PipeMagicľÂíʹÓÃαÔìChatGPTÓ¦ÓóÌÐò¹¥»÷É³ÌØ°¢À²®
Ðû²¼Ê±¼ä 2024-10-171. PipeMagicľÂíʹÓÃαÔìChatGPTÓ¦ÓóÌÐò¹¥»÷É³ÌØ°¢À²®
10ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¿¨°Í˹»ùÈ«ÇòÑо¿ÓëÆÊÎöÍŶӣ¨GReAT£©½üÆÚÅû¶ÁËÒ»ÏîеÄÍøÂç¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃÒ»ÖÖÃûΪPipeMagicµÄÖØ´óºóÃÅľÂí¾ÙÐÐÈö²¥£¬£¬£¬£¬£¬£¬£¬£¬ÆäµØÀíÄ¿µÄÒÑ´ÓÑÇÖÞÀ©Õ¹µ½É³Ìذ¢À²®¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó½ÓÄÉÁËÒ»¿îÓÃRust¿ª·¢µÄαÔìChatGPTÓ¦ÓóÌÐò×÷Ϊ³õʼѬȾǰÑÔ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã³ÌÐòʹÓó£¼ûµÄRust¿âÀ´¹æ±ÜÆðÔ´¼ì²â£¬£¬£¬£¬£¬£¬£¬£¬µ«ÔÚÖ´ÐÐʱ½öÏÔʾ¿ÕȱÆÁÄ»£¬£¬£¬£¬£¬£¬£¬£¬²¢Òþ²ØÒ»¸ö°üÀ¨¶ñÒâ¸ºÔØµÄ¼ÓÃÜÊý¾ÝÊý×é¡£¡£¡£¡£¡£ÔÚºóÐø½×¶Î£¬£¬£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»á½ÓÄÉÃû³Æ¹þÏ£Ëã·¨¶¨Î»Òªº¦µÄWindows APIº¯Êý£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ·ÖÅÉÄÚ´æ¡¢¼ÓÔØPipeMagicºóÃÅ¡¢ÉèÖÃÉèÖò¢Æô¶¯¶ñÒâÈí¼þ¡£¡£¡£¡£¡£PipeMagicľÂí¾ßÓÐÆæÒìµÄ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬£¬Äܹ»ÌìÉúÒ»¸ö16×Ö½ÚµÄËæ»úÊý×飬£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚ½¨ÉèÃüÃû¹ÜµÀÒÔʵÏÖÒþ²ØÍ¨Ñ¶ºÍÏÂÁîÖ´ÐУ¬£¬£¬£¬£¬£¬£¬£¬ÆäÏÂÁîºÍ¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷±»ÍйÜÔÚMicrosoft AzureÉÏ¡£¡£¡£¡£¡£
https://securityonline.info/pipemagic-trojan-exploits-fake-chatgpt-app-to-target-saudi-arabian-organizations/
2. ErrorFather»î¶¯Ê¹ÓÃδ±»·¢Ã÷CerberusÒøÐÐľÂí¾ÙÐÐÖØ´ó¹¥»÷
10ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²ÌṩÉÌCyble±¨¸æÁËÒ»ÏîеÄÖØ´ó¶ñÒâ»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯ÕýÔÚʹÓÃδ±»·¢Ã÷µÄCerberus AndroidÒøÐÐľÂí¸ºÔØ¡£¡£¡£¡£¡£Cyble·¢Ã÷ÁË15¸öð³äChromeºÍPlay StoreÓ¦ÓõĶñÒâÑù±¾£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÑù±¾½ÓÄɶà½×¶ÎͶ·ÅÆ÷°²ÅÅÒøÐÐľÂí¸ºÔØ£¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÁËCerberusÒøÐÐľÂí¡£¡£¡£¡£¡£CerberusÊÇÒ»ÖÖ¿ÉÒÔÇÔÈ¡ÒøÐÐÓ¦ÓóÌÐòµÇ¼ƾ֤¡¢ÐÅÓÿ¨ÏêϸÐÅÏ¢ºÍÆäËûСÎÒ˽¼ÒÐÅÏ¢µÄ¶ñÒâ³ÌÐò£¬£¬£¬£¬£¬£¬£¬£¬×Ô2019Äê·ºÆðÒÔÀ´ÒѳÉΪ×îÖøÃûµÄÒøÐÐľÂíÖ®Ò»¡£¡£¡£¡£¡£Ö»¹ÜÆäÔ´´úÂëÔÚ2020Äêй¶£¬£¬£¬£¬£¬£¬£¬£¬µ¼Ö·ºÆðÁËеıäÖÖÈçAlienºÍERMAC£¬£¬£¬£¬£¬£¬£¬£¬µ«Cerberus¼°Æä·ÖÖ§ÈÔÔÚÒ»Ö±±»ÖØÐÂʹÓᣡ£¡£¡£¡£´Ë´ÎErrorFather»î¶¯ÖУ¬£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕß¶Ô¶ñÒâÈí¼þ¾ÙÐÐÁËÉÔ΢Ð޸쬣¬£¬£¬£¬£¬£¬£¬µ«Ö÷Òª»ùÓÚÔʼµÄCerberus´úÂ룬£¬£¬£¬£¬£¬£¬£¬½ÓÄÉÁËÖØ´óµÄѬȾÁ´£¬£¬£¬£¬£¬£¬£¬£¬Ê¹¼ì²âºÍɾ³ýÊÂÇé±äµÃÖØ´ó¡£¡£¡£¡£¡£×îÖÕµÄÓÐÓÃÔØºÉ½ÓÄɼüÅ̼ͼ¡¢ÁýÕÖ¹¥»÷¡¢VNCºÍÓòÌìÉúËã·¨(DGA)À´Ö´ÐжñÒâ»î¶¯¡£¡£¡£¡£¡£Cyble½¨ÒéÓû§½ö´Ó¹Ù·½Ó¦ÓÃÊÐËÁÏÂÔØÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃ×ÅÃû·À²¡¶¾ºÍ»¥ÁªÍøÇå¾²Èí¼þ°ü£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÇ¿ÃÜÂëºÍ¶àÒòËØÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬£¬ÆôÓÃÉúÎïʶ±ðÇå¾²¹¦Ð§£¬£¬£¬£¬£¬£¬£¬£¬²¢È·±£Android×°±¸ÉÏÆôÓÃÁËGoogle Play Protect¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/cerberus-android-banking-trojan/
3. CISAÖÒÑÔSolarWinds WHDÈí¼þÑÏÖØÇå¾²Îó²îÕý±»Æð¾¢Ê¹ÓÃ
10ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼£¬£¬£¬£¬£¬£¬£¬£¬Òѽ«Ó°ÏìSolarWinds Web Help Desk (WHD) Èí¼þµÄÑÏÖØÇå¾²Îó²îCVE-2024-28987£¨CVSSÆÀ·Ö9.1£©Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖУ¬£¬£¬£¬£¬£¬£¬£¬²¢Ö¸³öÒÑÓÐÖ¤¾ÝÅú×¢¸ÃÎó²îÕýÔÚ±»×Ô¶¯Ê¹Óᣡ£¡£¡£¡£´ËÎó²îÓëÓ²±àÂëÆ¾Ö¤Ïà¹Ø£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜʹԶ³Ìδ¾Éí·ÝÑéÖ¤µÄÓû§»ñµÃ»á¼ûȨÏÞ²¢¾ÙÐÐÊý¾ÝÐ޸ġ£¡£¡£¡£¡£SolarWindsÔÚ2024Äê8ÔÂÏÂÑ®Ê״ιûÕæÁ˸ÃÎó²îÏêÇ飬£¬£¬£¬£¬£¬£¬£¬ËæºóÍøÂçÇå¾²¹«Ë¾Horizon3.ai½øÒ»²½ÌṩÁËÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±Ôú¿Ë¡¤ººÀûÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÄÜÈù¥»÷ÕßÔ¶³Ì¶ÁÈ¡ºÍÐÞ¸Ä×ÊÖų́Ʊ֤ÖеÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬ÈçÖØÖÃÃÜÂëÇëÇóºÍЧÀÍÕÊ»§Æ¾Ö¤¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÉв»ÇåÎú¸ÃÎó²îµÄÏêϸʹÓÃÇéÐκÍʹÓÃÕßÉí·Ý£¬£¬£¬£¬£¬£¬£¬£¬µ«ÕâÒ»·¢Ã÷½ôËæCISAÁ½¸öÔÂǰ½«Í³Ò»Èí¼þÖеÄÁíÒ»¸ßΣÎó²î£¨CVE-2024-28986£¬£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö9.8£©ÄÉÈëKEVĿ¼֮ºó¡£¡£¡£¡£¡£¼øÓÚ´Ë£¬£¬£¬£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÐèÔÚ2024Äê11ÔÂ5ÈÕǰӦÓÃ×îÐÂÐÞ¸´³ÌÐò£¨°æ±¾12.8.3 Hotfix 2»ò¸ü¸ß£©£¬£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·±£ÍøÂçÇå¾²¡£¡£¡£¡£¡£
https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html
4. ºÚ¿ÍʹÓÃEDRSilencerºì¶Ó¹¤¾ßÈÆ¹ýÇå¾²·À»¤¾ÙÐй¥»÷
10ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±¿ËÈÕ·¢Ã÷ÁËÒ»ÖÖÃûΪEDRSilencerµÄºì¶Ó²Ù×÷¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ßÄܹ»Ê¶±ðÇå¾²¹¤¾ß²¢½«ÆäÏòÖÎÀí¿ØÖÆÌ¨·¢³öµÄ¾¯±¨¾²Òô£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶ø×ÊÖú¹¥»÷ÕßÌӱܼì²â¡£¡£¡£¡£¡£EDRSilencerÊÇÒ»¸ö¿ªÔ´¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬ÊÜMdSec NightHawk FireBlockÆô·¢¶ø¿ª·¢£¬£¬£¬£¬£¬£¬£¬£¬¿É¼ì²âÔËÐÐÖеĶ˵ã¼ì²âºÍÏìÓ¦£¨EDR£©Àú³Ì£¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃWindows¹ýÂËÆ½Ì¨£¨WFP£©¼à¿Ø¡¢×èÖ¹»òÐÞ¸ÄÍøÂçÁ÷Á¿¡£¡£¡£¡£¡£Í¨¹ý×Ô½ç˵¹æÔò£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÆÆËðEDR¹¤¾ßÓëÆäÖÎÀíЧÀÍÆ÷Ö®¼äµÄÊý¾Ý½»Á÷£¬£¬£¬£¬£¬£¬£¬£¬×èÖ¹¾¯±¨ºÍÒ£²â±¨¸æµÄ·¢ËÍ¡£¡£¡£¡£¡£ÔÚ×îа汾ÖУ¬£¬£¬£¬£¬£¬£¬£¬EDRSilencer¿É¼ì²â²¢×èÖ¹16ÖÖÏÖ´úEDR¹¤¾ß¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼µÈÍøÂçÇå¾²¹«Ë¾¶ÔEDRSilencer¾ÙÐÐÁ˲âÊÔ£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷һЩÊÜÓ°ÏìµÄEDR¹¤¾ß¿ÉÄÜÈÔÄÜ·¢Ëͱ¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬µ«EDRSilencerÔÊÐí¹¥»÷ÕßÀ©Õ¹Ä¿µÄÀú³ÌÁбíÒÔº¸ÇÖÖÖÖÇå¾²¹¤¾ß¡£¡£¡£¡£¡£ÕâʹµÃ¶ñÒâÈí¼þ»òÆäËû¶ñÒâ»î¶¯¿ÉÄÜÈÔδ±»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬ÔöÌíÁ˹¥»÷ÀֳɵĿÉÄÜÐÔ¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼½¨Ò齫EDRSilencer×÷Ϊ¶ñÒâÈí¼þ¾ÙÐмì²â£¬£¬£¬£¬£¬£¬£¬£¬²¢ÊµÑé¶àÌõÀíµÄÇå¾²¿ØÖÆÀ´Ìá·À´ËÀ๥»÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/edrsilencer-red-team-tool-used-in-attacks-to-bypass-security/
5. OwlTingÒòAWS S3´æ´¢Í°ÉèÖùýʧ£¬£¬£¬£¬£¬£¬£¬£¬Ì»Â¶765,000Óû§Ãô¸ÐÊý¾Ý
10ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Çø¿éÁ´ÊÖÒÕ¹«Ë¾OwlTingÒòÉèÖùýʧµÄÑÇÂíÑ·S3´æ´¢Í°£¬£¬£¬£¬£¬£¬£¬£¬ÒâÍâ̻¶ÁË765,000ÃûÓû§µÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÓ°Ïį̀ÍåµÄÂùݿÍÈË¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨È«Ãû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãÒÔ¼°ÂùÝÔ¤¶©ÏêÇéµÈСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£OwlTing½¨ÉèÓÚ2010Ä꣬£¬£¬£¬£¬£¬£¬£¬ÊÇÒ»¼ÒЧÀÍÓÚÈ«ÇòÂÃÓΡ¢Ê³ÎïÇå¾²¡¢Âùݡ¢Ã½ÌåºÍÆäËûµç×ÓÉÌÎñÁìÓò²¢Ìṩ×ÅÃûÇø¿éÁ´½â¾ö¼Æ»®µĄ̈Í幫˾¡£¡£¡£¡£¡£OwlTingÈ·ÈÏÁËÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬µ«Éù³Æ²»Éæ¼°Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬È»¶øCybernewsÑо¿Ö°Ô±ÖÒÑÔ˵£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢¿ÉÄܵ¼ÖÂÉí·Ý͵ÇÔºÍڲơ£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý¶ÔÍøÂç·¸·¨·Ö×ÓÀ´ËµºÜÊÇÓмÛÖµ£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÄܱ»ÓÃÓÚÓã²æÊ½ÍøÂç´¹ÂÚ¡¢ÓïÒô´¹ÂÚ¡¢¶ÌÐÅ´¹Âڵȹ¥»÷¡£¡£¡£¡£¡£Cybernews½¨Òé½ÓÄÉһϵÁв½·¥À´»º½âÑÇÂíÑ·S3´æ´¢Í°Ì»Â¶µÄΣº¦£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÏÞÖÆ¹ûÕæ»á¼û¡¢¼à¿Ø»á¼ûÈÕÖ¾¡¢ÆôÓÃЧÀÍÆ÷¶Ë¼ÓÃܵȡ£¡£¡£¡£¡£
https://cybernews.com/security/taiwan-visitors-exposed-in-massive-data-leak-owlting/
6. ³¯ÏʺڿÍ×éÖ¯ScarCruftʹÓÃIEÁãÈÕÎó²îÌᳫ¹¥»÷
10ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬³¯ÏʺڿÍ×éÖ¯ScarCruft£¨ÓÖ³ÆAPT37»òRedEyes£©ÓÚ5ÔÂÌᳫ´ó¹æÄ£¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃInternet ExplorerµÄÁãÈÕÎó²îCVE-2024-39178£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÌØÖÆµÄToastµ¯³ö¹ã¸æÑ¬È¾Ä¿µÄ×°±¸£¬£¬£¬£¬£¬£¬£¬£¬Ö²ÈëRokRAT¶ñÒâÈí¼þÒÔÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¸ÃÎó²îΪÀàÐÍ»ìÏýÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ASECºÍNCSC·¢Ã÷ºóѸËÙ֪ͨ΢Èí£¬£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÓÚ8ÔÂÐû²¼Çå¾²¸üÐÂÐÞ¸´¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷µÄÎó²îÓëScarCruftÒÑÍùʹÓõÄCVE-2022-41128Îó²îÏàËÆ£¬£¬£¬£¬£¬£¬£¬£¬½öÔöÌíÈýÐдúÂëÒÔÈÆ¹ý¾ÉÐÞ¸´¡£¡£¡£¡£¡£ScarCruftÈëÇÖº«¹ú¹ã¸æ¹«Ë¾Ð§ÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬£¬ÔÚÊ¢ÐÐÃâ·ÑÈí¼þÖÐÍÆËͺ¬¶ñÒâiframeµÄToast¹ã¸æ£¬£¬£¬£¬£¬£¬£¬£¬µ±ÓÉInternet ExploreräÖȾʱ£¬£¬£¬£¬£¬£¬£¬£¬´¥·¢Ô¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£RokRAT±äÖÖÿ30·ÖÖÓ½«Ìض¨Îļþ´«ÊäÖÁYandexÔÆÊµÀý£¬£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Ö´ÐмüÅ̼ͼ¡¢¼àÊÓ¼ôÌù°å¸ü¸ÄºÍÆÁÄ»½ØÍ¼²¶»ñ¡£¡£¡£¡£¡£¹¥»÷ͨ¹ýËIJ½Àú³Ì×¢Èë¡°explorer.exe¡±Àú³ÌÒÔÌӱܼì²â£¬£¬£¬£¬£¬£¬£¬£¬Èô¼ì²âµ½Avast»òSymantec·À²¡¶¾Èí¼þ£¬£¬£¬£¬£¬£¬£¬£¬Ôò½«¶ñÒâÈí¼þ×¢ÈëËæ»ú¿ÉÖ´ÐÐÎļþÖС£¡£¡£¡£¡£Í¨¹ýÔÚWindowsÆô¶¯Ê±Ìí¼Ó×îÖÕÓÐÓøºÔز¢×¢²áµ½ÏµÍ³µ÷Àí³ÌÐòÖУ¬£¬£¬£¬£¬£¬£¬£¬ÊµÏÖ³¤ÆÚÐÔѬȾ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-ads-exploited-internet-explorer-zero-day-to-drop-malware/


¾©¹«Íø°²±¸11010802024551ºÅ