ºÚ¿ÍIntelBrokerÉù³Æ¹¥ÆÆHPE£¬£¬£¬ £¬Ð¹Â¶Ãô¸ÐÊý¾Ý²¢ÍøÉϳöÊÛ

Ðû²¼Ê±¼ä 2025-01-21

1. ºÚ¿ÍIntelBrokerÉù³Æ¹¥ÆÆHPE£¬£¬£¬ £¬Ð¹Â¶Ãô¸ÐÊý¾Ý²¢ÍøÉϳöÊÛ


1ÔÂ19ÈÕ£¬£¬£¬ £¬ºÚ¿ÍIntelBrokerÉù³ÆÒÑÀÖ³ÉÈëÇÖ»ÝÆÕÆóÒµ(HPE)£¬£¬£¬ £¬Ò»¼Ò×ܲ¿Î»ÓÚÃÀ¹úµÂ¿ËÈøË¹ÖÝÐÝ˹¶ÙµÄÈ«ÇòÐÔÊÖÒÕ½â¾ö¼Æ»®ÌṩÉÌ£¬£¬£¬ £¬²¢Ð¹Â¶Á˰üÀ¨Ô´´úÂë¡¢Ö¤ÊéºÍСÎÒ˽¼ÒÉí·ÝÐÅÏ¢(PII)ÔÚÄÚµÄÃô¸ÐÊý¾Ý£¬£¬£¬ £¬ÕâЩÊý¾ÝÏÖÔÚÔÚÍøÉϳöÊÛ¡£¡£¡£ ¡£¡£¡£IntelBrokerÒªÇóÒÔÃÅÂÞ±Ò(XML)¼ÓÃÜÇ®±ÒÖ§¸¶£¬£¬£¬ £¬ÒÔ¼á³ÖÄäÃûºÍ²»¿É×·×Ù¡£¡£¡£ ¡£¡£¡£¾Ý³Æ£¬£¬£¬ £¬´Ë´ÎÈëÇÖÊÇÖ±½Ó¹¥»÷HPE»ù´¡ÉèÊ©µÄЧ¹û£¬£¬£¬ £¬²»Éæ¼°µÚÈý·½»á¼ûȨÏÞ¡£¡£¡£ ¡£¡£¡£ºÚ¿Í·ÖÏíµÄÊý¾ÝÊ÷ºÍ½ØÍ¼Ëƺõ֤ʵÁËÔ´´úÂ롢˽ÓÐGitHub´æ´¢¿â¡¢Docker¹¹½¨¡¢Ö¤ÊéÒÔ¼°Óû§Êý¾ÝµÈÃô¸ÐÐÅÏ¢µÄй¶¡£¡£¡£ ¡£¡£¡£ÈôÊǾ­»ÝÆÕ֤ʵ£¬£¬£¬ £¬Õâ¿ÉÄÜ×é³ÉÒ»´ÎÖØ´óÇå¾²ÊÂÎñ¡£¡£¡£ ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬HPEºÍHP Inc.ÊÇÁ½¼Ò²î±ðµÄ¹«Ë¾£¬£¬£¬ £¬Ç°ÕßרעÓÚÆóÒµ¼¶IT½â¾ö¼Æ»®£¬£¬£¬ £¬ºóÕßÔòרעÓÚÏûºÄ²úÆ·¡£¡£¡£ ¡£¡£¡£IntelBroker´ËǰÒÑÉæÏÓ¶àÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬°üÀ¨ÈëÇÖ˼¿Æ¡¢Åµ»ùÑǺÍAMDµÈ×ÅÃûÆóÒµ¡£¡£¡£ ¡£¡£¡£


https://hackread.com/hackers-claim-hewlett-packard-data-breach-sale/


2. ChatGPTÅÀ³æÎó²î»òÖÂDDoS¹¥»÷


1ÔÂ19ÈÕ£¬£¬£¬ £¬µÂ¹úÇå¾²Ñо¿Ô±Benjamin Flesch·¢Ã÷OpenAIµÄChatGPT API±£´æÒ»¸öDZÔÚµÄÇå¾²Îó²î£¬£¬£¬ £¬¿ÉÄܱ»Ê¹ÓÃÀ´ÌᳫÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷¡£¡£¡£ ¡£¡£¡£Í¨¹ýÏòChatGPT API·¢ËͰüÀ¨´ó×ÚÂÔÓвî±ðµ«Ö¸ÏòÍ³Ò»ÍøÕ¾µÄURLÁбíµÄHTTP POSTÇëÇ󣬣¬£¬ £¬¹¥»÷Õß¿ÉÒÔ´¥·¢ChatGPTÅÀ³æ¶ÔÕâÐ©ÍøÕ¾µÄƵÈÔ»á¼û£¬£¬£¬ £¬´Ó¶ø¶ÔÄ¿µÄÍøÕ¾Ôì³ÉѹÁ¦£¬£¬£¬ £¬ÉõÖÁµ¼ÖÂЧÀÍÖÐÖ¹¡£¡£¡£ ¡£¡£¡£FleschÖ¸³ö£¬£¬£¬ £¬ChatGPT APIÔÚ´¦Öóͷ£ÕâЩÇëÇóʱ±£´æÖÊÁ¿È±ÏÝ£¬£¬£¬ £¬¼ÈûÓмì²éURLÁбíÖеÄÖØ¸´Ï£¬£¬ £¬Ò²Ã»ÓжÔURLÊýÄ¿¾ÙÐÐÏÞÖÆ¡£¡£¡£ ¡£¡£¡£ÕâÒâζ×Å£¬£¬£¬ £¬×ÝÈ»¹¥»÷ÕßÖ»·¢ËÍÉÙÁ¿ÇëÇ󣬣¬£¬ £¬Êܺ¦ÕßÒ²¿ÉÄÜÊÕµ½´ó×ÚÀ´×Ô²î±ðIPµØµãµÄ»á¼ûÇëÇ󣬣¬£¬ £¬µ¼ÖÂDDoSÖ¢×´¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬ £¬Flesch»¹Ìáµ½£¬£¬£¬ £¬Õâ¸öAPI»¹¿ÉÄÜÊܵ½ÌáÐÑ×¢Èë¹¥»÷µÄÓ°Ïì¡£¡£¡£ ¡£¡£¡£Ëûͨ¹ý¶àÖÖÇþµÀÏòOpenAI±¨¸æÁËÕâ¸öÎó²î£¬£¬£¬ £¬µ«ÉÐδ»ñµÃ»Ø¸´¡£¡£¡£ ¡£¡£¡£FleschÖÊÒÉΪʲôOpenAIûÓÐʵÏÖ¼òÆÓµÄÑéÖ¤Âß¼­À´±ÜÃâÕâÖÖÀÄÓ㬣¬£¬ £¬²¢ÍƲâÕâ¿ÉÄÜÊÇOpenAIµÄAIÊðÀíÏîÄ¿µÄÒ»¸öʾÀý£¬£¬£¬ £¬¶øÕâ¸öAIÊðÀíÔÚ´¦Öóͷ£ÇëÇóʱÏÔȻȱ·¦ÄÚÖõÄÇå¾²ÐÔ¡£¡£¡£ ¡£¡£¡£ËûÒÔΪ£¬£¬£¬ £¬ÕâÖÖÉè¼ÆÈ±ÏÝÔÚÂÄÀú¸»ºñµÄ¹è¹È¹¤³Ìʦ¿´À´ÊDz»¿ÉÏëÏóµÄ£¬£¬£¬ £¬ÓÉÓÚÀàËÆ¹È¸èÕâÑùµÄÅÀ³æÒѾ­±£´æ¶àÄ꣬£¬£¬ £¬²¢ÇÒ¶¼ÓÐÏÞÖÆ¶ÔÍ³Ò»ÍøÕ¾µÄÇëÇóÁ¿µÄ»úÖÆ¡£¡£¡£ ¡£¡£¡£


https://www.theregister.com/2025/01/19/openais_chatgpt_crawler_vulnerability/


3. CL-UNK-0979ʹÓÃIvantiÎó²î»ñÈ¡ÍøÂç»á¼ûȨÏÞ


1ÔÂ18ÈÕ£¬£¬£¬ £¬Palo Alto Networks Ðû²¼ÁËÒ»·ÝÍþв¼ò±¨£¬£¬£¬ £¬Õ¹ÏÖÁË Ivanti ²úÆ·Öб£´æµÄÁ½¸öÑÏÖØÎó²î£ºCVE-2025-0282 ºÍ CVE-2025-0283¡£¡£¡£ ¡£¡£¡£ÕâÁ½¸öÎó²îÓ°Ïì Ivanti µÄ Connect Secure¡¢Policy Secure ºÍ ZTA Íø¹Ø×°±¸£¬£¬£¬ £¬ÕâЩװ±¸³£±»ÓÃÓÚʵÏÖÔ¶³ÌÍøÂçÅþÁ¬¡£¡£¡£ ¡£¡£¡£CVE-2025-0282 ÊÇÒ»¸öÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ý·¢ËÍÌØÖÆÇëÇóʵÏÖÔ¶³Ì´úÂëÖ´ÐеÄÎó²î£¬£¬£¬ £¬±»ÆÀΪÑÏÖØ¼¶±ð£¬£¬£¬ £¬CVSS ÆÀ·ÖΪ 9.0¡£¡£¡£ ¡£¡£¡£¶ø CVE-2025-0283 ÔòʹÍâµØ¾­ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»ÌáÉýȨÏÞ£¬£¬£¬ £¬ÆäÑÏÖØÐÔÆÀ¼¶Îª¸ß£¬£¬£¬ £¬CVSS ÆÀ·ÖΪ 7.0¡£¡£¡£ ¡£¡£¡£¾ÝÍøÂçÇå¾²×éÖ¯¼Í¼£¬£¬£¬ £¬°üÀ¨ Mandiant¡¢Watchtowr Labs ºÍ Palo Alto Networks ÔÚÄڵĶà¼Ò»ú¹¹ÒÑÊӲ쵽¹¥»÷ÕßʹÓà CVE-2025-0282 ÉøÍ¸ÄÚ²¿ÍøÂç¡£¡£¡£ ¡£¡£¡£¹¥»÷»î¶¯±»×·×ÙΪ CL-UNK-0979£¬£¬£¬ £¬Éæ¼°Ëĸö½×¶Î£º³õʼ»á¼û¡¢Æ¾Ö¤ÍøÂçºÍºáÏòÒÆ¶¯¡¢·ÀÓùÌÓ±ÜÒÔ¼°³¤ÆÚÐÔ¡£¡£¡£ ¡£¡£¡£¹¥»÷ÕßʹÓÃÁ˰üÀ¨×Ô½ç˵ Perl ¾ç±¾ ldap.pl¡¢ÄÚ´æ×ª´¢¹¤¾ßºÍ DLL ²à¼ÓÔØµÈÔÚÄڵĶàÖÖÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¼°ÊÖÒÕ¡£¡£¡£ ¡£¡£¡£Ivanti ÒÑÐû²¼²¹¶¡£¬£¬£¬ £¬²¢½¨ÒéÁ¬Ã¦¸üÐÂËùÓÐÊÜÓ°ÏìµÄϵͳ£¬£¬£¬ £¬Í¬Ê±ÃãÀøÊ¹ÓÃÍêÕûÐÔ¼ì²é¹¤¾ß (ICT) ¼à¿Ø¿ÉÒɻ¡£¡£¡£ ¡£¡£¡£


https://securityonline.info/cl-unk-0979-exploit-zero-day-flaw-in-ivanti-connect-secure-to-gain-access-to-networks/


4. Õ©Æ­ÕßʹÓÃTruth SocialÌá³«ÍøÂç´¹ÂÚºÍڲƭ»î¶¯


1ÔÂ19ÈÕ£¬£¬£¬ £¬Truth SocialÊÇÒ»¸öÓÉÌØÀÊÆÕýÌåÓë¿Æ¼¼¼¯ÍÅÔÚ2022ÄêÍÆ³öµÄÉ罻ýÌåÆ½Ì¨£¬£¬£¬ £¬ÏÖÔÚÈ´³ÉΪÁËÕ©Æ­·Ö×ÓµÄÖ÷ҪĿµÄ¡£¡£¡£ ¡£¡£¡£NetcraftµÄб¨¸æÕ¹ÏÖÁËÕ©Æ­ÕßÔõÑùʹÓÃ¸ÃÆ½Ì¨µÄ¹¦Ð§ºÍÓû§ÐÅÈÎÀ´²ß»®´ó¹æÄ£ÍøÂç¹¥»÷¡£¡£¡£ ¡£¡£¡£¸Ãƽ̨¿ìËÙµÄÓû§ÔöÌíºÍÒÔÉçÇøÎªÖÐÐĵÄÉè¼ÆÎªÕ©Æ­ÕßÌṩÁ˸»ºñµÄÐÅϢȪԴ£¬£¬£¬ £¬Ê¹ËûÃÇÄܹ»ÇáËÉʶ±ðºÍÁªÏµÆäËûÓû§¡£¡£¡£ ¡£¡£¡£Í¬Ê±£¬£¬£¬ £¬Óû§¶Ôƽ̨¡°ÕæÏࡱµÄ¸ß¶ÈÐÅÈÎҲΪթƭÕß´´Á¢ÁË·ÊÃÀµÄÍÁÈÀ£¬£¬£¬ £¬ÆäÖÐ87%µÄÓû§ÆÚÍûƽ̨ÉϵÄÐÂÎźÍÐÅÏ¢´ó¶àÊÇ׼ȷµÄ£¬£¬£¬ £¬ÕâÖÖÌ«¹ý×ÔÐÅÔöÌíÁËÊÜÆ­µÄΣº¦¡£¡£¡£ ¡£¡£¡£NetcraftÊӲ쵽ÁËһϵÁÐÕë¶ÔTruth SocialÓû§µÄÕ©Æ­ÐÐΪ£¬£¬£¬ £¬°üÀ¨ÍøÂç´¹ÂÚÁ´½Ó¡¢Í¶×ÊÕ©Æ­ºÍÔ¤¸¶·ÑÕ©Æ­µÈ£¬£¬£¬ £¬ÉõÖÁÒ»ÌìÖ®ÄÚ¾ÍÄÜÊÕµ½40Ìõδ¾­ÇëÇóµÄÕ©Æ­ÐÂÎÅ¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬ £¬Õ©Æ­Õß»¹Ê¹ÓÃ¸ÃÆ½Ì¨Èƹý¹Å°åµÄµç×ÓÓʼþÇå¾²²½·¥£¬£¬£¬ £¬½«Æä×÷ÎªÖØ¶¨Ïò¹¤¾ßÀ´×èÖ¹±»·¢Ã÷¡£¡£¡£ ¡£¡£¡£NetcraftÖÒÑԳƣ¬£¬£¬ £¬Ë¼Á¿µ½È«Çò䱨¸æµÄÊÂÎñ£¬£¬£¬ £¬ÕâЩթƭÔì³ÉµÄÏÖʵËðʧ¿ÉÄܸߴïÊýÊ®ÒÚÉõÖÁÊýÍòÒÚÃÀÔª¡£¡£¡£ ¡£¡£¡£ÎªÁËÓ¦¶ÔÕâЩÍþв£¬£¬£¬ £¬NetcraftÇ¿µ÷ÐèÒªÖÆ¶©Ç¿Ê¢µÄ¼ì²âºÍɨ³ýÕ½ÂÔ£¬£¬£¬ £¬Ê¹ÓÃÐÂÊÖÒÕÀ´±£»£»£»£»£»£»£»£»¤ÏûºÄÕßÃâÊÜΣÏÕ¡£¡£¡£ ¡£¡£¡£


https://securityonline.info/scammers-exploit-truth-social-to-launch-phishing-and-fraud-campaigns/


5. ÄÏÑÇÔâ¡°Tanzeem¡±¶ñÒâÈí¼þ¹¥»÷£¬£¬£¬ £¬DONOT APT×éÖ¯Ò»Á¬Íþв


1ÔÂ20ÈÕ£¬£¬£¬ £¬¾ÝCyber Security News±¨µÀ£¬£¬£¬ £¬CyfirmaµÄÍøÂçÇå¾²ÍŶӽüÆÚ½ÒÆÆÁËÒ»ÏîÕë¶ÔÄÏÑÇ£¬£¬£¬ £¬ÌØÊâÊÇÓ¡¶È¿ËʲÃ×¶ûµØÇøÓû§µÄÖØ´óAndroid¶ñÒâÈí¼þ»î¶¯¡£¡£¡£ ¡£¡£¡£¸Ã¶ñÒâÈí¼þαװ³ÉÃûΪ¡°Tanzeem¡±µÄ̸ÌìÓ¦Ó㬣¬£¬ £¬ÒâͼÇÔȡĿµÄ×°±¸ÖеÄÃô¸ÐÊý¾Ý¡£¡£¡£ ¡£¡£¡£¡°Tanzeem¡±ÔÚÎÚ¶û¶¼ÓïÖÐÒâΪ¡°×éÖ¯¡±£¬£¬£¬ £¬³£Óë¸ÃµØÇø¿Ö²À×éÖ¯ºÍÖ´·¨»ú¹¹Ïà¹ØÁª£¬£¬£¬ £¬ÌåÏÖÆäÕë¶ÔÌØ¶¨Ð¡ÎÒ˽¼Ò»òÕûÌå¡£¡£¡£ ¡£¡£¡£´Ë¶ñÒâÈí¼þ¹éÊôÓÚ¾ßÓÐÓ¡¶ÈÅä¾°µÄ¡°DONOT¡±APT×éÖ¯¡£¡£¡£ ¡£¡£¡£ËüʹÓÃOneSignalÆ½Ì¨ÍÆËÍÍøÂç´¹ÂÚÁ´½Ó¾ÙÐÐÈö²¥£¬£¬£¬ £¬×°ÖúóËä×èÖ¹ÔËÐУ¬£¬£¬ £¬µ«ÒÑÇëÇó¶àÏîÃô¸ÐȨÏÞ£¬£¬£¬ £¬Èçͨ»°¼Í¼¡¢ÁªÏµÈË¡¢¶ÌÐÅ¡¢Îļþ´æ´¢ºÍλÖÃÊý¾Ý£¬£¬£¬ £¬²¢ÊÔͼ»ñÈ¡µç×ÓÓʼþºÍÓû§ÃûȨÏÞ¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬ £¬¸Ã¶ñÒâÈí¼þ½ÓÄÉ»ìÏýÊÖÒÕÒþ²Ø´úÂ룬£¬£¬ £¬¾ß±¸Ã¶¾ÙÎļþ¡¢²¶»ñ¼üÅÌÊäÈë¡¢ÍøÂçϵͳÐÅÏ¢ºÍÆÁÄ»Â¼ÖÆµÈ¹¦Ð§¡£¡£¡£ ¡£¡£¡£DONOT APT×éÖ¯ºã¾ÃÒÔÄÏÑÇÕþ¸®ºÍ¾üÊÂ×é֯ΪĿµÄ£¬£¬£¬ £¬´Ë´ÎÐж¯ÏÔʾÆäÕ½ÊõÒ»Ö±Ñݱä¡£¡£¡£ ¡£¡£¡£ÍøÂçÇ徲ר¼ÒÖÒÑÔ£¬£¬£¬ £¬¸Ã×éÖ¯¿ÉÄܼÌÐøË¢Ð¹¥»÷ÒªÁ죬£¬£¬ £¬½¨ÒéÓû§×°ÖÃÐÂÓ¦ÓÃʱ¼á³ÖÉóÉ÷£¬£¬£¬ £¬ÓÈÆäÊÇÃæÁÙÒªÇó´ó×ÚȨÏÞµÄÓ¦Óᣡ£¡£ ¡£¡£¡£


https://cybersecuritynews.com/new-android-malware-mimics-chat-app/


6. ±´¶ûÉ­¼¯ÍÅй¶ÁËÁè¼Ý15,000¸öFortiGate·À»ðǽÉèÖÃ


1ÔÂ20ÈÕ£¬£¬£¬ £¬±´¶ûÉ­¼¯ÍÅй¶ÁËÁè¼Ý15,000¸öFortiGate·À»ðǽµÄÉèÖ㬣¬£¬ £¬¶ÔÈ«ÇòʹÓÃÕâЩװ±¸µÄ×éÖ¯×é³ÉÁËÑÏÖØÍþв¡£¡£¡£ ¡£¡£¡£´Ë´Î×ß©ÊÂÎñʹµÃ¹¥»÷Õß¿ÉÄÜ»á¼ûÃô¸Ðϵͳ²¢Èƹý·ÀÓù²½·¥£¬£¬£¬ £¬ÆäÖÐÃÀ¹ú¡¢Ó¢¹ú¡¢²¨À¼ºÍ±ÈÀûʱµÈµØÊÜÓ°Ïì×îΪÑÏÖØ¡£¡£¡£ ¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§Ãû¡¢ÃÜÂ루²¿·ÖΪ´¿Îı¾£©¡¢×°±¸ÖÎÀíÊý×ÖÖ¤ÊéÒÔ¼°ËùÓзÀ»ðǽ¹æÔò£¬£¬£¬ £¬Îª¹¥»÷ÕßÌṩÁ˸»ºñµÄ¹¥»÷×ÊÔ´¡£¡£¡£ ¡£¡£¡£Ì»Â¶µÄÓû§ÃûºÍÃÜÂë¿ÉÄܱ»Ö±½ÓÓÃÓÚ»á¼ûÍøÂçÉϵÄÃô¸Ðϵͳ£¬£¬£¬ £¬¶øÐ¹Â¶µÄ·À»ðǽÉèÖÃÔò¿ÉÄÜ̻¶ÄÚ²¿ÍøÂç½á¹¹£¬£¬£¬ £¬Ê¹¹¥»÷ÕßÄܹ»Ê¶±ð²¢Ê¹ÓÃÈõµã¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬ £¬±»Ð¹Â¶µÄÊý×ÖÖ¤Êé¿ÉÄܵ¼ÖÂδ¾­ÊÚȨµÄ»á¼û»òÔÚÇ徲ͨѶʱ´úµÄÉí·Ýð³ä¡£¡£¡£ ¡£¡£¡£Ö»¹ÜһЩ×éÖ¯ÔÚ2022ÄêÒѾ­ÐÞ²¹ÁËÏà¹ØÎó²î£¨CVE-2022-40684£©£¬£¬£¬ £¬µ«ÓÉÓÚÕâÊÇÒ»¸öÁãÈÕÎó²î£¬£¬£¬ £¬¼ì²éÊÇ·ñ±£´æ±»ÈëÇֵļ£ÏóÈÔÈ»ÖÁ¹ØÖ÷Òª¡£¡£¡£ ¡£¡£¡£ÎªÁ˼õÇá´ËÀàйÃÜ´øÀ´µÄΣº¦£¬£¬£¬ £¬×éÖ¯Ó¦¸üÐÂ×°±¸ºÍVPNƾ֤£¬£¬£¬ £¬ÊµÑéÇ¿ÃÜÂëÕ½ÂÔ£¬£¬£¬ £¬ÉóºË²¢ÖØÐÂÉèÖ÷À»ðǽ£¬£¬£¬ £¬ÂÖ»»ÊÜËðµÄÊý×ÖÖ¤Ê飬£¬£¬ £¬²¢È·¶¨×éÖ¯ÖÐÐÞ²¹Îó²îµÄʱ¼ä±í¡£¡£¡£ ¡£¡£¡£CloudSEKÌṩÁËÒ»¸öÓÐÓÃ×ÊÔ´£¬£¬£¬ £¬ÓÃÓÚ¼ì²éÍøÂçÊÇ·ñÊôÓÚ̻¶µÄIP¹æÄ££¬£¬£¬ £¬ÒÔ×ÊÖú×éÖ¯±£»£»£»£»£»£»£»£»¤ÍøÂç²¢½µµÍDZÔÚΣº¦¡£¡£¡£ ¡£¡£¡£


https://hackread.com/belsen-group-leaks-fortigate-firewall-configurations/