Microsoft Ðû²¼ÔÚ Windows ÖÐÆúÓà 1024 λ RSA ÃÜÔ¿

Ðû²¼Ê±¼ä 2024-03-20
1. Microsoft Ðû²¼ÔÚ Windows ÖÐÆúÓà 1024 λ RSA ÃÜÔ¿


3ÔÂ18ÈÕ£¬£¬£¬£¬£¬Microsoft Ðû²¼£¬£¬£¬£¬£¬Windows ´«Êä²ãÇå¾² (TLS) Öн«ºÜ¿ìÆúÓöÌÓÚ 2048 λµÄ RSA ÃÜÔ¿£¬£¬£¬£¬£¬ÒÔÌṩ¸ü¸ßµÄÇå¾²ÐÔ¡£¡£¡£¡£¡£¡£Rivest¨CShamir¨CAdleman (RSA) ÊÇÒ»ÖַǶԳƼÓÃÜϵͳ£¬£¬£¬£¬£¬ËüʹÓÃÒ»¶Ô¹«Ô¿ºÍ˽ԿÀ´¼ÓÃÜÊý¾Ý£¬£¬£¬£¬£¬ÆäÇ¿¶ÈÓëÃÜÔ¿µÄ³¤¶ÈÖ±½ÓÏà¹Ø¡£¡£¡£¡£¡£¡£ÕâЩÃÜÔ¿Ô½³¤ £¬£¬£¬£¬£¬¾ÍÔ½ÄÑÆÆ½â¡£¡£¡£¡£¡£¡£1024 λ RSA ÃÜÔ¿µÄÇ¿¶ÈԼΪ 80 룬£¬£¬£¬£¬¶ø 2048 λÃÜÔ¿µÄÇ¿¶ÈԼΪ 112 룬£¬£¬£¬£¬ÕâʹµÃºóÕߵįÊÎöʱ¼ä³¤ÁË 40 ÒÚ±¶¡£¡£¡£¡£¡£¡£¸ÃÁìÓòµÄר¼ÒÒÔΪ 2048 λÃÜÔ¿ ÖÁÉÙÔÚ 2030 Äê֮ǰ¶¼ÊÇÇå¾²µÄ¡£¡£¡£¡£¡£¡£RSA ÃÜÔ¿ÔÚ Windows ÖÐÓÃÓÚ¶àÖÖÓÃ;£¬£¬£¬£¬£¬°üÀ¨Ð§ÀÍÆ÷Éí·ÝÑéÖ¤¡¢Êý¾Ý¼ÓÃܺÍÈ·±£Í¨Ñ¶µÄÍêÕûÐÔ¡£¡£¡£¡£¡£¡£Microsoft ¾öÒ齫 TLS ЧÀÍÆ÷Éí·ÝÑéÖ¤ÖÐʹÓõÄÖ¤ÊéµÄ RSA ÃÜÔ¿×îµÍÒªÇóÌá¸ßµ½ 2048 λ»ò¸ü³¤£¬£¬£¬£¬£¬Õâ¹ØÓÚ±£»£»£»¤×éÖ¯ÃâÊÜÈõ¼ÓÃܵÄÓ°ÏìºÜÊÇÖ÷Òª¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-announces-deprecation-of-1024-bit-rsa-keys-in-windows/


2. ¶ñÒâÈí¼þ»î¶¯ÀÄÓà Google ÍøÕ¾À´ÇÔÈ¡Êý¾Ý Azorult


3ÔÂ19ÈÕ£¬£¬£¬£¬£¬Netskope ÍþвʵÑéÊÒµÄÇå¾²Ñо¿Ö°Ô±ÆØ¹âÁËÒ»¸öÖØ´óµÄ¶ñÒâÈí¼þ»î¶¯£¬£¬£¬£¬£¬¸Ã»î¶¯Ê¹Óà Google Э×÷ƽ̨µÄ¿ÉÐŶÈÀ´ÌṩǿʢµÄа汾 Azorult ÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÉÓÚÆäÌӱܼì²âºÍÇÔÈ¡ÖÖÖÖÃô¸ÐÐÅÏ¢µÄÏȽøÄÜÁ¦¶ø×é³ÉÁËÖØ´óµÄÍøÂçÇ徲Σº¦¡£¡£¡£¡£¡£¡£Azorult ÊÇÒ»¸ö¶ñÒâ³ÌÐò£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡ÄúµÄ˽ÈËÐÅÏ¢¡£¡£¡£¡£¡£¡£ËüµÄÄ¿µÄÊÇÓû§Ãû¡¢ÃÜÂë¡¢ä¯ÀÀÀúÊ·¼Í¼£¬£¬£¬£¬£¬ÉõÖÁ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡£¡£¡£¡£¡£¡£Òź¶µÄÊÇ£¬£¬£¬£¬£¬Azorult ͵ÇÔ°¸¼þ³ÊÉÏÉýÇ÷ÊÆ£¬£¬£¬£¬£¬ÓÈÆäÊÇÔÚÒ½ÁƱ£½¡ÐÐÒµ¡£¡£¡£¡£¡£¡£Azorult ±»ÒÔΪÊÇÒÑÍùÒ»ÄêÖй¥»÷Ò½ÁƱ£½¡ÐÐÒµµÄ¶¥¼¶¶ñÒâÈí¼þ¼Ò×åÖ®Ò»¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Æä×î½üµÄ»î¶¯½«Æäа¶ñ»î¶¯ÍÆÏòÁËеĸ߶È£¬£¬£¬£¬£¬½ÓÄÉ¶à·½ÃæµÄÒªÁìÀ´×ª´ïÆäÓÐÓøºÔØ£¬£¬£¬£¬£¬Í¬Ê±Ìӱܼì²â¡£¡£¡£¡£¡£¡£¹¥»÷µÄ³õʼ½×¶ÎÉæ¼°HTML ×ß˽£¬£¬£¬£¬£¬ÕâÖÖÊÖÒÕÔÚÍøÂç¹¥»÷ÕßÖÐÔ½À´Ô½Ê¢ÐС£¡£¡£¡£¡£¡£´ËÒªÁìͨ¹ýʹÓÃÕýµ±µÄ HTML5 ¹¦Ð§ºÍ Javascript Ö±½ÓÔÚ¿Í»§¶Ë¹¹½¨¶ñÒâ¸ºÔØ£¬£¬£¬£¬£¬ÇÉÃîµØÈÆ¹ýWeb ¿ØÖÆ¡£¡£¡£¡£¡£¡£ÇÉÃîµÄÊÇ£¬£¬£¬£¬£¬¸Ã»î¶¯²¢Î´½«ÓÐÓøºÔØÇ¶Èëµ½ Javascript ×Ô¼ºÖУ¬£¬£¬£¬£¬¶øÊÇǶÈëµ½ÍⲿÍйܵĵ¥¶À JSON ÎļþÖУ¬£¬£¬£¬£¬´Ó¶øÔöÌíÁËÌØÁíÍâÒþÃØ²ã¡£¡£¡£¡£¡£¡£


https://securityonline.info/sneaky-malware-campaign-abuses-google-sites-to-deliver-data-stealing-azorult/


3. Õë¶ÔÎÚ¿ËÀ¼µÄРLinux ¶ñÒâÈí¼þ±äÖÖAcidPour


3ÔÂ19ÈÕ£¬£¬£¬£¬£¬SentinelLabs µÄÑо¿Ö°Ô±·¢Ã÷ÁËËáÓê¶ñÒâÈí¼þµÄÒ»ÖÖбäÖÖ£¬£¬£¬£¬£¬³ÆÎª¡°Acid Pour¡±£¬£¬£¬£¬£¬ÒÑÔÚÎÚ¿ËÀ¼·ºÆð¡£¡£¡£¡£¡£¡£ÕâÒ»·¢Ã÷ÊÇÔÚÖÜÄ©ÓÉ SentinelLabs µÄ¸±×ܲà JA Guerrero-Saade ͨ¹ý X£¨ÒÔǰµÄ Twitter£©·ÖÏíµÄ¿´·¨µÃ³öµÄ¡£¡£¡£¡£¡£¡£×î³õµÄ AcidRain ¶ñÒâÈí¼þÓÚ 2022 Äê 3 Ô·ºÆð£¬£¬£¬£¬£¬ÌØÊâÊÇÔÚ¡°Viasat ºÚ¿Í¹¥»÷¡±Ê±´úʹÓ㬣¬£¬£¬£¬¸ÃºÚ¿Í¹¥»÷ÔÚ¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼×îÏÈʱÖÐÖ¹ÁË KA-SAT Surfbeam2 µ÷ÖÆ½âµ÷Æ÷¡£¡£¡£¡£¡£¡£SentinelLabs µÄÊ×ϯÍþвÑо¿Ô±TomHegel·¢Ã÷ÁËרΪ Linux x86 ×°±¸±àÒëµÄбäÌå¡£¡£¡£¡£¡£¡£ËäÈ» AcidPour Óë AcidRain ÔÚijЩ×Ö·û´®ÖоßÓÐÏàËÆÖ®´¦£¬£¬£¬£¬£¬µ«ËüÔÚ´úÂë¿âÖб£´æÏÔ×Ųî±ð£¬£¬£¬£¬£¬´úÂë¿âÊÇÕë¶Ô x86 ¼Ü¹¹¶ø²»ÊÇ MIPS ±àÒëµÄ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ÊÊÓÃÓÚ x86 ×°±¸µÄÊ¢ÐÐ Linux ¿¯Ðаæ°üÀ¨ Ubuntu¡¢Mint¡¢Fedora ºÍ Debian¡£¡£¡£¡£¡£¡£ÁíÒ»·½Ã棬£¬£¬£¬£¬MIPS£¨ÎÞ»¥ËøÁ÷Ë®Ï߽׶εÄ΢´¦Öóͷ£Æ÷£©ÊÇÒ»ÖÖÖ¸Á¼Ü¹¹£¨ISA£©£¬£¬£¬£¬£¬ËüʵÖÊÉϽç˵ÁË´¦Öóͷ£Æ÷Ã÷È·²¢ÓÃÓÚÖ´ÐÐÖ¸ÁîµÄÓïÑÔ¡£¡£¡£¡£¡£¡£Óë x86 ÀàËÆ£¬£¬£¬£¬£¬ËüÊÇÒ»×鹨ÓÚ´¦Öóͷ£Æ÷ÔõÑùÔËÐеĹæÔòºÍ¹æ·¶¡£¡£¡£¡£¡£¡£


https://www.hackread.com/acidrain-linux-malware-variant-acidpour-ukraine/#google_vignette


4. Ð嵀 DEEP#GOSU ¶ñÒâÈí¼þ»î¶¯Ê¹Óø߼¶Õ½ÂÔÃé×¼ Windows Óû§


3ÔÂ18ÈÕ£¬£¬£¬£¬£¬¸Ã¹¥»÷»î¶¯Ê¹Óà PowerShell ºÍ VBScript ¶ñÒâÈí¼þÀ´Ñ¬È¾ Windows ϵͳ²¢»ñÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾ Securonix ½«¸Ã»î¶¯³ÆÎª¡°DEEP#GOSU¡±£¬£¬£¬£¬£¬ÌåÏָû¿ÉÄÜÓ볯Ïʹú¼ÒÖ§³ÖµÄÃûΪKimsukyµÄ×éÖ¯Óйء£¡£¡£¡£¡£¡£DEEP#GOSUÖÐʹÓõĶñÒâÈí¼þÓÐÓøºÔØ´ú±íÁËÒ»ÖÖÖØ´óµÄ¶à½×¶ÎÍþв£¬£¬£¬£¬£¬Ö¼ÔÚÔÚ Windows ϵͳÉÏÉñÃØÔËÐУ¬£¬£¬£¬£¬ÓÈÆäÊÇ´ÓÍøÂç¼à¿ØµÄ½Ç¶ÈÀ´¿´¡£¡£¡£¡£¡£¡£ËüµÄ¹¦Ð§°üÀ¨¼üÅ̼ͼ¡¢¼ôÌù°å¼à¿Ø¡¢¶¯Ì¬ÓÐÓøºÔØÖ´ÐкÍÊý¾Ýй¶£¬£¬£¬£¬£¬ÒÔ¼°Ê¹Óà RAT Èí¼þ¾ÙÐÐÍêȫԶ³Ì»á¼û¡¢ÍýÏëʹÃüÒÔ¼°Ê¹ÓÃ×÷Òµ×Ô¶¯Ö´ÐÐ PowerShell ¾ç±¾µÄ³¤ÆÚÐÔ¡£¡£¡£¡£¡£¡£Ñ¬È¾Àú³ÌµÄÒ»¸öÖµµÃ×¢ÖØµÄ·½ÃæÊÇ£¬£¬£¬£¬£¬ËüʹÓà Dropbox »ò Google Docs µÈÕýµ±Ð§À;ÙÐÐÏÂÁîºÍ¿ØÖÆ (C2)£¬£¬£¬£¬£¬´Ó¶øÔÊÐíÍþвÐÐΪÕßÔÚδ¼ì²âµ½µÄÇéÐÎÏÂÈÚÈëͨÀýÍøÂçÁ÷Á¿¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2024/03/new-deepgosu-malware-campaign-targets.html


5. ºÚ¿ÍÔÚÍøÂç¹¥»÷ÖÐʹÓÃÎäÆ÷»¯ SVG Îļþ


3ÔÂ18ÈÕ£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÖØÐÂʹÓÿÉÀ©Õ¹Ê¸Á¿Í¼ÐÎ (SVG) ÎļþÀ´Èö²¥¶ñÒâÈí¼þ£¬£¬£¬£¬£¬ÕâÖÖÊÖÒÕËæ×Å AutoSmuggle ¹¤¾ßµÄ·ºÆð¶ø»ñµÃÁËÏÔ×ÅÉú³¤¡£¡£¡£¡£¡£¡£AutoSmuggle ÓÚ 2022 Äê 5 ÔÂÍÆ³ö£¬£¬£¬£¬£¬ÓÐÖúÓÚÔÚ HTML »ò SVG ÄÚÈÝÖÐǶÈë¶ñÒâÎļþ£¬£¬£¬£¬£¬Ê¹¹¥»÷Õ߸üÈÝÒ×ÈÆ¹ýÇå¾²²½·¥¡£¡£¡£¡£¡£¡£ÀÄÓà SVG ÎļþÈö²¥¶ñÒâÈí¼þµÄÇéÐοÉÒÔ×·Ëݵ½ 2015 Ä꣬£¬£¬£¬£¬ÀÕË÷Èí¼þÊÇ×îÏÈͨ¹ý´ËǰÑÔÈö²¥µÄÀÕË÷Èí¼þÖ®Ò»¡£¡£¡£¡£¡£¡£2017 Äê 1 Ô£¬£¬£¬£¬£¬SVG Îļþ±»ÓÃÀ´Í¨¹ý URL ÏÂÔØ Ursnif ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£2022 Ä걬·¢ÁËÖØ´ó±¼ÌÚ£¬£¬£¬£¬£¬Æäʱ SVG ͨ¹ýǶÈëʽ .zip ´æµµÈö²¥QakBotµÈ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬Õ¹Ê¾ÁË´ÓÍâÊÖÏÂÔØµ½ HTML ×ß˽ÊÖÒÕµÄת±ä¡£¡£¡£¡£¡£¡£2022 Äê AutoSmuggle ÔÚ GitHub ÉϵÄÐû²¼±ê¼Ç×ÅÒ»¸öתÕ۵㡣¡£¡£¡£¡£¡£¸Ã¹¤¾ß½«¿ÉÖ´ÐÐÎļþ»ò´æµµÇ¶Èëµ½ SVG/HTML ÎļþÖУ¬£¬£¬£¬£¬È»ºóÔÚÊܺ¦Õß·­¿ªÊ±½âÃܲ¢Ö´ÐС£¡£¡£¡£¡£¡£´ËÒªÁìÇÉÃîµØ±Ü¿ªÁËͨ³£»£»£»á¼ì²âºÍ¸ôÀëÖ±½Óµç×ÓÓʼþ¸½¼þµÄÇå¾²µç×ÓÓʼþÍø¹Ø(SEG)¡£¡£¡£¡£¡£¡£


https://gbhackers.com/hackers-using-weaponized-svg-files-in-cyber-attacks/


6. Nissan Oceania ÒÑÈ·ÈÏÈ¥ÄêÔâÊܵÄÊý¾Ýй¶ӰÏìÔ¼ 10 ÍòÈË


3ÔÂ18ÈÕ£¬£¬£¬£¬£¬Nissan Oceania ÒÑÈ·ÈÏ 2023 Äê 12 ÔÂÔâÊܵÄÊý¾Ýй¶ӰÏìÁËÔ¼ 10 ÍòÈË£¬£¬£¬£¬£¬²¢ÒÑ×îÏÈÏòËûÃÇ·¢³ö֪ͨ¡£¡£¡£¡£¡£¡££¬£¬£¬£¬£¬¸Ã¹«Ë¾£¨°üÀ¨ÈÕ²úÆû³µ¹«Ë¾ÒÔ¼°°Ä´óÀûÑǺÍÐÂÎ÷À¼µÄÈÕ²ú½ðÈÚЧÀ͹«Ë¾£©Í¸Â¶£¬£¬£¬£¬£¬Î´¾­ÊÚȨµÄµÚÈý·½»á¼ûÁËÆäÍâµØ IT ЧÀÍÆ÷²¢µ¼ÖÂÍ£»£»£»ú¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ö¸³ö£º¡°ÎÒÃÇÁ¬Ã¦½ÓÄÉÐж¯×èֹΥ¹æÐÐΪ£¬£¬£¬£¬£¬²¢ÊµÊ±ÏòÏà¹ØÕþ¸®»ú¹¹·¢³ö¾¯±¨£¬£¬£¬£¬£¬°üÀ¨°Ä´óÀûÑǺÍÐÂÎ÷À¼¹ú¼ÒÍøÂçÇå¾²ÖÐÐĺÍÒþ˽î¿Ïµ»ú¹¹¡£¡£¡£¡£¡£¡£¡±Æäʱ£¬£¬£¬£¬£¬ËûÃÇÎÞ·¨È·ÈÏÊÂÎñµÄÑÏÖØË®Æ½ºÍÀàÐÍ£¬£¬£¬£¬£¬µ«¼¸Öܺ󣬣¬£¬£¬£¬Akira ÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬²¢Ð¹Â¶Á˾ݳƴӸù«Ë¾ÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ëæºó±Þ²ß¿Í»§×¢ÖØÒì³£»£»£»î¶¯ºÍ¿ÉÄܵÄÕ©Æ­£¬£¬£¬£¬£¬Í¬Ê±ÓëÕþ¸®Õþ¸®ºÍÍâ²¿ÍøÂçȡ֤ר¼ÒÏàÖú¼ÌÐøÊӲ졣¡£¡£¡£¡£¡£


https://www.helpnetsecurity.com/2024/03/18/nissan-data-breach/