ºÚ¿ÍIntelBrokerÉù³Æ¹¥ÆÆHPE£¬Ð¹Â¶Ãô¸ÐÊý¾Ý²¢ÍøÉϳöÊÛ

Ðû²¼Ê±¼ä 2025-01-21

1. ºÚ¿ÍIntelBrokerÉù³Æ¹¥ÆÆHPE£¬Ð¹Â¶Ãô¸ÐÊý¾Ý²¢ÍøÉϳöÊÛ


1ÔÂ19ÈÕ£¬ºÚ¿ÍIntelBrokerÉù³ÆÒÑÀÖ³ÉÈëÇÖ»ÝÆÕÆóÒµ(HPE)£¬Ò»¼Ò×ܲ¿Î»ÓÚÃÀ¹úµÂ¿ËÈø˹ÖÝÐÝ˹¶ÙµÄÈ«ÇòÐÔÊÖÒÕ½â¾ö¼Æ»®ÌṩÉÌ£¬²¢Ð¹Â¶ÁË°üÀ¨Ô´´úÂë¡¢Ö¤ÊéºÍСÎÒ˽¼ÒÉí·ÝÐÅÏ¢(PII)ÔÚÄÚµÄÃô¸ÐÊý¾Ý£¬ÕâЩÊý¾ÝÏÖÔÚÔÚÍøÉϳöÊÛ¡£IntelBrokerÒªÇóÒÔÃÅÂÞ±Ò(XML)¼ÓÃÜÇ®±ÒÖ§¸¶£¬ÒÔ¼á³ÖÄäÃûºÍ²»¿É×·×Ù¡£¾Ý³Æ£¬´Ë´ÎÈëÇÖÊÇÖ±½Ó¹¥»÷HPE»ù´¡ÉèÊ©µÄЧ¹û£¬²»Éæ¼°µÚÈý·½»á¼ûȨÏÞ¡£ºÚ¿Í·ÖÏíµÄÊý¾ÝÊ÷ºÍ½ØͼËƺõ֤ʵÁËÔ´´úÂ롢˽ÓÐGitHub´æ´¢¿â¡¢Docker¹¹½¨¡¢Ö¤ÊéÒÔ¼°Óû§Êý¾ÝµÈÃô¸ÐÐÅÏ¢µÄй¶¡£ÈôÊǾ­»ÝÆÕ֤ʵ£¬Õâ¿ÉÄÜ×é³ÉÒ»´ÎÖØ´óÇå¾²ÊÂÎñ¡£ÖµµÃ×¢ÖصÄÊÇ£¬HPEºÍHP Inc.ÊÇÁ½¼Ò²î±ðµÄ¹«Ë¾£¬Ç°ÕßרעÓÚÆóÒµ¼¶IT½â¾ö¼Æ»®£¬ºóÕßÔòרעÓÚÏûºÄ²úÆ·¡£IntelBroker´ËÇ°ÒÑÉæÏÓ¶àÆðÊý¾Ýй¶ÊÂÎñ£¬°üÀ¨ÈëÇÖ˼¿Æ¡¢Åµ»ùÑǺÍAMDµÈ×ÅÃûÆóÒµ¡£


https://hackread.com/hackers-claim-hewlett-packard-data-breach-sale/


2. ChatGPTÅÀ³æÎó²î»òÖÂDDoS¹¥»÷


1ÔÂ19ÈÕ£¬µÂ¹úÇå¾²Ñо¿Ô±Benjamin Flesch·¢Ã÷OpenAIµÄChatGPT API±£´æÒ»¸öDZÔÚµÄÇå¾²Îó²î£¬¿ÉÄܱ»Ê¹ÓÃÀ´ÌᳫÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷¡£Í¨¹ýÏòChatGPT API·¢ËÍ°üÀ¨´ó×ÚÂÔÓвî±ðµ«Ö¸ÏòͳһÍøÕ¾µÄURLÁбíµÄHTTP POSTÇëÇ󣬹¥»÷Õß¿ÉÒÔ´¥·¢ChatGPTÅÀ³æ¶ÔÕâЩÍøÕ¾µÄƵÈÔ»á¼û£¬´Ó¶ø¶ÔÄ¿µÄÍøÕ¾Ôì³ÉѹÁ¦£¬ÉõÖÁµ¼Ö·þÎñÖÐÖ¹¡£FleschÖ¸³ö£¬ChatGPT APIÔÚ´¦Öóͷ£ÕâЩÇëÇóʱ±£´æÖÊÁ¿È±ÏÝ£¬¼ÈûÓмì²éURLÁбíÖеÄÖظ´ÏҲûÓжÔURLÊýÄ¿¾ÙÐÐÏÞÖÆ¡£ÕâÒâζ×Å£¬×ÝÈ»¹¥»÷ÕßÖ»·¢ËÍÉÙÁ¿ÇëÇó£¬Êܺ¦ÕßÒ²¿ÉÄÜÊÕµ½´ó×ÚÀ´×Ô²î±ðIPµØµãµÄ»á¼ûÇëÇ󣬵¼ÖÂDDoSÖ¢×´¡£±ðµÄ£¬Flesch»¹Ìáµ½£¬Õâ¸öAPI»¹¿ÉÄÜÊܵ½ÌáÐÑ×¢Èë¹¥»÷µÄÓ°Ïì¡£Ëûͨ¹ý¶àÖÖÇþµÀÏòOpenAI±¨¸æÁËÕâ¸öÎó²î£¬µ«ÉÐδ»ñµÃ»Ø¸´¡£FleschÖÊÒÉΪʲôOpenAIûÓÐʵÏÖ¼òÆÓµÄÑéÖ¤Âß¼­À´±ÜÃâÕâÖÖÀÄÓ㬲¢ÍƲâÕâ¿ÉÄÜÊÇOpenAIµÄAIÊðÀíÏîÄ¿µÄÒ»¸öʾÀý£¬¶øÕâ¸öAIÊðÀíÔÚ´¦Öóͷ£ÇëÇóʱÏÔȻȱ·¦ÄÚÖõÄÇå¾²ÐÔ¡£ËûÒÔΪ£¬ÕâÖÖÉè¼ÆȱÏÝÔÚÂÄÀú¸»ºñµÄ¹è¹È¹¤³Ìʦ¿´À´ÊDz»¿ÉÏëÏóµÄ£¬ÓÉÓÚÀàËƹȸèÕâÑùµÄÅÀ³æÒѾ­±£´æ¶àÄ꣬²¢ÇÒ¶¼ÓÐÏÞÖƶÔͳһÍøÕ¾µÄÇëÇóÁ¿µÄ»úÖÆ¡£


https://www.theregister.com/2025/01/19/openais_chatgpt_crawler_vulnerability/


3. CL-UNK-0979ʹÓÃIvantiÎó²î»ñÈ¡ÍøÂç»á¼ûȨÏÞ


1ÔÂ18ÈÕ£¬Palo Alto Networks Ðû²¼ÁËÒ»·ÝÍþв¼ò±¨£¬Õ¹ÏÖÁË Ivanti ²úÆ·Öб£´æµÄÁ½¸öÑÏÖØÎó²î£ºCVE-2025-0282 ºÍ CVE-2025-0283¡£ÕâÁ½¸öÎó²îÓ°Ïì Ivanti µÄ Connect Secure¡¢Policy Secure ºÍ ZTA Íø¹Ø×°±¸£¬ÕâЩװ±¸³£±»ÓÃÓÚʵÏÖÔ¶³ÌÍøÂçÅþÁ¬¡£CVE-2025-0282 ÊÇÒ»¸öÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ý·¢ËÍÌØÖÆÇëÇóʵÏÖÔ¶³Ì´úÂëÖ´ÐеÄÎó²î£¬±»ÆÀΪÑÏÖؼ¶±ð£¬CVSS ÆÀ·ÖΪ 9.0¡£¶ø CVE-2025-0283 ÔòʹÍâµØ¾­ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»ÌáÉýȨÏÞ£¬ÆäÑÏÖØÐÔÆÀ¼¶Îª¸ß£¬CVSS ÆÀ·ÖΪ 7.0¡£¾ÝÍøÂçÇå¾²×éÖ¯¼Í¼£¬°üÀ¨ Mandiant¡¢Watchtowr Labs ºÍ Palo Alto Networks ÔÚÄڵĶà¼Ò»ú¹¹ÒÑÊӲ쵽¹¥»÷ÕßʹÓà CVE-2025-0282 Éø͸ÄÚ²¿ÍøÂç¡£¹¥»÷Ô˶¯±»×·×ÙΪ CL-UNK-0979£¬Éæ¼°Ëĸö½×¶Î£º³õʼ»á¼û¡¢Æ¾Ö¤ÍøÂçºÍºáÏòÒƶ¯¡¢·ÀÓùÌÓ±ÜÒÔ¼°³¤ÆÚÐÔ¡£¹¥»÷ÕßʹÓÃÁË°üÀ¨×Ô½ç˵ Perl ¾ç±¾ ldap.pl¡¢ÄÚ´æת´¢¹¤¾ßºÍ DLL ²à¼ÓÔصÈÔÚÄڵĶàÖÖÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷¼°ÊÖÒÕ¡£Ivanti ÒÑÐû²¼²¹¶¡£¬²¢½¨ÒéÁ¬Ã¦¸üÐÂËùÓÐÊÜÓ°ÏìµÄϵͳ£¬Í¬Ê±ÃãÀøʹÓÃÍêÕûÐÔ¼ì²é¹¤¾ß (ICT) ¼à¿Ø¿ÉÒÉÔ˶¯¡£


https://securityonline.info/cl-unk-0979-exploit-zero-day-flaw-in-ivanti-connect-secure-to-gain-access-to-networks/


4. Õ©Æ­ÕßʹÓÃTruth SocialÌᳫÍøÂç´¹ÂÚºÍڲƭÔ˶¯


1ÔÂ19ÈÕ£¬Truth SocialÊÇÒ»¸öÓÉÌØÀÊÆÕýÌåÓë¿Æ¼¼¼¯ÍÅÔÚ2022ÄêÍƳöµÄÉ罻ýÌåƽ̨£¬ÏÖÔÚÈ´³ÉΪÁËÕ©Æ­·Ö×ÓµÄÖ÷ҪĿµÄ¡£NetcraftµÄб¨¸æÕ¹ÏÖÁËÕ©Æ­ÕßÔõÑùʹÓøÃƽ̨µÄ¹¦Ð§ºÍÓû§ÐÅÍÐÀ´²ß»®´ó¹æÄ£ÍøÂç¹¥»÷¡£¸Ãƽ̨¿ìËÙµÄÓû§ÔöÌíºÍÒÔÉçÇøΪÖÐÐĵÄÉè¼ÆΪթƭÕßÌṩÁ˸»ºñµÄÐÅϢȪԴ£¬Ê¹ËûÃÇÄܹ»ÇáËÉʶ±ðºÍÁªÏµÆäËûÓû§¡£Í¬Ê±£¬Óû§¶Ôƽ̨¡°ÕæÏࡱµÄ¸ß¶ÈÐÅÍÐҲΪթƭÕß´´Á¢ÁË·ÊÃÀµÄÍÁÈÀ£¬ÆäÖÐ87%µÄÓû§ÆÚÍûƽ̨ÉϵÄÐÂÎźÍÐÅÏ¢´ó¶àÊÇ׼ȷµÄ£¬ÕâÖÖÌ«¹ý×ÔÐÅÔöÌíÁËÊÜÆ­µÄΣº¦¡£NetcraftÊӲ쵽ÁËһϵÁÐÕë¶ÔTruth SocialÓû§µÄÕ©Æ­ÐÐΪ£¬°üÀ¨ÍøÂç´¹ÂÚÁ´½Ó¡¢Í¶×ÊÕ©Æ­ºÍÔ¤¸¶·ÑÕ©Æ­µÈ£¬ÉõÖÁÒ»ÌìÖ®ÄÚ¾ÍÄÜÊÕµ½40Ìõδ¾­ÇëÇóµÄÕ©Æ­ÐÂÎÅ¡£±ðµÄ£¬Õ©Æ­Õß»¹Ê¹ÓøÃƽ̨Èƹý¹Å°åµÄµç×ÓÓʼþÇå¾²²½·¥£¬½«Æä×÷ΪÖض¨Ïò¹¤¾ßÀ´×èÖ¹±»·¢Ã÷¡£NetcraftÖÒÑԳƣ¬Ë¼Á¿µ½È«Çò䱨¸æµÄÊÂÎñ£¬ÕâЩթƭÔì³ÉµÄÏÖʵËðʧ¿ÉÄܸߴïÊýÊ®ÒÚÉõÖÁÊýÍòÒÚÃÀÔª¡£ÎªÁËÓ¦¶ÔÕâЩÍþв£¬NetcraftÇ¿µ÷ÐèÒªÖƶ©Ç¿Ê¢µÄ¼ì²âºÍɨ³ýÕ½ÂÔ£¬Ê¹ÓÃÐÂÊÖÒÕÀ´± £»¤ÏûºÄÕßÃâÊÜΣÏÕ¡£


https://securityonline.info/scammers-exploit-truth-social-to-launch-phishing-and-fraud-campaigns/


5. ÄÏÑÇÔâ¡°Tanzeem¡±¶ñÒâÈí¼þ¹¥»÷£¬DONOT APT×éÖ¯Ò»Á¬Íþв


1ÔÂ20ÈÕ£¬¾ÝCyber Security News±¨µÀ£¬CyfirmaµÄÍøÂçÇå¾²ÍŶӽüÆÚ½ÒÆÆÁËÒ»ÏîÕë¶ÔÄÏÑÇ£¬ÌØÊâÊÇÓ¡¶È¿ËʲÃ׶ûµØÇøÓû§µÄÖØ´óAndroid¶ñÒâÈí¼þÔ˶¯¡£¸Ã¶ñÒâÈí¼þαװ³ÉÃûΪ¡°Tanzeem¡±µÄ̸ÌìÓ¦Óã¬ÒâͼÇÔÈ¡Ä¿µÄ×°±¸ÖеÄÃô¸ÐÊý¾Ý¡£¡°Tanzeem¡±ÔÚÎÚ¶û¶¼ÓïÖÐÒâΪ¡°×éÖ¯¡±£¬³£Óë¸ÃµØÇø¿Ö²À×éÖ¯ºÍÖ´·¨»ú¹¹Ïà¹ØÁª£¬ÌåÏÖÆäÕë¶ÔÌض¨Ð¡ÎÒ˽¼Ò»òÕûÌå¡£´Ë¶ñÒâÈí¼þ¹éÊôÓÚ¾ßÓÐÓ¡¶ÈÅä¾°µÄ¡°DONOT¡±APT×éÖ¯¡£ËüʹÓÃOneSignalƽ̨ÍÆËÍÍøÂç´¹ÂÚÁ´½Ó¾ÙÐÐÈö²¥£¬×°ÖúóËä×èÖ¹ÔËÐУ¬µ«ÒÑÇëÇó¶àÏîÃô¸ÐȨÏÞ£¬Èçͨ»°¼Í¼¡¢ÁªÏµÈË¡¢¶ÌÐÅ¡¢Îļþ´æ´¢ºÍλÖÃÊý¾Ý£¬²¢ÊÔͼ»ñÈ¡µç×ÓÓʼþºÍÓû§ÃûȨÏÞ¡£±ðµÄ£¬¸Ã¶ñÒâÈí¼þ½ÓÄÉ»ìÏýÊÖÒÕÒþ²Ø´úÂ룬¾ß±¸Ã¶¾ÙÎļþ¡¢²¶»ñ¼üÅÌÊäÈë¡¢ÍøÂçϵͳÐÅÏ¢ºÍÆÁĻ¼ÖƵȹ¦Ð§¡£DONOT APT×éÖ¯ºã¾ÃÒÔÄÏÑÇÕþ¸®ºÍ¾üÊÂ×é֯ΪĿµÄ£¬´Ë´ÎÐж¯ÏÔʾÆäÕ½ÊõÒ»Ö±Ñݱä¡£ÍøÂçÇ徲ר¼ÒÖÒÑÔ£¬¸Ã×éÖ¯¿ÉÄܼÌÐøˢй¥»÷ÒªÁ죬½¨ÒéÓû§×°ÖÃÐÂÓ¦ÓÃʱ¼á³ÖÉóÉ÷£¬ÓÈÆäÊÇÃæÁÙÒªÇó´ó×ÚȨÏÞµÄÓ¦Óá£


https://cybersecuritynews.com/new-android-malware-mimics-chat-app/


6. ±´¶ûÉ­¼¯ÍÅй¶ÁËÁè¼Ý15,000¸öFortiGate·À»ðǽÉèÖÃ


1ÔÂ20ÈÕ£¬±´¶ûÉ­¼¯ÍÅй¶ÁËÁè¼Ý15,000¸öFortiGate·À»ðǽµÄÉèÖ㬶ÔÈ«ÇòʹÓÃÕâЩװ±¸µÄ×éÖ¯×é³ÉÁËÑÏÖØÍþв¡£´Ë´Î×ß©ÊÂÎñʹµÃ¹¥»÷Õß¿ÉÄÜ»á¼ûÃô¸Ðϵͳ²¢Èƹý·ÀÓù²½·¥£¬ÆäÖÐÃÀ¹ú¡¢Ó¢¹ú¡¢²¨À¼ºÍ±ÈÀûʱµÈµØÊÜÓ°Ïì×îΪÑÏÖØ¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§Ãû¡¢ÃÜÂ루²¿·ÖΪ´¿Îı¾£©¡¢×°±¸ÖÎÀíÊý×ÖÖ¤ÊéÒÔ¼°ËùÓзÀ»ðǽ¹æÔò£¬Îª¹¥»÷ÕßÌṩÁ˸»ºñµÄ¹¥»÷×ÊÔ´¡£Ì»Â¶µÄÓû§ÃûºÍÃÜÂë¿ÉÄܱ»Ö±½ÓÓÃÓÚ»á¼ûÍøÂçÉϵÄÃô¸Ðϵͳ£¬¶øй¶µÄ·À»ðǽÉèÖÃÔò¿ÉÄÜ̻¶ÄÚ²¿ÍøÂç½á¹¹£¬Ê¹¹¥»÷ÕßÄܹ»Ê¶±ð²¢Ê¹ÓÃÈõµã¡£±ðµÄ£¬±»Ð¹Â¶µÄÊý×ÖÖ¤Êé¿ÉÄܵ¼ÖÂδ¾­ÊÚȨµÄ»á¼û»òÔÚÇ徲ͨѶʱ´úµÄÉí·Ýð³ä¡£Ö»¹ÜһЩ×éÖ¯ÔÚ2022ÄêÒѾ­ÐÞ²¹ÁËÏà¹ØÎó²î£¨CVE-2022-40684£©£¬µ«ÓÉÓÚÕâÊÇÒ»¸öÁãÈÕÎó²î£¬¼ì²éÊÇ·ñ±£´æ±»ÈëÇֵļ£ÏóÈÔÈ»ÖÁ¹ØÖ÷Òª¡£ÎªÁ˼õÇá´ËÀàйÃÜ´øÀ´µÄΣº¦£¬×éÖ¯Ó¦¸üÐÂ×°±¸ºÍVPNƾ֤£¬ÊµÑéÇ¿ÃÜÂëÕ½ÂÔ£¬ÉóºË²¢ÖØÐÂÉèÖ÷À»ðǽ£¬ÂÖ»»ÊÜËðµÄÊý×ÖÖ¤Ê飬²¢È·¶¨×éÖ¯ÖÐÐÞ²¹Îó²îµÄʱ¼ä±í¡£CloudSEKÌṩÁËÒ»¸öÓÐÓÃ×ÊÔ´£¬ÓÃÓÚ¼ì²éÍøÂçÊÇ·ñÊôÓÚ̻¶µÄIP¹æÄ££¬ÒÔ×ÊÖú×éÖ¯± £»¤ÍøÂç²¢½µµÍDZÔÚΣº¦¡£


https://hackread.com/belsen-group-leaks-fortigate-firewall-configurations/