Telegram ÐÞ¸´ÓÃÓÚÆô¶¯ Python ¾ç±¾µÄ Windows Ó¦ÓóÌÐòÁãÈÕÎó²î

Ðû²¼Ê±¼ä 2024-04-15
1. Telegram ÐÞ¸´ÓÃÓÚÆô¶¯ Python ¾ç±¾µÄ Windows Ó¦ÓóÌÐòÁãÈÕÎó²î


4ÔÂ12ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬Telegram ÐÞ¸´ÁËÆä Windows ×ÀÃæÓ¦ÓóÌÐòÖеÄÒ»¸öÁãÈÕÎó²î£¬£¬ £¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÓÃÓÚÈÆ¹ýÇå¾²ÖÒÑÔ²¢×Ô¶¯Æô¶¯ Python ¾ç±¾¡£¡£¡£¡£¡£ÒÑÍù¼¸Ì죬£¬ £¬£¬£¬£¬£¬£¬  ÓÐ¹Ø Windows °æ Telegram ÖÐÉæÏÓÔ¶³Ì´úÂëÖ´ÐÐÎó²îµÄÒ¥ÑÔÔÚ X ºÍºÚ¿ÍÂÛ̳ÉÏÈö²¥¡£¡£¡£¡£¡£ËäÈ»ÆäÖÐһЩÌû×ÓÉù³ÆÕâÊÇÒ»¸öÁãµã»÷ȱÏÝ£¬£¬ £¬£¬£¬£¬£¬£¬µ«ÑÝʾËùνµÄÇå¾²ÖÒÑÔÈÆ¹ýºÍ RCE Îó²îµÄÊÓÆµÇåÎúµØÏÔʾÓÐÈ˵ã»÷¹²ÏíýÌåÀ´Æô¶¯ Windows ÅÌËãÆ÷¡£¡£¡£¡£¡£Telegram Desktop ¿Í»§¶Ë»á¸ú×Ù  ÓëΣº¦Îļþ£¨ÀýÈç¿ÉÖ´ÐÐÎļþ£©Ïà¹ØµÄ ÎļþÀ©Õ¹ÃûÁбí¡£¡£¡£¡£¡£µ±ÓÐÈËÔÚ Telegram Öз¢ËÍÆäÖÐÒ»ÖÖÎļþÀàÐÍ£¬£¬ £¬£¬£¬£¬£¬£¬²¢ÇÒÓû§µ¥»÷¸ÃÎļþʱ£¬£¬ £¬£¬£¬£¬£¬£¬Telegram Ê×ÏÈ»áÏÔʾÒÔÏÂÇå¾²ÖÒÑÔ£¬£¬ £¬£¬£¬£¬£¬£¬¶ø²»ÊÇÔÚ Windows ÖеĹØÁª³ÌÐòÖÐ×Ô¶¯Æô¶¯¡£¡£¡£¡£¡£ÈôÊǹ¥»÷ÕßÄܹ»ÓÕÆ­Ä¿µÄ·­¿ªÎļþ£¬£¬ £¬£¬£¬£¬£¬£¬Õ⽫ÓÐÓõØÔÊÐí¹¥»÷ÕßÈÆ¹ýÇå¾²ÖÒÑÔ²¢ÔÚÄ¿µÄµÄ Windows ×°±¸ÉÏÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/telegram-fixes-windows-app-zero-day-used-to-launch-python-scripts/


2. ·¨¹ú¶à¸öÊÐÕþ¸®µÄ¹²ÏíЧÀÍÆ÷Ôâµ½´ó¹æÄ£ÍøÂç¹¥»÷


4ÔÂ12ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬Ê¥ÄÉÔó¶ûÊгƣ¬£¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÈÔÔÚ¼ÌÐø¡£¡£¡£¡£¡£¡°ÕâÁ½¸öÉçÇøµÄЧÀÍÎÞ·¨Õý³£ÔËÐУ¬£¬ £¬£¬£¬£¬£¬£¬¡±¸ÃÊÐÔÚÒ»·Ý¾¯±¨ÖиæËßסÃñ£¬£¬ £¬£¬£¬£¬£¬£¬Ö¸µÄÊÇÊ¥ÄÉÔó¶ûÊкÍÊ¥ÄÉÔó¶û³ÇÇø¡£¡£¡£¡£¡£ÆäËûÊÜÓ°ÏìµÄ¶¼»á°üÀ¨ÃÉͼÍß²¼ÁÐËþÄá¡¢¶«ÈÕ¡¢À­É³ÅåÀÕµÂÂêÀ³ºÍ²¨¶ûÄáʲ£¬£¬ £¬£¬£¬£¬£¬£¬ÒÔ¼°Ë÷Äɵ·òºÍÊ¥ÄÉÔó¶ûµØÇø¿ÉÒ»Á¬Éú³¤»ú¹¹¡£¡£¡£¡£¡£Í¨Öª³Æ£¬£¬ £¬£¬£¬£¬£¬£¬¡°Ïֽ׶Σ¬£¬ £¬£¬£¬£¬£¬£¬ÍøÂç¹¥»÷µÄÆðÔ´ºÍÒ»Á¬Ê±¼äÉв»ÇåÎú¡±¡£¡£¡£¡£¡£Í¨Öª³Æ£¬£¬ £¬£¬£¬£¬£¬£¬Ëæ×ÅЧÀͻָ´£¬£¬ £¬£¬£¬£¬£¬£¬Ê¥ÄÉÔó¶ûÊкÍÊ¥ÄÉÔó¶ûÊн«ÔÚÉ罻ýÌåºÍÕþ¸®ÍøÕ¾ÉÏÐû²¼¸üÐÂÐÅÏ¢¡£¡£¡£¡£¡£ËäȻûÓÐ͸¶ÊÂÎñµÄÐÔ×Ó£¬£¬ £¬£¬£¬£¬£¬£¬µ«´Ë´ÎÖÐÖ¹ÊÇÔÚ 3 Ô 11 ÈÕÖÁ 12 ÈÕ±¬·¢µÄ´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ (DDoS) ¹¥»÷Ö®ºó±¬·¢µÄ£¬£¬ £¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ʹ¶à¸ö·¨¹úÕþ¸®ÍøÕ¾³äÂú×ÅÐéαÁ÷Á¿£¬£¬ £¬£¬£¬£¬£¬£¬µ«²¢Î´ÖÐÖ¹Õþ¸®Ð§ÀÍ¡£¡£¡£¡£¡£DDoS ÊÂÎñ±¬·¢¼¸Ììºó£¬£¬ £¬£¬£¬£¬£¬£¬ÈÏÕæ¹ÒºÅºÍÔ®ÖúʧҵְԱµÄÕþ¸®²¿·Ö France Travail Åû¶ÁËÒ»ÆðÖØ´óµÄÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬£¬¸ÃÊÂÎñй¶ÁËÁè¼Ý 4300 Íò¹«Ãñ 20 ÄêǰµÄ˽ÈËÐÅÏ¢¡£¡£¡£¡£¡£¸Ã²¿·ÖÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬£¬ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢·¨¹úÀ͹¤±êʶ·û¡¢µç×ÓÓʼþµØµã¡¢ÓÊÕþµØµãºÍµç»°ºÅÂë¶¼±»Ð¹Â¶¡£¡£¡£¡£¡£


https://www.theregister.com/2024/04/12/french_municipalities_cyberattack/


3. CISA ±Þ²ßÔÚ Sisense й¶ºóÁ¬Ã¦ÖØÖÃÆ¾Ö¤


4ÔÂ12ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö (CISA) Åû¶ÁËÓ°ÏìÓªÒµÆÊÎöÌṩÉÌ Sisense µÄÎó²î£¬£¬ £¬£¬£¬£¬£¬£¬²¢±Þ²ßÆä¿Í»§±£´æÆäƾ֤¡£¡£¡£¡£¡£2024 Äê 4 Ô 11 ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬CISA Ðû²¼ÁËÓÐ¹Ø Sisense ¿Í»§Êý¾Ý¿ÉÄÜÔ⵽й¶µÄͨ¸æ¡£¡£¡£¡£¡£¸Ã»ú¹¹¡°ÏÖÔÚÕýÔÚÓë˽ӪÐÐÒµÏàÖúͬ°éÏàÖú£¬£¬ £¬£¬£¬£¬£¬£¬ÒÔÓ¦¶Ô×ÔÁ¦Çå¾²Ñо¿Ö°Ô±×î½ü·¢Ã÷µÄÓ°Ïì Sisense£¨Ò»¼ÒÌṩÊý¾ÝÆÊÎöЧÀ͵Ĺ«Ë¾£©µÄÎó²î¡£¡£¡£¡£¡£¡±×èֹ׫д±¾ÎÄʱ£¬£¬ £¬£¬£¬£¬£¬£¬Sisense ÉÐδ¹ûÕæÈ·ÈÏ»ò½â¾öÕâһΥ¹æÎÊÌâ¡£¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¼ÇÕß Brian Krebs ÔÚËûµÄÍøÕ¾ÉÏÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÏòÆä¿Í»§·¢ËÍÁËÒ»·âµç×ÓÓʼþ£¬£¬ £¬£¬£¬£¬£¬£¬È·ÈÏÆäÒÑÒâʶµ½¡°Sisense ¹«Ë¾µÄijЩÐÅÏ¢¿ÉÄÜÒÑÔÚÎÒÃDZ»¼û¸æµÄÊÜÏÞ»á¼ûЧÀÍÆ÷ÉÏÌṩ¡£¡£¡£¡£¡£¡±¸Ãµç×ÓÓʼþµÄ×÷Õß¡¢Sisense µÄ CISO Sangram Dash Ôö²¹µÀ£º¡°ÎÒÃÇÕýÔÚÈÏÕæ¿´´ý´ËÊ£¬£¬ £¬£¬£¬£¬£¬£¬²¢Á¬Ã¦Õö¿ªÊӲ졣¡£¡£¡£¡£¡±´ïʲ¼ÌÐøËµµÀ£º¡°ÎÒÃÇÔ¼ÇëÁËÐÐÒµÁìÏȵÄר¼ÒÀ´Ð­ÖúÎÒÃǾÙÐÐÊӲ졣¡£¡£¡£¡£¸ÃÊÂÎñ²¢Î´µ¼Ö¿­·¢k8ÓªÒµÔËÓªÖÐÖ¹¡£¡£¡£¡£¡£Sisense ¿Í»§À´×Ô¸÷¸ö±ÊÖ±ÐÐÒµ£¬£¬ £¬£¬£¬£¬£¬£¬°üÀ¨ÒøÐкͽðÈÚ¡¢µçÐÅ¡¢½ÌÓýºÍÒ½ÁƱ£½¡¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/cisa-urges-reset-sisense-breach/


4. Æ­×ÓʹÓà GITHUB µÄËÑË÷Ч¹ûÀ´Èö²¥¶ñÒâÈí¼þ


4ÔÂ13ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬Checkmarx Ñо¿Ö°Ô±±¨¸æ³Æ£¬£¬ £¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÕýÔÚʹÓà GitHub ËÑË÷Ч¹û£¬£¬ £¬£¬£¬£¬£¬£¬Ïò¿ª·¢Ö°Ô±ÏµÍ³´«Ëͳ¤ÆÚÐÔ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¸Ã»î¶¯±³ºóµÄ¹¥»÷ÕßʹÓÃÊ¢ÐеÄÃû³ÆºÍÖ÷Ì⽨Éè¶ñÒâ´æ´¢¿â£¬£¬ £¬£¬£¬£¬£¬£¬ÊӲ쵽ËûÃÇʹÓÃ×Ô¶¯¸üкͼÙÐǵÈÊÖÒÕÀ´Ìá¸ßËÑË÷ÅÅÃû¡£¡£¡£¡£¡£Í¨¹ýʹÓà GitHub Actions£¬£¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÐÞ¸ÄÎļþ£¨Í¨³£³ÆÎª¡°ÈÕÖ¾¡±£©£¬£¬ £¬£¬£¬£¬£¬£¬Ê¹ÓÃÄ¿½ñÈÕÆÚºÍʱ¼ä»òÖ»ÊÇÒ»Ð©Ëæ»úµÄС¸ü¸Ä£¬£¬ £¬£¬£¬£¬£¬£¬ÒÔºÜÊÇ¸ßµÄÆµÂÊ×Ô¶¯¸üд洢¿â¡£¡£¡£¡£¡£ÕâÖÖÒ»Á¬µÄ»î¸ÐÈËΪµØÌá¸ßÁË´æ´¢¿âµÄ¿É¼ûÐÔ£¬£¬ £¬£¬£¬£¬£¬£¬ÌØÊâÊÇÔÚÓû§Í¨¹ý¡°×î½ü¸üС±¹ýÂËЧ¹ûµÄÇéÐÎÏ£¬£¬ £¬£¬£¬£¬£¬£¬ÔöÌíÁ˺ÁÎÞ½äÐĵÄÓû§ÕÒµ½ºÍ»á¼ûËüÃǵĿÉÄÜÐÔ¡£¡£¡£¡£¡£¡±ÔĶÁCheckmarx Ðû²¼µÄ±¨¸æ¡£¡£¡£¡£¡£¡°ËäÈ»×Ô¶¯¸üÐÂÓÐËù×ÊÖú£¬£¬ £¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÁ¬ÏµÁËÁíÒ»ÖÖÊÖÒÕÀ´ÔöÇ¿Æä´æ´¢¿âµÄÓÐÓÃÐÔ£¬£¬ £¬£¬£¬£¬£¬£¬Ê¹ÆäµÖ´ï×î¼ÑЧ¹û¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓöà¸öÐéαÕË»§Ìí¼ÓÐéαÃ÷ÐÇ£¬£¬ £¬£¬£¬£¬£¬£¬ÖÆÔìÊܽӴýºÍ¿ÉÐŵļÙÏ󡣡£¡£¡£¡£ÎªÁËÌӱܼì²â£¬£¬ £¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕß½«¶ñÒâ´úÂëÒþ²ØÔÚ Visual Studio ÏîÄ¿Îļþ£¨.csproj »ò .vcxproj£©ÖУ¬£¬ £¬£¬£¬£¬£¬£¬¸Ã´úÂë»áÔÚÏîÄ¿¹¹½¨Ê±×Ô¶¯Ö´ÐС£¡£¡£¡£¡£

https://securityaffairs.com/161792/cyber-crime/githubs-search-results-distribute-malware.html


5. ¼ÓÄôóÁãÊÛÁ¬Ëø¾ÞÍ· GIANT TIGER й¶280ÍòÌõÊý¾Ý


4ÔÂ14ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬Ò»ÃûÍøÃûΪ ShopifyGUY µÄÍþвÐÐΪÕßÉù³Æ¶Ô¹¥»÷¼ÓÄôóÁãÊÛÁ¬Ëøµê Giant Tiger ÈÏÕæ£¬£¬ £¬£¬£¬£¬£¬£¬²¢ÔÚºÚ¿ÍÂÛ̳ÉÏй¶ÁË 280 ÍòÌõ¼Í¼¡£¡£¡£¡£¡£Giant Tiger ÊÇÒ»¼Ò¼ÓÄôóÕÛ¿ÛÁ¬Ëøµê£¬£¬ £¬£¬£¬£¬£¬£¬ÔÚ¼ÓÄôó¸÷µØÄ±»® 260 ¶à¼ÒÊÐËÁ¡£¡£¡£¡£¡£Ðû²¼¸ÃÌû×ÓµÄÍþвÐÐΪÕßÉù³ÆÒÑÉÏ´« 2024 Äê 3 Ô±»µÁµÄ¹«Ë¾µÄÍêÕûÊý¾Ý¿â¡£¡£¡£¡£¡£¸ÃÌû×Ó±³ºóµÄÍþвÐÐΪÕßÉù³ÆÒÑÉÏ´« 2024 Äê 3 Ô±»µÁµÄ Giant Tiger ¿Í»§¼Í¼µÄ¡°ÍêÕû¡±Êý¾Ý¿â¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨µç×ÓÓʼþµØµã¡¢ÐÕÃû¡¢µç»°ºÅÂë¡¢ÏÖʵµØµãºÍÍøÕ¾»î¶¯¡£¡£¡£¡£¡£²ÆÎñÊý¾Ý²¢Î´Êܵ½ËùνÊÂÎñµÄÓ°Ïì¡£¡£¡£¡£¡£¼ÓÄôóÁãÊÛÁ¬ËøµêµÄ¿Í»§¿ÉÒÔͨ¹ýÅÌÎÊÊý¾Ýй¶¼à¿ØÐ§ÀÍ HaveIBeenPwned À´¼ì²éй¶µÄµµ°¸ÖÐÊÇ·ñ±£´æÆäÊý¾Ý¡£¡£¡£¡£¡£


https://securityaffairs.com/161811/cyber-crime/giant-tiger-data-breach.html


6. RokuÔ⵽ײ¿â¹¥»÷Áè¼Ý57Íò¸öÕ˺ÅÐÅϢй¶


4ÔÂ12ÈÕ£¬£¬ £¬£¬£¬£¬£¬£¬Roku Ðû²¼£¬£¬ £¬£¬£¬£¬£¬£¬576,000 ¸öÕÊ»§ÔÚеÄײ¿â¹¥»÷ÖÐÔâµ½ºÚ¿Í¹¥»÷£¬£¬ £¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßʹÓôӵÚÈý·½Æ½Ì¨ÇÔÈ¡µÄƾ֤¡£¡£¡£¡£¡£½ñÄêÔçЩʱ¼ä£¬£¬ £¬£¬£¬£¬£¬£¬Roku ¼ì²âµ½Òì³£ÕÊ»§»î¶¯£¬£¬ £¬£¬£¬£¬£¬£¬²¢·¢Ã÷δ¾­ÊÚȨµÄ¹¥»÷ÕßʹÓÃͨ¹ý¡°Æ¾Ö¤Ìî³ä¡±´Ó²î±ðȪԴ»ñÈ¡µÄµÇ¼ƾ֤»á¼ûÁËԼĪ 15,000 ¸öÓû§ÕÊ»§¡£¡£¡£¡£¡£¸Ã¹«Ë¾Íê³É¶ÔÊ׸öÇå¾²Îó²îµÄÊÓ²ìºó£¬£¬ £¬£¬£¬£¬£¬£¬ÓÚÈýÔ³õ֪ͨÁËÊÜÓ°ÏìµÄ¿Í»§¡£¡£¡£¡£¡£¸Ã¹«Ë¾¼ÌÐø¼à¿ØÕË»§»î¶¯£¬£¬ £¬£¬£¬£¬£¬£¬²¢·¢Ã÷Á˵ڶþÆðÓ°ÏìԼĪ 576,000 ¸öÕË»§µÄÊÂÎñ¡£¡£¡£¡£¡£Ã»Óм£ÏóÅú×¢ Roku ÊÇÕâЩ¹¥»÷ÖÐʹÓõÄÕÊ»§Æ¾Ö¤µÄȪԴ£¬£¬ £¬£¬£¬£¬£¬£¬Ò²Ã»Óм£ÏóÅú×¢ Roku µÄϵͳÔÚÕâÁ½ÆðÊÂÎñÖÐÊܵ½ÁËË𺦡£¡£¡£¡£¡£Ïà·´£¬£¬ £¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷ÖÐʹÓõĵǼƾ֤ºÜ¿ÉÄÜÊÇ´ÓÆäËûȪԴ»ñÈ¡µÄ£¬£¬ £¬£¬£¬£¬£¬£¬ÀýÈçÁíÒ»¸öÔÚÏßÕÊ»§£¬£¬ £¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄÓû§¿ÉÄÜʹÓÃÁËÏàͬµÄƾ֤¡£¡£¡£¡£¡£¡±ÔĶÁ¸Ã¹«Ë¾Ðû²¼µÄÐÂΟå¡£¡£¡£¡£¡£¡°ÔÚ²»µ½ 400 Æð°¸ÀýÖУ¬£¬ £¬£¬£¬£¬£¬£¬¶ñÒâÐÐΪÕߵǼ²¢Ê¹ÓÃÕâЩÕÊ»§Öд洢µÄ¸¶¿î·½·¨Î´¾­ÊÚȨ¹ºÖÃÁ÷ýÌåЧÀͶ©ÔÄºÍ Roku Ó²¼þ²úÆ·£¬£¬ £¬£¬£¬£¬£¬£¬µ«ËûÃÇÎÞ·¨»á¼ûÈκÎÃô¸ÐÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬£¬°üÀ¨ÍêÕûµÄÐÅÓÿ¨ºÅ»òÆäËûÐÅÏ¢¡£¡£¡£¡£¡£ÍêÕûµÄ¸¶¿îÐÅÏ¢¡£¡£¡£¡£¡£


https://securityaffairs.com/161765/data-breach/roku-second-data-breach.html