SambaSpy¶ñÒâÈí¼þͨ¹ý´¹ÂÚµç×ÓÓʼþ¹¥»÷Òâ´óʹÓû§

Ðû²¼Ê±¼ä 2024-09-23
1. SambaSpy¶ñÒâÈí¼þͨ¹ý´¹ÂÚµç×ÓÓʼþ¹¥»÷Òâ´óʹÓû§


9ÔÂ19ÈÕ £¬£¬£¬£¬£¬¿¨°Í˹»ùʵÑéÊÒ½üÆÚ½ÒÆÆÁËÒ»Ïî¸ß¶È¶¨ÖÆ»¯µÄ¶ñÒâÈí¼þ»î¶¯ £¬£¬£¬£¬£¬ÃûΪSambaSpy £¬£¬£¬£¬£¬ÆäÆæÒìÖ®´¦ÔÚÓÚ½öÕë¶ÔÒâ´óʹÓû§¡£¡£¡£¡£¡£¡£¡£Õâ¿îÔ¶³Ì»á¼ûľÂí£¨RAT£©Í¨¹ýαװ³ÉÒâ´óÀû·¿µØ²ú¹«Ë¾µÄÕýµ±ÓʼþÈö²¥ £¬£¬£¬£¬£¬ÓʼþÄÚº¬¿´ËÆÎÞº¦µÄ·¢Æ±Éó²éÁ´½Ó £¬£¬£¬£¬£¬ÊµÔòµ¼Ïò¶ñÒâJARÎļþÏÂÔØ¡£¡£¡£¡£¡£¡£¡£SambaSpyʹÓÃÓïÑÔ¼ì²é»úÖÆ £¬£¬£¬£¬£¬È·±£½öѬȾÒâ´óÀûÓïϵͳ £¬£¬£¬£¬£¬Õ¹ÏÖÁ˹¥»÷Õߵĸ߶ÈרҵÐԺ;«×¼¶¨Î»ÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£Ò»µ©×°Öà £¬£¬£¬£¬£¬SambaSpy¸¶Óë¹¥»÷Õß¶ÔÊÜѬȾװ±¸µÄÖÜÈ«¿ØÖÆÈ¨ £¬£¬£¬£¬£¬°üÀ¨ÎļþÖÎÀí¡¢ÍøÂçÉãÏñÍ·¼à¿Ø¡¢¼üÅ̼ͼ¡¢ÆÁÄ»½ØÍ¼¡¢ä¯ÀÀÆ÷ƾ֤ÇÔÈ¡¼°Ô¶³Ì×ÀÃæ²Ù×÷µÈ¡£¡£¡£¡£¡£¡£¡£¿£¿£¿¨°Í˹»ù×·×Ùµ½Á½ÌõѬȾÁ´ £¬£¬£¬£¬£¬¾ùʹÓõç×ÓÓʼþ×÷ΪÈëÇÖÃÅ»§ £¬£¬£¬£¬£¬ÆäÖÐÒ»Ìõ¸üÎªÖØ´ó £¬£¬£¬£¬£¬Í¨¹ýÕýµ±Òâ´óÀûÔÆ·¢Æ±Ð§ÀÍFattureInCloud×÷ΪÑÚ»¤ £¬£¬£¬£¬£¬½øÒ»²½ÓÕÆ­Êܺ¦Õß¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬£¬Ö»¹Ü»î¶¯Ö÷Òª¾Û½¹ÓÚÒâ´óÀû £¬£¬£¬£¬£¬µ«·¢Ã÷µÄ°ÍÎ÷ÆÏÌÑÑÀÓïºÛ¼£¼°¿çµØÇøÁ´½ÓÅú×¢¹¥»÷Õß¿ÉÄÜÓµÓиüÆÕ±éµÄÒ°ÐÄ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ²»µ«Í¹ÏÔÁËÍøÂçÇå¾²ÍþвµÄÒþ²ØÐÔÓëÖØ´óÐÔ £¬£¬£¬£¬£¬Ò²ÌáÐÑÁËÈ«ÇòÓû§ÐèÔöÇ¿Ìá·ÀÒâʶ £¬£¬£¬£¬£¬ÌØÊâÊÇÕë¶Ô¸ß¶È¶¨ÖÆ»¯µÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£


https://securityonline.info/sambaspy-rat-targets-italian-users-in-a-unique-malware-campaign/


2. Ivanti CSA 4.6ÑÏÖØÎó²îCVE-2024-8963Òѱ»Æð¾¢Ê¹ÓÃ


9ÔÂ19ÈÕ £¬£¬£¬£¬£¬ÆóÒµÈí¼þ¾ÞÍ·Ivanti½üÆÚ½ÒÆÆÁËÆäIvanti Connect Secure Appliance£¨CSA£©4.6°æ±¾Öб£´æµÄÒ»¸ö¸ßΣÎó²îCVE-2024-8963 £¬£¬£¬£¬£¬¸ÃÎó²îÑÏÖØÐÔÆÀ¼¶¸ß´ïCVSS 9.4 £¬£¬£¬£¬£¬ÇÒÒѱ»·¢Ã÷Õý±»¶ñÒâʹÓà £¬£¬£¬£¬£¬¶ÔʹÓÃÒÑÍ£²ú£¨EOL£©°æ±¾µÄ¿Í»§×é³ÉÖØ´óÇå¾²Íþв¡£¡£¡£¡£¡£¡£¡£´ËÎó²îΪ·¾¶±éÀúÀàÐÍ £¬£¬£¬£¬£¬ÔÊÐíδÊÚȨԶ³Ì¹¥»÷Õß²»·¨»á¼ûCSA 4.6µÄÊÜÏÞÇøÓò £¬£¬£¬£¬£¬ÉõÖÁÓëÁíÒ»Îó²îCVE-2024-8190Á¬ÏµÊ¹ÓÃʱ £¬£¬£¬£¬£¬ÄÜÈÆ¹ýÉí·ÝÑéÖ¤Ö´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£¼øÓÚCSA 4.6ÒÑ×èÖ¹ÎüÊÕ¹Ù·½Çå¾²¸üР£¬£¬£¬£¬£¬Ivanti½ôÆÈÐû²¼ÁËCSA 4.6²¹¶¡519ÒÔÐÞ¸´¸ÃÎó²î £¬£¬£¬£¬£¬µ«´Ë²¹¶¡±ê¼Ç×ŶԸð汾µÄ×îºóÒ»´Îά»¤¡£¡£¡£¡£¡£¡£¡£CISAÒѽ«´ËÎó²îÁÐΪÒÑÖª±»Ê¹ÓõÄÎó²î £¬£¬£¬£¬£¬Ç¿ÁÒ½¨Òé¸÷×é֯ѸËÙÐж¯ £¬£¬£¬£¬£¬½ÓÄɵ÷½â²½·¥¡£¡£¡£¡£¡£¡£¡£IvantiÇ¿µ÷ £¬£¬£¬£¬£¬³ýÁËÉý¼¶µ½CSA 5.0°æ±¾Íâ £¬£¬£¬£¬£¬²»»áΪ4.6°æ±¾Ìṩ½øÒ»²½²¹¶¡ £¬£¬£¬£¬£¬Òò´Ë £¬£¬£¬£¬£¬Ö»¹ÜÔÝʱ²¹¶¡ÌṩÁË¶ÌÆÚ»º½â £¬£¬£¬£¬£¬µ«¾ÃÔ¶À´¿´ £¬£¬£¬£¬£¬Ïòа汾ǨáãÊÇÈ·±£ÏµÍ³Çå¾²µÄΨһ;¾¶¡£¡£¡£¡£¡£¡£¡£


https://securityonline.info/critical-flaw-in-ivanti-csa-4-6-cve-2024-8963-actively-exploited-urgent-upgrade-required/


3. LockBitÀÕË÷Èí¼þÔÙÏ®eFile.com £¬£¬£¬£¬£¬Êý°ÙÍòÃÀ¹úÈË˰ÎñÊý¾ÝÇå¾²½ôÆÈ


9ÔÂ19ÈÕ £¬£¬£¬£¬£¬ÀÕË÷Èí¼þ×éÖ¯LockBit½üÆÚÔٴν«Ä¿µÄÃé×¼ÁËÃÀ¹úÔÚÏß±¨Ë°Ð§ÀÍeFile.com £¬£¬£¬£¬£¬ÕâÊÇÒ»¸ö¾­ÃÀ¹ú¹ú˰¾Ö£¨IRS£©¹Ù·½ÊÚȨµÄ˰ÎñÉ걨ƽ̨¡£¡£¡£¡£¡£¡£¡£¾ÝCyber Express±¨µÀ £¬£¬£¬£¬£¬LockBitÒªÇóeFileÔÚ14ÌìÄÚÖ§¸¶Êê½ð £¬£¬£¬£¬£¬µ«²î±ðÓÚͨÀýÀÕË÷Èí¼þ²Ù×÷ £¬£¬£¬£¬£¬´Ë´Î¹¥»÷²¢Î´¹ûÕæÈκα»ÇÔÈ¡Êý¾ÝµÄÑùÀýÀ´Ö¤ÊµÆäÍþв¡£¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ £¬£¬£¬£¬£¬¹ØÓÚ¹¥»÷µÄÏêϸ¹æÄ£¡¢Êý¾Ýй¶ÇéÐμ°·¸·¨ÄîÍ·µÄÐÅÏ¢ÈÔ±£ÃÜ £¬£¬£¬£¬£¬eFile.com¹ÙÍøÔò¼á³ÖÕý³£ÔË×÷¡£¡£¡£¡£¡£¡£¡£Êý°ÙÍòÒÀÀµeFile±¨Ë°µÄÃÀ¹úÈËÃæÁÙDZÔÚΣº¦ £¬£¬£¬£¬£¬Ò»µ©¹¥»÷±»È·ÈÏ £¬£¬£¬£¬£¬ÄÉ˰È˵ÄСÎÒ˽¼ÒºÍ²ÆÎñÊý¾Ý¿ÖÔâй¶ £¬£¬£¬£¬£¬ÎªÉí·Ý͵ÇÔ¡¢Ë°ÎñڲƭµÈ²»·¨ÐÐΪÌṩδ²¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬£¬eFile²¢·ÇÊ״γÉΪLockBitµÄÁÔÎï £¬£¬£¬£¬£¬ÔçÔÚ2022Äê˰ÎñÉ걨á¯ÁëÆÚ £¬£¬£¬£¬£¬LockBit¾ÍÔøÉù³ÆÈëÇÖeFile £¬£¬£¬£¬£¬ÏÔʾ³ö·¸·¨·Ö×Ó¶Ô¸ßÁ÷Á¿Ê±¶ÎµÄ¾«×¼¹¥»÷Òâͼ¡£¡£¡£¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬2023ÄêeFile»¹ÔøÔâÓö¡°efail¡±¶ñÒâÈí¼þÈëÇÖ £¬£¬£¬£¬£¬Ê¹ÓÃÆ½Ì¨Îó²îÇÔÈ¡Óû§Ãô¸ÐÐÅÏ¢ £¬£¬£¬£¬£¬ÊÂÎñËäʵʱ»ñµÃ¿ØÖÆ £¬£¬£¬£¬£¬È´ÔÙ´ÎÇÃÏìÁ˽ðÈÚЧÀÍÍøÂçÇå¾²·À»¤µÄ¾¯ÖÓ¡£¡£¡£¡£¡£¡£¡£


https://thecyberexpress.com/u-s-taxpayer-data-lockbit-ransomware-efile/


4. Gleaming PiscesʹÓÃPyPI·Ö·¢PondRATºóÃÅ


9ÔÂ19ÈÕ £¬£¬£¬£¬£¬Unit 42 Ñо¿ÍÅ¶Ó½ÒÆÆÁ˳¯ÏÊÁ¥ÊôµÄAPT×éÖ¯Gleaming PiscesÌᳫµÄÒ»ÏîÐÂÍøÂç¹¥»÷ £¬£¬£¬£¬£¬¸Ã×é֯ʹÓú¬ÓжñÒâ´úÂëµÄPythonÈí¼þ°ü £¬£¬£¬£¬£¬Õë¶ÔLinuxºÍmacOSϵͳÌᳫ¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ°üͨ¹ýPyPI´æ´¢¿â·Ö·¢ £¬£¬£¬£¬£¬°üÀ¨¡°real-ids¡±¡¢¡°coloredtxt¡±µÈ £¬£¬£¬£¬£¬Ò»µ©×°Öü´»á°²ÅÅÃûΪPondRATµÄºóÃųÌÐò £¬£¬£¬£¬£¬ËüÊÇPOOLRATµÄÇáÁ¿¼¶°æ±¾ £¬£¬£¬£¬£¬¾ß±¸Ô¶³Ì¿ØÖÆÊܺ¦ÕßϵͳµÄÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýPondRAT¿ÉÉÏ´«ÏÂÔØÎļþ¡¢Ö´ÐÐÏÂÁîÉõÖÁÔÝͣϵͳ²Ù×÷ £¬£¬£¬£¬£¬Æä¿çÆ½Ì¨ÌØÕ÷ʹµÃ¹¥»÷ÓÈΪΣÏÕ¡£¡£¡£¡£¡£¡£¡£Gleaming PiscesÒÔÆäÓëÕì̽×ֵܾĹØÁª¼°ÔÚ¼ÓÃÜÇ®±ÒÁìÓòµÄÖØ´ó¹¥»÷»î¶¯Öø³Æ £¬£¬£¬£¬£¬ÌØÊâÊÇͨ¹ýAppleJeus»î¶¯·Ö·¢Ã°³ä¼ÓÃÜÇ®±ÒÈí¼þ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖÐ £¬£¬£¬£¬£¬PondRATÓëAppleJeus¶ñÒâÈí¼þ±£´æ´úÂëÏàËÆÐÔ £¬£¬£¬£¬£¬Åú×¢ÊÇGleaming PiscesÒ»Á¬ÉøÍ¸¹©Ó¦Á´µÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜPyPIÒÑÒÆ³ýÏà¹Ø¶ñÒâ°ü £¬£¬£¬£¬£¬µ«Öж¾Èí¼þ°üµÄÍþвÒÀ¾É½ûÖ¹ºöÊÓ¡£¡£¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´ËÀàÍþв £¬£¬£¬£¬£¬×éÖ¯ÐèÔöÇ¿Çå¾²²½·¥ £¬£¬£¬£¬£¬°üÀ¨ÔÚÒýÈëµÚÈý·½Èí¼þ°üʱ¾ÙÐÐÑÏ¿áµÄ´úÂëÉó²éºÍÑéÖ¤ £¬£¬£¬£¬£¬ÒÔ¼°ÊµÑéÔËÐÐʱ¼à¿Ø¡£¡£¡£¡£¡£¡£¡£


https://securityonline.info/north-korean-hackers-gleaming-pisces-poisoned-python-packages-target-linux-macos/


5. ÐÂ¼ÓÆÂBingXƽ̨ÔâºÚ¿Í¹¥»÷ £¬£¬£¬£¬£¬Ëðʧ³¬4400ÍòÃÀÔª


9ÔÂ21ÈÕ £¬£¬£¬£¬£¬ÐÂ¼ÓÆÈÎÃüÜÇ®±ÒÉúÒâÆ½Ì¨BingXÖÜÎåÈ·ÈÏ £¬£¬£¬£¬£¬Æäƽ̨ÔÚÔâÊÜÍøÂç¹¥»÷ºó £¬£¬£¬£¬£¬ËðʧÁËÁè¼Ý4400ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¡£ÖÜËÄÍí¼ä £¬£¬£¬£¬£¬Çø¿éÁ´Çå¾²¹«Ë¾¼à²âµ½×ʽðÒì³£Á÷¶¯ £¬£¬£¬£¬£¬ËæºóBingXÐû²¼Òò¡°Ç®°üά»¤¡±ÔÝͣЧÀÍ £¬£¬£¬£¬£¬²¢Ðû²¼ÉùÃ÷³Æ¼ì²âµ½ÈÈÇ®°ü¿ÉÄÜÔâÊܺڿ͹¥»÷ £¬£¬£¬£¬£¬ÒѽôÆÈ×ªÒÆ×ʲú²¢ÔÝÍ£Ìá¿îЧÀÍ¡£¡£¡£¡£¡£¡£¡£ÆðÔ´¹ÀËãÏÔʾ £¬£¬£¬£¬£¬Ö±½ÓËðʧԼΪ4470ÍòÃÀÔª £¬£¬£¬£¬£¬µ«ÏêϸÊý¶îÈÔÔÚºËʵÖС£¡£¡£¡£¡£¡£¡£BingXÊ×ϯ²úÆ·¹ÙVivien Linͨ¹ýÉ罻ýÌåÌåÏÖ £¬£¬£¬£¬£¬¹«Ë¾½«ÓÃ×ÔÓÐ×ʽðÈ«¶îÌî²¹Ëðʧ £¬£¬£¬£¬£¬²¢Ç¿µ÷ÓªÒµÔËӪδÊÜÓ°Ïì £¬£¬£¬£¬£¬Ìá¿îºÍ´æ¿îЧÀÍÔ¤¼Æ24СʱÄÚ»Ö¸´¡£¡£¡£¡£¡£¡£¡£Í¬Ê± £¬£¬£¬£¬£¬BingXÕýÓëSlowMistºÍChainalysisµÈÇå¾²¹«Ë¾ÏàÖú×·×Ù±»µÁ×ʽ𡣡£¡£¡£¡£¡£¡£½üÆÚ £¬£¬£¬£¬£¬ÑÇÖÞµØÇø¶à¼Ò¼ÓÃÜÆ½Ì¨Æµ·¢Çå¾²ÊÂÎñ £¬£¬£¬£¬£¬×ʽ𱻵Á½ð¶îÖØ´ó £¬£¬£¬£¬£¬Ö´·¨»ú¹¹ÒÑÔöÇ¿¶Ô´ËÀà·¸·¨µÄ¹¥»÷Á¦¶È¡£¡£¡£¡£¡£¡£¡£ÕâһϵÁÐÊÂÎñÔÙ´Î͹ÏÔÁ˼ÓÃÜÇ®±ÒÐÐÒµÔÚÇå¾²ÐÔ·½ÃæÃæÁÙµÄÌôÕ½¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/44-million-stolen-from-crypto-platform-singapore


6. AsyncRAT¶ñÒâÈí¼þÎ±×°ÆÆ½âÈí¼þÓÕÆ­Óû§ÏÂÔØ


9ÔÂ21ÈÕ £¬£¬£¬£¬£¬McAfee LabsÕ¹ÏÖÁËÒ»¸öÑÏËàµÄÍøÂçÇå¾²Ç÷ÊÆ£ºÍøÂç·¸·¨·Ö×Óͨ¹ýαװʢÐÐÆÆ½âÈí¼þÈçCCleaner¡¢EaseUS Partition MasterµÈ £¬£¬£¬£¬£¬Èö²¥ÃûΪAsyncRATµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£ÕâЩð³äÓ¦ÓÃʹÓÃÁËÓû§×·ÇóÃâ·Ñ¸ß¼¶Èí¼þµÄÐÄÀí £¬£¬£¬£¬£¬ÊµÔòÄÚº¬ÖØ´óµÄÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£¡£¡£¡£AsyncRATͨ¹ýÈ«ÐÄÉè¼ÆµÄαװսÂÔ £¬£¬£¬£¬£¬°üÀ¨Ç¶ÈëÕýµ±Èí¼þ¿ÉÖ´ÐÐÎļþ £¬£¬£¬£¬£¬ÀÖ³ÉÓÕÆ­Óû§ÏÂÔØ²¢Ö´ÐС£¡£¡£¡£¡£¡£¡£×°ÖÃºó £¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»áʹÓÃWindows Defenderɨ³ýÏîºÍ»ìÏýÊÖÒÕÌӱܼì²â £¬£¬£¬£¬£¬²¢Í¨¹ýÇéÐαäÁ¿²Ù×÷ºÍÒþ²ØµÄbatÎļþά³ÖÆä²Ù×÷²»±»·¢Ã÷¡£¡£¡£¡£¡£¡£¡£ÆäÖ÷ҪĿµÄÊǽ¨Éè¶ÔÊÜѬȾ»úеµÄÔ¶³ÌÅþÁ¬ £¬£¬£¬£¬£¬Èù¥»÷ÕßÄܾÙÐа´¼ü¼Í¼¡¢Êý¾ÝÇÔÈ¡µÈ¶ñÒâ»î¶¯¡£¡£¡£¡£¡£¡£¡£AsyncRAT»¹½ÓÄÉAES½âÃܺÍGzip½âѹËõÀ´Òþ²ØÉèÖà £¬£¬£¬£¬£¬ÔöÇ¿ÆäÒþ²ØÐÔ¡£¡£¡£¡£¡£¡£¡£×Ô2024Äê3ÔÂÒÔÀ´ £¬£¬£¬£¬£¬ÕâÖÖÍþвÔÚÈ«Çò¹æÄ£ÄÚѸËÙÉìÕÅ £¬£¬£¬£¬£¬ÏÔʾ³öÍøÂç·¸·¨·Ö×ÓʹÓÃÓû§ÐÄÀíÈõµãÈö²¥¶ñÒâÈí¼þµÄ¸ßÃ÷ÊֶΡ£¡£¡£¡£¡£¡£¡£


https://securityonline.info/beware-of-fake-downloads-asyncrat-spreads-via-popular-software-cracks/