LATRODECTUSÒ»Ö±¸üв¢·Ö·¢ICEDIDºÍÆäËû¶ñÒâÈí¼þ

Ðû²¼Ê±¼ä 2024-05-22
1. LATRODECTUSÒ»Ö±¸üв¢·Ö·¢ICEDIDºÍÆäËû¶ñÒâÈí¼þ


5ÔÂ21ÈÕ£¬£¬ £¬£¬£¬LATRODECTUSÓÚ 2023 Äê 10 ÔÂÓÉÎÖ¶ûÂêÑо¿Ö°Ô±Ê״η¢Ã÷£¬£¬ £¬£¬£¬ÊÇÒ»ÖÖÔÚÍøÂç·¸·¨·Ö×ÓÖÐÔ½À´Ô½Ê¢ÐеĶñÒâÈí¼þ¼ÓÔØ³ÌÐò¡£ ¡£¡£¡£¡£ËäÈ»Õâ±»ÒÔΪÊÇÒ»¸öеļÒ×壬£¬ £¬£¬£¬µ«ÓÉÓÚÐÐΪºÍÉú³¤ÏàËÆÐÔ£¬£¬ £¬£¬£¬LATRODECTUS ºÍICEDIDÖ®¼ä±£´æÏ¸ÃÜÁªÏµ£¬£¬ £¬£¬£¬°üÀ¨ÏÂÔØºÍÖ´ÐмÓÃܸºÔØ£¨Èç ICEDID£©µÄÏÂÁî´¦Öóͷ£³ÌÐò¡£ ¡£¡£¡£¡£Proofpoint ºÍ Team Cymru »ùÓÚÕâÖÖÁªÏµ£¬£¬ £¬£¬£¬·¢Ã÷ÁËICEDID ºÍ LATRODECTUS ÔËÓªÉÌʹÓõÄÍøÂç»ù´¡Éèʩ֮¼ä±£´æÏ¸ÃÜÁªÏµ¡£ ¡£¡£¡£¡£LATRODECTUS ÌṩÁËһϵÁÐÖÜÈ«µÄ±ê×¼¹¦Ð§£¬£¬ £¬£¬£¬ÍþвÐÐΪÕß¿ÉÒÔʹÓÃÕâЩ¹¦Ð§À´°²ÅŸü¶àµÄÓÐÓøºÔØ£¬£¬ £¬£¬£¬ÔÚÆðÔ´ÈëÇÖºóÖ´ÐÐÖÖÖֻ¡£ ¡£¡£¡£¡£´úÂë¿âδ¾­ÓÉ»ìÏý£¬£¬ £¬£¬£¬½ö°üÀ¨ 11 ¸öרעÓÚö¾ÙºÍÖ´ÐеÄÏÂÁî´¦Öóͷ£³ÌÐò¡£ ¡£¡£¡£¡£ÕâÖÖÀàÐ͵ļÓÔØÆ÷´ú±íÁËÎÒÃÇÍŶÓ×î½üÊӲ쵽µÄÀ˳±£¬£¬ £¬£¬£¬ÀýÈçPIKABOT£¬£¬ £¬£¬£¬ÆäÖдúÂëÔ½·¢ÇáÁ¿¼¶ºÍÖ±½Ó£¬£¬ £¬£¬£¬´¦Öóͷ£³ÌÐòÊýÄ¿ÓÐÏÞ¡£ ¡£¡£¡£¡£


https://www.elastic.co/security-labs/spring-cleaning-with-latrodectus?&web_view=true


2. Kinsing¹¥»÷Apache Tomcat°²ÅÅÍÚ¿ó³ÌÐò


5ÔÂ20ÈÕ£¬£¬ £¬£¬£¬Kinsing ¶ñÒâÈí¼þÒÔʹÓà Linux ÔÆÐ§ÀÍÆ÷ÉϵÄÎó²î°²ÅźóÃźͼÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò¶øÖøÃû£¬£¬ £¬£¬£¬×î½ü½«ÆäÄ¿µÄÀ©Õ¹µ½°üÀ¨ Apache Tomcat ЧÀÍÆ÷¡£ ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÐÂÓ±µÄÊÖÒÕÀ´Ìӱܼì²â£¬£¬ £¬£¬£¬½«×ÔÉíÒþ²ØÔÚ¿´ËÆÎÞº¦µÄϵͳÎļþÖУ¬£¬ £¬£¬£¬Ê¹ÆäÔÚÊÜѬȾµÄϵͳÉϳ¤ÆÚ±£´æ£¬£¬ £¬£¬£¬Í»³öÁË Kinsing Ò»Ö±Éú³¤µÄÕ½ÂÔ£¬£¬ £¬£¬£¬²¢Ç¿µ÷ϵͳÖÎÀíÔ±ÐèÒª¶ÔÕâЩÐÂÐËÍþв¼á³ÖСÐÄ¡£ ¡£¡£¡£¡£Kinsing ʹÓÃÈÝÆ÷ºÍЧÀÍÆ÷ÖеÄÎó²îÀ´°²ÅźóÃźͼÓÃÜÍÚ¿ó³ÌÐò£¬£¬ £¬£¬£¬ÊÓ²ìЧ¹ûÏÔʾ¶à¸öЧÀÍÆ÷Êܵ½Ñ¬È¾£¬£¬ £¬£¬£¬ÆäÖаüÀ¨¾ßÓÐÑÏÖØÈ±ÏÝµÄ Apache Tomcat¡£ ¡£¡£¡£¡£Tomcat ÊÇÒ»¿î¿É¹ûÕæ»á¼ûµÄ¾²Ì¬ÄÚÈÝ¿ªÔ´Ð§ÀÍÆ÷£¬£¬ £¬£¬£¬ÓÉÓÚÆäÔÚ»¥ÁªÍøÉϵÄ̻¶¶ø³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ£¬£¬ £¬£¬£¬ÕâʹµÃ Kinsing ¿ÉÒÔÉøÍ¸µ½ÏµÍ³Öв¢½¨ÉèÒþ²ØµÄºóÃÅÒÔʵÏÖ³¤ÆÚÐÔ£¬£¬ £¬£¬£¬Í¬Ê±°²ÅżÓÃÜ¿ó¹¤À´ÇÔÈ¡ÅÌËã×ÊÔ´ÒÔ¾ÙÐмÓÃÜÇ®±ÒÍÚ¾ò¡£ ¡£¡£¡£¡£ 


https://gbhackers.com/kinsing-malware-apache-tomcat-servers/


3. SECÒªÇó½ðÈÚ×éÖ¯ÐèÒªÔÚ 30 ÌìÄÚÅû¶Êý¾Ýй¶ÊÂÎñ


5ÔÂ21ÈÕ£¬£¬ £¬£¬£¬ÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©¶Ô SP ¹æÔò¾ÙÐÐÁËÐ޸쬣¬ £¬£¬£¬ÒªÇó½ðÈÚ¹«Ë¾ÔÚ 30 ÌìÄÚ±¨¸æÊý¾Ýй¶ÇéÐΡ£ ¡£¡£¡£¡£ÕâÊDZ £»£»£»¤ÏûºÄÕßµÄÒ»´óǰ½ø¡£ ¡£¡£¡£¡£ÕâÏîл®¶¨½«ÓÚ 2024 Äê 5 Ô 15 ÈÕÉúЧ£¬£¬ £¬£¬£¬Ö¼ÔÚÔöÇ¿ºÍ¸üжÔÏûºÄÕß½ðÈÚÐÅÏ¢µÄ± £»£»£»¤¡£ ¡£¡£¡£¡£×Ô 2000 ÄêÍÆ³öÒÔÀ´£¬£¬ £¬£¬£¬SEC î¿Ïµ SPÒªÇó¾­¼ÍÉúÒâÉÌ¡¢Í¶×ʹ«Ë¾ºÍ³ÖÅÆÍ¶×ÊÕÕÁÏͨ¹ýÊéÃæÕþ²ßºÍ³ÌÐò± £»£»£»¤¿Í»§¼Í¼ºÍÐÅÏ¢¡£ ¡£¡£¡£¡£¸Ã¹æÔò»¹Ú¹ÊÍÁËÔõÑù׼ȷɾ³ýÏûºÄÕß±¨¸æÐÅÏ¢£¬£¬ £¬£¬£¬²¢ÒªÇóÒþ˽Õþ²ß֪ͨºÍÑ¡ÔñÍ˳öÑ¡Ïî¡£ ¡£¡£¡£¡£¶àÄêÀ´£¬£¬ £¬£¬£¬ÊÖÒÕµÄǰ½øÊ¹µÃÊý¾Ýй¶µÄ¿ÉÄÜÐÔ¸ü´ó£¬£¬ £¬£¬£¬Õâ¾ÍÊÇÐèÒªÕâЩ¸Ä±äµÄÔµ¹ÊÔ­ÓÉ¡£ ¡£¡£¡£¡£


https://gbhackers.com/financial-organizations-data-breach/


4. Git Ô¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2024-32002


5ÔÂ21ÈÕ£¬£¬ £¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬ £¬£¬£¬¸ÃÎó²î±»Ö¸¶¨Îª CVE-2024-32002£¬£¬ £¬£¬£¬ÑÏÖØË®Æ½Îª 9.0£¨ÑÏÖØ£©¡£ ¡£¡£¡£¡£Õâ¸öÌØÊâµÄÎó²î±£´æÓÚÆÕ±éʹÓõÄcloneÏÂÁîÖС£ ¡£¡£¡£¡£Git ÉÏÖÜÐû²¼ÁËÒ»·ÝÇ徲ͨ¸æ£¬£¬ £¬£¬£¬ÆäÖÐÖ¸³öÁËÓйØÔ¶³Ì´úÂëÖ´ÐеÄÎÊÌâ¡£ ¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬ £¬£¬£¬¸ÃÎó²î±»ÐÎòΪÓÉÓÚ¿ÉÒÔÒÔÌØ¶¨·½·¨Æð²ÝµÄ×ÓÄ£¿£¿£¿é¶ø±£´æ£¬£¬ £¬£¬£¬´Ó¶ø¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£ ¡£¡£¡£¡£²»¹ýÕâ¸öÎó²îÒѾ­±»gitÐÞ¸´£¬£¬ £¬£¬£¬²¢ÇÒÐû²¼ÁËÐÞ²¹°æ±¾¡£ ¡£¡£¡£¡£Æ¾Ö¤ÍøÂçÇå¾²ÐÂÎÅ·ÖÏíµÄ±¨¸æ£¬£¬ £¬£¬£¬git ʹÓÃ×ÓÄ£¿£¿£¿é£¬£¬ £¬£¬£¬ÕâЩ×ÓÄ£¿£¿£¿éÊÇǶÌ×ÔÚÆäËû´æ´¢¿âÖеĴ洢¿â¡£ ¡£¡£¡£¡£Ã¿¸ö×ÓÄ£¿£¿£¿éÔÚÖ÷Ŀ¼Öж¼ÓÐÒ»¸öÖ¸¶¨µÄĿ¼·¾¶£¬£¬ £¬£¬£¬¸ÃĿ¼·¾¶»á±»¸ú×ÙÒÔÈ·±£×¼È·¼Í¼¸ü¸Ä¡£ ¡£¡£¡£¡£½øÒ»²½ÊӲ췢Ã÷£¬£¬ £¬£¬£¬Windows£¨A/modules/x£©ºÍmacOS£¨a/modules/x£©µÄĬÈÏÉèÖÃÖб£´æ²»Çø·Ö¾ÞϸдµÄÎļþϵͳ¡£ ¡£¡£¡£¡£ÕâÁ½¸ö·¾¶µÄ´¦Öóͷ£·½·¨Ïàͬ£¬£¬ £¬£¬£¬ÕâÊÇÔ¶³Ì´úÂëÖ´Ðб³ºóµÄÖ÷ÒªÔµ¹ÊÔ­ÓÉ¡£ ¡£¡£¡£¡£ 


https://gbhackers.com/git-flaw-remote-code-execution/


5. Fluent Bit ÑÏÖØÈ±ÏÝÓ°ÏìËùÓÐÖ÷ÒªÔÆÌṩÉÌ


5ÔÂ21ÈÕ£¬£¬ £¬£¬£¬¿ÉÔھܾøÐ§ÀͺÍÔ¶³Ì´úÂëÖ´Ðй¥»÷ÖÐʹÓõÄÒªº¦ Fluent Bit Îó²îÓ°ÏìÁËËùÓÐÖ÷ÒªÔÆÌṩÉ̺ÍÐí¶àÊÖÒÕ¾ÞÍ·¡£ ¡£¡£¡£¡£Fluent Bit ÊÇÒ»ÖÖºÜÊÇÊ¢ÐеÄÈÕÖ¾¼Í¼ºÍÖ¸±ê½â¾ö¼Æ»®£¬£¬ £¬£¬£¬ÊÊÓÃÓÚ Windows¡¢Linux ºÍ macOS£¬£¬ £¬£¬£¬Ç¶ÈëÔÚÖ÷Òª Kubernetes ¿¯ÐаæÖУ¬£¬ £¬£¬£¬°üÀ¨À´×Ô Amazon AWS¡¢Google GCP ºÍ Microsoft Azure µÄ¿¯Ðаæ¡£ ¡£¡£¡£¡£×èÖ¹ 2024 Äê 3 Ô£¬£¬ £¬£¬£¬Fluent Bit µÄÏÂÔØºÍ°²ÅÅ´ÎÊýÁè¼Ý 130 ÒڴΣ¬£¬ £¬£¬£¬½Ï 2022 Äê 10 Ô±¨µÀµÄ30 ÒÚ´ÎÏÂÔØÁ¿´ó·ùÔöÌí¡£ ¡£¡£¡£¡£Fluent Bit Ò²±» Crowdstrike ºÍ Trend Micro µÈÍøÂçÇå¾²¹«Ë¾ÒÔ¼°Ë¼¿Æ¡¢VMware¡¢Ó¢Ìضû¡¢Adobe ºÍ´÷¶ûµÈÐí¶à¿Æ¼¼¹«Ë¾Ê¹Óᣠ¡£¡£¡£¡£Õâ¸öÑÏÖØµÄÄÚ´æËð»µÎó²î±»¸ú×ÙΪCVE-2024-4323£¬£¬ £¬£¬£¬²¢±»·¢Ã÷¸ÃÎó²îµÄ Tenable Çå¾²Ñо¿Ö°Ô±³ÆÎªLinguistic Lumberjack£¬£¬ £¬£¬£¬ËüÊÇÔÚ°æ±¾ 2.0.7 ÖÐÒýÈëµÄ£¬£¬ £¬£¬£¬ÊÇÓÉ Fluent Bit µÄǶÈëʽ HTTP ЧÀÍÆ÷ÆÊÎö¸ú×ÙÇëÇóÖеĶѻº³åÇøÒç³öÎó²îÒýÆðµÄ¡£ ¡£¡£¡£¡£Ö»¹Üδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔÇáËÉʹÓøÃÇå¾²Îó²îÀ´´¥·¢¾Ü¾øÐ§ÀÍ»òÔ¶³Ì²¶»ñÃô¸ÐÐÅÏ¢£¬£¬ £¬£¬£¬µ«ÈôÊÇÓÐÊʵ±µÄÌõ¼þºÍ×ã¹»µÄʱ¼äÀ´½¨Éè¿É¿¿µÄÎó²î£¬£¬ £¬£¬£¬ËûÃÇÒ²¿ÉÒÔʹÓÃËüÀ´»ñµÃÔ¶³Ì´úÂëÖ´ÐС£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-fluent-bit-flaw-impacts-all-major-cloud-providers/


6. AntidotľÂíαװ³ÉGoogle Play¸üУ¬£¬ £¬£¬£¬ÇÔÈ¡ÒøÐÐÊý¾Ý


5ÔÂ22ÈÕ£¬£¬ £¬£¬£¬CybleµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÕë¶Ô Android ×°±¸µÄÐÂÒøÐÐľÂí¡£ ¡£¡£¡£¡£ÕâÖÖÖØ´óµÄ¶ñÒâÈí¼þ¾ßÓжàÖÖΣÏÕ¹¦Ð§£¬£¬ £¬£¬£¬°üÀ¨ÁýÕÖ¹¥»÷¡¢¼üÅ̼ͼºÍ»ìÏýÊÖÒÕ¡£ ¡£¡£¡£¡£¸ÃľÂíÆ¾Ö¤ÆäÔ´´úÂëÖеÄ×Ö·û´®ÃüÃûΪ¡°Antidot¡±£¬£¬ £¬£¬£¬ÒÔαװ³É¹Ù·½ Google Play ¸üв¢Ö§³Ö¶àÖÖÓïÑÔ¶øÖøÃû£¬£¬ £¬£¬£¬°üÀ¨Ó¢Óï¡¢µÂÓï¡¢·¨Óï¡¢Î÷°àÑÀÓï¡¢ÆÏÌÑÑÀÓï¡¢ÂÞÂíÄáÑÇÓ£¬ £¬£¬£¬ÉõÖÁ¶íÓï¡£ ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×÷Ϊ Google Play µÄ¸üоÙÐзַ¢£¬£¬ £¬£¬£¬²¢ÒÔ¡°Ð°汾¡±µÄÃû³Æ·ºÆðÔÚÊܺ¦ÕßµÄ×°±¸ÉÏ¡£ ¡£¡£¡£¡£×°ÖúÍÊ×´ÎÆô¶¯ºó£¬£¬ £¬£¬£¬Óû§»á¿´µ½Ò»¸ö¼ÙÒ³Ãæ£¬£¬ £¬£¬£¬¾Ý³ÆÀ´×Ô Google Play£¬£¬ £¬£¬£¬ÆäÖаüÀ¨Íê³É¸üÐÂËùÐè²Ù×÷µÄÏêϸ˵Ã÷¡£ ¡£¡£¡£¡£


https://meterpreter.org/new-antidot-trojan-masquerades-as-google-play-update-steals-banking-data/