Microsoft Windows DWM ÁãÈÕÎó²î±»´ó¹æÄ£Ê¹ÓÃ
Ðû²¼Ê±¼ä 2024-05-165ÔÂ15ÈÕ£¬£¬Î¢ÈíÐû²¼ÎåÔ²¹¶¡¸üУ¬£¬×ܹ² 59 ¸ö CVE £¬£¬ÖÁÉÙÓÐÒ»¸öÖÚËùÖÜÖªµÄÎó²îÒѱ»´ó¹æÄ£Ê¹Ó㬣¬²¢ÇÒȷʵÒѾ±» QakBot ËùʹÓᣡ£¡£¡£±¾ÔÂÅû¶µÄȱÏÝÓ°ÏìÁËÅÌËã kahuna µÄÕû¸ö²úÆ·×éºÏ£¬£¬°üÀ¨ Windows¡¢Office¡¢.NET Framework ºÍ Visual Studio£»£»Î¢Èí365£»£»µçÁ¦ÉÌÒµÖÇÄÜ£»£»DHCP ЧÀÍÆ÷£»£»Microsoft Edge£¨»ùÓÚ Chromium£©£»£»ºÍ Windows ÒÆ¶¯¿í´ø¡£¡£¡£¡£»£»ùÓÚ Chromium µÄ Edge ä¯ÀÀÆ÷Êܵ½ CVE-2024-4761 µÄÓ°Ï죬£¬ÕâÊÇ Google ½ñÌìÐÞ²¹µÄÒ»¸ö×Ô¶¯Ê¹ÓÃµÄ Chrome ÁãÈÕÎó²î£¬£¬ÕâÊÇÒ»¸öÑÏÖØµÄɳÏäÌÓÒݹýʧ£¬£¬Ó¦Á¬Ã¦ÐÞ²¹¡£¡£¡£¡£
https://www.darkreading.com/vulnerabilities-threats/microsoft-windows-dwm-zero-day-mass-exploit
2. Î÷ÃÅ×Ó Ruggedcom Crossbow Öжà¸öí§Òâ´úÂëÖ´ÐÐÎó²î
5ÔÂ14ÈÕ£¬£¬Î÷ÃÅ×Ó Ruggedcom Crossbow Öз¢Ã÷Á˶à¸öÎó²î£¬£¬ÆäÖÐ×îÑÏÖØµÄÎó²î¿ÉÄÜÔÊÐíí§Òâ´úÂëÖ´ÐС£¡£¡£¡£Î÷ÃÅ×Ó Ruggedcom Crossbow »á¼ûÖÎÃ÷È·¾ö¼Æ»®Ö¼ÔÚΪ¹¤Òµ¿ØÖÆÏµÍ³Ìá¹©ÍøÂçÇå¾²ºÏ¹æÐÔ¡£¡£¡£¡£ÀÖ³ÉʹÓÃÆäÖÐ×îÑÏÖØµÄÎó²î¿ÉÄÜ»áÔÊÐíÔÚµÇÈÎÃü»§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£Æ¾Ö¤ÓëÓû§¹ØÁªµÄȨÏÞ£¬£¬¹¥»÷Õß¿ÉÒÔ×°ÖóÌÐò£»£»Éó²é¡¢¸ü¸Ä»òɾ³ýÊý¾Ý£»£»»ò½¨Éè¾ßÓÐÍêÈ«Óû§È¨ÏÞµÄÐÂÕÊ»§¡£¡£¡£¡£Óë¾ßÓÐÖÎÀíÓû§È¨ÏÞµÄÓû§Ïà±È£¬£¬ÆäÕÊ»§ÉèÖÃΪÔÚϵͳÉÏÓµÓнÏÉÙÓû§È¨ÏÞµÄÓû§Êܵ½µÄÓ°Ïì¿ÉÄܸüС¡£¡£¡£¡£ÊÜÓ°ÏìµÄϵͳ°üÀ¨Ruggedcom Crossbow 5.5 ֮ǰµÄ°æ±¾¡£¡£¡£¡£
https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-siemens-ruggedcom-crossbow-could-allow-for-arbitrary-code-execution_2024-055
3. ·ðÃÉÌØÖÝͨ¹ýÊý¾ÝÒþ˽·¨ÔÊÐíÏûºÄÕ߯ðËß¹«Ë¾
5ÔÂ14ÈÕ£¬£¬·ðÃÉÌØÖÝÁ¢·¨»ú¹¹ÖÜÎåͨ¹ýÁ˸ùú×îǿʢµÄ×ÛºÏÊý¾ÝÒþ˽·¨Ö®Ò»£¬£¬ÆäÖÐÔÊÐíСÎÒ˽¼ÒÆðËßÇÖÕ¼ÆäÒþ˽ȨµÄ¹«Ë¾¡ª¡ªÕâÊÇÏÖÓÐÀàËÆÖÝÖ´·¨ÖÐØ¨¹ÅδÓеĻ®¶¨¡£¡£¡£¡£¸Ã·¨°¸°üÀ¨Êý¾Ý×îС»¯ÒªÇ󣬣¬Õ⼫´óµØÏÞÖÆÁ˹«Ë¾¿ÉÒÔÍøÂçºÍʹÓõÄСÎÒ˽¼ÒÊý¾Ý£¬£¬²¢Õ¥È¡¹«Ë¾³öÊÛÏûºÄÕßµÄÃô¸ÐÊý¾Ý£¬£¬ÔÊÐíСÎÒ˽¼ÒÔÚÒÔΪÆóÒµÕâÑù×öʱÌáÆðËßËÏ¡£¡£¡£¡£Ë½ÈËËßËÏȨÔÊÐíСÎÒ˽¼ÒÒªÇóËûÃÇÒÔΪÇÖÕ¼ÆäȨÁ¦µÄ¹«Ë¾¼ç¸ºÔðÈΣ¬£¬¶øÎÞÐèÒÀÀµ¹ú¼ÒÕþ¸®½ÓÄÉÐж¯¡£¡£¡£¡£ÒÁÀûŵÒÁÖÝÉúÎïʶ±ðÒþ˽·¨ÖаüÀ¨µÄÀàËÆÌõ¿îÒý·¢ÁËÒ»²¨Ö¸¿ØÆóÒµäÂÖ°µÄÕûÌåËßËÏ¡£¡£¡£¡£·ðÃÉÌØÖÝ·¨°¸µÄ˽ÈËËßËÏȨÐèÒªÔÚÁ½ÄêºóÖØÐÂÊÚȨ£¬£¬²¢ÊÊÓÃÓÚ´¦Öóͷ£Áè¼Ý 100,000 ÌõÏûºÄÕ߼ͼµÄÈÎºÎÆóÒµ»òСÎÒ˽¼Ò¡£¡£¡£¡£¸ÃÁ¢·¨»¹Öƶ©ÁËÑÏ¿áµÄ¹«ÃñȨÁ¦°ü¹Ü²½·¥ÒÔ±ÜÃâÆçÊÓ¡£¡£¡£¡£¼ÓÖÝǿʢµÄ×ÛºÏÊý¾ÝÒþ˽·¨»¹ÔÊÐíСÎÒ˽¼ÒÆðËßËûÃÇÒÔΪÇÖÕ¼ÆäȨÁ¦µÄÆóÒµ£¬£¬µ«¸ÃÌõ¿î½öÊÊÓÃÓÚÊý¾Ýй¶£¬£¬²»ÊÊÓÃÓÚÊý×ÖÒþ˽¡£¡£¡£¡£
https://therecord.media/vermont-passes-data-privacy-law?&web_view=true
4. Android ¶ñÒâÈí¼þð³ä WhatsApp µÈAPPÇÔÈ¡Êý¾Ý
5ÔÂ15ÈÕ£¬£¬SonicWall Capture Labs ÍþвÑо¿ÍŶӱ¨¸æ³Æ£¬£¬ÍþвÐÐΪÕßÕýÔÚʹÓöñÒâ Android Ó¦ÓóÌÐòÀ´Ã°³ä Google¡¢Instagram¡¢Snapchat¡¢WhatsApp ºÍ X µÈÊ¢ÐеÄÔÚÏßЧÀÍ¡£¡£¡£¡£ÕâЩӦÓóÌÐòÖ¼ÔÚ´ÓÒ×Êܹ¥»÷µÄ Android ÊÖ»úÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬°üÀ¨ÁªÏµÈË¡¢¶ÌÐÅ¡¢Í¨»°¼Í¼ºÍÃÜÂë¡£¡£¡£¡£ÕâЩӦÓóÌÐò¿´ÆðÀ´Õýµ±£¬£¬ÓÉÓÚËüÃÇʹÓÃÊìϤµÄ»Õ±êºÍÃû³ÆÀ´ÓÕÆºÁÎÞ½äÐĵÄÓû§²¢Òþ²ØÔÚÖÚÄ¿î¥î¥Ö®Ï¡£¡£¡£¡£·¿ªÊ±£¬£¬Ó¦ÓóÌÐòÇëÇó»á¼ûÁ½¸öȨÏÞ£ºAndroid Accessibility Service ºÍ×°±¸ÖÎÀíȨÏÞ¡£¡£¡£¡£ÈôÊÇÊܺ¦ÕßÊÚÓèÕâЩȨÏÞ£¬£¬Ó¦ÓóÌÐò¾Í¿ÉÒÔ»ñµÃ×°±¸µÄÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£È»ºó£¬£¬¶ñÒâÓ¦ÓóÌÐòÓëºÚ¿Í¿ØÖÆµÄ C2 ЧÀÍÆ÷½¨ÉèÅþÁ¬£¬£¬ÎüÊÕ¸½¼ÓÖ¸Áî¡£¡£¡£¡£Ëü¿ÉÒÔ¶ÁÈ¡ÐÂÎÅ¡¢Í¨»°¼Í¼¡¢»á¼û֪ͨÊý¾Ý¡¢·¢ËÍÐÂÎÅ¡¢×°ÖöñÒâÈí¼þÒÔ¼°·¿ª¶ñÒâÍøÕ¾ÒÔ¾ÙÐÐÍøÂç´¹ÂÚ¡£¡£¡£¡£
https://www.hackread.com/android-malware-whatsapp-instagram-snapchat-data/
5. Ebury½©Ê¬ÍøÂç¶ñÒâÈí¼þÒÑѬȾ40Íǫ̀LinuxЧÀÍÆ÷
5ÔÂ14ÈÕ£¬£¬Ò»¸öÃûΪ¡°Ebury¡±µÄ¶ñÒâÈí¼þ½©Ê¬ÍøÂçÒÑѬȾÁ˽ü 400,000 ̨ Linux ЧÀÍÆ÷£¬£¬×èÖ¹ 2023 Äêµ×£¬£¬Ô¼ÓÐ 100,000 ̨ЧÀÍÆ÷ÈÔÊܵ½Íþв¡£¡£¡£¡£ESET Ñо¿Ö°Ô±Ê®¶àÄêÀ´Ò»Ö±ÔÚ¸ú×ÙÕâÖÖ³öÓÚ¾¼ÃÄîÍ·µÄ¶ñÒâÈí¼þ²Ù×÷£¬£¬²¢ÔÚ 2014 ÄêºÍ 2017 ÄêÔÙ´ÎÖÒÑÔÓÐÓøºÔع¦Ð§µÄÖØ´ó¸üС£¡£¡£¡£ESET ×Ô 2009 ÄêÒÔÀ´Ò»Ö±¹Ø×¢µÄ Ebury ѬȾÇéÐΣ¬£¬ÏÔʾѬȾÁ¿Ëæ×Åʱ¼äµÄÍÆÒÆ¶øÔöÌí¡£¡£¡£¡£×î½üµÄ Ebury ¹¥»÷Åú×¢£¬£¬¹¥»÷ÍÅ»ïÇãÏòÓÚÆÆËðÍйÜÌṩÉÌ£¬£¬²¢¶ÔÔÚÊÜѬȾÌṩÉÌÉÏ×âÓÃÐéÄâЧÀÍÆ÷µÄ¿Í»§¾ÙÐй©Ó¦Á´¹¥»÷¡£¡£¡£¡£×î³õµÄΣº¦ÊÇͨ¹ýƾ֤Ìî³ä¹¥»÷¾ÙÐе쬣¬Ê¹ÓÃÇÔÈ¡µÄƾ֤µÇ¼ЧÀÍÆ÷¡£¡£¡£¡£Ò»µ©Ð§ÀÍÆ÷Êܵ½Íþв£¬£¬¶ñÒâÈí¼þ¾Í»á´Ówtmp ºÍ known_hosts ÎļþÖÐÇÔÈ¡ÈëÕ¾/´øÍâ SSH ÅþÁ¬ÁÐ±í£¬£¬²¢ÇÔÈ¡ SSH Éí·ÝÑéÖ¤ÃÜÔ¿£¬£¬È»ºóʹÓÃÕâЩÃÜԿʵÑéµÇ¼ÆäËûϵͳ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ebury-botnet-malware-infected-400-000-linux-servers-since-2009/
6. ºÚ¿ÍÀÄÓà GoTo ¾Û»á¹¤¾ß°²ÅÅ Remcos RAT
5ÔÂ14ÈÕ£¬£¬ÔÚÒ»´ÎÖØ´óµÄÍøÂç¹¥»÷»î¶¯Öз¢Ã÷ºÚ¿ÍʹÓÃÔÚÏß¾Û»áÆ½Ì¨ GoToMeeting Èö²¥ÃûΪ Remcos µÄÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£ÕâÒ»ÁîÈËÕ𾪵ÄÉú³¤Í»ÏÔÁËÍøÂç·¸·¨·Ö×ÓʹÓÿÉÐÅÈí¼þÍ»ÆÆÇå¾²·ÀÓù²¢Î´¾ÊÚȨ»á¼ûÊܺ¦ÕßϵͳµÄÒ»Ö±ÑݱäµÄÕ½ÂÔ¡£¡£¡£¡£¹¥»÷»úÖÆÉæ¼°Ê¹Óà GoToMeeting£¨Ò»ÖÖ±»ÆóÒµÆÕ±éÓÃÓÚÐéÄâ¾Û»áµÄ¹¤¾ß£©×÷Ϊ Remcos RAT µÄÇþµÀ¡£¡£¡£¡£Remcos ÊÇÒ»ÖÖǿʢµÄ¶ñÒâÈí¼þ£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃËüÔ¶³Ì¿ØÖÆÊÜѬȾµÄÅÌËã»ú¡¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬ÉõÖÁ°²ÅÅÆäËû¶ñÒâ¸ºÔØ¡£¡£¡£¡£¹¥»÷ÕßÇÉÃîµØÔÚ¿´ËÆÕýµ±µÄ GoToMeeting ֪ͨÖÐαװÁË Remcos ÓÐÓøºÔØ¡£¡£¡£¡£ºÁÎÞ½äÐĵÄÓû§ÏàÐÅÕâЩ֪ͨÊÇÕæÊµµÄ£¬£¬Òò´Ë±»ÓÕÆÔÚËûÃǵÄϵͳÉÏÖ´ÐжñÒâÈí¼þ¡£¡£¡£¡£Ò»µ©×°Ö㬣¬Remcos ¾Í»áÊÚÓè¹¥»÷Õß¶ÔÊÜѬȾÅÌËã»úµÄÍêÈ«¿ØÖÆÈ¨£¬£¬Ê¹ËûÃÇÄܹ»ÔÚ²»±»·¢Ã÷µÄÇéÐÎϾÙÐÐÌØ¹¤»î¶¯¡¢Êý¾Ý͵ÇԺͽøÒ»²½µÄ¶ñÒâ»î¶¯¡£¡£¡£¡£Remcos µÄÒþÃØÐÔºÍÖØ´óÐÔ£¬£¬¼ÓÉÏ¶Ô GoToMeeting µÄÆÕ±éÐÅÈΣ¬£¬Ê¹µÃÕâÖÖ¹¥»÷ÌØÊâÒõÏÕÇÒÄÑÒÔÓ¦¶Ô¡£¡£¡£¡£
https://gbhackers.com/hackers-abuse-goto-meeting-tool/


¾©¹«Íø°²±¸11010802024551ºÅ