NachoVPNÎó²î£º¶ñÒâVPN·þÎñÆ÷ʹÓÃδÐÞ²¹¿Í»§¶ËʵÑé¹¥»÷
Ðû²¼Ê±¼ä 2024-11-2711ÔÂ26ÈÕ£¬Ò»×éÃûΪ¡°NachoVPN¡±µÄÎó²îÔÊÐí¶ñÒâVPN·þÎñÆ÷ʹÓÃδÐÞ²¹µÄPalo AltoºÍSonicWall SSL-VPN¿Í»§¶Ë¾ÙÐй¥»÷£¬Í¨¹ýÓÕÆÓû§ÅþÁ¬ÖÁ¹¥»÷Õß¿ØÖƵÄVPN·þÎñÆ÷£¬½ø¶øÇÔÈ¡µÇ¼ƾ֤¡¢Ö´ÐÐí§Òâ´úÂë¡¢×°ÖöñÒâÈí¼þ»òÌᳫ´úÂëÊðÃûαÔì¼°ÖÐÐÄÈ˹¥»÷¡£AmberWolfÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÕâÒ»Íþв£¬²¢ÔÚÎó²îÊ״α¨¸æºóÊýÔÂÄÚ£¬¼ûÖ¤ÁËSonicWallºÍPalo Alto NetworksÏà¼ÌÐû²¼Õë¶ÔCVE-2024-29014ºÍCVE-2024-5921Îó²îµÄ²¹¶¡¡£ÎªÁË·ÀÓù£¬SonicWall¿Í»§ÐèÉý¼¶ÖÁNetExtenderµÄÌض¨°æ±¾£¬¶øPalo Alto NetworksÔò½¨Òé×°Öøüа汾»òÔÚFIPS-CCģʽÏÂÔËÐÐVPN¿Í»§¶Ë¡£±ðµÄ£¬AmberWolf»¹Ðû²¼ÁËNachoVPN¿ªÔ´¹¤¾ß£¬¸Ã¹¤¾ßÄÜÄ£Äâ¶ñÒâVPN·þÎñÆ÷£¬Ö§³Ö¶àÖÖÆóÒµVPN²úÆ·£¬²¢ÃãÀøÉçÇøТ˳ÐÂÎó²îÐÅÏ¢¡£Í¬Ê±£¬¸Ã¹«Ë¾»¹ÌṩÁËÓйØÕâÁ½¸öÎó²îµÄ¸ü¶àÊÖÒÕϸ½ÚºÍ·ÀÓù½¨Ò飬ÒÔ×ÊÖúÍøÂç·ÀÓùÕß±£»¤ÆäϵͳÃâÊÜDZÔÚ¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/new-nachovpn-attack-uses-rogue-vpn-servers-to-install-malicious-updates/
2. ¶íÂÞ˹ºÚ¿ÍRomComʹÓÃFirefoxºÍTorÁãÈÕÎó²îÌᳫ¹¥»÷
11ÔÂ27ÈÕ£¬½üÆÚ¶íÂÞ˹ºÚ¿Í×éÖ¯RomComʹÓÃÁËÁ½¸öÁãÈÕÎó²î£¬ÏòʹÓÃFirefox»òTorä¯ÀÀÆ÷µÄÓû§·¢ÉäÁ˶ñÒâ´úÂë¡£ÕâЩÎó²î»®·ÖÓ°ÏìÁËMozillaÈí¼þºÍWindowsϵͳ£¬ÆäÖÐÒ»¸öÎó²î£¨CVE-2024-9680£©Ê¹µÃ»á¼ûÊÜѬȾÍøÕ¾µÄÈκÎÈ˶¼»áÎÞÒâʶµØÏÂÔØRomComºóÃÅ£¬¶øÎÞÐèÈκεã»÷¡£ÐÒÔ˵ÄÊÇ£¬ÕâÁ½¸öÎó²î¶¼»ñµÃÁË¿ìËÙÐÞ¸´£¬MozillaÔÚÊÕµ½Í¨Öªºó25СʱÄÚ¾ÍÐÞ²¹ÁËFirefoxÖеÄÎó²î£¬¶øWindowsÖеÄÎó²î£¨CVE-2024-49039£©Ò²ÔÚºóÐø»ñµÃÐÞ¸´¡£RomComͨ¹ýÌØÖÆÍøÕ¾´¥·¢Îó²î£¬ÕâЩÍøվģÄâÁËÕæʵ×éÖ¯µÄÍøÕ¾£¬°üÀ¨ConnectWise¡¢DevolutionsºÍCorrectivµÈ¡£ËäÈ»Torä¯ÀÀÆ÷Ò²»ùÓÚFirefox£¬µ«ESET×·×ÙµÄÊܺ¦ÕßÖÐûÓÐÒ»ÈËÊÇͨ¹ýTorÊܵ½¹¥»÷µÄ£¬¿ÉÄÜÊÇÓÉÓÚTorµÄijЩÉèÖÃÓëFirefox²î±ð¡£RomComµÄÖ÷ҪĿµÄËƺõÊǹ«Ë¾£¬¾ø´ó´ó¶¼Êܺ¦ÕßλÓÚ±±ÃÀºÍÅ·ÖÞ£¬µ«ÐÂÎ÷À¼ºÍ·¨Êô¹çÑÇÄÇÒ²ÓÐÁãÐÇÊܺ¦Õß¡£
https://www.darkreading.com/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor
3. RansomHub×éÖ¯Éù³Æ¶ÔÁ½ÊÐÕþ¸®·¢¶¯ÀÕË÷¹¥»÷
11ÔÂ27ÈÕ£¬ÍøÂç·¸·¨×éÖ¯RansomHubÉù³Æ¶ÔµÂ¿ËÈø˹ÖÝ¿ÆÅå¶ûÊм°Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»á·¢¶¯ÁËÀÕË÷Èí¼þ¹¥»÷£¬Òý·¢ÆÕ±é¹Ø×¢¡£¿ÆÅå¶ûÊÐÔâÊܹ¥»÷ºó£¬»¥ÁªÍø¡¢Í¼Êé¹Ý·þÎñ¡¢ÔÊÐíºÍ¼ì²éƽ̨¼°Êз¨ÔºµÈ¶à¸öϵͳ̱»¾£¬¸øÍâµØסÃñ´øÀ´ÑÏÖØÀ§ÈÅ¡£Ö»¹ÜÊÐÕþ¸®Æð¾¢»Ö¸´£¬µ«Ö±ÖÁ11ÔÂÏÂÑ®£¬²¿·ÖÊÐÕþÔËÓª²Å½Ðø»Ö¸´¡£Í¬Ê±£¬Ã÷Äá°¢²¨Àû˹¹«Ô°ºÍÓéÀÖίԱ»áÒ²±¨¸æÆäÊÖÒÕϵͳÔâµ½¹¥»÷£¬µç»°Ïß·ÖÐÖ¹£¬ÕýÔÚÆð¾¢È·¶¨ÐÅϢй¶ÇéÐΡ£RansomHub½ñÄêѸËÙáÈÆð£¬ÒѶԻú³¡¡¢Ò½ÁÆ»ú¹¹¡¢ÖÆÔ칫˾ºÍÒªº¦»ù´¡ÉèÊ©µÈÊý°Ù¸ö×éÖ¯·¢¶¯¹¥»÷¡£×Ô2Ô·ÝÒÔÀ´£¬ÒÑÓÐÔ¼210¸ö×éÖ¯³ÉΪÆäÊܺ¦Õß¡£¸Ã×éÖ¯×î³õ·ºÆðÔÚÍŽ῵½¡¼¯ÍÅÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó£¬ËæºóÒòÁíÒ»ÀÕË÷Èí¼þÍŻﵹ±Õ¶ø׳´ó£¬¶ÔÊý¾Ý¾ÙÐгöÊÛ¡£½ñÄ꣬RansomHub»¹¹¥»÷Á˶àÆð±¸ÊÜÖõÄ¿µÄÄ¿µÄ£¬°üÀ¨µçОÞÍ·Frontier¡¢Rite Aid¡¢Ó¢¹úÅÄÂôÐÐChristie¡¯sµÈ¡£
https://therecord.media/ransomhub-cybercrime-coppell-texas-minneapolis-parks-agency
4. ÈûÂ׸ǵÙÐж¯£º·ÇÖÞÖ´·¨»ú¹¹ÑÏË๥»÷ÍøÂç·¸·¨
11ÔÂ26ÈÕ£¬·ÇÖÞÖ´·¨»ú¹¹ÔÚ¹ú¼ÊÐ̾¯×éÖ¯ºÍ·ÇÖÞÐ̾¯×éÖ¯µÄе÷Ï£¬ÓÚ9ÔÂ2ÈÕÖÁ10ÔÂ31ÈÕʱ´ú¿ªÕ¹ÁËÃûΪ¡°ÈûÂ׸ǵÙÐж¯¡±µÄ¹¥»÷ÍøÂç·¸·¨Ô˶¯¡£´Ë´ÎÐж¯Õë¶ÔÀÕË÷Èí¼þ¡¢ÉÌÒµµç×ÓÓʼþй¶¡¢Êý×ÖÀÕË÷ºÍÍøÂçթƵȷ¸·¨ÐÐΪ£¬Éæ¼°19¸ö·ÇÖÞ¹ú¼Ò£¬¹²¾Ð²¶ÁË1006ÃûÏÓÒÉÈË£¬´Ý»ÙÁË134089¸ö¶ñÒâ»ù´¡ÉèÊ©ºÍÍøÂç¡£¾ÝÊӲ죬ÕâЩ·¸·¨Ô˶¯ÓëÖÁÉÙ35224ÃûÒÑÈ·ÈÏÉí·ÝµÄÊܺ¦ÕßÓйأ¬Ôì³ÉÁ˽ü1.93ÒÚÃÀÔªµÄ¾¼ÃËðʧ£¬ÆäÖÐÈûÂ׸ǵÙÐж¯×·»ØÁËԼĪ4400ÍòÃÀÔª¡£Ðж¯ÖеÄÁÁµã°üÀ¨¿ÏÄáÑÇÆÆ»ñÒ»ÆðÍøÉÏÐÅÓÿ¨Õ©Æ°¸£¬ÈûÄÚ¼Ó¶ûµ·»ÙÒ»ÆðÅÓÊÏȦÌ×£¬ÄáÈÕÀûÑǾв¶Ò»ÃûʵÑéÍøÉÏͶ×ÊթƵÄÄÐ×Ó£¬¿¦Âó¡ÆÆ»ñ¶àÌõÀíÓªÏúȦÌ×£¬ÒÔ¼°°²¸çÀµ·»ÙÒ»¸öÐéÄâ¶Ä³¡¹ú¼Ê¼¯ÍÅ¡£¼ÓÈë´Ë´ÎÐж¯µÄ¹ú¼ÒÉÐÓа¢¶û¼°ÀûÑÇ¡¢±´Äþ¡¢¿ÆÌصÏÍß¡¢¸Õ¹ûÃñÖ÷¹²ºÍ¹ú¡¢¼ÓÅî¡¢¼ÓÄÉ¡¢Ã«ÀïÇó˹¡¢ÄªÉ£±È¿Ë¡¢Â¬Íú´ï¡¢ÄÏ·Ç¡¢Ì¹É£ÄáÑÇ¡¢Í»Äá˹¡¢ÔÞ±ÈÑǺͽò°Í²¼Î¤¡£
https://www.bleepingcomputer.com/news/security/over-1-000-arrested-in-massive-serengeti-anti-cybercrime-operation/
5. Matrix·¢¶¯´ó¹æÄ£DDoS¹¥»÷£¬Ê¹ÓÃÎïÁªÍøºÍÆóÒµÎó²î
11ÔÂ26ÈÕ£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»³¡ÓÉÃûΪMatrixµÄÍþвÐÐΪÕ߲߻®µÄ´ó¹æÄ£ÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷Ô˶¯£¬¸ÃÔ˶¯Ê¹Óÿɻá¼ûµÄ¹¤¾ßÕë¶ÔÎïÁªÍø×°±¸ºÍÆóÒµ·þÎñÆ÷¡£MatrixµÄ¹¥»÷¿ò¼Ü¾ÓÉÏêϸÆÊÎö£¬Ö÷ҪʹÓû¥ÁªÍøÅþÁ¬Éè±¹ØÁ¬ÄÎó²îºÍ¹ýʧÉèÖã¬Í¨¹ý±©Á¦¹¥»÷¡¢Èõƾ֤ºÍÒÑÖªÎó²î¹¹½¨½©Ê¬ÍøÂç¡£¹¥»÷µÄÖ÷ÒªÌØÕ÷°üÀ¨Õë¶Ô·ÓÉÆ÷¡¢DVRºÍIPÉãÏñ»ú¡¢ÆóÒµÐæźÍÎïÁªÍø×°±¸µÄÎó²îʹÓá£ÕâЩ¹¥»÷ÑÏÖØÒÀÀµÄ¬ÈÏ»òÈõÃÜÂ룬ǿµ÷ÁËδÄܽÓÄÉ»ù±¾Çå¾²²½·¥»áʹװ±¸ÃæÁÙÈëÇÖµÄΣº¦¡£MatrixµÄÄ¿µÄ°üÀ¨ÔÆ·þÎñÌṩÉÌ¡¢Ð¡ÐÍÆóÒµºÍÎïÁªÍø÷缯µØÇø£¬ÊÜÓ°ÏìµÄ×°±¸¿ÉÄܶà´ï3500Íǫ̀¡£MatrixʹÓÃÁËÀ´×ÔGitHubµÈƽ̨µÄ¾ç±¾ºÍ¹¤¾ß£¬²¢Í¨¹ýTelegram½«·þÎñÇ®±Ò»¯£¬ÌṩDDoS¹¥»÷ÍýÏë¡£Ö»¹ÜMatrixȱ·¦ÏȽø¹¦Ð§£¬µ«ÕâЩ¹¤¾ßµÄ×é×°ºÍ²Ù×÷¶¼ºÜÊÇÈÝÒ×£¬ÏÔʾ³öµÍÅÓºéˮƽ¼ÓÈëÕßËù´øÀ´µÄΣº¦Ô½À´Ô½´ó¡£
https://www.infosecurity-magazine.com/news/ddos-campaign-exploits-iot-devices/
6. Array Networks SSL VPN ²úÆ·ÖеÄÎó²îÕý±»Æð¾¢Ê¹ÓÃ
11ÔÂ26ÈÕ£¬ÃÀ¹úÍøÂç·ÀÓù»ú¹¹CISAÊÕµ½Ö¤¾ÝÅú×¢£¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃSSL VPN²úÆ·Array Networks AGºÍvxAG ArrayOSÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬¸ÃÎó²î±»×·×ÙΪCVE-2023-28461£¬ÑÏÖØÐÔÆÀ·Ö¸ß´ï9.8£¬Òѱ»ÁÐÈëCISAµÄÒÑ֪ʹÓÃÎó²îĿ¼ÖС£´ËÎó²î±£´æÓÚÒ×Êܹ¥»÷µÄURLÖУ¬ÊÇÒ»¸öÉí·ÝÑéÖ¤²»µ±ÎÊÌ⣬ÔÊÐíÔÚArray AGϵÁкÍvxAG 9.4.0.481¼°¸üÔç°æ±¾ÖÐÖ´ÐÐÔ¶³Ì´úÂë¡£Array NetworksÔÚÎó²îÅû¶һÖܺóÐû²¼ÁËÐÞ¸´°æ±¾Array AG 9.4.0.484¡£Array NetworksµÄSSL VPN²úÆ·±»È«ÇòÁè¼Ý5000¸ö¿Í»§Ê¹Ó㬰üÀ¨ÆóÒµ¡¢·þÎñÌṩÉ̺ÍÕþ¸®»ú¹¹¡£CISA½¨ÒéËùÓÐÁª°î»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯ÔÚ12ÔÂ16ÈÕ֮ǰӦÓÃÇå¾²¸üлò½ÓÄÉ»º½â²½·¥£¬²»È»Ó¦×èֹʹÓøòúÆ·¡£Çå¾²¸üпÉͨ¹ýArrayÖ§³ÖÃÅ»§»ñÈ¡£¬µ«¹©Ó¦ÉÌÌṩµÄ»º½â²½·¥¿ÉÄÜ»á¶Ô¿Í»§¶ËÇå¾²¹¦Ð§±¬·¢¸ºÃæÓ°Ï죬Òò´Ë×éÖ¯Ó¦Ê×ÏȲâÊÔÆäЧ¹û¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-bug-in-array-networks-ssl-vpn-products/