Ñо¿Ö°Ô±¼ì²âµ½241¸ö¶ñÒânpmºÍPyPI°ü·Ö·¢ÍÚ¿óÈí¼þ

Ðû²¼Ê±¼ä 2022-08-22
1¡¢Ñо¿Ö°Ô±¼ì²âµ½241¸ö¶ñÒânpmºÍPyPI°ü·Ö·¢ÍÚ¿óÈí¼þ

      

¾ÝýÌå8ÔÂ19ÈÕ±¨µÀ£¬£¬ £¬ÉÏÖÜÒÑ·¢Ã÷ÁËÖÁÉÙ241¸ö¶ñÒâµÄPyPIºÍnpm°ü£¬£¬ £¬ÕâЩ°ü»áÔÚѬȾLinux×°±¸ºó»á×°ÖöñÒâÍÚ¿óÈí¼þ¡£¡£¡£¡£¡£¡£ÉÏÖÜÈý£¬£¬ £¬Ñо¿Ö°Ô±¹ûÕæÁËÔÚPyPIÉÏ·¢Ã÷µÄ33¸öÏîÄ¿£¬£¬ £¬¿ÉÔÚѬȾϵͳºóÆô¶¯¿ªÔ´ÃÅÂÞ±Ò¼ÓÃÜ¿ó¹¤XMRig¡£¡£¡£¡£¡£¡£ÔÚÕâЩ°ü±»É¾³ýºó£¬£¬ £¬Ñо¿Ö°Ô±ÓÖ·¢Ã÷ÁËÁíÒ»×é¾ßÓÐÏàͬpayloadµÄ22¸ö°ü¡£¡£¡£¡£¡£¡£SonatypeÔÚ8ÔÂ19ÈÕÅû¶ÁË186¸önpmÓòÃûÇÀ×¢¶ñÒâ°ü£¬£¬ £¬ËüÃǾùÀ´×ÔÄäÃûÕÊ»§17b4a931£¬£¬ £¬Ä£ÄâÁ˳£ÓõÄhttp-errors JavaScript¿â¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Æ¾Ö¤ÊÖÒÕÖ¸±êÍÆ¶Ï£¬£¬ £¬Õâ241¸ö¶ñÒâ°üÓÉͳһ¹¥»÷ÕßÐû²¼¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/241-npm-and-pypi-packages-caught-dropping-linux-cryptominers/


2¡¢ÐÂľÂíGrandoreiroÖ÷ÒªÕë¶ÔÄ«Î÷¸çºÍÎ÷°àÑÀµÈ¹ú¼Ò

      

8ÔÂ18ÈÕ£¬£¬ £¬Zscaler ThreatLabzÅû¶ÁËÐÂľÂíGrandoreiroÕë¶ÔÄ«Î÷¸çºÍÎ÷°àÑÀµÈ¹ú¼ÒµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖÁÉÙ×Ô2017ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬ £¬´Ë´Î¹¥»÷ÓÚ2022Äê6ÔÂ×îÏÈ£¬£¬ £¬²¢ÇÒÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£¹¥»÷Õßαװ³ÉÀ´×ÔÄ«Î÷¸ç×ÜÉó²é³¤°ì¹«ÊÒ»òÎ÷°àÑÀ¹«¹²²¿£¬£¬ £¬×îÖÕpayloadʹÓôÓASUSTEK͵À´µÄÖ¤ÊéÊðÃû£¬£¬ £¬Í¨¹ý¶þ½øÖÆÌî³äµÄÒªÁ콫¾ÞϸÅòÕ͵½400MB£¬£¬ £¬À´ÈƹýɳÏäÆÊÎö¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬×îеÄGrandoreiro±äÌåÐÂÔöÁËʹÓÃDGA¾ÙÐÐC2ͨѶµÄ¹¦Ð§£¬£¬ £¬ÕâʹµÃ·¢Ã÷¶ñÒâÈí¼þµÄ»ù´¡ÉèÊ©²¢½«Æä²ð³ý±äµÃ¸üÄÑ¡£¡£¡£¡£¡£¡£


https://www.zscaler.com/blogs/security-research/grandoreiro-banking-trojan-new-ttps-targeting-various-industry-verticals


3¡¢WPÍøÕ¾±»ÈëÇÖºóÏÔʾαÔìCloudflare¾¯±¨²¢×°ÖöñÒâÈí¼þ

      

8ÔÂ18ÈÕ£¬£¬ £¬Sucuri³ÆWordPressÍøÕ¾±»ÈëÇÖºó»áÏÔʾαÔìµÄCloudflare DDoS± £»£»£» £»£»¤Ò³Ã棬£¬ £¬À´·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬ £¬¹¥»÷Õß»áÈëÇÖÄ¿µÄWordPressÍøÕ¾²¢Ö²ÈëÒ»¸ö»ìÏýµÄJavaScript payload£¬£¬ £¬Ëü¿ÉÏÔʾһ¸öαÔìµÄCloudflare DDoS± £»£»£» £»£»¤½çÃæ¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬ £¬Ä¿µÄ»á±»ÒªÇóÏÂÔØÎļþsecurity_install.iso£¬£¬ £¬Æä±»ÐÎÃ²ÎªÈÆ¹ýDDoSÑéÖ¤ËùÐèµÄ¹¤¾ß¡£¡£¡£¡£¡£¡£·­¿ª¸ÃÎļþ»á¿´µ½security_install.exe£¬£¬ £¬Ö´ÐиÃEXEÎļþ½«×°ÖöñÒâÈí¼þNetSupport RATºÍRaccoon Stealer¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/wordpress-sites-hacked-with-fake-cloudflare-ddos-alerts-pushing-malware/


4¡¢Proofpoint·¢Ã÷TA558¹¥»÷À­¶¡ÃÀÖÞÂùݺÍÂÃÓÎÐÐÒµ

      

ProofpointÔÚ8ÔÂ18ÈÕÐû²¼Á˹ØÓÚºÚ¿ÍÍÅ»ïTA558µÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£TA558¿ÉÄÜÊÇÒ»¸ö³öÓÚ¾­¼ÃÄîÍ·µÄСÐͺڿÍÍŻ£¬ £¬×Ô2018ÄêÒÔÀ´×îÏÈ»îÔ¾£¬£¬ £¬Ö÷ÒªÕë¶ÔλÓÚÀ­¶¡ÃÀÖÞµØÇøµÄÂùݺÍÂÃÓÎÐÐÒµ£¬£¬ £¬ÓÐʱҲ»áÕë¶ÔÎ÷Å·ºÍ±±ÃÀµØÇø¡£¡£¡£¡£¡£¡£×î½üµÄ»î¶¯ÖУ¬£¬ £¬¹¥»÷Õß´ÓʹÓðüÀ¨ºêµÄMicrosoft Office¸½¼þ£¬£¬ £¬×ª¶øÊ¹ÓÃURLºÍISOÎļþÀ´ÊµÏÖ³õʼѬȾ£¬£¬ £¬´Ë¾Ù¿ÉÄÜÊǶÔ΢Èí¾öÒéĬÈÏ×èÖ¹´ÓÍøÂçÏÂÔØÎļþÖеĺê×ö³öµÄ»ØÓ¦¡£¡£¡£¡£¡£¡£


https://www.proofpoint.com/us/blog/threat-insight/reservations-requested-ta558-targets-hospitality-and-travel


5¡¢°®É³ÄáÑÇÕþ¸®Éù³ÆÒÑ×èÖ¹KillnetÍÅ»ï¶ÔÆäµÄDDoS¹¥»÷

      

¾Ý8ÔÂ19ÈÕ±¨µÀ£¬£¬ £¬°®É³ÄáÑÇÕþ¸®Éù³Æ×Ô2007ÄêÒÔÀ´×îÑÏÖØµÄDDoS¹¥»÷¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷¼ÈÕë¶Ô¹«¹²»ú¹¹£¬£¬ £¬Ò²Õë¶Ô˽Ӫ¹«Ë¾£¬£¬ £¬ºÚ¿Í×éÖ¯KillnetÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬Õþ¸®Ê×ϯÐÅÏ¢¹ÙÅúÅÐÁ˸Ã×éÖ¯¹ØÓÚ200¶à¸öÍøÕ¾Òѱ»²é·âµÄ˵·¨£¬£¬ £¬²¢ÌåÏÖE-EstoniaÒÑÆô¶¯²¢ÔËÐУ¬£¬ £¬Ð§ÀÍûÓÐÖÐÖ¹¡£¡£¡£¡£¡£¡£°®É³ÄáÑÇÅÌËã»úÓ¦¼±ÏìӦС×é͸¶£¬£¬ £¬°üÀ¨¾¯Ô±ºÍÕþ¸®ÔÚÄڵĵط½Õþ¸®µÄÍøÕ¾ÒÔ¼°Ò»¼ÒÎïÁ÷¹«Ë¾Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/134560/cyber-warfare-2/estonia-blocked-cyberattacks-killnet.html 


6¡¢MicrosoftÅû¶ChromeOS×é¼þÖÐÄÚ´æËð»µÎó²îµÄϸ½Ú

      

MicrosoftÔÚ8ÔÂ19ÈÕÐû²¼Á˹ØÓÚChromeOS×é¼þÖÐÄÚ´æËð»µÎó²îµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2022-2587£¬£¬ £¬CVSSÆÀ·ÖΪ9.8£¬£¬ £¬¿É±»ÓÃÀ´Ö´ÐÐDoS£¬£¬ £¬»òÕßÔÚ¼«¶ËÇéÐÎÏÂÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚGoogle ChromeÒôƵЧÀÍÆ÷£¬£¬ £¬¿É±»Ô¶³Ì¹¥»÷Õßͨ¹ýÌØÖÆµÄÒôƵԪÊý¾ÝʹÓᣡ£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬¸ÃÎó²îÒѱ»ÐÞ¸´£¬£¬ £¬ÉÐδ±»ÔÚҰʹÓᣡ£¡£¡£¡£¡£


https://www.microsoft.com/security/blog/2022/08/19/uncovering-a-chromeos-remote-memory-corruption-vulnerability/