GFI KerioControl·À»ðǽÔâÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²îÍþв

Ðû²¼Ê±¼ä 2025-02-11

1. GFI KerioControl·À»ðǽÔâÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²îÍþв


2ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ £¬Áè¼ÝÒ»ÍòÁ½Ç§¸ö GFI KerioControl ·À»ðǽʵÀý±»·¢Ã÷±£´æ±àºÅΪ CVE-2024-52875 µÄÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£KerioControl ÊÇÒ»¿îרΪÖÐСÐÍÆóÒµÉè¼ÆµÄÍøÂçÇå¾²Ì×¼þ£¬£¬£¬£¬£¬£¬ £¬¹¦Ð§°üÀ¨ VPN¡¢´ø¿íÖÎÀí¡¢±¨¸æ¼à¿Ø¡¢Á÷Á¿¹ýÂË¡¢AV ±£»£»£»£»¤ºÍÈëÇÖ·ÀÓù¡£¡£¡£¡£¡£´ËÎó²îÓÉÇå¾²Ñо¿Ô± Egidio Romano£¨EgiX£©ÓÚ 2024 Äê 12 ÔÂÖÐÑ®·¢Ã÷£¬£¬£¬£¬£¬£¬ £¬²¢Õ¹Ê¾ÁË¿ÉÄܵÄÒ»¼ü RCE ¹¥»÷¡£¡£¡£¡£¡£Ö»¹Ü GFI Software ÒÑÔÚ 12 Ô 19 ÈÕÐû²¼ÁËÕë¶Ô¸ÃÎÊÌâµÄÇå¾²¸üУ¨9.4.5 Patch 1 °æ±¾£©£¬£¬£¬£¬£¬£¬ £¬µ«Æ¾Ö¤ Censys Êý¾Ý£¬£¬£¬£¬£¬£¬ £¬ÈýÖܺóÈÔÓдó×ÚʵÀýδÐÞ¸´¡£¡£¡£¡£¡£Greynoise ÒѼì²âµ½Ê¹ÓøÃÎó²îµÄ×Ô¶¯¹¥»÷ʵÑ飬£¬£¬£¬£¬£¬ £¬Ö¼ÔÚÇÔÈ¡ÖÎÀíÔ± CSRF ÁîÅÆ¡£¡£¡£¡£¡£Shadowserver Foundation ±¨¸æ³Æ£¬£¬£¬£¬£¬£¬ £¬ÏÖÔÚÈÔÓÐ 12,229 ¸ö KerioControl ·À»ðÇ½ÃæÁÙ´ËÎó²îÍþв£¬£¬£¬£¬£¬£¬ £¬ÊÜÓ°ÏìµØÇø°üÀ¨ÒÁÀÊ¡¢ÃÀ¹ú¡¢Òâ´óÀû¡¢µÂ¹úµÈ¡£¡£¡£¡£¡£ÓÉÓÚ±£´æ¹ûÕæµÄÎó²î֤ʵ£¨PoC£©£¬£¬£¬£¬£¬£¬ £¬Ê¹ÓÃÃż÷¼«µÍ£¬£¬£¬£¬£¬£¬ £¬ÉõÖÁ²»ÊìÁ·µÄºÚ¿ÍÒ²¿ÉÄܼÓÈë¶ñÒâ»î¶¯¡£¡£¡£¡£¡£Îó²îÔµ¹ÊÔ­ÓÉÔÚÓÚÓû§ÊäÈëδ»ñµÃÊʵ±ÕûÀí£¬£¬£¬£¬£¬£¬ £¬¿ÉÄܱ»Ê¹ÓÃÖ´ÐÐ HTTP ÏìÓ¦²ð·Ö¹¥»÷£¬£¬£¬£¬£¬£¬ £¬½ø¶ø¿ÉÄܵ¼Ö·´ÉäÐÍ¿çÕ¾µã¾ç±¾£¨XSS£©ºÍÆäËû¹¥»÷¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬ £¬Ç¿ÁÒ½¨ÒéÉÐδӦÓøüеÄÓû§×°Öà 2025 Äê 1 Ô 31 ÈÕÐû²¼µÄ KerioControl °æ±¾ 9.4.5 Patch 2£¬£¬£¬£¬£¬£¬ £¬ÒÔÔöÇ¿Çå¾²ÐÔ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-12-000-keriocontrol-firewalls-exposed-to-exploited-rce-flaw/


2. HandalaºÚ¿Í×é֝ɿÏÓ¶ÔÒÔÉ«Áо¯·½·¢¶¯´ó¹æÄ£ÍøÂç¹¥»÷


2ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ £¬ÎÛÃûÕÑÖøµÄHandalaºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬£¬ £¬ÉæÏÓÓëÒÁÀÊÇ鱨»ú¹¹ÓйØÁª£¬£¬£¬£¬£¬£¬ £¬½üÆÚÐû²¼¶ÔÒÔÉ«Áо¯Ô±²½¶Ó·¢¶¯ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ £¬Éù³ÆÀÖ³ÉÇÔÈ¡ÁË2.1TBµÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬°üÀ¨ÈËʼͼ¡¢ÎäÆ÷Çåµ¥¡¢Ò½ÁƺÍÐÄÀíµµ°¸µÈ£¬£¬£¬£¬£¬£¬ £¬²¢¹ûÕæÈö²¥ÁËÆäÖÐ35Íò·ÝÎļþ¡£¡£¡£¡£¡£Ö»¹ÜÒÔÉ«Áо¯·½·ñ¶¨ÏµÍ³Ö±½ÓÔâÈëÇÖ£¬£¬£¬£¬£¬£¬ £¬µ«´Ë´ÎÊý¾Ýй¶ÊÂÎñ¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬£¬ £¬Éæ¼°´ó×ÚÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬ £¬Èçµç×ÓÓʼþµØµã¡¢³Öǹ֤¡¢¾¯¹ÙÕÕÆ¬ºÍСÎÒ˽¼ÒÁªÏµ·½·¨µÈ¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬ £¬Handala»¹Ö¸¿ØÆä»ñÈ¡Á˾¯Ô±µÄÐÄÀíÆÀ¹ÀµÈ˽ÈËÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬²¢ÇÖÈëÁËÒÔÉ«Áйú¼ÒÇå¾²²¿µÄЧÀÍÆ÷¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÊÇHandalaÕë¶ÔÒÔÉ«ÁÐʵÌåʵÑ鯯ËðÐÔÍøÂçÐж¯µÄµä·¶°¸Àý£¬£¬£¬£¬£¬£¬ £¬ÌØÊâÊÇÔÚÒÔÉ«ÁÐÓë¹þÂí˹³åÍ»Éý¼¶ºó£¬£¬£¬£¬£¬£¬ £¬ÒÔÉ«ÁÐÒѳÉΪÒÁÀÊÍøÂçÐж¯µÄÖ÷ҪĿµÄ¡£¡£¡£¡£¡£HandalaµÄ»î¶¯ÆµÈÔ£¬£¬£¬£¬£¬£¬ £¬²»µ«ÉæÏÓ¼ÓÈëÕë¶ÔÒÔÉ«ÁÐ×éÖ¯ÍøÂçÇå¾²Ö°Ô±µÄÍøÂç´¹Âڻ£¬£¬£¬£¬£¬£¬ £¬»¹Õë¶ÔÒÔÉ«ÁеÄSoreqºËÑо¿ÖÐÐÄ·¢¶¯ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ £¬×î½üÓÖÈëÇÖÁËÒÔÉ«Áеç×Ó¹«Ë¾ÔËÓªµÄ½ôÆÈ¾¯±¨ÏµÍ³£¬£¬£¬£¬£¬£¬ £¬Òý·¢´ó¹æÄ£¿Ö»Å¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÚÌû×ÓÖм¥Ð¦ÒÔÉ«ÁУ¬£¬£¬£¬£¬£¬ £¬Ç¿µ÷ÆäÀÖ³ÉÍ»ÆÆ·ÀÓù²¢½ÒÆÆÉñÃØ£¬£¬£¬£¬£¬£¬ £¬ÖØÉêÆä¡°²»»áÒÅÍü£¬£¬£¬£¬£¬£¬ £¬²»»áÔ­Á¡±µÄ¿ÚºÅ¡£¡£¡£¡£¡£


https://hackread.com/handala-hackers-israeli-police-breach-data-leak/


3. ¾¯·½¾Ð²¶ 4 Ãû Phobos ÀÕË÷Èí¼þÏÓÒÉÈË£¬£¬£¬£¬£¬£¬ £¬²é·â 8Base ÍøÕ¾


2ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ £¬È«ÇòÖ´·¨Ðж¯¡°Phobos Aetor¡±Õë¶ÔPhobosÀÕË÷Èí¼þÍÅ»ïÕö¿ª£¬£¬£¬£¬£¬£¬ £¬ÒÑÔÚÌ©¹úÆÕ¼ªµº¾Ð²¶ËÄÃûÅ·ÖÞºÚ¿ÍÏÓÒÉÈË£¬£¬£¬£¬£¬£¬ £¬²¢²é·â8Base°µÍøÍøÕ¾¡£¡£¡£¡£¡£ÕâЩÏÓÒÉÈ˱»Ö¸¿Ø¶ÔÈ«ÇòÁè¼Ý1000ÃûÊܺ¦Õß¾ÙÐÐÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ £¬ÀÕË÷Á˼ÛÖµ1600ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£¡£¡£¡£´Ë´ÎÐж¯Éæ¼°¶à¸ö¹ú¼ÒºÍµØÇøµÄ¾¯·½Ð­Í¬Í»Ï®£¬£¬£¬£¬£¬£¬ £¬½É»ñÁ˵ç×Ó×°±¸ºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£¡£¡£8BaseÀÕË÷Èí¼þÍÅ»ï×Ô2022Äê3Ô½¨ÉèÒÔÀ´£¬£¬£¬£¬£¬£¬ £¬Ò»Ö±Ïà¶ÔÇÄÈ»£¬£¬£¬£¬£¬£¬ £¬Ö±µ½2023Äê6ÔÂ×îÏÈй¶Êܺ¦ÕßÊý¾Ý¡£¡£¡£¡£¡£¸ÃÍÅ»ï»áÈëÇÖÆóÒµÍøÂ磬£¬£¬£¬£¬£¬ £¬ÇÔÈ¡Êý¾Ý²¢Ê¹ÓÃPhobosÀÕË÷Èí¼þ¼ÓÃÜÆ÷¼ÓÃÜ×°±¸£¬£¬£¬£¬£¬£¬ £¬ÒªÇóÖ§¸¶¸ß¶îÊê½ðÒÔ»»È¡½âÃÜÃÜÔ¿ºÍ²»Ðû²¼Êý¾ÝµÄÔÊÐí¡£¡£¡£¡£¡£×ÅÃûÊܺ¦Õß°üÀ¨ÈÕ±¾µç²úÖêʽ»áÉçºÍÁªºÏ¹ú¿ª·¢ÍýÏëÊ𡣡£¡£¡£¡£´Ë´ÎÐж¯Åú×¢£¬£¬£¬£¬£¬£¬ £¬È«ÇòÖ´·¨²¿·ÖÕýÔÚÔöÇ¿ÏàÖú¹¥»÷ÀÕË÷Èí¼þ·¸·¨¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/legal/police-arrests-4-phobos-ransomware-suspects-seizes-8base-sites/


4. Lee Enterprises±¨Òµ¼¯ÍÅÔâÍøÂç¹¥»÷ÖÂÔËÓªÖÐÖ¹


2ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ £¬ÃÀ¹ú±¨Òµ¼¯ÍÅLee EnterprisesÔÚ2025Äê2ÔÂ3ÈÕÔâÊÜÁËÒ»´ÎÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ £¬µ¼ÖÂÆäÓªÒµÔËÓªÖÐÖ¹¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÆÈʹ¸Ã¹«Ë¾¹Ø±ÕÁËÐí¶àÍøÂ磬£¬£¬£¬£¬£¬ £¬ÈÅÂÒÁËÊýÊ®ÖÖ±¨Ö½µÄÓ¡Ë¢ºÍ¿¯ÐУ¬£¬£¬£¬£¬£¬ £¬²¢ÇÒʹµÃ¼ÇÕߺͱ༭ÎÞ·¨»á¼ûËûÃǵÄÎļþ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄÎļþÖÐÈ·ÈÏÁ˴˴ι¥»÷£¬£¬£¬£¬£¬£¬ £¬²¢ÌåÏÖÕýÔÚÊÓ²ìÄÄЩÐÅÏ¢¿ÉÄÜÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¶à¼ÒLee Enterprises³öÊéÎïÔÚÍøÕ¾¶¥²¿ÏÔʾά»¤ºá·ù£¬£¬£¬£¬£¬£¬ £¬Ïò¶ÁÕßÖÂǸ²¢ÌåÏÖÕýÔÚÆð¾¢½â¾öÎÊÌâ¡£¡£¡£¡£¡£Lee EnterprisesÔÚ26¸öÖݳöÊé77·ÝÈÕ±¨ºÍ350·ÝÖÜ¿¯¼°×¨Òµ¿¯Î£¬£¬£¬£¬£¬ £¬ÓµÓÐÁè¼Ý120ÍòµÄÈÕ¿¯ÐÐÁ¿ºÍÁè¼Ý4400ÍòµÄÊý×Ö°æ×ÔÁ¦·Ã¿Í¡£¡£¡£¡£¡£ÎåÄêǰ£¬£¬£¬£¬£¬£¬ £¬¸Ã¼¯ÍÅÒ²ÔøÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ £¬ÆäʱÒÁÀʺڿÍÈëÇÖÁËÆäÍøÂç×÷ΪÈö²¥ÐéαÐÅÏ¢»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cyberattack-disrupts-lee-newspapers-operations-across-the-us/


5. Facebook³ÉÍøÂç´¹ÂÚÐÂÄ¿µÄ£¬£¬£¬£¬£¬£¬ £¬Êý°Ù¼ÒÆóÒµÓʼþµØµãÔâÐ®ÖÆ


2ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ £¬Check Point ResearchµÄ×îÐÂÑо¿ÏÔʾ£¬£¬£¬£¬£¬£¬ £¬È«ÇòÁìÏȵÄÉ罻ýÌåÆ½Ì¨Facebook³ÉΪÁËÐÂÒ»ÂÖÍøÂç´¹ÂڻµÄÄ¿µÄ£¬£¬£¬£¬£¬£¬ £¬¸Ã»î¶¯Ö¼ÔÚÇÔÈ¡Êý°Ù¼ÒÆóÒµµÄ12,000¶à¸öµç×ÓÓʼþµØµã¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯Ê¼ÓÚ2024Äê12ÔÂ20ÈÕ×óÓÒ£¬£¬£¬£¬£¬£¬ £¬Ö÷ÒªÕë¶ÔÅ·ÃË¡¢ÃÀ¹úºÍ°Ä´óÀûÑǵĹ«Ë¾£¬£¬£¬£¬£¬£¬ £¬µ«Ò²Ó°Ïìµ½ÁËÈ«ÇòÆäËûµØÇø¡£¡£¡£¡£¡£Õ©Æ­ÕßʹÓÃSalesforceµÄ×Ô¶¯ÓʼþЧÀÍ·¢ËÍÓÕÆ­ÐÔµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬ £¬ÓʼþÖдøÓÐð³äµÄFacebook»Õ±ê£¬£¬£¬£¬£¬£¬ £¬²¢Ö¸¿ØÊÕ¼þÈËÇÖÕ¼°æÈ¨¡£¡£¡£¡£¡£³ý·ÇÊÕ¼þÈËÔÚ¶Ìʱ¼äÄÚÌá³öÒìÒ飬£¬£¬£¬£¬£¬ £¬²»È»½«ÃæÁÙÕË»§ÏÞÖÆµÄÍþв¡£¡£¡£¡£¡£ÓʼþÖаüÀ¨ÐéαµÄFacebookÖ§³ÖÒ³ÃæÁ´½Ó£¬£¬£¬£¬£¬£¬ £¬ÓÕÆ­Êܺ¦ÕßÊäÈëµÇ¼ƾ֤£¬£¬£¬£¬£¬£¬ £¬´Ó¶øÌáÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£ÕâÖÖÓÕÆ­ÐÐΪÍþв×ÅÈ«ÇòÒÀÀµFacebookµÄÆóÒµ£¬£¬£¬£¬£¬£¬ £¬¿ÉÄܵ¼ÖÂÆäÖÎÀíÔ±ÕË»§±»¿ØÖÆ¡¢ÄÚÈݱ»¸ü¸Ä¡¢ÐÂÎű»Ê¹Óá¢Ìû×Ó±»É¾³ýºÍÇå¾²ÉèÖñ»Ð޸쬣¬£¬£¬£¬£¬ £¬½ø¶øÔì³É¿Í»§ÐÅÈζÈϽµ¡¢¿Í»§Á÷ʧºÍDZÔÚµÄÖ´·¨ËßËϵÈЧ¹û¡£¡£¡£¡£¡£¹ØÓÚÒ½ÁƱ£½¡ºÍ½ðÈÚµÈÊÜî¿ÏµÐÐÒµµÄÆóÒµÀ´Ëµ£¬£¬£¬£¬£¬£¬ £¬»¹¿ÉÄܵ¼Ö²»¶Ô¹æ¡¢·£¿£¿£¿£¿îºÍÖ´·¨ÌôÕ½¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬ £¬×é֯ӦʵÑéÃ÷È·µÄÊÂÎñÏìÓ¦ÍýÏ룬£¬£¬£¬£¬£¬ £¬ÒÔ½µµÍÊܵ½¹¥»÷µÄΣº¦¡£¡£¡£¡£¡£


https://hackread.com/scammers-use-fake-facebook-copyright-notices-to-hijack-accounts/


6. ¼ÍÄîÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ £¬12Íò»¼ÕßÐÅÏ¢Ôâй¶


2ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ £¬×ôÖÎÑÇÖݰ಼ÀïÆæµÄÒ»¼ÒСÐÍÐæÂäÒ½Ôº¼ÍÄîÒ½ÔººÍׯ԰ÔÚ2024Äê11ÔÂÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ £¬µ¼ÖÂÆäϵͳ̱»¾£¬£¬£¬£¬£¬£¬ £¬²»µÃ²»½ÓÄÉÖ½ÖÊÁ÷³Ì¼Í¼»¼ÕßÐÅÏ¢¡£¡£¡£¡£¡£Ö»¹ÜÔËӪδÖÐÖ¹£¬£¬£¬£¬£¬£¬ £¬µ«ÆÚ´ýʱ¼äÑÓÉì¡£¡£¡£¡£¡£¹¥»÷Õ߾ݳƴÓҽԺϵͳÖÐÇÔÈ¡ÁË1.15TBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬²¢ÔÚTorйÃÜÍøÕ¾ÉϹûÕæ£¬£¬£¬£¬£¬£¬ £¬ÆäÖаüÀ¨120,085È˵ÄСÎÒ˽¼ÒÐÅÏ¢ºÍ¿µ½¡ÐÅÏ¢£¬£¬£¬£¬£¬£¬ £¬ÈçÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢²¡Ê·¡¢ÖÎÁÆÐÅÏ¢ºÍ¿µ½¡°ü¹ÜÐÅÏ¢¡£¡£¡£¡£¡£EmbargoÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¼ÍÄîÒ½ÔºÒÑÏòÊÜÓ°ÏìСÎÒ˽¼Ò·¢ËÍÊéÃæÍ¨Öª£¬£¬£¬£¬£¬£¬ £¬²¢Ìṩ12¸öÔµÄÃâ·ÑÉí·Ý±£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚûÓÐÖ¤¾ÝÅúעСÎÒ˽¼ÒÐÅÏ¢±»ÀÄÓ㬣¬£¬£¬£¬£¬ £¬µ«ÓÉÓÚÊý¾Ý¿É¹ûÕæÏÂÔØ£¬£¬£¬£¬£¬£¬ £¬ÊÜÓ°ÏìÈËȺ¿ÉÄÜÃæÁÙÍøÂç´¹ÂÚºÍÆäËûÀàÐ͹¥»÷µÄΣº¦¡£¡£¡£¡£¡£


https://www.securityweek.com/information-of-120000-stolen-in-ransomware-attack-on-georgia-hospital/