Ô½ÄÏÍþв×é֯ʹÓöñÒâÈí¼þÃé×¼Êý×ÖÓªÏúר¼Ò

Ðû²¼Ê±¼ä 2024-10-22
1. Ô½ÄÏÍþв×é֯ʹÓöñÒâÈí¼þÃé×¼Êý×ÖÓªÏúר¼Ò


10ÔÂ20ÈÕ £¬Cyble Ñо¿ÓëÇ鱨ʵÑéÊÒ (CRIL) ×î½ü½ÒÆÆÁËÒ»´ÎÕë¶ÔÊý×ÖÓªÏúרҵÈËÊ¿ £¬ÌØÊâÊÇ Facebook ºÍ Instagram ¹ã¸æר¼ÒµÄÖØ´ó¹¥»÷Ô˶¯¡£×Ô 2022 Äê 7 ÔÂÆ𠣬һ¸öÔ½ÄÏÍþв×éÖ¯Ò»Ö±ÔÚÈö²¥ Ducktail ºÍ Quasar RAT µÈ¶ñÒâÈí¼þ £¬½ÓÄÉÍøÂç´¹ÂÚ¡¢É³ºÐÌӱܺÍÌØȨÉý¼¶ÊÖÒÕ¡£¹¥»÷ʼÓÚ°üÀ¨Î±×°³É PDF µÄ¶ñÒâ LNK ÎļþµÄÍøÂç´¹ÂÚÓʼþ £¬ÕâЩÎļþ»áÖ´ÐÐ PowerShell ÏÂÁî £¬ÏÂÔØ»ìÏýºÍ±àÂë¹ýµÄ¾ç±¾ £¬Í¨³£ÍйÜÔÚ Dropbox µÈƽ̨ÉÏ¡£Í¨¹ý¶àÖØ·´É³ºÐºÍ·´µ÷ÊÔ¼ì²é £¬¶ñÒâÈí¼þÈ·±£½öÔÚÕæÕæÏàÐÎÖÐÔËÐС£Ò»µ©È·ÈÏÄ¿µÄ £¬¾ç±¾½«½âÃÜÓÐÓÃÔغÉ £¬°²ÅÅ Quasar RAT £¬Ê¹¹¥»÷ÕßÄÜÍêÈ«¿ØÖÆÊܺ¦Õßϵͳ £¬ÇÔÈ¡Êý¾ÝºÍƾ֤¡£¸Ã×é֯ʹÓà AES ¼ÓÃÜ¡¢·´µ÷ÊÔÊÖÒպͻùÓÚ .NET µÄ¸ß¼¶»ìÏý £¬ÌӱܹŰåÇå¾²½â¾ö¼Æ»®¡£±ðµÄ £¬¸Ã×é֯һֱˢÐÂÕ½ÂÔ £¬ÕûºÏ¶ñÒâÈí¼þ¼´·þÎñ (MaaS) ²úÆ· £¬ÌáÉýÓªÒµ¹æÄ£¡£


https://securityonline.info/ducktail-quasar-rat-vietnamese-threat-actors-target-meta-ads-professionals/


2. Lumma Stealer£ºÍ¨¹ýαÔìCAPTCHAÓëCDNÈö²¥µÄÒ»Á¬ÐÅÏ¢ÇÔÈ¡Íþв


10ÔÂ20ÈÕ £¬Lumma Stealer ÊÇÒ»ÖÖͨ¹ý¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©ÌṩµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ £¬×¨ÃÅÇÔÈ¡Ãô¸ÐÊý¾ÝÈçÃÜÂë¡¢ä¯ÀÀÆ÷ÐÅÏ¢ºÍ¼ÓÃÜÇ®±ÒÇ®°üÏêÇé¡£¹¥»÷ÕßÒѴӹŰåµÄÍøÂç´¹ÂÚתÏòʹÓÃÕýµ±Èí¼þÈö²¥ Lumma Stealer £¬²¢Í¨¹ýαÔìµÄ CAPTCHA ÑéÖ¤ÓÕÆ­Óû§Ö´ÐжñÒâÔغÉ £¬Ê¹Æä³ÉΪһÖÖÒ»Á¬Íþв¡£QualysÍþвÑо¿²¿·Ö£¨TRU£©Ò»Á¬¼à¿Ø Lumma Stealer Ô˶¯ £¬²¢·¢Ã÷¹¥»÷ÕßʹÓöà½×¶ÎÎÞÎļþÊÖÒÕת´ï×îÖÕÔغÉ £¬ÔöÌíÁËÍþвµÄÓÕÆ­ÐԺͳ¤ÆÚÐÔ¡£¹¥»÷Á´´ÓÓû§±»Öض¨Ïòµ½Ðéα CAPTCHA ÍøÕ¾×îÏÈ £¬Í¨¹ýµã»÷ÑéÖ¤°´Å¥´¥·¢ PowerShell ÏÂÁîÖ´ÐÐ £¬ÏÂÔز¢Æô¶¯¶ñÒâÈí¼þÏÂÔسÌÐò¡£×îÖÕ £¬¶ñÒâÈí¼þ Lumma Stealer£¨VectirFree.exe£©Í¨¹ýÀú³ÌÍÚ¿ÕÊÖÒÕ×¢ÈëÕýµ±³ÌÐò £¬Ìӱܼì²â £¬²¢ÔÚϵͳÖÐËÑË÷¼ÓÃÜÇ®±ÒºÍÃÜÂëÏà¹ØµÄÃô¸ÐÎļþºÍÊý¾Ý¡£Lumma Stealer »¹»áÓëÏÂÁîºÍ¿ØÖÆ£¨C2£©·þÎñÆ÷ͨѶ £¬ÒÔÇÔÈ¡±»µÁÊý¾Ý £¬²¢ÊµÑéʹÓÃÌض¨¶¥¼¶ÓòÃûÅþÁ¬µ½ C2 ·þÎñÆ÷Óò¡£ÍþвÐÐΪÕßʹÓÃÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©¾ÙÐÐÔغɴ«ËÍ £¬ÔöÌíÁËÍþвµÄÖØ´óÐÔ¡£


https://blog.qualys.com/vulnerabilities-threat-research/2024/10/20/unmasking-lumma-stealer-analyzing-deceptive-tactics-with-fake-captcha


3. RoundcubeÎó²îÔâºÚ¿ÍʹÓà £¬ÍøÂç´¹ÂÚ¹¥»÷ÇÔÈ¡Óû§Æ¾Ö¤


10ÔÂ21ÈÕ £¬ºÚ¿ÍʹÓÃÏÖÒÑÐÞ²¹µÄRoundcubeÎó²îCVE-2024-37383£¨CVSSÆÀ·Ö6.1£©ÌᳫÁËÍøÂç´¹ÂÚ¹¥»÷ £¬Ö¼ÔÚ´Ó¿ªÔ´ÍøÂçÓʼþÈí¼þÖÐÇÔÈ¡Óû§Æ¾Ö¤¡£Positive TechnologiesµÄÑо¿Ö°Ô±·¢Ã÷ £¬ÕâЩ¹¥»÷ÊÇͨ¹ýÒ»·â°üÀ¨Òþ²Ø¸½¼þºÍÌض¨JavaScript´úÂëµÄµç×ÓÓʼþ¾ÙÐеÄ £¬¸ÃÓʼþÊÔͼʹÓÃRoundcube WebmailÖеÄÎó²î¡£¸ÃÎó²îÓ°Ïì1.5.7֮ǰµÄ°æ±¾ºÍ1.6.7֮ǰµÄ1.6.x°æ±¾ £¬¹¥»÷Õß¿Éͨ¹ýSVG¶¯»­ÊôÐÔ¾ÙÐÐXSS¹¥»÷ £¬¸ÃÎó²îÒÑÔÚ2024Äê5ÔÂÐû²¼µÄ¸üÐÂÖÐÐÞ¸´¡£¹¥»÷Õßͨ¹ýÓÕÆ­Óû§·­¿ªÌØÖÆÓʼþ £¬ÔÚWebä¯ÀÀÆ÷ÉÏÏÂÎÄÖÐÖ´ÐÐí§ÒâJavaScript´úÂë¡£ÔÚ¹¥»÷ÖÐ £¬JavaScript¸ºÔØ»áÉúÑÄÒ»¸ö¿ÕÎĵµ²¢´ÓÓʼþ·þÎñÆ÷¼ìË÷ÐÂÎÅ £¬Í¬Ê±ÔÚRoundcube½çÃæÖн¨ÉèÒ»¸öÐéαµÄµÇ¼±íµ¥ £¬²¶»ñÓû§Æ¾Ö¤²¢·¢Ë͵½¶ñÒâ·þÎñÆ÷¡£Ö»¹ÜRoundcube Webmail¿ÉÄܲ»ÊÇʹÓÃ×îÆÕ±éµÄµç×ÓÓʼþ¿Í»§¶Ë £¬µ«ÓÉÓÚÕþ¸®»ú¹¹ÆÕ±éʹÓÃËü £¬Òò´ËÈÔÊǺڿ͵ÄÖ÷ҪĿµÄ¡£ÏÖÔÚÑо¿Ö°Ô±ÒÑÐû²¼¸ÃÎó²îµÄPoCʹÓôúÂë £¬µ«ÎÞ·¨½«´Ë´Î¹¥»÷ÓëÒÑÖª¼ÓÈëÕßÁªÏµÆðÀ´¡£


https://securityaffairs.com/170055/hacking/roundcube-flaw-exploited-in-phishing-attack.html


4. TransakÊý¾Ýй¶ÊÂÎñÓ°Ï쳬9.2ÍòÈË


10ÔÂ22ÈÕ £¬¼ÓÃÜÖ§¸¶´¦Öóͷ£ÉÌTransak½üÆÚÔâÓöÊý¾Ýй¶ÊÂÎñ £¬Ò»ÃûÔ±¹¤µÄÌõ¼Ç±¾µçÄÔ±»ºÚ¿ÍÈëÇÖ £¬µ¼ÖÂÁè¼Ý92,000ÃûÓû§µÄÐÅÏ¢±»Ð¹Â¶¡£Ö»¹Ü¸Ã¹«Ë¾Éù³ÆûÓвÆÎñÃô¸Ð»òÒªº¦ÐÅϢй¶ £¬µ«Óû§µÄÐÕÃû¡¢ÉúÈÕ¡¢»¤ÕÕ¡¢¼ÝÕÕÐÅÏ¢¼°×ÔÕÕÏàµÈСÎÒ˽¼ÒÐÅÏ¢¾ùÊÜÓ°Ïì¡£´Ë´ÎÊÂÎñ½öÓ°ÏìÁËTransakÔ¼1%µÄÓû§Èº £¬×÷ΪȫÇòÁìÏȵļÓÃÜÇ®±Ò»ù´¡ÉèÊ©ÌṩÉÌÖ®Ò» £¬TransakΪ½ü600ÍòÓû§Ìṩ·þÎñ £¬ÁýÕÖ160¸ö¹ú¼ÒºÍÃÀ¹ú46¸öÖÝ¡£TransakÇ¿µ÷ £¬×÷Ϊһ¸ö·ÇÍйÜƽ̨ £¬Óû§×ʽðÇ徲δÊÜÓ°Ïì £¬Óû§Ê¼ÖÕ¶Ô×Ô¼ºµÄ×ʲúÓµÓÐÍêÈ«¿ØÖÆȨ¡£È»¶ø £¬StormousÀÕË÷Èí¼þÍÅ»ïÒÑÈÏ¿É´Ë´Î͵ÇÔÐÐΪ £¬²¢Éù³ÆÇÔÈ¡ÁË300GBµÄÊý¾Ý £¬°üÀ¨Õþ¸®½ÒÏþµÄÉí·ÝÖ¤¡¢²ÆÎñ±¨±íµÈ £¬ÍýÏë³öÊÛ»òй¶Êý¾ÝÒÔË÷È¡Êê½ð¡£TransakÒÑÔ¼ÇëÍøÂçÇå¾²¹«Ë¾ÊÓ²ì´ËÊ £¬²¢ÍýÏëͨ¹ýµç×ÓÓʼþÁªÏµÊÜÓ°ÏìÓû§¡£Í¬Ê± £¬¹«Ë¾ÒÑ֪ͨӢ¹úÐÅϢרԱ°ì¹«ÊÒ¼°Å·Ã˺ÍÃÀ¹úÆäËûî¿Ïµ»ú¹¹ £¬²¢±Þ²ß¿Í»§ÈôÓÐÒÉÎÊÇëÁªÏµ¹«Ë¾¡£


https://therecord.media/crypto-payment-services-data-breach


5. ÈûÆÖ·˹ÔâÇ×°ÍÀÕ˹̹ºÚ¿Í×é֯ЭͬÍøÂç¹¥»÷


10ÔÂ22ÈÕ £¬ÈûÆÖ·˹½üÆÚÔâÊÜÁ˶à¸öÇ×°ÍÀÕ˹̹ºÚ¿Í×éÖ¯ÌᳫµÄЭͬÍøÂç¹¥»÷ £¬Ä¿µÄÖ±Ö¸ÆäÒªº¦»ù´¡ÉèÊ©ºÍÕþ¸®ÍøÕ¾¡£Ö»¹Ü´ó´ó¶¼¹¥»÷δÄÜÀÖ³É £¬µ«ÈÔ¶ÔÒøÐС¢»ú³¡ºÍÕþ¸®ÍøÕ¾µÈÄ¿µÄÉèÊ©Ôì³ÉÁËÔÝʱÖÐÖ¹¡£ºÚ¿Í×éÖ¯ÔÚTelegramºÍ°µÍøÂÛ̳ÉÏÐû²¼ÉùÃ÷ £¬Éù³Æ½«ÈëÇÖÈûÆÖ·˹»ú¹¹ÒÔ¡°´¦·Ö¡±¸Ã¹ú¶ÔÒÔÉ«ÁеÄÖ§³Ö¡£Ö»¹ÜÈûÆÖ·˹ÔÚ°ÍÒÔ³åÍ»Öмá³ÖÖÐÁ¢ £¬µ«ÏòÀ´Ö§³ÖÒÔÉ«Áоü¶Ó £¬Õâ³ÉΪºÚ¿Í¹¥»÷µÄ¿ÉÄÜÄîÍ·¡£ÊÜÓ°ÏìµÄ·þÎñ°üÀ¨Õþ¸®ÃÅ»§ÍøÕ¾¡¢µçÁ¦µçÐŲ¿·Ö¡¢Ö÷ÒªÒøÐС¢Ê¯Ó͹«Ë¾ºÍ»ú³¡ÔËÓªÉ̵È £¬´ó¶¼±¨¸æ³ÆÔâÊÜÁËÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷ £¬ºÚ¿Í»¹Éù³ÆÒÑÇÔÈ¡Ãô¸ÐÊý¾Ý¡£È»¶ø £¬»ú³¡ÔËÓª²¢Î´ÊÜÓ°Ïì £¬½öÔÚÏßÍ£³µÔ¤¶©·þÎñÊÜ×è¡£ÈûÆÖ·˹Êý×Ö²¿ÌåÏÖ £¬Õþ¸®ÖÐÑëÔÚÏßÃÅ»§ÍøÕ¾½ö¶ÌÔÝÎÞ·¨»á¼û £¬ÆäËû²¿Î¯»òÕþ¸®·þÎñÍøվδÊÜÓ°Ïì¡£×î¸ßÍøÂç¹ÙÔ±ÇÇÖΡ¤Âõ¿Ë¶ûµÂ˹ºôÓõ¹«Ë¾×öºÃ×¼±¸ £¬Ñ¸ËÙµÖÓùδÀ´¹¥»÷²¢»Ö¸´·þÎñ £¬Í¬Ê±ÌåÏÖûÓÐÐëÒª¿Ö»Å¡£


https://therecord.media/cyprus-critical-infrastructure-cyberattack-israel-palestine


6. WordPressÍøվƵÔâºÚ¿Í¹¥»÷ £¬¶ñÒâ²å¼þÍÆËÍÇÔÊØÐÅÏ¢Èí¼þ


10ÔÂ21ÈÕ £¬WordPressÍøÕ¾½üÆÚƵÈÔÔâÊܺڿ͹¥»÷ £¬¹¥»÷Õßͨ¹ý×°ÖöñÒâ²å¼þÀ´ÍÆËÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ¡£×Ô2023ÄêÆ𠣬ClearFake¶ñÒâÔ˶¯ÒÑÔÚÊÜѬȾÍøÕ¾ÉÏÏÔʾÐéαµÄÍøÂçä¯ÀÀÆ÷¸üкá·ù £¬¶ø2024ÄêÒýÈëµÄClickFixÔ˶¯Ôòαװ³É°üÀ¨ÐÞ¸´³ÌÐòµÄÈí¼þ¹ýʧÐÂÎÅ £¬ÊµÔòÏÂÔز¢×°ÖÃÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ¡£ÕâЩÔ˶¯±äµÃÔ½À´Ô½ÆÕ±é £¬ÍþвÐÐΪÕß»áÈëÇÖÍøÕ¾²¢ÏÔʾ°üÀ¨Google Chrome¡¢Google Meet¾Û»á¡¢FacebookÉõÖÁÑéÖ¤ÂëÒ³ÃæµÄÐéα¹ýʧºá·ù¡£¾ÝGoDaddy±¨¸æ £¬ClearFake/ClickFixÍþвÐÐΪÕßÒÑÈëÇÖÁè¼Ý6000¸öWordPressÍøÕ¾²¢×°ÖöñÒâ²å¼þÀ´ÏÔʾÏà¹ØÐéα¾¯±¨¡£ÕâЩ¶ñÒâ²å¼þʹÓÃÓëÕýµ±²å¼þÏàËƵÄÃû³Æ £¬ÈçWordfence SecurityºÍLiteSpeed Cache £¬»òͨÓõÄÐé¹¹Ãû³Æ £¬Ò»µ©×°Öà £¬¾Í»á½«¶ñÒâJavaScript¾ç±¾×¢ÈëÍøÕ¾µÄHTMLÖÐ £¬½ø¶ø¼ÓÔØClearFake»òClickFix½ÅÔ­À´ÏÔʾÐéαºá·ù¡£ÍþвÐÐΪÕßËƺõÕýÔÚʹÓñ»µÁµÄÖÎÀíԱƾ֤µÇ¼WordPressÍøÕ¾²¢ÒÔ×Ô¶¯·½·¨×°Öòå¼þ¡£WordPressÔËÓªÖ°Ô±Ó¦Á¬Ã¦¼ì²éÒÑ×°Öòå¼þµÄÁбí £¬²¢É¾³ýÈκÎδ֪²å¼þ £¬Í¬Ê±½«ËùÓÐÖÎÀíÔ±Óû§µÄÃÜÂëÖØÖÃΪΨһÃÜÂë £¬ÒÔÈ·±£ÍøÕ¾Çå¾²¡£


https://www.bleepingcomputer.com/news/security/over-6-000-wordpress-hacked-to-install-plugins-pushing-infostealers/