ºÚ¿ÍÐû³Æ·þÎñÆ÷Ôâµ½ÈëÇÖ£¬µÂÇÚ³ÆÃô¸ÐÊý¾ÝδÊܵ½Íþв
°ä²¼¹¦·ò 2024-09-259ÔÂ24ÈÕ£¬µÂÇÚ¹«Ë¾½üÆÚÔâ·êÁËһ·ÓɳôÃûÔ¶ÑïµÄºÚ¿Í×éÖ¯IntelBrokerÌáÒéµÄÍøÂç¹¥»÷ÊÂÎñ£¬¸ÃºÚ¿ÍÔÚBreachForums·¸×ïÂÛÌÓð»¯ù³ÆÒѳɹ¦»ñÈ¡Á˵ÂÇÚδÍ×ÉÆ·À»¤µÄApache Solr·þÎñÆ÷Éϵġ°ÄÚ²¿Í¨Ñ¶¡±Êý¾Ý¡£¾ÝºÚ¿ÍÃèÊö£¬ÕâЩÊý¾ÝÉæ¼°µç×ÓÓʼþµØÖ·¡¢¹«Ë¾ÄÚ²¿Ô±¹¤¼äµÄͨѶ¼Í¼ÒÔ¼°²¿ÃÅÄÚ²¿ÉèÖã¬ÇÒ¿Éͨ¹ýĬÈÏÍ´´¦ÇáËɽӼû¡£Ö»¹ÜÕâЩÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳¹«¿ª£¬¹©¸¶ÓöȻ§ÏÂÔØ£¬µ«µÂÇÚѸ¿ì×÷³ö»ØÓ¦£¬È·ÈϵÄÈ·²úÉúÁËÊý¾Ýй¶£¬µ«Ç¿µ÷¾µ÷²éºóÈ·ÈÏ£¬Õâ´ÎÊÂÎñ²¢Î´²¨¼°Æä¿Í»§Êý¾Ý»òÆäËûÈκÎÃô¸ÐÐÅÏ¢£¬Òò¶øÓ°Ïì±»ÏÞÔìÔÚÁ˿϶¨ÁìÓòÄÚ¡£µÂÇÚµÄʵʱÉêÃ÷Ö¼ÔÚ°²¸§¹«¼ÒºÍ¿Í»§µÄÓÇÓô£¬Í¬Ê±Í¹ÏÔÁËÆäÔÚÍøÂ簲ȫÁìÓòµÄ¾¯ÌèÐÔºÍÓ¦¶ÔÄÜÁ¦¡£
https://www.securityweek.com/deloitte-says-no-threat-to-sensitive-data-after-hacker-claims-server-breach/
2. Diddy³óÎųɵö¶ü£ºÐÂÐÍPDiddySploit¶ñÒâÈí¼þËÁŰÉ罻ýÌå
9ÔÂ25ÈÕ£¬ÍøÂç·¸×ï·Ö×ÓÕý³Ã»úÀûÓÃSean ¡°Diddy¡± CombsµÄ³óÎÅ£¬´«²¼ÐÂÐͶñÒâÈí¼þPDiddySploit£¬Ö¸±êËø¶¨ÔÚ³ä³âºÃÆæÇÒÎÞ·À±¸µÄÉ罻ýÌåÓû§£¬ÓÈÆäÊÇX.com£¨Ç°Twitter£©Óû§¡£Õâ¿î¶ñÒâÈí¼þÊôÓÚPySilon RATϵÁУ¬ÒÔÆä׳´óµÄÊý¾ÝÇÔÈ¡¡¢¼üÅÌ¼à¿Ø¡¢ÆÁÄ»¼Í¼¼°Ô¶³Ì½ÚÔìÖ°ÄÜÖø³Æ¡£ÍøÂç·¸×ï·Ö×Óͨ¹ýÉÏ´«¼Ù×°³ÉÔ̺¬DiddyÒÑɾ³ýÉ罻ýÌåÌû×ÓµÄÎļþ£¬ÓÕÆÓû§ÏÂÔØ£¬½ø¶øÏ°È¾ÆäÉ豸¡£´ËÀ๥»÷ÀûÓÃÁ˹«¼Ò¶ÔÃûÈ˳óÎÅµÄºÃÆæÉúÀí£¬³ö¸ñÊǵ±³óÎÅÊܵ½Ã½Ìå¸ß¶È¹Ø×¢Ê±£¬Êܺ¦ÕßÍùÍùÄÑÒÔ¿¹¾ÜË÷Çóδ֪ÐÅÏ¢µÄÒýÓÕ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬PDiddySploit²¢·ÇDiddyÓë¶ñÒâÈí¼þ¹ØÁªµÄÊ×Àý£¬º¹ÇàÉÏÓÐÂÅ´ÎÀàËÆÊÂÎñ£¬¾ùÒÔÃûÈËÓйØÄÚÈÝΪµö¶ü¡£Ëæ×ÅPySilon RATµÈ¶ñÒâÈí¼þµÄ²»Ðݽø»¯£¬ÒÔ¼°ÍøÂç·¸×ï·Ö×ӵĵ󻬼¿Á©£¬¹«¼ÒÐèÌá¸ß¾¯Ì裬Ԥ·ÀÈ̼̮æÐijÉÎªÍøÂ簲ȫµÄÈíÀß¡£ÔÚÉ罻ýÌåÉÏä¯ÀÀÈȵ㻰Ìâʱ£¬Î¬³ÖÀíÐÔÅжϣ¬ÉóÉ÷ÏÂÔØ²»Ã÷ÆðÔ´µÄÎļþ£¬ÊDZ£»¤×Ô¼ºÃâÊÜ´ËÀ๥»÷µÄ¹Ø¼ü¡£
https://hackread.com/pdiddysploit-malware-hidden-files-deleted-diddy-posts/
3. AutoCanadaÔ±¹¤Êý¾ÝÒÉÔâHunters InternationalÀÕË÷ÍÅ»ïй¶
9ÔÂ24ÈÕ£¬AutoCanada½üÆÚÔâ·êÁËÒ»³¡ÓÉHunters InternationalÀÕË÷Èí¼þÍÅ»ïÌáÒéµÄÍøÂç¹¥»÷£¬ÖÒ¸æ³ÆÔ±¹¤Êý¾Ý¿ÉÄÜÒÑÔÚ8Ô·ݵĹ¥»÷Öб»Ð¹Â¶¡£Ö»¹Ü¹«Ë¾ÉÐδ·¢ÏÖÕë¶ÔÊÜÓ°ÏìÔ±¹¤µÄڲƻ£¬µ«ÈÔ»ý¼«·¢ËÍ֪ͨÒÔÌáÐÑDZÔÚ·çÏÕ¡£Õâ´Î¹¥»÷ÆÈʹAutoCanada¹Ø¹Ø²¿ÃÅÄÚ²¿ITϵͳ£¬µ¼ÖÂÔËÓªÖжϣ¬Ö»¹ÜÆä66¼Ò¾ÏúµêÒµÎñÈÔÔÚ³ÖÐø£¬µ«²¿Ãſͻ§·þÎñÊܵ½ÑÓÎó¡£Hunters InternationalËæºóÔÚÀÕË÷ÃÅ»§ÉÏÈ·ÈϹ¥»÷£¬²¢Ðû³ÆÇÔÈ¡ÁËÊýTBÊý¾Ý£¬Ô̺¬¸ß¹ÜÐÅÏ¢¡¢²ÆÕþÎļþºÍÈËÁ¦×ÊÔ´Êý¾ÝµÈÃô¸ÐÐÅÏ¢¡£AutoCanadaͨ¹ý°ä²¼³£¼ûÎÊÌâ½â´ðÒ³Ãæ»ØÓ¦¹«¼Ò¹ØÇУ¬Ö¸³ö¼ÓÃÜ·þÎñÆ÷ÄÚÈÝÔÚ¸´ÔºÍ·ÖÎöÖУ¬²¢ÈϿɿÉÄÜÉæ¼°Ô±¹¤Ó×ÎÒÐÅϢй¶¡£ÒÑй¶µÄÔ±¹¤Êý¾ÝÏ꾡£¬Ô̺¬ÐÕÃû¡¢µØÖ·¡¢¹¤×ÊÐÅÏ¢¡¢Éç±£ºÅÂë¼°ÒøÐÐÕ˺ŵÈÃô¸Ð×ÊÁÏ£¬¹«Ë¾Îª´ËÌṩΪÆÚÈýÄêµÄÃâ·ÑÉí·Ý͵ÇÔ±£»¤ºÍÐÅÓþ¼à¿Ø¡£Îª·À±¸½«À´¹¥»÷£¬AutoCanadaÒѲÉȡһϵÁа²È«´ëÊ©£¬Ô̺¬¸ôÀëÊÜϰȾϵͳ¡¢³ÁÖÃÃÜÂë¡¢Ö´ÐÐÍþв¼ì²âºÍÏìӦϵͳ£¬²¢¼ÓǿԱ¹¤ÍøÂ簲ȫÅàѵ¡£
https://www.bleepingcomputer.com/news/security/autocanada-says-ransomware-attack-may-impact-employee-data/
4. CISA¾¯Ê¾Ivanti vTMÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶CVE-2024-7593±»»ý¼«ÀûÓÃ
9ÔÂ24ÈÕ£¬CISA£¨ÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£©×î½ü½ÒʾÁËIvantiÐé¹¹Á÷Á¿ÖÎÀíÆ÷£¨vTM£©ÖеÄÒ»¸öÑϳÁ°²È«·ì϶CVE-2024-7593£¬¸Ã·ì϶ÔÊÐíδ¾ÊÚȨµÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤£¬ÔÚÊÜÓ°ÏìµÄvTMÉ豸ÉÏ´´½¨¶ñÒâÖÎÀíÔ¹ØË»§¡£vTMÊÇIvantiÌṩµÄÀûÓ÷¨Ê½½»¸¶½ÚÔìÆ÷£¬Õƹܹؼü·þÎñµÄ¸ºÔØÆ½ºâºÍÁ÷Á¿ÖÎÀí¡£¸Ã·ì϶ԴÓÚÉí·ÝÑéÖ¤Ëã·¨µÄÃýÎóʵÏÖ£¬Ê¹Ô¶³Ì¹¥»÷Õß¿ÉÄܵÈÏнӼû²¢½ÚÔìÉ豸¡£Ö»¹ÜIvantiÔÚ8ÔÂÒѰ䲼²¹¶¡½¨¸´´ËÎÊÌ⣬µ«CISAÈ·Èϸ÷ì϶Òѱ»×Ô¶¯ÀûÓ㬲¢´¹Î£½«ÆäÁÐÈëÒÑÖª±»ÀûÓ÷ì϶Ŀ¼¡£ÊÜÓ°ÏìµÄÁª¹ú»ú¹¹±»ÒªÇóÔÚ10ÔÂ15ÈÕǰ²ÉÈ¡Ðж¯£¬±£»¤ÆäÍøÂçÖеÄvTMÉ豸¡£´Ë±í£¬CISAÒ²½¨ÒéÈ«Çò˽ÓÐ×éÖ¯ÓÅÏÈ´¦Öô˷ì϶£¬ÒÔ·À±¸Ç±ÔÚ¹¥»÷¡£¼øÓÚIvantiÔÚÈ«ÇòÕ¼ÓÐÖØ´óµÄºÏ×÷ͬ°éÍøÂçºÍÓû§»ù´¡£¬Õâ´Î·ì϶µÄ¿í·ºÓ°Ïì²»ÈݺöÊÓ¡£
https://www.bleepingcomputer.com/news/security/critical-ivanti-vtm-auth-bypass-bug-now-exploited-in-attacks/
5. ÈøË¹Öݰ¢¿ÏÉ«³ÇË®´¦ÖÃÉèÊ©ÔâÍøÂç¹¥»÷£¬ÏµÍ³ÔÝתÊÖ¶¯²Ù×÷
9ÔÂ24ÈÕ£¬ÈøË¹Öݰ¢¿ÏÉ«³ÇµÄË®´¦ÖÃÉèÊ©ÓÚ2024Äê9ÔÂ22ÈÕÔâ·êÍøÂ簲ȫÊÂÎñ£¬µ¼ÖÂϵÍÂäÙʱתΪÊÖ¶¯²Ù×÷¡£Ö»¹ÜÕâÒ»ÊÂÎñÒýÆðÁ˹Ø×¢£¬µ«Êг¤À¼µÏ¡¤¸¥À×ÔóѸ¿ì°ä²¼²¼¸æ°²¸§Ãñ¶à£¬Ç¿µ÷¹©Ë®·þÎñδÊÜÓ°Ï죬ˮÖʰ²È«ÎÞÓÇ¡£µ±¾ÖѸ¿ìÏìÓ¦£¬ÀñÆ¸ÍøÂ簲ȫר¼ÒȾָ£¬²¢¼ÓÇ¿°²È«ºÍ̸ÒÔ±£ÏÕ¹©Ë®°²È«¡£³õ²½¼£ÏóÖ¸ÏòÀÕË÷Èí¼þ¹¥»÷£¬´ÙʹÉèÊ©²ÉÈ¡ÊÖ¶¯²Ù×÷ÒÔ·ÀÊÂ̬À©´ó¡£°¢¿ÏÉ«ÊйÙÔ¹ØýÈ«Á¦µ÷²é£¬È·±£Ë®ÖʺͷþÎñ²»±ä¡£Õâ´ÎÊÂÎñÔÙ´ÎÇÃÏìÁ˹«ÓÃÊÂÒµ²¿ÃÅÍøÂ簲ȫ¾¯ÖÓ£¬ÓÈÆäÊÇË®ÎñÏµÍ³Ãæ¶ÔµÄÑϸñÌôÕ½¡£ÃÀ¹úµ±¾ÖÕý¼Ó´óÁ¦¶ÈÌáÉýË®ÎñÉèÊ©µÄÍøÂç·ÀÓùÄÜÁ¦£¬Ô¤·À½«À´¹¥»÷¡£ÎªÓ¦¶Ô´ËÀàÍþв£¬Ë®Îñ¹«Ë¾Ðè¹¹½¨È«ÃæµÄÍøÂç°²Õû¸öϵ£¬Ô̺¬¶¨ÆÚ°²È«Éó²é¡¢Ô±¹¤°²È«Åàѵ¡¢Êý¾Ý¼ÓÃܼ°¶à³É·ÖÉí·ÝÑéÖ¤µÈ´ëÊ©¡£Í¬Ê±£¬Î¬³Öϵͳ¸üв¢Ôì¶©Ó¦¼±ÏìÓ¦´òË㣬ÊǼ±¾çÓ¦¶Ô²¢¼õÇáDZÔÚÇÖº¦µÄ¹Ø¼ü¡£
https://www.infosecurity-magazine.com/news/incident-arkansas-city-water/
6. Octo2¶ñÒâÈí¼þа汾¼Ù×°ÈȵãÀûÓÃÔÚÅ·ÖÞËÁŰ
9ÔÂ24ÈÕ£¬Ò»ÖÖÃûΪ¡°Octo2¡±µÄÐÂÐÍAndroid¶ñÒâÈí¼þ±äÖÖÔÚÅ·ÖÞÇÄÈ»ÊæÕ¹£¬¼Ù×°³ÉNordVPN¡¢Google Chrome¼°Å·ÖÞÆóÒµÀûÓõÈÈȵãÈí¼þ£¬Ö¼ÔÚºýŪÓû§ÏÂÔØ¡£Õâ¿îÈí¼þÓÉÔçÆÚµÄExoCompactºÍExoBotľÂíÑÝ±ä¶øÀ´£¬Õ¹Ê¾ÁËÆä¾óÇ¿µÄÐÔÃüÁ¦ºÍ³ÖÐøµÄ¼¼Êõ¸Ä¸ï¡£Octo2²»½ö¼Ì³ÐÁËǰ´úµÄ׳´óÖ°ÄÜ£¬Èç¼üÅ̼ͼ¡¢É豸½ÚÔìµÈ£¬»¹ÏÔÖøÌáÉýÁËÔËÐв»±äÐÔ¡¢·´·ÖÎöÄÜÁ¦ºÍͨѶ½Ã½ÝÐÔ£¬ÒýÈëÁËÓòÌìÉúËã·¨£¨DGA£©ÒÔ¼ÓÇ¿ºÅÁîÓë½ÚÔ죨C2£©µÄµ¯ÐÔ¡£ThreatFabricµÄ×êÑнÒʾÁËOcto2µÄ¸´ÔÓÐԺ͵ó»¬ÐÔ£¬Æäͨ¹ýZombider·þÎñǶÈë¶ñÒâ¸ºÔØ£¬ÉõÖÁÄÜÈÆ¹ýAndroid 13µÄ°²È«ÏÞ¶È¡£Ð°汾ÔÚÏνÓÓÅ»¯¡¢Êý¾Ý¼ÓÃܺͶ¯Ì¬¼ÓÔØ¼¼ÊõÉϵĽøÈ¡£¬Ê¹Æä¸üÄѱ»¼ì²âºÍ·ÖÎö¡£³ö¸ñµØ£¬Ð²ÎÓëµÄ¡°SHIT_QUALITY¡±ÉèÖÃÈ·±£Á˵ÍÍøÂç»·¾³ÏµIJ»±äͨѶ£¬¶ø»ùÓÚDGAµÄC2ϵͳÔò´ó·ùÌáÉýÁË·þÎñÆ÷µÄ½Ã½ÝÐԺͿ¹½ø¹¥ÄÜÁ¦¡£Ä¿Ç°£¬Octo2µÄ¹¥»÷»î¶¯ÖØÒª¼¯ÖÐÔÚÅ·ÖÞ¼¸¸ö¹ú¶È£¬µ«¼øÓÚÆäMaaSƽ̨µÄÈ«ÇòÓ°ÏìÁ¦£¬½«À´ÓпÉÄÜÀ©´óµ½ÆäËûµØÓò¡£
https://www.bleepingcomputer.com/news/security/new-octo-android-malware-version-impersonates-nordvpn-google-chrome/


¾©¹«Íø°²±¸11010802024551ºÅ