GFI KerioControl·À»ðǽÔâÑÏÖØÔ¶³Ì´úÂëÖ´ÐЩ¶´Íþв
Ðû²¼Ê±¼ä 2025-02-111. GFI KerioControl·À»ðǽÔâÑÏÖØÔ¶³Ì´úÂëÖ´ÐЩ¶´Íþв
2ÔÂ10ÈÕ£¬Áè¼ÝÒ»ÍòÁ½Ç§¸ö GFI KerioControl ·À»ðǽʵÀý±»·¢ÏÖ´æÔÚ±àºÅΪ CVE-2024-52875 µÄÑÏÖØÔ¶³Ì´úÂëÖ´ÐЩ¶´¡£KerioControl ÊÇÒ»¿îרΪÖÐСÐÍÆóÒµÉè¼ÆµÄÍøÂçÄþ¾²Ì×¼þ£¬¹¦Ð§°üÂÞ VPN¡¢´ø¿í¹ÜÀí¡¢³ÂËß¼à¿Ø¡¢Á÷Á¿¹ýÂË¡¢AV ±£»¤ºÍÈëÇÖ·ÀÓù¡£´Ë©¶´ÓÉÄþ¾²Ñо¿Ô± Egidio Romano£¨EgiX£©ÓÚ 2024 Äê 12 ÔÂÖÐÑ®·¢ÏÖ£¬²¢Õ¹Ê¾ÁË¿ÉÄܵÄÒ»¼ü RCE ¹¥»÷¡£¾¡¹Ü GFI Software ÒÑÔÚ 12 Ô 19 ÈÕÐû²¼ÁËÕë¶Ô¸ÃÎÊÌâµÄÄþ¾²¸üУ¨9.4.5 Patch 1 °æ±¾£©£¬µ«Æ¾¾Ý Censys Êý¾Ý£¬ÈýÖܺóÈÔÓдóÁ¿ÊµÀýδÐÞ¸´¡£Greynoise ÒѼì²âµ½ÀûÓø鶴µÄÖ÷¶¯¹¥»÷ʵÑ飬ּÔÚÇÔÈ¡¹ÜÀíÔ± CSRF ÁîÅÆ¡£Shadowserver Foundation ³ÂË߳ƣ¬Ä¿Ç°ÈÔÓÐ 12,229 ¸ö KerioControl ·À»ðǽÃæÁÙ´Ë©¶´Íþв£¬ÊÜÓ°ÏìµØÓò°üÂÞÒÁÀÊ¡¢ÃÀ¹ú¡¢Òâ´óÀû¡¢µÂ¹úµÈ¡£ÓÉÓÚ´æÔÚ¹ûÈ»µÄ©¶´Ö¤Ã÷£¨PoC£©£¬ÀûÓÃÃż÷¼«µÍ£¬ÉõÖÁ²»ÊìÁ·µÄºÚ¿ÍÒ²¿ÉÄܼÓÈë¶ñÒâ»î¶¯¡£Â©¶´ÔÒòÔÚÓÚÓû§ÊäÈëδµÃµ½Êʵ±ÇåÀí£¬¿ÉÄܱ»ÀûÓÃÖ´ÐÐ HTTP ÏìÓ¦²ð·Ö¹¥»÷£¬½ø¶ø¿ÉÄܵ¼Ö·´ÉäÐÍ¿çÕ¾µã½Å±¾£¨XSS£©ºÍÆäËû¹¥»÷¡£Òò´Ë£¬Ç¿ÁÒ½¨ÒéÉÐδӦÓøüеÄÓû§°²×° 2025 Äê 1 Ô 31 ÈÕÐû²¼µÄ KerioControl °æ±¾ 9.4.5 Patch 2£¬ÒÔÔöÇ¿Äþ¾²ÐÔ¡£
https://www.bleepingcomputer.com/news/security/over-12-000-keriocontrol-firewalls-exposed-to-exploited-rce-flaw/
2. HandalaºÚ¿Í×éÖ¯ÉæÏÓ¶ÔÒÔÉ«Áо¯·½·¢¶¯´ó¹æÄ£ÍøÂç¹¥»÷
2ÔÂ10ÈÕ£¬ÎÛÃûÕÑÖøµÄHandalaºÚ¿Í×éÖ¯£¬ÉæÏÓÓëÒÁÀÊÇ鱨»ú¹¹ÓйØÁª£¬½üÆÚÐû²¼¶ÔÒÔÉ«Áо¯²ì¶ÓÎé·¢¶¯ÁËÍøÂç¹¥»÷£¬Éù³ÆÀÖ³ÉÇÔÈ¡ÁË2.1TBµÄÃô¸ÐÊý¾Ý£¬°üÂÞÈËʼǼ¡¢ÎäÆ÷Çåµ¥¡¢Ò½ÁƺÍÐÄÀíµµ°¸µÈ£¬²¢¹ûÈ»Á÷´«ÁËÆäÖÐ35Íò·ÝÎļþ¡£¾¡¹ÜÒÔÉ«Áо¯·½·ñÈÏϵͳֱ½ÓÔâÈëÇÖ£¬µ«´Ë´ÎÊý¾Ýй¶Ê¼þ·¶Î§¹ã·º£¬Éæ¼°´óÁ¿Ãô¸ÐÐÅÏ¢£¬Èçµç×ÓÓʼþµØÖ·¡¢³Öǹ֤¡¢¾¯¹ÙÕÕƬºÍ¸öÈËÁªÏµ·½Ê½µÈ¡£Í¬Ê±£¬Handala»¹Ö¸¿ØÆä»ñÈ¡Á˾¯²ìµÄÐÄÀíÆÀ¹ÀµÈ˽ÈËÊý¾Ý£¬²¢ÇÖÈëÁËÒÔÉ«Áйú¼ÒÄþ¾²²¿µÄ·þÎñÆ÷¡£´Ë´ÎʼþÊÇHandalaÕë¶ÔÒÔÉ«ÁÐʵÌåʵʩÆÆ»µÐÔÍøÂçÐж¯µÄµäÐÍ°¸Àý£¬ÌرðÊÇÔÚÒÔÉ«ÁÐÓë¹þÂí˹³åÍ»Éý¼¶ºó£¬ÒÔÉ«ÁÐÒѳÉΪÒÁÀÊÍøÂçÐж¯µÄÖ÷ҪĿ±ê¡£HandalaµÄ»î¶¯Æµ·±£¬²»½öÉæÏÓ¼ÓÈëÕë¶ÔÒÔÉ«ÁÐ×éÖ¯ÍøÂçÄþ¾²ÈËÔ±µÄÍøÂçµöÓã»î¶¯£¬»¹Õë¶ÔÒÔÉ«ÁеÄSoreqºËÑо¿ÖÐÐÄ·¢¶¯ÀÕË÷Èí¼þ¹¥»÷£¬×î½üÓÖÈëÇÖÁËÒÔÉ«Áеç×Ó¹«Ë¾ÔËÓªµÄ½ô¼±¾¯±¨ÏµÍ³£¬Òý·¢´ó·¶Î§¿Ö»Å¡£¸Ã×éÖ¯ÔÚÌû×ÓÖм¥Ð¦ÒÔÉ«ÁУ¬Ç¿µ÷ÆäÀÖ³ÉÍ»ÆÆ·ÀÓù²¢½Ò¶ÃØÃÜ£¬ÖØÉêÆä¡°²»»áÍü¼Ç£¬²»»áÔÁ¡±µÄ¿ÚºÅ¡£
https://hackread.com/handala-hackers-israeli-police-breach-data-leak/
3. ¾¯·½´þ²¶ 4 Ãû Phobos ÀÕË÷Èí¼þÏÓÒÉÈË£¬²é·â 8Base ÍøÕ¾
2ÔÂ10ÈÕ£¬È«ÇòÖ´·¨Ðж¯¡°Phobos Aetor¡±Õë¶ÔPhobosÀÕË÷Èí¼þÍÅ»ïÕ¹¿ª£¬ÒÑÔÚÌ©¹úÆÕ¼ªµº´þ²¶ËÄÃûÅ·ÖÞºÚ¿ÍÏÓÒÉÈË£¬²¢²é·â8Base°µÍøÍøÕ¾¡£ÕâЩÏÓÒÉÈ˱»Ö¸¿Ø¶ÔÈ«ÇòÁè¼Ý1000ÃûÊܺ¦Õß½øÐÐÁËÍøÂç¹¥»÷£¬ÀÕË÷Á˼ÛÖµ1600ÍòÃÀÔªµÄ±ÈÌرҡ£´Ë´ÎÐж¯Éæ¼°¶à¸ö¹ú¼ÒºÍµØÓòµÄ¾¯·½ÐͬͻϮ£¬½É»ñÁ˵ç×ÓÉ豸ºÍ¼ÓÃÜ»õ±ÒÇ®°ü¡£8BaseÀÕË÷Èí¼þÍÅ»ï×Ô2022Äê3Ô½¨Á¢ÒÔÀ´£¬Ò»Ö±Ïà¶Ô¼Å¾²£¬Ö±µ½2023Äê6Ô¿ªÊ¼Ð¹Â¶Êܺ¦ÕßÊý¾Ý¡£¸ÃÍÅ»ï»áÈëÇÖÆóÒµÍøÂ磬ÇÔÈ¡Êý¾Ý²¢Ê¹ÓÃPhobosÀÕË÷Èí¼þ¼ÓÃÜÆ÷¼ÓÃÜÉ豸£¬ÒªÇóÖ§¸¶¸ß¶îÊê½ðÒÔ»»È¡½âÃÜÃÜÔ¿ºÍ²»Ðû²¼Êý¾ÝµÄÔÊÐí¡£ÖªÃûÊܺ¦Õß°üÂÞÈÕ±¾µç²úÖêʽ»áÉçºÍÁªºÏ¹ú¿ª·¢¼Æ»®Êð¡£´Ë´ÎÐж¯±íÃ÷£¬È«ÇòÖ´·¨²¿ÃÅÕýÔÚ¼ÓÇ¿ºÏ×÷¹¥»÷ÀÕË÷Èí¼þ·¸×ï¡£
https://www.bleepingcomputer.com/news/legal/police-arrests-4-phobos-ransomware-suspects-seizes-8base-sites/
4. Lee Enterprises±¨Òµ¼¯ÍÅÔâÍøÂç¹¥»÷ÖÂÔËÓªÖжÏ
2ÔÂ10ÈÕ£¬ÃÀ¹ú±¨Òµ¼¯ÍÅLee EnterprisesÔÚ2025Äê2ÔÂ3ÈÕÔâÊÜÁËÒ»´ÎÍøÂç¹¥»÷£¬µ¼ÖÂÆäÒµÎñÔËÓªÖжϡ£´Ë´Î¹¥»÷ÆÈʹ¸Ã¹«Ë¾¹Ø±ÕÁËÐí¶àÍøÂ磬ÈÅÂÒÁËÊýÊ®ÖÖ±¨Ö½µÄÓ¡Ë¢ºÍ¿¯ÐУ¬¶øÇÒʹµÃ¼ÇÕߺͱà¼ÎÞ·¨·ÃÎÊËûÃǵÄÎļþ¡£¸Ã¹«Ë¾ÔÚÏòÃÀ¹ú֤ȯ½»Ò×ίԱ»áÌá½»µÄÎļþÖÐÈ·ÈÏÁ˴˴ι¥»÷£¬²¢ÌåÏÖÕýÔÚÊÓ²ìÄÄЩÐÅÏ¢¿ÉÄÜÊܵ½Ó°Ïì¡£¶à¼ÒLee Enterprises³öÊéÎïÔÚÍøÕ¾¶¥²¿ÏÔʾά»¤ºá·ù£¬Ïò¶ÁÕßÖÂǸ²¢ÌåÏÖÕýÔÚŬÁ¦½â¾öÎÊÌâ¡£Lee EnterprisesÔÚ26¸öÖݳöÊé77·ÝÈÕ±¨ºÍ350·ÝÖÜ¿¯¼°×¨Òµ¿¯ÎӵÓÐÁè¼Ý120ÍòµÄÈÕ¿¯ÐÐÁ¿ºÍÁè¼Ý4400ÍòµÄÊý×Ö°æ¶ÀÁ¢·Ã¿Í¡£ÎåÄêÇ°£¬¸Ã¼¯ÍÅÒ²ÔøÔâÊÜÍøÂç¹¥»÷£¬ÆäʱÒÁÀʺڿÍÈëÇÖÁËÆäÍøÂç×÷ΪÁ÷´«Ðé¼ÙÐÅÏ¢»î¶¯µÄÒ»²¿ÃÅ¡£
https://www.bleepingcomputer.com/news/security/cyberattack-disrupts-lee-newspapers-operations-across-the-us/
5. Facebook³ÉÍøÂçµöÓãÐÂÄ¿±ê£¬Êý°Ù¼ÒÆóÒµÓʼþµØÖ·Ôâ½Ù³Ö
2ÔÂ10ÈÕ£¬Check Point ResearchµÄ×îÐÂÑо¿ÏÔʾ£¬È«ÇòÁìÏȵÄÉ罻ýÌåƽ̨Facebook³ÉΪÁËÐÂÒ»ÂÖÍøÂçµöÓã»î¶¯µÄÄ¿±ê£¬¸Ã»î¶¯Ö¼ÔÚÇÔÈ¡Êý°Ù¼ÒÆóÒµµÄ12,000¶à¸öµç×ÓÓʼþµØÖ·¡£´Ë´Î¹¥»÷»î¶¯Ê¼ÓÚ2024Äê12ÔÂ20ÈÕ×óÓÒ£¬Ö÷ÒªÕë¶ÔÅ·ÃË¡¢ÃÀ¹úºÍ°Ä´óÀûÑǵĹ«Ë¾£¬µ«Ò²Ó°Ïìµ½ÁËÈ«ÇòÆäËûµØÓò¡£Õ©ÆÕßÀûÓÃSalesforceµÄ×Ô¶¯Óʼþ·þÎñ·¢ËÍÆÛÆÐÔµç×ÓÓʼþ£¬ÓʼþÖдøÓмÙðµÄFacebook»Õ±ê£¬²¢Ö¸¿ØÊÕ¼þÈËÇÖ·¸°æȨ¡£³ý·ÇÊÕ¼þÈËÔÚ¶Ìʱ¼äÄÚÌá³öÒìÒ飬·ñÔò½«ÃæÁÙÕË»§ÏÞÖƵÄÍþв¡£ÓʼþÖаüÂÞÐé¼ÙµÄFacebookÖ§³ÖÒ³ÃæÁ´½Ó£¬ÓÕÆÊܺ¦ÕßÊäÈëµÇ¼ƾ¾Ý£¬´Ó¶øÌáÈ¡Ãô¸ÐÐÅÏ¢¡£ÕâÖÖÆÛÆÐÐΪÍþв×ÅÈ«ÇòÒÀÀµFacebookµÄÆóÒµ£¬¿ÉÄܵ¼ÖÂÆä¹ÜÀíÔ±ÕË»§±»¿ØÖÆ¡¢ÄÚÈݱ»¸ü¸Ä¡¢ÏûÏ¢±»ÀûÓá¢Ìû×Ó±»É¾³ýºÍÄþ¾²ÉèÖñ»Ð޸ģ¬½ø¶øÔì³É¿Í»§ÐÅÈζÈϽµ¡¢¿Í»§Á÷ʧºÍDZÔÚµÄÖ´·¨ËßËϵȺó¹û¡£¶ÔÓÚÒ½ÁƱ£½¡ºÍ½ðÈÚµÈÊܼà¹ÜÐÐÒµµÄÆóÒµÀ´Ëµ£¬»¹¿ÉÄܵ¼Ö²»ºÏ¹æ¡¢·£¿îºÍÖ´·¨ÌôÕ½¡£Òò´Ë£¬×é֯ӦʵʩÃ÷È·µÄʼþÏìÓ¦¼Æ»®£¬ÒÔ½µµÍÊܵ½¹¥»÷µÄ·çÏÕ¡£
https://hackread.com/scammers-use-fake-facebook-copyright-notices-to-hijack-accounts/
6. ¼ÍÄîÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬12Íò»¼ÕßÐÅÏ¢Ôâй¶
2ÔÂ10ÈÕ£¬×ôÖÎÑÇÖݰ಼ÀïÆæµÄÒ»¼ÒСÐÍÏç´åÒ½Ôº¼ÍÄîÒ½ÔººÍׯ԰ÔÚ2024Äê11ÔÂÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÆäϵͳ̱»¾£¬²»µÃ²»½ÓÄÉÖ½ÖÊÁ÷³Ì¼Ç¼»¼ÕßÐÅÏ¢¡£¾¡¹ÜÔËӪδÖжϣ¬µ«ÆÚ´ýʱ¼äÑÓ³¤¡£¹¥»÷Õ߾ݳƴÓҽԺϵͳÖÐÇÔÈ¡ÁË1.15TBµÄÊý¾Ý£¬²¢ÔÚTorйÃÜÍøÕ¾ÉϹûÈ»£¬ÆäÖаüÂÞ120,085È˵ĸöÈËÐÅÏ¢ºÍ½¡¿µÐÅÏ¢£¬ÈçÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÄþ¾²ºÅÂë¡¢²¡Ê·¡¢ÖÎÁÆÐÅÏ¢ºÍ½¡¿µ±£ÏÕÐÅÏ¢¡£EmbargoÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦¡£¼ÍÄîÒ½ÔºÒÑÏòÊÜÓ°Ïì¸öÈË·¢ËÍÊéÃæ֪ͨ£¬²¢Ìṩ12¸öÔµÄÃâ·ÑÉí·Ý±£»¤ºÍÐÅÓüà¿Ø·þÎñ¡£¾¡¹ÜĿǰûÓÐÖ¤¾Ý±íÃ÷¸öÈËÐÅÏ¢±»ÀÄÓ㬵«ÓÉÓÚÊý¾Ý¿É¹ûÈ»ÏÂÔØ£¬ÊÜÓ°ÏìÈËȺ¿ÉÄÜÃæÁÙÍøÂçµöÓãºÍÆäËûÀàÐ͹¥»÷µÄ·çÏÕ¡£
https://www.securityweek.com/information-of-120000-stolen-in-ransomware-attack-on-georgia-hospital/