AkiraÀÕË÷Èí¼þÍÅ»ïÊ·ÎÞǰÀýÒ»ÈÕй¶35ÃûÊܺ¦ÕßÊý¾Ý
°ä²¼¹¦·ò 2024-11-201. AkiraÀÕË÷Èí¼þÍÅ»ïÊ·ÎÞǰÀýÒ»ÈÕй¶35ÃûÊܺ¦ÕßÊý¾Ý
11ÔÂ19ÈÕ£¬ÀÕË÷Èí¼þÍÅ»ïAkiraÔÚÒ»ÌìÄÚй¶ÁË´óÁ¿Êܺ¦ÕßÊý¾Ý£¬ÊýÁ¿´´ÏÂÁ˼ͼ¡£¸ÃÍÅ»ïÊÇÒ»¸öÀÕË÷Èí¼þ¼´·þÎñÍŻÔÚÍøÂç·¸×ï½çÔ½À´Ô½³ÛÃû¡£ËûÃÇͨ¹ýÇÔÈ¡ºÍ¼ÓÃÜÊý¾ÝÀ´ÀÕË÷Êܺ¦Õߣ¬²¢ÔÚ°µÍøÐ¹ÃÜÍøÕ¾Éϰ䲼Êܺ¦ÕßÐÅÏ¢¡£ÖÜÒ»£¬¸ÃÍÅ»ïµÄйÃÜÍøÕ¾ÐÂÔöÁË35ÃûÊܺ¦Õߣ¬ÆäÖÐ32ÃûΪÐÂÊܺ¦Õß¡£ÍøÂ簲ȫ×êÑÐÈËÔ±°µÊ¾£¬ÕâÊÇǰËùδÓеĴóÁ¿±»µÁ×ÊÁÏ¡£Ö»¹ÜÓв²âÒÔΪÕâ¿ÉÄÜÊÇAkiraÔڹعØÖ®Ç°µÄ×îºóÒ»´Î´ó˦Âô£¬µ«×êÑÐÈËÔ±ÒÔΪ£¬Akira¿ÉÄÜÈÔÔÚÍøÂç·¸×ïÉú̬ϵͳÖлý¼«À©ÕÅ¡£ÐÂÊܺ¦Õß´ó¶àÀ´×ÔóÒ×·þÎñÐÐÒµ£¬×ܲ¿Î»ÓÚÃÀ¹ú£¬µ«Ò²ÓмÓÄô󡢵¹ú¡¢Ó¢¹úµÈµØµÄ¹«Ë¾Êܵ½Ó°Ïì¡£ÓëLockBit·ÖÆç£¬AkiraÕâ´Î°ä²¼µÄÊܺ¦ÕßÐÅÏ¢¶¼ÊÇеģ¬Ã»ÓоÉÊܺ¦ÕßÐÅÏ¢±»³Áа䲼¡£
https://therecord.media/akira-ransomware-group-publishes-unprecedented-leak-data
2. FinastraÄÚ²¿Îļþ´«ÊäÆ½Ì¨ÒÉÔâ´ó¹æÄ£ÐÅÏ¢ÇÔÈ¡
11ÔÂ19ÈÕ£¬½ðÈڿƼ¼¹«Ë¾FinastraÔÚµ÷²éÆäÄÚ²¿Îļþ´«ÊäÆ½Ì¨²úÉúµÄ´ó¹æÄ£ÐÅÏ¢ÇÔÈ¡ÊÂÎñ¡£¸Ã¹«Ë¾ÎªÈ«Çò½ü8,100¼Ò½ðÈÚ»ú¹¹Ìṩ·þÎñ£¬Ô̺¬45¼Ò¶¥¼¶ÒøÐС£½üÈÕ£¬Ò»ÃûÍøÂç·¸×ï·Ö×ÓÔÚ°µÍøÉÏÐû³ÆÒÑ´ÓFinastraÇÔÈ¡³¬¹ý400GBµÄÊý¾Ý²¢ÆðÍ·ÏúÊÛ¡£FinastraÒÑÏò¿Í»§´«µÝÁËÕâÒ»°²È«ÊÂÎñ£¬²¢°µÊ¾¿Í»§ÔËÓª¡¢¿Í»§ÏµÍ³»òÆäΪ¿Í»§Ìṩ·þÎñµÄÄÜÁ¦Ã»ÓÐÊܵ½Ö±½ÓÓ°Ïì¡£¹«Ë¾ÒÑÖ´ÐдúÌæµÄ°²È«Îļþ¹²ÏíÆ½Ì¨ÒÔÈ·±£Â½ÐøÐÔ£¬²¢ÔÚµ÷²éÊÂÎñÔÒò¡£¾Ý³õ²½Ö¤¾ÝÅú×¢£¬Æ¾Ö¤Òѱ»Ð¹Â¶£¬µ«ÉÐδȷ¶¨±»ÇÔÈ¡ÎļþÖÐÔ̺¬µÄÊý¾ÝµÄÁìÓòºÍÐÔÖÊ¡£Ò»ÃûʹÓÃêdzơ°abyss0¡±µÄÍøÂç·¸×ï·Ö×ÓÔÚ10Ô·ݾÍÊÔͼÏúÊ۾ݳƴÓFinastraÇÔÈ¡µÄÊý¾Ý£¬¶øFinastraÔÚ11ÔÂ7ÈÕ³õ´Î¼ì²âµ½¿ÉÒɻ¡£Õâ´ÎÈëÇÖ¿ÉÄÜÊÇabyss0Ôٴηµ»ØÇÔÈ¡¸üÎÞÊý¾Ý¡£Ä¿Ç°£¬abyss0µÄTelegramÕÊ»§ºÍBreachForumsÕÊ»§¶¼ÒÑÒþû£¬ÆäËùÓÐÏúÊÛÌû×ÓÒ²ÒÑɾ³ý¡£
https://krebsonsecurity.com/2024/11/fintech-giant-finastra-investigating-data-breach/
3. CISAÐÂÔöÈý·ì϶¾¯Ê¾£ºProgress Kemp LoadMasterµÈÏµÍ³Ãæ¶ÔÑϳÁÍþв
11ÔÂ19ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÆÚÔÚÆäÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ÖÐÐÂÔöÁËÈý¸ö³ÁÒª·ì϶£¬ÆäÖÐÖ®Ò»ÊÇÓ°ÏìProgress Kemp LoadMasterµÄ¹Ø¼ü²Ù×÷ϵͳºÅÁî×¢Èë·ì϶£¬±àºÅΪCVE-2024-1212£¬ÓÉRhino Security Labs·¢ÏÖ²¢ÓÚ2ÔÂ21ÈÕ°ä²¼µÄ¸üÐÂÖнâ¾ö¡£¸Ã·ì϶ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õßͨ¹ýLoadMasterÖÎÀí½çÃæÖ´ÐÐËÁÒâϵͳºÅÁ¶ÔLoadMaster°æ±¾7.2.48.1¡¢7.2.54.8ºÍ7.2.55.0֮ǰµÄ°æ±¾×é³ÉÍþв¡£Áí±íÁ½¸ö±»CISAÔö³¤µ½KEVµÄ·ì϶±ðÀëÊÇÓ°ÏìPalo Alto Networks PAN-OSÖÎÀí½çÃæµÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2024-0012£©ºÍOSºÅÁî×¢Èë·ì϶£¨CVE-2024-9474£©¡£´Ë±í£¬Progress Software»¹½¨¸´ÁËLoadMasterÖеÄÁíÒ»¸ö×î¸ßÑϳÁÐÔ·ì϶CVE-2024-7591£¬¸Ã·ì϶ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÌØÔìHTTPÒªÇó½Ó¼ûÖÎÀí½çÃæ²¢Ö´ÐÐËÁÒâºÅÁӰÏìLoadMaster°æ±¾7.2.60.0¼°Ö®Ç°°æ±¾ºÍMT Hypervisor°æ±¾7.1.35.11¼°Ö®Ç°°æ±¾¡£
https://www.bleepingcomputer.com/news/security/cisa-tags-progress-kemp-loadmaster-flaw-as-exploited-in-attacks/
4. ¸£ÌØÆû³µÔâÊý¾Ýй¶ָ¿Ø£¬44000Ìõ¿Í»§¼Í¼Òɱ»ºÚ¿ÍÂÛ̳й¶
11ÔÂ19ÈÕ£¬Ò»ÃûºÚ¿ÍÔÚºÚ¿ÍÂÛ̳BreachForumsÉÏÐû³ÆÐ¹Â¶Á˸£ÌØÆû³µµÄ44,000Ìõ¿Í»§¼Í¼£¬ÒýÆðÁË¿í·º¹Ø×¢¡£¾Ý³Æ£¬ÕâЩ¼Í¼Ô̺¬¿Í»§µÄÈ«Ãû¡¢ÏÖʵµØÎ»¡¢²É°ìÏêÇé¡¢¾ÏúÉÌÐÅÏ¢ºÍ¹¦·ò´ÁµÈÓ×ÎÒÉí·ÝÐÅÏ¢£¬Ö»¹Ü²¢·Ç¼«¶ËÃô¸Ð£¬µ«ÈÔ¿ÉÄÜʹ±»Ð¹Â¶µÄÓ×ÎÒÃæ¶ÔÍøÂç´¹µöºÍÉç»á¹¤³Ì¹¥»÷µÄ·çÏÕ¡£Ð¹Â¶Õß¡°EnergyWeaponUser¡±²¢Î´ÊÔͼÏúÊÛ¸ÃÊý¾Ý¼¯£¬¶øÊǽöÒÔ8¸ö»ý·Ö£¨Ô¼2ÃÀÔª£©µÄ¼ÛÖµÌṩ¸øÂÛ̳ע²á»áÔ±¡£¸£Ìع«Ë¾¶Ô´ËʰµÊ¾ÒѾÒâʶµ½²¢ÔÚ»ý¼«µ÷²éÓйØÖ¸¿Ø¡£Í¬Ê±£¬ÓÐÖ¸¿Ø³ÆÁíÒ»ÃûºÚ¿Í¡°IntelBroker¡±Ò²ÉæÏӲμÓÁËÕâ´Îй¶ÊÂÎñ£¬¸ÃºÚ¿Í½üÆÚÒÑÈ·ÈÏÈëÇÖÁ˶à¸ö³ÛÃû»ú¹¹£¬Ô̺¬Ë¼¿Æ¡¢Åµ»ùÑÇ¡¢Å·ÖÞÐ̾¯×éÖ¯ºÍT-MobileµÈ¡£¼øÓÚÊý¾Ýй¶¿ÉÄÜ´øÀ´µÄ·çÏÕ£¬×¨¼Ò½¨Ò鹫¼ÒÉóÉ÷¶Ô´ýδ¾ÒªÇóµÄͨѶ£¬²¢»Ø¾øÈκÎÒªÇóÅû¶¸ü¶àÐÅÏ¢µÄÒªÇó¡£
https://www.bleepingcomputer.com/news/security/ford-investgates-alleged-breach-following-customer-data-leak/
5. HelldownÀÕË÷Èí¼þÀûÓÃZyxel·À»ðǽ·ì϶¹¥»÷ÆóÒµ
11ÔÂ19ÈÕ£¬Ðµġ°Helldown¡±ÀÕË÷Èí¼þÐж¯Õë¶ÔZyxel·À»ðǽ·ì϶£¬Í¨¹ýÇÖÈë¹«Ë¾ÍøÂçÇÔÈ¡Êý¾Ý²¢¼ÓÃÜÉ豸¡£¾Ý·¨¹úÍøÂ簲ȫ¹«Ë¾Sekoia¹Û²ì£¬×Ô½ñÄêÏÄÌìÍÆ³öÒÔÀ´£¬Helldown·¢Õ¹Ñ¸¿ì£¬ÔÚÆäÀÕË÷ÃÅ»§ÍøÕ¾ÉÏÁгöÁ˶à¶àÊܺ¦Õߣ¬ÖØÒªÊÇÃÀ¹úºÍÅ·ÖÞµÄÖÐÓ×Ð͹«Ë¾¡£Helldown Windows°æ»ùÓÚй¶µÄLockBit 3¹¹½¨Æ÷£¬²Ù×÷ÓëDarkraceºÍDonexÀàËÆ£¬µ«Æä¼ÓÃÜÆ÷²¢²»ÏȽø£¬Ê¹ÓÃÅú´¦ÖÃÎļþʵÏÖ¹¤×÷¡£Sekoia·¢ÏÖ£¬ÖÁÉÙ8ÃûHelldownÊܺ¦ÕßÔÚʹÓÃZyxel·À»ðǽ×÷ΪIPSec VPN½ÓÈëµãʱÔâµ½ÈëÇÖ£¬´§Ä¦Helldown¿ÉÄÜÀûÓÃCVE-2024-42057·ì϶£¬¸Ã·ì϶ÒÑÔÚ9ÔÂ3ÈÕ°ä²¼µÄ¹Ì¼þ°æ±¾5.39Öеõ½½¨¸´¡£´Ë±í£¬Sekoia»¹·¢ÏÖÓëZyxelÈëÇÖÓйصĿÉÒÉÓû§ÕÊ»§ºÍÅäÖÃÎļþ£¬²¢´§Ä¦ÓÐÐ§ÔØºÉ¿ÉÄÜÓë¸ÃÈëÇÖÓйء£Ä¿Ç°£¬ZyxelÉÐδ¶ÔÕâЩ¹¥»÷×÷³ö»ØÓ¦¡£
https://www.bleepingcomputer.com/news/security/helldown-ransomware-exploits-zyxel-vpn-flaw-to-breach-networks/
6. Ngioweb¶ñÒâÈí¼þÖ§³ÖNSOCKSµÈסլ´úÀí·þÎñ£¬Òý·¢ÍøÂ簲ȫÓÇÓô
11ÔÂ19ÈÕ£¬Lumen TechnologiesµÄ×îÐÂ×êÑз¢ÏÖ£¬ÃûΪNgiowebµÄ¶ñÒâÈí¼þ±»ÓÃÓÚÖ§³Ö³ôÃûÔ¶ÑïµÄסլ´úÀí·þÎñNSOCKSÒÔ¼°ÆäËûÀàËÆ·þÎñ¡£¸Ã¶ñÒâÈí¼þÖØÒªÀûÓÃÓ×ÐͰ칫ÊÒ/¼ÒÍ¥°ì¹«ÊÒ·ÓÉÆ÷ºÍÎïÁªÍøÉ豸½øÐй¥»÷£¬²¢ÔÚÃÀ¹úÕ¼ÓдóÁ¿´úÀí¡£Ngioweb½©Ê¬ÍøÂçÿÌìά³ÖÔ¼35,000¸ö¹¤×÷»úеÈË£¬ÆäÖкܶàÒÑ»îÔ¾Ò»¸öÔ»ò¸ü³¤¹¦·ò¡£¸Ã¶ñÒâÈí¼þÓÉWater BarghestÍþв×éÖ¯ÀûÓã¬ËûÃÇͨ¹ý×Ô¶¯¾ç±¾ÉøÈëÒ×Êܹ¥»÷µÄÎïÁªÍøÉ豸²¢²¿ÊðNgioweb£¬½«Æä×¢²áΪ´úÀí²¢ÔÚסլ´úÀíÊг¡ÉÏÏúÊÛ¡£Õû¸öÇ®±Ò»¯¹ý³ÌÖ»Ðè10·ÖÖÓ£¬Åú×¢¸Ã²Ù×÷¸ß¶È¸ßЧºÍ×Ô¶¯»¯¡£NSOCKSÔÚÊÀ½ç¸÷µØÏúÊÛSOCKS5´úÀí½Ó¼ûȨÏÞ£¬±»ÓÃÓÚÆ¾Ö¤Ìî³ä¹¥»÷ºÍÆäËû¶ñÒâ»î¶¯¡£Êܺ¦É豸»¹ÓëÓÉÓòÌìÉúËã·¨´´½¨µÄC2Óò³ÉÁ¢³Ö¾ÃÏνӣ¬ÒÔÈ·¶¨ÊÇ·ñ½«ËüÃÇÔö³¤µ½´úÀíÍøÂçÖС£Lumen°µÊ¾£¬NSOCKSÓû§Í¨¹ý180¶à¸ö·´ÏòÏνÓC2½Úµã·ÓÉÁ÷Á¿£¬¸²¸ÇÆäÕæÊµÉí·Ý¡£
https://thehackernews.com/2024/11/ngioweb-botnet-fuels-nsocks-residential.html


¾©¹«Íø°²±¸11010802024551ºÅ