ÍøÂç·¸·¨ÕßʹÓÃWMI×é¼þBMOFÈö²¥XMRigÍÚ¿ó¶ñÒâÈí¼þ

Ðû²¼Ê±¼ä 2024-09-12
1. ÍøÂç·¸·¨ÕßʹÓÃWMI×é¼þBMOFÈö²¥XMRigÍÚ¿ó¶ñÒâÈí¼þ


9ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬AhnLab Çå¾²Ç鱨ÖÐÐÄ£¨ASEC£©½üÆÚÕ¹ÏÖÁËÒ»ÖÖÁîÈËСÐĵÄÍøÂç·¸·¨ÐÂÇ÷ÊÆ£¬£¬£¬£¬£¬£¬£¬¼´·¸·¨·Ö×ÓÇÉÃîʹÓöþ½øÖÆÖÎÀí¹¤¾ßÎļþ£¨BMOF£©£¬£¬£¬£¬£¬£¬£¬ÕâÊÇÔÚWindowsÖÎÀí¹æ·¶£¨WMI£©ÖÐÖÁ¹ØÖ÷ÒªµÄ×é¼þ£¬£¬£¬£¬£¬£¬£¬×÷ΪÈö²¥XMRig¼ÓÃÜÇ®±ÒÍÚ¿ó¶ñÒâÈí¼þµÄÔØÌå ¡£¡£¡£BMOFÔ­±¾ÓÃÓÚÖ´Ðо籾µÄ¹¦Ð§±»¶ñÒâʹÓ㬣¬£¬£¬£¬£¬£¬Í¨¹ý½¨Éè¡°ÓÀÊÀÊÂÎñ¶©ÔÄ¡±»úÖÆ£¬£¬£¬£¬£¬£¬£¬ÊµÏÖ¶ñÒâÈí¼þµÄ³¤ÆÚ»¯±£´æÓë×ÔÎÒ»Ö¸´ÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬¼«´óÔöÇ¿Á˹¥»÷Õß¶ÔÊܺ¦ÏµÍ³µÄ¿ØÖÆÁ¦ ¡£¡£¡£´Ë¹¥»÷ÊÖ·¨³£ÓëBondNet¶ñÒâÈí¼þЭͬ£¬£¬£¬£¬£¬£¬£¬ºóÕßר¹¥SQLЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÎó²îʹÓûò±©Á¦ÆÆ½â»ñÈ¡³õʼ»á¼ûȨ£¬£¬£¬£¬£¬£¬£¬ËæºóʹÓÃBMOFÏÂÔØ²¢Ö´Ðиü¶à¶ñÒâ×é¼þ£¬£¬£¬£¬£¬£¬£¬×îÖÕ°²ÅÅXMRigÍÚ¿óÈí¼þ ¡£¡£¡£XMRig×÷ΪһÖÖ¼ÓÃÜÐ®ÖÆ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÇÄÎÞÉùÏ¢µØÕ¼ÓÃÊܺ¦Õßϵͳ×ÊÔ´ÍÚ¾òÃÅÂÞ±Ò£¬£¬£¬£¬£¬£¬£¬¶ÔϵͳÐÔÄÜÓëÄܺÄÔì³ÉÏÔÖø¸ºÃæÓ°Ï죬£¬£¬£¬£¬£¬£¬Îª¹¥»÷Õßıȡ²»·¨ÀûÒæ ¡£¡£¡£


https://securityonline.info/cybercriminals-exploit-legitimate-windows-tool-for-cryptojacking/


2. Ð嵀 PIXHELL Éùѧ¹¥»÷й¶ÁËÒº¾§ÆÁÄ»ÔëÒôµÄÉñÃØ


9ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬ÐÂÐÍÉùѧ¹¥»÷¡°PIXHELL¡±Õ¹Ê¾ÁË´Ó¸ôÀëϵͳÖÐÒþÃØÐ¹Â¶ÐÅÏ¢µÄǿʢÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬Ëüͨ¹ýÅþÁ¬µÄLCDÏÔʾÆ÷·¢³öÈ˶úÄÑÒÔ²ì¾õµÄÉù²¨£¨0-22 kHz£©£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÏñËØÄ£Ê½µ÷ÖÆ×ª´ï±àÂëÐźÅ£¬£¬£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÄܱ»ÖÜΧµÄÖÇÄÜ×°±¸²¶»ñ ¡£¡£¡£Ö»¹ÜÊý¾Ý´«ÊäËÙÂʽÏÂý£¨½ö20 bps£©£¬£¬£¬£¬£¬£¬£¬µ«Ëü×ãÒÔ¾ÙÐÐʵʱ¼üÅ̼ͼ»òÇÔȡСÎı¾Îļþ ¡£¡£¡£PIXHELLÓÉÒÔÉ«ÁÐÄڸǷò±¾¡¤¹ÅÀï°²´óѧµÄMordechai Guri²©Ê¿¿ª·¢£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËLCDÆÁÄ»µÄ×ÔÈ»Éù·¢ÉäÌØÕ÷£¬£¬£¬£¬£¬£¬£¬Á¬ÏµÌØÖƶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬Í¨¹ý²î±ðµÄµ÷ÖÆÊÖÒÕ£¨ÈçOOK¡¢FSK¡¢ASK£©½«Êý¾Ý±àÂëΪÉùÒôÐźŠ¡£¡£¡£ÓÉÓÚÕâЩÉùÒôºÍÏñËØ×ª±ä¶ÔÈËÀàÓû§¶øÑÔÏÕЩ²»¿É¼û£¬£¬£¬£¬£¬£¬£¬Ê¹µÃ¹¥»÷¼«ÆäÒþ²Ø ¡£¡£¡£ÃæÁÙPIXHELL¹¥»÷£¬£¬£¬£¬£¬£¬£¬¿É½ÓÄɵķÀÓù²½·¥°üÀ¨£ºÔÚÃô¸ÐÇøÓò½ûÓÃЯ´øÂó¿Ë·çµÄ×°±¸£¬£¬£¬£¬£¬£¬£¬ÔöÌíÅä¾°ÔëÉùÒÔ×ÌÈÅÐźÅ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ê¹ÓÃÉãÏñÍ·¼à¿ØÆÁÄ»»º³åÇøÒÔ¼ì²âÒì³£ÏñËØÄ£Ê½ ¡£¡£¡£ÕâЩ²½·¥ÅäºÏ×é³ÉÁËÒ»¸ö¶àÌõÀíµÄÇå¾²·À»¤Íø£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÓÐÓõÖÓù´ËÀàÐÂÐÍÉùѧ²àÐŵÀ¹¥»÷ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-pixhell-acoustic-attack-leaks-secrets-from-lcd-screen-noise/


3. Kemper Sports ManagementÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬Ó°Ïì6.2ÍòÈË


9ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬¸ß¶û·òÇò³¡ÖÎÀí¼°ÂùÝЧÀÍÌṩÉÌKemper Sports ManagementÐû²¼ÁËÒ»ÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬²¨¼°6.2ÍòÃûСÎÒ˽¼Ò£¬£¬£¬£¬£¬£¬£¬Ö÷񻃾¼°ÆäÏÖÈμ°Ç°ÈÎÔ±¹¤µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃûºÍÉç»áÇå¾²ºÅÂë ¡£¡£¡£¹«Ë¾ÓÚ2024Äê4ÔÂ1ÈÕ²ì¾õÍøÂçÒì³££¬£¬£¬£¬£¬£¬£¬¾­ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬£¬£¬£¬²»Ã÷ÍþвÕßÒѲ»·¨ÇÖÈëϵͳ²¢»ñÈ¡ÁËÕâЩÐÅÏ¢ ¡£¡£¡£´Ë´Îй¶ÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬£¬£¬²¨¼°KemperSportsÔÚÃÀ¹ú30¸öÖݵÄÁè¼Ý7,500ÃûÔ±¹¤£¬£¬£¬£¬£¬£¬£¬ÁýÕÖÆä140¶à¸ö·ÖÖ§»ú¹¹ ¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢ÐÅÏ¢Òѱ»¶ñÒâʹÓÃÓÚÉí·Ý͵ÇÔ»òڲƭ»î¶¯£¬£¬£¬£¬£¬£¬£¬KemperSportsÒÑѸËÙ½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬£¬ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩһÄêµÄÃâ·ÑÐÅÓÃ¼à¿Ø¼°Éí·Ý»Ö¸´Ð§ÀÍ×÷ΪÅâ³¥ ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ²¢Î´Ã÷È·Ö¸ÏòÈκÎÒÑÖªµÄÀÕË÷Èí¼þ×éÖ¯£¬£¬£¬£¬£¬£¬£¬ÇÒ¹«Ë¾Ç¿µ÷£¬£¬£¬£¬£¬£¬£¬¼´±ãÉæ¼°Êê½ðÖ§¸¶£¬£¬£¬£¬£¬£¬£¬ÆäÒ²²»»á³ÉΪйÃÜÐÅÏ¢µÄ¹ûÕæ¹¤¾ß ¡£¡£¡£´ËÐÂÎÅѸËÙÒýÆðÖ´·¨½çµÄ¹Ø×¢£¬£¬£¬£¬£¬£¬£¬¶à¼Ò״ʦÊÂÎñËùÒÑÐû²¼ÉùÃ÷£¬£¬£¬£¬£¬£¬£¬Òâͼ´ú±íÊܺ¦ÕßÏòKemperSportsÌᳫÕûÌåËßËÏ ¡£¡£¡£


https://www.securityweek.com/data-breach-at-golf-course-management-firm-kempersports-impacts-62000/


4. ÍøÂç´¹ÂÚÐÂÇ÷ÊÆ£ºÓòÃûÇÀ×¢ÓëÆ·ÅÆÃ°³äËÁŰ


9ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬Zscaler ThreatLabz×îб¨¸æÕ¹ÏÖÁËÍøÂç´¹ÂڻÕýÒÔØ¨¹ÅδÓеÄËÙÂÊÔöÌí£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇͨ¹ýÓòÃûÇÀ×¢ºÍÆ·ÅÆÃ°³äÊÖ¶Î ¡£¡£¡£ÔÚ2024Äê2ÔÂÖÁ7ÔÂʱ´ú£¬£¬£¬£¬£¬£¬£¬Ñо¿ÍŶӯÊÎöÁËÁè¼Ý3Íò¸öÓëÈ«Çò×ÅÃûÆ·ÅÆÏàËÆµÄÓòÃû£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÆäÖÐÈý·Ö֮һΪ¶ñÒâÓòÃû£¬£¬£¬£¬£¬£¬£¬ÓÈÒԹȸ衢΢ÈíºÍÑÇÂíÑ·µÈ¿Æ¼¼¾ÞͷΪð³äÖØÔÖÇø£¬£¬£¬£¬£¬£¬£¬Õ¼±È½üËÄ·ÖÖ®Èý ¡£¡£¡£ÕâЩ¹¥»÷ÕßʹÓÃÆ·ÅÆ×ÅÃû¶ÈºÍÓû§ÐÅÈΣ¬£¬£¬£¬£¬£¬£¬Í¨¹ýÉÔ΢ƴд¹ýʧµÄÓòÃûÓÕÆ­Óû§½øÈë¶ñÒâÍøÕ¾£¬£¬£¬£¬£¬£¬£¬Ê¹Óñ»µÁƾ֤ѸËÙ±äÏÖ ¡£¡£¡£»£»£»£»£»¥ÁªÍøÐ§ÀÍÐÐÒµ³ÉÎªÍøÂç´¹ÂÚµÄÖ÷ҪĿµÄ£¬£¬£¬£¬£¬£¬£¬Õ¼±È½üÈý³É£¬£¬£¬£¬£¬£¬£¬×¨ÒµÐ§ÀÍÓëÔÚÏß¹ºÎïÍøÕ¾½ôËæØÊºó£¬£¬£¬£¬£¬£¬£¬ÒòÆä´¦Öóͷ£´ó×ÚÃô¸ÐºÍ²ÆÎñÊý¾Ý¶ø±¸ÊÜÇàíù ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬½ü°ë´¹ÂÚÓòÃû½ÓÄÉÃâ·ÑµÄLet's Encrypt TLSÖ¤ÊéαװÕýµ±£¬£¬£¬£¬£¬£¬£¬Ê¹Óá°¹ÒËø¡±·ûºÅÎóµ¼Óû§£¬£¬£¬£¬£¬£¬£¬ÌÓ±Üä¯ÀÀÆ÷Çå¾²ÖÒÑÔ ¡£¡£¡£¼øÓÚÓòÃûÇÀ×¢ºÍÆ·ÅÆÃ°³ä»î¶¯Ò»Á¬·Å×Ý£¬£¬£¬£¬£¬£¬£¬ÌáÉýÓû§Ìá·ÀÒâʶºÍÔöÇ¿ÆóÒµÍøÂçÇå¾²²½·¥¿Ì½ûÖ¹»º ¡£¡£¡£


https://securityonline.info/cybercriminals-increasingly-target-google-microsoft-and-amazon-in-sophisticated-phishing-schemes/


5. LearnPressÆØÎó²îCVE-2024-8522£¬£¬£¬£¬£¬£¬£¬Íþв³¬9Íò¸öÍøÕ¾Çå¾²


9ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬LearnPressÊÇÒ»¿î¹ãÊܽӴýµÄWordPressÔÚÏ߿γÌÖÎÀí¹¤¾ß²å¼þ£¬£¬£¬£¬£¬£¬£¬½üÆÚ±»·¢Ã÷±£´æÒ»¸ö¸ßΣSQL×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬£¬±àºÅΪCVE-2024-8522£¬£¬£¬£¬£¬£¬£¬ÆäCVSSÆÀ·Ö¸ß´ï10£¬£¬£¬£¬£¬£¬£¬Åú×¢¸ÃÎó²î¾ßÓм«¸ßµÄÑÏÖØÐÔ ¡£¡£¡£´ËÎó²îDZ²ØÓÚLearnPressµÄREST API¶ËµãÖУ¬£¬£¬£¬£¬£¬£¬Ïêϸ¹ØÁªµ½¡°c_only_fields¡±²ÎÊýµÄ´¦Öóͷ£²»µ±£¬£¬£¬£¬£¬£¬£¬Òòȱ·¦×ã¹»µÄתÒå²½·¥ºÍSQLÅÌÎÊ×¼±¸£¬£¬£¬£¬£¬£¬£¬Ê¹µÃδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»×¢Èë¶ñÒâSQL´úÂ룬£¬£¬£¬£¬£¬£¬½ø¶ø¿ÉÄÜ»á¼û²¢ÇÔÈ¡´æ´¢ÔÚWordPressÊý¾Ý¿âÖеÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÈçÓû§Æ¾Ö¤¡¢Ð¡ÎÒ˽¼ÒÊý¾Ý¼°¿Î³Ì×ÊÁÏ ¡£¡£¡£¼øÓÚLearnPressÓµÓÐÁè¼Ý90,000¸ö»îÔ¾×°ÖÃÁ¿£¬£¬£¬£¬£¬£¬£¬ÆäÓ°Ïì¹æÄ£ÆÕ±éÇÒÉîÔ¶£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÉõÖÁ¿ÉÄÜʹÓôËÎó²îÐ޸Ļòɾ³ýÊý¾Ý¿âÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬ÍêÈ«¿ØÖÆÊÜÓ°ÏìµÄÍøÕ¾ ¡£¡£¡£¼øÓÚ¸ÃÎó²îµÄdzÒ×ʹÓÃÐԺ͸ßΣº¦ÐÔ£¬£¬£¬£¬£¬£¬£¬ËùÓÐʹÓÃLearnPressµÄWordPressÍøÕ¾¾ùÃæÁÙÖ±½ÓΣº¦ ¡£¡£¡£LearnPress¿ª·¢ÍŶÓÒÑѸËÙÏìÓ¦£¬£¬£¬£¬£¬£¬£¬Ðû²¼ÁË4.2.7.1°æ±¾ÒÔÐÞ¸´´ËÎó²î ¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéËùÓÐÓû§Á¬Ã¦¸üÐÂÖÁ×îа汾£¬£¬£¬£¬£¬£¬£¬ÒÔÓÐÓÃÌá·ÀDZÔÚµÄÇå¾²Íþв ¡£¡£¡£


https://securityonline.info/cve-2024-8522-cvss-10-learnpress-sqli-flaw-leaves-90k-wordpress-sites-at-risk/


6. ÍøÂçÕ©Æ­ÐÂÄ¿µÄ£ºÌØÀÊÆÕÊý×ÖÉúÒ⿨Ôâ´¹ÂÚÍøÕ¾Î§¹¥


9ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýʹÓô¹ÂÚÍøÕ¾¡¢ÐéαÓòÃû¼°Éç»á¹¤³ÌÊֶΣ¬£¬£¬£¬£¬£¬£¬Õë¶ÔÌØÀÊÆÕµÄÊý×ÖÉúÒ⿨Ìᳫ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÍýÏëÇÔÈ¡ÆäÃô¸ÐÊý¾Ý ¡£¡£¡£ÌØÀÊÆÕµÄÐÂÊý×ÖÉúÒ⿨ÒòÆäÌṩµÄ¶À¼ÒÊý×Ö×ʲúºÍÕæÊµÌåÑé¶ø±¸ÊܹØ×¢£¬£¬£¬£¬£¬£¬£¬È´Ò²Òò´Ë³ÉΪ²»·¨·Ö×ÓµÄÄ¿µÄ ¡£¡£¡£¾ÝVeritiÍøÂçÇå¾²¹«Ë¾±¨¸æ£¬£¬£¬£¬£¬£¬£¬Õ©Æ­Õßͨ¹ý¹¹½¨Óë¹Ù·½ÍøÖ·¸ß¶ÈÏàËÆµÄÐéαURL£¬£¬£¬£¬£¬£¬£¬ÈçʹÓá°.xyz¡±ºó׺»ò¾ÓÐÄÆ´Ð´¹ýʧ£¨Èç¡°trunpcards¡±£©£¬£¬£¬£¬£¬£¬£¬ÓÕµ¼Óû§»á¼û²¢Ð¹Â¶ÐÅÏ¢»ò×°ÖöñÒâÈí¼þ ¡£¡£¡£ËûÃÇʹÓõç×ÓÓʼþÍøÂç´¹ÂÚ£¬£¬£¬£¬£¬£¬£¬·¢ËÍ¿´ËÆÀ´×ÔÕýµ±ÇþµÀµÄÏÞʱÓÅ»ÝÓʼþ£¬£¬£¬£¬£¬£¬£¬ÄÚº¬¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬£¬£¬ÓÕÆ­Óû§µã»÷ ¡£¡£¡£ÌØÀÊÆÕ¼°ÆäÖ§³ÖÕß²¢·ÇÊ״γÉÎªÍøÂç·¸·¨µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬ÒÑÍùÒ²Ôø±¬·¢¹ýÀàËÆÕ©Æ­ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Èçͨ¹ýÐéÎ±ÍøÕ¾ÇÔÈ¡¾èÇ®¡¢Ê¹ÓÃÐéαÓö´ÌÊÂÎñÆ­È¡¼ÓÃÜÇ®±ÒµÈ ¡£¡£¡£ÃæÁÙÕâЩΣº¦£¬£¬£¬£¬£¬£¬£¬Êý×ÖÕ䲨¿¨Ï²»¶ÕßÐè¼á³Ö¸ß¶ÈСÐÄ£¬£¬£¬£¬£¬£¬£¬½ÓÄÉÌá·À²½·¥£¬£¬£¬£¬£¬£¬£¬ÈçʹÓÃ֪ʶÅжÏÐÅÏ¢ÕæÎ±¡¢¼ì²éURLµÄHTTPS±êʶ¼°Æ´Ð´×¼È·ÐÔ¡¢×èÖ¹µã»÷δÂÄÀúÖ¤µÄÓʼþÁ´½Ó£¬£¬£¬£¬£¬£¬£¬²¢×Ô¶¯»á¼û¹Ù·½ÍøÕ¾ ¡£¡£¡£


https://hackread.com/fake-domains-trump-supporters-trading-card-scam/