NachoVPNÎó²î£º¶ñÒâVPNЧÀÍÆ÷ʹÓÃδÐÞ²¹¿Í»§¶ËʵÑé¹¥»÷

Ðû²¼Ê±¼ä 2024-11-27
1. NachoVPNÎó²î£º¶ñÒâVPNЧÀÍÆ÷ʹÓÃδÐÞ²¹¿Í»§¶ËʵÑé¹¥»÷


11ÔÂ26ÈÕ £¬£¬£¬Ò»×éÃûΪ¡°NachoVPN¡±µÄÎó²îÔÊÐí¶ñÒâVPNЧÀÍÆ÷ʹÓÃδÐÞ²¹µÄPalo AltoºÍSonicWall SSL-VPN¿Í»§¶Ë¾ÙÐй¥»÷ £¬£¬£¬Í¨¹ýÓÕÆ­Óû§ÅþÁ¬ÖÁ¹¥»÷Õß¿ØÖƵÄVPNЧÀÍÆ÷ £¬£¬£¬½ø¶øÇÔÈ¡µÇ¼ƾ֤¡¢Ö´ÐÐí§Òâ´úÂë¡¢×°ÖöñÒâÈí¼þ»òÌᳫ´úÂëÊðÃûαÔì¼°ÖÐÐÄÈ˹¥»÷ ¡£¡£¡£¡£AmberWolfÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÕâÒ»Íþв £¬£¬£¬²¢ÔÚÎó²îÊ״α¨¸æºóÊýÔÂÄÚ £¬£¬£¬¼ûÖ¤ÁËSonicWallºÍPalo Alto NetworksÏà¼ÌÐû²¼Õë¶ÔCVE-2024-29014ºÍCVE-2024-5921Îó²îµÄ²¹¶¡ ¡£¡£¡£¡£ÎªÁË·ÀÓù £¬£¬£¬SonicWall¿Í»§ÐèÉý¼¶ÖÁNetExtenderµÄÌØ¶¨°æ±¾ £¬£¬£¬¶øPalo Alto NetworksÔò½¨Òé×°Öøüа汾»òÔÚFIPS-CCģʽÏÂÔËÐÐVPN¿Í»§¶Ë ¡£¡£¡£¡£±ðµÄ £¬£¬£¬AmberWolf»¹Ðû²¼ÁËNachoVPN¿ªÔ´¹¤¾ß £¬£¬£¬¸Ã¹¤¾ßÄÜÄ£Äâ¶ñÒâVPNЧÀÍÆ÷ £¬£¬£¬Ö§³Ö¶àÖÖÆóÒµVPN²úÆ· £¬£¬£¬²¢ÃãÀøÉçÇøÐ¢Ë³ÐÂÎó²îÐÅÏ¢ ¡£¡£¡£¡£Í¬Ê± £¬£¬£¬¸Ã¹«Ë¾»¹ÌṩÁËÓйØÕâÁ½¸öÎó²îµÄ¸ü¶àÊÖÒÕϸ½ÚºÍ·ÀÓù½¨Òé £¬£¬£¬ÒÔ×ÊÖúÍøÂç·ÀÓùÕß±£»£»£»£»¤ÆäϵͳÃâÊÜDZÔÚ¹¥»÷ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-nachovpn-attack-uses-rogue-vpn-servers-to-install-malicious-updates/


2. ¶íÂÞ˹ºÚ¿ÍRomComʹÓÃFirefoxºÍTorÁãÈÕÎó²îÌᳫ¹¥»÷


11ÔÂ27ÈÕ £¬£¬£¬½üÆÚ¶íÂÞ˹ºÚ¿Í×éÖ¯RomComʹÓÃÁËÁ½¸öÁãÈÕÎó²î £¬£¬£¬ÏòʹÓÃFirefox»òTorä¯ÀÀÆ÷µÄÓû§·¢ÉäÁ˶ñÒâ´úÂë ¡£¡£¡£¡£ÕâЩÎó²î»®·ÖÓ°ÏìÁËMozillaÈí¼þºÍWindowsϵͳ £¬£¬£¬ÆäÖÐÒ»¸öÎó²î£¨CVE-2024-9680£©Ê¹µÃ»á¼ûÊÜÑ¬È¾ÍøÕ¾µÄÈκÎÈ˶¼»áÎÞÒâʶµØÏÂÔØRomComºóÃÅ £¬£¬£¬¶øÎÞÐèÈκεã»÷ ¡£¡£¡£¡£ÐÒÔ˵ÄÊÇ £¬£¬£¬ÕâÁ½¸öÎó²î¶¼»ñµÃÁË¿ìËÙÐÞ¸´ £¬£¬£¬MozillaÔÚÊÕµ½Í¨Öªºó25СʱÄÚ¾ÍÐÞ²¹ÁËFirefoxÖеÄÎó²î £¬£¬£¬¶øWindowsÖеÄÎó²î£¨CVE-2024-49039£©Ò²ÔÚºóÐø»ñµÃÐÞ¸´ ¡£¡£¡£¡£RomComͨ¹ýÌØÖÆÍøÕ¾´¥·¢Îó²î £¬£¬£¬ÕâÐ©ÍøÕ¾Ä£ÄâÁËÕæÊµ×éÖ¯µÄÍøÕ¾ £¬£¬£¬°üÀ¨ConnectWise¡¢DevolutionsºÍCorrectivµÈ ¡£¡£¡£¡£ËäÈ»Torä¯ÀÀÆ÷Ò²»ùÓÚFirefox £¬£¬£¬µ«ESET×·×ÙµÄÊܺ¦ÕßÖÐûÓÐÒ»ÈËÊÇͨ¹ýTorÊܵ½¹¥»÷µÄ £¬£¬£¬¿ÉÄÜÊÇÓÉÓÚTorµÄijЩÉèÖÃÓëFirefox²î±ð ¡£¡£¡£¡£RomComµÄÖ÷ҪĿµÄËÆºõÊǹ«Ë¾ £¬£¬£¬¾ø´ó´ó¶¼Êܺ¦ÕßλÓÚ±±ÃÀºÍÅ·ÖÞ £¬£¬£¬µ«ÐÂÎ÷À¼ºÍ·¨Êô¹çÑÇÄÇÒ²ÓÐÁãÐÇÊܺ¦Õß ¡£¡£¡£¡£


https://www.darkreading.com/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor


3. RansomHub×éÖ¯Éù³Æ¶ÔÁ½ÊÐÕþ¸®·¢¶¯ÀÕË÷¹¥»÷


11ÔÂ27ÈÕ £¬£¬£¬ÍøÂç·¸·¨×éÖ¯RansomHubÉù³Æ¶ÔµÂ¿ËÈøË¹ÖÝ¿ÆÅå¶ûÊм°Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»á·¢¶¯ÁËÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬Òý·¢ÆÕ±é¹Ø×¢ ¡£¡£¡£¡£¿£¿£¿£¿£¿£¿ÆÅå¶ûÊÐÔâÊܹ¥»÷ºó £¬£¬£¬»¥ÁªÍø¡¢Í¼Êé¹ÝЧÀÍ¡¢ÔÊÐíºÍ¼ì²éƽ̨¼°Êз¨ÔºµÈ¶à¸öϵͳ̱»¾ £¬£¬£¬¸øÍâµØ×¡Ãñ´øÀ´ÑÏÖØÀ§ÈÅ ¡£¡£¡£¡£Ö»¹ÜÊÐÕþ¸®Æð¾¢»Ö¸´ £¬£¬£¬µ«Ö±ÖÁ11ÔÂÏÂÑ® £¬£¬£¬²¿·ÖÊÐÕþÔËÓª²ÅÂ½Ðø»Ö¸´ ¡£¡£¡£¡£Í¬Ê± £¬£¬£¬Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»áÒ²±¨¸æÆäÊÖÒÕϵͳÔâµ½¹¥»÷ £¬£¬£¬µç»°Ïß·ÖÐÖ¹ £¬£¬£¬ÕýÔÚÆð¾¢È·¶¨ÐÅϢй¶ÇéÐÎ ¡£¡£¡£¡£RansomHub½ñÄêѸËÙáÈÆð £¬£¬£¬ÒѶԻú³¡¡¢Ò½ÁÆ»ú¹¹¡¢ÖÆÔ칫˾ºÍÒªº¦»ù´¡ÉèÊ©µÈÊý°Ù¸ö×éÖ¯·¢¶¯¹¥»÷ ¡£¡£¡£¡£×Ô2Ô·ÝÒÔÀ´ £¬£¬£¬ÒÑÓÐÔ¼210¸ö×éÖ¯³ÉΪÆäÊܺ¦Õß ¡£¡£¡£¡£¸Ã×éÖ¯×î³õ·ºÆðÔÚÁªºÏ¿µ½¡¼¯ÍÅÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó £¬£¬£¬ËæºóÒòÁíÒ»ÀÕË÷Èí¼þÍŻﵹ±Õ¶ø×³´ó £¬£¬£¬¶ÔÊý¾Ý¾ÙÐгöÊÛ ¡£¡£¡£¡£½ñÄê £¬£¬£¬RansomHub»¹¹¥»÷Á˶àÆð±¸ÊÜÖõÄ¿µÄÄ¿µÄ £¬£¬£¬°üÀ¨µçОÞÍ·Frontier¡¢Rite Aid¡¢Ó¢¹úÅÄÂôÐÐChristie¡¯sµÈ ¡£¡£¡£¡£


https://therecord.media/ransomhub-cybercrime-coppell-texas-minneapolis-parks-agency


4. ÈûÂ׸ǵÙÐж¯£º·ÇÖÞÖ´·¨»ú¹¹ÑÏË๥»÷ÍøÂç·¸·¨


11ÔÂ26ÈÕ £¬£¬£¬·ÇÖÞÖ´·¨»ú¹¹ÔÚ¹ú¼ÊÐ̾¯×éÖ¯ºÍ·ÇÖÞÐ̾¯×éÖ¯µÄЭµ÷Ï £¬£¬£¬ÓÚ9ÔÂ2ÈÕÖÁ10ÔÂ31ÈÕʱ´ú¿ªÕ¹ÁËÃûΪ¡°ÈûÂ׸ǵÙÐж¯¡±µÄ¹¥»÷ÍøÂç·¸·¨»î¶¯ ¡£¡£¡£¡£´Ë´ÎÐж¯Õë¶ÔÀÕË÷Èí¼þ¡¢ÉÌÒµµç×ÓÓʼþй¶¡¢Êý×ÖÀÕË÷ºÍÍøÂçÕ©Æ­µÈ·¸·¨ÐÐΪ £¬£¬£¬Éæ¼°19¸ö·ÇÖÞ¹ú¼Ò £¬£¬£¬¹²¾Ð²¶ÁË1006ÃûÏÓÒÉÈË £¬£¬£¬´Ý»ÙÁË134089¸ö¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç ¡£¡£¡£¡£¾ÝÊÓ²ì £¬£¬£¬ÕâЩ·¸·¨»î¶¯ÓëÖÁÉÙ35224ÃûÒÑÈ·ÈÏÉí·ÝµÄÊܺ¦ÕßÓÐ¹Ø £¬£¬£¬Ôì³ÉÁ˽ü1.93ÒÚÃÀÔªµÄ¾­¼ÃËðʧ £¬£¬£¬ÆäÖÐÈûÂ׸ǵÙÐж¯×·»ØÁËԼĪ4400ÍòÃÀÔª ¡£¡£¡£¡£Ðж¯ÖеÄÁÁµã°üÀ¨¿ÏÄáÑÇÆÆ»ñÒ»ÆðÍøÉÏÐÅÓÿ¨Õ©Æ­°¸ £¬£¬£¬ÈûÄÚ¼Ó¶ûµ·»ÙÒ»ÆðÅÓÊÏȦÌ× £¬£¬£¬ÄáÈÕÀûÑǾв¶Ò»ÃûʵÑéÍøÉÏͶ×ÊÕ©Æ­µÄÄÐ×Ó £¬£¬£¬¿¦ÂóÂ¡ÆÆ»ñ¶àÌõÀíÓªÏúȦÌ× £¬£¬£¬ÒÔ¼°°²¸çÀ­µ·»ÙÒ»¸öÐéÄâ¶Ä³¡¹ú¼Ê¼¯ÍÅ ¡£¡£¡£¡£¼ÓÈë´Ë´ÎÐж¯µÄ¹ú¼ÒÉÐÓа¢¶û¼°ÀûÑÇ¡¢±´Äþ¡¢¿ÆÌصÏÍß¡¢¸Õ¹ûÃñÖ÷¹²ºÍ¹ú¡¢¼ÓÅî¡¢¼ÓÄÉ¡¢Ã«ÀïÇó˹¡¢ÄªÉ£±È¿Ë¡¢Â¬Íú´ï¡¢ÄÏ·Ç¡¢Ì¹É£ÄáÑÇ¡¢Í»Äá˹¡¢ÔÞ±ÈÑǺͽò°Í²¼Î¤ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/


5. Matrix·¢¶¯´ó¹æÄ£DDoS¹¥»÷ £¬£¬£¬Ê¹ÓÃÎïÁªÍøºÍÆóÒµÎó²î


11ÔÂ26ÈÕ £¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»³¡ÓÉÃûΪMatrixµÄÍþвÐÐΪÕ߲߻®µÄ´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷»î¶¯ £¬£¬£¬¸Ã»î¶¯Ê¹Óÿɻá¼ûµÄ¹¤¾ßÕë¶ÔÎïÁªÍø×°±¸ºÍÆóҵЧÀÍÆ÷ ¡£¡£¡£¡£MatrixµÄ¹¥»÷¿ò¼Ü¾­ÓÉÏêϸÆÊÎö £¬£¬£¬Ö÷ҪʹÓû¥ÁªÍøÅþÁ¬Éè±¹ØÁ¬ÄÎó²îºÍ¹ýʧÉèÖà £¬£¬£¬Í¨¹ý±©Á¦¹¥»÷¡¢Èõƾ֤ºÍÒÑÖªÎó²î¹¹½¨½©Ê¬ÍøÂç ¡£¡£¡£¡£¹¥»÷µÄÖ÷ÒªÌØÕ÷°üÀ¨Õë¶Ô·ÓÉÆ÷¡¢DVRºÍIPÉãÏñ»ú¡¢ÆóҵЭæÅºÍÎïÁªÍø×°±¸µÄÎó²îʹÓà ¡£¡£¡£¡£ÕâЩ¹¥»÷ÑÏÖØÒÀÀµÄ¬ÈÏ»òÈõÃÜÂë £¬£¬£¬Ç¿µ÷ÁËδÄܽÓÄÉ»ù±¾Çå¾²²½·¥»áʹװ±¸ÃæÁÙÈëÇÖµÄΣº¦ ¡£¡£¡£¡£MatrixµÄÄ¿µÄ°üÀ¨ÔÆÐ§ÀÍÌṩÉÌ¡¢Ð¡ÐÍÆóÒµºÍÎïÁªÍø÷缯µØÇø £¬£¬£¬ÊÜÓ°ÏìµÄ×°±¸¿ÉÄܶà´ï3500Íǫ̀ ¡£¡£¡£¡£MatrixʹÓÃÁËÀ´×ÔGitHubµÈƽ̨µÄ¾ç±¾ºÍ¹¤¾ß £¬£¬£¬²¢Í¨¹ýTelegram½«Ð§ÀÍÇ®±Ò»¯ £¬£¬£¬ÌṩDDoS¹¥»÷ÍýÏë ¡£¡£¡£¡£Ö»¹ÜMatrixȱ·¦ÏȽø¹¦Ð§ £¬£¬£¬µ«ÕâЩ¹¤¾ßµÄ×é×°ºÍ²Ù×÷¶¼ºÜÊÇÈÝÒ× £¬£¬£¬ÏÔʾ³öµÍÅÓºéˮƽ¼ÓÈëÕßËù´øÀ´µÄΣº¦Ô½À´Ô½´ó ¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/ddos-campaign-exploits-iot-devices/


6. Array Networks SSL VPN ²úÆ·ÖеÄÎó²îÕý±»Æð¾¢Ê¹ÓÃ


11ÔÂ26ÈÕ £¬£¬£¬ÃÀ¹úÍøÂç·ÀÓù»ú¹¹CISAÊÕµ½Ö¤¾ÝÅú×¢ £¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃSSL VPN²úÆ·Array Networks AGºÍvxAG ArrayOSÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î £¬£¬£¬¸ÃÎó²î±»×·×ÙΪCVE-2023-28461 £¬£¬£¬ÑÏÖØÐÔÆÀ·Ö¸ß´ï9.8 £¬£¬£¬Òѱ»ÁÐÈëCISAµÄÒÑ֪ʹÓÃÎó²îĿ¼ÖÐ ¡£¡£¡£¡£´ËÎó²î±£´æÓÚÒ×Êܹ¥»÷µÄURLÖÐ £¬£¬£¬ÊÇÒ»¸öÉí·ÝÑéÖ¤²»µ±ÎÊÌâ £¬£¬£¬ÔÊÐíÔÚArray AGϵÁкÍvxAG 9.4.0.481¼°¸üÔç°æ±¾ÖÐÖ´ÐÐÔ¶³Ì´úÂë ¡£¡£¡£¡£Array NetworksÔÚÎó²îÅû¶һÖܺóÐû²¼ÁËÐÞ¸´°æ±¾Array AG 9.4.0.484 ¡£¡£¡£¡£Array NetworksµÄSSL VPN²úÆ·±»È«ÇòÁè¼Ý5000¸ö¿Í»§Ê¹Óà £¬£¬£¬°üÀ¨ÆóÒµ¡¢Ð§ÀÍÌṩÉ̺ÍÕþ¸®»ú¹¹ ¡£¡£¡£¡£CISA½¨ÒéËùÓÐÁª°î»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯ÔÚ12ÔÂ16ÈÕ֮ǰӦÓÃÇå¾²¸üлò½ÓÄÉ»º½â²½·¥ £¬£¬£¬²»È»Ó¦×èֹʹÓøòúÆ· ¡£¡£¡£¡£Çå¾²¸üпÉͨ¹ýArrayÖ§³ÖÃÅ»§»ñÈ¡ £¬£¬£¬µ«¹©Ó¦ÉÌÌṩµÄ»º½â²½·¥¿ÉÄÜ»á¶Ô¿Í»§¶ËÇå¾²¹¦Ð§±¬·¢¸ºÃæÓ°Ïì £¬£¬£¬Òò´Ë×éÖ¯Ó¦Ê×ÏȲâÊÔÆäЧ¹û ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-bug-in-array-networks-ssl-vpn-products/