PipeMagicľÂíÀûÓÃαÔìChatGPTÀûÓ÷¨Ê½¹¥»÷É³ÌØ°¢À²®
°ä²¼¹¦·ò 2024-10-171. PipeMagicľÂíÀûÓÃαÔìChatGPTÀûÓ÷¨Ê½¹¥»÷É³ÌØ°¢À²®
10ÔÂ15ÈÕ£¬¿¨°Í˹»ùÈ«Çò×êÑÐÓë·ÖÎöÍŶӣ¨GReAT£©½üÆÚÅû¶ÁËÒ»ÏîеÄÍøÂç¹¥»÷»î¶¯£¬¸Ã»î¶¯ÀûÓÃÒ»ÖÖÃûΪPipeMagicµÄ¸´ÔÓºóÃÅľÂí½øÐд«²¼£¬ÆäµØÀíÖ¸±êÒÑ´ÓÑÇÖÞÀ©´óµ½É³Ìذ¢À²®¡£Õâ´Î¹¥»÷ÖУ¬ÍøÂç·¸×ï·Ö×ÓѡȡÁËÒ»¿îÓÃRust¿ª·¢µÄαÔìChatGPTÀûÓ÷¨Ê½×÷Ϊ³õʼϰȾý½é£¬¸Ã·¨Ê½ÀûÓó£¼ûµÄRust¿âÀ´¶ã±Ü³õ²½¼ì²â£¬µ«ÔÚÖ´ÐÐʱ½öÏÔʾ¿ÕȱÆÁÄ»£¬²¢°µ²ØÒ»¸öÔ̺¬¶ñÒâ¸ºÔØµÄ¼ÓÃÜÊý¾ÝÊý×é¡£ÔÚºóÐø½×¶Î£¬¶ñÒâÈí¼þ»áѡȡÃû³Æ¹þÏ£Ëã·¨¶¨Î»¹Ø¼üµÄWindows APIº¯Êý£¬ÒÔ·ÖÅäÄÚ´æ¡¢¼ÓÔØPipeMagicºóÃÅ¡¢ÅäÖÃÉèÖò¢Æô¶¯¶ñÒâÈí¼þ¡£PipeMagicľÂíÓµÓйÖÒìµÄÖ°ÄÜ£¬¿ÉÄÜÌìÉúÒ»¸ö16×Ö½ÚµÄËæ»úÊý×飬ÓÃÓÚ³ÉÁ¢¶¨Ãû¹Ü·ÒÔʵÏÖÒñ±ÎͨѶºÍºÅÁîÖ´ÐУ¬ÆäºÅÁîºÍ½ÚÔ죨C2£©·þÎñÆ÷±»ÍйÜÔÚMicrosoft AzureÉÏ¡£
https://securityonline.info/pipemagic-trojan-exploits-fake-chatgpt-app-to-target-saudi-arabian-organizations/
2. ErrorFather»î¶¯ÀûÓÃδ±»·¢ÏÖCerberusÒøÐÐľÂí½øÐи´ÔÓ¹¥»÷
10ÔÂ15ÈÕ£¬ÍøÂ簲ȫÌṩÉÌCyble»ã±¨ÁËÒ»Ïîеĸ´ÔÓ¶ñÒâ»î¶¯£¬¸Ã»î¶¯ÔÚʹÓÃδ±»·¢ÏÖµÄCerberus AndroidÒøÐÐľÂí¸ºÔØ¡£Cyble·¢ÏÖÁË15¸ö¼ÙÒâChromeºÍPlay StoreÀûÓõĶñÒâÑù±¾£¬ÕâЩÑù±¾Ñ¡È¡¶à½×¶ÎͶ·ÅÆ÷²¿ÊðÒøÐÐľÂí¸ºÔØ£¬²¢ÀûÓÃÁËCerberusÒøÐÐľÂí¡£CerberusÊÇÒ»ÖÖÄܹ»ÇÔÈ¡ÒøÐÐÀûÓ÷¨Ê½µÇ¼ʹ´¦¡¢ÐÅÓþ¿¨¾ßÌåÐÅÏ¢ºÍÆäËûÓ×ÎÒÐÅÏ¢µÄ¶ñÒⷨʽ£¬×Ô2019Äê³öÏÖÒÔÀ´ÒѳÉΪ×î³ÛÃûµÄÒøÐÐľÂíÖ®Ò»¡£Ö»¹ÜÆäÔ´´úÂëÔÚ2020Äêй¶£¬µ¼Ö³öÏÖÁËеıäÖÖÈçAlienºÍERMAC£¬µ«Cerberus¼°Æä·ÖÖ§ÈÔÔÚ²»Ðݱ»³ÁÐÂÀûÓá£Õâ´ÎErrorFather»î¶¯ÖУ¬ÍþвÐÐΪÕß¶Ô¶ñÒâÈí¼þ½øÐÐÁËÇá΢Åú¸Ä£¬µ«ÖØÒª»ùÓÚÔʼµÄCerberus´úÂ룬ѡȡÁ˸´ÔÓµÄϰȾÁ´£¬Ê¹¼ì²âºÍɾ³ý¹¤×÷±äµÃ¸´ÔÓ¡£×îÖÕµÄÓÐÐ§ÔØºÉѡȡ¼üÅ̼ͼ¡¢¸²¸Ç¹¥»÷¡¢VNCºÍÓòÌìÉúËã·¨(DGA)À´Ö´ÐжñÒâ»î¶¯¡£Cyble½¨ÒéÓû§½ö´Ó¹Ù·½ÀûÓÃÉ̵êÏÂÔØÈí¼þ£¬Ê¹ÓóÛÃû·À²¡¶¾ºÍ»¥ÁªÍø°²È«Èí¼þ°ü£¬Ê¹ÓÃÇ¿ÃÜÂëºÍ¶à³É·ÖÉí·ÝÑéÖ¤£¬ÆôÓÃÉúÎï¼ø±ð°²È«Ö°ÄÜ£¬²¢È·±£AndroidÉ豸ÉÏÆôÓÃÁËGoogle Play Protect¡£
https://www.infosecurity-magazine.com/news/cerberus-android-banking-trojan/
3. CISAÖÒ¸æSolarWinds WHDÈí¼þÑϳÁ°²È«·ì϶Õý±»»ý¼«ÀûÓÃ
10ÔÂ16ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©°ä·¢£¬Òѽ«Ó°ÏìSolarWinds Web Help Desk (WHD) Èí¼þµÄÑϳÁ°²È«·ì϶CVE-2024-28987£¨CVSSÆÀ·Ö9.1£©Ôö³¤µ½ÆäÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ÖУ¬²¢Ö¸³öÒÑÓÐÖ¤¾ÝÅú×¢¸Ã·ì϶ÔÚ±»×Ô¶¯ÀûÓᣴ˷ì϶ÓëÓ²±àÂëÆ¾Ö¤Óйأ¬¿ÉÄÜʹԶ³Ìδ¾Éí·ÝÑéÖ¤µÄÓû§»ñµÃ½Ó¼ûȨÏÞ²¢½øÐÐÊý¾ÝÅú¸Ä¡£SolarWindsÔÚ2024Äê8ÔÂÏÂÑ®³õ´Î¹«¿ªÁ˸÷ì϶ÏêÇé£¬ËæºóÍøÂ簲ȫ¹«Ë¾Horizon3.ai½øÒ»²½ÌṩÁ˼¼Êõϸ½Ú¡£°²È«×êÑÐÔ±Ôú¿Ë¡¤ººÀûÖ¸³ö£¬¸Ã·ì϶ÄÜÈù¥»÷ÕßÔ¶³Ì¶ÁÈ¡ºÍÅú¸ÄÔ®ÊǪ̈Ʊ֤ÖеÄÃô¸ÐÐÅÏ¢£¬Èç³ÁÖÃÃÜÂëÇëÆòÕ÷·þÎñÕÊ»§Í´´¦¡£Ö»¹ÜĿǰÉв»Ã÷ÏԸ÷ì϶µÄ¾ßÌåÀûÓÃÇé¿öºÍÀûÓÃÕßÉí·Ý£¬µ«ÕâÒ»·¢ÏÖ½ôËæCISAÁ½¸öÔÂǰ½«Í³Ò»Èí¼þÖеÄÁíÒ»¸ßΣ·ì϶£¨CVE-2024-28986£¬CVSSÆÀ·Ö9.8£©ÄÉÈëKEVĿ¼֮ºó¡£¼øÓÚ´Ë£¬Áª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÐèÔÚ2024Äê11ÔÂ5ÈÕǰÀûÓÃ×îн¨¸´·¨Ê½£¨°æ±¾12.8.3 Hotfix 2»ò¸ü¸ß£©£¬ÒÔÈ·±£ÍøÂ簲ȫ¡£
https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html
4. ºÚ¿ÍÀûÓÃEDRSilencerºì¶Ó¹¤¾ßÈÆ¹ý°²È«·À»¤½øÐй¥»÷
10ÔÂ15ÈÕ£¬×êÑÐÈËÔ±½üÈÕ·¢ÏÖÁËÒ»ÖÖÃûΪEDRSilencerµÄºì¶Ó²Ù×÷¹¤¾ß£¬¸Ã¹¤¾ß¿ÉÄܼø±ð°²È«¹¤¾ß²¢½«ÆäÏòÖÎÀí½ÚÔį̀·¢³öµÄ¾¯±¨¾²Òô£¬´Ó¶øÔ®ÊÖ¹¥»÷ÕßÌӱܼì²â¡£EDRSilencerÊÇÒ»¸ö¿ªÔ´¹¤¾ß£¬ÊÜMdSec NightHawk FireBlockÆô·¢¶ø¿ª·¢£¬¿É¼ì²âÔËÐÐÖеĶ˵ã¼ì²âºÍÏìÓ¦£¨EDR£©¹ý³Ì£¬²¢Ê¹ÓÃWindows¹ýÂËÆ½Ì¨£¨WFP£©¼à¿Ø¡¢×èÖ¹»òÅú¸ÄÍøÂçÁ÷Á¿¡£Í¨¹ý×Ô½ç˵¹æ¶¨£¬¹¥»÷ÕßÄܹ»·ÛËéEDR¹¤¾ßÓëÆäÖÎÀí·þÎñÆ÷Ö®¼äµÄÊý¾Ý»¥»»£¬×èÖ¹¾¯±¨ºÍÒ£²â»ã±¨µÄ·¢ËÍ¡£ÔÚ×îа汾ÖУ¬EDRSilencer¿É¼ì²â²¢×èÖ¹16ÖÖÏÖ´úEDR¹¤¾ß¡£Ç÷Ïò¿Æ¼¼µÈÍøÂ簲ȫ¹«Ë¾¶ÔEDRSilencer½øÐÐÁ˲âÊÔ£¬·¢ÏÖһЩÊÜÓ°ÏìµÄEDR¹¤¾ß¿ÉÄÜÈÔÄÜ·¢Ëͻ㱨£¬µ«EDRSilencerÔÊÐí¹¥»÷ÕßÀ©´óÖ¸±ê¹ý³ÌÁбíÒÔº¸Ç¸÷Àలȫ¹¤¾ß¡£ÕâʹµÃ¶ñÒâÈí¼þ»òÆäËû¶ñÒâ»î¶¯¿ÉÄÜÈÔδ±»·¢ÏÖ£¬Ôö³¤Á˹¥»÷³É¹¦µÄ¿ÉÄÜÐÔ¡£Ç÷Ïò¿Æ¼¼½¨Ò齫EDRSilencer×÷Ϊ¶ñÒâÈí¼þ½øÐмì²â£¬²¢Ö´Ðж൵´ÎµÄ°²È«½ÚÔìÀ´·À±¸´ËÀ๥»÷¡£
https://www.bleepingcomputer.com/news/security/edrsilencer-red-team-tool-used-in-attacks-to-bypass-security/
5. OwlTingÒòAWS S3´æ´¢Í°ÅäÖÃÃýÎó£¬Â¶³ö765,000Óû§Ãô¸ÐÊý¾Ý
10ÔÂ15ÈÕ£¬Çø¿éÁ´¼¼Êõ¹«Ë¾OwlTingÒòÅäÖÃÃýÎóµÄÑÇÂíÑ·S3´æ´¢Í°£¬ÒⱩ¶³öÁË765,000ÃûÓû§µÄÃô¸ÐÊý¾Ý£¬ÖØÒªÓ°Ïį̀ÍåµÄ¾Æµê¿ÍÈË¡£Ð¹Â¶µÄÊý¾ÝÔ̺¬È«Ãû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·ÒÔ¼°¾ÆµêÔ¤Ô¼ÏêÇéµÈÓ×ÎÒÐÅÏ¢¡£OwlTing³ÉÁ¢ÓÚ2010Ä꣬ÊÇÒ»¼Ò·þÎñÓÚÈ«ÇòÓÎÀÀ¡¢Ê³Æ·°²È«¡¢¾Æµê¡¢Ã½ÌåºÍÆäËûµç×ÓÉÌÎñÁìÓò²¢Ìṩ³ÛÃûÇø¿éÁ´½â¾ö¹æ»®µĄ̈Í幫˾¡£OwlTingÈ·ÈÏÁËÊý¾Ýй¶£¬µ«Ðû³Æ²»Éæ¼°Ãô¸ÐÊý¾Ý£¬È»¶øCybernews×êÑÐÈËÔ±ÖÒ¸æËµ£¬ÕâЩÐÅÏ¢¿ÉÄܵ¼ÖÂÉí·Ý͵ÇÔºÍڲơ£Ð¹Â¶µÄÊý¾Ý¶ÔÍøÂç·¸×ï·Ö×ÓÀ´Ëµ¼«¶ÈÓмÛÖµ£¬¿ÉÄܱ»ÓÃÓÚÓã²æÊ½ÍøÂç´¹µö¡¢ÓïÒô´¹µö¡¢¶ÌÐÅ´¹µöµÈ¹¥»÷¡£Cybernews½¨Òé²ÉȡһϵÁдëÊ©À´»º½âÑÇÂíÑ·S3´æ´¢Í°Â¶³öµÄ·çÏÕ£¬Ô̺¬Ï޶ȹ«¿ª½Ó¼û¡¢¼à¿Ø½Ó¼ûÈÕÖ¾¡¢ÆôÓ÷þÎñÆ÷¶Ë¼ÓÃܵȡ£
https://cybernews.com/security/taiwan-visitors-exposed-in-massive-data-leak-owlting/
6. ³¯ÏʺڿÍ×éÖ¯ScarCruftÀûÓÃIEÁãÈÕ·ì϶ÌáÒé¹¥»÷
10ÔÂ16ÈÕ£¬³¯ÏʺڿÍ×éÖ¯ScarCruft£¨ÓÖ³ÆAPT37»òRedEyes£©ÓÚ5ÔÂÌáÒé´ó¹æÄ£¹¥»÷£¬ÀûÓÃInternet ExplorerµÄÁãÈÕ·ì϶CVE-2024-39178£¬Í¨¹ýÌØÔìµÄToastµ¯³ö¸æ°×ϰȾָ±êÉ豸£¬Ö²ÈëRokRAT¶ñÒâÈí¼þÒÔÇÔÈ¡Êý¾Ý¡£¸Ã·ì϶ΪÀàÐÍ»ìºÏ·ì϶£¬ASECºÍNCSC·¢ÏÖºóѸ¿ì֪ͨ΢Èí£¬Î¢ÈíÓÚ8Ô°䲼°²È«¸üн¨¸´¡£×êÑÐÈËÔ±Ö¸³ö£¬Õâ´Î¹¥»÷µÄ·ì϶ÓëScarCruft´ÓǰʹÓõÄCVE-2022-41128·ì϶ÀàËÆ£¬½öÔö³¤ÈýÐдúÂëÒÔÈÆ¹ý¾É½¨¸´¡£ScarCruftÈëÇÖº«¹ú¸æ°×¹«Ë¾·þÎñÆ÷£¬ÔÚÊ¢ÐÐÃâ·ÑÈí¼þÖÐÍÆËͺ¬¶ñÒâiframeµÄToast¸æ°×£¬µ±ÓÉInternet ExploreräÖȾʱ£¬´¥·¢Ô¶³Ì´úÂëÖ´ÐС£RokRAT±äÖÖÿ30·ÖÖÓ½«Ìض¨Îļþ´«ÊäÖÁYandexÔÆÊ·ý£¬Í¬Ê±Ö´ÐмüÅ̼ͼ¡¢¼à¶½¼ôÌù°å¸ü¸ÄºÍÆÁÄ»½ØÍ¼²¶»ñ¡£¹¥»÷ͨ¹ýËIJ½¹ý³Ì×¢Èë¡°explorer.exe¡±¹ý³ÌÒÔÌӱܼì²â£¬Èô¼ì²âµ½Avast»òSymantec·À²¡¶¾Èí¼þ£¬Ôò½«¶ñÒâÈí¼þ×¢ÈëËæ»ú¿ÉÖ´ÐÐÎļþÖС£Í¨¹ýÔÚWindowsÆô¶¯Ê±Ôö³¤×îÖÕÓÐЧ¸ºÔز¢×¢²áµ½ÏµÍ³µ÷¶È·¨Ê½ÖУ¬ÊµÏÖÓÆ¾ÃÐÔϰȾ¡£
https://www.bleepingcomputer.com/news/security/malicious-ads-exploited-internet-explorer-zero-day-to-drop-malware/


¾©¹«Íø°²±¸11010802024551ºÅ