CISAÖÒÑÔFortiOSÑÏÖØRCEÎó²îÕý±»Æð¾¢Ê¹ÓÃ

Ðû²¼Ê±¼ä 2024-10-11

1. CISAÖÒÑÔFortiOSÑÏÖØRCEÎó²îÕý±»Æð¾¢Ê¹ÓÃ


10ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬CISA͸¶¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓÃÒ»¸öÑÏÖØµÄFortiOSÔ¶³Ì´úÂëÖ´ÐÐ(RCE)Îó²î£¨CVE-2024-23113£©¡£¡£¡£¸ÃÎó²îÓÉfgfmdÊØ»¤Àú³Ì½ÓÊÜÍⲿ¿ØÖƵÄÃûÌÃ×Ö·û´®×÷Ϊ²ÎÊýÒýÆð£¬£¬£¬£¬£¬£¬Ê¹µÃδ¾­Éí·ÝÑéÖ¤µÄÍþвÐÐΪÕßÄܹ»ÔÚδÐÞ²¹µÄ×°±¸ÉÏÖ´ÐÐÏÂÁî»òí§Òâ´úÂ룬£¬£¬£¬£¬£¬ÇÒÎÞÐèÓû§½»»¥¡£¡£¡£´ËÎó²îÓ°ÏìFortiOS 7.0¼°ÒÔÉϰ汾¡¢FortiPAM 1.0¼°ÒÔÉϰ汾¡¢FortiProxy 7.0¼°ÒÔÉϰ汾ÒÔ¼°FortiWeb 7.4¡£¡£¡£FortinetÒÑÓÚÖÙ´º·ÝÅû¶²¢ÐÞ²¹Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬²¢½¨Òéɾ³ýËùÓнӿڶÔfgfmdÊØ»¤³ÌÐòµÄ»á¼ûȨÏÞ×÷Ϊ»º½â²½·¥¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬CISAÒѽ«´ËÎó²îÌí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖУ¬£¬£¬£¬£¬£¬ÒªÇóÃÀ¹úÁª°î»ú¹¹ÔÚ10ÔÂ30ÈÕ֮ǰ±£»£»£»£»£»¤ÆäÍøÂçÉϵÄFortiOS×°±¸ÃâÊÜÕâЩÕýÔÚ¾ÙÐеĹ¥»÷¡£¡£¡£ÍøÂçÇå¾²»ú¹¹ÖÒÑԳƣ¬£¬£¬£¬£¬£¬´ËÀàÎó²îÊǶñÒâÍøÂçÐÐΪÕ߯µÈÔ¹¥»÷µÄǰÑÔ£¬£¬£¬£¬£¬£¬´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/


2. Ó¡¶ÈStar Health°ü¹Ü¹«Ë¾ÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬¿Í»§Êý¾ÝÒÉÔâй¶


10ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬Ó¡¶È×î´óµÄ¿µ½¡°ü¹Ü¹«Ë¾Ö®Ò»Star Health and Allied Insurance֤ʵÔâÊÜÁ˶ñÒâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂijЩÊý¾Ý±»Î´¾­ÊÚȨºÍ²»·¨»á¼û£¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÔËӪδÊÜÓ°Ï죬£¬£¬£¬£¬£¬Ð§ÀÍÈÔÔÚ¼ÌÐø¡£¡£¡£Star HealthÌṩ¶àÖÖ°ü¹ÜЧÀÍ£¬£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý1.7ÒÚÒ½Áưü¹Ü¿Í»§¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÉù³ÆÔÚÍøÉÏÐû²¼Á˿ͻ§µÄ¿µ½¡¼Í¼ºÍÆäËûÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯ÔÚTelegramÉϽ¨ÉèÁË̸Ìì»úеÈË£¬£¬£¬£¬£¬£¬Ð¹Â¶ÁË3100ÍòͶ±£È˺ÍÁè¼Ý580Íò·Ý°ü¹ÜË÷ÅâµÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£Star HealthÒÑÌáÆðËßËÏ¿ØËßTelegramºÍCloudflare£¬£¬£¬£¬£¬£¬²¢Ö¸³öÆäÊ×ϯÐÅÏ¢Çå¾²¹ÙÒ»Ö±ÔÚÆð¾¢ÅäºÏÊӲ죬£¬£¬£¬£¬£¬Î´·¢Ã÷ÆäÓÐÈκβ»µ±ÐÐΪ¡£¡£¡£´Ë´ÎÈëÇÖµÄϸ½ÚºÍºÚ¿ÍÔõÑù»ñÈ¡Êý¾ÝÈÔ²»ÇåÎú£¬£¬£¬£¬£¬£¬°ü¹Ü¹«Ë¾Î´Í¸Â¶ÊÇ·ñ¿ÉÒÔÈ·ÈÏË­»á¼ûÁËÊý¾ÝÒÔ¼°ÄÄЩÊý¾ÝÒѱ»»á¼û»òÇÔÈ¡¡£¡£¡£


https://techcrunch.com/2024/10/09/indias-star-health-confirms-data-breach-after-cybercriminals-post-customers-health-data-online/


3. ³¯ÏÊÍþвÕßÕë¶Ô¿Æ¼¼ÇóÖ°ÕßÍÆ¹ã¶ñÒâÈí¼þ


10ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬Ó볯ÏÊÓÐÁªÏµµÄÍþвÐÐΪÕß½«Ä¿µÄËø¶¨ÔڿƼ¼ÐÐÒµµÄÇóÖ°ÕßÉíÉÏ£¬£¬£¬£¬£¬£¬Í¨¹ýÇóְƽ̨ÁªÏµÈí¼þ¿ª·¢Ö°Ô±£¬£¬£¬£¬£¬£¬Ã°³äDZÔÚ¹ÍÖ÷Ô¼ÇëËûÃǼÓÈëÔÚÏßÃæÊÔ£¬£¬£¬£¬£¬£¬²¢ÊÔͼ˵·þËûÃÇÏÂÔØ²¢×°ÖöñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÕâÊÇÃûΪ¡°Ñ¬È¾ÐÔ·Ã̸¡±µÄ»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¸Ã»î¶¯¼¯Èº±»×·×ÙΪCL-STA-0240£¬£¬£¬£¬£¬£¬Éæ¼°ÒÑÖª¶ñÒâÈí¼þ¼Ò×åBeaverTailºÍInvisibleFerretµÄ¸üа汾¡£¡£¡£µÚÒ»½×¶ÎÑ¬È¾Éæ¼°BeaverTailÏÂÔØ³ÌÐòºÍÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬£¬¸Ã³ÌÐòרΪWindowsºÍApple macOSƽ̨Éè¼Æ£¬£¬£¬£¬£¬£¬³äµ±»ùÓÚPythonµÄInvisibleFerretºóÃŵĹܵÀ¡£¡£¡£Ö»¹Ü¸Ã»î¶¯Òѱ»¹ûÕæÅû¶£¬£¬£¬£¬£¬£¬µ«ÈÔÓÐÖ¤¾ÝÅú×¢ËüÈÔÈ»»îÔ¾¡£¡£¡£Çå¾²Ñо¿Ô±ºÍÍøÂçÇå¾²¹«Ë¾ÏêϸÐÎòÁËʹÓüÙÊÓÆµ¾Û»áÓ¦ÓóÌÐòMiroTalkºÍFreeConference.comÉøÍ¸µ½¿ª·¢Ö°Ô±ÏµÍ³ÖеĹ¥»÷Á´¡£¡£¡£BeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡ä¯ÀÀÆ÷ÃÜÂë¡¢´Ó¶à¸ö¼ÓÃÜÇ®±ÒÇ®°üÖÐÍøÂçÊý¾Ý£¬£¬£¬£¬£¬£¬²¢ÏÂÔØ²¢Ö´ÐÐInvisibleFerretºóÃÅ£¬£¬£¬£¬£¬£¬¸ÃºóÃŰüÀ¨Ö¸ÎÆÊ¶±ð¡¢Ô¶³Ì¿ØÖÆ¡¢¼üÅ̼ͼ¡¢Êý¾Ýй¶µÈ¹¦Ð§¡£¡£¡£Unit 42ÌåÏÖ£¬£¬£¬£¬£¬£¬Õâ´Î»î¶¯¿ÉÄܳöÓÚ¾­¼ÃÄîÍ·£¬£¬£¬£¬£¬£¬ÓÉÓÚBeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡13¸ö²î±ðµÄ¼ÓÃÜÇ®±ÒÇ®°ü£¬£¬£¬£¬£¬£¬³¯ÏÊÍþвÕß»á¾ÙÐнðÈÚ·¸·¨ÒԳO×ʽðÀ´Ö§³Ö³¯ÏÊÕþȨ¡£¡£¡£


https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html


4. ºÚ¿ÍÉù³Æ¹¥»÷Dr.WebÇÔÈ¡10TBÊý¾Ý£¬£¬£¬£¬£¬£¬Òý·¢ÍøÂçÇå¾²ÐÐÒµµ£ÐÄ


10ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬¾ÝCyber Security News±¨µÀ£¬£¬£¬£¬£¬£¬Ò»ÃûºÚ¿ÍÔÚºÚ¿ÍÂÛ̳DumpForumsÉÏÉù³Æ¶Ô¶íÂÞË¹ÖøÃûÍøÂçÇå¾²¹«Ë¾Dr.Web¾ÙÐÐÁ˹¥»÷£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡Á˸ߴï10TBµÄÊý¾Ý¡£¡£¡£ºÚ¿ÍÉù³Æ´Ë´Î¹¥»÷¾­ÓÉÈ«ÐIJ߻®£¬£¬£¬£¬£¬£¬ÀúʱÊýÌ죬£¬£¬£¬£¬£¬ÀÖ³ÉÉøÍ¸µ½Dr.WebµÄÍâµØÍøÂ磬£¬£¬£¬£¬£¬²¢Öð²½ÈëÇÖÆäЧÀÍÆ÷ºÍ×ÊÔ´£¬£¬£¬£¬£¬£¬ÉõÖÁÉøÍ¸µ½ÁËÆä×îÇå¾²µÄ»ù´¡ÉèÊ©²¿·Ö¡£¡£¡£ºÚ¿Í»¹Éù³Æ´ÓGitLabЧÀÍÆ÷¡¢¹«Ë¾ÓʼþЧÀÍÆ÷¡¢Confluence¡¢Redmine¡¢Jenkins¡¢Mantisϵͳ¡¢RocketChatͨѶƽ̨µÈ¶à¸öÒªº¦ÏµÍ³ÖÐÆÆ½â²¢Ð¹Â¶ÁËÊý¾Ý£¬£¬£¬£¬£¬£¬²¢ÔÚÒ»¸öÔÂÄÚδ±»·¢Ã÷µÄÇéÐÎÏ»á¼û²¢ÉÏ´«Á˿ͻ§¶ËÊý¾Ý¿â£¬£¬£¬£¬£¬£¬¿ÉÄÜ̻¶ÁËDr.WebÓû§µÄÃô¸ÐÐÅÏ¢¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Dr.Web¹Ù·½ÉùÃ÷³Æ£¬£¬£¬£¬£¬£¬Ö»¹ÜÆäϵͳ×ÊÔ´ÔâÊÜÁËÓÐÕë¶ÔÐԵĹ¥»÷£¬£¬£¬£¬£¬£¬µ«ÒÑÀֳɴì°ÜÁËÆÆËðÆä»ù´¡ÉèÊ©µÄÍýÏ룬£¬£¬£¬£¬£¬Óû§¶Ë²úƷδÊÜÓ°Ïì¡£¡£¡£ÎªÔ¤·ÀÆð¼û£¬£¬£¬£¬£¬£¬Dr.WebÒѶϿªËùÓÐ×ÊÔ´ÓëÍøÂçµÄÅþÁ¬¾ÙÐÐÑéÖ¤£¬£¬£¬£¬£¬£¬²¢ÔÝÍ£Á˲¡¶¾¿âµÄÐû²¼¡£¡£¡£Èô´Ëй¶ÐÐΪ»ñµÃ֤ʵ£¬£¬£¬£¬£¬£¬½«¶ÔDr.WebÒÔÖÂÕû¸öÍøÂçÇå¾²ÐÐÒµÔì³ÉÖØ´ó¹¥»÷£¬£¬£¬£¬£¬£¬²¢Òý·¢Óû§¶ÔÄ¿½ñ±£»£»£»£»£»¤²½·¥ÓÐÓÃÐÔµÄÖÊÒÉ¡£¡£¡£


https://cybersecuritynews.com/dumpforums-10tb-data-dr-web/


5. AkiraºÍFogÀÕË÷Èí¼þʹÓÃÒªº¦µÄVeeam RCEÎó²î


10ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïʹÓÃVeeam Backup & Replication (VBR) ЧÀÍÆ÷ÉϵÄÒ»¸öÑÏÖØÇå¾²Îó²î£¨CVE-2024-40711£©£¬£¬£¬£¬£¬£¬ÊµÏÖÁËÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£¸ÃÎó²îÓÉCode WhiteÇå¾²Ñо¿Ô±Florian Hauser·¢Ã÷£¬£¬£¬£¬£¬£¬Ô´ÓÚ²»ÊÜÐÅÈÎÊý¾Ý·´ÐòÁл¯µÄÈõµã£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒԽϵÍÖØÆ¯ºó·¢¶¯¹¥»÷¡£¡£¡£VeeamÔÚ9ÔÂ4ÈÕÅû¶Á˸ÃÎó²î²¢Ðû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬¶øwatchTowr LabsÔòÔÚ9ÔÂ9ÈÕÐû²¼ÊÖÒÕÆÊÎö£¬£¬£¬£¬£¬£¬µ«ÑÓ³ÙÖÁ9ÔÂ15ÈղŹûÕæ¿´·¨ÑéÖ¤Îó²î´úÂ룬£¬£¬£¬£¬£¬ÒÔÈ·±£ÖÎÀíÔ±ÓÐ×㹻ʱ¼äÔöÇ¿·À»¤¡£¡£¡£ÓÉÓÚVBRÈí¼þÆÕ±éÓÃÓÚÊý¾Ý±£»£»£»£»£»¤ºÍÔÖÄѻָ´£¬£¬£¬£¬£¬£¬³ÉΪ¶ñÒâÐÐΪÕßêéêìµÄÄ¿µÄ¡£¡£¡£Sophos X-OpsÊÂÎñÏìÓ¦Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬¸ÃÎó²îѸËÙ±»AkiraºÍFogÀÕË÷Èí¼þ¹¥»÷ʹÓ㬣¬£¬£¬£¬£¬Á¬ÏµÖ®Ç°Ð¹Â¶µÄƾ֤£¬£¬£¬£¬£¬£¬½«¡°µã¡±ÍâµØÕÊ»§Ìí¼Óµ½ÖÎÀíÔ±ºÍÔ¶³Ì×ÀÃæÓû§×é¡£¡£¡£¹¥»÷Õßͨ³£Í¨¹ýδÆôÓöàÒòËØÉí·ÝÑéÖ¤µÄÊÜѬȾVPNÍø¹Ø»á¼ûÄ¿µÄ£¬£¬£¬£¬£¬£¬²¿·ÖVPNÔËÐв»ÊÜÖ§³ÖµÄÈí¼þ°æ±¾¡£¡£¡£ÔÚFogÀÕË÷Èí¼þÊÂÎñÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃδ±£»£»£»£»£»¤µÄHyper-VЧÀÍÆ÷ºÍÊÊÓóÌÐòrcloneÇÔÈ¡Êý¾Ý¡£¡£¡£ÕâЩ¹¥»÷ÏÔʾ³ö¸ß¶ÈµÄÖØµþÐÔºÍÏàËÆÐÔ£¬£¬£¬£¬£¬£¬Åú×¢ÀÕË÷Èí¼þÍÅ»ïÕýÆð¾¢Ê¹ÓÃÕâÒ»Îó²î¾ÙÐй¥»÷¡£¡£¡£


https://www.bleepingcomputer.com/news/security/akira-and-fog-ransomware-now-exploiting-critical-veeam-rce-flaw/


6. ¸»´ïͶ×ÊϵͳÔâÈëÇÖ£¬£¬£¬£¬£¬£¬77,000Ãû¿Í»§ÐÅϢй¶


10ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚ²¨Ê¿¶ÙµÄ¿ç¹ú½ðÈÚЧÀ͹«Ë¾¸»´ïͶ×Ê£¬£¬£¬£¬£¬£¬½üÆÚÔâÓöÁËÒ»´ÎϵͳÈëÇÖÊÂÎñ£¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý77,000Ãû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶¡£¡£¡£×÷ΪȫÇò×î´óµÄ×ʲúÖÎÀí¹«Ë¾Ö®Ò»£¬£¬£¬£¬£¬£¬¸»´ïÖÎÀíµÄ×ʲú×ܶî¸ß´ï14.1ÍòÒÚÃÀÔª¡£¡£¡£¾Ý¸»´ï͸¶£¬£¬£¬£¬£¬£¬Õâ´ÎÈëÇÖ±¬·¢ÔÚ8ÔÂ17ÈÕÖÁ19ÈÕʱ´ú£¬£¬£¬£¬£¬£¬Ò»ÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßʹÓÃ×î½ü½¨ÉèµÄÁ½¸ö¿Í»§ÕË»§ÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£¸»´ïÔÚ·¢Ã÷ÕâÒ»»î¶¯ºóѸËÙ½ÓÄɲ½·¥ÖÕÖ¹ÁË»á¼û£¬£¬£¬£¬£¬£¬²¢ÔÚÍⲿÇ徲ר¼ÒµÄЭÖúÏÂÕö¿ªÁËÊӲ졣¡£¡£Ö»¹Ü¸»´ïûÓÐ͸¶³ýÁËÐÕÃûºÍÆäËûСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ÍâÉÐÓÐÄÄЩÐÅÏ¢±»ÇÔÈ¡£¬£¬£¬£¬£¬£¬µ«ËüÒÑÏòÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËÁ½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý»Ö¸´Ð§ÀÍ¡£¡£¡£¸»´ï»¹ÌåÏÖ£¬£¬£¬£¬£¬£¬Ã»ÓÐÖ¤¾ÝÅú×¢±»µÁµÄ¿Í»§Êý¾Ý±»ÀÄÓ㬣¬£¬£¬£¬£¬µ«ÈÔ½¨ÒéÊÜÓ°ÏìµÄ¿Í»§¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬°´ÆÚ¼ì²éÕË»§±¨±í£¬£¬£¬£¬£¬£¬¼à¿ØÐÅÓñ¨¸æ£¬£¬£¬£¬£¬£¬²¢ÊµÊ±±¨¸æÈκοÉÒɻ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fidelity-investments-says-data-breach-affects-over-77-000-people/