Ô½ÄϺڿÍ×éÖ¯°²ÅÅPXA Stealer£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÅ·ÑÇÕþ¸®½ÌÓý»ú¹¹

Ðû²¼Ê±¼ä 2024-11-19

1. Ô½ÄϺڿÍ×éÖ¯°²ÅÅPXA Stealer£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÅ·ÑÇÕþ¸®½ÌÓý»ú¹¹


11ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÃûÉæÏÓÓëÔ½ÄÏÓйصÄÍþвÐÐΪÕßʹÓÃÃûΪPXA StealerµÄÐÂÐÍPython¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÅ·ÖÞºÍÑÇÖÞÕþ¸®¼°½ÌÓý»ú¹¹ÌᳫÐÅÏ¢ÇÔÈ¡»î¶¯¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÄܽâÃÜä¯ÀÀÆ÷Ö÷ÃÜÂ룬£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÔÚÏßÕË»§Æ¾Ö¤¡¢²ÆÎñÐÅÏ¢¡¢ä¯ÀÀÆ÷cookieµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬°üÀ¨ZIPÎļþ¸½¼þ£¬£¬£¬£¬£¬£¬£¬´¥·¢¼ÓÔØÆ÷ºÍÅú´¦Öóͷ£¾ç±¾£¬£¬£¬£¬£¬£¬£¬ÔËÐÐPowerShellÏÂÁîÏÂÔØÓÐÓøºÔز¢°²ÅÅÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£PXA StealerÌØÊâ¹Ø×¢ÇÔÈ¡Facebook cookie£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÓëFacebook Ads ManagerºÍGraph API½»»¥ÍøÂçÏêϸÐÅÏ¢¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÆäËûÇÔÈ¡¶ñÒâÈí¼þÈçStrelaStealer¡¢RECORDSTEALER¡¢Rhadamanthys¡¢Amnesia StealerºÍGlove StealerµÈÒ²ÔÚÒ»Ö±Éú³¤ºÍÓ¿ÏÖ£¬£¬£¬£¬£¬£¬£¬Ö¤ÊµÎúÇÔÈ¡¶ñÒâÈí¼þµÄÊ¢ÐС£¡£¡£¡£¡£Ö»¹ÜÖ´·¨²¿·ÖÆð¾¢¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«´ËÀà»î¶¯ÈÔÒ»Á¬±£´æ¡£¡£¡£¡£¡£


https://thehackernews.com/2024/11/vietnamese-hacker-group-deploys-new-pxa.html


2. GitHubÏîĿƵÔâ¶ñÒâºóÃŹ¥»÷


11ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬GitHubÏîÄ¿Õý³ÉΪ¶ñÒâÌá½»ºÍÀ­È¡ÇëÇóµÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÏòÕâЩÏîĿעÈëºóÃÅ¡£¡£¡£¡£¡£×î½ü£¬£¬£¬£¬£¬£¬£¬Exo LabsµÄGitHub´æ´¢¿â¾ÍÔâµ½ÁË´ËÀ๥»÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÌá½»¿´ËÆÎÞº¦µÄ´úÂë¸ü¸Ä£¬£¬£¬£¬£¬£¬£¬ÊÔͼÔÚ´úÂëÖÐÖ²ÈëºóÃÅ£¬£¬£¬£¬£¬£¬£¬ÒÔÔ¶³ÌÖ´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬¸Ã´úÂë¸ü¸Ä²¢Î´±»Åú×¼ºÏ²¢µ½¹Ù·½´æ´¢¿â¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓõÄGitHubÕË»§¡°evildojo666¡±ÏÖÒѱ»É¾³ý£¬£¬£¬£¬£¬£¬£¬¶ø¸ÃÕË»§Ö¸ÏòµÄÇå¾²Ñо¿Ô±Mike BellÔò·ñ¶¨Óë´ËÊÂÓйØ£¬£¬£¬£¬£¬£¬£¬²¢Éù³Æ×Ô¼ºÔâµ½ÁËð³ä¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÉÐÓÐÆäËûÏîĿҲ³ÉΪÁËÀàËÆµÄ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ê¢ÐеĿªÔ´ÒôƵºÍÊÓÆµÏÂÔØÆ÷¡°yt-dlp¡±¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÊÂÎñÌáÐÑ¿ªÔ´ÏîĿά»¤ÕßÒª×ÐϸÉó²é´«ÈëµÄÀ­È¡ÇëÇ󣬣¬£¬£¬£¬£¬£¬×ÝÈ»ËüÃÇÀ´×Ô¿´ËÆ¡°ÉÆÒ⡱µÄТ˳Õߣ¬£¬£¬£¬£¬£¬£¬Ò²Ó¦Ê¹ÓÃ×Ô¶¯»¯¹¤¾ßºÍ´ó×ÚÈ˹¤´úÂëÉó²éÀ´È·±£Çå¾²¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/github-projects-targeted-with-malicious-commits-to-frame-researcher/


3. Maxar Space SystemsÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬Ô±¹¤Ð¡ÎÒ˽¼ÒÊý¾ÝÔâÇÔÈ¡


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÎÀÐÇÖÆÔìÉÌMaxar Space SystemsÔâÊܺڿÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ±¹¤Ð¡ÎÒ˽¼ÒÊý¾Ý±»ÇÔÈ¡¡£¡£¡£¡£¡£ºÚ¿ÍÔÚ2024Äê10ÔÂ11ÈÕ±»·¢Ã÷ǰÒÑÇÖÈë¹«Ë¾ÍøÂçÔ¼Ò»ÖÜʱ¼ä¡£¡£¡£¡£¡£Maxar Space SystemsÊÇÃÀ¹úº½¿Õº½ÌìÒµµÄÖ÷Òª¼ÓÈëÕߣ¬£¬£¬£¬£¬£¬£¬ÒÑÖÆ×÷80¶à¿ÅÔÚ¹ìÎÀÐÇ£¬£¬£¬£¬£¬£¬£¬²¢ÎªNASAµÄPsycheʹÃüºÍArtemisÔÂÇò̽Ë÷ÍýÏëÌṩÁËÒªº¦ÊÖÒÕ¡£¡£¡£¡£¡£Ð¹Â¶µÄÔ±¹¤ÐÅÏ¢°üÀ¨ÐÕÃû¡¢¼ÒÍ¥µØµã¡¢Éç»á°ü¹ÜºÅÂëµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ«ÒøÐÐÕË»§ÐÅϢδÊÜÓ°Ïì¡£¡£¡£¡£¡£ÊÜÓ°ÏìÔ±¹¤¿ÉÏíÊÜIDShieldÉí·Ý± £»£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬£¬¶øÇ°ÈÎÔ±¹¤¿ÉÔÚ»®×¼Ê±¼äÄÚ×¢²áIDXµÄÉí·Ý͵ÇÔ± £»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÓÐÐÂÎųƺڿͻ¹Éù³ÆÇÔÈ¡ÁËMaxar Technologies¿ª·¢µÄµØÀí¿Õ¼äÇ鱨ƽ̨GeoHIVEµÄÓû§Èº£¬£¬£¬£¬£¬£¬£¬µ«Maxar TechnologiesÉÐδ¶Ô´Ë½ÒÏþ̸ÂÛ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-space-tech-giant-maxar-discloses-employee-data-breach/


4. ²©Í¨ÖÒÑÔ£ºVMware vCenter ServerÁ½´óÎó²îÕý±»¹¥»÷ÕßʹÓÃ


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬²©Í¨¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬Ö¸³ö¹¥»÷ÕßÕýÔÚʹÓÃVMware vCenter ServerµÄÁ½¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ֮һΪÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2024-38812£©£¬£¬£¬£¬£¬£¬£¬ÓÉTZLÇå¾²Ñо¿Ö°Ô±ÔÚÖйú2024 Matrix CupºÚ¿Í´óÈüʱ´ú±¨¸æ¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚvCenterµÄDCE/RPCЭÒéʵÏÖÖеĶÑÒç³öÎÊÌ⣬£¬£¬£¬£¬£¬£¬Ó°ÏìVMware vSphereºÍVMware Cloud FoundationµÈ²úÆ·¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²î£¨CVE-2024-38813£©ÎªÈ¨ÏÞÌáÉýÎó²î£¬£¬£¬£¬£¬£¬£¬Í¬ÑùÓɸÃÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÌØÖÆÍøÂçÊý¾Ý°üÌáÉýÖÁrootȨÏÞ¡£¡£¡£¡£¡£²©Í¨È·ÈÏÕâÁ½¸öÎó²îÒѱ»Ê¹Ó㬣¬£¬£¬£¬£¬£¬²¢ÓÚ9ÔÂÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬µ«Ëæºó·¢Ã÷CVE-2024-38812µÄ²¹¶¡²¢Î´ÍêÈ«½â¾öÎÊÌ⣬£¬£¬£¬£¬£¬£¬²¢Ç¿ÁÒ½¨ÒéÖÎÀíÔ±Ó¦ÓÃв¹¶¡¡£¡£¡£¡£¡£ÊÜÓ°Ïì¿Í»§Ó¦Á¬Ã¦Ó¦ÓÃ×îиüÐÂÒÔÌá·À¹¥»÷¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬²©Í¨»¹Ðû²¼ÁËÔö²¹Í¨¸æ£¬£¬£¬£¬£¬£¬£¬Ìṩ¸ü¶àÇå¾²¸üÐÂÐÅÏ¢ºÍ¿ÉÄÜÓ°ÏìÒÑÉý¼¶Óû§µÄÒÑÖªÎÊÌâ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-vmware-vcenter-server-now-exploited-in-attacks/


5. DocuSignÍøÂç´¹ÂÚÕ©Æ­¼¤Ôö£¬£¬£¬£¬£¬£¬£¬Ã°³äÃÀÕþ¸®»ú¹¹ÇÔÈ¡Êý¾Ý


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬DocuSignÍøÂç´¹ÂÚÕ©Æ­ÊýÄ¿½üÆÚ¼¤Ôö98%£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÐÅÈÎÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬£¬Ã°³äÃÀ¹úÕþ¸®»ú¹¹ÈçÎÀÉúÓ빫ÖÚЧÀͲ¿(HHS)ºÍÂíÀïÀ¼Öݽ»Í¨²¿(MDOT)µÈ·¢ËÍ´¹ÂÚURL¡£¡£¡£¡£¡£ÕâЩ´¹ÂÚURL±»Éè¼Æ³ÉÄ£Äâ¹Ù·½Í¨Ñ¶£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÕæÕýµÄDocuSignÕÊ»§ºÍAPIαװ³ÉÕæÊµÇëÇ󡣡£¡£¡£¡£Ò»µ©Ä¿µÄ·­¿ª¶ñÒâÎĵµ£¬£¬£¬£¬£¬£¬£¬¾Í»á±»ÒªÇóÌṩÃô¸ÐÐÅÏ¢»òÊÚȨڲƭÉúÒâ¡£¡£¡£¡£¡£ÓÉÓÚÇëÇó¿´Ëƹٷ½£¬£¬£¬£¬£¬£¬£¬ÊÕ¼þÈ˸ü¿ÉÄÜδ¾­³¹µ×ÑéÖ¤¾Í×ñÊØÇëÇ󣬣¬£¬£¬£¬£¬£¬Î£¼°¹«Ë¾Çå¾²¡£¡£¡£¡£¡£ÃÀ¹ú¹«Ãñ¡¢Õþ¸®»ú¹¹ºÍÊÐÕþ°ì¹«ÊÒÊÇÕâЩ¹¥»÷µÄÖ÷ҪĿµÄ¡£¡£¡£¡£¡£×¨¼Ò½¨ÒéÆóҵʵÑé¶à²ãÇå¾²Õ½ÂÔ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÊܺ¦Õß×ñÕÕµÄÊÇËûÃǽÓÊܹýÅàѵ²¢±»ÆÚÍû×ñÕÕµÄÁ÷³Ì£¬£¬£¬£¬£¬£¬£¬ÎÊÌâÔÚÓÚÎÞ·¨ÑéÖ¤ÇëÇóȪԴ£¬£¬£¬£¬£¬£¬£¬ÐèÒªÖØÐÂ˼Á¿ÔõÑùÌṩÊðÃûÇëÇ󣬣¬£¬£¬£¬£¬£¬²¢¿ÉÄܽÓÄÉǿʢµÄÉí·ÝÑéÖ¤ÒªÁì¡£¡£¡£¡£¡£


https://hackread.com/us-govt-agencies-impersonate-docusign-phishing-scams/


6. ÃÀÒûÓÃˮϵͳ´æÍøÂçÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬»òÖÂЧÀÍÖÐÖ¹


11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÇéÐα £»£»£»£»£»¤Êð£¨EPA£©¼à²ì³¤°ì¹«ÊÒ£¨OIG£©Ðû²¼µÄб¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÎªÃÀ¹úÔ¼1.1ÒÚÈËÌṩЧÀ͵Ä300¶à¸öÒûÓÃˮϵͳ±£´æÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£ÆÀ¹Àº­¸Ç1062¸öÒûÓÃˮϵͳ£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÆäÖÐËÄ·ÖÖ®Ò»¿ÉÄܳÉΪ¹¥»÷Êܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬µ¼Ö¹¦Ð§Ëðʧ¡¢¾Ü¾øÐ§À͵ÈÇéÐμ°¿Í»§ÐÅϢй¶¡£¡£¡£¡£¡£97¸ö¹©Ë®ÏµÍ³±£´æÑÏÖØºÍ¸ß¶ÈÑÏÖØÎÊÌ⣬£¬£¬£¬£¬£¬£¬ÁýÕÖÔ¼2700ÍòÈË £»£»£»£»£»211¸öϵͳÊÜÖжȺ͵ͶÈȱÏÝÓ°Ï죬£¬£¬£¬£¬£¬£¬ÁýÕÖÔ¼8300ÍòÈË¡£¡£¡£¡£¡£OIGÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Èô¶ñÒâÐÐΪÕßʹÓÃÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÆÆËðЧÀÍ»òÔì³ÉÎïÀíË𻵡£¡£¡£¡£¡£ÆÀ¹ÀÉæ¼°Áè¼Ý75000¸öIPºÍ14400¸öÓòµÄÆÊÎö¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬EPAȱ·¦Ïò¸Ã»ú¹¹×ª´ïÍøÂçÇå¾²ÊÂÎñµÄ±¨¸æÏµÍ³£¬£¬£¬£¬£¬£¬£¬²¢ÒÀÀµÆäËû»ú¹¹¾ÙÐдËÀ౨¸æ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±È±·¦ÓëÆäËûÁª°îºÍÖÝÕþ¸®µÄЭµ÷¼Í¼¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬ÒÑÓÐË®Îñ¹«Ë¾ÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«¹©Ë®Ð§ÀÍδÊÜÓ°Ïì¡£¡£¡£¡£¡£½ñÄê5Ô£¬£¬£¬£¬£¬£¬£¬EPAÔøÖÒÑÔ³¬70%¹©Ë®ÏµÍ³²»Çкϡ¶Çå¾²ÒûÓÃË®·¨¡·£¬£¬£¬£¬£¬£¬£¬±£´æÑÏÖØÇå¾²ÎÊÌâ¡£¡£¡£¡£¡£


https://www.securityweek.com/300-drinking-water-systems-in-us-exposed-to-disruptive-damaging-hacker-attacks/