CISAÖÒ¸æSonicWallSMAÉ豸·ì϶ÔÚ±»»ý¼«ÀûÓÃ

°ä²¼¹¦·ò 2025-04-18

1. CISAÖÒ¸æSonicWallSMAÉ豸·ì϶ÔÚ±»»ý¼«ÀûÓÃ


4ÔÂ17ÈÕ £¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÓÚÖÜÈý½«Ó°ÏìSonicWall°²È«Òƶ¯½Ó¼û£¨SMA£©100ϵÁÐÍø¹ØµÄ¸ßÑϳÁÐÔ°²È«·ì϶CVE-2021-20035£¨CVSSÆÀ·Ö£º7.2£©Ôö³¤ÖÁÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ÖС£´Ë·ì϶Óë²Ù×÷ϵͳºÅÁî×¢ÈëÓйØ £¬¿ÉÄܵ¼Ö´úÂëÖ´ÐС£SonicWallÔÚ2021Äê9Ô°䲼µÄ°²È«²¼¸æÖÐÖ¸³ö £¬SMA100ÖÎÀí½çÃæÖÐÌØÊâÔªËØµÄ²»°ø±ßºÍ £¬ÔÊÐíÔ¶³Ì¾­¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒÔ'nobody'Óû§Éí·Ý×¢ÈëËÁÒâºÅÁî £¬½ø¶ø¿ÉÄܵ¼Ö´úÂëÖ´ÐС£¸Ã·ì϶ӰÏìÔËÐÐÌØ¶¨°æ±¾µÄSMA200¡¢SMA210¡¢SMA400¡¢SMA410ºÍSMA500v£¨ESX¡¢KVM¡¢AWS¡¢Azure£©É豸 £¬¾ßÌåÔ̺¬10.2.1.0-17sv¼°¸üÔç°æ±¾¡¢10.2.0.7-34sv¼°¸üÔç°æ±¾ºÍ9.0.0.10-28sv¼°¸üÔç°æ±¾¡£ÕâЩ°æ±¾ÒÑÔÚºóÐøµÄ¸üÐÂÖеõ½½¨¸´ £¬±ðÀëΪ10.2.1.1-19sv¼°¸ü¸ß°æ±¾¡¢10.2.0.8-37sv¼°¸ü¸ß°æ±¾ºÍ9.0.0.11-31sv¼°¸ü¸ß°æ±¾¡£Ö»¹ÜĿǰÉв»Ã÷ÏԸ÷ì϶µÄ¾ßÌåÀûÓÃϸ½Ú £¬µ«SonicWallÒÑÅú¸Ä²¼¸æ £¬ÈϿɴ˷ì϶¿ÉÄÜÔÚ±»Ò°±íÀûÓá£Îª´Ë £¬Áª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹±»ÒªÇóÔÚ2025Äê5ÔÂ7ÈÕ֮ǰ²ÉÈ¡±ØÒªµÄ»º½â´ëÊ© £¬ÒÔ±£»¤ÆäÍøÂçÃâÊÜ×Ô¶¯Íþв¡£


https://thehackernews.com/2025/04/cisa-flags-actively-exploited.html


2. TheLoopƽ̨210Íò·ÝÃô¸ÐÐÅϢй¶


4ÔÂ16ÈÕ £¬ÓÉMTV¸ß¹ÜµÞÔìµÄ°Ä´óÀûÑÇÒѾ­×îÈȵãµÄ´´Ò⹤×÷ƽ̨TheLoopÓÚ2024Äê¹Ø¹Ø £¬È»¶øÆäÓû§Ãô¸ÐÊý¾Ýй¶Î£»úÖÁ½ñδ½â¡£2025Äê2Ô £¬°²È«×êÑÐÈËÔ±·¢ÏÖ £¬¸Ãƽ̨ÃýÎóÅäÖõÄGoogleCloud´æ´¢Í°µ¼ÖÂ210Íò·ÝÎļþй¶ £¬Ô̺¬º¬È«Ãû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢ÓÊÏä¼°Æëȫְҵ¾­ÑéµÄ¼òÀú¡£ÕâЩÊý¾ÝΪڿƭÕßÌṩÁ˼«·çÑűã¡£Ú¿Æ­Õß¿ÉÀûÓÃй¶ÐÅÏ¢Ö´Ðи߶ȶ¨ÏòµÄ´¹µö¹¥»÷¡¢ÓïÒô´¹µöºÍ¶ÌÐÅ´¹µö¡£Æ¾½è¾ßÌå¼òÀú £¬Ú¿Æ­ÕßÄÜÔì×÷¼«¶ËÕæÇеĸöÐÔ»¯´¹µöÓʼþ £¬Ìá¼°Êܺ¦ÕßÕæÊµÖ°Î»Ãû³Æ¡¢¹ýÍù¿Í»§ÉõÖÁÈÕ³£Ê¹Óù¤¾ß £¬»¹¿ÉÄܸ½´øÐéαְλÑûÔ¼¡¢´ýÇ©ÊðºÏͬ»òÒªÇóÑéÖ¤Éí·Ý£¨ÐèÌṩ»¤ÕÕ¸´Ó¡¼þ£©¡£µ¹Ø©Æ­Õß°ÑÎյ绰ºÅÂëºÍ²¼¾°ÐÅϢʱ £¬ÓïÒô´¹µöºÍ¶ÌÐÅ´¹µö¼«¾ß˵·þÁ¦ £¬Èç×Ô³ÆÀ´×ÔÊܺ¦ÕßÔøÓ¦Æ¸µÄ´´Òâ»ú¹¹ £¬ÒªÇó×îÖÕÈ·ÈÏÒøÐÐÐÅÏ¢¡£´Ë±í £¬Ú¿Æ­Õß»¹ÄܼÙ×°³ÉÊܺ¦ÕßÏò¿Í»§»ò¹ÍÖ÷·¢ËÍÐéα·¢Æ±¡£°²È«×êÑÐÈËÔ±³¢ÊÔÁªÏµ¸Ã¹«Ë¾¼°ÍÆËã»úÓ¦¼±ÏìÓ¦×é £¬µ«Î´ÊÕµ½»ØÓ¦¡£


https://cybernews.com/security/loop-leaks-personal-data-creatives-exposed/


3. ÀÕË÷Èí¼þÀûÓÃAWSÃÜÔ¿¹¥»÷AWSS3´æ´¢Í°


4ÔÂ16ÈÕ £¬½üÈÕ £¬Ò»Â·º±¼ûÇÒ¿ÉÄÜÊ·ÎÞǰÀýµÄЭͬÀÕË÷»î¶¯ÆØ¹â £¬Éæ¼°³¬¹ý1.2ÒÚÌõй¶µÄAWSÃÜÔ¿¼Í¼ £¬×îÖÕÖ¸Ïò1,229¸öΨһƾ֤¡£¹¥»÷ÕßÀûÓÃÕâЩƾ֤¶ÔS3´æ´¢Í°ÖеÄÊý¾ÝÀûÓÃÁË·þÎñÆ÷¶Ë¼ÓÃÜ£¨SSE-C£© £¬ËæºóÁôÏÂÀÕË÷ÐÅÒªÇóÒÔ±ÈÌØ±ÒÖ§¸¶Êê½ð £¬Ã¿Î»Êܺ¦ÕßÀÕË÷½ð¶îΪ0.3BTC£¨Ô¼25,000ÃÀÔª£©¡£Õâ´Î¶ñÒâ»î¶¯¸ß¶È×Ô¶¯»¯ £¬ÇÒûÓÐÃ÷È·µÄ¹éÊô¡£ÍþвÐÐΪÕßÔÚÿ¸ö¼ÓÃܵÄS3´æ´¢Í°ÖÐÁôÏÂÃûΪwarning.txtµÄÀÕË÷ÐÅÏ¢ £¬²¢¸½´øÎ¨Ò»µÄ±ÈÌØ±ÒµØÖ·ºÍawsdecrypt[@]techie.comµÄµç×ÓÓʼþµØÖ·ÓÃÓÚÁªÏµ¡£¹¥»÷ÕßÀûÓÃAWSÔ­Éú·þÎñÆ÷¶Ë¼ÓÃÜ£¨Ê¹Óÿͻ§ÌṩµÄÃÜÔ¿£©À´¼ÓÃÜS3´æ´¢Í°Êý¾Ý £¬ÌìÉú×Ô¼ºµÄAES-256¼ÓÃÜÃÜÔ¿Ëø¶¨Êý¾Ý £¬Ê¹µÃÊܺ¦ÕßÎÞ·¨¸´Ô­¡£ÕâÖÖ¹¥»÷ģʽÔÊÐí¡°¾²Ä¬ÈëÇÖ¡± £¬ÈëÇÖʱ²»»á·¢³ö¾¯±¨»ò»ã±¨ £¬Ò²²»»áÁôÏÂÎļþɾ³ýÈÕÖ¾ £¬ÍþвÕß±£Áô´æ´¢Í°½á¹¹ £¬ÉõÖÁδÇÔÈ¡Êý¾Ý½øÐÐË«³ÁÀÕË÷¡£´Ëǰ £¬¹¥»÷Õß»¹ÔøÉèÖÃS3ÐÔÃüÖÜÆÚÕ½Êõ £¬ÔÚ7ÌìÄÚɾ³ý¼ÓÃÜÊý¾Ý £¬½øÒ»²½ÏòÊܺ¦Õßʩѹ¡£ÁîÈËÕ𾪵ÄÊÇ £¬ÔÚ¶à¸öÇé¿öÏ £¬ÊÜÓ°ÏìµÄAWS»·¾³ÈÔÔÚ³ÖÐøÔËÐÐ £¬Åú×¢Êܺ¦Õß¿ÉÄÜÈÔδÒâʶµ½ÕâÒ»·ì϶¡£×êÑÐÈËÔ±Ö¸³ö £¬¹¥»÷Õß»ñÈ¡AWSÃÜÔ¿µÄ¾ßÌå²½ÖèÉÐδ֤ʵ¡£


https://cybernews.com/security/aws-cloud-storage-bucket-ransomware-attacks/


4. ÓéÀÖ·þÎñ¾ÞÍ·LegendsInternationalÅû¶Êý¾Ýй¶ÊÂÎñ


4ÔÂ17ÈÕ £¬LegendsInternationalÊÇÈ«ÇòÌåÓýºÍÓéÀÖ·þÎñ¹«Ë¾ £¬ÒµÎñº­¸Ç³¡µØ¹æ»®¡¢ÏúÊÛ¡¢ºÏ×÷¡¢»¶Ó­¡¢ÉÌÆ·ºÍ¼¼Êõ½â¾ö¹æ»® £¬ÄêÊÕÈ볬11ÒÚÃÀÔª¡£¸Ã¹«Ë¾ÖÎÀí×ÅÎå´óÖÞ350¶à¸ö³¡¹Ý £¬ÏñÂåÉ¼í¶µÄSoFiÔ˶¯³¡¡¢Å¦Ô¼µÄÒ»ºÅÊÀ½ç¹Û¾°Ì¨µÈ³ÛÃû³¡¹Ý¾ùÔÚÆäÁС£½üÆÚ £¬Ëü»¹Í¨¹ýÊÕ¹ºASMGlobalÀ©´óÁËÒµÎñ¹æÄ£¡£LegendsInternational·¢³öÖÒ¸æ £¬ÆäÓÚ2024Äê11Ô²úÉúÊý¾Ýй¶ £¬ÆìÏÂÔ±¹¤Ó볡Ëù·Ã¿ÍÊÜÓ°Ïì¡£ÔÚÓëµ±¾ÖµÄ֪ͨº¯Àï £¬¸Ã¹«Ë¾³Æ11ÔÂ9ÈÕÔÚITϵͳ¼ì²âµ½Î´¾­ÊÚȨ»î¶¯ £¬Ëæ¼´ÔÚ±í²¿ÍøÂ簲ȫר¼ÒЭÖúÏ·¢Õ¹µ÷²é¡£µ÷²é֤ʵÈëÇÖÕßÇÔÈ¡ÁËÓ×ÎÒÊý¾ÝÎļþ £¬µ«º¯¼þδÃ÷ȷй¶Êý¾ÝÀàÐÍ¡£Ä¿Ç° £¬Õâ´ÎÊý¾Ýй¶µÄÁìÓòºÍÊÜÓ°ÏìÈËÊý²»Ã÷ £¬µ«¼øÓÚ¹«Ë¾ÖØ´óµÄÔËÓª¹æÄ£ºÍÖÎÀíµÄº£Á¿Ãô¸ÐÊý¾Ý £¬µ£±í¸ÐÇéδÃâ¡£ÔÚÖÂÊÜÓ°ÏìÓû§µÄÐź¯ÖÐ £¬LegendsInternational°µÊ¾ÊÂÎñǰÒѲÉÈ¡°²È«´ëÊ© £¬ÏµÍ³¸´Ô­ºóÒ²Ö´ÐÐÁ˶î±í´ëÊ© £¬µ«Î´Ìṩ¾ßÌåϸ½Ú¡£º¯¼þÊÕ¼þÈË¿Éͨ¹ýExperian»ñµÃ24¸öÔµÄÉí·Ý͵ÇÔ¼ì²â·þÎñ±£ÏÕ £¬ÐèÔÚ2025Äê7ÔÂ31ÈÕǰע²á¡£¹«Ë¾³ÆÎ´·¢ÏÖÓ×ÎÒÐÅÏ¢±»ÀÄÓõÄÖ¤¾Ý £¬µ«½¨ÒéÓû§Î¬³Ö¾¯Ìè¡£


https://www.bleepingcomputer.com/news/security/entertainment-services-giant-legends-international-discloses-data-breach/


5. INCRansomÀÕË÷Èí¼þ¹¥»÷ºó £¬AholdDelhaizeÈ·ÈÏÊý¾Ý±»µÁ


4ÔÂ17ÈÕ £¬°¢»ôµÂµÂ¶ûº£×È(AholdDelhaize)ÊÇ¿ç¹úÁãÊÛºÍÅú·¢¾ÞÍ· £¬ÔÚÅ·ÃÀ¾­Óª½ü8000¼ÒÉ̵ê £¬Õ¼Óг¬41ÍòÃûÔ±¹¤ £¬ÄêÊÕÈëÔ¼1000ÒÚÃÀÔª £¬ÔÚÃÀ¹ú¾­ÓªFoodLionµÈÆ·ÅÆ¡£2024Äê11Ô £¬¸Ã¹«Ë¾¹«¿ªÅûÂ¶ÍøÂ簲ȫÊÂÎñ £¬²¢¹Ø¹ØITϵͳ±£»¤¡£Æä³ÆÎÊÌâ¼°»º½â´ëÊ©ÒÑÓ°ÏìÃÀ¹úÄ³Ð©Æ·ÅÆºÍ·þÎñ £¬Ô̺¬²¿ÃÅÒ©µêºÍµçóÒ×Îñ¡£×òÈÕ £¬ÀÕË÷Èí¼þ×éÖ¯INCRansom½«AholdDelhaizeÔö³¤ÖÁÆä°µÍøÊý¾ÝÐÂäįÕË÷ÍøÕ¾ £¬²¢°ä²¼ÒÉËÆÇÔÈ¡µÄÎļþÑù±¾¡£AholdDelhaize½²»°ÈË֤ʵÊý¾Ýй¶ £¬µ«Î´ÆÀÂÛÀÕË÷Èí¼þÊÇ·ñ²Î¼ÓÕâ´Î¹¥»÷¡£Ä¿Ç° £¬¸Ã¹«Ë¾¶ÔÊÂÎñµÄµ÷²éÈÔÔÚ½øÐÐÖÐ £¬ÈôÈ·ÈϿͻ§Êý¾ÝÊÜÓ°Ïì £¬½«Í¨ÖªÓйØÈËÔ±¡£Í¬Ê± £¬ÆäËùÓÐÉ̵êºÍµçÉÌ·þÎñÈÔÕý³£ÔËÓª £¬¹Ë¿Í²»ÊÜÓ°Ïì¡£


https://www.bleepingcomputer.com/news/security/ahold-delhaize-confirms-data-theft-after-inc-ransomware-claims-attack/


6. CISAÖÒ¸æOracle´«Í³ÔÆ·þÎñÆ÷ÔâÈëÇÖ¼Ó¾çÆ¾Ö¤Ð¹Â¶·çÏÕ


4ÔÂ17ÈÕ £¬CISA·¢³öÖÒ¸æ £¬½ñÄêÔçЩʱ³½Oracle´«Í³ÔÆ·þÎñÆ÷ÔâÈëÇÖºó £¬Î¥¹æ·çÏÕ¼Ó¾ç £¬ÆóÒµÍøÂçÃæ¶Ô³Á´óÍþв¡£CISAÖ¸³ö £¬Ëù»ã±¨»î¶¯¶Ô×éÖ¯ºÍÓ×ÎÒ×é³ÉDZÔÚ·çÏÕ £¬Æ¾Ö¤×ÊÁÏ¿ÉÄÜй¶¡¢³Á¸´Ê¹ÓûòǶÈëϵͳ £¬ËäÆäÁìÓòºÍÓ°ÏìÉÐδ֤ʵ £¬µ«Æ¾Ö¤×ÊÁÏÒ»µ©Ç¶Èë¾ÍÄÑÒÔ·¢ÏÖ £¬Â¶³öºó»òÖ³־Ãδ¾­ÊÚȨ½Ó¼û £¬¶ÔÆóÒµ»·¾³×é³É³Á´ó·çÏÕ¡£Îª´Ë £¬CISA°ä²¼Ö¸ÄÏ £¬¶½´ÙÍøÂç·ÀÓùÕß³ÁÖÃÊÜÓ°ÏìÓû§ÃÜÂë £¬´úÌæÓ²±àÂë»òǶÈëʽƾ֤ £¬Ö´ÐзÀÍøÂç´¹µöµÄ¶à³É·ÖÉí·ÝÑéÖ¤ £¬²¢¼à¿ØÉí·ÝÑéÖ¤ÈÕÖ¾¡£´Ëǰ £¬¼×¹ÇÎÄÈ·ÈÏÒ»ÃûÍþвÐÐΪÕßй¶ÁË´Ó¡°Á½Ì¨¹ýÆÚµÄ·þÎñÆ÷¡±ÖÐÇÔÈ¡µÄƾ֤ £¬²»ÍâÆäÔÆ·þÎñÆ÷δÊܹ¥»÷ £¬ÊÂÎñδӰÏìÔÆ·þÎñ»ò¿Í»§Êý¾Ý¡£¹¥»÷ÕßÇÔÈ¡Á˾ɿͻ§Æ¾Ö¤ £¬²¢ÔÚBreachForumsÉϰ䲼2025Äê¸üмͼ £¬ÓëýÌå¹²Ïí2024Äêµ×Êý¾Ý £¬ÇÒй¶Êý¾ÝÑù±¾¾­¶àλOracle¿Í»§È·ÈÏÓÐЧ¡£3Ôµ× £¬CybelAngelй©Oracle·î¸æ¿Í»§ £¬ÔçÔÚ2025Äê1Ô £¬¹¥»÷Õß¾ÍÔÚ²¿ÃÅGen1·þÎñÆ÷Éϲ¿ÊðÁËWebShellºÍÆäËû¶ñÒâÈí¼þ £¬Ö±ÖÁ2Ôµ׷¢ÏÖ·ì϶ £¬¹¥»÷Õß´ÓOracleIdentityManagerÊý¾Ý¿âÖÐÇÔÈ¡ÁËÊý¾Ý¡£´Ë±í £¬ÉϸöÔÂýÌ屨·³Æ¼×¹ÇÎĽ¡È«¹«Ë¾1Ô·ÝÒ²²úÉúÊý¾Ýй¶ÊÂÎñ £¬Ó°Ïì¶à¼ÒÃÀ¹úÒ½ÁÆ»ú¹¹ºÍÒ½ÔºµÄ»¼ÕßÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-increased-breach-risks-following-oracle-cloud-leak/