NachoVPNÎó²î£º¶ñÒâVPNЧÀÍÆ÷ʹÓÃδÐÞ²¹¿Í»§¶ËʵÑé¹¥»÷

Ðû²¼Ê±¼ä 2024-11-27
1. NachoVPNÎó²î£º¶ñÒâVPNЧÀÍÆ÷ʹÓÃδÐÞ²¹¿Í»§¶ËʵÑé¹¥»÷


11ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬Ò»×éÃûΪ¡°NachoVPN¡±µÄÎó²îÔÊÐí¶ñÒâVPNЧÀÍÆ÷ʹÓÃδÐÞ²¹µÄPalo AltoºÍSonicWall SSL-VPN¿Í»§¶Ë¾ÙÐй¥»÷£¬£¬£¬£¬£¬£¬Í¨¹ýÓÕÆ­Óû§ÅþÁ¬ÖÁ¹¥»÷Õß¿ØÖƵÄVPNЧÀÍÆ÷£¬£¬£¬£¬£¬£¬½ø¶øÇÔÈ¡µÇ¼ƾ֤¡¢Ö´ÐÐí§Òâ´úÂë¡¢×°ÖöñÒâÈí¼þ»òÌᳫ´úÂëÊðÃûαÔì¼°ÖÐÐÄÈ˹¥»÷¡£¡£¡£ ¡£AmberWolfÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÕâÒ»Íþв£¬£¬£¬£¬£¬£¬²¢ÔÚÎó²îÊ״α¨¸æºóÊýÔÂÄÚ£¬£¬£¬£¬£¬£¬¼ûÖ¤ÁËSonicWallºÍPalo Alto NetworksÏà¼ÌÐû²¼Õë¶ÔCVE-2024-29014ºÍCVE-2024-5921Îó²îµÄ²¹¶¡¡£¡£¡£ ¡£ÎªÁË·ÀÓù£¬£¬£¬£¬£¬£¬SonicWall¿Í»§ÐèÉý¼¶ÖÁNetExtenderµÄÌØ¶¨°æ±¾£¬£¬£¬£¬£¬£¬¶øPalo Alto NetworksÔò½¨Òé×°Öøüа汾»òÔÚFIPS-CCģʽÏÂÔËÐÐVPN¿Í»§¶Ë¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬AmberWolf»¹Ðû²¼ÁËNachoVPN¿ªÔ´¹¤¾ß£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ßÄÜÄ£Äâ¶ñÒâVPNЧÀÍÆ÷£¬£¬£¬£¬£¬£¬Ö§³Ö¶àÖÖÆóÒµVPN²úÆ·£¬£¬£¬£¬£¬£¬²¢ÃãÀøÉçÇøÐ¢Ë³ÐÂÎó²îÐÅÏ¢¡£¡£¡£ ¡£Í¬Ê±£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾»¹ÌṩÁËÓйØÕâÁ½¸öÎó²îµÄ¸ü¶àÊÖÒÕϸ½ÚºÍ·ÀÓù½¨Ò飬£¬£¬£¬£¬£¬ÒÔ×ÊÖúÍøÂç·ÀÓùÕß±£»£»£»£»£»¤ÆäϵͳÃâÊÜDZÔÚ¹¥»÷¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/new-nachovpn-attack-uses-rogue-vpn-servers-to-install-malicious-updates/


2. ¶íÂÞ˹ºÚ¿ÍRomComʹÓÃFirefoxºÍTorÁãÈÕÎó²îÌᳫ¹¥»÷


11ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬½üÆÚ¶íÂÞ˹ºÚ¿Í×éÖ¯RomComʹÓÃÁËÁ½¸öÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬ÏòʹÓÃFirefox»òTorä¯ÀÀÆ÷µÄÓû§·¢ÉäÁ˶ñÒâ´úÂë¡£¡£¡£ ¡£ÕâЩÎó²î»®·ÖÓ°ÏìÁËMozillaÈí¼þºÍWindowsϵͳ£¬£¬£¬£¬£¬£¬ÆäÖÐÒ»¸öÎó²î£¨CVE-2024-9680£©Ê¹µÃ»á¼ûÊÜÑ¬È¾ÍøÕ¾µÄÈκÎÈ˶¼»áÎÞÒâʶµØÏÂÔØRomComºóÃÅ£¬£¬£¬£¬£¬£¬¶øÎÞÐèÈκεã»÷¡£¡£¡£ ¡£ÐÒÔ˵ÄÊÇ£¬£¬£¬£¬£¬£¬ÕâÁ½¸öÎó²î¶¼»ñµÃÁË¿ìËÙÐÞ¸´£¬£¬£¬£¬£¬£¬MozillaÔÚÊÕµ½Í¨Öªºó25СʱÄÚ¾ÍÐÞ²¹ÁËFirefoxÖеÄÎó²î£¬£¬£¬£¬£¬£¬¶øWindowsÖеÄÎó²î£¨CVE-2024-49039£©Ò²ÔÚºóÐø»ñµÃÐÞ¸´¡£¡£¡£ ¡£RomComͨ¹ýÌØÖÆÍøÕ¾´¥·¢Îó²î£¬£¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾Ä£ÄâÁËÕæÊµ×éÖ¯µÄÍøÕ¾£¬£¬£¬£¬£¬£¬°üÀ¨ConnectWise¡¢DevolutionsºÍCorrectivµÈ¡£¡£¡£ ¡£ËäÈ»Torä¯ÀÀÆ÷Ò²»ùÓÚFirefox£¬£¬£¬£¬£¬£¬µ«ESET×·×ÙµÄÊܺ¦ÕßÖÐûÓÐÒ»ÈËÊÇͨ¹ýTorÊܵ½¹¥»÷µÄ£¬£¬£¬£¬£¬£¬¿ÉÄÜÊÇÓÉÓÚTorµÄijЩÉèÖÃÓëFirefox²î±ð¡£¡£¡£ ¡£RomComµÄÖ÷ҪĿµÄËÆºõÊǹ«Ë¾£¬£¬£¬£¬£¬£¬¾ø´ó´ó¶¼Êܺ¦ÕßλÓÚ±±ÃÀºÍÅ·ÖÞ£¬£¬£¬£¬£¬£¬µ«ÐÂÎ÷À¼ºÍ·¨Êô¹çÑÇÄÇÒ²ÓÐÁãÐÇÊܺ¦Õß¡£¡£¡£ ¡£


https://www.darkreading.com/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor


3. RansomHub×éÖ¯Éù³Æ¶ÔÁ½ÊÐÕþ¸®·¢¶¯ÀÕË÷¹¥»÷


11ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨×éÖ¯RansomHubÉù³Æ¶ÔµÂ¿ËÈøË¹ÖÝ¿ÆÅå¶ûÊм°Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»á·¢¶¯ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Òý·¢ÆÕ±é¹Ø×¢¡£¡£¡£ ¡£¿£¿£¿£¿£¿£¿ÆÅå¶ûÊÐÔâÊܹ¥»÷ºó£¬£¬£¬£¬£¬£¬»¥ÁªÍø¡¢Í¼Êé¹ÝЧÀÍ¡¢ÔÊÐíºÍ¼ì²éƽ̨¼°Êз¨ÔºµÈ¶à¸öϵͳ̱»¾£¬£¬£¬£¬£¬£¬¸øÍâµØ×¡Ãñ´øÀ´ÑÏÖØÀ§ÈÅ¡£¡£¡£ ¡£Ö»¹ÜÊÐÕþ¸®Æð¾¢»Ö¸´£¬£¬£¬£¬£¬£¬µ«Ö±ÖÁ11ÔÂÏÂÑ®£¬£¬£¬£¬£¬£¬²¿·ÖÊÐÕþÔËÓª²ÅÂ½Ðø»Ö¸´¡£¡£¡£ ¡£Í¬Ê±£¬£¬£¬£¬£¬£¬Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»áÒ²±¨¸æÆäÊÖÒÕϵͳÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬µç»°Ïß·ÖÐÖ¹£¬£¬£¬£¬£¬£¬ÕýÔÚÆð¾¢È·¶¨ÐÅϢй¶ÇéÐΡ£¡£¡£ ¡£RansomHub½ñÄêѸËÙáÈÆð£¬£¬£¬£¬£¬£¬ÒѶԻú³¡¡¢Ò½ÁÆ»ú¹¹¡¢ÖÆÔ칫˾ºÍÒªº¦»ù´¡ÉèÊ©µÈÊý°Ù¸ö×éÖ¯·¢¶¯¹¥»÷¡£¡£¡£ ¡£×Ô2Ô·ÝÒÔÀ´£¬£¬£¬£¬£¬£¬ÒÑÓÐÔ¼210¸ö×éÖ¯³ÉΪÆäÊܺ¦Õß¡£¡£¡£ ¡£¸Ã×éÖ¯×î³õ·ºÆðÔÚÁªºÏ¿µ½¡¼¯ÍÅÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó£¬£¬£¬£¬£¬£¬ËæºóÒòÁíÒ»ÀÕË÷Èí¼þÍŻﵹ±Õ¶ø×³´ó£¬£¬£¬£¬£¬£¬¶ÔÊý¾Ý¾ÙÐгöÊÛ¡£¡£¡£ ¡£½ñÄ꣬£¬£¬£¬£¬£¬RansomHub»¹¹¥»÷Á˶àÆð±¸ÊÜÖõÄ¿µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬°üÀ¨µçОÞÍ·Frontier¡¢Rite Aid¡¢Ó¢¹úÅÄÂôÐÐChristie¡¯sµÈ¡£¡£¡£ ¡£


https://therecord.media/ransomhub-cybercrime-coppell-texas-minneapolis-parks-agency


4. ÈûÂ׸ǵÙÐж¯£º·ÇÖÞÖ´·¨»ú¹¹ÑÏË๥»÷ÍøÂç·¸·¨


11ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬·ÇÖÞÖ´·¨»ú¹¹ÔÚ¹ú¼ÊÐ̾¯×éÖ¯ºÍ·ÇÖÞÐ̾¯×éÖ¯µÄЭµ÷Ï£¬£¬£¬£¬£¬£¬ÓÚ9ÔÂ2ÈÕÖÁ10ÔÂ31ÈÕʱ´ú¿ªÕ¹ÁËÃûΪ¡°ÈûÂ׸ǵÙÐж¯¡±µÄ¹¥»÷ÍøÂç·¸·¨»î¶¯¡£¡£¡£ ¡£´Ë´ÎÐж¯Õë¶ÔÀÕË÷Èí¼þ¡¢ÉÌÒµµç×ÓÓʼþй¶¡¢Êý×ÖÀÕË÷ºÍÍøÂçÕ©Æ­µÈ·¸·¨ÐÐΪ£¬£¬£¬£¬£¬£¬Éæ¼°19¸ö·ÇÖÞ¹ú¼Ò£¬£¬£¬£¬£¬£¬¹²¾Ð²¶ÁË1006ÃûÏÓÒÉÈË£¬£¬£¬£¬£¬£¬´Ý»ÙÁË134089¸ö¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç¡£¡£¡£ ¡£¾ÝÊӲ죬£¬£¬£¬£¬£¬ÕâЩ·¸·¨»î¶¯ÓëÖÁÉÙ35224ÃûÒÑÈ·ÈÏÉí·ÝµÄÊܺ¦ÕßÓйØ£¬£¬£¬£¬£¬£¬Ôì³ÉÁ˽ü1.93ÒÚÃÀÔªµÄ¾­¼ÃËðʧ£¬£¬£¬£¬£¬£¬ÆäÖÐÈûÂ׸ǵÙÐж¯×·»ØÁËԼĪ4400ÍòÃÀÔª¡£¡£¡£ ¡£Ðж¯ÖеÄÁÁµã°üÀ¨¿ÏÄáÑÇÆÆ»ñÒ»ÆðÍøÉÏÐÅÓÿ¨Õ©Æ­°¸£¬£¬£¬£¬£¬£¬ÈûÄÚ¼Ó¶ûµ·»ÙÒ»ÆðÅÓÊÏȦÌ×£¬£¬£¬£¬£¬£¬ÄáÈÕÀûÑǾв¶Ò»ÃûʵÑéÍøÉÏͶ×ÊÕ©Æ­µÄÄÐ×Ó£¬£¬£¬£¬£¬£¬¿¦ÂóÂ¡ÆÆ»ñ¶àÌõÀíÓªÏúȦÌ×£¬£¬£¬£¬£¬£¬ÒÔ¼°°²¸çÀ­µ·»ÙÒ»¸öÐéÄâ¶Ä³¡¹ú¼Ê¼¯ÍÅ¡£¡£¡£ ¡£¼ÓÈë´Ë´ÎÐж¯µÄ¹ú¼ÒÉÐÓа¢¶û¼°ÀûÑÇ¡¢±´Äþ¡¢¿ÆÌصÏÍß¡¢¸Õ¹ûÃñÖ÷¹²ºÍ¹ú¡¢¼ÓÅî¡¢¼ÓÄÉ¡¢Ã«ÀïÇó˹¡¢ÄªÉ£±È¿Ë¡¢Â¬Íú´ï¡¢ÄÏ·Ç¡¢Ì¹É£ÄáÑÇ¡¢Í»Äá˹¡¢ÔÞ±ÈÑǺͽò°Í²¼Î¤¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/


5. Matrix·¢¶¯´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬£¬£¬£¬Ê¹ÓÃÎïÁªÍøºÍÆóÒµÎó²î


11ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»³¡ÓÉÃûΪMatrixµÄÍþвÐÐΪÕ߲߻®µÄ´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬¸Ã»î¶¯Ê¹Óÿɻá¼ûµÄ¹¤¾ßÕë¶ÔÎïÁªÍø×°±¸ºÍÆóҵЧÀÍÆ÷¡£¡£¡£ ¡£MatrixµÄ¹¥»÷¿ò¼Ü¾­ÓÉÏêϸÆÊÎö£¬£¬£¬£¬£¬£¬Ö÷ҪʹÓû¥ÁªÍøÅþÁ¬Éè±¹ØÁ¬ÄÎó²îºÍ¹ýʧÉèÖ㬣¬£¬£¬£¬£¬Í¨¹ý±©Á¦¹¥»÷¡¢Èõƾ֤ºÍÒÑÖªÎó²î¹¹½¨½©Ê¬ÍøÂç¡£¡£¡£ ¡£¹¥»÷µÄÖ÷ÒªÌØÕ÷°üÀ¨Õë¶Ô·ÓÉÆ÷¡¢DVRºÍIPÉãÏñ»ú¡¢ÆóҵЭæÅºÍÎïÁªÍø×°±¸µÄÎó²îʹÓᣡ£¡£ ¡£ÕâЩ¹¥»÷ÑÏÖØÒÀÀµÄ¬ÈÏ»òÈõÃÜÂ룬£¬£¬£¬£¬£¬Ç¿µ÷ÁËδÄܽÓÄÉ»ù±¾Çå¾²²½·¥»áʹװ±¸ÃæÁÙÈëÇÖµÄΣº¦¡£¡£¡£ ¡£MatrixµÄÄ¿µÄ°üÀ¨ÔÆÐ§ÀÍÌṩÉÌ¡¢Ð¡ÐÍÆóÒµºÍÎïÁªÍø÷缯µØÇø£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ×°±¸¿ÉÄܶà´ï3500Íǫ̀¡£¡£¡£ ¡£MatrixʹÓÃÁËÀ´×ÔGitHubµÈƽ̨µÄ¾ç±¾ºÍ¹¤¾ß£¬£¬£¬£¬£¬£¬²¢Í¨¹ýTelegram½«Ð§ÀÍÇ®±Ò»¯£¬£¬£¬£¬£¬£¬ÌṩDDoS¹¥»÷ÍýÏë¡£¡£¡£ ¡£Ö»¹ÜMatrixȱ·¦ÏȽø¹¦Ð§£¬£¬£¬£¬£¬£¬µ«ÕâЩ¹¤¾ßµÄ×é×°ºÍ²Ù×÷¶¼ºÜÊÇÈÝÒ×£¬£¬£¬£¬£¬£¬ÏÔʾ³öµÍÅÓºéˮƽ¼ÓÈëÕßËù´øÀ´µÄΣº¦Ô½À´Ô½´ó¡£¡£¡£ ¡£


https://www.infosecurity-magazine.com/news/ddos-campaign-exploits-iot-devices/


6. Array Networks SSL VPN ²úÆ·ÖеÄÎó²îÕý±»Æð¾¢Ê¹ÓÃ


11ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂç·ÀÓù»ú¹¹CISAÊÕµ½Ö¤¾ÝÅú×¢£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃSSL VPN²úÆ·Array Networks AGºÍvxAG ArrayOSÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»×·×ÙΪCVE-2023-28461£¬£¬£¬£¬£¬£¬ÑÏÖØÐÔÆÀ·Ö¸ß´ï9.8£¬£¬£¬£¬£¬£¬Òѱ»ÁÐÈëCISAµÄÒÑ֪ʹÓÃÎó²îĿ¼ÖС£¡£¡£ ¡£´ËÎó²î±£´æÓÚÒ×Êܹ¥»÷µÄURLÖУ¬£¬£¬£¬£¬£¬ÊÇÒ»¸öÉí·ÝÑéÖ¤²»µ±ÎÊÌ⣬£¬£¬£¬£¬£¬ÔÊÐíÔÚArray AGϵÁкÍvxAG 9.4.0.481¼°¸üÔç°æ±¾ÖÐÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£ ¡£Array NetworksÔÚÎó²îÅû¶һÖܺóÐû²¼ÁËÐÞ¸´°æ±¾Array AG 9.4.0.484¡£¡£¡£ ¡£Array NetworksµÄSSL VPN²úÆ·±»È«ÇòÁè¼Ý5000¸ö¿Í»§Ê¹Ó㬣¬£¬£¬£¬£¬°üÀ¨ÆóÒµ¡¢Ð§ÀÍÌṩÉ̺ÍÕþ¸®»ú¹¹¡£¡£¡£ ¡£CISA½¨ÒéËùÓÐÁª°î»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯ÔÚ12ÔÂ16ÈÕ֮ǰӦÓÃÇå¾²¸üлò½ÓÄÉ»º½â²½·¥£¬£¬£¬£¬£¬£¬²»È»Ó¦×èֹʹÓøòúÆ·¡£¡£¡£ ¡£Çå¾²¸üпÉͨ¹ýArrayÖ§³ÖÃÅ»§»ñÈ¡£¬£¬£¬£¬£¬£¬µ«¹©Ó¦ÉÌÌṩµÄ»º½â²½·¥¿ÉÄÜ»á¶Ô¿Í»§¶ËÇå¾²¹¦Ð§±¬·¢¸ºÃæÓ°Ï죬£¬£¬£¬£¬£¬Òò´Ë×éÖ¯Ó¦Ê×ÏȲâÊÔÆäЧ¹û¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-bug-in-array-networks-ssl-vpn-products/