Öж«AIºô½ÐÖÐÐÄƽ̨Ôâ´ó¹æÄ£Êý¾Ýй¶£¬Ì»Â¶Çå¾²Òþ»¼
Ðû²¼Ê±¼ä 2024-10-1210ÔÂ10ÈÕ£¬Ò»´Î´ó¹æÄ£Êý¾Ýй¶ÊÂÎñÔÚÖж«µØÇøÆع⣬É漰һСÎÒ˽¼Ò¹¤ÖÇÄܺô½ÐÖÐÐÄƽ̨£¬Áè¼Ý1020ÍòÌõ¶Ô»°¼Í¼±»µÁ¡£¾ÝÍøÂçÇå¾²¹«Ë¾Resecurity³Æ£¬´Ë´ÎÎó²îʹ¹¥»÷ÕßÄܹ»Î´¾ÊÚȨ»á¼û¸Ãƽ̨µÄÖÎÀíÒDZí°å£¬ÍøÂçÏûºÄÕß¡¢ÔËÓªÉ̺ÍAIÊðÀíÖ®¼äµÄ´ó×Ú»¥¶¯Êý¾Ý¡£ÕâЩÊý¾Ý¿ÉÄܱ»ÓÃÓڸ߼¶Ú²Æ¡¢ÍøÂç´¹ÂÚÍýÏëºÍÆäËû¶ñÒâÔ˶¯£¬ÓÈÆäÊÇСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©µÄй¶£¬ÔöÌíÁËÄ£ÄâÕýµ±¿Í»§·þÎñ½»Á÷¾ÙÐÐڲƵÄΣº¦¡£¸ÃÊÂÎñ͹ÏÔÁËÈ˹¤ÖÇÄÜƽ̨ÔÚÌá¸ßЧÂʵÄͬʱ£¬Ò²´øÀ´ÁËÊý¾ÝÒþ˽µÄÖØ´óÍþв¡£ËäÈ»ÈëÇÖÒÑ»ñµÃ»º½â£¬µ«ÈËÃǶԵÚÈý·½È˹¤ÖÇÄÜϵͳµÄÇå¾²ÐԺʹ¦Öóͷ£Ãô¸Ð¿Í»§Êý¾ÝµÄÄÜÁ¦ÌåÏÖµ£ÐÄ¡£ResecurityÇ¿µ÷£¬¶Ô»°Ê½AIƽ̨ÒѳÉΪ´óÐÍÆóÒµºÍÕþ¸®»ú¹¹ÏÖ´úIT¹©Ó¦Á´µÄÒªº¦ÒªËØ£¬ÐèҪƽºâ¹Å°åÍøÂçÇå¾²²½·¥ºÍÕë¶ÔAIÏêϸÇéÐεÄרÃŲ½·¥À´±£»¤ËüÃÇ¡£
https://www.infosecurity-magazine.com/news/10m-exposed-ai-call-center-hack/
2. APT29ºÚ¿Í´ó¹æÄ£¹¥»÷ZimbraºÍTeamCity·þÎñÆ÷
10ÔÂ10ÈÕ£¬ÃÀÓ¢ÍøÂç»ú¹¹½ñÈÕÍŽáÖÒÑԳƣ¬Óë¶íÂÞ˹¶ÔÍâÇ鱨¾Ö(SVR)Ïà¹ØµÄAPT29ºÚ¿Í×éÖ¯ÕýÔÚ¡°´ó¹æÄ£¡±¹¥»÷È«Çò¹æÄ£ÄÚδ´ò²¹¶¡µÄZimbraºÍJetBrains TeamCity·þÎñÆ÷¡£ÕâЩ¹¥»÷ʹÓÃÁËCVE-2022-27924ºÍCVE-2023-42793Îó²î£¬Ö¼ÔÚÇÔÈ¡µç×ÓÓʼþÕÊ»§Æ¾Ö¤ºÍ¾ÙÐÐÔ¶³Ì´úÂëÖ´ÐеȶñÒâÔ˶¯¡£SVRºÚ¿Í×éÖ¯£¬Ò²±»³ÆΪCozy Bear¡¢Midnight BlizzardºÍDukes£¬¶àÄêÀ´Ò»Ö±Õë¶ÔÃÀ¹úºÍÅ·ÖÞµÄÕþ¸®ºÍ˽ÈË×éÖ¯¡£´Ë´ÎÖÒÑÔÒªÇóÍøÂç·ÀÓùÕßÁ¬Ã¦ÐÞ²¹Ì»Â¶µÄ·þÎñÆ÷£¬²¢°²ÅÅÇå¾²²¹¶¡»ººÍ½â²½·¥ÒÔ±ÜÃâÇå¾²Îó²î¡£´ËÇ°£¬APT29ºÚ¿ÍÒѲ߻®ÁËSolarWinds¹©Ó¦Á´¹¥»÷²¢¹¥ÆÆÁ˶à¸öÃÀ¹úÁª°î»ú¹¹£¬»¹ÈëÇÖÁ˱±Ô¼¹ú¼ÒµÄMicrosoft 365ÕË»§ºÍ΢Èí¸ß¹ÜµÈ¹«Ë¾µÄExchange OnlineÕË»§¡£ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÍøÂçÇå¾²Ö÷¹ÜÌåÏÖ£¬ÕâÒ»Ô˶¯¶ÔÕþ¸®ºÍ˽Ӫ²¿·Ö×é³ÉÁËÈ«ÇòÍþв£¬ÐèÒª³¹µ×Éó²éÇå¾²¿ØÖƲ½·¥¡£
https://www.bleepingcomputer.com/news/security/us-uk-warn-of-russian-apt29-hackers-targeting-zimbra-teamcity-servers/
3. ºÚ¿ÍʹÓÃYouTubeƽ̨Èö²¥ÖØ´óµÄ¶ñÒâÈí¼þ
10ÔÂ10ÈÕ£¬¿¨°Í˹»ù½üÆÚ·¢Ã÷ºÚ¿ÍƵÈÔʹÓÃYouTubeƽ̨Èö²¥ÖØ´ó¶ñÒâÈí¼þ¡£ºÚ¿Íͨ¹ýЮÖÆÈÈÃÅƵµÀαװ³ÉÔʼ´´×÷Õߣ¬Ðû²¼¶ñÒâÁ´½Ó¶ÔÓû§ÊµÑéÕ©Æ¡£2022ÄêºÚ¿ÍÔøÕë¶Ô¶íÂÞ˹Óû§ÊµÑé¼ÓÃÜÇ®±ÒÍÚ¾òÔ˶¯£¬Ê¹Óñ»Ð®ÖƵÄYouTubeÕË»§·Ö·¢Î±×°³ÉÊ¢ÐÐÓ¦ÓõĶñÒâÎļþ¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶à½×¶Î¹¥»÷ÐòÁÐѬȾϵͳ£¬½ÓÄÉÒþ²Ø¶ñÒâ´úÂë²¢¼á³ÖÊðÃûÓÐÓÃÐÔµÄÊÖÒÕ£¬Ê¹ÓöàÖÖ»úÖƽ¨É賤ÆÚÐÔ£¬²¢ÊµÑéÖØ´óµÄ·ÀÓù¹æ±ÜÊÖÒÕÒþ²Ø¶ñÒâ×é¼þ¡£×îÖÕÓÐÓÃÔغÉΪSilentCryptoMiner£¬ÓÃÓÚÍÚ¾òÒþ˽¼ÓÃÜÇ®±Ò£¬²¢ÍøÂçϵͳң²âÊý¾Ýͨ¹ýTelegram»úеÈËAPI´«Êä¡£±ðµÄ£¬¸Ã¶ñÒâÔ˶¯»¹Õë¶ÔÀ´×԰׶íÂÞ˹¡¢Ó¡¶ÈµÈ¶à¸ö¹ú¼ÒµÄÓû§£¬ÕâЩÓû§Òò³£½ûÓÃAV¹¤¾ß±£»¤ºÍÇå¾²²½·¥¶øÒ×Êܹ¥»÷¡£¸Ã¹¥»÷µÄÖØ´óÐÔÌåÏÖÔÚÄ£¿é»¯½á¹¹ÉÏ£¬¿Éƾ֤ĿµÄ¶¯Ì¬¼ÓÔزî±ðÓÐÓÃÔغÉ×é¼þ£¬½ÓÄÉÏȽø»ìÏýÒªÁìºÍ·´ÆÊÎö¹¦Ð§¼á³ÖÒþ²ØÐÔ£¬ÈÚÈëÖØ´óµÄÆóÒµ¼¶¹¥»÷ÊÖÒÕ¡£
https://cybersecuritynews.com/hackers-using-youtube-videos-to-deliver-sophisticated-malware/
4. LynxÀÕË÷Èí¼þ£ºINCÀÕË÷Èí¼þµÄбäÖÖÓëË«ÖØÀÕË÷Íþв
10ÔÂ11ÈÕ£¬Palo Alto Networks ½üÆÚ·¢Ã÷ÁËÒ»ÖÖÃûΪ¡°Lynx¡±µÄÐÂÀÕË÷Èí¼þ£¬ËüÏÖʵÉÏÊǶÔ2023Äê8Ô·ºÆðµÄINCÀÕË÷Èí¼þµÄ¸üÃû£¬Á½Õß´úÂëÏàËƶȸߴï48%£¬ÇÒÔ¼70.8%µÄ½¹µã¹¦Ð§±»Öظ´Ê¹Óá£LynxÀÕË÷Èí¼þÖ÷ÒªÕë¶ÔÃÀ¹úºÍÓ¢¹ú¸÷ÐÐÒµ×éÖ¯£¬°üÀ¨ÁãÊÛ¡¢·¿µØ²ú¡¢ÐÞ½¨ºÍ½ðÈÚ·þÎñµÈ£¬ÒÔÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©ÐÎʽ¹©ÆäËûÍøÂç·¸·¨·Ö×ÓʹÓá£Æä×îΣÏյķ½ÃæÖ®Ò»ÊÇʵÑéË«ÖØÀÕË÷Õ½ÂÔ£¬¼´ÔÚ¼ÓÃÜÎļþÇ°ÇÔÈ¡Êܺ¦ÕßÊý¾Ý£¬Èô²»Ö§¸¶Êê½ð£¬Ôò¿ÉÄÜ鶻ò³öÊÛÕâЩÊý¾Ý¡£LynxÀÕË÷Èí¼þÉù³ÆÒÑÈëÇÖ¶à¼Ò¹«Ë¾£¬²¢ÔÚ¹«¹²ÍøÕ¾ÉÏչʾ±»µÁÊý¾Ý£¬Ö»¹ÜÉù³Æ±Ü¿ªÁËÕþ¸®»ú¹¹¡¢Ò½ÔººÍ·ÇÓªÀû×éÖ¯£¬µ«Æä¹¥»÷ÈÔ¶ÔÐí¶àÐÐÒµ×é³ÉÖØ´óÍþв¡£¸ÃÀÕË÷Èí¼þʹÓø߼¶¼ÓÃÜËã·¨£¬ÈçAES-128ºÍCurve25519 Donna£¬½âÃÜÄѶȼ«´ó£¬ÇÒרÃÅÕë¶ÔWindowsϵͳ£¬Ê¹ÓÃRestart Manager APIÌá¸ß¼ÓÃÜЧÂÊ¡£±ðµÄ£¬LynxÀÕË÷Èí¼þÉè¼ÆÎÞа£¬ÔÊÐí¹¥»÷Õßͨ¹ýÏÂÁîÐвÎÊý×Ô½ç˵ִÐУ¬ÒÔÖª×ãÌض¨ÐèÇó¡£
https://securityonline.info/lynx-ransomware-the-evolution-of-inc-ransomware-into-a-potent-cyber-threat/
5. CISAÖÒÑÔ£ºÎ´¼ÓÃÜF5 BIG-IP Cookie±»ÀÄÓþÙÐÐÍøÂç¹¥»÷
10ÔÂ11ÈÕ£¬CISA·¢³öÖÒÑÔ£¬Ö¸³öÍøÂçÍþвÐÐΪÕßÕýÔÚÀÄÓÃδ¼ÓÃܵÄF5 BIG-IP³¤ÆÚcookieÀ´Ê¶±ðºÍ¶¨Î»Ä¿µÄÍøÂçÉϵÄÆäËûÄÚ²¿×°±¸¡£ËûÃÇͨ¹ý»æÖÆÄÚ²¿×°±¸Í¼£¬ÔÚÍøÂç¹¥»÷µÄÍýÏë½×¶Îʶ±ðÒ×Êܹ¥»÷µÄ×°±¸¡£F5 BIG-IPÊÇÒ»Ì×Ó¦ÓóÌÐò½»¸¶ºÍÁ÷Á¿ÖÎÀí¹¤¾ß£¬ÆäÍâµØÁ÷Á¿ÖÎÀíÆ÷£¨LTM£©Ä£¿éʹÓó¤ÆÚcookieÀ´Î¬³Ö»á»°Ò»ÖÂÐÔ£¬µ«ÕâЩcookieĬÈÏδ¼ÓÃÜ¡£´Ó11.5.0°æ×îÏÈ£¬ÖÎÀíÔ±¿ÉÑ¡ÔñÇ¿ÖƶÔËùÓÐcookie¾ÙÐмÓÃÜ£¬µ«Ñ¡Ôñ²»ÆôÓõÄÓû§½«ÃæÁÙÇ徲Σº¦¡£ÕâЩcookie°üÀ¨±àÂëµÄIPµØµã¡¢¶Ë¿ÚºÅºÍÄÚ²¿¸ºÔØƽºâ·þÎñÆ÷µÄÉèÖã¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¶àÄêÇ°ÒÑ·ÖÏíÔõÑùʹÓÃδ¼ÓÃܵÄcookieÀ´²éÕÒÒþ²ØµÄÄÚ²¿·þÎñÆ÷¡£CISA½¨ÒéF5 BIG-IPÖÎÀíÔ±Éó²é¹©Ó¦É̹ØÓÚÔõÑù¼ÓÃÜÕâЩ³¤ÆÚcookieµÄ˵Ã÷£¬²¢Ö¸³öF5ÒÑ¿ª·¢³öÒ»ÖÖÃûΪ¡°BIG-IP iHealth¡±µÄÕï¶Ï¹¤¾ß£¬ÓÃÓÚ¼ì²â²úÆ·µÄ¹ýʧÉèÖò¢ÏòÖÎÀíÔ±·¢³öÖÒÑÔ¡£µ±ÉèÖÃΪ¡°±ØÐ衱ʱ£¬ËùÓг¤ÆÚÐÔcookie¶¼Ê¹ÓÃÇ¿AES-192¼ÓÃܾÙÐмÓÃÜ¡£
https://www.bleepingcomputer.com/news/security/cisa-hackers-abuse-f5-big-ip-cookies-to-map-internal-servers/
6. Mozilla½ôÆÈÐû²¼FirefoxÇå¾²¸üУ¬ÐÞ¸´ÑÏÖØÎó²îCVE-2024-9680
10ÔÂ11ÈÕ£¬MozillaΪÆäFirefoxä¯ÀÀÆ÷Ðû²¼Á˽ôÆÈÇå¾²¸üУ¬ÒÔ½â¾öÒ»¸ö±»ÆÕ±éʹÓõÄÑÏÖØÎó²î£¬¸ÃÎó²î±»×·×ÙΪCVE-2024-9680£¬CVSSÆÀ·ÖΪ9.8£¬¿ÉÄÜÔÊÐí¹¥»÷ÕßÔÚÓû§ÏµÍ³ÉÏÖ´ÐÐí§Òâ´úÂë¡£Îó²îλÓÚFirefoxµÄ¶¯»Ê±¼äÖá×é¼þÖУ¬ÊÇWeb Animations APIµÄÒ»ÖÖ»úÖÆ£¬ÏêϸΪÊͷźóʹÓÃÎó²î£¬¿Éµ¼ÖÂÄÚ´æË𻵡£MozillaÔÚÊÕµ½·´²¡¶¾¹«Ë¾ESETµÄÖÒÑÔºó£¬Ñ¸ËÙÕÙ¼¯ÍŶӶÔÎó²î¾ÙÐÐÄæÏò¹¤³Ì£¬²¢ÔÚ25СʱÄÚ¿ª·¢²¢Ðû²¼ÁËÐÞ¸´³ÌÐò¡£ÐÞ²¹µÄ°æ±¾°üÀ¨Firefox 131.0.2µÈ¶à¸ö°æ±¾¡£±ðµÄ£¬MozillaÒÑÈ·ÈϸÃÎó²îÕýÔÚ±»Æð¾¢Ê¹ÓÃÀ´¹¥»÷Torä¯ÀÀÆ÷Óû§£¬µ«¹ØÓÚ¹¥»÷µÄÏêϸϸ½ÚÈÔ²»µÃ¶øÖª¡£Òò´Ë£¬Óû§Ó¦Á¬Ã¦¸üÐÂÖÁ×îа汾µÄFirefoxÒÔ±£»¤×Ô¼ºµÄϵͳÇå¾²¡£
https://securityonline.info/mozilla-confirms-active-attacks-on-tor-browser-via-firefox-vulnerability/