎñËù£¬£¬£¬£¬£¬£¬£¬¸ÃľÂí¸øÃ¿¸öÒÀÀµÔÚÏßÒøÐлòÃô¸ÐµÇ¼ƾ֤µÄ×éÖ¯´øÀ´Î£º¦¡£¡£¡£¡£¡£Ä«Î÷¸çÊÇ Mispadu »î¶¯×î³õµÄδ²£¬£¬£¬£¬£¬£¬£¬ÈÔÈ»ÊÇÒ»¸öÖ÷ҪĿµÄ£¬£¬£¬£¬£¬£¬£¬µ«ÍþвÏÖÔÚÔ¶Ô¶Áè¼ÝÁË×î³õµÄ½çÏß¡£¡£¡£¡£¡£Mispadu½ÓÄɶà½×¶Î¹¥»÷Á´£¬£¬£¬£¬£¬£¬£¬¶ÔÆä֮ǰµÄ°æ±¾¾ÙÐÐÁËÇÉÃîµÄˢС£¡£¡£¡£¡£³õʼ½×¶ÎÉæ¼°·Ö·¢ÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬Ã¿·âµç×ÓÓʼþ¶¼°üÀ¨Ò»¸öαװ³É·¢Æ±µÄ PDF¡£¡£¡£¡£¡£ÊÜ¡°Éó²éÍêÕû·¢Æ±¡±ÓÕ»óµÄÊܺ¦Õ߻ᱻָµ¼ÏÂÔØ ZIP Îļþ£¬£¬£¬£¬£¬£¬£¬´Ó¶øÆô¶¯Ä¾ÂíµÄÉøÍ¸Àú³Ì¡£¡£¡£¡£¡£
https://securityonline.info/mispadu-banking-trojan-expands-reach-targeting-europe-and-beyond/
3. ÀÕË÷Èí¼þ Agenda µÄбäÖÖ Ãé×¼ VMware ESXi ЧÀÍÆ÷
3ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬Agenda£¨ÓÖÃû Qilin ºÍ Water Galura£©ÓÚ 2022 ÄêÊ״α»·¢Ã÷¡£¡£¡£¡£¡£ËüµÄµÚÒ»¸ö»ùÓÚ Golang µÄÀÕË÷Èí¼þ±»ÓÃÓÚÕë¶ÔÖÖÖÖÄ¿µÄ£º´Ó¼ÓÄô󵽸çÂ×±ÈÑǺÍÓ¡¶ÈÄáÎ÷ÑǵÄÒ½ÁƱ£½¡¡¢ÖÆÔìºÍ½ÌÓýÁìÓò¡£¡£¡£¡£¡£µ½ 2022 Äêµ×£¬£¬£¬£¬£¬£¬£¬Agenda µÄËùÓÐÕßÓÃRust ÖØÐ´ÁËÆä¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬Rust¹ØÓÚÏ£Íû¿ç²Ù×÷ϽµµÍ÷´«ÆäÊÂÇéµÄ¶ñÒâÈí¼þ×÷ÕßÀ´ËµÊÇÒ»ÖÖÓÐÓõÄÓïÑÔ¡£¡£¡£¡£¡£Í¨¹ý Rust ±äÌ壬£¬£¬£¬£¬£¬£¬Agenda Äܹ»Î£º¦½ðÈÚ¡¢Ö´·¨¡¢ÐÞ½¨µÈÁìÓòµÄ×éÖ¯£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÊÇÔÚÃÀ¹ú£¬£¬£¬£¬£¬£¬£¬µ«Ò²ÔÚ°¢¸ùÍ¢¡¢°Ä´óÀûÑÇ¡¢Ì©¹úºÍÆäËûµØ·½¡£¡£¡£¡£¡£×î½ü£¬£¬£¬£¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼ÔÚÒ°Íâ·¢Ã÷ÁËÒ»ÖÖÐ嵀 Agenda ÀÕË÷Èí¼þ±äÖÖ¡£¡£¡£¡£¡£Õâ¸ö»ùÓÚ Rust µÄ×îа汾Å䱸ÁËÖÖÖÖй¦Ð§ºÍÒþÐλúÖÆ£¬£¬£¬£¬£¬£¬£¬²¢½«ÆäÄ¿µÄÖ±½ÓÃé×¼ÁË VMware vCenter ºÍ ESXi ЧÀÍÆ÷¡£¡£¡£¡£¡£
https://www.darkreading.com/cloud-security/agenda-ransomware-vmware-esxi-servers
4. Giant Tiger ÌåÏÖ¿Í»§Êý¾ÝÒòµÚÈý·½Î¥¹æ¶øÐ¹Â¶
3ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬ÕÛ¿ÛÁãÊÛÉÌ Giant Tiger ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Æä²¿·Ö¿Í»§µÄÁªÏµÐÅÏ¢ÔÚÓëÆäʹÓõĵÚÈý·½¹©Ó¦ÉÌÏà¹ØµÄ¡°ÊÂÎñ¡±ÖÐÔ⵽й¶¡£¡£¡£¡£¡£Õâ¼Ò×ܲ¿Î»ÓÚä×Ì«»ªµÄÕÛ¿ÛÁãÊÛÉ̽²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬£¬²»»á͸¶¹©Ó¦É̵ÄÃû³Æ£¬£¬£¬£¬£¬£¬£¬µ«ÌåÏÖ Giant Tiger ʹÓøù«Ë¾À´ÖÎÀíÆä¿Í»§ÏàͬºÍ»¥¶¯¡£¡£¡£¡£¡£¸ÃÁãÊÛÉÌÔÚ¸ø¿Í»§µÄµç×ÓÓʼþÖÐдµÀ£¬£¬£¬£¬£¬£¬£¬¸ÃÁãÊÛÉÌÓÚ 3 Ô 4 ÈÕÊ״λñϤ¸ÃÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬²¢ÓÚ 3 Ô 15 Èյóö½áÂÛ£¬£¬£¬£¬£¬£¬£¬¿Í»§ÐÅÏ¢Êܵ½Ó°Ïì¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÐÅÏ¢Òò¿Í»§¶øÒì¡£¡£¡£¡£¡£ÆäÖаüÀ¨¶©ÔÄ Giant Tiger µç×ÓÓʼþµÄÈ˵ÄÐÕÃûºÍµç×ÓÓʼþµØµã¡£¡£¡£¡£¡£Ò»Ð©ÔÚÏß϶©µ¥ËÍ»õÉÏÃŵÄÖ÷¹Ë¿ÉÄÜÓµÓÐÏàͬµÄÐÅÏ¢ÒÔ¼°ËûÃǵĽֵÀµØµã¡£¡£¡£¡£¡£½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÊÜÎó²îÓ°ÏìµÄ¿Í»§ÊýÄ¿Óëÿ¸öÍýÏëÏà¹Ø£¬£¬£¬£¬£¬£¬£¬µ«Ã»Óиø³öÏêϸÊý×Ö¡£¡£¡£¡£¡£
https://www.cbc.ca/news/business/giant-tiger-customer-data-breach-1.7154572?&web_view=true
5. µÂ¹ú 1.7Íò¸ö Microsoft Exchange ЧÀÍÆ÷Ò×Êܵ½¹¥»÷
3ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬µÂ¹úÁª°îÐÅÏ¢Çå¾²°ì¹«ÊÒ (BSI)ÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬µÂ¹úԼĪ 45000 ̨¿ÉÒÔ²»ÊÜÏÞÖÆµØ´Ó»¥ÁªÍø»á¼ûµÄ Microsoft Exchange ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬Ô¼ÄªÓÐ 12%ÒѾ²»ÔÙΪÆäÌṩÇå¾²¸üС±¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ËùÓÐÃæÏò»¥ÁªÍøµÄЧÀÍÆ÷ÖÐÔ¼ÓÐ 25% ÔËÐÐ Exchange 2016 ºÍ 2019£¬£¬£¬£¬£¬£¬£¬µ«Ã»ÓÐ×°ÖÃ×îеÄÇå¾²²¹¶¡¡£¡£¡£¡£¡£BSI µ£ÐĹ¥»÷Õß»áͨ¹ýʹÓà CVE-2024-21410 À´ÆÆËðÕâЩЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬CVE-2024-21410 ÊÇÒ»¸öÑÏÖØµÄÌØÈ¨ÌáÉýÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÏàʶĿµÄÓû§µÄ NTLM ƾ֤²¢¡°Öм̡±ÕâЩƾ֤£¬£¬£¬£¬£¬£¬£¬ÒÔ½«×Ô¼º×÷ΪÓû§ÏòÒ×Êܹ¥»÷µÄ Exchange Server ¾ÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Ëü¡°ÒѾÒâʶµ½¸ÃÎó²î±»Ê¹Óá±£¬£¬£¬£¬£¬£¬£¬²¢ÇÒËæºóÒѽ«ÆäÌí¼Óµ½ CISA µÄÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖС£¡£¡£¡£¡£
https://www.helpnetsecurity.com/2024/03/26/vulnerable-microsoft-exchange-servers/
6. ¶à¸ö Apple ²úÆ·Öб£´æí§Òâ´úÂëÖ´ÐÐÎó²î
3ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬¶à¸ö Apple ²úÆ·Öз¢Ã÷ÁËÒ»¸öÎó²î (CVE-2024-1580)£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÄܵ¼ÖÂí§Òâ´úÂëÖ´ÐС£¡£¡£¡£¡£ÀÖ³ÉʹÓôËÎó²î¿ÉÄܵ¼ÖÂÔÚµÇÈÎÃü»§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£Æ¾Ö¤ÓëÓû§¹ØÁªµÄȨÏÞ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ×°ÖóÌÐò£»£»£»Éó²é¡¢¸ü¸Ä»òɾ³ýÊý¾Ý£»£»£»»ò½¨Éè¾ßÓÐÍêÈ«Óû§È¨ÏÞµÄÐÂÕÊ»§¡£¡£¡£¡£¡£Óë¾ßÓÐÖÎÀíÓû§È¨ÏÞµÄÓû§Ïà±È£¬£¬£¬£¬£¬£¬£¬ÆäÕÊ»§ÉèÖÃΪÔÚϵͳÉÏÓµÓнÏÉÙÓû§È¨ÏÞµÄÓû§Êܵ½µÄÓ°Ïì¿ÉÄܸüС¡£¡£¡£¡£¡£ÏÖÔÚ»¹Ã»ÓйØÓÚ´ËÎó²î±»´ó¹æÄ£Ê¹Óõı¨¸æ¡£¡£¡£¡£¡£
https://www.cisecurity.org/advisory/a-vulnerability-in-multiple-apple-products-could-allow-for-arbitrary-code-execution_2024-031


¾©¹«Íø°²±¸11010802024551ºÅ