ºÚ¿ÍÀÄÓà Amazon ºÍ GitHub °²ÅÅ»ùÓÚ Java µÄ¶ñÒâÈí¼þ
Ðû²¼Ê±¼ä 2024-03-153ÔÂ14ÈÕ£¬£¬£¬£¬ºÚ¿ÍÃé×¼ÕâЩƽ̨ÊÇÓÉÓÚËüÃÇÍйÜ×ÅÃû¹óµÄ×ÊÔ´ºÍÊý¾Ý¡£¡£¡£³öÓÚ¾¼ÃÀûÒæ»òÆäËû²»Á¼ÄîÍ·£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÕâЩƽ̨ÇÔÈ¡Êý¾Ý¡¢°²ÅŶñÒâÈí¼þ»òÌᳫÆäËûÍøÂç¹¥»÷¡£¡£¡£FortiGuard ʵÑéÊÒµÄÍøÂçÇå¾²ÆÊÎöʦ·¢Ã÷£¬£¬£¬£¬ºÚ¿ÍÆð¾¢ÀÄÓà Amazon ºÍ GitHub À´°²ÅÅ»ùÓÚ Java µÄ¶ñÒâÈí¼þ¡£¡£¡£FortiGuard ʵÑéÊÒ·¢Ã÷ÁËÒ»¸öÍøÂç´¹Âڻ£¬£¬£¬£¬ÓÕÆÓû§ÏÂÔØ¶ñÒâ Java ÏÂÔØÆ÷£¬£¬£¬£¬ÆäÄ¿µÄÊÇÈö²¥Ð嵀 VCURMS ºÍ STRRAT RAT¡£¡£¡£ÈËÃÇ·¢Ã÷£¬£¬£¬£¬ÍйÜÔÚ AWS ºÍ GitHub ÉϵĶñÒâÈí¼þÒÑͨ¹ýÉÌÒµ±£»£»£»£»£»£»¤³ÌÐò¾ÙÐÐÁË»ìÏý¡£¡£¡£¹¥»÷Õßͨ¹ýʹÓÃÊܺ¦Õß¶Ë×¢ÖØÒþ˽µÄ Proton Mail ЧÀÍ£¬£¬£¬£¬Ê¹Óõç×ÓÓʼþ¾ÙÐÐ C2¡£¡£¡£ÍøÂç´¹ÂÚµç×ÓÓʼþÒýÓÕÊܺ¦Õßµ¥»÷°´Å¥£¬£¬£¬£¬ÏÂÔØ´øÓÐÄ£ºý×Ö·û´®µÄ¶ñÒâ AWS ÍÐ¹Ü JAR ÏÂÔØ³ÌÐò¡£¡£¡£ÏÂÔØÆ÷»ñÈ¡²¢ÔËÐÐÁíÍâÁ½¸ö JAR£¬£¬£¬£¬ÕâЩ JAR ʹÓÃÉÌÒµ¡°Sense Shield Virbox Protector¡±»ìÏýÆ÷£¬£¬£¬£¬²¢¸½ÓÐÊÔÓÃÆÚµ½ÆÚ֪ͨ¡£¡£¡£
https://gbhackers.com/hackers-abuse-amazon-github/
2. ºÚ¿ÍʹÓà Windows SmartScreen Îó²îͶ·Å DarkGate
3ÔÂ13ÈÕ£¬£¬£¬£¬DarkGate ¶ñÒâÈí¼þ²Ù×÷ÌᳫµÄÐÂÒ»²¨¹¥»÷ʹÓÃÏÖÒÑÐÞ¸´µÄ Windows Defender SmartScreen Îó²îÀ´ÈƹýÇå¾²¼ì²é²¢×Ô¶¯×°ÖÃÐéαÈí¼þ×°ÖóÌÐò¡£¡£¡£SmartScreen ÊÇÒ»Ïî Windows Çå¾²¹¦Ð§£¬£¬£¬£¬µ±Óû§ÊµÑéÔËÐÐ´Ó Internet ÏÂÔØµÄÎÞ·¨Ê¶±ð»ò¿ÉÒÉÎļþʱ£¬£¬£¬£¬Ëü»áÏÔʾÖÒÑÔ¡£¡£¡£±»×·×ÙΪ CVE-2024-21412 µÄȱÏÝÊÇ Windows Defender SmartScreen ȱÏÝ£¬£¬£¬£¬ÔÊÐíÌØÖÆµÄÏÂÔØÎļþÈÆ¹ýÕâЩÇå¾²ÖÒÑÔ¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ý½¨ÉèÖ¸ÏòÔ¶³Ì SMB ¹²ÏíÉÏÍйܵÄÁíÒ»¸ö .url ÎļþµÄ Windows Internet ¿ì½Ý·½·¨£¨.url Îļþ£©À´Ê¹ÓøÃȱÏÝ£¬£¬£¬£¬Õ⽫µ¼ÖÂ×îÖÕλÖõÄÎļþ×Ô¶¯Ö´ÐС£¡£¡£Î¢ÈíÓÚ 2 ÔÂÖÐÑ®ÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼Í¸Â¶£¬£¬£¬£¬³öÓÚ¾¼ÃÄîÍ·µÄ Water Hydra ºÚ¿Í×éÖ¯´ËÇ°Ôø ʹÓøÃÎó²î×÷ΪÁãÈÕÎó²î £¬£¬£¬£¬½«Æä DarkMe ¶ñÒâÈí¼þÖ²ÈëÉúÒâÕßµÄϵͳÖС£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-windows-smartscreen-flaw-to-drop-darkgate-malware/#google_vignette
3. HHS ½«ÊÓ²ì UnitedHealth ºÍÕë¶Ô Change Healthcare µÄÀÕË÷¹¥»÷
3ÔÂ14ÈÕ£¬£¬£¬£¬ÃÀ¹úÎÀÉúÓ빫¹²Ð§ÀͲ¿ (HHS) ÕýÔÚ¶ÔÕë¶Ô Change Healthcare µÄÀÕË÷Èí¼þ¹¥»÷Õö¿ªÊӲ죬£¬£¬£¬´Ëǰ¸Ã¹ú¸÷µØÒ½Ôº¡¢ÕïËùºÍÒ©·¿µÄÒ½ÁƱ£½¡ºÍ¼Æ·ÑÓªÒµÒÑÔâÊÜÊýÖܵÄ×ÌÈÅ¡£¡£¡£¸Ã²¿·ÖµÄÃñȨ°ì¹«ÊÒ (OCR)ÖÜÈý½ÒÏþÁËÒ»·âÐÅ£¬£¬£¬£¬Ðû²¼Õö¿ªÊӲ죬£¬£¬£¬Ö÷ÈÎ Melanie Fontes Rainer дµÀ£¬£¬£¬£¬¡°¼øÓÚÕâ´ÎÍøÂç¹¥»÷µÄ¹æÄ£¿£¿£¿£¿£¿ÕǰÑÏÖØ£¬£¬£¬£¬²¢ÇÒΪÁË»¼ÕߺͿµ½¡µÄ×î´óÀûÒæ£¬£¬£¬£¬ËûÃÇÐèÒªÊÓ²ìÕâÒ»ÇéÐΡ±Õչ˻¤Ê¿ÌṩÕß¡£¡£¡£¡± °×¹¬¹ÙÔ±¡¢Ò½ÁÆÐÐÒµ´ú±í¡¢ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿²¿³¤Ôóά¶û¡¤±´ÈûÀ (Xavier Becerra) ºÍ Change Healthcare ĸ¹«Ë¾ÁªºÏ¿µ½¡¼¯ÍÅ (UnitedHealth Group) Ê×ϯִÐйٰ²µÂ³¡¤ÍþµÙ (Andrew Witty) ÕÙ¿ªÁ˾ۻᣬ£¬£¬£¬ÌÖÂÛ½â¾öΣ»£»£»£»£»£»úÎÊÌâ¡£¡£¡£Fontes Rainer ÌåÏÖ£¬£¬£¬£¬ÊÓ²ì½«ÖØµã¹Ø×¢Êܱ£»£»£»£»£»£»¤µÄ¿µ½¡ÐÅÏ¢ÊÇ·ñÊܵ½Ë𺦣¬£¬£¬£¬ÒÔ¼° Change Healthcare ºÍ UHG ÊÇ·ñ×ñÊØ¿µ½¡°ü¹ÜÁ÷ͨºÍÔðÈη¨°¸ (HIPAA) ¹æÔò¡£¡£¡£
https://therecord.media/hhs-investigating-unitedhealth-after-ransomware-attack
4. PixPirate Android ¶ñÒâÈí¼þʹÓÃÐÂÕ½ÂÔÒþ²ØÔÚÊÖ»úÉÏ
3ÔÂ13ÈÕ£¬£¬£¬£¬ÊÊÓÃÓÚ Android µÄ×îа汾µÄ PixPirate ÒøÐÐľÂí½ÓÄÉÁËÒ»ÖÖÐÂÒªÁ죬£¬£¬£¬¿ÉÒÔÒþ²ØÔÚÊÖ»úÉÏ£¬£¬£¬£¬Í¬Ê±¼á³Ö»î¶¯×´Ì¬£¬£¬£¬£¬×ÝÈ»ÆäµÎ¹ÜÓ¦ÓóÌÐòÒѱ»É¾³ý¡£¡£¡£PixPirate ÊÇÒ»ÖÖÐ嵀 Android ¶ñÒâÈí¼þ£¬£¬£¬£¬ÓÉ Cleafy TIR ÍŶÓÉϸöÔÂÊ״μͼ£¬£¬£¬£¬Õë¶ÔÀ¶¡ÃÀÖÞÒøÐС£¡£¡£Ö»¹Ü Cleafy Ö¸³öÊÇÒ»¸öµ¥¶ÀµÄÏÂÔØÓ¦ÓóÌÐòÆô¶¯Á˸öñÒâÈí¼þ£¬£¬£¬£¬µ«¸Ã±¨¸æ²¢Î´ÉîÈë̽ÌÖÆäÁ¢ÒìµÄÒþ²Ø»ò³¤ÆÚ»úÖÆ£¬£¬£¬£¬»òÕßÕâЩ»úÖÆÊÇ×î½ü²ÅÒýÈëµÄ¡£¡£¡£IBM µÄÒ»·Ýб¨¸æÚ¹ÊÍ˵£¬£¬£¬£¬Óë¶ñÒâÈí¼þÊÔͼÒþ²ØÆäͼ±êµÄ±ê×¼Õ½ÂÔ£¨ÔÚ Android 9 ¼°ÒÔϰ汾ÖпÉÄܱ£´æÕâÖÖÕ½ÂÔ£©Ïà·´£¬£¬£¬£¬PixPirate ²»Ê¹ÓÃÆô¶¯Æ÷ͼ±ê¡£¡£¡£ÕâʹµÃ¶ñÒâÈí¼þÄܹ»ÔÚËùÓÐ×îÐ嵀 Android °æ±¾£¨×î¸ß°æ±¾ 14£©Öмá³ÖÒþ²Ø×´Ì¬¡£¡£¡£
https://www.bleepingcomputer.com/news/security/pixpirate-android-malware-uses-new-tactic-to-hide-on-phones/
5. ChatGPT ²å¼þÎó²î¿ÉÄÜ̻¶Óû§ÕÊ»§Êý¾Ý
3ÔÂ13ÈÕ£¬£¬£¬£¬API Çå¾²¹«Ë¾ Salt Security ¶Ô ChatGPT ²å¼þ¾ÙÐÐÁËÆÊÎö£¬£¬£¬£¬·¢Ã÷Á˶àÖÖÀàÐ͵ÄÎó²î£¬£¬£¬£¬ÕâЩÎó²î¿ÉÄܱ»Ê¹ÓÃÀ´»ñȡDZÔÚµÄÃô¸ÐÊý¾Ý²¢½ÓÊܵÚÈý·½ÍøÕ¾ÉϵÄÕÊ»§¡£¡£¡£ChatGPT ²å¼þʹÓû§Äܹ»»á¼û×îÐÂÐÅÏ¢£¨¶ø²»ÊÇ̸Ìì»úеÈËѵÁ·Ê±Ê¹ÓõÄÏà¶Ô½Ï¾ÉµÄÊý¾Ý£©£¬£¬£¬£¬ÒÔ¼°½« ChatGPT ÓëµÚÈý·½Ð§Àͼ¯³É¡£¡£¡£ÀýÈ磬£¬£¬£¬²å¼þ¿ÉÒÔÔÊÐíÓû§ÓëÆä GitHub ºÍ Google Drive ÕÊ»§¾ÙÐн»»¥¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬µ±Ê¹Óòå¼þʱ£¬£¬£¬£¬ChatGPT ÐèÒª»ñµÃȨÏ޲Żª½«Óû§µÄÊý¾Ý·¢Ë͵½Óë¸Ã²å¼þ¹ØÁªµÄÍøÕ¾£¬£¬£¬£¬²¢ÇҸòå¼þ¿ÉÄÜÐèÒª»á¼ûÓëÆä½»»¥µÄЧÀÍÉϵÄÓû§ÕÊ»§¡£¡£¡£
https://www.securityweek.com/chatgpt-plugin-vulnerabilities-exposed-data-accounts/
6. Á÷ýÌ幫˾ RokuÁè¼Ý15000 ¸öÕË»§ÐÅϢй¶
3ÔÂ13ÈÕ£¬£¬£¬£¬Á÷ýÌ幫˾ Roku ͸¶£¬£¬£¬£¬Áè¼Ý 15,000 ¸ö¿Í»§µÄÕÊ»§Òò²»Ïà¹ØÊý¾Ýй¶¶ø±»ÇÔÈ¡µÄµÇ¼ƾ֤Ôâµ½ºÚ¿Í¹¥»÷¡£¡£¡£RokuÔÚÏòÃåÒòÖݺͼÓÀû¸£ÄáÑÇÖÝ×ÜÉó²é³¤·¢³öµÄÊý¾Ýй¶֪ͨÖÐÌåÏÖ£¬£¬£¬£¬ºÚ¿ÍÔÚ´Ó 2023 Äê 12 Ô 28 ÈÕÒ»Á¬µ½ 2024 Äê 2 Ô 21 ÈյĻÖлá¼ûÁË 15,363 ÃûÃÀ¹úסÃñµÄÕË»§¡£¡£¡£ÕâЩ¹¥»÷Ö®ÒÔÊÇÓÐÓ㬣¬£¬£¬ÊÇÓÉÓÚһЩ Roku ÕÊ»§ËùÓÐÕß¹ýʧµØÔÚ Roku ÉÏʹÓÃÁËÓë¶à¸öÆäËûÍøÕ¾ÏàͬµÄÃÜÂë¡£¡£¡£ÕâΪÄÇЩһ¾½Ó´¥¹ýÒÑÍùÊý¾Ýй¶µÄÈËÌṩÁËÒ»ÖÖ¼òÆÓµÄÒªÁìÀ´Í»Èë Roku ÕÊ»§²¢Ëø¶¨ÕæÕýµÄÓû§¡£¡£¡£Roku Éù³Æ£¬£¬£¬£¬»á¼ûÊÜÓ°ÏìµÄ Roku ÕÊ»§²»ÔÊÐíºÚ¿Í»á¼ûÉç»áÇå¾²ºÅÂ롢ȫ¶î¸¶¿îÕʺš¢³öÉúÈÕÆÚ»òÆäËûÀàËÆµÄÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£
https://www.bitdefender.com/blog/hotforsecurity/hackers-target-roku-15-000-accounts-compromised-in-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ