¶íÂÞ˹ÒÉËÆÀûÓÃNTLMЩ¶´¶ÔÎÚ¿ËÀ¼·¢¶¯ÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2024-11-15

1. ¶íÂÞ˹ÒÉËÆÀûÓÃNTLMЩ¶´¶ÔÎÚ¿ËÀ¼·¢¶¯ÍøÂç¹¥»÷


11ÔÂ14ÈÕ £¬½üÈÕÒ»¸öÃûΪCVE-2024-43451µÄÐÂÄþ¾²Â©¶´Ó°ÏìÁËWindows NT LAN¹ÜÀíÆ÷£¨NTLM£© £¬¸Ã©¶´±»ÒÉËÆÓë¶íÂÞ˹ÓйصÄÐÐΪÕßÀûÓÃΪÁãÈÕ©¶´ £¬¶ÔÎÚ¿ËÀ¼·¢¶¯ÍøÂç¹¥»÷¡£´Ë©¶´±»ÃüÃûΪNTLM¹þϣй¶ÆÛƭ©¶´ £¬CVSSÆÀ·ÖΪ6.5 £¬¿É±»ÓÃÀ´ÇÔÈ¡Óû§µÄNTLMv2¹þÏ£¡£Î¢ÈíÒѼ°Ê±ÐÞ²¹Á˸鶴 £¬²¢Ö¸³öÓû§Óë¶ñÒâÎļþ½øÐÐ×îС½»»¥¶¼¿ÉÄÜ´¥·¢Â©¶´¡£ÒÔÉ«ÁÐÍøÂçÄþ¾²¹«Ë¾ClearSky·¢ÏÖ £¬¸Ã©¶´Òѱ»ÓÃÓÚÁ÷´«¿ªÔ´Spark RAT¶ñÒâÈí¼þµÄ¹¥»÷Á´ÖÐ £¬¶ñÒâÎļþÍйÜÔÚÎÚ¿ËÀ¼Õþ¸®¹Ù·½ÍøÕ¾ÉÏ¡£¹¥»÷Á´Éæ¼°·¢ËÍÍøÂçµöÓãµç×ÓÓʼþ £¬ÌáʾÊÕ¼þÈ˵ã»÷ÏÝÚåURLÏÂÔØ°üÂÞ¶ñÒâ.URLÎļþµÄZIP´æµµ¡£µ±Êܺ¦ÕßÓëURLÎļþ½»»¥Ê± £¬¾Í»á´¥·¢Â©¶´ £¬µ¼ÖÂÏÂÔØÆäËûÓÐЧ¸ºÔØ £¬°üÂÞSpark RAT¡£ÎÚ¿ËÀ¼¼ÆËã»úÓ¦¼±·´Ó³Ð¡×é(CERT-UA)½«´Ë»î¶¯Óë¿ÉÄܵĶíÂÞ˹ÍþвÐÐΪÕßUAC-0194ÁªÏµÆðÀ´ £¬²¢¾¯¸æ³Æ £¬ÆóÒµÓëÔ¶³ÌÒøÐÐϵͳЭ×÷µÄ»á¼Æ´¦Óڸ߷çÏÕÇø £¬×ʽð¿ÉÄÜÔÚ¶Ìʱ¼äÄÚ±»µÁ¡£


https://thehackernews.com/2024/11/russian-hackers-exploit-new-ntlm-flaw.html


2. ¹þÂí˹¹ØÁªÍøÂç×éÖ¯WIRTEÕë¶ÔÒÔÉ«ÁÐʵʩÆÆ»µÐÔ¹¥»÷


11ÔÂ13ÈÕ £¬¾ÝThe Hack News±¨µÀ £¬Óë¹þÂí˹ÓйØÁªµÄÍøÂç¹¥»÷Õß½üÆÚרÃÅÕë¶ÔÒÔÉ«ÁÐʵÌå½øÐÐÆÆ»µÐÔ¹¥»÷¡£Check PointµÄ·ÖÎöÖ¸³ö £¬ÕâЩ¹¥»÷ÓëÒ»¸öÃûΪWIRTEµÄ×éÖ¯ÓйØ £¬¸Ã×éÖ¯×Ô2018Äê8ÔÂÒÔÀ´Ò»Ö±»îÔ¾ÓÚÖж«µØÓò £¬Õë¶Ô¹ã·ºÊµÌå·¢¶¯¹¥»÷¡£WIRTEÀûÓÃÖж«µÄµØÔµÕþÖνôÕžÖÊƺÍÕ½ÂÒ £¬ÖÆ×÷¶ñÒâRARÎĵµ²¿ÊðHavocºóÆÚ¿ª·¢¿ò¼Ü £¬»òÀûÓÃÀàËƵÄRARÎĵµ²¿ÊðIronWindÏÂÔØÆ÷¡£ÕâЩѬȾÐòÁÐͨ¹ýÁ÷´«´øÓÐÆÛÆ­ÐÔµÄPDFÎĵµ £¬Ê¹ÓúϷ¨µÄ¿ÉÖ´ÐÐÎļþ²àÔØ´øÓжñÒâÈí¼þµÄDLL¡£ÔÚ2024Äê10ÔÂÕë¶ÔÒÔÉ«ÁÐÒ½ÔººÍÊÐÕþÕþ¸®µÈ¶à¸ö×éÖ¯µÄÍøÂçµöÓã»î¶¯ÖÐ £¬ÉõÖÁ·ºÆðÁËð³äÍøÂçÄþ¾²¹«Ë¾ESETÔÚÒÔÉ«ÁкÏ×÷ÉÌ·¢³öµÄµöÓãµç×ÓÓʼþ £¬ÆäÖаüÂÞÁËа汾µÄSameCoin Wiper £¬¸Ã°æ±¾³ýÁËÁýÕÖÎļþÍâ £¬»¹»áÐÞ¸ÄÊܺ¦ÕßϵͳÅä¾°ÏÔʾ¹þÂí˹¾üÊ·ÖÖ§Al-Qassam BrigadesµÄͼÏñ¡£¾Ý³Æ £¬¸Ã¹¥»÷×éÖ¯µÄWindows¼ÓÔØ·¨Ê½Ñù±¾Ê±¼ä´Á±»¸ü¸ÄΪ¹þÂí˹¶ÔÒÔÉ«Áз¢¶¯Í»È»¹¥ÊƵÄÈÕÆÚ £¬¶ø³õʼ·ÃÎÊý½éÔòÊÇð³äÒÔÉ«Áйú¼ÒÍøÂç¾ÖµÄµç×ÓÓʼþ¡£


https://thehackernews.com/2024/11/hamas-affiliated-wirte-employs-samecoin.html


3. Glove Stealer¶ñÒâÈí¼þ£º¿ÉÈƹýChrome App-Bound¼ÓÃÜÇÔÈ¡Cookie


11ÔÂ14ÈÕ £¬Glove Stealer ÊÇÒ»¿îеĶñÒâÈí¼þ £¬Äܹ»Èƹý Google Chrome µÄ App-Bound ¼ÓÃÜ £¬ÇÔÈ¡ä¯ÀÀÆ÷ cookie¡£¸Ã¶ñÒâÈí¼þÓÉ Gen Digital Äþ¾²Ñо¿ÈËÔ±ÔÚÊÓ²ìÍøÂçµöÓã»î¶¯Ê±Ê״η¢ÏÖ £¬ËûÃÇÈÏΪËüÏà¶Ô¼òµ¥ £¬¿ÉÄÜ´¦ÓÚÔçÆÚ¿ª·¢½×¶Î¡£Glove Stealer ʹÓÃÉç»á¹¤³Ì¼ÆıÓÕƭDZÔÚÊܺ¦Õß°²×° £¬¿ÉÒÔ´Ó Firefox ºÍ»ùÓÚ Chromium µÄä¯ÀÀÆ÷£¨Èç Chrome¡¢Edge µÈ£©ÖÐÌáÈ¡ cookie £¬ÒÔ¼°ÇÔÈ¡ä¯ÀÀÆ÷À©Õ¹·¨Ê½ÖеļÓÃÜ»õ±ÒÇ®°ü¡¢2FA »á»°ÁîÅÆ¡¢ÃÜÂëÊý¾ÝµÈÃô¸ÐÐÅÏ¢¡£´ËÍâ £¬Ëü»¹ÄÜ´Ó 280 ¸öä¯ÀÀÆ÷À©Õ¹ºÍ 80 ¶à¸öµ±µØÓ¦Ó÷¨Ê½ÖÐÇÔÈ¡Êý¾Ý¡£ÎªÁËÈƹý Chrome µÄ App-Bound ¼ÓÃÜ £¬Glove Stealer ʹÓÃÁËÒ»¸öÖ§³ÖÄ£¿é £¬ÀûÓà Chrome µÄ IElevator Windows ·þÎñÀ´½âÃܺͼìË÷¼ÓÃÜÃÜÔ¿ £¬µ«ÐèÒªÏÈ»ñÇ¡µ±µØ¹ÜÀíԱȨÏÞ¡£¾¡¹ÜÕâÖÖÒªÁìÔÚ¼¼ÊõÉÏÏà¶Ô»ù´¡ £¬µ«¶à¸öÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ²Ù×÷ÒѾ­Äܹ»ÈƹýеÄÄþ¾²¹¦Ð§ £¬ÒÔÇÔÈ¡ºÍ½âÃÜ Google Chrome cookie¡£×Թȸè 7 Ô·Ýʵʩ App-Bound ¼ÓÃÜÒÔÀ´ £¬¹¥»÷´ÎÊý²¢Î´¼õÉÙ £¬·´¶øÓÐËùÔö¼Ó £¬Í¨¹ýÖÖÖÖ·½Ê½Ãé׼DZÔÚÊܺ¦Õß¡£


https://www.bleepingcomputer.com/news/security/new-glove-infostealer-malware-bypasses-google-chromes-cookie-encryption/


4. ÈðÊ¿ÍøÂç»ú¹¹¾¯Ê¾£º¼ÙÆøÏóÓʼþÁ÷´«¶ñÒâÈí¼þ͵ȡÃô¸ÐÐÅÏ¢


11ÔÂ15ÈÕ £¬ÈðÊ¿Áª°îÍøÂçÄþ¾²¾Ö£¨OFCS£©13ÈÕ·¢³ö¾¯¸æ £¬³Æ¸Ã¹úÆøÏó»ú¹¹µÄ¡°¼ÙÐżþ¡±±»ÓÃÀ´Á÷´«¶ñÒâÈí¼þ¡£ÕâЩÓʼþÉù³ÆÌṩһ¿îÐÂÌìÆøÓ¦Ó÷¨Ê½MeteoSwiss £¬µ«°üÂÞÒ»¸ö¶þάÂë £¬»áÖض¨Ïòµ½ÆÛÕ©Õß¿ª·¢µÄ¶ñÒâÓ¦Ó÷¨Ê½¡£É¨Ãè¶þάÂëºó £¬ÊÖ»úÓû§»áÏÂÔØÃûΪ¡°Coper¡±ºÍ¡°Octo2¡±µÄ¶ñÒâÈí¼þ £¬¸Ã·¨Ê½ÊÔͼÇÔÈ¡°üÂÞµç×ÓÒøÐÐÓ¦Ó÷¨Ê½ÔÚÄÚµÄ383¶à¸öÒƶ¯Ó¦Ó÷¨Ê½µÄµÇ¼ÏêϸÐÅÏ¢¡£ËäȻʹÓÃÏÖʵÊÀ½çµÄÓÕ¶üÀ´Ñ¬È¾¶ñÒâÈí¼þµÄÇé¿ö²¢²»³£¼û £¬µ«²¢·ÇÎÅËùδÎÅ £¬Î¢Èí´ËÇ°Ò²ÔøÔâÓöÀàËÆʼþ¡£OFCSûÓÐ͸¶ÊÜÓ°ÏìµÄÈËÊý £¬µ«ÌåÏÖ¼ÙðӦÓ÷¨Ê½Ä£·ÂÁËÕæÕýµÄ¡°Alertswiss¡±Ó¦Ó÷¨Ê½ £¬½öÓ°Ï찲׿ÊÖ»ú¡£½¨Òé°²×°Á˼ÙðӦÓ÷¨Ê½µÄÓû§½«É豸»Ö¸´³ö³§ÉèÖà £¬²¢³ÂË߸øOFCS¡£¸Ã»ú¹¹ÒѾ­¿ªÊ¼ÊµÊ©±£»¤´ëÊ©¡£


https://therecord.media/malware-delivered-by-mail-swiss-cyber-agency


5. ÐÙÑÀÀû¹ú·À²É¹º»ú¹¹Ôâ¹ú¼ÊºÚ¿Í×éÖ¯¹¥»÷


11ÔÂ15ÈÕ £¬ÐÙÑÀÀû¹ú·À²É¹º»ú¹¹£¨VB¨¹£©½üÈÕÔâµ½ÃûΪINC Ransomware»òINC RansomµÄ¹ú¼ÊÍøÂç·¸×ï×éÖ¯µÄ¹¥»÷¡£¸Ã×éÖ¯Éù³Æ¿ÉÒÔ·ÃÎÊVB¨¹µÄÊý¾Ý £¬²¢ÔÚ°µÍøÃÅ»§ÍøÕ¾ÉÏÐû²¼ÁËʾÀý½Øͼ¡£ÐÙÑÀÀû¹ú·À²¿¾Ü¾ø͸¶¿ÉÄܵÄÐÅϢй¶Çé¿ö £¬µ«È·ÈÏÊÓ²ìÕýÔÚ½øÐÐÖÐ £¬²¢Ç¿µ÷VB¨¹²»´æ´¢Ãô¸ÐµÄ¾üÊÂÊý¾Ý¡£È»¶ø £¬×ÜÀíά¿ËÍС¤Å·¶û°àµÄÄ»Áų¤½«´Ë´ÎÏ®»÷¹é¾ÌÓڵжԵÄÍâ¹ú·Ç¹ú¼ÒºÚ¿Í×éÖ¯ £¬Ö¸³ö¿ÉÄܱ»·ÃÎʵÄ×îÃô¸ÐÊý¾Ý°üÂÞÓйؾüʲɹºµÄ¼Æ»®ºÍÊý¾Ý¡£¾Ý±¨µÀ £¬ºÚ¿ÍÈëÇÖÁ˸ûú¹¹µÄ·þÎñÆ÷ £¬ÏÂÔز¢¼ÓÃÜÁËËùÓÐÎļþ £¬²¢Ðû²¼ÁË°üÂÞÐÙÑÀÀû¾ü¶Ó¿ÕÖкͽµØÄÜÁ¦Êý¾ÝµÄÎļþ½Øͼ £¬ÒÔ¼°±êÓС°·Ç¹ûÈ»¡±µÄÎļþ £¬²¢Ë÷Òª500ÍòÃÀÔªÊê½ð¡£ÐÙÑÀÀû¹ÙԱδ¾ÍÊÇ·ñÓëºÚ¿Í̸Åз¢±íÆÀÂÛ¡£


https://therecord.media/hungary-defense-procurement-agency-hacked


6. Microsoft Power PagesÅäÖôíÎóÖÂ700ÍòÌõ¼Ç¼̻¶


11ÔÂ14ÈÕ £¬Ñо¿ÈËÔ±·¢ÏÖ £¬Microsoft Power PagesÕâÒ»µÍ´úÂ빤¾ß´æÔÚ¶à¸öÅäÖôíÎóʵÏÖµÄÎÊÌâ £¬¿ÉÄܵ¼Ö»úÃÜÊý¾Ý±»ÎÞÒâ·ÃÎÊ¡£Power Pages±»¹ã·ºÓ¦ÓÃÓÚÕþ¸®¡¢½ÌÓýºÍ˽ÈË×éÖ¯µÈÁìÓò £¬µ«ÔÚһЩ°²×°ÖÐ £¬ÅäÖôíÎóµ¼ÖÂÔ¼700ÍòÌõ¼Ç¼̻¶¡£ÎÊÌâÔ´ÓÚÓû§¶ÔÅäÖõÄÀí½â²»×ã £¬¶ø·Ç΢Èí²úÎï×Ô¼ºµÄÎÊÌ⡣΢ÈíÔÚDZÔÚÅäÖÃÎÊÌâʱ»á·¢³ö¾¯¸æ £¬µ«ÎÞ·¨È·±£Óû§×÷³ö·´Ó³¡£ÏÖ´ú¼¼ÊõʹµÃÃÅ»§¹¹½¨Ïà¶ÔÈÝÒ× £¬µ«Äþ¾²ÐÔºÍά»¤ÈÔÈ»ÅÓ´ó £¬µ¼ÖÂʵʩºÍά»¤Ö®¼ä²»Æ¥Åä £¬³¬³öÏà¹Ø¹«Ë¾ÄÜÁ¦·¶Î§µÄ³õʼ»òзºÆðµÄ´íÎóÅäÖ᣿ª·¢ÍŶӺÍÄþ¾²ÍŶÓÖ®¼äµÄÁæØê¹ØϵҲ¼Ó¾çÁËÕâÒ»ÎÊÌâ¡£AppOmni·¢ÏÖµÄÎÊÌâÒÑÏòÊÜÓ°Ï칫˾³ÂËß²¢µÃµ½ÐÞ¸´ £¬µ«Á¬Ðø´æÔڵĴíÎóÅäÖÃÎÊÌâÈÔÐè½â¾ö¡£ÏÖ´úµÍ´úÂë¼¼ÊõʹµÃȱ·¦×¨ÒµÖªÊ¶µÄÓû§Äܹ»¿ª·¢ÅÓ´óµÄ½â¾ö·½°¸ £¬Òò´ËÎÊÌâ¿ÉÄÜ»áÁ¬Ðø´æÔÚ¡£AppOmni½¨ÒéʹÓÃÄܹ»¼ì²â´íÎóÅäÖõÄϵͳ½øÐÐÁ¬Ðø¼à¿Ø¡£


https://www.securityweek.com/low-code-high-risk-millions-of-records-exposed-via-misconfigured-microsoft-power-pages/