Öж«AIºô½ÐÖÐÐÄƽ̨Ôâ´ó¹æÄ£Êý¾Ýй¶£¬Ì»Â¶Äþ¾²Òþ»¼

Ðû²¼Ê±¼ä 2024-10-12
1. Öж«AIºô½ÐÖÐÐÄƽ̨Ôâ´ó¹æÄ£Êý¾Ýй¶£¬Ì»Â¶Äþ¾²Òþ»¼


10ÔÂ10ÈÕ£¬Ò»´Î´ó¹æÄ£Êý¾Ýй¶Ê¼þÔÚÖж«µØÓòÆع⣬Éæ¼°Ò»¸öÈ˹¤ÖÇÄܺô½ÐÖÐÐÄƽ̨£¬Áè¼Ý1020ÍòÌõ¶Ô»°¼Ç¼±»µÁ¡£¾ÝÍøÂçÄþ¾²¹«Ë¾Resecurity³Æ£¬´Ë´Î©¶´Ê¹¹¥»÷ÕßÄܹ»Î´¾­ÊÚȨ·ÃÎʸÃƽ̨µÄ¹ÜÀíÒDZí°å£¬ÊÕ¼¯Ïû·ÑÕß¡¢ÔËÓªÉ̺ÍAIÊðÀíÖ®¼äµÄ´óÁ¿»¥¶¯Êý¾Ý¡£ÕâЩÊý¾Ý¿ÉÄܱ»ÓÃÓڸ߼¶ÆÛÕ©¡¢ÍøÂçµöÓã¼Æ»®ºÍÆäËû¶ñÒâ»î¶¯£¬ÓÈÆäÊǸöÈËÉí·ÝÐÅÏ¢£¨PII£©µÄй¶£¬Ôö¼ÓÁËÄ£·ÂºÏ·¨¿Í»§·þÎñ½»Á÷½øÐÐÆÛÕ©µÄ·çÏÕ¡£¸Ãʼþ͹ÏÔÁËÈ˹¤ÖÇÄÜƽ̨ÔÚÌá¸ßЧÂʵÄͬʱ£¬Ò²´øÀ´ÁËÊý¾ÝÒþ˽µÄÖØ´óÍþв¡£ËäÈ»ÈëÇÖÒѵõ½»º½â£¬µ«ÈËÃǶԵÚÈý·½È˹¤ÖÇÄÜϵͳµÄÄþ¾²ÐԺʹ¦ÖÃÃô¸Ð¿Í»§Êý¾ÝµÄÄÜÁ¦ÌåÏÖµ£ÓÇ¡£ResecurityÇ¿µ÷£¬¶Ô»°Ê½AIƽ̨ÒѳÉΪ´óÐÍÆóÒµºÍÕþ¸®»ú¹¹ÏÖ´úIT¹©Ó¦Á´µÄÒªº¦ÒªËØ£¬ÐèҪƽºâ´«Í³ÍøÂçÄþ¾²´ëÊ©ºÍÕë¶ÔAI¾ßÌåÇé¿öµÄרÃÅ´ëÊ©À´±£»¤ËüÃÇ¡£


https://www.infosecurity-magazine.com/news/10m-exposed-ai-call-center-hack/


2. APT29ºÚ¿Í´ó¹æÄ£¹¥»÷ZimbraºÍTeamCity·þÎñÆ÷


10ÔÂ10ÈÕ£¬ÃÀÓ¢ÍøÂç»ú¹¹½ñÈÕÁªºÏ¾¯¸æ³Æ£¬Óë¶íÂÞ˹¶ÔÍâÇ鱨¾Ö(SVR)Ïà¹ØµÄAPT29ºÚ¿Í×éÖ¯ÕýÔÚ¡°´ó¹æÄ£¡±¹¥»÷È«Çò·¶Î§ÄÚδ´ò²¹¶¡µÄZimbraºÍJetBrains TeamCity·þÎñÆ÷¡£ÕâЩ¹¥»÷ÀûÓÃÁËCVE-2022-27924ºÍCVE-2023-42793©¶´£¬Ö¼ÔÚÇÔÈ¡µç×ÓÓʼþÕÊ»§Æ¾¾ÝºÍ½øÐÐÔ¶³Ì´úÂëÖ´ÐеȶñÒâ»î¶¯¡£SVRºÚ¿Í×éÖ¯£¬Ò²±»³ÆΪCozy Bear¡¢Midnight BlizzardºÍDukes£¬¶àÄêÀ´Ò»Ö±Õë¶ÔÃÀ¹úºÍÅ·ÖÞµÄÕþ¸®ºÍ˽ÈË×éÖ¯¡£´Ë´Î¾¯¸æÒªÇóÍøÂç·ÀÓùÕßÁ¢¼´ÐÞ²¹Ì»Â¶µÄ·þÎñÆ÷£¬²¢²¿ÊðÄþ¾²²¹¶¡ºÍ»º½â´ëÊ©ÒÔ·ÀÖ¹Äþ¾²Â©¶´¡£´ËÇ°£¬APT29ºÚ¿ÍÒѳïıÁËSolarWinds¹©Ó¦Á´¹¥»÷²¢¹¥ÆÆÁ˶à¸öÃÀ¹úÁª°î»ú¹¹£¬»¹ÈëÇÖÁ˱±Ô¼¹ú¼ÒµÄMicrosoft 365ÕË»§ºÍ΢Èí¸ß¹ÜµÈ¹«Ë¾µÄExchange OnlineÕË»§¡£ÃÀ¹ú¹ú¼ÒÄþ¾²¾ÖÍøÂçÄþ¾²Ö÷¹ÜÌåÏÖ£¬ÕâÒ»»î¶¯¶ÔÕþ¸®ºÍ˽Ӫ²¿ÃÅ×é³ÉÁËÈ«ÇòÍþв£¬ÐèÒª³¹µ×Éó²éÄþ¾²¿ØÖÆ´ëÊ©¡£


https://www.bleepingcomputer.com/news/security/us-uk-warn-of-russian-apt29-hackers-targeting-zimbra-teamcity-servers/


3. ºÚ¿ÍÀûÓÃYouTubeƽ̨Á÷´«ÅÓ´óµÄ¶ñÒâÈí¼þ


10ÔÂ10ÈÕ£¬¿¨°Í˹»ù½üÆÚ·¢ÏÖºÚ¿ÍƵ·±ÀûÓÃYouTubeƽ̨Á÷´«ÅÓ´ó¶ñÒâÈí¼þ¡£ºÚ¿Íͨ¹ý½Ù³ÖÈÈÃÅƵµÀαװ³Éԭʼ´´×÷Õߣ¬Ðû²¼¶ñÒâÁ´½Ó¶ÔÓû§ÊµÊ©Õ©Æ­¡£2022ÄêºÚ¿ÍÔøÕë¶Ô¶íÂÞ˹Óû§ÊµÊ©¼ÓÃÜ»õ±ÒÍÚ¾ò»î¶¯£¬ÀûÓñ»½Ù³ÖµÄYouTubeÕË»§·Ö·¢Î±×°³ÉÁ÷ÐÐÓ¦ÓõĶñÒâÎļþ¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶à½×¶Î¹¥»÷ÐòÁÐѬȾϵͳ£¬½ÓÄÉÒþ²Ø¶ñÒâ´úÂë²¢±£³ÖÇ©ÃûÓÐЧÐԵļ¼Êõ£¬ÀûÓöàÖÖ»úÖƽ¨Á¢³Ö¾ÃÐÔ£¬²¢ÊµÊ©ÅÓ´óµÄ·ÀÓù¹æ±Ü¼¼ÊõÒþ²Ø¶ñÒâ×é¼þ¡£×îÖÕÓÐЧÔغÉΪSilentCryptoMiner£¬ÓÃÓÚÍÚ¾òÒþ˽¼ÓÃÜ»õ±Ò£¬²¢ÊÕ¼¯ÏµÍ³Ò£²âÊý¾Ýͨ¹ýTelegram»úÆ÷ÈËAPI´«Êä¡£´ËÍ⣬¸Ã¶ñÒâ»î¶¯»¹Õë¶ÔÀ´×԰׶íÂÞ˹¡¢Ó¡¶ÈµÈ¶à¸ö¹ú¼ÒµÄÓû§£¬ÕâЩÓû§Òò³£½ûÓÃAV¹¤¾ß±£»¤ºÍÄþ¾²´ëÊ©¶øÒ×Êܹ¥»÷¡£¸Ã¹¥»÷µÄÅÓ´óÐÔÌåÏÖÔÚÄ£¿é»¯½á¹¹ÉÏ£¬¿Éƾ¾ÝÄ¿±ê¶¯Ì¬¼ÓÔزîÒìÓÐЧÔغÉ×é¼þ£¬½ÓÄÉÏȽø»ìÏýÒªÁìºÍ·´·ÖÎö¹¦Ð§±£³ÖÒþ±ÎÐÔ£¬ÈÚÈëÅÓ´óµÄÆóÒµ¼¶¹¥»÷¼¼Êõ¡£


https://cybersecuritynews.com/hackers-using-youtube-videos-to-deliver-sophisticated-malware/


4. LynxÀÕË÷Èí¼þ£ºINCÀÕË÷Èí¼þµÄбäÖÖÓëË«ÖØÀÕË÷Íþв


10ÔÂ11ÈÕ£¬Palo Alto Networks ½üÆÚ·¢ÏÖÁËÒ»ÖÖÃûΪ¡°Lynx¡±µÄÐÂÀÕË÷Èí¼þ£¬Ëüʵ¼ÊÉÏÊǶÔ2023Äê8Ô·ºÆðµÄINCÀÕË÷Èí¼þµÄ¸üÃû£¬Á½Õß´úÂëÏàËƶȸߴï48%£¬ÇÒÔ¼70.8%µÄºËÐĹ¦Ð§±»Öظ´Ê¹Óá£LynxÀÕË÷Èí¼þÖ÷ÒªÕë¶ÔÃÀ¹úºÍÓ¢¹ú¸÷ÐÐÒµ×éÖ¯£¬°üÂÞÁãÊÛ¡¢·¿µØ²ú¡¢½¨ÖþºÍ½ðÈÚ·þÎñµÈ£¬ÒÔÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©ÐÎʽ¹©ÆäËûÍøÂç·¸×ï·Ö×ÓʹÓá£Æä×îΣÏյķ½ÃæÖ®Ò»ÊÇʵʩ˫ÖØÀÕË÷¼Æı£¬¼´ÔÚ¼ÓÃÜÎļþÇ°ÇÔÈ¡Êܺ¦ÕßÊý¾Ý£¬Èô²»Ö§¸¶Êê½ð£¬Ôò¿ÉÄÜ鶻ò³öÊÛÕâЩÊý¾Ý¡£LynxÀÕË÷Èí¼þÉù³ÆÒÑÈëÇÖ¶à¼Ò¹«Ë¾£¬²¢ÔÚ¹«¹²ÍøÕ¾ÉÏչʾ±»µÁÊý¾Ý£¬¾¡¹ÜÉù³Æ±Ü¿ªÁËÕþ¸®»ú¹¹¡¢Ò½ÔººÍ·ÇÓªÀû×éÖ¯£¬µ«Æä¹¥»÷ÈÔ¶ÔÐí¶àÐÐÒµ×é³ÉÖØ´óÍþв¡£¸ÃÀÕË÷Èí¼þʹÓø߼¶¼ÓÃÜËã·¨£¬ÈçAES-128ºÍCurve25519 Donna£¬½âÃÜÄѶȼ«´ó£¬ÇÒרÃÅÕë¶ÔWindowsϵͳ£¬ÀûÓÃRestart Manager APIÌá¸ß¼ÓÃÜЧÂÊ¡£´ËÍ⣬LynxÀÕË÷Èí¼þÉè¼ÆÁé»î£¬ÔÊÐí¹¥»÷Õßͨ¹ýÃüÁîÐвÎÊý×Ô½ç˵ִÐУ¬ÒÔÂú×ãÌض¨ÐèÇó¡£


https://securityonline.info/lynx-ransomware-the-evolution-of-inc-ransomware-into-a-potent-cyber-threat/


5. CISA¾¯¸æ£ºÎ´¼ÓÃÜF5 BIG-IP Cookie±»ÀÄÓýøÐÐÍøÂç¹¥»÷


10ÔÂ11ÈÕ£¬CISA·¢³ö¾¯¸æ£¬Ö¸³öÍøÂçÍþвÐÐΪÕßÕýÔÚÀÄÓÃδ¼ÓÃܵÄF5 BIG-IP³Ö¾ÃcookieÀ´Ê¶±ðºÍ¶¨Î»Ä¿±êÍøÂçÉϵÄÆäËûÄÚ²¿É豸¡£ËûÃÇͨ¹ý»æÖÆÄÚ²¿É豸ͼ£¬ÔÚÍøÂç¹¥»÷µÄ¹æ»®½×¶Îʶ±ðÒ×Êܹ¥»÷µÄÉ豸¡£F5 BIG-IPÊÇÒ»Ì×Ó¦Ó÷¨Ê½½»¸¶ºÍÁ÷Á¿¹ÜÀí¹¤¾ß£¬Æäµ±µØÁ÷Á¿¹ÜÀíÆ÷£¨LTM£©Ä£¿éʹÓó־ÃcookieÀ´Î¬³Ö»á»°Ò»ÖÂÐÔ£¬µ«ÕâЩcookieĬÈÏδ¼ÓÃÜ¡£´Ó11.5.0°æ¿ªÊ¼£¬¹ÜÀíÔ±¿ÉÑ¡ÔñÇ¿ÖƶÔËùÓÐcookie½øÐмÓÃÜ£¬µ«Ñ¡Ôñ²»ÆôÓõÄÓû§½«ÃæÁÙÄþ¾²·çÏÕ¡£ÕâЩcookie°üÂÞ±àÂëµÄIPµØÖ·¡¢¶Ë¿ÚºÅºÍÄÚ²¿¸ºÔØƽºâ·þÎñÆ÷µÄÉèÖã¬ÍøÂçÄþ¾²Ñо¿ÈËÔ±¶àÄêÇ°ÒÑ·ÖÏíÈçºÎÀûÓÃδ¼ÓÃܵÄcookieÀ´²éÕÒÒþ²ØµÄÄÚ²¿·þÎñÆ÷¡£CISA½¨ÒéF5 BIG-IP¹ÜÀíÔ±¼ì²ì¹©Ó¦É̹ØÓÚÈçºÎ¼ÓÃÜÕâЩ³Ö¾ÃcookieµÄ˵Ã÷£¬²¢Ö¸³öF5ÒÑ¿ª·¢³öÒ»ÖÖÃûΪ¡°BIG-IP iHealth¡±µÄÕï¶Ï¹¤¾ß£¬ÓÃÓÚ¼ì²â²úÎïµÄ´íÎóÅäÖò¢Ïò¹ÜÀíÔ±·¢³ö¾¯¸æ¡£µ±ÉèÖÃΪ¡°±ØÐ롱ʱ£¬ËùÓг־ÃÐÔcookie¶¼Ê¹ÓÃÇ¿AES-192¼ÓÃܽøÐмÓÃÜ¡£


https://www.bleepingcomputer.com/news/security/cisa-hackers-abuse-f5-big-ip-cookies-to-map-internal-servers/


6. Mozilla½ô¼±Ðû²¼FirefoxÄþ¾²¸üУ¬ÐÞ¸´ÑÏÖØ©¶´CVE-2024-9680


10ÔÂ11ÈÕ£¬MozillaΪÆäFirefoxä¯ÀÀÆ÷Ðû²¼Á˽ô¼±Äþ¾²¸üУ¬ÒÔ½â¾öÒ»¸ö±»¹ã·ºÀûÓõÄÑÏÖØ©¶´£¬¸Ã©¶´±»×·×ÙΪCVE-2024-9680£¬CVSSÆÀ·ÖΪ9.8£¬¿ÉÄÜÔÊÐí¹¥»÷ÕßÔÚÓû§ÏµÍ³ÉÏÖ´ÐÐÈÎÒâ´úÂ롣©¶´Î»ÓÚFirefoxµÄ¶¯»­Ê±¼äÖá×é¼þÖУ¬ÊÇWeb Animations APIµÄÒ»ÖÖ»úÖÆ£¬¾ßÌåΪÊͷźóʹÓ鶴£¬¿Éµ¼ÖÂÄÚ´æË𻵡£MozillaÔÚÊÕµ½·´²¡¶¾¹«Ë¾ESETµÄ¾¯¸æºó£¬Ñ¸ËÙÕÙ¼¯ÍŶӶÔ©¶´½øÐÐÄæÏò¹¤³Ì£¬²¢ÔÚ25СʱÄÚ¿ª·¢²¢Ðû²¼ÁËÐÞ¸´·¨Ê½¡£ÐÞ²¹µÄ°æ±¾°üÂÞFirefox 131.0.2µÈ¶à¸ö°æ±¾¡£´ËÍ⣬MozillaÒÑÈ·Èϸ鶴ÕýÔÚ±»»ý¼«ÀûÓÃÀ´¹¥»÷Torä¯ÀÀÆ÷Óû§£¬µ«¹ØÓÚ¹¥»÷µÄ¾ßÌåϸ½ÚÈÔ²»µÃ¶øÖª¡£Òò´Ë£¬Óû§Ó¦Á¢¼´¸üÐÂÖÁ×îа汾µÄFirefoxÒÔ±£»¤×Ô¼ºµÄϵͳÄþ¾²¡£


https://securityonline.info/mozilla-confirms-active-attacks-on-tor-browser-via-firefox-vulnerability/