¶íÂÞ˹ÒÉËÆÀûÓÃNTLMзì϶¶ÔÎÚ¿ËÀ¼·¢ÆðÍøÂç¹¥»÷

°ä²¼¹¦·ò 2024-11-15

1. ¶íÂÞ˹ÒÉËÆÀûÓÃNTLMзì϶¶ÔÎÚ¿ËÀ¼·¢ÆðÍøÂç¹¥»÷


11ÔÂ14ÈÕ £¬½üÈÕÒ»¸öÃûΪCVE-2024-43451µÄа²È«·ì϶ӰÏìÁËWindows NT LANÖÎÀíÆ÷£¨NTLM£© £¬¸Ã·ì϶±»ÒÉËÆÓë¶íÂÞ˹ÓйصÄÐÐΪÕßÀûÓÃΪÁãÈÕ·ì϶ £¬¶ÔÎÚ¿ËÀ¼·¢ÆðÍøÂç¹¥»÷¡£´Ë·ì϶±»¶¨ÃûΪNTLM¹þϣй¶ºýŪ·ì϶ £¬CVSSÆÀ·ÖΪ6.5 £¬¿É±»ÓÃÀ´ÇÔÈ¡Óû§µÄNTLMv2¹þÏ£¡£Î¢ÈíÒÑʵʱ½¨²¹Á˸÷ì϶ £¬²¢Ö¸³öÓû§Óë¶ñÒâÎļþ½øÐÐ×îÓ×½»»¥¶¼¿ÉÄÜ´¥·¢·ì϶¡£ÒÔÉ«ÁÐÍøÂ簲ȫ¹«Ë¾ClearSky·¢ÏÖ £¬¸Ã·ì϶Òѱ»ÓÃÓÚ´«²¼¿ªÔ´Spark RAT¶ñÒâÈí¼þµÄ¹¥»÷Á´ÖÐ £¬¶ñÒâÎļþÍйÜÔÚÎÚ¿ËÀ¼µ±¾Ö¹Ù·½ÍøÕ¾ÉÏ¡£¹¥»÷Á´Éæ¼°·¢ËÍÍøÂç´¹µöµç×ÓÓʼþ £¬ÌáÐÑÊÕ¼þÈ˵ã»÷ÏÝÚåURLÏÂÔØÔ̺¬¶ñÒâ.URLÎļþµÄZIP´æµµ¡£µ±Êܺ¦ÕßÓëURLÎļþ½»»¥Ê± £¬¾Í»á´¥·¢·ì϶ £¬µ¼ÖÂÏÂÔØÆäËûÓÐЧ¸ºÔØ £¬Ô̺¬Spark RAT¡£ÎÚ¿ËÀ¼ÍÆËã»úÓ¦¼±·´Ó³Ó××é(CERT-UA)½«´Ë»î¶¯Óë¿ÉÄܵĶíÂÞ˹ÍþвÐÐΪÕßUAC-0194ÁªÏµÆðÀ´ £¬²¢ÖÒ¸æ³Æ £¬ÆóÒµÓëÔ¶³ÌÒøÐÐϵͳºÏ×÷µÄ¹ÜÕÊ´¦Óڸ߷çÏÕÇø £¬×ʽð¿ÉÄÜÔڶ̹¦·òÄÚ±»µÁ¡£


https://thehackernews.com/2024/11/russian-hackers-exploit-new-ntlm-flaw.html


2. ¹þÂí˹¹ØÁªÍøÂç×éÖ¯WIRTEÕë¶ÔÒÔÉ«ÁÐÖ´ÐзÛËéÐÔ¹¥»÷


11ÔÂ13ÈÕ £¬¾ÝThe Hack News±¨Â· £¬Óë¹þÂí˹ÓйØÁªµÄÍøÂç¹¥»÷Õß½üÆÚרÃÅÕë¶ÔÒÔÉ«ÁÐʵÌå½øÐзÛËéÐÔ¹¥»÷¡£Check PointµÄ·ÖÎöÖ¸³ö £¬ÕâЩ¹¥»÷ÓëÒ»¸öÃûΪWIRTEµÄ×éÖ¯ÓÐ¹Ø £¬¸Ã×éÖ¯×Ô2018Äê8ÔÂÒÔÀ´Ò»Ïò»îÔ¾ÓÚÖж«µØÓò £¬Õë¶Ô¿í·ºÊµÌå·¢Æð¹¥»÷¡£WIRTEÀûÓÃÖж«µÄµØÔµÕþÖÎÑÏÖØ´óÊÆºÍÕ½ÂÒ £¬Ôì×÷¶ñÒâRARÎĵµ²¿ÊðHavocºóÆÚ¿ª·¢¿ò¼Ü £¬»òÀûÓÃÀàËÆµÄRARÎĵµ²¿ÊðIronWindÏÂÔØÆ÷¡£ÕâЩϰȾÐòÁÐͨ¹ý´«²¼´øÓкýŪÐÔµÄPDFÎĵµ £¬Ê¹ÓúϷ¨µÄ¿ÉÖ´ÐÐÎļþ²àÔØ´øÓжñÒâÈí¼þµÄDLL¡£ÔÚ2024Äê10ÔÂÕë¶ÔÒÔÉ«ÁÐÒ½ÔººÍÊÐÕþµ±¾ÖµÈ¶à¸ö×éÖ¯µÄÍøÂç´¹µö»î¶¯ÖÐ £¬ÉõÖÁ³öÏÖÁ˼ÙÒâÍøÂ簲ȫ¹«Ë¾ESETÔÚÒÔÉ«ÁкÏ×÷ÉÌ·¢³öµÄ´¹µöµç×ÓÓʼþ £¬ÆäÖÐÔ̺¬ÁËа汾µÄSameCoin Wiper £¬¸Ã°æ±¾³ýÁ˸²¸ÇÎļþ±í £¬»¹»áÅú¸ÄÊܺ¦Õßϵͳ²¼¾°ÏÔʾ¹þÂí˹¾üÊ·ÖÖ§Al-Qassam BrigadesµÄͼÏñ¡£¾Ý³Æ £¬¸Ã¹¥»÷×éÖ¯µÄWindows¼ÓÔØ·¨×´Ã²±¾¹¦·ò´Á±»¸ü¸ÄΪ¹þÂí˹¶ÔÒÔÉ«Áз¢ÆðºöÈ»¹¥ÊƵÄÈÕÆÚ £¬¶ø³õʼ½Ó¼ûý½éÔòÊǼÙÒâÒÔÉ«Áйú¶ÈÍøÂç¾ÖµÄµç×ÓÓʼþ¡£


https://thehackernews.com/2024/11/hamas-affiliated-wirte-employs-samecoin.html


3. Glove Stealer¶ñÒâÈí¼þ£º¿ÉÈÆ¹ýChrome App-Bound¼ÓÃÜÇÔÈ¡Cookie


11ÔÂ14ÈÕ £¬Glove Stealer ÊÇÒ»¿îеĶñÒâÈí¼þ £¬¿ÉÄÜÈÆ¹ý Google Chrome µÄ App-Bound ¼ÓÃÜ £¬ÇÔÈ¡ä¯ÀÀÆ÷ cookie¡£¸Ã¶ñÒâÈí¼þÓÉ Gen Digital °²È«×êÑÐÈËÔ±ÔÚµ÷²éÍøÂç´¹µö»î¶¯Ê±³õ´Î·¢ÏÖ £¬ËûÃÇÒÔΪËüÏà¶Ôµ¥Ò» £¬¿ÉÄÜ´¦ÓÚÔçÆÚ¿ª·¢½×¶Î¡£Glove Stealer ʹÓÃÉç»á¹¤³ÌÕ½ÊõÓÕÆ­Ç±ÔÚÊܺ¦Õß×°Öà £¬Äܹ»´Ó Firefox ºÍ»ùÓÚ Chromium µÄä¯ÀÀÆ÷£¨Èç Chrome¡¢Edge µÈ£©ÖÐÌáÈ¡ cookie £¬ÒÔ¼°ÇÔÈ¡ä¯ÀÀÆ÷À©´ó·¨Ê½ÖеļÓÃÜÇ®±ÒÇ®°ü¡¢2FA »á»°ÁîÅÆ¡¢ÃÜÂëÊý¾ÝµÈÃô¸ÐÐÅÏ¢¡£´Ë±í £¬Ëü»¹ÄÜ´Ó 280 ¸öä¯ÀÀÆ÷À©´óºÍ 80 ¶à¸ö±¾µØÀûÓ÷¨Ê½ÖÐÇÔÈ¡Êý¾Ý¡£ÎªÁËÈÆ¹ý Chrome µÄ App-Bound ¼ÓÃÜ £¬Glove Stealer ʹÓÃÁËÒ»¸öÖ§³ÖÄ£¿é £¬ÀûÓà Chrome µÄ IElevator Windows ·þÎñÀ´½âÃܺͼìË÷¼ÓÃÜÃÜÔ¿ £¬µ«±ØÒªÏÈ»ñµÃ±¾µØÖÎÀíԱȨÏÞ¡£Ö»¹ÜÕâÖÖ²½ÖèÔÚ¼¼ÊõÉÏÏà¶Ô»ù´¡ £¬µ«¶à¸öÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ²Ù×÷ÒѾ­¿ÉÄÜÈÆ¹ýÐµİ²È«Ö°ÄÜ £¬ÒÔÇÔÈ¡ºÍ½âÃÜ Google Chrome cookie¡£×Թȸè 7 Ô·ÝÖ´ÐÐ App-Bound ¼ÓÃÜÒÔÀ´ £¬¹¥»÷´ÎÊý²¢Î´Ï÷¼õ £¬·´¶øÓÐËùÔö³¤ £¬Í¨¹ý¸÷À෽ʽ¶Ô׼DZÔÚÊܺ¦Õß¡£


https://www.bleepingcomputer.com/news/security/new-glove-infostealer-malware-bypasses-google-chromes-cookie-encryption/


4. ÈðÊ¿ÍøÂç»ú¹¹¾¯Ê¾£º¼ÙÐÎÏóÓʼþ´«²¼¶ñÒâÈí¼þµÁÈ¡Ãô¸ÐÐÅÏ¢


11ÔÂ15ÈÕ £¬ÈðÊ¿Áª¹úÍøÂ簲ȫ¾Ö£¨OFCS£©13ÈÕ·¢³öÖÒ¸æ £¬³Æ¸Ã¹úÐÎÏó»ú¹¹µÄ¡°¼Ùº¯¼þ¡±±»ÓÃÀ´´«²¼¶ñÒâÈí¼þ¡£ÕâЩÓʼþÐû³ÆÌṩһ¿îÐÂÆøÏóÀûÓ÷¨Ê½MeteoSwiss £¬µ«Ô̺¬Ò»¸ö¶þάÂë £¬»á³Á¶¨Ïòµ½Ú²Æ­Õß¿ª·¢µÄ¶ñÒâÀûÓ÷¨Ê½¡£É¨Ãè¶þάÂëºó £¬ÊÖ»úÓû§»áÏÂÔØÃûΪ¡°Coper¡±ºÍ¡°Octo2¡±µÄ¶ñÒâÈí¼þ £¬¸Ã·¨Ê½ÊÔͼÇÔÈ¡Ô̺¬µç×ÓÒøÐÐÀûÓ÷¨Ê½ÔÚÄÚµÄ383¶à¸öÒÆ¶¯ÀûÓ÷¨Ê½µÄµÇ¼¾ßÌåÐÅÏ¢¡£¹ÌȻʹÓÃÏÖʵÊÀ½çµÄµö¶üÀ´Ï°È¾¶ñÒâÈí¼þµÄÇé¿ö²¢²»³£¼û £¬µ«²¢·ÇÎÅËùδÎÅ £¬Î¢Èí´ËÇ°Ò²ÔøÔâ·êÀàËÆÊÂÎñ¡£OFCSûÓÐй©ÊÜÓ°ÏìµÄÈËÊý £¬µ«°µÊ¾¼ÙðÀûÓ÷¨Ê½·ÂÕÕÁËÕæÕýµÄ¡°Alertswiss¡±ÀûÓ÷¨Ê½ £¬½öÓ°Ï찲׿ÊÖ»ú¡£½¨Òé×°ÖÃÁ˼ÙðÀûÓ÷¨Ê½µÄÓû§½«É豸¸´Ô­³ö³§ÉèÖà £¬²¢»ã±¨¸øOFCS¡£¸Ã»ú¹¹ÒѾ­ÆðÍ·Ö´Ðб£»¤´ëÊ©¡£


https://therecord.media/malware-delivered-by-mail-swiss-cyber-agency


5. ÐÙÑÀÀû¹ú·À²É¹º»ú¹¹Ôâ¹ú¼ÊºÚ¿Í×éÖ¯¹¥»÷


11ÔÂ15ÈÕ £¬ÐÙÑÀÀû¹ú·À²É¹º»ú¹¹£¨VB¨¹£©½üÈÕÔâµ½ÃûΪINC Ransomware»òINC RansomµÄ¹ú¼ÊÍøÂç·¸×ï×éÖ¯µÄ¹¥»÷¡£¸Ã×éÖ¯Ðû³ÆÄܹ»½Ó¼ûVB¨¹µÄÊý¾Ý £¬²¢ÔÚ°µÍøÃÅ»§ÍøÕ¾Éϰ䲼ÁËʾÀý½ØÍ¼¡£ÐÙÑÀÀû¹ú·À²¿»Ø¾øÐ¹Â©¿ÉÄܵÄÐÅϢй¶Çé¿ö £¬µ«È·Èϵ÷²éÔÚ½øÐÐÖÐ £¬²¢Ç¿µ÷VB¨¹²»´æ´¢Ãô¸ÐµÄ¾üÊÂÊý¾Ý¡£È»¶ø £¬×ÜÀíά¿ËÍÓפŷ¶û°àµÄÄ»Áų¤½«Õâ´ÎÏ®»÷¹é×ïÓڵжԵıí¹ú·Ç¹ú¶ÈºÚ¿Í×éÖ¯ £¬Ö¸³ö¿ÉÄܱ»½Ó¼ûµÄ×îÃô¸ÐÊý¾ÝÔ̺¬ÓйؾüʲɹºµÄ´òËãºÍÊý¾Ý¡£¾Ý±¨Â· £¬ºÚ¿ÍÈëÇÖÁ˸ûú¹¹µÄ·þÎñÆ÷ £¬ÏÂÔØ²¢¼ÓÃÜÁËËùÓÐÎļþ £¬²¢°ä²¼ÁËÔ̺¬ÐÙÑÀÀû¾ü¶Ó¿ÕÖкͽµØÄÜÁ¦Êý¾ÝµÄÎļþ½ØÍ¼ £¬ÒÔ¼°±êÓÓ×°·Ç¹«¿ª¡±µÄÎļþ £¬²¢Ë÷Òª500ÍòÃÀÔªÊê½ð¡£ÐÙÑÀÀû¹ÙԱδ¾ÍÊÇ·ñÓëºÚ¿Í½»Éæ°ä·¢ÆÀÂÛ¡£


https://therecord.media/hungary-defense-procurement-agency-hacked


6. Microsoft Power PagesÅäÖÃÃýÎóÖÂ700Íò±Ê¼Í¼¶³ö


11ÔÂ14ÈÕ £¬×êÑÐÈËÔ±·¢ÏÖ £¬Microsoft Power PagesÕâÒ»µÍ´úÂ빤¾ß´æÔÚ¶à¸öÅäÖÃÃýÎóʵÏÖµÄÎÊÌâ £¬¿ÉÄܵ¼Ö»úÃÜÊý¾Ý±»ÎÞÒâ½Ó¼û¡£Power Pages±»¿í·ºÀûÓÃÓÚµ±¾Ö¡¢½ÌÓýºÍ¸öÈË×éÖ¯µÈÁìÓò £¬µ«ÔÚһЩװÖÃÖÐ £¬ÅäÖÃÃýÎóµ¼ÖÂÔ¼700Íò±Ê¼Í¼¶³ö¡£ÎÊÌâÔ´ÓÚÓû§¶ÔÅäÖõÄÀí½â²»¼° £¬¶ø·Ç΢Èí²úÆ·×ÔÉíµÄÎÊÌ⡣΢ÈíÔÚDZÔÚÅäÖÃÎÊÌâʱ»á·¢³öÖÒ¸æ £¬µ«ÎÞ·¨È·±£Óû§×÷³ö·´Ó³¡£ÏÖ´ú¼¼ÊõʹµÃÃÅ»§¹¹½¨Ïà¶ÔÈÝÒ× £¬µ«°²È«ÐÔºÍÊØ»¤ÒÀÈ»¸´ÔÓ £¬µ¼ÖÂÖ´ÐкÍÊØ»¤Ö®¼ä²»Æ¥Åä £¬³¬³öÓйع«Ë¾ÄÜÁ¦ÁìÓòµÄ³õʼ»òгöÏÖµÄÃýÎóÅäÖ᣿ª·¢ÍŶӺͰ²È«ÍŶÓÖ®¼äµÄ¹ÂÁ¢¹ØÏµÒ²¼Ó¾çÁËÕâÒ»ÎÊÌâ¡£AppOmni·¢ÏÖµÄÎÊÌâÒÑÏòÊÜÓ°Ï칫˾»ã±¨²¢µÃµ½½¨¸´ £¬µ«³ÖÐø´æÔÚµÄÃýÎóÅäÖÃÎÊÌâÈÔÐè½â¾ö¡£ÏÖ´úµÍ´úÂë¼¼ÊõʹµÃ²»×ãרҵ֪ʶµÄÓû§¿ÉÄÜ¿ª·¢¸´ÔӵĽâ¾ö¹æ»® £¬Òò¶øÎÊÌâ¿ÉÄÜ»á³ÖÐø´æÔÚ¡£AppOmni½¨ÒéʹÓÿÉÄܼì²âÃýÎóÅäÖõÄϵͳ½øÐгÖÐø¼à¿Ø¡£


https://www.securityweek.com/low-code-high-risk-millions-of-records-exposed-via-misconfigured-microsoft-power-pages/