Ñо¿Ö°Ô±¼ì²âµ½241¸ö¶ñÒânpmºÍPyPI°ü·Ö·¢ÍÚ¿óÈí¼þ
Ðû²¼Ê±¼ä 2022-08-22
¾ÝýÌå8ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÉÏÖÜÒÑ·¢Ã÷ÁËÖÁÉÙ241¸ö¶ñÒâµÄPyPIºÍnpm°ü£¬£¬£¬£¬£¬ÕâЩ°ü»áÔÚѬȾLinux×°±¸ºó»á×°ÖöñÒâÍÚ¿óÈí¼þ¡£¡£¡£¡£ÉÏÖÜÈý£¬£¬£¬£¬£¬Ñо¿Ö°Ô±¹ûÕæÁËÔÚPyPIÉÏ·¢Ã÷µÄ33¸öÏîÄ¿£¬£¬£¬£¬£¬¿ÉÔÚѬȾϵͳºóÆô¶¯¿ªÔ´ÃÅÂÞ±Ò¼ÓÃÜ¿ó¹¤XMRig¡£¡£¡£¡£ÔÚÕâЩ°ü±»É¾³ýºó£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÓÖ·¢Ã÷ÁËÁíÒ»×é¾ßÓÐÏàͬpayloadµÄ22¸ö°ü¡£¡£¡£¡£SonatypeÔÚ8ÔÂ19ÈÕÅû¶ÁË186¸önpmÓòÃûÇÀ×¢¶ñÒâ°ü£¬£¬£¬£¬£¬ËüÃǾùÀ´×ÔÄäÃûÕÊ»§17b4a931£¬£¬£¬£¬£¬Ä£ÄâÁ˳£ÓõÄhttp-errors JavaScript¿â¡£¡£¡£¡£Ñо¿Ö°Ô±Æ¾Ö¤ÊÖÒÕÖ¸±êÍÆ¶Ï£¬£¬£¬£¬£¬Õâ241¸ö¶ñÒâ°üÓÉͳһ¹¥»÷ÕßÐû²¼¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/241-npm-and-pypi-packages-caught-dropping-linux-cryptominers/
2¡¢ÐÂľÂíGrandoreiroÖ÷ÒªÕë¶ÔÄ«Î÷¸çºÍÎ÷°àÑÀµÈ¹ú¼Ò
8ÔÂ18ÈÕ£¬£¬£¬£¬£¬Zscaler ThreatLabzÅû¶ÁËÐÂľÂíGrandoreiroÕë¶ÔÄ«Î÷¸çºÍÎ÷°àÑÀµÈ¹ú¼ÒµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖÁÉÙ×Ô2017ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÓÚ2022Äê6ÔÂ×îÏÈ£¬£¬£¬£¬£¬²¢ÇÒÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¹¥»÷Õßαװ³ÉÀ´×ÔÄ«Î÷¸ç×ÜÉó²é³¤°ì¹«ÊÒ»òÎ÷°àÑÀ¹«¹²²¿£¬£¬£¬£¬£¬×îÖÕpayloadʹÓôÓASUSTEK͵À´µÄÖ¤ÊéÊðÃû£¬£¬£¬£¬£¬Í¨¹ý¶þ½øÖÆÌî³äµÄÒªÁ콫¾ÞϸÅòÕ͵½400MB£¬£¬£¬£¬£¬À´ÈƹýɳÏäÆÊÎö¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬×îеÄGrandoreiro±äÌåÐÂÔöÁËʹÓÃDGA¾ÙÐÐC2ͨѶµÄ¹¦Ð§£¬£¬£¬£¬£¬ÕâʹµÃ·¢Ã÷¶ñÒâÈí¼þµÄ»ù´¡ÉèÊ©²¢½«Æä²ð³ý±äµÃ¸üÄÑ¡£¡£¡£¡£
https://www.zscaler.com/blogs/security-research/grandoreiro-banking-trojan-new-ttps-targeting-various-industry-verticals
3¡¢WPÍøÕ¾±»ÈëÇÖºóÏÔʾαÔìCloudflare¾¯±¨²¢×°ÖöñÒâÈí¼þ
8ÔÂ18ÈÕ£¬£¬£¬£¬£¬Sucuri³ÆWordPressÍøÕ¾±»ÈëÇÖºó»áÏÔʾαÔìµÄCloudflare DDoS±£»£»£»¤Ò³Ã棬£¬£¬£¬£¬À´·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬¹¥»÷Õß»áÈëÇÖÄ¿µÄWordPressÍøÕ¾²¢Ö²ÈëÒ»¸ö»ìÏýµÄJavaScript payload£¬£¬£¬£¬£¬Ëü¿ÉÏÔʾһ¸öαÔìµÄCloudflare DDoS±£»£»£»¤½çÃæ¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬Ä¿µÄ»á±»ÒªÇóÏÂÔØÎļþsecurity_install.iso£¬£¬£¬£¬£¬Æä±»ÐÎÃ²ÎªÈÆ¹ýDDoSÑéÖ¤ËùÐèµÄ¹¤¾ß¡£¡£¡£¡£·¿ª¸ÃÎļþ»á¿´µ½security_install.exe£¬£¬£¬£¬£¬Ö´ÐиÃEXEÎļþ½«×°ÖöñÒâÈí¼þNetSupport RATºÍRaccoon Stealer¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/wordpress-sites-hacked-with-fake-cloudflare-ddos-alerts-pushing-malware/
4¡¢Proofpoint·¢Ã÷TA558¹¥»÷À¶¡ÃÀÖÞÂùݺÍÂÃÓÎÐÐÒµ
ProofpointÔÚ8ÔÂ18ÈÕÐû²¼Á˹ØÓÚºÚ¿ÍÍÅ»ïTA558µÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£TA558¿ÉÄÜÊÇÒ»¸ö³öÓÚ¾¼ÃÄîÍ·µÄСÐͺڿÍÍŻ£¬£¬£¬£¬×Ô2018ÄêÒÔÀ´×îÏÈ»îÔ¾£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔλÓÚÀ¶¡ÃÀÖÞµØÇøµÄÂùݺÍÂÃÓÎÐÐÒµ£¬£¬£¬£¬£¬ÓÐʱҲ»áÕë¶ÔÎ÷Å·ºÍ±±ÃÀµØÇø¡£¡£¡£¡£×î½üµÄ»î¶¯ÖУ¬£¬£¬£¬£¬¹¥»÷Õß´ÓʹÓðüÀ¨ºêµÄMicrosoft Office¸½¼þ£¬£¬£¬£¬£¬×ª¶øÊ¹ÓÃURLºÍISOÎļþÀ´ÊµÏÖ³õʼѬȾ£¬£¬£¬£¬£¬´Ë¾Ù¿ÉÄÜÊǶÔ΢Èí¾öÒéĬÈÏ×èÖ¹´ÓÍøÂçÏÂÔØÎļþÖеĺê×ö³öµÄ»ØÓ¦¡£¡£¡£¡£
https://www.proofpoint.com/us/blog/threat-insight/reservations-requested-ta558-targets-hospitality-and-travel
5¡¢°®É³ÄáÑÇÕþ¸®Éù³ÆÒÑ×èÖ¹KillnetÍÅ»ï¶ÔÆäµÄDDoS¹¥»÷
¾Ý8ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬°®É³ÄáÑÇÕþ¸®Éù³Æ×Ô2007ÄêÒÔÀ´×îÑÏÖØµÄDDoS¹¥»÷¡£¡£¡£¡£´Ë´Î¹¥»÷¼ÈÕë¶Ô¹«¹²»ú¹¹£¬£¬£¬£¬£¬Ò²Õë¶Ô˽Ӫ¹«Ë¾£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯KillnetÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Õþ¸®Ê×ϯÐÅÏ¢¹ÙÅúÅÐÁ˸Ã×éÖ¯¹ØÓÚ200¶à¸öÍøÕ¾Òѱ»²é·âµÄ˵·¨£¬£¬£¬£¬£¬²¢ÌåÏÖE-EstoniaÒÑÆô¶¯²¢ÔËÐУ¬£¬£¬£¬£¬Ð§ÀÍûÓÐÖÐÖ¹¡£¡£¡£¡£°®É³ÄáÑÇÅÌËã»úÓ¦¼±ÏìӦС×é͸¶£¬£¬£¬£¬£¬°üÀ¨¾¯Ô±ºÍÕþ¸®ÔÚÄڵĵط½Õþ¸®µÄÍøÕ¾ÒÔ¼°Ò»¼ÒÎïÁ÷¹«Ë¾Ôâµ½¹¥»÷¡£¡£¡£¡£
https://securityaffairs.co/wordpress/134560/cyber-warfare-2/estonia-blocked-cyberattacks-killnet.html
6¡¢MicrosoftÅû¶ChromeOS×é¼þÖÐÄÚ´æËð»µÎó²îµÄϸ½Ú
MicrosoftÔÚ8ÔÂ19ÈÕÐû²¼Á˹ØÓÚChromeOS×é¼þÖÐÄÚ´æËð»µÎó²îµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2022-2587£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬¿É±»ÓÃÀ´Ö´ÐÐDoS£¬£¬£¬£¬£¬»òÕßÔÚ¼«¶ËÇéÐÎÏÂÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚGoogle ChromeÒôƵЧÀÍÆ÷£¬£¬£¬£¬£¬¿É±»Ô¶³Ì¹¥»÷Õßͨ¹ýÌØÖÆµÄÒôƵԪÊý¾ÝʹÓᣡ£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´£¬£¬£¬£¬£¬ÉÐδ±»ÔÚҰʹÓᣡ£¡£¡£
https://www.microsoft.com/security/blog/2022/08/19/uncovering-a-chromeos-remote-memory-corruption-vulnerability/


¾©¹«Íø°²±¸11010802024551ºÅ