Mirai½©Ê¬ÍøÂçÀûÓÃNVR¡¢TP-Link ·ÓÉÆ÷ÖеÄ©¶´
Ðû²¼Ê±¼ä 2024-12-251. Mirai½©Ê¬ÍøÂçÀûÓÃNVR¡¢TP-Link ·ÓÉÆ÷ÖеÄ©¶´
12ÔÂ24ÈÕ£¬Ò»ÖÖеĻùÓÚMiraiµÄ½©Ê¬ÍøÂçÕýÔÚÀûÓÃÉÐδÊÕµ½¸ú×ÙÆ÷±àºÅÇÒδÔÚDigiEver DS-2105 Pro NVRÖÐÐÞ²¹µÄÔ¶³Ì´úÂëÖ´ÐЩ¶´¡£¸Ã»î¶¯Ê¼ÓÚ10Ô£¬Ö÷ÒªÕë¶ÔÍøÂç¼Ïñ»úºÍ¹Ì¼þ¹ýʱµÄTP-Link·ÓÉÆ÷¡£TXOneÑо¿Ô±Ta-Lun YenÈ¥ÄêÔÚDefCampÄþ¾²»áÒéÉÏչʾÁËÆäÖÐÒ»¸ö©¶´£¬Ó°ÏìÁ˶ą̀DVRÉ豸¡£AkamaiµÄÑо¿ÈËÔ±ÊӲ쵽£¬¾¡¹Ü¸Ã½©Ê¬ÍøÂçÔÚ11ÔÂÖÐÑ®¿ªÊ¼ÀûÓôË©¶´£¬µ«Ö¤¾Ý±íÃ÷Æä»î¶¯ÖÁÉÙ´Ó9ÔÂÒÑ¿ªÊ¼¡£³ýÁËDigiEver©¶´£¬ÐµÄMirai±äÖÖ»¹Õë¶ÔTP-LinkµÄCVE-2023-1389©¶´ºÍTeltonika RUT9XX·ÓÉÆ÷µÄCVE-2018-17532©¶´¡£Õë¶ÔDigiEver NVRµÄ¹¥»÷ͨ¹ýÔ¶³Ì´úÂëÖ´ÐÐȱÏÝʵÏÖ£¬ºÚ¿ÍÀûÓÃδÕýÈ·ÑéÖ¤Óû§ÊäÈëµÄURI×¢ÈëÃüÁ´Ó¶ø»ñÈ¡¶ñÒâÈí¼þ¶þ½øÖÆÎļþ²¢½«É豸ÄÉÈ뽩ʬÍøÂç¡£Ò»µ©É豸±»¹¥»÷£¬¾Í»áÓÃÓÚÂþÑÜʽ¾Ü¾ø·þÎñ¹¥»÷»òÁ÷´«µ½ÆäËûÉ豸¡£ÐµÄMirai±äÖÖ½ÓÄÉXORºÍChaCha20¼ÓÃÜ£¬Ö§³Ö¶àÖÖϵͳ¼Ü¹¹¡£AkamaiÖ¸³ö£¬¾¡¹ÜÅÓ´ó½âÃÜÒªÁì²»ÐÂÏÊ£¬µ«ÏÔʾMirai½©Ê¬ÍøÂçÔËÓªÉÌÔÚ¼ÆıºÍ¼¼ÊõÉϲ»Í£½ø²½¡£
https://www.bleepingcomputer.com/news/security/new-botnet-exploits-vulnerabilities-in-nvrs-tp-link-routers/
2. ClopÀÕË÷Èí¼þÍÅ»ïÀûÓÃCleoÁãÈÕ©¶´ÌᳫÐÂÀÕË÷¹¥ÊÆ
12ÔÂ24ÈÕ£¬ClopÀÕË÷Èí¼þÍÅ»ï½üÆÚ¶ÔÆäCleoÊý¾Ý͵ÇÔ¹¥»÷µÄÊܺ¦Õß·¢³öÁËÀÕË÷֪ͨ£¬ÒªÇó66¼Ò¹«Ë¾ÔÚ48СʱÄÚÏìÓ¦ÆäÒªÇ󣬷ñÔò½«Åû¶ÕâЩ¹«Ë¾µÄÈ«Ãû¡£Clopͨ¹ý°µÍøÃÅ»§Ö±½ÓÁªÏµÕâЩ¹«Ë¾£¬²¢ÌṩÄþ¾²ÁÄÌìƵµÀÁ´½ÓºÍµç×ÓÓʼþµØÖ·½øÐÐÊê½ðÖ§¸¶Ì¸ÅС£´Ë´Î¹¥»÷ÀûÓÃÁËCleo LexiCom¡¢VLTransferºÍHarmony²úÎïÖеÄÁãÈÕ©¶´£¨CVE-2024-50623£©£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÖ´Ðв»ÊÜÏÞÖƵÄÎļþÉÏ´«ºÍÏÂÔØ£¬µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£Clop¹ýÈ¥Ò²ÔøÀûÓÃÆäËûƽ̨µÄÁãÈÕ©¶´·ÃÎʹ«Ë¾ÍøÂç¡£¹©Ó¦ÉÌÒÑÌṩÐÞ¸´·¨Ê½£¬µ«¾¯¸æ³ÆºÚ¿Í¿ÉÄÜÀûÓøÃÐÞ¸´·¨Ê½ÔÚÊÜѬȾµÄÍøÂçÉÏ´ò¿ª·´Ïòshell¡£Clop»¹Ðû²¼½«É¾³ýÒÔÇ°¹¥»÷µÄÊý¾Ý£¬ÒÔרעÓÚÐÂÒ»ÂÖµÄÀÕË÷»î¶¯¡£Ä¿Ç°Éв»Çå³þ¾ßÌåÓм¸¶à¹«Ë¾Êܵ½ÁËClop×îй¥»÷µÄÍþв£¬µ«CleoÈí¼þÒѱ»È«ÇòÁè¼Ý4000¼Ò×é֯ʹÓá£
https://www.bleepingcomputer.com/news/security/clop-ransomware-is-now-extorting-66-cleo-data-theft-victims/
3. Postman Workspacesй¶30000¸öAPIÃÜÔ¿ºÍÃô¸ÐÁîÅÆ
12ÔÂ24ÈÕ£¬CloudSEKµÄTRIADÍŶӷ¢ÏÖ£¬ÒòÀÄÓÃPostman Workspaces£¬´óÁ¿Ãô¸ÐÊý¾ÝÃæÁÙй¶·çÏÕ¡£ÔÚΪÆÚÒ»ÄêµÄÊÓ²ìÖУ¬Ñо¿ÈËÔ±·¢ÏÖÁè¼Ý30,000¸ö¿É¹ûÈ»·ÃÎʵÄPostman Workspacesй¶ÁËAPIÃÜÔ¿¡¢ÁîÅƺ͹ÜÀíԱƾ¾ÝµÈÃô¸ÐÐÅÏ¢£¬Éæ¼°GitHub¡¢SlackºÍSalesforceµÈƽ̨£¬Ó°ÏìÁË°üÂÞÒ½ÁƱ£½¡¡¢Ô˶¯·þ×°ºÍ½ðÈÚ·þÎñÔÚÄڵĶà¸öÐÐÒµ¡£Ð¹Â¶µÄÔÒòÖ÷Òª°üÂÞ·ÃÎÊÅäÖôíÎó¡¢´¿Îı¾´æ´¢ÒÔ¼°ÊÕ²ØÆ·µÄ¹ûÈ»¹²Ïí¡£CloudSEKÖ¸³ö£¬ÕâЩй¶¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡¢Î´¾ÊÚȨµÄϵͳ·ÃÎÊÒÔ¼°ÍøÂçµöÓãºÍÉç»á¹¤³Ì¹¥»÷µÄÔö¼Ó¡£ÎªÈ·±£Êý¾ÝÄþ¾²£¬×é֯ӦʹÓû·¾³±äÁ¿¡¢ÂÖ»»ÁîÅÆ¡¢½ÓÄÉÃØÃܹÜÀí¹¤¾ßµÈ´ëÊ©¡£CloudSEKÒÑÏòÊÜÓ°ÏìµÄ×éÖ¯³ÂËßÁË´ó¶àÊýʼþ£¬²¢¶Ø´Ù×éÖ¯½ÓÄɸü¿É¿¿µÄÄþ¾²´ëÊ©¡£´ËÍ⣬PostmanҲʵʩÁËÃØÃܱ£»¤Õþ²ß£¬ÒÔ·ÀÖ¹Ãô¸ÐÊý¾ÝÔÚ¹«¹²ÊÂÇéÇøÖÐ̻¶¡£
https://hackread.com/postman-workspaces-leak-api-keys-sensitive-tokens/
4. Å·ÖÞº½Ìì¾Ö¹Ù·½É̵êÔâºÚ¿Í¹¥»÷£¬ÇÔÈ¡¿Í»§Ö§¸¶ÐÅÏ¢
12ÔÂ24ÈÕ£¬Å·ÖÞº½Ìì¾ÖµÄ¹Ù·½ÍøÉÏÉ̵ê½üÆÚÔâµ½ºÚ¿Í¹¥»÷£¬ºÚ¿Íͨ¹ý¼ÓÔØÒ»¶ÎJavaScript´úÂ룬ÔÚ½áÕËʱÉú³ÉÒ»¸öÐé¼ÙµÄStripeÖ§¸¶Ò³Ã棬´Ó¶øÊÕ¼¯¿Í»§ÐÅÏ¢£¬°üÂÞÖ§¸¶¿¨Êý¾Ý¡£Å·ÖÞº½Ìì¾Ö£¨ESA£©µÄÔ¤ËãÁè¼Ý100ÒÚÅ·Ôª£¬ÆäʹÃüÊÇͨ¹ýÅàѵÓԱÒÔ¼°½¨ÔìÓÃÓÚ̽Ë÷ÓîÖæÃØÃܵĻð¼ýºÍÎÀÐÇÀ´À©Õ¹Ì«¿Õ»î¶¯µÄ¼«ÏÞ¡£¸ÃÉ̵êÄ¿Ç°ÎÞ·¨Ê¹Ó㬲¢ÏÔʾ¡°ÔÝʱÍÑÀë¹ìµÀ¡±µÄÏûÏ¢¡£µç×ÓÉÌÎñÄþ¾²¹«Ë¾Sansec×¢Òâµ½ÁËÕâÒ»¶ñÒâ½Å±¾£¬²¢¾¯¸æ³Æ¸ÃÉ̵êËƺõÓëÅ·ÖÞº½Ìì¾Ö£¨ESA£©ÏµÍ³¼¯³É£¬¿ÉÄܶÔÔ±¹¤×é³É·çÏÕ¡£Í¬Ê±£¬ÍøÂçÓ¦ÓÃÄþ¾²¹«Ë¾Source Defense ResearchҲ֤ʵÁËSansecµÄÊÓ²ì½á¹û¡£ÔÚ±»BleepingComputerѯÎÊÓйش˴ÎÈëÇÖµÄÏêϸÐÅϢʱ£¬ESAÌåÏÖ¸ÃÉ̵겢²»ÍйÜÔÚÆä»ù´¡ÉèÊ©ÉÏ£¬Ò²²»¹ÜÀíÆäÉϵÄÊý¾Ý¡£Í¨¹ýwhois²éѯ¿ÉÒÔÈ·ÈÏ£¬¸ÃÉ̵êµÄÓòÃûºÍÁªÏµÊý¾ÝÓëESAµÄ¹Ù·½ÓòÃû²îÒ죬ÇÒÁªÏµÊý¾ÝÒѱ»É¾³ýÒÔ±£»¤Òþ˽¡£
https://www.bleepingcomputer.com/news/security/european-space-agencys-official-store-hacked-to-steal-payment-cards/
5. PyPIÏÖ¶ñÒâPythonÈí¼þ°üÇÔÈ¡Óû§Êý¾Ý
12ÔÂ24ÈÕ£¬Fortinet FortiGuard LabµÄAI¼ì²âϵͳ½üÆÚ·¢ÏÖÁËÁ½¸öÔÚPythonÈí¼þ°üË÷Òý(PyPI)ÉϵĶñÒâPythonÈí¼þ°ü£ºZebo-0.1.0ºÍCometlogger-0.1¡£ÕâЩ¶ñÒâÈí¼þͨ¹ý¼üÅ̼Ǽ¡¢½ØͼºÍÐÅϢ鶵ÈÊÖ¶ÎÇÔÈ¡Óû§Ãô¸ÐÊý¾Ý£¬²¢ÀûÓûìÏý¼¼ÊõÌӱܼì²â¡£Zebo-0.1.0ÀûÓÃpynputºÍImageGrabµÈ¿â¼Ç¼°´¼üºÍ½ØÈ¡ÆÁÄ»½Øͼ£¬½«Ãô¸ÐÐÅϢ鶵½Ô¶³Ì·þÎñÆ÷£¬²¢ÔÚϵͳÖØÆôʱÖØÐÂÖ´ÐÐÒÔÈ·±£³Ö¾Ã¿ØÖÆ¡£Cometlogger-0.1ÔòרעÓÚÐÅÏ¢ÇÔÈ¡ºÍ³Ö¾Ã´æÔÚ£¬Õë¶Ô¶à¸öÉ罻ƽ̨ÇÔÈ¡ÁîÅÆ¡¢ÃÜÂëºÍÕÊ»§ÐÅÏ¢£¬²¢½ÓÄÉ·´ÐéÄâ»ú¼ì²â¼¼ÊõºÍ¶¯Ì¬ÎļþÐ޸Ĺ¦Ð§¡£ÕâЩ¶ñÒâÈí¼þ°ü¶ÔËùÓпÉÒÔ°²×°PyPIÈí¼þ°üµÄƽ̨×é³ÉÖØ´óÒþ˽ºÍÄþ¾²·çÏÕ£¬·À·¶ÕâЩÍþвÐèÒª¶Ï¿ª»¥ÁªÍøÁ¬½Ó¡¢¸ôÀëÊÜѬȾϵͳ¡¢Ê¹Ó÷À²¡¶¾Èí¼þÒÔ¼°ÔÚÐëҪʱÖØиñʽ»¯ÏµÍ³¡£PyPIµÄ±ãÀûÐÔÅãͬ×Å·çÏÕ£¬¿ª·¢ÈËÔ±ÐèÒª±£³Ö¾¯Ì裬ÖÆÖ¹°²×°¶ñÒâÈí¼þ°ü¡£
https://hackread.com/python-malware-zebo-cometlogger-stealing-user-data/
6. ³¯Ïʺڿ͹¥»÷DMM Bitcoin£¬ÇÔÈ¡3.08ÒÚÃÀÔª¼ÓÃÜ»õ±Ò
12ÔÂ24ÈÕ£¬³¯ÏʺڿÍ×éÖ¯¡°TraderTraitor¡±£¨Ò²±»×·×ÙΪJade Sleet¡¢UNC4899ºÍSlow Pisces£©ÔÚ½ñÄê5Ô¶ÔÈÕ±¾DMM Bitcoin½»Ò×ËùÌᳫ¹¥»÷£¬ÀÖ³ÉÇÔÈ¡Á˼ÛÖµ3.08ÒÚÃÀÔªµÄ¼ÓÃÜ»õ±Ò¡£´Ë´Î¹¥»÷ʼÓÚ3ÔÂÏÂÑ®£¬ºÚ¿Íαװ³ÉLinkedInÉϵĺϷ¨ÕÐƸÈËÔ±£¬½Ó´¥²¢ÓÕµ¼ÈÕ±¾ÆóÒµ¼ÓÃÜ»õ±ÒÇ®°üÈí¼þ¹«Ë¾GincoµÄÒ»ÃûÔ±¹¤ÏÂÔز¢Ö´ÐжñÒâPython´úÂ룬½ø¶øÉø͸µ½Ginco²¢ºáÏòÒƶ¯µ½DMM¡£FBIÖ¸³ö£¬¹¥»÷ÕßÀûÓûỰcookieÐÅϢð³äÊÜѬȾԱ¹¤£¬»ñÈ¡Gincoδ¼ÓÃÜͨÐÅϵͳµÄ·ÃÎÊȨÏÞ£¬²¢×îÖÕÔÚ5ÔÂÏÂÑ®ÀûÓÃDMMÔ±¹¤µÄºÏ·¨½»Ò×ÇëÇ󣬵¼Ö¾޶îËðʧ¡£×Ô2022ÄêÒÔÀ´£¬TraderTraitorÒ»Ö±»îÔ¾ÓÚÇø¿éÁ´ÁìÓò£¬Ê¹ÓÃÐé¼ÙÓ¦Ó÷¨Ê½½øÐÐÉç»á¹¤³Ì¹¥»÷£¬ÃÀ¹úÕþ¸®Ò»Ö±ÔÚÃÜÇмàÊÓÆä»î¶¯¡£
https://www.bleepingcomputer.com/news/security/fbi-links-north-korean-hackers-to-308-million-crypto-heist/