Èû¶ûάÑÇÕþ¸®Ê¹ÓøßͨÁãÈÕÎó²î°²ÅÅNoviSpyÌØ¹¤Èí¼þ

Ðû²¼Ê±¼ä 2024-12-18

1. Èû¶ûάÑÇÕþ¸®Ê¹ÓøßͨÁãÈÕÎó²î°²ÅÅNoviSpyÌØ¹¤Èí¼þ


12ÔÂ16ÈÕ £¬£¬£¬ £¬£¬Èû¶ûάÑÇÕþ¸®±»ÆØÊ¹ÓøßͨÁãÈÕÎó²î £¬£¬£¬ £¬£¬ÔÚAndroid×°±¸Éϰ²ÅÅÁËÒ»ÖÖÃûΪ¡°NoviSpy¡±µÄÐÂÌØ¹¤Èí¼þ £¬£¬£¬ £¬£¬ÒÔ¼àÊÓ»î¸ÐÈËÊ¿¡¢¼ÇÕߺͿ¹ÒéÕß¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Éæ¼°µÄ¸ßͨÎó²îCVE-2024-43047µÈ £¬£¬£¬ £¬£¬ÔÚ2024Äê10Ô±»Google Project Zero±ê¼ÇΪÁãÈÕÎó²î £¬£¬£¬ £¬£¬²¢ÓÚ´ÎÔÂÔÚAndroidÉÏ»ñµÃÐÞ¸´¡£¡£¡£¡£¡£¹ú¼ÊÌØÉâ×éÖ¯Ç徲ʵÑéÊÒÔÚÆÊÎöÒ»Ãû¼ÇÕßµÄÊÖ»úʱ·¢Ã÷Á˸ÃÌØ¹¤Èí¼þ¡£¡£¡£¡£¡£¾Ý³Æ £¬£¬£¬ £¬£¬Èû¶ûάÑÇÇå¾²ÐÅÏ¢¾ÖºÍ¾¯·½Ê¹ÓÃCellebrite½âËø¹¤¾ß £¬£¬£¬ £¬£¬Í¨¹ý¸ßͨÁãÈÕÎó²î½âËøÁËAndroidÊÖ»ú £¬£¬£¬ £¬£¬²¢°²ÅÅÁËNoviSpy¡£¡£¡£¡£¡£¸ÃÌØ¹¤Èí¼þÓëÈû¶ûάÑÇÇå¾²»ú¹¹°ó¶¨µÄЧÀÍÆ÷ͨѶ £¬£¬£¬ £¬£¬ÒÑ×°ÖÃÔÚÈû¶ûάÑÇÊýʮ̨ÉõÖÁÊý°Ų̀Android×°±¸ÉÏ¡£¡£¡£¡£¡£¹È¸èµÄÍþвÆÊÎöС×éÓë¹ú¼ÊÌØÉâ×éÖ¯ÏàÖú £¬£¬£¬ £¬£¬·¢Ã÷Á˸ßͨDSPÇý¶¯³ÌÐòÖеĶà¸öÎó²î £¬£¬£¬ £¬£¬ÕâЩÎó²î¿ÉÄܱ»ÓÃÓÚÈÆ¹ýAndroidÇå¾²»úÖÆ²¢ÔÚÄں˼¶±ð×°ÖÃNoviSpy¡£¡£¡£¡£¡£Ö»¹Ü¹È¸èÒÑÏò¸ßͨ±¨¸æÁËÕâЩÎÊÌâ £¬£¬£¬ £¬£¬µ«²¿·ÖÎó²îµÄ²¹¶¡ÉÐδÐû²¼¡£¡£¡£¡£¡£¸ßͨÌåÏÖ £¬£¬£¬ £¬£¬ÒÑÏò¿Í»§ÌṩÐÞ¸´³ÌÐò £¬£¬£¬ £¬£¬²¢ÃãÀøÓû§Ó¦ÓÃÇå¾²¸üС£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-android-novispy-spyware-linked-to-qualcomm-zero-day-bugs/


2. SRPÁª°îÐÅÓÃÏàÖúÉçÔâÍøÂç¹¥»÷ £¬£¬£¬ £¬£¬24ÍòÓû§ÐÅÏ¢Òɱ»µÁ


12ÔÂ16ÈÕ £¬£¬£¬ £¬£¬SRPÁª°îÐÅÓÃÏàÖúÉç¿ËÈÕÔâÓöÍøÂç¹¥»÷ £¬£¬£¬ £¬£¬Áè¼Ý240,742È˵ÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄܱ»µÁ¡£¡£¡£¡£¡£SRPÁª°îÐÅÓÃÏàÖúÉ罨ÉèÓÚ1960Äê £¬£¬£¬ £¬£¬×ܲ¿Î»ÓÚÄÏ¿¨ÂÞÀ´ÄÉÖݱ±°Â¹Å˹Ëþ £¬£¬£¬ £¬£¬Îª×ôÖÎÑÇÖݺÍÄÏ¿¨ÂÞÀ´ÄÉÖÝÔ¼200,000ÃûСÎÒ˽¼ÒÌṩ½ðÈÚЧÀÍ¡£¡£¡£¡£¡£¾Ý³Æ £¬£¬£¬ £¬£¬¹¥»÷Õß×Ô2024Äê9ÔÂ5ÈÕÖÁ11ÔÂ4ÈÕʱ´ú»á¼ûÁËÆäϵͳ £¬£¬£¬ £¬£¬²¢¿ÉÄÜ»ñÈ¡Á˰üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕºÅÂë¡¢Éç»á°ü¹ÜºÅÂëºÍ²ÆÎñÐÅÏ¢µÈÔÚÄÚµÄСÎÒ˽¼ÒÎļþ¡£¡£¡£¡£¡£SRPÁª°îÐÅÓÃÏàÖúÉçÒÑÏòµÂ¿ËÈøË¹ÖݺÍÃåÒòÖݵÄ×ÜÉó²é³¤°ì¹«ÊÒ±¨¸æ´ËÊ £¬£¬£¬ £¬£¬²¢Ïò¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢ËÍÊéÃæÍ¨Öª £¬£¬£¬ £¬£¬ÌṩһÄêµÄÃâ·ÑÉí·Ý±£»£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£Ö»¹ÜÉÐδ·¢Ã÷ÐÅÏ¢±»ÀÄÓõÄÖ¤¾Ý £¬£¬£¬ £¬£¬µ«ÏàÖúÉçÃãÀøÊÜÓ°ÏìÕßʹÓÃÌṩµÄÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£¡£¡£¡£´Ë´ÎÍøÂç¹¥»÷¿ÉÄÜÓëÀÕË÷Èí¼þ×éÖ¯NitrogenÓÐ¹Ø £¬£¬£¬ £¬£¬¸Ã×éÖ¯Éù³ÆÇÔÈ¡ÁËSRPÁª°îÐÅÓÃÏàÖúÉçÔ¼650GBµÄÊý¾Ý £¬£¬£¬ £¬£¬²¢ÔÚÆä»ùÓÚTorµÄ×ßÂ©ÍøÕ¾ÉϳöÊÛ¡£¡£¡£¡£¡£


https://www.securityweek.com/srp-federal-credit-union-ransomware-attack-impacts-240000/


3. CISAÖÒÑÔWindowsÄÚºËÎó²î¼°Adobe ColdFusionÎó²îÕý±»Æð¾¢Ê¹ÓÃ


12ÔÂ16ÈÕ £¬£¬£¬ £¬£¬CISAÒÑÏòÃÀ¹úÁª°î»ú¹¹·¢³öÖÒÑÔ £¬£¬£¬ £¬£¬ÒªÇóÌá·ÀÕë¶Ô¸ßÑÏÖØÐÔWindowsÄÚºËÎó²îCVE-2024-35250µÄÒ»Á¬¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÓÉDEVCOREÑо¿ÍŶӷ¢Ã÷²¢Í¨¹ýÇ÷ÊÆ¿Æ¼¼µÄÁãÈÕÍýÏ뱨¸æ¸øÎ¢Èí £¬£¬£¬ £¬£¬ÊÇÓÉÓÚ²»ÊÜÐÅÈεÄÖ¸Õë×÷·ÏÒýÓÃÈõµãÔì³ÉµÄ £¬£¬£¬ £¬£¬ÔÊÐíÍâµØ¹¥»÷ÕßÒÔµÍÖØÆ¯ºó»ñµÃSYSTEMȨÏÞ¡£¡£¡£¡£¡£Î¢ÈíÔÚ6ÔÂÐû²¼Á˲¹¶¡ £¬£¬£¬ £¬£¬µ«ËĸöÔºóGitHubÉÏÐû²¼ÁË¿´·¨ÑéÖ¤Îó²î´úÂë £¬£¬£¬ £¬£¬Åú×¢¸ÃÎó²îÕýÔÚ±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£Í¬Ê± £¬£¬£¬ £¬£¬CISA»¹Ìí¼ÓÁËÁíÒ»¸öÑÏÖØµÄAdobe ColdFusionÎó²îCVE-2024-20767 £¬£¬£¬ £¬£¬¸ÃÎó²îÓÉÓÚ»á¼û¿ØÖƲ»µ±µ¼Ö £¬£¬£¬ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¶ÁȡϵͳºÍÆäËûÃô¸ÐÎļþ¡£¡£¡£¡£¡£Áè¼Ý145,000̨ColdFusionЧÀÍÆ÷̻¶ÔÚ»¥ÁªÍøÉÏ £¬£¬£¬ £¬£¬×é³ÉÖØ´óΣº¦¡£¡£¡£¡£¡£CISA½«ÕâÁ½¸öÎó²îÌí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖÐ £¬£¬£¬ £¬£¬²¢±ê¼ÇΪ±»Æð¾¢Ê¹Óà £¬£¬£¬ £¬£¬ÒªÇóÁª°î»ú¹¹ÔÚÈýÖÜÄÚ±£»£»£»£»£»£»£»¤ÆäÍøÂç¡£¡£¡£¡£¡£Í¬Ê± £¬£¬£¬ £¬£¬Ò²½¨Òé˽ÈË×éÖ¯ÓÅÏÈ»º½âÕâЩÎó²îÒÔ×èÖ¹ÕýÔÚ¾ÙÐеĹ¥»÷¡£¡£¡£¡£¡£Î¢Èí¹ØÓÚCVE-2024-35250Ò°ÍâʹÓõĸü¶àÏêϸÐÅÏ¢ÉÐδ½ÒÏþ̸ÂÛ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/windows-kernel-bug-now-exploited-in-attacks-to-gain-system-privileges/


4. BitterÍøÂçÌØ¹¤×é֯ʹÓÃÐÂÐÍMiyaRAT¶ñÒâÈí¼þ¹¥»÷ÍÁ¶úÆä¹ú·À×éÖ¯


12ÔÂ17ÈÕ £¬£¬£¬ £¬£¬ÍøÂçÌØ¹¤Íþв×éÖ¯Bitter±»·¢Ã÷ʹÓÃÐÂÐͶñÒâÈí¼þ¼Ò×åMiyaRAT¹¥»÷ÍÁ¶úÆä¹ú·À×éÖ¯¡£¡£¡£¡£¡£MiyaRATÓëBitter֮ǰʹÓõÄWmRAT¶ñÒâÈí¼þÒ»Æð±»°²ÅÅ¡£¡£¡£¡£¡£ProofpointÖ¸³ö £¬£¬£¬ £¬£¬ÕâÖÖÐÂÐͶñÒâÈí¼þºÜ¿ÉÄÜÊÇÕë¶Ô¸ß¼ÛֵĿµÄµÄ £¬£¬£¬ £¬£¬²¢ÇÒ½öÎÞÒⱻʹÓᣡ£¡£¡£¡£Bitter×éÖ¯×Ô2013ÄêÒÔÀ´Ò»Ö±»îÔ¾ £¬£¬£¬ £¬£¬Ö÷ÒªÕë¶ÔÑÇÖÞÕþ¸®ºÍÖ÷Òª×éÖ¯¡£¡£¡£¡£¡£ËûÃÇÒÑÍùÔøÊ¹ÓÃMicrosoft OfficeÎó²îºÍð³äÍâ½»»ú¹¹¾ÙÐÐÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£´Ë´ÎÍÁ¶úÆäµÄ¹¥»÷ʼÓÚÒ»·â°üÀ¨Íâ¹úͶ×ÊÏîÄ¿ÓÕ»óµÄµç×ÓÓʼþ £¬£¬£¬ £¬£¬ÓʼþÖеÄRARѹËõÎļþ°üÀ¨ÁËαװ³ÉPDFµÄ¿ì½Ý·½·¨Îļþ £¬£¬£¬ £¬£¬ÒÔ¼°Ç¶ÈëÔÚRARÎļþÖеı¸ÓÃÊý¾ÝÁ÷£¨ADS£©¡£¡£¡£¡£¡£Ò»µ©ÊÕ¼þÈË·­¿ªLNKÎļþ £¬£¬£¬ £¬£¬¾Í»á´¥·¢Òþ²ØÔÚADSÖеÄPowerShell´úÂëÖ´ÐÐ £¬£¬£¬ £¬£¬Í¬Ê±½¨ÉèÒ»¸öÍýÏëʹÃüÒÔ°´ÆÚÔËÐжñÒâÏÂÁî¡£¡£¡£¡£¡£µ±WmRATÎÞ·¨ÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷½¨ÉèͨѶʱ £¬£¬£¬ £¬£¬Bitter»áÏÂÔØMiyaRAT¡£¡£¡£¡£¡£ÕâÁ½ÖÖ¶ñÒâÈí¼þ¶¼ÊÇC++Ô¶³Ì»á¼ûľÂí£¨RAT£© £¬£¬£¬ £¬£¬ÌṩÊý¾Ýй¶¡¢Ô¶³Ì¿ØÖÆ¡¢ÆÁÄ»½ØÍ¼µÈ¹¦Ð§¡£¡£¡£¡£¡£MiyaRATÔ½·¢ÍêÉÆ £¬£¬£¬ £¬£¬¾ßÓиüÏȽøµÄÊý¾ÝºÍͨѶ¼ÓÃÜ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/bitter-cyberspies-target-defense-orgs-with-new-miyarat-malware/


5. LedgerÍøÂç´¹ÂÚÐÂȦÌ×£ºÎ±×°Êý¾Ýй¶ÇÔÈ¡»Ö¸´¶ÌÓï


12ÔÂ17ÈÕ £¬£¬£¬ £¬£¬Ò»ÏîÕë¶ÔLedgerÓ²¼þ¼ÓÃÜÇ®±ÒÇ®°üµÄÍøÂç´¹ÂڻÕýÔÚËÁŰ¡£¡£¡£¡£¡£¸Ã»î¶¯Í¨¹ýαװ³ÉÊý¾Ýй¶֪ͨµÄÓʼþ £¬£¬£¬ £¬£¬ÓÕÆ­Óû§ÑéÖ¤Æä»Ö¸´¶ÌÓï £¬£¬£¬ £¬£¬½ø¶øÇÔÈ¡Óû§µÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£LedgerÊÇÒ»¿îÓÃÓÚ´æ´¢¡¢ÖÎÀíºÍ³öÊÛ¼ÓÃÜÇ®±ÒµÄÓ²¼þÇ®°ü £¬£¬£¬ £¬£¬Æä×ʽðÓÉ24×Ö¡¢12×Ö»ò18×ֵĻָ´¶ÌÓï±£»£»£»£»£»£»£»¤¡£¡£¡£¡£¡£È»¶ø £¬£¬£¬ £¬£¬¹¥»÷ÕßʹÓÃÓû§¶ÔÊý¾Ýй¶µÄµ£ÐÄ £¬£¬£¬ £¬£¬·¢ËÍ¿´ËÆÀ´×ÔLedger¹Ù·½µÄ´¹ÂÚÓʼþ £¬£¬£¬ £¬£¬ÒªÇóÓû§ÔÚ´¹ÂÚÒ³ÃæÉÏÑéÖ¤»Ö¸´¶ÌÓï¡£¡£¡£¡£¡£ÕâЩÓʼþÏÖʵÉÏÊÇͨ¹ýSendGridµç×ÓÓʼþÓªÏúƽ̨·¢Ë굀 £¬£¬£¬ £¬£¬´¹ÂÚÒ³ÃæÔòαװ³ÉLedgerÍøÕ¾ £¬£¬£¬ £¬£¬ÒªÇóÓû§ÊäÈë»Ö¸´¶ÌÓï¾ÙÐÐÇå¾²¼ì²é¡£¡£¡£¡£¡£Ò»µ©Óû§ÊäÈë £¬£¬£¬ £¬£¬´¹ÂÚÒ³Ãæ¾Í»á½«ËùÓÐÊäÈëµÄ»Ö¸´¶ÌÓï·¢Ë͵½ÍøÕ¾ºó¶Ë´æ´¢ £¬£¬£¬ £¬£¬¹¥»÷Õß±ãÄÜÍêÈ«»á¼û²¢ÇÔÈ¡Óû§µÄ¼ÓÃÜÇ®±Ò×ʽ𡣡£¡£¡£¡£Õë¶Ô´Ë»î¶¯ £¬£¬£¬ £¬£¬Ledger³ÖÓÐÕßÓ¦Ìá¸ßСÐÄ £¬£¬£¬ £¬£¬ÇÐÎðÔÚÈκÎÓ¦ÓûòÍøÕ¾ÉÏÊäÈë»Ö¸´¶ÌÓï¡£¡£¡£¡£¡£µ±Éæ¼°¼ÓÃÜÇ®±ÒºÍ½ðÈÚ×ʲúʱ £¬£¬£¬ £¬£¬ÇëʼÖÕÔÚä¯ÀÀÆ÷ÖÐÊäÈëÒª»á¼ûµÄÓòÃû¡£¡£¡£¡£¡£ÇëºöÂÔÈκÎÉù³ÆÀ´×ÔLedgerµÄµç×ÓÓʼþ £¬£¬£¬ £¬£¬ÓÈÆäÊÇÉù³ÆÄúÊܵ½Êý¾Ýй¶ӰÏì»òÒªÇóÑéÖ¤»Ö¸´¶ÌÓïµÄÓʼþ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-fake-ledger-data-breach-emails-try-to-steal-crypto-wallets/


6. ˼¿ÆÊý¾ÝÔâй¶£º2.9GBÊý¾ÝÔÚBreach ForumsÆØ¹â


12ÔÂ16ÈÕ £¬£¬£¬ £¬£¬ºÚ¿ÍÔÚBreach ForumsÉÏй¶ÁËÊôÓÚ˼¿Æ¹«Ë¾µÄ2.9GBÊý¾Ý £¬£¬£¬ £¬£¬ÕâÊÇ4.5TBÊý¾Ý¼¯µÄÒ»²¿·Ö¡£¡£¡£¡£¡£¾ÝºÚ¿ÍÉù³Æ £¬£¬£¬ £¬£¬ÕâЩÊý¾ÝÊÇ˼¿ÆÔÚ2024Äê10ÔÂδ¾ÙÐÐÈκÎÃÜÂë±£»£»£»£»£»£»£»¤»òÇå¾²ÈÏÖ¤µÄÇéÐÎÏÂ̻¶µÄ¡£¡£¡£¡£¡£´Ë´Îй¶ÊÂÎñÓÉÎÛÃûÕÑÖøµÄºÚ¿Í¼æÂÛ̳ËùÓÐÕßIntelBrokerÌᳫ £¬£¬£¬ £¬£¬Ëû´ËÇ°ÔøÊÔͼ³öÊÛ°üÀ¨À´×ÔVerizon¡¢AT&TºÍMicrosoftµÈ¹«Ë¾µÄÃô¸ÐÐÅÏ¢ÔÚÄÚµÄÊý¾Ý¼¯¡£¡£¡£¡£¡£Ë¼¿Æ¶Ô´ËÊÂ×÷³ö»ØÓ¦ £¬£¬£¬ £¬£¬·ñ¶¨Æä½¹µãϵͳÊܵ½¹¥»÷ £¬£¬£¬ £¬£¬²¢½«ÎÊÌâ¹é×ïÓÚÃæÏò¹«ÖÚµÄDevHub×ÊÔ´ÉèÖùýʧ¡£¡£¡£¡£¡£È»¶ø £¬£¬£¬ £¬£¬IntelBroker¼á³ÖÒÔΪÆäÔÚ10ÔÂ18ÈÕ֮ǰ¶¼¿ÉÒÔ»á¼ûÕâЩÊý¾Ý £¬£¬£¬ £¬£¬²¢ÌṩÁËÖ¤¾ÝÀ´Ö¤ÊµÆäÖ÷ÕÅ¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨Ë¼¿Æ¶à¸öÖ÷Òª²úÆ·µÄÏà¹ØÐÅÏ¢ £¬£¬£¬ £¬£¬ÈçCisco ISE¡¢Cisco SASE¡¢Cisco WebexµÈ¡£¡£¡£¡£¡£±ðµÄ £¬£¬£¬ £¬£¬IntelBroker»¹Òò¶à´ÎÊý¾Ýй¶ÊÂÎñ¶ø×ÅÃû £¬£¬£¬ £¬£¬°üÀ¨ÈëÇÖApple Inc.¡¢AMDÒÔ¼°Å·ÖÞÐ̾¯×éÖ¯µÈ¡£¡£¡£¡£¡£´Ë´Îй¶ÊÂÎñÔÙ´ÎÌáÐѸ÷×éÖ¯Òª¼á³ÖÇ徲ʵ¼ù²¢±£»£»£»£»£»£»£»¤Ãô¸ÐÊý¾Ý £¬£¬£¬ £¬£¬¶øÊ£ÓàµÄ4.5TBÊý¾Ý¼¯ÊÇ·ñ»á±»³öÊÛ¡¢Ð¹Â¶»ò½â¾öÈÔÓдýÊӲ졣¡£¡£¡£¡£


https://hackread.com/hackers-leak-partial-cisco-data-4-5tb-exposed-records/