΢ÈíÔ¶³Ì×¢²á±í¿Í»§¶ËÎó²îCVE-2024-43532¹ûÕæ
Ðû²¼Ê±¼ä 2024-10-2410ÔÂ22ÈÕ£¬Õë¶Ô΢ÈíÔ¶³Ì×¢²á±í¿Í»§¶ËµÄÎó²îCVE-2024-43532ÏÖÒѹûÕ棬¸ÃÎó²îʹÓÃWindows×¢²á±í¿Í»§¶ËʵÏÖÖеĻØÍË»úÖÆ£¬ÔÚSMB´«Êä²»¿ÉÓÃʱÒÀÀµÓھɴ«ÊäÐÒ飬²¢½µµÍÉí·ÝÑéÖ¤Àú³ÌµÄÇå¾²ÐÔ£¬´Ó¶ø¿ØÖÆWindowsÓò¡£¸ÃÎó²îÓ°ÏìWindows·þÎñÆ÷°æ±¾2008ÖÁ2022ÒÔ¼°Windows 10ºÍ11¡£¹¥»÷Õß¿Éͨ¹ý×èµ²NTLMÉí·ÝÑéÖ¤ÎÕÊÖ²¢½«Æäת·¢µ½Active DirectoryÖ¤Êé·þÎñ(ADCS)µÈ·þÎñ£¬½¨ÉèеÄÓòÖÎÀíÔ±ÕÊ»§¡£CVE-2024-43532Ô´ÓÚÔ¶³Ì×¢²á±í¿Í»§¶ËÔÚ´¦Öóͷ£RPCÉí·ÝÑé֤ʱµÄÎÊÌ⣬µ±SMB´«Êä²»¿ÉÓÃʱ£¬¿Í»§¶Ë»áÇл»µ½½Ï¾ÉµÄÐÒ鲢ʹÓÃÈõÉí·ÝÑéÖ¤¼¶±ð¡£AkamaiÑо¿Ô±Stiv KupchikÓÚ2ÔÂ1ÈÕÏò΢ÈíÅû¶Á˸ÃÎó²î£¬µ«×î³õ±»²µ»Ø£¬ºóÓÚ6ÔÂÖÐÑ®ÖØÐÂÌá½»²¢»ñµÃÈ·ÈÏ£¬Î¢ÈíÓÚÈý¸öÔºóÐû²¼ÁËÐÞ¸´³ÌÐò¡£ÏÖÔÚ£¬KupchikÒÑÐû²¼ÓÐÓõĿ´·¨ÑéÖ¤´úÂ룬²¢ÔÚNo HatÇå¾²¾Û»áÉÏÚ¹ÊÍÁËʹÓÃÀú³Ì¡£AkamaiµÄ±¨¸æ»¹ÌṩÁ˼ì²âÒ×Êܹ¥»÷µÄ»úеºÍ¼àÊÓÌض¨RPCŲÓõÄÒªÁì¡£
https://www.bleepingcomputer.com/news/security/exploit-released-for-new-windows-server-winreg-ntlm-relay-attack/
2. Gophish¹¤¾ß°ü±»ÀÄÓÃÓÚÖÆ×÷Õë¶Ô¶íÓïƬÇøÓû§µÄRATľÂí
10ÔÂ22ÈÕ£¬GophishÕâÒ»¿ªÔ´ÍøÂç´¹ÂÚ¹¤¾ß°üÕý±»²»·¨·Ö×ÓʹÓã¬ÒÔÖÆ×÷²¢Èö²¥DarkCrystal RAT£¨DCRat£©ºÍPowerRATµÈÔ¶³Ì»á¼ûľÂí£¬Ö÷ҪĿµÄÊǶíÓïƬÇøÓû§£¬°üÀ¨¶íÂÞ˹¼°ÆäÖܱ߹ú¼ÒÈçÎÚ¿ËÀ¼¡¢°×¶íÂÞ˹¡¢¹þÈø¿Ë˹̹¡¢ÎÚ×ȱð¿Ë˹̹ºÍ°¢Èû°Ý½®¡£GophishÔ±¾±»Éè¼ÆÓÃÓÚ×éÖ¯²âÊÔÍøÂç´¹ÂÚ·ÀÓùÄÜÁ¦£¬µ«¹¥»÷ÕßÈ´½è´ËÖÆ×÷αװ³ÉYandex DiskÁ´½ÓºÍVKÉç½»ÍøÂçÒ³ÃæµÄÍøÂç´¹ÂÚÓʼþ¡£ÕâЩÓʼþÓÕµ¼Óû§ÏÂÔØ°üÀ¨DCRat»òPowerRAT¶ñÒâľÂíµÄMicrosoft WordÎĵµ»òǶÈëJavaScriptµÄHTMLÎļþ¡£Ò»µ©Êܺ¦Õß·¿ªÎĵµ²¢ÆôÓú꣬¾Í»á´¥·¢¶ñÒâVisual Basic (VB)¾ç±¾£¬½ø¶øÏÂÔز¢Ö´ÐÐHTAÎļþºÍPowerShell¼ÓÔØÆ÷¡£ÕâЩ¾ç±¾°üÀ¨PowerRATµÄbase64±àÂëÊý¾Ý¿é£¬½âÂëºóÔÚÊܺ¦Õß»úеÉÏÖ´ÐС£³ýÁËϵͳÕì̽£¬¸Ã¶ñÒâÈí¼þ»¹»áÍøÂçÇý¶¯Æ÷ÐòÁкŲ¢ÅþÁ¬µ½¶íÂÞ˹Զ³Ì·þÎñÆ÷ÎüÊÕÖ¸Áî¡£Èôδ»ñÏìÓ¦£¬ÔòÖ´ÐÐǶÈëµÄPowerShell¾ç±¾¡£DCRat×÷ΪһÖÖÄ£¿é»¯¶ñÒâÈí¼þ£¬ÄÜÇÔÈ¡Êý¾Ý¡¢²¶»ñÆÁÄ»½ØͼºÍ»÷¼ü£¬ÌṩԶ³Ì¿ØÖÆ£¬²¢ÏÂÔØÖ´ÐÐÆäËûÎļþ¡£
https://thehackernews.com/2024/10/gophish-framework-used-in-phishing.html
3. GrandoreiroÒøÐÐľÂí£ºÈ«Çò½ðÈÚÍþвһÁ¬Éý¼¶
10ÔÂ22ÈÕ£¬¿¨°Í˹»ùʵÑéÊÒ×î½üÐû²¼µÄÒ»·Ý±¨¸æÏÔʾ£¬GrandoreiroÒøÐÐľÂíÒѳÉΪȫÇòÖØ´ó½ðÈÚÍþв¡£¸ÃľÂíÆðÔ´ÓÚ°ÍÎ÷£¬×Ô2016ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬Ö¼ÔÚÇÔÈ¡ÒøÐÐƾ֤²¢ÈƹýÇå¾²²½·¥¡£Ö»¹ÜÖ´·¨²¿·ÖÒÑÆð¾¢¹¥»÷£¬µ«GrandoreiroµÄ¹¥»÷¹æÄ£ÒÑÏÔÖøÀ©´ó£¬ÏÖÒÑÕë¶Ô45¸ö¹ú¼ÒµÄ1700¼ÒÒøÐкÍ276¸ö¼ÓÃÜÇ®±ÒÇ®°ü£¬ÏÔʾ³öÆäÕæÕýµÄÈ«ÇòÍþвÐÔ¡£ÔÚÎ÷°àÑÀ£¬GrandoreiroÔì³ÉµÄ¾¼ÃËðʧԤ¼Æ´ï350ÍòÅ·Ôª£¬µ«±¨¸æÖ¸³öÆä¿ÉÄÜ´øÀ´µÄÀûÈóÁè¼Ý1.1ÒÚÅ·Ôª¡£GrandoreiroľÂíÒ»Ö±Á¢ÒìÕ½ÂÔ£¬Ê¹ÓÃÓòÌìÉúËã·¨½¨ÉèеÄÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷£¬½ÓÄÉÃÜÎÄÇÔÈ¡¼ÓÃÜÔöÌíÆÊÎöÄѶȣ¬²¢ÒýÈëɳºÐ¹æ±ÜÊÖÒÕÈç¸ú×ÙÊó±êÒƶ¯ÒÔÄ£ÄâÕýµ±Óû§½»»¥£¬ÓÕÆ·´Ú²Æϵͳ¡£ÆäÄ£¿é»¯ÌØÕ÷ÔÊÐí¶à¸ö²Ù×÷Ô±½¨ÉèÕë¶ÔÌض¨µØÇø»ò½ðÈÚ»ú¹¹µÄËéƬ»¯°æ±¾¡£×Ô2022ÄêÒÔÀ´£¬¿¨°Í˹»ùÊӲ쵽¸ÃľÂí½¨ÉèÁ˽ÏС¡¢½ÏÇáµÄ°æ±¾£¬×¨×¢ÓÚ½ÏÉÙµÄÄ¿µÄ£¬ÌØÊâÊÇÔÚÄ«Î÷¸ç¡£Grandoreiroͨ³£ÒÔ¶ñÒâÈí¼þ¼´·þÎñµÄÐÎʽÔËÐУ¬ÆäÈö²¥Êܵ½¿ØÖÆ£¬Ö»ÓÐÖµµÃÐÅÍеÄÏàÖúͬ°é²Å»ª»á¼ûÔ´´úÂë¡£
https://securityonline.info/1700-banks-45-countries-grandoreiro-trojan-expands-its-reach/
4. ºÚ¿ÍʹÓÃgRPCÐÒéÔÚDocker APIÉÏ°²ÅżÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò
10ÔÂ22ÈÕ£¬Trend Micro Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÐÂÐÍÍøÂç¹¥»÷ÊֶΣ¬¹¥»÷ÕßʹÓà Docker Ô¶³Ì API ·þÎñÆ÷É쵀 gRPC ÐÒ飨ͨ¹ý h2c Ã÷ÎÄ HTTP/2£©À´°²ÅÅ SRBMiner ¼ÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò£¬Ä¿µÄÊÇÍÚ¾ò Ripple Labs ¿ª·¢µÄ XRP ¼ÓÃÜÇ®±Ò¡£¹¥»÷Á÷³ÌʼÓÚɨÃèÒ×Êܹ¥»÷µÄ Docker API ·þÎñÆ÷£¬Ëæºó¼ì²éÆä¿ÉÓÃÐԺͰ汾£¬²¢·¢ËÍ gRPC/h2c Éý¼¶ÇëÇóÒÔÔ¶³ÌʹÓà Docker ¹¦Ð§¶ø²»±»·¢Ã÷¡£Ò»µ©½¨Éè¿ØÖÆ£¬¹¥»÷Õß±ãʹÓÃÕýµ±»ù´¡Ó³Ïñ¹¹½¨ Docker Ó³Ïñ£¬ÔÚ /usr/sbin Ŀ¼Öа²ÅÅÍÚ¿ó³ÌÐò£¬²¢´Ó GitHub ÏÂÔضñÒâÈí¼þ¡£ËûÃÇ»¹ÌṩÁË Ripple Ç®°üµØµãÒÔÍøÂçÍÚ³öµÄ¼ÓÃÜÇ®±Ò¡£´Ë´Î¹¥»÷Ö®ÒÔÊÇÁîÈ˵£ÐÄ£¬ÊÇÓÉÓÚʹÓà h2c É쵀 gRPC ÐÒé¿ÉÈƹýÇå¾²²ã£¬Ê¹Çå¾²¹¤¾ßÄÑÒÔ¼ì²âµ½¼ÓÃܿ󹤵ݲÅÅ¡£ÕâÅú×¢ÍøÂç·¸·¨·Ö×ÓµÄÕ½ÂÔÔÚÒ»Ö±Ñݱ䣬ËûÃÇÕýÔÚÑ°ÕÒÁ¢ÒìÒªÁìÀ´Ê¹Óà Docker µÈÈÝÆ÷»¯ÇéÐΡ£Òò´Ë£¬±£»¤ Docker Ô¶³Ì API ºÍ¼à¿ØÒì³£Ô˶¯±äµÃÓÈΪÖ÷Òª¡£
https://securityonline.info/cryptojacking-alert-hackers-exploit-grpc-and-http-2-to-deploy-miners/
5. CISA½«Microsoft SharePointÎó²îÁÐΪÒÑÖª±»Ê¹ÓÃÎó²î
10ÔÂ23ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Microsoft SharePointµÄÒ»¸ö·´ÐòÁл¯Îó²îCVE-2024-38094£¨CVSS v4ÆÀ·Ö£º7.2£©ÄÉÈëÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¸ÃÎó²îÔÊÐíÓµÓÐÕ¾µãËùÓÐÕßȨÏ޵Ĺ¥»÷Õßͨ¹ýSharePoint Server×¢Èë²¢Ö´ÐÐí§Òâ´úÂë¡£¾Ý΢Èíͨ¸æ£¬´ËÎó²îÔ´ÓÚSharePoint Server Search×é¼þµÄÊäÈëÑéÖ¤¹ýʧ£¬Ê¹µÃδ¾Éí·ÝÑéÖ¤µÄÓû§Ò²ÄÜͨ¹ý·¢ËÍÌØÖÆHTTPÇëÇóÀ´Ê¹ÓÃÎó²î£¬½ø¶øÔÚ·þÎñÆ÷ÉÏÖ´ÐÐí§Òâ´úÂ룬¿ÉÄܽÓÊÜÕû¸öϵͳ¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸Áî22-01£¬ÒªÇóÁª°î»ú¹¹£¨FCEB£©±ØÐèÔÚ»®¶¨×èÖ¹ÈÕÆÚÇ°½â¾öÒÑ·¢Ã÷µÄÎó²î£¬ÒÔ±£»¤ÍøÂçÃâÊÜĿ¼ÖÐÎó²îµÄ¹¥»÷¡£CISAÌØÊâÒªÇóÁª°î»ú¹¹ÔÚ2024Äê11ÔÂ12ÈÕÇ°ÐÞ¸´´ËSharePointÎó²î¡£Í¬Ê±£¬×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²éCISAµÄÎó²îĿ¼£¬²¢ÊµÊ±½â¾öÆä»ù´¡ÉèÊ©Öб£´æµÄÏìÓ¦Îó²î£¬ÒÔÈ·±£ÍøÂçÇå¾²¡£
https://securityaffairs.com/170157/security/u-s-cisa-adds-microsoft-sharepoint-flaw-known-exploited-vulnerabilities-catalog.html
6. ±±·Çµç×Ó¾º¼¼Æ½Ì¨ESNAÓû§Êý¾ÝÔâºÚ¿Íй¶
10ÔÂ24ÈÕ£¬ÔÚ½ÇÖðǰϦ£¬ÃûΪ¡°Shooked¡±µÄºÚ¿ÍÓÚ2024Äê10ÔÂ23ÈÕÔÚBreach ForumsÉÏй¶Á˱±·Çµç×Ó¾º¼¼(ESNA)ƽ̨Áè¼Ý18ÍòÃûÓû§µÄСÎÒ˽¼ÒÊý¾Ý£¬¸ÃÊý¾Ýת´¢¾ÞϸΪ3GB£¬²¢Éù³ÆÊÇ¡°ÍêÕûÊý¾Ý¿â¡±¡£´Ë´Î鶱¬·¢ÔÚESNA½ÇÖðÓÚĦÂå¸ç¿ªÈüµÄÇ°Ò»Ìì¡£ESNAÊÇÒ»¸öÖ¼ÔÚÔö½ø±±·ÇµØÇø¾º¼¼ÓÎÏ·Éú³¤µÄƽ̨£¬×éÖ¯ÁË°üÀ¨FC25¡¢Free Fire¡¢Ä°Í·°ÔÍõ6µÈÈÈÃÅÓÎÏ·µÄ½õ±êÈü¡£¾ÝÆÊÎö£¬Ð¹Â¶µÄÊý¾Ý°üÀ¨Áè¼Ý900ÍòÐУ¬µ«È¥ÖغóΨһÓû§¼Í¼Ϊ180,000Ìõ£¬°üÀ¨Óû§Éí·Ý¡¢¹ú¼Ò¡¢Óû§Ãû¡¢IPµØµã¡¢Ê±¼ä´Á¡¢»á»°ID¡¢WordPress URLºÍµç×ÓÓʼþµØµãµÈÐÅÏ¢£¬µ«²»°üÀ¨ÃÜÂë»ò²ÆÎñÐÅÏ¢¡£Ö»¹ÜÔÆÔÆ£¬Óû§ÈÔ±»½¨Òé¸ü¸ÄÃÜÂëÒÔ·ÀÍòÒ»£¬²¢Ð¡ÐÄ¿ÉÄÜÓÉ´Ë´Îй¶Òý·¢µÄÍøÂç´¹ÂÚ¹¥»÷¡£ÏÖÔÚ£¬ESNA×éÖ¯ÉÐδ¶Ô´ËÊÂ×÷³ö»ØÓ¦£¬µ«Óû§Ó¦¼á³ÖСÐÄ£¬ÒÔ·ÀÍøÂç·¸·¨·Ö×ÓʹÓô˴Îй¶¾ÙÐжñÒâÔ˶¯¡£
https://hackread.com/hackers-leak-esport-north-africa-user-record-before-tournament/