Telegram ÐÞ¸´ÓÃÓÚÆô¶¯ Python ½Å±¾µÄ Windows Ó¦Ó÷¨Ê½ÁãÈÕ©¶´

Ðû²¼Ê±¼ä 2024-04-15
1. Telegram ÐÞ¸´ÓÃÓÚÆô¶¯ Python ½Å±¾µÄ Windows Ó¦Ó÷¨Ê½ÁãÈÕ©¶´


4ÔÂ12ÈÕ£¬Telegram ÐÞ¸´ÁËÆä Windows ×ÀÃæÓ¦Ó÷¨Ê½ÖеÄÒ»¸öÁãÈÕ©¶´£¬¸Ã©¶´¿ÉÓÃÓÚÈƹýÄþ¾²¾¯¸æ²¢×Ô¶¯Æô¶¯ Python ½Å±¾¡£¹ýÈ¥¼¸Ì죬  ÓÐ¹Ø Windows °æ Telegram ÖÐÉæÏÓÔ¶³Ì´úÂëÖ´ÐЩ¶´µÄÒ¥ÑÔÔÚ X ºÍºÚ¿ÍÂÛ̳ÉÏÁ÷´«¡£ËäÈ»ÆäÖÐһЩÌû×ÓÉù³ÆÕâÊÇÒ»¸öÁãµã»÷ȱÏÝ£¬µ«ÑÝʾËùνµÄÄþ¾²¾¯¸æÈƹýºÍ RCE ©¶´µÄÊÓƵÇå³þµØÏÔʾÓÐÈ˵ã»÷¹²ÏíýÌåÀ´Æô¶¯ Windows ¼ÆËãÆ÷¡£Telegram Desktop ¿Í»§¶Ë»á¸ú×Ù  Óë·çÏÕÎļþ£¨ÀýÈç¿ÉÖ´ÐÐÎļþ£©Ïà¹ØµÄ ÎļþÀ©Õ¹ÃûÁбí¡£µ±ÓÐÈËÔÚ Telegram Öз¢ËÍÆäÖÐÒ»ÖÖÎļþÀàÐÍ£¬¶øÇÒÓû§µ¥»÷¸ÃÎļþʱ£¬Telegram Ê×ÏÈ»áÏÔʾÒÔÏÂÄþ¾²¾¯¸æ£¬¶ø²»ÊÇÔÚ Windows ÖеĹØÁª·¨Ê½ÖÐ×Ô¶¯Æô¶¯¡£Èç¹û¹¥»÷ÕßÄܹ»ÓÕÆ­Ä¿±ê´ò¿ªÎļþ£¬Õ⽫ÓÐЧµØÔÊÐí¹¥»÷ÕßÈƹýÄþ¾²¾¯¸æ²¢ÔÚÄ¿±êµÄ Windows É豸ÉÏÔ¶³ÌÖ´ÐдúÂë¡£


https://www.bleepingcomputer.com/news/security/telegram-fixes-windows-app-zero-day-used-to-launch-python-scripts/


2. ·¨¹ú¶à¸öÊÐÕþ¸®µÄ¹²Ïí·þÎñÆ÷Ôâµ½´ó¹æÄ£ÍøÂç¹¥»÷


4ÔÂ12ÈÕ£¬Ê¥ÄÉÔó¶ûÊгÆ£¬¹¥»÷ÈÔÔÚ¼ÌÐø¡£¡°ÕâÁ½¸öÉçÇøµÄ·þÎñÎÞ·¨Õý³£ÔËÐУ¬¡±¸ÃÊÐÔÚÒ»·Ý¾¯±¨ÖиæËß¾ÓÃñ£¬Ö¸µÄÊÇÊ¥ÄÉÔó¶ûÊкÍÊ¥ÄÉÔó¶û³ÇÇø¡£ÆäËûÊÜÓ°ÏìµÄ¶¼ÊаüÂÞÃÉͼÍß²¼ÁÐËþÄá¡¢¶«ÈÕ¡¢À­É³ÅåÀÕµÂÂêÀ³ºÍ²¨¶ûÄáʲ£¬ÒÔ¼°Ë÷Äɵ·òºÍÊ¥ÄÉÔó¶ûµØÓò¿ÉÁ¬ÐøÉú³¤»ú¹¹¡£Í¨Öª³Æ£¬¡°Ïֽ׶Σ¬ÍøÂç¹¥»÷µÄÆðÔ´ºÍÁ¬Ðøʱ¼äÉв»Çå³þ¡±¡£Í¨Öª³Æ£¬Ëæ×Å·þÎñ»Ö¸´£¬Ê¥ÄÉÔó¶ûÊкÍÊ¥ÄÉÔó¶ûÊн«ÔÚÉ罻ýÌåºÍÕþ¸®ÍøÕ¾ÉÏÐû²¼¸üÐÂÐÅÏ¢¡£ËäȻûÓÐ͸¶Ê¼þµÄÐÔÖÊ£¬µ«´Ë´ÎÖжÏÊÇÔÚ 3 Ô 11 ÈÕÖÁ 12 ÈÕ·¢ÉúµÄ´ó¹æÄ£ÂþÑÜʽ¾Ü¾ø·þÎñ (DDoS) ¹¥»÷Ö®ºó·¢ÉúµÄ£¬¸Ã¹¥»÷ʹ¶à¸ö·¨¹úÕþ¸®ÍøÕ¾³ä³â×ÅÐé¼ÙÁ÷Á¿£¬µ«²¢Î´ÖжÏÕþ¸®·þÎñ¡£DDoS ʼþ·¢Éú¼¸Ììºó£¬ÂôÁ¦¹ÒºÅºÍÔ®ÖúʧҵÈËÔ±µÄÕþ¸®²¿ÃÅ France Travail Åû¶ÁËÒ»Æð¾Þ´óµÄÊý¾Ýй¶Ê¼þ£¬¸Ãʼþй¶ÁËÁè¼Ý 4300 Íò¹«Ãñ 20 ÄêÇ°µÄ˽ÈËÐÅÏ¢¡£¸Ã²¿ÃÅÌåÏÖ£¬ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÄþ¾²ºÅÂë¡¢·¨¹úÀ͹¤±êʶ·û¡¢µç×ÓÓʼþµØÖ·¡¢ÓÊÕþµØÖ·ºÍµç»°ºÅÂ붼±»Ð¹Â¶¡£


https://www.theregister.com/2024/04/12/french_municipalities_cyberattack/


3. CISA ¶Ø´ÙÔÚ Sisense й¶ºóÁ¢¼´ÖØÖÃƾ֤


4ÔÂ12ÈÕ£¬ÃÀ¹úÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö (CISA) Åû¶ÁËÓ°ÏìÒµÎñ·ÖÎöÌṩÉÌ Sisense µÄ©¶´£¬²¢¶Ø´ÙÆä¿Í»§±£ÁôÆäƾ¾Ý¡£2024 Äê 4 Ô 11 ÈÕ£¬CISA Ðû²¼ÁËÓÐ¹Ø Sisense ¿Í»§Êý¾Ý¿ÉÄÜÔ⵽鶵Äͨ¸æ¡£¸Ã»ú¹¹¡°Ä¿Ç°ÕýÔÚÓë˽ӪÐÐÒµºÏ×÷»ï°éºÏ×÷£¬ÒÔÓ¦¶Ô¶ÀÁ¢Äþ¾²Ñо¿ÈËÔ±×î½ü·¢ÏÖµÄÓ°Ïì Sisense£¨Ò»¼ÒÌṩÊý¾Ý·ÖÎö·þÎñµÄ¹«Ë¾£©µÄ©¶´¡£¡±½ØÖÁ׫д±¾ÎÄʱ£¬Sisense ÉÐδ¹ûȻȷÈÏ»ò½â¾öÕâһΥ¹æÎÊÌ⡣Ȼ¶ø£¬ÍøÂçÄþ¾²¼ÇÕß Brian Krebs ÔÚËûµÄÍøÕ¾ÉÏÌåÏÖ£¬¸Ã¹«Ë¾ÏòÆä¿Í»§·¢ËÍÁËÒ»·âµç×ÓÓʼþ£¬È·ÈÏÆäÒÑÒâʶµ½¡°Sisense ¹«Ë¾µÄijЩÐÅÏ¢¿ÉÄÜÒÑÔÚÎÒÃDZ»¼û¸æµÄÊÜÏÞ·ÃÎÊ·þÎñÆ÷ÉÏÌṩ¡£¡±¸Ãµç×ÓÓʼþµÄ×÷Õß¡¢Sisense µÄ CISO Sangram Dash Ôö²¹µÀ£º¡°ÎÒÃÇÕýÔÚÈÏÕæ¿´´ý´ËÊ£¬²¢Á¢¼´Õ¹¿ªÊӲ졣¡±´ïʲ¼ÌÐø˵µÀ£º¡°ÎÒÃÇƸÇëÁËÐÐÒµÁìÏȵÄר¼ÒÀ´Ð­ÖúÎÒÃǽøÐÐÊӲ졣¸Ãʼþ²¢Î´µ¼ÖÂÎÒÃǵÄÒµÎñÔËÓªÖжÏ¡£Sisense ¿Í»§À´×Ô¸÷¸ö´¹Ö±ÐÐÒµ£¬°üÂÞÒøÐкͽðÈÚ¡¢µçÐÅ¡¢½ÌÓýºÍÒ½ÁƱ£½¡¡£


https://www.infosecurity-magazine.com/news/cisa-urges-reset-sisense-breach/


4. Æ­×ÓÀûÓà GITHUB µÄËÑË÷½á¹ûÀ´Á÷´«¶ñÒâÈí¼þ


4ÔÂ13ÈÕ£¬Checkmarx Ñо¿ÈËÔ±³ÂË߳ƣ¬ÍþвÐÐΪÕßÕýÔÚÀûÓà GitHub ËÑË÷½á¹û£¬Ïò¿ª·¢ÈËԱϵͳ´«Ëͳ־ÃÐÔ¶ñÒâÈí¼þ¡£¸Ã»î¶¯±³ºóµÄ¹¥»÷ÕßʹÓÃÁ÷ÐеÄÃû³ÆºÍÖ÷Ìâ´´½¨¶ñÒâ´æ´¢¿â£¬ÊӲ쵽ËûÃÇʹÓÃ×Ô¶¯¸üкͼÙÐǵȼ¼ÊõÀ´Ìá¸ßËÑË÷ÅÅÃû¡£Í¨¹ýÀûÓà GitHub Actions£¬¹¥»÷Õßͨ¹ýÐÞ¸ÄÎļþ£¨Í¨³£³ÆΪ¡°ÈÕÖ¾¡±£©£¬Ê¹Óõ±Ç°ÈÕÆÚºÍʱ¼ä»òÖ»ÊÇһЩËæ»úµÄС¸ü¸Ä£¬ÒԷdz£¸ßµÄƵÂÊ×Ô¶¯¸üд洢¿â¡£ÕâÖÖÁ¬ÐøµÄ»î¸ÐÈËΪµØÌá¸ßÁË´æ´¢¿âµÄ¿É¼ûÐÔ£¬ÌرðÊÇÔÚÓû§Í¨¹ý¡°×î½ü¸üС±¹ýÂ˽á¹ûµÄÇé¿öÏ£¬Ôö¼ÓÁ˺ÁÎÞ½äÐĵÄÓû§ÕÒµ½ºÍ·ÃÎÊËüÃǵĿÉÄÜÐÔ¡£¡±ÔĶÁCheckmarx Ðû²¼µÄ³ÂËß¡£¡°ËäÈ»×Ô¶¯¸üÐÂÓÐËù×ÊÖú£¬µ«¹¥»÷Õß½áºÏÁËÁíÒ»ÖÖ¼¼ÊõÀ´ÔöÇ¿Æä´æ´¢¿âµÄÓÐЧÐÔ£¬Ê¹Æäµ½´ï×î¼Ñ½á¹û¡£¹¥»÷ÕßʹÓöà¸öÐé¼ÙÕË»§Ìí¼ÓÐé¼ÙÃ÷ÐÇ£¬ÖÆÔìÊÜ»¶Ó­ºÍ¿ÉÐŵļÙÏó¡£ÎªÁËÌӱܼì²â£¬ÍþвÐÐΪÕß½«¶ñÒâ´úÂëÒþ²ØÔÚ Visual Studio ÏîÄ¿Îļþ£¨.csproj »ò .vcxproj£©ÖУ¬¸Ã´úÂë»áÔÚÏîÄ¿¹¹½¨Ê±×Ô¶¯Ö´ÐС£

https://securityaffairs.com/161792/cyber-crime/githubs-search-results-distribute-malware.html


5. ¼ÓÄôóÁãÊÛÁ¬Ëø¾ÞÍ· GIANT TIGER й¶280ÍòÌõÊý¾Ý


4ÔÂ14ÈÕ£¬Ò»ÃûÍøÃûΪ ShopifyGUY µÄÍþвÐÐΪÕßÉù³Æ¶Ô¹¥»÷¼ÓÄôóÁãÊÛÁ¬Ëøµê Giant Tiger ÂôÁ¦£¬²¢ÔÚºÚ¿ÍÂÛ̳ÉÏй¶ÁË 280 ÍòÌõ¼Ç¼¡£Giant Tiger ÊÇÒ»¼Ò¼ÓÄôóÕÛ¿ÛÁ¬Ëøµê£¬ÔÚ¼ÓÄôó¸÷µØ¾­Óª 260 ¶à¼ÒÉ̵ê¡£Ðû²¼¸ÃÌû×ÓµÄÍþвÐÐΪÕßÉù³ÆÒÑÉÏ´« 2024 Äê 3 Ô±»µÁµÄ¹«Ë¾µÄÍêÕûÊý¾Ý¿â¡£¸ÃÌû×Ó±³ºóµÄÍþвÐÐΪÕßÉù³ÆÒÑÉÏ´« 2024 Äê 3 Ô±»µÁµÄ Giant Tiger ¿Í»§¼Ç¼µÄ¡°ÍêÕû¡±Êý¾Ý¿â¡£Ð¹Â¶µÄÊý¾Ý°üÂÞµç×ÓÓʼþµØÖ·¡¢ÐÕÃû¡¢µç»°ºÅÂ롢ʵ¼ÊµØÖ·ºÍÍøÕ¾»î¶¯¡£²ÆÕþÊý¾Ý²¢Î´Êܵ½ËùνʼþµÄÓ°Ïì¡£¼ÓÄôóÁãÊÛÁ¬ËøµêµÄ¿Í»§¿ÉÒÔͨ¹ý²éѯÊý¾Ýй¶¼à¿Ø·þÎñ HaveIBeenPwned À´¼ì²éй¶µÄµµ°¸ÖÐÊÇ·ñ´æÔÚÆäÊý¾Ý¡£


https://securityaffairs.com/161811/cyber-crime/giant-tiger-data-breach.html


6. RokuÔ⵽ײ¿â¹¥»÷Áè¼Ý57Íò¸öÕ˺ÅÐÅϢй¶


4ÔÂ12ÈÕ£¬Roku Ðû²¼£¬576,000 ¸öÕÊ»§ÔÚеÄײ¿â¹¥»÷ÖÐÔâµ½ºÚ¿Í¹¥»÷£¬ÍþвÐÐΪÕßʹÓôӵÚÈý·½Æ½Ì¨ÇÔÈ¡µÄƾ¾Ý¡£½ñÄêÔçЩʱºò£¬Roku ¼ì²âµ½Òì³£ÕÊ»§»î¶¯£¬²¢·¢ÏÖδ¾­ÊÚȨµÄ¹¥»÷ÕßʹÓÃͨ¹ý¡°Æ¾¾ÝÌî³ä¡±´Ó²îÒìÀ´Ô´»ñÈ¡µÄµÇ¼ƾ¾Ý·ÃÎÊÁËԼĪ 15,000 ¸öÓû§ÕÊ»§¡£¸Ã¹«Ë¾Íê³É¶ÔÊ׸öÄþ¾²Â©¶´µÄÊÓ²ìºó£¬ÓÚÈýÔ³õ֪ͨÁËÊÜÓ°ÏìµÄ¿Í»§¡£¸Ã¹«Ë¾¼ÌÐø¼à¿ØÕË»§»î¶¯£¬²¢·¢ÏÖÁ˵ڶþÆðÓ°ÏìԼĪ 576,000 ¸öÕË»§µÄʼþ¡£Ã»Óм£Ïó±íÃ÷ Roku ÊÇÕâЩ¹¥»÷ÖÐʹÓõÄÕÊ»§Æ¾¾ÝµÄÀ´Ô´£¬Ò²Ã»Óм£Ïó±íÃ÷ Roku µÄϵͳÔÚÕâÁ½ÆðʼþÖÐÊܵ½ÁËË𺦡£Ïà·´£¬ÕâЩ¹¥»÷ÖÐʹÓõĵǼƾ¾ÝºÜ¿ÉÄÜÊÇ´ÓÆäËûÀ´Ô´»ñÈ¡µÄ£¬ÀýÈçÁíÒ»¸öÔÚÏßÕÊ»§£¬ÊÜÓ°ÏìµÄÓû§¿ÉÄÜʹÓÃÁËÏàͬµÄƾ¾Ý¡£¡±ÔĶÁ¸Ã¹«Ë¾Ðû²¼µÄÐÂΟå¡£¡°ÔÚ²»µ½ 400 Æð°¸ÀýÖУ¬¶ñÒâÐÐΪÕߵǼ²¢Ê¹ÓÃÕâЩÕÊ»§Öд洢µÄ¸¶¿î·½Ê½Î´¾­ÊÚȨ¹ºÖÃÁ÷ýÌå·þÎñ¶©ÔÄºÍ Roku Ó²¼þ²úÎµ«ËûÃÇÎÞ·¨·ÃÎÊÈκÎÃô¸ÐÐÅÏ¢£¬°üÂÞÍêÕûµÄÐÅÓÿ¨ºÅ»òÆäËûÐÅÏ¢¡£ÍêÕûµÄ¸¶¿îÐÅÏ¢¡£


https://securityaffairs.com/161765/data-breach/roku-second-data-breach.html