SonicWall SSLVPN É豸ÑϳÁ·ìÏ¶ÆØ¹â£º³¬25,000̨É豸Ò×Êܹ¥»÷
°ä²¼¹¦·ò 2024-12-191. SonicWall SSLVPN É豸ÑϳÁ·ìÏ¶ÆØ¹â£º³¬25,000̨É豸Ò×Êܹ¥»÷
12ÔÂ17ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾Bishop FoxµÄ·ÖÎö½Òʾ£¬³¬¹ý25,000̨¿É¹«¿ª½Ó¼ûµÄSonicWall SSLVPNÉ豸´æÔÚ³Á´ó°²È«Òþ»¼£¬ÆäÖÐ20,000̨É豸ÔËÐÐ׏©¸øÉ̲»ÔÙÖ§³ÖµÄSonicOS/OSX¹Ì¼þ°æ±¾¡£ÕâЩÉ豸ÈÝÒ×Ôâ·êÀÕË÷Èí¼þ×éÖ¯ÈçFogºÍAkiraµÄ¹¥»÷£¬³ÉΪÆäÈëÇÖ¹«Ë¾ÍøÂçµÄÈë¿Ú¡£Í¨¹ýɨÃ蹤¾ß£¬Bishop Fox·¢ÏÖÁË430,363¸ö¹«¿ªÂ¶³öµÄSonicWall·À»ðǽ£¬ÖÎÀí»òSSL VPN½Ó¿Ú¿É´Ó»¥ÁªÍø½Ó¼û£¬Îª¹¥»÷ÕßÌṩÁË̽²â·ì϶¡¢¹ýÆÚ¹Ì¼þ¡¢ÃýÎóÅäÖÃºÍÆÆ½âÈõÃÜÂëµÄ»úÓö¡£ÆäÖУ¬6,633̨É豸ÒѴﵽʹÓÃÊÙÃü£¬»¹ÓÐ14,077̨ʹÓÃSeries 6µÄ²»ÔÙÊÜÖ§³Ö°æ±¾£¬¹²20,710̨Ò×Êܹ«¿ª·ì϶¹¥»÷¡£´Ë±í£¬»¹ÓдóÁ¿É豸ÔËÐÐ×Åδ֪°æ±¾»ò²»ÊÜÖ§³ÖµÄ¹Ì¼þ¡£¹ÌÈ»Ïà±È2024Äê1Ô£¬Ò×Êܹ¥»÷µÄ¶ËµãÊýÁ¿ÓÐËù½µÂ䣬µ«²¹¶¡Ñ¡È¡¿ìÂÊÒÀÈ»»ºÂý£¬ÏÔʾ³öÍøÂ簲ȫ¾ÖÊÆÒÀÈ»Ñϸñ¡£
https://www.bleepingcomputer.com/news/security/over-25-000-sonicwall-vpn-firewalls-exposed-to-critical-flaws/
2. ÄÉÃ×±ÈÑǵçÐÅÔâÀÕË÷Èí¼þ¹¥»÷£¬Ãô¸ÐÊý¾Ýй¶
12ÔÂ17ÈÕ£¬ÄÉÃ×±ÈÑǹúÓеçÐŹ«Ë¾½üÆÚÔâ·êÁËÀÕË÷Èí¼þ¹¥»÷£¬µ¼Ö½ü50ÍòÌõÃô¸Ð¿Í»§Êý¾Ý±»Ð¹Â¶£¬ÆäÖÐÔ̺¬¸ß¼¶µ±¾Ö¹ÙÔ±µÄÐÅÏ¢¡£ÔڻؾøÓëºÚ¿Í×éÖ¯¡°ÁÔÈ˹ú¼Ê¡±ºÏ×÷ºó£¬ºÚ¿Í½«ÕâЩÊý¾Ý°ä²¼µ½Á˰µÍøÉÏ¡£ÄÉÃ×±ÈÑǵçÐŹ«Ë¾ÔÚµ÷²éÕâ´Î´ó¹æÄ£ÏµÍ³ÈëÇÖµÄÔÒò£¬²¢ÕýÓ밲ȫ¹ÙÔ±ºÏ×÷£¬ÒÔÏ÷¼õ½øÒ»²½µÄÐÅϢй¶²¢×·²¶×ï·¸¡£¼´½«Ð¶ÈεÄ×ÜͳÄϸêÂ塤ķ±¾°Í¶ÔÕâ´ÎÍøÂç¹¥»÷°µÊ¾ß³Ô𣬲¢ºôÓõÒÔÓ¦ÓеĽôÆÈÐÔ´¦ÖôËÊ£¬Ö¸³öÍøÂç°²ÂúÊǹú¶È°²È«ÎÊÌâ¡£¾ÝÄÉÃ×±ÈÑǵçÐŹ«Ë¾Ê×ϯִÐйÙ˹̹Àû¡¤É³ÄÉÆ½´ï°µÊ¾£¬¹«Ë¾²»»áÓëºÚ¿Í¾ÍÊê½ð½øÐн»É棬ÓÉÓÚÊê½ðÊý¶î¹ý¸ßÇÒÖ§¸¶Êê½ðÒ²²»Äܱ£ÕÏÐÅÏ¢²»±»Ð¹Â¶¡£Õâ´Î¹¥»÷ÖУ¬ºÚ¿ÍÇÔÈ¡ÁËÔ̺¬Ó×ÎÒÉí·ÝÐÅÏ¢¡¢µØÖ·ºÍÒøÐÐÐÅÏ¢µÈÔÚÄÚµÄÃô¸Ð¿Í»§¼Í¼£¬²¢ÔÚÉ罻ýÌåÉÏ·ÖÏí¡£ÄÉÃ×±ÈÑǵçÐŹ«Ë¾ÖÒ¸æÈËÃDz»Òª·ÖÏíÈκÎй¶µÄÐÅÏ¢£¬²¢¶½´Ù¿Í»§¸ü¸ÄÃÜÂ룬Ԥ·ÀÔÚ¿ÉÒÉÇé¿öϽøÐÐתÕË¡£
https://www.capitalfm.co.ke/news/2024/12/sensitive-data-leaked-after-namibia-ransomware-hack/
3. ÍøÂç´¹µöÚ¿ÆÐ¼¿Á©£ºÀÄÓÃGoogleÈÕÀúºÍ»Í¼Ò³ÃæÇÔȡƾ֤
12ÔÂ18ÈÕ£¬½üÆÚÍøÂç´¹µöڿƻƵÈÔ£¬·¸·¨·Ö×ÓÀûÓÃGoogleÈÕÀúÔ¼ÇëºÍGoogle»Í¼Ò³Ãæ×÷Ϊ¹¤¾ß£¬Ì°Í¼ÇÔÈ¡Óû§Æ¾Ö¤£¬²¢³É¹¦ÈƹýÁËÀ¬»øÓʼþ¹ýÂËÆ÷¡£¾ÝÍøÂ簲ȫ¼à¿Ø»ú¹¹Check Point»ã±¨£¬¶Ì¶ÌÖÜΧÄÚ£¬ÒÑÓÐ300¸öÆ·ÅÆÔâ·ê¹¥»÷£¬³¬¹ý4,000·â´¹µöÓʼþ±»·¢ËÍ¡£ÕâЩÓʼþµÄÖ¸±ê¿í·º£¬Ô̺¬½ÌÓý»ú¹¹¡¢Ò½ÁÆ»ú¹¹¡¢¹¹Öþ¹«Ë¾ºÍÒøÐеȡ£¹¥»÷ÊÖ·¨ÖØÒªÊÇͨ¹ýGoogleÈÕÀú·¢ËÍ¿´ËÆÎÞº¦µÄ»áÒéÔ¼Ç룬ԼÇëÖÐǶÈëÖ¸ÏòGoogle Forms»òGoogle DrawingµÄÁ´½Ó£¬ÓÕµ¼Óû§µã»÷¼Ù×°³ÉreCaptcha»òÖ§³Ö°´Å¥µÄÁíÒ»¸öÁ´½Ó¡£ÓÉÓÚÕâЩԼÇëÀ´×ԺϷ¨µÄGoogle·þÎñ£¬Òò¶ø¿ÉÄÜÈÆ¹ýÀ¬»øÓʼþ¹ýÂËÆ÷¡£Check PointÖ¸³ö£¬¹¥»÷ÕßÀûÓÃÁËGoogleÈÕÀú·þÎñ£¬Ê¹µÃÓʼþ±êÌâ¿´ÆðÀ´ÆëÈ«ºÏ·¨£¬ÓëÕý³£GoogleÈÕÀúÔ¼ÇëÎÞÒ죬²¢Í¨¹ýÁËDKIM¡¢SPFºÍDMARCµÈµç×ÓÓʼþ°²È«²é³¡£´Ë±í£¬¹¥»÷Õß»¹»áÈ¡µÞGoogleÈÕÀú»î¶¯²¢¸½¼ÓÐÂÎÅ£¬ÒÔÔö³¤´¹µöÓʼþµÄ·¢ËÍÁ¿¡£Ö»¹ÜGoogleÔøÍÆ³ö±£»¤´ëÊ©£¬µ«ÈôGoogle WorkspaceÖÎÀíԱδÆôÓã¬ÈÕÀúÖÐÈÔ»á×Ô¶¯Ôö³¤´ËÀàÔ¼Çë¡£
https://www.bleepingcomputer.com/news/security/ongoing-phishing-attack-abuses-google-calendar-to-bypass-spam-filters/
4. APT29ºÚ¿Í×éÖ¯ÀûÓÃ193¸öRDP´úÀí·þÎñÆ÷Ö´ÐÐMiTM¹¥»÷
12ÔÂ18ÈÕ£¬¶íÂÞ˹ºÚ¿Í×éÖ¯APT29£¨Óֳơ°ÎçÒ¹±©Ñ©¡±£©ÕýÀûÓÃÓÉ193¸öÔ¶³Ì×ÀÃæºÍ̸£¨RDP£©´úÀí·þÎñÆ÷×é³ÉµÄÍøÂçÖ´ÐÐÖÐÑëÈË£¨MiTM£©¹¥»÷£¬Ö¼ÔÚÇÔÈ¡Êý¾Ý¡¢Í´´¦²¢×°ÖöñÒâ¸ºÔØ¡£¸Ã×é֯ʹÓÃPyRDPºì¶Ó´úÀí¹¤¾ß£¬Í¨¹ýRDPºÍ̸ɨÃèÊܺ¦ÕßÎļþϵͳ¡¢ÇÔÈ¡Êý¾Ý²¢ÔÚÔ¶³ÌÖ´ÐжñÒⷨʽ¡£¾ÝÇ÷Ïò¿Æ¼¼£¨Trend Micro£©»ã±¨£¬APT29µÄÖ¸±êÔ̺¬µ±¾Ö¡¢¾üÊ¡¢±í½»¡¢IT¡¢ÔÆ·þÎñ¡¢µçÐż°ÍøÂ簲ȫ¹«Ë¾µÈ£¬³ö¸ñÕë¶ÔÃÀ¹ú¡¢·¨¹ú¡¢°Ä´óÀûÑǵȶà¸ö¹ú¶ÈµÄʵÌå¡£2024Äê10Ô£¬ÑÇÂíÑ·ºÍCERT-UA°ä²¼µÄ»ã±¨ÏÔʾ£¬APT29ÓÕÆÊܺ¦Õßͨ¹ýÍøÂç´¹µöÓʼþÏνӵ½¶ñÒâRDP·þÎñÆ÷£¬¹²Ïí±¾µØ×ÊÔ´£¬´Ó¶øÎÞǰÌá½Ó¼ûÃô¸ÐÐÅÏ¢¡£Ç÷Ïò¿Æ¼¼µÄ×îÐÂ×êÑнÒʾÁË193¸öRDP´úÀí·þÎñÆ÷½«ÏνӳÁ¶¨ÏòÖÁ34¸öºó¶Ë·þÎñÆ÷£¬Ê¹¹¥»÷ÕßÄܼලºÍÀ¹½ØRDP»á»°¡£ºÚ¿ÍÀûÓÃPyRDP¹¤¾ßÀ¹½ØÊܺ¦ÕßÓëÔ¶³Ì»á»°¼äµÄͨѶ£¬¼Í¼ʹ´¦¡¢ÇÔÈ¡Êý¾Ý²¢ÔÚÐÂÏνÓÉÏÔËÐжñÒâºÅÁî¡£´Ë±í£¬APT29»¹Ñ¡È¡Ã³Ò×VPN¡¢TOR³ö¿Ú½ÚµãºÍסլ´úÀí·þÎñ¸²¸Ç¶ñÒâ·þÎñÆ÷IPµØÖ·¡£Îª·À±¸´ËÀ๥»÷£¬Óû§Ó¦½öÓëÒÑÖª¡¢ÊÜÐÅÀµµÄ·þÎñÆ÷³ÉÁ¢RDPÏνӣ¬²¢¾¯ÌèÀ´×Ôδ֪ÆðÔ´µÄRDPÏνÓÒªÇó¡£
https://www.bleepingcomputer.com/news/security/russian-hackers-use-rdp-proxies-to-steal-data-in-mitm-attacks/
5. ÍøÂç´¹µö»î¶¯ÀÄÓÃHubSpotÇÔÈ¡20,000 AzureÕÊ»§Í´´¦
12ÔÂ18ÈÕ£¬Õë¶ÔµÂ¹úºÍÓ¢¹úµÄÆû³µ¡¢»¯Ñ§¼°¹¤ÒµÔì×÷¹«Ë¾£¬Ò»³¡ÍøÂç´¹µö»î¶¯ÔÚÀûÓÃHubSpotƽ̨ÇÔÈ¡Microsoft AzureÕÊ»§Í´´¦¡£¾ÝPalo Alto NetworksµÄUnit 42×êÑÐÍŶӻ㱨£¬¸Ã»î¶¯×Ô2024Äê6ÔÂÆðÖÁÉÙ³ÖÐøÖÁ9Ô£¬ÒÑΣ¼°Ô¼20,000¸öÕË»§¡£ÍþвÐÐΪÕßͨ¹ýHubSpot Free Form Builder´´½¨ºýŪÐÔ±í¸ñ£¬²¢ÀûÓ÷ÂÕÕDocuSignµÄPDF½«Êܺ¦Õß³Á¶¨ÏòÖÁÆ¾Ö¤ÍøÂçÒ³Ãæ¡£ÕâÐ©Ò³ÃæÎ»ÓÚ¹¥»÷Õß½ÚÔìµÄ¡°.buzz¡±ÓòÃûÍøÕ¾ÉÏ£¬·ÂÕÕMicrosoft Outlook Web AppºÍAzureµÇ¼½çÃæ¡£Ö»¹ÜHubSpot»ù´¡ÉèʩδÊܹ¥»÷£¬µ«Æä±»ÓÃ×÷ÖÐÑë²½ÖèÊèµ¼Êܺ¦Õß¡£ÓÉÓÚÓʼþÔ̺¬ºÏ·¨·þÎñÁ´½Ó£¬ËüÃdz£Äܱܿª°²È«¹¤¾ß¼ì²â½øÈëÊÕ¼þÏ䡣Ȼ¶ø£¬ÓйØÓʼþδͨ¹ýSPF¡¢DKIMºÍDMARC²é³¡£Ôڳɹ¦ÈëÇÖºó£¬ÍþвÐÐΪÕßʹÓÃVPN¼Ù×°µØÀíµØÎ»£¬²¢ÓëIT²¿ÃÅÇÀ¶áÕË»§½ÚÔìȨ¡£Unit 42»¹·¢ÏÖÁ˸ûÖÐʹÓõÄÐÂÐÍ×ÔÖÎϵͳ±àºÅºÍÓû§´úÀí×Ö·û´®£¬¿ÉÓÃÓÚÍþв¼ø±ð¡£Ö»¹ÜÎÞÊý·þÎñÆ÷ÒÑÏÂÏߣ¬µ«¸Ã»î¶¯ÔÙ´ÎÅú×¢ÍþвÐÐΪÕßÕý²»ÐÝË÷ÇóÈÆ¹ý°²È«µÄв½Öè¡£
https://www.bleepingcomputer.com/news/security/hubspot-phishing-targets-20-000-microsoft-azure-accounts/
6. ÄÚ²¼À˹¼ÓÖÝRegional CareÒ½ÁƱ£ÏÕ¹«Ë¾Êý¾Ýй¶
12ÔÂ18ÈÕ£¬ÄÚ²¼À˹¼ÓÖÝÒ½ÁƱ£ÏÕ¹«Ë¾Regional Care½üÆÚÅû¶ÁËһ·Êý¾Ýй¶ÊÂÎñ£¬¸ÃÊÂÎñÓ°ÏìÁ˳¬¹ý225,000ÈË¡£2024Äê9ÔÂÖÐÑ®£¬Regional Care·¢ÏÔìäÍøÂçÖеÄÒ»¸öÕË»§³öÏÖÒì³£»î¶¯£¬²¢µ±¼´¹Ø¹ØÁ˸ÃÕË»§¡£¾¹ýÍøÂ簲ȫר¼ÒµÄµ÷²é£¬È·ÈÏ¡°Î´¾ÊÚȨµÄÒ»·½¡±¿ÉÄÜ´ÓÆäϵͳÖлñÈ¡ÁËһЩÎļþ¡£11ÔÂ8ÈÕ£¬¸Ã¹«Ë¾È·¶¨²¿ÃÅÊÜËðÎļþÔ̺¬Ãô¸ÐÓ×ÎÒÐÅÏ¢£¬ÈçÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢Éç»á°²È«ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍ½¡È«±£ÏÕÐÅÏ¢µÈ¡£Õë¶ÔÉç»á±£ÏÕºÅÂ뱻й¶µÄÓ×ÎÒ£¬Regional CareÌṩÁËÃâ·ÑµÄÐÅÓþ¼à¿Ø·þÎñ¡£¸ÃÊÂÎñÒѱ»´«µÝ¸øÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒ¡£½ØÖÁĿǰ£¬¸Ã±£ÏÕ¹«Ë¾ÉÐδ·ÖÏí¸ü¶à¹ØÓÚÕâ´ÎÈëÇÖµÄÐÅÏ¢£¬ÇÒSecurityWeekҲδ·¢ÏÖÈκÎÒÑÖªµÄÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£
https://www.securityweek.com/regional-care-data-breach-impacts-225000-people/


¾©¹«Íø°²±¸11010802024551ºÅ