¹È¸èÐÞ¸´ÆäÔÆÆ½Ì¨ÖпÉÒþ²Ø¶ñÒâÈí¼þµÄGhostTokenÎó²î

Ðû²¼Ê±¼ä 2023-04-24

1¡¢¹È¸èÐÞ¸´ÆäÔÆÆ½Ì¨ÖпÉÒþ²Ø¶ñÒâÈí¼þµÄGhostTokenÎó²î


¾ÝýÌå4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬¹È¸èÔÆÆ½Ì¨(GCP)Öб£´æÒ»¸öGhostTokenÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâÓ¦Óøü¸ÄΪ²»¿É¼ûÇÒ²»¿Éɾ³ý¡£¡£¡£ ¡£¡£Astrix SecurityÓÚ2022Äê6Ô²¢Ïò¹È¸è±¨¸æÁËÕâÒ»Îó²î£¬£¬£¬£¬£¬£¬£¬£¬¹È¸èÔÚ2023Äê4ÔÂÐû²¼Á˲¹¶¡¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿É±»¹¥»÷ÕßÓÃÀ´Í¨¹ý½«ÒÑÊÚȨµÄµÚÈý·½Ó¦ÓÃת»»Îª¶ñÒâľÂíÓ¦Ó㬣¬£¬£¬£¬£¬£¬£¬´Ó¶ø»ñµÃÄ¿µÄGoogleÕÊ»§µÄÓÀÊÀÇÒ²»¿ÉÒÆ³ýµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬£¬È»ºóй¶ĿµÄµÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£ ¡£¡£Õâ¿ÉÄܰüÀ¨´æ´¢ÔÚGmail¡¢Drive¡¢DocsºÍPhotosµÈ¹È¸èÓ¦ÓÃÖеÄÊý¾Ý¡£¡£¡£ ¡£¡£ 


https://www.bleepingcomputer.com/news/security/ghosttoken-gcp-flaw-let-attackers-backdoor-google-accounts/


2¡¢SymantecÅû¶Õë¶ÔÎ÷Å·»ù´¡ÉèÊ©µÄX_Trader¹©Ó¦Á´¹¥»÷


4ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬SymantecÅû¶ÁËÕë¶ÔÎ÷Å·Òªº¦»ù´¡ÉèÊ©×éÖ¯µÄX_Trader¹©Ó¦Á´¹¥»÷¡£¡£¡£ ¡£¡£µ¼ÖÂÉϸöÔÂ3CXÇå¾²ÊÂÎñµÄX_TraderÈí¼þ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬»¹Ó°ÏìÁËλÓÚÃÀ¹úºÍÅ·ÖÞµÄÄÜÔ´ÁìÓòµÄÁ½¸öÒªº¦»ù´¡ÉèÊ©×éÖ¯¡£¡£¡£ ¡£¡£¹¥»÷ÕßʹÓÃľÂí»¯X_Trader×°ÖóÌÐò£¬£¬£¬£¬£¬£¬£¬£¬½«VEILEDSIGNAL¶à½×¶ÎÄ£¿ £¿£¿£¿£¿£¿é»¯ºóÃÅ×°Öõ½Ä¿µÄϵͳÉÏ¡£¡£¡£ ¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔÖ´ÐжñÒâshellcode»ò½«Í¨Ñ¶Ä£¿ £¿£¿£¿£¿£¿é×¢ÈëÔÚ±»¹¥»÷ϵͳÉÏÔËÐеÄChrome¡¢Firefox»òEdgeÀú³Ì¡£¡£¡£ ¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬£¬£¬ÉÐÓÐÁ½¸öÉæ¼°½ðÈÚÉúÒâµÄ×éÖ¯Ò²Ôâµ½¹¥»÷¡£¡£¡£ ¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain


3¡¢Ç°CFPBÔ±¹¤½«Áè¼Ý25ÍòÏûºÄÕßµÄÐÅϢת·¢µ½Ð¡ÎÒ˽¼ÒÓÊÏä


¾Ý4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÏûºÄÕß½ðÈÚ±£»£»£»£»¤¾Ö(CFPB)Åû¶ÁËÒ»ÆðÉæ¼°256000ÈËÐÅÏ¢µÄй¶ÊÂÎñ¡£¡£¡£ ¡£¡£CFPBµÄÔ±¹¤Í¸Â¶£¬£¬£¬£¬£¬£¬£¬£¬ËûÃÇ·¢Ã÷һǰԱ¹¤ÓÃ14·â²î±ðµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬£¬½«Ô¼Äª25.6ÍòÃûÏûºÄÕߵļͼºÍԼĪ50¼Ò»ú¹¹µÄî¿ÏµÐÅϢת·¢µ½Ð¡ÎÒ˽¼Òµç×ÓÓʼþÕË»§¡£¡£¡£ ¡£¡£ÕâÃûÔ±¹¤Òѱ»ÆÈÁîɾ³ýÕâЩµç×ÓÓʼþ²¢Ìṩ֤¾Ý֤ʵËüÃÇÒѱ»É¾³ý£¬£¬£¬£¬£¬£¬£¬£¬µ«¹Ù·½Ö¤ÊµÕâ¸ÃÔ±¹¤ÉÐδ×ñÊØ¡£¡£¡£ ¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã»ú¹¹ÈÔÔÚÊÓ²ì´ËÊÂÎñ¡£¡£¡£ ¡£¡£


https://www.infosecurity-magazine.com/news/cfpb-employee-sends-consumers-data/


4¡¢ESET·¢Ã÷¶þÊÖÊг¡Öдó×ÚÆóÒµ¼¶ÍøÂç×°±¸°üÀ¨Ãô¸ÐÐÅÏ¢


¾ÝýÌå4ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬¶þÊÖÊг¡ÉÏµÄÆóÒµ¼¶ÍøÂç×°±¸°üÀ¨¿É±»ºÚ¿ÍÓÃÀ´ÈëÇÖÆóҵϵͳ»ò»ñÈ¡¿Í»§ÐÅÏ¢µÄÃô¸ÐÊý¾Ý¡£¡£¡£ ¡£¡£ESETÑо¿Ö°Ô±¹ºÖÃÁË18̨¶þÊÖ½¹µã·ÓÉÆ÷£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÆäÖÐÒ»°ëÒÔÉÏÄÜÕý³£ÊÂÇéµÄ·ÓÉÆ÷ÈÔÈ»¿ÉÒÔ»á¼ûËùÓÐÉèÖÃÊý¾Ý¡£¡£¡£ ¡£¡£Ò»Ð©Â·ÓÉÆ÷±£´æÁ˿ͻ§ÐÅÏ¢ºÍÔÊÐíµÚÈý·½ÅþÁ¬µ½ÍøÂçµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬ÉõÖÁ°üÀ¨×÷Ϊ¿ÉÐÅ·½ÅþÁ¬µ½ÆäËûÍøÂçµÄƾ֤¡£¡£¡£ ¡£¡£Æ¾Ö¤Â·ÓÉÆ÷ÖÐϸ½Ú£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖÐһЩ·ÓÉÆ÷´¦ÓÚÍйÜITÌṩÉ̵ÄÇéÐÎÖУ¬£¬£¬£¬£¬£¬£¬£¬ÉÐÓÐһ̨ÉõÖÁÊôÓÚMSSP¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±¹ØÓÚÕâÖÖÇéÐεĽ¨ÒéÊÇ£¬£¬£¬£¬£¬£¬£¬£¬ÕûÀíÉè±¹ØÁ¬ÄÃô¸ÐÊý¾Ý²¢½«Æä»Ö¸´µ½³ö³§Ä¬ÈÏ״̬¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-can-breach-networks-using-data-on-resold-corporate-routers/


5¡¢Unit 42³ÆÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÄ¿³ÊÉÏÉýÇ÷ÊÆ


Unit 42ÔÚ4ÔÂ20ÈÕ͸¶£¬£¬£¬£¬£¬£¬£¬£¬ÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÄ¿³ÊÉÏÉýÇ÷ÊÆ¡£¡£¡£ ¡£¡£´Ó2022Äê11Ôµ½2023Äê4ÔÂÉÏÑ®£¬£¬£¬£¬£¬£¬£¬£¬ÓëChatGPTÏà¹ØÓòµÄÿÔÂ×¢²áÁ¿ÔöÌíÁË910%£¬£¬£¬£¬£¬£¬£¬£¬Ïà¹ØÇÀ×¢ÓòÃûÔöÌíÁË17818%¡£¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬ÌìÌìÓжà´ï118¸öÓëChatGPTÓйصĶñÒâURL±»¼ì²âµ½¡£¡£¡£ ¡£¡£Ñо¿·¢Ã÷¶à¸öÊÔͼð³äOpenAI¹Ù·½ÍøÕ¾µÄ´¹ÂÚURL¡£¡£¡£ ¡£¡£Í¨³££¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õ߻ὨÉèÒ»¸öÓëChatGPT¹ÙÍøºÜÏñµÄÐéÎ±ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬£¬È»ºóÓÕÆ­Óû§ÏÂÔØ¶ñÒâÈí¼þ»ò¹²ÏíÃô¸ÐÐÅÏ¢¡£¡£¡£ ¡£¡£


https://unit42.paloaltonetworks.com/chatgpt-scam-attacks-increasing/


6¡¢FortinetÐû²¼¹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄÆÊÎö±¨¸æ


4ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬FortinetÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£¡£¸Ã¹¤¾ßÓÉKodex¹«Ë¾¿ª·¢£¬£¬£¬£¬£¬£¬£¬£¬Éù³ÆÊÇÒ»¿î½ÌÓý¹¤¾ß¡£¡£¡£ ¡£¡£ÒÔÿÔÂ59ÃÀÔªµÄ¼ÛÇ®³öÊÛ£¬£¬£¬£¬£¬£¬£¬£¬¾ßÓÐÆß¸ö¹¥»÷Ä£¿ £¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÀÕË÷Èí¼þ¡¢Æ¾Ö¤ÇÔÈ¡ºÍWindows Defender¡£¡£¡£ ¡£¡£Ñо¿Åú×¢£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢µØ½«ÆäÓÃ×÷ÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£¡£¡£ ¡£¡£EvilExtractorµÄ¹¥»÷»î¶¯ÓÚ½ñÄê3ÔÂÏÔÖøÔöÌí£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýαװ³ÉÕË»§È·ÈÏÇëÇóµÄ´¹ÂÚÓʼþ¾ÙÐзַ¢£¬£¬£¬£¬£¬£¬£¬£¬´ó´ó¶¼±»¹¥»÷Ä¿µÄλÓÚÅ·ÖÞºÍÃÀ¹ú¡£¡£¡£ ¡£¡£


https://www.fortinet.com/blog/threat-research/evil-extractor-all-in-one-stealer