΢ÈíÔ¶³Ì×¢²á±í¿Í»§¶ËÎó²îCVE-2024-43532¹ûÕæ

Ðû²¼Ê±¼ä 2024-10-24
1. ΢ÈíÔ¶³Ì×¢²á±í¿Í»§¶ËÎó²îCVE-2024-43532¹ûÕæ


10ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Õë¶Ô΢ÈíÔ¶³Ì×¢²á±í¿Í»§¶ËµÄÎó²îCVE-2024-43532ÏÖÒѹûÕæ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îʹÓÃWindows×¢²á±í¿Í»§¶ËʵÏÖÖеĻØÍË»úÖÆ£¬£¬£¬£¬£¬£¬£¬£¬ÔÚSMB´«Êä²»¿ÉÓÃʱÒÀÀµÓھɴ«ÊäЭÒ飬£¬£¬£¬£¬£¬£¬£¬²¢½µµÍÉí·ÝÑéÖ¤Àú³ÌµÄÇå¾²ÐÔ£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶ø¿ØÖÆWindowsÓò¡£¡£¡£¸ÃÎó²îÓ°ÏìWindowsЧÀÍÆ÷°æ±¾2008ÖÁ2022ÒÔ¼°Windows 10ºÍ11¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý×èµ²NTLMÉí·ÝÑéÖ¤ÎÕÊÖ²¢½«Æäת·¢µ½Active DirectoryÖ¤ÊéЧÀÍ(ADCS)µÈЧÀÍ£¬£¬£¬£¬£¬£¬£¬£¬½¨ÉèеÄÓòÖÎÀíÔ±ÕÊ»§¡£¡£¡£CVE-2024-43532Ô´ÓÚÔ¶³Ì×¢²á±í¿Í»§¶ËÔÚ´¦Öóͷ£RPCÉí·ÝÑé֤ʱµÄÎÊÌ⣬£¬£¬£¬£¬£¬£¬£¬µ±SMB´«Êä²»¿ÉÓÃʱ£¬£¬£¬£¬£¬£¬£¬£¬¿Í»§¶Ë»áÇл»µ½½Ï¾ÉµÄЭÒ鲢ʹÓÃÈõÉí·ÝÑéÖ¤¼¶±ð¡£¡£¡£AkamaiÑо¿Ô±Stiv KupchikÓÚ2ÔÂ1ÈÕÏò΢ÈíÅû¶Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬£¬µ«×î³õ±»²µ»Ø£¬£¬£¬£¬£¬£¬£¬£¬ºóÓÚ6ÔÂÖÐÑ®ÖØÐÂÌá½»²¢»ñµÃÈ·ÈÏ£¬£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÓÚÈý¸öÔºóÐû²¼ÁËÐÞ¸´³ÌÐò¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬KupchikÒÑÐû²¼ÓÐÓõĿ´·¨ÑéÖ¤´úÂ룬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚNo HatÇå¾²¾Û»áÉÏÚ¹ÊÍÁËʹÓÃÀú³Ì¡£¡£¡£AkamaiµÄ±¨¸æ»¹ÌṩÁ˼ì²âÒ×Êܹ¥»÷µÄ»úеºÍ¼àÊÓÌØ¶¨RPCŲÓõÄÒªÁì¡£¡£¡£


https://www.bleepingcomputer.com/news/security/exploit-released-for-new-windows-server-winreg-ntlm-relay-attack/


2. Gophish¹¤¾ß°ü±»ÀÄÓÃÓÚÖÆ×÷Õë¶Ô¶íÓïÆ¬ÇøÓû§µÄRATľÂí


10ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬GophishÕâÒ»¿ªÔ´ÍøÂç´¹ÂÚ¹¤¾ß°üÕý±»²»·¨·Ö×ÓʹÓ㬣¬£¬£¬£¬£¬£¬£¬ÒÔÖÆ×÷²¢Èö²¥DarkCrystal RAT£¨DCRat£©ºÍPowerRATµÈÔ¶³Ì»á¼ûľÂí£¬£¬£¬£¬£¬£¬£¬£¬Ö÷ҪĿµÄÊǶíÓïÆ¬ÇøÓû§£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨¶íÂÞ˹¼°ÆäÖܱ߹ú¼ÒÈçÎÚ¿ËÀ¼¡¢°×¶íÂÞ˹¡¢¹þÈø¿Ë˹̹¡¢ÎÚ×ȱð¿Ë˹̹ºÍ°¢Èû°Ý½®¡£¡£¡£GophishÔ­±¾±»Éè¼ÆÓÃÓÚ×éÖ¯²âÊÔÍøÂç´¹ÂÚ·ÀÓùÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÈ´½è´ËÖÆ×÷αװ³ÉYandex DiskÁ´½ÓºÍVKÉç½»ÍøÂçÒ³ÃæµÄÍøÂç´¹ÂÚÓʼþ¡£¡£¡£ÕâЩÓʼþÓÕµ¼Óû§ÏÂÔØ°üÀ¨DCRat»òPowerRAT¶ñÒâľÂíµÄMicrosoft WordÎĵµ»òǶÈëJavaScriptµÄHTMLÎļþ¡£¡£¡£Ò»µ©Êܺ¦Õß·­¿ªÎĵµ²¢ÆôÓú꣬£¬£¬£¬£¬£¬£¬£¬¾Í»á´¥·¢¶ñÒâVisual Basic (VB)¾ç±¾£¬£¬£¬£¬£¬£¬£¬£¬½ø¶øÏÂÔØ²¢Ö´ÐÐHTAÎļþºÍPowerShell¼ÓÔØÆ÷¡£¡£¡£ÕâЩ¾ç±¾°üÀ¨PowerRATµÄbase64±àÂëÊý¾Ý¿é£¬£¬£¬£¬£¬£¬£¬£¬½âÂëºóÔÚÊܺ¦Õß»úеÉÏÖ´ÐС£¡£¡£³ýÁËϵͳÕì̽£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹»áÍøÂçÇý¶¯Æ÷ÐòÁкŲ¢ÅþÁ¬µ½¶íÂÞ˹Զ³ÌЧÀÍÆ÷ÎüÊÕÖ¸Áî¡£¡£¡£Èôδ»ñÏìÓ¦£¬£¬£¬£¬£¬£¬£¬£¬ÔòÖ´ÐÐǶÈëµÄPowerShell¾ç±¾¡£¡£¡£DCRat×÷ΪһÖÖÄ£¿£¿£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬ÄÜÇÔÈ¡Êý¾Ý¡¢²¶»ñÆÁÄ»½ØÍ¼ºÍ»÷¼ü£¬£¬£¬£¬£¬£¬£¬£¬ÌṩԶ³Ì¿ØÖÆ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÏÂÔØÖ´ÐÐÆäËûÎļþ¡£¡£¡£


https://thehackernews.com/2024/10/gophish-framework-used-in-phishing.html


3. GrandoreiroÒøÐÐľÂí£ºÈ«Çò½ðÈÚÍþвһÁ¬Éý¼¶


10ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¿¨°Í˹»ùʵÑéÊÒ×î½üÐû²¼µÄÒ»·Ý±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬GrandoreiroÒøÐÐľÂíÒѳÉΪȫÇòÖØ´ó½ðÈÚÍþв¡£¡£¡£¸ÃľÂíÆðÔ´ÓÚ°ÍÎ÷£¬£¬£¬£¬£¬£¬£¬£¬×Ô2016ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡ÒøÐÐÆ¾Ö¤²¢ÈƹýÇå¾²²½·¥¡£¡£¡£Ö»¹ÜÖ´·¨²¿·ÖÒÑÆð¾¢¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬µ«GrandoreiroµÄ¹¥»÷¹æÄ£ÒÑÏÔÖøÀ©´ó£¬£¬£¬£¬£¬£¬£¬£¬ÏÖÒÑÕë¶Ô45¸ö¹ú¼ÒµÄ1700¼ÒÒøÐкÍ276¸ö¼ÓÃÜÇ®±ÒÇ®°ü£¬£¬£¬£¬£¬£¬£¬£¬ÏÔʾ³öÆäÕæÕýµÄÈ«ÇòÍþвÐÔ¡£¡£¡£ÔÚÎ÷°àÑÀ£¬£¬£¬£¬£¬£¬£¬£¬GrandoreiroÔì³ÉµÄ¾­¼ÃËðʧԤ¼Æ´ï350ÍòÅ·Ôª£¬£¬£¬£¬£¬£¬£¬£¬µ«±¨¸æÖ¸³öÆä¿ÉÄÜ´øÀ´µÄÀûÈóÁè¼Ý1.1ÒÚÅ·Ôª¡£¡£¡£GrandoreiroľÂíÒ»Ö±Á¢ÒìÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÓòÌìÉúËã·¨½¨ÉèеÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬£¬½ÓÄÉÃÜÎÄÇÔÈ¡¼ÓÃÜÔöÌíÆÊÎöÄѶÈ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÒýÈëɳºÐ¹æ±ÜÊÖÒÕÈç¸ú×ÙÊó±êÒÆ¶¯ÒÔÄ£ÄâÕýµ±Óû§½»»¥£¬£¬£¬£¬£¬£¬£¬£¬ÓÕÆ­·´Ú²Æ­ÏµÍ³¡£¡£¡£ÆäÄ£¿£¿£¿£¿£¿£¿£¿é»¯ÌØÕ÷ÔÊÐí¶à¸ö²Ù×÷Ô±½¨ÉèÕë¶ÔÌØ¶¨µØÇø»ò½ðÈÚ»ú¹¹µÄË鯬»¯°æ±¾¡£¡£¡£×Ô2022ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬£¬£¬¿¨°Í˹»ùÊӲ쵽¸ÃľÂí½¨ÉèÁ˽ÏС¡¢½ÏÇáµÄ°æ±¾£¬£¬£¬£¬£¬£¬£¬£¬×¨×¢ÓÚ½ÏÉÙµÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇÔÚÄ«Î÷¸ç¡£¡£¡£Grandoreiroͨ³£ÒÔ¶ñÒâÈí¼þ¼´Ð§À͵ÄÐÎʽÔËÐУ¬£¬£¬£¬£¬£¬£¬£¬ÆäÈö²¥Êܵ½¿ØÖÆ£¬£¬£¬£¬£¬£¬£¬£¬Ö»ÓÐÖµµÃÐÅÈεÄÏàÖúͬ°é²Å»ª»á¼ûÔ´´úÂë¡£¡£¡£


https://securityonline.info/1700-banks-45-countries-grandoreiro-trojan-expands-its-reach/


4. ºÚ¿ÍʹÓÃgRPCЭÒéÔÚDocker APIÉϰ²ÅżÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò


10ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Trend Micro Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÐÂÐÍÍøÂç¹¥»÷ÊֶΣ¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓà Docker Ô¶³Ì API ЧÀÍÆ÷É쵀 gRPC ЭÒ飨ͨ¹ý h2c Ã÷ÎÄ HTTP/2£©À´°²ÅÅ SRBMiner ¼ÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò£¬£¬£¬£¬£¬£¬£¬£¬Ä¿µÄÊÇÍÚ¾ò Ripple Labs ¿ª·¢µÄ XRP ¼ÓÃÜÇ®±Ò¡£¡£¡£¹¥»÷Á÷³ÌʼÓÚɨÃèÒ×Êܹ¥»÷µÄ Docker API ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬£¬Ëæºó¼ì²éÆä¿ÉÓÃÐԺͰ汾£¬£¬£¬£¬£¬£¬£¬£¬²¢·¢ËÍ gRPC/h2c Éý¼¶ÇëÇóÒÔÔ¶³ÌʹÓà Docker ¹¦Ð§¶ø²»±»·¢Ã÷¡£¡£¡£Ò»µ©½¨Éè¿ØÖÆ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß±ãʹÓÃÕýµ±»ù´¡Ó³Ïñ¹¹½¨ Docker Ó³Ïñ£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ /usr/sbin Ŀ¼Öа²ÅÅÍÚ¿ó³ÌÐò£¬£¬£¬£¬£¬£¬£¬£¬²¢´Ó GitHub ÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£ËûÃÇ»¹ÌṩÁË Ripple Ç®°üµØµãÒÔÍøÂçÍÚ³öµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£´Ë´Î¹¥»÷Ö®ÒÔÊÇÁîÈ˵£ÐÄ£¬£¬£¬£¬£¬£¬£¬£¬ÊÇÓÉÓÚʹÓà h2c É쵀 gRPC ЭÒé¿ÉÈÆ¹ýÇå¾²²ã£¬£¬£¬£¬£¬£¬£¬£¬Ê¹Çå¾²¹¤¾ßÄÑÒÔ¼ì²âµ½¼ÓÃܿ󹤵ݲÅÅ¡£¡£¡£ÕâÅú×¢ÍøÂç·¸·¨·Ö×ÓµÄÕ½ÂÔÔÚÒ»Ö±Ñݱ䣬£¬£¬£¬£¬£¬£¬£¬ËûÃÇÕýÔÚѰÕÒÁ¢ÒìÒªÁìÀ´Ê¹Óà Docker µÈÈÝÆ÷»¯ÇéÐΡ£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬£¬£¬±£» £»£»£»£» £»£»¤ Docker Ô¶³Ì API ºÍ¼à¿ØÒì³£» £»£»£»£» £»£»î¶¯±äµÃÓÈΪÖ÷Òª¡£¡£¡£


https://securityonline.info/cryptojacking-alert-hackers-exploit-grpc-and-http-2-to-deploy-miners/


5. CISA½«Microsoft SharePointÎó²îÁÐΪÒÑÖª±»Ê¹ÓÃÎó²î


10ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Microsoft SharePointµÄÒ»¸ö·´ÐòÁл¯Îó²îCVE-2024-38094£¨CVSS v4ÆÀ·Ö£º7.2£©ÄÉÈëÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¸ÃÎó²îÔÊÐíÓµÓÐÕ¾µãËùÓÐÕßȨÏ޵Ĺ¥»÷Õßͨ¹ýSharePoint Server×¢Èë²¢Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¾Ý΢Èíͨ¸æ£¬£¬£¬£¬£¬£¬£¬£¬´ËÎó²îÔ´ÓÚSharePoint Server Search×é¼þµÄÊäÈëÑéÖ¤¹ýʧ£¬£¬£¬£¬£¬£¬£¬£¬Ê¹µÃδ¾­Éí·ÝÑéÖ¤µÄÓû§Ò²ÄÜͨ¹ý·¢ËÍÌØÖÆHTTPÇëÇóÀ´Ê¹ÓÃÎó²î£¬£¬£¬£¬£¬£¬£¬£¬½ø¶øÔÚЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬£¬£¬¿ÉÄܽÓÊÜÕû¸öϵͳ¡£¡£¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸Áî22-01£¬£¬£¬£¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹£¨FCEB£©±ØÐèÔÚ»®¶¨×èÖ¹ÈÕÆÚǰ½â¾öÒÑ·¢Ã÷µÄÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ±£» £»£»£»£» £»£»¤ÍøÂçÃâÊÜĿ¼ÖÐÎó²îµÄ¹¥»÷¡£¡£¡£CISAÌØÊâÒªÇóÁª°î»ú¹¹ÔÚ2024Äê11ÔÂ12ÈÕǰÐÞ¸´´ËSharePointÎó²î¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬£¬×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²éCISAµÄÎó²îĿ¼£¬£¬£¬£¬£¬£¬£¬£¬²¢ÊµÊ±½â¾öÆä»ù´¡ÉèÊ©Öб£´æµÄÏìÓ¦Îó²î£¬£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·±£ÍøÂçÇå¾²¡£¡£¡£


https://securityaffairs.com/170157/security/u-s-cisa-adds-microsoft-sharepoint-flaw-known-exploited-vulnerabilities-catalog.html


6. ±±·Çµç×Ó¾º¼¼Æ½Ì¨ESNAÓû§Êý¾ÝÔâºÚ¿Íй¶


10ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ½ÇÖðǰϦ£¬£¬£¬£¬£¬£¬£¬£¬ÃûΪ¡°Shooked¡±µÄºÚ¿ÍÓÚ2024Äê10ÔÂ23ÈÕÔÚBreach ForumsÉÏй¶Á˱±·Çµç×Ó¾º¼¼(ESNA)ƽ̨Áè¼Ý18ÍòÃûÓû§µÄСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÊý¾Ýת´¢¾ÞϸΪ3GB£¬£¬£¬£¬£¬£¬£¬£¬²¢Éù³ÆÊÇ¡°ÍêÕûÊý¾Ý¿â¡±¡£¡£¡£´Ë´Îй¶±¬·¢ÔÚESNA½ÇÖðÓÚĦÂå¸ç¿ªÈüµÄǰһÌì¡£¡£¡£ESNAÊÇÒ»¸öÖ¼ÔÚÔö½ø±±·ÇµØÇø¾º¼¼ÓÎÏ·Éú³¤µÄƽ̨£¬£¬£¬£¬£¬£¬£¬£¬×éÖ¯Á˰üÀ¨FC25¡¢Free Fire¡¢Ä°Í·°ÔÍõ6µÈÈÈÃÅÓÎÏ·µÄ½õ±êÈü¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÊý¾Ý°üÀ¨Áè¼Ý900ÍòÐУ¬£¬£¬£¬£¬£¬£¬£¬µ«È¥ÖغóΨһÓû§¼Í¼Ϊ180,000Ìõ£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Óû§Éí·Ý¡¢¹ú¼Ò¡¢Óû§Ãû¡¢IPµØµã¡¢Ê±¼ä´Á¡¢»á»°ID¡¢WordPress URLºÍµç×ÓÓʼþµØµãµÈÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬µ«²»°üÀ¨ÃÜÂë»ò²ÆÎñÐÅÏ¢¡£¡£¡£Ö»¹ÜÔÆÔÆ£¬£¬£¬£¬£¬£¬£¬£¬Óû§ÈÔ±»½¨Òé¸ü¸ÄÃÜÂëÒÔ·ÀÍòÒ»£¬£¬£¬£¬£¬£¬£¬£¬²¢Ð¡ÐÄ¿ÉÄÜÓÉ´Ë´Îй¶Òý·¢µÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬ESNA×éÖ¯ÉÐδ¶Ô´ËÊÂ×÷³ö»ØÓ¦£¬£¬£¬£¬£¬£¬£¬£¬µ«Óû§Ó¦¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ·ÀÍøÂç·¸·¨·Ö×ÓʹÓô˴Îй¶¾ÙÐжñÒâ»î¶¯¡£¡£¡£


https://hackread.com/hackers-leak-esport-north-africa-user-record-before-tournament/