CISAÖÒÑÔFortiOSÑÏÖØRCEÎó²îÕý±»Æð¾¢Ê¹ÓÃ
Ðû²¼Ê±¼ä 2024-10-111. CISAÖÒÑÔFortiOSÑÏÖØRCEÎó²îÕý±»Æð¾¢Ê¹ÓÃ
10ÔÂ9ÈÕ£¬£¬£¬CISA͸¶¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓÃÒ»¸öÑÏÖØµÄFortiOSÔ¶³Ì´úÂëÖ´ÐÐ(RCE)Îó²î£¨CVE-2024-23113£©¡£¡£¡£¡£¸ÃÎó²îÓÉfgfmdÊØ»¤Àú³Ì½ÓÊÜÍⲿ¿ØÖƵÄÃûÌÃ×Ö·û´®×÷Ϊ²ÎÊýÒýÆð£¬£¬£¬Ê¹µÃδ¾Éí·ÝÑéÖ¤µÄÍþвÐÐΪÕßÄܹ»ÔÚδÐÞ²¹µÄ×°±¸ÉÏÖ´ÐÐÏÂÁî»òí§Òâ´úÂ룬£¬£¬ÇÒÎÞÐèÓû§½»»¥¡£¡£¡£¡£´ËÎó²îÓ°ÏìFortiOS 7.0¼°ÒÔÉϰ汾¡¢FortiPAM 1.0¼°ÒÔÉϰ汾¡¢FortiProxy 7.0¼°ÒÔÉϰ汾ÒÔ¼°FortiWeb 7.4¡£¡£¡£¡£FortinetÒÑÓÚÖÙ´º·ÝÅû¶²¢ÐÞ²¹Á˸ÃÎó²î£¬£¬£¬²¢½¨Òéɾ³ýËùÓнӿڶÔfgfmdÊØ»¤³ÌÐòµÄ»á¼ûȨÏÞ×÷Ϊ»º½â²½·¥¡£¡£¡£¡£È»¶ø£¬£¬£¬CISAÒѽ«´ËÎó²îÌí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖУ¬£¬£¬ÒªÇóÃÀ¹úÁª°î»ú¹¹ÔÚ10ÔÂ30ÈÕ֮ǰ±£»£»£»£»£»¤ÆäÍøÂçÉϵÄFortiOS×°±¸ÃâÊÜÕâЩÕýÔÚ¾ÙÐеĹ¥»÷¡£¡£¡£¡£ÍøÂçÇå¾²»ú¹¹ÖÒÑԳƣ¬£¬£¬´ËÀàÎó²îÊǶñÒâÍøÂçÐÐΪÕ߯µÈÔ¹¥»÷µÄǰÑÔ£¬£¬£¬´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/
2. Ó¡¶ÈStar Health°ü¹Ü¹«Ë¾ÔâÍøÂç¹¥»÷£¬£¬£¬¿Í»§Êý¾ÝÒÉÔâй¶
10ÔÂ9ÈÕ£¬£¬£¬Ó¡¶È×î´óµÄ¿µ½¡°ü¹Ü¹«Ë¾Ö®Ò»Star Health and Allied Insurance֤ʵÔâÊÜÁ˶ñÒâÍøÂç¹¥»÷£¬£¬£¬µ¼ÖÂijЩÊý¾Ý±»Î´¾ÊÚȨºÍ²»·¨»á¼û£¬£¬£¬µ«¹«Ë¾ÔËӪδÊÜÓ°Ï죬£¬£¬Ð§ÀÍÈÔÔÚ¼ÌÐø¡£¡£¡£¡£Star HealthÌṩ¶àÖÖ°ü¹ÜЧÀÍ£¬£¬£¬ÓµÓÐÁè¼Ý1.7ÒÚÒ½Áưü¹Ü¿Í»§¡£¡£¡£¡£´Ëǰ£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÉù³ÆÔÚÍøÉÏÐû²¼Á˿ͻ§µÄ¿µ½¡¼Í¼ºÍÆäËûÃô¸ÐÊý¾Ý£¬£¬£¬ºÚ¿Í×éÖ¯ÔÚTelegramÉϽ¨ÉèÁË̸Ìì»úеÈË£¬£¬£¬Ð¹Â¶ÁË3100ÍòͶ±£È˺ÍÁè¼Ý580Íò·Ý°ü¹ÜË÷ÅâµÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£Star HealthÒÑÌáÆðËßËÏ¿ØËßTelegramºÍCloudflare£¬£¬£¬²¢Ö¸³öÆäÊ×ϯÐÅÏ¢Çå¾²¹ÙÒ»Ö±ÔÚÆð¾¢ÅäºÏÊӲ죬£¬£¬Î´·¢Ã÷ÆäÓÐÈκβ»µ±ÐÐΪ¡£¡£¡£¡£´Ë´ÎÈëÇÖµÄϸ½ÚºÍºÚ¿ÍÔõÑù»ñÈ¡Êý¾ÝÈÔ²»ÇåÎú£¬£¬£¬°ü¹Ü¹«Ë¾Î´Í¸Â¶ÊÇ·ñ¿ÉÒÔÈ·ÈÏË»á¼ûÁËÊý¾ÝÒÔ¼°ÄÄЩÊý¾ÝÒѱ»»á¼û»òÇÔÈ¡¡£¡£¡£¡£
https://techcrunch.com/2024/10/09/indias-star-health-confirms-data-breach-after-cybercriminals-post-customers-health-data-online/
3. ³¯ÏÊÍþвÕßÕë¶Ô¿Æ¼¼ÇóÖ°ÕßÍÆ¹ã¶ñÒâÈí¼þ
10ÔÂ9ÈÕ£¬£¬£¬Ó볯ÏÊÓÐÁªÏµµÄÍþвÐÐΪÕß½«Ä¿µÄËø¶¨ÔڿƼ¼ÐÐÒµµÄÇóÖ°ÕßÉíÉÏ£¬£¬£¬Í¨¹ýÇóְƽ̨ÁªÏµÈí¼þ¿ª·¢Ö°Ô±£¬£¬£¬Ã°³äDZÔÚ¹ÍÖ÷Ô¼ÇëËûÃǼÓÈëÔÚÏßÃæÊÔ£¬£¬£¬²¢ÊÔͼ˵·þËûÃÇÏÂÔØ²¢×°ÖöñÒâÈí¼þ£¬£¬£¬ÕâÊÇÃûΪ¡°Ñ¬È¾ÐÔ·Ã̸¡±µÄ»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£¸Ã»î¶¯¼¯Èº±»×·×ÙΪCL-STA-0240£¬£¬£¬Éæ¼°ÒÑÖª¶ñÒâÈí¼þ¼Ò×åBeaverTailºÍInvisibleFerretµÄ¸üа汾¡£¡£¡£¡£µÚÒ»½×¶ÎÑ¬È¾Éæ¼°BeaverTailÏÂÔØ³ÌÐòºÍÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬¸Ã³ÌÐòרΪWindowsºÍApple macOSƽ̨Éè¼Æ£¬£¬£¬³äµ±»ùÓÚPythonµÄInvisibleFerretºóÃŵĹܵÀ¡£¡£¡£¡£Ö»¹Ü¸Ã»î¶¯Òѱ»¹ûÕæÅû¶£¬£¬£¬µ«ÈÔÓÐÖ¤¾ÝÅú×¢ËüÈÔÈ»»îÔ¾¡£¡£¡£¡£Çå¾²Ñо¿Ô±ºÍÍøÂçÇå¾²¹«Ë¾ÏêϸÐÎòÁËʹÓüÙÊÓÆµ¾Û»áÓ¦ÓóÌÐòMiroTalkºÍFreeConference.comÉøÍ¸µ½¿ª·¢Ö°Ô±ÏµÍ³ÖеĹ¥»÷Á´¡£¡£¡£¡£BeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡ä¯ÀÀÆ÷ÃÜÂë¡¢´Ó¶à¸ö¼ÓÃÜÇ®±ÒÇ®°üÖÐÍøÂçÊý¾Ý£¬£¬£¬²¢ÏÂÔØ²¢Ö´ÐÐInvisibleFerretºóÃÅ£¬£¬£¬¸ÃºóÃŰüÀ¨Ö¸ÎÆÊ¶±ð¡¢Ô¶³Ì¿ØÖÆ¡¢¼üÅ̼ͼ¡¢Êý¾Ýй¶µÈ¹¦Ð§¡£¡£¡£¡£Unit 42ÌåÏÖ£¬£¬£¬Õâ´Î»î¶¯¿ÉÄܳöÓÚ¾¼ÃÄîÍ·£¬£¬£¬ÓÉÓÚBeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡13¸ö²î±ðµÄ¼ÓÃÜÇ®±ÒÇ®°ü£¬£¬£¬³¯ÏÊÍþвÕß»á¾ÙÐнðÈÚ·¸·¨ÒԳO×ʽðÀ´Ö§³Ö³¯ÏÊÕþȨ¡£¡£¡£¡£
https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html
4. ºÚ¿ÍÉù³Æ¹¥»÷Dr.WebÇÔÈ¡10TBÊý¾Ý£¬£¬£¬Òý·¢ÍøÂçÇå¾²ÐÐÒµµ£ÐÄ
10ÔÂ9ÈÕ£¬£¬£¬¾ÝCyber Security News±¨µÀ£¬£¬£¬Ò»ÃûºÚ¿ÍÔÚºÚ¿ÍÂÛ̳DumpForumsÉÏÉù³Æ¶Ô¶íÂÞË¹ÖøÃûÍøÂçÇå¾²¹«Ë¾Dr.Web¾ÙÐÐÁ˹¥»÷£¬£¬£¬²¢ÇÔÈ¡Á˸ߴï10TBµÄÊý¾Ý¡£¡£¡£¡£ºÚ¿ÍÉù³Æ´Ë´Î¹¥»÷¾ÓÉÈ«ÐIJ߻®£¬£¬£¬ÀúʱÊýÌ죬£¬£¬ÀÖ³ÉÉøÍ¸µ½Dr.WebµÄÍâµØÍøÂ磬£¬£¬²¢Öð²½ÈëÇÖÆäЧÀÍÆ÷ºÍ×ÊÔ´£¬£¬£¬ÉõÖÁÉøÍ¸µ½ÁËÆä×îÇå¾²µÄ»ù´¡ÉèÊ©²¿·Ö¡£¡£¡£¡£ºÚ¿Í»¹Éù³Æ´ÓGitLabЧÀÍÆ÷¡¢¹«Ë¾ÓʼþЧÀÍÆ÷¡¢Confluence¡¢Redmine¡¢Jenkins¡¢Mantisϵͳ¡¢RocketChatͨѶƽ̨µÈ¶à¸öÒªº¦ÏµÍ³ÖÐÆÆ½â²¢Ð¹Â¶ÁËÊý¾Ý£¬£¬£¬²¢ÔÚÒ»¸öÔÂÄÚδ±»·¢Ã÷µÄÇéÐÎÏ»á¼û²¢ÉÏ´«Á˿ͻ§¶ËÊý¾Ý¿â£¬£¬£¬¿ÉÄÜ̻¶ÁËDr.WebÓû§µÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£È»¶ø£¬£¬£¬Dr.Web¹Ù·½ÉùÃ÷³Æ£¬£¬£¬Ö»¹ÜÆäϵͳ×ÊÔ´ÔâÊÜÁËÓÐÕë¶ÔÐԵĹ¥»÷£¬£¬£¬µ«ÒÑÀֳɴì°ÜÁËÆÆËðÆä»ù´¡ÉèÊ©µÄÍýÏ룬£¬£¬Óû§¶Ë²úƷδÊÜÓ°Ïì¡£¡£¡£¡£ÎªÔ¤·ÀÆð¼û£¬£¬£¬Dr.WebÒѶϿªËùÓÐ×ÊÔ´ÓëÍøÂçµÄÅþÁ¬¾ÙÐÐÑéÖ¤£¬£¬£¬²¢ÔÝÍ£Á˲¡¶¾¿âµÄÐû²¼¡£¡£¡£¡£Èô´Ëй¶ÐÐΪ»ñµÃ֤ʵ£¬£¬£¬½«¶ÔDr.WebÒÔÖÂÕû¸öÍøÂçÇå¾²ÐÐÒµÔì³ÉÖØ´ó¹¥»÷£¬£¬£¬²¢Òý·¢Óû§¶ÔÄ¿½ñ±£»£»£»£»£»¤²½·¥ÓÐÓÃÐÔµÄÖÊÒÉ¡£¡£¡£¡£
https://cybersecuritynews.com/dumpforums-10tb-data-dr-web/
5. AkiraºÍFogÀÕË÷Èí¼þʹÓÃÒªº¦µÄVeeam RCEÎó²î
10ÔÂ10ÈÕ£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïʹÓÃVeeam Backup & Replication (VBR) ЧÀÍÆ÷ÉϵÄÒ»¸öÑÏÖØÇå¾²Îó²î£¨CVE-2024-40711£©£¬£¬£¬ÊµÏÖÁËÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£¡£¸ÃÎó²îÓÉCode WhiteÇå¾²Ñо¿Ô±Florian Hauser·¢Ã÷£¬£¬£¬Ô´ÓÚ²»ÊÜÐÅÈÎÊý¾Ý·´ÐòÁл¯µÄÈõµã£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒԽϵÍÖØÆ¯ºó·¢¶¯¹¥»÷¡£¡£¡£¡£VeeamÔÚ9ÔÂ4ÈÕÅû¶Á˸ÃÎó²î²¢Ðû²¼ÁËÇå¾²¸üУ¬£¬£¬¶øwatchTowr LabsÔòÔÚ9ÔÂ9ÈÕÐû²¼ÊÖÒÕÆÊÎö£¬£¬£¬µ«ÑÓ³ÙÖÁ9ÔÂ15ÈղŹûÕæ¿´·¨ÑéÖ¤Îó²î´úÂ룬£¬£¬ÒÔÈ·±£ÖÎÀíÔ±ÓÐ×㹻ʱ¼äÔöÇ¿·À»¤¡£¡£¡£¡£ÓÉÓÚVBRÈí¼þÆÕ±éÓÃÓÚÊý¾Ý±£»£»£»£»£»¤ºÍÔÖÄѻָ´£¬£¬£¬³ÉΪ¶ñÒâÐÐΪÕßêéêìµÄÄ¿µÄ¡£¡£¡£¡£Sophos X-OpsÊÂÎñÏìÓ¦Ö°Ô±·¢Ã÷£¬£¬£¬¸ÃÎó²îѸËÙ±»AkiraºÍFogÀÕË÷Èí¼þ¹¥»÷ʹÓ㬣¬£¬Á¬ÏµÖ®Ç°Ð¹Â¶µÄƾ֤£¬£¬£¬½«¡°µã¡±ÍâµØÕÊ»§Ìí¼Óµ½ÖÎÀíÔ±ºÍÔ¶³Ì×ÀÃæÓû§×é¡£¡£¡£¡£¹¥»÷Õßͨ³£Í¨¹ýδÆôÓöàÒòËØÉí·ÝÑéÖ¤µÄÊÜѬȾVPNÍø¹Ø»á¼ûÄ¿µÄ£¬£¬£¬²¿·ÖVPNÔËÐв»ÊÜÖ§³ÖµÄÈí¼þ°æ±¾¡£¡£¡£¡£ÔÚFogÀÕË÷Èí¼þÊÂÎñÖУ¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃδ±£»£»£»£»£»¤µÄHyper-VЧÀÍÆ÷ºÍÊÊÓóÌÐòrcloneÇÔÈ¡Êý¾Ý¡£¡£¡£¡£ÕâЩ¹¥»÷ÏÔʾ³ö¸ß¶ÈµÄÖØµþÐÔºÍÏàËÆÐÔ£¬£¬£¬Åú×¢ÀÕË÷Èí¼þÍÅ»ïÕýÆð¾¢Ê¹ÓÃÕâÒ»Îó²î¾ÙÐй¥»÷¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/akira-and-fog-ransomware-now-exploiting-critical-veeam-rce-flaw/
6. ¸»´ïͶ×ÊϵͳÔâÈëÇÖ£¬£¬£¬77,000Ãû¿Í»§ÐÅϢй¶
10ÔÂ10ÈÕ£¬£¬£¬×ܲ¿Î»ÓÚ²¨Ê¿¶ÙµÄ¿ç¹ú½ðÈÚЧÀ͹«Ë¾¸»´ïͶ×Ê£¬£¬£¬½üÆÚÔâÓöÁËÒ»´ÎϵͳÈëÇÖÊÂÎñ£¬£¬£¬µ¼ÖÂÁè¼Ý77,000Ãû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶¡£¡£¡£¡£×÷ΪȫÇò×î´óµÄ×ʲúÖÎÀí¹«Ë¾Ö®Ò»£¬£¬£¬¸»´ïÖÎÀíµÄ×ʲú×ܶî¸ß´ï14.1ÍòÒÚÃÀÔª¡£¡£¡£¡£¾Ý¸»´ï͸¶£¬£¬£¬Õâ´ÎÈëÇÖ±¬·¢ÔÚ8ÔÂ17ÈÕÖÁ19ÈÕʱ´ú£¬£¬£¬Ò»ÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßʹÓÃ×î½ü½¨ÉèµÄÁ½¸ö¿Í»§ÕË»§ÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£¡£¸»´ïÔÚ·¢Ã÷ÕâÒ»»î¶¯ºóѸËÙ½ÓÄɲ½·¥ÖÕÖ¹ÁË»á¼û£¬£¬£¬²¢ÔÚÍⲿÇ徲ר¼ÒµÄÐÖúÏÂÕö¿ªÁËÊӲ졣¡£¡£¡£Ö»¹Ü¸»´ïûÓÐ͸¶³ýÁËÐÕÃûºÍÆäËûСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ÍâÉÐÓÐÄÄЩÐÅÏ¢±»ÇÔÈ¡£¬£¬£¬µ«ËüÒÑÏòÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËÁ½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¸»´ï»¹ÌåÏÖ£¬£¬£¬Ã»ÓÐÖ¤¾ÝÅú×¢±»µÁµÄ¿Í»§Êý¾Ý±»ÀÄÓ㬣¬£¬µ«ÈÔ½¨ÒéÊÜÓ°ÏìµÄ¿Í»§¼á³ÖСÐÄ£¬£¬£¬°´ÆÚ¼ì²éÕË»§±¨±í£¬£¬£¬¼à¿ØÐÅÓñ¨¸æ£¬£¬£¬²¢ÊµÊ±±¨¸æÈκοÉÒɻ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fidelity-investments-says-data-breach-affects-over-77-000-people/