Öж«AIºô½ÐÖÐÐÄÆ½Ì¨Ôâ´ó¹æÄ£Êý¾Ýй¶£¬£¬ £¬ £¬£¬Ì»Â¶Çå¾²Òþ»¼

Ðû²¼Ê±¼ä 2024-10-12
1. Öж«AIºô½ÐÖÐÐÄÆ½Ì¨Ôâ´ó¹æÄ£Êý¾Ýй¶£¬£¬ £¬ £¬£¬Ì»Â¶Çå¾²Òþ»¼


10ÔÂ10ÈÕ£¬£¬ £¬ £¬£¬Ò»´Î´ó¹æÄ£Êý¾Ýй¶ÊÂÎñÔÚÖж«µØÇøÆØ¹â£¬£¬ £¬ £¬£¬É漰һСÎÒ˽¼Ò¹¤ÖÇÄܺô½ÐÖÐÐÄÆ½Ì¨£¬£¬ £¬ £¬£¬Áè¼Ý1020ÍòÌõ¶Ô»°¼Í¼±»µÁ¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Resecurity³Æ£¬£¬ £¬ £¬£¬´Ë´ÎÎó²îʹ¹¥»÷ÕßÄܹ»Î´¾­ÊÚȨ»á¼û¸Ãƽ̨µÄÖÎÀíÒDZí°å£¬£¬ £¬ £¬£¬ÍøÂçÏûºÄÕß¡¢ÔËÓªÉ̺ÍAIÊðÀíÖ®¼äµÄ´ó×Ú»¥¶¯Êý¾Ý¡£¡£¡£ÕâЩÊý¾Ý¿ÉÄܱ»ÓÃÓڸ߼¶Ú²Æ­¡¢ÍøÂç´¹ÂÚÍýÏëºÍÆäËû¶ñÒâ»î¶¯£¬£¬ £¬ £¬£¬ÓÈÆäÊÇСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©µÄй¶£¬£¬ £¬ £¬£¬ÔöÌíÁËÄ£ÄâÕýµ±¿Í»§Ð§Àͽ»Á÷¾ÙÐÐڲƭµÄΣº¦¡£¡£¡£¸ÃÊÂÎñ͹ÏÔÁËÈ˹¤ÖÇÄÜÆ½Ì¨ÔÚÌá¸ßЧÂʵÄͬʱ£¬£¬ £¬ £¬£¬Ò²´øÀ´ÁËÊý¾ÝÒþ˽µÄÖØ´óÍþв¡£¡£¡£ËäÈ»ÈëÇÖÒÑ»ñµÃ»º½â£¬£¬ £¬ £¬£¬µ«ÈËÃǶԵÚÈý·½È˹¤ÖÇÄÜϵͳµÄÇå¾²ÐԺʹ¦Öóͷ£Ãô¸Ð¿Í»§Êý¾ÝµÄÄÜÁ¦ÌåÏÖµ£ÐÄ¡£¡£¡£ResecurityÇ¿µ÷£¬£¬ £¬ £¬£¬¶Ô»°Ê½AIƽ̨ÒѳÉΪ´óÐÍÆóÒµºÍÕþ¸®»ú¹¹ÏÖ´úIT¹©Ó¦Á´µÄÒªº¦ÒªËØ£¬£¬ £¬ £¬£¬ÐèҪƽºâ¹Å°åÍøÂçÇå¾²²½·¥ºÍÕë¶ÔAIÏêϸÇéÐεÄרÃŲ½·¥À´±£»£»£»£»£»£»¤ËüÃÇ¡£¡£¡£


https://www.infosecurity-magazine.com/news/10m-exposed-ai-call-center-hack/


2. APT29ºÚ¿Í´ó¹æÄ£¹¥»÷ZimbraºÍTeamCityЧÀÍÆ÷


10ÔÂ10ÈÕ£¬£¬ £¬ £¬£¬ÃÀÓ¢ÍøÂç»ú¹¹½ñÈÕÁªºÏÖÒÑԳƣ¬£¬ £¬ £¬£¬Óë¶íÂÞ˹¶ÔÍâÇ鱨¾Ö(SVR)Ïà¹ØµÄAPT29ºÚ¿Í×éÖ¯ÕýÔÚ¡°´ó¹æÄ£¡±¹¥»÷È«Çò¹æÄ£ÄÚδ´ò²¹¶¡µÄZimbraºÍJetBrains TeamCityЧÀÍÆ÷¡£¡£¡£ÕâЩ¹¥»÷ʹÓÃÁËCVE-2022-27924ºÍCVE-2023-42793Îó²î£¬£¬ £¬ £¬£¬Ö¼ÔÚÇÔÈ¡µç×ÓÓʼþÕÊ»§Æ¾Ö¤ºÍ¾ÙÐÐÔ¶³Ì´úÂëÖ´ÐеȶñÒâ»î¶¯¡£¡£¡£SVRºÚ¿Í×éÖ¯£¬£¬ £¬ £¬£¬Ò²±»³ÆÎªCozy Bear¡¢Midnight BlizzardºÍDukes£¬£¬ £¬ £¬£¬¶àÄêÀ´Ò»Ö±Õë¶ÔÃÀ¹úºÍÅ·ÖÞµÄÕþ¸®ºÍ˽ÈË×éÖ¯¡£¡£¡£´Ë´ÎÖÒÑÔÒªÇóÍøÂç·ÀÓùÕßÁ¬Ã¦ÐÞ²¹Ì»Â¶µÄЧÀÍÆ÷£¬£¬ £¬ £¬£¬²¢°²ÅÅÇå¾²²¹¶¡»ººÍ½â²½·¥ÒÔ±ÜÃâÇå¾²Îó²î¡£¡£¡£´Ëǰ£¬£¬ £¬ £¬£¬APT29ºÚ¿ÍÒѲ߻®ÁËSolarWinds¹©Ó¦Á´¹¥»÷²¢¹¥ÆÆÁ˶à¸öÃÀ¹úÁª°î»ú¹¹£¬£¬ £¬ £¬£¬»¹ÈëÇÖÁ˱±Ô¼¹ú¼ÒµÄMicrosoft 365ÕË»§ºÍ΢Èí¸ß¹ÜµÈ¹«Ë¾µÄExchange OnlineÕË»§¡£¡£¡£ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÍøÂçÇå¾²Ö÷¹ÜÌåÏÖ£¬£¬ £¬ £¬£¬ÕâÒ»»î¶¯¶ÔÕþ¸®ºÍ˽Ӫ²¿·Ö×é³ÉÁËÈ«ÇòÍþв£¬£¬ £¬ £¬£¬ÐèÒª³¹µ×Éó²éÇå¾²¿ØÖƲ½·¥¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-uk-warn-of-russian-apt29-hackers-targeting-zimbra-teamcity-servers/


3. ºÚ¿ÍʹÓÃYouTubeƽ̨Èö²¥ÖØ´óµÄ¶ñÒâÈí¼þ


10ÔÂ10ÈÕ£¬£¬ £¬ £¬£¬¿¨°Í˹»ù½üÆÚ·¢Ã÷ºÚ¿ÍƵÈÔʹÓÃYouTubeƽ̨Èö²¥ÖØ´ó¶ñÒâÈí¼þ¡£¡£¡£ºÚ¿Íͨ¹ýÐ®ÖÆÈÈÃÅÆµµÀαװ³Éԭʼ´´×÷Õߣ¬£¬ £¬ £¬£¬Ðû²¼¶ñÒâÁ´½Ó¶ÔÓû§ÊµÑéÕ©Æ­¡£¡£¡£2022ÄêºÚ¿ÍÔøÕë¶Ô¶íÂÞ˹Óû§ÊµÑé¼ÓÃÜÇ®±ÒÍÚ¾ò»î¶¯£¬£¬ £¬ £¬£¬Ê¹Óñ»Ð®ÖƵÄYouTubeÕË»§·Ö·¢Î±×°³ÉÊ¢ÐÐÓ¦ÓõĶñÒâÎļþ¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶à½×¶Î¹¥»÷ÐòÁÐѬȾϵͳ£¬£¬ £¬ £¬£¬½ÓÄÉÒþ²Ø¶ñÒâ´úÂë²¢¼á³ÖÊðÃûÓÐÓÃÐÔµÄÊÖÒÕ£¬£¬ £¬ £¬£¬Ê¹ÓöàÖÖ»úÖÆ½¨É賤ÆÚÐÔ£¬£¬ £¬ £¬£¬²¢ÊµÑéÖØ´óµÄ·ÀÓù¹æ±ÜÊÖÒÕÒþ²Ø¶ñÒâ×é¼þ¡£¡£¡£×îÖÕÓÐÓÃÔØºÉΪSilentCryptoMiner£¬£¬ £¬ £¬£¬ÓÃÓÚÍÚ¾òÒþ˽¼ÓÃÜÇ®±Ò£¬£¬ £¬ £¬£¬²¢ÍøÂçϵͳң²âÊý¾Ýͨ¹ýTelegram»úеÈËAPI´«Êä¡£¡£¡£±ðµÄ£¬£¬ £¬ £¬£¬¸Ã¶ñÒâ»î¶¯»¹Õë¶ÔÀ´×Ô°×¶íÂÞ˹¡¢Ó¡¶ÈµÈ¶à¸ö¹ú¼ÒµÄÓû§£¬£¬ £¬ £¬£¬ÕâЩÓû§Òò³£½ûÓÃAV¹¤¾ß±£»£»£»£»£»£»¤ºÍÇå¾²²½·¥¶øÒ×Êܹ¥»÷¡£¡£¡£¸Ã¹¥»÷µÄÖØ´óÐÔÌåÏÖÔÚÄ£¿£¿£¿£¿ £¿é»¯½á¹¹ÉÏ£¬£¬ £¬ £¬£¬¿Éƾ֤ĿµÄ¶¯Ì¬¼ÓÔØ²î±ðÓÐÓÃÔØºÉ×é¼þ£¬£¬ £¬ £¬£¬½ÓÄÉÏȽø»ìÏýÒªÁìºÍ·´ÆÊÎö¹¦Ð§¼á³ÖÒþ²ØÐÔ£¬£¬ £¬ £¬£¬ÈÚÈëÖØ´óµÄÆóÒµ¼¶¹¥»÷ÊÖÒÕ¡£¡£¡£


https://cybersecuritynews.com/hackers-using-youtube-videos-to-deliver-sophisticated-malware/


4. LynxÀÕË÷Èí¼þ£ºINCÀÕË÷Èí¼þµÄбäÖÖÓëË«ÖØÀÕË÷Íþв


10ÔÂ11ÈÕ£¬£¬ £¬ £¬£¬Palo Alto Networks ½üÆÚ·¢Ã÷ÁËÒ»ÖÖÃûΪ¡°Lynx¡±µÄÐÂÀÕË÷Èí¼þ£¬£¬ £¬ £¬£¬ËüÏÖʵÉÏÊǶÔ2023Äê8Ô·ºÆðµÄINCÀÕË÷Èí¼þµÄ¸üÃû£¬£¬ £¬ £¬£¬Á½Õß´úÂëÏàËÆ¶È¸ß´ï48%£¬£¬ £¬ £¬£¬ÇÒÔ¼70.8%µÄ½¹µã¹¦Ð§±»Öظ´Ê¹Óᣡ£¡£LynxÀÕË÷Èí¼þÖ÷ÒªÕë¶ÔÃÀ¹úºÍÓ¢¹ú¸÷ÐÐÒµ×éÖ¯£¬£¬ £¬ £¬£¬°üÀ¨ÁãÊÛ¡¢·¿µØ²ú¡¢ÐÞ½¨ºÍ½ðÈÚЧÀ͵È£¬£¬ £¬ £¬£¬ÒÔÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©ÐÎʽ¹©ÆäËûÍøÂç·¸·¨·Ö×ÓʹÓᣡ£¡£Æä×îΣÏյķ½ÃæÖ®Ò»ÊÇʵÑéË«ÖØÀÕË÷Õ½ÂÔ£¬£¬ £¬ £¬£¬¼´ÔÚ¼ÓÃÜÎļþǰÇÔÈ¡Êܺ¦ÕßÊý¾Ý£¬£¬ £¬ £¬£¬Èô²»Ö§¸¶Êê½ð£¬£¬ £¬ £¬£¬Ôò¿ÉÄÜй¶»ò³öÊÛÕâЩÊý¾Ý¡£¡£¡£LynxÀÕË÷Èí¼þÉù³ÆÒÑÈëÇÖ¶à¼Ò¹«Ë¾£¬£¬ £¬ £¬£¬²¢ÔÚ¹«¹²ÍøÕ¾ÉÏչʾ±»µÁÊý¾Ý£¬£¬ £¬ £¬£¬Ö»¹ÜÉù³Æ±Ü¿ªÁËÕþ¸®»ú¹¹¡¢Ò½ÔººÍ·ÇÓªÀû×éÖ¯£¬£¬ £¬ £¬£¬µ«Æä¹¥»÷ÈÔ¶ÔÐí¶àÐÐÒµ×é³ÉÖØ´óÍþв¡£¡£¡£¸ÃÀÕË÷Èí¼þʹÓø߼¶¼ÓÃÜËã·¨£¬£¬ £¬ £¬£¬ÈçAES-128ºÍCurve25519 Donna£¬£¬ £¬ £¬£¬½âÃÜÄѶȼ«´ó£¬£¬ £¬ £¬£¬ÇÒרÃÅÕë¶ÔWindowsϵͳ£¬£¬ £¬ £¬£¬Ê¹ÓÃRestart Manager APIÌá¸ß¼ÓÃÜЧÂÊ¡£¡£¡£±ðµÄ£¬£¬ £¬ £¬£¬LynxÀÕË÷Èí¼þÉè¼ÆÎÞа£¬£¬ £¬ £¬£¬ÔÊÐí¹¥»÷Õßͨ¹ýÏÂÁîÐвÎÊý×Ô½ç˵ִÐУ¬£¬ £¬ £¬£¬ÒÔÖª×ãÌØ¶¨ÐèÇ󡣡£¡£


https://securityonline.info/lynx-ransomware-the-evolution-of-inc-ransomware-into-a-potent-cyber-threat/


5. CISAÖÒÑÔ£ºÎ´¼ÓÃÜF5 BIG-IP Cookie±»ÀÄÓþÙÐÐÍøÂç¹¥»÷


10ÔÂ11ÈÕ£¬£¬ £¬ £¬£¬CISA·¢³öÖÒÑÔ£¬£¬ £¬ £¬£¬Ö¸³öÍøÂçÍþвÐÐΪÕßÕýÔÚÀÄÓÃδ¼ÓÃܵÄF5 BIG-IP³¤ÆÚcookieÀ´Ê¶±ðºÍ¶¨Î»Ä¿µÄÍøÂçÉÏµÄÆäËûÄÚ²¿×°±¸¡£¡£¡£ËûÃÇͨ¹ý»æÖÆÄÚ²¿×°±¸Í¼£¬£¬ £¬ £¬£¬ÔÚÍøÂç¹¥»÷µÄÍýÏë½×¶Îʶ±ðÒ×Êܹ¥»÷µÄ×°±¸¡£¡£¡£F5 BIG-IPÊÇÒ»Ì×Ó¦ÓóÌÐò½»¸¶ºÍÁ÷Á¿ÖÎÀí¹¤¾ß£¬£¬ £¬ £¬£¬ÆäÍâµØÁ÷Á¿ÖÎÀíÆ÷£¨LTM£©Ä£¿£¿£¿£¿ £¿éʹÓó¤ÆÚcookieÀ´Î¬³Ö»á»°Ò»ÖÂÐÔ£¬£¬ £¬ £¬£¬µ«ÕâЩcookieĬÈÏδ¼ÓÃÜ¡£¡£¡£´Ó11.5.0°æ×îÏÈ£¬£¬ £¬ £¬£¬ÖÎÀíÔ±¿ÉÑ¡ÔñÇ¿ÖÆ¶ÔËùÓÐcookie¾ÙÐмÓÃÜ£¬£¬ £¬ £¬£¬µ«Ñ¡Ôñ²»ÆôÓõÄÓû§½«ÃæÁÙÇ徲Σº¦¡£¡£¡£ÕâЩcookie°üÀ¨±àÂëµÄIPµØµã¡¢¶Ë¿ÚºÅºÍÄÚ²¿¸ºÔØÆ½ºâЧÀÍÆ÷µÄÉèÖ㬣¬ £¬ £¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¶àÄêǰÒÑ·ÖÏíÔõÑùʹÓÃδ¼ÓÃܵÄcookieÀ´²éÕÒÒþ²ØµÄÄÚ²¿Ð§ÀÍÆ÷¡£¡£¡£CISA½¨ÒéF5 BIG-IPÖÎÀíÔ±Éó²é¹©Ó¦É̹ØÓÚÔõÑù¼ÓÃÜÕâЩ³¤ÆÚcookieµÄ˵Ã÷£¬£¬ £¬ £¬£¬²¢Ö¸³öF5ÒÑ¿ª·¢³öÒ»ÖÖÃûΪ¡°BIG-IP iHealth¡±µÄÕï¶Ï¹¤¾ß£¬£¬ £¬ £¬£¬ÓÃÓÚ¼ì²â²úÆ·µÄ¹ýʧÉèÖò¢ÏòÖÎÀíÔ±·¢³öÖÒÑÔ¡£¡£¡£µ±ÉèÖÃΪ¡°±ØÐ衱ʱ£¬£¬ £¬ £¬£¬ËùÓг¤ÆÚÐÔcookie¶¼Ê¹ÓÃÇ¿AES-192¼ÓÃܾÙÐмÓÃÜ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-hackers-abuse-f5-big-ip-cookies-to-map-internal-servers/


6. Mozilla½ôÆÈÐû²¼FirefoxÇå¾²¸üУ¬£¬ £¬ £¬£¬ÐÞ¸´ÑÏÖØÎó²îCVE-2024-9680


10ÔÂ11ÈÕ£¬£¬ £¬ £¬£¬MozillaΪÆäFirefoxä¯ÀÀÆ÷Ðû²¼Á˽ôÆÈÇå¾²¸üУ¬£¬ £¬ £¬£¬ÒÔ½â¾öÒ»¸ö±»ÆÕ±éʹÓõÄÑÏÖØÎó²î£¬£¬ £¬ £¬£¬¸ÃÎó²î±»×·×ÙΪCVE-2024-9680£¬£¬ £¬ £¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬ £¬ £¬£¬¿ÉÄÜÔÊÐí¹¥»÷ÕßÔÚÓû§ÏµÍ³ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£Îó²îλÓÚFirefoxµÄ¶¯»­Ê±¼äÖá×é¼þÖУ¬£¬ £¬ £¬£¬ÊÇWeb Animations APIµÄÒ»ÖÖ»úÖÆ£¬£¬ £¬ £¬£¬ÏêϸΪÊͷźóʹÓÃÎó²î£¬£¬ £¬ £¬£¬¿Éµ¼ÖÂÄÚ´æË𻵡£¡£¡£MozillaÔÚÊÕµ½·´²¡¶¾¹«Ë¾ESETµÄÖÒÑԺ󣬣¬ £¬ £¬£¬Ñ¸ËÙÕÙ¼¯ÍŶӶÔÎó²î¾ÙÐÐÄæÏò¹¤³Ì£¬£¬ £¬ £¬£¬²¢ÔÚ25СʱÄÚ¿ª·¢²¢Ðû²¼ÁËÐÞ¸´³ÌÐò¡£¡£¡£ÐÞ²¹µÄ°æ±¾°üÀ¨Firefox 131.0.2µÈ¶à¸ö°æ±¾¡£¡£¡£±ðµÄ£¬£¬ £¬ £¬£¬MozillaÒÑÈ·ÈϸÃÎó²îÕýÔÚ±»Æð¾¢Ê¹ÓÃÀ´¹¥»÷Torä¯ÀÀÆ÷Óû§£¬£¬ £¬ £¬£¬µ«¹ØÓÚ¹¥»÷µÄÏêϸϸ½ÚÈÔ²»µÃ¶øÖª¡£¡£¡£Òò´Ë£¬£¬ £¬ £¬£¬Óû§Ó¦Á¬Ã¦¸üÐÂÖÁ×îа汾µÄFirefoxÒÔ±£»£»£»£»£»£»¤×Ô¼ºµÄϵͳÇå¾²¡£¡£¡£


https://securityonline.info/mozilla-confirms-active-attacks-on-tor-browser-via-firefox-vulnerability/