CISAÖÒ¸æFortiOSÑϳÁRCE·ì϶Õý±»»ý¼«ÀûÓÃ
°ä²¼¹¦·ò 2024-10-111. CISAÖÒ¸æFortiOSÑϳÁRCE·ì϶Õý±»»ý¼«ÀûÓÃ
10ÔÂ9ÈÕ£¬CISAй©¹¥»÷ÕßÔÚ»ý¼«ÀûÓÃÒ»¸öÑϳÁµÄFortiOSÔ¶³Ì´úÂëÖ´ÐÐ(RCE)·ì϶£¨CVE-2024-23113£©¡£¸Ã·ì϶ÓÉfgfmdÊØ»¤¹ý³Ì½ÓÊÜ±í²¿½ÚÔìµÄÌåʽ×Ö·û´®×÷Ϊ²ÎÊýÒýÆð£¬Ê¹µÃδ¾Éí·ÝÑéÖ¤µÄÍþвÐÐΪÕß¿ÉÄÜÔÚ佨²¹µÄÉ豸ÉÏÖ´ÐкÅÁî»òËÁÒâ´úÂ룬ÇÒÎÞÐèÓû§½»»¥¡£´Ë·ì϶ӰÏìFortiOS 7.0¼°ÒÔÉϰ汾¡¢FortiPAM 1.0¼°ÒÔÉϰ汾¡¢FortiProxy 7.0¼°ÒÔÉϰ汾ÒÔ¼°FortiWeb 7.4¡£FortinetÒÑÓÚÖÙ´º·ÝÅû¶²¢½¨²¹Á˸÷ì϶£¬²¢½¨Òéɾ³ýËùÓнӿڶÔfgfmdÊØ»¤·¨Ê½µÄ½Ó¼ûȨÏÞ×÷Ϊ»º½â´ëÊ©¡£È»¶ø£¬CISAÒѽ«´Ë·ì϶Ôö³¤µ½ÆäÒÑÖª±»ÀûÓ÷ì϶Ŀ¼ÖУ¬ÒªÇóÃÀ¹úÁª¹ú»ú¹¹ÔÚ10ÔÂ30ÈÕ֮ǰ±£»¤ÆäÍøÂçÉϵÄFortiOSÉ豸ÃâÊÜÕâЩÔÚ½øÐеĹ¥»÷¡£ÍøÂ簲ȫ»ú¹¹ÖÒ¸æ³Æ£¬´ËÀà·ì϶ÊǶñÒâÍøÂçÐÐΪÕ߯µÈÔ¹¥»÷µÄý½é£¬´ºÁª¹úÆóÒµ×é³É³Á´ó·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/
2. Ó¡¶ÈStar Health±£ÏÕ¹«Ë¾ÔâÍøÂç¹¥»÷£¬¿Í»§Êý¾ÝÒÉÔâй¶
10ÔÂ9ÈÕ£¬Ó¡¶È×î´óµÄ½¡È«±£ÏÕ¹«Ë¾Ö®Ò»Star Health and Allied Insurance֤ʵÔâ·êÁ˶ñÒâÍøÂç¹¥»÷£¬µ¼ÖÂijЩÊý¾Ý±»Î´¾ÊÚȨºÍ·¸·¨½Ó¼û£¬µ«¹«Ë¾ÔËӪδÊÜÓ°Ï죬·þÎñÈÔÔÚ³ÖÐø¡£Star HealthÌṩ¶àÖÖ±£ÏÕ·þÎñ£¬Õ¼Óг¬¹ý1.7ÒÚÒ½ÁƱ£ÏÕ¿Í»§¡£´Ëǰ£¬ÍøÂç·¸×ï·Ö×ÓÐû³ÆÔÚÍøÉϰ䲼Á˿ͻ§µÄ½¡È«¼Í¼ºÍÆäËûÃô¸ÐÊý¾Ý£¬ºÚ¿Í×éÖ¯ÔÚTelegramÉÏ´´½¨ÁË̸Ìì»úеÈË£¬Ð¹Â¶ÁË3100ÍòͶ±£È˺ͳ¬¹ý580Íò·Ý±£ÏÕË÷ÅâµÄÓ×ÎÒÊý¾Ý¡£Star HealthÒÑÌá¸æ×´ËÏ¿ØËßTelegramºÍCloudflare£¬²¢Ö¸³öÆäÊ×ϯÐÅÏ¢°²È«¹ÙÒ»ÏòÔÚ»ý¼«¹²Í¬µ÷²é£¬Î´·¢ÏÔìäÓÐÈκβ»µ±ÐÐΪ¡£Õâ´ÎÈëÇÖµÄϸ½ÚºÍºÚ¿ÍÈôºÎ»ñÈ¡Êý¾ÝÈÔ²»Ã÷ÏÔ£¬±£ÏÕ¹«Ë¾Î´Ð¹Â©ÊÇ·ñÄܹ»È·ÈÏ˽ӼûÁËÊý¾ÝÒÔ¼°ÄÄЩÊý¾ÝÒѱ»½Ó¼û»òÇÔÈ¡¡£
https://techcrunch.com/2024/10/09/indias-star-health-confirms-data-breach-after-cybercriminals-post-customers-health-data-online/
3. ³¯ÏÊÍþвÕßÕë¶Ô¿Æ¼¼ÇóÖ°ÕßÍÆ¹ã¶ñÒâÈí¼þ
10ÔÂ9ÈÕ£¬Ó볯ÏÊÓÐÁªÏµµÄÍþвÐÐΪÕß½«Ö¸±êËø¶¨ÔڿƼ¼ÐÐÒµµÄÇóÖ°ÕßÉíÉÏ£¬Í¨¹ýÇóְƽ̨ÁªÏµÈí¼þ¿ª·¢ÈËÔ±£¬¼ÙÒâDZÔÚ¹ÍÖ÷Ô¼ÇëËûÃDzÎÓëÔÚÏß¿ÚÊÔ£¬²¢ÊÔͼ˵·þËûÃÇÏÂÔØ²¢×°ÖöñÒâÈí¼þ£¬ÕâÊÇÃûΪ¡°´«È¾ÐÔ·Ã̸¡±µÄ»î¶¯µÄÒ»²¿ÃÅ¡£¸Ã»î¶¯¼¯Èº±»×·×ÙΪCL-STA-0240£¬Éæ¼°ÒÑÖª¶ñÒâÈí¼þ¼Ò×åBeaverTailºÍInvisibleFerretµÄ¸üа汾¡£µÚÒ»½×¶ÎÏ°È¾Éæ¼°BeaverTailÏÂÔØ·¨Ê½ºÍÐÅÏ¢ÇÔÈ¡·¨Ê½£¬¸Ã·¨Ê½×¨ÎªWindowsºÍApple macOSƽ̨Éè¼Æ£¬³äÈλùÓÚPythonµÄInvisibleFerretºóÃŵĹÜ·¡£Ö»¹Ü¸Ã»î¶¯Òѱ»¹«¿ªÅû¶£¬µ«ÈÔÓÐÖ¤¾ÝÅú×¢ËüÒÀÈ»»îÔ¾¡£°²È«×êÑÐÔ±ºÍÍøÂ簲ȫ¹«Ë¾¾ßÌåÃèÊöÁËÀûÓüÙÊÓÆµ»áÒéÀûÓ÷¨Ê½MiroTalkºÍFreeConference.comÉøÈëµ½¿ª·¢ÈËԱϵͳÖеĹ¥»÷Á´¡£BeaverTail¶ñÒâÈí¼þ¿ÉÄÜÇÔÈ¡ä¯ÀÀÆ÷ÃÜÂë¡¢´Ó¶à¸ö¼ÓÃÜÇ®±ÒÇ®°üÖÐÍøÂçÊý¾Ý£¬²¢ÏÂÔØ²¢Ö´ÐÐInvisibleFerretºóÃÅ£¬¸ÃºóÃÅÔ̺¬Ö¸ÎƼø±ð¡¢Ô¶³Ì½ÚÔì¡¢¼üÅ̼ͼ¡¢Êý¾Ýй¶µÈÖ°ÄÜ¡£Unit 42°µÊ¾£¬Õâ´Î»î¶¯¿ÉÄܳöÓÚ¾¼Ã¶¯»ú£¬ÓÉÓÚBeaverTail¶ñÒâÈí¼þ¿ÉÄÜÇÔÈ¡13¸ö·ÖÆçµÄ¼ÓÃÜÇ®±ÒÇ®°ü£¬³¯ÏÊÍþвÕß»á½øÐнðÈÚ·¸×ïÒԳO×ʽðÀ´Ö§³Ö³¯ÏÊÕþȨ¡£
https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html
4. ºÚ¿ÍÐû³Æ¹¥»÷Dr.WebÇÔÈ¡10TBÊý¾Ý£¬Òý·¢ÍøÂ簲ȫÐÐÒµÓÇÓô
10ÔÂ9ÈÕ£¬¾ÝCyber Security News±¨Â·£¬Ò»ÃûºÚ¿ÍÔÚºÚ¿ÍÂÛ̳DumpForumsÉÏÐû³Æ¶Ô¶íÂÞ˹³ÛÃûÍøÂ簲ȫ¹«Ë¾Dr.Web½øÐÐÁ˹¥»÷£¬²¢ÇÔÈ¡Á˸ߴï10TBµÄÊý¾Ý¡£ºÚ¿ÍÐû³ÆÕâ´Î¹¥»÷¾¹ý¾«ÐIJ߶¯£¬ÀúʱÊýÌ죬³É¹¦ÉøÈëµ½Dr.WebµÄ±¾µØÍøÂ磬²¢Öð²½ÈëÇÔìä·þÎñÆ÷ºÍ×ÊÔ´£¬ÉõÖÁÉøÈëµ½ÁËÆä×ȫµÄ»ù´¡ÉèÊ©²¿ÃÅ¡£ºÚ¿Í»¹Ðû³Æ´ÓGitLab·þÎñÆ÷¡¢¹«Ë¾Óʼþ·þÎñÆ÷¡¢Confluence¡¢Redmine¡¢Jenkins¡¢Mantisϵͳ¡¢RocketChatͨѶƽ̨µÈ¶à¸ö¹Ø¼üϵͳÖÐÆÆ½â²¢Ð¹Â¶ÁËÊý¾Ý£¬²¢ÔÚÒ»¸öÔÂÄÚδ±»·¢ÏÖµÄÇé¿öϽӼû²¢ÉÏ´«Á˿ͻ§¶ËÊý¾Ý¿â£¬¿ÉÄܶ³öÁËDr.WebÓû§µÄÃô¸ÐÐÅÏ¢¡£È»¶ø£¬Dr.Web¹Ù·½ÉêÃ÷³Æ£¬Ö»¹ÜÆäϵͳ×ÊÔ´Ôâ·êÁËÓÐÕë¶ÔÐԵĹ¥»÷£¬µ«Òѳɹ¦´ì°ÜÁË·ÛËéÆä»ù´¡ÉèÊ©µÄ̰ͼ£¬Óû§¶Ë²úƷδÊÜÓ°Ï졣ΪԤ·ÀÆð¼û£¬Dr.WebÒѶϿªËùÓÐ×ÊÔ´ÓëÍøÂçµÄÏνӽøÐÐÑéÖ¤£¬²¢ÔÝÍ£Á˲¡¶¾¿âµÄ°ä²¼¡£Èô´Ëй¶ÐÐΪµÃµ½Ö¤Êµ£¬½«¶ÔDr.WebÉõÖÁÕû¸öÍøÂ簲ȫÐÐÒµÔì³É³ÁÃͽø¹¥£¬²¢Òý·¢Óû§¶Ôµ±Ç°±£»¤´ëÊ©ÓÐЧÐÔµÄÖÊÒÉ¡£
https://cybersecuritynews.com/dumpforums-10tb-data-dr-web/
5. AkiraºÍFogÀÕË÷Èí¼þÀûÓùؼüµÄVeeam RCE·ì϶
10ÔÂ10ÈÕ£¬ÀÕË÷Èí¼þÍÅ»ïÀûÓÃVeeam Backup & Replication (VBR) ·þÎñÆ÷ÉϵÄÒ»¸öÑϳÁ°²È«·ì϶£¨CVE-2024-40711£©£¬ÊµÏÖÁËÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¸Ã·ì϶ÓÉCode White°²È«×êÑÐÔ±Florian Hauser·¢ÏÖ£¬Ô´ÓÚ²»ÊÜÐÅÀµÊý¾Ý·´ÐòÁл¯µÄÈõµã£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒԽϵ͸´ÔÓ¶È·¢Æð¹¥»÷¡£VeeamÔÚ9ÔÂ4ÈÕÅû¶Á˸÷ì϶²¢°ä²¼Á˰²È«¸üУ¬¶øwatchTowr LabsÔòÔÚ9ÔÂ9ÈÕ°ä²¼¼¼Êõ·ÖÎö£¬µ«ÑÓ³¤ÖÁ9ÔÂ15ÈղŹ«¿ª¸ÅÏëÑéÖ¤·ì϶´úÂ룬ÒÔÈ·±£ÖÎÀíÔ±ÓÐ×ã¹»¹¦·ò¼ÓÇ¿·À»¤¡£ÓÉÓÚVBRÈí¼þ¿í·ºÓÃÓÚÊý¾Ý±£»¤ºÍ¿àÄѸ´Ô£¬³ÉΪ¶ñÒâÐÐΪÕßêéêìµÄÖ¸±ê¡£Sophos X-OpsÊÂÎñÏìÓ¦ÈËÔ±·¢ÏÖ£¬¸Ã·ì϶Ѹ¿ì±»AkiraºÍFogÀÕË÷Èí¼þ¹¥»÷ÀûÓ㬽áºÏ֮ǰй¶µÄÍ´´¦£¬½«¡°µã¡±±¾µØÕÊ»§Ôö³¤µ½ÖÎÀíÔ±ºÍÔ¶³Ì×ÀÃæÓû§×é¡£¹¥»÷Õßͨ³£Í¨¹ýδÆôÓöà³É·ÖÉí·ÝÑéÖ¤µÄÊÜϰȾVPNÍø¹Ø½Ó¼ûÖ¸±ê£¬²¿ÃÅVPNÔËÐв»ÊÜÖ§³ÖµÄÈí¼þ°æ±¾¡£ÔÚFogÀÕË÷Èí¼þÊÂÎñÖУ¬¹¥»÷Õß»¹ÀûÓÃδ±£»¤µÄHyper-V·þÎñÆ÷ºÍʵÓ÷¨Ê½rcloneÇÔÈ¡Êý¾Ý¡£ÕâЩ¹¥»÷ÏÔʾ³ö¸ß¶ÈµÄ³ÁµþÐÔºÍÀàËÆÐÔ£¬Åú×¢ÀÕË÷Èí¼þÍÅ»ïÕý»ý¼«ÀûÓÃÕâÒ»·ì϶½øÐй¥»÷¡£
https://www.bleepingcomputer.com/news/security/akira-and-fog-ransomware-now-exploiting-critical-veeam-rce-flaw/
6. ¸»´ïͶ×ÊϵͳÔâÈëÇÖ£¬77,000Ãû¿Í»§ÐÅϢй¶
10ÔÂ10ÈÕ£¬×ܲ¿Î»ÓÚ²¨Ê¿¶ÙµÄ¿ç¹ú½ðÈÚ·þÎñ¹«Ë¾¸»´ïͶ×Ê£¬½üÆÚÔâ·êÁËÒ»´ÎϵͳÈëÇÖÊÂÎñ£¬µ¼Ö³¬¹ý77,000Ãû¿Í»§µÄÓ×ÎÒÐÅÏ¢±»Ð¹Â¶¡£×÷ΪȫÇò×î´óµÄ×ʲúÖÎÀí¹«Ë¾Ö®Ò»£¬¸»´ïÖÎÀíµÄ×ʲú×ܶî¸ß´ï14.1ÍòÒÚÃÀÔª¡£¾Ý¸»´ïй©£¬Õâ´ÎÈëÇÖ²úÉúÔÚ8ÔÂ17ÈÕÖÁ19ÈÕÆÚ¼ä£¬Ò»ÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßÀûÓÃ×î½ü³ÉÁ¢µÄÁ½¸ö¿Í»§ÕË»§ÇÔÈ¡ÁËÊý¾Ý¡£¸»´ïÔÚ·¢ÏÖÕâÒ»»î¶¯ºóѸ¿ì²ÉÈ¡´ëÊ©ÖÕÖ¹Á˽Ӽû£¬²¢ÔÚ±í²¿°²È«×¨¼ÒµÄÐÖúÏ·¢Õ¹Á˵÷²é¡£Ö»¹Ü¸»´ïûÓÐй©³ýÁËÐÕÃûºÍÆäËûÓ×ÎÒÉí·ÝÐÅÏ¢±í»¹ÓÐÄÄЩÐÅÏ¢±»ÇÔÈ¡£¬µ«ËüÒÑÏòÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËÁ½ÄêµÄÃâ·ÑÐÅÓþ¼à¿ØºÍÉí·Ý¸´Ô·þÎñ¡£¸»´ï»¹°µÊ¾£¬Ã»ÓÐÖ¤¾ÝÅú×¢±»µÁµÄ¿Í»§Êý¾Ý±»ÀÄÓ㬵«ÈÔ½¨ÒéÊÜÓ°ÏìµÄ¿Í»§Î¬³Ö¾¯Ì裬¶¨ÆÚ²é³ÕË»§±¨±í£¬¼à¿ØÐÅÓþ»ã±¨£¬²¢ÊµÊ±»ã±¨ÈκοÉÒɻ¡£
https://www.bleepingcomputer.com/news/security/fidelity-investments-says-data-breach-affects-over-77-000-people/


¾©¹«Íø°²±¸11010802024551ºÅ