SonicWall SSLVPN ×°±¸ÑÏÖØÎó²îÆØ¹â£º³¬25,000̨װ±¸Ò×Êܹ¥»÷
Ðû²¼Ê±¼ä 2024-12-191. SonicWall SSLVPN ×°±¸ÑÏÖØÎó²îÆØ¹â£º³¬25,000̨װ±¸Ò×Êܹ¥»÷
12ÔÂ17ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Bishop FoxµÄÆÊÎöÕ¹ÏÖ£¬£¬£¬£¬Áè¼Ý25,000̨¿É¹ûÕæ»á¼ûµÄSonicWall SSLVPN×°±¸±£´æÖØ´óÇå¾²Òþ»¼£¬£¬£¬£¬ÆäÖÐ20,000̨װ±¸ÔËÐÐ׏©Ó¦É̲»ÔÙÖ§³ÖµÄSonicOS/OSX¹Ì¼þ°æ±¾¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩװ±¸ÈÝÒ×ÔâÊÜÀÕË÷Èí¼þ×éÖ¯ÈçFogºÍAkiraµÄ¹¥»÷£¬£¬£¬£¬³ÉΪÆäÈëÇÖ¹«Ë¾ÍøÂçµÄÈë¿Ú¡£¡£¡£¡£¡£¡£¡£¡£Í¨¹ýɨÃ蹤¾ß£¬£¬£¬£¬Bishop Fox·¢Ã÷ÁË430,363¸ö¹ûÕæÌ»Â¶µÄSonicWall·À»ðǽ£¬£¬£¬£¬ÖÎÀí»òSSL VPN½Ó¿Ú¿É´Ó»¥ÁªÍø»á¼û£¬£¬£¬£¬Îª¹¥»÷ÕßÌṩÁË̽²âÎó²î¡¢¹ýʱ¹Ì¼þ¡¢¹ýʧÉèÖÃºÍÆÆ½âÈõÃÜÂëµÄʱ»ú¡£¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬6,633̨װ±¸ÒѵִïʹÓÃÊÙÃü£¬£¬£¬£¬ÉÐÓÐ14,077̨ʹÓÃSeries 6µÄ²»ÔÙÊÜÖ§³Ö°æ±¾£¬£¬£¬£¬¹²20,710̨Ò×ÊܹûÕæÎó²î¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÉÐÓдó×Ú×°±¸ÔËÐÐ×Åδ֪°æ±¾»ò²»ÊÜÖ§³ÖµÄ¹Ì¼þ¡£¡£¡£¡£¡£¡£¡£¡£ËäÈ»Ïà±È2024Äê1Ô£¬£¬£¬£¬Ò×Êܹ¥»÷µÄ¶ËµãÊýÄ¿ÓÐËùϽµ£¬£¬£¬£¬µ«²¹¶¡½ÓÄÉËÙÂÊÈÔÈ»»ºÂý£¬£¬£¬£¬ÏÔʾ³öÍøÂçÇå¾²ÐÎÊÆÒÀÈ»ÑÏËà¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-25-000-sonicwall-vpn-firewalls-exposed-to-critical-flaws/
2. ÄÉÃ×±ÈÑǵçÐÅÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬Ãô¸ÐÊý¾Ýй¶
12ÔÂ17ÈÕ£¬£¬£¬£¬ÄÉÃ×±ÈÑǹúÓеçÐŹ«Ë¾½üÆÚÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ¼Ö½ü50ÍòÌõÃô¸Ð¿Í»§Êý¾Ý±»Ð¹Â¶£¬£¬£¬£¬ÆäÖаüÀ¨¸ß¼¶Õþ¸®¹ÙÔ±µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£ÔھܾøÓëºÚ¿Í×éÖ¯¡°ÁÔÈ˹ú¼Ê¡±ÏàÖúºó£¬£¬£¬£¬ºÚ¿Í½«ÕâЩÊý¾ÝÐû²¼µ½Á˰µÍøÉÏ¡£¡£¡£¡£¡£¡£¡£¡£ÄÉÃ×±ÈÑǵçÐŹ«Ë¾ÕýÔÚÊÓ²ì´Ë´Î´ó¹æÄ£ÏµÍ³ÈëÇÖµÄÔµ¹ÊÔÓÉ£¬£¬£¬£¬²¢ÕýÓëÇå¾²¹ÙÔ±ÏàÖú£¬£¬£¬£¬ÒÔïÔ̽øÒ»²½µÄÐÅϢй¶²¢×·²¶×ï·¸¡£¡£¡£¡£¡£¡£¡£¡£¼´½«Ð¶ÈεÄ×ÜͳÄϸêÂ塤ķ±¾°Í¶Ô´Ë´ÎÍøÂç¹¥»÷ÌåÏÖѵ³â£¬£¬£¬£¬²¢ºôÓõÒÔÓ¦ÓеĽôÆÈÐÔ´¦Öóͷ£´ËÊ£¬£¬£¬£¬Ö¸³öÍøÂçÇå¾²Êǹú¼ÒÇå¾²ÎÊÌâ¡£¡£¡£¡£¡£¡£¡£¡£¾ÝÄÉÃ×±ÈÑǵçÐŹ«Ë¾Ê×ϯִÐйÙ˹̹Àû¡¤É³ÄÉÆ½´ïÌåÏÖ£¬£¬£¬£¬¹«Ë¾²»»áÓëºÚ¿Í¾ÍÊê½ð¾ÙÐÐ̸ÅУ¬£¬£¬£¬ÓÉÓÚÊê½ðÊý¶î¹ý¸ßÇÒÖ§¸¶Êê½ðÒ²²»¿É°ü¹ÜÐÅÏ¢²»±»Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬ºÚ¿ÍÇÔÈ¡Á˰üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡¢µØµãºÍÒøÐÐÐÅÏ¢µÈÔÚÄÚµÄÃô¸Ð¿Í»§¼Í¼£¬£¬£¬£¬²¢ÔÚÉ罻ýÌåÉÏ·ÖÏí¡£¡£¡£¡£¡£¡£¡£¡£ÄÉÃ×±ÈÑǵçÐŹ«Ë¾ÖÒÑÔÈËÃDz»Òª·ÖÏíÈκÎй¶µÄÐÅÏ¢£¬£¬£¬£¬²¢±Þ²ß¿Í»§¸ü¸ÄÃÜÂ룬£¬£¬£¬×èÖ¹ÔÚ¿ÉÒÉÇéÐÎϾÙÐÐתÕË¡£¡£¡£¡£¡£¡£¡£¡£
https://www.capitalfm.co.ke/news/2024/12/sensitive-data-leaked-after-namibia-ransomware-hack/
3. ÍøÂç´¹ÂÚÕ©ÆÐÂÊֶΣºÀÄÓÃGoogleÈÕÀúºÍ»æÍ¼Ò³ÃæÇÔȡƾ֤
12ÔÂ18ÈÕ£¬£¬£¬£¬½üÆÚÍøÂç´¹ÂÚթƻƵÈÔ£¬£¬£¬£¬²»·¨·Ö×ÓʹÓÃGoogleÈÕÀúÔ¼ÇëºÍGoogle»æÍ¼Ò³Ãæ×÷Ϊ¹¤¾ß£¬£¬£¬£¬ÍýÏëÇÔÈ¡Óû§Æ¾Ö¤£¬£¬£¬£¬²¢ÀÖ³ÉÈÆ¹ýÁËÀ¬»øÓʼþ¹ýÂËÆ÷¡£¡£¡£¡£¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¼à¿Ø»ú¹¹Check Point±¨¸æ£¬£¬£¬£¬¶Ì¶ÌÖÜΧÄÚ£¬£¬£¬£¬ÒÑÓÐ300¸öÆ·ÅÆÔâÊܹ¥»÷£¬£¬£¬£¬Áè¼Ý4,000·â´¹ÂÚÓʼþ±»·¢ËÍ¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩÓʼþµÄÄ¿µÄÆÕ±é£¬£¬£¬£¬°üÀ¨½ÌÓý»ú¹¹¡¢Ò½ÁÆ»ú¹¹¡¢ÐÞ½¨¹«Ë¾ºÍÒøÐеȡ£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÊÖ·¨Ö÷ÒªÊÇͨ¹ýGoogleÈÕÀú·¢ËÍ¿´ËÆÎÞº¦µÄ¾Û»áÔ¼Ç룬£¬£¬£¬Ô¼ÇëÖÐǶÈëÖ¸ÏòGoogle Forms»òGoogle DrawingµÄÁ´½Ó£¬£¬£¬£¬ÓÕµ¼Óû§µã»÷αװ³ÉreCaptcha»òÖ§³Ö°´Å¥µÄÁíÒ»¸öÁ´½Ó¡£¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚÕâЩԼÇëÀ´×ÔÕýµ±µÄGoogleЧÀÍ£¬£¬£¬£¬Òò´ËÄܹ»ÈƹýÀ¬»øÓʼþ¹ýÂËÆ÷¡£¡£¡£¡£¡£¡£¡£¡£Check PointÖ¸³ö£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËGoogleÈÕÀúЧÀÍ£¬£¬£¬£¬Ê¹µÃÓʼþÎÊÌâ¿´ÆðÀ´ÍêÈ«Õýµ±£¬£¬£¬£¬ÓëÕý³£GoogleÈÕÀúÔ¼ÇëÎÞÒ죬£¬£¬£¬²¢Í¨¹ýÁËDKIM¡¢SPFºÍDMARCµÈµç×ÓÓʼþÇå¾²¼ì²é¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¹¥»÷Õß»¹»á×÷·ÏGoogleÈÕÀú»î¶¯²¢¸½¼ÓÐÂÎÅ£¬£¬£¬£¬ÒÔÔöÌí´¹ÂÚÓʼþµÄ·¢ËÍÁ¿¡£¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜGoogleÔøÍÆ³ö±£»£»£»£»£»£»£»¤²½·¥£¬£¬£¬£¬µ«ÈôGoogle WorkspaceÖÎÀíԱδÆôÓ㬣¬£¬£¬ÈÕÀúÖÐÈÔ»á×Ô¶¯Ìí¼Ó´ËÀàÔ¼Çë¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ongoing-phishing-attack-abuses-google-calendar-to-bypass-spam-filters/
4. APT29ºÚ¿Í×é֯ʹÓÃ193¸öRDPÊðÀíЧÀÍÆ÷Ö´ÐÐMiTM¹¥»÷
12ÔÂ18ÈÕ£¬£¬£¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯APT29£¨Óֳơ°ÎçÒ¹±©Ñ©¡±£©ÕýʹÓÃÓÉ193¸öÔ¶³Ì×ÀÃæÐÒ飨RDP£©ÊðÀíЧÀÍÆ÷×é³ÉµÄÍøÂçÖ´ÐÐÖÐÐÄÈË£¨MiTM£©¹¥»÷£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Êý¾Ý¡¢Æ¾Ö¤²¢×°ÖöñÒâ¸ºÔØ¡£¡£¡£¡£¡£¡£¡£¡£¸Ã×é֯ʹÓÃPyRDPºì¶ÓÊðÀí¹¤¾ß£¬£¬£¬£¬Í¨¹ýRDPÐÒéɨÃèÊܺ¦ÕßÎļþϵͳ¡¢ÇÔÈ¡Êý¾Ý²¢ÔÚÔ¶³ÌÖ´ÐжñÒâ³ÌÐò¡£¡£¡£¡£¡£¡£¡£¡£¾ÝÇ÷ÊÆ¿Æ¼¼£¨Trend Micro£©±¨¸æ£¬£¬£¬£¬APT29µÄÄ¿µÄ°üÀ¨Õþ¸®¡¢¾üÊ¡¢Íâ½»¡¢IT¡¢ÔÆÐ§ÀÍ¡¢µçÐż°ÍøÂçÇå¾²¹«Ë¾µÈ£¬£¬£¬£¬ÌØÊâÕë¶ÔÃÀ¹ú¡¢·¨¹ú¡¢°Ä´óÀûÑǵȶà¸ö¹ú¼ÒµÄʵÌå¡£¡£¡£¡£¡£¡£¡£¡£2024Äê10Ô£¬£¬£¬£¬ÑÇÂíÑ·ºÍCERT-UAÐû²¼µÄ±¨¸æÏÔʾ£¬£¬£¬£¬APT29ÓÕÆÊܺ¦Õßͨ¹ýÍøÂç´¹ÂÚÓʼþÅþÁ¬µ½¶ñÒâRDPЧÀÍÆ÷£¬£¬£¬£¬¹²ÏíÍâµØ×ÊÔ´£¬£¬£¬£¬´Ó¶øÎÞÌõ¼þ»á¼ûÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼µÄ×îÐÂÑо¿Õ¹ÏÖÁË193¸öRDPÊðÀíЧÀÍÆ÷½«ÅþÁ¬Öض¨ÏòÖÁ34¸öºó¶ËЧÀÍÆ÷£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܼàÊÓºÍ×èµ²RDP»á»°¡£¡£¡£¡£¡£¡£¡£¡£ºÚ¿ÍʹÓÃPyRDP¹¤¾ß×èµ²Êܺ¦ÕßÓëÔ¶³Ì»á»°¼äµÄͨѶ£¬£¬£¬£¬¼Í¼ƾ֤¡¢ÇÔÈ¡Êý¾Ý²¢ÔÚÐÂÅþÁ¬ÉÏÔËÐжñÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬APT29»¹½ÓÄÉÉÌÒµVPN¡¢TOR³ö¿Ú½ÚµãºÍסլÊðÀíЧÀÍÑÚÊζñÒâЧÀÍÆ÷IPµØµã¡£¡£¡£¡£¡£¡£¡£¡£ÎªÌá·À´ËÀ๥»÷£¬£¬£¬£¬Óû§Ó¦½öÓëÒÑÖª¡¢ÊÜÐÅÈεÄЧÀÍÆ÷½¨ÉèRDPÅþÁ¬£¬£¬£¬£¬²¢Ð¡ÐÄÀ´×Ôδ֪ȪԴµÄRDPÅþÁ¬ÇëÇ󡣡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/russian-hackers-use-rdp-proxies-to-steal-data-in-mitm-attacks/
5. ÍøÂç´¹ÂڻÀÄÓÃHubSpotÇÔÈ¡20,000 AzureÕÊ»§Æ¾Ö¤
12ÔÂ18ÈÕ£¬£¬£¬£¬Õë¶ÔµÂ¹úºÍÓ¢¹úµÄÆû³µ¡¢»¯Ñ§¼°¹¤ÒµÖÆÔ칫˾£¬£¬£¬£¬Ò»³¡ÍøÂç´¹ÂڻÕýÔÚʹÓÃHubSpotƽ̨ÇÔÈ¡Microsoft AzureÕÊ»§Æ¾Ö¤¡£¡£¡£¡£¡£¡£¡£¡£¾ÝPalo Alto NetworksµÄUnit 42Ñо¿ÍŶӱ¨¸æ£¬£¬£¬£¬¸Ã»î¶¯×Ô2024Äê6ÔÂÆðÖÁÉÙÒ»Á¬ÖÁ9Ô£¬£¬£¬£¬ÒÑΣ¼°Ô¼20,000¸öÕË»§¡£¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßͨ¹ýHubSpot Free Form Builder½¨ÉèÓÕÆÐÔ±í¸ñ£¬£¬£¬£¬²¢Ê¹ÓÃÄ£ÄâDocuSignµÄPDF½«Êܺ¦ÕßÖØ¶¨ÏòÖÁÆ¾Ö¤ÍøÂçÒ³Ãæ¡£¡£¡£¡£¡£¡£¡£¡£ÕâÐ©Ò³ÃæÎ»ÓÚ¹¥»÷Õß¿ØÖƵġ°.buzz¡±ÓòÃûÍøÕ¾ÉÏ£¬£¬£¬£¬Ä£ÄâMicrosoft Outlook Web AppºÍAzureµÇ¼½çÃæ¡£¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜHubSpot»ù´¡ÉèʩδÊܹ¥»÷£¬£¬£¬£¬µ«Æä±»ÓÃ×÷ÖÐÐİ취ָµ¼Êܺ¦Õß¡£¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚÓʼþ°üÀ¨Õýµ±Ð§ÀÍÁ´½Ó£¬£¬£¬£¬ËüÃdz£ÄܱܿªÇå¾²¹¤¾ß¼ì²â½øÈëÊÕ¼þÏä¡£¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬Ïà¹ØÓʼþδͨ¹ýSPF¡¢DKIMºÍDMARC¼ì²é¡£¡£¡£¡£¡£¡£¡£¡£ÔÚÀÖ³ÉÈëÇֺ󣬣¬£¬£¬ÍþвÐÐΪÕßʹÓÃVPNαװµØÀíλÖ㬣¬£¬£¬²¢ÓëIT²¿·ÖÕùÈ¡ÕË»§¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£¡£¡£Unit 42»¹·¢Ã÷Á˸ûÖÐʹÓõÄÐÂÐÍ×ÔÖÎϵͳ±àºÅºÍÓû§ÊðÀí×Ö·û´®£¬£¬£¬£¬¿ÉÓÃÓÚÍþвʶ±ð¡£¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü´ó¶¼Ð§ÀÍÆ÷ÒÑÏÂÏߣ¬£¬£¬£¬µ«¸Ã»î¶¯ÔÙ´ÎÅú×¢ÍþвÐÐΪÕßÕýһֱ̽Ë÷ÈÆ¹ýÇå¾²µÄÐÂÒªÁì¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hubspot-phishing-targets-20-000-microsoft-azure-accounts/
6. ÄÚ²¼À˹¼ÓÖÝRegional CareÒ½Áưü¹Ü¹«Ë¾Êý¾Ýй¶
12ÔÂ18ÈÕ£¬£¬£¬£¬ÄÚ²¼À˹¼ÓÖÝÒ½Áưü¹Ü¹«Ë¾Regional Care½üÆÚÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁËÁè¼Ý225,000ÈË¡£¡£¡£¡£¡£¡£¡£¡£2024Äê9ÔÂÖÐÑ®£¬£¬£¬£¬Regional Care·¢Ã÷ÆäÍøÂçÖеÄÒ»¸öÕË»§·ºÆðÒì³£»£»£»£»£»£»£»î¶¯£¬£¬£¬£¬²¢Á¬Ã¦¹Ø±ÕÁ˸ÃÕË»§¡£¡£¡£¡£¡£¡£¡£¡£¾ÓÉÍøÂçÇ徲ר¼ÒµÄÊӲ죬£¬£¬£¬È·ÈÏ¡°Î´¾ÊÚȨµÄÒ»·½¡±¿ÉÄÜ´ÓÆäϵͳÖлñÈ¡ÁËһЩÎļþ¡£¡£¡£¡£¡£¡£¡£¡£11ÔÂ8ÈÕ£¬£¬£¬£¬¸Ã¹«Ë¾È·¶¨²¿·ÖÊÜËðÎļþ°üÀ¨Ãô¸ÐСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬ÈçÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍ¿µ½¡°ü¹ÜÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£¡£¡£Õë¶ÔÉç»á°ü¹ÜºÅÂ뱻й¶µÄСÎÒ˽¼Ò£¬£¬£¬£¬Regional CareÌṩÁËÃâ·ÑµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÒѱ»×ª´ï¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ¡£¡£¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬¸Ã°ü¹Ü¹«Ë¾ÉÐδ·ÖÏí¸ü¶à¹ØÓÚ´Ë´ÎÈëÇÖµÄÐÅÏ¢£¬£¬£¬£¬ÇÒSecurityWeekҲδ·¢Ã÷ÈκÎÒÑÖªµÄÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/regional-care-data-breach-impacts-225000-people/


¾©¹«Íø°²±¸11010802024551ºÅ