Ñо¿Ö°Ô±ÑÝʾÕë¶ÔÈ˹¤ÖÇÄÜϵͳµÄÈ˹¤ÖÇÄÜÈ䳿
Ðû²¼Ê±¼ä 2024-04-264ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÑÝʾÁËÒ»ÖÖǰËùδ¼ûµÄÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬³ÆÎª¡°Morris II¡±È䳿²¡¶¾£¬£¬£¬£¬£¬£¬£¬¸ÃÈ䳿²¡¶¾Ê¹ÓÃÊ¢ÐеÄÈ˹¤ÖÇÄÜЧÀ;ÙÐÐ×ÔÎÒÈö²¥¡¢Ñ¬È¾ÐÂϵͳ²¢ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¸ÃÃû³ÆÔ´×Ô 1988 ÄêÔÚ»¥ÁªÍøÉÏÔì³ÉÑÏÖØÆÆËðµÄÔʼ Morris ÅÌËã»úÈ䳿¡£¡£¡£¡£¡£¡£¸ÃÈ䳿²¡¶¾Õ¹Ê¾ÁËÈ˹¤ÖÇÄÜÇå¾²ÍþвµÄDZÔÚΣÏÕ£¬£¬£¬£¬£¬£¬£¬²¢Îª±£»£»£»£»¤È˹¤ÖÇÄÜÄ£×Ó´øÀ´ÁËеĽôÆÈÐÔ¡£¡£¡£¡£¡£¡£À´×Ô¿µÄζûÀí¹¤´óѧ¡¢ÒÔÉ«ÁÐÀí¹¤Ñ§ÔººÍ Intuit µÄÑо¿Ö°Ô±Ê¹ÓÃËùνµÄ¡°¶Ô¿¹ÐÔ×ÔÎÒ¸´ÖÆÌáÐÑ¡±À´½¨Éè¸ÃÈ䳿²¡¶¾¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»¸öÌáÐÑ£¬£¬£¬£¬£¬£¬£¬µ±ÊäÈë´óÐÍÓïÑÔÄ£×Ó£¨LLM£©Ê±£¨ËûÃÇÔÚ OpenAI µÄ ChatGPT¡¢Google µÄ Gemini ÒÔ¼°Íþ˹¿µÐÇ´óѧÂóµÏÑ··ÖУ¡¢Î¢ÈíÑо¿ÔººÍ¸çÂ×±ÈÑÇ´óѧµÄÑо¿Ö°Ô±¿ª·¢µÄ¿ªÔ´ LLaVA Ä£×ÓÉϾÙÐÐÁ˲âÊÔ£© £¬£¬£¬£¬£¬£¬£¬ÓÕÆÄ£×Ó½¨ÉèÌØÁíÍâÌáÐÑ¡£¡£¡£¡£¡£¡£Ëü´¥·¢Ì¸Ìì»úеÈËÌìÉú×Ô¼ºµÄ¶ñÒâÌáÐÑ£¬£¬£¬£¬£¬£¬£¬È»ºóͨ¹ýÖ´ÐÐÕâЩָÁîÀ´ÏìÓ¦£¨ÀàËÆÓÚ SQL ×¢È뻺ºÍ³åÇøÒç³ö¹¥»÷£©¡£¡£¡£¡£¡£¡£
https://securityintelligence.com/articles/malicious-ai-worm-targeting-generative-ai/
2. ArcaneDoor ºÚ¿ÍʹÓÃ˼¿ÆÁãÈÕÎó²î¹¥»÷Õþ¸®»ú¹¹
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬Ë¼¿Æ½ñÌìÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬×Ô 2023 Äê 11 ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬£¬Ä³ºÚ¿Í×éÖ¯Ò»Ö±ÔÚʹÓÃ×Ô˳ӦÇå¾²×°±¸ (ASA) ºÍ Firepower Íþв·ÀÓù (FTD) ·À»ðǽÖеÄÁ½¸öÁãÈÕÎó²îÀ´¹¥»÷È«ÇòµÄÕþ¸®ÍøÂç¡£¡£¡£¡£¡£¡£ÕâЩºÚ¿Í±»Ë¼¿Æ Talos ʶ±ðΪ UAT4356£¬£¬£¬£¬£¬£¬£¬±»Î¢Èíʶ±ðΪ STORM-1849£¬£¬£¬£¬£¬£¬£¬ËûÃÇÓÚ 2023 Äê 11 ÔÂÉÏÑ®×îÏÈÔÚÃûΪ ArcaneDoor µÄÍøÂçÌØ¹¤»î¶¯ÖÐÉøÍ¸Ò×Êܹ¥»÷µÄ±ßÑØ×°±¸¡£¡£¡£¡£¡£¡£Ö»¹Ü˼¿ÆÉÐδȷ¶¨×î³õµÄ¹¥»÷ÏòÁ¿£¬£¬£¬£¬£¬£¬£¬µ«Ëü·¢Ã÷²¢ÐÞ¸´ÁËÁ½¸öÇå¾²Îó²î - CVE-2024-20353£¨¾Ü¾øÐ§ÀÍ£©ºÍCVE-2024-20359£¨³¤ÆÚÍâµØ´úÂëÖ´ÐУ©¡£¡£¡£¡£¡£¡£Ë¼¿ÆÓÚ 2024 Äê 1 ÔÂÉÏÑ®Òâʶµ½ ArcaneDoor »î¶¯£¬£¬£¬£¬£¬£¬£¬²¢·¢Ã÷ÓÐÖ¤¾ÝÅú×¢¹¥»÷ÕßÖÁÉÙ×Ô 2023 Äê 7 ÔÂÆð¾ÍÒѾ²âÊÔ²¢¿ª·¢ÁËÕë¶ÔÕâÁ½¸öÁãÈÕÎó²îµÄÎó²î¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/arcanedoor-hackers-exploit-cisco-zero-days-to-breach-govt-networks/
3. Google Chrome ÖеĶà¸öÎó²î¿ÉÄܵ¼ÖÂí§Òâ´úÂëÖ´ÐÐ
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬Google Chrome Öз¢Ã÷Á˶à¸öÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£°üÀ¨ANGLE ÖеÄÀàÐÍ»ìÏý (CVE-2024-4058)¡¢V8 API ÖеĶÁȡԽ½ç (CVE-2024-4059)ºÍDawn ÖÐÊͷźóʹÓà (CVE-2024-4060)¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓÃÕâЩÎó²î¿ÉÄÜÔÊÐíÔÚµÇÈÎÃü»§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÓëÓû§¹ØÁªµÄȨÏÞ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ×°ÖóÌÐò£»£»£»£»Éó²é¡¢¸ü¸Ä»òɾ³ýÊý¾Ý£»£»£»£»»ò½¨Éè¾ßÓÐÍêÈ«Óû§È¨ÏÞµÄÐÂÕÊ»§¡£¡£¡£¡£¡£¡£Óë¾ßÓÐÖÎÀíÓû§È¨ÏÞµÄÓû§Ïà±È£¬£¬£¬£¬£¬£¬£¬ÆäÕÊ»§ÉèÖÃΪÔÚϵͳÉÏÓµÓнÏÉÙÓû§È¨ÏÞµÄÓû§Êܵ½µÄÓ°Ïì¿ÉÄܸüС¡£¡£¡£¡£¡£¡£ÏÖÔÚ»¹Ã»ÓйØÓÚÕâЩÎó²î±»´ó¹æÄ£Ê¹Óõı¨¸æ¡£¡£¡£¡£¡£¡£
https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution_2024-043
4. À³Ë¹ÌسǵÄ·µÆÒòÍøÂç¹¥»÷¶øÎÞ·¨¹Ø±Õ
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬À³Ë¹ÌØÊÐÒé»áÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÑÏÖØÓ°ÏìÁËÕþ¸®µÄЧÀͲ¢µ¼ÖÂÉñÃØÎļþй¶ ¡£¡£¡£¡£¡£¡£¹¥»÷±³ºóµÄÀÕË÷Èí¼þ×é֯й¶Á˶à·ÝÎļþ£¬£¬£¬£¬£¬£¬£¬°üÀ¨×â½ð±¨±íºÍ¹ºÖÃÒé»áºâÓîµÄÉêÇë¡£¡£¡£¡£¡£¡£Õâ´ÎÏ®»÷±¬·¢ÔÚ3 Ô 7 ÈÕ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÊÐÒé»áµÄ IT ϵͳ̱»¾¡£¡£¡£¡£¡£¡£ÓÉÓÚÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ò»Ð©µÆÕûÌì¶¼ÁÁ×Å£¬£¬£¬£¬£¬£¬£¬ÊÐÒé»áÎÞ·¨½«Æä¹Ø±Õ¡£¡£¡£¡£¡£¡£ÊÐÒé»á³ÆÊÇÓÉÓÚÓë×î½üµÄÍøÂç¹¥»÷Ïà¹ØµÄÊÖÒÕÎÊÌ⣬£¬£¬£¬£¬£¬£¬±»ÆÈ¹Ø±ÕÁË IT ϵͳ¡£¡£¡£¡£¡£¡£ÕâÒâζ×ÅÎÒÃÇÏÖÔÚÎÞ·¨Ô¶³Ìʶ±ð½ÖµÀÕÕÃ÷ϵͳµÄ¹ÊÕÏ¡£¡£¡£¡£¡£¡£ÊÐÒé»á½²»°ÈË˵¡£¡£¡£¡£¡£¡£¹ÊÕϵÄĬÈÏģʽÊǵƼá³ÖÁÁÆð£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·±£õè¾¶²»»áÍêȫϨÃð²¢³ÉΪÇå¾²Òþ»¼¡£¡£¡£¡£¡£¡£½â¾öÕâ¸öÎÊÌâÐèÒª½ÓÄÉÐí¶à°ì·¨£¬£¬£¬£¬£¬£¬£¬ÕýÔÚ¾¡¿ì½â¾öÕâЩÎÊÌâ¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/162219/hacking/leicester-city-cyberattack.html
5. Áè¼Ý23Íò·ÝIDFµÄÎļþÔÚÉæÏÓÄäÃû¹¥»÷ÖÐй¶
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÓëÄäÃûÕß×éÖ¯Ïà¹ØµÄºÚ¿Í×é֝ɿÏÓʵÑéÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÒÔÉ«Áйú·À¾ü (IDF) ÃæÁÙÉñÃØÊý¾Ýй¶µÄÖ¸¿Ø¡£¡£¡£¡£¡£¡£¾ÝºÚ¿Í³Æ£¬£¬£¬£¬£¬£¬£¬ËûÃÇ»á¼ûÁË 20 GB µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Áè¼Ý 233,000 ·ÝÖÖÖÖÃûÌõľüÊÂÎĵµ£¬£¬£¬£¬£¬£¬£¬Èç PDF Îļþ¡¢Word ÎĵµºÍÑÝʾÎĸ塣¡£¡£¡£¡£¡£Ïà±È֮ϣ¬£¬£¬£¬£¬£¬£¬¹ú·À²¿·ñ¶¨ÓÐÈκα»ÈëÇֵĹ¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Ç¿µ÷Æä¶à²ãÇå¾²ÅÌËã»úϵͳ²»Ì«¿ÉÄÜÖ±½ÓÊܵ½¹¥»÷¡£¡£¡£¡£¡£¡£ËûÃÇÒÔΪ£¬£¬£¬£¬£¬£¬£¬ÈôÊÇȷʵ±¬·¢Èκκڿ͹¥»÷£¬£¬£¬£¬£¬£¬£¬ºÜ¿ÉÄÜÉæ¼°ÃñÓÃϵͳ¡£¡£¡£¡£¡£¡£ºÚ¿ÍÐû²¼ÁËÒ»¶ÎÊÓÆµ£¬£¬£¬£¬£¬£¬£¬¾Ý³ÆÕ¹Ê¾ÁËÒÔÉ«Áйú·À¾üÑÝʾµÄÕæÊµÆ¬¶Ï£¬£¬£¬£¬£¬£¬£¬µ«¸Ã²¿·ÖÒÔΪÕâÊÇDZÔÚµÄÐÄÀíÕ½ÐÐΪ£¬£¬£¬£¬£¬£¬£¬Ê¹È˶ÔÖ¤ÁϵÄÕæÊµÐÔ±¬·¢ÏÓÒÉ¡£¡£¡£¡£¡£¡£±¾ÔÂÔçЩʱ¼ä£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯¾Ý³Æ¶ÔÒÔÉ«ÁÐ˾·¨²¿µÄ IT »ù´¡ÉèÊ©¾ÙÐÐÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬Éù³ÆÒÑÉøÍ¸¸Ã²¿µÄÇ徲ϵͳ²¢ÏÂÔØÁËÁè¼Ý 300 GB µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¾ÝºÚ¿Í³Æ£¬£¬£¬£¬£¬£¬£¬Êý¾Ý»º´æ°üÀ¨ 800 Íò¸öÎļþ£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ãô¸ÐµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://meterpreter.org/over-233000-idf-documents-compromised-in-alleged-anonymous-attack/
6. Ñо¿ÍŶӷ¢Ã÷¿ÉÇÔÈ¡DiscordÊý¾ÝµÄPyPI°ü
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬FortinetµÄÍøÂçÇ徲ר¼ÒÔÚ PyPI ÖÐΪ¿ª·¢Ö°Ô±Ê¶±ð³öÒ»¸öеĶñÒâ°ü£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ´Ó Discord ÇÔÈ¡Óû§Êý¾Ý¡£¡£¡£¡£¡£¡£¸ÃÈí¼þ°üÃûΪ¡°discordpy_bypass-1.7¡±£¬£¬£¬£¬£¬£¬£¬ÓÚ 2024 Äê 3 Ô 10 ÈÕÐû²¼£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÁ½Ììºó±»¼ì²âµ½¡£¡£¡£¡£¡£¡£¸ÃÈí¼þ°üÓÉÃûΪ¡°Theaos¡±µÄÓû§¿ª·¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨Æß¸ö¾ßÓÐÏàËÆÌØÕ÷µÄ°æ±¾¡£¡£¡£¡£¡£¡£ÆäÖ÷ҪĿµÄÊÇͨ¹ýÔÚÊܺ¦ÕßϵͳÖн¨É賤ÆÚÐÔµÄÊÖÒÕÀ´ÌáÈ¡ÉñÃØÐÅÏ¢¡¢´Óä¯ÀÀÆ÷ÖÐÌáÈ¡Êý¾Ý²¢ÍøÂçÁîÅÆ¡£¡£¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬£¬¸ÃÈí¼þ°ü½ÓÄÉÁ˶à²ã¹æ±Ü²½·¥£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ê¹Óà base64 ¶Ô»ù±¾ Python ´úÂë¾ÙÐбàÂë¡¢¸½¼Ó»ìÏýÒªÁ죬£¬£¬£¬£¬£¬£¬ÒÔ¼°½«Æä±àÒëΪ´ÓÔ¶³Ì URL ÏÂÔØµÄ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Á¬ÏµÁ˶àÏî¼ì²é£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¶ñÒâÈí¼þ¼ì²âɳÏäÇéÐÎÖеÄÖ´ÐÐÇéÐβ¢×èÖ¹²Ù×÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸Ã³ÌÐò»¹¿ÉÒÔʶ±ð²¢×èÖ¹ÁÐÈëºÚÃûµ¥µÄ IP ºÍ MAC µØµã¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÌØÊâ¹Ø×¢ Discord Éí·ÝÑéÖ¤Êý¾Ý£¬£¬£¬£¬£¬£¬£¬´Óä¯ÀÀÆ÷ÖÐÌáÈ¡ÃÜÂë¡¢cookie ÎļþºÍÍøÂçËÑË÷ÀúÊ·¼Í¼¡£¡£¡£¡£¡£¡£ÔÚ½«ËüÃÇ·¢Ë͵½Ô¶³ÌЧÀÍÆ÷֮ǰ£¬£¬£¬£¬£¬£¬£¬ÌáÈ¡µÄÁîÅÆ½«±»½âÃܺÍÑéÖ¤¡£¡£¡£¡£¡£¡£
https://meterpreter.org/pypi-package-exposed-fortinet-warns-of-discord-data-theft/