Start-Rite¶ùÍ¯Ð¬ÖÆÔìÉÌÔÙ´ÎÔâÓö¿Í»§Ö§¸¶ÐÅϢй¶ÊÂÎñ

Ðû²¼Ê±¼ä 2024-11-18
1. Start-Rite¶ùÍ¯Ð¬ÖÆÔìÉÌÔÙ´ÎÔâÓö¿Í»§Ö§¸¶ÐÅϢй¶ÊÂÎñ


11ÔÂ14ÈÕ£¬ £¬£¬£¬£¬¶ùÍ¯Ð¬ÖÆÔìÉÌStart-Rite¿ËÈÕÔâÓöÁËÉæ¼°¿Í»§Ö§¸¶¿¨ÏêϸÐÅÏ¢µÄÑÏÖØÇå¾²ÊÂÎñ£¬ £¬£¬£¬£¬ÕâÊǸù«Ë¾ÔÚÒÑÍù°ËÄêÖеڶþ´Î±¬·¢´ËÀàÖØ´óʧÎ󡣡£¡£¡£¡£¾Ý·¢Ë͸ø¿Í»§µÄ֪ͨ³Æ£¬ £¬£¬£¬£¬ÈëÇÖÊÂÎñ±¬·¢ÔÚ10ÔÂ14ÈÕÖÁ11ÔÂ7ÈÕÖ®¼ä£¬ £¬£¬£¬£¬¿ÉÄÜй¶µÄÐÅÏ¢°üÀ¨Ö§¸¶¿¨ÉϵĿͻ§ÐÕÃû¡¢¿¨×¢²áµØµã¡¢¿¨ºÅ¡¢ÓÐÓÃÆÚºÍ¿¨ÑéÖ¤Öµ(CVV)¡£¡£¡£¡£¡£Start-Rite½¨Òé¿Í»§ÁªÏµÒøÐлòÐÅÓÿ¨ÌṩÉÌÍ£Óò¢Ìæ»»ÐÅÓÿ¨£¬ £¬£¬£¬£¬²¢¼á³ÖСÐļìºË¶ÔÕ˵¥¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒÑÏòÓ¢¹úÊý¾Ý±£» £»£»¤î¿Ïµ»ú¹¹ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©±¨¸æ´ËÊ£¬ £¬£¬£¬£¬²¢ÌåÏÖ½«È«Á¦ÅäºÏ¾¯·½ÊÂÇé¡£¡£¡£¡£¡£Ö»¹ÜStart-RiteÏò¡¶The Register¡·Ö¤ÊµÁ˴˴ι¥»÷£¬ £¬£¬£¬£¬µ«ÉÐδ¹ûÕæÈϿɴËÊ¡£¡£¡£¡£¡£Ó¦ÓÃÇ徲ר¼ÒÌåÏÖ£¬ £¬£¬£¬£¬´ËÊÂÎñÒý·¢Á˶ÔStart-RiteÇå¾²Ì¬ÊÆµÄÖÊÒÉ£¬ £¬£¬£¬£¬ÒÔ¼°Êý¾ÝÔõÑù±»ÇÔÈ¡µÄÎÊÌâ¡£¡£¡£¡£¡£ICO½²»°ÈËÔÚ±¨µÀºó͸¶£¬ £¬£¬£¬£¬Start-RiteÒÑÏòÆäת´ïÁËÕâÒ»ÊÂÎñ£¬ £¬£¬£¬£¬²¢ÕýÔÚÆÀ¹ÀËùÌṩµÄÐÅÏ¢¡£¡£¡£¡£¡£


https://www.theregister.com/2024/11/14/smartrite_breach/


2. CISAÖÒÑÔ£ºPalo Alto Networks Expedition¶à¸öÎó²î±»Æð¾¢Ê¹ÓÃ


11ÔÂ15ÈÕ£¬ £¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÖÒÑÔ£¬ £¬£¬£¬£¬Ö¸³öÓ°ÏìPalo Alto Networks ExpeditionµÄÁ½¸öÐÂÎó²îCVE-2024-9463ºÍCVE-2024-9465ÕýÔÚ±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£ÕâÁ½¸öÎó²î»®·ÖÉæ¼°ÏÂÁî×¢ÈëºÍSQL×¢È룬 £¬£¬£¬£¬CVSSÆÀ·Ö»®·Ö¸ß´ï9.9ºÍ9.3£¬ £¬£¬£¬£¬Èô±»ÀÖ³ÉʹÓ㬠£¬£¬£¬£¬¹¥»÷Õß¿ÉÔÚExpeditionǨá㹤¾ßÖÐÒÔrootÉí·ÝÖ´ÐÐí§ÒâÏÂÁî»òй¶Êý¾Ý¿âÄÚÈÝ£¬ £¬£¬£¬£¬½ø¶ø¿ÉÄܵ¼ÖÂPAN-OS·À»ðǽµÄÓû§Ãû¡¢ÃÜÂë¡¢ÉèÖúÍAPIÃÜԿй¶£¬ £¬£¬£¬£¬»òÔÚÒ×Êܹ¥»÷µÄϵͳÉϽ¨ÉèºÍ¶ÁÈ¡Îļþ¡£¡£¡£¡£¡£CISAÒѽ«ÕâЩÎó²îÄÉÈëÒÑÖª±»Ê¹ÓõÄÎó²îĿ¼£¬ £¬£¬£¬£¬²¢ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö»ú¹¹ÔÚ2024Äê12ÔÂ5ÈÕǰӦÓÃÐëÒª¸üС£¡£¡£¡£¡£Palo Alto NetworksÔÚ2024Äê10ÔÂ9ÈÕÐû²¼µÄÇå¾²¸üÐÂÖÐÐÞ¸´ÁËÕâЩÎó²î£¬ £¬£¬£¬£¬²¢È·ÈÏÊÕµ½CISA±¨¸æ³ÆÕâЩÎó²îÕýÔÚ±»Ê¹Óᣡ£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬Ò»ÖÜǰCISA»¹×ª´ïÁËÁíÒ»¸öÓ°ÏìExpeditionµÄÑÏÖØÎó²îCVE-2024-5910ÕýÔÚ±»Ê¹Ó㬠£¬£¬£¬£¬¸ÃÎó²î¿Éµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÏÂÁîÖ´ÐУ¬ £¬£¬£¬£¬Õë¶Ô»¥ÁªÍøÉÏ̻¶µÄ·À»ðǽÖÎÀí½Ó¿Ú¡£¡£¡£¡£¡£


https://thehackernews.com/2024/11/cisa-flags-critical-palo-alto-network.html


3. RecraftÄ£×Ó´æÇå¾²Îó²î£ºÎÞÒâÖÐй¶Ãô¸ÐϵͳָÁîÒý·¢¹Ø×¢


11ÔÂ14ÈÕ£¬ £¬£¬£¬£¬¾ÝCyber Security News±¨µÀ£¬ £¬£¬£¬£¬Ñо¿Ö°Ô±Ôڸ߼¶È˹¤ÖÇÄÜͼÏñÌìÉúÄ£×ÓÖз¢Ã÷ÁËDZÔÚµÄÇå¾²Îó²î£¬ £¬£¬£¬£¬ÌØÊâÊÇÔÚRecraftÄ£×ÓÖУ¬ £¬£¬£¬£¬¸ÃÄ£×ÓÔÚÎı¾µ½Í¼Æ¬ÅÅÐаñÉÏ´¦ÓÚÁìÏÈְλ¡£¡£¡£¡£¡£Recraft½ÓÄÉÁ½¼¶¼Ü¹¹£¬ £¬£¬£¬£¬Á¬ÏµÁË´óÐÍÓïÑÔÄ£×ÓºÍÀ©É¢Ä£×Ó£¬ £¬£¬£¬£¬Äܹ»´¦Öóͷ£ÖØ´óÅÌÎʲ¢ÌìÉú¸ü׼ȷ¡¢¸üÄܸÐÖªÉÏÏÂÎĵÄͼÏñ¡£¡£¡£¡£¡£È»¶ø£¬ £¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷£¬ £¬£¬£¬£¬Í¨¹ýÄ³Ð©ÌØ¶¨ÌáÐÑ£¬ £¬£¬£¬£¬¿ÉÒÔÓÕʹRecraftй¶²¿·ÖÄÚ²¿Ö¸Á £¬£¬£¬£¬°üÀ¨ÏµÍ³ÌáÐÑÆ¬¶ÏºÍÏêϸָµ¼´óÄ£×ÓÐÐΪµÄ˵Ã÷¡£¡£¡£¡£¡£ÕâЩй¶µÄÖ¸Áî°üÀ¨ÐÎÃ²Æø¸Å¡¢ÎïÌåºÍÈËÎïµÄÏêϸÐÎò¡¢ÐÎòÐÔ¾ä×Ó¡¢¹¹Í¼Ï¸½ÚÒÔ¼°×èֹʹÓõĴÊÓïµÈ¡£¡£¡£¡£¡£ÕâÖÖÎÞÒâÖÐй¶ϵͳÌáÐѵÄÐÐΪÒý·¢ÁËÈËÃǶÔÈ˹¤ÖÇÄÜÄ£×ÓÇå¾²ÐÔºÍÒþ˽ÐԵĵ£ÐÄ¡£¡£¡£¡£¡£ÈôÊǶñÒâÐÐΪÕßÄܹ»ÌáÈ¡ÕâЩÃô¸ÐÖ¸Á £¬£¬£¬£¬ËûÃÇ¿ÉÄÜ»áʹÓÃϵͳ¡¢ÈƹýÇå¾²²½·¥»òÉîÈëÏàʶרÓеÄÈ˹¤ÖÇÄÜÊÖÒÕ¡£¡£¡£¡£¡£Òò´Ë£¬ £¬£¬£¬£¬ÕâÒ»ÊÂÎñΪAI¿ª·¢Ö°Ô±ºÍÑо¿Ö°Ô±ÇÃÏìÁ˾¯ÖÓ£¬ £¬£¬£¬£¬ÌáÐÑËûÃDZØÐèÈ·±£ÕâЩϵͳµÄÇå¾²ÐÔºÍÍêÕûÐÔ£¬ £¬£¬£¬£¬Ëæ×ÅAIÊÖÒÕµÄһֱǰ½øºÍ¸üÉîÈëµØÈÚÈëÎÒÃÇÉúÑĵĸ÷¸ö·½Ã棬 £¬£¬£¬£¬ÕâÒ»µã±äµÃÓÈΪÖ÷Òª¡£¡£¡£¡£¡£


https://cybersecuritynews.com/researchers-warn-of-ai-image-generators/#google_vignette


4. ð³äAI±à¼­Æ÷ÍÆ¶¯ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þѬȾWindowsºÍmacOS


11ÔÂ16ÈÕ£¬ £¬£¬£¬£¬½üÆÚð³äAIͼÏñºÍÊÓÆµÌìÉúÆ÷³ÉÎªÍøÂç¹¥»÷µÄÐÂÊֶΣ¬ £¬£¬£¬£¬Í¨¹ýʹÓÃLumma Stealer£¨Õë¶ÔWindows£©ºÍAMOS£¨Õë¶ÔmacOS£©ÕâÁ½ÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬ £¬£¬£¬£¬Ñ¬È¾Óû§×°±¸²¢ÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°ü¡¢Æ¾Ö¤¡¢ÃÜÂë¡¢ÐÅÓÿ¨ÐÅÏ¢¼°ä¯ÀÀÀúÊ·µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£ÕâЩ±»ÇÔÈ¡µÄÊý¾Ý»á±»´ò°ü·¢Ëͻع¥»÷Õߣ¬ £¬£¬£¬£¬ÓÃÓÚ½øÒ»²½¹¥»÷»òÔÚºÚÊÐÉϳöÊÛ¡£¡£¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ô±·¢Ã÷£¬ £¬£¬£¬£¬¹¥»÷Õß½¨ÉèÁËð³äEditPro AI±à¼­Æ÷µÄÐéÎ±ÍøÕ¾£¬ £¬£¬£¬£¬Í¨¹ýËÑË÷Ч¹ûºÍ¹ã¸æÍƹãÉî¶ÈαÔìµÄÕþÖÎÊÓÆµ£¬ £¬£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØÎ±×°³ÉEditProAIÓ¦ÓóÌÐòµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£WindowsºÍmacOSÓû§»®·Ö»áÊÕµ½ÃûΪ¡°Edit-ProAI-Setup-newest_release.exe¡±ºÍ¡°EditProAi_v.4.36.dmg¡±µÄÎļþ¡£¡£¡£¡£¡£ÕâЩÎļþÓÉÇÔÈ¡µÄ´úÂëÊðÃûÖ¤ÊéÊðÃû£¬ £¬£¬£¬£¬²¢Í¨¹ýÌØ¶¨Ãæ°å·¢Ëͱ»µÁÊý¾Ý¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼Ò½¨Ò飬 £¬£¬£¬£¬ÈôÔøÏÂÔØ¸Ã³ÌÐò£¬ £¬£¬£¬£¬Ó¦Á¬Ã¦ÖØÖÃËùÓÐÃÜÂë²¢ÆôÓöàÒòËØÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fake-ai-video-generators-infect-windows-macos-with-infostealers/


5. ÃÀµäÖÊ´û¿î»ú¹¹ÔâÊý¾Ýй¶£¬ £¬£¬£¬£¬17Íò¿Í»§SSNµÈÐÅÏ¢±»µÁ


11ÔÂ15ÈÕ£¬ £¬£¬£¬£¬ÃÀ¹úÉçÇøµäÖÊ´û¿îÊÜÀí¹«Ë¾£¨ÒÔAnnieMac Home MortgageÃûÒåÔËÓª£©ÔâÓöÊý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬£¬Ò»ÃûÈëÇÖÕßÔÚ8ÔÂ21ÈÕÖÁ23ÈÕʱ´úÈëÇÖÆäϵͳ£¬ £¬£¬£¬£¬ÇÔÈ¡ÁË171,000Ãû¿Í»§µÄСÎÒ˽¼ÒÊý¾Ý£¬ £¬£¬£¬£¬°üÀ¨ÐÕÃûºÍÉç»áÇå¾²ºÅÂë(SSN)¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚûÓÐÖ¤¾ÝÅú×¢ÕâЩÊý¾ÝÒÑÔÚ°µÍøÉϱ»ÀÄÓ㬠£¬£¬£¬£¬µ«AnnieMacÒѽÓÄÉÌØÊâÇå¾²²½·¥±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢£¬ £¬£¬£¬£¬²¢ÏòÊÜÓ°Ïì¿Í»§Ìṩ12¸öÔµÄÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£» £»£»¤¡£¡£¡£¡£¡£¸Ã»ú¹¹Ìṩ¶àÖÖµäÖÊ´û¿î²úÆ·£¬ £¬£¬£¬£¬°üÀ¨Õë¶ÔµÍÊÕÈë»òÐÅÓÃÆÀ¼¶½Ï²î¹º·¿ÕßµÄÍýÏ룬 £¬£¬£¬£¬ÈçOneUPÍýÏëÔÊÐíÂò¼Ò½öÓÃ1%µÄÊ׸¶¹º·¿¡£¡£¡£¡£¡£Óë¸üÆÕ±éµÄÊý¾Ýй¶Ïà±È£¬ £¬£¬£¬£¬´Ë´Îй¶µÄÊý¾ÝÀàÐÍÏà¶Ô½ÏÉÙ£¬ £¬£¬£¬£¬µ«SSNµÄй¶ÈÔ±£´æÎ£º¦£¬ £¬£¬£¬£¬¿ÉÄÜË𺦿ͻ§µÄÐÅÓÃÆÀ·Ö£¬ £¬£¬£¬£¬ÌØÊâÊÇÄÇЩÐÅÓÃÆÀ·ÖÔ­À´¾ÍÒ»Ñùƽ³£µÄ¿Í»§¡£¡£¡£¡£¡£


https://www.theregister.com/2024/11/15/anniemac_data_breach/


6. GeoVision±¨·Ï×°±¸ÁãÈÕÎó²îÔâʹÓ㬠£¬£¬£¬£¬½©Ê¬ÍøÂçÈëÇÖΣº¦¾çÔö


11ÔÂ15ÈÕ£¬ £¬£¬£¬£¬¶ñÒâÈí¼þ½©Ê¬ÍøÂçÕýÔÚʹÓÃGeoVision±¨·Ï×°±¸ÖеĸßΣÁãÈÕÎó²îCVE-2024-11120¾ÙÐÐÈëÇÖ£¬ £¬£¬£¬£¬²¢ÕÐļÕâЩװ±¸¾ÙÐпÉÄܵÄDDoS¹¥»÷»ò¼ÓÃÜÍÚ¾ò¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚ×°±¸ÉÏÖ´ÐÐí§ÒâϵͳÏÂÁ £¬£¬£¬£¬ÒÑÓ°Ïì¶à¿î²»ÔÙÊܹ©Ó¦ÉÌÖ§³ÖµÄGeoVision×°±¸ÐͺÅ¡£¡£¡£¡£¡£¾ÝÍþв¼à¿ØÆ½Ì¨Shadowserver Foundation±¨¸æ£¬ £¬£¬£¬£¬Ô¼ÓÐ17,000̨GeoVision×°±¸ÔÚÏß̻¶£¬ £¬£¬£¬£¬Ò×Êܹ¥»÷£¬ £¬£¬£¬£¬ÆäÖдó´ó¶¼Î»ÓÚÃÀ¹ú¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÒÉΪMiraiµÄ±äÖÖ¡£¡£¡£¡£¡£ÈôÊÇ·¢Ã÷×°±¸¹ýÈÈ¡¢ÔËÐлºÂý¡¢ÎÞÏìÓ¦»òÉèÖñ»¸ü¸ÄµÈ¼£Ïó£¬ £¬£¬£¬£¬½¨ÒéÖØÖÃ×°±¸¡¢¸ü¸ÄÃÜÂë¡¢¹Ø±ÕÔ¶³Ì»á¼û²¢ÖÃÓÚ·À»ðǽºó¡£¡£¡£¡£¡£ÀíÏëÇéÐÎÏ£¬ £¬£¬£¬£¬Ó¦Ìæ»»ÕâЩװ±¸£¬ £¬£¬£¬£¬Èô²»¿ÉÄÜ£¬ £¬£¬£¬£¬ÔòÓ¦¸ôÀë²¢Ç×½ü¼à¿Ø¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/botnet-exploits-geovision-zero-day-to-install-mirai-malware/