SonicWall SSLVPN ×°±¸ÑÏÖØÎó²îÆع⣺³¬25,000̨װ±¸Ò×Êܹ¥»÷

Ðû²¼Ê±¼ä 2024-12-19

1. SonicWall SSLVPN ×°±¸ÑÏÖØÎó²îÆع⣺³¬25,000̨װ±¸Ò×Êܹ¥»÷


12ÔÂ17ÈÕ £¬ÍøÂçÇå¾²¹«Ë¾Bishop FoxµÄÆÊÎöÕ¹ÏÖ £¬Áè¼Ý25,000̨¿É¹ûÕæ»á¼ûµÄSonicWall SSLVPN×°±¸±£´æÖØ´óÇå¾²Òþ»¼ £¬ÆäÖÐ20,000̨װ±¸ÔËÐÐ׏©Ó¦É̲»ÔÙÖ§³ÖµÄSonicOS/OSX¹Ì¼þ°æ±¾¡£ÕâЩװ±¸ÈÝÒ×ÔâÊÜÀÕË÷Èí¼þ×éÖ¯ÈçFogºÍAkiraµÄ¹¥»÷ £¬³ÉΪÆäÈëÇÖ¹«Ë¾ÍøÂçµÄÈë¿Ú¡£Í¨¹ýɨÃ蹤¾ß £¬Bishop Fox·¢Ã÷ÁË430,363¸ö¹ûÕæ̻¶µÄSonicWall·À»ðǽ £¬ÖÎÀí»òSSL VPN½Ó¿Ú¿É´Ó»¥ÁªÍø»á¼û £¬Îª¹¥»÷ÕßÌṩÁË̽²âÎó²î¡¢¹ýʱ¹Ì¼þ¡¢¹ýʧÉèÖúÍÆƽâÈõÃÜÂëµÄʱ»ú¡£ÆäÖÐ £¬6,633̨װ±¸ÒѵִïʹÓÃÊÙÃü £¬ÉÐÓÐ14,077̨ʹÓÃSeries 6µÄ²»ÔÙÊÜÖ§³Ö°æ±¾ £¬¹²20,710̨Ò×ÊܹûÕæÎó²î¹¥»÷¡£±ðµÄ £¬ÉÐÓдó×Ú×°±¸ÔËÐÐ×Åδ֪°æ±¾»ò²»ÊÜÖ§³ÖµÄ¹Ì¼þ¡£ËäÈ»Ïà±È2024Äê1Ô £¬Ò×Êܹ¥»÷µÄ¶ËµãÊýÄ¿ÓÐËùϽµ £¬µ«²¹¶¡½ÓÄÉËÙÂÊÈÔÈ»»ºÂý £¬ÏÔʾ³öÍøÂçÇå¾²ÐÎÊÆÒÀÈ»ÑÏËà¡£


https://www.bleepingcomputer.com/news/security/over-25-000-sonicwall-vpn-firewalls-exposed-to-critical-flaws/


2. ÄÉÃ×±ÈÑǵçÐÅÔâÀÕË÷Èí¼þ¹¥»÷ £¬Ãô¸ÐÊý¾Ýй¶


12ÔÂ17ÈÕ £¬ÄÉÃ×±ÈÑǹúÓеçÐŹ«Ë¾½üÆÚÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷ £¬µ¼Ö½ü50ÍòÌõÃô¸Ð¿Í»§Êý¾Ý±»Ð¹Â¶ £¬ÆäÖаüÀ¨¸ß¼¶Õþ¸®¹ÙÔ±µÄÐÅÏ¢¡£ÔھܾøÓëºÚ¿Í×éÖ¯¡°ÁÔÈ˹ú¼Ê¡±ÏàÖúºó £¬ºÚ¿Í½«ÕâЩÊý¾ÝÐû²¼µ½ÁË°µÍøÉÏ¡£ÄÉÃ×±ÈÑǵçÐŹ«Ë¾ÕýÔÚÊÓ²ì´Ë´Î´ó¹æģϵͳÈëÇÖµÄÔµ¹ÊÔ­ÓÉ £¬²¢ÕýÓëÇå¾²¹ÙÔ±ÏàÖú £¬ÒÔïÔÌ­½øÒ»²½µÄÐÅϢй¶²¢×·²¶×ï·¸¡£¼´½«Ð¶ÈεÄ×ÜͳÄϸêÂ塤ķ±¾°Í¶Ô´Ë´ÎÍøÂç¹¥»÷ÌåÏÖѵ³â £¬²¢ºôÓõÒÔÓ¦ÓеĽôÆÈÐÔ´¦Öóͷ£´ËÊ £¬Ö¸³öÍøÂçÇå¾²Êǹú¼ÒÇå¾²ÎÊÌâ¡£¾ÝÄÉÃ×±ÈÑǵçÐŹ«Ë¾Ê×ϯִÐйÙ˹̹Àû¡¤É³ÄÉƽ´ïÌåÏÖ £¬¹«Ë¾²»»áÓëºÚ¿Í¾ÍÊê½ð¾ÙÐÐ̸ÅÐ £¬ÓÉÓÚÊê½ðÊý¶î¹ý¸ßÇÒÖ§¸¶Êê½ðÒ²²»¿É°ü¹ÜÐÅÏ¢²»±»Ð¹Â¶¡£´Ë´Î¹¥»÷ÖÐ £¬ºÚ¿ÍÇÔÈ¡ÁË°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡¢µØµãºÍÒøÐÐÐÅÏ¢µÈÔÚÄÚµÄÃô¸Ð¿Í»§¼Í¼ £¬²¢ÔÚÉ罻ýÌåÉÏ·ÖÏí¡£ÄÉÃ×±ÈÑǵçÐŹ«Ë¾ÖÒÑÔÈËÃDz»Òª·ÖÏíÈκÎ鶵ÄÐÅÏ¢ £¬²¢±Þ²ß¿Í»§¸ü¸ÄÃÜÂë £¬×èÖ¹ÔÚ¿ÉÒÉÇéÐÎϾÙÐÐתÕË¡£


https://www.capitalfm.co.ke/news/2024/12/sensitive-data-leaked-after-namibia-ransomware-hack/


3. ÍøÂç´¹ÂÚÕ©Æ­ÐÂÊֶΣºÀÄÓÃGoogleÈÕÀúºÍ»æͼҳÃæÇÔȡƾ֤


12ÔÂ18ÈÕ £¬½üÆÚÍøÂç´¹ÂÚÕ©Æ­Ô˶¯ÆµÈÔ £¬²»·¨·Ö×ÓʹÓÃGoogleÈÕÀúÔ¼ÇëºÍGoogle»æͼҳÃæ×÷Ϊ¹¤¾ß £¬ÍýÏëÇÔÈ¡Óû§Æ¾Ö¤ £¬²¢ÀÖ³ÉÈƹýÁËÀ¬»øÓʼþ¹ýÂËÆ÷¡£¾ÝÍøÂçÇå¾²¼à¿Ø»ú¹¹Check Point±¨¸æ £¬¶Ì¶ÌÖÜΧÄÚ £¬ÒÑÓÐ300¸öÆ·ÅÆÔâÊܹ¥»÷ £¬Áè¼Ý4,000·â´¹ÂÚÓʼþ±»·¢ËÍ¡£ÕâЩÓʼþµÄÄ¿µÄÆÕ±é £¬°üÀ¨½ÌÓý»ú¹¹¡¢Ò½ÁÆ»ú¹¹¡¢ÐÞ½¨¹«Ë¾ºÍÒøÐеÈ¡£¹¥»÷ÊÖ·¨Ö÷ÒªÊÇͨ¹ýGoogleÈÕÀú·¢ËÍ¿´ËÆÎÞº¦µÄ¾Û»áÔ¼Çë £¬Ô¼ÇëÖÐǶÈëÖ¸ÏòGoogle Forms»òGoogle DrawingµÄÁ´½Ó £¬ÓÕµ¼Óû§µã»÷αװ³ÉreCaptcha»òÖ§³Ö°´Å¥µÄÁíÒ»¸öÁ´½Ó¡£ÓÉÓÚÕâЩԼÇëÀ´×ÔÕýµ±µÄGoogle·þÎñ £¬Òò´ËÄܹ»ÈƹýÀ¬»øÓʼþ¹ýÂËÆ÷¡£Check PointÖ¸³ö £¬¹¥»÷ÕßʹÓÃÁËGoogleÈÕÀú·þÎñ £¬Ê¹µÃÓʼþÎÊÌâ¿´ÆðÀ´ÍêÈ«Õýµ± £¬ÓëÕý³£GoogleÈÕÀúÔ¼ÇëÎÞÒì £¬²¢Í¨¹ýÁËDKIM¡¢SPFºÍDMARCµÈµç×ÓÓʼþÇå¾²¼ì²é¡£±ðµÄ £¬¹¥»÷Õß»¹»á×÷·ÏGoogleÈÕÀúÔ˶¯²¢¸½¼ÓÐÂÎÅ £¬ÒÔÔöÌí´¹ÂÚÓʼþµÄ·¢ËÍÁ¿¡£Ö»¹ÜGoogleÔøÍƳö±£»¤²½·¥ £¬µ«ÈôGoogle WorkspaceÖÎÀíԱδÆôÓà £¬ÈÕÀúÖÐÈÔ»á×Ô¶¯Ìí¼Ó´ËÀàÔ¼Çë¡£


https://www.bleepingcomputer.com/news/security/ongoing-phishing-attack-abuses-google-calendar-to-bypass-spam-filters/


4. APT29ºÚ¿Í×é֯ʹÓÃ193¸öRDPÊðÀí·þÎñÆ÷Ö´ÐÐMiTM¹¥»÷


12ÔÂ18ÈÕ £¬¶íÂÞ˹ºÚ¿Í×éÖ¯APT29£¨Óֳơ°ÎçÒ¹±©Ñ©¡±£©ÕýʹÓÃÓÉ193¸öÔ¶³Ì×ÀÃæЭÒ飨RDP£©ÊðÀí·þÎñÆ÷×é³ÉµÄÍøÂçÖ´ÐÐÖÐÐÄÈË£¨MiTM£©¹¥»÷ £¬Ö¼ÔÚÇÔÈ¡Êý¾Ý¡¢Æ¾Ö¤²¢×°ÖöñÒ⸺ÔØ¡£¸Ã×é֯ʹÓÃPyRDPºì¶ÓÊðÀí¹¤¾ß £¬Í¨¹ýRDPЭÒéɨÃèÊܺ¦ÕßÎļþϵͳ¡¢ÇÔÈ¡Êý¾Ý²¢ÔÚÔ¶³ÌÖ´ÐжñÒâ³ÌÐò¡£¾ÝÇ÷ÊƿƼ¼£¨Trend Micro£©±¨¸æ £¬APT29µÄÄ¿µÄ°üÀ¨Õþ¸®¡¢¾üÊ¡¢Íâ½»¡¢IT¡¢ÔÆ·þÎñ¡¢µçÐż°ÍøÂçÇå¾²¹«Ë¾µÈ £¬ÌØÊâÕë¶ÔÃÀ¹ú¡¢·¨¹ú¡¢°Ä´óÀûÑǵȶà¸ö¹ú¼ÒµÄʵÌå¡£2024Äê10Ô £¬ÑÇÂíÑ·ºÍCERT-UAÐû²¼µÄ±¨¸æÏÔʾ £¬APT29ÓÕÆ­Êܺ¦Õßͨ¹ýÍøÂç´¹ÂÚÓʼþÅþÁ¬µ½¶ñÒâRDP·þÎñÆ÷ £¬¹²ÏíÍâµØ×ÊÔ´ £¬´Ó¶øÎÞÌõ¼þ»á¼ûÃô¸ÐÐÅÏ¢¡£Ç÷ÊƿƼ¼µÄ×îÐÂÑо¿Õ¹ÏÖÁË193¸öRDPÊðÀí·þÎñÆ÷½«ÅþÁ¬Öض¨ÏòÖÁ34¸öºó¶Ë·þÎñÆ÷ £¬Ê¹¹¥»÷ÕßÄܼàÊÓºÍ×èµ²RDP»á»°¡£ºÚ¿ÍʹÓÃPyRDP¹¤¾ß×èµ²Êܺ¦ÕßÓëÔ¶³Ì»á»°¼äµÄͨѶ £¬¼Í¼ƾ֤¡¢ÇÔÈ¡Êý¾Ý²¢ÔÚÐÂÅþÁ¬ÉÏÔËÐжñÒâÏÂÁî¡£±ðµÄ £¬APT29»¹½ÓÄÉÉÌÒµVPN¡¢TOR³ö¿Ú½ÚµãºÍסլÊðÀí·þÎñÑÚÊζñÒâ·þÎñÆ÷IPµØµã¡£ÎªÌá·À´ËÀ๥»÷ £¬Óû§Ó¦½öÓëÒÑÖª¡¢ÊÜÐÅÍеķþÎñÆ÷½¨ÉèRDPÅþÁ¬ £¬²¢Ð¡ÐÄÀ´×Ôδ֪ȪԴµÄRDPÅþÁ¬ÇëÇó¡£


https://www.bleepingcomputer.com/news/security/russian-hackers-use-rdp-proxies-to-steal-data-in-mitm-attacks/


5. ÍøÂç´¹ÂÚÔ˶¯ÀÄÓÃHubSpotÇÔÈ¡20,000 AzureÕÊ»§Æ¾Ö¤


12ÔÂ18ÈÕ £¬Õë¶ÔµÂ¹úºÍÓ¢¹úµÄÆû³µ¡¢»¯Ñ§¼°¹¤ÒµÖÆÔ칫˾ £¬Ò»³¡ÍøÂç´¹ÂÚÔ˶¯ÕýÔÚʹÓÃHubSpotƽ̨ÇÔÈ¡Microsoft AzureÕÊ»§Æ¾Ö¤¡£¾ÝPalo Alto NetworksµÄUnit 42Ñо¿ÍŶӱ¨¸æ £¬¸ÃÔ˶¯×Ô2024Äê6ÔÂÆðÖÁÉÙÒ»Á¬ÖÁ9Ô £¬ÒÑΣ¼°Ô¼20,000¸öÕË»§¡£ÍþвÐÐΪÕßͨ¹ýHubSpot Free Form Builder½¨ÉèÓÕÆ­ÐÔ±í¸ñ £¬²¢Ê¹ÓÃÄ£ÄâDocuSignµÄPDF½«Êܺ¦ÕßÖض¨ÏòÖÁƾ֤ÍøÂçÒ³Ãæ¡£ÕâЩҳÃæλÓÚ¹¥»÷Õß¿ØÖƵġ°.buzz¡±ÓòÃûÍøÕ¾ÉÏ £¬Ä£ÄâMicrosoft Outlook Web AppºÍAzureµÇ¼½çÃæ¡£Ö»¹ÜHubSpot»ù´¡ÉèʩδÊܹ¥»÷ £¬µ«Æä±»ÓÃ×÷ÖÐÐÄ°ì·¨Ö¸µ¼Êܺ¦Õß¡£ÓÉÓÚÓʼþ°üÀ¨Õýµ±·þÎñÁ´½Ó £¬ËüÃdz£ÄܱܿªÇå¾²¹¤¾ß¼ì²â½øÈëÊÕ¼þÏ䡣Ȼ¶ø £¬Ïà¹ØÓʼþδͨ¹ýSPF¡¢DKIMºÍDMARC¼ì²é¡£ÔÚÀÖ³ÉÈëÇÖºó £¬ÍþвÐÐΪÕßʹÓÃVPNαװµØÀíλÖà £¬²¢ÓëIT²¿·ÖÕùÈ¡ÕË»§¿ØÖÆȨ¡£Unit 42»¹·¢Ã÷Á˸ÃÔ˶¯ÖÐʹÓõÄÐÂÐÍ×ÔÖÎϵͳ±àºÅºÍÓû§ÊðÀí×Ö·û´® £¬¿ÉÓÃÓÚÍþвʶ±ð¡£Ö»¹Ü´ó¶¼·þÎñÆ÷ÒÑÏÂÏß £¬µ«¸ÃÔ˶¯ÔÙ´ÎÅú×¢ÍþвÐÐΪÕßÕýһֱ̽Ë÷ÈƹýÇå¾²µÄÐÂÒªÁì¡£


https://www.bleepingcomputer.com/news/security/hubspot-phishing-targets-20-000-microsoft-azure-accounts/


6. ÄÚ²¼À­Ë¹¼ÓÖÝRegional CareÒ½ÁÆ°ü¹Ü¹«Ë¾Êý¾Ýй¶


12ÔÂ18ÈÕ £¬ÄÚ²¼À­Ë¹¼ÓÖÝÒ½ÁÆ°ü¹Ü¹«Ë¾Regional Care½üÆÚÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ £¬¸ÃÊÂÎñÓ°ÏìÁËÁè¼Ý225,000ÈË¡£2024Äê9ÔÂÖÐÑ® £¬Regional Care·¢Ã÷ÆäÍøÂçÖеÄÒ»¸öÕË»§·ºÆðÒì³£Ô˶¯ £¬²¢Á¬Ã¦¹Ø±ÕÁ˸ÃÕË»§¡£¾­ÓÉÍøÂçÇ徲ר¼ÒµÄÊÓ²ì £¬È·ÈÏ¡°Î´¾­ÊÚȨµÄÒ»·½¡±¿ÉÄÜ´ÓÆäϵͳÖлñÈ¡ÁËһЩÎļþ¡£11ÔÂ8ÈÕ £¬¸Ã¹«Ë¾È·¶¨²¿·ÖÊÜËðÎļþ°üÀ¨Ãô¸ÐСÎÒ˽¼ÒÐÅÏ¢ £¬ÈçÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍ¿µ½¡°ü¹ÜÐÅÏ¢µÈ¡£Õë¶ÔÉç»á°ü¹ÜºÅÂ뱻鶵ÄСÎÒ˽¼Ò £¬Regional CareÌṩÁËÃâ·ÑµÄÐÅÓüà¿Ø·þÎñ¡£¸ÃÊÂÎñÒѱ»×ª´ï¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ¡£×èÖ¹ÏÖÔÚ £¬¸Ã°ü¹Ü¹«Ë¾ÉÐδ·ÖÏí¸ü¶à¹ØÓÚ´Ë´ÎÈëÇÖµÄÐÅÏ¢ £¬ÇÒSecurityWeekҲδ·¢Ã÷ÈκÎÒÑÖªµÄÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£


https://www.securityweek.com/regional-care-data-breach-impacts-225000-people/