MicroliseÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÖÂÀÎÓü³µºÍ¿ìµÝ³µÁ¾×·×Ùϵͳ̱»¾
Ðû²¼Ê±¼ä 2024-11-081. MicroliseÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÖÂÀÎÓü³µºÍ¿ìµÝ³µÁ¾×·×Ùϵͳ̱»¾
11ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬MicroliseÊÇÒ»¼ÒΪ³µ¶ÓÔËÓªÉÌÌṩ³µÁ¾×·×Ù½â¾ö¼Æ»®µÄ¹«Ë¾£¬£¬£¬£¬£¬£¬£¬½üÆÚÔâÓöÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäÀÎÓü³µºÍ¿ìµÝ³µÁ¾µÄ×·×ÙϵͳºÍ¾¯±¨ÏµÍ³±»½ûÓᣡ£¡£¡£¸Ã¹«Ë¾ÔÚ10ÔÂ31ÈÕ֪ͨÂ×¶ØÖ¤È¯ÉúÒâËùÆäÍøÂçÉϱ¬·¢ÁË¡°Î´¾ÊÚȨµÄ»î¶¯¡±£¬£¬£¬£¬£¬£¬£¬²¢Ô¼ÇëÁËÍâ²¿ÍøÂçÇ徲ר¼Ò¾ÙÐÐÊÓ²ìºÍ»Ö¸´ÊÂÇé¡£¡£¡£¡£×èÖ¹11ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬MicroliseÌåÏÖÒÑÔÚ¿ØÖƺÍɨ³ýÍøÂçÍþв·½ÃæÈ¡µÃʵÖÊÐÔÏ£Íû£¬£¬£¬£¬£¬£¬£¬²¢»Ö¸´ÁËËùÓÐЧÀÍ£¬£¬£¬£¬£¬£¬£¬Ô¤¼ÆÏÂÖÜÄ©½«ÖÜȫͶÈëÔËÓª¡£¡£¡£¡£´Ë´Î¹¥»÷δË𺦿ͻ§ÏµÍ³Êý¾Ý£¬£¬£¬£¬£¬£¬£¬µ«²¿·ÖÔ±¹¤Êý¾ÝÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìСÎÒ˽¼Ò½«Æ¾Ö¤¹«Ë¾î¿ÏµÒåÎñ»ñµÃ֪ͨ£¬£¬£¬£¬£¬£¬£¬²¢¼û¸æÏà¹Ø²¿·Ö¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¿Í»§°üÀ¨Ó¢¹úÕþ¸®³Ð°üÉÌSercoºÍ¿ìµÝ¹«Ë¾DHL£¬£¬£¬£¬£¬£¬£¬ÆäÖÐSercoÔÚÏ®»÷Ó°Ïì·¢Ã÷ǰµÄ¼¸ÌìÄÚ£¬£¬£¬£¬£¬£¬£¬²¿·ÖÇô·¸»¤ËÍЧÀÍȱ·¦Î»Öøú×ÙºÍÇå¾²°ü¹Ü£¬£¬£¬£¬£¬£¬£¬¶øDHLµÄ²¿·Ö³µ¶ÓҲȱ·¦×·×Ù¹¦Ð§¡£¡£¡£¡£MicroliseÎ´Í¸Â¶ÍøÂç¹¥»÷ÀàÐͼ°ÊÜÓ°Ïì¿Í»§µÄÏêϸÐÅÏ¢¡£¡£¡£¡£
https://www.securityweek.com/cyberattack-on-microlise-disables-tracking-in-prison-vans-courier-vehicles/
2. CISAÖÒÑÔ£ºPalo Alto Networks Expedition±£´æÉí·ÝÑéÖ¤Îó²îÔâ¹¥»÷
11ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬CISA¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬Ö¸³ö¹¥»÷ÕßÕýÔÚʹÓÃPalo Alto Networks ExpeditionÖеÄÑÏÖØÉí·ÝÑéÖ¤Îó²î¡£¡£¡£¡£ExpeditionÊÇÒ»ÖÖǨá㹤¾ß£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚ½«·À»ðǽÉèÖôÓCheckpoint¡¢CiscoµÈ¹©Ó¦ÉÌת»»ÎªPAN-OS¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2024-5910£©ÒÑÔÚ7Ô»ñµÃÐÞ¸´£¬£¬£¬£¬£¬£¬£¬µ«ÍþвÕßÈÔÄÜÔ¶³ÌʹÓÃËüÖØÖÃ̻¶ÔÚ»¥ÁªÍøÉϵÄExpeditionЧÀÍÆ÷ÉϵÄÓ¦ÓóÌÐòÖÎÀíԱƾ֤¡£¡£¡£¡£CISAÖ¸³ö£¬£¬£¬£¬£¬£¬£¬´ËÎó²îÔÊÐí¹¥»÷Õß½ÓÊÜExpeditionÖÎÀíÔ±ÕÊ»§£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÄÜ»á¼ûÉñÃØÉèÖá¢Æ¾Ö¤¼°ÆäËûÊý¾Ý¡£¡£¡£¡£Ö»¹ÜÍøÂçÇå¾²»ú¹¹Î´Ìṩ¸ü¶à¹¥»÷ϸ½Ú£¬£¬£¬£¬£¬£¬£¬µ«Horizon3.aiÎó²îÑо¿Ô±Zach HanleyÐû²¼ÁËÒ»¸ö¿´·¨ÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÁ¬ÏµÁíÒ»¸öÒÑÐÞ²¹µÄÏÂÁî×¢ÈëÎó²î£¨CVE-2024-9464£©£¬£¬£¬£¬£¬£¬£¬ÔÚÒ×Êܹ¥»÷µÄЧÀÍÆ÷ÉÏʵÏÖδ¾Éí·ÝÑéÖ¤µÄí§ÒâÏÂÁîÖ´ÐС£¡£¡£¡£Palo Alto Networks½¨ÒéÖÎÀíÔ±ÏÞÖÆExpeditionµÄÍøÂç»á¼û£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÉý¼¶µ½Àο¿°æ±¾ºóÂÖ»»ËùÓÐÓû§Ãû¡¢ÃÜÂëºÍAPIÃÜÔ¿¡£¡£¡£¡£CISAÒѽ«¸ÃÎó²îÌí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖУ¬£¬£¬£¬£¬£¬£¬ÒªÇóÃÀ¹úÁª°î»ú¹¹ÔÚÈýÖÜÄÚ£¨¼´11ÔÂ28ÈÕǰ£©±£»£»£»£»¤ÆäÍøÂçÉϵÄÒ×Êܹ¥»÷ЧÀÍÆ÷¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-palo-alto-networks-bug-exploited-in-attacks/
3. Androxgh0stÓëMozi½©Ê¬ÍøÂ缯³É£¬£¬£¬£¬£¬£¬£¬ÍþвȫÇòWebºÍIoT×°±¸Çå¾²
11ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬CloudSEK±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Androxgh0st½©Ê¬ÍøÂçÒÑÓëMozi½©Ê¬ÍøÂ缯³É£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃWebÓ¦ÓóÌÐòºÍIoT×°±¸ÖеĶàÖÖÎó²î¾ÙÐй¥»÷¡£¡£¡£¡£×Ô2024Äê1ÔÂÆð£¬£¬£¬£¬£¬£¬£¬Androxgh0stÕë¶ÔÍøÂçЧÀÍÆ÷¾ÙÐÐˢкóÖØÐ·ºÆð£¬£¬£¬£¬£¬£¬£¬²¢¹²ÏíÁËMozi½©Ê¬ÍøÂçµÄ×é¼þ£¬£¬£¬£¬£¬£¬£¬´Ó¶øÄܹ»Ñ¬È¾¸ü¶àIoT×°±¸¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Androxgh0stµÄ¹¥»÷ÒªÁìÒÑÀ©Õ¹£¬£¬£¬£¬£¬£¬£¬Ãé×¼Á˰üÀ¨Cisco ASA¡¢Atlassian JIRA¡¢PHP¿ò¼Ü¡¢Metabase¡¢Apache WebЧÀÍÆ÷ºÍ¶àÖÖÎïÁªÍø×°±¸ÔÚÄڵĶà¸öÎó²î¡£¡£¡£¡£Í¨¹ýÕûºÏMoziµÄ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬Androxgh0stÄܹ»Ê¹ÓÃÉèÖùýʧµÄ·ÓÉÆ÷ºÍ×°±¸£¬£¬£¬£¬£¬£¬£¬ÔÚÈ«Çò¹æÄ£ÄÚѬȾװ±¸¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸Ã½©Ê¬ÍøÂ绹Õë¶Ô¶à¸ö¹ú¼ÒºÍµØÇøµÄ×°±¸¾ÙÐй¥»÷£¬£¬£¬£¬£¬£¬£¬µÂ¹úλ¾ÓÊÜѬȾװ±¸ÊýÄ¿°ñÊס£¡£¡£¡£×éÖ¯Ó¦Á¬Ã¦ÐÞ²¹Ïà¹ØÎó²î£¬£¬£¬£¬£¬£¬£¬¼à¿ØÍøÂçÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬²¢ÆÊÎöÈÕÖ¾ÒÔ²éÕÒÈëÇÖ¼£Ï󣬣¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»¤ÏµÍ³ÃâÊÜÕâÖÖÒ»Ö±ÑݱäµÄÍþв¡£¡£¡£¡£
https://hackread.com/androxgh0st-botnet-integrate-mozi-iot-vulnerabilities/
4. ³¯ÏʺڿÍʹÓá°Òþ²ØÎ£º¦¡±¶ñÒâÈí¼þ¹¥»÷¼ÓÃÜÇ®±ÒÆóÒµ
11ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬³¯ÏÊÕþ¸®Ö§³ÖµÄAPT×éÖ¯BlueNoroffÕýÔÚʹÓÃÒ»ÖÖÃûΪ¡°Òþ²ØÎ£º¦¡±µÄÐÂÐͶñÒâÈí¼þ¹¥»÷¼ÓÃÜÇ®±ÒÆóÒµ¡£¡£¡£¡£¸Ã¹¥»÷ͨ¹ýÈ«ÐÄÖÆ×÷µÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬ÓÕʹÊܺ¦Õßµã»÷¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬£¬£¬ÏÂÔØÎ±×°³ÉPDFÔĶÁÆ÷µÄ¶ñÒâMacÓ¦ÓóÌÐò¡£¡£¡£¡£Ò»µ©Ö´ÐУ¬£¬£¬£¬£¬£¬£¬¸ÃÓ¦ÓóÌÐò»áÉñÃØÏÂÔØ²¢Ö´ÐжñÒâ¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬£¬×°ÖúóÃŲ¢ÍøÂçϵͳÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÓëÔ¶³ÌЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬£¬ÎüÊÕ²¢Ö´ÐÐÏÂÁî¡£¡£¡£¡£ÎªÁËÈ·¼á³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹ÐÞ¸ÄÁËZshÉèÖÃÎļþ£¬£¬£¬£¬£¬£¬£¬Ê¹ºóÃÅ¿ÉÒÔÔÚϵͳÆô¶¯Ê±×Ô¶¯Ö´ÐС£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷»î¶¯ÓëBlueNoroffÓйØÁª£¬£¬£¬£¬£¬£¬£¬ÒòÆäÊÖÒÕÓëBlueNoroffÒÑÍùµÄ¹¥»÷»î¶¯ÀàËÆ£¬£¬£¬£¬£¬£¬£¬ÇÒʹÓÃÁËÓëÆäÏà¹ØµÄ¶ñÒâÈí¼þµÄÓû§ÊðÀí×Ö·û´®£¬£¬£¬£¬£¬£¬£¬²¢Ê¹Óÿª·¢ÕßÕÊ»§ÈÃApple¹«Ö¤¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬´Ó¶øÈƹýÇå¾²²½·¥¡£¡£¡£¡£¼øÓÚBlueNoroff¶à´ÎÒÔ¼ÓÃÜÇ®±ÒÉúÒâËù¡¢Î£º¦Í¶×ʹ«Ë¾ºÍÒøÐÐΪĿµÄ£¬£¬£¬£¬£¬£¬£¬ÐÐÒµÓ¦¼á³ÖСÐÄ¡£¡£¡£¡£Óû§Ó¦×Ðϸ¼ì²éµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬£¬£¬×èÖ¹µã»÷δ֪µç×ÓÓʼþÖеÄÁ´½Ó£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇÒªÇóÏÂÔØÓ¦ÓóÌÐò/PDFµÄÁ´½Ó£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·±£×ÔÉíÇå¾²¡£¡£¡£¡£
https://hackread.com/north-korean-hackers-crypto-fake-news-hidden-risk-malware/
5. °×ñºÚ¿ÍSean Kahler½ÒÆÆ²¢ÖúÐÞEAÕË»§ÏµÍ³ÑÏÖØÎó²î
11ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬ÓÎÏ·¿ª·¢Õß¼æÄæÏò¹¤³ÌʦSean Kahler·¢Ã÷²¢Ê¹ÓÃÁËÒ»¸öÓ°Ïìµç×ÓÒս磨EA£©ÕË»§ÏµÍ³µÄÑÏÖØÎó²î£¬£¬£¬£¬£¬£¬£¬²»·¨»ñÈ¡ÁËÁè¼Ý7ÒÚEAÓû§ÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÓÎϷͳ¼ÆÊý¾Ý¡£¡£¡£¡£Ëûͨ¹ýÔÚÓÎÏ·¿ÉÖ´ÐÐÎļþÖÐÕÒµ½Ó²±àÂëÆ¾Ö¤£¬£¬£¬£¬£¬£¬£¬»ñµÃÁËEA¿ª·¢Ö°Ô±²âÊÔÇéÐÎÖеÄÌØÈ¨»á¼ûÁîÅÆ£¬£¬£¬£¬£¬£¬£¬½ø¶ø·¢Ã÷ÁËÒ»¸ö̻¶µÄÄÚ²¿Ð§ÀÍAPI£¬£¬£¬£¬£¬£¬£¬¸ÃAPIÔÊÐíÐÞ¸ÄÍæ¼Ò×ÊÁÏ¡£¡£¡£¡£KahlerʹÓôËÎó²î½«EAÕË»§×´Ì¬¸ü¸ÄΪ¡°ÒÑեȡ¡±£¬£¬£¬£¬£¬£¬£¬×èÖ¹Óû§µÇ¼ÓÎÏ·£¬£¬£¬£¬£¬£¬£¬²¢Äܽ«Steam»òXboxÕË»§Á´½Óµ½ÆäËûÓû§µÄEAÕË»§£¬£¬£¬£¬£¬£¬£¬ÎÞÐèÑéÖ¤»òÃÜÂë¼´¿ÉµÇ¼ÆäËûÕË»§¡£¡£¡£¡£ËûÒâʶµ½ÕâÒ»Îó²îµÄÑÏÖØÐԺ󣬣¬£¬£¬£¬£¬£¬ÓÚ2024Äê6ÔÂ16ÈÕÏòEAÈÏÕæÈεØÅû¶ÁËÎó²î£¬£¬£¬£¬£¬£¬£¬EAÈ·ÈÏÁËÎó²î²¢Ðû²¼ÁËÎå¸ö²¹¶¡¾ÙÐÐÐÞ¸´¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬KahlerÖ¸³öEA»¨Á˽ϳ¤Ê±¼ä²ÅÐÞ¸´Îó²î£¬£¬£¬£¬£¬£¬£¬ÇÒÉÐδÆô¶¯Îó²îÉͽðÍýÏ룬£¬£¬£¬£¬£¬£¬È±·¦±¨¸æÎó²îµÄ¶¯Á¦¡£¡£¡£¡£
https://cybernews.com/security/whitehat-gains-access-to-over-700-million-ea-accounts/
6. GodFather¶ñÒâÈí¼þÈ«ÇòÀ©ÕÅ£ºÕë¶Ô500¶à¸ö½ðÈÚÓ¦ÓÃ
11ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬Cyble Ñо¿ÓëÇ鱨ʵÑéÊÒ (CRIL) ±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬GodFather ¶ñÒâÈí¼þµÄ¹æÄ£ÒÑÀ©´óÖÁÈ«Çò 500 ¶à¸öÒøÐкͼÓÃÜÇ®±ÒÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬½ÓÄÉÖØ´óÊÖÒÕÈç±¾»ú´úÂëʵÏÖºÍ×îµÍȨÏÞ£¬£¬£¬£¬£¬£¬£¬Ê¹Æä±ÈÒÔǰԽ·¢ÄÑÒÔ×½ÃþºÍΣÏÕ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓô¹ÂÚÍøÕ¾·Ö·¢Î±×°³ÉÕýµ±Ó¦ÓóÌÐòµÄ¶ñÒâ APK Îļþ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡ÒøÐÐÆ¾Ö¤¡£¡£¡£¡£Ëü»¹ÄÜʹÓà Android ×°±¸µÄ Accessibility ЧÀÍÖ´ÐÐÖÖÖÖ¶ñÒ⹦Ч£¬£¬£¬£¬£¬£¬£¬Èç×ÔÏÂÊÖÊÆ¡¢ÓëÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷½¨ÉèÅþÁ¬ÒÔ¼°¼üÅ̼ͼ¡£¡£¡£¡£Ò»µ©¼ì²âµ½Ä¿µÄÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬GodFather ¾Í»á¹Ø±ÕÕýµ±Ó¦ÓóÌÐò²¢¼ÓÔØÐéαµÇÂ¼Ò³ÃæÒÔÇÔȡƾ֤¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÆäµØÀíÁýÕÖ¹æÄ£Ò²ÔÚÀ©´ó£¬£¬£¬£¬£¬£¬£¬ÏÖÒÑÕë¶ÔÈÕ±¾¡¢ÐÂ¼ÓÆÂ¡¢°¢Èû°Ý½®ºÍÏ£À°µÄÓû§¡£¡£¡£¡£CRIL ×Ü½á³Æ£¬£¬£¬£¬£¬£¬£¬ÒÀ¸½ÆäеÄ×Ô¶¯»¯²Ù×÷ºÍÔÚ¸ü¶à¹ú¼Ò/µØÇøÕë¶ÔÓ¦ÓóÌÐòµÄ¸üÆÕ±éÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬GodFather ¶ñÒâÈí¼þ¶ÔÈ«ÇòÓû§×é³ÉÁËÔ½À´Ô½´óµÄΣº¦£¬£¬£¬£¬£¬£¬£¬Òò´Ë¼á³ÖСÐIJ¢ÔÚÒÆ¶¯×°±¸ÉϽÓÄÉǿʢµÄÇå¾²²½·¥ÖÁ¹ØÖ÷Òª¡£¡£¡£¡£
https://securityonline.info/godfather-malware-now-targets-500-banking-and-crypto-apps