Èû¶ûάÑÇÕþ¸®Ê¹ÓøßͨÁãÈÕÎó²î°²ÅÅNoviSpyÌØ¹¤Èí¼þ
Ðû²¼Ê±¼ä 2024-12-181. Èû¶ûάÑÇÕþ¸®Ê¹ÓøßͨÁãÈÕÎó²î°²ÅÅNoviSpyÌØ¹¤Èí¼þ
12ÔÂ16ÈÕ£¬£¬£¬Èû¶ûάÑÇÕþ¸®±»ÆØÊ¹ÓøßͨÁãÈÕÎó²î£¬£¬£¬ÔÚAndroid×°±¸Éϰ²ÅÅÁËÒ»ÖÖÃûΪ¡°NoviSpy¡±µÄÐÂÌØ¹¤Èí¼þ£¬£¬£¬ÒÔ¼àÊÓ»î¸ÐÈËÊ¿¡¢¼ÇÕߺͿ¹ÒéÕß¡£¡£´Ë´Î¹¥»÷Éæ¼°µÄ¸ßͨÎó²îCVE-2024-43047µÈ£¬£¬£¬ÔÚ2024Äê10Ô±»Google Project Zero±ê¼ÇΪÁãÈÕÎó²î£¬£¬£¬²¢ÓÚ´ÎÔÂÔÚAndroidÉÏ»ñµÃÐÞ¸´¡£¡£¹ú¼ÊÌØÉâ×éÖ¯Ç徲ʵÑéÊÒÔÚÆÊÎöÒ»Ãû¼ÇÕßµÄÊÖ»úʱ·¢Ã÷Á˸ÃÌØ¹¤Èí¼þ¡£¡£¾Ý³Æ£¬£¬£¬Èû¶ûάÑÇÇå¾²ÐÅÏ¢¾ÖºÍ¾¯·½Ê¹ÓÃCellebrite½âËø¹¤¾ß£¬£¬£¬Í¨¹ý¸ßͨÁãÈÕÎó²î½âËøÁËAndroidÊÖ»ú£¬£¬£¬²¢°²ÅÅÁËNoviSpy¡£¡£¸ÃÌØ¹¤Èí¼þÓëÈû¶ûάÑÇÇå¾²»ú¹¹°ó¶¨µÄЧÀÍÆ÷ͨѶ£¬£¬£¬ÒÑ×°ÖÃÔÚÈû¶ûάÑÇÊýʮ̨ÉõÖÁÊý°Ų̀Android×°±¸ÉÏ¡£¡£¹È¸èµÄÍþвÆÊÎöС×éÓë¹ú¼ÊÌØÉâ×éÖ¯ÏàÖú£¬£¬£¬·¢Ã÷Á˸ßͨDSPÇý¶¯³ÌÐòÖеĶà¸öÎó²î£¬£¬£¬ÕâЩÎó²î¿ÉÄܱ»ÓÃÓÚÈÆ¹ýAndroidÇå¾²»úÖÆ²¢ÔÚÄں˼¶±ð×°ÖÃNoviSpy¡£¡£Ö»¹Ü¹È¸èÒÑÏò¸ßͨ±¨¸æÁËÕâЩÎÊÌ⣬£¬£¬µ«²¿·ÖÎó²îµÄ²¹¶¡ÉÐδÐû²¼¡£¡£¸ßͨÌåÏÖ£¬£¬£¬ÒÑÏò¿Í»§ÌṩÐÞ¸´³ÌÐò£¬£¬£¬²¢ÃãÀøÓû§Ó¦ÓÃÇå¾²¸üС£¡£
https://www.bleepingcomputer.com/news/security/new-android-novispy-spyware-linked-to-qualcomm-zero-day-bugs/
2. SRPÁª°îÐÅÓÃÏàÖúÉçÔâÍøÂç¹¥»÷£¬£¬£¬24ÍòÓû§ÐÅÏ¢Òɱ»µÁ
12ÔÂ16ÈÕ£¬£¬£¬SRPÁª°îÐÅÓÃÏàÖúÉç¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬£¬£¬Áè¼Ý240,742È˵ÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄܱ»µÁ¡£¡£SRPÁª°îÐÅÓÃÏàÖúÉ罨ÉèÓÚ1960Ä꣬£¬£¬×ܲ¿Î»ÓÚÄÏ¿¨ÂÞÀ´ÄÉÖݱ±°Â¹Å˹Ëþ£¬£¬£¬Îª×ôÖÎÑÇÖݺÍÄÏ¿¨ÂÞÀ´ÄÉÖÝÔ¼200,000ÃûСÎÒ˽¼ÒÌṩ½ðÈÚЧÀÍ¡£¡£¾Ý³Æ£¬£¬£¬¹¥»÷Õß×Ô2024Äê9ÔÂ5ÈÕÖÁ11ÔÂ4ÈÕʱ´ú»á¼ûÁËÆäϵͳ£¬£¬£¬²¢¿ÉÄÜ»ñÈ¡Á˰üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕºÅÂë¡¢Éç»á°ü¹ÜºÅÂëºÍ²ÆÎñÐÅÏ¢µÈÔÚÄÚµÄСÎÒ˽¼ÒÎļþ¡£¡£SRPÁª°îÐÅÓÃÏàÖúÉçÒÑÏòµÂ¿ËÈøË¹ÖݺÍÃåÒòÖݵÄ×ÜÉó²é³¤°ì¹«ÊÒ±¨¸æ´ËÊ£¬£¬£¬²¢Ïò¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢ËÍÊéÃæÍ¨Öª£¬£¬£¬ÌṩһÄêµÄÃâ·ÑÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ¡£¡£Ö»¹ÜÉÐδ·¢Ã÷ÐÅÏ¢±»ÀÄÓõÄÖ¤¾Ý£¬£¬£¬µ«ÏàÖúÉçÃãÀøÊÜÓ°ÏìÕßʹÓÃÌṩµÄÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£´Ë´ÎÍøÂç¹¥»÷¿ÉÄÜÓëÀÕË÷Èí¼þ×éÖ¯NitrogenÓйأ¬£¬£¬¸Ã×éÖ¯Éù³ÆÇÔÈ¡ÁËSRPÁª°îÐÅÓÃÏàÖúÉçÔ¼650GBµÄÊý¾Ý£¬£¬£¬²¢ÔÚÆä»ùÓÚTorµÄ×ßÂ©ÍøÕ¾ÉϳöÊÛ¡£¡£
https://www.securityweek.com/srp-federal-credit-union-ransomware-attack-impacts-240000/
3. CISAÖÒÑÔWindowsÄÚºËÎó²î¼°Adobe ColdFusionÎó²îÕý±»Æð¾¢Ê¹ÓÃ
12ÔÂ16ÈÕ£¬£¬£¬CISAÒÑÏòÃÀ¹úÁª°î»ú¹¹·¢³öÖÒÑÔ£¬£¬£¬ÒªÇóÌá·ÀÕë¶Ô¸ßÑÏÖØÐÔWindowsÄÚºËÎó²îCVE-2024-35250µÄÒ»Á¬¹¥»÷¡£¡£¸ÃÎó²îÓÉDEVCOREÑо¿ÍŶӷ¢Ã÷²¢Í¨¹ýÇ÷ÊÆ¿Æ¼¼µÄÁãÈÕÍýÏ뱨¸æ¸øÎ¢Èí£¬£¬£¬ÊÇÓÉÓÚ²»ÊÜÐÅÈεÄÖ¸Õë×÷·ÏÒýÓÃÈõµãÔì³ÉµÄ£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷ÕßÒÔµÍÖØÆ¯ºó»ñµÃSYSTEMȨÏÞ¡£¡£Î¢ÈíÔÚ6ÔÂÐû²¼Á˲¹¶¡£¬£¬£¬µ«ËĸöÔºóGitHubÉÏÐû²¼ÁË¿´·¨ÑéÖ¤Îó²î´úÂ룬£¬£¬Åú×¢¸ÃÎó²îÕýÔÚ±»Æð¾¢Ê¹Óᣡ£Í¬Ê±£¬£¬£¬CISA»¹Ìí¼ÓÁËÁíÒ»¸öÑÏÖØµÄAdobe ColdFusionÎó²îCVE-2024-20767£¬£¬£¬¸ÃÎó²îÓÉÓÚ»á¼û¿ØÖƲ»µ±µ¼Ö£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¶ÁȡϵͳºÍÆäËûÃô¸ÐÎļþ¡£¡£Áè¼Ý145,000̨ColdFusionЧÀÍÆ÷̻¶ÔÚ»¥ÁªÍøÉÏ£¬£¬£¬×é³ÉÖØ´óΣº¦¡£¡£CISA½«ÕâÁ½¸öÎó²îÌí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖУ¬£¬£¬²¢±ê¼ÇΪ±»Æð¾¢Ê¹Ó㬣¬£¬ÒªÇóÁª°î»ú¹¹ÔÚÈýÖÜÄÚ±£»£»£»£»£»¤ÆäÍøÂç¡£¡£Í¬Ê±£¬£¬£¬Ò²½¨Òé˽ÈË×éÖ¯ÓÅÏÈ»º½âÕâЩÎó²îÒÔ×èÖ¹ÕýÔÚ¾ÙÐеĹ¥»÷¡£¡£Î¢Èí¹ØÓÚCVE-2024-35250Ò°ÍâʹÓõĸü¶àÏêϸÐÅÏ¢ÉÐδ½ÒÏþ̸ÂÛ¡£¡£
https://www.bleepingcomputer.com/news/security/windows-kernel-bug-now-exploited-in-attacks-to-gain-system-privileges/
4. BitterÍøÂçÌØ¹¤×é֯ʹÓÃÐÂÐÍMiyaRAT¶ñÒâÈí¼þ¹¥»÷ÍÁ¶úÆä¹ú·À×éÖ¯
12ÔÂ17ÈÕ£¬£¬£¬ÍøÂçÌØ¹¤Íþв×éÖ¯Bitter±»·¢Ã÷ʹÓÃÐÂÐͶñÒâÈí¼þ¼Ò×åMiyaRAT¹¥»÷ÍÁ¶úÆä¹ú·À×éÖ¯¡£¡£MiyaRATÓëBitter֮ǰʹÓõÄWmRAT¶ñÒâÈí¼þÒ»Æð±»°²ÅÅ¡£¡£ProofpointÖ¸³ö£¬£¬£¬ÕâÖÖÐÂÐͶñÒâÈí¼þºÜ¿ÉÄÜÊÇÕë¶Ô¸ß¼ÛֵĿµÄµÄ£¬£¬£¬²¢ÇÒ½öÎÞÒⱻʹÓᣡ£Bitter×éÖ¯×Ô2013ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬Ö÷ÒªÕë¶ÔÑÇÖÞÕþ¸®ºÍÖ÷Òª×éÖ¯¡£¡£ËûÃÇÒÑÍùÔøÊ¹ÓÃMicrosoft OfficeÎó²îºÍð³äÍâ½»»ú¹¹¾ÙÐÐÍøÂç´¹ÂÚ¹¥»÷¡£¡£´Ë´ÎÍÁ¶úÆäµÄ¹¥»÷ʼÓÚÒ»·â°üÀ¨Íâ¹úͶ×ÊÏîÄ¿ÓÕ»óµÄµç×ÓÓʼþ£¬£¬£¬ÓʼþÖеÄRARѹËõÎļþ°üÀ¨ÁËαװ³ÉPDFµÄ¿ì½Ý·½·¨Îļþ£¬£¬£¬ÒÔ¼°Ç¶ÈëÔÚRARÎļþÖеı¸ÓÃÊý¾ÝÁ÷£¨ADS£©¡£¡£Ò»µ©ÊÕ¼þÈË·¿ªLNKÎļþ£¬£¬£¬¾Í»á´¥·¢Òþ²ØÔÚADSÖеÄPowerShell´úÂëÖ´ÐУ¬£¬£¬Í¬Ê±½¨ÉèÒ»¸öÍýÏëʹÃüÒÔ°´ÆÚÔËÐжñÒâÏÂÁî¡£¡£µ±WmRATÎÞ·¨ÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷½¨ÉèͨѶʱ£¬£¬£¬Bitter»áÏÂÔØMiyaRAT¡£¡£ÕâÁ½ÖÖ¶ñÒâÈí¼þ¶¼ÊÇC++Ô¶³Ì»á¼ûľÂí£¨RAT£©£¬£¬£¬ÌṩÊý¾Ýй¶¡¢Ô¶³Ì¿ØÖÆ¡¢ÆÁÄ»½ØÍ¼µÈ¹¦Ð§¡£¡£MiyaRATÔ½·¢ÍêÉÆ£¬£¬£¬¾ßÓиüÏȽøµÄÊý¾ÝºÍͨѶ¼ÓÃÜ¡£¡£
https://www.bleepingcomputer.com/news/security/bitter-cyberspies-target-defense-orgs-with-new-miyarat-malware/
5. LedgerÍøÂç´¹ÂÚÐÂȦÌ×£ºÎ±×°Êý¾Ýй¶ÇÔÈ¡»Ö¸´¶ÌÓï
12ÔÂ17ÈÕ£¬£¬£¬Ò»ÏîÕë¶ÔLedgerÓ²¼þ¼ÓÃÜÇ®±ÒÇ®°üµÄÍøÂç´¹ÂڻÕýÔÚËÁŰ¡£¡£¸Ã»î¶¯Í¨¹ýαװ³ÉÊý¾Ýй¶֪ͨµÄÓʼþ£¬£¬£¬ÓÕÆÓû§ÑéÖ¤Æä»Ö¸´¶ÌÓ£¬£¬½ø¶øÇÔÈ¡Óû§µÄ¼ÓÃÜÇ®±Ò¡£¡£LedgerÊÇÒ»¿îÓÃÓÚ´æ´¢¡¢ÖÎÀíºÍ³öÊÛ¼ÓÃÜÇ®±ÒµÄÓ²¼þÇ®°ü£¬£¬£¬Æä×ʽðÓÉ24×Ö¡¢12×Ö»ò18×ֵĻָ´¶ÌÓï±£»£»£»£»£»¤¡£¡£È»¶ø£¬£¬£¬¹¥»÷ÕßʹÓÃÓû§¶ÔÊý¾Ýй¶µÄµ£ÐÄ£¬£¬£¬·¢ËÍ¿´ËÆÀ´×ÔLedger¹Ù·½µÄ´¹ÂÚÓʼþ£¬£¬£¬ÒªÇóÓû§ÔÚ´¹ÂÚÒ³ÃæÉÏÑéÖ¤»Ö¸´¶ÌÓï¡£¡£ÕâЩÓʼþÏÖʵÉÏÊÇͨ¹ýSendGridµç×ÓÓʼþÓªÏúƽ̨·¢Ë͵쬣¬£¬´¹ÂÚÒ³ÃæÔòαװ³ÉLedgerÍøÕ¾£¬£¬£¬ÒªÇóÓû§ÊäÈë»Ö¸´¶ÌÓï¾ÙÐÐÇå¾²¼ì²é¡£¡£Ò»µ©Óû§ÊäÈ룬£¬£¬´¹ÂÚÒ³Ãæ¾Í»á½«ËùÓÐÊäÈëµÄ»Ö¸´¶ÌÓï·¢Ë͵½ÍøÕ¾ºó¶Ë´æ´¢£¬£¬£¬¹¥»÷Õß±ãÄÜÍêÈ«»á¼û²¢ÇÔÈ¡Óû§µÄ¼ÓÃÜÇ®±Ò×ʽ𡣡£Õë¶Ô´Ë»î¶¯£¬£¬£¬Ledger³ÖÓÐÕßÓ¦Ìá¸ßСÐÄ£¬£¬£¬ÇÐÎðÔÚÈκÎÓ¦ÓûòÍøÕ¾ÉÏÊäÈë»Ö¸´¶ÌÓï¡£¡£µ±Éæ¼°¼ÓÃÜÇ®±ÒºÍ½ðÈÚ×ʲúʱ£¬£¬£¬ÇëʼÖÕÔÚä¯ÀÀÆ÷ÖÐÊäÈëÒª»á¼ûµÄÓòÃû¡£¡£ÇëºöÂÔÈκÎÉù³ÆÀ´×ÔLedgerµÄµç×ÓÓʼþ£¬£¬£¬ÓÈÆäÊÇÉù³ÆÄúÊܵ½Êý¾Ýй¶ӰÏì»òÒªÇóÑéÖ¤»Ö¸´¶ÌÓïµÄÓʼþ¡£¡£
https://www.bleepingcomputer.com/news/security/new-fake-ledger-data-breach-emails-try-to-steal-crypto-wallets/
6. ˼¿ÆÊý¾ÝÔâй¶£º2.9GBÊý¾ÝÔÚBreach ForumsÆØ¹â
12ÔÂ16ÈÕ£¬£¬£¬ºÚ¿ÍÔÚBreach ForumsÉÏй¶ÁËÊôÓÚ˼¿Æ¹«Ë¾µÄ2.9GBÊý¾Ý£¬£¬£¬ÕâÊÇ4.5TBÊý¾Ý¼¯µÄÒ»²¿·Ö¡£¡£¾ÝºÚ¿ÍÉù³Æ£¬£¬£¬ÕâЩÊý¾ÝÊÇ˼¿ÆÔÚ2024Äê10ÔÂδ¾ÙÐÐÈκÎÃÜÂë±£»£»£»£»£»¤»òÇå¾²ÈÏÖ¤µÄÇéÐÎÏÂ̻¶µÄ¡£¡£´Ë´Îй¶ÊÂÎñÓÉÎÛÃûÕÑÖøµÄºÚ¿Í¼æÂÛ̳ËùÓÐÕßIntelBrokerÌᳫ£¬£¬£¬Ëû´ËÇ°ÔøÊÔͼ³öÊÛ°üÀ¨À´×ÔVerizon¡¢AT&TºÍMicrosoftµÈ¹«Ë¾µÄÃô¸ÐÐÅÏ¢ÔÚÄÚµÄÊý¾Ý¼¯¡£¡£Ë¼¿Æ¶Ô´ËÊÂ×÷³ö»ØÓ¦£¬£¬£¬·ñ¶¨Æä½¹µãϵͳÊܵ½¹¥»÷£¬£¬£¬²¢½«ÎÊÌâ¹é×ïÓÚÃæÏò¹«ÖÚµÄDevHub×ÊÔ´ÉèÖùýʧ¡£¡£È»¶ø£¬£¬£¬IntelBroker¼á³ÖÒÔΪÆäÔÚ10ÔÂ18ÈÕ֮ǰ¶¼¿ÉÒÔ»á¼ûÕâЩÊý¾Ý£¬£¬£¬²¢ÌṩÁËÖ¤¾ÝÀ´Ö¤ÊµÆäÖ÷ÕÅ¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨Ë¼¿Æ¶à¸öÖ÷Òª²úÆ·µÄÏà¹ØÐÅÏ¢£¬£¬£¬ÈçCisco ISE¡¢Cisco SASE¡¢Cisco WebexµÈ¡£¡£±ðµÄ£¬£¬£¬IntelBroker»¹Òò¶à´ÎÊý¾Ýй¶ÊÂÎñ¶ø×ÅÃû£¬£¬£¬°üÀ¨ÈëÇÖApple Inc.¡¢AMDÒÔ¼°Å·ÖÞÐ̾¯×éÖ¯µÈ¡£¡£´Ë´Îй¶ÊÂÎñÔÙ´ÎÌáÐѸ÷×éÖ¯Òª¼á³ÖÇ徲ʵ¼ù²¢±£»£»£»£»£»¤Ãô¸ÐÊý¾Ý£¬£¬£¬¶øÊ£ÓàµÄ4.5TBÊý¾Ý¼¯ÊÇ·ñ»á±»³öÊÛ¡¢Ð¹Â¶»ò½â¾öÈÔÓдýÊӲ졣¡£
https://hackread.com/hackers-leak-partial-cisco-data-4-5tb-exposed-records/