΢ÈíÔ¶³Ì×¢²á±í¿Í»§¶Ë·ì϶CVE-2024-43532¹«¿ª

°ä²¼¹¦·ò 2024-10-24
1. ΢ÈíÔ¶³Ì×¢²á±í¿Í»§¶Ë·ì϶CVE-2024-43532¹«¿ª


10ÔÂ22ÈÕ £¬Õë¶Ô΢ÈíÔ¶³Ì×¢²á±í¿Í»§¶ËµÄ·ì϶CVE-2024-43532ÏÖÒѹ«¿ª £¬¸Ã·ì϶ÀûÓÃWindows×¢²á±í¿Í»§¶ËʵÏÖÖеĻØÍË»úÔì £¬ÔÚSMB´«Êä²»³ÉÓÃʱÒÀÀµÓھɴ«ÊäºÍ̸ £¬²¢½µµÍÉí·ÝÑéÖ¤¹ý³ÌµÄ°²È«ÐÔ £¬´Ó¶ø½ÚÔìWindowsÓò¡£¸Ã·ì϶ӰÏìWindows·þÎñÆ÷°æ±¾2008ÖÁ2022ÒÔ¼°Windows 10ºÍ11¡£¹¥»÷Õß¿Éͨ¹ýÀ¹½ØNTLMÉí·ÝÑéÖ¤ÎÕÊÖ²¢½«Æäת·¢µ½Active DirectoryÖ¤Êé·þÎñ(ADCS)µÈ·þÎñ £¬´´½¨ÐµÄÓòÖÎÀíÔ¹ØÊ»§¡£CVE-2024-43532Ô´ÓÚÔ¶³Ì×¢²á±í¿Í»§¶ËÔÚ´¦ÖÃRPCÉí·ÝÑé֤ʱµÄÎÊÌâ £¬µ±SMB´«Êä²»³ÉÓÃʱ £¬¿Í»§¶Ë»áÇл»µ½½Ï¾ÉµÄºÍ̸²¢Ê¹ÓÃÈõÉí·ÝÑéÖ¤¼¶±ð¡£Akamai×êÑÐÔ±Stiv KupchikÓÚ2ÔÂ1ÈÕÏò΢ÈíÅû¶Á˸÷ì϶ £¬µ«×î³õ±»²µ»Ø £¬ºóÓÚ6ÔÂÖÐÑ®³ÁÐÂÌá½»²¢µÃµ½È·ÈÏ £¬Î¢ÈíÓÚÈý¸öÔºó°ä²¼Á˽¨¸´·¨Ê½¡£Ä¿Ç° £¬KupchikÒѰ䲼ÓÐЧµÄ¸ÅÏëÑéÖ¤´úÂë £¬²¢ÔÚNo Hat°²È«»áÒéÉÏÚ¹ÊÏçËÀûÓùý³Ì¡£AkamaiµÄ»ã±¨»¹ÌṩÁ˼ì²âÒ×Êܹ¥»÷µÄ»úеºÍ¼à¶½Ìض¨RPCŲÓõIJ½Öè¡£


https://www.bleepingcomputer.com/news/security/exploit-released-for-new-windows-server-winreg-ntlm-relay-attack/


2. Gophish¹¤¾ß°ü±»ÀÄÓÃÓÚÔì×÷Õë¶Ô¶íÓïÆ¬ÇøÓû§µÄRATľÂí


10ÔÂ22ÈÕ £¬GophishÕâÒ»¿ªÔ´ÍøÂç´¹µö¹¤¾ß°üÕý±»·¸·¨·Ö×ÓÀûÓà £¬ÒÔÔì×÷²¢´«²¼DarkCrystal RAT£¨DCRat£©ºÍPowerRATµÈÔ¶³Ì½Ó¼ûľÂí £¬ÖØÒªÖ¸±êÊǶíÓïÆ¬ÇøÓû§ £¬Ô̺¬¶íÂÞ˹¼°ÆäÖܱ߹ú¶ÈÈçÎÚ¿ËÀ¼¡¢°×¶íÂÞ˹¡¢¹þÈø¿Ë˹̹¡¢ÎÚ×ȱð¿Ë˹̹ºÍ°¢Èû°Ý½®¡£GophishÕý±¾±»Éè¼ÆÓÃÓÚ×éÖ¯²âÊÔÍøÂç´¹µö·ÀÓùÄÜÁ¦ £¬µ«¹¥»÷ÕßÈ´½è´ËÔì×÷¼Ù×°³ÉYandex DiskÁ´½ÓºÍVKÉç½»ÍøÂçÒ³ÃæµÄÍøÂç´¹µöÓʼþ¡£ÕâЩÓʼþÓÕµ¼Óû§ÏÂÔØÔ̺¬DCRat»òPowerRAT¶ñÒâľÂíµÄMicrosoft WordÎĵµ»òǶÈëJavaScriptµÄHTMLÎļþ¡£Ò»µ©Êܺ¦Õß´ò¿ªÎĵµ²¢ÆôÓúê £¬¾Í»á´¥·¢¶ñÒâVisual Basic (VB)¾ç±¾ £¬½ø¶øÏÂÔØ²¢Ö´ÐÐHTAÎļþºÍPowerShell¼ÓÔØÆ÷¡£ÕâЩ¾ç±¾Ô̺¬PowerRATµÄbase64±àÂëÊý¾Ý¿é £¬½âÂëºóÔÚÊܺ¦Õß»úеÉÏÖ´ÐС£³ýÁËϵͳ¿úËÅ £¬¸Ã¶ñÒâÈí¼þ»¹»áÍøÂçÇý¶¯Æ÷ÐòÁкŲ¢Ïνӵ½¶íÂÞ˹Զ³Ì·þÎñÆ÷½Ó¹ÜÖ¸Áî¡£Èôδ»ñÏìÓ¦ £¬ÔòÖ´ÐÐǶÈëµÄPowerShell¾ç±¾¡£DCRat×÷ΪһÖÖÄ£¿é»¯¶ñÒâÈí¼þ £¬ÄÜÇÔÈ¡Êý¾Ý¡¢²¶»ñÆÁÄ»½ØÍ¼ºÍ»÷¼ü £¬ÌṩԶ³Ì½ÚÔì £¬²¢ÏÂÔØÖ´ÐÐÆäËûÎļþ¡£


https://thehackernews.com/2024/10/gophish-framework-used-in-phishing.html


3. GrandoreiroÒøÐÐľÂí£ºÈ«Çò½ðÈÚÍþв³ÖÐøÉý¼¶


10ÔÂ22ÈÕ £¬¿¨°Í˹»ù³¢ÊÔÊÒ×î½ü°ä²¼µÄÒ»·Ý»ã±¨ÏÔʾ £¬GrandoreiroÒøÐÐľÂíÒѳÉΪȫÇò³Á´ó½ðÈÚÍþв¡£¸ÃľÂí·¢Ô´ÓÚ°ÍÎ÷ £¬×Ô2016ÄêÒÔÀ´Ò»Ïò»îÔ¾ £¬Ö¼ÔÚÇÔÈ¡ÒøÐÐÆ¾Ö¤²¢Èƹý°²È«´ëÊ©¡£Ö»¹Ü·¨Âɲ¿ÃÅÒÑÖÂÁ¦½ø¹¥ £¬µ«GrandoreiroµÄ¹¥»÷ÁìÓòÒÑÏÔÖøÀ©´ó £¬ÏÖÒÑÕë¶Ô45¸ö¹ú¶ÈµÄ1700¼ÒÒøÐкÍ276¸ö¼ÓÃÜÇ®±ÒÇ®°ü £¬ÏÔʾ³öÆäÕæÕýµÄÈ«ÇòÍþвÐÔ¡£ÔÚÎ÷°àÑÀ £¬GrandoreiroÔì³ÉµÄ¾­¼ÃËðʧ¹À¼Æ´ï350ÍòÅ·Ôª £¬µ«»ã±¨Ö¸³öÆä¿ÉÄÜ´øÀ´µÄÀûÈ󳬹ý1.1ÒÚÅ·Ôª¡£GrandoreiroľÂí²»ÐÝ´´ÐÂÕ½Êõ £¬Ê¹ÓÃÓòÌìÉúËã·¨´´½¨ÐµĺÅÁîºÍ½ÚÔì·þÎñÆ÷ £¬Ñ¡È¡ÃÜÎÄÇÔÈ¡¼ÓÃÜÔö³¤·ÖÎöÄÑ¶È £¬²¢ÒýÈëɳºÐ¶ã±Ü¼¼ÊõÈç¸ú×ÙÊó±êÒÆ¶¯ÒÔ·ÂÕպϷ¨Óû§½»»¥ £¬ºýŪ·´Ú²Æ­ÏµÍ³¡£ÆäÄ£¿é»¯¸öÐÔÔʺܶà¸ö²Ù×÷Ô±´´½¨Õë¶ÔÌØ¶¨µØÓò»ò½ðÈÚ»ú¹¹µÄË鯬»¯°æ±¾¡£×Ô2022ÄêÒÔÀ´ £¬¿¨°Í˹»ù¹Û²ìµ½¸ÃľÂí´´½¨Á˽ÏÓס¢½ÏÇáµÄ°æ±¾ £¬×¨Ò»ÓÚ½ÏÉÙµÄÖ¸±ê £¬³ö¸ñÊÇÔÚÄ«Î÷¸ç¡£Grandoreiroͨ³£ÒÔ¶ñÒâÈí¼þ¼´·þÎñµÄ´ó¾ÖÔËÐÐ £¬Æä´«²¼Êܵ½½ÚÔì £¬Ö»ÓÐÖµµÃÐÅÈεĺÏ×÷ͬ°éÄÜÁ¦½Ó¼ûÔ´´úÂë¡£


https://securityonline.info/1700-banks-45-countries-grandoreiro-trojan-expands-its-reach/


4. ºÚ¿ÍÀûÓÃgRPCºÍ̸ÔÚDocker APIÉϲ¿Êð¼ÓÃÜÇ®±ÒÍÚ¿ó·¨Ê½


10ÔÂ22ÈÕ £¬Trend Micro ×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÐÂÐÍÍøÂç¹¥»÷¼¿Á© £¬¹¥»÷ÕßÀûÓà Docker Ô¶³Ì API ·þÎñÆ÷É쵀 gRPC ºÍ̸£¨Í¨¹ý h2c Ã÷ÎÄ HTTP/2£©À´²¿Êð SRBMiner ¼ÓÃÜÇ®±ÒÍÚ¿ó·¨Ê½ £¬Ö¸±êÊÇÍÚ¾ò Ripple Labs ¿ª·¢µÄ XRP ¼ÓÃÜÇ®±Ò¡£¹¥»÷Á÷³ÌʼÓÚɨÃèÒ×Êܹ¥»÷µÄ Docker API ·þÎñÆ÷ £¬Ëæºó²é³­Æä¿ÉÓÃÐԺͰ汾 £¬²¢·¢ËÍ gRPC/h2c Éý¼¶ÒªÇóÒÔÔ¶³Ì°Ñ³Ö Docker Ö°Äܶø²»±»·¢ÏÖ¡£Ò»µ©³ÉÁ¢½ÚÔì £¬¹¥»÷Õß±ãʹÓúϷ¨»ù´¡Ó³Ïñ¹¹½¨ Docker Ó³Ïñ £¬ÔÚ /usr/sbin Ŀ¼Öв¿ÊðÍÚ¿ó·¨Ê½ £¬²¢´Ó GitHub ÏÂÔØ¶ñÒâÈí¼þ¡£ËûÃÇ»¹ÌṩÁË Ripple Ç®°üµØÖ·ÒÔÍøÂçÍÚ³öµÄ¼ÓÃÜÇ®±Ò¡£Õâ´Î¹¥»÷Ö®ËùÒÔÁîÈËÓÇÓô £¬ÊÇÓÉÓÚʹÓà h2c É쵀 gRPC ºÍ̸¿ÉÈÆ¹ý°²È«²ã £¬Ê¹°²È«¹¤¾ßÄÑÒÔ¼ì²âµ½¼ÓÃܿ󹤵IJ¿Êð¡£ÕâÅú×¢ÍøÂç·¸×ï·Ö×ÓµÄÕ½ÊõÔÚ²»ÐÝÑݱä £¬ËûÃÇÔÚѰÕÒ´´Ð²½ÖèÀ´ÀûÓà Docker µÈÈÝÆ÷»¯»·¾³¡£Òò¶ø £¬±£»¤ Docker Ô¶³Ì API ºÍ¼à¿ØÒì³£»î¶¯±äµÃÓÈΪ³ÁÒª¡£


https://securityonline.info/cryptojacking-alert-hackers-exploit-grpc-and-http-2-to-deploy-miners/


5. CISA½«Microsoft SharePoint·ì϶ÁÐΪÒÑÖª±»ÀûÓ÷ì϶


10ÔÂ23ÈÕ £¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Òѽ«Microsoft SharePointµÄÒ»¸ö·´ÐòÁл¯·ì϶CVE-2024-38094£¨CVSS v4ÆÀ·Ö£º7.2£©ÄÉÈëÆäÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ÖС£¸Ã·ì϶ÔÊÐíÕ¼ÓÐÕ¾µãËùÓÐÕßȨÏ޵Ĺ¥»÷Õßͨ¹ýSharePoint Server×¢Èë²¢Ö´ÐÐËÁÒâ´úÂë¡£¾Ý΢Èí²¼¸æ £¬´Ë·ì϶ԴÓÚSharePoint Server Search×é¼þµÄÊäÈëÑéÖ¤ÃýÎó £¬Ê¹µÃδ¾­Éí·ÝÑéÖ¤µÄÓû§Ò²ÄÜͨ¹ý·¢ËÍÌØÔìHTTPÒªÇóÀ´ÀûÓ÷ì϶ £¬½ø¶øÔÚ·þÎñÆ÷ÉÏÖ´ÐÐËÁÒâ´úÂë £¬¿ÉÄÜÊÕÊÜÕû¸öϵͳ¡£Æ¾¾ÝÓµÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸Áî22-01 £¬ÒªÇóÁª¹ú»ú¹¹£¨FCEB£©±ØÐëÔÚ»®¶¨½ØÖ¹ÈÕÆÚǰ½â¾öÒÑ·¢Ïֵķì϶ £¬ÒÔ±£»¤ÍøÂçÃâÊÜĿ¼Öзì϶µÄ¹¥»÷¡£CISA³ö¸ñÒªÇóÁª¹ú»ú¹¹ÔÚ2024Äê11ÔÂ12ÈÕǰ½¨¸´´ËSharePoint·ì϶¡£Í¬Ê± £¬×¨¼ÒÒ²½¨Òé¸öÈË×éÖ¯Éó²éCISAµÄ·ì϶Ŀ¼ £¬²¢ÊµÊ±½â¾öÆä»ù´¡ÉèÊ©ÖдæÔÚµÄÏàÓ¦·ì϶ £¬ÒÔÈ·±£ÍøÂ簲ȫ¡£


https://securityaffairs.com/170157/security/u-s-cisa-adds-microsoft-sharepoint-flaw-known-exploited-vulnerabilities-catalog.html


6. ±±·Çµç×Ó¾º¼¼Æ½Ì¨ESNAÓû§Êý¾ÝÔâºÚ¿Íй¶


10ÔÂ24ÈÕ £¬ÔÚ½ÇÖðǰϦ £¬ÃûΪ¡°Shooked¡±µÄºÚ¿ÍÓÚ2024Äê10ÔÂ23ÈÕÔÚBreach ForumsÉÏй¶Á˱±·Çµç×Ó¾º¼¼(ESNA)ƽ̨³¬¹ý18ÍòÃûÓû§µÄÓ×ÎÒÊý¾Ý £¬¸ÃÊý¾Ýת´¢´óÓ×Ϊ3GB £¬²¢Ðû³ÆÊÇ¡°ÆëÈ«Êý¾Ý¿â¡±¡£Õâ´Îй¶²úÉúÔÚESNA½ÇÖðÓÚĦÂå¸ç¿ªÈüµÄǰһÌì¡£ESNAÊÇÒ»¸öÖ¼ÔÚÍÆ½ø±±·ÇµØÓò¾º¼¼ÓÎÏ··¢Õ¹µÄƽ̨ £¬×éÖ¯ÁËÔ̺¬FC25¡¢Free Fire¡¢½ÖÍ·°ÔÍõ6µÈÈȵãÓÎÏ·µÄ½õ±êÈü¡£¾Ý·ÖÎö £¬Ð¹Â¶µÄÊý¾ÝÔ̺¬³¬¹ý900ÍòÐÐ £¬µ«È¥³ÁºóΨһÓû§¼Í¼Ϊ180,000Ìõ £¬Ô̺¬Óû§Éí·Ý¡¢¹ú¶È¡¢Óû§Ãû¡¢IPµØÖ·¡¢¹¦·ò´Á¡¢»á»°ID¡¢WordPress URLºÍµç×ÓÓʼþµØÖ·µÈÐÅÏ¢ £¬µ«²»Ô̺¬ÃÜÂë»ò²ÆÕþÐÅÏ¢¡£Ö»¹ÜÈç´Ë £¬Óû§ÈÔ±»½¨Òé¸ü¸ÄÃÜÂëÒÔ·ÀÍòÒ» £¬²¢¾¯Ìè¿ÉÄÜÓÉÕâ´Îй¶Òý·¢µÄÍøÂç´¹µö¹¥»÷¡£Ä¿Ç° £¬ESNA×éÖ¯ÉÐδ¶Ô´ËÊÂ×÷³ö»ØÓ¦ £¬µ«Óû§Ó¦Î¬³Ö¾¯Ìè £¬ÒÔ·ÀÍøÂç·¸×ï·Ö×ÓÀûÓÃÕâ´Îй¶½øÐжñÒâ»î¶¯¡£


https://hackread.com/hackers-leak-esport-north-africa-user-record-before-tournament/