MTN¼¯ÍÅÔâÍøÂ簲ȫÊÂÎñÖÂÓû§ÐÅϢй¶
°ä²¼¹¦·ò 2025-04-271. MTN¼¯ÍÅÔâÍøÂ簲ȫÊÂÎñÖÂÓû§ÐÅϢй¶
4ÔÂ25ÈÕ£¬·ÇÖÞÒÆ¶¯¾ÞÍ·MTN¼¯ÍÅ£¨Ç°ÉíΪM-Cell£©Ôâ·êÍøÂ簲ȫÊÂÎñ£¬²¿ÃŹú¶ÈÓû§Ó×ÎÒÐÅÏ¢Ôâй¶¡£MTN¼¯Íų¤¶ÌÖÞ×î´óµÄÒÆ¶¯ÍøÂçÔËÓªÉÌ£¬ÒµÎñ¸²¸Ç20¸ö¹ú¶È£¬Õ¼Óнü3ÒÚÓû§£¬ÄêÊÕÈ볬110ÒÚÃÀÔª£¬ÇÒÔÚÑÇÖÞÊг¡Ó°ÏìÁ¦×³´ó¡£Õâ´ÎÊÂÎñÖУ¬MTN¼¯ÍÅÇ¿µ÷ÆäÖ÷ÌâÍøÂç¡¢¼Æ·ÑϵͳºÍ½ðÈÚ·þÎñ»ù´¡ÉèʩδÊܹ¥»÷Ó°Ï죬ÈÔ°²È«ÇÒÈ«ÃæÔËÐУ¬µ«ÒÑ×ÅÊÖµ÷²éÒÔÃ÷È·ÊÂÎñ¼òÖ±ÇÐÁìÓòºÍÓ°Ïì¡£MTN¼¯ÍŲ¼¸æ³Æ£¬ÓÓװδ֪µÚÈý·½¡±Ðû³Æ½Ó¼ûÁ˹«Ë¾Êý¾Ý£¬µ¼Ö²¿ÃÅÊг¡²¿Ãſͻ§µÄÓ×ÎÒÐÅÏ¢±»Î´¾ÊÚȨ½Ó¼û¡£²»Í⣬MTNµÄµ÷²éÉÐδ֤ʵ¿Í»§Ç®°üºÍÕË»§Êܵ½ÇÖº¦£¬¾ßÌå¶³öÐÅÏ¢Éв»Ã÷È·¡£ÊÂÎñ²úÉúºó£¬MTN¼¯ÍÅѸ¿ì²ÉÈ¡Ðж¯£¬ÒÑ֪ͨÄϷǾ¯·½¼°Óйؼà¹ÜºÍÊý¾Ý±£»¤»ú¹¹ÐÖúµ÷²é£¬²¢´òË㾡¿ì֪ͨÊÜÓ°ÏìµÄ¿Í»§¡£Îª±£»¤¿Í»§ÃâÊܽøÒ»²½¹¥»÷£¬MTN¼¯ÍÅÌá³öһϵÁн¨Ò飬Ô̺¬ÉèÖÃڲƾ¯±¨¡¢¸üÐÂÀûÓ÷¨Ê½¡¢Ê¹ÓÃÇ¿ÃÜÂë¡¢Ô¤·À¿ÉÒÉÁ´½Ó²¢ÆôÓöà³É·ÖÉí·ÝÑéÖ¤¡£½ØÖÁĿǰ£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯¶Ô´ËÕÆ¹Ü¡£
https://www.bleepingcomputer.com/news/security/mobile-provider-mtn-says-cyberattack-compromised-customer-data/
2. SAP NetWeaverÑϳÁ·ì϶CVE-2025-31324Õý±»»ý¼«ÀûÓÃ
4ÔÂ26ÈÕ£¬SAP NetWeaver Visual Composer´æÔÚÑϳÁ·ì϶CVE-2025-31324£¬Ê¹ÏµÍ³Ãæ¶ÔÆëÈ«ÈëÇÖ·çÏÕ¡£Onapsis Threat Intelligence»ã±¨ÏÔʾ£¬¸Ã·ì϶ÑϳÁˮƽÆÀ·ÖΪÂú·Ö10.0£¬Ô´ÓÚϵͳ¶ÌȱÑéÖ¤Óû§È¨Ï޵IJé³ÇÒÕý±»»ý¼«ÀûÓá£×êÑÐÅú×¢£¬ÏÖÓÐSAP NetWeaverÀûÓ÷þÎñÆ÷JavaϵͳÖÐ50%µ½70%´æÔÚ´Ë·ì϶¡£¸Ã·ì϶ÓÉReliaQuest³õ´Î¼Í¼£¬´æÔÚÓÚdevelopmentserver SAP Visual ComposerµÄÌØ¶¨²¿ÃÅ£¬¶øSAP Visual ComposerÊÇSAP NetWeaver 7.xxµÄ×é¼þ£¬Ö¼ÔÚÎÞÐè´úÂë´´½¨ÒµÎñ¹¤¾ß¡£ÎÊÌâÔÚÓÚϵͳδÕýÈ·²é³½Ó¼ûÔªÊý¾ÝÉÏ´«Æ÷Ö°ÄܵÄÓû§È¨ÏÞ£¬²»×ãÊʵ±Éí·ÝÑéÖ¤ºÍÊÚȨ£¬Ê¹Î´µÇ¼Óû§Ò²ÄܽӼû׳´óÖ°ÄÜ¡£4ÔÂ22ÈÕ£¬ReliaQuestÔÚÒѽ¨²¹·þÎñÆ÷ÉÏ·¢ÏÖ¿ÉÒɻ£¬SAPͬÈÕÈÏ¿ÉÔÚJavaϵͳÖз¢ÏÖÒì³£Îļþ¡£4ÔÂ24ÈÕ£¬SAP°ä²¼³£¼ûÎÊÌâ½â´ðÎĵµ£¬È·ÈÏÌØ¶¨Îļþ¼ÐÖÐÌØ¶¨À©´óÃûÎļþºÜ¿ÉÄÜÊǶñÒâÎļþ£¬²¢Õýʽ°ä²¼¸Ã·ì϶£¬Ö¸³öÆäµ××ÓÔÒòÊǶÌȱÊÚȨ²é³£¬µ¼ÖÂδ¾ÊÚȨÓû§ÉÏ´«Î£ÏÕ¿ÉÖ´ÐÐÎļþ£¬ÀûÓú󽫴øÀ´ÏµÍ³ÊÕÊܳÁ´ó·çÏÕ£¬SAPÒѰ䲼NetWeaver´ø±í´¹Î£¸üС£
https://hackread.com/sap-netweaver-flaw-severity-hackers-deploy-web-shells/
3. Microsoft DefenderÎóÅÐÖ³¬1700·ÝÃô¸ÐÎļþ¹«¿ª
4ÔÂ25ÈÕ£¬½üÈÕ£¬ÒòMicrosoft Defender³öÏÖÎóÅУ¬µ¼Ö³¬¹ý1700·ÝÃô¸ÐÎļþͨ¹ýANY.RUNƽ̨±»ÎÞÒâÖй«¿ª¹²Ïí¡£ANY.RUN×÷Ϊ½»»¥Ê½ÔÚÏßɳÏ䣬±¾ÒâÊÇÈÃÓû§ÔÚÊܿػ·¾³ÖзÖÎö¼ì²â¶ñÒâÈí¼þ£¬µ«ÆäÃ÷È·ÖÒ¸æÃâ·Ñ´òËãÓû§£¬ÉÏ´«µ½¸Ãƽ̨µÄÎļþ¾ùΪ¹«¿ª×´Ì¬¡£ANY.RUNÔÚÉêÃ÷ÖÐÖ¸³ö£¬·¢ÏÖ´óÁ¿Adobe Acrobat CloudÁ´½Ó±»ÉÏ´«ÖÁɳºÐ£¬¾×êÑУ¬ÊÇMicrosoft Defender XDRÃýÎ󵨽«¡°acrobat[.]adobe[.]com/id/urn:aaid:sc:¡±ÏóÕ÷Ϊ¶ñÒâÎļþ¡£ÕâÒ»ÎóÅÐÒÔÖÁÃâ·Ñ´òËãÓû§ÉÏ´«ÁËÔ̺¬Êý°Ù¼Ò¹«Ë¾Ãô¸ÐÊý¾ÝµÄAdobeÎļþ£¬ÓÃÓÚ¹«¿ªÄ£Ê½·ÖÎö¡£Ö»¹ÜANY.RUNËæºó½«ËùÓÐÓйطÖÎöÉèΪ˽ÃÜ£¬ÒÔÔ¤·À½øÒ»²½Ð¹Â¶£¬µ«ÈÔÓÐЧ»§×ÔÐй«¿ª·ÖÏí»úÃÜÎļþ¡£ANY.RUNΪ´ËÖÒ¸æÓû§£¬Ö´Ðй¤×÷Óйع¤×÷ʱӦʹÓÃóÒ×Ðí¿ÉÖ¤£¬ÒÔ±£ÏÕÒþÖÔÓëºÏ¹æÐÔ¡£Õâ´ÎÊÂÎñÖУ¬½öͨ¹ýANY.RUNƽ̨¾ÍÓг¬1700·Ý¸öÈËÃô¸ÐÎļþ±»¹«¿ª¡£ÆäËû¶ñÒâÈí¼þ·ÖÎöƽ̨ÈçVirusTotalͬÑù´æÔÚÀàËÆ·çÏÕ£¬ÔÊÐíÓû§ÉÏ´«¿ÉÒÉÎļþ¿ÉÄܵ¼ÖÂÎļþÎÞÒâй¶¡£
https://cybernews.com/security/anyrun-users-leak-sensitive-data-after-microsoft-defender-misfire/
4. Ç×¶íºÚ¿ÍNoName¶ÔµÂ¹ú·¢ÆðDDoS¹¥»÷
4ÔÂ25ÈÕ£¬³öÓÚÕþÖζ¯»úµÄÇ×¶íºÚ¿Í×éÖ¯Noname057(16)Õý¼Ó´ó¶ÔµÂ¹ú×éÖ¯µÄÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷Á¦¶È£¬¸øµÂ¹ú¶àÁìÓò´øÀ´ÍøÂ簲ȫÍþв¡£¸Ã×éÖ¯Óë¶íÂÞ˹½áÃË£¬Ðû³ÆÒѶԵ¹ú¶à¼Ò³ÁÒª»ú¹¹ºÍÆóÒµÍøÕ¾·¢Æð¹¥»÷£¬Êܹ¥»÷¶ÔÏóº¸Ç½ðÈÚ¡¢Å©Òµ¡¢Ôì×÷ÒµµÈ¶à¸öÐÐÒµ£¬Ô̺¬µÂ¹ú´óÐ͹úÓÐÒøÐаͷ¥ÀûÑÇÖÝÒøÐÓעȫÇòÐÔÆóÒµBayWa AG¡¢»ú³¡°à³µÔì×÷ÉÌCOBUS IndustriesÒÔ¼°ÂÁºÏ½ð³ö²úÉÌAluminium Rheinfelden AlloysµÈ£¬»¹ÔÚTelegramÉÏÐû³ÆÕâЩ×éÖ¯ÍøÕ¾Òѱ»ÏÂÏß¡£¾Ýgolem.de±¨Â·£¬Noname057(16)Õâ´ÎÇ¿»¯¶ÔµÂ¹¥»÷£¬¿ÉÄÜÊǶԼ´½«ÉÏÈεĵ¹ú×ÜÀí¸¥ÀïµÂÀïÏ£¡¤Ã·¶û´Ä´òËãÏòÎÚ¿ËÀ¼Ìṩ½ðÅ£×ùѲº½µ¼µ¯µÄ»ØÓ¦¡£±¾µØÃ½Ìå½øÒ»²½Åû¶£¬¸Ã×éÖ¯¹¥»÷ÁìÓò²»½öÏÞÓÚÆóÒµ£¬»¹Éæ¼°ººÅµÍþ¡¢¶ÅÈû¶û¶à·ò¡¢À³±ÈÎý¡¢°ØÁÖ¡¢·¨À¼¿Ë¸£ºÍ¿ÆÂ¡µÈ¶à¸ö³ÇÊеÄÊе±¾ÖÍøÕ¾£¬²¢ÊÔͼ¶Ô¹«¹²Æû³µ¡¢µÂ¹úóÒ×ÒøÐÓ×¢Baywa¡¢Å·Ë¾ÀÊ¡¢µÂ¹úÖÐÑëºÏ×÷ÒøÐеȴóÐ͹«Ë¾ÍøÕ¾ÌáÒé¹¥»÷¡£
https://cybernews.com/security/noname-launch-ddos-attacks-in-germany/
5. AnubisÀÕË÷ÍÅ»ïÐû³Æ½Ù³Ö7ÒÚ¿¨ÍаÍË«Íõ¶Ä³¡À¶Í¼
4ÔÂ24ÈÕ£¬Ò»¸öÃûΪ¡°Anubis¡±µÄÀÕË÷Èí¼þÍÅ»ïÐû³Æ½Ù³ÖÁ˺Ä×Ê7ÒÚÃÀÔªµÄ¿¨ÍаÍË«Íõ¶Ä³¡¶È¼Ù´åÀ¶Í¼£¬ÈôÊÇÊôʵ£¬Æä°ÑÎÕµÄÐÅÏ¢¿ÉÄܱȶij¡½¨ÔìÕ߸üÏ꾡¡£¸Ã¶È¼Ù´åλÓÚ±±¿¨ÂÞÀ´ÄÉÖݹúÍõɽ£¬ÓÉ¿¨ÍаÍÓ¡µÚ°²²¿Â俪·¢£¬2024Äê6ÔÂÆÆÍÁ¶¯¹¤£¬Ô¤¼Æ2026ÄêÊ¢¿ª£¬¿¢¹¤ºó½«½¨Éè´óÁ¿ÀÏ»¢»ú¡¢¶Ä×À¼°¾Æµê¿Í·¿£¬Ä¿Ç°Ò»Ê±ÉèÊ©ÒÑÔËÓª¡£4ÔÂ23ÈÕ£¬AnubisÔÚ°µÍøÐ¹ÃÜÍøÕ¾°ä²¼Êê½ðÍþв£¬³ÆÕ¼Óжij¡¸÷ÇøÓò¾ßÌåÀ¶Í¼£¬Ô̺¬Ö÷Â¥²ã¡¢Í£³µ³¡¡¢¾Æµê´óÂ¥¼°ºó¶ÜÏÞ¶ÈÇøÓòµÈ£¬»¹°ÑÎÕ·þÎñÆ÷»ú·¿¡¢³ïÂë¿â¡¢Ï޶ȳöÈëÃÅ¡¢¼à¿ØÉãÏñÍ·¡¢Ô±¹¤ÉóÅÐÊÒ¼°·Öɢ·Ïß²¼¾ÖµÈ¹Ø¼üÐÅÏ¢£¬ÕâЩÊý¾Ý¿°³Æ¶Ä³¡Â°Âӵġ°È«Ì×¹¤¾ß¡±¡£´Ë±í£¬¸ÃÍŻﻹÐû³Æ»ñÈ¡Á˵ؼ®Êý¾Ý¡¢µØÕðÎļþºÍ˾·¨¼Í¼£¬ÕâÎÞÒÉ»á¸ø±¾¾Í³ä³âÕþÖÎÕùÒéµÄ¿ª·¢ÏîÄ¿´øÀ´¸ü¶àÂé·³¡£ÊÂʵÉÏ£¬ÔÚÀÕË÷Èí¼þÍÅ»ïȾָǰ£¬¸ÃÏîÄ¿¾ÍÒÑÉîÏÝÕùÒé¡£2022Ä꣬¹ú¶ÈÓ¡µÚ°²²©²ÊίԱ»áÖ¸¿Ø²¿ÂäÎ¥¹æÔËÓª¶Ä³¡²¢Íþв·£¿î£»2024Ä꣬ǰ¿ª·¢ºÏ×÷ͬ°éÌá¸æ×´ËÏ£¬Ö¸¿Ø²¿Âä·¸·¨ÇÖÈ뼰ŤתµØÆ¤Óô¦£»¶«²¿ÇÐÂÞ»ùÓ¡µÚ°²ÈËÒ²¶àÄêÀ´·ñ¾ö¸ÃÏîÄ¿¡£
https://cybernews.com/security/catawba-two-kings-casino-cyberattack/
6. ÐÂÐ͵çÁ¦¼ÄÉú³æ´¹µö¹¥»÷¶Ô×¼ÄÜÔ´¹«Ë¾ºÍÖØÒªÆ·ÅÆ
4ÔÂ26ÈÕ£¬×Ô2024ÄêÆð£¬Ò»³¡ÃûΪ¡°µçÁ¦¼ÄÉú³æ¡±µÄ¸´ÔÓÍøÂç´¹µö»î¶¯³ÖÐøÕë¶ÔÈ«ÇòÄÜÔ´¾ÞÍ·¼°ÖØÒªÆ·ÅÆ·¢Õ¹¹¥»÷¡£¸Ã»î¶¯ÖØÒªÀûÓÃÎ÷ÃÅ×ÓÄÜÔ´¡¢Ê©ÄÍµÂµçÆø¡¢·¨¹úµçÁ¦ÄÜÔ´¡¢ÀׯÕË÷¶û¹«Ë¾ºÍÉ¿ÆÄÜÔ´µÈ³ÛÃûÄÜÔ´¹«Ë¾µÄÆ·ÅÆ£¬Í¨¹ýͶ×ÊȦÌ×ÓëÐéα¹¤×÷»úÓöÖ´ÐÐÚ¿Æ¡£¹¥»÷Õß¹¹½¨ÁËÓÉ150¶à¸ö»îÔ¾ÓòÃû×é³ÉµÄÖØ´óÍøÂ磬¼Ù×°³ÉºÏ·¨¹«Ë¾£¬³Áµã¶Ô×¼ÃϼÓÀ¹ú¡¢Äá²´¶ûºÍÓ¡¶ÈµÈÑÇÖÞ¹ú¶ÈµÄÓ×ÎÒ¡£Ú¿Æ·Ö×Óͨ¹ýºýŪÐÔÍøÕ¾¡¢É罻ýÌåȺ×é¼°TelegramƵ·µÈÇþ·½Ó´¥Êܺ¦Õߣ¬²¢Ñ¡È¡Ó¢Óï¡¢ÆÏÌÑÑÀÓï¡¢Î÷°àÑÀÓï¡¢Ó¡ÄáÓï¡¢°¢À²®ÓïºÍÃϼÓÀÓïµÈ±¾µØ»¯ÄÚÈÝÌáÉýڿƳÉЧ¡£×êÑÐÏÔʾ£¬ÍþвÐÐΪÕßѡȡ¡°¹ãÈöÍø¡±Õ½Êõ£¬ÀÄÓöà¸öÆ·ÅÆÃû³Æ²¢²¿Êð¶à¸öÍøÕ¾ÒÔÀ©´óÊܺ¦ÕßÁìÓò¡£Æä»ù´¡ÉèÊ©·ÖÎöÅú×¢£¬¹¥»÷ÕßʹÓÃÔ̺¬¡°SE¡±£¨´ú±íÎ÷ÃÅ×ÓÄÜÔ´£©ºÍ¡°AMD¡±£¨´ú±í¸ß¼¶Î¢É豸£©µÈ¹Ø¼ü×ÖµÄÓòÃû£¬½áºÏ¶àÖÖÓòÃûºó׺´´½¨ÓòÃûģʽ¡£¸Ã»î¶¯Í¨¹ýÁ½ÖÖÉç»á¹¤³Ìѧ²½ÖèÖ´ÐÐÚ¿Æ£ºÍ¶×ÊڿƱäÌåÖУ¬Êܺ¦Õß±»ÐéαͶ×ÊÆ½Ì¨ÒԸ߻ر¨³ÐŵÒýÓÕ£¬ÕâЩƽ̨Ðû³ÆÓɳÛÃûÄÜÔ´¹«Ë¾Ö§³Ö£»ÇóְڿƱäÖÖÔòÒÔÐéα¾ÍÒµ»úÓöΪµö¶ü£¬ÒªÇóӦƸÕßÌṩÃô¸ÐÓ×ÎҺͲÆÕþÐÅÏ¢¡£
https://cybersecuritynews.com/new-power-parasites-phishing-attack/


¾©¹«Íø°²±¸11010802024551ºÅ