DICK¡®S ÔÚÔâÊÜÍøÂç¹¥»÷ºó¹Ø±Õµç×ÓÓʼþ²¢Ëø¶¨Ô±¹¤ÕË»§
Ðû²¼Ê±¼ä 2024-08-308ÔÂ28ÈÕ£¬ÃÀ¹úÌåÓýÓÃÆ·ÁãÊÛ¾ÞÍ·µÏ¿ËÌåÓýÓÃÆ·¹«Ë¾£¨DICK'S£©½üÈÕÔâÓöÍøÂç¹¥»÷£¬µ¼ÖÂÆä»úÃÜÐÅϢй¶¡£Õâ¼ÒÓµÓÐ857¼ÒÃŵꡢÄêÊÕÈë´ï129.8ÒÚÃÀÔªµÄ²Æ¸»500Ç¿ÆóÒµ£¬ÔÚ8ÔÂ21ÈÕ·¢ÏÖÆäÐÅϢϵͳ±»µÚÈý·½Î´ÊÚȨ·ÃÎÊ¡£DICK'SѸËÙÆô¶¯ÍøÂçÄþ¾²ÏìÓ¦¼Æ»®£¬²¢ÓëÍⲿר¼ÒºÏ×÷ÊÓ²ì´Ë´Îʼþ£¬Í¬Ê±¹Ø±ÕÁ˵ç×ÓÓʼþϵͳ²¢Ëø¶¨ËùÓÐÔ±¹¤ÕË»§£¬ÒÔ¸ôÀëÍþв¡£Ô±¹¤Ðèͨ¹ýÉí·ÝÑéÖ¤²ÅÆøÖØзÃÎÊÄÚ²¿ÏµÍ³£¬É̵êµç»°Ïß·ҲÊܵ½Ó°Ïì¡£¾¡¹Ü¹«Ë¾ÌåÏÖÄ¿Ç°ÔËӪδÊÜ×ÌÈÅ£¬²¢ÒÑÏòÖ´·¨²¿ÃųÂËß´ËÎ¥¹æÐÐΪ£¬µ«¾ßÌåй¶ϸ½ÚÉÐδ¹ûÈ»¡£DICK'SÔÚÌá½»¸øÃÀ¹ú֤ȯ½»Ò×ίԱ»áµÄÎļþÖÐÇ¿µ÷£¬»ùÓÚµ±Ç°ÕÆÎÕµÄÐÅÏ¢£¬´Ë´Îʼþ±»ÈÏΪ²»×é³ÉÖØ´óÓ°Ï죬µ«ÊÓ²ìÈÔÔÚ½øÐÐÖС£
https://www.bleepingcomputer.com/news/security/dicks-shuts-down-email-locks-employee-accounts-after-cyberattack/
2. LummaC2бäÖÖÀûÓÃPowerShellÓë¸ß¼¶»ìÏý¼¼ÊõÇÔÈ¡Êý¾Ý
8ÔÂ28ÈÕ£¬ÈðÊ¿ÍøÂçÄþ¾²¹«Ë¾Ontinue½üÆÚ½Ò¶ÁËLummaC2¶ñÒâÈí¼þµÄÒ»¸öбäÖÖ£¬Æä»î¶¯ÏÔÖøÔöÇ¿£¬¶ÔÍøÂçÄþ¾²×é³ÉÑÏÖØÍþв¡£Õâ¿î±äÖÖÀûÓÃPowerShell½øÐпª¶ËѬȾ£¬½áºÏ»ìÏý¼¼ÊõºÍ½ø³Ì×¢ÈëÊֶΣ¬ÇÄÎÞÉùÏ¢µØÇÔÈ¡Ãô¸ÐÊý¾Ý¡£LummaC2×Ô2022ÄêÆð±ãÒÔ¶ñÒâÈí¼þ¼´·þÎñ(MaaS)ÐÎʽ»î¶¯£¬½üÆÚ¸üÊÇͨ¹ýÅÓ´ó¼ÆıÉý¼¶£¬ÈçÀûÓÃÆƽâÈí¼þ¼°YouTubeÇþµÀÁ÷´«£¬Õ¹ÏÖÁËÆä¸ß¶ÈµÄÊÊÓ¦ÐÔºÍÒþ±ÎÐÔ¡£×îз¢ÏֵıäÖÖÖУ¬PowerShellÃüÁî¾¹ý¾«ÐÄ»ìÏýµ«¿É½âÂ룬½ÒʾÁËÆäÏÂÔز¢Ö´Ðеڶþ½×¶ÎAES¼ÓÃܸºÔصÄÏêϸ²½Öè¡£¸ºÔØËæºó×¢ÈëWindowsºÏ·¨½ø³Ìdllhost.exe£¬ÒÔʵÏÖÔ¶³Ì¿ØÖÆ¡¢Êý¾ÝÇÔÈ¡¼°³Ö¾Ã»¯Ñ¬È¾¡£¸Ã±äÖÖ»¹½ÓÄÉIPÒþ²Ø¡¢×Ô½ç˵Óû§ÊðÀíµÈÊֶΣ¬½øÒ»²½ÌÓ±ÜÄþ¾²¼ì²â¡£ÎªÓ¦¶Ô´ËÍþв£¬Ontinue½¨Òé×éÖ¯¼ÓÇ¿¶Ëµã¼ì²âºÍÏìÓ¦(EDR)²¿Êð£¬ÊµÊ©¹¥»÷Ãæ¼õÉÙ(ASR)¼Æı£¬²¢¹Ø×¢Ìض¨µÄÍ×ÐÖ¸±ê(IOC)ÒÔÖ÷¶¯·ÀÓù¡£
https://hackread.com/lummac2-malware-variant-powershell-obfuscation-steal-data/
3. Mirai½©Ê¬ÍøÂçÀûÓÃAVTECH IPÉãÏñ»úÁãÈÕ©¶´CVE-2024-7029
8ÔÂ28ÈÕ£¬AkamaiµÄÄþ¾²Ç鱨ÏìÓ¦ÍŶӣ¨SIRT£©½üÈÕ¾¯¸æ³Æ£¬Mirai½©Ê¬ÍøÂç»î¶¯Õýͨ¹ýÀûÓÃAVTECH IPÉãÏñ»úÖеÄÐÂÅû¶ÁãÈÕ©¶´CVE-2024-7029ѸËÙÂûÑÓ¡£´ËRCE©¶´´æÔÚÓÚÉãÏñ»úµÄ¡°ÁÁ¶È¡±¹¦Ð§ÖУ¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¬¹¥»÷ÕßÒѽè´Ë²¿ÊðÁËMiraiµÄ±äÖÖ¡°Corona¡±£¬¶ÔÒªº¦»ù´¡ÉèÊ©×é³ÉÖØ´óÍþв¡£¾¡¹ÜÊÜÓ°ÏìµÄÉãÏñÍ·ÐͺÅÒÑÍ£²ú£¬µ«ÆäÔÚ¶à¸öÁìÓòµÄÁ¬ÐøʹÓÃ͹ÏÔÁ˹ÜÀíÒÅÁôÉ豸ºÍδÐÞ¸´Â©¶´µÄ½ôÆÈÐÔ¡£CISAÒàÐû²¼³ÂËßÇ¿µ÷´Ë©¶´µÄÑÏÖØÐÔ¼°Æä¹ã·ºÓ°ÏìDZÁ¦¡£ÖµµÃ×¢ÒâµÄÊÇ£¬Mirai½©Ê¬ÍøÂç²»½öÀûÓÃCVE-2024-7029£¬»¹Í¬Ê±Ãé×¼ÁËAVTECH¼°ÆäËûϵͳÖеĶà¸ö©¶´£¬Õ¹ÏÖÁËÆä¶àÑù»¯µÄ¹¥»÷¼Æı¡£Corona±äÌåµÄÁ÷´«Ê¼ÓÚ2023Äêµ×£¬²¢ÔÚ2024Äê3Ôµ½´ïÁË»îÔ¾á¯Áë¡£¾¡¹ÜCVE-2024-7029µÄPoCÔçÔÚ2019Äê¾ÍÒѹûÈ»£¬ÕýʽCVE±àºÅÖ±µ½2024Äê8Ô²ÅÐû²¼¡£¼øÓÚµ±Ç°ÎÞ¹Ù·½²¹¶¡¿ÉÓã¬Akamai½¨ÒéÁ¢¼´Í£ÓÃÊÜÓ°ÏìÉ豸×÷ΪÊ×Òª»º½â´ëÊ©¡£
https://securityonline.info/mirai-botnet-exploits-zero-day-vulnerability-cve-2024-7029-in-avtech-ip-cameras/
4. PerlÉçÇø¾¯¸æ£ºcpanminus¹¤¾ß´æÔÚÑÏÖØ©¶´CVE-2024-45321
8ÔÂ28ÈÕ£¬Perl ÉçÇø½üÆÚÐû²¼Á˹ØÓÚCVE-2024-45321µÄ½ô¼±Äþ¾²Í¨¸æ£¬Ö¸³ö¹ã·ºÊ¹ÓõÄApp::cpanminus£¨cpanm£©¹¤¾ß´æÔÚÑÏÖØ©¶´£¬ÆäCVSSÆÀ·Ö¸ß´ï9.8¡£´Ë©¶´Ô´ÓÚcpanminusĬÈÏʹÓò»Äþ¾²µÄHTTPÁ¬½Ó´ÓCPANÏÂÔØPerlÄ£¿é£¬µ¼Ö¡°Î´¾ÍêÕûÐÔ¼ì²éµÄ´úÂëÏÂÔØ¡±ÎÊÌ⣨CWE-494£©£¬Ê¹¹¥»÷ÕßÓлú»áÔÚ´«ÊäÖиĶ¯´úÂ룬½ø¶øÔÚÓû§ÏµÍ³ÉÏÖ´ÐжñÒâ´úÂë¡£¼øÓÚcpanminus×÷Ϊ¹Ù·½CPAN¿Í»§¶ËµÄÇáÁ¿¼¶Ìæ´úÆ·£¬Æ䩶´Ó°Ï췶Χ¿ÉÄܼ«Îª¹ã·º£¬ÓÈÆäÍþвµ½ÒÀÀµ¸Ã¹¤¾ß¹ÜÀíPerlÄ£¿éµÄϵͳÄþ¾²¡£¾¡¹Ü¹Ù·½²¹¶¡ÉÐδÐû²¼£¬µ«Óû§Ó¦Á¢¼´½ÓÄÉÐж¯½µµÍ·çÏÕ¡£ÍƼö´ëÊ©°üÂÞ£ºÒ»ÊÇͨ¹ýÃüÁîÐвÎÊý»ò»·¾³±äÁ¿ÉèÖÃHTTPS¾µÏñ£¬µ«Ðè×¢Òâ´Ë¾Ù¿ÉÄÜÏÞÖƶԾɰ汾ºÍ¿ª·¢°æ±¾µÄ·ÃÎÊ£»¶þÊÇÖ±½ÓÐÞ¸Äcpanm¿ÉÖ´ÐÐÎļþ£¬½«ËùÓÐHTTP¶ËµãÌ滻ΪHTTPS£¬ÒÔ±£Áô¶ÔBackPanµÈ×ÊÔ´µÄ·ÃÎÊ£»ÈýÊÇת¶øʹÓÃĬÈÏÖ§³ÖHTTPSÁ¬½ÓµÄ±¸Óÿͻ§¶Ë£¬ÈçCPAN.pm 2.35+»òApp::cpm£¬ÒÔÈ·±£Ä£¿éÏÂÔصÄÄþ¾²ÐÔ¡£
https://securityonline.info/critical-cve-2024-45321-flaw-in-popular-perl-module-installer-cpanminus-no-patch-available/
5. ÍþвÕßÀûÓÃαÔìµÄPalo Alto GlobalProtect¹¤¾ßÃé×¼Öж«
8ÔÂ29ÈÕ£¬Ç÷ÊƿƼ¼Ñо¿ÍŶӽÒ¶ÁËÒ»ÏîÕë¶ÔÖж«×éÖ¯µÄ¸ß¶ÈÅÓ´ó¶ñÒâÈí¼þ»î¶¯£¬¸Ã»î¶¯Í¨¹ýαװ³ÉºÏ·¨µÄPalo Alto GlobalProtect VPN¿Í»§¶Ë½øÐÐÁ÷´«¡£¹¥»÷ʼÓÚÒ»¸öÃûΪ¡°setup.exe¡±µÄ¶ñÒâÎļþ£¬¸ÃÎļþÄ£ÄâVPN°²×°·¨Ê½£¬ÔÚÊܺ¦ÕßϵͳÖв¿ÊðÐé¼Ù×é¼þ£¬²¢½èÖúÐÂ×¢²áµÄ¡°sharjahconnect¡±ÓòÃûαװ³ÉºÏ·¨VPNÃÅ»§£¬ÒÔÔöÇ¿ÆÛÆÐÔ¡£´Ë¶ñÒâÈí¼þÀûÓÃInteractshÏîÄ¿½øÐÐÐűê²Ù×÷£¬Í¨¹ýDNSÇëÇóÓëC&C·þÎñÆ÷ͨÐÅ£¬ÒÔ¼à¿ØѬȾ½ø³Ì²¢Ö´ÐжàÖÖ¶ñÒâÈÎÎñ£¬°üÂÞÖ´ÐÐPowerShell½Å±¾¡¢¹ÜÀí½ø³Ì¡¢Êý¾ÝÇÔÈ¡Óë¼ÓÃÜͨÐÅ¡£ÆäÁé»îµÄÃüÁî½á¹¹Ê¹ÆäÄܹ»Áé»îÓ¦¶Ô²îÒì¹¥»÷ÐèÇó£¬Í¬Ê±½ÓÄÉÅÓ´ó¹æ±Ü¼¼ÊõÒÔÌӱܼì²â¡£Öж«¼°È«Çò×éÖ¯ÃæÁÙÑϾþÌôÕ½£¬ÐèÇ¿»¯¶Ëµã±£»¤¡¢¸üÐÂÄþ¾²ÐÒ飬²¢¼ÓÇ¿Ô±¹¤Äþ¾²½ÌÓýÓëÒâʶÌáÉý£¬ÒÔÓÐЧµÖÓù´ËÀà¸ß¼¶Íþв¡£
https://www.trendmicro.com/en_us/research/24/h/threat-actors-target-middle-east-using-fake-tool.html
6. ÃÀ³¬130¼ÒÆóÒµÔâµöÓã¹¥»÷£¬GRIT½Ò¶ÅÓ´óVPNµöÓãƾÖ
8ÔÂ29ÈÕ£¬GuidePoint ResearchºÍIntelligence Team£¨GRIT£©½üÆÚ½Ò¶ÁËÒ»ÏîÕë¶ÔÓ¢ÓïʹÓÃÕߣ¬ÌرðÊÇÃÀ¹úÁè¼Ý130¼ÒÆóÒµµÄÅÓ´óµöÓã¹¥»÷»î¶¯¡£×Ô2024Äê6ÔÂ26ÈÕÆ𣬹¥»÷Õß×¢²áÁËÓëÄ¿±ê¹«Ë¾VPN·þÎñÏàËƵĸ߷ÂÓòÃû£¬²¢Í¨¹ýµç»°Ã°³äITÖ§³ÖÈËÔ±£¬ÒÔ½â¾öVPNµÇ¼ÎÊÌâΪÓÉ£¬ÓÕµ¼Ô±¹¤µã»÷º¬ÓжñÒâÁ´½ÓµÄ¶ÌÐÅ¡£ÕâЩÁ´½Óµ¼Ïò¾«ÐÄÉè¼ÆµÄ¼ÙVPNµÇ¼ҳÃ棬²»½öÍâ¹ÛÉÏÓëÕæʵҳÃæÎÞÒ죬»¹°üÂÞÌØÖƵÄVPN×éÑ¡ÏÈç¡°TestVPN¡±ºÍ¡°RemoteVPN¡±£¬ÒÔÔöÇ¿ÆÛÆÐÔ¡£¼´±ãÃæ¶Ô¶àÒòËØÈÏÖ¤£¨MFA£©£¬¹¥»÷ÕßÒ²ÄÜͨ¹ýÓÕµ¼Óû§Åú×¼ÍÆËÍ֪ͨÀ´ÈƹýÄþ¾²·ÀÏߣ¬×îÖÕÆÈ¡Óû§Æ¾Ö¤¡£µÃÊÖºó£¬Óû§»á±»Öض¨ÏòÖÁºÏ·¨VPNÒ³Ã棬²¢¿ÉÄܱ»ÒªÇóÔٴεǼ£¬´Ó¶øÇ¿»¯ÎÊÌâÒѽâ¾öµÄ¼ÙÏó¡£Ò»µ©»ñµÃVPN·ÃÎÊȨ£¬¹¥»÷ÕßËæ¼´Õ¹¿ªÍøÂçɨÃ裬ѰÕÒºáÏòÒƶ¯¡¢³Ö¾Ã»¯¼°È¨ÏÞÌáÉýµÄ»ú»á¡£¿ÉÄÜÊܵ½ÍøÂçµöÓã¹¥»÷Ó°ÏìµÄÓû§Ó¦¼ì²éÆäÈÕÖ¾£¬¼ì²ì¹ýÈ¥ 30 ÌìÄÚÀ´×Ô VPN ·ÖÅä IP µØÖ·µÄ¿ÉÒɻ¡£
https://cybernews.com/news/us-vpn-phishing-attack/