DARK ANGELS³Æ´ÓоƬÖÆÔìÉÌNEXPERIAÇÔÈ¡1TBÊý¾Ý

Ðû²¼Ê±¼ä 2024-04-18
1. DARK ANGELS³Æ´ÓоƬÖÆÔìÉÌNEXPERIAÇÔÈ¡1TBÊý¾Ý


4ÔÂ16ÈÕ£¬Dark Angels (Dunghill) ÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶ÔÈëÇÖоƬÖÆÔìÉÌ Nexperia ²¢ÇÔÈ¡¸Ã¹«Ë¾ 1 TB Êý¾ÝÈÏÕæ¡£NexperiaÊÇÒ»¼Ò°ëµ¼ÌåÖÆÔìÉÌ£¬×ܲ¿Î»ÓÚºÉÀ¼ÄÎ÷ºà¡£ËüÔڵ¹úºº±¤ºÍÓ¢¹ú´óÂü³¹Ë¹ÌØÉèÓÐÇ°¶Ë¹¤³§¡£¸Ã¹«Ë¾µÄ²úÆ·¹æÄ£°üÀ¨Ë«¼«¾§Ìå¹Ü¡¢¶þ¼«¹Ü¡¢ESD ±£»¤¡¢TVS ¶þ¼«¹Ü¡¢MOSFET ºÍÂß¼­Æ÷¼þ¡£×èÖ¹ 2024 Ä꣬¸ÃоƬÖÆÔìÉÌÓµÓÐ 14000 ÃûÔ±¹¤¡£Dark Angels ÀÕË÷Èí¼þ×éÖ¯½« Nexperia Ìí¼Óµ½Æä Tor й¶ÍøÕ¾µÄÊܺ¦ÕßÃûµ¥ÖС£¸Ã×éÖ¯Ðû²¼ÁËÒ»×éÎļþ×÷ΪÇå¾²Îó²îµÄÖ¤¾Ý£¬²¢Íþв³Æ£¬ÈôÊÇÊܺ¦Õß²»Ö§¸¶Êê½ð£¬¾Í»áй¶ËùÓб»µÁÊý¾Ý¡£¸ÃоƬÖÆÔìÉÌ֤ʵ£¬ËüÓÚ 2024 Äê 3 ÔÂÒâʶµ½Ä³Ð© Nexperia IT ·þÎñÆ÷Ô⵽δ¾­ÊÚȨµÄ»á¼û¡£ÎªÁËÓ¦¶ÔÕâÒ»ÊÂÎñ£¬¸Ã¹«Ë¾½«ÊÜÓ°ÏìµÄϵͳÓ뻥ÁªÍø¶Ï¿ªÅþÁ¬£¬ÒÔ±ÜÃâÍþвÉìÕÅ¡£


https://securityaffairs.com/161888/cyber-crime/ransomware-dark-angels-nexperia.html


2. AWS¡¢Google ºÍ Azure CLI ¹¤¾ß¿ÉÄÜ»áй¶¹¹½¨ÈÕÖ¾ÖеÄƾ֤


4ÔÂ16ÈÕ£¬ÐµÄÍøÂçÇå¾²Ñо¿·¢Ã÷£¬À´×Ô Amazon Web Services (AWS) ºÍ Google Cloud µÄÏÂÁîÐнçÃæ (CLI) ¹¤¾ß¿ÉÄÜ»á̻¶¹¹½¨ÈÕÖ¾ÖеÄÃô¸Ðƾ֤£¬´Ó¶ø¸ø×éÖ¯´øÀ´ÖØ´óΣº¦¡£¸ÃÎó²î±»ÔÆÇå¾²¹«Ë¾ OrcaÃüÃûΪLeakyCLI ¡£Azure CLI¡¢AWS CLI ºÍ Google Cloud CLI ÉϵÄһЩÏÂÁî¿ÉÒÔÒÔÇéÐαäÁ¿µÄÐÎʽ̻¶Ãô¸ÐÐÅÏ¢£¬ÕâЩÐÅÏ¢¿ÉÒÔÔÚͨ¹ý GitHub Actions µÈ¹¤¾ßÐû²¼Ê±±»¹¥»÷ÕßÍøÂç¡£ÒÔºó£¬Î¢ÈíÔÚ 2023 Äê 11 ÔÂÐû²¼µÄÇå¾²¸üÐÂÖнâ¾öÁ˸ÃÎÊÌ⣬²¢ÎªÆä·ÖÅÉÁË CVE ±êʶ·û CVE-2023-36052£¨CVSS ÆÀ·Ö£º8.6£©¡£¼ò¶øÑÔÖ®£¬Õâ¸öÏë·¨Óë CLI ÏÂÁîÔõÑùÓÃÓÚÏÔʾ£¨Ô¤£©½ç˵µÄÇéÐαäÁ¿ÒÔ¼°Êä³öµ½Ò»Á¬¼¯³ÉºÍÒ»Á¬°²ÅÅ (CI/CD) ÈÕÖ¾ÓйØ¡£Orca ÌåÏÖ£¬ËüÔÚ GitHub ÉÏ·¢Ã÷Á˶à¸öÏîÄ¿£¬ÕâЩÏîÄ¿ÎÞÒâÖÐͨ¹ý Github Actions¡¢CircleCI¡¢TravisCI ºÍ Cloud Build ÈÕ־й¶ÁË»á¼ûÁîÅƺÍÆäËûÃô¸ÐÊý¾Ý¡£


https://thehackernews.com/2024/04/aws-google-and-azure-cli-tools-could.html


3. ½©Ê¬ÍøÂç¼ÌÐøʹÓà CVE-2023-1389 ¾ÙÐдó¹æÄ£Èö²¥


4ÔÂ16ÈÕ£¬ÔÚ2023ÄêÏÂÁî×¢ÈëÎó²îCVE-2023-1389±»Åû¶£¬²¢Õë¶Ô TP-Link Archer AX21 (AX1800) µÄ Web ÖÎÀí½çÃ濪·¢ÁËÐÞ¸´³ÌÐò¡£FortiGuard Labs ¿ª·¢ÁË IPS ÊðÃûÀ´½â¾öÕâ¸öÎÊÌâ¡£×î½ü£¬ÎÒÃÇÊӲ쵽Õë¶ÔÕâ¸öÒ»ÄêÇ°µÄÎó²îµÄ¶àÆð¹¥»÷£¬Öصã¹Ø×¢ Moobot¡¢Miori¡¢»ùÓÚ Golang µÄÊðÀí¡°AGoent¡±ºÍ Gafgyt ±äÌåµÈ½©Ê¬ÍøÂç¡£ÕâÊÇͨ¹ý Web ÖÎÀí½çÃæÌṩµÄ¡°locale¡±API ÖÐδ¾­Éí·ÝÑéÖ¤µÄÏÂÁî×¢ÈëÎó²î¡£Gafgyt£¬Ò²³ÆΪ BASHLITE£¬ÊÇÒ»ÖÖѬȾ Linux ¼Ü¹¹²Ù×÷ϵͳÒÔÌᳫ DDoS£¨ÂþÑÜʽ¾Ü¾ø·þÎñ£©¹¥»÷µÄ¶ñÒâÈí¼þ¡£ÓëÍù³£Ò»Ñù£¬½©Ê¬ÍøÂçÒ»Ö±µØÃé×¼ÎïÁªÍøÎó²î£¬Ò»Ö±ÊµÑéʹÓÃËüÃÇ¡£Ö»¹ÜÈ¥Äê·¢Ã÷ÁËÎó²î CVE-2023-1389 ²¢ÌṩÁËÐÞ¸´²½·¥£¬µ«ÈÔÓÐÐí¶àÔ˶¯Ê¹ÓøÃÎó²î£¬µ¼ÖÂÎÒÃÇµÄ IPS Ò£²âµÖ´ïÏÔ×Å·åÖµ¡£Óû§Ó¦Ð¡ÐÄDDoS½©Ê¬ÍøÂ磬²¢ÊµÊ±Ó¦Óò¹¶¡ÒÔ±£»¤ÆäÍøÂçÇéÐÎÃâÊÜѬȾ£¬±ÜÃâÆä³ÉΪ¶ñÒâÍþвÕߵĻúеÈË¡£


https://www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread


4. LightSpy ºÚ¿ÍÃé×¼Ó¡¶ÈÆ»¹û×°±¸Óû§ÇÔÈ¡Ãô¸ÐÊý¾Ý


4ÔÂ17ÈÕ£¬ºÚ¿ÍÃé׼ƻ¹û×°±¸Óû§ÊÇÓÉÓÚËûÃDZ»ÒÔΪ¾ßÓнϸߵÄÉç»á½×¼¶¡£Õâ»áµ¼ÖÂÄ¿µÄ±ÈÆäËûÈ˸ü¸»ÓУ¬²¢ÇÒ¿ÉÄÜÒÔijÖÖ·½·¨ÏòºÚ¿ÍÌṩ¸ü¶à×ʽð¡£³ý´ËÖ®Í⣬ƻ¹ûµÄÉú̬ϵͳÊÇÏ໥¹ØÁªµÄ£¬ÕâÒâζ×ÅËüÓжà¸öºÚ¿Í¿ÉÒÔ½øÈëµÄµã£¬´Ó¶øµ¼ÖÂÕÊ»§ºÍ×°±¸Êܵ½Ë𺦡£ºÚÝ®ÍøÂçÇå¾²Ñо¿Ö°Ô±×î½ü·¢Ã÷ LightSpy ºÚ¿ÍÕýÔÚÆð¾¢Ãé×¼Ó¡¶ÈÆ»¹û×°±¸Óû§ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£LightSpy ÊÇÒ»¸öÄ £¿é»¯Ìع¤¹¤¾ß°ü£¬¿ÉÒÔÇÔÈ¡Êܺ¦ÕßµÄСÎÒ˽¼ÒÐÅÏ¢£¬ÀýÈçÏÖʵ GPS ×ø±ê»ò VOIP ͨ»°¡£ÕâÖÖеÄÍþвºÜΣÏÕ£¬ÓÉÓÚËüÔÊÐíºÚ¿ÍÒÔ¼«¸ßµÄ׼ȷ¶È¸ú×ÙÄ¿µÄ£¬À©´óÕâÖÖÆÕ±é¼àÊÓ¶ÔÕþÖÎÃô¸ÐµØÇø×ÅÃûÊܺ¦ÕßµÄDZÔÚÓ°Ïì¡£LightSpy ¾ßÓÐÆÕ±éµÄÌع¤ÄÜÁ¦£¬¿ÉÓÃÓÚ¼à¿Ø×°±¸Êý¾Ý¡¢QQ ÐÂÎÅÄÚÈÝ¡¢Î¢ÐÅÐÂÎÅ¡¢Telegram ̸Ìì¼Í¼ºÍ΢ÐÅÖ§¸¶ÀúÊ·¼Í¼¡£


https://gbhackers.com/lightspy-hackers-target-indian-apple-users/


5. ˼¿ÆÖÒÑÔ VPN ºÍ SSH ·þÎñÃæÁÙ´ó¹æÄ£±©Á¦¹¥»÷


4ÔÂ17ÈÕ£¬Ë¼¿Æ Talos Ñо¿Ö°Ô±ÖÒÑԳƣ¬ÖÁÉÙ×Ô 2024 Äê 3 Ô 18 ÈÕÆð£¬Õë¶Ô¶à¸öÄ¿µÄµÄ´ó¹æģƾ֤±©Á¦¹¥»÷½«Ò»Ö±±¬·¢£¬ÆäÖаüÀ¨ÐéÄâרÓÃÍøÂç (VPN) ·þÎñ¡¢Web Ó¦ÓóÌÐòÉí·ÝÑéÖ¤½Ó¿ÚºÍ SSH ·þÎñ¡£  ÒÔÏÂÊÇÒÑÖªÊÜÓ°Ïì·þÎñµÄÁÐ±í£ºCisco Secure Firewall VPN Checkpoint VPN¡¢Fortinet VPN¡¢SonicWall VPN¡¢RD Web Services¡¢Miktrotik¡¢DraytekºÍUbiquiti¡£Àֳɵı©Á¦¹¥»÷¿ÉÄܻᵼÖÂδ¾­ÊÚȨµÄÍøÂç»á¼û¡¢ÕÊ»§Ëø¶¨»ò¾Ü¾ø·þÎñ (DoS) ÇéÐΡ£ÕâЩ¹¥»÷Ô´×Ô TOR ³ö¿Ú½ÚµãÒÔ¼°ÄäÃûËíµÀºÍÊðÀí£¬ÀýÈ磺VPN Gate¡¢IPIDEA Proxy¡¢BigMama Proxy¡¢Space Proxies¡¢Nexus ProxyºÍProxy Rack¡£


https://securityaffairs.com/161943/hacking/brute-force-attacks.html


6. GOLD IONIC ÀÕË÷ÍÅ»ïµÄ¹¥»÷Ô˶¯ÏÔ×ÅÉý¼¶


4ÔÂ16ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±ÕýÔÚ×·×Ù GOLD IONIC ÀÕË÷Èí¼þ×éÖ¯µÄÔ˶¯ÏÔ×ÅÉý¼¶¡£×Ô 2023 Äê 8 Ô·ºÆðÒÔÀ´£¬Õâ¸ö¼¤½øµÄÍþв×éÖ¯ÒÑѸËÙ»ýÀÛÁËÒ»·ÝÊܺ¦ÕßÃûµ¥¡£ËûÃǵĹ¥»÷Õë¶ÔÌìϸ÷µØµÄ×éÖ¯£¬°²ÅŶ¨ÖƵġ°INC¡±ÀÕË÷Èí¼þ£¬¶ÔÖ÷ÒªÊý¾Ý¾ÙÐмÓÃܲ¢½«Æä¿ÛΪÈËÖÊ¡£GOLD IONIC µÄ¹¥»÷ÌåÏÖ³öÆä²»·ÖÊǷǺڰ׵ÄÐÔ×Ó£¬Ó°Ïìן÷¸öÐÐÒµµÄÆóÒµºÍ×éÖ¯¡£È»¶ø£¬ËûÃǵÄÖصãËƺõÊÇÃÀ¹úµÄÄ¿µÄ£¬ÆäÖй¤Òµ¡¢Ò½ÁƱ£½¡ºÍ½ÌÓý»ú¹¹ÔâÊܵĹ¥»÷ÊýÄ¿¹ý¶à¡£ÓÉÓÚÉúÃüºÍ»¼ÕßÊý¾ÝÐü¶øδ¾ö£¬Ò½ÁƱ£½¡ÐÐÒµÒѾ­ÃæÁÙ×ÅÖÚ¶àÌôÕ½£¬»¹ÃæÁÙ×ÅÀÕË÷Èí¼þµÄÑÏÖØΣº¦¡£½ÌÓý»ú¹¹¡¢Ãô¸ÐѧÉú¼Í¼ºÍÑо¿µÄ±£¹ÜÕßÒ²·¢Ã÷×Ô¼ºÔ½À´Ô½³ÉΪ¹¥»÷Ä¿µÄ¡£


https://securityonline.info/inc-ransomware-surge-new-gold-ionic-group-hits-global-targets/