DICK¡®S ÔÚÔâ·êÍøÂç¹¥»÷ºó¹Ø¹Øµç×ÓÓʼþ²¢Ëø¶¨Ô±¹¤ÕË»§

°ä²¼¹¦·ò 2024-08-30
1. DICK'S ÔÚÔâ·êÍøÂç¹¥»÷ºó¹Ø¹Øµç×ÓÓʼþ²¢Ëø¶¨Ô±¹¤ÕË»§


8ÔÂ28ÈÕ£¬ÃÀ¹úÌåÓýÓÃÆ·ÁãÊÛ¾ÞÍ·µÏ¿ËÌåÓýÓÃÆ·¹«Ë¾£¨DICK'S£©½üÈÕÔâ·êÍøÂç¹¥»÷£¬µ¼ÖÂÆä»úÃÜÐÅϢй¶¡£Õâ¼ÒÕ¼ÓÐ857¼ÒÃŵꡢÄêÊÕÈë´ï129.8ÒÚÃÀÔªµÄ²Æ¸»500Ç¿ÆóÒµ£¬ÔÚ8ÔÂ21ÈÕ·¢ÏÔìäÐÅϢϵͳ±»µÚÈý·½Î´ÊÚȨ½Ó¼û¡£DICK'SѸ¿ìÆô¶¯ÍøÂ簲ȫÏìÓ¦´òË㣬²¢Óë±í²¿×¨¼ÒºÏ×÷µ÷²éÕâ´ÎÊÂÎñ£¬Í¬Ê±¹Ø¹ØÁ˵ç×ÓÓʼþϵͳ²¢Ëø¶¨ËùÓÐÔ±¹¤ÕË»§£¬ÒÔ¸ôÀëÍþв¡£Ô±¹¤Ðèͨ¹ýÉí·ÝÑéÖ¤ÄÜÁ¦³ÁнӼûÄÚ²¿ÏµÍ³£¬É̵êµç»°Ïß·ҲÊܵ½Ó°Ïì¡£Ö»¹Ü¹«Ë¾°µÊ¾Ä¿Ç°ÔËӪδÊÜ×ÌÈÅ£¬²¢ÒÑÏò·¨Âɲ¿ÃŻ㱨´ËÎ¥¹æÐÐΪ£¬µ«¾ßÌåй¶ϸ½ÚÉÐδ¹«¿ª¡£DICK'SÔÚÌá½»¸øÃÀ¹ú֤ȯÂòÂôίԱ»áµÄÎļþÖÐÇ¿µ÷£¬»ùÓÚµ±Ç°°ÑÎÕµÄÐÅÏ¢£¬Õâ´ÎÊÂÎñ±»ÒÔΪ²»×é³É³Á´óÓ°Ï죬µ«µ÷²éÈÔÔÚ½øÐÐÖС£


https://www.bleepingcomputer.com/news/security/dicks-shuts-down-email-locks-employee-accounts-after-cyberattack/


2. LummaC2бäÖÖÀûÓÃPowerShellÓë¸ß¼¶»ìºÏ¼¼ÊõÇÔÈ¡Êý¾Ý


8ÔÂ28ÈÕ£¬ÈðÊ¿ÍøÂ簲ȫ¹«Ë¾Ontinue½üÆÚ¸æ·¢ÁËLummaC2¶ñÒâÈí¼þµÄÒ»¸öбäÖÖ£¬Æä»î¶¯ÏÔÖø¼ÓÇ¿£¬¶ÔÍøÂ簲ȫ×é³ÉÑϳÁÍþв¡£Õâ¿î±äÖÖÀûÓÃPowerShell½øÐгõ²½Ï°È¾£¬½áºÏ»ìºÏ¼¼ÊõºÍ¹ý³Ì×¢È뼿Á©£¬ÇÄÎÞÉùÏ¢µØÇÔÈ¡Ãô¸ÐÊý¾Ý¡£LummaC2×Ô2022ÄêÆð±ãÒÔ¶ñÒâÈí¼þ¼´·þÎñ(MaaS)´ó¾Ö»î¶¯£¬½üÆÚ¸üÊÇͨ¹ý¸´ÔÓÕ½ÊõÉý¼¶£¬ÈçÀûÓÃÆÆ½âÈí¼þ¼°YouTubeÇþ·´«²¼£¬Õ¹Ê¾ÁËÆä¸ß¶ÈµÄÊÊÓ¦ÐÔºÍÒñ±ÎÐÔ¡£×îз¢ÏֵıäÖÖÖУ¬PowerShellºÅÁî¾­¹ý¾«ÐÄ»ìºÏµ«¿É½âÂ룬½ÒʾÁËÆäÏÂÔØ²¢Ö´Ðеڶþ½×¶ÎAES¼ÓÃܸºÔصľßÌå²½Öè¡£¸ºÔØËæºó×¢ÈëWindowsºÏ·¨¹ý³Ìdllhost.exe£¬ÒÔʵÏÖÔ¶³Ì½ÚÔì¡¢Êý¾ÝÇÔÈ¡¼°Óƾû¯Ï°È¾¡£¸Ã±äÖÖ»¹Ñ¡È¡IP°µ²Ø¡¢×Ô½ç˵Óû§´úÀíµÈ¼¿Á©£¬½øÒ»²½Ìӱܰ²È«¼ì²â¡£ÎªÓ¦¶Ô´ËÍþв£¬Ontinue½¨Òé×éÖ¯¼ÓÇ¿¶Ëµã¼ì²âºÍÏìÓ¦(EDR)²¿Êð£¬Ö´Ðй¥»÷ÃæÏ÷¼õ(ASR)Õ½Êõ£¬²¢¹Ø×¢Ìض¨µÄÍ×Эָ±ê(IOC)ÒÔ×Ô¶¯·ÀÓù¡£


https://hackread.com/lummac2-malware-variant-powershell-obfuscation-steal-data/


3. Mirai½©Ê¬ÍøÂçÀûÓÃAVTECH IPÉãÏñ»úÁãÈÕ·ì϶CVE-2024-7029


8ÔÂ28ÈÕ£¬AkamaiµÄ°²È«µý±¨ÏìÓ¦ÍŶӣ¨SIRT£©½üÈÕÖÒ¸æ³Æ£¬Mirai½©Ê¬ÍøÂç»î¶¯Õýͨ¹ýÀûÓÃAVTECH IPÉãÏñ»úÖеÄÐÂÅû¶ÁãÈÕ·ì϶CVE-2024-7029Ѹ¿ìÊæÕ¹¡£´ËRCE·ì϶´æÔÚÓÚÉãÏñ»úµÄ¡°ÁÁ¶È¡±Ö°ÄÜÖУ¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¬¹¥»÷ÕßÒѽè´Ë²¿ÊðÁËMiraiµÄ±äÖÖ¡°Corona¡±£¬¶Ô¹Ø¼ü»ù´¡ÉèÊ©×é³É³Á´óÍþв¡£Ö»¹ÜÊÜÓ°ÏìµÄÉãÏñÍ·ÐͺÅÒÑÍ£²ú£¬µ«ÆäÔÚ¶à¸öÁìÓòµÄ³ÖÐøÊ¹ÓÃ͹ÏÔÁËÖÎÀíÒÅÁôÉ豸ºÍ佨¸´·ì϶µÄ½ôÆÈÐÔ¡£CISAÒà°ä²¼»ã±¨Ç¿µ÷´Ë·ì϶µÄÑϳÁÐÔ¼°Æä¿í·ºÓ°ÏìDZÁ¦¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Mirai½©Ê¬ÍøÂç²»½öÀûÓÃCVE-2024-7029£¬»¹Í¬Ê±¶Ô×¼ÁËAVTECH¼°ÆäËûϵͳÖеĶà¸ö·ì϶£¬Õ¹Ê¾ÁËÆä¶àÑù»¯µÄ¹¥»÷Õ½Êõ¡£Corona±äÌåµÄ´«²¼Ê¼ÓÚ2023Äêµ×£¬²¢ÔÚ2024Äê3Ô´ﵽÁË»îÔ¾¶¥·å¡£Ö»¹ÜCVE-2024-7029µÄPoCÔçÔÚ2019Äê¾ÍÒѹ«¿ª£¬ÕýʽCVE±àºÅÖ±µ½2024Äê8Ô²Ű䲼¡£¼øÓÚµ±Ç°ÎÞ¹Ù·½²¹¶¡¿ÉÓã¬Akamai½¨Òéµ±¼´Í£ÓÃÊÜÓ°ÏìÉ豸×÷ΪÊ×Òª»º½â´ëÊ©¡£


https://securityonline.info/mirai-botnet-exploits-zero-day-vulnerability-cve-2024-7029-in-avtech-ip-cameras/


4. PerlÉçÇøÖҸ棺cpanminus¹¤¾ß´æÔÚÑϳÁ·ì϶CVE-2024-45321


8ÔÂ28ÈÕ£¬Perl ÉçÇø½üÆÚ°ä²¼Á˹ØÓÚCVE-2024-45321µÄ´¹Î£°²È«²¼¸æ£¬Ö¸³ö¿í·ºÊ¹ÓõÄApp::cpanminus£¨cpanm£©¹¤¾ß´æÔÚÑϳÁ·ì϶£¬ÆäCVSSÆÀ·Ö¸ß´ï9.8¡£´Ë·ì϶ԴÓÚcpanminusĬÈÏʹÓò»°²È«µÄHTTPÏνӴÓCPANÏÂÔØPerlÄ£¿é£¬µ¼Ö¡°Î´¾­ÆëÈ«ÐԲ鳭µÄ´úÂëÏÂÔØ¡±ÎÊÌ⣨CWE-494£©£¬Ê¹¹¥»÷ÕßÓлúÓöÔÚ´«ÊäÖд۸ĴúÂ룬½ø¶øÔÚÓû§ÏµÍ³ÉÏÖ´ÐжñÒâ´úÂë¡£¼øÓÚcpanminus×÷Ϊ¹Ù·½CPAN¿Í»§¶ËµÄÇáÁ¿¼¶´úÌæÆ·£¬Æä·ì϶ӰÏìÁìÓò¿ÉÄܼ«Îª¿í·º£¬ÓÈÆäÍþвµ½ÒÀÀµ¸Ã¹¤¾ßÖÎÀíPerlÄ£¿éµÄϵͳ°²È«¡£Ö»¹Ü¹Ù·½²¹¶¡ÉÐδ°ä²¼£¬µ«Óû§¸Ãµ±¼´²ÉÈ¡Ðж¯½µµÍ·çÏÕ¡£ÍƼö´ëÊ©Ô̺¬£ºÒ»ÊÇͨ¹ýºÅÁîÐвÎÊý»ò»·¾³±äÁ¿ÉèÖÃHTTPS¾µÏñ£¬µ«Ðè°ÑÎȴ˾ٿÉÄÜÏ޶ȶԾɰ汾ºÍ¿ª·¢°æ±¾µÄ½Ó¼û£»¶þÊÇÖ±½ÓÅú¸Äcpanm¿ÉÖ´ÐÐÎļþ£¬½«ËùÓÐHTTP¶Ëµã´úÌæÎªHTTPS£¬ÒÔ±£Áô¶ÔBackPanµÈ×ÊÔ´µÄ½Ó¼û£»ÈýÊÇת¶øÊ¹ÓÃĬÈÏÖ§³ÖHTTPSÏνӵı¸Óÿͻ§¶Ë£¬ÈçCPAN.pm 2.35+»òApp::cpm£¬ÒÔÈ·±£Ä£¿éÏÂÔØµÄ°²È«ÐÔ¡£


https://securityonline.info/critical-cve-2024-45321-flaw-in-popular-perl-module-installer-cpanminus-no-patch-available/


5. ÍþвÕßÀûÓÃαÔìµÄPalo Alto GlobalProtect¹¤¾ß¶Ô×¼Öж«


8ÔÂ29ÈÕ£¬Ç÷Ïò¿Æ¼¼×êÑÐÍŶӸ淢ÁËÒ»ÏîÕë¶ÔÖж«×éÖ¯µÄ¸ß¶È¸´ÔÓ¶ñÒâÈí¼þ»î¶¯£¬¸Ã»î¶¯Í¨¹ý¼Ù×°³ÉºÏ·¨µÄPalo Alto GlobalProtect VPN¿Í»§¶Ë½øÐд«²¼¡£¹¥»÷ʼÓÚÒ»¸öÃûΪ¡°setup.exe¡±µÄ¶ñÒâÎļþ£¬¸ÃÎļþ·ÂÕÕVPN×°Ö÷¨Ê½£¬ÔÚÊܺ¦ÕßϵͳÖв¿ÊðÐéα×é¼þ£¬²¢½èÖúÐÂ×¢²áµÄ¡°sharjahconnect¡±ÓòÃû¼Ù×°³ÉºÏ·¨VPNÃÅ»§£¬ÒÔ¼ÓÇ¿ºýŪÐÔ¡£´Ë¶ñÒâÈí¼þÀûÓÃInteractshÏîÄ¿½øÐÐÐűê²Ù×÷£¬Í¨¹ýDNSÒªÇóÓëC&C·þÎñÆ÷ͨѶ£¬ÒÔ¼à¿ØÏ°È¾¹ý³Ì²¢Ö´ÐжàÖÖ¶ñÒ⹤×÷£¬Ô̺¬Ö´ÐÐPowerShell¾ç±¾¡¢ÖÎÀí¹ý³Ì¡¢Êý¾ÝÇÔÈ¡Óë¼ÓÃÜͨѶ¡£Æä½Ã½ÝµÄºÅÁî½á¹¹Ê¹Æä¿ÉÄܽýÝÓ¦¶Ô·ÖÆç¹¥»÷ÐèÒª£¬Í¬Ê±Ñ¡È¡¸´ÔÓ¶ã±Ü¼¼ÊõÒÔÌӱܼì²â¡£Öж«¼°È«Çò×éÖ¯Ãæ¶ÔÑϸñÌôÕ½£¬ÐèÇ¿»¯¶Ëµã±£»¤¡¢¸üа²È«ºÍ̸£¬²¢¼ÓǿԱ¹¤°²È«½ÌÓýÓëÒâʶÌáÉý£¬ÒÔÓÐЧÕмܴËÀà¸ß¼¶Íþв¡£


https://www.trendmicro.com/en_us/research/24/h/threat-actors-target-middle-east-using-fake-tool.html


6. ÃÀ³¬130¼ÒÆóÒµÔâ´¹µö¹¥»÷£¬GRIT¸æ·¢¸´ÔÓVPN´¹µöȦÌ×


8ÔÂ29ÈÕ£¬GuidePoint ResearchºÍIntelligence Team£¨GRIT£©½üÆÚ¸æ·¢ÁËÒ»ÏîÕë¶ÔÓ¢ÓïʹÓÃÕߣ¬³ö¸ñÊÇÃÀ¹ú³¬¹ý130¼ÒÆóÒµµÄ¸´ÔÓ´¹µö¹¥»÷»î¶¯¡£×Ô2024Äê6ÔÂ26ÈÕÆð£¬¹¥»÷Õß×¢²áÁËÓëÖ¸±ê¹«Ë¾VPN·þÎñÀàËÆµÄ¸ß·ÂÓòÃû£¬²¢Í¨¹ýµç»°¼ÙÒâITÖ§³ÖÈËÔ±£¬ÒÔ½â¾öVPNµÇ¼ÎÊÌâΪÓÉ£¬ÓÕµ¼Ô±¹¤µã»÷º¬ÓжñÒâÁ´½ÓµÄ¶ÌÐÅ¡£ÕâЩÁ´½Óµ¼Ïò¾«ÐÄÉè¼ÆµÄ¼ÙVPNµÇÂ¼Ò³Ãæ£¬²»½ö±í¹ÛÉÏÓëÕæÊµÒ³ÃæÎÞÒ죬»¹Ô̺¬ÌØÔìµÄVPN×éÑ¡ÏÈç¡°TestVPN¡±ºÍ¡°RemoteVPN¡±£¬ÒÔ¼ÓÇ¿ºýŪÐÔ¡£¼´±ãÃæ¶Ô¶à³É·ÖÈÏÖ¤£¨MFA£©£¬¹¥»÷ÕßÒ²ÄÜͨ¹ýÓÕµ¼Óû§ºË×¼ÍÆËÍ֪ͨÀ´Èƹý°²È«·ÀÏߣ¬×îÖÕÆ­È¡Óû§Æ¾Ö¤¡£µÃÊÖºó£¬Óû§»á±»³Á¶¨ÏòÖÁºÏ·¨VPNÒ³Ãæ£¬²¢¿ÉÄܱ»ÒªÇóÔٴεǼ£¬´Ó¶øÇ¿»¯ÎÊÌâÒѽâ¾öµÄ¼ÙÏó¡£Ò»µ©»ñµÃVPN½Ó¼ûȨ£¬¹¥»÷ÕßËæ¼´·¢Õ¹ÍøÂçɨÃ裬ѰÕÒºáÏòÒÆ¶¯¡¢Óƾû¯¼°È¨ÏÞÌáÉýµÄ»úÓö¡£¿ÉÄÜÊܵ½ÍøÂç´¹µö¹¥»÷Ó°ÏìµÄÓû§Ó¦²é³­ÆäÈÕÖ¾£¬²é¿´´Óǰ 30 ÌìÄÚÀ´×Ô VPN ·ÖÅä IP µØÖ·µÄ¿ÉÒɻ¡£


https://cybernews.com/news/us-vpn-phishing-attack/