¹È¸èÐÞ¸´ÆäÔÆÆ½Ì¨ÖпÉÒþ²Ø¶ñÒâÈí¼þµÄGhostTokenÎó²î
Ðû²¼Ê±¼ä 2023-04-241¡¢¹È¸èÐÞ¸´ÆäÔÆÆ½Ì¨ÖпÉÒþ²Ø¶ñÒâÈí¼þµÄGhostTokenÎó²î
¾ÝýÌå4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬¹È¸èÔÆÆ½Ì¨(GCP)Öб£´æÒ»¸öGhostTokenÎó²î£¬£¬£¬£¬£¬¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâÓ¦Óøü¸ÄΪ²»¿É¼ûÇÒ²»¿Éɾ³ý¡£¡£¡£¡£¡£¡£Astrix SecurityÓÚ2022Äê6Ô²¢Ïò¹È¸è±¨¸æÁËÕâÒ»Îó²î£¬£¬£¬£¬£¬¹È¸èÔÚ2023Äê4ÔÂÐû²¼Á˲¹¶¡¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬¸ÃÎó²î¿É±»¹¥»÷ÕßÓÃÀ´Í¨¹ý½«ÒÑÊÚȨµÄµÚÈý·½Ó¦ÓÃת»»Îª¶ñÒâľÂíÓ¦Ó㬣¬£¬£¬£¬´Ó¶ø»ñµÃÄ¿µÄGoogleÕÊ»§µÄÓÀÊÀÇÒ²»¿ÉÒÆ³ýµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬È»ºóй¶ĿµÄµÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£Õâ¿ÉÄܰüÀ¨´æ´¢ÔÚGmail¡¢Drive¡¢DocsºÍPhotosµÈ¹È¸èÓ¦ÓÃÖеÄÊý¾Ý¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ghosttoken-gcp-flaw-let-attackers-backdoor-google-accounts/
2¡¢SymantecÅû¶Õë¶ÔÎ÷Å·»ù´¡ÉèÊ©µÄX_Trader¹©Ó¦Á´¹¥»÷
4ÔÂ21ÈÕ£¬£¬£¬£¬£¬SymantecÅû¶ÁËÕë¶ÔÎ÷Å·Òªº¦»ù´¡ÉèÊ©×éÖ¯µÄX_Trader¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£¡£µ¼ÖÂÉϸöÔÂ3CXÇå¾²ÊÂÎñµÄX_TraderÈí¼þ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬»¹Ó°ÏìÁËλÓÚÃÀ¹úºÍÅ·ÖÞµÄÄÜÔ´ÁìÓòµÄÁ½¸öÒªº¦»ù´¡ÉèÊ©×éÖ¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃľÂí»¯X_Trader×°ÖóÌÐò£¬£¬£¬£¬£¬½«VEILEDSIGNAL¶à½×¶ÎÄ£¿£¿£¿£¿£¿£¿é»¯ºóÃÅ×°Öõ½Ä¿µÄϵͳÉÏ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔÖ´ÐжñÒâshellcode»ò½«Í¨Ñ¶Ä£¿£¿£¿£¿£¿£¿é×¢ÈëÔÚ±»¹¥»÷ϵͳÉÏÔËÐеÄChrome¡¢Firefox»òEdgeÀú³Ì¡£¡£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬ÉÐÓÐÁ½¸öÉæ¼°½ðÈÚÉúÒâµÄ×éÖ¯Ò²Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain
3¡¢Ç°CFPBÔ±¹¤½«Áè¼Ý25ÍòÏûºÄÕßµÄÐÅϢת·¢µ½Ð¡ÎÒ˽¼ÒÓÊÏä
¾Ý4ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÃÀ¹úÏûºÄÕß½ðÈÚ±£»£»£»¤¾Ö(CFPB)Åû¶ÁËÒ»ÆðÉæ¼°256000ÈËÐÅÏ¢µÄй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£CFPBµÄÔ±¹¤Í¸Â¶£¬£¬£¬£¬£¬ËûÃÇ·¢Ã÷һǰԱ¹¤ÓÃ14·â²î±ðµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬½«Ô¼Äª25.6ÍòÃûÏûºÄÕߵļͼºÍԼĪ50¼Ò»ú¹¹µÄî¿ÏµÐÅϢת·¢µ½Ð¡ÎÒ˽¼Òµç×ÓÓʼþÕË»§¡£¡£¡£¡£¡£¡£ÕâÃûÔ±¹¤Òѱ»ÆÈÁîɾ³ýÕâЩµç×ÓÓʼþ²¢Ìṩ֤¾Ý֤ʵËüÃÇÒѱ»É¾³ý£¬£¬£¬£¬£¬µ«¹Ù·½Ö¤ÊµÕâ¸ÃÔ±¹¤ÉÐδ×ñÊØ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸Ã»ú¹¹ÈÔÔÚÊÓ²ì´ËÊÂÎñ¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/cfpb-employee-sends-consumers-data/
4¡¢ESET·¢Ã÷¶þÊÖÊг¡Öдó×ÚÆóÒµ¼¶ÍøÂç×°±¸°üÀ¨Ãô¸ÐÐÅÏ¢
¾ÝýÌå4ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬£¬¶þÊÖÊг¡ÉÏµÄÆóÒµ¼¶ÍøÂç×°±¸°üÀ¨¿É±»ºÚ¿ÍÓÃÀ´ÈëÇÖÆóҵϵͳ»ò»ñÈ¡¿Í»§ÐÅÏ¢µÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£ESETÑо¿Ö°Ô±¹ºÖÃÁË18̨¶þÊÖ½¹µã·ÓÉÆ÷£¬£¬£¬£¬£¬·¢Ã÷ÆäÖÐÒ»°ëÒÔÉÏÄÜÕý³£ÊÂÇéµÄ·ÓÉÆ÷ÈÔÈ»¿ÉÒÔ»á¼ûËùÓÐÉèÖÃÊý¾Ý¡£¡£¡£¡£¡£¡£Ò»Ð©Â·ÓÉÆ÷±£´æÁ˿ͻ§ÐÅÏ¢ºÍÔÊÐíµÚÈý·½ÅþÁ¬µ½ÍøÂçµÄÊý¾Ý£¬£¬£¬£¬£¬ÉõÖÁ°üÀ¨×÷Ϊ¿ÉÐÅ·½ÅþÁ¬µ½ÆäËûÍøÂçµÄƾ֤¡£¡£¡£¡£¡£¡£Æ¾Ö¤Â·ÓÉÆ÷ÖÐϸ½Ú£¬£¬£¬£¬£¬ÆäÖÐһЩ·ÓÉÆ÷´¦ÓÚÍйÜITÌṩÉ̵ÄÇéÐÎÖУ¬£¬£¬£¬£¬ÉÐÓÐһ̨ÉõÖÁÊôÓÚMSSP¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±¹ØÓÚÕâÖÖÇéÐεĽ¨ÒéÊÇ£¬£¬£¬£¬£¬ÕûÀíÉè±¹ØÁ¬ÄÃô¸ÐÊý¾Ý²¢½«Æä»Ö¸´µ½³ö³§Ä¬ÈÏ״̬¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-can-breach-networks-using-data-on-resold-corporate-routers/
5¡¢Unit 42³ÆÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÄ¿³ÊÉÏÉýÇ÷ÊÆ
Unit 42ÔÚ4ÔÂ20ÈÕ͸¶£¬£¬£¬£¬£¬ÒÔChatGPTΪÖ÷ÌâµÄÍøÂç¹¥»÷ÊýÄ¿³ÊÉÏÉýÇ÷ÊÆ¡£¡£¡£¡£¡£¡£´Ó2022Äê11Ôµ½2023Äê4ÔÂÉÏÑ®£¬£¬£¬£¬£¬ÓëChatGPTÏà¹ØÓòµÄÿÔÂ×¢²áÁ¿ÔöÌíÁË910%£¬£¬£¬£¬£¬Ïà¹ØÇÀ×¢ÓòÃûÔöÌíÁË17818%¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÌìÌìÓжà´ï118¸öÓëChatGPTÓйصĶñÒâURL±»¼ì²âµ½¡£¡£¡£¡£¡£¡£Ñо¿·¢Ã÷¶à¸öÊÔͼð³äOpenAI¹Ù·½ÍøÕ¾µÄ´¹ÂÚURL¡£¡£¡£¡£¡£¡£Í¨³££¬£¬£¬£¬£¬¹¥»÷Õ߻ὨÉèÒ»¸öÓëChatGPT¹ÙÍøºÜÏñµÄÐéÎ±ÍøÕ¾£¬£¬£¬£¬£¬È»ºóÓÕÆÓû§ÏÂÔØ¶ñÒâÈí¼þ»ò¹²ÏíÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://unit42.paloaltonetworks.com/chatgpt-scam-attacks-increasing/
6¡¢FortinetÐû²¼¹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄÆÊÎö±¨¸æ
4ÔÂ20ÈÕ£¬£¬£¬£¬£¬FortinetÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þEvilExtractorµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ßÓÉKodex¹«Ë¾¿ª·¢£¬£¬£¬£¬£¬Éù³ÆÊÇÒ»¿î½ÌÓý¹¤¾ß¡£¡£¡£¡£¡£¡£ÒÔÿÔÂ59ÃÀÔªµÄ¼ÛÇ®³öÊÛ£¬£¬£¬£¬£¬¾ßÓÐÆß¸ö¹¥»÷Ä£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬°üÀ¨ÀÕË÷Èí¼þ¡¢Æ¾Ö¤ÇÔÈ¡ºÍWindows Defender¡£¡£¡£¡£¡£¡£Ñо¿Åú×¢£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢µØ½«ÆäÓÃ×÷ÐÅÏ¢ÇÔÈ¡¹¤¾ß¡£¡£¡£¡£¡£¡£EvilExtractorµÄ¹¥»÷»î¶¯ÓÚ½ñÄê3ÔÂÏÔÖøÔöÌí£¬£¬£¬£¬£¬Í¨¹ýαװ³ÉÕË»§È·ÈÏÇëÇóµÄ´¹ÂÚÓʼþ¾ÙÐзַ¢£¬£¬£¬£¬£¬´ó´ó¶¼±»¹¥»÷Ä¿µÄλÓÚÅ·ÖÞºÍÃÀ¹ú¡£¡£¡£¡£¡£¡£
https://www.fortinet.com/blog/threat-research/evil-extractor-all-in-one-stealer


¾©¹«Íø°²±¸11010802024551ºÅ