SonicWallÖÒÑÔ£ºNetExtenderľÂí²¡¶¾ÇÔÈ¡VPNƾ֤
Ðû²¼Ê±¼ä 2025-06-251. SonicWallÖÒÑÔ£ºNetExtenderľÂí²¡¶¾ÇÔÈ¡VPNƾ֤
6ÔÂ24ÈÕ£¬SonicWall¿ËÈÕ·¢³öÖÒÑÔ£¬ÍþвÐÐΪÕßÕýÔÚ·Ö·¢ÆäNetExtender SSL VPN¿Í»§¶ËµÄľÂí°æ±¾£¬ÒâͼÇÔÈ¡Óû§VPNƾ֤¡£Õâ¿îð³äÈí¼þÓÉSonicWallºÍMicrosoft Threat Intelligence (MSTIC)µÄÑо¿Ö°Ô±ÅäºÏ·¢Ã÷£¬ËüÄ£ÄâÁËÕýµ±µÄNetExtender v10.3.2.27°æ±¾£¬²¢ÍйÜÓÚÒ»¸ö¿´ËÆÕæÊµµÄÓÕÆÐÔÍøÕ¾ÉÏ£¬ÒÔÓÕÆÓû§ÏÂÔØ¡£Ö»¹Ü¸Ã¶ñÒâ×°ÖóÌÐòÎļþδ¾SonicWallÊý×ÖÊðÃû£¬µ«ÒòÓÉ¡°CITYLIGHT MEDIA PRIVATE LIMITED¡±ÊðÃû£¬¹Ê¿ÉÈÆ¹ý»ù±¾·ÀÓù¡£¸ÃľÂíÓ¦ÓóÌÐòÖ¼ÔÚÇÔÈ¡VPNÉèÖúÍÕÊ»§Æ¾Ö¤£¬²¢½«Æäй¶¸ø¹¥»÷Õß¡£SonicWall NetExtenderÊÇÒ»¸öÔ¶³Ì»á¼ûVPN¿Í»§¶Ë£¬×¨ÎªÓëSonicWall SSL VPN×°±¸ºÍ·À»ðǽÅäºÏʹÓöøÉè¼Æ£¬³£±»ÖÐСÐÍÆóÒµµÄÔ¶³ÌÔ±¹¤¡¢ITÖÎÀíÔ±ºÍ³Ð°üÉÌʹÓá£SonicWallºÍMicrosoft·¢Ã÷£¬¶ñÒâÓÕÆÍøÕ¾·Ö·¢Á˸òúÆ·µÄÁ½¸öÐ޸ĺóµÄ¶þ½øÖÆÎļþ£¬ÆäÖÐNeService.exeµÄÑéÖ¤Âß¼±»ÐÞ²¹ÒÔÈÆ¹ýÊý×ÖÖ¤Êé¼ì²é£¬NetExtender.exeÎļþÔò±»ÐÞ¸ÄÒÔÇÔÈ¡Êý¾Ý¡£¶ñÒâ´úÂë»áÔÚÓû§ÊäÈëVPNÉèÖò¢µã»÷¡°ÅþÁ¬¡±°´Å¥ºóÖ´ÐÐ×ÔÉíÑéÖ¤£¬²¢½«ÇÔÈ¡µÄÐÅÏ¢£¨°üÀ¨Óû§Ãû¡¢ÃÜÂë¡¢ÓòÃûµÈ£©Í¨¹ý¶Ë¿Ú8080·¢Ë͵½Ô¶³Ì·þÎñÆ÷¡£SonicWall½¨ÒéÓû§½ö´Ó¹Ù·½ÃÅ»§ÍøÕ¾ÏÂÔØÈí¼þ£¬ÒÔ×èÖ¹ÏÂÔØµ½¶ñÒâ°æ±¾¡£
https://www.bleepingcomputer.com/news/security/sonicwall-warns-of-trojanized-netextender-stealing-vpn-logins/
2. ºÚ¿ÍÈëÇÖÕþ¸®¹ÍÔ±×°±¸£¬°ÍÀ¹ç½ü700Íò¹«ÃñÊý¾ÝÔâÇÔ
6ÔÂ25ÈÕ£¬¾ÝÇå¾²¹«Ë¾ÐÂÎÅ£¬ºÚ¿ÍʹÓÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þѬȾ°ÍÀ¹çÕþ¸®¹ÍÔ±×°±¸£¬ÇÔÈ¡½ü700Íò°ÍÀ¹ç¹«Ãñ´ó×ÚÊý¾Ý¡£ÉÏÔ°µÍøÌû×ӳƣ¬¶à¸öÕþ¸®»ú¹¹ÔâÈëÇÖºó£¬740Íò°ÍÀ¹çÈËСÎÒ˽¼ÒÐÅÏ¢±»³öÊÛ¡£ÕâЩÊý¾ÝÓÉResecurityÑо¿Ö°Ô±·¢Ã÷£¬ºÚ¿ÍBrigada Cyber PMCÔøÒÔ740ÍòÃÀÔª³öÊÛ£¬°ÍÀ¹ç¾Ü¾øÖ§¸¶Êê½ðºóÊý¾Ý±»Ðû²¼¡£ResecurityÍÆ²â£¬Õþ¸®ITÔ±¹¤Ñ¬È¾¶ñÒâÈí¼þʹÍþвÐÐΪÕßµÃÒÔÇÔÈ¡Êý¾Ý£¬Êý¾ÝÖÁÉÙÀ´×Ô¹ú¼Ò½»Í¨ºÍõè¾¶Çå¾²¾Ö¼°¹«¹²ÎÀÉúºÍÉç»á¸£Àû²¿Á½¸ö²î±ðȪԴ¡£¹þµÂÑ·ÑÒ¹«Ë¾×¨¼Ò³Æ£¬ÊÜѬȾԱ¹¤Æ¾Ö¤ÔçÔÚ2023Äê4Ô¾ͱ»Redline InfostealerÇÔÈ¡£¬ºÚ¿Í½è´Ëδ¾ÊÚȨ»á¼ûÒªº¦ÏµÍ³ÇÔÈ¡Êý¾Ý¡£RedlineÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÔø±»ÆÕ±éʹÓ㬿ÉÇÔÈ¡¶àÖÖÃô¸ÐÊý¾Ý¡£ÐÅÏ¢ÇÔÈ¡Õß³£Í¨¹ýÍøÂç´¹Âڵȷ½·¨Èö²¥£¬°ÍÀ¹çÒò¿ìËÙÊý×Ö»¯ºÍµØÔµÕþÖÎÖ÷ÒªÐÔ³ÉÖ÷ҪĿµÄ¡£ResecurityÌåÏÖ£¬Ð¹Â¶ÐÅÏ¢Éæ¼°½ü700Íò¡°ÌìÏÂÉú³Ý¡±ÐÅÏ¢£¬Êý¾Ý¼¯»òÓÐÖØ¸´¡¢ÒÑéæÃüÖ°Ô±¼Í¼¼°·Ç¹«ÃñÐÅÏ¢£¬ÇÒÖÁÉÙÀ´×ÔÁ½´Î²î±ðÈëÇÖÊÂÎñ¡£°ÍÀ¹ç¹ÙÔ±³ÆÊý¾Ý¿ÉÄÜÔÚ¼¸Äêǰ¾Í±»µÁ²¢ÔÙ´ÎÈö²¥¡£ResecurityÏò°ÍÀ¹çÅÌËã»úÓ¦¼±ÏìӦС×éת´ïÇéÐΣ¬²¢ÍƲâÊý¾ÝµÍ¼Û¿ÉÄÜÊÇÍâ¹úÇ鱨»ú¹¹ÑÚÊÎÌØ¹¤Ô˶¯µÄÊֶΣ¬´Ë´ÎÊÂÎñ»ò¾ßµØÔµÕþÖÎÄîÍ·¡£
https://therecord.media/data-leak-paraguayan-millions-infostealer
3. Androxgh0st½©Ê¬ÍøÂçÀ©´óÓ°Ïì¹æÄ££¬¹¥»÷ѧÊõ»ú¹¹
6ÔÂ24ÈÕ£¬CloudSEK×îÐÂÊÓ²ìÏÔʾ£¬Androxgh0st½©Ê¬ÍøÂçÕýÒ»Ö±Ñݱ䣬ÆäÔË×÷·½·¨±¬·¢ÖØ´óת±ä£¬ÈëÇÖϵͳÄÜÁ¦¼±¾çÌáÉý¡£¸Ã½©Ê¬ÍøÂçÓÚ2023ÄêÍ·Ê״α»·¢Ã÷£¬ÏÖÔÚÕýʹÓøüÆÕ±éµÄ³õʼ»á¼ûÒªÁ죬°üÀ¨Ê¹ÓÃѧÊõ»ú¹¹ÉèÖùýʧµÄ·þÎñÆ÷À´ÈëÇÖϵͳ£¬¼ÓÖÝ´óѧʥµØÑǸç·ÖУ¾ÍÊܵ½Á˹¥»÷¡£ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÔÚ2024Äê1ÔÂÒ²Ðû²¼ÁËÏà¹ØÇå¾²ÖÒÑÔ¡£CloudSEKÊÓ²ìÅú×¢£¬×Ô2024ÄêÔçÆÚ±¨¸æÒÔÀ´£¬¸Ã½©Ê¬ÍøÂç¹¥»÷ÏòÁ¿¿âÀ©Ô¼Äª50%£¬Æä½«ÏÂÁîÓë¿ØÖÆ£¨C2£©¼Í¼Æ÷Ãæ°åÍйÜÔÚ¼ÓÖÝ´óѧʥµØÑǸç·ÖУ×ÓÓòÃûÉÏ£¬Ê¹ÓÃÕýµ±µ«Ò×Êܹ¥»÷µÄ¹«¹²ÓòÃûÀ´Òþ²Ø¶ñÒâ»ù´¡ÉèÊ©£¬´Ëǰ»¹Ôø½«¼Í¼Æ÷ÍйÜÔÚÑÀÂò¼ÓµÄÊÂÎñ¾ÛºÏƽ̨ÉÏ¡£Androxgh0st½©Ê¬ÍøÂçʹÓÃApache ShiroºÍSpring FrameworkµÈÊ¢ÐÐÈí¼þ¿ò¼ÜµÄÒÑÖªÎó²î£¬ÒÔ¼°WordPress²å¼þºÍLantronixÎïÁªÍø×°±¸µÄÎÊÌ⣬ÄÜÔËÐÐδ¾ÊÚȨµÄ´úÂë¡¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬ÉõÖÁÔÚÊÜѬȾϵͳÉϾÙÐмÓÃÜÇ®±ÒÍÚ¿ó¡£
https://hackread.com/androxgh0st-botnet-expand-exploit-us-university-servers/
4. ¶ñÒâÈí¼þʹÓöñÒâWordPress²å¼þÇÔÊØÐÅÓÿ¨ÐÅÏ¢
6ÔÂ24ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕ·¢Ã÷ÁËÒ»Ïî¸ß¶ÈÖØ´óµÄжñÒâÈí¼þÔ˶¯£¬¸ÃÔ˶¯Éæ¼°ÐÅÓÿ¨µÁË¢¡¢Æ¾Ö¤ÍµÇÔ¼°Óû§ÆÊÎöµÈ¶àÖÖ¶ñÒâÐÐΪ¡£¾ÝWordfenceÍþвÇ鱨ÍŶÓ2025Äê5ÔÂ16ÈÕÅû¶£¬´Ë¶ñÒâÈí¼þ±»Î±×°³É¶ñÒâWordPress²å¼þ£¬²¢½ÓÄÉÁËÐÂÓ±µÄ·´¼ì²âÊÖÒÕ£¬ÈçÍйÜÔÚÊÜÑ¬È¾ÍøÕ¾ÉϵÄʵʱºó¶Ëϵͳ£¬ÕâÖÖÊÖ·¨ÔÚÕë¶ÔWordPressµÄ¹¥»÷ÖÐǰËùδ¼û¡£¸ÃÔ˶¯×Ô2023Äê9ÔÂÆð±ãÒÑ»îÔ¾£¬WordfenceÆÊÎöµÄ20¶à¸ö¶ñÒâÈí¼þÑù±¾ÏÔʾ£¬ËùÓбäÌå¾ù¾ß±¸»ìÏý¡¢·´ÆÊÎö¡¢¿ª·¢Ö°Ô±¹¤¾ß¼ì²â¼°Õë¶ÔÐÔÖ´ÐеÈÅäºÏÌØÕ÷¡£ÀýÈ磬¶ñÒâÈí¼þ»á±Ü¿ªÖÎÀíÒ³Ãæ£¬½öÔÚ½áÕÊʱ¼¤»î£¬²¢»á¼ì²é֮ǰÊÇ·ñѬȾ¹ýÒÔ×èÖ¹ÖØ¸´¹¥»÷ͳһÓû§¡£×îа汾ÉõÖÁ¼ÓÈëÁË×Ô½ç˵HTMLÁýÕÖ¡¢Ðéα֧¸¶±í¸ñ¼°Ä£ÄâCloudflareÒ³ÃæµÄÍâµØ»¯È˹¤ÑéÖ¤ÌôÕ½£¬ÒÔÔöÇ¿Òþ²ØÐÔ¡£±»µÁÊý¾Ý¶àͨ¹ýαװ³ÉͼÏñURLµÄBase64±àÂë×Ö·û´®Ð¹Â¶¡£±ðµÄ£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÁíÍâÈýÖÖ¾ßÓвî±ðÄ¿µÄµÄ±äÌ壬»®·ÖÓÃÓÚʹÓÃGoogle AdsͶ·ÅÚ²ÆÐÔ¹ã¸æ¡¢ÇÔÈ¡WordPressƾ֤¼°Í¨¹ýÌæ»»Á´½ÓÈö²¥ÆäËû¶ñÒâÈí¼þ¡£
https://www.infosecurity-magazine.com/news/rogue-wordpress-plugin-skim-credit/
5. Palo Alto Networks³ÆPrometei¶ñÒâÈí¼þаæÆÕ±éÈö²¥
6ÔÂ24ÈÕ£¬Palo Alto NetworksÐû²¼±¨¸æÖ¸³ö£¬Prometei¶ñÒâÈí¼þµÄ¸üа汾ÕýÔÚÆÕ±éÈö²¥£¬ÇÒÓë½©Ê¬ÍøÂçÏà¹ØµÄÔ˶¯ÔÚÒÑÍù¼¸¸öÔÂÖÐÏÔÖø¼¤Ôö¡£Prometei×÷Ϊһ¸öÄ£¿é»¯½©Ê¬ÍøÂ磬×î³õÓÚ2020Äê7Ô±»·¢Ã÷£¬ÆäѬȾĿµÄº¸ÇWindowsºÍLinuxϵͳ£¬Ö÷ÒªÓÃÓÚ¼ÓÃÜÇ®±ÒÍÚ¾òºÍƾ֤й¶¡£È»¶ø£¬×îа汾µÄPrometei¶ñÒâÈí¼þ¹¦Ð§¸üÎªÖØ´ó£¬²»µ«¼¯³ÉÁËÓÃÓÚÆäËû¶ñÒâÔ˶¯µÄºóÃÅ£¬»¹¾ß±¸×ÔÎÒ¸üй¦Ð§£¬²¢ÒÀÀµÓòÌìÉúËã·¨£¨DGA£©¾ÙÐÐÏÂÁîºÍ¿ØÖÆ£¨C&C£©·þÎñÆ÷ÅþÁ¬¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶àÖÖÄ£¿éʵÏÖ±©Á¦ÆÆ½âÖÎÀíÔ±ÃÜÂ롢ʹÓÃÎó²î¡¢ºáÏòÒÆ¶¯¡¢ÇÔÈ¡Êܺ¦ÕßÊý¾Ý¡¢½¨ÉèC&CͨѶÒÔ¼°ÍÚ¾ò¼ÓÃÜÇ®±Ò£¨ÌØÊâÊÇÃÅÂÞ±Ò£©µÈ¹¦Ð§¡£2025Äê2Ô¶ԽüÆÚ¶ñÒâÈí¼þÑù±¾µÄÆÊÎöÏÔʾ£¬Prometeiͨ¹ý½¨Éè·þÎñºÍÍýÏëµÄcron×÷ҵʵÏÖÁ˳¤ÆÚÐÔ£¬È±·¦Ó²±àÂëµÄÍÚ¾ò³Ø£¬²¢Äܹ»´¦Öóͷ£À´×Ô²Ù×÷Ô±µÄÆäËûÏÂÁî¡£Palo Alto NetworksÔÚ2025Äê3Ô·¢Ã÷Á˸ÃÍþвµÄ×îа汾£¬¸Ã°æ±¾Ê¹ÓÃUltimate Packer for eXecutables£¨UPX£©¾ÙÐдò°ü£¬Ê¹µÃ¶ñÒâÈí¼þÌå»ý¸üС£¬ÇÒÔÚÔËÐÐʱÄÜÔÚÄÚ´æÖнâѹËõ×ÔÉí²¢Ö´ÐÐ×îÖÕµÄÓÐÓÃÔØºÉ£¬ÒÔ±ã½©Ê¬ÍøÂç×îÏÈÔËÐС£¸Ã¶ñÒâÈí¼þ»¹ÆÕ±éÍøÂçϵͳÐÅÏ¢£¬²¢Í¨¹ýHTTP GETÇëÇó½«ÕâЩÊý¾Ý·¢Ë͵½C&C·þÎñÆ÷¡£
https://www.securityweek.com/prometei-botnet-activity-spikes/
6. ÃÀ¹úÖÚÒéÔºÒòÇå¾²ÎÊÌâեȡԱ¹¤Ê¹ÓÃWhatsApp
6ÔÂ24ÈÕ£¬ÃÀ¹úÖÚÒéÔº¿ËÈÕÐû²¼£¬Õ¥È¡ÔÚ¹ú»áÊÂÇéÖ°Ô±µÄÕþ¸®·¢·Å×°±¸ÉÏ×°ÖúÍʹÓÃWhatsApp£¬´Ë¾ÙÖ÷ÒªÔ´ÓÚ¶Ô¸ÃÓ¦ÓóÌÐò¼ÓÃܺÍÑÚ»¤Êý¾Ý·½·¨µÄµ£ÐÄ¡£½ûÁî¹æÄ£ÆÕ±é£¬²»µ«ÁýÕÖÊÖ»ú£¬»¹°üÀ¨Ìõ¼Ç±¾µçÄÔ¡¢Ì¨Ê½µçÄÔÒÔ¼°ÕâЩװ±¸ÉÏʹÓõÄÈκÎÍøÂçä¯ÀÀÆ÷¡£Ö»¹Ü¹ú»áÊÂÇéÖ°Ô±ÔÚСÎÒ˽¼Ò×°±¸ÉÏÈÔ¿É×ÔÓÉʹÓÃWhatsApp£¬µ«ÔÚÉñÃØ¼ò±¨»á»òÇå¾²ÉèÊ©µÈÃô¸ÐÁìÓò£¬¸ÃÓ¦ÓõÄʹÓÃÔçÒÑÊܵ½ÏÞÖÆ¡£ÕâÒ»½ûÁîÐÂÎÅ×î³õÓÉAxiosƾ֤ÖÚÒéÔºÊ×ϯÐÐÕþ¹Ù£¨CAO£©·¢¸ø¹ú»áÊÂÇéÖ°Ô±µÄÒ»·âй¶ÄÚ²¿µç×ÓÓʼþ±¨µÀ£¬ÓʼþÖн«WhatsApp¹éÀàΪ¡°¸ßΣº¦¡±Í¨Ñ¶Æ½Ì¨¡£Ö»¹ÜÃÀ¹úÕþ¸®ÉÐδ½ÒÏþ¹Ù·½ÉùÃ÷£¬µ«Ê×ϯÐÐÕþ¹ÙCatherine SzpindorÒÑͨ¹ýÏòThe Verge½ÒÏþµÄÉùÃ÷֤ʵÁËÆðÔ´±¨µÀ¡£ËýÇ¿µ÷£¬ÑÚ»¤ÖÚÒéÔº¼°ÆäÊý¾ÝÊÇÖ÷ҪʹÃü£¬Òò´ËÐèÒª°´ÆÚÉó²éºÍ¸üÐÂÒÑÅú×¼µÄÓ¦ÓóÌÐòÁÐ±í£¬ÒÔÓ¦¶ÔDZÔÚµÄÍøÂçÇ徲Σº¦¡£WhatsApp·½ÃæÁÙ´ËÌåÏÖÇ¿ÁÒ×èµ²£¬³ÆÆäÐÂÎÅĬÈϽÓÄɶ˵½¶Ë¼ÓÃÜ£¬Çå¾²¼¶±ð¸ßÓÚCAOÅú×¼ÁбíÖеĴó´ó¶¼Ó¦ÓóÌÐò¡£È»¶ø£¬WhatsApp×î½üÐû²¼ÔÚ¡°¸üС±Ñ¡ÏÖÐÒýÈë¹ã¸æºÍ´ÙÏúÄÚÈÝ£¬Õâһת±äÒý·¢ÁËÈËÃǶÔÊý¾ÝÒþ˽µÄµ£ÐÄ¡£
https://www.bleepingcomputer.com/news/security/us-house-bans-whatsapp-on-staff-devices-over-security-concerns/


¾©¹«Íø°²±¸11010802024551ºÅ