Microsoft Windows DWM ÁãÈÕÎó²î±»´ó¹æÄ£Ê¹ÓÃ

Ðû²¼Ê±¼ä 2024-05-16
1. Microsoft Windows DWM ÁãÈÕÎó²î±»´ó¹æÄ£Ê¹ÓÃ


5ÔÂ15ÈÕ £¬Î¢ÈíÐû²¼ÎåÔ²¹¶¡¸üР£¬×ܹ² 59 ¸ö CVE  £¬ÖÁÉÙÓÐÒ»¸öÖÚËùÖÜÖªµÄÎó²îÒѱ»´ó¹æÄ£Ê¹Óà £¬²¢ÇÒȷʵÒѾ­±» QakBot ËùʹÓᣱ¾ÔÂÅû¶µÄȱÏÝÓ°ÏìÁËÅÌËã kahuna µÄÕû¸ö²úÆ·×éºÏ £¬°üÀ¨ Windows¡¢Office¡¢.NET Framework ºÍ Visual Studio £»Î¢Èí365 £»µçÁ¦ÉÌÒµÖÇÄÜ £»DHCP ·þÎñÆ÷ £»Microsoft Edge£¨»ùÓÚ Chromium£© £»ºÍ Windows ÒÆ¶¯¿í´ø¡ £»ùÓÚ Chromium µÄ Edge ä¯ÀÀÆ÷Êܵ½ CVE-2024-4761 µÄÓ°Ïì £¬ÕâÊÇ Google ½ñÌìÐÞ²¹µÄÒ»¸ö×Ô¶¯Ê¹ÓÃµÄ Chrome ÁãÈÕÎó²î £¬ÕâÊÇÒ»¸öÑÏÖØµÄɳÏäÌÓÒݹýʧ £¬Ó¦Á¬Ã¦ÐÞ²¹¡£


https://www.darkreading.com/vulnerabilities-threats/microsoft-windows-dwm-zero-day-mass-exploit


2. Î÷ÃÅ×Ó Ruggedcom Crossbow Öжà¸öí§Òâ´úÂëÖ´ÐÐÎó²î


5ÔÂ14ÈÕ £¬Î÷ÃÅ×Ó Ruggedcom Crossbow Öз¢Ã÷Á˶à¸öÎó²î £¬ÆäÖÐ×îÑÏÖØµÄÎó²î¿ÉÄÜÔÊÐíí§Òâ´úÂëÖ´ÐС£Î÷ÃÅ×Ó Ruggedcom Crossbow »á¼ûÖÎÃ÷È·¾ö¼Æ»®Ö¼ÔÚΪ¹¤Òµ¿ØÖÆÏµÍ³Ìá¹©ÍøÂçÇå¾²ºÏ¹æÐÔ¡£ÀÖ³ÉʹÓÃÆäÖÐ×îÑÏÖØµÄÎó²î¿ÉÄÜ»áÔÊÐíÔÚµÇÈÎÃü»§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂ롣ƾ֤ÓëÓû§¹ØÁªµÄȨÏÞ £¬¹¥»÷Õß¿ÉÒÔ×°ÖóÌÐò £»Éó²é¡¢¸ü¸Ä»òɾ³ýÊý¾Ý £»»ò½¨Éè¾ßÓÐÍêÈ«Óû§È¨ÏÞµÄÐÂÕÊ»§¡£Óë¾ßÓÐÖÎÀíÓû§È¨ÏÞµÄÓû§Ïà±È £¬ÆäÕÊ»§ÉèÖÃΪÔÚϵͳÉÏÓµÓнÏÉÙÓû§È¨ÏÞµÄÓû§Êܵ½µÄÓ°Ïì¿ÉÄܸüС¡£ÊÜÓ°ÏìµÄϵͳ°üÀ¨Ruggedcom Crossbow 5.5 ֮ǰµÄ°æ±¾¡£


https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-siemens-ruggedcom-crossbow-could-allow-for-arbitrary-code-execution_2024-055


3. ·ðÃÉÌØÖÝͨ¹ýÊý¾ÝÒþ˽·¨ÔÊÐíÏûºÄÕ߯ðËß¹«Ë¾


5ÔÂ14ÈÕ £¬·ðÃÉÌØÖÝÁ¢·¨»ú¹¹ÖÜÎåͨ¹ýÁ˸ùú×îǿʢµÄ×ÛºÏÊý¾ÝÒþ˽·¨Ö®Ò» £¬ÆäÖÐÔÊÐíСÎÒ˽¼ÒÆðËßÇÖÕ¼ÆäÒþ˽ȨµÄ¹«Ë¾¡ª¡ªÕâÊÇÏÖÓÐÀàËÆÖÝÖ´·¨ÖÐØ¨¹ÅδÓеĻ®¶¨¡£¸Ã·¨°¸°üÀ¨Êý¾Ý×îС»¯ÒªÇó £¬Õ⼫´óµØÏÞÖÆÁ˹«Ë¾¿ÉÒÔÍøÂçºÍʹÓõÄСÎÒ˽¼ÒÊý¾Ý £¬²¢Õ¥È¡¹«Ë¾³öÊÛÏûºÄÕßµÄÃô¸ÐÊý¾Ý £¬ÔÊÐíСÎÒ˽¼ÒÔÚÒÔΪÆóÒµÕâÑù×öʱÌáÆðËßËÏ¡£Ë½ÈËËßËÏȨÔÊÐíСÎÒ˽¼ÒÒªÇóËûÃÇÒÔΪÇÖÕ¼ÆäȨÁ¦µÄ¹«Ë¾¼ç¸ºÔðÈÎ £¬¶øÎÞÐèÒÀÀµ¹ú¼ÒÕþ¸®½ÓÄÉÐж¯¡£ÒÁÀûŵÒÁÖÝÉúÎïʶ±ðÒþ˽·¨ÖаüÀ¨µÄÀàËÆÌõ¿îÒý·¢ÁËÒ»²¨Ö¸¿ØÆóÒµäÂÖ°µÄÕûÌåËßËÏ¡£·ðÃÉÌØÖÝ·¨°¸µÄ˽ÈËËßËÏȨÐèÒªÔÚÁ½ÄêºóÖØÐÂÊÚȨ £¬²¢ÊÊÓÃÓÚ´¦Öóͷ£Áè¼Ý 100,000 ÌõÏûºÄÕ߼ͼµÄÈÎºÎÆóÒµ»òСÎÒ˽¼Ò¡£¸ÃÁ¢·¨»¹Öƶ©ÁËÑÏ¿áµÄ¹«ÃñȨÁ¦°ü¹Ü²½·¥ÒÔ±ÜÃâÆçÊÓ¡£¼ÓÖÝǿʢµÄ×ÛºÏÊý¾ÝÒþ˽·¨»¹ÔÊÐíСÎÒ˽¼ÒÆðËßËûÃÇÒÔΪÇÖÕ¼ÆäȨÁ¦µÄÆóÒµ £¬µ«¸ÃÌõ¿î½öÊÊÓÃÓÚÊý¾Ýй¶ £¬²»ÊÊÓÃÓÚÊý×ÖÒþ˽¡£


https://therecord.media/vermont-passes-data-privacy-law?&web_view=true


4. Android ¶ñÒâÈí¼þð³ä WhatsApp µÈAPPÇÔÈ¡Êý¾Ý


5ÔÂ15ÈÕ £¬SonicWall Capture Labs ÍþвÑо¿ÍŶӱ¨¸æ³Æ £¬ÍþвÐÐΪÕßÕýÔÚʹÓöñÒâ Android Ó¦ÓóÌÐòÀ´Ã°³ä Google¡¢Instagram¡¢Snapchat¡¢WhatsApp ºÍ X µÈÊ¢ÐеÄÔÚÏß·þÎñ¡£ÕâЩӦÓóÌÐòÖ¼ÔÚ´ÓÒ×Êܹ¥»÷µÄ Android ÊÖ»úÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý £¬°üÀ¨ÁªÏµÈË¡¢¶ÌÐÅ¡¢Í¨»°¼Í¼ºÍÃÜÂë¡£ÕâЩӦÓóÌÐò¿´ÆðÀ´Õýµ± £¬ÓÉÓÚËüÃÇʹÓÃÊìϤµÄ»Õ±êºÍÃû³ÆÀ´ÓÕÆ­ºÁÎÞ½äÐĵÄÓû§²¢Òþ²ØÔÚÖÚÄ¿î¥î¥Ö®Ï¡£·­¿ªÊ± £¬Ó¦ÓóÌÐòÇëÇó»á¼ûÁ½¸öȨÏÞ£ºAndroid Accessibility Service ºÍ×°±¸ÖÎÀíȨÏÞ¡£ÈôÊÇÊܺ¦ÕßÊÚÓèÕâЩȨÏÞ £¬Ó¦ÓóÌÐò¾Í¿ÉÒÔ»ñµÃ×°±¸µÄÍêÈ«¿ØÖÆÈ¨¡£È»ºó £¬¶ñÒâÓ¦ÓóÌÐòÓëºÚ¿Í¿ØÖÆµÄ C2 ·þÎñÆ÷½¨ÉèÅþÁ¬ £¬ÎüÊÕ¸½¼ÓÖ¸Áî¡£Ëü¿ÉÒÔ¶ÁÈ¡ÐÂÎÅ¡¢Í¨»°¼Í¼¡¢»á¼û֪ͨÊý¾Ý¡¢·¢ËÍÐÂÎÅ¡¢×°ÖöñÒâÈí¼þÒÔ¼°·­¿ª¶ñÒâÍøÕ¾ÒÔ¾ÙÐÐÍøÂç´¹ÂÚ¡£


https://www.hackread.com/android-malware-whatsapp-instagram-snapchat-data/


5. Ebury½©Ê¬ÍøÂç¶ñÒâÈí¼þÒÑѬȾ40Íǫ̀Linux·þÎñÆ÷


5ÔÂ14ÈÕ £¬Ò»¸öÃûΪ¡°Ebury¡±µÄ¶ñÒâÈí¼þ½©Ê¬ÍøÂçÒÑѬȾÁ˽ü 400,000 ̨ Linux ·þÎñÆ÷ £¬×èÖ¹ 2023 Äêµ× £¬Ô¼ÓÐ 100,000 ̨·þÎñÆ÷ÈÔÊܵ½Íþв¡£ESET Ñо¿Ö°Ô±Ê®¶àÄêÀ´Ò»Ö±ÔÚ¸ú×ÙÕâÖÖ³öÓÚ¾­¼ÃÄîÍ·µÄ¶ñÒâÈí¼þ²Ù×÷ £¬²¢ÔÚ 2014 ÄêºÍ 2017 ÄêÔÙ´ÎÖÒÑÔÓÐÓøºÔع¦Ð§µÄÖØ´ó¸üС£ESET ×Ô 2009 ÄêÒÔÀ´Ò»Ö±¹Ø×¢µÄ Ebury ѬȾÇéÐÎ £¬ÏÔʾѬȾÁ¿Ëæ×Åʱ¼äµÄÍÆÒÆ¶øÔöÌí¡£×î½üµÄ Ebury ¹¥»÷Åú×¢ £¬¹¥»÷ÍÅ»ïÇãÏòÓÚÆÆËðÍйÜÌṩÉÌ £¬²¢¶ÔÔÚÊÜѬȾÌṩÉÌÉÏ×âÓÃÐéÄâ·þÎñÆ÷µÄ¿Í»§¾ÙÐй©Ó¦Á´¹¥»÷¡£×î³õµÄΣº¦ÊÇͨ¹ýƾ֤Ìî³ä¹¥»÷¾ÙÐеÄ £¬Ê¹ÓÃÇÔÈ¡µÄƾ֤µÇ¼·þÎñÆ÷¡£Ò»µ©·þÎñÆ÷Êܵ½Íþв £¬¶ñÒâÈí¼þ¾Í»á´Ówtmp ºÍ known_hosts ÎļþÖÐÇÔÈ¡ÈëÕ¾/´øÍâ SSH ÅþÁ¬Áбí £¬²¢ÇÔÈ¡ SSH Éí·ÝÑéÖ¤ÃÜÔ¿ £¬È»ºóʹÓÃÕâЩÃÜԿʵÑéµÇ¼ÆäËûϵͳ¡£ 


https://www.bleepingcomputer.com/news/security/ebury-botnet-malware-infected-400-000-linux-servers-since-2009/


6. ºÚ¿ÍÀÄÓà GoTo ¾Û»á¹¤¾ß°²ÅÅ Remcos RAT


5ÔÂ14ÈÕ £¬ÔÚÒ»´ÎÖØ´óµÄÍøÂç¹¥»÷Ô˶¯Öз¢Ã÷ºÚ¿ÍʹÓÃÔÚÏß¾Û»áÆ½Ì¨ GoToMeeting Èö²¥ÃûΪ Remcos µÄÔ¶³Ì»á¼ûľÂí¡£ÕâÒ»ÁîÈËÕ𾪵ÄÉú³¤Í»ÏÔÁËÍøÂç·¸·¨·Ö×ÓʹÓÿÉÐÅÈí¼þÍ»ÆÆÇå¾²·ÀÓù²¢Î´¾­ÊÚȨ»á¼ûÊܺ¦ÕßϵͳµÄÒ»Ö±ÑݱäµÄÕ½ÂÔ¡£¹¥»÷»úÖÆÉæ¼°Ê¹Óà GoToMeeting£¨Ò»ÖÖ±»ÆóÒµÆÕ±éÓÃÓÚÐéÄâ¾Û»áµÄ¹¤¾ß£©×÷Ϊ Remcos RAT µÄÇþµÀ¡£Remcos ÊÇÒ»ÖÖǿʢµÄ¶ñÒâÈí¼þ £¬¹¥»÷Õß¿ÉÒÔʹÓÃËüÔ¶³Ì¿ØÖÆÊÜѬȾµÄÅÌËã»ú¡¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢ £¬ÉõÖÁ°²ÅÅÆäËû¶ñÒâ¸ºÔØ¡£¹¥»÷ÕßÇÉÃîµØÔÚ¿´ËÆÕýµ±µÄ GoToMeeting ֪ͨÖÐαװÁË Remcos ÓÐÓøºÔØ¡£ºÁÎÞ½äÐĵÄÓû§ÐÅÍÐÕâЩ֪ͨÊÇÕæÊµµÄ £¬Òò´Ë±»ÓÕÆ­ÔÚËûÃǵÄϵͳÉÏÖ´ÐжñÒâÈí¼þ¡£Ò»µ©×°Öà £¬Remcos ¾Í»áÊÚÓè¹¥»÷Õß¶ÔÊÜѬȾÅÌËã»úµÄÍêÈ«¿ØÖÆÈ¨ £¬Ê¹ËûÃÇÄܹ»ÔÚ²»±»·¢Ã÷µÄÇéÐÎϾÙÐÐÌØ¹¤Ô˶¯¡¢Êý¾Ý͵ÇԺͽøÒ»²½µÄ¶ñÒâÔ˶¯¡£Remcos µÄÒþÃØÐÔºÍÖØ´óÐÔ £¬¼ÓÉÏ¶Ô GoToMeeting µÄÆÕ±éÐÅÍÐ £¬Ê¹µÃÕâÖÖ¹¥»÷ÌØÊâÒõÏÕÇÒÄÑÒÔÓ¦¶Ô¡£


https://gbhackers.com/hackers-abuse-goto-meeting-tool/