Ñо¿Ö°Ô±¼ì²âµ½241¸ö¶ñÒânpmºÍPyPI°ü·Ö·¢ÍÚ¿óÈí¼þ

Ðû²¼Ê±¼ä 2022-08-22
1¡¢Ñо¿Ö°Ô±¼ì²âµ½241¸ö¶ñÒânpmºÍPyPI°ü·Ö·¢ÍÚ¿óÈí¼þ

      

¾ÝýÌå8ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬ÉÏÖÜÒÑ·¢Ã÷ÁËÖÁÉÙ241¸ö¶ñÒâµÄPyPIºÍnpm°ü£¬£¬£¬£¬ÕâЩ°ü»áÔÚѬȾLinux×°±¸ºó»á×°ÖöñÒâÍÚ¿óÈí¼þ¡£¡£ÉÏÖÜÈý£¬£¬£¬£¬Ñо¿Ö°Ô±¹ûÕæÁËÔÚPyPIÉÏ·¢Ã÷µÄ33¸öÏîÄ¿£¬£¬£¬£¬¿ÉÔÚѬȾϵͳºóÆô¶¯¿ªÔ´ÃÅÂÞ±Ò¼ÓÃÜ¿ó¹¤XMRig¡£¡£ÔÚÕâЩ°ü±»É¾³ýºó£¬£¬£¬£¬Ñо¿Ö°Ô±ÓÖ·¢Ã÷ÁËÁíÒ»×é¾ßÓÐÏàͬpayloadµÄ22¸ö°ü¡£¡£SonatypeÔÚ8ÔÂ19ÈÕÅû¶ÁË186¸önpmÓòÃûÇÀ×¢¶ñÒâ°ü£¬£¬£¬£¬ËüÃǾùÀ´×ÔÄäÃûÕÊ»§17b4a931£¬£¬£¬£¬Ä£ÄâÁ˳£ÓõÄhttp-errors JavaScript¿â¡£¡£Ñо¿Ö°Ô±Æ¾Ö¤ÊÖÒÕÖ¸±êÍÆ¶Ï£¬£¬£¬£¬Õâ241¸ö¶ñÒâ°üÓÉͳһ¹¥»÷ÕßÐû²¼¡£¡£


https://www.bleepingcomputer.com/news/security/241-npm-and-pypi-packages-caught-dropping-linux-cryptominers/


2¡¢ÐÂľÂíGrandoreiroÖ÷ÒªÕë¶ÔÄ«Î÷¸çºÍÎ÷°àÑÀµÈ¹ú¼Ò

      

8ÔÂ18ÈÕ£¬£¬£¬£¬Zscaler ThreatLabzÅû¶ÁËÐÂľÂíGrandoreiroÕë¶ÔÄ«Î÷¸çºÍÎ÷°àÑÀµÈ¹ú¼ÒµÄ¹¥»÷»î¶¯¡£¡£¸Ã¶ñÒâÈí¼þÖÁÉÙ×Ô2017ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬´Ë´Î¹¥»÷ÓÚ2022Äê6ÔÂ×îÏÈ£¬£¬£¬£¬²¢ÇÒÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£¡£¹¥»÷Õßαװ³ÉÀ´×ÔÄ«Î÷¸ç×ÜÉó²é³¤°ì¹«ÊÒ»òÎ÷°àÑÀ¹«¹²²¿£¬£¬£¬£¬×îÖÕpayloadʹÓôÓASUSTEK͵À´µÄÖ¤ÊéÊðÃû£¬£¬£¬£¬Í¨¹ý¶þ½øÖÆÌî³äµÄÒªÁ콫¾ÞϸÅòÕ͵½400MB£¬£¬£¬£¬À´ÈƹýɳÏäÆÊÎö¡£¡£±ðµÄ£¬£¬£¬£¬×îеÄGrandoreiro±äÌåÐÂÔöÁËʹÓÃDGA¾ÙÐÐC2ͨѶµÄ¹¦Ð§£¬£¬£¬£¬ÕâʹµÃ·¢Ã÷¶ñÒâÈí¼þµÄ»ù´¡ÉèÊ©²¢½«Æä²ð³ý±äµÃ¸üÄÑ¡£¡£


https://www.zscaler.com/blogs/security-research/grandoreiro-banking-trojan-new-ttps-targeting-various-industry-verticals


3¡¢WPÍøÕ¾±»ÈëÇÖºóÏÔʾαÔìCloudflare¾¯±¨²¢×°ÖöñÒâÈí¼þ

      

8ÔÂ18ÈÕ£¬£¬£¬£¬Sucuri³ÆWordPressÍøÕ¾±»ÈëÇÖºó»áÏÔʾαÔìµÄCloudflare DDoS±£»£»£»£»£»£»¤Ò³Ã棬£¬£¬£¬À´·Ö·¢¶ñÒâÈí¼þ¡£¡£¾ÝϤ£¬£¬£¬£¬¹¥»÷Õß»áÈëÇÖÄ¿µÄWordPressÍøÕ¾²¢Ö²ÈëÒ»¸ö»ìÏýµÄJavaScript payload£¬£¬£¬£¬Ëü¿ÉÏÔʾһ¸öαÔìµÄCloudflare DDoS±£»£»£»£»£»£»¤½çÃæ¡£¡£Ö®ºó£¬£¬£¬£¬Ä¿µÄ»á±»ÒªÇóÏÂÔØÎļþsecurity_install.iso£¬£¬£¬£¬Æä±»ÐÎÃ²ÎªÈÆ¹ýDDoSÑéÖ¤ËùÐèµÄ¹¤¾ß¡£¡£·­¿ª¸ÃÎļþ»á¿´µ½security_install.exe£¬£¬£¬£¬Ö´ÐиÃEXEÎļþ½«×°ÖöñÒâÈí¼þNetSupport RATºÍRaccoon Stealer¡£¡£


https://www.bleepingcomputer.com/news/security/wordpress-sites-hacked-with-fake-cloudflare-ddos-alerts-pushing-malware/


4¡¢Proofpoint·¢Ã÷TA558¹¥»÷À­¶¡ÃÀÖÞÂùݺÍÂÃÓÎÐÐÒµ

      

ProofpointÔÚ8ÔÂ18ÈÕÐû²¼Á˹ØÓÚºÚ¿ÍÍÅ»ïTA558µÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£TA558¿ÉÄÜÊÇÒ»¸ö³öÓÚ¾­¼ÃÄîÍ·µÄСÐͺڿÍÍŻ£¬£¬£¬×Ô2018ÄêÒÔÀ´×îÏÈ»îÔ¾£¬£¬£¬£¬Ö÷ÒªÕë¶ÔλÓÚÀ­¶¡ÃÀÖÞµØÇøµÄÂùݺÍÂÃÓÎÐÐÒµ£¬£¬£¬£¬ÓÐʱҲ»áÕë¶ÔÎ÷Å·ºÍ±±ÃÀµØÇø¡£¡£×î½üµÄ»î¶¯ÖУ¬£¬£¬£¬¹¥»÷Õß´ÓʹÓðüÀ¨ºêµÄMicrosoft Office¸½¼þ£¬£¬£¬£¬×ª¶øÊ¹ÓÃURLºÍISOÎļþÀ´ÊµÏÖ³õʼѬȾ£¬£¬£¬£¬´Ë¾Ù¿ÉÄÜÊǶÔ΢Èí¾öÒéĬÈÏ×èÖ¹´ÓÍøÂçÏÂÔØÎļþÖеĺê×ö³öµÄ»ØÓ¦¡£¡£


https://www.proofpoint.com/us/blog/threat-insight/reservations-requested-ta558-targets-hospitality-and-travel


5¡¢°®É³ÄáÑÇÕþ¸®Éù³ÆÒÑ×èÖ¹KillnetÍÅ»ï¶ÔÆäµÄDDoS¹¥»÷

      

¾Ý8ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬°®É³ÄáÑÇÕþ¸®Éù³Æ×Ô2007ÄêÒÔÀ´×îÑÏÖØµÄDDoS¹¥»÷¡£¡£´Ë´Î¹¥»÷¼ÈÕë¶Ô¹«¹²»ú¹¹£¬£¬£¬£¬Ò²Õë¶Ô˽Ӫ¹«Ë¾£¬£¬£¬£¬ºÚ¿Í×éÖ¯KillnetÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£±ðµÄ£¬£¬£¬£¬Õþ¸®Ê×ϯÐÅÏ¢¹ÙÅúÅÐÁ˸Ã×éÖ¯¹ØÓÚ200¶à¸öÍøÕ¾Òѱ»²é·âµÄ˵·¨£¬£¬£¬£¬²¢ÌåÏÖE-EstoniaÒÑÆô¶¯²¢ÔËÐУ¬£¬£¬£¬Ð§ÀÍûÓÐÖÐÖ¹¡£¡£°®É³ÄáÑÇÅÌËã»úÓ¦¼±ÏìӦС×é͸¶£¬£¬£¬£¬°üÀ¨¾¯Ô±ºÍÕþ¸®ÔÚÄڵĵط½Õþ¸®µÄÍøÕ¾ÒÔ¼°Ò»¼ÒÎïÁ÷¹«Ë¾Ôâµ½¹¥»÷¡£¡£


https://securityaffairs.co/wordpress/134560/cyber-warfare-2/estonia-blocked-cyberattacks-killnet.html 


6¡¢MicrosoftÅû¶ChromeOS×é¼þÖÐÄÚ´æËð»µÎó²îµÄϸ½Ú

      

MicrosoftÔÚ8ÔÂ19ÈÕÐû²¼Á˹ØÓÚChromeOS×é¼þÖÐÄÚ´æËð»µÎó²îµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¸ÃÎó²î×·×ÙΪCVE-2022-2587£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬£¬¿É±»ÓÃÀ´Ö´ÐÐDoS£¬£¬£¬£¬»òÕßÔÚ¼«¶ËÇéÐÎÏÂÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¸ÃÎó²î±£´æÓÚGoogle ChromeÒôƵЧÀÍÆ÷£¬£¬£¬£¬¿É±»Ô¶³Ì¹¥»÷Õßͨ¹ýÌØÖÆµÄÒôƵԪÊý¾ÝʹÓᣡ£ÏÖÔÚ£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´£¬£¬£¬£¬ÉÐδ±»ÔÚҰʹÓᣡ£


https://www.microsoft.com/security/blog/2022/08/19/uncovering-a-chromeos-remote-memory-corruption-vulnerability/