¹È¸èÐÞ¸´ÆäÔÆÆ½Ì¨ÖпÉÒþ²Ø¶ñÒâÈí¼þµÄGhostTokenÎó²î
Ðû²¼Ê±¼ä 2023-04-241¡¢¹È¸èÐÞ¸´ÆäÔÆÆ½Ì¨ÖпÉÒþ²Ø¶ñÒâÈí¼þµÄGhostTokenÎó²î
¾ÝýÌå4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¹È¸èÔÆÆ½Ì¨(GCP)Öб£´æÒ»¸öGhostTokenÎó²î£¬£¬£¬£¬£¬£¬¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâÓ¦Óøü¸ÄΪ²»¿É¼ûÇÒ²»¿Éɾ³ý¡£¡£¡£¡£¡£¡£Astrix SecurityÓÚ2022Äê6Ô²¢Ïò¹È¸è±¨¸æÁËÕâÒ»Îó²î£¬£¬£¬£¬£¬£¬¹È¸èÔÚ2023Äê4ÔÂÐû²¼Á˲¹¶¡¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿É±»¹¥»÷ÕßÓÃÀ´Í¨¹ý½«ÒÑÊÚȨµÄµÚÈý·½Ó¦ÓÃת»»Îª¶ñÒâľÂíÓ¦Ó㬣¬£¬£¬£¬£¬´Ó¶ø»ñµÃÄ¿µÄGoogleÕÊ»§µÄÓÀÊÀÇÒ²»¿ÉÒÆ³ýµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬È»ºóй¶ĿµÄµÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£Õâ¿ÉÄܰüÀ¨´æ´¢ÔÚGmail¡¢Drive¡¢DocsºÍPhotosµÈ¹È¸èÓ¦ÓÃÖеÄÊý¾Ý¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ghosttoken-gcp-flaw-let-attackers-backdoor-google-accounts/
2¡¢SymantecÅû¶Õë¶ÔÎ÷Å·»ù´¡ÉèÊ©µÄX_Trader¹©Ó¦Á´¹¥»÷
4ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬SymantecÅû¶ÁËÕë¶ÔÎ÷Å·Òªº¦»ù´¡ÉèÊ©×éÖ¯µÄX_Trader¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£¡£µ¼ÖÂÉϸöÔÂ3CXÇå¾²ÊÂÎñµÄX_TraderÈí¼þ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬»¹Ó°ÏìÁËλÓÚÃÀ¹úºÍÅ·ÖÞµÄÄÜÔ´ÁìÓòµÄÁ½¸öÒªº¦»ù´¡ÉèÊ©×éÖ¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃľÂí»¯X_Trader×°ÖóÌÐò£¬£¬£¬£¬£¬£¬½«VEILEDSIGNAL¶à½×¶ÎÄ£¿£¿£¿£¿£¿£¿£¿é»¯ºóÃÅ×°Öõ½Ä¿µÄϵͳÉÏ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔÖ´ÐжñÒâshellcode»ò½«Í¨Ñ¶Ä£¿£¿£¿£¿£¿£¿£¿é×¢ÈëÔÚ±»¹¥»÷ϵͳÉÏÔËÐеÄChrome¡¢Firefox»òEdgeÀú³Ì¡£¡£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬ÉÐÓÐÁ½¸öÉæ¼°½ðÈÚÉúÒâµÄ×éÖ¯Ò²Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain
3¡¢Ç°CFPBÔ±¹¤½«Áè¼Ý25ÍòÏûºÄÕßµÄÐÅϢת·¢µ½Ð¡ÎÒ˽¼ÒÓÊÏä
¾Ý4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÃÀ¹úÏûºÄÕß½ðÈÚ±£»£»£»£»£»£»¤¾Ö(CFPB)Åû¶ÁËÒ»ÆðÉæ¼°256000ÈËÐÅÏ¢µÄй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£CFPBµÄÔ±¹¤Í¸Â¶£¬£¬£¬£¬£¬£¬ËûÃÇ·¢Ã÷һǰԱ¹¤ÓÃ14·â²î±ðµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬½«Ô¼Äª25.6ÍòÃûÏûºÄÕߵļͼºÍԼĪ50¼Ò»ú¹¹µÄî¿ÏµÐÅϢת·¢µ½Ð¡ÎÒ˽¼Òµç×ÓÓʼþÕË»§¡£¡£¡£¡£¡£¡£ÕâÃûÔ±¹¤Òѱ»ÆÈÁîɾ³ýÕâЩµç×ÓÓʼþ²¢Ìṩ֤¾Ý֤ʵËüÃÇÒѱ»É¾³ý£¬£¬£¬£¬£¬£¬µ«¹Ù·½Ö¤ÊµÕâ¸ÃÔ±¹¤ÉÐδ×ñÊØ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã»ú¹¹ÈÔÔÚÊÓ²ì´ËÊÂÎñ¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/cfpb-employee-sends-consumers-data/
4¡¢ESET·¢Ã÷¶þÊÖÊг¡Öдó×ÚÆóÒµ¼¶ÍøÂç×°±¸°üÀ¨Ãô¸ÐÐÅÏ¢
¾ÝýÌå4ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¶þÊÖÊг¡ÉÏµÄÆóÒµ¼¶ÍøÂç×°±¸°üÀ¨¿É±»ºÚ¿ÍÓÃÀ´ÈëÇÖÆóҵϵͳ»ò»ñÈ¡¿Í»§ÐÅÏ¢µÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£ESETÑо¿Ö°Ô±¹ºÖÃÁË18̨¶þÊÖ½¹µã·ÓÉÆ÷£¬£¬£¬£¬£¬£¬·¢Ã÷ÆäÖÐÒ»°ëÒÔÉÏÄÜÕý³£ÊÂÇéµÄ·ÓÉÆ÷ÈÔÈ»¿ÉÒÔ»á¼ûËùÓÐÉèÖÃÊý¾Ý¡£¡£¡£¡£¡£¡£Ò»Ð©Â·ÓÉÆ÷±£´æÁ˿ͻ§ÐÅÏ¢ºÍÔÊÐíµÚÈý·½ÅþÁ¬µ½ÍøÂçµÄÊý¾Ý£¬£¬£¬£¬£¬£¬ÉõÖÁ°üÀ¨×÷Ϊ¿ÉÐÅ·½ÅþÁ¬µ½ÆäËûÍøÂçµÄƾ֤¡£¡£¡£¡£¡£¡£Æ¾Ö¤Â·ÓÉÆ÷ÖÐϸ½Ú£¬£¬£¬£¬£¬£¬ÆäÖÐһЩ·ÓÉÆ÷´¦ÓÚÍйÜITÌṩÉ̵ÄÇéÐÎÖУ¬£¬£¬£¬£¬£¬ÉÐÓÐһ̨ÉõÖÁÊôÓÚMSSP¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±¹ØÓÚÕâÖÖÇéÐεĽ¨ÒéÊÇ£¬£¬£¬£¬£¬£¬ÕûÀíÉè±¹ØÁ¬ÄÃô¸ÐÊý¾Ý²¢½«Æä»Ö¸´µ½³ö³§Ä¬ÈÏ״̬¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-can-breach-networks-using-data-on-resold-corporate-routers/
5¡¢Unit 42³ÆÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÄ¿³ÊÉÏÉýÇ÷ÊÆ
Unit 42ÔÚ4ÔÂ20ÈÕ͸¶£¬£¬£¬£¬£¬£¬ÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÄ¿³ÊÉÏÉýÇ÷ÊÆ¡£¡£¡£¡£¡£¡£´Ó2022Äê11Ôµ½2023Äê4ÔÂÉÏÑ®£¬£¬£¬£¬£¬£¬ÓëChatGPTÏà¹ØÓòµÄÿÔÂ×¢²áÁ¿ÔöÌíÁË910%£¬£¬£¬£¬£¬£¬Ïà¹ØÇÀ×¢ÓòÃûÔöÌíÁË17818%¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÌìÌìÓжà´ï118¸öÓëChatGPTÓйصĶñÒâURL±»¼ì²âµ½¡£¡£¡£¡£¡£¡£Ñо¿·¢Ã÷¶à¸öÊÔͼð³äOpenAI¹Ù·½ÍøÕ¾µÄ´¹ÂÚURL¡£¡£¡£¡£¡£¡£Í¨³££¬£¬£¬£¬£¬£¬¹¥»÷Õ߻ὨÉèÒ»¸öÓëChatGPT¹ÙÍøºÜÏñµÄÐéÎ±ÍøÕ¾£¬£¬£¬£¬£¬£¬È»ºóÓÕÆÓû§ÏÂÔØ¶ñÒâÈí¼þ»ò¹²ÏíÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://unit42.paloaltonetworks.com/chatgpt-scam-attacks-increasing/
6¡¢FortinetÐû²¼¹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄÆÊÎö±¨¸æ
4ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬FortinetÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ßÓÉKodex¹«Ë¾¿ª·¢£¬£¬£¬£¬£¬£¬Éù³ÆÊÇÒ»¿î½ÌÓý¹¤¾ß¡£¡£¡£¡£¡£¡£ÒÔÿÔÂ59ÃÀÔªµÄ¼ÛÇ®³öÊÛ£¬£¬£¬£¬£¬£¬¾ßÓÐÆß¸ö¹¥»÷Ä£¿£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬°üÀ¨ÀÕË÷Èí¼þ¡¢Æ¾Ö¤ÇÔÈ¡ºÍWindows Defender¡£¡£¡£¡£¡£¡£Ñо¿Åú×¢£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢µØ½«ÆäÓÃ×÷ÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£¡£¡£¡£¡£¡£EvilExtractorµÄ¹¥»÷»î¶¯ÓÚ½ñÄê3ÔÂÏÔÖøÔöÌí£¬£¬£¬£¬£¬£¬Í¨¹ýαװ³ÉÕË»§È·ÈÏÇëÇóµÄ´¹ÂÚÓʼþ¾ÙÐзַ¢£¬£¬£¬£¬£¬£¬´ó´ó¶¼±»¹¥»÷Ä¿µÄλÓÚÅ·ÖÞºÍÃÀ¹ú¡£¡£¡£¡£¡£¡£
https://www.fortinet.com/blog/threat-research/evil-extractor-all-in-one-stealer