ºÚ¿Í鶶íÂÞ˹Éç½»ÍøÂçVK 3.9ÒÚÓû§Êý¾Ý

Ðû²¼Ê±¼ä 2024-09-04
1. ºÚ¿Í鶶íÂÞ˹Éç½»ÍøÂçVK 3.9ÒÚÓû§Êý¾Ý


9ÔÂ3ÈÕ£¬ºÚ¿Í¡°HikkI-Chan¡±ÔÚ²»·¨ºÚ¿ÍÂÛ̳Breach ForumsÉϹûÕæÁ˾ªÈ˵Ä3.9ÒÚVKÓû§Êý¾Ý¡£VK×÷Ϊ¶íÂÞ˹¼°¶«Å·µØÇø¹ãÊܽӴýµÄÉ罻ýÌåƽ̨£¬ÆäÓû§Ð¡ÎÒ˽¼ÒÐÅÏ¢°üÀ¨¶¼»á¡¢¹ú¼Ò¡¢È«Ãû¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼƬURLµÈÃô¸ÐÄÚÈݲ»ÐÒ±»Ð¹Â¶£¬×ÜÁ¿¸ß´ï390,425,719Ìõ¼Í¼£¬Êý¾Ý¹æÄ£Áè¼Ý27GB¡£ÖµµÃ×¢ÖصÄÊÇ£¬Ö»¹Ü´Ë´Î鶵ÄÐÅÏ¢Á¿Öش󣬵«²¢Î´°üÀ¨Óû§µÄµç»°ºÅÂë»òÃÜÂ룬¼õÇáÁËÖ±½ÓÇå¾²Íþв¡£È»¶ø£¬Óû§È«Ãû¡¢¶¼»á¼°¹ú¼ÒµÈÐÅÏ¢µÄ̻¶ÈÔ¿ÉÄÜÒý·¢Ò»ÏµÁÐΣº¦£¬ÓÈÆäÊÇ˼Á¿µ½ÕâЩÐÅϢΪ¶íÓËä¿ÉÄÜÏÞÖƷǶíÓïÍþвÕßµÄÖ±½ÓʹÓ㬵«Òþ»¼ÈÔ½ûÖ¹ºöÊÓ¡£ºÚ¿Í¡°HikkI-Chan¡±Éù³Æ´Ë´Î²¢·ÇÖ±½ÓÈëÇÖVK·þÎñÆ÷£¬¶øÊÇÒ»´ÎËùνµÄ¡°¶þ½×¡±ÈëÇÖ£¬¼´Ê¹ÓôÓÆäËûµÚÈý·½ÇþµÀ²»·¨»ñÈ¡µÄÊý¾ÝÀ´¼ä½Ó»ñÈ¡VKÓû§ÐÅÏ¢¡£VK²¢·ÇÊ×´ÎÔâÓöÊý¾Ýй¶Î£»ú£¬ÔçÔÚ2016Ä꣬¾ÍÓб¨µÀÖ¸³ö¸Ãƽ̨µÄÓû§ÕË»§ÔøÔÚ°µÍøÉϱ»³öÊÛ¡£


https://hackread.com/hacker-leaks-data-of-vk-users-russian-social-network/


2. ÅûÈøÁ¬ËøµêƵÔâÍøÂç´¹ÂÚÕ©Æ­£¬ÇÔÊØÐÅÓÿ¨Êý¾Ý


9ÔÂ2ÈÕ£¬È«Çò¹æÄ£ÄÚ£¬ÌØÊâÊǼÓÄô󣬶à¼Ò×ÅÃûÅûÈøÁ¬ËøµêÕýÔâÊÜÍøÂç´¹ÂÚÕ©Æ­µÄÇÖÏ®£¬Õ©Æ­ÕßʹÓÃÓòÃûÓÕÆ­¡¢ÍøÂç´¹ÂÚ¼°ÌìÉúʽÈ˹¤ÖÇÄܵÈÊֶΣ¬½¨Éè¸ß¶È·ÂÕæµÄ¶ñÒâÍøÕ¾£¬ÇÔÈ¡Ö÷¹ËÐÅÓÿ¨ÐÅÏ¢£¬Ôì³ÉÖØ´ó¾­¼ÃËðʧ¡£Õⳡ×Ô2023Äê±ã×îÏȵÄÕ©Æ­Ô˶¯£¬Í¨¹ýÄ£ÄâÕýµ±ÅûÈøÍâÂôÍøÕ¾µÄ¶©µ¥Ò³Ã棬ÓÕµ¼Óû§ÊäÈëСÎÒ˽¼ÒÐÅÏ¢¼°Ò»´ÎÐÔÃÜÂ룬½ø¶ø͵ÊØÐÅÓÿ¨Êý¾Ý¡£³ýмÓƵÄDomino's PizzaÍ⣬¼ÓÄôó±¾ÍÁµÄÅûÈø³øʦ¡¢±ÈÈø±ÈÈø¡¢²¨Ê¿¶ÙÅûÈøµÈ×ÅÃûÆ·ÅÆÒàδÄÜÐÒÃâ¡£Õ©Æ­Õßͨ¹ý¸¶·ÑËÑË÷ÒýÇæ¹ã¸æÌáÉý¶ñÒâÓòÃûÆعâ¶È£¬Ê¹ÓÃƴд¹ýʧ¡¢Í¬ÐÎÒìÒå´ÊµÈ¼¼ÇÉÎóµ¼Óû§£¬²¢Í¨¹ýÒ»Ö±×¢²áÐÂÓòÃû¡¢¸üÐÂÏÖÓÐÓòÃû¼°Ìæ»»IPµØµãÀ´Ìӱܼì²â¡£´ËÀ๥»÷²»µ«ÊÖÒÕÖØ´ó£¬ÇÒ¹æÄ£Æձ飬¶ÔÈ«ÇòÅûÈøÐÐÒµ×é³ÉÑÏÖØÍþв¡£ÎªÁËÌá·À´ËÀàÍøÂç´¹ÂÚÕ©Æ­£¬Ö÷¹ËÐèÌá¸ßСÐÄ£¬×Ðϸ¼ì²éÓòÃûÖеÄÒì³£ÐźÅ£¬¹Ø×¢×¢²áÈÕÆÚ£¬ÆôÓöàÒòËØÉí·ÝÑéÖ¤£¬²¢ÊµÊ±ÏòÖ´·¨²¿·Ö±¨¸æ¿ÉÒÉÉúÒâ¡£


https://hackread.com/phishing-scam-canadian-pizza-chains-credit-card-data/


3. CISA½ôÆȱ޲ßÐÞ²¹Draytek·ÓÉÆ÷Óë½ðɽWPS OfficeÇå¾²Îó²î


9ÔÂ3ÈÕ£¬ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½ôÆÈÐû²¼Á˹ØÓÚÈý¸öÕý±»Æð¾¢Ê¹ÓõÄÑÏÖØÎó²îµÄ¾¯Ê¾£¬±Þ²ßÈ«Çò×éÖ¯ÓÈÆäÊÇÁª°î»ú¹¹Ñ¸ËÙÓ¦¶Ô¡£ÆäÖУ¬Draytek VigorConnect ·ÓÉÆ÷̻¶µÄ CVE-2021-20123 ºÍ CVE-2021-20124 Îó²î£¬ÈÃδÊÚȨ¹¥»÷ÕßÄÜÈÝÒ×»á¼ûÃô¸ÐÎļþ£¬×é³ÉÊý¾Ýй¶¼°ÏµÍ³ÈëÇÖµÄÖØ´óÍþв¡£ÁíÒ»Ïî¸ßΣº¦Îó²î CVE-2024-7262 ¾Û½¹ÓÚ½ðɽWPS Office£¬Õâ¿îÔÚ¶«ÑǵØÇøÆÕ±éʹÓõİ칫Ì×¼þ£¬Òò±£´æÑÏÖصÄ·¾¶±éÀúÎÊÌ⣨CVSS ÆÀ·Ö¸ß´ï9.8£©£¬³ÉΪº«¹ú¹ØÁªÍøÂçÌع¤×éÖ¯APT-C-60µÄ¹¥»÷Ä¿µÄ¡£Ê¹ÓôËÁãÈÕÎó²î£¬APT-C-60°²ÅÅÁËSpyGlaceºóÃÅ£¬´ËÎó²îµÄ½¹µãÔÚÓÚ¶ÔÓû§Îļþ·¾¶ÑéÖ¤µÄÊèºö£¬Ê¹µÃ¹¥»÷ÕßÄÜÉÏ´«²¢Ö´ÐÐí§ÒâWindows¿â£¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐУ¬ÖÜÈ«¿ØÖÆÊܺ¦ÏµÍ³£¬²¢ºã¾ÃÇÔÈ¡Êý¾Ý¡£ÎªÓ¦¶ÔÕâÒ»½ôÆÈÐÎÊÆ£¬CISAÒÑÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·ÖÔÚ2024Äê9ÔÂ24ÈÕÇ°Íê³ÉÎó²îÐÞ²¹¡£


https://securityonline.info/cisa-issues-alert-three-actively-exploited-vulnerabilities-demand-immediate-attention/


4. Head MareºÚ¿Í×éÖ¯Õë¶Ô¶íº×·¢¶¯ÍøÂç¹¥»÷ÓëÀÕË÷


9ÔÂ3ÈÕ£¬Head MareºÚ¿Í×éÖ¯×Ô2023ÄêÆð»îÔ¾£¬×¨ÃÅÕë¶Ô¶íÂÞ˹ºÍ°×¶íÂÞ˹µÄ×éÖ¯·¢¶¯ÍøÂç¹¥»÷¡£¸Ã×éÖ¯½ÓÄÉÏȽøÕ½ÂÔ£¬ÈçʹÓÃWinRARÖеÄCVE-2023-38831Îó²îÖ´ÐжñÒâ´úÂ룬ÒÔÔöÇ¿Æä¹¥»÷Òþ²ØÐÔºÍЧÂÊ¡£Head Mare²»µ«Ð¹Â¶Êܺ¦ÕßÃô¸ÐÐÅÏ¢£¬»¹Í¨¹ýLockBit£¨Õë¶ÔWindows£©ºÍBabuk£¨Õë¶ÔLinux£©¼ÓÃÜ×°±¸£¬Ë÷ÒªÊê½ð¡£Æ乤¾ß°ü°üÀ¨PhantomDLºÍPhantomCoreµÈ¶¨ÖƺóÃÅ£¬ÓÃÓÚÉÏ´«ÎļþºÍÖ´ÐÐÏÂÁαװ³É΢Èí¸üÐÂʹÃüÒÔ»ìÏýÊÓÌý¡£±ðµÄ£¬¸Ã×éÖ¯»¹Ê¹ÓÃSliverµÈ¿ªÔ´C2¿ò¼Ü¼°¶àÖÖ¹ûÕ湤¾ß¾ÙÐкáÏòÒƶ¯ºÍƾ֤ÍøÂç¡£¹¥»÷ͨ³£ÒÔÍøÂç´¹ÂÚÓʼþЯ´øË«À©Õ¹ÃûÎĵµÎªÆðÔ´£¬×îÖÕ°²ÅÅÀÕË÷Èí¼þ²¢ÁôÏÂÊê½ðÒªÇó¡ £¿¨°Í˹»ùÖ¸³ö£¬Head MareµÄÕ½Êõ¡¢ÊÖÒպͳÌÐòÓë¶íÎÚ³åÍ»Åä¾°ÏÂÆäËûÕë¶Ô¶í°×Á½¹úµÄºÚ¿Í×éÖ¯ÏàËÆ£¬µ«ÆäÌØÉ«ÔÚÓÚʹÓö¨ÖƶñÒâÈí¼þºÍ×îÐÂÎó²î£¬Õ¹ÏÖÁ˸߶ȵÄרҵÐÔºÍÕë¶ÔÐÔ¡£


https://thehackernews.com/2024/09/hacktivists-exploits-winrar.html


5. Booking.comÔâÓöÖØ´óÍøÂç´¹ÂÚ¹¥»÷


9ÔÂ3ÈÕ£¬OSINTMATTER×îб¨¸æÕ¹ÏÖÁËÕë¶ÔBooking.comµÄÖØ´óÍøÂç´¹ÂÚÔ˶¯£¬ÆäÕ½ÂÔ°üÀ¨¶à½×¶ÎÈëÇÖ£¬´ÓÂùÝ˾ÀíÕË»§µ½Ö±½ÓÓÕÆ­¿Í»§¡£¹¥»÷ÕßʹÓ÷ÂðÓòÃû¡°extraknet-booking.com¡±ÓÕÆ­Óû§½øÈëÍâ¹Û±ÆÕæµÄÐéαÍøÕ¾£¬Ö¼ÔÚÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬°üÀ¨µÇ¼ƾ֤¡¢Ð¡ÎÒ˽¼ÒÊý¾ÝºÍ²ÆÎñÏêϸÐÅÏ¢¡£¸ÃÍøվͨ¹ýJavaScript»ìÏýÊÖÒÕÒþ²Ø¶ñÒâ´úÂ룬²¢¿ÉÄÜÓëNinja TrojanµÈ¶ñÒâÈí¼þÏà¹ØÁª¡£±ðµÄ£¬¹¥»÷Õß»¹Ê¹ÓÃSTUN°ó¶¨ÇëÇóÒþ²Ø¶ñÒâÁ÷Á¿£¬²¢Í¨¹ý¶¯Ì¬Î±×°ÊÖÒÕƾ֤Óû§ÌØÕ÷չʾ²î±ðÄÚÈÝ£¬ÒÔÌӱܼì²â¡£ÌØÊâÖµµÃ×¢ÖصÄÊÇ£¬¹¥»÷ÍøÂçÖеÄiFrameÅþÁ¬ÖÁÒ»ÆäÖÐÐÄÊàŦ£¬¼¯ÖпØÖƲ¢À©´ó´¹ÂÚ¹æÄ£¡£´Ë´Î¹¥»÷͹ÏÔÁËÍøÂç´¹ÂÚÊֶεÄÈÕÒæÖØ´óÓëÒþ²Ø£¬¶ÔÂÃÓÎÒµÇå¾²×é³ÉÑÏÖØÍþв£¬¾¯Ê¾Óû§ºÍÆóÒµÐèÔöǿСÐÄ£¬×ÔÁ¦ÑéÖ¤ÍøÕ¾Õýµ±ÐÔ£¬Ìá·ÀСÎÒ˽¼ÒÐÅϢй¶¡£


https://securityonline.info/travelers-targeted-booking-com-phishing-scam-unveiled/


6. ¿¨°Í˹»ù½ÒÆÆ£ºICMPºóÃŹ¥»÷ÔÙÏÖ£¬ÒÉËÆToddyCat APTÊÖ·¨


9ÔÂ3ÈÕ£¬¿¨°Í˹»ùÈ«ÇòÓ¦¼±ÏìӦС×飨GERT£©µÄÍøÂçÇ徲ר¼Ò½ÒÆÆÁËÒ»ÖÖÖØ´óµÄÍøÂç¹¥»÷£¬ÆäÊÖ·¨Óë×ÅÃûAPT×éÖ¯ToddyCatµÄÕ½ÂԸ߶ÈÏàËÆ¡£´Ë´Î¹¥»÷Õë¶Ô¿Í»§Óò¿ØÖÆÆ÷ºÍExchange·þÎñÆ÷£¬Ê¹ÓðüÀ¨Microsoft ExchangeÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-26855£©¼°ÒÑÐÞ²¹µÄIKEEXT·þÎñ¾ÉÎó²îÔÚÄڵĶàÖÖÇå¾²Îó²î£¬ÀֳɻñÈ¡³õʼ»á¼ûȨ²¢¹¹½¨³¤ÆÚÐÔ¡£¹¥»÷ÕßÓÈΪ½ÆÕ©µØÖØÓÃÁËÓëwlbsctrl.dll¿âÏà¹ØµÄ¾ÉÎó²î£¬Í¨¹ýÌæ»»system32Ŀ¼ÏµĸÿâÎļþ£¬Ê¹IKEEXT·þÎñÿ´ÎŲÓÃʱ¾ùÖ´ÐкóÃÅ´úÂ룬ÎÞÐè¸ü¸ÄͨÀýÆô¶¯ÉèÖ᣽øÒ»²½µØ£¬ËûÃÇʹÓÃSMBЭÒéÉèÖÃ×Ô½ç˵·À»ðǽ¹æÔò£¬ÈöñÒâdllhost.exe¼àÌýÌض¨¶Ë¿Ú£¬ÊµÏÖÍøÂçÖеĺáÏòÒƶ¯£¬ÇÄÎÞÉùÏ¢µØÀ©Õ¹¹¥»÷¹æÄ£¡£ÓÈΪҪº¦µÄÊÇ£¬¹¥»÷Õß°²ÅÅÁËÒ»¸öICMPºóÃÅ£¬Í¨¹ý¸ÃºóÃÅÒÔ¼ÓÔسÌÐòÐÎʽÔËÐУ¬Ö´ÐÐÖØ´ó²Ù×÷ÒÔά³ÖÒþ²ØÐÔ¡£¸ÃºóÃÅÊ×Ïȼì²é»¥³âËøÒÔ×èÖ¹Öظ´ÔËÐУ¬Ëæºó½âÃܲ¢Ö´Ðд洢ÔÚWindows×¢²á±íÖеÄÓÐÓøºÔØ£¬ÕâЩ¸ºÔØÒÔ¡°CAFEBABE¡±Îª±êʶ£¬Ê¹ÓÃICMPÌ×½Ó×ÖÎüÊÕ²¢Ö´ÐÐÀ´×Ô¹¥»÷ÕßµÄÖ¸Á´Ó¶øÔÚ²»½¨Éè³öÕ¾ÅþÁ¬µÄÇéÐÎÏÂʵÏÖÔ¶³Ì¿ØÖÆ£¬¼«´ó½µµÍÁ˱»¼ì²âµÄΣº¦¡£


https://securityonline.info/researcher-identifies-toddycat-inspired-apt-attack-leveraging-icmp-backdoor-and-microsoft-exchange-flaws/