ÐÂÐÍFireScamÐÅÏ¢ÇÔÈ¡ÌØ¹¤Èí¼þαװ³ÉTelegram Premium
Ðû²¼Ê±¼ä 2025-01-061. ÐÂÐÍFireScamÐÅÏ¢ÇÔÈ¡ÌØ¹¤Èí¼þαװ³ÉTelegram Premium
1ÔÂ4ÈÕ£¬£¬£¬£¬Ò»ÖÖÃûΪ¡°FireScam¡±µÄÐÂÐÍ Android ¶ñÒâÈí¼þÕýÔÚͨ¹ý GitHub ÉϵĴ¹ÂÚÍøÕ¾ÒÔ Telegram Ó¦ÓóÌÐòµÄ¸ß¼¶°æ±¾¾ÙÐÐÈö²¥£¬£¬£¬£¬ÕâÐ©ÍøÕ¾Ä£ÄâÁ˶íÂÞË¹ÒÆ¶¯×°±¸Ó¦ÓóÌÐòÊг¡ RuStore¡£¡£¡£¡£ÕâЩ´¹ÂÚÍøÕ¾Ê¹ÓöíÂÞ˹Óû§¶ÔÒÆ¶¯Èí¼þ»á¼ûÊÜÏÞµÄÅä¾°£¬£¬£¬£¬ÌṩֲÈëÆ÷Ä£¿£¿£¿£¿£¿éGetAppsRu.apk£¬£¬£¬£¬¸ÃÄ£¿£¿£¿£¿£¿éʹÓÃDexGuard»ìÏýÒÔÌӱܼì²â²¢»ñÈ¡¶àÖÖȨÏÞ¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬Ëü×°ÖÃÖ÷ÒªµÄ¶ñÒâÈí¼þ¸ºÔØ¡°Telegram Premium.apk¡±£¬£¬£¬£¬ÇëÇó¼à¿ØÍ¨Öª¡¢¼ôÌù°åÊý¾Ý¡¢¶ÌÐź͵绰ЧÀ͵ÈȨÏÞ¡£¡£¡£¡£FireScamÖ´Ðк󣬣¬£¬£¬»áÏÔʾһ¸öÓÕÆÐÔµÄTelegramµÇÂ¼Ò³Ãæ£¬£¬£¬£¬ÇÔÈ¡Óû§Æ¾Ö¤£¬£¬£¬£¬²¢ÓëFirebaseʵʱÊý¾Ý¿âͨѶ£¬£¬£¬£¬ÉÏ´«±»µÁÊý¾Ý²¢×¢²áÊÜѬȾװ±¸¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ëü»¹½¨É賤ÆÚµÄWebSocketÅþÁ¬ÒÔÖ´ÐÐʵʱÏÂÁ£¬£¬£¬¼à¿ØÆÁÄ»»î¶¯×ª±ä¡¢µç×ÓÉÌÎñÉúÒâÒÔ¼°Óû§ÊäÈëºÍ¼ôÌù°åÄÚÈÝ£¬£¬£¬£¬ÉõÖÁ×èµ²×Ô¶¯Ìî³äÊý¾Ý¡£¡£¡£¡£Ö»¹ÜÉÐδȷ¶¨FireScamµÄÔËÓªÕߣ¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪËüÊÇÒ»ÖÖÖØ´óÇÒ½ÓÄÉÏȽø¹æ±ÜÊÖÒÕµÄÍþв¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬Óû§Ó¦ÉóÉ÷¿´´ýÀ´×ÔDZÔÚ²»ÊÜÐÅÈÎȪԴµÄÎļþºÍ²»ÊìϤµÄÁ´½Ó¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-firescam-android-data-theft-malware-poses-as-telegram-premium-app/
2. UpdraftPlus²å¼þÑÏÖØÇå¾²Îó²îCVE-2024-10957ÆØ¹â
1ÔÂ4ÈÕ£¬£¬£¬£¬È«ÇòÓÐÁè¼Ý300Íò¸öWordPressÍøÕ¾Ê¹ÓõÄUpdraftPlus±¸·ÝºÍǨáã²å¼þÖз¢Ã÷ÁËÒ»¸öÑÏÖØÇå¾²Îó²î£¬£¬£¬£¬±àºÅΪCVE-2024-10957£¬£¬£¬£¬CVSSÆÀ·ÖΪ8.8¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ²å¼þµÄrecursive_unserialized_replaceº¯ÊýÖУ¬£¬£¬£¬ÓÉÓÚδ׼ȷ´¦Öóͷ£²»ÊÜÐÅÈεÄÊäÈë·´ÐòÁл¯£¬£¬£¬£¬¿ÉÄܵ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓÃPHP¹¤¾ß×¢ÈëÎó²î¡£¡£¡£¡£Ö»¹ÜUpdraftPlus×Ô¼ºÃ»ÓÐÒÑÖªµÄPHP¹¤¾ßPOPÁ´£¬£¬£¬£¬µ«ÆäËûÒ×Êܹ¥»÷µÄ²å¼þ»òÖ÷Ìâ¿ÉÄÜʹ¹¥»÷ÕßÄܹ»É¾³ýí§ÒâÎļþ¡¢»á¼ûÃô¸ÐÊý¾Ý»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£Ö÷ÒªµÄÊÇ£¬£¬£¬£¬´ËÎó²îÐèÒªÖÎÀíÔ±ÔÚ²å¼þÄÚÖ´ÐÐËÑË÷ºÍÌæ»»²Ù×÷²Å»ª´¥·¢¶ñÒâ¸ºÔØ¡£¡£¡£¡£Çå¾²Ñо¿Ô±WebbernautÒò·¢Ã÷²¢ÈÏÕæÈεØÅû¶´ËÎó²î¶øÊܵ½ÔÞÓþ¡£¡£¡£¡£´ËÎó²îÓ°ÏìUpdraftPlusµÄËùÓа汾£¬£¬£¬£¬Ö±ÖÁ1.24.11°æ£¬£¬£¬£¬´ó×ÚWordPressÍøÕ¾¿ÉÄÜÃæÁÙΣº¦¡£¡£¡£¡£UpdraftPlusÍŶÓÒÑÔÚ1.24.12°æ±¾Öнâ¾öÁË´ËÎó²î£¬£¬£¬£¬½¨ÒéËùÓÐÓû§Á¬Ã¦¸üÐÂÖÁ¸Ã°æ±¾¡£¡£¡£¡£
https://securityonline.info/cve-2024-10957-exposes-over-3-million-wordpress-sites-to-unauthenticated-php-object-injection-exploits/
3. NessusÊðÀíÒò¸üйýʧÏÂÏߣ¬£¬£¬£¬TenableÒªÇó¿Í»§ÊÖ¶¯Éý¼¶»Ö¸´
1ÔÂ3ÈÕ£¬£¬£¬£¬Tenable¹«Ë¾½üÆÚÔâÓöÁËÒ»´ÎÈí¼þ¸üйýʧ£¬£¬£¬£¬µ¼ÖÂÆäNessusÎó²îɨÃèÆ÷ÊðÀíÔÚ12ÔÂ31ÈÕ¶Ô²¿·ÖÓû§ÏÂÏß¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°ÏìÁËÈ«Çò¶à¸öµØÇø£¬£¬£¬£¬ÌØÊâÊÇÄÇЩ¸üÐÂÖÁNessus Agent°æ±¾10.8.0ºÍ10.8.1µÄϵͳ¡£¡£¡£¡£ÎªÁËÓ¦¶ÔÕâÒ»ÎÊÌ⣬£¬£¬£¬TenableѸËÙ³·ÏÂÁËÓÐÎÊÌâµÄ°æ±¾£¬£¬£¬£¬²¢Ðû²¼ÁËа汾10.8.2ÒÔÐÞ¸´Îó²î¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ÊÜÓ°ÏìµÄ¿Í»§ÐèÒªÊÖ¶¯Éý¼¶µ½Ð°汾»ò½µ¼¶µ½10.7.3°æ±¾²Å»ªÊ¹ÊðÀíÖØÐÂÉÏÏß¡£¡£¡£¡£ÈôÊÇʹÓÃÁËÊðÀíÉèÖÃÎļþ¾ÙÐÐÉý¼¶»ò½µ¼¶£¬£¬£¬£¬»¹ÐèÒªÌØÊâÖØÖòå¼þ¡£¡£¡£¡£TenableÍýÏë»Ö¸´²å¼þ¹©¸å£¬£¬£¬£¬²¢ÌáÐÑËùÓÐÔËÐÐÊÜÓ°Ïì°æ±¾µÄ¿Í»§¾¡¿ì½ÓÄÉÐж¯¡£¡£¡£¡£´Ë´ÎÊÂÎñËäδÔì³É´óÃæ»ýÖÐÖ¹£¬£¬£¬£¬µ«ÀàËÆµÄÎÊÌâÔÚ2024Äê7ÔÂÓÉCrowdStrike Falcon¸üйýʧÒý·¢Ê±£¬£¬£¬£¬Ôøµ¼ÖÂÈ«Çò¶à¸ö×éÖ¯ºÍЧÀ͵Ä̱»¾£¬£¬£¬£¬°üÀ¨ÒøÐС¢º½¿Õ¹«Ë¾µÈÖ÷Òª»ú¹¹¡£¡£¡£¡£ÕâÔÙ´ÎÌáÐÑÁËÍøÂçÇå¾²¸üеÄÖ÷ÒªÐÔºÍDZÔÚΣº¦¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bad-tenable-plugin-updates-take-down-nessus-agents-worldwide/
4. Atos·ñ¶¨Space BearsÀÕË÷Èí¼þÍÅ»ïÈëÇÖÆäÊý¾Ý¿â
1ÔÂ3ÈÕ£¬£¬£¬£¬·¨¹ú¿Æ¼¼¾ÞÍ·Atos£¬£¬£¬£¬×Ô³ÆÅ·ÖÞÁìÏȵÄÍøÂçÇå¾²¡¢ÔÆÅÌËãºÍ¸ßÐÔÄÜÅÌË㹫˾£¬£¬£¬£¬¿ËÈÕ·ñ¶¨ÁËSpace BearsÀÕË÷Èí¼þÍÅ»ï¹ØÓÚÈëÇÖÆäÊý¾Ý¿âµÄÖ¸¿Ø¡£¡£¡£¡£Space BearsÊÇÒ»¸öÏà¶Ô½ÏеÄÍøÂç·¸·¨×éÖ¯£¬£¬£¬£¬Ê¹ÓÃË«ÖØÀÕË÷ÊֶΣ¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢ÍþвÔÚÍøÉÏй¶£¬£¬£¬£¬ÒÔÆÈʹÊܺ¦ÕßÖ§¸¶Êê½ð¡£¡£¡£¡£12ÔÂ28ÈÕ£¬£¬£¬£¬Space BearsÉù³ÆÈëÇÖÁËAtosÍøÂç²¢ÍýÏëÐû²¼ÇÔÈ¡µÄ¹«Ë¾Êý¾Ý¿â¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬AtosÔÚ12ÔÂ29ÈÕÌåÏÖÆðÔ´ÆÊÎöδ·¢Ã÷ÈκÎÈëÇÖ»òÀÕË÷Èí¼þÓ°ÏìµÄÖ¤¾Ý£¬£¬£¬£¬Ò²Î´ÊÕµ½Êê½ðÒªÇ󡣡£¡£¡£Atos½øÒ»²½Ö¸³ö£¬£¬£¬£¬Space BearsÏÖʵ¹¥»÷µÄÊÇÓëAtosÎ޹صÄÍⲿµÚÈý·½»ù´¡ÉèÊ©£¬£¬£¬£¬ËäÈ»´æ´¢ÁËÌá¼°AtosµÄÊý¾Ý£¬£¬£¬£¬µ«²¢²»ÊÜAtosÖÎÀí»ò±£»£»£»£»£»¤¡£¡£¡£¡£AtosÇ¿µ÷ÆäÔÚÈ«ÇòÓµÓÐÁè¼Ý6,500ÃûÇ徲ר¼ÒºÍ17¸öÐÂÒ»´úÇå¾²ÔËÓªÖÐÐÄ£¬£¬£¬£¬È«ÌìºòÔËÓªÒÔÈ·±£¼¯Íż°Æä¿Í»§µÄÇå¾²¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/french-govt-contractor-atos-denies-space-bears-ransomware-attack-claims/
5. ÀïÊ¿Âú´óѧҽѧÖÐÐÄÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬67ÍòÓàÈËÊý¾Ýй¶
1ÔÂ3ÈÕ£¬£¬£¬£¬Å¦Ô¼ÀïÊ¿Âú´óѧҽѧÖÐÐÄ£¨RUMC£©ÔÚ2023Äê5ÔÂÔâÊÜÁËÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ¼ÖÂҽԺЧÀÍÖÐÖ¹ÊýÖÜ£¬£¬£¬£¬²¢Ó°ÏìÁË674,033ÈË¡£¡£¡£¡£Ö»¹ÜÃæÁÙÌôÕ½£¬£¬£¬£¬Ò½ÔºÈÔά³ÖÁËÖÜÈ«µÄ»¼ÕßЧÀÍ£¬£¬£¬£¬²¢½«Ò¹¼ä´´É˺ÍÖзçÕչ˻¤Ê¿µÄÖÐÖ¹ÏÞÖÆÔÚ×îµÍÏÞ¶È¡£¡£¡£¡£ÔÚÍøÂçÇå¾²¹«Ë¾µÄ×ÊÖúÏ£¬£¬£¬£¬Ò½ÔºÆð¾¢»Ö¸´ÏµÍ³²¢ÆÀ¹À¹¥»÷¹æÄ££¬£¬£¬£¬Í¬Ê±È·Èϵç×Ó¿µ½¡¼Í¼ϵͳδÊÜÓ°Ï죬£¬£¬£¬µ«ÆäËûÎļþ¿ÉÄÜÔÚ¹¥»÷ʱ´ú±»»á¼û»òɾ³ý¡£¡£¡£¡£RUMCÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬¿ÉÄÜÉæ¼°°üÀ¨Ð¡ÎÒ˽¼ÒºÍ¿µ½¡ÐÅÏ¢µÄÃô¸ÐÎļþ£¬£¬£¬£¬ÈçÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢½ðÈÚÕË»§ÐÅÏ¢µÈ¡£¡£¡£¡£Ò½ÔºÒÑ֪ͨÊÜÓ°ÏìµÄСÎÒ˽¼Ò²¢½¨ÒéËûÃǽÓÄɱ£»£»£»£»£»¤²½·¥£¬£¬£¬£¬Í¬Ê±ÎªÉç»áÇå¾²ºÅÂëй¶µÄСÎÒ˽¼ÒÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£¡£¡£Ö»¹ÜÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬µ«RUMCÒÑÏòÏà¹Ø²¿·Öת´ïÁ˸ÃÊÂÎñ£¬£¬£¬£¬²¢¼û¸æÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿´Ë´ÎÊý¾Ýй¶µÄÏêϸÈËÊý¡£¡£¡£¡£
https://securityaffairs.com/172641/data-breach/richmond-university-medical-center-data-breach.html
6. Nikki - UniversalÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬761.8GBÊý¾Ýй¶
1ÔÂ4ÈÕ£¬£¬£¬£¬Nikki - UniversalÓÐÏÞ¹«Ë¾ÊÇÒ»¼Ò×ÅÃûµÄ»¯Ñ§ÖÆÔìÉÌ£¬£¬£¬£¬ÓÚ2024Äê12ÔÂ27ÈÕ֤ʵÔâÊÜÁËÀ´×ÔHunters InternationalÀÕË÷Èí¼þ×éÖ¯µÄÖØ´ó¹¥»÷¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÔÚ12ÔÂ22ÈÕ£¬£¬£¬£¬µ¼Ö¹«Ë¾²¿·ÖЧÀÍÆ÷Éϵĵç×ÓÊý¾Ý±»¼ÓÃÜ£¬£¬£¬£¬Éæ¼°Êý¾ÝÁ¿¸ß´ï761.8GB£¬£¬£¬£¬°üÀ¨476,342¸öÎļþ¡£¡£¡£¡£Hunters InternationalÒÔÆä¼¤½øÊÖ¶ÎÖø³Æ£¬£¬£¬£¬Éù³ÆÈôδÔÚ»®¶¨ÈÕÆÚ£¨2025Äê1ÔÂ10ÈÕ£©Ç°ÊÕµ½Êê½ð£¬£¬£¬£¬½«¹ûÕæËùÓÐÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£Nikki - UniversalËäѸËÙÏìÓ¦²¢Æð¾¢ÊӲ죬£¬£¬£¬µ«ÈÔδÄÜ×èÖ¹¹¥»÷´øÀ´µÄË𺦡£¡£¡£¡£Hunters InternationalµÄ¼ÓÈë½øÒ»²½¼Ó¾çÁËÊ±ÊÆµÄÖØ´óÐÔ£¬£¬£¬£¬ÆäÐû³ÆÒÑ»ñÈ¡²¢¼ÓÃÜÊý¾Ý£¬£¬£¬£¬¶ÔNikki - UniversalµÄÍøÂçÇå¾²×é³ÉÑÏÖØÍþв£¬£¬£¬£¬²¢¿ÉÄÜÒý·¢¶àÖÖÍøÂçÍþвÓëÉùÓþΣº¦¡£¡£¡£¡£ÍøÂçÇ徲ר¼ÒÕ¹Íû£¬£¬£¬£¬Ëæ×ÅÈ˹¤ÖÇÄܺÍÁ¿×ÓÅÌËãµÄÉú³¤£¬£¬£¬£¬2025ÄêÍøÂç¹¥»÷µÄÖØÆ¯ºóºÍƵÂʽ«½øÒ»²½ÔöÌí£¬£¬£¬£¬ÒªÇó×éÖ¯±ØÐèÇ¿»¯·ÀÓù²½·¥¡£¡£¡£¡£
https://cybersecuritynews.com/nikki-universal-cyber-attack/


¾©¹«Íø°²±¸11010802024551ºÅ