BitdefenderÐû²¼ShrinkLockerÀÕË÷Èí¼þ½âÃÜÆ÷

Ðû²¼Ê±¼ä 2024-11-14

1. BitdefenderÐû²¼ShrinkLockerÀÕË÷Èí¼þ½âÃÜÆ÷


11ÔÂ13ÈÕ£¬ £¬ £¬£¬£¬£¬£¬BitdefenderÐû²¼ÁËÕë¶ÔShrinkLockerÀÕË÷Èí¼þµÄ½âÃÜÆ÷£¬ £¬ £¬£¬£¬£¬£¬²¢½ÒÏþÁËһƪÏêϸڹÊÍÆäÊÂÇéÔ­ÀíµÄÑо¿²©¿Í¡£¡£ ¡£¡£¡£ShrinkLockerʹÓÃWindowsµÄÕýµ±¹¦Ð§BitLocker£¬ £¬ £¬£¬£¬£¬£¬¿ìËÙ¼ÓÃܰüÀ¨ÏµÍ³Çý¶¯Æ÷ÔÚÄÚµÄÕû¸öÇý¶¯Æ÷£¬ £¬ £¬£¬£¬£¬£¬È»ºóɾ³ý»Ö¸´Ñ¡Ïî¡£¡£ ¡£¡£¡£¸ÃÀÕË÷Èí¼þÊ×´ÎÔÚÖж«Ò»¼ÒÒ½ÁƱ£½¡¹«Ë¾µÄÊÂÎñÖб»·¢Ã÷£¬ £¬ £¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýºáÏòÒÆ¶¯ÔÚϵͳÄÚ°²ÅÅShrinkLocker¡£¡£ ¡£¡£¡£ËüÕë¶ÔÄ«Î÷¸ç¡¢Ó¡¶ÈÄáÎ÷ÑǺÍÔ¼µ©µÄ×éÖ¯£¬ £¬ £¬£¬£¬£¬£¬Ó°ÏìÁ˸ÖÌú¡¢ÒßÃçÖÆÔìµÈÐÐÒµ¼°Õþ¸®ÊµÌå¡£¡£ ¡£¡£¡£ÓëÒÀÀµÖØ´ó¼ÓÃÜËã·¨µÄÏÖ´úÀÕË÷Èí¼þ²î±ð£¬ £¬ £¬£¬£¬£¬£¬ShrinkLocker½ÓÄɸü¼òÆÓµÄÒªÁ죬 £¬ £¬£¬£¬£¬£¬Ïȼì²éBitLockerÊÇ·ñÆôÓ㬠£¬ £¬£¬£¬£¬£¬ÈôδÆôÓÃÔò×°Ö㬠£¬ £¬£¬£¬£¬£¬²¢Ê¹ÓÃËæ»úÌìÉúµÄÃÜÂëÖØÐÈÎÃüÜϵͳ¡£¡£ ¡£¡£¡£ÖØÆôºó£¬ £¬ £¬£¬£¬£¬£¬Óû§ÐèÊäÈëÃÜÂë½âËøÇý¶¯Æ÷£¬ £¬ £¬£¬£¬£¬£¬Ö§¸¶Êê½ðÒÔ»»È¡½âÃÜÃÜÔ¿¡£¡£ ¡£¡£¡£¸ÃÀÕË÷Èí¼þµÄ¼òÆÓÐÔʹÆä¶Ô³õ¼¶ÍøÂç·¸·¨·Ö×Ó¾ßÓÐÎüÒýÁ¦£¬ £¬ £¬£¬£¬£¬£¬ÇÒÒѱ»¶à¸öÍþвÐÐΪÕ߸ıàÓÃÓÚ¸ü¼òÆÓµÄ¹¥»÷¡£¡£ ¡£¡£¡£ShrinkLocker¿ÉÔھɰæWindowsºÍServerϵͳÉÏÖ´ÐС£¡£ ¡£¡£¡£Î¢ÈíÔøÌåÏÖ£¬ £¬ £¬£¬£¬£¬£¬ÒÁÀÊÕþ¸®Ö§³ÖµÄÍþв×éÖ¯ÀÄÓÃBitLocker¹¦Ð§¾ÙÐй¥»÷£¬ £¬ £¬£¬£¬£¬£¬ÆäËûÍøÂç·¸·¨·Ö×ÓҲʹÓÃÀàËÆÊÖÒÕ¡£¡£ ¡£¡£¡£


https://therecord.media/bitdefender-releases-decryptor-shrinklocker


2. 1.22ÒÚÉÌÒµÁªÏµÐÅÏ¢ÔâB2Bƽ̨DemandScienceÊý¾Ýй¶


11ÔÂ13ÈÕ£¬ £¬ £¬£¬£¬£¬£¬ÏÖÒÑÈ·ÈÏ£¬ £¬ £¬£¬£¬£¬£¬×Ô2024Äê2ÔÂÒÔÀ´£¬ £¬ £¬£¬£¬£¬£¬B2BÐèÇóÌìÉúƽ̨DemandScience£¨Ç°ÉíΪPure Incubation£©µÄ1.22ÒÚÈ˵ÄÉÌÒµÁªÏµÐÅÏ¢±»ÇÔÈ¡²¢ÔÚÍøÂç·¸·¨ÂÛ̳ÉϳöÊÛ¡£¡£ ¡£¡£¡£ÕâЩÊý¾Ý°üÀ¨È«Ãû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂ롢ְλºÍÉ罻ýÌåÁ´½ÓµÈ£¬ £¬ £¬£¬£¬£¬£¬ÊÇ´Ó¹«¹²ÈªÔ´ºÍµÚÈý·½ÍøÂçµÄ¡£¡£ ¡£¡£¡£2024Äê2Ô£¬ £¬ £¬£¬£¬£¬£¬ÃûΪ¡°KryptonZambie¡±µÄÍþвÐÐΪÕßÔÚBreachForumsÉÏÉù³ÆÕâЩÊý¾ÝÊÇ´ÓPure IncubationµÄ̻¶ϵͳÖÐÇÔÈ¡µÄ¡£¡£ ¡£¡£¡£DemandScienceÆäʱ·ñ¶¨±£´æÐ¹Â¶£¬ £¬ £¬£¬£¬£¬£¬²¢ÌåÏÖÆäϵͳδÊܹ¥»÷¡£¡£ ¡£¡£¡£È»¶ø£¬ £¬ £¬£¬£¬£¬£¬µ½2024Äê8ÔÂ15ÈÕ£¬ £¬ £¬£¬£¬£¬£¬KryptonZambieÃâ·Ñй¶ÁËÊý¾Ý¼¯¡£¡£ ¡£¡£¡£ÌØÂåÒÁ¡¤ºàÌØÔÚ²©¿ÍÎÄÕÂÖÐÈ·ÈÏÊý¾ÝÕæÊµ¿É¿¿£¬ £¬ £¬£¬£¬£¬£¬²¢Ö¸³öй¶µÄÊý¾ÝÀ´×ÔDemandScienceÁ½ÄêǰÒÑÍËÒÛµÄϵͳ¡£¡£ ¡£¡£¡£ºàÌØ»¹È·ÈÏй¶µÄÊý¾ÝÖаüÀ¨Ëû×Ô¼ºµÄ¼Í¼¡£¡£ ¡£¡£¡£±»µÁÊý¾Ý¼¯ÖеÄËùÓÐ1.22ÒÚ¸öΨһµç×ÓÓʼþµØµãÒÑÌí¼Óµ½¡°Have I Been Pwned¡±ÖУ¬ £¬ £¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ¶©ÔÄÕß½«ÊÕµ½Í¨Öª¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/leaked-info-of-122-million-linked-to-b2b-data-aggregator-breach/


3. ÒÁÀʺڿÍ×éÖ¯TA455Õë¶Ôº½¿Õº½ÌìÐÐÒµÌá³«ÍøÂç´¹ÂÚ¹¥»÷


11ÔÂ14ÈÕ£¬ £¬ £¬£¬£¬£¬£¬×ÔÈ¥Äê9ÔÂÆð£¬ £¬ £¬£¬£¬£¬£¬Ò»ÏîÕë¶ÔLinkedInµÈƽ̨Óû§µÄÍøÂç´¹Âڻ×îÏÈ»îÔ¾£¬ £¬ £¬£¬£¬£¬£¬¸Ã»î¶¯ÓÉÓëÒÁÀÊÏà¹ØµÄÍþвÐÐΪÕßTA455Ìᳫ¡£¡£ ¡£¡£¡£TA455½ÓÄÉÓã²æÊ½ÍøÂç´¹ÂÚÒªÁ죬 £¬ £¬£¬£¬£¬£¬Ã°³äº½¿Õº½ÌìÐÐÒµµÄÕÐÆ¸Ö°Ô±ÓëÊܺ¦Õß½¨ÉèÁªÏµ£¬ £¬ £¬£¬£¬£¬£¬²¢ÓÕµ¼ËûÃÇÏÂÔØÃûΪ¡°SIgnedConnection.zip¡±µÄѹËõÎļþ¡£¡£ ¡£¡£¡£Í¬Ê±£¬ £¬ £¬£¬£¬£¬£¬ÍþвÐÐΪÕß»¹ÌṩPDFÖ¸ÄÏ£¬ £¬ £¬£¬£¬£¬£¬Ö¸µ¼Êܺ¦ÕßÔõÑùÇå¾²ÏÂÔØºÍ·­¿ª¸ÃÎļþ¡£¡£ ¡£¡£¡£È»¶ø£¬ £¬ £¬£¬£¬£¬£¬¸ÃѹËõÎļþÏÖʵÉϰüÀ¨Ò»¸ö¿ÉÖ´ÐÐÎļþ£¬ £¬ £¬£¬£¬£¬£¬Í¨¹ýDLL²àÔØ½«ÃûΪ¡°secure32.dll¡±µÄ¶ñÒâDLLÎļþ¼ÓÔØµ½Êܺ¦ÕßϵͳÖУ¬ £¬ £¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»ÔËÐÐδ±»¼ì²âµ½µÄ´úÂë¡£¡£ ¡£¡£¡£Ëæºó£¬ £¬ £¬£¬£¬£¬£¬¶ñÒâÈí¼þÆô¶¯Ñ¬È¾Á´£¬ £¬ £¬£¬£¬£¬£¬×îÖÕ°²ÅÅÓÉÁíÒ»¸öÒÁÀÊÍþвÐÐΪÕßCharming Kitten¿ª·¢µÄSnail Resin¶ñÒâÈí¼þ£¬ £¬ £¬£¬£¬£¬£¬²¢·­¿ªÃûΪ¡°SlugResin¡±µÄºóÃÅ¡£¡£ ¡£¡£¡£TA455ʹÓöàÖÖÌӱܼì²âµÄÒªÁ죬 £¬ £¬£¬£¬£¬£¬°üÀ¨ÔÚGitHubÉ϶ÔÏÂÁîºÍ¿ØÖÆ£¨C2£©Í¨Ñ¶¾ÙÐбàÂ룬 £¬ £¬£¬£¬£¬£¬ÒÔ¼°Ä£ÄâLazarus GroupµÄÕ½ÂÔ£¬ £¬ £¬£¬£¬£¬£¬Ê¹µÃ¹éÒò±äµÃÖØ´ó¡£¡£ ¡£¡£¡£ÓÉÓÚTA455Ö÷ÒªÕë¶Ôº½¿Õº½ÌìרҵÈËÊ¿£¬ £¬ £¬£¬£¬£¬£¬Òò´Ë¸ÃÁìÓòµÄLinkedInµÈƽ̨Óû§Ó¦Ð¡ÐÄÀ´×Ôδ֪ȪԴµÄÐÂÎźÍÁªÏµ¡£¡£ ¡£¡£¡£


https://www.darkreading.com/cyberattacks-data-breaches/iranian-cybercriminals-aerospace-workers-linkedin


4. ÃÀ¹úÒ©·¿ÁªºÏ»á£¨AAP£©ÔâEmbargoÀÕË÷Èí¼þ¹¥»÷


11ÔÂ13ÈÕ£¬ £¬ £¬£¬£¬£¬£¬ÃÀ¹úÒ©·¿ÁªºÏ»á£¨AAP£©³ÉΪ×îÐÂÒ»¼ÒÊý¾ÝÔâµ½ÍøÂç·¸·¨·Ö×ÓÇÔÈ¡ºÍ¼ÓÃܵÄÃÀ¹úÒ½ÁƱ£½¡×éÖ¯¡£¡£ ¡£¡£¡£AAP½¨ÉèÓÚ2009Ä꣬ £¬ £¬£¬£¬£¬£¬ÖÎÀí×ÅÈ«ÃÀ2000¶à¼Ò×ÔÁ¦Ò©·¿¡£¡£ ¡£¡£¡£EmbargoÀÕË÷Èí¼þÐж¯µÄ·¸·¨·Ö×ÓÉù³Æ¶Ô´Ë´ÎÏ®»÷ÈÏÕæ£¬ £¬ £¬£¬£¬£¬£¬ËûÃÇÇÔÈ¡ÁËAAPµÄ1.469TBÊý¾Ý²¢ÒªÇ󸶿î²Å»ª»Ö¸´ÐÅÏ¢¡£¡£ ¡£¡£¡£EmbargoÊÇÒ»¸öÏà¶Ô½ÏеÄÀÕË÷Èí¼þ×éÖ¯£¬ £¬ £¬£¬£¬£¬£¬ÓÚ½ñÄê6ÔÂÊ״α»Ñо¿Ö°Ô±×¢Öص½¡£¡£ ¡£¡£¡£Ö»¹ÜAAPÉÐδÕýʽȷÈÏÔâµ½¹¥»÷£¬ £¬ £¬£¬£¬£¬£¬µ«ÆäÍøÕ¾ÒÑÖÒÑÔËùÓÐÓû§ÃÜÂë×î½ü¾ù±»Ç¿ÖÆÖØÖ㬠£¬ £¬£¬£¬£¬£¬µ«Î´Ú¹ÊÍÔµ¹ÊÔ­ÓÉ»òÌá¼°ÍøÂç¹¥»÷¡£¡£ ¡£¡£¡£Í¬Ê±£¬ £¬ £¬£¬£¬£¬£¬EmbargoÉù³ÆAAPÒÑÖ§¸¶130ÍòÃÀÔªÀ´½âÃÜϵͳ£¬ £¬ £¬£¬£¬£¬£¬²¢ÒªÇóÔÙÖ§¸¶130ÍòÃÀÔªÀ´ÑÚÊα»µÁÎļþ¡£¡£ ¡£¡£¡£ÈôÊǸÃ˵·¨Êôʵ£¬ £¬ £¬£¬£¬£¬£¬ÄÇôEmbargoÌá³öµÄÒªÇó½«Áè¼ÝÃÀ¹úÁª°îÊÓ²ì¾Ö½ñÄêÔçЩʱ¼äÐû²¼µÄƽ¾ùˮƽ¡£¡£ ¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÀÕË÷Èí¼þ×éÖ¯´ÓAAPÇÔÈ¡ÁËÄÄЩÊý¾Ý£¬ £¬ £¬£¬£¬£¬£¬µ«¸ÃÒ©·¿ÍøÂç±ØÐèÔÚ11ÔÂ20ÈÕ֮ǰ֧¸¶Ê£ÓàµÄ¡°Óà¶î¡±£¬ £¬ £¬£¬£¬£¬£¬²»È»ÆäÊý¾Ý½«±»Ð¹Â¶µ½ÍøÉÏ¡£¡£ ¡£¡£¡£


https://www.theregister.com/2024/11/13/embargo_ransomware_breach_aap/


5. D-LinkÍ£²úNAS×°±¸ÔâCVE-2024-10914Îó²î¹¥»÷


11ÔÂ13ÈÕ£¬ £¬ £¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±Netsecfish·¢Ã÷ÁËÒ»¸öÑÏÖØÎó²î£¨CVE-2024-10914£©£¬ £¬ £¬£¬£¬£¬£¬¸ÃÎó²îÓ°Ïì¶àÖÖÒÑÍ£²úµÄD-LinkÍøÂ總¼Ó´æ´¢£¨NAS£©×°±¸¡£¡£ ¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâHTTP GETÇëÇó£¬ £¬ £¬£¬£¬£¬£¬ÏòÔÚÏß̻¶µÄÒ×Êܹ¥»÷×°±¸×¢Èëí§ÒâshellÏÂÁî¡£¡£ ¡£¡£¡£D-LinkÔÚÉÏÖÜÎåÌåÏÖ²»»áÐÞ¸´´ËÎó²î£¬ £¬ £¬£¬£¬£¬£¬²¢½¨Òé¿Í»§ïÔÌ­ÊÜÓ°ÏìµÄ×°±¸»òÉý¼¶µ½½ÏеIJúÆ·¡£¡£ ¡£¡£¡£È»¶ø£¬ £¬ £¬£¬£¬£¬£¬ShadowserverÍþв¼à¿ØÐ§ÀÍ·¢Ã÷£¬ £¬ £¬£¬£¬£¬£¬´Ó11ÔÂ12ÈÕ×îÏÈ£¬ £¬ £¬£¬£¬£¬£¬ÒÑÓÐÍþвÐÐΪÕß×îÏÈÃé×¼¸ÃÎó²î¡£¡£ ¡£¡£¡£ShadowserverÖÒÑԳƣ¬ £¬ £¬£¬£¬£¬£¬Ó¦½«´Ó»¥ÁªÍøÉÏÒÆ³ýÒ×Êܹ¥»÷µÄEOL/EOS×°±¸¡£¡£ ¡£¡£¡£NetsecfishÔÚ»¥ÁªÍøÉ¨ÃèÖз¢Ã÷ÁËÁè¼Ý41,000¸öÒ×Êܹ¥»÷×°±¸µÄΨһIPµØµã¡£¡£ ¡£¡£¡£±ðµÄ£¬ £¬ £¬£¬£¬£¬£¬½ñÄê4Ô£¬ £¬ £¬£¬£¬£¬£¬Netsecfish»¹±¨¸æÁËÁíÒ»¸öÓ°ÏìÏÕЩÏàͬD-Link NASÐͺŵÄÎó²î£¨CVE-2024-3273£©¡£¡£ ¡£¡£¡£ÓÉÓÚÕâЩװ±¸Ã»ÓÐ×Ô¶¯¸üй¦Ð§»ò¿Í»§ÍâÁª¹¦Ð§À´ÍÆË;¯±¨£¬ £¬ £¬£¬£¬£¬£¬Òò´Ë½¨ÒéÄÇЩʹÓñ¨·Ï×°±¸µÄÈ˾¡¿ìÏÞÖÆ»¥ÁªÍø»á¼û£¬ £¬ £¬£¬£¬£¬£¬ÒÔ×èÖ¹³ÉΪÀÕË÷Èí¼þ¹¥»÷µÄÄ¿µÄ¡£¡£ ¡£¡£¡£D-LinkÇ¿µ÷£¬ £¬ £¬£¬£¬£¬£¬¼ÌÐøÊ¹ÓÃÕâЩװ±¸¿ÉÄÜ»á¶ÔÅþÁ¬µÄ×°±¸Ôì³ÉΣº¦£¬ £¬ £¬£¬£¬£¬£¬²¢ÖÒÑÔÏûºÄÕßÈ·±£×°±¸¾ßÓÐ×îеĹ̼þ¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-bug-in-eol-d-link-nas-devices-now-exploited-in-attacks/


6. Ï£²©ÒÁ¸ùÊÐÔâÍøÂç¹¥»÷£¬ £¬ £¬£¬£¬£¬£¬ºÚ¿ÍË÷ÒªÊê½ð²¢ÖÂÊÖÒÕ¹ÊÕÏ


11ÔÂ13ÈÕ£¬ £¬ £¬£¬£¬£¬£¬Íþ˹¿µÐÇÖÝÏ£²©ÒÁ¸ùÊб¾ÖÜÔâÓöÁËÍøÂç¹¥»÷£¬ £¬ £¬£¬£¬£¬£¬µ¼ÖÂÊÖÒÕ¹ÊÕÏ£¬ £¬ £¬£¬£¬£¬£¬²¢ÊÕµ½Á˺ڿ͵ÄÊê½ðÒªÇ󡣡£ ¡£¡£¡£×Ô10ÔÂÏÂÑ®ÒÔÀ´£¬ £¬ £¬£¬£¬£¬£¬¸ÃÊÐÒ»Ö±ÔÚÓ¦¶ÔÕâЩÎÊÌ⣬ £¬ £¬£¬£¬£¬£¬²¢ÔÚÖÜÈÕ֤ʵÁ˺ڿÍδ¾­ÊÚȨ»á¼ûÁ˸ÃÊеÄÍøÂç¡£¡£ ¡£¡£¡£Ö»¹Ü¸ÃÊÐûÓÐ͸¶Êê½ðÊý¶î»òÌá³öÒªÇóµÄ×éÖ¯Ãû³Æ£¬ £¬ £¬£¬£¬£¬£¬µ«ËûÃÇÒÑÏòÖ´·¨²¿·Ö±¨¸æÁË´ËÊÂÎñ£¬ £¬ £¬£¬£¬£¬£¬²¢ÓëÍøÂçÇ徲ר¼ÒÏàÖú½â¾ö¹¥»÷ÒýÆðµÄÎÊÌâ¡£¡£ ¡£¡£¡£Í¬Ê±£¬ £¬ £¬£¬£¬£¬£¬ËûÃǸôÀëÁ˲¿·ÖÍøÂçÒÔ±£»£»£»¤ÆäËûÍøÂç²¢×èÖ¹ºÚ¿ÍÈëÇÖ¡£¡£ ¡£¡£¡£´Ë´Î¹¥»÷¶Ô¹«¹²Ç徲ЧÀÍÔì³ÉÁËÒ»¶¨Ó°Ï죬 £¬ £¬£¬£¬£¬£¬µ«»ùÓÚÔÆµÄЧÀÍÈÔÔÚÔËÐУ¬ £¬ £¬£¬£¬£¬£¬Ô±¹¤¿ÉÒÔ¾ÙÐÐÔÚÏß½»Á÷¡£¡£ ¡£¡£¡£Ï£²©ÒÁ¸ùÊÐλÓÚÃܶûÎÖ»ùÒÔ±±Ô¼Ò»Ð¡Ê±³µ³Ì´¦£¬ £¬ £¬£¬£¬£¬£¬ÒÑÍùÁ½ÄêÖУ¬ £¬ £¬£¬£¬£¬£¬Íþ˹¿µÐÇÖÝÕþ¸®»ú¹¹Ôø¶à´ÎÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬ £¬ £¬£¬£¬£¬£¬Òò´Ë¸ÃÖݶԴËÀ๥»÷¼á³Ö¸ß¶ÈСÐÄ¡£¡£ ¡£¡£¡£


https://therecord.media/sheboygan-wisconsin-hackers-demand-ransom