AkiraÀÕË÷Èí¼þÍÅ»ïÊ·ÎÞÇ°ÀýÒ»ÈÕй¶35ÃûÊܺ¦ÕßÊý¾Ý
Ðû²¼Ê±¼ä 2024-11-201. AkiraÀÕË÷Èí¼þÍÅ»ïÊ·ÎÞÇ°ÀýÒ»ÈÕй¶35ÃûÊܺ¦ÕßÊý¾Ý
11ÔÂ19ÈÕ£¬ÀÕË÷Èí¼þÍÅ»ïAkiraÔÚÒ»ÌìÄÚй¶ÁË´ó×ÚÊܺ¦ÕßÊý¾Ý£¬ÊýÄ¿´´ÏÂÁ˼ͼ¡£¸ÃÍÅ»ïÊÇÒ»¸öÀÕË÷Èí¼þ¼´·þÎñÍŻÔÚÍøÂç·¸·¨½çÔ½À´Ô½×ÅÃû¡£ËûÃÇͨ¹ýÇÔÈ¡ºÍ¼ÓÃÜÊý¾ÝÀ´ÀÕË÷Êܺ¦Õߣ¬²¢ÔÚ°µÍøйÃÜÍøÕ¾ÉÏÐû²¼Êܺ¦ÕßÐÅÏ¢¡£ÖÜÒ»£¬¸ÃÍÅ»ïµÄйÃÜÍøÕ¾ÐÂÔöÁË35ÃûÊܺ¦Õߣ¬ÆäÖÐ32ÃûΪÐÂÊܺ¦Õß¡£ÍøÂçÇå¾²Ñо¿Ö°Ô±ÌåÏÖ£¬ÕâÊÇب¹ÅδÓеĴó×Ú±»µÁ×ÊÁÏ¡£Ö»¹ÜÓÐÍƲâÒÔΪÕâ¿ÉÄÜÊÇAkiraÔڹرÕ֮ǰµÄ×îºóÒ»´Î´ó˦Âô£¬µ«Ñо¿Ö°Ô±ÒÔΪ£¬Akira¿ÉÄÜÈÔÔÚÍøÂç·¸·¨Éú̬ϵͳÖÐÆð¾¢À©ÕÅ¡£ÐÂÊܺ¦Õß´ó¶àÀ´×ÔÉÌÒµ·þÎñÐÐÒµ£¬×ܲ¿Î»ÓÚÃÀ¹ú£¬µ«Ò²ÓмÓÄô󡢵¹ú¡¢Ó¢¹úµÈµØµÄ¹«Ë¾Êܵ½Ó°Ïì¡£ÓëLockBit²î±ð£¬Akira´Ë´ÎÐû²¼µÄÊܺ¦ÕßÐÅÏ¢¶¼ÊÇеģ¬Ã»ÓоÉÊܺ¦ÕßÐÅÏ¢±»ÖØÐÂÐû²¼¡£
https://therecord.media/akira-ransomware-group-publishes-unprecedented-leak-data
2. FinastraÄÚ²¿Îļþ´«Êäƽ̨ÒÉÔâ´ó¹æÄ£ÐÅÏ¢ÇÔÈ¡
11ÔÂ19ÈÕ£¬½ðÈڿƼ¼¹«Ë¾FinastraÕýÔÚÊÓ²ìÆäÄÚ²¿Îļþ´«Êäƽ̨±¬·¢µÄ´ó¹æÄ£ÐÅÏ¢ÇÔÈ¡ÊÂÎñ¡£¸Ã¹«Ë¾ÎªÈ«Çò½ü8,100¼Ò½ðÈÚ»ú¹¹Ìṩ·þÎñ£¬°üÀ¨45¼Ò¶¥¼¶ÒøÐС£¿ËÈÕ£¬Ò»ÃûÍøÂç·¸·¨·Ö×ÓÔÚ°µÍøÉÏÉù³ÆÒÑ´ÓFinastraÇÔÈ¡Áè¼Ý400GBµÄÊý¾Ý²¢×îÏȳöÊÛ¡£FinastraÒÑÏò¿Í»§×ª´ïÁËÕâÒ»Çå¾²ÊÂÎñ£¬²¢ÌåÏÖ¿Í»§ÔËÓª¡¢¿Í»§ÏµÍ³»òÆäΪ¿Í»§Ìṩ·þÎñµÄÄÜÁ¦Ã»ÓÐÊܵ½Ö±½ÓÓ°Ïì¡£¹«Ë¾ÒÑʵÑéÌæ»»µÄÇå¾²Îļþ¹²Ïíƽ̨ÒÔÈ·±£Ò»Á¬ÐÔ£¬²¢ÕýÔÚÊÓ²ìÊÂÎñÔµ¹ÊÔÓÉ¡£¾ÝÆðÔ´Ö¤¾ÝÅú×¢£¬Æ¾Ö¤Òѱ»Ð¹Â¶£¬µ«ÉÐδȷ¶¨±»ÇÔÈ¡ÎļþÖаüÀ¨µÄÊý¾ÝµÄ¹æÄ£ºÍÐÔ×Ó¡£Ò»ÃûʹÓÃêdzơ°abyss0¡±µÄÍøÂç·¸·¨·Ö×ÓÔÚ10Ô·ݾÍÊÔͼ³öÊ۾ݳƴÓFinastraÇÔÈ¡µÄÊý¾Ý£¬¶øFinastraÔÚ11ÔÂ7ÈÕÊ״μì²âµ½¿ÉÒÉÔ˶¯¡£´Ë´ÎÈëÇÖ¿ÉÄÜÊÇabyss0Ôٴηµ»ØÇÔÈ¡¸ü´ó¶¼¾Ý¡£ÏÖÔÚ£¬abyss0µÄTelegramÕÊ»§ºÍBreachForumsÕÊ»§¶¼ÒÑÏûÊÅ£¬ÆäËùÓÐÏúÊÛÌû×ÓÒ²ÒÑɾ³ý¡£
https://krebsonsecurity.com/2024/11/fintech-giant-finastra-investigating-data-breach/
3. CISAÐÂÔöÈýÎó²î¾¯Ê¾£ºProgress Kemp LoadMasterµÈϵͳÃæÁÙÑÏÖØÍþв
11ÔÂ19ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½üÆÚÔÚÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖÐÐÂÔöÁËÈý¸öÖ÷ÒªÎó²î£¬ÆäÖÐÖ®Ò»ÊÇÓ°ÏìProgress Kemp LoadMasterµÄÒªº¦²Ù×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬±àºÅΪCVE-2024-1212£¬ÓÉRhino Security Labs·¢Ã÷²¢ÓÚ2ÔÂ21ÈÕÐû²¼µÄ¸üÐÂÖнâ¾ö¡£¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õßͨ¹ýLoadMasterÖÎÀí½çÃæÖ´ÐÐí§ÒâϵͳÏÂÁ¶ÔLoadMaster°æ±¾7.2.48.1¡¢7.2.54.8ºÍ7.2.55.0֮ǰµÄ°æ±¾×é³ÉÍþв¡£ÁíÍâÁ½¸ö±»CISAÌí¼Óµ½KEVµÄÎó²î»®·ÖÊÇÓ°ÏìPalo Alto Networks PAN-OSÖÎÀí½çÃæµÄÉí·ÝÑéÖ¤ÈƹýÎó²î£¨CVE-2024-0012£©ºÍOSÏÂÁî×¢ÈëÎó²î£¨CVE-2024-9474£©¡£±ðµÄ£¬Progress Software»¹ÐÞ¸´ÁËLoadMasterÖеÄÁíÒ»¸ö×î¸ßÑÏÖØÐÔÎó²îCVE-2024-7591£¬¸ÃÎó²îÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÌØÖÆHTTPÇëÇó»á¼ûÖÎÀí½çÃæ²¢Ö´ÐÐí§ÒâÏÂÁӰÏìLoadMaster°æ±¾7.2.60.0¼°Ö®Ç°°æ±¾ºÍMT Hypervisor°æ±¾7.1.35.11¼°Ö®Ç°°æ±¾¡£
https://www.bleepingcomputer.com/news/security/cisa-tags-progress-kemp-loadmaster-flaw-as-exploited-in-attacks/
4. ¸£ÌØÆû³µÔâÊý¾Ýй¶ָ¿Ø£¬44000Ìõ¿Í»§¼Í¼Òɱ»ºÚ¿ÍÂÛ̳й¶
11ÔÂ19ÈÕ£¬Ò»ÃûºÚ¿ÍÔÚºÚ¿ÍÂÛ̳BreachForumsÉÏÉù³Æй¶Á˸£ÌØÆû³µµÄ44,000Ìõ¿Í»§¼Í¼£¬ÒýÆðÁËÆÕ±é¹Ø×¢¡£¾Ý³Æ£¬ÕâЩ¼Í¼°üÀ¨¿Í»§µÄÈ«Ãû¡¢ÏÖʵλÖᢹºÖÃÏêÇé¡¢¾ÏúÉÌÐÅÏ¢ºÍʱ¼ä´ÁµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬Ö»¹Ü²¢·Ç¼«¶ËÃô¸Ð£¬µ«ÈÔ¿ÉÄÜʹ±»Ð¹Â¶µÄСÎÒ˽¼ÒÃæÁÙÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷µÄΣº¦¡£Ð¹Â¶Õß¡°EnergyWeaponUser¡±²¢Î´ÊÔͼ³öÊÛ¸ÃÊý¾Ý¼¯£¬¶øÊǽöÒÔ8¸ö»ý·Ö£¨Ô¼2ÃÀÔª£©µÄ¼ÛÇ®ÌṩӦÂÛ̳ע²á»áÔ±¡£¸£Ìع«Ë¾¶Ô´ËÊÂÌåÏÖÒѾÒâʶµ½²¢ÕýÔÚÆð¾¢ÊÓ²ìÏà¹ØÖ¸¿Ø¡£Í¬Ê±£¬ÓÐÖ¸¿Ø³ÆÁíÒ»ÃûºÚ¿Í¡°IntelBroker¡±Ò²ÉæÏÓ¼ÓÈëÁË´Ë´Îй¶ÊÂÎñ£¬¸ÃºÚ¿Í½üÆÚÒÑÈ·ÈÏÈëÇÖÁ˶à¸ö×ÅÃû»ú¹¹£¬°üÀ¨Ë¼¿Æ¡¢Åµ»ùÑÇ¡¢Å·ÖÞÐ̾¯×éÖ¯ºÍT-MobileµÈ¡£¼øÓÚÊý¾Ýй¶¿ÉÄÜ´øÀ´µÄΣº¦£¬×¨¼Ò½¨Ò鹫ÖÚÉóÉ÷¿´´ýδ¾ÇëÇóµÄͨѶ£¬²¢¾Ü¾øÈκÎÒªÇóÅû¶¸ü¶àÐÅÏ¢µÄÇëÇó¡£
https://www.bleepingcomputer.com/news/security/ford-investgates-alleged-breach-following-customer-data-leak/
5. HelldownÀÕË÷Èí¼þʹÓÃZyxel·À»ðǽÎó²î¹¥»÷ÆóÒµ
11ÔÂ19ÈÕ£¬Ðµġ°Helldown¡±ÀÕË÷Èí¼þÐж¯Õë¶ÔZyxel·À»ðǽÎó²î£¬Í¨¹ýÇÖÈ빫˾ÍøÂçÇÔÈ¡Êý¾Ý²¢¼ÓÃÜ×°±¸¡£¾Ý·¨¹úÍøÂçÇå¾²¹«Ë¾SekoiaÊӲ죬×Ô½ñÄêÑ×ÌìÍƳöÒÔÀ´£¬HelldownÉú³¤Ñ¸ËÙ£¬ÔÚÆäÀÕË÷ÃÅ»§ÍøÕ¾ÉÏÁгöÁËÖÚ¶àÊܺ¦Õߣ¬Ö÷ÒªÊÇÃÀ¹úºÍÅ·ÖÞµÄÖÐСÐ͹«Ë¾¡£Helldown Windows°æ»ùÓÚ鶵ÄLockBit 3¹¹½¨Æ÷£¬²Ù×÷ÓëDarkraceºÍDonexÏàËÆ£¬µ«Æä¼ÓÃÜÆ÷²¢²»ÏȽø£¬Ê¹ÓÃÅú´¦Öóͷ£Îļþ¿¢ÊÂʹÃü¡£Sekoia·¢Ã÷£¬ÖÁÉÙ8ÃûHelldownÊܺ¦ÕßÔÚʹÓÃZyxel·À»ðǽ×÷ΪIPSec VPN½ÓÈëµãʱÔâµ½ÈëÇÖ£¬ÍƲâHelldown¿ÉÄÜʹÓÃCVE-2024-42057Îó²î£¬¸ÃÎó²îÒÑÔÚ9ÔÂ3ÈÕÐû²¼µÄ¹Ì¼þ°æ±¾5.39ÖлñµÃÐÞ¸´¡£±ðµÄ£¬Sekoia»¹·¢Ã÷ÓëZyxelÈëÇÖÏà¹ØµÄ¿ÉÒÉÓû§ÕÊ»§ºÍÉèÖÃÎļþ£¬²¢ÍƲâÓÐÓÃÔغɿÉÄÜÓë¸ÃÈëÇÖÓйء£ÏÖÔÚ£¬ZyxelÉÐδ¶ÔÕâЩ¹¥»÷×÷³ö»ØÓ¦¡£
https://www.bleepingcomputer.com/news/security/helldown-ransomware-exploits-zyxel-vpn-flaw-to-breach-networks/
6. Ngioweb¶ñÒâÈí¼þÖ§³ÖNSOCKSµÈסլÊðÀí·þÎñ£¬Òý·¢ÍøÂçÇå¾²µ£ÐÄ
11ÔÂ19ÈÕ£¬Lumen TechnologiesµÄ×îÐÂÑо¿·¢Ã÷£¬ÃûΪNgiowebµÄ¶ñÒâÈí¼þ±»ÓÃÓÚÖ§³ÖÎÛÃûÕÑÖøµÄסլÊðÀí·þÎñNSOCKSÒÔ¼°ÆäËûÀàËÆ·þÎñ¡£¸Ã¶ñÒâÈí¼þÖ÷ҪʹÓÃСÐͰ칫ÊÒ/¼ÒÍ¥°ì¹«ÊÒ·ÓÉÆ÷ºÍÎïÁªÍø×°±¸¾ÙÐй¥»÷£¬²¢ÔÚÃÀ¹úÓµÓдó×ÚÊðÀí¡£Ngioweb½©Ê¬ÍøÂçÌìÌìά³ÖÔ¼35,000¸öÊÂÇé»úеÈË£¬ÆäÖÐÐí¶àÒÑ»îÔ¾Ò»¸öÔ»ò¸ü³¤Ê±¼ä¡£¸Ã¶ñÒâÈí¼þÓÉWater BarghestÍþв×é֯ʹÓã¬ËûÃÇͨ¹ý×Ô¶¯¾ç±¾Éø͸Ò×Êܹ¥»÷µÄÎïÁªÍø×°±¸²¢°²ÅÅNgioweb£¬½«Æä×¢²áΪÊðÀí²¢ÔÚסլÊðÀíÊг¡ÉϳöÊÛ¡£Õû¸öÇ®±Ò»¯Àú³ÌÖ»Ðè10·ÖÖÓ£¬Åú×¢¸Ã²Ù×÷¸ß¶È¸ßЧºÍ×Ô¶¯»¯¡£NSOCKSÔÚÌìϸ÷µØÏúÊÛSOCKS5ÊðÆÊÎö¼ûȨÏÞ£¬±»ÓÃÓÚƾ֤Ìî³ä¹¥»÷ºÍÆäËû¶ñÒâÔ˶¯¡£Êܺ¦×°±¸»¹ÓëÓÉÓòÌìÉúËã·¨½¨ÉèµÄC2Óò½¨Éèºã¾ÃÅþÁ¬£¬ÒÔÈ·¶¨ÊÇ·ñ½«ËüÃÇÌí¼Óµ½ÊðÀíÍøÂçÖС£LumenÌåÏÖ£¬NSOCKSÓû§Í¨¹ý180¶à¸ö·´ÏòÅþÁ¬C2½Úµã·ÓÉÁ÷Á¿£¬ÑÚÊÎÆäÕæʵÉí·Ý¡£
https://thehackernews.com/2024/11/ngioweb-botnet-fuels-nsocks-residential.html