Start-Rite¶ùͯЬÖÆÔìÉÌÔÙ´ÎÔâÓö¿Í»§Ö§¸¶ÐÅϢй¶Ê¼þ
Ðû²¼Ê±¼ä 2024-11-1811ÔÂ14ÈÕ£¬¶ùͯЬÖÆÔìÉÌStart-Rite½üÈÕÔâÓöÁËÉæ¼°¿Í»§Ö§¸¶¿¨ÏêϸÐÅÏ¢µÄÑÏÖØÄþ¾²Ê¼þ£¬ÕâÊǸù«Ë¾ÔÚ¹ýÈ¥°ËÄêÖеڶþ´Î·¢Éú´ËÀàÖØ´óʧÎ󡣾ݷ¢Ë͸ø¿Í»§µÄ֪ͨ³Æ£¬ÈëÇÖʼþ·¢ÉúÔÚ10ÔÂ14ÈÕÖÁ11ÔÂ7ÈÕÖ®¼ä£¬¿ÉÄÜ鶵ÄÐÅÏ¢°üÂÞÖ§¸¶¿¨ÉϵĿͻ§ÐÕÃû¡¢¿¨×¢²áµØÖ·¡¢¿¨ºÅ¡¢ÓÐЧÆںͿ¨ÑéÖ¤Öµ(CVV)¡£Start-Rite½¨Òé¿Í»§ÁªÏµÒøÐлòÐÅÓÿ¨ÌṩÉÌÍ£Óò¢¸ü»»ÐÅÓÿ¨£¬²¢±£³Ö¾¯Ìè¼ì²é¶ÔÕ˵¥¡£¸Ã¹«Ë¾ÒÑÏòÓ¢¹úÊý¾Ý±£»¤¼à¹Ü»ú¹¹ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©³ÂËß´ËÊ£¬²¢ÌåÏÖ½«È«Á¦ÅäºÏ¾¯·½ÊÂÇé¡£¾¡¹ÜStart-RiteÏò¡¶The Register¡·Ö¤ÊµÁ˴˴ι¥»÷£¬µ«ÉÐδ¹ûÈ»ÈÏ¿É´ËÊ¡£Ó¦ÓÃÄþ¾²×¨¼ÒÌåÏÖ£¬´ËʼþÒý·¢Á˶ÔStart-RiteÄþ¾²Ì¬ÊƵÄÖÊÒÉ£¬ÒÔ¼°Êý¾ÝÈçºÎ±»ÇÔÈ¡µÄÎÊÌâ¡£ICO·¢ÑÔÈËÔÚ±¨µÀºó͸¶£¬Start-RiteÒÑÏòÆäͨ±¨ÁËÕâһʼþ£¬²¢ÕýÔÚÆÀ¹ÀËùÌṩµÄÐÅÏ¢¡£
https://www.theregister.com/2024/11/14/smartrite_breach/
2. CISA¾¯¸æ£ºPalo Alto Networks Expedition¶à¸ö©¶´±»»ý¼«ÀûÓÃ
11ÔÂ15ÈÕ£¬ÃÀ¹úÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£¨CISA£©Ðû²¼¾¯¸æ£¬Ö¸³öÓ°ÏìPalo Alto Networks ExpeditionµÄÁ½¸öЩ¶´CVE-2024-9463ºÍCVE-2024-9465ÕýÔÚ±»»ý¼«ÀûÓá£ÕâÁ½¸ö©¶´·Ö±ðÉæ¼°ÃüÁî×¢ÈëºÍSQL×¢È룬CVSSÆÀ·Ö·Ö±ð¸ß´ï9.9ºÍ9.3£¬Èô±»ÀÖ³ÉÀûÓ㬹¥»÷Õß¿ÉÔÚExpeditionǨÒƹ¤¾ßÖÐÒÔrootÉí·ÝÖ´ÐÐÈÎÒâÃüÁî»òй¶Êý¾Ý¿âÄÚÈÝ£¬½ø¶ø¿ÉÄܵ¼ÖÂPAN-OS·À»ðǽµÄÓû§Ãû¡¢ÃÜÂë¡¢ÅäÖúÍAPIÃÜԿй¶£¬»òÔÚÒ×Êܹ¥»÷µÄϵͳÉÏ´´½¨ºÍ¶ÁÈ¡Îļþ¡£CISAÒѽ«ÕâЩ©¶´ÄÉÈëÒÑÖª±»ÀûÓõÄ©¶´Ä¿Â¼£¬²¢ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿ÃÅ»ú¹¹ÔÚ2024Äê12ÔÂ5ÈÕÇ°Ó¦ÓÃÐëÒª¸üС£Palo Alto NetworksÔÚ2024Äê10ÔÂ9ÈÕÐû²¼µÄÄþ¾²¸üÐÂÖÐÐÞ¸´ÁËÕâЩ©¶´£¬²¢È·ÈÏÊÕµ½CISA³ÂËß³ÆÕâЩ©¶´ÕýÔÚ±»ÀûÓᣴËÍ⣬һÖÜÇ°CISA»¹Í¨±¨ÁËÁíÒ»¸öÓ°ÏìExpeditionµÄÑÏÖØ©¶´CVE-2024-5910ÕýÔÚ±»ÀûÓ㬸鶴¿Éµ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄÔ¶³ÌÃüÁîÖ´ÐУ¬Õë¶Ô»¥ÁªÍøÉÏ̻¶µÄ·À»ðǽ¹ÜÀí½Ó¿Ú¡£
https://thehackernews.com/2024/11/cisa-flags-critical-palo-alto-network.html
3. RecraftÄ£ÐÍ´æÄþ¾²Â©¶´£ºÎÞÒâÖÐй¶Ãô¸ÐϵͳָÁîÒý·¢¹Ø×¢
11ÔÂ14ÈÕ£¬¾ÝCyber Security News±¨µÀ£¬Ñо¿ÈËÔ±Ôڸ߼¶È˹¤ÖÇÄÜͼÏñÉú³ÉÄ£ÐÍÖз¢ÏÖÁËDZÔÚµÄÄþ¾²Â©¶´£¬ÌرðÊÇÔÚRecraftÄ£ÐÍÖУ¬¸ÃÄ£ÐÍÔÚÎı¾µ½Í¼Æ¬ÅÅÐаñÉÏ´¦ÓÚÁìÏÈְλ¡£Recraft½ÓÄÉÁ½¼¶¼Ü¹¹£¬½áºÏÁË´óÐÍÓïÑÔÄ£ÐͺÍÀ©É¢Ä£ÐÍ£¬Äܹ»´¦ÖÃÅÓ´ó²éѯ²¢Éú³É¸ü׼ȷ¡¢¸üÄܸÐÖªÉÏÏÂÎĵÄͼÏñ¡£È»¶ø£¬Ñо¿ÈËÔ±·¢ÏÖ£¬Í¨¹ýijЩÌض¨Ìáʾ£¬¿ÉÒÔÓÕʹRecraftй¶²¿ÃÅÄÚ²¿Ö¸Á°üÂÞϵͳÌáʾƬ¶ÎºÍ¾ßÌåÖ¸µ¼´óÄ£ÐÍÐÐΪµÄ˵Ã÷¡£ÕâЩ鶵ÄÖ¸Áî°üÂÞÃèÊö·ç¸ñ¡¢ÎïÌåºÍÈËÎïµÄÏêϸÃèÊö¡¢ÃèÊöÐÔ¾ä×Ó¡¢¹¹Í¼Ï¸½ÚÒÔ¼°ÖÆֹʹÓõĴÊÓïµÈ¡£ÕâÖÖÎÞÒâÖÐй¶ϵͳÌáʾµÄÐÐΪÒý·¢ÁËÈËÃǶÔÈ˹¤ÖÇÄÜÄ£ÐÍÄþ¾²ÐÔºÍÒþ˽ÐԵĵ£ÓÇ¡£Èç¹û¶ñÒâÐÐΪÕßÄܹ»ÌáÈ¡ÕâЩÃô¸ÐÖ¸ÁËûÃÇ¿ÉÄÜ»áÀûÓÃϵͳ¡¢ÈƹýÄþ¾²´ëÊ©»òÉîÈëÁ˽âרÓеÄÈ˹¤ÖÇÄܼ¼Êõ¡£Òò´Ë£¬ÕâһʼþΪAI¿ª·¢ÈËÔ±ºÍÑо¿ÈËÔ±ÇÃÏìÁ˾¯ÖÓ£¬ÌáÐÑËûÃDZØÐëÈ·±£ÕâЩϵͳµÄÄþ¾²ÐÔºÍÍêÕûÐÔ£¬Ëæ×ÅAI¼¼ÊõµÄ²»Í£½ø²½ºÍ¸üÉîÈëµØÈÚÈëÎÒÃÇÉú»îµÄ¸÷¸ö·½Ã棬ÕâÒ»µã±äµÃÓÈΪÖØÒª¡£
https://cybersecuritynews.com/researchers-warn-of-ai-image-generators/#google_vignette
4. ¼ÙðAI±à¼Æ÷Íƶ¯ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þѬȾWindowsºÍmacOS
11ÔÂ16ÈÕ£¬½üÆÚ¼ÙðAIͼÏñºÍÊÓƵÉú³ÉÆ÷³ÉΪÍøÂç¹¥»÷µÄÐÂÊֶΣ¬Í¨¹ýÀûÓÃLumma Stealer£¨Õë¶ÔWindows£©ºÍAMOS£¨Õë¶ÔmacOS£©ÕâÁ½ÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬Ñ¬È¾Óû§É豸²¢ÇÔÈ¡¼ÓÃÜ»õ±ÒÇ®°ü¡¢Æ¾¾Ý¡¢ÃÜÂë¡¢ÐÅÓÿ¨ÐÅÏ¢¼°ä¯ÀÀÀúÊ·µÈÃô¸ÐÊý¾Ý¡£ÕâЩ±»ÇÔÈ¡µÄÊý¾Ý»á±»´ò°ü·¢Ëͻع¥»÷Õߣ¬ÓÃÓÚ½øÒ»²½¹¥»÷»òÔÚºÚÊÐÉϳöÊÛ¡£ÍøÂçÄþ¾²Ñо¿Ô±·¢ÏÖ£¬¹¥»÷Õß´´½¨ÁËð³äEditPro AI±à¼Æ÷µÄÐé¼ÙÍøÕ¾£¬Í¨¹ýËÑË÷½á¹ûºÍ¹ã¸æÍƹãÉî¶ÈαÔìµÄÕþÖÎÊÓƵ£¬ÓÕµ¼Óû§ÏÂÔØαװ³ÉEditProAIÓ¦Ó÷¨Ê½µÄ¶ñÒâÈí¼þ¡£WindowsºÍmacOSÓû§·Ö±ð»áÊÕµ½ÃûΪ¡°Edit-ProAI-Setup-newest_release.exe¡±ºÍ¡°EditProAi_v.4.36.dmg¡±µÄÎļþ¡£ÕâЩÎļþÓÉÇÔÈ¡µÄ´úÂëÇ©ÃûÖ¤ÊéÇ©Ãû£¬²¢Í¨¹ýÌض¨Ãæ°å·¢Ëͱ»µÁÊý¾Ý¡£ÍøÂçÄþ¾²×¨¼Ò½¨Ò飬ÈôÔøÏÂÔظ÷¨Ê½£¬Ó¦Á¢¼´ÖØÖÃËùÓÐÃÜÂë²¢ÆôÓöàÒòËØÉí·ÝÑéÖ¤¡£
https://www.bleepingcomputer.com/news/security/fake-ai-video-generators-infect-windows-macos-with-infostealers/
5. ÃÀµÖѺ´û¿î»ú¹¹ÔâÊý¾Ýй¶£¬17Íò¿Í»§SSNµÈÐÅÏ¢±»µÁ
11ÔÂ15ÈÕ£¬ÃÀ¹úÉçÇøµÖѺ´û¿îÊÜÀí¹«Ë¾£¨ÒÔAnnieMac Home MortgageÃûÒåÔËÓª£©ÔâÓöÊý¾Ýй¶Ê¼þ£¬Ò»ÃûÈëÇÖÕßÔÚ8ÔÂ21ÈÕÖÁ23ÈÕÆÚ¼äÈëÇÖÆäϵͳ£¬ÇÔÈ¡ÁË171,000Ãû¿Í»§µÄ¸öÈËÊý¾Ý£¬°üÂÞÐÕÃûºÍÉç»áÄþ¾²ºÅÂë(SSN)¡£¾¡¹ÜĿǰûÓÐÖ¤¾Ý±íÃ÷ÕâЩÊý¾ÝÒÑÔÚ°µÍøÉϱ»ÀÄÓ㬵«AnnieMacÒѽÓÄÉÌرðÄþ¾²´ëÊ©·ÀÖ¹ÀàËÆʼþÔٴη¢Éú£¬²¢ÏòÊÜÓ°Ïì¿Í»§Ìṩ12¸öÔµÄÐÅÓüà¿ØºÍÉí·Ý͵ÇÔ±£»¤¡£¸Ã»ú¹¹Ìṩ¶àÖÖµÖѺ´û¿î²úÎ°üÂÞÕë¶ÔµÍÊÕÈë»òÐÅÓÃÆÀ¼¶½Ï²î¹º·¿Õߵļƻ®£¬ÈçOneUP¼Æ»®ÔÊÐíÂò¼Ò½öÓÃ1%µÄÊ׸¶¹º·¿¡£Óë¸ü¹ã·ºµÄÊý¾Ýй¶Ïà±È£¬´Ë´Î鶵ÄÊý¾ÝÀàÐÍÏà¶Ô½ÏÉÙ£¬µ«SSNµÄй¶ÈÔ´æÔÚ·çÏÕ£¬¿ÉÄÜË𺦿ͻ§µÄÐÅÓÃÆÀ·Ö£¬ÌرðÊÇÄÇЩÐÅÓÃÆÀ·ÖÔÀ´¾ÍÒ»°ãµÄ¿Í»§¡£
https://www.theregister.com/2024/11/15/anniemac_data_breach/
6. GeoVision±¨·ÏÉ豸ÁãÈÕ©¶´ÔâÀûÓ㬽©Ê¬ÍøÂçÈëÇÖ·çÏÕ¾çÔö
11ÔÂ15ÈÕ£¬¶ñÒâÈí¼þ½©Ê¬ÍøÂçÕýÔÚÀûÓÃGeoVision±¨·ÏÉ豸ÖеĸßΣÁãÈÕ©¶´CVE-2024-11120½øÐÐÈëÇÖ£¬²¢ÕÐļÕâЩÉ豸½øÐпÉÄܵÄDDoS¹¥»÷»ò¼ÓÃÜÍÚ¾ò¡£¸Ã©¶´ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚÉ豸ÉÏÖ´ÐÐÈÎÒâϵͳÃüÁÒÑÓ°Ïì¶à¿î²»ÔÙÊܹ©Ó¦ÉÌÖ§³ÖµÄGeoVisionÉ豸Ðͺš£¾ÝÍþв¼à¿Øƽ̨Shadowserver Foundation³ÂËߣ¬Ô¼ÓÐ17,000̨GeoVisionÉ豸ÔÚÏß̻¶£¬Ò×Êܹ¥»÷£¬ÆäÖдó¶àÊýλÓÚÃÀ¹ú¡£¸Ã½©Ê¬ÍøÂçÒÉΪMiraiµÄ±äÖÖ¡£Èç¹û·¢ÏÖÉ豸¹ýÈÈ¡¢ÔËÐлºÂý¡¢ÎÞÏìÓ¦»òÅäÖñ»¸ü¸ÄµÈ¼£Ï󣬽¨ÒéÖØÖÃÉ豸¡¢¸ü¸ÄÃÜÂë¡¢¹Ø±ÕÔ¶³Ì·ÃÎʲ¢ÖÃÓÚ·À»ðǽºó¡£ÀíÏëÇé¿öÏ£¬Ó¦Ìæ»»ÕâЩÉ豸£¬Èô²»ÐÐÄÜ£¬ÔòÓ¦¸ôÀë²¢ÃÜÇмà¿Ø¡£
https://www.bleepingcomputer.com/news/security/botnet-exploits-geovision-zero-day-to-install-mirai-malware/