Fortra GoAnywhere MFT¸ßΣ·ì϶Ôâ»îÔ¾ÀûÓÃ

°ä²¼¹¦·ò 2025-09-29

1. Fortra GoAnywhere MFT¸ßΣ·ì϶Ôâ»îÔ¾ÀûÓÃ


9ÔÂ26ÈÕ£¬ºÚ¿ÍÕý»ý¼«ÀûÓÃFortra GoAnywhereÖÎÀíÎļþ´«ÊäÈí¼þÖеÄ×î¸ßÑϳÁÐÔ·ì϶CVE-2025-10035ÌáÒé¹¥»÷¡£¸Ã·ì϶ԴÓÚÐí¿ÉÖ¤ServletµÄ·´ÐòÁл¯È±µã£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýαÔìÐí¿ÉÖ¤ÏìÓ¦ÊðÃûÔ¶³Ì×¢ÈëºÅÁʵÏÖÔ¤ÊÚȨԶ³Ì´úÂëÖ´ÐС£FortraÓÚ9ÔÂ18ÈÕÕýʽÅû¶¸Ã·ì϶£¬µ«ÏÖʵÔçÔÚ9ÔÂ10ÈÕ±ãÒÑ´æÔÚÒ°±íÀûÓÃÖ¤¾Ý¡£WatchTowr Labs°²È«×êÑÐÈËԱ֤ʵ£¬¹¥»÷Õß×Ô9ÔÂ10ÈÕÆðÒÑÀûÓôËÁãÈÕ·ì϶£¬±È¹Ù·½²¼¸æÌáǰ8Ìì¡£·ì϶ÀûÓùý³ÌÖУ¬¹¥»÷Õ߻ᴴ½¨ÃûΪ"admin-go"µÄºóÃÅÖÎÀíÔ¹ØË»§£¬²¢ÉÏ´«"zato_be.exe"ºÍ"jwunst.exe"£¨ºÏ·¨Ô¶³Ì½Ó¼û¹¤¾ßSimpleHelpµÄ¶ñÒâÀÄÓð汾£©µÅ×ÐÓÃÔØºÉ£¬ÍøÂçÓû§È¨ÏÞÐÅÏ¢²¢±£ÁôÖÁtest.txtÎļþ£¬ÎªºáÏòÒÆ¶¯×ö³ï±¸¡£Fortra½¨ÒéϵͳÖÎÀíÔ±µ±¼´Éý¼¶ÖÁ½¨¸´°æ±¾7.8.4»ò7.6.3£¬²¢²ÉÈ¡»º½â´ëÊ©£º½â³ýGoAnywhereÖÎÀí½ÚÔį̀µÄ¹«¹²»¥ÁªÍøÂ¶³ö£¬²é³­ÈÕÖ¾ÖÐ"SignedObject.getObject"ÃýÎóÒÔÈ·ÈÏÊÇ·ñÊÜÓ°Ïì¡£


https://www.bleepingcomputer.com/news/security/maximum-severity-goanywhere-mft-flaw-exploited-as-zero-day/


2. ÂíÀïÀ¼Öݽ»Í¨²¿MDOTÔâRhysidaÀÕË÷Èí¼þ¹¥»÷


9ÔÂ25ÈÕ£¬ÃÀ¹úÂíÀïÀ¼Öݽ»Í¨²¿£¨MDOT£©Ôâ·êÓë¶íÂÞ˹ÓйصÄRhysidaÀÕË÷Èí¼þÍŻ﹥»÷£¬¸Ã×é֯ͨ¹ý°µÍø²©¿Í°ä²¼±»µÁÊý¾Ý½ØÍ¼£¬Ô̺¬»¤ÕÕ¡¢Éí·ÝÖ¤¼þ¡¢²¼¾°µ÷²é¡¢Éç»á±£ÏÕ¿¨¼°·¸×ï²¼¾°ÐÅÏ¢£¬²¢Ë÷Òª30±ÈÌØ±Ò£¨Ô¼330ÍòÃÀÔª£©Êê½ð¡£MDOT×÷ΪÂíÀïÀ¼Öݽ»Í¨Ö÷ÌâÖÎÀí»ú¹¹£¬¼à¹ÜÖݽ»Í¨ÖÎÀí¾Ö£¨MTA£©¡¢¸ÛÎñ¾Ö¡¢º½¿ÕÖÎÀí¾ÖµÈÁù´ó²¿ÃÅ£¬ÆäÔËÓªµÄ»ªÊ¢¶Ù-°Í¶ûµÄĦ½»Í¨ÏµÍ³Äê¿ÍÁ÷Á¿³¬6700ÍòÈ˴Ρ£Æ¾¾ÝMDOT¹Ù·½Í¨Öª£¬¹¥»÷½öÓ°ÏìMTA²¿ÃÅϵͳ£¬Ö÷Ìâ·þÎñÈÔÕý³£ÔËÐУ¬µ«²¿ÃŹ«½»³µÊµÊ±Êý¾ÝÖжÏ¡£µ÷²éÈ·ÈÏ´æÔÚÊý¾ÝÃÔʧ£¬¾ßÌåÉæ¼°Ô±¹¤¼°³Ë¿ÍÃô¸ÐÐÅÏ¢£¬¿ÉÄÜÒý·¢Éí·Ý͵ÇÔºÍÉç»á±£ÏÕڲƭ·çÏÕ¡£×êÑÐÍŶӷÖÎöÏÔʾ£¬±»µÁÊý¾Ý»¹Ô̺¬ÄÚ²¿²ÆÕþ»ã±¨ºÍÔ¤ËãÎļþ£¬µ«ÒòMDOTÔ¤ËãͨÃ÷¶È½Ï¸ß£¬´ËÀàÎļþ¸öÈËÐÅÏ¢·çÏսϵÍ¡£RhysidaÍÅ»ï×Ô2023ËêÊׯðÍ·»îÔ¾£¬Òѹ¥»÷³¬220¸ö×éÖ¯£¬±»ËÝÔ´ÖÁ¶íÂÞ˹»ò¶ÀÁªÌå¹ú¶È£¬ÓëVice SocietyÀÕË÷Èí¼þÍÅ»ï´æÔÚ¼¼Êõ¹ØÁª¼°ÊÕÒæ·Ö³É¡£Ä¿Ç°£¬MDOTÕý½áºÏ·¨ÂÉ»ú¹¹¼°µÚÈý·½ÍøÂ簲ȫר¼Òµ÷²éÊÂÎñ£¬µ«ÉÐδÃ÷È·Êý¾Ýй¶ȫò¡£


https://cybernews.com/security/hackers-claim-maryland-transportation-rhysida/


3. µÂÖÝ¿¨³µË¾»úÊý¾Ýй¶£º³¬ÍòÃû˾»úÁé¸ÐÐÅÏ¢Ôâ¶³ö


9ÔÂ25ÈÕ£¬µÂ¿ËÈøË¹ÖÝAJT Compliance, LLC¹«Ë¾ÔËÓªµÄ¼ÝʻԱºÏ¹æÆ½Ì¨¡°DOT SHIELD¡±²úÉú´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬Â¶³ö³¬¹ýÒ»ÍòÃû¿¨³µË¾»úµÄÓ×ÎÒÎļþ£¬Éæ¼°Ò©Îï²âÊÔ¡¢¹ÍÓ¶ºÏͬ¡¢²¼¾°µ÷²éµÈ¸ß¶ÈÃô¸ÐÐÅÏ¢¡£¾­Cybernews×êÑÐÍŶӵ÷²é£¬Ð¹Â¶±¾Ô­ÔÚÓڸù«Ë¾Ê¹ÓõÄAmazon S3´æ´¢Í°±»ÃýÎóÅäÖÃΪ¹«¹²¶ÁÈ¡ºÍÁбíȨÏÞ£¬µ¼Ö³¬¹ý18,000ÕÅÉç»á±£ÏÕ¿¨ÕÕÆ¬¡¢23,000ÕżÝÕÕͼÏñ¡¢ÔðÈα£ÏÕ¿¨¡¢³µÁ¾¼ìÑéÁ˾ֵÈÎļþ±íй¡£ÕâЩÊý¾Ý×Ô2022ÄêÆð³ÖÐøÉÏ´«£¬²¿ÃÅÃô¸ÐÎļþÔÚµ÷²éÆÚ¼äÈÔ±»×Ô¶¯ÉÏ´«¡£ÊÜÓ°Ïì˾»úÖØÒªÀ´×Ե¿ËÈøË¹ÖÝ»òÊܹÍÓÚ¸ÃÖÝ×¢²áµÄÎïÁ÷¹«Ë¾¡£×÷ΪÃÀ¹úÎïÁ÷³ÁÕò£¬µÂÖÝÕ¼Óг¬21.2ÍòÃû³ÁÐÍ¿¨³µË¾»ú¼°7.272ÍòÃûÇáÐÍ¿¨³µË¾»ú£¬Õâ´Îй¶¿ÉÄÜÓ°Ïì¸ÃÖÝÔ¼10%µÄ¿¨³µË¾»ú¡£Ð¹Â¶µÄÃô¸ÐÐÅÏ¢ÈôÂäÈë·¸·¨·Ö×ÓÊÖÖУ¬¿ÉÄܱ»ÓÃÓÚ¿ªÉèÐÅÓþÕË»§¡¢µÁÈ¡Éç±£¸£Àû»òÖ´ÐÐÈËÈâËÑË÷µÈڲƭÐÐΪ£¬¶ÔÊܺ¦ÕßÔì³ÉÑϳÁÉí·Ý͵ÇÔ·çÏÕ¡£AJT ComplianceÔÚÊÕµ½ÄäÃû¾Ù±¨ºóÈ·Èϴ洢ͰÅäÖÃÃýÎ󣬲¢ÒÑͨ¹ýÕÆ¹ÜÈÎÅû¶½¨¸´·ì϶£¬È·±£Êý¾Ý°²È«¡£


https://cybernews.com/security/texas-truck-drivers-data-leak/


4. SonicWall SSL VPNÉ豸ÔâAkiraÀÕË÷Èí¼þ³ÖÐø¹¥»÷


9ÔÂ28ÈÕ£¬Õë¶ÔSonicWall SSL VPNÉ豸µÄAkiraÀÕË÷Èí¼þ¹¥»÷³ÖÐøÉý¼¶£¬Ö»¹ÜÕË»§ÒÑÆôÓÃOTP¶à³É·ÖÈÏÖ¤£¨MFA£©£¬µ«ÍþвÐÐΪÕßÈÔÄܳɹ¦µÇ¼¡£×êÑÐÈËÔ±´§Ä¦£¬Õâ¿ÉÄÜÔ´ÓÚ¹¥»÷ÕßÇÔÈ¡ÁËOTPÖÖ×Ó»òÀûÓÃÁË2024Äê9ÔÂÅû¶µÄCVE-2024-40766²»µ±½Ó¼û½ÚÔì·ì϶¡£¸Ã·ì϶ËäÔÚ2024Äê8ÔÂÒѽ¨¸´£¬µ«¹¥»÷ÕßÈÔͨ¹ý´Ëǰ´ÓÒ×Êܹ¥»÷É豸ÖÐÇÔÈ¡µÄÍ´´¦³ÖÐøÈëÇÖ¡£ÍøÂ簲ȫ¹«Ë¾Arctic Wolf»ã±¨Ö¸³ö£¬¹¥»÷ÕßÔÚÆôÓÃOTP MFAµÄÇé¿öÏÂÈÔÄܵǼÕË»§£¬µÇ¼³¢ÊÔʱÂŴδ¥·¢OTPÖÊѯºó³É¹¦£¬°µÊ¾OTPÖÖ×Ó¿ÉÄܱ»µÁ»ò´æÔÚÆäËûÌìÉúÓÐЧÁîÅÆµÄ²½Öè¡£SonicWallÒѽ«´ËÀ๥»÷ÓëCVE-2024-40766¹ØÁª£¬²¢¶½´ÙÖÎÀíÔ±³ÁÖÃËùÓÐSSL VPNÍ´´¦²¢Éý¼¶ÖÁ×îÐÂSonicOS¹Ì¼þ¡£


https://www.bleepingcomputer.com/news/security/akira-ransomware-breaching-mfa-protected-sonicwall-vpn-accounts/


5. MedusaÀÕË÷Èí¼þ¹¥»÷¿µ¿¨Ë¹ÌØ£¬834GBÊý¾ÝÔâÇÔ


9ÔÂ29ÈÕ£¬MedusaÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÈ«ÇòýÌå¼¼Êõ¾ÞÍ·¿µ¿¨Ë¹Ìع«Ë¾ÌáÒéÍøÂç¹¥»÷£¬²¢ÒªÇóÖ§¸¶120ÍòÃÀÔªÊê½ðÒÔ×èÖ¹ÇÔÈ¡µÄ834.4GBÊý¾Ýй¶»òÏúÊÛ¡£¸Ã×éÖ¯ÔÚ°µÍøÐ¹ÃÜÍøÕ¾°ä²¼Ô¼20ÕÅÄÚ²¿Îļþ½ØÍ¼¼°Ô̺¬167,121ÏîÎļþµÄÇåµ¥£¬Éæ¼°¾«Ëã»ã±¨¡¢²úÆ·ÖÎÀíÊý¾Ý¡¢±£ÏÕ½¨Ä£¾ç±¾¡¢ÀíÅâ·ÖÎöÊý¾Ý¼°SQL¾ç±¾µÈÃô¸ÐÐÅÏ¢£¬õ辶ʾÀýÔ̺¬Esur_rerating_verification.xlsx¡¢Claim Data Specifications.xlsmµÈÎļþ£¬°µÊ¾ÒÑ»ñÈ¡±£ÏÕÍÆËã¡¢¿Í»§Êý¾Ý´¦Öü°Ë÷ÅâÖÎÀíϵͳȨÏÞ¡£¿µ¿¨Ë¹ÌØ×÷ΪռÓÐNBCUniversalµÄÆóÒµ£¬ÆìϺ­¸ÇNBC¡¢Telemundo¡¢È«ÇòÓ°Òµ¡¢Á÷ýÌåÆ½Ì¨Peacock¼°Å·ÖÞSkyÒµÎñ¡£Ö»¹Ü¸Ã¹«Ë¾Î´Òò´ó¹æÄ£Íø¹¥³ÉΪ½¹µã£¬µ«2015ÄêÔøÓг¬20ÍòÓû§Æ¾Ö¤ÔÚ°µÍøÐ¹Â¶£¬Æäʱ¿µ¿¨Ë¹ÌسÆÊý¾Ý¿ÉÄÜÔ´ÓÚÆ¾Ö¤¾ÛºÏ¶ø·Çϵͳֱ½ÓÈëÇÖ¡£MedusaÒÔ°ä²¼²¿ÃÅÎļþÖ¤¾ÝʩѹÊܺ¦ÕßÎÅÃû¡£Õâ´Î¹¥»÷ÖУ¬ÎļþÐÔÖÊÖ¸Ïò²ÆÕþÓ뾫ËãÊý¾Ý¼¯£¬ÈôÊôʵ£¬¿µ¿¨Ë¹ÌØ»òÃæ¶Ô¼à¹ÜÉó²é·çÏÕ¡£


https://hackread.com/medusa-ransomware-comcast-data-breach/


6. Notepad++ v8.8.3±»Åû¶´æÔÚ¸ßΣDLL½Ù³Ö·ì϶


9ÔÂ29ÈÕ£¬Notepad++ v8.8.3°æ±¾±»Åû¶´æÔÚ¸ßΣDLL½Ù³Ö·ì϶£¨CVE-2025-56383£©£¬CVSSÆÀ·Ö´ï6.5·Ö¡£¸Ã·ì϶ԴÓÚNotepad++ÔÚÆô¶¯Ê±×Ô¶¯¼ÓÔØÌØ¶¨DLLÎļþµÄ»úÔìȱµã£¬¹¥»÷Õß¿ÉÀûÓô˸öÐÔ´úÌæÊÜÐÅÀµµÄDLLÎļþ£¨ÈçNppExport.dll£©£¬×¢Èë¶ñÒâ´úÂëʵÏÖËÁÒâ´úÂëÖ´ÐС£¼¼Êõ·ÖÎöÏÔʾ£¬¹¥»÷ÕßÖ»Ð轫¶ñÒâDLLÎļþ¸éÖÃÓÚNotepad++×°ÖÃĿ¼µÄplugins\NppExport\õè¾¶Ï£¬²¢È·±£Æäµ¼³öº¯Êýת·¢ÖÁԭʼDLLÎļþ¡£µ±Óû§Æô¶¯Notepad++ʱ£¬·¨Ê½»áÓÅÏȼÓÔØ¸Ã¶ñÒâDLL£¬ÔÚת·¢ºÏ·¨Ö°ÄÜŲÓõÄͬʱִÐжñÒâ´úÂ룬Ðγɡ°Ö°ÄÜÆëÈ«+°²È«·ÛË顱µÄË«³ÁÉøÈë¡£GitHubÒѹ«¿ª¸ÅÏëÑéÖ¤£¨PoC£©£¬Ô̺¬ÆëÈ«µÄ¹¥»÷Á´ÑÝʾ£¬ÑéÖ¤ÁË·ì϶ÔÚ±¾µØ»·¾³ÏµĿÉÀûÓÃÐÔ¡£¸Ã·ì϶µÄ¹¥»÷Ó°ÏìÁìÓò¿í·º£¬Ðè±¾µØ½Ó¼ûȨÏÞ»ò×°ÖÃõ辶дÈëÄÜÁ¦£¬µ«Ò»µ©³É¹¦ÀûÓ㬿ÉʵÏÖÓÆ¾Ã»¯×¤ÁôÓëȨÏÞÌáÉý£¬ÏÔÖøÔö³¤¹©¸øÁ´¹¥»÷¡¢Ä¾Âí°ç×°Ö÷¨Ê½¼°ÄÚ²¿Íþв·çÏÕ¡£½¨ÒéÓû§µ±¼´Éý¼¶ÖÁ½¨¸´°æ±¾£¬²¢¶¨ÆÚ²é³­×°ÖÃĿ¼ÎļþÆëÈ«ÐÔ¡£


https://securityonline.info/dll-hijacking-flaw-cve-2025-56383-found-in-notepad-allowing-arbitrary-code-execution-poc-available/