¶ñÒâGoogle¹ã¸æÍÆËÍ´øÓÐÒþ²ØºóÃŵļÙIPɨÃèÈí¼þ

Ðû²¼Ê±¼ä 2024-04-19

1. ¶ñÒâGoogle¹ã¸æÍÆËÍ´øÓÐÒþ²ØºóÃŵļÙIPɨÃèÈí¼þ


4ÔÂ18ÈÕ£¬ £¬£¬£¬£¬ £¬£¬Ð嵀 Google ¶ñÒâ¹ã¸æ»î¶¯ÕýÔÚʹÓÃÒ»×éÄ£ÄâÕýµ± IP ɨÃèÈí¼þµÄÓòÀ´Ìṩһ¸öÒÔǰδ֪µÄÃûΪMadMxShell µÄºóÃÅ¡£¡£¡£¡£ ¡£ÍþвÐÐΪÕßʹÓÃÎóÖ²ÊÖÒÕ×¢²áÁ˶à¸öÏàËÆµÄÓòÃû£¬ £¬£¬£¬£¬ £¬£¬²¢Ê¹Óà Google Ads ½«ÕâЩÓòÃûÍÆÖÁÕë¶ÔÌØ¶¨ËÑË÷Òªº¦×ÖµÄËÑË÷ÒýÇæÐ§¹ûµÄ¶¥²¿£¬ £¬£¬£¬£¬ £¬£¬´Ó¶øÒýÓÕÊܺ¦Õß»á¼ûÕâÐ©ÍøÕ¾¡£¡£¡£¡£ ¡£¾Ý³Æ£¬ £¬£¬£¬£¬ £¬£¬2023 Äê 11 ÔÂÖÁ 2024 Äê 3 ÔÂʱ´ú×¢²áµÄÓòÃû¶à´ï 45 ¸ö£¬ £¬£¬£¬£¬ £¬£¬ÕâÐ©ÍøÕ¾Î±×°³É¶Ë¿ÚɨÃèºÍ IT ÖÎÀíÈí¼þ£¬ £¬£¬£¬£¬ £¬£¬Èç Advanced IP Scanner¡¢Angry IP Scanner¡¢IP ɨÃèÒÇ PRTG ºÍ ManageEngine¡£¡£¡£¡£ ¡£ËäÈ»Õâ²¢²»ÊÇÍþвÐÐΪÕßµÚÒ»´ÎʹÓöñÒâ¹ã¸æÊÖÒÕͨ¹ýÏàËÆµÄÍøÕ¾Ìṩ¶ñÒâÈí¼þЧÀÍ£¬ £¬£¬£¬£¬ £¬£¬µ«ÕâÒ»Éú³¤±ê¼Ç׎»¸¶¹¤¾ßÊ״α»ÓÃÀ´Èö²¥ÖØ´óµÄ Windows ºóÃÅ¡£¡£¡£¡£ ¡£


https://thehackernews.com/2024/04/malicious-google-ads-pushing-fake-ip.html


2. ¹¥»÷ÕßʹÓÃOpenMetadataÔÚKubernetesÉϾÙÐÐÍÚ¿ó


4ÔÂ17ÈÕ£¬ £¬£¬£¬£¬ £¬£¬Microsoft Threat Intelligence ·¢Ã÷ÁËÕë¶ÔÔËÐÐÊ¢ÐпªÔ´ÔªÊý¾Ýƽ̨ OpenMetadata µÄ Kubernetes ¼¯ÈºµÄй¥»÷»î¶¯¡£¡£¡£¡£ ¡£¹¥»÷ÕßÕýÔÚʹÓÃһϵÁÐ×î½üÅû¶µÄÒªº¦Îó²îÀ´»á¼ûÊÂÇé¸ºÔØ²¢×°ÖüÓÃÜÇ®±ÒÍÚ¾ò¶ñÒâÈí¼þ¡£¡£¡£¡£ ¡£¸Ã¹¥»÷ʹÓÃÁË 1.3.1 ֮ǰµÄ OpenMetadata °æ±¾Öб£´æµÄ¶à¸öÇå¾²Îó²î£¨CVE-2024-28255¡¢CVE-2024-28847¡¢CVE-2024-28253¡¢CVE-2024-28848¡¢CVE-2024-28254£©¡£¡£¡£¡£ ¡£ÀÖ³ÉʹÓøÃÎó²î½«¸¶Óë¹¥»÷ÕßÔ¶³ÌÖ´ÐдúÂëµÄÄÜÁ¦£¬ £¬£¬£¬£¬ £¬£¬´Ó¶øÊ¹ËûÃÇÄܹ»ÍêÈ«¿ØÖÆÊÜÓ°ÏìµÄϵͳ¡£¡£¡£¡£ ¡£¹¥»÷ͨ³£´ÓÍøÂç·¸·¨·Ö×ÓɨÃèÔËÐÐÒ×Êܹ¥»÷µÄ OpenMetadata ʵÀýµÄ̻¶ÓÚ»¥ÁªÍøµÄ Kubernetes ÊÂÇé¸ºÔØ×îÏÈ¡£¡£¡£¡£ ¡£Ò»µ©Ê¶±ð³öÄ¿µÄ£¬ £¬£¬£¬£¬ £¬£¬¹¥»÷Õ߾ͻáʹÓÃÕâЩÎó²îÀ´¿ØÖÆÍÐ¹Ü OpenMetadata µÄÈÝÆ÷¡£¡£¡£¡£ ¡£


https://securityonline.info/attackers-exploit-critical-openmetadata-flaws-for-cryptomining-on-kubernetes/


3. SoumniBot ¶ñÒâÈí¼þʹÓà Android Îó²îÀ´Èƹý¼ì²â


4ÔÂ17ÈÕ£¬ £¬£¬£¬£¬ £¬£¬Ò»ÖÖÃûΪ¡°SoumniBot¡±µÄРAndroid ÒøÐжñÒâÈí¼þͨ¹ýʹÓà Android Çåµ¥ÌáȡϢÕùÎöÀú³ÌÖеÄÈõµã£¬ £¬£¬£¬£¬ £¬£¬Ê¹ÓÃÒ»ÖÖ²»Ì«³£¼ûµÄ»ìÏýÒªÁì¡£¡£¡£¡£ ¡£¸ÃÒªÁìʹ SoumniBot Äܹ»¹æ±Ü Android ÊÖ»úÖеıê×¼Çå¾²²½·¥²¢Ö´ÐÐÐÅÏ¢ÇÔÈ¡²Ù×÷¡£¡£¡£¡£ ¡£¸Ã¶ñÒâÈí¼þÓÉ¿¨°Í˹»ùÑо¿Ö°Ô±·¢Ã÷²¢ÆÊÎö£¬ £¬£¬£¬£¬ £¬£¬ËûÃÇÌṩÁË ¸Ã¶ñÒâÈí¼þʹÓà Android Àý³ÌÆÊÎöºÍÌáÈ¡ APK Çåµ¥µÄÒªÁìµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£ ¡£Çåµ¥Îļþ£¨¡°AndroidManifest.xml¡±£©Î»ÓÚÿ¸öÓ¦ÓóÌÐòµÄ¸ùĿ¼ÖУ¬ £¬£¬£¬£¬ £¬£¬°üÀ¨ÓйØ×é¼þ£¨Ð§ÀÍ¡¢¹ã²¥ÎüÊÕÆ÷¡¢ÄÚÈÝÌṩ³ÌÐò£©¡¢È¨ÏÞºÍÓ¦ÓóÌÐòÊý¾ÝµÄÏêϸÐÅÏ¢¡£¡£¡£¡£ ¡£ËäÈ»¶ñÒâ APK ¿ÉÒÔʹÓà Zimperium µÄÖÖÖÖѹËõ¼¼ÇÉÀ´ÓÞŪÇå¾²¹¤¾ß²¢ÌӱܯÊÎö£¬ £¬£¬£¬£¬ £¬£¬µ«¿¨°Í˹»ùÆÊÎöʦ·¢Ã÷ SoumniBot ʹÓÃÈýÖÖ²î±ðµÄÒªÁìÀ´ÈƹýÆÊÎöÆ÷¼ì²é£¬ £¬£¬£¬£¬ £¬£¬ÆäÖÐÉæ¼°Ê¹ÓÃÇåµ¥ÎļþµÄѹËõºÍ¾Þϸ¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/soumnibot-malware-exploits-android-bugs-to-evade-detection/


4. FIN7 Õë¶ÔÃÀ¹úÆû³µÖÆÔìÉÌµÄ IT Ô±¹¤Ìá³«ÍøÂç´¹ÂÚ¹¥»÷


4ÔÂ17ÈÕ£¬ £¬£¬£¬£¬ £¬£¬³öÓÚ¾­¼ÃÄîÍ·µÄÍþв×éÖ¯ FIN7 Õë¶ÔÒ»¼ÒÃÀ¹ú´óÐÍÆû³µÖÆÔìÉÌ£¬ £¬£¬£¬£¬ £¬£¬Ïò IT ²¿·ÖµÄÔ±¹¤·¢ËÍÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ£¬ £¬£¬£¬£¬ £¬£¬ÒÔʹÓà Anunak ºóÃÅѬȾϵͳ¡£¡£¡£¡£ ¡£¾ÝºÚÝ®Ñо¿Ö°Ô±³Æ£¬ £¬£¬£¬£¬ £¬£¬Õâ´Î¹¥»÷±¬·¢ÔÚÈ¥Äêµ×£¬ £¬£¬£¬£¬ £¬£¬²¢ÇÒÒÀÀµÓÚ·ÇÍâµØ¶þ½øÖÆÎļþ¡¢¾ç±¾ºÍ¿â (LoLBas)¡£¡£¡£¡£ ¡£ÍþвÐÐΪÕß½«Öصã·ÅÔÚ¾ßÓи߼¶È¨ÏÞµÄÄ¿µÄÉÏ£¬ £¬£¬£¬£¬ £¬£¬Í¨¹ýð³äÕýµ±¸ß¼¶ IP ɨÃèÆ÷¹¤¾ßµÄ¶ñÒâ URL Á´½ÓÀ´ÒýÓÕËûÃÇ¡£¡£¡£¡£ ¡£ºÚÝ®¸ß¶ÈÈ·ÐŴ˴ι¥»÷ÊÇÓÉ FIN7 ÌᳫµÄ£¬ £¬£¬£¬£¬ £¬£¬ÓÉÓڸù¥»÷ʹÓÃÁËÆæÒìµÄ PowerShell ¾ç±¾£¬ £¬£¬£¬£¬ £¬£¬¸Ã¾ç±¾Ê¹ÓÃÁ˵ÐÊÖµÄÊðÃû¡°PowerTrash¡±»ìÏýµÄ shellcode ŲÓóÌÐò£¬ £¬£¬£¬£¬ £¬£¬¸Ã¾ç±¾Ê״ηºÆðÔÚ 2022 ÄêµÄÒ»´Î»î¶¯ÖС£¡£¡£¡£ ¡£ÔÚ´Ë֮ǰ£¬ £¬£¬£¬£¬ £¬£¬FIN7 ±»·¢Ã÷ÒÔ̻¶µÄVeeam ±¸·ÝºÍMicrosoft ExchangeЧÀÍÆ÷ΪĿµÄ£¬ £¬£¬£¬£¬ £¬£¬²¢½«Black BastaºÍClop ÀÕË÷Èí¼þ¸ºÔذ²Åŵ½ÆóÒµÍøÂçÉÏ¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/fin7-targets-american-automakers-it-staff-in-phishing-attacks/


5. Óë¶íÂÞ˹ÓйصÄSandworm ¹¥»÷¾üÆ÷¿âÖеÄкóÃÅKapeka


4ÔÂ17ÈÕ£¬ £¬£¬£¬£¬ £¬£¬³ýÁË΢ÈíÓÚ 2024 Äê 2 Ô 14 ÈÕÐû²¼µÄ¹ØÓÚ·¢Ã÷Ò»¸öÃûΪ KnuckleTouch µÄкóÃŵļò¶ÌÐÎò֮Í⣬ £¬£¬£¬£¬ £¬£¬ÏÖÔÚ¹«ÖÚ¶Ô Kapeka ºóÃŵÄÏàʶÏÕЩΪÁã¡£¡£¡£¡£ ¡£Î¢Èí½« KnuckleTouch ºóÃŹé×ïÓÚ SeaShell Blizzard£¬ £¬£¬£¬£¬ £¬£¬ÕâÊÇÆä¶Ô Sandworm µÄÃû³Æ¡£¡£¡£¡£ ¡£Microsoft ÉÐδ¶Ô´Ë¶ñÒâÈí¼þ¾ÙÐÐÆÊÎö£¬ £¬£¬£¬£¬ £¬£¬µ« WithSecure È·ÐÅ KnuckleTouch ¾ÍÊÇ Kapeka¡£¡£¡£¡£ ¡£Î¢ÈíºÍ WithSecure ÒÔΪ¸Ã¶ñÒâÈí¼þ×Ô 2022 ÄêÒÔÀ´Ò»Ö±ÔÚʹÓ㬠£¬£¬£¬£¬ £¬£¬µ«³ýÁË WithSecure ÆÊÎöÖ®Í⣬ £¬£¬£¬£¬ £¬£¬ÈËÃÇ¶Ô Kapeka ÖªÖ®ÉõÉÙ¡£¡£¡£¡£ ¡£WithSecure Æù½ñΪֹֻ·¢Ã÷ÁËÁ½¸öÒ°ÍâÑù±¾¡£¡£¡£¡£ ¡£¿£¿£¿£¿£Ë¼Á¿µ½Ä¿½ñµÄµØÔµÕþÖΣ¬ £¬£¬£¬£¬ £¬£¬Êܺ¦ÕßѧҲÅú×¢ÆäÆðÔ´ÓÚ¶íÂÞ˹£º°®É³ÄáÑǺÍÎÚ¿ËÀ¼¡£¡£¡£¡£ ¡£ÕâÖÖÓÐÏÞµÄÒ£²â¿ÉÄÜÊÇÓÉÓڸöñÒâÈí¼þÉÐδÆÕ±éʹÓ㬠£¬£¬£¬£¬ £¬£¬Ò²¿ÉÄÜÊÇÓÉÓÚ Kapeka ͬÐÄЭÁ¦¼á³ÖÒþÃØ¡£¡£¡£¡£ ¡£ 


https://www.securityweek.com/kapeka-a-new-backdoor-in-sandworms-arsenal-of-aggression/


6. VisaÕë¶Ô½ðÈÚ»ú¹¹µÄJSOutProxÈÕÒæÔöÌíµÄÍþв·¢³öͨ¸æ


4ÔÂ17ÈÕ£¬ £¬£¬£¬£¬ £¬£¬Visa ×î½üÐû²¼Á˹ØÓÚÌØÊâΣÏÕµÄJSOutProx ¶ñÒâÈí¼þ»î¶¯ÏÔ×ÅÔöÌíµÄÑÏÖØÇå¾²¾¯±¨¡£¡£¡£¡£ ¡£ÕâÖÖÔ¶³Ì»á¼ûľÂí ( RAT ) ÒÔÆä¶Ô½ðÈÚ»ú¹¹¼°Æä¿Í»§µÄÖØ´ó¹¥»÷ÄÜÁ¦¶øÖøÃû£¬ £¬£¬£¬£¬ £¬£¬ÌØÊâÊÇÕë¶ÔÄÏÑǺͶ«ÄÏÑÇ¡¢Öж«ºÍ·ÇÖÞµØÇø¡£¡£¡£¡£ ¡£JSOutProx ÓÚ 2019 Äê 12 ÔÂÊ״α»·¢Ã÷£¬ £¬£¬£¬£¬ £¬£¬ÊÇÒ»Öָ߶ȻìÏýµÄ JavaScript ºóÃÅ£¬ £¬£¬£¬£¬ £¬£¬Ê¹ÍøÂç·¸·¨·Ö×ÓÄܹ»Ö´Ðдó×Ú¶ñÒâ»î¶¯¡£¡£¡£¡£ ¡£ÆäÖаüÀ¨ÔËÐÐ shell ÏÂÁî¡¢ÏÂÔØÌØÁíÍâÓк¦¸ºÔØ¡¢Ö´ÐÐÎļþ¡¢²¶»ñÆÁÄ»½ØÍ¼ÒÔ¼°ÍêÈ«¿ØÖÆÊÜѬȾװ±¸µÄ¼üÅ̺ÍÊó±ê¡£¡£¡£¡£ ¡£Ëæ×Åʱ¼äµÄÍÆÒÆ£¬ £¬£¬£¬£¬ £¬£¬JSOutProx Ò»Ö±Éú³¤£¬ £¬£¬£¬£¬ £¬£¬ÔöÇ¿ÁËÆä¹æ±ÜÊÖÒÕÒÔ×èÖ¹¼ì²â²¢ÔöÇ¿ÁËÆäÆÆËðÄÜÁ¦¡£¡£¡£¡£ ¡£JSOutProx µÄ³õʼÓÐÓøºÔØÖ§³Ö»ù±¾µ«Òªº¦µÄ¹¦Ð§£¬ £¬£¬£¬£¬ £¬£¬Ê¹¹¥»÷ÕßÄܹ»¶ÔÊÜѬȾµÄϵͳ¾ÙÐÐÏ൱´óµÄ¿ØÖÆ¡£¡£¡£¡£ ¡£


https://securityboulevard.com/2024/04/jsoutprox-malware-variant-targeting-financial-orgs-warns-visa/#google_vignette