×êÑÐÈËÔ±·¢ÏÖ4Íò¶à¸ö·ÓÉÆ÷ºÍÎïÁªÉ豸×齨µÄ½©Ê¬ÍøÂç
°ä²¼¹¦·ò 2024-03-283ÔÂ26ÈÕ£¬¸Ã·ÓÉÆ÷½©Ê¬ÍøÂçÓÚ 2014 Äê³õ´Î³öÏÖ£¬Ò»ÏòÔÚ͵͵ÔËÐУ¬Í¬Ê±ÔÚ 2024 Äê 1 ÔÂºÍ 2 ÔÂÔö³¤µ½À´×Ô 88 ¸ö¹ú¶ÈµÄ 40000 ¶à¸ö½©Ê¬ÍøÂç¡£ÕâЩ»úеÈËÖеĴóÎÞÊý¶¼±»ÓÃ×÷³ôÃûÔ¶ÑïµÄ¡¢Õë¶ÔÍøÂç·¸×ïµÄ´úÀí·þÎñµÄ»ù´¡£¬¸Ã·þÎñ±»³ÆÎª Faceless¡£Black Lotus Labs µÄ×êÑÐÈËÔ±°µÊ¾£¬ËûÃÇÈ·¶¨Á˸Ã×éÖ¯´úÀí·þÎñµÄÂ߼ͼ£¬ÆäÖÐÔ̺¬ 2024 Äê 3 ÔµÚÒ»ÖÜÆðÍ·µÄÒ»Ïî»î¶¯£¬¸Ã»î¶¯ÔÚ²»µ½ 72 Ó×ʱÄÚÕë¶Ô 6000 ¶à¸ö»ªË¶Â·ÓÉÆ÷½øÐÐÁ˹¥»÷¡£×êÑÐÈËÔ±ÒÔΪ£¬È«ÇòÁìÓòÄÚÕë¶Ô±¨·ÏÁÏÁªÍøÉ豸µÄ¹¥»÷ÊÇÓÐÒâµÄ£¬ÓÉÓÚËüÃDz»ÔÙÊܵ½Ôì×÷É̵ÄÖ§³Ö£¬²¢ÇÒÒÑÖªµÄ°²È«·ì϶ҲûÓеõ½½¨¸´¡£
https://www.securityweek.com/researchers-discover-40000-strong-eol-router-iot-botnet/
2. MispaduÒøÐÐľÂíÀ©´óÓ°ÏìÁìÓò£¬¶Ô׼ŷÖÞ¼°ÆäËüµØÓò
3ÔÂ26ÈÕ£¬Mispadu ÒøÐÐľÂíÒò¹¥»÷À¶¡ÃÀÖÞ¹ú¶È¶ø³ôÃûÔ¶ÑĿǰÔÚ»ý¼«À©´óÆäÖ¸±ê¡£×´Ì¬°²È«³¢ÊÔÊÒÒÑ·¢ÏÖÕû¸öÅ·ÖÞµÄ Mispadu »î¶¯¼¤Ôö£¬±ê־ȡÍþвÁìÓò²úÉúÁËÁîÈËÓÇÓôµÄת±ä¡£Mispadu µÄ×îй¥»÷²»ÊÜÐÐÒµÏÞ¶È¡£´ÓÆû³µÔì×÷¾ÞÍ·ËÄ´¦ÖÃÃô¸ÐÊý¾ÝµÄÂÉʦÊÂÎñËù£¬¸ÃľÂí¸øÃ¿¸öÒÀÀµÔÚÏßÒøÐлòÃô¸ÐµÇ¼ʹ´¦µÄ×éÖ¯´øÀ´·çÏÕ¡£Ä«Î÷¸çÊÇ Mispadu »î¶¯×î³õµÄδ²£¬ÒÀÈ»ÊÇÒ»¸öÖØÒªÖ¸±ê£¬µ«Íþв´Ë¿ÌÔ¶Ô¶³¬³öÁË×î³õµÄÌìǵ¡£Mispaduѡȡ¶à½×¶Î¹¥»÷Á´£¬¶ÔÆä֮ǰµÄ°æ±¾½øÐÐÁËÆæÃîµÄ¸Ä½ø¡£³õʼ½×¶ÎÉæ¼°·Ö·¢ÍøÂç´¹µöµç×ÓÓʼþ£¬Ã¿·âµç×ÓÓʼþ¶¼Ô̺¬Ò»¸ö¼Ù×°³É·¢Æ±µÄ PDF¡£ÊÜ¡°²é¿´ÆëÈ«·¢Æ±¡±ÒýÓÕµÄÊܺ¦Õ߻ᱻÊèµ¼ÏÂÔØ ZIP Îļþ£¬´Ó¶øÆô¶¯Ä¾ÂíµÄÉøÈë¹ý³Ì¡£
https://securityonline.info/mispadu-banking-trojan-expands-reach-targeting-europe-and-beyond/
3. ÀÕË÷Èí¼þ Agenda µÄбäÖÖ ¶Ô×¼ VMware ESXi ·þÎñÆ÷
3ÔÂ27ÈÕ£¬Agenda£¨±ðÃû Qilin ºÍ Water Galura£©ÓÚ 2022 Äê³õ´Î±»·¢ÏÖ¡£ËüµÄµÚÒ»¸ö»ùÓÚ Golang µÄÀÕË÷Èí¼þ±»ÓÃÓÚÕë¶Ô¸÷ÀàÖ¸±ê£º´Ó¼ÓÄô󵽸çÂ×±ÈÑǺÍÓ¡¶ÈÄáÎ÷ÑǵÄÒ½ÁƱ£½¡¡¢Ôì×÷ºÍ½ÌÓýÁìÓò¡£µ½ 2022 Äêµ×£¬Agenda µÄËùÓÐÕßÓÃRust ³ÁдÁËÆä¶ñÒâÈí¼þ£¬Rust¶ÔÓÚµ«Ô¸¿ç²Ù×÷ϵͳ´«²¼Æä¹¤×÷µÄ¶ñÒâÈí¼þ×÷ÕßÀ´ËµÊÇÒ»ÖÖÓÐЧµÄ˵»°¡£Í¨¹ý Rust ±äÌ壬Agenda ¿ÉÄÜ·çÏÕ½ðÈÚ¡¢Ë¾·¨¡¢¹¹ÖþµÈÁìÓòµÄ×éÖ¯£¬ÖØÒªÊÇÔÚÃÀ¹ú£¬µ«Ò²ÔÚ°¢¸ùÍ¢¡¢°Ä´óÀûÑÇ¡¢Ì©¹úºÍÆäËû´¦Ëù¡£×î½ü£¬Ç÷Ïò¿Æ¼¼ÔÚÒ°±í·¢ÏÖÁËÒ»ÖÖÐ嵀 Agenda ÀÕË÷Èí¼þ±äÖÖ¡£Õâ¸ö»ùÓÚ Rust µÄ×îа汾½¨ÉèÁ˸÷ÀàÐÂÖ°ÄܺÍÒþÐλúÔ죬²¢½«ÆäÖ¸±êÖ±½Ó¶Ô×¼ÁË VMware vCenter ºÍ ESXi ·þÎñÆ÷¡£
https://www.darkreading.com/cloud-security/agenda-ransomware-vmware-esxi-servers
4. Giant Tiger °µÊ¾¿Í»§Êý¾ÝÒòµÚÈý·½Î¥¹æ¶øÐ¹Â¶
3ÔÂ25ÈÕ£¬ÕÛ¿ÛÁãÊÛÉÌ Giant Tiger °µÊ¾£¬Æä²¿Ãſͻ§µÄÁªÏµÐÅÏ¢ÔÚÓëÆäʹÓõĵÚÈý·½¹©¸øÉÌÓйصġ°ÊÂÎñ¡±ÖÐÔ⵽й¶¡£Õâ¼Ò×ܲ¿Î»ÓÚä×Ì«»ªµÄÕÛ¿ÛÁãÊÛÉ̽²»°È˰µÊ¾£¬²»»áй©¹©¸øÉ̵ÄÃû³Æ£¬µ«°µÊ¾ Giant Tiger ʹÓøù«Ë¾À´ÖÎÀíÆä¿Í»§¹µÍ¨ºÍ»¥¶¯¡£¸ÃÁãÊÛÉÌÔÚ¸ø¿Í»§µÄµç×ÓÓʼþÖÐд·£¬¸ÃÁãÊÛÉÌÓÚ 3 Ô 4 ÈÕ³õ´Î»ñϤ¸Ã°²È«ÊÂÎñ£¬²¢ÓÚ 3 Ô 15 Èյóö½áÂÛ£¬¿Í»§ÐÅÏ¢Êܵ½Ó°Ïì¡£ÊÜÓ°ÏìµÄÐÅÏ¢Òò¿Í»§¶øÒì¡£ÆäÖÐÔ̺¬¶©ÔÄ Giant Tiger µç×ÓÓʼþµÄÈ˵ÄÐÕÃûºÍµç×ÓÓʼþµØÖ·¡£Ò»Ð©ÔÚÏß϶©µ¥ËÍ»õÉÏÃŵĹ˿ͿÉÄÜÕ¼ÓÐÒ»ÑùµÄÐÅÏ¢ÒÔ¼°ËûÃǵĽÖ·µØÖ·¡£½²»°È˰µÊ¾£¬ÊÜ·ì϶ӰÏìµÄ¿Í»§ÊýÁ¿Óëÿ¸ö´òËãÓйأ¬µ«Ã»Óиø³ö¾ßÌåÊý×Ö¡£
https://www.cbc.ca/news/business/giant-tiger-customer-data-breach-1.7154572?&web_view=true
5. µÂ¹ú 1.7Íò¸ö Microsoft Exchange ·þÎñÆ÷Ò×Êܵ½¹¥»÷
3ÔÂ26ÈÕ£¬µÂ¹úÁª¹úÐÅÏ¢°²È«°ì¹«ÊÒ (BSI)ÖÒ¸æ³Æ£¬µÂ¹úԼĪ 45000 ̨Äܹ»²»ÊÜÏ޶ȵشӻ¥ÁªÍø½Ó¼ûµÄ Microsoft Exchange ·þÎñÆ÷£¬Ô¼ÄªÓÐ 12%ÒѾ²»ÔÙΪÆäÌṩ°²È«¸üС±¡£´Ë±í£¬ËùÓÐÃæÏò»¥ÁªÍøµÄ·þÎñÆ÷ÖÐÔ¼ÓÐ 25% ÔËÐÐ Exchange 2016 ºÍ 2019£¬µ«Ã»ÓÐ×°ÖÃ×îÐµİ²È«²¹¶¡¡£BSI ²»°²¹¥»÷Õß»áͨ¹ýÀûÓà CVE-2024-21410 À´·ÛËéÕâЩ·þÎñÆ÷£¬CVE-2024-21410 ÊÇÒ»¸öÑϳÁµÄÌØÈ¨ÌáÉý·ì϶£¬ÔÊÐí¹¥»÷ÕßÏàʶָ±êÓû§µÄ NTLM Í´´¦²¢¡°Öм̡¹ØâЩʹ´¦£¬ÒÔ½«×Ô¼º×÷ΪÓû§ÏòÒ×Êܹ¥»÷µÄ Exchange Server ½øÐÐÉí·ÝÑéÖ¤¡£Î¢Èí°µÊ¾£¬Ëü¡°ÒѾÒâʶµ½¸Ã·ì϶±»ÀûÓá±£¬²¢ÇÒËæºóÒѽ«ÆäÔö³¤µ½ CISA µÄÒÑÖª±»ÀûÓ÷ì϶Ŀ¼ÖС£
https://www.helpnetsecurity.com/2024/03/26/vulnerable-microsoft-exchange-servers/
6. ¶à¸ö Apple ²úÆ·ÖдæÔÚËÁÒâ´úÂëÖ´Ðзì϶
3ÔÂ26ÈÕ£¬¶à¸ö Apple ²úÆ·Öз¢ÏÖÁËÒ»¸ö·ì϶ (CVE-2024-1580)£¬¸Ã·ì϶¿ÉÄܵ¼ÖÂËÁÒâ´úÂëÖ´ÐС£³É¹¦ÀûÓô˷ì϶¿ÉÄܵ¼ÖÂÔڵǼÓû§µÄ¸ßµÍÎÄÖÐÖ´ÐÐËÁÒâ´úÂ롣ƾ¾ÝÓëÓû§¹ØÁªµÄȨÏÞ£¬¹¥»÷ÕßÄܹ»×°Ö÷¨Ê½£»²é¿´¡¢¸ü¸Ä»òɾ³ýÊý¾Ý£»»ò´´½¨ÓµÓÐÆëÈ«Óû§È¨ÏÞµÄÐÂÕÊ»§¡£ÓëÓµÓÐÖÎÀíÓû§È¨ÏÞµÄÓû§Ïà±È£¬ÆäÕÊ»§ÅäÖÃΪÔÚϵͳÉÏÕ¼ÓнϺ±Óû§È¨ÏÞµÄÓû§Êܵ½µÄÓ°Ïì¿ÉÄܸüÓס£Ä¿Ç°»¹Ã»ÓйØÓÚ´Ë·ì϶±»´ó¹æÄ£ÀûÓõĻ㱨¡£
https://www.cisecurity.org/advisory/a-vulnerability-in-multiple-apple-products-could-allow-for-arbitrary-code-execution_2024-031


¾©¹«Íø°²±¸11010802024551ºÅ