IvantiÖÒÑÔ³ÆÉÐÓÐÈý¸öCSAÁãÈÕÎó²îÕýÔÚ±»¹¥»÷ÕßʹÓÃ

Ðû²¼Ê±¼ä 2024-10-10

1. IvantiÖÒÑÔ³ÆÉÐÓÐÈý¸öCSAÁãÈÕÎó²îÕýÔÚ±»¹¥»÷ÕßʹÓÃ


10ÔÂ8ÈÕ£¬£¬£¬£¬£¬ £¬ÃÀ¹úITÈí¼þ¹«Ë¾Ivanti½üÆÚÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬ £¬Ö¼ÔÚÐÞ¸´Èý¸ö±»Æð¾¢Ê¹ÓõÄÐÂÐÍÔÆÐ§ÀÍ×°±¸£¨CSA£©ÁãÈÕÎó²î£¬£¬£¬£¬£¬ £¬ÕâЩÎó²î±àºÅΪCVE-2024-9379¡¢CVE-2024-9380ºÍCVE-2024-9381¡£¡£¡£¡£¡£¹¥»÷Õß½«ÕâЩÎó²îÓë9Ô·ÝÒÑÐÞ²¹µÄÁíÒ»¸öCSAÁãÈÕÎó²î£¨CVE-2024-8963£©Á¬ÏµÊ¹Ó㬣¬£¬£¬£¬ £¬Í¨¹ýSQL×¢Èë¡¢ÏÂÁî×¢ÈëºÍ·¾¶±éÀúµÈÊֶΣ¬£¬£¬£¬£¬ £¬Ô¶³ÌÖ´ÐÐí§Òâ´úÂë²¢ÈÆ¹ýÇå¾²ÏÞÖÆ¡£¡£¡£¡£¡£IvantiÖÒÑԳƣ¬£¬£¬£¬£¬ £¬ÔËÐÐCSA 4.6 patch 518¼°¸üÔç°æ±¾µÄ¿Í»§ÔÚÁ¬ÏµÕâЩÎó²îʱ¿ÉÄÜÒÑÔâµ½¹¥»÷£¬£¬£¬£¬£¬ £¬²¢½¨ÒéÊÜÓ°Ïì¿Í»§Éý¼¶µ½CSA 5.0.2°æ±¾ÒÔÖØÐÞ×°±¸¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬ £¬ÖÎÀíԱӦʹÓÃEDR»òÆäËûÇå¾²Èí¼þ¾¯±¨£¬£¬£¬£¬£¬ £¬ÒÔ¼°¼ì²éеĻòÐ޸ĺóµÄÖÎÀíÔ±Óû§À´¼ì²âÈëÇÖ¼£Ï󡣡£¡£¡£¡£ÓÉÓÚCSA 4.6ÒÑÍ£²ú£¬£¬£¬£¬£¬ £¬ÈÔÔÚÔËÐд˰汾µÄ¿Í»§Ó¦¾¡¿ìÉý¼¶¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬CISAÒѽ«Ïà¹ØÎó²îÌí¼Óµ½ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖУ¬£¬£¬£¬£¬ £¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ10ÔÂ10ÈÕǰ±£»£»£»¤Ò×Êܹ¥»÷µÄϵͳ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ivanti-warns-of-three-more-csa-zero-days-exploited-in-attacks/


2. ¿¨Î÷Å·ÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬ £¬Ð§ÀÍÖÐÖ¹²¢Òý·¢Êý¾Ýй¶µ£ÐÄ


10ÔÂ8ÈÕ£¬£¬£¬£¬£¬ £¬ÈÕ±¾¿Æ¼¼¾ÞÍ·¿¨Î÷Å·ÅÌËã»ú¹«Ë¾½üÆÚÔâÓöÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬ £¬ÆäÍøÂ类δ¾­ÊÚȨµÄÐÐΪÕß»á¼û£¬£¬£¬£¬£¬ £¬µ¼ÖÂϵͳÖÐÖ¹£¬£¬£¬£¬£¬ £¬²¢Ó°ÏìÁ˲¿·ÖЧÀÍ¡£¡£¡£¡£¡£¿£¿£¿¨Î÷Å·ÒÔÊÖ±í¡¢ÅÌËãÆ÷¡¢ÀÖÆ÷¡¢Ïà»úµÈµç×Ó²úÆ·ÖøÃû£¬£¬£¬£¬£¬ £¬´Ë´Î¹¥»÷¶ÔÆäÔì³ÉÁ˲»Ð¡µÄÓ°Ïì¡£¡£¡£¡£¡£¿£¿£¿¨Î÷Å·ÔÚͨ¸æÖÐÈ·ÈÏÁË´Ë´ÎÍøÂç¹¥»÷£¬£¬£¬£¬£¬ £¬²¢ÌåÏÖÕýÔÚÓëÍⲿר¼ÒÏàÖú£¬£¬£¬£¬£¬ £¬ÒÔÈ·¶¨ÊÇ·ñÓÐСÎÒ˽¼ÒÊý¾Ý»òÆäËûÉñÃØÐÅÏ¢±»µÁ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ £¬¸Ã¹«Ë¾Î´Í¸Â¶¸ü¶àϸ½Ú£¬£¬£¬£¬£¬ £¬Ò²Î´ËµÃ÷ЧÀÍÖÐÖ¹µÄÏêϸÄÚÈÝ¡£¡£¡£¡£¡£¿£¿£¿¨Î÷Å·ÒÑÏòÊÊÓõÄÊý¾Ý±£»£»£»¤»ú¹¹±¨¸æÁË´ËÊÂÎñ£¬£¬£¬£¬£¬ £¬²¢½ÓÄÉÁËÏÞÖÆÍⲿְԱ»á¼ûµÄ²½·¥¡£¡£¡£¡£¡£Ö»¹ÜÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬ £¬µ«´Ë´ÎÊÂÎñ¶Ô¿¨Î÷Å·À´ËµÎÞÒÉÊÇÒ»´Î¹¥»÷¡£¡£¡£¡£¡£Ô¼ÄªÒ»Äêǰ£¬£¬£¬£¬£¬ £¬¿¨Î÷Å·»¹ÔøÅû¶¹ýÁíÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬ £¬Éæ¼°149¸ö¹ú¼ÒµÄ¿Í»§Êý¾Ý¡£¡£¡£¡£¡£´Ë´Î×îеÄÍøÂçÇå¾²ÊÂÎñ±¬·¢ÔÚ¿¨Î÷Å·¼´½«Òò´ó¹æÄ£ÈËÊÂÖØ×é¶øÔâÊܽü5000ÍòÃÀÔª·Ç¾­³£ÐÔËðʧµÄ¼èÄÑʱ¿Ì£¬£¬£¬£¬£¬ £¬ÎÞÒɸø¸Ã¹«Ë¾´øÀ´Á˸ü´óµÄÌôÕ½¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/casio-reports-it-systems-failure-after-weekend-network-breach/


3. Awaken Likho APT×éÖ¯½ÓÄÉÐÂÕ½Êõ¹¥»÷¶íÂÞ˹»ú¹¹


10ÔÂ8ÈÕ£¬£¬£¬£¬£¬ £¬¿¨°Í˹»ùÑо¿Ö°Ô±Õ¹ÏÖÁËAwaken Likho APT×éÖ¯£¨ÓÖÃûCore Werewolf£©×Ô2021Äê7ÔÂÒÔÀ´Õë¶Ô¶íÂÞ˹Õþ¸®»ú¹¹ºÍ¹¤ÒµÆóÒµÌᳫµÄ×îй¥»÷¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÚ2024Äê6ÔµÄй¥»÷ÖУ¬£¬£¬£¬£¬ £¬ÏÔÖø¸Ä±äÁËÆäÈí¼þºÍÊÖÒÕ£¬£¬£¬£¬£¬ £¬´ÓʹÓÃUltraVNCÄ£¿£¿£¿éתÏòʹÓÃÕýµ±µÄMeshCentralƽ̨ÊðÀíMeshAgent¡£¡£¡£¡£¡£MeshCentral×÷ΪһÖÖ¿ªÔ´Ô¶³Ì×°±¸ÖÎÃ÷È·¾ö¼Æ»®£¬£¬£¬£¬£¬ £¬±»¹¥»÷Õß²»·¨Ê¹ÓÃÒÔ¿ØÖÆÊÜѬȾϵͳ£¬£¬£¬£¬£¬ £¬Õâһת±äÔöÌíÁ˹¥»÷µÄÒþ²ØÐÔºÍÄѶÈ¡£¡£¡£¡£¡£¿£¿£¿¨°Í˹»ùÍŶӷ¢Ã÷£¬£¬£¬£¬£¬ £¬Awaken Likhoͨ¹ýÍøÂç´¹ÂÚµç×ÓÓʼþÈö²¥ÐÂÖ²Èë³ÌÐò£¬£¬£¬£¬£¬ £¬ÕâЩÓʼþʹÓÃ7-Zip½¨ÉèµÄSFXÃûÌ÷ַ¢£¬£¬£¬£¬£¬ £¬ÄÚº¬Î±×°³ÉÕýµ±ÏµÍ³Ð§ÀͺÍÏÂÁîÎļþµÄÓÕ¶ü¡£¡£¡£¡£¡£Ö²Èë³ÌÐòÔËÐк󣬣¬£¬£¬£¬ £¬»áÆô¶¯MeshAgentºÍÒ»¸ö¸ß¶È»ìÏýµÄÏÂÁîÎļþ£¬£¬£¬£¬£¬ £¬Ö¼ÔÚʵÏÖ³¤ÆÚÐÔ¿ØÖÆ¡£¡£¡£¡£¡£Í¨¹ý½¨ÉèÍýÏëʹÃü£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßÈ·±£MeshAgentÄÜÖØÐÂÅþÁ¬µ½ÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬£¬ £¬¸ÃÅþÁ¬Í¨¹ýWebSocketЭÒ齨É裬£¬£¬£¬£¬ £¬²¢Ê¹ÓÃHTTPS¼ÓÃÜ¡£¡£¡£¡£¡£Awaken LikhoµÄ´Ë´Î¹¥»÷»î¶¯ÓëÒÔÍùÒ»Ö£¬£¬£¬£¬£¬ £¬Ä¿µÄÈÔÊǶíÂÞ˹Õþ¸®»ú¹¹¡¢³Ð°üÉ̺͹¤ÒµÆóÒµ¡£¡£¡£¡£¡£


https://securityonline.info/new-campaign-by-awaken-likho-apt-group-changes-in-software-and-techniques/


4. »¥ÁªÍøµµ°¸¹ÝÔâÊý¾Ýй¶£¬£¬£¬£¬£¬ £¬3100ÍòÓû§ÐÅÏ¢±»µÁ


10ÔÂ9ÈÕ£¬£¬£¬£¬£¬ £¬»¥ÁªÍøµµ°¸¹ÝµÄ¡°Wayback Machine¡±½üÆÚÔâÓöÁËÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£Ò»ÃûÍþвÐÐΪÕßÀÖ³ÉÈëÇÖ¸ÃÍøÕ¾£¬£¬£¬£¬£¬ £¬ÇÔÈ¡Á˰üÀ¨3100ÍòÌõΨһ¼Í¼µÄÓû§Éí·ÝÑéÖ¤Êý¾Ý¿â£¬£¬£¬£¬£¬ £¬²¢Í¨¹ýJavaScript¾¯±¨Ïòarchive.orgµÄ»á¼ûÕßÐû¸æÁËÕâÒ»ÈëÇÖ¡£¡£¡£¡£¡£¸Ã¾¯±¨»¹Ìá¼°ÁËTroy Hunt½¨ÉèµÄHave I Been Pwned£¨HIBP£©Êý¾Ýй¶֪ͨЧÀÍ£¬£¬£¬£¬£¬ £¬ÍþвÐÐΪÕßÒÑÓë¸ÃЧÀ͹²ÏíÁ˱»µÁÊý¾Ý¡£¡£¡£¡£¡£±»µÁµÄÊý¾Ý¿âÃûΪ¡°ia_users.sql¡±£¬£¬£¬£¬£¬ £¬ÊÇÒ»¸ö6.4GBµÄSQLÎļþ£¬£¬£¬£¬£¬ £¬°üÀ¨×¢²á³ÉÔ±µÄÉí·ÝÑéÖ¤ÐÅÏ¢£¬£¬£¬£¬£¬ £¬Èçµç×ÓÓʼþµØµã¡¢ÆÁÄ»Ãû³Æ¡¢ÃÜÂë¸ü¸Äʱ¼ä´Á¡¢Bcrypt¹þÏ£ÃÜÂëµÈ¡£¡£¡£¡£¡£¾ÝHIBPµÄÊ×´´È˺àÌØÍ¸Â¶£¬£¬£¬£¬£¬ £¬Êý¾Ý¿âÖÐÓÐ3100Íò¸öΨһµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬ £¬ÆäÖÐÐí¶àÒѶ©ÔÄHIBPµÄÊý¾Ýй¶֪ͨЧÀÍ¡£¡£¡£¡£¡£ÕâЩÊý¾Ý½«ºÜ¿ì±»Ìí¼Óµ½HIBPÖУ¬£¬£¬£¬£¬ £¬ÒÔ±ãÓû§¿ÉÒÔÅÌÎÊËûÃǵÄÊý¾ÝÊÇ·ñÔÚ´Ë´Îй¶Öб»Ð¹Â¶¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÍþвÐÐΪÕßÊÇÔõÑùÇÖÈ뻥ÁªÍøµµ°¸¹ÝµÄ£¬£¬£¬£¬£¬ £¬ÒÔ¼°ÊÇ·ñÓÐÆäËûÊý¾Ý±»µÁ¡£¡£¡£¡£¡£¶ø¾ÍÔÚ½ñÌìÔçЩʱ¼ä£¬£¬£¬£¬£¬ £¬»¥ÁªÍøµµ°¸¹Ý»¹ÔâÊÜÁËDDoS¹¥»÷£¬£¬£¬£¬£¬ £¬BlackMetaºÚ¿Í×éÖ¯ÒÑÉù³Æ¶Ô´ËÈÏÕæ£¬£¬£¬£¬£¬ £¬²¢ÌåÏÖ½«¾ÙÐиü¶à¹¥»÷¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/internet-archive-hacked-data-breach-impacts-31-million-users/


5. Å·ÑǶà¹ú³¬2.8ÍòÈËÔâ¼ÓÃÜÇ®±ÒÇÔÈ¡¶ñÒâÈí¼þ¹¥»÷


10ÔÂ9ÈÕ£¬£¬£¬£¬£¬ £¬½üÆÚÒ»Æð´ó¹æÄ£¼ÓÃÜÇ®±ÒÇÔÈ¡¶ñÒâÈí¼þ»î¶¯Ó°ÏìÁ˶íÂÞ˹¡¢ÍÁ¶úÆä¡¢ÎÚ¿ËÀ¼¼°Å·ÑǵØÇøÆäËû¹ú¼ÒµÄÁè¼Ý28,000ÈË¡£¡£¡£¡£¡£¸Ã»î¶¯Í¨¹ýαװ³ÉÕýµ±Èí¼þ£¬£¬£¬£¬£¬ £¬ÔÚYouTubeÊÓÆµºÍڲƭÐÔGitHub´æ´¢¿âÉϾÙÐÐÍÆ¹ã£¬£¬£¬£¬£¬ £¬ÓÕµ¼Êܺ¦ÕßÏÂÔØÊÜÃÜÂë±£»£»£»¤µÄµµ°¸²¢Æô¶¯Ñ¬È¾¡£¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Dr. Web³Æ£¬£¬£¬£¬£¬ £¬¾ø´ó´ó¶¼Êܺ¦ÕßÊǶíÂÞ˹סÃñ£¬£¬£¬£¬£¬ £¬Í¬Ê±°×¶íÂÞ˹¡¢ÎÚ×ȱð¿Ë˹̹¡¢¹þÈø¿Ë˹̹¡¢ÎÚ¿ËÀ¼¡¢¼ª¶û¼ªË¹Ë¹Ì¹ºÍÍÁ¶úÆäÒ²·ºÆð´ó×ÚѬȾ¡£¡£¡£¡£¡£¶ñÒâÈí¼þʹÓöàÖÖÊÖ¶ÎÓÕÆ­Óû§ÏÂÔØ£¬£¬£¬£¬£¬ £¬Ò»µ©Ñ¬È¾£¬£¬£¬£¬£¬ £¬»á¼ì²éµ÷ÊÔ¹¤¾ß¡¢ÌáÈ¡ËùÐèÎļþ¡¢ÐÞ¸ÄWindows×¢²á±íÒÔʵÏÖ³¤ÆÚÐÔ£¬£¬£¬£¬£¬ £¬²¢Ð®ÖÆÕýµ±µÄWindowsϵͳЧÀͺÍä¯ÀÀÆ÷¸üÐÂÀú³Ì¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬¶ñÒâÈí¼þ»¹»áÍøÂçϵͳÐÅÏ¢²¢Í¨¹ýTelegram»úеÈËÇÔÈ¡£¡£¡£¡£¡£¬£¬£¬£¬£¬ £¬Í¶·ÅSilentCryptoMinerÍÚ¾ò¼ÓÃÜÇ®±Ò£¬£¬£¬£¬£¬ £¬ÒÔ¼°³äµ±¼ô¼­Æ÷¼àÊÓ²¢Ìæ»»Windows¼ôÌù°åÖеÄÇ®°üµØµã¡£¡£¡£¡£¡£Dr. Web·¢Ã÷£¬£¬£¬£¬£¬ £¬½öClipper¾ÍÐ®ÖÆÁ˼ÛÖµ6,000ÃÀÔªµÄÉúÒâ¡£¡£¡£¡£¡£Îª×èÖ¹²ÆÎñËðʧ£¬£¬£¬£¬£¬ £¬½¨Òé´Ó¹Ù·½ÍøÕ¾ÏÂÔØÈí¼þ£¬£¬£¬£¬£¬ £¬²¢ÉóÉ÷¿´´ýYouTube»òGitHubÉϵÄÁ´½Ó¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/cryptocurrency/crypto-stealing-malware-campaign-infects-28-000-people/


6. ÃÀ˾·¨²¿Óë΢ÈíÁªÊÖ²é»ñ°ÙÓà¶íÂÞ˹ºÚ¿ÍÍøÂç´¹ÂÚÍøÕ¾


10ÔÂ4ÈÕ£¬£¬£¬£¬£¬ £¬ÃÀ¹ú˾·¨²¿ºÍ΢ÈíÁªºÏÐж¯£¬£¬£¬£¬£¬ £¬Àֳɲé»ñÁË100¶à¸öÓɶíÂÞ˹ºÚ¿ÍÓÃÓÚÕë¶ÔÃÀ¹ú¾ÙÐÐÍøÂç´¹ÂڻµÄÍøÕ¾¡£¡£¡£¡£¡£´Ë´ÎÐж¯Ö¼ÔÚ×èÖ¹¹ú¼ÒÖ§³ÖµÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬ £¬±£»£»£»¤ÃÀ¹úµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£±»²é·âµÄÓòÃûÓÉÃûΪCallisto GroupµÄ×é֯ʹÓ㬣¬£¬£¬£¬ £¬¸Ã×éÖ¯ÊǶíÂÞ˹Áª°îÇå¾²¾ÖÏÂÊôµÄÐж¯µ¥Î»£¬£¬£¬£¬£¬ £¬±»Ö¸¿Ø²ß»®Óã²æÊ½ÍøÂç´¹Âڻ£¬£¬£¬£¬£¬ £¬Ö¼ÔÚÓÕÆ­ÊÕ¼þÈËй¶µÇ¼ƾ֤£¬£¬£¬£¬£¬ £¬Î´¾­ÊÚȨ»á¼ûÕþ¸®ÊµÌåºÍÆäËû¸ß¼ÛֵĿµÄµÄÉñÃØÐÅÏ¢¡£¡£¡£¡£¡£Î¢ÈíÔÚÐж¯ÖÐʩչÁËÒªº¦×÷Ó㬣¬£¬£¬£¬ £¬ÌáÆðÁËÃñÊÂËßËÏ£¬£¬£¬£¬£¬ £¬ÒªÇó²é·âÓëCallisto GroupÓйØÁªµÄ66¸öÓòÃû¡£¡£¡£¡£¡£´Ë´ÎÐж¯²»µ«ÆÆËðÁËÏÖÓÐÔËÓªºÍ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬ £¬»¹ÏòÍâ¹úµÐÊÖºÍÃÀ¹úº£ÄÚÃñÖÚ·¢³öÁËÃ÷È·µÄÐÅÏ¢£¬£¬£¬£¬£¬ £¬Åú×¢¶íÂÞ˹ÊÇÒ»¸öÕæÕýµÄÍøÂçÐж¯µÐÊÖ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬´Ë´ÎÐж¯Ò²Õ¹Ê¾ÁËÕþ¸®ºÍ˽Ӫ²¿·ÖÖ®¼äÒ»Á¬ÏàÖúµÄÖ÷ÒªÐÔ£¬£¬£¬£¬£¬ £¬¿ÉÒÔÅäºÏ¸ü¿ìµØ×èÖ¹ÍøÂç·¸·¨¡£¡£¡£¡£¡£


https://hackread.com/doj-microsoft-seize-russian-phishing-sites-target-us/