OpenAI ×èÖ¹³¯ÏʺڿÍÀûÓà ChatGPT ½øÐжñÒâ»î¶¯

Ðû²¼Ê±¼ä 2025-02-25

1. OpenAI ×èÖ¹³¯ÏʺڿÍÀûÓà ChatGPT ½øÐжñÒâ»î¶¯


2ÔÂ24ÈÕ£¬OpenAI ½üÆÚ½ÓÄÉÐж¯£¬×èÖ¹Á˶à¸ö³¯ÏʺڿÍ×éÖ¯ÀûÓÃChatGPTƽ̨Ñо¿Î´À´¹¥»÷Ä¿±ê¼°ÈëÇÖÍøÂçÒªÁì¡£ÔÚÆä2025Äê2ÔµÄÍþвÇ鱨³ÂËßÖУ¬OpenAIÖ¸³öÒÑ·â½ûÓ볯ÏÊÃñÖ÷Ö÷ÒåÈËÃñ¹²ºÍ¹ú£¨DPRK£©Á¥ÊôÍþв×éÖ¯ÓйØÁªµÄÕË»§£¬ÕâЩÕË»§Éæ¼°VELVET CHOLLIMAºÍSTARDUST CHOLLIMAµÈºÚ¿Í×éÖ¯¡£ÕâЩÕË»§Í¨¹ýʹÓÃChatGPT²éÕÒ¼ÓÃÜ»õ±ÒÏà¹ØÐÅÏ¢¡¢Ñ°Çó±àÂë×ÊÖú¼°Ñо¿Ô¶³Ì¹ÜÀí¹¤¾ßµÈ·½Ê½£¬ÊÔͼ½øÐжñÒâ»î¶¯¡£OpenAI»¹·¢ÏÖ£¬³¯Ïʹ¥»÷ÕßÔÚÀûÓÃChatGPTµ÷ÊÔ¹¥»÷¼¼Êõʱ£¬Ð¹Â¶ÁËδ֪¶ñÒâ¶þ½øÖÆÎļþµÄÔÝ´æURL£¬Ïà¹ØÐÅÏ¢ÒÑÌá½»¸øÄþ¾²ÉçÇø¹²Ïí¡£´ËÍ⣬³¯Ïʺڿͻ¹Í¨¹ýChatGPTѯÎÊÓ¦Ó÷¨Ê½Â©¶´¡¢¿ª·¢RDP¿Í»§¶Ë¡¢ÇëÇóÈÆ¹ýÄþ¾²¾¯¸æµÄ´úÂë¡¢±àдPowerShell½Å±¾ÒÔ¼°Éè¼ÆÍøÂçµöÓãÓʼþµÈ¡£OpenAI»¹½ûÖ¹ÁËÓëDZÔÚ³¯ÏÊIT¹¤È˼ƻ®ÓйصÄÕË»§£¬¸Ã¼Æ»®Ö¼ÔÚͨ¹ý¹ÍÓ¶³¯ÏÊÈËΪƽÈÀÕþȨ»ñÈ¡ÊÕÈë¡£


https://www.bleepingcomputer.com/news/security/openai-bans-chatgpt-accounts-used-by-north-korean-hackers/


2. ¶íÂÞ˹NKTsKI¾¯¸æ£ºÐÅ´û½ðÈÚÒµIT·þÎñÌṩÉÌLANITÔâ¹¥»÷


2ÔÂ24ÈÕ£¬¶íÂÞ˹¹ú¼Ò¼ÆËã»úʼþЭµ÷ÖÐÐÄ(NKTsKI)ÏòÐÅ´ûºÍ½ðÈÚ²¿ÃÅ×éÖ¯·¢³ö¾¯¸æ£¬Ö¸³ö¶íÂÞ˹Ö÷ÒªIT·þÎñºÍÈí¼þÌṩÉÌLANIT´æÔÚÎ¥¹æÐÐΪ£¬ÆäÆìÏÂרÃÅ´ÓÊÂÒøÐм¼ÊõºÍ·þÎñµÄLLC LANTERºÍLLC LAN ATMservice¿ÉÄÜÓÚ2025Äê2ÔÂ21ÈÕÔâÊܹ¥»÷¡£LANIT¼¯ÍÅÊǶíÂÞË¹ÖØÒªµÄϵͳ¼¯³ÉÉÌ£¬¿Í»§°üÂÞ¶íÂÞ˹¹ú·À²¿µÈÖªÃûʵÌ壬Òò´ËÓÚ2024Äê5ÔÂÊܵ½ÃÀ¹ú²ÆÕþ²¿ÖƲá£NKTsKI½¨ÒéËùÓпÉÄÜÊÜÓ°ÏìµÄ×éÖ¯ÂÖ»»ÃÜÂëºÍ·ÃÎÊÃÜÔ¿£¬²¢¸ü¸ÄÔ¶³Ì·ÃÎÊÆ¾¾Ý£¬Í¬Ê±¼ÓÇ¿¶ÔLANIT¼¯ÍŹ«Ë¾¹¤³Ìʦ¿ª·¢¡¢²¿Êð»òά»¤µÄϵͳÖеÄÍþвºÍÐÅÏ¢Äþ¾²Ê¼þµÄ¼à¿Ø¡£È»¶ø£¬NKTsKIÉÐδ͸¶¹¥»÷ÕßµÄÈëÇÖ·½Ê½¡¢ÈëÇÖʱ¼ä¡¢±»µÁÊý¾ÝÒÔ¼°¹¥»÷ÕßÉí·Ý¡£½üÆÚ£¬¶íÂÞ˹ATMÔËÓªÉ̺ÍÒøÐжà´Î³ÉΪÎÚ¿ËÀ¼ºÚ¿ÍµÄÄ¿±ê£¬¶ø´Ë´ÎÖÐÑë·þÎñÌṩÉ̵Äϵͳ±»ÉøÍ¸£¬¿ÉÄÜÒý·¢¹ã·ºµÄ¹©Ó¦Á´Ë𺦡£


https://www.bleepingcomputer.com/news/security/russia-warns-financial-sector-of-major-it-service-provider-hack/


3. °ÄÕþ¸®½ûÖ¹¿¨°Í˹»ù²úÎָÆä×é³ÉÖØ´óÄþ¾²·çÏÕ


2ÔÂ24ÈÕ£¬°Ä´óÀûÑÇÕþ¸®½üÆÚ½ûÖ¹ÆäϵͳºÍÉ豸ʹÓÿ¨°Í˹»ùʵÑéÊÒµÄËùÓвúÎïºÍÍøÂç·þÎñ£¬ÕâÒ»¾ö¶¨ÊÇ»ùÓÚÄÚÕþ²¿¶Ô¿¨°Í˹»ù×é³ÉµÄÄþ¾²·çÏյķÖÎö¡£ÄÚÕþ²¿²¿³¤Ë¹µÙ·ÒÄÝ¡¤¸£Ë¹ÌØÖ¸³ö£¬Ê¹Óÿ¨°Í˹»ùµÄ²úÎïºÍ·þÎñ¶Ô°Ä´óÀûÑÇÕþ¸®¡¢ÍøÂçºÍÊý¾Ý×é³ÉÁ˲»ÐнÓÊܵÄÄþ¾²·çÏÕ£¬ÕâЩ·çÏÕÖ÷ÒªÔ´ÓÚÍâ¹ú¸ÉÔ¤¡¢¼äµýºÍÆÆ»µµÄÍþв¡£Òò´Ë£¬ËùÓзǹ«Ë¾ÐÍÁª°îʵÌå±»ÒªÇóʶ±ð²¢É¾³ý¿¨°Í˹»ùµÄËùÓÐʵÀý£¬²¢·ÀֹδÀ´°²×°¡ £¿¨°Í˹»ù·½Ãæ¶Ô´ËÌåÏÖÒìÒ飬³ÆÕâЩָ¿ØÃ»ÓоßÌåÖ¤¾ÝÖ§³Ö£¬²¢ÈÏΪ´Ë´Î½ûÁî´¿´â³öÓÚÕþÖÎÔ­Òò£¬Ã»Óеõ½¹«Ë¾²úÎï¼¼ÊõÆÀ¹ÀµÄÖ§³Ö¡£ÕâÒ»¾Ù´ëÊÇ¼ÌÆäËûÎ÷·½¹ú¼Ò³öÓÚÀàËÆµ£ÓǽÓÄÉÀàËÆÐж¯Ö®ºóµÄÓÖÒ»°¸Àý£¬°üÂÞÃÀ¹ú¡¢µÂ¹úºÍ¼ÓÄôóµÈ¹úÒѾ­»ò½¨Òé½ûÖ¹ÔÚÕþ¸®ÏµÍ³»òÆóÒµÖÐʹÓÿ¨°Í˹»ù²úÎï¡£


https://www.bleepingcomputer.com/news/security/australia-bans-all-kaspersky-products-on-government-systems/


4. ½©Ê¬ÍøÂçÀûÓÃ13ÍòÊÜѬȾÉ豸¶ÔM365½øÐÐÃÜÂëÅçÈ÷¹¥»÷


2ÔÂ24ÈÕ£¬Ò»¸öÓÉÁè¼Ý130,000̨ÊÜѬȾÉ豸×é³ÉµÄ½©Ê¬ÍøÂçÕý¶ÔÈ«ÇòMicrosoft 365£¨M365£©ÕÊ»§½øÐÐÃÜÂëÅçÈ÷¹¥»÷£¬Ö÷ҪĿ±êÊÇÀûÓûù×Ô¼º·ÝÑéÖ¤£¨Basic Auth£©ÌӱܶàÒòËØÉí·ÝÑéÖ¤£¨MFA£©± £»¤¡£¾ÝSecurityScorecard³ÂËߣ¬¹¥»÷Õßͨ¹ýÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»ñȡƾ֤£¬ÀûÓ÷ǽ»»¥Ê½µÇ¼ʵÑéÈÆ¹ýMFA£¬ÔÚ²»´¥·¢Äþ¾²¾¯±¨µÄÇé¿öÏ»ñȡδ¾­ÊÚȨµÄ·ÃÎÊ¡ £»ù×Ô¼º·ÝÑéÖ¤ÊÇÒ»ÖÖ¹ýʱµÄÉí·ÝÑéÖ¤ÒªÁ죬΢ÈíÒѼƻ®ÔÚ2025Äê9ÔÂÆúÓ㬵«Ä¿Ç°ÔÚijЩ»·¾³ÖÐÈÔÆôÓã¬Ê¹Æä³ÉΪ¹¥»÷ÕßµÄÖ÷ҪĿ±ê¡£¸Ã½©Ê¬ÍøÂçʹÓó£Óûòй¶µÄÃÜÂëʵÑé¹¥»÷´óÁ¿ÕÊ»§£¬Ò»µ©Æ¾Ö¤µÃµ½ÑéÖ¤£¬¹¥»÷Õß¼´¿É·ÃÎʾÉʽ·þÎñ»òÔÚ¸üÅÓ´óµÄÍøÂçµöÓã¹¥»÷ÖлñµÃÍêÈ«·ÃÎÊȨÏÞ¡£SecurityScorecardÖ¸³ö£¬¸Ã½©Ê¬ÍøÂçµÄÔËÓªÕßͨ¹ýÃÀ¹ú¹©Ó¦ÉÌÍйܵÄÃüÁîºÍ¿ØÖÆ·þÎñÆ÷ÔËÐУ¬²¢Ê¹ÓÃÓëÖйúÏà¹ØµÄÔÆ·þÎñÊðÀíÁ÷Á¿¡£×éÖ¯Ó¦½ûÓÃM365ÖеĻù×Ô¼º·ÝÑéÖ¤£¬×èÖ¹Ïà¹ØIPµØÖ·£¬ÆôÓÃÌõ¼þ·ÃÎʼÆÄ±²¢ÔÚËùÓÐÕÊ»§ÉÏʹÓÃMFAÒÔÔöÇ¿Äþ¾²ÐÔ¡£


https://www.bleepingcomputer.com/news/security/botnet-targets-basic-auth-in-microsoft-365-password-spray-attacks/


5. ºÚ¿ÍÀûÓà Google Docs ºÍ Steam Á÷´« ACRStealer ÐÅÏ¢ÇÔÈ¡·¨Ê½


2ÔÂ24ÈÕ£¬AhnLabÄþ¾²Ç鱨ÖÐÐÄ(ASEC)·¢ÏÖ£¬ÐÂÐÍÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þACRStealerÕýÀûÓÃGoogle DocsºÍSteamµÈºÏ·¨Æ½Ì¨½øÐй¥»÷£¬×Ô2025ÄêÒÔÀ´Á÷´«Á¿ÏÔÖøÔö¼Ó¡£¸Ã¶ñÒâÈí¼þͨ¹ýÈí¼þÆÆ½âºÍÃÜÔ¿Éú³ÉÆ÷½øÐÐÁ÷´«£¬Î±×°³É·Ç·¨·¨Ê½£¬Äܹ»¼ì²â·À²¡¶¾½â¾ö·½°¸¡¢ÇÔÈ¡¼ÓÃÜ»õ±ÒÇ®°ü¡¢µÇ¼ƾ¾Ý¡¢ä¯ÀÀÆ÷Êý¾ÝµÈ£¬Ê¹ÍøÂç·¸×ï·Ö×ÓÄܹ»Ãé×¼½ðÈÚ×ʲúºÍ¸öÈËÕË»§¡£ACRStealerʹÓÃDead Drop Resolver(DDR)ÒªÁì½øÐÐC2·þÎñÆ÷ͨÐÅ£¬Í¨¹ýÁªÏµºÏ·¨·þÎñ¼ìË÷C2·þÎñÆ÷µÄÓò£¬ÔÊÐí¹¥»÷ÕßÇáËɸü¸ÄC2Óò¶øÎÞÐè¸üжñÒâÈí¼þ×Ô¼º¡£ËüÒÔ¶ñÒâÈí¼þ¼´·þÎñ(MaaS)ÐÎʽÔËÐУ¬Ê¹Ñ¬È¾×·×Ù±äµÃÀ§ÄÑ¡£Îª·ÀֹѬȾ£¬½¨ÒéÖÆÖ¹·ÃÎÊ·Ö·¢ÆÆ½â·¨Ê½ºÍÃÜÔ¿Éú³ÉÆ÷µÄÍøÕ¾£¬½ö´Ó¹Ù·½À´Ô´ÏÂÔØÈí¼þ£¬½÷É÷¿´´ýδ¾­ÇëÇóµÄͨÐÅÖеÄÁ´½ÓºÍ¸½¼þ£¬ÆôÓöàÒòËØÉí·ÝÑéÖ¤£¬²¢Î¬»¤ÓÐЧµÄ·´¶ñÒâÈí¼þ½â¾ö·½°¸¡£


https://hackread.com/hackers-google-docs-steam-drop-acrstealer-infostealer/


6. Fluent Bit Òªº¦0-day©¶´ÍþÐ²ÔÆ»ù´¡ÉèÊ©Äþ¾²


2ÔÂ24ÈÕ£¬Ñо¿ÈËÔ±·¢ÏÖÁËFluent BitÖеÄÁ½¸öÒªº¦0-day©¶´£¨CVE-2024-50608ºÍCVE-2024-50609£©£¬ÕâÁ½¸ö©¶´µÄCVSSÆÀ·ÖΪ8.9£¬Ó°ÏìÁ˹㷺ӦÓÃÓÚAWS¡¢Google CloudºÍMicrosoft AzureµÈÔÆ·þÎñÌṩÉ̵ÄÔÆ»ù´¡ÉèÊ©ÖеÄÈÕÖ¾ÊÕ¼¯¹¤¾ß¡£ÕâЩ©¶´ÀûÓÃÁËFluent BitµÄPrometheus Remote WriteºÍOpenTelemetry²å¼þÖеĿÕÖ¸Õë½âÒýÓÃÈõµã£¬¿ÉÄܵ¼Ö·þÎñÆ÷Í߽⡢¾Ü¾ø·þÎñ¹¥»÷»òÃô¸ÐÐÅϢй¶¡£Fluent BitÓµÓÐÁè¼Ý150ÒÚ´ÎÏÂÔØºÍÿÈÕ1000Íò´Î²¿Ê𣬶ÔÈ«ÇòÆóÒµºÍÔÆÉú̬ϵͳ×é³ÉÑÏÖØÍþв¡£¹¥»÷ÕßÀûÓÃÕâЩ©¶´¿ÉÄÜ»áÆÆ»µÈÕÖ¾¹ÜµÀ£¬Ó°ÏìʼþÏìÓ¦ºÍºÏ¹æÊÂÇéÁ÷³Ì¡£Fluent Bitά»¤ÕßÒÑÐû²¼²¹¶¡½øÐÐÐÞ¸´£¬²¢½¨ÒéÆóÒµÁ¢¼´ÎªFluent BitʵÀý´ò²¹¶¡¡¢ÏÞÖÆAPI·ÃÎÊ¡¢½ûÓÃδʹÓõĶ˵㣬²¢ÉóºËÅäÖá¢Ö§½â¼à¿ØÍøÂ磬½ÓÄÉÁ¬ÐøµÄÄ£ºý²âÊÔ¼ÆÄ±¡£¾¡¹ÜÐÐÒµÓëÔÆ·þÎñÌṩÉÌЭ×÷Ðû²¼²¹¶¡£¬µ«¼øÓÚÿÈÕÓдóÁ¿²¿ÊðÃæÁÙ·çÏÕ£¬Î´´ò²¹¶¡µÄϵͳÏìӦʱ¼ä¼«ÆäÓÐÏÞ¡£


https://cybersecuritynews.com/fluent-bit-0-day-vulnerabilities-exposes-billions-of-production-environments/