ÐÂÐÍFireScamÐÅÏ¢ÇÔÈ¡¼äµýÈí¼þ¼Ù×°³ÉTelegram Premium
°ä²¼¹¦·ò 2025-01-061. ÐÂÐÍFireScamÐÅÏ¢ÇÔÈ¡¼äµýÈí¼þ¼Ù×°³ÉTelegram Premium
1ÔÂ4ÈÕ£¬Ò»ÖÖÃûΪ¡°FireScam¡±µÄÐÂÐÍ Android ¶ñÒâÈí¼þÔÚͨ¹ý GitHub ÉϵĴ¹µöÍøÕ¾ÒÔ Telegram ÀûÓ÷¨Ê½µÄ¸ß¼¶°æ±¾½øÐд«²¼£¬ÕâÐ©ÍøÕ¾·ÂÕÕÁ˶íÂÞË¹ÒÆ¶¯É豸ÀûÓ÷¨Ê½Êг¡ RuStore¡£ÕâЩ´¹µöÍøÕ¾ÀûÓöíÂÞ˹Óû§¶ÔÒÆ¶¯Èí¼þ½Ó¼ûÊÜÏ޵IJ¼¾°£¬ÌṩֲÈëÆ÷Ä£¿éGetAppsRu.apk£¬¸ÃÄ£¿éʹÓÃDexGuard»ìºÏÒÔÌӱܼì²â²¢»ñÈ¡¶àÖÖȨÏÞ¡£Ëæºó£¬Ëü×°ÖÃÖØÒªµÄ¶ñÒâÈí¼þ¸ºÔØ¡°Telegram Premium.apk¡±£¬ÒªÇó¼à¿ØÍ¨Öª¡¢¼ôÌù°åÊý¾Ý¡¢¶ÌÐź͵绰·þÎñµÈȨÏÞ¡£FireScamÖ´Ðк󣬻áÏÔʾһ¸öºýŪÐÔµÄTelegramµÇÂ¼Ò³Ãæ£¬ÇÔÈ¡Óû§Í´´¦£¬²¢ÓëFirebaseʵʱÊý¾Ý¿âͨѶ£¬ÉÏ´«±»µÁÊý¾Ý²¢×¢²áÊÜϰȾÉ豸¡£´Ë±í£¬Ëü»¹³ÉÁ¢ÓƾõÄWebSocketÏνÓÒÔÖ´ÐÐʵʱºÅÁ¼à¿ØÆÁÄ»»î¶¯±ä¶¯¡¢µç×ÓÉÌÎñÂòÂôÒÔ¼°Óû§ÊäÈëºÍ¼ôÌù°åÄÚÈÝ£¬ÉõÖÁÀ¹½Ø×Ô¶¯Ìî³äÊý¾Ý¡£Ö»¹ÜÉÐδȷ¶¨FireScamµÄÔËÓªÕߣ¬µ«×êÑÐÈËÔ±ÒÔΪËüÊÇÒ»ÖÖ¸´ÔÓÇÒѡȡÏȽø¶ã±Ü¼¼ÊõµÄÍþв¡£Òò¶ø£¬Óû§Ó¦ÉóÉ÷¶Ô´ýÀ´×ÔDZÔÚ²»ÊÜÐÅÀµÆðÔ´µÄÎļþºÍ²»ÊìϤµÄÁ´½Ó¡£
https://www.bleepingcomputer.com/news/security/new-firescam-android-data-theft-malware-poses-as-telegram-premium-app/
2. UpdraftPlus²å¼þÑϳÁ°²È«·ì϶CVE-2024-10957ÆØ¹â
1ÔÂ4ÈÕ£¬È«ÇòÓг¬¹ý300Íò¸öWordPressÍøÕ¾Ê¹ÓõÄUpdraftPlus±¸·ÝºÍǨáã²å¼þÖз¢ÏÖÁËÒ»¸öÑϳÁ°²È«·ì϶£¬±àºÅΪCVE-2024-10957£¬CVSSÆÀ·ÖΪ8.8¡£¸Ã·ì϶´æÔÚÓÚ²å¼þµÄrecursive_unserialized_replaceº¯ÊýÖУ¬ÓÉÓÚδÕýÈ·´¦Öò»ÊÜÐÅÀµµÄÊäÈë·´ÐòÁл¯£¬¿ÉÄܵ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÀûÓÃPHP¶ÔÏó×¢Èë·ì϶¡£Ö»¹ÜUpdraftPlus×ÔÉíûÓÐÒÑÖªµÄPHP¶ÔÏóPOPÁ´£¬µ«ÆäËûÒ×Êܹ¥»÷µÄ²å¼þ»òÖ÷Ìâ¿ÉÄÜʹ¹¥»÷Õß¿ÉÄÜɾ³ýËÁÒâÎļþ¡¢½Ó¼ûÃô¸ÐÊý¾Ý»òÖ´ÐÐËÁÒâ´úÂë¡£³ÁÒªµÄÊÇ£¬´Ë·ì϶±ØÒªÖÎÀíÔ±ÔÚ²å¼þÄÚÖ´ÐÐËÑË÷ºÍ´úÌæ²Ù×÷ÄÜÁ¦´¥·¢¶ñÒâ¸ºÔØ¡£°²È«×êÑÐÔ±WebbernautÒò·¢ÏÖ²¢ÕƹÜÈεØÅû¶´Ë·ì϶¶øÊܵ½ÔÞÃÀ¡£´Ë·ì϶ӰÏìUpdraftPlusµÄËùÓа汾£¬Ö±ÖÁ1.24.11°æ£¬´óÁ¿WordPressÍøÕ¾¿ÉÄÜÃæ¶Ô·çÏÕ¡£UpdraftPlusÍŶÓÒÑÔÚ1.24.12°æ±¾Öнâ¾öÁË´Ë·ì϶£¬½¨ÒéËùÓÐЧ»§µ±¼´¸üÐÂÖÁ¸Ã°æ±¾¡£
https://securityonline.info/cve-2024-10957-exposes-over-3-million-wordpress-sites-to-unauthenticated-php-object-injection-exploits/
3. Nessus´úÀíÒò¸üÐÂÃýÎóÏÂÏߣ¬TenableÒªÇó¿Í»§ÊÖ¶¯Éý¼¶¸´Ô
1ÔÂ3ÈÕ£¬Tenable¹«Ë¾½üÆÚÔâ·êÁËÒ»´ÎÈí¼þ¸üÐÂÃýÎ󣬵¼ÖÂÆäNessus·ì϶ɨÃèÆ÷´úÀíÔÚ12ÔÂ31ÈÕ¶Ô²¿ÃÅÓû§ÏÂÏß¡£Õâ´ÎÊÂÎñÓ°ÏìÁËÈ«Çò¶à¸öµØÓò£¬³ö¸ñÊÇÄÇЩ¸üÐÂÖÁNessus Agent°æ±¾10.8.0ºÍ10.8.1µÄϵͳ¡£ÎªÁËÓ¦¶ÔÕâÒ»ÎÊÌ⣬TenableѸ¿ì³·ÏÂÁËÓÐÎÊÌâµÄ°æ±¾£¬²¢°ä²¼ÁËа汾10.8.2ÒÔ½¨¸´·ì϶¡£È»¶ø£¬ÊÜÓ°ÏìµÄ¿Í»§±ØÒªÊÖ¶¯Éý¼¶µ½Ð°汾»ò½µ¼¶µ½10.7.3°æ±¾ÄÜÁ¦Ê¹´úÀí³ÁÐÂÉÏÏß¡£ÈôÊÇʹÓÃÁË´úÀíÅäÖÃÎļþ½øÐÐÉý¼¶»ò½µ¼¶£¬»¹±ØÒª¶î±í³ÁÖòå¼þ¡£Tenable´òË㸴Բå¼þ¹©¸å£¬²¢ÌáÐÑËùÓÐÔËÐÐÊÜÓ°Ïì°æ±¾µÄ¿Í»§¾¡¿ì²ÉÈ¡Ðж¯¡£Õâ´ÎÊÂÎñËäδÔì³É´óÃæ»ýÖжϣ¬µ«ÀàËÆµÄÎÊÌâÔÚ2024Äê7ÔÂÓÉCrowdStrike Falcon¸üÐÂÃýÎóÒý·¢Ê±£¬Ôøµ¼ÖÂÈ«Çò¶à¸ö×éÖ¯ºÍ·þÎñµÄ̱»¾£¬Ô̺¬ÒøÐÓ×¢º½¿Õ¹«Ë¾µÈ³ÁÒª»ú¹¹¡£ÕâÔÙ´ÎÌáÐÑÁËÍøÂ簲ȫ¸üеijÁÒªÐÔºÍDZÔÚ·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/bad-tenable-plugin-updates-take-down-nessus-agents-worldwide/
4. Atos·ñ¶¨Space BearsÀÕË÷Èí¼þÍÅ»ïÈëÇÔìäÊý¾Ý¿â
1ÔÂ3ÈÕ£¬·¨¹ú¿Æ¼¼¾ÞÍ·Atos£¬×Ô³ÆÅ·ÖÞµ±ÏȵÄÍøÂ簲ȫ¡¢ÔÆÍÆËãºÍ¸ß»úÄÜÍÆË㹫˾£¬½üÈÕ·ñ¶¨ÁËSpace BearsÀÕË÷Èí¼þÍÅ»ï¹ØÓÚÈëÇÔìäÊý¾Ý¿âµÄÖ¸¿Ø¡£Space BearsÊÇÒ»¸öÏà¶Ô½ÏеÄÍøÂç·¸×ï×éÖ¯£¬Ê¹ÓÃË«³ÁÀÕË÷¼¿Á©£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢ÍþвÔÚÍøÉÏй¶£¬ÒÔÆÈʹÊܺ¦ÕßÖ§¸¶Êê½ð¡£12ÔÂ28ÈÕ£¬Space BearsÐû³ÆÈëÇÖÁËAtosÍøÂç²¢´òËã°ä²¼ÇÔÈ¡µÄ¹«Ë¾Êý¾Ý¿â¡£È»¶ø£¬AtosÔÚ12ÔÂ29ÈÕ°µÊ¾³õ²½·ÖÎöδ·¢ÏÖÈκÎÈëÇÖ»òÀÕË÷Èí¼þÓ°ÏìµÄÖ¤¾Ý£¬Ò²Î´ÊÕµ½Êê½ðÒªÇó¡£Atos½øÒ»²½Ö¸³ö£¬Space BearsÏÖʵ¹¥»÷µÄÊÇÓëAtosÎÞ¹ØµÄ±í²¿µÚÈý·½»ù´¡ÉèÊ©£¬¹ÌÈ»´æ´¢ÁËÌá¼°AtosµÄÊý¾Ý£¬µ«²¢²»ÊÜAtosÖÎÀí»ò±£»¤¡£AtosÇ¿µ÷ÆäÔÚÈ«ÇòÕ¼Óг¬¹ý6,500Ãû°²È«×¨¼ÒºÍ17¸öÐÂÒ»´ú°²È«ÔËÓªÖÐÐÄ£¬È«ÌìºòÔËÓªÒÔÈ·±£¼¯Íż°Æä¿Í»§µÄ°²È«¡£
https://www.bleepingcomputer.com/news/security/french-govt-contractor-atos-denies-space-bears-ransomware-attack-claims/
5. ÀïÊ¿Âú´óѧҽѧÖÐÐÄÔâÀÕË÷Èí¼þ¹¥»÷£¬67ÍòÓàÈËÊý¾Ýй¶
1ÔÂ3ÈÕ£¬Å¦Ô¼ÀïÊ¿Âú´óѧҽѧÖÐÐÄ£¨RUMC£©ÔÚ2023Äê5ÔÂÔâ·êÁËÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÒ½Ôº·þÎñÖжÏÊýÖÜ£¬²¢Ó°ÏìÁË674,033ÈË¡£Ö»¹ÜÃæ¶ÔÌôÕ½£¬Ò½ÔºÈÔά³ÖÁËÈ«ÃæµÄ»¼Õß·þÎñ£¬²¢½«Ò¹¼ä´´É˺ÍÖз绤ÀíµÄÖжÏÏÞ¶ÈÔÚ×îµÍÏÞ¶È¡£ÔÚÍøÂ簲ȫ¹«Ë¾µÄÔ®ÊÖÏ£¬Ò½ÔºÖÂÁ¦¸´Ôϵͳ²¢ÆÀ¹À¹¥»÷ÁìÓò£¬Í¬Ê±È·Èϵç×Ó½¡È«¼Í¼ϵͳδÊÜÓ°Ï죬µ«ÆäËûÎļþ¿ÉÄÜÔÚ¹¥»÷ÆÚ¼ä±»½Ó¼û»òɾ³ý¡£RUMCÅû¶ÁËһ·Êý¾Ýй¶ÊÂÎñ£¬¿ÉÄÜÉæ¼°Ô̺¬Ó×ÎҺͽ¡È«ÐÅÏ¢µÄÃô¸ÐÎļþ£¬ÈçÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢½ðÈÚÕË»§ÐÅÏ¢µÈ¡£Ò½ÔºÒÑ֪ͨÊÜÓ°ÏìµÄÓ×ÎÒ²¢½¨ÒéËûÃDzÉÈ¡±£»¤´ëÊ©£¬Í¬Ê±ÎªÉç»á°²È«ºÅÂëй¶µÄÓ×ÎÒÌṩ12¸öÔµÄÃâ·ÑÐÅÓþ¼à¿Ø¡£Ö»¹ÜÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬µ«RUMCÒÑÏòÓйز¿ÃÅ´«µÝÁ˸ÃÊÂÎñ£¬²¢·î¸æÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿Õâ´ÎÊý¾Ýй¶µÄ¾ßÌåÈËÊý¡£
https://securityaffairs.com/172641/data-breach/richmond-university-medical-center-data-breach.html
6. Nikki - UniversalÔâÀÕË÷Èí¼þ¹¥»÷£¬761.8GBÊý¾Ýй¶
1ÔÂ4ÈÕ£¬Nikki - UniversalÓÐÏÞ¹«Ë¾ÊÇÒ»¼Ò³ÛÃûµÄ»¯Ñ§Ôì×÷ÉÌ£¬ÓÚ2024Äê12ÔÂ27ÈÕ֤ʵÔâ·êÁËÀ´×ÔHunters InternationalÀÕË÷Èí¼þ×éÖ¯µÄ¸´ÔÓ¹¥»÷¡£Õâ´Î¹¥»÷²úÉúÔÚ12ÔÂ22ÈÕ£¬µ¼Ö¹«Ë¾²¿ÃÅ·þÎñÆ÷Éϵĵç×ÓÊý¾Ý±»¼ÓÃÜ£¬Éæ¼°Êý¾ÝÁ¿¸ß´ï761.8GB£¬Ô̺¬476,342¸öÎļþ¡£Hunters InternationalÒÔÆä¼¤½ø¼¿Á©Öø³Æ£¬Ðû³ÆÈôδÔÚ»®¶¨ÈÕÆÚ£¨2025Äê1ÔÂ10ÈÕ£©Ç°ÊÕµ½Êê½ð£¬½«¹«¿ªËùÓÐÇÔÈ¡µÄÊý¾Ý¡£Nikki - UniversalËäѸ¿ìÏìÓ¦²¢»ý¼«µ÷²é£¬µ«ÈÔδÄÜ×èÖ¹¹¥»÷´øÀ´µÄÇÖº¦¡£Hunters InternationalµÄ²Î¼Ó½øÒ»²½¼Ó¾çÁË´óÊÆµÄ¸´ÔÓÐÔ£¬ÆäÐû³ÆÒÑ»ñÈ¡²¢¼ÓÃÜÊý¾Ý£¬¶ÔNikki - UniversalµÄÍøÂ簲ȫ×é³ÉÑϳÁÍþв£¬²¢¿ÉÄÜÒý·¢¶àÖÖÍøÂçÍþвÓëÃûÓþ·çÏÕ¡£ÍøÂ簲ȫר¼ÒÔ¤²â£¬Ëæ×ÅÈËΪÖÇÄܺÍÁ¿×ÓÍÆËãµÄ·¢Õ¹£¬2025ÄêÍøÂç¹¥»÷µÄ¸´ÔÓ¶ÈºÍÆµÂʽ«½øÒ»²½Ôö³¤£¬ÒªÇó×éÖ¯±ØÐëÇ¿»¯·ÀÓù´ëÊ©¡£
https://cybersecuritynews.com/nikki-universal-cyber-attack/


¾©¹«Íø°²±¸11010802024551ºÅ