¶íÂÞ˹ÒÉËÆÀûÓÃNTLMзì϶¶ÔÎÚ¿ËÀ¼·¢ÆðÍøÂç¹¥»÷
°ä²¼¹¦·ò 2024-11-151. ¶íÂÞ˹ÒÉËÆÀûÓÃNTLMзì϶¶ÔÎÚ¿ËÀ¼·¢ÆðÍøÂç¹¥»÷
11ÔÂ14ÈÕ£¬½üÈÕÒ»¸öÃûΪCVE-2024-43451µÄа²È«·ì϶ӰÏìÁËWindows NT LANÖÎÀíÆ÷£¨NTLM£©£¬¸Ã·ì϶±»ÒÉËÆÓë¶íÂÞ˹ÓйصÄÐÐΪÕßÀûÓÃΪÁãÈÕ·ì϶£¬¶ÔÎÚ¿ËÀ¼·¢ÆðÍøÂç¹¥»÷¡£´Ë·ì϶±»¶¨ÃûΪNTLM¹þϣй¶ºýŪ·ì϶£¬CVSSÆÀ·ÖΪ6.5£¬¿É±»ÓÃÀ´ÇÔÈ¡Óû§µÄNTLMv2¹þÏ£¡£Î¢ÈíÒÑʵʱ½¨²¹Á˸÷ì϶£¬²¢Ö¸³öÓû§Óë¶ñÒâÎļþ½øÐÐ×îÓ×½»»¥¶¼¿ÉÄÜ´¥·¢·ì϶¡£ÒÔÉ«ÁÐÍøÂ簲ȫ¹«Ë¾ClearSky·¢ÏÖ£¬¸Ã·ì϶Òѱ»ÓÃÓÚ´«²¼¿ªÔ´Spark RAT¶ñÒâÈí¼þµÄ¹¥»÷Á´ÖУ¬¶ñÒâÎļþÍйÜÔÚÎÚ¿ËÀ¼µ±¾Ö¹Ù·½ÍøÕ¾ÉÏ¡£¹¥»÷Á´Éæ¼°·¢ËÍÍøÂç´¹µöµç×ÓÓʼþ£¬ÌáÐÑÊÕ¼þÈ˵ã»÷ÏÝÚåURLÏÂÔØÔ̺¬¶ñÒâ.URLÎļþµÄZIP´æµµ¡£µ±Êܺ¦ÕßÓëURLÎļþ½»»¥Ê±£¬¾Í»á´¥·¢·ì϶£¬µ¼ÖÂÏÂÔØÆäËûÓÐЧ¸ºÔØ£¬Ô̺¬Spark RAT¡£ÎÚ¿ËÀ¼ÍÆËã»úÓ¦¼±·´Ó³Ó××é(CERT-UA)½«´Ë»î¶¯Óë¿ÉÄܵĶíÂÞ˹ÍþвÐÐΪÕßUAC-0194ÁªÏµÆðÀ´£¬²¢ÖÒ¸æ³Æ£¬ÆóÒµÓëÔ¶³ÌÒøÐÐϵͳºÏ×÷µÄ¹ÜÕÊ´¦Óڸ߷çÏÕÇø£¬×ʽð¿ÉÄÜÔڶ̹¦·òÄÚ±»µÁ¡£
https://thehackernews.com/2024/11/russian-hackers-exploit-new-ntlm-flaw.html
2. ¹þÂí˹¹ØÁªÍøÂç×éÖ¯WIRTEÕë¶ÔÒÔÉ«ÁÐÖ´ÐзÛËéÐÔ¹¥»÷
11ÔÂ13ÈÕ£¬¾ÝThe Hack News±¨Â·£¬Óë¹þÂí˹ÓйØÁªµÄÍøÂç¹¥»÷Õß½üÆÚרÃÅÕë¶ÔÒÔÉ«ÁÐʵÌå½øÐзÛËéÐÔ¹¥»÷¡£Check PointµÄ·ÖÎöÖ¸³ö£¬ÕâЩ¹¥»÷ÓëÒ»¸öÃûΪWIRTEµÄ×éÖ¯Óйأ¬¸Ã×éÖ¯×Ô2018Äê8ÔÂÒÔÀ´Ò»Ïò»îÔ¾ÓÚÖж«µØÓò£¬Õë¶Ô¿í·ºÊµÌå·¢Æð¹¥»÷¡£WIRTEÀûÓÃÖж«µÄµØÔµÕþÖÎÑÏÖØ´óÊÆºÍÕ½ÂÒ£¬Ôì×÷¶ñÒâRARÎĵµ²¿ÊðHavocºóÆÚ¿ª·¢¿ò¼Ü£¬»òÀûÓÃÀàËÆµÄRARÎĵµ²¿ÊðIronWindÏÂÔØÆ÷¡£ÕâЩϰȾÐòÁÐͨ¹ý´«²¼´øÓкýŪÐÔµÄPDFÎĵµ£¬Ê¹ÓúϷ¨µÄ¿ÉÖ´ÐÐÎļþ²àÔØ´øÓжñÒâÈí¼þµÄDLL¡£ÔÚ2024Äê10ÔÂÕë¶ÔÒÔÉ«ÁÐÒ½ÔººÍÊÐÕþµ±¾ÖµÈ¶à¸ö×éÖ¯µÄÍøÂç´¹µö»î¶¯ÖУ¬ÉõÖÁ³öÏÖÁ˼ÙÒâÍøÂ簲ȫ¹«Ë¾ESETÔÚÒÔÉ«ÁкÏ×÷ÉÌ·¢³öµÄ´¹µöµç×ÓÓʼþ£¬ÆäÖÐÔ̺¬ÁËа汾µÄSameCoin Wiper£¬¸Ã°æ±¾³ýÁ˸²¸ÇÎļþ±í£¬»¹»áÅú¸ÄÊܺ¦Õßϵͳ²¼¾°ÏÔʾ¹þÂí˹¾üÊ·ÖÖ§Al-Qassam BrigadesµÄͼÏñ¡£¾Ý³Æ£¬¸Ã¹¥»÷×éÖ¯µÄWindows¼ÓÔØ·¨×´Ã²±¾¹¦·ò´Á±»¸ü¸ÄΪ¹þÂí˹¶ÔÒÔÉ«Áз¢ÆðºöÈ»¹¥ÊƵÄÈÕÆÚ£¬¶ø³õʼ½Ó¼ûý½éÔòÊǼÙÒâÒÔÉ«Áйú¶ÈÍøÂç¾ÖµÄµç×ÓÓʼþ¡£
https://thehackernews.com/2024/11/hamas-affiliated-wirte-employs-samecoin.html
3. Glove Stealer¶ñÒâÈí¼þ£º¿ÉÈÆ¹ýChrome App-Bound¼ÓÃÜÇÔÈ¡Cookie
11ÔÂ14ÈÕ£¬Glove Stealer ÊÇÒ»¿îеĶñÒâÈí¼þ£¬¿ÉÄÜÈÆ¹ý Google Chrome µÄ App-Bound ¼ÓÃÜ£¬ÇÔÈ¡ä¯ÀÀÆ÷ cookie¡£¸Ã¶ñÒâÈí¼þÓÉ Gen Digital °²È«×êÑÐÈËÔ±ÔÚµ÷²éÍøÂç´¹µö»î¶¯Ê±³õ´Î·¢ÏÖ£¬ËûÃÇÒÔΪËüÏà¶Ôµ¥Ò»£¬¿ÉÄÜ´¦ÓÚÔçÆÚ¿ª·¢½×¶Î¡£Glove Stealer ʹÓÃÉç»á¹¤³ÌÕ½ÊõÓÕÆÇ±ÔÚÊܺ¦Õß×°Öã¬Äܹ»´Ó Firefox ºÍ»ùÓÚ Chromium µÄä¯ÀÀÆ÷£¨Èç Chrome¡¢Edge µÈ£©ÖÐÌáÈ¡ cookie£¬ÒÔ¼°ÇÔÈ¡ä¯ÀÀÆ÷À©´ó·¨Ê½ÖеļÓÃÜÇ®±ÒÇ®°ü¡¢2FA »á»°ÁîÅÆ¡¢ÃÜÂëÊý¾ÝµÈÃô¸ÐÐÅÏ¢¡£´Ë±í£¬Ëü»¹ÄÜ´Ó 280 ¸öä¯ÀÀÆ÷À©´óºÍ 80 ¶à¸ö±¾µØÀûÓ÷¨Ê½ÖÐÇÔÈ¡Êý¾Ý¡£ÎªÁËÈÆ¹ý Chrome µÄ App-Bound ¼ÓÃÜ£¬Glove Stealer ʹÓÃÁËÒ»¸öÖ§³ÖÄ£¿é£¬ÀûÓà Chrome µÄ IElevator Windows ·þÎñÀ´½âÃܺͼìË÷¼ÓÃÜÃÜÔ¿£¬µ«±ØÒªÏÈ»ñµÃ±¾µØÖÎÀíԱȨÏÞ¡£Ö»¹ÜÕâÖÖ²½ÖèÔÚ¼¼ÊõÉÏÏà¶Ô»ù´¡£¬µ«¶à¸öÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ²Ù×÷ÒѾ¿ÉÄÜÈÆ¹ýÐµİ²È«Ö°ÄÜ£¬ÒÔÇÔÈ¡ºÍ½âÃÜ Google Chrome cookie¡£×Թȸè 7 Ô·ÝÖ´ÐÐ App-Bound ¼ÓÃÜÒÔÀ´£¬¹¥»÷´ÎÊý²¢Î´Ï÷¼õ£¬·´¶øÓÐËùÔö³¤£¬Í¨¹ý¸÷À෽ʽ¶Ô׼DZÔÚÊܺ¦Õß¡£
https://www.bleepingcomputer.com/news/security/new-glove-infostealer-malware-bypasses-google-chromes-cookie-encryption/
4. ÈðÊ¿ÍøÂç»ú¹¹¾¯Ê¾£º¼ÙÐÎÏóÓʼþ´«²¼¶ñÒâÈí¼þµÁÈ¡Ãô¸ÐÐÅÏ¢
11ÔÂ15ÈÕ£¬ÈðÊ¿Áª¹úÍøÂ簲ȫ¾Ö£¨OFCS£©13ÈÕ·¢³öÖҸ棬³Æ¸Ã¹úÐÎÏó»ú¹¹µÄ¡°¼Ùº¯¼þ¡±±»ÓÃÀ´´«²¼¶ñÒâÈí¼þ¡£ÕâЩÓʼþÐû³ÆÌṩһ¿îÐÂÆøÏóÀûÓ÷¨Ê½MeteoSwiss£¬µ«Ô̺¬Ò»¸ö¶þάÂ룬»á³Á¶¨Ïòµ½Ú²ÆÕß¿ª·¢µÄ¶ñÒâÀûÓ÷¨Ê½¡£É¨Ãè¶þάÂëºó£¬ÊÖ»úÓû§»áÏÂÔØÃûΪ¡°Coper¡±ºÍ¡°Octo2¡±µÄ¶ñÒâÈí¼þ£¬¸Ã·¨Ê½ÊÔͼÇÔÈ¡Ô̺¬µç×ÓÒøÐÐÀûÓ÷¨Ê½ÔÚÄÚµÄ383¶à¸öÒÆ¶¯ÀûÓ÷¨Ê½µÄµÇ¼¾ßÌåÐÅÏ¢¡£¹ÌȻʹÓÃÏÖʵÊÀ½çµÄµö¶üÀ´Ï°È¾¶ñÒâÈí¼þµÄÇé¿ö²¢²»³£¼û£¬µ«²¢·ÇÎÅËùδÎÅ£¬Î¢Èí´ËÇ°Ò²ÔøÔâ·êÀàËÆÊÂÎñ¡£OFCSûÓÐй©ÊÜÓ°ÏìµÄÈËÊý£¬µ«°µÊ¾¼ÙðÀûÓ÷¨Ê½·ÂÕÕÁËÕæÕýµÄ¡°Alertswiss¡±ÀûÓ÷¨Ê½£¬½öÓ°Ï찲׿ÊÖ»ú¡£½¨Òé×°ÖÃÁ˼ÙðÀûÓ÷¨Ê½µÄÓû§½«É豸¸´Ô³ö³§ÉèÖ㬲¢»ã±¨¸øOFCS¡£¸Ã»ú¹¹ÒѾÆðÍ·Ö´Ðб£»¤´ëÊ©¡£
https://therecord.media/malware-delivered-by-mail-swiss-cyber-agency
5. ÐÙÑÀÀû¹ú·À²É¹º»ú¹¹Ôâ¹ú¼ÊºÚ¿Í×éÖ¯¹¥»÷
11ÔÂ15ÈÕ£¬ÐÙÑÀÀû¹ú·À²É¹º»ú¹¹£¨VB¨¹£©½üÈÕÔâµ½ÃûΪINC Ransomware»òINC RansomµÄ¹ú¼ÊÍøÂç·¸×ï×éÖ¯µÄ¹¥»÷¡£¸Ã×éÖ¯Ðû³ÆÄܹ»½Ó¼ûVB¨¹µÄÊý¾Ý£¬²¢ÔÚ°µÍøÃÅ»§ÍøÕ¾Éϰ䲼ÁËʾÀý½ØÍ¼¡£ÐÙÑÀÀû¹ú·À²¿»Ø¾øÐ¹Â©¿ÉÄܵÄÐÅϢй¶Çé¿ö£¬µ«È·Èϵ÷²éÔÚ½øÐÐÖУ¬²¢Ç¿µ÷VB¨¹²»´æ´¢Ãô¸ÐµÄ¾üÊÂÊý¾Ý¡£È»¶ø£¬×ÜÀíά¿ËÍÓפŷ¶û°àµÄÄ»Áų¤½«Õâ´ÎÏ®»÷¹é×ïÓڵжԵıí¹ú·Ç¹ú¶ÈºÚ¿Í×éÖ¯£¬Ö¸³ö¿ÉÄܱ»½Ó¼ûµÄ×îÃô¸ÐÊý¾ÝÔ̺¬ÓйؾüʲɹºµÄ´òËãºÍÊý¾Ý¡£¾Ý±¨Â·£¬ºÚ¿ÍÈëÇÖÁ˸ûú¹¹µÄ·þÎñÆ÷£¬ÏÂÔØ²¢¼ÓÃÜÁËËùÓÐÎļþ£¬²¢°ä²¼ÁËÔ̺¬ÐÙÑÀÀû¾ü¶Ó¿ÕÖкͽµØÄÜÁ¦Êý¾ÝµÄÎļþ½ØÍ¼£¬ÒÔ¼°±êÓÓ×°·Ç¹«¿ª¡±µÄÎļþ£¬²¢Ë÷Òª500ÍòÃÀÔªÊê½ð¡£ÐÙÑÀÀû¹ÙԱδ¾ÍÊÇ·ñÓëºÚ¿Í½»Éæ°ä·¢ÆÀÂÛ¡£
https://therecord.media/hungary-defense-procurement-agency-hacked
6. Microsoft Power PagesÅäÖÃÃýÎóÖÂ700Íò±Ê¼Í¼¶³ö
11ÔÂ14ÈÕ£¬×êÑÐÈËÔ±·¢ÏÖ£¬Microsoft Power PagesÕâÒ»µÍ´úÂ빤¾ß´æÔÚ¶à¸öÅäÖÃÃýÎóʵÏÖµÄÎÊÌ⣬¿ÉÄܵ¼Ö»úÃÜÊý¾Ý±»ÎÞÒâ½Ó¼û¡£Power Pages±»¿í·ºÀûÓÃÓÚµ±¾Ö¡¢½ÌÓýºÍ¸öÈË×éÖ¯µÈÁìÓò£¬µ«ÔÚһЩװÖÃÖУ¬ÅäÖÃÃýÎóµ¼ÖÂÔ¼700Íò±Ê¼Í¼¶³ö¡£ÎÊÌâÔ´ÓÚÓû§¶ÔÅäÖõÄÀí½â²»¼°£¬¶ø·Ç΢Èí²úÆ·×ÔÉíµÄÎÊÌ⡣΢ÈíÔÚDZÔÚÅäÖÃÎÊÌâʱ»á·¢³öÖҸ棬µ«ÎÞ·¨È·±£Óû§×÷³ö·´Ó³¡£ÏÖ´ú¼¼ÊõʹµÃÃÅ»§¹¹½¨Ïà¶ÔÈÝÒ×£¬µ«°²È«ÐÔºÍÊØ»¤ÒÀÈ»¸´ÔÓ£¬µ¼ÖÂÖ´ÐкÍÊØ»¤Ö®¼ä²»Æ¥Å䣬³¬³öÓйع«Ë¾ÄÜÁ¦ÁìÓòµÄ³õʼ»òгöÏÖµÄÃýÎóÅäÖ᣿ª·¢ÍŶӺͰ²È«ÍŶÓÖ®¼äµÄ¹ÂÁ¢¹ØÏµÒ²¼Ó¾çÁËÕâÒ»ÎÊÌâ¡£AppOmni·¢ÏÖµÄÎÊÌâÒÑÏòÊÜÓ°Ï칫˾»ã±¨²¢µÃµ½½¨¸´£¬µ«³ÖÐø´æÔÚµÄÃýÎóÅäÖÃÎÊÌâÈÔÐè½â¾ö¡£ÏÖ´úµÍ´úÂë¼¼ÊõʹµÃ²»×ãרҵ֪ʶµÄÓû§¿ÉÄÜ¿ª·¢¸´ÔӵĽâ¾ö¹æ»®£¬Òò¶øÎÊÌâ¿ÉÄÜ»á³ÖÐø´æÔÚ¡£AppOmni½¨ÒéʹÓÿÉÄܼì²âÃýÎóÅäÖõÄϵͳ½øÐгÖÐø¼à¿Ø¡£
https://www.securityweek.com/low-code-high-risk-millions-of-records-exposed-via-misconfigured-microsoft-power-pages/


¾©¹«Íø°²±¸11010802024551ºÅ