NachoVPNÎó²î£º¶ñÒâVPNЧÀÍÆ÷ʹÓÃδÐÞ²¹¿Í»§¶ËʵÑé¹¥»÷

Ðû²¼Ê±¼ä 2024-11-27
1. NachoVPNÎó²î£º¶ñÒâVPNЧÀÍÆ÷ʹÓÃδÐÞ²¹¿Í»§¶ËʵÑé¹¥»÷


11ÔÂ26ÈÕ£¬£¬£¬ £¬Ò»×éÃûΪ¡°NachoVPN¡±µÄÎó²îÔÊÐí¶ñÒâVPNЧÀÍÆ÷ʹÓÃδÐÞ²¹µÄPalo AltoºÍSonicWall SSL-VPN¿Í»§¶Ë¾ÙÐй¥»÷£¬£¬£¬ £¬Í¨¹ýÓÕÆ­Óû§ÅþÁ¬ÖÁ¹¥»÷Õß¿ØÖƵÄVPNЧÀÍÆ÷£¬£¬£¬ £¬½ø¶øÇÔÈ¡µÇ¼ƾ֤¡¢Ö´ÐÐí§Òâ´úÂë¡¢×°ÖöñÒâÈí¼þ»òÌᳫ´úÂëÊðÃûαÔì¼°ÖÐÐÄÈ˹¥»÷¡£¡£¡£¡£¡£¡£¡£ ¡£AmberWolfÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÕâÒ»Íþв£¬£¬£¬ £¬²¢ÔÚÎó²îÊ״α¨¸æºóÊýÔÂÄÚ£¬£¬£¬ £¬¼ûÖ¤ÁËSonicWallºÍPalo Alto NetworksÏà¼ÌÐû²¼Õë¶ÔCVE-2024-29014ºÍCVE-2024-5921Îó²îµÄ²¹¶¡¡£¡£¡£¡£¡£¡£¡£ ¡£ÎªÁË·ÀÓù£¬£¬£¬ £¬SonicWall¿Í»§ÐèÉý¼¶ÖÁNetExtenderµÄÌØ¶¨°æ±¾£¬£¬£¬ £¬¶øPalo Alto NetworksÔò½¨Òé×°Öøüа汾»òÔÚFIPS-CCģʽÏÂÔËÐÐVPN¿Í»§¶Ë¡£¡£¡£¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬ £¬AmberWolf»¹Ðû²¼ÁËNachoVPN¿ªÔ´¹¤¾ß£¬£¬£¬ £¬¸Ã¹¤¾ßÄÜÄ£Äâ¶ñÒâVPNЧÀÍÆ÷£¬£¬£¬ £¬Ö§³Ö¶àÖÖÆóÒµVPN²úÆ·£¬£¬£¬ £¬²¢ÃãÀøÉçÇøÐ¢Ë³ÐÂÎó²îÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ ¡£Í¬Ê±£¬£¬£¬ £¬¸Ã¹«Ë¾»¹ÌṩÁËÓйØÕâÁ½¸öÎó²îµÄ¸ü¶àÊÖÒÕϸ½ÚºÍ·ÀÓù½¨Ò飬£¬£¬ £¬ÒÔ×ÊÖúÍøÂç·ÀÓùÕß±£»£»£»£»¤ÆäϵͳÃâÊÜDZÔÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/new-nachovpn-attack-uses-rogue-vpn-servers-to-install-malicious-updates/


2. ¶íÂÞ˹ºÚ¿ÍRomComʹÓÃFirefoxºÍTorÁãÈÕÎó²îÌᳫ¹¥»÷


11ÔÂ27ÈÕ£¬£¬£¬ £¬½üÆÚ¶íÂÞ˹ºÚ¿Í×éÖ¯RomComʹÓÃÁËÁ½¸öÁãÈÕÎó²î£¬£¬£¬ £¬ÏòʹÓÃFirefox»òTorä¯ÀÀÆ÷µÄÓû§·¢ÉäÁ˶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£ ¡£ÕâЩÎó²î»®·ÖÓ°ÏìÁËMozillaÈí¼þºÍWindowsϵͳ£¬£¬£¬ £¬ÆäÖÐÒ»¸öÎó²î£¨CVE-2024-9680£©Ê¹µÃ»á¼ûÊÜÑ¬È¾ÍøÕ¾µÄÈκÎÈ˶¼»áÎÞÒâʶµØÏÂÔØRomComºóÃÅ£¬£¬£¬ £¬¶øÎÞÐèÈκεã»÷¡£¡£¡£¡£¡£¡£¡£ ¡£ÐÒÔ˵ÄÊÇ£¬£¬£¬ £¬ÕâÁ½¸öÎó²î¶¼»ñµÃÁË¿ìËÙÐÞ¸´£¬£¬£¬ £¬MozillaÔÚÊÕµ½Í¨Öªºó25СʱÄÚ¾ÍÐÞ²¹ÁËFirefoxÖеÄÎó²î£¬£¬£¬ £¬¶øWindowsÖеÄÎó²î£¨CVE-2024-49039£©Ò²ÔÚºóÐø»ñµÃÐÞ¸´¡£¡£¡£¡£¡£¡£¡£ ¡£RomComͨ¹ýÌØÖÆÍøÕ¾´¥·¢Îó²î£¬£¬£¬ £¬ÕâÐ©ÍøÕ¾Ä£ÄâÁËÕæÊµ×éÖ¯µÄÍøÕ¾£¬£¬£¬ £¬°üÀ¨ConnectWise¡¢DevolutionsºÍCorrectivµÈ¡£¡£¡£¡£¡£¡£¡£ ¡£ËäÈ»Torä¯ÀÀÆ÷Ò²»ùÓÚFirefox£¬£¬£¬ £¬µ«ESET×·×ÙµÄÊܺ¦ÕßÖÐûÓÐÒ»ÈËÊÇͨ¹ýTorÊܵ½¹¥»÷µÄ£¬£¬£¬ £¬¿ÉÄÜÊÇÓÉÓÚTorµÄijЩÉèÖÃÓëFirefox²î±ð¡£¡£¡£¡£¡£¡£¡£ ¡£RomComµÄÖ÷ҪĿµÄËÆºõÊǹ«Ë¾£¬£¬£¬ £¬¾ø´ó´ó¶¼Êܺ¦ÕßλÓÚ±±ÃÀºÍÅ·ÖÞ£¬£¬£¬ £¬µ«ÐÂÎ÷À¼ºÍ·¨Êô¹çÑÇÄÇÒ²ÓÐÁãÐÇÊܺ¦Õß¡£¡£¡£¡£¡£¡£¡£ ¡£


https://www.darkreading.com/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor


3. RansomHub×éÖ¯Éù³Æ¶ÔÁ½ÊÐÕþ¸®·¢¶¯ÀÕË÷¹¥»÷


11ÔÂ27ÈÕ£¬£¬£¬ £¬ÍøÂç·¸·¨×éÖ¯RansomHubÉù³Æ¶ÔµÂ¿ËÈøË¹ÖÝ¿ÆÅå¶ûÊм°Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»á·¢¶¯ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬Òý·¢ÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£¡£¡£ ¡£¿ £¿£¿£¿£¿£¿ÆÅå¶ûÊÐÔâÊܹ¥»÷ºó£¬£¬£¬ £¬»¥ÁªÍø¡¢Í¼Êé¹ÝЧÀÍ¡¢ÔÊÐíºÍ¼ì²éƽ̨¼°Êз¨ÔºµÈ¶à¸öϵͳ̱»¾£¬£¬£¬ £¬¸øÍâµØ×¡Ãñ´øÀ´ÑÏÖØÀ§ÈÅ¡£¡£¡£¡£¡£¡£¡£ ¡£Ö»¹ÜÊÐÕþ¸®Æð¾¢»Ö¸´£¬£¬£¬ £¬µ«Ö±ÖÁ11ÔÂÏÂÑ®£¬£¬£¬ £¬²¿·ÖÊÐÕþÔËÓª²ÅÂ½Ðø»Ö¸´¡£¡£¡£¡£¡£¡£¡£ ¡£Í¬Ê±£¬£¬£¬ £¬Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»áÒ²±¨¸æÆäÊÖÒÕϵͳÔâµ½¹¥»÷£¬£¬£¬ £¬µç»°Ïß·ÖÐÖ¹£¬£¬£¬ £¬ÕýÔÚÆð¾¢È·¶¨ÐÅϢй¶ÇéÐΡ£¡£¡£¡£¡£¡£¡£ ¡£RansomHub½ñÄêѸËÙáÈÆð£¬£¬£¬ £¬ÒѶԻú³¡¡¢Ò½ÁÆ»ú¹¹¡¢ÖÆÔ칫˾ºÍÒªº¦»ù´¡ÉèÊ©µÈÊý°Ù¸ö×éÖ¯·¢¶¯¹¥»÷¡£¡£¡£¡£¡£¡£¡£ ¡£×Ô2Ô·ÝÒÔÀ´£¬£¬£¬ £¬ÒÑÓÐÔ¼210¸ö×éÖ¯³ÉΪÆäÊܺ¦Õß¡£¡£¡£¡£¡£¡£¡£ ¡£¸Ã×éÖ¯×î³õ·ºÆðÔÚÁªºÏ¿µ½¡¼¯ÍÅÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó£¬£¬£¬ £¬ËæºóÒòÁíÒ»ÀÕË÷Èí¼þÍŻﵹ±Õ¶ø×³´ó£¬£¬£¬ £¬¶ÔÊý¾Ý¾ÙÐгöÊÛ¡£¡£¡£¡£¡£¡£¡£ ¡£½ñÄ꣬£¬£¬ £¬RansomHub»¹¹¥»÷Á˶àÆð±¸ÊÜÖõÄ¿µÄÄ¿µÄ£¬£¬£¬ £¬°üÀ¨µçОÞÍ·Frontier¡¢Rite Aid¡¢Ó¢¹úÅÄÂôÐÐChristie¡¯sµÈ¡£¡£¡£¡£¡£¡£¡£ ¡£


https://therecord.media/ransomhub-cybercrime-coppell-texas-minneapolis-parks-agency


4. ÈûÂ׸ǵÙÐж¯£º·ÇÖÞÖ´·¨»ú¹¹ÑÏË๥»÷ÍøÂç·¸·¨


11ÔÂ26ÈÕ£¬£¬£¬ £¬·ÇÖÞÖ´·¨»ú¹¹ÔÚ¹ú¼ÊÐ̾¯×éÖ¯ºÍ·ÇÖÞÐ̾¯×éÖ¯µÄЭµ÷Ï£¬£¬£¬ £¬ÓÚ9ÔÂ2ÈÕÖÁ10ÔÂ31ÈÕʱ´ú¿ªÕ¹ÁËÃûΪ¡°ÈûÂ׸ǵÙÐж¯¡±µÄ¹¥»÷ÍøÂç·¸·¨»î¶¯¡£¡£¡£¡£¡£¡£¡£ ¡£´Ë´ÎÐж¯Õë¶ÔÀÕË÷Èí¼þ¡¢ÉÌÒµµç×ÓÓʼþй¶¡¢Êý×ÖÀÕË÷ºÍÍøÂçÕ©Æ­µÈ·¸·¨ÐÐΪ£¬£¬£¬ £¬Éæ¼°19¸ö·ÇÖÞ¹ú¼Ò£¬£¬£¬ £¬¹²¾Ð²¶ÁË1006ÃûÏÓÒÉÈË£¬£¬£¬ £¬´Ý»ÙÁË134089¸ö¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç¡£¡£¡£¡£¡£¡£¡£ ¡£¾ÝÊӲ죬£¬£¬ £¬ÕâЩ·¸·¨»î¶¯ÓëÖÁÉÙ35224ÃûÒÑÈ·ÈÏÉí·ÝµÄÊܺ¦ÕßÓйأ¬£¬£¬ £¬Ôì³ÉÁ˽ü1.93ÒÚÃÀÔªµÄ¾­¼ÃËðʧ£¬£¬£¬ £¬ÆäÖÐÈûÂ׸ǵÙÐж¯×·»ØÁËԼĪ4400ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£ ¡£Ðж¯ÖеÄÁÁµã°üÀ¨¿ÏÄáÑÇÆÆ»ñÒ»ÆðÍøÉÏÐÅÓÿ¨Õ©Æ­°¸£¬£¬£¬ £¬ÈûÄÚ¼Ó¶ûµ·»ÙÒ»ÆðÅÓÊÏȦÌ×£¬£¬£¬ £¬ÄáÈÕÀûÑǾв¶Ò»ÃûʵÑéÍøÉÏͶ×ÊÕ©Æ­µÄÄÐ×Ó£¬£¬£¬ £¬¿¦ÂóÂ¡ÆÆ»ñ¶àÌõÀíÓªÏúȦÌ×£¬£¬£¬ £¬ÒÔ¼°°²¸çÀ­µ·»ÙÒ»¸öÐéÄâ¶Ä³¡¹ú¼Ê¼¯ÍÅ¡£¡£¡£¡£¡£¡£¡£ ¡£¼ÓÈë´Ë´ÎÐж¯µÄ¹ú¼ÒÉÐÓа¢¶û¼°ÀûÑÇ¡¢±´Äþ¡¢¿ÆÌصÏÍß¡¢¸Õ¹ûÃñÖ÷¹²ºÍ¹ú¡¢¼ÓÅî¡¢¼ÓÄÉ¡¢Ã«ÀïÇó˹¡¢ÄªÉ£±È¿Ë¡¢Â¬Íú´ï¡¢ÄÏ·Ç¡¢Ì¹É£ÄáÑÇ¡¢Í»Äá˹¡¢ÔÞ±ÈÑǺͽò°Í²¼Î¤¡£¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/


5. Matrix·¢¶¯´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬ £¬Ê¹ÓÃÎïÁªÍøºÍÆóÒµÎó²î


11ÔÂ26ÈÕ£¬£¬£¬ £¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»³¡ÓÉÃûΪMatrixµÄÍþвÐÐΪÕ߲߻®µÄ´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷»î¶¯£¬£¬£¬ £¬¸Ã»î¶¯Ê¹Óÿɻá¼ûµÄ¹¤¾ßÕë¶ÔÎïÁªÍø×°±¸ºÍÆóҵЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£ ¡£MatrixµÄ¹¥»÷¿ò¼Ü¾­ÓÉÏêϸÆÊÎö£¬£¬£¬ £¬Ö÷ҪʹÓû¥ÁªÍøÅþÁ¬Éè±¹ØÁ¬ÄÎó²îºÍ¹ýʧÉèÖ㬣¬£¬ £¬Í¨¹ý±©Á¦¹¥»÷¡¢Èõƾ֤ºÍÒÑÖªÎó²î¹¹½¨½©Ê¬ÍøÂç¡£¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷µÄÖ÷ÒªÌØÕ÷°üÀ¨Õë¶Ô·ÓÉÆ÷¡¢DVRºÍIPÉãÏñ»ú¡¢ÆóҵЭæÅºÍÎïÁªÍø×°±¸µÄÎó²îʹÓᣡ£¡£¡£¡£¡£¡£ ¡£ÕâЩ¹¥»÷ÑÏÖØÒÀÀµÄ¬ÈÏ»òÈõÃÜÂ룬£¬£¬ £¬Ç¿µ÷ÁËδÄܽÓÄÉ»ù±¾Çå¾²²½·¥»áʹװ±¸ÃæÁÙÈëÇÖµÄΣº¦¡£¡£¡£¡£¡£¡£¡£ ¡£MatrixµÄÄ¿µÄ°üÀ¨ÔÆÐ§ÀÍÌṩÉÌ¡¢Ð¡ÐÍÆóÒµºÍÎïÁªÍø÷缯µØÇø£¬£¬£¬ £¬ÊÜÓ°ÏìµÄ×°±¸¿ÉÄܶà´ï3500Íǫ̀¡£¡£¡£¡£¡£¡£¡£ ¡£MatrixʹÓÃÁËÀ´×ÔGitHubµÈƽ̨µÄ¾ç±¾ºÍ¹¤¾ß£¬£¬£¬ £¬²¢Í¨¹ýTelegram½«Ð§ÀÍÇ®±Ò»¯£¬£¬£¬ £¬ÌṩDDoS¹¥»÷ÍýÏë¡£¡£¡£¡£¡£¡£¡£ ¡£Ö»¹ÜMatrixȱ·¦ÏȽø¹¦Ð§£¬£¬£¬ £¬µ«ÕâЩ¹¤¾ßµÄ×é×°ºÍ²Ù×÷¶¼ºÜÊÇÈÝÒ×£¬£¬£¬ £¬ÏÔʾ³öµÍÅÓºéˮƽ¼ÓÈëÕßËù´øÀ´µÄΣº¦Ô½À´Ô½´ó¡£¡£¡£¡£¡£¡£¡£ ¡£


https://www.infosecurity-magazine.com/news/ddos-campaign-exploits-iot-devices/


6. Array Networks SSL VPN ²úÆ·ÖеÄÎó²îÕý±»Æð¾¢Ê¹ÓÃ


11ÔÂ26ÈÕ£¬£¬£¬ £¬ÃÀ¹úÍøÂç·ÀÓù»ú¹¹CISAÊÕµ½Ö¤¾ÝÅú×¢£¬£¬£¬ £¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃSSL VPN²úÆ·Array Networks AGºÍvxAG ArrayOSÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬ £¬¸ÃÎó²î±»×·×ÙΪCVE-2023-28461£¬£¬£¬ £¬ÑÏÖØÐÔÆÀ·Ö¸ß´ï9.8£¬£¬£¬ £¬Òѱ»ÁÐÈëCISAµÄÒÑ֪ʹÓÃÎó²îĿ¼ÖС£¡£¡£¡£¡£¡£¡£ ¡£´ËÎó²î±£´æÓÚÒ×Êܹ¥»÷µÄURLÖУ¬£¬£¬ £¬ÊÇÒ»¸öÉí·ÝÑéÖ¤²»µ±ÎÊÌ⣬£¬£¬ £¬ÔÊÐíÔÚArray AGϵÁкÍvxAG 9.4.0.481¼°¸üÔç°æ±¾ÖÐÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¡£¡£¡£ ¡£Array NetworksÔÚÎó²îÅû¶һÖܺóÐû²¼ÁËÐÞ¸´°æ±¾Array AG 9.4.0.484¡£¡£¡£¡£¡£¡£¡£ ¡£Array NetworksµÄSSL VPN²úÆ·±»È«ÇòÁè¼Ý5000¸ö¿Í»§Ê¹Ó㬣¬£¬ £¬°üÀ¨ÆóÒµ¡¢Ð§ÀÍÌṩÉ̺ÍÕþ¸®»ú¹¹¡£¡£¡£¡£¡£¡£¡£ ¡£CISA½¨ÒéËùÓÐÁª°î»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯ÔÚ12ÔÂ16ÈÕ֮ǰӦÓÃÇå¾²¸üлò½ÓÄÉ»º½â²½·¥£¬£¬£¬ £¬²»È»Ó¦×èֹʹÓøòúÆ·¡£¡£¡£¡£¡£¡£¡£ ¡£Çå¾²¸üпÉͨ¹ýArrayÖ§³ÖÃÅ»§»ñÈ¡£¡£¡£¡£¡£¡£¡£ ¡£¬£¬£¬ £¬µ«¹©Ó¦ÉÌÌṩµÄ»º½â²½·¥¿ÉÄÜ»á¶Ô¿Í»§¶ËÇå¾²¹¦Ð§±¬·¢¸ºÃæÓ°Ï죬£¬£¬ £¬Òò´Ë×éÖ¯Ó¦Ê×ÏȲâÊÔÆäЧ¹û¡£¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-bug-in-array-networks-ssl-vpn-products/