Nitrogenαװ³É PuTTY »ò FileZilla °²ÅÅBlackCat

Ðû²¼Ê±¼ä 2024-04-11
1. Nitrogenαװ³É PuTTY »ò FileZilla °²ÅÅBlackCat


4ÔÂ9ÈÕ£¬£¬£¬£¬×î³õµÄÈëÇÖÊÇ´Óͨ¹ý Google ËÑË÷ÏÔʾµÄ¶ñÒâ¹ã¸æ×îÏȵÄ¡£ ¡£¡£¡£¡£ÎÒÃÇÊӲ쵽Á˼¸¸ö²î±ðµÄ¹ã¸æ¿Í»§ÕÊ»§£¬£¬£¬£¬ÕâЩÕÊ»§¶¼±¨¸æ¸øÁ˹ȸè¡£ ¡£¡£¡£¡£ÕâЩÓÕ¶üÊÇ IT ÖÎÀíÔ±³£ÓõÄÊÊÓóÌÐò£¬£¬£¬£¬ÀýÈç PuTTY ºÍ FileZilla¡£ ¡£¡£¡£¡£Nitrogen ÍþвÐÐΪÕß°²ÅŵĶñÒâ¹ã¸æ»ù´¡ÉèʩʹÓÃÎ±×°Ò³Ãæ£¬£¬£¬£¬¸ÃÒ³Ãæ¿ÉÒÔÖØ¶¨Ïòµ½ÓÕ¶üÍøÕ¾»òÎÛÃûÕÑÖøµÄ Rick Astley ÊÓÆµ¡£ ¡£¡£¡£¡£ÈôÊǻÉÐδÎäÆ÷»¯»ò¶ñÒâЧÀÍÆ÷¼ì²âµ½ÎÞЧÁ÷Á¿£¨»úеÈË¡¢ÅÀ³æµÈ£©£¬£¬£¬£¬Ôò¿ÉÒÔ¼¤»îµ½ÓÕ¶üÒ³ÃæµÄÖØ¶¨Ïò¡£ ¡£¡£¡£¡£¸Ã¶ñÒâ¹ã¸æÁ´µÄ×îºóÒ»²½°üÀ¨ÏÂÔØ²¢ÔËÐжñÒâÈí¼þÓÐÓøºÔØ¡£ ¡£¡£¡£¡£Nitrogen ʹÓÃÒ»ÖÖ³ÆÎª DLL ÅÔ¼ÓÔØµÄÊÖÒÕ£¬£¬£¬£¬Í¨¹ý¸ÃÊÖÒÕ£¬£¬£¬£¬Õýµ±ÇÒ¾­ÓÉÊðÃûµÄ¿ÉÖ´ÐÐÎļþ»áÆô¶¯ DLL¡£ ¡£¡£¡£¡£ÔÚ±¾ÀýÖУ¬£¬£¬£¬setup.exe£¨À´×Ô Python Software Foundation£©²àÔØpython311.dll (Nitrogen)¡£ ¡£¡£¡£¡£


https://www.malwarebytes.com/blog/threat-intelligence/2024/04/active-nitrogen-campaign-delivered-via-malicious-ads-for-putty-filezilla


2. ΢ÈíÐÞ¸´ÁË Windows Á½¸öÒѾ­±»Ê¹ÓõÄÁãÈÕÎó²î


4ÔÂ9ÈÕ£¬£¬£¬£¬Î¢ÈíÔÚ 2024 Äê 4 ÔµIJ¹¶¡ÐÇÆÚ¶þʱ´úÐÞ¸´ÁËÁ½¸ö±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î£¬£¬£¬£¬Ö»¹Ü¸Ã¹«Ë¾×î³õδÄܶÔËüÃǾÙÐбê¼Ç¡£ ¡£¡£¡£¡£µÚÒ»¸öÎó²î±»¸ú×ÙΪCVE-2024-26234£¬£¬£¬£¬±»ÐÎòΪÊðÀíÇý¶¯³ÌÐòÓÕÆ­Îó²î£¬£¬£¬£¬Ö¼ÔÚ¸ú×٠ʹÓÃÓÐÓÃµÄ Microsoft Ó²¼þ¿¯ÐÐÉÌÖ¤ÊéÊðÃûµÄ¶ñÒâÇý¶¯³ÌÐò£¬£¬£¬£¬¸Ã¶ñÒâÎļþ±»¡°Catalog Thales¡±±ê¼ÇΪ¡°Catalog Authentication Client Service¡±£¬£¬£¬£¬¿ÉÄÜÊÇÊÔͼð³ä Thales Group¡£ ¡£¡£¡£¡£µÚ¶þ¸öÁãÈÕÎó²î±»×·×ÙΪCVE-2024-29988£¬£¬£¬£¬±»ÐÎòΪÓɱ£»£»£» £»£»£»¤»úÖÆ¹ÊÕÏÈõµãµ¼ÖµÄSmartScreenÌáÐÑÇå¾²¹¦Ð§ÈƹýÎó²î¡£ ¡£¡£¡£¡£CVE-2024-29988 ÊÇ CVE-2024-21412 ȱÏݵÄÈÆ¹ýÒªÁ죬£¬£¬£¬ÓÉÇ÷ÊÆ¿Æ¼¼ÁãÈÕÍýÏëµÄ Peter Girnus ÒÔ¼° Google ÍþвÆÊÎöС×é Dmitrij Lenz ºÍ Vlad Stolyarov ±¨¸æ¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-two-windows-zero-days-exploited-in-malware-attacks/


3. Áè¼Ý9.1Íǫ̀ LG ÖÇÄܵçÊÓÈÝÒ×Êܵ½ºÚ¿Í¹¥»÷


4ÔÂ9ÈÕ£¬£¬£¬£¬Bitdefender Ñо¿Ö°Ô±ÔÚÖÇÄܵçÊÓÉÏÔËÐÐµÄ LG webOS Öз¢Ã÷Á˶à¸öÎó²î£¬£¬£¬£¬ÕâЩÎó²î¿É±»ÓÃÀ´ÈƹýÊÚȨ²¢»ñµÃ×°±¸µÄ root »á¼ûȨÏÞ¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄÎó²îÓ°Ïì LG µçÊÓÉÏÔËÐÐµÄ WebOS °æ±¾ 4 ÖÁ 7¡£ ¡£¡£¡£¡£WebOS ÔÚ¶Ë¿Ú 3000/3001 (HTTP/HTTPS/WSS) ÉÏÔËÐÐÒ»ÏîЧÀÍ£¬£¬£¬£¬LG ThinkQ ÖÇÄÜÊÖ»úÓ¦ÓóÌÐòʹÓøÃЧÀÍÀ´¿ØÖƵçÊÓ¡£ ¡£¡£¡£¡£ÒªÉèÖøÃÓ¦ÓóÌÐò£¬£¬£¬£¬Óû§±ØÐèÔÚµçÊÓÆÁÄ»ÉÏÊäÈë PIN Âë¡£ ¡£¡£¡£¡£ÕÊ»§´¦Öóͷ£³ÌÐòÖеĹýʧʹ¹¥»÷Õß¿ÉÒÔÍêÈ«Ìø¹ý PIN ÑéÖ¤²¢½¨ÉèÌØÈ¨Óû§ÉèÖÃÎļþ¡£ ¡£¡£¡£¡£Ö»¹Ü¸ÃÒ×Êܹ¥»÷µÄЧÀͽöÓÃÓÚ LAN »á¼û£¬£¬£¬£¬µ«Í¨¹ýÅÌÎÊ Shodan£¬£¬£¬£¬ËûÃÇ·¢Ã÷ÁËÁè¼Ý 91000 ¸ö½«¸Ã ЧÀÍ̻¶µ½»¥ÁªÍøµÄ×°±¸¡£ ¡£¡£¡£¡£´Ëʱ£¬£¬£¬£¬Ì»Â¶µÄ×°±¸ÊýÄ¿ïÔÌ­ÖÁ88000¸ö¡£ ¡£¡£¡£¡£´ó´ó¶¼ÃæÏò»¥ÁªÍøµÄ×°±¸Î»ÓÚº«¹ú¡¢ÃÀ¹ú¡¢ÈðµäºÍ·ÒÀ¼µÈ¡£ ¡£¡£¡£¡£


https://securityaffairs.com/161651/hacking/lg-smart-tvs-vulnerable.html


4. GHC-SCW³ÆÀÕË÷Èí¼þÍÅ»ïÇÔÈ¡ÁËÆä53ÍòÈ˵Ŀµ½¡Êý¾Ý


4ÔÂ9ÈÕ£¬£¬£¬£¬Íþ˹¿µÐÇÖÝÖÐÄϲ¿·ÇÓªÀûÐÔÒ½ÁÆÐ§ÀÍÌṩÉÌ Group Health Cooperative (GHC-SCW) Åû¶£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïÓÚ 1 Ô·ÝÇÖÈëÆäÍøÂ磬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨Áè¼Ý 50 ÍòÈ˵ÄСÎÒ˽¼ÒºÍÒ½ÁÆÐÅÏ¢µÄÎļþ¡£ ¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬¹¥»÷ÕßÎÞ·¨¼ÓÃÜÊÜѬȾµÄ×°±¸£¬£¬£¬£¬ÕâʹµÃ GHC-SCW ÔÚÍâ²¿ÍøÂçÊÂÎñÏìӦר¼ÒµÄ×ÊÖúϱ£»£»£» £»£»£»¤Æäϵͳ£¬£¬£¬£¬²¢ÔÚ¸ôÀëÕâЩװ±¸ÒÔ×èÖ¹Îó²îºó½«Æä»Ö¸´ÔÚÏß¡£ ¡£¡£¡£¡£Ò»Ô·ÝÀÕË÷Èí¼þ¹¥»÷ʱ´ú±»µÁµÄ¿µ½¡Êý¾Ý°üÀ¨ÊÜÓ°ÏìСÎÒ˽¼ÒµÄÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢³öÉúºÍ/»òéæÃüÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢»áÔ±ºÅÂëÒÔ¼°Ò½Áưü¹ÜºÍ/»òÒ½ÁƽòÌùºÅÂë¡£ ¡£¡£¡£¡£Ö»¹ÜûÓÐÌṩÊÜÓ°ÏìÈËÊýµÄÏêϸÊý×Ö£¬£¬£¬£¬µ«ÓëÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿¹²ÏíµÄÆäËûÐÅÏ¢ÏÔʾ£¬£¬£¬£¬Êý¾Ýй¶ӰÏìÁË 533809 ÈË¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ghc-scw-ransomware-gang-stole-health-data-of-533-000-people/


5. BatBadBut Rust Îó²îʹ Windows ÏµÍ³ÃæÁÙ¹¥»÷


4ÔÂ10ÈÕ£¬£¬£¬£¬Rust ±ê×¼¿âÖеÄÒ»¸öÒªº¦Çå¾²Îó²î¿ÉÄܻᱻʹÓÃÀ´Õë¶Ô Windows Óû§²¢ÌᳫÏÂÁî×¢Èë¹¥»÷¡£ ¡£¡£¡£¡£¸ÃÎó²îµÄ±àºÅΪCVE-2024-24576£¬£¬£¬£¬CVSS ÆÀ·ÖΪ 10.0£¬£¬£¬£¬Åú×¢ÑÏÖØË®Æ½×î¸ß¡£ ¡£¡£¡£¡£Ò²¾ÍÊÇ˵£¬£¬£¬£¬Ëü½öÓ°ÏìÔÚ Windows ÉÏʹÓò»ÊÜÐÅÈεIJÎÊýŲÓÃÅú´¦Öóͷ£ÎļþµÄ³¡¾°¡£ ¡£¡£¡£¡£Rust Çå¾²ÏìÓ¦ÊÂÇé×éÔÚ 2024 Äê 4 Ô 9 ÈÕÐû²¼µÄͨ¸æÖÐÌåÏÖ£ºÔÚ Windows ÉÏʹÓà Command API ŲÓÃÅú´¦Öóͷ£Îļþ£¨´øÓÐ bat ºÍ cmd À©Õ¹Ãû£©Ê±£¬£¬£¬£¬Rust ±ê×¼¿âûÓÐ׼ȷתÒå²ÎÊý¡£ ¡£¡£¡£¡£Äܹ»¿ØÖÆ×ª´ï¸øÌìÉúÀú³ÌµÄ²ÎÊýµÄ¹¥»÷Õß¿ÉÒÔͨ¹ýÈÆ¹ýתÒåÀ´Ö´ÐÐí§Òâ shell ÏÂÁî¡£ ¡£¡£¡£¡£¸ÃȱÏÝÓ°Ïì 1.77.2 ֮ǰµÄËùÓÐ Rust °æ±¾¡£ ¡£¡£¡£¡£


https://thehackernews.com/2024/04/critical-batbadbut-rust-vulnerability.html


6. Medusa ÍÅ»ï³Æ¶ÔµÂ¿ËÈøË¹ÖÝijÕþ¸®»ú¹¹µÄ¹¥»÷ÈÏÕæ


4ÔÂ9ÈÕ£¬£¬£¬£¬ËþÀ¼ÌØÏØÆÀ¹ÀÇø£¨Tarrant County Appraisal District£©ÈÏÕæÈ·¶¨ÎÖ˹±¤µØÇøÓÃÓÚ˰ÊÕÄ¿µÄµÄ·¿µØ²ú£¬£¬£¬£¬Á½ÖÜǰÏò Recorded Future News  Ö¤Êµ£¬£¬£¬£¬¸ÃÏØÊÇÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õß¡£ ¡£¡£¡£¡£ÖÜÒ»£¬£¬£¬£¬Medusa ÍøÂç·¸·¨ÍÅ»ïÉù³Æ¶ÔÕâÆðÊÂÎñÈÏÕæ£¬£¬£¬£¬²¢Íþв³Æ£¬£¬£¬£¬ÈôÊDz»Ö§¸¶ 10 ÍòÃÀÔªµÄÊê½ð£¬£¬£¬£¬ËûÃǽ«ÔÚÁùÌìÄÚ¹ûÕæ½ü 218 GB µÄÊý¾Ý¡£ ¡£¡£¡£¡£ÏعÙԱûÓлØÓ¦ÓйØÊÇ·ñÖ§¸¶Êê½ðµÄÖÃÆÀÇëÇ󣬣¬£¬£¬µ«ËûÃÇÓÚ 4 Ô 3 ÈÕÐû²¼ÖÒÑԳƣ¬£¬£¬£¬ºÚ¿Í¹ûÕæÁËÔ¼ 300 È˵ÄÊý¾Ý¡£ ¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ 2023 ÄêÊ״ηºÆð£¬£¬£¬£¬ÆäÊܺ¦ÕßÃûµ¥Ñ¸ËÙÀ©´ó¡£ ¡£¡£¡£¡£ÃÀ¶ÅɯÒò¶Ô·áÌïºÍ¼ÓÄôóÁ½¼Ò×î´óÒøÐеĹ¥»÷¶ø³ÉΪͷÌõÐÂÎÅ¡£ ¡£¡£¡£¡£


https://therecord.media/tarrant-county-texas-ransomware-attack-medusa