Coffee Meets BagelµÄϵͳÔâµ½¹¥»÷¹«Ë¾Êý¾Ý±»É¾

Ðû²¼Ê±¼ä 2023-09-07

1¡¢Coffee Meets BagelµÄϵͳÔâµ½¹¥»÷¹«Ë¾Êý¾Ý±»É¾


¾Ý9ÔÂ5ÈÕ±¨µÀ£¬Coffee Meets Bagel(CMB)͸¶ÉÏÖܵķþÎñÖжÏÊÇÓÉÓÚºÚ¿ÍÈëÇÖ¹«Ë¾ÏµÍ³²¢É¾³ýÊý¾Ýµ¼ÖµÄ¡£ÉÏÖÜ£¬CMB·¢ÉúÁËÈ«Çò·¶Î§ÄÚµÄå´»ú£¬ÊÓ²ìÈ·¶¨ºÚ¿Í¶ñÒâɾ³ýÁ˹«Ë¾Êý¾ÝºÍÎļþ¡£Ä¿Ç°£¬¸Ã¹«Ë¾ÉÐδÓÐÈ·ÈÏÕâ´Î¹¥»÷ÊÇÀÕË÷Èí¼þ¼ÓÃÜÁËÊý¾Ý£¬µ¼ÖÂÊý¾ÝÎÞ·¨Ê¹Ó㬻¹Êǹ¥»÷Õß¹ÊÒâɾ³ýÊý¾Ý£¬µ¼ÖÂå´»ú¡£CMB×Ô9ÔÂ3ÈÕÆðÖØÐÂÉÏÏߣ¬Ã»ÓÐ͸¶¹ØÓÚ¹¥»÷µÄ¸ü¶àÐÅÏ¢¡£


https://www.bleepingcomputer.com/news/security/coffee-meets-bagel-says-recent-outage-caused-by-destructive-cyberattack/


2¡¢GoogleÐû²¼9Ô·ÝAndroid¸üÐÂÐÞ¸´Òѱ»ÀûÓõÄ©¶´


GoogleÓÚ9ÔÂ5ÈÕÐû²¼ÁË9Ô·ݵÄAndroidÄþ¾²¸üУ¬×ܼÆÐÞ¸´ÁË33¸ö©¶´¡£ÆäÖаüÂÞ¿ÉÄÜÒѱ»ÀûÓõÄ©¶´(CVE-2023-35674)£¬ËüλÓÚAndroid¿ò¼ÜÖУ¬¹¥»÷Õß¿ÉÀûÓÃÆäÔÚÎÞÐèÓëÓû§½»»¥»òÌØ±ðÖ´ÐÐȨÏÞµÄÇé¿öÏÂÌáȨ¡£´ËÍ⣬¸üл¹ÐÞ¸´Á˼¸¸ö½ÏΪÑÏÖØµÄ©¶´£¬·Ö±ðÊÇϵͳ×é¼þÖеÄ3¸öÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2023-35658¡¢CVE-2023-35673ºÍCVE-2023-35681£©£¬ÒÔ¼°¸ßͨ±ÕÔ´×é¼þÖеÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2023-28581£©¡£


https://securityaffairs.com/150440/hacking/september-2023-android-security-updates-0day.html


3¡¢Stake.comÔâµ½¹¥»÷Áè¼Ý4100ÍòÃÀÔªµÄ¼ÓÃÜ»õ±Ò±»µÁ


9ÔÂ5ÈÕ±¨µÀ£¬Stake.com³ÆÆäETH/BSCÈÈÇ®°üÔâµ½ÈëÇÖ£¬Áè¼Ý4100ÍòÃÀÔªµÄ¼ÓÃÜ»õ±Ò±»µÁ¡£¹¥»÷·¢ÉúÓÚ9ÔÂ4ÈÕ£¬ºÚ¿Í´ÓEthereumÇÔÈ¡ÁË1570ÍòÃÀÔª£¬ÔÚBSCÇÔÈ¡ÁË1780ÍòÃÀÔª£¬ÔÚPolygonÇÔÈ¡ÁË780ÍòÃÀÔª¡£ÔÚÔâµ½¹¥»÷ºó¸Ãƽ̨Á¢¼´ÏòÓû§±£Ö¤£¬ËûÃǵÄ×ʽðÊÇÄþ¾²µÄ£¬ËùÓÐδÊܹ¥»÷Ö±½ÓÓ°ÏìµÄÇ®°ü£¬°üÂÞBTC¡¢LTC¡¢XRP¡¢EOSºÍTRXµÄÇ®°ü£¬ÈÔÈ»¿ÉÒÔÕý³£ÔËÐС£µ«ÈÔÓÐЩÓû§ÔÚXÉÏ·¢Ìû³ÆÎÞ·¨´æ¿î»òÈ¡¿î¡£9ÔÂ5ÈÕ£¬Stake.com֪ͨÆä·þÎñÒѻָ´£¬Óû§ÏÖÔÚ¿ÉÒÔÔÙ´ÎʹÓÃËùÓлõ±Ò½øÐдæÈ¡¿î¡£


https://securityaffairs.com/150401/hacking/crypto-gambling-firm-stake-hacked.html


4¡¢Morphisec·¢ÏÖÕë¶Ô½ðÈÚºÍÎïÁ÷ÐÐÒµµÄChaesбäÌå


MorphisecÔÚ9ÔÂ5ÈÕÅû¶ÁËÕë¶Ô½ðÈÚºÍÎïÁ÷ÐÐÒµµÄChaesбäÌåChae$ 4¡£×îлµÄѬȾÁ´Óë¹ýÈ¥Ïàͬ£¬É漰αÔìµÄMSI°²×°·¨Ê½£¬»á´¥·¢¶à²½ÖèѬȾ£¬²¢Ê¹ÓÃ7¸öÄ£¿éÀ´Ö´ÐÐÖÖÖÖ¹¦Ð§¡£´ËÍ⣬Õâ¸öбäÌå·¢ÉúÁËÖØ´ó±ä»¯£¬°üÂÞ¸ïеĴúÂë¼Ü¹¹¡¢¶à²ã¼ÓÃܺ͸ïеÄÒþÄä¼¼Êõ¡¢¸ÄÓÃPython½øÐнâÃܺÍÄÚ´æÖ´ÐС¢Ê¹ÓÃChrome DevToolsÌæ»»ÓÃÓÚ¼à¿ØChromiumä¯ÀÀÆ÷»î¶¯µÄPuppeteer¡¢À©´óÕë¶Ôƾ֤͵ÇԵ͍Ïò·þÎñ¡¢Ê¹ÓÃWebSocketsÈ¡´úHTTP½øÐÐͨÐÅÒÔ¼°½ÓÄÉDGA¶¯Ì¬½âÎöC2·þÎñÆ÷µØÖ·µÈ¡£


https://blog.morphisec.com/chaes4-new-chaes-malware-variant-targeting-financial-and-logistics-customers


5¡¢CERT-UA¼ì²âµ½Fancy BearÕë¶ÔijÄÜÔ´»ù´¡ÉèÊ©µÄ¹¥»÷


¾ÝýÌå9ÔÂ6ÈÕ±¨µÀ£¬CERT-UA¼ì²âµ½Fancy BearÕë¶ÔÎÚ¿ËÀ¼Ä³ÄÜÔ´»ù´¡ÉèÊ©µÄ¹¥»÷¡£¹¥»÷ʹÓÃÁ˰üÂÞBATÎļþµÄµöÓãÓʼþÀ´»ñµÃÄ¿±êϵͳµÄ³õʼ·ÃÎÊȨÏÞ¡£ÔËÐÐCMDÎļþ½«´´½¨.batºÍ.vbsÎļþ£¬²¢Æô¶¯Ò»¸öVBSÎļþ£¬¸ÃÎļþ½«ÒÀ´ÎÖ´ÐÐBATÎļþ¡£¹¥»÷Õß»¹ÔÚÄ¿±ê¼ÆËã»úÖа²×°ÁËTorÓ¦Ó㬲¢Í¨¹ýºÏ·¨µÄwebhook.site·þÎñAPIʹÓá°curl¡±ÊµÏÖÔ¶³ÌÃüÁîÖ´ÐУ¬Í¨¹ý´´½¨¼Æ»®ÈÎÎñÔËÐÐÒÔBATÎļþ×÷Ϊ²ÎÊýµÄVBS½ÅÔ­À´È·±£³Ö¾ÃÐÔ¡£CERT-UA³Æ£¬¸ÃÄÜÔ´»ù´¡ÉèÊ©µÄÄþ¾²ÈËÔ±½ÓÄÉÁËÏàÓ¦´ëÊ©×èÖ¹Á˴˴ι¥»÷»î¶¯¡£


https://therecord.media/ukraine-energy-facility-cyberattack-fancy-bear-email


6¡¢Ñо¿ÈËÔ±¹ûÈ»Atlas VPNÖÐй¶Óû§ÕæÊµIPµØÖ·µÄ©¶´


ýÌå9ÔÂ5Èճƣ¬Ó°ÏìLinux¿Í»§¶ËµÄAtlas VPN©¶´£¬½öͨ¹ý·ÃÎÊÍøÕ¾¼´¿Éй¶Óû§µÄÕæÊµIPµØÖ·¡£Óû§Educational-Map-8145ÔÚRedditÉÏÐû²¼ÁËÒ»¸öPoC£¬ÑÝʾÈçºÎÀûÓÃAtlas VPN Linux APIÀ´Ð¹Â¶Óû§µÄIPµØÖ·¡£¸ÃPoC´´½¨ÁËÒ»¸öÓÉJavaScript×Ô¶¯Ìá½»µÄÒþ²Ø±íµ¥£¬Á¬½Óµ½APIÖÕ¶ËURL http://127.0.0.1:8076/connection/stop¡£·ÃÎʸÃAPIÖÕ¶Ëʱ£¬Ëü»á×Ô¶¯ÖÕÖ¹Òþ²ØÓû§IPµØÖ·µÄAtlas VPN»á»°¡£Ò»µ©VPNÁ¬½Ó¶Ï¿ª£¬PoC¾Í»áÁ¬½Óµ½api.ipify.org£¬¼Ç¼·ÃÎÊÕßµÄʵ¼ÊIPµØÖ·¡£Atlas VPNÔÊÐí½«¾¡¿ìÐû²¼ÐÞ¸´·¨Ê½¡£


https://www.bleepingcomputer.com/news/security/atlas-vpn-zero-day-vulnerability-leaks-users-real-ip-address/