ºÚ¿ÍÉù³ÆÐ§ÀÍÆ÷Ôâµ½ÈëÇÖ £¬£¬£¬ £¬£¬£¬£¬µÂÇÚ³ÆÃô¸ÐÊý¾ÝδÊܵ½Íþв

Ðû²¼Ê±¼ä 2024-09-25
1. ºÚ¿ÍÉù³ÆÐ§ÀÍÆ÷Ôâµ½ÈëÇÖ £¬£¬£¬ £¬£¬£¬£¬µÂÇÚ³ÆÃô¸ÐÊý¾ÝδÊܵ½Íþв


9ÔÂ24ÈÕ £¬£¬£¬ £¬£¬£¬£¬µÂÇÚ¹«Ë¾½üÆÚÔâÓöÁËÒ»ÆðÓÉÎÛÃûÕÑÖøµÄºÚ¿Í×éÖ¯IntelBrokerÌᳫµÄÍøÂç¹¥»÷ÊÂÎñ £¬£¬£¬ £¬£¬£¬£¬¸ÃºÚ¿ÍÔÚBreachForums·¸·¨ÂÛ̳ÉÏÉù³ÆÒÑÀֳɻñÈ¡Á˵ÂÇÚδÍ×ÉÆ·À»¤µÄApache SolrЧÀÍÆ÷Éϵġ°ÄÚ²¿Í¨Ñ¶¡±Êý¾Ý ¡£¡£¡£¡£¡£¾ÝºÚ¿ÍÐÎò £¬£¬£¬ £¬£¬£¬£¬ÕâЩÊý¾ÝÉæ¼°µç×ÓÓʼþµØµã¡¢¹«Ë¾ÄÚ²¿Ô±¹¤¼äµÄͨѶ¼Í¼ÒÔ¼°²¿·ÖÄÚ²¿ÉèÖà £¬£¬£¬ £¬£¬£¬£¬ÇÒ¿Éͨ¹ýĬÈÏÆ¾Ö¤ÇáËÉ»á¼û ¡£¡£¡£¡£¡£Ö»¹ÜÕâЩÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳¹ûÕæ £¬£¬£¬ £¬£¬£¬£¬¹©¸¶ÓöȻ§ÏÂÔØ £¬£¬£¬ £¬£¬£¬£¬µ«µÂÇÚѸËÙ×÷³ö»ØÓ¦ £¬£¬£¬ £¬£¬£¬£¬È·ÈÏȷʵ±¬·¢ÁËÊý¾Ýй¶ £¬£¬£¬ £¬£¬£¬£¬µ«Ç¿µ÷¾­ÊÓ²ìºóÈ·ÈÏ £¬£¬£¬ £¬£¬£¬£¬´Ë´ÎÊÂÎñ²¢Î´²¨¼°Æä¿Í»§Êý¾Ý»òÆäËûÈκÎÃô¸ÐÐÅÏ¢ £¬£¬£¬ £¬£¬£¬£¬Òò´ËÓ°Ïì±»ÏÞÖÆÔÚÁËÒ»¶¨¹æÄ£ÄÚ ¡£¡£¡£¡£¡£µÂÇÚµÄʵʱÉùÃ÷Ö¼ÔÚ¿íο¹«ÖںͿͻ§µÄµ£ÐÄ £¬£¬£¬ £¬£¬£¬£¬Í¬Ê±Í¹ÏÔÁËÆäÔÚÍøÂçÇå¾²ÁìÓòµÄ¾¯ÐÑÐÔºÍÓ¦¶ÔÄÜÁ¦ ¡£¡£¡£¡£¡£


https://www.securityweek.com/deloitte-says-no-threat-to-sensitive-data-after-hacker-claims-server-breach/


2. Diddy³óÎųÉÓÕ¶ü£ºÐÂÐÍPDiddySploit¶ñÒâÈí¼þËÁŰÉ罻ýÌå


9ÔÂ25ÈÕ £¬£¬£¬ £¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕý³Ã»úʹÓÃSean ¡°Diddy¡± CombsµÄ³óÎÅ £¬£¬£¬ £¬£¬£¬£¬Èö²¥ÐÂÐͶñÒâÈí¼þPDiddySploit £¬£¬£¬ £¬£¬£¬£¬Ä¿µÄËø¶¨ÔÚ³äÂúºÃÆæÇÒÎÞÔ¤·ÀµÄÉ罻ýÌåÓû§ £¬£¬£¬ £¬£¬£¬£¬ÓÈÆäÊÇX.com£¨Ç°Twitter£©Óû§ ¡£¡£¡£¡£¡£Õâ¿î¶ñÒâÈí¼þÊôÓÚPySilon RATϵÁÐ £¬£¬£¬ £¬£¬£¬£¬ÒÔÆäǿʢµÄÊý¾ÝÇÔÈ¡¡¢¼üÅÌ¼à¿Ø¡¢ÆÁÄ»¼Í¼¼°Ô¶³Ì¿ØÖƹ¦Ð§Öø³Æ ¡£¡£¡£¡£¡£ÍøÂç·¸·¨·Ö×Óͨ¹ýÉÏ´«Î±×°³É°üÀ¨DiddyÒÑɾ³ýÉ罻ýÌåÌû×ÓµÄÎļþ £¬£¬£¬ £¬£¬£¬£¬ÓÕÆ­Óû§ÏÂÔØ £¬£¬£¬ £¬£¬£¬£¬½ø¶øÑ¬È¾Æä×°±¸ ¡£¡£¡£¡£¡£´ËÀ๥»÷ʹÓÃÁ˹«ÖÚ¶ÔÃûÈ˳óÎÅµÄºÃÆæÐÄÀí £¬£¬£¬ £¬£¬£¬£¬ÌØÊâÊǵ±³óÎÅÊܵ½Ã½Ìå¸ß¶È¹Ø×¢Ê± £¬£¬£¬ £¬£¬£¬£¬Êܺ¦ÕßÍùÍùÄÑÒÔ¿¹¾Ü̽Ë÷δ֪ÐÅÏ¢µÄÓÕ»ó ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬ £¬£¬£¬£¬PDiddySploit²¢·ÇDiddyÓë¶ñÒâÈí¼þ¹ØÁªµÄÊ×Àý £¬£¬£¬ £¬£¬£¬£¬ÀúÊ·ÉÏÓжà´ÎÀàËÆÊÂÎñ £¬£¬£¬ £¬£¬£¬£¬¾ùÒÔÃûÈËÏà¹ØÄÚÈÝΪÓÕ¶ü ¡£¡£¡£¡£¡£Ëæ×ÅPySilon RATµÈ¶ñÒâÈí¼þµÄÒ»Ö±½ø»¯ £¬£¬£¬ £¬£¬£¬£¬ÒÔ¼°ÍøÂç·¸·¨·Ö×ӵĽÆÕ©ÊÖ¶Î £¬£¬£¬ £¬£¬£¬£¬¹«ÖÚÐèÌá¸ßСÐÄ £¬£¬£¬ £¬£¬£¬£¬×èÖ¹È̼̮æÐijÉÎªÍøÂçÇå¾²µÄÈíÀß ¡£¡£¡£¡£¡£ÔÚÉ罻ýÌåÉÏä¯ÀÀÈÈÃÅ»°Ìâʱ £¬£¬£¬ £¬£¬£¬£¬¼á³ÖÀíÐÔÅÐ¶Ï £¬£¬£¬ £¬£¬£¬£¬ÉóÉ÷ÏÂÔØ²»Ã÷ȪԴµÄÎļþ £¬£¬£¬ £¬£¬£¬£¬ÊDZ £»£»£»£» £» £»£»¤×Ô¼ºÃâÊÜ´ËÀ๥»÷µÄÒªº¦ ¡£¡£¡£¡£¡£


https://hackread.com/pdiddysploit-malware-hidden-files-deleted-diddy-posts/


3. AutoCanadaÔ±¹¤Êý¾ÝÒÉÔâHunters InternationalÀÕË÷ÍÅ»ïй¶


9ÔÂ24ÈÕ £¬£¬£¬ £¬£¬£¬£¬AutoCanada½üÆÚÔâÓöÁËÒ»³¡ÓÉHunters InternationalÀÕË÷Èí¼þÍÅ»ïÌᳫµÄÍøÂç¹¥»÷ £¬£¬£¬ £¬£¬£¬£¬ÖÒÑÔ³ÆÔ±¹¤Êý¾Ý¿ÉÄÜÒÑÔÚ8Ô·ݵĹ¥»÷Öб»Ð¹Â¶ ¡£¡£¡£¡£¡£Ö»¹Ü¹«Ë¾ÉÐδ·¢Ã÷Õë¶ÔÊÜÓ°ÏìÔ±¹¤µÄڲƭ»î¶¯ £¬£¬£¬ £¬£¬£¬£¬µ«ÈÔÆð¾¢·¢ËÍ֪ͨÒÔÌáÐÑDZÔÚΣº¦ ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÆÈʹAutoCanada¹Ø±Õ²¿·ÖÄÚ²¿ITϵͳ £¬£¬£¬ £¬£¬£¬£¬µ¼ÖÂÔËÓªÖÐÖ¹ £¬£¬£¬ £¬£¬£¬£¬Ö»¹ÜÆä66¼Ò¾­ÏúµêÓªÒµÈÔÔÚ¼ÌÐø £¬£¬£¬ £¬£¬£¬£¬µ«²¿·Ö¿Í»§Ð§ÀÍÊܵ½ÑÓÎó ¡£¡£¡£¡£¡£Hunters InternationalËæºóÔÚÀÕË÷ÃÅ»§ÉÏÈ·ÈϹ¥»÷ £¬£¬£¬ £¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁËÊýTBÊý¾Ý £¬£¬£¬ £¬£¬£¬£¬°üÀ¨¸ß¹ÜÐÅÏ¢¡¢²ÆÎñÎļþºÍÈËÁ¦×ÊÔ´Êý¾ÝµÈÃô¸ÐÐÅÏ¢ ¡£¡£¡£¡£¡£AutoCanadaͨ¹ýÐû²¼³£¼ûÎÊÌâ½â´ðÒ³Ãæ»ØÓ¦¹«ÖÚ¹ØÇÐ £¬£¬£¬ £¬£¬£¬£¬Ö¸³ö¼ÓÃÜЧÀÍÆ÷ÄÚÈÝÕýÔÚ»Ö¸´ºÍÆÊÎöÖÐ £¬£¬£¬ £¬£¬£¬£¬²¢ÈϿɿÉÄÜÉæ¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅϢй¶ ¡£¡£¡£¡£¡£ÒÑй¶µÄÔ±¹¤Êý¾ÝÏ꾡 £¬£¬£¬ £¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢ÈËΪÐÅÏ¢¡¢Éç±£ºÅÂë¼°ÒøÐÐÕ˺ŵÈÃô¸Ð×ÊÁÏ £¬£¬£¬ £¬£¬£¬£¬¹«Ë¾Îª´ËÌṩΪÆÚÈýÄêµÄÃâ·ÑÉí·Ý͵ÇÔ± £»£»£»£» £» £»£»¤ºÍÐÅÓÃ¼à¿Ø ¡£¡£¡£¡£¡£ÎªÌá·ÀδÀ´¹¥»÷ £¬£¬£¬ £¬£¬£¬£¬AutoCanadaÒѽÓÄÉһϵÁÐÇå¾²²½·¥ £¬£¬£¬ £¬£¬£¬£¬°üÀ¨¸ôÀëÊÜѬȾϵͳ¡¢ÖØÖÃÃÜÂ롢ʵÑéÍþв¼ì²âºÍÏìӦϵͳ £¬£¬£¬ £¬£¬£¬£¬²¢ÔöǿԱ¹¤ÍøÂçÇå¾²Åàѵ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/autocanada-says-ransomware-attack-may-impact-employee-data/


4. CISA¾¯Ê¾Ivanti vTMÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îCVE-2024-7593±»Æð¾¢Ê¹ÓÃ


9ÔÂ24ÈÕ £¬£¬£¬ £¬£¬£¬£¬CISA£¨ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£©×î½üÕ¹ÏÖÁËIvantiÐéÄâÁ÷Á¿ÖÎÀíÆ÷£¨vTM£©ÖеÄÒ»¸öÑÏÖØÇå¾²Îó²îCVE-2024-7593 £¬£¬£¬ £¬£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾­ÊÚȨµÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤ £¬£¬£¬ £¬£¬£¬£¬ÔÚÊÜÓ°ÏìµÄvTM×°±¸ÉϽ¨Éè¶ñÒâÖÎÀíÔ±ÕË»§ ¡£¡£¡£¡£¡£vTMÊÇIvantiÌṩµÄÓ¦ÓóÌÐò½»¸¶¿ØÖÆÆ÷ £¬£¬£¬ £¬£¬£¬£¬ÈÏÕæÒªº¦Ð§À͵ĸºÔØÆ½ºâºÍÁ÷Á¿ÖÎÀí ¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚÉí·ÝÑéÖ¤Ëã·¨µÄ¹ýʧʵÏÖ £¬£¬£¬ £¬£¬£¬£¬Ê¹Ô¶³Ì¹¥»÷ÕßÄܹ»ÈÝÒ×»á¼û²¢¿ØÖÆ×°±¸ ¡£¡£¡£¡£¡£Ö»¹ÜIvantiÔÚ8ÔÂÒÑÐû²¼²¹¶¡ÐÞ¸´´ËÎÊÌâ £¬£¬£¬ £¬£¬£¬£¬µ«CISAÈ·ÈϸÃÎó²îÒѱ»×Ô¶¯Ê¹Óà £¬£¬£¬ £¬£¬£¬£¬²¢½ôÆÈ½«ÆäÁÐÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ ¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÁª°î»ú¹¹±»ÒªÇóÔÚ10ÔÂ15ÈÕǰ½ÓÄÉÐж¯ £¬£¬£¬ £¬£¬£¬£¬± £»£»£»£» £» £»£»¤ÆäÍøÂçÖеÄvTM×°±¸ ¡£¡£¡£¡£¡£±ðµÄ £¬£¬£¬ £¬£¬£¬£¬CISAÒ²½¨ÒéÈ«Çò˽ÓÐ×éÖ¯ÓÅÏÈ´¦Öóͷ£´ËÎó²î £¬£¬£¬ £¬£¬£¬£¬ÒÔÌá·ÀDZÔÚ¹¥»÷ ¡£¡£¡£¡£¡£¼øÓÚIvantiÔÚÈ«ÇòÓµÓÐÖØ´óµÄÏàÖúͬ°éÍøÂçºÍÓû§»ù´¡ £¬£¬£¬ £¬£¬£¬£¬´Ë´ÎÎó²îµÄÆÕ±éÓ°Ïì½ûÖ¹ºöÊÓ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-ivanti-vtm-auth-bypass-bug-now-exploited-in-attacks/


5. ÈøË¹Öݰ¢¿ÏÉ«³ÇË®´¦Öóͷ£ÉèÊ©ÔâÍøÂç¹¥»÷ £¬£¬£¬ £¬£¬£¬£¬ÏµÍ³ÔÝתÊÖ¶¯²Ù×÷


9ÔÂ24ÈÕ £¬£¬£¬ £¬£¬£¬£¬ÈøË¹Öݰ¢¿ÏÉ«³ÇµÄË®´¦Öóͷ£ÉèÊ©ÓÚ2024Äê9ÔÂ22ÈÕÔâÓöÍøÂçÇå¾²ÊÂÎñ £¬£¬£¬ £¬£¬£¬£¬µ¼ÖÂϵͳÔÝʱתΪÊÖ¶¯²Ù×÷ ¡£¡£¡£¡£¡£Ö»¹ÜÕâÒ»ÊÂÎñÒýÆðÁ˹Ø×¢ £¬£¬£¬ £¬£¬£¬£¬µ«Êг¤À¼µÏ¡¤¸¥À×ÔóѸËÙÐû²¼Í¨¸æ¿íοÃñÖÚ £¬£¬£¬ £¬£¬£¬£¬Ç¿µ÷¹©Ë®Ð§ÀÍδÊÜÓ°Ïì £¬£¬£¬ £¬£¬£¬£¬Ë®ÖÊÇå¾²ÎÞÓÇ ¡£¡£¡£¡£¡£Õþ¸®Ñ¸ËÙÏìÓ¦ £¬£¬£¬ £¬£¬£¬£¬Ô¼ÇëÍøÂçÇ徲ר¼Ò½éÈë £¬£¬£¬ £¬£¬£¬£¬²¢ÔöÇ¿Ç徲ЭÒéÒÔ°ü¹Ü¹©Ë®Çå¾² ¡£¡£¡£¡£¡£ÆðÔ´¼£ÏóÖ¸ÏòÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬ £¬£¬£¬£¬´ÙʹÉèÊ©½ÓÄÉÊÖ¶¯²Ù×÷ÒÔ·ÀÊÂ̬À©´ó ¡£¡£¡£¡£¡£°¢¿ÏÉ«ÊйÙÔ±ÕýÈ«Á¦ÊÓ²ì £¬£¬£¬ £¬£¬£¬£¬È·±£Ë®ÖʺÍЧÀÍÎÈ¹Ì ¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔÙ´ÎÇÃÏìÁ˹«ÓÃÊÂÒµ²¿·ÖÍøÂçÇå¾²¾¯ÖÓ £¬£¬£¬ £¬£¬£¬£¬ÓÈÆäÊÇË®ÎñÏµÍ³ÃæÁÙµÄÑÏËàÌôÕ½ ¡£¡£¡£¡£¡£ÃÀ¹úÕþ¸®Õý¼Ó¶¦Á¦´ó¾Ù¶ÈÌáÉýË®ÎñÉèÊ©µÄÍøÂç·ÀÓùÄÜÁ¦ £¬£¬£¬ £¬£¬£¬£¬Ô¤·ÀδÀ´¹¥»÷ ¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´ËÀàÍþв £¬£¬£¬ £¬£¬£¬£¬Ë®Îñ¹«Ë¾Ðè¹¹½¨ÖÜÈ«µÄÍøÂçÇ徲ϵͳ £¬£¬£¬ £¬£¬£¬£¬°üÀ¨°´ÆÚÇå¾²Éó²é¡¢Ô±¹¤Çå¾²Åàѵ¡¢Êý¾Ý¼ÓÃܼ°¶àÒòËØÉí·ÝÑéÖ¤µÈ²½·¥ ¡£¡£¡£¡£¡£Í¬Ê± £¬£¬£¬ £¬£¬£¬£¬¼á³Öϵͳ¸üв¢Öƶ©Ó¦¼±ÏìÓ¦ÍýÏë £¬£¬£¬ £¬£¬£¬£¬ÊÇ¿ìËÙÓ¦¶Ô²¢¼õÇáDZÔÚË𺦵ÄÒªº¦ ¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/incident-arkansas-city-water/


6. Octo2¶ñÒâÈí¼þа汾αװÈÈÃÅÓ¦ÓÃÔÚÅ·ÖÞËÁŰ


9ÔÂ24ÈÕ £¬£¬£¬ £¬£¬£¬£¬Ò»ÖÖÃûΪ¡°Octo2¡±µÄÐÂÐÍAndroid¶ñÒâÈí¼þ±äÖÖÔÚÅ·ÖÞÇÄÈ»ÉìÕÅ £¬£¬£¬ £¬£¬£¬£¬Î±×°³ÉNordVPN¡¢Google Chrome¼°Å·ÖÞÆóÒµÓ¦ÓõÈÈÈÃÅÈí¼þ £¬£¬£¬ £¬£¬£¬£¬Ö¼ÔÚÓÕÆ­Óû§ÏÂÔØ ¡£¡£¡£¡£¡£Õâ¿îÈí¼þÓÉÔçÆÚµÄExoCompactºÍExoBotľÂíÑÝ±ä¶øÀ´ £¬£¬£¬ £¬£¬£¬£¬Õ¹Ê¾ÁËÆäÍçÇ¿µÄÉúÃüÁ¦ºÍÒ»Á¬µÄÊÖÒÕˢР¡£¡£¡£¡£¡£Octo2²»µ«¼ÌÐøÁËǰ´úµÄǿʢ¹¦Ð§ £¬£¬£¬ £¬£¬£¬£¬Èç¼üÅ̼ͼ¡¢×°±¸¿ØÖÆµÈ £¬£¬£¬ £¬£¬£¬£¬»¹ÏÔÖøÌáÉýÁËÔËÐÐÎȹÌÐÔ¡¢·´ÆÊÎöÄÜÁ¦ºÍͨѶÎÞаÐÔ £¬£¬£¬ £¬£¬£¬£¬ÒýÈëÁËÓòÌìÉúËã·¨£¨DGA£©ÒÔÔöÇ¿ÏÂÁîÓë¿ØÖÆ£¨C2£©µÄµ¯ÐÔ ¡£¡£¡£¡£¡£ThreatFabricµÄÑо¿Õ¹ÏÖÁËOcto2µÄÖØ´óÐԺͽÆÕ©ÐÔ £¬£¬£¬ £¬£¬£¬£¬Æäͨ¹ýZombiderЧÀÍǶÈë¶ñÒâ¸ºÔØ £¬£¬£¬ £¬£¬£¬£¬ÉõÖÁÄÜÈÆ¹ýAndroid 13µÄÇå¾²ÏÞÖÆ ¡£¡£¡£¡£¡£Ð°汾ÔÚÅþÁ¬ÓÅ»¯¡¢Êý¾Ý¼ÓÃܺͶ¯Ì¬¼ÓÔØÊÖÒÕÉϵÄǰ½ø £¬£¬£¬ £¬£¬£¬£¬Ê¹Æä¸üÄѱ»¼ì²âºÍÆÊÎö ¡£¡£¡£¡£¡£ÌØÊâµØ £¬£¬£¬ £¬£¬£¬£¬Ð¼ÓÈëµÄ¡°SHIT_QUALITY¡±ÉèÖÃÈ·±£Á˵ÍÍøÂçÇéÐÎϵÄÎȹÌͨѶ £¬£¬£¬ £¬£¬£¬£¬¶ø»ùÓÚDGAµÄC2ϵͳÔò´ó·ùÌáÉýÁËЧÀÍÆ÷µÄÎÞаÐԺͿ¹¹¥»÷ÄÜÁ¦ ¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬ £¬£¬£¬£¬Octo2µÄ¹¥»÷»î¶¯Ö÷Òª¼¯ÖÐÔÚÅ·ÖÞ¼¸¸ö¹ú¼Ò £¬£¬£¬ £¬£¬£¬£¬µ«¼øÓÚÆäMaaSƽ̨µÄÈ«ÇòÓ°ÏìÁ¦ £¬£¬£¬ £¬£¬£¬£¬Î´À´ÓпÉÄÜÀ©Õ¹µ½ÆäËûµØÇø ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-octo-android-malware-version-impersonates-nordvpn-google-chrome/