AkiraÀÕË÷Èí¼þÍÅ»ïÊ·ÎÞÇ°ÀýÒ»ÈÕй¶35ÃûÊܺ¦ÕßÊý¾Ý

Ðû²¼Ê±¼ä 2024-11-20

1. AkiraÀÕË÷Èí¼þÍÅ»ïÊ·ÎÞÇ°ÀýÒ»ÈÕй¶35ÃûÊܺ¦ÕßÊý¾Ý


11ÔÂ19ÈÕ £¬ÀÕË÷Èí¼þÍÅ»ïAkiraÔÚÒ»ÌìÄÚй¶ÁË´óÁ¿Êܺ¦ÕßÊý¾Ý £¬ÊýÁ¿´´ÏÂÁ˼ͼ¡£¸ÃÍÅ»ïÊÇÒ»¸öÀÕË÷Èí¼þ¼´·þÎñÍÅ»ï £¬ÔÚÍøÂç·¸×ï½çÔ½À´Ô½ÖªÃû¡£ËûÃÇͨ¹ýÇÔÈ¡ºÍ¼ÓÃÜÊý¾ÝÀ´ÀÕË÷Êܺ¦Õß £¬²¢ÔÚ°µÍøйÃÜÍøÕ¾ÉÏÐû²¼Êܺ¦ÕßÐÅÏ¢¡£ÖÜÒ» £¬¸ÃÍÅ»ïµÄйÃÜÍøÕ¾ÐÂÔöÁË35ÃûÊܺ¦Õß £¬ÆäÖÐ32ÃûΪÐÂÊܺ¦Õß¡£ÍøÂçÄþ¾²Ñо¿ÈËÔ±ÌåÏÖ £¬ÕâÊÇÇ°ËùδÓеĴóÁ¿±»µÁ×ÊÁÏ¡£¾¡¹ÜÓÐÍƲâÈÏΪÕâ¿ÉÄÜÊÇAkiraÔڹرÕ֮ǰµÄ×îºóÒ»´Î´ó˦Âô £¬µ«Ñо¿ÈËÔ±ÈÏΪ £¬Akira¿ÉÄÜÈÔÔÚÍøÂç·¸×ïÉú̬ϵͳÖлý¼«À©ÕÅ¡£ÐÂÊܺ¦Õß´ó¶àÀ´×ÔÉÌÒµ·þÎñÐÐÒµ £¬×ܲ¿Î»ÓÚÃÀ¹ú £¬µ«Ò²ÓмÓÄô󡢵¹ú¡¢Ó¢¹úµÈµØµÄ¹«Ë¾Êܵ½Ó°Ïì¡£ÓëLockBit²îÒì £¬Akira´Ë´ÎÐû²¼µÄÊܺ¦ÕßÐÅÏ¢¶¼ÊÇеÄ £¬Ã»ÓоÉÊܺ¦ÕßÐÅÏ¢±»ÖØÐÂÐû²¼¡£


https://therecord.media/akira-ransomware-group-publishes-unprecedented-leak-data


2. FinastraÄÚ²¿Îļþ´«Êäƽ̨ÒÉÔâ´ó¹æÄ£ÐÅÏ¢ÇÔÈ¡


11ÔÂ19ÈÕ £¬½ðÈڿƼ¼¹«Ë¾FinastraÕýÔÚÊÓ²ìÆäÄÚ²¿Îļþ´«Êäƽ̨·¢ÉúµÄ´ó¹æÄ£ÐÅÏ¢ÇÔȡʼþ¡£¸Ã¹«Ë¾ÎªÈ«Çò½ü8,100¼Ò½ðÈÚ»ú¹¹Ìṩ·þÎñ £¬°üÂÞ45¼Ò¶¥¼¶ÒøÐС£½üÈÕ £¬Ò»ÃûÍøÂç·¸×ï·Ö×ÓÔÚ°µÍøÉÏÉù³ÆÒÑ´ÓFinastraÇÔÈ¡Áè¼Ý400GBµÄÊý¾Ý²¢¿ªÊ¼³öÊÛ¡£FinastraÒÑÏò¿Í»§Í¨±¨ÁËÕâÒ»Äþ¾²Ê¼þ £¬²¢ÌåÏÖ¿Í»§ÔËÓª¡¢¿Í»§ÏµÍ³»òÆäΪ¿Í»§Ìṩ·þÎñµÄÄÜÁ¦Ã»ÓÐÊܵ½Ö±½ÓÓ°Ïì¡£¹«Ë¾ÒÑʵʩÌæ´úµÄÄþ¾²Îļþ¹²Ïíƽ̨ÒÔÈ·±£Á¬ÐøÐÔ £¬²¢ÕýÔÚÊÓ²ìʼþÔ­Òò¡£¾Ý¿ª¶ËÖ¤¾Ý±íÃ÷ £¬Æ¾Ö¤Òѱ»Ð¹Â¶ £¬µ«ÉÐδȷ¶¨±»ÇÔÈ¡ÎļþÖаüÂÞµÄÊý¾ÝµÄ·¶Î§ºÍÐÔÖÊ¡£Ò»ÃûʹÓÃêdzơ°abyss0¡±µÄÍøÂç·¸×ï·Ö×ÓÔÚ10Ô·ݾÍÊÔͼ³öÊ۾ݳƴÓFinastraÇÔÈ¡µÄÊý¾Ý £¬¶øFinastraÔÚ11ÔÂ7ÈÕÊ״μì²âµ½¿ÉÒɻ¡£´Ë´ÎÈëÇÖ¿ÉÄÜÊÇabyss0Ôٴηµ»ØÇÔÈ¡¸ü¶àÊý¾Ý¡£Ä¿Ç° £¬abyss0µÄTelegramÕÊ»§ºÍBreachForumsÕÊ»§¶¼ÒÑÏûʧ £¬ÆäËùÓÐÏúÊÛÌû×ÓÒ²ÒÑɾ³ý¡£


https://krebsonsecurity.com/2024/11/fintech-giant-finastra-investigating-data-breach/


3. CISAÐÂÔöÈý©¶´¾¯Ê¾£ºProgress Kemp LoadMasterµÈϵͳÃæÁÙÑÏÖØÍþв


11ÔÂ19ÈÕ £¬ÃÀ¹úÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£¨CISA£©½üÆÚÔÚÆäÒÑÖªÀûÓ鶴£¨KEV£©Ä¿Â¼ÖÐÐÂÔöÁËÈý¸öÖØҪ©¶´ £¬ÆäÖÐÖ®Ò»ÊÇÓ°ÏìProgress Kemp LoadMasterµÄÒªº¦²Ù×÷ϵͳÃüÁî×¢È멶´ £¬±àºÅΪCVE-2024-1212 £¬ÓÉRhino Security Labs·¢ÏÖ²¢ÓÚ2ÔÂ21ÈÕÐû²¼µÄ¸üÐÂÖнâ¾ö¡£¸Ã©¶´ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õßͨ¹ýLoadMaster¹ÜÀí½çÃæÖ´ÐÐÈÎÒâϵͳÃüÁî £¬¶ÔLoadMaster°æ±¾7.2.48.1¡¢7.2.54.8ºÍ7.2.55.0֮ǰµÄ°æ±¾×é³ÉÍþв¡£ÁíÍâÁ½¸ö±»CISAÌí¼Óµ½KEVµÄ©¶´·Ö±ðÊÇÓ°ÏìPalo Alto Networks PAN-OS¹ÜÀí½çÃæµÄÉí·ÝÑéÖ¤Èƹý©¶´£¨CVE-2024-0012£©ºÍOSÃüÁî×¢È멶´£¨CVE-2024-9474£©¡£´ËÍâ £¬Progress Software»¹ÐÞ¸´ÁËLoadMasterÖеÄÁíÒ»¸ö×î¸ßÑÏÖØÐÔ©¶´CVE-2024-7591 £¬¸Ã©¶´ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÌØÖÆHTTPÇëÇó·ÃÎʹÜÀí½çÃæ²¢Ö´ÐÐÈÎÒâÃüÁî £¬Ó°ÏìLoadMaster°æ±¾7.2.60.0¼°Ö®Ç°°æ±¾ºÍMT Hypervisor°æ±¾7.1.35.11¼°Ö®Ç°°æ±¾¡£


https://www.bleepingcomputer.com/news/security/cisa-tags-progress-kemp-loadmaster-flaw-as-exploited-in-attacks/


4. ¸£ÌØÆû³µÔâÊý¾Ýй¶ָ¿Ø £¬44000Ìõ¿Í»§¼Ç¼Òɱ»ºÚ¿ÍÂÛ̳й¶


11ÔÂ19ÈÕ £¬Ò»ÃûºÚ¿ÍÔÚºÚ¿ÍÂÛ̳BreachForumsÉÏÉù³Æй¶Á˸£ÌØÆû³µµÄ44,000Ìõ¿Í»§¼Ç¼ £¬ÒýÆðÁ˹㷺¹Ø×¢¡£¾Ý³Æ £¬ÕâЩ¼Ç¼°üÂÞ¿Í»§µÄÈ«Ãû¡¢Êµ¼ÊλÖᢹºÖÃÏêÇé¡¢¾­ÏúÉÌÐÅÏ¢ºÍʱ¼ä´ÁµÈ¸öÈËÉí·ÝÐÅÏ¢ £¬¾¡¹Ü²¢·Ç¼«¶ÈÃô¸Ð £¬µ«ÈÔ¿ÉÄÜʹ±»Ð¹Â¶µÄ¸öÈËÃæÁÙÍøÂçµöÓãºÍÉç»á¹¤³Ì¹¥»÷µÄ·çÏÕ¡£Ð¹Â¶Õß¡°EnergyWeaponUser¡±²¢Î´ÊÔͼ³öÊÛ¸ÃÊý¾Ý¼¯ £¬¶øÊǽöÒÔ8¸ö»ý·Ö£¨Ô¼2ÃÀÔª£©µÄ¼Û¸ñÌṩӦÂÛ̳ע²á»áÔ±¡£¸£Ìع«Ë¾¶Ô´ËÊÂÌåÏÖÒѾ­Òâʶµ½²¢ÕýÔÚ»ý¼«ÊÓ²ìÏà¹ØÖ¸¿Ø¡£Í¬Ê± £¬ÓÐÖ¸¿Ø³ÆÁíÒ»ÃûºÚ¿Í¡°IntelBroker¡±Ò²ÉæÏÓ¼ÓÈëÁË´Ë´Îй¶Ê¼þ £¬¸ÃºÚ¿Í½üÆÚÒÑÈ·ÈÏÈëÇÖÁ˶à¸öÖªÃû»ú¹¹ £¬°üÂÞ˼¿Æ¡¢Åµ»ùÑÇ¡¢Å·ÖÞÐ̾¯×éÖ¯ºÍT-MobileµÈ¡£¼øÓÚÊý¾Ýй¶¿ÉÄÜ´øÀ´µÄ·çÏÕ £¬×¨¼Ò½¨Ò鹫ÖÚ½÷É÷¿´´ýδ¾­ÇëÇóµÄͨÐÅ £¬²¢¾Ü¾øÈκÎÒªÇóÅû¶¸ü¶àÐÅÏ¢µÄÇëÇó¡£


https://www.bleepingcomputer.com/news/security/ford-investgates-alleged-breach-following-customer-data-leak/


5. HelldownÀÕË÷Èí¼þÀûÓÃZyxel·À»ðǽ©¶´¹¥»÷ÆóÒµ


11ÔÂ19ÈÕ £¬Ðµġ°Helldown¡±ÀÕË÷Èí¼þÐж¯Õë¶ÔZyxel·À»ðǽ©¶´ £¬Í¨¹ýÇÖÈ빫˾ÍøÂçÇÔÈ¡Êý¾Ý²¢¼ÓÃÜÉ豸¡£¾Ý·¨¹úÍøÂçÄþ¾²¹«Ë¾SekoiaÊÓ²ì £¬×Ô½ñÄêÏÄÌìÍƳöÒÔÀ´ £¬HelldownÉú³¤Ñ¸ËÙ £¬ÔÚÆäÀÕË÷ÃÅ»§ÍøÕ¾ÉÏÁгöÁËÖÚ¶àÊܺ¦Õß £¬Ö÷ÒªÊÇÃÀ¹úºÍÅ·ÖÞµÄÖÐСÐ͹«Ë¾¡£Helldown Windows°æ»ùÓÚ鶵ÄLockBit 3¹¹½¨Æ÷ £¬²Ù×÷ÓëDarkraceºÍDonexÏàËÆ £¬µ«Æä¼ÓÃÜÆ÷²¢²»ÏȽø £¬Ê¹ÓÃÅú´¦ÖÃÎļþ½áÊøÈÎÎñ¡£Sekoia·¢ÏÖ £¬ÖÁÉÙ8ÃûHelldownÊܺ¦ÕßÔÚʹÓÃZyxel·À»ðǽ×÷ΪIPSec VPN½ÓÈëµãʱÔâµ½ÈëÇÖ £¬ÍƲâHelldown¿ÉÄÜÀûÓÃCVE-2024-42057©¶´ £¬¸Ã©¶´ÒÑÔÚ9ÔÂ3ÈÕÐû²¼µÄ¹Ì¼þ°æ±¾5.39Öеõ½ÐÞ¸´¡£´ËÍâ £¬Sekoia»¹·¢ÏÖÓëZyxelÈëÇÖÏà¹ØµÄ¿ÉÒÉÓû§ÕÊ»§ºÍÅäÖÃÎļþ £¬²¢ÍƲâÓÐЧÔغɿÉÄÜÓë¸ÃÈëÇÖÓйØ¡£Ä¿Ç° £¬ZyxelÉÐδ¶ÔÕâЩ¹¥»÷×÷³ö»ØÓ¦¡£


https://www.bleepingcomputer.com/news/security/helldown-ransomware-exploits-zyxel-vpn-flaw-to-breach-networks/


6. Ngioweb¶ñÒâÈí¼þÖ§³ÅNSOCKSµÈסլÊðÀí·þÎñ £¬Òý·¢ÍøÂçÄþ¾²µ£ÓÇ


11ÔÂ19ÈÕ £¬Lumen TechnologiesµÄ×îÐÂÑо¿·¢ÏÖ £¬ÃûΪNgiowebµÄ¶ñÒâÈí¼þ±»ÓÃÓÚÖ§³ÖÎÛÃûÕÑÖøµÄסլÊðÀí·þÎñNSOCKSÒÔ¼°ÆäËûÀàËÆ·þÎñ¡£¸Ã¶ñÒâÈí¼þÖ÷ÒªÀûÓÃСÐͰ칫ÊÒ/¼ÒÍ¥°ì¹«ÊÒ·ÓÉÆ÷ºÍÎïÁªÍøÉ豸½øÐй¥»÷ £¬²¢ÔÚÃÀ¹úÓµÓдóÁ¿ÊðÀí¡£Ngioweb½©Ê¬ÍøÂçÿÌìά³ÖÔ¼35,000¸öÊÂÇé»úÆ÷ÈË £¬ÆäÖÐÐí¶àÒÑ»îÔ¾Ò»¸öÔ»ò¸ü³¤Ê±¼ä¡£¸Ã¶ñÒâÈí¼þÓÉWater BarghestÍþв×éÖ¯ÀûÓà £¬ËûÃÇͨ¹ý×Ô¶¯½Å±¾Éø͸Ò×Êܹ¥»÷µÄÎïÁªÍøÉ豸²¢²¿ÊðNgioweb £¬½«Æä×¢²áΪÊðÀí²¢ÔÚסլÊðÀíÊг¡ÉϳöÊÛ¡£Õû¸ö»õ±Ò»¯¹ý³ÌÖ»Ðè10·ÖÖÓ £¬±íÃ÷¸Ã²Ù×÷¸ß¶È¸ßЧºÍ×Ô¶¯»¯¡£NSOCKSÔÚÊÀ½ç¸÷µØÏúÊÛSOCKS5ÊðÀí·ÃÎÊȨÏÞ £¬±»ÓÃÓÚƾ֤Ìî³ä¹¥»÷ºÍÆäËû¶ñÒâ»î¶¯¡£Êܺ¦É豸»¹ÓëÓÉÓòÉú³ÉËã·¨´´½¨µÄC2Óò½¨Á¢ºã¾ÃÁ¬½Ó £¬ÒÔÈ·¶¨ÊÇ·ñ½«ËüÃÇÌí¼Óµ½ÊðÀíÍøÂçÖС£LumenÌåÏÖ £¬NSOCKSÓû§Í¨¹ý180¶à¸ö·´ÏòÁ¬½ÓC2½Úµã·ÓÉÁ÷Á¿ £¬ÑÚ¸ÇÆäÕæʵÉí·Ý¡£


https://thehackernews.com/2024/11/ngioweb-botnet-fuels-nsocks-residential.html