MiraiбäÖÖʹÓÃCVE-2024-3721Îó²îÐ®ÖÆTBK DVR×°±¸
Ðû²¼Ê±¼ä 2025-06-091. MiraiбäÖÖʹÓÃCVE-2024-3721Îó²îÐ®ÖÆTBK DVR×°±¸
6ÔÂ8ÈÕ£¬£¬£¬Mirai¶ñÒâÈí¼þ½©Ê¬ÍøÂç·ºÆðбäÖÖ£¬£¬£¬ÕýʹÓÃTBK DVR-4104ºÍDVR-4216Êý×ÖÊÓÆµÂ¼ÖÆ×°±¸ÖеÄÏÂÁî×¢ÈëÎó²î¾ÙÐÐÐ®ÖÆ¡£¡£¸ÃÎó²î±àºÅΪCVE-2024-3721£¬£¬£¬ÓÉÇå¾²Ñо¿Ô±¡°netsecfish¡±ÓÚ2024Äê4ÔÂÅû¶£¬£¬£¬Æä¿´·¨ÑéÖ¤£¨PoC£©ÒÔÏòÒ×Êܹ¥»÷¶Ëµã·¢ËÍÌØÖÆPOSTÇëÇóµÄÐÎʽ·ºÆð£¬£¬£¬Í¨¹ýʹÓÃmdbºÍmdc²ÎÊýʵÏÖshellÏÂÁîÖ´ÐС£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ù±¨¸æ³Æ£¬£¬£¬ÔÚÆäLinuxÃÛ¹ÞÖз¢Ã÷ÁËÀ´×ÔÐÂMirai½©Ê¬ÍøÂç±äÖÖ¶Ô¸ÃÎó²îµÄ×Ô¶¯Ê¹Óᣡ£¹¥»÷ÕßʹÓôËÎó²îÖ²ÈëARM32¶ñÒâÈí¼þ¶þ½øÖÆÎļþ£¬£¬£¬¸ÃÎļþÓëÏÂÁîºÍ¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷½¨ÉèͨѶ£¬£¬£¬½«×°±¸¼ÓÈë½©Ê¬ÍøÂçȺ£¬£¬£¬Ö®ºó×°±¸¿ÉÄܱ»ÓÃÓÚÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷¡¢ÊðÀí¶ñÒâÁ÷Á¿µÈÐÐΪ¡£¡£Ö»¹ÜnetsecfishÈ¥Ä걨¸æÔ¼114,000̨̻¶ÔÚ»¥ÁªÍøÉϵÄDVRÒ×ÊܸÃÎó²î¹¥»÷£¬£¬£¬µ«¿¨°Í˹»ùɨÃèÏÔʾ̻¶װ±¸Ô¼50,000̨£¬£¬£¬ÊýÄ¿ÈÔÏ൱¿É¹Û¡£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ùÒÔΪ£¬£¬£¬Óë×îÐÂMirai±äÖÖÏà¹ØµÄ´ó´ó¶¼Ñ¬È¾Ó°ÏìÁËÖйú¡¢Ó¡¶ÈµÈ¶à¸ö¹ú¼Ò£¬£¬£¬²»¹ýÕâÒ»Êý¾Ý»ùÓÚÆäÒ£²âÊý¾Ý£¬£¬£¬¿ÉÄÜÎÞ·¨×¼È··´Ó¦½©Ê¬ÍøÂçÄ¿µÄ¶¨Î»¡£¡£ÏÖÔÚÉв»ÇåÎú¹©Ó¦ÉÌTBK VisionÊÇ·ñÒÑÐû²¼Çå¾²¸üÐÂÐÞ¸´¸ÃÎó²î¡£¡£±ðµÄ£¬£¬£¬DVR-4104ºÍDVR-4216ÒÑÆÕ±é¸üÃûΪ¶à¸öÆ·ÅÆ£¬£¬£¬ÊÜÓ°Ïì×°±¸²¹¶¡¿ÉÓÃÐÔÖØ´ó¡£¡£
https://www.bleepingcomputer.com/news/security/new-mirai-botnet-infect-tbk-dvr-devices-via-command-injection-flaw/
2. ÷è÷ëÀÕË÷Èí¼þʹÓöà¸öFortiGateÎó²îÌᳫ¹¥»÷
6ÔÂ6ÈÕ£¬£¬£¬ÍþвÇ鱨¹«Ë¾PRODAFTÖÒÑÔ£¬£¬£¬2025Äê5ÔÂÖÁ6ÔÂʱ´ú£¬£¬£¬÷è÷ëÀÕË÷Èí¼þ£¨ÓÖÃûPhantom Mantis£©×é֯ʹÓöà¸öFortiGateÎó²î£¨°üÀ¨CVE-2024-21762ºÍCVE-2024-55591£©¶Ô¶à¸ö×éÖ¯Ìᳫ¹¥»÷¡£¡£¸Ã×éÖ¯ÖÁÉÙ×Ô2022Äê8ÔÂÆð»îÔ¾£¬£¬£¬2024Äê6ÔÂÒò¹¥»÷Ó¢¹úÕþ¸®Ò½ÁÆÐ§ÀÍÌṩÉÌSynnovis¶øÊܹØ×¢£¬£¬£¬Í¨³£½ÓÄÉ¡°Ë«ÖØÀÕË÷¡±ÊֶΡ£¡£ÏÖÔÚ£¬£¬£¬ÆäÕýʹÓÃFortiGateÎó²î¹¥»÷Î÷°àÑÀÓï¹ú¼Ò×éÖ¯£¬£¬£¬ÇÒ¿ÉÄܽ«¹¥»÷¹æÄ£À©´óµ½È«Çò£¬£¬£¬ÇÒ¸üÇãÏòÓÚËæ»úÑ¡ÔñÊܺ¦Õß¡£¡£2024Äê2Ô£¬£¬£¬FortinetÖÒÑÔFortiOS SSL VPNÖеÄCVE-2024-21762Îó²îÔÚÒ°ÍâÒѱ»Æð¾¢Ê¹Ó㬣¬£¬CISAÒѽ«ÆäÌí¼Óµ½KEVĿ¼ÖС£¡£2025Äê3Ô£¬£¬£¬Forescout Research - Vedere Labs±¨¸æ³Æ£¬£¬£¬1ÔÂÖÁ3ÔÂʱ´ú£¬£¬£¬ÍþвÐÐΪÕßʹÓÃFortinetµÄÁ½¸öÎó²î°²ÅÅÁËSuperBlackÀÕË÷Èí¼þ£¬£¬£¬¹é×ïÓÚÃûΪ¡°Mora_001¡±µÄÍþвÐÐΪÕߣ¬£¬£¬Æä¿ÉÄÜÓëLockBitÉú̬ϵͳÓйء£¡£±ðµÄ£¬£¬£¬CISAÈ·ÈÏÎó²îCVE-2025-24472Òѱ»ÓÃÓÚÀÕË÷Èí¼þ»î¶¯¡£¡£Îó²îCVE-2024-55591ÊÇÒ»¸öʹÓñ¸Ó÷¾¶»òͨµÀÈÆ¹ýÉí·ÝÑéÖ¤µÄÎó²î£¬£¬£¬Ó°ÏìFortiOSºÍFortiProxy¶à¸ö°æ±¾£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÈ«ÐÄÉè¼ÆµÄÇëÇó»ñÈ¡³¬µÈÖÎÀíԱȨÏÞ£¬£¬£¬ÇÒÒÑÓб¨¸æÏÔʾ¸ÃÎó²îÕýÔÚ±»ÆÕ±éʹÓᣡ£
https://securityaffairs.com/178736/hacking/attackers-exploit-fortinet-flaws-to-deploy-qilin-ransomware.html
3. Optima Tax ReliefÔâChaosÀÕË÷Èí¼þ¹¥»÷
6ÔÂ6ÈÕ£¬£¬£¬ÃÀ¹ú×ÅÃû˰Îñ½â¾öºÍ½áË㹫˾Optima Tax Relief¿ËÈÕÔâÊÜÁËChaosÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ÍþвÐÐΪÕßÒѽ«ÇÔÈ¡µÄÊý¾Ýй¶¡£¡£Optima Tax Relief×Ô³ÆÊÇÃÀ¹úÁìÏȵÄ˰Îñ½â¾ö¹«Ë¾£¬£¬£¬ÒÑΪ¿Í»§½â¾ö³¬30ÒÚÃÀԪ˰ÎñÔðÈΡ£¡£´Ë´ÎChaosÀÕË÷Èí¼þÍŻォOptima Tax ReliefÌí¼Óµ½ÆäÊý¾ÝÐ¹Â¶ÍøÕ¾£¬£¬£¬Éù³ÆÇÔÈ¡ÁË69GBÊý¾Ý£¬£¬£¬ÕâЩÊý¾ÝËÆºõ°üÀ¨¹«Ë¾Êý¾ÝºÍ¿Í»§°¸ÀýÎļþ¡£¡£¼øÓÚ˰ÎñÎļþͨ³£°üÀ¨Éç±£ºÅÂë¡¢µç»°ºÅÂëºÍ¼ÒͥסַµÈÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬ÕâЩÐÅÏ¢Ò»µ©Ð¹Â¶£¬£¬£¬¿ÉÄܱ»ÆäËûÍþвÐÐΪÕßÓÃÓÚ¶ñÒâ»î¶¯»òÉí·Ý͵ÇÔ£¬£¬£¬¶ÔСÎÒ˽¼ÒºÍÆóÒµ×é³ÉÑÏÖØÍþв¡£¡£ÓÐÐÂÎÅÈËʿ͸¶£¬£¬£¬ÕâÊÇÒ»´ÎË«ÖØÀÕË÷¹¥»÷£¬£¬£¬ÍþвÐÐΪÕß²»µ«ÇÔÈ¡Á˹«Ë¾Êý¾Ý£¬£¬£¬»¹¶ÔЧÀÍÆ÷¾ÙÐÐÁ˼ÓÃÜ¡£¡£ChaosÀÕË÷Èí¼þÊÇÒ»ÖÖÏà¶Ô½ÏеÄÀÕË÷Èí¼þ²Ù×÷£¬£¬£¬ÓÚ2025Äê3ÔÂÆô¶¯£¬£¬£¬ÆäʱÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÓÐÎåÃûÊܺ¦Õß¡£¡£Ðè×¢ÖØµÄÊÇ£¬£¬£¬²»Òª½«¸ÃÀÕË÷Èí¼þÍÅ»ïÓë×Ô2021ÄêÆð¾ÍÒѱ£´æµÄChaosÀÕË÷Èí¼þ¹¹½¨Æ÷»ìÏý£¬£¬£¬ºóÕßÓÃÓÚ½¨Éè´ó×ÚÆ·ÅƼÓÃÜÆ÷ÒÔ¾ÙÐÐÍøÂç´¹ÂںͶñÒâÈí¼þ»î¶¯¡£¡£
https://www.bleepingcomputer.com/news/security/tax-resolution-firm-optima-tax-relief-hit-by-ransomware-data-leaked/
4. ÐÂÐÍPathWiperÊý¾Ý²Á³ýÈí¼þÏ®»÷ÎÚ¿ËÀ¼Òªº¦»ù´¡ÉèÊ©
6ÔÂ6ÈÕ£¬£¬£¬Ò»ÖÖÃûΪ¡°PathWiper¡±µÄÐÂÐÍÊý¾Ý²Á³ý¶ñÒâÈí¼þÕý±»ÓÃÓÚÕë¶ÔÎÚ¿ËÀ¼Òªº¦»ù´¡ÉèÊ©µÄ¹¥»÷£¬£¬£¬ÆäÄ¿µÄÔÚÓÚÆÆËð¸Ã¹úÔËÓª¡£¡£¸Ã¶ñÒâÈí¼þµÄÓÐÓÃÔØºÉͨ¹ýÕýµ±¶ËµãÖÎÀí¹¤¾ß°²ÅÅ£¬£¬£¬Åú×¢¹¥»÷ÕßÒÑͨ¹ýÏÈǰ¹¥»÷»ñȡϵͳÖÎÆÊÎö¼ûȨÏÞ¡£¡£Ë¼¿ÆTalosÑо¿Ö°Ô±¸ß¶È¿Ï¶¨µØ½«´Ë´Î¹¥»÷¹é×ïÓÚÓë¶íÂÞ˹Ïà¹ØµÄ¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©£¬£¬£¬²¢Ö¸³öPathWiper¿ÉÄÜÊÇ´ËǰÔÚÎÚ¿ËÀ¼°²ÅŵÄHermeticWiperµÄÑݱ䣬£¬£¬ÓÃÓÚÏàͬ»òÖØµþÍþв¼¯ÈºµÄ¹¥»÷¡£¡£PathWiperͨ¹ýWindowsÅú´¦Öóͷ£ÎļþÖ´ÐУ¬£¬£¬Æô¶¯¶ñÒâVBScript£¬£¬£¬½ø¶øÉ¾³ý²¢Ö´ÐÐÖ÷ÒªÓÐÓÃÔØºÉ£¬£¬£¬ÆäÖ´Ðз½·¨Ä£ÄâÕýµ±ÖÎÀí¹¤¾ßÐÐΪÒÔÌӱܼì²â¡£¡£ÓëHermeticWiper²î±ð£¬£¬£¬PathWiperÒÔ±à³Ì·½·¨Ê¶±ðϵͳÉÏËùÓÐÅþÁ¬µÄÇý¶¯Æ÷£¬£¬£¬ÀÄÓÃWindows APIÐ¶ÔØ¾í£¬£¬£¬²¢ÎªÃ¿¸ö¾í½¨ÉèÏß³ÌÁýÕÖÒªº¦NTFS½á¹¹£¬£¬£¬°üÀ¨MBR¡¢MFT¡¢LogFile¡¢$BootµÈÎļþ£¬£¬£¬µ¼ÖÂϵͳÍêÈ«ÎÞ·¨ÔËÐС£¡£´Ë´Î¹¥»÷²»Éæ¼°ÀÕË÷»ò²ÆÎñÒªÇ󣬣¬£¬Î¨Ò»Ä¿µÄÊÇÆÆËðºÍÖÐÖ¹ÔËÓª¡£¡£Cisco TalosÒÑÐû²¼Îļþ¹þÏ£ºÍSnort¹æÔò£¬£¬£¬ÒÔ×ÊÖú¼ì²âÍþв²¢ÔÚÆäÆÆËðÇý¶¯Æ÷֮ǰ×èÖ¹¡£¡£×ÔÕ½Õù×îÏÈÒÔÀ´£¬£¬£¬Êý¾Ý²Á³ýÆ÷ÒѳÉΪ¹¥»÷ÎÚ¿ËÀ¼µÄÓÐÁ¦¹¤¾ß£¬£¬£¬¶íÂÞ˹ÍþвÐÐΪÕ߯µÈÔʹÓÃËüÃÇÆÆËð¸Ã¹úÒªº¦Ðж¯£¬£¬£¬´ËǰÒÑÓжàÖÖ²Á³ýÆ÷±»ÓÃÓÚ´ËÀ๥»÷¡£¡£
https://www.bleepingcomputer.com/news/security/new-pathwiper-data-wiper-malware-hits-critical-infrastructure-in-ukraine/
5. Ӣ˰Îñº£¹Ø×ÜÊðÔâ´¹ÂÚ¹¥»÷£¬£¬£¬Ëðʧ4700ÍòÓ¢°÷
6ÔÂ5ÈÕ£¬£¬£¬Ó¢¹ú˰Îñº£¹Ø×ÜÊð£¨HMRC£©¿ËÈÕÅû¶£¬£¬£¬·¸·¨ÍÅ»ïͨ¹ý´¹ÂÚÊֶεÁÓÃÁè¼Ý10Íò¸öÄÉ˰ÈËÕË»§£¬£¬£¬²¢Ê¹ÓÃÕâЩÕË»§Ìá½»ÐéαÍË˰ÉêÇ룬£¬£¬²»·¨ÌáÈ¡ÁË4700ÍòÓ¢°÷£¨Ô¼ºÏ6400ÍòÃÀÔª£©×ʽ𡣡£HMRCÊ×ϯִÐйÙÔ¼º²-±£ÂÞ¡¤Âí¿Ë˹ÏòÒé»á²ÆÎñίԱ»áÌåÏÖ£¬£¬£¬´ËÊÂÎñÔ´ÓÚ¹¥»÷Õßͨ¹ý´¹Âڻ»òÍⲿÊý¾Ýй¶»ñȡСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬¶ø·ÇHMRCϵͳÔâµ½ÈëÇÖ¡£¡£ÊÜÓ°ÏìµÄÄÉ˰È˽«ÔÚÈýÖÜÄÚÊÕµ½Í¨ÖªÐꝣ¬£¬£¬ÆäÕË»§Òѱ»ÔÝÊ±Ëø¶¨²¢É¨³ýÒì³£µÇ¼ÐÅÏ¢¡£¡£Âí¿Ë˹ǿµ÷£¬£¬£¬ÊÜÓ°ÏìµÄÄÉ˰È˲»»á¼ç¸º¾¼ÃËðʧ£¬£¬£¬HMRCÒÑ´Ó˰Îñ¼Í¼ÖÐɾ³ý¹ýʧÉ걨ÐÅÏ¢¡£¡£Êý¾ÝÏÔʾ£¬£¬£¬HMRCÈ¥ÄêÀÖ³É×èµ²ÁË·¸·¨·Ö×ÓÊÔͼÇÔÈ¡µÄ19ÒÚÓ¢°÷×ʽ𣬣¬£¬ÏÖʵËðʧ½ð¶î½öÕ¼¹¥»÷×ܶîµÄ2.5%¡£¡£HMRC¸±Ê×ϯִÐйٰ²¼ªÀ¡¤Âó¿ËÌÆÄÉÖ¸³ö£¬£¬£¬Õ©ÆÕßʹÓñ»µÁÉí·ÝÐÅÏ¢½¨Éè»òÐ®ÖÆÔÚÏßÕË»§£¬£¬£¬Í¨¹ý¸ß¶È×éÖ¯»¯µÄ·¸·¨ÍøÂçʵÑéڲơ£¡£Ö»¹ÜÕþ¸®Î´Í¸Â¶Ïêϸ¹¥»÷ÊÖ·¨£¬£¬£¬µ«ÍøÂçÇ徲ר¼ÒÍÆ²â¿ÉÄÜÉæ¼°ÐÅÏ¢ÇÔÈ¡Èí¼þѬȾ»òÉ繤¹¥»÷¡£¡£ÏÖÔÚÏà¹ØÐÌÊÂÊÓ²ìÈÔÔÚ¾ÙÐУ¬£¬£¬²¿·ÖÏÓÒÉÈËÒÑÓÚÈ¥Äê±»¾Ð²¶¡£¡£HMRCÕýÓëÖ´·¨²¿·ÖÏàÖú×·»Ø±»µÁ×ʽ𣬣¬£¬²¢½¨ÒéÄÉ˰ÈËСÐÄ¿ÉÒÉÓʼþ¡¢¶ÌÐż°µç»°£¬£¬£¬×èÖ¹Ôڷǹٷ½ÇþµÀÌá½»Ãô¸ÐÐÅÏ¢£¬£¬£¬ÒÔ±ÜÃâСÎÒ˽¼ÒÐÅϢй¶ºÍÔâÊÜÕ©Æ¡£¡£
https://therecord.media/uk-hmrc-tax-authority-scammers-stole-47million-pounds
6. GlueStack×é¼þÔ⹩ӦÁ´¹¥»÷£¬£¬£¬¶à¶ñÒâÈí¼þ°üÏÖÉí
6ÔÂ8ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬ÍøÂçÇå¾²ÁìÓò±¬·¢¶àÆðÕë¶ÔÈí¼þ¹©Ó¦Á´µÄ¶ñÒâ¹¥»÷ÊÂÎñ¡£¡£ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔGlueStackÏà¹Ø×é¼þµÄ¹©Ó¦Á´¹¥»÷£¬£¬£¬Áè¼Ý12¸öÈí¼þ°ü±»Ö²Èë¶ñÒâ´úÂ룬£¬£¬¹¥»÷Õßͨ¹ý¸Ä¶¯Îļþ×¢Èë¶ñÒâ³ÌÐò£¬£¬£¬¿ÉÖ´ÐÐshellÏÂÁî¡¢½ØÈ¡ÆÁÄ»½ØÍ¼²¢ÉÏ´«ÊÜѬȾװ±¸Îļþ£¬£¬£¬ÕâЩÈí¼þ°üÖÜÏÂÔØÁ¿ºÏ¼Æ½ü100Íò´Î¡£¡£Î´ÊÚȨ»á¼ûȨÏ޿ɱ»ÓÃÓÚ¼ÓÃÜÇ®±ÒÍÚ¿ó¡¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢µÈºóÐø¹¥»÷¡£¡£Í¬Ê±£¬£¬£¬Çå¾²»ú¹¹Socket·¢Ã÷Á½¸öαװ³ÉÕýµ±¹¤¾ßµÄ¶ñÒânpm°ü¡ª¡ªexpress-api-syncºÍsystem-health-sync-api£¬£¬£¬Ç°Õ߿ɵݹéɾ³ýÄ¿½ñĿ¼ËùÓÐÎļþ£¬£¬£¬ºóÕß¼æ¾ßÐÅÏ¢ÇÔÈ¡ÓëÆÆËð¹¦Ð§£¬£¬£¬ÇÒͨ¹ýÓʼþΪÒþ²ØÍ¨Ñ¶ÐŵÀ£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÌØ¶¨¶Ëµã´¥·¢ÆÆËðÏÂÁî¡£¡£±ðµÄ£¬£¬£¬Èí¼þ¹©Ó¦Á´Çå¾²¹«Ë¾»¹ÔÚPython°üË÷Òý£¨PyPI£©·¢Ã÷ÃûΪimad213µÄƾ֤ÇÔÈ¡³ÌÐò£¬£¬£¬¸Ã³ÌÐòð³äInstagramÕÇ·Û¹¤¾ß£¬£¬£¬ÓÕµ¼Óû§ÊäÈëInstagramƾ֤£¬£¬£¬Ëæºó½«Æ¾Ö¤·¢ËÍÖÁ10¸öµÚÈý·½»úеÈËЧÀÍ¡£¡£¹¥»÷ÕßͬÆÚ»¹ÉÏ´«ÁËtaya¡¢a-b27¡¢poppo213µÈÆäËû¶ñÒâÈí¼þ°ü£¬£¬£¬»®·ÖÓÃÓÚÇÔÈ¡¶àÖÖÉ罻ýÌ対֤ºÍ·¢¶¯DDoS¹¥»÷¡£¡£¹¥»÷ÕßÔÚGitHubÎĵµÖÐÉù³ÆÆä¿â¡°½öÓÃÓÚ½ÌÓýÑо¿¡±£¬£¬£¬ÊµÎªÖÆÔìÐéαÇå¾²¸Ð¡£¡£
https://thehackernews.com/2025/06/new-supply-chain-malware-operation-hits.html