RedTailÍÚ¿óʹÓà Palo Alto Networks ·À»ðǽµÄÎó²î
Ðû²¼Ê±¼ä 2024-06-035ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬RedTail¼ÓÃÜÇ®±ÒÍÚ¾ò¶ñÒâÈí¼þ±³ºóµÄÍþвÐÐΪÕß½«×î½üÅû¶µÄÓ°Ïì Palo Alto Networks ·À»ðǽµÄÇå¾²Îó²îÌí¼Óµ½ÆäÎó²îʹÓÿâÖС£¡£¡£¡£¡£¡£Æ¾Ö¤ÍøÂç»ù´¡ÉèÊ©ºÍÇå¾²¹«Ë¾ Akamai µÄÑо¿Ð§¹û£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ²»µ«ÔÚÆä¹¤¾ß°üÖÐÔöÌíÁË PAN-OS Îó²î£¬£¬£¬£¬£¬£¬»¹¶ÔÆä¾ÙÐÐÁ˸üУ¬£¬£¬£¬£¬£¬ÏÖÔÚÒѽÓÄÉÁËÐµķ´ÆÊÎöÊÖÒÕ¡£¡£¡£¡£¡£¡£Akamai ·¢Ã÷µÄѬȾÐòÁÐʹÓÃÁË PAN-OS ÖÐÏÖÒÑÐÞ²¹µÄÎó²îCVE-2024-3400£¨CVSS ÆÀ·Ö£º10.0£©£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÄÜÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚ·À»ðǽÉÏÒÔ root ȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓÃÖ®ºó£¬£¬£¬£¬£¬£¬½«Ö´ÐÐÖ¼ÔÚ´ÓÍⲿÓò¼ìË÷ºÍÔËÐÐ bash shell ¾ç±¾µÄÏÂÁ£¬£¬£¬£¬£¬¸Ã¾ç±¾·´¹ýÀ´ÈÏÕæÆ¾Ö¤ CPU ¼Ü¹¹ÏÂÔØ RedTail ÓÐÓøºÔØ¡£¡£¡£¡£¡£¡£RedTail µÄÆäËûÈö²¥»úÖÆÉæ¼°Ê¹Óà TP-Link ·ÓÉÆ÷£¨CVE-2023-1389£©¡¢ThinkPHP£¨CVE-2018-20062£©¡¢Ivanti Connect Secure£¨CVE-2023-46805 ºÍ CVE-2024-21887£©ÒÔ¼° VMWare Workspace ONE Access ºÍ Identity Manager£¨CVE-2022-22954£©ÖÐÒÑÖªµÄÇå¾²Îó²î¡£¡£¡£¡£¡£¡£RedTailÓÚ 2024 Äê 1 ÔÂÊ×´ÎÓÉÇå¾²Ñо¿Ô± Patryk Machowiak ¼Í¼£¬£¬£¬£¬£¬£¬É漰ʹÓà Log4Shell Îó²î (CVE-2021-44228) ÔÚ»ùÓÚ Unix µÄϵͳÉϰ²ÅŶñÒâÈí¼þµÄ»î¶¯¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2024/05/redtail-crypto-mining-malware.html
2. Cooler Master È·ÈÏÊý¾Ýй¶ÊÂÎñÖпͻ§ÐÅÏ¢±»µÁ
5ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬ÅÌËã»úÓ²¼þÖÆÔìÉÌ Cooler Master È·ÈÏÆäÓÚ 5 Ô 19 ÈÕÔâÓöÊý¾Ýй¶£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÇÔÈ¡Á˿ͻ§Êý¾Ý¡£¡£¡£¡£¡£¡£Cooler Master ÊÇÒ»¼Ò×ÅÃûµÄÅÌËã»úÓ²¼þÖÆÔìÉÌ£¬£¬£¬£¬£¬£¬ÒÔÆäÀäÈ´×°±¸¡¢ÅÌËã»ú»úÏä¡¢µçÔ´ºÍÆäËûÍâΧװ±¸¶øÖøÃû¡£¡£¡£¡£¡£¡£BleepingComputer×òÌ챨µÀ³Æ£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ¡°Ghostr¡±µÄÍþвÐÐΪÕ߸æËßÎÒÃÇ£¬£¬£¬£¬£¬£¬ËûÃÇÓÚ 5 Ô 18 ÈÕÈëÇÖÁ˸ù«Ë¾µÄ Fanzone ÍøÕ¾²¢ÏÂÔØÁËÆäÁ´½ÓµÄÊý¾Ý¿â¡£¡£¡£¡£¡£¡£Cooler Master µÄ Fanzone ÍøÕ¾ÓÃÓÚ×¢²á²úÆ·±£ÐÞ¡¢ÉêÇë RMA »ò¿ªÁ¢Ö§³ÖƱ£¬£¬£¬£¬£¬£¬ÒªÇó¿Í»§ÌîдСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬£¬ÀýÈçÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚºÍÏÖʵµØµã¡£¡£¡£¡£¡£¡£Ghostr ÌåÏÖ£¬£¬£¬£¬£¬£¬ÔÚ Fanzone Îó²î±¬·¢Ê±´ú£¬£¬£¬£¬£¬£¬ËûÃÇÏÂÔØÁË 103 GB µÄÊý¾Ý£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Áè¼Ý 500,000 Ãû¿Í»§µÄ¿Í»§ÐÅÏ¢¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕß»¹¹²ÏíÁËÊý¾ÝÑù±¾£¬£¬£¬£¬£¬£¬Ê¹ BleepingComputer Äܹ»ÓëÎ¥¹æÐÐΪÖÐÁгöµÄÖÚ¶à¿Í»§È·ÈÏËûÃǵÄÊý¾ÝÊÇ׼ȷµÄ£¬£¬£¬£¬£¬£¬²¢ÇÒËûÃÇ×î½üÏò Cooler Master ÇëÇóÁËÖ§³Ö»ò RMA¡£¡£¡£¡£¡£¡£Ñù±¾ÖÐµÄÆäËûÊý¾Ý°üÀ¨²úÆ·ÐÅÏ¢¡¢Ô±¹¤ÐÅÏ¢ÒÔ¼°Ó빩ӦÉ̵ĵç×ÓÓʼþÐÅÏ¢¡£¡£¡£¡£¡£¡£ÍþвÕßÉù³ÆÓµÓв¿·ÖÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬£¬£¬µ« BleepingComputer ÔÚÊý¾ÝÑù±¾ÖÐÕÒ²»µ½ÕâЩÊý¾Ý¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cooler-master-confirms-customer-info-stolen-in-data-breach/
3. BBC Åû¶ÁËÓ°ÏìÆäÑøÀϽðÍýÏë³ÉÔ±µÄÊý¾Ýй¶ÊÂÎñ
6ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬BBC µÄÐÅÏ¢Çå¾²ÍŶÓÒÑÏòÎÒÃÇת´ïÁËÒ»ÆðÊý¾ÝÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬ÆäÖв¿·Ö°üÀ¨ BBC ÑøÀϽðÍýÏë³ÉԱСÎÒ˽¼ÒÐÅÏ¢µÄÎļþ±»´ÓÔÆ´æ´¢Ð§ÀÍÖи´ÖÆ¡£¡£¡£¡£¡£¡£ÕâЩÎļþ°üÀ¨Ò»Ð©ÑøÀϽðÍýÏë³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢¹úÃñ°ü¹ÜºÅ¡¢³öÉúÈÕÆÚºÍ¼ÒͥסַµÈÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£¡±Í¨¸æÐ´µÀ¡£¡£¡£¡£¡£¡£¡°ËùÉæ¼°µÄÊý¾ÝÎļþÊǸ±±¾£¬£¬£¬£¬£¬£¬Òò´Ë¶ÔÍýÏëµÄÕý³£ÔË×÷ûÓÐÓ°Ïì¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñδӰÏìÑøÀϽðÍýÏëÃÅ»§ÍøÕ¾µÄÔËÐУ¬£¬£¬£¬£¬£¬Óû§¿ÉÒÔ¼ÌÐøÊ¹Óᣡ£¡£¡£¡£¡£¸ÃÊÂÎñй¶ÁËÔ¼ 25,000 Ãû BBC ÑøÀϽðÍýÏë³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÏÖÈκÍǰÈÎÔ±¹¤¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨È«Ãû¡¢¹úÃñ°ü¹ÜºÅ¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ðºÍ¼Òͥסַ¡£¡£¡£¡£¡£¡£Õâ¼ÒÓ¢¹ú¹«¹²Ð§À͹㲥¹«Ë¾ÔÚÍⲿר¼ÒµÄ×ÊÖúÏÂÊÓ²ìÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬²¢ÒѽÓÄÉÁËÌØÁíÍâÇå¾²²½·¥¡£¡£¡£¡£¡£¡£×¨¼ÒÃÇÒѾȷ¶¨ÁËÇå¾²Îó²îµÄÔµ¹ÊÔÓɲ¢½ÓÄÉÁËÇå¾²²½·¥¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÕýÔÚͨ¹ýµç×ÓÓʼþ»òÓʼķ½·¨ÁªÏµËùÓÐÊÜÓ°ÏìµÄ»áÔ±¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ã»ÓÐÖ¤¾ÝÅú×¢ÊÜËðÎļþÒѱ»ÀÄÓᣡ£¡£¡£¡£¡£
https://securityaffairs.com/163908/data-breach/bbc-disclosed-data-breach.html
4. FlyingYetiʹÓÃWinRARÎó²î¾ÙÐÐÓÐÕë¶ÔÐԵĹ¥»÷»î¶¯
6ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬×Ô 2022 Äê 2 Ô 24 ÈÕ¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ÒÔÀ´£¬£¬£¬£¬£¬£¬¸÷¹úÖ®¼äÒÔ¼°È«ÌìÏÂÖ®¼äµÄÖ÷ÒªÊ±ÊÆÒ»Ö±ºÜÑÏÖØ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñºó£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼¶Ôδ³¥Õ®ÎñµÄס»§ÊµÑéÁËÇýÖðºÍÖÕÖ¹¹«ÓÃÊÂҵЧÀ͵ĽûÁ£¬£¬£¬£¬£¬¸Ã½ûÁÓÚ2024Äê1Ô¿¢Ê¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬ÕâÒ»ÌØ×¼Ê±ÆÚÈ´±»Ò»ÃûÃûΪFlyingYetiµÄÍþвÐÐΪÕßËùʹÓᣡ£¡£¡£¡£¡£¸ÃÍþвÐÐΪÕßʹÓÃÎÚ¿ËÀ¼¹«Ãñ¶ÔδËÍ»¹Õ®ÎñºÍ¿ÉÄÜʧȥס·¿µÄ½¹ÂÇ£¬£¬£¬£¬£¬£¬¿ªÕ¹ÁËÒÔÕ®ÎñΪÖ÷ÌâµÄÍøÂç´¹Âڻ£¬£¬£¬£¬£¬£¬ÓÕÆÊܺ¦Õß½«¶ñÒâÈí¼þÎļþÏÂÔØµ½ËûÃǵÄϵͳÖС£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÊÇÒ»ÖÖ³ÆÎª¡°COOKBOX¡±µÄ PowerShell ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ËüʹÕâЩÍþвÐÐΪÕßÄܹ»×°ÖÃÌØÁíÍâÓÐÓÃÔØºÉ²¢¿ØÖÆÊܺ¦ÕßµÄϵͳ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÍøÂç´¹Âڻ»¹Ê¹ÓÃÁË GitHub ЧÀÍÆ÷ºÍ Cloudflare ÊÂÇéÆ÷ÒÔ¼° WinRAR Îó²î£¨CVE-2023-38831£©¡£¡£¡£¡£¡£¡£lyingYeti ÍþвÐÐΪÕߵĻÓë֮ǰȷ¶¨µÄÍþвÐÐΪÕß UAC-0149 ÓÐÖØµþ£¬£¬£¬£¬£¬£¬ºóÕßÔøÔÚ 2023 ÄêÇ^ʹÓÃÏàͬµÄ¶ñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼¹ú·ÀʵÌå¡£¡£¡£¡£¡£¡£2024 Äê 4 ÔÂÖÐÑ®ÖÁ 5 ÔÂÖÐѮʱ´ú£¬£¬£¬£¬£¬£¬¾ÝÊӲ죬£¬£¬£¬£¬£¬FlyingYeti ÍþвÐÐΪÕßÕýÔÚ¶ÔÊܺ¦Õß¾ÙÐÐÕì̽»î¶¯£¬£¬£¬£¬£¬£¬ÕâЩ»î¶¯ºÜ¿ÉÄÜÓÃÓÚÔ¶¨ÓÚ¸´Éú½Úʱ´úÌᳫµÄ»î¶¯¡£¡£¡£¡£¡£¡£
https://gbhackers.com/flyingyeti-winrar-vulnerability-malware-attacks/
5. LilacSquid ºÚ¿Í¹¥»÷ IT ÐÐÒµÒÔ»ñÈ¡ÉñÃØÊý¾Ý
6ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÃé×¼ IT ÐÐÒµ£¬£¬£¬£¬£¬£¬ÓÉÓÚÕâЩÐÐÒµÕÆÎÕ×ÅÃû¹óµÄÊý¾Ý¡¢Òªº¦µÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬²¢ÇÒͨ³£¿£¿ÉÒÔ»á¼û¸÷¸öÁìÓòµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£ÈëÇÖ IT ¹«Ë¾¿ÉÒÔΪºÚ¿ÍÌṩ¾ÙÐÐÌØ¹¤»î¶¯¡¢»ñÈ¡¾¼ÃÀûÒæÒÔ¼°ÆÆËð»ù±¾Ð§À͵ÄÖØ´óʱ»ú¡£¡£¡£¡£¡£¡£¿ËÈÕ£¬£¬£¬£¬£¬£¬Ë¼¿ÆTalosÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬LilacSquidºÚ¿ÍÒ»Ö±ÔÚÆð¾¢¹¥»÷ITÐÐÒµ£¬£¬£¬£¬£¬£¬ÒÔ»ñÈ¡ÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¡£Talos È·ÐÅ¡°LilacSquid¡± APT ×éÖ¯ÖÁÉÙ´Ó 2021 Äê×îÏȾÍÒ»Ö±ÔÚ¾ÙÐÐÊý¾ÝÇÔÈ¡»î¶¯£¬£¬£¬£¬£¬£¬ÀÖ³ÉÈëÇÖÁËÑÇÖÞ¡¢Å·ÖÞºÍÃÀ¹úµÄÖÆÒ©¡¢Ê¯ÓÍ¡¢×ÔÈ»ÆøºÍÊÖÒÕÐÐÒµµÄÄ¿µÄ ³õʼ»á¼ûʹÓÃÁËÎó²îºÍ±»µÁµÄ RDP ƾ֤¡£¡£¡£¡£¡£¡£ÈëÇֺ󣬣¬£¬£¬£¬£¬LilacSquid °²ÅÅÁË MeshAgent Ô¶³Ì»á¼û¹¤¾ß¡¢QuasarRAT µÄ¶¨ÖÆ¡°PurpleInk¡±±äÌåÒÔ¼° SSF µÈ¿ªÔ´ÊðÀí¹¤¾ß£¬£¬£¬£¬£¬£¬Óë Lazarus ºÍ Andariel µÈ³¯ÏÊ×éÖ¯µÄ TTP ÖØµþ¡£¡£¡£¡£¡£¡£¸Ã»î¶¯½¨ÉèÁËÊý¾Ýй¶µÄºã¾Ã»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬ÏÈǰµÄ¹©Ó¦Á´Îó²î͹ÏÔÁËÕâÖÖÒ»Á¬¡¢¸ß¼¶ÍþвµÄΣº¦¡£¡£¡£¡£¡£¡£ÈëÇֺ󣬣¬£¬£¬£¬£¬ËûÃÇʹÓà MeshAgent µÈ³ÌÐò¾ÙÐÐÔ¶³Ì»á¼û¡¢Ê¹Óà SSF ¾ÙÐÐÇå¾²ËíµÀÒÔ¼°Ê¹Óö¨ÖƶñÒâÈí¼þ InkLoader¡¢PurpleInk RAT µÈ¡£¡£¡£¡£¡£¡£
https://gbhackers.com/lilacsquid-hackers-attacking-it-industries/
6. Êý°ÙÃûÓ¢¹ú¡¢·¨¹úºÍÅ·ÃËÕþ¿ÍµÄÐÅÏ¢ÔÚÍøÉÏÐû²¼
5ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬¾ÝרעÓÚÒþ˽µÄ½â¾ö¼Æ»®ÌṩÉÌ Proton ³Æ£¬£¬£¬£¬£¬£¬Êý°ÙÃûÓ¢¹ú¡¢·¨¹úºÍÅ·ÖÞÒé»áÕþ¿ÍµÄµç×ÓÓʼþµØµãºÍÆäËûÐÅÏ¢¿ÉÒÔÔÚ°µÍøÊг¡ÉÏÕÒµ½¡£¡£¡£¡£¡£¡£×÷Ϊ Proton Óë Constella Intelligence ÏàÖú¿ªÕ¹µÄÒ»ÏîÑо¿µÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚ°µÍøÉÏËÑË÷Á˽ü 2,300 ¸öÊôÓÚÓ¢¹ú¡¢·¨¹úºÍÅ·ÖÞÒé¾Û»áÔ±µÄ¹Ù·½Õþ¸®µç×ÓÓʼþµØµã¡£¡£¡£¡£¡£¡£×ܹ²ÓÐ 918 ¸öµç×ÓÓʼþµØµã±»Ð¹Â¶µ½ÍøÂç·¸·¨Êг¡£¬£¬£¬£¬£¬£¬µ«Ã¿¸ö×éÖ¯ÊÜÓ°ÏìµÄÕþ¿Í±ÈÀýÓÐËù²î±ð¡£¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬£¬£¬Ó¢¹úÒéÔ±Êܵ½µÄÓ°Ïì×î´ó£¬£¬£¬£¬£¬£¬68% µÄÄ¿µÄµç×ÓÓʼþµØµã·ºÆðÔÚ°µÍøÉÏ¡£¡£¡£¡£¡£¡£¾ÍÅ·ÃËÒé¾Û»áÔ±¶øÑÔ£¬£¬£¬£¬£¬£¬44% µÄµç×ÓÓʼþµØµã±»Ðû²¼ÔÚºÚ¿ÍÂÛ̳ÉÏ¡£¡£¡£¡£¡£¡£Ö»ÓÐ 18% µÄ·¨¹úÒéÔ±ºÍ²ÎÒéÔ±µÄÊý¾Ý±»Ð¹Â¶¡£¡£¡£¡£¡£¡£¾ÍÓ¢¹úÕþ¿ÍµÄ°¸Àý¶øÑÔ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Õþ¸®¸ß²ãºÍ×èµ²ÅÉÈËÎ£¬£¬£¬£¬£¬ËûÃǵĵç×ÓÓʼþµØµãÔÚ°µÍøÉϱ»·¢Ã÷Áè¼Ý 2,100 ´Î¡£¡£¡£¡£¡£¡£ÔÚÐí¶àÇéÐÎÏ£¬£¬£¬£¬£¬£¬µç×ÓÓʼþµØµãÔÚÕþ¸®ÍøÕ¾ÉÏÊǹûÕæµÄ¡£¡£¡£¡£¡£¡£ÎÊÌâÔÚÓÚ£¬£¬£¬£¬£¬£¬µç×ÓÓʼþµØµã·ºÆðÔÚ°µÍøÊг¡ÉÏÅú×¢ÕâЩµØµãÔø±»ÓÃÀ´ÔÚÖÖÖÖµÚÈý·½ÔÚÏßЧÀÍÉϽ¨ÉèÕË»§£¬£¬£¬£¬£¬£¬¶øÕâЩЧÀÍÔÚij¸öʱ¼äÔâµ½Á˺ڿ͹¥»÷¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/information-of-hundreds-of-european-politicians-found-on-dark-web/