NachoVPN·ì϶£º¶ñÒâVPN·þÎñÆ÷ÀûÓÃ佨²¹¿Í»§¶ËÖ´Ðй¥»÷
°ä²¼¹¦·ò 2024-11-2711ÔÂ26ÈÕ£¬Ò»×éÃûΪ¡°NachoVPN¡±µÄ·ì϶ÔÊÐí¶ñÒâVPN·þÎñÆ÷ÀûÓÃ佨²¹µÄPalo AltoºÍSonicWall SSL-VPN¿Í»§¶Ë½øÐй¥»÷£¬Í¨¹ýÓÕÆÓû§ÏνÓÖÁ¹¥»÷Õß½ÚÔìµÄVPN·þÎñÆ÷£¬½ø¶øÇÔÈ¡µÇ¼ʹ´¦¡¢Ö´ÐÐËÁÒâ´úÂë¡¢×°ÖöñÒâÈí¼þ»òÌáÒé´úÂëÊðÃûαÔì¼°ÖÐÑëÈ˹¥»÷¡£AmberWolf°²È«×êÑÐÈËÔ±·¢ÏÖÁËÕâÒ»Íþв£¬²¢ÔÚ·ì϶³õ´Î»ã±¨ºóÊýÔÂÄÚ£¬¼ûÖ¤ÁËSonicWallºÍPalo Alto NetworksÏà¼Ì°ä²¼Õë¶ÔCVE-2024-29014ºÍCVE-2024-5921·ì϶µÄ²¹¶¡¡£ÎªÁË·ÀÓù£¬SonicWall¿Í»§ÐèÉý¼¶ÖÁNetExtenderµÄÌØ¶¨°æ±¾£¬¶øPalo Alto NetworksÔò½¨Òé×°Öøüа汾»òÔÚFIPS-CCģʽÏÂÔËÐÐVPN¿Í»§¶Ë¡£´Ë±í£¬AmberWolf»¹°ä²¼ÁËNachoVPN¿ªÔ´¹¤¾ß£¬¸Ã¹¤¾ßÄÜ·ÂÕÕ¶ñÒâVPN·þÎñÆ÷£¬Ö§³Ö¶àÖÔìóÒµVPN²úÆ·£¬²¢¼¤ÀøÉçÇø¹±Ï×зì϶ÐÅÏ¢¡£Í¬Ê±£¬¸Ã¹«Ë¾»¹ÌṩÁËÓйØÕâÁ½¸ö·ì϶µÄ¸ü¶à¼¼Êõϸ½ÚºÍ·ÀÓù½¨Ò飬ÒÔÔ®ÊÖÍøÂç·ÀÓùÕß±£»¤ÆäϵͳÃâÊÜDZÔÚ¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/new-nachovpn-attack-uses-rogue-vpn-servers-to-install-malicious-updates/
2. ¶íÂÞ˹ºÚ¿ÍRomComÀûÓÃFirefoxºÍTorÁãÈÕ·ì϶ÌáÒé¹¥»÷
11ÔÂ27ÈÕ£¬½üÆÚ¶íÂÞ˹ºÚ¿Í×éÖ¯RomComÀûÓÃÁËÁ½¸öÁãÈÕ·ì϶£¬ÏòʹÓÃFirefox»òTorä¯ÀÀÆ÷µÄÓû§·¢ÉäÁ˶ñÒâ´úÂë¡£ÕâЩ·ì϶±ðÀëÓ°ÏìÁËMozillaÈí¼þºÍWindowsϵͳ£¬ÆäÖÐÒ»¸ö·ì϶£¨CVE-2024-9680£©Ê¹µÃ½Ó¼ûÊÜÏ°È¾ÍøÕ¾µÄÈκÎÈ˳ÇÊÐÎÞÒâʶµØÏÂÔØRomComºóÃÅ£¬¶øÎÞÐèÈκεã»÷¡£ÐÒÔ˵ÄÊÇ£¬ÕâÁ½¸ö·ì϶¶¼µÃµ½Á˼±¾ç½¨¸´£¬MozillaÔÚÊÕµ½Í¨Öªºó25Ó×ʱÄھͽ¨²¹ÁËFirefoxÖеķì϶£¬¶øWindowsÖеķì϶£¨CVE-2024-49039£©Ò²ÔÚºóÐøµÃµ½½¨¸´¡£RomComͨ¹ýÌØÔìÍøÕ¾´¥·¢·ì϶£¬ÕâÐ©ÍøÕ¾·ÂÕÕÁËÕæÊµ×éÖ¯µÄÍøÕ¾£¬Ô̺¬ConnectWise¡¢DevolutionsºÍCorrectivµÈ¡£¹ÌÈ»Torä¯ÀÀÆ÷Ò²»ùÓÚFirefox£¬µ«ESET×·×ÙµÄÊܺ¦ÕßÖÐûÓÐÒ»ÈËÊÇͨ¹ýTorÊܵ½¹¥»÷µÄ£¬¿ÉÄÜÊÇÓÉÓÚTorµÄijЩÉèÖÃÓëFirefox·ÖÆç¡£RomComµÄÖØÒªÖ¸±êËÆºõÊǹ«Ë¾£¬¾ø´óÎÞÊýÊܺ¦ÕßλÓÚ±±ÃÀºÍÅ·ÖÞ£¬µ«ÐÂÎ÷À¼ºÍ·¨Êô¹çÑÇÄÇÒ²ÓÐÁãÉ¢Êܺ¦Õß¡£
https://www.darkreading.com/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor
3. RansomHub×éÖ¯Ðû³Æ¶ÔÁ½Êе±¾Ö·¢ÆðÀÕË÷¹¥»÷
11ÔÂ27ÈÕ£¬ÍøÂç·¸×ï×éÖ¯RansomHubÐû³Æ¶ÔµÂ¿ËÈøË¹ÖÝ¿ÆÅå¶ûÊм°Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»á·¢ÆðÁËÀÕË÷Èí¼þ¹¥»÷£¬Òý·¢¿í·º¹Ø×¢¡£¿ÆÅå¶ûÊÐÔâ·ê¹¥»÷ºó£¬»¥ÁªÍø¡¢Í¼Êé¹Ý·þÎñ¡¢Ðí¿ÉºÍ²é³Æ½Ì¨¼°Êз¨ÔºµÈ¶à¸öϵͳ̱»¾£¬¸ø±¾µØ¾ÓÃñ´øÀ´ÑϳÁÀ§ÈÅ¡£Ö»¹ÜÊе±¾ÖÖÂÁ¦¸´Ô£¬µ«Ö±ÖÁ11ÔÂÏÂÑ®£¬²¿ÃÅÊÐÕþÔËÓª²ÅÂ½Ðø¸´Ô¡£Í¬Ê±£¬Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»áÒ²»ã±¨Æä¼¼ÊõϵͳÔâµ½¹¥»÷£¬µç»°Ïß·Öжϣ¬ÔÚÖÂÁ¦È·¶¨ÐÅϢй¶Çé¿ö¡£RansomHub½ñÄêѸ¿ìáÈÆð£¬ÒѶԻú³¡¡¢Ò½ÁÆ»ú¹¹¡¢Ôì×÷¹«Ë¾ºÍ¹Ø¼ü»ù´¡ÉèÊ©µÈÊý°Ù¸ö×éÖ¯·¢Æð¹¥»÷¡£×Ô2Ô·ÝÒÔÀ´£¬ÒÑÓÐÔ¼210¸ö×éÖ¯³ÉΪÆäÊܺ¦Õß¡£¸Ã×éÖ¯×î³õ³Ê´Ë¿Ì½áºÏ½¡È«¼¯ÍÅÔâ·êÀÕË÷Èí¼þ¹¥»÷ºó£¬ËæºóÒòÁíÒ»ÀÕË÷Èí¼þÍŻﵹ¹Ø¶ø×³´ó£¬¶ÔÊý¾Ý½øÐÐÏúÊÛ¡£½ñÄ꣬RansomHub»¹¹¥»÷Á˶àÆð±¸ÊÜÖõÖ÷ÕÅÖ¸±ê£¬Ô̺¬µçОÞÍ·Frontier¡¢Rite Aid¡¢Ó¢¹úÅÄÂôÐÐChristie¡¯sµÈ¡£
https://therecord.media/ransomhub-cybercrime-coppell-texas-minneapolis-parks-agency
4. ÈûÂ׸ǵÙÐж¯£º·ÇÖÞ·¨ÂÉ»ú¹¹Ñϸñ½ø¹¥ÍøÂç·¸×ï
11ÔÂ26ÈÕ£¬·ÇÖÞ·¨ÂÉ»ú¹¹ÔÚ¹ú¼ÊÐ̾¯×éÖ¯ºÍ·ÇÖÞÐ̾¯×éÖ¯µÄе÷Ï£¬ÓÚ9ÔÂ2ÈÕÖÁ10ÔÂ31ÈÕÆÚ¼ä·¢Õ¹ÁËÃûΪ¡°ÈûÂ׸ǵÙÐж¯¡±µÄ½ø¹¥ÍøÂç·¸×ï»î¶¯¡£Õâ´ÎÐж¯Õë¶ÔÀÕË÷Èí¼þ¡¢Ã³Ò×µç×ÓÓʼþй¶¡¢Êý×ÖÀÕË÷ºÍÍøÂçڿƵȷ¸×ï״Ϊ£¬Éæ¼°19¸ö·ÇÖÞ¹ú¶È£¬¹²¿ÛÁôÁË1006ÃûÏÓÒÉÈË£¬·ÛËéÁË134089¸ö¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç¡£¾Ýµ÷²é£¬ÕâЩ·¸×ï»î¶¯ÓëÖÁÉÙ35224ÃûÒÑÈ·ÈÏÉí·ÝµÄÊܺ¦ÕßÓйأ¬Ôì³ÉÁ˽ü1.93ÒÚÃÀÔªµÄ¾¼ÃËðʧ£¬ÆäÖÐÈûÂ׸ǵÙÐж¯×·»ØÁËԼĪ4400ÍòÃÀÔª¡£Ðж¯ÖеÄÁÁµãÔ̺¬¿ÏÄáÑÇÆÆ»ñÒ»Â·ÍøÉÏÐÅÓþ¿¨Ú¿Æ°¸£¬ÈûÄÚ¼Ó¶ûµ·»Ùһ·ÅÓÊÏȦÌ×£¬ÄáÈÕÀûÑÇ¿ÛÁôÒ»ÃûÖ´ÐÐÍøÉÏͶ×ÊڿƵÄÄÐ×Ó£¬¿¦ÂóÂ¡ÆÆ»ñ¶àµµ´ÎÓªÏúȦÌ×£¬ÒÔ¼°°²¸çÀµ·»ÙÒ»¸öÐé¹¹¶Ä³¡¹ú¼Ê¼¯ÍÅ¡£²Î¼ÓÕâ´ÎÐж¯µÄ¹ú¶È»¹Óа¢¶û¼°ÀûÑÇ¡¢±´Äþ¡¢¿ÆÌصÏÍß¡¢¸Õ¹ûÃñÖ÷¹²ºÍ¹ú¡¢¼ÓÅî¡¢¼ÓÄÉ¡¢Ã«ÀïÇó˹¡¢ÄªÉ£±È¿Ë¡¢Â¬Íú´ï¡¢ÄÏ·Ç¡¢Ì¹É£ÄáÑÇ¡¢Í»Äá˹¡¢ÔÞ±ÈÑǺͽò°Í²¼Î¤¡£
https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/
5. Matrix·¢Æð´ó¹æÄ£DDoS¹¥»÷£¬ÀûÓÃÎïÁªÍøºÍÆóÒµ·ì϶
11ÔÂ26ÈÕ£¬°²È«×êÑÐÈËÔ±·¢ÏÖÁËÒ»³¡ÓÉÃûΪMatrixµÄÍþвÐÐΪÕ߲߶¯µÄ´ó¹æÄ£É¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷»î¶¯£¬¸Ã»î¶¯ÀûÓÿɽӼûµÄ¹¤¾ßÕë¶ÔÎïÁªÍøÉ豸ºÍÆóÒµ·þÎñÆ÷¡£MatrixµÄ¹¥»÷¿ò¼Ü¾¹ý¾ßÌå·ÖÎö£¬ÖØÒªÀûÓû¥ÁªÍøÏνÓÉ豸Éϵķì϶ºÍÃýÎóÅäÖã¬Í¨¹ý±©Á¦¹¥»÷¡¢Èõƾ֤ºÍÒÑÖª·ì϶¹¹½¨½©Ê¬ÍøÂç¡£¹¥»÷µÄÖØÒªÌØµãÔ̺¬Õë¶Ô·ÓÉÆ÷¡¢DVRºÍIPÉãÏñ»ú¡¢ÆóÒµºÍ̸ºÍÎïÁªÍøÉ豸µÄ·ì϶ÀûÓá£ÕâЩ¹¥»÷ÑϳÁÒÀÀµÄ¬ÈÏ»òÈõÃÜÂ룬ǿµ÷ÁËδÄܲÉÈ¡¸ù»ù°²È«´ëÊ©»áʹÉè±¸Ãæ¶ÔÈëÇֵķçÏÕ¡£MatrixµÄÖ¸±êÔ̺¬ÔÆ·þÎñÌṩÉÌ¡¢Ó×ÐÍÆóÒµºÍÎïÁªÍøÃܼ¯µØÓò£¬ÊÜÓ°ÏìµÄÉ豸¿ÉÄܶà´ï3500Íǫ̀¡£MatrixʹÓÃÁËÀ´×ÔGitHubµÈƽ̨µÄ¾ç±¾ºÍ¹¤¾ß£¬²¢Í¨¹ýTelegram½«·þÎñÇ®±Ò»¯£¬ÌṩDDoS¹¥»÷´òËã¡£Ö»¹ÜMatrix²»×ãÏȽøÖ°ÄÜ£¬µ«ÕâЩ¹¤¾ßµÄ×é×°ºÍ²Ù×÷¶¼¼«¶ÈÈÝÒ×£¬ÏÔʾ³öµÍ¸´ÔÓˮƽ²Î¼ÓÕßËù´øÀ´µÄ·çÏÕÔ½À´Ô½´ó¡£
https://www.infosecurity-magazine.com/news/ddos-campaign-exploits-iot-devices/
6. Array Networks SSL VPN ²úÆ·Öеķì϶Õý±»»ý¼«ÀûÓÃ
11ÔÂ26ÈÕ£¬ÃÀ¹úÍøÂç·ÀÓù»ú¹¹CISAÊÕµ½Ö¤¾ÝÅú×¢£¬ºÚ¿ÍÔÚ»ý¼«ÀûÓÃSSL VPN²úÆ·Array Networks AGºÍvxAG ArrayOSÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶£¬¸Ã·ì϶±»×·×ÙΪCVE-2023-28461£¬ÑϳÁÐÔÆÀ·Ö¸ß´ï9.8£¬Òѱ»ÁÐÈëCISAµÄÒÑÖªÀûÓ÷ì϶Ŀ¼ÖС£´Ë·ì϶´æÔÚÓÚÒ×Êܹ¥»÷µÄURLÖУ¬ÊÇÒ»¸öÉí·ÝÑéÖ¤²»µ±ÎÊÌ⣬ÔÊÐíÔÚArray AGϵÁкÍvxAG 9.4.0.481¼°¸üÔç°æ±¾ÖÐÖ´ÐÐÔ¶³Ì´úÂë¡£Array NetworksÔÚ·ì϶Åû¶һÖܺó°ä²¼Á˽¨¸´°æ±¾Array AG 9.4.0.484¡£Array NetworksµÄSSL VPN²úÆ·±»È«Çò³¬¹ý5000¸ö¿Í»§Ê¹Óã¬Ô̺¬ÆóÒµ¡¢·þÎñÌṩÉ̺͵±¾Ö»ú¹¹¡£CISA½¨ÒéËùÓÐÁª¹ú»ú¹¹ºÍ¹Ø¼ü»ù´¡ÉèÊ©×éÖ¯ÔÚ12ÔÂ16ÈÕ֮ǰÀûÓð²È«¸üлò²ÉÈ¡»º½â´ëÊ©£¬²»È»Ó¦ÖÕ³¡Ê¹ÓøòúÆ·¡£°²È«¸üпÉͨ¹ýArrayÖ§³ÖÃÅ»§»ñÈ¡£¬µ«¹©¸øÉÌÌṩµÄ»º½â´ëÊ©¿ÉÄÜ»á¶Ô¿Í»§¶Ë°²È«Ö°ÄܲúÉú¸ºÃæÓ°Ï죬Òò¶ø×éÖ¯Ó¦Ê×ÏȲâÊÔÆä³ÉЧ¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-bug-in-array-networks-ssl-vpn-products/


¾©¹«Íø°²±¸11010802024551ºÅ