AIÓïÒôÌìÉúÆ÷Ó¦ÓóÌÐò±»ÓÃÀ´Í¶·ÅGipy¶ñÒâÈí¼þ

Ðû²¼Ê±¼ä 2024-05-28
1. AIÓïÒôÌìÉúÆ÷Ó¦ÓóÌÐò±»ÓÃÀ´Í¶·ÅGipy¶ñÒâÈí¼þ


5ÔÂ26ÈÕ£¬£¬ £¬£¬Gipy ÊÇ×î½ü·¢Ã÷µÄÒ»ÖÖʹÓÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄ¹¥»÷»î¶¯£¬£¬ £¬£¬ËüÒԵ¹ú¡¢¶íÂÞ˹¡¢Î÷°àÑÀºĮ́ÍåµÄÓû§ÎªÄ¿µÄ£¬£¬ £¬£¬²¢ÔÊÐíÌṩ AI ÓïÒôת»»Ó¦ÓóÌÐò×÷ÎªÍøÂç´¹ÂÚÓÕ¶ü¡£¡£¡£¡£¡£¡£¡£¿£¿ £¿¨°Í˹»ùµÄÑо¿Ö°Ô±ÌåÏÖ£¬£¬ £¬£¬Gipy ¶ñÒâÈí¼þÓÚ 2023 ÄêÍ·Ê״ηºÆð£¬£¬ £¬£¬Ò»µ©½»¸¶£¬£¬ £¬£¬¹¥»÷Õß±ã¿ÉÒÔÇÔÈ¡Êý¾Ý¡¢ÍÚ¾ò¼ÓÃÜÇ®±Ò²¢ÔÚÊܺ¦ÕßµÄϵͳÉÏ×°ÖÃÆäËû¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ú¹ÊͳÆ£¬£¬ £¬£¬ÔÚÕâÖÖÇéÐÎÏ£¬£¬ £¬£¬ÍþвÐÐΪÕßÒÔÕýµ±µÄÈ˹¤ÖÇÄÜÓïÒôÐÞ¸ÄÓ¦ÓóÌÐòµÄÔÊÐíÀ´ÒýÓÕÊܺ¦Õß¡£¡£¡£¡£¡£¡£¡£¿£¿ £¿¨°Í»ùÍŶÓÔö²¹Ëµ£¬£¬ £¬£¬Ò»µ©Óû§×°ÖøÃÓ¦ÓóÌÐò£¬£¬ £¬£¬Ó¦ÓóÌÐò¾Í»á×îÏȰ´ÔÊÐíÔËÐУ¬£¬ £¬£¬Í¬Ê±£¬£¬ £¬£¬Gipy ¶ñÒâÈí¼þÒ²»áÔÚºǫ́ÔËÐС£¡£¡£¡£¡£¡£¡£


https://www.darkreading.com/threat-intelligence/ai-voice-generator-used-to-drop-gipy-malware


2. ÓÃÓÚÈö²¥ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÐéα AV ÍøÕ¾


5ÔÂ26ÈÕ£¬£¬ £¬£¬ÍþвÐÐΪÕßʹÓÃαװ³É Avast¡¢Bitdefender ºÍ Malwarebytes Õýµ±·À²¡¶¾²úÆ·µÄÐéα AV ÍøÕ¾À´·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£2024 Äê 4 ÔÂÖÐÑ®£¬£¬ £¬£¬Trellix ¸ß¼¶Ñо¿ÖÐÐÄÍŶӵÄÑо¿Ö°Ô±·¢Ã÷Á˶à¸öÓÃÓÚ·Ö·¢ÐÅÏ¢ÇÔÈ¡³ÌÐòµÄÐéα AV ÍøÕ¾¡£¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÍøÕ¾ÍйÜÁËÖØ´óµÄ¶ñÒâÎļþ£¬£¬ £¬£¬ÀýÈç APK¡¢EXE ºÍ Inno ×°ÖÃ×°ÖóÌÐò£¬£¬ £¬£¬°üÀ¨Ìع¤ºÍÇÔÈ¡³ÌÐò¹¦Ð§¡£¡£¡£¡£¡£¡£¡£ÕâЩÐéÎ±ÍøÕ¾Î±×°³É Avast¡¢Bitdefender ºÍ Malwarebytes µÄÕýµ±·À²¡¶¾²úÆ·¡£¡£¡£¡£¡£¡£¡£ÍйܶñÒâÈí¼þµÄÍøÕ¾ÊÇ avast-securedownload.com (Avast.apk)¡¢bitdefender-app.com (setup-win-x86-x64.exe.zip)¡¢malwarebytes.pro (MBSetup.rar)¡£¡£¡£¡£¡£¡£¡£×¨¼Ò»¹·¢Ã÷ÁËÒ»¸öαװ³ÉÕýµ±³ÌÐò (AMCoreDat.exe) µÄ¶ñÒâ Trellix ¶þ½øÖÆÎļþ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±²¢Î´½«ÕâЩ¹¥»÷¹é×ïÓÚÌØ¶¨µÄÍþвÐÐΪÕß¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æ»¹ÁгöÁËʹÓÃÐéα AV ÍøÕ¾¾ÙÐеĹ¥»÷µÄΣº¦Ö¸±ê (IoC)¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/163673/cyber-crime/fake-av-websites-distribute-malware.html


3. ºÚ¿ÍʹÓÃľÂí²¡¶¾¿Ë¡°æ¡°É¨À×Õß¡±¹¥»÷½ðÈÚ»ú¹¹


5ÔÂ26ÈÕ£¬£¬ £¬£¬ºÚ¿ÍÕýÔÚʹÓÃ΢Èí¾­µäÓÎϷɨÀ×µÄ Python ¿Ë¡´úÂëÀ´Òþ²Ø¶ñÒâ¾ç±¾£¬£¬ £¬£¬ÒÔ¹¥»÷Å·ÖÞºÍÃÀ¹úµÄ½ðÈÚ»ú¹¹¡£¡£¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼µÄ CSIRT-NBU ºÍ CERT-UA ½«ÕâЩ¹¥»÷¹é×ïÓÚÒ»¸ö±»×·×ÙΪ¡°UAC-0188¡±µÄÍþвÐÐΪÕߣ¬£¬ £¬£¬ËûʹÓÃÕýÏÖ´úÂëÀ´Òþ²ØÏÂÔØºÍ×°Öà SuperOps RMM µÄ Python ¾ç±¾¡£¡£¡£¡£¡£¡£¡£Superops RMM ÊÇÒ»¿îÕýµ±µÄÔ¶³ÌÖÎÀíÈí¼þ£¬£¬ £¬£¬¿ÉÈÃÔ¶³Ì¼ÓÈëÕßÖ±½Ó»á¼ûÊÜѬȾµÄϵͳ¡£¡£¡£¡£¡£¡£¡£CERT-UA ±¨¸æ³Æ £¬£¬ £¬£¬ÔÚÊ״η¢Ã÷´Ë´Î¹¥»÷Ö®ºó¾ÙÐеÄÑо¿ÏÔʾ£¬£¬ £¬£¬Å·ÖÞºÍÃÀ¹úµÄ½ðÈںͰü¹Ü»ú¹¹ÖÐÖÁÉÙ±£´æÎåÆðÓÉÏàͬÎļþÒý·¢µÄDZÔÚÎó²î¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-phish-finance-orgs-using-trojanized-minesweeper-clone/


4. CERT-UA ÖÒÑÔÍþвÐÐΪÕß UAC-0006 ÌᳫµÄ¶ñÒâÈí¼þ»î¶¯


5ÔÂ26ÈÕ£¬£¬ £¬£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±·´Ó¦Ð¡×é (CERT-UA) ÖÒÑԳƣ¬£¬ £¬£¬ÓëÒÔ¾­¼ÃΪĿµÄµÄÍþвÐÐΪÕßUAC-0006Ïà¹ØµÄÍøÂç¹¥»÷¼¤Ôö¡£¡£¡£¡£¡£¡£¡£UAC-0006 ×Ô 2013 ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßרעÓÚÈëÇÖ»á¼ÆÊ¦µÄСÎÒ˽¼ÒµçÄÔ£¨ÓÃÓÚÖ§³Ö½ðÈڻ£¬£¬ £¬£¬ÀýÈç»á¼ûÔ¶³ÌÒøÐÐϵͳ£©¡¢ÇÔȡƾ֤ÒÔ¼°¾ÙÐÐδ¾­ÊÚȨµÄ×ʽð×ªÒÆ¡£¡£¡£¡£¡£¡£¡£Õþ¸®×¨¼Ò±¨¸æ³Æ£¬£¬ £¬£¬×Ô 5 Ô 20 ÈÕÒÔÀ´£¬£¬ £¬£¬¸Ã×éÖ¯¾ÙÐÐÁËÖÁÉÙÁ½´Î´ó¹æÄ£»£»£»£»£»£»î¶¯£¬£¬ £¬£¬ÍþвÐÐΪÕßÖ¼ÔÚͨ¹ýµç×ÓÓʼþÈö²¥SmokeLoader¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£SmokeLoader ³äµ±ÆäËû¶ñÒâÈí¼þµÄ¼ÓÔØÆ÷£¬£¬ £¬£¬Ò»µ©Ö´ÐУ¬£¬ £¬£¬Ëü¾Í»á½«¶ñÒâ´úÂë×¢ÈëÄ¿½ñÔËÐÐµÄ Explorer Àú³Ì£¨explorer.exe£©£¬£¬ £¬£¬²¢½«ÁíÒ»¸öÓÐÓøºÔØÏÂÔØµ½ÏµÍ³ÖС£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/163711/cyber-warfare-2/cert-ua-warns-uac-0006-massive-campaigns.html


5. ºÚ¿ÍÔÚ×î½üµÄ MITRE ÍøÂç¹¥»÷Öн¨Éè¶ñÒâÐéÄâ»ú


5ÔÂ27ÈÕ£¬£¬ £¬£¬ºÚ¿Í×î½üʹÓÃÁË MITRE µÄÍøÂçʵÑé¡¢Ñо¿ºÍÐéÄ⻯ÇéÐÎ (NERVE) ÖеÄÎó²î¡£¡£¡£¡£¡£¡£¡£ËûÃÇʹÓöñÒâÐéÄâ»ú£¨VM£©À´Ìӱܼì²â²¢ÔÚÍøÂç¹¥»÷Öмá³Ö³¤ÆÚÐÔ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±»¹é×ïÓÚÒ»¸öÓëÖйúÓйصÄ×éÖ¯ UNC5221£¬£¬ £¬£¬Í¹ÏÔÁËÍøÂçÍþвÈÕÒæÖØ´ó»¯£¬£¬ £¬£¬ÉõÖÁ¶¥¼¶ÍøÂçÇå¾²×éÖ¯ÔÚ·ÀÓùÕâЩÍþÐ²Ê±Ò²ÃæÁÙÌôÕ½¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îʼÓÚ 2023 Äê 12 ÔÂÏÂÑ®£¬£¬ £¬£¬Æäʱ¹¥»÷ÕßʹÓÃÁË Ivanti Connect Secure ×°±¸ÖеÄÁ½¸öÁãÈÕÎó²î£¬£¬ £¬£¬Îó²î±àºÅΪCVE-2023-46805ºÍCVE-2024-21887¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²îʹµÃºÚ¿ÍÄܹ»Í¨¹ý»á»°Ð®ÖÆÈƹý¶àÒòËØÉí·ÝÑéÖ¤£¬£¬ £¬£¬´Ó¶ø»ñµÃ¶Ô MITRE µÄ NERVE ÇéÐεÄδ¾­ÊÚȨµÄ»á¼û¡£¡£¡£¡£¡£¡£¡£2024 Äê 4 Ô·¢Ã÷ÁË×î³õµÄʹÓü£Ï󣬣¬ £¬£¬´Ùʹ MITRE ºÍµÚÈý·½Êý×Öȡ֤ÍŶӾÙÐÐÁ˳¹µ×µÄÊӲ졣¡£¡£¡£¡£¡£¡£Ò»µ©½øÈë NERVE ÇéÐΣ¬£¬ £¬£¬¹¥»÷Õ߾ͻáʹÓÃй¶µÄÖÎÀíԱƾ֤¾ÙÐкáÏòÒÆ¶¯£¬£¬ £¬£¬Ãé×¼ VMware »ù´¡¼Ü¹¹¡£¡£¡£¡£¡£¡£¡£


https://gbhackers.com/rogue-vms-mitres-cyber-attack/


6. ˼¿ÆFIREPOWERÖÎÀíÖÐÐĸßΣÎó²îCVE-2024-20360


5ÔÂ27ÈÕ£¬£¬ £¬£¬Ë¼¿Æ Firepower ÖÎÀíÖÐÐÄ (FMC) Èí¼þµÄ Web ÖÎÀí½çÃæÖб£´æÒ»¸öÎó²î£¬£¬ £¬£¬¿ÉÄܵ¼Ö¾­ÓÉÉí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¶ÔÊÜÓ°ÏìµÄϵͳ¾ÙÐÐ SQL ×¢Èë¹¥»÷¡£¡£¡£¡£¡£¡£¡£±£´æ´ËÎó²îµÄÔµ¹ÊÔ­ÓÉÊÇ Web ÖÎÀí½çÃæÃ»Óгä·ÖÑéÖ¤Óû§ÊäÈë¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ý¶ÔÓ¦ÓóÌÐò¾ÙÐÐÉí·ÝÑéÖ¤²¢ÏòÊÜÓ°ÏìµÄϵͳ·¢ËÍÈ«ÐÄÉè¼ÆµÄ SQL ÅÌÎÊÀ´Ê¹ÓôËÎó²î¡£¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓôËÎó²î¿ÉÄÜÔÊÐí¹¥»÷Õß´ÓÊý¾Ý¿â»ñÈ¡ÈκÎÊý¾Ý£¬£¬ £¬£¬Ôڵײã²Ù×÷ϵͳÉÏÖ´ÐÐí§ÒâÏÂÁ£¬ £¬£¬²¢½«È¨ÏÞÌáÉýµ½ root¡£¡£¡£¡£¡£¡£¡£ÒªÊ¹ÓôËÎó²î£¬£¬ £¬£¬¹¥»÷ÕßÖÁÉÙÐèÒªÖ»¶ÁÓû§Æ¾Ö¤¡£¡£¡£¡£¡£¡£¡£Ë¼¿ÆÌåÏÖ£¬£¬ £¬£¬ÏÖÔÚÉÐÎÞ½â¾ö´ËÎó²îµÄ±äͨҪÁì¡£¡£¡£¡£¡£¡£¡£¸Ã IT ¾ÞÍ·ÒÑÈ·ÈÏ£¬£¬ £¬£¬´ËÎó²î²»»áÓ°Ïì×Ô˳ӦÇå¾²×°±¸ (ASA) Èí¼þ»ò Firepower Íþв·ÀÓù (FTD) Èí¼þ¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/163718/security/a-high-severity-vulnerability-affects-cisco-firepower-management-center.html