ºÚ¿ÍÉù³Æ·þÎñÆ÷Ôâµ½ÈëÇÖ£¬µÂÇÚ³ÆÃô¸ÐÊý¾ÝδÊܵ½Íþв
Ðû²¼Ê±¼ä 2024-09-259ÔÂ24ÈÕ£¬µÂÇÚ¹«Ë¾½üÆÚÔâÓöÁËÒ»ÆðÓÉÎÛÃûÕÑÖøµÄºÚ¿Í×éÖ¯IntelBrokerÌᳫµÄÍøÂç¹¥»÷ʼþ£¬¸ÃºÚ¿ÍÔÚBreachForums·¸×ïÂÛ̳ÉÏÉù³ÆÒÑÀֳɻñÈ¡Á˵ÂÇÚδÍ×ÉÆ·À»¤µÄApache Solr·þÎñÆ÷Éϵġ°ÄÚ²¿Í¨ÐÅ¡±Êý¾Ý¡£¾ÝºÚ¿ÍÃèÊö£¬ÕâЩÊý¾ÝÉæ¼°µç×ÓÓʼþµØÖ·¡¢¹«Ë¾ÄÚ²¿Ô±¹¤¼äµÄͨÐżÇ¼ÒÔ¼°²¿ÃÅÄÚ²¿ÉèÖã¬ÇÒ¿Éͨ¹ýĬÈÏƾ¾ÝÇáËÉ·ÃÎÊ¡£¾¡¹ÜÕâЩÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳¹ûÈ»£¬¹©¸¶ÓöȻ§ÏÂÔØ£¬µ«µÂÇÚѸËÙ×÷³ö»ØÓ¦£¬È·ÈÏȷʵ·¢ÉúÁËÊý¾Ýй¶£¬µ«Ç¿µ÷¾ÊÓ²ìºóÈ·ÈÏ£¬´Ë´Îʼþ²¢Î´²¨¼°Æä¿Í»§Êý¾Ý»òÆäËûÈκÎÃô¸ÐÐÅÏ¢£¬Òò´ËÓ°Ïì±»ÏÞ¶¨ÔÚÁËÒ»¶¨·¶Î§ÄÚ¡£µÂÇڵļ°Ê±ÉùÃ÷Ö¼ÔÚ¸§Î¿¹«ÖںͿͻ§µÄµ£ÓÇ£¬Í¬Ê±Í¹ÏÔÁËÆäÔÚÍøÂçÄþ¾²ÁìÓòµÄ¾¯¾õÐÔºÍÓ¦¶ÔÄÜÁ¦¡£
https://www.securityweek.com/deloitte-says-no-threat-to-sensitive-data-after-hacker-claims-server-breach/
2. Diddy³óÎųÉÓÕ¶ü£ºÐÂÐÍPDiddySploit¶ñÒâÈí¼þËÁÅ°É罻ýÌå
9ÔÂ25ÈÕ£¬ÍøÂç·¸×ï·Ö×ÓÕý³Ë϶ÀûÓÃSean ¡°Diddy¡± CombsµÄ³óÎÅ£¬Á÷´«ÐÂÐͶñÒâÈí¼þPDiddySploit£¬Ä¿±êËø¶¨ÔÚ³äÂúºÃÆæÇÒÎÞÔ¤·ÀµÄÉ罻ýÌåÓû§£¬ÓÈÆäÊÇX.com£¨Ç°Twitter£©Óû§¡£Õâ¿î¶ñÒâÈí¼þÊôÓÚPySilon RATϵÁУ¬ÒÔÆäÇ¿´óµÄÊý¾ÝÇÔÈ¡¡¢¼üÅ̼à¿Ø¡¢ÆÁÄ»¼Ç¼¼°Ô¶³Ì¿ØÖƹ¦Ð§Öø³Æ¡£ÍøÂç·¸×ï·Ö×Óͨ¹ýÉÏ´«Î±×°³É°üÂÞDiddyÒÑɾ³ýÉ罻ýÌåÌû×ÓµÄÎļþ£¬ÓÕÆÓû§ÏÂÔØ£¬½ø¶øѬȾÆäÉ豸¡£´ËÀ๥»÷ÀûÓÃÁ˹«ÖÚ¶ÔÃûÈ˳óÎŵĺÃÆæÐÄÀí£¬ÌرðÊǵ±³óÎÅÊܵ½Ã½Ìå¸ß¶È¹Øעʱ£¬Êܺ¦ÕßÍùÍùÄÑÒÔ¿¹¾Ü̽Ë÷δ֪ÐÅÏ¢µÄÓÕ»ó¡£ÖµµÃ×¢ÒâµÄÊÇ£¬PDiddySploit²¢·ÇDiddyÓë¶ñÒâÈí¼þ¹ØÁªµÄÊ×Àý£¬ÀúÊ·ÉÏÓжà´ÎÀàËÆʼþ£¬¾ùÒÔÃûÈËÏà¹ØÄÚÈÝΪÓÕ¶ü¡£Ëæ×ÅPySilon RATµÈ¶ñÒâÈí¼þµÄ²»Í£½ø»¯£¬ÒÔ¼°ÍøÂç·¸×ï·Ö×ӵĽƻ«ÊֶΣ¬¹«ÖÚÐèÌá¸ß¾¯Ì裬ÖÆÖ¹ÈúÃÆæÐijÉΪÍøÂçÄþ¾²µÄÈíÀß¡£ÔÚÉ罻ýÌåÉÏä¯ÀÀÈȵ㻰Ìâʱ£¬±£³ÖÀíÐÔÅжϣ¬½÷É÷ÏÂÔز»Ã÷À´Ô´µÄÎļþ£¬ÊDZ£»¤×Ô¼ºÃâÊÜ´ËÀ๥»÷µÄÒªº¦¡£
https://hackread.com/pdiddysploit-malware-hidden-files-deleted-diddy-posts/
3. AutoCanadaÔ±¹¤Êý¾ÝÒÉÔâHunters InternationalÀÕË÷ÍÅ»ïй¶
9ÔÂ24ÈÕ£¬AutoCanada½üÆÚÔâÓöÁËÒ»³¡ÓÉHunters InternationalÀÕË÷Èí¼þÍÅ»ïÌᳫµÄÍøÂç¹¥»÷£¬¾¯¸æ³ÆÔ±¹¤Êý¾Ý¿ÉÄÜÒÑÔÚ8Ô·ݵĹ¥»÷Öб»Ð¹Â¶¡£¾¡¹Ü¹«Ë¾ÉÐδ·¢ÏÖÕë¶ÔÊÜÓ°ÏìÔ±¹¤µÄÆÛÕ©»î¶¯£¬µ«ÈÔ»ý¼«·¢ËÍ֪ͨÒÔÌáÐÑDZÔÚ·çÏÕ¡£´Ë´Î¹¥»÷ÆÈʹAutoCanada¹Ø±Õ²¿ÃÅÄÚ²¿ITϵͳ£¬µ¼ÖÂÔËÓªÖжϣ¬¾¡¹ÜÆä66¼Ò¾ÏúµêÒµÎñÈÔÔÚ¼ÌÐø£¬µ«²¿ÃÅ¿Í»§·þÎñÊܵ½ÑÓÎó¡£Hunters InternationalËæºóÔÚÀÕË÷ÃÅ»§ÉÏÈ·ÈϹ¥»÷£¬²¢Éù³ÆÇÔÈ¡ÁËÊýTBÊý¾Ý£¬°üÂ޸߹ÜÐÅÏ¢¡¢²ÆÕþÎļþºÍÈËÁ¦×ÊÔ´Êý¾ÝµÈÃô¸ÐÐÅÏ¢¡£AutoCanadaͨ¹ýÐû²¼³£¼ûÎÊÌâ½â´ðÒ³Ãæ»ØÓ¦¹«ÖÚ¹ØÇУ¬Ö¸³ö¼ÓÃÜ·þÎñÆ÷ÄÚÈÝÕýÔÚ»Ö¸´ºÍ·ÖÎöÖУ¬²¢ÈÏ¿É¿ÉÄÜÉæ¼°Ô±¹¤¸öÈËÐÅϢй¶¡£ÒÑ鶵ÄÔ±¹¤Êý¾ÝÏ꾡£¬°üÂÞÐÕÃû¡¢µØÖ·¡¢ÈËΪÐÅÏ¢¡¢Éç±£ºÅÂë¼°ÒøÐÐÕ˺ŵÈÃô¸Ð×ÊÁÏ£¬¹«Ë¾Îª´ËÌṩΪÆÚÈýÄêµÄÃâ·ÑÉí·Ý͵ÇÔ±£»¤ºÍÐÅÓüà¿Ø¡£Îª·À·¶Î´À´¹¥»÷£¬AutoCanadaÒѽÓÄÉһϵÁÐÄþ¾²´ëÊ©£¬°üÂÞ¸ôÀëÊÜѬȾϵͳ¡¢ÖØÖÃÃÜÂ롢ʵʩÍþв¼ì²âºÍÏìӦϵͳ£¬²¢¼ÓÇ¿Ô±¹¤ÍøÂçÄþ¾²Åàѵ¡£
https://www.bleepingcomputer.com/news/security/autocanada-says-ransomware-attack-may-impact-employee-data/
4. CISA¾¯Ê¾Ivanti vTMÉí·ÝÑéÖ¤Èƹý©¶´CVE-2024-7593±»»ý¼«ÀûÓÃ
9ÔÂ24ÈÕ£¬CISA£¨ÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£©×î½ü½ÒʾÁËIvantiÐéÄâÁ÷Á¿¹ÜÀíÆ÷£¨vTM£©ÖеÄÒ»¸öÑÏÖØÄþ¾²Â©¶´CVE-2024-7593£¬¸Ã©¶´ÔÊÐíδ¾ÊÚȨµÄ¹¥»÷ÕßÈƹýÉí·ÝÑéÖ¤£¬ÔÚÊÜÓ°ÏìµÄvTMÉ豸ÉÏ´´½¨¶ñÒâ¹ÜÀíÔ±ÕË»§¡£vTMÊÇIvantiÌṩµÄÓ¦Ó÷¨Ê½½»¸¶¿ØÖÆÆ÷£¬ÂôÁ¦Òªº¦·þÎñµÄ¸ºÔØƽºâºÍÁ÷Á¿¹ÜÀí¡£¸Ã©¶´Ô´ÓÚÉí·ÝÑéÖ¤Ëã·¨µÄ´íÎóʵÏÖ£¬Ê¹Ô¶³Ì¹¥»÷ÕßÄܹ»ÇáÒ×·ÃÎʲ¢¿ØÖÆÉ豸¡£¾¡¹ÜIvantiÔÚ8ÔÂÒÑÐû²¼²¹¶¡ÐÞ¸´´ËÎÊÌ⣬µ«CISAÈ·Èϸ鶴Òѱ»Ö÷¶¯ÀûÓ㬲¢½ô¼±½«ÆäÁÐÈëÒÑÖª±»ÀûÓ鶴Ŀ¼¡£ÊÜÓ°ÏìµÄÁª°î»ú¹¹±»ÒªÇóÔÚ10ÔÂ15ÈÕÇ°½ÓÄÉÐж¯£¬±£»¤ÆäÍøÂçÖеÄvTMÉ豸¡£´ËÍ⣬CISAÒ²½¨ÒéÈ«Çò˽ÓÐ×éÖ¯ÓÅÏÈ´¦ÖôË©¶´£¬ÒÔ·À·¶Ç±ÔÚ¹¥»÷¡£¼øÓÚIvantiÔÚÈ«ÇòÓµÓÐÅÓ´óµÄºÏ×÷»ï°éÍøÂçºÍÓû§»ù´¡£¬´Ë´Î©¶´µÄ¹ã·ºÓ°Ïì²»ÈݺöÊÓ¡£
https://www.bleepingcomputer.com/news/security/critical-ivanti-vtm-auth-bypass-bug-now-exploited-in-attacks/
5. Èø˹ÖÝ°¢¿ÏÉ«³ÇË®´¦ÖÃÉèÊ©ÔâÍøÂç¹¥»÷£¬ÏµÍ³ÔÝתÊÖ¶¯²Ù×÷
9ÔÂ24ÈÕ£¬Èø˹ÖÝ°¢¿ÏÉ«³ÇµÄË®´¦ÖÃÉèÊ©ÓÚ2024Äê9ÔÂ22ÈÕÔâÓöÍøÂçÄþ¾²Ê¼þ£¬µ¼ÖÂϵͳÔÝʱתΪÊÖ¶¯²Ù×÷¡£¾¡¹ÜÕâһʼþÒýÆðÁ˹Ø×¢£¬µ«Êг¤À¼µÏ¡¤¸¥À×ÔóѸËÙÐû²¼Í¨¸æ¸§Î¿ÃñÖÚ£¬Ç¿µ÷¹©Ë®·þÎñδÊÜÓ°Ï죬ˮÖÊÄþ¾²ÎÞÓÇ¡£Õþ¸®Ñ¸ËÙÏìÓ¦£¬Æ¸ÇëÍøÂçÄþ¾²×¨¼Ò½éÈ룬²¢ÔöÇ¿Äþ¾²ÐÒéÒÔ±£ÕϹ©Ë®Äþ¾²¡£¿ª¶Ë¼£ÏóÖ¸ÏòÀÕË÷Èí¼þ¹¥»÷£¬´ÙʹÉèÊ©½ÓÄÉÊÖ¶¯²Ù×÷ÒÔ·ÀÊÂ̬À©´ó¡£°¢¿ÏÉ«ÊйÙÔ±ÕýÈ«Á¦ÊӲ죬ȷ±£Ë®ÖʺͷþÎñÎȶ¨¡£´Ë´ÎʼþÔÙ´ÎÇÃÏìÁ˹«ÓÃÊÂÒµ²¿ÃÅÍøÂçÄþ¾²¾¯ÖÓ£¬ÓÈÆäÊÇË®ÎñϵͳÃæÁÙµÄÑϾþÌôÕ½¡£ÃÀ¹úÕþ¸®Õý¼Ó¶¦Á¦¶ÈÌáÉýË®ÎñÉèÊ©µÄÍøÂç·ÀÓùÄÜÁ¦£¬Ô¤·ÀδÀ´¹¥»÷¡£ÎªÓ¦¶Ô´ËÀàÍþв£¬Ë®Îñ¹«Ë¾Ðè¹¹½¨È«ÃæµÄÍøÂçÄþ¾²Ìåϵ£¬°üÂÞ¶¨ÆÚÄþ¾²Éó²é¡¢Ô±¹¤Äþ¾²Åàѵ¡¢Êý¾Ý¼ÓÃܼ°¶àÒòËØÉí·ÝÑéÖ¤µÈ´ëÊ©¡£Í¬Ê±£¬±£³Öϵͳ¸üв¢Öƶ¨Ó¦¼±ÏìÓ¦¼Æ»®£¬ÊÇ¿ìËÙÓ¦¶Ô²¢¼õÇáDZÔÚË𺦵ÄÒªº¦¡£
https://www.infosecurity-magazine.com/news/incident-arkansas-city-water/
6. Octo2¶ñÒâÈí¼þа汾αװÈÈÃÅÓ¦ÓÃÔÚÅ·ÖÞËÁÅ°
9ÔÂ24ÈÕ£¬Ò»ÖÖÃûΪ¡°Octo2¡±µÄÐÂÐÍAndroid¶ñÒâÈí¼þ±äÖÖÔÚÅ·ÖÞÇÄÈ»ÂûÑÓ£¬Î±×°³ÉNordVPN¡¢Google Chrome¼°Å·ÖÞÆóÒµÓ¦ÓõÈÈÈÃÅÈí¼þ£¬Ö¼ÔÚÆÛÆÓû§ÏÂÔØ¡£Õâ¿îÈí¼þÓÉÔçÆÚµÄExoCompactºÍExoBotľÂíÑݱä¶øÀ´£¬Õ¹Ê¾ÁËÆäÍçÇ¿µÄÉúÃüÁ¦ºÍÁ¬ÐøµÄ¼¼Êõ¸ïС£Octo2²»½ö¼Ì³ÐÁËÇ°´úµÄÇ¿´ó¹¦Ð§£¬Èç¼üÅ̼Ǽ¡¢É豸¿ØÖƵȣ¬»¹ÏÔÖøÌáÉýÁËÔËÐÐÎȶ¨ÐÔ¡¢·´·ÖÎöÄÜÁ¦ºÍͨÐÅÁé»îÐÔ£¬ÒýÈëÁËÓòÉú³ÉËã·¨£¨DGA£©ÒÔÔöÇ¿ÃüÁîÓë¿ØÖÆ£¨C2£©µÄµ¯ÐÔ¡£ThreatFabricµÄÑо¿½ÒʾÁËOcto2µÄÅÓ´óÐԺͽƻ«ÐÔ£¬Æäͨ¹ýZombider·þÎñǶÈë¶ñÒ⸺ÔØ£¬ÉõÖÁÄÜÈƹýAndroid 13µÄÄþ¾²ÏÞÖÆ¡£Ð°汾ÔÚÁ¬½ÓÓÅ»¯¡¢Êý¾Ý¼ÓÃܺͶ¯Ì¬¼ÓÔؼ¼ÊõÉϵĽø²½£¬Ê¹Æä¸üÄѱ»¼ì²âºÍ·ÖÎö¡£ÌرðµØ£¬Ð¼ÓÈëµÄ¡°SHIT_QUALITY¡±ÉèÖÃÈ·±£Á˵ÍÍøÂç»·¾³ÏµÄÎȶ¨Í¨ÐÅ£¬¶ø»ùÓÚDGAµÄC2ϵͳÔò´ó·ùÌáÉýÁË·þÎñÆ÷µÄÁé»îÐԺͿ¹¹¥»÷ÄÜÁ¦¡£Ä¿Ç°£¬Octo2µÄ¹¥»÷»î¶¯Ö÷Òª¼¯ÖÐÔÚÅ·ÖÞ¼¸¸ö¹ú¼Ò£¬µ«¼øÓÚÆäMaaSƽ̨µÄÈ«ÇòÓ°ÏìÁ¦£¬Î´À´ÓпÉÄÜÀ©Õ¹µ½ÆäËûµØÓò¡£
https://www.bleepingcomputer.com/news/security/new-octo-android-malware-version-impersonates-nordvpn-google-chrome/