AcronisÆÊÎö¶à½×¶Î¶ñÒâÈí¼þÈö²¥Á´
Ðû²¼Ê±¼ä 2025-04-021. AcronisÆÊÎö¶à½×¶Î¶ñÒâÈí¼þÈö²¥Á´
4ÔÂ1ÈÕ£¬£¬£¬AcronisÍþвÑо¿²¿·Ö(TRU)½üÆÚÆÊÎöÁËÒ»ÆðÖØ´óµÄ¶à½×¶Î¶ñÒâÈí¼þÈö²¥Á´£¬£¬£¬Õ¹ÏÖÁ˹¥»÷ÕßÔõÑùʹÓûìÏýÊÖÒպͶà¾ç±¾ÓïÑÔÈÆ¹ýÇå¾²·ÀÓù¡£¡£¡£¡£¡£¹¥»÷ʼÓÚαװ³É"ÕË»§¿ÛѺ´«Æ±"µÄÎ÷°àÑÀÓï´¹ÂÚÓʼþ£¬£¬£¬¸½¼þΪRARѹËõ°ü£¬£¬£¬ÄÚº¬¸ß¶È»ìÏýµÄVisual Basic¾ç±¾(VBS)¡£¡£¡£¡£¡£Ö´Ðк󣬣¬£¬VBSÌìÉúÅú´¦Öóͷ£Îļþ(BAT)£¬£¬£¬ºóÕß¹¹½¨²¢Ö´ÐÐBase64±àÂëµÄPowerShell¾ç±¾¡£¡£¡£¡£¡£¸Ã¾ç±¾½âÂëÓÐÓÃÔØºÉ¡ª¡ª½ÓÄÉRunPEÊÖÒÕ¼ÓÔØµÄ.NET¿ÉÖ´ÐÐÎļþ£¬£¬£¬Æä×ÊÔ´ÖаüÀ¨Ë«ÖؼÓÃÜÊý¾Ý¿é£¬£¬£¬Ðèͨ¹ýÌØ¶¨ÃÜÔ¿½âÃÜ¡£¡£¡£¡£¡£×îÖÕÔØºÉΪDCRat»òRhadamanthysµÈÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬¿ÉÖÂÊý¾Ýй¶ºÍϵͳÈëÇÖ¡£¡£¡£¡£¡£ÆÊÎö·¢Ã÷£¬£¬£¬¹¥»÷Á´µÄ¶à²ã»ìÏýÏÔÖøÔöÌíÁ˼ì²âÄѶȣ¬£¬£¬µ«ÒàÒýÈë¸ü¶à¹ÊÕϵ㣬£¬£¬Îª·ÀÓùÌṩÁËÍ»ÆÆ¿Ú¡£¡£¡£¡£¡£AcronisÖ¸³ö£¬£¬£¬¶à²ãÇå¾²¼Æ»®ÖÁ¹ØÖ÷Òª£º³õʼ½×¶ÎÐè×èµ²¶ñÒâÓʼþ¼°¸½¼þ£¬£¬£¬¸ß¼¶Æô·¢Ê½ÆÊÎö¿Éʶ±ð¿ÉÒɾ籾ÐÐΪ£¬£¬£¬¶øÄÚ´æ±£»£»£»£»£»£»£»¤ÊÖÒÕÄÜ×è¶Ï±àÂëÔØºÉÖ´ÐС£¡£¡£¡£¡£ÖµµÃÒ»ÌáµÄÊÇ£¬£¬£¬¹¥»÷ÕßÔÚPowerShell¾ç±¾ÖÐÖ²ÈëÄá²ÉÕÜѧÓï¼£¬£¬£¬ÊÔͼ»ìÏýÊÓÏߣ¬£¬£¬Í¹Õ¹ÏÖ´ú¶ñÒâÈí¼þµÄ´´ÒâÓëÖØ´óÐÔ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/we-smell-a-dcrat-revealing-a-sophisticated-malware-delivery-chain/
2. ÎÞÎļþ¼ÓÃÜÍÚ¿ó¹¥»÷µ¼ÖÂ1500Óą̀PostgreSQLЧÀÍÆ÷Ôâ¹¥»÷
4ÔÂ1ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬Õë¶Ô̻¶µÄPostgreSQLÊý¾Ý¿âµÄ¹¥»÷»î¶¯Òý·¢Çå¾²½ç¹Ø×¢¡£¡£¡£¡£¡£ÔÆÇå¾²¹«Ë¾WizÅû¶£¬£¬£¬¸Ã¹¥»÷»î¶¯ÓëAqua SecurityÓÚ2024Äê8Ô±ê¼ÇµÄÈëÇÖ¼¯±£´æ¹ØÁª£¬£¬£¬¹¥»÷Õß±»×·×ÙΪJINX-0126£¬£¬£¬ÆäʹÓÃÃûΪPG_MEMµÄ¶ñÒâÈí¼þʵÑé¹¥»÷¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬¹¥»÷ÕßÒ»Á¬½ø»¯¹¥»÷ÊÖ·¨£¬£¬£¬Í¨¹ýΪÿ¸öÄ¿µÄ°²ÅžßÓÐΨһ¹þÏ£ÖµµÄ¶þ½øÖÆÎļþ²¢½ÓÄÉÎÞÎļþÊÖÒÕÖ´ÐÐÍÚ¿ó¸ºÔØ£¬£¬£¬ÓÐÓùæ±ÜÁËÒÀÀµÎļþ¹þÏ£¼ì²âµÄÔÆÇå¾²½â¾ö¼Æ»®¡£¡£¡£¡£¡£¾ÝWizÆÀ¹À£¬£¬£¬¸Ã»î¶¯Òѵ¼ÖÂÁè¼Ý1,500ÃûÊܺ¦Õߣ¬£¬£¬Í¹ÏÔÁËÈõÃÜÂë»òĬÈÏÉèÖõÄPostgreSQLʵÀý×÷Ϊ¹¥»÷Ä¿µÄµÄÆÕ±éÐÔ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÈõÉèÖõÄPostgreSQLЧÀ;ÙÐÐÆðÔ´ÉøÍ¸£¬£¬£¬Í¶·ÅBase64±àÂëµÄshell¾ç±¾£¬£¬£¬¸Ã¾ç±¾²»µ«É¨³ý¾ºÕù¿ó¹¤£¬£¬£¬»¹°²ÅÅÃûΪPG_COREµÄ¶þ½øÖÆÎļþ¡£¡£¡£¡£¡£½øÒ»²½£¬£¬£¬Ð§ÀÍÆ÷ÏÂÔØÎ±×°³ÉÕýµ±PostgreSQLÀú³ÌµÄGolang¶þ½øÖÆÎļþ£¬£¬£¬Æäͨ¹ý½¨Éè¸ßȨÏÞÓû§¡¢ÉèÖÃcron³¤ÆÚ»¯Ê¹Ãü£¬£¬£¬ÖÕ´ÓGitHubÏÂÔØ×îаæXMRigÍÚ¿ó³ÌÐò£¬£¬£¬Ê¹ÓÃLinuxÎÞÎļþÊÖÒÕÆô¶¯ÍÚ¿óÀú³Ì¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¹¥»÷ÕßΪÿ¸öÊܺ¦Õß·ÖÅÉ×ÔÁ¦Ç®°üµØµã£¬£¬£¬WizÒÑʶ±ðÈý¸ö¹ØÁªÇ®°ü£¬£¬£¬Ã¿¸öÇ®°ü¹ØÁªÔ¼550¸öÍÚ¿ó½Úµã£¬£¬£¬×ܼÆÁè¼Ý1,500̨װ±¸±»Ñ¬È¾¡£¡£¡£¡£¡£
https://thehackernews.com/2025/04/over-1500-postgresql-servers.html
3. Palo Alto Global ProtectɨÃèÀ˳±ÖÐÉæ¼°½ü24,000¸öIP
4ÔÂ1ÈÕ£¬£¬£¬Õë¶ÔPalo Alto Networks GlobalProtectµÇ¼ÃÅ»§µÄÍøÂçɨÃè»î¶¯½üÆÚÏÔÖøÉý¼¶£¬£¬£¬Òý·¢Çå¾²Ñо¿Ö°Ô±¶ÔDZÔÚ¹¥»÷µÄÔ¤¾¯¡£¡£¡£¡£¡£ÍþвÇ鱨¹«Ë¾GreyNoise¼à²âÊý¾ÝÏÔʾ£¬£¬£¬¸ÃɨÃè»î¶¯Éæ¼°Áè¼Ý24,000¸öΨһԴIPµØµã£¬£¬£¬ÓÚ2025Äê3ÔÂ17ÈÕµÖ´ïÖðÈÕ20,000¸öΨһIPµÄ·åÖµ£¬£¬£¬²¢Ò»Á¬ÖÁ3ÔÂ26ÈÕ¡£¡£¡£¡£¡£IPµØµãÖУ¬£¬£¬23,800¸ö±»±ê¼ÇΪ"¿ÉÒÉ"£¬£¬£¬154¸ö±»È·ÒÔΪ"¶ñÒâ"£¬£¬£¬Í¹ÏԻÒì³£ÐÔ¡£¡£¡£¡£¡£É¨ÃèȪԴÖ÷Òª¼¯ÖÐÔÚ±±ÃÀ£¬£¬£¬Ä¿µÄϵͳËäÒÔÃÀ¹úΪÖ÷£¬£¬£¬µ«·ºÆðÈ«Çò»¯ÌØÕ÷¡£¡£¡£¡£¡£GreyNoiseÖ¸³ö£¬£¬£¬´ËÀàɨÃ輤Ôö³£ÓëÎó²îʹÓÃǰµÄÕì̽Ðж¯Ïà¹Ø£¬£¬£¬ÀúʷģʽÏÔʾ£¬£¬£¬É¨Ãèá¯Áëºó2-4ÖÜ¿ÉÄÜ·ºÆðÐÂÎó²îÅû¶»ò¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬´Ë´Î»î¶¯ÓëÁíÒ»ÏîÉæ¼°PAN-OSÅÀ³æµÄɨÃè±£´æÊ±¼ä¹ØÁªÐÔ£¬£¬£¬ºóÕßÔÚ3ÔÂ26ÈÕͬ²½µÖ´ï2,580¸öIPµÄɨÃè·åÖµ¡£¡£¡£¡£¡£Ä¿½ñ£¬£¬£¬¹¥»÷ÕßµÄÏêϸĿµÄºÍÄîÍ·Éв»Ã÷È·£¬£¬£¬µ«Õë¶Ô̻¶ÔÚ»¥ÁªÍøµÄPalo Alto Networksϵͳ£¬£¬£¬ÖÎÀíÔ±ÐèÌá¸ßСÐÄ¡£¡£¡£¡£¡£GreyNoise½¨ÒéÁ¬Ã¦Éó²é3ÔÂÖÐÑ®ÒÔÀ´µÄϵͳÈÕÖ¾£¬£¬£¬ÅŲéÈëÇÖ¼£Ï󣬣¬£¬Ç¿»¯µÇ¼ÃÅ»§Çå¾²·À»¤£¬£¬£¬²¢·â±ÕÒÑÖª¶ñÒâIP¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/nearly-24-000-ips-behind-wave-of-palo-alto-global-protect-scans/
4. CrushFTP CVE-2025-2825Îó²îÕýÔÚ±»Ê¹ÓþÙÐй¥»÷
4ÔÂ1ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬¹¥»÷ÕßÕýÆð¾¢Ê¹ÓùûÕæµÄ¿´·¨ÑéÖ¤´úÂ루PoC£©¶ÔCrushFTPÎļþ´«ÊäÈí¼þÖеÄÒ»¸ö¸ßΣÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2025-2825£©ÊµÑé¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÓÉOutpost24±¨¸æ£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÎÞÐèÈÏÖ¤¼´¿É»á¼ûδÐÞ²¹µÄCrushFTP v10»òv11×°±¸¡£¡£¡£¡£¡£CrushFTPÔÚ3ÔÂ21ÈÕ½ôÆÈÐû²¼²¹¶¡Ê±Ç¿µ÷£¬£¬£¬Ì»Â¶µÄHTTP(S)¶Ë¿Ú¿ÉÄÜÖ±½Óµ¼ÖÂδÊÚȨ»á¼û£¬£¬£¬²¢½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁ10.8.4»ò11.3.1ÒÔÉϰ汾¡£¡£¡£¡£¡£×÷ΪÔÝʱ·À»¤²½·¥£¬£¬£¬ÖÎÀíÔ±¿ÉÆôÓÃDMZÍâÎ§ÍøÂçÑ¡ÏîÔöÇ¿·À»¤¡£¡£¡£¡£¡£Ò»Öܺ󣬣¬£¬Shadowserver¼à²âÊý¾ÝÏÔʾ£¬£¬£¬ÆäÃÛ¹ÞϵͳÒѼì²âµ½ÊýÊ®´ÎÕë¶Ô̻¶ÔÚ»¥ÁªÍøµÄCrushFTPЧÀÍÆ÷µÄ¹¥»÷ʵÑ飬£¬£¬ÆäʱÈÔÓÐÁè¼Ý1,500¸öδÐÞ²¹ÊµÀý´¦ÓÚΣº¦ÖС£¡£¡£¡£¡£´Ë´ÎÎó²îµÄ¹ûÕæPoCÓÉProjectDiscoveryÓÚÎó²îÅû¶ǰÊýÈÕÐû²¼£¬£¬£¬¼ÓËÙÁ˹¥»÷ÕßµÄʹÓÃÀú³Ì¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬CrushFTPºã¾ÃλÁÐÀÕË÷Èí¼þÍŻÈçClop£©µÄ¸ß¼ÛֵĿµÄÃûµ¥£¬£¬£¬´ËÇ°ÔøÔâÓö¶à´ÎÁãÈÕÎó²î¹¥»÷£¬£¬£¬°üÀ¨2024Äê4ÔÂÐÞ²¹µÄCVE-2024-4040Îó²î£¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÌÓÒÝÐéÄâÎļþϵͳ²¢ÇÔȡϵͳÎļþ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-auth-bypass-bug-in-crushftp-now-exploited-in-attacks/
5. VitenasÕûÐÎÍâ¿Æ»¼ÕßÊý¾ÝÔâºÚ¿ÍÈëÇÖ²¢Ð¹Â¶
4ÔÂ1ÈÕ£¬£¬£¬ÃÀ¹úÐÝ˹¶Ù×ÅÃûÕûÐÎÍâ¿Æ»ú¹¹VitenasÕûÐÎÍâ¿ÆÔâÓöÖØ´óÍøÂç¹¥»÷£¬£¬£¬µ¼Ö´ó×ÚÃô¸Ð»¼ÕßÊý¾Ýй¶¡£¡£¡£¡£¡£¸Ã»ú¹¹ÓÉÍâ¿ÆÒ½Ê¦Ñ§»áԺʿPaul Vitenas, Jr.½¨É裬£¬£¬ÆìϰüÀ¨Mirror Mirror Beauty Boutique¼°µÂ¿ËÈøË¹ÖÝÐÝ˹¶ÙÍâ¿ÆÖÐÐÄ¡£¡£¡£¡£¡£3ÔÂ5ÈÕ£¬£¬£¬Íþв×éÖ¯KairosÔÚÆä°µÍøÐ¹ÃÜÕ¾µã¹ûÕæÐû³ÆÒÑÈëÇÖVitenas²©Ê¿¹ÙÍø£¬£¬£¬²¢Õ¹Ê¾Î´¾±à¼µÄ1.34GBй¶Îļþ¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨Î´¼ÓÃܵÄÊܱ£»£»£»£»£»£»£»¤¿µ½¡ÐÅÏ¢£¨PHI£©£¬£¬£¬Éæ¼°»¼ÕßÂãÕÕ¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÁªÏµ·½·¨¡¢Éç±£ºÅ¡¢¼ÝÕÕÕÕÆ¬µÈÃô¸ÐÐÅÏ¢£¬£¬£¬Í¬Ê±°üÀ¨Ô±¹¤ÐÅÏ¢¼°ÕïËùÔËÓªÎļþ¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý¶íÓïÂÛ̳¶µÊÛÊý¾Ý£¬£¬£¬ÊÔͼѰÕÒÂò¼Ò¡£¡£¡£¡£¡£Kairos×éÖ¯Éù³ÆÍ¨¹ý±©Á¦¹¥»÷ÓÚ2ÔÂÀÖ³ÉÈëÇÖϵͳ£¬£¬£¬ÇÒÕïËùIT²¿·ÖÒѲì¾õ¹¥»÷µ«Î´ÄÜ×èÖ¹Êý¾Ýй¶¡£¡£¡£¡£¡£¹¥»÷ÕßÌåÏÖÒÑÓëVitenas²©Ê¿¾ÙÐÐÔ¼Ò»¸öÔµÄ̸ÅУ¬£¬£¬ÍþвÈôÎÞ·¨¾¡¿ìÕÒµ½Êý¾ÝÂò¼Ò£¬£¬£¬½«¹ûÕæ×îÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£
https://databreaches.net/2025/04/01/vitenas-cosmetic-surgery-patient-data-hacked-and-leaked/
6. Å·ÖÞЧÀÍÆ½Ì¨Yoojoй¶ÍòÍòÃô¸ÐÎļþ
4ÔÂ1ÈÕ£¬£¬£¬Å·ÖÞЧÀÍÊг¡Æ½Ì¨YoojoÒòÔÆ´æ´¢Í°ÉèÖùýʧ£¬£¬£¬µ¼Ö³¬1450Íò·ÝÃô¸ÐÎļþ̻¶£¬£¬£¬º¸ÇÓû§»¤ÕÕ¡¢Í¨Ñ¶¼Í¼¡¢µç»°ºÅÂëµÈ½¹µãÒþ˽Êý¾Ý¡£¡£¡£¡£¡£×÷ΪÅþÁ¬Ð¡ÎÒ˽¼ÒÓëЧÀÍÌṩÉ̵ÄÊ¢ÐÐÆ½Ì¨£¬£¬£¬Yoojo£¨Ç°ÉíΪYoupijobs£©ÔÚÓ¢·¨Î÷ºÉµÈ¶à¹úÔËÓª£¬£¬£¬ÆäÓ¦ÓÃÏÂÔØÁ¿³¬50Íò´Î£¬£¬£¬Ð§À͹æÄ£ÁýÕÖ¼ÒÕþ¡¢³èÎï¿´»¤µÈ¶àÁìÓò¡£¡£¡£¡£¡£´Ë´Îй¶µÄ´æ´¢Í°ÖÁÉÙ¹ûÕæ»á¼û´ï10Ì죬£¬£¬ËäÈ»ÔÝÎÞÀÄÓü£Ï󣬣¬£¬µ«Ñо¿Ö°Ô±ÖÒÑÔDZÔÚΣº¦ÏÔÖø£º¹¥»÷Õß¿ÉʹÓÃй¶µÄÉí·ÝÖ¤¼þʵÑéÉí·Ý͵ÇÔ£¬£¬£¬Í¨¹ýÕæÊµµç»°ºÅÂë¹¹½¨ÐéαЧÀÍÊշѳ¡¾°£¬£¬£¬ÉõÖÁÌᳫ¾«×¼ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£Ð¡ÎÒ˽¼ÒÐÅϢ̻¶»¹ÏÔÖøÔöÌíÓû§±»¸ú×ÙÀÕË÷µÄΣº¦¡£¡£¡£¡£¡£ÔÚÍøÂçÇå¾²ÍŶÓת´ïºó£¬£¬£¬YoojoÒÑÐÞ¸´ÉèÖÃÎó²î²¢Íê³ÉÊý¾Ý±£»£»£»£»£»£»£»¤¡£¡£¡£¡£¡£Îª×èÖ¹ÀàËÆÊÂÎñ£¬£¬£¬×¨¼Ò½¨Òé½ÓÄɶàÖØÇå¾²²½·¥£¬£¬£¬°üÀ¨Ç¿»¯»á¼û¿ØÖÆ¡¢ÆôÓüÓÃÜ´«ÊäÓë´æ´¢¡¢°²ÅÅÃÜÔ¿ÖÎÀíЧÀÍ¡¢ÊµÑéSSL/TLSÐÒ飬£¬£¬²¢ÔöÇ¿Çå¾²Éó¼ÆÓëÔ±¹¤Åàѵ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬´Ë´ÎÐ¹Â¶Éæ¼°´ó×ÚÕþ¸®Ç©·¢Ö¤¼þ¼°Óû§Í¨Ñ¶ÄÚÈÝ£¬£¬£¬ÆäÃô¸ÐˮƽԶ³¬Í¨Ë×Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£
https://cybernews.com/security/yoojo-data-leak-exposed-passports/