¹È¸èÐÞ¸´ÆäÔÆÆ½Ì¨ÖпÉÒþ²Ø¶ñÒâÈí¼þµÄGhostTokenÎó²î
Ðû²¼Ê±¼ä 2023-04-241¡¢¹È¸èÐÞ¸´ÆäÔÆÆ½Ì¨ÖпÉÒþ²Ø¶ñÒâÈí¼þµÄGhostTokenÎó²î
¾ÝýÌå4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬¹È¸èÔÆÆ½Ì¨(GCP)Öб£´æÒ»¸öGhostTokenÎó²î£¬£¬£¬¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâÓ¦Óøü¸ÄΪ²»¿É¼ûÇÒ²»¿Éɾ³ý¡£¡£¡£¡£Astrix SecurityÓÚ2022Äê6Ô²¢Ïò¹È¸è±¨¸æÁËÕâÒ»Îó²î£¬£¬£¬¹È¸èÔÚ2023Äê4ÔÂÐû²¼Á˲¹¶¡¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬¸ÃÎó²î¿É±»¹¥»÷ÕßÓÃÀ´Í¨¹ý½«ÒÑÊÚȨµÄµÚÈý·½Ó¦ÓÃת»»Îª¶ñÒâľÂíÓ¦Ó㬣¬£¬´Ó¶ø»ñµÃÄ¿µÄGoogleÕÊ»§µÄÓÀÊÀÇÒ²»¿ÉÒÆ³ýµÄ»á¼ûȨÏÞ£¬£¬£¬È»ºóй¶ĿµÄµÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£Õâ¿ÉÄܰüÀ¨´æ´¢ÔÚGmail¡¢Drive¡¢DocsºÍPhotosµÈ¹È¸èÓ¦ÓÃÖеÄÊý¾Ý¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ghosttoken-gcp-flaw-let-attackers-backdoor-google-accounts/
2¡¢SymantecÅû¶Õë¶ÔÎ÷Å·»ù´¡ÉèÊ©µÄX_Trader¹©Ó¦Á´¹¥»÷
4ÔÂ21ÈÕ£¬£¬£¬SymantecÅû¶ÁËÕë¶ÔÎ÷Å·Òªº¦»ù´¡ÉèÊ©×éÖ¯µÄX_Trader¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£µ¼ÖÂÉϸöÔÂ3CXÇå¾²ÊÂÎñµÄX_TraderÈí¼þ¹©Ó¦Á´¹¥»÷£¬£¬£¬»¹Ó°ÏìÁËλÓÚÃÀ¹úºÍÅ·ÖÞµÄÄÜÔ´ÁìÓòµÄÁ½¸öÒªº¦»ù´¡ÉèÊ©×éÖ¯¡£¡£¡£¡£¹¥»÷ÕßʹÓÃľÂí»¯X_Trader×°ÖóÌÐò£¬£¬£¬½«VEILEDSIGNAL¶à½×¶ÎÄ£¿£¿£¿é»¯ºóÃÅ×°Öõ½Ä¿µÄϵͳÉÏ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔÖ´ÐжñÒâshellcode»ò½«Í¨Ñ¶Ä£¿£¿£¿é×¢ÈëÔÚ±»¹¥»÷ϵͳÉÏÔËÐеÄChrome¡¢Firefox»òEdgeÀú³Ì¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬ÉÐÓÐÁ½¸öÉæ¼°½ðÈÚÉúÒâµÄ×éÖ¯Ò²Ôâµ½¹¥»÷¡£¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain
3¡¢Ç°CFPBÔ±¹¤½«Áè¼Ý25ÍòÏûºÄÕßµÄÐÅϢת·¢µ½Ð¡ÎÒ˽¼ÒÓÊÏä
¾Ý4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬ÃÀ¹úÏûºÄÕß½ðÈÚ±£»£»¤¾Ö(CFPB)Åû¶ÁËÒ»ÆðÉæ¼°256000ÈËÐÅÏ¢µÄй¶ÊÂÎñ¡£¡£¡£¡£CFPBµÄÔ±¹¤Í¸Â¶£¬£¬£¬ËûÃÇ·¢Ã÷һǰԱ¹¤ÓÃ14·â²î±ðµÄµç×ÓÓʼþ£¬£¬£¬½«Ô¼Äª25.6ÍòÃûÏûºÄÕߵļͼºÍԼĪ50¼Ò»ú¹¹µÄî¿ÏµÐÅϢת·¢µ½Ð¡ÎÒ˽¼Òµç×ÓÓʼþÕË»§¡£¡£¡£¡£ÕâÃûÔ±¹¤Òѱ»ÆÈÁîɾ³ýÕâЩµç×ÓÓʼþ²¢Ìṩ֤¾Ý֤ʵËüÃÇÒѱ»É¾³ý£¬£¬£¬µ«¹Ù·½Ö¤ÊµÕâ¸ÃÔ±¹¤ÉÐδ×ñÊØ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸Ã»ú¹¹ÈÔÔÚÊÓ²ì´ËÊÂÎñ¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/cfpb-employee-sends-consumers-data/
4¡¢ESET·¢Ã÷¶þÊÖÊг¡Öдó×ÚÆóÒµ¼¶ÍøÂç×°±¸°üÀ¨Ãô¸ÐÐÅÏ¢
¾ÝýÌå4ÔÂ23ÈÕ±¨µÀ£¬£¬£¬¶þÊÖÊг¡ÉÏµÄÆóÒµ¼¶ÍøÂç×°±¸°üÀ¨¿É±»ºÚ¿ÍÓÃÀ´ÈëÇÖÆóҵϵͳ»ò»ñÈ¡¿Í»§ÐÅÏ¢µÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£ESETÑо¿Ö°Ô±¹ºÖÃÁË18̨¶þÊÖ½¹µã·ÓÉÆ÷£¬£¬£¬·¢Ã÷ÆäÖÐÒ»°ëÒÔÉÏÄÜÕý³£ÊÂÇéµÄ·ÓÉÆ÷ÈÔÈ»¿ÉÒÔ»á¼ûËùÓÐÉèÖÃÊý¾Ý¡£¡£¡£¡£Ò»Ð©Â·ÓÉÆ÷±£´æÁ˿ͻ§ÐÅÏ¢ºÍÔÊÐíµÚÈý·½ÅþÁ¬µ½ÍøÂçµÄÊý¾Ý£¬£¬£¬ÉõÖÁ°üÀ¨×÷Ϊ¿ÉÐÅ·½ÅþÁ¬µ½ÆäËûÍøÂçµÄƾ֤¡£¡£¡£¡£Æ¾Ö¤Â·ÓÉÆ÷ÖÐϸ½Ú£¬£¬£¬ÆäÖÐһЩ·ÓÉÆ÷´¦ÓÚÍйÜITÌṩÉ̵ÄÇéÐÎÖУ¬£¬£¬ÉÐÓÐһ̨ÉõÖÁÊôÓÚMSSP¡£¡£¡£¡£Ñо¿Ö°Ô±¹ØÓÚÕâÖÖÇéÐεĽ¨ÒéÊÇ£¬£¬£¬ÕûÀíÉè±¹ØÁ¬ÄÃô¸ÐÊý¾Ý²¢½«Æä»Ö¸´µ½³ö³§Ä¬ÈÏ״̬¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-can-breach-networks-using-data-on-resold-corporate-routers/
5¡¢Unit 42³ÆÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÄ¿³ÊÉÏÉýÇ÷ÊÆ
Unit 42ÔÚ4ÔÂ20ÈÕ͸¶£¬£¬£¬ÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÄ¿³ÊÉÏÉýÇ÷ÊÆ¡£¡£¡£¡£´Ó2022Äê11Ôµ½2023Äê4ÔÂÉÏÑ®£¬£¬£¬ÓëChatGPTÏà¹ØÓòµÄÿÔÂ×¢²áÁ¿ÔöÌíÁË910%£¬£¬£¬Ïà¹ØÇÀ×¢ÓòÃûÔöÌíÁË17818%¡£¡£¡£¡£±ðµÄ£¬£¬£¬ÌìÌìÓжà´ï118¸öÓëChatGPTÓйصĶñÒâURL±»¼ì²âµ½¡£¡£¡£¡£Ñо¿·¢Ã÷¶à¸öÊÔͼð³äOpenAI¹Ù·½ÍøÕ¾µÄ´¹ÂÚURL¡£¡£¡£¡£Í¨³££¬£¬£¬¹¥»÷Õ߻ὨÉèÒ»¸öÓëChatGPT¹ÙÍøºÜÏñµÄÐéÎ±ÍøÕ¾£¬£¬£¬È»ºóÓÕÆÓû§ÏÂÔØ¶ñÒâÈí¼þ»ò¹²ÏíÃô¸ÐÐÅÏ¢¡£¡£¡£¡£
https://unit42.paloaltonetworks.com/chatgpt-scam-attacks-increasing/
6¡¢FortinetÐû²¼¹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄÆÊÎö±¨¸æ
4ÔÂ20ÈÕ£¬£¬£¬FortinetÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¸Ã¹¤¾ßÓÉKodex¹«Ë¾¿ª·¢£¬£¬£¬Éù³ÆÊÇÒ»¿î½ÌÓý¹¤¾ß¡£¡£¡£¡£ÒÔÿÔÂ59ÃÀÔªµÄ¼ÛÇ®³öÊÛ£¬£¬£¬¾ßÓÐÆß¸ö¹¥»÷Ä£¿£¿£¿é£¬£¬£¬°üÀ¨ÀÕË÷Èí¼þ¡¢Æ¾Ö¤ÇÔÈ¡ºÍWindows Defender¡£¡£¡£¡£Ñо¿Åú×¢£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢µØ½«ÆäÓÃ×÷ÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£¡£¡£¡£EvilExtractorµÄ¹¥»÷»î¶¯ÓÚ½ñÄê3ÔÂÏÔÖøÔöÌí£¬£¬£¬Í¨¹ýαװ³ÉÕË»§È·ÈÏÇëÇóµÄ´¹ÂÚÓʼþ¾ÙÐзַ¢£¬£¬£¬´ó´ó¶¼±»¹¥»÷Ä¿µÄλÓÚÅ·ÖÞºÍÃÀ¹ú¡£¡£¡£¡£
https://www.fortinet.com/blog/threat-research/evil-extractor-all-in-one-stealer