¹È¸è½¨¸´ÆäÔÆÆ½Ì¨Öпɰµ²Ø¶ñÒâÈí¼þµÄGhostToken·ì϶
°ä²¼¹¦·ò 2023-04-241¡¢¹È¸è½¨¸´ÆäÔÆÆ½Ì¨Öпɰµ²Ø¶ñÒâÈí¼þµÄGhostToken·ì϶
¾ÝýÌå4ÔÂ21ÈÕ±¨Â·£¬¹È¸èÔÆÆ½Ì¨(GCP)ÖдæÔÚÒ»¸öGhostToken·ì϶£¬¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâÀûÓøü¸ÄΪ²»Ë½¼ûÇÒ²»³Éɾ³ý¡£Astrix SecurityÓÚ2022Äê6Ô²¢Ïò¹È¸è»ã±¨ÁËÕâÒ»·ì϶£¬¹È¸èÔÚ2023Äê4Ô°䲼Á˲¹¶¡¡£×êÑÐÈËÔ±°µÊ¾£¬¸Ã·ì϶¿É±»¹¥»÷ÕßÓÃÀ´Í¨¹ý½«ÒÑÊÚȨµÄµÚÈý·½ÀûÓÃת»»Îª¶ñÒâľÂíÀûÓ㬴Ӷø»ñµÃÖ¸±êGoogleÕÊ»§µÄÓÀÔ¶ÇÒ²»³ÉÒÆ³ýµÄ½Ó¼ûȨÏÞ£¬¶øºóй¶ָ±êµÄÓ×ÎÒÊý¾Ý¡£Õâ¿ÉÄÜÔ̺¬´æ´¢ÔÚGmail¡¢Drive¡¢DocsºÍPhotosµÈ¹È¸èÀûÓÃÖеÄÊý¾Ý¡£
https://www.bleepingcomputer.com/news/security/ghosttoken-gcp-flaw-let-attackers-backdoor-google-accounts/
2¡¢SymantecÅû¶Õë¶ÔÅ·ÃÀ»ù´¡ÉèÊ©µÄX_Trader¹©¸øÁ´¹¥»÷
4ÔÂ21ÈÕ£¬SymantecÅû¶ÁËÕë¶ÔÅ·ÃÀ¹Ø¼ü»ù´¡ÉèÊ©×éÖ¯µÄX_Trader¹©¸øÁ´¹¥»÷¡£µ¼ÖÂÉϸöÔÂ3CX°²È«ÊÂÎñµÄX_TraderÈí¼þ¹©¸øÁ´¹¥»÷£¬»¹Ó°ÏìÁËλÓÚÃÀ¹úºÍÅ·ÖÞµÄÄÜÔ´ÁìÓòµÄÁ½¸ö¹Ø¼ü»ù´¡ÉèÊ©×éÖ¯¡£¹¥»÷ÕßʹÓÃľÂí»¯X_Trader×°Ö÷¨Ê½£¬½«VEILEDSIGNAL¶à½×¶ÎÄ£¿é»¯ºóÃÅ×°Öõ½Ö¸±êϵͳÉÏ¡£¸Ã¶ñÒâÈí¼þÄܹ»Ö´ÐжñÒâshellcode»ò½«Í¨Ñ¶Ä£¿é×¢ÈëÔÚ±»¹¥»÷ϵͳÉÏÔËÐеÄChrome¡¢Firefox»òEdge¹ý³Ì¡£³ý´ËÖ®±í£¬»¹ÓÐÁ½¸öÉæ¼°½ðÈÚÂòÂôµÄ×éÖ¯Ò²Ôâµ½¹¥»÷¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain
3¡¢Ç°CFPBÔ±¹¤½«³¬¹ý25ÍòÏû·ÑÕßµÄÐÅϢת·¢µ½Ó×ÎÒÓÊÏä
¾Ý4ÔÂ21ÈÕ±¨Â·£¬ÃÀ¹úÏû·ÑÕß½ðÈÚ±£»¤¾Ö(CFPB)Åû¶ÁËÒ»Â·Éæ¼°256000ÈËÐÅÏ¢µÄй¶ÊÂÎñ¡£CFPBµÄÔ±¹¤Ð¹Â©£¬ËûÃÇ·¢ÏÖһǰԱ¹¤ÓÃ14·â·ÖÆçµÄµç×ÓÓʼþ£¬½«Ô¼Äª25.6ÍòÃûÏû·ÑÕߵļͼºÍԼĪ50¼Ò»ú¹¹µÄ¼à¹ÜÐÅϢת·¢µ½Ó×ÎÒµç×ÓÓʼþÕË»§¡£ÕâÃûÔ±¹¤Òѱ»ÀÕÁîɾ³ýÕâЩµç×ÓÓʼþ²¢Ìṩ֤¾ÝÖ¤Ã÷ËüÃÇÒѱ»É¾³ý£¬µ«¹Ù·½Ö¤ÊµÕâ¸ÃÔ±¹¤ÉÐδ×ñÊØ¡£Ä¿Ç°£¬¸Ã»ú¹¹ÈÔÔÚµ÷²é´ËÊÂÎñ¡£
https://www.infosecurity-magazine.com/news/cfpb-employee-sends-consumers-data/
4¡¢ESET·¢ÏÖ¶þÊÖÊг¡ÖдóÁ¿ÆóÒµ¼¶ÍøÂçÉ豸Ô̺¬Ãô¸ÐÐÅÏ¢
¾ÝýÌå4ÔÂ23ÈÕ±¨Â·£¬¶þÊÖÊг¡ÉÏµÄÆóÒµ¼¶ÍøÂçÉ豸Ô̺¬¿É±»ºÚ¿ÍÓÃÀ´ÈëÇÔìóҵϵͳ»ò»ñÈ¡¿Í»§ÐÅÏ¢µÄÃô¸ÐÊý¾Ý¡£ESET×êÑÐÈËÔ±²É°ìÁË18̨¶þÊÖÖ÷Ìâ·ÓÉÆ÷£¬·¢ÏÔìäÖÐÒ»°ëÒÔÉÏÄÜÕý³£¹¤×÷µÄ·ÓÉÆ÷ÒÀÈ»Äܹ»½Ó¼ûÈ«ÊýÅäÖÃÊý¾Ý¡£Ò»Ð©Â·ÓÉÆ÷±£ÁôÁ˿ͻ§ÐÅÏ¢ºÍÔÊÐíµÚÈý·½Ïνӵ½ÍøÂçµÄÊý¾Ý£¬ÉõÖÁÔ̺¬×÷Ϊ¿ÉÐÅ·½Ïνӵ½ÆäËûÍøÂçµÄƾ֤¡£Æ¾¾Ý·ÓÉÆ÷ÖÐϸ½Ú£¬ÆäÖÐһЩ·ÓÉÆ÷´¦ÓÚÍйÜITÌṩÉ̵Ļ·¾³ÖУ¬»¹ÓÐһ̨ÉõÖÁÊôÓÚMSSP¡£×êÑÐÈËÔ±¶ÔÓÚÕâÖÖÇé¿öµÄ½¨ÒéÊÇ£¬ËãÕÊÉ豸ÉϵÄÃô¸ÐÊý¾Ý²¢½«Æä¸´Ôµ½³ö³§Ä¬ÈÏ״̬¡£
https://www.bleepingcomputer.com/news/security/hackers-can-breach-networks-using-data-on-resold-corporate-routers/
5¡¢Unit 42³ÆÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÁ¿³ÊÉÏÉýÇ÷Ïò
Unit 42ÔÚ4ÔÂ20ÈÕй©£¬ÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÁ¿³ÊÉÏÉýÇ÷Ïò¡£´Ó2022Äê11Ôµ½2023Äê4ÔÂÉÏÑ®£¬ÓëChatGPTÓйØÓòµÄÿÔÂ×¢²áÁ¿Ôö³¤ÁË910%£¬ÓйØÇÀ×¢ÓòÃûÔö³¤ÁË17818%¡£´Ë±í£¬Ã¿ÌìÓжà´ï118¸öÓëChatGPTÓйصĶñÒâURL±»¼ì²âµ½¡£×êÑз¢ÏÖ¶à¸öÊÔͼ¼ÙÒâOpenAI¹Ù·½ÍøÕ¾µÄ´¹µöURL¡£Í¨³££¬¹¥»÷Õ߻ᴴ½¨Ò»¸öÓëChatGPT¹ÙÍøºÜÏñµÄÐéÎ±ÍøÕ¾£¬¶øºóÓÕÆÓû§ÏÂÔØ¶ñÒâÈí¼þ»ò¹²ÏíÃô¸ÐÐÅÏ¢¡£
https://unit42.paloaltonetworks.com/chatgpt-scam-attacks-increasing/
6¡¢Fortinet°ä²¼¹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄ·ÖÎö»ã±¨
4ÔÂ20ÈÕ£¬Fortinet°ä²¼Á˹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄ·ÖÎö»ã±¨¡£¸Ã¹¤¾ßÓÉKodex¹«Ë¾¿ª·¢£¬Ðû³ÆÊÇÒ»¿î½ÌÓý¹¤¾ß¡£ÒÔÿÔÂ59ÃÀÔªµÄ¼ÛÖµÏúÊÛ£¬ÓµÓÐÆß¸ö¹¥»÷Ä£¿é£¬Ô̺¬ÀÕË÷Èí¼þ¡¢Í´´¦ÇÔÈ¡ºÍWindows Defender¡£×êÑÐÅú×¢£¬ºÚ¿ÍÔÚ»ý¼«µØ½«ÆäÓÃ×÷ÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£EvilExtractorµÄ¹¥»÷»î¶¯ÓÚ½ñÄê3ÔÂÏÔÖøÔö³¤£¬Í¨¹ý¼Ù×°³ÉÕË»§È·ÈÏÒªÇóµÄ´¹µöÓʼþ½øÐзַ¢£¬´óÎÞÊý±»¹¥»÷Ö¸±êλÓÚÅ·ÖÞºÍÃÀ¹ú¡£
https://www.fortinet.com/blog/threat-research/evil-extractor-all-in-one-stealer


¾©¹«Íø°²±¸11010802024551ºÅ