NexOpt 30ÍòÁ¾Æû³µºÍÊý°ÙÍò´ÎÐгÌÐÅÏ¢ÔâÆØ¹â
°ä²¼¹¦·ò 2025-04-101. NexOpt 30ÍòÁ¾Æû³µºÍÊý°ÙÍò´ÎÐгÌÐÅÏ¢ÔâÆØ¹â
4ÔÂ9ÈÕ£¬³µÁ¾¸ú×Ù·þÎñÌṩÉÌNexOpt£¬Ò»¼Ò×ܲ¿ÉèÓڵ¹ú¡¢ÔÚÃÀ¹úºÍ°ÂµØÀûÉèÓд¦Ê´¦µÄ¹«Ë¾£¬½üÆÚ²úÉúÊý¾Ýй¶ÊÂÎñ£¬Â¶³öÁËÉÌÓúͳËÓóµµÄÃô¸ÐʵʱºÍº¹ÇàÐÐÊ»Êý¾Ý¡£NexOptÒ»ÏòÐû³Æ¡°±£ÕÏ×î´óˮƽµÄÊý¾Ý°²È«¡±£¬È»¶øCybernews×êÑÐÍŶӷ¢ÏÖ£¬³µ¶Ó¾ÀíµÄÊý¾Ý±»±ÈÔ¤ÆÚ¸ü¿í·ºµÄÊܶà½Ó¼û¡£²»°²È«µÄ Nexopt Kibana Ê·ýй¶ÁË´óÁ¿¿Í»§¾ßÌåÐÅÏ¢£¬Ô̺¬³µÁ¾¼ø±ðºÅ¡¢ÊµÊ±´¬²°ºÍ³µÁ¾µØÎ»µÈ£¬Ð¹Â©µÄÊ·ýÔ̺¬½ü1TBÊý¾Ý£¬ÆäÖв¿ÃÅËÆºõ³öÓÚ¿ª·¢Ö÷ÕÅÌìÉú¡£ÔÚÂŴγ¢ÊÔÁªÏµNexOptºÍÓйØCERTºó£¬Â¶³öµÄÊ·ýÒѱ»¹Ø¹Ø¡£CybernewsÐÅÏ¢°²È«×êÑÐÔ±Ö¸³ö£¬Õâ´ÎйÃÜÊÂÎñ¸øÓйظ÷·½´øÀ´¸÷ÀàΣÏÕ£¬Êý¾Ý¿ÉÄܱ»ÓÃÓÚóÒ×µý±¨ÍøÂ磬ÉõÖÁ×éÖ¯ÏÖʵÊÀ½çµÄ·¸×ï»î¶¯¡£Õâ´Îй¶¶³öÁËÊý°ÙÍòÌõóÒ×ÐгÌÐÅÏ¢£¬¿ÉÄÜ»¹Ô̺¬Ò»Ð©·ÇóÒ×ÐгÌÐÅÏ¢£¬ÊÜÓ°ÏìµÄÊý¾ÝËÆºõÀ´×Ô³¬¹ý 30 ÍòÁ¾¶ÀÁ¢³µÁ¾¡£Ð¹Â¶µÄÊý¾ÝÔ̺¬³µÁ¾¼ø±ðºÅÂë¡¢NexOpt É豸 IMEI ±êʶ·û¡¢³µÁ¾Òƶ¯Êý¾Ý¡¢ÐÐ³ÌÆô³ÌµØ¡¢Ö÷ÕŵØÊý¾Ý¡¢º½Â·¡¢³µÁ¾È¼ÓÍ»òµçÁ¿Êý¾ÝÒÔ¼°¼ÝʻԱ×ùÒÎÊý¾ÝµÈ¡£ÓÉÓÚ VIN ºÅÂë¿ÉÓÃÓÚ¼ø±ð¸ü¶à³µÁ¾ÐÅÏ¢£¬Ô̺¬³µÖ÷ÐÅÏ¢£¬ÕâÔö³¤ÁËÊý¾Ýй¶µÄÑϳÁÐÔ¡£
https://cybernews.com/security/nexopt-data-leak-exposes-locations-vehicles/
2. ¹¤Òµ¼¼ÊõÔì×÷ÉÌSensata TechnologiesÔâÀÕË÷Èí¼þ¹¥»÷
4ÔÂ10ÈÕ£¬Sensata TechnologiesÊÇÒ»¼ÒÕ¼Óг¬¹ý19,000ÃûÔ±¹¤µÄ¹¤Òµ¼¼Êõ¹«Ë¾£¬ÉÏÒ»²ÆÄêÓªÊÕ½ü40ÒÚÃÀÔª£¬×¨Ò»ÓÚΪÆû³µ¡¢³ÁÐͳµÁ¾ºÍÔ½Ò°³µ¡¢¹¤ÒµºÍº½¿Õº½ÌìÊг¡³ö²ú´«¸ÐÆ÷¡¢µçÆø±£»¤Ôª¼þºÍÆäËû¹¤¾ß¡£ÉÏÖÜÈոù«Ë¾Ôâ·êÀÕË÷Èí¼þ¹¥»÷£¬ÆäϵͳÔâ·êÑϳÁ·ÛËé¡£SensataËæ¼´ÁªÏµÁË·¨Âɲ¿ÃÅ¡£¹«Ë¾ÔÚ8-KÎļþÖÐй©£¬Õâ´ÎÊÂÎñÁÙʱӰÏìÁËÆäÔËÓª£¬Ô̺¬ÔËÊä¡¢ÊÕ»õ¡¢Ôì×÷³ö²úÒÔ¼°ÆäËû¸÷ÀàÖ§³ÖÖ°ÄÜ¡£Ö»¹Ü¹«Ë¾ÒѲÉȡһʱ´ëÊ©ÒÔ¸´Ô²¿ÃÅÖ°ÄÜ£¬µ«È«Ã渴ԵľßÌ幦·ò±íÉв»Ã÷È·¡£¸Ã¹«Ë¾ÓÚÖÜÈýÏòÃÀ¹ú֤ȯÂòÂôίԱ»á£¨SEC£©´«µÝÁËÕâÒ»ÊÂÎñ£¬²¢ÖÒ¸æÍ¶×ÊÕߣ¬ÒòÀÕË÷Èí¼þ¹¥»÷£¬¹«Ë¾¹ÙÔ±±»ÆÈ¹Ø¹ØÆäÍøÂç¡£³õ´ëÊ©²éÏÔʾ£¬ÓÐÎļþ´Ó¹«Ë¾»·¾³Öб»µÁ¡£Sensata°µÊ¾£¬ÍøÂ簲ȫר¼ÒÔÚÈ«Á¦ÐÖú¸´Ô¹¤×÷£¬²¢ÖÂÁ¦¼ø±ð±»µÁÎļþ£¬ÒÔ±ãʵʱ֪ͨÓйØÈËÔ±¡£Ö»¹Ü¹«Ë¾°µÊ¾²»ÒÔΪÕâ´Î¹¥»÷»á¶Ô±¾¼¾¶ÈµÄ²ÆÕþÇé¿ö²úÉú³Á´óÓ°Ï죬µ«Ò²Ö¸³öÕâ¿ÉÄÜ»áÆ¾¾Ý¸´ÔÁ˾ֶøÓÐËù±ä¶¯¡£½ØÖÁÖÜÈýÍíÉÏ£¬ÉÐδÓÐÈκÎÀÕË÷Èí¼þÍÅ»ïÈϿɶÔÕâ´ÎÊÂÎñÕÆ¹Ü¡£
https://therecord.media/sensata-technologies-ransomware-attack
3. GrandoreiroµØÀíΧÀ¸ÍøÂç´¹µö¹¥»÷¶Ô×¼ÀÃÀµØÓò
4ÔÂ9ÈÕ£¬Ò»³¡Õë¶ÔÀ¶¡ÃÀÖÞÓû§µÄÍøÂç´¹µö»î¶¯ÕýËÁŰ£¬ÆäÖ÷ÌâÊdzôÃûÔ¶ÑïµÄÒøÐÐľÂíGrandoreiro£¬¸ÃľÂíÒÔÇÔÈ¡Ãô¸Ð²ÆÕþÊý¾ÝÖø³Æ¡£2ÔÂ19ÈÕÖÁ3ÔÂ14ÈÕÆÚ¼ä£¬×êÑÐÈËÔ±°ÑÎȵ½ÓйØÍøÂç´¹µö»î¶¯¼¤Ôö£¬ÇÒ¼£ÏóÅú×¢»î¶¯ÈÔÔÚ³ÖÐø¡£GrandoreiroÒÑ´æÔÚ¶àÄ꣬²»ÐݸĽøÒÔά³Öµ±ÏÈְλ£¬Ö¼ÔÚÇÔÈ¡ÒøÐÐÆ¾Ö¤¡¢¼à¶½Óû§»î¶¯²¢ÊÚÓè¹¥»÷ÕßÔ¶³Ì½Ó¼ûȨÏÞ¡£Õâ´Î¹¥»÷»î¶¯ÖУ¬µØÀíΧÀ¸¼¼ÊõÓÈΪÒýÈËÖõÄ¿£¬¶ñÒâÈí¼þÔÚÔËÐÐǰ»á²é³Êܺ¦ÕßIPµØÖ·ÒÔÈ·¶¨ÆäµØÎ»£¬ÈôÓû§²»ÔÚÖ¸±êÀ¶¡ÃÀÖÞ¹ú¶È/µØÓò£¬¶ñÒâÈí¼þ±ã»áÖÕ³¡Ö´ÐУ¬ÕâʹµÃ¹¥»÷Ô½·¢¼¯ÖУ¬Ï÷¼õÁ˲»ÓÃÒªµÄÆØ¹â£¬²¢Ô®ÊÔìä¶ã¹ýÈ«Çò°²È«¼à¿Ø¡£Ï°È¾Ê¼ÓÚÒ»¸ö´¹µöÒ³Ãæ£¬ÓÕÆÊܺ¦Õßµã»÷Á´½Ó»òÏÂÔØÐéαPDFÎĵµ£¬¸ÃÎļþʵΪÔ̺¬Grandoreiro¼ÓÔØ·¨Ê½µÄѹËõ°ü¡£Ò»µ©Îļþ±»ÌáÈ¡²¢´ò¿ª£¬¶ñÒâÈí¼þ±ã»áÏòip-apicom·¢ËÍÒªÇóÒÔÈ·¶¨Óû§µØÀíµØÎ»£¬²¢Æ¾¾ÝÁ˾־ö¶¨ÊÇ·ñ³ÖÐø¹¥»÷¡£´Ë±í£¬Grandoreiro»¹Í¨¹ýÏòdns.google·¢ËÍÒªÇóÀ´Ô¤·À±¾µØDNS²éÎÊ£¬Èƹý»ùÓÚDNSµÄ×èÖ¹»úÔì¡£
https://hackread.com/grandoreiro-strikes-geofenced-phishing-attacks-latam/
4. AkiraBotÀ¬»øÓʼþ»î¶¯ÍþвÓ×ÐÍÆóÒµÍøÂ簲ȫ
4ÔÂ9ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÓÉ¡°AkiraBot¡±Çý¶¯µÄÐÂÐÍÀ¬»øÓʼþ»î¶¯£¬¸Ã»úеÈËרÃÅÕë¶ÔÓ×ÐÍÆóÒµÍøÕ¾·¢ËͶ¨ÔìµÄ´ÙÏúÐÅÏ¢¡£×Ô2024Äê9ÔÂÒÔÀ´£¬AkiraBotÒѳɹ¦ÏòÖÁÉÙ80,000¸öÍøÕ¾·¢ËÍÀ¬»øÓʼþÁªÏµ±íµ¥ºÍ̸ÌìÓ×¹¤¾ß£¬Ö¸±êÍøÕ¾ÊýÁ¿³¬¹ý400,000¸ö¡£AkiraBotÀûÓÃOpenAIµÄGPT-4o-miniµÈÈËΪÖÇÄÜ˵»°Ä£ÐÍ£¬·ÖÎöÍøÕ¾ÄÚÈݲ¢ÌìÉú¸öÐÔ»¯ÐÅÏ¢£¬ÍƹãÚ²ÆÐÔSEO·þÎñ£¬Ê¹³ß¶ÈÀ¬»øÓʼþ¹ýÂËÆ÷¸üÄѼì²âºÍÀ¹½Ø¡£¸Ã»î¶¯ÖØÒªÕë¶ÔʹÓÃShopify¡¢GoDaddy¡¢WixºÍSquarespaceµÈÈȵ㽨վƽ̨µÄÖÐÓ×ÐÍÆóÒµ¡£ÕâЩƽ̨ÒòÆäÒ×ÓÃÐÔ¶ø¹ãÊÜÖÐÓׯóÒµÇàíù£¬È´Ò²³ÉΪÁËÀ¬»øÓʼþ·¢ËÍÕßµÄÖ¸±ê¡£AkiraBot¾ß±¸¶àÖÖ¶ñÒâ»î¶¯ÄÜÁ¦£¬Ô̺¬´´½¨AIÌìÉúµÄÐÂÎÅ¡¢ÈƹýÑéÖ¤Âë±£»¤¡¢¶Ô×¼Ó×ÐÍÆóÒµÒÔ¼°Ê¹ÓôúÀíÍøÂçÔ¤·À¼ì²â¡£¸Ã¹¤¾ßͨ¹ýFastCaptchaºÍNextCaptchaµÈ¹¤¾ß£¬ÉõÖÁ°Ñ³Öä¯ÀÀÆ÷ÊôÐÔÀ´·ÂÕպϷ¨Óû§µÄÐÐΪ£¬´Ó¶øºýŪÑéÖ¤Âëϵͳ¡£´Ë±í£¬AkiraBot»¹Ê¹ÓôúÀí·þÎñ½«ÆäÁ÷Á¿Â·Óɵ½·ÖÆçµÄIPµØÖ·£¬ÒÔÔ¤·À±»»ùÓÚÍøÂçµÄ±£»¤´ëÊ©À¹½Ø¡£
https://hackread.com/akirabot-abuses-openai-api-spam-website-contact-forms/
5. ºÚ¿ÍÀûÓÃEC2ÍйÜÍøÕ¾ÖеÄSSRF·ì϶ÇÔÈ¡AWSƾ֤
4ÔÂ9ÈÕ£¬F5 Labs×êÑÐÈËÔ±·¢ÏÖÒ»ÏîÓÐÕë¶ÔÐÔµÄÍøÂç»î¶¯£¬¸Ã»î¶¯ÀûÓÃAWS EC2Ê·ýÉÏÍйܵÄÍøÕ¾ÖеķþÎñÆ÷¶ËÒªÇóαÔ죨SSRF£©·ì϶£¬ÌáÈ¡EC2ÔªÊý¾Ý£¬ÆäÖпÉÄÜÔ̺¬À´×ÔIMDSv1¶ËµãµÄIAMÍ´´¦¡£¹¥»÷Õß½è´ËÌáÉýȨÏÞ£¬½Ó¼ûS3´æ´¢Í°»ò½ÚÔìÆäËûAWS·þÎñ£¬¿ÉÄܵ¼ÖÂÃô¸ÐÊý¾Ýй¶¡¢°Ñ³ÖºÍ·þÎñÖжϡ£»î¶¯Ê¼ÓÚ3ÔÂ13ÈÕ£¬ÓÚ3ÔÂ15ÈÕÖÁ25ÈÕÆÚ¼äÉý¼¶ÎªÈ«Ãæ¹¥»÷¡£¹¥»÷ÕßÀûÓÃSSRF·ì϶£¬Ô¶³Ì²éÎÊÄÚ²¿EC2ÔªÊý¾ÝURL²¢½Ó¹ÜÃô¸ÐÊý¾Ý¡£ÓÉÓÚÒ×Êܹ¥»÷µÄÊ·ýÔÚIMDSv1ÉÏÔËÐУ¬¹¥»÷Õ߿ɼìË÷Ô̺¬IAMƾ֤ÔÚÄÚµÄÔªÊý¾Ý¡£IMDSv1Òѱ»¸ü°²È«µÄIMDSv2È¡´ú£¬ºóÕßÐè»á»°ÁîÅÆ½øÐÐÉí·ÝÑéÖ¤¡£¹¥»÷ÕßÂÖ»»²éÎʲÎÊýÃû³ÆºÍ×Óõè¾¶£¬ÏÔʾÆäϵͳÐÔÇÔÈ¡Ãô¸ÐÊý¾ÝµÄ²½Öè¡£F5 LabsÔÚ2025Äê3ÔµÄÍþвÇ÷Ïò»ã±¨ÖÐÇ¿µ÷ÁËÕâЩ¹¥»÷£¬²¢Ö¸³ö¾É·ì϶ÈԾ߸߶ÈÕë¶ÔÐÔ£¬40%±»ÀûÓõÄCVE¶¼ÊÇËÄÄêÒÔÉϵľɷì϶¡£Îª¼õÇá´ËÀàÍþв£¬½¨ÒéÀûÓÿÉÓõݲȫ¸üУ¬Ç¿»¯Â·ÓÉÆ÷ºÍÎïÁªÍøÉ豸ÅäÖ㬲¢ÓÃÊÜÖ§³ÖµÄÐͺŴúÌæEoLÍøÂçÉ豸¡£
https://www.bleepingcomputer.com/news/security/hackers-target-ssrf-bugs-in-ec2-hosted-sites-to-steal-aws-credentials/
6. Magentoƽ̨³¬70ÍòÓû§µÄCRMÊý¾ÝÒÉÔâй¶
4ÔÂ9ÈÕ£¬Ò»Ãû×Գơ°Satanic¡±µÄºÚ¿Íͨ¹ýµÚÈý·½Çþ·Ðû³Æ£¬¿ªÔ´µç×ÓÉÌÎñƽ̨MagentoÔâ·êÈëÇÖ£¬µ¼Ö³¬¹ý70ÍòÓû§µÄCRMÊý¾Ýй¶£¬Éæ¼°µç×ÓÓʼþ¡¢µç»°ºÅÂë¼°ÆóÒµÐÅÏ¢¡£¾ÝºÚ¿ÍÐû³Æ£¬Õâ´Î¹¥»÷²úÉúÓÚ2025Äê4ÔÂ9ÈÕ£¬Í¨¹ýµÚÈý·½¼¯³ÉÇÔÈ¡ÁË´óÁ¿ÆóÒµºÍÓ×ÎÒÁªÏµÐÅÏ¢¡£Ö»¹ÜMagentoĸ¹«Ë¾AdobeÉÐδ֤ʵ´ËÊÂÎñ£¬µ«ºÚ¿Í°ä²¼µÄй¶Êý¾ÝÔ̺¬74.5Íò¸ö¶ÀÁ¢Ìõ¿î£¬Ô̺¬43Íò¸öµç×ÓÓʼþµØÖ·ºÍ26.1Íò¸öµç»°ºÅÂ룬²¢ÔÚÍøÂç·¸×ïÂÛ̳Breach ForumsÉϹ«¿ª¡£Ð¹Â¶µÄÊý¾ÝËÆºõÔ´×ÔMagento²¿ÊðµÄCRMϵͳ£¬Éæ¼°BBCµ½¡¶Ö¥¼Ó¸çÂÛ̳±¨¡·µÈ×éÖ¯£¬Ô̺¬ÐÕÃû¡¢Ö°Î»¡¢¹«Ë¾µç×ÓÓʼþ¡¢ÓòÃû¡¢µç»°ºÅÂë¼°É罻ýÌåÁ´½Ó¡£ÎļþÏÔʾ£¬ÕâЩÐÅϢΪ½á¹¹»¯Ìõ¿î£¬¾ßÌå¼Í¼ÁËÿ±Ê¼Í¼µÄÐÅÏ¢£¬¿ÉÄܱ»ÓÃÓÚÍøÂç´¹µö¡¢B2B¼ÙÒâÚ¿Æ»ò¸ß¼ÛÖµÖ¸±ê·ÖÎö¡£´Ë±í£¬²¿ÃżÍ¼Ô̺¬ÒÑÑéÖ¤µÄLinkedInÕË»§¡¢¹«Ë¾µç×ÓÓʼþ±ðºÅ¼°¿Í»§·þÎñÁªÏµ·½Ê½¡£Êý¾Ý¿âÖеļ¼ÊõÔªÊý¾Ý»¹½ÒʾÁ˹«Ë¾µÄ¼¼ÊõÕ»¡¢ÓªÏúƽ̨¼°Ö§¸¶´¦ÖÃÆ÷£¬ÈçMagento¡¢Salesforce¡¢Adobe Experience ManagerºÍStripe¡£
https://hackread.com/hackers-magento-breach-3rd-party-crm-data-leak/


¾©¹«Íø°²±¸11010802024551ºÅ