ÎڸɴïÖÐÑëÒøÐÐÔâºÚ¿ÍÈëÇÖ £¬×ʽ𱻵Á²¢²¿ÃÅ×·»Ø

°ä²¼¹¦·ò 2024-12-03

1. ÎڸɴïÖÐÑëÒøÐÐÔâºÚ¿ÍÈëÇÖ £¬×ʽ𱻵Á²¢²¿ÃÅ×·»Ø


12ÔÂ1ÈÕ £¬Îڸɴﵱ¾Ö¹ÙԱ֤ʵ £¬¹ú¶ÈÖÐÑëÒøÐÐϵͳÔâ·êÁËÒÔ¾­¼ÃΪÖ÷Õŵĺڿ͹¥»÷¡£²ÆÕþ²¿¸ß¼¶¹ÙÔ±°µÊ¾ £¬Ö»¹ÜµÄÈ·²úÉúÁ˺ڿÍÈëÇÖÊÂÎñ £¬µ«Çé¿ö²¢Î´È籨·°ãÑϳÁ £¬Ä¿Ç°Éó¼ÆºÍµ÷²é¹¤×÷ÒѽøÈëβÉù¡£¾ÝÎڸɴïÒøÐÐй© £¬ËûÃÇÔÚ¹²Í¬¾¯·½¶ÔÒ»Â·ÉæÏÓ¾³±íºÚ¿ÍÇÔÈ¡620ÒÚÏÈÁԼ1680ÍòÃÀÔª£©µÄ°¸¼þ½øÐе÷²é¡£¾Ý³Æ £¬Ò»¸ö×Գơ°Waste¡±µÄ¶«ÄÏÑǺڿÍ×éÖ¯¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü £¬ËûÃÇÔÚ11Ô³õÈëÇÖÁËÎڸɴïÒøÐÐϵͳ²¢×ªÒÆÁË×ʽ𠣬ÆäÖв¿ÃÅ×ʽð±»×ªÖÁÈÕ±¾ÕË»§¡£ÎڸɴïÖÐÑëÒøÐÐÒÑ×·»ØÒ»°ëÒÔÉϱ»µÁ×ʽ𠣬µ«ÈÔÓв¿ÃÅ×ʽð±»ÌáÈ¡»ò×ªÒÆÖÁÆäËû¹ú¶È £¬ÈçÓ¢¹úµÄÕË»§±»¶³½áÁË700ÍòÃÀÔª £¬¶ø¸Ã×éÖ¯ÔÚÈÕ±¾ÔòÊÕµ½ÁË600ÍòÃÀÔª¡£Õâ´ÎÊÂÎñÒýÆðÁË·ñ¾öµ³ÒéÔ±µÄÕ𾪺͹Ø×¢ £¬ËûÃǺôÓõµ±¾ÖÌṩ¸ü¶àÐÅÏ¢ÒÔÔ®ÊÖ¹«¼ÒÏàʶÊÂÎñÕæÏࡣĿǰ £¬Óйز¿ÃÅÈÔÔÚ³ÖÐøµ÷²éÕâ´ÎºÚ¿Í¹¥»÷µÄ¾ßÌåϸ½ÚºÍËðʧÇé¿ö¡£


https://securityaffairs.com/171562/security/financially-motivated-threat-actors-hacked-ugandas-central-bank.html


2. ÐÂÐÍÍøÂç´¹µö¹¥»÷ÀûÓðܻµµÄWordÎĵµÈƹý°²È«¼ì²â


12ÔÂ1ÈÕ £¬Ò»ÖÖÐÂÏʵÄÍøÂç´¹µö¹¥»÷·½Ê½ÀûÓÃÁËMicrosoft WordµÄÎļþ¸´Ô­Ö°ÄÜ £¬Í¨¹ý·¢ËͰܻµµÄWordÎĵµ×÷Ϊµç×ÓÓʼþ¸½¼þÀ´Èƹý°²È«Èí¼þµÄ¼ì²â¡£ÕâЩ¸½¼þ¼Ù×°³ÉÀ´×Ô¹¤×ʺÍÈËÁ¦×ÊÔ´²¿ÃŵÄÔ±¹¤¸£ÀûºÍ½±½ð֪ͨ £¬ÎļþÃûÖÐÔ̺¬base64±àÂëµÄ×Ö·û´® £¬½âÂëºóΪһ´®Ëæ»úÎı¾¡£µ±½Ó¹ÜÕß³¢ÊÔ´ò¿ªÕâЩ°Ü»µµÄÎĵµÊ± £¬Word»áÌáÐѸ´Ô­Îļþ £¬¶ø¸´Ô­ºóµÄÎĵµ»áÏÔʾһ¸öÓÕµ¼Óû§É¨Ãè¶þάÂëÒÔ¼ìË÷ÎĵµµÄÌáÐÑ £¬¶þάÂëÁ´½Óµ½µÄÔòÊÇÒ»¸ö¼Ù×°³ÉMicrosoftµÇÂ¼Ò³ÃæµÄ´¹µöÍøÕ¾ £¬Ö¼ÔÚÇÔÈ¡Óû§Í´´¦¡£ÓÉÓÚÕâЩÎļþÔÚ²Ù×÷ϵͳÄڳɹ¦ÔËÐе«Î´ÄÜÕë¶ÔÆäÎļþÀàÐÍÀûÓÃÊʵ±µÄ·¨Ê½ £¬´óÎÞÊý°²È«½â¾ö¹æ»®¶¼Î´Äܼì²âµ½ËüÃÇ¡£ÕâÖÖ¹¥»÷·½Ê½Ï൱³É¹¦ £¬ÓÉÓÚÏÕЩËùÓи½¼þÔÚVirusTotalÉ϶¼Î´±»¼ì²âµ½ £¬Ö»ÓÐÉÙÊý°²È«¹©¸øÉÌÓÐËù¾õ²ì¡£È»¶ø £¬Õâ¿ÉÄÜÊÇÓÉÓÚÎĵµ×ÔÉí²¢Î´Ô̺¬¶ñÒâ´úÂë £¬Ö»ÊÇÓÕµ¼Óû§É¨Ãè¶þάÂë¡£Òò¶ø £¬Óû§Ó¦Ìá¸ß¾¯Ìè £¬¶ÔÓÚÀ´×Ôδ֪·¢¼þÈ˵ĵç×ÓÓʼþ £¬ÓÈÆäÊÇÔ̺¬¸½¼þµÄ £¬¸Ãµ±¼´É¾³ý»òÔÚ´ò¿ªÖ®Ç°ÓëÍøÂçÖÎÀíԱȷÈÏ £¬ÒÔ±£»¤×Ô¼ºÃâÊÜ´ËÀàÍøÂç´¹µö¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/novel-phishing-campaign-uses-corrupted-word-documents-to-evade-security/


3. º«¹ú¾¯·½¿ÛÁôÁùÈË £¬ÉæÏÓÔì×÷º¬DDoS¹¥»÷Ö°ÄÜÎÀÐÇ½Ó¹ÜÆ÷


12ÔÂ2ÈÕ £¬º«¹ú¾¯·½¿ÛÁôÁËÒ»ÃûÊ×ϯִÐйٺÍÎåÃûÔ±¹¤ £¬ËûÃÇÉæÏÓÔì×÷³¬¹ý24Íǫ̀¶ñÒâÎÀÐÇ½Ó¹ÜÆ÷ £¬ÕâЩÉ豸±»Ô¤×°»òºóÀ´¸üÐÂÒÔÔ̺¬DDoS¹¥»÷Ö°ÄÜ¡£¾Ý³Æ £¬ÕâЩ¹¥»÷Ö°ÄÜÊÇΪÁËÕмܾºÕùʵÌåµÄ¹¥»÷ £¬µ«ÏÖʵÉϳ¤¶Ì·¨µÄ £¬ÇÒµ¼ÖÂÉ豸Óû§ÔÚ·Ç×ÔÔ¸µÄÇé¿öϲμÓÁ˹¥»÷ £¬¿ÉÄÜ»áÓöµ½»úÄܽµÂäµÄÇé¿ö¡£´Ó2019Äê1Ôµ½2024Äê9Ô £¬¹²³ö»õÁË24Íǫ̀É豸 £¬ÆäÖÐ98,000̨ԤװÁËDDoSÄ£¿é £¬ÆäÓàͨ¹ý¹Ì¼þ¸üлñµÃ¸ÃÖ°ÄÜ¡£º«¹ú¾¯·½ÔÚÊÕµ½¹ú¼ÊÐ̾¯×éÖ¯µÄµý±¨ºó·¢ÏÖÁËÕâÒ»¶ñÒâ´òËã £¬²¢¿ÛÁôÁËÉæ°¸ÁùÈË £¬ËûÃÇÃæ¶ÔÎ¥·´ÐÅÏ¢Í¨Ñ¶ÍøÂç˾·¨µÄÖ¸¿Ø¡£´Ë±í £¬·¨Ôº»¹ºË×¼¿ÛѺ¸Ã¹«Ë¾µÄ×ʲú £¬²¢³ä¹«Ô¼435ÍòÃÀÔª £¬¹À¼ÆÕâÊǹ«Ë¾Í¨¹ýÏúÊÛ¶ñÒâÉ豸Ëù׬ȡµÄ½ð¶î¡£¶ø²É°ì¸ÃÉ豸µÄ¹«Ë¾²Ù×÷ԱĿǰÈÔåÐÒ£·¨±í £¬º«¹ú¾¯·½ÔÚ×·Çó¹ú¼ÊºÏ×÷ÒÔ×·×ٺͿÛÁôËûÃÇ¡£


https://www.bleepingcomputer.com/news/security/korea-arrests-ceo-for-adding-ddos-feature-to-satellite-receivers/


4. Bootkit¶ñÒâÈí¼þÀûÓÃLogoFAIL·ì϶ϰȾLinuxϵͳ


12ÔÂ2ÈÕ £¬º«¹úBest of the Best (BoB) ÍøÂ簲ȫÅàѵ´òËãµÄѧÉú´´½¨ÁËÒ»ÖÖÃûΪ¡°Bootkitty¡±µÄLinux UEFIÆô¶¯Ì×¼þ £¬¸ÃÌ×¼þÀûÓÃLogoFAIL·ì϶£¨CVE-2023-40238£©¹¥»÷Ò×Êܹ¥»÷µÄÍÆËã»ú¹Ì¼þ¡£¹Ì¼þ°²È«¹«Ë¾BinarlyÓÚ2023Äê11Ô³õ´Î·¢ÏÖLogoFAIL·ì϶ £¬²¢ÖÒ¸æÆäDZÔÚ·çÏÕ¡£Bootkitty×÷ΪÊ׸öרÃÅÕë¶ÔLinuxµÄUEFIÆô¶¯¹¤¾ß°ü £¬Ä¿Ç°ÈÔ´¦ÓÚ¿ª·¢½×¶Î £¬ÖØÒªÓ°ÏìÌØ¶¨µÄUbuntu°æ±¾¡£Ëüͨ¹ýǶÈëBMPÎļþÖеÄshellcode £¬²¢ÀûÓÃMokList±äÌå×¢Èë¶ñÒâÈÏÖ¤ £¬Èƹý°²È«Æô¶¯±£»¤¡£¸Ãbootkit³ö¸ñÕë¶ÔAcer¡¢HP¡¢FujitsuºÍLenovoµÈÆ·ÅÆµÄÍÆËã»ú £¬ÓÈÆäÊÇ»ùÓÚInsydeµÄåÚÏëÉ豸¡£Ö»¹ÜĿǰ½öºÏÓÃÓÚÌØ¶¨Ó²¼þ £¬µ«Ò»Ð©¿í·ºÊ¹ÓõÄÉ豸 £¬ÈçIdeaPad Pro 5-16IRH8¡¢åÚÏëIdeaPad 1-15IRU7µÈ £¬ÈÔÒ×ÊÜLogoFAIL·ì϶¹¥»÷¡£BinarlyÖÒ¸æ³Æ £¬Ö»¹ÜÒÑÓÐÒ»Äê¶à¹¦·ò £¬µ«ºÜ¶àÊÜÓ°Ïì·½ÈÔδ³ä·Ö½â¾öÕâЩ·ì϶»òÕýÈ·²¿Ê𽨸´·¨Ê½¡£ÎªÔ¤·À´ËÀ๥»÷ £¬½¨ÒéÓû§ÏÞ¶ÈÎïÀí½Ó¼û¡¢ÆôÓð²È«Æô¶¯¡¢Ê¹ÓÃÃÜÂë±£»¤UEFI/BIOSÉèÖà £¬²¢´ÓOEM¹Ù·½ÍøÕ¾ÏÂÔØ¹Ì¼þ¸üС£ESETÒÑÈ·ÈÏ £¬¸ÃÏîĿּÔÚÌá¸ß°²È«ÉçÇø¶ÔDZÔÚ·çÏÕµÄÒâʶ £¬²¢¼¤Àø²ÉÈ¡×Ô¶¯·ÀÓù´ëÊ©¡£


https://www.bleepingcomputer.com/news/security/bootkitty-uefi-malware-exploits-logofail-to-infect-linux-systems/


5. SignzyÈ·ÈϲúÉú°²È«ÊÂÎñ £¬Éæ¼°¶à¼Ò¶¥¼¶½ðÈÚ»ú¹¹¿Í»§Êý¾Ý


12ÔÂ2ÈÕ £¬SignzyÊÇÒ»¼ÒΪ¶à¼Ò¶¥¼¶½ðÈÚ»ú¹¹¡¢Ã³Ò×ÒøÐкͽðÈڿƼ¼¹«Ë¾ÌṩÔÚÏßÉí·ÝÑéÖ¤ºÍ¿Í»§ÈëÖ°·þÎñµÄ³ÛÃû¹©¸øÉÌ £¬¸Ã¹«Ë¾È·ÈϲúÉúÁËһ·°²È«ÊÂÎñ¡£Õâ¼Ò×ܲ¿Î»ÓÚ°à¼ÓÂÞ¶ûµÄ²Ý´´¹«Ë¾ÉÏÖÜÔâÓöÁËÍøÂç¹¥»÷ £¬Ö»¹ÜËü»Ø¾øÐ¹Â©ÏêÇé £¬µ«ÐÂÎÅÈËʿй© £¬¸ÃÊÂÎñÉæ¼°¿Í»§Êý¾ÝµÄй¶ £¬ÕâЩÊý¾ÝÔøÔÚÍøÂç·¸×ïÂÛ̳µÄÌû×ÓÖжÌÔݳöÏÖ¡£SignzyΪȫÇò600¶à¼Ò½ðÈÚ»ú¹¹Ìṩ·þÎñ £¬Ô̺¬Ó¡¶ÈËÄ´óÒøÐС£Ó¡¶ÈÍÆËã»úÓ¦¼±ÏìÓ¦Ó××éCERT-InÒѰÑÎȵ½ÕâÒ»ÊÂÎñ £¬²¢ÔÚ²ÉÈ¡Êʵ±Ðж¯¡£ÆäËû¿Í»§ £¬ÈçPayU £¬°µÊ¾ËûÃÇδÊÜÕâ´Î¹¥»÷Ó°Ïì £¬²¢¼á³Æ×Ô¼ºµÄÊý¾ÝÒÀÈ»°²È«¡£SignzyÔÚÒ»·ÝÉêÃ÷Öлؾø¾Í¿Í»§Êý¾ÝÊÇ·ñ±»Ð¹Â¶°ä·¢ÆÀÂÛ £¬µ«°µÊ¾ÒÑÀñƸרҵ»ú¹¹½øÐа²È«ÊÂÎñµ÷²é¡£¸Ã¹«Ë¾µÃµ½ÁËÍòÊ´│µÈ¶à¼ÒͶ×ÊÕßµÄÖ§³Ö £¬²¢Òѽ«´ËÊÂÎñ·î¸æÆä¿Í»§¡¢¼à¹Ü»ú¹¹ºÍÀûÒæÓйØÕß¡£È»¶ø £¬µ±±»Îʼ°ÊÇ·ñÓëÓ¡¶ÈÑëÐÐÓйý½Ó´¥Ê± £¬Signzy°µÊ¾Ã»ÓйµÍ¨ £¬¶øÓ¡¶ÈÑëÐÐҲδ»ØÓ¦ÖÃÆÀÒªÇó¡£


https://techcrunch.com/2024/12/02/indian-online-id-verification-firm-signzy-confirms-security-incident/


6. È«Çò·¨ÂÉÐж¯¡°HAECHI-V¡±¿ÛÁô5500¶àÈË £¬½É»ñ4ÒÚÃÀÔª×ʲú


12ÔÂ2ÈÕ £¬¹ú¼Ê·¨ÂÉÐж¯¡°HAECHI-V¡±ÔÚ2024Äê7ÔÂÖÁ11ÔÂÆÚ¼ä £¬Éæ¼°40¸ö¹ú¶È £¬³É¹¦¿ÛÁôÁË5500¶àÃûÏÓÒÉÈË £¬²¢²é»ñÁË4ÒÚ¶àÃÀÔª×ʲú¡£Õâ´ÎÐж¯ÖØÒªÕë¶ÔÍøÂç´¹µö¡¢°®ÇéȦÌס¢ÐÔÀÕË÷¡¢Í¶×Êڲƭ¡¢ÔÚÏß´ò¶ÄµÈ¶àÖÖÍøÂçڲƭÐÐΪ¡£ÆäÖÐ £¬º«¹úºÍÖйúµ±¾Öµ·»ÙÁËÒ»¸öÔì³É11ÒÚÃÀÔªËðʧµÄÓïÒô´¹µö¼¯ÍÅ £¬¿ÛÁô27È˲¢¸æ×´19ÈË¡£¹ú¼ÊÐ̾¯×éÖ¯»¹°ä²¼ÁË×ÏÉ«¹«¸æ £¬ÖÒ¸æÉæ¼°¼ÓÃÜÇ®±ÒµÄÐÂÐËڲƭ»î¶¯ £¬³ö¸ñÊÇ¡°USDT´ú±ÒºË׼ȦÌס±¡£Í¬Ê± £¬¹ú¼ÊÐ̾¯×éÖ¯ÓëÀ´×Ô80¶à¸ö¹ú¶ÈµÄ·¨ÂÉ»ú¹¹¼ÓÇ¿ÁËÀ¹½Ø±»µÁ×ʽ𹤾ßI-GRIPµÄʹÓà £¬ÐÂ¼ÓÆÂ¾¯·½ÀûÓøù¤¾ß³É¹¦×èÖ¹ÁËÒ»±Ê3930ÍòÃÀÔªµÄתÕË¡£´Ë±í £¬¹ú¼ÊÐ̾¯×éÖ¯»¹ÔÚ·ÇÖÞ19¸ö¹ú¶È·¢Õ¹ÁË¡°ÈûÂ׸ǵÙÐж¯¡± £¬¿ÛÁô1006ÃûÏÓÒÉÈË £¬µ·»Ù¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç134089¸ö¡£ÔÚ¡°Ð­Í¬¶þºÅÐж¯¡±ÖÐ £¬¹ú¼ÊÐ̾¯×éÖ¯Óë˽Ӫ²¿ÃźÏ×÷ͬ°éºÍ95¸ö¹ú¶È¹²Í¬²ð³ýÁË22000¶ą̀ÓëÍøÂç·¸×ï»î¶¯ÓйصĶñÒâ·þÎñÆ÷¡£¹ú¼ÊÐ̾¯×éÖ¯ÃØÊ鳤°µÊ¾ £¬ÍøÂç·¸×ïµÄÎÞ¹ú½çÐÔÒâζ׏ú¼Ê¾¯Ô±ºÏ×÷ÖÁ¹Ø³ÁÒª £¬Ö»ÓÐͨ¹ý¹²Í¬ÖÂÁ¦ £¬ÄÜÁ¦ÈÃÏÖʵÊÀ½çºÍÊý×ÖÊÀ½çÔ½·¢°²È«¡£


https://securityaffairs.com/171593/cyber-crime/operation-haechi-v-5500-arrests.html