MTN¼¯ÍÅÔâÍøÂçÇå¾²ÊÂÎñÖÂÓû§ÐÅϢй¶
Ðû²¼Ê±¼ä 2025-04-271. MTN¼¯ÍÅÔâÍøÂçÇå¾²ÊÂÎñÖÂÓû§ÐÅϢй¶
4ÔÂ25ÈÕ£¬·ÇÖÞÒÆ¶¯¾ÞÍ·MTN¼¯ÍÅ£¨Ç°ÉíΪM-Cell£©ÔâÓöÍøÂçÇå¾²ÊÂÎñ£¬²¿·Ö¹ú¼ÒÓû§Ð¡ÎÒ˽¼ÒÐÅÏ¢Ôâй¶¡£MTN¼¯ÍÅÊÇ·ÇÖÞ×î´óµÄÒÆ¶¯ÍøÂçÔËÓªÉÌ£¬ÓªÒµÁýÕÖ20¸ö¹ú¼Ò£¬ÓµÓнü3ÒÚÓû§£¬ÄêÊÕÈ볬110ÒÚÃÀÔª£¬ÇÒÔÚÑÇÖÞÊг¡Ó°ÏìÁ¦Ç¿Ê¢¡£´Ë´ÎÊÂÎñÖУ¬MTN¼¯ÍÅÇ¿µ÷Æä½¹µãÍøÂç¡¢¼Æ·ÑϵͳºÍ½ðÈÚ·þÎñ»ù´¡ÉèʩδÊܹ¥»÷Ó°Ï죬ÈÔÇå¾²ÇÒÖÜÈ«ÔËÐУ¬µ«ÒÑ×ÅÊÖÊÓ²ìÒÔÃ÷È·ÊÂÎñ¼òÖ±ÇйæÄ£ºÍÓ°Ïì¡£MTN¼¯ÍÅͨ¸æ³Æ£¬ÓС°Î´ÖªµÚÈý·½¡±Éù³Æ»á¼ûÁ˹«Ë¾Êý¾Ý£¬µ¼Ö²¿·ÖÊг¡²¿·Ö¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢±»Î´¾ÊÚȨ»á¼û¡£²»¹ý£¬MTNµÄÊÓ²ìÉÐδ֤ʵ¿Í»§Ç®°üºÍÕË»§Êܵ½Ë𺦣¬Ïêϸ̻¶ÐÅÏ¢Éв»Ã÷È·¡£ÊÂÎñ±¬·¢ºó£¬MTN¼¯ÍÅѸËÙ½ÓÄÉÐж¯£¬ÒÑ֪ͨÄϷǾ¯·½¼°Ïà¹Øî¿ÏµºÍÊý¾Ý±£»¤»ú¹¹ÐÖúÊӲ죬²¢ÍýÏ뾡¿ì֪ͨÊÜÓ°ÏìµÄ¿Í»§¡£Îª±£»¤¿Í»§ÃâÊܽøÒ»²½¹¥»÷£¬MTN¼¯ÍÅÌá³öһϵÁн¨Ò飬°üÀ¨ÉèÖÃڲƾ¯±¨¡¢¸üÐÂÓ¦ÓóÌÐò¡¢Ê¹ÓÃÇ¿ÃÜÂë¡¢×èÖ¹¿ÉÒÉÁ´½Ó²¢ÆôÓöàÒòËØÉí·ÝÑéÖ¤¡£×èÖ¹ÏÖÔÚ£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯¶Ô´ËÈÏÕæ¡£
https://www.bleepingcomputer.com/news/security/mobile-provider-mtn-says-cyberattack-compromised-customer-data/
2. SAP NetWeaverÑÏÖØÎó²îCVE-2025-31324Õý±»Æð¾¢Ê¹ÓÃ
4ÔÂ26ÈÕ£¬SAP NetWeaver Visual Composer±£´æÑÏÖØÎó²îCVE-2025-31324£¬Ê¹ÏµÍ³ÃæÁÙÍêÈ«ÈëÇÖΣº¦¡£Onapsis Threat Intelligence±¨¸æÏÔʾ£¬¸ÃÎó²îÑÏÖØË®Æ½ÆÀ·ÖΪÂú·Ö10.0£¬Ô´ÓÚϵͳȱÉÙÑéÖ¤Óû§È¨Ï޵ļì²éÇÒÕý±»Æð¾¢Ê¹Óá£Ñо¿Åú×¢£¬ÏÖÓÐSAP NetWeaverÓ¦Ó÷þÎñÆ÷JavaϵͳÖÐ50%µ½70%±£´æ´ËÎó²î¡£¸ÃÎó²îÓÉReliaQuestÊ״μͼ£¬±£´æÓÚdevelopmentserver SAP Visual ComposerµÄÌØ¶¨²¿·Ö£¬¶øSAP Visual ComposerÊÇSAP NetWeaver 7.xxµÄ×é¼þ£¬Ö¼ÔÚÎÞÐè´úÂ뽨ÉèÓªÒµ¹¤¾ß¡£ÎÊÌâÔÚÓÚϵͳδ׼ȷÉó²é»á¼ûÔªÊý¾ÝÉÏ´«Æ÷¹¦Ð§µÄÓû§È¨ÏÞ£¬È±·¦Êʵ±Éí·ÝÑéÖ¤ºÍÊÚȨ£¬Ê¹Î´µÇÈÎÃü»§Ò²ÄÜ»á¼ûǿʢ¹¦Ð§¡£4ÔÂ22ÈÕ£¬ReliaQuestÔÚÒÑÐÞ²¹·þÎñÆ÷ÉÏ·¢Ã÷¿ÉÒÉÔ˶¯£¬SAPͬÈÕÈÏ¿ÉÔÚJavaϵͳÖз¢Ã÷Òì³£Îļþ¡£4ÔÂ24ÈÕ£¬SAPÐû²¼³£¼ûÎÊÌâ½â´ðÎĵµ£¬È·ÈÏÌØ¶¨Îļþ¼ÐÖÐÌØ¶¨À©Õ¹ÃûÎļþºÜ¿ÉÄÜÊǶñÒâÎļþ£¬²¢ÕýʽÐû²¼¸ÃÎó²î£¬Ö¸³öÆä»ù´¡Ôµ¹ÊÔÓÉÊÇȱÉÙÊÚȨ¼ì²é£¬µ¼ÖÂδ¾ÊÚȨÓû§ÉÏ´«Î£ÏÕ¿ÉÖ´ÐÐÎļþ£¬Ê¹Óú󽫴øÀ´ÏµÍ³½ÓÊÜÖØ´óΣº¦£¬SAPÒÑÐû²¼NetWeaver´øÍâ½ôÆÈ¸üС£
https://hackread.com/sap-netweaver-flaw-severity-hackers-deploy-web-shells/
3. Microsoft DefenderÎóÅÐÖ³¬1700·ÝÃô¸ÐÎļþ¹ûÕæ
4ÔÂ25ÈÕ£¬¿ËÈÕ£¬ÒòMicrosoft Defender·ºÆðÎóÅУ¬µ¼ÖÂÁè¼Ý1700·ÝÃô¸ÐÎļþͨ¹ýANY.RUNƽ̨±»ÎÞÒâÖйûÕæ¹²Ïí¡£ANY.RUN×÷Ϊ½»»¥Ê½ÔÚÏßɳÏ䣬±¾ÒâÊÇÈÃÓû§ÔÚÊÜ¿ØÇéÐÎÖÐÆÊÎö¼ì²â¶ñÒâÈí¼þ£¬µ«ÆäÃ÷È·ÖÒÑÔÃâ·ÑÍýÏëÓû§£¬ÉÏ´«µ½¸Ãƽ̨µÄÎļþ¾ùΪ¹ûÕæ×´Ì¬¡£ANY.RUNÔÚÉùÃ÷ÖÐÖ¸³ö£¬·¢Ã÷´ó×ÚAdobe Acrobat CloudÁ´½Ó±»ÉÏ´«ÖÁɳºÐ£¬¾Ñо¿£¬ÊÇMicrosoft Defender XDR¹ýʧµØ½«¡°acrobat[.]adobe[.]com/id/urn:aaid:sc:¡±±ê¼ÇΪ¶ñÒâÎļþ¡£ÕâÒ»ÎóÅÐÖÂʹÃâ·ÑÍýÏëÓû§ÉÏ´«Á˰üÀ¨Êý°Ù¼Ò¹«Ë¾Ãô¸ÐÊý¾ÝµÄAdobeÎļþ£¬ÓÃÓÚ¹ûÕæÄ£Ê½ÆÊÎö¡£Ö»¹ÜANY.RUNËæºó½«ËùÓÐÏà¹ØÆÊÎöÉèΪ˽ÃÜ£¬ÒÔ±ÜÃâ½øÒ»²½Ð¹Â¶£¬µ«ÈÔÓÐÓû§×ÔÐйûÕæ·ÖÏíÉñÃØÎļþ¡£ANY.RUNΪ´ËÖÒÑÔÓû§£¬Ö´ÐÐÊÂÇéÏà¹ØÊ¹ÃüʱӦʹÓÃÉÌÒµÔÊÐíÖ¤£¬ÒÔ°ü¹ÜÒþ˽ÓëºÏ¹æÐÔ¡£´Ë´ÎÊÂÎñÖУ¬½öͨ¹ýANY.RUNƽ̨¾ÍÓг¬1700·Ý˽ÈËÃô¸ÐÎļþ±»¹ûÕæ¡£ÆäËû¶ñÒâÈí¼þÆÊÎöƽ̨ÈçVirusTotalͬÑù±£´æÀàËÆÎ£º¦£¬ÔÊÐíÓû§ÉÏ´«¿ÉÒÉÎļþ¿ÉÄܵ¼ÖÂÎļþÎÞÒâй¶¡£
https://cybernews.com/security/anyrun-users-leak-sensitive-data-after-microsoft-defender-misfire/
4. Ç×¶íºÚ¿ÍNoName¶ÔµÂ¹ú·¢¶¯DDoS¹¥»÷
4ÔÂ25ÈÕ£¬³öÓÚÕþÖÎÄîÍ·µÄÇ×¶íºÚ¿Í×éÖ¯Noname057(16)Õý¼Ó´ó¶ÔµÂ¹ú×éÖ¯µÄÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷Á¦¶È£¬¸øµÂ¹ú¶àÁìÓò´øÀ´ÍøÂçÇå¾²Íþв¡£¸Ã×éÖ¯Óë¶íÂÞ˹½áÃË£¬Ðû³ÆÒѶԵ¹ú¶à¼ÒÖ÷Òª»ú¹¹ºÍÆóÒµÍøÕ¾·¢¶¯¹¥»÷£¬Êܹ¥»÷¹¤¾ßº¸Ç½ðÈÚ¡¢Å©Òµ¡¢ÖÆÔìÒµµÈ¶à¸öÐÐÒµ£¬°üÀ¨µÂ¹ú´óÐ͹úÓÐÒøÐаͷ¥ÀûÑÇÖÝÒøÐС¢È«ÇòÐÔÆóÒµBayWa AG¡¢»ú³¡°à³µÖÆÔìÉÌCOBUS IndustriesÒÔ¼°ÂÁºÏ½ðÉú²úÉÌAluminium Rheinfelden AlloysµÈ£¬»¹ÔÚTelegramÉÏÐû³ÆÕâЩ×éÖ¯ÍøÕ¾Òѱ»ÏÂÏß¡£¾Ýgolem.de±¨µÀ£¬Noname057(16)´Ë´ÎÇ¿»¯¶ÔµÂ¹¥»÷£¬¿ÉÄÜÊǶԼ´½«ÉÏÈεĵ¹ú×ÜÀí¸¥ÀïµÂÀïÏ£¡¤Ã·¶û´ÄÍýÏëÏòÎÚ¿ËÀ¼Ìṩ½ðÅ£×ùѲº½µ¼µ¯µÄ»ØÓ¦¡£ÍâµØÃ½Ìå½øÒ»²½Åû¶£¬¸Ã×éÖ¯¹¥»÷¹æÄ£²»µ«ÏÞÓÚÆóÒµ£¬»¹Éæ¼°ººÅµÍþ¡¢¶ÅÈû¶û¶à·ò¡¢À³±ÈÎý¡¢°ØÁÖ¡¢·¨À¼¿Ë¸£ºÍ¿ÆÂ¡µÈ¶à¸ö¶¼»áµÄÊÐÕþ¸®ÍøÕ¾£¬²¢ÊÔͼ¶Ô¹«¹²Æû³µ¡¢µÂ¹úÉÌÒµÒøÐС¢Baywa¡¢Å·Ë¾ÀÊ¡¢µÂ¹úÖÐÑëÏàÖúÒøÐеȴóÐ͹«Ë¾ÍøÕ¾Ìᳫ¹¥»÷¡£
https://cybernews.com/security/noname-launch-ddos-attacks-in-germany/
5. AnubisÀÕË÷ÍÅ»ïÐû³ÆÐ®ÖÆ7ÒÚ¿¨ÍаÍË«Íõ¶Ä³¡À¶Í¼
4ÔÂ24ÈÕ£¬Ò»¸öÃûΪ¡°Anubis¡±µÄÀÕË÷Èí¼þÍÅ»ïÉù³ÆÐ®ÖÆÁ˺Ä×Ê7ÒÚÃÀÔªµÄ¿¨ÍаÍË«Íõ¶Ä³¡¶È¼Ù´åÀ¶Í¼£¬ÈôÊÇÊôʵ£¬ÆäÕÆÎÕµÄÐÅÏ¢¿ÉÄܱȶij¡ÖÆ×÷Õ߸üÏ꾡¡£¸Ã¶È¼Ù´åλÓÚ±±¿¨ÂÞÀ´ÄÉÖݹúÍõɽ£¬ÓÉ¿¨ÍаÍÓ¡µÚ°²²¿Â俪·¢£¬2024Äê6ÔÂÆÆÍÁ¶¯¹¤£¬Ô¤¼Æ2026Ä꿪·Å£¬Í깤ºó½«Å䱸´ó×ÚÀÏ»¢»ú¡¢¶Ä×À¼°Âùݿͷ¿£¬ÏÖÔÚÔÝʱÉèÊ©ÒÑÔËÓª¡£4ÔÂ23ÈÕ£¬AnubisÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû²¼Êê½ðÍþв£¬³ÆÓµÓжij¡¸÷ÇøÓòÏêϸÀ¶Í¼£¬°üÀ¨Ö÷Â¥²ã¡¢Í£³µ³¡¡¢ÂùݴóÂ¥¼°ºǫ́ÏÞÖÆÇøÓòµÈ£¬»¹ÕÆÎÕ·þÎñÆ÷»ú·¿¡¢³ïÂë¿â¡¢ÏÞÖÆÊÕÖ§ÃÅ¡¢¼à¿ØÉãÏñÍ·¡¢Ô±¹¤ÉóѶÊÒ¼°ÊèÉ¢õè¾¶½á¹¹µÈÒªº¦ÐÅÏ¢£¬ÕâЩÊý¾Ý¿°³Æ¶Ä³¡ÇÀ½ÙµÄ¡°È«Ì×¹¤¾ß¡±¡£±ðµÄ£¬¸ÃÍŻﻹÉù³Æ»ñÈ¡Á˵ؼ®Êý¾Ý¡¢µØ¶¯ÎļþºÍÖ´·¨¼Í¼£¬ÕâÎÞÒÉ»á¸ø±¾¾Í³äÂúÕþÖÎÕùÒéµÄ¿ª·¢ÏîÄ¿´øÀ´¸ü¶àƶÀ§¡£ÊÂʵÉÏ£¬ÔÚÀÕË÷Èí¼þÍÅ»ï½éÈëǰ£¬¸ÃÏîÄ¿¾ÍÒÑÉîÏÝÕùÒé¡£2022Ä꣬¹ú¼ÒÓ¡µÚ°²²©²ÊίԱ»áÖ¸¿Ø²¿ÂäÎ¥¹æÔËÓª¶Ä³¡²¢Íþв·£¿î£»2024Ä꣬ǰ¿ª·¢ÏàÖúͬ°éÌáÆðËßËÏ£¬Ö¸¿Ø²¿Âä²»·¨ÇÖÈë¼°¸Ä±äÍÁµØÓÃ;£»¶«²¿ÇÐÂÞ»ùÓ¡µÚ°²ÈËÒ²¶àÄêÀ´×èµ²¸ÃÏîÄ¿¡£
https://cybernews.com/security/catawba-two-kings-casino-cyberattack/
6. ÐÂÐ͵çÁ¦¼ÄÉú³æ´¹ÂÚ¹¥»÷Ãé×¼ÄÜÔ´¹«Ë¾ºÍÖ÷ÒªÆ·ÅÆ
4ÔÂ26ÈÕ£¬×Ô2024ÄêÆð£¬Ò»³¡ÃûΪ¡°µçÁ¦¼ÄÉú³æ¡±µÄÖØ´óÍøÂç´¹ÂÚÔ˶¯Ò»Á¬Õë¶ÔÈ«ÇòÄÜÔ´¾ÞÍ·¼°Ö÷ÒªÆ·ÅÆÕö¿ª¹¥»÷¡£¸ÃÔ˶¯Ö÷ҪʹÓÃÎ÷ÃÅ×ÓÄÜÔ´¡¢Ê©ÄÍµÂµçÆø¡¢·¨¹úµçÁ¦ÄÜÔ´¡¢ÀׯÕË÷¶û¹«Ë¾ºÍÉ¿ÆÄÜÔ´µÈ×ÅÃûÄÜÔ´¹«Ë¾µÄÆ·ÅÆ£¬Í¨¹ýͶ×ÊȦÌ×ÓëÐéαÊÂÇéʱ»úʵÑéÕ©Æ¡£¹¥»÷Õß¹¹½¨ÁËÓÉ150¶à¸ö»îÔ¾ÓòÃû×é³ÉµÄÖØ´óÍøÂ磬αװ³ÉÕýµ±¹«Ë¾£¬ÖصãÃé×¼ÃϼÓÀ¹ú¡¢Äá²´¶ûºÍÓ¡¶ÈµÈÑÇÖÞ¹ú¼ÒµÄСÎÒ˽¼Ò¡£Õ©Æ·Ö×Óͨ¹ýÓÕÆÐÔÍøÕ¾¡¢É罻ýÌåȺ×é¼°TelegramƵµÀµÈÇþµÀ½Ó´¥Êܺ¦Õߣ¬²¢½ÓÄÉÓ¢Óï¡¢ÆÏÌÑÑÀÓï¡¢Î÷°àÑÀÓï¡¢Ó¡ÄáÓï¡¢°¢À²®ÓïºÍÃϼÓÀÓïµÈÍâµØ»¯ÄÚÈÝÌáÉýÕ©ÆÐ§¹û¡£Ñо¿ÏÔʾ£¬ÍþвÐÐΪÕß½ÓÄÉ¡°¹ãÈöÍø¡±Õ½ÂÔ£¬ÀÄÓöà¸öÆ·ÅÆÃû³Æ²¢°²ÅŶà¸öÍøÕ¾ÒÔÀ©´óÊܺ¦Õß¹æÄ£¡£Æä»ù´¡ÉèÊ©ÆÊÎöÅú×¢£¬¹¥»÷ÕßʹÓðüÀ¨¡°SE¡±£¨´ú±íÎ÷ÃÅ×ÓÄÜÔ´£©ºÍ¡°AMD¡±£¨´ú±í¸ß¼¶Î¢×°±¸£©µÈÒªº¦×ÖµÄÓòÃû£¬ÍŽá¶àÖÖÓòÃûºó׺½¨ÉèÓòÃûģʽ¡£¸ÃÔ˶¯Í¨¹ýÁ½ÖÖÉç»á¹¤³ÌѧҪÁìʵÑéÕ©Æ£ºÍ¶×ÊթƱäÌåÖУ¬Êܺ¦Õß±»ÐéαͶ×ÊÆ½Ì¨ÒԸ߻سê½ðÓ¦ÓÕ»ó£¬ÕâЩƽ̨Éù³ÆÓÉ×ÅÃûÄÜÔ´¹«Ë¾Ö§³Ö£»ÇóְթƱäÖÖÔòÒÔÐéα¾Íҵʱ»úΪÓÕ¶ü£¬ÒªÇóӦƸÕßÌṩÃô¸ÐСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢¡£
https://cybersecuritynews.com/new-power-parasites-phishing-attack/


¾©¹«Íø°²±¸11010802024551ºÅ