Ñо¿Ö°Ô±¼ì²âµ½241¸ö¶ñÒânpmºÍPyPI°ü·Ö·¢ÍÚ¿óÈí¼þ
Ðû²¼Ê±¼ä 2022-08-22
¾ÝýÌå8ÔÂ19ÈÕ±¨µÀ£¬£¬£¬ÉÏÖÜÒÑ·¢Ã÷ÁËÖÁÉÙ241¸ö¶ñÒâµÄPyPIºÍnpm°ü£¬£¬£¬ÕâЩ°ü»áÔÚѬȾLinux×°±¸ºó»á×°ÖöñÒâÍÚ¿óÈí¼þ¡£¡£¡£¡£¡£¡£ÉÏÖÜÈý£¬£¬£¬Ñо¿Ö°Ô±¹ûÕæÁËÔÚPyPIÉÏ·¢Ã÷µÄ33¸öÏîÄ¿£¬£¬£¬¿ÉÔÚѬȾϵͳºóÆô¶¯¿ªÔ´ÃÅÂÞ±Ò¼ÓÃÜ¿ó¹¤XMRig¡£¡£¡£¡£¡£¡£ÔÚÕâЩ°ü±»É¾³ýºó£¬£¬£¬Ñо¿Ö°Ô±ÓÖ·¢Ã÷ÁËÁíÒ»×é¾ßÓÐÏàͬpayloadµÄ22¸ö°ü¡£¡£¡£¡£¡£¡£SonatypeÔÚ8ÔÂ19ÈÕÅû¶ÁË186¸önpmÓòÃûÇÀ×¢¶ñÒâ°ü£¬£¬£¬ËüÃǾùÀ´×ÔÄäÃûÕÊ»§17b4a931£¬£¬£¬Ä£ÄâÁ˳£ÓõÄhttp-errors JavaScript¿â¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Æ¾Ö¤ÊÖÒÕÖ¸±êÍÆ¶Ï£¬£¬£¬Õâ241¸ö¶ñÒâ°üÓÉͳһ¹¥»÷ÕßÐû²¼¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/241-npm-and-pypi-packages-caught-dropping-linux-cryptominers/
2¡¢ÐÂľÂíGrandoreiroÖ÷ÒªÕë¶ÔÄ«Î÷¸çºÍÎ÷°àÑÀµÈ¹ú¼Ò
8ÔÂ18ÈÕ£¬£¬£¬Zscaler ThreatLabzÅû¶ÁËÐÂľÂíGrandoreiroÕë¶ÔÄ«Î÷¸çºÍÎ÷°àÑÀµÈ¹ú¼ÒµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖÁÉÙ×Ô2017ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬´Ë´Î¹¥»÷ÓÚ2022Äê6ÔÂ×îÏÈ£¬£¬£¬²¢ÇÒÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£¹¥»÷Õßαװ³ÉÀ´×ÔÄ«Î÷¸ç×ÜÉó²é³¤°ì¹«ÊÒ»òÎ÷°àÑÀ¹«¹²²¿£¬£¬£¬×îÖÕpayloadʹÓôÓASUSTEK͵À´µÄÖ¤ÊéÊðÃû£¬£¬£¬Í¨¹ý¶þ½øÖÆÌî³äµÄÒªÁ콫¾ÞϸÅòÕ͵½400MB£¬£¬£¬À´ÈƹýɳÏäÆÊÎö¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬×îеÄGrandoreiro±äÌåÐÂÔöÁËʹÓÃDGA¾ÙÐÐC2ͨѶµÄ¹¦Ð§£¬£¬£¬ÕâʹµÃ·¢Ã÷¶ñÒâÈí¼þµÄ»ù´¡ÉèÊ©²¢½«Æä²ð³ý±äµÃ¸üÄÑ¡£¡£¡£¡£¡£¡£
https://www.zscaler.com/blogs/security-research/grandoreiro-banking-trojan-new-ttps-targeting-various-industry-verticals
3¡¢WPÍøÕ¾±»ÈëÇÖºóÏÔʾαÔìCloudflare¾¯±¨²¢×°ÖöñÒâÈí¼þ
8ÔÂ18ÈÕ£¬£¬£¬Sucuri³ÆWordPressÍøÕ¾±»ÈëÇÖºó»áÏÔʾαÔìµÄCloudflare DDoS±£»£»£»£»£»¤Ò³Ã棬£¬£¬À´·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬¹¥»÷Õß»áÈëÇÖÄ¿µÄWordPressÍøÕ¾²¢Ö²ÈëÒ»¸ö»ìÏýµÄJavaScript payload£¬£¬£¬Ëü¿ÉÏÔʾһ¸öαÔìµÄCloudflare DDoS±£»£»£»£»£»¤½çÃæ¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬Ä¿µÄ»á±»ÒªÇóÏÂÔØÎļþsecurity_install.iso£¬£¬£¬Æä±»ÐÎÃ²ÎªÈÆ¹ýDDoSÑéÖ¤ËùÐèµÄ¹¤¾ß¡£¡£¡£¡£¡£¡£·¿ª¸ÃÎļþ»á¿´µ½security_install.exe£¬£¬£¬Ö´ÐиÃEXEÎļþ½«×°ÖöñÒâÈí¼þNetSupport RATºÍRaccoon Stealer¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/wordpress-sites-hacked-with-fake-cloudflare-ddos-alerts-pushing-malware/
4¡¢Proofpoint·¢Ã÷TA558¹¥»÷À¶¡ÃÀÖÞÂùݺÍÂÃÓÎÐÐÒµ
ProofpointÔÚ8ÔÂ18ÈÕÐû²¼Á˹ØÓÚºÚ¿ÍÍÅ»ïTA558µÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£TA558¿ÉÄÜÊÇÒ»¸ö³öÓÚ¾¼ÃÄîÍ·µÄСÐͺڿÍÍŻ£¬£¬×Ô2018ÄêÒÔÀ´×îÏÈ»îÔ¾£¬£¬£¬Ö÷ÒªÕë¶ÔλÓÚÀ¶¡ÃÀÖÞµØÇøµÄÂùݺÍÂÃÓÎÐÐÒµ£¬£¬£¬ÓÐʱҲ»áÕë¶ÔÎ÷Å·ºÍ±±ÃÀµØÇø¡£¡£¡£¡£¡£¡£×î½üµÄ»î¶¯ÖУ¬£¬£¬¹¥»÷Õß´ÓʹÓðüÀ¨ºêµÄMicrosoft Office¸½¼þ£¬£¬£¬×ª¶øÊ¹ÓÃURLºÍISOÎļþÀ´ÊµÏÖ³õʼѬȾ£¬£¬£¬´Ë¾Ù¿ÉÄÜÊǶÔ΢Èí¾öÒéĬÈÏ×èÖ¹´ÓÍøÂçÏÂÔØÎļþÖеĺê×ö³öµÄ»ØÓ¦¡£¡£¡£¡£¡£¡£
https://www.proofpoint.com/us/blog/threat-insight/reservations-requested-ta558-targets-hospitality-and-travel
5¡¢°®É³ÄáÑÇÕþ¸®Éù³ÆÒÑ×èÖ¹KillnetÍÅ»ï¶ÔÆäµÄDDoS¹¥»÷
¾Ý8ÔÂ19ÈÕ±¨µÀ£¬£¬£¬°®É³ÄáÑÇÕþ¸®Éù³Æ×Ô2007ÄêÒÔÀ´×îÑÏÖØµÄDDoS¹¥»÷¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷¼ÈÕë¶Ô¹«¹²»ú¹¹£¬£¬£¬Ò²Õë¶Ô˽Ӫ¹«Ë¾£¬£¬£¬ºÚ¿Í×éÖ¯KillnetÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬Õþ¸®Ê×ϯÐÅÏ¢¹ÙÅúÅÐÁ˸Ã×éÖ¯¹ØÓÚ200¶à¸öÍøÕ¾Òѱ»²é·âµÄ˵·¨£¬£¬£¬²¢ÌåÏÖE-EstoniaÒÑÆô¶¯²¢ÔËÐУ¬£¬£¬Ð§ÀÍûÓÐÖÐÖ¹¡£¡£¡£¡£¡£¡£°®É³ÄáÑÇÅÌËã»úÓ¦¼±ÏìӦС×é͸¶£¬£¬£¬°üÀ¨¾¯Ô±ºÍÕþ¸®ÔÚÄڵĵط½Õþ¸®µÄÍøÕ¾ÒÔ¼°Ò»¼ÒÎïÁ÷¹«Ë¾Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/134560/cyber-warfare-2/estonia-blocked-cyberattacks-killnet.html
6¡¢MicrosoftÅû¶ChromeOS×é¼þÖÐÄÚ´æËð»µÎó²îµÄϸ½Ú
MicrosoftÔÚ8ÔÂ19ÈÕÐû²¼Á˹ØÓÚChromeOS×é¼þÖÐÄÚ´æËð»µÎó²îµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2022-2587£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬¿É±»ÓÃÀ´Ö´ÐÐDoS£¬£¬£¬»òÕßÔÚ¼«¶ËÇéÐÎÏÂÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚGoogle ChromeÒôƵЧÀÍÆ÷£¬£¬£¬¿É±»Ô¶³Ì¹¥»÷Õßͨ¹ýÌØÖÆµÄÒôƵԪÊý¾ÝʹÓᣡ£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´£¬£¬£¬ÉÐδ±»ÔÚҰʹÓᣡ£¡£¡£¡£¡£
https://www.microsoft.com/security/blog/2022/08/19/uncovering-a-chromeos-remote-memory-corruption-vulnerability/


¾©¹«Íø°²±¸11010802024551ºÅ