OpenAI ×èÖ¹³¯ÏʺڿÍÀûÓà ChatGPT ½øÐжñÒâ»î¶¯
°ä²¼¹¦·ò 2025-02-251. OpenAI ×èÖ¹³¯ÏʺڿÍÀûÓà ChatGPT ½øÐжñÒâ»î¶¯
2ÔÂ24ÈÕ£¬OpenAI ½üÆÚ²ÉÈ¡Ðж¯£¬×èÖ¹Á˶à¸ö³¯ÏʺڿÍ×éÖ¯ÀûÓÃChatGPTƽ̨×êÑн«À´¹¥»÷Ö¸±ê¼°ÈëÇÖÍøÂç²½Öè¡£ÔÚÆä2025Äê2ÔµÄÍþвµý±¨»ã±¨ÖУ¬OpenAIÖ¸³öÒÑ·â½ûÓ볯ÏÊÃñÖ÷Ö÷ÒåÈËÃñ¹²ºÍ¹ú£¨DPRK£©´ÓÊôÍþв×éÖ¯ÓйØÁªµÄÕË»§£¬ÕâЩÕË»§Éæ¼°VELVET CHOLLIMAºÍSTARDUST CHOLLIMAµÈºÚ¿Í×éÖ¯¡£ÕâЩÕË»§Í¨¹ýʹÓÃChatGPT²éÕÒ¼ÓÃÜÇ®±ÒÓйØÐÅÏ¢¡¢×·Çó±àÂëÔ®ÊÖ¼°×êÑÐÔ¶³ÌÖÎÀí¹¤¾ßµÈ·½Ê½£¬ÊÔͼ½øÐжñÒâ»î¶¯¡£OpenAI»¹·¢ÏÖ£¬³¯Ïʹ¥»÷ÕßÔÚÀûÓÃChatGPTµ÷ÊÔ¹¥»÷¼¼Êõʱ£¬Ð¹Â¶ÁËδ֪¶ñÒâ¶þ½øÔìÎļþµÄÔÝ´æURL£¬ÓйØÐÅÏ¢ÒÑÌá½»¸ø°²È«ÉçÇø¹²Ïí¡£´Ë±í£¬³¯Ïʺڿͻ¹Í¨¹ýChatGPTѯÎÊÀûÓ÷¨Ê½·ì϶¡¢¿ª·¢RDP¿Í»§¶Ë¡¢ÒªÇóÈÆ¹ý°²È«ÖÒ¸æµÄ´úÂë¡¢±àдPowerShell¾ç±¾ÒÔ¼°Éè¼ÆÍøÂç´¹µöÓʼþµÈ¡£OpenAI»¹²»ÈÝÁËÓëDZÔÚ³¯ÏÊIT¹¤ÈË´òËãÓйصÄÕË»§£¬¸Ã´òËãÖ¼ÔÚͨ¹ý¹ÍÓ¶³¯Ïʱ¨´ðƽÈÀÕþȨ»ñÈ¡ÊÕÈë¡£
https://www.bleepingcomputer.com/news/security/openai-bans-chatgpt-accounts-used-by-north-korean-hackers/
2. ¶íÂÞ˹NKTsKIÖҸ棺ÐÅ´û½ðÈÚÒµIT·þÎñÌṩÉÌLANITÔâ¹¥»÷
2ÔÂ24ÈÕ£¬¶íÂÞ˹¹ú¶ÈÍÆËã»úÊÂÎñе÷ÖÐÐÄ(NKTsKI)ÏòÐÅ´ûºÍ½ðÈÚ²¿ÃÅ×éÖ¯·¢³öÖҸ棬ָ³ö¶íÂÞË¹ÖØÒªIT·þÎñºÍÈí¼þÌṩÉÌLANIT´æÔÚÎ¥¹æÐÐΪ£¬ÆäÆìÏÂרÃÅ´ÓÊÂÒøÐм¼ÊõºÍ·þÎñµÄLLC LANTERºÍLLC LAN ATMservice¿ÉÄÜÓÚ2025Äê2ÔÂ21ÈÕÔâ·ê¹¥»÷¡£LANIT¼¯ÍÅÊǶíÂÞ˹³ÁÒªµÄϵͳ¼¯³ÉÉÌ£¬¿Í»§Ô̺¬¶íÂÞ˹¹ú·À²¿µÈ³ÛÃûʵÌ壬Òò¶øÓÚ2024Äê5ÔÂÊܵ½ÃÀ¹ú²ÆÕþ²¿Ôì²Ã¡£NKTsKI½¨ÒéËùÓпÉÄÜÊÜÓ°ÏìµÄ×éÖ¯ÂÖ»»ÃÜÂëºÍ½Ó¼ûÃÜÔ¿£¬²¢¸ü¸ÄÔ¶³Ì½Ó¼ûÍ´´¦£¬Í¬Ê±¼ÓÇ¿¶ÔLANIT¼¯ÍŹ«Ë¾¹¤³Ìʦ¿ª·¢¡¢²¿Êð»òÊØ»¤µÄϵͳÖеÄÍþвºÍÐÅÏ¢°²È«ÊÂÎñµÄ¼à¿Ø¡£È»¶ø£¬NKTsKIÉÐδй©¹¥»÷ÕßµÄÈëÇÖ·½Ê½¡¢ÈëÇÖ¹¦·ò¡¢±»µÁÊý¾ÝÒÔ¼°¹¥»÷ÕßÉí·Ý¡£½üÆÚ£¬¶íÂÞ˹ATMÔËÓªÉ̺ÍÒøÐÐÂŴγÉΪÎÚ¿ËÀ¼ºÚ¿ÍµÄÖ¸±ê£¬¶øÕâ´ÎÖÐÑë·þÎñÌṩÉ̵Äϵͳ±»ÉøÈ룬¿ÉÄÜÒý·¢¿í·ºµÄ¹©¸øÁ´ÇÖº¦¡£
https://www.bleepingcomputer.com/news/security/russia-warns-financial-sector-of-major-it-service-provider-hack/
3. °Äµ±¾Ö²»ÈÝ¿¨°Í˹»ù²úÆ·£¬Ö¸Æä×é³É³Á´ó°²È«·çÏÕ
2ÔÂ24ÈÕ£¬°Ä´óÀûÑǵ±¾Ö½üÆÚ²»ÈÝÆäϵͳºÍÉ豸ʹÓÿ¨°Í˹»ù³¢ÊÔÊÒµÄËùÓвúÆ·ºÍÍøÂç·þÎñ£¬ÕâÒ»¾ö¶¨ÊÇ»ùÓÚÄÚÕþ²¿¶Ô¿¨°Í˹»ù×é³ÉµÄ°²È«·çÏյķÖÎö¡£ÄÚÕþ²¿²¿³¤Ë¹µÙ·ÒÄÝ¡¤¸£Ë¹ÌØÖ¸³ö£¬Ê¹Óÿ¨°Í˹»ùµÄ²úÆ·ºÍ·þÎñ¶Ô°Ä´óÀûÑǵ±¾Ö¡¢ÍøÂçºÍÊý¾Ý×é³ÉÁ˲»³É½ÓÊܵݲȫ·çÏÕ£¬ÕâЩ·çÏÕÖØÒªÔ´ÓÚ±í¹ú¹ýÎÊ¡¢¼äµýºÍ·ÛËéµÄÍþв¡£Òò¶ø£¬ËùÓзǹ«Ë¾ÐÍÁª¹úʵÌå±»ÒªÇó¼ø±ð²¢É¾³ý¿¨°Í˹»ùµÄËùÓÐÊ·ý£¬²¢Ô¤·À½«À´×°Ö᣿¨°Í˹»ù·½Ãæ¶Ô´Ë°µÊ¾ÒìÒ飬³ÆÕâЩָ¿ØÃ»ÓоßÌåÖ¤¾ÝÖ§³Ö£¬²¢ÒÔΪÕâ´Î½ûÁî´¿Õý³öÓÚÕþÖÎÔÒò£¬Ã»Óеõ½¹«Ë¾²úÆ·¼¼ÊõÆÀ¹ÀµÄÖ§³Ö¡£ÕâÒ»Ðж¯ÊÇ¼ÌÆäËûÎ÷·½¹ú¶È³öÓÚÀàËÆÓÇÓô²ÉÈ¡ÀàËÆÐж¯Ö®ºóµÄÓÖÒ»°¸Àý£¬Ô̺¬ÃÀ¹ú¡¢µÂ¹úºÍ¼ÓÄôóµÈ¹úÒѾ»ò½¨Òé²»ÈÝÔÚµ±¾Öϵͳ»òÆóÒµÖÐʹÓÿ¨°Í˹»ù²úÆ·¡£
https://www.bleepingcomputer.com/news/security/australia-bans-all-kaspersky-products-on-government-systems/
4. ½©Ê¬ÍøÂçÀûÓÃ13ÍòÊÜϰȾÉ豸¶ÔM365½øÐÐÃÜÂëÅçÈ÷¹¥»÷
2ÔÂ24ÈÕ£¬Ò»¸öÓɳ¬¹ý130,000̨ÊÜϰȾÉ豸×é³ÉµÄ½©Ê¬ÍøÂçÕý¶ÔÈ«ÇòMicrosoft 365£¨M365£©ÕÊ»§½øÐÐÃÜÂëÅçÈ÷¹¥»÷£¬ÖØÒªÖ¸±êÊÇÀûÓûù×ÔÉí·ÝÑéÖ¤£¨Basic Auth£©Ìӱܶà³É·ÖÉí·ÝÑéÖ¤£¨MFA£©±£»¤¡£¾ÝSecurityScorecard»ã±¨£¬¹¥»÷Õßͨ¹ýÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»ñȡƾ֤£¬ÀûÓ÷ǽ»»¥Ê½µÇ¼³¢ÊÔÈÆ¹ýMFA£¬ÔÚ²»´¥·¢°²È«¾¯±¨µÄÇé¿öÏ»ñȡδ¾ÊÚȨµÄ½Ó¼û¡£»ù×ÔÉí·ÝÑéÖ¤ÊÇÒ»ÖÖ¹ýÆÚµÄÉí·ÝÑéÖ¤²½Ö裬΢ÈíÒÑ´òËãÔÚ2025Äê9ÔÂÆúÓ㬵«Ä¿Ç°ÔÚijЩ»·¾³ÖÐÈÔÆôÓã¬Ê¹Æä³ÉΪ¹¥»÷ÕßµÄÖØÒªÖ¸±ê¡£¸Ã½©Ê¬ÍøÂçʹÓó£Óûòй¶µÄÃÜÂë³¢ÊÔ¹¥»÷´óÁ¿ÕÊ»§£¬Ò»µ©Æ¾Ö¤µÃµ½ÑéÖ¤£¬¹¥»÷Õß¼´¿É½Ó¼û¾Éʽ·þÎñ»òÔÚ¸ü¸´ÔÓµÄÍøÂç´¹µö¹¥»÷ÖлñµÃÆëÈ«½Ó¼ûȨÏÞ¡£SecurityScorecardÖ¸³ö£¬¸Ã½©Ê¬ÍøÂçµÄÔËÓªÕßͨ¹ýÃÀ¹ú¹©¸øÉÌÍйܵĺÅÁîºÍ½ÚÔì·þÎñÆ÷ÔËÐУ¬²¢Ê¹ÓÃÓëÖйúÓйصÄÔÆ·þÎñ´úÀíÁ÷Á¿¡£×éÖ¯Ó¦½ûÓÃM365ÖеĻù×ÔÉí·ÝÑéÖ¤£¬×èÖ¹ÓйØIPµØÖ·£¬ÆôÓÃǰÌá½Ó¼ûÕ½Êõ²¢ÔÚËùÓÐÕÊ»§ÉÏʹÓÃMFAÒÔ¼ÓÇ¿°²È«ÐÔ¡£
https://www.bleepingcomputer.com/news/security/botnet-targets-basic-auth-in-microsoft-365-password-spray-attacks/
5. ºÚ¿ÍÀûÓà Google Docs ºÍ Steam ´«²¼ ACRStealer ÐÅÏ¢ÇÔÈ¡·¨Ê½
2ÔÂ24ÈÕ£¬AhnLab°²È«µý±¨ÖÐÐÄ(ASEC)·¢ÏÖ£¬ÐÂÐÍÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þACRStealerÕýÀûÓÃGoogle DocsºÍSteamµÈºÏ·¨Æ½Ì¨½øÐй¥»÷£¬×Ô2025ÄêÒÔÀ´´«²¼Á¿ÏÔÖøÔö³¤¡£¸Ã¶ñÒâÈí¼þͨ¹ýÈí¼þÆÆ½âºÍÃÜÔ¿ÌìÉúÆ÷½øÐд«²¼£¬¼Ù×°³É·¸·¨·¨Ê½£¬¿ÉÄܼì²â·À²¡¶¾½â¾ö¹æ»®¡¢ÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°ü¡¢µÇ¼ʹ´¦¡¢ä¯ÀÀÆ÷Êý¾ÝµÈ£¬Ê¹ÍøÂç·¸×ï·Ö×Ó¿ÉÄܶÔ×¼½ðÈÚ×ʲúºÍÓ×ÎÒÕË»§¡£ACRStealerʹÓÃDead Drop Resolver(DDR)²½Öè½øÐÐC2·þÎñÆ÷ͨѶ£¬Í¨¹ýÁªÏµºÏ·¨·þÎñ¼ìË÷C2·þÎñÆ÷µÄÓò£¬ÔÊÐí¹¥»÷ÕßÇáËɸü¸ÄC2Óò¶øÎÞÐè¸üжñÒâÈí¼þ×ÔÉí¡£ËüÒÔ¶ñÒâÈí¼þ¼´·þÎñ(MaaS)´ó¾ÖÔËÐУ¬Ê¹Ï°È¾×·×Ù±äµÃÄÑÌ⡣ΪԤ·ÀϰȾ£¬½¨ÒéÔ¤·À½Ó¼û·Ö·¢ÆÆ½â·¨Ê½ºÍÃÜÔ¿ÌìÉúÆ÷µÄÍøÕ¾£¬½ö´Ó¹Ù·½ÆðÔ´ÏÂÔØÈí¼þ£¬ÉóÉ÷¶Ô´ýδ¾ÒªÇóµÄͨѶÖеÄÁ´½ÓºÍ¸½¼þ£¬ÆôÓöà³É·ÖÉí·ÝÑéÖ¤£¬²¢ÊØ»¤ÓÐЧµÄ·´¶ñÒâÈí¼þ½â¾ö¹æ»®¡£
https://hackread.com/hackers-google-docs-steam-drop-acrstealer-infostealer/
6. Fluent Bit ¹Ø¼ü0-day·ì϶ÍþÐ²ÔÆ»ù´¡ÉèÊ©°²È«
2ÔÂ24ÈÕ£¬×êÑÐÈËÔ±·¢ÏÖÁËFluent BitÖеÄÁ½¸ö¹Ø¼ü0-day·ì϶£¨CVE-2024-50608ºÍCVE-2024-50609£©£¬ÕâÁ½¸ö·ì϶µÄCVSSÆÀ·ÖΪ8.9£¬Ó°ÏìÁË¿í·ºÀûÓÃÓÚAWS¡¢Google CloudºÍMicrosoft AzureµÈÔÆ·þÎñÌṩÉ̵ÄÔÆ»ù´¡ÉèÊ©ÖеÄÈÕÖ¾ÍøÂ繤¾ß¡£ÕâЩ·ì϶ÀûÓÃÁËFluent BitµÄPrometheus Remote WriteºÍOpenTelemetry²å¼þÖеĿÕÖ¸Õë½âÒýÓÃÈõµã£¬¿ÉÄܵ¼Ö·þÎñÆ÷±ÀÀ£¡¢»Ø¾ø·þÎñ¹¥»÷»òÃô¸ÐÐÅϢй¶¡£Fluent BitÕ¼Óг¬¹ý150ÒÚ´ÎÏÂÔØºÍÖðÈÕ1000Íò´Î²¿Ê𣬶ÔÈ«ÇòÆóÒµºÍÔÆÉú̬ϵͳ×é³ÉÑϳÁÍþв¡£¹¥»÷ÕßÀûÓÃÕâЩ·ì϶¿ÉÄÜ»á·ÛËéÈÕÖ¾¹Ü·£¬Ó°ÏìÊÂÎñÏìÓ¦ºÍºÏ¹æ¹¤×÷Á÷³Ì¡£Fluent BitÊØ»¤ÕßÒѰ䲼²¹¶¡½øÐн¨¸´£¬²¢½¨ÒéÆóÒµµ±¼´ÎªFluent BitÊ·ý´ò²¹¶¡¡¢ÏÞ¶ÈAPI½Ó¼û¡¢½ûÓÃδʹÓõĶ˵㣬²¢ÉóºËÅäÖá¢Ô׸î¼à¿ØÍøÂ磬ѡȡ³ÖÐøµÄÍÌͲâÊÔÕ½Êõ¡£Ö»¹ÜÐÐÒµÓëÔÆ·þÎñÌṩÉ̺Ï×÷°ä²¼²¹¶¡£¬µ«¼øÓÚÖðÈÕÓдóÁ¿²¿ÊðÃæ¶Ô·çÏÕ£¬Î´´ò²¹¶¡µÄϵͳÏìÓ¦¹¦·ò¼«ÆäÓÐÏÞ¡£
https://cybersecuritynews.com/fluent-bit-0-day-vulnerabilities-exposes-billions-of-production-environments/


¾©¹«Íø°²±¸11010802024551ºÅ