з¢Ã÷µÄ RustDoor ¶ñÒâÈí¼þð³ä Visual Studio ¸üÐÂ

Ðû²¼Ê±¼ä 2024-02-22
1. з¢Ã÷µÄ RustDoor ¶ñÒâÈí¼þð³ä Visual Studio ¸üÐÂ


2ÔÂ20ÈÕ£¬£¬£¬£¬£¬Ð·¢Ã÷µÄ Apple macOS ºóÃÅÃûΪ RustDoor£¬£¬£¬£¬£¬Ëüͨ¹ýÖØ´óµÄ¶ñÒâÈí¼þ»î¶¯Õë¶Ô¼ÓÃÜÇ®±ÒÁìÓòµÄ¶à¼Ò¹«Ë¾¡£¡£¡£¸Ã¶ñÒâÈí¼þ½ÓÄÉ Rust ¿ª·¢£¬£¬£¬£¬£¬¿ÉÔÚ»ùÓÚ Intel µÄ¼Ü¹¹ºÍ ARM ¼Ü¹¹ÉÏÔËÐС£¡£¡£Bitdefender µÄÑо¿Ö°Ô±ÖÁÉÙ´Ó 2023 Äê 11 ÔÂÆð¾ÍÒ»Ö±ÔÚ¸ú×ٸöñÒâÈí¼þ£¬£¬£¬£¬£¬·¢Ã÷ËüÓëÓëÎÛÃûÕÑÖøµÄALPHV/BlackCat ÀÕË÷Èí¼þÍÅ»ïÏà¹ØµÄ C2 ЧÀÍÆ÷¾ÙÐÐͨѶ¡£¡£¡£RustDoor Ö÷Òª×÷Ϊ Visual Studio for Mac µÄ¸üгÌÐò¾ÙÐзַ¢£¬£¬£¬£¬£¬¾ßÓвî±ðµÄÃû³Æ,Èç¡°zshrc2¡±¡¢¡°Previewers¡±¡¢¡°VisualStudioUpdater¡±¡¢¡°VisualStudioUpdater_Patch¡±¡¢¡°VisualStudioUpdating¡±¡¢¡°visualstudioupdate¡±ºÍ¡°DO_NOT_RUN_ChromeUpdates¡±¡£¡£¡£Ñ¬È¾ÏµÍ³ºó£¬£¬£¬£¬£¬¶ñÒâÈí¼þÓë C2 ЧÀÍÆ÷ͨѶÒÔ¿ØÖÆÊÜѬȾµÄϵͳ¡¢Ö´ÐÐʹÃü²¢ÇÔÈ¡Êý¾Ý¡£¡£¡£


https://cyware.com/news/newly-discovered-rustdoor-malware-impersonates-visual-studio-update-148f6632/?web_view=true


2.Earth Preta Õë¶ÔÑÇÖ޵Ĺ¥»÷»î¶¯£ºDOPLUGS ¶ñÒâÈí¼þÍþв


2ÔÂ20ÈÕ£¬£¬£¬£¬£¬Check Point µÄÉîÈëÍþвÆÊÎöÆÊÎöÁ˸߼¶Ò»Á¬Íþв (APT) ×éÖ¯ Earth Preta µÄÒ»Á¬Ðж¯¡£¡£¡£Ö»¹ÜÆäÅ·Ö޻Êܵ½ÆÕ±é¼à¿Ø£¬£¬£¬£¬£¬µ«²»¿É·ñ¶¨µÄÊÇ£¬£¬£¬£¬£¬Æä¶ÔÑÇÖÞÄ¿µÄµÄ¸ß¶È¹Ø×¢¡£¡£¡£ÕâÒ»¶¨ÖÆÕ½ÂÔµÄÒªº¦ÊÇÒ»ÖÖÃûΪ DOPLUGS µÄ¶¨ÖƶñÒâÈí¼þ£¬£¬£¬£¬£¬ËüÊÇ×î½üһϵÁÐÈëÇÖÖÐʹÓõÄÒªº¦¹¤¾ß¡£¡£¡£ÆÊÎöÅú×¢£¬£¬£¬£¬£¬ÕâÖÖ¶¨ÖÆµÄ PlugX ±äÌåÔ¶·Çµä·¶¡£¡£¡£Check Point µÄÑо¿Ö°Ô±ÊìϤµ½ÆäÆæÒìµÄÊôÐÔ£¬£¬£¬£¬£¬²¢½«ÆäÃüÃûΪ DOPLUGS¡£¡£¡£Óë¾ßÓÐÈ«Ì׺óÃÅÏÂÁîµÄ¹Å°å PlugX ¶ñÒâÈí¼þ²î±ð¡£¡£¡£ÓÐȤµÄÊÇ£¬£¬£¬£¬£¬Check Point ·¢Ã÷ÁËÄܹ»Ê¹Óá°KillSomeOne¡±USB È䳿²¡¶¾µÄ DOPLUGS ±äÌ壨×î³õÓÚ 2020 ÄêÆØ¹â£©¡£¡£¡£ÕâÒ»ÔöÌíµÄά¶ÈÓÐÖúÓÚÔÚÊÜѬȾµÄÍøÂçÖпìËÙÒÆ¶¯£¬£¬£¬£¬£¬Í¹ÏÔÁËÍþв×é֯׷Çó¸üÆÕ±éµÄÉøÍ¸¡£¡£¡£


https://securityonline.info/earth-pretas-targeted-asian-campaigns-the-doplugs-malware-threat/


3.DNS Îó²î KeyTrap ¿Éµ¼Ö»¥ÁªÍø´ó¹æÄ£µÄÖÐÖ¹


2ÔÂ21ÈÕ£¬£¬£¬£¬£¬Ö»¹ÜËü×Ô 2000 ÄêÒÔÀ´¾ÍÒ»Ö±±£´æ£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±×î½ü²Å·¢Ã÷ÓòÃûϵͳ (DNS) Çå¾²À©Õ¹ÖеÄÒ»¸ö»ù±¾Éè¼ÆÈ±ÏÝ£¬£¬£¬£¬£¬¸ÃȱÏÝÔÚijЩÇéÐÎÏ¿ÉÄܻᱻʹÓÃÀ´´Ý»Ù´ó¹æÄ£µÄ»¥ÁªÍø¡£¡£¡£DNS ЧÀÍÆ÷½«ÍøÕ¾ URL ת»»Îª IP µØµã£¬£¬£¬£¬£¬²¢ÇÒÔÚ´ó´ó¶¼ÇéÐÎϲ»¿É¿´·¨³ÐÔØËùÓл¥ÁªÍøÁ÷Á¿¡£¡£¡£ÕâÒ»·¢Ã÷±³ºóµÄÍŶÓÀ´×Ե¹ú ATHENE ¹ú¼ÒÓ¦ÓÃÍøÂçÇå¾²Ñо¿ÖÐÐÄ¡£¡£¡£ËûÃǽ«¸ÃÇå¾²Îó²îÃüÃûΪ¡°KeyTrap¡±£¬£¬£¬£¬£¬±àºÅΪCVE-2023-50387¡£¡£¡£Æ¾Ö¤ËûÃǹØÓÚ KeyTrap DNS ¹ýʧµÄб¨¸æ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬Ê¹Óà DNSSEC À©Õ¹·¢Ë͵½ DNS ЧÀÍÆ÷ʵÏÖÀ´ÑéÖ¤Á÷Á¿µÄµ¥¸öÊý¾Ý°ü¿ÉÄÜ»áÆÈʹЧÀÍÆ÷½øÈëÆÊÎöÑ­»·£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂÆäÏûºÄËùÓÐ×Ô¼ºµÄÅÌËãÄÜÁ¦¡£¡£¡£Æ¾Ö¤¸Ã±¨¸æºÍ ISC µÄ˵·¨£¬£¬£¬£¬£¬ºÃÐÂÎÅÊÇ£¬£¬£¬£¬£¬µ½ÏÖÔÚΪֹ£¬£¬£¬£¬£¬»¹Ã»ÓÐÈκÎ×Ô¶¯Ê¹ÓõÄÖ¤¾Ý¡£¡£¡£


https://www.darkreading.com/cloud-security/keytrap-dns-bug-threatens-widespread-internet-outages


4. Joomla Ô¶³Ì´úÂëÖ´ÐÐÎó²î CVE-2024-21726


2ÔÂ20ÈÕ£¬£¬£¬£¬£¬Ñо¿ÍŶÓ×î½üµÄÒ»Ïî·¢Ã÷̻¶ÁËÊ¢ÐеÄJoomlaÄÚÈÝÖÎÀíϵͳ (CMS)ÖеÄÒ»¸öÖ÷ÒªµÄÇå¾²ÎÊÌâ¡£¡£¡£´ËÎó²îÖ¸¶¨ÎªCVE-2024-21726£¬£¬£¬£¬£¬Îª¶àÖÖ¿çÕ¾¾ç±¾ (XSS) ¹¥»÷·­¿ªÁË´óÃÅ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓôËȨÏÞÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢Öض¨ÏòÍøÕ¾Á÷Á¿¡¢ÆÆËðÍøÕ¾»ò×°Öó¤ÆÚÐÔ¶ñÒâÈí¼þÒÔ½øÒ»²½Î£º¦¡£¡£¡£Joomla Ðж¯Ñ¸ËÙ£¬£¬£¬£¬£¬Ðû²¼Á˲¹¶¡°æ±¾£¨5.0.3¡¢4.4.3¡¢3.10.15-elts£©£©¡£¡£¡£¿£¿£¿£¿ÉÔöÌí Web Ó¦ÓóÌÐò·À»ðǽ (WAF) ºÍ°´ÆÚ¶ñÒâÈí¼þɨÃ裬£¬£¬£¬£¬ÒÔÔöÌíÕë¶Ô¹¥»÷µÄÌØÊâÆÁÕÏ¡£¡£¡£Ç¿ÖÆÖ´ÐС°×îСȨÏÞ¡±Õ½ÂÔ£¬£¬£¬£¬£¬½öÏòÐèÒªÍêÈ«ÍøÕ¾¿ØÖƵÄÖ°Ô±ÊÚÓèÖÎÆÊÎö¼ûȨÏÞ¡£¡£¡£


https://securityonline.info/cve-2024-21726-patch-now-to-stop-joomla-remote-code-execution/


5. VMware ±Þ²ßÓû§Ð¶ÔØÒÑÆúÓõÄÔöÇ¿ÐÍÉí·ÝÑéÖ¤²å¼þ


2ÔÂ21ÈÕ£¬£¬£¬£¬£¬ÔÚ·¢Ã÷ÑÏÖØÇå¾²Îó²îºó£¬£¬£¬£¬£¬VMware ±Þ²ßÓû§Ð¶ÔØÒÑÆúÓõÄÔöÇ¿ÐÍÉí·ÝÑéÖ¤²å¼þ (EAP)¡£¡£¡£¸ÃÎó²î±àºÅΪCVE-2024-22245£¨CVSS ÆÀ·Ö£º9.6£©£¬£¬£¬£¬£¬±»ÐÎòΪí§ÒâÉí·ÝÑéÖ¤Öм̹ýʧ¡£¡£¡£¶ñÒâÐÐΪÕß¿ÉÄÜ»áÓÕÆ­ÔÚÍøÂçä¯ÀÀÆ÷ÖÐ×°ÖÃÁË EAP µÄÄ¿µÄÓòÓû§£¬£¬£¬£¬£¬ÇëÇó²¢×ª·¢í§Òâ Active Directory ЧÀÍÖ÷ÌåÃû³Æ (SPN) µÄЧÀÍÆ±Ö¤¡£¡£¡£EAPÊÇÒ»¸öÈí¼þ°ü£¬£¬£¬£¬£¬Ö¼ÔÚÔÊÐíͨ¹ý Web ä¯ÀÀÆ÷Ö±½ÓµÇ¼ vSphere µÄÖÎÀí½çÃæºÍ¹¤¾ß£¬£¬£¬£¬£¬×Ô 2021 Äê 3 ÔÂÆðÒÑÆúÓᣡ£¡£Ä¬ÈÏÇéÐÎϲ»°üÀ¨Ëü£¬£¬£¬£¬£¬Ò²²»ÊôÓÚ vCenter Server¡¢ESXi »ò Cloud Foundation¡£¡£¡£ÖµµÃÖ¸³öµÄÊÇ£¬£¬£¬£¬£¬ÕâЩȱÏݽöÓ°ÏìÒѽ« EAP Ìí¼Óµ½ Microsoft Windows ϵͳÒÔͨ¹ý vSphere Client ÅþÁ¬µ½ VMware vSphere µÄÓû§¡£¡£¡£


https://thehackernews.com/2024/02/vmware-alert-uninstall-eap-now-critical.html


6. Linux ¶ñÒâÈí¼þ»î¶¯ Migo Ãé×¼ Redis ¾ÙÐÐÍÚ¿ó


2ÔÂ20ÈÕ£¬£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÕë¶ÔÊ¢ÐÐÊý¾Ý´æ´¢ÏµÍ³ Redis µÄÖØ´ó¶ñÒâÈí¼þ»î¶¯¡£¡£¡£¸Ã»î¶¯±»³ÆÎª¡°Migo¡±£¬£¬£¬£¬£¬½ÓÄÉÐÂÓ±µÄÕ½ÂÔÀ´ÆÆËð Redis ЧÀÍÆ÷£¬£¬£¬£¬£¬×îÖÕÄ¿µÄÊÇÔÚ Linux Ö÷»úÉÏÍÚ¾ò¼ÓÃÜÇ®±Ò¡£¡£¡£ÌØÊâÊÇ£¬£¬£¬£¬£¬Cado Ç徲ʵÑéÊÒÑо¿Ö°Ô±ÊӲ쵽£¬£¬£¬£¬£¬Migo ʹÓÃÐ嵀 Redis ϵͳÈõ»¯ÏÂÁîÀ´Ê¹ÓÃÊý¾Ý´æ´¢¾ÙÐмÓÃÜÐ®ÖÆ¡£¡£¡£Óë֮ǰÕë¶Ô Redis µÄ¹¥»÷²î±ð£¬£¬£¬£¬£¬´Ë»î¶¯ÒýÈëÁËÆæÒìµÄÊÖÒÕÀ´Î£º¦ÏµÍ³µÄÇå¾²¡£¡£¡£¹¥»÷µÄ³õʼ»á¼û½×¶ÎÉæ¼°Ê¹ÓÃÌØ¶¨µÄ CLI ÏÂÁî½ûÓà Redis µÄÖÖÖÖÉèÖÃÑ¡Ïî¡£¡£¡£ÀýÈ磬£¬£¬£¬£¬¹¥»÷Õ߹رձ£»£»£»£»£»¤Ä£Ê½ºÍ¸±±¾Ö»¶ÁµÈ¹¦Ð§ÒÔÔö½øÆä¶ñÒâ»î¶¯¡£¡£¡£»£»£»£»£»ñµÃ»á¼ûȨÏ޺󣬣¬£¬£¬£¬¹¥»÷ÕßÉèÖÃÁËһϵÁÐÏÂÁîÀ´Ö´ÐÐ´Ó Transfer.sh ºÍ Pastebin µÈÍⲿȪԴ¼ìË÷µ½µÄ¶ñÒâ¸ºÔØ¡£¡£¡£ÕâЩÓÐÓøºÔØÖ¼ÔÚÔÚºǫ́ÍÚ¾ò¼ÓÃÜÇ®±Ò£¬£¬£¬£¬£¬Í¬Ê±¼á³Ö²»±»·¢Ã÷¡£¡£¡£


https://www.infosecurity-magazine.com/news/linux-malware-migo-targets-redis/