NexOpt 30ÍòÁ¾Æû³µºÍÊý°ÙÍò´ÎÐгÌÐÅÏ¢ÔâÆØ¹â

°ä²¼¹¦·ò 2025-04-10

1. NexOpt 30ÍòÁ¾Æû³µºÍÊý°ÙÍò´ÎÐгÌÐÅÏ¢ÔâÆØ¹â


4ÔÂ9ÈÕ £¬³µÁ¾¸ú×Ù·þÎñÌṩÉÌNexOpt £¬Ò»¼Ò×ܲ¿ÉèÓڵ¹ú¡¢ÔÚÃÀ¹úºÍ°ÂµØÀûÉèÓд¦Ê´¦µÄ¹«Ë¾ £¬½üÆÚ²úÉúÊý¾Ýй¶ÊÂÎñ £¬Â¶³öÁËÉÌÓúͳËÓóµµÄÃô¸ÐʵʱºÍº¹ÇàÐÐÊ»Êý¾Ý¡£NexOptÒ»ÏòÐû³Æ¡°±£ÕÏ×î´óˮƽµÄÊý¾Ý°²È«¡± £¬È»¶øCybernews×êÑÐÍŶӷ¢ÏÖ £¬³µ¶Ó¾­ÀíµÄÊý¾Ý±»±ÈÔ¤ÆÚ¸ü¿í·ºµÄÊܶà½Ó¼û¡£²»°²È«µÄ Nexopt Kibana Ê·ýй¶ÁË´óÁ¿¿Í»§¾ßÌåÐÅÏ¢ £¬Ô̺¬³µÁ¾¼ø±ðºÅ¡¢ÊµÊ±´¬²°ºÍ³µÁ¾µØÎ»µÈ £¬Ð¹Â©µÄÊ·ýÔ̺¬½ü1TBÊý¾Ý £¬ÆäÖв¿ÃÅËÆºõ³öÓÚ¿ª·¢Ö÷ÕÅÌìÉú¡£ÔÚÂŴγ¢ÊÔÁªÏµNexOptºÍÓйØCERTºó £¬Â¶³öµÄÊ·ýÒѱ»¹Ø¹Ø¡£CybernewsÐÅÏ¢°²È«×êÑÐÔ±Ö¸³ö £¬Õâ´ÎйÃÜÊÂÎñ¸øÓйظ÷·½´øÀ´¸÷ÀàΣÏÕ £¬Êý¾Ý¿ÉÄܱ»ÓÃÓÚóÒ×µý±¨ÍøÂç £¬ÉõÖÁ×éÖ¯ÏÖʵÊÀ½çµÄ·¸×ï»î¶¯¡£Õâ´Îй¶¶³öÁËÊý°ÙÍòÌõóÒ×ÐгÌÐÅÏ¢ £¬¿ÉÄÜ»¹Ô̺¬Ò»Ð©·ÇóÒ×ÐгÌÐÅÏ¢ £¬ÊÜÓ°ÏìµÄÊý¾ÝËÆºõÀ´×Ô³¬¹ý 30 ÍòÁ¾¶ÀÁ¢³µÁ¾¡£Ð¹Â¶µÄÊý¾ÝÔ̺¬³µÁ¾¼ø±ðºÅÂë¡¢NexOpt É豸 IMEI ±êʶ·û¡¢³µÁ¾Òƶ¯Êý¾Ý¡¢ÐÐ³ÌÆô³ÌµØ¡¢Ö÷ÕŵØÊý¾Ý¡¢º½Â·¡¢³µÁ¾È¼ÓÍ»òµçÁ¿Êý¾ÝÒÔ¼°¼ÝʻԱ×ùÒÎÊý¾ÝµÈ¡£ÓÉÓÚ VIN ºÅÂë¿ÉÓÃÓÚ¼ø±ð¸ü¶à³µÁ¾ÐÅÏ¢ £¬Ô̺¬³µÖ÷ÐÅÏ¢ £¬ÕâÔö³¤ÁËÊý¾Ýй¶µÄÑϳÁÐÔ¡£


https://cybernews.com/security/nexopt-data-leak-exposes-locations-vehicles/


2. ¹¤Òµ¼¼ÊõÔì×÷ÉÌSensata TechnologiesÔâÀÕË÷Èí¼þ¹¥»÷


4ÔÂ10ÈÕ £¬Sensata TechnologiesÊÇÒ»¼ÒÕ¼Óг¬¹ý19,000ÃûÔ±¹¤µÄ¹¤Òµ¼¼Êõ¹«Ë¾ £¬ÉÏÒ»²ÆÄêÓªÊÕ½ü40ÒÚÃÀÔª £¬×¨Ò»ÓÚΪÆû³µ¡¢³ÁÐͳµÁ¾ºÍÔ½Ò°³µ¡¢¹¤ÒµºÍº½¿Õº½ÌìÊг¡³ö²ú´«¸ÐÆ÷¡¢µçÆø±£»¤Ôª¼þºÍÆäËû¹¤¾ß¡£ÉÏÖÜÈոù«Ë¾Ôâ·êÀÕË÷Èí¼þ¹¥»÷ £¬ÆäϵͳÔâ·êÑϳÁ·ÛËé¡£SensataËæ¼´ÁªÏµÁË·¨Âɲ¿ÃÅ¡£¹«Ë¾ÔÚ8-KÎļþÖÐй© £¬Õâ´ÎÊÂÎñÁÙʱӰÏìÁËÆäÔËÓª £¬Ô̺¬ÔËÊä¡¢ÊÕ»õ¡¢Ôì×÷³ö²úÒÔ¼°ÆäËû¸÷ÀàÖ§³ÖÖ°ÄÜ¡£Ö»¹Ü¹«Ë¾ÒѲÉȡһʱ´ëÊ©ÒÔ¸´Ô­²¿ÃÅÖ°ÄÜ £¬µ«È«Ã渴ԭµÄ¾ßÌ幦·ò±íÉв»Ã÷È·¡£¸Ã¹«Ë¾ÓÚÖÜÈýÏòÃÀ¹ú֤ȯÂòÂôίԱ»á£¨SEC£©´«µÝÁËÕâÒ»ÊÂÎñ £¬²¢ÖÒ¸æÍ¶×ÊÕß £¬ÒòÀÕË÷Èí¼þ¹¥»÷ £¬¹«Ë¾¹ÙÔ±±»ÆÈ¹Ø¹ØÆäÍøÂç¡£³õ´ëÊ©²éÏÔʾ £¬ÓÐÎļþ´Ó¹«Ë¾»·¾³Öб»µÁ¡£Sensata°µÊ¾ £¬ÍøÂ簲ȫר¼ÒÔÚÈ«Á¦Ð­Öú¸´Ô­¹¤×÷ £¬²¢ÖÂÁ¦¼ø±ð±»µÁÎļþ £¬ÒÔ±ãʵʱ֪ͨÓйØÈËÔ±¡£Ö»¹Ü¹«Ë¾°µÊ¾²»ÒÔΪÕâ´Î¹¥»÷»á¶Ô±¾¼¾¶ÈµÄ²ÆÕþÇé¿ö²úÉú³Á´óÓ°Ïì £¬µ«Ò²Ö¸³öÕâ¿ÉÄÜ»áÆ¾¾Ý¸´Ô­Á˾ֶøÓÐËù±ä¶¯¡£½ØÖÁÖÜÈýÍíÉÏ £¬ÉÐδÓÐÈκÎÀÕË÷Èí¼þÍÅ»ïÈϿɶÔÕâ´ÎÊÂÎñÕÆ¹Ü¡£


https://therecord.media/sensata-technologies-ransomware-attack


3. GrandoreiroµØÀíΧÀ¸ÍøÂç´¹µö¹¥»÷¶Ô×¼À­ÃÀµØÓò


4ÔÂ9ÈÕ £¬Ò»³¡Õë¶ÔÀ­¶¡ÃÀÖÞÓû§µÄÍøÂç´¹µö»î¶¯ÕýËÁŰ £¬ÆäÖ÷ÌâÊdzôÃûÔ¶ÑïµÄÒøÐÐľÂíGrandoreiro £¬¸ÃľÂíÒÔÇÔÈ¡Ãô¸Ð²ÆÕþÊý¾ÝÖø³Æ¡£2ÔÂ19ÈÕÖÁ3ÔÂ14ÈÕÆÚ¼ä £¬×êÑÐÈËÔ±°ÑÎȵ½ÓйØÍøÂç´¹µö»î¶¯¼¤Ôö £¬ÇÒ¼£ÏóÅú×¢»î¶¯ÈÔÔÚ³ÖÐø¡£GrandoreiroÒÑ´æÔÚ¶àÄê £¬²»ÐݸĽøÒÔά³Öµ±ÏÈְλ £¬Ö¼ÔÚÇÔÈ¡ÒøÐÐÆ¾Ö¤¡¢¼à¶½Óû§»î¶¯²¢ÊÚÓè¹¥»÷ÕßÔ¶³Ì½Ó¼ûȨÏÞ¡£Õâ´Î¹¥»÷»î¶¯ÖÐ £¬µØÀíΧÀ¸¼¼ÊõÓÈΪÒýÈËÖõÄ¿ £¬¶ñÒâÈí¼þÔÚÔËÐÐǰ»á²é³­Êܺ¦ÕßIPµØÖ·ÒÔÈ·¶¨ÆäµØÎ» £¬ÈôÓû§²»ÔÚÖ¸±êÀ­¶¡ÃÀÖÞ¹ú¶È/µØÓò £¬¶ñÒâÈí¼þ±ã»áÖÕ³¡Ö´ÐÐ £¬ÕâʹµÃ¹¥»÷Ô½·¢¼¯ÖÐ £¬Ï÷¼õÁ˲»ÓÃÒªµÄÆØ¹â £¬²¢Ô®ÊÔìä¶ã¹ýÈ«Çò°²È«¼à¿Ø¡£Ï°È¾Ê¼ÓÚÒ»¸ö´¹µöÒ³Ãæ £¬ÓÕÆ­Êܺ¦Õßµã»÷Á´½Ó»òÏÂÔØÐéαPDFÎĵµ £¬¸ÃÎļþʵΪÔ̺¬Grandoreiro¼ÓÔØ·¨Ê½µÄѹËõ°ü¡£Ò»µ©Îļþ±»ÌáÈ¡²¢´ò¿ª £¬¶ñÒâÈí¼þ±ã»áÏòip-apicom·¢ËÍÒªÇóÒÔÈ·¶¨Óû§µØÀíµØÎ» £¬²¢Æ¾¾ÝÁ˾־ö¶¨ÊÇ·ñ³ÖÐø¹¥»÷¡£´Ë±í £¬Grandoreiro»¹Í¨¹ýÏòdns.google·¢ËÍÒªÇóÀ´Ô¤·À±¾µØDNS²éÎÊ £¬Èƹý»ùÓÚDNSµÄ×èÖ¹»úÔì¡£


https://hackread.com/grandoreiro-strikes-geofenced-phishing-attacks-latam/


4. AkiraBotÀ¬»øÓʼþ»î¶¯ÍþвÓ×ÐÍÆóÒµÍøÂ簲ȫ


4ÔÂ9ÈÕ £¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÓÉ¡°AkiraBot¡±Çý¶¯µÄÐÂÐÍÀ¬»øÓʼþ»î¶¯ £¬¸Ã»úеÈËרÃÅÕë¶ÔÓ×ÐÍÆóÒµÍøÕ¾·¢ËͶ¨ÔìµÄ´ÙÏúÐÅÏ¢¡£×Ô2024Äê9ÔÂÒÔÀ´ £¬AkiraBotÒѳɹ¦ÏòÖÁÉÙ80,000¸öÍøÕ¾·¢ËÍÀ¬»øÓʼþÁªÏµ±íµ¥ºÍ̸ÌìÓ×¹¤¾ß £¬Ö¸±êÍøÕ¾ÊýÁ¿³¬¹ý400,000¸ö¡£AkiraBotÀûÓÃOpenAIµÄGPT-4o-miniµÈÈËΪÖÇÄÜ˵»°Ä£ÐÍ £¬·ÖÎöÍøÕ¾ÄÚÈݲ¢ÌìÉú¸öÐÔ»¯ÐÅÏ¢ £¬ÍƹãڲƭÐÔSEO·þÎñ £¬Ê¹³ß¶ÈÀ¬»øÓʼþ¹ýÂËÆ÷¸üÄѼì²âºÍÀ¹½Ø¡£¸Ã»î¶¯ÖØÒªÕë¶ÔʹÓÃShopify¡¢GoDaddy¡¢WixºÍSquarespaceµÈÈȵ㽨վƽ̨µÄÖÐÓ×ÐÍÆóÒµ¡£ÕâЩƽ̨ÒòÆäÒ×ÓÃÐÔ¶ø¹ãÊÜÖÐÓׯóÒµÇàíù £¬È´Ò²³ÉΪÁËÀ¬»øÓʼþ·¢ËÍÕßµÄÖ¸±ê¡£AkiraBot¾ß±¸¶àÖÖ¶ñÒâ»î¶¯ÄÜÁ¦ £¬Ô̺¬´´½¨AIÌìÉúµÄÐÂÎÅ¡¢ÈƹýÑéÖ¤Âë±£»¤¡¢¶Ô×¼Ó×ÐÍÆóÒµÒÔ¼°Ê¹ÓôúÀíÍøÂçÔ¤·À¼ì²â¡£¸Ã¹¤¾ßͨ¹ýFastCaptchaºÍNextCaptchaµÈ¹¤¾ß £¬ÉõÖÁ°Ñ³Öä¯ÀÀÆ÷ÊôÐÔÀ´·ÂÕպϷ¨Óû§µÄÐÐΪ £¬´Ó¶øºýŪÑéÖ¤Âëϵͳ¡£´Ë±í £¬AkiraBot»¹Ê¹ÓôúÀí·þÎñ½«ÆäÁ÷Á¿Â·Óɵ½·ÖÆçµÄIPµØÖ· £¬ÒÔÔ¤·À±»»ùÓÚÍøÂçµÄ±£»¤´ëÊ©À¹½Ø¡£


https://hackread.com/akirabot-abuses-openai-api-spam-website-contact-forms/


5. ºÚ¿ÍÀûÓÃEC2ÍйÜÍøÕ¾ÖеÄSSRF·ì϶ÇÔÈ¡AWSƾ֤


4ÔÂ9ÈÕ £¬F5 Labs×êÑÐÈËÔ±·¢ÏÖÒ»ÏîÓÐÕë¶ÔÐÔµÄÍøÂç»î¶¯ £¬¸Ã»î¶¯ÀûÓÃAWS EC2Ê·ýÉÏÍйܵÄÍøÕ¾ÖеķþÎñÆ÷¶ËÒªÇóαÔ죨SSRF£©·ì϶ £¬ÌáÈ¡EC2ÔªÊý¾Ý £¬ÆäÖпÉÄÜÔ̺¬À´×ÔIMDSv1¶ËµãµÄIAMÍ´´¦¡£¹¥»÷Õß½è´ËÌáÉýȨÏÞ £¬½Ó¼ûS3´æ´¢Í°»ò½ÚÔìÆäËûAWS·þÎñ £¬¿ÉÄܵ¼ÖÂÃô¸ÐÊý¾Ýй¶¡¢°Ñ³ÖºÍ·þÎñÖжÏ¡£»î¶¯Ê¼ÓÚ3ÔÂ13ÈÕ £¬ÓÚ3ÔÂ15ÈÕÖÁ25ÈÕÆÚ¼äÉý¼¶ÎªÈ«Ãæ¹¥»÷¡£¹¥»÷ÕßÀûÓÃSSRF·ì϶ £¬Ô¶³Ì²éÎÊÄÚ²¿EC2ÔªÊý¾ÝURL²¢½Ó¹ÜÃô¸ÐÊý¾Ý¡£ÓÉÓÚÒ×Êܹ¥»÷µÄÊ·ýÔÚIMDSv1ÉÏÔËÐÐ £¬¹¥»÷Õ߿ɼìË÷Ô̺¬IAMƾ֤ÔÚÄÚµÄÔªÊý¾Ý¡£IMDSv1Òѱ»¸ü°²È«µÄIMDSv2È¡´ú £¬ºóÕßÐè»á»°ÁîÅÆ½øÐÐÉí·ÝÑéÖ¤¡£¹¥»÷ÕßÂÖ»»²éÎʲÎÊýÃû³ÆºÍ×Óõè¾¶ £¬ÏÔʾÆäϵͳÐÔÇÔÈ¡Ãô¸ÐÊý¾ÝµÄ²½Öè¡£F5 LabsÔÚ2025Äê3ÔµÄÍþвÇ÷Ïò»ã±¨ÖÐÇ¿µ÷ÁËÕâЩ¹¥»÷ £¬²¢Ö¸³ö¾É·ì϶ÈԾ߸߶ÈÕë¶ÔÐÔ £¬40%±»ÀûÓõÄCVE¶¼ÊÇËÄÄêÒÔÉϵľɷì϶¡£Îª¼õÇá´ËÀàÍþв £¬½¨ÒéÀûÓÿÉÓõݲȫ¸üР£¬Ç¿»¯Â·ÓÉÆ÷ºÍÎïÁªÍøÉ豸ÅäÖà £¬²¢ÓÃÊÜÖ§³ÖµÄÐͺŴúÌæEoLÍøÂçÉ豸¡£


https://www.bleepingcomputer.com/news/security/hackers-target-ssrf-bugs-in-ec2-hosted-sites-to-steal-aws-credentials/


6. Magentoƽ̨³¬70ÍòÓû§µÄCRMÊý¾ÝÒÉÔâй¶


4ÔÂ9ÈÕ £¬Ò»Ãû×Գơ°Satanic¡±µÄºÚ¿Íͨ¹ýµÚÈý·½Çþ·Ðû³Æ £¬¿ªÔ´µç×ÓÉÌÎñƽ̨MagentoÔâ·êÈëÇÖ £¬µ¼Ö³¬¹ý70ÍòÓû§µÄCRMÊý¾Ýй¶ £¬Éæ¼°µç×ÓÓʼþ¡¢µç»°ºÅÂë¼°ÆóÒµÐÅÏ¢¡£¾ÝºÚ¿ÍÐû³Æ £¬Õâ´Î¹¥»÷²úÉúÓÚ2025Äê4ÔÂ9ÈÕ £¬Í¨¹ýµÚÈý·½¼¯³ÉÇÔÈ¡ÁË´óÁ¿ÆóÒµºÍÓ×ÎÒÁªÏµÐÅÏ¢¡£Ö»¹ÜMagentoĸ¹«Ë¾AdobeÉÐδ֤ʵ´ËÊÂÎñ £¬µ«ºÚ¿Í°ä²¼µÄй¶Êý¾ÝÔ̺¬74.5Íò¸ö¶ÀÁ¢Ìõ¿î £¬Ô̺¬43Íò¸öµç×ÓÓʼþµØÖ·ºÍ26.1Íò¸öµç»°ºÅÂë £¬²¢ÔÚÍøÂç·¸×ïÂÛ̳Breach ForumsÉϹ«¿ª¡£Ð¹Â¶µÄÊý¾ÝËÆºõÔ´×ÔMagento²¿ÊðµÄCRMϵͳ £¬Éæ¼°BBCµ½¡¶Ö¥¼Ó¸çÂÛ̳±¨¡·µÈ×éÖ¯ £¬Ô̺¬ÐÕÃû¡¢Ö°Î»¡¢¹«Ë¾µç×ÓÓʼþ¡¢ÓòÃû¡¢µç»°ºÅÂë¼°É罻ýÌåÁ´½Ó¡£ÎļþÏÔʾ £¬ÕâЩÐÅϢΪ½á¹¹»¯Ìõ¿î £¬¾ßÌå¼Í¼ÁËÿ±Ê¼Í¼µÄÐÅÏ¢ £¬¿ÉÄܱ»ÓÃÓÚÍøÂç´¹µö¡¢B2B¼ÙÒâÚ¿Æ­»ò¸ß¼ÛÖµÖ¸±ê·ÖÎö¡£´Ë±í £¬²¿ÃżÍ¼Ô̺¬ÒÑÑéÖ¤µÄLinkedInÕË»§¡¢¹«Ë¾µç×ÓÓʼþ±ðºÅ¼°¿Í»§·þÎñÁªÏµ·½Ê½¡£Êý¾Ý¿âÖеļ¼ÊõÔªÊý¾Ý»¹½ÒʾÁ˹«Ë¾µÄ¼¼ÊõÕ»¡¢ÓªÏúƽ̨¼°Ö§¸¶´¦ÖÃÆ÷ £¬ÈçMagento¡¢Salesforce¡¢Adobe Experience ManagerºÍStripe¡£


https://hackread.com/hackers-magento-breach-3rd-party-crm-data-leak/