Mirai½©Ê¬ÍøÂçʹÓÃNVR¡¢TP-Link ·ÓÉÆ÷ÖеÄÎó²î

Ðû²¼Ê±¼ä 2024-12-25

1. Mirai½©Ê¬ÍøÂçʹÓÃNVR¡¢TP-Link ·ÓÉÆ÷ÖеÄÎó²î


12ÔÂ24ÈÕ £¬Ò»ÖÖеĻùÓÚMiraiµÄ½©Ê¬ÍøÂçÕýÔÚʹÓÃÉÐδÊÕµ½¸ú×ÙÆ÷±àºÅÇÒδÔÚDigiEver DS-2105 Pro NVRÖÐÐÞ²¹µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î ¡£¸ÃÔ˶¯Ê¼ÓÚ10Ô £¬Ö÷ÒªÕë¶ÔÍøÂç¼Ïñ»úºÍ¹Ì¼þ¹ýʱµÄTP-Link·ÓÉÆ÷ ¡£TXOneÑо¿Ô±Ta-Lun YenÈ¥ÄêÔÚDefCampÇå¾²¾Û»áÉÏչʾÁËÆäÖÐÒ»¸öÎó²î £¬Ó°ÏìÁ˶ą̀DVR×°±¸ ¡£AkamaiµÄÑо¿Ö°Ô±ÊӲ쵽 £¬Ö»¹Ü¸Ã½©Ê¬ÍøÂçÔÚ11ÔÂÖÐÑ®×îÏÈʹÓôËÎó²î £¬µ«Ö¤¾ÝÅú×¢ÆäÔ˶¯ÖÁÉÙ´Ó9ÔÂÒÑ×îÏÈ ¡£³ýÁËDigiEverÎó²î £¬ÐµÄMirai±äÖÖ»¹Õë¶ÔTP-LinkµÄCVE-2023-1389Îó²îºÍTeltonika RUT9XX·ÓÉÆ÷µÄCVE-2018-17532Îó²î ¡£Õë¶ÔDigiEver NVRµÄ¹¥»÷ͨ¹ýÔ¶³Ì´úÂëÖ´ÐÐȱÏÝʵÏÖ £¬ºÚ¿ÍʹÓÃδ׼ȷÑéÖ¤Óû§ÊäÈëµÄURI×¢ÈëÏÂÁî £¬´Ó¶ø»ñÈ¡¶ñÒâÈí¼þ¶þ½øÖÆÎļþ²¢½«×°±¸ÄÉÈ뽩ʬÍøÂç ¡£Ò»µ©×°±¸±»¹¥»÷ £¬¾Í»áÓÃÓÚÂþÑÜʽ¾Ü¾ø·þÎñ¹¥»÷»òÈö²¥µ½ÆäËû×°±¸ ¡£ÐµÄMirai±äÖÖ½ÓÄÉXORºÍChaCha20¼ÓÃÜ £¬Ö§³Ö¶àÖÖϵͳ¼Ü¹¹ ¡£AkamaiÖ¸³ö £¬Ö»¹ÜÖØ´ó½âÃÜÒªÁì²»ÐÂÏÊ £¬µ«ÏÔʾMirai½©Ê¬ÍøÂçÔËÓªÉÌÔÚÕ½ÂÔºÍÊÖÒÕÉÏһֱǰ½ø ¡£


https://www.bleepingcomputer.com/news/security/new-botnet-exploits-vulnerabilities-in-nvrs-tp-link-routers/


2. ClopÀÕË÷Èí¼þÍÅ»ïʹÓÃCleoÁãÈÕÎó²îÌᳫÐÂÀÕË÷¹¥ÊÆ


12ÔÂ24ÈÕ £¬ClopÀÕË÷Èí¼þÍÅ»ï½üÆÚ¶ÔÆäCleoÊý¾Ý͵ÇÔ¹¥»÷µÄÊܺ¦Õß·¢³öÁËÀÕË÷֪ͨ £¬ÒªÇó66¼Ò¹«Ë¾ÔÚ48СʱÄÚÏìÓ¦ÆäÒªÇó £¬²»È»½«Åû¶ÕâЩ¹«Ë¾µÄÈ«Ãû ¡£Clopͨ¹ý°µÍøÃÅ»§Ö±½ÓÁªÏµÕâЩ¹«Ë¾ £¬²¢ÌṩÇ徲̸ÌìƵµÀÁ´½ÓºÍµç×ÓÓʼþµØµã¾ÙÐÐÊê½ðÖ§¸¶Ì¸ÅÐ ¡£´Ë´Î¹¥»÷ʹÓÃÁËCleo LexiCom¡¢VLTransferºÍHarmony²úÆ·ÖеÄÁãÈÕÎó²î£¨CVE-2024-50623£© £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÖ´Ðв»ÊÜÏÞÖƵÄÎļþÉÏ´«ºÍÏÂÔØ £¬µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐÐ ¡£ClopÒÑÍùÒ²ÔøʹÓÃÆäËûƽ̨µÄÁãÈÕÎó²î»á¼û¹«Ë¾ÍøÂç ¡£¹©Ó¦ÉÌÒÑÌṩÐÞ¸´³ÌÐò £¬µ«ÖÒÑԳƺڿͿÉÄÜʹÓøÃÐÞ¸´³ÌÐòÔÚÊÜѬȾµÄÍøÂçÉÏ·­¿ª·´Ïòshell ¡£Clop»¹Ðû²¼½«É¾³ýÒÔÇ°¹¥»÷µÄÊý¾Ý £¬ÒÔרעÓÚÐÂÒ»ÂÖµÄÀÕË÷Ô˶¯ ¡£ÏÖÔÚÉв»ÇåÎúÏêϸÓм¸¶à¹«Ë¾Êܵ½ÁËClop×îй¥»÷µÄÍþв £¬µ«CleoÈí¼þÒѱ»È«ÇòÁè¼Ý4000¼Ò×é֯ʹÓà ¡£


https://www.bleepingcomputer.com/news/security/clop-ransomware-is-now-extorting-66-cleo-data-theft-victims/


3. Postman Workspacesй¶30000¸öAPIÃÜÔ¿ºÍÃô¸ÐÁîÅÆ


12ÔÂ24ÈÕ £¬CloudSEKµÄTRIADÍŶӷ¢Ã÷ £¬ÒòÀÄÓÃPostman Workspaces £¬´ó×ÚÃô¸ÐÊý¾ÝÃæÁÙй¶Σº¦ ¡£ÔÚΪÆÚÒ»ÄêµÄÊÓ²ìÖÐ £¬Ñо¿Ö°Ô±·¢Ã÷Áè¼Ý30,000¸ö¿É¹ûÕæ»á¼ûµÄPostman Workspacesй¶ÁËAPIÃÜÔ¿¡¢ÁîÅƺÍÖÎÀíԱƾ֤µÈÃô¸ÐÐÅÏ¢ £¬Éæ¼°GitHub¡¢SlackºÍSalesforceµÈƽ̨ £¬Ó°ÏìÁË°üÀ¨Ò½ÁƱ£½¡¡¢Ô˶¯´ò°çºÍ½ðÈÚ·þÎñÔÚÄڵĶà¸öÐÐÒµ ¡£Ð¹Â¶µÄÔµ¹ÊÔ­ÓÉÖ÷Òª°üÀ¨»á¼ûÉèÖùýʧ¡¢´¿Îı¾´æ´¢ÒÔ¼°ÊÕ²ØÆ·µÄ¹ûÕæ¹²Ïí ¡£CloudSEKÖ¸³ö £¬ÕâЩй¶¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡¢Î´¾­ÊÚȨµÄϵͳ»á¼ûÒÔ¼°ÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷µÄÔöÌí ¡£ÎªÈ·±£Êý¾ÝÇå¾² £¬×é֯ӦʹÓÃÇéÐαäÁ¿¡¢ÂÖ»»ÁîÅÆ¡¢½ÓÄÉÉñÃØÖÎÀí¹¤¾ßµÈ²½·¥ ¡£CloudSEKÒÑÏòÊÜÓ°ÏìµÄ×éÖ¯±¨¸æÁË´ó´ó¶¼ÊÂÎñ £¬²¢±Þ²ß×éÖ¯½ÓÄɸü¿É¿¿µÄÇå¾²²½·¥ ¡£±ðµÄ £¬PostmanҲʵÑéÁËÉñÃر£»¤Õþ²ß £¬ÒÔ±ÜÃâÃô¸ÐÊý¾ÝÔÚ¹«¹²ÊÂÇéÇøÖÐ̻¶ ¡£


https://hackread.com/postman-workspaces-leak-api-keys-sensitive-tokens/


4. Å·ÖÞº½Ìì¾Ö¹Ù·½ÊÐËÁÔâºÚ¿Í¹¥»÷ £¬ÇÔÈ¡¿Í»§Ö§¸¶ÐÅÏ¢


12ÔÂ24ÈÕ £¬Å·ÖÞº½Ìì¾ÖµÄ¹Ù·½ÍøÉÏÊÐËÁ½üÆÚÔâµ½ºÚ¿Í¹¥»÷ £¬ºÚ¿Íͨ¹ý¼ÓÔØÒ»¶ÎJavaScript´úÂë £¬ÔÚ½áÕËʱÌìÉúÒ»¸öÐéαµÄStripeÖ§¸¶Ò³Ãæ £¬´Ó¶øÍøÂç¿Í»§ÐÅÏ¢ £¬°üÀ¨Ö§¸¶¿¨Êý¾Ý ¡£Å·ÖÞº½Ìì¾Ö£¨ESA£©µÄÔ¤ËãÁè¼Ý100ÒÚÅ·Ôª £¬ÆäʹÃüÊÇͨ¹ýÅàѵÓԱÒÔ¼°ÖÆ×÷ÓÃÓÚ̽Ë÷ÓîÖæÉñÃصĻð¼ýºÍÎÀÐÇÀ´À©Õ¹Ì«¿ÕÔ˶¯µÄ¼«ÏÞ ¡£¸ÃÊÐËÁÏÖÔÚÎÞ·¨Ê¹Óà £¬²¢ÏÔʾ¡°ÔÝʱÍÑÀë¹ìµÀ¡±µÄÐÂÎÅ ¡£µç×ÓÉÌÎñÇå¾²¹«Ë¾Sansec×¢Öص½ÁËÕâÒ»¶ñÒâ¾ç±¾ £¬²¢ÖÒÑԳƸÃÊÐËÁËƺõÓëÅ·ÖÞº½Ìì¾Ö£¨ESA£©ÏµÍ³¼¯³É £¬¿ÉÄܶÔÔ±¹¤×é³ÉΣº¦ ¡£Í¬Ê± £¬ÍøÂçÓ¦ÓÃÇå¾²¹«Ë¾Source Defense ResearchҲ֤ʵÁËSansecµÄÊÓ²ìЧ¹û ¡£ÔÚ±»BleepingComputerѯÎÊÓйش˴ÎÈëÇÖµÄÏêϸÐÅϢʱ £¬ESAÌåÏÖ¸ÃÊÐËÁ²¢²»ÍйÜÔÚÆä»ù´¡ÉèÊ©ÉÏ £¬Ò²²»ÖÎÀíÆäÉϵÄÊý¾Ý ¡£Í¨¹ýwhoisÅÌÎÊ¿ÉÒÔÈ·ÈÏ £¬¸ÃÊÐËÁµÄÓòÃûºÍÁªÏµÊý¾ÝÓëESAµÄ¹Ù·½ÓòÃû²î±ð £¬ÇÒÁªÏµÊý¾ÝÒѱ»É¾³ýÒÔ±£»¤Òþ˽ ¡£


https://www.bleepingcomputer.com/news/security/european-space-agencys-official-store-hacked-to-steal-payment-cards/


5. PyPIÏÖ¶ñÒâPythonÈí¼þ°üÇÔÈ¡Óû§Êý¾Ý


12ÔÂ24ÈÕ £¬Fortinet FortiGuard LabµÄAI¼ì²âϵͳ½üÆÚ·¢Ã÷ÁËÁ½¸öÔÚPythonÈí¼þ°üË÷Òý(PyPI)ÉϵĶñÒâPythonÈí¼þ°ü£ºZebo-0.1.0ºÍCometlogger-0.1 ¡£ÕâЩ¶ñÒâÈí¼þͨ¹ý¼üÅ̼ͼ¡¢½ØͼºÍÐÅϢ鶵ÈÊÖ¶ÎÇÔÈ¡Óû§Ãô¸ÐÊý¾Ý £¬²¢Ê¹ÓûìÏýÊÖÒÕÌӱܼì²â ¡£Zebo-0.1.0ʹÓÃpynputºÍImageGrabµÈ¿â¼Í¼°´¼üºÍ½ØÈ¡ÆÁÄ»½Øͼ £¬½«Ãô¸ÐÐÅϢ鶵½Ô¶³Ì·þÎñÆ÷ £¬²¢ÔÚϵͳÖØÆôʱÖØÐÂÖ´ÐÐÒÔÈ·¼á³¤ÆÚ¿ØÖÆ ¡£Cometlogger-0.1ÔòרעÓÚÐÅÏ¢ÇÔÈ¡ºÍ³¤ÆÚ±£´æ £¬Õë¶Ô¶à¸öÉ罻ƽ̨ÇÔÈ¡ÁîÅÆ¡¢ÃÜÂëºÍÕÊ»§ÐÅÏ¢ £¬²¢½ÓÄÉ·´ÐéÄâ»ú¼ì²âÊÖÒպͶ¯Ì¬ÎļþÐ޸Ĺ¦Ð§ ¡£ÕâЩ¶ñÒâÈí¼þ°ü¶ÔËùÓпÉÒÔ×°ÖÃPyPIÈí¼þ°üµÄƽ̨×é³ÉÖØ´óÒþ˽ºÍÇ徲Σº¦ £¬Ìá·ÀÕâЩÍþвÐèÒª¶Ï¿ª»¥ÁªÍøÅþÁ¬¡¢¸ôÀëÊÜѬȾϵͳ¡¢Ê¹Ó÷À²¡¶¾Èí¼þÒÔ¼°ÔÚÐëҪʱÖØÐÂÃûÌû¯ÏµÍ³ ¡£PyPIµÄ±ãµ±ÐÔÅãͬ×ÅΣº¦ £¬¿ª·¢Ö°Ô±ÐèÒª¼á³ÖСÐÄ £¬×èÖ¹×°ÖöñÒâÈí¼þ°ü ¡£


https://hackread.com/python-malware-zebo-cometlogger-stealing-user-data/


6. ³¯Ïʺڿ͹¥»÷DMM Bitcoin £¬ÇÔÈ¡3.08ÒÚÃÀÔª¼ÓÃÜÇ®±Ò


12ÔÂ24ÈÕ £¬³¯ÏʺڿÍ×éÖ¯¡°TraderTraitor¡±£¨Ò²±»×·×ÙΪJade Sleet¡¢UNC4899ºÍSlow Pisces£©ÔÚ½ñÄê5Ô¶ÔÈÕ±¾DMM BitcoinÉúÒâËùÌᳫ¹¥»÷ £¬ÀÖ³ÉÇÔÈ¡Á˼ÛÖµ3.08ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò ¡£´Ë´Î¹¥»÷ʼÓÚ3ÔÂÏÂÑ® £¬ºÚ¿Íαװ³ÉLinkedInÉϵÄÕýµ±ÕÐƸְԱ £¬½Ó´¥²¢ÓÕµ¼ÈÕ±¾ÆóÒµ¼ÓÃÜÇ®±ÒÇ®°üÈí¼þ¹«Ë¾GincoµÄÒ»ÃûÔ±¹¤ÏÂÔز¢Ö´ÐжñÒâPython´úÂë £¬½ø¶øÉø͸µ½Ginco²¢ºáÏòÒƶ¯µ½DMM ¡£FBIÖ¸³ö £¬¹¥»÷ÕßʹÓûỰcookieÐÅϢð³äÊÜѬȾԱ¹¤ £¬»ñÈ¡Gincoδ¼ÓÃÜͨѶϵͳµÄ»á¼ûȨÏÞ £¬²¢×îÖÕÔÚ5ÔÂÏÂѮʹÓÃDMMÔ±¹¤µÄÕýµ±ÉúÒâÇëÇó £¬µ¼Ö¾޶îËðʧ ¡£×Ô2022ÄêÒÔÀ´ £¬TraderTraitorÒ»Ö±»îÔ¾ÓÚÇø¿éÁ´ÁìÓò £¬Ê¹ÓÃÐéαӦÓóÌÐò¾ÙÐÐÉç»á¹¤³Ì¹¥»÷ £¬ÃÀ¹úÕþ¸®Ò»Ö±ÔÚÇ×½ü¼àÊÓÆäÔ˶¯ ¡£


https://www.bleepingcomputer.com/news/security/fbi-links-north-korean-hackers-to-308-million-crypto-heist/