Bumblebee¶ñÒâÈí¼þÒÉËÆ¾íÍÁ³ÁÀ´£¬Ð¹¥»÷Á´±»ÆØ¹â
°ä²¼¹¦·ò 2024-10-2310ÔÂ21ÈÕ£¬Bumblebee¶ñÒâÈí¼þÔÚÆ§¾²ÊýÔº󣬽üÆÚ±»ÍøÂ簲ȫ¹«Ë¾Netskope·¢ÏÖÓÖÓÐл¼£Ï󣬿ÉÄÜԤʾןò¡¶¾½«¾íÍÁ³ÁÀ´¡£BumblebeeÊÇÓÉTrickBot¿ª·¢ÈËÔ±´´×÷µÄ£¬×Ô2022Äê³öÏÖÒÔÀ´£¬±ã×÷ΪBazarLoaderºóÃŵĴúÌæÆ·£¬ÎªÀÕË÷Èí¼þÍþвÐÐΪÕßÌṩ¶ÔÊܺ¦ÕßÍøÂçµÄ½Ó¼ûȨÏÞ¡£Ëüͨ³£Í¨¹ýÍøÂç´¹µö¡¢¶ñÒâ¸æ°×ºÍSEOͶ¶¾µÈ·½Ê½Ï°È¾£¬´«µÝµÄÓÐÐ§ÔØºÉÔ̺¬Cobalt StrikeÐűꡢÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þÒÔ¼°¸÷ÀàÀÕË÷Èí¼þ¡£½ñÄê5Ô£¬Å·ÖÞÐ̾¯×éÖ¯µÄ¡°ÖÕ¾ÖÐж¯¡±²é»ñÁ˶ą֧̀³ÖBumblebeeµÈ¶ñÒâÈí¼þ¼ÓÔØ·¨Ê½²Ù×÷µÄ·þÎñÆ÷£¬¶ûºóBumblebeeÒ»¶ÈÙÈÆìÏ¢¹Ä¡£È»¶ø£¬×îеÄBumblebee¹¥»÷Á´Ê¼ÓÚÒ»·âÍøÂç´¹µöµç×ÓÓʼþ£¬ÓÕÆÊܺ¦ÕßÏÂÔØ¶ñÒâZIP´æµµ£¬Ëæºóͨ¹ýһϵÁвÙ×÷ÔÚÄÚ´æÖв¿ÊðBumblebee¡£NetskopeÖÒ¸æ³Æ£¬ÕâÊǶÔBumblebee¿ÉÄܸ´ËÕµÄÔçÆÚ¼£ÏóµÄÖҸ棬µ«²¢Î´ÌṩÓÐ¹ØÆäͶ·ÅµÄÓÐÐ§ÔØºÉ»ò¹¥»÷¹æÄ£µÄÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/bumblebee-malware-returns-after-recent-law-enforcement-disruption/
2. Êý°ÙÍòÓû§Ê¹ÓõÄE2EEÔÆ´æ´¢Æ½Ì¨´æÔÚÑϳÁ·ì϶
10ÔÂ20ÈÕ£¬ËÕÀèÊÀÁª¹úÀí¹¤Ñ§ÔºµÄ×êÑÐÈËÔ±Jonas HofmannºÍKien Tuong Turong·¢ÏÖ£¬¶Ëµ½¶Ë¼ÓÃÜ£¨E2EE£©Ôƴ洢ƽ̨´æÔÚ°²È«ÎÊÌ⣬¿ÉÄÜ»áʹÓû§Êý¾Ý¶³ö¸ø¶ñÒâÐÐΪÕß¡£ËûÃÇ·ÖÎöÁËSync¡¢pCloud¡¢Icedrive¡¢SeafileºÍTresoritµÈ·þÎñ£¬ÕâЩ·þÎñ¹²Í¬±»³¬¹ý2200ÍòÈËʹÓ㬷¢ÏÖÕâЩ·þÎñ´æÔÚÑϳÁ·ì϶£¬Ô̺¬ÔÊÐí¶ñÒâÐÐΪÕß×¢ÈëÎļþ¡¢´Û¸ÄÊý¾Ý»ò½Ó¼ûÓû§ÎļþµÄʵÏÖ¡£ÆäÖУ¬Sync´æÔÚδÈÏÖ¤µÄÃÜÔ¿×ÊÁϺͲ»×㹫ԿÈÏÖ¤µÄÎÊÌ⣻pCloudµÄ˽ԿºÍ¹«Ô¿Ò²Î´ÈÏÖ¤£¬´æÔÚ×¢ÈëÎļþºÍ°Ñ³ÖÔªÊý¾ÝµÈ·ì϶£»IcedriveʹÓÃδÈÏÖ¤µÄCBC¼ÓÃÜ£¬ÈÝÒ×Êܵ½Îļþ´Û¸Ä¹¥»÷£»SeafileÈÝÒ×Êܵ½ºÍ̸½µ¼¶ºÍÃÜÂ뱩Á¦ÆÆ½âµÄÓ°Ï죬ͬʱÎļþÃûºÍµØÎ»Ò²²»°²È«£»¶øTresorit²û·¢Ïà¶Ô½ÏºÃ£¬µ«´æÔÚ¹«Ô¿ÈÏÖ¤ÒÀÀµ·þÎñÆ÷½ÚÔìµÄÖ¤ÊéºÍÔªÊý¾ÝÒ×Êܴ۸ĵÄÎÊÌâ¡£¶ÔÓÚ×êÑÐÈËÔ±»ã±¨µÄÎÊÌ⣬SyncÒѾѸ¿ì²ÉÈ¡Ðж¯½â¾ö£¬²¢°µÊ¾Ã»ÓÐÖ¤¾ÝÅú×¢·ì϶Òѱ»ÀûÓá£TresoritÔò°µÊ¾ÆäÉè¼ÆºÍÃÜÂëѧѡÔñʹÆäϵͳ¸ù»ùÉϲ»ÊÜÕâЩ¹¥»÷µÄÓ°Ï죬²¢ÖÂÁ¦ÓÚ³ÖÐø¸Ä½øÆ½Ì¨°²È«¡£
https://www.bleepingcomputer.com/news/security/severe-flaws-in-e2ee-cloud-storage-platforms-used-by-millions/
3. Êý°ÙÍòAndroidºÍiOSÀûÓÃÖз¢ÏÖAWS¡¢AzureÉí·ÝÑéÖ¤ÃÜÔ¿
10ÔÂ23ÈÕ£¬ÈüÃÅÌú¿ËµÄÈí¼þ¹¤³Ìʦ·¢ÏÖ£¬Google PlayºÍApple App StoreÉÏ¿í·ºÊ¹ÓõÄÒÆ¶¯ÀûÓ÷¨Ê½ÖдæÔÚÓ²±àÂëºÍδ¼ÓÃܵÄÔÆ·þÎñƾ֤£¬Õâµ¼ÖÂÊý°ÙÍòÓû§Ãæ¶Ô³Á´ó°²È«·çÏÕ¡£ÕâЩƾ֤µÄ¶³öÔ´ÓÚиµ¡µÄ±àÂëϰ¹ß£¬Ê¹µÃÈκοÉÄܽӼûÀûÓ÷¨Ê½¶þ½øÔìÎļþ»òÔ´´úÂëµÄÈ˶¼ÄܽӼûºó¶Ë»ù´¡ÉèÊ©£¬½ø¶ø¿ÉÄÜÇÔÈ¡Óû§Êý¾Ý¡£ÔÚÈüÃÅÌú¿ËµÄ×êÑÐÖУ¬¶à¿îÈȵãÀûÓÃÈçPic Stitch¡¢Crumbl¡¢Eureka¡¢Videoshop¡¢Meru Cabs¡¢Sulekha Business¡¢ReSound Tinnitus ReliefÒÔ¼°Beltone Tinnitus CalmerºÍEatSleepRIDEĦÍгµGPSµÈ¾ù±»·¢ÏÖ´æÔÚ´ËÀàÎÊÌâ¡£ÕâЩÀûÓñðÀë¶³öÁËAWS¡¢AzureºÍTwilioµÈÔÆ·þÎñÌṩÉÌµÄÆ¾Ö¤£¬Ê¹µÃ¹¥»÷Õß¿ÉÄÜ»ñÈ¡³ö²úƾ֤¡¢½Ó¼û´æ´¢Í°¡¢ÇÔÈ¡Êý¾Ý²¢·ÛËéºó¶Ë»ù´¡ÉèÊ©¡£½¨ÒéÓû§×°ÖõÚÈý·½°²ÕûϵͳÀ´×èÖ¹ÕâЩ±àÂëÃýÎóÔì³ÉµÄºó¹û£¬²¢¾¯ÌèÀûÓ÷¨Ê½ËùÒªÇóµÄȨÏÞ£¬Ö»×°ÖÃÀ´×Ô¿ÉÐÅÆðÔ´µÄÀûÓá£Í¬Ê±£¬¿ª·¢ÈËÔ±Ò²Ó¦±àд¸üºÃµÄ´úÂ룬ʹÓÃÖ¼ÔÚ½«Ãô¸ÐÐÅÏ¢±£ÁôÔÚ°²È«µØÎ»µÄ·þÎñ£¬²¢¶ÔËùÓÐÄÚÈݽøÐмÓÃܺͶ¨ÆÚ½øÐдúÂëÉó²é¼°°²È«É¨Ãè¡£
https://www.theregister.com/2024/10/23/android_ios_security/
4. ÈýÐÇÁãÈÕ·ì϶CVE-2024-44068±»»ý¼«ÀûÓÃ
10ÔÂ23ÈÕ£¬ÈýÐÇÒÆ¶¯´¦ÖÃÆ÷Öз¢ÏÖÁËÒ»¸ö±àºÅΪCVE-2024-44068µÄÁãÈÕ·ì϶£¬¸Ã·ì϶ÔÚ·ì϶Á´Öпɱ»ÀûÓÃÒÔÖ´ÐÐËÁÒâ´úÂ룬ÆäCVSSÆÀ·ÖΪ8.1£¬ÊôÓÚ¸ßΣ·ì϶¡£¸Ã·ì϶´æÔÚÓÚÈýÐÇExynos 9820¡¢9825¡¢980¡¢990¡¢850ºÍW920ÒÆ¶¯´¦ÖÃÆ÷¼°¿É´©´÷´¦ÖÃÆ÷µÄm2mËõ·ÅÇý¶¯·¨Ê½ÖУ¬¿ÉÄܵ¼ÖÂÌØÈ¨Éý¼¶¡£¸Ã·ì϶Óɹȸè×êÑÐÔ±Xingyu JinÔÚ½ñÄêÔçЩʱ³½»ã±¨£¬¹È¸èTAG×êÑÐÔ±Clement LecigneÖÒ¸æ³Æ¸Ã·ì϶ÒÑÔÚÒ°±í´æÔÚ¡£JinºÍLecigneÖ¸³ö£¬¸ÃÁãÈÕ·ì϶ÊÇEoP£¨ÌØÈ¨ÌáÉý£©Á´µÄÒ»²¿ÃÅ£¬¹¥»÷Õß¿ÉÄÜͨ¹ýÌØÈ¨Ïà»ú·þÎñÆ÷¹ý³ÌÖ´ÐÐËÁÒâ´úÂ룬²¢½«¹ý³ÌÃû³Æ³Á¶¨ÃûΪ¡°vendor.samsung.hardware.camera.provider@3.0-service¡±£¬¿ÉÄÜÊÇΪÁË·´È¡Ö¤Ö÷ÕÅ¡£ÈýÐÇÒÑÔÚ10Ô·ݵݲȫ½¨¸´·¨Ê½ÖжԸ÷ì϶½øÐÐÁ˽¨²¹¡£
https://www.darkreading.com/endpoint-security/samsung-zero-day-vuln-under-active-exploit-google-warns
5. Latrodectus¶ñÒâÈí¼þÔÚ½ðÈÚ¡¢Æû³µÓëÒ½ÁÆÁìÓòËÁŰ
10ÔÂ22ÈÕ£¬ForcepointµÄ·ÖÎö½Òʾ£¬Latrodectus£¨ÓÖ³ÆBlackWidow£©¶ñÒâÈí¼þÕý±»ÍøÂç·¸×ï·Ö×ÓÆµÈÔÀûÓã¬ÓÈÆäÔÚ½ðÈÚ¡¢Æû³µºÍÒ½ÁƱ£½¡ÁìÓò¡£¸ÃÏÂÔØ·¨Ê½³õ´Î·¢ÏÖÓÚ2023Äê10Ô£¬¾Ý´«ÓÉ¿ª·¢ÁËIcedID£¨±ðÃûBokBot£©µÄLunarSpider´´½¨£¬ÇÒÓëWizardSpiderÓйØÁª¡£LatrodectusÖØÒªÍ¨¹ýµç×ÓÓʼþ¸½¼þ´«²¼£¬¸½¼þ¼Ù×°³ÉPDF»òHTMLÌåʽ£¬ÄÚº¬¿Éµ¼ÖÂϰȾµÄJavaScript¡£Ò»µ©³É¹¦×°Ö㬽«Òý·¢Ó×ÎÒÐÅϢй¶¡¢¾¼ÃËðʧ¼°Ãô¸ÐÐÅÏ¢±íйµÈºó¹û¡£PDFºÍHTMLµÄ¹¥»÷·½Ê½ÓÐËù·ÖÆç£¬Ç°ÕßÀûÓÃJavaScriptÏÂÔØMSI×°Ö÷¨Ê½£¬ºóÕßÔò³¢ÊÔͨ¹ýPowerShellÖ±½Ó×°ÖÃDLL¡£JavaScriptÖеĶñÒâ´úÂë±»»ìºÏ£¬ÇÒÔ̺¬´óÁ¿À¬»ø×¢½â¡£PDF¹¥»÷ÖУ¬JavaScript»á´´½¨Ò»¸öActiveXObject²¢ÏÂÔØ.msiÎļþ£¬¿ªÊͶñÒâDLLºóÓÉrundll32.exeÔËÐС£HTML¹¥»÷ÔòÏÔʾαÔìµÄWindowsµ¯³ö´°¿Ú£¬ÓÕµ¼Óû§µã»÷¡°½â¾ö¹æ»®¡±°´Å¥£¬½ø¶øÏÂÔØ²¢Ö´ÐÐLatrodectus¡£ForcepointÖ¸³ö£¬¹¥»÷Õß»¹ÀûÓÃURLËõ¶ÌÆ÷³Á¶¨ÏòÖÁ³ÛÃûµÄstorage[.]googleapis[.]comÍйܶñÒâ¸ºÔØ¡£
https://www.securityweek.com/latrodectus-malware-increasingly-used-by-cybercriminals/
6. CISA½«ScienceLogic SL1·ì϶ÁÐΪÒÑÖª±»ÀûÓ÷ì϶
10ÔÂ22ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Òѽ«ScienceLogic SL1µÄ·ì϶CVE-2024-9537£¨CVSS v4ÆÀ·Ö¸ß´ï9.3£©ÁÐÈëÆäÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ÖС£¸Ã·ì϶ÓëSL1ÖÐÔ̺¬µÄδָ¶¨µÚÈý·½×é¼þÓйأ¬ÒÑÔÚSL1°æ±¾12.1.3+¡¢12.2.3+ºÍ12.3+Öеõ½½¨¸´£¬²¢Îª10.1.x¼°Ö®Ç°°æ±¾ÌṩÁ˲¹¶¡¡£´Ëǰ£¬ÔÆÍйÜÌṩÉÌRackspace»ã±¨ÁËÆäʹÓõÄScienceLogic EM7¼à¿Ø¹¤¾ß´æÔÚ°²È«ÎÊÌ⣬һÃûÍþвÐÐΪÕßÀûÓÃÁËÓëScienceLogicÀûÓ÷¨Ê½°ó¸¿µÄ·ÇRackspaceʵÓ÷¨Ê½ÖеÄÁãÈÕ·ì϶£¬µ¼ÖµÍÃô¸Ð¶È»úÄÜ¼à¿ØÊý¾Ýй¶¡£¾RackspaceÓëScienceLogicºÏ×÷£¬ÒÑ¿ª·¢²¹¶¡²¢ÏòËùÓпͻ§Ìṩ£¬Í¬Ê±Í¨ÖªÁËÊÜÓ°ÏìµÄ¿Í»§¡£¾ÝArticWolf°ä²¼µÄ»ã±¨£¬¸ÃÁãÈÕ·ì϶ʵΪµÚÈý·½ÊµÓ÷¨Ê½ÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶£¬µ«ScienceLogicÑ¡Ôñ²»Ð¹Â©ÊµÓ÷¨Ê½Ãû³Æ¡£CISAÒÑÒªÇóÁª¹ú»ú¹¹ÔÚ2024Äê11ÔÂ11ÈÕǰ½¨¸´´Ë·ì϶£¬²¢½¨Òé¸öÈË×éÖ¯Éó²éKEVĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÓйطì϶¡£
https://securityaffairs.com/170104/security/u-s-cisa-adds-sciencelogic-sl1-flaw-to-its-known-exploited-vulnerabilities-catalog.html


¾©¹«Íø°²±¸11010802024551ºÅ