Start-Rite¶ùͯЬÔì×÷ÉÌÔÙ´ÎÔâ·ê¿Í»§Ö§¸¶ÐÅϢй¶ÊÂÎñ
°ä²¼¹¦·ò 2024-11-1811ÔÂ14ÈÕ£¬¶ùͯЬÔì×÷ÉÌStart-Rite½üÈÕÔâ·êÁËÉæ¼°¿Í»§Ö§¸¶¿¨¾ßÌåÐÅÏ¢µÄÑϳÁ°²È«ÊÂÎñ£¬ÕâÊǸù«Ë¾ÔÚ´Óǰ°ËÄêÖеڶþ´Î²úÉú´ËÀà³Á´óʧÎ󡣾ݷ¢Ë͸ø¿Í»§µÄ֪ͨ³Æ£¬ÈëÇÖÊÂÎñ²úÉúÔÚ10ÔÂ14ÈÕÖÁ11ÔÂ7ÈÕÖ®¼ä£¬¿ÉÄÜй¶µÄÐÅÏ¢Ô̺¬Ö§¸¶¿¨ÉϵĿͻ§ÐÕÃû¡¢¿¨×¢²áµØÖ·¡¢¿¨ºÅ¡¢ÓÐЧÆÚºÍ¿¨ÑéÖ¤Öµ(CVV)¡£Start-Rite½¨Òé¿Í»§ÁªÏµÒøÐлòÐÅÓþ¿¨ÌṩÉÌÍ£Óò¢¸ü»»ÐÅÓþ¿¨£¬²¢Î¬³Ö¾¯Ìè²é³¶ÔÕ˵¥¡£¸Ã¹«Ë¾ÒÑÏòÓ¢¹úÊý¾Ý±£»¤¼à¹Ü»ú¹¹ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©»ã±¨´ËÊ£¬²¢°µÊ¾½«È«Á¦¹²Í¬¾¯·½¹¤×÷¡£Ö»¹ÜStart-RiteÏò¡¶The Register¡·Ö¤ÊµÁËÕâ´Î¹¥»÷£¬µ«ÉÐδ¹«¿ªÈϿɴËÊ¡£ÀûÓð²È«×¨¼Ò°µÊ¾£¬´ËÊÂÎñÒý·¢Á˶ÔStart-Rite°²È«Ì¬ÊƵÄÖÊÒÉ£¬ÒÔ¼°Êý¾ÝÈôºÎ±»ÇÔÈ¡µÄÎÊÌâ¡£ICO½²»°ÈËÔÚ±¨Â·ºóй©£¬Start-RiteÒÑÏòÆä´«µÝÁËÕâÒ»ÊÂÎñ£¬²¢ÔÚÆÀ¹ÀËùÌṩµÄÐÅÏ¢¡£
https://www.theregister.com/2024/11/14/smartrite_breach/
2. CISAÖҸ棺Palo Alto Networks Expedition¶à¸ö·ì϶±»»ý¼«ÀûÓÃ
11ÔÂ15ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©°ä²¼ÖҸ棬ָ³öÓ°ÏìPalo Alto Networks ExpeditionµÄÁ½¸öзì϶CVE-2024-9463ºÍCVE-2024-9465ÔÚ±»»ý¼«ÀûÓá£ÕâÁ½¸ö·ì϶±ðÀëÉæ¼°ºÅÁî×¢ÈëºÍSQL×¢È룬CVSSÆÀ·Ö±ðÀë¸ß´ï9.9ºÍ9.3£¬Èô±»³É¹¦ÀûÓ㬹¥»÷Õß¿ÉÔÚExpeditionǨá㹤¾ßÖÐÒÔrootÉí·ÝÖ´ÐÐËÁÒâºÅÁî»òй¶Êý¾Ý¿âÄÚÈÝ£¬½ø¶ø¿ÉÄܵ¼ÖÂPAN-OS·À»ðǽµÄÓû§Ãû¡¢ÃÜÂë¡¢ÅäÖúÍAPIÃÜԿй¶£¬»òÔÚÒ×Êܹ¥»÷µÄϵͳÉÏ´´½¨ºÍ¶ÁÈ¡Îļþ¡£CISAÒѽ«ÕâЩ·ì϶ÄÉÈëÒÑÖª±»ÀûÓõķì϶Ŀ¼£¬²¢ÒªÇóÁª¹úÃñÊÂÐÐÕþ²¿ÃÅ»ú¹¹ÔÚ2024Äê12ÔÂ5ÈÕǰÀûÓñØÒª¸üС£Palo Alto NetworksÔÚ2024Äê10ÔÂ9ÈÕ°ä²¼µÄ°²È«¸üÐÂÖн¨¸´ÁËÕâЩ·ì϶£¬²¢È·ÈÏÊÕµ½CISA»ã±¨³ÆÕâЩ·ì϶ÔÚ±»ÀûÓá£´Ë±í£¬Ò»ÖÜǰCISA»¹´«µÝÁËÁíÒ»¸öÓ°ÏìExpeditionµÄÑϳÁ·ì϶CVE-2024-5910ÔÚ±»ÀûÓ㬸÷ì϶¿Éµ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄÔ¶³ÌºÅÁîÖ´ÐУ¬Õë¶Ô»¥ÁªÍøÉ϶³öµÄ·À»ðǽÖÎÀí½Ó¿Ú¡£
https://thehackernews.com/2024/11/cisa-flags-critical-palo-alto-network.html
3. RecraftÄ£Ðʹ氲ȫ·ì϶£ºÎÞÒâÖÐй¼ûô¸ÐϵͳָÁîÒý·¢¹Ø×¢
11ÔÂ14ÈÕ£¬¾ÝCyber Security News±¨Â·£¬×êÑÐÈËÔ±Ôڸ߼¶ÈËΪÖÇÄÜͼÏñÌìÉúÄ£ÐÍÖз¢ÏÖÁËDZÔڵݲȫ·ì϶£¬³ö¸ñÊÇÔÚRecraftÄ£ÐÍÖУ¬¸ÃÄ£ÐÍÔÚÎı¾µ½Í¼Æ¬ÅÅÐаñÉÏ´¦ÓÚµ±ÏÈְλ¡£RecraftѡȡÁ½¼¶¼Ü¹¹£¬½áºÏÁË´óÐÍ˵»°Ä£ÐͺÍÀ©É¢Ä£ÐÍ£¬¿ÉÄÜ´¦Öø´ÔÓ²éÎʲ¢ÌìÉú¸üÕýÈ·¡¢¸üÄܸÐÖª¸ßµÍÎĵÄͼÏñ¡£È»¶ø£¬×êÑÐÈËÔ±·¢ÏÖ£¬Í¨¹ýÄ³Ð©ÌØ¶¨ÌáÐÑ£¬Äܹ»ÓÕʹRecraftй¶²¿ÃÅÄÚ²¿Ö¸ÁÔ̺¬ÏµÍ³ÌáÐÑÆ¬¶ÎºÍ¾ßÌåÁìµ¼´óÄ£ÐÍÐÐΪµÄ×¢Ã÷¡£ÕâЩй¶µÄÖ¸ÁîÔ̺¬ÃèÊö·ç¸ñ¡¢ÎïÌåºÍÈËÎïµÄ¾ßÌåÃèÊö¡¢ÃèÊöÐÔ¾ä×Ó¡¢¹¹Í¼Ï¸½ÚÒÔ¼°Ô¤·ÀʹÓõĴÊÓïµÈ¡£ÕâÖÖÎÞÒâÖÐй¶ϵͳÌáÐѵÄÐÐΪÒý·¢ÁËÈËÃǶÔÈËΪÖÇÄÜÄ£ÐͰ²È«ÐÔºÍÒþÖÔÐÔµÄÓÇÓô¡£ÈôÊǶñÒâÐÐΪÕß¿ÉÄÜÌáÈ¡ÕâЩÃô¸ÐÖ¸ÁËûÃÇ¿ÉÄÜ»á°Ñ³Öϵͳ¡¢Èƹý°²È«´ëÊ©»òÉî¿ÌÏàʶרÓеÄÈËΪÖÇÄܼ¼Êõ¡£Òò¶ø£¬ÕâÒ»ÊÂÎñΪAI¿ª·¢ÈËÔ±ºÍ×êÑÐÈËÔ±ÇÃÏìÁ˾¯ÖÓ£¬ÌáÐÑËûÃDZØÐëÈ·±£ÕâЩϵͳµÄ°²È«ÐÔºÍÆëÈ«ÐÔ£¬Ëæ×ÅAI¼¼ÊõµÄ²»ÐݽøÈ¡ºÍ¸üÉî¿ÌµØÈÚÈëÎÒÃÇÉúÑĵĸ÷¸ö·½Ã棬ÕâÒ»µã±äµÃÓÈΪ³ÁÒª¡£
https://cybersecuritynews.com/researchers-warn-of-ai-image-generators/#google_vignette
4. ¼ÙðAI±à×ëÆ÷ÍÆ¶¯ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þϰȾWindowsºÍmacOS
11ÔÂ16ÈÕ£¬½üÆÚ¼ÙðAIͼÏñºÍÊÓÆµÌìÉúÆ÷³ÉÎªÍøÂç¹¥»÷µÄм¿Á©£¬Í¨¹ýÀûÓÃLumma Stealer£¨Õë¶ÔWindows£©ºÍAMOS£¨Õë¶ÔmacOS£©ÕâÁ½ÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬Ï°È¾Óû§É豸²¢ÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°ü¡¢Í´´¦¡¢ÃÜÂë¡¢ÐÅÓþ¿¨ÐÅÏ¢¼°ä¯ÀÀº¹ÇàµÈÃô¸ÐÊý¾Ý¡£ÕâЩ±»ÇÔÈ¡µÄÊý¾Ý»á±»´ò°ü·¢Ëͻع¥»÷Õߣ¬ÓÃÓÚ½øÒ»²½¹¥»÷»òÔÚ°µÅÌÉÏÏúÊÛ¡£ÍøÂ簲ȫ×êÑÐÔ±·¢ÏÖ£¬¹¥»÷Õß´´½¨Á˼ÙÒâEditPro AI±à×ëÆ÷µÄÐéÎ±ÍøÕ¾£¬Í¨¹ýËÑË÷Á˾ֺ͸æ°×ÍÆ¹ãÉî¶ÈαÔìµÄÕþÖÎÊÓÆµ£¬ÓÕµ¼Óû§ÏÂÔØ¼Ù×°³ÉEditProAIÀûÓ÷¨Ê½µÄ¶ñÒâÈí¼þ¡£WindowsºÍmacOSÓû§±ðÀë»áÊÕµ½ÃûΪ¡°Edit-ProAI-Setup-newest_release.exe¡±ºÍ¡°EditProAi_v.4.36.dmg¡±µÄÎļþ¡£ÕâЩÎļþÓÉÇÔÈ¡µÄ´úÂëÊðÃûÖ¤ÊéÊðÃû£¬²¢Í¨¹ýÌØ¶¨Ãæ°å·¢Ëͱ»µÁÊý¾Ý¡£ÍøÂ簲ȫר¼Ò½¨Ò飬ÈôÔøÏÂÔØ¸Ã·¨Ê½£¬¸Ãµ±¼´³ÁÖÃËùÓÐÃÜÂë²¢ÆôÓöà³É·ÖÉí·ÝÑéÖ¤¡£
https://www.bleepingcomputer.com/news/security/fake-ai-video-generators-infect-windows-macos-with-infostealers/
5. ÃÀµÖѺ´û¿î»ú¹¹ÔâÊý¾Ýй¶£¬17Íò¿Í»§SSNµÈÐÅÏ¢±»µÁ
11ÔÂ15ÈÕ£¬ÃÀ¹úÉçÇøµÖѺ´û¿îÊÜÀí¹«Ë¾£¨ÒÔAnnieMac Home MortgageÃûÒåÔËÓª£©Ôâ·êÊý¾Ýй¶ÊÂÎñ£¬Ò»ÃûÈëÇÖÕßÔÚ8ÔÂ21ÈÕÖÁ23ÈÕÆÚ¼äÈëÇÔìäϵͳ£¬ÇÔÈ¡ÁË171,000Ãû¿Í»§µÄÓ×ÎÒÊý¾Ý£¬Ô̺¬ÐÕÃûºÍÉç»á°²È«ºÅÂë(SSN)¡£Ö»¹ÜĿǰûÓÐÖ¤¾ÝÅú×¢ÕâЩÊý¾ÝÒÑÔÚ°µÍøÉϱ»ÀÄÓ㬵«AnnieMacÒѲÉÈ¡¶î±í°²È«´ëʩԤ·ÀÀàËÆÊÂÎñÔٴβúÉú£¬²¢ÏòÊÜÓ°Ïì¿Í»§Ìṩ12¸öÔµÄÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤¡£¸Ã»ú¹¹Ìṩ¶àÖÖµÖѺ´û¿î²úÆ·£¬Ô̺¬Õë¶ÔµÍÊÕÈë»òÐÅÓþÆÀ¼¶½Ï²î¹º·¿ÕߵĴòË㣬ÈçOneUP´òËãÔÊÐíÂò¼Ò½öÓÃ1%µÄÊ׸¶¹º·¿¡£Óë¸ü¿í·ºµÄÊý¾Ýй¶Ïà±È£¬Õâ´Îй¶µÄÊý¾ÝÀàÐÍÏà¶Ô½ÏÉÙ£¬µ«SSNµÄй¶ÈÔ´æÔÚ·çÏÕ£¬¿ÉÄÜÇÖº¦¿Í»§µÄÐÅÓþÆÀ·Ö£¬³ö¸ñÊÇÄÇЩÐÅÓþÆÀ·ÖÕý±¾¾Íͨ³£µÄ¿Í»§¡£
https://www.theregister.com/2024/11/15/anniemac_data_breach/
6. GeoVision±¨·ÏÉ豸ÁãÈÕ·ì϶ÔâÀûÓ㬽©Ê¬ÍøÂçÈëÇÖ·çÏÕ¾çÔö
11ÔÂ15ÈÕ£¬¶ñÒâÈí¼þ½©Ê¬ÍøÂçÔÚÀûÓÃGeoVision±¨·ÏÉ豸ÖеĸßΣÁãÈÕ·ì϶CVE-2024-11120½øÐÐÈëÇÖ£¬²¢ÕÐļÕâЩÉ豸½øÐпÉÄܵÄDDoS¹¥»÷»ò¼ÓÃÜÍÚ¾ò¡£¸Ã·ì϶ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚÉ豸ÉÏÖ´ÐÐËÁÒâϵͳºÅÁÒÑÓ°Ïì¶à¿î²»ÔÙÊܹ©¸øÉÌÖ§³ÖµÄGeoVisionÉ豸Ðͺš£¾ÝÍþв¼à¿ØÆ½Ì¨Shadowserver Foundation»ã±¨£¬Ô¼ÓÐ17,000̨GeoVisionÉ豸ÔÚÏß¶³ö£¬Ò×Êܹ¥»÷£¬ÆäÖдóÎÞÊýλÓÚÃÀ¹ú¡£¸Ã½©Ê¬ÍøÂçÒÉΪMiraiµÄ±äÖÖ¡£ÈôÊÇ·¢ÏÖÉ豸¹ýÈÈ¡¢ÔËÐлºÂý¡¢ÎÞÏìÓ¦»òÅäÖñ»¸ü¸ÄµÈ¼£Ï󣬽¨Òé³ÁÖÃÉ豸¡¢¸ü¸ÄÃÜÂë¡¢¹Ø¹ØÔ¶³Ì½Ó¼û²¢ÖÃÓÚ·À»ðǽºó¡£ÃÎÏëÇé¿öÏ£¬Ó¦´úÌæÕâЩÉ豸£¬Èô²»³ÉÄÜ£¬ÔòÓ¦¸ôÀë²¢Ç×êÇ¼à¿Ø¡£
https://www.bleepingcomputer.com/news/security/botnet-exploits-geovision-zero-day-to-install-mirai-malware/


¾©¹«Íø°²±¸11010802024551ºÅ