NachoVPN©¶´£º¶ñÒâVPN·þÎñÆ÷ÀûÓÃδÐÞ²¹¿Í»§¶Ëʵʩ¹¥»÷

Ðû²¼Ê±¼ä 2024-11-27
1. NachoVPN©¶´£º¶ñÒâVPN·þÎñÆ÷ÀûÓÃδÐÞ²¹¿Í»§¶Ëʵʩ¹¥»÷


11ÔÂ26ÈÕ£¬Ò»×éÃûΪ¡°NachoVPN¡±µÄ©¶´ÔÊÐí¶ñÒâVPN·þÎñÆ÷ÀûÓÃδÐÞ²¹µÄPalo AltoºÍSonicWall SSL-VPN¿Í»§¶Ë½øÐй¥»÷£¬Í¨¹ýÓÕÆ­Óû§Á¬½ÓÖÁ¹¥»÷Õß¿ØÖƵÄVPN·þÎñÆ÷£¬½ø¶øÇÔÈ¡µÇ¼ƾ¾Ý¡¢Ö´ÐÐÈÎÒâ´úÂë¡¢°²×°¶ñÒâÈí¼þ»òÌᳫ´úÂëÇ©ÃûαÔì¼°ÖмäÈ˹¥»÷ ¡£AmberWolfÄþ¾²Ñо¿ÈËÔ±·¢ÏÖÁËÕâÒ»Íþв£¬²¢ÔÚ©¶´Ê״γÂËߺóÊýÔÂÄÚ£¬¼ûÖ¤ÁËSonicWallºÍPalo Alto NetworksÏà¼ÌÐû²¼Õë¶ÔCVE-2024-29014ºÍCVE-2024-5921©¶´µÄ²¹¶¡ ¡£ÎªÁË·ÀÓù£¬SonicWall¿Í»§ÐèÉý¼¶ÖÁNetExtenderµÄÌض¨°æ±¾£¬¶øPalo Alto NetworksÔò½¨Òé°²×°¸üа汾»òÔÚFIPS-CCģʽÏÂÔËÐÐVPN¿Í»§¶Ë ¡£´ËÍ⣬AmberWolf»¹Ðû²¼ÁËNachoVPN¿ªÔ´¹¤¾ß£¬¸Ã¹¤¾ßÄÜÄ£Äâ¶ñÒâVPN·þÎñÆ÷£¬Ö§³Ö¶àÖÖÆóÒµVPN²úÎ²¢ÃãÀøÉçÇøТ¾´Ð©¶´ÐÅÏ¢ ¡£Í¬Ê±£¬¸Ã¹«Ë¾»¹ÌṩÁËÓйØÕâÁ½¸ö©¶´µÄ¸ü¶à¼¼Êõϸ½ÚºÍ·ÀÓù½¨Ò飬ÒÔ×ÊÖúÍøÂç·ÀÓùÕß±£»¤ÆäϵͳÃâÊÜDZÔÚ¹¥»÷ ¡£


https://www.bleepingcomputer.com/news/security/new-nachovpn-attack-uses-rogue-vpn-servers-to-install-malicious-updates/


2. ¶íÂÞ˹ºÚ¿ÍRomComÀûÓÃFirefoxºÍTorÁãÈÕ©¶´Ìᳫ¹¥»÷


11ÔÂ27ÈÕ£¬½üÆÚ¶íÂÞ˹ºÚ¿Í×éÖ¯RomComÀûÓÃÁËÁ½¸öÁãÈÕ©¶´£¬ÏòʹÓÃFirefox»òTorä¯ÀÀÆ÷µÄÓû§·¢ÉäÁ˶ñÒâ´úÂë ¡£ÕâЩ©¶´·Ö±ðÓ°ÏìÁËMozillaÈí¼þºÍWindowsϵͳ£¬ÆäÖÐÒ»¸ö©¶´£¨CVE-2024-9680£©Ê¹µÃ·ÃÎÊÊÜѬȾÍøÕ¾µÄÈκÎÈ˶¼ÊÐÎÞÒâʶµØÏÂÔØRomComºóÃÅ£¬¶øÎÞÐèÈκεã»÷ ¡£ÐÒÔ˵ÄÊÇ£¬ÕâÁ½¸ö©¶´¶¼µÃµ½ÁË¿ìËÙÐÞ¸´£¬MozillaÔÚÊÕµ½Í¨Öªºó25СʱÄÚ¾ÍÐÞ²¹ÁËFirefoxÖеÄ©¶´£¬¶øWindowsÖеÄ©¶´£¨CVE-2024-49039£©Ò²ÔÚºóÐøµÃµ½ÐÞ¸´ ¡£RomComͨ¹ýÌØÖÆÍøÕ¾´¥·¢Â©¶´£¬ÕâЩÍøվģ·ÂÁËÕæʵ×éÖ¯µÄÍøÕ¾£¬°üÂÞConnectWise¡¢DevolutionsºÍCorrectivµÈ ¡£ËäÈ»Torä¯ÀÀÆ÷Ò²»ùÓÚFirefox£¬µ«ESET×·×ÙµÄÊܺ¦ÕßÖÐûÓÐÒ»ÈËÊÇͨ¹ýTorÊܵ½¹¥»÷µÄ£¬¿ÉÄÜÊÇÒòΪTorµÄijЩÉèÖÃÓëFirefox²îÒì ¡£RomComµÄÖ÷ҪĿ±êËƺõÊǹ«Ë¾£¬¾ø´ó¶àÊýÊܺ¦ÕßλÓÚ±±ÃÀºÍÅ·ÖÞ£¬µ«ÐÂÎ÷À¼ºÍ·¨Êô¹çÑÇÄÇÒ²ÓÐÁãÐÇÊܺ¦Õß ¡£


https://www.darkreading.com/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor


3. RansomHub×éÖ¯Éù³Æ¶ÔÁ½ÊÐÕþ¸®·¢¶¯ÀÕË÷¹¥»÷


11ÔÂ27ÈÕ£¬ÍøÂç·¸×ï×éÖ¯RansomHubÉù³Æ¶ÔµÂ¿ËÈø˹ÖÝ¿ÆÅå¶ûÊм°Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»á·¢¶¯ÁËÀÕË÷Èí¼þ¹¥»÷£¬Òý·¢¹ã·º¹Ø×¢ ¡£¿ÆÅå¶ûÊÐÔâÊܹ¥»÷ºó£¬»¥ÁªÍø¡¢Í¼Êé¹Ý·þÎñ¡¢Ðí¿ÉºÍ¼ì²éƽ̨¼°Êз¨ÔºµÈ¶à¸öϵͳ̱»¾£¬¸øµ±µØ¾ÓÃñ´øÀ´ÑÏÖØÀ§ÈÅ ¡£¾¡¹ÜÊÐÕþ¸®Å¬Á¦»Ö¸´£¬µ«Ö±ÖÁ11ÔÂÏÂÑ®£¬²¿ÃÅÊÐÕþÔËÓª²Å½Ðø»Ö¸´ ¡£Í¬Ê±£¬Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»áÒ²³ÂËßÆä¼¼ÊõϵͳÔâµ½¹¥»÷£¬µç»°Ïß·ÖжÏ£¬ÕýÔÚŬÁ¦È·¶¨ÐÅϢй¶Çé¿ö ¡£RansomHub½ñÄêѸËÙáÈÆð£¬ÒѶԻú³¡¡¢Ò½ÁÆ»ú¹¹¡¢ÖÆÔ칫˾ºÍÒªº¦»ù´¡ÉèÊ©µÈÊý°Ù¸ö×éÖ¯·¢¶¯¹¥»÷ ¡£×Ô2Ô·ÝÒÔÀ´£¬ÒÑÓÐÔ¼210¸ö×éÖ¯³ÉΪÆäÊܺ¦Õß ¡£¸Ã×éÖ¯×î³õ·ºÆðÔÚÁªºÏ½¡¿µ¼¯ÍÅÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó£¬ËæºóÒòÁíÒ»ÀÕË÷Èí¼þÍŻﵹ±Õ¶ø׳´ó£¬¶ÔÊý¾Ý½øÐгöÊÛ ¡£½ñÄ꣬RansomHub»¹¹¥»÷Á˶àÆð±¸ÊÜÖõÄ¿µÄÄ¿±ê£¬°üÂÞµçОÞÍ·Frontier¡¢Rite Aid¡¢Ó¢¹úÅÄÂôÐÐChristie¡¯sµÈ ¡£


https://therecord.media/ransomhub-cybercrime-coppell-texas-minneapolis-parks-agency


4. ÈûÂ׸ǵÙÐж¯£º·ÇÖÞÖ´·¨»ú¹¹ÑÏÀ÷¹¥»÷ÍøÂç·¸×ï


11ÔÂ26ÈÕ£¬·ÇÖÞÖ´·¨»ú¹¹ÔÚ¹ú¼ÊÐ̾¯×éÖ¯ºÍ·ÇÖÞÐ̾¯×éÖ¯µÄЭµ÷Ï£¬ÓÚ9ÔÂ2ÈÕÖÁ10ÔÂ31ÈÕÆڼ俪չÁËÃûΪ¡°ÈûÂ׸ǵÙÐж¯¡±µÄ¹¥»÷ÍøÂç·¸×ï»î¶¯ ¡£´Ë´ÎÐж¯Õë¶ÔÀÕË÷Èí¼þ¡¢ÉÌÒµµç×ÓÓʼþй¶¡¢Êý×ÖÀÕË÷ºÍÍøÂçÕ©Æ­µÈ·¸×ïÐÐΪ£¬Éæ¼°19¸ö·ÇÖÞ¹ú¼Ò£¬¹²´þ²¶ÁË1006ÃûÏÓÒÉÈË£¬´Ý»ÙÁË134089¸ö¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç ¡£¾ÝÊӲ죬ÕâЩ·¸×ï»î¶¯ÓëÖÁÉÙ35224ÃûÒÑÈ·ÈÏÉí·ÝµÄÊܺ¦ÕßÓйØ£¬Ôì³ÉÁ˽ü1.93ÒÚÃÀÔªµÄ¾­¼ÃËðʧ£¬ÆäÖÐÈûÂ׸ǵÙÐж¯×·»ØÁËԼĪ4400ÍòÃÀÔª ¡£Ðж¯ÖеÄÁÁµã°üÂÞ¿ÏÄáÑÇÆÆ»ñÒ»ÆðÍøÉÏÐÅÓÿ¨Õ©Æ­°¸£¬ÈûÄÚ¼Ó¶ûµ·»ÙÒ»ÆðÅÓÊÏÆ­¾Ö£¬ÄáÈÕÀûÑÇ´þ²¶Ò»ÃûʵʩÍøÉÏͶ×ÊÕ©Æ­µÄÄÐ×Ó£¬¿¦Âó¡ÆÆ»ñ¶àÌõÀíÓªÏúÆ­¾Ö£¬ÒÔ¼°°²¸çÀ­µ·»ÙÒ»¸öÐéÄâ¶Ä³¡¹ú¼Ê¼¯ÍÅ ¡£¼ÓÈë´Ë´ÎÐж¯µÄ¹ú¼Ò»¹Óа¢¶û¼°ÀûÑÇ¡¢±´Äþ¡¢¿ÆÌصÏÍß¡¢¸Õ¹ûÃñÖ÷¹²ºÍ¹ú¡¢¼ÓÅî¡¢¼ÓÄÉ¡¢Ã«ÀïÇó˹¡¢ÄªÉ£±È¿Ë¡¢Â¬Íú´ï¡¢ÄÏ·Ç¡¢Ì¹É£ÄáÑÇ¡¢Í»Äá˹¡¢ÔÞ±ÈÑǺͽò°Í²¼Î¤ ¡£


https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/


5. Matrix·¢¶¯´ó¹æÄ£DDoS¹¥»÷£¬ÀûÓÃÎïÁªÍøºÍÆóҵ©¶´


11ÔÂ26ÈÕ£¬Äþ¾²Ñо¿ÈËÔ±·¢ÏÖÁËÒ»³¡ÓÉÃûΪMatrixµÄÍþвÐÐΪÕß³ïıµÄ´ó¹æÄ£ÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷»î¶¯£¬¸Ã»î¶¯ÀûÓÿɷÃÎʵŤ¾ßÕë¶ÔÎïÁªÍøÉ豸ºÍÆóÒµ·þÎñÆ÷ ¡£MatrixµÄ¹¥»÷¿ò¼Ü¾­¹ýÏêϸ·ÖÎö£¬Ö÷ÒªÀûÓû¥ÁªÍøÁ¬½ÓÉè±¹ØÁ¬Ä©¶´ºÍ´íÎóÅäÖã¬Í¨¹ý±©Á¦¹¥»÷¡¢Èõƾ֤ºÍÒÑ֪©¶´¹¹½¨½©Ê¬ÍøÂç ¡£¹¥»÷µÄÖ÷ÒªÌØÕ÷°üÂÞÕë¶Ô·ÓÉÆ÷¡¢DVRºÍIPÉãÏñ»ú¡¢ÆóҵЭÒéºÍÎïÁªÍøÉ豸µÄ©¶´ÀûÓà ¡£ÕâЩ¹¥»÷ÑÏÖØÒÀÀµÄ¬ÈÏ»òÈõÃÜÂ룬ǿµ÷ÁËδÄܽÓÄÉ»ù±¾Äþ¾²´ëÊ©»áʹÉ豸ÃæÁÙÈëÇֵķçÏÕ ¡£MatrixµÄÄ¿±ê°üÂÞÔÆ·þÎñÌṩÉÌ¡¢Ð¡ÐÍÆóÒµºÍÎïÁªÍøÃܼ¯µØÓò£¬ÊÜÓ°ÏìµÄÉ豸¿ÉÄܶà´ï3500Íǫ̀ ¡£MatrixʹÓÃÁËÀ´×ÔGitHubµÈƽ̨µÄ½Å±¾ºÍ¹¤¾ß£¬²¢Í¨¹ýTelegram½«·þÎñ»õ±Ò»¯£¬ÌṩDDoS¹¥»÷¼Æ»® ¡£¾¡¹ÜMatrixȱ·¦ÏȽø¹¦Ð§£¬µ«ÕâЩ¹¤¾ßµÄ×é×°ºÍ²Ù×÷¶¼·Ç³£ÈÝÒ×£¬ÏÔʾ³öµÍÅÓ´óˮƽ¼ÓÈëÕßËù´øÀ´µÄ·çÏÕÔ½À´Ô½´ó ¡£


https://www.infosecurity-magazine.com/news/ddos-campaign-exploits-iot-devices/


6. Array Networks SSL VPN ²úÎïÖеÄ©¶´Õý±»»ý¼«ÀûÓÃ


11ÔÂ26ÈÕ£¬ÃÀ¹úÍøÂç·ÀÓù»ú¹¹CISAÊÕµ½Ö¤¾Ý±íÃ÷£¬ºÚ¿ÍÕýÔÚ»ý¼«ÀûÓÃSSL VPN²úÎïArray Networks AGºÍvxAG ArrayOSÖеÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¬¸Ã©¶´±»×·×ÙΪCVE-2023-28461£¬ÑÏÖØÐÔÆÀ·Ö¸ß´ï9.8£¬Òѱ»ÁÐÈëCISAµÄÒÑÖªÀûÓ鶴Ŀ¼ÖÐ ¡£´Ë©¶´´æÔÚÓÚÒ×Êܹ¥»÷µÄURLÖУ¬ÊÇÒ»¸öÉí·ÝÑéÖ¤²»Í×ÎÊÌ⣬ÔÊÐíÔÚArray AGϵÁкÍvxAG 9.4.0.481¼°¸üÔç°æ±¾ÖÐÖ´ÐÐÔ¶³Ì´úÂë ¡£Array NetworksÔÚ©¶´Åû¶һÖܺóÐû²¼ÁËÐÞ¸´°æ±¾Array AG 9.4.0.484 ¡£Array NetworksµÄSSL VPN²úÎﱻȫÇòÁè¼Ý5000¸ö¿Í»§Ê¹Ó㬰üÂÞÆóÒµ¡¢·þÎñÌṩÉ̺ÍÕþ¸®»ú¹¹ ¡£CISA½¨ÒéËùÓÐÁª°î»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯ÔÚ12ÔÂ16ÈÕ֮ǰӦÓÃÄþ¾²¸üлò½ÓÄÉ»º½â´ëÊ©£¬·ñÔòӦֹͣʹÓøòúÎï ¡£Äþ¾²¸üпÉͨ¹ýArrayÖ§³ÖÃÅ»§»ñÈ¡£¬µ«¹©Ó¦ÉÌÌṩµÄ»º½â´ëÊ©¿ÉÄÜ»á¶Ô¿Í»§¶ËÄþ¾²¹¦Ð§·¢Éú¸ºÃæÓ°Ï죬Òò´Ë×éÖ¯Ó¦Ê×ÏȲâÊÔÆäЧ¹û ¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-bug-in-array-networks-ssl-vpn-products/