PipeMagicľÂíÀûÓÃαÔìChatGPTÓ¦Ó÷¨Ê½¹¥»÷ɳÌØ°¢À­²®

Ðû²¼Ê±¼ä 2024-10-17

1. PipeMagicľÂíÀûÓÃαÔìChatGPTÓ¦Ó÷¨Ê½¹¥»÷ɳÌØ°¢À­²®


10ÔÂ15ÈÕ£¬¿¨°Í˹»ùÈ«ÇòÑо¿Óë·ÖÎöÍŶӣ¨GReAT£©½üÆÚÅû¶ÁËÒ»ÏîеÄÍøÂç¹¥»÷»î¶¯£¬¸Ã»î¶¯ÀûÓÃÒ»ÖÖÃûΪPipeMagicµÄÅÓ´óºóÃÅľÂí½øÐÐÁ÷´«£¬ÆäµØÀíÄ¿±êÒÑ´ÓÑÇÖÞÀ©Õ¹µ½É³ÌØ°¢À­²®¡£´Ë´Î¹¥»÷ÖУ¬ÍøÂç·¸×ï·Ö×Ó½ÓÄÉÁËÒ»¿îÓÃRust¿ª·¢µÄαÔìChatGPTÓ¦Ó÷¨Ê½×÷Ϊ³õʼѬȾý½é£¬¸Ã·¨Ê½ÀûÓó£¼ûµÄRust¿âÀ´¹æ±Ü¿ª¶Ë¼ì²â£¬µ«ÔÚÖ´ÐÐʱ½öÏÔʾ¿Õ°×ÆÁÄ»£¬²¢Òþ²ØÒ»¸ö°üÂÞ¶ñÒ⸺ÔصļÓÃÜÊý¾ÝÊý×é¡£ÔÚºóÐø½×¶Î£¬¶ñÒâÈí¼þ»á½ÓÄÉÃû³Æ¹þÏ£Ëã·¨¶¨Î»Òªº¦µÄWindows APIº¯Êý£¬ÒÔ·ÖÅäÄÚ´æ¡¢¼ÓÔØPipeMagicºóÃÅ¡¢ÅäÖÃÉèÖò¢Æô¶¯¶ñÒâÈí¼þ¡£PipeMagicľÂí¾ßÓÐÆæÌصĹ¦Ð§£¬Äܹ»Éú³ÉÒ»¸ö16×Ö½ÚµÄËæ»úÊý×飬ÓÃÓÚ½¨Á¢ÃüÃû¹ÜµÀÒÔʵÏÖÒþ±ÎͨÐźÍÃüÁîÖ´ÐУ¬ÆäÃüÁîºÍ¿ØÖÆ£¨C2£©·þÎñÆ÷±»ÍйÜÔÚMicrosoft AzureÉÏ¡£


https://securityonline.info/pipemagic-trojan-exploits-fake-chatgpt-app-to-target-saudi-arabian-organizations/


2. ErrorFather»î¶¯ÀûÓÃδ±»·¢ÏÖCerberusÒøÐÐľÂí½øÐÐÅÓ´ó¹¥»÷


10ÔÂ15ÈÕ£¬ÍøÂçÄþ¾²ÌṩÉÌCyble³ÂËßÁËÒ»ÏîеÄÅÓ´ó¶ñÒâ»î¶¯£¬¸Ã»î¶¯ÕýÔÚʹÓÃδ±»·¢ÏÖµÄCerberus AndroidÒøÐÐľÂí¸ºÔØ¡£Cyble·¢ÏÖÁË15¸öð³äChromeºÍPlay StoreÓ¦ÓõĶñÒâÑù±¾£¬ÕâЩÑù±¾½ÓÄɶà½×¶ÎͶ·ÅÆ÷²¿ÊðÒøÐÐľÂí¸ºÔØ£¬²¢ÀûÓÃÁËCerberusÒøÐÐľÂí¡£CerberusÊÇÒ»ÖÖ¿ÉÒÔÇÔÈ¡ÒøÐÐÓ¦Ó÷¨Ê½µÇ¼ƾ¾Ý¡¢ÐÅÓÿ¨ÏêϸÐÅÏ¢ºÍÆäËû¸öÈËÐÅÏ¢µÄ¶ñÒⷨʽ£¬×Ô2019Äê·ºÆðÒÔÀ´ÒѳÉΪ×îÖøÃûµÄÒøÐÐľÂíÖ®Ò»¡£¾¡¹ÜÆäÔ´´úÂëÔÚ2020Äêй¶£¬µ¼Ö·ºÆðÁËеıäÖÖÈçAlienºÍERMAC£¬µ«Cerberus¼°Æä·ÖÖ§ÈÔÔÚ²»Í£±»ÖØÐÂÀûÓᣴ˴ÎErrorFather»î¶¯ÖУ¬ÍþвÐÐΪÕ߶ԶñÒâÈí¼þ½øÐÐÁËÇá΢Ð޸ģ¬µ«Ö÷Òª»ùÓÚԭʼµÄCerberus´úÂ룬½ÓÄÉÁËÅÓ´óµÄѬȾÁ´£¬Ê¹¼ì²âºÍɾ³ýÊÂÇé±äµÃÅÓ´ó¡£×îÖÕµÄÓÐЧÔغɽÓÄɼüÅ̼Ǽ¡¢ÁýÕÖ¹¥»÷¡¢VNCºÍÓòÉú³ÉËã·¨(DGA)À´Ö´ÐжñÒâ»î¶¯¡£Cyble½¨ÒéÓû§½ö´Ó¹Ù·½Ó¦ÓÃÉ̵êÏÂÔØÈí¼þ£¬Ê¹ÓÃÖªÃû·À²¡¶¾ºÍ»¥ÁªÍøÄþ¾²Èí¼þ°ü£¬Ê¹ÓÃÇ¿ÃÜÂëºÍ¶àÒòËØÉí·ÝÑéÖ¤£¬ÆôÓÃÉúÎïʶ±ðÄþ¾²¹¦Ð§£¬²¢È·±£AndroidÉ豸ÉÏÆôÓÃÁËGoogle Play Protect¡£


https://www.infosecurity-magazine.com/news/cerberus-android-banking-trojan/


3. CISA¾¯¸æSolarWinds WHDÈí¼þÑÏÖØÄþ¾²Â©¶´Õý±»»ý¼«ÀûÓÃ


10ÔÂ16ÈÕ£¬ÃÀ¹úÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£¨CISA£©Ðû²¼£¬Òѽ«Ó°ÏìSolarWinds Web Help Desk (WHD) Èí¼þµÄÑÏÖØÄþ¾²Â©¶´CVE-2024-28987£¨CVSSÆÀ·Ö9.1£©Ìí¼Óµ½ÆäÒÑÖª±»ÀûÓ鶴£¨KEV£©Ä¿Â¼ÖУ¬²¢Ö¸³öÒÑÓÐÖ¤¾Ý±íÃ÷¸Ã©¶´ÕýÔÚ±»Ö÷¶¯ÀûÓᣴ˩¶´ÓëÓ²±àÂëƾ֤Ïà¹Ø£¬¿ÉÄÜʹԶ³Ìδ¾­Éí·ÝÑéÖ¤µÄÓû§»ñµÃ·ÃÎÊȨÏÞ²¢½øÐÐÊý¾ÝÐ޸ġ£SolarWindsÔÚ2024Äê8ÔÂÏÂÑ®Ê״ιûÈ»Á˸鶴ÏêÇ飬ËæºóÍøÂçÄþ¾²¹«Ë¾Horizon3.ai½øÒ»²½ÌṩÁ˼¼Êõϸ½Ú¡£Äþ¾²Ñо¿Ô±Ôú¿Ë¡¤ººÀûÖ¸³ö£¬¸Ã©¶´ÄÜÈù¥»÷ÕßÔ¶³Ì¶ÁÈ¡ºÍÐÞ¸Ä×ÊÖų́Ʊ֤ÖеÄÃô¸ÐÐÅÏ¢£¬ÈçÖØÖÃÃÜÂëÇëÇóºÍ·þÎñÕÊ»§Æ¾¾Ý¡£¾¡¹ÜÄ¿Ç°Éв»Çå³þ¸Ã©¶´µÄ¾ßÌåÀûÓÃÇé¿öºÍÀûÓÃÕßÉí·Ý£¬µ«ÕâÒ»·¢ÏÖ½ôËæCISAÁ½¸öÔÂÇ°½«Í¬Ò»Èí¼þÖеÄÁíÒ»¸ßΣ©¶´£¨CVE-2024-28986£¬CVSSÆÀ·Ö9.8£©ÄÉÈëKEVĿ¼֮ºó¡£¼øÓÚ´Ë£¬Áª°îÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÐèÔÚ2024Äê11ÔÂ5ÈÕÇ°Ó¦ÓÃ×îÐÂÐÞ¸´·¨Ê½£¨°æ±¾12.8.3 Hotfix 2»ò¸ü¸ß£©£¬ÒÔÈ·±£ÍøÂçÄþ¾²¡£


https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html


4. ºÚ¿ÍÀûÓÃEDRSilencerºì¶Ó¹¤¾ßÈƹýÄþ¾²·À»¤½øÐй¥»÷


10ÔÂ15ÈÕ£¬Ñо¿ÈËÔ±½üÈÕ·¢ÏÖÁËÒ»ÖÖÃûΪEDRSilencerµÄºì¶Ó²Ù×÷¹¤¾ß£¬¸Ã¹¤¾ßÄܹ»Ê¶±ðÄþ¾²¹¤¾ß²¢½«ÆäÏò¹ÜÀí¿ØÖÆ̨·¢³öµÄ¾¯±¨¾²Òô£¬´Ó¶ø×ÊÖú¹¥»÷ÕßÌӱܼì²â¡£EDRSilencerÊÇÒ»¸ö¿ªÔ´¹¤¾ß£¬ÊÜMdSec NightHawk FireBlockÆô·¢¶ø¿ª·¢£¬¿É¼ì²âÔËÐÐÖеĶ˵ã¼ì²âºÍÏìÓ¦£¨EDR£©½ø³Ì£¬²¢Ê¹ÓÃWindows¹ýÂËƽ̨£¨WFP£©¼à¿Ø¡¢×èÖ¹»òÐÞ¸ÄÍøÂçÁ÷Á¿¡£Í¨¹ý×Ô½ç˵¹æÔò£¬¹¥»÷Õß¿ÉÒÔÆÆ»µEDR¹¤¾ßÓëÆä¹ÜÀí·þÎñÆ÷Ö®¼äµÄÊý¾Ý½»»»£¬×èÖ¹¾¯±¨ºÍÒ£²â³ÂËߵķ¢ËÍ¡£ÔÚ×îа汾ÖУ¬EDRSilencer¿É¼ì²â²¢×èÖ¹16ÖÖÏÖ´úEDR¹¤¾ß¡£Ç÷ÊƿƼ¼µÈÍøÂçÄþ¾²¹«Ë¾¶ÔEDRSilencer½øÐÐÁ˲âÊÔ£¬·¢ÏÖһЩÊÜÓ°ÏìµÄEDR¹¤¾ß¿ÉÄÜÈÔÄÜ·¢ËͳÂËߣ¬µ«EDRSilencerÔÊÐí¹¥»÷ÕßÀ©Õ¹Ä¿±ê½ø³ÌÁбíÒÔº­¸ÇÖÖÖÖÄþ¾²¹¤¾ß¡£ÕâʹµÃ¶ñÒâÈí¼þ»òÆäËû¶ñÒâ»î¶¯¿ÉÄÜÈÔδ±»·¢ÏÖ£¬Ôö¼ÓÁ˹¥»÷ÀֳɵĿÉÄÜÐÔ¡£Ç÷ÊƿƼ¼½¨Ò齫EDRSilencer×÷Ϊ¶ñÒâÈí¼þ½øÐмì²â£¬²¢ÊµÊ©¶àÌõÀíµÄÄþ¾²¿ØÖÆÀ´·À·¶´ËÀ๥»÷¡£


https://www.bleepingcomputer.com/news/security/edrsilencer-red-team-tool-used-in-attacks-to-bypass-security/


5. OwlTingÒòAWS S3´æ´¢Í°ÅäÖôíÎó£¬Ì»Â¶765,000Óû§Ãô¸ÐÊý¾Ý


10ÔÂ15ÈÕ£¬Çø¿éÁ´¼¼Êõ¹«Ë¾OwlTingÒòÅäÖôíÎóµÄÑÇÂíÑ·S3´æ´¢Í°£¬ÒâÍâ̻¶ÁË765,000ÃûÓû§µÄÃô¸ÐÊý¾Ý£¬Ö÷ÒªÓ°Ïį̀ÍåµÄ¾Æµê¿ÍÈË¡£Ð¹Â¶µÄÊý¾Ý°üÂÞÈ«Ãû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·ÒÔ¼°¾ÆµêÔ¤¶©ÏêÇéµÈ¸öÈËÐÅÏ¢¡£OwlTing½¨Á¢ÓÚ2010Ä꣬ÊÇÒ»¼Ò·þÎñÓÚÈ«ÇòÂÃÓΡ¢Ê³Æ·Äþ¾²¡¢¾Æµê¡¢Ã½ÌåºÍÆäËûµç×ÓÉÌÎñÁìÓò²¢Ìṩ֪ÃûÇø¿éÁ´½â¾ö·½°¸µĄ̈Í幫˾¡£OwlTingÈ·ÈÏÁËÊý¾Ýй¶£¬µ«Éù³Æ²»Éæ¼°Ãô¸ÐÊý¾Ý£¬È»¶øCybernewsÑо¿ÈËÔ±¾¯¸æ˵£¬ÕâЩÐÅÏ¢¿ÉÄܵ¼ÖÂÉí·Ý͵ÇÔºÍÆÛÕ©¡£Ð¹Â¶µÄÊý¾Ý¶ÔÍøÂç·¸×ï·Ö×ÓÀ´Ëµ·Ç³£ÓмÛÖµ£¬¿ÉÄܱ»ÓÃÓÚÓã²æʽÍøÂçµöÓã¡¢ÓïÒôµöÓã¡¢¶ÌÐŵöÓãµÈ¹¥»÷¡£Cybernews½¨Òé½ÓÄÉһϵÁдëÊ©À´»º½âÑÇÂíÑ·S3´æ´¢Í°Ì»Â¶µÄ·çÏÕ£¬°üÂÞÏÞÖƹûÈ»·ÃÎÊ¡¢¼à¿Ø·ÃÎÊÈÕÖ¾¡¢ÆôÓ÷þÎñÆ÷¶Ë¼ÓÃܵÈ¡£


https://cybernews.com/security/taiwan-visitors-exposed-in-massive-data-leak-owlting/


6. ³¯ÏʺڿÍ×éÖ¯ScarCruftÀûÓÃIEÁãÈÕ©¶´Ìᳫ¹¥»÷


10ÔÂ16ÈÕ£¬³¯ÏʺڿÍ×éÖ¯ScarCruft£¨ÓÖ³ÆAPT37»òRedEyes£©ÓÚ5ÔÂÌᳫ´ó¹æÄ£¹¥»÷£¬ÀûÓÃInternet ExplorerµÄÁãÈÕ©¶´CVE-2024-39178£¬Í¨¹ýÌØÖƵÄToastµ¯³ö¹ã¸æѬȾĿ±êÉ豸£¬Ö²ÈëRokRAT¶ñÒâÈí¼þÒÔÇÔÈ¡Êý¾Ý¡£¸Ã©¶´ÎªÀàÐÍ»ìÏý©¶´£¬ASECºÍNCSC·¢ÏÖºóѸËÙ֪ͨ΢Èí£¬Î¢ÈíÓÚ8ÔÂÐû²¼Äþ¾²¸üÐÂÐÞ¸´¡£Ñо¿ÈËÔ±Ö¸³ö£¬´Ë´Î¹¥»÷µÄ©¶´ÓëScarCruft¹ýȥʹÓõÄCVE-2022-41128©¶´ÏàËÆ£¬½öÔö¼ÓÈýÐдúÂëÒÔÈƹý¾ÉÐÞ¸´¡£ScarCruftÈëÇÖº«¹ú¹ã¸æ¹«Ë¾·þÎñÆ÷£¬ÔÚÁ÷ÐÐÃâ·ÑÈí¼þÖÐÍÆËͺ¬¶ñÒâiframeµÄToast¹ã¸æ£¬µ±ÓÉInternet ExploreräÖȾʱ£¬´¥·¢Ô¶³Ì´úÂëÖ´ÐС£RokRAT±äÖÖÿ30·ÖÖÓ½«Ìض¨Îļþ´«ÊäÖÁYandexÔÆʵÀý£¬Í¬Ê±Ö´ÐмüÅ̼Ǽ¡¢¼àÊÓ¼ôÌù°å¸ü¸ÄºÍÆÁÄ»½Øͼ²¶×½¡£¹¥»÷ͨ¹ýËIJ½¹ý³Ì×¢Èë¡°explorer.exe¡±½ø³ÌÒÔÌӱܼì²â£¬Èô¼ì²âµ½Avast»òSymantec·À²¡¶¾Èí¼þ£¬Ôò½«¶ñÒâÈí¼þ×¢ÈëËæ»ú¿ÉÖ´ÐÐÎļþÖС£Í¨¹ýÔÚWindowsÆô¶¯Ê±Ìí¼Ó×îÖÕÓÐЧ¸ºÔز¢×¢²áµ½ÏµÍ³µ÷Öη¨Ê½ÖУ¬ÊµÏÖ³Ö¾ÃÐÔѬȾ¡£


https://www.bleepingcomputer.com/news/security/malicious-ads-exploited-internet-explorer-zero-day-to-drop-malware/