AkiraÀÕË÷Èí¼þÍÅ»ïÊ·ÎÞǰÀýÒ»ÈÕй¶35ÃûÊܺ¦ÕßÊý¾Ý

Ðû²¼Ê±¼ä 2024-11-20

1. AkiraÀÕË÷Èí¼þÍÅ»ïÊ·ÎÞǰÀýÒ»ÈÕй¶35ÃûÊܺ¦ÕßÊý¾Ý


11ÔÂ19ÈÕ£¬£¬£¬£¬ £¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïAkiraÔÚÒ»ÌìÄÚй¶ÁË´ó×ÚÊܺ¦ÕßÊý¾Ý£¬£¬£¬£¬ £¬£¬£¬ÊýÄ¿´´ÏÂÁ˼ͼ¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÊÇÒ»¸öÀÕË÷Èí¼þ¼´Ð§ÀÍÍŻ£¬£¬£¬ £¬£¬£¬ÔÚÍøÂç·¸·¨½çÔ½À´Ô½×ÅÃû¡£¡£¡£¡£¡£¡£¡£ËûÃÇͨ¹ýÇÔÈ¡ºÍ¼ÓÃÜÊý¾ÝÀ´ÀÕË÷Êܺ¦Õߣ¬£¬£¬£¬ £¬£¬£¬²¢ÔÚ°µÍøÐ¹ÃÜÍøÕ¾ÉÏÐû²¼Êܺ¦ÕßÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÖÜÒ»£¬£¬£¬£¬ £¬£¬£¬¸ÃÍÅ»ïµÄйÃÜÍøÕ¾ÐÂÔöÁË35ÃûÊܺ¦Õߣ¬£¬£¬£¬ £¬£¬£¬ÆäÖÐ32ÃûΪÐÂÊܺ¦Õß¡£¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬ £¬£¬£¬ÕâÊÇØ¨¹ÅδÓеĴó×Ú±»µÁ×ÊÁÏ¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÓÐÍÆ²âÒÔΪÕâ¿ÉÄÜÊÇAkiraÔڹرÕ֮ǰµÄ×îºóÒ»´Î´ó˦Âô£¬£¬£¬£¬ £¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬ £¬£¬£¬Akira¿ÉÄÜÈÔÔÚÍøÂç·¸·¨Éú̬ϵͳÖÐÆð¾¢À©ÕÅ¡£¡£¡£¡£¡£¡£¡£ÐÂÊܺ¦Õß´ó¶àÀ´×ÔÉÌҵЧÀÍÐÐÒµ£¬£¬£¬£¬ £¬£¬£¬×ܲ¿Î»ÓÚÃÀ¹ú£¬£¬£¬£¬ £¬£¬£¬µ«Ò²ÓмÓÄô󡢵¹ú¡¢Ó¢¹úµÈµØµÄ¹«Ë¾Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£ÓëLockBit²î±ð£¬£¬£¬£¬ £¬£¬£¬Akira´Ë´ÎÐû²¼µÄÊܺ¦ÕßÐÅÏ¢¶¼ÊÇеÄ£¬£¬£¬£¬ £¬£¬£¬Ã»ÓоÉÊܺ¦ÕßÐÅÏ¢±»ÖØÐÂÐû²¼¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/akira-ransomware-group-publishes-unprecedented-leak-data


2. FinastraÄÚ²¿Îļþ´«ÊäÆ½Ì¨ÒÉÔâ´ó¹æÄ£ÐÅÏ¢ÇÔÈ¡


11ÔÂ19ÈÕ£¬£¬£¬£¬ £¬£¬£¬½ðÈڿƼ¼¹«Ë¾FinastraÕýÔÚÊÓ²ìÆäÄÚ²¿Îļþ´«ÊäÆ½Ì¨±¬·¢µÄ´ó¹æÄ£ÐÅÏ¢ÇÔÈ¡ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÎªÈ«Çò½ü8,100¼Ò½ðÈÚ»ú¹¹ÌṩЧÀÍ£¬£¬£¬£¬ £¬£¬£¬°üÀ¨45¼Ò¶¥¼¶ÒøÐС£¡£¡£¡£¡£¡£¡£¿ËÈÕ£¬£¬£¬£¬ £¬£¬£¬Ò»ÃûÍøÂç·¸·¨·Ö×ÓÔÚ°µÍøÉÏÉù³ÆÒÑ´ÓFinastraÇÔÈ¡Áè¼Ý400GBµÄÊý¾Ý²¢×îÏȳöÊÛ¡£¡£¡£¡£¡£¡£¡£FinastraÒÑÏò¿Í»§×ª´ïÁËÕâÒ»Çå¾²ÊÂÎñ£¬£¬£¬£¬ £¬£¬£¬²¢ÌåÏÖ¿Í»§ÔËÓª¡¢¿Í»§ÏµÍ³»òÆäΪ¿Í»§ÌṩЧÀ͵ÄÄÜÁ¦Ã»ÓÐÊܵ½Ö±½ÓÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¹«Ë¾ÒÑʵÑéÌæ»»µÄÇå¾²Îļþ¹²ÏíÆ½Ì¨ÒÔÈ·±£Ò»Á¬ÐÔ£¬£¬£¬£¬ £¬£¬£¬²¢ÕýÔÚÊÓ²ìÊÂÎñÔµ¹ÊÔ­ÓÉ¡£¡£¡£¡£¡£¡£¡£¾ÝÆðÔ´Ö¤¾ÝÅú×¢£¬£¬£¬£¬ £¬£¬£¬Æ¾Ö¤Òѱ»Ð¹Â¶£¬£¬£¬£¬ £¬£¬£¬µ«ÉÐδȷ¶¨±»ÇÔÈ¡ÎļþÖаüÀ¨µÄÊý¾ÝµÄ¹æÄ£ºÍÐÔ×Ó¡£¡£¡£¡£¡£¡£¡£Ò»ÃûʹÓÃêdzơ°abyss0¡±µÄÍøÂç·¸·¨·Ö×ÓÔÚ10Ô·ݾÍÊÔͼ³öÊ۾ݳƴÓFinastraÇÔÈ¡µÄÊý¾Ý£¬£¬£¬£¬ £¬£¬£¬¶øFinastraÔÚ11ÔÂ7ÈÕÊ״μì²âµ½¿ÉÒɻ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÈëÇÖ¿ÉÄÜÊÇabyss0Ôٴηµ»ØÇÔÈ¡¸ü´ó¶¼¾Ý¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬£¬£¬abyss0µÄTelegramÕÊ»§ºÍBreachForumsÕÊ»§¶¼ÒÑÏûÊÅ£¬£¬£¬£¬ £¬£¬£¬ÆäËùÓÐÏúÊÛÌû×ÓÒ²ÒÑɾ³ý¡£¡£¡£¡£¡£¡£¡£


https://krebsonsecurity.com/2024/11/fintech-giant-finastra-investigating-data-breach/


3. CISAÐÂÔöÈýÎó²î¾¯Ê¾£ºProgress Kemp LoadMasterµÈÏµÍ³ÃæÁÙÑÏÖØÍþв


11ÔÂ19ÈÕ£¬£¬£¬£¬ £¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½üÆÚÔÚÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖÐÐÂÔöÁËÈý¸öÖ÷ÒªÎó²î£¬£¬£¬£¬ £¬£¬£¬ÆäÖÐÖ®Ò»ÊÇÓ°ÏìProgress Kemp LoadMasterµÄÒªº¦²Ù×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬ £¬£¬£¬±àºÅΪCVE-2024-1212£¬£¬£¬£¬ £¬£¬£¬ÓÉRhino Security Labs·¢Ã÷²¢ÓÚ2ÔÂ21ÈÕÐû²¼µÄ¸üÐÂÖнâ¾ö¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õßͨ¹ýLoadMasterÖÎÀí½çÃæÖ´ÐÐí§ÒâϵͳÏÂÁ£¬£¬£¬ £¬£¬£¬¶ÔLoadMaster°æ±¾7.2.48.1¡¢7.2.54.8ºÍ7.2.55.0֮ǰµÄ°æ±¾×é³ÉÍþв¡£¡£¡£¡£¡£¡£¡£ÁíÍâÁ½¸ö±»CISAÌí¼Óµ½KEVµÄÎó²î»®·ÖÊÇÓ°ÏìPalo Alto Networks PAN-OSÖÎÀí½çÃæµÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2024-0012£©ºÍOSÏÂÁî×¢ÈëÎó²î£¨CVE-2024-9474£©¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬£¬Progress Software»¹ÐÞ¸´ÁËLoadMasterÖеÄÁíÒ»¸ö×î¸ßÑÏÖØÐÔÎó²îCVE-2024-7591£¬£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÌØÖÆHTTPÇëÇó»á¼ûÖÎÀí½çÃæ²¢Ö´ÐÐí§ÒâÏÂÁ£¬£¬£¬ £¬£¬£¬Ó°ÏìLoadMaster°æ±¾7.2.60.0¼°Ö®Ç°°æ±¾ºÍMT Hypervisor°æ±¾7.1.35.11¼°Ö®Ç°°æ±¾¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-tags-progress-kemp-loadmaster-flaw-as-exploited-in-attacks/


4. ¸£ÌØÆû³µÔâÊý¾Ýй¶ָ¿Ø£¬£¬£¬£¬ £¬£¬£¬44000Ìõ¿Í»§¼Í¼Òɱ»ºÚ¿ÍÂÛ̳й¶


11ÔÂ19ÈÕ£¬£¬£¬£¬ £¬£¬£¬Ò»ÃûºÚ¿ÍÔÚºÚ¿ÍÂÛ̳BreachForumsÉÏÉù³ÆÐ¹Â¶Á˸£ÌØÆû³µµÄ44,000Ìõ¿Í»§¼Í¼£¬£¬£¬£¬ £¬£¬£¬ÒýÆðÁËÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬ £¬£¬£¬ÕâЩ¼Í¼°üÀ¨¿Í»§µÄÈ«Ãû¡¢ÏÖʵλÖᢹºÖÃÏêÇé¡¢¾­ÏúÉÌÐÅÏ¢ºÍʱ¼ä´ÁµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬£¬£¬£¬ £¬£¬£¬Ö»¹Ü²¢·Ç¼«¶ËÃô¸Ð£¬£¬£¬£¬ £¬£¬£¬µ«ÈÔ¿ÉÄÜʹ±»Ð¹Â¶µÄСÎÒ˽¼ÒÃæÁÙÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷µÄΣº¦¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶Õß¡°EnergyWeaponUser¡±²¢Î´ÊÔͼ³öÊÛ¸ÃÊý¾Ý¼¯£¬£¬£¬£¬ £¬£¬£¬¶øÊǽöÒÔ8¸ö»ý·Ö£¨Ô¼2ÃÀÔª£©µÄ¼ÛÇ®ÌṩӦÂÛ̳ע²á»áÔ±¡£¡£¡£¡£¡£¡£¡£¸£Ìع«Ë¾¶Ô´ËÊÂÌåÏÖÒѾ­Òâʶµ½²¢ÕýÔÚÆð¾¢ÊÓ²ìÏà¹ØÖ¸¿Ø¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬ £¬£¬£¬ÓÐÖ¸¿Ø³ÆÁíÒ»ÃûºÚ¿Í¡°IntelBroker¡±Ò²ÉæÏÓ¼ÓÈëÁË´Ë´Îй¶ÊÂÎñ£¬£¬£¬£¬ £¬£¬£¬¸ÃºÚ¿Í½üÆÚÒÑÈ·ÈÏÈëÇÖÁ˶à¸ö×ÅÃû»ú¹¹£¬£¬£¬£¬ £¬£¬£¬°üÀ¨Ë¼¿Æ¡¢Åµ»ùÑÇ¡¢Å·ÖÞÐ̾¯×éÖ¯ºÍT-MobileµÈ¡£¡£¡£¡£¡£¡£¡£¼øÓÚÊý¾Ýй¶¿ÉÄÜ´øÀ´µÄΣº¦£¬£¬£¬£¬ £¬£¬£¬×¨¼Ò½¨Ò鹫ÖÚÉóÉ÷¿´´ýδ¾­ÇëÇóµÄͨѶ£¬£¬£¬£¬ £¬£¬£¬²¢¾Ü¾øÈκÎÒªÇóÅû¶¸ü¶àÐÅÏ¢µÄÇëÇ󡣡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ford-investgates-alleged-breach-following-customer-data-leak/


5. HelldownÀÕË÷Èí¼þʹÓÃZyxel·À»ðǽÎó²î¹¥»÷ÆóÒµ


11ÔÂ19ÈÕ£¬£¬£¬£¬ £¬£¬£¬Ðµġ°Helldown¡±ÀÕË÷Èí¼þÐж¯Õë¶ÔZyxel·À»ðǽÎó²î£¬£¬£¬£¬ £¬£¬£¬Í¨¹ýÇÖÈë¹«Ë¾ÍøÂçÇÔÈ¡Êý¾Ý²¢¼ÓÃÜ×°±¸¡£¡£¡£¡£¡£¡£¡£¾Ý·¨¹úÍøÂçÇå¾²¹«Ë¾SekoiaÊӲ죬£¬£¬£¬ £¬£¬£¬×Ô½ñÄêÑ×ÌìÍÆ³öÒÔÀ´£¬£¬£¬£¬ £¬£¬£¬HelldownÉú³¤Ñ¸ËÙ£¬£¬£¬£¬ £¬£¬£¬ÔÚÆäÀÕË÷ÃÅ»§ÍøÕ¾ÉÏÁгöÁËÖÚ¶àÊܺ¦Õߣ¬£¬£¬£¬ £¬£¬£¬Ö÷ÒªÊÇÃÀ¹úºÍÅ·ÖÞµÄÖÐСÐ͹«Ë¾¡£¡£¡£¡£¡£¡£¡£Helldown Windows°æ»ùÓÚй¶µÄLockBit 3¹¹½¨Æ÷£¬£¬£¬£¬ £¬£¬£¬²Ù×÷ÓëDarkraceºÍDonexÏàËÆ£¬£¬£¬£¬ £¬£¬£¬µ«Æä¼ÓÃÜÆ÷²¢²»ÏȽø£¬£¬£¬£¬ £¬£¬£¬Ê¹ÓÃÅú´¦Öóͷ£Îļþ¿¢ÊÂʹÃü¡£¡£¡£¡£¡£¡£¡£Sekoia·¢Ã÷£¬£¬£¬£¬ £¬£¬£¬ÖÁÉÙ8ÃûHelldownÊܺ¦ÕßÔÚʹÓÃZyxel·À»ðǽ×÷ΪIPSec VPN½ÓÈëµãʱÔâµ½ÈëÇÖ£¬£¬£¬£¬ £¬£¬£¬ÍƲâHelldown¿ÉÄÜʹÓÃCVE-2024-42057Îó²î£¬£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÒÑÔÚ9ÔÂ3ÈÕÐû²¼µÄ¹Ì¼þ°æ±¾5.39ÖлñµÃÐÞ¸´¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬£¬Sekoia»¹·¢Ã÷ÓëZyxelÈëÇÖÏà¹ØµÄ¿ÉÒÉÓû§ÕÊ»§ºÍÉèÖÃÎļþ£¬£¬£¬£¬ £¬£¬£¬²¢ÍƲâÓÐÓÃÔØºÉ¿ÉÄÜÓë¸ÃÈëÇÖÓйØ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬£¬£¬ZyxelÉÐδ¶ÔÕâЩ¹¥»÷×÷³ö»ØÓ¦¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/helldown-ransomware-exploits-zyxel-vpn-flaw-to-breach-networks/


6. Ngioweb¶ñÒâÈí¼þÖ§³ÖNSOCKSµÈסլÊðÀíЧÀÍ£¬£¬£¬£¬ £¬£¬£¬Òý·¢ÍøÂçÇå¾²µ£ÐÄ


11ÔÂ19ÈÕ£¬£¬£¬£¬ £¬£¬£¬Lumen TechnologiesµÄ×îÐÂÑо¿·¢Ã÷£¬£¬£¬£¬ £¬£¬£¬ÃûΪNgiowebµÄ¶ñÒâÈí¼þ±»ÓÃÓÚÖ§³ÖÎÛÃûÕÑÖøµÄסլÊðÀíЧÀÍNSOCKSÒÔ¼°ÆäËûÀàËÆÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ÷ҪʹÓÃСÐͰ칫ÊÒ/¼ÒÍ¥°ì¹«ÊÒ·ÓÉÆ÷ºÍÎïÁªÍø×°±¸¾ÙÐй¥»÷£¬£¬£¬£¬ £¬£¬£¬²¢ÔÚÃÀ¹úÓµÓдó×ÚÊðÀí¡£¡£¡£¡£¡£¡£¡£Ngioweb½©Ê¬ÍøÂçÌìÌìά³ÖÔ¼35,000¸öÊÂÇé»úеÈË£¬£¬£¬£¬ £¬£¬£¬ÆäÖÐÐí¶àÒÑ»îÔ¾Ò»¸öÔ»ò¸ü³¤Ê±¼ä¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÉWater BarghestÍþв×é֯ʹÓ㬣¬£¬£¬ £¬£¬£¬ËûÃÇͨ¹ý×Ô¶¯¾ç±¾ÉøÍ¸Ò×Êܹ¥»÷µÄÎïÁªÍø×°±¸²¢°²ÅÅNgioweb£¬£¬£¬£¬ £¬£¬£¬½«Æä×¢²áΪÊðÀí²¢ÔÚסլÊðÀíÊг¡ÉϳöÊÛ¡£¡£¡£¡£¡£¡£¡£Õû¸öÇ®±Ò»¯Àú³ÌÖ»Ðè10·ÖÖÓ£¬£¬£¬£¬ £¬£¬£¬Åú×¢¸Ã²Ù×÷¸ß¶È¸ßЧºÍ×Ô¶¯»¯¡£¡£¡£¡£¡£¡£¡£NSOCKSÔÚÌìϸ÷µØÏúÊÛSOCKS5ÊðÆÊÎö¼ûȨÏÞ£¬£¬£¬£¬ £¬£¬£¬±»ÓÃÓÚÆ¾Ö¤Ìî³ä¹¥»÷ºÍÆäËû¶ñÒâ»î¶¯¡£¡£¡£¡£¡£¡£¡£Êܺ¦×°±¸»¹ÓëÓÉÓòÌìÉúËã·¨½¨ÉèµÄC2Óò½¨Éèºã¾ÃÅþÁ¬£¬£¬£¬£¬ £¬£¬£¬ÒÔÈ·¶¨ÊÇ·ñ½«ËüÃÇÌí¼Óµ½ÊðÀíÍøÂçÖС£¡£¡£¡£¡£¡£¡£LumenÌåÏÖ£¬£¬£¬£¬ £¬£¬£¬NSOCKSÓû§Í¨¹ý180¶à¸ö·´ÏòÅþÁ¬C2½Úµã·ÓÉÁ÷Á¿£¬£¬£¬£¬ £¬£¬£¬ÑÚÊÎÆäÕæÊµÉí·Ý¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2024/11/ngioweb-botnet-fuels-nsocks-residential.html