LATRODECTUSÒ»Ö±¸üв¢·Ö·¢ICEDIDºÍÆäËû¶ñÒâÈí¼þ
Ðû²¼Ê±¼ä 2024-05-225ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬LATRODECTUSÓÚ 2023 Äê 10 ÔÂÓÉÎÖ¶ûÂêÑо¿Ö°Ô±Ê״η¢Ã÷£¬£¬£¬£¬£¬£¬ÊÇÒ»ÖÖÔÚÍøÂç·¸·¨·Ö×ÓÖÐÔ½À´Ô½Ê¢ÐеĶñÒâÈí¼þ¼ÓÔØ³ÌÐò¡£¡£¡£¡£¡£¡£ËäÈ»Õâ±»ÒÔΪÊÇÒ»¸öеļÒ×壬£¬£¬£¬£¬£¬µ«ÓÉÓÚÐÐΪºÍÉú³¤ÏàËÆÐÔ£¬£¬£¬£¬£¬£¬LATRODECTUS ºÍICEDIDÖ®¼ä±£´æÏ¸ÃÜÁªÏµ£¬£¬£¬£¬£¬£¬°üÀ¨ÏÂÔØºÍÖ´ÐмÓÃܸºÔØ£¨Èç ICEDID£©µÄÏÂÁî´¦Öóͷ£³ÌÐò¡£¡£¡£¡£¡£¡£Proofpoint ºÍ Team Cymru »ùÓÚÕâÖÖÁªÏµ£¬£¬£¬£¬£¬£¬·¢Ã÷ÁËICEDID ºÍ LATRODECTUS ÔËÓªÉÌʹÓõÄÍøÂç»ù´¡Éèʩ֮¼ä±£´æÏ¸ÃÜÁªÏµ¡£¡£¡£¡£¡£¡£LATRODECTUS ÌṩÁËһϵÁÐÖÜÈ«µÄ±ê×¼¹¦Ð§£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕß¿ÉÒÔʹÓÃÕâЩ¹¦Ð§À´°²ÅŸü¶àµÄÓÐÓøºÔØ£¬£¬£¬£¬£¬£¬ÔÚÆðÔ´ÈëÇÖºóÖ´ÐÐÖÖÖֻ¡£¡£¡£¡£¡£¡£´úÂë¿âδ¾ÓÉ»ìÏý£¬£¬£¬£¬£¬£¬½ö°üÀ¨ 11 ¸öרעÓÚö¾ÙºÍÖ´ÐеÄÏÂÁî´¦Öóͷ£³ÌÐò¡£¡£¡£¡£¡£¡£ÕâÖÖÀàÐ͵ļÓÔØÆ÷´ú±íÁËÎÒÃÇÍŶÓ×î½üÊӲ쵽µÄÀ˳±£¬£¬£¬£¬£¬£¬ÀýÈçPIKABOT£¬£¬£¬£¬£¬£¬ÆäÖдúÂëÔ½·¢ÇáÁ¿¼¶ºÍÖ±½Ó£¬£¬£¬£¬£¬£¬´¦Öóͷ£³ÌÐòÊýÄ¿ÓÐÏÞ¡£¡£¡£¡£¡£¡£
https://www.elastic.co/security-labs/spring-cleaning-with-latrodectus?&web_view=true
2. Kinsing¹¥»÷Apache Tomcat°²ÅÅÍÚ¿ó³ÌÐò
5ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬Kinsing ¶ñÒâÈí¼þÒÔʹÓà Linux ÔÆÐ§ÀÍÆ÷ÉϵÄÎó²î°²ÅźóÃźͼÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò¶øÖøÃû£¬£¬£¬£¬£¬£¬×î½ü½«ÆäÄ¿µÄÀ©Õ¹µ½°üÀ¨ Apache Tomcat ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÐÂÓ±µÄÊÖÒÕÀ´Ìӱܼì²â£¬£¬£¬£¬£¬£¬½«×ÔÉíÒþ²ØÔÚ¿´ËÆÎÞº¦µÄϵͳÎļþÖУ¬£¬£¬£¬£¬£¬Ê¹ÆäÔÚÊÜѬȾµÄϵͳÉϳ¤ÆÚ±£´æ£¬£¬£¬£¬£¬£¬Í»³öÁË Kinsing Ò»Ö±Éú³¤µÄÕ½ÂÔ£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷ϵͳÖÎÀíÔ±ÐèÒª¶ÔÕâЩÐÂÐËÍþв¼á³ÖСÐÄ¡£¡£¡£¡£¡£¡£Kinsing ʹÓÃÈÝÆ÷ºÍЧÀÍÆ÷ÖеÄÎó²îÀ´°²ÅźóÃźͼÓÃÜÍÚ¿ó³ÌÐò£¬£¬£¬£¬£¬£¬ÊÓ²ìЧ¹ûÏÔʾ¶à¸öЧÀÍÆ÷Êܵ½Ñ¬È¾£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨¾ßÓÐÑÏÖØÈ±ÏÝµÄ Apache Tomcat¡£¡£¡£¡£¡£¡£Tomcat ÊÇÒ»¿î¿É¹ûÕæ»á¼ûµÄ¾²Ì¬ÄÚÈÝ¿ªÔ´Ð§ÀÍÆ÷£¬£¬£¬£¬£¬£¬ÓÉÓÚÆäÔÚ»¥ÁªÍøÉϵÄ̻¶¶ø³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬ÕâʹµÃ Kinsing ¿ÉÒÔÉøÍ¸µ½ÏµÍ³Öв¢½¨ÉèÒþ²ØµÄºóÃÅÒÔʵÏÖ³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬Í¬Ê±°²ÅżÓÃÜ¿ó¹¤À´ÇÔÈ¡ÅÌËã×ÊÔ´ÒÔ¾ÙÐмÓÃÜÇ®±ÒÍÚ¾ò¡£¡£¡£¡£¡£¡£
https://gbhackers.com/kinsing-malware-apache-tomcat-servers/
3. SECÒªÇó½ðÈÚ×éÖ¯ÐèÒªÔÚ 30 ÌìÄÚÅû¶Êý¾Ýй¶ÊÂÎñ
5ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©¶Ô SP ¹æÔò¾ÙÐÐÁËÐ޸쬣¬£¬£¬£¬£¬ÒªÇó½ðÈÚ¹«Ë¾ÔÚ 30 ÌìÄÚ±¨¸æÊý¾Ýй¶ÇéÐΡ£¡£¡£¡£¡£¡£ÕâÊDZ£»£»£»£»£»£»¤ÏûºÄÕßµÄÒ»´óǰ½ø¡£¡£¡£¡£¡£¡£ÕâÏîл®¶¨½«ÓÚ 2024 Äê 5 Ô 15 ÈÕÉúЧ£¬£¬£¬£¬£¬£¬Ö¼ÔÚÔöÇ¿ºÍ¸üжÔÏûºÄÕß½ðÈÚÐÅÏ¢µÄ±£»£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£×Ô 2000 ÄêÍÆ³öÒÔÀ´£¬£¬£¬£¬£¬£¬SEC î¿Ïµ SPÒªÇó¾¼ÍÉúÒâÉÌ¡¢Í¶×ʹ«Ë¾ºÍ³ÖÅÆÍ¶×ÊÕÕÁÏͨ¹ýÊéÃæÕþ²ßºÍ³ÌÐò±£»£»£»£»£»£»¤¿Í»§¼Í¼ºÍÐÅÏ¢¡£¡£¡£¡£¡£¡£¸Ã¹æÔò»¹Ú¹ÊÍÁËÔõÑù׼ȷɾ³ýÏûºÄÕß±¨¸æÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢ÒªÇóÒþ˽Õþ²ß֪ͨºÍÑ¡ÔñÍ˳öÑ¡Ïî¡£¡£¡£¡£¡£¡£¶àÄêÀ´£¬£¬£¬£¬£¬£¬ÊÖÒÕµÄǰ½øÊ¹µÃÊý¾Ýй¶µÄ¿ÉÄÜÐÔ¸ü´ó£¬£¬£¬£¬£¬£¬Õâ¾ÍÊÇÐèÒªÕâЩ¸Ä±äµÄÔµ¹ÊÔÓÉ¡£¡£¡£¡£¡£¡£
https://gbhackers.com/financial-organizations-data-breach/
4. Git Ô¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2024-32002
5ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»Ö¸¶¨Îª CVE-2024-32002£¬£¬£¬£¬£¬£¬ÑÏÖØË®Æ½Îª 9.0£¨ÑÏÖØ£©¡£¡£¡£¡£¡£¡£Õâ¸öÌØÊâµÄÎó²î±£´æÓÚÆÕ±éʹÓõÄcloneÏÂÁîÖС£¡£¡£¡£¡£¡£Git ÉÏÖÜÐû²¼ÁËÒ»·ÝÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬ÆäÖÐÖ¸³öÁËÓйØÔ¶³Ì´úÂëÖ´ÐеÄÎÊÌâ¡£¡£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬¸ÃÎó²î±»ÐÎòΪÓÉÓÚ¿ÉÒÔÒÔÌØ¶¨·½·¨Æð²ÝµÄ×ÓÄ£¿£¿£¿£¿£¿é¶ø±£´æ£¬£¬£¬£¬£¬£¬´Ó¶ø¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£²»¹ýÕâ¸öÎó²îÒѾ±»gitÐÞ¸´£¬£¬£¬£¬£¬£¬²¢ÇÒÐû²¼ÁËÐÞ²¹°æ±¾¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÍøÂçÇå¾²ÐÂÎÅ·ÖÏíµÄ±¨¸æ£¬£¬£¬£¬£¬£¬git ʹÓÃ×ÓÄ£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬ÕâЩ×ÓÄ£¿£¿£¿£¿£¿éÊÇǶÌ×ÔÚÆäËû´æ´¢¿âÖеĴ洢¿â¡£¡£¡£¡£¡£¡£Ã¿¸ö×ÓÄ£¿£¿£¿£¿£¿éÔÚÖ÷Ŀ¼Öж¼ÓÐÒ»¸öÖ¸¶¨µÄĿ¼·¾¶£¬£¬£¬£¬£¬£¬¸ÃĿ¼·¾¶»á±»¸ú×ÙÒÔÈ·±£×¼È·¼Í¼¸ü¸Ä¡£¡£¡£¡£¡£¡£½øÒ»²½ÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬Windows£¨A/modules/x£©ºÍmacOS£¨a/modules/x£©µÄĬÈÏÉèÖÃÖб£´æ²»Çø·Ö¾ÞϸдµÄÎļþϵͳ¡£¡£¡£¡£¡£¡£ÕâÁ½¸ö·¾¶µÄ´¦Öóͷ£·½·¨Ïàͬ£¬£¬£¬£¬£¬£¬ÕâÊÇÔ¶³Ì´úÂëÖ´Ðб³ºóµÄÖ÷ÒªÔµ¹ÊÔÓÉ¡£¡£¡£¡£¡£¡£
https://gbhackers.com/git-flaw-remote-code-execution/
5. Fluent Bit ÑÏÖØÈ±ÏÝÓ°ÏìËùÓÐÖ÷ÒªÔÆÌṩÉÌ
5ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬¿ÉÔھܾøÐ§ÀͺÍÔ¶³Ì´úÂëÖ´Ðй¥»÷ÖÐʹÓõÄÒªº¦ Fluent Bit Îó²îÓ°ÏìÁËËùÓÐÖ÷ÒªÔÆÌṩÉ̺ÍÐí¶àÊÖÒÕ¾ÞÍ·¡£¡£¡£¡£¡£¡£Fluent Bit ÊÇÒ»ÖÖºÜÊÇÊ¢ÐеÄÈÕÖ¾¼Í¼ºÍÖ¸±ê½â¾ö¼Æ»®£¬£¬£¬£¬£¬£¬ÊÊÓÃÓÚ Windows¡¢Linux ºÍ macOS£¬£¬£¬£¬£¬£¬Ç¶ÈëÔÚÖ÷Òª Kubernetes ¿¯ÐаæÖУ¬£¬£¬£¬£¬£¬°üÀ¨À´×Ô Amazon AWS¡¢Google GCP ºÍ Microsoft Azure µÄ¿¯Ðа档¡£¡£¡£¡£¡£×èÖ¹ 2024 Äê 3 Ô£¬£¬£¬£¬£¬£¬Fluent Bit µÄÏÂÔØºÍ°²ÅÅ´ÎÊýÁè¼Ý 130 ÒڴΣ¬£¬£¬£¬£¬£¬½Ï 2022 Äê 10 Ô±¨µÀµÄ30 ÒÚ´ÎÏÂÔØÁ¿´ó·ùÔöÌí¡£¡£¡£¡£¡£¡£Fluent Bit Ò²±» Crowdstrike ºÍ Trend Micro µÈÍøÂçÇå¾²¹«Ë¾ÒÔ¼°Ë¼¿Æ¡¢VMware¡¢Ó¢Ìضû¡¢Adobe ºÍ´÷¶ûµÈÐí¶à¿Æ¼¼¹«Ë¾Ê¹Óᣡ£¡£¡£¡£¡£Õâ¸öÑÏÖØµÄÄÚ´æËð»µÎó²î±»¸ú×ÙΪCVE-2024-4323£¬£¬£¬£¬£¬£¬²¢±»·¢Ã÷¸ÃÎó²îµÄ Tenable Çå¾²Ñо¿Ö°Ô±³ÆÎªLinguistic Lumberjack£¬£¬£¬£¬£¬£¬ËüÊÇÔÚ°æ±¾ 2.0.7 ÖÐÒýÈëµÄ£¬£¬£¬£¬£¬£¬ÊÇÓÉ Fluent Bit µÄǶÈëʽ HTTP ЧÀÍÆ÷ÆÊÎö¸ú×ÙÇëÇóÖеĶѻº³åÇøÒç³öÎó²îÒýÆðµÄ¡£¡£¡£¡£¡£¡£Ö»¹Üδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔÇáËÉʹÓøÃÇå¾²Îó²îÀ´´¥·¢¾Ü¾øÐ§ÀÍ»òÔ¶³Ì²¶»ñÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«ÈôÊÇÓÐÊʵ±µÄÌõ¼þºÍ×ã¹»µÄʱ¼äÀ´½¨Éè¿É¿¿µÄÎó²î£¬£¬£¬£¬£¬£¬ËûÃÇÒ²¿ÉÒÔʹÓÃËüÀ´»ñµÃÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-fluent-bit-flaw-impacts-all-major-cloud-providers/
6. AntidotľÂíαװ³ÉGoogle Play¸üУ¬£¬£¬£¬£¬£¬ÇÔÈ¡ÒøÐÐÊý¾Ý
5ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬CybleµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÕë¶Ô Android ×°±¸µÄÐÂÒøÐÐľÂí¡£¡£¡£¡£¡£¡£ÕâÖÖÖØ´óµÄ¶ñÒâÈí¼þ¾ßÓжàÖÖΣÏÕ¹¦Ð§£¬£¬£¬£¬£¬£¬°üÀ¨ÁýÕÖ¹¥»÷¡¢¼üÅ̼ͼºÍ»ìÏýÊÖÒÕ¡£¡£¡£¡£¡£¡£¸ÃľÂíÆ¾Ö¤ÆäÔ´´úÂëÖеÄ×Ö·û´®ÃüÃûΪ¡°Antidot¡±£¬£¬£¬£¬£¬£¬ÒÔαװ³É¹Ù·½ Google Play ¸üв¢Ö§³Ö¶àÖÖÓïÑÔ¶øÖøÃû£¬£¬£¬£¬£¬£¬°üÀ¨Ó¢Óï¡¢µÂÓï¡¢·¨Óï¡¢Î÷°àÑÀÓï¡¢ÆÏÌÑÑÀÓï¡¢ÂÞÂíÄáÑÇÓ£¬£¬£¬£¬£¬ÉõÖÁ¶íÓï¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×÷Ϊ Google Play µÄ¸üоÙÐзַ¢£¬£¬£¬£¬£¬£¬²¢ÒÔ¡°Ð°汾¡±µÄÃû³Æ·ºÆðÔÚÊܺ¦ÕßµÄ×°±¸ÉÏ¡£¡£¡£¡£¡£¡£×°ÖúÍÊ×´ÎÆô¶¯ºó£¬£¬£¬£¬£¬£¬Óû§»á¿´µ½Ò»¸ö¼ÙÒ³Ãæ£¬£¬£¬£¬£¬£¬¾Ý³ÆÀ´×Ô Google Play£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Íê³É¸üÐÂËùÐè²Ù×÷µÄÏêϸ˵Ã÷¡£¡£¡£¡£¡£¡£
https://meterpreter.org/new-antidot-trojan-masquerades-as-google-play-update-steals-banking-data/


¾©¹«Íø°²±¸11010802024551ºÅ