Start-Rite¶ùͯЬÖÆÔìÉÌÔÙ´ÎÔâÓö¿Í»§Ö§¸¶ÐÅϢй¶Ê¼þ

Ðû²¼Ê±¼ä 2024-11-18
1. Start-Rite¶ùͯЬÖÆÔìÉÌÔÙ´ÎÔâÓö¿Í»§Ö§¸¶ÐÅϢй¶Ê¼þ


11ÔÂ14ÈÕ £¬¶ùͯЬÖÆÔìÉÌStart-Rite½üÈÕÔâÓöÁËÉæ¼°¿Í»§Ö§¸¶¿¨ÏêϸÐÅÏ¢µÄÑÏÖØÄþ¾²Ê¼þ £¬ÕâÊǸù«Ë¾ÔÚ¹ýÈ¥°ËÄêÖеڶþ´Î·¢Éú´ËÀàÖØ´óʧÎó ¡£¾Ý·¢Ë͸ø¿Í»§µÄ֪ͨ³Æ £¬ÈëÇÖʼþ·¢ÉúÔÚ10ÔÂ14ÈÕÖÁ11ÔÂ7ÈÕÖ®¼ä £¬¿ÉÄÜ鶵ÄÐÅÏ¢°üÂÞÖ§¸¶¿¨ÉϵĿͻ§ÐÕÃû¡¢¿¨×¢²áµØÖ·¡¢¿¨ºÅ¡¢ÓÐЧÆںͿ¨ÑéÖ¤Öµ(CVV) ¡£Start-Rite½¨Òé¿Í»§ÁªÏµÒøÐлòÐÅÓÿ¨ÌṩÉÌÍ£Óò¢¸ü»»ÐÅÓÿ¨ £¬²¢±£³Ö¾¯Ìè¼ì²é¶ÔÕ˵¥ ¡£¸Ã¹«Ë¾ÒÑÏòÓ¢¹úÊý¾Ý±£»¤¼à¹Ü»ú¹¹ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©³ÂËß´ËÊ £¬²¢ÌåÏÖ½«È«Á¦ÅäºÏ¾¯·½ÊÂÇé ¡£¾¡¹ÜStart-RiteÏò¡¶The Register¡·Ö¤ÊµÁ˴˴ι¥»÷ £¬µ«ÉÐδ¹ûÈ»ÈÏ¿É´ËÊ ¡£Ó¦ÓÃÄþ¾²×¨¼ÒÌåÏÖ £¬´ËʼþÒý·¢Á˶ÔStart-RiteÄþ¾²Ì¬ÊƵÄÖÊÒÉ £¬ÒÔ¼°Êý¾ÝÈçºÎ±»ÇÔÈ¡µÄÎÊÌâ ¡£ICO·¢ÑÔÈËÔÚ±¨µÀºó͸¶ £¬Start-RiteÒÑÏòÆäͨ±¨ÁËÕâһʼþ £¬²¢ÕýÔÚÆÀ¹ÀËùÌṩµÄÐÅÏ¢ ¡£


https://www.theregister.com/2024/11/14/smartrite_breach/


2. CISA¾¯¸æ£ºPalo Alto Networks Expedition¶à¸ö©¶´±»»ý¼«ÀûÓÃ


11ÔÂ15ÈÕ £¬ÃÀ¹úÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£¨CISA£©Ðû²¼¾¯¸æ £¬Ö¸³öÓ°ÏìPalo Alto Networks ExpeditionµÄÁ½¸öЩ¶´CVE-2024-9463ºÍCVE-2024-9465ÕýÔÚ±»»ý¼«ÀûÓà ¡£ÕâÁ½¸ö©¶´·Ö±ðÉæ¼°ÃüÁî×¢ÈëºÍSQL×¢Èë £¬CVSSÆÀ·Ö·Ö±ð¸ß´ï9.9ºÍ9.3 £¬Èô±»ÀÖ³ÉÀûÓà £¬¹¥»÷Õß¿ÉÔÚExpeditionǨÒƹ¤¾ßÖÐÒÔrootÉí·ÝÖ´ÐÐÈÎÒâÃüÁî»òй¶Êý¾Ý¿âÄÚÈÝ £¬½ø¶ø¿ÉÄܵ¼ÖÂPAN-OS·À»ðǽµÄÓû§Ãû¡¢ÃÜÂë¡¢ÅäÖúÍAPIÃÜԿй¶ £¬»òÔÚÒ×Êܹ¥»÷µÄϵͳÉÏ´´½¨ºÍ¶ÁÈ¡Îļþ ¡£CISAÒѽ«ÕâЩ©¶´ÄÉÈëÒÑÖª±»ÀûÓõÄ©¶´Ä¿Â¼ £¬²¢ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿ÃÅ»ú¹¹ÔÚ2024Äê12ÔÂ5ÈÕÇ°Ó¦ÓÃÐëÒª¸üР¡£Palo Alto NetworksÔÚ2024Äê10ÔÂ9ÈÕÐû²¼µÄÄþ¾²¸üÐÂÖÐÐÞ¸´ÁËÕâЩ©¶´ £¬²¢È·ÈÏÊÕµ½CISA³ÂËß³ÆÕâЩ©¶´ÕýÔÚ±»ÀûÓà ¡£´ËÍâ £¬Ò»ÖÜÇ°CISA»¹Í¨±¨ÁËÁíÒ»¸öÓ°ÏìExpeditionµÄÑÏÖØ©¶´CVE-2024-5910ÕýÔÚ±»ÀûÓà £¬¸Ã©¶´¿Éµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÃüÁîÖ´ÐÐ £¬Õë¶Ô»¥ÁªÍøÉÏ̻¶µÄ·À»ðǽ¹ÜÀí½Ó¿Ú ¡£


https://thehackernews.com/2024/11/cisa-flags-critical-palo-alto-network.html


3. RecraftÄ£ÐÍ´æÄþ¾²Â©¶´£ºÎÞÒâÖÐй¶Ãô¸ÐϵͳָÁîÒý·¢¹Ø×¢


11ÔÂ14ÈÕ £¬¾ÝCyber Security News±¨µÀ £¬Ñо¿ÈËÔ±Ôڸ߼¶È˹¤ÖÇÄÜͼÏñÉú³ÉÄ£ÐÍÖз¢ÏÖÁËDZÔÚµÄÄþ¾²Â©¶´ £¬ÌرðÊÇÔÚRecraftÄ£ÐÍÖÐ £¬¸ÃÄ£ÐÍÔÚÎı¾µ½Í¼Æ¬ÅÅÐаñÉÏ´¦ÓÚÁìÏÈְλ ¡£Recraft½ÓÄÉÁ½¼¶¼Ü¹¹ £¬½áºÏÁË´óÐÍÓïÑÔÄ£ÐͺÍÀ©É¢Ä£ÐÍ £¬Äܹ»´¦ÖÃÅÓ´ó²éѯ²¢Éú³É¸ü׼ȷ¡¢¸üÄܸÐÖªÉÏÏÂÎĵÄͼÏñ ¡£È»¶ø £¬Ñо¿ÈËÔ±·¢ÏÖ £¬Í¨¹ýijЩÌض¨Ìáʾ £¬¿ÉÒÔÓÕʹRecraftй¶²¿ÃÅÄÚ²¿Ö¸Áî £¬°üÂÞϵͳÌáʾƬ¶ÎºÍ¾ßÌåÖ¸µ¼´óÄ£ÐÍÐÐΪµÄ˵Ã÷ ¡£ÕâЩ鶵ÄÖ¸Áî°üÂÞÃèÊö·ç¸ñ¡¢ÎïÌåºÍÈËÎïµÄÏêϸÃèÊö¡¢ÃèÊöÐÔ¾ä×Ó¡¢¹¹Í¼Ï¸½ÚÒÔ¼°ÖÆֹʹÓõĴÊÓïµÈ ¡£ÕâÖÖÎÞÒâÖÐй¶ϵͳÌáʾµÄÐÐΪÒý·¢ÁËÈËÃǶÔÈ˹¤ÖÇÄÜÄ£ÐÍÄþ¾²ÐÔºÍÒþ˽ÐԵĵ£ÓÇ ¡£Èç¹û¶ñÒâÐÐΪÕßÄܹ»ÌáÈ¡ÕâЩÃô¸ÐÖ¸Áî £¬ËûÃÇ¿ÉÄÜ»áÀûÓÃϵͳ¡¢ÈƹýÄþ¾²´ëÊ©»òÉîÈëÁ˽âרÓеÄÈ˹¤ÖÇÄܼ¼Êõ ¡£Òò´Ë £¬ÕâһʼþΪAI¿ª·¢ÈËÔ±ºÍÑо¿ÈËÔ±ÇÃÏìÁ˾¯ÖÓ £¬ÌáÐÑËûÃDZØÐëÈ·±£ÕâЩϵͳµÄÄþ¾²ÐÔºÍÍêÕûÐÔ £¬Ëæ×ÅAI¼¼ÊõµÄ²»Í£½ø²½ºÍ¸üÉîÈëµØÈÚÈëÎÒÃÇÉú»îµÄ¸÷¸ö·½Ãæ £¬ÕâÒ»µã±äµÃÓÈΪÖØÒª ¡£


https://cybersecuritynews.com/researchers-warn-of-ai-image-generators/#google_vignette


4. ¼ÙðAI±à¼­Æ÷Íƶ¯ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þѬȾWindowsºÍmacOS


11ÔÂ16ÈÕ £¬½üÆÚ¼ÙðAIͼÏñºÍÊÓƵÉú³ÉÆ÷³ÉΪÍøÂç¹¥»÷µÄÐÂÊֶΠ£¬Í¨¹ýÀûÓÃLumma Stealer£¨Õë¶ÔWindows£©ºÍAMOS£¨Õë¶ÔmacOS£©ÕâÁ½ÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ £¬Ñ¬È¾Óû§É豸²¢ÇÔÈ¡¼ÓÃÜ»õ±ÒÇ®°ü¡¢Æ¾¾Ý¡¢ÃÜÂë¡¢ÐÅÓÿ¨ÐÅÏ¢¼°ä¯ÀÀÀúÊ·µÈÃô¸ÐÊý¾Ý ¡£ÕâЩ±»ÇÔÈ¡µÄÊý¾Ý»á±»´ò°ü·¢Ëͻع¥»÷Õß £¬ÓÃÓÚ½øÒ»²½¹¥»÷»òÔÚºÚÊÐÉϳöÊÛ ¡£ÍøÂçÄþ¾²Ñо¿Ô±·¢ÏÖ £¬¹¥»÷Õß´´½¨ÁËð³äEditPro AI±à¼­Æ÷µÄÐé¼ÙÍøÕ¾ £¬Í¨¹ýËÑË÷½á¹ûºÍ¹ã¸æÍƹãÉî¶ÈαÔìµÄÕþÖÎÊÓƵ £¬ÓÕµ¼Óû§ÏÂÔØαװ³ÉEditProAIÓ¦Ó÷¨Ê½µÄ¶ñÒâÈí¼þ ¡£WindowsºÍmacOSÓû§·Ö±ð»áÊÕµ½ÃûΪ¡°Edit-ProAI-Setup-newest_release.exe¡±ºÍ¡°EditProAi_v.4.36.dmg¡±µÄÎļþ ¡£ÕâЩÎļþÓÉÇÔÈ¡µÄ´úÂëÇ©ÃûÖ¤ÊéÇ©Ãû £¬²¢Í¨¹ýÌض¨Ãæ°å·¢Ëͱ»µÁÊý¾Ý ¡£ÍøÂçÄþ¾²×¨¼Ò½¨Òé £¬ÈôÔøÏÂÔظ÷¨Ê½ £¬Ó¦Á¢¼´ÖØÖÃËùÓÐÃÜÂë²¢ÆôÓöàÒòËØÉí·ÝÑéÖ¤ ¡£


https://www.bleepingcomputer.com/news/security/fake-ai-video-generators-infect-windows-macos-with-infostealers/


5. ÃÀµÖѺ´û¿î»ú¹¹ÔâÊý¾Ýй¶ £¬17Íò¿Í»§SSNµÈÐÅÏ¢±»µÁ


11ÔÂ15ÈÕ £¬ÃÀ¹úÉçÇøµÖѺ´û¿îÊÜÀí¹«Ë¾£¨ÒÔAnnieMac Home MortgageÃûÒåÔËÓª£©ÔâÓöÊý¾Ýй¶Ê¼þ £¬Ò»ÃûÈëÇÖÕßÔÚ8ÔÂ21ÈÕÖÁ23ÈÕÆÚ¼äÈëÇÖÆäϵͳ £¬ÇÔÈ¡ÁË171,000Ãû¿Í»§µÄ¸öÈËÊý¾Ý £¬°üÂÞÐÕÃûºÍÉç»áÄþ¾²ºÅÂë(SSN) ¡£¾¡¹ÜĿǰûÓÐÖ¤¾Ý±íÃ÷ÕâЩÊý¾ÝÒÑÔÚ°µÍøÉϱ»ÀÄÓà £¬µ«AnnieMacÒѽÓÄÉÌرðÄþ¾²´ëÊ©·ÀÖ¹ÀàËÆʼþÔٴη¢Éú £¬²¢ÏòÊÜÓ°Ïì¿Í»§Ìṩ12¸öÔµÄÐÅÓüà¿ØºÍÉí·Ý͵ÇÔ±£»¤ ¡£¸Ã»ú¹¹Ìṩ¶àÖÖµÖѺ´û¿î²úÎï £¬°üÂÞÕë¶ÔµÍÊÕÈë»òÐÅÓÃÆÀ¼¶½Ï²î¹º·¿Õߵļƻ® £¬ÈçOneUP¼Æ»®ÔÊÐíÂò¼Ò½öÓÃ1%µÄÊ׸¶¹º·¿ ¡£Óë¸ü¹ã·ºµÄÊý¾Ýй¶Ïà±È £¬´Ë´Î鶵ÄÊý¾ÝÀàÐÍÏà¶Ô½ÏÉÙ £¬µ«SSNµÄй¶ÈÔ´æÔÚ·çÏÕ £¬¿ÉÄÜË𺦿ͻ§µÄÐÅÓÃÆÀ·Ö £¬ÌرðÊÇÄÇЩÐÅÓÃÆÀ·ÖÔ­À´¾ÍÒ»°ãµÄ¿Í»§ ¡£


https://www.theregister.com/2024/11/15/anniemac_data_breach/


6. GeoVision±¨·ÏÉ豸ÁãÈÕ©¶´ÔâÀûÓà £¬½©Ê¬ÍøÂçÈëÇÖ·çÏÕ¾çÔö


11ÔÂ15ÈÕ £¬¶ñÒâÈí¼þ½©Ê¬ÍøÂçÕýÔÚÀûÓÃGeoVision±¨·ÏÉ豸ÖеĸßΣÁãÈÕ©¶´CVE-2024-11120½øÐÐÈëÇÖ £¬²¢ÕÐļÕâЩÉ豸½øÐпÉÄܵÄDDoS¹¥»÷»ò¼ÓÃÜÍÚ¾ò ¡£¸Ã©¶´ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚÉ豸ÉÏÖ´ÐÐÈÎÒâϵͳÃüÁî £¬ÒÑÓ°Ïì¶à¿î²»ÔÙÊܹ©Ó¦ÉÌÖ§³ÖµÄGeoVisionÉ豸ÐͺŠ¡£¾ÝÍþв¼à¿Øƽ̨Shadowserver Foundation³ÂËß £¬Ô¼ÓÐ17,000̨GeoVisionÉ豸ÔÚÏß̻¶ £¬Ò×Êܹ¥»÷ £¬ÆäÖдó¶àÊýλÓÚÃÀ¹ú ¡£¸Ã½©Ê¬ÍøÂçÒÉΪMiraiµÄ±äÖÖ ¡£Èç¹û·¢ÏÖÉ豸¹ýÈÈ¡¢ÔËÐлºÂý¡¢ÎÞÏìÓ¦»òÅäÖñ»¸ü¸ÄµÈ¼£Ïó £¬½¨ÒéÖØÖÃÉ豸¡¢¸ü¸ÄÃÜÂë¡¢¹Ø±ÕÔ¶³Ì·ÃÎʲ¢ÖÃÓÚ·À»ðǽºó ¡£ÀíÏëÇé¿öÏ £¬Ó¦Ìæ»»ÕâЩÉ豸 £¬Èô²»ÐÐÄÜ £¬ÔòÓ¦¸ôÀë²¢ÃÜÇмà¿Ø ¡£


https://www.bleepingcomputer.com/news/security/botnet-exploits-geovision-zero-day-to-install-mirai-malware/