Ñо¿ÈËÔ±·¢ÏÖ4Íò¶à¸ö·ÓÉÆ÷ºÍÎïÁªÉ豸×齨µÄ½©Ê¬ÍøÂç
Ðû²¼Ê±¼ä 2024-03-283ÔÂ26ÈÕ£¬¸Ã·ÓÉÆ÷½©Ê¬ÍøÂçÓÚ 2014 ÄêÊ״ηºÆð£¬Ò»Ö±ÔÚÇÄÇÄÔËÐУ¬Í¬Ê±ÔÚ 2024 Äê 1 ÔÂºÍ 2 ÔÂÔö³¤µ½À´×Ô 88 ¸ö¹ú¼ÒµÄ 40000 ¶à¸ö½©Ê¬ÍøÂç¡£ÕâЩ»úÆ÷ÈËÖеĴó¶àÊý¶¼±»ÓÃ×÷ÎÛÃûÕÑÖøµÄ¡¢Õë¶ÔÍøÂç·¸×ïµÄÊðÀí·þÎñµÄ»ù´¡£¬¸Ã·þÎñ±»³ÆΪ Faceless¡£Black Lotus Labs µÄÑо¿ÈËÔ±ÌåÏÖ£¬ËûÃÇÈ·¶¨Á˸Ã×éÖ¯ÊðÀí·þÎñµÄÂ߼ͼ£¬ÆäÖаüÂÞ 2024 Äê 3 ÔµÚÒ»ÖÜ¿ªÊ¼µÄÒ»Ïî»î¶¯£¬¸Ã»î¶¯ÔÚ²»µ½ 72 СʱÄÚÕë¶Ô 6000 ¶à¸ö»ªË¶Â·ÓÉÆ÷½øÐÐÁ˹¥»÷¡£Ñо¿ÈËÔ±ÈÏΪ£¬È«Çò·¶Î§ÄÚÕë¶Ô±¨·ÏÎïÁªÍøÉ豸µÄ¹¥»÷ÊǹÊÒâµÄ£¬ÒòΪËüÃDz»ÔÙÊܵ½ÖÆÔìÉ̵ÄÖ§³Ö£¬¶øÇÒÒÑÖªµÄÄþ¾²Â©¶´Ò²Ã»Óеõ½ÐÞ¸´¡£
https://www.securityweek.com/researchers-discover-40000-strong-eol-router-iot-botnet/
2. MispaduÒøÐÐľÂíÀ©´óÓ°Ï췶Χ£¬Ãé׼ŷÖÞ¼°ÆäËüµØÓò
3ÔÂ26ÈÕ£¬Mispadu ÒøÐÐľÂíÒò¹¥»÷À¶¡ÃÀÖÞ¹ú¼Ò¶øÎÛÃûÕÑÖø£¬Ä¿Ç°ÕýÔÚ»ý¼«À©´óÆäÄ¿±ê¡£ÐÎ̬Äþ¾²ÊµÑéÊÒÒÑ·¢ÏÖÕû¸öÅ·ÖÞµÄ Mispadu »î¶¯¼¤Ôö£¬±êÖ¾×ÅÍþв·¶Î§·¢ÉúÁËÁîÈ˵£ÓǵÄת±ä¡£Mispadu µÄ×îй¥»÷²»ÊÜÐÐÒµÏÞÖÆ¡£´ÓÆû³µÖÆÔì¾ÞÍ·Ëæ´¦ÖÃÃô¸ÐÊý¾ÝµÄÂÉʦÊÂÎñËù£¬¸ÃľÂí¸øÿ¸öÒÀÀµÔÚÏßÒøÐлòÃô¸ÐµÇ¼ƾ¾ÝµÄ×éÖ¯´øÀ´·çÏÕ¡£Ä«Î÷¸çÊÇ Mispadu »î¶¯×î³õµÄδ²£¬ÈÔÈ»ÊÇÒ»¸öÖ÷ҪĿ±ê£¬µ«ÍþвÏÖÔÚÔ¶Ô¶³¬³öÁË×î³õµÄ½çÏÞ¡£Mispadu½ÓÄɶà½×¶Î¹¥»÷Á´£¬¶ÔÆä֮ǰµÄ°æ±¾½øÐÐÁËÇÉÃîµÄ¸ïС£³õʼ½×¶ÎÉæ¼°·Ö·¢ÍøÂçµöÓãµç×ÓÓʼþ£¬Ã¿·âµç×ÓÓʼþ¶¼°üÂÞÒ»¸öαװ³É·¢Æ±µÄ PDF¡£ÊÜ¡°¼ì²ìÍêÕû·¢Æ±¡±ÓÕ»óµÄÊܺ¦Õ߻ᱻÒýµ¼ÏÂÔØ ZIP Îļþ£¬´Ó¶øÆô¶¯Ä¾ÂíµÄÉø͸¹ý³Ì¡£
https://securityonline.info/mispadu-banking-trojan-expands-reach-targeting-europe-and-beyond/
3. ÀÕË÷Èí¼þ Agenda µÄбäÖÖ Ãé×¼ VMware ESXi ·þÎñÆ÷
3ÔÂ27ÈÕ£¬Agenda£¨ÓÖÃû Qilin ºÍ Water Galura£©ÓÚ 2022 ÄêÊ״α»·¢ÏÖ¡£ËüµÄµÚÒ»¸ö»ùÓÚ Golang µÄÀÕË÷Èí¼þ±»ÓÃÓÚÕë¶ÔÖÖÖÖÄ¿±ê£º´Ó¼ÓÄô󵽸çÂ×±ÈÑǺÍÓ¡¶ÈÄáÎ÷ÑǵÄÒ½ÁƱ£½¡¡¢ÖÆÔìºÍ½ÌÓýÁìÓò¡£µ½ 2022 Äêµ×£¬Agenda µÄËùÓÐÕßÓÃRust ÖØдÁËÆä¶ñÒâÈí¼þ£¬Rust¶ÔÓÚÏ£Íû¿ç²Ù×÷ϵÍÂä÷´«ÆäÊÂÇéµÄ¶ñÒâÈí¼þ×÷ÕßÀ´ËµÊÇÒ»ÖÖÓÐÓõÄÓïÑÔ¡£Í¨¹ý Rust ±äÌ壬Agenda Äܹ»Î£º¦½ðÈÚ¡¢Ö´·¨¡¢½¨ÖþµÈÁìÓòµÄ×éÖ¯£¬Ö÷ÒªÊÇÔÚÃÀ¹ú£¬µ«Ò²ÔÚ°¢¸ùÍ¢¡¢°Ä´óÀûÑÇ¡¢Ì©¹úºÍÆäËûµØ·½¡£×î½ü£¬Ç÷ÊƿƼ¼ÔÚÒ°Íâ·¢ÏÖÁËÒ»ÖÖÐ嵀 Agenda ÀÕË÷Èí¼þ±äÖÖ¡£Õâ¸ö»ùÓÚ Rust µÄ×îа汾Å䱸ÁËÖÖÖÖй¦Ð§ºÍÒþÐλúÖÆ£¬²¢½«ÆäÄ¿±êÖ±½ÓÃé×¼ÁË VMware vCenter ºÍ ESXi ·þÎñÆ÷¡£
https://www.darkreading.com/cloud-security/agenda-ransomware-vmware-esxi-servers
4. Giant Tiger ÌåÏÖ¿Í»§Êý¾ÝÒòµÚÈý·½Î¥¹æ¶øй¶
3ÔÂ25ÈÕ£¬ÕÛ¿ÛÁãÊÛÉÌ Giant Tiger ÌåÏÖ£¬Æ䲿ÃÅ¿Í»§µÄÁªÏµÐÅÏ¢ÔÚÓëÆäʹÓõĵÚÈý·½¹©Ó¦ÉÌÏà¹ØµÄ¡°Ê¼þ¡±ÖÐÔ⵽й¶¡£Õâ¼Ò×ܲ¿Î»ÓÚä×Ì«»ªµÄÕÛ¿ÛÁãÊÛÉÌ·¢ÑÔÈËÌåÏÖ£¬²»»á͸¶¹©Ó¦É̵ÄÃû³Æ£¬µ«ÌåÏÖ Giant Tiger ʹÓøù«Ë¾À´¹ÜÀíÆä¿Í»§ÏàͬºÍ»¥¶¯¡£¸ÃÁãÊÛÉÌÔÚ¸ø¿Í»§µÄµç×ÓÓʼþÖÐдµÀ£¬¸ÃÁãÊÛÉÌÓÚ 3 Ô 4 ÈÕÊ״λñϤ¸ÃÄþ¾²Ê¼þ£¬²¢ÓÚ 3 Ô 15 Èյóö½áÂÛ£¬¿Í»§ÐÅÏ¢Êܵ½Ó°Ïì¡£ÊÜÓ°ÏìµÄÐÅÏ¢Òò¿Í»§¶øÒì¡£ÆäÖаüÂÞ¶©ÔÄ Giant Tiger µç×ÓÓʼþµÄÈ˵ÄÐÕÃûºÍµç×ÓÓʼþµØÖ·¡£Ò»Ð©ÔÚÏß϶©µ¥ËÍ»õÉÏÃŵÄÖ÷¹Ë¿ÉÄÜÓµÓÐÏàͬµÄÐÅÏ¢ÒÔ¼°ËûÃǵĽֵÀµØÖ·¡£·¢ÑÔÈËÌåÏÖ£¬ÊÜ©¶´Ó°ÏìµÄ¿Í»§ÊýÁ¿Óëÿ¸ö¼Æ»®Ïà¹Ø£¬µ«Ã»Óиø³ö¾ßÌåÊý×Ö¡£
https://www.cbc.ca/news/business/giant-tiger-customer-data-breach-1.7154572?&web_view=true
5. µÂ¹ú 1.7Íò¸ö Microsoft Exchange ·þÎñÆ÷Ò×Êܵ½¹¥»÷
3ÔÂ26ÈÕ£¬µÂ¹úÁª°îÐÅÏ¢Äþ¾²°ì¹«ÊÒ (BSI)¾¯¸æ³Æ£¬µÂ¹úԼĪ 45000 ̨¿ÉÒÔ²»ÊÜÏÞÖƵشӻ¥ÁªÍø·ÃÎ浀 Microsoft Exchange ·þÎñÆ÷£¬Ô¼ÄªÓÐ 12%ÒѾ²»ÔÙΪÆäÌṩÄþ¾²¸üС±¡£´ËÍ⣬ËùÓÐÃæÏò»¥ÁªÍøµÄ·þÎñÆ÷ÖÐÔ¼ÓÐ 25% ÔËÐÐ Exchange 2016 ºÍ 2019£¬µ«Ã»Óа²×°×îеÄÄþ¾²²¹¶¡¡£BSI µ£Óǹ¥»÷Õß»áͨ¹ýÀûÓà CVE-2024-21410 À´ÆÆ»µÕâЩ·þÎñÆ÷£¬CVE-2024-21410 ÊÇÒ»¸öÑÏÖصÄÌØȨÌáÉý©¶´£¬ÔÊÐí¹¥»÷ÕßÁ˽âÄ¿±êÓû§µÄ NTLM ƾ¾Ý²¢¡°Öм̡±ÕâЩƾ¾Ý£¬ÒÔ½«×Ô¼º×÷ΪÓû§ÏòÒ×Êܹ¥»÷µÄ Exchange Server ½øÐÐÉí·ÝÑéÖ¤¡£Î¢ÈíÌåÏÖ£¬Ëü¡°ÒѾÒâʶµ½¸Ã©¶´±»ÀûÓá±£¬¶øÇÒËæºóÒѽ«ÆäÌí¼Óµ½ CISA µÄÒÑÖª±»ÀûÓ鶴Ŀ¼ÖС£
https://www.helpnetsecurity.com/2024/03/26/vulnerable-microsoft-exchange-servers/
6. ¶à¸ö Apple ²úÎïÖдæÔÚÈÎÒâ´úÂëÖ´ÐЩ¶´
3ÔÂ26ÈÕ£¬¶à¸ö Apple ²úÎïÖз¢ÏÖÁËÒ»¸ö©¶´ (CVE-2024-1580)£¬¸Ã©¶´¿ÉÄܵ¼ÖÂÈÎÒâ´úÂëÖ´ÐС£ÀÖ³ÉÀûÓôË©¶´¿ÉÄܵ¼ÖÂÔڵǼÓû§µÄÉÏÏÂÎÄÖÐÖ´ÐÐÈÎÒâ´úÂ롣ƾ¾ÝÓëÓû§¹ØÁªµÄȨÏÞ£¬¹¥»÷Õß¿ÉÒÔ°²×°·¨Ê½£»¼ì²ì¡¢¸ü¸Ä»òɾ³ýÊý¾Ý£»»ò´´½¨¾ßÓÐÍêÈ«Óû§È¨ÏÞµÄÐÂÕÊ»§¡£Óë¾ßÓйÜÀíÓû§È¨ÏÞµÄÓû§Ïà±È£¬ÆäÕÊ»§ÅäÖÃΪÔÚϵͳÉÏÓµÓнÏÉÙÓû§È¨ÏÞµÄÓû§Êܵ½µÄÓ°Ïì¿ÉÄܸüС¡£Ä¿Ç°»¹Ã»ÓйØÓÚ´Ë©¶´±»´ó¹æÄ£ÀûÓõijÂËß¡£
https://www.cisecurity.org/advisory/a-vulnerability-in-multiple-apple-products-could-allow-for-arbitrary-code-execution_2024-031