¶íÂÞ˹ÍþвÐÐΪÕßÀûÓÃSignal¡°Á´½ÓÉ豸¡±Ö°ÄÜÌáÒéÍøÂç´¹µö¹¥»÷

°ä²¼¹¦·ò 2025-02-20

1. ¶íÂÞ˹ÍþвÐÐΪÕßÀûÓÃSignal¡°Á´½ÓÉ豸¡±Ö°ÄÜÌáÒéÍøÂç´¹µö¹¥»÷


2ÔÂ19ÈÕ£¬¶íÂÞ˹ÍþвÐÐΪÕß½üÆÚƵÈÔÀûÓÃSignalÐÂÎÅÀûÓ÷¨Ê½µÄ¡°Á´½ÓÉ豸¡±Ö°ÄܽøÐÐÍøÂç´¹µö»î¶¯£¬ÊÔͼδ¾­ÊÚȨ½Ó¼ûÖ¸±êÕË»§¡£¾Ý¹È¸èÍþвµý±¨Ó××飨GTIG£©»ã±¨£¬´Ë¼¼ÊõÒѳÉΪ¶íÂÞ˹ÈëÇÖSignalÕË»§µÄ×îÐÂÇÒ¿í·º¼¿Á©¡£¹¥»÷Õßͨ¹ý´´½¨¶ñÒâ¶þάÂ룬ÓÕÆ­Êܺ¦ÕßɨÃ裬ʵÏÖSignalÐÂÎÅÓë¹¥»÷ÕßÉ豸µÄͬ²½£¬ÎÞÐè·ÛËéÖ¸±êÉ豸¼´¿É¼à¿Ø¶Ô»°¡£ÕâЩ¹¥»÷»áƾ¾ÝÖ¸±êÀàÐ͵÷ÕûÕ½Êõ£¬¼Ù×°³ÉºÏ·¨ÀûÓÃ×ÊÔ´»òÉ豸Åä¶ÔÖ¸ÁÉõÖÁ¶¨ÔìÍøÂç´¹µöÒ³Ãæ¡£³ôÃûÔ¶ÑïµÄ¶íÂÞ˹ºÚ¿Í×éÖ¯SandwormҲѡȡ´Ë²½Öè¡£GTIG»¹¹Û²ìµ½£¬¹¥»÷Õß»áÅú¸ÄºÏ·¨Èº×éÔ¼ÇëÒ³Ãæ£¬½«Æä³Á¶¨Ïòµ½¶ñÒâURL£¬½«Ö¸±êÕË»§Ïνӵ½¹¥»÷ÕßÉ豸¡£´Ë±í£¬Óë¶íÂÞ˹ÓйصÄÍþвÐÐΪÕß»¹Ê¹ÓÃרÃÅΪ¹¥»÷ÎÚ¿ËÀ¼¾üÊÂÈËÔ±´´½¨µÄSignalÍøÂç´¹µö¹¤¾ß°ü¡£GTIGÖ¸³ö£¬¶íÂÞ˹ºÍ°×¶íÂÞ˹»¹Ê¹ÓöàÖÖ¹¤¾ß´ÓSignalÀûÓ÷¨Ê½Êý¾Ý¿âÎļþÖÐËÑË÷ºÍÍøÂçÐÂÎÅ¡£×êÑÐÈËԱǿµ÷£¬Signal²¢·ÇΨһÊܹØ×¢µÄÐÂÎÅÀûÓ÷¨Ê½£¬ÀàËÆ¹¥»÷Ò²Õë¶ÔWhatsAppµÈ¡£´ËÀàÉ豸Á´½Ó¹¥»÷ÄÑÒÔ·À±¸£¬Ò»µ©³É¹¦¿ÉÄܳ¤¹¦·ò²»±»¾õ²ì¡£Òò¶ø£¬½¨ÒéSignalÓû§¸üÐÂÖÁ×îа汾£¬²¢²ÉÈ¡¸´ÔÓÃÜÂë¡¢ÆÁÄ»Ëø¡¢¶¨ÆÚ²é³­Á´½ÓÉ豸ÁÐ±í¡¢ÉóÉ÷ɨÃè¶þάÂë¼°ÆôÓÃË«³É·ÖÉí·ÝÑéÖ¤µÈ´ëÊ©¼ÓÇ¿°²È«ÐÔ¡£


https://www.bleepingcomputer.com/news/security/russian-phishing-campaigns-exploit-signals-device-linking-feature/


2. GhostÀÕË÷Èí¼þÈ«ÇòËÁŰ£¬CISAÓëFBI°ä²¼½áºÏ·ÀÓùÖ¸ÄÏ


2ÔÂ19ÈÕ£¬CISAºÍFBI½áºÏ°ä²¼²¼¸æ³Æ£¬GhostÀÕË÷Èí¼þ¹¥»÷ÕßÒѶÔÈ«Çò70¶à¸ö¹ú¶ÈµÄ¶à¸öÐÐÒµÖ´Ðй¥»÷£¬Ô̺¬¹Ø¼ü»ù´¡ÉèÊ©×éÖ¯¡¢Ò½ÁƱ£½¡¡¢µ±¾Ö¡¢½ÌÓý¡¢¿Æ¼¼¡¢Ôì×÷Òµ¼°¶à¶àÖÐÓ×ÐÍÆóÒµ¡£×Ô2021ËêÊ×£¬ÕâЩ¹¥»÷Õ߯ðÍ·Õë¶ÔÔËÐйýÆÚ°æ±¾Èí¼þºÍ¹Ì¼þµÄ»¥ÁªÍø·þÎñ½øÐÐÎÞ²î¾à¹¥»÷¡£GhostÀÕË÷Èí¼þ×é֯ƵÈÔ¸ü¸ÄÆä¶ñÒâÈí¼þ¡¢ÎļþÀ©´óÃûºÍÀÕË÷֪ͨÄÚÈÝ£¬µ¼ÖÂÆä¹éÊôÄÑÒÔÈ·¶¨¡£¸Ã×éÖ¯ÀûÓù«¿ª´úÂë¹¥»÷Ò×Êܹ¥»÷µÄ·þÎñÆ÷£¬³ö¸ñ¹Ø×¢Fortinet¡¢ColdFusionºÍExchangeÖеÄ佨²¹·ì϶¡£Îª·ÀÓù´ËÀ๥»÷£¬½¨ÒéÍøÂç·ÀÓùÕß²ÉÈ¡ÒìµØÏµÍ³±¸·Ý¡¢¾¡¿ì½¨²¹·ì϶¡¢¸ôÀëÍøÂç¡¢Ö´Ðжà³É·ÖÉí·ÝÑéÖ¤µÈ´ëÊ©¡£´Ë±í£¬GhostÀÕË÷Èí¼þ¹¥»÷Õß»¹ÀûÓÃCVE-2018-13379µÈ·ì϶½øÐгõʼ½Ó¼û£¬¸Ã·ì϶Ҳ±»¹ú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯ÓÃÓÚ¹¥»÷Ò×Êܹ¥»÷µÄFortinet SSL VPNÉ豸ºÍÃÀ¹úÑ¡¾ÙÖ§³Öϵͳ¡£CISA¡¢FBIºÍMS-ISAC°ä²¼µÄ½áºÏÕ÷ѯÌṩÁËÓëÏÈǰGhostÀÕË÷Èí¼þ»î¶¯ÓйصÄÍ×Эָ±ê¡¢Õ½Êõ¡¢¼¼ÊõºÍ·¨Ê½ÒÔ¼°¼ì²â²½Öè¡£


https://www.bleepingcomputer.com/news/security/cisa-and-fbi-ghost-ransomware-breached-orgs-in-70-countries/


3. TA2726ÓëTA2727ÁªÊÖÍÆ¹ãFrigidStealer¶ñÒâÈí¼þ


2ÔÂ19ÈÕ£¬½üÆÚ£¬ÍøÂç·¸×ï×éÖ¯TA2726ÓëTA2727ÁªÊÖ·¢Õ¹ÁËÒ»ÏîÃûΪFakeUpdateµÄ¶ñÒâÈí¼þ»î¶¯£¬ÍƹãÕë¶ÔmacOSµÄÐÂÐÍÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þFrigidStealer¡£¸Ã»î¶¯Ò²Éæ¼°WindowsºÍAndroidƽ̨µÄ¹¥»÷¡£TA2726×÷ΪÁ÷Á¿·Ö·¢Õߣ¬ÀûÓÃKeitaro TDSÏòÆäËû·¸×ï·Ö×ÓÏúÊÛÁ÷Á¿£¬¶øTA2727ÔòÕÆ¹Ü·Ö·¢¶ñÒâÈí¼þ£¬Ô̺¬ºÏÓÃÓÚ·ÖÆç²Ù×÷ϵͳµÄLumma Stealer¡¢MarcherºÍFrigidStealer¡£ÔÚÕâ´Î»î¶¯ÖУ¬ÍþвÐÐΪÕßͨ¹ý×¢Èë¶ñÒâJavaScriptµ½ÍøÕ¾HTMLÖУ¬ÏÔʾÐéαµÄä¯ÀÀÆ÷¸üÐÂÐÂÎÅ£¬ÓÕµ¼Óû§ÏÂÔØ²¢Ö´ÐмÙ×°³É¸üеĶñÒâÎļþ¡£MacÓû§ÐèÊÖ¶¯Æô¶¯ÏÂÔØ²¢ÊäÈëÃÜÂëÒÔÈÆ¹ýGatekeeper±£»¤¡£FrigidStealer¶ñÒâÈí¼þ¿ÉÄÜÇÔÈ¡´æ´¢ÔÚSafari»òChromeÖеÄcookie¡¢µÇ¼ʹ´¦¡¢ÃÜÂë¡¢¼ÓÃÜÇ®°üÍ´´¦¡¢Apple NotesÖеÄÃô¸ÐÐÅÏ¢ÒÔ¼°Óû§Ö÷Ŀ¼ÖеÄÎĵµ¡£±»µÁÊý¾Ý±»Ñ¹Ëõºóй¶ÖÁ¶ñÒâÈí¼þµÄC2µØÖ·¡£ÐÅÏ¢ÇÔÈ¡»î¶¯ÒѳÉΪһÏî´ó¹æÄ£µÄÈ«ÇòÐж¯£¬¶ÔÓ×ÎÒºÍ×éÖ¯Ôì³É¸²ÃðÐÔ¹¥»÷¡£ÎªÔ¤·ÀϰȾ£¬Óû§²»Ó¦Ö´ÐÐÍøÕ¾ÌáÐѵĺÅÁî»òÏÂÔØ£¬ÓÈÆäÊÇÄÇЩ¼Ù×°Êǽ¨¸´¡¢¸üлòÑéÖ¤ÂëµÄÄÚÈÝ¡£ÒÑϰȾµÄÓû§Ó¦ÔÚÿ¸öÍøÕ¾Éϸü¸ÄÃÜÂë¡£


https://www.bleepingcomputer.com/news/security/new-frigidstealer-infostealer-infects-macs-via-fake-browser-updates/


4. °Ä´óÀûÑÇÉúÓý·þÎñ¾ÞÍ· Genea Ôâ·êÍøÂçÈëÇÖ


2ÔÂ19ÈÕ£¬°Ä´óÀûÑÇÉúÓý·þÎñÌṩÉÌGeneaÔâ·êÍøÂçÈëÇÖÊÂÎñ£¬Î´Öª¹¥»÷Õß½Ó¼ûÁËÆäϵͳÉϵÄÊý¾Ý¡£GeneaÔÚ¼ì²âµ½¿ÉÒɻºó½ô¼¹Ø¹¿ªµ÷²é£¬²¢È·ÈÏδ¾­ÊÚȨµÄµÚÈý·½ÒѽӼûÆäÊý¾Ý£¬µ«ÉÐδÃ÷È·±»½Ó¼ûÊý¾ÝµÄÐÔÖʺÍÁìÓò£¬ÒÔ¼°ÊÇ·ñÉæ¼°Ó×ÎÒÐÅÏ¢¡£GeneaÕýÖÂÁ¦¸´Ô­·þÎñÆ÷ÒÔ½ÚÔì·ì϶²¢±£»¤ÏµÍ³£¬Í¬Ê±Ïò»¼Õß±£ÕϽ«¾¡×îÓ×ˮƽ×ÌÈÅÆäÒ½ÖΣ¬²¢³ÐŵÔÚ·¢ÏÖÓ×ÎÒÐÅÏ¢ÊÜÓ°ÏìʱÓëÓйØÓ×ÎÒ¹µÍ¨¡£Õâ´ÎÊÂÎñµ¼ÖÂGeneaµÄµç»°·þÎñºÍMyGeneaÀûÓ÷¨Ê½ÖжÏ¡£GeneaÊǰĴóÀûÑÇ×î´óµÄÉúÓý·þÎñÌṩÉÌÖ®Ò»£¬ÔÚÈ«¹ú¶à¸öµØÓòÉèÓÐÉúÓýÕïËù£¬Ìṩ¶àÖÖ·þÎñ¡£¾Ý°Ä´óÀûÑǹú¶È¹ã²¥¹«Ë¾±¨Â·£¬GeneaÓë¸ÃÐÐÒµµÄÁí±íÁ½¼Ò¹«Ë¾Õ¼¾ÝÁ˸ùú¸ÃÐÐÒµ×ÜÊÕÈëµÄ80%ÒÔÉÏ¡£BleepingComputerÊÔͼÁªÏµGenea½²»°È˵«Î´»ñµ±¼´»ØÓ¦¡£


https://www.bleepingcomputer.com/news/security/australian-fertility-services-giant-genea-hit-by-security-breach/


5. Pegasus¼äµýÈí¼þϰȾÁìÓòÀ©´ó£¬ÆóÒµ¸ß¹Ü³ÉÐÂÖ¸±ê


2ÔÂ19ÈÕ£¬Òƶ¯É豸°²È«¹«Ë¾iVerify×îз¢ÏÖ£¬×³´óµÄÁãµã»÷¼äµýÈí¼þPegasusµÄʹÓÃÁìÓò±ÈÎÒÃÇ֮ǰËùÖªµÄÔ½·¢¿í·º£¬²»½öÓ°ÏìÃñ¼äÉç»á³ÉÔ±£¬»¹ÆðÍ·Ó°ÏìÆóÒµ¸ß¹Ü¡£½öÔÚ12Ô·Ý£¬iVerify²âÊÔµÄ18,000̨¶ÀÁ¢É豸ÖУ¬¾ÍÓÐ11̨¼ì²âµ½ÁËPegasus¼äµýÈí¼þ¡£ÐÂÈ·ÈϵÄÊܺ¦ÕßÀ´×Ô˽ӪÐÐÒµ£¬Ô̺¬·¿µØ²ú¡¢ÎïÁ÷ºÍ½ðÈÚµÈÁìÓò£¬Ö»ÓÐÒ»ÃûÊÇÅ·ÖÞµ±¾Ö¹ÙÔ±¡£PegasusÓÉÒÔÉ«Áй«Ë¾NSO GroupÔì×÷£¬Ö»¹Ü¸Ã¹«Ë¾¼á³ÆÆä²úÆ·Ö»Âô¸øÕë¶Ô×ï·¸ºÍ¿Ö²À·Ö×ÓÈ·µ±¾Ö£¬µ«PegasusÒÑÂŴγʴ˿ÌÃñ¼äÉç»áºÍÆóÒµ¸ß¹ÜµÄÊÖ»úÖС£ÆóÒµ¸ß¹ÜÄܹ»½Ó´¥µ½¹«Ë¾°ÂÃØ´òËãºÍ²ÆÕþÊý¾Ý£¬ÕâʹµÃËûÃdzÉΪPegasus¹¥»÷µÄÐÂÖ¸±ê£¬Îª¼äµýÈí¼þΣ»úÔöÌíÁËеÄά¶È¡£iVerifyµÄɨÃè»áѰÕÒ¶ñÒâÈí¼þÌØµã£¬²¢ÒÀ¸½»úе½ø½¨²éÕÒϰȾ¼£Ïó£¬ÐÂ×êÑнöÔ̺¬Ï°È¾PegasusµÄÊÖ»úÁ˾Ö¡£¾ÝiVerify½áºÏÊ×´´È˰µÊ¾£¬ÊÀ½çÈÔδ×öºÃÓ¦¶Ô´ËÀàÍþвµÄ³ï±¸£¬ÇÒÖ»ÓÐÒ»°ëµÄϰȾÓû§ÊÕµ½ÁËÆ»¹ûµÄÍþв֪ͨ¡£


https://therecord.media/pegasus-spyware-infections-iverify


6. WordPress²å¼þ·ì϶µ¼Ö³¬9ÍòÍøÕ¾ÊÜÓ°Ïì


2ÔÂ19ÈÕ£¬°²È«×êÑÐÈËÔ±·¢ÏÖ£¬³¬¹ý90,000¸öÍøÕ¾Ê¹ÓõÄJupiter X Core WordPress²å¼þ´æÔÚÒ»¸öÑϳÁ·ì϶£¬ÔÊÐíÓµÓй±Ï×ÕßȨÏÞ»ò¸ü¸ßȨÏ޵Ĺ¥»÷ÕßÉÏ´«¶ñÒâSVGÎļþ²¢ÔÚ·þÎñÆ÷ÉÏÖ´ÐÐÔ¶³Ì´úÂë¡£¸Ã·ì϶µÄCVSSÆÀ·ÖΪ8.8£¨¸ß£©£¬Ô´ÓÚ¶ÔSVGÎļþÉÏ´«µÄ²»µ±ËãÕÊÒÔ¼°²å¼þ¶Ôget_svg()º¯ÊýµÄʹÓ᣹¥»÷ÕßÄܹ»ÉÏ´«Ô̺¬PHP´úÂëµÄÌØÔìSVGÎļþ£¬²¢Í¨¹ý½áºÏ¸Ãº¯ÊýÖеķì϶ÔÚ·þÎñÆ÷ÉÏÖ´ÐжñÒâÎļþ£¬´Ó¶øÈƹý½Ó¼û½ÚÔì¡¢»ñÈ¡Ãô¸ÐÊý¾Ý»òʵÏÖ´úÂëÖ´ÐС£¸Ã·ì϶ÓÚ2025Äê1ÔÂ6ÈÕ±»»ã±¨£¬²å¼þ¿ª·¢ÉÌArtbeesÓÚ1ÔÂ29ÈÕ°ä²¼²¹¶¡½â¾öÁ˸ÃÎÊÌâ¡£½¨ÒéJupiter X CoreÓû§µ±¼´¸üÐÂÖÁ4.8.8°æ±¾£¬²¢²ÉÈ¡×Ô¶¯´ëÊ©ÈçÆôÓÃ×Ô¶¯¸üС¢¶¨ÆÚÉóºË²¢É¾³ýδʹÓûò¹ýÆÚµÄ²å¼þÒÔÏ÷¼õ¹¥»÷Ãæ¡£


https://www.infosecurity-magazine.com/news/wordpress-plugin-flaw-exposes/