LATRODECTUSÒ»Ö±¸üв¢·Ö·¢ICEDIDºÍÆäËû¶ñÒâÈí¼þ
Ðû²¼Ê±¼ä 2024-05-225ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬LATRODECTUSÓÚ 2023 Äê 10 ÔÂÓÉÎÖ¶ûÂêÑо¿Ö°Ô±Ê״η¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÊÇÒ»ÖÖÔÚÍøÂç·¸·¨·Ö×ÓÖÐÔ½À´Ô½Ê¢ÐеĶñÒâÈí¼þ¼ÓÔØ³ÌÐò¡£¡£¡£¡£¡£¡£¡£ËäÈ»Õâ±»ÒÔΪÊÇÒ»¸öеļÒ×壬£¬£¬£¬£¬£¬£¬µ«ÓÉÓÚÐÐΪºÍÉú³¤ÏàËÆÐÔ£¬£¬£¬£¬£¬£¬£¬LATRODECTUS ºÍICEDIDÖ®¼ä±£´æÏ¸ÃÜÁªÏµ£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÏÂÔØºÍÖ´ÐмÓÃܸºÔØ£¨Èç ICEDID£©µÄÏÂÁî´¦Öóͷ£³ÌÐò¡£¡£¡£¡£¡£¡£¡£Proofpoint ºÍ Team Cymru »ùÓÚÕâÖÖÁªÏµ£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÁËICEDID ºÍ LATRODECTUS ÔËÓªÉÌʹÓõÄÍøÂç»ù´¡Éèʩ֮¼ä±£´æÏ¸ÃÜÁªÏµ¡£¡£¡£¡£¡£¡£¡£LATRODECTUS ÌṩÁËһϵÁÐÖÜÈ«µÄ±ê×¼¹¦Ð§£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕß¿ÉÒÔʹÓÃÕâЩ¹¦Ð§À´°²ÅŸü¶àµÄÓÐÓøºÔØ£¬£¬£¬£¬£¬£¬£¬ÔÚÆðÔ´ÈëÇÖºóÖ´ÐÐÖÖÖֻ¡£¡£¡£¡£¡£¡£¡£´úÂë¿âδ¾ÓÉ»ìÏý£¬£¬£¬£¬£¬£¬£¬½ö°üÀ¨ 11 ¸öרעÓÚö¾ÙºÍÖ´ÐеÄÏÂÁî´¦Öóͷ£³ÌÐò¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÀàÐ͵ļÓÔØÆ÷´ú±íÁËÎÒÃÇÍŶÓ×î½üÊӲ쵽µÄÀ˳±£¬£¬£¬£¬£¬£¬£¬ÀýÈçPIKABOT£¬£¬£¬£¬£¬£¬£¬ÆäÖдúÂëÔ½·¢ÇáÁ¿¼¶ºÍÖ±½Ó£¬£¬£¬£¬£¬£¬£¬´¦Öóͷ£³ÌÐòÊýÄ¿ÓÐÏÞ¡£¡£¡£¡£¡£¡£¡£
https://www.elastic.co/security-labs/spring-cleaning-with-latrodectus?&web_view=true
2. Kinsing¹¥»÷Apache Tomcat°²ÅÅÍÚ¿ó³ÌÐò
5ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬Kinsing ¶ñÒâÈí¼þÒÔʹÓà Linux ÔÆÐ§ÀÍÆ÷ÉϵÄÎó²î°²ÅźóÃźͼÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò¶øÖøÃû£¬£¬£¬£¬£¬£¬£¬×î½ü½«ÆäÄ¿µÄÀ©Õ¹µ½°üÀ¨ Apache Tomcat ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÐÂÓ±µÄÊÖÒÕÀ´Ìӱܼì²â£¬£¬£¬£¬£¬£¬£¬½«×ÔÉíÒþ²ØÔÚ¿´ËÆÎÞº¦µÄϵͳÎļþÖУ¬£¬£¬£¬£¬£¬£¬Ê¹ÆäÔÚÊÜѬȾµÄϵͳÉϳ¤ÆÚ±£´æ£¬£¬£¬£¬£¬£¬£¬Í»³öÁË Kinsing Ò»Ö±Éú³¤µÄÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷ϵͳÖÎÀíÔ±ÐèÒª¶ÔÕâЩÐÂÐËÍþв¼á³ÖСÐÄ¡£¡£¡£¡£¡£¡£¡£Kinsing ʹÓÃÈÝÆ÷ºÍЧÀÍÆ÷ÖеÄÎó²îÀ´°²ÅźóÃźͼÓÃÜÍÚ¿ó³ÌÐò£¬£¬£¬£¬£¬£¬£¬ÊÓ²ìЧ¹ûÏÔʾ¶à¸öЧÀÍÆ÷Êܵ½Ñ¬È¾£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨¾ßÓÐÑÏÖØÈ±ÏÝµÄ Apache Tomcat¡£¡£¡£¡£¡£¡£¡£Tomcat ÊÇÒ»¿î¿É¹ûÕæ»á¼ûµÄ¾²Ì¬ÄÚÈÝ¿ªÔ´Ð§ÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÆäÔÚ»¥ÁªÍøÉϵÄ̻¶¶ø³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬ÕâʹµÃ Kinsing ¿ÉÒÔÉøÍ¸µ½ÏµÍ³Öв¢½¨ÉèÒþ²ØµÄºóÃÅÒÔʵÏÖ³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±°²ÅżÓÃÜ¿ó¹¤À´ÇÔÈ¡ÅÌËã×ÊÔ´ÒÔ¾ÙÐмÓÃÜÇ®±ÒÍÚ¾ò¡£¡£¡£¡£¡£¡£¡£
https://gbhackers.com/kinsing-malware-apache-tomcat-servers/
3. SECÒªÇó½ðÈÚ×éÖ¯ÐèÒªÔÚ 30 ÌìÄÚÅû¶Êý¾Ýй¶ÊÂÎñ
5ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©¶Ô SP ¹æÔò¾ÙÐÐÁËÐ޸쬣¬£¬£¬£¬£¬£¬ÒªÇó½ðÈÚ¹«Ë¾ÔÚ 30 ÌìÄÚ±¨¸æÊý¾Ýй¶ÇéÐΡ£¡£¡£¡£¡£¡£¡£ÕâÊDZ£»£»£»£»£»¤ÏûºÄÕßµÄÒ»´óǰ½ø¡£¡£¡£¡£¡£¡£¡£ÕâÏîл®¶¨½«ÓÚ 2024 Äê 5 Ô 15 ÈÕÉúЧ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÔöÇ¿ºÍ¸üжÔÏûºÄÕß½ðÈÚÐÅÏ¢µÄ±£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£¡£×Ô 2000 ÄêÍÆ³öÒÔÀ´£¬£¬£¬£¬£¬£¬£¬SEC î¿Ïµ SPÒªÇó¾¼ÍÉúÒâÉÌ¡¢Í¶×ʹ«Ë¾ºÍ³ÖÅÆÍ¶×ÊÕÕÁÏͨ¹ýÊéÃæÕþ²ßºÍ³ÌÐò±£»£»£»£»£»¤¿Í»§¼Í¼ºÍÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸Ã¹æÔò»¹Ú¹ÊÍÁËÔõÑù׼ȷɾ³ýÏûºÄÕß±¨¸æÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢ÒªÇóÒþ˽Õþ²ß֪ͨºÍÑ¡ÔñÍ˳öÑ¡Ïî¡£¡£¡£¡£¡£¡£¡£¶àÄêÀ´£¬£¬£¬£¬£¬£¬£¬ÊÖÒÕµÄǰ½øÊ¹µÃÊý¾Ýй¶µÄ¿ÉÄÜÐÔ¸ü´ó£¬£¬£¬£¬£¬£¬£¬Õâ¾ÍÊÇÐèÒªÕâЩ¸Ä±äµÄÔµ¹ÊÔÓÉ¡£¡£¡£¡£¡£¡£¡£
https://gbhackers.com/financial-organizations-data-breach/
4. Git Ô¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2024-32002
5ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»Ö¸¶¨Îª CVE-2024-32002£¬£¬£¬£¬£¬£¬£¬ÑÏÖØË®Æ½Îª 9.0£¨ÑÏÖØ£©¡£¡£¡£¡£¡£¡£¡£Õâ¸öÌØÊâµÄÎó²î±£´æÓÚÆÕ±éʹÓõÄcloneÏÂÁîÖС£¡£¡£¡£¡£¡£¡£Git ÉÏÖÜÐû²¼ÁËÒ»·ÝÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÖ¸³öÁËÓйØÔ¶³Ì´úÂëÖ´ÐеÄÎÊÌâ¡£¡£¡£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»ÐÎòΪÓÉÓÚ¿ÉÒÔÒÔÌØ¶¨·½·¨Æð²ÝµÄ×ÓÄ£¿£¿£¿£¿é¶ø±£´æ£¬£¬£¬£¬£¬£¬£¬´Ó¶ø¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£²»¹ýÕâ¸öÎó²îÒѾ±»gitÐÞ¸´£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÐû²¼ÁËÐÞ²¹°æ±¾¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÍøÂçÇå¾²ÐÂÎÅ·ÖÏíµÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬git ʹÓÃ×ÓÄ£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬ÕâЩ×ÓÄ£¿£¿£¿£¿éÊÇǶÌ×ÔÚÆäËû´æ´¢¿âÖеĴ洢¿â¡£¡£¡£¡£¡£¡£¡£Ã¿¸ö×ÓÄ£¿£¿£¿£¿éÔÚÖ÷Ŀ¼Öж¼ÓÐÒ»¸öÖ¸¶¨µÄĿ¼·¾¶£¬£¬£¬£¬£¬£¬£¬¸ÃĿ¼·¾¶»á±»¸ú×ÙÒÔÈ·±£×¼È·¼Í¼¸ü¸Ä¡£¡£¡£¡£¡£¡£¡£½øÒ»²½ÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬£¬Windows£¨A/modules/x£©ºÍmacOS£¨a/modules/x£©µÄĬÈÏÉèÖÃÖб£´æ²»Çø·Ö¾ÞϸдµÄÎļþϵͳ¡£¡£¡£¡£¡£¡£¡£ÕâÁ½¸ö·¾¶µÄ´¦Öóͷ£·½·¨Ïàͬ£¬£¬£¬£¬£¬£¬£¬ÕâÊÇÔ¶³Ì´úÂëÖ´Ðб³ºóµÄÖ÷ÒªÔµ¹ÊÔÓÉ¡£¡£¡£¡£¡£¡£¡£
https://gbhackers.com/git-flaw-remote-code-execution/
5. Fluent Bit ÑÏÖØÈ±ÏÝÓ°ÏìËùÓÐÖ÷ÒªÔÆÌṩÉÌ
5ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ÉÔھܾøÐ§ÀͺÍÔ¶³Ì´úÂëÖ´Ðй¥»÷ÖÐʹÓõÄÒªº¦ Fluent Bit Îó²îÓ°ÏìÁËËùÓÐÖ÷ÒªÔÆÌṩÉ̺ÍÐí¶àÊÖÒÕ¾ÞÍ·¡£¡£¡£¡£¡£¡£¡£Fluent Bit ÊÇÒ»ÖÖºÜÊÇÊ¢ÐеÄÈÕÖ¾¼Í¼ºÍÖ¸±ê½â¾ö¼Æ»®£¬£¬£¬£¬£¬£¬£¬ÊÊÓÃÓÚ Windows¡¢Linux ºÍ macOS£¬£¬£¬£¬£¬£¬£¬Ç¶ÈëÔÚÖ÷Òª Kubernetes ¿¯ÐаæÖУ¬£¬£¬£¬£¬£¬£¬°üÀ¨À´×Ô Amazon AWS¡¢Google GCP ºÍ Microsoft Azure µÄ¿¯Ðа档¡£¡£¡£¡£¡£¡£×èÖ¹ 2024 Äê 3 Ô£¬£¬£¬£¬£¬£¬£¬Fluent Bit µÄÏÂÔØºÍ°²ÅÅ´ÎÊýÁè¼Ý 130 ÒڴΣ¬£¬£¬£¬£¬£¬£¬½Ï 2022 Äê 10 Ô±¨µÀµÄ30 ÒÚ´ÎÏÂÔØÁ¿´ó·ùÔöÌí¡£¡£¡£¡£¡£¡£¡£Fluent Bit Ò²±» Crowdstrike ºÍ Trend Micro µÈÍøÂçÇå¾²¹«Ë¾ÒÔ¼°Ë¼¿Æ¡¢VMware¡¢Ó¢Ìضû¡¢Adobe ºÍ´÷¶ûµÈÐí¶à¿Æ¼¼¹«Ë¾Ê¹Óᣡ£¡£¡£¡£¡£¡£Õâ¸öÑÏÖØµÄÄÚ´æËð»µÎó²î±»¸ú×ÙΪCVE-2024-4323£¬£¬£¬£¬£¬£¬£¬²¢±»·¢Ã÷¸ÃÎó²îµÄ Tenable Çå¾²Ñо¿Ö°Ô±³ÆÎªLinguistic Lumberjack£¬£¬£¬£¬£¬£¬£¬ËüÊÇÔÚ°æ±¾ 2.0.7 ÖÐÒýÈëµÄ£¬£¬£¬£¬£¬£¬£¬ÊÇÓÉ Fluent Bit µÄǶÈëʽ HTTP ЧÀÍÆ÷ÆÊÎö¸ú×ÙÇëÇóÖеĶѻº³åÇøÒç³öÎó²îÒýÆðµÄ¡£¡£¡£¡£¡£¡£¡£Ö»¹Üδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔÇáËÉʹÓøÃÇå¾²Îó²îÀ´´¥·¢¾Ü¾øÐ§ÀÍ»òÔ¶³Ì²¶»ñÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ«ÈôÊÇÓÐÊʵ±µÄÌõ¼þºÍ×ã¹»µÄʱ¼äÀ´½¨Éè¿É¿¿µÄÎó²î£¬£¬£¬£¬£¬£¬£¬ËûÃÇÒ²¿ÉÒÔʹÓÃËüÀ´»ñµÃÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-fluent-bit-flaw-impacts-all-major-cloud-providers/
6. AntidotľÂíαװ³ÉGoogle Play¸üУ¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÒøÐÐÊý¾Ý
5ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬CybleµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÕë¶Ô Android ×°±¸µÄÐÂÒøÐÐľÂí¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÖØ´óµÄ¶ñÒâÈí¼þ¾ßÓжàÖÖΣÏÕ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÁýÕÖ¹¥»÷¡¢¼üÅ̼ͼºÍ»ìÏýÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£¸ÃľÂíÆ¾Ö¤ÆäÔ´´úÂëÖеÄ×Ö·û´®ÃüÃûΪ¡°Antidot¡±£¬£¬£¬£¬£¬£¬£¬ÒÔαװ³É¹Ù·½ Google Play ¸üв¢Ö§³Ö¶àÖÖÓïÑÔ¶øÖøÃû£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ó¢Óï¡¢µÂÓï¡¢·¨Óï¡¢Î÷°àÑÀÓï¡¢ÆÏÌÑÑÀÓï¡¢ÂÞÂíÄáÑÇÓ£¬£¬£¬£¬£¬£¬ÉõÖÁ¶íÓï¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×÷Ϊ Google Play µÄ¸üоÙÐзַ¢£¬£¬£¬£¬£¬£¬£¬²¢ÒÔ¡°Ð°汾¡±µÄÃû³Æ·ºÆðÔÚÊܺ¦ÕßµÄ×°±¸ÉÏ¡£¡£¡£¡£¡£¡£¡£×°ÖúÍÊ×´ÎÆô¶¯ºó£¬£¬£¬£¬£¬£¬£¬Óû§»á¿´µ½Ò»¸ö¼ÙÒ³Ãæ£¬£¬£¬£¬£¬£¬£¬¾Ý³ÆÀ´×Ô Google Play£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Íê³É¸üÐÂËùÐè²Ù×÷µÄÏêϸ˵Ã÷¡£¡£¡£¡£¡£¡£¡£
https://meterpreter.org/new-antidot-trojan-masquerades-as-google-play-update-steals-banking-data/


¾©¹«Íø°²±¸11010802024551ºÅ