GlobalProtect VPNÔâ230Íò´ÎɨÃè»á»°µÄ̽²â
°ä²¼¹¦·ò 2025-11-241. GlobalProtect VPNÔâ230Íò´ÎɨÃè»á»°µÄ̽²â
11ÔÂ20ÈÕ£¬ÊµÊ±µý±¨¹«Ë¾GreyNoise¼à²âµ½£¬Õë¶ÔPalo Alto Networks GlobalProtect VPNµÇ¼ÃÅ»§µÄ¶ñÒâɨÃè»î¶¯ÔÚ2025Äê11ÔÂ14ÈÕÖÁ19ÈÕ¼ä³öÏÖ·¢×÷ʽÔö³¤£¬24Ó×ʱÄڻÁ¿¼¤Ôö40±¶£¬´´90Ììиߣ¬Ò»ÖÜÄÚ´ïµ½·åÖµ¡£Õâ´Î¹¥»÷³±¾Û½¹ÓÚGlobalProtectµÄ*/global-protect/login.esp URI¶Ëµã£¬¸ÃÒ³ÃæÊÇÓû§½øÐÐVPNÉí·ÝÑéÖ¤µÄ¹«¿ªÈë¿Ú£¬ÆÚ¼äÀۼƼì²âµ½230Íò´Î½Ó¼û³¢ÊÔ£¬Ö¸±ê¹ú¶È¼¯ÖÐÔÚÃÀ¹ú¡¢Ä«Î÷¸çºÍ°Í»ù˹̹¡£GreyNoise·ÖÎöÖ¸³ö£¬¹¥»÷ÌØµã³öÏָ߶È×éÖ¯»¯£º³Á¸´³öÏÖµÄTCP/JA4tÖ¸ÎÆ¡¢Ò»ÑùASN£¨×ÔÖÎϵͳ±àºÅ£©µÄ·´¸´Ê¹Óü°»î¶¯¶¥·å¹¦·òÒ»ÖÂÐÔ£¬Åú×¢Ó뺹Ç๥»÷´æÔÚ¹ØÁª¡£ÖØÒª¹¥»÷Ô´ASNΪAS200373£¨3xK Tech GmbH£¬62% IPλÓڵ¹ú£©ºÍAS208885£¨Noyobzoda Faridduni Saidilhom£¬15% IPλÓÚ¼ÓÄô󣩡£º¹ÇàÊý¾ÝÏÔʾ£¬´ËÀàɨÃè¶¥·å80%ÏÅ×Úа²È«·ì϶Åû¶£¬Palo Alto²úÆ·¹ØÁªÐÔÓÈΪÏÔÖø¡£
https://www.bleepingcomputer.com/news/security/globalprotect-vpn-portals-probed-with-23-million-scan-sessions/
2. µÏ°ÝÏû·À¾ÞÍ·NAFFCOÔâINCÀÕË÷Èí¼þ¹¥»÷
11ÔÂ20ÈÕ£¬½üÈÕ£¬µÏ°ÝÏû·À°²È«¾ÞÍ·NAFFCO FZCOÔâ³ôÃûÔ¶ÑïµÄINCÀÕË÷Èí¼þÍŻ﹥»÷£¬1TBÄÚ²¿Êý¾Ý±»ÇÔ²¢Ð¹Â¶ÖÁ°µÍø£¬Òý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£NAFFCO×÷Ϊº£Í嵨Óò×î´óÏû·ÀÉ豸¼°ÏµÍ³¹©¸øÉÌÖ®Ò»£¬ÄêÊÕÈë´ï44ÒÚÃÀÔª£¬¿Í»§º¸ÇµÏ°Ý¹þÀû·¨Ëþ¡¢°¢²¼Ôú±È¬¸¡¹¬µÈ±êÖ¾ÐÔ¹¹Öþ£¬ÒÔ¼°ADNOCµÈʯÓ;ÞÍ·¼°µ±¾Ö»ú¹¹¡£INCÍÅ»ïÓÚ11ÔÂ17ÈÕÔÚ°µÍøÐ¹Â¶ÍøÕ¾°ä²¼NAFFCOÐÅÏ¢£¬²¢¸½ÉÏ47ÕÅÊý¾Ý½ØÍ¼£¬ÏÔʾй¶ÄÚÈÝÉæ¼°¹«Ë¾ÔËÓªÏêÇ飨ÈçÔ±¹¤ÐÕÃû¡¢Ö°Î»¡¢ÁªÏµ·½Ê½¡¢Éí·ÝÖ¤ÕÕÆ¬¼°Ç©Ö¤ÐÅÏ¢£©¡¢Äê¶ÈºÏͬÇåµ¥£¨º¬¿Í»§Ãû³Æ¡¢½ð¶î¼°ÏúÊÛ´ú±í£©¡¢µ¥¶ÀºÏͬÎļþ¼°ÏîÄ¿×ʽðÊý¾ÝµÈ¡£´ËÀàÃô¸ÐÐÅϢй¶½«µ¼ÖÂÔ±¹¤Ãæ¶ÔÉí·Ý͵ÇÔ¼°Éç»á¹¤³Ì¹¥»÷·çÏÕ£¬Í¬Ê±Â¶³ö¹«Ë¾ÒµÎñÔËӪϸ½Ú£¬Ôì³ÉÑϳÁÃûÓþÇÖº¦¡£INCÀÕË÷Èí¼þÍÅ»ï³ÉÁ¢ÓÚ2023Äê7Ô£¬¿ÉÄÜÓë¶íÂÞ˹¹ØÁª£¬ÒÔ¡°¶à³ÁÀÕË÷¡±×÷°¸ÊÖ·¨ÎÅÃû¡£¸ÃÍÅ»ïÒÑÔì³É453ÃûÊܺ¦Õߣ¬¹¥»÷Ö¸±êº¸ÇÒ½Ôº¡¢Ñ§Ìᢵ±¾Ö»ú¹¹¼°¿Æ¼¼¹«Ë¾¡£
https://cybernews.com/security/naffco-ransomware-incident-data-leak/
3. SturnusľÂí£ºÈÆ¹ý¼ÓÃܵÄȫְÄÜÉ豸½ÚÔìÍþв
11ÔÂ20ÈÕ£¬Ò»¿îÃûΪSturnusµÄÐÂÐͰ²×¿ÒøÐÐľÂíÕýÒý·¢ÍøÂ簲ȫ½ç¸ß¶È¾¯Ìè¡£¸ÃľÂí¾ß±¸¡°ÆëÈ«½ÚÔìÉ豸¡±ÄÜÁ¦£¬Æä¹¥»÷Ö¸±êÖ±Ö¸WhatsApp¡¢Telegram¡¢SignalµÈ¼ÓÃÜͨѶÈí¼þ£¬Í¨¹ý²¶»ñÆÁÄ»ÄÚÈÝÈÆ¹ý¶Ëµ½¶Ë¼ÓÃÜ£¬ÇÔÈ¡ÒøÐÐÆ¾Ö¤¡¢¼à¿ØÊµÊ±¶Ô»°£¬²¢°µ²ØÚ²ÆÐÐΪ¡£ThreatFabric·ÖÎöÖ¸³ö£¬SturnusËä´¦ÓÚ¿ª·¢½×¶Î»òÓÐÏÞ²âÊÔÆÚ£¬µ«ÒѶÔ×¼ÖÐÄÏÅ·½ðÈÚ»ú¹¹£¬Ô¤Ê¾¹¥»÷ÕßÕýΪ´ó¹æÄ£¹¥»÷×ö³ï±¸¡£¸ÃľÂí¼¼ÊõÏȽø£¬ÔÚͨѶºÍ̸ºÍÉ豸֧³ÖÉϳ¬¹ý´«Í³Ä¾Âí¼Ò×å¡£ÆäͨѶģʽ·ÂÕÕ×ϳáé£ÄñÃù½Ð£¬ÔÚÃ÷ÎÄ¡¢RSA¡¢AESÐÂÎżäËæ»úÇл»£¬Í¨¹ýHTTP POST×¢²áÉ豸²¢ÊµÏÖÃÜÔ¿»¥»»ºó£¬Ñ¡È¡AES-256¼ÓÃÜ´«ÊäÊý¾Ý¡£Êý¾ÝÇÔÈ¡ÒÀÀµÁ½ÖÖ»¥²¹»úÔ죺HTML¸²¸Ç²ãºÍÎÞ×è°·þÎñ¼üÅ̼ͼ£¬¿Éʵʱ¶ÁÈ¡ÆÁÄ»ËùÓÐÄÚÈÝ£¬Ô̺¬ÁªÏµÈË¡¢¶Ô»°Ï̼߳°ÐÂÎÅ£¬Ö±½ÓÈÆ³õ²½µ½¶Ë¼ÓÃÜ¡£Ëü»¹Í¨¹ýÉ豸ÖÎÀíԱȨÏÞ¼ÓÇ¿ÓÆ¾ÃÐÔ£¬¼à¿Ø½âËøÊÂÎñ¡¢×èֹȨÏÞ³·Ïú¼°Ð¶ÔØ£¬²¢×·×Ùϵͳµ÷»»¡¢ÍøÂç״̬¡¢SIM¿¨¸ü»»µÈ£¬µ÷ÕûÕ½Êõ¶ã±Ü·ÖÎö¡£
https://securityaffairs.com/184878/cyber-crime/sturnus-new-android-banking-trojan-targets-whatsapp-telegram-and-signal.html
4. Æû³µµçÉÌÆ½Ì¨Revolution PartsÔâ´ó¹æÄ£Êý¾Ýй¶
11ÔÂ23ÈÕ£¬½üÈÕ£¬ÃÀ¹úÑÇÀûÉ£ÄÇÖÝ̹ÅåÊÐµÄÆû³µµçÉÌÆ½Ì¨Revolution PartsÔâ·êÍøÂç¹¥»÷£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡Á˳¬¹ý500ÍòÓû§µÄÓ×ÎÒÐÅÏ¢£¬Ô̺¬µç×ÓÓÊÏä¡¢IPµØÖ·¡¢µç»°ºÅÂë¡¢¼Òͥסַ¡¢É豸Êý¾Ý¼°È«ÃûµÈÖ÷ÌâÐÅÏ¢¡£¸Ã¹«Ë¾Í¨¹ý¾ÏúÉÌÍøÂçÿÄêÏúÊÛ¼ÛÖµ³¬6ÒÚÃÀÔªµÄÆû³µÁ㲿¼þ£¬ÆäÓû§Êý¾Ýº¸Ç¶©µ¥ÏêÇéºÍÕ˺Å×¢²áÐÅÏ¢£¬Óë¹¥»÷ÕßÐû³ÆµÄÇÔÈ¡ÄÚÈݸ߶ÈÎǺϡ£¹¥»÷ÉêÃ÷°ä²¼ÓÚ³ÛÃûÊý¾Ýй¶ÂÛ̳£¬¸Ãƽ̨ÊÇÍøÂç×ï·¸»¥»»±»µÁÊý¾ÝµÄÖØÒªÇþ·¡£Cybernews×êÑÐÍŶӶԹ¥»÷ÕßÌṩµÄÑù±¾Êý¾Ý½øÐÐÁ˺˲飬֤ʵÑù±¾Ô̺¬Óû§È«Ãû¡¢µç×ÓÓÊÏä¡¢µç»°ºÅÂë¡¢¼Òͥסַ¡¢IPµØÖ·¼°É豸Êý¾Ý£¬ÕâЩÐÅÏ¢ÓëµçÉÌÆ½Ì¨Óû§¹ºÎïʱÌîдµÄ¶©µ¥ÏêÇé¼°×¢²áÐÅÏ¢ÆëȫһÖ¡£×êÑÐÍŶÓÖ¸³ö£¬´ËÀàÊý¾Ý¿É±»ÓÃÓÚÉí·Ý͵ÇԺ;«×¼´¹µö¹¥»÷£¬¹¥»÷Õß¿Éͨ¹ý¶ÈÎöÓû§Æ«ºÃ¡¢µØÀíµØÎ»µÈÐÅÏ¢£¬¼Ù×°³ÉºÏ·¨ÆóÒµÓÕÆÓû§Ð¹Â¶¸üÃô¸ÐÐÅÏ¢£¬»òͨ¹ý·¢ËÍ´ø¶¾ÓʼþÓÕµ¼Êܺ¦ÕßÏÂÔØ¶ñÒâÈí¼þ¡£
https://cybernews.com/security/revolution-parts-data-breach-claims/
5. ÒÁ±ÈÀûÑǺ½¿ÕÒò¹©¸øḚ́²È«·ì϶Ö¿ͻ§Êý¾Ýй¶
11ÔÂ23ÈÕ£¬Î÷°àÑÀ¹ú¶Èº½¿Õ¹«Ë¾ÒÁ±ÈÀûÑǺ½¿Õ½üÈÕ´«µÝ£¬ÒòµÚÈý·½¹©¸øÉÌϵͳÔâδ¾ÊÚȨ½Ó¼û£¬µ¼Ö²¿Ãſͻ§ÐÅϢй¶¡£¾ÝÍþвµý±¨Æ½Ì¨HackmanacÅû¶µÄÓʼþÏÔʾ£¬Ð¹Â¶Êý¾ÝÉæ¼°¿Í»§ÐÕÃû¡¢µç×ÓÓʼþ¼°ÒÁ±ÈÀûÑǺ½¿Õ¾ãÀÖ²¿»áÔ±¿¨¼ø±ðºÅÂ룬µ«ÕË»§µÇ¼ƾ֤¡¢ÃÜÂë¼°ÒøÐÐÖ§¸¶ÐÅϢδ±»²¨¼°¡£´Ëǰ£¬Ò»ÃûÍøÂçÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳Ðû³Æ»ñÈ¡ÁË77GB¾Ý³ÆÀ´×Ըú½¿Õ¹«Ë¾µÄÊý¾Ý£¬²¢ÒÔ15ÍòÃÀÔª¹«¿ª½ÐÂô¡£¹¥»÷ÕßÐû³ÆÊý¾ÝÔ̺¬A320/A321¼¼ÊõÎĵµ¡¢AMPÊØ»¤Îļþ¼°·¢Æð»úÐÅÏ¢µÈÄÚ²¿×ÊÁÏ£¬µ«º½¿Õ¹«Ë¾Ã÷È·½«Ð¹Â¶¹éÒòÓÚ¹©¸øÉÌ£¬Ç¿µ÷Æä×ÔÉíϵͳδÊÜÖ±½ÓÓ°Ïì¡£ÊÂÎñ²úÉúºó£¬ÒÁ±ÈÀûÑǺ½¿Õµ±¼´Æô¶¯°²È«ºÍ̸£¬Ö´Ðм¼Êõ¼°×éÖ¯´ëÊ©½ÚÔìÊÂ̬¡£¹«Ë¾ÒѶԿͻ§ÕË»§¹ØÁªµÄµç×ÓÓʼþµØÖ·Ôö³¤¶î±í±£»¤²ã£¬Èç²Ù×÷ǰÐèͨ¹ýÑéÖ¤ÂëÑéÖ¤£¬²¢³ÖÐø¼à¿ØÏµÍ³¿ÉÒɻ¡£Óйز¿ÃÅÒÑ»ñ֪ͨ£¬ÕýÓëÉæÊ¹©¸øÉÌÐͬµ÷²é¡£º½¿Õ¹«Ë¾½¨Òé¿Í»§¾¯Ìè¿ÉÒÉÐÅÏ¢£¬Í¨¹ýÖ¸¶¨µç»°»ã±¨Òì³£»î¶¯£¬·À±¸ÍøÂç´¹µö¼°Éç»á¹¤³Ì¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/iberia-discloses-customer-data-leak-after-vendor-security-breach/
6. Cox EnterprisesÔâOracleÁãÈÕ·ì϶¹¥»÷ÖÂÊý¾Ýй¶
11ÔÂ22ÈÕ£¬½üÈÕ£¬ÃÀ¹úÆóÒµ¼¯ÍÅCox EnterprisesÒòOracle E-Business SuiteµÄÁãÈÕ·ì϶CVE-2025-61882ÔâºÚ¿ÍÈëÇÖ£¬µ¼ÖÂ9,479ÃûÓ×ÎÒÊý¾Ýй¶¡£¸Ã¹«Ë¾ÓÚ9ÔÂ29ÈÕ·¢ÏÖ¿ÉÒɻ£¬ËÝÔ´ÖÁ8ÔÂ9ÈÕÖÁ14ÈÕÆÚ¼ä¹¥»÷ÕßÀûÓøÃδ֪·ì϶ִÐй¥»÷¡£Cox Enterprises×÷ΪÄêÊÕÈë230ÒÚÃÀÔª¡¢Õ¼ÓÐ5.5ÍòÃûÔ±¹¤µÄ¿ç¹úÆóÒµ£¬Éæ¼°µçÐÅ¡¢Æû³µ·þÎñµÈÒµÎñ£¬Æäºó¶ÜÔËӪƽ̨ÔâÉøÈëºó£¬ÍþвÐÐΪÕßClopÀÕË÷Èí¼þÓÚ10ÔÂ27ÈÕ½«CoxÁÐÈë°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾£¬²¢°ä²¼ÇÔÊØÐÅÏ¢¡£OracleËäÔÚ10ÔÂ5ÈÕ°ä²¼²¹¶¡£¬µ«·ì϶Òѱ»ÌáǰÀûÓá£CoxÔÚ֪ͨÖÐδÅû¶¾ßÌåй¶Êý¾ÝÀàÐÍ£¬µ«ÎªÊÜÓ°ÏìÕßÌṩ12¸öÔÂÃâ·ÑÉí·Ý͵ÇÔ±£»¤¼°ÐÅÓþ¼à¿Ø·þÎñ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬ClopͬÆÚ°ä²¼Á˶à¼ÒÐÂÊܺ¦ÆóÒµ£¬º¸ÇÆû³µ¡¢Èí¼þ¡¢¿Æ¼¼ÐÐÒµ£¬ÂÞ¼¼¡¢¹þ·ð´óѧµÈ»ú¹¹´ËǰÒà֤ʵ´æÔÚÓйطì϶¡£
https://www.bleepingcomputer.com/news/security/cox-enterprises-discloses-oracle-e-business-suite-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ