Î÷ÑÅͼ¸ÛºÍÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡ÒÉÔâÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2024-08-26
1. Î÷ÑÅͼ¸ÛºÍÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡ÒÉÔâÍøÂç¹¥»÷


8ÔÂ25ÈÕ£¬£¬£¬£¬£¬Î÷ÑÅͼ¸ÛÓëÎ÷ÑÅͼ-Ëþ¿ÆÂí¹ú¼Ê»ú³¡Í¬Ê±ÔËÓª£¬£¬£¬£¬£¬½üÆÚÔâÓöÁËÑÏÖØµÄÐÅϢϵͳÌôÕ½£¬£¬£¬£¬£¬ÒÉËÆÔâÓöÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£ÖÜÁùÇåÔ磬£¬£¬£¬£¬¿Ú°¶Ê×ÏÈͨ¹ýÉ罻ýÌåÆ½Ì¨×ª´ïÁËЧÀÍÖÐÖ¹µÄÇéÐΣ¬£¬£¬£¬£¬Ëæºó»ú³¡¹Ù·½È·ÈÏÔâÓöÁËϵͳÖÐÖ¹£¬£¬£¬£¬£¬²¢ÌåÏÖÕâ¿ÉÄÜÔ´ÓÚÒ»´ÎÍøÂç¹¥»÷¡£¡£¡£¡£¡£Ëæ×ÅÊÂ̬Éú³¤ÖÁÖÜÁùÍí¼ä£¬£¬£¬£¬£¬»ú³¡·½ÃæÌåÏÖЧÀÍÖÐֹ״̬ÒÀ¾Éδ½â£¬£¬£¬£¬£¬ÇÒÎÞ·¨Ã÷È·¸ø³ö»Ö¸´ÖÜȫЧÀ͵Äʱ¼ä±í¡£¡£¡£¡£¡£ÃæÁÙÕâһͻ·¢×´Ì¬£¬£¬£¬£¬£¬»ú³¡·½ÃæÆð¾¢Ó¦¶Ô£¬£¬£¬£¬£¬½¨ÒéÓοÍʹÓú½¿Õ¹«Ë¾ÌṩµÄÊÖ»úÓ¦ÓóÌÐò°ìÀíµÇ»úÊÖÐø²¢´òÓ¡µÇ»úÅÆ¼°ÐÐÀî±êÇ©£¬£¬£¬£¬£¬Í¬Ê±ÌáÐÑÂÿÍÌáǰµÖ´ï»ú³¡ÒÔÓ¦¶Ô¿ÉÄܵÄÑÓÎ󡣡£¡£¡£¡£¾ÝTechCrunchµÄÊÖÒÕÆÊÎö£¬£¬£¬£¬£¬×èÖ¹ÖÜÈÕ̫ƽÑóʱ¼äÔ糿£¬£¬£¬£¬£¬Î÷ÑÅͼ¸Û¶ÔÍâЧÀ͵ÄÍøÂç»ù´¡ÉèÊ©£¬£¬£¬£¬£¬ÓÈÆäÊÇÆä¹Ù·½ÍøÕ¾£¬£¬£¬£¬£¬ÈÔ´¦ÓÚ²»¿É»á¼ûµÄÀëÏß״̬£¬£¬£¬£¬£¬ÏÔʾ³ö´Ë´ÎÍøÂç¹¥»÷¶Ô¿Ú°¶¼°»ú³¡ÔËÓªÔì³ÉÁËÏÔÖøÓ°Ïì¡£¡£¡£¡£¡£


https://techcrunch.com/2024/08/25/the-port-of-seattle-and-sea-tac-airport-say-theyve-been-hit-by-possible-cyberattack/


2. PEAKLIGHT ¶ñÒâÈí¼þ£ºÒ»ÖÖÐÂÐÍÒþÃØÄÚ´æÍþв·ºÆð


8ÔÂ24ÈÕ£¬£¬£¬£¬£¬MandiantµÄÍøÂçÇå¾²ÍÅ¶Ó½ÒÆÆÁËÒ»ÖÖÃûΪPEAKLIGHTµÄÖØ´óÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬£¬Ëüͨ¹ýһϵÁÐÈ«ÐÄÉè¼ÆµÄ¶à½×¶ÎѬȾÀú³Ì£¬£¬£¬£¬£¬ÇÄÎÞÉùÏ¢µØÔÚÊܺ¦ÕßµÄϵͳÖÐÈö²¥°üÀ¨LUMMAC.V2¡¢SHADOWLADDERºÍCRYPTBOTÔÚÄڵĶàÖÖÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£PEAKLIGHTµÄÈëÇÖʼÓÚαװ³ÉµÁ°æÓ°Ï·µÄ¶ñÒâZIPÎļþ£¬£¬£¬£¬£¬ÄÚº¬Î±×°³ÉýÌåͼ±êµÄLNK¿ì½Ý·½·¨Îļþ£¬£¬£¬£¬£¬ÓÕµ¼Óû§Ö´ÐÐǶÈëµÄPowerShell¾ç±¾£¬£¬£¬£¬£¬½ø¶øÏÂÔØ²¢Ö´ÐÐÄÚ´æÖеÄJavaScriptÖ²Èë³ÌÐò¡£¡£¡£¡£¡£¸ÃÖ²Èë³ÌÐòʹÓÃÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©ÍйÜ£¬£¬£¬£¬£¬²¢½ÓÄÉ»ìÏýÊÖÒÕ¹æ±Ü¼ì²â£¬£¬£¬£¬£¬×îÖÕÏÂÔØ²¢Ö´ÐÐPEAKLIGHTÏÂÔØ³ÌÐò£¬£¬£¬£¬£¬¸Ã³ÌÐòƾ֤ϵͳÇéÐÎÏÂÔØÌØÁíÍâ¶ñÒâ¸ºÔØ¡£¡£¡£¡£¡£PEAKLIGHT±äÖÖ¶àÑù£¬£¬£¬£¬£¬µ«½¹µãÄ¿µÄÒ»Ö£ºÒþ²ØµØ°²ÅÅÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£¡£¡£¡£¡£ÆÊÎöÏÔʾ£¬£¬£¬£¬£¬PEAKLIGHTÏÂÔØµÄZIPÎļþ°üÀ¨SHADOWLADDERºÍCRYPTBOTµÈ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬Í¬Ê±Ê¹ÓÃÕýµ±ÊÓÆµÎļþ×÷ΪÓÕ¶ü¡£¡£¡£¡£¡£MandiantÇ¿µ÷£¬£¬£¬£¬£¬´ËÀ๥»÷͹ÏÔÁ˼á³ÖСÐÄ¡¢½ÓÄɶàÌõÀíÇå¾²²½·¥µÄÖ÷ÒªÐÔ£¬£¬£¬£¬£¬°üÀ¨Èí¼þ¸üС¢Ç¿ÃÜÂëºÍ¶àÒòËØÈÏÖ¤£¬£¬£¬£¬£¬ÒÔ¼°°²ÅÅÓÐÓõĶ˵㱣» £»£»£»¤¡£¡£¡£¡£¡£


https://securityonline.info/peaklight-malware-a-new-stealthy-memory-only-threat-emerges/


3. CISAÖÒÑÔVersa NetworksÎó²îCVE-2024-39717Õý±»Æð¾¢Ê¹ÓÃ


8ÔÂ23ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½üÆÚ½ôÆÈÐû²¼Á˹ØÓÚCVE-2024-39717Îó²îµÄÇå¾²¾¯±¨£¬£¬£¬£¬£¬Ö¸³ö¸Ã¸ßÑÏÖØÐÔÎó²îÕý±»Æð¾¢Ê¹Ó㬣¬£¬£¬£¬¶ÔʹÓÃVersa Networks Director GUIµÄϵͳ×é³ÉÖØ´óÍþв¡£¡£¡£¡£¡£´ËÎó²îÔÊÐí¾ßÓи߼¶ÖÎÀíȨÏÞµÄÓû§Í¨¹ýÉÏ´«Î±×°Îª.pngͼƬµÄ¶ñÒâÎļþ£¬£¬£¬£¬£¬½ø¶ø¿ÉÄÜ»ñȡδÊÚȨ»á¼ûȨÏÞ»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£ÕâÒ»Îó²îµÄÑÏÖØÐÔÔÚÓÚ£¬£¬£¬£¬£¬ËüÒÑÈ·Èϱ»Ò°Íâ¹¥»÷ÕßʹÓ㬣¬£¬£¬£¬²¿·ÖÔµ¹ÊÔ­ÓÉÊǿͻ§Î´×ñÕÕ֮ǰÐû²¼µÄ·À»ðǽָÄÏ¡£¡£¡£¡£¡£Ö»¹Ü¸Ã¶ñÒâÎļþÔÚ´ó¶¼Ö÷Á÷ä¯ÀÀÆ÷ÉÏÎÞ·¨Ö±½ÓÖ´ÐУ¬£¬£¬£¬£¬µ«Ç±ÔÚµÄʹÓÃʵÀý¼°Î´Ö¤ÊµµÄ±¨¸æÈÔÅúעΣº¦Ò»Á¬±£´æ¡£¡£¡£¡£¡£CISAÒѽ«CVE-2024-39717ÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬£¬²¢±Þ²ßÁª°î»ú¹¹ÔÚ2024Äê9ÔÂ13ÈÕǰ°²ÅÅ×îÐÂÇå¾²²¹¶¡£¬£¬£¬£¬£¬ÒÔÌá·ÀDZÔÚµÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬ËùÓÐʹÓÃVersa Networks Director GUIµÄ×é֯ӦѸËÙÉó²é²¢ÔöÇ¿ÆäÇ徲ЭÒ飬£¬£¬£¬£¬Í¬Ê±Á¬Ã¦Ó¦ÓÃËùÓпÉÓõÄÇå¾²²¹¶¡ºÍ¸üУ¬£¬£¬£¬£¬ÒÔÈ·±£ÍøÂçÇå¾²ÃâÊÜ´ËÎó²îµÄË𺦡£¡£¡£¡£¡£


https://securityonline.info/cve-2024-39717-versa-networks-director-gui-flaw-under-active-attack-cisa-issues-urgent-patching-directive/


4. еÄmacOS¶ñÒâÈí¼þCthulhu StealerÃé×¼AppleÓû§Êý¾Ý


8ÔÂ23ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÕë¶ÔApple macOSµÄÐÂÐÍÐÅÏ¢ÇÔÈ¡³ÌÐòCthulhu Stealer£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ×Ô2023Äêµ×ÆðÒÔÿÔÂ500ÃÀÔªµÄMaaS£¨¶ñÒâÈí¼þ¼´Ð§ÀÍ£©Ä£Ê½Ìṩ£¬£¬£¬£¬£¬¿É¿çx86_64ÓëArm¼Ü¹¹ÔËÐС£¡£¡£¡£¡£Cthulhu Stealerαװ³ÉÕýµ±Èí¼þÈçCleanMyMacµÈ£¬£¬£¬£¬£¬Ê¹ÓÃÓû§ÐÅÈÎÈÆ¹ýGatekeeper±£» £»£»£»¤£¬£¬£¬£¬£¬ÓÕµ¼Óû§ÊäÈëÃÜÂ룬£¬£¬£¬£¬½øÒ»²½ÇÔÈ¡MetaMaskÃÜÂë¡¢iCloud Keychain¼°ä¯ÀÀÆ÷cookieµÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£Ëü»¹Ê¹ÓÃChainbreakerµÈ¹¤¾ßÍøÂçϵͳÐÅÏ¢£¬£¬£¬£¬£¬²¢½«Êý¾ÝѹËõºó·¢ËÍÖÁC2ЧÀÍÆ÷¡£¡£¡£¡£¡£Ö»¹ÜCthulhu StealerÔÚÊÖÒÕÉϲ¢²»Öش󣬣¬£¬£¬£¬È±·¦¸ß¼¶·´ÆÊÎöÊֶΣ¬£¬£¬£¬£¬µ«ËüչʾÁËÍþвÐÐΪÕßÈÕÒæ¹Ø×¢macOSµÄÇ÷ÊÆ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ±³ºóµÄ¿ª·¢ÕßÒòÄÚ²¿¾À·×ÒÑÍ˳öÊг¡£¬£¬£¬£¬£¬µ«Õâ²¢²»É¨³ýδÀ´ÀàËÆÍþвµÄÔÙÏÖ¡£¡£¡£¡£¡£ÃæÁÙÕâһΣº¦£¬£¬£¬£¬£¬Æ»¹û¹«Ë¾ÒѽÓÄɲ½·¥£¬£¬£¬£¬£¬ÍýÏëÔÚmacOS SequoiaÖÐÔöÇ¿¶ÔδÊðÃû»òδ¹«Ö¤Èí¼þµÄÏÞÖÆ£¬£¬£¬£¬£¬Óû§Ðèͨ¹ýϵͳÉèÖöø·Ç¼òÆÓ²Ù×÷À´ÔÊÐíÈí¼þÔËÐУ¬£¬£¬£¬£¬ÒÔÌá¸ßϵͳÇå¾²ÐÔ¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬×¨¼Ò½¨ÒémacOSÓû§½ö´Ó¿ÉÐÅȪԴÏÂÔØÈí¼þ£¬£¬£¬£¬£¬¼á³Öϵͳ¸üÐÂÖÁ×îа汾¡£¡£¡£¡£¡£


https://thehackernews.com/2024/08/new-macos-malware-cthulhu-stealer.html?&web_view=true


5. QilinÀÕË÷Èí¼þж¯Ïò£ºÇÔÈ¡Chromeƾ֤


8ÔÂ23ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²ÁìÓò·ºÆðÁËÒ»ÆðÒýÈËעĿµÄQilinÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¾ÝSophosÍøÂçÇå¾²¹«Ë¾±¨¸æ£¬£¬£¬£¬£¬´Ë´Î¹¥»÷²»µ«ÏÞÓڹŰåµÄÎļþ¼ÓÃÜÓëÀÕË÷£¬£¬£¬£¬£¬»¹ÓÐÊýµØÁ¬ÏµÁËÆ¾Ö¤ÍøÂçÊֶΣ¬£¬£¬£¬£¬¶ÔÊܺ¦ÕßµÄGoogle Chromeä¯ÀÀÆ÷ÖеÄÃô¸ÐÐÅÏ¢×é³ÉÍþв¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃVPNÃÅ»§Ð¹Â¶µÄ¡¢È±·¦¶àÒòËØÈÏÖ¤µÄƾ֤£¬£¬£¬£¬£¬ÀÖ³ÉÉøÍ¸Ä¿µÄÍøÂ磬£¬£¬£¬£¬²¢ÔÚÊ×´ÎÈëÇÖºóDZÔÚ18Ìì¾ÙÐÐÉî¶ÈºóʹÓᣡ£¡£¡£¡£¹¥»÷ÕßÇÉÃîµØ±à¼­ÁËÓò¿ØÖÆÆ÷ÖеÄĬÈÏÓòÕ½ÂÔ£¬£¬£¬£¬£¬ÒýÈëÁËÁ½¸öÒªº¦¾ç±¾£ºÒ»ÊÇÓÃÓÚËѼ¯Chromeä¯ÀÀÆ÷´æ´¢Æ¾Ö¤µÄPowerShell¾ç±¾¡°IPScanner.ps1¡±£¬£¬£¬£¬£¬¶þÊÇ´¥·¢¸Ã¾ç±¾Ö´ÐеÄÅú´¦Öóͷ£Îļþ¡°logon.bat¡±¡£¡£¡£¡£¡£ÕâЩ¾ç±¾Í¨¹ýµÇ¼ʱµÄ×éÕ½ÂÔ¹¤¾ß£¨GPO£©×Ô¶¯Ö´ÐУ¬£¬£¬£¬£¬Ê¹µÃÿ´ÎÓû§µÇ¼ʱ¶¼¿ÉÄÜÔÚ²»ÖªÇéµÄÇéÐÎÏ´¥·¢Æ¾Ö¤ÇÔÈ¡£¬£¬£¬£¬£¬Ò»Á¬ÈýÌìÖ®¾Ã£¬£¬£¬£¬£¬¼«´óµØÔöÌíÁËÐÅϢй¶µÄΣº¦¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬¹¥»÷Õß²»µ«¼ÓÃÜÁËÎļþ¡¢°²ÅÅÀÕË÷ÐÅ£¬£¬£¬£¬£¬»¹ÇÔÈ¡ÁËÍøÂçµ½µÄƾ֤£¬£¬£¬£¬£¬²¢É¨³ý»î¶¯ºÛ¼£¡£¡£¡£¡£¡£Chromeƾ֤µÄʧÔôÆÈʹÊܺ¦ÕßÐèÔÚ¶à¸öµÚÈý·½Ð§ÀÍÉÏÖØÖÃÕË»§ÃÜÂ룬£¬£¬£¬£¬½øÒ»²½¼Ó¾çÁËÊÂÎñµÄÖØ´óÐÔºÍÓ°Ïì¹æÄ£¡£¡£¡£¡£¡£


https://thehackernews.com/2024/08/new-qilin-ransomware-attack-uses-vpn.html


6. Android¶ñÒâÈí¼þNGateʹÓÃNFCÊÖÒÕÓÃÓÚATMÈ¡¿î


8ÔÂ23ÈÕ£¬£¬£¬£¬£¬ÔÚÒÑÍù¾Å¸öÔÂÖУ¬£¬£¬£¬£¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESET½ÒÆÆÁËÒ»ÆðÕë¶Ô½Ý¿ËÈý¼ÒÒøÐеÄÖØ´óÍøÂç·¸·¨»î¶¯¡£¡£¡£¡£¡£·¸·¨·Ö×ÓʹÓÃÃûΪNGateµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬Í¨¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÓʼþÓÕÆ­Android×°±¸Óû§ÏÂÔØÎ±×°³ÉÒøÐÐÓ¦ÓõĶñÒâ³ÌÐò¡£¡£¡£¡£¡£Õâ¿îÈí¼þ²»µ«ÄÜÇÔÈ¡Óû§µÄÒøÐÐÐÅÏ¢£¬£¬£¬£¬£¬»¹½ÓÄÉÁËÒ»ÖÖØ¨¹ÅδÓеÄNFCÖмÌÊÖÒÕ£¬£¬£¬£¬£¬ÄÜ´ÓÊܺ¦ÕßµÄʵÌåÖ§¸¶¿¨ÖÐÔ¶³Ì´«Êä½ü³¡Í¨Ñ¶Êý¾ÝÖÁ¹¥»÷Õß×°±¸£¬£¬£¬£¬£¬½ø¶øÖ´ÐÐATMÉúÒâ»ò×ªÒÆ×ʽ𡣡£¡£¡£¡£´Ë¶ñÒâÈí¼þ´ÓδÉϼÜGoogle PlayÊÐËÁ£¬£¬£¬£¬£¬Ö÷Ҫͨ¹ý´¹ÂÚÓʼþÖеķǹٷ½Á´½ÓÈö²¥¡£¡£¡£¡£¡£Êܺ¦Õß±»ÓÕµ¼¿ªÆôNFC¹¦Ð§²¢°²ÅÅÖ§¸¶¿¨ÓÚÊÖ»ú±³²¿£¬£¬£¬£¬£¬ÒÔÍê³É¿¨ÐÅÏ¢µÄ²»·¨»ñÈ¡¡£¡£¡£¡£¡£ESET×Ô2023Äê11ÔÂÆð×·×Ù¸Ã×éÖ¯£¬£¬£¬£¬£¬·¢Ã÷Æä»î¶¯ÔÚÒ»Ãû³ÉÔ±±»²¶ºó¶ÌÔÝÕϰ­£¬£¬£¬£¬£¬µ«´ËÀàAndroid¶ñÒâÈí¼þµÄй¦Ð§ÈÔÊôÊ×´ÎÔÚÒ°Íâ±»·¢Ã÷¡£¡£¡£¡£¡£×¨¼ÒÖÒÑÔ¹«ÖÚÐèÌá¸ßСÐÄ£¬£¬£¬£¬£¬¼ì²éÍøÕ¾URL¡¢Í×ÉÆ±£¹ÜPINÂ룬£¬£¬£¬£¬²¢ÔÚ·ÇÐëҪʱ¹Ø±ÕNFC¹¦Ð§£¬£¬£¬£¬£¬ÍƼöʹÓÃÐéÄ⿨ÒÔïÔ̭Σº¦¡£¡£¡£¡£¡£


https://therecord.media/android-malware-atm-stealing-czech-banks