RustDoorͨ¹ýJustice AV Solutions JAVS Viewer¾ÙÐÐÈö²¥
Ðû²¼Ê±¼ä 2024-05-271. RustDoorͨ¹ýJustice AV Solutions JAVS Viewer¾ÙÐÐÈö²¥
5ÔÂ26ÈÕ£¬£¬Rapid7 µÄÑо¿Ö°Ô±ÖÒÑԳƣ¬£¬ÍþвÐÐΪÕßÔÚ Justice AV Solutions JAVS Viewer Èí¼þµÄ×°ÖóÌÐòÖÐÌí¼ÓÁ˺óÃÅ¡£¡£¹¥»÷ÕßÄܹ»ÔÚ´Ó JAVS ЧÀÍÆ÷·Ö·¢µÄ JAVS Viewer v8.3.7 ×°ÖóÌÐòÖÐ×¢ÈëºóÃÅ¡£¡£Justice AV Solutions (JAVS) ÊÇÒ»¼Ò×ܲ¿Î»ÓÚÃÀ¹úµÄ¹«Ë¾£¬£¬Îª·¨Í¥ÇéÐÎºÍÆäËûÇéÐΣ¨°üÀ¨ÀÎÓü¡¢Òé»áºÍÑݽ²ÊÒ£©ÌṩÊý×ÖÊÓÌýÂ¼ÖÆ½â¾ö¼Æ»®¡£¡£JAVS Viewer ÔÚÈ«ÇòÓµÓÐÁè¼Ý 10,000 ¸ö×°Öᣡ£Ñо¿Ö°Ô±ÌṩµÄºóÃÅÔÊÐí¹¥»÷ÕßÍêÈ«¿ØÖÆÊÜѬȾµÄϵͳ¡£¡£Rapid7 ר¼Ò½¨ÒéÖØÐÂÓ³ÏñÊÜÓ°ÏìµÄϵͳ£¬£¬ÖØÖÃÏà¹ØÆ¾Ö¤£¬£¬²¢×°ÖÃ×îа汾µÄ JAVS Viewer£¨v8.3.8 »ò¸ü¸ß°æ±¾£©¡£¡£Ñо¿Ö°Ô±×¢Öص½£¬£¬JAVS Viewer Setup 8.3.7.250-1.exe µÄ×°ÖóÌÐòʹÓÃÒâÍâµÄ Authenticode ÊðÃû¾ÙÐÐÊý×ÖÊðÃû£¬£¬²¢°üÀ¨Ò»¸öÃûΪ fffmpeg.exe µÄ¶þ½øÖÆÎļþ¡£¡£¸Ã¶þ½øÖÆÎļþÖ´ÐбàÂëµÄ PowerShell ¾ç±¾£¬£¬Rapid7 ½« fffmpeg.exe ÓëGateDoor / Rustdoor¶ñÒâÈí¼þÁªÏµÆðÀ´£¬£¬¸Ã¶ñÒâÈí¼þÒѱ»Çå¾²¹«Ë¾ S2W ʶ±ð¡£¡£
https://securityaffairs.com/163683/hacking/supplay-chain-attack-javs-viewer.html
2. SlashNextÐû²¼2024ÄêÉϰëÄêÍøÂç´¹ÂÚ״̬±¨¸æ
5ÔÂ24ÈÕ£¬£¬±¨¸æ³Æ£¬£¬ÒÑÍùÁù¸öÔÂÖжñÒâÍøÂç´¹ÂÚÁ´½Ó¡¢ÉÌÒµµç×ÓÓʼþÈëÇÖ (BEC)¡¢¶þάÂëºÍ»ùÓÚ¸½¼þµÄÍþвÔöÌíÁË 341%¡£¡£¸ÃÊý¾ÝÀ´×Ô SlashNext µÄÄêÖС¶2024 ÄêÍøÂç´¹ÂÚ״̬¡·±¨¸æ £¬£¬¸Ã±¨¸æ»¹·¢Ã÷£¬£¬ÔÚÒÑÍù 12 ¸öÔÂÖУ¬£¬¶ñÒâµç×ÓÓʼþºÍÐÂÎÅÍþвÔöÌíÁË 856%¡£¡£×Ô 2022 Äê 11 ÔÂÍÆ³ö ChatGPT ÒÔÀ´£¬£¬¶ñÒâÍøÂç´¹ÂÚÐÂÎż¤ÔöÁË 4151%¡£¡£Keeper Security Ê×ϯִÐйټæÁªºÏÊ×´´ÈË Darren Guccione ÖÒÑԳƣº²»Á¼ÐÐΪÕß¿ÉÒÔͨ¹ý¶àÖÖ·½·¨Ê¹Óà ChatGPT£¬£¬°üÀ¨½¨ÉèÁîÈËÐÅ·þµÄÍøÂç´¹ÂÚµç×ÓÓʼþ¡£¡£ÕâЩ¹¤¾ß²»µ«¿ÉÒÔ×ÊÖú²»·¨·Ö×Ó½¨Éè¿ÉÐŵÄÍøÂç´¹ÂÚµç×ÓÓʼþ»òÀÕË÷Èí¼þ¹¥»÷µÄ¶ñÒâ´úÂëµÈÄÚÈÝ£¬£¬²¢ÇÒËûÃÇ¿ÉÒÔ¿ìËÙÇáËɵØÍê³ÉÕâЩ²Ù×÷¡£¡£·ÀÓùÄÜÁ¦×îÈõµÄ×éÖ¯½«ÌØÊâÈÝÒ×Êܵ½¹¥»÷£¬£¬ÓÉÓÚ¹¥»÷Á¿¿ÉÄÜ»á¼ÌÐøÔöÌí¡£¡£±¨¸æ»¹·¢Ã÷£¬£¬ÔÚÒÑÍùÁù¸öÔÂÖУ¬£¬Æ¾Ö¤ÇÔÈ¡ÍøÂç´¹ÂÚ¹¥»÷ÔöÌíÁË 217%£¬£¬BEC ¹¥»÷ÔöÌíÁË 29%¡£¡£»£»£»£»ùÓÚ CAPTCHA µÄ¹¥»÷Ò²ÔÚÔöÌí£¬£¬¹¥»÷ÕßʹÓà CloudFlare µÄ CAPTCHA À´Òþ²ØÆ¾Ö¤ÍøÂç±í¸ñ¡£¡£±ðµÄ£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýÔÚʹÓà Microsoft SharePoint¡¢AWS ºÍ Salesforce µÈ¿ÉÐÅЧÀÍÀ´Òþ²ØÍøÂç´¹ÂںͶñÒâÈí¼þ¡£¡£»£»£»£»ùÓÚ¶þάÂëµÄ¹¥»÷ÏÖÔÚÕ¼ËùÓжñÒâµç×ÓÓʼþµÄ 11%£¬£¬Í¨³£¼¯³Éµ½Õýµ±»ù´¡ÉèÊ©ÖС£¡£
https://www.infosecurity-magazine.com/news/341-rise-advanced-phishing-attacks/?&web_view=true
3. ShrinkLocker Ð®ÖÆ BitLocker Õë¶ÔÆóÒµÌᳫ¹¥»÷
5ÔÂ25ÈÕ£¬£¬¿¨°Í˹»ùʵÑéÊÒµÄר¼ÒÒѾȷ¶¨Ê¹ÓÃÒ»ÖÖÃûΪ ShrinkLocker µÄÐÂÀÕË÷Èí¼þ³ÌÐò¶ÔÆóÒµ×°±¸¾ÙÐй¥»÷£¬£¬¸Ã³ÌÐòʹÓÃÁË BitLocker¡£¡£BitLocker ÊÇ Windows ÖеÄÒ»ÏîÇå¾²¹¦Ð§£¬£¬¿Éͨ¹ý¼ÓÃܱ£»£»£»£»¤Êý¾Ý¡£¡£ÕâЩ¹¥»÷µÄÄ¿µÄ°üÀ¨¹¤ÒµºÍÖÆÒ©¹«Ë¾ÒÔ¼°Õþ¸®»ú¹¹¡£¡£¹¥»÷ÕßʹÓà VBScript ±àдÁËÒ»¸ö¶ñÒâ¾ç±¾¡£¡£¸Ã¾ç±¾»á¼ì²é×°±¸ÉÏ×°ÖÃµÄ Windows °æ±¾²¢¼¤»îÏìÓ¦µÄ BitLocker ¹¦Ð§¡£¡£ShrinkLocker ¿ÉÒÔѬȾоɰ汾µÄ²Ù×÷ϵͳ£¬£¬×î¸ß¿ÉѬȾ Windows Server 2008¡£¡£¸Ã¾ç±¾»áÐ޸IJÙ×÷ϵͳµÄÆô¶¯²ÎÊý£¬£¬È»ºóʵÑéʹÓà BitLocker ¼ÓÃÜÓ²ÅÌ·ÖÇø¡£¡£½¨ÉèÒ»¸öÐÂµÄÆô¶¯·ÖÇø£¬£¬ÒÔ±ãÉÔºó¼ÓÔØ¼ÓÃܵÄÅÌËã»ú¡£¡£¹¥»÷Õß»¹»áɾ³ýÓÃÓÚ±£»£»£»£»¤ BitLocker ¼ÓÃÜÃÜÔ¿µÄÇå¾²¹¤¾ß£¬£¬×èÖ¹Óû§»Ö¸´ËüÃÇ¡£¡£Ëæºó£¬£¬¶ñÒâ¾ç±¾½«ÊÜѬȾÅÌËã»úÉÏÌìÉúµÄϵͳÐÅÏ¢ºÍ¼ÓÃÜÃÜÔ¿·¢Ë͵½¹¥»÷ÕßµÄЧÀÍÆ÷¡£¡£È»ºó£¬£¬Ëü»áͨ¹ýɾ³ýÈÕÖ¾ºÍÖÖÖÖ¿ÉÄÜÓÐÖúÓÚÊӲ칥»÷µÄÎļþÀ´¡°ÑÚÊÎÆä×Ù¼£¡±¡£¡£
https://meterpreter.org/new-ransomware-threat-shrinklocker-hijacks-bitlocker-for-corporate-attacks/
4. APT36ʹÓÃLinuxÌØ¹¤Èí¼þ¹¥»÷Ó¡¶ÈµÄ¹ú·À×éÖ¯
5ÔÂ25ÈÕ£¬£¬Ò»¸öÓë°Í»ù˹̹ÀûÒæÏà·ûµÄ¡¢³öÓÚÕþÖÎÄîÍ·µÄºÚ¿Í×éÖ¯ÕýÓëÓ¡¶È¾ü·½Í¬²½·ÅÆú Windows ²Ù×÷ϵͳ£¬£¬²¢½«Öصã·ÅÔÚΪ Linux ±àÂëµÄ¶ñÒâÈí¼þÉÏ¡£¡£¸ÃÍøÂçÌØ¹¤×é֯ʹÓõç×ÓÓʼþ×÷ΪÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷µÄÔØÌ壬£¬»¹Ê¹Óà Telegram¡¢Discord¡¢Slack ºÍ Google Drive µÈÊ¢ÐÐÍøÂçЧÀÍÀ´´æ´¢ºÍ·Ö·¢ÓÕ¶üºÍ¶ñÒâÈí¼þ¡£¡£Ã¿´Î¹¥»÷µÄʱ»ú¶¼ÊÇÓÐÕ½ÂÔÐԵ쬣¬ÕâÅú×¢ºÚ¿ÍÔÚ·¢¶¯Ã¿´Î¹¥»÷ʱ¶¼¾ÙÐÐÁËÏêϸµÄÍýÏ룬£¬²¢ÓÐÌØ¶¨µÄÄ¿µÄ¡£¡£×ÔÑо¿Ö°Ô±×îÏȸú×Ù APT36 Ðж¯ÒÔÀ´£¬£¬¸Ã×éÖ¯Ê×´ÎʹÓà ISO Ó³Ïñ×÷Ϊ¹¥»÷ǰÑÔ¡£¡£ÔÚÓ¡¶ÈÕþ¸®Ðû²¼Õб깺ÖÃÕ½¶·»úºÍÉý¼¶ÊýÊ®¼ÜËÕ»ôÒÁ 30MKI Õ½¶·»úÖ®¼Ê£¬£¬¸Ã×éÖ¯»¹ÔÚÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþÖÐʹÓà ISO Ó³ÏñÀ´¹¥»÷Ó¡¶È¿Õ¾ü¹ÙÔ±¡£¡£ºÚÝ®³Æ£¬£¬¸ÃÌØ¹¤×é֯ģÄâÓ¡¶È¹ú·ÀºÍÕ½ÂÔÖǿ⼰Õþ¸®»ú¹¹µÄÍøÕ¾ÓòÃû£¬£¬ÓÕÆÊܺ¦ÕßÏÂÔØ¶ñÒâÓÕ¶üÎļþ¡£¡£ÕâЩ×éÖ¯°üÀ¨Î»ÓÚеÂÀïµÄ×ÔÁ¦ÖÇ¿â½սÑо¿ÖÐÐÄ¡¢Ó¡¶ÈÅÌËã»úÓ¦¼±ÏìӦС×éºÍ½¾ü¸£Àû½ÌÓýлᡣ¡£
https://www.bankinfosecurity.com/pakistani-aligned-apt36-targets-indian-defense-organizations-a-25296?&web_view=true
5. ð³ä Pegasus ÌØ¹¤Èí¼þ²¡¶¾³äÂú¼´Ê±Í¨Ñ¶Æ½Ì¨ºÍ°µÍø
5ÔÂ25ÈÕ£¬£¬CloudSEK ·¢Ã÷£¬£¬Ã°³ä Pegasus ÌØ¹¤Èí¼þµÄÔ´´úÂëÕýÔÚ±í²ãÍøÂç¡¢°µÍøºÍ¼´Ê±Í¨Ñ¶Æ½Ì¨ÉϳöÊÛ¡£¡£¼ÌÆ»¹û¹«Ë¾×î½ü·¢³öÓйء°¹ÍÓ¶ÐÍÌØ¹¤Èí¼þ¡±¹¥»÷µÄÖÒÑԺ󣬣¬ÔÆÇå¾²ÌṩÉÌ CloudSEK ¶ÔÃ÷ÍøºÍ°µÍøÖÐÓëÌØ¹¤Èí¼þÏà¹ØµÄÍþв¾ÙÐÐÁËÊӲ졣¡£¸Ã¹«Ë¾ÆÊÎöÁËԼĪ 25,000 Ìõ Telegram Ìû×Ó£¬£¬·¢Ã÷Ðí¶àÌû×ÓÉù³Æ³öÊÛ Pegasus µÄÕæÊµÔ´´úÂë¡£¡£Pegasus ÊÇÓÉÒÔÉ«Áй«Ë¾ NSO Group ÉÌÒµ»¯µÄÌØ¹¤Èí¼þ¡£¡£ÕâЩÌû×Ó´ó¶à×ñÕÕÌṩ²»·¨Ð§À͵ÄͨÓÃÄ£°å£¬£¬ÆäÖо³£Ìáµ½ Pegasus ºÍ NSO ¹¤¾ß¡£¡£Í¨¹ýÓë 150 ¶àÃûDZÔÚÂô¼Ò»¥¶¯£¬£¬Ñо¿Ö°Ô±ÉîÈëÏàʶÁËÖÖÖÖÑù±¾ºÍÖ¸±ê£¬£¬°üÀ¨ËùνµÄ Pegasus Ô´´úÂë¡¢ÏÖ³¡ÑÝʾ¡¢Îļþ½á¹¹ºÍ¿ìÕÕ¡£¡£ÔÚÆÊÎöÁËÀ´×Ô°µÍøÔ´µÄ 15 ¸öÔ´´úÂëÑù±¾ºÍ 30 ¶à¸öÖ¸±êºó£¬£¬CloudSEK ·¢Ã÷ÏÕЩËùÓÐÑù±¾¶¼ÊÇÚ²ÆÐÔµÄÇÒÎÞЧµÄ¡£¡£ÍþвÐÐΪÕß½¨ÉèÁË×Ô¼ºµÄ¹¤¾ßºÍ¾ç±¾£¬£¬²¢ÒÔ Pegasus µÄÃûÒå·Ö·¢£¬£¬Ê¹ÓÃÆä¶ñÃû»ñÈ¡¾¼ÃÀûÒæ¡£¡£ÕâÒ»Ç÷ÊÆÔÚ¶à¸öµØÏÂÂÛ̳ÖÐÒ²ÓÐËùÌåÏÖ£¬£¬·¸·¨ÕßÔÚÕâЩÂÛ̳ÉÏÓªÏúºÍ·Ö·¢Ñù±¾£¬£¬Àû
Óà Pegasus µÄÃûÒå»ñÈ¡¿î×ÓÀûÒæ£¬£¬²¢ÔڵرíÍøÂç´úÂë¹²ÏíÆ½Ì¨ÉÏÈö²¥Óë Pegasus Ðéα¹ØÁªµÄËæ»úÌìÉúµÄÔ´´úÂë¡£¡£
https://www.infosecurity-magazine.com/news/fake-pegasus-spyware-dark-web/
6. CencoraÊý¾Ýй¶µ¼ÖÂ11¼ÒÖÆÒ©¹«Ë¾µÄÃÀ¹ú»¼ÕßÐÅÏ¢±»Ð¹Â¶
5ÔÂ25ÈÕ£¬£¬È«ÇòһЩ×î´óµÄÖÆÒ©¹«Ë¾Åû¶ÁËÊý¾Ýй¶ÊÂÎñ£¬£¬Ôµ¹ÊÔÓÉÊÇ 2024 Äê 2 ÔÂ¶ÔÆäÖÆÒ©ºÍÉÌҵЧÀÍÏàÖúͬ°é Cencora ÌᳫµÄÍøÂç¹¥»÷¡£¡£Cencora£¨Ç°ÉíΪ AmerisourceBergen£©ÊÇÒ»¼ÒרÃÅ´ÓÊÂÒ©Æ··ÖÏú¡¢×¨ÒµÒ©·¿¡¢×ÉѯºÍÁÙ´²ÊÔÑéÖ§³ÖµÄҽҩЧÀÍÌṩÉÌ¡£¡£¸Ã¹«Ë¾×ܲ¿Î»ÓÚ±öϦ·¨ÄáÑÇÖÝ£¬£¬ÓªÒµÆÕ±é 50 ¸ö¹ú¼Ò£¬£¬ÓµÓÐ 46,000 ÃûÔ±¹¤£¬£¬2023 ÄêÓªÊÕΪ 2620 ÒÚÃÀÔª¡£¡£2024 Äê 2 Ô£¬£¬Cencora ÔÚÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄ 8-K ±í¸ñÖÐÅû¶ÁËÊý¾Ýй¶ÊÂÎñ £¬£¬³ÆÎ´¾ÊÚȨµÄ¸÷·½»á¼ûÁËÆäÐÅϢϵͳ²¢ÇÔÈ¡ÁËСÎÒ˽¼ÒÊý¾Ý¡£¡£Æäʱ£¬£¬¸Ã¹«Ë¾Ñ¡Ôñ²»·ÖÏíÓйظÃÊÂÎñ¼°Æä¶Ô¿Í»§µÄDZÔÚÓ°ÏìµÄÈÎºÎÆäËûÐÅÏ¢¡£¡£±ðµÄ£¬£¬Ã»ÓÐÈκÎÀÕË÷Èí¼þ×éÖ¯ÈϿɶԴ˴ι¥»÷ÈÏÕæ¡£¡£½ñÌ죬£¬¼ÓÖÝ×ÜÉó²é³¤°ì¹«ÊÒÐû²¼ÁËÃÀ¹úһЩ×î´óµÄÖÆÒ©¹«Ë¾ÔÚÒÑÍù¼¸ÌìÌá½»µÄ¶à·ÝÊý¾Ýй¶֪ͨÑù±¾£¬£¬ÕâЩ¹«Ë¾¾ù½«ÆäÊý¾Ýй¶¹é×ïÓÚ 2 ÔÂ·ÝµÄ Cencora ÊÂÎñ¡£¡£Êý¾Ýй¶֪ͨÖÒÑԳƣ¬£¬Cencora µÄÄÚ²¿ÊÓ²ìÓÚ 2024 Äê 4 Ô 10 ÈÕ¿¢Ê£¬£¬ÊÓ²ì֤ʵÒÔÏÂÐÅÏ¢Òѱ»Ð¹Â¶£ºÈ«Ãû¡¢µØµã¡¢¿µ½¡Õï¶Ï¡¢Ò©ÎïºÍ´¦·½¡£¡£ÐÅÖÐÖ¸³ö£¬£¬×èÖ¹ÏÖÔÚ£¬£¬Ã»ÓÐÖ¤¾ÝÅú×¢ÇÔÈ¡µÄÐÅÏ¢ÒÑÔÚ»¥ÁªÍøÉϹûÕæÅû¶»ò±»ÓÃÓÚÚ²ÆÄ¿µÄ¡£¡£ÎªÁËÓ¦¶ÔÊÜÓ°ÏìСÎÒ˽¼ÒÃæÁٵĽϸßΣº¦£¬£¬Cencora ½«Í¨¹ý Experian ΪÊÜÖúÕßÌṩÁ½ÄêµÄÃâ·ÑÉí·Ý±£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬ÊÜÖúÕß¿ÉÒÔʹÓÃÕâЩЧÀÍÖ±µ½ 2024 Äê 8 Ô 30 ÈÕ¡£¡£
https://www.bleepingcomputer.com/news/security/cencora-data-breach-exposes-us-patient-info-from-11-drug-companies/