Telegram ÐÞ¸´ÓÃÓÚÆô¶¯ Python ¾ç±¾µÄ Windows Ó¦ÓóÌÐòÁãÈÕÎó²î
Ðû²¼Ê±¼ä 2024-04-154ÔÂ12ÈÕ£¬Telegram ÐÞ¸´ÁËÆä Windows ×ÀÃæÓ¦ÓóÌÐòÖеÄÒ»¸öÁãÈÕÎó²î£¬¸ÃÎó²î¿ÉÓÃÓÚÈƹýÇå¾²ÖÒÑÔ²¢×Ô¶¯Æô¶¯ Python ¾ç±¾¡£ÒÑÍù¼¸Ì죬 ÓÐ¹Ø Windows °æ Telegram ÖÐÉæÏÓÔ¶³Ì´úÂëÖ´ÐÐÎó²îµÄÒ¥ÑÔÔÚ X ºÍºÚ¿ÍÂÛ̳ÉÏÈö²¥¡£ËäÈ»ÆäÖÐһЩÌû×ÓÉù³ÆÕâÊÇÒ»¸öÁãµã»÷ȱÏÝ£¬µ«ÑÝʾËùνµÄÇå¾²ÖÒÑÔÈƹýºÍ RCE Îó²îµÄÊÓƵÇåÎúµØÏÔʾÓÐÈ˵ã»÷¹²ÏíýÌåÀ´Æô¶¯ Windows ÅÌËãÆ÷¡£Telegram Desktop ¿Í»§¶Ë»á¸ú×Ù ÓëΣº¦Îļþ£¨ÀýÈç¿ÉÖ´ÐÐÎļþ£©Ïà¹ØµÄ ÎļþÀ©Õ¹ÃûÁÐ±í¡£µ±ÓÐÈËÔÚ Telegram Öз¢ËÍÆäÖÐÒ»ÖÖÎļþÀàÐÍ£¬²¢ÇÒÓû§µ¥»÷¸ÃÎļþʱ£¬Telegram Ê×ÏÈ»áÏÔʾÒÔÏÂÇå¾²ÖÒÑÔ£¬¶ø²»ÊÇÔÚ Windows ÖеĹØÁª³ÌÐòÖÐ×Ô¶¯Æô¶¯¡£ÈôÊǹ¥»÷ÕßÄܹ»ÓÕÆÄ¿µÄ·¿ªÎļþ£¬Õ⽫ÓÐÓõØÔÊÐí¹¥»÷ÕßÈƹýÇå¾²ÖÒÑÔ²¢ÔÚÄ¿µÄµÄ Windows ×°±¸ÉÏÔ¶³ÌÖ´ÐдúÂë¡£
https://www.bleepingcomputer.com/news/security/telegram-fixes-windows-app-zero-day-used-to-launch-python-scripts/
2. ·¨¹ú¶à¸öÊÐÕþ¸®µÄ¹²Ïí·þÎñÆ÷Ôâµ½´ó¹æÄ£ÍøÂç¹¥»÷
4ÔÂ12ÈÕ£¬Ê¥ÄÉÔó¶ûÊгƣ¬¹¥»÷ÈÔÔÚ¼ÌÐø¡£¡°ÕâÁ½¸öÉçÇøµÄ·þÎñÎÞ·¨Õý³£ÔËÐУ¬¡±¸ÃÊÐÔÚÒ»·Ý¾¯±¨ÖиæËßסÃñ£¬Ö¸µÄÊÇÊ¥ÄÉÔó¶ûÊкÍÊ¥ÄÉÔó¶û³ÇÇø¡£ÆäËûÊÜÓ°ÏìµÄ¶¼»á°üÀ¨ÃÉͼÍß²¼ÁÐËþÄá¡¢¶«ÈÕ¡¢ÀɳÅåÀÕµÂÂêÀ³ºÍ²¨¶ûÄáʲ£¬ÒÔ¼°Ë÷Äɵ·òºÍÊ¥ÄÉÔó¶ûµØÇø¿ÉÒ»Á¬Éú³¤»ú¹¹¡£Í¨Öª³Æ£¬¡°Ïֽ׶Σ¬ÍøÂç¹¥»÷µÄÆðÔ´ºÍÒ»Á¬Ê±¼äÉв»ÇåÎú¡±¡£Í¨Öª³Æ£¬Ëæ×Å·þÎñ»Ö¸´£¬Ê¥ÄÉÔó¶ûÊкÍÊ¥ÄÉÔó¶ûÊн«ÔÚÉ罻ýÌåºÍÕþ¸®ÍøÕ¾ÉÏÐû²¼¸üÐÂÐÅÏ¢¡£ËäȻûÓÐ͸¶ÊÂÎñµÄÐÔ×Ó£¬µ«´Ë´ÎÖÐÖ¹ÊÇÔÚ 3 Ô 11 ÈÕÖÁ 12 ÈÕ±¬·¢µÄ´ó¹æÄ£ÂþÑÜʽ¾Ü¾ø·þÎñ (DDoS) ¹¥»÷Ö®ºó±¬·¢µÄ£¬¸Ã¹¥»÷ʹ¶à¸ö·¨¹úÕþ¸®ÍøÕ¾³äÂú×ÅÐéαÁ÷Á¿£¬µ«²¢Î´ÖÐÖ¹Õþ¸®·þÎñ¡£DDoS ÊÂÎñ±¬·¢¼¸Ììºó£¬ÈÏÕæ¹ÒºÅºÍÔ®ÖúʧҵְԱµÄÕþ¸®²¿·Ö France Travail Åû¶ÁËÒ»ÆðÖØ´óµÄÊý¾Ýй¶ÊÂÎñ£¬¸ÃÊÂÎñй¶ÁËÁè¼Ý 4300 Íò¹«Ãñ 20 ÄêÇ°µÄ˽ÈËÐÅÏ¢¡£¸Ã²¿·ÖÌåÏÖ£¬ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢·¨¹úÀ͹¤±êʶ·û¡¢µç×ÓÓʼþµØµã¡¢ÓÊÕþµØµãºÍµç»°ºÅÂ붼±»Ð¹Â¶¡£
https://www.theregister.com/2024/04/12/french_municipalities_cyberattack/
3. CISA ±Þ²ßÔÚ Sisense й¶ºóÁ¬Ã¦ÖØÖÃƾ֤
4ÔÂ12ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö (CISA) Åû¶ÁËÓ°ÏìÓªÒµÆÊÎöÌṩÉÌ Sisense µÄÎó²î£¬²¢±Þ²ßÆä¿Í»§±£´æÆäƾ֤¡£2024 Äê 4 Ô 11 ÈÕ£¬CISA Ðû²¼ÁËÓÐ¹Ø Sisense ¿Í»§Êý¾Ý¿ÉÄÜÔ⵽鶵Äͨ¸æ¡£¸Ã»ú¹¹¡°ÏÖÔÚÕýÔÚÓë˽ӪÐÐÒµÏàÖúͬ°éÏàÖú£¬ÒÔÓ¦¶Ô×ÔÁ¦Çå¾²Ñо¿Ö°Ô±×î½ü·¢Ã÷µÄÓ°Ïì Sisense£¨Ò»¼ÒÌṩÊý¾ÝÆÊÎö·þÎñµÄ¹«Ë¾£©µÄÎó²î¡£¡±×èֹ׫д±¾ÎÄʱ£¬Sisense ÉÐδ¹ûÕæÈ·ÈÏ»ò½â¾öÕâһΥ¹æÎÊÌ⡣Ȼ¶ø£¬ÍøÂçÇå¾²¼ÇÕß Brian Krebs ÔÚËûµÄÍøÕ¾ÉÏÌåÏÖ£¬¸Ã¹«Ë¾ÏòÆä¿Í»§·¢ËÍÁËÒ»·âµç×ÓÓʼþ£¬È·ÈÏÆäÒÑÒâʶµ½¡°Sisense ¹«Ë¾µÄijЩÐÅÏ¢¿ÉÄÜÒÑÔÚÎÒÃDZ»¼û¸æµÄÊÜÏÞ»á¼û·þÎñÆ÷ÉÏÌṩ¡£¡±¸Ãµç×ÓÓʼþµÄ×÷Õß¡¢Sisense µÄ CISO Sangram Dash Ôö²¹µÀ£º¡°ÎÒÃÇÕýÔÚÈÏÕæ¿´´ý´ËÊ£¬²¢Á¬Ã¦Õö¿ªÊӲ졣¡±´ïʲ¼ÌÐø˵µÀ£º¡°ÎÒÃÇÔ¼ÇëÁËÐÐÒµÁìÏȵÄר¼ÒÀ´ÐÖúÎÒÃǾÙÐÐÊӲ졣¸ÃÊÂÎñ²¢Î´µ¼ÖÂÎÒÃǵÄÓªÒµÔËÓªÖÐÖ¹¡£Sisense ¿Í»§À´×Ô¸÷¸ö±ÊÖ±ÐÐÒµ£¬°üÀ¨ÒøÐкͽðÈÚ¡¢µçÐÅ¡¢½ÌÓýºÍÒ½ÁƱ£½¡¡£
https://www.infosecurity-magazine.com/news/cisa-urges-reset-sisense-breach/
4. Æ×ÓʹÓà GITHUB µÄËÑË÷Ч¹ûÀ´Èö²¥¶ñÒâÈí¼þ
https://securityaffairs.com/161792/cyber-crime/githubs-search-results-distribute-malware.html
5. ¼ÓÄôóÁãÊÛÁ¬Ëø¾ÞÍ· GIANT TIGER й¶280ÍòÌõÊý¾Ý
4ÔÂ14ÈÕ£¬Ò»ÃûÍøÃûΪ ShopifyGUY µÄÍþвÐÐΪÕßÉù³Æ¶Ô¹¥»÷¼ÓÄôóÁãÊÛÁ¬Ëøµê Giant Tiger ÈÏÕ棬²¢ÔÚºÚ¿ÍÂÛ̳ÉÏй¶ÁË 280 ÍòÌõ¼Í¼¡£Giant Tiger ÊÇÒ»¼Ò¼ÓÄôóÕÛ¿ÛÁ¬Ëøµê£¬ÔÚ¼ÓÄôó¸÷µØı»® 260 ¶à¼ÒÊÐËÁ¡£Ðû²¼¸ÃÌû×ÓµÄÍþвÐÐΪÕßÉù³ÆÒÑÉÏ´« 2024 Äê 3 Ô±»µÁµÄ¹«Ë¾µÄÍêÕûÊý¾Ý¿â¡£¸ÃÌû×Ó±³ºóµÄÍþвÐÐΪÕßÉù³ÆÒÑÉÏ´« 2024 Äê 3 Ô±»µÁµÄ Giant Tiger ¿Í»§¼Í¼µÄ¡°ÍêÕû¡±Êý¾Ý¿â¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨µç×ÓÓʼþµØµã¡¢ÐÕÃû¡¢µç»°ºÅÂë¡¢ÏÖʵµØµãºÍÍøÕ¾Ô˶¯¡£²ÆÎñÊý¾Ý²¢Î´Êܵ½ËùνÊÂÎñµÄÓ°Ïì¡£¼ÓÄôóÁãÊÛÁ¬ËøµêµÄ¿Í»§¿ÉÒÔͨ¹ýÅÌÎÊÊý¾Ýй¶¼à¿Ø·þÎñ HaveIBeenPwned À´¼ì²éй¶µÄµµ°¸ÖÐÊÇ·ñ±£´æÆäÊý¾Ý¡£
https://securityaffairs.com/161811/cyber-crime/giant-tiger-data-breach.html
6. RokuÔ⵽ײ¿â¹¥»÷Áè¼Ý57Íò¸öÕ˺ÅÐÅϢй¶
4ÔÂ12ÈÕ£¬Roku Ðû²¼£¬576,000 ¸öÕÊ»§ÔÚеÄײ¿â¹¥»÷ÖÐÔâµ½ºÚ¿Í¹¥»÷£¬ÍþвÐÐΪÕßʹÓôӵÚÈý·½Æ½Ì¨ÇÔÈ¡µÄƾ֤¡£½ñÄêÔçЩʱ¼ä£¬Roku ¼ì²âµ½Òì³£ÕÊ»§Ô˶¯£¬²¢·¢Ã÷δ¾ÊÚȨµÄ¹¥»÷ÕßʹÓÃͨ¹ý¡°Æ¾Ö¤Ìî³ä¡±´Ó²î±ðȪԴ»ñÈ¡µÄµÇ¼ƾ֤»á¼ûÁËԼĪ 15,000 ¸öÓû§ÕÊ»§¡£¸Ã¹«Ë¾Íê³É¶ÔÊ׸öÇå¾²Îó²îµÄÊÓ²ìºó£¬ÓÚÈýÔ³õ֪ͨÁËÊÜÓ°ÏìµÄ¿Í»§¡£¸Ã¹«Ë¾¼ÌÐø¼à¿ØÕË»§Ô˶¯£¬²¢·¢Ã÷Á˵ڶþÆðÓ°ÏìԼĪ 576,000 ¸öÕË»§µÄÊÂÎñ¡£Ã»Óм£ÏóÅú×¢ Roku ÊÇÕâЩ¹¥»÷ÖÐʹÓõÄÕÊ»§Æ¾Ö¤µÄȪԴ£¬Ò²Ã»Óм£ÏóÅú×¢ Roku µÄϵͳÔÚÕâÁ½ÆðÊÂÎñÖÐÊܵ½ÁËË𺦡£Ïà·´£¬ÕâЩ¹¥»÷ÖÐʹÓõĵǼƾ֤ºÜ¿ÉÄÜÊÇ´ÓÆäËûȪԴ»ñÈ¡µÄ£¬ÀýÈçÁíÒ»¸öÔÚÏßÕÊ»§£¬ÊÜÓ°ÏìµÄÓû§¿ÉÄÜʹÓÃÁËÏàͬµÄƾ֤¡£¡±ÔĶÁ¸Ã¹«Ë¾Ðû²¼µÄÐÂΟ塣¡°ÔÚ²»µ½ 400 Æð°¸ÀýÖУ¬¶ñÒâÐÐΪÕߵǼ²¢Ê¹ÓÃÕâЩÕÊ»§Öд洢µÄ¸¶¿î·½·¨Î´¾ÊÚȨ¹ºÖÃÁ÷ýÌå·þÎñ¶©ÔÄºÍ Roku Ó²¼þ²úÆ·£¬µ«ËûÃÇÎÞ·¨»á¼ûÈκÎÃô¸ÐÐÅÏ¢£¬°üÀ¨ÍêÕûµÄÐÅÓÿ¨ºÅ»òÆäËûÐÅÏ¢¡£ÍêÕûµÄ¸¶¿îÐÅÏ¢¡£
https://securityaffairs.com/161765/data-breach/roku-second-data-breach.html