ºÚ¿ÍÉù³ÆÈëÇÖCheck PointÍøÂçÇå¾²¹«Ë¾²¢³öÊÛÃô¸ÐÊý¾Ý

Ðû²¼Ê±¼ä 2025-04-01

1. ºÚ¿ÍÉù³ÆÈëÇÖCheck PointÍøÂçÇå¾²¹«Ë¾²¢³öÊÛÃô¸ÐÊý¾Ý


4ÔÂ1ÈÕ£¬£¬£¬ £¬ºÚ¿Í×éÖ¯CoreInjectionÐû³ÆÈëÇÖÒÔÉ«ÁÐÍøÂçÇå¾²¾ÞÍ·Check Point£¬£¬£¬ £¬ÔÚ°µÍøÂÛ̳ÒÔ5±ÈÌØ±Ò£¨Ô¼ºÏ43.45ÍòÃÀÔª£©¶µÊÛÃô¸ÐÊý¾Ý¡£¡£¡£¸Ã×éÖ¯ÓÚ2025Äê3ÔÂ30ÈÕͨ¹ýBreach ForumsÐû²¼ÉùÃ÷£¬£¬£¬ £¬Éù³ÆÕÆÎÕCheck PointÄÚ²¿ÏîÄ¿Îĵµ¡¢Óû§Æ¾Ö¤£¨º¬Ã÷ÎÄÃÜÂ룩¡¢ÍøÂç¼Ü¹¹Í¼¡¢Ô´´úÂë¼°Ô±¹¤ÁªÏµÐÅÏ¢µÈ½¹µãÊý¾Ý£¬£¬£¬ £¬½ö½ÓÊܼÓÃÜÇ®±ÒÉúÒⲢͨ¹ýTOXͨѶ¹¤¾ßÁªÏµ¡£¡£¡£Check PointѸËÙ»ØÓ¦£¬£¬£¬ £¬·ñ¶¨½üÆÚ±¬·¢´ó¹æÄ£ÈëÇÖ£¬£¬£¬ £¬³ÆÖ¸¿ØÔ´ÓÚÊýÔÂǰÒÑ´¦Öóͷ£µÄÁæØêÊÂÎñ£¬£¬£¬ £¬½öÉæ¼°·Ç½¹µãϵͳÇÒδӰÏì¿Í»§Êý¾Ý¡£¡£¡£¹«Ë¾Ç¿µ÷±»ÈëÇÖµÄÃÅ»§Î´´¥¼°Éú²úÇéÐΣ¬£¬£¬ £¬ÊÜÓ°Ïì×éÖ¯ÒÑÐÞ¸´Îó²î£¬£¬£¬ £¬°µÍøÊÛÂôÊý¾ÝʵΪ¾ÉÐÅÏ¢½ÓÄÉ¡£¡£¡£CoreInjection×Ô3ÔÂ15ÈÕÏÖÉíBreach ForumsÒÔÀ´£¬£¬£¬ £¬ÒѶà´ÎÕë¶ÔÒÔÉ«ÁÐÒªº¦»ù´¡ÉèÊ©Ìᳫ¹¥»÷£¬£¬£¬ £¬Õ¹ÏÖ³ö¶Ô¸ß¼ÛֵĿµÄµÄ¾«×¼¹¥»÷ÄÜÁ¦¡£¡£¡£Æä¹¥»÷ģʽÏÔʾÓëµØÔµÕþÖθ߶ȹØÁª£¬£¬£¬ £¬Òý·¢¶ÔDZÔÚÎïÀíÆÆËð¹¥»÷µÄµ£ÐÄ¡£¡£¡£Ö»¹ÜCheck Pointµ­»¯ÊÂÎñÓ°Ï죬£¬£¬ £¬µ«ºÚ¿ÍÅû¶µÄÄÚ²¿¼Ü¹¹Í¼¡¢Î´¼ÓÃÜÆ¾Ö¤¼°Ô´´úÂëµÈϸ½Ú£¬£¬£¬ £¬ÈÔÒý·¢Íâ½ç¶ÔÈëÇÖÉî¶ÈµÄÖÊÒÉ¡£¡£¡£±ðµÄ£¬£¬£¬ £¬Check Pointδ¹ûÕæÈëÇÖ·½·¨¡¢Îó²îÀàÐͼ°×·ÔðÏ£Íû£¬£¬£¬ £¬Æä͸Ã÷¶Èȱ·¦¿ÉÄÜÏ÷ÈõÐÐÒµÐÅÈΡ£¡£¡£


https://hackread.com/hacker-breach-check-point-cybersecurity-firm-access/


2. LazarusºÚ¿Í×éÖ¯½ÓÄÉClickFixÕ½ÂÔ¹¥»÷¼ÓÃÜÇ®±ÒÇóÖ°Õß


3ÔÂ31ÈÕ£¬£¬£¬ £¬³¯ÏÊLazarusºÚ¿Í×éÖ¯½üÆÚÉý¼¶Á˶ԼÓÃÜÇ®±ÒÁìÓòÇóÖ°Õߵ͍Ïò¹¥»÷Õ½ÂÔ£¬£¬£¬ £¬½ÓÄÉClickFixÊÖÒÕʵÑéѬȾÐÔÃæÊԻ¡£¡£¡£¸Ã×é֯ð³äCoinbase¡¢KrakenµÈ14¼Ò×ÅÃû¼ÓÃܽðÈÚÆóÒµ£¬£¬£¬ £¬Í¨¹ýÐéαְλÓÕÆ­ÇóÖ°Õß»á¼ûº¬¶ñÒâ´úÂëµÄÃæÊÔÍøÕ¾¡£¡£¡£µ±Êܺ¦ÕßʵÑéÂ¼ÖÆÊÓÆµ»Ø¸²ÃæÊÔÎÊÌâʱ£¬£¬£¬ £¬ÍøÕ¾»áµ¯³öÐéαϵͳ¹ýʧÌáÐÑ£¬£¬£¬ £¬ÒªÇóÓû§Ö´ÐÐÌØ¶¨²Ù×÷ϵͳµÄÖÕ¶ËÏÂÁîÒÔÐÞ¸´ÉãÏñÍ·Çý¶¯ÎÊÌâ¡£¡£¡£ÕâЩÏÂÁîÏÖʵ»áÏÂÔØÃûΪGolangGhostµÄGoÓïÑÔºóÃųÌÐò£¬£¬£¬ £¬Í¨¹ýÐÞ¸Ä×¢²á±í»òLaunchAgentʵÏÖϵͳפÁô¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ß±¸ÇÔÈ¡Chromeä¯ÀÀÆ÷Cookie¡¢ä¯ÀÀÀúÊ·¡¢´æ´¢ÃÜÂ뼰ϵͳԪÊý¾ÝµÄÄÜÁ¦£¬£¬£¬ £¬²¢Óë¹¥»÷Õß¿ØÖƵÄC2ЧÀÍÆ÷½¨Éè¼ÓÃÜͨѶ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬Lazarus½«¹¥»÷Ä¿µÄ´ÓÊÖÒÕ¿ª·¢Ö°Ô±À©Õ¹ÖÁÓªÒµ¿ª·¢¡¢Êг¡ÓªÏúµÈ·ÇÊÖÒÕ¸ÚλְԱ£¬£¬£¬ £¬Ê¹ÓÃReactJS¹¹½¨¸ß·ÂÆóÒµÕÐÆ¸Ò³ÃæÔöÇ¿ÓÕÆ­ÐÔ¡£¡£¡£¹¥»÷Á´Ê¼ÓÚLinkedInµÈÉ罻ƽ̨µÄÆóÒµÕ˺Åαװ£¬£¬£¬ £¬Í¨¹ýGitHubµÈƽ̨ÍйܶñÒâ±àÂë²âÊÔÏîÄ¿£¬£¬£¬ £¬×îÖÕÓÕµ¼Êܺ¦Õß×Ô¶¯Ö´Ðй¥»÷ÔØºÉ¡£¡£¡£·ÀÓù½¨ÒéÇ¿µ÷ÇóÖ°ÕßÐèÑÏ¿áÑéÖ¤ÃæÊÔÔ¼ÇëȪԴ£¬£¬£¬ £¬×èÖ¹Ö´ÐÐÈκÎδ֪ÖÕ¶ËÏÂÁ£¬£¬ £¬ÆóÒµÔòÓ¦°²ÅÅYara¹æÔò¼ì²âÒì³£Àú³Ì£¬£¬£¬ £¬²¢¼à¿Ø×¢²á±í/plistÎļþ±ä»»¡£¡£¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-adopt-clickfix-attacks-to-target-crypto-firms/


3. ¹ú·À³Ð°üÉÌNDC¼°AMTECÔâºÚ¿Í¹¥»÷ϵͳ±»¼ÓÃÜ


3ÔÂ31ÈÕ£¬£¬£¬ £¬¹ú·À³Ð°üÉÌNDC¼°Æäµ¯Ò©ÖÆÔì×Ó¹«Ë¾AMTEC½üÆÚÔâÓöÖØ´óÍøÂç¹¥»÷ÊÂÎñ¡£¡£¡£¾Ý°µÍøÐ¹ÃÜ×éÖ¯InterLockÐû³Æ£¬£¬£¬ £¬ÒÑÀÖ³ÉÈëÇÖNDC¼°Æä¹ØÁªÏµÍ³£¬£¬£¬ £¬ÇÔÈ¡4,200GBÃô¸ÐÊý¾Ý£¬£¬£¬ £¬°üÀ¨290ÓàÍò·ÝÎļþ¼°45Íò¸öÎļþ¼Ð¡£¡£¡£¹¥»÷Õßͨ¹ý°µÍøÆ½Ì¨Ðû²¼²¿·Ö½ØÍ¼×÷Ϊ×ôÖ¤£¬£¬£¬ £¬²¢Ö¸³öÒѶÔAMTEC¡¢Tech Ord¼°PRESTOϵͳʵÑéͨÅ̼ÓÃÜ¡£¡£¡£×÷ΪNational Presto IndustriesÈ«×Ê×Ó¹«Ë¾£¬£¬£¬ £¬NDCÖ÷Óª¾üÓÃ/¾¯Óõ¯Ò©Éú²ú£¬£¬£¬ £¬¾ß±¸Ï¸ÃÜ×é×°¡¢Õ¨Ò©×°ÔصȽ¹µãÄÜÁ¦¡£¡£¡£Æä×Ó¹«Ë¾AMTEC¸üÊÇÈ«Çò40ºÁÃ×Áñµ¯µ¯Ò©¼°ÒýÐŵÄ×î´óÅúÁ¿¹©Ó¦ÉÌ¡£¡£¡£InterLockÅû¶µÄNDCÄÚ²¿ÏàͬÄÚÈÝÏÔʾ£¬£¬£¬ £¬Ö»¹Ü¹«Ë¾Éù³ÆÒÑÏòÕþ¸®»ú¹¹ºÍ¹«ÖÚÅû¶ÊÂÎñ£¬£¬£¬ £¬µ«¹ûÕæÇþµÀδ¼ûÏà¹ØÍ¨¸æ¡£¡£¡£NDCÔÚ»ØÓ¦Öе­»¯Êý¾Ý¼ÛÖµ£¬£¬£¬ £¬Ç¿µ÷ÆäÉú²úµÄµÍÊÖÒÕÉÌÆ·Éè¼ÆÄêÔ¾ÃÔ¶£¬£¬£¬ £¬±»µÁÐÅÏ¢¶ÔµÚÈý·½Ê¹ÓüÛÖµÓÐÏÞ£¬£¬£¬ £¬Í¬Ê±Í¸Â¶ÒÑͶ±£ÁýÕÖDZÔÚËðʧ¡£¡£¡£Ä¸¹«Ë¾±¨¸æÔòÈÏ¿ÉÊÂÎñ¶Ô²ÆÎñ¼°ÔËÓª¿ÉÄÜÔì³ÉÖØ´óÓ°Ï죬£¬£¬ £¬ÏÖÔÚ·¨Ö¤ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬InterLockÖ¸¿ØNDCÇå¾²¼à¿Ø±£´æÊè©£¬£¬£¬ £¬³ÆÆäδ±»·¢Ã÷»òÇýÖð³öϵͳ¡£¡£¡£´Ë´Î¹¥»÷²»µ«Ôì³ÉÉú²ú¡¢ÎïÁ÷µÈÔËÓª¹¦Ð§ÔÝʱ̱»¾£¬£¬£¬ £¬¸ü̻¶ÁËÒªº¦»ù´¡ÉèÊ©ÍøÂçÇå¾²·À»¤µÄųÈõÐÔ¡£¡£¡£


https://databreaches.net/2025/03/31/national-defense-corporation-victim-of-ransomware-attack-discloses-breach-and-declines-to-pay-any-ransom/


4. ÈýÐǵ¹úƱÎñϵͳÒòƾ֤ʧÔôÖÂ27Íò¿Í»§Êý¾Ýй¶


3ÔÂ31ÈÕ£¬£¬£¬ £¬ÍøÂçÇå¾²¹«Ë¾Hudson RockÅû¶ÈýÐǵ¹úƱÎñϵͳÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬ÍþвÐÐΪÕßGHNAʹÓñ»µÁÕË»§Æ¾Ö¤ÇÔȡԼ27ÍòÌõ¿Í»§¼Í¼¡£¡£¡£¾ÝÊӲ죬£¬£¬ £¬Ð¹Â¶Ô´Í·¿É×·ËÝÖÁ2021ÄêSpectos GmbHÔ±¹¤×°±¸Ñ¬È¾µÄRacoonÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬ £¬¸ÃÕË»§±¾ÓÃÓÚ¼à¿ØÐ§ÀÍÖÊÁ¿£¬£¬£¬ £¬µ«Ïà¹ØµÇ¼ƾ֤ºã¾ÃδÂÖ»»£¬£¬£¬ £¬ÏÐÖÃËÄÄêºó³ÉΪ¹¥»÷Í»ÆÆ¿Ú¡£¡£¡£´Ë´Îй¶Êý¾Ýº­¸Ç¿Í»§ÐÕÃû¡¢µØµã¡¢ÓÊÏäµÈÃô¸ÐÐÅÏ¢£¬£¬£¬ £¬ÒÔ¼°ÉúÒâ¼Í¼¡¢¶©µ¥ºÅ¡¢¸ú×ÙÁ´½ÓºÍÖ§³ÖÏàͬÄÚÈÝ¡£¡£¡£Hudson RockÖÒÑÔ£¬£¬£¬ £¬´ËÀàÐÅÏ¢¿É±»ÓÃÓÚ¾«×¼ÍøÂç´¹ÂÚ¹¥»÷¡¢Ðéα¿Í»§Ö§³ÖÕ©Æ­¡¢Î±Ôì±£ÐÞË÷Åâ¼°ÎïÀí͵ÇԵȷ¸·¨»î¶¯¡£¡£¡£¹¥»÷ÕßÉõÖÁ¿ÉÄÜÔËÓÃAIÊÖÒÕʶ±ð¸ß¼ÛֵĿµÄ£¬£¬£¬ £¬ÊµÑ鶍֯»¯Ú²Æ­¡£¡£¡£ÆÊÎö±¨¸æÖ¸³ö£¬£¬£¬ £¬Æ¾Ö¤ÖÎÀíÊèʧÊÇÊÂÎñÖ÷Òò£¬£¬£¬ £¬ÀàËÆÎÊÌâÔøµ¼Ö½ݱªÂ·»¢¡¢Ê©ÄÍµÂµçÆøµÈ¶à¼ÒÆóÒµÔâÏ®¡£¡£¡£Hudson RockÇ¿µ÷£¬£¬£¬ £¬ÐÅÏ¢ÇÔÈ¡Íþв¾ßÓÐDZÔÚÐÔ£¬£¬£¬ £¬ÆóÒµÐ轨ÉèÒ»Á¬Æ¾Ö¤¼à¿Ø»úÖÆ£¬£¬£¬ £¬¶ø·Ç½öÒÀÀµÊºóµ÷½â¡£¡£¡£¸Ã»ú¹¹½¨Òé×Ô¶¯×·×Ù±»µÁƾ֤Ӧ³ÉΪÇå¾²Õ½ÂÔ½¹µã£¬£¬£¬ £¬¶ø·Ç±»¶¯Ó¦¶ÔÎó²î¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬ £¬ÈýÐÇÉÐδ¾Í´ËÊÂÎñ×÷³ö¹Ù·½»ØÓ¦£¬£¬£¬ £¬ºóÐøÏ£ÍûÈÔÐèÒ»Á¬¹Ø×¢¡£¡£¡£


https://www.securityweek.com/hacker-leaks-samsung-customer-data/


5. ÌïÄÉÎ÷ÑÀ¿Æ¼¯ÍÅÓʼþÈëÇÖÖÂ17Íò»¼ÕßÊý¾Ýй¶


3ÔÂ31ÈÕ£¬£¬£¬ £¬ÌïÄÉÎ÷ÖÝÑÀ¿ÆÐ§Àͼ¯ÍÅChord Specialty Dental Partners£¨º¬CDHA ManagementºÍSpark DSO£©¿ËÈÕÅû¶ÔâÓöµç×ÓÓʼþϵͳÇå¾²ÊÂÎñ£¬£¬£¬ £¬Ó°Ïì¹æÄ£ÁýÕÖÆäÔÚÃÀ¹úÁù¸öÖÝÔËÓªµÄ60Óà¼ÒÕïËù¡£¡£¡£¾ÝÆóҵͨ¸æ£¬£¬£¬ £¬2024Äê8ÔÂ18ÈÕÖÁ9ÔÂ25ÈÕʱ´ú£¬£¬£¬ £¬¶à¸öÔ±¹¤ÓÊÏäÔâδ¾­ÊÚȨ»á¼û£¬£¬£¬ £¬´æ´¢µÄÃô¸ÐÐÅÏ¢°üÀ¨»¼ÕßÐÕÃû¡¢×¡Ö·¡¢³öÉúÈÕÆÚ¡¢Éç±£ºÅ¡¢¼ÝÕպš¢ÒøÐÐÕË»§¼°Ö§¸¶¿¨Êý¾Ý¡¢Ò½ÁƼͼºÍ¿µ½¡°ü¹ÜÏêÇéµÈ¡£¡£¡£Ö»¹ÜÆóÒµÉùÃ÷ÏÖÔÚδ·¢Ã÷ÐÅÏ¢±»¶ñÒâÀÄÓõÄÖ¤¾Ý£¬£¬£¬ £¬µ«ÈÔÇ¿µ÷ÎÞ·¨É¨³ýÊý¾ÝÒѱ»»ñÈ¡µÄ¿ÉÄÜÐÔ¡£¡£¡£´Ë´ÎÊÂÎñ²¨¼°³¬17.3ÍòÃû»¼Õߣ¬£¬£¬ £¬ChordÒÑÏòHHS±¨±¸£¬£¬£¬ £¬²¢ÔÊÐíΪÊÜÓ°ÏìÕßÌṩÐÅÓÃ¼à¿Ø¼°Éí·Ý±£»£»£»¤Ð§ÀÍ¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬ £¬Ò½ÁÆ»ú¹¹Òò´æ´¢´ó×ڸ߼ÛֵСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢£¬£¬£¬ £¬ºã¾Ã³ÉÎªÍøÂç¹¥»÷ÖØµãÄ¿µÄ¡£¡£¡£µç×ÓÓʼþ×÷Ϊ³£¼û¹¥»÷Èë¿Ú£¬£¬£¬ £¬ÆäÕË»§Çå¾²·À»¤±¡ÈõÐÔÍùÍù³ÉΪΣº¦Í»ÆÆ¿Ú¡£¡£¡£´ËÀàÊÂÎñ¾¯Ê¾Ò½ÁÆ×éÖ¯ÐèÇ¿»¯ÓÊÏäϵͳµÄ¶àÒòËØÈÏÖ¤¡¢°´ÆÚÉ󼯼°ÈëÇÖ¼ì²â»úÖÆ£¬£¬£¬ £¬Í¬Ê±½¨ÉèÍêÕûµÄÊÂÎñÏìÓ¦Ô¤°¸ÒÔ±£»£»£»¤»¼ÕßÊý¾ÝÇå¾²¡£¡£¡£


https://www.securityweek.com/170000-impacted-by-data-breach-at-chord-specialty-dental-partners/


6. CISA½«Ë¼¿ÆÖÇÄÜÔÊÐíÎó²îÁÐÈ뱻ʹÓÃĿ¼²¢ÉèÐÞ¸´ÏÞÆÚ


3ÔÂ31ÈÕ£¬£¬£¬ £¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Ë¼¿ÆÖÇÄÜÔÊÐí¹¤¾ßµÄÁ½Ïî¸ßΣÎó²î£¨CVE-2024-20439ºÍCVE-2024-20440£©ÁÐÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬ £¬ÒªÇóÁª°î»ú¹¹ÔÚ2025Äê4ÔÂ21ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£Îó²îϸ½ÚÏÔʾ£¬£¬£¬ £¬CVE-2024-20439Ϊ¾²Ì¬Æ¾Ö¤ºóÃÅ£¬£¬£¬ £¬¹¥»÷Õß¿ÉʹÓÃÔ¤ÉèÖÎÀíÔ±ÕË»§ÎÞÑéÖ¤µÇ¼ϵͳ£»£»£»CVE-2024-20440ΪÐÅϢй¶Îó²î£¬£¬£¬ £¬Í¨¹ý½á¹¹HTTPÇëÇó¿É»ñÈ¡º¬Ãô¸ÐÊý¾ÝµÄµ÷ÊÔÈÕÖ¾£¬£¬£¬ £¬°üÀ¨API»á¼ûƾ֤¡£¡£¡£Ë¼¿ÆÒÑÐû²¼Çå¾²¸üУ¬£¬£¬ £¬µ«SANS»¥ÁªÍø·ç±©ÖÐÐÄÖÒÑÔ£¬£¬£¬ £¬Îó²îϸ½Ú¹ûÕæºóÒÑ·ºÆð»îԾʹÓü£Ï󣬣¬£¬ £¬¹¥»÷Õß¿ÉÄÜÁ¬ÏµÆäËûÎó²î£¨ÈçCVE-2024-0305£©À©´ó¹¥»÷Ãæ¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬ £¬ÕâÁ½¸öÎó²î±£´æ¹ØÁª£ººóÃÅÆ¾Ö¤¿ÉÖ±½Ó»á¼ûÈÕÖ¾Îļþ£¬£¬£¬ £¬¶øÌ«¹ý¼Í¼µÄÈÕÖ¾ÓÖ̻¶¸ü¶àϵͳÐÅÏ¢¡£¡£¡£Ö»¹ÜÎó²îÅû¶³õÆÚδ¼û¹ûÕæÊ¹Ó㬣¬£¬ £¬µ«ÊÖÒÕϸ½ÚÍâй¼ÓËÙÁ˹¥»÷ÉìÕÅ¡£¡£¡£Æ¾Ö¤CISAµÄÔ¼ÊøÐÔ²Ù×÷Ö¸ÁîBOD 22-01£¬£¬£¬ £¬Áª°î»ú¹¹ÐèÑÏ¿á×ñÊØÐÞ¸´Ê±ÏÞ£¬£¬£¬ £¬Ë½Óª²¿·ÖÒà±»½¨ÒéÁ¬Ã¦Éó²éÍøÂç»ù´¡ÉèÊ©£¬£¬£¬ £¬ÓÅÏÈÐÞ²¹ÕâЩҪº¦Îó²î¡£¡£¡£


https://securityaffairs.com/176073/hacking/u-s-cisa-adds-cisco-smart-licensing-utility-flaw-known-exploited-vulnerabilities-catalog.html