Öж«AIºô½ÐÖÐÐÄÆ½Ì¨Ôâ´ó¹æÄ£Êý¾Ýй¶£¬Â¶³ö°²È«Òþ»¼
°ä²¼¹¦·ò 2024-10-1210ÔÂ10ÈÕ£¬Ò»´Î´ó¹æÄ£Êý¾Ýй¶ÊÂÎñÔÚÖж«µØÓòÆØ¹â£¬Éæ¼°Ò»Ó×ÎÒ¹¤ÖÇÄܺô½ÐÖÐÐÄÆ½Ì¨£¬³¬¹ý1020ÍòÌõ¶Ô»°¼Í¼±»µÁ¡£¾ÝÍøÂ簲ȫ¹«Ë¾Resecurity³Æ£¬Õâ´Î·ì϶ʹ¹¥»÷Õß¿ÉÄÜδ¾ÊÚȨ½Ó¼û¸Ãƽ̨µÄÖÎÀíÒDZí°å£¬ÍøÂçÏû·ÑÕß¡¢ÔËÓªÉ̺ÍAI´úÀíÖ®¼äµÄ´óÁ¿»¥¶¯Êý¾Ý¡£ÕâЩÊý¾Ý¿ÉÄܱ»ÓÃÓڸ߼¶Ú²Æ¡¢ÍøÂç´¹µö´òËãºÍÆäËû¶ñÒâ»î¶¯£¬ÓÈÆäÊÇÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©µÄй¶£¬Ôö³¤ÁË·ÂÕպϷ¨¿Í»§·þÎñ»¥»»½øÐÐڲƵķçÏÕ¡£¸ÃÊÂÎñ͹ÏÔÁËÈËΪÖÇÄÜÆ½Ì¨ÔÚÌá¸ßЧÄܵÄͬʱ£¬Ò²´øÀ´ÁËÊý¾ÝÒþÖԵijÁ´óÍþв¡£¹ÌÈ»ÈëÇÖÒѵõ½»º½â£¬µ«ÈËÃǶԵÚÈý·½ÈËΪÖÇÄÜϵͳµÄ°²È«ÐԺʹ¦ÖÃÃô¸Ð¿Í»§Êý¾ÝµÄÄÜÁ¦°µÊ¾ÓÇÓô¡£ResecurityÇ¿µ÷£¬¶Ô»°Ê½AIƽ̨ÒѳÉΪ´óÐÍÆóÒµºÍµ±¾Ö»ú¹¹ÏÖ´úIT¹©¸øÁ´µÄ¹Ø¼üÉí·Ö£¬±ØÒªÆ½ºâ´«Í³ÍøÂ簲ȫ´ëÊ©ºÍÕë¶ÔAI¾ßÌåÇé¿öµÄרÃÅ´ëÊ©À´±£»¤ËüÃÇ¡£
https://www.infosecurity-magazine.com/news/10m-exposed-ai-call-center-hack/
2. APT29ºÚ¿Í´ó¹æÄ£¹¥»÷ZimbraºÍTeamCity·þÎñÆ÷
10ÔÂ10ÈÕ£¬ÃÀÓ¢ÍøÂç»ú¹¹½ñÈÕ½áºÏÖÒ¸æ³Æ£¬Óë¶íÂÞ˹¶Ô±íµý±¨¾Ö(SVR)ÓйصÄAPT29ºÚ¿Í×éÖ¯ÔÚ¡°´ó¹æÄ£¡±¹¥»÷È«ÇòÁìÓòÄÚδ´ò²¹¶¡µÄZimbraºÍJetBrains TeamCity·þÎñÆ÷¡£ÕâЩ¹¥»÷ÀûÓÃÁËCVE-2022-27924ºÍCVE-2023-42793·ì϶£¬Ö¼ÔÚÇÔÈ¡µç×ÓÓʼþÕÊ»§Í´´¦ºÍ½øÐÐÔ¶³Ì´úÂëÖ´ÐеȶñÒâ»î¶¯¡£SVRºÚ¿Í×éÖ¯£¬Ò²±»³ÆÎªCozy Bear¡¢Midnight BlizzardºÍDukes£¬¶àÄêÀ´Ò»Ö¹Øë¶ÔÃÀ¹úºÍÅ·ÖÞÈ·µ±¾ÖºÍ¸öÈË×éÖ¯¡£Õâ´ÎÖÒ¸æÒªÇóÍøÂç·ÀÓùÕßµ±¼´½¨²¹Â¶³öµÄ·þÎñÆ÷£¬²¢²¿Êð°²È«²¹¶¡»ººÍ½â´ëÊ©ÒÔÔ¤·À°²È«·ì϶¡£´Ëǰ£¬APT29ºÚ¿ÍÒѲ߶¯ÁËSolarWinds¹©¸øÁ´¹¥»÷²¢¹¥ÆÆÁ˶à¸öÃÀ¹úÁª¹ú»ú¹¹£¬»¹ÈëÇÖÁ˱±Ô¼¹ú¶ÈµÄMicrosoft 365ÕË»§ºÍ΢Èí¸ß¹ÜµÈ¹«Ë¾µÄExchange OnlineÕË»§¡£ÃÀ¹ú¹ú¶È°²È«¾ÖÍøÂ簲ȫÖ÷¹Ü°µÊ¾£¬ÕâÒ»»î¶¯¶Ôµ±¾ÖºÍ˽Ӫ²¿ÃÅ×é³ÉÁËÈ«ÇòÍþв£¬±ØÒª³¹µ×Éó²é°²È«½ÚÔì´ëÊ©¡£
https://www.bleepingcomputer.com/news/security/us-uk-warn-of-russian-apt29-hackers-targeting-zimbra-teamcity-servers/
3. ºÚ¿ÍÀûÓÃYouTubeƽ̨´«²¼¸´ÔӵĶñÒâÈí¼þ
10ÔÂ10ÈÕ£¬¿¨°Í˹»ù½üÆÚ·¢ÏÖºÚ¿ÍÆµÈÔÀûÓÃYouTubeƽ̨´«²¼¸´ÔÓ¶ñÒâÈí¼þ¡£ºÚ¿Íͨ¹ý½Ù³ÖÈÈµãÆµÂ·¼Ù×°³ÉÔʼ´´×÷Õߣ¬°ä²¼¶ñÒâÁ´½Ó¶ÔÓû§Ö´ÐÐÚ¿Æ¡£2022ÄêºÚ¿ÍÔøÕë¶Ô¶íÂÞ˹Óû§Ö´ÐмÓÃÜÇ®±ÒÍÚ¾ò»î¶¯£¬ÀûÓñ»½Ù³ÖµÄYouTubeÕË»§·Ö·¢¼Ù×°³ÉÊ¢ÐÐÀûÓõĶñÒâÎļþ¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶à½×¶Î¹¥»÷ÐòÁÐϰȾϵͳ£¬Ñ¡È¡°µ²Ø¶ñÒâ´úÂ벢ά³ÖÊðÃûÓÐЧÐԵļ¼Êõ£¬ÀûÓöàÖÖ»úÔì³ÉÁ¢ÓƾÃÐÔ£¬²¢Ö´Ðи´ÔӵķÀÓù¶ã±Ü¼¼Êõ°µ²Ø¶ñÒâ×é¼þ¡£×îÖÕÓÐÐ§ÔØºÉΪSilentCryptoMiner£¬ÓÃÓÚÍÚ¾òÒþÖÔ¼ÓÃÜÇ®±Ò£¬²¢ÍøÂçϵͳң²âÊý¾Ýͨ¹ýTelegram»úеÈËAPI´«Êä¡£´Ë±í£¬¸Ã¶ñÒâ»î¶¯»¹Õë¶ÔÀ´×Ô°×¶íÂÞ˹¡¢Ó¡¶ÈµÈ¶à¸ö¹ú¶ÈµÄÓû§£¬ÕâЩÓû§Òò³£½ûÓÃAV¹¤¾ß±£»¤ºÍ°²È«´ëÊ©¶øÒ×Êܹ¥»÷¡£¸Ã¹¥»÷µÄ¸´ÔÓÐÔÌå´Ë¿ÌÄ£¿é»¯½á¹¹ÉÏ£¬¿Éƾ¾ÝÖ¸±ê¶¯Ì¬¼ÓÔØ·ÖÆçÓÐÐ§ÔØºÉ×é¼þ£¬Ñ¡È¡ÏȽø»ìºÏ²½ÖèºÍ·´·ÖÎöÖ°ÄÜά³ÖÒñ±ÎÐÔ£¬ÈÚÈ븴ÔӵįóÒµ¼¶¹¥»÷¼¼Êõ¡£
https://cybersecuritynews.com/hackers-using-youtube-videos-to-deliver-sophisticated-malware/
4. LynxÀÕË÷Èí¼þ£ºINCÀÕË÷Èí¼þµÄбäÖÖÓëË«³ÁÀÕË÷Íþв
10ÔÂ11ÈÕ£¬Palo Alto Networks ½üÆÚ·¢ÏÖÁËÒ»ÖÖÃûΪ¡°Lynx¡±µÄÐÂÀÕË÷Èí¼þ£¬ËüÏÖʵÉÏÊǶÔ2023Äê8Ô³öÏÖµÄINCÀÕË÷Èí¼þµÄ¸ÄÃû£¬Á½Õß´úÂëÀàËÆ¶È¸ß´ï48%£¬ÇÒÔ¼70.8%µÄÖ÷ÌâÖ°Äܱ»³Á¸´Ê¹Óá£LynxÀÕË÷Èí¼þÖØÒªÕë¶ÔÃÀ¹úºÍÓ¢¹ú¸÷ÐÐÒµ×éÖ¯£¬Ô̺¬ÁãÊÛ¡¢·¿µØ²ú¡¢¹¹ÖþºÍ½ðÈÚ·þÎñµÈ£¬ÒÔÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©´ó¾Ö¹©ÆäËûÍøÂç·¸×ï·Ö×ÓʹÓá£Æä×îΣÏյķ½ÃæÖ®Ò»ÊÇÖ´ÐÐË«³ÁÀÕË÷Õ½Êõ£¬¼´ÔÚ¼ÓÃÜÎļþǰÇÔÈ¡Êܺ¦ÕßÊý¾Ý£¬Èô²»Ö§¸¶Êê½ð£¬Ôò¿ÉÄÜй¶»òÏúÊÛÕâЩÊý¾Ý¡£LynxÀÕË÷Èí¼þÐû³ÆÒÑÈëÇÖ¶à¼Ò¹«Ë¾£¬²¢ÔÚ¹«¹²ÍøÕ¾ÉÏչʾ±»µÁÊý¾Ý£¬Ö»¹ÜÐû³Æ±Ü¿ªÁ˵±¾Ö»ú¹¹¡¢Ò½ÔººÍ·ÇͶ»ú×éÖ¯£¬µ«Æä¹¥»÷ÈԶԺܶàÐÐÒµ×é³É³Á´óÍþв¡£¸ÃÀÕË÷Èí¼þʹÓø߼¶¼ÓÃÜËã·¨£¬ÈçAES-128ºÍCurve25519 Donna£¬½âÃÜÄѶȼ«´ó£¬ÇÒרÃÅÕë¶ÔWindowsϵͳ£¬ÀûÓÃRestart Manager APIÌá¸ß¼ÓÃÜЧÄÜ¡£´Ë±í£¬LynxÀÕË÷Èí¼þÉè¼Æ½Ã½Ý£¬ÔÊÐí¹¥»÷Õßͨ¹ýºÅÁîÐвÎÊý×Ô½ç˵ִÐУ¬ÒÔÂú×ãÌØ¶¨ÐèÒª¡£
https://securityonline.info/lynx-ransomware-the-evolution-of-inc-ransomware-into-a-potent-cyber-threat/
5. CISAÖҸ棺δ¼ÓÃÜF5 BIG-IP Cookie±»ÀÄÓýøÐÐÍøÂç¹¥»÷
10ÔÂ11ÈÕ£¬CISA·¢³öÖҸ棬ָ³öÍøÂçÍþвÐÐΪÕßÔÚÀÄÓÃδ¼ÓÃܵÄF5 BIG-IPÓÆ¾ÃcookieÀ´¼ø±ðºÍ¶¨Î»Ö¸±êÍøÂçÉÏµÄÆäËûÄÚ²¿É豸¡£ËûÃÇͨ¹ý»æÔìÄÚ²¿É豸ͼ£¬ÔÚÍøÂç¹¥»÷µÄ¹æ»®½×¶Î¼ø±ðÒ×Êܹ¥»÷µÄÉ豸¡£F5 BIG-IPÊÇÒ»Ì×ÀûÓ÷¨Ê½½»¸¶ºÍÁ÷Á¿ÖÎÀí¹¤¾ß£¬Æä±¾µØÁ÷Á¿ÖÎÀíÆ÷£¨LTM£©Ä£¿éʹÓÃÓÆ¾ÃcookieÀ´Î¬³Ö»á»°Ò»ÖÂÐÔ£¬µ«ÕâЩcookieĬÈÏδ¼ÓÃÜ¡£´Ó11.5.0°æÆðÍ·£¬ÖÎÀíÔ±¿ÉÑ¡ÔñÇ¿Ôì¶ÔËùÓÐcookie½øÐмÓÃÜ£¬µ«Ñ¡Ôñ²»ÆôÓõÄÓû§½«Ãæ¶Ô°²È«·çÏÕ¡£ÕâЩcookieÔ̺¬±àÂëµÄIPµØÖ·¡¢¶Ë±êÓïºÍÄÚ²¿¸ºÔØÆ½ºâ·þÎñÆ÷µÄÉèÖã¬ÍøÂ簲ȫ×êÑÐÈËÔ±¶àÄêǰÒÑ·ÖÏíÈôºÎÀûÓÃδ¼ÓÃܵÄcookieÀ´²éÕÒ°µ²ØµÄÄÚ²¿·þÎñÆ÷¡£CISA½¨ÒéF5 BIG-IPÖÎÀíÔ±²é¿´¹©¸øÉ̹ØÓÚÈôºÎ¼ÓÃÜÕâÐ©ÓÆ¾ÃcookieµÄ×¢Ã÷£¬²¢Ö¸³öF5ÒÑ¿ª·¢³öÒ»ÖÖÃûΪ¡°BIG-IP iHealth¡±µÄÕï¶Ï¹¤¾ß£¬ÓÃÓÚ¼ì²â²úÆ·µÄÃýÎóÅäÖò¢ÏòÖÎÀíÔ±·¢³öÖҸ档µ±ÉèÖÃΪ¡°±ØÐ롱ʱ£¬ËùÓÐÓÆ¾ÃÐÔcookie¶¼Ê¹ÓÃÇ¿AES-192¼ÓÃܽøÐмÓÃÜ¡£
https://www.bleepingcomputer.com/news/security/cisa-hackers-abuse-f5-big-ip-cookies-to-map-internal-servers/
6. Mozilla´¹Î£°ä²¼Firefox°²È«¸üУ¬½¨¸´ÑϳÁ·ì϶CVE-2024-9680
10ÔÂ11ÈÕ£¬MozillaΪÆäFirefoxä¯ÀÀÆ÷°ä²¼ÁË´¹Î£°²È«¸üУ¬ÒÔ½â¾öÒ»¸ö±»¿í·ºÀûÓõÄÑϳÁ·ì϶£¬¸Ã·ì϶±»×·×ÙΪCVE-2024-9680£¬CVSSÆÀ·ÖΪ9.8£¬¿ÉÄÜÔÊÐí¹¥»÷ÕßÔÚÓû§ÏµÍ³ÉÏÖ´ÐÐËÁÒâ´úÂë¡£·ì϶λÓÚFirefoxµÄ¶¯»¹¦·òÖá×é¼þÖУ¬ÊÇWeb Animations APIµÄÒ»ÖÖ»úÔ죬¾ßÌåΪ¿ªÊͺóʹÓ÷ì϶£¬¿Éµ¼ÖÂÄÚ´æ°Ü»µ¡£MozillaÔÚÊÕµ½·´²¡¶¾¹«Ë¾ESETµÄÖÒ¸æºó£¬Ñ¸¿ìÕÙ¼¯ÍŶӶԷì϶½øÐÐÄæÏò¹¤³Ì£¬²¢ÔÚ25Ó×ʱÄÚ¿ª·¢²¢°ä²¼Á˽¨¸´·¨Ê½¡£½¨²¹µÄ°æ±¾Ô̺¬Firefox 131.0.2µÈ¶à¸ö°æ±¾¡£´Ë±í£¬MozillaÒÑÈ·Èϸ÷ì϶ÔÚ±»»ý¼«ÀûÓÃÀ´¹¥»÷Torä¯ÀÀÆ÷Óû§£¬µ«¹ØÓÚ¹¥»÷µÄ¾ßÌåϸ½ÚÈÔ²»µÃ¶øÖª¡£Òò¶ø£¬Óû§¸Ãµ±¼´¸üÐÂÖÁ×îа汾µÄFirefoxÒÔ±£»¤×Ô¼ºµÄϵͳ°²È«¡£
https://securityonline.info/mozilla-confirms-active-attacks-on-tor-browser-via-firefox-vulnerability/


¾©¹«Íø°²±¸11010802024551ºÅ