ºÚ¿ÍIntelBrokerÉù³Æ¹¥ÆÆHPE£¬Ð¹Â¶Ãô¸ÐÊý¾Ý²¢ÍøÉϳöÊÛ
Ðû²¼Ê±¼ä 2025-01-211. ºÚ¿ÍIntelBrokerÉù³Æ¹¥ÆÆHPE£¬Ð¹Â¶Ãô¸ÐÊý¾Ý²¢ÍøÉϳöÊÛ
1ÔÂ19ÈÕ£¬ºÚ¿ÍIntelBrokerÉù³ÆÒÑÀÖ³ÉÈëÇÖ»ÝÆÕÆóÒµ(HPE)£¬Ò»¼Ò×ܲ¿Î»ÓÚÃÀ¹úµÂ¿ËÈø˹ÖÝÐÝ˹¶ÙµÄÈ«ÇòÐÔ¼¼Êõ½â¾ö·½°¸ÌṩÉÌ£¬²¢Ð¹Â¶ÁË°üÂÞÔ´´úÂë¡¢Ö¤ÊéºÍ¸öÈËÉí·ÝÐÅÏ¢(PII)ÔÚÄÚµÄÃô¸ÐÊý¾Ý£¬ÕâЩÊý¾ÝÄ¿Ç°ÔÚÍøÉϳöÊÛ¡£IntelBrokerÒªÇóÒÔÃÅÂÞ±Ò(XML)¼ÓÃÜ»õ±ÒÖ§¸¶£¬ÒÔ±£³ÖÄäÃûºÍ²»ÐÐ×·×Ù¡£¾Ý³Æ£¬´Ë´ÎÈëÇÖÊÇÖ±½Ó¹¥»÷HPE»ù´¡ÉèÊ©µÄ½á¹û£¬²»Éæ¼°µÚÈý·½·ÃÎÊȨÏÞ¡£ºÚ¿Í·ÖÏíµÄÊý¾ÝÊ÷ºÍ½ØͼËƺõ֤ʵÁËÔ´´úÂ롢˽ÓÐGitHub´æ´¢¿â¡¢Docker¹¹½¨¡¢Ö¤ÊéÒÔ¼°Óû§Êý¾ÝµÈÃô¸ÐÐÅÏ¢µÄй¶¡£Èç¹û¾»ÝÆÕ֤ʵ£¬Õâ¿ÉÄÜ×é³ÉÒ»´ÎÖØ´óÄþ¾²Ê¼þ¡£ÖµµÃ×¢ÒâµÄÊÇ£¬HPEºÍHP Inc.ÊÇÁ½¼Ò²îÒìµÄ¹«Ë¾£¬Ç°ÕßרעÓÚÆóÒµ¼¶IT½â¾ö·½°¸£¬ºóÕßÔòרעÓÚÏû·Ñ²úÎï¡£IntelBroker´ËÇ°ÒÑÉæÏÓ¶àÆðÊý¾Ýй¶Ê¼þ£¬°üÂÞÈëÇÖ˼¿Æ¡¢Åµ»ùÑǺÍAMDµÈÖªÃûÆóÒµ¡£
https://hackread.com/hackers-claim-hewlett-packard-data-breach-sale/
2. ChatGPTÅÀ³æ©¶´»òÖÂDDoS¹¥»÷
1ÔÂ19ÈÕ£¬µÂ¹úÄþ¾²Ñо¿Ô±Benjamin Flesch·¢ÏÖOpenAIµÄChatGPT API´æÔÚÒ»¸öDZÔÚµÄÄþ¾²Â©¶´£¬¿ÉÄܱ»ÀûÓÃÀ´ÌᳫÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷¡£Í¨¹ýÏòChatGPT API·¢ËÍ°üÂÞ´óÁ¿ÂÔÓвîÒ쵫ָÏòͬһÍøÕ¾µÄURLÁбíµÄHTTP POSTÇëÇ󣬹¥»÷Õß¿ÉÒÔ´¥·¢ChatGPTÅÀ³æ¶ÔÕâЩÍøÕ¾µÄƵ·±·ÃÎÊ£¬´Ó¶ø¶ÔÄ¿±êÍøÕ¾Ôì³ÉѹÁ¦£¬ÉõÖÁµ¼Ö·þÎñÖжϡ£FleschÖ¸³ö£¬ChatGPT APIÔÚ´¦ÖÃÕâЩÇëÇóʱ´æÔÚÖÊÁ¿È±ÏÝ£¬¼ÈûÓмì²éURLÁбíÖеÄÖظ´ÏҲûÓжÔURLÊýÁ¿½øÐÐÏÞÖÆ¡£ÕâÒâζ×Å£¬¼´Ê¹¹¥»÷ÕßÖ»·¢ËÍÉÙÁ¿ÇëÇó£¬Êܺ¦ÕßÒ²¿ÉÄÜÊÕµ½´óÁ¿À´×Ô²îÒìIPµØÖ·µÄ·ÃÎÊÇëÇ󣬵¼ÖÂDDoSÖ¢×´¡£´ËÍ⣬Flesch»¹Ìáµ½£¬Õâ¸öAPI»¹¿ÉÄÜÊܵ½ÌáʾעÈë¹¥»÷µÄÓ°Ïì¡£Ëûͨ¹ý¶àÖÖÇþµÀÏòOpenAI³ÂËßÁËÕâ¸ö©¶´£¬µ«ÉÐδµÃµ½»Ø¸´¡£FleschÖÊÒÉΪʲôOpenAIûÓÐʵÏÖ¼òµ¥µÄÑéÖ¤Âß¼À´·ÀÖ¹ÕâÖÖÀÄÓ㬲¢ÍƲâÕâ¿ÉÄÜÊÇOpenAIµÄAIÊðÀíÏîÄ¿µÄÒ»¸öʾÀý£¬¶øÕâ¸öAIÊðÀíÔÚ´¦ÖÃÇëÇóʱÏÔȻȱ·¦ÄÚÖõÄÄþ¾²ÐÔ¡£ËûÈÏΪ£¬ÕâÖÖÉè¼ÆȱÏÝÔÚ¾Ñ鸻ºñµÄ¹è¹È¹¤³Ìʦ¿´À´ÊDz»ÐÐÏëÏóµÄ£¬ÒòΪÀàËƹȸèÕâÑùµÄÅÀ³æÒѾ´æÔÚ¶àÄ꣬¶øÇÒ¶¼ÓÐÏÞÖƶÔͬһÍøÕ¾µÄÇëÇóÁ¿µÄ»úÖÆ¡£
https://www.theregister.com/2025/01/19/openais_chatgpt_crawler_vulnerability/
3. CL-UNK-0979ÀûÓÃIvanti©¶´»ñÈ¡ÍøÂç·ÃÎÊȨÏÞ
1ÔÂ18ÈÕ£¬Palo Alto Networks Ðû²¼ÁËÒ»·ÝÍþв¼ò±¨£¬½ÒʾÁË Ivanti ²úÎïÖдæÔÚµÄÁ½¸öÑÏÖØ©¶´£ºCVE-2025-0282 ºÍ CVE-2025-0283¡£ÕâÁ½¸ö©¶´Ó°Ïì Ivanti µÄ Connect Secure¡¢Policy Secure ºÍ ZTA Íø¹ØÉ豸£¬ÕâЩÉ豸³£±»ÓÃÓÚʵÏÖÔ¶³ÌÍøÂçÁ¬½Ó¡£CVE-2025-0282 ÊÇÒ»¸öÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ý·¢ËÍÌØÖÆÇëÇóʵÏÖÔ¶³Ì´úÂëÖ´ÐеÄ©¶´£¬±»ÆÀΪÑÏÖؼ¶±ð£¬CVSS ÆÀ·ÖΪ 9.0¡£¶ø CVE-2025-0283 Ôòʹµ±µØ¾¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»ÌáÉýȨÏÞ£¬ÆäÑÏÖØÐÔÆÀ¼¶Îª¸ß£¬CVSS ÆÀ·ÖΪ 7.0¡£¾ÝÍøÂçÄþ¾²×éÖ¯¼Ç¼£¬°üÂÞ Mandiant¡¢Watchtowr Labs ºÍ Palo Alto Networks ÔÚÄڵĶà¼Ò»ú¹¹ÒÑÊӲ쵽¹¥»÷ÕßÀûÓà CVE-2025-0282 Éø͸ÄÚ²¿ÍøÂç¡£¹¥»÷»î¶¯±»×·×ÙΪ CL-UNK-0979£¬Éæ¼°Ëĸö½×¶Î£º³õʼ·ÃÎÊ¡¢Æ¾Ö¤ÊÕ¼¯ºÍºáÏòÒƶ¯¡¢·ÀÓùÌÓ±ÜÒÔ¼°³Ö¾ÃÐÔ¡£¹¥»÷ÕßʹÓÃÁË°üÂÞ×Ô½ç˵ Perl ½Å±¾ ldap.pl¡¢ÄÚ´æת´¢¹¤¾ßºÍ DLL ²à¼ÓÔصÈÔÚÄڵĶàÖÖÃüÁîºÍ¿ØÖÆ·þÎñÆ÷¼°¼¼Êõ¡£Ivanti ÒÑÐû²¼²¹¶¡£¬²¢½¨ÒéÁ¢¼´¸üÐÂËùÓÐÊÜÓ°ÏìµÄϵͳ£¬Í¬Ê±ÃãÀøʹÓÃÍêÕûÐÔ¼ì²é¹¤¾ß (ICT) ¼à¿Ø¿ÉÒɻ¡£
https://securityonline.info/cl-unk-0979-exploit-zero-day-flaw-in-ivanti-connect-secure-to-gain-access-to-networks/
4. Õ©ÆÕßÀûÓÃTruth SocialÌᳫÍøÂçµöÓãºÍÆÛÕ©»î¶¯
1ÔÂ19ÈÕ£¬Truth SocialÊÇÒ»¸öÓÉÌØÀÊÆÕýÌåÓë¿Æ¼¼¼¯ÍÅÔÚ2022ÄêÍƳöµÄÉ罻ýÌåƽ̨£¬Èç½ñÈ´³ÉΪÁËÕ©Æ·Ö×ÓµÄÖ÷ҪĿ±ê¡£NetcraftµÄгÂËß½ÒʾÁËÕ©ÆÕßÈçºÎÀûÓøÃƽ̨µÄ¹¦Ð§ºÍÓû§ÐÅÈÎÀ´³ïı´ó¹æÄ£ÍøÂç¹¥»÷¡£¸Ãƽ̨¿ìËÙµÄÓû§Ôö³¤ºÍÒÔÉçÇøΪÖÐÐĵÄÉè¼ÆΪթÆÕßÌṩÁ˸»ºñµÄÐÅÏ¢À´Ô´£¬Ê¹ËûÃÇÄܹ»ÇáËÉʶ±ðºÍÁªÏµÆäËûÓû§¡£Í¬Ê±£¬Óû§¶Ôƽ̨¡°ÕæÏࡱµÄ¸ß¶ÈÐÅÈÎҲΪթÆÕßµÞÔìÁË·ÊÎÖµÄÍÁÈÀ£¬ÆäÖÐ87%µÄÓû§ÆÚÍûƽ̨ÉϵÄÐÂÎźÍÐÅÏ¢´ó¶àÊÇ׼ȷµÄ£¬ÕâÖÖ¹ý¶È×ÔÐÅÔö¼ÓÁËÊÜƵķçÏÕ¡£NetcraftÊӲ쵽ÁËһϵÁÐÕë¶ÔTruth SocialÓû§µÄÕ©ÆÐÐΪ£¬°üÂÞÍøÂçµöÓãÁ´½Ó¡¢Í¶×ÊթƺÍÔ¤¸¶·ÑթƵȣ¬ÉõÖÁÒ»ÌìÖ®ÄÚ¾ÍÄÜÊÕµ½40Ìõδ¾ÇëÇóµÄÕ©ÆÏûÏ¢¡£´ËÍ⣬թÆÕß»¹ÀûÓøÃƽ̨Èƹý´«Í³µÄµç×ÓÓʼþÄþ¾²´ëÊ©£¬½«Æä×÷ΪÖض¨Ïò¹¤¾ßÀ´ÖÆÖ¹±»·¢ÏÖ¡£Netcraft¾¯¸æ³Æ£¬¿¼Âǵ½È«Çòδ³ÂËßµÄʼþ£¬ÕâЩթÆÔì³ÉµÄʵ¼ÊËðʧ¿ÉÄܸߴïÊýÊ®ÒÚÉõÖÁÊýÍòÒÚÃÀÔª¡£ÎªÁËÓ¦¶ÔÕâЩÍþв£¬NetcraftÇ¿µ÷ÐèÒªÖƶ¨Ç¿´óµÄ¼ì²âºÍÇå³ý¼Æı£¬ÀûÓÃм¼ÊõÀ´±£»¤Ïû·ÑÕßÃâÊÜÉ˺¦¡£
https://securityonline.info/scammers-exploit-truth-social-to-launch-phishing-and-fraud-campaigns/
5. ÄÏÑÇÔâ¡°Tanzeem¡±¶ñÒâÈí¼þ¹¥»÷£¬DONOT APT×éÖ¯Á¬ÐøÍþв
1ÔÂ20ÈÕ£¬¾ÝCyber Security News±¨µÀ£¬CyfirmaµÄÍøÂçÄþ¾²ÍŶӽüÆÚ½Ò¶ÁËÒ»ÏîÕë¶ÔÄÏÑÇ£¬ÌرðÊÇÓ¡¶È¿ËʲÃ׶ûµØÓòÓû§µÄÅÓ´óAndroid¶ñÒâÈí¼þ»î¶¯¡£¸Ã¶ñÒâÈí¼þαװ³ÉÃûΪ¡°Tanzeem¡±µÄÁÄÌìÓ¦Óã¬ÒâͼÇÔÈ¡Ä¿±êÉ豸ÖеÄÃô¸ÐÊý¾Ý¡£¡°Tanzeem¡±ÔÚÎÚ¶û¶¼ÓïÖÐÒâΪ¡°×éÖ¯¡±£¬³£Óë¸ÃµØÓò¿Ö²À×éÖ¯ºÍÖ´·¨»ú¹¹Ïà¹ØÁª£¬ÌåÏÖÆäÕë¶ÔÌض¨¸öÈË»òÍÅÌå¡£´Ë¶ñÒâÈí¼þ¹éÊôÓÚ¾ßÓÐÓ¡¶ÈÅä¾°µÄ¡°DONOT¡±APT×éÖ¯¡£ËüÀûÓÃOneSignalƽ̨ÍÆËÍÍøÂçµöÓãÁ´½Ó½øÐÐÁ÷´«£¬°²×°ºóËäÍ£Ö¹ÔËÐУ¬µ«ÒÑÇëÇó¶àÏîÃô¸ÐȨÏÞ£¬Èçͨ»°¼Ç¼¡¢ÁªÏµÈË¡¢¶ÌÐÅ¡¢Îļþ´æ´¢ºÍλÖÃÊý¾Ý£¬²¢ÊÔͼ»ñÈ¡µç×ÓÓʼþºÍÓû§ÃûȨÏÞ¡£´ËÍ⣬¸Ã¶ñÒâÈí¼þ½ÓÄÉ»ìÏý¼¼ÊõÒþ²Ø´úÂ룬¾ß±¸Ã¶¾ÙÎļþ¡¢²¶×½¼üÅÌÊäÈë¡¢ÊÕ¼¯ÏµÍ³ÐÅÏ¢ºÍÆÁĻ¼ÖƵȹ¦Ð§¡£DONOT APT×éÖ¯ºã¾ÃÒÔÄÏÑÇÕþ¸®ºÍ¾üÊÂ×é֯ΪĿ±ê£¬´Ë´ÎÐж¯ÏÔʾÆäÕ½Êõ²»Í£Ñݱ䡣ÍøÂçÄþ¾²×¨¼Ò¾¯¸æ£¬¸Ã×éÖ¯¿ÉÄܼÌÐø¸ïй¥»÷ÒªÁ죬½¨ÒéÓû§°²×°ÐÂÓ¦ÓÃʱ±£³Ö½÷É÷£¬ÓÈÆäÊÇÃæ¶ÔÒªÇó´óÁ¿È¨ÏÞµÄÓ¦Óá£
https://cybersecuritynews.com/new-android-malware-mimics-chat-app/
6. ±´¶ûɼ¯ÍÅй¶ÁËÁè¼Ý15,000¸öFortiGate·À»ðǽÅäÖÃ
1ÔÂ20ÈÕ£¬±´¶ûɼ¯ÍÅй¶ÁËÁè¼Ý15,000¸öFortiGate·À»ðǽµÄÅäÖ㬶ÔÈ«ÇòʹÓÃÕâЩÉ豸µÄ×éÖ¯×é³ÉÁËÑÏÖØÍþв¡£´Ë´Îй©Ê¼þʹµÃ¹¥»÷Õß¿ÉÄÜ·ÃÎÊÃô¸Ðϵͳ²¢Èƹý·ÀÓù´ëÊ©£¬ÆäÖÐÃÀ¹ú¡¢Ó¢¹ú¡¢²¨À¼ºÍ±ÈÀûʱµÈµØÊÜÓ°Ïì×îΪÑÏÖØ¡£Ð¹Â¶µÄÐÅÏ¢°üÂÞÓû§Ãû¡¢ÃÜÂ루²¿ÃÅΪ´¿Îı¾£©¡¢É豸¹ÜÀíÊý×ÖÖ¤ÊéÒÔ¼°ËùÓзÀ»ðǽ¹æÔò£¬Îª¹¥»÷ÕßÌṩÁ˸»ºñµÄ¹¥»÷×ÊÔ´¡£Ì»Â¶µÄÓû§ÃûºÍÃÜÂë¿ÉÄܱ»Ö±½ÓÓÃÓÚ·ÃÎÊÍøÂçÉϵÄÃô¸Ðϵͳ£¬¶øй¶µÄ·À»ðǽÅäÖÃÔò¿ÉÄÜ̻¶ÄÚ²¿ÍøÂç½á¹¹£¬Ê¹¹¥»÷ÕßÄܹ»Ê¶±ð²¢ÀûÓÃÈõµã¡£´ËÍ⣬±»Ð¹Â¶µÄÊý×ÖÖ¤Êé¿ÉÄܵ¼ÖÂδ¾ÊÚȨµÄ·ÃÎÊ»òÔÚÄþ¾²Í¨ÐÅÆÚ¼äµÄÉí·Ýð³ä¡£¾¡¹ÜһЩ×éÖ¯ÔÚ2022ÄêÒѾÐÞ²¹ÁËÏà¹Ø©¶´£¨CVE-2022-40684£©£¬µ«ÓÉÓÚÕâÊÇÒ»¸öÁãÈÕ©¶´£¬¼ì²éÊÇ·ñ´æÔÚ±»ÈëÇֵļ£ÏóÈÔÈ»ÖÁ¹ØÖØÒª¡£ÎªÁ˼õÇá´ËÀàйÃÜ´øÀ´µÄ·çÏÕ£¬×éÖ¯Ó¦¸üÐÂÉ豸ºÍVPNƾ֤£¬ÊµÊ©Ç¿ÃÜÂë¼Æı£¬ÉóºË²¢ÖØÐÂÅäÖ÷À»ðǽ£¬ÂÖ»»ÊÜËðµÄÊý×ÖÖ¤Ê飬²¢È·¶¨×éÖ¯ÖÐÐÞ²¹Â©¶´µÄʱ¼ä±í¡£CloudSEKÌṩÁËÒ»¸öÓÐÓÃ×ÊÔ´£¬ÓÃÓÚ¼ì²éÍøÂçÊÇ·ñÊôÓÚ̻¶µÄIP·¶Î§£¬ÒÔ×ÊÖú×éÖ¯±£»¤ÍøÂç²¢½µµÍDZÔÚ·çÏÕ¡£
https://hackread.com/belsen-group-leaks-fortigate-firewall-configurations/