CISAÖÒ¸æSonicWallSMAÉ豸·ì϶ÔÚ±»»ý¼«ÀûÓÃ
°ä²¼¹¦·ò 2025-04-181. CISAÖÒ¸æSonicWallSMAÉ豸·ì϶ÔÚ±»»ý¼«ÀûÓÃ
4ÔÂ17ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÓÚÖÜÈý½«Ó°ÏìSonicWall°²È«Òƶ¯½Ó¼û£¨SMA£©100ϵÁÐÍø¹ØµÄ¸ßÑϳÁÐÔ°²È«·ì϶CVE-2021-20035£¨CVSSÆÀ·Ö£º7.2£©Ôö³¤ÖÁÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ÖС£´Ë·ì϶Óë²Ù×÷ϵͳºÅÁî×¢ÈëÓйأ¬¿ÉÄܵ¼Ö´úÂëÖ´ÐС£SonicWallÔÚ2021Äê9Ô°䲼µÄ°²È«²¼¸æÖÐÖ¸³ö£¬SMA100ÖÎÀí½çÃæÖÐÌØÊâÔªËØµÄ²»°ø±ßºÍ£¬ÔÊÐíÔ¶³Ì¾¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒÔ'nobody'Óû§Éí·Ý×¢ÈëËÁÒâºÅÁ½ø¶ø¿ÉÄܵ¼Ö´úÂëÖ´ÐС£¸Ã·ì϶ӰÏìÔËÐÐÌØ¶¨°æ±¾µÄSMA200¡¢SMA210¡¢SMA400¡¢SMA410ºÍSMA500v£¨ESX¡¢KVM¡¢AWS¡¢Azure£©É豸£¬¾ßÌåÔ̺¬10.2.1.0-17sv¼°¸üÔç°æ±¾¡¢10.2.0.7-34sv¼°¸üÔç°æ±¾ºÍ9.0.0.10-28sv¼°¸üÔç°æ±¾¡£ÕâЩ°æ±¾ÒÑÔÚºóÐøµÄ¸üÐÂÖеõ½½¨¸´£¬±ðÀëΪ10.2.1.1-19sv¼°¸ü¸ß°æ±¾¡¢10.2.0.8-37sv¼°¸ü¸ß°æ±¾ºÍ9.0.0.11-31sv¼°¸ü¸ß°æ±¾¡£Ö»¹ÜĿǰÉв»Ã÷ÏԸ÷ì϶µÄ¾ßÌåÀûÓÃϸ½Ú£¬µ«SonicWallÒÑÅú¸Ä²¼¸æ£¬ÈϿɴ˷ì϶¿ÉÄÜÔÚ±»Ò°±íÀûÓá£Îª´Ë£¬Áª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹±»ÒªÇóÔÚ2025Äê5ÔÂ7ÈÕ֮ǰ²ÉÈ¡±ØÒªµÄ»º½â´ëÊ©£¬ÒÔ±£»¤ÆäÍøÂçÃâÊÜ×Ô¶¯Íþв¡£
https://thehackernews.com/2025/04/cisa-flags-actively-exploited.html
2. TheLoopƽ̨210Íò·ÝÃô¸ÐÐÅϢй¶
4ÔÂ16ÈÕ£¬ÓÉMTV¸ß¹ÜµÞÔìµÄ°Ä´óÀûÑÇÒѾ×îÈȵãµÄ´´Ò⹤×÷ƽ̨TheLoopÓÚ2024Äê¹Ø¹Ø£¬È»¶øÆäÓû§Ãô¸ÐÊý¾Ýй¶Σ»úÖÁ½ñδ½â¡£2025Äê2Ô£¬°²È«×êÑÐÈËÔ±·¢ÏÖ£¬¸Ãƽ̨ÃýÎóÅäÖõÄGoogleCloud´æ´¢Í°µ¼ÖÂ210Íò·ÝÎļþй¶£¬Ô̺¬º¬È«Ãû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢ÓÊÏä¼°Æëȫְҵ¾ÑéµÄ¼òÀú¡£ÕâЩÊý¾ÝΪڿÆÕßÌṩÁ˼«·çÑű㡣ڿÆÕß¿ÉÀûÓÃй¶ÐÅÏ¢Ö´Ðи߶ȶ¨ÏòµÄ´¹µö¹¥»÷¡¢ÓïÒô´¹µöºÍ¶ÌÐÅ´¹µö¡£Æ¾½è¾ßÌå¼òÀú£¬Ú¿ÆÕßÄÜÔì×÷¼«¶ËÕæÇеĸöÐÔ»¯´¹µöÓʼþ£¬Ìá¼°Êܺ¦ÕßÕæÊµÖ°Î»Ãû³Æ¡¢¹ýÍù¿Í»§ÉõÖÁÈÕ³£Ê¹Óù¤¾ß£¬»¹¿ÉÄܸ½´øÐéαְλÑûÔ¼¡¢´ýÇ©ÊðºÏͬ»òÒªÇóÑéÖ¤Éí·Ý£¨ÐèÌṩ»¤ÕÕ¸´Ó¡¼þ£©¡£µ¹Ø©ÆÕß°ÑÎյ绰ºÅÂëºÍ²¼¾°ÐÅϢʱ£¬ÓïÒô´¹µöºÍ¶ÌÐÅ´¹µö¼«¾ß˵·þÁ¦£¬Èç×Ô³ÆÀ´×ÔÊܺ¦ÕßÔøÓ¦Æ¸µÄ´´Òâ»ú¹¹£¬ÒªÇó×îÖÕÈ·ÈÏÒøÐÐÐÅÏ¢¡£´Ë±í£¬Ú¿ÆÕß»¹ÄܼÙ×°³ÉÊܺ¦ÕßÏò¿Í»§»ò¹ÍÖ÷·¢ËÍÐéα·¢Æ±¡£°²È«×êÑÐÈËÔ±³¢ÊÔÁªÏµ¸Ã¹«Ë¾¼°ÍÆËã»úÓ¦¼±ÏìÓ¦×飬µ«Î´ÊÕµ½»ØÓ¦¡£
https://cybernews.com/security/loop-leaks-personal-data-creatives-exposed/
3. ÀÕË÷Èí¼þÀûÓÃAWSÃÜÔ¿¹¥»÷AWSS3´æ´¢Í°
4ÔÂ16ÈÕ£¬½üÈÕ£¬Ò»Â·º±¼ûÇÒ¿ÉÄÜÊ·ÎÞǰÀýµÄÐͬÀÕË÷»î¶¯ÆØ¹â£¬Éæ¼°³¬¹ý1.2ÒÚÌõй¶µÄAWSÃÜÔ¿¼Í¼£¬×îÖÕÖ¸Ïò1,229¸öΨһƾ֤¡£¹¥»÷ÕßÀûÓÃÕâЩƾ֤¶ÔS3´æ´¢Í°ÖеÄÊý¾ÝÀûÓÃÁË·þÎñÆ÷¶Ë¼ÓÃÜ£¨SSE-C£©£¬ËæºóÁôÏÂÀÕË÷ÐÅÒªÇóÒÔ±ÈÌØ±ÒÖ§¸¶Êê½ð£¬Ã¿Î»Êܺ¦ÕßÀÕË÷½ð¶îΪ0.3BTC£¨Ô¼25,000ÃÀÔª£©¡£Õâ´Î¶ñÒâ»î¶¯¸ß¶È×Ô¶¯»¯£¬ÇÒûÓÐÃ÷È·µÄ¹éÊô¡£ÍþвÐÐΪÕßÔÚÿ¸ö¼ÓÃܵÄS3´æ´¢Í°ÖÐÁôÏÂÃûΪwarning.txtµÄÀÕË÷ÐÅÏ¢£¬²¢¸½´øÎ¨Ò»µÄ±ÈÌØ±ÒµØÖ·ºÍawsdecrypt[@]techie.comµÄµç×ÓÓʼþµØÖ·ÓÃÓÚÁªÏµ¡£¹¥»÷ÕßÀûÓÃAWSÔÉú·þÎñÆ÷¶Ë¼ÓÃÜ£¨Ê¹Óÿͻ§ÌṩµÄÃÜÔ¿£©À´¼ÓÃÜS3´æ´¢Í°Êý¾Ý£¬ÌìÉú×Ô¼ºµÄAES-256¼ÓÃÜÃÜÔ¿Ëø¶¨Êý¾Ý£¬Ê¹µÃÊܺ¦ÕßÎÞ·¨¸´Ô¡£ÕâÖÖ¹¥»÷ģʽÔÊÐí¡°¾²Ä¬ÈëÇÖ¡±£¬ÈëÇÖʱ²»»á·¢³ö¾¯±¨»ò»ã±¨£¬Ò²²»»áÁôÏÂÎļþɾ³ýÈÕÖ¾£¬ÍþвÕß±£Áô´æ´¢Í°½á¹¹£¬ÉõÖÁδÇÔÈ¡Êý¾Ý½øÐÐË«³ÁÀÕË÷¡£´Ëǰ£¬¹¥»÷Õß»¹ÔøÉèÖÃS3ÐÔÃüÖÜÆÚÕ½Êõ£¬ÔÚ7ÌìÄÚɾ³ý¼ÓÃÜÊý¾Ý£¬½øÒ»²½ÏòÊܺ¦Õßʩѹ¡£ÁîÈËÕ𾪵ÄÊÇ£¬ÔÚ¶à¸öÇé¿öÏ£¬ÊÜÓ°ÏìµÄAWS»·¾³ÈÔÔÚ³ÖÐøÔËÐУ¬Åú×¢Êܺ¦Õß¿ÉÄÜÈÔδÒâʶµ½ÕâÒ»·ì϶¡£×êÑÐÈËÔ±Ö¸³ö£¬¹¥»÷Õß»ñÈ¡AWSÃÜÔ¿µÄ¾ßÌå²½ÖèÉÐδ֤ʵ¡£
https://cybernews.com/security/aws-cloud-storage-bucket-ransomware-attacks/
4. ÓéÀÖ·þÎñ¾ÞÍ·LegendsInternationalÅû¶Êý¾Ýй¶ÊÂÎñ
4ÔÂ17ÈÕ£¬LegendsInternationalÊÇÈ«ÇòÌåÓýºÍÓéÀÖ·þÎñ¹«Ë¾£¬ÒµÎñº¸Ç³¡µØ¹æ»®¡¢ÏúÊÛ¡¢ºÏ×÷¡¢»¶Ó¡¢ÉÌÆ·ºÍ¼¼Êõ½â¾ö¹æ»®£¬ÄêÊÕÈ볬11ÒÚÃÀÔª¡£¸Ã¹«Ë¾ÖÎÀí×ÅÎå´óÖÞ350¶à¸ö³¡¹Ý£¬ÏñÂåÉ¼í¶µÄSoFiÔ˶¯³¡¡¢Å¦Ô¼µÄÒ»ºÅÊÀ½ç¹Û¾°Ì¨µÈ³ÛÃû³¡¹Ý¾ùÔÚÆäÁС£½üÆÚ£¬Ëü»¹Í¨¹ýÊÕ¹ºASMGlobalÀ©´óÁËÒµÎñ¹æÄ£¡£LegendsInternational·¢³öÖҸ棬ÆäÓÚ2024Äê11Ô²úÉúÊý¾Ýй¶£¬ÆìÏÂÔ±¹¤Ó볡Ëù·Ã¿ÍÊÜÓ°Ïì¡£ÔÚÓëµ±¾ÖµÄ֪ͨº¯À¸Ã¹«Ë¾³Æ11ÔÂ9ÈÕÔÚITϵͳ¼ì²âµ½Î´¾ÊÚȨ»î¶¯£¬Ëæ¼´ÔÚ±í²¿ÍøÂ簲ȫר¼ÒÐÖúÏ·¢Õ¹µ÷²é¡£µ÷²é֤ʵÈëÇÖÕßÇÔÈ¡ÁËÓ×ÎÒÊý¾ÝÎļþ£¬µ«º¯¼þδÃ÷ȷй¶Êý¾ÝÀàÐÍ¡£Ä¿Ç°£¬Õâ´ÎÊý¾Ýй¶µÄÁìÓòºÍÊÜÓ°ÏìÈËÊý²»Ã÷£¬µ«¼øÓÚ¹«Ë¾ÖØ´óµÄÔËÓª¹æÄ£ºÍÖÎÀíµÄº£Á¿Ãô¸ÐÊý¾Ý£¬µ£±í¸ÐÇéδÃâ¡£ÔÚÖÂÊÜÓ°ÏìÓû§µÄÐź¯ÖУ¬LegendsInternational°µÊ¾ÊÂÎñǰÒѲÉÈ¡°²È«´ëÊ©£¬ÏµÍ³¸´ÔºóÒ²Ö´ÐÐÁ˶î±í´ëÊ©£¬µ«Î´Ìṩ¾ßÌåϸ½Ú¡£º¯¼þÊÕ¼þÈË¿Éͨ¹ýExperian»ñµÃ24¸öÔµÄÉí·Ý͵ÇÔ¼ì²â·þÎñ±£ÏÕ£¬ÐèÔÚ2025Äê7ÔÂ31ÈÕǰע²á¡£¹«Ë¾³ÆÎ´·¢ÏÖÓ×ÎÒÐÅÏ¢±»ÀÄÓõÄÖ¤¾Ý£¬µ«½¨ÒéÓû§Î¬³Ö¾¯Ìè¡£
https://www.bleepingcomputer.com/news/security/entertainment-services-giant-legends-international-discloses-data-breach/
5. INCRansomÀÕË÷Èí¼þ¹¥»÷ºó£¬AholdDelhaizeÈ·ÈÏÊý¾Ý±»µÁ
4ÔÂ17ÈÕ£¬°¢»ôµÂµÂ¶ûº£×È(AholdDelhaize)ÊÇ¿ç¹úÁãÊÛºÍÅú·¢¾ÞÍ·£¬ÔÚÅ·ÃÀ¾Óª½ü8000¼ÒÉ̵꣬ռÓг¬41ÍòÃûÔ±¹¤£¬ÄêÊÕÈëÔ¼1000ÒÚÃÀÔª£¬ÔÚÃÀ¹ú¾ÓªFoodLionµÈÆ·ÅÆ¡£2024Äê11Ô£¬¸Ã¹«Ë¾¹«¿ªÅûÂ¶ÍøÂ簲ȫÊÂÎñ£¬²¢¹Ø¹ØITϵͳ±£»¤¡£Æä³ÆÎÊÌâ¼°»º½â´ëÊ©ÒÑÓ°ÏìÃÀ¹úÄ³Ð©Æ·ÅÆºÍ·þÎñ£¬Ô̺¬²¿ÃÅÒ©µêºÍµçóÒ×Îñ¡£×òÈÕ£¬ÀÕË÷Èí¼þ×éÖ¯INCRansom½«AholdDelhaizeÔö³¤ÖÁÆä°µÍøÊý¾ÝÐÂäįÕË÷ÍøÕ¾£¬²¢°ä²¼ÒÉËÆÇÔÈ¡µÄÎļþÑù±¾¡£AholdDelhaize½²»°ÈË֤ʵÊý¾Ýй¶£¬µ«Î´ÆÀÂÛÀÕË÷Èí¼þÊÇ·ñ²Î¼ÓÕâ´Î¹¥»÷¡£Ä¿Ç°£¬¸Ã¹«Ë¾¶ÔÊÂÎñµÄµ÷²éÈÔÔÚ½øÐÐÖУ¬ÈôÈ·ÈϿͻ§Êý¾ÝÊÜÓ°Ï죬½«Í¨ÖªÓйØÈËÔ±¡£Í¬Ê±£¬ÆäËùÓÐÉ̵êºÍµçÉÌ·þÎñÈÔÕý³£ÔËÓª£¬¹Ë¿Í²»ÊÜÓ°Ïì¡£
https://www.bleepingcomputer.com/news/security/ahold-delhaize-confirms-data-theft-after-inc-ransomware-claims-attack/
6. CISAÖÒ¸æOracle´«Í³ÔÆ·þÎñÆ÷ÔâÈëÇÖ¼Ó¾çÆ¾Ö¤Ð¹Â¶·çÏÕ
4ÔÂ17ÈÕ£¬CISA·¢³öÖҸ棬½ñÄêÔçЩʱ³½Oracle´«Í³ÔÆ·þÎñÆ÷ÔâÈëÇÖºó£¬Î¥¹æ·çÏռӾ磬ÆóÒµÍøÂçÃæ¶Ô³Á´óÍþв¡£CISAÖ¸³ö£¬Ëù»ã±¨»î¶¯¶Ô×éÖ¯ºÍÓ×ÎÒ×é³ÉDZÔÚ·çÏÕ£¬Æ¾Ö¤×ÊÁÏ¿ÉÄÜй¶¡¢³Á¸´Ê¹ÓûòǶÈëϵͳ£¬ËäÆäÁìÓòºÍÓ°ÏìÉÐδ֤ʵ£¬µ«Æ¾Ö¤×ÊÁÏÒ»µ©Ç¶Èë¾ÍÄÑÒÔ·¢ÏÖ£¬Â¶³öºó»òÖ³־Ãδ¾ÊÚȨ½Ó¼û£¬¶ÔÆóÒµ»·¾³×é³É³Á´ó·çÏÕ¡£Îª´Ë£¬CISA°ä²¼Ö¸ÄÏ£¬¶½´ÙÍøÂç·ÀÓùÕß³ÁÖÃÊÜÓ°ÏìÓû§ÃÜÂ룬´úÌæÓ²±àÂë»òǶÈëʽƾ֤£¬Ö´ÐзÀÍøÂç´¹µöµÄ¶à³É·ÖÉí·ÝÑéÖ¤£¬²¢¼à¿ØÉí·ÝÑéÖ¤ÈÕÖ¾¡£´Ëǰ£¬¼×¹ÇÎÄÈ·ÈÏÒ»ÃûÍþвÐÐΪÕßй¶ÁË´Ó¡°Á½Ì¨¹ýÆÚµÄ·þÎñÆ÷¡±ÖÐÇÔÈ¡µÄƾ֤£¬²»ÍâÆäÔÆ·þÎñÆ÷δÊܹ¥»÷£¬ÊÂÎñδӰÏìÔÆ·þÎñ»ò¿Í»§Êý¾Ý¡£¹¥»÷ÕßÇÔÈ¡Á˾ɿͻ§Æ¾Ö¤£¬²¢ÔÚBreachForumsÉϰ䲼2025Äê¸üмͼ£¬ÓëýÌå¹²Ïí2024Äêµ×Êý¾Ý£¬ÇÒй¶Êý¾ÝÑù±¾¾¶àλOracle¿Í»§È·ÈÏÓÐЧ¡£3Ôµף¬CybelAngelй©Oracle·î¸æ¿Í»§£¬ÔçÔÚ2025Äê1Ô£¬¹¥»÷Õß¾ÍÔÚ²¿ÃÅGen1·þÎñÆ÷Éϲ¿ÊðÁËWebShellºÍÆäËû¶ñÒâÈí¼þ£¬Ö±ÖÁ2Ôµ׷¢ÏÖ·ì϶£¬¹¥»÷Õß´ÓOracleIdentityManagerÊý¾Ý¿âÖÐÇÔÈ¡ÁËÊý¾Ý¡£´Ë±í£¬ÉϸöÔÂýÌ屨·³Æ¼×¹ÇÎĽ¡È«¹«Ë¾1Ô·ÝÒ²²úÉúÊý¾Ýй¶ÊÂÎñ£¬Ó°Ïì¶à¼ÒÃÀ¹úÒ½ÁÆ»ú¹¹ºÍÒ½ÔºµÄ»¼ÕßÊý¾Ý¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-of-increased-breach-risks-following-oracle-cloud-leak/


¾©¹«Íø°²±¸11010802024551ºÅ