Microsoft Windows DWM ÁãÈÕÎó²î±»´ó¹æÄ£Ê¹ÓÃ
Ðû²¼Ê±¼ä 2024-05-165ÔÂ15ÈÕ£¬£¬£¬£¬£¬Î¢ÈíÐû²¼ÎåÔ²¹¶¡¸üУ¬£¬£¬£¬£¬×ܹ² 59 ¸ö CVE £¬£¬£¬£¬£¬ÖÁÉÙÓÐÒ»¸öÖÚËùÖÜÖªµÄÎó²îÒѱ»´ó¹æÄ£Ê¹Ó㬣¬£¬£¬£¬²¢ÇÒȷʵÒѾ±» QakBot ËùʹÓᣡ£¡£¡£±¾ÔÂÅû¶µÄȱÏÝÓ°ÏìÁËÅÌËã kahuna µÄÕû¸ö²úÆ·×éºÏ£¬£¬£¬£¬£¬°üÀ¨ Windows¡¢Office¡¢.NET Framework ºÍ Visual Studio£»£»£»£»£»£»£»Î¢Èí365£»£»£»£»£»£»£»µçÁ¦ÉÌÒµÖÇÄÜ£»£»£»£»£»£»£»DHCP ЧÀÍÆ÷£»£»£»£»£»£»£»Microsoft Edge£¨»ùÓÚ Chromium£©£»£»£»£»£»£»£»ºÍ Windows ÒÆ¶¯¿í´ø¡£¡£¡£¡£»£»£»£»£»£»£»ùÓÚ Chromium µÄ Edge ä¯ÀÀÆ÷Êܵ½ CVE-2024-4761 µÄÓ°Ï죬£¬£¬£¬£¬ÕâÊÇ Google ½ñÌìÐÞ²¹µÄÒ»¸ö×Ô¶¯Ê¹ÓÃµÄ Chrome ÁãÈÕÎó²î£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öÑÏÖØµÄɳÏäÌÓÒݹýʧ£¬£¬£¬£¬£¬Ó¦Á¬Ã¦ÐÞ²¹¡£¡£¡£¡£
https://www.darkreading.com/vulnerabilities-threats/microsoft-windows-dwm-zero-day-mass-exploit
2. Î÷ÃÅ×Ó Ruggedcom Crossbow Öжà¸öí§Òâ´úÂëÖ´ÐÐÎó²î
5ÔÂ14ÈÕ£¬£¬£¬£¬£¬Î÷ÃÅ×Ó Ruggedcom Crossbow Öз¢Ã÷Á˶à¸öÎó²î£¬£¬£¬£¬£¬ÆäÖÐ×îÑÏÖØµÄÎó²î¿ÉÄÜÔÊÐíí§Òâ´úÂëÖ´ÐС£¡£¡£¡£Î÷ÃÅ×Ó Ruggedcom Crossbow »á¼ûÖÎÃ÷È·¾ö¼Æ»®Ö¼ÔÚΪ¹¤Òµ¿ØÖÆÏµÍ³Ìá¹©ÍøÂçÇå¾²ºÏ¹æÐÔ¡£¡£¡£¡£ÀÖ³ÉʹÓÃÆäÖÐ×îÑÏÖØµÄÎó²î¿ÉÄÜ»áÔÊÐíÔÚµÇÈÎÃü»§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£Æ¾Ö¤ÓëÓû§¹ØÁªµÄȨÏÞ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ×°ÖóÌÐò£»£»£»£»£»£»£»Éó²é¡¢¸ü¸Ä»òɾ³ýÊý¾Ý£»£»£»£»£»£»£»»ò½¨Éè¾ßÓÐÍêÈ«Óû§È¨ÏÞµÄÐÂÕÊ»§¡£¡£¡£¡£Óë¾ßÓÐÖÎÀíÓû§È¨ÏÞµÄÓû§Ïà±È£¬£¬£¬£¬£¬ÆäÕÊ»§ÉèÖÃΪÔÚϵͳÉÏÓµÓнÏÉÙÓû§È¨ÏÞµÄÓû§Êܵ½µÄÓ°Ïì¿ÉÄܸüС¡£¡£¡£¡£ÊÜÓ°ÏìµÄϵͳ°üÀ¨Ruggedcom Crossbow 5.5 ֮ǰµÄ°æ±¾¡£¡£¡£¡£
https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-siemens-ruggedcom-crossbow-could-allow-for-arbitrary-code-execution_2024-055
3. ·ðÃÉÌØÖÝͨ¹ýÊý¾ÝÒþ˽·¨ÔÊÐíÏûºÄÕ߯ðËß¹«Ë¾
5ÔÂ14ÈÕ£¬£¬£¬£¬£¬·ðÃÉÌØÖÝÁ¢·¨»ú¹¹ÖÜÎåͨ¹ýÁ˸ùú×îǿʢµÄ×ÛºÏÊý¾ÝÒþ˽·¨Ö®Ò»£¬£¬£¬£¬£¬ÆäÖÐÔÊÐíСÎÒ˽¼ÒÆðËßÇÖÕ¼ÆäÒþ˽ȨµÄ¹«Ë¾¡ª¡ªÕâÊÇÏÖÓÐÀàËÆÖÝÖ´·¨ÖÐØ¨¹ÅδÓеĻ®¶¨¡£¡£¡£¡£¸Ã·¨°¸°üÀ¨Êý¾Ý×îС»¯ÒªÇ󣬣¬£¬£¬£¬Õ⼫´óµØÏÞÖÆÁ˹«Ë¾¿ÉÒÔÍøÂçºÍʹÓõÄСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬²¢Õ¥È¡¹«Ë¾³öÊÛÏûºÄÕßµÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬ÔÊÐíСÎÒ˽¼ÒÔÚÒÔΪÆóÒµÕâÑù×öʱÌáÆðËßËÏ¡£¡£¡£¡£Ë½ÈËËßËÏȨÔÊÐíСÎÒ˽¼ÒÒªÇóËûÃÇÒÔΪÇÖÕ¼ÆäȨÁ¦µÄ¹«Ë¾¼ç¸ºÔðÈΣ¬£¬£¬£¬£¬¶øÎÞÐèÒÀÀµ¹ú¼ÒÕþ¸®½ÓÄÉÐж¯¡£¡£¡£¡£ÒÁÀûŵÒÁÖÝÉúÎïʶ±ðÒþ˽·¨ÖаüÀ¨µÄÀàËÆÌõ¿îÒý·¢ÁËÒ»²¨Ö¸¿ØÆóÒµäÂÖ°µÄÕûÌåËßËÏ¡£¡£¡£¡£·ðÃÉÌØÖÝ·¨°¸µÄ˽ÈËËßËÏȨÐèÒªÔÚÁ½ÄêºóÖØÐÂÊÚȨ£¬£¬£¬£¬£¬²¢ÊÊÓÃÓÚ´¦Öóͷ£Áè¼Ý 100,000 ÌõÏûºÄÕ߼ͼµÄÈÎºÎÆóÒµ»òСÎÒ˽¼Ò¡£¡£¡£¡£¸ÃÁ¢·¨»¹Öƶ©ÁËÑÏ¿áµÄ¹«ÃñȨÁ¦°ü¹Ü²½·¥ÒÔ±ÜÃâÆçÊÓ¡£¡£¡£¡£¼ÓÖÝǿʢµÄ×ÛºÏÊý¾ÝÒþ˽·¨»¹ÔÊÐíСÎÒ˽¼ÒÆðËßËûÃÇÒÔΪÇÖÕ¼ÆäȨÁ¦µÄÆóÒµ£¬£¬£¬£¬£¬µ«¸ÃÌõ¿î½öÊÊÓÃÓÚÊý¾Ýй¶£¬£¬£¬£¬£¬²»ÊÊÓÃÓÚÊý×ÖÒþ˽¡£¡£¡£¡£
https://therecord.media/vermont-passes-data-privacy-law?&web_view=true
4. Android ¶ñÒâÈí¼þð³ä WhatsApp µÈAPPÇÔÈ¡Êý¾Ý
5ÔÂ15ÈÕ£¬£¬£¬£¬£¬SonicWall Capture Labs ÍþвÑо¿ÍŶӱ¨¸æ³Æ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÕýÔÚʹÓöñÒâ Android Ó¦ÓóÌÐòÀ´Ã°³ä Google¡¢Instagram¡¢Snapchat¡¢WhatsApp ºÍ X µÈÊ¢ÐеÄÔÚÏßЧÀÍ¡£¡£¡£¡£ÕâЩӦÓóÌÐòÖ¼ÔÚ´ÓÒ×Êܹ¥»÷µÄ Android ÊÖ»úÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨ÁªÏµÈË¡¢¶ÌÐÅ¡¢Í¨»°¼Í¼ºÍÃÜÂë¡£¡£¡£¡£ÕâЩӦÓóÌÐò¿´ÆðÀ´Õýµ±£¬£¬£¬£¬£¬ÓÉÓÚËüÃÇʹÓÃÊìϤµÄ»Õ±êºÍÃû³ÆÀ´ÓÕÆºÁÎÞ½äÐĵÄÓû§²¢Òþ²ØÔÚÖÚÄ¿î¥î¥Ö®Ï¡£¡£¡£¡£·¿ªÊ±£¬£¬£¬£¬£¬Ó¦ÓóÌÐòÇëÇó»á¼ûÁ½¸öȨÏÞ£ºAndroid Accessibility Service ºÍ×°±¸ÖÎÀíȨÏÞ¡£¡£¡£¡£ÈôÊÇÊܺ¦ÕßÊÚÓèÕâЩȨÏÞ£¬£¬£¬£¬£¬Ó¦ÓóÌÐò¾Í¿ÉÒÔ»ñµÃ×°±¸µÄÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬¶ñÒâÓ¦ÓóÌÐòÓëºÚ¿Í¿ØÖÆµÄ C2 ЧÀÍÆ÷½¨ÉèÅþÁ¬£¬£¬£¬£¬£¬ÎüÊÕ¸½¼ÓÖ¸Áî¡£¡£¡£¡£Ëü¿ÉÒÔ¶ÁÈ¡ÐÂÎÅ¡¢Í¨»°¼Í¼¡¢»á¼û֪ͨÊý¾Ý¡¢·¢ËÍÐÂÎÅ¡¢×°ÖöñÒâÈí¼þÒÔ¼°·¿ª¶ñÒâÍøÕ¾ÒÔ¾ÙÐÐÍøÂç´¹ÂÚ¡£¡£¡£¡£
https://www.hackread.com/android-malware-whatsapp-instagram-snapchat-data/
5. Ebury½©Ê¬ÍøÂç¶ñÒâÈí¼þÒÑѬȾ40Íǫ̀LinuxЧÀÍÆ÷
5ÔÂ14ÈÕ£¬£¬£¬£¬£¬Ò»¸öÃûΪ¡°Ebury¡±µÄ¶ñÒâÈí¼þ½©Ê¬ÍøÂçÒÑѬȾÁ˽ü 400,000 ̨ Linux ЧÀÍÆ÷£¬£¬£¬£¬£¬×èÖ¹ 2023 Äêµ×£¬£¬£¬£¬£¬Ô¼ÓÐ 100,000 ̨ЧÀÍÆ÷ÈÔÊܵ½Íþв¡£¡£¡£¡£ESET Ñо¿Ö°Ô±Ê®¶àÄêÀ´Ò»Ö±ÔÚ¸ú×ÙÕâÖÖ³öÓÚ¾¼ÃÄîÍ·µÄ¶ñÒâÈí¼þ²Ù×÷£¬£¬£¬£¬£¬²¢ÔÚ 2014 ÄêºÍ 2017 ÄêÔÙ´ÎÖÒÑÔÓÐÓøºÔع¦Ð§µÄÖØ´ó¸üС£¡£¡£¡£ESET ×Ô 2009 ÄêÒÔÀ´Ò»Ö±¹Ø×¢µÄ Ebury ѬȾÇéÐΣ¬£¬£¬£¬£¬ÏÔʾѬȾÁ¿Ëæ×Åʱ¼äµÄÍÆÒÆ¶øÔöÌí¡£¡£¡£¡£×î½üµÄ Ebury ¹¥»÷Åú×¢£¬£¬£¬£¬£¬¹¥»÷ÍÅ»ïÇãÏòÓÚÆÆËðÍйÜÌṩÉÌ£¬£¬£¬£¬£¬²¢¶ÔÔÚÊÜѬȾÌṩÉÌÉÏ×âÓÃÐéÄâЧÀÍÆ÷µÄ¿Í»§¾ÙÐй©Ó¦Á´¹¥»÷¡£¡£¡£¡£×î³õµÄΣº¦ÊÇͨ¹ýƾ֤Ìî³ä¹¥»÷¾ÙÐе쬣¬£¬£¬£¬Ê¹ÓÃÇÔÈ¡µÄƾ֤µÇ¼ЧÀÍÆ÷¡£¡£¡£¡£Ò»µ©Ð§ÀÍÆ÷Êܵ½Íþв£¬£¬£¬£¬£¬¶ñÒâÈí¼þ¾Í»á´Ówtmp ºÍ known_hosts ÎļþÖÐÇÔÈ¡ÈëÕ¾/´øÍâ SSH ÅþÁ¬ÁÐ±í£¬£¬£¬£¬£¬²¢ÇÔÈ¡ SSH Éí·ÝÑéÖ¤ÃÜÔ¿£¬£¬£¬£¬£¬È»ºóʹÓÃÕâЩÃÜԿʵÑéµÇ¼ÆäËûϵͳ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ebury-botnet-malware-infected-400-000-linux-servers-since-2009/
6. ºÚ¿ÍÀÄÓà GoTo ¾Û»á¹¤¾ß°²ÅÅ Remcos RAT
5ÔÂ14ÈÕ£¬£¬£¬£¬£¬ÔÚÒ»´ÎÖØ´óµÄÍøÂç¹¥»÷»î¶¯Öз¢Ã÷ºÚ¿ÍʹÓÃÔÚÏß¾Û»áÆ½Ì¨ GoToMeeting Èö²¥ÃûΪ Remcos µÄÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£ÕâÒ»ÁîÈËÕ𾪵ÄÉú³¤Í»ÏÔÁËÍøÂç·¸·¨·Ö×ÓʹÓÿÉÐÅÈí¼þÍ»ÆÆÇå¾²·ÀÓù²¢Î´¾ÊÚȨ»á¼ûÊܺ¦ÕßϵͳµÄÒ»Ö±ÑݱäµÄÕ½ÂÔ¡£¡£¡£¡£¹¥»÷»úÖÆÉæ¼°Ê¹Óà GoToMeeting£¨Ò»ÖÖ±»ÆóÒµÆÕ±éÓÃÓÚÐéÄâ¾Û»áµÄ¹¤¾ß£©×÷Ϊ Remcos RAT µÄÇþµÀ¡£¡£¡£¡£Remcos ÊÇÒ»ÖÖǿʢµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃËüÔ¶³Ì¿ØÖÆÊÜѬȾµÄÅÌËã»ú¡¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬ÉõÖÁ°²ÅÅÆäËû¶ñÒâ¸ºÔØ¡£¡£¡£¡£¹¥»÷ÕßÇÉÃîµØÔÚ¿´ËÆÕýµ±µÄ GoToMeeting ֪ͨÖÐαװÁË Remcos ÓÐÓøºÔØ¡£¡£¡£¡£ºÁÎÞ½äÐĵÄÓû§ÏàÐÅÕâЩ֪ͨÊÇÕæÊµµÄ£¬£¬£¬£¬£¬Òò´Ë±»ÓÕÆÔÚËûÃǵÄϵͳÉÏÖ´ÐжñÒâÈí¼þ¡£¡£¡£¡£Ò»µ©×°Ö㬣¬£¬£¬£¬Remcos ¾Í»áÊÚÓè¹¥»÷Õß¶ÔÊÜѬȾÅÌËã»úµÄÍêÈ«¿ØÖÆÈ¨£¬£¬£¬£¬£¬Ê¹ËûÃÇÄܹ»ÔÚ²»±»·¢Ã÷µÄÇéÐÎϾÙÐÐÌØ¹¤»î¶¯¡¢Êý¾Ý͵ÇԺͽøÒ»²½µÄ¶ñÒâ»î¶¯¡£¡£¡£¡£Remcos µÄÒþÃØÐÔºÍÖØ´óÐÔ£¬£¬£¬£¬£¬¼ÓÉÏ¶Ô GoToMeeting µÄÆÕ±éÐÅÈΣ¬£¬£¬£¬£¬Ê¹µÃÕâÖÖ¹¥»÷ÌØÊâÒõÏÕÇÒÄÑÒÔÓ¦¶Ô¡£¡£¡£¡£
https://gbhackers.com/hackers-abuse-goto-meeting-tool/