CISAÖÒÑÔFortiOSÑÏÖØRCEÎó²îÕý±»Æð¾¢Ê¹ÓÃ

Ðû²¼Ê±¼ä 2024-10-11

1. CISAÖÒÑÔFortiOSÑÏÖØRCEÎó²îÕý±»Æð¾¢Ê¹ÓÃ


10ÔÂ9ÈÕ£¬CISA͸¶¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓÃÒ»¸öÑÏÖصÄFortiOSÔ¶³Ì´úÂëÖ´ÐÐ(RCE)Îó²î£¨CVE-2024-23113£©¡£¸ÃÎó²îÓÉfgfmdÊØ»¤Àú³Ì½ÓÊÜÍⲿ¿ØÖƵÄÃûÌÃ×Ö·û´®×÷Ϊ²ÎÊýÒýÆð£¬Ê¹µÃδ¾­Éí·ÝÑéÖ¤µÄÍþвÐÐΪÕßÄܹ»ÔÚδÐÞ²¹µÄ×°±¸ÉÏÖ´ÐÐÏÂÁî»òí§Òâ´úÂ룬ÇÒÎÞÐèÓû§½»»¥¡£´ËÎó²îÓ°ÏìFortiOS 7.0¼°ÒÔÉÏ°æ±¾¡¢FortiPAM 1.0¼°ÒÔÉÏ°æ±¾¡¢FortiProxy 7.0¼°ÒÔÉÏ°æ±¾ÒÔ¼°FortiWeb 7.4¡£FortinetÒÑÓÚÖÙ´º·ÝÅû¶²¢ÐÞ²¹Á˸ÃÎó²î£¬²¢½¨Òéɾ³ýËùÓнӿڶÔfgfmdÊØ»¤³ÌÐòµÄ»á¼ûȨÏÞ×÷Ϊ»º½â²½·¥¡£È»¶ø£¬CISAÒѽ«´ËÎó²îÌí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖУ¬ÒªÇóÃÀ¹úÁª°î»ú¹¹ÔÚ10ÔÂ30ÈÕ֮ǰ±£»¤ÆäÍøÂçÉϵÄFortiOS×°±¸ÃâÊÜÕâЩÕýÔÚ¾ÙÐеĹ¥»÷¡£ÍøÂçÇå¾²»ú¹¹ÖÒÑԳƣ¬´ËÀàÎó²îÊǶñÒâÍøÂçÐÐΪÕßƵÈÔ¹¥»÷µÄÇ°ÑÔ£¬´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£


https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/


2. Ó¡¶ÈStar Health°ü¹Ü¹«Ë¾ÔâÍøÂç¹¥»÷£¬¿Í»§Êý¾ÝÒÉÔâй¶


10ÔÂ9ÈÕ£¬Ó¡¶È×î´óµÄ¿µ½¡°ü¹Ü¹«Ë¾Ö®Ò»Star Health and Allied Insurance֤ʵÔâÊÜÁ˶ñÒâÍøÂç¹¥»÷£¬µ¼ÖÂijЩÊý¾Ý±»Î´¾­ÊÚȨºÍ²»·¨»á¼û£¬µ«¹«Ë¾ÔËӪδÊÜÓ°Ï죬·þÎñÈÔÔÚ¼ÌÐø¡£Star HealthÌṩ¶àÖÖ°ü¹Ü·þÎñ£¬ÓµÓÐÁè¼Ý1.7ÒÚÒ½ÁÆ°ü¹Ü¿Í»§¡£´ËÇ°£¬ÍøÂç·¸·¨·Ö×ÓÉù³ÆÔÚÍøÉÏÐû²¼ÁË¿Í»§µÄ¿µ½¡¼Í¼ºÍÆäËûÃô¸ÐÊý¾Ý£¬ºÚ¿Í×éÖ¯ÔÚTelegramÉϽ¨ÉèÁË̸Ìì»úеÈË£¬Ð¹Â¶ÁË3100ÍòͶ±£È˺ÍÁè¼Ý580Íò·Ý°ü¹ÜË÷ÅâµÄСÎÒ˽¼ÒÊý¾Ý¡£Star HealthÒÑÌáÆðËßËÏ¿ØËßTelegramºÍCloudflare£¬²¢Ö¸³öÆäÊ×ϯÐÅÏ¢Çå¾²¹ÙÒ»Ö±ÔÚÆð¾¢ÅäºÏÊӲ죬δ·¢Ã÷ÆäÓÐÈκβ»µ±ÐÐΪ¡£´Ë´ÎÈëÇÖµÄϸ½ÚºÍºÚ¿ÍÔõÑù»ñÈ¡Êý¾ÝÈÔ²»ÇåÎú£¬°ü¹Ü¹«Ë¾Î´Í¸Â¶ÊÇ·ñ¿ÉÒÔÈ·ÈÏË­»á¼ûÁËÊý¾ÝÒÔ¼°ÄÄЩÊý¾ÝÒѱ»»á¼û»òÇÔÈ¡¡£


https://techcrunch.com/2024/10/09/indias-star-health-confirms-data-breach-after-cybercriminals-post-customers-health-data-online/


3. ³¯ÏÊÍþвÕßÕë¶Ô¿Æ¼¼ÇóÖ°ÕßÍƹã¶ñÒâÈí¼þ


10ÔÂ9ÈÕ£¬Ó볯ÏÊÓÐÁªÏµµÄÍþвÐÐΪÕß½«Ä¿µÄËø¶¨ÔڿƼ¼ÐÐÒµµÄÇóÖ°ÕßÉíÉÏ£¬Í¨¹ýÇóְƽ̨ÁªÏµÈí¼þ¿ª·¢Ö°Ô±£¬Ã°³äDZÔÚ¹ÍÖ÷Ô¼ÇëËûÃǼÓÈëÔÚÏßÃæÊÔ£¬²¢ÊÔͼ˵·þËûÃÇÏÂÔز¢×°ÖöñÒâÈí¼þ£¬ÕâÊÇÃûΪ¡°Ñ¬È¾ÐÔ·Ã̸¡±µÄÔ˶¯µÄÒ»²¿·Ö¡£¸ÃÔ˶¯¼¯Èº±»×·×ÙΪCL-STA-0240£¬Éæ¼°ÒÑÖª¶ñÒâÈí¼þ¼Ò×åBeaverTailºÍInvisibleFerretµÄ¸üа汾¡£µÚÒ»½×¶ÎѬȾÉæ¼°BeaverTailÏÂÔسÌÐòºÍÐÅÏ¢ÇÔÈ¡³ÌÐò£¬¸Ã³ÌÐòרΪWindowsºÍApple macOSƽ̨Éè¼Æ£¬³äµ±»ùÓÚPythonµÄInvisibleFerretºóÃŵĹܵÀ¡£Ö»¹Ü¸ÃÔ˶¯Òѱ»¹ûÕæÅû¶£¬µ«ÈÔÓÐÖ¤¾ÝÅú×¢ËüÈÔÈ»»îÔ¾¡£Çå¾²Ñо¿Ô±ºÍÍøÂçÇå¾²¹«Ë¾ÏêϸÐÎòÁËʹÓüÙÊÓƵ¾Û»áÓ¦ÓóÌÐòMiroTalkºÍFreeConference.comÉø͸µ½¿ª·¢Ö°Ô±ÏµÍ³ÖеĹ¥»÷Á´¡£BeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡ä¯ÀÀÆ÷ÃÜÂë¡¢´Ó¶à¸ö¼ÓÃÜÇ®±ÒÇ®°üÖÐÍøÂçÊý¾Ý£¬²¢ÏÂÔز¢Ö´ÐÐInvisibleFerretºóÃÅ£¬¸ÃºóÃÅ°üÀ¨Ö¸ÎÆʶ±ð¡¢Ô¶³Ì¿ØÖÆ¡¢¼üÅ̼ͼ¡¢Êý¾Ýй¶µÈ¹¦Ð§¡£Unit 42ÌåÏÖ£¬Õâ´ÎÔ˶¯¿ÉÄܳöÓÚ¾­¼ÃÄîÍ·£¬ÓÉÓÚBeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡13¸ö²î±ðµÄ¼ÓÃÜÇ®±ÒÇ®°ü£¬³¯ÏÊÍþвÕß»á¾ÙÐнðÈÚ·¸·¨ÒԳO×ʽðÀ´Ö§³Ö³¯ÏÊÕþȨ¡£


https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html


4. ºÚ¿ÍÉù³Æ¹¥»÷Dr.WebÇÔÈ¡10TBÊý¾Ý£¬Òý·¢ÍøÂçÇå¾²ÐÐÒµµ£ÐÄ


10ÔÂ9ÈÕ£¬¾ÝCyber Security News±¨µÀ£¬Ò»ÃûºÚ¿ÍÔÚºÚ¿ÍÂÛ̳DumpForumsÉÏÉù³Æ¶Ô¶íÂÞ˹ÖøÃûÍøÂçÇå¾²¹«Ë¾Dr.Web¾ÙÐÐÁ˹¥»÷£¬²¢ÇÔÈ¡Á˸ߴï10TBµÄÊý¾Ý¡£ºÚ¿ÍÉù³Æ´Ë´Î¹¥»÷¾­ÓÉÈ«ÐIJ߻®£¬ÀúʱÊýÌ죬ÀÖ³ÉÉø͸µ½Dr.WebµÄÍâµØÍøÂ磬²¢Öð²½ÈëÇÖÆä·þÎñÆ÷ºÍ×ÊÔ´£¬ÉõÖÁÉø͸µ½ÁËÆä×îÇå¾²µÄ»ù´¡ÉèÊ©²¿·Ö¡£ºÚ¿Í»¹Éù³Æ´ÓGitLab·þÎñÆ÷¡¢¹«Ë¾Óʼþ·þÎñÆ÷¡¢Confluence¡¢Redmine¡¢Jenkins¡¢Mantisϵͳ¡¢RocketChatͨѶƽ̨µÈ¶à¸öÒªº¦ÏµÍ³ÖÐÆƽⲢй¶ÁËÊý¾Ý£¬²¢ÔÚÒ»¸öÔÂÄÚδ±»·¢Ã÷µÄÇéÐÎÏ»á¼û²¢ÉÏ´«ÁË¿Í»§¶ËÊý¾Ý¿â£¬¿ÉÄÜ̻¶ÁËDr.WebÓû§µÄÃô¸ÐÐÅÏ¢¡£È»¶ø£¬Dr.Web¹Ù·½ÉùÃ÷³Æ£¬Ö»¹ÜÆäϵͳ×ÊÔ´ÔâÊÜÁËÓÐÕë¶ÔÐԵĹ¥»÷£¬µ«ÒÑÀֳɴì°ÜÁËÆÆËðÆä»ù´¡ÉèÊ©µÄÍýÏ룬Óû§¶Ë²úƷδÊÜÓ°Ï졣ΪԤ·ÀÆð¼û£¬Dr.WebÒѶϿªËùÓÐ×ÊÔ´ÓëÍøÂçµÄÅþÁ¬¾ÙÐÐÑéÖ¤£¬²¢ÔÝÍ£Á˲¡¶¾¿âµÄÐû²¼¡£Èô´Ëй¶ÐÐΪ»ñµÃ֤ʵ£¬½«¶ÔDr.WebÒÔÖÂÕû¸öÍøÂçÇå¾²ÐÐÒµÔì³ÉÖØ´ó¹¥»÷£¬²¢Òý·¢Óû§¶ÔÄ¿½ñ±£»¤²½·¥ÓÐÓÃÐÔµÄÖÊÒÉ¡£


https://cybersecuritynews.com/dumpforums-10tb-data-dr-web/


5. AkiraºÍFogÀÕË÷Èí¼þʹÓÃÒªº¦µÄVeeam RCEÎó²î


10ÔÂ10ÈÕ£¬ÀÕË÷Èí¼þÍÅ»ïʹÓÃVeeam Backup & Replication (VBR) ·þÎñÆ÷ÉϵÄÒ»¸öÑÏÖØÇå¾²Îó²î£¨CVE-2024-40711£©£¬ÊµÏÖÁËÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¸ÃÎó²îÓÉCode WhiteÇå¾²Ñо¿Ô±Florian Hauser·¢Ã÷£¬Ô´ÓÚ²»ÊÜÐÅÍÐÊý¾Ý·´ÐòÁл¯µÄÈõµã£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒԽϵÍÖØƯºó·¢¶¯¹¥»÷¡£VeeamÔÚ9ÔÂ4ÈÕÅû¶Á˸ÃÎó²î²¢Ðû²¼ÁËÇå¾²¸üУ¬¶øwatchTowr LabsÔòÔÚ9ÔÂ9ÈÕÐû²¼ÊÖÒÕÆÊÎö£¬µ«ÑÓ³ÙÖÁ9ÔÂ15ÈղŹûÕæ¿´·¨ÑéÖ¤Îó²î´úÂ룬ÒÔÈ·±£ÖÎÀíÔ±ÓÐ×㹻ʱ¼äÔöÇ¿·À»¤¡£ÓÉÓÚVBRÈí¼þÆÕ±éÓÃÓÚÊý¾Ý±£»¤ºÍÔÖÄѻָ´£¬³ÉΪ¶ñÒâÐÐΪÕßêéêìµÄÄ¿µÄ¡£Sophos X-OpsÊÂÎñÏìÓ¦Ö°Ô±·¢Ã÷£¬¸ÃÎó²îѸËÙ±»AkiraºÍFogÀÕË÷Èí¼þ¹¥»÷ʹÓã¬ÍŽá֮ǰ鶵Äƾ֤£¬½«¡°µã¡±ÍâµØÕÊ»§Ìí¼Óµ½ÖÎÀíÔ±ºÍÔ¶³Ì×ÀÃæÓû§×é¡£¹¥»÷Õßͨ³£Í¨¹ýδÆôÓöàÒòËØÉí·ÝÑéÖ¤µÄÊÜѬȾVPNÍø¹Ø»á¼ûÄ¿µÄ£¬²¿·ÖVPNÔËÐв»ÊÜÖ§³ÖµÄÈí¼þ°æ±¾¡£ÔÚFogÀÕË÷Èí¼þÊÂÎñÖУ¬¹¥»÷Õß»¹Ê¹ÓÃδ±£»¤µÄHyper-V·þÎñÆ÷ºÍÊÊÓóÌÐòrcloneÇÔÈ¡Êý¾Ý¡£ÕâЩ¹¥»÷ÏÔʾ³ö¸ß¶ÈµÄÖصþÐÔºÍÏàËÆÐÔ£¬Åú×¢ÀÕË÷Èí¼þÍÅ»ïÕýÆð¾¢Ê¹ÓÃÕâÒ»Îó²î¾ÙÐй¥»÷¡£


https://www.bleepingcomputer.com/news/security/akira-and-fog-ransomware-now-exploiting-critical-veeam-rce-flaw/


6. ¸»´ïͶ×ÊϵͳÔâÈëÇÖ£¬77,000Ãû¿Í»§ÐÅϢй¶


10ÔÂ10ÈÕ£¬×ܲ¿Î»ÓÚ²¨Ê¿¶ÙµÄ¿ç¹ú½ðÈÚ·þÎñ¹«Ë¾¸»´ïͶ×Ê£¬½üÆÚÔâÓöÁËÒ»´ÎϵͳÈëÇÖÊÂÎñ£¬µ¼ÖÂÁè¼Ý77,000Ãû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶¡£×÷ΪȫÇò×î´óµÄ×ʲúÖÎÀí¹«Ë¾Ö®Ò»£¬¸»´ïÖÎÀíµÄ×ʲú×ܶî¸ß´ï14.1ÍòÒÚÃÀÔª¡£¾Ý¸»´ï͸¶£¬Õâ´ÎÈëÇÖ±¬·¢ÔÚ8ÔÂ17ÈÕÖÁ19ÈÕʱ´ú£¬Ò»ÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßʹÓÃ×î½ü½¨ÉèµÄÁ½¸ö¿Í»§ÕË»§ÇÔÈ¡ÁËÊý¾Ý¡£¸»´ïÔÚ·¢Ã÷ÕâÒ»Ô˶¯ºóѸËÙ½ÓÄɲ½·¥ÖÕÖ¹ÁË»á¼û£¬²¢ÔÚÍⲿÇ徲ר¼ÒµÄЭÖúÏÂÕö¿ªÁËÊӲ졣ֻ¹Ü¸»´ïûÓÐ͸¶³ýÁËÐÕÃûºÍÆäËûСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ÍâÉÐÓÐÄÄЩÐÅÏ¢±»ÇÔÈ¡£¬µ«ËüÒÑÏòÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËÁ½ÄêµÄÃâ·ÑÐÅÓüà¿ØºÍÉí·Ý»Ö¸´·þÎñ¡£¸»´ï»¹ÌåÏÖ£¬Ã»ÓÐÖ¤¾ÝÅú×¢±»µÁµÄ¿Í»§Êý¾Ý±»ÀÄÓ㬵«ÈÔ½¨ÒéÊÜÓ°ÏìµÄ¿Í»§¼á³ÖСÐÄ£¬°´ÆÚ¼ì²éÕË»§±¨±í£¬¼à¿ØÐÅÓñ¨¸æ£¬²¢ÊµÊ±±¨¸æÈκοÉÒÉÔ˶¯¡£


https://www.bleepingcomputer.com/news/security/fidelity-investments-says-data-breach-affects-over-77-000-people/