LATRODECTUSÒ»Ö±¸üв¢·Ö·¢ICEDIDºÍÆäËû¶ñÒâÈí¼þ
Ðû²¼Ê±¼ä 2024-05-225ÔÂ21ÈÕ£¬£¬£¬LATRODECTUSÓÚ 2023 Äê 10 ÔÂÓÉÎÖ¶ûÂêÑо¿Ö°Ô±Ê״η¢Ã÷£¬£¬£¬ÊÇÒ»ÖÖÔÚÍøÂç·¸·¨·Ö×ÓÖÐÔ½À´Ô½Ê¢ÐеĶñÒâÈí¼þ¼ÓÔØ³ÌÐò¡£¡£¡£¡£¡£¡£ËäÈ»Õâ±»ÒÔΪÊÇÒ»¸öеļÒ×壬£¬£¬µ«ÓÉÓÚÐÐΪºÍÉú³¤ÏàËÆÐÔ£¬£¬£¬LATRODECTUS ºÍICEDIDÖ®¼ä±£´æÏ¸ÃÜÁªÏµ£¬£¬£¬°üÀ¨ÏÂÔØºÍÖ´ÐмÓÃܸºÔØ£¨Èç ICEDID£©µÄÏÂÁî´¦Öóͷ£³ÌÐò¡£¡£¡£¡£¡£¡£Proofpoint ºÍ Team Cymru »ùÓÚÕâÖÖÁªÏµ£¬£¬£¬·¢Ã÷ÁËICEDID ºÍ LATRODECTUS ÔËÓªÉÌʹÓõÄÍøÂç»ù´¡Éèʩ֮¼ä±£´æÏ¸ÃÜÁªÏµ¡£¡£¡£¡£¡£¡£LATRODECTUS ÌṩÁËһϵÁÐÖÜÈ«µÄ±ê×¼¹¦Ð§£¬£¬£¬ÍþвÐÐΪÕß¿ÉÒÔʹÓÃÕâЩ¹¦Ð§À´°²ÅŸü¶àµÄÓÐÓøºÔØ£¬£¬£¬ÔÚÆðÔ´ÈëÇÖºóÖ´ÐÐÖÖÖֻ¡£¡£¡£¡£¡£¡£´úÂë¿âδ¾ÓÉ»ìÏý£¬£¬£¬½ö°üÀ¨ 11 ¸öרעÓÚö¾ÙºÍÖ´ÐеÄÏÂÁî´¦Öóͷ£³ÌÐò¡£¡£¡£¡£¡£¡£ÕâÖÖÀàÐ͵ļÓÔØÆ÷´ú±íÁËÎÒÃÇÍŶÓ×î½üÊӲ쵽µÄÀ˳±£¬£¬£¬ÀýÈçPIKABOT£¬£¬£¬ÆäÖдúÂëÔ½·¢ÇáÁ¿¼¶ºÍÖ±½Ó£¬£¬£¬´¦Öóͷ£³ÌÐòÊýÄ¿ÓÐÏÞ¡£¡£¡£¡£¡£¡£
https://www.elastic.co/security-labs/spring-cleaning-with-latrodectus?&web_view=true
2. Kinsing¹¥»÷Apache Tomcat°²ÅÅÍÚ¿ó³ÌÐò
5ÔÂ20ÈÕ£¬£¬£¬Kinsing ¶ñÒâÈí¼þÒÔʹÓà Linux ÔÆÐ§ÀÍÆ÷ÉϵÄÎó²î°²ÅźóÃźͼÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò¶øÖøÃû£¬£¬£¬×î½ü½«ÆäÄ¿µÄÀ©Õ¹µ½°üÀ¨ Apache Tomcat ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÐÂÓ±µÄÊÖÒÕÀ´Ìӱܼì²â£¬£¬£¬½«×ÔÉíÒþ²ØÔÚ¿´ËÆÎÞº¦µÄϵͳÎļþÖУ¬£¬£¬Ê¹ÆäÔÚÊÜѬȾµÄϵͳÉϳ¤ÆÚ±£´æ£¬£¬£¬Í»³öÁË Kinsing Ò»Ö±Éú³¤µÄÕ½ÂÔ£¬£¬£¬²¢Ç¿µ÷ϵͳÖÎÀíÔ±ÐèÒª¶ÔÕâЩÐÂÐËÍþв¼á³ÖСÐÄ¡£¡£¡£¡£¡£¡£Kinsing ʹÓÃÈÝÆ÷ºÍЧÀÍÆ÷ÖеÄÎó²îÀ´°²ÅźóÃźͼÓÃÜÍÚ¿ó³ÌÐò£¬£¬£¬ÊÓ²ìЧ¹ûÏÔʾ¶à¸öЧÀÍÆ÷Êܵ½Ñ¬È¾£¬£¬£¬ÆäÖаüÀ¨¾ßÓÐÑÏÖØÈ±ÏÝµÄ Apache Tomcat¡£¡£¡£¡£¡£¡£Tomcat ÊÇÒ»¿î¿É¹ûÕæ»á¼ûµÄ¾²Ì¬ÄÚÈÝ¿ªÔ´Ð§ÀÍÆ÷£¬£¬£¬ÓÉÓÚÆäÔÚ»¥ÁªÍøÉϵÄ̻¶¶ø³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ£¬£¬£¬ÕâʹµÃ Kinsing ¿ÉÒÔÉøÍ¸µ½ÏµÍ³Öв¢½¨ÉèÒþ²ØµÄºóÃÅÒÔʵÏÖ³¤ÆÚÐÔ£¬£¬£¬Í¬Ê±°²ÅżÓÃÜ¿ó¹¤À´ÇÔÈ¡ÅÌËã×ÊÔ´ÒÔ¾ÙÐмÓÃÜÇ®±ÒÍÚ¾ò¡£¡£¡£¡£¡£¡£
https://gbhackers.com/kinsing-malware-apache-tomcat-servers/
3. SECÒªÇó½ðÈÚ×éÖ¯ÐèÒªÔÚ 30 ÌìÄÚÅû¶Êý¾Ýй¶ÊÂÎñ
5ÔÂ21ÈÕ£¬£¬£¬ÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©¶Ô SP ¹æÔò¾ÙÐÐÁËÐ޸쬣¬£¬ÒªÇó½ðÈÚ¹«Ë¾ÔÚ 30 ÌìÄÚ±¨¸æÊý¾Ýй¶ÇéÐΡ£¡£¡£¡£¡£¡£ÕâÊDZ£»£»£»¤ÏûºÄÕßµÄÒ»´óǰ½ø¡£¡£¡£¡£¡£¡£ÕâÏîл®¶¨½«ÓÚ 2024 Äê 5 Ô 15 ÈÕÉúЧ£¬£¬£¬Ö¼ÔÚÔöÇ¿ºÍ¸üжÔÏûºÄÕß½ðÈÚÐÅÏ¢µÄ±£»£»£»¤¡£¡£¡£¡£¡£¡£×Ô 2000 ÄêÍÆ³öÒÔÀ´£¬£¬£¬SEC î¿Ïµ SPÒªÇó¾¼ÍÉúÒâÉÌ¡¢Í¶×ʹ«Ë¾ºÍ³ÖÅÆÍ¶×ÊÕÕÁÏͨ¹ýÊéÃæÕþ²ßºÍ³ÌÐò±£»£»£»¤¿Í»§¼Í¼ºÍÐÅÏ¢¡£¡£¡£¡£¡£¡£¸Ã¹æÔò»¹Ú¹ÊÍÁËÔõÑù׼ȷɾ³ýÏûºÄÕß±¨¸æÐÅÏ¢£¬£¬£¬²¢ÒªÇóÒþ˽Õþ²ß֪ͨºÍÑ¡ÔñÍ˳öÑ¡Ïî¡£¡£¡£¡£¡£¡£¶àÄêÀ´£¬£¬£¬ÊÖÒÕµÄǰ½øÊ¹µÃÊý¾Ýй¶µÄ¿ÉÄÜÐÔ¸ü´ó£¬£¬£¬Õâ¾ÍÊÇÐèÒªÕâЩ¸Ä±äµÄÔµ¹ÊÔÓÉ¡£¡£¡£¡£¡£¡£
https://gbhackers.com/financial-organizations-data-breach/
4. Git Ô¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2024-32002
5ÔÂ21ÈÕ£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬¸ÃÎó²î±»Ö¸¶¨Îª CVE-2024-32002£¬£¬£¬ÑÏÖØË®Æ½Îª 9.0£¨ÑÏÖØ£©¡£¡£¡£¡£¡£¡£Õâ¸öÌØÊâµÄÎó²î±£´æÓÚÆÕ±éʹÓõÄcloneÏÂÁîÖС£¡£¡£¡£¡£¡£Git ÉÏÖÜÐû²¼ÁËÒ»·ÝÇ徲ͨ¸æ£¬£¬£¬ÆäÖÐÖ¸³öÁËÓйØÔ¶³Ì´úÂëÖ´ÐеÄÎÊÌâ¡£¡£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬¸ÃÎó²î±»ÐÎòΪÓÉÓÚ¿ÉÒÔÒÔÌØ¶¨·½·¨Æð²ÝµÄ×ÓÄ£¿£¿£¿£¿é¶ø±£´æ£¬£¬£¬´Ó¶ø¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£²»¹ýÕâ¸öÎó²îÒѾ±»gitÐÞ¸´£¬£¬£¬²¢ÇÒÐû²¼ÁËÐÞ²¹°æ±¾¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÍøÂçÇå¾²ÐÂÎÅ·ÖÏíµÄ±¨¸æ£¬£¬£¬git ʹÓÃ×ÓÄ£¿£¿£¿£¿é£¬£¬£¬ÕâЩ×ÓÄ£¿£¿£¿£¿éÊÇǶÌ×ÔÚÆäËû´æ´¢¿âÖеĴ洢¿â¡£¡£¡£¡£¡£¡£Ã¿¸ö×ÓÄ£¿£¿£¿£¿éÔÚÖ÷Ŀ¼Öж¼ÓÐÒ»¸öÖ¸¶¨µÄĿ¼·¾¶£¬£¬£¬¸ÃĿ¼·¾¶»á±»¸ú×ÙÒÔÈ·±£×¼È·¼Í¼¸ü¸Ä¡£¡£¡£¡£¡£¡£½øÒ»²½ÊӲ췢Ã÷£¬£¬£¬Windows£¨A/modules/x£©ºÍmacOS£¨a/modules/x£©µÄĬÈÏÉèÖÃÖб£´æ²»Çø·Ö¾ÞϸдµÄÎļþϵͳ¡£¡£¡£¡£¡£¡£ÕâÁ½¸ö·¾¶µÄ´¦Öóͷ£·½·¨Ïàͬ£¬£¬£¬ÕâÊÇÔ¶³Ì´úÂëÖ´Ðб³ºóµÄÖ÷ÒªÔµ¹ÊÔÓÉ¡£¡£¡£¡£¡£¡£
https://gbhackers.com/git-flaw-remote-code-execution/
5. Fluent Bit ÑÏÖØÈ±ÏÝÓ°ÏìËùÓÐÖ÷ÒªÔÆÌṩÉÌ
5ÔÂ21ÈÕ£¬£¬£¬¿ÉÔھܾøÐ§ÀͺÍÔ¶³Ì´úÂëÖ´Ðй¥»÷ÖÐʹÓõÄÒªº¦ Fluent Bit Îó²îÓ°ÏìÁËËùÓÐÖ÷ÒªÔÆÌṩÉ̺ÍÐí¶àÊÖÒÕ¾ÞÍ·¡£¡£¡£¡£¡£¡£Fluent Bit ÊÇÒ»ÖÖºÜÊÇÊ¢ÐеÄÈÕÖ¾¼Í¼ºÍÖ¸±ê½â¾ö¼Æ»®£¬£¬£¬ÊÊÓÃÓÚ Windows¡¢Linux ºÍ macOS£¬£¬£¬Ç¶ÈëÔÚÖ÷Òª Kubernetes ¿¯ÐаæÖУ¬£¬£¬°üÀ¨À´×Ô Amazon AWS¡¢Google GCP ºÍ Microsoft Azure µÄ¿¯Ðа档¡£¡£¡£¡£¡£×èÖ¹ 2024 Äê 3 Ô£¬£¬£¬Fluent Bit µÄÏÂÔØºÍ°²ÅÅ´ÎÊýÁè¼Ý 130 ÒڴΣ¬£¬£¬½Ï 2022 Äê 10 Ô±¨µÀµÄ30 ÒÚ´ÎÏÂÔØÁ¿´ó·ùÔöÌí¡£¡£¡£¡£¡£¡£Fluent Bit Ò²±» Crowdstrike ºÍ Trend Micro µÈÍøÂçÇå¾²¹«Ë¾ÒÔ¼°Ë¼¿Æ¡¢VMware¡¢Ó¢Ìضû¡¢Adobe ºÍ´÷¶ûµÈÐí¶à¿Æ¼¼¹«Ë¾Ê¹Óᣡ£¡£¡£¡£¡£Õâ¸öÑÏÖØµÄÄÚ´æËð»µÎó²î±»¸ú×ÙΪCVE-2024-4323£¬£¬£¬²¢±»·¢Ã÷¸ÃÎó²îµÄ Tenable Çå¾²Ñо¿Ö°Ô±³ÆÎªLinguistic Lumberjack£¬£¬£¬ËüÊÇÔÚ°æ±¾ 2.0.7 ÖÐÒýÈëµÄ£¬£¬£¬ÊÇÓÉ Fluent Bit µÄǶÈëʽ HTTP ЧÀÍÆ÷ÆÊÎö¸ú×ÙÇëÇóÖеĶѻº³åÇøÒç³öÎó²îÒýÆðµÄ¡£¡£¡£¡£¡£¡£Ö»¹Üδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔÇáËÉʹÓøÃÇå¾²Îó²îÀ´´¥·¢¾Ü¾øÐ§ÀÍ»òÔ¶³Ì²¶»ñÃô¸ÐÐÅÏ¢£¬£¬£¬µ«ÈôÊÇÓÐÊʵ±µÄÌõ¼þºÍ×ã¹»µÄʱ¼äÀ´½¨Éè¿É¿¿µÄÎó²î£¬£¬£¬ËûÃÇÒ²¿ÉÒÔʹÓÃËüÀ´»ñµÃÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-fluent-bit-flaw-impacts-all-major-cloud-providers/
6. AntidotľÂíαװ³ÉGoogle Play¸üУ¬£¬£¬ÇÔÈ¡ÒøÐÐÊý¾Ý
5ÔÂ22ÈÕ£¬£¬£¬CybleµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÕë¶Ô Android ×°±¸µÄÐÂÒøÐÐľÂí¡£¡£¡£¡£¡£¡£ÕâÖÖÖØ´óµÄ¶ñÒâÈí¼þ¾ßÓжàÖÖΣÏÕ¹¦Ð§£¬£¬£¬°üÀ¨ÁýÕÖ¹¥»÷¡¢¼üÅ̼ͼºÍ»ìÏýÊÖÒÕ¡£¡£¡£¡£¡£¡£¸ÃľÂíÆ¾Ö¤ÆäÔ´´úÂëÖеÄ×Ö·û´®ÃüÃûΪ¡°Antidot¡±£¬£¬£¬ÒÔαװ³É¹Ù·½ Google Play ¸üв¢Ö§³Ö¶àÖÖÓïÑÔ¶øÖøÃû£¬£¬£¬°üÀ¨Ó¢Óï¡¢µÂÓï¡¢·¨Óï¡¢Î÷°àÑÀÓï¡¢ÆÏÌÑÑÀÓï¡¢ÂÞÂíÄáÑÇÓ£¬£¬ÉõÖÁ¶íÓï¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×÷Ϊ Google Play µÄ¸üоÙÐзַ¢£¬£¬£¬²¢ÒÔ¡°Ð°汾¡±µÄÃû³Æ·ºÆðÔÚÊܺ¦ÕßµÄ×°±¸ÉÏ¡£¡£¡£¡£¡£¡£×°ÖúÍÊ×´ÎÆô¶¯ºó£¬£¬£¬Óû§»á¿´µ½Ò»¸ö¼ÙÒ³Ãæ£¬£¬£¬¾Ý³ÆÀ´×Ô Google Play£¬£¬£¬ÆäÖаüÀ¨Íê³É¸üÐÂËùÐè²Ù×÷µÄÏêϸ˵Ã÷¡£¡£¡£¡£¡£¡£
https://meterpreter.org/new-antidot-trojan-masquerades-as-google-play-update-steals-banking-data/