SynnovisÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷ÖÂNHS»¼ÕßÊý¾Ýй¶

°ä²¼¹¦·ò 2025-11-14

1. SynnovisÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷ÖÂNHS»¼ÕßÊý¾Ýй¶


11ÔÂ12ÈÕ£¬Ó¢¹ú²¡Àí·þÎñÌṩÉÌSynnovisÓÚ2024Äê6ÔÂÔâ·ê÷è÷ëÀÕË÷Èí¼þÍŻ﹥»÷£¬µ¼Ö²¿ÃÅ»¼ÕßÊý¾Ý±»µÁ£¬Éæ¼°NHSºÅÂë¡¢ÐÕÃû¡¢µ®ÉúÈÕÆÚ¼°²¿ÃÅ¿ÉÆ¥ÅäµÄ¼ì²âÁ˾Ö¡£¸Ã¹«Ë¾³ÉÁ¢ÓÚ2021Ä꣬Óɹú¼ÊÒ½ÁÆÕï¶ÏÉÌSYNLABÓë¸ÇÒÁºÍÊ¥ÍÐÂí˹NHS»ù½ð»áÐÅÍÓ×¢¹úÍõѧԺҽԺNHS»ù½ð»áÐÅÈκÏ×÷ÔËÓª£¬ÎªÔ̺¬NHSÔÚÄÚµÄÓ¢¹úÒ½ÁÆ»ú¹¹Ìṩ²¡Àí·þÎñ¡£Õâ´Î¹¥»÷Ôì³ÉÂ׶ضà¼ÒNHSÒ½ÔºÔËÓªÑϳÁÅö±Ú£¬Ô̺¬¹úÍõѧԺҽԺ¡¢Ê¥ÍÐÂí˹ҽԺµÈ£¬µ¼Ö·Ǵ¹Î£²¡Àí²é³­Ô¤Ô¼ºÍÊäѪ·þÎñÈ¡µÞ»òÑÓ³¤£¬Òý·¢ÑªÒºÇ·È±£¬³¬800ÀýÊÖÊõºÍ700ÀýÃÅÕïÔ¤Ô¼±»ÆÈÈ¡µÞ¡£¹¥»÷ÕßÔøÓÚ2024Äê6ÔÂ20ÈÕй¶²¿ÃÅÊý¾Ý£¬´ÙʹSynnovisÏòÓ¢¹úÐÅϢרԱ°ì¹«Êһ㱨²¢»ñ˾·¨½ûÁ²»ÈݽøÒ»²½Ê¹Óñ»µÁÊý¾Ý¡£Êý¾Ýµ÷²éÀúʱһÄê¶à£¬ÓÉ·¨Ö¤×¨¼ÒÍŶÓʵÏÖ£¬ÒòÊý¾Ý½á¹¹»ìÂÒ¡¢²»ÆëÈ«ÇÒÁãÉ¢£¬Ð趨Ô컯Á÷³Ì´¦Öá£Synnovis°µÊ¾£¬´ó²¿Ãű»µÁÐÅÏ¢ÐèÁÙ´²ÖªÊ¶»ò²¹³äÐÅÏ¢ÄÜÁ¦½â¶Á£¬Ä¿Ç°ÒÑÆô¶¯ÊÜÓ°Ïì»ú¹¹Í¨Öª·¨Ê½£¬Ô¤¼Æ2025Äê11ÔÂ21ÈÕʵÏÖ£¬µ«²»»áÖ±½ÓÁªÏµ»¼Õߣ¬ÓÉNHS»ú¹¹Õƹܻ¼Õß֪ͨ¡£


https://www.bleepingcomputer.com/news/security/synnovis-notifies-of-data-breach-after-2024-ransomware-attack/


2. CISA½«WatchGuard Fireware·ì϶ÄÉÈëÒÑÖªÀûÓÃĿ¼


11ÔÂ13ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÓÚÖÜÈý½«Ó°ÏìWatchGuard FirewareµÄCVE-2025-9242ÑϳÁ·ì϶Ôö³¤ÖÁÆäÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬¸Ã·ì϶Òѱ»Ö¤ÊµÔâµ½»ý¼«ÀûÓá£CVE-2025-9242ΪԽ½çдÈë·ì϶£¬CVSSÆÀ·Ö¸ß´ï9.3£¬Ó°ÏìFireware OS 11.10.2ÖÁ11.12.4_Update1¡¢12.0ÖÁ12.11.3¼°2025.1°æ±¾¡£¾ÝCISA²¼¸æ£¬¸Ã·ì϶ÔÊÐíÔ¶³ÌδÊÚȨ¹¥»÷ÕßÔÚ²Ù×÷ϵͳÓйعý³ÌÖÐÖ´ÐÐËÁÒâ´úÂ룬ÍþвÐÔ¼«¸ß¡£·ì϶±¾Ô­ÔÚÓÚIKEÎÕÊÖ¹ý³ÌÖÐÉí·Ý»º³åÇø²»×㳤¶È²é³­£¬ÇÒÖ¤ÊéÑéÖ¤ÔÚÒ×Êܹ¥»÷´úÂëÖ´Ðкó²Å½øÐУ¬µ¼Ö¹¥»÷Õß¿ÉÈÆ¹ýÈÏÖ¤Ö±½Ó´¥·¢·ì϶¡£°²È«×êÑÐÔ±McCaulay HudsonÖ¸³ö£¬ÕâÖÖÉè¼ÆÈ±µãʹ¹¥»÷õè¾¶ÔÚÉí·ÝÑé֤ǰ¼´¿É±»ÀûÓ᣽ØÖÁ2025Äê11ÔÂ12ÈÕ£¬È«ÇòÈÔÓг¬¹ý54,300¸öFireboxÉ豸´æÔÚ´Ë·ì϶£¬½Ï10ÔÂ19ÈÕµÄ75,955̨ÓÐËù½µÂä¡£ÆäÖУ¬ÃÀ¹úÒÔ18,500̨¾ÓÊ×£¬Òâ´óÀû£¨5,400̨£©¡¢Ó¢¹ú£¨4,000̨£©¡¢µÂ¹ú£¨3,600̨£©ºÍ¼ÓÄôó£¨3,000̨£©Î»ÁÐǰÎå¡£Áª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©ÒªÇó¸÷»ú¹¹ÔÚ2025Äê12ÔÂ3ÈÕǰʵÏÖWatchGuard²¹¶¡×°Öá£


https://thehackernews.com/2025/11/cisa-flags-critical-watchguard-fireware.html


3. ¹ú¼Ê½áºÏÐж¯¡°ÖÕ¾ÖÐж¯¡±³Á´´¶ñÒâÈí¼þ


11ÔÂ10ÈÕÖÁ14ÈÕ£¬ÓÉÅ·ÖÞÐ̾¯×éÖ¯ºÍÅ·ÖÞ˾·¨×é֯Эµ÷¡¢¾Å¹ú·¨Âɲ¿ÃŽáºÏ·¢Õ¹µÄ¡°ÖÕ¾ÖÐж¯¡±×îн׶λñµÃÍ»ÆÆÐԳɾÍ£¬·ÛËé1025̨ÓÃÓÚRhadamanthysÐÅÏ¢ÇÔÈ¡Æ÷¡¢VenomRAT¼°Elysium½©Ê¬ÍøÂçÔËÓªµÄ·þÎñÆ÷£¬²é·â20¸öÓòÃû£¬²¢ÔÚÏ£À°¿ÛÁôÒ»ÃûÓëVenomRATÓйصÄÏÓÒÉÈË¡£Õâ´ÎÐж¯µÃµ½Cryptolaemus¡¢ShadowserverµÈ12¼Ò¸öÈË»ú¹¹Ö§³Ö£¬Í¬²½½ø¹¥ÀÕË÷Èí¼þ¡¢AVCheckÍøÕ¾¼°SmokeloaderµÈ½©Ê¬ÍøÂç»ù´¡ÉèÊ©¡£¾ÝÅ·ÖÞÐ̾¯×éÖ¯Åû¶£¬±»·ÛËéµÄ¶ñÒâÈí¼þ»ù´¡ÉèÊ©Éæ¼°ÊýÊ®Íǫ̀ÊÜÏ°È¾ÍÆËã»ú£¬Ô̺¬Êý°ÙÍòÌõ±»µÁƾ֤¡£ÖØÒªÏÓÒÉÈ˿ɽӼû³¬10Íò¸ö¼ÓÃÜÇ®±ÒÇ®°ü£¬×ʲú¼ÛÖµ»ò´ïÊý°ÙÍòÅ·Ôª¡£ÎÞÊýÊܺ¦Õßδ¾õ²ìϵͳÒÑÔâÈëÇÖ¡£·¨ÂÉ»ú¹¹½¨Ò鹫¼Òͨ¹ýpolitie.nl/checkyourhackºÍhaveibeenpwned.comºË²éÊÇ·ñÊÜÓ°Ïì¡£Õâ´ÎÐж¯Ò»Á¬ÁË¡°ÖÕ¾ÖÐж¯¡±¶Ô¿ç¹úÍøÂç·¸×ïµÄ³ÖÐø½ø¹¥Ì¬ÊÆ¡£


https://www.bleepingcomputer.com/news/security/police-disrupts-rhadamanthys-venomrat-and-elysium-malware-operations/


4. AkiraÀÕË÷Èí¼þ¼ÓÃÜNutanixÐé¹¹»ú²¢À©´ó¹¥»÷ÄÜÁ¦


11ÔÂ13ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©¡¢Áª¹úµ÷²é¾Ö£¨FBI£©µÈ»ú¹¹½áºÏ°ä²¼²¼¸æ£¬Ö¸³öAkiraÀÕË÷Èí¼þÒÑÀ©´ó¼ÓÃÜÄÜÁ¦ÖÁNutanix AHVÐé¹¹»ú´ÅÅÌÎļþ£¬²¢Åû¶×îй¥»÷ϸ½Ú¡£¸ÃÀÕË÷Èí¼þ×Ô2025Äê6ÔÂÆðÆðÍ·Õë¶ÔNutanix AHVƽ̨µÄ.qcow2ÌåʽÐé¹¹´ÅÅÌÎļþÖ´ÐмÓÃÜ£¬Í¨¹ýÀÄÓÃSonicWall·ì϶£¨CVE-2024-40766£©Í»ÆÆ½Ó¼û½ÚÔ죬½«¹¥»÷ÁìÓò´ÓVMware ESXiºÍHyper-VÀ©´óÖÁNutanix AHV¡£Nutanix AHV×÷Ϊ»ùÓÚLinuxµÄÐé¹¹»¯½â¾ö¹æ»®£¬Æä¿í·º²¿ÊðʹÆä³ÉΪÀÕË÷Èí¼þÍÅ»ïµÄÐÂÖ¸±ê£¬ÀàËÆ´Ëǰ¶ÔVMware ESXiºÍHyper-VµÄ¹¥»÷ģʽ¡£¹¥»÷Õßͨ³£ÀûÓö³öÉ豸µÄVPN/SSHÍ´´¦»ò·À»ðǽ·ì϶£¨ÈçCVE-2024-40766£©ÈëÇÔìóÒµÍøÂç£¬Ëæºóͨ¹ý佨²¹µÄVeeam±¸·Ý·þÎñÆ÷·ì϶£¨CVE-2023-27532¡¢CVE-2024-40711£©É¾³ý±¸·ÝÊý¾Ý¡£ÔÚÉøÈëºó£¬¹¥»÷ÕßʹÓÃnltest¡¢AnyDesk¡¢LogMeIn¡¢ImpacketµÈ¹¤¾ß½øÐпúËźͺáÏòÒÆ¶¯£¬´´½¨ÖÎÀíÕË»§ÊµÏÖÓÆ¾Ã»¯£¬²¢ÒƳý¶Ëµã¼ì²â¹¤¾ßÒÔ¶ã±Ü·ÀÓù¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-akira-ransomware-linux-encryptor-targeting-nutanix-vms/


5. npm¡°IndonesianFoods¡±È䳿£¬Ãë¼¶×Ô´«²¼Íò°ü³å»÷¹©¸øÁ´


11ÔÂ13ÈÕ£¬npm×¢²á±íÔâ·êÃûΪ¡°IndonesianFoods¡±µÄ×Ô´«²¼È䳿¹¥»÷£¬¸ÃÈä³æÃ¿ÆßÃë×Ô¶¯ÌìÉúÐÂÈí¼þ°ü£¬ÒÑÀۼư䲼³¬10Íò¸öÓ¡ÄáÓﶨÃû£¨Èç¡°fajar-donat9-breki¡±£©µÄÀ¬»ø°ü£¬ÇÒÊýÁ¿³ÊÖ¸Êý¼¶Ôö³¤¡£¾ÝSonatype·ÖÎö£¬¹¥»÷Õßͨ¹ý¸ß×Ô¶¯»¯¾ç±¾³ÖÐøºäÕ¨¿ªÔ´Éú̬ϵͳ£¬Ë䵱ǰ°üÌå맪¶ñÒâ×é¼þ£¬µ«½«À´¿ÉÄÜǶÈëÊý¾ÝÇÔÈ¡»òºóÃÅ·¨Ê½£¬×é³ÉDZÔÚÍþв¡£Õâ´Î¹¥»÷³öÏÖÈý´óÌØµã£ºÒ»ÊǹæÄ£»¯·ÛË飬µ¥ÈÕ´¥·¢ÑÇÂíÑ··ì϶¼ì²â¹¤¾ßÌìÉú7.2ÍòÌõ·ì϶»ã±¨£¬¶à¸ö°²ÕûϵͳÒòÊý¾Ý´óË®±ôÁÙ̱»¾£»¶þÊǾ­¼Ã¶¯»úÏÔÖø£¬¹¥»÷ÕßÀûÓÃTEAÇø¿éÁ´ºÍ̸£¬ÔÚ°üÖÐǶÈëtea.yamlÎļþ¹ØÁª´ú±ÒÇ®°ü£¬Í¨¹ý¿ä´ó°ü¼ä¹ØÁª¶ÈÌáÉýÓ°Ïì·ÖÊýÒÔ׬ȡ´ú±ÒÊÕÒæ£»ÈýÊǺ¹ÇàÑݽøÇ峺£¬×Ô2023ÄêÆðÒÑÀۼư䲼4.3Íò°ü£¬2024ÄêÒýÈëTEAÇ®±Ò»¯»úÔ죬2025ÄêÉý¼¶ÎªÈä³æÊ½¸´ÔìÑ­»·¡£


https://www.bleepingcomputer.com/news/security/new-indonesianfoods-worm-floods-npm-with-100-000-packages/


6. ¡¶»ªÊ¢¶ÙÓʱ¨¡·Êý¾Ýй¶ÊÂÎñÓ°Ïì½üÍòÃûÔ±¹¤ºÍ³Ð°üÉÌ


11ÔÂ13ÈÕ£¬¡¶»ªÊ¢¶ÙÓʱ¨¡·½üÈÕ֪ͨԼ9720ÃûÔ±¹¤¼°³Ð°üÉÌ£¬ÆäÓ×ÎҺͲÆÕþÊý¾ÝÔÚOracle E-Business SuiteÁãÈÕ·ì϶¹¥»÷ÖÐÔâй¶¡£Õâ´ÎÊÂÎñ²úÉúÓÚ2025Äê7ÔÂ10ÈÕÖÁ8ÔÂ22ÈÕ£¬¹¥»÷ÕßÀûÓøÃERPƽ̨µÄÈËÁ¦×ÊÔ´¡¢²ÆÕþºÍ¹©¸øÁ´ÖÎÀíÖ°ÄÜÖеÄ佨²¹·ì϶£¨ºó±»×·×ÙΪCVE-2025-61884£©£¬ÇÔÈ¡ÁËÔ̺¬È«Ãû¡¢ÒøÐÐÕ˺š¢Â·ÓɺÅÂë¡¢Éç»á°²È«ºÅÂ루SSN£©¡¢Ë°Îñ¼°Éí·ÝÖ¤ºÅÂëµÈÃô¸ÐÐÅÏ¢¡£9ÔÂÏÂÑ®£¬ºÚ¿ÍÊÔͼÒÔ´ËÀÕË÷¸Ã±¨£¬¶ø¼×¹ÇÎĹ«Ë¾ÔÚµ÷²éÆÚ¼äÅû¶ÁËÕâÒ»¿í·º´æÔڵݲȫ·ì϶¡£×÷ΪÃÀ¹ú¿¯ÐÐÁ¿×î´óµÄÈÕ±¨Ö®Ò»£¬¡¶»ªÊ¢¶ÙÓʱ¨¡·Õ¼ÓÐÔ¼250ÍòÊý×Ö¶©ÔÄÓû§¡£ÀûÓÃͳһ·ì϶µÄÊܺ¦Õß»¹Ô̺¬¹þ·ð´óѧ¡¢ÃÀ¹úº½¿Õ×Ó¹«Ë¾Envoy Air¼°ÈÕÁ¢ÆìÏÂGlobalLogicµÈ»ú¹¹¡£ClopÀÕË÷Èí¼þ×éÖ¯±»Ö¸ÓëÕâЩ¹¥»÷ÓйØ£¬ÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÁгöÁ˸ü¶àÊÜÓ°Ïì×éÖ¯¡£¡¶»ªÊ¢¶ÙÓʱ¨¡·µÄµ÷²éÓÚ10ÔÂ27ÈÕʵÏÖ£¬È·ÈÏÊý¾Ýй¶ºó£¬ÊÜÓ°ÏìÓ×ÎÒͨ¹ýIDX»ñµÃ12¸öÔÂÃâ·ÑÉí·Ý±£»¤·þÎñ£¬²¢±»½¨Òé¶³½áÐÅÓþµµ°¸¼°ÉèÖÃڲƭ¾¯±¨¡£


https://www.bleepingcomputer.com/news/security/washington-post-data-breach-impacts-nearly-10k-employees-contractors/