CISA¾¯¸æFortiOSÑÏÖØRCE©¶´Õý±»»ý¼«ÀûÓÃ

Ðû²¼Ê±¼ä 2024-10-11

1. CISA¾¯¸æFortiOSÑÏÖØRCE©¶´Õý±»»ý¼«ÀûÓÃ


10ÔÂ9ÈÕ£¬CISA͸¶¹¥»÷ÕßÕýÔÚ»ý¼«ÀûÓÃÒ»¸öÑÏÖصÄFortiOSÔ¶³Ì´úÂëÖ´ÐÐ(RCE)©¶´£¨CVE-2024-23113£©¡£¸Ã©¶´ÓÉfgfmdÊØ»¤½ø³Ì½ÓÊÜÍⲿ¿ØÖƵĸñʽ×Ö·û´®×÷Ϊ²ÎÊýÒýÆð£¬Ê¹µÃδ¾­Éí·ÝÑéÖ¤µÄÍþвÐÐΪÕßÄܹ»ÔÚδÐÞ²¹µÄÉ豸ÉÏÖ´ÐÐÃüÁî»òÈÎÒâ´úÂ룬ÇÒÎÞÐèÓû§½»»¥¡£´Ë©¶´Ó°ÏìFortiOS 7.0¼°ÒÔÉÏ°æ±¾¡¢FortiPAM 1.0¼°ÒÔÉÏ°æ±¾¡¢FortiProxy 7.0¼°ÒÔÉÏ°æ±¾ÒÔ¼°FortiWeb 7.4¡£FortinetÒÑÓÚ¶þÔ·ÝÅû¶²¢ÐÞ²¹Á˸鶴£¬²¢½¨Òéɾ³ýËùÓнӿڶÔfgfmdÊØ»¤·¨Ê½µÄ·ÃÎÊȨÏÞ×÷Ϊ»º½â´ëÊ©¡£È»¶ø£¬CISAÒѽ«´Ë©¶´Ìí¼Óµ½ÆäÒÑÖª±»ÀûÓ鶴Ŀ¼ÖУ¬ÒªÇóÃÀ¹úÁª°î»ú¹¹ÔÚ10ÔÂ30ÈÕ֮ǰ±£»¤ÆäÍøÂçÉϵÄFortiOSÉ豸ÃâÊÜÕâЩÕýÔÚ½øÐеĹ¥»÷¡£ÍøÂçÄþ¾²»ú¹¹¾¯¸æ³Æ£¬´ËÀ੶´ÊǶñÒâÍøÂçÐÐΪÕßƵ·±¹¥»÷µÄý½é£¬¶ÔÁª°îÆóÒµ×é³ÉÖØ´ó·çÏÕ¡£


https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/


2. Ó¡¶ÈStar Health±£ÏÕ¹«Ë¾ÔâÍøÂç¹¥»÷£¬¿Í»§Êý¾ÝÒÉÔâй¶


10ÔÂ9ÈÕ£¬Ó¡¶È×î´óµÄ½¡¿µ±£ÏÕ¹«Ë¾Ö®Ò»Star Health and Allied Insurance֤ʵÔâÊÜÁ˶ñÒâÍøÂç¹¥»÷£¬µ¼ÖÂijЩÊý¾Ý±»Î´¾­ÊÚȨºÍ·Ç·¨·ÃÎÊ£¬µ«¹«Ë¾ÔËӪδÊÜÓ°Ï죬·þÎñÈÔÔÚ¼ÌÐø¡£Star HealthÌṩ¶àÖÖ±£ÏÕ·þÎñ£¬ÓµÓÐÁè¼Ý1.7ÒÚÒ½ÁƱ£ÏÕ¿Í»§¡£´ËÇ°£¬ÍøÂç·¸×ï·Ö×ÓÉù³ÆÔÚÍøÉÏÐû²¼ÁË¿Í»§µÄ½¡¿µ¼Ç¼ºÍÆäËûÃô¸ÐÊý¾Ý£¬ºÚ¿Í×éÖ¯ÔÚTelegramÉÏ´´½¨ÁËÁÄÌì»úÆ÷ÈË£¬Ð¹Â¶ÁË3100ÍòͶ±£È˺ÍÁè¼Ý580Íò·Ý±£ÏÕË÷ÅâµÄ¸öÈËÊý¾Ý¡£Star HealthÒÑÌáÆðËßËϿظæTelegramºÍCloudflare£¬²¢Ö¸³öÆäÊ×ϯÐÅÏ¢Äþ¾²¹ÙÒ»Ö±ÔÚ»ý¼«ÅäºÏÊӲ죬δ·¢ÏÖÆäÓÐÈκβ»Í×ÐÐΪ¡£´Ë´ÎÈëÇÖµÄϸ½ÚºÍºÚ¿ÍÈçºÎ»ñÈ¡Êý¾ÝÈÔ²»Çå³þ£¬±£ÏÕ¹«Ë¾Î´Í¸Â¶ÊÇ·ñ¿ÉÒÔÈ·ÈÏË­·ÃÎÊÁËÊý¾ÝÒÔ¼°ÄÄЩÊý¾ÝÒѱ»·ÃÎÊ»òÇÔÈ¡¡£


https://techcrunch.com/2024/10/09/indias-star-health-confirms-data-breach-after-cybercriminals-post-customers-health-data-online/


3. ³¯ÏÊÍþвÕßÕë¶Ô¿Æ¼¼ÇóÖ°ÕßÍƹã¶ñÒâÈí¼þ


10ÔÂ9ÈÕ£¬Ó볯ÏÊÓÐÁªÏµµÄÍþвÐÐΪÕß½«Ä¿±êËø¶¨ÔڿƼ¼ÐÐÒµµÄÇóÖ°ÕßÉíÉÏ£¬Í¨¹ýÇóְƽ̨ÁªÏµÈí¼þ¿ª·¢ÈËÔ±£¬Ã°³äDZÔÚ¹ÍÖ÷ÑûÇëËûÃǼÓÈëÔÚÏßÃæÊÔ£¬²¢ÊÔͼ˵·þËûÃÇÏÂÔز¢°²×°¶ñÒâÈí¼þ£¬ÕâÊÇÃûΪ¡°Ñ¬È¾ÐÔ·Ã̸¡±µÄ»î¶¯µÄÒ»²¿ÃÅ¡£¸Ã»î¶¯¼¯Èº±»×·×ÙΪCL-STA-0240£¬Éæ¼°ÒÑÖª¶ñÒâÈí¼þ¼Ò×åBeaverTailºÍInvisibleFerretµÄ¸üа汾¡£µÚÒ»½×¶ÎѬȾÉæ¼°BeaverTailÏÂÔØ·¨Ê½ºÍÐÅÏ¢ÇÔÈ¡·¨Ê½£¬¸Ã·¨Ê½×¨ÎªWindowsºÍApple macOSƽ̨Éè¼Æ£¬³äµ±»ùÓÚPythonµÄInvisibleFerretºóÃŵĹܵÀ¡£¾¡¹Ü¸Ã»î¶¯Òѱ»¹ûÈ»Åû¶£¬µ«ÈÔÓÐÖ¤¾Ý±íÃ÷ËüÈÔÈ»»îÔ¾¡£Äþ¾²Ñо¿Ô±ºÍÍøÂçÄþ¾²¹«Ë¾ÏêϸÃèÊöÁËÀûÓüÙÊÓƵ»áÒéÓ¦Ó÷¨Ê½MiroTalkºÍFreeConference.comÉø͸µ½¿ª·¢ÈËԱϵͳÖеĹ¥»÷Á´¡£BeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡ä¯ÀÀÆ÷ÃÜÂë¡¢´Ó¶à¸ö¼ÓÃÜ»õ±ÒÇ®°üÖÐÊÕ¼¯Êý¾Ý£¬²¢ÏÂÔز¢Ö´ÐÐInvisibleFerretºóÃÅ£¬¸ÃºóÃÅ°üÂÞÖ¸ÎÆʶ±ð¡¢Ô¶³Ì¿ØÖÆ¡¢¼üÅ̼Ǽ¡¢Êý¾Ýй¶µÈ¹¦Ð§¡£Unit 42ÌåÏÖ£¬Õâ´Î»î¶¯¿ÉÄܳöÓÚ¾­¼Ã¶¯»ú£¬ÒòΪBeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡13¸ö²îÒìµÄ¼ÓÃÜ»õ±ÒÇ®°ü£¬³¯ÏÊÍþвÕß»á½øÐнðÈÚ·¸×ïÒԳO×ʽðÀ´Ö§³Ö³¯ÏÊÕþȨ¡£


https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html


4. ºÚ¿ÍÉù³Æ¹¥»÷Dr.WebÇÔÈ¡10TBÊý¾Ý£¬Òý·¢ÍøÂçÄþ¾²ÐÐÒµµ£ÓÇ


10ÔÂ9ÈÕ£¬¾ÝCyber Security News±¨µÀ£¬Ò»ÃûºÚ¿ÍÔÚºÚ¿ÍÂÛ̳DumpForumsÉÏÉù³Æ¶Ô¶íÂÞ˹ÖøÃûÍøÂçÄþ¾²¹«Ë¾Dr.Web½øÐÐÁ˹¥»÷£¬²¢ÇÔÈ¡Á˸ߴï10TBµÄÊý¾Ý¡£ºÚ¿ÍÉù³Æ´Ë´Î¹¥»÷¾­¹ý¾«Ðijïı£¬ÀúʱÊýÌ죬ÀÖ³ÉÉø͸µ½Dr.WebµÄµ±µØÍøÂ磬²¢Öð²½ÈëÇÖÆä·þÎñÆ÷ºÍ×ÊÔ´£¬ÉõÖÁÉø͸µ½ÁËÆä×îÄþ¾²µÄ»ù´¡ÉèÊ©²¿ÃÅ¡£ºÚ¿Í»¹Éù³Æ´ÓGitLab·þÎñÆ÷¡¢¹«Ë¾Óʼþ·þÎñÆ÷¡¢Confluence¡¢Redmine¡¢Jenkins¡¢Mantisϵͳ¡¢RocketChatͨÐÅƽ̨µÈ¶à¸öÒªº¦ÏµÍ³ÖÐÆƽⲢй¶ÁËÊý¾Ý£¬²¢ÔÚÒ»¸öÔÂÄÚδ±»·¢ÏÖµÄÇé¿öÏ·ÃÎʲ¢ÉÏ´«ÁË¿Í»§¶ËÊý¾Ý¿â£¬¿ÉÄÜ̻¶ÁËDr.WebÓû§µÄÃô¸ÐÐÅÏ¢¡£È»¶ø£¬Dr.Web¹Ù·½ÉùÃ÷³Æ£¬¾¡¹ÜÆäϵͳ×ÊÔ´ÔâÊÜÁËÓÐÕë¶ÔÐԵĹ¥»÷£¬µ«ÒÑÀֳɴì°ÜÁËÆÆ»µÆä»ù´¡ÉèÊ©µÄÆóͼ£¬Óû§¶Ë²úÎïδÊÜÓ°Ï졣ΪԤ·ÀÆð¼û£¬Dr.WebÒѶϿªËùÓÐ×ÊÔ´ÓëÍøÂçµÄÁ¬½Ó½øÐÐÑéÖ¤£¬²¢ÔÝÍ£Á˲¡¶¾¿âµÄÐû²¼¡£Èô´Ëй¶ÐÐΪµÃµ½Ö¤Êµ£¬½«¶ÔDr.WebÄËÖÁÕû¸öÍøÂçÄþ¾²ÐÐÒµÔì³ÉÖØ´ó¹¥»÷£¬²¢Òý·¢Óû§¶Ôµ±Ç°±£»¤´ëÊ©ÓÐЧÐÔµÄÖÊÒÉ¡£


https://cybersecuritynews.com/dumpforums-10tb-data-dr-web/


5. AkiraºÍFogÀÕË÷Èí¼þÀûÓÃÒªº¦µÄVeeam RCE©¶´


10ÔÂ10ÈÕ£¬ÀÕË÷Èí¼þÍÅ»ïÀûÓÃVeeam Backup & Replication (VBR) ·þÎñÆ÷ÉϵÄÒ»¸öÑÏÖØÄþ¾²Â©¶´£¨CVE-2024-40711£©£¬ÊµÏÖÁËÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¸Ã©¶´ÓÉCode WhiteÄþ¾²Ñо¿Ô±Florian Hauser·¢ÏÖ£¬Ô´ÓÚ²»ÊÜÐÅÈÎÊý¾Ý·´ÐòÁл¯µÄÈõµã£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒԽϵÍÅÓ´ó¶È·¢¶¯¹¥»÷¡£VeeamÔÚ9ÔÂ4ÈÕÅû¶Á˸鶴²¢Ðû²¼ÁËÄþ¾²¸üУ¬¶øwatchTowr LabsÔòÔÚ9ÔÂ9ÈÕÐû²¼¼¼Êõ·ÖÎö£¬µ«ÑÓ³ÙÖÁ9ÔÂ15ÈղŹûÈ»¿´·¨Ñé֤©¶´´úÂ룬ÒÔÈ·±£¹ÜÀíÔ±ÓÐ×㹻ʱ¼ä¼ÓÇ¿·À»¤¡£ÓÉÓÚVBRÈí¼þ¹ã·ºÓÃÓÚÊý¾Ý±£»¤ºÍÔÖÄѻָ´£¬³ÉΪ¶ñÒâÐÐΪÕßêéêìµÄÄ¿±ê¡£Sophos X-OpsʼþÏìÓ¦ÈËÔ±·¢ÏÖ£¬¸Ã©¶´Ñ¸ËÙ±»AkiraºÍFogÀÕË÷Èí¼þ¹¥»÷ÀûÓ㬽áºÏ֮ǰ鶵Äƾ¾Ý£¬½«¡°µã¡±µ±µØÕÊ»§Ìí¼Óµ½¹ÜÀíÔ±ºÍÔ¶³Ì×ÀÃæÓû§×é¡£¹¥»÷Õßͨ³£Í¨¹ýδÆôÓöàÒòËØÉí·ÝÑéÖ¤µÄÊÜѬȾVPNÍø¹Ø·ÃÎÊÄ¿±ê£¬²¿ÃÅVPNÔËÐв»ÊÜÖ§³ÖµÄÈí¼þ°æ±¾¡£ÔÚFogÀÕË÷Èí¼þʼþÖУ¬¹¥»÷Õß»¹ÀûÓÃδ±£»¤µÄHyper-V·þÎñÆ÷ºÍʵÓ÷¨Ê½rcloneÇÔÈ¡Êý¾Ý¡£ÕâЩ¹¥»÷ÏÔʾ³ö¸ß¶ÈµÄÖصþÐÔºÍÏàËÆÐÔ£¬±íÃ÷ÀÕË÷Èí¼þÍÅ»ïÕý»ý¼«ÀûÓÃÕâһ©¶´½øÐй¥»÷¡£


https://www.bleepingcomputer.com/news/security/akira-and-fog-ransomware-now-exploiting-critical-veeam-rce-flaw/


6. ¸»´ïͶ×ÊϵͳÔâÈëÇÖ£¬77,000Ãû¿Í»§ÐÅϢй¶


10ÔÂ10ÈÕ£¬×ܲ¿Î»ÓÚ²¨Ê¿¶ÙµÄ¿ç¹ú½ðÈÚ·þÎñ¹«Ë¾¸»´ïͶ×Ê£¬½üÆÚÔâÓöÁËÒ»´ÎϵͳÈëÇÖʼþ£¬µ¼ÖÂÁè¼Ý77,000Ãû¿Í»§µÄ¸öÈËÐÅÏ¢±»Ð¹Â¶¡£×÷ΪȫÇò×î´óµÄ×ʲú¹ÜÀí¹«Ë¾Ö®Ò»£¬¸»´ï¹ÜÀíµÄ×ʲú×ܶî¸ß´ï14.1ÍòÒÚÃÀÔª¡£¾Ý¸»´ï͸¶£¬Õâ´ÎÈëÇÖ·¢ÉúÔÚ8ÔÂ17ÈÕÖÁ19ÈÕÆڼ䣬һÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßÀûÓÃ×î½ü½¨Á¢µÄÁ½¸ö¿Í»§ÕË»§ÇÔÈ¡ÁËÊý¾Ý¡£¸»´ïÔÚ·¢ÏÖÕâÒ»»î¶¯ºóѸËÙ½ÓÄÉ´ëÊ©ÖÕÖ¹ÁË·ÃÎÊ£¬²¢ÔÚÍⲿÄþ¾²×¨¼ÒµÄЭÖúÏÂÕ¹¿ªÁËÊӲ졣¾¡¹Ü¸»´ïûÓÐ͸¶³ýÁËÐÕÃûºÍÆäËû¸öÈËÉí·ÝÐÅÏ¢Í⻹ÓÐÄÄЩÐÅÏ¢±»ÇÔÈ¡£¬µ«ËüÒÑÏòÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËÁ½ÄêµÄÃâ·ÑÐÅÓüà¿ØºÍÉí·Ý»Ö¸´·þÎñ¡£¸»´ï»¹ÌåÏÖ£¬Ã»ÓÐÖ¤¾Ý±íÃ÷±»µÁµÄ¿Í»§Êý¾Ý±»ÀÄÓ㬵«ÈÔ½¨ÒéÊÜÓ°ÏìµÄ¿Í»§±£³Ö¾¯Ì裬¶¨ÆÚ¼ì²éÕË»§±¨±í£¬¼à¿ØÐÅÓóÂËߣ¬²¢¼°Ê±³ÂËßÈκοÉÒɻ¡£


https://www.bleepingcomputer.com/news/security/fidelity-investments-says-data-breach-affects-over-77-000-people/