CISAÖÒÑÔFortiOSÑÏÖØRCEÎó²îÕý±»Æð¾¢Ê¹ÓÃ

Ðû²¼Ê±¼ä 2024-10-11

1. CISAÖÒÑÔFortiOSÑÏÖØRCEÎó²îÕý±»Æð¾¢Ê¹ÓÃ


10ÔÂ9ÈÕ£¬£¬£¬£¬CISA͸¶¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓÃÒ»¸öÑÏÖØµÄFortiOSÔ¶³Ì´úÂëÖ´ÐÐ(RCE)Îó²î£¨CVE-2024-23113£©¡£¡£¡£¡£¸ÃÎó²îÓÉfgfmdÊØ»¤Àú³Ì½ÓÊÜÍⲿ¿ØÖƵÄÃûÌÃ×Ö·û´®×÷Ϊ²ÎÊýÒýÆð£¬£¬£¬£¬Ê¹µÃδ¾­Éí·ÝÑéÖ¤µÄÍþвÐÐΪÕßÄܹ»ÔÚδÐÞ²¹µÄ×°±¸ÉÏÖ´ÐÐÏÂÁî»òí§Òâ´úÂ룬£¬£¬£¬ÇÒÎÞÐèÓû§½»»¥¡£¡£¡£¡£´ËÎó²îÓ°ÏìFortiOS 7.0¼°ÒÔÉϰ汾¡¢FortiPAM 1.0¼°ÒÔÉϰ汾¡¢FortiProxy 7.0¼°ÒÔÉϰ汾ÒÔ¼°FortiWeb 7.4¡£¡£¡£¡£FortinetÒÑÓÚÖÙ´º·ÝÅû¶²¢ÐÞ²¹Á˸ÃÎó²î£¬£¬£¬£¬²¢½¨Òéɾ³ýËùÓнӿڶÔfgfmdÊØ»¤³ÌÐòµÄ»á¼ûȨÏÞ×÷Ϊ»º½â²½·¥¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬CISAÒѽ«´ËÎó²îÌí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖУ¬£¬£¬£¬ÒªÇóÃÀ¹úÁª°î»ú¹¹ÔÚ10ÔÂ30ÈÕ֮ǰ±£»£»£»¤ÆäÍøÂçÉϵÄFortiOS×°±¸ÃâÊÜÕâЩÕýÔÚ¾ÙÐеĹ¥»÷¡£¡£¡£¡£ÍøÂçÇå¾²»ú¹¹ÖÒÑԳƣ¬£¬£¬£¬´ËÀàÎó²îÊǶñÒâÍøÂçÐÐΪÕ߯µÈÔ¹¥»÷µÄǰÑÔ£¬£¬£¬£¬´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/


2. Ó¡¶ÈStar Health°ü¹Ü¹«Ë¾ÔâÍøÂç¹¥»÷£¬£¬£¬£¬¿Í»§Êý¾ÝÒÉÔâй¶


10ÔÂ9ÈÕ£¬£¬£¬£¬Ó¡¶È×î´óµÄ¿µ½¡°ü¹Ü¹«Ë¾Ö®Ò»Star Health and Allied Insurance֤ʵÔâÊÜÁ˶ñÒâÍøÂç¹¥»÷£¬£¬£¬£¬µ¼ÖÂijЩÊý¾Ý±»Î´¾­ÊÚȨºÍ²»·¨»á¼û£¬£¬£¬£¬µ«¹«Ë¾ÔËӪδÊÜÓ°Ï죬£¬£¬£¬Ð§ÀÍÈÔÔÚ¼ÌÐø¡£¡£¡£¡£Star HealthÌṩ¶àÖÖ°ü¹ÜЧÀÍ£¬£¬£¬£¬ÓµÓÐÁè¼Ý1.7ÒÚÒ½Áưü¹Ü¿Í»§¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÉù³ÆÔÚÍøÉÏÐû²¼Á˿ͻ§µÄ¿µ½¡¼Í¼ºÍÆäËûÃô¸ÐÊý¾Ý£¬£¬£¬£¬ºÚ¿Í×éÖ¯ÔÚTelegramÉϽ¨ÉèÁË̸Ìì»úеÈË£¬£¬£¬£¬Ð¹Â¶ÁË3100ÍòͶ±£È˺ÍÁè¼Ý580Íò·Ý°ü¹ÜË÷ÅâµÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£Star HealthÒÑÌáÆðËßËÏ¿ØËßTelegramºÍCloudflare£¬£¬£¬£¬²¢Ö¸³öÆäÊ×ϯÐÅÏ¢Çå¾²¹ÙÒ»Ö±ÔÚÆð¾¢ÅäºÏÊӲ죬£¬£¬£¬Î´·¢Ã÷ÆäÓÐÈκβ»µ±ÐÐΪ¡£¡£¡£¡£´Ë´ÎÈëÇÖµÄϸ½ÚºÍºÚ¿ÍÔõÑù»ñÈ¡Êý¾ÝÈÔ²»ÇåÎú£¬£¬£¬£¬°ü¹Ü¹«Ë¾Î´Í¸Â¶ÊÇ·ñ¿ÉÒÔÈ·ÈÏË­»á¼ûÁËÊý¾ÝÒÔ¼°ÄÄЩÊý¾ÝÒѱ»»á¼û»òÇÔÈ¡¡£¡£¡£¡£


https://techcrunch.com/2024/10/09/indias-star-health-confirms-data-breach-after-cybercriminals-post-customers-health-data-online/


3. ³¯ÏÊÍþвÕßÕë¶Ô¿Æ¼¼ÇóÖ°ÕßÍÆ¹ã¶ñÒâÈí¼þ


10ÔÂ9ÈÕ£¬£¬£¬£¬Ó볯ÏÊÓÐÁªÏµµÄÍþвÐÐΪÕß½«Ä¿µÄËø¶¨ÔڿƼ¼ÐÐÒµµÄÇóÖ°ÕßÉíÉÏ£¬£¬£¬£¬Í¨¹ýÇóְƽ̨ÁªÏµÈí¼þ¿ª·¢Ö°Ô±£¬£¬£¬£¬Ã°³äDZÔÚ¹ÍÖ÷Ô¼ÇëËûÃǼÓÈëÔÚÏßÃæÊÔ£¬£¬£¬£¬²¢ÊÔͼ˵·þËûÃÇÏÂÔØ²¢×°ÖöñÒâÈí¼þ£¬£¬£¬£¬ÕâÊÇÃûΪ¡°Ñ¬È¾ÐÔ·Ã̸¡±µÄ»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£¸Ã»î¶¯¼¯Èº±»×·×ÙΪCL-STA-0240£¬£¬£¬£¬Éæ¼°ÒÑÖª¶ñÒâÈí¼þ¼Ò×åBeaverTailºÍInvisibleFerretµÄ¸üа汾¡£¡£¡£¡£µÚÒ»½×¶ÎÑ¬È¾Éæ¼°BeaverTailÏÂÔØ³ÌÐòºÍÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬¸Ã³ÌÐòרΪWindowsºÍApple macOSƽ̨Éè¼Æ£¬£¬£¬£¬³äµ±»ùÓÚPythonµÄInvisibleFerretºóÃŵĹܵÀ¡£¡£¡£¡£Ö»¹Ü¸Ã»î¶¯Òѱ»¹ûÕæÅû¶£¬£¬£¬£¬µ«ÈÔÓÐÖ¤¾ÝÅú×¢ËüÈÔÈ»»îÔ¾¡£¡£¡£¡£Çå¾²Ñо¿Ô±ºÍÍøÂçÇå¾²¹«Ë¾ÏêϸÐÎòÁËʹÓüÙÊÓÆµ¾Û»áÓ¦ÓóÌÐòMiroTalkºÍFreeConference.comÉøÍ¸µ½¿ª·¢Ö°Ô±ÏµÍ³ÖеĹ¥»÷Á´¡£¡£¡£¡£BeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡ä¯ÀÀÆ÷ÃÜÂë¡¢´Ó¶à¸ö¼ÓÃÜÇ®±ÒÇ®°üÖÐÍøÂçÊý¾Ý£¬£¬£¬£¬²¢ÏÂÔØ²¢Ö´ÐÐInvisibleFerretºóÃÅ£¬£¬£¬£¬¸ÃºóÃŰüÀ¨Ö¸ÎÆÊ¶±ð¡¢Ô¶³Ì¿ØÖÆ¡¢¼üÅ̼ͼ¡¢Êý¾Ýй¶µÈ¹¦Ð§¡£¡£¡£¡£Unit 42ÌåÏÖ£¬£¬£¬£¬Õâ´Î»î¶¯¿ÉÄܳöÓÚ¾­¼ÃÄîÍ·£¬£¬£¬£¬ÓÉÓÚBeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡13¸ö²î±ðµÄ¼ÓÃÜÇ®±ÒÇ®°ü£¬£¬£¬£¬³¯ÏÊÍþвÕß»á¾ÙÐнðÈÚ·¸·¨ÒԳO×ʽðÀ´Ö§³Ö³¯ÏÊÕþȨ¡£¡£¡£¡£


https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html


4. ºÚ¿ÍÉù³Æ¹¥»÷Dr.WebÇÔÈ¡10TBÊý¾Ý£¬£¬£¬£¬Òý·¢ÍøÂçÇå¾²ÐÐÒµµ£ÐÄ


10ÔÂ9ÈÕ£¬£¬£¬£¬¾ÝCyber Security News±¨µÀ£¬£¬£¬£¬Ò»ÃûºÚ¿ÍÔÚºÚ¿ÍÂÛ̳DumpForumsÉÏÉù³Æ¶Ô¶íÂÞË¹ÖøÃûÍøÂçÇå¾²¹«Ë¾Dr.Web¾ÙÐÐÁ˹¥»÷£¬£¬£¬£¬²¢ÇÔÈ¡Á˸ߴï10TBµÄÊý¾Ý¡£¡£¡£¡£ºÚ¿ÍÉù³Æ´Ë´Î¹¥»÷¾­ÓÉÈ«ÐIJ߻®£¬£¬£¬£¬ÀúʱÊýÌ죬£¬£¬£¬ÀÖ³ÉÉøÍ¸µ½Dr.WebµÄÍâµØÍøÂ磬£¬£¬£¬²¢Öð²½ÈëÇÖÆäЧÀÍÆ÷ºÍ×ÊÔ´£¬£¬£¬£¬ÉõÖÁÉøÍ¸µ½ÁËÆä×îÇå¾²µÄ»ù´¡ÉèÊ©²¿·Ö¡£¡£¡£¡£ºÚ¿Í»¹Éù³Æ´ÓGitLabЧÀÍÆ÷¡¢¹«Ë¾ÓʼþЧÀÍÆ÷¡¢Confluence¡¢Redmine¡¢Jenkins¡¢Mantisϵͳ¡¢RocketChatͨѶƽ̨µÈ¶à¸öÒªº¦ÏµÍ³ÖÐÆÆ½â²¢Ð¹Â¶ÁËÊý¾Ý£¬£¬£¬£¬²¢ÔÚÒ»¸öÔÂÄÚδ±»·¢Ã÷µÄÇéÐÎÏ»á¼û²¢ÉÏ´«Á˿ͻ§¶ËÊý¾Ý¿â£¬£¬£¬£¬¿ÉÄÜ̻¶ÁËDr.WebÓû§µÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬Dr.Web¹Ù·½ÉùÃ÷³Æ£¬£¬£¬£¬Ö»¹ÜÆäϵͳ×ÊÔ´ÔâÊÜÁËÓÐÕë¶ÔÐԵĹ¥»÷£¬£¬£¬£¬µ«ÒÑÀֳɴì°ÜÁËÆÆËðÆä»ù´¡ÉèÊ©µÄÍýÏ룬£¬£¬£¬Óû§¶Ë²úƷδÊÜÓ°Ïì¡£¡£¡£¡£ÎªÔ¤·ÀÆð¼û£¬£¬£¬£¬Dr.WebÒѶϿªËùÓÐ×ÊÔ´ÓëÍøÂçµÄÅþÁ¬¾ÙÐÐÑéÖ¤£¬£¬£¬£¬²¢ÔÝÍ£Á˲¡¶¾¿âµÄÐû²¼¡£¡£¡£¡£Èô´Ëй¶ÐÐΪ»ñµÃ֤ʵ£¬£¬£¬£¬½«¶ÔDr.WebÒÔÖÂÕû¸öÍøÂçÇå¾²ÐÐÒµÔì³ÉÖØ´ó¹¥»÷£¬£¬£¬£¬²¢Òý·¢Óû§¶ÔÄ¿½ñ±£»£»£»¤²½·¥ÓÐÓÃÐÔµÄÖÊÒÉ¡£¡£¡£¡£


https://cybersecuritynews.com/dumpforums-10tb-data-dr-web/


5. AkiraºÍFogÀÕË÷Èí¼þʹÓÃÒªº¦µÄVeeam RCEÎó²î


10ÔÂ10ÈÕ£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïʹÓÃVeeam Backup & Replication (VBR) ЧÀÍÆ÷ÉϵÄÒ»¸öÑÏÖØÇå¾²Îó²î£¨CVE-2024-40711£©£¬£¬£¬£¬ÊµÏÖÁËÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£¡£¸ÃÎó²îÓÉCode WhiteÇå¾²Ñо¿Ô±Florian Hauser·¢Ã÷£¬£¬£¬£¬Ô´ÓÚ²»ÊÜÐÅÈÎÊý¾Ý·´ÐòÁл¯µÄÈõµã£¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒԽϵÍÖØÆ¯ºó·¢¶¯¹¥»÷¡£¡£¡£¡£VeeamÔÚ9ÔÂ4ÈÕÅû¶Á˸ÃÎó²î²¢Ðû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬¶øwatchTowr LabsÔòÔÚ9ÔÂ9ÈÕÐû²¼ÊÖÒÕÆÊÎö£¬£¬£¬£¬µ«ÑÓ³ÙÖÁ9ÔÂ15ÈղŹûÕæ¿´·¨ÑéÖ¤Îó²î´úÂ룬£¬£¬£¬ÒÔÈ·±£ÖÎÀíÔ±ÓÐ×㹻ʱ¼äÔöÇ¿·À»¤¡£¡£¡£¡£ÓÉÓÚVBRÈí¼þÆÕ±éÓÃÓÚÊý¾Ý±£»£»£»¤ºÍÔÖÄѻָ´£¬£¬£¬£¬³ÉΪ¶ñÒâÐÐΪÕßêéêìµÄÄ¿µÄ¡£¡£¡£¡£Sophos X-OpsÊÂÎñÏìÓ¦Ö°Ô±·¢Ã÷£¬£¬£¬£¬¸ÃÎó²îѸËÙ±»AkiraºÍFogÀÕË÷Èí¼þ¹¥»÷ʹÓ㬣¬£¬£¬Á¬ÏµÖ®Ç°Ð¹Â¶µÄƾ֤£¬£¬£¬£¬½«¡°µã¡±ÍâµØÕÊ»§Ìí¼Óµ½ÖÎÀíÔ±ºÍÔ¶³Ì×ÀÃæÓû§×é¡£¡£¡£¡£¹¥»÷Õßͨ³£Í¨¹ýδÆôÓöàÒòËØÉí·ÝÑéÖ¤µÄÊÜѬȾVPNÍø¹Ø»á¼ûÄ¿µÄ£¬£¬£¬£¬²¿·ÖVPNÔËÐв»ÊÜÖ§³ÖµÄÈí¼þ°æ±¾¡£¡£¡£¡£ÔÚFogÀÕË÷Èí¼þÊÂÎñÖУ¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃδ±£»£»£»¤µÄHyper-VЧÀÍÆ÷ºÍÊÊÓóÌÐòrcloneÇÔÈ¡Êý¾Ý¡£¡£¡£¡£ÕâЩ¹¥»÷ÏÔʾ³ö¸ß¶ÈµÄÖØµþÐÔºÍÏàËÆÐÔ£¬£¬£¬£¬Åú×¢ÀÕË÷Èí¼þÍÅ»ïÕýÆð¾¢Ê¹ÓÃÕâÒ»Îó²î¾ÙÐй¥»÷¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/akira-and-fog-ransomware-now-exploiting-critical-veeam-rce-flaw/


6. ¸»´ïͶ×ÊϵͳÔâÈëÇÖ£¬£¬£¬£¬77,000Ãû¿Í»§ÐÅϢй¶


10ÔÂ10ÈÕ£¬£¬£¬£¬×ܲ¿Î»ÓÚ²¨Ê¿¶ÙµÄ¿ç¹ú½ðÈÚЧÀ͹«Ë¾¸»´ïͶ×Ê£¬£¬£¬£¬½üÆÚÔâÓöÁËÒ»´ÎϵͳÈëÇÖÊÂÎñ£¬£¬£¬£¬µ¼ÖÂÁè¼Ý77,000Ãû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶¡£¡£¡£¡£×÷ΪȫÇò×î´óµÄ×ʲúÖÎÀí¹«Ë¾Ö®Ò»£¬£¬£¬£¬¸»´ïÖÎÀíµÄ×ʲú×ܶî¸ß´ï14.1ÍòÒÚÃÀÔª¡£¡£¡£¡£¾Ý¸»´ï͸¶£¬£¬£¬£¬Õâ´ÎÈëÇÖ±¬·¢ÔÚ8ÔÂ17ÈÕÖÁ19ÈÕʱ´ú£¬£¬£¬£¬Ò»ÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßʹÓÃ×î½ü½¨ÉèµÄÁ½¸ö¿Í»§ÕË»§ÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£¡£¸»´ïÔÚ·¢Ã÷ÕâÒ»»î¶¯ºóѸËÙ½ÓÄɲ½·¥ÖÕÖ¹ÁË»á¼û£¬£¬£¬£¬²¢ÔÚÍⲿÇ徲ר¼ÒµÄЭÖúÏÂÕö¿ªÁËÊӲ졣¡£¡£¡£Ö»¹Ü¸»´ïûÓÐ͸¶³ýÁËÐÕÃûºÍÆäËûСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ÍâÉÐÓÐÄÄЩÐÅÏ¢±»ÇÔÈ¡£¬£¬£¬£¬µ«ËüÒÑÏòÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËÁ½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¸»´ï»¹ÌåÏÖ£¬£¬£¬£¬Ã»ÓÐÖ¤¾ÝÅú×¢±»µÁµÄ¿Í»§Êý¾Ý±»ÀÄÓ㬣¬£¬£¬µ«ÈÔ½¨ÒéÊÜÓ°ÏìµÄ¿Í»§¼á³ÖСÐÄ£¬£¬£¬£¬°´ÆÚ¼ì²éÕË»§±¨±í£¬£¬£¬£¬¼à¿ØÐÅÓñ¨¸æ£¬£¬£¬£¬²¢ÊµÊ±±¨¸æÈκοÉÒɻ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fidelity-investments-says-data-breach-affects-over-77-000-people/