Òâ´óÀû·ÄÖ¯¾ÞÍ·FulgarÔâRansomHouseÀÕË÷¹¥»÷
°ä²¼¹¦·ò 2025-11-171. Òâ´óÀû·ÄÖ¯¾ÞÍ·FulgarÔâRansomHouseÀÕË÷¹¥»÷
11ÔÂ12ÈÕ£¬ÎªH&M¡¢°¢µÏ´ï˹¡¢Calzedonia¡¢WolfordµÈÆ·ÅÆ¹©»õµÄÒâ´óÀû·ÄÖ¯Òµ¾ÞÍ·FulgarÈ·ÈÏÔâ·êRansomHouseÀÕË÷Èí¼þÍŻ﹥»÷¡£¸ÃÍÅ»ïÓÚ11ÔÂ12ÈÕÔÚ°µÍøÐ¹Â¶ÍøÕ¾°ä²¼ÍþвÐÅÏ¢£¬Ðû³Æ×Ô10ÔÂ31ÈÕÆðÒѰÑÎÕ¼ÓÃÜÊý¾Ý£¬²¢ÒªÇóÖÎÀí²ãÖ§¸¶Êê½ðÒÔÔ¤·À»úÃÜÊý¾Ýй¶»òÏúÊÛ¡£FulgarËæºó°ä²¼²¼¸æÖ¤Êµ£¬11ÔÂ3ÈÕÆäÈ«¹úITϵͳÔâÍøÂç·¸×ï¹¥»÷£¬×÷ΪԤ·À´ëÊ©£¬Òâ´óÀûËùÓÐITϵͳÒѹعأ¬Ä¿Ç°Ëäδµ¥¶À¼ø±ð¾ßÌåй¶µÄÓ×ÎÒÊý¾Ý£¬µ«ÄÚ²¿Îļþ¡¢ÒøÐÐÕË»§Óà¶î¡¢µ±¾Ö»ú¹¹Í¨Ñ¶¼Í¼¼°·¢Æ±µÈÃô¸ÐÐÅÏ¢¿ÉÄÜÒѱíй¡£Õâ´Î¹¥»÷²»½ö¿ÉÄÜͨ¹ý¶¨Ôì»¯ÍøÂç´¹µö½øÒ»²½ÉøÈ빫˾ϵͳ£¬¸ü½«µ¼ÖÂÕ½ÊõÐÅϢй¶£¬Ê¹¾ºÕùµÐÊÖ»ñÈ¡ÔËÓª¡¢¿Í»§¼°¶¨¼Û½á¹¹µÈ¹Ø¼üÐÅÏ¢£¬¼õÈõÊг¡ÓÅÊÆ¡£RansomHouse²¢·ÇÐÂÃæÅÓ£¬¸ÃÍÅ»ï×Ô2021Äê12Ô½øÈ빫¼ÒÊÓÒ°£¬ÒÑÔÚÆäÐ¹Â¶ÍøÕ¾Áгö148ÃûÊܺ¦Õß¡£¾ÝÃÀ¹úÍøÂ簲ȫ»ú¹¹2024Äê½áºÏÖҸ棬¸ÃÍÅ»ïÓëÒÁÀʺÏ×÷Ö´ÐмÓÃܹ¥»÷£¬ÒÔ»ñÈ¡Êê½ð·Ö³É¡£
https://cybernews.com/security/fulgar-ransomware-attack-adidas/
2. FortiWebõè¾¶±éÀú·ì϶ÔâÈ«ÇòÁìÓòÀûÓÃ
11ÔÂ13ÈÕ£¬Íþвµý±¨¹«Ë¾DefusedÓÚ10ÔÂ6ÈÕ³õ´Î·¢ÏÖFortinet FortiWeb 8.0.1¼°¸üÔç°æ±¾´æÔÚÑϳÁõè¾¶±éÀú·ì϶£¬¸Ã·ì϶ÔÊÐí¹¥»÷ÕßÔÚÎÞÐèÉí·ÝÑéÖ¤µÄÇé¿öÏ£¬Í¨¹ýÏòÌØ¶¨APIõè¾¶·¢ËÍÔ̺¬¶ñÒâÓÐÐ§ÔØºÉµÄHTTP POSTÒªÇó£¬ÔÚ¶³öÉ豸ÉÏ´´½¨±¾µØÖÎÀíÔ±¼¶±ðÕË»§¡£¹¥»÷ÕßÒÑÀûÓø÷ì϶ÔÚÈ«ÇòÁìÓòÄÚÌáÒé¹¥»÷£¬Í¨¹ý¶à¸öIPµØÖ·Ö´ÐвÙ×÷£¬´´½¨µÄÓû§ÃûÈçTestpoint¡¢trader1µÈ£¬ÃÜÂëÔ̺¬3eMIXX43¡¢AFT3$tH4ckµÈ¸´ÔÓ×éºÏ£¬ÊÔͼͨ¹ý¶àÕË»§³¢ÊÔÉøÈëϵͳ¡£FortinetÒѰ䲼8.0.2°æ±¾½¨¸´´Ë·ì϶£¬ÆäPSIRTÍøÕ¾ÉÐδÅû¶Óйطì϶ÐÅÏ¢¡£µ±Ç°£¬ÖÎÀíÔ±Ðèµ±¼´½«É豸Éý¼¶ÖÁ8.0.2°æ±¾£¬²¢²é³ÏµÍ³ÊÇ·ñ´æÔÚÒì³£ÖÎÀíÕË»§¡¢ÈÕÖ¾ÖÐfwbcgiõè¾¶µÄÒì³£ÒªÇó¼°¿ÉÒÉIPµØÖ·»î¶¯¡£Í¬Ê±£¬Ó¦ÑϸñÏÞ¶ÈÖÎÀí½çÃæ½öͨ¹ýÊÜÐÅÀµÍøÂç»òVPN½Ó¼û£¬Ô¤·À¶³öÔÚ¹«Íø¡£
https://www.bleepingcomputer.com/news/security/fortiweb-flaw-with-public-poc-actively-exploited-to-create-admin-users/
3. DoorDash 10ÔÂÉç½»¹¤³Ì¹¥»÷Ö°ÙÍòÓû§ÐÅϢй¶
11ÔÂ13ÈÕ£¬±íÂô¾ÞÍ·DoorDashÅû¶ÓÚ10ÔÂ25ÈÕÓÉÔ±¹¤Éç½»¹¤³ÌÚ¿ÆÒý·¢µÄÊý¾Ýй¶ÊÂÎñ£¬Éæ¼°ÃÀ¹ú¡¢¼ÓÄô󡢰ĴóÀûÑǼ°ÐÂÎ÷À¼Êý°ÙÍòÓû§¡£¾ÝDoorDash¹Ù·½Í¨Öª£¬Î´¾ÊÚȨµÄµÚÈý·½Í¨¹ýÔ±¹¤Õ˺ŻñÈ¡ÁËÓû§ÐÕÃû¡¢ÏÖʵµØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµÈÁªÏµÐÅÏ¢£¬²¿ÃÅÓû§»¹¿ÉÄÜÉæ¼°Éç»á°²È«ºÅÂ루ÃÀ¹ú£©»òÉç»á±£ÏÕºÅÂ루¼ÓÄô󣩣¬µ«DoorDashÇ¿µ÷Ãô¸Ð²ÆÕþÊý¾Ýδ±»Ð¹Â¶¡£Õâ´ÎÊÂÎñÊÇDoorDashµÚÈý´Î³Á´ó°²È«ÊÂÎñ£¬2019ÄêÔøÐ¹Â¶Ô¼500ÍòÓû§Êý¾Ý£¬2022ÄêÓÖÔâÓëTwilio¹¥»÷ͬԴµÄºÚ¿ÍÈëÇÖ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬DoorDashÔÚÊÂÎñ²úÉúºó19Ìì²ÅÆðͷ֪ͨÓû§£¬Òý·¢¿í·ºÆ·ÆÀ¡£¼ÓÄôóÓû§ÊÕµ½¸½´ø·¨Óï·ÒëµÄ֪ͨ£¬µ«²¼¸æÎ´Ã÷È·ÆäËûµØÓòÊÜÓ°ÏìÁìÓò¡£DoorDash»ØÓ¦³ÆÒѲÉÈ¡¶àÏî´ëÊ©£¬Ô̺¬¶Â½Ø·¸·¨½Ó¼û¡¢Éý¼¶°²Õûϵͳ¡¢¼ÓǿԱ¹¤Åàѵ¡¢ÀñÆ¸ÍøÂ簲ȫȡ֤¹«Ë¾µ÷²é£¬²¢¹²Í¬·¨Âɲ¿ÃÅÐж¯¡£¹«Ë¾ÌáÐÑÓû§¾¯Ìè´¹µöÓʼþ£¬Ô¤·Àµã»÷¿ÉÒÉÁ´½Ó»òй¶Ó×ÎÒÐÅÏ¢£¬Í¬Ê±¿ªÃ÷Ãâ·Ñµç»°ÌṩÕ÷ѯ¡£
https://www.bleepingcomputer.com/news/security/doordash-hit-by-new-data-breach-in-october-exposing-user-information/
4. ÂÞ¼¼ÔâClopÀÕË÷ÍŻ﹥»÷ÖÂ1.8TBÊý¾Ýй¶
11ÔÂ14ÈÕ£¬Ó²¼þÅä¼þ¾ÞÍ·ÂÞ¼¼¹«Ë¾½üÈÕ֤ʵÔâ·êÓÉÀÕË÷ÍÅ»ïClopÌáÒéµÄÑϳÁÊý¾Ýй¶ÊÂÎñ£¬¸ÃÍÅ»ïÐû³ÆÀûÓÃÁËOracle E-Business SuiteµÄÁãÈÕ·ì϶CVE-2025-61882Ö´Ðй¥»÷¡£ÂÞ¼¼ÒÑÏòÃÀ¹ú֤ȯÂòÂôίԱ»áÌá½»8-K±í¸ñÅû¶ÊÂÎñ£¬Ç¿µ÷Õâ´ÎÍøÂ簲ȫÊÂÎñδӰÏìÆä²úÆ·¡¢ÒµÎñÔËÓª»ò³ö²úϵͳ¡£¾ÝÂÞ¼¼¹Ù·½ÉêÃ÷£¬Ð¹Â¶Êý¾Ý¿ÉÄÜÔ̺¬Ô±¹¤¡¢Ïû·ÑÕß¡¢¿Í»§¼°¹©¸øÉ̵IJ¿ÃÅÐÅÏ¢£¬µ«Î´Éæ¼°¹úÃñÉí·ÝÖ¤ºÅÂë¡¢ÐÅÓþ¿¨µÈÃô¸ÐÐÅÏ¢£¬ÒòÓйØÊý¾Ýδ´æ´¢ÔÚ±»ÈëÇÖϵͳÖС£Õâ´Î¹¥»÷Ô´ÓÚµÚÈý·½ÁãÈÕ·ì϶£¬ÂÞ¼¼ÔÚ·¢ÏÖ·ì϶ºóÒѵ±¼´½áºÏ±í²¿ÍøÂ簲ȫ¹«Ë¾½øÐе÷²é²¢½¨¸´ÏµÍ³¡£ClopÍÅ»ïÉÏÖÜÒѽ«ÂÞ¼¼ÁÐÈëÆäÊý¾ÝÐÂäįÕË÷ÍøÕ¾£¬¹«¿ªÁ˾ݳÆÇÔÈ¡µÄ½ü1.8TBÊý¾Ý¡£±¾´ÎOracle E-Business Suite·ì϶ӰÏìÁìÓò¿í·º£¬³ýÂÞ¼¼±í£¬¹þ·ð´óѧ¡¢Envoy Air¼°¡¶»ªÊ¢¶ÙÓʱ¨¡·µÈ»ú¹¹ÒàÊܲ¨¼°¡£Oracle´ËǰÒѰ䲼´¹Î£¸üн¨¸´¸Ã·ì϶£¬²¢½¨ÒéÓû§Éý¼¶ÖÁ°²È«°æ±¾¡£
https://www.bleepingcomputer.com/news/security/logitech-confirms-data-breach-after-clop-extortion-attack/
5. FingerºÅÁîÀÄÓù¥»÷£º´Óº¹Ç๤¾ßµ½ÐÂÐÍÍþÐ²ÔØÌå
11ÔÂ15ÈÕ£¬´æÔÚÊýÊ®ÄêµÄ"finger"ºÅÁîÕý³ÉÎªÍøÂç¹¥»÷ÐÂÔØÌ壬ÍþвÐÐΪÕßͨ¹ý¸ÃºÍ̸ÔÚWindowsÉ豸ִÐжñÒâ²Ù×÷¡£¸ÃºÅÁî·¢Ô´ÓÚUnix/Linuxϵͳ£¬ÓÃÓÚ²éÎÊÓû§ÐÅÏ¢£¨ÈçµÇ¼Ãû¡¢Ö÷Ŀ¼¡¢ÔÚÏß״̬µÈ£©£¬ºó±»Windowsϵͳ¼æÈÝ¡£Ö»¹Üµ±Ç°Ê¹ÓÃÆµÂʽµµÍ£¬µ«ÆäºÍ̸¸öÐÔÈÔ±»¶ñÒâÀûÓ᣽üÆÚ¹¥»÷°¸ÀýÏÔʾ£¬¹¥»÷Õßͨ¹ý"finger"ºÍ̸ִÐÐClickFix¹¥»÷£ºÀýÈ磬Åú´¦ÖÃÎļþÖ´ÐÐfingerºÅÁ´ÓÔ¶³Ì·þÎñÆ÷¼ìË÷¶ñÒâÖ¸Á¾cmd.exe¹Ü·ÔÚ±¾µØÔËÐС£´ËÀ๥»÷³£¼Ù×°³É"ÑéÖ¤ÈËÀà"µÄÑéÖ¤ÂëÁ÷³Ì£¬ÓÕµ¼Óû§Ö´ÐÐÔ̺¬fingerºÅÁîµÄWindowsÖ¸Á×îÖÕµ¼Ö¶ñÒâÈí¼þÏÂÔØÓëÖ´ÐС£¾ßÌå¹¥»÷Á´Â·ÖУ¬¹¥»÷ÕßÀûÓÃfingerºÅÁî´ÓÌØ¶¨ÓòÃû»ñÈ¡ºÅÁ´¥·¢curl.exeÏÂÔØ¼Ù×°³ÉPDFµÄzip°ü£¬½âѹºóÖ´ÐÐPython¶ñÒⷨʽ¡£¸ü¸´ÔӵĹ¥»÷»á¼ì²âϵͳÊÇ·ñ×°ÖöñÒâÈí¼þ·ÖÎö¹¤¾ß£¬Èô´æÔÚÔòÖÕÖ¹¹¥»÷£¬²»È»ÏÂÔØNetSupport Manager RAT²¢ÅäÖôòË㹤×÷ʵÏÖÓÆ¾Ã»¯½ÚÔì¡£
https://www.bleepingcomputer.com/news/security/decades-old-finger-protocol-abused-in-clickfix-malware-attacks/
6. ÃÀ˾·¨²¿ÆÆ»ñ³¯ÍøÂç·¸×ï°¸£ºÎåÈËÈÏ×ïÉæ3.8ÒÚ
11ÔÂ14ÈÕ£¬ÃÀ¹ú˾·¨²¿½üÈÕ°ä·¢£¬ÎåÃûÉæ°¸ÈËÔ±ÈÏ¿ÉÐÖú³¯ÏÊÖ´Ðз¸·¨´´Êջ£¬Ô̺¬Ô¶³ÌIT¹¤×÷ÕßڲƺͼÓÃÜÇ®±Ò͵ÇÔ¡£¸Ã°¸¼þÉæ¼°³¯ÏÊAPT38Íþв×éÖ¯¼°LazarusºÚ¿Í×éÖ¯£¬ÃÀ¹úµ±¾ÖÕý×·Çó³ä¹«¸Ã×é֯ͨ¹ý1500ÍòÃÀÔª¼ÓÃÜÇ®±Ò͵ÇÔ°¸ËùµÃµÄ·¸·¨×ʲú¡£ÎåÃûÈÏ×ïÕßÔ̺¬ËÄÃûÃÀ¹ú¹«ÃñºÍÒ»ÃûÎÚ¿ËÀ¼ÈË£¬ËûÃÇͨ¹ýαÔì»òÇÔÈ¡µÄÃÀ¹ú¹«ÃñÉí·ÝÐÅÏ¢£¬Ô®ÊÖ³¯ÏʼéϸÒÔ¡°Ô¶³ÌIT¹¤×÷Õß¡±Éí·Ý±»136¼ÒÃÀ¹ú¹«Ë¾¹ÍÓ¶¡£ÕâЩ¼éϸ½«¹¤×ʼ°²¿ÃÅÇÔÈ¡Êý¾ÝÊäËÍÖÁ³¯Ïʵ±¾Ö£¬ÀÛ¼ÆÎª³¯ÏÊÕþȨ´´Ô쳬220ÍòÃÀÔª·¸·¨ÊÕÈë¡£¾ßÌå°¸¼þÖУ¬°ÂÁпËÉ£µÂ¡¤µÏ¼°µÚÒòµçÐÅÚ¿ÆÍ¬Ä±¼°ÑϳÁÉí·Ý͵ÇÔ×ï±»Ö¸¿Ø£¬Æäͨ¹ýUpWorkSellƽ̨Ïòº£±íITÈËÔ±ÏúÊÛÇÔÈ¡µÄÉí·ÝÐÅÏ¢£¬Ê¹40¼ÒÃÀ¹ú¹«Ë¾ÊÜÆ£»°£Àï¿Ë¡¤ÆÕÁÖ˹Ôòͨ¹ýÆä¹«Ë¾Taggcar Inc.ÀûÓÃÇÔÈ¡Éí·Ý°²Éè64Ãûº£±íÈËÔ±£¬»ñÀû8.9ÍòÃÀÔª²¢Ôì³É³¬94ÍòÃÀÔªËðʧ£»°ÂµÂÀï¿Ë¡¤·¨¸ñÄÉÈü¡¢½ÜÉ¡¤ÈøÀÔú¶ûºÍÑÇÀúɽ´ó¡¤ÌØÀά˹ÈýÈ˲μÓ2019-2022Äêڿƻ£¬×ܼÆÔì³É128ÍòÃÀÔªËðʧ¡£
https://www.bleepingcomputer.com/news/security/five-plead-guilty-to-helping-north-koreans-infiltrate-us-firms/


¾©¹«Íø°²±¸11010802024551ºÅ