AIÓïÒôÉú³ÉÆ÷Ó¦Ó÷¨Ê½±»ÓÃÀ´Í¶·ÅGipy¶ñÒâÈí¼þ
Ðû²¼Ê±¼ä 2024-05-285ÔÂ26ÈÕ£¬Gipy ÊÇ×î½ü·¢ÏÖµÄÒ»ÖÖÀûÓÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄ¹¥»÷»î¶¯£¬ËüÒԵ¹ú¡¢¶íÂÞ˹¡¢Î÷°àÑÀºĮ́ÍåµÄÓû§ÎªÄ¿±ê£¬²¢ÔÊÐíÌṩ AI ÓïÒôת»»Ó¦Ó÷¨Ê½×÷ΪÍøÂçµöÓãÓÕ¶ü¡£¿¨°Í˹»ùµÄÑо¿ÈËÔ±ÌåÏÖ£¬Gipy ¶ñÒâÈí¼þÓÚ 2023 Äê³õÊ״ηºÆð£¬Ò»µ©½»¸¶£¬¹¥»÷Õß±ã¿ÉÒÔÇÔÈ¡Êý¾Ý¡¢ÍÚ¾ò¼ÓÃÜ»õ±Ò²¢ÔÚÊܺ¦ÕßµÄϵͳÉÏ°²×°ÆäËû¶ñÒâÈí¼þ¡£Ñо¿ÈËÔ±½âÊͳƣ¬ÔÚÕâÖÖÇé¿öÏ£¬ÍþвÐÐΪÕßÒԺϷ¨µÄÈ˹¤ÖÇÄÜÓïÒôÐÞ¸ÄÓ¦Ó÷¨Ê½µÄÔÊÐíÀ´ÒýÓÕÊܺ¦Õß¡£¿¨°Í»ùÍŶÓÔö²¹Ëµ£¬Ò»µ©Óû§°²×°¸ÃÓ¦Ó÷¨Ê½£¬Ó¦Ó÷¨Ê½¾Í»á¿ªÊ¼°´ÔÊÐíÔËÐУ¬Í¬Ê±£¬Gipy ¶ñÒâÈí¼þÒ²»áÔÚºǫ́ÔËÐС£
https://www.darkreading.com/threat-intelligence/ai-voice-generator-used-to-drop-gipy-malware
2. ÓÃÓÚÁ÷´«ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÐé¼Ù AV ÍøÕ¾
5ÔÂ26ÈÕ£¬ÍþвÐÐΪÕßʹÓÃαװ³É Avast¡¢Bitdefender ºÍ Malwarebytes ºÏ·¨·À²¡¶¾²úÎïµÄÐé¼Ù AV ÍøÕ¾À´·Ö·¢¶ñÒâÈí¼þ¡£2024 Äê 4 ÔÂÖÐÑ®£¬Trellix ¸ß¼¶Ñо¿ÖÐÐÄÍŶӵÄÑо¿ÈËÔ±·¢ÏÖÁ˶à¸öÓÃÓÚ·Ö·¢ÐÅÏ¢ÇÔÈ¡·¨Ê½µÄÐé¼Ù AV ÍøÕ¾¡£ÕâЩ¶ñÒâÍøÕ¾ÍйÜÁËÅÓ´óµÄ¶ñÒâÎļþ£¬ÀýÈç APK¡¢EXE ºÍ Inno °²×°°²×°·¨Ê½£¬°üÂÞ¼äµýºÍÇÔÈ¡·¨Ê½¹¦Ð§¡£ÕâЩÐé¼ÙÍøվαװ³É Avast¡¢Bitdefender ºÍ Malwarebytes µÄºÏ·¨·À²¡¶¾²úÎï¡£ÍйܶñÒâÈí¼þµÄÍøÕ¾ÊÇ avast-securedownload.com (Avast.apk)¡¢bitdefender-app.com (setup-win-x86-x64.exe.zip)¡¢malwarebytes.pro (MBSetup.rar)¡£×¨¼Ò»¹·¢ÏÖÁËÒ»¸öαװ³ÉºÏ·¨·¨Ê½ (AMCoreDat.exe) µÄ¶ñÒâ Trellix ¶þ½øÖÆÎļþ¡£Ñо¿ÈËÔ±²¢Î´½«ÕâЩ¹¥»÷¹é¾ÌÓÚÌض¨µÄÍþвÐÐΪÕß¡£¸Ã³ÂËß»¹ÁгöÁËʹÓÃÐé¼Ù AV ÍøÕ¾½øÐеĹ¥»÷µÄΣº¦Ö¸±ê (IoC)¡£
https://securityaffairs.com/163673/cyber-crime/fake-av-websites-distribute-malware.html
3. ºÚ¿ÍÀûÓÃľÂí²¡¶¾¿Ë¡°æ¡°É¨À×Õß¡±¹¥»÷½ðÈÚ»ú¹¹
5ÔÂ26ÈÕ£¬ºÚ¿ÍÕýÔÚÀûÓÃ΢Èí¾µäÓÎϷɨÀ×µÄ Python ¿Ë¡´úÂëÀ´Òþ²Ø¶ñÒâ½Å±¾£¬ÒÔ¹¥»÷Å·ÖÞºÍÃÀ¹úµÄ½ðÈÚ»ú¹¹¡£ÎÚ¿ËÀ¼µÄ CSIRT-NBU ºÍ CERT-UA ½«ÕâЩ¹¥»÷¹é¾ÌÓÚÒ»¸ö±»×·×ÙΪ¡°UAC-0188¡±µÄÍþвÐÐΪÕߣ¬ËûʹÓúϷ¨´úÂëÀ´Òþ²ØÏÂÔغͰ²×° SuperOps RMM µÄ Python ½Å±¾¡£Superops RMM ÊÇÒ»¿îºÏ·¨µÄÔ¶³Ì¹ÜÀíÈí¼þ£¬¿ÉÈÃÔ¶³Ì¼ÓÈëÕßÖ±½Ó·ÃÎÊÊÜѬȾµÄϵͳ¡£CERT-UA ³ÂËß³Æ £¬ÔÚÊ״η¢Ïִ˴ι¥»÷Ö®ºó½øÐеÄÑо¿ÏÔʾ£¬Å·ÖÞºÍÃÀ¹úµÄ½ðÈںͱ£ÏÕ»ú¹¹ÖÐÖÁÉÙ´æÔÚÎåÆðÓÉÏàͬÎļþÒý·¢µÄDZÔÚ©¶´¡£
https://www.bleepingcomputer.com/news/security/hackers-phish-finance-orgs-using-trojanized-minesweeper-clone/
4. CERT-UA ¾¯¸æÍþвÐÐΪÕß UAC-0006 ÌᳫµÄ¶ñÒâÈí¼þ»î¶¯
5ÔÂ26ÈÕ£¬ÎÚ¿ËÀ¼¼ÆËã»úÓ¦¼±·´Ó³Ð¡×é (CERT-UA) ¾¯¸æ³Æ£¬ÓëÒÔ¾¼ÃΪĿµÄµÄÍþвÐÐΪÕßUAC-0006Ïà¹ØµÄÍøÂç¹¥»÷¼¤Ôö¡£UAC-0006 ×Ô 2013 ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£ÍþвÐÐΪÕßרעÓÚÈëÇÖ»á¼ÆʦµÄ¸öÈ˵çÄÔ£¨ÓÃÓÚÖ§³Ö½ðÈڻ£¬ÀýÈç·ÃÎÊÔ¶³ÌÒøÐÐϵͳ£©¡¢ÇÔȡƾ֤ÒÔ¼°½øÐÐδ¾ÊÚȨµÄ×ʽðתÒÆ¡£Õþ¸®×¨¼Ò³ÂË߳ƣ¬×Ô 5 Ô 20 ÈÕÒÔÀ´£¬¸Ã×éÖ¯½øÐÐÁËÖÁÉÙÁ½´Î´ó¹æÄ£»î¶¯£¬ÍþвÐÐΪÕßÖ¼ÔÚͨ¹ýµç×ÓÓʼþÁ÷´«SmokeLoader¶ñÒâÈí¼þ¡£SmokeLoader ³äµ±ÆäËû¶ñÒâÈí¼þµÄ¼ÓÔØÆ÷£¬Ò»µ©Ö´ÐУ¬Ëü¾Í»á½«¶ñÒâ´úÂë×¢È뵱ǰÔËÐÐµÄ Explorer ½ø³Ì£¨explorer.exe£©£¬²¢½«ÁíÒ»¸öÓÐЧ¸ºÔØÏÂÔص½ÏµÍ³ÖС£
https://securityaffairs.com/163711/cyber-warfare-2/cert-ua-warns-uac-0006-massive-campaigns.html
5. ºÚ¿ÍÔÚ×î½üµÄ MITRE ÍøÂç¹¥»÷Öд´½¨¶ñÒâÐéÄâ»ú
5ÔÂ27ÈÕ£¬ºÚ¿Í×î½üÀûÓÃÁË MITRE µÄÍøÂçʵÑé¡¢Ñо¿ºÍÐéÄ⻯»·¾³ (NERVE) ÖеÄ©¶´¡£ËûÃÇʹÓöñÒâÐéÄâ»ú£¨VM£©À´Ìӱܼì²â²¢ÔÚÍøÂç¹¥»÷Öб£³Ö³Ö¾ÃÐÔ¡£´Ë´Î¹¥»÷±»¹é¾ÌÓÚÒ»¸öÓëÖйúÓйصÄ×éÖ¯ UNC5221£¬Í¹ÏÔÁËÍøÂçÍþвÈÕÒæÅӴ󻯣¬ÉõÖÁ¶¥¼¶ÍøÂçÄþ¾²×éÖ¯ÔÚ·ÀÓùÕâЩÍþвʱҲÃæÁÙÌôÕ½¡£¸Ã©¶´Ê¼ÓÚ 2023 Äê 12 ÔÂÏÂÑ®£¬Æäʱ¹¥»÷ÕßÀûÓÃÁË Ivanti Connect Secure É豸ÖеÄÁ½¸öÁãÈÕ©¶´£¬Â©¶´±àºÅΪCVE-2023-46805ºÍCVE-2024-21887¡£ÕâЩ©¶´Ê¹µÃºÚ¿ÍÄܹ»Í¨¹ý»á»°½Ù³ÖÈƹý¶àÒòËØÉí·ÝÑéÖ¤£¬´Ó¶ø»ñµÃ¶Ô MITRE µÄ NERVE »·¾³µÄδ¾ÊÚȨµÄ·ÃÎÊ¡£2024 Äê 4 Ô·¢ÏÖÁË×î³õµÄÀûÓü£Ï󣬴Ùʹ MITRE ºÍµÚÈý·½Êý×ÖÈ¡Ö¤ÍŶӽøÐÐÁ˳¹µ×µÄÊӲ졣һµ©½øÈë NERVE »·¾³£¬¹¥»÷Õ߾ͻáʹÓÃй¶µÄ¹ÜÀíԱƾ¾Ý½øÐкáÏòÒƶ¯£¬Ãé×¼ VMware »ù´¡¼Ü¹¹¡£
https://gbhackers.com/rogue-vms-mitres-cyber-attack/
6. ˼¿ÆFIREPOWER¹ÜÀíÖÐÐĸßΣ©¶´CVE-2024-20360
5ÔÂ27ÈÕ£¬Ë¼¿Æ Firepower ¹ÜÀíÖÐÐÄ (FMC) Èí¼þµÄ Web ¹ÜÀí½çÃæÖдæÔÚÒ»¸ö©¶´£¬¿ÉÄܵ¼Ö¾¹ýÉí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õ߶ÔÊÜÓ°ÏìµÄϵͳ½øÐÐ SQL ×¢Èë¹¥»÷¡£´æÔÚ´Ë©¶´µÄÔÒòÊÇ Web ¹ÜÀí½çÃæûÓгäʵÑéÖ¤Óû§ÊäÈë¡£¹¥»÷Õß¿ÉÒÔͨ¹ý¶ÔÓ¦Ó÷¨Ê½½øÐÐÉí·ÝÑéÖ¤²¢ÏòÊÜÓ°ÏìµÄϵͳ·¢Ë;«ÐÄÉè¼ÆµÄ SQL ²éѯÀ´ÀûÓôË©¶´¡£ÀÖ³ÉÀûÓôË©¶´¿ÉÄÜÔÊÐí¹¥»÷Õß´ÓÊý¾Ý¿â»ñÈ¡ÈκÎÊý¾Ý£¬Ôڵײã²Ù×÷ϵͳÉÏÖ´ÐÐÈÎÒâÃüÁ²¢½«È¨ÏÞÌáÉýµ½ root¡£ÒªÀûÓôË©¶´£¬¹¥»÷ÕßÖÁÉÙÐèÒªÖ»¶ÁÓû§Æ¾¾Ý¡£Ë¼¿ÆÌåÏÖ£¬Ä¿Ç°ÉÐÎÞ½â¾ö´Ë©¶´µÄ±äͨҪÁì¡£¸Ã IT ¾ÞÍ·ÒÑÈ·ÈÏ£¬´Ë©¶´²»»áÓ°Ïì×ÔÊÊÓ¦Äþ¾²É豸 (ASA) Èí¼þ»ò Firepower Íþв·ÀÓù (FTD) Èí¼þ¡£
https://securityaffairs.com/163718/security/a-high-severity-vulnerability-affects-cisco-firepower-management-center.html