DICK¡®S ÔÚÔâÊÜÍøÂç¹¥»÷ºó¹Ø±Õµç×ÓÓʼþ²¢Ëø¶¨Ô±¹¤ÕË»§
Ðû²¼Ê±¼ä 2024-08-308ÔÂ28ÈÕ£¬ÃÀ¹úÌåÓýÓÃÆ·ÁãÊÛ¾ÞÍ·µÏ¿ËÌåÓýÓÃÆ·¹«Ë¾£¨DICK'S£©¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬µ¼ÖÂÆäÉñÃØÐÅϢй¶¡£Õâ¼ÒÓµÓÐ857¼ÒÃŵꡢÄêÊÕÈë´ï129.8ÒÚÃÀÔªµÄ²Æ²ú500Ç¿ÆóÒµ£¬ÔÚ8ÔÂ21ÈÕ·¢Ã÷ÆäÐÅϢϵͳ±»µÚÈý·½Î´ÊÚȨ»á¼û¡£DICK'SѸËÙÆô¶¯ÍøÂçÇå¾²ÏìÓ¦ÍýÏ룬²¢ÓëÍⲿר¼ÒÏàÖúÊÓ²ì´Ë´ÎÊÂÎñ£¬Í¬Ê±¹Ø±ÕÁ˵ç×ÓÓʼþϵͳ²¢Ëø¶¨ËùÓÐÔ±¹¤ÕË»§£¬ÒÔ¸ôÀëÍþв¡£Ô±¹¤Ðèͨ¹ýÉí·ÝÑéÖ¤²Å»ªÖØлá¼ûÄÚ²¿ÏµÍ³£¬ÊÐËÁµç»°Ïß·ҲÊܵ½Ó°Ïì¡£Ö»¹Ü¹«Ë¾ÌåÏÖÏÖÔÚÔËӪδÊÜ×ÌÈÅ£¬²¢ÒÑÏòÖ´·¨²¿·Ö±¨¸æ´ËÎ¥¹æÐÐΪ£¬µ«Ïêϸй¶ϸ½ÚÉÐδ¹ûÕæ¡£DICK'SÔÚÌá½»¸øÃÀ¹ú֤ȯÉúÒâίԱ»áµÄÎļþÖÐÇ¿µ÷£¬»ùÓÚÄ¿½ñÕÆÎÕµÄÐÅÏ¢£¬´Ë´ÎÊÂÎñ±»ÒÔΪ²»×é³ÉÖØ´óÓ°Ï죬µ«ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£
https://www.bleepingcomputer.com/news/security/dicks-shuts-down-email-locks-employee-accounts-after-cyberattack/
2. LummaC2бäÖÖʹÓÃPowerShellÓë¸ß¼¶»ìÏýÊÖÒÕÇÔÈ¡Êý¾Ý
8ÔÂ28ÈÕ£¬ÈðÊ¿ÍøÂçÇå¾²¹«Ë¾Ontinue½üÆÚ½ÒÆÆÁËLummaC2¶ñÒâÈí¼þµÄÒ»¸öбäÖÖ£¬ÆäÔ˶¯ÏÔÖøÔöÇ¿£¬¶ÔÍøÂçÇå¾²×é³ÉÑÏÖØÍþв¡£Õâ¿î±äÖÖʹÓÃPowerShell¾ÙÐÐÆðԴѬȾ£¬ÍŽá»ìÏýÊÖÒÕºÍÀú³Ì×¢ÈëÊֶΣ¬ÇÄÎÞÉùÏ¢µØÇÔÈ¡Ãô¸ÐÊý¾Ý¡£LummaC2×Ô2022ÄêÆð±ãÒÔ¶ñÒâÈí¼þ¼´·þÎñ(MaaS)ÐÎʽÔ˶¯£¬½üÆÚ¸üÊÇͨ¹ýÖØ´óÕ½ÂÔÉý¼¶£¬ÈçʹÓÃÆƽâÈí¼þ¼°YouTubeÇþµÀÈö²¥£¬Õ¹ÏÖÁËÆä¸ß¶ÈµÄ˳ӦÐÔºÍÒþ²ØÐÔ¡£×îз¢Ã÷µÄ±äÖÖÖУ¬PowerShellÏÂÁî¾ÓÉÈ«ÐÄ»ìÏýµ«¿É½âÂ룬չÏÖÁËÆäÏÂÔز¢Ö´Ðеڶþ½×¶ÎAES¼ÓÃܸºÔصÄÏêϸ°ì·¨¡£¸ºÔØËæºó×¢ÈëWindowsÕýµ±Àú³Ìdllhost.exe£¬ÒÔʵÏÖÔ¶³Ì¿ØÖÆ¡¢Êý¾ÝÇÔÈ¡¼°³¤ÆÚ»¯Ñ¬È¾¡£¸Ã±äÖÖ»¹½ÓÄÉIPÒþ²Ø¡¢×Ô½ç˵Óû§ÊðÀíµÈÊֶΣ¬½øÒ»²½ÌÓ±ÜÇå¾²¼ì²â¡£ÎªÓ¦¶Ô´ËÍþв£¬Ontinue½¨Òé×éÖ¯ÔöÇ¿¶Ëµã¼ì²âºÍÏìÓ¦(EDR)°²ÅÅ£¬ÊµÑé¹¥»÷ÃæïÔÌ(ASR)Õ½ÂÔ£¬²¢¹Ø×¢Ìض¨µÄÍ×ÐÖ¸±ê(IOC)ÒÔ×Ô¶¯·ÀÓù¡£
https://hackread.com/lummac2-malware-variant-powershell-obfuscation-steal-data/
3. Mirai½©Ê¬ÍøÂçʹÓÃAVTECH IPÉãÏñ»úÁãÈÕÎó²îCVE-2024-7029
8ÔÂ28ÈÕ£¬AkamaiµÄÇå¾²Ç鱨ÏìÓ¦ÍŶӣ¨SIRT£©¿ËÈÕÖÒÑԳƣ¬Mirai½©Ê¬ÍøÂçÔ˶¯Õýͨ¹ýʹÓÃAVTECH IPÉãÏñ»úÖеÄÐÂÅû¶ÁãÈÕÎó²îCVE-2024-7029ѸËÙÉìÕÅ¡£´ËRCEÎó²î±£´æÓÚÉãÏñ»úµÄ¡°ÁÁ¶È¡±¹¦Ð§ÖУ¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¬¹¥»÷ÕßÒѽè´Ë°²ÅÅÁËMiraiµÄ±äÖÖ¡°Corona¡±£¬¶ÔÒªº¦»ù´¡ÉèÊ©×é³ÉÖØ´óÍþв¡£Ö»¹ÜÊÜÓ°ÏìµÄÉãÏñÍ·ÐͺÅÒÑÍ£²ú£¬µ«ÆäÔÚ¶à¸öÁìÓòµÄÒ»Á¬Ê¹ÓÃ͹ÏÔÁËÖÎÀíÒÅÁô×°±¸ºÍδÐÞ¸´Îó²îµÄ½ôÆÈÐÔ¡£CISAÒàÐû²¼±¨¸æÇ¿µ÷´ËÎó²îµÄÑÏÖØÐÔ¼°ÆäÆÕ±éÓ°ÏìDZÁ¦¡£ÖµµÃ×¢ÖصÄÊÇ£¬Mirai½©Ê¬ÍøÂç²»µ«Ê¹ÓÃCVE-2024-7029£¬»¹Í¬Ê±Ãé×¼ÁËAVTECH¼°ÆäËûϵͳÖеĶà¸öÎó²î£¬Õ¹ÏÖÁËÆä¶àÑù»¯µÄ¹¥»÷Õ½ÂÔ¡£Corona±äÌåµÄÈö²¥Ê¼ÓÚ2023Äêµ×£¬²¢ÔÚ2024Äê3ÔµִïÁË»îÔ¾á¯Áë¡£Ö»¹ÜCVE-2024-7029µÄPoCÔçÔÚ2019Äê¾ÍÒѹûÕ棬ÕýʽCVE±àºÅÖ±µ½2024Äê8Ô²ÅÐû²¼¡£¼øÓÚÄ¿½ñÎÞ¹Ù·½²¹¶¡¿ÉÓã¬Akamai½¨ÒéÁ¬Ã¦Í£ÓÃÊÜÓ°Ïì×°±¸×÷ΪÖ÷Òª»º½â²½·¥¡£
https://securityonline.info/mirai-botnet-exploits-zero-day-vulnerability-cve-2024-7029-in-avtech-ip-cameras/
4. PerlÉçÇøÖÒÑÔ£ºcpanminus¹¤¾ß±£´æÑÏÖØÎó²îCVE-2024-45321
8ÔÂ28ÈÕ£¬Perl ÉçÇø½üÆÚÐû²¼Á˹ØÓÚCVE-2024-45321µÄ½ôÆÈÇ徲ͨ¸æ£¬Ö¸³öÆÕ±éʹÓõÄApp::cpanminus£¨cpanm£©¹¤¾ß±£´æÑÏÖØÎó²î£¬ÆäCVSSÆÀ·Ö¸ß´ï9.8¡£´ËÎó²îÔ´ÓÚcpanminusĬÈÏʹÓò»Çå¾²µÄHTTPÅþÁ¬´ÓCPANÏÂÔØPerlÄ£¿é£¬µ¼Ö¡°Î´¾ÍêÕûÐÔ¼ì²éµÄ´úÂëÏÂÔØ¡±ÎÊÌ⣨CWE-494£©£¬Ê¹¹¥»÷ÕßÓÐʱ»úÔÚ´«ÊäÖиĶ¯´úÂ룬½ø¶øÔÚÓû§ÏµÍ³ÉÏÖ´ÐжñÒâ´úÂë¡£¼øÓÚcpanminus×÷Ϊ¹Ù·½CPAN¿Í»§¶ËµÄÇáÁ¿¼¶Ì滻Ʒ£¬ÆäÎó²îÓ°Ïì¹æÄ£¿ÉÄܼ«ÎªÆձ飬ÓÈÆäÍþвµ½ÒÀÀµ¸Ã¹¤¾ßÖÎÀíPerlÄ£¿éµÄϵͳÇå¾²¡£Ö»¹Ü¹Ù·½²¹¶¡ÉÐδÐû²¼£¬µ«Óû§Ó¦Á¬Ã¦½ÓÄÉÐж¯½µµÍΣº¦¡£ÍƼö²½·¥°üÀ¨£ºÒ»ÊÇͨ¹ýÏÂÁîÐвÎÊý»òÇéÐαäÁ¿ÉèÖÃHTTPS¾µÏñ£¬µ«Ðè×¢Öش˾ٿÉÄÜÏÞÖƶԾɰ汾ºÍ¿ª·¢°æ±¾µÄ»á¼û£»¶þÊÇÖ±½ÓÐÞ¸Äcpanm¿ÉÖ´ÐÐÎļþ£¬½«ËùÓÐHTTP¶ËµãÌ滻ΪHTTPS£¬ÒÔ±£´æ¶ÔBackPanµÈ×ÊÔ´µÄ»á¼û£»ÈýÊÇת¶øʹÓÃĬÈÏÖ§³ÖHTTPSÅþÁ¬µÄ±¸Óÿͻ§¶Ë£¬ÈçCPAN.pm 2.35+»òApp::cpm£¬ÒÔÈ·±£Ä£¿éÏÂÔصÄÇå¾²ÐÔ¡£
https://securityonline.info/critical-cve-2024-45321-flaw-in-popular-perl-module-installer-cpanminus-no-patch-available/
5. ÍþвÕßʹÓÃαÔìµÄPalo Alto GlobalProtect¹¤¾ßÃé×¼Öж«
8ÔÂ29ÈÕ£¬Ç÷ÊƿƼ¼Ñо¿ÍŶӽÒÆÆÁËÒ»ÏîÕë¶ÔÖж«×éÖ¯µÄ¸ß¶ÈÖØ´ó¶ñÒâÈí¼þÔ˶¯£¬¸ÃÔ˶¯Í¨¹ýαװ³ÉÕýµ±µÄPalo Alto GlobalProtect VPN¿Í»§¶Ë¾ÙÐÐÈö²¥¡£¹¥»÷ʼÓÚÒ»¸öÃûΪ¡°setup.exe¡±µÄ¶ñÒâÎļþ£¬¸ÃÎļþÄ£ÄâVPN×°ÖóÌÐò£¬ÔÚÊܺ¦ÕßϵͳÖа²ÅÅÐéα×é¼þ£¬²¢½èÖúÐÂ×¢²áµÄ¡°sharjahconnect¡±ÓòÃûαװ³ÉÕýµ±VPNÃÅ»§£¬ÒÔÔöÇ¿ÓÕÆÐÔ¡£´Ë¶ñÒâÈí¼þʹÓÃInteractshÏîÄ¿¾ÙÐÐÐűê²Ù×÷£¬Í¨¹ýDNSÇëÇóÓëC&C·þÎñÆ÷ͨѶ£¬ÒÔ¼à¿ØѬȾÀú³Ì²¢Ö´ÐжàÖÖ¶ñÒâʹÃü£¬°üÀ¨Ö´ÐÐPowerShell¾ç±¾¡¢ÖÎÀíÀú³Ì¡¢Êý¾ÝÇÔÈ¡Óë¼ÓÃÜͨѶ¡£ÆäÎÞаµÄÏÂÁî½á¹¹Ê¹ÆäÄܹ»ÎÞаӦ¶Ô²î±ð¹¥»÷ÐèÇó£¬Í¬Ê±½ÓÄÉÖØ´ó¹æ±ÜÊÖÒÕÒÔÌӱܼì²â¡£Öж«¼°È«Çò×éÖ¯ÃæÁÙÑÏËàÌôÕ½£¬ÐèÇ¿»¯¶Ëµã±£»¤¡¢¸üÐÂÇå¾²ÐÒ飬²¢ÔöÇ¿Ô±¹¤Çå¾²½ÌÓýÓëÒâʶÌáÉý£¬ÒÔÓÐÓõÖÓù´ËÀà¸ß¼¶Íþв¡£
https://www.trendmicro.com/en_us/research/24/h/threat-actors-target-middle-east-using-fake-tool.html
6. ÃÀ³¬130¼ÒÆóÒµÔâ´¹ÂÚ¹¥»÷£¬GRIT½ÒÆÆÖØ´óVPN´¹ÂÚȦÌ×
8ÔÂ29ÈÕ£¬GuidePoint ResearchºÍIntelligence Team£¨GRIT£©½üÆÚ½ÒÆÆÁËÒ»ÏîÕë¶ÔÓ¢ÓïʹÓÃÕߣ¬ÌØÊâÊÇÃÀ¹úÁè¼Ý130¼ÒÆóÒµµÄÖØ´ó´¹ÂÚ¹¥»÷Ô˶¯¡£×Ô2024Äê6ÔÂ26ÈÕÆ𣬹¥»÷Õß×¢²áÁËÓëÄ¿µÄ¹«Ë¾VPN·þÎñÏàËƵĸ߷ÂÓòÃû£¬²¢Í¨¹ýµç»°Ã°³äITÖ§³ÖÖ°Ô±£¬ÒÔ½â¾öVPNµÇ¼ÎÊÌâΪÓÉ£¬ÓÕµ¼Ô±¹¤µã»÷º¬ÓжñÒâÁ´½ÓµÄ¶ÌÐÅ¡£ÕâЩÁ´½Óµ¼ÏòÈ«ÐÄÉè¼ÆµÄ¼ÙVPNµÇ¼ҳÃ棬²»µ«Íâ¹ÛÉÏÓëÕæʵҳÃæÎÞÒ죬»¹°üÀ¨ÌØÖƵÄVPN×éÑ¡ÏÈç¡°TestVPN¡±ºÍ¡°RemoteVPN¡±£¬ÒÔÔöÇ¿ÓÕÆÐÔ¡£¼´±ãÃæÁÙ¶àÒòËØÈÏÖ¤£¨MFA£©£¬¹¥»÷ÕßÒ²ÄÜͨ¹ýÓÕµ¼Óû§Åú×¼ÍÆËÍ֪ͨÀ´ÈƹýÇå¾²·ÀµØ£¬×îÖÕÆÈ¡Óû§Æ¾Ö¤¡£µ½ÊÖºó£¬Óû§»á±»Öض¨ÏòÖÁÕýµ±VPNÒ³Ã棬²¢¿ÉÄܱ»ÒªÇóÔٴεǼ£¬´Ó¶øÇ¿»¯ÎÊÌâÒѽâ¾öµÄ¼ÙÏó¡£Ò»µ©»ñµÃVPN»á¼ûȨ£¬¹¥»÷ÕßËæ¼´Õö¿ªÍøÂçɨÃ裬ѰÕÒºáÏòÒƶ¯¡¢³¤ÆÚ»¯¼°È¨ÏÞÌáÉýµÄʱ»ú¡£¿ÉÄÜÊܵ½ÍøÂç´¹ÂÚ¹¥»÷Ó°ÏìµÄÓû§Ó¦¼ì²éÆäÈÕÖ¾£¬Éó²éÒÑÍù 30 ÌìÄÚÀ´×Ô VPN ·ÖÅÉ IP µØµãµÄ¿ÉÒÉÔ˶¯¡£
https://cybernews.com/news/us-vpn-phishing-attack/