PipeMagicľÂíʹÓÃαÔìChatGPTÓ¦ÓóÌÐò¹¥»÷ɳÌØ°¢À­²®

Ðû²¼Ê±¼ä 2024-10-17

1. PipeMagicľÂíʹÓÃαÔìChatGPTÓ¦ÓóÌÐò¹¥»÷ɳÌØ°¢À­²®


10ÔÂ15ÈÕ£¬¿¨°Í˹»ùÈ«ÇòÑо¿ÓëÆÊÎöÍŶӣ¨GReAT£©½üÆÚÅû¶ÁËÒ»ÏîеÄÍøÂç¹¥»÷Ô˶¯£¬¸ÃÔ˶¯Ê¹ÓÃÒ»ÖÖÃûΪPipeMagicµÄÖØ´óºóÃÅľÂí¾ÙÐÐÈö²¥£¬ÆäµØÀíÄ¿µÄÒÑ´ÓÑÇÖÞÀ©Õ¹µ½É³ÌØ°¢À­²®¡£´Ë´Î¹¥»÷ÖУ¬ÍøÂç·¸·¨·Ö×Ó½ÓÄÉÁËÒ»¿îÓÃRust¿ª·¢µÄαÔìChatGPTÓ¦ÓóÌÐò×÷Ϊ³õʼѬȾǰÑÔ£¬¸Ã³ÌÐòʹÓó£¼ûµÄRust¿âÀ´¹æ±ÜÆðÔ´¼ì²â£¬µ«ÔÚÖ´ÐÐʱ½öÏÔʾ¿ÕȱÆÁÄ»£¬²¢Òþ²ØÒ»¸ö°üÀ¨¶ñÒ⸺ÔصļÓÃÜÊý¾ÝÊý×é¡£ÔÚºóÐø½×¶Î£¬¶ñÒâÈí¼þ»á½ÓÄÉÃû³Æ¹þÏ£Ëã·¨¶¨Î»Òªº¦µÄWindows APIº¯Êý£¬ÒÔ·ÖÅÉÄÚ´æ¡¢¼ÓÔØPipeMagicºóÃÅ¡¢ÉèÖÃÉèÖò¢Æô¶¯¶ñÒâÈí¼þ¡£PipeMagicľÂí¾ßÓÐÆæÒìµÄ¹¦Ð§£¬Äܹ»ÌìÉúÒ»¸ö16×Ö½ÚµÄËæ»úÊý×飬ÓÃÓÚ½¨ÉèÃüÃû¹ÜµÀÒÔʵÏÖÒþ²ØͨѶºÍÏÂÁîÖ´ÐУ¬ÆäÏÂÁîºÍ¿ØÖÆ£¨C2£©·þÎñÆ÷±»ÍйÜÔÚMicrosoft AzureÉÏ¡£


https://securityonline.info/pipemagic-trojan-exploits-fake-chatgpt-app-to-target-saudi-arabian-organizations/


2. ErrorFatherÔ˶¯Ê¹ÓÃδ±»·¢Ã÷CerberusÒøÐÐľÂí¾ÙÐÐÖØ´ó¹¥»÷


10ÔÂ15ÈÕ£¬ÍøÂçÇå¾²ÌṩÉÌCyble±¨¸æÁËÒ»ÏîеÄÖØ´ó¶ñÒâÔ˶¯£¬¸ÃÔ˶¯ÕýÔÚʹÓÃδ±»·¢Ã÷µÄCerberus AndroidÒøÐÐľÂí¸ºÔØ¡£Cyble·¢Ã÷ÁË15¸öð³äChromeºÍPlay StoreÓ¦ÓõĶñÒâÑù±¾£¬ÕâЩÑù±¾½ÓÄɶà½×¶ÎͶ·ÅÆ÷°²ÅÅÒøÐÐľÂí¸ºÔØ£¬²¢Ê¹ÓÃÁËCerberusÒøÐÐľÂí¡£CerberusÊÇÒ»ÖÖ¿ÉÒÔÇÔÈ¡ÒøÐÐÓ¦ÓóÌÐòµÇ¼ƾ֤¡¢ÐÅÓÿ¨ÏêϸÐÅÏ¢ºÍÆäËûСÎÒ˽¼ÒÐÅÏ¢µÄ¶ñÒâ³ÌÐò£¬×Ô2019Äê·ºÆðÒÔÀ´ÒѳÉΪ×îÖøÃûµÄÒøÐÐľÂíÖ®Ò»¡£Ö»¹ÜÆäÔ´´úÂëÔÚ2020Äêй¶£¬µ¼Ö·ºÆðÁËеıäÖÖÈçAlienºÍERMAC£¬µ«Cerberus¼°Æä·ÖÖ§ÈÔÔÚÒ»Ö±±»ÖØÐÂʹÓᣴ˴ÎErrorFatherÔ˶¯ÖУ¬ÍþвÐÐΪÕ߶ԶñÒâÈí¼þ¾ÙÐÐÁËÉÔ΢Ð޸ģ¬µ«Ö÷Òª»ùÓÚԭʼµÄCerberus´úÂ룬½ÓÄÉÁËÖØ´óµÄѬȾÁ´£¬Ê¹¼ì²âºÍɾ³ýÊÂÇé±äµÃÖØ´ó¡£×îÖÕµÄÓÐÓÃÔغɽÓÄɼüÅ̼ͼ¡¢ÁýÕÖ¹¥»÷¡¢VNCºÍÓòÌìÉúËã·¨(DGA)À´Ö´ÐжñÒâÔ˶¯¡£Cyble½¨ÒéÓû§½ö´Ó¹Ù·½Ó¦ÓÃÊÐËÁÏÂÔØÈí¼þ£¬Ê¹ÓÃ×ÅÃû·À²¡¶¾ºÍ»¥ÁªÍøÇå¾²Èí¼þ°ü£¬Ê¹ÓÃÇ¿ÃÜÂëºÍ¶àÒòËØÉí·ÝÑéÖ¤£¬ÆôÓÃÉúÎïʶ±ðÇå¾²¹¦Ð§£¬²¢È·±£Android×°±¸ÉÏÆôÓÃÁËGoogle Play Protect¡£


https://www.infosecurity-magazine.com/news/cerberus-android-banking-trojan/


3. CISAÖÒÑÔSolarWinds WHDÈí¼þÑÏÖØÇå¾²Îó²îÕý±»Æð¾¢Ê¹ÓÃ


10ÔÂ16ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼£¬Òѽ«Ó°ÏìSolarWinds Web Help Desk (WHD) Èí¼þµÄÑÏÖØÇå¾²Îó²îCVE-2024-28987£¨CVSSÆÀ·Ö9.1£©Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖУ¬²¢Ö¸³öÒÑÓÐÖ¤¾ÝÅú×¢¸ÃÎó²îÕýÔÚ±»×Ô¶¯Ê¹ÓᣴËÎó²îÓëÓ²±àÂëƾ֤Ïà¹Ø£¬¿ÉÄÜʹԶ³Ìδ¾­Éí·ÝÑéÖ¤µÄÓû§»ñµÃ»á¼ûȨÏÞ²¢¾ÙÐÐÊý¾ÝÐ޸ġ£SolarWindsÔÚ2024Äê8ÔÂÏÂÑ®Ê״ιûÕæÁ˸ÃÎó²îÏêÇ飬ËæºóÍøÂçÇå¾²¹«Ë¾Horizon3.ai½øÒ»²½ÌṩÁËÊÖÒÕϸ½Ú¡£Çå¾²Ñо¿Ô±Ôú¿Ë¡¤ººÀûÖ¸³ö£¬¸ÃÎó²îÄÜÈù¥»÷ÕßÔ¶³Ì¶ÁÈ¡ºÍÐÞ¸Ä×ÊÖų́Ʊ֤ÖеÄÃô¸ÐÐÅÏ¢£¬ÈçÖØÖÃÃÜÂëÇëÇóºÍ·þÎñÕÊ»§Æ¾Ö¤¡£Ö»¹ÜÏÖÔÚÉв»ÇåÎú¸ÃÎó²îµÄÏêϸʹÓÃÇéÐκÍʹÓÃÕßÉí·Ý£¬µ«ÕâÒ»·¢Ã÷½ôËæCISAÁ½¸öÔÂÇ°½«Í³Ò»Èí¼þÖеÄÁíÒ»¸ßΣÎó²î£¨CVE-2024-28986£¬CVSSÆÀ·Ö9.8£©ÄÉÈëKEVĿ¼֮ºó¡£¼øÓÚ´Ë£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÐèÔÚ2024Äê11ÔÂ5ÈÕÇ°Ó¦ÓÃ×îÐÂÐÞ¸´³ÌÐò£¨°æ±¾12.8.3 Hotfix 2»ò¸ü¸ß£©£¬ÒÔÈ·±£ÍøÂçÇå¾²¡£


https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html


4. ºÚ¿ÍʹÓÃEDRSilencerºì¶Ó¹¤¾ßÈƹýÇå¾²·À»¤¾ÙÐй¥»÷


10ÔÂ15ÈÕ£¬Ñо¿Ö°Ô±¿ËÈÕ·¢Ã÷ÁËÒ»ÖÖÃûΪEDRSilencerµÄºì¶Ó²Ù×÷¹¤¾ß£¬¸Ã¹¤¾ßÄܹ»Ê¶±ðÇå¾²¹¤¾ß²¢½«ÆäÏòÖÎÀí¿ØÖÆ̨·¢³öµÄ¾¯±¨¾²Òô£¬´Ó¶ø×ÊÖú¹¥»÷ÕßÌӱܼì²â¡£EDRSilencerÊÇÒ»¸ö¿ªÔ´¹¤¾ß£¬ÊÜMdSec NightHawk FireBlockÆô·¢¶ø¿ª·¢£¬¿É¼ì²âÔËÐÐÖеĶ˵ã¼ì²âºÍÏìÓ¦£¨EDR£©Àú³Ì£¬²¢Ê¹ÓÃWindows¹ýÂËƽ̨£¨WFP£©¼à¿Ø¡¢×èÖ¹»òÐÞ¸ÄÍøÂçÁ÷Á¿¡£Í¨¹ý×Ô½ç˵¹æÔò£¬¹¥»÷Õß¿ÉÒÔÆÆËðEDR¹¤¾ßÓëÆäÖÎÀí·þÎñÆ÷Ö®¼äµÄÊý¾Ý½»Á÷£¬×èÖ¹¾¯±¨ºÍÒ£²â±¨¸æµÄ·¢ËÍ¡£ÔÚ×îа汾ÖУ¬EDRSilencer¿É¼ì²â²¢×èÖ¹16ÖÖÏÖ´úEDR¹¤¾ß¡£Ç÷ÊƿƼ¼µÈÍøÂçÇå¾²¹«Ë¾¶ÔEDRSilencer¾ÙÐÐÁ˲âÊÔ£¬·¢Ã÷һЩÊÜÓ°ÏìµÄEDR¹¤¾ß¿ÉÄÜÈÔÄÜ·¢Ëͱ¨¸æ£¬µ«EDRSilencerÔÊÐí¹¥»÷ÕßÀ©Õ¹Ä¿µÄÀú³ÌÁбíÒÔº­¸ÇÖÖÖÖÇå¾²¹¤¾ß¡£ÕâʹµÃ¶ñÒâÈí¼þ»òÆäËû¶ñÒâÔ˶¯¿ÉÄÜÈÔδ±»·¢Ã÷£¬ÔöÌíÁ˹¥»÷ÀֳɵĿÉÄÜÐÔ¡£Ç÷ÊƿƼ¼½¨Ò齫EDRSilencer×÷Ϊ¶ñÒâÈí¼þ¾ÙÐмì²â£¬²¢ÊµÑé¶àÌõÀíµÄÇå¾²¿ØÖÆÀ´Ìá·À´ËÀ๥»÷¡£


https://www.bleepingcomputer.com/news/security/edrsilencer-red-team-tool-used-in-attacks-to-bypass-security/


5. OwlTingÒòAWS S3´æ´¢Í°ÉèÖùýʧ£¬Ì»Â¶765,000Óû§Ãô¸ÐÊý¾Ý


10ÔÂ15ÈÕ£¬Çø¿éÁ´ÊÖÒÕ¹«Ë¾OwlTingÒòÉèÖùýʧµÄÑÇÂíÑ·S3´æ´¢Í°£¬ÒâÍâ̻¶ÁË765,000ÃûÓû§µÄÃô¸ÐÊý¾Ý£¬Ö÷ÒªÓ°Ïį̀ÍåµÄÂùݿÍÈË¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨È«Ãû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãÒÔ¼°ÂùÝÔ¤¶©ÏêÇéµÈСÎÒ˽¼ÒÐÅÏ¢¡£OwlTing½¨ÉèÓÚ2010Ä꣬ÊÇÒ»¼Ò·þÎñÓÚÈ«ÇòÂÃÓΡ¢Ê³ÎïÇå¾²¡¢Âùݡ¢Ã½ÌåºÍÆäËûµç×ÓÉÌÎñÁìÓò²¢Ìṩ×ÅÃûÇø¿éÁ´½â¾ö¼Æ»®µĄ̈Í幫˾¡£OwlTingÈ·ÈÏÁËÊý¾Ýй¶£¬µ«Éù³Æ²»Éæ¼°Ãô¸ÐÊý¾Ý£¬È»¶øCybernewsÑо¿Ö°Ô±ÖÒÑÔ˵£¬ÕâЩÐÅÏ¢¿ÉÄܵ¼ÖÂÉí·Ý͵ÇÔºÍڲƭ¡£Ð¹Â¶µÄÊý¾Ý¶ÔÍøÂç·¸·¨·Ö×ÓÀ´ËµºÜÊÇÓмÛÖµ£¬¿ÉÄܱ»ÓÃÓÚÓã²æʽÍøÂç´¹ÂÚ¡¢ÓïÒô´¹ÂÚ¡¢¶ÌÐÅ´¹Âڵȹ¥»÷¡£Cybernews½¨Òé½ÓÄÉһϵÁв½·¥À´»º½âÑÇÂíÑ·S3´æ´¢Í°Ì»Â¶µÄΣº¦£¬°üÀ¨ÏÞÖƹûÕæ»á¼û¡¢¼à¿Ø»á¼ûÈÕÖ¾¡¢ÆôÓ÷þÎñÆ÷¶Ë¼ÓÃܵÈ¡£


https://cybernews.com/security/taiwan-visitors-exposed-in-massive-data-leak-owlting/


6. ³¯ÏʺڿÍ×éÖ¯ScarCruftʹÓÃIEÁãÈÕÎó²îÌᳫ¹¥»÷


10ÔÂ16ÈÕ£¬³¯ÏʺڿÍ×éÖ¯ScarCruft£¨ÓÖ³ÆAPT37»òRedEyes£©ÓÚ5ÔÂÌᳫ´ó¹æÄ£¹¥»÷£¬Ê¹ÓÃInternet ExplorerµÄÁãÈÕÎó²îCVE-2024-39178£¬Í¨¹ýÌØÖƵÄToastµ¯³ö¹ã¸æѬȾĿµÄ×°±¸£¬Ö²ÈëRokRAT¶ñÒâÈí¼þÒÔÇÔÈ¡Êý¾Ý¡£¸ÃÎó²îΪÀàÐÍ»ìÏýÎó²î£¬ASECºÍNCSC·¢Ã÷ºóѸËÙ֪ͨ΢Èí£¬Î¢ÈíÓÚ8ÔÂÐû²¼Çå¾²¸üÐÂÐÞ¸´¡£Ñо¿Ö°Ô±Ö¸³ö£¬´Ë´Î¹¥»÷µÄÎó²îÓëScarCruftÒÑÍùʹÓõÄCVE-2022-41128Îó²îÏàËÆ£¬½öÔöÌíÈýÐдúÂëÒÔÈƹý¾ÉÐÞ¸´¡£ScarCruftÈëÇÖº«¹ú¹ã¸æ¹«Ë¾·þÎñÆ÷£¬ÔÚÊ¢ÐÐÃâ·ÑÈí¼þÖÐÍÆËͺ¬¶ñÒâiframeµÄToast¹ã¸æ£¬µ±ÓÉInternet ExploreräÖȾʱ£¬´¥·¢Ô¶³Ì´úÂëÖ´ÐС£RokRAT±äÖÖÿ30·ÖÖÓ½«Ìض¨Îļþ´«ÊäÖÁYandexÔÆʵÀý£¬Í¬Ê±Ö´ÐмüÅ̼ͼ¡¢¼àÊÓ¼ôÌù°å¸ü¸ÄºÍÆÁÄ»½Øͼ²¶»ñ¡£¹¥»÷ͨ¹ýËIJ½Àú³Ì×¢Èë¡°explorer.exe¡±Àú³ÌÒÔÌӱܼì²â£¬Èô¼ì²âµ½Avast»òSymantec·À²¡¶¾Èí¼þ£¬Ôò½«¶ñÒâÈí¼þ×¢ÈëËæ»ú¿ÉÖ´ÐÐÎļþÖС£Í¨¹ýÔÚWindowsÆô¶¯Ê±Ìí¼Ó×îÖÕÓÐÓøºÔز¢×¢²áµ½ÏµÍ³µ÷Àí³ÌÐòÖУ¬ÊµÏÖ³¤ÆÚÐÔѬȾ¡£


https://www.bleepingcomputer.com/news/security/malicious-ads-exploited-internet-explorer-zero-day-to-drop-malware/