CISAºÍÏàÖúͬ°éÐû²¼ÓйØBlack BastaµÄ×Éѯ
Ðû²¼Ê±¼ä 2024-05-135ÔÂ11ÈÕ£¬£¬£¬CISA ÓëÁª°îÊÓ²ì¾Ö (FBI)¡¢ÎÀÉúÓ빫ÖÚЧÀͲ¿ (HHS) ÒÔ¼°¶àÖÝÐÅÏ¢¹²ÏíºÍÆÊÎöÖÐÐÄ (MS-ISAC) ÏàÖúÐû²¼ÁËÁªºÏÍøÂçÇå¾²×Éѯ (CSA) # StopRansomware£ºBlack BastaÎªÍøÂçÇå¾²·ÀÓùÕßÌṩսÊõ¡¢ÊÖÒպͳÌÐò (TTP) ÒÔ¼°ÒÑÖª Black Basta ÀÕË÷Èí¼þÁ¥Êô»ú¹¹Ê¹ÓõÄΣº¦Ö¸±ê (IOC)£¬£¬£¬²¢Í¨¹ý FBI ÊÓ²ìºÍµÚÈý·½±¨¸æ¾ÙÐÐʶ±ð¡£¡£¡£¡£¡£Black Basta ÊÇÒ»ÖÖÀÕË÷Èí¼þ¼´Ð§ÀÍ (RaaS) ±äÌ壬£¬£¬ÓÚ 2022 Äê 4 ÔÂÊ״η¢Ã÷¡£¡£¡£¡£¡£Black Basta Á¥Êô¹«Ë¾ÒÑÕë¶Ô±±ÃÀ¡¢Å·Ö޺ͰĴóÀûÑÇµÄ 500 ¶à¸ö˽ӪÐÐÒµºÍÒªº¦»ù´¡ÉèʩʵÌ壬£¬£¬°üÀ¨Ò½ÁƱ£½¡×éÖ¯¡£¡£¡£¡£¡£CISA ºÍÏàÖúͬ°éÃãÀø×éÖ¯Éó²é²¢ÊµÑéÁªºÏ CSA ÖÐÌṩµÄ»º½â²½·¥£¬£¬£¬ÒÔïÔÌ Black Basta ºÍÆäËûÀÕË÷Èí¼þÊÂÎñµÄ¿ÉÄÜÐÔºÍÓ°Ïì¡£¡£¡£¡£¡£
https://www.cisa.gov/news-events/alerts/2024/05/10/cisa-and-partners-release-advisory-black-basta-ransomware
2. Chrome½ôÆÈ¸üУ¬£¬£¬ÐÞ¸´ÑÏÖØÎó²îCVE-2024-4671
5ÔÂ11ÈÕ£¬£¬£¬¹È¸èÐû²¼ÁË Chrome ä¯ÀÀÆ÷µÄ½ôÆÈ¸üУ¬£¬£¬ÐÞ¸´ÁËÒ»¸öÑÏÖØµÄÁãÈÕÎó²îCVE-2024-4671¡£¡£¡£¡£¡£¡°ÊͷźóʹÓá±Îó²îÓ°Ïì Chrome µÄÊÓ¾õ×é¼þ£¬£¬£¬¸Ã×é¼þÈÏÕæäÖȾºÍÏÔʾÄÚÈÝ¡£¡£¡£¡£¡£CVE-2024-4671 ÊÇÓÉһλÄäÃûÑо¿Ö°Ô±Ê¶±ð²¢Ïò Google ±¨¸æµÄ¡£¡£¡£¡£¡£¸Ã¹«Ë¾Í¸Â¶£¬£¬£¬¸ÃÎó²î¿ÉÄÜÕýÔÚ±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£´ËÎó²îʹÓÃÁ˳ÌÐòÔÚÊÍ·ÅÄÚ´æÖ¸Õëºó¼ÌÐøÊ¹ÓøÃÄÚ´æÖ¸ÕëµÄȱÏÝ£¬£¬£¬¿ÉÄܻᵼÖÂδ¾ÊÚȨµÄÊý¾Ý²Ù×÷»òÍ߽⡣¡£¡£¡£¡£ÓÉÓÚ¸üа²ÅÅÔÚÖÖÖÖÆ½Ì¨£¨°üÀ¨ Mac¡¢Windows ºÍ Linux£©ÉÏ£¬£¬£¬Òò´ËÓû§Ó¦È·±£ËûÃÇÔËÐеÄÊÇ×îа汾µÄ Chrome¡£¡£¡£¡£¡£¿£¿£¿£¿£¿ÉÒÔͨ¹ýµ¼º½ÖÁ¡°ÉèÖá±>¡°¹ØÓÚ Chrome¡±À´¼ì²é¡£¡£¡£¡£¡£ÕâÖÖ×Ô¶¯²½·¥¿ÉÈ·Èϲ¹¶¡ÒÑÓ¦Ó㬣¬£¬´Ó¶ø±£»£»¤ÄúµÄϵͳÃâÊÜDZÔڵĹ¥»÷¡£¡£¡£¡£¡£ÈôÊÇÄú·¢Ã÷ÄúµÄä¯ÀÀÆ÷²»ÊÇ×îа汾£¬£¬£¬½¨ÒéÄúÁ¬Ã¦¸üС£¡£¡£¡£¡£
https://blog.qualys.com/vulnerabilities-threat-research/2024/05/10/get-weekends-back-put-chrome-cves-like-cve-2024-4671-on-auto-patching
3. IntelBroker Éù³ÆÒÑÀÖ³ÉÇÖÈëÅ·ÃËÖ´·¨ÏàÖú»ú¹¹
5ÔÂ10ÈÕ£¬£¬£¬ºÚ¿ÍÔÚBreachForumsÉÏÐû²¼ÁËÕâÒ»ÐÂÎÅ£¬£¬£¬³Æ´Ë´Îй¶ÊÂÎñ±¬·¢ÔÚ±¾ÔÂÔçЩʱ¼ä£¬£¬£¬Éæ¼°¸ß¶ÈÃô¸ÐºÍÉñÃØÐÅÏ¢¡£¡£¡£¡£¡£²¢ÇÒIntelBroker͸¶Êý¾ÝÒѱ»³öÊÛ¸øÄäÃûÂò¼Ò¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨Í¬ÃËÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢¡¢½ö¹©¹Ù·½Ê¹Óà (FOUO) Ô´´úÂë¡¢×÷Õ½ÎļþºÍÊÜÓ°ÏìµÄÏêϸ»ú¹¹ÁбíµÈ¡£¡£¡£¡£¡£ÈôÊÇÊôʵ£¬£¬£¬´ËÀàÒªº¦Êý¾ÝµÄ̻¶¿ÉÄÜ»á¶ÔÕâЩ»ú¹¹µÄÒ»Á¬ÔËÓªºÍСÎÒ˽¼ÒÇå¾²×é³ÉÑÏÖØÎ£º¦¡£¡£¡£¡£¡£¾Ý³ÆµÄÎ¥¹æÐÐΪ»¹¿ÉÄÜÆÆËðÅ·ÖÞÐ̾¯×éÖ¯Ðж¯µÄÍêÕûÐÔºÍÇå¾²ÐÔ¡£¡£¡£¡£¡£Å·ÖÞÐ̾¯×éÖ¯ÉÐδÐû²¼ÕýʽÉùÃ÷£¬£¬£¬Ïêϸ˵Ã÷ÊÇ·ñ±¬·¢ÁËÎ¥¹æÐÐΪ¡¢Î¥¹æË®Æ½ÒÔ¼°Îª¼õÇáÆäÓ°Ïì¶ø½ÓÄɵIJ½·¥¡£¡£¡£¡£¡£
https://www.hackread.com/europol-hacked-intelbroker-claims-data-breach/
4. LLM Ð®ÖÆ¹¥»÷ÈúڿÍÐ®ÖÆ AI Ä£×ÓÒÔ»ñÈ¡ÀûÈó
5ÔÂ10ÈÕ£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪ¡°LLMjacking¡±µÄÐÂÐÍÍøÂç¹¥»÷ÍýÏ룬£¬£¬Ê¹Óñ»µÁµÄÔÆÆ¾Ö¤À´Ð®ÖÆÇ¿Ê¢µÄÈ˹¤ÖÇÄÜÄ£×Ó¡£¡£¡£¡£¡£ÍøÂç·¸·¨·Ö×ÓʹÓñ»µÁµÄÔÆÆ¾Ö¤£¨ºÜ¿ÉÄÜÊÇ´ÓÊÜËðµÄÔÆÕÊ»§»ñµÃµÄ£©À´Ãé×¼ÔËÐйýʱÈí¼þµÄϵͳ£¬£¬£¬ÒÔÉøÍ¸ÔËÐÐ LLM µÄϵͳ£¬£¬£¬ÒÔ½âËøÆäÄÜÁ¦µÄ±¦¿â¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬ÔÚËûÃǵÄÑо¿Ðû²¼Ö®Ç°£¬£¬£¬¹¥»÷ÕßÒѾ»á¼ûÁËÊ®ÖÖ²î±ðÈ˹¤ÖÇÄÜЧÀ굀 LLM Ä£×Ó£¬£¬£¬°üÀ¨ Anthropic¡¢AWS Bedrock¡¢Google Cloud Vertex AI¡¢Mistral ºÍ OpenAI¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬¹¥»÷ÕßÕýÔڸ͝ÊÜѬȾϵͳÖеÄÈÕÖ¾ÉèÖ㬣¬£¬ÕâÅú×¢ËûÃÇÔÚʹÓñ»µÁµÄ LLM »á¼ûȨÏÞʱ¾ÓÐÄÊÔͼÌӱܼì²â£¬£¬£¬Õâ͹ÏÔÁËÍøÂç·¸·¨·Ö×ÓµÄÈÕÒæ½ÆÕ©¡£¡£¡£¡£¡£
https://www.hackread.com/llmjacking-attack-hackers-hijack-ai-models/
5. ¶íº¥¶íÖÝ²ÊÆ±Ôâµ½DragonForce¹¥»÷Ó°ÏìÁè¼Ý50ÍòÈË
5ÔÂ10ÈÕ£¬£¬£¬¶íº¥¶íÖÝ²ÊÆ±±¾ÖÜÌåÏÖ£¬£¬£¬ÀÕË÷Èí¼þ×é֯ȥÄêÌᳫµÄ¶íº¥¶íÖÝ²ÊÆ±ÍøÂç¹¥»÷ÒÑÓ°ÏìÁËÁè¼Ý 50 ÍòÈË¡£¡£¡£¡£¡£¸ÃÊÂÎñÓÚ 2023 Äê 12 ÔÂÏÂÑ®ÆØ¹â£¬£¬£¬Æäʱ¶íº¥¶íÖÝ²ÊÆ±¹«Ë¾Ðû²¼¹Ø±ÕһЩϵͳÒÔ×èֹΥ¹æÐÐΪ¡£¡£¡£¡£¡£Ô¼ÄªÔÚͳһʱ¼ä£¬£¬£¬Ò»¸öÃûΪ DragonForce µÄ¿´ËÆÐµÄÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£ ÒԺ󣬣¬£¬ºÚ¿ÍÌṩÁË¾Ý³Æ´Ó¶íº¥¶íÖÝ²ÊÆ±¹«Ë¾ÇÔÈ¡µÄÁè¼Ý 90 GB µÄÎļþ£¨ÒÔ .bak ±¸·ÝÃûÌã©¡£¡£¡£¡£¡£ËûÃÇÉù³ÆÒÑ»ñµÃÁè¼Ý 150 ÍòÌõÔ±¹¤ºÍÍæ¼ÒÐÅÏ¢¼Í¼£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþºÍÓÊÕþµØµã¡¢½±½ð¡¢³öÉúÈÕÆÚºÍÉç»áÇå¾²ºÅÂë¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¸ÃÀÕË÷Èí¼þ×éÖ¯×î³õÉù³ÆÇÔÈ¡ÁË 300 ÍòÌõ¼Í¼¡£¡£¡£¡£¡£¶íº¥¶íÖÝ²ÊÆ±¸æËßÃåÒòÖÝ×ÜÉó²é³¤£¬£¬£¬Ô¼ÄªÓÐ 538,000 ÈËÊܵ½Ó°Ïì¡£¡£¡£¡£¡£·¢Ë͸ø×ÜÉó²é³¤µÄ±¨¸æºÍ·¢Ë͸øÊÜÓ°ÏìСÎÒ˽¼ÒµÄÐź¯Ö¤Êµ£¬£¬£¬È«ÃûºÍÉç»áÇå¾²ºÅÂëÒѱ»Ð¹Â¶¡£¡£¡£¡£¡£
https://www.securityweek.com/500000-impacted-by-ohio-lottery-ransomware-attack/
6. HijackLoaderͨ¹ýÎäÆ÷»¯PNGͼƬ¹¥»÷Windows
5ÔÂ10ÈÕ£¬£¬£¬ÔÚ×î½üµÄÍøÂçÇå¾²Í»ÆÆÖУ¬£¬£¬Ñо¿Ö°Ô±Ðû²¼ÁË HijackLoader ¶ñÒâÈí¼þµÄÖØ´ó¸üУ¬£¬£¬ÕâÊÇÒ»ÖÖÖØ´óµÄÄ£¿£¿£¿£¿£¿é»¯¼ÓÔØ³ÌÐò£¬£¬£¬Òòת´ïÖÖÖÖ¶ñÒâ¸ºÔØ¶øÎÛÃûÕÑÖø¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÒѸüÐÂΪ¿É°²ÅÅ Amadey¡¢Lumma Stealer¡¢Racoon Stealer v2 ºÍRemcos RATµÈÍþв£¬£¬£¬Õ¹Ê¾ÁËÆä²Ù×÷µÄ¾ªÈ˶๦ЧÐÔ¡£¡£¡£¡£¡£HijackLoader ÒѾÉú³¤³ÉΪһÖÖÐÂÊÖÒÕ£¬£¬£¬É漰ʹÓÃPNG ͼÏñÀ´½âÃܲ¢Æô¶¯ºóÐø½×¶ÎµÄ¼ÓÔØ¡£¡£¡£¡£¡£´ËÒªÁìÊǸüÆÕ±éÕ½ÂÔµÄÒ»²¿·Ö£¬£¬£¬ÆäÖаüÀ¨¶¯Ì¬ API ÆÊÎö¡¢Ï꾡µÄ×èÖ¹ÁбíÀú³Ì¼ì²éÒÔ¼°ÌÓ±ÜÓû§Ä£Ê½¹Ò¹³£¬£¬£¬Í¹ÏÔÁ˶ñÒâÈí¼þÔÚÌӱܼì²â·½ÃæµÄÈÕÒæÖØ´óÐÔ¡£¡£¡£¡£¡£ÕâЩ¸üл¹ÒýÈëÁËÖ¼ÔÚÔöÇ¿¶ñÒâÈí¼þ¹¦Ð§µÄÐÂÄ£¿£¿£¿£¿£¿é¡£¡£¡£¡£¡£ÆäÖаüÀ¨½¨ÉèÀú³Ì¡¢ÈƹýÓû§ÕÊ»§¿ØÖÆ (UAC)¡¢Ïò Windows Defender Ìí¼Óɨ³ýÏîÒÔ¼°Ð´ÈëÎļþµÄ¹¦Ð§£¬£¬£¬´Ó¶øÀ©Õ¹Á˶ñÒâÈí¼þΣº¦ºÍ¿ØÖÆÊÜѬȾϵͳµÄÄÜÁ¦¡£¡£¡£¡£¡£
https://gbhackers.com/hijackloader-malware/