MiraiбäÖÖʹÓÃCVE-2024-3721Îó²îÐ®ÖÆTBK DVR×°±¸

Ðû²¼Ê±¼ä 2025-06-09

1. MiraiбäÖÖʹÓÃCVE-2024-3721Îó²îÐ®ÖÆTBK DVR×°±¸


6ÔÂ8ÈÕ£¬£¬ £¬Mirai¶ñÒâÈí¼þ½©Ê¬ÍøÂç·ºÆðбäÖÖ£¬£¬ £¬ÕýʹÓÃTBK DVR-4104ºÍDVR-4216Êý×ÖÊÓÆµÂ¼ÖÆ×°±¸ÖеÄÏÂÁî×¢ÈëÎó²î¾ÙÐÐÐ®ÖÆ ¡£¡£¸ÃÎó²î±àºÅΪCVE-2024-3721£¬£¬ £¬ÓÉÇå¾²Ñо¿Ô±¡°netsecfish¡±ÓÚ2024Äê4ÔÂÅû¶£¬£¬ £¬Æä¿´·¨ÑéÖ¤£¨PoC£©ÒÔÏòÒ×Êܹ¥»÷¶Ëµã·¢ËÍÌØÖÆPOSTÇëÇóµÄÐÎʽ·ºÆð£¬£¬ £¬Í¨¹ýʹÓÃmdbºÍmdc²ÎÊýʵÏÖshellÏÂÁîÖ´ÐÐ ¡£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ù±¨¸æ³Æ£¬£¬ £¬ÔÚÆäLinuxÃÛ¹ÞÖз¢Ã÷ÁËÀ´×ÔÐÂMirai½©Ê¬ÍøÂç±äÖÖ¶Ô¸ÃÎó²îµÄ×Ô¶¯Ê¹Óà ¡£¡£¹¥»÷ÕßʹÓôËÎó²îÖ²ÈëARM32¶ñÒâÈí¼þ¶þ½øÖÆÎļþ£¬£¬ £¬¸ÃÎļþÓëÏÂÁîºÍ¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷½¨ÉèͨѶ£¬£¬ £¬½«×°±¸¼ÓÈë½©Ê¬ÍøÂçȺ£¬£¬ £¬Ö®ºó×°±¸¿ÉÄܱ»ÓÃÓÚÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷¡¢ÊðÀí¶ñÒâÁ÷Á¿µÈÐÐΪ ¡£¡£Ö»¹ÜnetsecfishÈ¥Ä걨¸æÔ¼114,000̨̻¶ÔÚ»¥ÁªÍøÉϵÄDVRÒ×ÊܸÃÎó²î¹¥»÷£¬£¬ £¬µ«¿¨°Í˹»ùɨÃèÏÔʾ̻¶װ±¸Ô¼50,000̨£¬£¬ £¬ÊýÄ¿ÈÔÏ൱¿É¹Û ¡£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ùÒÔΪ£¬£¬ £¬Óë×îÐÂMirai±äÖÖÏà¹ØµÄ´ó´ó¶¼Ñ¬È¾Ó°ÏìÁËÖйú¡¢Ó¡¶ÈµÈ¶à¸ö¹ú¼Ò£¬£¬ £¬²»¹ýÕâÒ»Êý¾Ý»ùÓÚÆäÒ£²âÊý¾Ý£¬£¬ £¬¿ÉÄÜÎÞ·¨×¼È··´Ó¦½©Ê¬ÍøÂçÄ¿µÄ¶¨Î» ¡£¡£ÏÖÔÚÉв»ÇåÎú¹©Ó¦ÉÌTBK VisionÊÇ·ñÒÑÐû²¼Çå¾²¸üÐÂÐÞ¸´¸ÃÎó²î ¡£¡£±ðµÄ£¬£¬ £¬DVR-4104ºÍDVR-4216ÒÑÆÕ±é¸üÃûΪ¶à¸öÆ·ÅÆ£¬£¬ £¬ÊÜÓ°Ïì×°±¸²¹¶¡¿ÉÓÃÐÔÖØ´ó ¡£¡£


https://www.bleepingcomputer.com/news/security/new-mirai-botnet-infect-tbk-dvr-devices-via-command-injection-flaw/


2. ÷è÷ëÀÕË÷Èí¼þʹÓöà¸öFortiGateÎó²îÌᳫ¹¥»÷


6ÔÂ6ÈÕ£¬£¬ £¬ÍþвÇ鱨¹«Ë¾PRODAFTÖÒÑÔ£¬£¬ £¬2025Äê5ÔÂÖÁ6ÔÂʱ´ú£¬£¬ £¬÷è÷ëÀÕË÷Èí¼þ£¨ÓÖÃûPhantom Mantis£©×é֯ʹÓöà¸öFortiGateÎó²î£¨°üÀ¨CVE-2024-21762ºÍCVE-2024-55591£©¶Ô¶à¸ö×éÖ¯Ìᳫ¹¥»÷ ¡£¡£¸Ã×éÖ¯ÖÁÉÙ×Ô2022Äê8ÔÂÆð»îÔ¾£¬£¬ £¬2024Äê6ÔÂÒò¹¥»÷Ó¢¹úÕþ¸®Ò½ÁÆÐ§ÀÍÌṩÉÌSynnovis¶øÊܹØ×¢£¬£¬ £¬Í¨³£½ÓÄÉ¡°Ë«ÖØÀÕË÷¡±ÊÖ¶Î ¡£¡£ÏÖÔÚ£¬£¬ £¬ÆäÕýʹÓÃFortiGateÎó²î¹¥»÷Î÷°àÑÀÓï¹ú¼Ò×éÖ¯£¬£¬ £¬ÇÒ¿ÉÄܽ«¹¥»÷¹æÄ£À©´óµ½È«Çò£¬£¬ £¬ÇÒ¸üÇãÏòÓÚËæ»úÑ¡ÔñÊܺ¦Õß ¡£¡£2024Äê2Ô£¬£¬ £¬FortinetÖÒÑÔFortiOS SSL VPNÖеÄCVE-2024-21762Îó²îÔÚÒ°ÍâÒѱ»Æð¾¢Ê¹Ó㬣¬ £¬CISAÒѽ«ÆäÌí¼Óµ½KEVĿ¼ÖÐ ¡£¡£2025Äê3Ô£¬£¬ £¬Forescout Research - Vedere Labs±¨¸æ³Æ£¬£¬ £¬1ÔÂÖÁ3ÔÂʱ´ú£¬£¬ £¬ÍþвÐÐΪÕßʹÓÃFortinetµÄÁ½¸öÎó²î°²ÅÅÁËSuperBlackÀÕË÷Èí¼þ£¬£¬ £¬¹é×ïÓÚÃûΪ¡°Mora_001¡±µÄÍþвÐÐΪÕߣ¬£¬ £¬Æä¿ÉÄÜÓëLockBitÉú̬ϵͳÓÐ¹Ø ¡£¡£±ðµÄ£¬£¬ £¬CISAÈ·ÈÏÎó²îCVE-2025-24472Òѱ»ÓÃÓÚÀÕË÷Èí¼þ»î¶¯ ¡£¡£Îó²îCVE-2024-55591ÊÇÒ»¸öʹÓñ¸Ó÷¾¶»òͨµÀÈÆ¹ýÉí·ÝÑéÖ¤µÄÎó²î£¬£¬ £¬Ó°ÏìFortiOSºÍFortiProxy¶à¸ö°æ±¾£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÈ«ÐÄÉè¼ÆµÄÇëÇó»ñÈ¡³¬µÈÖÎÀíԱȨÏÞ£¬£¬ £¬ÇÒÒÑÓб¨¸æÏÔʾ¸ÃÎó²îÕýÔÚ±»ÆÕ±éʹÓà ¡£¡£


https://securityaffairs.com/178736/hacking/attackers-exploit-fortinet-flaws-to-deploy-qilin-ransomware.html


3. Optima Tax ReliefÔâChaosÀÕË÷Èí¼þ¹¥»÷


6ÔÂ6ÈÕ£¬£¬ £¬ÃÀ¹ú×ÅÃû˰Îñ½â¾öºÍ½áË㹫˾Optima Tax Relief¿ËÈÕÔâÊÜÁËChaosÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬ÍþвÐÐΪÕßÒѽ«ÇÔÈ¡µÄÊý¾Ýй¶ ¡£¡£Optima Tax Relief×Ô³ÆÊÇÃÀ¹úÁìÏȵÄ˰Îñ½â¾ö¹«Ë¾£¬£¬ £¬ÒÑΪ¿Í»§½â¾ö³¬30ÒÚÃÀԪ˰ÎñÔðÈÎ ¡£¡£´Ë´ÎChaosÀÕË÷Èí¼þÍŻォOptima Tax ReliefÌí¼Óµ½ÆäÊý¾ÝÐ¹Â¶ÍøÕ¾£¬£¬ £¬Éù³ÆÇÔÈ¡ÁË69GBÊý¾Ý£¬£¬ £¬ÕâЩÊý¾ÝËÆºõ°üÀ¨¹«Ë¾Êý¾ÝºÍ¿Í»§°¸ÀýÎļþ ¡£¡£¼øÓÚ˰ÎñÎļþͨ³£°üÀ¨Éç±£ºÅÂë¡¢µç»°ºÅÂëºÍ¼ÒͥסַµÈÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬ÕâЩÐÅÏ¢Ò»µ©Ð¹Â¶£¬£¬ £¬¿ÉÄܱ»ÆäËûÍþвÐÐΪÕßÓÃÓÚ¶ñÒâ»î¶¯»òÉí·Ý͵ÇÔ£¬£¬ £¬¶ÔСÎÒ˽¼ÒºÍÆóÒµ×é³ÉÑÏÖØÍþв ¡£¡£ÓÐÐÂÎÅÈËʿ͸¶£¬£¬ £¬ÕâÊÇÒ»´ÎË«ÖØÀÕË÷¹¥»÷£¬£¬ £¬ÍþвÐÐΪÕß²»µ«ÇÔÈ¡Á˹«Ë¾Êý¾Ý£¬£¬ £¬»¹¶ÔЧÀÍÆ÷¾ÙÐÐÁ˼ÓÃÜ ¡£¡£ChaosÀÕË÷Èí¼þÊÇÒ»ÖÖÏà¶Ô½ÏеÄÀÕË÷Èí¼þ²Ù×÷£¬£¬ £¬ÓÚ2025Äê3ÔÂÆô¶¯£¬£¬ £¬ÆäʱÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÓÐÎåÃûÊܺ¦Õß ¡£¡£Ðè×¢ÖØµÄÊÇ£¬£¬ £¬²»Òª½«¸ÃÀÕË÷Èí¼þÍÅ»ïÓë×Ô2021ÄêÆð¾ÍÒѱ£´æµÄChaosÀÕË÷Èí¼þ¹¹½¨Æ÷»ìÏý£¬£¬ £¬ºóÕßÓÃÓÚ½¨Éè´ó×ÚÆ·ÅƼÓÃÜÆ÷ÒÔ¾ÙÐÐÍøÂç´¹ÂںͶñÒâÈí¼þ»î¶¯ ¡£¡£


https://www.bleepingcomputer.com/news/security/tax-resolution-firm-optima-tax-relief-hit-by-ransomware-data-leaked/


4. ÐÂÐÍPathWiperÊý¾Ý²Á³ýÈí¼þÏ®»÷ÎÚ¿ËÀ¼Òªº¦»ù´¡ÉèÊ©


6ÔÂ6ÈÕ£¬£¬ £¬Ò»ÖÖÃûΪ¡°PathWiper¡±µÄÐÂÐÍÊý¾Ý²Á³ý¶ñÒâÈí¼þÕý±»ÓÃÓÚÕë¶ÔÎÚ¿ËÀ¼Òªº¦»ù´¡ÉèÊ©µÄ¹¥»÷£¬£¬ £¬ÆäÄ¿µÄÔÚÓÚÆÆËð¸Ã¹úÔËÓª ¡£¡£¸Ã¶ñÒâÈí¼þµÄÓÐÓÃÔØºÉͨ¹ýÕýµ±¶ËµãÖÎÀí¹¤¾ß°²ÅÅ£¬£¬ £¬Åú×¢¹¥»÷ÕßÒÑͨ¹ýÏÈǰ¹¥»÷»ñȡϵͳÖÎÆÊÎö¼ûȨÏÞ ¡£¡£Ë¼¿ÆTalosÑо¿Ö°Ô±¸ß¶È¿Ï¶¨µØ½«´Ë´Î¹¥»÷¹é×ïÓÚÓë¶íÂÞ˹Ïà¹ØµÄ¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©£¬£¬ £¬²¢Ö¸³öPathWiper¿ÉÄÜÊÇ´ËǰÔÚÎÚ¿ËÀ¼°²ÅŵÄHermeticWiperµÄÑݱ䣬£¬ £¬ÓÃÓÚÏàͬ»òÖØµþÍþв¼¯ÈºµÄ¹¥»÷ ¡£¡£PathWiperͨ¹ýWindowsÅú´¦Öóͷ£ÎļþÖ´ÐУ¬£¬ £¬Æô¶¯¶ñÒâVBScript£¬£¬ £¬½ø¶øÉ¾³ý²¢Ö´ÐÐÖ÷ÒªÓÐÓÃÔØºÉ£¬£¬ £¬ÆäÖ´Ðз½·¨Ä£ÄâÕýµ±ÖÎÀí¹¤¾ßÐÐΪÒÔÌӱܼì²â ¡£¡£ÓëHermeticWiper²î±ð£¬£¬ £¬PathWiperÒÔ±à³Ì·½·¨Ê¶±ðϵͳÉÏËùÓÐÅþÁ¬µÄÇý¶¯Æ÷£¬£¬ £¬ÀÄÓÃWindows APIÐ¶ÔØ¾í£¬£¬ £¬²¢ÎªÃ¿¸ö¾í½¨ÉèÏß³ÌÁýÕÖÒªº¦NTFS½á¹¹£¬£¬ £¬°üÀ¨MBR¡¢MFT¡¢LogFile¡¢$BootµÈÎļþ£¬£¬ £¬µ¼ÖÂϵͳÍêÈ«ÎÞ·¨ÔËÐÐ ¡£¡£´Ë´Î¹¥»÷²»Éæ¼°ÀÕË÷»ò²ÆÎñÒªÇ󣬣¬ £¬Î¨Ò»Ä¿µÄÊÇÆÆËðºÍÖÐÖ¹ÔËÓª ¡£¡£Cisco TalosÒÑÐû²¼Îļþ¹þÏ£ºÍSnort¹æÔò£¬£¬ £¬ÒÔ×ÊÖú¼ì²âÍþв²¢ÔÚÆäÆÆËðÇý¶¯Æ÷֮ǰ×èÖ¹ ¡£¡£×ÔÕ½Õù×îÏÈÒÔÀ´£¬£¬ £¬Êý¾Ý²Á³ýÆ÷ÒѳÉΪ¹¥»÷ÎÚ¿ËÀ¼µÄÓÐÁ¦¹¤¾ß£¬£¬ £¬¶íÂÞ˹ÍþвÐÐΪÕ߯µÈÔʹÓÃËüÃÇÆÆËð¸Ã¹úÒªº¦Ðж¯£¬£¬ £¬´ËǰÒÑÓжàÖÖ²Á³ýÆ÷±»ÓÃÓÚ´ËÀ๥»÷ ¡£¡£


https://www.bleepingcomputer.com/news/security/new-pathwiper-data-wiper-malware-hits-critical-infrastructure-in-ukraine/


5. Ӣ˰Îñº£¹Ø×ÜÊðÔâ´¹ÂÚ¹¥»÷£¬£¬ £¬Ëðʧ4700ÍòÓ¢°÷


6ÔÂ5ÈÕ£¬£¬ £¬Ó¢¹ú˰Îñº£¹Ø×ÜÊð£¨HMRC£©¿ËÈÕÅû¶£¬£¬ £¬·¸·¨ÍÅ»ïͨ¹ý´¹ÂÚÊֶεÁÓÃÁè¼Ý10Íò¸öÄÉ˰ÈËÕË»§£¬£¬ £¬²¢Ê¹ÓÃÕâЩÕË»§Ìá½»ÐéαÍË˰ÉêÇ룬£¬ £¬²»·¨ÌáÈ¡ÁË4700ÍòÓ¢°÷£¨Ô¼ºÏ6400ÍòÃÀÔª£©×ʽ𠡣¡£HMRCÊ×ϯִÐйÙÔ¼º²-±£ÂÞ¡¤Âí¿Ë˹ÏòÒé»á²ÆÎñίԱ»áÌåÏÖ£¬£¬ £¬´ËÊÂÎñÔ´ÓÚ¹¥»÷Õßͨ¹ý´¹Âڻ»òÍⲿÊý¾Ýй¶»ñȡСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬¶ø·ÇHMRCϵͳÔâµ½ÈëÇÖ ¡£¡£ÊÜÓ°ÏìµÄÄÉ˰È˽«ÔÚÈýÖÜÄÚÊÕµ½Í¨ÖªÐꝣ¬£¬ £¬ÆäÕË»§Òѱ»ÔÝÊ±Ëø¶¨²¢É¨³ýÒì³£µÇ¼ÐÅÏ¢ ¡£¡£Âí¿Ë˹ǿµ÷£¬£¬ £¬ÊÜÓ°ÏìµÄÄÉ˰È˲»»á¼ç¸º¾­¼ÃËðʧ£¬£¬ £¬HMRCÒÑ´Ó˰Îñ¼Í¼ÖÐɾ³ý¹ýʧÉ걨ÐÅÏ¢ ¡£¡£Êý¾ÝÏÔʾ£¬£¬ £¬HMRCÈ¥ÄêÀÖ³É×èµ²ÁË·¸·¨·Ö×ÓÊÔͼÇÔÈ¡µÄ19ÒÚÓ¢°÷×ʽ𣬣¬ £¬ÏÖʵËðʧ½ð¶î½öÕ¼¹¥»÷×ܶîµÄ2.5% ¡£¡£HMRC¸±Ê×ϯִÐйٰ²¼ªÀ­¡¤Âó¿ËÌÆÄÉÖ¸³ö£¬£¬ £¬Õ©Æ­ÕßʹÓñ»µÁÉí·ÝÐÅÏ¢½¨Éè»òÐ®ÖÆÔÚÏßÕË»§£¬£¬ £¬Í¨¹ý¸ß¶È×éÖ¯»¯µÄ·¸·¨ÍøÂçʵÑéڲƭ ¡£¡£Ö»¹ÜÕþ¸®Î´Í¸Â¶Ïêϸ¹¥»÷ÊÖ·¨£¬£¬ £¬µ«ÍøÂçÇ徲ר¼ÒÍÆ²â¿ÉÄÜÉæ¼°ÐÅÏ¢ÇÔÈ¡Èí¼þѬȾ»òÉ繤¹¥»÷ ¡£¡£ÏÖÔÚÏà¹ØÐÌÊÂÊÓ²ìÈÔÔÚ¾ÙÐУ¬£¬ £¬²¿·ÖÏÓÒÉÈËÒÑÓÚÈ¥Äê±»¾Ð²¶ ¡£¡£HMRCÕýÓëÖ´·¨²¿·ÖÏàÖú×·»Ø±»µÁ×ʽ𣬣¬ £¬²¢½¨ÒéÄÉ˰ÈËСÐÄ¿ÉÒÉÓʼþ¡¢¶ÌÐż°µç»°£¬£¬ £¬×èÖ¹Ôڷǹٷ½ÇþµÀÌá½»Ãô¸ÐÐÅÏ¢£¬£¬ £¬ÒÔ±ÜÃâСÎÒ˽¼ÒÐÅϢй¶ºÍÔâÊÜÕ©Æ­ ¡£¡£


https://therecord.media/uk-hmrc-tax-authority-scammers-stole-47million-pounds


6. GlueStack×é¼þÔ⹩ӦÁ´¹¥»÷£¬£¬ £¬¶à¶ñÒâÈí¼þ°üÏÖÉí


6ÔÂ8ÈÕ£¬£¬ £¬½üÆÚ£¬£¬ £¬ÍøÂçÇå¾²ÁìÓò±¬·¢¶àÆðÕë¶ÔÈí¼þ¹©Ó¦Á´µÄ¶ñÒâ¹¥»÷ÊÂÎñ ¡£¡£ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔGlueStackÏà¹Ø×é¼þµÄ¹©Ó¦Á´¹¥»÷£¬£¬ £¬Áè¼Ý12¸öÈí¼þ°ü±»Ö²Èë¶ñÒâ´úÂ룬£¬ £¬¹¥»÷Õßͨ¹ý¸Ä¶¯Îļþ×¢Èë¶ñÒâ³ÌÐò£¬£¬ £¬¿ÉÖ´ÐÐshellÏÂÁî¡¢½ØÈ¡ÆÁÄ»½ØÍ¼²¢ÉÏ´«ÊÜѬȾװ±¸Îļþ£¬£¬ £¬ÕâЩÈí¼þ°üÖÜÏÂÔØÁ¿ºÏ¼Æ½ü100Íò´Î ¡£¡£Î´ÊÚȨ»á¼ûȨÏ޿ɱ»ÓÃÓÚ¼ÓÃÜÇ®±ÒÍÚ¿ó¡¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢µÈºóÐø¹¥»÷ ¡£¡£Í¬Ê±£¬£¬ £¬Çå¾²»ú¹¹Socket·¢Ã÷Á½¸öαװ³ÉÕýµ±¹¤¾ßµÄ¶ñÒânpm°ü¡ª¡ªexpress-api-syncºÍsystem-health-sync-api£¬£¬ £¬Ç°Õ߿ɵݹéɾ³ýÄ¿½ñĿ¼ËùÓÐÎļþ£¬£¬ £¬ºóÕß¼æ¾ßÐÅÏ¢ÇÔÈ¡ÓëÆÆËð¹¦Ð§£¬£¬ £¬ÇÒͨ¹ýÓʼþΪÒþ²ØÍ¨Ñ¶ÐŵÀ£¬£¬ £¬¹¥»÷Õß¿Éͨ¹ýÌØ¶¨¶Ëµã´¥·¢ÆÆËðÏÂÁî ¡£¡£±ðµÄ£¬£¬ £¬Èí¼þ¹©Ó¦Á´Çå¾²¹«Ë¾»¹ÔÚPython°üË÷Òý£¨PyPI£©·¢Ã÷ÃûΪimad213µÄƾ֤ÇÔÈ¡³ÌÐò£¬£¬ £¬¸Ã³ÌÐòð³äInstagramÕÇ·Û¹¤¾ß£¬£¬ £¬ÓÕµ¼Óû§ÊäÈëInstagramƾ֤£¬£¬ £¬Ëæºó½«Æ¾Ö¤·¢ËÍÖÁ10¸öµÚÈý·½»úеÈËЧÀÍ ¡£¡£¹¥»÷ÕßͬÆÚ»¹ÉÏ´«ÁËtaya¡¢a-b27¡¢poppo213µÈÆäËû¶ñÒâÈí¼þ°ü£¬£¬ £¬»®·ÖÓÃÓÚÇÔÈ¡¶àÖÖÉ罻ýÌ対֤ºÍ·¢¶¯DDoS¹¥»÷ ¡£¡£¹¥»÷ÕßÔÚGitHubÎĵµÖÐÉù³ÆÆä¿â¡°½öÓÃÓÚ½ÌÓýÑо¿¡±£¬£¬ £¬ÊµÎªÖÆÔìÐéαÇå¾²¸Ð ¡£¡£


https://thehackernews.com/2025/06/new-supply-chain-malware-operation-hits.html