Ô½ÄÏÍþв×éÖ¯ÀûÓöñÒâÈí¼þ¶Ô×¼Êý×ÖÓªÏúר¼Ò
°ä²¼¹¦·ò 2024-10-2210ÔÂ20ÈÕ£¬Cyble ×êÑÐÓëµý±¨³¢ÊÔÊÒ (CRIL) ×î½ü¸æ·¢ÁËÒ»´ÎÕë¶ÔÊý×ÖÓªÏúרҵÈËÊ¿£¬³ö¸ñÊÇ Facebook ºÍ Instagram ¸æ°×ר¼ÒµÄ¸´ÔÓ¹¥»÷»î¶¯¡£×Ô 2022 Äê 7 ÔÂÆð£¬Ò»¸öÔ½ÄÏÍþв×éÖ¯Ò»ÏòÔÚ´«²¼ Ducktail ºÍ Quasar RAT µÈ¶ñÒâÈí¼þ£¬Ñ¡È¡ÍøÂç´¹µö¡¢É³ºÐÌӱܺÍÌØÈ¨Éý¼¶¼¼Êõ¡£¹¥»÷ʼÓÚÔ̺¬¼Ù×°³É PDF µÄ¶ñÒâ LNK ÎļþµÄÍøÂç´¹µöÓʼþ£¬ÕâЩÎļþ»áÖ´ÐÐ PowerShell ºÅÁÏÂÔØ»ìºÏºÍ±àÂë¹ýµÄ¾ç±¾£¬Í¨³£ÍйÜÔÚ Dropbox µÈƽ̨ÉÏ¡£Í¨¹ý¶à³Á·´É³ºÐºÍ·´µ÷ÊԲ鳣¬¶ñÒâÈí¼þÈ·±£½öÔÚÕæÊµ»·¾³ÖÐÔËÐС£Ò»µ©È·ÈÏÖ¸±ê£¬¾ç±¾½«½âÃÜÓÐÐ§ÔØºÉ£¬²¿Êð Quasar RAT£¬Ê¹¹¥»÷ÕßÄÜÆëÈ«½ÚÔìÊܺ¦Õßϵͳ£¬ÇÔÈ¡Êý¾ÝºÍÍ´´¦¡£¸Ã×é֯ʹÓà AES ¼ÓÃÜ¡¢·´µ÷ÊÔ¼¼ÊõºÍ»ùÓÚ .NET µÄ¸ß¼¶»ìºÏ£¬Ìӱܴ«Í³°²È«½â¾ö¹æ»®¡£´Ë±í£¬¸Ã×éÖ¯²»ÐݸĽøÕ½Êõ£¬ÕûºÏ¶ñÒâÈí¼þ¼´·þÎñ (MaaS) ²úÆ·£¬ÌáÉýÒµÎñÁìÓò¡£
https://securityonline.info/ducktail-quasar-rat-vietnamese-threat-actors-target-meta-ads-professionals/
2. Lumma Stealer£ºÍ¨¹ýαÔìCAPTCHAÓëCDN´«²¼µÄ³ÖÐøÐÅÏ¢ÇÔÈ¡Íþв
10ÔÂ20ÈÕ£¬Lumma Stealer ÊÇÒ»ÖÖͨ¹ý¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©ÌṩµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬×¨ÃÅÇÔÈ¡Ãô¸ÐÊý¾ÝÈçÃÜÂë¡¢ä¯ÀÀÆ÷ÐÅÏ¢ºÍ¼ÓÃÜÇ®±ÒÇ®°üÏêÇé¡£¹¥»÷ÕßÒÑ´Ó´«Í³µÄÍøÂç´¹µöתÏòÀûÓúϷ¨Èí¼þ´«²¼ Lumma Stealer£¬²¢Í¨¹ýαÔìµÄ CAPTCHA ÑéÖ¤ºýŪÓû§Ö´ÐжñÒâÔØºÉ£¬Ê¹Æä³ÉΪһÖÖ³ÖÐøÍþв¡£QualysÍþв×êÑв¿ÃÅ£¨TRU£©³ÖÐø¼à¿Ø Lumma Stealer »î¶¯£¬²¢·¢ÏÖ¹¥»÷ÕßʹÓöà½×¶ÎÎÞÎļþ¼¼Êõ´«µÝ×îÖÕÔØºÉ£¬Ôö³¤ÁËÍþвµÄºýŪÐÔºÍÓÆ¾ÃÐÔ¡£¹¥»÷Á´´ÓÓû§±»³Á¶¨Ïòµ½Ðéα CAPTCHA ÍøÕ¾ÆðÍ·£¬Í¨¹ýµã»÷ÑéÖ¤°´Å¥´¥·¢ PowerShell ºÅÁîÖ´ÐУ¬ÏÂÔØ²¢Æô¶¯¶ñÒâÈí¼þÏÂÔØ·¨Ê½¡£×îÖÕ£¬¶ñÒâÈí¼þ Lumma Stealer£¨VectirFree.exe£©Í¨¹ý¹ý³ÌÍÚ¿Õ¼¼Êõ×¢ÈëºÏ·¨·¨Ê½£¬Ìӱܼì²â£¬²¢ÔÚϵͳÖÐËÑË÷¼ÓÃÜÇ®±ÒºÍÃÜÂëÓйصÄÃô¸ÐÎļþºÍÊý¾Ý¡£Lumma Stealer »¹»áÓëºÅÁîºÍ½ÚÔ죨C2£©·þÎñÆ÷ͨѶ£¬ÒÔÇÔÈ¡±»µÁÊý¾Ý£¬²¢³¢ÊÔʹÓÃÌØ¶¨¶¥¼¶ÓòÃûÏνӵ½ C2 ·þÎñÆ÷Óò¡£ÍþвÐÐΪÕßʹÓÃÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©½øÐÐÔØºÉ´«ËÍ£¬Ôö³¤ÁËÍþвµÄ¸´ÔÓÐÔ¡£
https://blog.qualys.com/vulnerabilities-threat-research/2024/10/20/unmasking-lumma-stealer-analyzing-deceptive-tactics-with-fake-captcha
3. Roundcube·ì϶ÔâºÚ¿ÍÀûÓã¬ÍøÂç´¹µö¹¥»÷ÇÔÈ¡Óû§Æ¾Ö¤
10ÔÂ21ÈÕ£¬ºÚ¿ÍÀûÓÃÏÖÒѽ¨²¹µÄRoundcube·ì϶CVE-2024-37383£¨CVSSÆÀ·Ö6.1£©ÌáÒéÁËÍøÂç´¹µö¹¥»÷£¬Ö¼ÔÚ´Ó¿ªÔ´ÍøÂçÓʼþÈí¼þÖÐÇÔÈ¡Óû§Æ¾Ö¤¡£Positive TechnologiesµÄ×êÑÐÈËÔ±·¢ÏÖ£¬ÕâЩ¹¥»÷ÊÇͨ¹ýÒ»·âÔ̺¬°µ²Ø¸½¼þºÍÌØ¶¨JavaScript´úÂëµÄµç×ÓÓʼþ½øÐе쬏ÃÓʼþÊÔIJÀûÓÃRoundcube WebmailÖеķì϶¡£¸Ã·ì϶ӰÏì1.5.7֮ǰµÄ°æ±¾ºÍ1.6.7֮ǰµÄ1.6.x°æ±¾£¬¹¥»÷Õß¿Éͨ¹ýSVG¶¯»ÊôÐÔ½øÐÐXSS¹¥»÷£¬¸Ã·ì϶ÒÑÔÚ2024Äê5Ô°䲼µÄ¸üÐÂÖн¨¸´¡£¹¥»÷Õßͨ¹ýÓÕÆÓû§´ò¿ªÌØÔìÓʼþ£¬ÔÚWebä¯ÀÀÆ÷¸ßµÍÎÄÖÐÖ´ÐÐËÁÒâJavaScript´úÂë¡£ÔÚ¹¥»÷ÖУ¬JavaScript¸ºÔػᱣÁôÒ»¸ö¿ÕÎĵµ²¢´ÓÓʼþ·þÎñÆ÷¼ìË÷ÐÂÎÅ£¬Í¬Ê±ÔÚRoundcube½çÃæÖд´½¨Ò»¸öÐéαµÄµÇ¼±íµ¥£¬²¶»ñÓû§Í´´¦²¢·¢Ë͵½¶ñÒâ·þÎñÆ÷¡£Ö»¹ÜRoundcube Webmail¿ÉÄܲ»ÊÇʹÓÃ×î¿í·ºµÄµç×ÓÓʼþ¿Í»§¶Ë£¬µ«ÓÉÓÚµ±¾Ö»ú¹¹ÆÕ±éʹÓÃËü£¬Òò¶øÈÔÊǺڿ͵ijÁÒªÖ¸±ê¡£Ä¿Ç°×êÑÐÈËÔ±ÒѰ䲼¸Ã·ì϶µÄPoCÀûÓôúÂ룬µ«ÎÞ·¨½«Õâ´Î¹¥»÷ÓëÒÑÖª²Î¼ÓÕßÁªÏµÆðÀ´¡£
https://securityaffairs.com/170055/hacking/roundcube-flaw-exploited-in-phishing-attack.html
4. TransakÊý¾Ýй¶ÊÂÎñÓ°Ï쳬9.2ÍòÈË
10ÔÂ22ÈÕ£¬¼ÓÃÜÖ§¸¶´¦ÖÃÉÌTransak½üÆÚÔâ·êÊý¾Ýй¶ÊÂÎñ£¬Ò»ÃûÔ±¹¤µÄ±Ê¼Ç±¾µçÄÔ±»ºÚ¿ÍÈëÇÖ£¬µ¼Ö³¬¹ý92,000ÃûÓû§µÄÐÅÏ¢±»Ð¹Â¶¡£Ö»¹Ü¸Ã¹«Ë¾Ðû³ÆÃ»ÓвÆÕþÃô¸Ð»ò¹Ø¼üÐÅϢй¶£¬µ«Óû§µÄÐÕÃû¡¢ÉúÈÕ¡¢»¤ÕÕ¡¢¼ÝÕÕÐÅÏ¢¼°×ÔÅÄÕÕµÈÓ×ÎÒÐÅÏ¢¾ùÊÜÓ°Ïì¡£Õâ´ÎÊÂÎñ½öÓ°ÏìÁËTransakÔ¼1%µÄÓû§Èº£¬×÷ΪȫÇòµ±ÏȵļÓÃÜÇ®±Ò»ù´¡ÉèÊ©ÌṩÉÌÖ®Ò»£¬TransakΪ½ü600ÍòÓû§Ìṩ·þÎñ£¬¸²¸Ç160¸ö¹ú¶ÈºÍÃÀ¹ú46¸öÖÝ¡£TransakÇ¿µ÷£¬×÷Ϊһ¸ö·ÇÍÐ¹ÜÆ½Ì¨£¬Óû§×ʽð°²È«Î´ÊÜÓ°Ï죬Óû§Ê¼ÖÕ¶Ô×Ô¼ºµÄ×ʲúÕ¼ÓÐÆëÈ«½ÚÔìȨ¡£È»¶ø£¬StormousÀÕË÷Èí¼þÍÅ»ïÒÑÈÏ¿ÉÕâ´Î͵ÇÔÐÐΪ£¬²¢Ðû³ÆÇÔÈ¡ÁË300GBµÄÊý¾Ý£¬Ô̺¬µ±¾ÖÐû¸æµÄÉí·ÝÖ¤¡¢²ÆÕþ±¨±íµÈ£¬´òËãÏúÊÛ»òй¶Êý¾ÝÒÔË÷È¡Êê½ð¡£TransakÒÑÀñÆ¸ÍøÂ簲ȫ¹«Ë¾µ÷²é´ËÊ£¬²¢´òËãͨ¹ýµç×ÓÓʼþÁªÏµÊÜÓ°ÏìÓû§¡£Í¬Ê±£¬¹«Ë¾ÒÑ֪ͨӢ¹úÐÅϢרԱ°ì¹«ÊÒ¼°Å·Ã˺ÍÃÀ¹úÆäËû¼à¹Ü»ú¹¹£¬²¢¶½´Ù¿Í»§ÈçÓÐÒÉÄÑÇëÁªÏµ¹«Ë¾¡£
https://therecord.media/crypto-payment-services-data-breach
5. ÈûÆÖ·˹ÔâÇ×°ÍÀÕ˹̹ºÚ¿Í×éÖ¯ÐÍ¬ÍøÂç¹¥»÷
10ÔÂ22ÈÕ£¬ÈûÆÖ·˹½üÆÚÔâ·êÁ˶à¸öÇ×°ÍÀÕ˹̹ºÚ¿Í×éÖ¯ÌáÒéµÄÐÍ¬ÍøÂç¹¥»÷£¬Ö¸±êÖ±Ö¸Æä¹Ø¼ü»ù´¡ÉèÊ©ºÍµ±¾ÖÍøÕ¾¡£Ö»¹Ü´óÎÞÊý¹¥»÷δÄܳɹ¦£¬µ«ÈÔ¶ÔÒøÐÓ×¢»ú³¡ºÍµ±¾ÖÍøÕ¾µÈÖ¸±êÉèÊ©Ôì³ÉÁËÁÙʱÖжϡ£ºÚ¿Í×éÖ¯ÔÚTelegramºÍ°µÍøÂÛ̳Éϰ䲼ÉêÃ÷£¬Ðû³Æ½«ÈëÇÖÈûÆÖ·˹»ú¹¹ÒÔ¡°³ÍÖΡ±¸Ã¹ú¶ÔÒÔÉ«ÁеÄÖ§³Ö¡£Ö»¹ÜÈûÆÖ·˹ÔÚ°ÍÒÔì¶ÜÖÐά³ÖÖÐÁ¢£¬µ«´ÓÀ´Ö§³ÖÒÔÉ«Áоü¶Ó£¬Õâ³ÉΪºÚ¿Í¹¥»÷µÄ¿ÉÄܶ¯»ú¡£ÊÜÓ°ÏìµÄ·þÎñÔ̺¬µ±¾ÖÃÅ»§ÍøÕ¾¡¢µçÁ¦µçÐŲ¿ÃÅ¡¢ÖØÒªÒøÐÓעʯÓ͹«Ë¾ºÍ»ú³¡ÔËÓªÉ̵ȣ¬ÎÞÊý»ã±¨³ÆÔâ·êÁËÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷£¬ºÚ¿Í»¹Ðû³ÆÒÑÇÔÈ¡Ãô¸ÐÊý¾Ý¡£È»¶ø£¬»ú³¡ÔËÓª²¢Î´ÊÜÓ°Ï죬½öÔÚÏßÍ£³µÔ¤Ô¼·þÎñÅö±Ú¡£ÈûÆÖ·˹Êý×Ö²¿°µÊ¾£¬µ±¾ÖÖÐÑëÔÚÏßÃÅ»§ÍøÕ¾½ö¶ÌÔÝÎÞ·¨½Ó¼û£¬ÆäËû²¿Î¯»òµ±¾Ö·þÎñÍøÕ¾Î´ÊÜÓ°Ïì¡£×î¸ßÍøÂç¹ÙÔ±ÇÇÖΡ¤Âõ¿Ë¶ûµÂ˹ºôÓõ¹«Ë¾×öºÃ³ï±¸£¬Ñ¸¿ìÕмܽ«À´¹¥»÷²¢¸´Ô·þÎñ£¬Í¬Ê±°µÊ¾Ã»ÓбØÒª·¢¼±¡£
https://therecord.media/cyprus-critical-infrastructure-cyberattack-israel-palestine
6. WordPressÍøÕ¾ÆµÔâºÚ¿Í¹¥»÷£¬¶ñÒâ²å¼þÍÆËÍÇÔÊØÐÅÏ¢Èí¼þ
10ÔÂ21ÈÕ£¬WordPressÍøÕ¾½üÆÚƵÈÔÔâ·êºÚ¿Í¹¥»÷£¬¹¥»÷Õßͨ¹ý×°ÖöñÒâ²å¼þÀ´ÍÆËÍÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ¡£×Ô2023ÄêÆð£¬ClearFake¶ñÒâ»î¶¯ÒÑÔÚÊÜÏ°È¾ÍøÕ¾ÉÏÏÔʾÐéαµÄÍøÂçä¯ÀÀÆ÷¸üкá·ù£¬¶ø2024ÄêÒýÈëµÄClickFix»î¶¯Ôò¼Ù×°³ÉÔ̺¬½¨¸´·¨Ê½µÄÈí¼þÃýÎóÐÂÎÅ£¬ÊµÔòÏÂÔØ²¢×°ÖÃÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ¡£ÕâЩ»î¶¯±äµÃÔ½À´Ô½ÆÕ±é£¬ÍþвÐÐΪÕß»áÈëÇÖÍøÕ¾²¢ÏÔʾÔ̺¬Google Chrome¡¢Google Meet»áÒé¡¢FacebookÉõÖÁÑéÖ¤ÂëÒ³ÃæµÄÐéαÃýÎóºá·ù¡£¾ÝGoDaddy»ã±¨£¬ClearFake/ClickFixÍþвÐÐΪÕßÒÑÈëÇÖ³¬¹ý6000¸öWordPressÍøÕ¾²¢×°ÖöñÒâ²å¼þÀ´ÏÔʾÓйØÐéα¾¯±¨¡£ÕâЩ¶ñÒâ²å¼þʹÓÃÓëºÏ·¨²å¼þÀàËÆµÄÃû³Æ£¬ÈçWordfence SecurityºÍLiteSpeed Cache£¬»òͨÓõÄÐé¹¹Ãû³Æ£¬Ò»µ©×°Ö㬾ͻὫ¶ñÒâJavaScript¾ç±¾×¢ÈëÍøÕ¾µÄHTMLÖУ¬½ø¶ø¼ÓÔØClearFake»òClickFix½ÅÕý±¾ÏÔʾÐéαºá·ù¡£ÍþвÐÐΪÕßËÆºõÔÚÀûÓñ»µÁµÄÖÎÀíԱʹ´¦µÇ¼WordPressÍøÕ¾²¢ÒÔ×Ô¶¯·½Ê½×°Öòå¼þ¡£WordPressÔËÓªÈËÔ±¸Ãµ±¼´²é³ÒÑ×°Öòå¼þµÄÁÐ±í£¬²¢É¾³ýÈκÎδ֪²å¼þ£¬Í¬Ê±½«ËùÓÐÖÎÀíÔ±Óû§µÄÃÜÂë³ÁÖÃΪΨһÃÜÂ룬ÒÔÈ·±£ÍøÕ¾°²È«¡£
https://www.bleepingcomputer.com/news/security/over-6-000-wordpress-hacked-to-install-plugins-pushing-infostealers/


¾©¹«Íø°²±¸11010802024551ºÅ