MicroliseÔâÍøÂç¹¥»÷ £¬Ö¼àÓü³µºÍ¿ìµÝ³µÁ¾×·×Ùϵͳ̱»¾

Ðû²¼Ê±¼ä 2024-11-08

1. MicroliseÔâÍøÂç¹¥»÷ £¬Ö¼àÓü³µºÍ¿ìµÝ³µÁ¾×·×Ùϵͳ̱»¾


11ÔÂ7ÈÕ £¬MicroliseÊÇÒ»¼ÒΪ³µ¶ÓÔËÓªÉÌÌṩ³µÁ¾×·×Ù½â¾ö·½°¸µÄ¹«Ë¾ £¬½üÆÚÔâÓöÁËÍøÂç¹¥»÷ £¬µ¼ÖÂÆä¼àÓü³µºÍ¿ìµÝ³µÁ¾µÄ×·×ÙϵͳºÍ¾¯±¨ÏµÍ³±»½ûÓ᣸ù«Ë¾ÔÚ10ÔÂ31ÈÕ֪ͨÂ׶Ø֤ȯ½»Ò×ËùÆäÍøÂçÉÏ·¢ÉúÁË¡°Î´¾­ÊÚȨµÄ»î¶¯¡± £¬²¢Æ¸ÇëÁËÍⲿÍøÂçÄþ¾²×¨¼Ò½øÐÐÊÓ²ìºÍ»Ö¸´ÊÂÇé¡£½ØÖÁ11ÔÂ6ÈÕ £¬MicroliseÌåÏÖÒÑÔÚ¿ØÖƺÍÇå³ýÍøÂçÍþв·½ÃæÈ¡µÃʵÖÊÐÔ½øÕ¹ £¬²¢»Ö¸´ÁËËùÓзþÎñ £¬Ô¤¼ÆÏÂÖÜÄ©½«È«ÃæͶÈëÔËÓª¡£´Ë´Î¹¥»÷δË𺦿ͻ§ÏµÍ³Êý¾Ý £¬µ«²¿ÃÅÔ±¹¤Êý¾ÝÊܵ½Ó°Ïì £¬ÊÜÓ°Ïì¸öÈ˽«Æ¾¾Ý¹«Ë¾¼à¹ÜÒåÎñµÃµ½Í¨Öª £¬²¢¼û¸æÏà¹Ø²¿ÃÅ¡£ÊÜÓ°ÏìµÄ¿Í»§°üÂÞÓ¢¹úÕþ¸®³Ð°üÉÌSercoºÍ¿ìµÝ¹«Ë¾DHL £¬ÆäÖÐSercoÔÚÏ®»÷Ó°Ïì·¢ÏÖÇ°µÄ¼¸ÌìÄÚ £¬²¿ÃÅÇô·¸»¤ËÍ·þÎñȱ·¦Î»Öøú×ÙºÍÄþ¾²±£ÕÏ £¬¶øDHLµÄ²¿Ãųµ¶ÓҲȱ·¦×·×Ù¹¦Ð§¡£Microliseδ͸¶ÍøÂç¹¥»÷ÀàÐͼ°ÊÜÓ°Ïì¿Í»§µÄÏêϸÐÅÏ¢¡£


https://www.securityweek.com/cyberattack-on-microlise-disables-tracking-in-prison-vans-courier-vehicles/


2. CISA¾¯¸æ£ºPalo Alto Networks Expedition´æÔÚÉí·ÝÑé֤©¶´Ôâ¹¥»÷


11ÔÂ7ÈÕ £¬CISA½üÈÕ·¢³ö¾¯¸æ £¬Ö¸³ö¹¥»÷ÕßÕýÔÚÀûÓÃPalo Alto Networks ExpeditionÖеÄÑÏÖØÉí·ÝÑé֤©¶´¡£ExpeditionÊÇÒ»ÖÖǨÒƹ¤¾ß £¬ÓÃÓÚ½«·À»ðǽÅäÖôÓCheckpoint¡¢CiscoµÈ¹©Ó¦ÉÌת»»ÎªPAN-OS¡£¸Ã©¶´£¨CVE-2024-5910£©ÒÑÔÚ7Ôµõ½ÐÞ¸´ £¬µ«ÍþвÕßÈÔÄÜÔ¶³ÌÀûÓÃËüÖØÖÃ̻¶ÔÚ»¥ÁªÍøÉϵÄExpedition·þÎñÆ÷ÉϵÄÓ¦Ó÷¨Ê½¹ÜÀíԱƾ¾Ý¡£CISAÖ¸³ö £¬´Ë©¶´ÔÊÐí¹¥»÷Õß½Ó¹ÜExpedition¹ÜÀíÔ±ÕÊ»§ £¬²¢¿ÉÄÜ·ÃÎÊ»úÃÜÅäÖá¢Æ¾¾Ý¼°ÆäËûÊý¾Ý¡£¾¡¹ÜÍøÂçÄþ¾²»ú¹¹Î´Ìṩ¸ü¶à¹¥»÷ϸ½Ú £¬µ«Horizon3.ai©¶´Ñо¿Ô±Zach HanleyÐû²¼ÁËÒ»¸ö¿´·¨Ñé֤©¶´ £¬¿É½áºÏÁíÒ»¸öÒÑÐÞ²¹µÄÃüÁî×¢È멶´£¨CVE-2024-9464£© £¬ÔÚÒ×Êܹ¥»÷µÄ·þÎñÆ÷ÉÏʵÏÖδ¾­Éí·ÝÑéÖ¤µÄÈÎÒâÃüÁîÖ´ÐС£Palo Alto Networks½¨Òé¹ÜÀíÔ±ÏÞÖÆExpeditionµÄÍøÂç·ÃÎÊ £¬²¢ÔÚÉý¼¶µ½Àι̰汾ºóÂÖ»»ËùÓÐÓû§Ãû¡¢ÃÜÂëºÍAPIÃÜÔ¿¡£CISAÒѽ«¸Ã©¶´Ìí¼Óµ½ÆäÒÑÖª±»ÀûÓ鶴Ŀ¼ÖÐ £¬ÒªÇóÃÀ¹úÁª°î»ú¹¹ÔÚÈýÖÜÄÚ£¨¼´11ÔÂ28ÈÕÇ°£©±£»¤ÆäÍøÂçÉϵÄÒ×Êܹ¥»÷·þÎñÆ÷¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-palo-alto-networks-bug-exploited-in-attacks/


3. Androxgh0stÓëMozi½©Ê¬ÍøÂ缯³É £¬ÍþвȫÇòWebºÍIoTÉ豸Äþ¾²


11ÔÂ7ÈÕ £¬CloudSEK³ÂËßÖ¸³ö £¬Androxgh0st½©Ê¬ÍøÂçÒÑÓëMozi½©Ê¬ÍøÂ缯³É £¬ÀûÓÃWebÓ¦Ó÷¨Ê½ºÍIoTÉ豸ÖеĶàÖÖ©¶´½øÐй¥»÷¡£×Ô2024Äê1ÔÂÆ𠣬Androxgh0stÕë¶ÔÍøÂç·þÎñÆ÷½øÐиïкóÖØзºÆ𠣬²¢¹²ÏíÁËMozi½©Ê¬ÍøÂçµÄ×é¼þ £¬´Ó¶øÄܹ»Ñ¬È¾¸ü¶àIoTÉ豸¡£Ñо¿ÈËÔ±·¢ÏÖ £¬Androxgh0stµÄ¹¥»÷ÒªÁìÒÑÀ©Õ¹ £¬Ãé×¼ÁË°üÂÞCisco ASA¡¢Atlassian JIRA¡¢PHP¿ò¼Ü¡¢Metabase¡¢Apache Web·þÎñÆ÷ºÍ¶àÖÖÎïÁªÍøÉ豸ÔÚÄڵĶà¸ö©¶´¡£Í¨¹ýÕûºÏMoziµÄ¹¦Ð§ £¬Androxgh0stÄܹ»ÀûÓÃÅäÖôíÎóµÄ·ÓÉÆ÷ºÍÉ豸 £¬ÔÚÈ«Çò·¶Î§ÄÚѬȾÉ豸¡£´ËÍâ £¬¸Ã½©Ê¬ÍøÂ绹Õë¶Ô¶à¸ö¹ú¼ÒºÍµØÓòµÄÉ豸½øÐй¥»÷ £¬µÂ¹úλ¾ÓÊÜѬȾÉ豸ÊýÁ¿°ñÊס£×éÖ¯Ó¦Á¢¼´ÐÞ²¹Ïà¹Ø©¶´ £¬¼à¿ØÍøÂçÁ÷Á¿ £¬²¢·ÖÎöÈÕÖ¾ÒÔ²éÕÒÈëÇÖ¼£Ïó £¬ÒÔ±£»¤ÏµÍ³ÃâÊÜÕâÖÖ²»Í£ÑݱäµÄÍþв¡£


https://hackread.com/androxgh0st-botnet-integrate-mozi-iot-vulnerabilities/


4. ³¯ÏʺڿÍÀûÓá°Òþ²Ø·çÏÕ¡±¶ñÒâÈí¼þ¹¥»÷¼ÓÃÜ»õ±ÒÆóÒµ


11ÔÂ7ÈÕ £¬³¯ÏÊÕþ¸®Ö§³ÖµÄAPT×éÖ¯BlueNoroffÕýÔÚÀûÓÃÒ»ÖÖÃûΪ¡°Òþ²Ø·çÏÕ¡±µÄÐÂÐͶñÒâÈí¼þ¹¥»÷¼ÓÃÜ»õ±ÒÆóÒµ¡£¸Ã¹¥»÷ͨ¹ý¾«ÐÄÖÆ×÷µÄÍøÂçµöÓãµç×ÓÓʼþ £¬ÓÕʹÊܺ¦Õßµã»÷¶ñÒâÁ´½Ó £¬ÏÂÔØαװ³ÉPDFÔĶÁÆ÷µÄ¶ñÒâMacÓ¦Ó÷¨Ê½¡£Ò»µ©Ö´ÐÐ £¬¸ÃÓ¦Ó÷¨Ê½»áÃØÃÜÏÂÔز¢Ö´ÐжñÒâ¶þ½øÖÆÎļþ £¬°²×°ºóÃŲ¢ÊÕ¼¯ÏµÍ³Ãô¸ÐÐÅÏ¢ £¬ÓëÔ¶³Ì·þÎñÆ÷ͨÐÅ £¬½ÓÊÕ²¢Ö´ÐÐÃüÁΪÁËÈ·±£³Ö¾ÃÐÔ £¬¹¥»÷Õß»¹ÐÞ¸ÄÁËZshÅäÖÃÎļþ £¬Ê¹ºóÃÅ¿ÉÒÔÔÚϵͳÆô¶¯Ê±×Ô¶¯Ö´ÐС£Ñо¿ÈËÔ±ÈÏΪ £¬´Ë´Î¹¥»÷»î¶¯ÓëBlueNoroffÓйØÁª £¬ÒòÆä¼¼ÊõÓëBlueNoroff¹ýÈ¥µÄ¹¥»÷»î¶¯ÀàËÆ £¬ÇÒʹÓÃÁËÓëÆäÏà¹ØµÄ¶ñÒâÈí¼þµÄÓû§ÊðÀí×Ö·û´® £¬²¢ÀûÓÿª·¢ÕßÕÊ»§ÈÃApple¹«Ö¤¶ñÒâÈí¼þ £¬´Ó¶øÈƹýÄþ¾²´ëÊ©¡£¼øÓÚBlueNoroff¶à´ÎÒÔ¼ÓÃÜ»õ±Ò½»Ò×Ëù¡¢·çÏÕͶ×ʹ«Ë¾ºÍÒøÐÐΪĿ±ê £¬ÐÐÒµÓ¦±£³Ö¾¯Ìè¡£Óû§Ó¦×Ðϸ¼ì²éµç×ÓÓʼþµØÖ· £¬ÖÆÖ¹µã»÷δ֪µç×ÓÓʼþÖеÄÁ´½Ó £¬ÓÈÆäÊÇÒªÇóÏÂÔØÓ¦Ó÷¨Ê½/PDFµÄÁ´½Ó £¬ÒÔÈ·±£×ÔÉíÄþ¾²¡£


https://hackread.com/north-korean-hackers-crypto-fake-news-hidden-risk-malware/


5. °×ñºÚ¿ÍSean Kahler½Ò¶²¢ÖúÐÞEAÕË»§ÏµÍ³ÑÏÖØ©¶´


11ÔÂ6ÈÕ £¬ÓÎÏ·¿ª·¢Õß¼æÄæÏò¹¤³ÌʦSean Kahler·¢ÏÖ²¢ÀûÓÃÁËÒ»¸öÓ°Ïìµç×ÓÒս磨EA£©ÕË»§ÏµÍ³µÄÑÏÖØ©¶´ £¬·Ç·¨»ñÈ¡ÁËÁè¼Ý7ÒÚEAÓû§ÕË»§ÐÅÏ¢ £¬°üÂÞÓÎϷͳ¼ÆÊý¾Ý¡£Ëûͨ¹ýÔÚÓÎÏ·¿ÉÖ´ÐÐÎļþÖÐÕÒµ½Ó²±àÂëƾ֤ £¬»ñµÃÁËEA¿ª·¢ÈËÔ±²âÊÔ»·¾³ÖеÄÌØȨ·ÃÎÊÁîÅÆ £¬½ø¶ø·¢ÏÖÁËÒ»¸ö̻¶µÄÄÚ²¿·þÎñAPI £¬¸ÃAPIÔÊÐíÐÞ¸ÄÍæ¼Ò×ÊÁÏ¡£KahlerÀûÓôË©¶´½«EAÕË»§×´Ì¬¸ü¸ÄΪ¡°ÒѽûÖ¹¡± £¬×èÖ¹Óû§µÇ¼ÓÎÏ· £¬²¢Äܽ«Steam»òXboxÕË»§Á´½Óµ½ÆäËûÓû§µÄEAÕË»§ £¬ÎÞÐèÑéÖ¤»òÃÜÂë¼´¿ÉµÇ¼ÆäËûÕË»§¡£ËûÒâʶµ½Õâһ©¶´µÄÑÏÖØÐÔºó £¬ÓÚ2024Äê6ÔÂ16ÈÕÏòEAÂôÁ¦ÈεØÅû¶ÁË©¶´ £¬EAÈ·ÈÏÁË©¶´²¢Ðû²¼ÁËÎå¸ö²¹¶¡½øÐÐÐÞ¸´¡£È»¶ø £¬KahlerÖ¸³öEA»¨Á˽ϳ¤Ê±¼ä²ÅÐÞ¸´Â©¶´ £¬ÇÒÉÐδÆô¶¯Â©¶´Éͽð¼Æ»® £¬È±·¦³ÂËß©¶´µÄ¶¯Á¦¡£


https://cybernews.com/security/whitehat-gains-access-to-over-700-million-ea-accounts/


6. GodFather¶ñÒâÈí¼þÈ«ÇòÀ©ÕÅ£ºÕë¶Ô500¶à¸ö½ðÈÚÓ¦ÓÃ


11ÔÂ7ÈÕ £¬Cyble Ñо¿ÓëÇ鱨ʵÑéÊÒ (CRIL) ³ÂËßÖ¸³ö £¬GodFather ¶ñÒâÈí¼þµÄ·¶Î§ÒÑÀ©´óÖÁÈ«Çò 500 ¶à¸öÒøÐкͼÓÃÜ»õ±ÒÓ¦Ó÷¨Ê½ £¬½ÓÄÉÅÓ´ó¼¼ÊõÈç±¾»ú´úÂëʵÏÖºÍ×îµÍȨÏÞ £¬Ê¹Æä±ÈÒÔÇ°Ô½·¢ÄÑÒÔ×½ÃþºÍΣÏÕ¡£¸Ã¶ñÒâÈí¼þÀûÓõöÓãÍøÕ¾·Ö·¢Î±×°³ÉºÏ·¨Ó¦Ó÷¨Ê½µÄ¶ñÒâ APK Îļþ £¬Ö¼ÔÚÇÔÈ¡ÒøÐÐƾ֤¡£Ëü»¹ÄÜÀûÓà Android É豸µÄ Accessibility ·þÎñÖ´ÐÐÖÖÖÖ¶ñÒ⹦Ч £¬Èç×Ô¶¯ÊÖÊÆ¡¢ÓëÃüÁîºÍ¿ØÖÆ·þÎñÆ÷½¨Á¢Á¬½ÓÒÔ¼°¼üÅ̼Ǽ¡£Ò»µ©¼ì²âµ½Ä¿±êÓ¦Ó÷¨Ê½ £¬GodFather ¾Í»á¹Ø±ÕºÏ·¨Ó¦Ó÷¨Ê½²¢¼ÓÔØÐé¼ÙµÇ¼ҳÃæÒÔÇÔȡƾ¾Ý¡£´ËÍâ £¬ÆäµØÀíÁýÕÖ·¶Î§Ò²ÔÚÀ©´ó £¬ÏÖÒÑÕë¶ÔÈÕ±¾¡¢Ð¼ÓÆ¡¢°¢Èû°Ý½®ºÍÏ£À°µÄÓû§¡£CRIL ×ܽá³Æ £¬Æ¾½èÆäеÄ×Ô¶¯»¯²Ù×÷ºÍÔÚ¸ü¶à¹ú¼Ò/µØÓòÕë¶ÔÓ¦Ó÷¨Ê½µÄ¸ü¹ã·ºÄ¿±ê £¬GodFather ¶ñÒâÈí¼þ¶ÔÈ«ÇòÓû§×é³ÉÁËÔ½À´Ô½´óµÄ·çÏÕ £¬Òò´Ë±£³Ö¾¯Ìè²¢ÔÚÒƶ¯É豸ÉϽÓÄÉÇ¿´óµÄÄþ¾²´ëÊ©ÖÁ¹ØÖØÒª¡£


https://securityonline.info/godfather-malware-now-targets-500-banking-and-crypto-apps