ÐÂÐÍFireScamÐÅÏ¢ÇÔÈ¡¼äµýÈí¼þαװ³ÉTelegram Premium
Ðû²¼Ê±¼ä 2025-01-061. ÐÂÐÍFireScamÐÅÏ¢ÇÔÈ¡¼äµýÈí¼þαװ³ÉTelegram Premium
1ÔÂ4ÈÕ£¬Ò»ÖÖÃûΪ¡°FireScam¡±µÄÐÂÐÍ Android ¶ñÒâÈí¼þÕýÔÚͨ¹ý GitHub ÉϵĵöÓãÍøÕ¾ÒÔ Telegram Ó¦Ó÷¨Ê½µÄ¸ß¼¶°æ±¾½øÐÐÁ÷´«£¬ÕâЩÍøվģ·ÂÁ˶íÂÞ˹Òƶ¯É豸ӦÓ÷¨Ê½Êг¡ RuStore¡£ÕâЩµöÓãÍøÕ¾ÀûÓöíÂÞ˹Óû§¶ÔÒƶ¯Èí¼þ·ÃÎÊÊÜÏÞµÄÅä¾°£¬ÌṩֲÈëÆ÷Ä£¿éGetAppsRu.apk£¬¸ÃÄ£¿éʹÓÃDexGuard»ìÏýÒÔÌӱܼì²â²¢»ñÈ¡¶àÖÖȨÏÞ¡£Ëæºó£¬Ëü°²×°Ö÷ÒªµÄ¶ñÒâÈí¼þ¸ºÔØ¡°Telegram Premium.apk¡±£¬ÇëÇó¼à¿Ø֪ͨ¡¢¼ôÌù°åÊý¾Ý¡¢¶ÌÐź͵绰·þÎñµÈȨÏÞ¡£FireScamÖ´Ðк󣬻áÏÔʾһ¸öÆÛÆÐÔµÄTelegramµÇ¼ҳÃ棬ÇÔÈ¡Óû§Æ¾¾Ý£¬²¢ÓëFirebaseʵʱÊý¾Ý¿âͨÐÅ£¬ÉÏ´«±»µÁÊý¾Ý²¢×¢²áÊÜѬȾÉ豸¡£´ËÍ⣬Ëü»¹½¨Á¢³Ö¾ÃµÄWebSocketÁ¬½ÓÒÔÖ´ÐÐʵʱÃüÁ¼à¿ØÆÁÄ»»î¶¯±ä»¯¡¢µç×ÓÉÌÎñ½»Ò×ÒÔ¼°Óû§ÊäÈëºÍ¼ôÌù°åÄÚÈÝ£¬ÉõÖÁÀ¹½Ø×Ô¶¯Ìî´ÕÊý¾Ý¡£¾¡¹ÜÉÐδȷ¶¨FireScamµÄÔËÓªÕߣ¬µ«Ñо¿ÈËÔ±ÈÏΪËüÊÇÒ»ÖÖÅÓ´óÇÒ½ÓÄÉÏȽø¹æ±Ü¼¼ÊõµÄÍþв¡£Òò´Ë£¬Óû§Ó¦½÷É÷¿´´ýÀ´×ÔDZÔÚ²»ÊÜÐÅÈÎÀ´Ô´µÄÎļþºÍ²»ÊìϤµÄÁ´½Ó¡£
https://www.bleepingcomputer.com/news/security/new-firescam-android-data-theft-malware-poses-as-telegram-premium-app/
2. UpdraftPlus²å¼þÑÏÖØÄþ¾²Â©¶´CVE-2024-10957Æعâ
1ÔÂ4ÈÕ£¬È«ÇòÓÐÁè¼Ý300Íò¸öWordPressÍøվʹÓõÄUpdraftPlus±¸·ÝºÍǨÒƲå¼þÖз¢ÏÖÁËÒ»¸öÑÏÖØÄþ¾²Â©¶´£¬±àºÅΪCVE-2024-10957£¬CVSSÆÀ·ÖΪ8.8¡£¸Ã©¶´´æÔÚÓÚ²å¼þµÄrecursive_unserialized_replaceº¯ÊýÖУ¬ÓÉÓÚδÕýÈ·´¦Öò»ÊÜÐÅÈεÄÊäÈë·´ÐòÁл¯£¬¿ÉÄܵ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÀûÓÃPHP¹¤¾ß×¢È멶´¡£¾¡¹ÜUpdraftPlus×Ô¼ºÃ»ÓÐÒÑÖªµÄPHP¹¤¾ßPOPÁ´£¬µ«ÆäËûÒ×Êܹ¥»÷µÄ²å¼þ»òÖ÷Ìâ¿ÉÄÜʹ¹¥»÷ÕßÄܹ»É¾³ýÈÎÒâÎļþ¡¢·ÃÎÊÃô¸ÐÊý¾Ý»òÖ´ÐÐÈÎÒâ´úÂë¡£ÖØÒªµÄÊÇ£¬´Ë©¶´ÐèÒª¹ÜÀíÔ±ÔÚ²å¼þÄÚÖ´ÐÐËÑË÷ºÍÌæ»»²Ù×÷²ÅÆø´¥·¢¶ñÒ⸺ÔØ¡£Äþ¾²Ñо¿Ô±WebbernautÒò·¢ÏÖ²¢ÂôÁ¦ÈεØÅû¶´Ë©¶´¶øÊܵ½ÔÞÓþ¡£´Ë©¶´Ó°ÏìUpdraftPlusµÄËùÓа汾£¬Ö±ÖÁ1.24.11°æ£¬´óÁ¿WordPressÍøÕ¾¿ÉÄÜÃæÁÙ·çÏÕ¡£UpdraftPlusÍŶÓÒÑÔÚ1.24.12°æ±¾Öнâ¾öÁË´Ë©¶´£¬½¨ÒéËùÓÐÓû§Á¢¼´¸üÐÂÖÁ¸Ã°æ±¾¡£
https://securityonline.info/cve-2024-10957-exposes-over-3-million-wordpress-sites-to-unauthenticated-php-object-injection-exploits/
3. NessusÊðÀíÒò¸üдíÎóÏÂÏߣ¬TenableÒªÇó¿Í»§ÊÖ¶¯Éý¼¶»Ö¸´
1ÔÂ3ÈÕ£¬Tenable¹«Ë¾½üÆÚÔâÓöÁËÒ»´ÎÈí¼þ¸üдíÎ󣬵¼ÖÂÆäNessus©¶´É¨ÃèÆ÷ÊðÀíÔÚ12ÔÂ31ÈÕ¶Ô²¿ÃÅÓû§ÏÂÏß¡£´Ë´ÎʼþÓ°ÏìÁËÈ«Çò¶à¸öµØÓò£¬ÌرðÊÇÄÇЩ¸üÐÂÖÁNessus Agent°æ±¾10.8.0ºÍ10.8.1µÄϵͳ¡£ÎªÁËÓ¦¶ÔÕâÒ»ÎÊÌ⣬TenableѸËÙ³·ÏÂÁËÓÐÎÊÌâµÄ°æ±¾£¬²¢Ðû²¼ÁËа汾10.8.2ÒÔÐÞ¸´Â©¶´¡£È»¶ø£¬ÊÜÓ°ÏìµÄ¿Í»§ÐèÒªÊÖ¶¯Éý¼¶µ½Ð°汾»ò½µ¼¶µ½10.7.3°æ±¾²ÅÆøʹÊðÀíÖØÐÂÉÏÏß¡£Èç¹ûʹÓÃÁËÊðÀíÅäÖÃÎļþ½øÐÐÉý¼¶»ò½µ¼¶£¬»¹ÐèÒªÌرðÖØÖòå¼þ¡£Tenable¼Æ»®»Ö¸´²å¼þ¹©¸å£¬²¢ÌáÐÑËùÓÐÔËÐÐÊÜÓ°Ïì°æ±¾µÄ¿Í»§¾¡¿ì½ÓÄÉÐж¯¡£´Ë´ÎʼþËäδÔì³É´óÃæ»ýÖжϣ¬µ«ÀàËƵÄÎÊÌâÔÚ2024Äê7ÔÂÓÉCrowdStrike Falcon¸üдíÎóÒý·¢Ê±£¬Ôøµ¼ÖÂÈ«Çò¶à¸ö×éÖ¯ºÍ·þÎñµÄ̱»¾£¬°üÂÞÒøÐС¢º½¿Õ¹«Ë¾µÈÖØÒª»ú¹¹¡£ÕâÔÙ´ÎÌáÐÑÁËÍøÂçÄþ¾²¸üеÄÖØÒªÐÔºÍDZÔÚ·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/bad-tenable-plugin-updates-take-down-nessus-agents-worldwide/
4. Atos·ñÈÏSpace BearsÀÕË÷Èí¼þÍÅ»ïÈëÇÖÆäÊý¾Ý¿â
1ÔÂ3ÈÕ£¬·¨¹ú¿Æ¼¼¾ÞÍ·Atos£¬×Ô³ÆÅ·ÖÞÁìÏȵÄÍøÂçÄþ¾²¡¢ÔƼÆËãºÍ¸ßÐÔÄܼÆË㹫˾£¬½üÈÕ·ñÈÏÁËSpace BearsÀÕË÷Èí¼þÍÅ»ï¹ØÓÚÈëÇÖÆäÊý¾Ý¿âµÄÖ¸¿Ø¡£Space BearsÊÇÒ»¸öÏà¶Ô½ÏеÄÍøÂç·¸×ï×éÖ¯£¬Ê¹ÓÃË«ÖØÀÕË÷ÊֶΣ¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢ÍþвÔÚÍøÉÏй¶£¬ÒÔÆÈʹÊܺ¦ÕßÖ§¸¶Êê½ð¡£12ÔÂ28ÈÕ£¬Space BearsÉù³ÆÈëÇÖÁËAtosÍøÂç²¢¼Æ»®Ðû²¼ÇÔÈ¡µÄ¹«Ë¾Êý¾Ý¿â¡£È»¶ø£¬AtosÔÚ12ÔÂ29ÈÕÌåÏÖ¿ª¶Ë·ÖÎöδ·¢ÏÖÈκÎÈëÇÖ»òÀÕË÷Èí¼þÓ°ÏìµÄÖ¤¾Ý£¬Ò²Î´ÊÕµ½Êê½ðÒªÇó¡£Atos½øÒ»²½Ö¸³ö£¬Space Bearsʵ¼Ê¹¥»÷µÄÊÇÓëAtosÎ޹صÄÍⲿµÚÈý·½»ù´¡ÉèÊ©£¬ËäÈ»´æ´¢ÁËÌá¼°AtosµÄÊý¾Ý£¬µ«²¢²»ÊÜAtos¹ÜÀí»ò±£»¤¡£AtosÇ¿µ÷ÆäÔÚÈ«ÇòÓµÓÐÁè¼Ý6,500ÃûÄþ¾²×¨¼ÒºÍ17¸öÐÂÒ»´úÄþ¾²ÔËÓªÖÐÐÄ£¬È«ÌìºòÔËÓªÒÔÈ·±£¼¯Íż°Æä¿Í»§µÄÄþ¾²¡£
https://www.bleepingcomputer.com/news/security/french-govt-contractor-atos-denies-space-bears-ransomware-attack-claims/
5. ÀïÊ¿Âú´óѧҽѧÖÐÐÄÔâÀÕË÷Èí¼þ¹¥»÷£¬67ÍòÓàÈËÊý¾Ýй¶
1ÔÂ3ÈÕ£¬Å¦Ô¼ÀïÊ¿Âú´óѧҽѧÖÐÐÄ£¨RUMC£©ÔÚ2023Äê5ÔÂÔâÊÜÁËÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÒ½Ôº·þÎñÖжÏÊýÖÜ£¬²¢Ó°ÏìÁË674,033ÈË¡£¾¡¹ÜÃæÁÙÌôÕ½£¬Ò½ÔºÈÔά³ÖÁËÈ«ÃæµÄ»¼Õß·þÎñ£¬²¢½«Ò¹¼ä´´É˺ÍÖз绤ÀíµÄÖжÏÏÞÖÆÔÚ×îµÍÏ޶ȡ£ÔÚÍøÂçÄþ¾²¹«Ë¾µÄ×ÊÖúÏ£¬Ò½ÔºÅ¬Á¦»Ö¸´ÏµÍ³²¢ÆÀ¹À¹¥»÷·¶Î§£¬Í¬Ê±È·Èϵç×Ó½¡¿µ¼Ç¼ϵͳδÊÜÓ°Ï죬µ«ÆäËûÎļþ¿ÉÄÜÔÚ¹¥»÷Æڼ䱻·ÃÎÊ»òɾ³ý¡£RUMCÅû¶ÁËÒ»ÆðÊý¾Ýй¶Ê¼þ£¬¿ÉÄÜÉæ¼°°üÂÞ¸öÈ˺ͽ¡¿µÐÅÏ¢µÄÃô¸ÐÎļþ£¬ÈçÐÕÃû¡¢Éç»áÄþ¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢½ðÈÚÕË»§ÐÅÏ¢µÈ¡£Ò½ÔºÒÑ֪ͨÊÜÓ°ÏìµÄ¸öÈ˲¢½¨ÒéËûÃǽÓÄɱ£»¤´ëÊ©£¬Í¬Ê±ÎªÉç»áÄþ¾²ºÅÂëй¶µÄ¸öÈËÌṩ12¸öÔµÄÃâ·ÑÐÅÓüà¿Ø¡£¾¡¹ÜÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦£¬µ«RUMCÒÑÏòÏà¹Ø²¿ÃÅͨ±¨Á˸Ãʼþ£¬²¢¼û¸æÃÀ¹úÎÀÉúÓ빫ÖÚ·þÎñ²¿´Ë´ÎÊý¾Ýй¶µÄ¾ßÌåÈËÊý¡£
https://securityaffairs.com/172641/data-breach/richmond-university-medical-center-data-breach.html
6. Nikki - UniversalÔâÀÕË÷Èí¼þ¹¥»÷£¬761.8GBÊý¾Ýй¶
1ÔÂ4ÈÕ£¬Nikki - UniversalÓÐÏÞ¹«Ë¾ÊÇÒ»¼ÒÖªÃûµÄ»¯Ñ§ÖÆÔìÉÌ£¬ÓÚ2024Äê12ÔÂ27ÈÕ֤ʵÔâÊÜÁËÀ´×ÔHunters InternationalÀÕË÷Èí¼þ×éÖ¯µÄÅÓ´ó¹¥»÷¡£´Ë´Î¹¥»÷·¢ÉúÔÚ12ÔÂ22ÈÕ£¬µ¼Ö¹«Ë¾²¿ÃÅ·þÎñÆ÷Éϵĵç×ÓÊý¾Ý±»¼ÓÃÜ£¬Éæ¼°Êý¾ÝÁ¿¸ß´ï761.8GB£¬°üÂÞ476,342¸öÎļþ¡£Hunters InternationalÒÔÆ伤½øÊÖ¶ÎÖø³Æ£¬Éù³ÆÈôδÔڹ涨ÈÕÆÚ£¨2025Äê1ÔÂ10ÈÕ£©Ç°ÊÕµ½Êê½ð£¬½«¹ûÈ»ËùÓÐÇÔÈ¡µÄÊý¾Ý¡£Nikki - UniversalËäѸËÙÏìÓ¦²¢»ý¼«ÊӲ죬µ«ÈÔδÄÜ×èÖ¹¹¥»÷´øÀ´µÄË𺦡£Hunters InternationalµÄ¼ÓÈë½øÒ»²½¼Ó¾çÁ˾ÖÊƵÄÅÓ´óÐÔ£¬ÆäÐû³ÆÒÑ»ñÈ¡²¢¼ÓÃÜÊý¾Ý£¬¶ÔNikki - UniversalµÄÍøÂçÄþ¾²×é³ÉÑÏÖØÍþв£¬²¢¿ÉÄÜÒý·¢¶àÖÖÍøÂçÍþвÓëÉùÓþ·çÏÕ¡£ÍøÂçÄþ¾²×¨¼ÒÔ¤²â£¬Ëæ×ÅÈ˹¤ÖÇÄܺÍÁ¿×Ó¼ÆËãµÄÉú³¤£¬2025ÄêÍøÂç¹¥»÷µÄÅÓ´ó¶ÈºÍƵÂʽ«½øÒ»²½Ôö¼Ó£¬ÒªÇó×éÖ¯±ØÐëÇ¿»¯·ÀÓù´ëÊ©¡£
https://cybersecuritynews.com/nikki-universal-cyber-attack/