CybleÅû¶ʹÓÃαÔìChatGPTÓ¦Ó÷ַ¢¶ñÒâÈí¼þµÄ»î¶¯

Ðû²¼Ê±¼ä 2023-02-24

1¡¢CybleÅû¶ʹÓÃαÔìChatGPTÓ¦Ó÷ַ¢¶ñÒâÈí¼þµÄ»î¶¯


2ÔÂ22ÈÕ £¬£¬£¬£¬£¬£¬£¬Cyble³Æ»ùÓÚChatGPTµÄ´¹ÂÚ¹¥»÷µÄÍþвԽÀ´Ô½´ó¡£¡£¡£¡£ ¡£¡£¡£ChatGPT×Ô2022Äê11ÔÂÍÆ³öÒÔÀ´»ñµÃÁËÖØ´óµÄÀÖ³É £¬£¬£¬£¬£¬£¬£¬µ½2023Äê1ÔÂÓû§ÒÑÁè¼Ý1ÒÚ¡£¡£¡£¡£ ¡£¡£¡£Cyble¼ì²âµ½Á˶à¸ö´¹ÂÚÍøÕ¾ £¬£¬£¬£¬£¬£¬£¬ËüÃÇÕýÔÚͨ¹ýڲƭÐÔµÄOpenAIÉ罻ýÌåÒ³Ãæ¾ÙÐÐÍÆ¹ã £¬£¬£¬£¬£¬£¬£¬À´Èö²¥ÖÖÖÖÀàÐ͵ĶñÒâÈí¼þ¡£¡£¡£¡£ ¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬£¬Ò»Ð©´¹ÂÚÍøÕ¾ÕýÔÚð³äChatGPTÇÔÊØÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±»¹¼ì²âµ½50¶à¸öʹÓÃChatGPTͼ±êµÄð³äºÍ¶ñÒâÓ¦Óà £¬£¬£¬£¬£¬£¬£¬ÈçÀ¬»ø³ÌÐò¡¢¹ã¸æÈí¼þºÍÌØ¹¤Èí¼þµÈ¡£¡£¡£¡£ ¡£¡£¡£


https://blog.cyble.com/2023/02/22/the-growing-threat-of-chatgpt-based-phishing-attacks/


2¡¢ÐµÄS1deload StealerÐ®ÖÆYoutubeºÍFacebookÕÊ»§


BitdefenderÔÚ2ÔÂ22ÈÕÅû¶ÁËжñÒâÈí¼þS1deload StealerÕë¶ÔÈ«ÇòµÄ¹¥»÷»î¶¯¡£¡£¡£¡£ ¡£¡£¡£ÔÚ2022Äê7Ôµ½12Ô £¬£¬£¬£¬£¬£¬£¬Bitdefender¼ì²âµ½600¶à¸öÓû§Ñ¬È¾ÁËÕâÖÖ¶ñÒâÈí¼þ¡£¡£¡£¡£ ¡£¡£¡£S1deload StealerÒÀÀµDLL²àÔØÊÖÒÕÀ´ÔËÐÐÆä¶ñÒâ×é¼þ £¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËÒ»¸öÕýµ±µÄ¡¢¾­ÓÉÊý×ÖÊðÃûµÄ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£ ¡£¡£¡£Ò»µ©ÀÖ³ÉѬȾ £¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ¾Í»áÇÔÈ¡Óû§Æ¾Ö¤ £¬£¬£¬£¬£¬£¬£¬Ä£ÄâÈËÀàÐÐΪÀ´Ìá¸ßÊÓÆµºÍÆäËüÄÚÈݵļÓÈë¶È £¬£¬£¬£¬£¬£¬£¬ÆÀ¹ÀСÎÒ˽¼ÒÕË»§µÄ¼ÛÖµ £¬£¬£¬£¬£¬£¬£¬ÍÚ¾òBEAM¼ÓÃÜÇ®±Ò £¬£¬£¬£¬£¬£¬£¬²¢½«¶ñÒâÁ´½ÓÈö²¥¸øÓû§µÄ·ÛË¿¡£¡£¡£¡£ ¡£¡£¡£


https://www.bitdefender.com/blog/labs/s1deload-stealer-exploring-theeconomics-of-social-networkaccount-hijacking/


3¡¢OyeTalk»áй¶Óû§µÄ̸Ìì¼Í¼Òѱ»×°ÖÃÁè¼Ý500Íò´Î


¾ÝýÌå2ÔÂ22ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬£¬AndroidÓïÒô̸ÌìÓ¦ÓÃй¶ÁËÓû§µÄ̸Ìì¼Í¼¡£¡£¡£¡£ ¡£¡£¡£¸ÃÓ¦ÓÃÔÚGoogle PlayÉϵÄÏÂÔØÁ¿Áè¼Ý500Íò´Î £¬£¬£¬£¬£¬£¬£¬ÆäFirebaseʵÀýй¶ÁËÁè¼Ý500MBµÄÊý¾Ý £¬£¬£¬£¬£¬£¬£¬°üÀ¨Î´¼ÓÃܵÄÓû§Ì¸Ìì¼Í¼¡¢Óû§ÃûºÍÊÖ»ú¹ú¼ÊÒÆ¶¯×°±¸Ê¶±ðÂë(IMEI)ºÅÂëµÈ¡£¡£¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ £¬£¬£¬£¬£¬£¬£¬ÈôÊÇûÓжÔй¶µÄÊý¾Ý¾ÙÐб¸·Ý £¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜ»áɾ³ýÊý¾Ý¿âµ¼ÖÂÓû§µÄСÎÒ˽¼ÒÐÅÏ¢ÓÀÊÀɥʧ¡£¡£¡£¡£ ¡£¡£¡£Ó¦ÓõĿª·¢Ö°Ô±ÔÚ»ñϤÊý¾Ýй¶ºóÈÔδÄÜÏÞÖÆÊý¾Ý¿âµÄ»á¼û £¬£¬£¬£¬£¬£¬£¬¹È¸è²»µÃ²»½éÈëÏë·¨±£»£» £»£»£»£»£»¤¸ÃÊý¾Ý¿â¡£¡£¡£¡£ ¡£¡£¡£


https://www.hackread.com/android-voice-chat-app-data-leak/


4¡¢Ñо¿Ö°Ô±¼ì²âµ½41¸öαװ³ÉHTTP¿âµÄ¶ñÒâPyPI°ü


¾Ý2ÔÂ22ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬£¬ReversingLabsÑо¿Ö°Ô±ÔÚPyPI´æ´¢¿âÖмì²âµ½41¸öαװ³ÉHTTP¿âµÄ¶ñÒâ°ü¡£¡£¡£¡£ ¡£¡£¡£ÕâЩαÔìµÄHTTP¿âÖаüÀ¨Á½ÖÖ²î±ðÀàÐ͵ĶñÒâÄ£¿£¿£¿é£ºÏÂÔØ³ÌÐò £¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÏò±»¹¥»÷µÄϵͳÌṩµÚ¶þ½×¶ÎµÄ¶ñÒâÈí¼þ£»£» £»£»£»£»£»ÐÅÏ¢ÇÔÈ¡³ÌÐò £¬£¬£¬£¬£¬£¬£¬°üÀ¨ÓÃÓÚÊý¾Ýй¶µÄ¶ñÒ⹦Ч¡£¡£¡£¡£ ¡£¡£¡£ÀýÈç £¬£¬£¬£¬£¬£¬£¬ÐÅÏ¢ÇÔÈ¡³ÌÐòhttpxv2¿ÉÍøÂçÃÜÂëºÍÁîÅÆµÈÃô¸ÐÊý¾Ý²¢·¢Ë͸ø¹¥»÷Õß £¬£¬£¬£¬£¬£¬£¬ÏÂÔØ³ÌÐòhttpsus½«¿ÉÒɵÄpayloadÒþ²ØÆðÀ´¡£¡£¡£¡£ ¡£¡£¡£


https://www.reversinglabs.com/blog/beware-impostor-http-libraries-lurk-on-pypi


5¡¢ÐºóÃÅWinorDLL64»ò±»LazarusÓÃÓÚÇÔÈ¡Ãô¸ÐÐÅÏ¢


¾ÝESET 2ÔÂ23ÈÕ±¨µÀ £¬£¬£¬£¬£¬£¬£¬Lazarus Group¿ÉÄÜʹÓÃÁËÓëWslinkÏà¹ØµÄкóÃÅWinorDLL64¡£¡£¡£¡£ ¡£¡£¡£WinorDLL64ÊÇÒ»¸ö¹¦Ð§ÆëÈ«µÄÖ²Èë³ÌÐò £¬£¬£¬£¬£¬£¬£¬¿ÉÒÔй¶¡¢ÁýÕÖºÍɾ³ýÎļþ £¬£¬£¬£¬£¬£¬£¬Ö´ÐÐPowerShellÏÂÁî £¬£¬£¬£¬£¬£¬£¬²¢»ñÈ¡´ó×ÚϵͳÏà¹ØÐÅÏ¢¡£¡£¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ £¬£¬£¬£¬£¬£¬£¬ÓÉÓÚWinorDLL64ÔÚ¿ª·¢ÇéÐΡ¢ÐÐΪºÍ´úÂëÖÐÓë¶à¸öLazarusµÄÑù±¾ÓÐËùÖØµþ £¬£¬£¬£¬£¬£¬£¬ÕâÅú×¢Ëü¿ÉÄÜÊÇÕâ¸öAPT×éÖ¯µÄÎäÆ÷¿âÖеÄÒ»²¿·Ö¡£¡£¡£¡£ ¡£¡£¡£


https://www.welivesecurity.com/2023/02/23/winordll64-backdoor-vast-lazarus-arsenal/


6¡¢SynopsysÐû²¼2023Ä꿪ԴÇå¾²ºÍΣº¦µÄÆÊÎö±¨¸æ


ýÌå2ÔÂ22ÈÕ³Æ £¬£¬£¬£¬£¬£¬£¬SynopsysÊÓ²ìÁË17¸öÐÐÒµÖÐÔ¼1700¸ö´úÂë¿âÖз¢Ã÷µÄÎó²îºÍÔÊÐí³åÍ» £¬£¬£¬£¬£¬£¬£¬Ðû²¼Á˹ØÓÚ2023Ä꿪ԴÇå¾²ºÍΣº¦µÄÆÊÎö±¨¸æ¡£¡£¡£¡£ ¡£¡£¡£±¨¸æÖ¸³ö £¬£¬£¬£¬£¬£¬£¬84%µÄ´úÂë¿â°üÀ¨ÖÁÉÙÒ»¸öÒÑÖªµÄ¿ªÔ´Îó²î £¬£¬£¬£¬£¬£¬£¬ÓëÈ¥ÄêÏà±ÈÔöÌíÁ˽ü4%¡£¡£¡£¡£ ¡£¡£¡£ËäÈ»×ÜÌåÎó²îÂÔÓÐÉÏÉý £¬£¬£¬£¬£¬£¬£¬µ«¾ßÓиßΣº¦Îó²îµÄ´úÂë¿âµÄÕ¼½ÏÁ¿Ö®È¥ÄêϽµÁË2% £¬£¬£¬£¬£¬£¬£¬½µÖÁ48%¡£¡£¡£¡£ ¡£¡£¡£½ÌÓý¿Æ¼¼ÐÐÒµ½ÓÄÉ¿ªÔ´´úÂëµÄ±ÈÀýÔöÌíÁË163% £¬£¬£¬£¬£¬£¬£¬Æä´ÎÊǺ½¿Õº½Ìì¡¢º½¿Õ¡¢Æû³µ¡¢ÔËÊäºÍÎïÊ¢ÐÐÒµ(97%)ÒÔ¼°ÖÆÔìÒµºÍ»úеÈËÊÖÒÕ(74%)¡£¡£¡£¡£ ¡£¡£¡£


https://www.synopsys.com/software-integrity/resources/analyst-reports/open-source-security-risk-analysis.html