¹ú¼ÊÍøÂç·¸·¨¼¯ÍųÉÔ±½« Airbnb Äð³ÉÕ©Æ­ÖÐÐĺ󱻲¶

Ðû²¼Ê±¼ä 2024-12-11

1. ¹ú¼ÊÍøÂç·¸·¨¼¯ÍųÉÔ±½« Airbnb Äð³ÉÕ©Æ­ÖÐÐĺ󱻲¶


12ÔÂ9ÈÕ£¬£¬ £¬£¬£¬£¬£¬ £¬Ò»¸ö¹ú¼Ê·¸·¨ÍøÂçµÄ°ËÃû³ÉÔ±ÔÚ±ÈÀûʱºÍºÉÀ¼±»²¶£¬£¬ £¬£¬£¬£¬£¬ £¬¸ÃÍøÂçÉæÏÓ´ÓÊܺ¦ÕßÊÖÖÐÇÔÈ¡Êý°ÙÍòÅ·Ôª£¬£¬ £¬£¬£¬£¬£¬ £¬²¢ÉèÁ¢AirbnbڲƭÖÐÐÄ¡£¡£¡£´Ë´ÎÐж¯ÓÉÅ·ÖÞÐ̾¯×é֯Эµ÷£¬£¬ £¬£¬£¬£¬£¬ £¬ÓÚ12ÔÂ3ÈÕÔÚÁ½¹úͬʱ¾ÙÐÐÁ˶à´ÎËѲ顣¡£¡£ºÉÀ¼¾¯·½¾Ð²¶ÁËËÄÃûÏÓÒÉÈË£¬£¬ £¬£¬£¬£¬£¬ £¬Ö¸¿ØËûÃÇ·¸ÓÐÍøÂç´¹ÂÚ¡¢ÔÚÏßڲƭ¡¢ÒøÐÐ×ÊÖų́ڲƭ¡¢Ï´Ç®ºÍ¼ÓÈë·¸·¨×éÖ¯µÈ×ïÐУ¬£¬ £¬£¬£¬£¬£¬ £¬²¢Ã»ÊÕÁËÊý¾ÝÔØÌå¡¢ÊÖ»ú¡¢ÉÝ³ÞÆ·ºÍ´ó×ÚÏֽ𡣡£¡£¾Ý¾¯·½ÏÈÈÝ£¬£¬ £¬£¬£¬£¬£¬ £¬¸ÃÍøÂç·¸·¨¼¯ÍÅ×âÓÃAirbnb·¿²úºÍºÀ»ª¹«Ô¢×÷ΪÔÝʱºô½ÐÖÐÐÄ£¬£¬ £¬£¬£¬£¬£¬ £¬Ã°³äÒøÐÐÔ±¹¤»ò·´Ú²Æ­ÊÂÇé×é³ÉÔ±£¬£¬ £¬£¬£¬£¬£¬ £¬Í¨¹ýµç×ÓÓʼþ¡¢¶ÌÐÅ»òWhatsAppÐÂÎÅÁªÏµÊܺ¦Õߣ¬£¬ £¬£¬£¬£¬£¬ £¬ÓÕÆ­ËûÃǵã»÷´¹ÂÚÍøÕ¾Á´½Ó£¬£¬ £¬£¬£¬£¬£¬ £¬½ø¶øÍµÈ¡ÕË»§×ʽ𡣡£¡£Å·ÖÞÐ̾¯×éÖ¯ÖÒÑÔ¹«ÖÚÒªÉóÉ÷¿´´ýδ¾­ÇëÇóµÄͨѶ£¬£¬ £¬£¬£¬£¬£¬ £¬×èÖ¹Êܵ½ÍøÂç´¹ÂÚºÍ×ÊÖų́ڲƭµÄÓÕÆ­£¬£¬ £¬£¬£¬£¬£¬ £¬²¢ÌáÐÑÔÚÏúÊÛ¶þÊÖÉÌÆ·µÄÍøÕ¾ÉϾÙÐÐС¶îÖ§¸¶Ê±¿ÉÄܱ£´æÐÅÓÿ¨/½è¼Ç¿¨ÐÅÏ¢±»µÁµÄΣº¦¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cybercrime-gang-arrested-after-turning-airbnbs-into-fraud-centers/


2. ¶ñÒâ½©Ê¬ÍøÂçSocks5SystemzÖ§³ÖPROXY.AMÊðÀíЧÀÍ


12ÔÂ9ÈÕ£¬£¬ £¬£¬£¬£¬£¬ £¬Bitsight·¢Ã÷ÃûΪSocks5SystemzµÄ¶ñÒâ½©Ê¬ÍøÂçÕýÔÚΪPROXY.AMÊðÀíЧÀÍÌṩ֧³Ö£¬£¬ £¬£¬£¬£¬£¬ £¬¸ÃЧÀÍʹ·¸·¨ÕßÄܹ»ÔöÌíÄäÃû²ã²¢Ö´ÐжñÒâ»î¶¯¡£¡£¡£Socks5Systemz×Ô2013ÄêÆð±ãÔÚÍøÂç·¸·¨µØÏÂÌìÏÂÖÐÐû´«£¬£¬ £¬£¬£¬£¬£¬ £¬Æä¹æÄ£ÔÚ2024Äê1ÔÂÔø¼¤ÔöÖÁÌìÌìÔ¼25Íǫ̀»úе£¬£¬ £¬£¬£¬£¬£¬ £¬µ«ÏÖÔÚÔ¤¼ÆÔÚ85,000µ½100,000̨֮¼ä¡£¡£¡£Í¬Ê±£¬£¬ £¬£¬£¬£¬£¬ £¬PROXY.AMÉù³ÆÓµÓÐÀ´×Ô31¸ö¹ú¼ÒµÄ80,888¸öÊðÀí½Úµã¡£¡£¡£¸Ã½©Ê¬ÍøÂç×î³õÓÉPrivateLoader¡¢SmokeLoaderºÍAmadeyµÈ¼ÓÔØÆ÷ÊÍ·Å£¬£¬ £¬£¬£¬£¬£¬ £¬ÏÖÒÑÉú³¤µ½Socks5Systemz V2°æ±¾¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬£¬ £¬ÍøÂçÇå¾²ÁìÓò»¹ÃæÁÙÆäËûÍþв£¬£¬ £¬£¬£¬£¬£¬ £¬ÈçGafgyt½©Ê¬ÍøÂç¶ñÒâÈí¼þʹÓÃÉèÖùýʧµÄDocker Remote APIЧÀÍÆ÷¾ÙÐÐDDoS¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ £¬ÒÔ¼°ÔÆÉèÖùýʧ³ÉΪ¹¥»÷ÕßµÄÄ¿µÄ¡£¡£¡£À³¶Ù´óѧºÍ´ú¶û·òÌØÀí¹¤´óѧµÄÑо¿Ö°Ô±·¢Ã÷¶à´ï215¸öʵÀý̻¶ÁËÃô¸Ðƾ֤£¬£¬ £¬£¬£¬£¬£¬ £¬Éæ¼°¶à¸öÁìÓò£¬£¬ £¬£¬£¬£¬£¬ £¬Ç¿µ÷ÐèÒª¸üºÃµÄϵͳÖÎÀíºÍСÐĵļàÊÓÒÔ±ÜÃâÊý¾Ýй¶¡£¡£¡£


https://thehackernews.com/2024/12/socks5systemz-botnet-powers-illegal.html


3. ¶íÂÞ˹ºÚ¿ÍÒÉËÆÃé×¼ÎÚ¿ËÀ¼¹ú·ÀÆóÒµ¿ªÕ¹ÐÂÌØ¹¤»î¶¯


12ÔÂ9ÈÕ£¬£¬ £¬£¬£¬£¬£¬ £¬¾Ýб¨¸æ³Æ£¬£¬ £¬£¬£¬£¬£¬ £¬ÒÉËÆ¶íÂÞ˹ºÚ¿ÍÕýÔÚÕë¶ÔÎÚ¿ËÀ¼¾üʺ͹ú·ÀÆóÒµ¿ªÕ¹ÐµÄÌØ¹¤»î¶¯¡£¡£¡£ÎÚ¿ËÀ¼¾ü·½ÅÌËã»úÓ¦¼±ÏìӦС×éMIL.CERT-UA×·×Ùµ½¸Ã»î¶¯±³ºóµÄÍþвÐÐΪÕßΪUAC-0185£¨Ò²³ÆÎªUNC4221£©£¬£¬ £¬£¬£¬£¬£¬ £¬¸Ã×éÖ¯×Ô2022ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬ £¬£¬£¬£¬£¬ £¬Ö÷Ҫͨ¹ýÐÂÎÅÓ¦ÓóÌÐòºÍÍâµØ¾üÊÂϵͳÇÔÈ¡ÎÚ¿ËÀ¼¾üÊÂÖ°Ô±µÄƾ֤¡£¡£¡£¹¥»÷Õß·¢ËÍÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬ £¬£¬£¬£¬£¬ £¬Î±×°³É»ù¸¨Õýµ±¹ú·À¾Û»áµÄÔ¼Ç룬£¬ £¬£¬£¬£¬£¬ £¬²¢Ñ¡ÔñÐԵضÔÎÚ¿ËÀ¼¹ú·À¹¤Òµ×ÛºÏÌåºÍ¹ú·À²½¶ÓÔ±¹¤µÄÅÌËã»ú·¢¶¯ÍøÂç¹¥»÷¡£¡£¡£Ö»¹ÜÎÚ¿ËÀ¼ÉÐ佫¸Ã×éÖ¯¹é×ïÓÚij¸öÌØ¶¨¹ú¼Ò£¬£¬ £¬£¬£¬£¬£¬ £¬µ«Ñо¿Ö°Ô±´ËÇ°Ôø½«ÆäÓë¶íÂÞ˹ÁªÏµÆðÀ´¡£¡£¡£¸Ã×é֯ʹÓÃ×ÅÃû¹¤¾ßÈçMeshAgentºÍUltraVNCѬȾÊܺ¦ÕßµÄ×°±¸£¬£¬ £¬£¬£¬£¬£¬ £¬²¢Í¨¹ý¶àÖÖ·½·¨ÈëÇÖϵͳ£¬£¬ £¬£¬£¬£¬£¬ £¬°üÀ¨Ê¹ÓðüÀ¨¶ñÒâºêµÄµç×ÓÓʼþ»î¶¯¡£¡£¡£ÎÚ¿ËÀ¼¾ü·½ºÍ¹ú·ÀÆóÒµÊǺڿ͵ij£¼ûÄ¿µÄ£¬£¬ £¬£¬£¬£¬£¬ £¬´ËÇ°Ò²ÔøÔâÊÜÆäËûÓë¶íÂÞ˹ÓÐÁªÏµµÄºÚ¿Í×éÖ¯µÄ¹¥»÷¡£¡£¡£


https://therecord.media/suspected-russian-hackers-target-ukrainian-enterprises-espionage


4. CISA½«Windows CLFSÎó²îCVE-2024-49138¼ÓÈëÒÑ֪ʹÓÃÎó²îĿ¼


12ÔÂ11ÈÕ£¬£¬ £¬£¬£¬£¬£¬ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Microsoft WindowsͨÓÃÈÕÖ¾Îļþϵͳ(CLFS)Çý¶¯³ÌÐòÖеÄÒ»¸öÎó²îCVE-2024-49138£¨CVSSÆÀ·Ö7.8£©ÁÐÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¡£¡£¸ÃÎó²îÔÚ΢Èí2024Äê12ÔµIJ¹¶¡ÐÇÆÚ¶þÇå¾²¸üÐÂÖлñµÃÐÞ¸´£¬£¬ £¬£¬£¬£¬£¬ £¬ÊǴ˴θüеÄ71¸öÎó²îÖ®Ò»£¬£¬ £¬£¬£¬£¬£¬ £¬ÇÒ±»±ê¼ÇΪÕýÔÚ±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î¡£¡£¡£Ö»¹Ü΢Èíδ¹ûÕæÓйشËÎó²î±»Ê¹ÓõÄÏêϸ¹¥»÷ÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬ £¬µ«¹¥»÷Õß¿ÉʹÓÃËü»ñÈ¡SYSTEMȨÏÞ¡£¡£¡£Í¨¸æÖ¸³ö£¬£¬ £¬£¬£¬£¬£¬ £¬CLFSÇý¶¯³ÌÐò±£´æ»ùÓڶѵĻº³åÇøÒç³öÎó²î£¬£¬ £¬£¬£¬£¬£¬ £¬ÔÊÐíÍâµØ¹¥»÷ÕßÌáÉýȨÏÞ¡£¡£¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸Áî22-01£¬£¬ £¬£¬£¬£¬£¬ £¬Áª°î»ú¹¹±ØÐèÔÚ»®¶¨×èÖ¹ÈÕÆÚǰ½â¾öÒÑ·¢Ã÷µÄÎó²î£¬£¬ £¬£¬£¬£¬£¬ £¬ÒÔ±£» £»£»£» £»¤ÍøÂçÃâÊÜʹÓÃĿ¼ÖÐÎó²îµÄ¹¥»÷¡£¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2024Äê12ÔÂ31ÈÕǰÐÞ¸´´ËÎó²î£¬£¬ £¬£¬£¬£¬£¬ £¬Í¬Ê±×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÏà¹ØÎó²î¡£¡£¡£


https://securityaffairs.com/171851/hacking/u-s-cisa-adds-microsoft-windows-clfs-driver-flaw-to-its-known-exploited-vulnerabilities-catalog.html


5. WordPress²å¼þWPForms·¢Ã÷¸ßÑÏÖØÐÔÎó²î£¬£¬ £¬£¬£¬£¬£¬ £¬Ó°Ï쳬600ÍòÍøÕ¾


12ÔÂ10ÈÕ£¬£¬ £¬£¬£¬£¬£¬ £¬WordPress²å¼þWPFormsÖб£´æÒ»¸ö±àºÅΪCVE-2024-11205µÄ¸ßÑÏÖØÐÔÎó²î£¬£¬ £¬£¬£¬£¬£¬ £¬¿ÉÄÜÓ°ÏìÁè¼Ý600Íò¸öÍøÕ¾¡£¡£¡£¸ÃÎó²îÔÊÐí¾­ÓÉÉí·ÝÑéÖ¤µÄÓû§£¨°üÀ¨¶©ÔÄÕߣ©í§Òâ·¢³öStripeÍË¿î»ò×÷·Ï¶©ÔÄÇëÇ󡣡£¡£ÎÊÌâÔ´ÓÚ²»µ±Ê¹Óú¯Êý¡°wpforms_is_admin_ajax()¡±£¬£¬ £¬£¬£¬£¬£¬ £¬Î´Ç¿ÖÆÖ´Ðй¦Ð§¼ì²éÒÔÏÞÖÆ»á¼û¡£¡£¡£Îó²îÓ°ÏìWPForms 1.8.4ÖÁ1.9.2.1°æ±¾£¬£¬ £¬£¬£¬£¬£¬ £¬ÒÑÔÚ1.9.2.2°æ±¾ÖÐÐÞ¸´¡£¡£¡£WPFormsÊÇÒ»¸öÊ¢ÐеÄÍÏ·ÅʽWordPress±íµ¥¹¹½¨Æ÷£¬£¬ £¬£¬£¬£¬£¬ £¬Ö§³Ö¶àÖÖÖ§¸¶Æ½Ì¨¡£¡£¡£Çå¾²Ñо¿Ô±¡°vullu164¡±·¢Ã÷¸ÃÎó²î²¢±¨¸æ¸øWordfence£¬£¬ £¬£¬£¬£¬£¬ £¬»ñµÃÉͽ𡣡£¡£WordfenceÈ·ÈÏÎó²îºó֪ͨ¹©Ó¦ÉÌAwesome Motive£¬£¬ £¬£¬£¬£¬£¬ £¬ºóÕßÐû²¼ÐÞ¸´°æ±¾¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬£¬£¬ £¬ÓÉÓÚԼĪһ°ëʹÓÃWPFormsµÄÍøÕ¾Î´Ê¹ÓÃ×îа汾£¬£¬ £¬£¬£¬£¬£¬ £¬Òò´ËÖÁÉÙÓÐ300Íò¸öÍøÕ¾ÈÔÃæÁÙΣº¦¡£¡£¡£Ö»¹ÜÉÐδ¼ì²âµ½Ò°ÍâʹÓ㬣¬ £¬£¬£¬£¬£¬ £¬µ«ÈÔ½¨Ò龡¿ìÉý¼¶»ò½ûÓøòå¼þ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/wpforms-bug-allows-stripe-refunds-on-millions-of-wordpress-sites/


6. Black BastaÀÕË÷Èí¼þʹÓÃMS TeamsºÍµç×ÓÓʼþºäÕ¨Èö²¥¶ñÒâÈí¼þ


12ÔÂ10ÈÕ£¬£¬ £¬£¬£¬£¬£¬ £¬Black BastaÀÕË÷Èí¼þ×éÖ¯½üÆÚËÕÐÑ£¬£¬ £¬£¬£¬£¬£¬ £¬²¢ÌᳫÁËÒ»³¡Õë¶ÔÈ«Çò×éÖ¯µÄÖØ´óÉç»á¹¤³Ì»î¶¯¡£¡£¡£Rapid7Ñо¿Ö°Ô±¶Ô´Ë¾ÙÐÐÁËÏêϸÊӲ죬£¬ £¬£¬£¬£¬£¬ £¬²¢Ðû²¼ÁËÒ»·Ýб¨¸æ¡£¡£¡£¹¥»÷Õßͨ¹ýµç×ÓÓʼþºäÕ¨¡¢Microsoft Teamsð³äÒÔ¼°Ê¹ÓÃQuickAssistºÍAnyDeskµÈ¹¤¾ß»ñȡԶ³Ì»á¼ûȨÏÞ£¬£¬ £¬£¬£¬£¬£¬ £¬ÈƹýMFA²¢Ö´ÐжñÒâ¸ºÔØ¡£¡£¡£ÔÚÈö²¥Black BastaÀÕË÷Èí¼þ֮ǰ£¬£¬ £¬£¬£¬£¬£¬ £¬ÍþвÐÐΪÕ߻ᰲÅÅZbotºÍDarkGateµÈ¹¤¾ßÀ´»ñȡƾ֤¡¢Ð¹Â¶Êý¾ÝºÍ¼á³Ö³¤ÆÚÐÔ¡£¡£¡£ËûÃÇʹÓÃÁ˸üеÄÊÖÒÕ£¬£¬ £¬£¬£¬£¬£¬ £¬Èç×Ô½ç˵´ò°ü³ÌÐò»ìÏýÓÐÓÃÔØºÉ¡¢Í¨¹ýrundll32.exeÖ´ÐÐDLLÒÔ¼°¸ß¼¶¹æ±ÜÕ½ÂÔ¡£¡£¡£ÎªÁË»º½â´ËÀ๥»÷µÄΣº¦£¬£¬ £¬£¬£¬£¬£¬ £¬×éÖ¯Ó¦½ÓÄɸüǿʢµÄÃÜÂëÕ½ÂÔ¡¢ÌṩÇå¾²Åàѵ²¢ÊµÑéÏȽøµÄ·ÀÓù²½·¥¡£¡£¡£´Ë´Î¹¥»÷»î¶¯Ê¼ÓÚµç×ÓÓʼþºäÕ¨£¬£¬ £¬£¬£¬£¬£¬ £¬Í¨¹ýÓÕÆ­Óû§ÊÚÓèÔ¶³Ì»á¼ûȨÏÞ£¬£¬ £¬£¬£¬£¬£¬ £¬×îÖÕÄ¿µÄÊǰ²ÅÅBlack BastaÀÕË÷Èí¼þ¼ÓÃÜÒªº¦Êý¾Ý²¢Ë÷ÒªÊê½ð¡£¡£¡£


https://hackread.com/black-basta-gang-ms-teams-email-bombing-malware/