DARK ANGELS³Æ´ÓоƬÖÆÔìÉÌNEXPERIAÇÔÈ¡1TBÊý¾Ý
Ðû²¼Ê±¼ä 2024-04-184ÔÂ16ÈÕ£¬Dark Angels (Dunghill) ÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶ÔÈëÇÖоƬÖÆÔìÉÌ Nexperia ²¢ÇÔÈ¡¸Ã¹«Ë¾ 1 TB Êý¾ÝÂôÁ¦¡£NexperiaÊÇÒ»¼Ò°ëµ¼ÌåÖÆÔìÉÌ£¬×ܲ¿Î»ÓÚºÉÀ¼ÄÎ÷ºà¡£ËüÔڵ¹úºº±¤ºÍÓ¢¹ú´óÂü³¹Ë¹ÌØÉèÓÐÇ°¶Ë¹¤³§¡£¸Ã¹«Ë¾µÄ²úÎﷶΧ°üÂÞË«¼«¾§Ìå¹Ü¡¢¶þ¼«¹Ü¡¢ESD ±£»¤¡¢TVS ¶þ¼«¹Ü¡¢MOSFET ºÍÂß¼Æ÷¼þ¡£½ØÖÁ 2024 Ä꣬¸ÃоƬÖÆÔìÉÌÓµÓÐ 14000 ÃûÔ±¹¤¡£Dark Angels ÀÕË÷Èí¼þ×éÖ¯½« Nexperia Ìí¼Óµ½Æä Tor й¶ÍøÕ¾µÄÊܺ¦ÕßÃûµ¥ÖС£¸Ã×éÖ¯Ðû²¼ÁËÒ»×éÎļþ×÷ΪÄþ¾²Â©¶´µÄÖ¤¾Ý£¬²¢Íþв³Æ£¬Èç¹ûÊܺ¦Õß²»Ö§¸¶Êê½ð£¬¾Í»áй¶ËùÓб»µÁÊý¾Ý¡£¸ÃоƬÖÆÔìÉÌ֤ʵ£¬ËüÓÚ 2024 Äê 3 ÔÂÒâʶµ½Ä³Ð© Nexperia IT ·þÎñÆ÷Ô⵽δ¾ÊÚȨµÄ·ÃÎÊ¡£ÎªÁËÓ¦¶ÔÕâһʼþ£¬¸Ã¹«Ë¾½«ÊÜÓ°ÏìµÄϵͳÓ뻥ÁªÍø¶Ï¿ªÁ¬½Ó£¬ÒÔ·ÀÖ¹ÍþвÂûÑÓ¡£
https://securityaffairs.com/161888/cyber-crime/ransomware-dark-angels-nexperia.html
2. AWS¡¢Google ºÍ Azure CLI ¹¤¾ß¿ÉÄÜ»áй¶¹¹½¨ÈÕÖ¾ÖеÄƾ֤
4ÔÂ16ÈÕ£¬ÐµÄÍøÂçÄþ¾²Ñо¿·¢ÏÖ£¬À´×Ô Amazon Web Services (AWS) ºÍ Google Cloud µÄÃüÁîÐнçÃæ (CLI) ¹¤¾ß¿ÉÄÜ»á̻¶¹¹½¨ÈÕÖ¾ÖеÄÃô¸Ðƾ¾Ý£¬´Ó¶ø¸ø×éÖ¯´øÀ´ÖØ´ó·çÏÕ¡£¸Ã©¶´±»ÔÆÄþ¾²¹«Ë¾ OrcaÃüÃûΪLeakyCLI ¡£Azure CLI¡¢AWS CLI ºÍ Google Cloud CLI ÉϵÄһЩÃüÁî¿ÉÒÔÒÔ»·¾³±äÁ¿µÄÐÎʽ̻¶Ãô¸ÐÐÅÏ¢£¬ÕâЩÐÅÏ¢¿ÉÒÔÔÚͨ¹ý GitHub Actions µÈ¹¤¾ßÐû²¼Ê±±»¹¥»÷ÕßÊÕ¼¯¡£½ñºó£¬Î¢ÈíÔÚ 2023 Äê 11 ÔÂÐû²¼µÄÄþ¾²¸üÐÂÖнâ¾öÁ˸ÃÎÊÌ⣬²¢ÎªÆä·ÖÅäÁË CVE ±êʶ·û CVE-2023-36052£¨CVSS ÆÀ·Ö£º8.6£©¡£¼ò¶øÑÔÖ®£¬Õâ¸öÏë·¨Óë CLI ÃüÁîÈçºÎÓÃÓÚÏÔʾ£¨Ô¤£©½ç˵µÄ»·¾³±äÁ¿ÒÔ¼°Êä³öµ½Á¬Ðø¼¯³ÉºÍÁ¬Ðø²¿Êð (CI/CD) ÈÕÖ¾Óйء£Orca ÌåÏÖ£¬ËüÔÚ GitHub ÉÏ·¢ÏÖÁ˶à¸öÏîÄ¿£¬ÕâЩÏîÄ¿ÎÞÒâÖÐͨ¹ý Github Actions¡¢CircleCI¡¢TravisCI ºÍ Cloud Build ÈÕ־й¶ÁË·ÃÎÊÁîÅƺÍÆäËûÃô¸ÐÊý¾Ý¡£
https://thehackernews.com/2024/04/aws-google-and-azure-cli-tools-could.html
3. ½©Ê¬ÍøÂç¼ÌÐøÀûÓà CVE-2023-1389 ½øÐдó·¶Î§Á÷´«
4ÔÂ16ÈÕ£¬ÔÚ2023ÄêÃüÁî×¢È멶´CVE-2023-1389±»Åû¶£¬²¢Õë¶Ô TP-Link Archer AX21 (AX1800) µÄ Web ¹ÜÀí½çÃ濪·¢ÁËÐÞ¸´·¨Ê½¡£FortiGuard Labs ¿ª·¢ÁË IPS Ç©ÃûÀ´½â¾öÕâ¸öÎÊÌâ¡£×î½ü£¬ÎÒÃÇÊӲ쵽Õë¶ÔÕâ¸öÒ»ÄêÇ°µÄ©¶´µÄ¶àÆð¹¥»÷£¬Öصã¹Ø×¢ Moobot¡¢Miori¡¢»ùÓÚ Golang µÄÊðÀí¡°AGoent¡±ºÍ Gafgyt ±äÌåµÈ½©Ê¬ÍøÂç¡£ÕâÊÇͨ¹ý Web ¹ÜÀí½çÃæÌṩµÄ¡°locale¡±API ÖÐδ¾Éí·ÝÑéÖ¤µÄÃüÁî×¢È멶´¡£Gafgyt£¬Ò²³ÆΪ BASHLITE£¬ÊÇÒ»ÖÖѬȾ Linux ¼Ü¹¹²Ù×÷ϵͳÒÔÌᳫ DDoS£¨ÂþÑÜʽ¾Ü¾ø·þÎñ£©¹¥»÷µÄ¶ñÒâÈí¼þ¡£ÓëÍù³£Ò»Ñù£¬½©Ê¬ÍøÂ粻ͣµØÃé×¼ÎïÁªÍø©¶´£¬²»Í£ÊµÑéÀûÓÃËüÃÇ¡£¾¡¹ÜÈ¥Äê·¢ÏÖÁË©¶´ CVE-2023-1389 ²¢ÌṩÁËÐÞ¸´´ëÊ©£¬µ«ÈÔÓÐÐí¶à»î¶¯ÀûÓø鶴£¬µ¼ÖÂÎÒÃÇµÄ IPS Ò£²âµ½´ïÏÔ×Å·åÖµ¡£Óû§Ó¦¾¯ÌèDDoS½©Ê¬ÍøÂ磬²¢¼°Ê±Ó¦Óò¹¶¡ÒÔ±£»¤ÆäÍøÂç»·¾³ÃâÊÜѬȾ£¬·ÀÖ¹Æä³ÉΪ¶ñÒâÍþвÕߵĻúÆ÷ÈË¡£
https://www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread
4. LightSpy ºÚ¿ÍÃé×¼Ó¡¶ÈÆ»¹ûÉ豸Óû§ÇÔÈ¡Ãô¸ÐÊý¾Ý
4ÔÂ17ÈÕ£¬ºÚ¿ÍÃé׼ƻ¹ûÉ豸Óû§ÊÇÒòΪËûÃDZ»ÈÏΪ¾ßÓнϸߵÄÉç»á½×²ã¡£Õâ»áµ¼ÖÂÄ¿±ê±ÈÆäËûÈ˸ü¸»ÓУ¬¶øÇÒ¿ÉÄÜÒÔijÖÖ·½Ê½ÏòºÚ¿ÍÌṩ¸ü¶à×ʽ𡣳ý´ËÖ®Í⣬ƻ¹ûµÄÉú̬ϵͳÊÇÏ໥¹ØÁªµÄ£¬ÕâÒâζ×ÅËüÓжà¸öºÚ¿Í¿ÉÒÔ½øÈëµÄµã£¬´Ó¶øµ¼ÖÂÕÊ»§ºÍÉ豸Êܵ½Ë𺦡£ºÚÝ®ÍøÂçÄþ¾²Ñо¿ÈËÔ±×î½ü·¢ÏÖ LightSpy ºÚ¿ÍÕýÔÚ»ý¼«Ãé×¼Ó¡¶ÈÆ»¹ûÉ豸Óû§ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£LightSpy ÊÇÒ»¸öÄ£¿é»¯¼äµý¹¤¾ß°ü£¬¿ÉÒÔÇÔÈ¡Êܺ¦ÕߵĸöÈËÐÅÏ¢£¬ÀýÈçʵ¼Ê GPS ×ø±ê»ò VOIP ͨ»°¡£ÕâÖÖеÄÍþвºÜΣÏÕ£¬ÒòΪËüÔÊÐíºÚ¿ÍÒÔ¼«¸ßµÄ׼ȷ¶È¸ú×ÙÄ¿±ê£¬À©´óÕâÖֹ㷺¼àÊÓ¶ÔÕþÖÎÃô¸ÐµØÓòÖªÃûÊܺ¦ÕßµÄDZÔÚÓ°Ïì¡£LightSpy ¾ßÓй㷺µÄ¼äµýÄÜÁ¦£¬¿ÉÓÃÓÚ¼à¿ØÉ豸Êý¾Ý¡¢QQ ÏûÏ¢ÄÚÈÝ¡¢Î¢ÐÅÏûÏ¢¡¢Telegram ÁÄÌì¼Ç¼ºÍ΢ÐÅÖ§¸¶ÀúÊ·¼Ç¼¡£
https://gbhackers.com/lightspy-hackers-target-indian-apple-users/
5. ˼¿Æ¾¯¸æ VPN ºÍ SSH ·þÎñÃæÁÙ´ó¹æÄ£±©Á¦¹¥»÷
4ÔÂ17ÈÕ£¬Ë¼¿Æ Talos Ñо¿ÈËÔ±¾¯¸æ³Æ£¬ÖÁÉÙ×Ô 2024 Äê 3 Ô 18 ÈÕÆð£¬Õë¶Ô¶à¸öÄ¿±êµÄ´ó¹æģƾ֤±©Á¦¹¥»÷½«²»Í£·¢Éú£¬ÆäÖаüÂÞÐéÄâרÓÃÍøÂç (VPN) ·þÎñ¡¢Web Ó¦Ó÷¨Ê½Éí·ÝÑéÖ¤½Ó¿ÚºÍ SSH ·þÎñ¡£ ÒÔÏÂÊÇÒÑÖªÊÜÓ°Ïì·þÎñµÄÁÐ±í£ºCisco Secure Firewall VPN Checkpoint VPN¡¢Fortinet VPN¡¢SonicWall VPN¡¢RD Web Services¡¢Miktrotik¡¢DraytekºÍUbiquiti¡£Àֳɵı©Á¦¹¥»÷¿ÉÄܻᵼÖÂδ¾ÊÚȨµÄÍøÂç·ÃÎÊ¡¢ÕÊ»§Ëø¶¨»ò¾Ü¾ø·þÎñ (DoS) Çé¿ö¡£ÕâЩ¹¥»÷Ô´×Ô TOR ³ö¿Ú½ÚµãÒÔ¼°ÄäÃûËíµÀºÍÊðÀí£¬ÀýÈ磺VPN Gate¡¢IPIDEA Proxy¡¢BigMama Proxy¡¢Space Proxies¡¢Nexus ProxyºÍProxy Rack¡£
https://securityaffairs.com/161943/hacking/brute-force-attacks.html
6. GOLD IONIC ÀÕË÷ÍÅ»ïµÄ¹¥»÷»î¶¯Ã÷ÏÔÉý¼¶
4ÔÂ16ÈÕ£¬ÍøÂçÄþ¾²Ñо¿ÈËÔ±ÕýÔÚ×·×Ù GOLD IONIC ÀÕË÷Èí¼þ×éÖ¯µÄ»î¶¯ÏÔ×ÅÉý¼¶¡£×Ô 2023 Äê 8 Ô·ºÆðÒÔÀ´£¬Õâ¸ö¼¤½øµÄÍþв×éÖ¯ÒÑѸËÙ»ýÀÛÁËÒ»·ÝÊܺ¦ÕßÃûµ¥¡£ËûÃǵĹ¥»÷Õë¶ÔÊÀ½ç¸÷µØµÄ×éÖ¯£¬²¿Êð¶¨ÖƵġ°INC¡±ÀÕË÷Èí¼þ£¬¶ÔÖØÒªÊý¾Ý½øÐмÓÃܲ¢½«Æä¿ÛΪÈËÖÊ¡£GOLD IONIC µÄ¹¥»÷ÌåÏÖ³öÆä²»·ÖÇàºìÔí°×µÄÐÔÖÊ£¬Ó°Ïìן÷¸öÐÐÒµµÄÆóÒµºÍ×éÖ¯¡£È»¶ø£¬ËûÃǵÄÖصãËƺõÊÇÃÀ¹úµÄÄ¿±ê£¬ÆäÖй¤Òµ¡¢Ò½ÁƱ£½¡ºÍ½ÌÓý»ú¹¹ÔâÊܵĹ¥»÷ÊýÁ¿¹ý¶à¡£ÓÉÓÚÉúÃüºÍ»¼ÕßÊý¾ÝÐü¶øδ¾ö£¬Ò½ÁƱ£½¡ÐÐÒµÒѾÃæÁÙ×ÅÖÚ¶àÌôÕ½£¬»¹ÃæÁÙ×ÅÀÕË÷Èí¼þµÄÑÏÖØ·çÏÕ¡£½ÌÓý»ú¹¹¡¢Ãô¸ÐѧÉú¼Ç¼ºÍÑо¿µÄ±£¹ÜÕßÒ²·¢ÏÖ×Ô¼ºÔ½À´Ô½³ÉΪ¹¥»÷Ä¿±ê¡£
https://securityonline.info/inc-ransomware-surge-new-gold-ionic-group-hits-global-targets/