ºÚ¿ÍÀÄÓà Amazon ºÍ GitHub °²ÅÅ»ùÓÚ Java µÄ¶ñÒâÈí¼þ
Ðû²¼Ê±¼ä 2024-03-153ÔÂ14ÈÕ£¬£¬£¬ºÚ¿ÍÃé×¼ÕâЩƽ̨ÊÇÓÉÓÚËüÃÇÍйÜ×ÅÃû¹óµÄ×ÊÔ´ºÍÊý¾Ý¡£¡£¡£¡£¡£¡£¡£³öÓÚ¾¼ÃÀûÒæ»òÆäËû²»Á¼ÄîÍ·£¬£¬£¬ºÚ¿ÍÈëÇÖÕâЩƽ̨ÇÔÈ¡Êý¾Ý¡¢°²ÅŶñÒâÈí¼þ»òÌᳫÆäËûÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£FortiGuard ʵÑéÊÒµÄÍøÂçÇå¾²ÆÊÎöʦ·¢Ã÷£¬£¬£¬ºÚ¿ÍÆð¾¢ÀÄÓà Amazon ºÍ GitHub À´°²ÅÅ»ùÓÚ Java µÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£FortiGuard ʵÑéÊÒ·¢Ã÷ÁËÒ»¸öÍøÂç´¹Âڻ£¬£¬£¬ÓÕÆÓû§ÏÂÔØ¶ñÒâ Java ÏÂÔØÆ÷£¬£¬£¬ÆäÄ¿µÄÊÇÈö²¥Ð嵀 VCURMS ºÍ STRRAT RAT¡£¡£¡£¡£¡£¡£¡£ÈËÃÇ·¢Ã÷£¬£¬£¬ÍйÜÔÚ AWS ºÍ GitHub ÉϵĶñÒâÈí¼þÒÑͨ¹ýÉÌÒµ±£»£»£»£»£»¤³ÌÐò¾ÙÐÐÁË»ìÏý¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýʹÓÃÊܺ¦Õß¶Ë×¢ÖØÒþ˽µÄ Proton Mail ЧÀÍ£¬£¬£¬Ê¹Óõç×ÓÓʼþ¾ÙÐÐ C2¡£¡£¡£¡£¡£¡£¡£ÍøÂç´¹ÂÚµç×ÓÓʼþÒýÓÕÊܺ¦Õßµ¥»÷°´Å¥£¬£¬£¬ÏÂÔØ´øÓÐÄ£ºý×Ö·û´®µÄ¶ñÒâ AWS ÍÐ¹Ü JAR ÏÂÔØ³ÌÐò¡£¡£¡£¡£¡£¡£¡£ÏÂÔØÆ÷»ñÈ¡²¢ÔËÐÐÁíÍâÁ½¸ö JAR£¬£¬£¬ÕâЩ JAR ʹÓÃÉÌÒµ¡°Sense Shield Virbox Protector¡±»ìÏýÆ÷£¬£¬£¬²¢¸½ÓÐÊÔÓÃÆÚµ½ÆÚ֪ͨ¡£¡£¡£¡£¡£¡£¡£
https://gbhackers.com/hackers-abuse-amazon-github/
2. ºÚ¿ÍʹÓà Windows SmartScreen Îó²îͶ·Å DarkGate
3ÔÂ13ÈÕ£¬£¬£¬DarkGate ¶ñÒâÈí¼þ²Ù×÷ÌᳫµÄÐÂÒ»²¨¹¥»÷ʹÓÃÏÖÒÑÐÞ¸´µÄ Windows Defender SmartScreen Îó²îÀ´ÈƹýÇå¾²¼ì²é²¢×Ô¶¯×°ÖÃÐéαÈí¼þ×°ÖóÌÐò¡£¡£¡£¡£¡£¡£¡£SmartScreen ÊÇÒ»Ïî Windows Çå¾²¹¦Ð§£¬£¬£¬µ±Óû§ÊµÑéÔËÐÐ´Ó Internet ÏÂÔØµÄÎÞ·¨Ê¶±ð»ò¿ÉÒÉÎļþʱ£¬£¬£¬Ëü»áÏÔʾÖÒÑÔ¡£¡£¡£¡£¡£¡£¡£±»×·×ÙΪ CVE-2024-21412 µÄȱÏÝÊÇ Windows Defender SmartScreen ȱÏÝ£¬£¬£¬ÔÊÐíÌØÖÆµÄÏÂÔØÎļþÈÆ¹ýÕâЩÇå¾²ÖÒÑÔ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ý½¨ÉèÖ¸ÏòÔ¶³Ì SMB ¹²ÏíÉÏÍйܵÄÁíÒ»¸ö .url ÎļþµÄ Windows Internet ¿ì½Ý·½·¨£¨.url Îļþ£©À´Ê¹ÓøÃȱÏÝ£¬£¬£¬Õ⽫µ¼ÖÂ×îÖÕλÖõÄÎļþ×Ô¶¯Ö´ÐС£¡£¡£¡£¡£¡£¡£Î¢ÈíÓÚ 2 ÔÂÖÐÑ®ÐÞ¸´Á˸ÃÎó²î£¬£¬£¬Ç÷ÊÆ¿Æ¼¼Í¸Â¶£¬£¬£¬³öÓÚ¾¼ÃÄîÍ·µÄ Water Hydra ºÚ¿Í×éÖ¯´ËÇ°Ôø ʹÓøÃÎó²î×÷ΪÁãÈÕÎó²î £¬£¬£¬½«Æä DarkMe ¶ñÒâÈí¼þÖ²ÈëÉúÒâÕßµÄϵͳÖС£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-windows-smartscreen-flaw-to-drop-darkgate-malware/#google_vignette
3. HHS ½«ÊÓ²ì UnitedHealth ºÍÕë¶Ô Change Healthcare µÄÀÕË÷¹¥»÷
3ÔÂ14ÈÕ£¬£¬£¬ÃÀ¹úÎÀÉúÓ빫¹²Ð§ÀͲ¿ (HHS) ÕýÔÚ¶ÔÕë¶Ô Change Healthcare µÄÀÕË÷Èí¼þ¹¥»÷Õö¿ªÊӲ죬£¬£¬´Ëǰ¸Ã¹ú¸÷µØÒ½Ôº¡¢ÕïËùºÍÒ©·¿µÄÒ½ÁƱ£½¡ºÍ¼Æ·ÑÓªÒµÒÑÔâÊÜÊýÖܵÄ×ÌÈÅ¡£¡£¡£¡£¡£¡£¡£¸Ã²¿·ÖµÄÃñȨ°ì¹«ÊÒ (OCR)ÖÜÈý½ÒÏþÁËÒ»·âÐÅ£¬£¬£¬Ðû²¼Õö¿ªÊӲ죬£¬£¬Ö÷ÈÎ Melanie Fontes Rainer дµÀ£¬£¬£¬¡°¼øÓÚÕâ´ÎÍøÂç¹¥»÷µÄ¹æÄ£¿£¿£¿ÕǰÑÏÖØ£¬£¬£¬²¢ÇÒΪÁË»¼ÕߺͿµ½¡µÄ×î´óÀûÒæ£¬£¬£¬ËûÃÇÐèÒªÊÓ²ìÕâÒ»ÇéÐΡ±Õչ˻¤Ê¿ÌṩÕß¡£¡£¡£¡£¡£¡£¡£¡± °×¹¬¹ÙÔ±¡¢Ò½ÁÆÐÐÒµ´ú±í¡¢ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿²¿³¤Ôóά¶û¡¤±´ÈûÀ (Xavier Becerra) ºÍ Change Healthcare ĸ¹«Ë¾ÁªºÏ¿µ½¡¼¯ÍÅ (UnitedHealth Group) Ê×ϯִÐйٰ²µÂ³¡¤ÍþµÙ (Andrew Witty) ÕÙ¿ªÁ˾ۻᣬ£¬£¬ÌÖÂÛ½â¾öΣ»£»£»£»£»úÎÊÌâ¡£¡£¡£¡£¡£¡£¡£Fontes Rainer ÌåÏÖ£¬£¬£¬ÊÓ²ì½«ÖØµã¹Ø×¢Êܱ£»£»£»£»£»¤µÄ¿µ½¡ÐÅÏ¢ÊÇ·ñÊܵ½Ë𺦣¬£¬£¬ÒÔ¼° Change Healthcare ºÍ UHG ÊÇ·ñ×ñÊØ¿µ½¡°ü¹ÜÁ÷ͨºÍÔðÈη¨°¸ (HIPAA) ¹æÔò¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/hhs-investigating-unitedhealth-after-ransomware-attack
4. PixPirate Android ¶ñÒâÈí¼þʹÓÃÐÂÕ½ÂÔÒþ²ØÔÚÊÖ»úÉÏ
3ÔÂ13ÈÕ£¬£¬£¬ÊÊÓÃÓÚ Android µÄ×îа汾µÄ PixPirate ÒøÐÐľÂí½ÓÄÉÁËÒ»ÖÖÐÂÒªÁ죬£¬£¬¿ÉÒÔÒþ²ØÔÚÊÖ»úÉÏ£¬£¬£¬Í¬Ê±¼á³Ö»î¶¯×´Ì¬£¬£¬£¬×ÝÈ»ÆäµÎ¹ÜÓ¦ÓóÌÐòÒѱ»É¾³ý¡£¡£¡£¡£¡£¡£¡£PixPirate ÊÇÒ»ÖÖÐ嵀 Android ¶ñÒâÈí¼þ£¬£¬£¬ÓÉ Cleafy TIR ÍŶÓÉϸöÔÂÊ״μͼ£¬£¬£¬Õë¶ÔÀ¶¡ÃÀÖÞÒøÐС£¡£¡£¡£¡£¡£¡£Ö»¹Ü Cleafy Ö¸³öÊÇÒ»¸öµ¥¶ÀµÄÏÂÔØÓ¦ÓóÌÐòÆô¶¯Á˸öñÒâÈí¼þ£¬£¬£¬µ«¸Ã±¨¸æ²¢Î´ÉîÈë̽ÌÖÆäÁ¢ÒìµÄÒþ²Ø»ò³¤ÆÚ»úÖÆ£¬£¬£¬»òÕßÕâЩ»úÖÆÊÇ×î½ü²ÅÒýÈëµÄ¡£¡£¡£¡£¡£¡£¡£IBM µÄÒ»·Ýб¨¸æÚ¹ÊÍ˵£¬£¬£¬Óë¶ñÒâÈí¼þÊÔͼÒþ²ØÆäͼ±êµÄ±ê×¼Õ½ÂÔ£¨ÔÚ Android 9 ¼°ÒÔϰ汾ÖпÉÄܱ£´æÕâÖÖÕ½ÂÔ£©Ïà·´£¬£¬£¬PixPirate ²»Ê¹ÓÃÆô¶¯Æ÷ͼ±ê¡£¡£¡£¡£¡£¡£¡£ÕâʹµÃ¶ñÒâÈí¼þÄܹ»ÔÚËùÓÐ×îÐ嵀 Android °æ±¾£¨×î¸ß°æ±¾ 14£©Öмá³ÖÒþ²Ø×´Ì¬¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/pixpirate-android-malware-uses-new-tactic-to-hide-on-phones/
5. ChatGPT ²å¼þÎó²î¿ÉÄÜ̻¶Óû§ÕÊ»§Êý¾Ý
3ÔÂ13ÈÕ£¬£¬£¬API Çå¾²¹«Ë¾ Salt Security ¶Ô ChatGPT ²å¼þ¾ÙÐÐÁËÆÊÎö£¬£¬£¬·¢Ã÷Á˶àÖÖÀàÐ͵ÄÎó²î£¬£¬£¬ÕâЩÎó²î¿ÉÄܱ»Ê¹ÓÃÀ´»ñȡDZÔÚµÄÃô¸ÐÊý¾Ý²¢½ÓÊܵÚÈý·½ÍøÕ¾ÉϵÄÕÊ»§¡£¡£¡£¡£¡£¡£¡£ChatGPT ²å¼þʹÓû§Äܹ»»á¼û×îÐÂÐÅÏ¢£¨¶ø²»ÊÇ̸Ìì»úеÈËѵÁ·Ê±Ê¹ÓõÄÏà¶Ô½Ï¾ÉµÄÊý¾Ý£©£¬£¬£¬ÒÔ¼°½« ChatGPT ÓëµÚÈý·½Ð§Àͼ¯³É¡£¡£¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬²å¼þ¿ÉÒÔÔÊÐíÓû§ÓëÆä GitHub ºÍ Google Drive ÕÊ»§¾ÙÐн»»¥¡£¡£¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬µ±Ê¹Óòå¼þʱ£¬£¬£¬ChatGPT ÐèÒª»ñµÃȨÏ޲Żª½«Óû§µÄÊý¾Ý·¢Ë͵½Óë¸Ã²å¼þ¹ØÁªµÄÍøÕ¾£¬£¬£¬²¢ÇҸòå¼þ¿ÉÄÜÐèÒª»á¼ûÓëÆä½»»¥µÄЧÀÍÉϵÄÓû§ÕÊ»§¡£¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/chatgpt-plugin-vulnerabilities-exposed-data-accounts/
6. Á÷ýÌ幫˾ RokuÁè¼Ý15000 ¸öÕË»§ÐÅϢй¶
3ÔÂ13ÈÕ£¬£¬£¬Á÷ýÌ幫˾ Roku ͸¶£¬£¬£¬Áè¼Ý 15,000 ¸ö¿Í»§µÄÕÊ»§Òò²»Ïà¹ØÊý¾Ýй¶¶ø±»ÇÔÈ¡µÄµÇ¼ƾ֤Ôâµ½ºÚ¿Í¹¥»÷¡£¡£¡£¡£¡£¡£¡£RokuÔÚÏòÃåÒòÖݺͼÓÀû¸£ÄáÑÇÖÝ×ÜÉó²é³¤·¢³öµÄÊý¾Ýй¶֪ͨÖÐÌåÏÖ£¬£¬£¬ºÚ¿ÍÔÚ´Ó 2023 Äê 12 Ô 28 ÈÕÒ»Á¬µ½ 2024 Äê 2 Ô 21 ÈյĻÖлá¼ûÁË 15,363 ÃûÃÀ¹úסÃñµÄÕË»§¡£¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷Ö®ÒÔÊÇÓÐÓ㬣¬£¬ÊÇÓÉÓÚһЩ Roku ÕÊ»§ËùÓÐÕß¹ýʧµØÔÚ Roku ÉÏʹÓÃÁËÓë¶à¸öÆäËûÍøÕ¾ÏàͬµÄÃÜÂë¡£¡£¡£¡£¡£¡£¡£ÕâΪÄÇЩһ¾½Ó´¥¹ýÒÑÍùÊý¾Ýй¶µÄÈËÌṩÁËÒ»ÖÖ¼òÆÓµÄÒªÁìÀ´Í»Èë Roku ÕÊ»§²¢Ëø¶¨ÕæÕýµÄÓû§¡£¡£¡£¡£¡£¡£¡£Roku Éù³Æ£¬£¬£¬»á¼ûÊÜÓ°ÏìµÄ Roku ÕÊ»§²»ÔÊÐíºÚ¿Í»á¼ûÉç»áÇå¾²ºÅÂ롢ȫ¶î¸¶¿îÕʺš¢³öÉúÈÕÆÚ»òÆäËûÀàËÆµÄÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£
https://www.bitdefender.com/blog/hotforsecurity/hackers-target-roku-15-000-accounts-compromised-in-data-breach/