CISAÖÒÑÔFortiOSÑÏÖØRCEÎó²îÕý±»Æð¾¢Ê¹ÓÃ

Ðû²¼Ê±¼ä 2024-10-11

1. CISAÖÒÑÔFortiOSÑÏÖØRCEÎó²îÕý±»Æð¾¢Ê¹ÓÃ


10ÔÂ9ÈÕ £¬ £¬£¬£¬£¬CISA͸¶¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓÃÒ»¸öÑÏÖØµÄFortiOSÔ¶³Ì´úÂëÖ´ÐÐ(RCE)Îó²î£¨CVE-2024-23113£©¡£¡£¡£¡£¸ÃÎó²îÓÉfgfmdÊØ»¤Àú³Ì½ÓÊÜÍⲿ¿ØÖƵÄÃûÌÃ×Ö·û´®×÷Ϊ²ÎÊýÒýÆð £¬ £¬£¬£¬£¬Ê¹µÃδ¾­Éí·ÝÑéÖ¤µÄÍþвÐÐΪÕßÄܹ»ÔÚδÐÞ²¹µÄ×°±¸ÉÏÖ´ÐÐÏÂÁî»òí§Òâ´úÂë £¬ £¬£¬£¬£¬ÇÒÎÞÐèÓû§½»»¥¡£¡£¡£¡£´ËÎó²îÓ°ÏìFortiOS 7.0¼°ÒÔÉϰ汾¡¢FortiPAM 1.0¼°ÒÔÉϰ汾¡¢FortiProxy 7.0¼°ÒÔÉϰ汾ÒÔ¼°FortiWeb 7.4¡£¡£¡£¡£FortinetÒÑÓÚÖÙ´º·ÝÅû¶²¢ÐÞ²¹Á˸ÃÎó²î £¬ £¬£¬£¬£¬²¢½¨Òéɾ³ýËùÓнӿڶÔfgfmdÊØ»¤³ÌÐòµÄ»á¼ûȨÏÞ×÷Ϊ»º½â²½·¥¡£¡£¡£¡£È»¶ø £¬ £¬£¬£¬£¬CISAÒѽ«´ËÎó²îÌí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖÐ £¬ £¬£¬£¬£¬ÒªÇóÃÀ¹úÁª°î»ú¹¹ÔÚ10ÔÂ30ÈÕ֮ǰ± £»£»£»£»¤ÆäÍøÂçÉϵÄFortiOS×°±¸ÃâÊÜÕâЩÕýÔÚ¾ÙÐеĹ¥»÷¡£¡£¡£¡£ÍøÂçÇå¾²»ú¹¹ÖÒÑÔ³Æ £¬ £¬£¬£¬£¬´ËÀàÎó²îÊǶñÒâÍøÂçÐÐΪÕ߯µÈÔ¹¥»÷µÄǰÑÔ £¬ £¬£¬£¬£¬´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/


2. Ó¡¶ÈStar Health°ü¹Ü¹«Ë¾ÔâÍøÂç¹¥»÷ £¬ £¬£¬£¬£¬¿Í»§Êý¾ÝÒÉÔâй¶


10ÔÂ9ÈÕ £¬ £¬£¬£¬£¬Ó¡¶È×î´óµÄ¿µ½¡°ü¹Ü¹«Ë¾Ö®Ò»Star Health and Allied Insurance֤ʵÔâÊÜÁ˶ñÒâÍøÂç¹¥»÷ £¬ £¬£¬£¬£¬µ¼ÖÂijЩÊý¾Ý±»Î´¾­ÊÚȨºÍ²»·¨»á¼û £¬ £¬£¬£¬£¬µ«¹«Ë¾ÔËӪδÊÜÓ°Ïì £¬ £¬£¬£¬£¬Ð§ÀÍÈÔÔÚ¼ÌÐø¡£¡£¡£¡£Star HealthÌṩ¶àÖÖ°ü¹ÜЧÀÍ £¬ £¬£¬£¬£¬ÓµÓÐÁè¼Ý1.7ÒÚÒ½Áưü¹Ü¿Í»§¡£¡£¡£¡£´Ëǰ £¬ £¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÉù³ÆÔÚÍøÉÏÐû²¼Á˿ͻ§µÄ¿µ½¡¼Í¼ºÍÆäËûÃô¸ÐÊý¾Ý £¬ £¬£¬£¬£¬ºÚ¿Í×éÖ¯ÔÚTelegramÉϽ¨ÉèÁË̸Ìì»úеÈË £¬ £¬£¬£¬£¬Ð¹Â¶ÁË3100ÍòͶ±£È˺ÍÁè¼Ý580Íò·Ý°ü¹ÜË÷ÅâµÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£Star HealthÒÑÌáÆðËßËÏ¿ØËßTelegramºÍCloudflare £¬ £¬£¬£¬£¬²¢Ö¸³öÆäÊ×ϯÐÅÏ¢Çå¾²¹ÙÒ»Ö±ÔÚÆð¾¢ÅäºÏÊÓ²ì £¬ £¬£¬£¬£¬Î´·¢Ã÷ÆäÓÐÈκβ»µ±ÐÐΪ¡£¡£¡£¡£´Ë´ÎÈëÇÖµÄϸ½ÚºÍºÚ¿ÍÔõÑù»ñÈ¡Êý¾ÝÈÔ²»ÇåÎú £¬ £¬£¬£¬£¬°ü¹Ü¹«Ë¾Î´Í¸Â¶ÊÇ·ñ¿ÉÒÔÈ·ÈÏË­»á¼ûÁËÊý¾ÝÒÔ¼°ÄÄЩÊý¾ÝÒѱ»»á¼û»òÇÔÈ¡¡£¡£¡£¡£


https://techcrunch.com/2024/10/09/indias-star-health-confirms-data-breach-after-cybercriminals-post-customers-health-data-online/


3. ³¯ÏÊÍþвÕßÕë¶Ô¿Æ¼¼ÇóÖ°ÕßÍÆ¹ã¶ñÒâÈí¼þ


10ÔÂ9ÈÕ £¬ £¬£¬£¬£¬Ó볯ÏÊÓÐÁªÏµµÄÍþвÐÐΪÕß½«Ä¿µÄËø¶¨ÔڿƼ¼ÐÐÒµµÄÇóÖ°ÕßÉíÉÏ £¬ £¬£¬£¬£¬Í¨¹ýÇóְƽ̨ÁªÏµÈí¼þ¿ª·¢Ö°Ô± £¬ £¬£¬£¬£¬Ã°³äDZÔÚ¹ÍÖ÷Ô¼ÇëËûÃǼÓÈëÔÚÏßÃæÊÔ £¬ £¬£¬£¬£¬²¢ÊÔͼ˵·þËûÃÇÏÂÔØ²¢×°ÖöñÒâÈí¼þ £¬ £¬£¬£¬£¬ÕâÊÇÃûΪ¡°Ñ¬È¾ÐÔ·Ã̸¡±µÄ»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£¸Ã»î¶¯¼¯Èº±»×·×ÙΪCL-STA-0240 £¬ £¬£¬£¬£¬Éæ¼°ÒÑÖª¶ñÒâÈí¼þ¼Ò×åBeaverTailºÍInvisibleFerretµÄ¸üа汾¡£¡£¡£¡£µÚÒ»½×¶ÎÑ¬È¾Éæ¼°BeaverTailÏÂÔØ³ÌÐòºÍÐÅÏ¢ÇÔÈ¡³ÌÐò £¬ £¬£¬£¬£¬¸Ã³ÌÐòרΪWindowsºÍApple macOSƽ̨Éè¼Æ £¬ £¬£¬£¬£¬³äµ±»ùÓÚPythonµÄInvisibleFerretºóÃŵĹܵÀ¡£¡£¡£¡£Ö»¹Ü¸Ã»î¶¯Òѱ»¹ûÕæÅû¶ £¬ £¬£¬£¬£¬µ«ÈÔÓÐÖ¤¾ÝÅú×¢ËüÈÔÈ»»îÔ¾¡£¡£¡£¡£Çå¾²Ñо¿Ô±ºÍÍøÂçÇå¾²¹«Ë¾ÏêϸÐÎòÁËʹÓüÙÊÓÆµ¾Û»áÓ¦ÓóÌÐòMiroTalkºÍFreeConference.comÉøÍ¸µ½¿ª·¢Ö°Ô±ÏµÍ³ÖеĹ¥»÷Á´¡£¡£¡£¡£BeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡ä¯ÀÀÆ÷ÃÜÂë¡¢´Ó¶à¸ö¼ÓÃÜÇ®±ÒÇ®°üÖÐÍøÂçÊý¾Ý £¬ £¬£¬£¬£¬²¢ÏÂÔØ²¢Ö´ÐÐInvisibleFerretºóÃÅ £¬ £¬£¬£¬£¬¸ÃºóÃŰüÀ¨Ö¸ÎÆÊ¶±ð¡¢Ô¶³Ì¿ØÖÆ¡¢¼üÅ̼ͼ¡¢Êý¾Ýй¶µÈ¹¦Ð§¡£¡£¡£¡£Unit 42ÌåÏÖ £¬ £¬£¬£¬£¬Õâ´Î»î¶¯¿ÉÄܳöÓÚ¾­¼ÃÄîÍ· £¬ £¬£¬£¬£¬ÓÉÓÚBeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡13¸ö²î±ðµÄ¼ÓÃÜÇ®±ÒÇ®°ü £¬ £¬£¬£¬£¬³¯ÏÊÍþвÕß»á¾ÙÐнðÈÚ·¸·¨ÒԳO×ʽðÀ´Ö§³Ö³¯ÏÊÕþȨ¡£¡£¡£¡£


https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html


4. ºÚ¿ÍÉù³Æ¹¥»÷Dr.WebÇÔÈ¡10TBÊý¾Ý £¬ £¬£¬£¬£¬Òý·¢ÍøÂçÇå¾²ÐÐÒµµ£ÐÄ


10ÔÂ9ÈÕ £¬ £¬£¬£¬£¬¾ÝCyber Security News±¨µÀ £¬ £¬£¬£¬£¬Ò»ÃûºÚ¿ÍÔÚºÚ¿ÍÂÛ̳DumpForumsÉÏÉù³Æ¶Ô¶íÂÞË¹ÖøÃûÍøÂçÇå¾²¹«Ë¾Dr.Web¾ÙÐÐÁ˹¥»÷ £¬ £¬£¬£¬£¬²¢ÇÔÈ¡Á˸ߴï10TBµÄÊý¾Ý¡£¡£¡£¡£ºÚ¿ÍÉù³Æ´Ë´Î¹¥»÷¾­ÓÉÈ«ÐIJ߻® £¬ £¬£¬£¬£¬ÀúʱÊýÌì £¬ £¬£¬£¬£¬ÀÖ³ÉÉøÍ¸µ½Dr.WebµÄÍâµØÍøÂç £¬ £¬£¬£¬£¬²¢Öð²½ÈëÇÖÆäЧÀÍÆ÷ºÍ×ÊÔ´ £¬ £¬£¬£¬£¬ÉõÖÁÉøÍ¸µ½ÁËÆä×îÇå¾²µÄ»ù´¡ÉèÊ©²¿·Ö¡£¡£¡£¡£ºÚ¿Í»¹Éù³Æ´ÓGitLabЧÀÍÆ÷¡¢¹«Ë¾ÓʼþЧÀÍÆ÷¡¢Confluence¡¢Redmine¡¢Jenkins¡¢Mantisϵͳ¡¢RocketChatͨѶƽ̨µÈ¶à¸öÒªº¦ÏµÍ³ÖÐÆÆ½â²¢Ð¹Â¶ÁËÊý¾Ý £¬ £¬£¬£¬£¬²¢ÔÚÒ»¸öÔÂÄÚδ±»·¢Ã÷µÄÇéÐÎÏ»á¼û²¢ÉÏ´«Á˿ͻ§¶ËÊý¾Ý¿â £¬ £¬£¬£¬£¬¿ÉÄÜ̻¶ÁËDr.WebÓû§µÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£È»¶ø £¬ £¬£¬£¬£¬Dr.Web¹Ù·½ÉùÃ÷³Æ £¬ £¬£¬£¬£¬Ö»¹ÜÆäϵͳ×ÊÔ´ÔâÊÜÁËÓÐÕë¶ÔÐԵĹ¥»÷ £¬ £¬£¬£¬£¬µ«ÒÑÀֳɴì°ÜÁËÆÆËðÆä»ù´¡ÉèÊ©µÄÍýÏë £¬ £¬£¬£¬£¬Óû§¶Ë²úƷδÊÜÓ°Ïì¡£¡£¡£¡£ÎªÔ¤·ÀÆð¼û £¬ £¬£¬£¬£¬Dr.WebÒѶϿªËùÓÐ×ÊÔ´ÓëÍøÂçµÄÅþÁ¬¾ÙÐÐÑéÖ¤ £¬ £¬£¬£¬£¬²¢ÔÝÍ£Á˲¡¶¾¿âµÄÐû²¼¡£¡£¡£¡£Èô´Ëй¶ÐÐΪ»ñµÃ֤ʵ £¬ £¬£¬£¬£¬½«¶ÔDr.WebÒÔÖÂÕû¸öÍøÂçÇå¾²ÐÐÒµÔì³ÉÖØ´ó¹¥»÷ £¬ £¬£¬£¬£¬²¢Òý·¢Óû§¶ÔÄ¿½ñ± £»£»£»£»¤²½·¥ÓÐÓÃÐÔµÄÖÊÒÉ¡£¡£¡£¡£


https://cybersecuritynews.com/dumpforums-10tb-data-dr-web/


5. AkiraºÍFogÀÕË÷Èí¼þʹÓÃÒªº¦µÄVeeam RCEÎó²î


10ÔÂ10ÈÕ £¬ £¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïʹÓÃVeeam Backup & Replication (VBR) ЧÀÍÆ÷ÉϵÄÒ»¸öÑÏÖØÇå¾²Îó²î£¨CVE-2024-40711£© £¬ £¬£¬£¬£¬ÊµÏÖÁËÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£¡£¸ÃÎó²îÓÉCode WhiteÇå¾²Ñо¿Ô±Florian Hauser·¢Ã÷ £¬ £¬£¬£¬£¬Ô´ÓÚ²»ÊÜÐÅÈÎÊý¾Ý·´ÐòÁл¯µÄÈõµã £¬ £¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒԽϵÍÖØÆ¯ºó·¢¶¯¹¥»÷¡£¡£¡£¡£VeeamÔÚ9ÔÂ4ÈÕÅû¶Á˸ÃÎó²î²¢Ðû²¼ÁËÇå¾²¸üР£¬ £¬£¬£¬£¬¶øwatchTowr LabsÔòÔÚ9ÔÂ9ÈÕÐû²¼ÊÖÒÕÆÊÎö £¬ £¬£¬£¬£¬µ«ÑÓ³ÙÖÁ9ÔÂ15ÈղŹûÕæ¿´·¨ÑéÖ¤Îó²î´úÂë £¬ £¬£¬£¬£¬ÒÔÈ·±£ÖÎÀíÔ±ÓÐ×㹻ʱ¼äÔöÇ¿·À»¤¡£¡£¡£¡£ÓÉÓÚVBRÈí¼þÆÕ±éÓÃÓÚÊý¾Ý± £»£»£»£»¤ºÍÔÖÄѻָ´ £¬ £¬£¬£¬£¬³ÉΪ¶ñÒâÐÐΪÕßêéêìµÄÄ¿µÄ¡£¡£¡£¡£Sophos X-OpsÊÂÎñÏìÓ¦Ö°Ô±·¢Ã÷ £¬ £¬£¬£¬£¬¸ÃÎó²îѸËÙ±»AkiraºÍFogÀÕË÷Èí¼þ¹¥»÷ʹÓà £¬ £¬£¬£¬£¬Á¬ÏµÖ®Ç°Ð¹Â¶µÄƾ֤ £¬ £¬£¬£¬£¬½«¡°µã¡±ÍâµØÕÊ»§Ìí¼Óµ½ÖÎÀíÔ±ºÍÔ¶³Ì×ÀÃæÓû§×é¡£¡£¡£¡£¹¥»÷Õßͨ³£Í¨¹ýδÆôÓöàÒòËØÉí·ÝÑéÖ¤µÄÊÜѬȾVPNÍø¹Ø»á¼ûÄ¿µÄ £¬ £¬£¬£¬£¬²¿·ÖVPNÔËÐв»ÊÜÖ§³ÖµÄÈí¼þ°æ±¾¡£¡£¡£¡£ÔÚFogÀÕË÷Èí¼þÊÂÎñÖÐ £¬ £¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃδ± £»£»£»£»¤µÄHyper-VЧÀÍÆ÷ºÍÊÊÓóÌÐòrcloneÇÔÈ¡Êý¾Ý¡£¡£¡£¡£ÕâЩ¹¥»÷ÏÔʾ³ö¸ß¶ÈµÄÖØµþÐÔºÍÏàËÆÐÔ £¬ £¬£¬£¬£¬Åú×¢ÀÕË÷Èí¼þÍÅ»ïÕýÆð¾¢Ê¹ÓÃÕâÒ»Îó²î¾ÙÐй¥»÷¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/akira-and-fog-ransomware-now-exploiting-critical-veeam-rce-flaw/


6. ¸»´ïͶ×ÊϵͳÔâÈëÇÖ £¬ £¬£¬£¬£¬77,000Ãû¿Í»§ÐÅϢй¶


10ÔÂ10ÈÕ £¬ £¬£¬£¬£¬×ܲ¿Î»ÓÚ²¨Ê¿¶ÙµÄ¿ç¹ú½ðÈÚЧÀ͹«Ë¾¸»´ïͶ×Ê £¬ £¬£¬£¬£¬½üÆÚÔâÓöÁËÒ»´ÎϵͳÈëÇÖÊÂÎñ £¬ £¬£¬£¬£¬µ¼ÖÂÁè¼Ý77,000Ãû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶¡£¡£¡£¡£×÷ΪȫÇò×î´óµÄ×ʲúÖÎÀí¹«Ë¾Ö®Ò» £¬ £¬£¬£¬£¬¸»´ïÖÎÀíµÄ×ʲú×ܶî¸ß´ï14.1ÍòÒÚÃÀÔª¡£¡£¡£¡£¾Ý¸»´ï͸¶ £¬ £¬£¬£¬£¬Õâ´ÎÈëÇÖ±¬·¢ÔÚ8ÔÂ17ÈÕÖÁ19ÈÕʱ´ú £¬ £¬£¬£¬£¬Ò»ÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßʹÓÃ×î½ü½¨ÉèµÄÁ½¸ö¿Í»§ÕË»§ÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£¡£¸»´ïÔÚ·¢Ã÷ÕâÒ»»î¶¯ºóѸËÙ½ÓÄɲ½·¥ÖÕÖ¹ÁË»á¼û £¬ £¬£¬£¬£¬²¢ÔÚÍⲿÇ徲ר¼ÒµÄЭÖúÏÂÕö¿ªÁËÊӲ졣¡£¡£¡£Ö»¹Ü¸»´ïûÓÐ͸¶³ýÁËÐÕÃûºÍÆäËûСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ÍâÉÐÓÐÄÄЩÐÅÏ¢±»ÇÔÈ¡ £¬ £¬£¬£¬£¬µ«ËüÒÑÏòÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËÁ½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¸»´ï»¹ÌåÏÖ £¬ £¬£¬£¬£¬Ã»ÓÐÖ¤¾ÝÅú×¢±»µÁµÄ¿Í»§Êý¾Ý±»ÀÄÓà £¬ £¬£¬£¬£¬µ«ÈÔ½¨ÒéÊÜÓ°ÏìµÄ¿Í»§¼á³ÖСÐÄ £¬ £¬£¬£¬£¬°´ÆÚ¼ì²éÕË»§±¨±í £¬ £¬£¬£¬£¬¼à¿ØÐÅÓñ¨¸æ £¬ £¬£¬£¬£¬²¢ÊµÊ±±¨¸æÈκοÉÒɻ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fidelity-investments-says-data-breach-affects-over-77-000-people/