SonicWallÖҸ棺NetExtenderľÂí²¡¶¾ÇÔÈ¡VPNÍ´´¦
°ä²¼¹¦·ò 2025-06-251. SonicWallÖҸ棺NetExtenderľÂí²¡¶¾ÇÔÈ¡VPNÍ´´¦
6ÔÂ24ÈÕ£¬SonicWall½üÈÕ·¢³öÖҸ棬ÍþвÐÐΪÕßÔÚ·Ö·¢ÆäNetExtender SSL VPN¿Í»§¶ËµÄľÂí°æ±¾£¬ÒâͼÇÔÈ¡Óû§VPNÍ´´¦¡£Õâ¿î¼ÙðÈí¼þÓÉSonicWallºÍMicrosoft Threat Intelligence (MSTIC)µÄ×êÑÐÈËÔ±¹²Í¬·¢ÏÖ£¬Ëü·ÂÕÕÁ˺Ϸ¨µÄNetExtender v10.3.2.27°æ±¾£¬²¢ÍйÜÓÚÒ»¸ö¿´ËÆÕæÊµµÄºýŪÐÔÍøÕ¾ÉÏ£¬ÒÔÓÕÆÓû§ÏÂÔØ¡£Ö»¹Ü¸Ã¶ñÒâ×°Ö÷¨Ê½Îļþδ¾SonicWallÊý×ÖÊðÃû£¬µ«ÀíÓÉ¡°CITYLIGHT MEDIA PRIVATE LIMITED¡±ÊðÃû£¬¹Ê¿ÉÈÆ¹ý¸ù»ù·ÀÓù¡£¸ÃľÂíÀûÓ÷¨Ê½Ö¼ÔÚÇÔÈ¡VPNÅäÖúÍÕÊ»§Í´´¦£¬²¢½«Æäй¶¸ø¹¥»÷Õß¡£SonicWall NetExtenderÊÇÒ»¸öÔ¶³Ì½Ó¼ûVPN¿Í»§¶Ë£¬×¨ÎªÓëSonicWall SSL VPNÉ豸ºÍ·À»ðǽ¹²Í¬Ê¹ÓöøÉè¼Æ£¬³£±»ÖÐÓ×ÐÍÆóÒµµÄÔ¶³ÌÔ±¹¤¡¢ITÖÎÀíÔ±ºÍ³Ð°üÉÌʹÓá£SonicWallºÍMicrosoft·¢ÏÖ£¬¶ñÒâºýÅªÍøÕ¾·Ö·¢Á˸òúÆ·µÄÁ½¸öÅú¸ÄºóµÄ¶þ½øÔìÎļþ£¬ÆäÖÐNeService.exeµÄÑéÖ¤Âß¼±»½¨²¹ÒÔÈÆ¹ýÊý×ÖÖ¤Êé²é³£¬NetExtender.exeÎļþÔò±»Åú¸ÄÒÔÇÔÈ¡Êý¾Ý¡£¶ñÒâ´úÂë»áÔÚÓû§ÊäÈëVPNÅäÖò¢µã»÷¡°Ïνӡ±°´Å¥ºóÖ´ÐÐ×ÔÉíÑéÖ¤£¬²¢½«ÇÔÈ¡µÄÐÅÏ¢£¨Ô̺¬Óû§Ãû¡¢ÃÜÂë¡¢ÓòÃûµÈ£©Í¨¹ý¶Ë¿Ú8080·¢Ë͵½Ô¶³Ì·þÎñÆ÷¡£SonicWall½¨ÒéÓû§½ö´Ó¹Ù·½ÃÅ»§ÍøÕ¾ÏÂÔØÈí¼þ£¬ÒÔÔ¤·ÀÏÂÔØµ½¶ñÒâ°æ±¾¡£
https://www.bleepingcomputer.com/news/security/sonicwall-warns-of-trojanized-netextender-stealing-vpn-logins/
2. ºÚ¿ÍÈëÇÖµ±¾Ö¹ÍÔ±É豸£¬°ÍÀ¹ç½ü700Íò¹«ÃñÊý¾ÝÔâÇÔ
6ÔÂ25ÈÕ£¬¾Ý°²È«¹«Ë¾ÐÂÎÅ£¬ºÚ¿ÍÀûÓÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þϰȾ°ÍÀ¹çµ±¾Ö¹ÍÔ±É豸£¬ÇÔÈ¡½ü700Íò°ÍÀ¹ç¹«Ãñ´óÁ¿Êý¾Ý¡£ÉÏÔ°µÍøÌû×ӳƣ¬¶à¸öµ±¾Ö»ú¹¹ÔâÈëÇÖºó£¬740Íò°ÍÀ¹çÈËÓ×ÎÒÐÅÏ¢±»ÏúÊÛ¡£ÕâЩÊý¾ÝÓÉResecurity×êÑÐÈËÔ±·¢ÏÖ£¬ºÚ¿ÍBrigada Cyber PMCÔøÒÔ740ÍòÃÀÔªÏúÊÛ£¬°ÍÀ¹ç»Ø¾øÖ§¸¶Êê½ðºóÊý¾Ý±»°ä²¼¡£Resecurity´§Ä¦£¬µ±¾ÖITÔ±¹¤Ï°È¾¶ñÒâÈí¼þʹÍþвÐÐΪÕßµÃÒÔÇÔÈ¡Êý¾Ý£¬Êý¾ÝÖÁÉÙÀ´×Ô¹ú¶È½»Í¨ºÍ··°²È«¾Ö¼°¹«¹²ÎÀÉúºÍÉç»á¸£Àû²¿Á½¸ö·ÖÆçÆðÔ´¡£¹þµÂÑ·ÑÒ¹«Ë¾×¨¼Ò³Æ£¬ÊÜϰȾԱ¹¤Æ¾Ö¤ÔçÔÚ2023Äê4Ô¾ͱ»Redline InfostealerÇÔÈ¡£¬ºÚ¿Í½è´Ëδ¾ÊÚȨ½Ó¼û¹Ø¼üϵͳÇÔÈ¡Êý¾Ý¡£RedlineÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÔø±»¿í·ºÊ¹Ó㬿ÉÇÔÈ¡¶àÖÖÃô¸ÐÊý¾Ý¡£ÐÅÏ¢ÇÔÈ¡Õß³£Í¨¹ýÍøÂç´¹µöµÈ·½Ê½´«²¼£¬°ÍÀ¹çÒò¼±¾çÊý×Ö»¯ºÍµØÔµÕþÖγÁÒªÐÔ³ÉÖØÒªÖ¸±ê¡£Resecurity°µÊ¾£¬Ð¹Â¶ÐÅÏ¢Éæ¼°½ü700Íò¡°È«¹úÈ˶¡¡±ÐÅÏ¢£¬Êý¾Ý¼¯»òÓгÁ¸´¡¢ÒÑéæÃüÈËÔ±¼Í¼¼°·Ç¹«ÃñÐÅÏ¢£¬ÇÒÖÁÉÙÀ´×ÔÁ½´Î·ÖÆçÈëÇÖÊÂÎñ¡£°ÍÀ¹ç¹ÙÔ±³ÆÊý¾Ý¿ÉÄÜÔÚ¼¸Äêǰ¾Í±»µÁ²¢ÔÙ´ÎÁ÷´«¡£ResecurityÏò°ÍÀ¹çÍÆËã»úÓ¦¼±ÏìÓ¦Ó××é´«µÝÇé¿ö£¬²¢´§Ä¦Êý¾ÝÁ®¼Û¿ÉÄÜÊDZí¹úµý±¨»ú¹¹¸²¸Ç¼äµý»î¶¯µÄ¼¿Á©£¬Õâ´ÎÊÂÎñ»ò¾ßµØÔµÕþÖζ¯»ú¡£
https://therecord.media/data-leak-paraguayan-millions-infostealer
3. Androxgh0st½©Ê¬ÍøÂçÀ©´óÓ°ÏìÁìÓò£¬¹¥»÷ѧÊõ»ú¹¹
6ÔÂ24ÈÕ£¬CloudSEK×îе÷²éÏÔʾ£¬Androxgh0st½©Ê¬ÍøÂçÕý²»ÐÝÑݱ䣬ÆäÔË×÷·½Ê½²úÉú³Á´ó±ä¶¯£¬ÈëÇÖϵͳÄÜÁ¦¼±¾çÌáÉý¡£¸Ã½©Ê¬ÍøÂçÓÚ2023ËêÊ׳õ´Î±»·¢ÏÖ£¬Èç½ñÕýÀûÓøü¿í·ºµÄ³õʼ½Ó¼û²½Ö裬Ô̺¬ÀûÓÃѧÊõ»ú¹¹ÅäÖÃÃýÎóµÄ·þÎñÆ÷À´ÈëÇÖϵͳ£¬¼ÓÖÝ´óѧʥµØÑǸç·ÖУ¾ÍÊܵ½Á˹¥»÷¡£ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÔÚ2024Äê1ÔÂÒ²°ä²¼ÁËÓйذ²È«ÖҸ档CloudSEKµ÷²éÅú×¢£¬×Ô2024ÄêÔçÆÚ»ã±¨ÒÔÀ´£¬¸Ã½©Ê¬ÍøÂç¹¥»÷ÏòÁ¿¿âÀ©Ô¼Äª50%£¬Æä½«ºÅÁîÓë½ÚÔ죨C2£©¼Í¼Æ÷Ãæ°åÍйÜÔÚ¼ÓÖÝ´óѧʥµØÑǸç·ÖУ×ÓÓòÃûÉÏ£¬ÀûÓúϷ¨µ«Ò×Êܹ¥»÷µÄ¹«¹²ÓòÃûÀ´°µ²Ø¶ñÒâ»ù´¡ÉèÊ©£¬´Ëǰ»¹Ôø½«¼Í¼Æ÷ÍйÜÔÚÑÀÂò¼ÓµÄÊÂÎñ¾ÛºÏƽ̨ÉÏ¡£Androxgh0st½©Ê¬ÍøÂçÀûÓÃApache ShiroºÍSpring FrameworkµÈÊ¢ÐÐÈí¼þ¿ò¼ÜµÄÒÑÖª·ì϶£¬ÒÔ¼°WordPress²å¼þºÍLantronixÎïÁªÍøÉ豸µÄÎÊÌ⣬ÄÜÔËÐÐδ¾ÊÚȨµÄ´úÂë¡¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬ÉõÖÁÔÚÊÜϰȾϵͳÉϽøÐмÓÃÜÇ®±ÒÍÚ¿ó¡£
https://hackread.com/androxgh0st-botnet-expand-exploit-us-university-servers/
4. ¶ñÒâÈí¼þÀûÓöñÒâWordPress²å¼þÇÔÊØÐÅÓþ¿¨ÐÅÏ¢
6ÔÂ24ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕ·¢ÏÖÁËÒ»Ïî¸ß¶È¸´ÔÓµÄжñÒâÈí¼þ»î¶¯£¬¸Ã»î¶¯Éæ¼°ÐÅÓþ¿¨µÁË¢¡¢Æ¾Ö¤ÍµÇÔ¼°Óû§·ÖÎöµÈ¶àÖÖ¶ñÒâÐÐΪ¡£¾ÝWordfenceÍþвµý±¨ÍŶÓ2025Äê5ÔÂ16ÈÕÅû¶£¬´Ë¶ñÒâÈí¼þ±»¼Ù×°³É¶ñÒâWordPress²å¼þ£¬²¢Ñ¡È¡ÁËÐÂÏʵķ´¼ì²â¼¼Êõ£¬ÈçÍйÜÔÚÊÜÏ°È¾ÍøÕ¾ÉϵÄʵʱºó¶Ëϵͳ£¬ÕâÖÖÊÖ·¨ÔÚÕë¶ÔWordPressµÄ¹¥»÷ÖÐǰËùδ¼û¡£¸Ã»î¶¯×Ô2023Äê9ÔÂÆð±ãÒÑ»îÔ¾£¬Wordfence·ÖÎöµÄ20¶à¸ö¶ñÒâÈí¼þÑù±¾ÏÔʾ£¬ËùÓбäÌå¾ù¾ß±¸»ìºÏ¡¢·´·ÖÎö¡¢¿ª·¢ÈËÔ±¹¤¾ß¼ì²â¼°Õë¶ÔÐÔÖ´Ðеȹ²Í¬Ìص㡣ÀýÈ磬¶ñÒâÈí¼þ»á±Ü¿ªÖÎÀíÒ³Ãæ£¬½öÔÚ½áÕÊʱ¼¤»î£¬²¢»á²é³Ö®Ç°ÊÇ·ñϰȾ¹ýÒÔÔ¤·À³Á¸´¹¥»÷ͳһÓû§¡£×îа汾ÉõÖÁ²ÎÓëÁË×Ô½ç˵HTML¸²¸Ç¡¢Ðéα֧¸¶±í¸ñ¼°·ÂÕÕCloudflareÒ³ÃæµÄ±¾µØ»¯ÈËΪÑéÖ¤ÌôÕ½£¬ÒÔ¼ÓÇ¿Òñ±ÎÐÔ¡£±»µÁÊý¾Ý¶àͨ¹ý¼Ù×°³ÉͼÏñURLµÄBase64±àÂë×Ö·û´®Ð¹Â¶¡£´Ë±í£¬×êÑÐÈËÔ±»¹·¢ÏÖÁËÁí±íÈýÖÖÓµÓÐ·ÖÆçÖ¸±êµÄ±äÌ壬±ðÀëÓÃÓڰѳÖGoogle AdsͶ·ÅÚ²ÆÐÔ¸æ°×¡¢ÇÔÈ¡WordPressƾ֤¼°Í¨¹ý´úÌæÁ´½Ó´«²¼ÆäËû¶ñÒâÈí¼þ¡£
https://www.infosecurity-magazine.com/news/rogue-wordpress-plugin-skim-credit/
5. Palo Alto Networks³ÆPrometei¶ñÒâÈí¼þаæ¿í·º´«²¼
6ÔÂ24ÈÕ£¬Palo Alto Networks°ä²¼»ã±¨Ö¸³ö£¬Prometei¶ñÒâÈí¼þµÄ¸üа汾ÔÚ¿í·º´«²¼£¬ÇÒÓë½©Ê¬ÍøÂçÓйصĻÔÚ´Óǰ¼¸¸öÔÂÖÐÏÔÖø¼¤Ôö¡£Prometei×÷Ϊһ¸öÄ£¿é»¯½©Ê¬ÍøÂ磬×î³õÓÚ2020Äê7Ô±»·¢ÏÖ£¬ÆäϰȾָ±êº¸ÇWindowsºÍLinuxϵͳ£¬ÖØÒªÓÃÓÚ¼ÓÃÜÇ®±ÒÍÚ¾òºÍƾ֤й¶¡£È»¶ø£¬×îа汾µÄPrometei¶ñÒâÈí¼þÖ°ÄܸüΪ¸´ÔÓ£¬²»½ö¼¯³ÉÁËÓÃÓÚÆäËû¶ñÒâ»î¶¯µÄºóÃÅ£¬»¹¾ß±¸×ÔÎÒ¸üÐÂÖ°ÄÜ£¬²¢ÒÀÀµÓòÌìÉúËã·¨£¨DGA£©½øÐкÅÁîºÍ½ÚÔ죨C&C£©·þÎñÆ÷Ïνӡ£¸Ã¶ñÒâÈí¼þͨ¹ý¶àÖÖÄ£¿éʵÏÖ±©Á¦ÆÆ½âÖÎÀíÔ±ÃÜÂë¡¢ÀûÓ÷ì϶¡¢ºáÏòÒÆ¶¯¡¢ÇÔÈ¡Êܺ¦ÕßÊý¾Ý¡¢³ÉÁ¢C&CͨѶÒÔ¼°ÍÚ¾ò¼ÓÃÜÇ®±Ò£¨³ö¸ñÊÇÃÅÂÞ±Ò£©µÈÖ°ÄÜ¡£2025Äê2Ô¶ԽüÆÚ¶ñÒâÈí¼þÑù±¾µÄ·ÖÎöÏÔʾ£¬Prometeiͨ¹ý´´½¨·þÎñºÍ´òËãµÄcron×÷ҵʵÏÖÁËÓÆ¾ÃÐÔ£¬²»×ãÓ²±àÂëµÄÍÚ¾ò³Ø£¬²¢¿ÉÄÜ´¦ÖÃÀ´×Ô²Ù×÷Ô±µÄÆäËûºÅÁî¡£Palo Alto NetworksÔÚ2025Äê3Ô·¢ÏÖÁ˸ÃÍþвµÄ×îа汾£¬¸Ã°æ±¾Ê¹ÓÃUltimate Packer for eXecutables£¨UPX£©½øÐдò°ü£¬Ê¹µÃ¶ñÒâÈí¼þÌå»ý¸üÓ×£¬ÇÒÔÚÔËÐÐʱÄÜÔÚÄÚ´æÖнâѹËõ×ÔÉí²¢Ö´ÐÐ×îÖÕµÄÓÐÐ§ÔØºÉ£¬ÒÔ±ã½©Ê¬ÍøÂçÆðÍ·ÔËÐС£¸Ã¶ñÒâÈí¼þ»¹¿í·ºÍøÂçϵͳÐÅÏ¢£¬²¢Í¨¹ýHTTP GETÒªÇó½«ÕâЩÊý¾Ý·¢Ë͵½C&C·þÎñÆ÷¡£
https://www.securityweek.com/prometei-botnet-activity-spikes/
6. ÃÀ¹ú¶àÒéÔºÒò°²È«ÎÊÌâ²»ÈÝÔ±¹¤Ê¹ÓÃWhatsApp
6ÔÂ24ÈÕ£¬ÃÀ¹ú¶àÒéÔº½üÈÕ°ä·¢£¬²»ÈÝÔÚ¹ú»á¹¤×÷ÈËԱȷµ±¾Ö·¢·ÅÉ豸ÉÏ×°ÖúÍʹÓÃWhatsApp£¬´Ë¾ÙÖØÒªÔ´ÓÚ¶Ô¸ÃÀûÓ÷¨Ê½¼ÓÃܺͱ£»¤Êý¾Ý·½Ê½µÄÓÇÓô¡£½ûÁîÁìÓò¿í·º£¬²»½ö¸²¸ÇÊÖ»ú£¬»¹Ô̺¬±Ê¼Ç±¾µçÄÔ¡¢Ì¨Ê½µçÄÔÒÔ¼°ÕâЩÉ豸ÉÏʹÓõÄÈκÎÍøÂçä¯ÀÀÆ÷¡£Ö»¹Ü¹ú»á¹¤×÷ÈËÔ±ÔÚÓ×ÎÒÉ豸ÉÏÈÔ¿É×ÔÓÉʹÓÃWhatsApp£¬µ«ÔÚ»úÃܼò±¨»á»ò°²È«ÉèÊ©µÈÃô¸ÐÁìÓò£¬¸ÃÀûÓõÄʹÓÃÔçÒÑÊܵ½ÏÞ¶È¡£ÕâÒ»½ûÁîÐÂÎÅ×î³õÓÉAxiosƾ¾Ý¶àÒéÔºÊ×ϯÐÐÕþ¹Ù£¨CAO£©·¢¸ø¹ú»á¹¤×÷ÈËÔ±µÄÒ»·âй¶ÄÚ²¿µç×ÓÓʼþ±¨Â·£¬ÓʼþÖн«WhatsApp¹éÀàΪ¡°¸ß·çÏÕ¡±Í¨Ñ¶Æ½Ì¨¡£Ö»¹ÜÃÀ¹úµ±¾ÖÉÐδ°ä·¢¹Ù·½ÉêÃ÷£¬µ«Ê×ϯÐÐÕþ¹ÙCatherine SzpindorÒÑͨ¹ýÏòThe Verge°ä·¢µÄÉêÃ÷֤ʵÁ˳õ²½±¨Â·¡£ËýÇ¿µ÷£¬±£»¤¶àÒéÔº¼°ÆäÊý¾ÝÊÇÊ×Òª¹¤×÷£¬Òò¶ø±ØÒª¶¨ÆÚÉó²éºÍ¸üÐÂÒѺË×¼µÄÀûÓ÷¨Ê½ÁÐ±í£¬ÒÔÓ¦¶ÔDZÔÚµÄÍøÂ簲ȫ·çÏÕ¡£WhatsApp·½Ãæ¶Ô´Ë°µÊ¾Ç¿ÁÒ·ñ¾ö£¬³ÆÆäÐÂÎÅĬÈÏѡȡ¶Ëµ½¶Ë¼ÓÃÜ£¬°²È«¼¶±ð¸ßÓÚCAOºË×¼ÁбíÖеĴóÎÞÊýÀûÓ÷¨Ê½¡£È»¶ø£¬WhatsApp×î½ü°ä·¢ÔÚ¡°¸üС±Ñ¡ÏÖÐÒýÈë¸æ°×ºÍ´ÙÏúÄÚÈÝ£¬ÕâÒ»±ä¶¯Òý·¢ÁËÈËÃǶÔÊý¾ÝÒþÖÔµÄÓÇÓô¡£
https://www.bleepingcomputer.com/news/security/us-house-bans-whatsapp-on-staff-devices-over-security-concerns/


¾©¹«Íø°²±¸11010802024551ºÅ