Öж«AIºô½ÐÖÐÐÄÆ½Ì¨Ôâ´ó¹æÄ£Êý¾Ýй¶ £¬£¬ £¬Ì»Â¶Çå¾²Òþ»¼

Ðû²¼Ê±¼ä 2024-10-12
1. Öж«AIºô½ÐÖÐÐÄÆ½Ì¨Ôâ´ó¹æÄ£Êý¾Ýй¶ £¬£¬ £¬Ì»Â¶Çå¾²Òþ»¼


10ÔÂ10ÈÕ £¬£¬ £¬Ò»´Î´ó¹æÄ£Êý¾Ýй¶ÊÂÎñÔÚÖж«µØÇøÆØ¹â £¬£¬ £¬É漰һСÎÒ˽¼Ò¹¤ÖÇÄܺô½ÐÖÐÐÄÆ½Ì¨ £¬£¬ £¬Áè¼Ý1020ÍòÌõ¶Ô»°¼Í¼±»µÁ¡£¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Resecurity³Æ £¬£¬ £¬´Ë´ÎÎó²îʹ¹¥»÷ÕßÄܹ»Î´¾­ÊÚȨ»á¼û¸Ãƽ̨µÄÖÎÀíÒDZí°å £¬£¬ £¬ÍøÂçÏûºÄÕß¡¢ÔËÓªÉ̺ÍAIÊðÀíÖ®¼äµÄ´ó×Ú»¥¶¯Êý¾Ý¡£¡£¡£¡£¡£ÕâЩÊý¾Ý¿ÉÄܱ»ÓÃÓڸ߼¶Ú²Æ­¡¢ÍøÂç´¹ÂÚÍýÏëºÍÆäËû¶ñÒâ»î¶¯ £¬£¬ £¬ÓÈÆäÊÇСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©µÄй¶ £¬£¬ £¬ÔöÌíÁËÄ£ÄâÕýµ±¿Í»§Ð§Àͽ»Á÷¾ÙÐÐڲƭµÄΣº¦¡£¡£¡£¡£¡£¸ÃÊÂÎñ͹ÏÔÁËÈ˹¤ÖÇÄÜÆ½Ì¨ÔÚÌá¸ßЧÂʵÄͬʱ £¬£¬ £¬Ò²´øÀ´ÁËÊý¾ÝÒþ˽µÄÖØ´óÍþв¡£¡£¡£¡£¡£ËäÈ»ÈëÇÖÒÑ»ñµÃ»º½â £¬£¬ £¬µ«ÈËÃǶԵÚÈý·½È˹¤ÖÇÄÜϵͳµÄÇå¾²ÐԺʹ¦Öóͷ£Ãô¸Ð¿Í»§Êý¾ÝµÄÄÜÁ¦ÌåÏÖµ£ÐÄ¡£¡£¡£¡£¡£ResecurityÇ¿µ÷ £¬£¬ £¬¶Ô»°Ê½AIƽ̨ÒѳÉΪ´óÐÍÆóÒµºÍÕþ¸®»ú¹¹ÏÖ´úIT¹©Ó¦Á´µÄÒªº¦ÒªËØ £¬£¬ £¬ÐèҪƽºâ¹Å°åÍøÂçÇå¾²²½·¥ºÍÕë¶ÔAIÏêϸÇéÐεÄרÃŲ½·¥À´±£»£»£»£»£»£»¤ËüÃÇ¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/10m-exposed-ai-call-center-hack/


2. APT29ºÚ¿Í´ó¹æÄ£¹¥»÷ZimbraºÍTeamCityЧÀÍÆ÷


10ÔÂ10ÈÕ £¬£¬ £¬ÃÀÓ¢ÍøÂç»ú¹¹½ñÈÕÁªºÏÖÒÑÔ³Æ £¬£¬ £¬Óë¶íÂÞ˹¶ÔÍâÇ鱨¾Ö(SVR)Ïà¹ØµÄAPT29ºÚ¿Í×éÖ¯ÕýÔÚ¡°´ó¹æÄ£¡±¹¥»÷È«Çò¹æÄ£ÄÚδ´ò²¹¶¡µÄZimbraºÍJetBrains TeamCityЧÀÍÆ÷¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ʹÓÃÁËCVE-2022-27924ºÍCVE-2023-42793Îó²î £¬£¬ £¬Ö¼ÔÚÇÔÈ¡µç×ÓÓʼþÕÊ»§Æ¾Ö¤ºÍ¾ÙÐÐÔ¶³Ì´úÂëÖ´ÐеȶñÒâ»î¶¯¡£¡£¡£¡£¡£SVRºÚ¿Í×éÖ¯ £¬£¬ £¬Ò²±»³ÆÎªCozy Bear¡¢Midnight BlizzardºÍDukes £¬£¬ £¬¶àÄêÀ´Ò»Ö±Õë¶ÔÃÀ¹úºÍÅ·ÖÞµÄÕþ¸®ºÍ˽ÈË×éÖ¯¡£¡£¡£¡£¡£´Ë´ÎÖÒÑÔÒªÇóÍøÂç·ÀÓùÕßÁ¬Ã¦ÐÞ²¹Ì»Â¶µÄЧÀÍÆ÷ £¬£¬ £¬²¢°²ÅÅÇå¾²²¹¶¡»ººÍ½â²½·¥ÒÔ±ÜÃâÇå¾²Îó²î¡£¡£¡£¡£¡£´Ëǰ £¬£¬ £¬APT29ºÚ¿ÍÒѲ߻®ÁËSolarWinds¹©Ó¦Á´¹¥»÷²¢¹¥ÆÆÁ˶à¸öÃÀ¹úÁª°î»ú¹¹ £¬£¬ £¬»¹ÈëÇÖÁ˱±Ô¼¹ú¼ÒµÄMicrosoft 365ÕË»§ºÍ΢Èí¸ß¹ÜµÈ¹«Ë¾µÄExchange OnlineÕË»§¡£¡£¡£¡£¡£ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÍøÂçÇå¾²Ö÷¹ÜÌåÏÖ £¬£¬ £¬ÕâÒ»»î¶¯¶ÔÕþ¸®ºÍ˽Ӫ²¿·Ö×é³ÉÁËÈ«ÇòÍþв £¬£¬ £¬ÐèÒª³¹µ×Éó²éÇå¾²¿ØÖƲ½·¥¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-uk-warn-of-russian-apt29-hackers-targeting-zimbra-teamcity-servers/


3. ºÚ¿ÍʹÓÃYouTubeƽ̨Èö²¥ÖØ´óµÄ¶ñÒâÈí¼þ


10ÔÂ10ÈÕ £¬£¬ £¬¿¨°Í˹»ù½üÆÚ·¢Ã÷ºÚ¿ÍƵÈÔʹÓÃYouTubeƽ̨Èö²¥ÖØ´ó¶ñÒâÈí¼þ¡£¡£¡£¡£¡£ºÚ¿Íͨ¹ýÐ®ÖÆÈÈÃÅÆµµÀαװ³Éԭʼ´´×÷Õß £¬£¬ £¬Ðû²¼¶ñÒâÁ´½Ó¶ÔÓû§ÊµÑéÕ©Æ­¡£¡£¡£¡£¡£2022ÄêºÚ¿ÍÔøÕë¶Ô¶íÂÞ˹Óû§ÊµÑé¼ÓÃÜÇ®±ÒÍÚ¾ò»î¶¯ £¬£¬ £¬Ê¹Óñ»Ð®ÖƵÄYouTubeÕË»§·Ö·¢Î±×°³ÉÊ¢ÐÐÓ¦ÓõĶñÒâÎļþ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶à½×¶Î¹¥»÷ÐòÁÐѬȾϵͳ £¬£¬ £¬½ÓÄÉÒþ²Ø¶ñÒâ´úÂë²¢¼á³ÖÊðÃûÓÐÓÃÐÔµÄÊÖÒÕ £¬£¬ £¬Ê¹ÓöàÖÖ»úÖÆ½¨É賤ÆÚÐÔ £¬£¬ £¬²¢ÊµÑéÖØ´óµÄ·ÀÓù¹æ±ÜÊÖÒÕÒþ²Ø¶ñÒâ×é¼þ¡£¡£¡£¡£¡£×îÖÕÓÐÓÃÔØºÉΪSilentCryptoMiner £¬£¬ £¬ÓÃÓÚÍÚ¾òÒþ˽¼ÓÃÜÇ®±Ò £¬£¬ £¬²¢ÍøÂçϵͳң²âÊý¾Ýͨ¹ýTelegram»úеÈËAPI´«Êä¡£¡£¡£¡£¡£±ðµÄ £¬£¬ £¬¸Ã¶ñÒâ»î¶¯»¹Õë¶ÔÀ´×Ô°×¶íÂÞ˹¡¢Ó¡¶ÈµÈ¶à¸ö¹ú¼ÒµÄÓû§ £¬£¬ £¬ÕâЩÓû§Òò³£½ûÓÃAV¹¤¾ß±£»£»£»£»£»£»¤ºÍÇå¾²²½·¥¶øÒ×Êܹ¥»÷¡£¡£¡£¡£¡£¸Ã¹¥»÷µÄÖØ´óÐÔÌåÏÖÔÚÄ£¿£¿é»¯½á¹¹ÉÏ £¬£¬ £¬¿Éƾ֤ĿµÄ¶¯Ì¬¼ÓÔØ²î±ðÓÐÓÃÔØºÉ×é¼þ £¬£¬ £¬½ÓÄÉÏȽø»ìÏýÒªÁìºÍ·´ÆÊÎö¹¦Ð§¼á³ÖÒþ²ØÐÔ £¬£¬ £¬ÈÚÈëÖØ´óµÄÆóÒµ¼¶¹¥»÷ÊÖÒÕ¡£¡£¡£¡£¡£


https://cybersecuritynews.com/hackers-using-youtube-videos-to-deliver-sophisticated-malware/


4. LynxÀÕË÷Èí¼þ£ºINCÀÕË÷Èí¼þµÄбäÖÖÓëË«ÖØÀÕË÷Íþв


10ÔÂ11ÈÕ £¬£¬ £¬Palo Alto Networks ½üÆÚ·¢Ã÷ÁËÒ»ÖÖÃûΪ¡°Lynx¡±µÄÐÂÀÕË÷Èí¼þ £¬£¬ £¬ËüÏÖʵÉÏÊǶÔ2023Äê8Ô·ºÆðµÄINCÀÕË÷Èí¼þµÄ¸üÃû £¬£¬ £¬Á½Õß´úÂëÏàËÆ¶È¸ß´ï48% £¬£¬ £¬ÇÒÔ¼70.8%µÄ½¹µã¹¦Ð§±»Öظ´Ê¹Óᣡ£¡£¡£¡£LynxÀÕË÷Èí¼þÖ÷ÒªÕë¶ÔÃÀ¹úºÍÓ¢¹ú¸÷ÐÐÒµ×éÖ¯ £¬£¬ £¬°üÀ¨ÁãÊÛ¡¢·¿µØ²ú¡¢ÐÞ½¨ºÍ½ðÈÚЧÀÍµÈ £¬£¬ £¬ÒÔÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©ÐÎʽ¹©ÆäËûÍøÂç·¸·¨·Ö×ÓʹÓᣡ£¡£¡£¡£Æä×îΣÏյķ½ÃæÖ®Ò»ÊÇʵÑéË«ÖØÀÕË÷Õ½ÂÔ £¬£¬ £¬¼´ÔÚ¼ÓÃÜÎļþǰÇÔÈ¡Êܺ¦ÕßÊý¾Ý £¬£¬ £¬Èô²»Ö§¸¶Êê½ð £¬£¬ £¬Ôò¿ÉÄÜй¶»ò³öÊÛÕâЩÊý¾Ý¡£¡£¡£¡£¡£LynxÀÕË÷Èí¼þÉù³ÆÒÑÈëÇÖ¶à¼Ò¹«Ë¾ £¬£¬ £¬²¢ÔÚ¹«¹²ÍøÕ¾ÉÏչʾ±»µÁÊý¾Ý £¬£¬ £¬Ö»¹ÜÉù³Æ±Ü¿ªÁËÕþ¸®»ú¹¹¡¢Ò½ÔººÍ·ÇÓªÀû×éÖ¯ £¬£¬ £¬µ«Æä¹¥»÷ÈÔ¶ÔÐí¶àÐÐÒµ×é³ÉÖØ´óÍþв¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þʹÓø߼¶¼ÓÃÜËã·¨ £¬£¬ £¬ÈçAES-128ºÍCurve25519 Donna £¬£¬ £¬½âÃÜÄѶȼ«´ó £¬£¬ £¬ÇÒרÃÅÕë¶ÔWindowsϵͳ £¬£¬ £¬Ê¹ÓÃRestart Manager APIÌá¸ß¼ÓÃÜЧÂÊ¡£¡£¡£¡£¡£±ðµÄ £¬£¬ £¬LynxÀÕË÷Èí¼þÉè¼ÆÎÞа £¬£¬ £¬ÔÊÐí¹¥»÷Õßͨ¹ýÏÂÁîÐвÎÊý×Ô½ç˵ִÐÐ £¬£¬ £¬ÒÔÖª×ãÌØ¶¨ÐèÇ󡣡£¡£¡£¡£


https://securityonline.info/lynx-ransomware-the-evolution-of-inc-ransomware-into-a-potent-cyber-threat/


5. CISAÖÒÑÔ£ºÎ´¼ÓÃÜF5 BIG-IP Cookie±»ÀÄÓþÙÐÐÍøÂç¹¥»÷


10ÔÂ11ÈÕ £¬£¬ £¬CISA·¢³öÖÒÑÔ £¬£¬ £¬Ö¸³öÍøÂçÍþвÐÐΪÕßÕýÔÚÀÄÓÃδ¼ÓÃܵÄF5 BIG-IP³¤ÆÚcookieÀ´Ê¶±ðºÍ¶¨Î»Ä¿µÄÍøÂçÉÏµÄÆäËûÄÚ²¿×°±¸¡£¡£¡£¡£¡£ËûÃÇͨ¹ý»æÖÆÄÚ²¿×°±¸Í¼ £¬£¬ £¬ÔÚÍøÂç¹¥»÷µÄÍýÏë½×¶Îʶ±ðÒ×Êܹ¥»÷µÄ×°±¸¡£¡£¡£¡£¡£F5 BIG-IPÊÇÒ»Ì×Ó¦ÓóÌÐò½»¸¶ºÍÁ÷Á¿ÖÎÀí¹¤¾ß £¬£¬ £¬ÆäÍâµØÁ÷Á¿ÖÎÀíÆ÷£¨LTM£©Ä£¿£¿éʹÓó¤ÆÚcookieÀ´Î¬³Ö»á»°Ò»ÖÂÐÔ £¬£¬ £¬µ«ÕâЩcookieĬÈÏδ¼ÓÃÜ¡£¡£¡£¡£¡£´Ó11.5.0°æ×îÏÈ £¬£¬ £¬ÖÎÀíÔ±¿ÉÑ¡ÔñÇ¿ÖÆ¶ÔËùÓÐcookie¾ÙÐмÓÃÜ £¬£¬ £¬µ«Ñ¡Ôñ²»ÆôÓõÄÓû§½«ÃæÁÙÇ徲Σº¦¡£¡£¡£¡£¡£ÕâЩcookie°üÀ¨±àÂëµÄIPµØµã¡¢¶Ë¿ÚºÅºÍÄÚ²¿¸ºÔØÆ½ºâЧÀÍÆ÷µÄÉèÖà £¬£¬ £¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¶àÄêǰÒÑ·ÖÏíÔõÑùʹÓÃδ¼ÓÃܵÄcookieÀ´²éÕÒÒþ²ØµÄÄÚ²¿Ð§ÀÍÆ÷¡£¡£¡£¡£¡£CISA½¨ÒéF5 BIG-IPÖÎÀíÔ±Éó²é¹©Ó¦É̹ØÓÚÔõÑù¼ÓÃÜÕâЩ³¤ÆÚcookieµÄ˵Ã÷ £¬£¬ £¬²¢Ö¸³öF5ÒÑ¿ª·¢³öÒ»ÖÖÃûΪ¡°BIG-IP iHealth¡±µÄÕï¶Ï¹¤¾ß £¬£¬ £¬ÓÃÓÚ¼ì²â²úÆ·µÄ¹ýʧÉèÖò¢ÏòÖÎÀíÔ±·¢³öÖÒÑÔ¡£¡£¡£¡£¡£µ±ÉèÖÃΪ¡°±ØÐ衱ʱ £¬£¬ £¬ËùÓг¤ÆÚÐÔcookie¶¼Ê¹ÓÃÇ¿AES-192¼ÓÃܾÙÐмÓÃÜ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-hackers-abuse-f5-big-ip-cookies-to-map-internal-servers/


6. Mozilla½ôÆÈÐû²¼FirefoxÇå¾²¸üР£¬£¬ £¬ÐÞ¸´ÑÏÖØÎó²îCVE-2024-9680


10ÔÂ11ÈÕ £¬£¬ £¬MozillaΪÆäFirefoxä¯ÀÀÆ÷Ðû²¼Á˽ôÆÈÇå¾²¸üР£¬£¬ £¬ÒÔ½â¾öÒ»¸ö±»ÆÕ±éʹÓõÄÑÏÖØÎó²î £¬£¬ £¬¸ÃÎó²î±»×·×ÙΪCVE-2024-9680 £¬£¬ £¬CVSSÆÀ·ÖΪ9.8 £¬£¬ £¬¿ÉÄÜÔÊÐí¹¥»÷ÕßÔÚÓû§ÏµÍ³ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£Îó²îλÓÚFirefoxµÄ¶¯»­Ê±¼äÖá×é¼þÖÐ £¬£¬ £¬ÊÇWeb Animations APIµÄÒ»ÖÖ»úÖÆ £¬£¬ £¬ÏêϸΪÊͷźóʹÓÃÎó²î £¬£¬ £¬¿Éµ¼ÖÂÄÚ´æË𻵡£¡£¡£¡£¡£MozillaÔÚÊÕµ½·´²¡¶¾¹«Ë¾ESETµÄÖÒÑÔºó £¬£¬ £¬Ñ¸ËÙÕÙ¼¯ÍŶӶÔÎó²î¾ÙÐÐÄæÏò¹¤³Ì £¬£¬ £¬²¢ÔÚ25СʱÄÚ¿ª·¢²¢Ðû²¼ÁËÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£ÐÞ²¹µÄ°æ±¾°üÀ¨Firefox 131.0.2µÈ¶à¸ö°æ±¾¡£¡£¡£¡£¡£±ðµÄ £¬£¬ £¬MozillaÒÑÈ·ÈϸÃÎó²îÕýÔÚ±»Æð¾¢Ê¹ÓÃÀ´¹¥»÷Torä¯ÀÀÆ÷Óû§ £¬£¬ £¬µ«¹ØÓÚ¹¥»÷µÄÏêϸϸ½ÚÈÔ²»µÃ¶øÖª¡£¡£¡£¡£¡£Òò´Ë £¬£¬ £¬Óû§Ó¦Á¬Ã¦¸üÐÂÖÁ×îа汾µÄFirefoxÒÔ±£»£»£»£»£»£»¤×Ô¼ºµÄϵͳÇå¾²¡£¡£¡£¡£¡£


https://securityonline.info/mozilla-confirms-active-attacks-on-tor-browser-via-firefox-vulnerability/