SonicWallÈ·ÈÏCVE-2024-40766ÑϳÁ·ì϶ÔÚ±»»ý¼«ÀûÓÃ
°ä²¼¹¦·ò 2024-09-099ÔÂ6ÈÕ£¬SonicWall½üÆÚ´¹Î£¸üÐÂÁËÆä°²È«²¼¸æ£¬ÖÒ¸æÓû§¹ØÓÚCVE-2024-40766ÕâÒ»¹Ø¼ü½Ó¼û½ÚÔì·ì϶µÄÑϳÁÐÔ¡£¸Ã·ì϶±»ÍøÂç·¸×ï·Ö×Ó»ý¼«ÀûÓã¬ÔÊÐíδ¾ÊÚȨµÄ½Ó¼ûÖÁSonicOSϵͳµÄÃô¸Ð×ÊÔ´£¬ÉõÖÁ¿ÉÄÜÒý·¢·À»ðǽ±ÀÀ££¬Ó°ÏìSonicWall¶à´ú·À»ðǽÉ豸¡£´Ë·ì϶ÑϳÁÐÔÆÀ·Ö¸ß´ï9.3£¬ÊôÓÚ¡°½Ó¼û½ÚÔì²»µ±¡±À࣬ÒòÆäÎÞÐ踴ÔÓ²Ù×÷»òÉí·ÝÑéÖ¤¼´¿Éͨ¹ýÍøÂçÌáÒé¹¥»÷£¬¶ÔÒÀÀµSonicWall·À»ðǽµÄ×éÖ¯×é³É³Á´óÍþв¡£ÊÜÓ°ÏìÉ豸º¸ÇµÚ5´úÖÁµÚ7´úSonicWall·À»ðǽ£¬Ô̺¬¶à¸öÊ¢ÐÐÐͺż°¾É°æSonicOS°æ±¾¡£SonicWallÒÑѸ¿ì°ä²¼°²È«²¹¶¡£¬²¢½¨ÒéËùÓÐЧ»§µ±¼´Í¨¹ýmysonicwall.com¿Í»§ÃÅ»§ÏÂÔØ²¢×°Öøüа汾£¬ÒÔ·À±¸Ç±Ôڵݲȫ·çÏÕ¡£¶ÔÓÚÁÙʱÎÞ·¨¸üй̼þµÄÓû§£¬SonicWallÌṩÁËһʱ»º½âÕ½Êõ£¬ÈçÏÞ¶ÈÖÎÀí½Ó¼ûÆðÔ´¡¢½ûÓÃÌØ¶¨ÍøÂçÖ°Äܵȣ¬ÒÔ½µµÍ±»¹¥»÷µÄ·çÏÕ¡£Í¬Ê±£¬½¨ÒéËùÓÐЧ»§¼ÓÇ¿ÃÜÂëÖÎÀí£¬³ö¸ñÊÇGen 5ºÍGen 6É豸µÄ±¾µØÖÎÀíÕË»§Ó¦¸ü¸ÄÃÜÂë²¢ÆôÓÃÃÜÂë³ÁÖÃÖ°ÄÜ¡£´Ë±í£¬ÍƼöʹÓöà³É·ÖÉí·ÝÑéÖ¤£¨MFA£©¼ÓÇ¿SSLVPNÓû§µÄ°²È«ÐÔ¡£
https://securityonline.info/sonicwall-confirms-critical-cve-2024-40766-vulnerability-actively-exploited-in-the-wild/
2. FBIµÈÖ¸¶íÂÞ˹GRU 29155¶ÓÁÐÕë¶ÔÈ«Çò¹Ø¼ü»ù´¡ÉèÊ©
9ÔÂ6ÈÕ£¬×Ô2020ÄêÆð£¬ÃÀ¹ú¼°ÆäÃËÓÑÖ¸¿Ø¶íÂÞ˹GRU 29155¶ÓÁÐΪȫÇò¹Ø¼ü»ù´¡ÉèÊ©¹¥»÷µÄÖØÒªÍÆÊÖ£¬Éæ¼°¼äµý¡¢·ÛËé¼°ÃûÓþÇÖº¦»î¶¯¡£¸Ã¶ÓÁв»½öÕë¶ÔÎÚ¿ËÀ¼Ê¹ÓÃWhisperGate¶Ï¸ù·¨Ê½£¬»¹²ß¶¯Å·ÖÞÕþ±ä¡¢°µËã¼°ÍøÂç¹¥»÷£¬À©´óÖÁ¼äµý¡¢Êý¾Ý·ÛËé¼°ÃûÓþÇÖº¦ÁìÓò¡£FBI¡¢NSA¼°CISAÆÀ¹ÀÖ¸³ö£¬29155¶ÓÁÐÓɵͼ¶¾ü¹ÙÔڸ߲㸨µ¼ÏÂÔË×÷£¬²¢ÒÀÀµ·ÇGRU³ÉÔ±ÈçÍøÂç×ï·¸ÐÖúÐж¯¡£Æä¹¥»÷ÁìÓò¿í·º£¬º¸Ç±±Ô¼³ÉÔ±¹ú¡¢Å·ÖÞ¡¢À¶¡ÃÀÖÞ¼°ÖÐÑÇ£¬Ö¸±êÖ±Ö¸µ±¾Ö¡¢½ðÈÚ¡¢½»Í¨¡¢ÄÜÔ´¼°Ò½ÁƵȹؼü²¿ÃÅ¡£Í¨¹ýɨÃè·ì϶¡¢ÀûÓÃIPÁìÓò¼°¹«¹²¹¤¾ßÈçRaspberry Robin£¬¸Ã¶ÓÁгɹ¦ÈëÇÖϵͳ²¢ÇÔÈ¡Êý¾Ý¡£×Ô2022ÄêÆð£¬Æä»î¶¯¸ü¾Û½¹ÓÚ·ÛËé¶ÔÎÚ¿ËÀ¼µÄÔöÔ®¡£»ã±¨»¹½ÒʾÁ˸öÓÁÐÀûÓÃÎïÁªÍøÉ豸·ì϶¡¢VPSÍйܹ¤¾ß¼°MeterpreterÓÐЧ¸ºÔصÈÕ½Êõ£¬²¢ÌṩÁËÓйػº½â´ëÊ©¡£
https://securityaffairs.com/168095/cyber-warfare-2/russia-gru-unit-29155-critical-infrastructure.html
3. HAProxy´¹Î£²¼¸æ£ºCVE-2024-45506·ì϶Õý±»»ý¼«ÀûÓÃ
9ÔÂ8ÈÕ£¬ÔÚ×îÐµİ²È«²¼¸æÖУ¬HAProxy °ä·¢ÁËÆäÊ¢ÐиºÔØÆ½ºâÈí¼þÖдæÔÚÒ»¸ö±»»ý¼«ÀûÓõķì϶ CVE-2024-45506£¬¸Ã·ì϶λÓÚ HTTP/2 ¶à·¸´ÓÃÆ÷×é¼þ£¬CVSS ÆÀ·Ö¸ß´ï7.5¡£´Ë·ì϶ÔÚÌØ¶¨Ç°ÌáÏ¿ɴ¥·¢ÎÞÏÞÑ»·£¬µ¼ÖÂϵͳ±ÀÀ£²¢Ò×ÊÜÔ¶³Ì»Ø¾ø·þÎñ£¨DoS£©¹¥»÷£¬Ó°Ïì Enterprise¡¢ALOHA ¼° Kubernetes Ingress Controllers µÈ¶à¿î²úÆ·¡£ÎÊÌâ±¾ÔÔÚÓÚ HTTP/2 ¶à·¸´ÓÃÆ÷ÓëÁ㿽±´×ª·¢»úÔìµÄ½»»¥²»µ±£¬¹¥»÷Õß¿Éͨ¹ý´´½¨ÎÞÏÞÑ»·µÄ h2_send() º¯ÊýÀ´ÀûÓô˷ì϶£¬³ö¸ñÊÇÔڸ߸ºÔØÇÒÊä³ö»º³åÇø¿¿½üÂúÒçʱ¡£Ö»¹Ü¸Ã·ì϶µÄ³ÁÏÖÄѶȽϴ󣬵«ÒÑÓÐ×Ô¶¯ÀûÓð¸ÀýÅú×¢ÆäÄܵ¼Ö HAProxy ±ÀÀ££¬¶ÔÒÀÀµÆä¸ºÔØÆ½ºâÖ°ÄܵĹؼü·þÎñ×é³ÉÍþв£¬ÓÈÆäÊÇÏñ GitHub¡¢Reddit ºÍ Twitter ÕâÑùµÄ´óÐÍÍøÕ¾¡£DoS ¹¥»÷Ò»µ©³É¹¦£¬½«·ÛËé·þÎñµÄ¸ß¿ÉÓÃÐÔ£¬¶ÔÒµÎñÔËÓªºÍ²ÆÕþÔì³É³Á´óËðʧ¡£Îª´Ë£¬HAProxy Ç¿ÁÒ½¨ÒéËùÓÐЧ»§µ±¼´×°Öð䲼µÄ²¹¶¡£¬²¢ÌṩÁËÒ»ÖÖһʱ½â¾ö¹æ»®¡£
https://securityonline.info/haproxy-vulnerability-cve-2024-45506-under-active-exploit-urgent-patching-required/
4. AvisÆû³µ×âÁÞ¹«Ë¾ÆØÊý¾Ýй¶£º¿Í»§Ó×ÎÒÐÅÏ¢ÔâÇÔ
9ÔÂ6ÈÕ£¬Æû³µ×âÁÞ¾ÞÍ·AvisÔÚ8ÔÂÔâ·êÁËÊý¾Ýй¶ÊÂÎñ£¬¹¥»÷ÕßÇÖÈëÁ˹«Ë¾µÄÒ»¿îÒµÎñÀûÓ÷¨Ê½£¬·¸·¨½Ó¼û²¢ÇÔÈ¡Á˲¿Ãſͻ§µÄÓ×ÎÒÐÅÏ¢£¬Ô̺¬ÐÕÃû¼°ÆäËûÃô¸ÐÊý¾Ý¡£Ö»¹ÜÈëÇÖÐÐΪ²úÉúÔÚ8ÔÂ3ÈÕÖÁ6ÈÕÖ®¼ä£¬µ«AvisÖ±ÖÁ8ÔÂ5Èղžõ²ì£¬²¢ÓÚ14ÈÕÕýʽÅû¶´ËÊ¡£¹«Ë¾Ñ¸¿ìÐж¯£¬ÖÕÖ¹ÁË·¸·¨½Ó¼û£¬²¢ÓëÍøÂ簲ȫר¼ÒºÏ×÷·¢Õ¹È«Ãæµ÷²é£¬Í¬Ê±¼ÓÇ¿ÁËÊÜÓ°ÏìϵͳµÄ°²È«·À»¤´ëÊ©¡£Ö»¹ÜAvisδ¹«¿ª¾ßÌå¼¼Êõϸ½Ú¼°ÊÜÓ°ÏìµÄ¿Í»§ÊýÁ¿£¬µ«ÒѲÉÈ¡´ëÊ©¼ÓÇ¿°²È«¼à¿ØÓë½ÚÔ죬ÒÔÔ¤·ÀÀàËÆÊÂÎñÔٴβúÉú¡£ÎªÓ¦¶ÔÕâ´ÎÊÂÎñ£¬AvisÌáÐÑÊÜÓ°Ïì¿Í»§Î¬³Ö¸ß¶È¾¯Ì裬°ÑÎÈ·À±¸Ú²ÆºÍÉí·Ý͵ÇÔ·çÏÕ¡£¹«Ë¾½¨Òé¿Í»§¶¨ÆÚ²é³ÕË»§¼°ÐÅÓþ¼Í¼£¬Ò»µ©·¢ÏÖÈκÎÒì³£ÂòÂô»ò»î¶¯£¬µ±¼´ÏòÐÅÓþ»ã±¨»ú¹¹»ã±¨¡£´Ë±í£¬Avis»¹ÏòÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËÒ»ÄêµÄEquifaxÐÅÓþ¼à¿Ø·þÎñÃâ·Ñ»áÔ±×ʸñ£¬ÒÔÔ®ÊÖ¿Í»§ÊµÊ±¼à²âDZÔÚ·çÏÕ£¬±£»¤Ó×ÎÒÐÅÏ¢°²È«¡£
https://securityaffairs.com/168119/data-breach/car-rental-giant-avis-discloses-data-breach.html
5. SpyAgent°²×¿¶ñÒâÈí¼þ´ÓͼƬÖÐÇÔÈ¡ÄúµÄ¼ÓÃܸ´Ô¶ÌÓï
9ÔÂ6ÈÕ£¬Ò»¿îÃûΪSpyAgentµÄÐÂÐͰ²×¿¶ñÒâÈí¼þÒý·¢ÁË¿í·º¹Ø×¢¡£¸ÃÈí¼þÀûÓÃÏȽøµÄ¹âѧ×Ö·û¼ø±ð£¨OCR£©¼¼Êõ£¬×¨ÃÅ´ÓÓû§´æ´¢ÔÚÒÆ¶¯É豸ÉϵĽØÍ¼ÖÐÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°üµÄ¸´Ô¶ÌÓï¡£ÕâЩ¶ÌÓï×÷Ϊ¼ÓÃÜÇ®±ÒÇ®°üµÄ±¸·ÝÃÜÔ¿£¬Ò»µ©ÂäÈë·¸·¨·Ö×ÓÖ®ÊÖ£¬±ãÄܵÈÏл¹Ô²¢µÁȡǮ°üÄÚµÄËùÓÐ×ʽð¡£ÓÉÓÚ¸´Ô¶ÌÓïÄÑÒÔÓ°Ïó£¬Óû§³£½«Æä½ØÍ¼±£Áô£¬ÕâÒ»ÐÐΪ¸ÕºÃΪSpyAgentÌṩÁ˿ɳËÖ®»ú¡£McAfee·¢ÏÖ£¬SpyAgentͨ¹ý·Ç¹Ù·½Çþ·Èç¶ÌÐźͶñÒâÉ罻ýÌåÌû×Ó´«²¼£¬ÒÑÓ°ÏìÖÁÉÙ280¸öAPKÎļþ¡£ÕâЩ¼Ù×°³Éµ±¾Ö·þÎñ¡¢Ô¼»á»òÉ«ÇéÍøÕ¾µÄÀûÓ㬲»½öÕë¶Ôº«¹úÓû§£¬»¹Öð²½À©´óµ½Ó¢¹ú£¬²¢¿ÉÄÜÏòiOSÆ½Ì¨ÊæÕ¹¡£Í¬Ê±£¬Ç÷Ïò¿Æ¼¼Ò²¸æ·¢ÁËÀàËÆÀûÓÃOCR¼¼ÊõµÄCherryBlosºÍFakeTrade¶ñÒâÈí¼þ¼Ò×壬Åú×¢´ËÀ๥»÷Õ½ÊõÕýÈÕÒæ·è¿ñ¡£SpyAgentÒ»µ©Ï°È¾É豸£¬±ã»áÏòC2·þÎñÆ÷·¢ËÍÃô¸ÐÐÅÏ¢£¬Ô̺¬ÁªÏµÈËÁÐ±í¡¢¶ÌÐÅ£¨º¬OTP£©¡¢´æ´¢µÄͼÏñ¼°É豸ÐÅÏ¢£¬ÉõÖÁÖ´ÐÐÔ¶³ÌºÅÁîÒÔ·¢ËÍ´¹µö¶ÌÐÅ£¬½øÒ»²½À©É¢¶ñÒâÈí¼þ¡£ÆäÔËÓªÕßÔÚ·þÎñÆ÷ÅäÖÃÉϵĺöÂÔ£¬Ê¹µÃ×êÑÐÈËÔ±ÄܵÈÏнӼûÇÔÈ¡µÄÊý¾Ý£¬½øÒ»²½¼Ó¾çÁËÍþвµÄÑϳÁÐÔ¡£
https://www.bleepingcomputer.com/news/security/spyagent-android-malware-steals-your-crypto-recovery-phrases-from-images/
6. FogÀÕË÷Èí¼þתս½ðÈÚ·þÎñÒµ
9ÔÂ8ÈÕ£¬FogÀÕË÷Èí¼þ×éÖ¯£¬ÒÔÍùÒÔÇÖÈŽÌÓýºÍÓéÀÖÐÐÒµÎÅÃû£¬½üÆÚÈ´½«Ì°ÐĵÄÑÛ¹âתÏòÁ˸üΪÓÕÈ˵ĽðÈÚ·þÎñÒµ¡£2024Äê8Ô£¬Ò»¼ÒÖÐÐͽðÈÚ¹«Ë¾²»ÐÒ³ÉΪÆäÐÂÕ½ÊõϵÄÖ¸±ê£¬µ«ÐÒÔ˵ÄÊÇ£¬ÍøÂ簲ȫ¹«Ë¾AdluminѸ¿ìȾָ£¬ÀûÓÃÇ°ÑØ¼ì²â¼¼Êõ£¬ÔÚ³Á´óÇÖº¦²úÉúǰÓÐЧ¶ôÔìÁ˹¥»÷¡£Õâ´Î¹¥»÷ʼÓÚÍøÂç·¸×ï·Ö×ÓÀûÓñ»µÁVPNƾ֤·¸·¨ÇÖÈë£¬Ëæºó²¿ÊðÁËFog Ransomware£¬STOP/DJVUϵÁеÄÒ»¸ö±äÖÖ£¬¸Ã±äÖÖÉÆÓÚ¼ÓÃÜWindowsÓëLinuxϵͳÉϵÄÃô¸ÐÊý¾Ý¡£AdluminʵʱÏìÓ¦£¬Ô̺¬¸ôÀëϰȾÉ豸¡¢Ëø¶¨¹¥»÷Õߣ¬³É¹¦Ô¤·ÀÁË´ó¹æÄ£Êý¾Ýй¶»ò¼ÓÃÜ¡£FogÀÕË÷Èí¼þ×Ô2021Ä긡ÏÖÒÔÀ´£¬±ãÒÔÀûÓÃVPNÆ¾Ö¤ÉøÈë¡¢¸´ÔÓ¼¼Êõ»ñÈ¡½ÚÔìȨ²¢¼ÓÃܹؼüÎļþÖø³Æ¡£¹¥»÷¹ý³ÌÖУ¬Fog×é֯չʾÁ˸ßÃ÷µÄºáÏòÒÆ¶¯ÄÜÁ¦£¬ÀûÓö˿ÚɨÃè¡¢SharpSharesµÈ¹¤¾ßÔÚÍøÂçÖÐ×ÔÓÉ´©Ë󣬲¢Í¨¹ýesentutl.exeµÈ¹¤¾ßÇÔÈ¡µÇ¼ƾ֤£¬³ö¸ñÊÇÕë¶ÔChromeä¯ÀÀÆ÷¼°½üÆÚÅú¸ÄÎļþµÄ¾«×¼½ø¹¥£¬ÏÔʾÁËÆä¾«ÐIJ߶¯Óë¸ß¶ÈÕë¶ÔÐÔ¡£Ö»¹Ü¹¥»÷Ô´Í·Ö¸Ïò¶íÂÞ˹ÓйØIP£¬µ«×¨¼ÒÖ¸³ö£¬Õâ½öÊǹ¥»÷ÕßʹÓõÄÕÏÑÛ·¨Ö®Ò»£¬ÕæÊµµØÎ»ÄÑÒÔÈ·¶¨¡£
https://securityonline.info/fog-ransomware-group-shifts-focus-financial-sector-now-in-crosshairs/


¾©¹«Íø°²±¸11010802024551ºÅ