SloppyLemmingÀûÓÃCloudflare WorkersµÈ¹¤¾ß·¢¶¯¼äµý¹¥»÷
Ðû²¼Ê±¼ä 2024-09-279ÔÂ25ÈÕ£¬¸ß¼¶Á¬ÐøÐÔÍþв£¨APT£©×éÖ¯¡°SloppyLemming¡±½üÆÚ±»·¢ÏÖÀûÓÃCloudflareµÄWorkerÔÆ·þÎñÒÔ¼°Discord¡¢Dropbox¡¢GitHubµÈ¹¤¾ß£¬ÔÚÓ¡¶È´Î´ó½¼°ÖܱߵØÓò¶ÔÕþ¸®ºÍÖ´·¨»ú¹¹½øÐй㷺µÄ¼äµý»î¶¯¡£¸Ã×éÖ¯±»Crowdstrike×·×ÙΪ¡°Outrider Tiger¡±£¬ÆäÐж¯Óë´ÓÓ¡¶È¼°Öܱ߹ú¼ÒÃô¸Ð×éÖ¯ÇÔÈ¡Ç鱨¸ß¶ÈÏà¹Ø¡£Êܺ¦Õß°üÂÞÕþ¸®»ú¹¹¡¢ITºÍµçÐÅÆóÒµ¡¢½¨Öþ¹«Ë¾£¬ÉõÖÁ°Í»ù˹̹µÄºËµçÉèÊ©£¬ÇÒ¹¥»÷·¶Î§»¹À©Õ¹ÖÁÃϼÓÀ¹ú¡¢Ë¹ÀïÀ¼¿¨¼°ÖйúµÄÄÜÔ´ÓëѧÊõ»ú¹¹£¬ÉõÖÁ¿ÉÄÜ´¥¼°°Ä´óÀûÑÇÊ׶¼¿°ÅàÀ¡£SloppyLemmingͨ¹ý¾«ÐÄÉè¼ÆµÄÓã²æʽÍøÂçµöÓãÓʼþÆô¶¯¹¥»÷£¬ÀûÓÃCloudflare WorkersÕâÒ»ÎÞ·þÎñÆ÷¼ÆËãƽִ̨ÐжñÒâ½Å±¾£¬À¹½Ø²¢²Ù×÷Á÷¾CloudflareµÄWebÁ÷Á¿£¬ÒÔÇÔÈ¡µÇ¼ƾ֤ºÍ鶵ç×ÓÓʼþ¡£´ËÍ⣬SloppyLemming»¹¿ª·¢ÁËÃûΪ¡°CloudPhish¡±µÄ¶¨Öƹ¤¾ß£¬×¨ÃÅÓÃÓÚƾ֤ÇÔÈ¡ºÍй¶£¬Í¨¹ýÄ£·ÂÄ¿±êWebmailµÇ¼ҳÃæÀ´ÓÕÆÓû§ÊäÈëÐÅÏ¢¡£Í¬Ê±£¬¸Ã×éÖ¯»¹ÀûÓÃGoogle OAuthÁîÅÆÊÕ¼¯ºÍRARÎļþ©¶´ÀûÓã¨CVE-2023-38831£©µÈÊֶΣ¬¹¹½¨ÅÓ´óµÄ¹¥»÷Á´£¬½øÒ»²½¼Ó¾çÁËÄþ¾²Íþв¡£
https://www.darkreading.com/cloud-security/sloppylemming-apt-cloudflare-pakistan-attacks
2. ·¨¹ú9500ÍòÌõ¹«ÃñÊý¾ÝÔâй¶£¬Éæ¼°¶àÐÐÒµÐÅÏ¢
9ÔÂ25ÈÕ£¬·¨¹ú½üÆÚ·¢ÉúÁËÒ»ÆðÕ𾪵ÄÊý¾Ýй¶Ê¼þ£¬Éæ¼°Áè¼Ý9500ÍòÌõ¹«ÃñÊý¾Ý¼Ç¼±»¹ûÈ»ÖÃÓÚ»¥ÁªÍøÉÏ£¬Ô¶³¬·¨¹ú×ÜÈË¿ÚÊý£¬Êý¾Ý·¶Î§º¸ÇÐÕÃû¡¢ÁªÏµ·½Ê½¡¢µç×ÓÓʼþ¼°²¿ÃÅÖ§¸¶ÐÅÏ¢µÈÃô¸ÐÄÚÈÝ¡£´Ë´ÎʼþÓÉCybernewsÓëÍøÂçÄþ¾²×¨¼ÒÅäºÏ½Ò¶£¬Ô´Í·Ö¸ÏòÒ»¸ö¿ª·ÅµÄElasticsearch·þÎñÆ÷¡°vip-v3¡±£¬ÎÞÐèÈÏÖ¤¼´¿É·ÃÎÊ£¬ÄÚº¬ÖÁÉÙ30GBÊý¾Ý£¬Ô´ÓÚ17Æð²îÒìµÄÊý¾Ýй¶Ê¹ʡ£Ð¹Â¶Êý¾Ý²»½öÊýÁ¿ÅÓ´ó£¬ÇÒÖÖÀà·±¶à£¬Éæ¼°µçÐÅ¡¢µçÉÌ¡¢É罻ýÌåµÈ¶à¸öÐÐÒµ£¬°üÂÞÖªÃû¹«Ë¾ÈçLycamobile¡¢Pandabuy¡¢Darty¡¢Discord¼°SnapchatµÈ£¬·´Ó³ÁËÊý¾Ýй¶ÎÊÌâµÄ¹ã·ºÐÔºÍÑÏÖØÐÔ¡£ÓÈΪֵµÃ¹Ø×¢µÄÊÇ£¬Êý¾Ý¿â¹ûȻ״̬ÒÑÁ¬ÐøÒ»¶Îʱ¼ä£¬²»ÅųýÒÑÓжñÒâµÚÈý·½¸´ÖÆÊý¾ÝÓÃÓÚ·Ç·¨»î¶¯¡£´ËÍ⣬¸ÃÐÐΪÃ÷ÏÔÎ¥·´ÁËÅ·ÃËGDPR¹æÔò£¬ÏÔʾ³öÊý¾Ý¿â¹ÜÀíÕ߶ÔÖ´·¨µÄÎÞÊÓ¼°Ç±ÔڵĶñÒâÄ¿µÄ¡£Ñо¿ÈËÔ±¾¯¸æ£¬Èç´Ë¼¯ÖÐÇÒÏ꾡µÄ¸öÈËÐÅϢ̻¶£¬½«¼«´óÌáÉýÉí·Ý͵ÇÔ¡¢ÆÛÕ©¼°ÍøÂç¹¥»÷µÄ·çÏÕ£¬¶ÔÊý°ÙÍò¸öÈ˼°ÆóÒµ×é³ÉÍþв¡£
https://cybernews.com/security/french-records-exposed-by-mysterious-data-hoarder/
3. ÃÀ¹ú¹ú»á³¬3000ÃûÊÂÇéÈËÔ±ÐÅÏ¢Ôâ°µÍøй¶
9ÔÂ26ÈÕ£¬ÃÀ¹ú¹ú»á´óÏýüÆÚ³ÉΪ´ó¹æÄ£ÍøÂç¹¥»÷µÄÊܺ¦Õߣ¬µ¼ÖÂÁè¼Ý3,000Ãû¹ú»áÊÂÇéÈËÔ±µÄÃô¸Ð¸öÈËÐÅÏ¢ÔÚ°µÍøÉÏÆع⡣¾ÝProtonºÍConstella Intelligence¹«Ë¾µÄÑо¿·¢ÏÖ£¬ÕâЩй¶Êý¾Ý°üÂÞÃÜÂë¡¢IPµØÖ·¼°É罻ýÌåÐÅÏ¢£¬¹²¼ÆÔ¼3,191Ìõ¼Ç¼£¬ÆäÖнüÎå·ÖÖ®Ò»µÄ¹ú»áÔ±¹¤Êܵ½²¨¼°¡£ÌرðÖµµÃ×¢ÒâµÄÊÇ£¬²¿ÃÅÔ±¹¤Òò²»Á¼Ï°¹ß£¬ÈçʹÓùٷ½ÓÊÏä×¢²á°üÂÞÔ¼»áºÍ³ÉÈËÍøÕ¾µÈ¸ß·çÏÕÍøÕ¾£¬µ¼ÖÂÐÅÏ¢±»¶à´Îй¶£¬×î¸ßµ¥ÀýÉæ¼°31¸öÃÜÂë¡£ProtonÖ¸³ö£¬ÕâÖÖ½«ÊÂÇéÓÊÏäÓë²»Äþ¾²Æ½Ì¨°ó¶¨µÄÐÐΪ×é³ÉÁËÑÏÖØÄþ¾²Â©¶´¡£¹«Ë¾ÔÊÐí½«½øÒ»²½Ðû²¼ÊÓ²ì½á¹û£¬²¢Ç¿µ÷ÔÚ×Üͳѡ¾ÙÆÚ¼ä¼ÓÇ¿·À»¤µÄÖØÒªÐÔ¡£Í¬Ê±£¬¹«Ë¾ÒÑÏòËùÓÐÊÜÓ°ÏìµÄ¹ú»áÊÂÇéÈËÔ±·¢³ö¾¯Ê¾¡£´ËÍ⣬½ñÄê6Ô£¬Í¬Ò»ÊÓ²ìÍŶӻ¹·¢ÏÖÊý°ÙÃûÓ¢¹ú¼°Å·ÃËÕþ¿ÍµÄ¸öÈËÐÅϢͬÑùÔÚ°µÍøÊг¡ÉÏÁ÷ͨ£¬°üÂÞµç×ÓÓÊÏä¡¢ÃÜÂë¼°³öÉúÈÕÆÚµÈÃô¸ÐÊý¾Ý£¬Í¹ÏÔÁËÈ«ÇòÕþÖÎÁìÓòÃæÁÙµÄÍøÂçÄþ¾²ÌôÕ½¡£
https://securityaffairs.com/168912/deep-web/3000-congressional-staffers-data-leaked-dark-web.html
4. Unit 42½ÒʾRomCom¶ñÒâÈí¼þбäÖÖSnipBot
9ÔÂ25ÈÕ£¬Unit 42Äþ¾²ÍŶӽüÆÚ½Ò¶ÁËÎÛÃûÕÑÖøµÄRomCom¶ñÒâÈí¼þ¼Ò×åµÄбäÖÖ¡°SnipBot¡±£¬¸Ã±äÖÖÓÚ2024Äê³õո¶ͷ½Ç£¬×¨ÎªÆóÒµÍøÂçÉè¼Æ£¬¾ß±¸Ô¶³Ì²Ù¿ØÓë¶ñÒ⸺ÔØÏÂÔØÄÜÁ¦¡£SnipBotÒÔÆ䴴еĴúÂë»ìÏý¼¼ÊõºÍ¸ß¼¶·´¼ì²â¼ÆıΪÌص㣬±»ÍƲâΪÕë¶ÔIT·þÎñ¡¢ÆóÒµ·¨È˼°Å©ÒµµÈÐÐÒµÌᳫµÄ¹ã·ºÍøÂç¹¥»÷µÄÒ»²¿ÃÅ¡£2024Äê4Ô£¬Unit 42²¶×½µ½Ò»¸öÒì³£DLLÄ£¿é£¬È·ÈÏΪSnipBot¹¤¾ß°ü×é¼þ¡£Í¨¹ýÉîÈë·ÖÎö£¬Ñо¿ÈËÔ±»¹ÔÁËSnipBotµÄѬȾ·¾¶¼°ºóÐø»î¶¯¡£ÆäѬȾʼÓÚαװ³ÉºÏ·¨PDFÎļþµÄµöÓãÓʼþ£¬ÄÚº¬¶ñÒâ¿ÉÖ´ÐÐÎļþ¡£Ò»µ©ÈëÇÖÀֳɣ¬SnipBot¸³Óè¹¥»÷ÕßÈ«Ãæ¿ØÖÆȨ£¬ÔÊÐíÆäÖ´ÐÐÈÎÒâÃüÁî¡¢ËѼ¯ÏµÍ³ÐÅÏ¢¼°ÇÔÈ¡Êý¾Ý¡£Í¬Ê±£¬SnipBotÄÜÏÂÔØÈçSnippingTool.dll¡¢svcnet.exeµÈÌرðÄ£¿é£¬ÔöÇ¿¹¥»÷ÄÜÁ¦¡£Unit 42ÊӲ쵽£¬¹¥»÷ÕßÌرð¹Ø×¢´ÓÊܺ¦ÕßÍøÂçÖÐÌáÈ¡Êý¾Ý£¬ÓÈÆäÊÇÓò¿ØÖÆÆ÷ÐÅÏ¢£¬ÀûÓÃPuTTY¡¢WinRARµÈºÏ·¨¹¤¾ß¼°fsutil.exe¡¢dsutil.exeµÈαװִÐжñÒâ²Ù×÷¡£¾¡¹ÜRomCom¼Ò×å³£ÓëÀÕË÷Èí¼þ»î¶¯Ïà¹ØÁª£¬µ«SnipBotµÄÐÐΪģʽÏÔʾ³öÆäÕýתÏòÇ鱨ÊÕ¼¯Óë¼äµý»î¶¯¡£
https://securityonline.info/new-romcom-variant-snipbot-unveiled-a-sophisticated-malware-targeting-enterprise-networks/
5. ÆðÑǾÏúÉÌÍøÕ¾ÏÖÑÏÖØ©¶´£ººÚ¿Í¿Éƾ³µÅƺÅÔ¶³Ì¿ØÖÆÊý°ÙÍò³µÁ¾
9ÔÂ26ÈÕ£¬Äþ¾²ÁìÓò½üÆÚÆسöÒ»ÆðÕë¶ÔÆðÑÇÆû³µµÄÄþ¾²Â©¶´Ê¼þ£¬¸Ã©¶´Éæ¼°ÆðÑÇÆû³µ¾ÏúÉÌÃÅ»§ÍøÕ¾£¬Ê¹µÃºÚ¿Í½öƾ³µÅƺžÍÄÜÔÚ¼«¶Ìʱ¼äÄÚÔ¶³Ì¿ØÖÆÊý°ÙÍòÁ¾2013ÄêºóÉú²úµÄÆðÑÇÆû³µ¡£ÕâÒ»·¢ÏÖ×·ËÝÖÁ½ñÄê6Ô£¬ÓÉÄþ¾²Ñо¿Ô±ÈøÄ·-¿âÀïµÈÈ˽Ò¶¡£ÓëÈ¥ÄêÆعâµÄÉæ¼°¶à¼ÒÆû³µÆ·ÅƵÄ©¶´ÀàËÆ£¬´Ë´ÎÆðÑÇ©¶´²»½öÈúڿÍÄÜÔ¶³Ì²Ù¿Ø³µÁ¾£¬»¹Ì»Â¶Á˳µÖ÷µÄÃô¸Ð¸öÈËÐÅÏ¢£¬ÈçÐÕÃû¡¢ÁªÏµ·½Ê½¼°µØÖ·¡£Ñо¿ÈËԱͨ¹ý×¢²á¾ÏúÉÌÕË»§²¢»ñÈ¡·ÃÎÊÁîÅÆ£¬ÀÖ³ÉÉø͸ºó¶ËAPI£¬½ø¶øʵÏÖ¶Ô³µÁ¾¼°³µÖ÷Êý¾ÝµÄÈ«Ãæ·ÃÎÊ¡£ËûÃÇ¿ª·¢ÁËÒ»¸öÑÝʾ¹¤¾ß£¬Õ¹Ê¾Á˺ڿÍÈçºÎͨ¹ý³µÅƺÅÔÚ30ÃëÄÚÖ´ÐаüÂÞËø¶¨/½âËø¡¢Æô¶¯/Í£Ö¹³µÁ¾¡¢ÃùµÑ¼°¶¨Î»ÔÚÄÚµÄÔ¶³Ì¿ØÖƲÙ×÷¡£¸üΪÑÏÖصÄÊÇ£¬ºÚ¿Í»¹ÄÜÔÚ³µÖ÷ºÁ²»ÖªÇéµÄÇé¿öÏ£¬½«×Ô¼ºÌí¼ÓΪ³µÁ¾µÄµÚ¶þÓû§£¬ÊµÏÖÒþ±ÎµÄÔ¶³Ì²Ù¿Ø¡£ÐÒÔ˵ÄÊÇ£¬ÕâЩ©¶´Òѱ»¼°Ê±·¢ÏÖ²¢ÐÞ¸´£¬ÇÒδ·¢ÏÖÓжñÒâÀûÓõļǼ¡£ÆðÑÇÍŶÓҲȷÈÏÁË©¶´Î´±»Íⲿ¶ñÒâ¹¥»÷ËùÀûÓá£
https://www.bleepingcomputer.com/news/security/kia-dealer-portal-flaw-could-let-attackers-hack-millions-of-cars/
6. RhadamanthysÔÚ0.7.0°æ±¾ÖÐÌí¼ÓÁË´´ÐµÄAI¹¦Ð§
9ÔÂ26ÈÕ£¬RhadamanthysÊÇÒ»¿î×Ô2022ÄêÆðѸËÙÑݽøµÄ¸ß¼¶ÐÅÏ¢ÇÔÈ¡·¨Ê½£¬Æä×îÐÂ0.7.0°æ±¾¼¯³ÉÁËÈ˹¤ÖÇÄÜÇý¶¯µÄ¹âѧ×Ö·ûʶ±ð¼¼Êõ£¬ÄÜ´ÓͼÏñÖÐÌáÈ¡¼ÓÃÜ»õ±ÒÖÖ×Ó¶ÌÓ¼«´óÌáÉýÁËÆäÍþвÐÔ¡£¾¡¹ÜÃæÁÙµØÓòÐÔ½ûÁ¸Ã¶ñÒâÈí¼þÈÔ»îÔ¾ÓÚµØÏÂÊг¡£¬ÀûÓÃMSI°²×°·¨Ê½Î±×°µÈÊֶιæ±Ü¼ì²â£¬ÒÔ͵ȡƾ֤¡¢ÏµÍ³ÐÅÏ¢¼°²ÆÕþÊý¾Ý¡£ÆäAIͼÏñʶ±ð¹¦Ð§ÓÈΪÒýÈËעĿ£¬Ê¹¹¥»÷ÕßÄÜ×Ô¶¯²¶×½²¢Ð¹Â¶¼ÓÃÜ»õ±ÒÐÅÏ¢¡£RhadamanthysµÄ¿ª·¢Õßͨ¹ýTOXºÍTelegramµÈƽ̨Á¬ÐøÍƹ㣬²¢Õë¶Ô±±ÃÀ¡¢ÄÏÃÀµÈµØ¼ÓÃÜ»õ±ÒÓû§ÊµÊ©¾«×¼¹¥»÷¡£ÎªÓ¦¶ÔÕâÒ»Íþв£¬Insikt GroupÌá³öÁ˶àÖÖ»º½â¼Æı£¬°üÂÞ»ùÓÚ»¥³âËøµÄÖÕÖ¹¿ª¹Ø¡¢¸ß¼¶¼ì²â¹æÔò¼°Ç¿»¯¶Ëµã±£»¤µÈ£¬Ö¼ÔÚÖ÷¶¯×èÖ¹¶ñÒâÈí¼þÖ´Ðв¢ÌáÉýϵͳ·À»¤ÄÜÁ¦¡£Õ¹ÍûδÀ´£¬Ëæ×ÅRhadamanthys 0.8.0µÈа汾µÄÑз¢£¬Ô¤¼ÆÆ佫Èںϸü¶à»úÆ÷ѧϰ¼¼Êõ£¬½øÒ»²½ÌáÉýÇÔȡЧÂÊÓëÒþ±ÎÐÔ¡£Òò´Ë£¬±£³Ö¼ì²â¼¼ÊõµÄÁ¬Ðø¸üÐÂÓëÉý¼¶£¬¶ÔÓÚÓÐЧµÖÓù´ËÀà¸ß¼¶ÍþвÖÁ¹ØÖØÒª¡£
https://www.recordedfuture.com/research/rhadamanthys-stealer-adds-innovative-ai-feature-version