LATRODECTUSÒ»Ö±¸üв¢·Ö·¢ICEDIDºÍÆäËû¶ñÒâÈí¼þ
Ðû²¼Ê±¼ä 2024-05-225ÔÂ21ÈÕ£¬£¬£¬£¬£¬LATRODECTUSÓÚ 2023 Äê 10 ÔÂÓÉÎÖ¶ûÂêÑо¿Ö°Ô±Ê״η¢Ã÷£¬£¬£¬£¬£¬ÊÇÒ»ÖÖÔÚÍøÂç·¸·¨·Ö×ÓÖÐÔ½À´Ô½Ê¢ÐеĶñÒâÈí¼þ¼ÓÔØ³ÌÐò¡£¡£¡£¡£¡£¡£ËäÈ»Õâ±»ÒÔΪÊÇÒ»¸öеļÒ×壬£¬£¬£¬£¬µ«ÓÉÓÚÐÐΪºÍÉú³¤ÏàËÆÐÔ£¬£¬£¬£¬£¬LATRODECTUS ºÍICEDIDÖ®¼ä±£´æÏ¸ÃÜÁªÏµ£¬£¬£¬£¬£¬°üÀ¨ÏÂÔØºÍÖ´ÐмÓÃܸºÔØ£¨Èç ICEDID£©µÄÏÂÁî´¦Öóͷ£³ÌÐò¡£¡£¡£¡£¡£¡£Proofpoint ºÍ Team Cymru »ùÓÚÕâÖÖÁªÏµ£¬£¬£¬£¬£¬·¢Ã÷ÁËICEDID ºÍ LATRODECTUS ÔËÓªÉÌʹÓõÄÍøÂç»ù´¡Éèʩ֮¼ä±£´æÏ¸ÃÜÁªÏµ¡£¡£¡£¡£¡£¡£LATRODECTUS ÌṩÁËһϵÁÐÖÜÈ«µÄ±ê×¼¹¦Ð§£¬£¬£¬£¬£¬ÍþвÐÐΪÕß¿ÉÒÔʹÓÃÕâЩ¹¦Ð§À´°²ÅŸü¶àµÄÓÐÓøºÔØ£¬£¬£¬£¬£¬ÔÚÆðÔ´ÈëÇÖºóÖ´ÐÐÖÖÖֻ¡£¡£¡£¡£¡£¡£´úÂë¿âδ¾ÓÉ»ìÏý£¬£¬£¬£¬£¬½ö°üÀ¨ 11 ¸öרעÓÚö¾ÙºÍÖ´ÐеÄÏÂÁî´¦Öóͷ£³ÌÐò¡£¡£¡£¡£¡£¡£ÕâÖÖÀàÐ͵ļÓÔØÆ÷´ú±íÁËÎÒÃÇÍŶÓ×î½üÊӲ쵽µÄÀ˳±£¬£¬£¬£¬£¬ÀýÈçPIKABOT£¬£¬£¬£¬£¬ÆäÖдúÂëÔ½·¢ÇáÁ¿¼¶ºÍÖ±½Ó£¬£¬£¬£¬£¬´¦Öóͷ£³ÌÐòÊýÄ¿ÓÐÏÞ¡£¡£¡£¡£¡£¡£
https://www.elastic.co/security-labs/spring-cleaning-with-latrodectus?&web_view=true
2. Kinsing¹¥»÷Apache Tomcat°²ÅÅÍÚ¿ó³ÌÐò
5ÔÂ20ÈÕ£¬£¬£¬£¬£¬Kinsing ¶ñÒâÈí¼þÒÔʹÓà Linux ÔÆÐ§ÀÍÆ÷ÉϵÄÎó²î°²ÅźóÃźͼÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò¶øÖøÃû£¬£¬£¬£¬£¬×î½ü½«ÆäÄ¿µÄÀ©Õ¹µ½°üÀ¨ Apache Tomcat ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÐÂÓ±µÄÊÖÒÕÀ´Ìӱܼì²â£¬£¬£¬£¬£¬½«×ÔÉíÒþ²ØÔÚ¿´ËÆÎÞº¦µÄϵͳÎļþÖУ¬£¬£¬£¬£¬Ê¹ÆäÔÚÊÜѬȾµÄϵͳÉϳ¤ÆÚ±£´æ£¬£¬£¬£¬£¬Í»³öÁË Kinsing Ò»Ö±Éú³¤µÄÕ½ÂÔ£¬£¬£¬£¬£¬²¢Ç¿µ÷ϵͳÖÎÀíÔ±ÐèÒª¶ÔÕâЩÐÂÐËÍþв¼á³ÖСÐÄ¡£¡£¡£¡£¡£¡£Kinsing ʹÓÃÈÝÆ÷ºÍЧÀÍÆ÷ÖеÄÎó²îÀ´°²ÅźóÃźͼÓÃÜÍÚ¿ó³ÌÐò£¬£¬£¬£¬£¬ÊÓ²ìЧ¹ûÏÔʾ¶à¸öЧÀÍÆ÷Êܵ½Ñ¬È¾£¬£¬£¬£¬£¬ÆäÖаüÀ¨¾ßÓÐÑÏÖØÈ±ÏÝµÄ Apache Tomcat¡£¡£¡£¡£¡£¡£Tomcat ÊÇÒ»¿î¿É¹ûÕæ»á¼ûµÄ¾²Ì¬ÄÚÈÝ¿ªÔ´Ð§ÀÍÆ÷£¬£¬£¬£¬£¬ÓÉÓÚÆäÔÚ»¥ÁªÍøÉϵÄ̻¶¶ø³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬ÕâʹµÃ Kinsing ¿ÉÒÔÉøÍ¸µ½ÏµÍ³Öв¢½¨ÉèÒþ²ØµÄºóÃÅÒÔʵÏÖ³¤ÆÚÐÔ£¬£¬£¬£¬£¬Í¬Ê±°²ÅżÓÃÜ¿ó¹¤À´ÇÔÈ¡ÅÌËã×ÊÔ´ÒÔ¾ÙÐмÓÃÜÇ®±ÒÍÚ¾ò¡£¡£¡£¡£¡£¡£
https://gbhackers.com/kinsing-malware-apache-tomcat-servers/
3. SECÒªÇó½ðÈÚ×éÖ¯ÐèÒªÔÚ 30 ÌìÄÚÅû¶Êý¾Ýй¶ÊÂÎñ
5ÔÂ21ÈÕ£¬£¬£¬£¬£¬ÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©¶Ô SP ¹æÔò¾ÙÐÐÁËÐ޸쬣¬£¬£¬£¬ÒªÇó½ðÈÚ¹«Ë¾ÔÚ 30 ÌìÄÚ±¨¸æÊý¾Ýй¶ÇéÐΡ£¡£¡£¡£¡£¡£ÕâÊDZ£»£»£»¤ÏûºÄÕßµÄÒ»´óǰ½ø¡£¡£¡£¡£¡£¡£ÕâÏîл®¶¨½«ÓÚ 2024 Äê 5 Ô 15 ÈÕÉúЧ£¬£¬£¬£¬£¬Ö¼ÔÚÔöÇ¿ºÍ¸üжÔÏûºÄÕß½ðÈÚÐÅÏ¢µÄ±£»£»£»¤¡£¡£¡£¡£¡£¡£×Ô 2000 ÄêÍÆ³öÒÔÀ´£¬£¬£¬£¬£¬SEC î¿Ïµ SPÒªÇó¾¼ÍÉúÒâÉÌ¡¢Í¶×ʹ«Ë¾ºÍ³ÖÅÆÍ¶×ÊÕÕÁÏͨ¹ýÊéÃæÕþ²ßºÍ³ÌÐò±£»£»£»¤¿Í»§¼Í¼ºÍÐÅÏ¢¡£¡£¡£¡£¡£¡£¸Ã¹æÔò»¹Ú¹ÊÍÁËÔõÑù׼ȷɾ³ýÏûºÄÕß±¨¸æÐÅÏ¢£¬£¬£¬£¬£¬²¢ÒªÇóÒþ˽Õþ²ß֪ͨºÍÑ¡ÔñÍ˳öÑ¡Ïî¡£¡£¡£¡£¡£¡£¶àÄêÀ´£¬£¬£¬£¬£¬ÊÖÒÕµÄǰ½øÊ¹µÃÊý¾Ýй¶µÄ¿ÉÄÜÐÔ¸ü´ó£¬£¬£¬£¬£¬Õâ¾ÍÊÇÐèÒªÕâЩ¸Ä±äµÄÔµ¹ÊÔÓÉ¡£¡£¡£¡£¡£¡£
https://gbhackers.com/financial-organizations-data-breach/
4. Git Ô¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2024-32002
5ÔÂ21ÈÕ£¬£¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬¸ÃÎó²î±»Ö¸¶¨Îª CVE-2024-32002£¬£¬£¬£¬£¬ÑÏÖØË®Æ½Îª 9.0£¨ÑÏÖØ£©¡£¡£¡£¡£¡£¡£Õâ¸öÌØÊâµÄÎó²î±£´æÓÚÆÕ±éʹÓõÄcloneÏÂÁîÖС£¡£¡£¡£¡£¡£Git ÉÏÖÜÐû²¼ÁËÒ»·ÝÇ徲ͨ¸æ£¬£¬£¬£¬£¬ÆäÖÐÖ¸³öÁËÓйØÔ¶³Ì´úÂëÖ´ÐеÄÎÊÌâ¡£¡£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬¸ÃÎó²î±»ÐÎòΪÓÉÓÚ¿ÉÒÔÒÔÌØ¶¨·½·¨Æð²ÝµÄ×ÓÄ£¿£¿£¿£¿é¶ø±£´æ£¬£¬£¬£¬£¬´Ó¶ø¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£²»¹ýÕâ¸öÎó²îÒѾ±»gitÐÞ¸´£¬£¬£¬£¬£¬²¢ÇÒÐû²¼ÁËÐÞ²¹°æ±¾¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÍøÂçÇå¾²ÐÂÎÅ·ÖÏíµÄ±¨¸æ£¬£¬£¬£¬£¬git ʹÓÃ×ÓÄ£¿£¿£¿£¿é£¬£¬£¬£¬£¬ÕâЩ×ÓÄ£¿£¿£¿£¿éÊÇǶÌ×ÔÚÆäËû´æ´¢¿âÖеĴ洢¿â¡£¡£¡£¡£¡£¡£Ã¿¸ö×ÓÄ£¿£¿£¿£¿éÔÚÖ÷Ŀ¼Öж¼ÓÐÒ»¸öÖ¸¶¨µÄĿ¼·¾¶£¬£¬£¬£¬£¬¸ÃĿ¼·¾¶»á±»¸ú×ÙÒÔÈ·±£×¼È·¼Í¼¸ü¸Ä¡£¡£¡£¡£¡£¡£½øÒ»²½ÊӲ췢Ã÷£¬£¬£¬£¬£¬Windows£¨A/modules/x£©ºÍmacOS£¨a/modules/x£©µÄĬÈÏÉèÖÃÖб£´æ²»Çø·Ö¾ÞϸдµÄÎļþϵͳ¡£¡£¡£¡£¡£¡£ÕâÁ½¸ö·¾¶µÄ´¦Öóͷ£·½·¨Ïàͬ£¬£¬£¬£¬£¬ÕâÊÇÔ¶³Ì´úÂëÖ´Ðб³ºóµÄÖ÷ÒªÔµ¹ÊÔÓÉ¡£¡£¡£¡£¡£¡£
https://gbhackers.com/git-flaw-remote-code-execution/
5. Fluent Bit ÑÏÖØÈ±ÏÝÓ°ÏìËùÓÐÖ÷ÒªÔÆÌṩÉÌ
5ÔÂ21ÈÕ£¬£¬£¬£¬£¬¿ÉÔھܾøÐ§ÀͺÍÔ¶³Ì´úÂëÖ´Ðй¥»÷ÖÐʹÓõÄÒªº¦ Fluent Bit Îó²îÓ°ÏìÁËËùÓÐÖ÷ÒªÔÆÌṩÉ̺ÍÐí¶àÊÖÒÕ¾ÞÍ·¡£¡£¡£¡£¡£¡£Fluent Bit ÊÇÒ»ÖÖºÜÊÇÊ¢ÐеÄÈÕÖ¾¼Í¼ºÍÖ¸±ê½â¾ö¼Æ»®£¬£¬£¬£¬£¬ÊÊÓÃÓÚ Windows¡¢Linux ºÍ macOS£¬£¬£¬£¬£¬Ç¶ÈëÔÚÖ÷Òª Kubernetes ¿¯ÐаæÖУ¬£¬£¬£¬£¬°üÀ¨À´×Ô Amazon AWS¡¢Google GCP ºÍ Microsoft Azure µÄ¿¯Ðа档¡£¡£¡£¡£¡£×èÖ¹ 2024 Äê 3 Ô£¬£¬£¬£¬£¬Fluent Bit µÄÏÂÔØºÍ°²ÅÅ´ÎÊýÁè¼Ý 130 ÒڴΣ¬£¬£¬£¬£¬½Ï 2022 Äê 10 Ô±¨µÀµÄ30 ÒÚ´ÎÏÂÔØÁ¿´ó·ùÔöÌí¡£¡£¡£¡£¡£¡£Fluent Bit Ò²±» Crowdstrike ºÍ Trend Micro µÈÍøÂçÇå¾²¹«Ë¾ÒÔ¼°Ë¼¿Æ¡¢VMware¡¢Ó¢Ìضû¡¢Adobe ºÍ´÷¶ûµÈÐí¶à¿Æ¼¼¹«Ë¾Ê¹Óᣡ£¡£¡£¡£¡£Õâ¸öÑÏÖØµÄÄÚ´æËð»µÎó²î±»¸ú×ÙΪCVE-2024-4323£¬£¬£¬£¬£¬²¢±»·¢Ã÷¸ÃÎó²îµÄ Tenable Çå¾²Ñо¿Ö°Ô±³ÆÎªLinguistic Lumberjack£¬£¬£¬£¬£¬ËüÊÇÔÚ°æ±¾ 2.0.7 ÖÐÒýÈëµÄ£¬£¬£¬£¬£¬ÊÇÓÉ Fluent Bit µÄǶÈëʽ HTTP ЧÀÍÆ÷ÆÊÎö¸ú×ÙÇëÇóÖеĶѻº³åÇøÒç³öÎó²îÒýÆðµÄ¡£¡£¡£¡£¡£¡£Ö»¹Üδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔÇáËÉʹÓøÃÇå¾²Îó²îÀ´´¥·¢¾Ü¾øÐ§ÀÍ»òÔ¶³Ì²¶»ñÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬µ«ÈôÊÇÓÐÊʵ±µÄÌõ¼þºÍ×ã¹»µÄʱ¼äÀ´½¨Éè¿É¿¿µÄÎó²î£¬£¬£¬£¬£¬ËûÃÇÒ²¿ÉÒÔʹÓÃËüÀ´»ñµÃÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-fluent-bit-flaw-impacts-all-major-cloud-providers/
6. AntidotľÂíαװ³ÉGoogle Play¸üУ¬£¬£¬£¬£¬ÇÔÈ¡ÒøÐÐÊý¾Ý
5ÔÂ22ÈÕ£¬£¬£¬£¬£¬CybleµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÕë¶Ô Android ×°±¸µÄÐÂÒøÐÐľÂí¡£¡£¡£¡£¡£¡£ÕâÖÖÖØ´óµÄ¶ñÒâÈí¼þ¾ßÓжàÖÖΣÏÕ¹¦Ð§£¬£¬£¬£¬£¬°üÀ¨ÁýÕÖ¹¥»÷¡¢¼üÅ̼ͼºÍ»ìÏýÊÖÒÕ¡£¡£¡£¡£¡£¡£¸ÃľÂíÆ¾Ö¤ÆäÔ´´úÂëÖеÄ×Ö·û´®ÃüÃûΪ¡°Antidot¡±£¬£¬£¬£¬£¬ÒÔαװ³É¹Ù·½ Google Play ¸üв¢Ö§³Ö¶àÖÖÓïÑÔ¶øÖøÃû£¬£¬£¬£¬£¬°üÀ¨Ó¢Óï¡¢µÂÓï¡¢·¨Óï¡¢Î÷°àÑÀÓï¡¢ÆÏÌÑÑÀÓï¡¢ÂÞÂíÄáÑÇÓ£¬£¬£¬£¬ÉõÖÁ¶íÓï¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×÷Ϊ Google Play µÄ¸üоÙÐзַ¢£¬£¬£¬£¬£¬²¢ÒÔ¡°Ð°汾¡±µÄÃû³Æ·ºÆðÔÚÊܺ¦ÕßµÄ×°±¸ÉÏ¡£¡£¡£¡£¡£¡£×°ÖúÍÊ×´ÎÆô¶¯ºó£¬£¬£¬£¬£¬Óû§»á¿´µ½Ò»¸ö¼ÙÒ³Ãæ£¬£¬£¬£¬£¬¾Ý³ÆÀ´×Ô Google Play£¬£¬£¬£¬£¬ÆäÖаüÀ¨Íê³É¸üÐÂËùÐè²Ù×÷µÄÏêϸ˵Ã÷¡£¡£¡£¡£¡£¡£
https://meterpreter.org/new-antidot-trojan-masquerades-as-google-play-update-steals-banking-data/