ºÚ¿ÍÉù³ÆÈëÇÖCheck PointÍøÂçÇå¾²¹«Ë¾²¢³öÊÛÃô¸ÐÊý¾Ý
Ðû²¼Ê±¼ä 2025-04-011. ºÚ¿ÍÉù³ÆÈëÇÖCheck PointÍøÂçÇå¾²¹«Ë¾²¢³öÊÛÃô¸ÐÊý¾Ý
4ÔÂ1ÈÕ£¬£¬£¬£¬ºÚ¿Í×éÖ¯CoreInjectionÐû³ÆÈëÇÖÒÔÉ«ÁÐÍøÂçÇå¾²¾ÞÍ·Check Point£¬£¬£¬£¬ÔÚ°µÍøÂÛ̳ÒÔ5±ÈÌØ±Ò£¨Ô¼ºÏ43.45ÍòÃÀÔª£©¶µÊÛÃô¸ÐÊý¾Ý¡£¡£¡£¸Ã×éÖ¯ÓÚ2025Äê3ÔÂ30ÈÕͨ¹ýBreach ForumsÐû²¼ÉùÃ÷£¬£¬£¬£¬Éù³ÆÕÆÎÕCheck PointÄÚ²¿ÏîÄ¿Îĵµ¡¢Óû§Æ¾Ö¤£¨º¬Ã÷ÎÄÃÜÂ룩¡¢ÍøÂç¼Ü¹¹Í¼¡¢Ô´´úÂë¼°Ô±¹¤ÁªÏµÐÅÏ¢µÈ½¹µãÊý¾Ý£¬£¬£¬£¬½ö½ÓÊܼÓÃÜÇ®±ÒÉúÒⲢͨ¹ýTOXͨѶ¹¤¾ßÁªÏµ¡£¡£¡£Check PointѸËÙ»ØÓ¦£¬£¬£¬£¬·ñ¶¨½üÆÚ±¬·¢´ó¹æÄ£ÈëÇÖ£¬£¬£¬£¬³ÆÖ¸¿ØÔ´ÓÚÊýÔÂǰÒÑ´¦Öóͷ£µÄÁæØêÊÂÎñ£¬£¬£¬£¬½öÉæ¼°·Ç½¹µãϵͳÇÒδӰÏì¿Í»§Êý¾Ý¡£¡£¡£¹«Ë¾Ç¿µ÷±»ÈëÇÖµÄÃÅ»§Î´´¥¼°Éú²úÇéÐΣ¬£¬£¬£¬ÊÜÓ°Ïì×éÖ¯ÒÑÐÞ¸´Îó²î£¬£¬£¬£¬°µÍøÊÛÂôÊý¾ÝʵΪ¾ÉÐÅÏ¢½ÓÄÉ¡£¡£¡£CoreInjection×Ô3ÔÂ15ÈÕÏÖÉíBreach ForumsÒÔÀ´£¬£¬£¬£¬ÒѶà´ÎÕë¶ÔÒÔÉ«ÁÐÒªº¦»ù´¡ÉèÊ©Ìᳫ¹¥»÷£¬£¬£¬£¬Õ¹ÏÖ³ö¶Ô¸ß¼ÛֵĿµÄµÄ¾«×¼¹¥»÷ÄÜÁ¦¡£¡£¡£Æä¹¥»÷ģʽÏÔʾÓëµØÔµÕþÖθ߶ȹØÁª£¬£¬£¬£¬Òý·¢¶ÔDZÔÚÎïÀíÆÆËð¹¥»÷µÄµ£ÐÄ¡£¡£¡£Ö»¹ÜCheck Pointµ»¯ÊÂÎñÓ°Ï죬£¬£¬£¬µ«ºÚ¿ÍÅû¶µÄÄÚ²¿¼Ü¹¹Í¼¡¢Î´¼ÓÃÜÆ¾Ö¤¼°Ô´´úÂëµÈϸ½Ú£¬£¬£¬£¬ÈÔÒý·¢Íâ½ç¶ÔÈëÇÖÉî¶ÈµÄÖÊÒÉ¡£¡£¡£±ðµÄ£¬£¬£¬£¬Check Pointδ¹ûÕæÈëÇÖ·½·¨¡¢Îó²îÀàÐͼ°×·ÔðÏ£Íû£¬£¬£¬£¬Æä͸Ã÷¶Èȱ·¦¿ÉÄÜÏ÷ÈõÐÐÒµÐÅÈΡ£¡£¡£
https://hackread.com/hacker-breach-check-point-cybersecurity-firm-access/
2. LazarusºÚ¿Í×éÖ¯½ÓÄÉClickFixÕ½ÂÔ¹¥»÷¼ÓÃÜÇ®±ÒÇóÖ°Õß
3ÔÂ31ÈÕ£¬£¬£¬£¬³¯ÏÊLazarusºÚ¿Í×éÖ¯½üÆÚÉý¼¶Á˶ԼÓÃÜÇ®±ÒÁìÓòÇóÖ°Õߵ͍Ïò¹¥»÷Õ½ÂÔ£¬£¬£¬£¬½ÓÄÉClickFixÊÖÒÕʵÑéѬȾÐÔÃæÊԻ¡£¡£¡£¸Ã×é֯ð³äCoinbase¡¢KrakenµÈ14¼Ò×ÅÃû¼ÓÃܽðÈÚÆóÒµ£¬£¬£¬£¬Í¨¹ýÐéαְλÓÕÆÇóÖ°Õß»á¼ûº¬¶ñÒâ´úÂëµÄÃæÊÔÍøÕ¾¡£¡£¡£µ±Êܺ¦ÕßʵÑéÂ¼ÖÆÊÓÆµ»Ø¸²ÃæÊÔÎÊÌâʱ£¬£¬£¬£¬ÍøÕ¾»áµ¯³öÐéαϵͳ¹ýʧÌáÐÑ£¬£¬£¬£¬ÒªÇóÓû§Ö´ÐÐÌØ¶¨²Ù×÷ϵͳµÄÖÕ¶ËÏÂÁîÒÔÐÞ¸´ÉãÏñÍ·Çý¶¯ÎÊÌâ¡£¡£¡£ÕâЩÏÂÁîÏÖʵ»áÏÂÔØÃûΪGolangGhostµÄGoÓïÑÔºóÃųÌÐò£¬£¬£¬£¬Í¨¹ýÐÞ¸Ä×¢²á±í»òLaunchAgentʵÏÖϵͳפÁô¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ß±¸ÇÔÈ¡Chromeä¯ÀÀÆ÷Cookie¡¢ä¯ÀÀÀúÊ·¡¢´æ´¢ÃÜÂ뼰ϵͳԪÊý¾ÝµÄÄÜÁ¦£¬£¬£¬£¬²¢Óë¹¥»÷Õß¿ØÖƵÄC2ЧÀÍÆ÷½¨Éè¼ÓÃÜͨѶ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬Lazarus½«¹¥»÷Ä¿µÄ´ÓÊÖÒÕ¿ª·¢Ö°Ô±À©Õ¹ÖÁÓªÒµ¿ª·¢¡¢Êг¡ÓªÏúµÈ·ÇÊÖÒÕ¸ÚλְԱ£¬£¬£¬£¬Ê¹ÓÃReactJS¹¹½¨¸ß·ÂÆóÒµÕÐÆ¸Ò³ÃæÔöÇ¿ÓÕÆÐÔ¡£¡£¡£¹¥»÷Á´Ê¼ÓÚLinkedInµÈÉ罻ƽ̨µÄÆóÒµÕ˺Åαװ£¬£¬£¬£¬Í¨¹ýGitHubµÈƽ̨ÍйܶñÒâ±àÂë²âÊÔÏîÄ¿£¬£¬£¬£¬×îÖÕÓÕµ¼Êܺ¦Õß×Ô¶¯Ö´Ðй¥»÷ÔØºÉ¡£¡£¡£·ÀÓù½¨ÒéÇ¿µ÷ÇóÖ°ÕßÐèÑÏ¿áÑéÖ¤ÃæÊÔÔ¼ÇëȪԴ£¬£¬£¬£¬×èÖ¹Ö´ÐÐÈκÎδ֪ÖÕ¶ËÏÂÁ£¬£¬£¬ÆóÒµÔòÓ¦°²ÅÅYara¹æÔò¼ì²âÒì³£Àú³Ì£¬£¬£¬£¬²¢¼à¿Ø×¢²á±í/plistÎļþ±ä»»¡£¡£¡£
https://www.bleepingcomputer.com/news/security/north-korean-hackers-adopt-clickfix-attacks-to-target-crypto-firms/
3. ¹ú·À³Ð°üÉÌNDC¼°AMTECÔâºÚ¿Í¹¥»÷ϵͳ±»¼ÓÃÜ
3ÔÂ31ÈÕ£¬£¬£¬£¬¹ú·À³Ð°üÉÌNDC¼°Æäµ¯Ò©ÖÆÔì×Ó¹«Ë¾AMTEC½üÆÚÔâÓöÖØ´óÍøÂç¹¥»÷ÊÂÎñ¡£¡£¡£¾Ý°µÍøÐ¹ÃÜ×éÖ¯InterLockÐû³Æ£¬£¬£¬£¬ÒÑÀÖ³ÉÈëÇÖNDC¼°Æä¹ØÁªÏµÍ³£¬£¬£¬£¬ÇÔÈ¡4,200GBÃô¸ÐÊý¾Ý£¬£¬£¬£¬°üÀ¨290ÓàÍò·ÝÎļþ¼°45Íò¸öÎļþ¼Ð¡£¡£¡£¹¥»÷Õßͨ¹ý°µÍøÆ½Ì¨Ðû²¼²¿·Ö½ØÍ¼×÷Ϊ×ôÖ¤£¬£¬£¬£¬²¢Ö¸³öÒѶÔAMTEC¡¢Tech Ord¼°PRESTOϵͳʵÑéͨÅ̼ÓÃÜ¡£¡£¡£×÷ΪNational Presto IndustriesÈ«×Ê×Ó¹«Ë¾£¬£¬£¬£¬NDCÖ÷Óª¾üÓÃ/¾¯Óõ¯Ò©Éú²ú£¬£¬£¬£¬¾ß±¸Ï¸ÃÜ×é×°¡¢Õ¨Ò©×°ÔصȽ¹µãÄÜÁ¦¡£¡£¡£Æä×Ó¹«Ë¾AMTEC¸üÊÇÈ«Çò40ºÁÃ×Áñµ¯µ¯Ò©¼°ÒýÐŵÄ×î´óÅúÁ¿¹©Ó¦ÉÌ¡£¡£¡£InterLockÅû¶µÄNDCÄÚ²¿ÏàͬÄÚÈÝÏÔʾ£¬£¬£¬£¬Ö»¹Ü¹«Ë¾Éù³ÆÒÑÏòÕþ¸®»ú¹¹ºÍ¹«ÖÚÅû¶ÊÂÎñ£¬£¬£¬£¬µ«¹ûÕæÇþµÀδ¼ûÏà¹ØÍ¨¸æ¡£¡£¡£NDCÔÚ»ØÓ¦Öе»¯Êý¾Ý¼ÛÖµ£¬£¬£¬£¬Ç¿µ÷ÆäÉú²úµÄµÍÊÖÒÕÉÌÆ·Éè¼ÆÄêÔ¾ÃÔ¶£¬£¬£¬£¬±»µÁÐÅÏ¢¶ÔµÚÈý·½Ê¹ÓüÛÖµÓÐÏÞ£¬£¬£¬£¬Í¬Ê±Í¸Â¶ÒÑͶ±£ÁýÕÖDZÔÚËðʧ¡£¡£¡£Ä¸¹«Ë¾±¨¸æÔòÈÏ¿ÉÊÂÎñ¶Ô²ÆÎñ¼°ÔËÓª¿ÉÄÜÔì³ÉÖØ´óÓ°Ï죬£¬£¬£¬ÏÖÔÚ·¨Ö¤ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬InterLockÖ¸¿ØNDCÇå¾²¼à¿Ø±£´æÊè©£¬£¬£¬£¬³ÆÆäδ±»·¢Ã÷»òÇýÖð³öϵͳ¡£¡£¡£´Ë´Î¹¥»÷²»µ«Ôì³ÉÉú²ú¡¢ÎïÁ÷µÈÔËÓª¹¦Ð§ÔÝʱ̱»¾£¬£¬£¬£¬¸ü̻¶ÁËÒªº¦»ù´¡ÉèÊ©ÍøÂçÇå¾²·À»¤µÄųÈõÐÔ¡£¡£¡£
https://databreaches.net/2025/03/31/national-defense-corporation-victim-of-ransomware-attack-discloses-breach-and-declines-to-pay-any-ransom/
4. ÈýÐǵ¹úƱÎñϵͳÒòƾ֤ʧÔôÖÂ27Íò¿Í»§Êý¾Ýй¶
3ÔÂ31ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Hudson RockÅû¶ÈýÐǵ¹úƱÎñϵͳÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ÍþвÐÐΪÕßGHNAʹÓñ»µÁÕË»§Æ¾Ö¤ÇÔȡԼ27ÍòÌõ¿Í»§¼Í¼¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬Ð¹Â¶Ô´Í·¿É×·ËÝÖÁ2021ÄêSpectos GmbHÔ±¹¤×°±¸Ñ¬È¾µÄRacoonÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬¸ÃÕË»§±¾ÓÃÓÚ¼à¿ØÐ§ÀÍÖÊÁ¿£¬£¬£¬£¬µ«Ïà¹ØµÇ¼ƾ֤ºã¾ÃδÂÖ»»£¬£¬£¬£¬ÏÐÖÃËÄÄêºó³ÉΪ¹¥»÷Í»ÆÆ¿Ú¡£¡£¡£´Ë´Îй¶Êý¾Ýº¸Ç¿Í»§ÐÕÃû¡¢µØµã¡¢ÓÊÏäµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬ÒÔ¼°ÉúÒâ¼Í¼¡¢¶©µ¥ºÅ¡¢¸ú×ÙÁ´½ÓºÍÖ§³ÖÏàͬÄÚÈÝ¡£¡£¡£Hudson RockÖÒÑÔ£¬£¬£¬£¬´ËÀàÐÅÏ¢¿É±»ÓÃÓÚ¾«×¼ÍøÂç´¹ÂÚ¹¥»÷¡¢Ðéα¿Í»§Ö§³ÖÕ©Æ¡¢Î±Ôì±£ÐÞË÷Åâ¼°ÎïÀí͵ÇԵȷ¸·¨»î¶¯¡£¡£¡£¹¥»÷ÕßÉõÖÁ¿ÉÄÜÔËÓÃAIÊÖÒÕʶ±ð¸ß¼ÛֵĿµÄ£¬£¬£¬£¬ÊµÑ鶍֯»¯Ú²Æ¡£¡£¡£ÆÊÎö±¨¸æÖ¸³ö£¬£¬£¬£¬Æ¾Ö¤ÖÎÀíÊèʧÊÇÊÂÎñÖ÷Òò£¬£¬£¬£¬ÀàËÆÎÊÌâÔøµ¼Ö½ݱªÂ·»¢¡¢Ê©ÄÍµÂµçÆøµÈ¶à¼ÒÆóÒµÔâÏ®¡£¡£¡£Hudson RockÇ¿µ÷£¬£¬£¬£¬ÐÅÏ¢ÇÔÈ¡Íþв¾ßÓÐDZÔÚÐÔ£¬£¬£¬£¬ÆóÒµÐ轨ÉèÒ»Á¬Æ¾Ö¤¼à¿Ø»úÖÆ£¬£¬£¬£¬¶ø·Ç½öÒÀÀµÊºóµ÷½â¡£¡£¡£¸Ã»ú¹¹½¨Òé×Ô¶¯×·×Ù±»µÁƾ֤Ӧ³ÉΪÇå¾²Õ½ÂÔ½¹µã£¬£¬£¬£¬¶ø·Ç±»¶¯Ó¦¶ÔÎó²î¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬ÈýÐÇÉÐδ¾Í´ËÊÂÎñ×÷³ö¹Ù·½»ØÓ¦£¬£¬£¬£¬ºóÐøÏ£ÍûÈÔÐèÒ»Á¬¹Ø×¢¡£¡£¡£
https://www.securityweek.com/hacker-leaks-samsung-customer-data/
5. ÌïÄÉÎ÷ÑÀ¿Æ¼¯ÍÅÓʼþÈëÇÖÖÂ17Íò»¼ÕßÊý¾Ýй¶
3ÔÂ31ÈÕ£¬£¬£¬£¬ÌïÄÉÎ÷ÖÝÑÀ¿ÆÐ§Àͼ¯ÍÅChord Specialty Dental Partners£¨º¬CDHA ManagementºÍSpark DSO£©¿ËÈÕÅû¶ÔâÓöµç×ÓÓʼþϵͳÇå¾²ÊÂÎñ£¬£¬£¬£¬Ó°Ïì¹æÄ£ÁýÕÖÆäÔÚÃÀ¹úÁù¸öÖÝÔËÓªµÄ60Óà¼ÒÕïËù¡£¡£¡£¾ÝÆóҵͨ¸æ£¬£¬£¬£¬2024Äê8ÔÂ18ÈÕÖÁ9ÔÂ25ÈÕʱ´ú£¬£¬£¬£¬¶à¸öÔ±¹¤ÓÊÏäÔâδ¾ÊÚȨ»á¼û£¬£¬£¬£¬´æ´¢µÄÃô¸ÐÐÅÏ¢°üÀ¨»¼ÕßÐÕÃû¡¢×¡Ö·¡¢³öÉúÈÕÆÚ¡¢Éç±£ºÅ¡¢¼ÝÕպš¢ÒøÐÐÕË»§¼°Ö§¸¶¿¨Êý¾Ý¡¢Ò½ÁƼͼºÍ¿µ½¡°ü¹ÜÏêÇéµÈ¡£¡£¡£Ö»¹ÜÆóÒµÉùÃ÷ÏÖÔÚδ·¢Ã÷ÐÅÏ¢±»¶ñÒâÀÄÓõÄÖ¤¾Ý£¬£¬£¬£¬µ«ÈÔÇ¿µ÷ÎÞ·¨É¨³ýÊý¾ÝÒѱ»»ñÈ¡µÄ¿ÉÄÜÐÔ¡£¡£¡£´Ë´ÎÊÂÎñ²¨¼°³¬17.3ÍòÃû»¼Õߣ¬£¬£¬£¬ChordÒÑÏòHHS±¨±¸£¬£¬£¬£¬²¢ÔÊÐíΪÊÜÓ°ÏìÕßÌṩÐÅÓÃ¼à¿Ø¼°Éí·Ý±£»£»£»¤Ð§ÀÍ¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬£¬Ò½ÁÆ»ú¹¹Òò´æ´¢´ó×ڸ߼ÛֵСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢£¬£¬£¬£¬ºã¾Ã³ÉÎªÍøÂç¹¥»÷ÖØµãÄ¿µÄ¡£¡£¡£µç×ÓÓʼþ×÷Ϊ³£¼û¹¥»÷Èë¿Ú£¬£¬£¬£¬ÆäÕË»§Çå¾²·À»¤±¡ÈõÐÔÍùÍù³ÉΪΣº¦Í»ÆÆ¿Ú¡£¡£¡£´ËÀàÊÂÎñ¾¯Ê¾Ò½ÁÆ×éÖ¯ÐèÇ¿»¯ÓÊÏäϵͳµÄ¶àÒòËØÈÏÖ¤¡¢°´ÆÚÉ󼯼°ÈëÇÖ¼ì²â»úÖÆ£¬£¬£¬£¬Í¬Ê±½¨ÉèÍêÕûµÄÊÂÎñÏìÓ¦Ô¤°¸ÒÔ±£»£»£»¤»¼ÕßÊý¾ÝÇå¾²¡£¡£¡£
https://www.securityweek.com/170000-impacted-by-data-breach-at-chord-specialty-dental-partners/
6. CISA½«Ë¼¿ÆÖÇÄÜÔÊÐíÎó²îÁÐÈ뱻ʹÓÃĿ¼²¢ÉèÐÞ¸´ÏÞÆÚ
3ÔÂ31ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Ë¼¿ÆÖÇÄÜÔÊÐí¹¤¾ßµÄÁ½Ïî¸ßΣÎó²î£¨CVE-2024-20439ºÍCVE-2024-20440£©ÁÐÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ2025Äê4ÔÂ21ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£Îó²îϸ½ÚÏÔʾ£¬£¬£¬£¬CVE-2024-20439Ϊ¾²Ì¬Æ¾Ö¤ºóÃÅ£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÔ¤ÉèÖÎÀíÔ±ÕË»§ÎÞÑéÖ¤µÇ¼ϵͳ£»£»£»CVE-2024-20440ΪÐÅϢй¶Îó²î£¬£¬£¬£¬Í¨¹ý½á¹¹HTTPÇëÇó¿É»ñÈ¡º¬Ãô¸ÐÊý¾ÝµÄµ÷ÊÔÈÕÖ¾£¬£¬£¬£¬°üÀ¨API»á¼ûƾ֤¡£¡£¡£Ë¼¿ÆÒÑÐû²¼Çå¾²¸üУ¬£¬£¬£¬µ«SANS»¥ÁªÍø·ç±©ÖÐÐÄÖÒÑÔ£¬£¬£¬£¬Îó²îϸ½Ú¹ûÕæºóÒÑ·ºÆð»îԾʹÓü£Ï󣬣¬£¬£¬¹¥»÷Õß¿ÉÄÜÁ¬ÏµÆäËûÎó²î£¨ÈçCVE-2024-0305£©À©´ó¹¥»÷Ãæ¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬£¬ÕâÁ½¸öÎó²î±£´æ¹ØÁª£ººóÃÅÆ¾Ö¤¿ÉÖ±½Ó»á¼ûÈÕÖ¾Îļþ£¬£¬£¬£¬¶øÌ«¹ý¼Í¼µÄÈÕÖ¾ÓÖ̻¶¸ü¶àϵͳÐÅÏ¢¡£¡£¡£Ö»¹ÜÎó²îÅû¶³õÆÚδ¼û¹ûÕæÊ¹Ó㬣¬£¬£¬µ«ÊÖÒÕϸ½ÚÍâй¼ÓËÙÁ˹¥»÷ÉìÕÅ¡£¡£¡£Æ¾Ö¤CISAµÄÔ¼ÊøÐÔ²Ù×÷Ö¸ÁîBOD 22-01£¬£¬£¬£¬Áª°î»ú¹¹ÐèÑÏ¿á×ñÊØÐÞ¸´Ê±ÏÞ£¬£¬£¬£¬Ë½Óª²¿·ÖÒà±»½¨ÒéÁ¬Ã¦Éó²éÍøÂç»ù´¡ÉèÊ©£¬£¬£¬£¬ÓÅÏÈÐÞ²¹ÕâЩҪº¦Îó²î¡£¡£¡£
https://securityaffairs.com/176073/hacking/u-s-cisa-adds-cisco-smart-licensing-utility-flaw-known-exploited-vulnerabilities-catalog.html