ÐÂÐÍFireScamÐÅÏ¢ÇÔÈ¡ÌØ¹¤Èí¼þαװ³ÉTelegram Premium
Ðû²¼Ê±¼ä 2025-01-061. ÐÂÐÍFireScamÐÅÏ¢ÇÔÈ¡ÌØ¹¤Èí¼þαװ³ÉTelegram Premium
1ÔÂ4ÈÕ£¬£¬£¬Ò»ÖÖÃûΪ¡°FireScam¡±µÄÐÂÐÍ Android ¶ñÒâÈí¼þÕýÔÚͨ¹ý GitHub ÉϵĴ¹ÂÚÍøÕ¾ÒÔ Telegram Ó¦ÓóÌÐòµÄ¸ß¼¶°æ±¾¾ÙÐÐÈö²¥£¬£¬£¬ÕâÐ©ÍøÕ¾Ä£ÄâÁ˶íÂÞË¹ÒÆ¶¯×°±¸Ó¦ÓóÌÐòÊг¡ RuStore¡£¡£¡£¡£¡£¡£ÕâЩ´¹ÂÚÍøÕ¾Ê¹ÓöíÂÞ˹Óû§¶ÔÒÆ¶¯Èí¼þ»á¼ûÊÜÏÞµÄÅä¾°£¬£¬£¬ÌṩֲÈëÆ÷Ä£¿£¿éGetAppsRu.apk£¬£¬£¬¸ÃÄ£¿£¿éʹÓÃDexGuard»ìÏýÒÔÌӱܼì²â²¢»ñÈ¡¶àÖÖȨÏÞ¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬Ëü×°ÖÃÖ÷ÒªµÄ¶ñÒâÈí¼þ¸ºÔØ¡°Telegram Premium.apk¡±£¬£¬£¬ÇëÇó¼à¿ØÍ¨Öª¡¢¼ôÌù°åÊý¾Ý¡¢¶ÌÐź͵绰ЧÀ͵ÈȨÏÞ¡£¡£¡£¡£¡£¡£FireScamÖ´Ðк󣬣¬£¬»áÏÔʾһ¸öÓÕÆÐÔµÄTelegramµÇÂ¼Ò³Ãæ£¬£¬£¬ÇÔÈ¡Óû§Æ¾Ö¤£¬£¬£¬²¢ÓëFirebaseʵʱÊý¾Ý¿âͨѶ£¬£¬£¬ÉÏ´«±»µÁÊý¾Ý²¢×¢²áÊÜѬȾװ±¸¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬Ëü»¹½¨É賤ÆÚµÄWebSocketÅþÁ¬ÒÔÖ´ÐÐʵʱÏÂÁ£¬£¬¼à¿ØÆÁÄ»»î¶¯×ª±ä¡¢µç×ÓÉÌÎñÉúÒâÒÔ¼°Óû§ÊäÈëºÍ¼ôÌù°åÄÚÈÝ£¬£¬£¬ÉõÖÁ×èµ²×Ô¶¯Ìî³äÊý¾Ý¡£¡£¡£¡£¡£¡£Ö»¹ÜÉÐδȷ¶¨FireScamµÄÔËÓªÕߣ¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪËüÊÇÒ»ÖÖÖØ´óÇÒ½ÓÄÉÏȽø¹æ±ÜÊÖÒÕµÄÍþв¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬Óû§Ó¦ÉóÉ÷¿´´ýÀ´×ÔDZÔÚ²»ÊÜÐÅÈÎȪԴµÄÎļþºÍ²»ÊìϤµÄÁ´½Ó¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-firescam-android-data-theft-malware-poses-as-telegram-premium-app/
2. UpdraftPlus²å¼þÑÏÖØÇå¾²Îó²îCVE-2024-10957ÆØ¹â
1ÔÂ4ÈÕ£¬£¬£¬È«ÇòÓÐÁè¼Ý300Íò¸öWordPressÍøÕ¾Ê¹ÓõÄUpdraftPlus±¸·ÝºÍǨáã²å¼þÖз¢Ã÷ÁËÒ»¸öÑÏÖØÇå¾²Îó²î£¬£¬£¬±àºÅΪCVE-2024-10957£¬£¬£¬CVSSÆÀ·ÖΪ8.8¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ²å¼þµÄrecursive_unserialized_replaceº¯ÊýÖУ¬£¬£¬ÓÉÓÚδ׼ȷ´¦Öóͷ£²»ÊÜÐÅÈεÄÊäÈë·´ÐòÁл¯£¬£¬£¬¿ÉÄܵ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓÃPHP¹¤¾ß×¢ÈëÎó²î¡£¡£¡£¡£¡£¡£Ö»¹ÜUpdraftPlus×Ô¼ºÃ»ÓÐÒÑÖªµÄPHP¹¤¾ßPOPÁ´£¬£¬£¬µ«ÆäËûÒ×Êܹ¥»÷µÄ²å¼þ»òÖ÷Ìâ¿ÉÄÜʹ¹¥»÷ÕßÄܹ»É¾³ýí§ÒâÎļþ¡¢»á¼ûÃô¸ÐÊý¾Ý»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£Ö÷ÒªµÄÊÇ£¬£¬£¬´ËÎó²îÐèÒªÖÎÀíÔ±ÔÚ²å¼þÄÚÖ´ÐÐËÑË÷ºÍÌæ»»²Ù×÷²Å»ª´¥·¢¶ñÒâ¸ºÔØ¡£¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±WebbernautÒò·¢Ã÷²¢ÈÏÕæÈεØÅû¶´ËÎó²î¶øÊܵ½ÔÞÓþ¡£¡£¡£¡£¡£¡£´ËÎó²îÓ°ÏìUpdraftPlusµÄËùÓа汾£¬£¬£¬Ö±ÖÁ1.24.11°æ£¬£¬£¬´ó×ÚWordPressÍøÕ¾¿ÉÄÜÃæÁÙΣº¦¡£¡£¡£¡£¡£¡£UpdraftPlusÍŶÓÒÑÔÚ1.24.12°æ±¾Öнâ¾öÁË´ËÎó²î£¬£¬£¬½¨ÒéËùÓÐÓû§Á¬Ã¦¸üÐÂÖÁ¸Ã°æ±¾¡£¡£¡£¡£¡£¡£
https://securityonline.info/cve-2024-10957-exposes-over-3-million-wordpress-sites-to-unauthenticated-php-object-injection-exploits/
3. NessusÊðÀíÒò¸üйýʧÏÂÏߣ¬£¬£¬TenableÒªÇó¿Í»§ÊÖ¶¯Éý¼¶»Ö¸´
1ÔÂ3ÈÕ£¬£¬£¬Tenable¹«Ë¾½üÆÚÔâÓöÁËÒ»´ÎÈí¼þ¸üйýʧ£¬£¬£¬µ¼ÖÂÆäNessusÎó²îɨÃèÆ÷ÊðÀíÔÚ12ÔÂ31ÈÕ¶Ô²¿·ÖÓû§ÏÂÏß¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°ÏìÁËÈ«Çò¶à¸öµØÇø£¬£¬£¬ÌØÊâÊÇÄÇЩ¸üÐÂÖÁNessus Agent°æ±¾10.8.0ºÍ10.8.1µÄϵͳ¡£¡£¡£¡£¡£¡£ÎªÁËÓ¦¶ÔÕâÒ»ÎÊÌ⣬£¬£¬TenableѸËÙ³·ÏÂÁËÓÐÎÊÌâµÄ°æ±¾£¬£¬£¬²¢Ðû²¼ÁËа汾10.8.2ÒÔÐÞ¸´Îó²î¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ÊÜÓ°ÏìµÄ¿Í»§ÐèÒªÊÖ¶¯Éý¼¶µ½Ð°汾»ò½µ¼¶µ½10.7.3°æ±¾²Å»ªÊ¹ÊðÀíÖØÐÂÉÏÏß¡£¡£¡£¡£¡£¡£ÈôÊÇʹÓÃÁËÊðÀíÉèÖÃÎļþ¾ÙÐÐÉý¼¶»ò½µ¼¶£¬£¬£¬»¹ÐèÒªÌØÊâÖØÖòå¼þ¡£¡£¡£¡£¡£¡£TenableÍýÏë»Ö¸´²å¼þ¹©¸å£¬£¬£¬²¢ÌáÐÑËùÓÐÔËÐÐÊÜÓ°Ïì°æ±¾µÄ¿Í»§¾¡¿ì½ÓÄÉÐж¯¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñËäδÔì³É´óÃæ»ýÖÐÖ¹£¬£¬£¬µ«ÀàËÆµÄÎÊÌâÔÚ2024Äê7ÔÂÓÉCrowdStrike Falcon¸üйýʧÒý·¢Ê±£¬£¬£¬Ôøµ¼ÖÂÈ«Çò¶à¸ö×éÖ¯ºÍЧÀ͵Ä̱»¾£¬£¬£¬°üÀ¨ÒøÐС¢º½¿Õ¹«Ë¾µÈÖ÷Òª»ú¹¹¡£¡£¡£¡£¡£¡£ÕâÔÙ´ÎÌáÐÑÁËÍøÂçÇå¾²¸üеÄÖ÷ÒªÐÔºÍDZÔÚΣº¦¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bad-tenable-plugin-updates-take-down-nessus-agents-worldwide/
4. Atos·ñ¶¨Space BearsÀÕË÷Èí¼þÍÅ»ïÈëÇÖÆäÊý¾Ý¿â
1ÔÂ3ÈÕ£¬£¬£¬·¨¹ú¿Æ¼¼¾ÞÍ·Atos£¬£¬£¬×Ô³ÆÅ·ÖÞÁìÏȵÄÍøÂçÇå¾²¡¢ÔÆÅÌËãºÍ¸ßÐÔÄÜÅÌË㹫˾£¬£¬£¬¿ËÈÕ·ñ¶¨ÁËSpace BearsÀÕË÷Èí¼þÍÅ»ï¹ØÓÚÈëÇÖÆäÊý¾Ý¿âµÄÖ¸¿Ø¡£¡£¡£¡£¡£¡£Space BearsÊÇÒ»¸öÏà¶Ô½ÏеÄÍøÂç·¸·¨×éÖ¯£¬£¬£¬Ê¹ÓÃË«ÖØÀÕË÷ÊֶΣ¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢ÍþвÔÚÍøÉÏй¶£¬£¬£¬ÒÔÆÈʹÊܺ¦ÕßÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£12ÔÂ28ÈÕ£¬£¬£¬Space BearsÉù³ÆÈëÇÖÁËAtosÍøÂç²¢ÍýÏëÐû²¼ÇÔÈ¡µÄ¹«Ë¾Êý¾Ý¿â¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬AtosÔÚ12ÔÂ29ÈÕÌåÏÖÆðÔ´ÆÊÎöδ·¢Ã÷ÈκÎÈëÇÖ»òÀÕË÷Èí¼þÓ°ÏìµÄÖ¤¾Ý£¬£¬£¬Ò²Î´ÊÕµ½Êê½ðÒªÇ󡣡£¡£¡£¡£¡£Atos½øÒ»²½Ö¸³ö£¬£¬£¬Space BearsÏÖʵ¹¥»÷µÄÊÇÓëAtosÎ޹صÄÍⲿµÚÈý·½»ù´¡ÉèÊ©£¬£¬£¬ËäÈ»´æ´¢ÁËÌá¼°AtosµÄÊý¾Ý£¬£¬£¬µ«²¢²»ÊÜAtosÖÎÀí»ò±£»£»£»¤¡£¡£¡£¡£¡£¡£AtosÇ¿µ÷ÆäÔÚÈ«ÇòÓµÓÐÁè¼Ý6,500ÃûÇ徲ר¼ÒºÍ17¸öÐÂÒ»´úÇå¾²ÔËÓªÖÐÐÄ£¬£¬£¬È«ÌìºòÔËÓªÒÔÈ·±£¼¯Íż°Æä¿Í»§µÄÇå¾²¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/french-govt-contractor-atos-denies-space-bears-ransomware-attack-claims/
5. ÀïÊ¿Âú´óѧҽѧÖÐÐÄÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬67ÍòÓàÈËÊý¾Ýй¶
1ÔÂ3ÈÕ£¬£¬£¬Å¦Ô¼ÀïÊ¿Âú´óѧҽѧÖÐÐÄ£¨RUMC£©ÔÚ2023Äê5ÔÂÔâÊÜÁËÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬µ¼ÖÂҽԺЧÀÍÖÐÖ¹ÊýÖÜ£¬£¬£¬²¢Ó°ÏìÁË674,033ÈË¡£¡£¡£¡£¡£¡£Ö»¹ÜÃæÁÙÌôÕ½£¬£¬£¬Ò½ÔºÈÔά³ÖÁËÖÜÈ«µÄ»¼ÕßЧÀÍ£¬£¬£¬²¢½«Ò¹¼ä´´É˺ÍÖзçÕչ˻¤Ê¿µÄÖÐÖ¹ÏÞÖÆÔÚ×îµÍÏÞ¶È¡£¡£¡£¡£¡£¡£ÔÚÍøÂçÇå¾²¹«Ë¾µÄ×ÊÖúÏ£¬£¬£¬Ò½ÔºÆð¾¢»Ö¸´ÏµÍ³²¢ÆÀ¹À¹¥»÷¹æÄ££¬£¬£¬Í¬Ê±È·Èϵç×Ó¿µ½¡¼Í¼ϵͳδÊÜÓ°Ï죬£¬£¬µ«ÆäËûÎļþ¿ÉÄÜÔÚ¹¥»÷ʱ´ú±»»á¼û»òɾ³ý¡£¡£¡£¡£¡£¡£RUMCÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬¿ÉÄÜÉæ¼°°üÀ¨Ð¡ÎÒ˽¼ÒºÍ¿µ½¡ÐÅÏ¢µÄÃô¸ÐÎļþ£¬£¬£¬ÈçÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢½ðÈÚÕË»§ÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£Ò½ÔºÒÑ֪ͨÊÜÓ°ÏìµÄСÎÒ˽¼Ò²¢½¨ÒéËûÃǽÓÄɱ£»£»£»¤²½·¥£¬£¬£¬Í¬Ê±ÎªÉç»áÇå¾²ºÅÂëй¶µÄСÎÒ˽¼ÒÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£¡£¡£¡£¡£Ö»¹ÜÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬µ«RUMCÒÑÏòÏà¹Ø²¿·Öת´ïÁ˸ÃÊÂÎñ£¬£¬£¬²¢¼û¸æÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿´Ë´ÎÊý¾Ýй¶µÄÏêϸÈËÊý¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/172641/data-breach/richmond-university-medical-center-data-breach.html
6. Nikki - UniversalÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬761.8GBÊý¾Ýй¶
1ÔÂ4ÈÕ£¬£¬£¬Nikki - UniversalÓÐÏÞ¹«Ë¾ÊÇÒ»¼Ò×ÅÃûµÄ»¯Ñ§ÖÆÔìÉÌ£¬£¬£¬ÓÚ2024Äê12ÔÂ27ÈÕ֤ʵÔâÊÜÁËÀ´×ÔHunters InternationalÀÕË÷Èí¼þ×éÖ¯µÄÖØ´ó¹¥»÷¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÔÚ12ÔÂ22ÈÕ£¬£¬£¬µ¼Ö¹«Ë¾²¿·ÖЧÀÍÆ÷Éϵĵç×ÓÊý¾Ý±»¼ÓÃÜ£¬£¬£¬Éæ¼°Êý¾ÝÁ¿¸ß´ï761.8GB£¬£¬£¬°üÀ¨476,342¸öÎļþ¡£¡£¡£¡£¡£¡£Hunters InternationalÒÔÆä¼¤½øÊÖ¶ÎÖø³Æ£¬£¬£¬Éù³ÆÈôδÔÚ»®¶¨ÈÕÆÚ£¨2025Äê1ÔÂ10ÈÕ£©Ç°ÊÕµ½Êê½ð£¬£¬£¬½«¹ûÕæËùÓÐÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¡£Nikki - UniversalËäѸËÙÏìÓ¦²¢Æð¾¢ÊӲ죬£¬£¬µ«ÈÔδÄÜ×èÖ¹¹¥»÷´øÀ´µÄË𺦡£¡£¡£¡£¡£¡£Hunters InternationalµÄ¼ÓÈë½øÒ»²½¼Ó¾çÁËÊ±ÊÆµÄÖØ´óÐÔ£¬£¬£¬ÆäÐû³ÆÒÑ»ñÈ¡²¢¼ÓÃÜÊý¾Ý£¬£¬£¬¶ÔNikki - UniversalµÄÍøÂçÇå¾²×é³ÉÑÏÖØÍþв£¬£¬£¬²¢¿ÉÄÜÒý·¢¶àÖÖÍøÂçÍþвÓëÉùÓþΣº¦¡£¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼ÒÕ¹Íû£¬£¬£¬Ëæ×ÅÈ˹¤ÖÇÄܺÍÁ¿×ÓÅÌËãµÄÉú³¤£¬£¬£¬2025ÄêÍøÂç¹¥»÷µÄÖØÆ¯ºóºÍƵÂʽ«½øÒ»²½ÔöÌí£¬£¬£¬ÒªÇó×éÖ¯±ØÐèÇ¿»¯·ÀÓù²½·¥¡£¡£¡£¡£¡£¡£
https://cybersecuritynews.com/nikki-universal-cyber-attack/