NachoVPN·ì϶£º¶ñÒâVPN·þÎñÆ÷ÀûÓÃ佨²¹¿Í»§¶ËÖ´Ðй¥»÷

°ä²¼¹¦·ò 2024-11-27
1. NachoVPN·ì϶£º¶ñÒâVPN·þÎñÆ÷ÀûÓÃ佨²¹¿Í»§¶ËÖ´Ðй¥»÷


11ÔÂ26ÈÕ £¬Ò»×éÃûΪ¡°NachoVPN¡±µÄ·ì϶ÔÊÐí¶ñÒâVPN·þÎñÆ÷ÀûÓÃ佨²¹µÄPalo AltoºÍSonicWall SSL-VPN¿Í»§¶Ë½øÐй¥»÷ £¬Í¨¹ýÓÕÆ­Óû§ÏνÓÖÁ¹¥»÷Õß½ÚÔìµÄVPN·þÎñÆ÷ £¬½ø¶øÇÔÈ¡µÇ¼ʹ´¦¡¢Ö´ÐÐËÁÒâ´úÂë¡¢×°ÖöñÒâÈí¼þ»òÌáÒé´úÂëÊðÃûαÔì¼°ÖÐÑëÈ˹¥»÷¡£AmberWolf°²È«×êÑÐÈËÔ±·¢ÏÖÁËÕâÒ»Íþв £¬²¢ÔÚ·ì϶³õ´Î»ã±¨ºóÊýÔÂÄÚ £¬¼ûÖ¤ÁËSonicWallºÍPalo Alto NetworksÏà¼Ì°ä²¼Õë¶ÔCVE-2024-29014ºÍCVE-2024-5921·ì϶µÄ²¹¶¡¡£ÎªÁË·ÀÓù £¬SonicWall¿Í»§ÐèÉý¼¶ÖÁNetExtenderµÄÌØ¶¨°æ±¾ £¬¶øPalo Alto NetworksÔò½¨Òé×°Öøüа汾»òÔÚFIPS-CCģʽÏÂÔËÐÐVPN¿Í»§¶Ë¡£´Ë±í £¬AmberWolf»¹°ä²¼ÁËNachoVPN¿ªÔ´¹¤¾ß £¬¸Ã¹¤¾ßÄÜ·ÂÕÕ¶ñÒâVPN·þÎñÆ÷ £¬Ö§³Ö¶àÖÔìóÒµVPN²úÆ· £¬²¢¼¤ÀøÉçÇø¹±Ï×зì϶ÐÅÏ¢¡£Í¬Ê± £¬¸Ã¹«Ë¾»¹ÌṩÁËÓйØÕâÁ½¸ö·ì϶µÄ¸ü¶à¼¼Êõϸ½ÚºÍ·ÀÓù½¨Òé £¬ÒÔÔ®ÊÖÍøÂç·ÀÓùÕß± £»¤ÆäϵͳÃâÊÜDZÔÚ¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/new-nachovpn-attack-uses-rogue-vpn-servers-to-install-malicious-updates/


2. ¶íÂÞ˹ºÚ¿ÍRomComÀûÓÃFirefoxºÍTorÁãÈÕ·ì϶ÌáÒé¹¥»÷


11ÔÂ27ÈÕ £¬½üÆÚ¶íÂÞ˹ºÚ¿Í×éÖ¯RomComÀûÓÃÁËÁ½¸öÁãÈÕ·ì϶ £¬ÏòʹÓÃFirefox»òTorä¯ÀÀÆ÷µÄÓû§·¢ÉäÁ˶ñÒâ´úÂë¡£ÕâЩ·ì϶±ðÀëÓ°ÏìÁËMozillaÈí¼þºÍWindowsϵͳ £¬ÆäÖÐÒ»¸ö·ì϶£¨CVE-2024-9680£©Ê¹µÃ½Ó¼ûÊÜÏ°È¾ÍøÕ¾µÄÈκÎÈ˳ÇÊÐÎÞÒâʶµØÏÂÔØRomComºóÃÅ £¬¶øÎÞÐèÈκεã»÷¡£ÐÒÔ˵ÄÊÇ £¬ÕâÁ½¸ö·ì϶¶¼µÃµ½Á˼±¾ç½¨¸´ £¬MozillaÔÚÊÕµ½Í¨Öªºó25Ó×ʱÄھͽ¨²¹ÁËFirefoxÖеķì϶ £¬¶øWindowsÖеķì϶£¨CVE-2024-49039£©Ò²ÔÚºóÐøµÃµ½½¨¸´¡£RomComͨ¹ýÌØÔìÍøÕ¾´¥·¢·ì϶ £¬ÕâÐ©ÍøÕ¾·ÂÕÕÁËÕæÊµ×éÖ¯µÄÍøÕ¾ £¬Ô̺¬ConnectWise¡¢DevolutionsºÍCorrectivµÈ¡£¹ÌÈ»Torä¯ÀÀÆ÷Ò²»ùÓÚFirefox £¬µ«ESET×·×ÙµÄÊܺ¦ÕßÖÐûÓÐÒ»ÈËÊÇͨ¹ýTorÊܵ½¹¥»÷µÄ £¬¿ÉÄÜÊÇÓÉÓÚTorµÄijЩÉèÖÃÓëFirefox·ÖÆç¡£RomComµÄÖØÒªÖ¸±êËÆºõÊǹ«Ë¾ £¬¾ø´óÎÞÊýÊܺ¦ÕßλÓÚ±±ÃÀºÍÅ·ÖÞ £¬µ«ÐÂÎ÷À¼ºÍ·¨Êô¹çÑÇÄÇÒ²ÓÐÁãÉ¢Êܺ¦Õß¡£


https://www.darkreading.com/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor


3. RansomHub×éÖ¯Ðû³Æ¶ÔÁ½Êе±¾Ö·¢ÆðÀÕË÷¹¥»÷


11ÔÂ27ÈÕ £¬ÍøÂç·¸×ï×éÖ¯RansomHubÐû³Æ¶ÔµÂ¿ËÈøË¹ÖÝ¿ÆÅå¶ûÊм°Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»á·¢ÆðÁËÀÕË÷Èí¼þ¹¥»÷ £¬Òý·¢¿í·º¹Ø×¢¡£¿ÆÅå¶ûÊÐÔâ·ê¹¥»÷ºó £¬»¥ÁªÍø¡¢Í¼Êé¹Ý·þÎñ¡¢Ðí¿ÉºÍ²é³­Æ½Ì¨¼°Êз¨ÔºµÈ¶à¸öϵͳ̱»¾ £¬¸ø±¾µØ¾ÓÃñ´øÀ´ÑϳÁÀ§ÈÅ¡£Ö»¹ÜÊе±¾ÖÖÂÁ¦¸´Ô­ £¬µ«Ö±ÖÁ11ÔÂÏÂÑ® £¬²¿ÃÅÊÐÕþÔËÓª²ÅÂ½Ðø¸´Ô­¡£Í¬Ê± £¬Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»áÒ²»ã±¨Æä¼¼ÊõϵͳÔâµ½¹¥»÷ £¬µç»°Ïß·ÖжÏ £¬ÔÚÖÂÁ¦È·¶¨ÐÅϢй¶Çé¿ö¡£RansomHub½ñÄêѸËÙáÈÆð £¬ÒѶԻú³¡¡¢Ò½ÁÆ»ú¹¹¡¢Ôì×÷¹«Ë¾ºÍ¹Ø¼ü»ù´¡ÉèÊ©µÈÊý°Ù¸ö×éÖ¯·¢Æð¹¥»÷¡£×Ô2Ô·ÝÒÔÀ´ £¬ÒÑÓÐÔ¼210¸ö×éÖ¯³ÉΪÆäÊܺ¦Õß¡£¸Ã×éÖ¯×î³õ³Ê´Ë¿Ì½áºÏ½¡È«¼¯ÍÅÔâ·êÀÕË÷Èí¼þ¹¥»÷ºó £¬ËæºóÒòÁíÒ»ÀÕË÷Èí¼þÍŻﵹ¹Ø¶ø×³´ó £¬¶ÔÊý¾Ý½øÐÐÏúÊÛ¡£½ñÄê £¬RansomHub»¹¹¥»÷Á˶àÆð±¸ÊÜÖõÖ÷ÕÅÖ¸±ê £¬Ô̺¬µçОÞÍ·Frontier¡¢Rite Aid¡¢Ó¢¹úÅÄÂôÐÐChristie¡¯sµÈ¡£


https://therecord.media/ransomhub-cybercrime-coppell-texas-minneapolis-parks-agency


4. ÈûÂ׸ǵÙÐж¯£º·ÇÖÞ·¨ÂÉ»ú¹¹Ñϸñ½ø¹¥ÍøÂç·¸×ï


11ÔÂ26ÈÕ £¬·ÇÖÞ·¨ÂÉ»ú¹¹ÔÚ¹ú¼ÊÐ̾¯×éÖ¯ºÍ·ÇÖÞÐ̾¯×éÖ¯µÄЭµ÷Ï £¬ÓÚ9ÔÂ2ÈÕÖÁ10ÔÂ31ÈÕÆÚ¼ä·¢Õ¹ÁËÃûΪ¡°ÈûÂ׸ǵÙÐж¯¡±µÄ½ø¹¥ÍøÂç·¸×ï»î¶¯¡£Õâ´ÎÐж¯Õë¶ÔÀÕË÷Èí¼þ¡¢Ã³Ò×µç×ÓÓʼþй¶¡¢Êý×ÖÀÕË÷ºÍÍøÂçÚ¿Æ­µÈ·¸×ï״Ϊ £¬Éæ¼°19¸ö·ÇÖÞ¹ú¶È £¬¹²¿ÛÁôÁË1006ÃûÏÓÒÉÈË £¬·ÛËéÁË134089¸ö¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç¡£¾Ýµ÷²é £¬ÕâЩ·¸×ï»î¶¯ÓëÖÁÉÙ35224ÃûÒÑÈ·ÈÏÉí·ÝµÄÊܺ¦ÕßÓйØ £¬Ôì³ÉÁ˽ü1.93ÒÚÃÀÔªµÄ¾­¼ÃËðʧ £¬ÆäÖÐÈûÂ׸ǵÙÐж¯×·»ØÁËԼĪ4400ÍòÃÀÔª¡£Ðж¯ÖеÄÁÁµãÔ̺¬¿ÏÄáÑÇÆÆ»ñÒ»Â·ÍøÉÏÐÅÓþ¿¨Ú¿Æ­°¸ £¬ÈûÄÚ¼Ó¶ûµ·»Ùһ·ÅÓÊÏȦÌ× £¬ÄáÈÕÀûÑÇ¿ÛÁôÒ»ÃûÖ´ÐÐÍøÉÏͶ×ÊÚ¿Æ­µÄÄÐ×Ó £¬¿¦ÂóÂ¡ÆÆ»ñ¶àµµ´ÎÓªÏúȦÌ× £¬ÒÔ¼°°²¸çÀ­µ·»ÙÒ»¸öÐé¹¹¶Ä³¡¹ú¼Ê¼¯ÍÅ¡£²Î¼ÓÕâ´ÎÐж¯µÄ¹ú¶È»¹Óа¢¶û¼°ÀûÑÇ¡¢±´Äþ¡¢¿ÆÌصÏÍß¡¢¸Õ¹ûÃñÖ÷¹²ºÍ¹ú¡¢¼ÓÅî¡¢¼ÓÄÉ¡¢Ã«ÀïÇó˹¡¢ÄªÉ£±È¿Ë¡¢Â¬Íú´ï¡¢ÄÏ·Ç¡¢Ì¹É£ÄáÑÇ¡¢Í»Äá˹¡¢ÔÞ±ÈÑǺͽò°Í²¼Î¤¡£


https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/


5. Matrix·¢Æð´ó¹æÄ£DDoS¹¥»÷ £¬ÀûÓÃÎïÁªÍøºÍÆóÒµ·ì϶


11ÔÂ26ÈÕ £¬°²È«×êÑÐÈËÔ±·¢ÏÖÁËÒ»³¡ÓÉÃûΪMatrixµÄÍþвÐÐΪÕ߲߶¯µÄ´ó¹æÄ£É¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷»î¶¯ £¬¸Ã»î¶¯ÀûÓÿɽӼûµÄ¹¤¾ßÕë¶ÔÎïÁªÍøÉ豸ºÍÆóÒµ·þÎñÆ÷¡£MatrixµÄ¹¥»÷¿ò¼Ü¾­¹ý¾ßÌå·ÖÎö £¬ÖØÒªÀûÓû¥ÁªÍøÏνÓÉ豸Éϵķì϶ºÍÃýÎóÅäÖà £¬Í¨¹ý±©Á¦¹¥»÷¡¢Èõƾ֤ºÍÒÑÖª·ì϶¹¹½¨½©Ê¬ÍøÂç¡£¹¥»÷µÄÖØÒªÌØµãÔ̺¬Õë¶Ô·ÓÉÆ÷¡¢DVRºÍIPÉãÏñ»ú¡¢ÆóÒµºÍ̸ºÍÎïÁªÍøÉ豸µÄ·ì϶ÀûÓá£ÕâЩ¹¥»÷ÑϳÁÒÀÀµÄ¬ÈÏ»òÈõÃÜÂë £¬Ç¿µ÷ÁËδÄܲÉÈ¡¸ù»ù°²È«´ëÊ©»áʹÉè±¸Ãæ¶ÔÈëÇֵķçÏÕ¡£MatrixµÄÖ¸±êÔ̺¬ÔÆ·þÎñÌṩÉÌ¡¢Ó×ÐÍÆóÒµºÍÎïÁªÍøÃܼ¯µØÓò £¬ÊÜÓ°ÏìµÄÉ豸¿ÉÄܶà´ï3500Íǫ̀¡£MatrixʹÓÃÁËÀ´×ÔGitHubµÈƽ̨µÄ¾ç±¾ºÍ¹¤¾ß £¬²¢Í¨¹ýTelegram½«·þÎñÇ®±Ò»¯ £¬ÌṩDDoS¹¥»÷´òËã¡£Ö»¹ÜMatrix²»×ãÏȽøÖ°ÄÜ £¬µ«ÕâЩ¹¤¾ßµÄ×é×°ºÍ²Ù×÷¶¼¼«¶ÈÈÝÒ× £¬ÏÔʾ³öµÍ¸´ÔÓˮƽ²Î¼ÓÕßËù´øÀ´µÄ·çÏÕÔ½À´Ô½´ó¡£


https://www.infosecurity-magazine.com/news/ddos-campaign-exploits-iot-devices/


6. Array Networks SSL VPN ²úÆ·Öеķì϶Õý±»»ý¼«ÀûÓÃ


11ÔÂ26ÈÕ £¬ÃÀ¹úÍøÂç·ÀÓù»ú¹¹CISAÊÕµ½Ö¤¾ÝÅú×¢ £¬ºÚ¿ÍÔÚ»ý¼«ÀûÓÃSSL VPN²úÆ·Array Networks AGºÍvxAG ArrayOSÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶ £¬¸Ã·ì϶±»×·×ÙΪCVE-2023-28461 £¬ÑϳÁÐÔÆÀ·Ö¸ß´ï9.8 £¬Òѱ»ÁÐÈëCISAµÄÒÑÖªÀûÓ÷ì϶Ŀ¼ÖС£´Ë·ì϶´æÔÚÓÚÒ×Êܹ¥»÷µÄURLÖÐ £¬ÊÇÒ»¸öÉí·ÝÑéÖ¤²»µ±ÎÊÌâ £¬ÔÊÐíÔÚArray AGϵÁкÍvxAG 9.4.0.481¼°¸üÔç°æ±¾ÖÐÖ´ÐÐÔ¶³Ì´úÂë¡£Array NetworksÔÚ·ì϶Åû¶һÖܺó°ä²¼Á˽¨¸´°æ±¾Array AG 9.4.0.484¡£Array NetworksµÄSSL VPN²úÆ·±»È«Çò³¬¹ý5000¸ö¿Í»§Ê¹Óà £¬Ô̺¬ÆóÒµ¡¢·þÎñÌṩÉ̺͵±¾Ö»ú¹¹¡£CISA½¨ÒéËùÓÐÁª¹ú»ú¹¹ºÍ¹Ø¼ü»ù´¡ÉèÊ©×éÖ¯ÔÚ12ÔÂ16ÈÕ֮ǰÀûÓð²È«¸üлò²ÉÈ¡»º½â´ëÊ© £¬²»È»Ó¦ÖÕ³¡Ê¹ÓøòúÆ·¡£°²È«¸üпÉͨ¹ýArrayÖ§³ÖÃÅ»§»ñÈ¡ £¬µ«¹©¸øÉÌÌṩµÄ»º½â´ëÊ©¿ÉÄÜ»á¶Ô¿Í»§¶Ë°²È«Ö°ÄܲúÉú¸ºÃæÓ°Ïì £¬Òò¶ø×éÖ¯Ó¦Ê×ÏȲâÊÔÆä³ÉЧ¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-bug-in-array-networks-ssl-vpn-products/