Microsoft Ðû²¼ÔÚ Windows ÖÐÆúÓà 1024 λ RSA ÃÜÔ¿

Ðû²¼Ê±¼ä 2024-03-20
1. Microsoft Ðû²¼ÔÚ Windows ÖÐÆúÓà 1024 λ RSA ÃÜÔ¿


3ÔÂ18ÈÕ£¬£¬£¬£¬ £¬Microsoft Ðû²¼£¬£¬£¬£¬ £¬Windows ´«Êä²ãÇå¾² (TLS) Öн«ºÜ¿ìÆúÓöÌÓÚ 2048 λµÄ RSA ÃÜÔ¿£¬£¬£¬£¬ £¬ÒÔÌṩ¸ü¸ßµÄÇå¾²ÐÔ¡£¡£¡£¡£¡£Rivest¨CShamir¨CAdleman (RSA) ÊÇÒ»ÖַǶԳƼÓÃÜϵͳ£¬£¬£¬£¬ £¬ËüʹÓÃÒ»¶Ô¹«Ô¿ºÍ˽ԿÀ´¼ÓÃÜÊý¾Ý£¬£¬£¬£¬ £¬ÆäÇ¿¶ÈÓëÃÜÔ¿µÄ³¤¶ÈÖ±½ÓÏà¹Ø¡£¡£¡£¡£¡£ÕâЩÃÜÔ¿Ô½³¤ £¬£¬£¬£¬ £¬¾ÍÔ½ÄÑÆÆ½â¡£¡£¡£¡£¡£1024 λ RSA ÃÜÔ¿µÄÇ¿¶ÈԼΪ 80 룬£¬£¬£¬ £¬¶ø 2048 λÃÜÔ¿µÄÇ¿¶ÈԼΪ 112 룬£¬£¬£¬ £¬ÕâʹµÃºóÕߵįÊÎöʱ¼ä³¤ÁË 40 ÒÚ±¶¡£¡£¡£¡£¡£¸ÃÁìÓòµÄר¼ÒÒÔΪ 2048 λÃÜÔ¿ ÖÁÉÙÔÚ 2030 Äê֮ǰ¶¼ÊÇÇå¾²µÄ¡£¡£¡£¡£¡£RSA ÃÜÔ¿ÔÚ Windows ÖÐÓÃÓÚ¶àÖÖÓÃ;£¬£¬£¬£¬ £¬°üÀ¨Ð§ÀÍÆ÷Éí·ÝÑéÖ¤¡¢Êý¾Ý¼ÓÃܺÍÈ·±£Í¨Ñ¶µÄÍêÕûÐÔ¡£¡£¡£¡£¡£Microsoft ¾öÒ齫 TLS ЧÀÍÆ÷Éí·ÝÑéÖ¤ÖÐʹÓõÄÖ¤ÊéµÄ RSA ÃÜÔ¿×îµÍÒªÇóÌá¸ßµ½ 2048 λ»ò¸ü³¤£¬£¬£¬£¬ £¬Õâ¹ØÓÚ±£»£»£»£» £»¤×éÖ¯ÃâÊÜÈõ¼ÓÃܵÄÓ°ÏìºÜÊÇÖ÷Òª¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-announces-deprecation-of-1024-bit-rsa-keys-in-windows/


2. ¶ñÒâÈí¼þ»î¶¯ÀÄÓà Google ÍøÕ¾À´ÇÔÈ¡Êý¾Ý Azorult


3ÔÂ19ÈÕ£¬£¬£¬£¬ £¬Netskope ÍþвʵÑéÊÒµÄÇå¾²Ñо¿Ö°Ô±ÆØ¹âÁËÒ»¸öÖØ´óµÄ¶ñÒâÈí¼þ»î¶¯£¬£¬£¬£¬ £¬¸Ã»î¶¯Ê¹Óà Google Э×÷ƽ̨µÄ¿ÉÐŶÈÀ´ÌṩǿʢµÄа汾 Azorult ÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÉÓÚÆäÌӱܼì²âºÍÇÔÈ¡ÖÖÖÖÃô¸ÐÐÅÏ¢µÄÏȽøÄÜÁ¦¶ø×é³ÉÁËÖØ´óµÄÍøÂçÇ徲Σº¦¡£¡£¡£¡£¡£Azorult ÊÇÒ»¸ö¶ñÒâ³ÌÐò£¬£¬£¬£¬ £¬Ö¼ÔÚÇÔÈ¡ÄúµÄ˽ÈËÐÅÏ¢¡£¡£¡£¡£¡£ËüµÄÄ¿µÄÊÇÓû§Ãû¡¢ÃÜÂë¡¢ä¯ÀÀÀúÊ·¼Í¼£¬£¬£¬£¬ £¬ÉõÖÁ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡£¡£¡£¡£¡£Òź¶µÄÊÇ£¬£¬£¬£¬ £¬Azorult ͵ÇÔ°¸¼þ³ÊÉÏÉýÇ÷ÊÆ£¬£¬£¬£¬ £¬ÓÈÆäÊÇÔÚÒ½ÁƱ£½¡ÐÐÒµ¡£¡£¡£¡£¡£Azorult ±»ÒÔΪÊÇÒÑÍùÒ»ÄêÖй¥»÷Ò½ÁƱ£½¡ÐÐÒµµÄ¶¥¼¶¶ñÒâÈí¼þ¼Ò×åÖ®Ò»¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ £¬Æä×î½üµÄ»î¶¯½«Æäа¶ñ»î¶¯ÍÆÏòÁËеĸ߶È£¬£¬£¬£¬ £¬½ÓÄÉ¶à·½ÃæµÄÒªÁìÀ´×ª´ïÆäÓÐÓøºÔØ£¬£¬£¬£¬ £¬Í¬Ê±Ìӱܼì²â¡£¡£¡£¡£¡£¹¥»÷µÄ³õʼ½×¶ÎÉæ¼°HTML ×ß˽£¬£¬£¬£¬ £¬ÕâÖÖÊÖÒÕÔÚÍøÂç¹¥»÷ÕßÖÐÔ½À´Ô½Ê¢ÐС£¡£¡£¡£¡£´ËÒªÁìͨ¹ýʹÓÃÕýµ±µÄ HTML5 ¹¦Ð§ºÍ Javascript Ö±½ÓÔÚ¿Í»§¶Ë¹¹½¨¶ñÒâ¸ºÔØ£¬£¬£¬£¬ £¬ÇÉÃîµØÈÆ¹ýWeb ¿ØÖÆ¡£¡£¡£¡£¡£ÇÉÃîµÄÊÇ£¬£¬£¬£¬ £¬¸Ã»î¶¯²¢Î´½«ÓÐÓøºÔØÇ¶Èëµ½ Javascript ×Ô¼ºÖУ¬£¬£¬£¬ £¬¶øÊÇǶÈëµ½ÍⲿÍйܵĵ¥¶À JSON ÎļþÖУ¬£¬£¬£¬ £¬´Ó¶øÔöÌíÁËÌØÁíÍâÒþÃØ²ã¡£¡£¡£¡£¡£


https://securityonline.info/sneaky-malware-campaign-abuses-google-sites-to-deliver-data-stealing-azorult/


3. Õë¶ÔÎÚ¿ËÀ¼µÄРLinux ¶ñÒâÈí¼þ±äÖÖAcidPour


3ÔÂ19ÈÕ£¬£¬£¬£¬ £¬SentinelLabs µÄÑо¿Ö°Ô±·¢Ã÷ÁËËáÓê¶ñÒâÈí¼þµÄÒ»ÖÖбäÖÖ£¬£¬£¬£¬ £¬³ÆÎª¡°Acid Pour¡±£¬£¬£¬£¬ £¬ÒÑÔÚÎÚ¿ËÀ¼·ºÆð¡£¡£¡£¡£¡£ÕâÒ»·¢Ã÷ÊÇÔÚÖÜÄ©ÓÉ SentinelLabs µÄ¸±×ܲà JA Guerrero-Saade ͨ¹ý X£¨ÒÔǰµÄ Twitter£©·ÖÏíµÄ¿´·¨µÃ³öµÄ¡£¡£¡£¡£¡£×î³õµÄ AcidRain ¶ñÒâÈí¼þÓÚ 2022 Äê 3 Ô·ºÆð£¬£¬£¬£¬ £¬ÌØÊâÊÇÔÚ¡°Viasat ºÚ¿Í¹¥»÷¡±Ê±´úʹÓ㬣¬£¬£¬ £¬¸ÃºÚ¿Í¹¥»÷ÔÚ¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼×îÏÈʱÖÐÖ¹ÁË KA-SAT Surfbeam2 µ÷ÖÆ½âµ÷Æ÷¡£¡£¡£¡£¡£SentinelLabs µÄÊ×ϯÍþвÑо¿Ô±TomHegel·¢Ã÷ÁËרΪ Linux x86 ×°±¸±àÒëµÄбäÌå¡£¡£¡£¡£¡£ËäÈ» AcidPour Óë AcidRain ÔÚijЩ×Ö·û´®ÖоßÓÐÏàËÆÖ®´¦£¬£¬£¬£¬ £¬µ«ËüÔÚ´úÂë¿âÖб£´æÏÔ×Ųî±ð£¬£¬£¬£¬ £¬´úÂë¿âÊÇÕë¶Ô x86 ¼Ü¹¹¶ø²»ÊÇ MIPS ±àÒëµÄ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ £¬ÊÊÓÃÓÚ x86 ×°±¸µÄÊ¢ÐÐ Linux ¿¯Ðаæ°üÀ¨ Ubuntu¡¢Mint¡¢Fedora ºÍ Debian¡£¡£¡£¡£¡£ÁíÒ»·½Ã棬£¬£¬£¬ £¬MIPS£¨ÎÞ»¥ËøÁ÷Ë®Ï߽׶εÄ΢´¦Öóͷ£Æ÷£©ÊÇÒ»ÖÖÖ¸Á¼Ü¹¹£¨ISA£©£¬£¬£¬£¬ £¬ËüʵÖÊÉϽç˵ÁË´¦Öóͷ£Æ÷Ã÷È·²¢ÓÃÓÚÖ´ÐÐÖ¸ÁîµÄÓïÑÔ¡£¡£¡£¡£¡£Óë x86 ÀàËÆ£¬£¬£¬£¬ £¬ËüÊÇÒ»×鹨ÓÚ´¦Öóͷ£Æ÷ÔõÑùÔËÐеĹæÔòºÍ¹æ·¶¡£¡£¡£¡£¡£


https://www.hackread.com/acidrain-linux-malware-variant-acidpour-ukraine/#google_vignette


4. Ð嵀 DEEP#GOSU ¶ñÒâÈí¼þ»î¶¯Ê¹Óø߼¶Õ½ÂÔÃé×¼ Windows Óû§


3ÔÂ18ÈÕ£¬£¬£¬£¬ £¬¸Ã¹¥»÷»î¶¯Ê¹Óà PowerShell ºÍ VBScript ¶ñÒâÈí¼þÀ´Ñ¬È¾ Windows ϵͳ²¢»ñÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾ Securonix ½«¸Ã»î¶¯³ÆÎª¡°DEEP#GOSU¡±£¬£¬£¬£¬ £¬ÌåÏָû¿ÉÄÜÓ볯Ïʹú¼ÒÖ§³ÖµÄÃûΪKimsukyµÄ×éÖ¯ÓйØ¡£¡£¡£¡£¡£DEEP#GOSUÖÐʹÓõĶñÒâÈí¼þÓÐÓøºÔØ´ú±íÁËÒ»ÖÖÖØ´óµÄ¶à½×¶ÎÍþв£¬£¬£¬£¬ £¬Ö¼ÔÚÔÚ Windows ϵͳÉÏÉñÃØÔËÐУ¬£¬£¬£¬ £¬ÓÈÆäÊÇ´ÓÍøÂç¼à¿ØµÄ½Ç¶ÈÀ´¿´¡£¡£¡£¡£¡£ËüµÄ¹¦Ð§°üÀ¨¼üÅ̼ͼ¡¢¼ôÌù°å¼à¿Ø¡¢¶¯Ì¬ÓÐÓøºÔØÖ´ÐкÍÊý¾Ýй¶£¬£¬£¬£¬ £¬ÒÔ¼°Ê¹Óà RAT Èí¼þ¾ÙÐÐÍêȫԶ³Ì»á¼û¡¢ÍýÏëʹÃüÒÔ¼°Ê¹ÓÃ×÷Òµ×Ô¶¯Ö´ÐÐ PowerShell ¾ç±¾µÄ³¤ÆÚÐÔ¡£¡£¡£¡£¡£Ñ¬È¾Àú³ÌµÄÒ»¸öÖµµÃ×¢ÖØµÄ·½ÃæÊÇ£¬£¬£¬£¬ £¬ËüʹÓà Dropbox »ò Google Docs µÈÕýµ±Ð§À;ÙÐÐÏÂÁîºÍ¿ØÖÆ (C2)£¬£¬£¬£¬ £¬´Ó¶øÔÊÐíÍþвÐÐΪÕßÔÚδ¼ì²âµ½µÄÇéÐÎÏÂÈÚÈëͨÀýÍøÂçÁ÷Á¿¡£¡£¡£¡£¡£


https://thehackernews.com/2024/03/new-deepgosu-malware-campaign-targets.html


5. ºÚ¿ÍÔÚÍøÂç¹¥»÷ÖÐʹÓÃÎäÆ÷»¯ SVG Îļþ


3ÔÂ18ÈÕ£¬£¬£¬£¬ £¬ÍøÂç·¸·¨·Ö×ÓÖØÐÂʹÓÿÉÀ©Õ¹Ê¸Á¿Í¼ÐÎ (SVG) ÎļþÀ´Èö²¥¶ñÒâÈí¼þ£¬£¬£¬£¬ £¬ÕâÖÖÊÖÒÕËæ×Å AutoSmuggle ¹¤¾ßµÄ·ºÆð¶ø»ñµÃÁËÏÔ×ÅÉú³¤¡£¡£¡£¡£¡£AutoSmuggle ÓÚ 2022 Äê 5 ÔÂÍÆ³ö£¬£¬£¬£¬ £¬ÓÐÖúÓÚÔÚ HTML »ò SVG ÄÚÈÝÖÐǶÈë¶ñÒâÎļþ£¬£¬£¬£¬ £¬Ê¹¹¥»÷Õ߸üÈÝÒ×ÈÆ¹ýÇå¾²²½·¥¡£¡£¡£¡£¡£ÀÄÓà SVG ÎļþÈö²¥¶ñÒâÈí¼þµÄÇéÐοÉÒÔ×·Ëݵ½ 2015 Ä꣬£¬£¬£¬ £¬ÀÕË÷Èí¼þÊÇ×îÏÈͨ¹ý´ËǰÑÔÈö²¥µÄÀÕË÷Èí¼þÖ®Ò»¡£¡£¡£¡£¡£2017 Äê 1 Ô£¬£¬£¬£¬ £¬SVG Îļþ±»ÓÃÀ´Í¨¹ý URL ÏÂÔØ Ursnif ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£2022 Ä걬·¢ÁËÖØ´ó±¼ÌÚ£¬£¬£¬£¬ £¬Æäʱ SVG ͨ¹ýǶÈëʽ .zip ´æµµÈö²¥QakBotµÈ¶ñÒâÈí¼þ£¬£¬£¬£¬ £¬Õ¹Ê¾ÁË´ÓÍâÊÖÏÂÔØµ½ HTML ×ß˽ÊÖÒÕµÄת±ä¡£¡£¡£¡£¡£2022 Äê AutoSmuggle ÔÚ GitHub ÉϵÄÐû²¼±ê¼Ç×ÅÒ»¸öתÕ۵㡣¡£¡£¡£¡£¸Ã¹¤¾ß½«¿ÉÖ´ÐÐÎļþ»ò´æµµÇ¶Èëµ½ SVG/HTML ÎļþÖУ¬£¬£¬£¬ £¬È»ºóÔÚÊܺ¦Õß·­¿ªÊ±½âÃܲ¢Ö´ÐС£¡£¡£¡£¡£´ËÒªÁìÇÉÃîµØ±Ü¿ªÁËͨ³£»£»£»£» £»á¼ì²âºÍ¸ôÀëÖ±½Óµç×ÓÓʼþ¸½¼þµÄÇå¾²µç×ÓÓʼþÍø¹Ø(SEG)¡£¡£¡£¡£¡£


https://gbhackers.com/hackers-using-weaponized-svg-files-in-cyber-attacks/


6. Nissan Oceania ÒÑÈ·ÈÏÈ¥ÄêÔâÊܵÄÊý¾Ýй¶ӰÏìÔ¼ 10 ÍòÈË


3ÔÂ18ÈÕ£¬£¬£¬£¬ £¬Nissan Oceania ÒÑÈ·ÈÏ 2023 Äê 12 ÔÂÔâÊܵÄÊý¾Ýй¶ӰÏìÁËÔ¼ 10 ÍòÈË£¬£¬£¬£¬ £¬²¢ÒÑ×îÏÈÏòËûÃÇ·¢³ö֪ͨ¡£¡£¡£¡£¡££¬£¬£¬£¬ £¬¸Ã¹«Ë¾£¨°üÀ¨ÈÕ²úÆû³µ¹«Ë¾ÒÔ¼°°Ä´óÀûÑǺÍÐÂÎ÷À¼µÄÈÕ²ú½ðÈÚЧÀ͹«Ë¾£©Í¸Â¶£¬£¬£¬£¬ £¬Î´¾­ÊÚȨµÄµÚÈý·½»á¼ûÁËÆäÍâµØ IT ЧÀÍÆ÷²¢µ¼ÖÂÍ£»£»£»£» £»ú¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ö¸³ö£º¡°ÎÒÃÇÁ¬Ã¦½ÓÄÉÐж¯×èֹΥ¹æÐÐΪ£¬£¬£¬£¬ £¬²¢ÊµÊ±ÏòÏà¹ØÕþ¸®»ú¹¹·¢³ö¾¯±¨£¬£¬£¬£¬ £¬°üÀ¨°Ä´óÀûÑǺÍÐÂÎ÷À¼¹ú¼ÒÍøÂçÇå¾²ÖÐÐĺÍÒþ˽î¿Ïµ»ú¹¹¡£¡£¡£¡£¡£¡±Æäʱ£¬£¬£¬£¬ £¬ËûÃÇÎÞ·¨È·ÈÏÊÂÎñµÄÑÏÖØË®Æ½ºÍÀàÐÍ£¬£¬£¬£¬ £¬µ«¼¸Öܺ󣬣¬£¬£¬ £¬Akira ÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬ £¬²¢Ð¹Â¶Á˾ݳƴӸù«Ë¾ÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ëæºó±Þ²ß¿Í»§×¢ÖØÒì³£»£»£»£» £»î¶¯ºÍ¿ÉÄܵÄÕ©Æ­£¬£¬£¬£¬ £¬Í¬Ê±ÓëÕþ¸®Õþ¸®ºÍÍâ²¿ÍøÂçȡ֤ר¼ÒÏàÖú¼ÌÐøÊӲ졣¡£¡£¡£¡£


https://www.helpnetsecurity.com/2024/03/18/nissan-data-breach/