NachoVPNÎó²î£º¶ñÒâVPNЧÀÍÆ÷ʹÓÃδÐÞ²¹¿Í»§¶ËʵÑé¹¥»÷
Ðû²¼Ê±¼ä 2024-11-2711ÔÂ26ÈÕ£¬£¬£¬Ò»×éÃûΪ¡°NachoVPN¡±µÄÎó²îÔÊÐí¶ñÒâVPNЧÀÍÆ÷ʹÓÃδÐÞ²¹µÄPalo AltoºÍSonicWall SSL-VPN¿Í»§¶Ë¾ÙÐй¥»÷£¬£¬£¬Í¨¹ýÓÕÆÓû§ÅþÁ¬ÖÁ¹¥»÷Õß¿ØÖƵÄVPNЧÀÍÆ÷£¬£¬£¬½ø¶øÇÔÈ¡µÇ¼ƾ֤¡¢Ö´ÐÐí§Òâ´úÂë¡¢×°ÖöñÒâÈí¼þ»òÌᳫ´úÂëÊðÃûαÔì¼°ÖÐÐÄÈ˹¥»÷¡£¡£¡£¡£AmberWolfÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÕâÒ»Íþв£¬£¬£¬²¢ÔÚÎó²îÊ״α¨¸æºóÊýÔÂÄÚ£¬£¬£¬¼ûÖ¤ÁËSonicWallºÍPalo Alto NetworksÏà¼ÌÐû²¼Õë¶ÔCVE-2024-29014ºÍCVE-2024-5921Îó²îµÄ²¹¶¡¡£¡£¡£¡£ÎªÁË·ÀÓù£¬£¬£¬SonicWall¿Í»§ÐèÉý¼¶ÖÁNetExtenderµÄÌØ¶¨°æ±¾£¬£¬£¬¶øPalo Alto NetworksÔò½¨Òé×°Öøüа汾»òÔÚFIPS-CCģʽÏÂÔËÐÐVPN¿Í»§¶Ë¡£¡£¡£¡£±ðµÄ£¬£¬£¬AmberWolf»¹Ðû²¼ÁËNachoVPN¿ªÔ´¹¤¾ß£¬£¬£¬¸Ã¹¤¾ßÄÜÄ£Äâ¶ñÒâVPNЧÀÍÆ÷£¬£¬£¬Ö§³Ö¶àÖÖÆóÒµVPN²úÆ·£¬£¬£¬²¢ÃãÀøÉçÇøÐ¢Ë³ÐÂÎó²îÐÅÏ¢¡£¡£¡£¡£Í¬Ê±£¬£¬£¬¸Ã¹«Ë¾»¹ÌṩÁËÓйØÕâÁ½¸öÎó²îµÄ¸ü¶àÊÖÒÕϸ½ÚºÍ·ÀÓù½¨Ò飬£¬£¬ÒÔ×ÊÖúÍøÂç·ÀÓùÕß±£»£»£»£»¤ÆäϵͳÃâÊÜDZÔÚ¹¥»÷¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-nachovpn-attack-uses-rogue-vpn-servers-to-install-malicious-updates/
2. ¶íÂÞ˹ºÚ¿ÍRomComʹÓÃFirefoxºÍTorÁãÈÕÎó²îÌᳫ¹¥»÷
11ÔÂ27ÈÕ£¬£¬£¬½üÆÚ¶íÂÞ˹ºÚ¿Í×éÖ¯RomComʹÓÃÁËÁ½¸öÁãÈÕÎó²î£¬£¬£¬ÏòʹÓÃFirefox»òTorä¯ÀÀÆ÷µÄÓû§·¢ÉäÁ˶ñÒâ´úÂë¡£¡£¡£¡£ÕâЩÎó²î»®·ÖÓ°ÏìÁËMozillaÈí¼þºÍWindowsϵͳ£¬£¬£¬ÆäÖÐÒ»¸öÎó²î£¨CVE-2024-9680£©Ê¹µÃ»á¼ûÊÜÑ¬È¾ÍøÕ¾µÄÈκÎÈ˶¼»áÎÞÒâʶµØÏÂÔØRomComºóÃÅ£¬£¬£¬¶øÎÞÐèÈκεã»÷¡£¡£¡£¡£ÐÒÔ˵ÄÊÇ£¬£¬£¬ÕâÁ½¸öÎó²î¶¼»ñµÃÁË¿ìËÙÐÞ¸´£¬£¬£¬MozillaÔÚÊÕµ½Í¨Öªºó25СʱÄÚ¾ÍÐÞ²¹ÁËFirefoxÖеÄÎó²î£¬£¬£¬¶øWindowsÖеÄÎó²î£¨CVE-2024-49039£©Ò²ÔÚºóÐø»ñµÃÐÞ¸´¡£¡£¡£¡£RomComͨ¹ýÌØÖÆÍøÕ¾´¥·¢Îó²î£¬£¬£¬ÕâÐ©ÍøÕ¾Ä£ÄâÁËÕæÊµ×éÖ¯µÄÍøÕ¾£¬£¬£¬°üÀ¨ConnectWise¡¢DevolutionsºÍCorrectivµÈ¡£¡£¡£¡£ËäÈ»Torä¯ÀÀÆ÷Ò²»ùÓÚFirefox£¬£¬£¬µ«ESET×·×ÙµÄÊܺ¦ÕßÖÐûÓÐÒ»ÈËÊÇͨ¹ýTorÊܵ½¹¥»÷µÄ£¬£¬£¬¿ÉÄÜÊÇÓÉÓÚTorµÄijЩÉèÖÃÓëFirefox²î±ð¡£¡£¡£¡£RomComµÄÖ÷ҪĿµÄËÆºõÊǹ«Ë¾£¬£¬£¬¾ø´ó´ó¶¼Êܺ¦ÕßλÓÚ±±ÃÀºÍÅ·ÖÞ£¬£¬£¬µ«ÐÂÎ÷À¼ºÍ·¨Êô¹çÑÇÄÇÒ²ÓÐÁãÐÇÊܺ¦Õß¡£¡£¡£¡£
https://www.darkreading.com/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor
3. RansomHub×éÖ¯Éù³Æ¶ÔÁ½ÊÐÕþ¸®·¢¶¯ÀÕË÷¹¥»÷
11ÔÂ27ÈÕ£¬£¬£¬ÍøÂç·¸·¨×éÖ¯RansomHubÉù³Æ¶ÔµÂ¿ËÈøË¹ÖÝ¿ÆÅå¶ûÊм°Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»á·¢¶¯ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬Òý·¢ÆÕ±é¹Ø×¢¡£¡£¡£¡£¿£¿£¿£¿£¿£¿ÆÅå¶ûÊÐÔâÊܹ¥»÷ºó£¬£¬£¬»¥ÁªÍø¡¢Í¼Êé¹ÝЧÀÍ¡¢ÔÊÐíºÍ¼ì²éƽ̨¼°Êз¨ÔºµÈ¶à¸öϵͳ̱»¾£¬£¬£¬¸øÍâµØ×¡Ãñ´øÀ´ÑÏÖØÀ§ÈÅ¡£¡£¡£¡£Ö»¹ÜÊÐÕþ¸®Æð¾¢»Ö¸´£¬£¬£¬µ«Ö±ÖÁ11ÔÂÏÂÑ®£¬£¬£¬²¿·ÖÊÐÕþÔËÓª²ÅÂ½Ðø»Ö¸´¡£¡£¡£¡£Í¬Ê±£¬£¬£¬Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»áÒ²±¨¸æÆäÊÖÒÕϵͳÔâµ½¹¥»÷£¬£¬£¬µç»°Ïß·ÖÐÖ¹£¬£¬£¬ÕýÔÚÆð¾¢È·¶¨ÐÅϢй¶ÇéÐΡ£¡£¡£¡£RansomHub½ñÄêѸËÙáÈÆð£¬£¬£¬ÒѶԻú³¡¡¢Ò½ÁÆ»ú¹¹¡¢ÖÆÔ칫˾ºÍÒªº¦»ù´¡ÉèÊ©µÈÊý°Ù¸ö×éÖ¯·¢¶¯¹¥»÷¡£¡£¡£¡£×Ô2Ô·ÝÒÔÀ´£¬£¬£¬ÒÑÓÐÔ¼210¸ö×éÖ¯³ÉΪÆäÊܺ¦Õß¡£¡£¡£¡£¸Ã×éÖ¯×î³õ·ºÆðÔÚÁªºÏ¿µ½¡¼¯ÍÅÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó£¬£¬£¬ËæºóÒòÁíÒ»ÀÕË÷Èí¼þÍŻﵹ±Õ¶ø×³´ó£¬£¬£¬¶ÔÊý¾Ý¾ÙÐгöÊÛ¡£¡£¡£¡£½ñÄ꣬£¬£¬RansomHub»¹¹¥»÷Á˶àÆð±¸ÊÜÖõÄ¿µÄÄ¿µÄ£¬£¬£¬°üÀ¨µçОÞÍ·Frontier¡¢Rite Aid¡¢Ó¢¹úÅÄÂôÐÐChristie¡¯sµÈ¡£¡£¡£¡£
https://therecord.media/ransomhub-cybercrime-coppell-texas-minneapolis-parks-agency
4. ÈûÂ׸ǵÙÐж¯£º·ÇÖÞÖ´·¨»ú¹¹ÑÏË๥»÷ÍøÂç·¸·¨
11ÔÂ26ÈÕ£¬£¬£¬·ÇÖÞÖ´·¨»ú¹¹ÔÚ¹ú¼ÊÐ̾¯×éÖ¯ºÍ·ÇÖÞÐ̾¯×éÖ¯µÄе÷Ï£¬£¬£¬ÓÚ9ÔÂ2ÈÕÖÁ10ÔÂ31ÈÕʱ´ú¿ªÕ¹ÁËÃûΪ¡°ÈûÂ׸ǵÙÐж¯¡±µÄ¹¥»÷ÍøÂç·¸·¨»î¶¯¡£¡£¡£¡£´Ë´ÎÐж¯Õë¶ÔÀÕË÷Èí¼þ¡¢ÉÌÒµµç×ÓÓʼþй¶¡¢Êý×ÖÀÕË÷ºÍÍøÂçթƵȷ¸·¨ÐÐΪ£¬£¬£¬Éæ¼°19¸ö·ÇÖÞ¹ú¼Ò£¬£¬£¬¹²¾Ð²¶ÁË1006ÃûÏÓÒÉÈË£¬£¬£¬´Ý»ÙÁË134089¸ö¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬ÕâЩ·¸·¨»î¶¯ÓëÖÁÉÙ35224ÃûÒÑÈ·ÈÏÉí·ÝµÄÊܺ¦ÕßÓйأ¬£¬£¬Ôì³ÉÁ˽ü1.93ÒÚÃÀÔªµÄ¾¼ÃËðʧ£¬£¬£¬ÆäÖÐÈûÂ׸ǵÙÐж¯×·»ØÁËԼĪ4400ÍòÃÀÔª¡£¡£¡£¡£Ðж¯ÖеÄÁÁµã°üÀ¨¿ÏÄáÑÇÆÆ»ñÒ»ÆðÍøÉÏÐÅÓÿ¨Õ©Æ°¸£¬£¬£¬ÈûÄÚ¼Ó¶ûµ·»ÙÒ»ÆðÅÓÊÏȦÌ×£¬£¬£¬ÄáÈÕÀûÑǾв¶Ò»ÃûʵÑéÍøÉÏͶ×ÊթƵÄÄÐ×Ó£¬£¬£¬¿¦ÂóÂ¡ÆÆ»ñ¶àÌõÀíÓªÏúȦÌ×£¬£¬£¬ÒÔ¼°°²¸çÀµ·»ÙÒ»¸öÐéÄâ¶Ä³¡¹ú¼Ê¼¯ÍÅ¡£¡£¡£¡£¼ÓÈë´Ë´ÎÐж¯µÄ¹ú¼ÒÉÐÓа¢¶û¼°ÀûÑÇ¡¢±´Äþ¡¢¿ÆÌصÏÍß¡¢¸Õ¹ûÃñÖ÷¹²ºÍ¹ú¡¢¼ÓÅî¡¢¼ÓÄÉ¡¢Ã«ÀïÇó˹¡¢ÄªÉ£±È¿Ë¡¢Â¬Íú´ï¡¢ÄÏ·Ç¡¢Ì¹É£ÄáÑÇ¡¢Í»Äá˹¡¢ÔÞ±ÈÑǺͽò°Í²¼Î¤¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/
5. Matrix·¢¶¯´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬Ê¹ÓÃÎïÁªÍøºÍÆóÒµÎó²î
11ÔÂ26ÈÕ£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»³¡ÓÉÃûΪMatrixµÄÍþвÐÐΪÕ߲߻®µÄ´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷»î¶¯£¬£¬£¬¸Ã»î¶¯Ê¹Óÿɻá¼ûµÄ¹¤¾ßÕë¶ÔÎïÁªÍø×°±¸ºÍÆóҵЧÀÍÆ÷¡£¡£¡£¡£MatrixµÄ¹¥»÷¿ò¼Ü¾ÓÉÏêϸÆÊÎö£¬£¬£¬Ö÷ҪʹÓû¥ÁªÍøÅþÁ¬Éè±¹ØÁ¬ÄÎó²îºÍ¹ýʧÉèÖ㬣¬£¬Í¨¹ý±©Á¦¹¥»÷¡¢Èõƾ֤ºÍÒÑÖªÎó²î¹¹½¨½©Ê¬ÍøÂç¡£¡£¡£¡£¹¥»÷µÄÖ÷ÒªÌØÕ÷°üÀ¨Õë¶Ô·ÓÉÆ÷¡¢DVRºÍIPÉãÏñ»ú¡¢ÆóÒµÐæÅºÍÎïÁªÍø×°±¸µÄÎó²îʹÓᣡ£¡£¡£ÕâЩ¹¥»÷ÑÏÖØÒÀÀµÄ¬ÈÏ»òÈõÃÜÂ룬£¬£¬Ç¿µ÷ÁËδÄܽÓÄÉ»ù±¾Çå¾²²½·¥»áʹװ±¸ÃæÁÙÈëÇÖµÄΣº¦¡£¡£¡£¡£MatrixµÄÄ¿µÄ°üÀ¨ÔÆÐ§ÀÍÌṩÉÌ¡¢Ð¡ÐÍÆóÒµºÍÎïÁªÍø÷缯µØÇø£¬£¬£¬ÊÜÓ°ÏìµÄ×°±¸¿ÉÄܶà´ï3500Íǫ̀¡£¡£¡£¡£MatrixʹÓÃÁËÀ´×ÔGitHubµÈƽ̨µÄ¾ç±¾ºÍ¹¤¾ß£¬£¬£¬²¢Í¨¹ýTelegram½«Ð§ÀÍÇ®±Ò»¯£¬£¬£¬ÌṩDDoS¹¥»÷ÍýÏë¡£¡£¡£¡£Ö»¹ÜMatrixȱ·¦ÏȽø¹¦Ð§£¬£¬£¬µ«ÕâЩ¹¤¾ßµÄ×é×°ºÍ²Ù×÷¶¼ºÜÊÇÈÝÒ×£¬£¬£¬ÏÔʾ³öµÍÅÓºéˮƽ¼ÓÈëÕßËù´øÀ´µÄΣº¦Ô½À´Ô½´ó¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/ddos-campaign-exploits-iot-devices/
6. Array Networks SSL VPN ²úÆ·ÖеÄÎó²îÕý±»Æð¾¢Ê¹ÓÃ
11ÔÂ26ÈÕ£¬£¬£¬ÃÀ¹úÍøÂç·ÀÓù»ú¹¹CISAÊÕµ½Ö¤¾ÝÅú×¢£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃSSL VPN²úÆ·Array Networks AGºÍvxAG ArrayOSÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬¸ÃÎó²î±»×·×ÙΪCVE-2023-28461£¬£¬£¬ÑÏÖØÐÔÆÀ·Ö¸ß´ï9.8£¬£¬£¬Òѱ»ÁÐÈëCISAµÄÒÑ֪ʹÓÃÎó²îĿ¼ÖС£¡£¡£¡£´ËÎó²î±£´æÓÚÒ×Êܹ¥»÷µÄURLÖУ¬£¬£¬ÊÇÒ»¸öÉí·ÝÑéÖ¤²»µ±ÎÊÌ⣬£¬£¬ÔÊÐíÔÚArray AGϵÁкÍvxAG 9.4.0.481¼°¸üÔç°æ±¾ÖÐÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£Array NetworksÔÚÎó²îÅû¶һÖܺóÐû²¼ÁËÐÞ¸´°æ±¾Array AG 9.4.0.484¡£¡£¡£¡£Array NetworksµÄSSL VPN²úÆ·±»È«ÇòÁè¼Ý5000¸ö¿Í»§Ê¹Ó㬣¬£¬°üÀ¨ÆóÒµ¡¢Ð§ÀÍÌṩÉ̺ÍÕþ¸®»ú¹¹¡£¡£¡£¡£CISA½¨ÒéËùÓÐÁª°î»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯ÔÚ12ÔÂ16ÈÕ֮ǰӦÓÃÇå¾²¸üлò½ÓÄÉ»º½â²½·¥£¬£¬£¬²»È»Ó¦×èֹʹÓøòúÆ·¡£¡£¡£¡£Çå¾²¸üпÉͨ¹ýArrayÖ§³ÖÃÅ»§»ñÈ¡£¬£¬£¬µ«¹©Ó¦ÉÌÌṩµÄ»º½â²½·¥¿ÉÄÜ»á¶Ô¿Í»§¶ËÇå¾²¹¦Ð§±¬·¢¸ºÃæÓ°Ï죬£¬£¬Òò´Ë×éÖ¯Ó¦Ê×ÏȲâÊÔÆäЧ¹û¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-bug-in-array-networks-ssl-vpn-products/