RedTailÍÚ¿óʹÓà Palo Alto Networks ·À»ðǽµÄÎó²î

Ðû²¼Ê±¼ä 2024-06-03
1. RedTailÍÚ¿óʹÓà Palo Alto Networks ·À»ðǽµÄÎó²î


5ÔÂ31ÈÕ£¬£¬ £¬£¬£¬£¬RedTail¼ÓÃÜÇ®±ÒÍÚ¾ò¶ñÒâÈí¼þ±³ºóµÄÍþвÐÐΪÕß½«×î½üÅû¶µÄÓ°Ïì Palo Alto Networks ·À»ðǽµÄÇå¾²Îó²îÌí¼Óµ½ÆäÎó²îʹÓÿâÖС£¡£¡£¡£Æ¾Ö¤ÍøÂç»ù´¡ÉèÊ©ºÍÇå¾²¹«Ë¾ Akamai µÄÑо¿Ð§¹û£¬£¬ £¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ²»µ«ÔÚÆä¹¤¾ß°üÖÐÔöÌíÁË PAN-OS Îó²î£¬£¬ £¬£¬£¬£¬»¹¶ÔÆä¾ÙÐÐÁ˸üУ¬£¬ £¬£¬£¬£¬ÏÖÔÚÒѽÓÄÉÁËÐµķ´ÆÊÎöÊÖÒÕ¡£¡£¡£¡£Akamai ·¢Ã÷µÄѬȾÐòÁÐʹÓÃÁË PAN-OS ÖÐÏÖÒÑÐÞ²¹µÄÎó²îCVE-2024-3400£¨CVSS ÆÀ·Ö£º10.0£©£¬£¬ £¬£¬£¬£¬¸ÃÎó²î¿ÉÄÜÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚ·À»ðǽÉÏÒÔ root ȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£ÀÖ³ÉʹÓÃÖ®ºó£¬£¬ £¬£¬£¬£¬½«Ö´ÐÐÖ¼ÔÚ´ÓÍⲿÓò¼ìË÷ºÍÔËÐÐ bash shell ¾ç±¾µÄÏÂÁ£¬ £¬£¬£¬£¬¸Ã¾ç±¾·´¹ýÀ´ÈÏÕæÆ¾Ö¤ CPU ¼Ü¹¹ÏÂÔØ RedTail ÓÐÓøºÔØ¡£¡£¡£¡£RedTail µÄÆäËûÈö²¥»úÖÆÉæ¼°Ê¹Óà TP-Link ·ÓÉÆ÷£¨CVE-2023-1389£©¡¢ThinkPHP£¨CVE-2018-20062£©¡¢Ivanti Connect Secure£¨CVE-2023-46805 ºÍ CVE-2024-21887£©ÒÔ¼° VMWare Workspace ONE Access ºÍ Identity Manager£¨CVE-2022-22954£©ÖÐÒÑÖªµÄÇå¾²Îó²î¡£¡£¡£¡£RedTailÓÚ 2024 Äê 1 ÔÂÊ×´ÎÓÉÇå¾²Ñо¿Ô± Patryk Machowiak ¼Í¼£¬£¬ £¬£¬£¬£¬É漰ʹÓà Log4Shell Îó²î (CVE-2021-44228) ÔÚ»ùÓÚ Unix µÄϵͳÉϰ²ÅŶñÒâÈí¼þµÄ»î¶¯¡£¡£¡£¡£


https://thehackernews.com/2024/05/redtail-crypto-mining-malware.html


2. Cooler Master È·ÈÏÊý¾Ýй¶ÊÂÎñÖпͻ§ÐÅÏ¢±»µÁ


5ÔÂ31ÈÕ£¬£¬ £¬£¬£¬£¬ÅÌËã»úÓ²¼þÖÆÔìÉÌ Cooler Master È·ÈÏÆäÓÚ 5 Ô 19 ÈÕÔâÓöÊý¾Ýй¶£¬£¬ £¬£¬£¬£¬ÍþвÐÐΪÕßÇÔÈ¡Á˿ͻ§Êý¾Ý¡£¡£¡£¡£Cooler Master ÊÇÒ»¼Ò×ÅÃûµÄÅÌËã»úÓ²¼þÖÆÔìÉÌ£¬£¬ £¬£¬£¬£¬ÒÔÆäÀäÈ´×°±¸¡¢ÅÌËã»ú»úÏä¡¢µçÔ´ºÍÆäËûÍâΧװ±¸¶øÖøÃû¡£¡£¡£¡£BleepingComputer×òÌ챨µÀ³Æ£¬£¬ £¬£¬£¬£¬Ò»¸öÃûΪ¡°Ghostr¡±µÄÍþвÐÐΪÕ߸æËßÎÒÃÇ£¬£¬ £¬£¬£¬£¬ËûÃÇÓÚ 5 Ô 18 ÈÕÈëÇÖÁ˸ù«Ë¾µÄ Fanzone ÍøÕ¾²¢ÏÂÔØÁËÆäÁ´½ÓµÄÊý¾Ý¿â¡£¡£¡£¡£Cooler Master µÄ Fanzone ÍøÕ¾ÓÃÓÚ×¢²á²úÆ·±£ÐÞ¡¢ÉêÇë RMA »ò¿ªÁ¢Ö§³ÖƱ£¬£¬ £¬£¬£¬£¬ÒªÇó¿Í»§ÌîдСÎÒ˽¼ÒÊý¾Ý£¬£¬ £¬£¬£¬£¬ÀýÈçÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚºÍÏÖʵµØµã¡£¡£¡£¡£Ghostr ÌåÏÖ£¬£¬ £¬£¬£¬£¬ÔÚ Fanzone Îó²î±¬·¢Ê±´ú£¬£¬ £¬£¬£¬£¬ËûÃÇÏÂÔØÁË 103 GB µÄÊý¾Ý£¬£¬ £¬£¬£¬£¬ÆäÖаüÀ¨Áè¼Ý 500,000 Ãû¿Í»§µÄ¿Í»§ÐÅÏ¢¡£¡£¡£¡£ÍþвÐÐΪÕß»¹¹²ÏíÁËÊý¾ÝÑù±¾£¬£¬ £¬£¬£¬£¬Ê¹ BleepingComputer Äܹ»ÓëÎ¥¹æÐÐΪÖÐÁгöµÄÖÚ¶à¿Í»§È·ÈÏËûÃǵÄÊý¾ÝÊÇ׼ȷµÄ£¬£¬ £¬£¬£¬£¬²¢ÇÒËûÃÇ×î½üÏò Cooler Master ÇëÇóÁËÖ§³Ö»ò RMA¡£¡£¡£¡£Ñù±¾ÖÐµÄÆäËûÊý¾Ý°üÀ¨²úÆ·ÐÅÏ¢¡¢Ô±¹¤ÐÅÏ¢ÒÔ¼°Ó빩ӦÉ̵ĵç×ÓÓʼþÐÅÏ¢¡£¡£¡£¡£ÍþвÕßÉù³ÆÓµÓв¿·ÖÐÅÓÿ¨ÐÅÏ¢£¬£¬ £¬£¬£¬£¬µ« BleepingComputer ÔÚÊý¾ÝÑù±¾ÖÐÕÒ²»µ½ÕâЩÊý¾Ý¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cooler-master-confirms-customer-info-stolen-in-data-breach/


3. BBC Åû¶ÁËÓ°ÏìÆäÑøÀϽðÍýÏë³ÉÔ±µÄÊý¾Ýй¶ÊÂÎñ


6ÔÂ1ÈÕ£¬£¬ £¬£¬£¬£¬BBC µÄÐÅÏ¢Çå¾²ÍŶÓÒÑÏòÎÒÃÇת´ïÁËÒ»ÆðÊý¾ÝÇå¾²ÊÂÎñ£¬£¬ £¬£¬£¬£¬ÆäÖв¿·Ö°üÀ¨ BBC ÑøÀϽðÍýÏë³ÉԱСÎÒ˽¼ÒÐÅÏ¢µÄÎļþ±»´ÓÔÆ´æ´¢Ð§ÀÍÖи´ÖÆ¡£¡£¡£¡£ÕâЩÎļþ°üÀ¨Ò»Ð©ÑøÀϽðÍýÏë³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢¹úÃñ°ü¹ÜºÅ¡¢³öÉúÈÕÆÚºÍ¼ÒͥסַµÈÏêϸÐÅÏ¢¡£¡£¡£¡£¡±Í¨¸æÐ´µÀ¡£¡£¡£¡£¡°ËùÉæ¼°µÄÊý¾ÝÎļþÊǸ±±¾£¬£¬ £¬£¬£¬£¬Òò´Ë¶ÔÍýÏëµÄÕý³£ÔË×÷ûÓÐÓ°Ïì¡£¡£¡£¡£¸ÃÊÂÎñδӰÏìÑøÀϽðÍýÏëÃÅ»§ÍøÕ¾µÄÔËÐУ¬£¬ £¬£¬£¬£¬Óû§¿ÉÒÔ¼ÌÐøÊ¹Óᣡ£¡£¡£¸ÃÊÂÎñй¶ÁËÔ¼ 25,000 Ãû BBC ÑøÀϽðÍýÏë³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬£¬£¬£¬ÆäÖаüÀ¨ÏÖÈκÍǰÈÎÔ±¹¤¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨È«Ãû¡¢¹úÃñ°ü¹ÜºÅ¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ðºÍ¼Òͥסַ¡£¡£¡£¡£Õâ¼ÒÓ¢¹ú¹«¹²Ð§À͹㲥¹«Ë¾ÔÚÍⲿר¼ÒµÄ×ÊÖúÏÂÊÓ²ìÁËÕâÒ»ÊÂÎñ£¬£¬ £¬£¬£¬£¬²¢ÒѽÓÄÉÁËÌØÁíÍâÇå¾²²½·¥¡£¡£¡£¡£×¨¼ÒÃÇÒѾ­È·¶¨ÁËÇå¾²Îó²îµÄÔµ¹ÊÔ­Óɲ¢½ÓÄÉÁËÇå¾²²½·¥¡£¡£¡£¡£¸Ã¹«Ë¾ÕýÔÚͨ¹ýµç×ÓÓʼþ»òÓʼķ½·¨ÁªÏµËùÓÐÊÜÓ°ÏìµÄ»áÔ±¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬¸Ã¹«Ë¾Ã»ÓÐÖ¤¾ÝÅú×¢ÊÜËðÎļþÒѱ»ÀÄÓᣡ£¡£¡£


https://securityaffairs.com/163908/data-breach/bbc-disclosed-data-breach.html


4. FlyingYetiʹÓÃWinRARÎó²î¾ÙÐÐÓÐÕë¶ÔÐԵĹ¥»÷»î¶¯


6ÔÂ2ÈÕ£¬£¬ £¬£¬£¬£¬×Ô 2022 Äê 2 Ô 24 ÈÕ¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ÒÔÀ´£¬£¬ £¬£¬£¬£¬¸÷¹úÖ®¼äÒÔ¼°È«ÌìÏÂÖ®¼äµÄÖ÷ÒªÊ±ÊÆÒ»Ö±ºÜÑÏÖØ¡£¡£¡£¡£´Ë´ÎÊÂÎñºó£¬£¬ £¬£¬£¬£¬ÎÚ¿ËÀ¼¶Ôδ³¥Õ®ÎñµÄס»§ÊµÑéÁËÇýÖðºÍÖÕÖ¹¹«ÓÃÊÂҵЧÀ͵ĽûÁ£¬ £¬£¬£¬£¬¸Ã½ûÁÓÚ2024Äê1Ô¿¢Ê¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬£¬ÕâÒ»ÌØ×¼Ê±ÆÚÈ´±»Ò»ÃûÃûΪFlyingYetiµÄÍþвÐÐΪÕßËùʹÓᣡ£¡£¡£¸ÃÍþвÐÐΪÕßʹÓÃÎÚ¿ËÀ¼¹«Ãñ¶ÔδËÍ»¹Õ®ÎñºÍ¿ÉÄÜʧȥס·¿µÄ½¹ÂÇ£¬£¬ £¬£¬£¬£¬¿ªÕ¹ÁËÒÔÕ®ÎñΪÖ÷ÌâµÄÍøÂç´¹Âڻ£¬£¬ £¬£¬£¬£¬ÓÕÆ­Êܺ¦Õß½«¶ñÒâÈí¼þÎļþÏÂÔØµ½ËûÃǵÄϵͳÖС£¡£¡£¡£¸Ã¶ñÒâÈí¼þÊÇÒ»ÖÖ³ÆÎª¡°COOKBOX¡±µÄ PowerShell ¶ñÒâÈí¼þ£¬£¬ £¬£¬£¬£¬ËüʹÕâЩÍþвÐÐΪÕßÄܹ»×°ÖÃÌØÁíÍâÓÐÓÃÔØºÉ²¢¿ØÖÆÊܺ¦ÕßµÄϵͳ¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬ÍøÂç´¹Âڻ»¹Ê¹ÓÃÁË GitHub ЧÀÍÆ÷ºÍ Cloudflare ÊÂÇéÆ÷ÒÔ¼° WinRAR Îó²î£¨CVE-2023-38831£©¡£¡£¡£¡£lyingYeti ÍþвÐÐΪÕߵĻÓë֮ǰȷ¶¨µÄÍþвÐÐΪÕß UAC-0149 ÓÐÖØµþ£¬£¬ £¬£¬£¬£¬ºóÕßÔøÔÚ 2023 ÄêÇ^ʹÓÃÏàͬµÄ¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼¹ú·ÀʵÌå¡£¡£¡£¡£2024 Äê 4 ÔÂÖÐÑ®ÖÁ 5 ÔÂÖÐѮʱ´ú£¬£¬ £¬£¬£¬£¬¾ÝÊӲ죬£¬ £¬£¬£¬£¬FlyingYeti ÍþвÐÐΪÕßÕýÔÚ¶ÔÊܺ¦Õß¾ÙÐÐÕì̽»î¶¯£¬£¬ £¬£¬£¬£¬ÕâЩ»î¶¯ºÜ¿ÉÄÜÓÃÓÚÔ­¶¨ÓÚ¸´Éú½Úʱ´úÌᳫµÄ»î¶¯¡£¡£¡£¡£


https://gbhackers.com/flyingyeti-winrar-vulnerability-malware-attacks/


5. LilacSquid ºÚ¿Í¹¥»÷ IT ÐÐÒµÒÔ»ñÈ¡ÉñÃØÊý¾Ý


6ÔÂ1ÈÕ£¬£¬ £¬£¬£¬£¬ºÚ¿ÍÃé×¼ IT ÐÐÒµ£¬£¬ £¬£¬£¬£¬ÓÉÓÚÕâЩÐÐÒµÕÆÎÕ×ÅÃû¹óµÄÊý¾Ý¡¢Òªº¦µÄ»ù´¡ÉèÊ©£¬£¬ £¬£¬£¬£¬²¢ÇÒͨ³£¿£¿£¿£¿£¿£¿£¿£¿ÉÒÔ»á¼û¸÷¸öÁìÓòµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£ÈëÇÖ IT ¹«Ë¾¿ÉÒÔΪºÚ¿ÍÌṩ¾ÙÐÐÌØ¹¤»î¶¯¡¢»ñÈ¡¾­¼ÃÀûÒæÒÔ¼°ÆÆËð»ù±¾Ð§À͵ÄÖØ´óʱ»ú¡£¡£¡£¡£¿ËÈÕ£¬£¬ £¬£¬£¬£¬Ë¼¿ÆTalosÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬ £¬£¬£¬£¬LilacSquidºÚ¿ÍÒ»Ö±ÔÚÆð¾¢¹¥»÷ITÐÐÒµ£¬£¬ £¬£¬£¬£¬ÒÔ»ñÈ¡ÉñÃØÊý¾Ý¡£¡£¡£¡£Talos È·ÐÅ¡°LilacSquid¡± APT ×éÖ¯ÖÁÉÙ´Ó 2021 Äê×îÏȾÍÒ»Ö±ÔÚ¾ÙÐÐÊý¾ÝÇÔÈ¡»î¶¯£¬£¬ £¬£¬£¬£¬ÀÖ³ÉÈëÇÖÁËÑÇÖÞ¡¢Å·ÖÞºÍÃÀ¹úµÄÖÆÒ©¡¢Ê¯ÓÍ¡¢×ÔÈ»ÆøºÍÊÖÒÕÐÐÒµµÄÄ¿µÄ ³õʼ»á¼ûʹÓÃÁËÎó²îºÍ±»µÁµÄ RDP ƾ֤¡£¡£¡£¡£ÈëÇֺ󣬣¬ £¬£¬£¬£¬LilacSquid °²ÅÅÁË MeshAgent Ô¶³Ì»á¼û¹¤¾ß¡¢QuasarRAT µÄ¶¨ÖÆ¡°PurpleInk¡±±äÌåÒÔ¼° SSF µÈ¿ªÔ´ÊðÀí¹¤¾ß£¬£¬ £¬£¬£¬£¬Óë Lazarus ºÍ Andariel µÈ³¯ÏÊ×éÖ¯µÄ TTP ÖØµþ¡£¡£¡£¡£¸Ã»î¶¯½¨ÉèÁËÊý¾Ýй¶µÄºã¾Ã»á¼ûȨÏÞ£¬£¬ £¬£¬£¬£¬ÏÈǰµÄ¹©Ó¦Á´Îó²î͹ÏÔÁËÕâÖÖÒ»Á¬¡¢¸ß¼¶ÍþвµÄΣº¦¡£¡£¡£¡£ÈëÇֺ󣬣¬ £¬£¬£¬£¬ËûÃÇʹÓà MeshAgent µÈ³ÌÐò¾ÙÐÐÔ¶³Ì»á¼û¡¢Ê¹Óà SSF ¾ÙÐÐÇå¾²ËíµÀÒÔ¼°Ê¹Óö¨ÖƶñÒâÈí¼þ InkLoader¡¢PurpleInk RAT µÈ¡£¡£¡£¡£


https://gbhackers.com/lilacsquid-hackers-attacking-it-industries/


6. Êý°ÙÃûÓ¢¹ú¡¢·¨¹úºÍÅ·ÃËÕþ¿ÍµÄÐÅÏ¢ÔÚÍøÉÏÐû²¼


5ÔÂ31ÈÕ£¬£¬ £¬£¬£¬£¬¾ÝרעÓÚÒþ˽µÄ½â¾ö¼Æ»®ÌṩÉÌ Proton ³Æ£¬£¬ £¬£¬£¬£¬Êý°ÙÃûÓ¢¹ú¡¢·¨¹úºÍÅ·ÖÞÒé»áÕþ¿ÍµÄµç×ÓÓʼþµØµãºÍÆäËûÐÅÏ¢¿ÉÒÔÔÚ°µÍøÊг¡ÉÏÕÒµ½¡£¡£¡£¡£×÷Ϊ Proton Óë Constella Intelligence ÏàÖú¿ªÕ¹µÄÒ»ÏîÑо¿µÄÒ»²¿·Ö£¬£¬ £¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚ°µÍøÉÏËÑË÷Á˽ü 2,300 ¸öÊôÓÚÓ¢¹ú¡¢·¨¹úºÍÅ·ÖÞÒé¾Û»áÔ±µÄ¹Ù·½Õþ¸®µç×ÓÓʼþµØµã¡£¡£¡£¡£×ܹ²ÓÐ 918 ¸öµç×ÓÓʼþµØµã±»Ð¹Â¶µ½ÍøÂç·¸·¨Êг¡£¬£¬ £¬£¬£¬£¬µ«Ã¿¸ö×éÖ¯ÊÜÓ°ÏìµÄÕþ¿Í±ÈÀýÓÐËù²î±ð¡£¡£¡£¡£ÀýÈ磬£¬ £¬£¬£¬£¬Ó¢¹úÒéÔ±Êܵ½µÄÓ°Ïì×î´ó£¬£¬ £¬£¬£¬£¬68% µÄÄ¿µÄµç×ÓÓʼþµØµã·ºÆðÔÚ°µÍøÉÏ¡£¡£¡£¡£¾ÍÅ·ÃËÒé¾Û»áÔ±¶øÑÔ£¬£¬ £¬£¬£¬£¬44% µÄµç×ÓÓʼþµØµã±»Ðû²¼ÔÚºÚ¿ÍÂÛ̳ÉÏ¡£¡£¡£¡£Ö»ÓÐ 18% µÄ·¨¹úÒéÔ±ºÍ²ÎÒéÔ±µÄÊý¾Ý±»Ð¹Â¶¡£¡£¡£¡£¾ÍÓ¢¹úÕþ¿ÍµÄ°¸Àý¶øÑÔ£¬£¬ £¬£¬£¬£¬ÆäÖаüÀ¨Õþ¸®¸ß²ãºÍ×èµ²ÅÉÈËÎ£¬ £¬£¬£¬£¬ËûÃǵĵç×ÓÓʼþµØµãÔÚ°µÍøÉϱ»·¢Ã÷Áè¼Ý 2,100 ´Î¡£¡£¡£¡£ÔÚÐí¶àÇéÐÎÏ£¬£¬ £¬£¬£¬£¬µç×ÓÓʼþµØµãÔÚÕþ¸®ÍøÕ¾ÉÏÊǹûÕæµÄ¡£¡£¡£¡£ÎÊÌâÔÚÓÚ£¬£¬ £¬£¬£¬£¬µç×ÓÓʼþµØµã·ºÆðÔÚ°µÍøÊг¡ÉÏÅú×¢ÕâЩµØµãÔø±»ÓÃÀ´ÔÚÖÖÖÖµÚÈý·½ÔÚÏßЧÀÍÉϽ¨ÉèÕË»§£¬£¬ £¬£¬£¬£¬¶øÕâЩЧÀÍÔÚij¸öʱ¼äÔâµ½Á˺ڿ͹¥»÷¡£¡£¡£¡£ 


https://www.securityweek.com/information-of-hundreds-of-european-politicians-found-on-dark-web/