˼¿ÆÖÇÄÜÐí¿ÉʵÓ÷¨Ê½µÄÑϳÁ·ì϶ÏÖÒѱ»ÀûÓÃÓÚ¹¥»÷
°ä²¼¹¦·ò 2025-03-211. ˼¿ÆÖÇÄÜÐí¿ÉʵÓ÷¨Ê½µÄÑϳÁ·ì϶ÏÖÒѱ»ÀûÓÃÓÚ¹¥»÷
3ÔÂ20ÈÕ£¬¹¥»÷ÕßÒÑÆðÍ·Õë¶Ô´æÔÚ佨²¹°²È«·ì϶µÄ˼¿ÆÖÇÄÜÐí¿ÉʵÓ÷¨Ê½£¨CSLU£©ÌáÒé¹¥»÷£¬¸Ã·ì϶¿ÉÄܵ¼ÖÂÄÚÖúóÃÅÖÎÀíÔ¹ØÊ»§Â¶³ö¡£CSLUÊÇ˼¿Æ¿ª·¢µÄWindowsÀûÓ÷¨Ê½£¬ÔÊÐíÖÎÀíÔ±ÔÚ±¾µØÖÎÀíÐí¿ÉÖ¤ºÍÁ´½Ó²úÆ·£¬ÎÞÐèÏνÓÖÁÆäÔÆ½â¾ö¹æ»®¡£Ë¼¿ÆÓÚ9Ô°䲼Á˰²È«²¹¶¡£¨CVE-2024-20439£©£¬½¨¸´ÁËÕâÒ»ÎÊÌ⣬²¢Ö¸³öÕâÊÇÒ»¸öδ¼Í¼µÄ¾²Ì¬Óû§Æ¾Ö¤·ì϶£¬¿Éʹ¹¥»÷ÕßÔ¶³ÌµÇ¼δ½¨²¹µÄϵͳ¡£Í¬Ê±£¬Ë¼¿Æ»¹½â¾öÁËÁíÒ»¸öÑϳÁµÄÐÅϢй¶·ì϶£¨CVE-2024-20440£©£¬¸Ã·ì϶ÔÊÐí¹¥»÷Õßͨ¹ý¾«ÐÄÉè¼ÆµÄHTTPÒªÇó½Ó¼ûÃô¸ÐÊý¾Ý¡£ÕâÁ½¸ö·ì϶½öÓ°ÏìÔËÐÐÒ×Êܹ¥»÷CSLU°æ±¾µÄϵͳ£¬ÇÒ½öµ±Óû§Æô¶¯ÀûÓ÷¨Ê½Ê±ÄÜÁ¦±»ÀûÓá£È»¶ø£¬ÔÚ˼¿Æ°ä²¼²¹¶¡ºó²»¾Ã£¬ArubaÍþв×êÑÐÔ±ÄæÏò¹¤³ÌÁ˸÷ì϶£¬²¢°ä²¼Á˼¼Êõϸ½Ú£¬Ô̺¬Ó²±àÂëµÄ¾²Ì¬ÃÜÂë¡£SANS¼¼Êõ×êÑÐËùµÄ×êÑÐÖ÷Èλ㱨³Æ£¬ÍþвÐÐΪÕßÔÚÀûÓÃÕâÁ½¸ö·ì϶¶Ô»¥ÁªÍøÉϵÄCSLUÊ·ý½øÐй¥»÷¡£Ö»¹ÜÕâЩ¹¥»÷µÄ×îÖÕÖ¸±êÉв»Ã÷ÏÔ£¬µ«¹¥»÷Õß»¹ÊÔIJÀûÓÃÆäËû°²È«·ì϶£¬ÈçÓ°Ïì¹ãÖÝÓ¯¿Æµç×ÓDVRµÄÐÅϢй¶·ì϶£¨CVE-2024-0305£©¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Õâ²¢·Ç˼¿Æ³õ´Î´ÓÆä²úÆ·ÖÐɾ³ýºóÃÅÕÊ»§£¬Ö®Ç°µÄÓ²±àÂëÆ¾Ö¤Ò²Ôø´æÔÚÓÚÆä¶à¸ö²úÆ·ÖС£
https://www.bleepingcomputer.com/news/security/critical-cisco-smart-licensing-utility-flaws-now-exploited-in-attacks/
2. ÒÔÉ«ÁмäµýÈí¼þGraphiteÀûÓÃWhatsAppÁãÈÕ·ì϶
3ÔÂ20ÈÕ£¬¶àÂ×¶à´óѧ¹«Ãñ³¢ÊÔÊÒµÄÍøÂ簲ȫ×êÑÐÈËÔ±¸æ·¢ÁËÒÔÉ«Áй«Ë¾Paragon Solutions¿ª·¢µÄGraphite¼äµýÈí¼þµÄʹÓÃÇé¿ö£¬¸ÃÈí¼þͨ¹ýWhatsAppÕë¶Ô³ÛÃûÈËÊ¿½øÐй¥»÷¡£×êÑÐÈËÔ±·¢ÏÖ£¬WhatsAppÖдæÔÚÒ»¸öδ֪µÄÁãÈÕ·ì϶£¬ÔÊÐí¼äµýÈí¼þÔÚÎÞÐèÓû§ÈκβÙ×÷µÄÇé¿öÏÂ×°ÖÃÔÚÉ豸ÉÏ£¬´Ó¶øÊµÏÖ¶ÔÖ¸±êÊÖ»úµÄδ¾ÊÚȨ½Ó¼û¡£Paragon SolutionsÐû³Æ×Ô¼ºÓëÆäËû¼äµýÈí¼þ¹©¸øÉÌ·ÖÆç£¬×ñÊØÂ·µÂ³ß¶È£¬È»¶ø¹«Ãñ³¢ÊÔÊÒµÄ×êÑÐÈ´½ÒʾÁ˸ù«Ë¾ÔÚ¶à¸ö¹ú¶ÈÕë¶Ô¼ÇÕß¡¢ÈËȨ»î¶¯¼ÒºÍµ±¾Ôì·ÆÀÕßÒÉËÆ²¿Êð¼äµýÈí¼þµÄÇé¿ö¡£µ÷²é»¹·¢ÏÖ£¬¼ÓÄô󰲴ÖÂÔÊ¡¾¯Ô±¾ÖϵͳÐÔµØÊ¹ÓüäµýÈí¼þÖ°ÄÜ¡£Òâ´óÀûµ±¾Ö×î³õ·ñ¶¨ÓëParagonµÄÖêÁ¬£¬µ«ºóÀ´ÈÏ¿ÉÓëÆäÇ©¶¨Á˺Ïͬ¡£´Ë±í£¬µ÷²é»¹Éæ¼°ParagonÈ·ÈÏÖ¸±êµÄÇ×ÇÐͬ°éÊÕµ½µÄAppleÍþв֪ͨ£¬Ö¤ÊµÁËÐÂÐͼäµýÈí¼þµÄ´æÔÚ¡£Meta¡¢Æ»¹ûºÍ¹È¸èºÏ×÷½â¾öÁ˸ð²È«·ì϶£¬WhatsAppÖ´ÐÐÁË·þÎñÆ÷¶Ë½¨¸´£¬Æ»¹ûÒ²°ä²¼ÁËiOS²Ù×÷ϵͳ²¹¶¡¡£
https://hackread.com/israeli-spyware-graphite-hit-whatsapp-0-click-exploit/
3. RansomHubÀÕË÷Èí¼þʹÓÃеÄBetruger¶àÖ°ÄܺóÃÅ
3ÔÂ20ÈÕ£¬ÈüÃÅÌú¿Ë×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪBetrugerµÄжñÒâÈí¼þ£¬ËüÊÇÒ»ÖÖ¶àÖ°ÄܺóÃÅ£¬ºÜ¿ÉÄÜÊÇΪÀÕË÷Èí¼þ¹¥»÷¶øÉè¼ÆµÄ¡£BetrugerÓµÓÐ¿í·ºµÄÖ°ÄÜ£¬Ô̺¬¼üÅ̼ͼ¡¢ÍøÂçɨÃ衢ȨÏÞÌáÉý¡¢Æ¾Ö¤×ª´¢¡¢½ØÍ¼ÒÔ¼°ÎļþÉÏ´«µÈ£¬Ö¼ÔÚÏ÷¼õÔÚÖ¸±êÍøÂçÉÏͶ·ÅµÄй¤¾ßÊýÁ¿¡£ÕâÖÖºóÃÅÓëRansomHubÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©ÔËÓª´ÓÊô»ú¹¹Óйأ¬¸ÃÍÅ»ïÓÚ2024Äê2Ô³öÏÖ£¬²¢×¨Ò»ÓÚ»ùÓÚÊý¾Ý͵ÇÔµÄÀÕË÷£¬¶ø·Çµ¥Ò»¼ÓÃÜÊý¾Ý¡£RansomHubÒѹ¥»÷Á˶à¼Ò³ÛÃûÆóÒµ£¬Ô̺¬¹þÀï²®¶Ù¡¢¼ÑÊ¿µÃÅÄÂôÐÓ×¢Frontier Communications¡¢Rite AidÁ¬ËøÒ©µêµÈ£¬²¢Ð¹Â¶ÁËChange Healthcare±»µÁµÄÊý¾Ý£¬Ó°ÏìÁ˳¬¹ý1.9ÒÚÈË¡£´Ë±í£¬¸ÃÍŻﻹÐû³ÆÈëÇÖÁ˱±ÃÀ×î´óµÄ³Éñ«Ò½ÖÎÌṩÉÌBayMark Health Services¡£¾ÝÃÀ¹úÁª¹úµ÷²é¾Öͳ¼Æ£¬½ØÖÁ2024Äê8Ô£¬RansomHubÒÑÈëÇÖÃÀ¹ú¶à¸ö¹Ø¼ü»ù´¡ÉèÊ©²¿ÃŵÄ200¶àÃûÊܺ¦Õߣ¬Ô̺¬µ±¾Ö¡¢¹Ø¼ü»ù´¡ÉèÊ©ºÍÒ½ÁƱ£½¡µÈÁìÓò¡£BetrugerºóÃŵķ¢ÏÖ½øÒ»²½½ÒʾÁËÀÕË÷Èí¼þÍÅ»ïÔÚ¹¥»÷¼¿Á©ÉϵIJ»ÐÝ´´Ðº͸´ÔÓÐÔ¡£
https://www.bleepingcomputer.com/news/security/ransomhub-ransomware-uses-new-betruger-multi-function-backdoor/
4. HellCatºÚ¿Í×éÖ¯ÀûÓÃJiraƾ֤¹¥»÷AscomµÈÈ«ÇòÆóÒµ
3ÔÂ20ÈÕ£¬ÈðʿȫÇò½â¾ö¹æ»®ÌṩÉÌAscomÈ·ÈÏÆäIT»ù´¡ÉèÊ©Ôâ·êÁËÃûΪHellCatµÄºÚ¿Í×éÖ¯ÌáÒéµÄÍøÂç¹¥»÷¡£ºÚ¿Íͨ¹ýÇÔÈ¡µÄƾ֤¹¥»÷ÁËÈ«ÇòµÄJira·þÎñÆ÷£¬ÇÖÈëÁËAscomµÄ¼¼ÊõƱÎñϵͳ£¬²¢Ðû³ÆÇÔÈ¡ÁËÔ¼44GBµÄÊý¾Ý£¬Éæ¼°¸Ã¹«Ë¾µÄËùÓв¿ÃÅ¡£È»¶ø£¬Ascom°µÊ¾Õâ´ÎÊÂÎñ¶Ô¹«Ë¾µÄÒµÎñÔËӪûÓÐÓ°Ï죬¿Í»§ºÍºÏ×÷ͬ°éÎÞÐè²ÉȡԤ·À´ëÊ©£¬Ä¿Ç°µ÷²éÔÚ½øÐÐÖС£HellCatºÚ¿Í×éÖ¯ÒÔ¹¥»÷Jira·þÎñÆ÷Ϊ³£Óü¿Á©£¬¸Ãƽ̨ͨ³£Ô̺¬Ãô¸ÐÊý¾Ý£¬ÈçÔ´´úÂë¡¢Éí·ÝÑéÖ¤ÃÜÔ¿µÈ¡£´Ëǰ£¬HellCatÒѳɹ¦¹¥»÷ÁËÊ©ÄÍµÂµçÆø¡¢Î÷°àÑÀµçÐÅ¡¢Orange GroupºÍ½Ý±ªÂ·»¢µÈ¹«Ë¾£¬ÇÔÈ¡²¢Ð¹Â¶ÁË´óÁ¿ÄÚ²¿Îļþ¡£×êÑÐÈËÔ±°µÊ¾£¬ÕâЩ¹¥»÷µÄÖ÷ÌâÔÚÓÚHellCatÀûÓôӱ»ÐÅÏ¢ÇÔÈ¡·¨Ê½Ï°È¾µÄÊÜϰȾԱ¹¤ÄÇÀï»ñÈ¡µÄJiraƾ֤¡£×î½ü£¬HellCat»¹°ä·¢ÈëÇÖÁËÓªÏú¹«Ë¾AffinitivµÄJiraϵͳ£¬ÇÔÈ¡ÁËÔ̺¬´óÁ¿µç×ÓÓʼþºÍ¼Í¼µÄÊý¾Ý¿â¡£ÓÉÓÚÐÅÏ¢ÇÔÈ¡ÕßÍøÂçµÄƾ֤ÈÝÒ×ÕÒµ½£¬ÇÒ¹«Ë¾Î´Äܽ«ÆäÄÉÈ붨ÆÚÂÖ»»Á÷³Ì£¬´ËÀ๥»÷¿ÉÄÜ»á±äµÃÔ½·¢ÆµÈÔ¡£×¨¼ÒÖÒ¸æ³Æ£¬JiraÓÉÓÚÆäÔÚÆóÒµ¹¤×÷Á÷³ÌÖеÄÖ÷Ìâְλ¼°Æä´æ´¢µÄ´óÁ¿Êý¾Ý¶ø³ÉΪ¹¥»÷ÕßµÄÖØÒªÖ¸±ê¡£
https://www.bleepingcomputer.com/news/security/hellcat-hackers-go-on-a-worldwide-jira-hacking-spree/
5. Oberlin MarketingÊýÊ®Íò·ÝÃô¸Ð½¡È«²ÆÕþÐÅÏ¢Ôâй¶
3ÔÂ18ÈÕ£¬±£ÏÕ¾¼Í¹«Ë¾Oberlin MarketingÒòδ±£»¤ÆäAWS S3´æ´¢Í°£¬µ¼ÖÂÊýÊ®Íò·ÝÔ̺¬¿Í»§½¡È«Çé¿öºÍ²ÆÕþÐÅÏ¢µÄÃô¸ÐÎļþÔâй¶¡£ÕâЩÎļþÉæ¼°³¬¹ý320,000ÃûÓû§£¬Ô̺¬ÐÕÃû¡¢¼Òͥסַ¡¢µ®ÉúÈÕÆÚ¡¢ÐԱ𡢵绰ºÅÂë¡¢ÊðÃû¡¢½¡È«ÐÅÏ¢ºÍ²ÆÕþÏêÇéµÈ¡£Ö»¹ÜÂŴγ¢ÊÔ֪ͨ¸Ã¹«Ë¾£¬µ«´æ´¢Í°ÈÔ³¤¹¦·ò¶³öÔÚ±í£¬Ôö³¤Á˿ͻ§Ãæ¶Ôڲơ¢Éí·Ý͵ÇÔºÍÆäËûÍøÂçÍþвµÄ·çÏÕ¡£Ð¹Â¶µÄÊý¾ÝÖØÒªÊÇÒ½ÁƱ£ÏÕÉêÇ룬¹¥»÷ÕßÄܹ»ÀûÓÃÕâЩÐÅÏ¢½øÐÐÉí·Ý͵ÇÔ¡¢¿ªÉèÚ²ÆÐÔÒøÐÐÕË»§¡¢ÉêÇë´û¿î»ò½øÐÐÆäËû·¸·¨»î¶¯¡£´Ë±í£¬ÍøÂç·¸×ï·Ö×Ó»¹Äܹ»ÀûÓÃй¶µÄÐÅÏ¢½øÐÐÓÐÕë¶ÔÐÔµÄÍøÂç´¹µöºÍÉç»á¹¤³Ì¹¥»÷£¬Ôì×÷¼«¾ß˵·þÁ¦µÄÐÂÎÅ£¬ºýŪÓ×ÎÒй©¸ü¶àÃô¸ÐÐÅÏ¢»òÏÂÔØ¶ñÒâÈí¼þ¡£ÎªÁËÔ¤·ÀÀàËÆµÄÊý¾Ýй¶£¬½¨Òé¸ü¸Ä½Ó¼û½ÚÔì¡¢¸üÐÂȨÏÞ¡¢¼à¿Ø½Ó¼ûÈÕÖ¾¡¢ÆôÓ÷þÎñÆ÷¶Ë¼ÓÃܲ¢Ê¹ÓÃAWSÃÜÔ¿ÖÎÀí·þÎñ°²È«µØÖÎÀí¼ÓÃÜÃÜÔ¿¡£
https://cybernews.com/security/oberlin-marketing-medicare-applications-leaked/
6. CISAÖÒ¸æNAKIVO·ì϶CVE-2024-48248Õý±»»ý¼«ÀûÓÃ
3ÔÂ20ÈÕ£¬CISAÒÑÏòÃÀ¹úÁª¹ú»ú¹¹·¢³öÖҸ棬ҪÇó¼ÓÇ¿ÍøÂ簲ȫ·À±¸£¬Õë¶ÔNAKIVO±¸·ÝºÍ¸´ÔìÈí¼þÖдæÔڵĸßÑϳÁ·ì϶CVE-2024-48248½øÐзÀ»¤¡£¸Ã·ì϶Ϊ¾ø¶Ôõè¾¶±éÀú·ì϶£¬¿Éʹδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¶ÁÈ¡Ò×Êܹ¥»÷É豸ÉϵÄËÁÒâÎļþ¡£NAKIVOÔÚ11Ô°䲼µÄBackup & Replication v11.0.0.88174°æ±¾ÖÐÒÑ͵͵½¨²¹´Ë·ì϶£¬µ«´ËÇ°ÍøÂ簲ȫ¹«Ë¾watchTowrÒÑ·¢ÏÖ´Ë·ì϶½üÁ½¸öÔ¡£watchTowrÖ¸³ö£¬ÀûÓô˷ì϶¿ÉÄܶ³öÃô¸ÐÊý¾Ý£¬ÉõÖÁ½âËøÕû¸ö»ù´¡ÉèÊ©»·¾³¡£CISAÒѽ«CVE-2024-48248Ôö³¤µ½ÆäÒÑÖª±»ÀûÓõķì϶Ŀ¼ÖУ¬Áª¹úÃñÊÂÐÐÕþ²¿ÃÅ»ú¹¹ÐèÔÚÈýÖÜÄÚ±£»¤ÆäϵͳÃâÊܹ¥»÷¡£¹ÌÈ»¸ÃÖ¸Áî½öºÏÓÃÓÚÁª¹ú»ú¹¹£¬µ«½¨ÒéËùÓÐ×éÖ¯¾¡¿ì½¨²¹´Ë·ì϶ÒÔ×èÖ¹¹¥»÷¡£NAKIVOÔÚÈ«ÇòÕ¼Óжà¶àºÏ×÷ͬ°éºÍ¿Í»§£¬ÒµÎñ±é¼°¶à¸ö¹ú¶È£¬ÆäÖÐÔ̺¬±¾Ì˼¿Æ¡¢ÊʿڿÉÀÖºÍÎ÷ÃÅ×ӵȳÛÃû¹«Ë¾¡£
https://www.bleepingcomputer.com/news/security/cisa-tags-nakivo-backup-flaw-as-actively-exploited-in-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ