ºÚ¿ÍÉù³ÆÈëÇÖCheck PointÍøÂçÇå¾²¹«Ë¾²¢³öÊÛÃô¸ÐÊý¾Ý
Ðû²¼Ê±¼ä 2025-04-011. ºÚ¿ÍÉù³ÆÈëÇÖCheck PointÍøÂçÇå¾²¹«Ë¾²¢³öÊÛÃô¸ÐÊý¾Ý
4ÔÂ1ÈÕ£¬£¬£¬ºÚ¿Í×éÖ¯CoreInjectionÐû³ÆÈëÇÖÒÔÉ«ÁÐÍøÂçÇå¾²¾ÞÍ·Check Point£¬£¬£¬ÔÚ°µÍøÂÛ̳ÒÔ5±ÈÌØ±Ò£¨Ô¼ºÏ43.45ÍòÃÀÔª£©¶µÊÛÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ2025Äê3ÔÂ30ÈÕͨ¹ýBreach ForumsÐû²¼ÉùÃ÷£¬£¬£¬Éù³ÆÕÆÎÕCheck PointÄÚ²¿ÏîÄ¿Îĵµ¡¢Óû§Æ¾Ö¤£¨º¬Ã÷ÎÄÃÜÂ룩¡¢ÍøÂç¼Ü¹¹Í¼¡¢Ô´´úÂë¼°Ô±¹¤ÁªÏµÐÅÏ¢µÈ½¹µãÊý¾Ý£¬£¬£¬½ö½ÓÊܼÓÃÜÇ®±ÒÉúÒⲢͨ¹ýTOXͨѶ¹¤¾ßÁªÏµ¡£¡£¡£¡£¡£Check PointѸËÙ»ØÓ¦£¬£¬£¬·ñ¶¨½üÆÚ±¬·¢´ó¹æÄ£ÈëÇÖ£¬£¬£¬³ÆÖ¸¿ØÔ´ÓÚÊýÔÂǰÒÑ´¦Öóͷ£µÄÁæØêÊÂÎñ£¬£¬£¬½öÉæ¼°·Ç½¹µãϵͳÇÒδӰÏì¿Í»§Êý¾Ý¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷±»ÈëÇÖµÄÃÅ»§Î´´¥¼°Éú²úÇéÐΣ¬£¬£¬ÊÜÓ°Ïì×éÖ¯ÒÑÐÞ¸´Îó²î£¬£¬£¬°µÍøÊÛÂôÊý¾ÝʵΪ¾ÉÐÅÏ¢½ÓÄÉ¡£¡£¡£¡£¡£CoreInjection×Ô3ÔÂ15ÈÕÏÖÉíBreach ForumsÒÔÀ´£¬£¬£¬ÒѶà´ÎÕë¶ÔÒÔÉ«ÁÐÒªº¦»ù´¡ÉèÊ©Ìᳫ¹¥»÷£¬£¬£¬Õ¹ÏÖ³ö¶Ô¸ß¼ÛֵĿµÄµÄ¾«×¼¹¥»÷ÄÜÁ¦¡£¡£¡£¡£¡£Æä¹¥»÷ģʽÏÔʾÓëµØÔµÕþÖθ߶ȹØÁª£¬£¬£¬Òý·¢¶ÔDZÔÚÎïÀíÆÆËð¹¥»÷µÄµ£ÐÄ¡£¡£¡£¡£¡£Ö»¹ÜCheck Pointµ»¯ÊÂÎñÓ°Ï죬£¬£¬µ«ºÚ¿ÍÅû¶µÄÄÚ²¿¼Ü¹¹Í¼¡¢Î´¼ÓÃÜÆ¾Ö¤¼°Ô´´úÂëµÈϸ½Ú£¬£¬£¬ÈÔÒý·¢Íâ½ç¶ÔÈëÇÖÉî¶ÈµÄÖÊÒÉ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬Check Pointδ¹ûÕæÈëÇÖ·½·¨¡¢Îó²îÀàÐͼ°×·ÔðÏ£Íû£¬£¬£¬Æä͸Ã÷¶Èȱ·¦¿ÉÄÜÏ÷ÈõÐÐÒµÐÅÈΡ£¡£¡£¡£¡£
https://hackread.com/hacker-breach-check-point-cybersecurity-firm-access/
2. LazarusºÚ¿Í×éÖ¯½ÓÄÉClickFixÕ½ÂÔ¹¥»÷¼ÓÃÜÇ®±ÒÇóÖ°Õß
3ÔÂ31ÈÕ£¬£¬£¬³¯ÏÊLazarusºÚ¿Í×éÖ¯½üÆÚÉý¼¶Á˶ԼÓÃÜÇ®±ÒÁìÓòÇóÖ°Õߵ͍Ïò¹¥»÷Õ½ÂÔ£¬£¬£¬½ÓÄÉClickFixÊÖÒÕʵÑéѬȾÐÔÃæÊԻ¡£¡£¡£¡£¡£¸Ã×é֯ð³äCoinbase¡¢KrakenµÈ14¼Ò×ÅÃû¼ÓÃܽðÈÚÆóÒµ£¬£¬£¬Í¨¹ýÐéαְλÓÕÆÇóÖ°Õß»á¼ûº¬¶ñÒâ´úÂëµÄÃæÊÔÍøÕ¾¡£¡£¡£¡£¡£µ±Êܺ¦ÕßʵÑéÂ¼ÖÆÊÓÆµ»Ø¸²ÃæÊÔÎÊÌâʱ£¬£¬£¬ÍøÕ¾»áµ¯³öÐéαϵͳ¹ýʧÌáÐÑ£¬£¬£¬ÒªÇóÓû§Ö´ÐÐÌØ¶¨²Ù×÷ϵͳµÄÖÕ¶ËÏÂÁîÒÔÐÞ¸´ÉãÏñÍ·Çý¶¯ÎÊÌâ¡£¡£¡£¡£¡£ÕâЩÏÂÁîÏÖʵ»áÏÂÔØÃûΪGolangGhostµÄGoÓïÑÔºóÃųÌÐò£¬£¬£¬Í¨¹ýÐÞ¸Ä×¢²á±í»òLaunchAgentʵÏÖϵͳפÁô¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ß±¸ÇÔÈ¡Chromeä¯ÀÀÆ÷Cookie¡¢ä¯ÀÀÀúÊ·¡¢´æ´¢ÃÜÂ뼰ϵͳԪÊý¾ÝµÄÄÜÁ¦£¬£¬£¬²¢Óë¹¥»÷Õß¿ØÖƵÄC2ЧÀÍÆ÷½¨Éè¼ÓÃÜͨѶ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬Lazarus½«¹¥»÷Ä¿µÄ´ÓÊÖÒÕ¿ª·¢Ö°Ô±À©Õ¹ÖÁÓªÒµ¿ª·¢¡¢Êг¡ÓªÏúµÈ·ÇÊÖÒÕ¸ÚλְԱ£¬£¬£¬Ê¹ÓÃReactJS¹¹½¨¸ß·ÂÆóÒµÕÐÆ¸Ò³ÃæÔöÇ¿ÓÕÆÐÔ¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚLinkedInµÈÉ罻ƽ̨µÄÆóÒµÕ˺Åαװ£¬£¬£¬Í¨¹ýGitHubµÈƽ̨ÍйܶñÒâ±àÂë²âÊÔÏîÄ¿£¬£¬£¬×îÖÕÓÕµ¼Êܺ¦Õß×Ô¶¯Ö´Ðй¥»÷ÔØºÉ¡£¡£¡£¡£¡£·ÀÓù½¨ÒéÇ¿µ÷ÇóÖ°ÕßÐèÑÏ¿áÑéÖ¤ÃæÊÔÔ¼ÇëȪԴ£¬£¬£¬×èÖ¹Ö´ÐÐÈκÎδ֪ÖÕ¶ËÏÂÁ£¬£¬ÆóÒµÔòÓ¦°²ÅÅYara¹æÔò¼ì²âÒì³£Àú³Ì£¬£¬£¬²¢¼à¿Ø×¢²á±í/plistÎļþ±ä»»¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/north-korean-hackers-adopt-clickfix-attacks-to-target-crypto-firms/
3. ¹ú·À³Ð°üÉÌNDC¼°AMTECÔâºÚ¿Í¹¥»÷ϵͳ±»¼ÓÃÜ
3ÔÂ31ÈÕ£¬£¬£¬¹ú·À³Ð°üÉÌNDC¼°Æäµ¯Ò©ÖÆÔì×Ó¹«Ë¾AMTEC½üÆÚÔâÓöÖØ´óÍøÂç¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¾Ý°µÍøÐ¹ÃÜ×éÖ¯InterLockÐû³Æ£¬£¬£¬ÒÑÀÖ³ÉÈëÇÖNDC¼°Æä¹ØÁªÏµÍ³£¬£¬£¬ÇÔÈ¡4,200GBÃô¸ÐÊý¾Ý£¬£¬£¬°üÀ¨290ÓàÍò·ÝÎļþ¼°45Íò¸öÎļþ¼Ð¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý°µÍøÆ½Ì¨Ðû²¼²¿·Ö½ØÍ¼×÷Ϊ×ôÖ¤£¬£¬£¬²¢Ö¸³öÒѶÔAMTEC¡¢Tech Ord¼°PRESTOϵͳʵÑéͨÅ̼ÓÃÜ¡£¡£¡£¡£¡£×÷ΪNational Presto IndustriesÈ«×Ê×Ó¹«Ë¾£¬£¬£¬NDCÖ÷Óª¾üÓÃ/¾¯Óõ¯Ò©Éú²ú£¬£¬£¬¾ß±¸Ï¸ÃÜ×é×°¡¢Õ¨Ò©×°ÔصȽ¹µãÄÜÁ¦¡£¡£¡£¡£¡£Æä×Ó¹«Ë¾AMTEC¸üÊÇÈ«Çò40ºÁÃ×Áñµ¯µ¯Ò©¼°ÒýÐŵÄ×î´óÅúÁ¿¹©Ó¦ÉÌ¡£¡£¡£¡£¡£InterLockÅû¶µÄNDCÄÚ²¿ÏàͬÄÚÈÝÏÔʾ£¬£¬£¬Ö»¹Ü¹«Ë¾Éù³ÆÒÑÏòÕþ¸®»ú¹¹ºÍ¹«ÖÚÅû¶ÊÂÎñ£¬£¬£¬µ«¹ûÕæÇþµÀδ¼ûÏà¹ØÍ¨¸æ¡£¡£¡£¡£¡£NDCÔÚ»ØÓ¦Öе»¯Êý¾Ý¼ÛÖµ£¬£¬£¬Ç¿µ÷ÆäÉú²úµÄµÍÊÖÒÕÉÌÆ·Éè¼ÆÄêÔ¾ÃÔ¶£¬£¬£¬±»µÁÐÅÏ¢¶ÔµÚÈý·½Ê¹ÓüÛÖµÓÐÏÞ£¬£¬£¬Í¬Ê±Í¸Â¶ÒÑͶ±£ÁýÕÖDZÔÚËðʧ¡£¡£¡£¡£¡£Ä¸¹«Ë¾±¨¸æÔòÈÏ¿ÉÊÂÎñ¶Ô²ÆÎñ¼°ÔËÓª¿ÉÄÜÔì³ÉÖØ´óÓ°Ï죬£¬£¬ÏÖÔÚ·¨Ö¤ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬InterLockÖ¸¿ØNDCÇå¾²¼à¿Ø±£´æÊè©£¬£¬£¬³ÆÆäδ±»·¢Ã÷»òÇýÖð³öϵͳ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²»µ«Ôì³ÉÉú²ú¡¢ÎïÁ÷µÈÔËÓª¹¦Ð§ÔÝʱ̱»¾£¬£¬£¬¸ü̻¶ÁËÒªº¦»ù´¡ÉèÊ©ÍøÂçÇå¾²·À»¤µÄųÈõÐÔ¡£¡£¡£¡£¡£
https://databreaches.net/2025/03/31/national-defense-corporation-victim-of-ransomware-attack-discloses-breach-and-declines-to-pay-any-ransom/
4. ÈýÐǵ¹úƱÎñϵͳÒòƾ֤ʧÔôÖÂ27Íò¿Í»§Êý¾Ýй¶
3ÔÂ31ÈÕ£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Hudson RockÅû¶ÈýÐǵ¹úƱÎñϵͳÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ÍþвÐÐΪÕßGHNAʹÓñ»µÁÕË»§Æ¾Ö¤ÇÔȡԼ27ÍòÌõ¿Í»§¼Í¼¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬Ð¹Â¶Ô´Í·¿É×·ËÝÖÁ2021ÄêSpectos GmbHÔ±¹¤×°±¸Ñ¬È¾µÄRacoonÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬¸ÃÕË»§±¾ÓÃÓÚ¼à¿ØÐ§ÀÍÖÊÁ¿£¬£¬£¬µ«Ïà¹ØµÇ¼ƾ֤ºã¾ÃδÂÖ»»£¬£¬£¬ÏÐÖÃËÄÄêºó³ÉΪ¹¥»÷Í»ÆÆ¿Ú¡£¡£¡£¡£¡£´Ë´Îй¶Êý¾Ýº¸Ç¿Í»§ÐÕÃû¡¢µØµã¡¢ÓÊÏäµÈÃô¸ÐÐÅÏ¢£¬£¬£¬ÒÔ¼°ÉúÒâ¼Í¼¡¢¶©µ¥ºÅ¡¢¸ú×ÙÁ´½ÓºÍÖ§³ÖÏàͬÄÚÈÝ¡£¡£¡£¡£¡£Hudson RockÖÒÑÔ£¬£¬£¬´ËÀàÐÅÏ¢¿É±»ÓÃÓÚ¾«×¼ÍøÂç´¹ÂÚ¹¥»÷¡¢Ðéα¿Í»§Ö§³ÖÕ©Æ¡¢Î±Ôì±£ÐÞË÷Åâ¼°ÎïÀí͵ÇԵȷ¸·¨»î¶¯¡£¡£¡£¡£¡£¹¥»÷ÕßÉõÖÁ¿ÉÄÜÔËÓÃAIÊÖÒÕʶ±ð¸ß¼ÛֵĿµÄ£¬£¬£¬ÊµÑ鶍֯»¯Ú²Æ¡£¡£¡£¡£¡£ÆÊÎö±¨¸æÖ¸³ö£¬£¬£¬Æ¾Ö¤ÖÎÀíÊèʧÊÇÊÂÎñÖ÷Òò£¬£¬£¬ÀàËÆÎÊÌâÔøµ¼Ö½ݱªÂ·»¢¡¢Ê©ÄÍµÂµçÆøµÈ¶à¼ÒÆóÒµÔâÏ®¡£¡£¡£¡£¡£Hudson RockÇ¿µ÷£¬£¬£¬ÐÅÏ¢ÇÔÈ¡Íþв¾ßÓÐDZÔÚÐÔ£¬£¬£¬ÆóÒµÐ轨ÉèÒ»Á¬Æ¾Ö¤¼à¿Ø»úÖÆ£¬£¬£¬¶ø·Ç½öÒÀÀµÊºóµ÷½â¡£¡£¡£¡£¡£¸Ã»ú¹¹½¨Òé×Ô¶¯×·×Ù±»µÁƾ֤Ӧ³ÉΪÇå¾²Õ½ÂÔ½¹µã£¬£¬£¬¶ø·Ç±»¶¯Ó¦¶ÔÎó²î¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬ÈýÐÇÉÐδ¾Í´ËÊÂÎñ×÷³ö¹Ù·½»ØÓ¦£¬£¬£¬ºóÐøÏ£ÍûÈÔÐèÒ»Á¬¹Ø×¢¡£¡£¡£¡£¡£
https://www.securityweek.com/hacker-leaks-samsung-customer-data/
5. ÌïÄÉÎ÷ÑÀ¿Æ¼¯ÍÅÓʼþÈëÇÖÖÂ17Íò»¼ÕßÊý¾Ýй¶
3ÔÂ31ÈÕ£¬£¬£¬ÌïÄÉÎ÷ÖÝÑÀ¿ÆÐ§Àͼ¯ÍÅChord Specialty Dental Partners£¨º¬CDHA ManagementºÍSpark DSO£©¿ËÈÕÅû¶ÔâÓöµç×ÓÓʼþϵͳÇå¾²ÊÂÎñ£¬£¬£¬Ó°Ïì¹æÄ£ÁýÕÖÆäÔÚÃÀ¹úÁù¸öÖÝÔËÓªµÄ60Óà¼ÒÕïËù¡£¡£¡£¡£¡£¾ÝÆóҵͨ¸æ£¬£¬£¬2024Äê8ÔÂ18ÈÕÖÁ9ÔÂ25ÈÕʱ´ú£¬£¬£¬¶à¸öÔ±¹¤ÓÊÏäÔâδ¾ÊÚȨ»á¼û£¬£¬£¬´æ´¢µÄÃô¸ÐÐÅÏ¢°üÀ¨»¼ÕßÐÕÃû¡¢×¡Ö·¡¢³öÉúÈÕÆÚ¡¢Éç±£ºÅ¡¢¼ÝÕպš¢ÒøÐÐÕË»§¼°Ö§¸¶¿¨Êý¾Ý¡¢Ò½ÁƼͼºÍ¿µ½¡°ü¹ÜÏêÇéµÈ¡£¡£¡£¡£¡£Ö»¹ÜÆóÒµÉùÃ÷ÏÖÔÚδ·¢Ã÷ÐÅÏ¢±»¶ñÒâÀÄÓõÄÖ¤¾Ý£¬£¬£¬µ«ÈÔÇ¿µ÷ÎÞ·¨É¨³ýÊý¾ÝÒѱ»»ñÈ¡µÄ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ²¨¼°³¬17.3ÍòÃû»¼Õߣ¬£¬£¬ChordÒÑÏòHHS±¨±¸£¬£¬£¬²¢ÔÊÐíΪÊÜÓ°ÏìÕßÌṩÐÅÓÃ¼à¿Ø¼°Éí·Ý±£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬Ò½ÁÆ»ú¹¹Òò´æ´¢´ó×ڸ߼ÛֵСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢£¬£¬£¬ºã¾Ã³ÉÎªÍøÂç¹¥»÷ÖØµãÄ¿µÄ¡£¡£¡£¡£¡£µç×ÓÓʼþ×÷Ϊ³£¼û¹¥»÷Èë¿Ú£¬£¬£¬ÆäÕË»§Çå¾²·À»¤±¡ÈõÐÔÍùÍù³ÉΪΣº¦Í»ÆÆ¿Ú¡£¡£¡£¡£¡£´ËÀàÊÂÎñ¾¯Ê¾Ò½ÁÆ×éÖ¯ÐèÇ¿»¯ÓÊÏäϵͳµÄ¶àÒòËØÈÏÖ¤¡¢°´ÆÚÉ󼯼°ÈëÇÖ¼ì²â»úÖÆ£¬£¬£¬Í¬Ê±½¨ÉèÍêÕûµÄÊÂÎñÏìÓ¦Ô¤°¸ÒÔ±£»£»£»£»£»£»¤»¼ÕßÊý¾ÝÇå¾²¡£¡£¡£¡£¡£
https://www.securityweek.com/170000-impacted-by-data-breach-at-chord-specialty-dental-partners/
6. CISA½«Ë¼¿ÆÖÇÄÜÔÊÐíÎó²îÁÐÈ뱻ʹÓÃĿ¼²¢ÉèÐÞ¸´ÏÞÆÚ
3ÔÂ31ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Ë¼¿ÆÖÇÄÜÔÊÐí¹¤¾ßµÄÁ½Ïî¸ßΣÎó²î£¨CVE-2024-20439ºÍCVE-2024-20440£©ÁÐÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ2025Äê4ÔÂ21ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£¡£¡£Îó²îϸ½ÚÏÔʾ£¬£¬£¬CVE-2024-20439Ϊ¾²Ì¬Æ¾Ö¤ºóÃÅ£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÔ¤ÉèÖÎÀíÔ±ÕË»§ÎÞÑéÖ¤µÇ¼ϵͳ£»£»£»£»£»£»CVE-2024-20440ΪÐÅϢй¶Îó²î£¬£¬£¬Í¨¹ý½á¹¹HTTPÇëÇó¿É»ñÈ¡º¬Ãô¸ÐÊý¾ÝµÄµ÷ÊÔÈÕÖ¾£¬£¬£¬°üÀ¨API»á¼ûƾ֤¡£¡£¡£¡£¡£Ë¼¿ÆÒÑÐû²¼Çå¾²¸üУ¬£¬£¬µ«SANS»¥ÁªÍø·ç±©ÖÐÐÄÖÒÑÔ£¬£¬£¬Îó²îϸ½Ú¹ûÕæºóÒÑ·ºÆð»îԾʹÓü£Ï󣬣¬£¬¹¥»÷Õß¿ÉÄÜÁ¬ÏµÆäËûÎó²î£¨ÈçCVE-2024-0305£©À©´ó¹¥»÷Ãæ¡£¡£¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬ÕâÁ½¸öÎó²î±£´æ¹ØÁª£ººóÃÅÆ¾Ö¤¿ÉÖ±½Ó»á¼ûÈÕÖ¾Îļþ£¬£¬£¬¶øÌ«¹ý¼Í¼µÄÈÕÖ¾ÓÖ̻¶¸ü¶àϵͳÐÅÏ¢¡£¡£¡£¡£¡£Ö»¹ÜÎó²îÅû¶³õÆÚδ¼û¹ûÕæÊ¹Ó㬣¬£¬µ«ÊÖÒÕϸ½ÚÍâй¼ÓËÙÁ˹¥»÷ÉìÕÅ¡£¡£¡£¡£¡£Æ¾Ö¤CISAµÄÔ¼ÊøÐÔ²Ù×÷Ö¸ÁîBOD 22-01£¬£¬£¬Áª°î»ú¹¹ÐèÑÏ¿á×ñÊØÐÞ¸´Ê±ÏÞ£¬£¬£¬Ë½Óª²¿·ÖÒà±»½¨ÒéÁ¬Ã¦Éó²éÍøÂç»ù´¡ÉèÊ©£¬£¬£¬ÓÅÏÈÐÞ²¹ÕâЩҪº¦Îó²î¡£¡£¡£¡£¡£
https://securityaffairs.com/176073/hacking/u-s-cisa-adds-cisco-smart-licensing-utility-flaw-known-exploited-vulnerabilities-catalog.html