AIÓïÒôÌìÉúÆ÷ÀûÓ÷¨Ê½±»ÓÃÀ´Í¶·ÅGipy¶ñÒâÈí¼þ

°ä²¼¹¦·ò 2024-05-28
1. AIÓïÒôÌìÉúÆ÷ÀûÓ÷¨Ê½±»ÓÃÀ´Í¶·ÅGipy¶ñÒâÈí¼þ


5ÔÂ26ÈÕ£¬Gipy ÊÇ×î½ü·¢ÏÖµÄÒ»ÖÖÀûÓÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄ¹¥»÷»î¶¯£¬ËüÒԵ¹ú¡¢¶íÂÞ˹¡¢Î÷°àÑÀºĮ́ÍåµÄÓû§ÎªÖ¸±ê£¬²¢³ÐŵÌṩ AI ÓïÒôת»»ÀûÓ÷¨Ê½×÷ÎªÍøÂç´¹µöµö¶ü¡£¿¨°Í˹»ùµÄ×êÑÐÈËÔ±°µÊ¾£¬Gipy ¶ñÒâÈí¼þÓÚ 2023 ËêÊ׳õ´Î³öÏÖ£¬Ò»µ©½»¸¶£¬¹¥»÷Õß±ãÄܹ»ÇÔÈ¡Êý¾Ý¡¢ÍÚ¾ò¼ÓÃÜÇ®±Ò²¢ÔÚÊܺ¦ÕßµÄϵͳÉÏ×°ÖÃÆäËû¶ñÒâÈí¼þ¡£×êÑÐÈËÔ±Ú¹ÊͳÆ£¬ÔÚÕâÖÖÇé¿öÏ£¬ÍþвÐÐΪÕßÒԺϷ¨µÄÈËΪÖÇÄÜÓïÒôÅú¸ÄÀûÓ÷¨Ê½µÄ³ÐÅ·´ÒýÓÕÊܺ¦Õß¡£¿¨°Í»ùÍŶӲ¹³ä˵£¬Ò»µ©Óû§×°ÖøÃÀûÓ÷¨Ê½£¬ÀûÓ÷¨Ê½¾Í»áÆðÍ·°´³ÐŵÔËÐУ¬Í¬Ê±£¬Gipy ¶ñÒâÈí¼þÒ²»áÔÚºó¶ÜÔËÐС£


https://www.darkreading.com/threat-intelligence/ai-voice-generator-used-to-drop-gipy-malware


2. ÓÃÓÚ´«²¼ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÐéα AV ÍøÕ¾


5ÔÂ26ÈÕ£¬ÍþвÐÐΪÕßʹÓüÙ×°³É Avast¡¢Bitdefender ºÍ Malwarebytes ºÏ·¨·À²¡¶¾²úÆ·µÄÐéα AV ÍøÕ¾À´·Ö·¢¶ñÒâÈí¼þ¡£2024 Äê 4 ÔÂÖÐÑ®£¬Trellix ¸ß¼¶×êÑÐÖÐÐÄÍŶӵÄ×êÑÐÈËÔ±·¢ÏÖÁ˶à¸öÓÃÓÚ·Ö·¢ÐÅÏ¢ÇÔÈ¡·¨Ê½µÄÐéα AV ÍøÕ¾¡£ÕâЩ¶ñÒâÍøÕ¾ÍйÜÁ˸´ÔӵĶñÒâÎļþ£¬ÀýÈç APK¡¢EXE ºÍ Inno ×°ÖÃ×°Ö÷¨Ê½£¬Ô̺¬¼äµýºÍÇÔÈ¡·¨Ê½Ö°ÄÜ¡£ÕâЩÐéÎ±ÍøÕ¾¼Ù×°³É Avast¡¢Bitdefender ºÍ Malwarebytes µÄºÏ·¨·À²¡¶¾²úÆ·¡£ÍйܶñÒâÈí¼þµÄÍøÕ¾ÊÇ avast-securedownload.com (Avast.apk)¡¢bitdefender-app.com (setup-win-x86-x64.exe.zip)¡¢malwarebytes.pro (MBSetup.rar)¡£×¨¼Ò»¹·¢ÏÖÁËÒ»¸ö¼Ù×°³ÉºÏ·¨·¨Ê½ (AMCoreDat.exe) µÄ¶ñÒâ Trellix ¶þ½øÔìÎļþ¡£×êÑÐÈËÔ±²¢Î´½«ÕâЩ¹¥»÷¹é×ïÓÚÌØ¶¨µÄÍþвÐÐΪÕß¡£¸Ã»ã±¨»¹ÁгöÁËʹÓÃÐéα AV ÍøÕ¾½øÐеĹ¥»÷µÄ·çÏÕÖ¸±ê (IoC)¡£


https://securityaffairs.com/163673/cyber-crime/fake-av-websites-distribute-malware.html


3. ºÚ¿ÍÀûÓÃľÂí²¡¶¾¿Ë¡°æ¡°É¨À×Õß¡±¹¥»÷½ðÈÚ»ú¹¹


5ÔÂ26ÈÕ£¬ºÚ¿ÍÔÚÀûÓÃ΢Èí¾­µäÓÎϷɨÀ×µÄ Python ¿Ë¡´úÂëÀ´°µ²Ø¶ñÒâ¾ç±¾£¬ÒÔ¹¥»÷Å·ÖÞºÍÃÀ¹úµÄ½ðÈÚ»ú¹¹¡£ÎÚ¿ËÀ¼µÄ CSIRT-NBU ºÍ CERT-UA ½«ÕâЩ¹¥»÷¹é×ïÓÚÒ»¸ö±»×·×ÙΪ¡°UAC-0188¡±µÄÍþвÐÐΪÕߣ¬ËûʹÓúϷ¨´úÂëÀ´°µ²ØÏÂÔØºÍ×°Öà SuperOps RMM µÄ Python ¾ç±¾¡£Superops RMM ÊÇÒ»¿îºÏ·¨µÄÔ¶³ÌÖÎÀíÈí¼þ£¬¿ÉÈÃÔ¶³Ì²Î¼ÓÕßÖ±½Ó½Ó¼ûÊÜϰȾµÄϵͳ¡£CERT-UA »ã±¨³Æ £¬ÔÚ³õ´Î·¢ÏÖÕâ´Î¹¥»÷Ö®ºó½øÐеÄ×êÑÐÏÔʾ£¬Å·ÖÞºÍÃÀ¹úµÄ½ðÈںͱ£ÏÕ»ú¹¹ÖÐÖÁÉÙ´æÔÚÎåÆðÓÉÒ»ÑùÎļþÒý·¢µÄDZÔÚ·ì϶¡£


https://www.bleepingcomputer.com/news/security/hackers-phish-finance-orgs-using-trojanized-minesweeper-clone/


4. CERT-UA ÖÒ¸æÍþвÐÐΪÕß UAC-0006 ÌáÒéµÄ¶ñÒâÈí¼þ»î¶¯


5ÔÂ26ÈÕ£¬ÎÚ¿ËÀ¼ÍÆËã»úÓ¦¼±·´Ó³Ó××é (CERT-UA) ÖÒ¸æ³Æ£¬ÓëÒÔ¾­¼ÃΪÖ÷ÕŵÄÍþвÐÐΪÕßUAC-0006ÓйصÄÍøÂç¹¥»÷¼¤Ôö¡£UAC-0006 ×Ô 2013 ÄêÒÔÀ´Ò»Ïò»îÔ¾¡£ÍþвÐÐΪÕßרһÓÚÈëÇÖ¹ÜÕÊʦµÄÓ×ÎÒµçÄÔ£¨ÓÃÓÚÖ§³Ö½ðÈڻ£¬ÀýÈç½Ó¼ûÔ¶³ÌÒøÐÐϵͳ£©¡¢ÇÔȡƾ֤ÒÔ¼°½øÐÐδ¾­ÊÚȨµÄ×ʽð×ªÒÆ¡£µ±¾Öר¼Ò»ã±¨³Æ£¬×Ô 5 Ô 20 ÈÕÒÔÀ´£¬¸Ã×éÖ¯½øÐÐÁËÖÁÉÙÁ½´Î´ó¹æÄ£»î¶¯£¬ÍþвÐÐΪÕßÖ¼ÔÚͨ¹ýµç×ÓÓʼþ´«²¼SmokeLoader¶ñÒâÈí¼þ¡£SmokeLoader ³äÈÎÆäËû¶ñÒâÈí¼þµÄ¼ÓÔØÆ÷£¬Ò»µ©Ö´ÐУ¬Ëü¾Í»á½«¶ñÒâ´úÂë×¢È뵱ǰÔËÐÐµÄ Explorer ¹ý³Ì£¨explorer.exe£©£¬²¢½«ÁíÒ»¸öÓÐЧ¸ºÔØÏÂÔØµ½ÏµÍ³ÖС£


https://securityaffairs.com/163711/cyber-warfare-2/cert-ua-warns-uac-0006-massive-campaigns.html


5. ºÚ¿ÍÔÚ×î½üµÄ MITRE ÍøÂç¹¥»÷Öд´½¨¶ñÒâÐé¹¹»ú


5ÔÂ27ÈÕ£¬ºÚ¿Í×î½üÀûÓÃÁË MITRE µÄÍøÂç³¢ÊÔ¡¢×êÑкÍÐé¹¹»¯»·¾³ (NERVE) Öеķì϶¡£ËûÃÇʹÓöñÒâÐé¹¹»ú£¨VM£©À´Ìӱܼì²â²¢ÔÚÍøÂç¹¥»÷ÖÐά³ÖÓÆ¾ÃÐÔ¡£Õâ´Î¹¥»÷±»¹é×ïÓÚÒ»¸öÓëÖйúÓйصÄ×éÖ¯ UNC5221£¬Í¹ÏÔÁËÍøÂçÍþвÈÕÒæ¸´ÔÓ»¯£¬ÉõÖÁ¶¥¼¶ÍøÂ簲ȫ×éÖ¯ÔÚ·ÀÓùÕâЩÍþÐ²Ê±Ò²Ãæ¶ÔÌôÕ½¡£¸Ã·ì϶ʼÓÚ 2023 Äê 12 ÔÂÏÂÑ®£¬Æäʱ¹¥»÷ÕßÀûÓÃÁË Ivanti Connect Secure É豸ÖеÄÁ½¸öÁãÈÕ·ì϶£¬·ì϶±àºÅΪCVE-2023-46805ºÍCVE-2024-21887¡£ÕâЩ·ì϶ʹµÃºÚ¿Í¿ÉÄÜͨ¹ý»á»°½Ù³ÖÈÆ¹ý¶à³É·ÖÉí·ÝÑéÖ¤£¬´Ó¶ø»ñµÃ¶Ô MITRE µÄ NERVE »·¾³µÄδ¾­ÊÚȨµÄ½Ó¼û¡£2024 Äê 4 Ô·¢ÏÖÁË×î³õµÄÀûÓü£Ï󣬴Ùʹ MITRE ºÍµÚÈý·½Êý×Öȡ֤ÍŶӽøÐÐÁ˳¹µ×µÄµ÷²é¡£Ò»µ©½øÈë NERVE »·¾³£¬¹¥»÷Õ߾ͻáʹÓÃй¶µÄÖÎÀíԱʹ´¦½øÐкáÏòÒÆ¶¯£¬¶Ô×¼ VMware »ù´¡¼Ü¹¹¡£


https://gbhackers.com/rogue-vms-mitres-cyber-attack/


6. ˼¿ÆFIREPOWERÖÎÀíÖÐÐĸßΣ·ì϶CVE-2024-20360


5ÔÂ27ÈÕ£¬Ë¼¿Æ Firepower ÖÎÀíÖÐÐÄ (FMC) Èí¼þµÄ Web ÖÎÀí½çÃæÖдæÔÚÒ»¸ö·ì϶£¬¿ÉÄܵ¼Ö¾­¹ýÉí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¶ÔÊÜÓ°ÏìµÄϵͳ½øÐÐ SQL ×¢Èë¹¥»÷¡£´æÔÚ´Ë·ì϶µÄÔ­ÒòÊÇ Web ÖÎÀí½çÃæÃ»Óгä·ÖÑéÖ¤Óû§ÊäÈë¡£¹¥»÷ÕßÄܹ»Í¨¹ý¶ÔÀûÓ÷¨Ê½½øÐÐÉí·ÝÑéÖ¤²¢ÏòÊÜÓ°ÏìµÄϵͳ·¢Ë;«ÐÄÉè¼ÆµÄ SQL ²éÎÊÀ´ÀûÓô˷ì϶¡£³É¹¦ÀûÓô˷ì϶¿ÉÄÜÔÊÐí¹¥»÷Õß´ÓÊý¾Ý¿â»ñÈ¡ÈκÎÊý¾Ý£¬Ôڵײã²Ù×÷ϵͳÉÏÖ´ÐÐËÁÒâºÅÁ²¢½«È¨ÏÞÌáÉýµ½ root¡£ÒªÀûÓô˷ì϶£¬¹¥»÷ÕßÖÁÉÙ±ØÒªÖ»¶ÁÓû§Í´´¦¡£Ë¼¿Æ°µÊ¾£¬Ä¿Ç°ÉÐÎÞ½â¾ö´Ë·ì϶µÄ±äͨ²½Öè¡£¸Ã IT ¾ÞÍ·ÒÑÈ·ÈÏ£¬´Ë·ì϶²»»áÓ°Ïì×ÔÊÊÓ¦°²È«É豸 (ASA) Èí¼þ»ò Firepower Íþв·ÀÓù (FTD) Èí¼þ¡£


https://securityaffairs.com/163718/security/a-high-severity-vulnerability-affects-cisco-firepower-management-center.html