MTN¼¯ÍÅÔâÍøÂçÇå¾²ÊÂÎñÖÂÓû§ÐÅϢй¶

Ðû²¼Ê±¼ä 2025-04-27

1. MTN¼¯ÍÅÔâÍøÂçÇå¾²ÊÂÎñÖÂÓû§ÐÅϢй¶


4ÔÂ25ÈÕ£¬ £¬£¬·ÇÖÞÒÆ¶¯¾ÞÍ·MTN¼¯ÍÅ£¨Ç°ÉíΪM-Cell£©ÔâÓöÍøÂçÇå¾²ÊÂÎñ£¬ £¬£¬²¿·Ö¹ú¼ÒÓû§Ð¡ÎÒ˽¼ÒÐÅÏ¢Ôâй¶¡£¡£¡£ ¡£¡£¡£MTN¼¯ÍÅÊÇ·ÇÖÞ×î´óµÄÒÆ¶¯ÍøÂçÔËÓªÉÌ£¬ £¬£¬ÓªÒµÁýÕÖ20¸ö¹ú¼Ò£¬ £¬£¬ÓµÓнü3ÒÚÓû§£¬ £¬£¬ÄêÊÕÈ볬110ÒÚÃÀÔª£¬ £¬£¬ÇÒÔÚÑÇÖÞÊг¡Ó°ÏìÁ¦Ç¿Ê¢¡£¡£¡£ ¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬ £¬£¬MTN¼¯ÍÅÇ¿µ÷Æä½¹µãÍøÂç¡¢¼Æ·ÑϵͳºÍ½ðÈÚЧÀÍ»ù´¡ÉèʩδÊܹ¥»÷Ó°Ï죬 £¬£¬ÈÔÇå¾²ÇÒÖÜÈ«ÔËÐУ¬ £¬£¬µ«ÒÑ×ÅÊÖÊÓ²ìÒÔÃ÷È·ÊÂÎñ¼òÖ±ÇйæÄ£ºÍÓ°Ïì¡£¡£¡£ ¡£¡£¡£MTN¼¯ÍÅͨ¸æ³Æ£¬ £¬£¬ÓС°Î´ÖªµÚÈý·½¡±Éù³Æ»á¼ûÁ˹«Ë¾Êý¾Ý£¬ £¬£¬µ¼Ö²¿·ÖÊг¡²¿·Ö¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢±»Î´¾­ÊÚȨ»á¼û¡£¡£¡£ ¡£¡£¡£²»¹ý£¬ £¬£¬MTNµÄÊÓ²ìÉÐδ֤ʵ¿Í»§Ç®°üºÍÕË»§Êܵ½Ë𺦣¬ £¬£¬Ïêϸ̻¶ÐÅÏ¢Éв»Ã÷È·¡£¡£¡£ ¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬ £¬£¬MTN¼¯ÍÅѸËÙ½ÓÄÉÐж¯£¬ £¬£¬ÒÑ֪ͨÄϷǾ¯·½¼°Ïà¹Øî¿ÏµºÍÊý¾Ý±£»£»£»£»¤»ú¹¹Ð­ÖúÊӲ죬 £¬£¬²¢ÍýÏ뾡¿ì֪ͨÊÜÓ°ÏìµÄ¿Í»§¡£¡£¡£ ¡£¡£¡£Îª±£»£»£»£»¤¿Í»§ÃâÊܽøÒ»²½¹¥»÷£¬ £¬£¬MTN¼¯ÍÅÌá³öһϵÁн¨Ò飬 £¬£¬°üÀ¨ÉèÖÃڲƭ¾¯±¨¡¢¸üÐÂÓ¦ÓóÌÐò¡¢Ê¹ÓÃÇ¿ÃÜÂë¡¢×èÖ¹¿ÉÒÉÁ´½Ó²¢ÆôÓöàÒòËØÉí·ÝÑéÖ¤¡£¡£¡£ ¡£¡£¡£×èÖ¹ÏÖÔÚ£¬ £¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯¶Ô´ËÈÏÕæ¡£¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/mobile-provider-mtn-says-cyberattack-compromised-customer-data/


2. SAP NetWeaverÑÏÖØÎó²îCVE-2025-31324Õý±»Æð¾¢Ê¹ÓÃ


4ÔÂ26ÈÕ£¬ £¬£¬SAP NetWeaver Visual Composer±£´æÑÏÖØÎó²îCVE-2025-31324£¬ £¬£¬Ê¹ÏµÍ³ÃæÁÙÍêÈ«ÈëÇÖΣº¦¡£¡£¡£ ¡£¡£¡£Onapsis Threat Intelligence±¨¸æÏÔʾ£¬ £¬£¬¸ÃÎó²îÑÏÖØË®Æ½ÆÀ·ÖΪÂú·Ö10.0£¬ £¬£¬Ô´ÓÚϵͳȱÉÙÑéÖ¤Óû§È¨Ï޵ļì²éÇÒÕý±»Æð¾¢Ê¹Óᣡ£¡£ ¡£¡£¡£Ñо¿Åú×¢£¬ £¬£¬ÏÖÓÐSAP NetWeaverÓ¦ÓÃЧÀÍÆ÷JavaϵͳÖÐ50%µ½70%±£´æ´ËÎó²î¡£¡£¡£ ¡£¡£¡£¸ÃÎó²îÓÉReliaQuestÊ״μͼ£¬ £¬£¬±£´æÓÚdevelopmentserver SAP Visual ComposerµÄÌØ¶¨²¿·Ö£¬ £¬£¬¶øSAP Visual ComposerÊÇSAP NetWeaver 7.xxµÄ×é¼þ£¬ £¬£¬Ö¼ÔÚÎÞÐè´úÂ뽨ÉèÓªÒµ¹¤¾ß¡£¡£¡£ ¡£¡£¡£ÎÊÌâÔÚÓÚϵͳδ׼ȷÉó²é»á¼ûÔªÊý¾ÝÉÏ´«Æ÷¹¦Ð§µÄÓû§È¨ÏÞ£¬ £¬£¬È±·¦Êʵ±Éí·ÝÑéÖ¤ºÍÊÚȨ£¬ £¬£¬Ê¹Î´µÇÈÎÃü»§Ò²ÄÜ»á¼ûǿʢ¹¦Ð§¡£¡£¡£ ¡£¡£¡£4ÔÂ22ÈÕ£¬ £¬£¬ReliaQuestÔÚÒÑÐÞ²¹Ð§ÀÍÆ÷ÉÏ·¢Ã÷¿ÉÒɻ£¬ £¬£¬SAPͬÈÕÈÏ¿ÉÔÚJavaϵͳÖз¢Ã÷Òì³£Îļþ¡£¡£¡£ ¡£¡£¡£4ÔÂ24ÈÕ£¬ £¬£¬SAPÐû²¼³£¼ûÎÊÌâ½â´ðÎĵµ£¬ £¬£¬È·ÈÏÌØ¶¨Îļþ¼ÐÖÐÌØ¶¨À©Õ¹ÃûÎļþºÜ¿ÉÄÜÊǶñÒâÎļþ£¬ £¬£¬²¢ÕýʽÐû²¼¸ÃÎó²î£¬ £¬£¬Ö¸³öÆä»ù´¡Ôµ¹ÊÔ­ÓÉÊÇȱÉÙÊÚȨ¼ì²é£¬ £¬£¬µ¼ÖÂδ¾­ÊÚȨÓû§ÉÏ´«Î£ÏÕ¿ÉÖ´ÐÐÎļþ£¬ £¬£¬Ê¹Óú󽫴øÀ´ÏµÍ³½ÓÊÜÖØ´óΣº¦£¬ £¬£¬SAPÒÑÐû²¼NetWeaver´øÍâ½ôÆÈ¸üС£¡£¡£ ¡£¡£¡£


https://hackread.com/sap-netweaver-flaw-severity-hackers-deploy-web-shells/


3. Microsoft DefenderÎóÅÐÖ³¬1700·ÝÃô¸ÐÎļþ¹ûÕæ


4ÔÂ25ÈÕ£¬ £¬£¬¿ËÈÕ£¬ £¬£¬ÒòMicrosoft Defender·ºÆðÎóÅУ¬ £¬£¬µ¼ÖÂÁè¼Ý1700·ÝÃô¸ÐÎļþͨ¹ýANY.RUNƽ̨±»ÎÞÒâÖйûÕæ¹²Ïí¡£¡£¡£ ¡£¡£¡£ANY.RUN×÷Ϊ½»»¥Ê½ÔÚÏßɳÏ䣬 £¬£¬±¾ÒâÊÇÈÃÓû§ÔÚÊÜ¿ØÇéÐÎÖÐÆÊÎö¼ì²â¶ñÒâÈí¼þ£¬ £¬£¬µ«ÆäÃ÷È·ÖÒÑÔÃâ·ÑÍýÏëÓû§£¬ £¬£¬ÉÏ´«µ½¸Ãƽ̨µÄÎļþ¾ùΪ¹ûÕæ×´Ì¬¡£¡£¡£ ¡£¡£¡£ANY.RUNÔÚÉùÃ÷ÖÐÖ¸³ö£¬ £¬£¬·¢Ã÷´ó×ÚAdobe Acrobat CloudÁ´½Ó±»ÉÏ´«ÖÁɳºÐ£¬ £¬£¬¾­Ñо¿£¬ £¬£¬ÊÇMicrosoft Defender XDR¹ýʧµØ½«¡°acrobat[.]adobe[.]com/id/urn:aaid:sc:¡±±ê¼ÇΪ¶ñÒâÎļþ¡£¡£¡£ ¡£¡£¡£ÕâÒ»ÎóÅÐÖÂʹÃâ·ÑÍýÏëÓû§ÉÏ´«Á˰üÀ¨Êý°Ù¼Ò¹«Ë¾Ãô¸ÐÊý¾ÝµÄAdobeÎļþ£¬ £¬£¬ÓÃÓÚ¹ûÕæÄ£Ê½ÆÊÎö¡£¡£¡£ ¡£¡£¡£Ö»¹ÜANY.RUNËæºó½«ËùÓÐÏà¹ØÆÊÎöÉèΪ˽ÃÜ£¬ £¬£¬ÒÔ±ÜÃâ½øÒ»²½Ð¹Â¶£¬ £¬£¬µ«ÈÔÓÐÓû§×ÔÐйûÕæ·ÖÏíÉñÃØÎļþ¡£¡£¡£ ¡£¡£¡£ANY.RUNΪ´ËÖÒÑÔÓû§£¬ £¬£¬Ö´ÐÐÊÂÇéÏà¹ØÊ¹ÃüʱӦʹÓÃÉÌÒµÔÊÐíÖ¤£¬ £¬£¬ÒÔ°ü¹ÜÒþ˽ÓëºÏ¹æÐÔ¡£¡£¡£ ¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬ £¬£¬½öͨ¹ýANY.RUNƽ̨¾ÍÓг¬1700·Ý˽ÈËÃô¸ÐÎļþ±»¹ûÕæ¡£¡£¡£ ¡£¡£¡£ÆäËû¶ñÒâÈí¼þÆÊÎöƽ̨ÈçVirusTotalͬÑù±£´æÀàËÆÎ£º¦£¬ £¬£¬ÔÊÐíÓû§ÉÏ´«¿ÉÒÉÎļþ¿ÉÄܵ¼ÖÂÎļþÎÞÒâй¶¡£¡£¡£ ¡£¡£¡£


https://cybernews.com/security/anyrun-users-leak-sensitive-data-after-microsoft-defender-misfire/


4. Ç×¶íºÚ¿ÍNoName¶ÔµÂ¹ú·¢¶¯DDoS¹¥»÷


4ÔÂ25ÈÕ£¬ £¬£¬³öÓÚÕþÖÎÄîÍ·µÄÇ×¶íºÚ¿Í×éÖ¯Noname057(16)Õý¼Ó´ó¶ÔµÂ¹ú×éÖ¯µÄÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷Á¦¶È£¬ £¬£¬¸øµÂ¹ú¶àÁìÓò´øÀ´ÍøÂçÇå¾²Íþв¡£¡£¡£ ¡£¡£¡£¸Ã×éÖ¯Óë¶íÂÞ˹½áÃË£¬ £¬£¬Ðû³ÆÒѶԵ¹ú¶à¼ÒÖ÷Òª»ú¹¹ºÍÆóÒµÍøÕ¾·¢¶¯¹¥»÷£¬ £¬£¬Êܹ¥»÷¹¤¾ßº­¸Ç½ðÈÚ¡¢Å©Òµ¡¢ÖÆÔìÒµµÈ¶à¸öÐÐÒµ£¬ £¬£¬°üÀ¨µÂ¹ú´óÐ͹úÓÐÒøÐаͷ¥ÀûÑÇÖÝÒøÐС¢È«ÇòÐÔÆóÒµBayWa AG¡¢»ú³¡°à³µÖÆÔìÉÌCOBUS IndustriesÒÔ¼°ÂÁºÏ½ðÉú²úÉÌAluminium Rheinfelden AlloysµÈ£¬ £¬£¬»¹ÔÚTelegramÉÏÐû³ÆÕâЩ×éÖ¯ÍøÕ¾Òѱ»ÏÂÏß¡£¡£¡£ ¡£¡£¡£¾Ýgolem.de±¨µÀ£¬ £¬£¬Noname057(16)´Ë´ÎÇ¿»¯¶ÔµÂ¹¥»÷£¬ £¬£¬¿ÉÄÜÊǶԼ´½«ÉÏÈεĵ¹ú×ÜÀí¸¥ÀïµÂÀïÏ£¡¤Ã·¶û´ÄÍýÏëÏòÎÚ¿ËÀ¼Ìṩ½ðÅ£×ùѲº½µ¼µ¯µÄ»ØÓ¦¡£¡£¡£ ¡£¡£¡£ÍâµØÃ½Ìå½øÒ»²½Åû¶£¬ £¬£¬¸Ã×éÖ¯¹¥»÷¹æÄ£²»µ«ÏÞÓÚÆóÒµ£¬ £¬£¬»¹Éæ¼°ººÅµÍþ¡¢¶ÅÈû¶û¶à·ò¡¢À³±ÈÎý¡¢°ØÁÖ¡¢·¨À¼¿Ë¸£ºÍ¿ÆÂ¡µÈ¶à¸ö¶¼»áµÄÊÐÕþ¸®ÍøÕ¾£¬ £¬£¬²¢ÊÔͼ¶Ô¹«¹²Æû³µ¡¢µÂ¹úÉÌÒµÒøÐС¢Baywa¡¢Å·Ë¾ÀÊ¡¢µÂ¹úÖÐÑëÏàÖúÒøÐеȴóÐ͹«Ë¾ÍøÕ¾Ìᳫ¹¥»÷¡£¡£¡£ ¡£¡£¡£


https://cybernews.com/security/noname-launch-ddos-attacks-in-germany/


5. AnubisÀÕË÷ÍÅ»ïÐû³ÆÐ®ÖÆ7ÒÚ¿¨ÍаÍË«Íõ¶Ä³¡À¶Í¼


4ÔÂ24ÈÕ£¬ £¬£¬Ò»¸öÃûΪ¡°Anubis¡±µÄÀÕË÷Èí¼þÍÅ»ïÉù³ÆÐ®ÖÆÁ˺Ä×Ê7ÒÚÃÀÔªµÄ¿¨ÍаÍË«Íõ¶Ä³¡¶È¼Ù´åÀ¶Í¼£¬ £¬£¬ÈôÊÇÊôʵ£¬ £¬£¬ÆäÕÆÎÕµÄÐÅÏ¢¿ÉÄܱȶij¡ÖÆ×÷Õ߸üÏ꾡¡£¡£¡£ ¡£¡£¡£¸Ã¶È¼Ù´åλÓÚ±±¿¨ÂÞÀ´ÄÉÖݹúÍõɽ£¬ £¬£¬ÓÉ¿¨ÍаÍÓ¡µÚ°²²¿Â俪·¢£¬ £¬£¬2024Äê6ÔÂÆÆÍÁ¶¯¹¤£¬ £¬£¬Ô¤¼Æ2026Ä꿪·Å£¬ £¬£¬Í깤ºó½«Å䱸´ó×ÚÀÏ»¢»ú¡¢¶Ä×À¼°Âùݿͷ¿£¬ £¬£¬ÏÖÔÚÔÝʱÉèÊ©ÒÑÔËÓª¡£¡£¡£ ¡£¡£¡£4ÔÂ23ÈÕ£¬ £¬£¬AnubisÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû²¼Êê½ðÍþв£¬ £¬£¬³ÆÓµÓжij¡¸÷ÇøÓòÏêϸÀ¶Í¼£¬ £¬£¬°üÀ¨Ö÷Â¥²ã¡¢Í£³µ³¡¡¢ÂùݴóÂ¥¼°ºǫ́ÏÞÖÆÇøÓòµÈ£¬ £¬£¬»¹ÕÆÎÕЧÀÍÆ÷»ú·¿¡¢³ïÂë¿â¡¢ÏÞÖÆÊÕÖ§ÃÅ¡¢¼à¿ØÉãÏñÍ·¡¢Ô±¹¤ÉóѶÊÒ¼°ÊèÉ¢õè¾¶½á¹¹µÈÒªº¦ÐÅÏ¢£¬ £¬£¬ÕâЩÊý¾Ý¿°³Æ¶Ä³¡ÇÀ½ÙµÄ¡°È«Ì×¹¤¾ß¡±¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬ £¬£¬¸ÃÍŻﻹÉù³Æ»ñÈ¡Á˵ؼ®Êý¾Ý¡¢µØ¶¯ÎļþºÍÖ´·¨¼Í¼£¬ £¬£¬ÕâÎÞÒÉ»á¸ø±¾¾Í³äÂúÕþÖÎÕùÒéµÄ¿ª·¢ÏîÄ¿´øÀ´¸ü¶àƶÀ§¡£¡£¡£ ¡£¡£¡£ÊÂʵÉÏ£¬ £¬£¬ÔÚÀÕË÷Èí¼þÍÅ»ï½éÈëǰ£¬ £¬£¬¸ÃÏîÄ¿¾ÍÒÑÉîÏÝÕùÒé¡£¡£¡£ ¡£¡£¡£2022Ä꣬ £¬£¬¹ú¼ÒÓ¡µÚ°²²©²ÊίԱ»áÖ¸¿Ø²¿ÂäÎ¥¹æÔËÓª¶Ä³¡²¢Íþв·£¿ £¿£¿î£»£»£»£»2024Ä꣬ £¬£¬Ç°¿ª·¢ÏàÖúͬ°éÌáÆðËßËÏ£¬ £¬£¬Ö¸¿Ø²¿Âä²»·¨ÇÖÈë¼°¸Ä±äÍÁµØÓÃ;£»£»£»£»¶«²¿ÇÐÂÞ»ùÓ¡µÚ°²ÈËÒ²¶àÄêÀ´×èµ²¸ÃÏîÄ¿¡£¡£¡£ ¡£¡£¡£


https://cybernews.com/security/catawba-two-kings-casino-cyberattack/


6. ÐÂÐ͵çÁ¦¼ÄÉú³æ´¹ÂÚ¹¥»÷Ãé×¼ÄÜÔ´¹«Ë¾ºÍÖ÷ÒªÆ·ÅÆ


4ÔÂ26ÈÕ£¬ £¬£¬×Ô2024ÄêÆð£¬ £¬£¬Ò»³¡ÃûΪ¡°µçÁ¦¼ÄÉú³æ¡±µÄÖØ´óÍøÂç´¹ÂڻһÁ¬Õë¶ÔÈ«ÇòÄÜÔ´¾ÞÍ·¼°Ö÷ÒªÆ·ÅÆÕö¿ª¹¥»÷¡£¡£¡£ ¡£¡£¡£¸Ã»î¶¯Ö÷ҪʹÓÃÎ÷ÃÅ×ÓÄÜÔ´¡¢Ê©ÄÍµÂµçÆø¡¢·¨¹úµçÁ¦ÄÜÔ´¡¢ÀׯÕË÷¶û¹«Ë¾ºÍÉ­¿ÆÄÜÔ´µÈ×ÅÃûÄÜÔ´¹«Ë¾µÄÆ·ÅÆ£¬ £¬£¬Í¨¹ýͶ×ÊȦÌ×ÓëÐéαÊÂÇéʱ»úʵÑéÕ©Æ­¡£¡£¡£ ¡£¡£¡£¹¥»÷Õß¹¹½¨ÁËÓÉ150¶à¸ö»îÔ¾ÓòÃû×é³ÉµÄÖØ´óÍøÂ磬 £¬£¬Î±×°³ÉÕýµ±¹«Ë¾£¬ £¬£¬ÖصãÃé×¼ÃϼÓÀ­¹ú¡¢Äá²´¶ûºÍÓ¡¶ÈµÈÑÇÖÞ¹ú¼ÒµÄСÎÒ˽¼Ò¡£¡£¡£ ¡£¡£¡£Õ©Æ­·Ö×Óͨ¹ýÓÕÆ­ÐÔÍøÕ¾¡¢É罻ýÌåȺ×é¼°TelegramƵµÀµÈÇþµÀ½Ó´¥Êܺ¦Õߣ¬ £¬£¬²¢½ÓÄÉÓ¢Óï¡¢ÆÏÌÑÑÀÓï¡¢Î÷°àÑÀÓï¡¢Ó¡ÄáÓï¡¢°¢À­²®ÓïºÍÃϼÓÀ­ÓïµÈÍâµØ»¯ÄÚÈÝÌáÉýթƭЧ¹û¡£¡£¡£ ¡£¡£¡£Ñо¿ÏÔʾ£¬ £¬£¬ÍþвÐÐΪÕß½ÓÄÉ¡°¹ãÈöÍø¡±Õ½ÂÔ£¬ £¬£¬ÀÄÓöà¸öÆ·ÅÆÃû³Æ²¢°²ÅŶà¸öÍøÕ¾ÒÔÀ©´óÊܺ¦Õß¹æÄ£¡£¡£¡£ ¡£¡£¡£Æä»ù´¡ÉèÊ©ÆÊÎöÅú×¢£¬ £¬£¬¹¥»÷ÕßʹÓðüÀ¨¡°SE¡±£¨´ú±íÎ÷ÃÅ×ÓÄÜÔ´£©ºÍ¡°AMD¡±£¨´ú±í¸ß¼¶Î¢×°±¸£©µÈÒªº¦×ÖµÄÓòÃû£¬ £¬£¬Á¬Ïµ¶àÖÖÓòÃûºó׺½¨ÉèÓòÃûģʽ¡£¡£¡£ ¡£¡£¡£¸Ã»î¶¯Í¨¹ýÁ½ÖÖÉç»á¹¤³ÌѧҪÁìʵÑéÕ©Æ­£ºÍ¶×ÊÕ©Æ­±äÌåÖУ¬ £¬£¬Êܺ¦Õß±»ÐéαͶ×ÊÆ½Ì¨ÒԸ߻سê½ðÓ¦ÓÕ»ó£¬ £¬£¬ÕâЩƽ̨Éù³ÆÓÉ×ÅÃûÄÜÔ´¹«Ë¾Ö§³Ö£»£»£»£»ÇóÖ°Õ©Æ­±äÖÖÔòÒÔÐéα¾Íҵʱ»úΪÓÕ¶ü£¬ £¬£¬ÒªÇóӦƸÕßÌṩÃô¸ÐСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢¡£¡£¡£ ¡£¡£¡£


https://cybersecuritynews.com/new-power-parasites-phishing-attack/