Start-Rite¶ùÍ¯Ð¬ÖÆÔìÉÌÔÙ´ÎÔâÓö¿Í»§Ö§¸¶ÐÅϢй¶ÊÂÎñ

Ðû²¼Ê±¼ä 2024-11-18
1. Start-Rite¶ùÍ¯Ð¬ÖÆÔìÉÌÔÙ´ÎÔâÓö¿Í»§Ö§¸¶ÐÅϢй¶ÊÂÎñ


11ÔÂ14ÈÕ£¬£¬£¬£¬¶ùÍ¯Ð¬ÖÆÔìÉÌStart-Rite¿ËÈÕÔâÓöÁËÉæ¼°¿Í»§Ö§¸¶¿¨ÏêϸÐÅÏ¢µÄÑÏÖØÇå¾²ÊÂÎñ£¬£¬£¬£¬ÕâÊǸù«Ë¾ÔÚÒÑÍù°ËÄêÖеڶþ´Î±¬·¢´ËÀàÖØ´óʧÎ󡣡£¡£¾Ý·¢Ë͸ø¿Í»§µÄ֪ͨ³Æ£¬£¬£¬£¬ÈëÇÖÊÂÎñ±¬·¢ÔÚ10ÔÂ14ÈÕÖÁ11ÔÂ7ÈÕÖ®¼ä£¬£¬£¬£¬¿ÉÄÜй¶µÄÐÅÏ¢°üÀ¨Ö§¸¶¿¨ÉϵĿͻ§ÐÕÃû¡¢¿¨×¢²áµØµã¡¢¿¨ºÅ¡¢ÓÐÓÃÆÚºÍ¿¨ÑéÖ¤Öµ(CVV)¡£¡£¡£Start-Rite½¨Òé¿Í»§ÁªÏµÒøÐлòÐÅÓÿ¨ÌṩÉÌÍ£Óò¢Ìæ»»ÐÅÓÿ¨£¬£¬£¬£¬²¢¼á³ÖСÐļìºË¶ÔÕ˵¥¡£¡£¡£¸Ã¹«Ë¾ÒÑÏòÓ¢¹úÊý¾Ý±£»£»£»¤î¿Ïµ»ú¹¹ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©±¨¸æ´ËÊ£¬£¬£¬£¬²¢ÌåÏÖ½«È«Á¦ÅäºÏ¾¯·½ÊÂÇé¡£¡£¡£Ö»¹ÜStart-RiteÏò¡¶The Register¡·Ö¤ÊµÁ˴˴ι¥»÷£¬£¬£¬£¬µ«ÉÐδ¹ûÕæÈϿɴËÊ¡£¡£¡£Ó¦ÓÃÇ徲ר¼ÒÌåÏÖ£¬£¬£¬£¬´ËÊÂÎñÒý·¢Á˶ÔStart-RiteÇå¾²Ì¬ÊÆµÄÖÊÒÉ£¬£¬£¬£¬ÒÔ¼°Êý¾ÝÔõÑù±»ÇÔÈ¡µÄÎÊÌâ¡£¡£¡£ICO½²»°ÈËÔÚ±¨µÀºó͸¶£¬£¬£¬£¬Start-RiteÒÑÏòÆäת´ïÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬²¢ÕýÔÚÆÀ¹ÀËùÌṩµÄÐÅÏ¢¡£¡£¡£


https://www.theregister.com/2024/11/14/smartrite_breach/


2. CISAÖÒÑÔ£ºPalo Alto Networks Expedition¶à¸öÎó²î±»Æð¾¢Ê¹ÓÃ


11ÔÂ15ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÖÒÑÔ£¬£¬£¬£¬Ö¸³öÓ°ÏìPalo Alto Networks ExpeditionµÄÁ½¸öÐÂÎó²îCVE-2024-9463ºÍCVE-2024-9465ÕýÔÚ±»Æð¾¢Ê¹Óᣡ£¡£ÕâÁ½¸öÎó²î»®·ÖÉæ¼°ÏÂÁî×¢ÈëºÍSQL×¢È룬£¬£¬£¬CVSSÆÀ·Ö»®·Ö¸ß´ï9.9ºÍ9.3£¬£¬£¬£¬Èô±»ÀÖ³ÉʹÓ㬣¬£¬£¬¹¥»÷Õß¿ÉÔÚExpeditionǨá㹤¾ßÖÐÒÔrootÉí·ÝÖ´ÐÐí§ÒâÏÂÁî»òй¶Êý¾Ý¿âÄÚÈÝ£¬£¬£¬£¬½ø¶ø¿ÉÄܵ¼ÖÂPAN-OS·À»ðǽµÄÓû§Ãû¡¢ÃÜÂë¡¢ÉèÖúÍAPIÃÜԿй¶£¬£¬£¬£¬»òÔÚÒ×Êܹ¥»÷µÄϵͳÉϽ¨ÉèºÍ¶ÁÈ¡Îļþ¡£¡£¡£CISAÒѽ«ÕâЩÎó²îÄÉÈëÒÑÖª±»Ê¹ÓõÄÎó²îĿ¼£¬£¬£¬£¬²¢ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö»ú¹¹ÔÚ2024Äê12ÔÂ5ÈÕǰӦÓÃÐëÒª¸üС£¡£¡£Palo Alto NetworksÔÚ2024Äê10ÔÂ9ÈÕÐû²¼µÄÇå¾²¸üÐÂÖÐÐÞ¸´ÁËÕâЩÎó²î£¬£¬£¬£¬²¢È·ÈÏÊÕµ½CISA±¨¸æ³ÆÕâЩÎó²îÕýÔÚ±»Ê¹Óᣡ£¡£±ðµÄ£¬£¬£¬£¬Ò»ÖÜǰCISA»¹×ª´ïÁËÁíÒ»¸öÓ°ÏìExpeditionµÄÑÏÖØÎó²îCVE-2024-5910ÕýÔÚ±»Ê¹Ó㬣¬£¬£¬¸ÃÎó²î¿Éµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÏÂÁîÖ´ÐУ¬£¬£¬£¬Õë¶Ô»¥ÁªÍøÉÏ̻¶µÄ·À»ðǽÖÎÀí½Ó¿Ú¡£¡£¡£


https://thehackernews.com/2024/11/cisa-flags-critical-palo-alto-network.html


3. RecraftÄ£×Ó´æÇå¾²Îó²î£ºÎÞÒâÖÐй¶Ãô¸ÐϵͳָÁîÒý·¢¹Ø×¢


11ÔÂ14ÈÕ£¬£¬£¬£¬¾ÝCyber Security News±¨µÀ£¬£¬£¬£¬Ñо¿Ö°Ô±Ôڸ߼¶È˹¤ÖÇÄÜͼÏñÌìÉúÄ£×ÓÖз¢Ã÷ÁËDZÔÚµÄÇå¾²Îó²î£¬£¬£¬£¬ÌØÊâÊÇÔÚRecraftÄ£×ÓÖУ¬£¬£¬£¬¸ÃÄ£×ÓÔÚÎı¾µ½Í¼Æ¬ÅÅÐаñÉÏ´¦ÓÚÁìÏÈְλ¡£¡£¡£Recraft½ÓÄÉÁ½¼¶¼Ü¹¹£¬£¬£¬£¬Á¬ÏµÁË´óÐÍÓïÑÔÄ£×ÓºÍÀ©É¢Ä£×Ó£¬£¬£¬£¬Äܹ»´¦Öóͷ£ÖØ´óÅÌÎʲ¢ÌìÉú¸ü׼ȷ¡¢¸üÄܸÐÖªÉÏÏÂÎĵÄͼÏñ¡£¡£¡£È»¶ø£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬Í¨¹ýÄ³Ð©ÌØ¶¨ÌáÐÑ£¬£¬£¬£¬¿ÉÒÔÓÕʹRecraftй¶²¿·ÖÄÚ²¿Ö¸Á£¬£¬£¬°üÀ¨ÏµÍ³ÌáÐÑÆ¬¶ÏºÍÏêϸָµ¼´óÄ£×ÓÐÐΪµÄ˵Ã÷¡£¡£¡£ÕâЩй¶µÄÖ¸Áî°üÀ¨ÐÎÃ²Æø¸Å¡¢ÎïÌåºÍÈËÎïµÄÏêϸÐÎò¡¢ÐÎòÐÔ¾ä×Ó¡¢¹¹Í¼Ï¸½ÚÒÔ¼°×èֹʹÓõĴÊÓïµÈ¡£¡£¡£ÕâÖÖÎÞÒâÖÐй¶ϵͳÌáÐѵÄÐÐΪÒý·¢ÁËÈËÃǶÔÈ˹¤ÖÇÄÜÄ£×ÓÇå¾²ÐÔºÍÒþ˽ÐԵĵ£ÐÄ¡£¡£¡£ÈôÊǶñÒâÐÐΪÕßÄܹ»ÌáÈ¡ÕâЩÃô¸ÐÖ¸Á£¬£¬£¬ËûÃÇ¿ÉÄÜ»áʹÓÃϵͳ¡¢ÈƹýÇå¾²²½·¥»òÉîÈëÏàʶרÓеÄÈ˹¤ÖÇÄÜÊÖÒÕ¡£¡£¡£Òò´Ë£¬£¬£¬£¬ÕâÒ»ÊÂÎñΪAI¿ª·¢Ö°Ô±ºÍÑо¿Ö°Ô±ÇÃÏìÁ˾¯ÖÓ£¬£¬£¬£¬ÌáÐÑËûÃDZØÐèÈ·±£ÕâЩϵͳµÄÇå¾²ÐÔºÍÍêÕûÐÔ£¬£¬£¬£¬Ëæ×ÅAIÊÖÒÕµÄһֱǰ½øºÍ¸üÉîÈëµØÈÚÈëÎÒÃÇÉúÑĵĸ÷¸ö·½Ã棬£¬£¬£¬ÕâÒ»µã±äµÃÓÈΪÖ÷Òª¡£¡£¡£


https://cybersecuritynews.com/researchers-warn-of-ai-image-generators/#google_vignette


4. ð³äAI±à¼­Æ÷ÍÆ¶¯ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þѬȾWindowsºÍmacOS


11ÔÂ16ÈÕ£¬£¬£¬£¬½üÆÚð³äAIͼÏñºÍÊÓÆµÌìÉúÆ÷³ÉÎªÍøÂç¹¥»÷µÄÐÂÊֶΣ¬£¬£¬£¬Í¨¹ýʹÓÃLumma Stealer£¨Õë¶ÔWindows£©ºÍAMOS£¨Õë¶ÔmacOS£©ÕâÁ½ÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬£¬£¬Ñ¬È¾Óû§×°±¸²¢ÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°ü¡¢Æ¾Ö¤¡¢ÃÜÂë¡¢ÐÅÓÿ¨ÐÅÏ¢¼°ä¯ÀÀÀúÊ·µÈÃô¸ÐÊý¾Ý¡£¡£¡£ÕâЩ±»ÇÔÈ¡µÄÊý¾Ý»á±»´ò°ü·¢Ëͻع¥»÷Õߣ¬£¬£¬£¬ÓÃÓÚ½øÒ»²½¹¥»÷»òÔÚºÚÊÐÉϳöÊÛ¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ô±·¢Ã÷£¬£¬£¬£¬¹¥»÷Õß½¨ÉèÁËð³äEditPro AI±à¼­Æ÷µÄÐéÎ±ÍøÕ¾£¬£¬£¬£¬Í¨¹ýËÑË÷Ч¹ûºÍ¹ã¸æÍƹãÉî¶ÈαÔìµÄÕþÖÎÊÓÆµ£¬£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØÎ±×°³ÉEditProAIÓ¦ÓóÌÐòµÄ¶ñÒâÈí¼þ¡£¡£¡£WindowsºÍmacOSÓû§»®·Ö»áÊÕµ½ÃûΪ¡°Edit-ProAI-Setup-newest_release.exe¡±ºÍ¡°EditProAi_v.4.36.dmg¡±µÄÎļþ¡£¡£¡£ÕâЩÎļþÓÉÇÔÈ¡µÄ´úÂëÊðÃûÖ¤ÊéÊðÃû£¬£¬£¬£¬²¢Í¨¹ýÌØ¶¨Ãæ°å·¢Ëͱ»µÁÊý¾Ý¡£¡£¡£ÍøÂçÇ徲ר¼Ò½¨Ò飬£¬£¬£¬ÈôÔøÏÂÔØ¸Ã³ÌÐò£¬£¬£¬£¬Ó¦Á¬Ã¦ÖØÖÃËùÓÐÃÜÂë²¢ÆôÓöàÒòËØÉí·ÝÑéÖ¤¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fake-ai-video-generators-infect-windows-macos-with-infostealers/


5. ÃÀµäÖÊ´û¿î»ú¹¹ÔâÊý¾Ýй¶£¬£¬£¬£¬17Íò¿Í»§SSNµÈÐÅÏ¢±»µÁ


11ÔÂ15ÈÕ£¬£¬£¬£¬ÃÀ¹úÉçÇøµäÖÊ´û¿îÊÜÀí¹«Ë¾£¨ÒÔAnnieMac Home MortgageÃûÒåÔËÓª£©ÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ò»ÃûÈëÇÖÕßÔÚ8ÔÂ21ÈÕÖÁ23ÈÕʱ´úÈëÇÖÆäϵͳ£¬£¬£¬£¬ÇÔÈ¡ÁË171,000Ãû¿Í»§µÄСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬°üÀ¨ÐÕÃûºÍÉç»áÇå¾²ºÅÂë(SSN)¡£¡£¡£Ö»¹ÜÏÖÔÚûÓÐÖ¤¾ÝÅú×¢ÕâЩÊý¾ÝÒÑÔÚ°µÍøÉϱ»ÀÄÓ㬣¬£¬£¬µ«AnnieMacÒѽÓÄÉÌØÊâÇå¾²²½·¥±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢£¬£¬£¬£¬²¢ÏòÊÜÓ°Ïì¿Í»§Ìṩ12¸öÔµÄÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»¤¡£¡£¡£¸Ã»ú¹¹Ìṩ¶àÖÖµäÖÊ´û¿î²úÆ·£¬£¬£¬£¬°üÀ¨Õë¶ÔµÍÊÕÈë»òÐÅÓÃÆÀ¼¶½Ï²î¹º·¿ÕßµÄÍýÏ룬£¬£¬£¬ÈçOneUPÍýÏëÔÊÐíÂò¼Ò½öÓÃ1%µÄÊ׸¶¹º·¿¡£¡£¡£Óë¸üÆÕ±éµÄÊý¾Ýй¶Ïà±È£¬£¬£¬£¬´Ë´Îй¶µÄÊý¾ÝÀàÐÍÏà¶Ô½ÏÉÙ£¬£¬£¬£¬µ«SSNµÄй¶ÈÔ±£´æÎ£º¦£¬£¬£¬£¬¿ÉÄÜË𺦿ͻ§µÄÐÅÓÃÆÀ·Ö£¬£¬£¬£¬ÌØÊâÊÇÄÇЩÐÅÓÃÆÀ·ÖÔ­À´¾ÍÒ»Ñùƽ³£µÄ¿Í»§¡£¡£¡£


https://www.theregister.com/2024/11/15/anniemac_data_breach/


6. GeoVision±¨·Ï×°±¸ÁãÈÕÎó²îÔâʹÓ㬣¬£¬£¬½©Ê¬ÍøÂçÈëÇÖΣº¦¾çÔö


11ÔÂ15ÈÕ£¬£¬£¬£¬¶ñÒâÈí¼þ½©Ê¬ÍøÂçÕýÔÚʹÓÃGeoVision±¨·Ï×°±¸ÖеĸßΣÁãÈÕÎó²îCVE-2024-11120¾ÙÐÐÈëÇÖ£¬£¬£¬£¬²¢ÕÐļÕâЩװ±¸¾ÙÐпÉÄܵÄDDoS¹¥»÷»ò¼ÓÃÜÍÚ¾ò¡£¡£¡£¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚ×°±¸ÉÏÖ´ÐÐí§ÒâϵͳÏÂÁ£¬£¬£¬ÒÑÓ°Ïì¶à¿î²»ÔÙÊܹ©Ó¦ÉÌÖ§³ÖµÄGeoVision×°±¸ÐͺÅ¡£¡£¡£¾ÝÍþв¼à¿ØÆ½Ì¨Shadowserver Foundation±¨¸æ£¬£¬£¬£¬Ô¼ÓÐ17,000̨GeoVision×°±¸ÔÚÏß̻¶£¬£¬£¬£¬Ò×Êܹ¥»÷£¬£¬£¬£¬ÆäÖдó´ó¶¼Î»ÓÚÃÀ¹ú¡£¡£¡£¸Ã½©Ê¬ÍøÂçÒÉΪMiraiµÄ±äÖÖ¡£¡£¡£ÈôÊÇ·¢Ã÷×°±¸¹ýÈÈ¡¢ÔËÐлºÂý¡¢ÎÞÏìÓ¦»òÉèÖñ»¸ü¸ÄµÈ¼£Ï󣬣¬£¬£¬½¨ÒéÖØÖÃ×°±¸¡¢¸ü¸ÄÃÜÂë¡¢¹Ø±ÕÔ¶³Ì»á¼û²¢ÖÃÓÚ·À»ðǽºó¡£¡£¡£ÀíÏëÇéÐÎÏ£¬£¬£¬£¬Ó¦Ìæ»»ÕâЩװ±¸£¬£¬£¬£¬Èô²»¿ÉÄÜ£¬£¬£¬£¬ÔòÓ¦¸ôÀë²¢Ç×½ü¼à¿Ø¡£¡£¡£


https://www.bleepingcomputer.com/news/security/botnet-exploits-geovision-zero-day-to-install-mirai-malware/