Microsoft Ðû²¼ÔÚ Windows ÖÐÆúÓà 1024 λ RSA ÃÜÔ¿
Ðû²¼Ê±¼ä 2024-03-203ÔÂ18ÈÕ£¬£¬£¬£¬Microsoft Ðû²¼£¬£¬£¬£¬Windows ´«Êä²ãÇå¾² (TLS) Öн«ºÜ¿ìÆúÓöÌÓÚ 2048 λµÄ RSA ÃÜÔ¿£¬£¬£¬£¬ÒÔÌṩ¸ü¸ßµÄÇå¾²ÐÔ¡£¡£¡£¡£Rivest¨CShamir¨CAdleman (RSA) ÊÇÒ»ÖַǶԳƼÓÃÜϵͳ£¬£¬£¬£¬ËüʹÓÃÒ»¶Ô¹«Ô¿ºÍ˽ԿÀ´¼ÓÃÜÊý¾Ý£¬£¬£¬£¬ÆäÇ¿¶ÈÓëÃÜÔ¿µÄ³¤¶ÈÖ±½ÓÏà¹Ø¡£¡£¡£¡£ÕâЩÃÜÔ¿Ô½³¤ £¬£¬£¬£¬¾ÍÔ½ÄÑÆÆ½â¡£¡£¡£¡£1024 λ RSA ÃÜÔ¿µÄÇ¿¶ÈԼΪ 80 룬£¬£¬£¬¶ø 2048 λÃÜÔ¿µÄÇ¿¶ÈԼΪ 112 룬£¬£¬£¬ÕâʹµÃºóÕߵįÊÎöʱ¼ä³¤ÁË 40 ÒÚ±¶¡£¡£¡£¡£¸ÃÁìÓòµÄר¼ÒÒÔΪ 2048 λÃÜÔ¿ ÖÁÉÙÔÚ 2030 Äê֮ǰ¶¼ÊÇÇå¾²µÄ¡£¡£¡£¡£RSA ÃÜÔ¿ÔÚ Windows ÖÐÓÃÓÚ¶àÖÖÓÃ;£¬£¬£¬£¬°üÀ¨Ð§ÀÍÆ÷Éí·ÝÑéÖ¤¡¢Êý¾Ý¼ÓÃܺÍÈ·±£Í¨Ñ¶µÄÍêÕûÐÔ¡£¡£¡£¡£Microsoft ¾öÒ齫 TLS ЧÀÍÆ÷Éí·ÝÑéÖ¤ÖÐʹÓõÄÖ¤ÊéµÄ RSA ÃÜÔ¿×îµÍÒªÇóÌá¸ßµ½ 2048 λ»ò¸ü³¤£¬£¬£¬£¬Õâ¹ØÓÚ±£»£»£»£»¤×éÖ¯ÃâÊÜÈõ¼ÓÃܵÄÓ°ÏìºÜÊÇÖ÷Òª¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-announces-deprecation-of-1024-bit-rsa-keys-in-windows/
2. ¶ñÒâÈí¼þ»î¶¯ÀÄÓà Google ÍøÕ¾À´ÇÔÈ¡Êý¾Ý Azorult
3ÔÂ19ÈÕ£¬£¬£¬£¬Netskope ÍþвʵÑéÊÒµÄÇå¾²Ñо¿Ö°Ô±ÆØ¹âÁËÒ»¸öÖØ´óµÄ¶ñÒâÈí¼þ»î¶¯£¬£¬£¬£¬¸Ã»î¶¯Ê¹Óà Google Ð×÷ƽ̨µÄ¿ÉÐŶÈÀ´ÌṩǿʢµÄа汾 Azorult ÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÉÓÚÆäÌӱܼì²âºÍÇÔÈ¡ÖÖÖÖÃô¸ÐÐÅÏ¢µÄÏȽøÄÜÁ¦¶ø×é³ÉÁËÖØ´óµÄÍøÂçÇ徲Σº¦¡£¡£¡£¡£Azorult ÊÇÒ»¸ö¶ñÒâ³ÌÐò£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡ÄúµÄ˽ÈËÐÅÏ¢¡£¡£¡£¡£ËüµÄÄ¿µÄÊÇÓû§Ãû¡¢ÃÜÂë¡¢ä¯ÀÀÀúÊ·¼Í¼£¬£¬£¬£¬ÉõÖÁ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡£¡£¡£¡£Òź¶µÄÊÇ£¬£¬£¬£¬Azorult ͵ÇÔ°¸¼þ³ÊÉÏÉýÇ÷ÊÆ£¬£¬£¬£¬ÓÈÆäÊÇÔÚÒ½ÁƱ£½¡ÐÐÒµ¡£¡£¡£¡£Azorult ±»ÒÔΪÊÇÒÑÍùÒ»ÄêÖй¥»÷Ò½ÁƱ£½¡ÐÐÒµµÄ¶¥¼¶¶ñÒâÈí¼þ¼Ò×åÖ®Ò»¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬Æä×î½üµÄ»î¶¯½«Æäа¶ñ»î¶¯ÍÆÏòÁËеĸ߶ȣ¬£¬£¬£¬½ÓÄÉ¶à·½ÃæµÄÒªÁìÀ´×ª´ïÆäÓÐÓøºÔØ£¬£¬£¬£¬Í¬Ê±Ìӱܼì²â¡£¡£¡£¡£¹¥»÷µÄ³õʼ½×¶ÎÉæ¼°HTML ×ß˽£¬£¬£¬£¬ÕâÖÖÊÖÒÕÔÚÍøÂç¹¥»÷ÕßÖÐÔ½À´Ô½Ê¢ÐС£¡£¡£¡£´ËÒªÁìͨ¹ýʹÓÃÕýµ±µÄ HTML5 ¹¦Ð§ºÍ Javascript Ö±½ÓÔÚ¿Í»§¶Ë¹¹½¨¶ñÒâ¸ºÔØ£¬£¬£¬£¬ÇÉÃîµØÈÆ¹ýWeb ¿ØÖÆ¡£¡£¡£¡£ÇÉÃîµÄÊÇ£¬£¬£¬£¬¸Ã»î¶¯²¢Î´½«ÓÐÓøºÔØÇ¶Èëµ½ Javascript ×Ô¼ºÖУ¬£¬£¬£¬¶øÊÇǶÈëµ½ÍⲿÍйܵĵ¥¶À JSON ÎļþÖУ¬£¬£¬£¬´Ó¶øÔöÌíÁËÌØÁíÍâÒþÃØ²ã¡£¡£¡£¡£
https://securityonline.info/sneaky-malware-campaign-abuses-google-sites-to-deliver-data-stealing-azorult/
3. Õë¶ÔÎÚ¿ËÀ¼µÄРLinux ¶ñÒâÈí¼þ±äÖÖAcidPour
3ÔÂ19ÈÕ£¬£¬£¬£¬SentinelLabs µÄÑо¿Ö°Ô±·¢Ã÷ÁËËáÓê¶ñÒâÈí¼þµÄÒ»ÖÖбäÖÖ£¬£¬£¬£¬³ÆÎª¡°Acid Pour¡±£¬£¬£¬£¬ÒÑÔÚÎÚ¿ËÀ¼·ºÆð¡£¡£¡£¡£ÕâÒ»·¢Ã÷ÊÇÔÚÖÜÄ©ÓÉ SentinelLabs µÄ¸±×ܲà JA Guerrero-Saade ͨ¹ý X£¨ÒÔǰµÄ Twitter£©·ÖÏíµÄ¿´·¨µÃ³öµÄ¡£¡£¡£¡£×î³õµÄ AcidRain ¶ñÒâÈí¼þÓÚ 2022 Äê 3 Ô·ºÆð£¬£¬£¬£¬ÌØÊâÊÇÔÚ¡°Viasat ºÚ¿Í¹¥»÷¡±Ê±´úʹÓ㬣¬£¬£¬¸ÃºÚ¿Í¹¥»÷ÔÚ¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼×îÏÈʱÖÐÖ¹ÁË KA-SAT Surfbeam2 µ÷ÖÆ½âµ÷Æ÷¡£¡£¡£¡£SentinelLabs µÄÊ×ϯÍþвÑо¿Ô±TomHegel·¢Ã÷ÁËרΪ Linux x86 ×°±¸±àÒëµÄбäÌå¡£¡£¡£¡£ËäÈ» AcidPour Óë AcidRain ÔÚijЩ×Ö·û´®ÖоßÓÐÏàËÆÖ®´¦£¬£¬£¬£¬µ«ËüÔÚ´úÂë¿âÖб£´æÏÔ×Ųî±ð£¬£¬£¬£¬´úÂë¿âÊÇÕë¶Ô x86 ¼Ü¹¹¶ø²»ÊÇ MIPS ±àÒëµÄ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ÊÊÓÃÓÚ x86 ×°±¸µÄÊ¢ÐÐ Linux ¿¯Ðаæ°üÀ¨ Ubuntu¡¢Mint¡¢Fedora ºÍ Debian¡£¡£¡£¡£ÁíÒ»·½Ã棬£¬£¬£¬MIPS£¨ÎÞ»¥ËøÁ÷Ë®Ï߽׶εÄ΢´¦Öóͷ£Æ÷£©ÊÇÒ»ÖÖÖ¸Á¼Ü¹¹£¨ISA£©£¬£¬£¬£¬ËüʵÖÊÉϽç˵ÁË´¦Öóͷ£Æ÷Ã÷È·²¢ÓÃÓÚÖ´ÐÐÖ¸ÁîµÄÓïÑÔ¡£¡£¡£¡£Óë x86 ÀàËÆ£¬£¬£¬£¬ËüÊÇÒ»×鹨ÓÚ´¦Öóͷ£Æ÷ÔõÑùÔËÐеĹæÔòºÍ¹æ·¶¡£¡£¡£¡£
https://www.hackread.com/acidrain-linux-malware-variant-acidpour-ukraine/#google_vignette
4. Ð嵀 DEEP#GOSU ¶ñÒâÈí¼þ»î¶¯Ê¹Óø߼¶Õ½ÂÔÃé×¼ Windows Óû§
3ÔÂ18ÈÕ£¬£¬£¬£¬¸Ã¹¥»÷»î¶¯Ê¹Óà PowerShell ºÍ VBScript ¶ñÒâÈí¼þÀ´Ñ¬È¾ Windows ϵͳ²¢»ñÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾ Securonix ½«¸Ã»î¶¯³ÆÎª¡°DEEP#GOSU¡±£¬£¬£¬£¬ÌåÏָû¿ÉÄÜÓ볯Ïʹú¼ÒÖ§³ÖµÄÃûΪKimsukyµÄ×éÖ¯Óйء£¡£¡£¡£DEEP#GOSUÖÐʹÓõĶñÒâÈí¼þÓÐÓøºÔØ´ú±íÁËÒ»ÖÖÖØ´óµÄ¶à½×¶ÎÍþв£¬£¬£¬£¬Ö¼ÔÚÔÚ Windows ϵͳÉÏÉñÃØÔËÐУ¬£¬£¬£¬ÓÈÆäÊÇ´ÓÍøÂç¼à¿ØµÄ½Ç¶ÈÀ´¿´¡£¡£¡£¡£ËüµÄ¹¦Ð§°üÀ¨¼üÅ̼ͼ¡¢¼ôÌù°å¼à¿Ø¡¢¶¯Ì¬ÓÐÓøºÔØÖ´ÐкÍÊý¾Ýй¶£¬£¬£¬£¬ÒÔ¼°Ê¹Óà RAT Èí¼þ¾ÙÐÐÍêȫԶ³Ì»á¼û¡¢ÍýÏëʹÃüÒÔ¼°Ê¹ÓÃ×÷Òµ×Ô¶¯Ö´ÐÐ PowerShell ¾ç±¾µÄ³¤ÆÚÐÔ¡£¡£¡£¡£Ñ¬È¾Àú³ÌµÄÒ»¸öÖµµÃ×¢ÖØµÄ·½ÃæÊÇ£¬£¬£¬£¬ËüʹÓà Dropbox »ò Google Docs µÈÕýµ±Ð§À;ÙÐÐÏÂÁîºÍ¿ØÖÆ (C2)£¬£¬£¬£¬´Ó¶øÔÊÐíÍþвÐÐΪÕßÔÚδ¼ì²âµ½µÄÇéÐÎÏÂÈÚÈëͨÀýÍøÂçÁ÷Á¿¡£¡£¡£¡£
https://thehackernews.com/2024/03/new-deepgosu-malware-campaign-targets.html
5. ºÚ¿ÍÔÚÍøÂç¹¥»÷ÖÐʹÓÃÎäÆ÷»¯ SVG Îļþ
3ÔÂ18ÈÕ£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÖØÐÂʹÓÿÉÀ©Õ¹Ê¸Á¿Í¼ÐÎ (SVG) ÎļþÀ´Èö²¥¶ñÒâÈí¼þ£¬£¬£¬£¬ÕâÖÖÊÖÒÕËæ×Å AutoSmuggle ¹¤¾ßµÄ·ºÆð¶ø»ñµÃÁËÏÔ×ÅÉú³¤¡£¡£¡£¡£AutoSmuggle ÓÚ 2022 Äê 5 ÔÂÍÆ³ö£¬£¬£¬£¬ÓÐÖúÓÚÔÚ HTML »ò SVG ÄÚÈÝÖÐǶÈë¶ñÒâÎļþ£¬£¬£¬£¬Ê¹¹¥»÷Õ߸üÈÝÒ×ÈÆ¹ýÇå¾²²½·¥¡£¡£¡£¡£ÀÄÓà SVG ÎļþÈö²¥¶ñÒâÈí¼þµÄÇéÐοÉÒÔ×·Ëݵ½ 2015 Ä꣬£¬£¬£¬ÀÕË÷Èí¼þÊÇ×îÏÈͨ¹ý´ËǰÑÔÈö²¥µÄÀÕË÷Èí¼þÖ®Ò»¡£¡£¡£¡£2017 Äê 1 Ô£¬£¬£¬£¬SVG Îļþ±»ÓÃÀ´Í¨¹ý URL ÏÂÔØ Ursnif ¶ñÒâÈí¼þ¡£¡£¡£¡£2022 Ä걬·¢ÁËÖØ´ó±¼ÌÚ£¬£¬£¬£¬Æäʱ SVG ͨ¹ýǶÈëʽ .zip ´æµµÈö²¥QakBotµÈ¶ñÒâÈí¼þ£¬£¬£¬£¬Õ¹Ê¾ÁË´ÓÍâÊÖÏÂÔØµ½ HTML ×ß˽ÊÖÒÕµÄת±ä¡£¡£¡£¡£2022 Äê AutoSmuggle ÔÚ GitHub ÉϵÄÐû²¼±ê¼Ç×ÅÒ»¸öתÕ۵㡣¡£¡£¡£¸Ã¹¤¾ß½«¿ÉÖ´ÐÐÎļþ»ò´æµµÇ¶Èëµ½ SVG/HTML ÎļþÖУ¬£¬£¬£¬È»ºóÔÚÊܺ¦Õß·¿ªÊ±½âÃܲ¢Ö´ÐС£¡£¡£¡£´ËÒªÁìÇÉÃîµØ±Ü¿ªÁËͨ³£»£»£»£»á¼ì²âºÍ¸ôÀëÖ±½Óµç×ÓÓʼþ¸½¼þµÄÇå¾²µç×ÓÓʼþÍø¹Ø(SEG)¡£¡£¡£¡£
https://gbhackers.com/hackers-using-weaponized-svg-files-in-cyber-attacks/
6. Nissan Oceania ÒÑÈ·ÈÏÈ¥ÄêÔâÊܵÄÊý¾Ýй¶ӰÏìÔ¼ 10 ÍòÈË
3ÔÂ18ÈÕ£¬£¬£¬£¬Nissan Oceania ÒÑÈ·ÈÏ 2023 Äê 12 ÔÂÔâÊܵÄÊý¾Ýй¶ӰÏìÁËÔ¼ 10 ÍòÈË£¬£¬£¬£¬²¢ÒÑ×îÏÈÏòËûÃÇ·¢³ö֪ͨ¡£¡£¡£¡££¬£¬£¬£¬¸Ã¹«Ë¾£¨°üÀ¨ÈÕ²úÆû³µ¹«Ë¾ÒÔ¼°°Ä´óÀûÑǺÍÐÂÎ÷À¼µÄÈÕ²ú½ðÈÚЧÀ͹«Ë¾£©Í¸Â¶£¬£¬£¬£¬Î´¾ÊÚȨµÄµÚÈý·½»á¼ûÁËÆäÍâµØ IT ЧÀÍÆ÷²¢µ¼ÖÂÍ£»£»£»£»ú¡£¡£¡£¡£¸Ã¹«Ë¾Ö¸³ö£º¡°ÎÒÃÇÁ¬Ã¦½ÓÄÉÐж¯×èֹΥ¹æÐÐΪ£¬£¬£¬£¬²¢ÊµÊ±ÏòÏà¹ØÕþ¸®»ú¹¹·¢³ö¾¯±¨£¬£¬£¬£¬°üÀ¨°Ä´óÀûÑǺÍÐÂÎ÷À¼¹ú¼ÒÍøÂçÇå¾²ÖÐÐĺÍÒþ˽î¿Ïµ»ú¹¹¡£¡£¡£¡£¡±Æäʱ£¬£¬£¬£¬ËûÃÇÎÞ·¨È·ÈÏÊÂÎñµÄÑÏÖØË®Æ½ºÍÀàÐÍ£¬£¬£¬£¬µ«¼¸Öܺ󣬣¬£¬£¬Akira ÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬²¢Ð¹Â¶Á˾ݳƴӸù«Ë¾ÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¸Ã¹«Ë¾Ëæºó±Þ²ß¿Í»§×¢ÖØÒì³£»£»£»£»î¶¯ºÍ¿ÉÄܵÄÕ©Æ£¬£¬£¬£¬Í¬Ê±ÓëÕþ¸®Õþ¸®ºÍÍâ²¿ÍøÂçȡ֤ר¼ÒÏàÖú¼ÌÐøÊӲ졣¡£¡£¡£
https://www.helpnetsecurity.com/2024/03/18/nissan-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ