NachoVPNÎó²î£º¶ñÒâVPNЧÀÍÆ÷ʹÓÃδÐÞ²¹¿Í»§¶ËʵÑé¹¥»÷
Ðû²¼Ê±¼ä 2024-11-2711ÔÂ26ÈÕ£¬£¬£¬£¬Ò»×éÃûΪ¡°NachoVPN¡±µÄÎó²îÔÊÐí¶ñÒâVPNЧÀÍÆ÷ʹÓÃδÐÞ²¹µÄPalo AltoºÍSonicWall SSL-VPN¿Í»§¶Ë¾ÙÐй¥»÷£¬£¬£¬£¬Í¨¹ýÓÕÆÓû§ÅþÁ¬ÖÁ¹¥»÷Õß¿ØÖƵÄVPNЧÀÍÆ÷£¬£¬£¬£¬½ø¶øÇÔÈ¡µÇ¼ƾ֤¡¢Ö´ÐÐí§Òâ´úÂë¡¢×°ÖöñÒâÈí¼þ»òÌᳫ´úÂëÊðÃûαÔì¼°ÖÐÐÄÈ˹¥»÷¡£¡£¡£¡£AmberWolfÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÕâÒ»Íþв£¬£¬£¬£¬²¢ÔÚÎó²îÊ״α¨¸æºóÊýÔÂÄÚ£¬£¬£¬£¬¼ûÖ¤ÁËSonicWallºÍPalo Alto NetworksÏà¼ÌÐû²¼Õë¶ÔCVE-2024-29014ºÍCVE-2024-5921Îó²îµÄ²¹¶¡¡£¡£¡£¡£ÎªÁË·ÀÓù£¬£¬£¬£¬SonicWall¿Í»§ÐèÉý¼¶ÖÁNetExtenderµÄÌØ¶¨°æ±¾£¬£¬£¬£¬¶øPalo Alto NetworksÔò½¨Òé×°Öøüа汾»òÔÚFIPS-CCģʽÏÂÔËÐÐVPN¿Í»§¶Ë¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬AmberWolf»¹Ðû²¼ÁËNachoVPN¿ªÔ´¹¤¾ß£¬£¬£¬£¬¸Ã¹¤¾ßÄÜÄ£Äâ¶ñÒâVPNЧÀÍÆ÷£¬£¬£¬£¬Ö§³Ö¶àÖÖÆóÒµVPN²úÆ·£¬£¬£¬£¬²¢ÃãÀøÉçÇøÐ¢Ë³ÐÂÎó²îÐÅÏ¢¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬¸Ã¹«Ë¾»¹ÌṩÁËÓйØÕâÁ½¸öÎó²îµÄ¸ü¶àÊÖÒÕϸ½ÚºÍ·ÀÓù½¨Ò飬£¬£¬£¬ÒÔ×ÊÖúÍøÂç·ÀÓùÕß±£»£»£»£»¤ÆäϵͳÃâÊÜDZÔÚ¹¥»÷¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-nachovpn-attack-uses-rogue-vpn-servers-to-install-malicious-updates/
2. ¶íÂÞ˹ºÚ¿ÍRomComʹÓÃFirefoxºÍTorÁãÈÕÎó²îÌᳫ¹¥»÷
11ÔÂ27ÈÕ£¬£¬£¬£¬½üÆÚ¶íÂÞ˹ºÚ¿Í×éÖ¯RomComʹÓÃÁËÁ½¸öÁãÈÕÎó²î£¬£¬£¬£¬ÏòʹÓÃFirefox»òTorä¯ÀÀÆ÷µÄÓû§·¢ÉäÁ˶ñÒâ´úÂë¡£¡£¡£¡£ÕâЩÎó²î»®·ÖÓ°ÏìÁËMozillaÈí¼þºÍWindowsϵͳ£¬£¬£¬£¬ÆäÖÐÒ»¸öÎó²î£¨CVE-2024-9680£©Ê¹µÃ»á¼ûÊÜÑ¬È¾ÍøÕ¾µÄÈκÎÈ˶¼»áÎÞÒâʶµØÏÂÔØRomComºóÃÅ£¬£¬£¬£¬¶øÎÞÐèÈκεã»÷¡£¡£¡£¡£ÐÒÔ˵ÄÊÇ£¬£¬£¬£¬ÕâÁ½¸öÎó²î¶¼»ñµÃÁË¿ìËÙÐÞ¸´£¬£¬£¬£¬MozillaÔÚÊÕµ½Í¨Öªºó25СʱÄÚ¾ÍÐÞ²¹ÁËFirefoxÖеÄÎó²î£¬£¬£¬£¬¶øWindowsÖеÄÎó²î£¨CVE-2024-49039£©Ò²ÔÚºóÐø»ñµÃÐÞ¸´¡£¡£¡£¡£RomComͨ¹ýÌØÖÆÍøÕ¾´¥·¢Îó²î£¬£¬£¬£¬ÕâÐ©ÍøÕ¾Ä£ÄâÁËÕæÊµ×éÖ¯µÄÍøÕ¾£¬£¬£¬£¬°üÀ¨ConnectWise¡¢DevolutionsºÍCorrectivµÈ¡£¡£¡£¡£ËäÈ»Torä¯ÀÀÆ÷Ò²»ùÓÚFirefox£¬£¬£¬£¬µ«ESET×·×ÙµÄÊܺ¦ÕßÖÐûÓÐÒ»ÈËÊÇͨ¹ýTorÊܵ½¹¥»÷µÄ£¬£¬£¬£¬¿ÉÄÜÊÇÓÉÓÚTorµÄijЩÉèÖÃÓëFirefox²î±ð¡£¡£¡£¡£RomComµÄÖ÷ҪĿµÄËÆºõÊǹ«Ë¾£¬£¬£¬£¬¾ø´ó´ó¶¼Êܺ¦ÕßλÓÚ±±ÃÀºÍÅ·ÖÞ£¬£¬£¬£¬µ«ÐÂÎ÷À¼ºÍ·¨Êô¹çÑÇÄÇÒ²ÓÐÁãÐÇÊܺ¦Õß¡£¡£¡£¡£
https://www.darkreading.com/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor
3. RansomHub×éÖ¯Éù³Æ¶ÔÁ½ÊÐÕþ¸®·¢¶¯ÀÕË÷¹¥»÷
11ÔÂ27ÈÕ£¬£¬£¬£¬ÍøÂç·¸·¨×éÖ¯RansomHubÉù³Æ¶ÔµÂ¿ËÈøË¹ÖÝ¿ÆÅå¶ûÊм°Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»á·¢¶¯ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬Òý·¢ÆÕ±é¹Ø×¢¡£¡£¡£¡£¿£¿£¿ÆÅå¶ûÊÐÔâÊܹ¥»÷ºó£¬£¬£¬£¬»¥ÁªÍø¡¢Í¼Êé¹ÝЧÀÍ¡¢ÔÊÐíºÍ¼ì²éƽ̨¼°Êз¨ÔºµÈ¶à¸öϵͳ̱»¾£¬£¬£¬£¬¸øÍâµØ×¡Ãñ´øÀ´ÑÏÖØÀ§ÈÅ¡£¡£¡£¡£Ö»¹ÜÊÐÕþ¸®Æð¾¢»Ö¸´£¬£¬£¬£¬µ«Ö±ÖÁ11ÔÂÏÂÑ®£¬£¬£¬£¬²¿·ÖÊÐÕþÔËÓª²ÅÂ½Ðø»Ö¸´¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»áÒ²±¨¸æÆäÊÖÒÕϵͳÔâµ½¹¥»÷£¬£¬£¬£¬µç»°Ïß·ÖÐÖ¹£¬£¬£¬£¬ÕýÔÚÆð¾¢È·¶¨ÐÅϢй¶ÇéÐΡ£¡£¡£¡£RansomHub½ñÄêѸËÙáÈÆð£¬£¬£¬£¬ÒѶԻú³¡¡¢Ò½ÁÆ»ú¹¹¡¢ÖÆÔ칫˾ºÍÒªº¦»ù´¡ÉèÊ©µÈÊý°Ù¸ö×éÖ¯·¢¶¯¹¥»÷¡£¡£¡£¡£×Ô2Ô·ÝÒÔÀ´£¬£¬£¬£¬ÒÑÓÐÔ¼210¸ö×éÖ¯³ÉΪÆäÊܺ¦Õß¡£¡£¡£¡£¸Ã×éÖ¯×î³õ·ºÆðÔÚÁªºÏ¿µ½¡¼¯ÍÅÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó£¬£¬£¬£¬ËæºóÒòÁíÒ»ÀÕË÷Èí¼þÍŻﵹ±Õ¶ø×³´ó£¬£¬£¬£¬¶ÔÊý¾Ý¾ÙÐгöÊÛ¡£¡£¡£¡£½ñÄ꣬£¬£¬£¬RansomHub»¹¹¥»÷Á˶àÆð±¸ÊÜÖõÄ¿µÄÄ¿µÄ£¬£¬£¬£¬°üÀ¨µçОÞÍ·Frontier¡¢Rite Aid¡¢Ó¢¹úÅÄÂôÐÐChristie¡¯sµÈ¡£¡£¡£¡£
https://therecord.media/ransomhub-cybercrime-coppell-texas-minneapolis-parks-agency
4. ÈûÂ׸ǵÙÐж¯£º·ÇÖÞÖ´·¨»ú¹¹ÑÏË๥»÷ÍøÂç·¸·¨
11ÔÂ26ÈÕ£¬£¬£¬£¬·ÇÖÞÖ´·¨»ú¹¹ÔÚ¹ú¼ÊÐ̾¯×éÖ¯ºÍ·ÇÖÞÐ̾¯×éÖ¯µÄе÷Ï£¬£¬£¬£¬ÓÚ9ÔÂ2ÈÕÖÁ10ÔÂ31ÈÕʱ´ú¿ªÕ¹ÁËÃûΪ¡°ÈûÂ׸ǵÙÐж¯¡±µÄ¹¥»÷ÍøÂç·¸·¨»î¶¯¡£¡£¡£¡£´Ë´ÎÐж¯Õë¶ÔÀÕË÷Èí¼þ¡¢ÉÌÒµµç×ÓÓʼþй¶¡¢Êý×ÖÀÕË÷ºÍÍøÂçթƵȷ¸·¨ÐÐΪ£¬£¬£¬£¬Éæ¼°19¸ö·ÇÖÞ¹ú¼Ò£¬£¬£¬£¬¹²¾Ð²¶ÁË1006ÃûÏÓÒÉÈË£¬£¬£¬£¬´Ý»ÙÁË134089¸ö¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬ÕâЩ·¸·¨»î¶¯ÓëÖÁÉÙ35224ÃûÒÑÈ·ÈÏÉí·ÝµÄÊܺ¦ÕßÓйأ¬£¬£¬£¬Ôì³ÉÁ˽ü1.93ÒÚÃÀÔªµÄ¾¼ÃËðʧ£¬£¬£¬£¬ÆäÖÐÈûÂ׸ǵÙÐж¯×·»ØÁËԼĪ4400ÍòÃÀÔª¡£¡£¡£¡£Ðж¯ÖеÄÁÁµã°üÀ¨¿ÏÄáÑÇÆÆ»ñÒ»ÆðÍøÉÏÐÅÓÿ¨Õ©Æ°¸£¬£¬£¬£¬ÈûÄÚ¼Ó¶ûµ·»ÙÒ»ÆðÅÓÊÏȦÌ×£¬£¬£¬£¬ÄáÈÕÀûÑǾв¶Ò»ÃûʵÑéÍøÉÏͶ×ÊթƵÄÄÐ×Ó£¬£¬£¬£¬¿¦ÂóÂ¡ÆÆ»ñ¶àÌõÀíÓªÏúȦÌ×£¬£¬£¬£¬ÒÔ¼°°²¸çÀµ·»ÙÒ»¸öÐéÄâ¶Ä³¡¹ú¼Ê¼¯ÍÅ¡£¡£¡£¡£¼ÓÈë´Ë´ÎÐж¯µÄ¹ú¼ÒÉÐÓа¢¶û¼°ÀûÑÇ¡¢±´Äþ¡¢¿ÆÌصÏÍß¡¢¸Õ¹ûÃñÖ÷¹²ºÍ¹ú¡¢¼ÓÅî¡¢¼ÓÄÉ¡¢Ã«ÀïÇó˹¡¢ÄªÉ£±È¿Ë¡¢Â¬Íú´ï¡¢ÄÏ·Ç¡¢Ì¹É£ÄáÑÇ¡¢Í»Äá˹¡¢ÔÞ±ÈÑǺͽò°Í²¼Î¤¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/
5. Matrix·¢¶¯´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬£¬Ê¹ÓÃÎïÁªÍøºÍÆóÒµÎó²î
11ÔÂ26ÈÕ£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»³¡ÓÉÃûΪMatrixµÄÍþвÐÐΪÕ߲߻®µÄ´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷»î¶¯£¬£¬£¬£¬¸Ã»î¶¯Ê¹Óÿɻá¼ûµÄ¹¤¾ßÕë¶ÔÎïÁªÍø×°±¸ºÍÆóҵЧÀÍÆ÷¡£¡£¡£¡£MatrixµÄ¹¥»÷¿ò¼Ü¾ÓÉÏêϸÆÊÎö£¬£¬£¬£¬Ö÷ҪʹÓû¥ÁªÍøÅþÁ¬Éè±¹ØÁ¬ÄÎó²îºÍ¹ýʧÉèÖ㬣¬£¬£¬Í¨¹ý±©Á¦¹¥»÷¡¢Èõƾ֤ºÍÒÑÖªÎó²î¹¹½¨½©Ê¬ÍøÂç¡£¡£¡£¡£¹¥»÷µÄÖ÷ÒªÌØÕ÷°üÀ¨Õë¶Ô·ÓÉÆ÷¡¢DVRºÍIPÉãÏñ»ú¡¢ÆóÒµÐæÅºÍÎïÁªÍø×°±¸µÄÎó²îʹÓᣡ£¡£¡£ÕâЩ¹¥»÷ÑÏÖØÒÀÀµÄ¬ÈÏ»òÈõÃÜÂ룬£¬£¬£¬Ç¿µ÷ÁËδÄܽÓÄÉ»ù±¾Çå¾²²½·¥»áʹװ±¸ÃæÁÙÈëÇÖµÄΣº¦¡£¡£¡£¡£MatrixµÄÄ¿µÄ°üÀ¨ÔÆÐ§ÀÍÌṩÉÌ¡¢Ð¡ÐÍÆóÒµºÍÎïÁªÍø÷缯µØÇø£¬£¬£¬£¬ÊÜÓ°ÏìµÄ×°±¸¿ÉÄܶà´ï3500Íǫ̀¡£¡£¡£¡£MatrixʹÓÃÁËÀ´×ÔGitHubµÈƽ̨µÄ¾ç±¾ºÍ¹¤¾ß£¬£¬£¬£¬²¢Í¨¹ýTelegram½«Ð§ÀÍÇ®±Ò»¯£¬£¬£¬£¬ÌṩDDoS¹¥»÷ÍýÏë¡£¡£¡£¡£Ö»¹ÜMatrixȱ·¦ÏȽø¹¦Ð§£¬£¬£¬£¬µ«ÕâЩ¹¤¾ßµÄ×é×°ºÍ²Ù×÷¶¼ºÜÊÇÈÝÒ×£¬£¬£¬£¬ÏÔʾ³öµÍÅÓºéˮƽ¼ÓÈëÕßËù´øÀ´µÄΣº¦Ô½À´Ô½´ó¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/ddos-campaign-exploits-iot-devices/
6. Array Networks SSL VPN ²úÆ·ÖеÄÎó²îÕý±»Æð¾¢Ê¹ÓÃ
11ÔÂ26ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂç·ÀÓù»ú¹¹CISAÊÕµ½Ö¤¾ÝÅú×¢£¬£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃSSL VPN²úÆ·Array Networks AGºÍvxAG ArrayOSÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬¸ÃÎó²î±»×·×ÙΪCVE-2023-28461£¬£¬£¬£¬ÑÏÖØÐÔÆÀ·Ö¸ß´ï9.8£¬£¬£¬£¬Òѱ»ÁÐÈëCISAµÄÒÑ֪ʹÓÃÎó²îĿ¼ÖС£¡£¡£¡£´ËÎó²î±£´æÓÚÒ×Êܹ¥»÷µÄURLÖУ¬£¬£¬£¬ÊÇÒ»¸öÉí·ÝÑéÖ¤²»µ±ÎÊÌ⣬£¬£¬£¬ÔÊÐíÔÚArray AGϵÁкÍvxAG 9.4.0.481¼°¸üÔç°æ±¾ÖÐÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£Array NetworksÔÚÎó²îÅû¶һÖܺóÐû²¼ÁËÐÞ¸´°æ±¾Array AG 9.4.0.484¡£¡£¡£¡£Array NetworksµÄSSL VPN²úÆ·±»È«ÇòÁè¼Ý5000¸ö¿Í»§Ê¹Ó㬣¬£¬£¬°üÀ¨ÆóÒµ¡¢Ð§ÀÍÌṩÉ̺ÍÕþ¸®»ú¹¹¡£¡£¡£¡£CISA½¨ÒéËùÓÐÁª°î»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯ÔÚ12ÔÂ16ÈÕ֮ǰӦÓÃÇå¾²¸üлò½ÓÄÉ»º½â²½·¥£¬£¬£¬£¬²»È»Ó¦×èֹʹÓøòúÆ·¡£¡£¡£¡£Çå¾²¸üпÉͨ¹ýArrayÖ§³ÖÃÅ»§»ñÈ¡£¡£¡£¡£¬£¬£¬£¬µ«¹©Ó¦ÉÌÌṩµÄ»º½â²½·¥¿ÉÄÜ»á¶Ô¿Í»§¶ËÇå¾²¹¦Ð§±¬·¢¸ºÃæÓ°Ï죬£¬£¬£¬Òò´Ë×éÖ¯Ó¦Ê×ÏȲâÊÔÆäЧ¹û¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-bug-in-array-networks-ssl-vpn-products/


¾©¹«Íø°²±¸11010802024551ºÅ