Èû¶ûάÑÇÕþ¸®Ê¹ÓøßͨÁãÈÕÎó²î°²ÅÅNoviSpyÌØ¹¤Èí¼þ
Ðû²¼Ê±¼ä 2024-12-181. Èû¶ûάÑÇÕþ¸®Ê¹ÓøßͨÁãÈÕÎó²î°²ÅÅNoviSpyÌØ¹¤Èí¼þ
12ÔÂ16ÈÕ£¬£¬£¬£¬Èû¶ûάÑÇÕþ¸®±»ÆØÊ¹ÓøßͨÁãÈÕÎó²î£¬£¬£¬£¬ÔÚAndroid×°±¸Éϰ²ÅÅÁËÒ»ÖÖÃûΪ¡°NoviSpy¡±µÄÐÂÌØ¹¤Èí¼þ£¬£¬£¬£¬ÒÔ¼àÊÓ»î¸ÐÈËÊ¿¡¢¼ÇÕߺͿ¹ÒéÕß¡£¡£´Ë´Î¹¥»÷Éæ¼°µÄ¸ßͨÎó²îCVE-2024-43047µÈ£¬£¬£¬£¬ÔÚ2024Äê10Ô±»Google Project Zero±ê¼ÇΪÁãÈÕÎó²î£¬£¬£¬£¬²¢ÓÚ´ÎÔÂÔÚAndroidÉÏ»ñµÃÐÞ¸´¡£¡£¹ú¼ÊÌØÉâ×éÖ¯Ç徲ʵÑéÊÒÔÚÆÊÎöÒ»Ãû¼ÇÕßµÄÊÖ»úʱ·¢Ã÷Á˸ÃÌØ¹¤Èí¼þ¡£¡£¾Ý³Æ£¬£¬£¬£¬Èû¶ûάÑÇÇå¾²ÐÅÏ¢¾ÖºÍ¾¯·½Ê¹ÓÃCellebrite½âËø¹¤¾ß£¬£¬£¬£¬Í¨¹ý¸ßͨÁãÈÕÎó²î½âËøÁËAndroidÊÖ»ú£¬£¬£¬£¬²¢°²ÅÅÁËNoviSpy¡£¡£¸ÃÌØ¹¤Èí¼þÓëÈû¶ûάÑÇÇå¾²»ú¹¹°ó¶¨µÄЧÀÍÆ÷ͨѶ£¬£¬£¬£¬ÒÑ×°ÖÃÔÚÈû¶ûάÑÇÊýʮ̨ÉõÖÁÊý°Ų̀Android×°±¸ÉÏ¡£¡£¹È¸èµÄÍþвÆÊÎöС×éÓë¹ú¼ÊÌØÉâ×éÖ¯ÏàÖú£¬£¬£¬£¬·¢Ã÷Á˸ßͨDSPÇý¶¯³ÌÐòÖеĶà¸öÎó²î£¬£¬£¬£¬ÕâЩÎó²î¿ÉÄܱ»ÓÃÓÚÈÆ¹ýAndroidÇå¾²»úÖÆ²¢ÔÚÄں˼¶±ð×°ÖÃNoviSpy¡£¡£Ö»¹Ü¹È¸èÒÑÏò¸ßͨ±¨¸æÁËÕâЩÎÊÌ⣬£¬£¬£¬µ«²¿·ÖÎó²îµÄ²¹¶¡ÉÐδÐû²¼¡£¡£¸ßͨÌåÏÖ£¬£¬£¬£¬ÒÑÏò¿Í»§ÌṩÐÞ¸´³ÌÐò£¬£¬£¬£¬²¢ÃãÀøÓû§Ó¦ÓÃÇå¾²¸üС£¡£
https://www.bleepingcomputer.com/news/security/new-android-novispy-spyware-linked-to-qualcomm-zero-day-bugs/
2. SRPÁª°îÐÅÓÃÏàÖúÉçÔâÍøÂç¹¥»÷£¬£¬£¬£¬24ÍòÓû§ÐÅÏ¢Òɱ»µÁ
12ÔÂ16ÈÕ£¬£¬£¬£¬SRPÁª°îÐÅÓÃÏàÖúÉç¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬Áè¼Ý240,742È˵ÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄܱ»µÁ¡£¡£SRPÁª°îÐÅÓÃÏàÖúÉ罨ÉèÓÚ1960Ä꣬£¬£¬£¬×ܲ¿Î»ÓÚÄÏ¿¨ÂÞÀ´ÄÉÖݱ±°Â¹Å˹Ëþ£¬£¬£¬£¬Îª×ôÖÎÑÇÖݺÍÄÏ¿¨ÂÞÀ´ÄÉÖÝÔ¼200,000ÃûСÎÒ˽¼ÒÌṩ½ðÈÚЧÀÍ¡£¡£¾Ý³Æ£¬£¬£¬£¬¹¥»÷Õß×Ô2024Äê9ÔÂ5ÈÕÖÁ11ÔÂ4ÈÕʱ´ú»á¼ûÁËÆäϵͳ£¬£¬£¬£¬²¢¿ÉÄÜ»ñÈ¡Á˰üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕºÅÂë¡¢Éç»á°ü¹ÜºÅÂëºÍ²ÆÎñÐÅÏ¢µÈÔÚÄÚµÄСÎÒ˽¼ÒÎļþ¡£¡£SRPÁª°îÐÅÓÃÏàÖúÉçÒÑÏòµÂ¿ËÈøË¹ÖݺÍÃåÒòÖݵÄ×ÜÉó²é³¤°ì¹«ÊÒ±¨¸æ´ËÊ£¬£¬£¬£¬²¢Ïò¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢ËÍÊéÃæÍ¨Öª£¬£¬£¬£¬ÌṩһÄêµÄÃâ·ÑÉí·Ý±£»£»£»£»¤Ð§ÀÍ¡£¡£Ö»¹ÜÉÐδ·¢Ã÷ÐÅÏ¢±»ÀÄÓõÄÖ¤¾Ý£¬£¬£¬£¬µ«ÏàÖúÉçÃãÀøÊÜÓ°ÏìÕßʹÓÃÌṩµÄÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£´Ë´ÎÍøÂç¹¥»÷¿ÉÄÜÓëÀÕË÷Èí¼þ×éÖ¯NitrogenÓйأ¬£¬£¬£¬¸Ã×éÖ¯Éù³ÆÇÔÈ¡ÁËSRPÁª°îÐÅÓÃÏàÖúÉçÔ¼650GBµÄÊý¾Ý£¬£¬£¬£¬²¢ÔÚÆä»ùÓÚTorµÄ×ßÂ©ÍøÕ¾ÉϳöÊÛ¡£¡£
https://www.securityweek.com/srp-federal-credit-union-ransomware-attack-impacts-240000/
3. CISAÖÒÑÔWindowsÄÚºËÎó²î¼°Adobe ColdFusionÎó²îÕý±»Æð¾¢Ê¹ÓÃ
12ÔÂ16ÈÕ£¬£¬£¬£¬CISAÒÑÏòÃÀ¹úÁª°î»ú¹¹·¢³öÖÒÑÔ£¬£¬£¬£¬ÒªÇóÌá·ÀÕë¶Ô¸ßÑÏÖØÐÔWindowsÄÚºËÎó²îCVE-2024-35250µÄÒ»Á¬¹¥»÷¡£¡£¸ÃÎó²îÓÉDEVCOREÑо¿ÍŶӷ¢Ã÷²¢Í¨¹ýÇ÷ÊÆ¿Æ¼¼µÄÁãÈÕÍýÏ뱨¸æ¸øÎ¢Èí£¬£¬£¬£¬ÊÇÓÉÓÚ²»ÊÜÐÅÈεÄÖ¸Õë×÷·ÏÒýÓÃÈõµãÔì³ÉµÄ£¬£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷ÕßÒÔµÍÖØÆ¯ºó»ñµÃSYSTEMȨÏÞ¡£¡£Î¢ÈíÔÚ6ÔÂÐû²¼Á˲¹¶¡£¬£¬£¬£¬µ«ËĸöÔºóGitHubÉÏÐû²¼ÁË¿´·¨ÑéÖ¤Îó²î´úÂ룬£¬£¬£¬Åú×¢¸ÃÎó²îÕýÔÚ±»Æð¾¢Ê¹Óᣡ£Í¬Ê±£¬£¬£¬£¬CISA»¹Ìí¼ÓÁËÁíÒ»¸öÑÏÖØµÄAdobe ColdFusionÎó²îCVE-2024-20767£¬£¬£¬£¬¸ÃÎó²îÓÉÓÚ»á¼û¿ØÖƲ»µ±µ¼Ö£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¶ÁȡϵͳºÍÆäËûÃô¸ÐÎļþ¡£¡£Áè¼Ý145,000̨ColdFusionЧÀÍÆ÷̻¶ÔÚ»¥ÁªÍøÉÏ£¬£¬£¬£¬×é³ÉÖØ´óΣº¦¡£¡£CISA½«ÕâÁ½¸öÎó²îÌí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖУ¬£¬£¬£¬²¢±ê¼ÇΪ±»Æð¾¢Ê¹Ó㬣¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚÈýÖÜÄÚ±£»£»£»£»¤ÆäÍøÂç¡£¡£Í¬Ê±£¬£¬£¬£¬Ò²½¨Òé˽ÈË×éÖ¯ÓÅÏÈ»º½âÕâЩÎó²îÒÔ×èÖ¹ÕýÔÚ¾ÙÐеĹ¥»÷¡£¡£Î¢Èí¹ØÓÚCVE-2024-35250Ò°ÍâʹÓõĸü¶àÏêϸÐÅÏ¢ÉÐδ½ÒÏþ̸ÂÛ¡£¡£
https://www.bleepingcomputer.com/news/security/windows-kernel-bug-now-exploited-in-attacks-to-gain-system-privileges/
4. BitterÍøÂçÌØ¹¤×é֯ʹÓÃÐÂÐÍMiyaRAT¶ñÒâÈí¼þ¹¥»÷ÍÁ¶úÆä¹ú·À×éÖ¯
12ÔÂ17ÈÕ£¬£¬£¬£¬ÍøÂçÌØ¹¤Íþв×éÖ¯Bitter±»·¢Ã÷ʹÓÃÐÂÐͶñÒâÈí¼þ¼Ò×åMiyaRAT¹¥»÷ÍÁ¶úÆä¹ú·À×éÖ¯¡£¡£MiyaRATÓëBitter֮ǰʹÓõÄWmRAT¶ñÒâÈí¼þÒ»Æð±»°²ÅÅ¡£¡£ProofpointÖ¸³ö£¬£¬£¬£¬ÕâÖÖÐÂÐͶñÒâÈí¼þºÜ¿ÉÄÜÊÇÕë¶Ô¸ß¼ÛֵĿµÄµÄ£¬£¬£¬£¬²¢ÇÒ½öÎÞÒⱻʹÓᣡ£Bitter×éÖ¯×Ô2013ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÑÇÖÞÕþ¸®ºÍÖ÷Òª×éÖ¯¡£¡£ËûÃÇÒÑÍùÔøÊ¹ÓÃMicrosoft OfficeÎó²îºÍð³äÍâ½»»ú¹¹¾ÙÐÐÍøÂç´¹ÂÚ¹¥»÷¡£¡£´Ë´ÎÍÁ¶úÆäµÄ¹¥»÷ʼÓÚÒ»·â°üÀ¨Íâ¹úͶ×ÊÏîÄ¿ÓÕ»óµÄµç×ÓÓʼþ£¬£¬£¬£¬ÓʼþÖеÄRARѹËõÎļþ°üÀ¨ÁËαװ³ÉPDFµÄ¿ì½Ý·½·¨Îļþ£¬£¬£¬£¬ÒÔ¼°Ç¶ÈëÔÚRARÎļþÖеı¸ÓÃÊý¾ÝÁ÷£¨ADS£©¡£¡£Ò»µ©ÊÕ¼þÈË·¿ªLNKÎļþ£¬£¬£¬£¬¾Í»á´¥·¢Òþ²ØÔÚADSÖеÄPowerShell´úÂëÖ´ÐУ¬£¬£¬£¬Í¬Ê±½¨ÉèÒ»¸öÍýÏëʹÃüÒÔ°´ÆÚÔËÐжñÒâÏÂÁî¡£¡£µ±WmRATÎÞ·¨ÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷½¨ÉèͨѶʱ£¬£¬£¬£¬Bitter»áÏÂÔØMiyaRAT¡£¡£ÕâÁ½ÖÖ¶ñÒâÈí¼þ¶¼ÊÇC++Ô¶³Ì»á¼ûľÂí£¨RAT£©£¬£¬£¬£¬ÌṩÊý¾Ýй¶¡¢Ô¶³Ì¿ØÖÆ¡¢ÆÁÄ»½ØÍ¼µÈ¹¦Ð§¡£¡£MiyaRATÔ½·¢ÍêÉÆ£¬£¬£¬£¬¾ßÓиüÏȽøµÄÊý¾ÝºÍͨѶ¼ÓÃÜ¡£¡£
https://www.bleepingcomputer.com/news/security/bitter-cyberspies-target-defense-orgs-with-new-miyarat-malware/
5. LedgerÍøÂç´¹ÂÚÐÂȦÌ×£ºÎ±×°Êý¾Ýй¶ÇÔÈ¡»Ö¸´¶ÌÓï
12ÔÂ17ÈÕ£¬£¬£¬£¬Ò»ÏîÕë¶ÔLedgerÓ²¼þ¼ÓÃÜÇ®±ÒÇ®°üµÄÍøÂç´¹ÂڻÕýÔÚËÁŰ¡£¡£¸Ã»î¶¯Í¨¹ýαװ³ÉÊý¾Ýй¶֪ͨµÄÓʼþ£¬£¬£¬£¬ÓÕÆÓû§ÑéÖ¤Æä»Ö¸´¶ÌÓ£¬£¬£¬½ø¶øÇÔÈ¡Óû§µÄ¼ÓÃÜÇ®±Ò¡£¡£LedgerÊÇÒ»¿îÓÃÓÚ´æ´¢¡¢ÖÎÀíºÍ³öÊÛ¼ÓÃÜÇ®±ÒµÄÓ²¼þÇ®°ü£¬£¬£¬£¬Æä×ʽðÓÉ24×Ö¡¢12×Ö»ò18×ֵĻָ´¶ÌÓï±£»£»£»£»¤¡£¡£È»¶ø£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÓû§¶ÔÊý¾Ýй¶µÄµ£ÐÄ£¬£¬£¬£¬·¢ËÍ¿´ËÆÀ´×ÔLedger¹Ù·½µÄ´¹ÂÚÓʼþ£¬£¬£¬£¬ÒªÇóÓû§ÔÚ´¹ÂÚÒ³ÃæÉÏÑéÖ¤»Ö¸´¶ÌÓï¡£¡£ÕâЩÓʼþÏÖʵÉÏÊÇͨ¹ýSendGridµç×ÓÓʼþÓªÏúƽ̨·¢Ë͵쬣¬£¬£¬´¹ÂÚÒ³ÃæÔòαװ³ÉLedgerÍøÕ¾£¬£¬£¬£¬ÒªÇóÓû§ÊäÈë»Ö¸´¶ÌÓï¾ÙÐÐÇå¾²¼ì²é¡£¡£Ò»µ©Óû§ÊäÈ룬£¬£¬£¬´¹ÂÚÒ³Ãæ¾Í»á½«ËùÓÐÊäÈëµÄ»Ö¸´¶ÌÓï·¢Ë͵½ÍøÕ¾ºó¶Ë´æ´¢£¬£¬£¬£¬¹¥»÷Õß±ãÄÜÍêÈ«»á¼û²¢ÇÔÈ¡Óû§µÄ¼ÓÃÜÇ®±Ò×ʽ𡣡£Õë¶Ô´Ë»î¶¯£¬£¬£¬£¬Ledger³ÖÓÐÕßÓ¦Ìá¸ßСÐÄ£¬£¬£¬£¬ÇÐÎðÔÚÈκÎÓ¦ÓûòÍøÕ¾ÉÏÊäÈë»Ö¸´¶ÌÓï¡£¡£µ±Éæ¼°¼ÓÃÜÇ®±ÒºÍ½ðÈÚ×ʲúʱ£¬£¬£¬£¬ÇëʼÖÕÔÚä¯ÀÀÆ÷ÖÐÊäÈëÒª»á¼ûµÄÓòÃû¡£¡£ÇëºöÂÔÈκÎÉù³ÆÀ´×ÔLedgerµÄµç×ÓÓʼþ£¬£¬£¬£¬ÓÈÆäÊÇÉù³ÆÄúÊܵ½Êý¾Ýй¶ӰÏì»òÒªÇóÑéÖ¤»Ö¸´¶ÌÓïµÄÓʼþ¡£¡£
https://www.bleepingcomputer.com/news/security/new-fake-ledger-data-breach-emails-try-to-steal-crypto-wallets/
6. ˼¿ÆÊý¾ÝÔâй¶£º2.9GBÊý¾ÝÔÚBreach ForumsÆØ¹â
12ÔÂ16ÈÕ£¬£¬£¬£¬ºÚ¿ÍÔÚBreach ForumsÉÏй¶ÁËÊôÓÚ˼¿Æ¹«Ë¾µÄ2.9GBÊý¾Ý£¬£¬£¬£¬ÕâÊÇ4.5TBÊý¾Ý¼¯µÄÒ»²¿·Ö¡£¡£¾ÝºÚ¿ÍÉù³Æ£¬£¬£¬£¬ÕâЩÊý¾ÝÊÇ˼¿ÆÔÚ2024Äê10ÔÂδ¾ÙÐÐÈκÎÃÜÂë±£»£»£»£»¤»òÇå¾²ÈÏÖ¤µÄÇéÐÎÏÂ̻¶µÄ¡£¡£´Ë´Îй¶ÊÂÎñÓÉÎÛÃûÕÑÖøµÄºÚ¿Í¼æÂÛ̳ËùÓÐÕßIntelBrokerÌᳫ£¬£¬£¬£¬Ëû´ËÇ°ÔøÊÔͼ³öÊÛ°üÀ¨À´×ÔVerizon¡¢AT&TºÍMicrosoftµÈ¹«Ë¾µÄÃô¸ÐÐÅÏ¢ÔÚÄÚµÄÊý¾Ý¼¯¡£¡£Ë¼¿Æ¶Ô´ËÊÂ×÷³ö»ØÓ¦£¬£¬£¬£¬·ñ¶¨Æä½¹µãϵͳÊܵ½¹¥»÷£¬£¬£¬£¬²¢½«ÎÊÌâ¹é×ïÓÚÃæÏò¹«ÖÚµÄDevHub×ÊÔ´ÉèÖùýʧ¡£¡£È»¶ø£¬£¬£¬£¬IntelBroker¼á³ÖÒÔΪÆäÔÚ10ÔÂ18ÈÕ֮ǰ¶¼¿ÉÒÔ»á¼ûÕâЩÊý¾Ý£¬£¬£¬£¬²¢ÌṩÁËÖ¤¾ÝÀ´Ö¤ÊµÆäÖ÷ÕÅ¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨Ë¼¿Æ¶à¸öÖ÷Òª²úÆ·µÄÏà¹ØÐÅÏ¢£¬£¬£¬£¬ÈçCisco ISE¡¢Cisco SASE¡¢Cisco WebexµÈ¡£¡£±ðµÄ£¬£¬£¬£¬IntelBroker»¹Òò¶à´ÎÊý¾Ýй¶ÊÂÎñ¶ø×ÅÃû£¬£¬£¬£¬°üÀ¨ÈëÇÖApple Inc.¡¢AMDÒÔ¼°Å·ÖÞÐ̾¯×éÖ¯µÈ¡£¡£´Ë´Îй¶ÊÂÎñÔÙ´ÎÌáÐѸ÷×éÖ¯Òª¼á³ÖÇ徲ʵ¼ù²¢±£»£»£»£»¤Ãô¸ÐÊý¾Ý£¬£¬£¬£¬¶øÊ£ÓàµÄ4.5TBÊý¾Ý¼¯ÊÇ·ñ»á±»³öÊÛ¡¢Ð¹Â¶»ò½â¾öÈÔÓдýÊӲ졣¡£
https://hackread.com/hackers-leak-partial-cisco-data-4-5tb-exposed-records/


¾©¹«Íø°²±¸11010802024551ºÅ