Mirai½©Ê¬ÍøÂçÀûÓÃNVR¡¢TP-Link ·ÓÉÆ÷Öеķì϶

°ä²¼¹¦·ò 2024-12-25

1. Mirai½©Ê¬ÍøÂçÀûÓÃNVR¡¢TP-Link ·ÓÉÆ÷Öеķì϶


12ÔÂ24ÈÕ £¬Ò»ÖÖеĻùÓÚMiraiµÄ½©Ê¬ÍøÂçÔÚÀûÓÃÉÐδÊÕµ½¸ú×ÙÆ÷±àºÅÇÒδÔÚDigiEver DS-2105 Pro NVRÖн¨²¹µÄÔ¶³Ì´úÂëÖ´Ðзì϶¡£¸Ã»î¶¯Ê¼ÓÚ10Ô £¬ÖØÒªÕë¶ÔÍøÂç¼Ïñ»úºÍ¹Ì¼þ¹ýÆÚµÄTP-Link·ÓÉÆ÷¡£TXOne×êÑÐÔ±Ta-Lun YenÈ¥ÄêÔÚDefCamp°²È«»áÒéÉÏչʾÁËÆäÖÐÒ»¸ö·ì϶ £¬Ó°ÏìÁ˶ą̀DVRÉ豸¡£AkamaiµÄ×êÑÐÈËÔ±¹Û²ìµ½ £¬Ö»¹Ü¸Ã½©Ê¬ÍøÂçÔÚ11ÔÂÖÐÑ®ÆðÍ·ÀûÓô˷ì϶ £¬µ«Ö¤¾ÝÅú×¢Æä»î¶¯ÖÁÉÙ´Ó9ÔÂÒÑÆðÍ·¡£³ýÁËDigiEver·ì϶ £¬ÐµÄMirai±äÖÖ»¹Õë¶ÔTP-LinkµÄCVE-2023-1389·ì϶ºÍTeltonika RUT9XX·ÓÉÆ÷µÄCVE-2018-17532·ì϶¡£Õë¶ÔDigiEver NVRµÄ¹¥»÷ͨ¹ýÔ¶³Ì´úÂëÖ´ÐÐȱµãʵÏÖ £¬ºÚ¿ÍÀûÓÃδÕýÈ·ÑéÖ¤Óû§ÊäÈëµÄURI×¢ÈëºÅÁî £¬´Ó¶ø»ñÈ¡¶ñÒâÈí¼þ¶þ½øÔìÎļþ²¢½«É豸ÄÉÈë½©Ê¬ÍøÂç¡£Ò»µ©É豸±»¹¥»÷ £¬¾Í»áÓÃÓÚÉ¢²¼Ê½»Ø¾ø·þÎñ¹¥»÷»ò´«²¼µ½ÆäËûÉ豸¡£ÐµÄMirai±äÖÖѡȡXORºÍChaCha20¼ÓÃÜ £¬Ö§³Ö¶àÖÖϵͳ¼Ü¹¹¡£AkamaiÖ¸³ö £¬Ö»¹Ü¸´ÔÓ½âÃܲ½Öè²»ÐÂÏÊ £¬µ«ÏÔʾMirai½©Ê¬ÍøÂçÔËÓªÉÌÔÚÕ½ÊõºÍ¼¼ÊõÉϲ»ÐݽøÈ¡¡£


https://www.bleepingcomputer.com/news/security/new-botnet-exploits-vulnerabilities-in-nvrs-tp-link-routers/


2. ClopÀÕË÷Èí¼þÍÅ»ïÀûÓÃCleoÁãÈÕ·ì϶ÌáÒéÐÂÀÕË÷¹¥ÊÆ


12ÔÂ24ÈÕ £¬ClopÀÕË÷Èí¼þÍÅ»ï½üÆÚ¶ÔÆäCleoÊý¾Ý͵ÇÔ¹¥»÷µÄÊܺ¦Õß·¢³öÁËÀÕË÷֪ͨ £¬ÒªÇó66¼Ò¹«Ë¾ÔÚ48Ó×ʱÄÚÏìÓ¦ÆäÒªÇó £¬²»È»½«Åû¶ÕâЩ¹«Ë¾µÄÈ«Ãû¡£Clopͨ¹ý°µÍøÃÅ»§Ö±½ÓÁªÏµÕâЩ¹«Ë¾ £¬²¢Ìṩ°²È«Ì¸ÌìÆµÂ·Á´½ÓºÍµç×ÓÓʼþµØÖ·½øÐÐÊê½ðÖ§¸¶½»Éæ¡£Õâ´Î¹¥»÷ÀûÓÃÁËCleo LexiCom¡¢VLTransferºÍHarmony²úÆ·ÖеÄÁãÈÕ·ì϶£¨CVE-2024-50623£© £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÖ´Ðв»ÊÜÏ޶ȵÄÎļþÉÏ´«ºÍÏÂÔØ £¬µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£Clop´ÓÇ°Ò²ÔøÀûÓÃÆäËûƽ̨µÄÁãÈÕ·ì϶½Ó¼û¹«Ë¾ÍøÂç¡£¹©¸øÉÌÒÑÌṩ½¨¸´·¨Ê½ £¬µ«ÖÒ¸æ³ÆºÚ¿Í¿ÉÄÜÀûÓøý¨¸´·¨Ê½ÔÚÊÜϰȾµÄÍøÂçÉÏ´ò¿ª·´Ïòshell¡£Clop»¹°ä·¢½«É¾³ýÒÔǰ¹¥»÷µÄÊý¾Ý £¬ÒÔרһÓÚÐÂÒ»ÂÖµÄÀÕË÷»î¶¯¡£Ä¿Ç°Éв»Ã÷ÏÔ¾ßÌåÓм¸¶à¹«Ë¾Êܵ½ÁËClop×îй¥»÷µÄÍþв £¬µ«CleoÈí¼þÒѱ»È«Çò³¬¹ý4000¼Ò×é֯ʹÓá£


https://www.bleepingcomputer.com/news/security/clop-ransomware-is-now-extorting-66-cleo-data-theft-victims/


3. Postman Workspacesй¶30000¸öAPIÃÜÔ¿ºÍÃô¸ÐÁîÅÆ


12ÔÂ24ÈÕ £¬CloudSEKµÄTRIADÍŶӷ¢ÏÖ £¬ÒòÀÄÓÃPostman Workspaces £¬´óÁ¿Ãô¸ÐÊý¾ÝÃæ¶Ôй¶·çÏÕ¡£ÔÚΪÆÚÒ»ÄêµÄµ÷²éÖÐ £¬×êÑÐÈËÔ±·¢ÏÖ³¬¹ý30,000¸ö¿É¹«¿ª½Ó¼ûµÄPostman Workspacesй¶ÁËAPIÃÜÔ¿¡¢ÁîÅÆºÍÖÎÀíԱʹ´¦µÈÃô¸ÐÐÅÏ¢ £¬Éæ¼°GitHub¡¢SlackºÍSalesforceµÈƽ̨ £¬Ó°ÏìÁËÔ̺¬Ò½ÁƱ£½¡¡¢»î¶¯·þ×°ºÍ½ðÈÚ·þÎñÔÚÄڵĶà¸öÐÐÒµ¡£Ð¹Â¶µÄÔ­ÒòÖØÒªÔ̺¬½Ó¼ûÅäÖÃÃýÎó¡¢´¿Îı¾´æ´¢ÒÔ¼°Õä²ØÆ·µÄ¹«¿ª¹²Ïí¡£CloudSEKÖ¸³ö £¬ÕâЩй¶¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡¢Î´¾­ÊÚȨµÄϵͳ½Ó¼ûÒÔ¼°ÍøÂç´¹µöºÍÉç»á¹¤³Ì¹¥»÷µÄÔö³¤¡£ÎªÈ·±£Êý¾Ý°²È« £¬×é֯ӦʹÓû·¾³±äÁ¿¡¢ÂÖ»»ÁîÅÆ¡¢Ñ¡È¡°ÂÃØÖÎÀí¹¤¾ßµÈ´ëÊ©¡£CloudSEKÒÑÏòÊÜÓ°ÏìµÄ×éÖ¯»ã±¨ÁË´óÎÞÊýÊÂÎñ £¬²¢¶½´Ù×éÖ¯²ÉÈ¡¸ü¿¿µÃסµÄ°²È«´ëÊ©¡£´Ë±í £¬PostmanÒ²Ö´ÐÐÁ˰ÂÃØ±£»¤Õþ²ß £¬ÒÔÔ¤·ÀÃô¸ÐÊý¾ÝÔÚ¹«¹²¹¤×÷ÇøÖж³ö¡£


https://hackread.com/postman-workspaces-leak-api-keys-sensitive-tokens/


4. Å·ÖÞº½Ìì¾Ö¹Ù·½É̵êÔâºÚ¿Í¹¥»÷ £¬ÇÔÈ¡¿Í»§Ö§¸¶ÐÅÏ¢


12ÔÂ24ÈÕ £¬Å·ÖÞº½Ìì¾ÖµÄ¹Ù·½ÍøÉÏÉ̵ê½üÆÚÔâµ½ºÚ¿Í¹¥»÷ £¬ºÚ¿Íͨ¹ý¼ÓÔØÒ»¶ÎJavaScript´úÂë £¬ÔÚ½áÕËʱÌìÉúÒ»¸öÐéαµÄStripeÖ§¸¶Ò³Ãæ £¬´Ó¶øÍøÂç¿Í»§ÐÅÏ¢ £¬Ô̺¬Ö§¸¶¿¨Êý¾Ý¡£Å·ÖÞº½Ìì¾Ö£¨ESA£©µÄÔ¤Ë㳬¹ý100ÒÚÅ·Ôª £¬ÆäʹÃüÊÇͨ¹ýÅàѵÓԱÒÔ¼°½¨ÔìÓÃÓÚË÷ÇóÓîÖæ°ÂÃØµÄ»ð¼ýºÍÎÀÐÇÀ´À©´óÌ«¿Õ»î¶¯µÄ¼«ÏÞ¡£¸ÃÉ̵êĿǰÎÞ·¨Ê¹Óà £¬²¢ÏÔʾ¡°ÁÙʱÍÑÀë¹ì·¡±µÄÐÂÎÅ¡£µç×ÓÉÌÎñ°²È«¹«Ë¾Sansec°ÑÎȵ½ÁËÕâÒ»¶ñÒâ¾ç±¾ £¬²¢ÖÒ¸æ³Æ¸ÃÉ̵êËÆºõÓëÅ·ÖÞº½Ìì¾Ö£¨ESA£©ÏµÍ³¼¯³É £¬¿ÉÄܶÔÔ±¹¤×é³É·çÏÕ¡£Í¬Ê± £¬ÍøÂçÀûÓð²È«¹«Ë¾Source Defense ResearchҲ֤ʵÁËSansecµÄµ÷²éÁ˾Ö¡£ÔÚ±»BleepingComputerѯÎÊÓйØÕâ´ÎÈëÇֵľßÌåÐÅϢʱ £¬ESA°µÊ¾¸ÃÉ̵겢²»ÍйÜÔÚÆä»ù´¡ÉèÊ©ÉÏ £¬Ò²²»ÖÎÀíÆäÉϵÄÊý¾Ý¡£Í¨¹ýwhois²éÎÊÄܹ»È·ÈÏ £¬¸ÃÉ̵êµÄÓòÃûºÍÁªÏµÊý¾ÝÓëESAµÄ¹Ù·½ÓòÃû·ÖÆç £¬ÇÒÁªÏµÊý¾ÝÒѱ»É¾³ýÒÔ±£»¤ÒþÖÔ¡£


https://www.bleepingcomputer.com/news/security/european-space-agencys-official-store-hacked-to-steal-payment-cards/


5. PyPIÏÖ¶ñÒâPythonÈí¼þ°üÇÔÈ¡Óû§Êý¾Ý


12ÔÂ24ÈÕ £¬Fortinet FortiGuard LabµÄAI¼ì²âϵͳ½üÆÚ·¢ÏÖÁËÁ½¸öÔÚPythonÈí¼þ°üË÷Òý(PyPI)ÉϵĶñÒâPythonÈí¼þ°ü£ºZebo-0.1.0ºÍCometlogger-0.1¡£ÕâЩ¶ñÒâÈí¼þͨ¹ý¼üÅ̼ͼ¡¢½ØÍ¼ºÍÐÅϢй¶µÈ¼¿Á©ÇÔÈ¡Óû§Ãô¸ÐÊý¾Ý £¬²¢ÀûÓûìºÏ¼¼ÊõÌӱܼì²â¡£Zebo-0.1.0ÀûÓÃpynputºÍImageGrabµÈ¿â¼Í¼°´¼üºÍ½ØÈ¡ÆÁÄ»½ØÍ¼ £¬½«Ãô¸ÐÐÅϢй¶µ½Ô¶³Ì·þÎñÆ÷ £¬²¢ÔÚϵͳ³ÁÆôʱ³ÁÐÂÖ´ÐÐÒÔÈ·Î¬ÓÆ¾Ã½ÚÔì¡£Cometlogger-0.1ÔòרһÓÚÐÅÏ¢ÇÔÈ¡ºÍÓÆ¾Ã´æÔÚ £¬Õë¶Ô¶à¸öÉ罻ƽ̨ÇÔÈ¡ÁîÅÆ¡¢ÃÜÂëºÍÕÊ»§ÐÅÏ¢ £¬²¢Ñ¡È¡·´Ðé¹¹»ú¼ì²â¼¼ÊõºÍ¶¯Ì¬ÎļþÅú¸ÄÖ°ÄÜ¡£ÕâЩ¶ñÒâÈí¼þ°ü¶ÔËùÓÐÄܹ»×°ÖÃPyPIÈí¼þ°üµÄƽ̨×é³É³Á´óÒþÖԺͰ²È«·çÏÕ £¬·À±¸ÕâЩÍþв±ØÒª¶Ï¿ª»¥ÁªÍøÏνӡ¢¸ôÀëÊÜϰȾϵͳ¡¢Ê¹Ó÷À²¡¶¾Èí¼þÒÔ¼°ÔÚ±ØÒªÊ±³ÁÐÂÌåʽ»¯ÏµÍ³¡£PyPIµÄ·½±ãÐÔÅã°é×Å·çÏÕ £¬¿ª·¢ÈËÔ±±ØÒªÎ¬³Ö¾¯Ìè £¬Ô¤·À×°ÖöñÒâÈí¼þ°ü¡£


https://hackread.com/python-malware-zebo-cometlogger-stealing-user-data/


6. ³¯Ïʺڿ͹¥»÷DMM Bitcoin £¬ÇÔÈ¡3.08ÒÚÃÀÔª¼ÓÃÜÇ®±Ò


12ÔÂ24ÈÕ £¬³¯ÏʺڿÍ×éÖ¯¡°TraderTraitor¡±£¨Ò²±»×·×ÙΪJade Sleet¡¢UNC4899ºÍSlow Pisces£©ÔÚ½ñÄê5Ô¶ÔÈÕ±¾DMM BitcoinÂòÂôËùÌáÒé¹¥»÷ £¬³É¹¦ÇÔÈ¡Á˼ÛÖµ3.08ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£Õâ´Î¹¥»÷ʼÓÚ3ÔÂÏÂÑ® £¬ºÚ¿Í¼Ù×°³ÉLinkedInÉϵĺϷ¨ÕÐÆ¸ÈËÔ± £¬½Ó´¥²¢ÓÕµ¼ÈÕ±¾ÆóÒµ¼ÓÃÜÇ®±ÒÇ®°üÈí¼þ¹«Ë¾GincoµÄÒ»ÃûÔ±¹¤ÏÂÔØ²¢Ö´ÐжñÒâPython´úÂë £¬½ø¶øÉøÈëµ½Ginco²¢ºáÏòÒÆ¶¯µ½DMM¡£FBIÖ¸³ö £¬¹¥»÷ÕßÀûÓûỰcookieÐÅÏ¢¼ÙÒâÊÜϰȾԱ¹¤ £¬»ñÈ¡Gincoδ¼ÓÃÜͨѶϵͳµÄ½Ó¼ûȨÏÞ £¬²¢×îÖÕÔÚ5ÔÂÏÂÑ®°Ñ³ÖDMMÔ±¹¤µÄºÏ·¨ÂòÂôÒªÇó £¬µ¼Ö¾޶îËðʧ¡£×Ô2022ÄêÒÔÀ´ £¬TraderTraitorÒ»Ïò»îÔ¾ÓÚÇø¿éÁ´ÁìÓò £¬Ê¹ÓÃÐéαÀûÓ÷¨Ê½½øÐÐÉç»á¹¤³Ì¹¥»÷ £¬ÃÀ¹úµ±¾ÖÒ»ÏòÔÚÇ×êǼලÆä»î¶¯¡£


https://www.bleepingcomputer.com/news/security/fbi-links-north-korean-hackers-to-308-million-crypto-heist/