SonicWall SSLVPN É豸ÑÏÖØÂ©¶´ÆØ¹â£º³¬25,000̨É豸Ò×Êܹ¥»÷
Ðû²¼Ê±¼ä 2024-12-191. SonicWall SSLVPN É豸ÑÏÖØÂ©¶´ÆØ¹â£º³¬25,000̨É豸Ò×Êܹ¥»÷
12ÔÂ17ÈÕ£¬ÍøÂçÄþ¾²¹«Ë¾Bishop FoxµÄ·ÖÎö½Òʾ£¬Áè¼Ý25,000̨¿É¹ûÈ»·ÃÎʵÄSonicWall SSLVPNÉ豸´æÔÚÖØ´óÄþ¾²Òþ»¼£¬ÆäÖÐ20,000̨É豸ÔËÐÐ׏©Ó¦É̲»ÔÙÖ§³ÖµÄSonicOS/OSX¹Ì¼þ°æ±¾¡£ÕâЩÉ豸ÈÝÒ×ÔâÊÜÀÕË÷Èí¼þ×éÖ¯ÈçFogºÍAkiraµÄ¹¥»÷£¬³ÉΪÆäÈëÇÖ¹«Ë¾ÍøÂçµÄÈë¿Ú¡£Í¨¹ýɨÃ蹤¾ß£¬Bishop Fox·¢ÏÖÁË430,363¸ö¹ûȻ̻¶µÄSonicWall·À»ðǽ£¬¹ÜÀí»òSSL VPN½Ó¿Ú¿É´Ó»¥ÁªÍø·ÃÎÊ£¬Îª¹¥»÷ÕßÌṩÁË̽²â©¶´¡¢¹ýʱ¹Ì¼þ¡¢´íÎóÅäÖÃºÍÆÆ½âÈõÃÜÂëµÄ»ú»á¡£ÆäÖУ¬6,633̨É豸Òѵ½´ïʹÓÃÊÙÃü£¬ÁíÓÐ14,077̨ʹÓÃSeries 6µÄ²»ÔÙÊÜÖ§³Ö°æ±¾£¬¹²20,710̨Ò×ÊܹûȻ©¶´¹¥»÷¡£´ËÍ⣬»¹ÓдóÁ¿É豸ÔËÐÐ×Åδ֪°æ±¾»ò²»ÊÜÖ§³ÖµÄ¹Ì¼þ¡£ËäÈ»Ïà±È2024Äê1Ô£¬Ò×Êܹ¥»÷µÄ¶ËµãÊýÁ¿ÓÐËùϽµ£¬µ«²¹¶¡½ÓÄÉËÙ¶ÈÈÔÈ»»ºÂý£¬ÏÔʾ³öÍøÂçÄþ¾²ÐÎÊÆÒÀÈ»ÑϾþ¡£
https://www.bleepingcomputer.com/news/security/over-25-000-sonicwall-vpn-firewalls-exposed-to-critical-flaws/
2. ÄÉÃ×±ÈÑǵçÐÅÔâÀÕË÷Èí¼þ¹¥»÷£¬Ãô¸ÐÊý¾Ýй¶
12ÔÂ17ÈÕ£¬ÄÉÃ×±ÈÑǹúÓеçÐŹ«Ë¾½üÆÚÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬µ¼Ö½ü50ÍòÌõÃô¸Ð¿Í»§Êý¾Ý±»Ð¹Â¶£¬ÆäÖаüÂ޸߼¶Õþ¸®¹ÙÔ±µÄÐÅÏ¢¡£ÔھܾøÓëºÚ¿Í×éÖ¯¡°ÁÔÈ˹ú¼Ê¡±ºÏ×÷ºó£¬ºÚ¿Í½«ÕâЩÊý¾ÝÐû²¼µ½Á˰µÍøÉÏ¡£ÄÉÃ×±ÈÑǵçÐŹ«Ë¾ÕýÔÚÊÓ²ì´Ë´Î´ó¹æÄ£ÏµÍ³ÈëÇÖµÄÔÒò£¬²¢ÕýÓëÄþ¾²¹ÙÔ±ºÏ×÷£¬ÒÔ¼õÉÙ½øÒ»²½µÄÐÅϢй¶²¢×·²¶×ï·¸¡£¼´½«Ð¶ÈεÄ×ÜͳÄϸêÂ塤ķ±¾°Í¶Ô´Ë´ÎÍøÂç¹¥»÷ÌåÏÖÇ´Ô𣬲¢ºôÓõÒÔÓ¦ÓеĽôÆÈÐÔ´¦ÖôËÊ£¬Ö¸³öÍøÂçÄþ¾²Êǹú¼ÒÄþ¾²ÎÊÌâ¡£¾ÝÄÉÃ×±ÈÑǵçÐŹ«Ë¾Ê×ϯִÐйÙ˹̹Àû¡¤É³ÄÉÆ½´ïÌåÏÖ£¬¹«Ë¾²»»áÓëºÚ¿Í¾ÍÊê½ð½øÐÐ̸ÅУ¬ÒòΪÊê½ðÊý¶î¹ý¸ßÇÒÖ§¸¶Êê½ðÒ²²»Äܱ£Ö¤ÐÅÏ¢²»±»Ð¹Â¶¡£´Ë´Î¹¥»÷ÖУ¬ºÚ¿ÍÇÔÈ¡Á˰üÂÞ¸öÈËÉí·ÝÐÅÏ¢¡¢µØÖ·ºÍÒøÐÐÐÅÏ¢µÈÔÚÄÚµÄÃô¸Ð¿Í»§¼Ç¼£¬²¢ÔÚÉ罻ýÌåÉÏ·ÖÏí¡£ÄÉÃ×±ÈÑǵçÐŹ«Ë¾¾¯¸æÈËÃDz»Òª·ÖÏíÈκÎй¶µÄÐÅÏ¢£¬²¢¶Ø´Ù¿Í»§¸ü¸ÄÃÜÂë£¬ÖÆÖ¹ÔÚ¿ÉÒÉÇé¿öϽøÐÐתÕË¡£
https://www.capitalfm.co.ke/news/2024/12/sensitive-data-leaked-after-namibia-ransomware-hack/
3. ÍøÂçµöÓãÕ©ÆÐÂÊֶΣºÀÄÓÃGoogleÈÕÀúºÍ»æÍ¼Ò³ÃæÇÔȡƾ֤
12ÔÂ18ÈÕ£¬½üÆÚÍøÂçµöÓãթƻƵ·±£¬·Ç·¨·Ö×ÓÀûÓÃGoogleÈÕÀúÑûÇëºÍGoogle»æÍ¼Ò³Ãæ×÷Ϊ¹¤¾ß£¬ÆóͼÇÔÈ¡Óû§Æ¾Ö¤£¬²¢ÀÖ³ÉÈÆ¹ýÁËÀ¬»øÓʼþ¹ýÂËÆ÷¡£¾ÝÍøÂçÄþ¾²¼à¿Ø»ú¹¹Check Point³ÂËߣ¬¶Ì¶ÌËÄÖÜÄÚ£¬ÒÑÓÐ300¸öÆ·ÅÆÔâÊܹ¥»÷£¬Áè¼Ý4,000·âµöÓãÓʼþ±»·¢ËÍ¡£ÕâЩÓʼþµÄÄ¿±ê¹ã·º£¬°üÂÞ½ÌÓý»ú¹¹¡¢Ò½ÁÆ»ú¹¹¡¢½¨Öþ¹«Ë¾ºÍÒøÐеȡ£¹¥»÷ÊÖ·¨Ö÷ÒªÊÇͨ¹ýGoogleÈÕÀú·¢ËÍ¿´ËÆÎÞº¦µÄ»áÒéÑûÇ룬ÑûÇëÖÐǶÈëÖ¸ÏòGoogle Forms»òGoogle DrawingµÄÁ´½Ó£¬ÓÕµ¼Óû§µã»÷αװ³ÉreCaptcha»òÖ§³Ö°´Å¥µÄÁíÒ»¸öÁ´½Ó¡£ÓÉÓÚÕâЩÑûÇëÀ´×ԺϷ¨µÄGoogle·þÎñ£¬Òò´ËÄܹ»ÈƹýÀ¬»øÓʼþ¹ýÂËÆ÷¡£Check PointÖ¸³ö£¬¹¥»÷ÕßÀûÓÃÁËGoogleÈÕÀú·þÎñ£¬Ê¹µÃÓʼþ±êÌâ¿´ÆðÀ´ÍêÈ«ºÏ·¨£¬ÓëÕý³£GoogleÈÕÀúÑûÇëÎÞÒ죬²¢Í¨¹ýÁËDKIM¡¢SPFºÍDMARCµÈµç×ÓÓʼþÄþ¾²¼ì²é¡£´ËÍ⣬¹¥»÷Õß»¹»áÈ¡ÏûGoogleÈÕÀú»î¶¯²¢¸½¼ÓÏûÏ¢£¬ÒÔÔö¼ÓµöÓãÓʼþµÄ·¢ËÍÁ¿¡£¾¡¹ÜGoogleÔøÍÆ³ö±£»¤´ëÊ©£¬µ«ÈôGoogle Workspace¹ÜÀíԱδÆôÓã¬ÈÕÀúÖÐÈÔ»á×Ô¶¯Ìí¼Ó´ËÀàÑûÇë¡£
https://www.bleepingcomputer.com/news/security/ongoing-phishing-attack-abuses-google-calendar-to-bypass-spam-filters/
4. APT29ºÚ¿Í×éÖ¯ÀûÓÃ193¸öRDPÊðÀí·þÎñÆ÷Ö´ÐÐMiTM¹¥»÷
12ÔÂ18ÈÕ£¬¶íÂÞ˹ºÚ¿Í×éÖ¯APT29£¨Óֳơ°ÎçÒ¹±©Ñ©¡±£©ÕýÀûÓÃÓÉ193¸öÔ¶³Ì×ÀÃæÐÒ飨RDP£©ÊðÀí·þÎñÆ÷×é³ÉµÄÍøÂçÖ´ÐÐÖмäÈË£¨MiTM£©¹¥»÷£¬Ö¼ÔÚÇÔÈ¡Êý¾Ý¡¢Æ¾¾Ý²¢°²×°¶ñÒâ¸ºÔØ¡£¸Ã×é֯ʹÓÃPyRDPºì¶ÓÊðÀí¹¤¾ß£¬Í¨¹ýRDPÐÒéɨÃèÊܺ¦ÕßÎļþϵͳ¡¢ÇÔÈ¡Êý¾Ý²¢ÔÚÔ¶³ÌÖ´ÐжñÒⷨʽ¡£¾ÝÇ÷ÊÆ¿Æ¼¼£¨Trend Micro£©³ÂËߣ¬APT29µÄÄ¿±ê°üÂÞÕþ¸®¡¢¾üÊ¡¢Íâ½»¡¢IT¡¢ÔÆ·þÎñ¡¢µçÐż°ÍøÂçÄþ¾²¹«Ë¾µÈ£¬ÌرðÕë¶ÔÃÀ¹ú¡¢·¨¹ú¡¢°Ä´óÀûÑǵȶà¸ö¹ú¼ÒµÄʵÌå¡£2024Äê10Ô£¬ÑÇÂíÑ·ºÍCERT-UAÐû²¼µÄ³ÂËßÏÔʾ£¬APT29ÓÕÆÊܺ¦Õßͨ¹ýÍøÂçµöÓãÓʼþÁ¬½Óµ½¶ñÒâRDP·þÎñÆ÷£¬¹²Ïíµ±µØ×ÊÔ´£¬´Ó¶øÎÞÌõ¼þ·ÃÎÊÃô¸ÐÐÅÏ¢¡£Ç÷ÊÆ¿Æ¼¼µÄ×îÐÂÑо¿½ÒʾÁË193¸öRDPÊðÀí·þÎñÆ÷½«Á¬½ÓÖØ¶¨ÏòÖÁ34¸öºó¶Ë·þÎñÆ÷£¬Ê¹¹¥»÷ÕßÄܼàÊÓºÍÀ¹½ØRDP»á»°¡£ºÚ¿ÍÀûÓÃPyRDP¹¤¾ßÀ¹½ØÊܺ¦ÕßÓëÔ¶³Ì»á»°¼äµÄͨÐÅ£¬¼Ç¼ƾ¾Ý¡¢ÇÔÈ¡Êý¾Ý²¢ÔÚÐÂÁ¬½ÓÉÏÔËÐжñÒâÃüÁî¡£´ËÍ⣬APT29»¹½ÓÄÉÉÌÒµVPN¡¢TOR³ö¿Ú½ÚµãºÍסլÊðÀí·þÎñÑڸǶñÒâ·þÎñÆ÷IPµØÖ·¡£Îª·À·¶´ËÀ๥»÷£¬Óû§Ó¦½öÓëÒÑÖª¡¢ÊÜÐÅÈεķþÎñÆ÷½¨Á¢RDPÁ¬½Ó£¬²¢¾¯ÌèÀ´×Ôδ֪À´Ô´µÄRDPÁ¬½ÓÇëÇó¡£
https://www.bleepingcomputer.com/news/security/russian-hackers-use-rdp-proxies-to-steal-data-in-mitm-attacks/
5. ÍøÂçµöÓã»î¶¯ÀÄÓÃHubSpotÇÔÈ¡20,000 AzureÕÊ»§Æ¾¾Ý
12ÔÂ18ÈÕ£¬Õë¶ÔµÂ¹úºÍÓ¢¹úµÄÆû³µ¡¢»¯Ñ§¼°¹¤ÒµÖÆÔ칫˾£¬Ò»³¡ÍøÂçµöÓã»î¶¯ÕýÔÚÀûÓÃHubSpotƽ̨ÇÔÈ¡Microsoft AzureÕÊ»§Æ¾¾Ý¡£¾ÝPalo Alto NetworksµÄUnit 42Ñо¿ÍŶӳÂËߣ¬¸Ã»î¶¯×Ô2024Äê6ÔÂÆðÖÁÉÙÁ¬ÐøÖÁ9Ô£¬ÒÑΣ¼°Ô¼20,000¸öÕË»§¡£ÍþвÐÐΪÕßͨ¹ýHubSpot Free Form Builder´´½¨ÆÛÆÐÔ±í¸ñ£¬²¢ÀûÓÃÄ£·ÂDocuSignµÄPDF½«Êܺ¦ÕßÖØ¶¨ÏòÖÁƾ֤ÊÕ¼¯Ò³Ãæ¡£ÕâÐ©Ò³ÃæÎ»ÓÚ¹¥»÷Õß¿ØÖƵġ°.buzz¡±ÓòÃûÍøÕ¾ÉÏ£¬Ä£·ÂMicrosoft Outlook Web AppºÍAzureµÇ¼½çÃæ¡£¾¡¹ÜHubSpot»ù´¡ÉèʩδÊܹ¥»÷£¬µ«Æä±»ÓÃ×÷Öм䲽ÖèÒýµ¼Êܺ¦Õß¡£ÓÉÓÚÓʼþ°üÂ޺Ϸ¨·þÎñÁ´½Ó£¬ËüÃdz£ÄܱܿªÄþ¾²¹¤¾ß¼ì²â½øÈëÊÕ¼þÏ䡣Ȼ¶ø£¬Ïà¹ØÓʼþδͨ¹ýSPF¡¢DKIMºÍDMARC¼ì²é¡£ÔÚÀÖ³ÉÈëÇÖºó£¬ÍþвÐÐΪÕßʹÓÃVPNαװµØÀíλÖ㬲¢ÓëIT²¿ÃÅÕù¶áÕË»§¿ØÖÆÈ¨¡£Unit 42»¹·¢ÏÖÁ˸ûÖÐʹÓõÄÐÂÐÍ×ÔÖÎϵͳ±àºÅºÍÓû§ÊðÀí×Ö·û´®£¬¿ÉÓÃÓÚÍþвʶ±ð¡£¾¡¹Ü¶àÊý·þÎñÆ÷ÒÑÏÂÏߣ¬µ«¸Ã»î¶¯ÔٴαíÃ÷ÍþвÐÐΪÕßÕý²»Í£Ì½Ë÷ÈÆ¹ýÄþ¾²µÄÐÂÒªÁì¡£
https://www.bleepingcomputer.com/news/security/hubspot-phishing-targets-20-000-microsoft-azure-accounts/
6. ÄÚ²¼À˹¼ÓÖÝRegional CareÒ½ÁƱ£ÏÕ¹«Ë¾Êý¾Ýй¶
12ÔÂ18ÈÕ£¬ÄÚ²¼À˹¼ÓÖÝÒ½ÁƱ£ÏÕ¹«Ë¾Regional Care½üÆÚÅû¶ÁËÒ»ÆðÊý¾Ýй¶Ê¼þ£¬¸ÃʼþÓ°ÏìÁËÁè¼Ý225,000ÈË¡£2024Äê9ÔÂÖÐÑ®£¬Regional Care·¢ÏÖÆäÍøÂçÖеÄÒ»¸öÕË»§·ºÆðÒì³£»î¶¯£¬²¢Á¢¼´¹Ø±ÕÁ˸ÃÕË»§¡£¾¹ýÍøÂçÄþ¾²×¨¼ÒµÄÊӲ죬ȷÈÏ¡°Î´¾ÊÚȨµÄÒ»·½¡±¿ÉÄÜ´ÓÆäϵͳÖлñÈ¡ÁËһЩÎļþ¡£11ÔÂ8ÈÕ£¬¸Ã¹«Ë¾È·¶¨²¿ÃÅÊÜËðÎļþ°üÂÞÃô¸Ð¸öÈËÐÅÏ¢£¬ÈçÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÄþ¾²ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍ½¡¿µ±£ÏÕÐÅÏ¢µÈ¡£Õë¶ÔÉç»á±£ÕϺÅÂ뱻й¶µÄ¸öÈË£¬Regional CareÌṩÁËÃâ·ÑµÄÐÅÓÃ¼à¿Ø·þÎñ¡£¸ÃʼþÒѱ»Í¨±¨¸øÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒ¡£½ØÖÁĿǰ£¬¸Ã±£ÏÕ¹«Ë¾ÉÐδ·ÖÏí¸ü¶à¹ØÓÚ´Ë´ÎÈëÇÖµÄÐÅÏ¢£¬ÇÒSecurityWeekҲδ·¢ÏÖÈκÎÒÑÖªµÄÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦¡£
https://www.securityweek.com/regional-care-data-breach-impacts-225000-people/