Ñо¿Ö°Ô±ÑÝʾÕë¶ÔÈ˹¤ÖÇÄÜϵͳµÄÈ˹¤ÖÇÄÜÈ䳿

Ðû²¼Ê±¼ä 2024-04-26
1. Ñо¿Ö°Ô±ÑÝʾÕë¶ÔÈ˹¤ÖÇÄÜϵͳµÄÈ˹¤ÖÇÄÜÈ䳿


4ÔÂ24ÈÕ£¬ £¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÑÝʾÁËÒ»ÖÖǰËùδ¼ûµÄÐÂÐͶñÒâÈí¼þ£¬ £¬£¬£¬£¬£¬£¬³ÆÎª¡°Morris II¡±È䳿²¡¶¾£¬ £¬£¬£¬£¬£¬£¬¸ÃÈ䳿²¡¶¾Ê¹ÓÃÊ¢ÐеÄÈ˹¤ÖÇÄÜЧÀ;ÙÐÐ×ÔÎÒÈö²¥¡¢Ñ¬È¾ÐÂϵͳ²¢ÇÔÈ¡Êý¾Ý¡£¡£¡£ ¡£¡£¡£¸ÃÃû³ÆÔ´×Ô 1988 ÄêÔÚ»¥ÁªÍøÉÏÔì³ÉÑÏÖØÆÆËðµÄԭʼ Morris ÅÌËã»úÈ䳿¡£¡£¡£ ¡£¡£¡£¸ÃÈ䳿²¡¶¾Õ¹Ê¾ÁËÈ˹¤ÖÇÄÜÇå¾²ÍþвµÄDZÔÚΣÏÕ£¬ £¬£¬£¬£¬£¬£¬²¢Îª±£»£»£»£»¤È˹¤ÖÇÄÜÄ£×Ó´øÀ´ÁËеĽôÆÈÐÔ¡£¡£¡£ ¡£¡£¡£À´×Ô¿µÄζûÀí¹¤´óѧ¡¢ÒÔÉ«ÁÐÀí¹¤Ñ§ÔººÍ Intuit µÄÑо¿Ö°Ô±Ê¹ÓÃËùνµÄ¡°¶Ô¿¹ÐÔ×ÔÎÒ¸´ÖÆÌáÐÑ¡±À´½¨Éè¸ÃÈ䳿²¡¶¾¡£¡£¡£ ¡£¡£¡£ÕâÊÇÒ»¸öÌáÐÑ£¬ £¬£¬£¬£¬£¬£¬µ±ÊäÈë´óÐÍÓïÑÔÄ£×Ó£¨LLM£©Ê±£¨ËûÃÇÔÚ OpenAI µÄ ChatGPT¡¢Google µÄ Gemini ÒÔ¼°Íþ˹¿µÐÇ´óѧÂóµÏÑ··ÖУ¡¢Î¢ÈíÑо¿ÔººÍ¸çÂ×±ÈÑÇ´óѧµÄÑо¿Ö°Ô±¿ª·¢µÄ¿ªÔ´ LLaVA Ä£×ÓÉϾÙÐÐÁ˲âÊÔ£© £¬ £¬£¬£¬£¬£¬£¬ÓÕÆ­Ä£×Ó½¨ÉèÌØÁíÍâÌáÐÑ¡£¡£¡£ ¡£¡£¡£Ëü´¥·¢Ì¸Ìì»úеÈËÌìÉú×Ô¼ºµÄ¶ñÒâÌáÐÑ£¬ £¬£¬£¬£¬£¬£¬È»ºóͨ¹ýÖ´ÐÐÕâЩָÁîÀ´ÏìÓ¦£¨ÀàËÆÓÚ SQL ×¢È뻺ºÍ³åÇøÒç³ö¹¥»÷£©¡£¡£¡£ ¡£¡£¡£


https://securityintelligence.com/articles/malicious-ai-worm-targeting-generative-ai/


2. ArcaneDoor ºÚ¿ÍʹÓÃ˼¿ÆÁãÈÕÎó²î¹¥»÷Õþ¸®»ú¹¹


4ÔÂ24ÈÕ£¬ £¬£¬£¬£¬£¬£¬Ë¼¿Æ½ñÌìÖÒÑԳƣ¬ £¬£¬£¬£¬£¬£¬×Ô 2023 Äê 11 ÔÂÒÔÀ´£¬ £¬£¬£¬£¬£¬£¬Ä³ºÚ¿Í×éÖ¯Ò»Ö±ÔÚʹÓÃ×Ô˳ӦÇå¾²×°±¸ (ASA) ºÍ Firepower Íþв·ÀÓù (FTD) ·À»ðǽÖеÄÁ½¸öÁãÈÕÎó²îÀ´¹¥»÷È«ÇòµÄÕþ¸®ÍøÂç¡£¡£¡£ ¡£¡£¡£ÕâЩºÚ¿Í±»Ë¼¿Æ Talos ʶ±ðΪ UAT4356£¬ £¬£¬£¬£¬£¬£¬±»Î¢Èíʶ±ðΪ STORM-1849£¬ £¬£¬£¬£¬£¬£¬ËûÃÇÓÚ 2023 Äê 11 ÔÂÉÏÑ®×îÏÈÔÚÃûΪ ArcaneDoor µÄÍøÂçÌØ¹¤»î¶¯ÖÐÉøÍ¸Ò×Êܹ¥»÷µÄ±ßÑØ×°±¸¡£¡£¡£ ¡£¡£¡£Ö»¹Ü˼¿ÆÉÐδȷ¶¨×î³õµÄ¹¥»÷ÏòÁ¿£¬ £¬£¬£¬£¬£¬£¬µ«Ëü·¢Ã÷²¢ÐÞ¸´ÁËÁ½¸öÇå¾²Îó²î - CVE-2024-20353£¨¾Ü¾øÐ§ÀÍ£©ºÍCVE-2024-20359£¨³¤ÆÚÍâµØ´úÂëÖ´ÐУ©¡£¡£¡£ ¡£¡£¡£Ë¼¿ÆÓÚ 2024 Äê 1 ÔÂÉÏÑ®Òâʶµ½ ArcaneDoor »î¶¯£¬ £¬£¬£¬£¬£¬£¬²¢·¢Ã÷ÓÐÖ¤¾ÝÅú×¢¹¥»÷ÕßÖÁÉÙ×Ô 2023 Äê 7 ÔÂÆð¾ÍÒѾ­²âÊÔ²¢¿ª·¢ÁËÕë¶ÔÕâÁ½¸öÁãÈÕÎó²îµÄÎó²î¡£¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/arcanedoor-hackers-exploit-cisco-zero-days-to-breach-govt-networks/


3. Google Chrome ÖеĶà¸öÎó²î¿ÉÄܵ¼ÖÂí§Òâ´úÂëÖ´ÐÐ


4ÔÂ24ÈÕ£¬ £¬£¬£¬£¬£¬£¬Google Chrome Öз¢Ã÷Á˶à¸öÎó²î£¬ £¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£¡£¡£°üÀ¨ANGLE ÖеÄÀàÐÍ»ìÏý (CVE-2024-4058)¡¢V8 API ÖеĶÁȡԽ½ç (CVE-2024-4059)ºÍDawn ÖÐÊͷźóʹÓà (CVE-2024-4060)¡£¡£¡£ ¡£¡£¡£ÀÖ³ÉʹÓÃÕâЩÎó²î¿ÉÄÜÔÊÐíÔÚµÇÈÎÃü»§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£¡£¡£Æ¾Ö¤ÓëÓû§¹ØÁªµÄȨÏÞ£¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ×°ÖóÌÐò£»£»£»£»Éó²é¡¢¸ü¸Ä»òɾ³ýÊý¾Ý£»£»£»£»»ò½¨Éè¾ßÓÐÍêÈ«Óû§È¨ÏÞµÄÐÂÕÊ»§¡£¡£¡£ ¡£¡£¡£Óë¾ßÓÐÖÎÀíÓû§È¨ÏÞµÄÓû§Ïà±È£¬ £¬£¬£¬£¬£¬£¬ÆäÕÊ»§ÉèÖÃΪÔÚϵͳÉÏÓµÓнÏÉÙÓû§È¨ÏÞµÄÓû§Êܵ½µÄÓ°Ïì¿ÉÄܸüС¡£¡£¡£ ¡£¡£¡£ÏÖÔÚ»¹Ã»ÓйØÓÚÕâЩÎó²î±»´ó¹æÄ£Ê¹Óõı¨¸æ¡£¡£¡£ ¡£¡£¡£


https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution_2024-043


4. À³Ë¹ÌسǵÄ·µÆÒòÍøÂç¹¥»÷¶øÎÞ·¨¹Ø±Õ


4ÔÂ24ÈÕ£¬ £¬£¬£¬£¬£¬£¬À³Ë¹ÌØÊÐÒé»áÔâÓöÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬£¬ÑÏÖØÓ°ÏìÁËÕþ¸®µÄЧÀͲ¢µ¼ÖÂÉñÃØÎļþй¶ ¡£¡£¡£ ¡£¡£¡£¹¥»÷±³ºóµÄÀÕË÷Èí¼þ×é֯й¶Á˶à·ÝÎļþ£¬ £¬£¬£¬£¬£¬£¬°üÀ¨×â½ð±¨±íºÍ¹ºÖÃÒé»áºâÓîµÄÉêÇë¡£¡£¡£ ¡£¡£¡£Õâ´ÎÏ®»÷±¬·¢ÔÚ3 Ô 7 ÈÕ£¬ £¬£¬£¬£¬£¬£¬µ¼ÖÂÊÐÒé»áµÄ IT ϵͳ̱»¾¡£¡£¡£ ¡£¡£¡£ÓÉÓÚÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬£¬Ò»Ð©µÆÕûÌì¶¼ÁÁ×Å£¬ £¬£¬£¬£¬£¬£¬ÊÐÒé»áÎÞ·¨½«Æä¹Ø±Õ¡£¡£¡£ ¡£¡£¡£ÊÐÒé»á³ÆÊÇÓÉÓÚÓë×î½üµÄÍøÂç¹¥»÷Ïà¹ØµÄÊÖÒÕÎÊÌ⣬ £¬£¬£¬£¬£¬£¬±»ÆÈ¹Ø±ÕÁË IT ϵͳ¡£¡£¡£ ¡£¡£¡£ÕâÒâζ×ÅÎÒÃÇÏÖÔÚÎÞ·¨Ô¶³Ìʶ±ð½ÖµÀÕÕÃ÷ϵͳµÄ¹ÊÕÏ¡£¡£¡£ ¡£¡£¡£ÊÐÒé»á½²»°ÈË˵¡£¡£¡£ ¡£¡£¡£¹ÊÕϵÄĬÈÏģʽÊǵƼá³ÖÁÁÆð£¬ £¬£¬£¬£¬£¬£¬ÒÔÈ·±£õè¾¶²»»áÍêȫϨÃð²¢³ÉΪÇå¾²Òþ»¼¡£¡£¡£ ¡£¡£¡£½â¾öÕâ¸öÎÊÌâÐèÒª½ÓÄÉÐí¶à°ì·¨£¬ £¬£¬£¬£¬£¬£¬ÕýÔÚ¾¡¿ì½â¾öÕâЩÎÊÌâ¡£¡£¡£ ¡£¡£¡£


https://securityaffairs.com/162219/hacking/leicester-city-cyberattack.html


5. Áè¼Ý23Íò·ÝIDFµÄÎļþÔÚÉæÏÓÄäÃû¹¥»÷ÖÐй¶


4ÔÂ24ÈÕ£¬ £¬£¬£¬£¬£¬£¬ÓÉÓÚÓëÄäÃûÕß×éÖ¯Ïà¹ØµÄºÚ¿Í×é֝ɿÏÓʵÑéÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬£¬ÒÔÉ«Áйú·À¾ü (IDF) ÃæÁÙÉñÃØÊý¾Ýй¶µÄÖ¸¿Ø¡£¡£¡£ ¡£¡£¡£¾ÝºÚ¿Í³Æ£¬ £¬£¬£¬£¬£¬£¬ËûÃÇ»á¼ûÁË 20 GB µÄÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Áè¼Ý 233,000 ·ÝÖÖÖÖÃûÌõľüÊÂÎĵµ£¬ £¬£¬£¬£¬£¬£¬Èç PDF Îļþ¡¢Word ÎĵµºÍÑÝʾÎĸå¡£¡£¡£ ¡£¡£¡£Ïà±È֮ϣ¬ £¬£¬£¬£¬£¬£¬¹ú·À²¿·ñ¶¨ÓÐÈκα»ÈëÇֵĹ¥»÷ÊÂÎñ£¬ £¬£¬£¬£¬£¬£¬Ç¿µ÷Æä¶à²ãÇå¾²ÅÌËã»úϵͳ²»Ì«¿ÉÄÜÖ±½ÓÊܵ½¹¥»÷¡£¡£¡£ ¡£¡£¡£ËûÃÇÒÔΪ£¬ £¬£¬£¬£¬£¬£¬ÈôÊÇȷʵ±¬·¢Èκκڿ͹¥»÷£¬ £¬£¬£¬£¬£¬£¬ºÜ¿ÉÄÜÉæ¼°ÃñÓÃϵͳ¡£¡£¡£ ¡£¡£¡£ºÚ¿ÍÐû²¼ÁËÒ»¶ÎÊÓÆµ£¬ £¬£¬£¬£¬£¬£¬¾Ý³ÆÕ¹Ê¾ÁËÒÔÉ«Áйú·À¾üÑÝʾµÄÕæÊµÆ¬¶Ï£¬ £¬£¬£¬£¬£¬£¬µ«¸Ã²¿·ÖÒÔΪÕâÊÇDZÔÚµÄÐÄÀíÕ½ÐÐΪ£¬ £¬£¬£¬£¬£¬£¬Ê¹È˶ÔÖ¤ÁϵÄÕæÊµÐÔ±¬·¢ÏÓÒÉ¡£¡£¡£ ¡£¡£¡£±¾ÔÂÔçЩʱ¼ä£¬ £¬£¬£¬£¬£¬£¬¸Ã×éÖ¯¾Ý³Æ¶ÔÒÔÉ«ÁÐ˾·¨²¿µÄ IT »ù´¡ÉèÊ©¾ÙÐÐÁËÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬£¬Éù³ÆÒÑÉøÍ¸¸Ã²¿µÄÇ徲ϵͳ²¢ÏÂÔØÁËÁè¼Ý 300 GB µÄÊý¾Ý¡£¡£¡£ ¡£¡£¡£¾ÝºÚ¿Í³Æ£¬ £¬£¬£¬£¬£¬£¬Êý¾Ý»º´æ°üÀ¨ 800 Íò¸öÎļþ£¬ £¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ãô¸ÐµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£ ¡£¡£¡£


https://meterpreter.org/over-233000-idf-documents-compromised-in-alleged-anonymous-attack/


6. Ñо¿ÍŶӷ¢Ã÷¿ÉÇÔÈ¡DiscordÊý¾ÝµÄPyPI°ü


4ÔÂ24ÈÕ£¬ £¬£¬£¬£¬£¬£¬FortinetµÄÍøÂçÇ徲ר¼ÒÔÚ PyPI ÖÐΪ¿ª·¢Ö°Ô±Ê¶±ð³öÒ»¸öеĶñÒâ°ü£¬ £¬£¬£¬£¬£¬£¬Ö¼ÔÚ´Ó Discord ÇÔÈ¡Óû§Êý¾Ý¡£¡£¡£ ¡£¡£¡£¸ÃÈí¼þ°üÃûΪ¡°discordpy_bypass-1.7¡±£¬ £¬£¬£¬£¬£¬£¬ÓÚ 2024 Äê 3 Ô 10 ÈÕÐû²¼£¬ £¬£¬£¬£¬£¬£¬²¢ÔÚÁ½Ììºó±»¼ì²âµ½¡£¡£¡£ ¡£¡£¡£¸ÃÈí¼þ°üÓÉÃûΪ¡°Theaos¡±µÄÓû§¿ª·¢£¬ £¬£¬£¬£¬£¬£¬°üÀ¨Æß¸ö¾ßÓÐÏàËÆÌØÕ÷µÄ°æ±¾¡£¡£¡£ ¡£¡£¡£ÆäÖ÷ҪĿµÄÊÇͨ¹ýÔÚÊܺ¦ÕßϵͳÖн¨É賤ÆÚÐÔµÄÊÖÒÕÀ´ÌáÈ¡ÉñÃØÐÅÏ¢¡¢´Óä¯ÀÀÆ÷ÖÐÌáÈ¡Êý¾Ý²¢ÍøÂçÁîÅÆ¡£¡£¡£ ¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬ £¬£¬£¬£¬£¬£¬¸ÃÈí¼þ°ü½ÓÄÉÁ˶à²ã¹æ±Ü²½·¥£¬ £¬£¬£¬£¬£¬£¬°üÀ¨Ê¹Óà base64 ¶Ô»ù±¾ Python ´úÂë¾ÙÐбàÂë¡¢¸½¼Ó»ìÏýÒªÁ죬 £¬£¬£¬£¬£¬£¬ÒÔ¼°½«Æä±àÒëΪ´ÓÔ¶³Ì URL ÏÂÔØµÄ¿ÉÖ´ÐÐÎļþ¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Á¬ÏµÁ˶àÏî¼ì²é£¬ £¬£¬£¬£¬£¬£¬ÔÊÐí¶ñÒâÈí¼þ¼ì²âɳÏäÇéÐÎÖеÄÖ´ÐÐÇéÐβ¢×èÖ¹²Ù×÷¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬¸Ã³ÌÐò»¹¿ÉÒÔʶ±ð²¢×èÖ¹ÁÐÈëºÚÃûµ¥µÄ IP ºÍ MAC µØµã¡£¡£¡£ ¡£¡£¡£¸Ã¶ñÒâÈí¼þÌØÊâ¹Ø×¢ Discord Éí·ÝÑéÖ¤Êý¾Ý£¬ £¬£¬£¬£¬£¬£¬´Óä¯ÀÀÆ÷ÖÐÌáÈ¡ÃÜÂë¡¢cookie ÎļþºÍÍøÂçËÑË÷ÀúÊ·¼Í¼¡£¡£¡£ ¡£¡£¡£ÔÚ½«ËüÃÇ·¢Ë͵½Ô¶³ÌЧÀÍÆ÷֮ǰ£¬ £¬£¬£¬£¬£¬£¬ÌáÈ¡µÄÁîÅÆ½«±»½âÃܺÍÑéÖ¤¡£¡£¡£ ¡£¡£¡£


https://meterpreter.org/pypi-package-exposed-fortinet-warns-of-discord-data-theft/