FourlisÅû¶Ò˼ÒÔâÀÕË÷Èí¼þ¹¥»÷£¬Ëðʧ³¬2000ÍòÅ·Ôª
°ä²¼¹¦·ò 2025-04-141. FourlisÅû¶Ò˼ÒÔâÀÕË÷Èí¼þ¹¥»÷£¬Ëðʧ³¬2000ÍòÅ·Ôª
4ÔÂ11ÈÕ£¬Fourlis¼¯ÍÅ×÷ΪÒ˼ÒÔÚÏ£À°¡¢ÈûÆÖ·˹¡¢ÂÞÂíÄáÑǺͱ£¼ÓÀûÑǵÄÉ̵êÔËÓªÉÌ£¬½üÈÕй©£¬ÆäÔÚ2024Äê11ÔÂ27ÈÕÐþÉ«ÐÇÆÚÎåǰÔâ·êµÄÀÕË÷Èí¼þ¹¥»÷Ôì³ÉÁËÔ¼2000ÍòÅ·Ôª£¨2280ÍòÃÀÔª£©µÄËðʧ¡£¸Ã°²È«ÊÂÎñÓÚ2024Äê12ÔÂ3ÈÕ±»¹«¿ª£¬¼¯ÍÅÈÏ¿ÉÒ˼ÒÍøÉÏÉ̵êÃæ¶ÔµÄ¼¼ÊõÎÊÌâÔ´ÓÚ¡°¶ñÒâ±í²¿ÐÐΪ¡±¡£Ö»¹ÜFourlis¼¯ÍÅÔÚÕâЩ¹ú¶È»¹¾Óª×ÅIntersport¡¢FootLockerºÍHolland&BarrettÉ̵꣬µ«Õâ´Î¹¥»÷ÖØÒªÓ°ÏìÁËÒ˼ÒÒµÎñ¡£ÐÂΟåÖ¸³ö£¬¹¥»÷µ¼ÖÂÉ̵겹»õÁÙʱÖжϣ¬ÖØÒªÓ°ÏìÁË2024Äê12ÔÂÖÁ2025Äê2ÔÂÆÚ¼äµÄ¼Ò¾Óװ諲¿Ãź͵ç×ÓÉÌÎñÔËÓª¡£Fourlis¼¯ÍÅÊ×ϯִÐйÙDimitrisValachis¹À¼Æ£¬Õâ´Î°²È«ÊÂÎñ¶ÔÒ˼ÒÏúÊÛÒµÎñµÄÓ°Ïìµ½2024Äê12Ô½«´ïµ½1500ÍòÅ·Ôª£¬µ½2025Ä꽫ÔÙ´ïµ½500ÍòÅ·Ôª¡£Valachis»¹Ç¿µ÷£¬¹«Ë¾Ã»ÓÐÏòÀÕË÷Èí¼þ¹¥»÷ÕßÖ§¸¶ÈκÎÓöȣ¬²¢ÔÚ±í²¿ÍøÂ簲ȫר¼ÒµÄÔ®ÊÖϸ´ÔÁËÊÜÓ°ÏìµÄϵͳ¡£´Ë±í£¬¹«Ë¾»¹³É¹¦´ì°ÜÁËÂŴκóÐø¹¥»÷¡£Ö»¹Ü¹¥»÷ÒÑ´ÓǰÊýÔ£¬µ«ÉÐδÓÐÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÕÆ¹Ü¡£
https://www.bleepingcomputer.com/news/security/ransomware-attack-cost-ikea-operator-in-eastern-europe-23-million/
2. LSCÔâ·ê³Á´óÊý¾Ýй¶£¬160ÍòÈËÃô¸ÐÐÅÏ¢±»µÁ
4ÔÂ11ÈÕ£¬³¢ÊÔÊÒ·þÎñºÏ×÷É磨LSC£©½üÈÕ°ä²¼ÉêÃ÷£¬³ÆÆäÔâ·êÑϳÁÊý¾Ýй¶£¬Ô¼160ÍòÈ˵ÄÃô¸ÐÐÅÏ¢±»ºÚ¿ÍÇÔÈ¡¡£LSC×÷Ϊһ¼ÒλÓÚÎ÷ÑÅͼµÄ·ÇͶ»ú×éÖ¯£¬ÎªÃÀ¹ú35¶à¸öÖݵÄÉúÖ³½¡È«·þÎñ×éÖ¯Ìṩ¼¯Öг¢ÊÔÊÒ·þÎñ£¬´¦ÖôóÁ¿Ãô¸ÐÊý¾Ý¡£¾ÝLSC°ä²¼µÄ°²È«ÊÂÎñ֪ͨ£¬Ò»ÃûÍþвÐÐΪÕßÓÚ2024Äê10ÔÂÈëÇÔìäÍøÂç²¢ÇÔÈ¡Êý¾Ý¡£µ÷²éÏÔʾ£¬Î´¾ÊÚȨµÄµÚÈý·½½Ó¼ûÁËLSCµÄ²¿ÃÅÍøÂ磬²¢½Ó¼û/ɾ³ýÁËijЩÎļþ¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬Ó×ÎÒ±êʶ·û¡¢Ò½ÁÆÐÅÏ¢¡¢±£ÏÕÐÅÏ¢ÒÔ¼°Õ˵¥ºÍ²ÆÕþÊý¾ÝµÈ¡£Õâ´ÎÊý¾ÝÐ¹Â¶ÖØÒªÓ°Ïìͨ¹ý²¿ÃÅ´òËãÉúÓýÖÐÐĽøÐг¢ÊÔÊÒ¼ì²âµÄÓ×ÎÒ¡£Ö»¹ÜLSCÄܹ»È·ÈÏÄÄЩÖÐÐÄÊܵ½ÁËÓ°Ï죬µ«ÓÉÓÚÒþÖÔÔÒò£¬ÎÞ·¨ÑéÖ¤Ó×ÎÒ²ãÃæµÄÓ°Ïì¡£LSC°µÊ¾£¬¶ÔÕâÆð°²È«ÊÂÎñµÄµ÷²éÈÔÔÚ½øÐÐÖУ¬±í²¿ÍøÂ簲ȫר¼ÒÒ²ÔÚ°µÍøÉÏ¼à¿ØÓëÕâ´ÎÈëÇÖÓйصÄÊý¾Ýй¶Çé¿ö¡£½ØÖÁĿǰ£¬ÉÐδ·¢ÏÖ´ËÀàÊý¾ÝÔÚ°µÍøÊг¡¡¢ÂÛ̳»òÀÕË÷ÍøÕ¾ÉÏй¶¡£ÎªÓ¦¶ÔÕâ´ÎÊÂÎñ£¬LSCΪ¿ÉÄÜÊÜÓ°ÏìµÄÓ×ÎÒÌṩÃâ·ÑÐÅÓþ¼à¿ØºÍÒ½ÁÆÉí·Ý±£»¤·þÎñ£¬ÓÐЧÆÚΪ12»ò24¸öÔ¡£
https://www.bleepingcomputer.com/news/security/us-lab-testing-provider-exposed-health-data-of-16-million-people/
3. Î÷ϤÄá´óѧÔâ·ê¶àÆð°²È«ÊÂÎñ£¬Ó×ÎÒÐÅϢй¶Òý·¢¹Ø×¢
4ÔÂ11ÈÕ£¬Î÷ϤÄá´óѧ£¨WSU£©½üÆÚ°ä·¢²úÉúÁ½Æð°²È«ÊÂÎñ£¬µ¼ÖÂÆäÉçÇø³ÉÔ±µÄÓ×ÎÒÐÅÏ¢Ôâй¶¡£×÷Ϊ°Ä´óÀûÑdzÛÃû¸ßУ£¬WSUÌṩ¿ç¶à¸öѧ¿ÆµÄ¿Î³Ì£¬Õ¼ÓÐ4.7ÍòÃûѧÉú¼°4500¶àÃûÔ±¹¤£¬Äê¶ÈÔËÓªÔ¤ËãÔ¼6ÒÚÃÀÔª¡£µÚһ·ÊÂÎñÉæ¼°2025Äê1ÔÂÖÁ2ÔÂÆÚ¼ä£¬¸Ã´óѧµ¥µãµÇ¼£¨SSO£©ÏµÍ³ÔâÈëÇÖ£¬Ô¼1ÍòÃûÏÖÈμ°Ç°ÈÎѧÉúµÄÓ×ÎÒÐÅÏ¢±»Î´¾ÊÚȨ½Ó¼û¡£WSUÔÚ·¢ÏÖÎ¥¹æÐÐΪºóѸ¿ì²ÉÈ¡Ðж¯×èÖ¹¹¥»÷Õߣ¬²¢·¢Õ¹µ÷²é¡£µÚ¶þÆðÊÂÎñÔòÉæ¼°´óѧÉçÇø³ÉÔ±Ó×ÎÒÐÅÏ¢ÔÚ°µÍøÐ¹Â¶¡£Ö»¹ÜºÚ¿ÍÔçÔÚ2024Äê11ÔÂ1ÈվͰ䲼ÁËÕâЩÊý¾Ý£¬µ«WSUÖ±µ½½ñÄê3ÔÂ24ÈÕ²ÅÒâʶµ½¡£Õâ´Îй¶µÄÐÅÏ¢ÀàÐÍÓëÖ®Ç°ÍøÂç֪ͨÖиÅÊöµÄÀàËÆ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬WSUÔÚ2023Äê5Ô»¹ÔøÔâ·êÁíÒ»´ÎÊý¾Ýй¶£¬µ¼ÖÂ7500ÈËÊÜÓ°Ï죬ºÚ¿Í½Ó¼ûÁËÆäMicrosoftOffice365»·¾³£¬Ô̺¬µç×ÓÓʼþÕÊ»§ºÍSharePointÎļþ¡£µ÷²éÏÔʾ£¬ºÚ¿ÍÔÚ2023Äê7ÔÂÖÁ2024Äê3ÔÂÆÚ¼äÒ»Ïò½Ó¼ûWSUÍøÂ磬²¢»ñÈ¡ÁË580TBÊý¾Ý¡£¼øÓÚÂŴβúÉúÊý¾Ýй¶ÊÂÎñ£¬¸±Ð£³¤¼æÐ£³¤ÇÇÖΡ¤ÍþÁ®Ä·Ë¹´ú±í´óѧ°ä·¢Â·Ç¸ÉêÃ÷£¬²¢°µÊ¾ÍŶÓÔÚÖÂÁ¦Ó¦¶Ô£¬¼ÓÇ¿Êý×Ö»·¾³¡£
https://www.bleepingcomputer.com/news/security/western-sydney-university-discloses-security-breaches-data-leak/
4. ĦÂå¸ç¹ú¶ÈÉç»á±£ÏÕ¾ÖÔâÍøÂç¹¥»÷£¬Êý°ÙÍò¹«ÃñÊý¾Ýй¶
4ÔÂ12ÈÕ£¬Ä¦Âå¸ç¹ú¶ÈÉç»á±£ÏÕ¾ÖÕýµ÷²éһ·ÒÉËÆÓɰ¢¶û¼°ÀûÑǺڿÍÌáÒéµÄÍøÂç¹¥»÷ÊÂÎñ£¬µ¼ÖÂÊý°ÙÍò¹«ÃñÃô¸ÐÊý¾Ýй¶¡£¾ÝĦÂå¸çýÌ屨·£¬ºÚ¿ÍÈÆ¹ý°²Õûϵͳ£¬µÁÈ¡Á˳¬¹ý5.4Íò·ÝÎļþ£¬Éæ¼°½ü200ÍòÈ˵ÄÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢Éí·ÝÖ¤ºÅÂë¡¢ÁªÏµ·½Ê½¼°ÒøÐÐÕË»§¾ßÌåÐÅÏ¢µÈ¡£ÕâЩÎļþ±»°ä²¼µ½Telegram¹«¹²ÆµÂ·£¬²¿ÃÅ×ÊÁÏ´æÔÚÎóµ¼ÐÔ¡¢²»ÕýÈ·»ò²»ÆëÈ«µÄÇé¿ö¡£×Ô³ÆJabaROOTµÄºÚ¿Í×éÖ¯Ðû³Æ¶ÔÕâ´ÎÈëÇÖÕÆ¹Ü£¬Ôð¹ÖĦÂå¸çÔÚÍøÉϹ¥»÷°¢¶û¼°ÀûÑÇ»ú¹¹£¬²¢ÖÒ¸æÈôĦÂå¸ç³ÖÐø½øÐÐÊý×ÖɧÈÅ£¬½«·¢Æð½øÒ»²½¹¥»÷¡£ÃÀ¹ú°²È«¹«Ë¾ResecurityÖ¸³ö£¬±»µÁÊý¾Ý±»ÉÏ´«µ½°µÍøµ«ÉÐδÏúÊÛ£¬Åú×¢¹¥»÷¶¯»ú¿ÉÄÜÊÇÕþÖζø·Ç¾¼Ã¡£×êÑÐÈËÔ±ÒÔΪ£¬Õâ´ÎÈëÇÖÊÂÎñÓ°ÏìÁËĦÂå¸çºÍ±í¹úʵÌ壬Ô̺¬Å·ÖÞ¹«Ë¾¡£ÈëÇÖ·½Ê½Éв»Ã÷ÏÔ£¬µ«ÔçÆÚ·ÖÎöÅú×¢¿ÉÄÜÊÇÁãÈÕ·ì϶»òµÚÈý·½Èí¼þ·ì϶ËùÖ¡£´Ë±í£¬JabaROOT»¹·ÖÏíÁËĦÂå¸çÀ͹¤²¿ÍøÕ¾±»·ÛËéµÄ½ØÍ¼£¬¸ÃÍøÕ¾ÒÑÏÂÏß¡£Ä¦Âå¸çÓë°¢¶û¼°ÀûÑǹØÏµ³Ö¾ÃÑÏÖØ£¬ÕþÖκÍÁìÍÁÕù¶Ë²»ÐݼÓÉî¡£Õâ´ÎÍøÂç¹¥»÷ÊÂÎñ½øÒ»²½¼Ó¾çÁËÁ½¹úÖ®¼äµÄÑÏÖØ´óÊÆ¡£
https://therecord.media/morocco-investigates-breach-hackers-algeria
5. ºÚ¿ÍÀûÓ÷ûºÅÁ´½Ó±£Áô¶ÔÒѽ¨²¹µÄFortiGateVPNµÄ½Ó¼ûȨÏÞ
4ÔÂ11ÈÕ£¬Fortinet·¢³ö´¹Î£°²È«ÖҸ棬³ÆÍþвÐÐΪÕßÀûÓúóÀûÓü¼Êõ£¬¼´±ãÔʼ¹¥»÷ý½éÒѱ»½¨²¹£¬ÈÔÄÜά³Ö¶ÔÊܹ¥»÷µÄFortiGateVPNÉ豸µÄÖ»¶Á½Ó¼ûȨÏÞ¡£±¾ÖÜÔçЩʱ³½£¬FortinetÒÑÏò¿Í»§·¢ËͱêÌâΪ¡°É豸й¶֪ͨ-FortiGate/FortiOS-±ØÒª´¹Î£Ðж¯¡±µÄµç×ÓÓʼþ£¬²¢Ö¸¶¨ÎªTLP:AMBER+STRICT£¬Ö¸³öÎÊÌâÓëзì϶Î޹أ¬¶øÊÇÍþвÐÐΪÕßÀûÓÃÏÈǰÒÑÖª·ì϶Áôϵġ£ÕâЩ·ì϶Ô̺¬CVE-2022-42475¡¢CVE-2023-27997ºÍCVE-2024-21762¡£ÍþвÐÐΪÕßͨ¹ýÔÚ˵»°Îļþ¼ÐÄÚ´´½¨Ö¸ÏòÉ豸¸ùÎļþϵͳµÄ·ûºÅÁ´½Ó£¬¶ã±Ü¼ì²â²¢Î¬³Ö½Ó¼ûȨÏÞ¡£FortinetÖ¸³ö£¬¼´±ãÉ豸ÒѸüÐÂÖÁ½â¾öÔʼ·ì϶µÄ°æ±¾£¬´Ë·ûºÅÁ´½ÓÈÔ¿ÉÄܱ»ÒÅÁô£¬ÔÊÐíÍþвÐÐΪÕßά³Ö¶ÔÉ豸ÎļþϵͳÉÏÎļþµÄÖ»¶Á½Ó¼ûȨÏÞ¡£·¨¹úCERT-FRй©£¬ÕâÖÖ¼¼ÊõÒѱ»ÓÃÓÚ¿É×·ÒäÖÁ2023ËêÊ׵Ĵó¹æÄ£¹¥»÷ÖС£CISA½¨ÒéÍøÂç·ÀÓùÕß½«ÓëFortinet»ã±¨ÓйصÄÈκÎÊÂÎñºÍÒì³£»î¶¯»ã±¨ÖÁÆä24/7ÔËÓªÖÐÐÄ¡£Fortinet½¨Òé¿Í»§µ±¼´Éý¼¶FortiOS°æ±¾ÒÔɾ³ý¶ñÒâÎļþ£¬²¢²é³É豸ÅäÖ㬳Áµã¹Ø×¢ÈκÎÒâ±í¸ü¸Ä¡£CERT-FR»¹½¨Ò齫ÊÜËðµÄVPNÉ豸ÓëÍøÂç¸ôÀ룬³ÁÖÃËùÓлúÃÜ£¬²¢ËÑË÷ºáÏòÍøÂçÒÆ¶¯µÄÖ¤¾Ý¡£
https://www.bleepingcomputer.com/news/security/fortinet-hackers-retain-access-to-patched-fortigate-vpns-using-symlinks/
6. Tycoon2FAƽ̨Éý¼¶ÒþÉíÄÜÁ¦£¬SVG´¹µö¹¥»÷¼¤ÔöÒý¹Ø×¢
4ÔÂ12ÈÕ£¬½üÈÕ£¬³ÛÃûÍøÂç´¹µö¼´·þÎñ(PhaaS)ƽ̨Tycoon2FA¸üУ¬ÒÔ¼ÓÇ¿ÆäÒþÉíºÍÌÓ±ÜÄÜÁ¦¡£¸Ãƽ̨×Ô2023Äê10Ô±»Sekoia×êÑÐÈËÔ±·¢ÏÖÒÔÀ´£¬Ò»ÏòÒÔÈÆ¹ýMicrosoft365ºÍGmailÕÊ»§ÉϵĶà³É·ÖÉí·ÝÑéÖ¤¶øÎÅÃû¡£Õâ´Î¸üÐÂÔ̺¬Ê¹Óò»Ë½¼ûµÄUnicode×Ö·û°µ²ØJavaScriptÖеĶþ½øÔìÊý¾Ý£¬Çл»µ½×ÔÍйÜCAPTCHAÒÔÌÓ±ÜÓòÃûŵÑÔϵͳµÄÖ¸ÎÆ¼ø±ð£¬ÒÔ¼°Ô̺¬·´µ÷ÊÔJavaScriptÒÔ¼ì²â²¢×èÖÓίÀÀÆ÷×Ô¶¯»¯¹¤¾ß¡£ÕâЩ¶ã±Ü¼¼Êõ½áºÏºó£¬Ê¹¼ì²âºÍ·ÖÎö±äµÃÔ½·¢¸´ÔÓ¡£Í¬Ê±£¬Trustwave»ã±¨³Æ£¬Ê¹ÓöñÒâSVG£¨¿ÉËõ·ÅʸÁ¿Í¼ÐΣ©ÎļþµÄÍøÂç´¹µö¹¥»÷¼±¾çÔö³¤£¬ÕâÒ»Ç÷ÏòÓÉTycoon2FAµÈPhaaSÆ½Ì¨ÍÆ¶¯¡£´Ó2024Äê4Ôµ½2025Äê3Ô£¬´ËÀ๥»÷ÊýÁ¿ÉÏÉýÁË1,800%¡£¶ñÒâSVGͼÏñ¼Ù×°³ÉÓïÒôÐÂÎÅ¡¢»Õ±ê»òÔÆÎĵµÍ¼±ê£¬µ«¿ÉÄÜÔ̺¬JavaScript£¬µ±Í¼ÏñÔÚä¯ÀÀÆ÷ÖгöÏÖʱ£¬JavaScript»á×Ô¶¯´¥·¢£¬½«ÓʼþÊÕ¼þÈ˳Á¶¨Ïòµ½ÇÔÈ¡ÆäÕÊ»§Í´´¦µÄMicrosoft365ÍøÂç´¹µöÒ³Ãæ¡£Ãæ¶ÔPhaaSƽ̨ºÍ»ùÓÚSVGµÄÍøÂç´¹µöµÄ¹ÄÆð£¬Ìá¸ß¾¯Ìè²¢ÑéÖ¤·¢¼þÈËÕæÊµÐÔ±äµÃÖÁ¹Ø³ÁÒª¡£Ò»ÖÖÓÐЧµÄ·ÀÓù´ëÊ©ÊÇ×èÖ¹»òÏóÕ÷µç×ÓÓʼþÍø¹ØÖеÄSVG¸½¼þ£¬²¢Ê¹Ó÷ÀÍøÂç´¹µöµÄMFA²½Öè¡£
https://www.bleepingcomputer.com/news/security/tycoon2fa-phishing-kit-targets-microsoft-365-with-new-tricks/


¾©¹«Íø°²±¸11010802024551ºÅ