ºÚ¿Í鶶íÂÞ˹Éç½»ÍøÂçVK 3.9ÒÚÓû§Êý¾Ý
Ðû²¼Ê±¼ä 2024-09-049ÔÂ3ÈÕ£¬ºÚ¿Í¡°HikkI-Chan¡±ÔÚ·Ç·¨ºÚ¿ÍÂÛ̳Breach ForumsÉϹûÈ»Á˾ªÈ˵Ä3.9ÒÚVKÓû§Êý¾Ý¡£VK×÷Ϊ¶íÂÞ˹¼°¶«Å·µØÓò¹ãÊÜ»¶ÓµÄÉ罻ýÌåƽ̨£¬ÆäÓû§¸öÈËÐÅÏ¢°üÂÞ¶¼ÊС¢¹ú¼Ò¡¢È«Ãû¡¢¸öÈË×ÊÁÏͼƬURLµÈÃô¸ÐÄÚÈݲ»ÐÒ±»Ð¹Â¶£¬×ÜÁ¿¸ß´ï390,425,719Ìõ¼Ç¼£¬Êý¾Ý¹æÄ£Áè¼Ý27GB¡£ÖµµÃ×¢ÒâµÄÊÇ£¬¾¡¹Ü´Ë´Î鶵ÄÐÅÏ¢Á¿¾Þ´ó£¬µ«²¢Î´°üÂÞÓû§µÄµç»°ºÅÂë»òÃÜÂ룬¼õÇáÁËÖ±½ÓÄþ¾²Íþв¡£È»¶ø£¬Óû§È«Ãû¡¢¶¼Êм°¹ú¼ÒµÈÐÅÏ¢µÄ̻¶ÈÔ¿ÉÄÜÒý·¢Ò»ÏµÁзçÏÕ£¬ÓÈÆäÊÇ¿¼Âǵ½ÕâЩÐÅϢΪ¶íÓËä¿ÉÄÜÏÞÖƷǶíÓïÍþвÕßµÄÖ±½ÓÀûÓ㬵«Òþ»¼ÈÔ²»ÈݺöÊÓ¡£ºÚ¿Í¡°HikkI-Chan¡±Éù³Æ´Ë´Î²¢·ÇÖ±½ÓÈëÇÖVK·þÎñÆ÷£¬¶øÊÇÒ»´ÎËùνµÄ¡°¶þ½×¡±ÈëÇÖ£¬¼´ÀûÓôÓÆäËûµÚÈý·½ÇþµÀ·Ç·¨»ñÈ¡µÄÊý¾ÝÀ´¼ä½Ó»ñÈ¡VKÓû§ÐÅÏ¢¡£VK²¢·ÇÊ×´ÎÔâÓöÊý¾Ýй¶Σ»ú£¬ÔçÔÚ2016Ä꣬¾ÍÓб¨µÀÖ¸³ö¸Ãƽ̨µÄÓû§ÕË»§ÔøÔÚ°µÍøÉϱ»³öÊÛ¡£
https://hackread.com/hacker-leaks-data-of-vk-users-russian-social-network/
2. ÅûÈøÁ¬ËøµêƵÔâÍøÂçµöÓãÕ©Æ£¬ÇÔÈ¡ÐÅÓÿ¨Êý¾Ý
9ÔÂ2ÈÕ£¬È«Çò·¶Î§ÄÚ£¬ÌرðÊǼÓÄô󣬶à¼ÒÖªÃûÅûÈøÁ¬ËøµêÕýÔâÊÜÍøÂçµöÓãթƵÄÇÖÏ®£¬Õ©ÆÕßÀûÓÃÓòÃûÆÛÆ¡¢ÍøÂçµöÓã¼°Éú³ÉʽÈ˹¤ÖÇÄܵÈÊֶΣ¬´´½¨¸ß¶È·ÂÕæµÄ¶ñÒâÍøÕ¾£¬ÇÔÈ¡Ö÷¹ËÐÅÓÿ¨ÐÅÏ¢£¬Ôì³ÉÖØ´ó¾¼ÃËðʧ¡£Õⳡ×Ô2023Äê±ã¿ªÊ¼µÄթƻ£¬Í¨¹ýÄ£·ÂºÏ·¨ÅûÈøÍâÂôÍøÕ¾µÄ¶©µ¥Ò³Ã棬ÓÕµ¼Óû§ÊäÈë¸öÈËÐÅÏ¢¼°Ò»´ÎÐÔÃÜÂ룬½ø¶ø͵ȡÐÅÓÿ¨Êý¾Ý¡£³ýмÓƵÄDomino's PizzaÍ⣬¼ÓÄôó±¾ÍÁµÄÅûÈø³øʦ¡¢±ÈÈø±ÈÈø¡¢²¨Ê¿¶ÙÅûÈøµÈÖªÃûÆ·ÅÆÒàδÄÜÐÒÃâ¡£Õ©ÆÕßͨ¹ý¸¶·ÑËÑË÷ÒýÇæ¹ã¸æÌáÉý¶ñÒâÓòÃûÆعâ¶È£¬ÀûÓÃƴд´íÎó¡¢Í¬ÐÎÒìÒå´ÊµÈ¼¼ÇÉÎóµ¼Óû§£¬²¢Í¨¹ý²»Í£×¢²áÐÂÓòÃû¡¢¸üÐÂÏÖÓÐÓòÃû¼°¸ü»»IPµØÖ·À´Ìӱܼì²â¡£´ËÀ๥»÷²»½ö¼¼ÊõÅÓ´ó£¬ÇÒ·¶Î§¹ã·º£¬¶ÔÈ«ÇòÅûÈøÐÐÒµ×é³ÉÑÏÖØÍþв¡£ÎªÁË·À·¶´ËÀàÍøÂçµöÓãÕ©Æ£¬Ö÷¹ËÐèÌá¸ß¾¯Ì裬×Ðϸ¼ì²éÓòÃûÖеÄÒì³£Ðźţ¬¹Ø×¢×¢²áÈÕÆÚ£¬ÆôÓöàÒòËØÉí·ÝÑéÖ¤£¬²¢¼°Ê±ÏòÖ´·¨²¿ÃųÂËß¿ÉÒɽ»Òס£
https://hackread.com/phishing-scam-canadian-pizza-chains-credit-card-data/
3. CISA½ô¼±¶Ø´ÙÐÞ²¹Draytek·ÓÉÆ÷Óë½ðɽWPS OfficeÄþ¾²Â©¶´
9ÔÂ3ÈÕ£¬ÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£¨CISA£©½ô¼±Ðû²¼Á˹ØÓÚÈý¸öÕý±»»ý¼«ÀûÓõÄÑÏÖØ©¶´µÄ¾¯Ê¾£¬¶Ø´ÙÈ«Çò×éÖ¯ÓÈÆäÊÇÁª°î»ú¹¹Ñ¸ËÙÓ¦¶Ô¡£ÆäÖУ¬Draytek VigorConnect ·ÓÉÆ÷̻¶µÄ CVE-2021-20123 ºÍ CVE-2021-20124 ©¶´£¬ÈÃδÊÚȨ¹¥»÷ÕßÄÜÇáÒ×·ÃÎÊÃô¸ÐÎļþ£¬×é³ÉÊý¾Ýй¶¼°ÏµÍ³ÈëÇÖµÄÖØ´óÍþв¡£ÁíÒ»Ïî¸ß·çÏÕ©¶´ CVE-2024-7262 ¾Û½¹ÓÚ½ðɽWPS Office£¬Õâ¿îÔÚ¶«ÑǵØÓò¹ã·ºÊ¹Óõİ칫Ì×¼þ£¬Òò´æÔÚÑÏÖصÄ·¾¶±éÀúÎÊÌ⣨CVSS ÆÀ·Ö¸ß´ï9.8£©£¬³ÉΪº«¹ú¹ØÁªÍøÂç¼äµý×éÖ¯APT-C-60µÄ¹¥»÷Ä¿±ê¡£ÀûÓôËÁãÈÕ©¶´£¬APT-C-60²¿ÊðÁËSpyGlaceºóÃÅ£¬´Ë©¶´µÄºËÐÄÔÚÓÚ¶ÔÓû§Îļþ·¾¶ÑéÖ¤µÄÊèºö£¬Ê¹µÃ¹¥»÷ÕßÄÜÉÏ´«²¢Ö´ÐÐÈÎÒâWindows¿â£¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐУ¬È«Ãæ¿ØÖÆÊܺ¦ÏµÍ³£¬²¢ºã¾ÃÇÔÈ¡Êý¾Ý¡£ÎªÓ¦¶ÔÕâÒ»½ôÆÈÐÎÊÆ£¬CISAÒÑÒªÇóÁª°îÃñÊÂÐÐÕþ²¿ÃÅÔÚ2024Äê9ÔÂ24ÈÕÇ°Íê³É©¶´ÐÞ²¹¡£
https://securityonline.info/cisa-issues-alert-three-actively-exploited-vulnerabilities-demand-immediate-attention/
4. Head MareºÚ¿Í×éÖ¯Õë¶Ô¶íº×·¢¶¯ÍøÂç¹¥»÷ÓëÀÕË÷
9ÔÂ3ÈÕ£¬Head MareºÚ¿Í×éÖ¯×Ô2023ÄêÆð»îÔ¾£¬×¨ÃÅÕë¶Ô¶íÂÞ˹ºÍ°×¶íÂÞ˹µÄ×éÖ¯·¢¶¯ÍøÂç¹¥»÷¡£¸Ã×éÖ¯½ÓÄÉÏȽø¼Æı£¬ÈçÀûÓÃWinRARÖеÄCVE-2023-38831©¶´Ö´ÐжñÒâ´úÂ룬ÒÔÔöÇ¿Æä¹¥»÷Òþ±ÎÐÔºÍЧÂÊ¡£Head Mare²»½öй¶Êܺ¦ÕßÃô¸ÐÐÅÏ¢£¬»¹Í¨¹ýLockBit£¨Õë¶ÔWindows£©ºÍBabuk£¨Õë¶ÔLinux£©¼ÓÃÜÉ豸£¬Ë÷ÒªÊê½ð¡£Æ乤¾ß°ü°üÂÞPhantomDLºÍPhantomCoreµÈ¶¨ÖƺóÃÅ£¬ÓÃÓÚÉÏ´«ÎļþºÍÖ´ÐÐÃüÁαװ³É΢Èí¸üÐÂÈÎÎñÒÔ»ìÏýÊÓÌý¡£´ËÍ⣬¸Ã×éÖ¯»¹ÀûÓÃSliverµÈ¿ªÔ´C2¿ò¼Ü¼°¶àÖÖ¹ûÈ»¹¤¾ß½øÐкáÏòÒƶ¯ºÍƾ֤ÊÕ¼¯¡£¹¥»÷ͨ³£ÒÔÍøÂçµöÓãÓʼþЯ´øË«À©Õ¹ÃûÎĵµÎª¿ª¶Ë£¬×îÖÕ²¿ÊðÀÕË÷Èí¼þ²¢ÁôÏÂÊê½ðÒªÇ󡣿¨°Í˹»ùÖ¸³ö£¬Head MareµÄÕ½Êõ¡¢¼¼ÊõºÍ·¨Ê½Óë¶íÎÚ³åÍ»Åä¾°ÏÂÆäËûÕë¶Ô¶í°×Á½¹úµÄºÚ¿Í×éÖ¯ÏàËÆ£¬µ«ÆäÌØÉ«ÔÚÓÚʹÓö¨ÖƶñÒâÈí¼þºÍ×îЩ¶´£¬Õ¹ÏÖÁ˸߶ȵÄרҵÐÔºÍÕë¶ÔÐÔ¡£
https://thehackernews.com/2024/09/hacktivists-exploits-winrar.html
5. Booking.comÔâÓöÅÓ´óÍøÂçµöÓã¹¥»÷
9ÔÂ3ÈÕ£¬OSINTMATTER×îгÂËß½ÒʾÁËÕë¶ÔBooking.comµÄÅÓ´óÍøÂçµöÓã»î¶¯£¬Æä¼Æı°üÂÞ¶à½×¶ÎÈëÇÖ£¬´Ó¾Æµê¾ÀíÕË»§µ½Ö±½ÓÆÛÆ¿Í»§¡£¹¥»÷ÕßÀûÓ÷ÂðÓòÃû¡°extraknet-booking.com¡±ÓÕÆÓû§½øÈëÍâ¹Û´«ÉñµÄÐé¼ÙÍøÕ¾£¬Ö¼ÔÚÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬°üÂ޵Ǽƾ¾Ý¡¢¸öÈËÊý¾ÝºÍ²ÆÕþÏêϸÐÅÏ¢¡£¸ÃÍøվͨ¹ýJavaScript»ìÏý¼¼ÊõÒþ²Ø¶ñÒâ´úÂ룬²¢¿ÉÄÜÓëNinja TrojanµÈ¶ñÒâÈí¼þÏà¹ØÁª¡£´ËÍ⣬¹¥»÷Õß»¹ÀûÓÃSTUN°ó¶¨ÇëÇóÒþ²Ø¶ñÒâÁ÷Á¿£¬²¢Í¨¹ý¶¯Ì¬Î±×°¼¼Êõƾ¾ÝÓû§ÌØÕ÷չʾ²îÒìÄÚÈÝ£¬ÒÔÌӱܼì²â¡£ÌرðÖµµÃ×¢ÒâµÄÊÇ£¬¹¥»÷ÍøÂçÖеÄiFrameÁ¬½ÓÖÁÒ»ÆäÖÐÐÄÊàŦ£¬¼¯ÖпØÖƲ¢À©´óµöÓ㷶Χ¡£´Ë´Î¹¥»÷͹ÏÔÁËÍøÂçµöÓãÊֶεÄÈÕÒæÅÓ´óÓëÒþ±Î£¬¶ÔÂÃÓÎÒµÄþ¾²×é³ÉÑÏÖØÍþв£¬¾¯Ê¾Óû§ºÍÆóÒµÐè¼ÓÇ¿¾¯Ì裬¶ÀÁ¢ÑéÖ¤ÍøÕ¾ºÏ·¨ÐÔ£¬·À·¶¸öÈËÐÅϢй¶¡£
https://securityonline.info/travelers-targeted-booking-com-phishing-scam-unveiled/
6. ¿¨°Í˹»ù½Ò¶£ºICMPºóÃŹ¥»÷ÔÙÏÖ£¬ÒÉËÆToddyCat APTÊÖ·¨
9ÔÂ3ÈÕ£¬¿¨°Í˹»ùÈ«ÇòÓ¦¼±ÏìӦС×飨GERT£©µÄÍøÂçÄþ¾²×¨¼Ò½Ò¶ÁËÒ»ÖÖÅÓ´óµÄÍøÂç¹¥»÷£¬ÆäÊÖ·¨ÓëÖªÃûAPT×éÖ¯ToddyCatµÄ¼Æı¸ß¶ÈÏàËÆ¡£´Ë´Î¹¥»÷Õë¶Ô¿Í»§Óò¿ØÖÆÆ÷ºÍExchange·þÎñÆ÷£¬ÀûÓðüÂÞMicrosoft ExchangeÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2021-26855£©¼°ÒÑÐÞ²¹µÄIKEEXT·þÎñ¾É©¶´ÔÚÄڵĶàÖÖÄþ¾²Â©¶´£¬ÀֳɻñÈ¡³õʼ·ÃÎÊȨ²¢¹¹½¨³Ö¾ÃÐÔ¡£¹¥»÷ÕßÓÈΪ½Æ»«µØÖØÓÃÁËÓëwlbsctrl.dll¿âÏà¹ØµÄ¾É©¶´£¬Í¨¹ýÌæ»»system32Ŀ¼ÏµĸÿâÎļþ£¬Ê¹IKEEXT·þÎñÿ´Îµ÷ÓÃʱ¾ùÖ´ÐкóÃÅ´úÂ룬ÎÞÐè¸ü¸ÄͨÀýÆô¶¯ÅäÖ᣽øÒ»²½µØ£¬ËûÃÇÀûÓÃSMBÐÒéÉèÖÃ×Ô½ç˵·À»ðǽ¹æÔò£¬ÈöñÒâdllhost.exe¼àÌýÌض¨¶Ë¿Ú£¬ÊµÏÖÍøÂçÖеĺáÏòÒƶ¯£¬ÇÄÎÞÉùÏ¢µØÀ©Õ¹¹¥»÷·¶Î§¡£ÓÈΪҪº¦µÄÊÇ£¬¹¥»÷Õß²¿ÊðÁËÒ»¸öICMPºóÃÅ£¬Í¨¹ý¸ÃºóÃÅÒÔ¼ÓÔØ·¨Ê½ÐÎʽÔËÐУ¬Ö´ÐÐÅÓ´ó²Ù×÷ÒÔά³ÖÒþ±ÎÐÔ¡£¸ÃºóÃÅÊ×Ïȼì²é»¥³âËøÒÔÖÆÖ¹Öظ´ÔËÐУ¬Ëæºó½âÃܲ¢Ö´Ðд洢ÔÚWindows×¢²á±íÖеÄÓÐЧ¸ºÔØ£¬ÕâЩ¸ºÔØÒÔ¡°CAFEBABE¡±Îª±êʶ£¬ÀûÓÃICMPÌ×½Ó×Ö½ÓÊÕ²¢Ö´ÐÐÀ´×Ô¹¥»÷ÕßµÄÖ¸Á´Ó¶øÔÚ²»½¨Á¢³öÕ¾Á¬½ÓµÄÇé¿öÏÂʵÏÖÔ¶³Ì¿ØÖÆ£¬¼«´ó½µµÍÁ˱»¼ì²âµÄ·çÏÕ¡£
https://securityonline.info/researcher-identifies-toddycat-inspired-apt-attack-leveraging-icmp-backdoor-and-microsoft-exchange-flaws/