¹È¸èÐÞ¸´ÆäÔÆÆ½Ì¨ÖпÉÒþ²Ø¶ñÒâÈí¼þµÄGhostToken©¶´

Ðû²¼Ê±¼ä 2023-04-24

1¡¢¹È¸èÐÞ¸´ÆäÔÆÆ½Ì¨ÖпÉÒþ²Ø¶ñÒâÈí¼þµÄGhostToken©¶´


¾ÝýÌå4ÔÂ21ÈÕ±¨µÀ£¬¹È¸èÔÆÆ½Ì¨(GCP)ÖдæÔÚÒ»¸öGhostToken©¶´£¬¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâÓ¦Óøü¸ÄΪ²»ÐмûÇÒ²»ÐÐɾ³ý¡£Astrix SecurityÓÚ2022Äê6Ô²¢Ïò¹È¸è³ÂËßÁËÕâһ©¶´£¬¹È¸èÔÚ2023Äê4ÔÂÐû²¼Á˲¹¶¡¡£Ñо¿ÈËÔ±ÌåÏÖ£¬¸Ã©¶´¿É±»¹¥»÷ÕßÓÃÀ´Í¨¹ý½«ÒÑÊÚȨµÄµÚÈý·½Ó¦ÓÃת»»Îª¶ñÒâľÂíÓ¦Ó㬴Ӷø»ñµÃÄ¿±êGoogleÕÊ»§µÄÓÀ¾ÃÇÒ²»ÐÐÒÆ³ýµÄ·ÃÎÊȨÏÞ£¬È»ºóй¶Ŀ±êµÄ¸öÈËÊý¾Ý¡£Õâ¿ÉÄܰüÂÞ´æ´¢ÔÚGmail¡¢Drive¡¢DocsºÍPhotosµÈ¹È¸èÓ¦ÓÃÖеÄÊý¾Ý¡£ 


https://www.bleepingcomputer.com/news/security/ghosttoken-gcp-flaw-let-attackers-backdoor-google-accounts/


2¡¢SymantecÅû¶Õë¶ÔÅ·ÃÀ»ù´¡ÉèÊ©µÄX_Trader¹©Ó¦Á´¹¥»÷


4ÔÂ21ÈÕ£¬SymantecÅû¶ÁËÕë¶ÔÅ·ÃÀÒªº¦»ù´¡ÉèÊ©×éÖ¯µÄX_Trader¹©Ó¦Á´¹¥»÷¡£µ¼ÖÂÉϸöÔÂ3CXÄþ¾²Ê¼þµÄX_TraderÈí¼þ¹©Ó¦Á´¹¥»÷£¬»¹Ó°ÏìÁËλÓÚÃÀ¹úºÍÅ·ÖÞµÄÄÜÔ´ÁìÓòµÄÁ½¸öÒªº¦»ù´¡ÉèÊ©×éÖ¯¡£¹¥»÷ÕßʹÓÃľÂí»¯X_Trader°²×°·¨Ê½£¬½«VEILEDSIGNAL¶à½×¶ÎÄ £¿é»¯ºóÃŰ²×°µ½Ä¿±êϵͳÉÏ¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔÖ´ÐжñÒâshellcode»ò½«Í¨ÐÅÄ £¿é×¢ÈëÔÚ±»¹¥»÷ϵͳÉÏÔËÐеÄChrome¡¢Firefox»òEdge½ø³Ì¡£³ý´ËÖ®Í⣬»¹ÓÐÁ½¸öÉæ¼°½ðÈÚ½»Ò×µÄ×éÖ¯Ò²Ôâµ½¹¥»÷¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain


3¡¢Ç°CFPBÔ±¹¤½«Áè¼Ý25ÍòÏû·ÑÕßµÄÐÅϢת·¢µ½¸öÈËÓÊÏä


¾Ý4ÔÂ21ÈÕ±¨µÀ£¬ÃÀ¹úÏû·ÑÕß½ðÈÚ± £»¤¾Ö(CFPB)Åû¶ÁËÒ»ÆðÉæ¼°256000ÈËÐÅÏ¢µÄй¶Ê¼þ¡£CFPBµÄÔ±¹¤Í¸Â¶£¬ËûÃÇ·¢ÏÖһǰԱ¹¤ÓÃ14·â²îÒìµÄµç×ÓÓʼþ£¬½«Ô¼Äª25.6ÍòÃûÏû·ÑÕߵļǼºÍԼĪ50¼Ò»ú¹¹µÄ¼à¹ÜÐÅϢת·¢µ½¸öÈ˵ç×ÓÓʼþÕË»§¡£ÕâÃûÔ±¹¤Òѱ»ÀÕÁîɾ³ýÕâЩµç×ÓÓʼþ²¢Ìṩ֤¾ÝÖ¤Ã÷ËüÃÇÒѱ»É¾³ý£¬µ«¹Ù·½Ö¤ÊµÕâ¸ÃÔ±¹¤ÉÐδ×ñÊØ¡£Ä¿Ç°£¬¸Ã»ú¹¹ÈÔÔÚÊÓ²ì´Ëʼþ¡£


https://www.infosecurity-magazine.com/news/cfpb-employee-sends-consumers-data/


4¡¢ESET·¢ÏÖ¶þÊÖÊг¡ÖдóÁ¿ÆóÒµ¼¶ÍøÂçÉ豸°üÂÞÃô¸ÐÐÅÏ¢


¾ÝýÌå4ÔÂ23ÈÕ±¨µÀ£¬¶þÊÖÊг¡ÉÏµÄÆóÒµ¼¶ÍøÂçÉ豸°üÂ޿ɱ»ºÚ¿ÍÓÃÀ´ÈëÇÖÆóҵϵͳ»ò»ñÈ¡¿Í»§ÐÅÏ¢µÄÃô¸ÐÊý¾Ý¡£ESETÑо¿ÈËÔ±¹ºÖÃÁË18̨¶þÊÖºËÐÄ·ÓÉÆ÷£¬·¢ÏÖÆäÖÐÒ»°ëÒÔÉÏÄÜÕý³£ÊÂÇéµÄ·ÓÉÆ÷ÈÔÈ»¿ÉÒÔ·ÃÎÊÈ«²¿ÅäÖÃÊý¾Ý¡£Ò»Ð©Â·ÓÉÆ÷±£ÁôÁ˿ͻ§ÐÅÏ¢ºÍÔÊÐíµÚÈý·½Á¬½Óµ½ÍøÂçµÄÊý¾Ý£¬ÉõÖÁ°üÂÞ×÷Ϊ¿ÉÐÅ·½Á¬½Óµ½ÆäËûÍøÂçµÄƾ֤¡£Æ¾¾Ý·ÓÉÆ÷ÖÐϸ½Ú£¬ÆäÖÐһЩ·ÓÉÆ÷´¦ÓÚÍйÜITÌṩÉ̵Ļ·¾³ÖУ¬»¹ÓÐһ̨ÉõÖÁÊôÓÚMSSP¡£Ñо¿ÈËÔ±¶ÔÓÚÕâÖÖÇé¿öµÄ½¨ÒéÊÇ£¬ÇåÀíÉè±¹ØÁ¬ÄÃô¸ÐÊý¾Ý²¢½«Æä»Ö¸´µ½³ö³§Ä¬ÈÏ״̬¡£


https://www.bleepingcomputer.com/news/security/hackers-can-breach-networks-using-data-on-resold-corporate-routers/


5¡¢Unit 42³ÆÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÁ¿³ÊÉÏÉýÇ÷ÊÆ


Unit 42ÔÚ4ÔÂ20ÈÕ͸¶£¬ÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÁ¿³ÊÉÏÉýÇ÷ÊÆ¡£´Ó2022Äê11Ôµ½2023Äê4ÔÂÉÏÑ®£¬ÓëChatGPTÏà¹ØÓòµÄÿÔÂ×¢²áÁ¿Ôö¼ÓÁË910%£¬Ïà¹ØÇÀ×¢ÓòÃûÔö³¤ÁË17818%¡£´ËÍ⣬ÿÌìÓжà´ï118¸öÓëChatGPTÓйصĶñÒâURL±»¼ì²âµ½¡£Ñо¿·¢ÏÖ¶à¸öÊÔͼð³äOpenAI¹Ù·½ÍøÕ¾µÄµöÓãURL¡£Í¨³££¬¹¥»÷Õ߻ᴴ½¨Ò»¸öÓëChatGPT¹ÙÍøºÜÏñµÄÐé¼ÙÍøÕ¾£¬È»ºóÓÕÆ­Óû§ÏÂÔØ¶ñÒâÈí¼þ»ò¹²ÏíÃô¸ÐÐÅÏ¢¡£


https://unit42.paloaltonetworks.com/chatgpt-scam-attacks-increasing/


6¡¢FortinetÐû²¼¹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄ·ÖÎö³ÂËß


4ÔÂ20ÈÕ£¬FortinetÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄ·ÖÎö³ÂËß¡£¸Ã¹¤¾ßÓÉKodex¹«Ë¾¿ª·¢£¬Éù³ÆÊÇÒ»¿î½ÌÓý¹¤¾ß¡£ÒÔÿÔÂ59ÃÀÔªµÄ¼Û¸ñ³öÊÛ£¬¾ßÓÐÆß¸ö¹¥»÷Ä £¿é£¬°üÂÞÀÕË÷Èí¼þ¡¢Æ¾¾ÝÇÔÈ¡ºÍWindows Defender¡£Ñо¿±íÃ÷£¬ºÚ¿ÍÕýÔÚ»ý¼«µØ½«ÆäÓÃ×÷ÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£EvilExtractorµÄ¹¥»÷»î¶¯ÓÚ½ñÄê3ÔÂÏÔÖøÔö¼Ó£¬Í¨¹ýαװ³ÉÕË»§È·ÈÏÇëÇóµÄµöÓãÓʼþ½øÐзַ¢£¬´ó¶àÊý±»¹¥»÷Ä¿±êλÓÚÅ·ÖÞºÍÃÀ¹ú¡£


https://www.fortinet.com/blog/threat-research/evil-extractor-all-in-one-stealer