CISAºÍÏàÖúͬ°éÐû²¼ÓйØBlack BastaµÄ×Éѯ

Ðû²¼Ê±¼ä 2024-05-13
1. CISAºÍÏàÖúͬ°éÐû²¼ÓйØBlack BastaµÄ×Éѯ


5ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬CISA ÓëÁª°îÊÓ²ì¾Ö (FBI)¡¢ÎÀÉúÓ빫ÖÚЧÀͲ¿ (HHS) ÒÔ¼°¶àÖÝÐÅÏ¢¹²ÏíºÍÆÊÎöÖÐÐÄ (MS-ISAC) ÏàÖúÐû²¼ÁËÁªºÏÍøÂçÇå¾²×Éѯ (CSA) # StopRansomware£ºBlack BastaÎªÍøÂçÇå¾²·ÀÓùÕßÌṩսÊõ¡¢ÊÖÒպͳÌÐò (TTP) ÒÔ¼°ÒÑÖª Black Basta ÀÕË÷Èí¼þÁ¥Êô»ú¹¹Ê¹ÓõÄΣº¦Ö¸±ê (IOC)£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ý FBI ÊÓ²ìºÍµÚÈý·½±¨¸æ¾ÙÐÐʶ±ð¡£ ¡£¡£Black Basta ÊÇÒ»ÖÖÀÕË÷Èí¼þ¼´Ð§ÀÍ (RaaS) ±äÌ壬£¬£¬£¬£¬£¬£¬ÓÚ 2022 Äê 4 ÔÂÊ״η¢Ã÷¡£ ¡£¡£Black Basta Á¥Êô¹«Ë¾ÒÑÕë¶Ô±±ÃÀ¡¢Å·Ö޺ͰĴóÀûÑÇµÄ 500 ¶à¸ö˽ӪÐÐÒµºÍÒªº¦»ù´¡ÉèʩʵÌ壬£¬£¬£¬£¬£¬£¬°üÀ¨Ò½ÁƱ£½¡×éÖ¯¡£ ¡£¡£CISA ºÍÏàÖúͬ°éÃãÀø×éÖ¯Éó²é²¢ÊµÑéÁªºÏ CSA ÖÐÌṩµÄ»º½â²½·¥£¬£¬£¬£¬£¬£¬£¬ÒÔïÔÌ­ Black Basta ºÍÆäËûÀÕË÷Èí¼þÊÂÎñµÄ¿ÉÄÜÐÔºÍÓ°Ïì¡£ ¡£¡£


https://www.cisa.gov/news-events/alerts/2024/05/10/cisa-and-partners-release-advisory-black-basta-ransomware


2. Chrome½ôÆÈ¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÑÏÖØÎó²îCVE-2024-4671


5ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬¹È¸èÐû²¼ÁË Chrome ä¯ÀÀÆ÷µÄ½ôÆÈ¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÒ»¸öÑÏÖØµÄÁãÈÕÎó²îCVE-2024-4671¡£ ¡£¡£¡°ÊͷźóʹÓá±Îó²îÓ°Ïì Chrome µÄÊÓ¾õ×é¼þ£¬£¬£¬£¬£¬£¬£¬¸Ã×é¼þÈÏÕæäÖȾºÍÏÔʾÄÚÈÝ¡£ ¡£¡£CVE-2024-4671 ÊÇÓÉһλÄäÃûÑо¿Ö°Ô±Ê¶±ð²¢Ïò Google ±¨¸æµÄ¡£ ¡£¡£¸Ã¹«Ë¾Í¸Â¶£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÄÜÕýÔÚ±»Æð¾¢Ê¹Óᣠ¡£¡£´ËÎó²îʹÓÃÁ˳ÌÐòÔÚÊÍ·ÅÄÚ´æÖ¸Õëºó¼ÌÐøÊ¹ÓøÃÄÚ´æÖ¸ÕëµÄȱÏÝ£¬£¬£¬£¬£¬£¬£¬¿ÉÄܻᵼÖÂδ¾­ÊÚȨµÄÊý¾Ý²Ù×÷»òÍ߽⡣ ¡£¡£ÓÉÓÚ¸üа²ÅÅÔÚÖÖÖÖÆ½Ì¨£¨°üÀ¨ Mac¡¢Windows ºÍ Linux£©ÉÏ£¬£¬£¬£¬£¬£¬£¬Òò´ËÓû§Ó¦È·±£ËûÃÇÔËÐеÄÊÇ×îа汾µÄ Chrome¡£ ¡£¡£¿£¿£¿£¿£¿£¿£¿ÉÒÔͨ¹ýµ¼º½ÖÁ¡°ÉèÖá±>¡°¹ØÓÚ Chrome¡±À´¼ì²é¡£ ¡£¡£ÕâÖÖ×Ô¶¯²½·¥¿ÉÈ·Èϲ¹¶¡ÒÑÓ¦Ó㬣¬£¬£¬£¬£¬£¬´Ó¶ø±£»£»£»£»£»£»¤ÄúµÄϵͳÃâÊÜDZÔڵĹ¥»÷¡£ ¡£¡£ÈôÊÇÄú·¢Ã÷ÄúµÄä¯ÀÀÆ÷²»ÊÇ×îа汾£¬£¬£¬£¬£¬£¬£¬½¨ÒéÄúÁ¬Ã¦¸üС£ ¡£¡£


https://blog.qualys.com/vulnerabilities-threat-research/2024/05/10/get-weekends-back-put-chrome-cves-like-cve-2024-4671-on-auto-patching


3. IntelBroker Éù³ÆÒÑÀÖ³ÉÇÖÈëÅ·ÃËÖ´·¨ÏàÖú»ú¹¹


5ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÔÚBreachForumsÉÏÐû²¼ÁËÕâÒ»ÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬³Æ´Ë´Îй¶ÊÂÎñ±¬·¢ÔÚ±¾ÔÂÔçЩʱ¼ä£¬£¬£¬£¬£¬£¬£¬Éæ¼°¸ß¶ÈÃô¸ÐºÍÉñÃØÐÅÏ¢¡£ ¡£¡£²¢ÇÒIntelBroker͸¶Êý¾ÝÒѱ»³öÊÛ¸øÄäÃûÂò¼Ò¡£ ¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨Í¬ÃËÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢¡¢½ö¹©¹Ù·½Ê¹Óà (FOUO) Ô´´úÂë¡¢×÷Õ½ÎļþºÍÊÜÓ°ÏìµÄÏêϸ»ú¹¹ÁбíµÈ¡£ ¡£¡£ÈôÊÇÊôʵ£¬£¬£¬£¬£¬£¬£¬´ËÀàÒªº¦Êý¾ÝµÄ̻¶¿ÉÄÜ»á¶ÔÕâЩ»ú¹¹µÄÒ»Á¬ÔËÓªºÍСÎÒ˽¼ÒÇå¾²×é³ÉÑÏÖØÎ£º¦¡£ ¡£¡£¾Ý³ÆµÄÎ¥¹æÐÐΪ»¹¿ÉÄÜÆÆËðÅ·ÖÞÐ̾¯×éÖ¯Ðж¯µÄÍêÕûÐÔºÍÇå¾²ÐÔ¡£ ¡£¡£Å·ÖÞÐ̾¯×éÖ¯ÉÐδÐû²¼ÕýʽÉùÃ÷£¬£¬£¬£¬£¬£¬£¬Ïêϸ˵Ã÷ÊÇ·ñ±¬·¢ÁËÎ¥¹æÐÐΪ¡¢Î¥¹æË®Æ½ÒÔ¼°Îª¼õÇáÆäÓ°Ïì¶ø½ÓÄɵIJ½·¥¡£ ¡£¡£


https://www.hackread.com/europol-hacked-intelbroker-claims-data-breach/


4. LLM Ð®ÖÆ¹¥»÷ÈúڿÍÐ®ÖÆ AI Ä£×ÓÒÔ»ñÈ¡ÀûÈó


5ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪ¡°LLMjacking¡±µÄÐÂÐÍÍøÂç¹¥»÷ÍýÏ룬£¬£¬£¬£¬£¬£¬Ê¹Óñ»µÁµÄÔÆÆ¾Ö¤À´Ð®ÖÆÇ¿Ê¢µÄÈ˹¤ÖÇÄÜÄ£×Ó¡£ ¡£¡£ÍøÂç·¸·¨·Ö×ÓʹÓñ»µÁµÄÔÆÆ¾Ö¤£¨ºÜ¿ÉÄÜÊÇ´ÓÊÜËðµÄÔÆÕÊ»§»ñµÃµÄ£©À´Ãé×¼ÔËÐйýʱÈí¼þµÄϵͳ£¬£¬£¬£¬£¬£¬£¬ÒÔÉøÍ¸ÔËÐÐ LLM µÄϵͳ£¬£¬£¬£¬£¬£¬£¬ÒÔ½âËøÆäÄÜÁ¦µÄ±¦¿â¡£ ¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÔÚËûÃǵÄÑо¿Ðû²¼Ö®Ç°£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒѾ­»á¼ûÁËÊ®ÖÖ²î±ðÈ˹¤ÖÇÄÜЧÀ굀 LLM Ä£×Ó£¬£¬£¬£¬£¬£¬£¬°üÀ¨ Anthropic¡¢AWS Bedrock¡¢Google Cloud Vertex AI¡¢Mistral ºÍ OpenAI¡£ ¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÕýÔڸ͝ÊÜѬȾϵͳÖеÄÈÕÖ¾ÉèÖ㬣¬£¬£¬£¬£¬£¬ÕâÅú×¢ËûÃÇÔÚʹÓñ»µÁµÄ LLM »á¼ûȨÏÞʱ¾ÓÐÄÊÔͼÌӱܼì²â£¬£¬£¬£¬£¬£¬£¬Õâ͹ÏÔÁËÍøÂç·¸·¨·Ö×ÓµÄÈÕÒæ½ÆÕ©¡£ ¡£¡£


https://www.hackread.com/llmjacking-attack-hackers-hijack-ai-models/


5. ¶íº¥¶íÖÝ²ÊÆ±Ôâµ½DragonForce¹¥»÷Ó°ÏìÁè¼Ý50ÍòÈË


5ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬¶íº¥¶íÖÝ²ÊÆ±±¾ÖÜÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ×é֯ȥÄêÌᳫµÄ¶íº¥¶íÖÝ²ÊÆ±ÍøÂç¹¥»÷ÒÑÓ°ÏìÁËÁè¼Ý 50 ÍòÈË¡£ ¡£¡£¸ÃÊÂÎñÓÚ 2023 Äê 12 ÔÂÏÂÑ®ÆØ¹â£¬£¬£¬£¬£¬£¬£¬Æäʱ¶íº¥¶íÖÝ²ÊÆ±¹«Ë¾Ðû²¼¹Ø±ÕһЩϵͳÒÔ×èֹΥ¹æÐÐΪ¡£ ¡£¡£Ô¼ÄªÔÚͳһʱ¼ä£¬£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ DragonForce µÄ¿´ËÆÐµÄÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£ ¡£¡£  ÒԺ󣬣¬£¬£¬£¬£¬£¬ºÚ¿ÍÌṩÁË¾Ý³Æ´Ó¶íº¥¶íÖÝ²ÊÆ±¹«Ë¾ÇÔÈ¡µÄÁè¼Ý 90 GB µÄÎļþ£¨ÒÔ .bak ±¸·ÝÃûÌã©¡£ ¡£¡£ËûÃÇÉù³ÆÒÑ»ñµÃÁè¼Ý 150 ÍòÌõÔ±¹¤ºÍÍæ¼ÒÐÅÏ¢¼Í¼£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþºÍÓÊÕþµØµã¡¢½±½ð¡¢³öÉúÈÕÆÚºÍÉç»áÇå¾²ºÅÂë¡£ ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þ×éÖ¯×î³õÉù³ÆÇÔÈ¡ÁË 300 ÍòÌõ¼Í¼¡£ ¡£¡£¶íº¥¶íÖÝ²ÊÆ±¸æËßÃåÒòÖÝ×ÜÉó²é³¤£¬£¬£¬£¬£¬£¬£¬Ô¼ÄªÓÐ 538,000 ÈËÊܵ½Ó°Ïì¡£ ¡£¡£·¢Ë͸ø×ÜÉó²é³¤µÄ±¨¸æºÍ·¢Ë͸øÊÜÓ°ÏìСÎÒ˽¼ÒµÄÐź¯Ö¤Êµ£¬£¬£¬£¬£¬£¬£¬È«ÃûºÍÉç»áÇå¾²ºÅÂëÒѱ»Ð¹Â¶¡£ ¡£¡£


https://www.securityweek.com/500000-impacted-by-ohio-lottery-ransomware-attack/


6. HijackLoaderͨ¹ýÎäÆ÷»¯PNGͼƬ¹¥»÷Windows


5ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬ÔÚ×î½üµÄÍøÂçÇå¾²Í»ÆÆÖУ¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ðû²¼ÁË HijackLoader ¶ñÒâÈí¼þµÄÖØ´ó¸üУ¬£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»ÖÖÖØ´óµÄÄ£¿£¿£¿£¿£¿£¿£¿é»¯¼ÓÔØ³ÌÐò£¬£¬£¬£¬£¬£¬£¬Òòת´ïÖÖÖÖ¶ñÒâ¸ºÔØ¶øÎÛÃûÕÑÖø¡£ ¡£¡£¸Ã¶ñÒâÈí¼þÒѸüÐÂΪ¿É°²ÅÅ Amadey¡¢Lumma Stealer¡¢Racoon Stealer v2 ºÍRemcos RATµÈÍþв£¬£¬£¬£¬£¬£¬£¬Õ¹Ê¾ÁËÆä²Ù×÷µÄ¾ªÈ˶๦ЧÐÔ¡£ ¡£¡£HijackLoader ÒѾ­Éú³¤³ÉΪһÖÖÐÂÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬É漰ʹÓÃPNG ͼÏñÀ´½âÃܲ¢Æô¶¯ºóÐø½×¶ÎµÄ¼ÓÔØ¡£ ¡£¡£´ËÒªÁìÊǸüÆÕ±éÕ½ÂÔµÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨¶¯Ì¬ API ÆÊÎö¡¢Ï꾡µÄ×èÖ¹ÁбíÀú³Ì¼ì²éÒÔ¼°ÌÓ±ÜÓû§Ä£Ê½¹Ò¹³£¬£¬£¬£¬£¬£¬£¬Í¹ÏÔÁ˶ñÒâÈí¼þÔÚÌӱܼì²â·½ÃæµÄÈÕÒæÖØ´óÐÔ¡£ ¡£¡£ÕâЩ¸üл¹ÒýÈëÁËÖ¼ÔÚÔöÇ¿¶ñÒâÈí¼þ¹¦Ð§µÄÐÂÄ£¿£¿£¿£¿£¿£¿£¿é¡£ ¡£¡£ÆäÖаüÀ¨½¨ÉèÀú³Ì¡¢ÈƹýÓû§ÕÊ»§¿ØÖÆ (UAC)¡¢Ïò Windows Defender Ìí¼Óɨ³ýÏîÒÔ¼°Ð´ÈëÎļþµÄ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬´Ó¶øÀ©Õ¹Á˶ñÒâÈí¼þΣº¦ºÍ¿ØÖÆÊÜѬȾϵͳµÄÄÜÁ¦¡£ ¡£¡£


https://gbhackers.com/hijackloader-malware/