Ô½ÄϺڿÍ×éÖ¯°²ÅÅPXA Stealer£¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÅ·ÑÇÕþ¸®½ÌÓý»ú¹¹

Ðû²¼Ê±¼ä 2024-11-19

1. Ô½ÄϺڿÍ×éÖ¯°²ÅÅPXA Stealer£¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÅ·ÑÇÕþ¸®½ÌÓý»ú¹¹


11ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ò»ÃûÉæÏÓÓëÔ½ÄÏÓйصÄÍþвÐÐΪÕßʹÓÃÃûΪPXA StealerµÄÐÂÐÍPython¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÅ·ÖÞºÍÑÇÖÞÕþ¸®¼°½ÌÓý»ú¹¹ÌᳫÐÅÏ¢ÇÔÈ¡»î¶¯¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÄܽâÃÜä¯ÀÀÆ÷Ö÷ÃÜÂ룬£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÔÚÏßÕË»§Æ¾Ö¤¡¢²ÆÎñÐÅÏ¢¡¢ä¯ÀÀÆ÷cookieµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ZIPÎļþ¸½¼þ£¬£¬£¬£¬£¬£¬£¬£¬´¥·¢¼ÓÔØÆ÷ºÍÅú´¦Öóͷ£¾ç±¾£¬£¬£¬£¬£¬£¬£¬£¬ÔËÐÐPowerShellÏÂÁîÏÂÔØÓÐÓøºÔز¢°²ÅÅÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£PXA StealerÌØÊâ¹Ø×¢ÇÔÈ¡Facebook cookie£¬£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÓëFacebook Ads ManagerºÍGraph API½»»¥ÍøÂçÏêϸÐÅÏ¢¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬ÆäËûÇÔÈ¡¶ñÒâÈí¼þÈçStrelaStealer¡¢RECORDSTEALER¡¢Rhadamanthys¡¢Amnesia StealerºÍGlove StealerµÈÒ²ÔÚÒ»Ö±Éú³¤ºÍÓ¿ÏÖ£¬£¬£¬£¬£¬£¬£¬£¬Ö¤ÊµÎúÇÔÈ¡¶ñÒâÈí¼þµÄÊ¢ÐС£¡£¡£¡£¡£Ö»¹ÜÖ´·¨²¿·ÖÆð¾¢¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬µ«´ËÀà»î¶¯ÈÔÒ»Á¬±£´æ¡£¡£¡£¡£¡£


https://thehackernews.com/2024/11/vietnamese-hacker-group-deploys-new-pxa.html


2. GitHubÏîĿƵÔâ¶ñÒâºóÃŹ¥»÷


11ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬GitHubÏîÄ¿Õý³ÉΪ¶ñÒâÌá½»ºÍÀ­È¡ÇëÇóµÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÏòÕâЩÏîĿעÈëºóÃÅ¡£¡£¡£¡£¡£×î½ü£¬£¬£¬£¬£¬£¬£¬£¬Exo LabsµÄGitHub´æ´¢¿â¾ÍÔâµ½ÁË´ËÀ๥»÷£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÌá½»¿´ËÆÎÞº¦µÄ´úÂë¸ü¸Ä£¬£¬£¬£¬£¬£¬£¬£¬ÊÔͼÔÚ´úÂëÖÐÖ²ÈëºóÃÅ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔÔ¶³ÌÖ´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬£¬¸Ã´úÂë¸ü¸Ä²¢Î´±»Åú×¼ºÏ²¢µ½¹Ù·½´æ´¢¿â¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓõÄGitHubÕË»§¡°evildojo666¡±ÏÖÒѱ»É¾³ý£¬£¬£¬£¬£¬£¬£¬£¬¶ø¸ÃÕË»§Ö¸ÏòµÄÇå¾²Ñо¿Ô±Mike BellÔò·ñ¶¨Óë´ËÊÂÓйØ£¬£¬£¬£¬£¬£¬£¬£¬²¢Éù³Æ×Ô¼ºÔâµ½ÁËð³ä¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬ÉÐÓÐÆäËûÏîĿҲ³ÉΪÁËÀàËÆµÄ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ê¢ÐеĿªÔ´ÒôƵºÍÊÓÆµÏÂÔØÆ÷¡°yt-dlp¡±¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÊÂÎñÌáÐÑ¿ªÔ´ÏîĿά»¤ÕßÒª×ÐϸÉó²é´«ÈëµÄÀ­È¡ÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬×ÝÈ»ËüÃÇÀ´×Ô¿´ËÆ¡°ÉÆÒ⡱µÄТ˳Õߣ¬£¬£¬£¬£¬£¬£¬£¬Ò²Ó¦Ê¹ÓÃ×Ô¶¯»¯¹¤¾ßºÍ´ó×ÚÈ˹¤´úÂëÉó²éÀ´È·±£Çå¾²¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/github-projects-targeted-with-malicious-commits-to-frame-researcher/


3. Maxar Space SystemsÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬Ô±¹¤Ð¡ÎÒ˽¼ÒÊý¾ÝÔâÇÔÈ¡


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÎÀÐÇÖÆÔìÉÌMaxar Space SystemsÔâÊܺڿÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ±¹¤Ð¡ÎÒ˽¼ÒÊý¾Ý±»ÇÔÈ¡¡£¡£¡£¡£¡£ºÚ¿ÍÔÚ2024Äê10ÔÂ11ÈÕ±»·¢Ã÷ǰÒÑÇÖÈë¹«Ë¾ÍøÂçÔ¼Ò»ÖÜʱ¼ä¡£¡£¡£¡£¡£Maxar Space SystemsÊÇÃÀ¹úº½¿Õº½ÌìÒµµÄÖ÷Òª¼ÓÈëÕߣ¬£¬£¬£¬£¬£¬£¬£¬ÒÑÖÆ×÷80¶à¿ÅÔÚ¹ìÎÀÐÇ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÎªNASAµÄPsycheʹÃüºÍArtemisÔÂÇò̽Ë÷ÍýÏëÌṩÁËÒªº¦ÊÖÒÕ¡£¡£¡£¡£¡£Ð¹Â¶µÄÔ±¹¤ÐÅÏ¢°üÀ¨ÐÕÃû¡¢¼ÒÍ¥µØµã¡¢Éç»á°ü¹ÜºÅÂëµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬µ«ÒøÐÐÕË»§ÐÅϢδÊÜÓ°Ïì¡£¡£¡£¡£¡£ÊÜÓ°ÏìÔ±¹¤¿ÉÏíÊÜIDShieldÉí·Ý±£»£»£»£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬£¬£¬¶øÇ°ÈÎÔ±¹¤¿ÉÔÚ»®×¼Ê±¼äÄÚ×¢²áIDXµÄÉí·Ý͵ÇÔ±£»£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬ÓÐÐÂÎųƺڿͻ¹Éù³ÆÇÔÈ¡ÁËMaxar Technologies¿ª·¢µÄµØÀí¿Õ¼äÇ鱨ƽ̨GeoHIVEµÄÓû§Èº£¬£¬£¬£¬£¬£¬£¬£¬µ«Maxar TechnologiesÉÐδ¶Ô´Ë½ÒÏþ̸ÂÛ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-space-tech-giant-maxar-discloses-employee-data-breach/


4. ²©Í¨ÖÒÑÔ£ºVMware vCenter ServerÁ½´óÎó²îÕý±»¹¥»÷ÕßʹÓÃ


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬²©Í¨¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬£¬Ö¸³ö¹¥»÷ÕßÕýÔÚʹÓÃVMware vCenter ServerµÄÁ½¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ֮һΪÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2024-38812£©£¬£¬£¬£¬£¬£¬£¬£¬ÓÉTZLÇå¾²Ñо¿Ö°Ô±ÔÚÖйú2024 Matrix CupºÚ¿Í´óÈüʱ´ú±¨¸æ¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚvCenterµÄDCE/RPCЭÒéʵÏÖÖеĶÑÒç³öÎÊÌ⣬£¬£¬£¬£¬£¬£¬£¬Ó°ÏìVMware vSphereºÍVMware Cloud FoundationµÈ²úÆ·¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²î£¨CVE-2024-38813£©ÎªÈ¨ÏÞÌáÉýÎó²î£¬£¬£¬£¬£¬£¬£¬£¬Í¬ÑùÓɸÃÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÌØÖÆÍøÂçÊý¾Ý°üÌáÉýÖÁrootȨÏÞ¡£¡£¡£¡£¡£²©Í¨È·ÈÏÕâÁ½¸öÎó²îÒѱ»Ê¹Ó㬣¬£¬£¬£¬£¬£¬£¬²¢ÓÚ9ÔÂÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬µ«Ëæºó·¢Ã÷CVE-2024-38812µÄ²¹¶¡²¢Î´ÍêÈ«½â¾öÎÊÌ⣬£¬£¬£¬£¬£¬£¬£¬²¢Ç¿ÁÒ½¨ÒéÖÎÀíÔ±Ó¦ÓÃв¹¶¡¡£¡£¡£¡£¡£ÊÜÓ°Ïì¿Í»§Ó¦Á¬Ã¦Ó¦ÓÃ×îиüÐÂÒÔÌá·À¹¥»÷¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬²©Í¨»¹Ðû²¼ÁËÔö²¹Í¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬Ìṩ¸ü¶àÇå¾²¸üÐÂÐÅÏ¢ºÍ¿ÉÄÜÓ°ÏìÒÑÉý¼¶Óû§µÄÒÑÖªÎÊÌâ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-vmware-vcenter-server-now-exploited-in-attacks/


5. DocuSignÍøÂç´¹ÂÚÕ©Æ­¼¤Ôö£¬£¬£¬£¬£¬£¬£¬£¬Ã°³äÃÀÕþ¸®»ú¹¹ÇÔÈ¡Êý¾Ý


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬DocuSignÍøÂç´¹ÂÚÕ©Æ­ÊýÄ¿½üÆÚ¼¤Ôö98%£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÐÅÈÎÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬Ã°³äÃÀ¹úÕþ¸®»ú¹¹ÈçÎÀÉúÓ빫ÖÚЧÀͲ¿(HHS)ºÍÂíÀïÀ¼Öݽ»Í¨²¿(MDOT)µÈ·¢ËÍ´¹ÂÚURL¡£¡£¡£¡£¡£ÕâЩ´¹ÂÚURL±»Éè¼Æ³ÉÄ£Äâ¹Ù·½Í¨Ñ¶£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÕæÕýµÄDocuSignÕÊ»§ºÍAPIαװ³ÉÕæÊµÇëÇ󡣡£¡£¡£¡£Ò»µ©Ä¿µÄ·­¿ª¶ñÒâÎĵµ£¬£¬£¬£¬£¬£¬£¬£¬¾Í»á±»ÒªÇóÌṩÃô¸ÐÐÅÏ¢»òÊÚȨڲƭÉúÒâ¡£¡£¡£¡£¡£ÓÉÓÚÇëÇó¿´Ëƹٷ½£¬£¬£¬£¬£¬£¬£¬£¬ÊÕ¼þÈ˸ü¿ÉÄÜδ¾­³¹µ×ÑéÖ¤¾Í×ñÊØÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬Î£¼°¹«Ë¾Çå¾²¡£¡£¡£¡£¡£ÃÀ¹ú¹«Ãñ¡¢Õþ¸®»ú¹¹ºÍÊÐÕþ°ì¹«ÊÒÊÇÕâЩ¹¥»÷µÄÖ÷ҪĿµÄ¡£¡£¡£¡£¡£×¨¼Ò½¨ÒéÆóҵʵÑé¶à²ãÇå¾²Õ½ÂÔ£¬£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÊܺ¦Õß×ñÕÕµÄÊÇËûÃǽÓÊܹýÅàѵ²¢±»ÆÚÍû×ñÕÕµÄÁ÷³Ì£¬£¬£¬£¬£¬£¬£¬£¬ÎÊÌâÔÚÓÚÎÞ·¨ÑéÖ¤ÇëÇóȪԴ£¬£¬£¬£¬£¬£¬£¬£¬ÐèÒªÖØÐÂ˼Á¿ÔõÑùÌṩÊðÃûÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬²¢¿ÉÄܽÓÄÉǿʢµÄÉí·ÝÑéÖ¤ÒªÁì¡£¡£¡£¡£¡£


https://hackread.com/us-govt-agencies-impersonate-docusign-phishing-scams/


6. ÃÀÒûÓÃˮϵͳ´æÍøÂçÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬»òÖÂЧÀÍÖÐÖ¹


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÇéÐα£»£»£»£»£»£»£»¤Êð£¨EPA£©¼à²ì³¤°ì¹«ÊÒ£¨OIG£©Ðû²¼µÄб¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬ÎªÃÀ¹úÔ¼1.1ÒÚÈËÌṩЧÀ͵Ä300¶à¸öÒûÓÃˮϵͳ±£´æÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£ÆÀ¹Àº­¸Ç1062¸öÒûÓÃˮϵͳ£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÆäÖÐËÄ·ÖÖ®Ò»¿ÉÄܳÉΪ¹¥»÷Êܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬£¬µ¼Ö¹¦Ð§Ëðʧ¡¢¾Ü¾øÐ§À͵ÈÇéÐμ°¿Í»§ÐÅϢй¶¡£¡£¡£¡£¡£97¸ö¹©Ë®ÏµÍ³±£´æÑÏÖØºÍ¸ß¶ÈÑÏÖØÎÊÌ⣬£¬£¬£¬£¬£¬£¬£¬ÁýÕÖÔ¼2700ÍòÈË£»£»£»£»£»£»£»211¸öϵͳÊÜÖжȺ͵ͶÈȱÏÝÓ°Ï죬£¬£¬£¬£¬£¬£¬£¬ÁýÕÖÔ¼8300ÍòÈË¡£¡£¡£¡£¡£OIGÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬Èô¶ñÒâÐÐΪÕßʹÓÃÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÆÆËðЧÀÍ»òÔì³ÉÎïÀíË𻵡£¡£¡£¡£¡£ÆÀ¹ÀÉæ¼°Áè¼Ý75000¸öIPºÍ14400¸öÓòµÄÆÊÎö¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬EPAȱ·¦Ïò¸Ã»ú¹¹×ª´ïÍøÂçÇå¾²ÊÂÎñµÄ±¨¸æÏµÍ³£¬£¬£¬£¬£¬£¬£¬£¬²¢ÒÀÀµÆäËû»ú¹¹¾ÙÐдËÀ౨¸æ£¬£¬£¬£¬£¬£¬£¬£¬Í¬Ê±È±·¦ÓëÆäËûÁª°îºÍÖÝÕþ¸®µÄЭµ÷¼Í¼¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬£¬ÒÑÓÐË®Îñ¹«Ë¾ÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬µ«¹©Ë®Ð§ÀÍδÊÜÓ°Ïì¡£¡£¡£¡£¡£½ñÄê5Ô£¬£¬£¬£¬£¬£¬£¬£¬EPAÔøÖÒÑÔ³¬70%¹©Ë®ÏµÍ³²»Çкϡ¶Çå¾²ÒûÓÃË®·¨¡·£¬£¬£¬£¬£¬£¬£¬£¬±£´æÑÏÖØÇå¾²ÎÊÌâ¡£¡£¡£¡£¡£


https://www.securityweek.com/300-drinking-water-systems-in-us-exposed-to-disruptive-damaging-hacker-attacks/