ºÚ¿ÍIntelBrokerÐû³Æ¹¥ÆÆHPE£¬Ð¹Â¼ûô¸ÐÊý¾Ý²¢ÍøÉÏÏúÊÛ

°ä²¼¹¦·ò 2025-01-21

1. ºÚ¿ÍIntelBrokerÐû³Æ¹¥ÆÆHPE£¬Ð¹Â¼ûô¸ÐÊý¾Ý²¢ÍøÉÏÏúÊÛ


1ÔÂ19ÈÕ£¬ºÚ¿ÍIntelBrokerÐû³ÆÒѳɹ¦ÈëÇÖ»ÝÆÕÆóÒµ(HPE)£¬Ò»¼Ò×ܲ¿Î»ÓÚÃÀ¹úµÂ¿ËÈøË¹ÖÝÐÝ˹¶ÙµÄÈ«ÇòÐÔ¼¼Êõ½â¾ö¹æ»®ÌṩÉÌ£¬²¢Ð¹Â¶ÁËÔ̺¬Ô´´úÂë¡¢Ö¤ÊéºÍÓ×ÎÒÉí·ÝÐÅÏ¢(PII)ÔÚÄÚµÄÃô¸ÐÊý¾Ý£¬ÕâЩÊý¾ÝĿǰÔÚÍøÉÏÏúÊÛ¡£IntelBrokerÒªÇóÒÔÃÅÂÞ±Ò(XML)¼ÓÃÜÇ®±ÒÖ§¸¶£¬ÒÔά³ÖÄäÃûºÍ²»³É×·×Ù¡£¾Ý³Æ£¬Õâ´ÎÈëÇÖÊÇÖ±½Ó¹¥»÷HPE»ù´¡ÉèÊ©µÄÁ˾Ö£¬²»Éæ¼°µÚÈý·½½Ó¼ûȨÏÞ¡£ºÚ¿Í·ÖÏíµÄÊý¾ÝÊ÷ºÍ½ØÍ¼Ëƺõ֤ʵÁËÔ´´úÂ롢˽ÓÐGitHub´æ´¢¿â¡¢Docker¹¹½¨¡¢Ö¤ÊéÒÔ¼°Óû§Êý¾ÝµÈÃô¸ÐÐÅÏ¢µÄй¶¡£ÈôÊǾ­»ÝÆÕ֤ʵ£¬Õâ¿ÉÄÜ×é³ÉÒ»´Î³Á´ó°²È«ÊÂÎñ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬HPEºÍHP Inc.ÊÇÁ½¼Ò·ÖÆçµÄ¹«Ë¾£¬Ç°ÕßרһÓÚÆóÒµ¼¶IT½â¾ö¹æ»®£¬ºóÕßÔòרһÓÚÏû·Ñ²úÆ·¡£IntelBroker´ËǰÒÑÉæÏÓ¶àÆðÊý¾Ýй¶ÊÂÎñ£¬Ô̺¬ÈëÇÖ˼¿Æ¡¢Åµ»ùÑǺÍAMDµÈ³ÛÃûÆóÒµ¡£


https://hackread.com/hackers-claim-hewlett-packard-data-breach-sale/


2. ChatGPTÅÀ³æ·ì϶»òÖÂDDoS¹¥»÷


1ÔÂ19ÈÕ£¬µÂ¹ú°²È«×êÑÐÔ±Benjamin Flesch·¢ÏÖOpenAIµÄChatGPT API´æÔÚÒ»¸öDZÔڵݲȫ·ì϶£¬¿ÉÄܱ»ÀûÓÃÀ´ÌáÒéÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷¡£Í¨¹ýÏòChatGPT API·¢ËÍÔ̺¬´óÁ¿ÂÔÓÐ·ÖÆçµ«Ö¸ÏòÍ³Ò»ÍøÕ¾µÄURLÁбíµÄHTTP POSTÒªÇ󣬹¥»÷ÕßÄܹ»´¥·¢ChatGPTÅÀ³æ¶ÔÕâÐ©ÍøÕ¾µÄƵÈÔ½Ó¼û£¬´Ó¶ø¶ÔÖ¸±êÍøÕ¾Ôì³ÉѹÁ¦£¬ÉõÖÁµ¼Ö·þÎñÖжÏ¡£FleschÖ¸³ö£¬ChatGPT APIÔÚ´¦ÖÃÕâЩҪÇóʱ´æÔÚÖÊÁ¿È±µã£¬¼ÈûÓв鳭URLÁбíÖеijÁ¸´ÏҲûÓжÔURLÊýÁ¿½øÐÐÏÞ¶È¡£ÕâÒâζ×Å£¬¼´±ã¹¥»÷ÕßÖ»·¢ËÍÉÙÁ¿ÒªÇó£¬Êܺ¦ÕßÒ²¿ÉÄÜÊÕµ½´óÁ¿À´×Ô·ÖÆçIPµØÖ·µÄ½Ó¼ûÒªÇ󣬵¼ÖÂDDoSÖ¢×´¡£´Ë±í£¬Flesch»¹Ìáµ½£¬Õâ¸öAPI»¹¿ÉÄÜÊܵ½ÌáÐÑ×¢Èë¹¥»÷µÄÓ°Ïì¡£Ëûͨ¹ý¶àÖÖÇþ·ÏòOpenAI»ã±¨ÁËÕâ¸ö·ì϶£¬µ«ÉÐδµÃµ½»Ø¸´¡£FleschÖÊÒÉΪʲôOpenAIûÓÐʵÏÖµ¥Ò»µÄÑéÖ¤Âß¼­À´Ô¤·ÀÕâÖÖÀÄÓ㬲¢²Â²âÕâ¿ÉÄÜÊÇOpenAIµÄAI´úÀíÏîÖ÷ÕÅÒ»¸öʾÀý£¬¶øÕâ¸öAI´úÀíÔÚ´¦ÖÃÒªÇóʱÏÔÈ»²»×ãÄÚÖõݲȫÐÔ¡£ËûÒÔΪ£¬ÕâÖÖÉè¼ÆÈ±µãÔÚ¾­Ñé·á˶µÄ¹è¹È¹¤³Ìʦ¿´À´ÊDz»³ÉÉèÏëµÄ£¬ÓÉÓÚÀàËÆ¹È¸èÕâÑùµÄÅÀ³æÒѾ­´æÔÚ¶àÄ꣬²¢ÇÒ¶¼ÓÐÏ޶ȶÔÍ³Ò»ÍøÕ¾µÄÒªÇóÁ¿µÄ»úÔì¡£


https://www.theregister.com/2025/01/19/openais_chatgpt_crawler_vulnerability/


3. CL-UNK-0979ÀûÓÃIvanti·ì϶»ñÈ¡ÍøÂç½Ó¼ûȨÏÞ


1ÔÂ18ÈÕ£¬Palo Alto Networks °ä²¼ÁËÒ»·ÝÍþв¼ò±¨£¬½ÒʾÁË Ivanti ²úÆ·ÖдæÔÚµÄÁ½¸öÑϳÁ·ì϶£ºCVE-2025-0282 ºÍ CVE-2025-0283¡£ÕâÁ½¸ö·ì϶ӰÏì Ivanti µÄ Connect Secure¡¢Policy Secure ºÍ ZTA Íø¹ØÉ豸£¬ÕâЩÉ豸³£±»ÓÃÓÚʵÏÖÔ¶³ÌÍøÂçÏνÓ¡£CVE-2025-0282 ÊÇÒ»¸öÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ý·¢ËÍÌØÔìÒªÇóʵÏÖÔ¶³Ì´úÂëÖ´Ðеķì϶£¬±»ÆÀΪÑϳÁ¼¶±ð£¬CVSS ÆÀ·ÖΪ 9.0¡£¶ø CVE-2025-0283 Ôòʹ±¾µØ¾­¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÄÜÌáÉýȨÏÞ£¬ÆäÑϳÁÐÔÆÀ¼¶Îª¸ß£¬CVSS ÆÀ·ÖΪ 7.0¡£¾ÝÍøÂ簲ȫ×éÖ¯¼Í¼£¬Ô̺¬ Mandiant¡¢Watchtowr Labs ºÍ Palo Alto Networks ÔÚÄڵĶà¼Ò»ú¹¹Òѹ۲쵽¹¥»÷ÕßÀûÓà CVE-2025-0282 ÉøÈëÄÚ²¿ÍøÂç¡£¹¥»÷»î¶¯±»×·×ÙΪ CL-UNK-0979£¬Éæ¼°Ëĸö½×¶Î£º³õʼ½Ó¼û¡¢Æ¾Ö¤ÍøÂçºÍºáÏòÒÆ¶¯¡¢·ÀÓùÌÓ±ÜÒÔ¼°ÓƾÃÐÔ¡£¹¥»÷ÕßʹÓÃÁËÔ̺¬×Ô½ç˵ Perl ¾ç±¾ ldap.pl¡¢ÄÚ´æ×ª´¢¹¤¾ßºÍ DLL ²à¼ÓÔØµÈÔÚÄڵĶàÖÖºÅÁîºÍ½ÚÔì·þÎñÆ÷¼°¼¼Êõ¡£Ivanti ÒѰ䲼²¹¶¡£¬²¢½¨Òéµ±¼´¸üÐÂËùÓÐÊÜÓ°ÏìµÄϵͳ£¬Í¬Ê±¼¤ÀøÊ¹ÓÃÆëÈ«ÐԲ鳭¹¤¾ß (ICT) ¼à¿Ø¿ÉÒɻ¡£


https://securityonline.info/cl-unk-0979-exploit-zero-day-flaw-in-ivanti-connect-secure-to-gain-access-to-networks/


4. Ú¿Æ­ÕßÀûÓÃTruth SocialÌáÒéÍøÂç´¹µöºÍڲƭ»î¶¯


1ÔÂ19ÈÕ£¬Truth SocialÊÇÒ»¸öÓÉÌØÀÊÆÕýÌåÓë¿Æ¼¼¼¯ÍÅÔÚ2022ÄêÍÆ³öµÄÉ罻ýÌåÆ½Ì¨£¬Èç½ñÈ´³ÉΪÁËÚ¿Æ­·Ö×ÓµÄÖØÒªÖ¸±ê¡£NetcraftµÄл㱨½ÒʾÁËÚ¿Æ­ÕßÈôºÎÀûÓÃ¸ÃÆ½Ì¨µÄÖ°ÄܺÍÓû§ÐÅÀµÀ´²ß¶¯´ó¹æÄ£ÍøÂç¹¥»÷¡£¸Ãƽ̨¼±¾çµÄÓû§Ôö³¤ºÍÒÔÉçÇøÎªÖÐÐĵÄÉè¼ÆÎªÚ¿Æ­ÕßÌṩÁË·á˶µÄÐÅÏ¢ÆðÔ´£¬Ê¹ËûÃÇ¿ÉÄÜÇáËɼø±ðºÍÁªÏµÆäËûÓû§¡£Í¬Ê±£¬Óû§¶Ôƽ̨¡°ÕæÏࡱµÄ¸ß¶ÈÐÅÀµÒ²ÎªÚ¿Æ­Õß´´ÔìÁË·ÊÈĵÄÄàÍÁ£¬ÆäÖÐ87%µÄÓû§½øÕ¹Æ½Ì¨ÉϵÄÐÂÎźÍÐÅÏ¢´ó¶àÊÇÕýÈ·µÄ£¬ÕâÖÖ¹ý¶È×Ô¸ºÔö³¤ÁËÊÜÆ­µÄ·çÏÕ¡£Netcraft¹Û²ìµ½ÁËһϵÁÐÕë¶ÔTruth SocialÓû§µÄÚ¿Æ­ÐÐΪ£¬Ô̺¬ÍøÂç´¹µöÁ´½Ó¡¢Í¶×ÊÚ¿Æ­ºÍÔ¤¸¶·ÑÚ¿Æ­µÈ£¬ÉõÖÁÒ»ÌìÖ®ÄÚ¾ÍÄÜÊÕµ½40Ìõδ¾­ÒªÇóµÄÚ¿Æ­ÐÂÎÅ¡£´Ë±í£¬Ú¿Æ­Õß»¹ÀûÓÃ¸ÃÆ½Ì¨Èƹý´«Í³µÄµç×ÓÓʼþ°²È«´ëÊ©£¬½«Æä×÷Ϊ³Á¶¨Ïò¹¤¾ßÀ´Ô¤·À±»·¢ÏÖ¡£NetcraftÖÒ¸æ³Æ£¬Ë¼¿¼µ½È«Çòδ»ã±¨µÄÊÂÎñ£¬ÕâЩڿƭÔì³ÉµÄÏÖʵËðʧ¿ÉÄܸߴïÊýÊ®ÒÚÉõÖÁÊýÍòÒÚÃÀÔª¡£ÎªÁËÓ¦¶ÔÕâЩÍþв£¬NetcraftÇ¿µ÷±ØÒªÔ충׳´óµÄ¼ì²âºÍ¶Ï¸ùÕ½Êõ£¬ÀûÓÃм¼ÊõÀ´± £»¤Ïû·ÑÕßÃâÊÜÖÐÉË¡£


https://securityonline.info/scammers-exploit-truth-social-to-launch-phishing-and-fraud-campaigns/


5. ÄÏÑÇÔâ¡°Tanzeem¡±¶ñÒâÈí¼þ¹¥»÷£¬DONOT APT×éÖ¯³ÖÐøÍþв


1ÔÂ20ÈÕ£¬¾ÝCyber Security News±¨Â·£¬CyfirmaµÄÍøÂ簲ȫÍŶӽüÆÚ¸æ·¢ÁËÒ»ÏîÕë¶ÔÄÏÑÇ£¬³ö¸ñÊÇÓ¡¶È¿ËʲÃ×¶ûµØÓòÓû§µÄ¸´ÔÓAndroid¶ñÒâÈí¼þ»î¶¯¡£¸Ã¶ñÒâÈí¼þ¼Ù×°³ÉÃûΪ¡°Tanzeem¡±µÄ̸ÌìÀûÓã¬ÒâͼÇÔȡָ±êÉ豸ÖеÄÃô¸ÐÊý¾Ý¡£¡°Tanzeem¡±ÔÚÎÚ¶û¶¼ÓïÖÐÒâΪ¡°×éÖ¯¡±£¬³£Óë¸ÃµØÓò¿Ö²À×éÖ¯ºÍ·¨ÂÉ»ú¹¹ÓйØÁª£¬°µÊ¾ÆäÕë¶ÔÌØ¶¨Ó×ÎÒ»ò¼¯Ìå¡£´Ë¶ñÒâÈí¼þ¹éÊôÓÚÓµÓÐÓ¡¶È²¼¾°µÄ¡°DONOT¡±APT×éÖ¯¡£ËüÀûÓÃOneSignalÆ½Ì¨ÍÆËÍÍøÂç´¹µöÁ´½Ó½øÐд«²¼£¬×°ÖúóËäÖÕ³¡ÔËÐУ¬µ«ÒÑÒªÇó¶àÏîÃô¸ÐȨÏÞ£¬Èçͨ»°¼Í¼¡¢ÁªÏµÈË¡¢¶ÌÐÅ¡¢Îļþ´æ´¢ºÍµØÎ»Êý¾Ý£¬²¢ÊÔͼ»ñÈ¡µç×ÓÓʼþºÍÓû§ÃûȨÏÞ¡£´Ë±í£¬¸Ã¶ñÒâÈí¼þѡȡ»ìºÏ¼¼Êõ°µ²Ø´úÂ룬¾ß±¸Ã¶¾ÙÎļþ¡¢²¶»ñ¼üÅÌÊäÈë¡¢ÍøÂçϵͳÐÅÏ¢ºÍÆÁϼÔìµÈÖ°ÄÜ¡£DONOT APT×éÖ¯³Ö¾ÃÒÔÄÏÑǵ±¾ÖºÍ¾üÊÂ×é֯Ϊָ±ê£¬Õâ´ÎÐж¯ÏÔʾÆäÕ½Êõ²»ÐÝÑݱä¡£ÍøÂ簲ȫר¼ÒÖҸ棬¸Ã×éÖ¯¿ÉÄܳÖÐø¸Ä½ø¹¥»÷²½Ö裬½¨ÒéÓû§×°ÖÃÐÂÀûÓÃʱά³ÖÉóÉ÷£¬ÓÈÆäÊÇÃæ¶ÔÒªÇó´óÁ¿È¨ÏÞµÄÀûÓá£


https://cybersecuritynews.com/new-android-malware-mimics-chat-app/


6. ±´¶ûÉ­¼¯ÍÅй¶Á˳¬¹ý15,000¸öFortiGate·À»ðǽÅäÖÃ


1ÔÂ20ÈÕ£¬±´¶ûÉ­¼¯ÍÅй¶Á˳¬¹ý15,000¸öFortiGate·À»ðǽµÄÅäÖ㬶ÔÈ«ÇòʹÓÃÕâЩÉ豸µÄ×éÖ¯×é³ÉÁËÑϳÁÍþв¡£Õâ´Îй©ÊÂÎñʹµÃ¹¥»÷Õß¿ÉÄܽӼûÃô¸Ðϵͳ²¢Èƹý·ÀÓù´ëÊ©£¬ÆäÖÐÃÀ¹ú¡¢Ó¢¹ú¡¢²¨À¼ºÍ±ÈÀûʱµÈµØÊÜÓ°Ïì×îΪÑϳÁ¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬Óû§Ãû¡¢ÃÜÂ루²¿ÃÅΪ´¿Îı¾£©¡¢É豸ÖÎÀíÊý×ÖÖ¤ÊéÒÔ¼°ËùÓзÀ»ðǽ¹æ¶¨£¬Îª¹¥»÷ÕßÌṩÁË·á˶µÄ¹¥»÷×ÊÔ´¡£Â¶³öµÄÓû§ÃûºÍÃÜÂë¿ÉÄܱ»Ö±½ÓÓÃÓÚ½Ó¼ûÍøÂçÉϵÄÃô¸Ðϵͳ£¬¶øÐ¹Â¶µÄ·À»ðǽÅäÖÃÔò¿ÉÄܶ³öÄÚ²¿ÍøÂç½á¹¹£¬Ê¹¹¥»÷Õß¿ÉÄܼø±ð²¢ÀûÓÃÈõµã¡£´Ë±í£¬±»Ð¹Â¶µÄÊý×ÖÖ¤Êé¿ÉÄܵ¼ÖÂδ¾­ÊÚȨµÄ½Ó¼û»òÔÚ°²È«Í¨Ñ¶ÆÚ¼äµÄÉí·Ý¼ÙÒâ¡£Ö»¹ÜһЩ×éÖ¯ÔÚ2022ÄêÒѾ­½¨²¹ÁËÓйطì϶£¨CVE-2022-40684£©£¬µ«ÓÉÓÚÕâÊÇÒ»¸öÁãÈÕ·ì϶£¬²é³­ÊÇ·ñ´æÔÚ±»ÈëÇֵļ£ÏóÒÀÈ»ÖÁ¹Ø³ÁÒª¡£ÎªÁ˼õÇá´ËÀàйÃÜ´øÀ´µÄ·çÏÕ£¬×éÖ¯Ó¦¸üÐÂÉ豸ºÍVPNƾ֤£¬Ö´ÐÐÇ¿ÃÜÂëÕ½Êõ£¬ÉóºË²¢³ÁÐÂÅäÖ÷À»ðǽ£¬ÂÖ»»ÊÜËðµÄÊý×ÖÖ¤Ê飬²¢È·¶¨×éÖ¯Öн¨²¹·ì϶µÄ¹¦·ò±í¡£CloudSEKÌṩÁËÒ»¸öÓÐЧ×ÊÔ´£¬ÓÃÓÚ²é³­ÍøÂçÊÇ·ñÊôÓÚ¶³öµÄIPÁìÓò£¬ÒÔÔ®ÊÖ×éÖ¯± £»¤ÍøÂç²¢½µµÍDZÔÚ·çÏÕ¡£


https://hackread.com/belsen-group-leaks-fortigate-firewall-configurations/