IvantiÖÒÑÔ³ÆÉÐÓÐÈý¸öCSAÁãÈÕÎó²îÕýÔÚ±»¹¥»÷ÕßʹÓÃ

Ðû²¼Ê±¼ä 2024-10-10

1. IvantiÖÒÑÔ³ÆÉÐÓÐÈý¸öCSAÁãÈÕÎó²îÕýÔÚ±»¹¥»÷ÕßʹÓÃ


10ÔÂ8ÈÕ£¬£¬ £¬£¬£¬£¬ÃÀ¹úITÈí¼þ¹«Ë¾Ivanti½üÆÚÐû²¼ÁËÇå¾²¸üУ¬£¬ £¬£¬£¬£¬Ö¼ÔÚÐÞ¸´Èý¸ö±»Æð¾¢Ê¹ÓõÄÐÂÐÍÔÆÐ§ÀÍ×°±¸£¨CSA£©ÁãÈÕÎó²î£¬£¬ £¬£¬£¬£¬ÕâЩÎó²î±àºÅΪCVE-2024-9379¡¢CVE-2024-9380ºÍCVE-2024-9381¡£¡£¡£¡£¹¥»÷Õß½«ÕâЩÎó²îÓë9Ô·ÝÒÑÐÞ²¹µÄÁíÒ»¸öCSAÁãÈÕÎó²î£¨CVE-2024-8963£©Á¬ÏµÊ¹Ó㬣¬ £¬£¬£¬£¬Í¨¹ýSQL×¢Èë¡¢ÏÂÁî×¢ÈëºÍ·¾¶±éÀúµÈÊֶΣ¬£¬ £¬£¬£¬£¬Ô¶³ÌÖ´ÐÐí§Òâ´úÂë²¢ÈÆ¹ýÇå¾²ÏÞÖÆ¡£¡£¡£¡£IvantiÖÒÑԳƣ¬£¬ £¬£¬£¬£¬ÔËÐÐCSA 4.6 patch 518¼°¸üÔç°æ±¾µÄ¿Í»§ÔÚÁ¬ÏµÕâЩÎó²îʱ¿ÉÄÜÒÑÔâµ½¹¥»÷£¬£¬ £¬£¬£¬£¬²¢½¨ÒéÊÜÓ°Ïì¿Í»§Éý¼¶µ½CSA 5.0.2°æ±¾ÒÔÖØÐÞ×°±¸¡£¡£¡£¡£Í¬Ê±£¬£¬ £¬£¬£¬£¬ÖÎÀíԱӦʹÓÃEDR»òÆäËûÇå¾²Èí¼þ¾¯±¨£¬£¬ £¬£¬£¬£¬ÒÔ¼°¼ì²éеĻòÐ޸ĺóµÄÖÎÀíÔ±Óû§À´¼ì²âÈëÇÖ¼£Ï󡣡£¡£¡£ÓÉÓÚCSA 4.6ÒÑÍ£²ú£¬£¬ £¬£¬£¬£¬ÈÔÔÚÔËÐд˰汾µÄ¿Í»§Ó¦¾¡¿ìÉý¼¶¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬CISAÒѽ«Ïà¹ØÎó²îÌí¼Óµ½ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖУ¬£¬ £¬£¬£¬£¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ10ÔÂ10ÈÕǰ±£»£»£»£»¤Ò×Êܹ¥»÷µÄϵͳ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ivanti-warns-of-three-more-csa-zero-days-exploited-in-attacks/


2. ¿¨Î÷Å·ÔâÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬Ð§ÀÍÖÐÖ¹²¢Òý·¢Êý¾Ýй¶µ£ÐÄ


10ÔÂ8ÈÕ£¬£¬ £¬£¬£¬£¬ÈÕ±¾¿Æ¼¼¾ÞÍ·¿¨Î÷Å·ÅÌËã»ú¹«Ë¾½üÆÚÔâÓöÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ£¬£¬ £¬£¬£¬£¬ÆäÍøÂ类δ¾­ÊÚȨµÄÐÐΪÕß»á¼û£¬£¬ £¬£¬£¬£¬µ¼ÖÂϵͳÖÐÖ¹£¬£¬ £¬£¬£¬£¬²¢Ó°ÏìÁ˲¿·ÖЧÀÍ¡£¡£¡£¡£¿£¿ £¿£¿£¿£¿¨Î÷Å·ÒÔÊÖ±í¡¢ÅÌËãÆ÷¡¢ÀÖÆ÷¡¢Ïà»úµÈµç×Ó²úÆ·ÖøÃû£¬£¬ £¬£¬£¬£¬´Ë´Î¹¥»÷¶ÔÆäÔì³ÉÁ˲»Ð¡µÄÓ°Ïì¡£¡£¡£¡£¿£¿ £¿£¿£¿£¿¨Î÷Å·ÔÚͨ¸æÖÐÈ·ÈÏÁË´Ë´ÎÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬²¢ÌåÏÖÕýÔÚÓëÍⲿר¼ÒÏàÖú£¬£¬ £¬£¬£¬£¬ÒÔÈ·¶¨ÊÇ·ñÓÐСÎÒ˽¼ÒÊý¾Ý»òÆäËûÉñÃØÐÅÏ¢±»µÁ¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬¸Ã¹«Ë¾Î´Í¸Â¶¸ü¶àϸ½Ú£¬£¬ £¬£¬£¬£¬Ò²Î´ËµÃ÷ЧÀÍÖÐÖ¹µÄÏêϸÄÚÈÝ¡£¡£¡£¡£¿£¿ £¿£¿£¿£¿¨Î÷Å·ÒÑÏòÊÊÓõÄÊý¾Ý±£»£»£»£»¤»ú¹¹±¨¸æÁË´ËÊÂÎñ£¬£¬ £¬£¬£¬£¬²¢½ÓÄÉÁËÏÞÖÆÍⲿְԱ»á¼ûµÄ²½·¥¡£¡£¡£¡£Ö»¹ÜÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬ £¬£¬£¬£¬µ«´Ë´ÎÊÂÎñ¶Ô¿¨Î÷Å·À´ËµÎÞÒÉÊÇÒ»´Î¹¥»÷¡£¡£¡£¡£Ô¼ÄªÒ»Äêǰ£¬£¬ £¬£¬£¬£¬¿¨Î÷Å·»¹ÔøÅû¶¹ýÁíÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬£¬Éæ¼°149¸ö¹ú¼ÒµÄ¿Í»§Êý¾Ý¡£¡£¡£¡£´Ë´Î×îеÄÍøÂçÇå¾²ÊÂÎñ±¬·¢ÔÚ¿¨Î÷Å·¼´½«Òò´ó¹æÄ£ÈËÊÂÖØ×é¶øÔâÊܽü5000ÍòÃÀÔª·Ç¾­³£ÐÔËðʧµÄ¼èÄÑʱ¿Ì£¬£¬ £¬£¬£¬£¬ÎÞÒɸø¸Ã¹«Ë¾´øÀ´Á˸ü´óµÄÌôÕ½¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/casio-reports-it-systems-failure-after-weekend-network-breach/


3. Awaken Likho APT×éÖ¯½ÓÄÉÐÂÕ½Êõ¹¥»÷¶íÂÞ˹»ú¹¹


10ÔÂ8ÈÕ£¬£¬ £¬£¬£¬£¬¿¨°Í˹»ùÑо¿Ö°Ô±Õ¹ÏÖÁËAwaken Likho APT×éÖ¯£¨ÓÖÃûCore Werewolf£©×Ô2021Äê7ÔÂÒÔÀ´Õë¶Ô¶íÂÞ˹Õþ¸®»ú¹¹ºÍ¹¤ÒµÆóÒµÌᳫµÄ×îй¥»÷¡£¡£¡£¡£¸Ã×éÖ¯ÔÚ2024Äê6ÔµÄй¥»÷ÖУ¬£¬ £¬£¬£¬£¬ÏÔÖø¸Ä±äÁËÆäÈí¼þºÍÊÖÒÕ£¬£¬ £¬£¬£¬£¬´ÓʹÓÃUltraVNCÄ£¿£¿ £¿£¿£¿£¿éתÏòʹÓÃÕýµ±µÄMeshCentralƽ̨ÊðÀíMeshAgent¡£¡£¡£¡£MeshCentral×÷ΪһÖÖ¿ªÔ´Ô¶³Ì×°±¸ÖÎÃ÷È·¾ö¼Æ»®£¬£¬ £¬£¬£¬£¬±»¹¥»÷Õß²»·¨Ê¹ÓÃÒÔ¿ØÖÆÊÜѬȾϵͳ£¬£¬ £¬£¬£¬£¬Õâһת±äÔöÌíÁ˹¥»÷µÄÒþ²ØÐÔºÍÄѶÈ¡£¡£¡£¡£¿£¿ £¿£¿£¿£¿¨°Í˹»ùÍŶӷ¢Ã÷£¬£¬ £¬£¬£¬£¬Awaken Likhoͨ¹ýÍøÂç´¹ÂÚµç×ÓÓʼþÈö²¥ÐÂÖ²Èë³ÌÐò£¬£¬ £¬£¬£¬£¬ÕâЩÓʼþʹÓÃ7-Zip½¨ÉèµÄSFXÃûÌ÷ַ¢£¬£¬ £¬£¬£¬£¬ÄÚº¬Î±×°³ÉÕýµ±ÏµÍ³Ð§ÀͺÍÏÂÁîÎļþµÄÓÕ¶ü¡£¡£¡£¡£Ö²Èë³ÌÐòÔËÐк󣬣¬ £¬£¬£¬£¬»áÆô¶¯MeshAgentºÍÒ»¸ö¸ß¶È»ìÏýµÄÏÂÁîÎļþ£¬£¬ £¬£¬£¬£¬Ö¼ÔÚʵÏÖ³¤ÆÚÐÔ¿ØÖÆ¡£¡£¡£¡£Í¨¹ý½¨ÉèÍýÏëʹÃü£¬£¬ £¬£¬£¬£¬¹¥»÷ÕßÈ·±£MeshAgentÄÜÖØÐÂÅþÁ¬µ½ÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬ £¬£¬£¬£¬¸ÃÅþÁ¬Í¨¹ýWebSocketЭÒ齨É裬£¬ £¬£¬£¬£¬²¢Ê¹ÓÃHTTPS¼ÓÃÜ¡£¡£¡£¡£Awaken LikhoµÄ´Ë´Î¹¥»÷»î¶¯ÓëÒÔÍùÒ»Ö£¬£¬ £¬£¬£¬£¬Ä¿µÄÈÔÊǶíÂÞ˹Õþ¸®»ú¹¹¡¢³Ð°üÉ̺͹¤ÒµÆóÒµ¡£¡£¡£¡£


https://securityonline.info/new-campaign-by-awaken-likho-apt-group-changes-in-software-and-techniques/


4. »¥ÁªÍøµµ°¸¹ÝÔâÊý¾Ýй¶£¬£¬ £¬£¬£¬£¬3100ÍòÓû§ÐÅÏ¢±»µÁ


10ÔÂ9ÈÕ£¬£¬ £¬£¬£¬£¬»¥ÁªÍøµµ°¸¹ÝµÄ¡°Wayback Machine¡±½üÆÚÔâÓöÁËÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£Ò»ÃûÍþвÐÐΪÕßÀÖ³ÉÈëÇÖ¸ÃÍøÕ¾£¬£¬ £¬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨3100ÍòÌõΨһ¼Í¼µÄÓû§Éí·ÝÑéÖ¤Êý¾Ý¿â£¬£¬ £¬£¬£¬£¬²¢Í¨¹ýJavaScript¾¯±¨Ïòarchive.orgµÄ»á¼ûÕßÐû¸æÁËÕâÒ»ÈëÇÖ¡£¡£¡£¡£¸Ã¾¯±¨»¹Ìá¼°ÁËTroy Hunt½¨ÉèµÄHave I Been Pwned£¨HIBP£©Êý¾Ýй¶֪ͨЧÀÍ£¬£¬ £¬£¬£¬£¬ÍþвÐÐΪÕßÒÑÓë¸ÃЧÀ͹²ÏíÁ˱»µÁÊý¾Ý¡£¡£¡£¡£±»µÁµÄÊý¾Ý¿âÃûΪ¡°ia_users.sql¡±£¬£¬ £¬£¬£¬£¬ÊÇÒ»¸ö6.4GBµÄSQLÎļþ£¬£¬ £¬£¬£¬£¬°üÀ¨×¢²á³ÉÔ±µÄÉí·ÝÑéÖ¤ÐÅÏ¢£¬£¬ £¬£¬£¬£¬Èçµç×ÓÓʼþµØµã¡¢ÆÁÄ»Ãû³Æ¡¢ÃÜÂë¸ü¸Äʱ¼ä´Á¡¢Bcrypt¹þÏ£ÃÜÂëµÈ¡£¡£¡£¡£¾ÝHIBPµÄÊ×´´È˺àÌØÍ¸Â¶£¬£¬ £¬£¬£¬£¬Êý¾Ý¿âÖÐÓÐ3100Íò¸öΨһµç×ÓÓʼþµØµã£¬£¬ £¬£¬£¬£¬ÆäÖÐÐí¶àÒѶ©ÔÄHIBPµÄÊý¾Ýй¶֪ͨЧÀÍ¡£¡£¡£¡£ÕâЩÊý¾Ý½«ºÜ¿ì±»Ìí¼Óµ½HIBPÖУ¬£¬ £¬£¬£¬£¬ÒÔ±ãÓû§¿ÉÒÔÅÌÎÊËûÃǵÄÊý¾ÝÊÇ·ñÔÚ´Ë´Îй¶Öб»Ð¹Â¶¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÍþвÐÐΪÕßÊÇÔõÑùÇÖÈ뻥ÁªÍøµµ°¸¹ÝµÄ£¬£¬ £¬£¬£¬£¬ÒÔ¼°ÊÇ·ñÓÐÆäËûÊý¾Ý±»µÁ¡£¡£¡£¡£¶ø¾ÍÔÚ½ñÌìÔçЩʱ¼ä£¬£¬ £¬£¬£¬£¬»¥ÁªÍøµµ°¸¹Ý»¹ÔâÊÜÁËDDoS¹¥»÷£¬£¬ £¬£¬£¬£¬BlackMetaºÚ¿Í×éÖ¯ÒÑÉù³Æ¶Ô´ËÈÏÕæ£¬£¬ £¬£¬£¬£¬²¢ÌåÏÖ½«¾ÙÐиü¶à¹¥»÷¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/internet-archive-hacked-data-breach-impacts-31-million-users/


5. Å·ÑǶà¹ú³¬2.8ÍòÈËÔâ¼ÓÃÜÇ®±ÒÇÔÈ¡¶ñÒâÈí¼þ¹¥»÷


10ÔÂ9ÈÕ£¬£¬ £¬£¬£¬£¬½üÆÚÒ»Æð´ó¹æÄ£¼ÓÃÜÇ®±ÒÇÔÈ¡¶ñÒâÈí¼þ»î¶¯Ó°ÏìÁ˶íÂÞ˹¡¢ÍÁ¶úÆä¡¢ÎÚ¿ËÀ¼¼°Å·ÑǵØÇøÆäËû¹ú¼ÒµÄÁè¼Ý28,000ÈË¡£¡£¡£¡£¸Ã»î¶¯Í¨¹ýαװ³ÉÕýµ±Èí¼þ£¬£¬ £¬£¬£¬£¬ÔÚYouTubeÊÓÆµºÍڲƭÐÔGitHub´æ´¢¿âÉϾÙÐÐÍÆ¹ã£¬£¬ £¬£¬£¬£¬ÓÕµ¼Êܺ¦ÕßÏÂÔØÊÜÃÜÂë±£»£»£»£»¤µÄµµ°¸²¢Æô¶¯Ñ¬È¾¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Dr. Web³Æ£¬£¬ £¬£¬£¬£¬¾ø´ó´ó¶¼Êܺ¦ÕßÊǶíÂÞ˹סÃñ£¬£¬ £¬£¬£¬£¬Í¬Ê±°×¶íÂÞ˹¡¢ÎÚ×ȱð¿Ë˹̹¡¢¹þÈø¿Ë˹̹¡¢ÎÚ¿ËÀ¼¡¢¼ª¶û¼ªË¹Ë¹Ì¹ºÍÍÁ¶úÆäÒ²·ºÆð´ó×ÚѬȾ¡£¡£¡£¡£¶ñÒâÈí¼þʹÓöàÖÖÊÖ¶ÎÓÕÆ­Óû§ÏÂÔØ£¬£¬ £¬£¬£¬£¬Ò»µ©Ñ¬È¾£¬£¬ £¬£¬£¬£¬»á¼ì²éµ÷ÊÔ¹¤¾ß¡¢ÌáÈ¡ËùÐèÎļþ¡¢ÐÞ¸ÄWindows×¢²á±íÒÔʵÏÖ³¤ÆÚÐÔ£¬£¬ £¬£¬£¬£¬²¢Ð®ÖÆÕýµ±µÄWindowsϵͳЧÀͺÍä¯ÀÀÆ÷¸üÐÂÀú³Ì¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬¶ñÒâÈí¼þ»¹»áÍøÂçϵͳÐÅÏ¢²¢Í¨¹ýTelegram»úеÈËÇÔÈ¡£¡£¡£¡£¬£¬ £¬£¬£¬£¬Í¶·ÅSilentCryptoMinerÍÚ¾ò¼ÓÃÜÇ®±Ò£¬£¬ £¬£¬£¬£¬ÒÔ¼°³äµ±¼ô¼­Æ÷¼àÊÓ²¢Ìæ»»Windows¼ôÌù°åÖеÄÇ®°üµØµã¡£¡£¡£¡£Dr. Web·¢Ã÷£¬£¬ £¬£¬£¬£¬½öClipper¾ÍÐ®ÖÆÁ˼ÛÖµ6,000ÃÀÔªµÄÉúÒâ¡£¡£¡£¡£Îª×èÖ¹²ÆÎñËðʧ£¬£¬ £¬£¬£¬£¬½¨Òé´Ó¹Ù·½ÍøÕ¾ÏÂÔØÈí¼þ£¬£¬ £¬£¬£¬£¬²¢ÉóÉ÷¿´´ýYouTube»òGitHubÉϵÄÁ´½Ó¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/cryptocurrency/crypto-stealing-malware-campaign-infects-28-000-people/


6. ÃÀ˾·¨²¿Óë΢ÈíÁªÊÖ²é»ñ°ÙÓà¶íÂÞ˹ºÚ¿ÍÍøÂç´¹ÂÚÍøÕ¾


10ÔÂ4ÈÕ£¬£¬ £¬£¬£¬£¬ÃÀ¹ú˾·¨²¿ºÍ΢ÈíÁªºÏÐж¯£¬£¬ £¬£¬£¬£¬Àֳɲé»ñÁË100¶à¸öÓɶíÂÞ˹ºÚ¿ÍÓÃÓÚÕë¶ÔÃÀ¹ú¾ÙÐÐÍøÂç´¹ÂڻµÄÍøÕ¾¡£¡£¡£¡£´Ë´ÎÐж¯Ö¼ÔÚ×èÖ¹¹ú¼ÒÖ§³ÖµÄÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬±£»£»£»£»¤ÃÀ¹úµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£±»²é·âµÄÓòÃûÓÉÃûΪCallisto GroupµÄ×é֯ʹÓ㬣¬ £¬£¬£¬£¬¸Ã×éÖ¯ÊǶíÂÞ˹Áª°îÇå¾²¾ÖÏÂÊôµÄÐж¯µ¥Î»£¬£¬ £¬£¬£¬£¬±»Ö¸¿Ø²ß»®Óã²æÊ½ÍøÂç´¹Âڻ£¬£¬ £¬£¬£¬£¬Ö¼ÔÚÓÕÆ­ÊÕ¼þÈËй¶µÇ¼ƾ֤£¬£¬ £¬£¬£¬£¬Î´¾­ÊÚȨ»á¼ûÕþ¸®ÊµÌåºÍÆäËû¸ß¼ÛֵĿµÄµÄÉñÃØÐÅÏ¢¡£¡£¡£¡£Î¢ÈíÔÚÐж¯ÖÐʩչÁËÒªº¦×÷Ó㬣¬ £¬£¬£¬£¬ÌáÆðÁËÃñÊÂËßËÏ£¬£¬ £¬£¬£¬£¬ÒªÇó²é·âÓëCallisto GroupÓйØÁªµÄ66¸öÓòÃû¡£¡£¡£¡£´Ë´ÎÐж¯²»µ«ÆÆËðÁËÏÖÓÐÔËÓªºÍ»ù´¡ÉèÊ©£¬£¬ £¬£¬£¬£¬»¹ÏòÍâ¹úµÐÊÖºÍÃÀ¹úº£ÄÚÃñÖÚ·¢³öÁËÃ÷È·µÄÐÅÏ¢£¬£¬ £¬£¬£¬£¬Åú×¢¶íÂÞ˹ÊÇÒ»¸öÕæÕýµÄÍøÂçÐж¯µÐÊÖ¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬´Ë´ÎÐж¯Ò²Õ¹Ê¾ÁËÕþ¸®ºÍ˽Ӫ²¿·ÖÖ®¼äÒ»Á¬ÏàÖúµÄÖ÷ÒªÐÔ£¬£¬ £¬£¬£¬£¬¿ÉÒÔÅäºÏ¸ü¿ìµØ×èÖ¹ÍøÂç·¸·¨¡£¡£¡£¡£


https://hackread.com/doj-microsoft-seize-russian-phishing-sites-target-us/