NachoVPN©¶´£º¶ñÒâVPN·þÎñÆ÷ÀûÓÃδÐÞ²¹¿Í»§¶Ëʵʩ¹¥»÷
Ðû²¼Ê±¼ä 2024-11-2711ÔÂ26ÈÕ£¬Ò»×éÃûΪ¡°NachoVPN¡±µÄ©¶´ÔÊÐí¶ñÒâVPN·þÎñÆ÷ÀûÓÃδÐÞ²¹µÄPalo AltoºÍSonicWall SSL-VPN¿Í»§¶Ë½øÐй¥»÷£¬Í¨¹ýÓÕÆÓû§Á¬½ÓÖÁ¹¥»÷Õß¿ØÖƵÄVPN·þÎñÆ÷£¬½ø¶øÇÔÈ¡µÇ¼ƾ¾Ý¡¢Ö´ÐÐÈÎÒâ´úÂë¡¢°²×°¶ñÒâÈí¼þ»òÌᳫ´úÂëÇ©ÃûαÔì¼°ÖмäÈ˹¥»÷¡£AmberWolfÄþ¾²Ñо¿ÈËÔ±·¢ÏÖÁËÕâÒ»Íþв£¬²¢ÔÚ©¶´Ê״γÂËߺóÊýÔÂÄÚ£¬¼ûÖ¤ÁËSonicWallºÍPalo Alto NetworksÏà¼ÌÐû²¼Õë¶ÔCVE-2024-29014ºÍCVE-2024-5921©¶´µÄ²¹¶¡¡£ÎªÁË·ÀÓù£¬SonicWall¿Í»§ÐèÉý¼¶ÖÁNetExtenderµÄÌض¨°æ±¾£¬¶øPalo Alto NetworksÔò½¨Òé°²×°¸üа汾»òÔÚFIPS-CCģʽÏÂÔËÐÐVPN¿Í»§¶Ë¡£´ËÍ⣬AmberWolf»¹Ðû²¼ÁËNachoVPN¿ªÔ´¹¤¾ß£¬¸Ã¹¤¾ßÄÜÄ£Äâ¶ñÒâVPN·þÎñÆ÷£¬Ö§³Ö¶àÖÖÆóÒµVPN²úÎ²¢ÃãÀøÉçÇøТ¾´Ð©¶´ÐÅÏ¢¡£Í¬Ê±£¬¸Ã¹«Ë¾»¹ÌṩÁËÓйØÕâÁ½¸ö©¶´µÄ¸ü¶à¼¼Êõϸ½ÚºÍ·ÀÓù½¨Ò飬ÒÔ×ÊÖúÍøÂç·ÀÓùÕß±£»¤ÆäϵͳÃâÊÜDZÔÚ¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/new-nachovpn-attack-uses-rogue-vpn-servers-to-install-malicious-updates/
2. ¶íÂÞ˹ºÚ¿ÍRomComÀûÓÃFirefoxºÍTorÁãÈÕ©¶´Ìᳫ¹¥»÷
11ÔÂ27ÈÕ£¬½üÆÚ¶íÂÞ˹ºÚ¿Í×éÖ¯RomComÀûÓÃÁËÁ½¸öÁãÈÕ©¶´£¬ÏòʹÓÃFirefox»òTorä¯ÀÀÆ÷µÄÓû§·¢ÉäÁ˶ñÒâ´úÂë¡£ÕâЩ©¶´·Ö±ðÓ°ÏìÁËMozillaÈí¼þºÍWindowsϵͳ£¬ÆäÖÐÒ»¸ö©¶´£¨CVE-2024-9680£©Ê¹µÃ·ÃÎÊÊÜѬȾÍøÕ¾µÄÈκÎÈ˶¼ÊÐÎÞÒâʶµØÏÂÔØRomComºóÃÅ£¬¶øÎÞÐèÈκεã»÷¡£ÐÒÔ˵ÄÊÇ£¬ÕâÁ½¸ö©¶´¶¼µÃµ½ÁË¿ìËÙÐÞ¸´£¬MozillaÔÚÊÕµ½Í¨Öªºó25СʱÄÚ¾ÍÐÞ²¹ÁËFirefoxÖеÄ©¶´£¬¶øWindowsÖеÄ©¶´£¨CVE-2024-49039£©Ò²ÔÚºóÐøµÃµ½ÐÞ¸´¡£RomComͨ¹ýÌØÖÆÍøÕ¾´¥·¢Â©¶´£¬ÕâЩÍøվģ·ÂÁËÕæʵ×éÖ¯µÄÍøÕ¾£¬°üÂÞConnectWise¡¢DevolutionsºÍCorrectivµÈ¡£ËäÈ»Torä¯ÀÀÆ÷Ò²»ùÓÚFirefox£¬µ«ESET×·×ÙµÄÊܺ¦ÕßÖÐûÓÐÒ»ÈËÊÇͨ¹ýTorÊܵ½¹¥»÷µÄ£¬¿ÉÄÜÊÇÒòΪTorµÄijЩÉèÖÃÓëFirefox²îÒì¡£RomComµÄÖ÷ҪĿ±êËƺõÊǹ«Ë¾£¬¾ø´ó¶àÊýÊܺ¦ÕßλÓÚ±±ÃÀºÍÅ·ÖÞ£¬µ«ÐÂÎ÷À¼ºÍ·¨Êô¹çÑÇÄÇÒ²ÓÐÁãÐÇÊܺ¦Õß¡£
https://www.darkreading.com/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor
3. RansomHub×éÖ¯Éù³Æ¶ÔÁ½ÊÐÕþ¸®·¢¶¯ÀÕË÷¹¥»÷
11ÔÂ27ÈÕ£¬ÍøÂç·¸×ï×éÖ¯RansomHubÉù³Æ¶ÔµÂ¿ËÈø˹ÖÝ¿ÆÅå¶ûÊм°Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»á·¢¶¯ÁËÀÕË÷Èí¼þ¹¥»÷£¬Òý·¢¹ã·º¹Ø×¢¡£¿ÆÅå¶ûÊÐÔâÊܹ¥»÷ºó£¬»¥ÁªÍø¡¢Í¼Êé¹Ý·þÎñ¡¢Ðí¿ÉºÍ¼ì²éƽ̨¼°Êз¨ÔºµÈ¶à¸öϵͳ̱»¾£¬¸øµ±µØ¾ÓÃñ´øÀ´ÑÏÖØÀ§ÈÅ¡£¾¡¹ÜÊÐÕþ¸®Å¬Á¦»Ö¸´£¬µ«Ö±ÖÁ11ÔÂÏÂÑ®£¬²¿ÃÅÊÐÕþÔËÓª²Å½Ðø»Ö¸´¡£Í¬Ê±£¬Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»áÒ²³ÂËßÆä¼¼ÊõϵͳÔâµ½¹¥»÷£¬µç»°Ïß·Öжϣ¬ÕýÔÚŬÁ¦È·¶¨ÐÅϢй¶Çé¿ö¡£RansomHub½ñÄêѸËÙáÈÆð£¬ÒѶԻú³¡¡¢Ò½ÁÆ»ú¹¹¡¢ÖÆÔ칫˾ºÍÒªº¦»ù´¡ÉèÊ©µÈÊý°Ù¸ö×éÖ¯·¢¶¯¹¥»÷¡£×Ô2Ô·ÝÒÔÀ´£¬ÒÑÓÐÔ¼210¸ö×éÖ¯³ÉΪÆäÊܺ¦Õß¡£¸Ã×éÖ¯×î³õ·ºÆðÔÚÁªºÏ½¡¿µ¼¯ÍÅÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó£¬ËæºóÒòÁíÒ»ÀÕË÷Èí¼þÍŻﵹ±Õ¶ø׳´ó£¬¶ÔÊý¾Ý½øÐгöÊÛ¡£½ñÄ꣬RansomHub»¹¹¥»÷Á˶àÆð±¸ÊÜÖõÄ¿µÄÄ¿±ê£¬°üÂÞµçОÞÍ·Frontier¡¢Rite Aid¡¢Ó¢¹úÅÄÂôÐÐChristie¡¯sµÈ¡£
https://therecord.media/ransomhub-cybercrime-coppell-texas-minneapolis-parks-agency
4. ÈûÂ׸ǵÙÐж¯£º·ÇÖÞÖ´·¨»ú¹¹ÑÏÀ÷¹¥»÷ÍøÂç·¸×ï
11ÔÂ26ÈÕ£¬·ÇÖÞÖ´·¨»ú¹¹ÔÚ¹ú¼ÊÐ̾¯×éÖ¯ºÍ·ÇÖÞÐ̾¯×éÖ¯µÄе÷Ï£¬ÓÚ9ÔÂ2ÈÕÖÁ10ÔÂ31ÈÕÆڼ俪չÁËÃûΪ¡°ÈûÂ׸ǵÙÐж¯¡±µÄ¹¥»÷ÍøÂç·¸×ï»î¶¯¡£´Ë´ÎÐж¯Õë¶ÔÀÕË÷Èí¼þ¡¢ÉÌÒµµç×ÓÓʼþй¶¡¢Êý×ÖÀÕË÷ºÍÍøÂçթƵȷ¸×ïÐÐΪ£¬Éæ¼°19¸ö·ÇÖÞ¹ú¼Ò£¬¹²´þ²¶ÁË1006ÃûÏÓÒÉÈË£¬´Ý»ÙÁË134089¸ö¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç¡£¾ÝÊӲ죬ÕâЩ·¸×ï»î¶¯ÓëÖÁÉÙ35224ÃûÒÑÈ·ÈÏÉí·ÝµÄÊܺ¦ÕßÓйأ¬Ôì³ÉÁ˽ü1.93ÒÚÃÀÔªµÄ¾¼ÃËðʧ£¬ÆäÖÐÈûÂ׸ǵÙÐж¯×·»ØÁËԼĪ4400ÍòÃÀÔª¡£Ðж¯ÖеÄÁÁµã°üÂÞ¿ÏÄáÑÇÆÆ»ñÒ»ÆðÍøÉÏÐÅÓÿ¨Õ©Æ°¸£¬ÈûÄÚ¼Ó¶ûµ·»ÙÒ»ÆðÅÓÊÏƾ֣¬ÄáÈÕÀûÑÇ´þ²¶Ò»ÃûʵʩÍøÉÏͶ×ÊթƵÄÄÐ×Ó£¬¿¦Âó¡ÆÆ»ñ¶àÌõÀíÓªÏúƾ֣¬ÒÔ¼°°²¸çÀµ·»ÙÒ»¸öÐéÄâ¶Ä³¡¹ú¼Ê¼¯ÍÅ¡£¼ÓÈë´Ë´ÎÐж¯µÄ¹ú¼Ò»¹Óа¢¶û¼°ÀûÑÇ¡¢±´Äþ¡¢¿ÆÌصÏÍß¡¢¸Õ¹ûÃñÖ÷¹²ºÍ¹ú¡¢¼ÓÅî¡¢¼ÓÄÉ¡¢Ã«ÀïÇó˹¡¢ÄªÉ£±È¿Ë¡¢Â¬Íú´ï¡¢ÄÏ·Ç¡¢Ì¹É£ÄáÑÇ¡¢Í»Äá˹¡¢ÔÞ±ÈÑǺͽò°Í²¼Î¤¡£
https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/
5. Matrix·¢¶¯´ó¹æÄ£DDoS¹¥»÷£¬ÀûÓÃÎïÁªÍøºÍÆóҵ©¶´
11ÔÂ26ÈÕ£¬Äþ¾²Ñо¿ÈËÔ±·¢ÏÖÁËÒ»³¡ÓÉÃûΪMatrixµÄÍþвÐÐΪÕß³ïıµÄ´ó¹æÄ£ÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷»î¶¯£¬¸Ã»î¶¯ÀûÓÿɷÃÎʵŤ¾ßÕë¶ÔÎïÁªÍøÉ豸ºÍÆóÒµ·þÎñÆ÷¡£MatrixµÄ¹¥»÷¿ò¼Ü¾¹ýÏêϸ·ÖÎö£¬Ö÷ÒªÀûÓû¥ÁªÍøÁ¬½ÓÉè±¹ØÁ¬Ä©¶´ºÍ´íÎóÅäÖã¬Í¨¹ý±©Á¦¹¥»÷¡¢Èõƾ֤ºÍÒÑ֪©¶´¹¹½¨½©Ê¬ÍøÂç¡£¹¥»÷µÄÖ÷ÒªÌØÕ÷°üÂÞÕë¶Ô·ÓÉÆ÷¡¢DVRºÍIPÉãÏñ»ú¡¢ÆóÒµÐÒéºÍÎïÁªÍøÉ豸µÄ©¶´ÀûÓá£ÕâЩ¹¥»÷ÑÏÖØÒÀÀµÄ¬ÈÏ»òÈõÃÜÂ룬ǿµ÷ÁËδÄܽÓÄÉ»ù±¾Äþ¾²´ëÊ©»áʹÉ豸ÃæÁÙÈëÇֵķçÏÕ¡£MatrixµÄÄ¿±ê°üÂÞÔÆ·þÎñÌṩÉÌ¡¢Ð¡ÐÍÆóÒµºÍÎïÁªÍøÃܼ¯µØÓò£¬ÊÜÓ°ÏìµÄÉ豸¿ÉÄܶà´ï3500Íǫ̀¡£MatrixʹÓÃÁËÀ´×ÔGitHubµÈƽ̨µÄ½Å±¾ºÍ¹¤¾ß£¬²¢Í¨¹ýTelegram½«·þÎñ»õ±Ò»¯£¬ÌṩDDoS¹¥»÷¼Æ»®¡£¾¡¹ÜMatrixȱ·¦ÏȽø¹¦Ð§£¬µ«ÕâЩ¹¤¾ßµÄ×é×°ºÍ²Ù×÷¶¼·Ç³£ÈÝÒ×£¬ÏÔʾ³öµÍÅÓ´óˮƽ¼ÓÈëÕßËù´øÀ´µÄ·çÏÕÔ½À´Ô½´ó¡£
https://www.infosecurity-magazine.com/news/ddos-campaign-exploits-iot-devices/
6. Array Networks SSL VPN ²úÎïÖеÄ©¶´Õý±»»ý¼«ÀûÓÃ
11ÔÂ26ÈÕ£¬ÃÀ¹úÍøÂç·ÀÓù»ú¹¹CISAÊÕµ½Ö¤¾Ý±íÃ÷£¬ºÚ¿ÍÕýÔÚ»ý¼«ÀûÓÃSSL VPN²úÎïArray Networks AGºÍvxAG ArrayOSÖеÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¬¸Ã©¶´±»×·×ÙΪCVE-2023-28461£¬ÑÏÖØÐÔÆÀ·Ö¸ß´ï9.8£¬Òѱ»ÁÐÈëCISAµÄÒÑÖªÀûÓ鶴Ŀ¼ÖС£´Ë©¶´´æÔÚÓÚÒ×Êܹ¥»÷µÄURLÖУ¬ÊÇÒ»¸öÉí·ÝÑéÖ¤²»Í×ÎÊÌ⣬ÔÊÐíÔÚArray AGϵÁкÍvxAG 9.4.0.481¼°¸üÔç°æ±¾ÖÐÖ´ÐÐÔ¶³Ì´úÂë¡£Array NetworksÔÚ©¶´Åû¶һÖܺóÐû²¼ÁËÐÞ¸´°æ±¾Array AG 9.4.0.484¡£Array NetworksµÄSSL VPN²úÎﱻȫÇòÁè¼Ý5000¸ö¿Í»§Ê¹Ó㬰üÂÞÆóÒµ¡¢·þÎñÌṩÉ̺ÍÕþ¸®»ú¹¹¡£CISA½¨ÒéËùÓÐÁª°î»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯ÔÚ12ÔÂ16ÈÕ֮ǰӦÓÃÄþ¾²¸üлò½ÓÄÉ»º½â´ëÊ©£¬·ñÔòӦֹͣʹÓøòúÎï¡£Äþ¾²¸üпÉͨ¹ýArrayÖ§³ÖÃÅ»§»ñÈ¡£¬µ«¹©Ó¦ÉÌÌṩµÄ»º½â´ëÊ©¿ÉÄÜ»á¶Ô¿Í»§¶ËÄþ¾²¹¦Ð§·¢Éú¸ºÃæÓ°Ï죬Òò´Ë×éÖ¯Ó¦Ê×ÏȲâÊÔÆäЧ¹û¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-bug-in-array-networks-ssl-vpn-products/