DICK¡®S ÔÚÔâÊÜÍøÂç¹¥»÷ºó¹Ø±Õµç×ÓÓʼþ²¢Ëø¶¨Ô±¹¤ÕË»§
Ðû²¼Ê±¼ä 2024-08-308ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÌåÓýÓÃÆ·ÁãÊÛ¾ÞÍ·µÏ¿ËÌåÓýÓÃÆ·¹«Ë¾£¨DICK'S£©¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäÉñÃØÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£Õâ¼ÒÓµÓÐ857¼ÒÃŵꡢÄêÊÕÈë´ï129.8ÒÚÃÀÔªµÄ²Æ²ú500Ç¿ÆóÒµ£¬£¬£¬£¬£¬£¬£¬ÔÚ8ÔÂ21ÈÕ·¢Ã÷ÆäÐÅϢϵͳ±»µÚÈý·½Î´ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¡£DICK'SѸËÙÆô¶¯ÍøÂçÇå¾²ÏìÓ¦ÍýÏ룬£¬£¬£¬£¬£¬£¬²¢ÓëÍⲿר¼ÒÏàÖúÊÓ²ì´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±¹Ø±ÕÁ˵ç×ÓÓʼþϵͳ²¢Ëø¶¨ËùÓÐÔ±¹¤ÕË»§£¬£¬£¬£¬£¬£¬£¬ÒÔ¸ôÀëÍþв¡£¡£¡£¡£¡£¡£¡£Ô±¹¤Ðèͨ¹ýÉí·ÝÑéÖ¤²Å»ªÖØÐ»á¼ûÄÚ²¿ÏµÍ³£¬£¬£¬£¬£¬£¬£¬ÊÐËÁµç»°Ïß·ҲÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¹«Ë¾ÌåÏÖÏÖÔÚÔËӪδÊÜ×ÌÈÅ£¬£¬£¬£¬£¬£¬£¬²¢ÒÑÏòÖ´·¨²¿·Ö±¨¸æ´ËÎ¥¹æÐÐΪ£¬£¬£¬£¬£¬£¬£¬µ«Ïêϸй¶ϸ½ÚÉÐδ¹ûÕæ¡£¡£¡£¡£¡£¡£¡£DICK'SÔÚÌá½»¸øÃÀ¹ú֤ȯÉúÒâίԱ»áµÄÎļþÖÐÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬»ùÓÚÄ¿½ñÕÆÎÕµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ±»ÒÔΪ²»×é³ÉÖØ´óÓ°Ï죬£¬£¬£¬£¬£¬£¬µ«ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/dicks-shuts-down-email-locks-employee-accounts-after-cyberattack/
2. LummaC2бäÖÖʹÓÃPowerShellÓë¸ß¼¶»ìÏýÊÖÒÕÇÔÈ¡Êý¾Ý
8ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬ÈðÊ¿ÍøÂçÇå¾²¹«Ë¾Ontinue½üÆÚ½ÒÆÆÁËLummaC2¶ñÒâÈí¼þµÄÒ»¸öбäÖÖ£¬£¬£¬£¬£¬£¬£¬Æä»î¶¯ÏÔÖøÔöÇ¿£¬£¬£¬£¬£¬£¬£¬¶ÔÍøÂçÇå¾²×é³ÉÑÏÖØÍþв¡£¡£¡£¡£¡£¡£¡£Õâ¿î±äÖÖʹÓÃPowerShell¾ÙÐÐÆðԴѬȾ£¬£¬£¬£¬£¬£¬£¬Á¬Ïµ»ìÏýÊÖÒÕºÍÀú³Ì×¢ÈëÊֶΣ¬£¬£¬£¬£¬£¬£¬ÇÄÎÞÉùÏ¢µØÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£LummaC2×Ô2022ÄêÆð±ãÒÔ¶ñÒâÈí¼þ¼´Ð§ÀÍ(MaaS)ÐÎʽ»î¶¯£¬£¬£¬£¬£¬£¬£¬½üÆÚ¸üÊÇͨ¹ýÖØ´óÕ½ÂÔÉý¼¶£¬£¬£¬£¬£¬£¬£¬ÈçʹÓÃÆÆ½âÈí¼þ¼°YouTubeÇþµÀÈö²¥£¬£¬£¬£¬£¬£¬£¬Õ¹ÏÖÁËÆä¸ß¶ÈµÄ˳ӦÐÔºÍÒþ²ØÐÔ¡£¡£¡£¡£¡£¡£¡£×îз¢Ã÷µÄ±äÖÖÖУ¬£¬£¬£¬£¬£¬£¬PowerShellÏÂÁî¾ÓÉÈ«ÐÄ»ìÏýµ«¿É½âÂ룬£¬£¬£¬£¬£¬£¬Õ¹ÏÖÁËÆäÏÂÔØ²¢Ö´Ðеڶþ½×¶ÎAES¼ÓÃܸºÔصÄÏêϸ°ì·¨¡£¡£¡£¡£¡£¡£¡£¸ºÔØËæºó×¢ÈëWindowsÕýµ±Àú³Ìdllhost.exe£¬£¬£¬£¬£¬£¬£¬ÒÔʵÏÖÔ¶³Ì¿ØÖÆ¡¢Êý¾ÝÇÔÈ¡¼°³¤ÆÚ»¯Ñ¬È¾¡£¡£¡£¡£¡£¡£¡£¸Ã±äÖÖ»¹½ÓÄÉIPÒþ²Ø¡¢×Ô½ç˵Óû§ÊðÀíµÈÊֶΣ¬£¬£¬£¬£¬£¬£¬½øÒ»²½ÌÓ±ÜÇå¾²¼ì²â¡£¡£¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´ËÍþв£¬£¬£¬£¬£¬£¬£¬Ontinue½¨Òé×éÖ¯ÔöÇ¿¶Ëµã¼ì²âºÍÏìÓ¦(EDR)°²ÅÅ£¬£¬£¬£¬£¬£¬£¬ÊµÑé¹¥»÷ÃæïÔÌ(ASR)Õ½ÂÔ£¬£¬£¬£¬£¬£¬£¬²¢¹Ø×¢Ìض¨µÄÍ×ÐÖ¸±ê(IOC)ÒÔ×Ô¶¯·ÀÓù¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/lummac2-malware-variant-powershell-obfuscation-steal-data/
3. Mirai½©Ê¬ÍøÂçʹÓÃAVTECH IPÉãÏñ»úÁãÈÕÎó²îCVE-2024-7029
8ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬AkamaiµÄÇå¾²Ç鱨ÏìÓ¦ÍŶӣ¨SIRT£©¿ËÈÕÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬Mirai½©Ê¬ÍøÂç»î¶¯Õýͨ¹ýʹÓÃAVTECH IPÉãÏñ»úÖеÄÐÂÅû¶ÁãÈÕÎó²îCVE-2024-7029ѸËÙÉìÕÅ¡£¡£¡£¡£¡£¡£¡£´ËRCEÎó²î±£´æÓÚÉãÏñ»úµÄ¡°ÁÁ¶È¡±¹¦Ð§ÖУ¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒѽè´Ë°²ÅÅÁËMiraiµÄ±äÖÖ¡°Corona¡±£¬£¬£¬£¬£¬£¬£¬¶ÔÒªº¦»ù´¡ÉèÊ©×é³ÉÖØ´óÍþв¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÊÜÓ°ÏìµÄÉãÏñÍ·ÐͺÅÒÑÍ£²ú£¬£¬£¬£¬£¬£¬£¬µ«ÆäÔÚ¶à¸öÁìÓòµÄÒ»Á¬Ê¹ÓÃ͹ÏÔÁËÖÎÀíÒÅÁô×°±¸ºÍδÐÞ¸´Îó²îµÄ½ôÆÈÐÔ¡£¡£¡£¡£¡£¡£¡£CISAÒàÐû²¼±¨¸æÇ¿µ÷´ËÎó²îµÄÑÏÖØÐÔ¼°ÆäÆÕ±éÓ°ÏìDZÁ¦¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬Mirai½©Ê¬ÍøÂç²»µ«Ê¹ÓÃCVE-2024-7029£¬£¬£¬£¬£¬£¬£¬»¹Í¬Ê±Ãé×¼ÁËAVTECH¼°ÆäËûϵͳÖеĶà¸öÎó²î£¬£¬£¬£¬£¬£¬£¬Õ¹ÏÖÁËÆä¶àÑù»¯µÄ¹¥»÷Õ½ÂÔ¡£¡£¡£¡£¡£¡£¡£Corona±äÌåµÄÈö²¥Ê¼ÓÚ2023Äêµ×£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ2024Äê3ÔµִïÁË»îÔ¾á¯Áë¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜCVE-2024-7029µÄPoCÔçÔÚ2019Äê¾ÍÒѹûÕæ£¬£¬£¬£¬£¬£¬£¬ÕýʽCVE±àºÅÖ±µ½2024Äê8Ô²ÅÐû²¼¡£¡£¡£¡£¡£¡£¡£¼øÓÚÄ¿½ñÎÞ¹Ù·½²¹¶¡¿ÉÓ㬣¬£¬£¬£¬£¬£¬Akamai½¨ÒéÁ¬Ã¦Í£ÓÃÊÜÓ°Ïì×°±¸×÷ΪÖ÷Òª»º½â²½·¥¡£¡£¡£¡£¡£¡£¡£
https://securityonline.info/mirai-botnet-exploits-zero-day-vulnerability-cve-2024-7029-in-avtech-ip-cameras/
4. PerlÉçÇøÖÒÑÔ£ºcpanminus¹¤¾ß±£´æÑÏÖØÎó²îCVE-2024-45321
8ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬Perl ÉçÇø½üÆÚÐû²¼Á˹ØÓÚCVE-2024-45321µÄ½ôÆÈÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬Ö¸³öÆÕ±éʹÓõÄApp::cpanminus£¨cpanm£©¹¤¾ß±£´æÑÏÖØÎó²î£¬£¬£¬£¬£¬£¬£¬ÆäCVSSÆÀ·Ö¸ß´ï9.8¡£¡£¡£¡£¡£¡£¡£´ËÎó²îÔ´ÓÚcpanminusĬÈÏʹÓò»Çå¾²µÄHTTPÅþÁ¬´ÓCPANÏÂÔØPerlÄ£¿£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬µ¼Ö¡°Î´¾ÍêÕûÐÔ¼ì²éµÄ´úÂëÏÂÔØ¡±ÎÊÌ⣨CWE-494£©£¬£¬£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÓÐʱ»úÔÚ´«ÊäÖи͝´úÂ룬£¬£¬£¬£¬£¬£¬½ø¶øÔÚÓû§ÏµÍ³ÉÏÖ´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£¼øÓÚcpanminus×÷Ϊ¹Ù·½CPAN¿Í»§¶ËµÄÇáÁ¿¼¶Ì滻Ʒ£¬£¬£¬£¬£¬£¬£¬ÆäÎó²îÓ°Ïì¹æÄ£¿ÉÄܼ«ÎªÆÕ±é£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÍþвµ½ÒÀÀµ¸Ã¹¤¾ßÖÎÀíPerlÄ£¿£¿£¿£¿£¿£¿£¿éµÄϵͳÇå¾²¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¹Ù·½²¹¶¡ÉÐδÐû²¼£¬£¬£¬£¬£¬£¬£¬µ«Óû§Ó¦Á¬Ã¦½ÓÄÉÐж¯½µµÍΣº¦¡£¡£¡£¡£¡£¡£¡£ÍƼö²½·¥°üÀ¨£ºÒ»ÊÇͨ¹ýÏÂÁîÐвÎÊý»òÇéÐαäÁ¿ÉèÖÃHTTPS¾µÏñ£¬£¬£¬£¬£¬£¬£¬µ«Ðè×¢ÖØ´Ë¾Ù¿ÉÄÜÏÞÖÆ¶Ô¾É°æ±¾ºÍ¿ª·¢°æ±¾µÄ»á¼û£»£»£»£»£»£»¶þÊÇÖ±½ÓÐÞ¸Äcpanm¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬£¬½«ËùÓÐHTTP¶ËµãÌæ»»ÎªHTTPS£¬£¬£¬£¬£¬£¬£¬ÒÔ±£´æ¶ÔBackPanµÈ×ÊÔ´µÄ»á¼û£»£»£»£»£»£»ÈýÊÇת¶øÊ¹ÓÃĬÈÏÖ§³ÖHTTPSÅþÁ¬µÄ±¸Óÿͻ§¶Ë£¬£¬£¬£¬£¬£¬£¬ÈçCPAN.pm 2.35+»òApp::cpm£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·±£Ä£¿£¿£¿£¿£¿£¿£¿éÏÂÔØµÄÇå¾²ÐÔ¡£¡£¡£¡£¡£¡£¡£
https://securityonline.info/critical-cve-2024-45321-flaw-in-popular-perl-module-installer-cpanminus-no-patch-available/
5. ÍþвÕßʹÓÃαÔìµÄPalo Alto GlobalProtect¹¤¾ßÃé×¼Öж«
8ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼Ñо¿ÍÅ¶Ó½ÒÆÆÁËÒ»ÏîÕë¶ÔÖж«×éÖ¯µÄ¸ß¶ÈÖØ´ó¶ñÒâÈí¼þ»î¶¯£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯Í¨¹ýαװ³ÉÕýµ±µÄPalo Alto GlobalProtect VPN¿Í»§¶Ë¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÒ»¸öÃûΪ¡°setup.exe¡±µÄ¶ñÒâÎļþ£¬£¬£¬£¬£¬£¬£¬¸ÃÎļþÄ£ÄâVPN×°ÖóÌÐò£¬£¬£¬£¬£¬£¬£¬ÔÚÊܺ¦ÕßϵͳÖа²ÅÅÐéα×é¼þ£¬£¬£¬£¬£¬£¬£¬²¢½èÖúÐÂ×¢²áµÄ¡°sharjahconnect¡±ÓòÃûαװ³ÉÕýµ±VPNÃÅ»§£¬£¬£¬£¬£¬£¬£¬ÒÔÔöÇ¿ÓÕÆÐÔ¡£¡£¡£¡£¡£¡£¡£´Ë¶ñÒâÈí¼þʹÓÃInteractshÏîÄ¿¾ÙÐÐÐűê²Ù×÷£¬£¬£¬£¬£¬£¬£¬Í¨¹ýDNSÇëÇóÓëC&CЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼à¿ØÑ¬È¾Àú³Ì²¢Ö´ÐжàÖÖ¶ñÒâʹÃü£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ö´ÐÐPowerShell¾ç±¾¡¢ÖÎÀíÀú³Ì¡¢Êý¾ÝÇÔÈ¡Óë¼ÓÃÜͨѶ¡£¡£¡£¡£¡£¡£¡£ÆäÎÞаµÄÏÂÁî½á¹¹Ê¹ÆäÄܹ»ÎÞаӦ¶Ô²î±ð¹¥»÷ÐèÇ󣬣¬£¬£¬£¬£¬£¬Í¬Ê±½ÓÄÉÖØ´ó¹æ±ÜÊÖÒÕÒÔÌӱܼì²â¡£¡£¡£¡£¡£¡£¡£Öж«¼°È«Çò×éÖ¯ÃæÁÙÑÏËàÌôÕ½£¬£¬£¬£¬£¬£¬£¬ÐèÇ¿»¯¶Ëµã±£»£»£»£»£»£»¤¡¢¸üÐÂÇå¾²ÐÒ飬£¬£¬£¬£¬£¬£¬²¢ÔöǿԱ¹¤Çå¾²½ÌÓýÓëÒâʶÌáÉý£¬£¬£¬£¬£¬£¬£¬ÒÔÓÐÓõÖÓù´ËÀà¸ß¼¶Íþв¡£¡£¡£¡£¡£¡£¡£
https://www.trendmicro.com/en_us/research/24/h/threat-actors-target-middle-east-using-fake-tool.html
6. ÃÀ³¬130¼ÒÆóÒµÔâ´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬GRIT½ÒÆÆÖØ´óVPN´¹ÂÚȦÌ×
8ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬GuidePoint ResearchºÍIntelligence Team£¨GRIT£©½üÆÚ½ÒÆÆÁËÒ»ÏîÕë¶ÔÓ¢ÓïʹÓÃÕߣ¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇÃÀ¹úÁè¼Ý130¼ÒÆóÒµµÄÖØ´ó´¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£×Ô2024Äê6ÔÂ26ÈÕÆð£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß×¢²áÁËÓëÄ¿µÄ¹«Ë¾VPNЧÀÍÏàËÆµÄ¸ß·ÂÓòÃû£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýµç»°Ã°³äITÖ§³ÖÖ°Ô±£¬£¬£¬£¬£¬£¬£¬ÒÔ½â¾öVPNµÇ¼ÎÊÌâΪÓÉ£¬£¬£¬£¬£¬£¬£¬ÓÕµ¼Ô±¹¤µã»÷º¬ÓжñÒâÁ´½ÓµÄ¶ÌÐÅ¡£¡£¡£¡£¡£¡£¡£ÕâЩÁ´½Óµ¼ÏòÈ«ÐÄÉè¼ÆµÄ¼ÙVPNµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬£¬£¬²»µ«Íâ¹ÛÉÏÓëÕæÊµÒ³ÃæÎÞÒ죬£¬£¬£¬£¬£¬£¬»¹°üÀ¨ÌØÖƵÄVPN×éÑ¡Ï£¬£¬£¬£¬£¬£¬Èç¡°TestVPN¡±ºÍ¡°RemoteVPN¡±£¬£¬£¬£¬£¬£¬£¬ÒÔÔöÇ¿ÓÕÆÐÔ¡£¡£¡£¡£¡£¡£¡£¼´±ãÃæÁÙ¶àÒòËØÈÏÖ¤£¨MFA£©£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒ²ÄÜͨ¹ýÓÕµ¼Óû§Åú×¼ÍÆËÍ֪ͨÀ´ÈƹýÇå¾²·ÀµØ£¬£¬£¬£¬£¬£¬£¬×îÖÕÆÈ¡Óû§Æ¾Ö¤¡£¡£¡£¡£¡£¡£¡£µ½Êֺ󣬣¬£¬£¬£¬£¬£¬Óû§»á±»Öض¨ÏòÖÁÕýµ±VPNÒ³Ãæ£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÄܱ»ÒªÇóÔٴεǼ£¬£¬£¬£¬£¬£¬£¬´Ó¶øÇ¿»¯ÎÊÌâÒѽâ¾öµÄ¼ÙÏ󡣡£¡£¡£¡£¡£¡£Ò»µ©»ñµÃVPN»á¼ûȨ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßËæ¼´Õö¿ªÍøÂçɨÃ裬£¬£¬£¬£¬£¬£¬Ñ°ÕÒºáÏòÒÆ¶¯¡¢³¤ÆÚ»¯¼°È¨ÏÞÌáÉýµÄʱ»ú¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿ÉÄÜÊܵ½ÍøÂç´¹ÂÚ¹¥»÷Ó°ÏìµÄÓû§Ó¦¼ì²éÆäÈÕÖ¾£¬£¬£¬£¬£¬£¬£¬Éó²éÒÑÍù 30 ÌìÄÚÀ´×Ô VPN ·ÖÅÉ IP µØµãµÄ¿ÉÒɻ¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/news/us-vpn-phishing-attack/


¾©¹«Íø°²±¸11010802024551ºÅ