GFI KerioControl·À»ðǽÔâÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²îÍþв

Ðû²¼Ê±¼ä 2025-02-11

1. GFI KerioControl·À»ðǽÔâÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²îÍþв


2ÔÂ10ÈÕ£¬£¬£¬ £¬£¬£¬Áè¼ÝÒ»ÍòÁ½Ç§¸ö GFI KerioControl ·À»ðǽʵÀý±»·¢Ã÷±£´æ±àºÅΪ CVE-2024-52875 µÄÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£KerioControl ÊÇÒ»¿îרΪÖÐСÐÍÆóÒµÉè¼ÆµÄÍøÂçÇå¾²Ì×¼þ£¬£¬£¬ £¬£¬£¬¹¦Ð§°üÀ¨ VPN¡¢´ø¿íÖÎÀí¡¢±¨¸æ¼à¿Ø¡¢Á÷Á¿¹ýÂË¡¢AV ±£»£»£»£»£»¤ºÍÈëÇÖ·ÀÓù¡£¡£¡£¡£´ËÎó²îÓÉÇå¾²Ñо¿Ô± Egidio Romano£¨EgiX£©ÓÚ 2024 Äê 12 ÔÂÖÐÑ®·¢Ã÷£¬£¬£¬ £¬£¬£¬²¢Õ¹Ê¾ÁË¿ÉÄܵÄÒ»¼ü RCE ¹¥»÷¡£¡£¡£¡£Ö»¹Ü GFI Software ÒÑÔÚ 12 Ô 19 ÈÕÐû²¼ÁËÕë¶Ô¸ÃÎÊÌâµÄÇå¾²¸üУ¨9.4.5 Patch 1 °æ±¾£©£¬£¬£¬ £¬£¬£¬µ«Æ¾Ö¤ Censys Êý¾Ý£¬£¬£¬ £¬£¬£¬ÈýÖܺóÈÔÓдó×ÚʵÀýδÐÞ¸´¡£¡£¡£¡£Greynoise ÒѼì²âµ½Ê¹ÓøÃÎó²îµÄ×Ô¶¯¹¥»÷ʵÑ飬£¬£¬ £¬£¬£¬Ö¼ÔÚÇÔÈ¡ÖÎÀíÔ± CSRF ÁîÅÆ¡£¡£¡£¡£Shadowserver Foundation ±¨¸æ³Æ£¬£¬£¬ £¬£¬£¬ÏÖÔÚÈÔÓÐ 12,229 ¸ö KerioControl ·À»ðÇ½ÃæÁÙ´ËÎó²îÍþв£¬£¬£¬ £¬£¬£¬ÊÜÓ°ÏìµØÇø°üÀ¨ÒÁÀÊ¡¢ÃÀ¹ú¡¢Òâ´óÀû¡¢µÂ¹úµÈ¡£¡£¡£¡£ÓÉÓÚ±£´æ¹ûÕæµÄÎó²î֤ʵ£¨PoC£©£¬£¬£¬ £¬£¬£¬Ê¹ÓÃÃż÷¼«µÍ£¬£¬£¬ £¬£¬£¬ÉõÖÁ²»ÊìÁ·µÄºÚ¿ÍÒ²¿ÉÄܼÓÈë¶ñÒâ»î¶¯¡£¡£¡£¡£Îó²îÔµ¹ÊÔ­ÓÉÔÚÓÚÓû§ÊäÈëδ»ñµÃÊʵ±ÕûÀí£¬£¬£¬ £¬£¬£¬¿ÉÄܱ»Ê¹ÓÃÖ´ÐÐ HTTP ÏìÓ¦²ð·Ö¹¥»÷£¬£¬£¬ £¬£¬£¬½ø¶ø¿ÉÄܵ¼Ö·´ÉäÐÍ¿çÕ¾µã¾ç±¾£¨XSS£©ºÍÆäËû¹¥»÷¡£¡£¡£¡£Òò´Ë£¬£¬£¬ £¬£¬£¬Ç¿ÁÒ½¨ÒéÉÐδӦÓøüеÄÓû§×°Öà 2025 Äê 1 Ô 31 ÈÕÐû²¼µÄ KerioControl °æ±¾ 9.4.5 Patch 2£¬£¬£¬ £¬£¬£¬ÒÔÔöÇ¿Çå¾²ÐÔ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-12-000-keriocontrol-firewalls-exposed-to-exploited-rce-flaw/


2. HandalaºÚ¿Í×é֝ɿÏÓ¶ÔÒÔÉ«Áо¯·½·¢¶¯´ó¹æÄ£ÍøÂç¹¥»÷


2ÔÂ10ÈÕ£¬£¬£¬ £¬£¬£¬ÎÛÃûÕÑÖøµÄHandalaºÚ¿Í×éÖ¯£¬£¬£¬ £¬£¬£¬ÉæÏÓÓëÒÁÀÊÇ鱨»ú¹¹ÓйØÁª£¬£¬£¬ £¬£¬£¬½üÆÚÐû²¼¶ÔÒÔÉ«Áо¯Ô±²½¶Ó·¢¶¯ÁËÍøÂç¹¥»÷£¬£¬£¬ £¬£¬£¬Éù³ÆÀÖ³ÉÇÔÈ¡ÁË2.1TBµÄÃô¸ÐÊý¾Ý£¬£¬£¬ £¬£¬£¬°üÀ¨ÈËʼͼ¡¢ÎäÆ÷Çåµ¥¡¢Ò½ÁƺÍÐÄÀíµµ°¸µÈ£¬£¬£¬ £¬£¬£¬²¢¹ûÕæÈö²¥ÁËÆäÖÐ35Íò·ÝÎļþ¡£¡£¡£¡£Ö»¹ÜÒÔÉ«Áо¯·½·ñ¶¨ÏµÍ³Ö±½ÓÔâÈëÇÖ£¬£¬£¬ £¬£¬£¬µ«´Ë´ÎÊý¾Ýй¶ÊÂÎñ¹æÄ£ÆÕ±é£¬£¬£¬ £¬£¬£¬Éæ¼°´ó×ÚÃô¸ÐÐÅÏ¢£¬£¬£¬ £¬£¬£¬Èçµç×ÓÓʼþµØµã¡¢³Öǹ֤¡¢¾¯¹ÙÕÕÆ¬ºÍСÎÒ˽¼ÒÁªÏµ·½·¨µÈ¡£¡£¡£¡£Í¬Ê±£¬£¬£¬ £¬£¬£¬Handala»¹Ö¸¿ØÆä»ñÈ¡Á˾¯Ô±µÄÐÄÀíÆÀ¹ÀµÈ˽ÈËÊý¾Ý£¬£¬£¬ £¬£¬£¬²¢ÇÖÈëÁËÒÔÉ«Áйú¼ÒÇå¾²²¿µÄЧÀÍÆ÷¡£¡£¡£¡£´Ë´ÎÊÂÎñÊÇHandalaÕë¶ÔÒÔÉ«ÁÐʵÌåʵÑ鯯ËðÐÔÍøÂçÐж¯µÄµä·¶°¸Àý£¬£¬£¬ £¬£¬£¬ÌØÊâÊÇÔÚÒÔÉ«ÁÐÓë¹þÂí˹³åÍ»Éý¼¶ºó£¬£¬£¬ £¬£¬£¬ÒÔÉ«ÁÐÒѳÉΪÒÁÀÊÍøÂçÐж¯µÄÖ÷ҪĿµÄ¡£¡£¡£¡£HandalaµÄ»î¶¯ÆµÈÔ£¬£¬£¬ £¬£¬£¬²»µ«ÉæÏÓ¼ÓÈëÕë¶ÔÒÔÉ«ÁÐ×éÖ¯ÍøÂçÇå¾²Ö°Ô±µÄÍøÂç´¹Âڻ£¬£¬£¬ £¬£¬£¬»¹Õë¶ÔÒÔÉ«ÁеÄSoreqºËÑо¿ÖÐÐÄ·¢¶¯ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬£¬×î½üÓÖÈëÇÖÁËÒÔÉ«Áеç×Ó¹«Ë¾ÔËÓªµÄ½ôÆÈ¾¯±¨ÏµÍ³£¬£¬£¬ £¬£¬£¬Òý·¢´ó¹æÄ£¿Ö»Å¡£¡£¡£¡£¸Ã×éÖ¯ÔÚÌû×ÓÖм¥Ð¦ÒÔÉ«ÁУ¬£¬£¬ £¬£¬£¬Ç¿µ÷ÆäÀÖ³ÉÍ»ÆÆ·ÀÓù²¢½ÒÆÆÉñÃØ£¬£¬£¬ £¬£¬£¬ÖØÉêÆä¡°²»»áÒÅÍü£¬£¬£¬ £¬£¬£¬²»»áÔ­Á¡±µÄ¿ÚºÅ¡£¡£¡£¡£


https://hackread.com/handala-hackers-israeli-police-breach-data-leak/


3. ¾¯·½¾Ð²¶ 4 Ãû Phobos ÀÕË÷Èí¼þÏÓÒÉÈË£¬£¬£¬ £¬£¬£¬²é·â 8Base ÍøÕ¾


2ÔÂ10ÈÕ£¬£¬£¬ £¬£¬£¬È«ÇòÖ´·¨Ðж¯¡°Phobos Aetor¡±Õë¶ÔPhobosÀÕË÷Èí¼þÍÅ»ïÕö¿ª£¬£¬£¬ £¬£¬£¬ÒÑÔÚÌ©¹úÆÕ¼ªµº¾Ð²¶ËÄÃûÅ·ÖÞºÚ¿ÍÏÓÒÉÈË£¬£¬£¬ £¬£¬£¬²¢²é·â8Base°µÍøÍøÕ¾¡£¡£¡£¡£ÕâЩÏÓÒÉÈ˱»Ö¸¿Ø¶ÔÈ«ÇòÁè¼Ý1000ÃûÊܺ¦Õß¾ÙÐÐÁËÍøÂç¹¥»÷£¬£¬£¬ £¬£¬£¬ÀÕË÷Á˼ÛÖµ1600ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£¡£¡£´Ë´ÎÐж¯Éæ¼°¶à¸ö¹ú¼ÒºÍµØÇøµÄ¾¯·½Ð­Í¬Í»Ï®£¬£¬£¬ £¬£¬£¬½É»ñÁ˵ç×Ó×°±¸ºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£¡£8BaseÀÕË÷Èí¼þÍÅ»ï×Ô2022Äê3Ô½¨ÉèÒÔÀ´£¬£¬£¬ £¬£¬£¬Ò»Ö±Ïà¶ÔÇÄÈ»£¬£¬£¬ £¬£¬£¬Ö±µ½2023Äê6ÔÂ×îÏÈй¶Êܺ¦ÕßÊý¾Ý¡£¡£¡£¡£¸ÃÍÅ»ï»áÈëÇÖÆóÒµÍøÂ磬£¬£¬ £¬£¬£¬ÇÔÈ¡Êý¾Ý²¢Ê¹ÓÃPhobosÀÕË÷Èí¼þ¼ÓÃÜÆ÷¼ÓÃÜ×°±¸£¬£¬£¬ £¬£¬£¬ÒªÇóÖ§¸¶¸ß¶îÊê½ðÒÔ»»È¡½âÃÜÃÜÔ¿ºÍ²»Ðû²¼Êý¾ÝµÄÔÊÐí¡£¡£¡£¡£×ÅÃûÊܺ¦Õß°üÀ¨ÈÕ±¾µç²úÖêʽ»áÉçºÍÁªºÏ¹ú¿ª·¢ÍýÏëÊ𡣡£¡£¡£´Ë´ÎÐж¯Åú×¢£¬£¬£¬ £¬£¬£¬È«ÇòÖ´·¨²¿·ÖÕýÔÚÔöÇ¿ÏàÖú¹¥»÷ÀÕË÷Èí¼þ·¸·¨¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/legal/police-arrests-4-phobos-ransomware-suspects-seizes-8base-sites/


4. Lee Enterprises±¨Òµ¼¯ÍÅÔâÍøÂç¹¥»÷ÖÂÔËÓªÖÐÖ¹


2ÔÂ10ÈÕ£¬£¬£¬ £¬£¬£¬ÃÀ¹ú±¨Òµ¼¯ÍÅLee EnterprisesÔÚ2025Äê2ÔÂ3ÈÕÔâÊÜÁËÒ»´ÎÍøÂç¹¥»÷£¬£¬£¬ £¬£¬£¬µ¼ÖÂÆäÓªÒµÔËÓªÖÐÖ¹¡£¡£¡£¡£´Ë´Î¹¥»÷ÆÈʹ¸Ã¹«Ë¾¹Ø±ÕÁËÐí¶àÍøÂ磬£¬£¬ £¬£¬£¬ÈÅÂÒÁËÊýÊ®ÖÖ±¨Ö½µÄÓ¡Ë¢ºÍ¿¯ÐУ¬£¬£¬ £¬£¬£¬²¢ÇÒʹµÃ¼ÇÕߺͱ༭ÎÞ·¨»á¼ûËûÃǵÄÎļþ¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄÎļþÖÐÈ·ÈÏÁ˴˴ι¥»÷£¬£¬£¬ £¬£¬£¬²¢ÌåÏÖÕýÔÚÊÓ²ìÄÄЩÐÅÏ¢¿ÉÄÜÊܵ½Ó°Ïì¡£¡£¡£¡£¶à¼ÒLee Enterprises³öÊéÎïÔÚÍøÕ¾¶¥²¿ÏÔʾά»¤ºá·ù£¬£¬£¬ £¬£¬£¬Ïò¶ÁÕßÖÂǸ²¢ÌåÏÖÕýÔÚÆð¾¢½â¾öÎÊÌâ¡£¡£¡£¡£Lee EnterprisesÔÚ26¸öÖݳöÊé77·ÝÈÕ±¨ºÍ350·ÝÖÜ¿¯¼°×¨Òµ¿¯Î£¬£¬ £¬£¬£¬ÓµÓÐÁè¼Ý120ÍòµÄÈÕ¿¯ÐÐÁ¿ºÍÁè¼Ý4400ÍòµÄÊý×Ö°æ×ÔÁ¦·Ã¿Í¡£¡£¡£¡£ÎåÄêǰ£¬£¬£¬ £¬£¬£¬¸Ã¼¯ÍÅÒ²ÔøÔâÊÜÍøÂç¹¥»÷£¬£¬£¬ £¬£¬£¬ÆäʱÒÁÀʺڿÍÈëÇÖÁËÆäÍøÂç×÷ΪÈö²¥ÐéαÐÅÏ¢»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cyberattack-disrupts-lee-newspapers-operations-across-the-us/


5. Facebook³ÉÍøÂç´¹ÂÚÐÂÄ¿µÄ£¬£¬£¬ £¬£¬£¬Êý°Ù¼ÒÆóÒµÓʼþµØµãÔâÐ®ÖÆ


2ÔÂ10ÈÕ£¬£¬£¬ £¬£¬£¬Check Point ResearchµÄ×îÐÂÑо¿ÏÔʾ£¬£¬£¬ £¬£¬£¬È«ÇòÁìÏȵÄÉ罻ýÌåÆ½Ì¨Facebook³ÉΪÁËÐÂÒ»ÂÖÍøÂç´¹ÂڻµÄÄ¿µÄ£¬£¬£¬ £¬£¬£¬¸Ã»î¶¯Ö¼ÔÚÇÔÈ¡Êý°Ù¼ÒÆóÒµµÄ12,000¶à¸öµç×ÓÓʼþµØµã¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯Ê¼ÓÚ2024Äê12ÔÂ20ÈÕ×óÓÒ£¬£¬£¬ £¬£¬£¬Ö÷ÒªÕë¶ÔÅ·ÃË¡¢ÃÀ¹úºÍ°Ä´óÀûÑǵĹ«Ë¾£¬£¬£¬ £¬£¬£¬µ«Ò²Ó°Ïìµ½ÁËÈ«ÇòÆäËûµØÇø¡£¡£¡£¡£Õ©Æ­ÕßʹÓÃSalesforceµÄ×Ô¶¯ÓʼþЧÀÍ·¢ËÍÓÕÆ­ÐÔµç×ÓÓʼþ£¬£¬£¬ £¬£¬£¬ÓʼþÖдøÓÐð³äµÄFacebook»Õ±ê£¬£¬£¬ £¬£¬£¬²¢Ö¸¿ØÊÕ¼þÈËÇÖÕ¼°æÈ¨¡£¡£¡£¡£³ý·ÇÊÕ¼þÈËÔÚ¶Ìʱ¼äÄÚÌá³öÒìÒ飬£¬£¬ £¬£¬£¬²»È»½«ÃæÁÙÕË»§ÏÞÖÆµÄÍþв¡£¡£¡£¡£ÓʼþÖаüÀ¨ÐéαµÄFacebookÖ§³ÖÒ³ÃæÁ´½Ó£¬£¬£¬ £¬£¬£¬ÓÕÆ­Êܺ¦ÕßÊäÈëµÇ¼ƾ֤£¬£¬£¬ £¬£¬£¬´Ó¶øÌáÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£ÕâÖÖÓÕÆ­ÐÐΪÍþв×ÅÈ«ÇòÒÀÀµFacebookµÄÆóÒµ£¬£¬£¬ £¬£¬£¬¿ÉÄܵ¼ÖÂÆäÖÎÀíÔ±ÕË»§±»¿ØÖÆ¡¢ÄÚÈݱ»¸ü¸Ä¡¢ÐÂÎű»Ê¹Óá¢Ìû×Ó±»É¾³ýºÍÇå¾²ÉèÖñ»Ð޸쬣¬£¬ £¬£¬£¬½ø¶øÔì³É¿Í»§ÐÅÈζÈϽµ¡¢¿Í»§Á÷ʧºÍDZÔÚµÄÖ´·¨ËßËϵÈЧ¹û¡£¡£¡£¡£¹ØÓÚÒ½ÁƱ£½¡ºÍ½ðÈÚµÈÊÜî¿ÏµÐÐÒµµÄÆóÒµÀ´Ëµ£¬£¬£¬ £¬£¬£¬»¹¿ÉÄܵ¼Ö²»¶Ô¹æ¡¢·£¿£¿£¿£¿£¿£¿îºÍÖ´·¨ÌôÕ½¡£¡£¡£¡£Òò´Ë£¬£¬£¬ £¬£¬£¬×é֯ӦʵÑéÃ÷È·µÄÊÂÎñÏìÓ¦ÍýÏ룬£¬£¬ £¬£¬£¬ÒÔ½µµÍÊܵ½¹¥»÷µÄΣº¦¡£¡£¡£¡£


https://hackread.com/scammers-use-fake-facebook-copyright-notices-to-hijack-accounts/


6. ¼ÍÄîÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬£¬12Íò»¼ÕßÐÅÏ¢Ôâй¶


2ÔÂ10ÈÕ£¬£¬£¬ £¬£¬£¬×ôÖÎÑÇÖݰ಼ÀïÆæµÄÒ»¼ÒСÐÍÐæÂäÒ½Ôº¼ÍÄîÒ½ÔººÍׯ԰ÔÚ2024Äê11ÔÂÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬£¬µ¼ÖÂÆäϵͳ̱»¾£¬£¬£¬ £¬£¬£¬²»µÃ²»½ÓÄÉÖ½ÖÊÁ÷³Ì¼Í¼»¼ÕßÐÅÏ¢¡£¡£¡£¡£Ö»¹ÜÔËӪδÖÐÖ¹£¬£¬£¬ £¬£¬£¬µ«ÆÚ´ýʱ¼äÑÓÉì¡£¡£¡£¡£¹¥»÷Õ߾ݳƴÓҽԺϵͳÖÐÇÔÈ¡ÁË1.15TBµÄÊý¾Ý£¬£¬£¬ £¬£¬£¬²¢ÔÚTorйÃÜÍøÕ¾ÉϹûÕæ£¬£¬£¬ £¬£¬£¬ÆäÖаüÀ¨120,085È˵ÄСÎÒ˽¼ÒÐÅÏ¢ºÍ¿µ½¡ÐÅÏ¢£¬£¬£¬ £¬£¬£¬ÈçÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢²¡Ê·¡¢ÖÎÁÆÐÅÏ¢ºÍ¿µ½¡°ü¹ÜÐÅÏ¢¡£¡£¡£¡£EmbargoÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¼ÍÄîÒ½ÔºÒÑÏòÊÜÓ°ÏìСÎÒ˽¼Ò·¢ËÍÊéÃæÍ¨Öª£¬£¬£¬ £¬£¬£¬²¢Ìṩ12¸öÔµÄÃâ·ÑÉí·Ý±£»£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£Ö»¹ÜÏÖÔÚûÓÐÖ¤¾ÝÅúעСÎÒ˽¼ÒÐÅÏ¢±»ÀÄÓ㬣¬£¬ £¬£¬£¬µ«ÓÉÓÚÊý¾Ý¿É¹ûÕæÏÂÔØ£¬£¬£¬ £¬£¬£¬ÊÜÓ°ÏìÈËȺ¿ÉÄÜÃæÁÙÍøÂç´¹ÂÚºÍÆäËûÀàÐ͹¥»÷µÄΣº¦¡£¡£¡£¡£


https://www.securityweek.com/information-of-120000-stolen-in-ransomware-attack-on-georgia-hospital/