CISAÖÒÑÔFortiOSÑÏÖØRCEÎó²îÕý±»Æð¾¢Ê¹ÓÃ

Ðû²¼Ê±¼ä 2024-10-11

1. CISAÖÒÑÔFortiOSÑÏÖØRCEÎó²îÕý±»Æð¾¢Ê¹ÓÃ


10ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬CISA͸¶¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓÃÒ»¸öÑÏÖØµÄFortiOSÔ¶³Ì´úÂëÖ´ÐÐ(RCE)Îó²î£¨CVE-2024-23113£©¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÉfgfmdÊØ»¤Àú³Ì½ÓÊÜÍⲿ¿ØÖƵÄÃûÌÃ×Ö·û´®×÷Ϊ²ÎÊýÒýÆð£¬£¬£¬£¬£¬£¬£¬Ê¹µÃδ¾­Éí·ÝÑéÖ¤µÄÍþвÐÐΪÕßÄܹ»ÔÚδÐÞ²¹µÄ×°±¸ÉÏÖ´ÐÐÏÂÁî»òí§Òâ´úÂ룬£¬£¬£¬£¬£¬£¬ÇÒÎÞÐèÓû§½»»¥¡£¡£¡£¡£¡£¡£¡£¡£´ËÎó²îÓ°ÏìFortiOS 7.0¼°ÒÔÉϰ汾¡¢FortiPAM 1.0¼°ÒÔÉϰ汾¡¢FortiProxy 7.0¼°ÒÔÉϰ汾ÒÔ¼°FortiWeb 7.4¡£¡£¡£¡£¡£¡£¡£¡£FortinetÒÑÓÚÖÙ´º·ÝÅû¶²¢ÐÞ²¹Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬²¢½¨Òéɾ³ýËùÓнӿڶÔfgfmdÊØ»¤³ÌÐòµÄ»á¼ûȨÏÞ×÷Ϊ»º½â²½·¥¡£¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬CISAÒѽ«´ËÎó²îÌí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖУ¬£¬£¬£¬£¬£¬£¬ÒªÇóÃÀ¹úÁª°î»ú¹¹ÔÚ10ÔÂ30ÈÕ֮ǰ±£»£»£»£»¤ÆäÍøÂçÉϵÄFortiOS×°±¸ÃâÊÜÕâЩÕýÔÚ¾ÙÐеĹ¥»÷¡£¡£¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²»ú¹¹ÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬´ËÀàÎó²îÊǶñÒâÍøÂçÐÐΪÕ߯µÈÔ¹¥»÷µÄǰÑÔ£¬£¬£¬£¬£¬£¬£¬´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/


2. Ó¡¶ÈStar Health°ü¹Ü¹«Ë¾ÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬¿Í»§Êý¾ÝÒÉÔâй¶


10ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬Ó¡¶È×î´óµÄ¿µ½¡°ü¹Ü¹«Ë¾Ö®Ò»Star Health and Allied Insurance֤ʵÔâÊÜÁ˶ñÒâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂijЩÊý¾Ý±»Î´¾­ÊÚȨºÍ²»·¨»á¼û£¬£¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÔËӪδÊÜÓ°Ï죬£¬£¬£¬£¬£¬£¬Ð§ÀÍÈÔÔÚ¼ÌÐø¡£¡£¡£¡£¡£¡£¡£¡£Star HealthÌṩ¶àÖÖ°ü¹ÜЧÀÍ£¬£¬£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý1.7ÒÚÒ½Áưü¹Ü¿Í»§¡£¡£¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÉù³ÆÔÚÍøÉÏÐû²¼Á˿ͻ§µÄ¿µ½¡¼Í¼ºÍÆäËûÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯ÔÚTelegramÉϽ¨ÉèÁË̸Ìì»úеÈË£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶ÁË3100ÍòͶ±£È˺ÍÁè¼Ý580Íò·Ý°ü¹ÜË÷ÅâµÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£Star HealthÒÑÌáÆðËßËÏ¿ØËßTelegramºÍCloudflare£¬£¬£¬£¬£¬£¬£¬²¢Ö¸³öÆäÊ×ϯÐÅÏ¢Çå¾²¹ÙÒ»Ö±ÔÚÆð¾¢ÅäºÏÊӲ죬£¬£¬£¬£¬£¬£¬Î´·¢Ã÷ÆäÓÐÈκβ»µ±ÐÐΪ¡£¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÈëÇÖµÄϸ½ÚºÍºÚ¿ÍÔõÑù»ñÈ¡Êý¾ÝÈÔ²»ÇåÎú£¬£¬£¬£¬£¬£¬£¬°ü¹Ü¹«Ë¾Î´Í¸Â¶ÊÇ·ñ¿ÉÒÔÈ·ÈÏË­»á¼ûÁËÊý¾ÝÒÔ¼°ÄÄЩÊý¾ÝÒѱ»»á¼û»òÇÔÈ¡¡£¡£¡£¡£¡£¡£¡£¡£


https://techcrunch.com/2024/10/09/indias-star-health-confirms-data-breach-after-cybercriminals-post-customers-health-data-online/


3. ³¯ÏÊÍþвÕßÕë¶Ô¿Æ¼¼ÇóÖ°ÕßÍÆ¹ã¶ñÒâÈí¼þ


10ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬Ó볯ÏÊÓÐÁªÏµµÄÍþвÐÐΪÕß½«Ä¿µÄËø¶¨ÔڿƼ¼ÐÐÒµµÄÇóÖ°ÕßÉíÉÏ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÇóְƽ̨ÁªÏµÈí¼þ¿ª·¢Ö°Ô±£¬£¬£¬£¬£¬£¬£¬Ã°³äDZÔÚ¹ÍÖ÷Ô¼ÇëËûÃǼÓÈëÔÚÏßÃæÊÔ£¬£¬£¬£¬£¬£¬£¬²¢ÊÔͼ˵·þËûÃÇÏÂÔØ²¢×°ÖöñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÕâÊÇÃûΪ¡°Ñ¬È¾ÐÔ·Ã̸¡±µÄ»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯¼¯Èº±»×·×ÙΪCL-STA-0240£¬£¬£¬£¬£¬£¬£¬Éæ¼°ÒÑÖª¶ñÒâÈí¼þ¼Ò×åBeaverTailºÍInvisibleFerretµÄ¸üа汾¡£¡£¡£¡£¡£¡£¡£¡£µÚÒ»½×¶ÎÑ¬È¾Éæ¼°BeaverTailÏÂÔØ³ÌÐòºÍÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬£¬£¬¸Ã³ÌÐòרΪWindowsºÍApple macOSƽ̨Éè¼Æ£¬£¬£¬£¬£¬£¬£¬³äµ±»ùÓÚPythonµÄInvisibleFerretºóÃŵĹܵÀ¡£¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¸Ã»î¶¯Òѱ»¹ûÕæÅû¶£¬£¬£¬£¬£¬£¬£¬µ«ÈÔÓÐÖ¤¾ÝÅú×¢ËüÈÔÈ»»îÔ¾¡£¡£¡£¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±ºÍÍøÂçÇå¾²¹«Ë¾ÏêϸÐÎòÁËʹÓüÙÊÓÆµ¾Û»áÓ¦ÓóÌÐòMiroTalkºÍFreeConference.comÉøÍ¸µ½¿ª·¢Ö°Ô±ÏµÍ³ÖеĹ¥»÷Á´¡£¡£¡£¡£¡£¡£¡£¡£BeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡ä¯ÀÀÆ÷ÃÜÂë¡¢´Ó¶à¸ö¼ÓÃÜÇ®±ÒÇ®°üÖÐÍøÂçÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢ÏÂÔØ²¢Ö´ÐÐInvisibleFerretºóÃÅ£¬£¬£¬£¬£¬£¬£¬¸ÃºóÃŰüÀ¨Ö¸ÎÆÊ¶±ð¡¢Ô¶³Ì¿ØÖÆ¡¢¼üÅ̼ͼ¡¢Êý¾Ýй¶µÈ¹¦Ð§¡£¡£¡£¡£¡£¡£¡£¡£Unit 42ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Õâ´Î»î¶¯¿ÉÄܳöÓÚ¾­¼ÃÄîÍ·£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚBeaverTail¶ñÒâÈí¼þÄܹ»ÇÔÈ¡13¸ö²î±ðµÄ¼ÓÃÜÇ®±ÒÇ®°ü£¬£¬£¬£¬£¬£¬£¬³¯ÏÊÍþвÕß»á¾ÙÐнðÈÚ·¸·¨ÒԳO×ʽðÀ´Ö§³Ö³¯ÏÊÕþȨ¡£¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html


4. ºÚ¿ÍÉù³Æ¹¥»÷Dr.WebÇÔÈ¡10TBÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Òý·¢ÍøÂçÇå¾²ÐÐÒµµ£ÐÄ


10ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬¾ÝCyber Security News±¨µÀ£¬£¬£¬£¬£¬£¬£¬Ò»ÃûºÚ¿ÍÔÚºÚ¿ÍÂÛ̳DumpForumsÉÏÉù³Æ¶Ô¶íÂÞË¹ÖøÃûÍøÂçÇå¾²¹«Ë¾Dr.Web¾ÙÐÐÁ˹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡Á˸ߴï10TBµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£ºÚ¿ÍÉù³Æ´Ë´Î¹¥»÷¾­ÓÉÈ«ÐIJ߻®£¬£¬£¬£¬£¬£¬£¬ÀúʱÊýÌ죬£¬£¬£¬£¬£¬£¬ÀÖ³ÉÉøÍ¸µ½Dr.WebµÄÍâµØÍøÂ磬£¬£¬£¬£¬£¬£¬²¢Öð²½ÈëÇÖÆäЧÀÍÆ÷ºÍ×ÊÔ´£¬£¬£¬£¬£¬£¬£¬ÉõÖÁÉøÍ¸µ½ÁËÆä×îÇå¾²µÄ»ù´¡ÉèÊ©²¿·Ö¡£¡£¡£¡£¡£¡£¡£¡£ºÚ¿Í»¹Éù³Æ´ÓGitLabЧÀÍÆ÷¡¢¹«Ë¾ÓʼþЧÀÍÆ÷¡¢Confluence¡¢Redmine¡¢Jenkins¡¢Mantisϵͳ¡¢RocketChatͨѶƽ̨µÈ¶à¸öÒªº¦ÏµÍ³ÖÐÆÆ½â²¢Ð¹Â¶ÁËÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÒ»¸öÔÂÄÚδ±»·¢Ã÷µÄÇéÐÎÏ»á¼û²¢ÉÏ´«Á˿ͻ§¶ËÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜ̻¶ÁËDr.WebÓû§µÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬Dr.Web¹Ù·½ÉùÃ÷³Æ£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜÆäϵͳ×ÊÔ´ÔâÊÜÁËÓÐÕë¶ÔÐԵĹ¥»÷£¬£¬£¬£¬£¬£¬£¬µ«ÒÑÀֳɴì°ÜÁËÆÆËðÆä»ù´¡ÉèÊ©µÄÍýÏ룬£¬£¬£¬£¬£¬£¬Óû§¶Ë²úƷδÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£ÎªÔ¤·ÀÆð¼û£¬£¬£¬£¬£¬£¬£¬Dr.WebÒѶϿªËùÓÐ×ÊÔ´ÓëÍøÂçµÄÅþÁ¬¾ÙÐÐÑéÖ¤£¬£¬£¬£¬£¬£¬£¬²¢ÔÝÍ£Á˲¡¶¾¿âµÄÐû²¼¡£¡£¡£¡£¡£¡£¡£¡£Èô´Ëй¶ÐÐΪ»ñµÃ֤ʵ£¬£¬£¬£¬£¬£¬£¬½«¶ÔDr.WebÒÔÖÂÕû¸öÍøÂçÇå¾²ÐÐÒµÔì³ÉÖØ´ó¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢Òý·¢Óû§¶ÔÄ¿½ñ±£»£»£»£»¤²½·¥ÓÐÓÃÐÔµÄÖÊÒÉ¡£¡£¡£¡£¡£¡£¡£¡£


https://cybersecuritynews.com/dumpforums-10tb-data-dr-web/


5. AkiraºÍFogÀÕË÷Èí¼þʹÓÃÒªº¦µÄVeeam RCEÎó²î


10ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïʹÓÃVeeam Backup & Replication (VBR) ЧÀÍÆ÷ÉϵÄÒ»¸öÑÏÖØÇå¾²Îó²î£¨CVE-2024-40711£©£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÁËÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÉCode WhiteÇå¾²Ñо¿Ô±Florian Hauser·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ô´ÓÚ²»ÊÜÐÅÈÎÊý¾Ý·´ÐòÁл¯µÄÈõµã£¬£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒԽϵÍÖØÆ¯ºó·¢¶¯¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£VeeamÔÚ9ÔÂ4ÈÕÅû¶Á˸ÃÎó²î²¢Ðû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬¶øwatchTowr LabsÔòÔÚ9ÔÂ9ÈÕÐû²¼ÊÖÒÕÆÊÎö£¬£¬£¬£¬£¬£¬£¬µ«ÑÓ³ÙÖÁ9ÔÂ15ÈղŹûÕæ¿´·¨ÑéÖ¤Îó²î´úÂ룬£¬£¬£¬£¬£¬£¬ÒÔÈ·±£ÖÎÀíÔ±ÓÐ×㹻ʱ¼äÔöÇ¿·À»¤¡£¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚVBRÈí¼þÆÕ±éÓÃÓÚÊý¾Ý±£»£»£»£»¤ºÍÔÖÄѻָ´£¬£¬£¬£¬£¬£¬£¬³ÉΪ¶ñÒâÐÐΪÕßêéêìµÄÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£¡£Sophos X-OpsÊÂÎñÏìÓ¦Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îѸËÙ±»AkiraºÍFogÀÕË÷Èí¼þ¹¥»÷ʹÓ㬣¬£¬£¬£¬£¬£¬Á¬ÏµÖ®Ç°Ð¹Â¶µÄƾ֤£¬£¬£¬£¬£¬£¬£¬½«¡°µã¡±ÍâµØÕÊ»§Ìí¼Óµ½ÖÎÀíÔ±ºÍÔ¶³Ì×ÀÃæÓû§×é¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ³£Í¨¹ýδÆôÓöàÒòËØÉí·ÝÑéÖ¤µÄÊÜѬȾVPNÍø¹Ø»á¼ûÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬²¿·ÖVPNÔËÐв»ÊÜÖ§³ÖµÄÈí¼þ°æ±¾¡£¡£¡£¡£¡£¡£¡£¡£ÔÚFogÀÕË÷Èí¼þÊÂÎñÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃδ±£»£»£»£»¤µÄHyper-VЧÀÍÆ÷ºÍÊÊÓóÌÐòrcloneÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÏÔʾ³ö¸ß¶ÈµÄÖØµþÐÔºÍÏàËÆÐÔ£¬£¬£¬£¬£¬£¬£¬Åú×¢ÀÕË÷Èí¼þÍÅ»ïÕýÆð¾¢Ê¹ÓÃÕâÒ»Îó²î¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/akira-and-fog-ransomware-now-exploiting-critical-veeam-rce-flaw/


6. ¸»´ïͶ×ÊϵͳÔâÈëÇÖ£¬£¬£¬£¬£¬£¬£¬77,000Ãû¿Í»§ÐÅϢй¶


10ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚ²¨Ê¿¶ÙµÄ¿ç¹ú½ðÈÚЧÀ͹«Ë¾¸»´ïͶ×Ê£¬£¬£¬£¬£¬£¬£¬½üÆÚÔâÓöÁËÒ»´ÎϵͳÈëÇÖÊÂÎñ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý77,000Ãû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£¡£×÷ΪȫÇò×î´óµÄ×ʲúÖÎÀí¹«Ë¾Ö®Ò»£¬£¬£¬£¬£¬£¬£¬¸»´ïÖÎÀíµÄ×ʲú×ܶî¸ß´ï14.1ÍòÒÚÃÀÔª¡£¡£¡£¡£¡£¡£¡£¡£¾Ý¸»´ï͸¶£¬£¬£¬£¬£¬£¬£¬Õâ´ÎÈëÇÖ±¬·¢ÔÚ8ÔÂ17ÈÕÖÁ19ÈÕʱ´ú£¬£¬£¬£¬£¬£¬£¬Ò»ÃûÉí·Ý²»Ã÷µÄ¹¥»÷ÕßʹÓÃ×î½ü½¨ÉèµÄÁ½¸ö¿Í»§ÕË»§ÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£¸»´ïÔÚ·¢Ã÷ÕâÒ»»î¶¯ºóѸËÙ½ÓÄɲ½·¥ÖÕÖ¹ÁË»á¼û£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÍⲿÇ徲ר¼ÒµÄЭÖúÏÂÕö¿ªÁËÊӲ졣¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¸»´ïûÓÐ͸¶³ýÁËÐÕÃûºÍÆäËûСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ÍâÉÐÓÐÄÄЩÐÅÏ¢±»ÇÔÈ¡£¬£¬£¬£¬£¬£¬£¬µ«ËüÒÑÏòÊÜÓ°ÏìµÄ¿Í»§ÌṩÁËÁ½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£¡£¸»´ï»¹ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Ã»ÓÐÖ¤¾ÝÅú×¢±»µÁµÄ¿Í»§Êý¾Ý±»ÀÄÓ㬣¬£¬£¬£¬£¬£¬µ«ÈÔ½¨ÒéÊÜÓ°ÏìµÄ¿Í»§¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬£¬°´ÆÚ¼ì²éÕË»§±¨±í£¬£¬£¬£¬£¬£¬£¬¼à¿ØÐÅÓñ¨¸æ£¬£¬£¬£¬£¬£¬£¬²¢ÊµÊ±±¨¸æÈκοÉÒɻ¡£¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fidelity-investments-says-data-breach-affects-over-77-000-people/