Ivanti ÖҸ棺ºÚ¿ÍÀûÓà Connect Secure ÁãÈÕ·ì϶װÖöñÒâÈí¼þ

°ä²¼¹¦·ò 2025-01-10

1. Ivanti ÖҸ棺ºÚ¿ÍÀûÓà Connect Secure ÁãÈÕ·ì϶װÖöñÒâÈí¼þ


1ÔÂ8ÈÕ£¬Ivanti ÖÒ¸æ³Æ£¬ºÚ¿ÍÔÚÀûÓà Connect Secure Ô¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2025-0282£©½øÐÐÁãÈÕ¹¥»÷£¬ÔÚÉ豸ÉÏ×°ÖöñÒâÈí¼þ¡£¸Ã·ì϶´æÔÚÓÚ Ivanti Connect Secure¡¢Ivanti Policy Secure ºÍ Ivanti Neurons for ZTA Íø¹ØµÄ¾É°æ±¾ÖУ¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔ¶³ÌÖ´ÐдúÂë¡£Ivanti ͨ¹ýÆäÆëÈ«ÐԲ鳭¹¤¾ß£¨ICT£©¼ì²âµ½¶ñÒâ»î¶¯ºó£¬È·ÈÏÁËÕâÒ»Íþв¡£Ä¿Ç°£¬Ö»ÓÐ Ivanti Connect Secure É豸±»È·ÈÏÊܵ½ÀûÓá£Ivanti ÒÑ´¹Î£°ä²¼Õë¶Ô Connect Secure µÄ°²È«²¹¶¡£¬²¢´òËãÔÚ 2025 Äê 1 Ô 21 ÈÕ°ä²¼Õë¶Ô Policy Secure ºÍ Neurons for ZTA Íø¹ØµÄ²¹¶¡¡£Ö»¹Ü Policy Secure ºÍ Neurons ZTA Íø¹Ø±»ÒÔΪ±»ÀûÓõķçÏսϵÍ£¬Ivanti ÈÔ½¨Òé¿Í»§È·±£ÆäÉ豸°´½¨ÒéÅäÖ㬲¢²»Â¶³öÔÚ»¥ÁªÍøÉÏ¡£Í¬Ê±£¬Ivanti ½¨ÒéËùÓÐ Connect Secure ÖÎÀíÔ±Ö´ÐÐÄÚ²¿ºÍ±í²¿ ICT ɨÃ裬²¢ÔÚ±ØÒªÊ±¸´Ô­³ö³§ÉèÖÃÒÔɾ³ý¶ñÒâÈí¼þ¡£


https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-connect-secure-flaw-used-in-zero-day-attacks/


2. Garmin ConnectÔâ·êÈ«ÇòÁìÓòÑϳÁÖжÏ


1ÔÂ8ÈÕ£¬Garmin ConnectÊÇÒ»¿î¹ãÊÜÓ­½ÓµÄÔÚÏ߻׷×Ù¹¤¾ß£¬½üÆÚÔâ·êÁËÑϳÁµÄ·þÎñÖжÏ£¬µ¼ÖÂÈ«ÇòÁìÓòÄÚÊýÊ®ÍòÓû§ÎÞ·¨Õý³£Ê¹Óᣵ±CybernewsÖ÷±àչʾÆäÀûÓÃÖеÄͳ¼ÆÊý¾Ýʱ£¬ÎÒÃǾªÑȵط¢ÏÖ£¬Ô̺¬GarminÏνӡ¢Ç±Ë®¡¢¸ß¶û·òÔÚÄڵĶà¸öƽ̨ÒÑ´¦ÓÚÀëÏß״̬£¬ÇÒ¶à¶àÖ°ÄÜÈç»î¶¯ÏêÇé¡¢ÉÏ´«¡¢ÌôÕ½ÓëÁªÏµ¡¢Ðĵçͼ¡¢Garmin¶ÍÁ·µÈÒ²Òѱ»¹Ø¹Ø¡£Ö»¹ÜGarminÍó±íÄܹ»¶ÀÁ¢ÓÚÀûÓÃÔËÐУ¬µ«Óû§ÎÞ·¨ÉÏ´«»î¶¯¼Í¼»ò²Î¼ÓÌôÕ½£¬ÓйØÍ³¼ÆÊý¾ÝÒ²¿ÉÄÜÒò¶øÃÔʧ¡£ÕâÒ»ÊÂÎñÒýÆðÁËÓû§µÄÇ¿ÁÒ²»Âú£¬ËûÃÇ·×·×ÔÚÉ罻ýÌåÉϱí°×ÄÕÅ­£¬²¢ÓÐÈ˲²âÊÇ·ñÔÙ´ÎÔâ·êÁ˺ڿ͹¥»÷¡£¾ÝDownDectorÍøÕ¾±¨Â·£¬Õâ´ÎÖжÏÒѲ¨¼°°Ä´óÀûÑÇ¡¢¼ÓÄôó¡¢ÃÀ¹ú¡¢Ó¢¹úµÈ¶à¸ö¹ú¶È¡£ÓÈΪÀDZ·µÄÊÇ£¬Õâ´ÎÖжϸպòúÉúÔÚGarmin°ä²¼×îпîÍó±íInstinct 3Ö®ºó£¬ÎÞÒɸøÆ·ÅÆÐÎÏó´øÀ´Á˸ºÃæÓ°Ïì¡£


https://cybernews.com/news/garmin-connect-major-outage/


3. ÎÚ¿ËÀ¼ºÚ¿Í°ä·¢ÈëÇÖ¶íÂÞ˹ISP Nodex²¢¶Ï¸ùϵͳ


1ÔÂ8ÈÕ£¬ÎÚ¿ËÀ¼ÍøÂçͬÃ˵ÄÒ»¸öºÚ¿Í×éÖ¯Öܶþ°ä·¢³É¹¦ÈëÇÖÁ˶íÂÞ˹»¥ÁªÍø·þÎñÌṩÉÌNodexµÄÍøÂ磬ÇÔÈ¡Ãô¸ÐÎļþºó¶Ï¸ùÁ˱»ºÚϵͳ¡£ºÚ¿ÍÔÚTelegramÉϰ䲼Á˹¥»÷¹ý³ÌÖÐÕë¶ÔNodexµÄVMware¡¢Veeam±¸·ÝºÍ»ÝÆÕÆóÒµÐé¹¹»ù´¡ÉèÊ©µÄ½ØÍ¼×÷Ϊ֤¾Ý¡£NodexËæºóÔÚVKontakteÉÏ֤ʵÁËÕâÒ»¹¥»÷£¬°µÊ¾Æä»ù´¡ÉèÊ©Ôâµ½¹¥»÷£¬ÍøÂçÒѱ»·ÛË飬²¢ÔÚ´Ó±¸·ÝÖи´Ô­¡£»¥ÁªÍø¼à¿Ø×éÖ¯NetBlocksÒ²·¢ÏÖNodexµÄÍøÂç·þÎñÏνÓÔÚ¹¥»÷ºó±ÀÀ£¡£Ö»¹ÜNodexÖÂÁ¦¸´Ô­ÏµÍ³£¬µ«ÆäÍøÕ¾Ò»¶È̱»¾£¬ÇÒÎÞ·¨Ìṩ¸´Ô­¹¦·ò±í¡£È»¶ø£¬NodexËæºó°ä²¼Á˸´Ô­¹ý³ÌµÄ¸üÐÂÐÅÏ¢£¬°µÊ¾ÍøÂçÖ÷ÌâÒѸ´Ô­£¬DHCP·þÎñÆ÷ÒÑÉÏÏߣ¬ºÜ¶à¿Í»§Äܹ»³ÁÐÂÏνӻ¥ÁªÍø¡£ÎÚ¿ËÀ¼ÍøÂçͬÃË×Ô2016ÄêÆð»îÔ¾£¬Ðû³Æ²úÉúÁ˶àÆðÓ°Ïì¶íÂÞ˹¸÷×éÖ¯µÄÈëÇÖÊÂÎñ£¬Ô̺¬µ±¾Ö»ú¹¹ºÍýÌåµÈ¡£2023Äê10Ô£¬ÎÚ¿ËÀ¼ºÚ¿Í»¹ÈëÇÖÁËTrigonaÀÕË÷Èí¼þÍÅ»ïµÄ·þÎñÆ÷£¬ÇÔÈ¡Ëùº±¼û¾Ýºó½«Æä¶Ï¸ù¡£


https://www.bleepingcomputer.com/news/security/russian-isp-confirms-ukrainian-hackers-destroyed-its-network/


4. ºÚ¿ÍÊÔIJÀûÓÃCRLF×¢Èë¹¥»÷GFI KerioControl·À»ðǽ


1ÔÂ8ÈÕ£¬ºÚ¿ÍÔÚÀûÓÃCVE-2024-52875ÕâÒ»ÑϳÁµÄCRLF×¢Èë·ì϶£¬¶ÔGFI KerioControl·À»ðǽ²úÆ··¢ÆðÒ»¼üÔ¶³Ì´úÂëÖ´ÐÐ(RCE)¹¥»÷¡£KerioControlÊÇÒ»ÖÖרΪÖÐÓ×ÐÍÆóÒµÉè¼ÆµÄÍøÂ簲ȫ½â¾ö¹æ»®£¬ÈÚºÏÁ˶àÖÖ°²È«Ö°ÄÜ¡£2024Äê12ÔÂ16ÈÕ£¬°²È«×êÑÐÔ±Egidio Romano°ä²¼Á˹ØÓڸ÷ì϶µÄ¾ßÌå»ã±¨£¬Ö¸³öÒ»¸ö¿´ËƵÍÑϳÁÐÔµÄHTTPÏìÓ¦²ð·ÖÎÊÌâÄܹ»Éý¼¶ÎªRCE¹¥»÷¡£¸Ã·ì϶ӰÏìKerioControl 9.2.5ÖÁ9.4.5°æ±¾£¬ÓÉÓÚ´¦Öò»µ±µÄ»»Ðзûµ¼Ö£¬ÔÊÐíͨ¹ý×¢ÈëÓÐÐ§ÔØºÉ°Ñ³ÖHTTP±êÍ·ºÍÏìÓ¦¡£¹¥»÷ÕßÄܹ»ÀûÓô˷ì϶ÔÚÊܺ¦Õßä¯ÀÀÆ÷ÉÏÖ´ÐжñÒâJavaScript£¬ÌáÈ¡cookie»òCSRFÁîÅÆ£¬½ø¶øÉÏ´«Ô̺¬¸ù¼¶shell¾ç±¾µÄ¶ñÒâÎļþ£¬ÀûÓÃKerioÉý¼¶Ö°ÄÜ´ò¿ª·´Ïòshell¡£ÍþвɨÃèÆ½Ì¨GreynoiseÒѼì²âµ½Õë¶Ô¸Ã·ì϶µÄ¹¥»÷³¢ÊÔ£¬¶øCensys»ã±¨ÁËÊýÍò¸ö¶³öÔÚ»¥ÁªÍøÉϵÄKerioControlÊ·ý£¬µ«Éв»Ã÷ÏÔÒ×Êܹ¥»÷µÄÊýÁ¿¡£GFI SoftwareÒѰ䲼½¨¸´¸Ã·ì϶µÄ²¹¶¡°æ±¾£¬½¨ÒéÓû§¾¡¿ìÀûÓá£ÈôÎÞ·¨µ±¼´½¨²¹£¬ÖÎÀíÔ±Ó¦Ï޶ȶÔKerioControl WebÖÎÀí½çÃæµÄ½Ó¼û£¬²¢ÅäÖÃÓÐЧµÄ»º½â´ëÊ©¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-keriocontrol-firewall-flaw-to-steal-admin-csrf-tokens/


5. CrowdStrikeÖÒ¸æ£ºÍøÂç´¹µö»î¶¯¼ÙÒâÕÐÆ¸ÓÕÆ­Óû§Ï°È¾XMRig¿ó¹¤


1ÔÂ9ÈÕ£¬CrowdStrikeÓÚ2025Äê1ÔÂ7ÈÕ·¢ÏÖÒ»ÏîÍøÂç´¹µö»î¶¯£¬¸Ã»î¶¯¼ÙÒâÍøÂ簲ȫ¹«Ë¾£¬Í¨¹ý·¢ËÍÐéαµÄ¹¤×÷Ô¼Çëµç×ÓÓʼþ£¬ÓÕÆ­ÇóÖ°ÕßÏÂÔØ²¢Ï°È¾ÃÅÂÞ±Ò¼ÓÃÜÇ®±Ò¿ó¹¤£¨XMRig£©¡£ÕâЩµç×ÓÓʼþÐû³ÆÀ´×ÔCrowdStrikeµÄ¾ÍÒµ´úÀí£¬¸Ð¼¤ÇóÖ°ÕßÉêÇ뿪·¢ÈËԱְ룬²¢ÅúʾËûÃÇ´ÓÒ»¸ö¿´ËƺϷ¨µÄCrowdStrikeÃÅ»§ÍøÕ¾¸ßµÍÔØËùνµÄ¡°Ô±¹¤CRMÀûÓ÷¨Ê½¡±¡£¸ÃÍøÕ¾£¨cscrm-hiring[.]com£©ÌṩºÏÓÃÓÚWindows»òmacOSµÄÏÂÔØÁ´½Ó¡£ÏÂÔØµÄ¹¤¾ß»áÖ´ÐÐɳºÐ²é³­ÒÔÔ¤·ÀÔÚ·ÖÎö»·¾³ÖÐÔËÐУ¬Ò»µ©²é³­Í¨¹ý£¬¾Í»áÌìÉúÐéαÃýÎóÐÂÎÅ£¬Í¬Ê±ºó¶ÜÏÂÔØ²¢½âѹÔ̺¬ÍÚ¿ó»úµÄZIPÎļþµ½ÏµÍ³Ò»Ê±Ä¿Â¼¡£¸Ã¿ó¹¤±»ÉèÖÃΪºó¶ÜµÍ¸ººÉÔËÐУ¬ÒÔÔ¤·À±»·¢ÏÖ£¬²¢Í¨¹ýÔö³¤Åú´¦Öþ籾µ½Æô¶¯Ä¿Â¼ºÍÔÚ×¢²á±íÖÐдÈë×Ô¶¯Æô¶¯¼üÀ´Î¬³ÖÓÆ¾ÃÐÔ¡£CrowdStrikeÌáÐÑÇóÖ°Õߣ¬Ó¦ÑéÖ¤µç×ÓÓʼþµØÖ·µÄÕæÊµÐÔ£¬²¢Í¨¹ý¹Ù·½Çþ·ÁªÏµÕÐÆ¸ÈËÔ±£¬¾¯Ì费Σ»ò²»Ñ°³£µÄÒªÇó¡¢¹ýÓÚÓÕÈ˵ÄÌáÒ飬ÒÔ¼°ÒªÇóÏÂÔØ¿ÉÖ´ÐÐÎļþµÄÕÐÆ¸Á÷³Ì¡£¹ÍÖ÷ºÜÉÙÒªÇóӦƸÕßÏÂÔØµÚÈý·½ÀûÓ÷¨Ê½£¬¸ü²»»áÒªÇóÔ¤¸¶¿î¡£


https://www.bleepingcomputer.com/news/security/fake-crowdstrike-job-offer-emails-target-devs-with-crypto-miners/


6. BayMark Health ServicesÔâ·êÊý¾Ýй¶£¬RansomHubÍÅ»ïÐû³ÆÕƹÜ


1ÔÂ9ÈÕ£¬BayMark Health Services£¬±±ÃÀ×î´óµÄÎïÖÊʹÓÃ×è°­Ò½ÖÎÓ뿵¸´·þÎñÌṩÉÌ£¬½üÆÚÔâ·êÁËÒ»´ÎÊý¾Ýй¶ÊÂÎñ¡£2024Äê9Ô£¬¹¥»÷ÕßÈëÇÖÁËBayMarkµÄϵͳ£¬²¢ÔÚ9ÔÂ24ÈÕÖÁ10ÔÂ14ÈÕÆÚ¼ä½Ó¼ûÁËÔ̺¬»¼ÕßÓ×ÎҺͽ¡È«ÐÅÏ¢µÄÎļþ¡£BayMarkÔÚ10ÔÂ11ÈÕITϵͳÖжϺóµÃÖª´ËÊ£¬²¢µ±¼´²ÉÈ¡´ëÊ©±£»¤ÏµÍ³£¬Í¬Ê¹Ø¹¿ªµ÷²é²¢Í¨ÖªÁË·¨Âɲ¿ÃÅ¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬»¼ÕßµÄÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢¼ÝÊ»ÅÆÕÕºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢·þÎñ¼Í¼¡¢±£ÏÕÐÅÏ¢ÒÔ¼°Ò½ÖÎÌṩÕߺÍÒ½ÖÎ/Õï¶ÏÐÅÏ¢¡£Ö»¹ÜBayMarkδ¹«¿ªÊÜÓ°Ï컼ÕßµÄ×ÜÊý£¬µ«RansomHubÀÕË÷Èí¼þÍÅ»ïÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢³Æ´ÓBayMarkϵͳÖÐÇÔÈ¡ÁË1.5TBµÄÎļþ£¬ÕâЩÊý¾ÝËæºó±»ÉÏ´«µ½°µÍøÐ¹ÃÜÍøÕ¾ÉÏ¡£BayMarkΪ¿ÉÄܶ³öÉç»á°²È«ºÅÂë»ò¼ÝÊ»ÅÆÕÕºÅÂëµÄ»¼ÕßÌṩÁËÒ»ÄêµÄÃâ·ÑEquifaxÉí·Ý¼à¿Ø·þÎñ¡£


https://www.bleepingcomputer.com/news/security/largest-us-addiction-treatment-provider-notifies-patients-of-data-breach/