SambaSpy¶ñÒâÈí¼þͨ¹ý´¹ÂÚµç×ÓÓʼþ¹¥»÷Òâ´óʹÓû§
Ðû²¼Ê±¼ä 2024-09-239ÔÂ19ÈÕ£¬¿¨°Í˹»ùʵÑéÊÒ½üÆÚ½ÒÆÆÁËÒ»Ïî¸ß¶È¶¨ÖÆ»¯µÄ¶ñÒâÈí¼þÔ˶¯£¬ÃûΪSambaSpy£¬ÆäÆæÒìÖ®´¦ÔÚÓÚ½öÕë¶ÔÒâ´óʹÓû§¡£Õâ¿îÔ¶³Ì»á¼ûľÂí£¨RAT£©Í¨¹ýαװ³ÉÒâ´óÀû·¿µØ²ú¹«Ë¾µÄÕýµ±ÓʼþÈö²¥£¬ÓʼþÄÚº¬¿´ËÆÎÞº¦µÄ·¢Æ±Éó²éÁ´½Ó£¬ÊµÔòµ¼Ïò¶ñÒâJARÎļþÏÂÔØ¡£SambaSpyʹÓÃÓïÑÔ¼ì²é»úÖÆ£¬È·±£½öѬȾÒâ´óÀûÓïϵͳ£¬Õ¹ÏÖÁ˹¥»÷Õߵĸ߶ÈרҵÐԺ;«×¼¶¨Î»ÄÜÁ¦¡£Ò»µ©×°Öã¬SambaSpy¸¶Óë¹¥»÷Õ߶ÔÊÜѬȾװ±¸µÄÖÜÈ«¿ØÖÆȨ£¬°üÀ¨ÎļþÖÎÀí¡¢ÍøÂçÉãÏñÍ·¼à¿Ø¡¢¼üÅ̼ͼ¡¢ÆÁÄ»½Øͼ¡¢ä¯ÀÀÆ÷ƾ֤ÇÔÈ¡¼°Ô¶³Ì×ÀÃæ²Ù×÷µÈ¡£¿¨°Í˹»ù×·×Ùµ½Á½ÌõѬȾÁ´£¬¾ùʹÓõç×ÓÓʼþ×÷ΪÈëÇÖÃÅ»§£¬ÆäÖÐÒ»Ìõ¸üΪÖØ´ó£¬Í¨¹ýÕýµ±Òâ´óÀûÔÆ·¢Æ±·þÎñFattureInCloud×÷ΪÑÚ»¤£¬½øÒ»²½ÓÕÆÊܺ¦Õß¡£ÖµµÃ×¢ÖصÄÊÇ£¬Ö»¹ÜÔ˶¯Ö÷Òª¾Û½¹ÓÚÒâ´óÀû£¬µ«·¢Ã÷µÄ°ÍÎ÷ÆÏÌÑÑÀÓïºÛ¼£¼°¿çµØÇøÁ´½ÓÅú×¢¹¥»÷Õß¿ÉÄÜÓµÓиüÆÕ±éµÄÒ°ÐÄ¡£´Ë´ÎÊÂÎñ²»µ«Í¹ÏÔÁËÍøÂçÇå¾²ÍþвµÄÒþ²ØÐÔÓëÖØ´óÐÔ£¬Ò²ÌáÐÑÁËÈ«ÇòÓû§ÐèÔöÇ¿Ìá·ÀÒâʶ£¬ÌØÊâÊÇÕë¶Ô¸ß¶È¶¨ÖÆ»¯µÄÍøÂç¹¥»÷¡£
https://securityonline.info/sambaspy-rat-targets-italian-users-in-a-unique-malware-campaign/
2. Ivanti CSA 4.6ÑÏÖØÎó²îCVE-2024-8963Òѱ»Æð¾¢Ê¹ÓÃ
9ÔÂ19ÈÕ£¬ÆóÒµÈí¼þ¾ÞÍ·Ivanti½üÆÚ½ÒÆÆÁËÆäIvanti Connect Secure Appliance£¨CSA£©4.6°æ±¾Öб£´æµÄÒ»¸ö¸ßΣÎó²îCVE-2024-8963£¬¸ÃÎó²îÑÏÖØÐÔÆÀ¼¶¸ß´ïCVSS 9.4£¬ÇÒÒѱ»·¢Ã÷Õý±»¶ñÒâʹÓ㬶ÔʹÓÃÒÑÍ£²ú£¨EOL£©°æ±¾µÄ¿Í»§×é³ÉÖØ´óÇå¾²Íþв¡£´ËÎó²îΪ·¾¶±éÀúÀàÐÍ£¬ÔÊÐíδÊÚȨԶ³Ì¹¥»÷Õß²»·¨»á¼ûCSA 4.6µÄÊÜÏÞÇøÓò£¬ÉõÖÁÓëÁíÒ»Îó²îCVE-2024-8190ÍŽáʹÓÃʱ£¬ÄÜÈƹýÉí·ÝÑéÖ¤Ö´ÐÐí§ÒâÏÂÁî¡£¼øÓÚCSA 4.6ÒÑ×èÖ¹ÎüÊÕ¹Ù·½Çå¾²¸üУ¬Ivanti½ôÆÈÐû²¼ÁËCSA 4.6²¹¶¡519ÒÔÐÞ¸´¸ÃÎó²î£¬µ«´Ë²¹¶¡±ê¼Ç×ŶԸð汾µÄ×îºóÒ»´Îά»¤¡£CISAÒѽ«´ËÎó²îÁÐΪÒÑÖª±»Ê¹ÓõÄÎó²î£¬Ç¿ÁÒ½¨Òé¸÷×é֯ѸËÙÐж¯£¬½ÓÄɵ÷½â²½·¥¡£IvantiÇ¿µ÷£¬³ýÁËÉý¼¶µ½CSA 5.0°æ±¾Í⣬²»»áΪ4.6°æ±¾Ìṩ½øÒ»²½²¹¶¡£¬Òò´Ë£¬Ö»¹ÜÔÝʱ²¹¶¡ÌṩÁ˶ÌÆÚ»º½â£¬µ«¾ÃÔ¶À´¿´£¬Ïòа汾ǨáãÊÇÈ·±£ÏµÍ³Çå¾²µÄΨһ;¾¶¡£
https://securityonline.info/critical-flaw-in-ivanti-csa-4-6-cve-2024-8963-actively-exploited-urgent-upgrade-required/
3. LockBitÀÕË÷Èí¼þÔÙÏ®eFile.com£¬Êý°ÙÍòÃÀ¹úÈËË°ÎñÊý¾ÝÇå¾²½ôÆÈ
9ÔÂ19ÈÕ£¬ÀÕË÷Èí¼þ×éÖ¯LockBit½üÆÚÔٴν«Ä¿µÄÃé×¼ÁËÃÀ¹úÔÚÏß±¨Ë°·þÎñeFile.com£¬ÕâÊÇÒ»¸ö¾ÃÀ¹ú¹úË°¾Ö£¨IRS£©¹Ù·½ÊÚȨµÄË°ÎñÉ걨ƽ̨¡£¾ÝCyber Express±¨µÀ£¬LockBitÒªÇóeFileÔÚ14ÌìÄÚÖ§¸¶Êê½ð£¬µ«²î±ðÓÚͨÀýÀÕË÷Èí¼þ²Ù×÷£¬´Ë´Î¹¥»÷²¢Î´¹ûÕæÈκα»ÇÔÈ¡Êý¾ÝµÄÑùÀýÀ´Ö¤ÊµÆäÍþв¡£×èÖ¹ÏÖÔÚ£¬¹ØÓÚ¹¥»÷µÄÏêϸ¹æÄ£¡¢Êý¾Ýй¶ÇéÐμ°·¸·¨ÄîÍ·µÄÐÅÏ¢ÈÔ±£ÃÜ£¬eFile.com¹ÙÍøÔò¼á³ÖÕý³£ÔË×÷¡£Êý°ÙÍòÒÀÀµeFile±¨Ë°µÄÃÀ¹úÈËÃæÁÙDZÔÚΣº¦£¬Ò»µ©¹¥»÷±»È·ÈÏ£¬ÄÉË°È˵ÄСÎÒ˽¼ÒºÍ²ÆÎñÊý¾Ý¿ÖÔâй¶£¬ÎªÉí·Ý͵ÇÔ¡¢Ë°ÎñڲƵȲ»·¨ÐÐΪÌṩδ²¡£ÖµµÃ×¢ÖصÄÊÇ£¬eFile²¢·ÇÊ״γÉΪLockBitµÄÁÔÎÔçÔÚ2022ÄêË°ÎñÉ걨á¯ÁëÆÚ£¬LockBit¾ÍÔøÉù³ÆÈëÇÖeFile£¬ÏÔʾ³ö·¸·¨·Ö×Ó¶Ô¸ßÁ÷Á¿Ê±¶ÎµÄ¾«×¼¹¥»÷Òâͼ¡£±ðµÄ£¬2023ÄêeFile»¹ÔøÔâÓö¡°efail¡±¶ñÒâÈí¼þÈëÇÖ£¬Ê¹ÓÃƽ̨Îó²îÇÔÈ¡Óû§Ãô¸ÐÐÅÏ¢£¬ÊÂÎñËäʵʱ»ñµÃ¿ØÖÆ£¬È´ÔÙ´ÎÇÃÏìÁ˽ðÈÚ·þÎñÍøÂçÇå¾²·À»¤µÄ¾¯ÖÓ¡£
https://thecyberexpress.com/u-s-taxpayer-data-lockbit-ransomware-efile/
4. Gleaming PiscesʹÓÃPyPI·Ö·¢PondRATºóÃÅ
9ÔÂ19ÈÕ£¬Unit 42 Ñо¿ÍŶӽÒÆÆÁ˳¯ÏÊÁ¥ÊôµÄAPT×éÖ¯Gleaming PiscesÌᳫµÄÒ»ÏîÐÂÍøÂç¹¥»÷£¬¸Ã×é֯ʹÓú¬ÓжñÒâ´úÂëµÄPythonÈí¼þ°ü£¬Õë¶ÔLinuxºÍmacOSϵͳÌᳫ¹¥»÷¡£ÕâЩ¶ñÒâÈí¼þ°üͨ¹ýPyPI´æ´¢¿â·Ö·¢£¬°üÀ¨¡°real-ids¡±¡¢¡°coloredtxt¡±µÈ£¬Ò»µ©×°Öü´»á°²ÅÅÃûΪPondRATµÄºóÃųÌÐò£¬ËüÊÇPOOLRATµÄÇáÁ¿¼¶°æ±¾£¬¾ß±¸Ô¶³Ì¿ØÖÆÊܺ¦ÕßϵͳµÄÄÜÁ¦¡£¹¥»÷Õßͨ¹ýPondRAT¿ÉÉÏ´«ÏÂÔØÎļþ¡¢Ö´ÐÐÏÂÁîÉõÖÁÔÝͣϵͳ²Ù×÷£¬Æä¿çƽ̨ÌØÕ÷ʹµÃ¹¥»÷ÓÈΪΣÏÕ¡£Gleaming PiscesÒÔÆäÓëÕì̽×ֵܾĹØÁª¼°ÔÚ¼ÓÃÜÇ®±ÒÁìÓòµÄÖØ´ó¹¥»÷Ô˶¯Öø³Æ£¬ÌØÊâÊÇͨ¹ýAppleJeusÔ˶¯·Ö·¢Ã°³ä¼ÓÃÜÇ®±ÒÈí¼þ¡£´Ë´Î¹¥»÷ÖУ¬PondRATÓëAppleJeus¶ñÒâÈí¼þ±£´æ´úÂëÏàËÆÐÔ£¬Åú×¢ÊÇGleaming PiscesÒ»Á¬Éø͸¹©Ó¦Á´µÄÒ»²¿·Ö¡£Ö»¹ÜPyPIÒÑÒƳýÏà¹Ø¶ñÒâ°ü£¬µ«Öж¾Èí¼þ°üµÄÍþвÒÀ¾É½ûÖ¹ºöÊÓ¡£ÎªÓ¦¶Ô´ËÀàÍþв£¬×éÖ¯ÐèÔöÇ¿Çå¾²²½·¥£¬°üÀ¨ÔÚÒýÈëµÚÈý·½Èí¼þ°üʱ¾ÙÐÐÑÏ¿áµÄ´úÂëÉó²éºÍÑéÖ¤£¬ÒÔ¼°ÊµÑéÔËÐÐʱ¼à¿Ø¡£
https://securityonline.info/north-korean-hackers-gleaming-pisces-poisoned-python-packages-target-linux-macos/
5. мÓÆÂBingXƽ̨ÔâºÚ¿Í¹¥»÷£¬Ëðʧ³¬4400ÍòÃÀÔª
9ÔÂ21ÈÕ£¬Ð¼ÓÆÈÎÃüÜÇ®±ÒÉúÒâƽ̨BingXÖÜÎåÈ·ÈÏ£¬Æäƽ̨ÔÚÔâÊÜÍøÂç¹¥»÷ºó£¬ËðʧÁËÁè¼Ý4400ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£ÖÜËÄÍí¼ä£¬Çø¿éÁ´Çå¾²¹«Ë¾¼à²âµ½×ʽðÒì³£Á÷¶¯£¬ËæºóBingXÐû²¼Òò¡°Ç®°üά»¤¡±ÔÝÍ£·þÎñ£¬²¢Ðû²¼ÉùÃ÷³Æ¼ì²âµ½ÈÈÇ®°ü¿ÉÄÜÔâÊܺڿ͹¥»÷£¬ÒѽôÆÈתÒÆ×ʲú²¢ÔÝÍ£Ìá¿î·þÎñ¡£ÆðÔ´¹ÀËãÏÔʾ£¬Ö±½ÓËðʧԼΪ4470ÍòÃÀÔª£¬µ«ÏêϸÊý¶îÈÔÔÚºËʵÖС£BingXÊ×ϯ²úÆ·¹ÙVivien Linͨ¹ýÉ罻ýÌåÌåÏÖ£¬¹«Ë¾½«ÓÃ×ÔÓÐ×ʽðÈ«¶îÌî²¹Ëðʧ£¬²¢Ç¿µ÷ÓªÒµÔËӪδÊÜÓ°Ï죬Ìá¿îºÍ´æ¿î·þÎñÔ¤¼Æ24СʱÄÚ»Ö¸´¡£Í¬Ê±£¬BingXÕýÓëSlowMistºÍChainalysisµÈÇå¾²¹«Ë¾ÏàÖú×·×Ù±»µÁ×ʽ𡣽üÆÚ£¬ÑÇÖÞµØÇø¶à¼Ò¼ÓÃÜƽ̨Ƶ·¢Çå¾²ÊÂÎñ£¬×ʽ𱻵Á½ð¶îÖØ´ó£¬Ö´·¨»ú¹¹ÒÑÔöÇ¿¶Ô´ËÀà·¸·¨µÄ¹¥»÷Á¦¶È¡£ÕâһϵÁÐÊÂÎñÔÙ´Î͹ÏÔÁ˼ÓÃÜÇ®±ÒÐÐÒµÔÚÇå¾²ÐÔ·½ÃæÃæÁÙµÄÌôÕ½¡£
https://therecord.media/44-million-stolen-from-crypto-platform-singapore
6. AsyncRAT¶ñÒâÈí¼þαװÆƽâÈí¼þÓÕÆÓû§ÏÂÔØ
9ÔÂ21ÈÕ£¬McAfee LabsÕ¹ÏÖÁËÒ»¸öÑÏËàµÄÍøÂçÇå¾²Ç÷ÊÆ£ºÍøÂç·¸·¨·Ö×Óͨ¹ýαװʢÐÐÆƽâÈí¼þÈçCCleaner¡¢EaseUS Partition MasterµÈ£¬Èö²¥ÃûΪAsyncRATµÄ¶ñÒâÈí¼þ¡£ÕâЩð³äÓ¦ÓÃʹÓÃÁËÓû§×·ÇóÃâ·Ñ¸ß¼¶Èí¼þµÄÐÄÀí£¬ÊµÔòÄÚº¬ÖØ´óµÄÔ¶³Ì»á¼ûľÂí¡£AsyncRATͨ¹ýÈ«ÐÄÉè¼ÆµÄαװսÂÔ£¬°üÀ¨Ç¶ÈëÕýµ±Èí¼þ¿ÉÖ´ÐÐÎļþ£¬ÀÖ³ÉÓÕÆÓû§ÏÂÔز¢Ö´ÐС£×°Öú󣬸öñÒâÈí¼þ»áʹÓÃWindows Defenderɨ³ýÏîºÍ»ìÏýÊÖÒÕÌӱܼì²â£¬²¢Í¨¹ýÇéÐαäÁ¿²Ù×÷ºÍÒþ²ØµÄbatÎļþά³ÖÆä²Ù×÷²»±»·¢Ã÷¡£ÆäÖ÷ҪĿµÄÊǽ¨Éè¶ÔÊÜѬȾ»úеµÄÔ¶³ÌÅþÁ¬£¬Èù¥»÷ÕßÄܾÙÐа´¼ü¼Í¼¡¢Êý¾ÝÇÔÈ¡µÈ¶ñÒâÔ˶¯¡£AsyncRAT»¹½ÓÄÉAES½âÃܺÍGzip½âѹËõÀ´Òþ²ØÉèÖã¬ÔöÇ¿ÆäÒþ²ØÐÔ¡£×Ô2024Äê3ÔÂÒÔÀ´£¬ÕâÖÖÍþвÔÚÈ«Çò¹æÄ£ÄÚѸËÙÉìÕÅ£¬ÏÔʾ³öÍøÂç·¸·¨·Ö×ÓʹÓÃÓû§ÐÄÀíÈõµãÈö²¥¶ñÒâÈí¼þµÄ¸ßÃ÷ÊֶΡ£
https://securityonline.info/beware-of-fake-downloads-asyncrat-spreads-via-popular-software-cracks/