Ô½ÄϺڿÍ×éÖ¯°²ÅÅPXA Stealer£¬£¬£¬£¬£¬£¬ £¬Õë¶ÔÅ·ÑÇÕþ¸®½ÌÓý»ú¹¹

Ðû²¼Ê±¼ä 2024-11-19

1. Ô½ÄϺڿÍ×éÖ¯°²ÅÅPXA Stealer£¬£¬£¬£¬£¬£¬ £¬Õë¶ÔÅ·ÑÇÕþ¸®½ÌÓý»ú¹¹


11ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬ £¬Ò»ÃûÉæÏÓÓëÔ½ÄÏÓйصÄÍþвÐÐΪÕßʹÓÃÃûΪPXA StealerµÄÐÂÐÍPython¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ £¬Õë¶ÔÅ·ÖÞºÍÑÇÖÞÕþ¸®¼°½ÌÓý»ú¹¹ÌᳫÐÅÏ¢ÇÔÈ¡»î¶¯¡£¡£ ¡£¸Ã¶ñÒâÈí¼þÄܽâÃÜä¯ÀÀÆ÷Ö÷ÃÜÂ룬£¬£¬£¬£¬£¬ £¬ÇÔÈ¡ÔÚÏßÕË»§Æ¾Ö¤¡¢²ÆÎñÐÅÏ¢¡¢ä¯ÀÀÆ÷cookieµÈÃô¸ÐÐÅÏ¢¡£¡£ ¡£¹¥»÷Á´Ê¼ÓÚÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬ £¬°üÀ¨ZIPÎļþ¸½¼þ£¬£¬£¬£¬£¬£¬ £¬´¥·¢¼ÓÔØÆ÷ºÍÅú´¦Öóͷ£¾ç±¾£¬£¬£¬£¬£¬£¬ £¬ÔËÐÐPowerShellÏÂÁîÏÂÔØÓÐÓøºÔز¢°²ÅÅÇÔÈ¡³ÌÐò¡£¡£ ¡£PXA StealerÌØÊâ¹Ø×¢ÇÔÈ¡Facebook cookie£¬£¬£¬£¬£¬£¬ £¬ÓÃÓÚÓëFacebook Ads ManagerºÍGraph API½»»¥ÍøÂçÏêϸÐÅÏ¢¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬ÆäËûÇÔÈ¡¶ñÒâÈí¼þÈçStrelaStealer¡¢RECORDSTEALER¡¢Rhadamanthys¡¢Amnesia StealerºÍGlove StealerµÈÒ²ÔÚÒ»Ö±Éú³¤ºÍÓ¿ÏÖ£¬£¬£¬£¬£¬£¬ £¬Ö¤ÊµÎúÇÔÈ¡¶ñÒâÈí¼þµÄÊ¢ÐС£¡£ ¡£Ö»¹ÜÖ´·¨²¿·ÖÆð¾¢¹¥»÷£¬£¬£¬£¬£¬£¬ £¬µ«´ËÀà»î¶¯ÈÔÒ»Á¬±£´æ¡£¡£ ¡£


https://thehackernews.com/2024/11/vietnamese-hacker-group-deploys-new-pxa.html


2. GitHubÏîĿƵÔâ¶ñÒâºóÃŹ¥»÷


11ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬ £¬GitHubÏîÄ¿Õý³ÉΪ¶ñÒâÌá½»ºÍÀ­È¡ÇëÇóµÄÄ¿µÄ£¬£¬£¬£¬£¬£¬ £¬Ö¼ÔÚÏòÕâЩÏîĿעÈëºóÃÅ¡£¡£ ¡£×î½ü£¬£¬£¬£¬£¬£¬ £¬Exo LabsµÄGitHub´æ´¢¿â¾ÍÔâµ½ÁË´ËÀ๥»÷£¬£¬£¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ýÌá½»¿´ËÆÎÞº¦µÄ´úÂë¸ü¸Ä£¬£¬£¬£¬£¬£¬ £¬ÊÔͼÔÚ´úÂëÖÐÖ²ÈëºóÃÅ£¬£¬£¬£¬£¬£¬ £¬ÒÔÔ¶³ÌÖ´ÐжñÒâ´úÂë¡£¡£ ¡£È»¶ø£¬£¬£¬£¬£¬£¬ £¬¸Ã´úÂë¸ü¸Ä²¢Î´±»Åú×¼ºÏ²¢µ½¹Ù·½´æ´¢¿â¡£¡£ ¡£¹¥»÷ÕßʹÓõÄGitHubÕË»§¡°evildojo666¡±ÏÖÒѱ»É¾³ý£¬£¬£¬£¬£¬£¬ £¬¶ø¸ÃÕË»§Ö¸ÏòµÄÇå¾²Ñо¿Ô±Mike BellÔò·ñ¶¨Óë´ËÊÂÓйØ£¬£¬£¬£¬£¬£¬ £¬²¢Éù³Æ×Ô¼ºÔâµ½ÁËð³ä¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬ÉÐÓÐÆäËûÏîĿҲ³ÉΪÁËÀàËÆµÄ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬ £¬°üÀ¨Ê¢ÐеĿªÔ´ÒôƵºÍÊÓÆµÏÂÔØÆ÷¡°yt-dlp¡±¡£¡£ ¡£ÕâЩ¹¥»÷ÊÂÎñÌáÐÑ¿ªÔ´ÏîĿά»¤ÕßÒª×ÐϸÉó²é´«ÈëµÄÀ­È¡ÇëÇ󣬣¬£¬£¬£¬£¬ £¬×ÝÈ»ËüÃÇÀ´×Ô¿´ËÆ¡°ÉÆÒ⡱µÄТ˳Õߣ¬£¬£¬£¬£¬£¬ £¬Ò²Ó¦Ê¹ÓÃ×Ô¶¯»¯¹¤¾ßºÍ´ó×ÚÈ˹¤´úÂëÉó²éÀ´È·±£Çå¾²¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/github-projects-targeted-with-malicious-commits-to-frame-researcher/


3. Maxar Space SystemsÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬ £¬Ô±¹¤Ð¡ÎÒ˽¼ÒÊý¾ÝÔâÇÔÈ¡


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬ £¬ÃÀ¹úÎÀÐÇÖÆÔìÉÌMaxar Space SystemsÔâÊܺڿÍÈëÇÖ£¬£¬£¬£¬£¬£¬ £¬µ¼ÖÂÔ±¹¤Ð¡ÎÒ˽¼ÒÊý¾Ý±»ÇÔÈ¡¡£¡£ ¡£ºÚ¿ÍÔÚ2024Äê10ÔÂ11ÈÕ±»·¢Ã÷ǰÒÑÇÖÈë¹«Ë¾ÍøÂçÔ¼Ò»ÖÜʱ¼ä¡£¡£ ¡£Maxar Space SystemsÊÇÃÀ¹úº½¿Õº½ÌìÒµµÄÖ÷Òª¼ÓÈëÕߣ¬£¬£¬£¬£¬£¬ £¬ÒÑÖÆ×÷80¶à¿ÅÔÚ¹ìÎÀÐÇ£¬£¬£¬£¬£¬£¬ £¬²¢ÎªNASAµÄPsycheʹÃüºÍArtemisÔÂÇò̽Ë÷ÍýÏëÌṩÁËÒªº¦ÊÖÒÕ¡£¡£ ¡£Ð¹Â¶µÄÔ±¹¤ÐÅÏ¢°üÀ¨ÐÕÃû¡¢¼ÒÍ¥µØµã¡¢Éç»á°ü¹ÜºÅÂëµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬ £¬µ«ÒøÐÐÕË»§ÐÅϢδÊÜÓ°Ïì¡£¡£ ¡£ÊÜÓ°ÏìÔ±¹¤¿ÉÏíÊÜIDShieldÉí·Ý±£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬ £¬¶øÇ°ÈÎÔ±¹¤¿ÉÔÚ»®×¼Ê±¼äÄÚ×¢²áIDXµÄÉí·Ý͵ÇÔ±£»£»£»£»¤Ð§ÀÍ¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬ÓÐÐÂÎųƺڿͻ¹Éù³ÆÇÔÈ¡ÁËMaxar Technologies¿ª·¢µÄµØÀí¿Õ¼äÇ鱨ƽ̨GeoHIVEµÄÓû§Èº£¬£¬£¬£¬£¬£¬ £¬µ«Maxar TechnologiesÉÐδ¶Ô´Ë½ÒÏþ̸ÂÛ¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/us-space-tech-giant-maxar-discloses-employee-data-breach/


4. ²©Í¨ÖÒÑÔ£ºVMware vCenter ServerÁ½´óÎó²îÕý±»¹¥»÷ÕßʹÓÃ


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬ £¬²©Í¨¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬ £¬Ö¸³ö¹¥»÷ÕßÕýÔÚʹÓÃVMware vCenter ServerµÄÁ½¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ £¬ÆäÖÐ֮һΪÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2024-38812£©£¬£¬£¬£¬£¬£¬ £¬ÓÉTZLÇå¾²Ñо¿Ö°Ô±ÔÚÖйú2024 Matrix CupºÚ¿Í´óÈüʱ´ú±¨¸æ¡£¡£ ¡£¸ÃÎó²îÔ´ÓÚvCenterµÄDCE/RPCЭÒéʵÏÖÖеĶÑÒç³öÎÊÌ⣬£¬£¬£¬£¬£¬ £¬Ó°ÏìVMware vSphereºÍVMware Cloud FoundationµÈ²úÆ·¡£¡£ ¡£ÁíÒ»¸öÎó²î£¨CVE-2024-38813£©ÎªÈ¨ÏÞÌáÉýÎó²î£¬£¬£¬£¬£¬£¬ £¬Í¬ÑùÓɸÃÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ £¬¹¥»÷Õß¿ÉʹÓÃÌØÖÆÍøÂçÊý¾Ý°üÌáÉýÖÁrootȨÏÞ¡£¡£ ¡£²©Í¨È·ÈÏÕâÁ½¸öÎó²îÒѱ»Ê¹Ó㬣¬£¬£¬£¬£¬ £¬²¢ÓÚ9ÔÂÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬ £¬µ«Ëæºó·¢Ã÷CVE-2024-38812µÄ²¹¶¡²¢Î´ÍêÈ«½â¾öÎÊÌ⣬£¬£¬£¬£¬£¬ £¬²¢Ç¿ÁÒ½¨ÒéÖÎÀíÔ±Ó¦ÓÃв¹¶¡¡£¡£ ¡£ÊÜÓ°Ïì¿Í»§Ó¦Á¬Ã¦Ó¦ÓÃ×îиüÐÂÒÔÌá·À¹¥»÷¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬²©Í¨»¹Ðû²¼ÁËÔö²¹Í¨¸æ£¬£¬£¬£¬£¬£¬ £¬Ìṩ¸ü¶àÇå¾²¸üÐÂÐÅÏ¢ºÍ¿ÉÄÜÓ°ÏìÒÑÉý¼¶Óû§µÄÒÑÖªÎÊÌâ¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-vmware-vcenter-server-now-exploited-in-attacks/


5. DocuSignÍøÂç´¹ÂÚÕ©Æ­¼¤Ôö£¬£¬£¬£¬£¬£¬ £¬Ã°³äÃÀÕþ¸®»ú¹¹ÇÔÈ¡Êý¾Ý


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬ £¬DocuSignÍøÂç´¹ÂÚÕ©Æ­ÊýÄ¿½üÆÚ¼¤Ôö98%£¬£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßʹÓÃÐÅÈÎÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬ £¬Ã°³äÃÀ¹úÕþ¸®»ú¹¹ÈçÎÀÉúÓ빫ÖÚЧÀͲ¿(HHS)ºÍÂíÀïÀ¼Öݽ»Í¨²¿(MDOT)µÈ·¢ËÍ´¹ÂÚURL¡£¡£ ¡£ÕâЩ´¹ÂÚURL±»Éè¼Æ³ÉÄ£Äâ¹Ù·½Í¨Ñ¶£¬£¬£¬£¬£¬£¬ £¬Ê¹ÓÃÕæÕýµÄDocuSignÕÊ»§ºÍAPIαװ³ÉÕæÊµÇëÇ󡣡£ ¡£Ò»µ©Ä¿µÄ·­¿ª¶ñÒâÎĵµ£¬£¬£¬£¬£¬£¬ £¬¾Í»á±»ÒªÇóÌṩÃô¸ÐÐÅÏ¢»òÊÚȨڲƭÉúÒâ¡£¡£ ¡£ÓÉÓÚÇëÇó¿´Ëƹٷ½£¬£¬£¬£¬£¬£¬ £¬ÊÕ¼þÈ˸ü¿ÉÄÜδ¾­³¹µ×ÑéÖ¤¾Í×ñÊØÇëÇ󣬣¬£¬£¬£¬£¬ £¬Î£¼°¹«Ë¾Çå¾²¡£¡£ ¡£ÃÀ¹ú¹«Ãñ¡¢Õþ¸®»ú¹¹ºÍÊÐÕþ°ì¹«ÊÒÊÇÕâЩ¹¥»÷µÄÖ÷ҪĿµÄ¡£¡£ ¡£×¨¼Ò½¨ÒéÆóҵʵÑé¶à²ãÇå¾²Õ½ÂÔ£¬£¬£¬£¬£¬£¬ £¬ÓÉÓÚÊܺ¦Õß×ñÕÕµÄÊÇËûÃǽÓÊܹýÅàѵ²¢±»ÆÚÍû×ñÕÕµÄÁ÷³Ì£¬£¬£¬£¬£¬£¬ £¬ÎÊÌâÔÚÓÚÎÞ·¨ÑéÖ¤ÇëÇóȪԴ£¬£¬£¬£¬£¬£¬ £¬ÐèÒªÖØÐÂ˼Á¿ÔõÑùÌṩÊðÃûÇëÇ󣬣¬£¬£¬£¬£¬ £¬²¢¿ÉÄܽÓÄÉǿʢµÄÉí·ÝÑéÖ¤ÒªÁì¡£¡£ ¡£


https://hackread.com/us-govt-agencies-impersonate-docusign-phishing-scams/


6. ÃÀÒûÓÃˮϵͳ´æÍøÂçÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ £¬»òÖÂЧÀÍÖÐÖ¹


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬ £¬ÃÀ¹úÇéÐα£»£»£»£»¤Êð£¨EPA£©¼à²ì³¤°ì¹«ÊÒ£¨OIG£©Ðû²¼µÄб¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬ £¬ÎªÃÀ¹úÔ¼1.1ÒÚÈËÌṩЧÀ͵Ä300¶à¸öÒûÓÃˮϵͳ±£´æÎó²î£¬£¬£¬£¬£¬£¬ £¬¿ÉÄܵ¼ÖÂЧÀÍÖÐÖ¹¡£¡£ ¡£ÆÀ¹Àº­¸Ç1062¸öÒûÓÃˮϵͳ£¬£¬£¬£¬£¬£¬ £¬·¢Ã÷ÆäÖÐËÄ·ÖÖ®Ò»¿ÉÄܳÉΪ¹¥»÷Êܺ¦Õߣ¬£¬£¬£¬£¬£¬ £¬µ¼Ö¹¦Ð§Ëðʧ¡¢¾Ü¾øÐ§À͵ÈÇéÐμ°¿Í»§ÐÅϢй¶¡£¡£ ¡£97¸ö¹©Ë®ÏµÍ³±£´æÑÏÖØºÍ¸ß¶ÈÑÏÖØÎÊÌ⣬£¬£¬£¬£¬£¬ £¬ÁýÕÖÔ¼2700ÍòÈË£»£»£»£»211¸öϵͳÊÜÖжȺ͵ͶÈȱÏÝÓ°Ï죬£¬£¬£¬£¬£¬ £¬ÁýÕÖÔ¼8300ÍòÈË¡£¡£ ¡£OIGÖ¸³ö£¬£¬£¬£¬£¬£¬ £¬Èô¶ñÒâÐÐΪÕßʹÓÃÎó²î£¬£¬£¬£¬£¬£¬ £¬¿ÉÄÜÆÆËðЧÀÍ»òÔì³ÉÎïÀíË𻵡£¡£ ¡£ÆÀ¹ÀÉæ¼°Áè¼Ý75000¸öIPºÍ14400¸öÓòµÄÆÊÎö¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬EPAȱ·¦Ïò¸Ã»ú¹¹×ª´ïÍøÂçÇå¾²ÊÂÎñµÄ±¨¸æÏµÍ³£¬£¬£¬£¬£¬£¬ £¬²¢ÒÀÀµÆäËû»ú¹¹¾ÙÐдËÀ౨¸æ£¬£¬£¬£¬£¬£¬ £¬Í¬Ê±È±·¦ÓëÆäËûÁª°îºÍÖÝÕþ¸®µÄЭµ÷¼Í¼¡£¡£ ¡£´Ëǰ£¬£¬£¬£¬£¬£¬ £¬ÒÑÓÐË®Îñ¹«Ë¾ÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ £¬µ«¹©Ë®Ð§ÀÍδÊÜÓ°Ïì¡£¡£ ¡£½ñÄê5Ô£¬£¬£¬£¬£¬£¬ £¬EPAÔøÖÒÑÔ³¬70%¹©Ë®ÏµÍ³²»Çкϡ¶Çå¾²ÒûÓÃË®·¨¡·£¬£¬£¬£¬£¬£¬ £¬±£´æÑÏÖØÇå¾²ÎÊÌâ¡£¡£ ¡£


https://www.securityweek.com/300-drinking-water-systems-in-us-exposed-to-disruptive-damaging-hacker-attacks/