DICK¡®S ÔÚÔâÊÜÍøÂç¹¥»÷ºó¹Ø±Õµç×ÓÓʼþ²¢Ëø¶¨Ô±¹¤ÕË»§

Ðû²¼Ê±¼ä 2024-08-30
1. DICK'S ÔÚÔâÊÜÍøÂç¹¥»÷ºó¹Ø±Õµç×ÓÓʼþ²¢Ëø¶¨Ô±¹¤ÕË»§


8ÔÂ28ÈÕ £¬ÃÀ¹úÌåÓýÓÃÆ·ÁãÊÛ¾ÞÍ·µÏ¿ËÌåÓýÓÃÆ·¹«Ë¾£¨DICK'S£©¿ËÈÕÔâÓöÍøÂç¹¥»÷ £¬µ¼ÖÂÆäÉñÃØÐÅϢй¶ ¡£Õâ¼ÒÓµÓÐ857¼ÒÃŵꡢÄêÊÕÈë´ï129.8ÒÚÃÀÔªµÄ²Æ²ú500Ç¿ÆóÒµ £¬ÔÚ8ÔÂ21ÈÕ·¢Ã÷ÆäÐÅϢϵͳ±»µÚÈý·½Î´ÊÚȨ»á¼û ¡£DICK'SѸËÙÆô¶¯ÍøÂçÇå¾²ÏìÓ¦ÍýÏë £¬²¢ÓëÍⲿר¼ÒÏàÖúÊÓ²ì´Ë´ÎÊÂÎñ £¬Í¬Ê±¹Ø±ÕÁ˵ç×ÓÓʼþϵͳ²¢Ëø¶¨ËùÓÐÔ±¹¤ÕË»§ £¬ÒÔ¸ôÀëÍþв ¡£Ô±¹¤Ðèͨ¹ýÉí·ÝÑéÖ¤²Å»ªÖØлá¼ûÄÚ²¿ÏµÍ³ £¬ÊÐËÁµç»°Ïß·ҲÊܵ½Ó°Ïì ¡£Ö»¹Ü¹«Ë¾ÌåÏÖÏÖÔÚÔËӪδÊÜ×ÌÈÅ £¬²¢ÒÑÏòÖ´·¨²¿·Ö±¨¸æ´ËÎ¥¹æÐÐΪ £¬µ«Ïêϸй¶ϸ½ÚÉÐδ¹ûÕæ ¡£DICK'SÔÚÌá½»¸øÃÀ¹ú֤ȯÉúÒâίԱ»áµÄÎļþÖÐÇ¿µ÷ £¬»ùÓÚÄ¿½ñÕÆÎÕµÄÐÅÏ¢ £¬´Ë´ÎÊÂÎñ±»ÒÔΪ²»×é³ÉÖØ´óÓ°Ïì £¬µ«ÊÓ²ìÈÔÔÚ¾ÙÐÐÖÐ ¡£


https://www.bleepingcomputer.com/news/security/dicks-shuts-down-email-locks-employee-accounts-after-cyberattack/


2. LummaC2бäÖÖʹÓÃPowerShellÓë¸ß¼¶»ìÏýÊÖÒÕÇÔÈ¡Êý¾Ý


8ÔÂ28ÈÕ £¬ÈðÊ¿ÍøÂçÇå¾²¹«Ë¾Ontinue½üÆÚ½ÒÆÆÁËLummaC2¶ñÒâÈí¼þµÄÒ»¸öбäÖÖ £¬ÆäÔ˶¯ÏÔÖøÔöÇ¿ £¬¶ÔÍøÂçÇå¾²×é³ÉÑÏÖØÍþв ¡£Õâ¿î±äÖÖʹÓÃPowerShell¾ÙÐÐÆðԴѬȾ £¬ÍŽá»ìÏýÊÖÒÕºÍÀú³Ì×¢ÈëÊֶΠ£¬ÇÄÎÞÉùÏ¢µØÇÔÈ¡Ãô¸ÐÊý¾Ý ¡£LummaC2×Ô2022ÄêÆð±ãÒÔ¶ñÒâÈí¼þ¼´·þÎñ(MaaS)ÐÎʽÔ˶¯ £¬½üÆÚ¸üÊÇͨ¹ýÖØ´óÕ½ÂÔÉý¼¶ £¬ÈçʹÓÃÆƽâÈí¼þ¼°YouTubeÇþµÀÈö²¥ £¬Õ¹ÏÖÁËÆä¸ß¶ÈµÄ˳ӦÐÔºÍÒþ²ØÐÔ ¡£×îз¢Ã÷µÄ±äÖÖÖÐ £¬PowerShellÏÂÁî¾­ÓÉÈ«ÐÄ»ìÏýµ«¿É½âÂë £¬Õ¹ÏÖÁËÆäÏÂÔز¢Ö´Ðеڶþ½×¶ÎAES¼ÓÃܸºÔصÄÏêϸ°ì·¨ ¡£¸ºÔØËæºó×¢ÈëWindowsÕýµ±Àú³Ìdllhost.exe £¬ÒÔʵÏÖÔ¶³Ì¿ØÖÆ¡¢Êý¾ÝÇÔÈ¡¼°³¤ÆÚ»¯Ñ¬È¾ ¡£¸Ã±äÖÖ»¹½ÓÄÉIPÒþ²Ø¡¢×Ô½ç˵Óû§ÊðÀíµÈÊֶΠ£¬½øÒ»²½ÌÓ±ÜÇå¾²¼ì²â ¡£ÎªÓ¦¶Ô´ËÍþв £¬Ontinue½¨Òé×éÖ¯ÔöÇ¿¶Ëµã¼ì²âºÍÏìÓ¦(EDR)°²ÅÅ £¬ÊµÑé¹¥»÷ÃæïÔÌ­(ASR)Õ½ÂÔ £¬²¢¹Ø×¢Ìض¨µÄÍ×Эָ±ê(IOC)ÒÔ×Ô¶¯·ÀÓù ¡£


https://hackread.com/lummac2-malware-variant-powershell-obfuscation-steal-data/


3. Mirai½©Ê¬ÍøÂçʹÓÃAVTECH IPÉãÏñ»úÁãÈÕÎó²îCVE-2024-7029


8ÔÂ28ÈÕ £¬AkamaiµÄÇå¾²Ç鱨ÏìÓ¦ÍŶӣ¨SIRT£©¿ËÈÕÖÒÑÔ³Æ £¬Mirai½©Ê¬ÍøÂçÔ˶¯Õýͨ¹ýʹÓÃAVTECH IPÉãÏñ»úÖеÄÐÂÅû¶ÁãÈÕÎó²îCVE-2024-7029ѸËÙÉìÕÅ ¡£´ËRCEÎó²î±£´æÓÚÉãÏñ»úµÄ¡°ÁÁ¶È¡±¹¦Ð§ÖÐ £¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐÐ £¬¹¥»÷ÕßÒѽè´Ë°²ÅÅÁËMiraiµÄ±äÖÖ¡°Corona¡± £¬¶ÔÒªº¦»ù´¡ÉèÊ©×é³ÉÖØ´óÍþв ¡£Ö»¹ÜÊÜÓ°ÏìµÄÉãÏñÍ·ÐͺÅÒÑÍ£²ú £¬µ«ÆäÔÚ¶à¸öÁìÓòµÄÒ»Á¬Ê¹ÓÃ͹ÏÔÁËÖÎÀíÒÅÁô×°±¸ºÍδÐÞ¸´Îó²îµÄ½ôÆÈÐÔ ¡£CISAÒàÐû²¼±¨¸æÇ¿µ÷´ËÎó²îµÄÑÏÖØÐÔ¼°ÆäÆÕ±éÓ°ÏìDZÁ¦ ¡£ÖµµÃ×¢ÖصÄÊÇ £¬Mirai½©Ê¬ÍøÂç²»µ«Ê¹ÓÃCVE-2024-7029 £¬»¹Í¬Ê±Ãé×¼ÁËAVTECH¼°ÆäËûϵͳÖеĶà¸öÎó²î £¬Õ¹ÏÖÁËÆä¶àÑù»¯µÄ¹¥»÷Õ½ÂÔ ¡£Corona±äÌåµÄÈö²¥Ê¼ÓÚ2023Äêµ× £¬²¢ÔÚ2024Äê3ÔµִïÁË»îÔ¾á¯Áë ¡£Ö»¹ÜCVE-2024-7029µÄPoCÔçÔÚ2019Äê¾ÍÒѹûÕæ £¬ÕýʽCVE±àºÅÖ±µ½2024Äê8Ô²ÅÐû²¼ ¡£¼øÓÚÄ¿½ñÎÞ¹Ù·½²¹¶¡¿ÉÓà £¬Akamai½¨ÒéÁ¬Ã¦Í£ÓÃÊÜÓ°Ïì×°±¸×÷ΪÖ÷Òª»º½â²½·¥ ¡£


https://securityonline.info/mirai-botnet-exploits-zero-day-vulnerability-cve-2024-7029-in-avtech-ip-cameras/


4. PerlÉçÇøÖÒÑÔ£ºcpanminus¹¤¾ß±£´æÑÏÖØÎó²îCVE-2024-45321


8ÔÂ28ÈÕ £¬Perl ÉçÇø½üÆÚÐû²¼Á˹ØÓÚCVE-2024-45321µÄ½ôÆÈÇ徲ͨ¸æ £¬Ö¸³öÆÕ±éʹÓõÄApp::cpanminus£¨cpanm£©¹¤¾ß±£´æÑÏÖØÎó²î £¬ÆäCVSSÆÀ·Ö¸ß´ï9.8 ¡£´ËÎó²îÔ´ÓÚcpanminusĬÈÏʹÓò»Çå¾²µÄHTTPÅþÁ¬´ÓCPANÏÂÔØPerlÄ£¿é £¬µ¼Ö¡°Î´¾­ÍêÕûÐÔ¼ì²éµÄ´úÂëÏÂÔØ¡±ÎÊÌ⣨CWE-494£© £¬Ê¹¹¥»÷ÕßÓÐʱ»úÔÚ´«ÊäÖиĶ¯´úÂë £¬½ø¶øÔÚÓû§ÏµÍ³ÉÏÖ´ÐжñÒâ´úÂë ¡£¼øÓÚcpanminus×÷Ϊ¹Ù·½CPAN¿Í»§¶ËµÄÇáÁ¿¼¶Ì滻Ʒ £¬ÆäÎó²îÓ°Ïì¹æÄ£¿ÉÄܼ«ÎªÆÕ±é £¬ÓÈÆäÍþвµ½ÒÀÀµ¸Ã¹¤¾ßÖÎÀíPerlÄ£¿éµÄϵͳÇå¾² ¡£Ö»¹Ü¹Ù·½²¹¶¡ÉÐδÐû²¼ £¬µ«Óû§Ó¦Á¬Ã¦½ÓÄÉÐж¯½µµÍΣº¦ ¡£ÍƼö²½·¥°üÀ¨£ºÒ»ÊÇͨ¹ýÏÂÁîÐвÎÊý»òÇéÐαäÁ¿ÉèÖÃHTTPS¾µÏñ £¬µ«Ðè×¢Öش˾ٿÉÄÜÏÞÖƶԾɰ汾ºÍ¿ª·¢°æ±¾µÄ»á¼û£»¶þÊÇÖ±½ÓÐÞ¸Äcpanm¿ÉÖ´ÐÐÎļþ £¬½«ËùÓÐHTTP¶ËµãÌ滻ΪHTTPS £¬ÒÔ±£´æ¶ÔBackPanµÈ×ÊÔ´µÄ»á¼û£»ÈýÊÇת¶øʹÓÃĬÈÏÖ§³ÖHTTPSÅþÁ¬µÄ±¸Óÿͻ§¶Ë £¬ÈçCPAN.pm 2.35+»òApp::cpm £¬ÒÔÈ·±£Ä£¿éÏÂÔصÄÇå¾²ÐÔ ¡£


https://securityonline.info/critical-cve-2024-45321-flaw-in-popular-perl-module-installer-cpanminus-no-patch-available/


5. ÍþвÕßʹÓÃαÔìµÄPalo Alto GlobalProtect¹¤¾ßÃé×¼Öж«


8ÔÂ29ÈÕ £¬Ç÷ÊƿƼ¼Ñо¿ÍŶӽÒÆÆÁËÒ»ÏîÕë¶ÔÖж«×éÖ¯µÄ¸ß¶ÈÖØ´ó¶ñÒâÈí¼þÔ˶¯ £¬¸ÃÔ˶¯Í¨¹ýαװ³ÉÕýµ±µÄPalo Alto GlobalProtect VPN¿Í»§¶Ë¾ÙÐÐÈö²¥ ¡£¹¥»÷ʼÓÚÒ»¸öÃûΪ¡°setup.exe¡±µÄ¶ñÒâÎļþ £¬¸ÃÎļþÄ£ÄâVPN×°ÖóÌÐò £¬ÔÚÊܺ¦ÕßϵͳÖа²ÅÅÐéα×é¼þ £¬²¢½èÖúÐÂ×¢²áµÄ¡°sharjahconnect¡±ÓòÃûαװ³ÉÕýµ±VPNÃÅ»§ £¬ÒÔÔöÇ¿ÓÕÆ­ÐÔ ¡£´Ë¶ñÒâÈí¼þʹÓÃInteractshÏîÄ¿¾ÙÐÐÐűê²Ù×÷ £¬Í¨¹ýDNSÇëÇóÓëC&C·þÎñÆ÷ͨѶ £¬ÒÔ¼à¿ØѬȾÀú³Ì²¢Ö´ÐжàÖÖ¶ñÒâʹÃü £¬°üÀ¨Ö´ÐÐPowerShell¾ç±¾¡¢ÖÎÀíÀú³Ì¡¢Êý¾ÝÇÔÈ¡Óë¼ÓÃÜͨѶ ¡£ÆäÎÞаµÄÏÂÁî½á¹¹Ê¹ÆäÄܹ»ÎÞаӦ¶Ô²î±ð¹¥»÷ÐèÇó £¬Í¬Ê±½ÓÄÉÖØ´ó¹æ±ÜÊÖÒÕÒÔÌӱܼì²â ¡£Öж«¼°È«Çò×éÖ¯ÃæÁÙÑÏËàÌôÕ½ £¬ÐèÇ¿»¯¶Ëµã±£»¤¡¢¸üÐÂÇ徲ЭÒé £¬²¢ÔöÇ¿Ô±¹¤Çå¾²½ÌÓýÓëÒâʶÌáÉý £¬ÒÔÓÐÓõÖÓù´ËÀà¸ß¼¶Íþв ¡£


https://www.trendmicro.com/en_us/research/24/h/threat-actors-target-middle-east-using-fake-tool.html


6. ÃÀ³¬130¼ÒÆóÒµÔâ´¹ÂÚ¹¥»÷ £¬GRIT½ÒÆÆÖØ´óVPN´¹ÂÚȦÌ×


8ÔÂ29ÈÕ £¬GuidePoint ResearchºÍIntelligence Team£¨GRIT£©½üÆÚ½ÒÆÆÁËÒ»ÏîÕë¶ÔÓ¢ÓïʹÓÃÕß £¬ÌØÊâÊÇÃÀ¹úÁè¼Ý130¼ÒÆóÒµµÄÖØ´ó´¹ÂÚ¹¥»÷Ô˶¯ ¡£×Ô2024Äê6ÔÂ26ÈÕÆ𠣬¹¥»÷Õß×¢²áÁËÓëÄ¿µÄ¹«Ë¾VPN·þÎñÏàËƵĸ߷ÂÓòÃû £¬²¢Í¨¹ýµç»°Ã°³äITÖ§³ÖÖ°Ô± £¬ÒÔ½â¾öVPNµÇ¼ÎÊÌâΪÓÉ £¬ÓÕµ¼Ô±¹¤µã»÷º¬ÓжñÒâÁ´½ÓµÄ¶ÌÐÅ ¡£ÕâЩÁ´½Óµ¼ÏòÈ«ÐÄÉè¼ÆµÄ¼ÙVPNµÇ¼ҳÃæ £¬²»µ«Íâ¹ÛÉÏÓëÕæʵҳÃæÎÞÒì £¬»¹°üÀ¨ÌØÖƵÄVPN×éÑ¡Ïî £¬Èç¡°TestVPN¡±ºÍ¡°RemoteVPN¡± £¬ÒÔÔöÇ¿ÓÕÆ­ÐÔ ¡£¼´±ãÃæÁÙ¶àÒòËØÈÏÖ¤£¨MFA£© £¬¹¥»÷ÕßÒ²ÄÜͨ¹ýÓÕµ¼Óû§Åú×¼ÍÆËÍ֪ͨÀ´ÈƹýÇå¾²·ÀµØ £¬×îÖÕÆ­È¡Óû§Æ¾Ö¤ ¡£µ½ÊÖºó £¬Óû§»á±»Öض¨ÏòÖÁÕýµ±VPNÒ³Ãæ £¬²¢¿ÉÄܱ»ÒªÇóÔٴεǼ £¬´Ó¶øÇ¿»¯ÎÊÌâÒѽâ¾öµÄ¼ÙÏó ¡£Ò»µ©»ñµÃVPN»á¼ûȨ £¬¹¥»÷ÕßËæ¼´Õö¿ªÍøÂçɨÃè £¬Ñ°ÕÒºáÏòÒƶ¯¡¢³¤ÆÚ»¯¼°È¨ÏÞÌáÉýµÄʱ»ú ¡£¿ÉÄÜÊܵ½ÍøÂç´¹ÂÚ¹¥»÷Ó°ÏìµÄÓû§Ó¦¼ì²éÆäÈÕÖ¾ £¬Éó²éÒÑÍù 30 ÌìÄÚÀ´×Ô VPN ·ÖÅÉ IP µØµãµÄ¿ÉÒÉÔ˶¯ ¡£


https://cybernews.com/news/us-vpn-phishing-attack/