Mirai½©Ê¬ÍøÂçʹÓÃNVR¡¢TP-Link ·ÓÉÆ÷ÖеÄÎó²î
Ðû²¼Ê±¼ä 2024-12-251. Mirai½©Ê¬ÍøÂçʹÓÃNVR¡¢TP-Link ·ÓÉÆ÷ÖеÄÎó²î
12ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖеĻùÓÚMiraiµÄ½©Ê¬ÍøÂçÕýÔÚʹÓÃÉÐδÊÕµ½¸ú×ÙÆ÷±àºÅÇÒδÔÚDigiEver DS-2105 Pro NVRÖÐÐÞ²¹µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¼ÓÚ10Ô£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÍøÂç¼Ïñ»úºÍ¹Ì¼þ¹ýʱµÄTP-Link·ÓÉÆ÷¡£¡£¡£¡£¡£¡£¡£¡£TXOneÑо¿Ô±Ta-Lun YenÈ¥ÄêÔÚDefCampÇå¾²¾Û»áÉÏչʾÁËÆäÖÐÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˶ą̀DVR×°±¸¡£¡£¡£¡£¡£¡£¡£¡£AkamaiµÄÑо¿Ö°Ô±ÊӲ쵽£¬£¬£¬£¬£¬£¬Ö»¹Ü¸Ã½©Ê¬ÍøÂçÔÚ11ÔÂÖÐÑ®×îÏÈʹÓôËÎó²î£¬£¬£¬£¬£¬£¬µ«Ö¤¾ÝÅú×¢Æä»î¶¯ÖÁÉÙ´Ó9ÔÂÒÑ×îÏÈ¡£¡£¡£¡£¡£¡£¡£¡£³ýÁËDigiEverÎó²î£¬£¬£¬£¬£¬£¬ÐµÄMirai±äÖÖ»¹Õë¶ÔTP-LinkµÄCVE-2023-1389Îó²îºÍTeltonika RUT9XX·ÓÉÆ÷µÄCVE-2018-17532Îó²î¡£¡£¡£¡£¡£¡£¡£¡£Õë¶ÔDigiEver NVRµÄ¹¥»÷ͨ¹ýÔ¶³Ì´úÂëÖ´ÐÐȱÏÝʵÏÖ£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃδ׼ȷÑéÖ¤Óû§ÊäÈëµÄURI×¢ÈëÏÂÁ£¬£¬£¬£¬£¬´Ó¶ø»ñÈ¡¶ñÒâÈí¼þ¶þ½øÖÆÎļþ²¢½«×°±¸ÄÉÈë½©Ê¬ÍøÂç¡£¡£¡£¡£¡£¡£¡£¡£Ò»µ©×°±¸±»¹¥»÷£¬£¬£¬£¬£¬£¬¾Í»áÓÃÓÚÂþÑÜʽ¾Ü¾øÐ§À͹¥»÷»òÈö²¥µ½ÆäËû×°±¸¡£¡£¡£¡£¡£¡£¡£¡£ÐµÄMirai±äÖÖ½ÓÄÉXORºÍChaCha20¼ÓÃÜ£¬£¬£¬£¬£¬£¬Ö§³Ö¶àÖÖϵͳ¼Ü¹¹¡£¡£¡£¡£¡£¡£¡£¡£AkamaiÖ¸³ö£¬£¬£¬£¬£¬£¬Ö»¹ÜÖØ´ó½âÃÜÒªÁì²»ÐÂÏÊ£¬£¬£¬£¬£¬£¬µ«ÏÔʾMirai½©Ê¬ÍøÂçÔËÓªÉÌÔÚÕ½ÂÔºÍÊÖÒÕÉÏһֱǰ½ø¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-botnet-exploits-vulnerabilities-in-nvrs-tp-link-routers/
2. ClopÀÕË÷Èí¼þÍÅ»ïʹÓÃCleoÁãÈÕÎó²îÌᳫÐÂÀÕË÷¹¥ÊÆ
12ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬ClopÀÕË÷Èí¼þÍÅ»ï½üÆÚ¶ÔÆäCleoÊý¾Ý͵ÇÔ¹¥»÷µÄÊܺ¦Õß·¢³öÁËÀÕË÷֪ͨ£¬£¬£¬£¬£¬£¬ÒªÇó66¼Ò¹«Ë¾ÔÚ48СʱÄÚÏìÓ¦ÆäÒªÇ󣬣¬£¬£¬£¬£¬²»È»½«Åû¶ÕâЩ¹«Ë¾µÄÈ«Ãû¡£¡£¡£¡£¡£¡£¡£¡£Clopͨ¹ý°µÍøÃÅ»§Ö±½ÓÁªÏµÕâЩ¹«Ë¾£¬£¬£¬£¬£¬£¬²¢ÌṩÇ徲̸ÌìÆµµÀÁ´½ÓºÍµç×ÓÓʼþµØµã¾ÙÐÐÊê½ðÖ§¸¶Ì¸ÅС£¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÁËCleo LexiCom¡¢VLTransferºÍHarmony²úÆ·ÖеÄÁãÈÕÎó²î£¨CVE-2024-50623£©£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÖ´Ðв»ÊÜÏÞÖÆµÄÎļþÉÏ´«ºÍÏÂÔØ£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£¡£ClopÒÑÍùÒ²ÔøÊ¹ÓÃÆäËûƽ̨µÄÁãÈÕÎó²î»á¼û¹«Ë¾ÍøÂç¡£¡£¡£¡£¡£¡£¡£¡£¹©Ó¦ÉÌÒÑÌṩÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬£¬µ«ÖÒÑԳƺڿͿÉÄÜʹÓøÃÐÞ¸´³ÌÐòÔÚÊÜѬȾµÄÍøÂçÉÏ·¿ª·´Ïòshell¡£¡£¡£¡£¡£¡£¡£¡£Clop»¹Ðû²¼½«É¾³ýÒÔǰ¹¥»÷µÄÊý¾Ý£¬£¬£¬£¬£¬£¬ÒÔרעÓÚÐÂÒ»ÂÖµÄÀÕË÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÏêϸÓм¸¶à¹«Ë¾Êܵ½ÁËClop×îй¥»÷µÄÍþв£¬£¬£¬£¬£¬£¬µ«CleoÈí¼þÒѱ»È«ÇòÁè¼Ý4000¼Ò×é֯ʹÓᣡ£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/clop-ransomware-is-now-extorting-66-cleo-data-theft-victims/
3. Postman Workspacesй¶30000¸öAPIÃÜÔ¿ºÍÃô¸ÐÁîÅÆ
12ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬CloudSEKµÄTRIADÍŶӷ¢Ã÷£¬£¬£¬£¬£¬£¬ÒòÀÄÓÃPostman Workspaces£¬£¬£¬£¬£¬£¬´ó×ÚÃô¸ÐÊý¾ÝÃæÁÙй¶Σº¦¡£¡£¡£¡£¡£¡£¡£¡£ÔÚΪÆÚÒ»ÄêµÄÊÓ²ìÖУ¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Áè¼Ý30,000¸ö¿É¹ûÕæ»á¼ûµÄPostman Workspacesй¶ÁËAPIÃÜÔ¿¡¢ÁîÅÆºÍÖÎÀíԱƾ֤µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬Éæ¼°GitHub¡¢SlackºÍSalesforceµÈƽ̨£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˰üÀ¨Ò½ÁƱ£½¡¡¢Ô˶¯´ò°çºÍ½ðÈÚЧÀÍÔÚÄڵĶà¸öÐÐÒµ¡£¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÔµ¹ÊÔÓÉÖ÷Òª°üÀ¨»á¼ûÉèÖùýʧ¡¢´¿Îı¾´æ´¢ÒÔ¼°Õä²ØÆ·µÄ¹ûÕæ¹²Ïí¡£¡£¡£¡£¡£¡£¡£¡£CloudSEKÖ¸³ö£¬£¬£¬£¬£¬£¬ÕâЩй¶¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡¢Î´¾ÊÚȨµÄϵͳ»á¼ûÒÔ¼°ÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷µÄÔöÌí¡£¡£¡£¡£¡£¡£¡£¡£ÎªÈ·±£Êý¾ÝÇå¾²£¬£¬£¬£¬£¬£¬×é֯ӦʹÓÃÇéÐαäÁ¿¡¢ÂÖ»»ÁîÅÆ¡¢½ÓÄÉÉñÃØÖÎÀí¹¤¾ßµÈ²½·¥¡£¡£¡£¡£¡£¡£¡£¡£CloudSEKÒÑÏòÊÜÓ°ÏìµÄ×éÖ¯±¨¸æÁË´ó´ó¶¼ÊÂÎñ£¬£¬£¬£¬£¬£¬²¢±Þ²ß×éÖ¯½ÓÄɸü¿É¿¿µÄÇå¾²²½·¥¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬PostmanҲʵÑéÁËÉñÃØ±£»£»£»£»£»£»£»¤Õþ²ß£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâÃô¸ÐÊý¾ÝÔÚ¹«¹²ÊÂÇéÇøÖÐ̻¶¡£¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/postman-workspaces-leak-api-keys-sensitive-tokens/
4. Å·ÖÞº½Ìì¾Ö¹Ù·½ÊÐËÁÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬ÇÔÈ¡¿Í»§Ö§¸¶ÐÅÏ¢
12ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬Å·ÖÞº½Ìì¾ÖµÄ¹Ù·½ÍøÉÏÊÐËÁ½üÆÚÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ý¼ÓÔØÒ»¶ÎJavaScript´úÂ룬£¬£¬£¬£¬£¬ÔÚ½áÕËʱÌìÉúÒ»¸öÐéαµÄStripeÖ§¸¶Ò³Ã棬£¬£¬£¬£¬£¬´Ó¶øÍøÂç¿Í»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨Ö§¸¶¿¨Êý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£Å·ÖÞº½Ìì¾Ö£¨ESA£©µÄÔ¤ËãÁè¼Ý100ÒÚÅ·Ôª£¬£¬£¬£¬£¬£¬ÆäʹÃüÊÇͨ¹ýÅàѵÓԱÒÔ¼°ÖÆ×÷ÓÃÓÚ̽Ë÷ÓîÖæÉñÃØµÄ»ð¼ýºÍÎÀÐÇÀ´À©Õ¹Ì«¿Õ»î¶¯µÄ¼«ÏÞ¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÊÐËÁÏÖÔÚÎÞ·¨Ê¹Ó㬣¬£¬£¬£¬£¬²¢ÏÔʾ¡°ÔÝʱÍÑÀë¹ìµÀ¡±µÄÐÂÎÅ¡£¡£¡£¡£¡£¡£¡£¡£µç×ÓÉÌÎñÇå¾²¹«Ë¾Sansec×¢ÖØµ½ÁËÕâÒ»¶ñÒâ¾ç±¾£¬£¬£¬£¬£¬£¬²¢ÖÒÑԳƸÃÊÐËÁËÆºõÓëÅ·ÖÞº½Ìì¾Ö£¨ESA£©ÏµÍ³¼¯³É£¬£¬£¬£¬£¬£¬¿ÉÄܶÔÔ±¹¤×é³ÉΣº¦¡£¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬ÍøÂçÓ¦ÓÃÇå¾²¹«Ë¾Source Defense ResearchҲ֤ʵÁËSansecµÄÊÓ²ìЧ¹û¡£¡£¡£¡£¡£¡£¡£¡£ÔÚ±»BleepingComputerѯÎÊÓйش˴ÎÈëÇÖµÄÏêϸÐÅϢʱ£¬£¬£¬£¬£¬£¬ESAÌåÏÖ¸ÃÊÐËÁ²¢²»ÍйÜÔÚÆä»ù´¡ÉèÊ©ÉÏ£¬£¬£¬£¬£¬£¬Ò²²»ÖÎÀíÆäÉϵÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£Í¨¹ýwhoisÅÌÎÊ¿ÉÒÔÈ·ÈÏ£¬£¬£¬£¬£¬£¬¸ÃÊÐËÁµÄÓòÃûºÍÁªÏµÊý¾ÝÓëESAµÄ¹Ù·½ÓòÃû²î±ð£¬£¬£¬£¬£¬£¬ÇÒÁªÏµÊý¾ÝÒѱ»É¾³ýÒÔ±£»£»£»£»£»£»£»¤Òþ˽¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/european-space-agencys-official-store-hacked-to-steal-payment-cards/
5. PyPIÏÖ¶ñÒâPythonÈí¼þ°üÇÔÈ¡Óû§Êý¾Ý
12ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬Fortinet FortiGuard LabµÄAI¼ì²âϵͳ½üÆÚ·¢Ã÷ÁËÁ½¸öÔÚPythonÈí¼þ°üË÷Òý(PyPI)ÉϵĶñÒâPythonÈí¼þ°ü£ºZebo-0.1.0ºÍCometlogger-0.1¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þͨ¹ý¼üÅ̼ͼ¡¢½ØÍ¼ºÍÐÅϢй¶µÈÊÖ¶ÎÇÔÈ¡Óû§Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬²¢Ê¹ÓûìÏýÊÖÒÕÌӱܼì²â¡£¡£¡£¡£¡£¡£¡£¡£Zebo-0.1.0ʹÓÃpynputºÍImageGrabµÈ¿â¼Í¼°´¼üºÍ½ØÈ¡ÆÁÄ»½ØÍ¼£¬£¬£¬£¬£¬£¬½«Ãô¸ÐÐÅϢй¶µ½Ô¶³ÌЧÀÍÆ÷£¬£¬£¬£¬£¬£¬²¢ÔÚÏµÍ³ÖØÆôÊ±ÖØÐÂÖ´ÐÐÒÔÈ·¼á³¤ÆÚ¿ØÖÆ¡£¡£¡£¡£¡£¡£¡£¡£Cometlogger-0.1ÔòרעÓÚÐÅÏ¢ÇÔÈ¡ºÍ³¤ÆÚ±£´æ£¬£¬£¬£¬£¬£¬Õë¶Ô¶à¸öÉ罻ƽ̨ÇÔÈ¡ÁîÅÆ¡¢ÃÜÂëºÍÕÊ»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢½ÓÄÉ·´ÐéÄâ»ú¼ì²âÊÖÒպͶ¯Ì¬ÎļþÐ޸Ĺ¦Ð§¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ°ü¶ÔËùÓпÉÒÔ×°ÖÃPyPIÈí¼þ°üµÄƽ̨×é³ÉÖØ´óÒþ˽ºÍÇ徲Σº¦£¬£¬£¬£¬£¬£¬Ìá·ÀÕâЩÍþвÐèÒª¶Ï¿ª»¥ÁªÍøÅþÁ¬¡¢¸ôÀëÊÜѬȾϵͳ¡¢Ê¹Ó÷À²¡¶¾Èí¼þÒÔ¼°ÔÚÐëÒªÊ±ÖØÐÂÃûÌû¯ÏµÍ³¡£¡£¡£¡£¡£¡£¡£¡£PyPIµÄ±ãµ±ÐÔÅãͬ×ÅΣº¦£¬£¬£¬£¬£¬£¬¿ª·¢Ö°Ô±ÐèÒª¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬×èÖ¹×°ÖöñÒâÈí¼þ°ü¡£¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/python-malware-zebo-cometlogger-stealing-user-data/
6. ³¯Ïʺڿ͹¥»÷DMM Bitcoin£¬£¬£¬£¬£¬£¬ÇÔÈ¡3.08ÒÚÃÀÔª¼ÓÃÜÇ®±Ò
12ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬³¯ÏʺڿÍ×éÖ¯¡°TraderTraitor¡±£¨Ò²±»×·×ÙΪJade Sleet¡¢UNC4899ºÍSlow Pisces£©ÔÚ½ñÄê5Ô¶ÔÈÕ±¾DMM BitcoinÉúÒâËùÌᳫ¹¥»÷£¬£¬£¬£¬£¬£¬ÀÖ³ÉÇÔÈ¡Á˼ÛÖµ3.08ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʼÓÚ3ÔÂÏÂÑ®£¬£¬£¬£¬£¬£¬ºÚ¿Íαװ³ÉLinkedInÉϵÄÕýµ±ÕÐÆ¸Ö°Ô±£¬£¬£¬£¬£¬£¬½Ó´¥²¢ÓÕµ¼ÈÕ±¾ÆóÒµ¼ÓÃÜÇ®±ÒÇ®°üÈí¼þ¹«Ë¾GincoµÄÒ»ÃûÔ±¹¤ÏÂÔØ²¢Ö´ÐжñÒâPython´úÂ룬£¬£¬£¬£¬£¬½ø¶øÉøÍ¸µ½Ginco²¢ºáÏòÒÆ¶¯µ½DMM¡£¡£¡£¡£¡£¡£¡£¡£FBIÖ¸³ö£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓûỰcookieÐÅϢð³äÊÜѬȾԱ¹¤£¬£¬£¬£¬£¬£¬»ñÈ¡Gincoδ¼ÓÃÜͨѶϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬²¢×îÖÕÔÚ5ÔÂÏÂѮʹÓÃDMMÔ±¹¤µÄÕýµ±ÉúÒâÇëÇ󣬣¬£¬£¬£¬£¬µ¼Ö¾޶îËðʧ¡£¡£¡£¡£¡£¡£¡£¡£×Ô2022ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬TraderTraitorÒ»Ö±»îÔ¾ÓÚÇø¿éÁ´ÁìÓò£¬£¬£¬£¬£¬£¬Ê¹ÓÃÐéαӦÓóÌÐò¾ÙÐÐÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬ÃÀ¹úÕþ¸®Ò»Ö±ÔÚÇ×½ü¼àÊÓÆä»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fbi-links-north-korean-hackers-to-308-million-crypto-heist/


¾©¹«Íø°²±¸11010802024551ºÅ