Ô½ÄÏÍþв×éÖ¯ÀûÓöñÒâÈí¼þÃé×¼Êý×ÖÓªÏúר¼Ò

Ðû²¼Ê±¼ä 2024-10-22
1. Ô½ÄÏÍþв×éÖ¯ÀûÓöñÒâÈí¼þÃé×¼Êý×ÖÓªÏúר¼Ò


10ÔÂ20ÈÕ£¬Cyble Ñо¿ÓëÇ鱨ʵÑéÊÒ (CRIL) ×î½ü½Ò¶ÁËÒ»´ÎÕë¶ÔÊý×ÖÓªÏúרҵÈËÊ¿£¬ÌرðÊÇ Facebook ºÍ Instagram ¹ã¸æר¼ÒµÄÅÓ´ó¹¥»÷»î¶¯¡£×Ô 2022 Äê 7 ÔÂÆð£¬Ò»¸öÔ½ÄÏÍþв×éÖ¯Ò»Ö±ÔÚÁ÷´« Ducktail ºÍ Quasar RAT µÈ¶ñÒâÈí¼þ£¬½ÓÄÉÍøÂçµöÓ㡢ɳºÐÌӱܺÍÌØȨÉý¼¶¼¼Êõ¡£¹¥»÷ʼÓÚ°üÂÞαװ³É PDF µÄ¶ñÒâ LNK ÎļþµÄÍøÂçµöÓãÓʼþ£¬ÕâЩÎļþ»áÖ´ÐÐ PowerShell ÃüÁÏÂÔØ»ìÏýºÍ±àÂë¹ýµÄ½Å±¾£¬Í¨³£ÍйÜÔÚ Dropbox µÈƽ̨ÉÏ¡£Í¨¹ý¶àÖØ·´É³ºÐºÍ·´µ÷ÊÔ¼ì²é£¬¶ñÒâÈí¼þÈ·±£½öÔÚÕæʵ»·¾³ÖÐÔËÐС£Ò»µ©È·ÈÏÄ¿±ê£¬½Å±¾½«½âÃÜÓÐЧÔغÉ£¬²¿Êð Quasar RAT£¬Ê¹¹¥»÷ÕßÄÜÍêÈ«¿ØÖÆÊܺ¦Õßϵͳ£¬ÇÔÈ¡Êý¾ÝºÍƾ¾Ý¡£¸Ã×é֯ʹÓà AES ¼ÓÃÜ¡¢·´µ÷ÊÔ¼¼ÊõºÍ»ùÓÚ .NET µÄ¸ß¼¶»ìÏý£¬Ìӱܴ«Í³Äþ¾²½â¾ö·½°¸¡£´ËÍ⣬¸Ã×éÖ¯²»Í£¸ïмÆı£¬ÕûºÏ¶ñÒâÈí¼þ¼´·þÎñ (MaaS) ²úÎÌáÉýÒµÎñ·¶Î§¡£


https://securityonline.info/ducktail-quasar-rat-vietnamese-threat-actors-target-meta-ads-professionals/


2. Lumma Stealer£ºÍ¨¹ýαÔìCAPTCHAÓëCDNÁ÷´«µÄÁ¬ÐøÐÅÏ¢ÇÔÈ¡Íþв


10ÔÂ20ÈÕ£¬Lumma Stealer ÊÇÒ»ÖÖͨ¹ý¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©ÌṩµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬×¨ÃÅÇÔÈ¡Ãô¸ÐÊý¾ÝÈçÃÜÂë¡¢ä¯ÀÀÆ÷ÐÅÏ¢ºÍ¼ÓÃÜ»õ±ÒÇ®°üÏêÇé¡£¹¥»÷ÕßÒÑ´Ó´«Í³µÄÍøÂçµöÓãתÏòÀûÓúϷ¨Èí¼þÁ÷´« Lumma Stealer£¬²¢Í¨¹ýαÔìµÄ CAPTCHA ÑéÖ¤ÆÛÆ­Óû§Ö´ÐжñÒâÔغÉ£¬Ê¹Æä³ÉΪһÖÖÁ¬ÐøÍþв¡£QualysÍþвÑо¿²¿ÃÅ£¨TRU£©Á¬Ðø¼à¿Ø Lumma Stealer »î¶¯£¬²¢·¢ÏÖ¹¥»÷ÕßʹÓöà½×¶ÎÎÞÎļþ¼¼Êõͨ±¨×îÖÕÔغÉ£¬Ôö¼ÓÁËÍþвµÄÆÛÆ­ÐԺͳ־ÃÐÔ¡£¹¥»÷Á´´ÓÓû§±»Öض¨Ïòµ½Ðé¼Ù CAPTCHA ÍøÕ¾¿ªÊ¼£¬Í¨¹ýµã»÷ÑéÖ¤°´Å¥´¥·¢ PowerShell ÃüÁîÖ´ÐУ¬ÏÂÔز¢Æô¶¯¶ñÒâÈí¼þÏÂÔØ·¨Ê½¡£×îÖÕ£¬¶ñÒâÈí¼þ Lumma Stealer£¨VectirFree.exe£©Í¨¹ý½ø³ÌÍÚ¿Õ¼¼Êõ×¢ÈëºÏ·¨·¨Ê½£¬Ìӱܼì²â£¬²¢ÔÚϵͳÖÐËÑË÷¼ÓÃÜ»õ±ÒºÍÃÜÂëÏà¹ØµÄÃô¸ÐÎļþºÍÊý¾Ý¡£Lumma Stealer »¹»áÓëÃüÁîºÍ¿ØÖÆ£¨C2£©·þÎñÆ÷ͨÐÅ£¬ÒÔÇÔÈ¡±»µÁÊý¾Ý£¬²¢ÊµÑéʹÓÃÌض¨¶¥¼¶ÓòÃûÁ¬½Óµ½ C2 ·þÎñÆ÷Óò¡£ÍþвÐÐΪÕßʹÓÃÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©½øÐÐÔغɴ«ËÍ£¬Ôö¼ÓÁËÍþвµÄÅÓ´óÐÔ¡£


https://blog.qualys.com/vulnerabilities-threat-research/2024/10/20/unmasking-lumma-stealer-analyzing-deceptive-tactics-with-fake-captcha


3. Roundcube©¶´ÔâºÚ¿ÍÀûÓã¬ÍøÂçµöÓã¹¥»÷ÇÔÈ¡Óû§Æ¾Ö¤


10ÔÂ21ÈÕ£¬ºÚ¿ÍÀûÓÃÏÖÒÑÐÞ²¹µÄRoundcube©¶´CVE-2024-37383£¨CVSSÆÀ·Ö6.1£©ÌᳫÁËÍøÂçµöÓã¹¥»÷£¬Ö¼ÔÚ´Ó¿ªÔ´ÍøÂçÓʼþÈí¼þÖÐÇÔÈ¡Óû§Æ¾Ö¤¡£Positive TechnologiesµÄÑо¿ÈËÔ±·¢ÏÖ£¬ÕâЩ¹¥»÷ÊÇͨ¹ýÒ»·â°üÂÞÒþ²Ø¸½¼þºÍÌض¨JavaScript´úÂëµÄµç×ÓÓʼþ½øÐеÄ£¬¸ÃÓʼþÊÔͼÀûÓÃRoundcube WebmailÖеÄ©¶´¡£¸Ã©¶´Ó°Ïì1.5.7֮ǰµÄ°æ±¾ºÍ1.6.7֮ǰµÄ1.6.x°æ±¾£¬¹¥»÷Õß¿Éͨ¹ýSVG¶¯»­ÊôÐÔ½øÐÐXSS¹¥»÷£¬¸Ã©¶´ÒÑÔÚ2024Äê5ÔÂÐû²¼µÄ¸üÐÂÖÐÐÞ¸´¡£¹¥»÷Õßͨ¹ýÓÕÆ­Óû§´ò¿ªÌØÖÆÓʼþ£¬ÔÚWebä¯ÀÀÆ÷ÉÏÏÂÎÄÖÐÖ´ÐÐÈÎÒâJavaScript´úÂë¡£ÔÚ¹¥»÷ÖУ¬JavaScript¸ºÔØ»áÉú´æÒ»¸ö¿ÕÎĵµ²¢´ÓÓʼþ·þÎñÆ÷¼ìË÷ÏûÏ¢£¬Í¬Ê±ÔÚRoundcube½çÃæÖд´½¨Ò»¸öÐé¼ÙµÄµÇ¼±íµ¥£¬²¶×½Óû§Æ¾¾Ý²¢·¢Ë͵½¶ñÒâ·þÎñÆ÷¡£¾¡¹ÜRoundcube Webmail¿ÉÄܲ»ÊÇʹÓÃ×î¹ã·ºµÄµç×ÓÓʼþ¿Í»§¶Ë£¬µ«ÓÉÓÚÕþ¸®»ú¹¹ÆÕ±éʹÓÃËü£¬Òò´ËÈÔÊǺڿ͵ÄÖØҪĿ±ê¡£Ä¿Ç°Ñо¿ÈËÔ±ÒÑÐû²¼¸Ã©¶´µÄPoCÀûÓôúÂ룬µ«ÎÞ·¨½«´Ë´Î¹¥»÷ÓëÒÑÖª¼ÓÈëÕßÁªÏµÆðÀ´¡£


https://securityaffairs.com/170055/hacking/roundcube-flaw-exploited-in-phishing-attack.html


4. TransakÊý¾Ýй¶Ê¼þÓ°Ï쳬9.2ÍòÈË


10ÔÂ22ÈÕ£¬¼ÓÃÜÖ§¸¶´¦ÖÃÉÌTransak½üÆÚÔâÓöÊý¾Ýй¶Ê¼þ£¬Ò»ÃûÔ±¹¤µÄÌõ¼Ç±¾µçÄÔ±»ºÚ¿ÍÈëÇÖ£¬µ¼ÖÂÁè¼Ý92,000ÃûÓû§µÄÐÅÏ¢±»Ð¹Â¶¡£¾¡¹Ü¸Ã¹«Ë¾Éù³ÆûÓвÆÕþÃô¸Ð»òÒªº¦ÐÅϢй¶£¬µ«Óû§µÄÐÕÃû¡¢ÉúÈÕ¡¢»¤ÕÕ¡¢¼ÝÕÕÐÅÏ¢¼°×ÔÅÄÕյȸöÈËÐÅÏ¢¾ùÊÜÓ°Ïì¡£´Ë´Îʼþ½öÓ°ÏìÁËTransakÔ¼1%µÄÓû§Èº£¬×÷ΪȫÇòÁìÏȵļÓÃÜ»õ±Ò»ù´¡ÉèÊ©ÌṩÉÌÖ®Ò»£¬TransakΪ½ü600ÍòÓû§Ìṩ·þÎñ£¬ÁýÕÖ160¸ö¹ú¼ÒºÍÃÀ¹ú46¸öÖÝ¡£TransakÇ¿µ÷£¬×÷Ϊһ¸ö·ÇÍйÜƽ̨£¬Óû§×ʽðÄþ¾²Î´ÊÜÓ°Ï죬Óû§Ê¼ÖÕ¶Ô×Ô¼ºµÄ×ʲúÓµÓÐÍêÈ«¿ØÖÆȨ¡£È»¶ø£¬StormousÀÕË÷Èí¼þÍÅ»ïÒÑÈÏ¿É´Ë´Î͵ÇÔÐÐΪ£¬²¢Éù³ÆÇÔÈ¡ÁË300GBµÄÊý¾Ý£¬°üÂÞÕþ¸®·¢±íµÄÉí·ÝÖ¤¡¢²ÆÕþ±¨±íµÈ£¬¼Æ»®³öÊÛ»òй¶Êý¾ÝÒÔË÷È¡Êê½ð¡£TransakÒÑƸÇëÍøÂçÄþ¾²¹«Ë¾ÊÓ²ì´ËÊ£¬²¢¼Æ»®Í¨¹ýµç×ÓÓʼþÁªÏµÊÜÓ°ÏìÓû§¡£Í¬Ê±£¬¹«Ë¾ÒÑ֪ͨӢ¹úÐÅϢרԱ°ì¹«ÊÒ¼°Å·Ã˺ÍÃÀ¹úÆäËû¼à¹Ü»ú¹¹£¬²¢¶Ø´Ù¿Í»§ÈçÓÐÒÉÎÊÇëÁªÏµ¹«Ë¾¡£


https://therecord.media/crypto-payment-services-data-breach


5. ÈûÆÖ·˹ÔâÇ×°ÍÀÕ˹̹ºÚ¿Í×é֯ЭͬÍøÂç¹¥»÷


10ÔÂ22ÈÕ£¬ÈûÆÖ·˹½üÆÚÔâÊÜÁ˶à¸öÇ×°ÍÀÕ˹̹ºÚ¿Í×éÖ¯ÌᳫµÄЭͬÍøÂç¹¥»÷£¬Ä¿±êÖ±Ö¸ÆäÒªº¦»ù´¡ÉèÊ©ºÍÕþ¸®ÍøÕ¾¡£¾¡¹Ü´ó¶àÊý¹¥»÷δÄÜÀֳɣ¬µ«ÈÔ¶ÔÒøÐС¢»ú³¡ºÍÕþ¸®ÍøÕ¾µÈÄ¿±êÉèÊ©Ôì³ÉÁËÔÝʱÖжÏ¡£ºÚ¿Í×éÖ¯ÔÚTelegramºÍ°µÍøÂÛ̳ÉÏÐû²¼ÉùÃ÷£¬Éù³Æ½«ÈëÇÖÈûÆÖ·˹»ú¹¹ÒÔ¡°´¦·£¡±¸Ã¹ú¶ÔÒÔÉ«ÁеÄÖ§³Ö¡£¾¡¹ÜÈûÆÖ·˹ÔÚ°ÍÒÔ³åÍ»Öб£³ÖÖÐÁ¢£¬µ«ÀúÀ´Ö§³ÖÒÔÉ«Áоü¶Ó£¬Õâ³ÉΪºÚ¿Í¹¥»÷µÄ¿ÉÄܶ¯»ú¡£ÊÜÓ°ÏìµÄ·þÎñ°üÂÞÕþ¸®ÃÅ»§ÍøÕ¾¡¢µçÁ¦µçÐŲ¿ÃÅ¡¢Ö÷ÒªÒøÐС¢Ê¯Ó͹«Ë¾ºÍ»ú³¡ÔËÓªÉ̵È£¬¶àÊý³ÂËß³ÆÔâÊÜÁËÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷£¬ºÚ¿Í»¹Éù³ÆÒÑÇÔÈ¡Ãô¸ÐÊý¾Ý¡£È»¶ø£¬»ú³¡ÔËÓª²¢Î´ÊÜÓ°Ï죬½öÔÚÏßÍ£³µÔ¤¶©·þÎñÊÜ×è¡£ÈûÆÖ·˹Êý×Ö²¿ÌåÏÖ£¬Õþ¸®ÖÐÑëÔÚÏßÃÅ»§ÍøÕ¾½ö¶ÌÔÝÎÞ·¨·ÃÎÊ£¬ÆäËû²¿Î¯»òÕþ¸®·þÎñÍøվδÊÜÓ°Ïì¡£×î¸ßÍøÂç¹ÙÔ±ÇÇÖΡ¤Âõ¿Ë¶ûµÂ˹ºôÓõ¹«Ë¾×öºÃ×¼±¸£¬Ñ¸ËÙµÖÓùδÀ´¹¥»÷²¢»Ö¸´·þÎñ£¬Í¬Ê±ÌåÏÖûÓÐÐëÒª¿Ö»Å¡£


https://therecord.media/cyprus-critical-infrastructure-cyberattack-israel-palestine


6. WordPressÍøվƵÔâºÚ¿Í¹¥»÷£¬¶ñÒâ²å¼þÍÆËÍÇÔÈ¡ÐÅÏ¢Èí¼þ


10ÔÂ21ÈÕ£¬WordPressÍøÕ¾½üÆÚƵ·±ÔâÊܺڿ͹¥»÷£¬¹¥»÷Õßͨ¹ý°²×°¶ñÒâ²å¼þÀ´ÍÆËÍÇÔÈ¡ÐÅÏ¢µÄ¶ñÒâÈí¼þ¡£×Ô2023ÄêÆð£¬ClearFake¶ñÒâ»î¶¯ÒÑÔÚÊÜѬȾÍøÕ¾ÉÏÏÔʾÐé¼ÙµÄÍøÂçä¯ÀÀÆ÷¸üкá·ù£¬¶ø2024ÄêÒýÈëµÄClickFix»î¶¯Ôòαװ³É°üÂÞÐÞ¸´·¨Ê½µÄÈí¼þ´íÎóÏûÏ¢£¬ÊµÔòÏÂÔز¢°²×°ÇÔÈ¡ÐÅÏ¢µÄ¶ñÒâÈí¼þ¡£ÕâЩ»î¶¯±äµÃÔ½À´Ô½Æձ飬ÍþвÐÐΪÕß»áÈëÇÖÍøÕ¾²¢ÏÔʾ°üÂÞGoogle Chrome¡¢Google Meet»áÒé¡¢FacebookÉõÖÁÑéÖ¤ÂëÒ³ÃæµÄÐé¼Ù´íÎóºá·ù¡£¾ÝGoDaddy³ÂËߣ¬ClearFake/ClickFixÍþвÐÐΪÕßÒÑÈëÇÖÁè¼Ý6000¸öWordPressÍøÕ¾²¢°²×°¶ñÒâ²å¼þÀ´ÏÔʾÏà¹ØÐé¼Ù¾¯±¨¡£ÕâЩ¶ñÒâ²å¼þʹÓÃÓëºÏ·¨²å¼þÏàËƵÄÃû³Æ£¬ÈçWordfence SecurityºÍLiteSpeed Cache£¬»òͨÓõÄÐé¹¹Ãû³Æ£¬Ò»µ©°²×°£¬¾Í»á½«¶ñÒâJavaScript½Å±¾×¢ÈëÍøÕ¾µÄHTMLÖУ¬½ø¶ø¼ÓÔØClearFake»òClickFix½ÅÔ­À´ÏÔʾÐé¼Ùºá·ù¡£ÍþвÐÐΪÕßËƺõÕýÔÚÀûÓñ»µÁµÄ¹ÜÀíԱƾ¾ÝµÇ¼WordPressÍøÕ¾²¢ÒÔ×Ô¶¯·½Ê½°²×°²å¼þ¡£WordPressÔËÓªÈËÔ±Ó¦Á¢¼´¼ì²éÒÑ°²×°²å¼þµÄÁбí£¬²¢É¾³ýÈκÎδ֪²å¼þ£¬Í¬Ê±½«ËùÓйÜÀíÔ±Óû§µÄÃÜÂëÖØÖÃΪΨһÃÜÂ룬ÒÔÈ·±£ÍøÕ¾Äþ¾²¡£


https://www.bleepingcomputer.com/news/security/over-6-000-wordpress-hacked-to-install-plugins-pushing-infostealers/