GFI KerioControl·À»ðǽÔâÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²îÍþв
Ðû²¼Ê±¼ä 2025-02-111. GFI KerioControl·À»ðǽÔâÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²îÍþв
2ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬Áè¼ÝÒ»ÍòÁ½Ç§¸ö GFI KerioControl ·À»ðǽʵÀý±»·¢Ã÷±£´æ±àºÅΪ CVE-2024-52875 µÄÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£KerioControl ÊÇÒ»¿îרΪÖÐСÐÍÆóÒµÉè¼ÆµÄÍøÂçÇå¾²Ì×¼þ£¬£¬£¬£¬£¬£¬¹¦Ð§°üÀ¨ VPN¡¢´ø¿íÖÎÀí¡¢±¨¸æ¼à¿Ø¡¢Á÷Á¿¹ýÂË¡¢AV ±£»£»£»£»£»¤ºÍÈëÇÖ·ÀÓù¡£¡£¡£´ËÎó²îÓÉÇå¾²Ñо¿Ô± Egidio Romano£¨EgiX£©ÓÚ 2024 Äê 12 ÔÂÖÐÑ®·¢Ã÷£¬£¬£¬£¬£¬£¬²¢Õ¹Ê¾ÁË¿ÉÄܵÄÒ»¼ü RCE ¹¥»÷¡£¡£¡£Ö»¹Ü GFI Software ÒÑÔÚ 12 Ô 19 ÈÕÐû²¼ÁËÕë¶Ô¸ÃÎÊÌâµÄÇå¾²¸üУ¨9.4.5 Patch 1 °æ±¾£©£¬£¬£¬£¬£¬£¬µ«Æ¾Ö¤ Censys Êý¾Ý£¬£¬£¬£¬£¬£¬ÈýÖܺóÈÔÓдó×ÚʵÀýδÐÞ¸´¡£¡£¡£Greynoise ÒѼì²âµ½Ê¹ÓøÃÎó²îµÄ×Ô¶¯¹¥»÷ʵÑ飬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡ÖÎÀíÔ± CSRF ÁîÅÆ¡£¡£¡£Shadowserver Foundation ±¨¸æ³Æ£¬£¬£¬£¬£¬£¬ÏÖÔÚÈÔÓÐ 12,229 ¸ö KerioControl ·À»ðÇ½ÃæÁÙ´ËÎó²îÍþв£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµØÇø°üÀ¨ÒÁÀÊ¡¢ÃÀ¹ú¡¢Òâ´óÀû¡¢µÂ¹úµÈ¡£¡£¡£ÓÉÓÚ±£´æ¹ûÕæµÄÎó²î֤ʵ£¨PoC£©£¬£¬£¬£¬£¬£¬Ê¹ÓÃÃż÷¼«µÍ£¬£¬£¬£¬£¬£¬ÉõÖÁ²»ÊìÁ·µÄºÚ¿ÍÒ²¿ÉÄܼÓÈë¶ñÒâ»î¶¯¡£¡£¡£Îó²îÔµ¹ÊÔÓÉÔÚÓÚÓû§ÊäÈëδ»ñµÃÊʵ±ÕûÀí£¬£¬£¬£¬£¬£¬¿ÉÄܱ»Ê¹ÓÃÖ´ÐÐ HTTP ÏìÓ¦²ð·Ö¹¥»÷£¬£¬£¬£¬£¬£¬½ø¶ø¿ÉÄܵ¼Ö·´ÉäÐÍ¿çÕ¾µã¾ç±¾£¨XSS£©ºÍÆäËû¹¥»÷¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÉÐδӦÓøüеÄÓû§×°Öà 2025 Äê 1 Ô 31 ÈÕÐû²¼µÄ KerioControl °æ±¾ 9.4.5 Patch 2£¬£¬£¬£¬£¬£¬ÒÔÔöÇ¿Çå¾²ÐÔ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-12-000-keriocontrol-firewalls-exposed-to-exploited-rce-flaw/
2. HandalaºÚ¿Í×é֝ɿÏÓ¶ÔÒÔÉ«Áо¯·½·¢¶¯´ó¹æÄ£ÍøÂç¹¥»÷
2ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ÎÛÃûÕÑÖøµÄHandalaºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬£¬ÉæÏÓÓëÒÁÀÊÇ鱨»ú¹¹ÓйØÁª£¬£¬£¬£¬£¬£¬½üÆÚÐû²¼¶ÔÒÔÉ«Áо¯Ô±²½¶Ó·¢¶¯ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Éù³ÆÀÖ³ÉÇÔÈ¡ÁË2.1TBµÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨ÈËʼͼ¡¢ÎäÆ÷Çåµ¥¡¢Ò½ÁƺÍÐÄÀíµµ°¸µÈ£¬£¬£¬£¬£¬£¬²¢¹ûÕæÈö²¥ÁËÆäÖÐ35Íò·ÝÎļþ¡£¡£¡£Ö»¹ÜÒÔÉ«Áо¯·½·ñ¶¨ÏµÍ³Ö±½ÓÔâÈëÇÖ£¬£¬£¬£¬£¬£¬µ«´Ë´ÎÊý¾Ýй¶ÊÂÎñ¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬£¬Éæ¼°´ó×ÚÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬Èçµç×ÓÓʼþµØµã¡¢³Öǹ֤¡¢¾¯¹ÙÕÕÆ¬ºÍСÎÒ˽¼ÒÁªÏµ·½·¨µÈ¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬Handala»¹Ö¸¿ØÆä»ñÈ¡Á˾¯Ô±µÄÐÄÀíÆÀ¹ÀµÈ˽ÈËÊý¾Ý£¬£¬£¬£¬£¬£¬²¢ÇÖÈëÁËÒÔÉ«Áйú¼ÒÇå¾²²¿µÄЧÀÍÆ÷¡£¡£¡£´Ë´ÎÊÂÎñÊÇHandalaÕë¶ÔÒÔÉ«ÁÐʵÌåʵÑ鯯ËðÐÔÍøÂçÐж¯µÄµä·¶°¸Àý£¬£¬£¬£¬£¬£¬ÌØÊâÊÇÔÚÒÔÉ«ÁÐÓë¹þÂí˹³åÍ»Éý¼¶ºó£¬£¬£¬£¬£¬£¬ÒÔÉ«ÁÐÒѳÉΪÒÁÀÊÍøÂçÐж¯µÄÖ÷ҪĿµÄ¡£¡£¡£HandalaµÄ»î¶¯ÆµÈÔ£¬£¬£¬£¬£¬£¬²»µ«ÉæÏÓ¼ÓÈëÕë¶ÔÒÔÉ«ÁÐ×éÖ¯ÍøÂçÇå¾²Ö°Ô±µÄÍøÂç´¹Âڻ£¬£¬£¬£¬£¬£¬»¹Õë¶ÔÒÔÉ«ÁеÄSoreqºËÑо¿ÖÐÐÄ·¢¶¯ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬×î½üÓÖÈëÇÖÁËÒÔÉ«Áеç×Ó¹«Ë¾ÔËÓªµÄ½ôÆÈ¾¯±¨ÏµÍ³£¬£¬£¬£¬£¬£¬Òý·¢´ó¹æÄ£¿Ö»Å¡£¡£¡£¸Ã×éÖ¯ÔÚÌû×ÓÖм¥Ð¦ÒÔÉ«ÁУ¬£¬£¬£¬£¬£¬Ç¿µ÷ÆäÀÖ³ÉÍ»ÆÆ·ÀÓù²¢½ÒÆÆÉñÃØ£¬£¬£¬£¬£¬£¬ÖØÉêÆä¡°²»»áÒÅÍü£¬£¬£¬£¬£¬£¬²»»áÔÁ¡±µÄ¿ÚºÅ¡£¡£¡£
https://hackread.com/handala-hackers-israeli-police-breach-data-leak/
3. ¾¯·½¾Ð²¶ 4 Ãû Phobos ÀÕË÷Èí¼þÏÓÒÉÈË£¬£¬£¬£¬£¬£¬²é·â 8Base ÍøÕ¾
2ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬È«ÇòÖ´·¨Ðж¯¡°Phobos Aetor¡±Õë¶ÔPhobosÀÕË÷Èí¼þÍÅ»ïÕö¿ª£¬£¬£¬£¬£¬£¬ÒÑÔÚÌ©¹úÆÕ¼ªµº¾Ð²¶ËÄÃûÅ·ÖÞºÚ¿ÍÏÓÒÉÈË£¬£¬£¬£¬£¬£¬²¢²é·â8Base°µÍøÍøÕ¾¡£¡£¡£ÕâЩÏÓÒÉÈ˱»Ö¸¿Ø¶ÔÈ«ÇòÁè¼Ý1000ÃûÊܺ¦Õß¾ÙÐÐÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ÀÕË÷Á˼ÛÖµ1600ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£¡£´Ë´ÎÐж¯Éæ¼°¶à¸ö¹ú¼ÒºÍµØÇøµÄ¾¯·½ÐͬͻϮ£¬£¬£¬£¬£¬£¬½É»ñÁ˵ç×Ó×°±¸ºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£8BaseÀÕË÷Èí¼þÍÅ»ï×Ô2022Äê3Ô½¨ÉèÒÔÀ´£¬£¬£¬£¬£¬£¬Ò»Ö±Ïà¶ÔÇÄÈ»£¬£¬£¬£¬£¬£¬Ö±µ½2023Äê6ÔÂ×îÏÈй¶Êܺ¦ÕßÊý¾Ý¡£¡£¡£¸ÃÍÅ»ï»áÈëÇÖÆóÒµÍøÂ磬£¬£¬£¬£¬£¬ÇÔÈ¡Êý¾Ý²¢Ê¹ÓÃPhobosÀÕË÷Èí¼þ¼ÓÃÜÆ÷¼ÓÃÜ×°±¸£¬£¬£¬£¬£¬£¬ÒªÇóÖ§¸¶¸ß¶îÊê½ðÒÔ»»È¡½âÃÜÃÜÔ¿ºÍ²»Ðû²¼Êý¾ÝµÄÔÊÐí¡£¡£¡£×ÅÃûÊܺ¦Õß°üÀ¨ÈÕ±¾µç²úÖêʽ»áÉçºÍÁªºÏ¹ú¿ª·¢ÍýÏëÊ𡣡£¡£´Ë´ÎÐж¯Åú×¢£¬£¬£¬£¬£¬£¬È«ÇòÖ´·¨²¿·ÖÕýÔÚÔöÇ¿ÏàÖú¹¥»÷ÀÕË÷Èí¼þ·¸·¨¡£¡£¡£
https://www.bleepingcomputer.com/news/legal/police-arrests-4-phobos-ransomware-suspects-seizes-8base-sites/
4. Lee Enterprises±¨Òµ¼¯ÍÅÔâÍøÂç¹¥»÷ÖÂÔËÓªÖÐÖ¹
2ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹ú±¨Òµ¼¯ÍÅLee EnterprisesÔÚ2025Äê2ÔÂ3ÈÕÔâÊÜÁËÒ»´ÎÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäÓªÒµÔËÓªÖÐÖ¹¡£¡£¡£´Ë´Î¹¥»÷ÆÈʹ¸Ã¹«Ë¾¹Ø±ÕÁËÐí¶àÍøÂ磬£¬£¬£¬£¬£¬ÈÅÂÒÁËÊýÊ®ÖÖ±¨Ö½µÄÓ¡Ë¢ºÍ¿¯ÐУ¬£¬£¬£¬£¬£¬²¢ÇÒʹµÃ¼ÇÕߺͱà¼ÎÞ·¨»á¼ûËûÃǵÄÎļþ¡£¡£¡£¸Ã¹«Ë¾ÔÚÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄÎļþÖÐÈ·ÈÏÁ˴˴ι¥»÷£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÕýÔÚÊÓ²ìÄÄЩÐÅÏ¢¿ÉÄÜÊܵ½Ó°Ïì¡£¡£¡£¶à¼ÒLee Enterprises³öÊéÎïÔÚÍøÕ¾¶¥²¿ÏÔʾά»¤ºá·ù£¬£¬£¬£¬£¬£¬Ïò¶ÁÕßÖÂǸ²¢ÌåÏÖÕýÔÚÆð¾¢½â¾öÎÊÌâ¡£¡£¡£Lee EnterprisesÔÚ26¸öÖݳöÊé77·ÝÈÕ±¨ºÍ350·ÝÖÜ¿¯¼°×¨Òµ¿¯Î£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý120ÍòµÄÈÕ¿¯ÐÐÁ¿ºÍÁè¼Ý4400ÍòµÄÊý×Ö°æ×ÔÁ¦·Ã¿Í¡£¡£¡£ÎåÄêǰ£¬£¬£¬£¬£¬£¬¸Ã¼¯ÍÅÒ²ÔøÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ÆäʱÒÁÀʺڿÍÈëÇÖÁËÆäÍøÂç×÷ΪÈö²¥ÐéαÐÅÏ¢»î¶¯µÄÒ»²¿·Ö¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cyberattack-disrupts-lee-newspapers-operations-across-the-us/
5. Facebook³ÉÍøÂç´¹ÂÚÐÂÄ¿µÄ£¬£¬£¬£¬£¬£¬Êý°Ù¼ÒÆóÒµÓʼþµØµãÔâÐ®ÖÆ
2ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬Check Point ResearchµÄ×îÐÂÑо¿ÏÔʾ£¬£¬£¬£¬£¬£¬È«ÇòÁìÏȵÄÉ罻ýÌåÆ½Ì¨Facebook³ÉΪÁËÐÂÒ»ÂÖÍøÂç´¹ÂڻµÄÄ¿µÄ£¬£¬£¬£¬£¬£¬¸Ã»î¶¯Ö¼ÔÚÇÔÈ¡Êý°Ù¼ÒÆóÒµµÄ12,000¶à¸öµç×ÓÓʼþµØµã¡£¡£¡£´Ë´Î¹¥»÷»î¶¯Ê¼ÓÚ2024Äê12ÔÂ20ÈÕ×óÓÒ£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÅ·ÃË¡¢ÃÀ¹úºÍ°Ä´óÀûÑǵĹ«Ë¾£¬£¬£¬£¬£¬£¬µ«Ò²Ó°Ïìµ½ÁËÈ«ÇòÆäËûµØÇø¡£¡£¡£Õ©ÆÕßʹÓÃSalesforceµÄ×Ô¶¯ÓʼþЧÀÍ·¢ËÍÓÕÆÐÔµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬ÓʼþÖдøÓÐð³äµÄFacebook»Õ±ê£¬£¬£¬£¬£¬£¬²¢Ö¸¿ØÊÕ¼þÈËÇÖÕ¼°æÈ¨¡£¡£¡£³ý·ÇÊÕ¼þÈËÔÚ¶Ìʱ¼äÄÚÌá³öÒìÒ飬£¬£¬£¬£¬£¬²»È»½«ÃæÁÙÕË»§ÏÞÖÆµÄÍþв¡£¡£¡£ÓʼþÖаüÀ¨ÐéαµÄFacebookÖ§³ÖÒ³ÃæÁ´½Ó£¬£¬£¬£¬£¬£¬ÓÕÆÊܺ¦ÕßÊäÈëµÇ¼ƾ֤£¬£¬£¬£¬£¬£¬´Ó¶øÌáÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£ÕâÖÖÓÕÆÐÐΪÍþв×ÅÈ«ÇòÒÀÀµFacebookµÄÆóÒµ£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÆäÖÎÀíÔ±ÕË»§±»¿ØÖÆ¡¢ÄÚÈݱ»¸ü¸Ä¡¢ÐÂÎű»Ê¹Óá¢Ìû×Ó±»É¾³ýºÍÇå¾²ÉèÖñ»Ð޸쬣¬£¬£¬£¬£¬½ø¶øÔì³É¿Í»§ÐÅÈζÈϽµ¡¢¿Í»§Á÷ʧºÍDZÔÚµÄÖ´·¨ËßËϵÈЧ¹û¡£¡£¡£¹ØÓÚÒ½ÁƱ£½¡ºÍ½ðÈÚµÈÊÜî¿ÏµÐÐÒµµÄÆóÒµÀ´Ëµ£¬£¬£¬£¬£¬£¬»¹¿ÉÄܵ¼Ö²»¶Ô¹æ¡¢·£¿£¿£¿£¿£¿îºÍÖ´·¨ÌôÕ½¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬×é֯ӦʵÑéÃ÷È·µÄÊÂÎñÏìÓ¦ÍýÏ룬£¬£¬£¬£¬£¬ÒÔ½µµÍÊܵ½¹¥»÷µÄΣº¦¡£¡£¡£
https://hackread.com/scammers-use-fake-facebook-copyright-notices-to-hijack-accounts/
6. ¼ÍÄîÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬12Íò»¼ÕßÐÅÏ¢Ôâй¶
2ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬×ôÖÎÑÇÖݰ಼ÀïÆæµÄÒ»¼ÒСÐÍÐæÂäÒ½Ôº¼ÍÄîÒ½ÔººÍׯ԰ÔÚ2024Äê11ÔÂÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäϵͳ̱»¾£¬£¬£¬£¬£¬£¬²»µÃ²»½ÓÄÉÖ½ÖÊÁ÷³Ì¼Í¼»¼ÕßÐÅÏ¢¡£¡£¡£Ö»¹ÜÔËӪδÖÐÖ¹£¬£¬£¬£¬£¬£¬µ«ÆÚ´ýʱ¼äÑÓÉì¡£¡£¡£¹¥»÷Õ߾ݳƴÓҽԺϵͳÖÐÇÔÈ¡ÁË1.15TBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬²¢ÔÚTorйÃÜÍøÕ¾ÉϹûÕæ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨120,085È˵ÄСÎÒ˽¼ÒÐÅÏ¢ºÍ¿µ½¡ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÈçÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢²¡Ê·¡¢ÖÎÁÆÐÅÏ¢ºÍ¿µ½¡°ü¹ÜÐÅÏ¢¡£¡£¡£EmbargoÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¼ÍÄîÒ½ÔºÒÑÏòÊÜÓ°ÏìСÎÒ˽¼Ò·¢ËÍÊéÃæÍ¨Öª£¬£¬£¬£¬£¬£¬²¢Ìṩ12¸öÔµÄÃâ·ÑÉí·Ý±£»£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£Ö»¹ÜÏÖÔÚûÓÐÖ¤¾ÝÅúעСÎÒ˽¼ÒÐÅÏ¢±»ÀÄÓ㬣¬£¬£¬£¬£¬µ«ÓÉÓÚÊý¾Ý¿É¹ûÕæÏÂÔØ£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìÈËȺ¿ÉÄÜÃæÁÙÍøÂç´¹ÂÚºÍÆäËûÀàÐ͹¥»÷µÄΣº¦¡£¡£¡£
https://www.securityweek.com/information-of-120000-stolen-in-ransomware-attack-on-georgia-hospital/