È«Çò70Óà×éÖ¯ÔâVoldemortÌØ¹¤Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2024-09-02

1. È«Çò70Óà×éÖ¯ÔâVoldemortÌØ¹¤Èí¼þ¹¥»÷


9ÔÂ1ÈÕ£¬ £¬£¬£¬£¬£¬Proofpoint Ñо¿Ö°Ô±½ÒÆÆÁËÒ»ÆðÖØ´óµÄÌØ¹¤»î¶¯£¬ £¬£¬£¬£¬£¬¸Ã»î¶¯Í¨¹ýÃûΪ¡°Voldemort¡±µÄ¶¨ÖƶñÒâÈí¼þ£¬ £¬£¬£¬£¬£¬Ó°ÏìÈ«Çò70¶à¸ö×éÖ¯¡£¡£¡£¡£´Ë¶ñÒâÈí¼þͨ¹ýÁè¼Ý20,000·â´¹ÂÚÓʼþÈö²¥£¬ £¬£¬£¬£¬£¬ÌØÊâÊÇ8ÔÂ17ÈÕ¼¤Ôö½ü6,000·â£¬ £¬£¬£¬£¬£¬Óʼþαװ¶à¹ú˰Îñ»ú¹ØÓÕÆ­Óû§¡£¡£¡£¡£¹¥»÷Á´Ê¹ÓÃGoogle AMP Cache URL¡¢CloudflareËíµÀ¡¢WebDAV¹²Ïí¼°Python¾ç±¾µÈÊÖÒÕ£¬ £¬£¬£¬£¬£¬ÇÉÃîÖ¸µ¼Óû§ÏÂÔØ²¢Ö´ÐжñÒâLNK»òZIPÎļþ¡£¡£¡£¡£VoldemortµÄÒ»´óÌØµãÊÇʹÓÃGoogle±í¸ñ¾ÙÐÐÏÂÁîÓë¿ØÖÆ£¨C2£©£¬ £¬£¬£¬£¬£¬¹æ±Ü¹Å°åÇå¾²¼ì²â£¬ £¬£¬£¬£¬£¬ÏÔʾÁ˸߶ȵÄÒþ²ØÐÔºÍÁ¢ÒìÐÔ¡£¡£¡£¡£ÆäÄ¿µÄÖ÷ÒªËø¶¨ÔÚ°ü¹Ü¹«Ë¾¡¢º½¿Õº½Ìì¡¢½»Í¨ÔËÊä¼°´óѧµÈ18¸ö±ÊÖ±ÐÐÒµ£¬ £¬£¬£¬£¬£¬ÇÒ¾«×¼¶¨Î»Êܺ¦ÕßÖÁÆäÆÜÉí¹ú£¬ £¬£¬£¬£¬£¬ÏÔʾ³öÉîÌõÀíµÄÌØ¹¤ÄîÍ·¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹½ÓÄÉÓÐÊýµÄWindows .search-msÎļþÃûÌ㬠£¬£¬£¬£¬£¬Î±×°Ô¶³ÌÎļþΪÍâµØÎļþ£¬ £¬£¬£¬£¬£¬Á¬ÏµDLLÐ®ÖÆÊÖÒÕ£¬ £¬£¬£¬£¬£¬½øÒ»²½ÔöÌíѬȾÀÖ³ÉÂÊ¡£¡£¡£¡£È»¶ø£¬ £¬£¬£¬£¬£¬¹¥»÷»î¶¯ÖÐҲ̻¶³öһЩ¼òª֮´¦£¬ £¬£¬£¬£¬£¬ÈçʹÓüòÆÓµÄÎļþÃüÃûÔ¼¶¨£¬ £¬£¬£¬£¬£¬Ê¹µÃ¸Ã»î¶¯·ºÆð³ö¡°¸¥À¼¿Ï˹̹ÊÓÑìºÏÌ塱µÄÌØµã£¬ £¬£¬£¬£¬£¬ÄÑÒÔÅжÏÍþвÐÐΪÕßµÄÕæÊµÊÖÒÕˮƽ¡£¡£¡£¡£


https://securityonline.info/cyber-espionage-campaign-leverages-novel-tactics-and-voldemort-malware-to-target-global-organizations/https://securityonline.info/cyber-espionage-campaign-leverages-novel-tactics-and-voldemort-malware-to-target-global-organizations/


2. APT×éÖ¯Citrine SleetʹÓÃChrome 0day°²ÅÅFudModule rootkit


8ÔÂ31ÈÕ£¬ £¬£¬£¬£¬£¬Ó볯ÏÊÓйØÁªµÄAPT×éÖ¯Citrine Sleet£¨Òà³ÆAppleJeus¡¢Labyrinth ChollimaµÈ£©Ê¹ÓÃÐÂÐÞ²¹µÄGoogle ChromeÁãÈÕÎó²îCVE-2024-7971£¬ £¬£¬£¬£¬£¬Àֳɰ²ÅÅÁËFudModule rootkit¡£¡£¡£¡£¸ÃÎó²î£¨CVSSÆÀ·Ö8.8£©Ó°ÏìÌØ¶¨°æ±¾µÄChromium£¬ £¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚɳºÐ»¯µÄäÖȾÆ÷Àú³ÌÖÐÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£Citrine Sleetͨ¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂÚÕ½ÂÔ£¬ £¬£¬£¬£¬£¬ÓÕʹÊܺ¦Õß»á¼ûÆä¿ØÖƵĶñÒâÓòÃû£¬ £¬£¬£¬£¬£¬½ø¶ø´¥·¢CVE-2024-7971Îó²î£¬ £¬£¬£¬£¬£¬ÏÂÔØ²¢Ö´ÐаüÀ¨WindowsɳºÐÌÓÒÝÎó²î£¨CVE-2024-38106£©ºÍFudModule rootkitµÄshellcode¡£¡£¡£¡£FudModule rootkit½ÓÄÉÖ±½ÓÄں˹¤¾ß²Ù×÷£¨DKOM£©ÊÖÒÕ£¬ £¬£¬£¬£¬£¬´ÓÓû§Ä£Ê½ÔËÐв¢¸Ä¶¯Äںˣ¬ £¬£¬£¬£¬£¬×ÌÈÅÇå¾²»úÖÆ£¬ £¬£¬£¬£¬£¬Ö»¹ÜÔÚÄ¿µÄ×°±¸ÉÏδ¼ì²âµ½ºóÐø¶ñÒâ»î¶¯¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬£¬£¬£¬CVE-2024-38106ËäÒÑÐÞ¸´£¬ £¬£¬£¬£¬£¬µ«¿ÉÄÜÓëCitrine SleetµÄʹÓûÎÞÖ±½Ó¹ØÁª£¬ £¬£¬£¬£¬£¬ÌåÏÖ¿ÉÄܱ£´æ¡°Îó²îÅöײ¡±Õ÷Ï󡣡£¡£¡£MicrosoftÇ¿µ÷£¬ £¬£¬£¬£¬£¬×é֯Ӧȷ±£ÏµÍ³ÊµÊ±¸üУ¬ £¬£¬£¬£¬£¬°²Åž߱¸ÖÜÈ«ÍøÂç¹¥»÷Á´¿É¼ûÐÔµÄÇå¾²½â¾ö¼Æ»®£¬ £¬£¬£¬£¬£¬²¢ÔöÇ¿²Ù×÷ÇéÐÎÉèÖ㬠£¬£¬£¬£¬£¬ÒÔÓÐÓüì²âºÍ×èÖ¹´ËÀà¸ß¼¶Íþв¡£¡£¡£¡£


https://securityaffairs.com/167848/breaking-news/north-korea-linked-apt-exploited-chrome-zero-day-cve-2024-7971.html


3. GitHub ÔâÀÄÓãºÊýǧÌõÐéαÐÞ¸´Ì¸ÂÛ·Ö·¢Lumma Stealer¶ñÒâÈí¼þ


8ÔÂ31ÈÕ£¬ £¬£¬£¬£¬£¬GitHub ƽ̨½üÆÚÔâÓöÁËÀÄÓ㬠£¬£¬£¬£¬£¬²»·¨·Ö×Óͨ¹ýÔÚÏîĿ̸ÂÛÖÐÐû²¼ÐéαÐÞ¸´³ÌÐòµÄ·½·¨£¬ £¬£¬£¬£¬£¬ÆÕ±é·Ö·¢ Lumma Stealer ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£ÕâÒ»»î¶¯×î³õÓÉteloxide rust¿âµÄТ˳ÕßÔÚRedditÉÏ½ÒÆÆ£¬ £¬£¬£¬£¬£¬ËæºóBleepingComputerÉîÈëÊӲ췢Ã÷£¬ £¬£¬£¬£¬£¬ÊýǧÌõÀàËÆÌ¸ÂÛÒѱ鲼GitHub¶à¸öÏîÄ¿£¬ £¬£¬£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØ²¢Ö´ÐаüÀ¨¶ñÒâÈí¼þµÄÎļþ¡£¡£¡£¡£ÕâЩ̸ÂÛαװ³ÉÎÊÌâ½â¾ö¼Æ»®£¬ £¬£¬£¬£¬£¬ÓÕÆ­Óû§´Ómediafire.com»òbit.lyÁ´½ÓÏÂÔØÃûΪ¡°fix.zip¡±µÄ¼ÓÃÜ´æµµ£¬ £¬£¬£¬£¬£¬²¢ÌáÐÑʹÓÃͳһÃÜÂë¡°changeme¡±½âËø¡£¡£¡£¡£ÈýÌìÄÚ£¬ £¬£¬£¬£¬£¬´ËÀàÍÆ¹ã¶ñÒâÈí¼þµÄ̸ÂÛÊýÄ¿¼¤ÔöÖÁÁè¼Ý29,000Ìõ¡£¡£¡£¡£ÏÂÔØµÄ´æµµÖаüÀ¨DLLÎļþºÍ¿ÉÖ´ÐÐÎļþx86_64-w64-ranlib.exe£¬ £¬£¬£¬£¬£¬¾­ÆÊÎöÈ·ÒÔΪLumma Stealer£¬ £¬£¬£¬£¬£¬Ò»ÖÖÄܹ»ÉîÈëÓû§ä¯ÀÀÆ÷ÇÔÈ¡Ãô¸ÐÐÅÏ¢µÄ¸ß¼¶ÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬Ëü»¹Õë¶Ô¼ÓÃÜÇ®±ÒÇ®°üºÍÌØ¶¨ÃüÃûµÄÎı¾Îļþ¾ÙÐÐËÑË÷£¬ £¬£¬£¬£¬£¬ÍøÂç¿ÉÄܰüÀ¨Ë½Ô¿ºÍÃÜÂëµÄÊý¾Ý¡£¡£¡£¡£Ö»¹ÜGitHubѸËÙÏìÓ¦²¢É¾³ýÁËÕâЩ¶ñÒâ̸ÂÛ£¬ £¬£¬£¬£¬£¬µ«ÒÑÓÐÓû§Êܺ¦¡£¡£¡£¡£ÊÜÓ°ÏìÓû§ÐèÁ¬Ã¦ÎªËùÓÐÕË»§Ì滻ΨһÃÜÂ룬 £¬£¬£¬£¬£¬²¢½«¼ÓÃÜÇ®±Ò×ªÒÆÖÁÐÂÇ®°ü¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/github-comments-abused-to-push-password-stealing-malware-masked-as-fixes/


4. ÖØ´óÍøÂç´¹ÂÚ¹¥»÷½ÒÆÆ£ºAsyncRATÓëInfostealerÁªÊÖÍþвÓû§Çå¾²


8ÔÂ31ÈÕ£¬ £¬£¬£¬£¬£¬eSentire ÍþвÏìÓ¦²¿·Ö£¨TRU£©µÄÑо¿Ö°Ô±½ÒÆÆÁËÒ»ÏîÖØ´óµÄÍøÂç´¹ÂÚ¹¥»÷£¬ £¬£¬£¬£¬£¬¸Ã¹¥»÷ʹÓÃÈ«ÐÄÉè¼ÆµÄѬȾÁ´·Ö·¢ AsyncRAT Ô¶³Ì»á¼ûľÂí£¨RAT£©¼°ÆäÐÅÏ¢ÇÔÈ¡²å¼þ Infostealer¡£¡£¡£¡£¹¥»÷ʼÓÚÒ»·â¿´ËÆÎÞº¦µÄ´¹ÂÚÓʼþ£¬ £¬£¬£¬£¬£¬ÄÚº¬Î±×°³ÉÕý³£ÎļþµÄ¶ñÒâ´æµµ¡£¡£¡£¡£Ö´Ðкó£¬ £¬£¬£¬£¬£¬ÕâÒ»´æµµ´¥·¢ÁËһϵÁÐÖØ´ó²Ù×÷£¬ £¬£¬£¬£¬£¬°üÀ¨ÏÂÔØ²¢Ö´ÐлìÏýµÄ VBScript ºÍ PowerShell ¾ç±¾£¬ £¬£¬£¬£¬£¬×îÖÕ°²ÅÅ AsyncRAT ¼°Æä²å¼þ¡£¡£¡£¡£¹¥»÷Àú³ÌÖУ¬ £¬£¬£¬£¬£¬¶ñÒâÈí¼þͨ¹ýÏÂÔØ¿´ËÆÎÞº¦µÄͼÏñÎļþ£¨ÊµÎª ZIP ´æµµ£©²¢½âѹ³ö¸ü¶à¶ñÒâ¾ç±¾ºÍ¿ÉÖ´ÐÐÎļþ£¬ £¬£¬£¬£¬£¬ÔÚÊܺ¦ÕßϵͳÖÐÔú¸ù¡£¡£¡£¡£ËüʹÓÃÍýÏëʹÃüά³Ö³¤ÆÚÐÔ£¬ £¬£¬£¬£¬£¬Ã¿Á½·ÖÖÓÖ´ÐÐÒ»´Î¶ñÒâ´úÂ룬 £¬£¬£¬£¬£¬²¢Í¨¹ýÀú³Ì¿ÕÐÄ»¯ÊÖÒÕ½« AsyncRAT ×¢ÈëÕýµ±Àú³ÌÖÐÒÔÌӱܼì²â¡£¡£¡£¡£AsyncRAT ²»µ«Îª¹¥»÷ÕßÌṩ¶ÔÊÜѬȾϵͳµÄÔ¶³Ì¿ØÖÆÈ¨£¬ £¬£¬£¬£¬£¬»¹´îÔØÁË Infostealer ²å¼þ£¬ £¬£¬£¬£¬£¬¸Ã²å¼þרÃÅÃé×¼ÍøÂçä¯ÀÀÆ÷ÖеļÓÃÜÇ®°üÀ©Õ¹ºÍ2FAÑéÖ¤¹¤¾ß£¬ £¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡°üÀ¨ÃÜÂ롢ƾ֤ºÍ¼ÓÃÜÇ®±ÒÇ®°üÔÚÄÚµÄÃû¹óÊý¾Ý¡£¡£¡£¡£eSentire TRU ºôÓõÓû§¼á³Ö¸ß¶ÈСÐÄ¡£¡£¡£¡£


https://securityonline.info/evasive-phishing-campaign-delivers-asyncrat-and-infostealer/


5. People Data Labs1.7ÒÚÌõÃô¸ÐÐÅÏ¢ÎÞÃÜÂë̻¶


8ÔÂ30ÈÕ£¬ £¬£¬£¬£¬£¬CybernewsÑо¿ÍŶӽüÆÚ·¢Ã÷ÁËÒ»ÏîÖØ´óÊý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬£¬£¬Éæ¼°Áè¼Ý1.7ÒÚÌõÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢ÔÚ»¥ÁªÍøÉϹûÕæÌ»Â¶£¬ £¬£¬£¬£¬£¬Êý¾ÝÄÚÈÝÏ꾡£¬ £¬£¬£¬£¬£¬°üÀ¨È«Ãû¡¢ÁªÏµ·½·¨¡¢µØµã¡¢½ÌÓýÅä¾°¼°ÊÂÇéÂÄÀúµÈ¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý¼¯±êÓС°PDL¡±±êʶ£¬ £¬£¬£¬£¬£¬Ö¸Ïò¾É½ðɽµÄÊý¾Ý¾­¼Í¹«Ë¾People Data Labs£¨PDL£©£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾×Ô³ÆÓµÓÐ15ÒÚСÎÒ˽¼Òµµ°¸Êý¾Ý¿â£¬ £¬£¬£¬£¬£¬Ð§ÀÍÓÚÆóÒµÓªÏú¡¢ÏúÊÛ¼°ÕÐÆ¸µÈÁìÓò¡£¡£¡£¡£Ö»¹ÜÊý¾Ýй¶ԴͷÉÐδÃ÷È·£¬ £¬£¬£¬£¬£¬µ«ElasticsearchЧÀÍÆ÷δÉèÃÜÂëµÄÑÏÖØÇå¾²Îó²î³ÉΪ½¹µã£¬ £¬£¬£¬£¬£¬ÕâÖÖÉèÖü«Ò×±»ºÚ¿ÍʹÓ㬠£¬£¬£¬£¬£¬Ñ¸ËÙÇÔÈ¡Êý¾Ý£¬ £¬£¬£¬£¬£¬¶ÔСÎÒ˽¼ÒÒþ˽×é³ÉÖØ´óÍþв£¬ £¬£¬£¬£¬£¬ÔöÌíÉí·Ý͵ÇÔ¡¢Ú²Æ­¼°ÍøÂç´¹ÂÚΣº¦¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬£¬£¬£¬PDL´ËǰÒѱ¬·¢¹ýÀàËÆµÄÊý¾Ýй¶Ê¹Ê£¬ £¬£¬£¬£¬£¬Í¬ÑùÒòδ± £»£»£»£»£»¤µÄElasticsearchЧÀÍÆ÷µ¼Ö£¬ £¬£¬£¬£¬£¬Éæ¼°Êý¾Ý¹æÄ£¸üÎªÖØ´ó¡£¡£¡£¡£´Ë´Îй¶µÄ¡°Version 26.2¡±Êý¾Ý¼¯¿ÉÄÜÓë´ËǰÊÂÎñÓйØÁª£¬ £¬£¬£¬£¬£¬ÔÙ´Î̻¶ÁËPDLÔÚÊý¾ÝÇå¾²·½ÃæµÄÖØ´óȱÏÝ¡£¡£¡£¡£


https://cybernews.com/security/people-data-labs-data-leak/


6. Roblox¿ª·¢Ö°Ô±ÆµÔâ¹¥»÷£¬ £¬£¬£¬£¬£¬Î±Ôìnpm°üÈö²¥¶ñÒâÈí¼þ


9ÔÂ2ÈÕ£¬ £¬£¬£¬£¬£¬Roblox ¿ª·¢Ö°Ô±³ÉΪһϵÁжñÒâ¹¥»÷µÄÄ¿µÄ£¬ £¬£¬£¬£¬£¬ÕâЩ¹¥»÷ͨ¹ýαÔì npm °ü£¬ £¬£¬£¬£¬£¬ÓÈÆäÊÇÄ£ÄâÊ¢ÐÐµÄ noblox.js ¿â£¬ £¬£¬£¬£¬£¬ÍýÏëÇÔÈ¡Ãô¸ÐÊý¾ÝºÍÆÆËðϵͳ¡£¡£¡£¡£×Ô½ñÄêÍ·ÒÔÀ´£¬ £¬£¬£¬£¬£¬¶à¸öÃûΪ noblox.js ±äÖÖµÄÈí¼þ°ü±»È·ÒÔΪ¶ñÒ⣬ £¬£¬£¬£¬£¬°üÀ¨ noblox.js-proxy-server ºÍ noblox-ts£¬ £¬£¬£¬£¬£¬ËüÃÇͨ¹ýÆ·ÅÆÐ®ÖÆ¡¢×éºÏÇÀ×¢ºÍÐǺÅÐ®ÖÆµÈÊÖÒÕαװ³ÉÕýµ±¿â£¬ £¬£¬£¬£¬£¬ÓÕµ¼¿ª·¢ÕßÏÂÔØ¡£¡£¡£¡£ÕâЩ¶ñÒâ°üÈç noblox.js-async¡¢noblox.js-thread µÈ£¬ £¬£¬£¬£¬£¬Ö»¹ÜÏÂÔØÁ¿ÓÐÏÞ£¬ £¬£¬£¬£¬£¬È´ÀÖ³ÉÓÕÆ­ÁËÓû§¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬¹¥»÷Õß»¹½ÓÄÉ starjacking ÊÖ·¨£¬ £¬£¬£¬£¬£¬½«ÐéαÈí¼þ°üµÄÔ´´æ´¢¿â±ê¼ÇΪÏÖʵ noblox.js ¿â£¬ £¬£¬£¬£¬£¬ÔöÇ¿ÐÅÈζÈ¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ°üÄÚǶµÄ´úÂë²»µ«ÇÔÈ¡ Discord ÁîÅÆ£¬ £¬£¬£¬£¬£¬»¹Í¨¹ýÐÞ¸Ä Windows ×¢²á±íºÍ¸üзÀ²¡¶¾É¨³ýÁбíÀ´Ìӱܼì²âºÍά³Ö³¤ÆÚÐÔ¡£¡£¡£¡£Ã¿µ±Óû§ÊµÑé·­¿ª Windows ÉèÖÃÓ¦ÓÃʱ£¬ £¬£¬£¬£¬£¬¶ñÒâÈí¼þ±ã»á±»¼¤»î¡£¡£¡£¡£×îÖÕÄ¿µÄÊǰ²ÅÅ Quasar RAT£¬ £¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄÜÔ¶³Ì¿ØÖÆÊÜѬȾϵͳ£¬ £¬£¬£¬£¬£¬²¢½«ÍøÂçµ½µÄÐÅϢͨ¹ý Discord webhook ·¢ËÍÖÁ C2 ЧÀÍÆ÷¡£¡£¡£¡£Ö»¹ÜÒÑÓв½·¥É¨³ýÕâЩ¶ñÒâÈí¼þ£¬ £¬£¬£¬£¬£¬µ«ÐÂÈí¼þ°üÈÔÒ»Ö±·ºÆð£¬ £¬£¬£¬£¬£¬ÌáÐÑ¿ª·¢Ö°Ô±Ðè¼á³Ö¸ß¶ÈСÐÄ¡£¡£¡£¡£


https://thehackernews.com/2024/09/malicious-npm-packages-mimicking.html