SloppyLemmingÀûÓÃCloudflare WorkersµÈ¹¤¾ß·¢¶¯¼äµý¹¥»÷

Ðû²¼Ê±¼ä 2024-09-27
1. SloppyLemmingÀûÓÃCloudflare WorkersµÈ¹¤¾ß·¢¶¯¼äµý¹¥»÷


9ÔÂ25ÈÕ £¬¸ß¼¶Á¬ÐøÐÔÍþв£¨APT£©×éÖ¯¡°SloppyLemming¡±½üÆÚ±»·¢ÏÖÀûÓÃCloudflareµÄWorkerÔÆ·þÎñÒÔ¼°Discord¡¢Dropbox¡¢GitHubµÈ¹¤¾ß £¬ÔÚÓ¡¶È´Î´ó½¼°ÖܱߵØÓò¶ÔÕþ¸®ºÍÖ´·¨»ú¹¹½øÐй㷺µÄ¼äµý»î¶¯¡£¸Ã×éÖ¯±»Crowdstrike×·×ÙΪ¡°Outrider Tiger¡± £¬ÆäÐж¯Óë´ÓÓ¡¶È¼°Öܱ߹ú¼ÒÃô¸Ð×éÖ¯ÇÔÈ¡Ç鱨¸ß¶ÈÏà¹Ø¡£Êܺ¦Õß°üÂÞÕþ¸®»ú¹¹¡¢ITºÍµçÐÅÆóÒµ¡¢½¨Öþ¹«Ë¾ £¬ÉõÖÁ°Í»ù˹̹µÄºËµçÉèÊ© £¬ÇÒ¹¥»÷·¶Î§»¹À©Õ¹ÖÁÃϼÓÀ­¹ú¡¢Ë¹ÀïÀ¼¿¨¼°ÖйúµÄÄÜÔ´ÓëѧÊõ»ú¹¹ £¬ÉõÖÁ¿ÉÄÜ´¥¼°°Ä´óÀûÑÇÊ׶¼¿°ÅàÀ­¡£SloppyLemmingͨ¹ý¾«ÐÄÉè¼ÆµÄÓã²æʽÍøÂçµöÓãÓʼþÆô¶¯¹¥»÷ £¬ÀûÓÃCloudflare WorkersÕâÒ»ÎÞ·þÎñÆ÷¼ÆËãƽִ̨ÐжñÒâ½Å±¾ £¬À¹½Ø²¢²Ù×÷Á÷¾­CloudflareµÄWebÁ÷Á¿ £¬ÒÔÇÔÈ¡µÇ¼ƾ֤ºÍ鶵ç×ÓÓʼþ¡£´ËÍâ £¬SloppyLemming»¹¿ª·¢ÁËÃûΪ¡°CloudPhish¡±µÄ¶¨Öƹ¤¾ß £¬×¨ÃÅÓÃÓÚƾ֤ÇÔÈ¡ºÍй¶ £¬Í¨¹ýÄ£·ÂÄ¿±êWebmailµÇ¼ҳÃæÀ´ÓÕÆ­Óû§ÊäÈëÐÅÏ¢¡£Í¬Ê± £¬¸Ã×éÖ¯»¹ÀûÓÃGoogle OAuthÁîÅÆÊÕ¼¯ºÍRARÎļþ©¶´ÀûÓã¨CVE-2023-38831£©µÈÊֶΠ£¬¹¹½¨ÅÓ´óµÄ¹¥»÷Á´ £¬½øÒ»²½¼Ó¾çÁËÄþ¾²Íþв¡£


https://www.darkreading.com/cloud-security/sloppylemming-apt-cloudflare-pakistan-attacks


2. ·¨¹ú9500ÍòÌõ¹«ÃñÊý¾ÝÔâй¶ £¬Éæ¼°¶àÐÐÒµÐÅÏ¢


9ÔÂ25ÈÕ £¬·¨¹ú½üÆÚ·¢ÉúÁËÒ»ÆðÕ𾪵ÄÊý¾Ýй¶Ê¼þ £¬Éæ¼°Áè¼Ý9500ÍòÌõ¹«ÃñÊý¾Ý¼Ç¼±»¹ûÈ»ÖÃÓÚ»¥ÁªÍøÉÏ £¬Ô¶³¬·¨¹ú×ÜÈË¿ÚÊý £¬Êý¾Ý·¶Î§º­¸ÇÐÕÃû¡¢ÁªÏµ·½Ê½¡¢µç×ÓÓʼþ¼°²¿ÃÅÖ§¸¶ÐÅÏ¢µÈÃô¸ÐÄÚÈÝ¡£´Ë´ÎʼþÓÉCybernewsÓëÍøÂçÄþ¾²×¨¼ÒÅäºÏ½Ò¶ £¬Ô´Í·Ö¸ÏòÒ»¸ö¿ª·ÅµÄElasticsearch·þÎñÆ÷¡°vip-v3¡± £¬ÎÞÐèÈÏÖ¤¼´¿É·ÃÎÊ £¬ÄÚº¬ÖÁÉÙ30GBÊý¾Ý £¬Ô´ÓÚ17Æð²îÒìµÄÊý¾Ýй¶Ê¹Ê¡£Ð¹Â¶Êý¾Ý²»½öÊýÁ¿ÅÓ´ó £¬ÇÒÖÖÀà·±¶à £¬Éæ¼°µçÐÅ¡¢µçÉÌ¡¢É罻ýÌåµÈ¶à¸öÐÐÒµ £¬°üÂÞÖªÃû¹«Ë¾ÈçLycamobile¡¢Pandabuy¡¢Darty¡¢Discord¼°SnapchatµÈ £¬·´Ó³ÁËÊý¾Ýй¶ÎÊÌâµÄ¹ã·ºÐÔºÍÑÏÖØÐÔ¡£ÓÈΪֵµÃ¹Ø×¢µÄÊÇ £¬Êý¾Ý¿â¹ûȻ״̬ÒÑÁ¬ÐøÒ»¶Îʱ¼ä £¬²»ÅųýÒÑÓжñÒâµÚÈý·½¸´ÖÆÊý¾ÝÓÃÓÚ·Ç·¨»î¶¯¡£´ËÍâ £¬¸ÃÐÐΪÃ÷ÏÔÎ¥·´ÁËÅ·ÃËGDPR¹æÔò £¬ÏÔʾ³öÊý¾Ý¿â¹ÜÀíÕ߶ÔÖ´·¨µÄÎÞÊÓ¼°Ç±ÔڵĶñÒâÄ¿µÄ¡£Ñо¿ÈËÔ±¾¯¸æ £¬Èç´Ë¼¯ÖÐÇÒÏ꾡µÄ¸öÈËÐÅϢ̻¶ £¬½«¼«´óÌáÉýÉí·Ý͵ÇÔ¡¢ÆÛÕ©¼°ÍøÂç¹¥»÷µÄ·çÏÕ £¬¶ÔÊý°ÙÍò¸öÈ˼°ÆóÒµ×é³ÉÍþв¡£


https://cybernews.com/security/french-records-exposed-by-mysterious-data-hoarder/


3. ÃÀ¹ú¹ú»á³¬3000ÃûÊÂÇéÈËÔ±ÐÅÏ¢Ôâ°µÍøй¶


9ÔÂ26ÈÕ £¬ÃÀ¹ú¹ú»á´óÏýüÆÚ³ÉΪ´ó¹æÄ£ÍøÂç¹¥»÷µÄÊܺ¦Õß £¬µ¼ÖÂÁè¼Ý3,000Ãû¹ú»áÊÂÇéÈËÔ±µÄÃô¸Ð¸öÈËÐÅÏ¢ÔÚ°µÍøÉÏÆعâ¡£¾ÝProtonºÍConstella Intelligence¹«Ë¾µÄÑо¿·¢ÏÖ £¬ÕâЩй¶Êý¾Ý°üÂÞÃÜÂë¡¢IPµØÖ·¼°É罻ýÌåÐÅÏ¢ £¬¹²¼ÆÔ¼3,191Ìõ¼Ç¼ £¬ÆäÖнüÎå·ÖÖ®Ò»µÄ¹ú»áÔ±¹¤Êܵ½²¨¼°¡£ÌرðÖµµÃ×¢ÒâµÄÊÇ £¬²¿ÃÅÔ±¹¤Òò²»Á¼Ï°¹ß £¬ÈçʹÓùٷ½ÓÊÏä×¢²á°üÂÞÔ¼»áºÍ³ÉÈËÍøÕ¾µÈ¸ß·çÏÕÍøÕ¾ £¬µ¼ÖÂÐÅÏ¢±»¶à´Îй¶ £¬×î¸ßµ¥ÀýÉæ¼°31¸öÃÜÂë¡£ProtonÖ¸³ö £¬ÕâÖÖ½«ÊÂÇéÓÊÏäÓë²»Äþ¾²Æ½Ì¨°ó¶¨µÄÐÐΪ×é³ÉÁËÑÏÖØÄþ¾²Â©¶´¡£¹«Ë¾ÔÊÐí½«½øÒ»²½Ðû²¼ÊÓ²ì½á¹û £¬²¢Ç¿µ÷ÔÚ×Üͳѡ¾ÙÆÚ¼ä¼ÓÇ¿·À»¤µÄÖØÒªÐÔ¡£Í¬Ê± £¬¹«Ë¾ÒÑÏòËùÓÐÊÜÓ°ÏìµÄ¹ú»áÊÂÇéÈËÔ±·¢³ö¾¯Ê¾¡£´ËÍâ £¬½ñÄê6Ô £¬Í¬Ò»ÊÓ²ìÍŶӻ¹·¢ÏÖÊý°ÙÃûÓ¢¹ú¼°Å·ÃËÕþ¿ÍµÄ¸öÈËÐÅϢͬÑùÔÚ°µÍøÊг¡ÉÏÁ÷ͨ £¬°üÂÞµç×ÓÓÊÏä¡¢ÃÜÂë¼°³öÉúÈÕÆÚµÈÃô¸ÐÊý¾Ý £¬Í¹ÏÔÁËÈ«ÇòÕþÖÎÁìÓòÃæÁÙµÄÍøÂçÄþ¾²ÌôÕ½¡£


https://securityaffairs.com/168912/deep-web/3000-congressional-staffers-data-leaked-dark-web.html


4. Unit 42½ÒʾRomCom¶ñÒâÈí¼þбäÖÖSnipBot


9ÔÂ25ÈÕ £¬Unit 42Äþ¾²ÍŶӽüÆÚ½Ò¶ÁËÎÛÃûÕÑÖøµÄRomCom¶ñÒâÈí¼þ¼Ò×åµÄбäÖÖ¡°SnipBot¡± £¬¸Ã±äÖÖÓÚ2024Äê³õո¶ͷ½Ç £¬×¨ÎªÆóÒµÍøÂçÉè¼Æ £¬¾ß±¸Ô¶³Ì²Ù¿ØÓë¶ñÒ⸺ÔØÏÂÔØÄÜÁ¦¡£SnipBotÒÔÆ䴴еĴúÂë»ìÏý¼¼ÊõºÍ¸ß¼¶·´¼ì²â¼ÆıΪÌص㠣¬±»ÍƲâΪÕë¶ÔIT·þÎñ¡¢ÆóÒµ·¨È˼°Å©ÒµµÈÐÐÒµÌᳫµÄ¹ã·ºÍøÂç¹¥»÷µÄÒ»²¿ÃÅ¡£2024Äê4Ô £¬Unit 42²¶×½µ½Ò»¸öÒì³£DLLÄ£¿é £¬È·ÈÏΪSnipBot¹¤¾ß°ü×é¼þ¡£Í¨¹ýÉîÈë·ÖÎö £¬Ñо¿ÈËÔ±»¹Ô­ÁËSnipBotµÄѬȾ·¾¶¼°ºóÐø»î¶¯¡£ÆäѬȾʼÓÚαװ³ÉºÏ·¨PDFÎļþµÄµöÓãÓʼþ £¬ÄÚº¬¶ñÒâ¿ÉÖ´ÐÐÎļþ¡£Ò»µ©ÈëÇÖÀÖ³É £¬SnipBot¸³Óè¹¥»÷ÕßÈ«Ãæ¿ØÖÆȨ £¬ÔÊÐíÆäÖ´ÐÐÈÎÒâÃüÁî¡¢ËѼ¯ÏµÍ³ÐÅÏ¢¼°ÇÔÈ¡Êý¾Ý¡£Í¬Ê± £¬SnipBotÄÜÏÂÔØÈçSnippingTool.dll¡¢svcnet.exeµÈÌرðÄ£¿é £¬ÔöÇ¿¹¥»÷ÄÜÁ¦¡£Unit 42ÊӲ쵽 £¬¹¥»÷ÕßÌرð¹Ø×¢´ÓÊܺ¦ÕßÍøÂçÖÐÌáÈ¡Êý¾Ý £¬ÓÈÆäÊÇÓò¿ØÖÆÆ÷ÐÅÏ¢ £¬ÀûÓÃPuTTY¡¢WinRARµÈºÏ·¨¹¤¾ß¼°fsutil.exe¡¢dsutil.exeµÈαװִÐжñÒâ²Ù×÷¡£¾¡¹ÜRomCom¼Ò×å³£ÓëÀÕË÷Èí¼þ»î¶¯Ïà¹ØÁª £¬µ«SnipBotµÄÐÐΪģʽÏÔʾ³öÆäÕýתÏòÇ鱨ÊÕ¼¯Óë¼äµý»î¶¯¡£


https://securityonline.info/new-romcom-variant-snipbot-unveiled-a-sophisticated-malware-targeting-enterprise-networks/


5. ÆðÑǾ­ÏúÉÌÍøÕ¾ÏÖÑÏÖØ©¶´£ººÚ¿Í¿Éƾ³µÅƺÅÔ¶³Ì¿ØÖÆÊý°ÙÍò³µÁ¾


9ÔÂ26ÈÕ £¬Äþ¾²ÁìÓò½üÆÚÆسöÒ»ÆðÕë¶ÔÆðÑÇÆû³µµÄÄþ¾²Â©¶´Ê¼þ £¬¸Ã©¶´Éæ¼°ÆðÑÇÆû³µ¾­ÏúÉÌÃÅ»§ÍøÕ¾ £¬Ê¹µÃºÚ¿Í½öƾ³µÅƺžÍÄÜÔÚ¼«¶Ìʱ¼äÄÚÔ¶³Ì¿ØÖÆÊý°ÙÍòÁ¾2013ÄêºóÉú²úµÄÆðÑÇÆû³µ¡£ÕâÒ»·¢ÏÖ×·ËÝÖÁ½ñÄê6Ô £¬ÓÉÄþ¾²Ñо¿Ô±ÈøÄ·-¿âÀïµÈÈ˽Ò¶¡£ÓëÈ¥ÄêÆعâµÄÉæ¼°¶à¼ÒÆû³µÆ·ÅƵÄ©¶´ÀàËÆ £¬´Ë´ÎÆðÑÇ©¶´²»½öÈúڿÍÄÜÔ¶³Ì²Ù¿Ø³µÁ¾ £¬»¹Ì»Â¶Á˳µÖ÷µÄÃô¸Ð¸öÈËÐÅÏ¢ £¬ÈçÐÕÃû¡¢ÁªÏµ·½Ê½¼°µØÖ·¡£Ñо¿ÈËԱͨ¹ý×¢²á¾­ÏúÉÌÕË»§²¢»ñÈ¡·ÃÎÊÁîÅÆ £¬ÀÖ³ÉÉø͸ºó¶ËAPI £¬½ø¶øʵÏÖ¶Ô³µÁ¾¼°³µÖ÷Êý¾ÝµÄÈ«Ãæ·ÃÎÊ¡£ËûÃÇ¿ª·¢ÁËÒ»¸öÑÝʾ¹¤¾ß £¬Õ¹Ê¾Á˺ڿÍÈçºÎͨ¹ý³µÅƺÅÔÚ30ÃëÄÚÖ´ÐаüÂÞËø¶¨/½âËø¡¢Æô¶¯/Í£Ö¹³µÁ¾¡¢ÃùµÑ¼°¶¨Î»ÔÚÄÚµÄÔ¶³Ì¿ØÖƲÙ×÷¡£¸üΪÑÏÖصÄÊÇ £¬ºÚ¿Í»¹ÄÜÔÚ³µÖ÷ºÁ²»ÖªÇéµÄÇé¿öÏ £¬½«×Ô¼ºÌí¼ÓΪ³µÁ¾µÄµÚ¶þÓû§ £¬ÊµÏÖÒþ±ÎµÄÔ¶³Ì²Ù¿Ø¡£ÐÒÔ˵ÄÊÇ £¬ÕâЩ©¶´Òѱ»¼°Ê±·¢ÏÖ²¢ÐÞ¸´ £¬ÇÒδ·¢ÏÖÓжñÒâÀûÓõļǼ¡£ÆðÑÇÍŶÓҲȷÈÏÁË©¶´Î´±»Íⲿ¶ñÒâ¹¥»÷ËùÀûÓá£


https://www.bleepingcomputer.com/news/security/kia-dealer-portal-flaw-could-let-attackers-hack-millions-of-cars/


6. RhadamanthysÔÚ0.7.0°æ±¾ÖÐÌí¼ÓÁË´´ÐµÄAI¹¦Ð§


9ÔÂ26ÈÕ £¬RhadamanthysÊÇÒ»¿î×Ô2022ÄêÆðѸËÙÑݽøµÄ¸ß¼¶ÐÅÏ¢ÇÔÈ¡·¨Ê½ £¬Æä×îÐÂ0.7.0°æ±¾¼¯³ÉÁËÈ˹¤ÖÇÄÜÇý¶¯µÄ¹âѧ×Ö·ûʶ±ð¼¼Êõ £¬ÄÜ´ÓͼÏñÖÐÌáÈ¡¼ÓÃÜ»õ±ÒÖÖ×Ó¶ÌÓï £¬¼«´óÌáÉýÁËÆäÍþвÐÔ¡£¾¡¹ÜÃæÁÙµØÓòÐÔ½ûÁî £¬¸Ã¶ñÒâÈí¼þÈÔ»îÔ¾ÓÚµØÏÂÊг¡ £¬ÀûÓÃMSI°²×°·¨Ê½Î±×°µÈÊֶιæ±Ü¼ì²â £¬ÒÔ͵ȡƾ֤¡¢ÏµÍ³ÐÅÏ¢¼°²ÆÕþÊý¾Ý¡£ÆäAIͼÏñʶ±ð¹¦Ð§ÓÈΪÒýÈËעĿ £¬Ê¹¹¥»÷ÕßÄÜ×Ô¶¯²¶×½²¢Ð¹Â¶¼ÓÃÜ»õ±ÒÐÅÏ¢¡£RhadamanthysµÄ¿ª·¢Õßͨ¹ýTOXºÍTelegramµÈƽ̨Á¬ÐøÍƹ㠣¬²¢Õë¶Ô±±ÃÀ¡¢ÄÏÃÀµÈµØ¼ÓÃÜ»õ±ÒÓû§ÊµÊ©¾«×¼¹¥»÷¡£ÎªÓ¦¶ÔÕâÒ»Íþв £¬Insikt GroupÌá³öÁ˶àÖÖ»º½â¼Æı £¬°üÂÞ»ùÓÚ»¥³âËøµÄÖÕÖ¹¿ª¹Ø¡¢¸ß¼¶¼ì²â¹æÔò¼°Ç¿»¯¶Ëµã±£»¤µÈ £¬Ö¼ÔÚÖ÷¶¯×èÖ¹¶ñÒâÈí¼þÖ´Ðв¢ÌáÉýϵͳ·À»¤ÄÜÁ¦¡£Õ¹ÍûδÀ´ £¬Ëæ×ÅRhadamanthys 0.8.0µÈа汾µÄÑз¢ £¬Ô¤¼ÆÆ佫Èںϸü¶à»úÆ÷ѧϰ¼¼Êõ £¬½øÒ»²½ÌáÉýÇÔȡЧÂÊÓëÒþ±ÎÐÔ¡£Òò´Ë £¬±£³Ö¼ì²â¼¼ÊõµÄÁ¬Ðø¸üÐÂÓëÉý¼¶ £¬¶ÔÓÚÓÐЧµÖÓù´ËÀà¸ß¼¶ÍþвÖÁ¹ØÖØÒª¡£


https://www.recordedfuture.com/research/rhadamanthys-stealer-adds-innovative-ai-feature-version