ÐÂÐÍFireScamÐÅÏ¢ÇÔÈ¡ÌØ¹¤Èí¼þαװ³ÉTelegram Premium

Ðû²¼Ê±¼ä 2025-01-06

1. ÐÂÐÍFireScamÐÅÏ¢ÇÔÈ¡ÌØ¹¤Èí¼þαװ³ÉTelegram Premium


1ÔÂ4ÈÕ£¬£¬£¬£¬£¬Ò»ÖÖÃûΪ¡°FireScam¡±µÄÐÂÐÍ Android ¶ñÒâÈí¼þÕýÔÚͨ¹ý GitHub ÉϵĴ¹ÂÚÍøÕ¾ÒÔ Telegram Ó¦ÓóÌÐòµÄ¸ß¼¶°æ±¾¾ÙÐÐÈö²¥£¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾Ä£ÄâÁ˶íÂÞË¹ÒÆ¶¯×°±¸Ó¦ÓóÌÐòÊг¡ RuStore¡£¡£¡£¡£¡£ÕâЩ´¹ÂÚÍøÕ¾Ê¹ÓöíÂÞ˹Óû§¶ÔÒÆ¶¯Èí¼þ»á¼ûÊÜÏÞµÄÅä¾°£¬£¬£¬£¬£¬ÌṩֲÈëÆ÷Ä£¿£¿£¿éGetAppsRu.apk£¬£¬£¬£¬£¬¸ÃÄ£¿£¿£¿éʹÓÃDexGuard»ìÏýÒÔÌӱܼì²â²¢»ñÈ¡¶àÖÖȨÏÞ¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬Ëü×°ÖÃÖ÷ÒªµÄ¶ñÒâÈí¼þ¸ºÔØ¡°Telegram Premium.apk¡±£¬£¬£¬£¬£¬ÇëÇó¼à¿ØÍ¨Öª¡¢¼ôÌù°åÊý¾Ý¡¢¶ÌÐź͵绰ЧÀ͵ÈȨÏÞ¡£¡£¡£¡£¡£FireScamÖ´Ðк󣬣¬£¬£¬£¬»áÏÔʾһ¸öÓÕÆ­ÐÔµÄTelegramµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬ÇÔÈ¡Óû§Æ¾Ö¤£¬£¬£¬£¬£¬²¢ÓëFirebaseʵʱÊý¾Ý¿âͨѶ£¬£¬£¬£¬£¬ÉÏ´«±»µÁÊý¾Ý²¢×¢²áÊÜѬȾװ±¸¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ëü»¹½¨É賤ÆÚµÄWebSocketÅþÁ¬ÒÔÖ´ÐÐʵʱÏÂÁ£¬£¬£¬£¬¼à¿ØÆÁÄ»»î¶¯×ª±ä¡¢µç×ÓÉÌÎñÉúÒâÒÔ¼°Óû§ÊäÈëºÍ¼ôÌù°åÄÚÈÝ£¬£¬£¬£¬£¬ÉõÖÁ×èµ²×Ô¶¯Ìî³äÊý¾Ý¡£¡£¡£¡£¡£Ö»¹ÜÉÐδȷ¶¨FireScamµÄÔËÓªÕߣ¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪËüÊÇÒ»ÖÖÖØ´óÇÒ½ÓÄÉÏȽø¹æ±ÜÊÖÒÕµÄÍþв¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬Óû§Ó¦ÉóÉ÷¿´´ýÀ´×ÔDZÔÚ²»ÊÜÐÅÈÎȪԴµÄÎļþºÍ²»ÊìϤµÄÁ´½Ó¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-firescam-android-data-theft-malware-poses-as-telegram-premium-app/


2. UpdraftPlus²å¼þÑÏÖØÇå¾²Îó²îCVE-2024-10957ÆØ¹â


1ÔÂ4ÈÕ£¬£¬£¬£¬£¬È«ÇòÓÐÁè¼Ý300Íò¸öWordPressÍøÕ¾Ê¹ÓõÄUpdraftPlus±¸·ÝºÍǨáã²å¼þÖз¢Ã÷ÁËÒ»¸öÑÏÖØÇå¾²Îó²î£¬£¬£¬£¬£¬±àºÅΪCVE-2024-10957£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ8.8¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ²å¼þµÄrecursive_unserialized_replaceº¯ÊýÖУ¬£¬£¬£¬£¬ÓÉÓÚδ׼ȷ´¦Öóͷ£²»ÊÜÐÅÈεÄÊäÈë·´ÐòÁл¯£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓÃPHP¹¤¾ß×¢ÈëÎó²î¡£¡£¡£¡£¡£Ö»¹ÜUpdraftPlus×Ô¼ºÃ»ÓÐÒÑÖªµÄPHP¹¤¾ßPOPÁ´£¬£¬£¬£¬£¬µ«ÆäËûÒ×Êܹ¥»÷µÄ²å¼þ»òÖ÷Ìâ¿ÉÄÜʹ¹¥»÷ÕßÄܹ»É¾³ýí§ÒâÎļþ¡¢»á¼ûÃô¸ÐÊý¾Ý»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£Ö÷ÒªµÄÊÇ£¬£¬£¬£¬£¬´ËÎó²îÐèÒªÖÎÀíÔ±ÔÚ²å¼þÄÚÖ´ÐÐËÑË÷ºÍÌæ»»²Ù×÷²Å»ª´¥·¢¶ñÒâ¸ºÔØ¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±WebbernautÒò·¢Ã÷²¢ÈÏÕæÈεØÅû¶´ËÎó²î¶øÊܵ½ÔÞÓþ¡£¡£¡£¡£¡£´ËÎó²îÓ°ÏìUpdraftPlusµÄËùÓа汾£¬£¬£¬£¬£¬Ö±ÖÁ1.24.11°æ£¬£¬£¬£¬£¬´ó×ÚWordPressÍøÕ¾¿ÉÄÜÃæÁÙΣº¦¡£¡£¡£¡£¡£UpdraftPlusÍŶÓÒÑÔÚ1.24.12°æ±¾Öнâ¾öÁË´ËÎó²î£¬£¬£¬£¬£¬½¨ÒéËùÓÐÓû§Á¬Ã¦¸üÐÂÖÁ¸Ã°æ±¾¡£¡£¡£¡£¡£


https://securityonline.info/cve-2024-10957-exposes-over-3-million-wordpress-sites-to-unauthenticated-php-object-injection-exploits/


3. NessusÊðÀíÒò¸üйýʧÏÂÏߣ¬£¬£¬£¬£¬TenableÒªÇó¿Í»§ÊÖ¶¯Éý¼¶»Ö¸´


1ÔÂ3ÈÕ£¬£¬£¬£¬£¬Tenable¹«Ë¾½üÆÚÔâÓöÁËÒ»´ÎÈí¼þ¸üйýʧ£¬£¬£¬£¬£¬µ¼ÖÂÆäNessusÎó²îɨÃèÆ÷ÊðÀíÔÚ12ÔÂ31ÈÕ¶Ô²¿·ÖÓû§ÏÂÏß¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°ÏìÁËÈ«Çò¶à¸öµØÇø£¬£¬£¬£¬£¬ÌØÊâÊÇÄÇЩ¸üÐÂÖÁNessus Agent°æ±¾10.8.0ºÍ10.8.1µÄϵͳ¡£¡£¡£¡£¡£ÎªÁËÓ¦¶ÔÕâÒ»ÎÊÌ⣬£¬£¬£¬£¬TenableѸËÙ³·ÏÂÁËÓÐÎÊÌâµÄ°æ±¾£¬£¬£¬£¬£¬²¢Ðû²¼ÁËа汾10.8.2ÒÔÐÞ¸´Îó²î¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ¿Í»§ÐèÒªÊÖ¶¯Éý¼¶µ½Ð°汾»ò½µ¼¶µ½10.7.3°æ±¾²Å»ªÊ¹ÊðÀíÖØÐÂÉÏÏß¡£¡£¡£¡£¡£ÈôÊÇʹÓÃÁËÊðÀíÉèÖÃÎļþ¾ÙÐÐÉý¼¶»ò½µ¼¶£¬£¬£¬£¬£¬»¹ÐèÒªÌØÊâÖØÖòå¼þ¡£¡£¡£¡£¡£TenableÍýÏë»Ö¸´²å¼þ¹©¸å£¬£¬£¬£¬£¬²¢ÌáÐÑËùÓÐÔËÐÐÊÜÓ°Ïì°æ±¾µÄ¿Í»§¾¡¿ì½ÓÄÉÐж¯¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñËäδÔì³É´óÃæ»ýÖÐÖ¹£¬£¬£¬£¬£¬µ«ÀàËÆµÄÎÊÌâÔÚ2024Äê7ÔÂÓÉCrowdStrike Falcon¸üйýʧÒý·¢Ê±£¬£¬£¬£¬£¬Ôøµ¼ÖÂÈ«Çò¶à¸ö×éÖ¯ºÍЧÀ͵Ä̱»¾£¬£¬£¬£¬£¬°üÀ¨ÒøÐС¢º½¿Õ¹«Ë¾µÈÖ÷Òª»ú¹¹¡£¡£¡£¡£¡£ÕâÔÙ´ÎÌáÐÑÁËÍøÂçÇå¾²¸üеÄÖ÷ÒªÐÔºÍDZÔÚΣº¦¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/bad-tenable-plugin-updates-take-down-nessus-agents-worldwide/


4. Atos·ñ¶¨Space BearsÀÕË÷Èí¼þÍÅ»ïÈëÇÖÆäÊý¾Ý¿â


1ÔÂ3ÈÕ£¬£¬£¬£¬£¬·¨¹ú¿Æ¼¼¾ÞÍ·Atos£¬£¬£¬£¬£¬×Ô³ÆÅ·ÖÞÁìÏȵÄÍøÂçÇå¾²¡¢ÔÆÅÌËãºÍ¸ßÐÔÄÜÅÌË㹫˾£¬£¬£¬£¬£¬¿ËÈÕ·ñ¶¨ÁËSpace BearsÀÕË÷Èí¼þÍÅ»ï¹ØÓÚÈëÇÖÆäÊý¾Ý¿âµÄÖ¸¿Ø¡£¡£¡£¡£¡£Space BearsÊÇÒ»¸öÏà¶Ô½ÏеÄÍøÂç·¸·¨×éÖ¯£¬£¬£¬£¬£¬Ê¹ÓÃË«ÖØÀÕË÷ÊֶΣ¬£¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢ÍþвÔÚÍøÉÏй¶£¬£¬£¬£¬£¬ÒÔÆÈʹÊܺ¦ÕßÖ§¸¶Êê½ð¡£¡£¡£¡£¡£12ÔÂ28ÈÕ£¬£¬£¬£¬£¬Space BearsÉù³ÆÈëÇÖÁËAtosÍøÂç²¢ÍýÏëÐû²¼ÇÔÈ¡µÄ¹«Ë¾Êý¾Ý¿â¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬AtosÔÚ12ÔÂ29ÈÕÌåÏÖÆðÔ´ÆÊÎöδ·¢Ã÷ÈκÎÈëÇÖ»òÀÕË÷Èí¼þÓ°ÏìµÄÖ¤¾Ý£¬£¬£¬£¬£¬Ò²Î´ÊÕµ½Êê½ðÒªÇ󡣡£¡£¡£¡£Atos½øÒ»²½Ö¸³ö£¬£¬£¬£¬£¬Space BearsÏÖʵ¹¥»÷µÄÊÇÓëAtosÎ޹صÄÍⲿµÚÈý·½»ù´¡ÉèÊ©£¬£¬£¬£¬£¬ËäÈ»´æ´¢ÁËÌá¼°AtosµÄÊý¾Ý£¬£¬£¬£¬£¬µ«²¢²»ÊÜAtosÖÎÀí»ò± £» £»£»£»£»£»¤¡£¡£¡£¡£¡£AtosÇ¿µ÷ÆäÔÚÈ«ÇòÓµÓÐÁè¼Ý6,500ÃûÇ徲ר¼ÒºÍ17¸öÐÂÒ»´úÇå¾²ÔËÓªÖÐÐÄ£¬£¬£¬£¬£¬È«ÌìºòÔËÓªÒÔÈ·±£¼¯Íż°Æä¿Í»§µÄÇå¾²¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/french-govt-contractor-atos-denies-space-bears-ransomware-attack-claims/


5. ÀïÊ¿Âú´óѧҽѧÖÐÐÄÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬67ÍòÓàÈËÊý¾Ýй¶


1ÔÂ3ÈÕ£¬£¬£¬£¬£¬Å¦Ô¼ÀïÊ¿Âú´óѧҽѧÖÐÐÄ£¨RUMC£©ÔÚ2023Äê5ÔÂÔâÊÜÁËÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂҽԺЧÀÍÖÐÖ¹ÊýÖÜ£¬£¬£¬£¬£¬²¢Ó°ÏìÁË674,033ÈË¡£¡£¡£¡£¡£Ö»¹ÜÃæÁÙÌôÕ½£¬£¬£¬£¬£¬Ò½ÔºÈÔά³ÖÁËÖÜÈ«µÄ»¼ÕßЧÀÍ£¬£¬£¬£¬£¬²¢½«Ò¹¼ä´´É˺ÍÖзçÕչ˻¤Ê¿µÄÖÐÖ¹ÏÞÖÆÔÚ×îµÍÏÞ¶È¡£¡£¡£¡£¡£ÔÚÍøÂçÇå¾²¹«Ë¾µÄ×ÊÖúÏ£¬£¬£¬£¬£¬Ò½ÔºÆð¾¢»Ö¸´ÏµÍ³²¢ÆÀ¹À¹¥»÷¹æÄ££¬£¬£¬£¬£¬Í¬Ê±È·Èϵç×Ó¿µ½¡¼Í¼ϵͳδÊÜÓ°Ï죬£¬£¬£¬£¬µ«ÆäËûÎļþ¿ÉÄÜÔÚ¹¥»÷ʱ´ú±»»á¼û»òɾ³ý¡£¡£¡£¡£¡£RUMCÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬¿ÉÄÜÉæ¼°°üÀ¨Ð¡ÎÒ˽¼ÒºÍ¿µ½¡ÐÅÏ¢µÄÃô¸ÐÎļþ£¬£¬£¬£¬£¬ÈçÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢½ðÈÚÕË»§ÐÅÏ¢µÈ¡£¡£¡£¡£¡£Ò½ÔºÒÑ֪ͨÊÜÓ°ÏìµÄСÎÒ˽¼Ò²¢½¨ÒéËûÃǽÓÄɱ £» £»£»£»£»£»¤²½·¥£¬£¬£¬£¬£¬Í¬Ê±ÎªÉç»áÇå¾²ºÅÂëй¶µÄСÎÒ˽¼ÒÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£¡£¡£¡£Ö»¹ÜÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬µ«RUMCÒÑÏòÏà¹Ø²¿·Öת´ïÁ˸ÃÊÂÎñ£¬£¬£¬£¬£¬²¢¼û¸æÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿´Ë´ÎÊý¾Ýй¶µÄÏêϸÈËÊý¡£¡£¡£¡£¡£


https://securityaffairs.com/172641/data-breach/richmond-university-medical-center-data-breach.html


6. Nikki - UniversalÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬761.8GBÊý¾Ýй¶


1ÔÂ4ÈÕ£¬£¬£¬£¬£¬Nikki - UniversalÓÐÏÞ¹«Ë¾ÊÇÒ»¼Ò×ÅÃûµÄ»¯Ñ§ÖÆÔìÉÌ£¬£¬£¬£¬£¬ÓÚ2024Äê12ÔÂ27ÈÕ֤ʵÔâÊÜÁËÀ´×ÔHunters InternationalÀÕË÷Èí¼þ×éÖ¯µÄÖØ´ó¹¥»÷¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÔÚ12ÔÂ22ÈÕ£¬£¬£¬£¬£¬µ¼Ö¹«Ë¾²¿·ÖЧÀÍÆ÷Éϵĵç×ÓÊý¾Ý±»¼ÓÃÜ£¬£¬£¬£¬£¬Éæ¼°Êý¾ÝÁ¿¸ß´ï761.8GB£¬£¬£¬£¬£¬°üÀ¨476,342¸öÎļþ¡£¡£¡£¡£¡£Hunters InternationalÒÔÆä¼¤½øÊÖ¶ÎÖø³Æ£¬£¬£¬£¬£¬Éù³ÆÈôδÔÚ»®¶¨ÈÕÆÚ£¨2025Äê1ÔÂ10ÈÕ£©Ç°ÊÕµ½Êê½ð£¬£¬£¬£¬£¬½«¹ûÕæËùÓÐÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£Nikki - UniversalËäѸËÙÏìÓ¦²¢Æð¾¢ÊӲ죬£¬£¬£¬£¬µ«ÈÔδÄÜ×èÖ¹¹¥»÷´øÀ´µÄË𺦡£¡£¡£¡£¡£Hunters InternationalµÄ¼ÓÈë½øÒ»²½¼Ó¾çÁËÊ±ÊÆµÄÖØ´óÐÔ£¬£¬£¬£¬£¬ÆäÐû³ÆÒÑ»ñÈ¡²¢¼ÓÃÜÊý¾Ý£¬£¬£¬£¬£¬¶ÔNikki - UniversalµÄÍøÂçÇå¾²×é³ÉÑÏÖØÍþв£¬£¬£¬£¬£¬²¢¿ÉÄÜÒý·¢¶àÖÖÍøÂçÍþвÓëÉùÓþΣº¦¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼ÒÕ¹Íû£¬£¬£¬£¬£¬Ëæ×ÅÈ˹¤ÖÇÄܺÍÁ¿×ÓÅÌËãµÄÉú³¤£¬£¬£¬£¬£¬2025ÄêÍøÂç¹¥»÷µÄÖØÆ¯ºóºÍƵÂʽ«½øÒ»²½ÔöÌí£¬£¬£¬£¬£¬ÒªÇó×éÖ¯±ØÐèÇ¿»¯·ÀÓù²½·¥¡£¡£¡£¡£¡£


https://cybersecuritynews.com/nikki-universal-cyber-attack/