SonicWall֤ʵ¿Í»§Ð¹Â¶ÊÂÎñϵ¹ú¶ÈºÚ¿ÍËùΪ

°ä²¼¹¦·ò 2025-11-07

1. SonicWall֤ʵ¿Í»§Ð¹Â¶ÊÂÎñϵ¹ú¶ÈºÚ¿ÍËùΪ


11ÔÂ5ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾SonicWall½üÈÕʵÏÖ¶Ô9Ô¿ͻ§·À»ðǽÅäÖñ¸·ÝÎļþй¶ÊÂÎñµÄµ÷²é£¬½áÂÛÏÔʾÕâ´Î¹¥»÷Óɹú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯Ö´ÐС£¾ÝMandiantÊÂÎñÏìÓ¦ÍŶÓÈ·ÈÏ£¬¶ñÒâ»î¶¯½öͨ¹ýAPIŲÓÃδÊÚȨ½Ó¼ûÌØ¶¨ÔÆ»·¾³Öеı¸·ÝÎļþ£¬Î´¶ÔSonicWall²úÆ·¡¢¹Ì¼þ¡¢ÏµÍ³¡¢¹¤¾ß¡¢Ô´´úÂë»ò¿Í»§ÍøÂçÔì³ÉÓ°Ïì¡£ÊÂÎñʼÓÚ9ÔÂ17ÈÕ£¬SonicWallÅû¶¡°´æ´¢ÔÚ²¿ÃÅMySonicWallÕË»§ÖеķÀ»ðǽÅäÖñ¸·ÝÎļþй¶¡±¡£¹¥»÷Õ߿ɴÓÕâЩÎļþÖÐÌáÈ¡½Ó¼ûƾ֤¡¢ÁîÅÆµÈÃô¸ÐÐÅÏ¢£¬¿ÉÄÜÓÃÓÚ¹¥»÷¿Í»§·À»ðǽ¡£¹«Ë¾Ëæ¼´½¨Òé¿Í»§³ÁÖÃMySonicWallÕË»§Í´´¦¡¢Ò»Ê±½Ó¼û´úÂë¡¢LDAP/RADIUS/TACACS+·þÎñÆ÷ÃÜÂë¡¢L2TP/PPPoE/PPTP WAN½Ó¿ÚÃÜÂë¼°IPSec VPNÕ½ÊõÖеĹ²ÏíÃÜÔ¿¡£10ÔÂ9ÈÕ£¬SonicWall¸üÐÂ×¢Ã÷£¬Õâ´Î·ì϶ӰÏìËùÓÐʹÓÃÆäÔÆ±¸·Ý·þÎñ´æ´¢·À»ðǽÅäÖÃÎļþµÄ¿Í»§£¬µ«Ç¿µ÷½öÏÞÓÚÔÆ»·¾³Ìض¨²¿ÃÅ£¬²úÆ·°²È«ÐÔδÊÜÇÖº¦¡£


https://www.bleepingcomputer.com/news/security/sonicwall-says-state-sponsored-hackers-behind-security-breach-in-september/


2. ¹ú¼Ê½áºÏÐж¯µ·»Ù³¬3ÒÚÅ·ÔªÐÅÓþ¿¨Ú²Æ­ÍøÂç


11ÔÂ5ÈÕ£¬¹ú¼Êµ±¾ÖÓÚ11ÔÂ4ÈÕ·¢Õ¹´úºÅ¡°×·»ØÐж¯¡±£¨Operation Chargeback£©µÄ¿ç¹ú·¨ÂÉ£¬³É¹¦µ·»ÙÈý¸ö´óÐÍÐÅÓþ¿¨Ú²Æ­¼°Ï´Ç®ÍøÂç£¬Éæ°¸½ð¶î³¬3ÒÚÅ·Ôª£¨Ô¼3.44ÒÚÃÀÔª£©£¬²¨¼°193¸ö¹ú¶ÈµÄ430ÓàÍò³Ö¿¨ÈË¡£Õâ´ÎÐж¯Óɵ¹ú¼ì²ì¹ÙºÍÁª¹úÐÌʾ¯Ô±¾Öǣͷ£¬Å·ÖÞ˾·¨×éÖ¯ÓëÅ·ÖÞÐ̾¯×é֯Эµ÷£¬µÂ¹ú¡¢ÃÀ¹ú¡¢¼ÓÄôó¡¢ÐÂ¼ÓÆÂµÈ¾Å¹ú½áºÏ²Î¼Ó£¬¹²¿ÛÁô44ÃûÏÓÒÉÈË£¬ÆäÖÐ18ÈËÒѱ»´þ²¶£¬Ô̺¬ÎåÃûµÂ¹úÖØÒªÖ§¸¶·þÎñÌṩÉ̵ĸ߹ܼ°ÁùÃûÉæÏÓÓëÚ¿Æ­ÍøÂçÍŽáµÄÖ§¸¶»ú¹¹ÈËÔ±¡£µ÷²éÏÔʾ£¬2016ÖÁ2021Äê¼ä£¬·¸×ïÍøÂçÀûÓÃÐÅÓþ¿¨Êý¾ÝÔÚÉ«Çé¡¢Ô¼»á¼°Á÷ýÌåÆ½Ì¨´´½¨³¬1900Íò¸öÐéα¶©ÔÄ£¬µ¥±ÊÓöȽÚÔìÔÚ50Å·Ôª×óÓÒÇÒÃèÊöÍÌÍ£¬½µµÍÊܺ¦Õß¼ø±ðÄѶÈ¡£ÏÓÒÉÈËͨ¹ýÓ¢¹ú¡¢ÈûÆÖ·˹ע²áµÄ¿Õ¿Ç¹«Ë¾×ªÒÆ×ʽ𣬲¢ÀûÓÃËļҵ¹úÖ§¸¶·þÎñÌṩÉ̵Ļù´¡ÉèÊ©´¦Ö÷¸·¨ÂòÂô£¬Ðγɡ°Ú¿Æ­-Ï´Ç®¡±¹Ø»·¡£µÂ¹ú¾¯·½ÔÚ8¸öÖÝÖ´ÐÐ29´ÎËѲ飬²é»ñ¼ÛÖµ³¬3500ÍòÅ·Ôª×ʲú£¬Ô̺¬ÉÝ»ªÆû³µ¡¢¼ÓÃÜÇ®±Ò¡¢µç×ÓÉ豸µÈ¡£


https://www.bleepingcomputer.com/news/security/europol-credit-card-fraud-rings-stole-eur-300-million-from-43-million-cardholders/


3. ²¨À¼ÔâϵÁÐÍøÂç¹¥»÷ÖÂÍ·²¿»ú¹¹Êý¾Ýй¶


11ÔÂ5ÈÕ£¬²¨À¼µ±¾ÖÕýµ÷²é¶àÆðÕë¶Ô¹«¹²¼°¸öÈË»ù´¡ÉèÊ©µÄÍøÂç¹¥»÷ÊÂÎñ£¬µ¼Ö¶à¼Ò´óÐÍÆóÒµÊý×Ö·þÎñÖжÏÓëÓ×ÎÒÊý¾Ýй¶£¬Éæ¼°¸Ã¹úÍ·²¿ÔÚÏß´û¿îƽ̨SuperGrosz¡¢Ö÷Á÷ÒÆ¶¯Ö§¸¶ÏµÍ³Blik¼°×î´ó¹Û¹âÉçNowa Itaka¡£Êý×ÖÊÂÎñ²¿³¤½üÈÕʲÍзò¡¤¸ß¿Æ·ò˹»ùÖ¸³ö£¬´ËÀ๥»÷ÒÑ¡°Ë¾¿Õ¼û¹ß¡±£¬²¨À¼ÖðÈÕ½Ó¹ÜÊýǧÆðÊÂÎñ»ã±¨£¬2025Äê»ò³ÉÍøÂç¹¥»÷´´¼Í¼Äê·Ý£¬¹¥»÷Ö¸±êÕý´Ó´¦Ëù¹«ÓÃÊÂÒ·©Õ¹ÖÁ½ðÈÚ¡¢ÄÜÔ´µÈ¹Ø¼üϵͳ¡£SuperGroszƽ̨ȷÈÏ£¬ÍøÂç·¸×ï·Ö×ÓÇÔÈ¡³¬1ÍòÃû¿Í»§ÐÕÃû¡¢µØÖ·¡¢Éí·ÝÖ¤ºÅ¡¢Ë°ºÅ¡¢ÁªÏµ·½Ê½¡¢¾ÍÒµÏêÇé¼°ÒøÐÐÕ˺ŵÈÃô¸ÐÐÅÏ¢£¬ÏÖʵ¹æÄ£¿ÉÄܸü´ó£¬¹«Ë¾ÒѾ¯Ê¾¿Í»§·À±¸Ú²Æ­ÐÅ´û»î¶¯¡£BlikÒÆ¶¯Ö§¸¶ÏµÍ³ÒòDDoS¹¥»÷¶ÌÔÝÖжϷþÎñ£¬¾­½¨¸´ºóÒѸ´Ô­£»Nowa Itaka¹Û¹âÉçÔòй¶¿Í»§ÐÕÃû¡¢ÓÊÏä¼°µç»°ºÅÂ룬µ«Ô¤Ô¼ÏêÇé¡¢²ÆÕþÊý¾Ý¼°ÕË»§ÃÜÂëδÊÜÓ°Ïì¡£¸ß¿Æ·ò˹»ùÇ¿µ÷£¬Õë¶ÔBlikµÄ¹¥»÷¡°ÏßË÷Ö¸Ïò¶íÂÞ˹¡±£¬²¢½«ÆäÊÓΪ¡°»ìºÏÕ½Õùн׶Ρ±¡£


https://therecord.media/poland-hacks-loan-platform-mobile-payments-system-travel-agency


4. ÈðÊ¿¹þ±ÈÒøÐÐÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷


11ÔÂ5ÈÕ£¬ÈðÊ¿ËÕÀèÊÀ¹þ±ÈÒøÐУ¨Habib Bank AG Zurich£©Ôâ¶íÂÞ˹ºÚ¿Í×éÖ¯÷è÷ëÀÕË÷Èí¼þÍŻ﹥»÷£¬¸ÃÍÅ»ïÓÚ11ÔÂ5ÈÕÔÚ°µÍø²©¿Í°ä²¼×îÐÂÊܺ¦ÕßÃûµ¥£¬Ðû³ÆÇÔÈ¡³¬2.5TBÊý¾Ý¡¢½ü200Íò¸öÎļþ£¬Ô̺¬¿Í»§»¤ÕÕºÅÂë¡¢ÒøÐÐÕË»§Óà¶î¡¢ÂòÂôÖ§¸¶³¡ËùµÈÃô¸ÐÐÅÏ¢¼°ÄÚ²¿¹¤¾ßÔ´´úÂ롣ΪʩѹÊê½ðÖ§¸¶£¬ÍÅ»ïÒѹ«¿ª²¿ÃÅÎļþ½ØÍ¼£¬²¢ÍþвÈôÒªÇóδÂú×㽫½øÒ»²½Ð¹Â¶»òÏúÊÛÊý¾Ý¡£¹þ±ÈÒøÐгÉÁ¢ÓÚ1967Ä꣬ҵÎñ±é¼°ÈðÊ¿¡¢Ó¢¹ú¡¢°¢ÁªÇõ¡¢Ïã¸ÛµÈ15¹ú£¬2024Äê¹ÍÓ¶7904ÃûÔ±¹¤£¬ÊÕÈë´ï7.5ÒÚÃÀÔª¡£÷è÷ëÀÕË÷Èí¼þ×Ô2022Äê»îÔ¾ÓÚÀÕË÷ÁìÓò£¬Æä°µÍøÐ¹Â¶ÍøÕ¾×Ô³Æ2021ÄêÔË×÷£¬2024ÄêÒÑÓñ³ÉÇò×î»îÔ¾ÍÅ»ïÖ®Ò»£¬×Ô2023ÄêÆðͨ¹ýRansomlooker¼à¿ØÏÔʾÒÑÁÐ959ÃûÊܺ¦Õߣ¬º­¸ÇÒ½Ôº¡¢Ôì×÷Òµ¡¢µçÁ¦¹«Ë¾¡¢Ò©Æ·¸£ÀûÖÎÀí»ú¹¹µÈ¡£¸ÃÍÅ»ïÓëLockBit¡¢DragonForce½áÃË£¬Í¨¹ý×ÊÔ´¹²ÏíÌáÉý¹¥»÷Õ½Êõ¸´ÔÓ¶Å×ë¹æÄ£¡£


https://cybernews.com/security/swiss-habib-bank-data-breach/


5. ¶íÂÞ˹ºË·ÏÁÏ´¦Öó§RadonÔâÊý¾Ýй¶


11ÔÂ5ÈÕ£¬¶íÂÞ˹¹ú¶ÈÔ­×ÓÄܹ«Ë¾ÆìϺ˷ÏÁÏ´¦Öó§RadonµÄϵͳÔâÈëÇÖ£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡´óÁ¿Ãô¸ÐÊý¾Ý²¢ÔÚÈȵãÊý¾Ýй¶ÂÛ̳¹«¿ª¡£Õâ´ÎÐ¹Â¶Éæ¼°²âÊÔÈËÔ±ÐÕÃû¡¢¼ìÑéͳ¼ÆÁ¿¡¢Óû§ID¡¢×´Ì¬Êý¾Ý¡¢µç×ÓÓʼþ¼°µç»°ºÅÂëµÈ¹Ø¼üÐÅÏ¢£¬Êý¾ÝÑù±¾Òò¹¥»÷ÕßÉèÖÃÏÂÔØÏÞ¶ÈÔÝÎÞ·¨½Ó¼û£¬Í¹ÏÔÊÂÎñÊܹØ×¢¶ÈÖ®¸ß¡£Radon¹«Ë¾×÷Ϊ¶íÂÞË¹ÖØÒªºËÉèÊ©ÍËÒÛÓëËãÕÊÔËÓªÉÌ£¬×ܲ¿Î»ÓÚĪ˹¿Æ£¬ÕƹÜÍøÂç¡¢ÔËÊä¡¢Öü´æ¼°×îÖÕ´ëÖõÍÖзÅÉäÐÔ·ÏÁÏ£¨LILW£©£¬²¢Ö´ÐзøÉä¼à²â¡£ÆäÒµÎñÉæ¼°È«Çò×îÃô¸Ð×ÊÁÏÖ®Ò»£¬·ÅÉäÐÔ·ÏÁϵĴ¦Öã¬ÔøÓÚ1986-1989Äê²Î¼ÓÇжûŵ±´ÀûºËµçÕ¾±äÂÒºó¹û½â³ý£¬Ö°Î»ÖÁ¹Ø³ÁÒª¡£Õâ´Î¹¥»÷µÄDZÔÚ·çÏÕÓÈΪÑϸñ¡£Ð¹Â¶µÄ²âÊÔÊý¾Ý¿ÉÄܱ»ÓÃÓÚαÔ찲ȫÆÀ¹ÀÎĵµ£¬Îóµ¼·ÅÉäÐÔÇøÓò·çÏÕÅж¨£»½áºÏÓû§Éí·ÝÐÅÏ¢£¬¹¥»÷Õß¿ÉÌáÒ龫׼Óã²æÊ½ÍøÂç´¹µö£¬½øÒ»²½ÉøÈ빫˾ϵͳ¡£Ô±¹¤Ó×ÎÒÉí·ÝÐÅÏ¢Èô±»ÓÃÓÚÉç»á¹¤³Ì¹¥»÷£¬»òÓëÆäËûÊý¾Ý½áºÏ½øÐÐÉí·Ý·ÖÎö£¬½«¼Ó¾ç°²È«Íþв¡£


https://cybernews.com/security/nuclear-waste-plant-data-breach/


6. ÃÀ¹ú¹ú»áÔ¤Ëã°ì¹«ÊÒÒÉËÆÔâ·ê±í¹úÍøÂç¹¥»÷


11ÔÂ6ÈÕ£¬ÃÀ¹ú¹ú»áÔ¤Ëã°ì¹«ÊÒ£¨CBO£©Ö¤ÊµÔâ·êÒÉËÆ±í¹úºÚ¿ÍÍøÂç¹¥»÷£¬Ãô¸ÐÊý¾Ý¿ÉÄÜй¶¡£CBO½²»°ÈË¿­ÌØÁÕ¡¤°¬Â갵ʾ£¬¸Ã»ú¹¹ÒÑѸ¿ì²ÉÈ¡Ðж¯½ÚÔìÊÂ̬£¬²¢Ö´Ðжî±í¼à¿ØºÍ°²È«´ëÊ©¡£Õâ´ÎÊÂÎñÓÉ¡¶»ªÊ¢¶ÙÓʱ¨¡·ÂÊÏÈÅû¶£¬¹ÙÔ±³ÆºÚ¿Í¹¥»÷¿ÉÄÜÒÑй¶¹ú»á°ì¹«ÊÒÓëCBO·ÖÎöʦ¼äµÄµç×ÓÓʼþ¼°»¥»»ÄÚÈÝ¡£Ö»¹Ü²¿ÃŹú»á°ì¹«ÊÒÒò°²È«¹ËÂÇÔÝÍ£ÓëCBOµÄÓʼþÍùÀ´£¬µ«CBOÇ¿µ÷Æä¹¤×÷³ÖÐø½øÐУ¬²¢³ÖÐø¼à¿ØÓ¦¶ÔÍþв¡£CBO×÷ΪÎÞµ³ÅÉ»ú¹¹£¬ÕƹÜΪÁ¢·¨ÕßÌṩ¾­¼Ã·ÖÎö¼°Á¢·¨³É±¾¹ÀË㣬Æä»ã±¨²Ý¸å¡¢¾­¼ÃÔ¤²â¼°ÄÚ²¿Í¨Ñ¶ÈôÔâй¶£¬¿ÉÄÜÓ°ÏìÕþ²ßÔì¶©¡£CBOÔÚÉêÃ÷ÖÐÇ¿µ÷£¬ÓëÆäËûµ±¾Ðİ˽Ӫ²¿ÃÅÒ»Ñù£¬ÆäÍøÂç³£Ãæ¶ÔÍþв£¬Ðè³ÖÐø¼ÓÇ¿·À»¤¡£Ä¿Ç°£¬µ÷²éÈÔÔÚ½øÐÐÖУ¬CBOÕýÓëÓйػú¹¹ºÏ×÷ÆÀ¹ÀÓ°Ï첢ǿ»¯·ÀÓù´ëÊ©¡£


https://www.bleepingcomputer.com/news/security/us-congressional-budget-office-hit-by-suspected-foreign-cyberattack/