DICK¡®S ÔÚÔâÊÜÍøÂç¹¥»÷ºó¹Ø±Õµç×ÓÓʼþ²¢Ëø¶¨Ô±¹¤ÕË»§

Ðû²¼Ê±¼ä 2024-08-30
1. DICK'S ÔÚÔâÊÜÍøÂç¹¥»÷ºó¹Ø±Õµç×ÓÓʼþ²¢Ëø¶¨Ô±¹¤ÕË»§


8ÔÂ28ÈÕ £¬ÃÀ¹úÌåÓýÓÃÆ·ÁãÊÛ¾ÞÍ·µÏ¿ËÌåÓýÓÃÆ·¹«Ë¾£¨DICK'S£©½üÈÕÔâÓöÍøÂç¹¥»÷ £¬µ¼ÖÂÆä»úÃÜÐÅϢй¶¡£Õâ¼ÒÓµÓÐ857¼ÒÃŵꡢÄêÊÕÈë´ï129.8ÒÚÃÀÔªµÄ²Æ¸»500Ç¿ÆóÒµ £¬ÔÚ8ÔÂ21ÈÕ·¢ÏÖÆäÐÅϢϵͳ±»µÚÈý·½Î´ÊÚȨ·ÃÎÊ¡£DICK'SѸËÙÆô¶¯ÍøÂçÄþ¾²ÏìÓ¦¼Æ»® £¬²¢ÓëÍⲿר¼ÒºÏ×÷ÊÓ²ì´Ë´Îʼþ £¬Í¬Ê±¹Ø±ÕÁ˵ç×ÓÓʼþϵͳ²¢Ëø¶¨ËùÓÐÔ±¹¤ÕË»§ £¬ÒÔ¸ôÀëÍþв¡£Ô±¹¤Ðèͨ¹ýÉí·ÝÑéÖ¤²ÅÆøÖØзÃÎÊÄÚ²¿ÏµÍ³ £¬É̵êµç»°Ïß·ҲÊܵ½Ó°Ïì¡£¾¡¹Ü¹«Ë¾ÌåÏÖÄ¿Ç°ÔËӪδÊÜ×ÌÈÅ £¬²¢ÒÑÏòÖ´·¨²¿ÃųÂËß´ËÎ¥¹æÐÐΪ £¬µ«¾ßÌåй¶ϸ½ÚÉÐδ¹ûÈ»¡£DICK'SÔÚÌá½»¸øÃÀ¹ú֤ȯ½»Ò×ίԱ»áµÄÎļþÖÐÇ¿µ÷ £¬»ùÓÚµ±Ç°ÕÆÎÕµÄÐÅÏ¢ £¬´Ë´Îʼþ±»ÈÏΪ²»×é³ÉÖØ´óÓ°Ïì £¬µ«ÊÓ²ìÈÔÔÚ½øÐÐÖС£


https://www.bleepingcomputer.com/news/security/dicks-shuts-down-email-locks-employee-accounts-after-cyberattack/


2. LummaC2бäÖÖÀûÓÃPowerShellÓë¸ß¼¶»ìÏý¼¼ÊõÇÔÈ¡Êý¾Ý


8ÔÂ28ÈÕ £¬ÈðÊ¿ÍøÂçÄþ¾²¹«Ë¾Ontinue½üÆÚ½Ò¶ÁËLummaC2¶ñÒâÈí¼þµÄÒ»¸öбäÖÖ £¬Æä»î¶¯ÏÔÖøÔöÇ¿ £¬¶ÔÍøÂçÄþ¾²×é³ÉÑÏÖØÍþв¡£Õâ¿î±äÖÖÀûÓÃPowerShell½øÐпª¶ËѬȾ £¬½áºÏ»ìÏý¼¼ÊõºÍ½ø³Ì×¢ÈëÊֶΠ£¬ÇÄÎÞÉùÏ¢µØÇÔÈ¡Ãô¸ÐÊý¾Ý¡£LummaC2×Ô2022ÄêÆð±ãÒÔ¶ñÒâÈí¼þ¼´·þÎñ(MaaS)ÐÎʽ»î¶¯ £¬½üÆÚ¸üÊÇͨ¹ýÅÓ´ó¼ÆıÉý¼¶ £¬ÈçÀûÓÃÆƽâÈí¼þ¼°YouTubeÇþµÀÁ÷´« £¬Õ¹ÏÖÁËÆä¸ß¶ÈµÄÊÊÓ¦ÐÔºÍÒþ±ÎÐÔ¡£×îз¢ÏֵıäÖÖÖÐ £¬PowerShellÃüÁî¾­¹ý¾«ÐÄ»ìÏýµ«¿É½âÂë £¬½ÒʾÁËÆäÏÂÔز¢Ö´Ðеڶþ½×¶ÎAES¼ÓÃܸºÔصÄÏêϸ²½Öè¡£¸ºÔØËæºó×¢ÈëWindowsºÏ·¨½ø³Ìdllhost.exe £¬ÒÔʵÏÖÔ¶³Ì¿ØÖÆ¡¢Êý¾ÝÇÔÈ¡¼°³Ö¾Ã»¯Ñ¬È¾¡£¸Ã±äÖÖ»¹½ÓÄÉIPÒþ²Ø¡¢×Ô½ç˵Óû§ÊðÀíµÈÊֶΠ£¬½øÒ»²½ÌÓ±ÜÄþ¾²¼ì²â¡£ÎªÓ¦¶Ô´ËÍþв £¬Ontinue½¨Òé×éÖ¯¼ÓÇ¿¶Ëµã¼ì²âºÍÏìÓ¦(EDR)²¿Ê𠣬ʵʩ¹¥»÷Ãæ¼õÉÙ(ASR)¼Æı £¬²¢¹Ø×¢Ìض¨µÄÍ×Эָ±ê(IOC)ÒÔÖ÷¶¯·ÀÓù¡£


https://hackread.com/lummac2-malware-variant-powershell-obfuscation-steal-data/


3. Mirai½©Ê¬ÍøÂçÀûÓÃAVTECH IPÉãÏñ»úÁãÈÕ©¶´CVE-2024-7029


8ÔÂ28ÈÕ £¬AkamaiµÄÄþ¾²Ç鱨ÏìÓ¦ÍŶӣ¨SIRT£©½üÈÕ¾¯¸æ³Æ £¬Mirai½©Ê¬ÍøÂç»î¶¯Õýͨ¹ýÀûÓÃAVTECH IPÉãÏñ»úÖеÄÐÂÅû¶ÁãÈÕ©¶´CVE-2024-7029ѸËÙÂûÑÓ¡£´ËRCE©¶´´æÔÚÓÚÉãÏñ»úµÄ¡°ÁÁ¶È¡±¹¦Ð§ÖÐ £¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐÐ £¬¹¥»÷ÕßÒѽè´Ë²¿ÊðÁËMiraiµÄ±äÖÖ¡°Corona¡± £¬¶ÔÒªº¦»ù´¡ÉèÊ©×é³ÉÖØ´óÍþв¡£¾¡¹ÜÊÜÓ°ÏìµÄÉãÏñÍ·ÐͺÅÒÑÍ£²ú £¬µ«ÆäÔÚ¶à¸öÁìÓòµÄÁ¬ÐøʹÓÃ͹ÏÔÁ˹ÜÀíÒÅÁôÉ豸ºÍδÐÞ¸´Â©¶´µÄ½ôÆÈÐÔ¡£CISAÒàÐû²¼³ÂËßÇ¿µ÷´Ë©¶´µÄÑÏÖØÐÔ¼°Æä¹ã·ºÓ°ÏìDZÁ¦¡£ÖµµÃ×¢ÒâµÄÊÇ £¬Mirai½©Ê¬ÍøÂç²»½öÀûÓÃCVE-2024-7029 £¬»¹Í¬Ê±Ãé×¼ÁËAVTECH¼°ÆäËûϵͳÖеĶà¸ö©¶´ £¬Õ¹ÏÖÁËÆä¶àÑù»¯µÄ¹¥»÷¼Æı¡£Corona±äÌåµÄÁ÷´«Ê¼ÓÚ2023Äêµ× £¬²¢ÔÚ2024Äê3Ôµ½´ïÁË»îÔ¾á¯Áë¡£¾¡¹ÜCVE-2024-7029µÄPoCÔçÔÚ2019Äê¾ÍÒѹûÈ» £¬ÕýʽCVE±àºÅÖ±µ½2024Äê8Ô²ÅÐû²¼¡£¼øÓÚµ±Ç°ÎÞ¹Ù·½²¹¶¡¿ÉÓà £¬Akamai½¨ÒéÁ¢¼´Í£ÓÃÊÜÓ°ÏìÉ豸×÷ΪÊ×Òª»º½â´ëÊ©¡£


https://securityonline.info/mirai-botnet-exploits-zero-day-vulnerability-cve-2024-7029-in-avtech-ip-cameras/


4. PerlÉçÇø¾¯¸æ£ºcpanminus¹¤¾ß´æÔÚÑÏÖØ©¶´CVE-2024-45321


8ÔÂ28ÈÕ £¬Perl ÉçÇø½üÆÚÐû²¼Á˹ØÓÚCVE-2024-45321µÄ½ô¼±Äþ¾²Í¨¸æ £¬Ö¸³ö¹ã·ºÊ¹ÓõÄApp::cpanminus£¨cpanm£©¹¤¾ß´æÔÚÑÏÖØ©¶´ £¬ÆäCVSSÆÀ·Ö¸ß´ï9.8¡£´Ë©¶´Ô´ÓÚcpanminusĬÈÏʹÓò»Äþ¾²µÄHTTPÁ¬½Ó´ÓCPANÏÂÔØPerlÄ £¿é £¬µ¼Ö¡°Î´¾­ÍêÕûÐÔ¼ì²éµÄ´úÂëÏÂÔØ¡±ÎÊÌ⣨CWE-494£© £¬Ê¹¹¥»÷ÕßÓлú»áÔÚ´«ÊäÖиĶ¯´úÂë £¬½ø¶øÔÚÓû§ÏµÍ³ÉÏÖ´ÐжñÒâ´úÂë¡£¼øÓÚcpanminus×÷Ϊ¹Ù·½CPAN¿Í»§¶ËµÄÇáÁ¿¼¶Ìæ´úÆ· £¬Æ䩶´Ó°Ï췶Χ¿ÉÄܼ«Îª¹ã·º £¬ÓÈÆäÍþвµ½ÒÀÀµ¸Ã¹¤¾ß¹ÜÀíPerlÄ £¿éµÄϵͳÄþ¾²¡£¾¡¹Ü¹Ù·½²¹¶¡ÉÐδÐû²¼ £¬µ«Óû§Ó¦Á¢¼´½ÓÄÉÐж¯½µµÍ·çÏÕ¡£ÍƼö´ëÊ©°üÂÞ£ºÒ»ÊÇͨ¹ýÃüÁîÐвÎÊý»ò»·¾³±äÁ¿ÉèÖÃHTTPS¾µÏñ £¬µ«Ðè×¢Òâ´Ë¾Ù¿ÉÄÜÏÞÖƶԾɰ汾ºÍ¿ª·¢°æ±¾µÄ·ÃÎÊ£»¶þÊÇÖ±½ÓÐÞ¸Äcpanm¿ÉÖ´ÐÐÎļþ £¬½«ËùÓÐHTTP¶ËµãÌ滻ΪHTTPS £¬ÒÔ±£Áô¶ÔBackPanµÈ×ÊÔ´µÄ·ÃÎÊ£»ÈýÊÇת¶øʹÓÃĬÈÏÖ§³ÖHTTPSÁ¬½ÓµÄ±¸Óÿͻ§¶Ë £¬ÈçCPAN.pm 2.35+»òApp::cpm £¬ÒÔÈ·±£Ä £¿éÏÂÔصÄÄþ¾²ÐÔ¡£


https://securityonline.info/critical-cve-2024-45321-flaw-in-popular-perl-module-installer-cpanminus-no-patch-available/


5. ÍþвÕßÀûÓÃαÔìµÄPalo Alto GlobalProtect¹¤¾ßÃé×¼Öж«


8ÔÂ29ÈÕ £¬Ç÷ÊƿƼ¼Ñо¿ÍŶӽÒ¶ÁËÒ»ÏîÕë¶ÔÖж«×éÖ¯µÄ¸ß¶ÈÅÓ´ó¶ñÒâÈí¼þ»î¶¯ £¬¸Ã»î¶¯Í¨¹ýαװ³ÉºÏ·¨µÄPalo Alto GlobalProtect VPN¿Í»§¶Ë½øÐÐÁ÷´«¡£¹¥»÷ʼÓÚÒ»¸öÃûΪ¡°setup.exe¡±µÄ¶ñÒâÎļþ £¬¸ÃÎļþÄ£ÄâVPN°²×°·¨Ê½ £¬ÔÚÊܺ¦ÕßϵͳÖв¿ÊðÐé¼Ù×é¼þ £¬²¢½èÖúÐÂ×¢²áµÄ¡°sharjahconnect¡±ÓòÃûαװ³ÉºÏ·¨VPNÃÅ»§ £¬ÒÔÔöÇ¿ÆÛÆ­ÐÔ¡£´Ë¶ñÒâÈí¼þÀûÓÃInteractshÏîÄ¿½øÐÐÐűê²Ù×÷ £¬Í¨¹ýDNSÇëÇóÓëC&C·þÎñÆ÷ͨÐÅ £¬ÒÔ¼à¿ØѬȾ½ø³Ì²¢Ö´ÐжàÖÖ¶ñÒâÈÎÎñ £¬°üÂÞÖ´ÐÐPowerShell½Å±¾¡¢¹ÜÀí½ø³Ì¡¢Êý¾ÝÇÔÈ¡Óë¼ÓÃÜͨÐÅ¡£ÆäÁé»îµÄÃüÁî½á¹¹Ê¹ÆäÄܹ»Áé»îÓ¦¶Ô²îÒì¹¥»÷ÐèÇó £¬Í¬Ê±½ÓÄÉÅÓ´ó¹æ±Ü¼¼ÊõÒÔÌӱܼì²â¡£Öж«¼°È«Çò×éÖ¯ÃæÁÙÑϾþÌôÕ½ £¬ÐèÇ¿»¯¶Ëµã±£»¤¡¢¸üÐÂÄþ¾²Ð­Òé £¬²¢¼ÓÇ¿Ô±¹¤Äþ¾²½ÌÓýÓëÒâʶÌáÉý £¬ÒÔÓÐЧµÖÓù´ËÀà¸ß¼¶Íþв¡£


https://www.trendmicro.com/en_us/research/24/h/threat-actors-target-middle-east-using-fake-tool.html


6. ÃÀ³¬130¼ÒÆóÒµÔâµöÓã¹¥»÷ £¬GRIT½Ò¶ÅÓ´óVPNµöÓãÆ­¾Ö


8ÔÂ29ÈÕ £¬GuidePoint ResearchºÍIntelligence Team£¨GRIT£©½üÆÚ½Ò¶ÁËÒ»ÏîÕë¶ÔÓ¢ÓïʹÓÃÕß £¬ÌرðÊÇÃÀ¹úÁè¼Ý130¼ÒÆóÒµµÄÅÓ´óµöÓã¹¥»÷»î¶¯¡£×Ô2024Äê6ÔÂ26ÈÕÆ𠣬¹¥»÷Õß×¢²áÁËÓëÄ¿±ê¹«Ë¾VPN·þÎñÏàËƵĸ߷ÂÓòÃû £¬²¢Í¨¹ýµç»°Ã°³äITÖ§³ÖÈËÔ± £¬ÒÔ½â¾öVPNµÇ¼ÎÊÌâΪÓÉ £¬ÓÕµ¼Ô±¹¤µã»÷º¬ÓжñÒâÁ´½ÓµÄ¶ÌÐÅ¡£ÕâЩÁ´½Óµ¼Ïò¾«ÐÄÉè¼ÆµÄ¼ÙVPNµÇ¼ҳÃæ £¬²»½öÍâ¹ÛÉÏÓëÕæʵҳÃæÎÞÒì £¬»¹°üÂÞÌØÖƵÄVPN×éÑ¡Ïî £¬Èç¡°TestVPN¡±ºÍ¡°RemoteVPN¡± £¬ÒÔÔöÇ¿ÆÛÆ­ÐÔ¡£¼´±ãÃæ¶Ô¶àÒòËØÈÏÖ¤£¨MFA£© £¬¹¥»÷ÕßÒ²ÄÜͨ¹ýÓÕµ¼Óû§Åú×¼ÍÆËÍ֪ͨÀ´ÈƹýÄþ¾²·ÀÏß £¬×îÖÕÆ­È¡Óû§Æ¾Ö¤¡£µÃÊÖºó £¬Óû§»á±»Öض¨ÏòÖÁºÏ·¨VPNÒ³Ãæ £¬²¢¿ÉÄܱ»ÒªÇóÔٴεǼ £¬´Ó¶øÇ¿»¯ÎÊÌâÒѽâ¾öµÄ¼ÙÏó¡£Ò»µ©»ñµÃVPN·ÃÎÊȨ £¬¹¥»÷ÕßËæ¼´Õ¹¿ªÍøÂçɨÃè £¬Ñ°ÕÒºáÏòÒƶ¯¡¢³Ö¾Ã»¯¼°È¨ÏÞÌáÉýµÄ»ú»á¡ £¿ÉÄÜÊܵ½ÍøÂçµöÓã¹¥»÷Ó°ÏìµÄÓû§Ó¦¼ì²éÆäÈÕÖ¾ £¬¼ì²ì¹ýÈ¥ 30 ÌìÄÚÀ´×Ô VPN ·ÖÅä IP µØÖ·µÄ¿ÉÒɻ¡£


https://cybernews.com/news/us-vpn-phishing-attack/