Òâ´óÀû·ÄÖ¯¾ÞÍ·FulgarÔâRansomHouseÀÕË÷¹¥»÷
Ðû²¼Ê±¼ä 2025-11-171. Òâ´óÀû·ÄÖ¯¾ÞÍ·FulgarÔâRansomHouseÀÕË÷¹¥»÷
11ÔÂ12ÈÕ£¬ÎªH&M¡¢°¢µÏ´ï˹¡¢Calzedonia¡¢WolfordµÈÆ·ÅÆ¹©»õµÄÒâ´óÀû·ÄÖ¯Òµ¾ÞÍ·FulgarÈ·ÈÏÔâÓöRansomHouseÀÕË÷Èí¼þÍŻ﹥»÷¡£¸ÃÍÅ»ïÓÚ11ÔÂ12ÈÕÔÚ°µÍøÐ¹Â¶ÍøÕ¾Ðû²¼ÍþвÐÅÏ¢£¬Éù³Æ×Ô10ÔÂ31ÈÕÆðÒÑÕÆÎÕ¼ÓÃÜÊý¾Ý£¬²¢ÒªÇóÖÎÀí²ãÖ§¸¶Êê½ðÒÔ×èÖ¹ÉñÃØÊý¾Ýй¶»ò³öÊÛ¡£FulgarËæºóÐû²¼Í¨¸æÖ¤Êµ£¬11ÔÂ3ÈÕÆäÌìÏÂITϵͳÔâÍøÂç·¸·¨¹¥»÷£¬×÷ΪԤ·À²½·¥£¬Òâ´óÀûËùÓÐITϵͳÒѹرգ¬ÏÖÔÚËäδµ¥¶Àʶ±ðÏêϸй¶µÄСÎÒ˽¼ÒÊý¾Ý£¬µ«ÄÚ²¿Îļþ¡¢ÒøÐÐÕË»§Óà¶î¡¢Õþ¸®»ú¹¹Í¨Ñ¶¼Í¼¼°·¢Æ±µÈÃô¸ÐÐÅÏ¢¿ÉÄÜÒÑÍâй¡£´Ë´Î¹¥»÷²»µ«¿ÉÄÜͨ¹ý¶¨ÖÆ»¯ÍøÂç´¹ÂÚ½øÒ»²½ÉøÍ¸¹«Ë¾ÏµÍ³£¬¸ü½«µ¼ÖÂÕ½ÂÔÐÅϢй¶£¬Ê¹¾ºÕùµÐÊÖ»ñÈ¡ÔËÓª¡¢¿Í»§¼°¶¨¼Û½á¹¹µÈÒªº¦ÐÅÏ¢£¬Ï÷ÈõÊг¡ÓÅÊÆ¡£RansomHouse²¢·ÇÐÂÃæÄ¿£¬¸ÃÍÅ»ï×Ô2021Äê12Ô½øÈ빫ÖÚÊÓÒ°£¬ÒÑÔÚÆäÐ¹Â¶ÍøÕ¾Áгö148ÃûÊܺ¦Õß¡£¾ÝÃÀ¹úÍøÂçÇå¾²»ú¹¹2024ÄêÍŽáÖÒÑÔ£¬¸ÃÍÅ»ïÓëÒÁÀÊÏàÖúʵÑé¼ÓÃܹ¥»÷£¬ÒÔ»ñÈ¡Êê½ð·Ö³É¡£
https://cybernews.com/security/fulgar-ransomware-attack-adidas/
2. FortiWeb·¾¶±éÀúÎó²îÔâÈ«Çò¹æÄ£Ê¹ÓÃ
11ÔÂ13ÈÕ£¬ÍþвÇ鱨¹«Ë¾DefusedÓÚ10ÔÂ6ÈÕÊ״η¢Ã÷Fortinet FortiWeb 8.0.1¼°¸üÔç°æ±¾±£´æÑÏÖØÂ·¾¶±éÀúÎó²î£¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÔÚÎÞÐèÉí·ÝÑéÖ¤µÄÇéÐÎÏ£¬Í¨¹ýÏòÌØ¶¨API·¾¶·¢ËͰüÀ¨¶ñÒâÓÐÓÃÔØºÉµÄHTTP POSTÇëÇó£¬ÔÚ̻¶װ±¸ÉϽ¨ÉèÍâµØÖÎÀíÔ±¼¶±ðÕË»§¡£¹¥»÷ÕßÒÑʹÓøÃÎó²îÔÚÈ«Çò¹æÄ£ÄÚÌᳫ¹¥»÷£¬Í¨¹ý¶à¸öIPµØµãʵÑé²Ù×÷£¬½¨ÉèµÄÓû§ÃûÈçTestpoint¡¢trader1µÈ£¬ÃÜÂë°üÀ¨3eMIXX43¡¢AFT3$tH4ckµÈÖØ´ó×éºÏ£¬ÊÔͼͨ¹ý¶àÕË»§ÊµÑéÉøÍ¸ÏµÍ³¡£FortinetÒÑÐû²¼8.0.2°æ±¾ÐÞ¸´´ËÎó²î£¬ÆäPSIRTÍøÕ¾ÉÐδÅû¶Ïà¹ØÎó²îÐÅÏ¢¡£Ä¿½ñ£¬ÖÎÀíÔ±ÐèÁ¬Ã¦½«×°±¸Éý¼¶ÖÁ8.0.2°æ±¾£¬²¢¼ì²éϵͳÊÇ·ñ±£´æÒì³£ÖÎÀíÕË»§¡¢ÈÕÖ¾ÖÐfwbcgi·¾¶µÄÒì³£ÇëÇó¼°¿ÉÒÉIPµØµãÔ˶¯¡£Í¬Ê±£¬Ó¦ÑÏ¿áÏÞÖÆÖÎÀí½çÃæ½öͨ¹ýÊÜÐÅÍÐÍøÂç»òVPN»á¼û£¬×èֹ̻¶ÔÚ¹«Íø¡£
https://www.bleepingcomputer.com/news/security/fortiweb-flaw-with-public-poc-actively-exploited-to-create-admin-users/
3. DoorDash 10ÔÂÉç½»¹¤³Ì¹¥»÷Ö°ÙÍòÓû§ÐÅϢй¶
11ÔÂ13ÈÕ£¬ÍâÂô¾ÞÍ·DoorDashÅû¶ÓÚ10ÔÂ25ÈÕÓÉÔ±¹¤Éç½»¹¤³ÌÕ©ÆÒý·¢µÄÊý¾Ýй¶ÊÂÎñ£¬Éæ¼°ÃÀ¹ú¡¢¼ÓÄô󡢰ĴóÀûÑǼ°ÐÂÎ÷À¼Êý°ÙÍòÓû§¡£¾ÝDoorDash¹Ù·½Í¨Öª£¬Î´¾ÊÚȨµÄµÚÈý·½Í¨¹ýÔ±¹¤Õ˺ŻñÈ¡ÁËÓû§ÐÕÃû¡¢ÏÖʵµØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµÈÁªÏµÐÅÏ¢£¬²¿·ÖÓû§»¹¿ÉÄÜÉæ¼°Éç»áÇå¾²ºÅÂ루ÃÀ¹ú£©»òÉç»á°ü¹ÜºÅÂ루¼ÓÄô󣩣¬µ«DoorDashÇ¿µ÷Ãô¸Ð²ÆÎñÊý¾Ýδ±»Ð¹Â¶¡£´Ë´ÎÊÂÎñÊÇDoorDashµÚÈý´ÎÖØ´óÇå¾²ÊÂÎñ£¬2019ÄêÔøÐ¹Â¶Ô¼500ÍòÓû§Êý¾Ý£¬2022ÄêÓÖÔâÓëTwilio¹¥»÷ͬԴµÄºÚ¿ÍÈëÇÖ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬DoorDashÔÚÊÂÎñ±¬·¢ºó19Ìì²Å×îÏÈ֪ͨÓû§£¬Òý·¢ÆÕ±éÆ·ÆÀ¡£¼ÓÄôóÓû§ÊÕµ½¸½´ø·¨Óï·ÒëµÄ֪ͨ£¬µ«Í¨¸æÎ´Ã÷È·ÆäËûµØÇøÊÜÓ°Ïì¹æÄ£¡£DoorDash»ØÓ¦³ÆÒѽÓÄɶàÏî²½·¥£¬°üÀ¨Çжϲ»·¨»á¼û¡¢Éý¼¶Ç徲ϵͳ¡¢ÔöǿԱ¹¤Åàѵ¡¢Ô¼ÇëÍøÂçÇ徲ȡ֤¹«Ë¾ÊӲ죬²¢ÅäºÏÖ´·¨²¿·ÖÐж¯¡£¹«Ë¾ÌáÐÑÓû§Ð¡ÐÄ´¹ÂÚÓʼþ£¬×èÖ¹µã»÷¿ÉÒÉÁ´½Ó»òй¶СÎÒ˽¼ÒÐÅÏ¢£¬Í¬Ê±¿ªÍ¨Ãâ·Ñµç»°Ìṩ×Éѯ¡£
https://www.bleepingcomputer.com/news/security/doordash-hit-by-new-data-breach-in-october-exposing-user-information/
4. ÂÞ¼¼ÔâClopÀÕË÷ÍŻ﹥»÷ÖÂ1.8TBÊý¾Ýй¶
11ÔÂ14ÈÕ£¬Ó²¼þÅä¼þ¾ÞÍ·ÂÞ¼¼¹«Ë¾¿ËÈÕ֤ʵÔâÓöÓÉÀÕË÷ÍÅ»ïClopÌᳫµÄÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬¸ÃÍÅ»ïÉù³ÆÊ¹ÓÃÁËOracle E-Business SuiteµÄÁãÈÕÎó²îCVE-2025-61882ʵÑé¹¥»÷¡£ÂÞ¼¼ÒÑÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»8-K±í¸ñÅû¶ÊÂÎñ£¬Ç¿µ÷´Ë´ÎÍøÂçÇå¾²ÊÂÎñδӰÏìÆä²úÆ·¡¢ÓªÒµÔËÓª»òÉú²úϵͳ¡£¾ÝÂÞ¼¼¹Ù·½ÉùÃ÷£¬Ð¹Â¶Êý¾Ý¿ÉÄܰüÀ¨Ô±¹¤¡¢ÏûºÄÕß¡¢¿Í»§¼°¹©Ó¦É̵IJ¿·ÖÐÅÏ¢£¬µ«Î´Éæ¼°¹úÃñÉí·ÝÖ¤ºÅÂë¡¢ÐÅÓÿ¨µÈÃô¸ÐÐÅÏ¢£¬ÒòÏà¹ØÊý¾Ýδ´æ´¢ÔÚ±»ÈëÇÖϵͳÖС£´Ë´Î¹¥»÷Ô´ÓÚµÚÈý·½ÁãÈÕÎó²î£¬ÂÞ¼¼ÔÚ·¢Ã÷Îó²îºóÒÑÁ¬Ã¦ÍŽáÍâ²¿ÍøÂçÇå¾²¹«Ë¾¾ÙÐÐÊӲ첢ÐÞ¸´ÏµÍ³¡£ClopÍÅ»ïÉÏÖÜÒѽ«ÂÞ¼¼ÁÐÈëÆäÊý¾Ýй¿àÕË÷ÍøÕ¾£¬¹ûÕæÁ˾ݳÆÇÔÈ¡µÄ½ü1.8TBÊý¾Ý¡£±¾´ÎOracle E-Business SuiteÎó²îÓ°Ïì¹æÄ£ÆÕ±é£¬³ýÂÞ¼¼Í⣬¹þ·ð´óѧ¡¢Envoy Air¼°¡¶»ªÊ¢¶ÙÓʱ¨¡·µÈ»ú¹¹ÒàÊܲ¨¼°¡£Oracle´ËǰÒÑÐû²¼½ôÆÈ¸üÐÂÐÞ¸´¸ÃÎó²î£¬²¢½¨ÒéÓû§Éý¼¶ÖÁÇå¾²°æ±¾¡£
https://www.bleepingcomputer.com/news/security/logitech-confirms-data-breach-after-clop-extortion-attack/
5. FingerÏÂÁîÀÄÓù¥»÷£º´ÓÀúÊ·¹¤¾ßµ½ÐÂÐÍÍþÐ²ÔØÌå
11ÔÂ15ÈÕ£¬±£´æÊýÊ®ÄêµÄ"finger"ÏÂÁîÕý³ÉÎªÍøÂç¹¥»÷ÐÂÔØÌ壬ÍþвÐÐΪÕßͨ¹ý¸ÃÐÒéÔÚWindows×°±¸Ö´ÐжñÒâ²Ù×÷¡£¸ÃÏÂÁîÆðÔ´ÓÚUnix/Linuxϵͳ£¬ÓÃÓÚÅÌÎÊÓû§ÐÅÏ¢£¨ÈçµÇ¼Ãû¡¢Ö÷Ŀ¼¡¢ÔÚÏß״̬µÈ£©£¬ºó±»Windowsϵͳ¼æÈÝ¡£Ö»¹ÜÄ¿½ñʹÓÃÆµÂʽµµÍ£¬µ«ÆäÐÒéÌØÕ÷ÈÔ±»¶ñÒâʹÓ᣽üÆÚ¹¥»÷°¸ÀýÏÔʾ£¬¹¥»÷Õßͨ¹ý"finger"ÐÒéʵÑéClickFix¹¥»÷£ºÀýÈ磬Åú´¦Öóͷ£ÎļþÖ´ÐÐfingerÏÂÁ´ÓÔ¶³Ì·þÎñÆ÷¼ìË÷¶ñÒâÖ¸Á¾cmd.exe¹ÜµÀÔÚÍâµØÔËÐС£´ËÀ๥»÷³£Î±×°³É"ÑéÖ¤ÈËÀà"µÄÑéÖ¤ÂëÁ÷³Ì£¬ÓÕµ¼Óû§Ö´ÐаüÀ¨fingerÏÂÁîµÄWindowsÖ¸Á×îÖÕµ¼Ö¶ñÒâÈí¼þÏÂÔØÓëÖ´ÐС£Ïêϸ¹¥»÷Á´Â·ÖУ¬¹¥»÷ÕßʹÓÃfingerÏÂÁî´ÓÌØ¶¨ÓòÃû»ñÈ¡ÏÂÁ´¥·¢curl.exeÏÂÔØÎ±×°³ÉPDFµÄzip°ü£¬½âѹºóÖ´ÐÐPython¶ñÒâ³ÌÐò¡£¸üÖØ´óµÄ¹¥»÷»á¼ì²âϵͳÊÇ·ñ×°ÖöñÒâÈí¼þÆÊÎö¹¤¾ß£¬Èô±£´æÔòÖÕÖ¹¹¥»÷£¬²»È»ÏÂÔØNetSupport Manager RAT²¢ÉèÖÃÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯¿ØÖÆ¡£
https://www.bleepingcomputer.com/news/security/decades-old-finger-protocol-abused-in-clickfix-malware-attacks/
6. ÃÀ˾·¨²¿ÆÆ»ñ³¯ÍøÂç·¸·¨°¸£ºÎåÈËÈÏ×ïÉæ3.8ÒÚ
11ÔÂ14ÈÕ£¬ÃÀ¹ú˾·¨²¿¿ËÈÕÐû²¼£¬ÎåÃûÉæ°¸Ö°Ô±ÈÏ¿ÉÐÖú³¯ÏÊʵÑé²»·¨´´ÊÕÔ˶¯£¬°üÀ¨Ô¶³ÌITÊÂÇéÕßڲƺͼÓÃÜÇ®±Ò͵ÇÔ¡£¸Ã°¸¼þÉæ¼°³¯ÏÊAPT38Íþв×éÖ¯¼°LazarusºÚ¿Í×éÖ¯£¬ÃÀ¹úÕþ¸®Õý×·ÇóûÊÕ¸Ã×é֯ͨ¹ý1500ÍòÃÀÔª¼ÓÃÜÇ®±Ò͵ÇÔ°¸ËùµÃµÄ²»·¨×ʲú¡£ÎåÃûÈÏ×ïÕß°üÀ¨ËÄÃûÃÀ¹ú¹«ÃñºÍÒ»ÃûÎÚ¿ËÀ¼ÈË£¬ËûÃÇͨ¹ýαÔì»òÇÔÈ¡µÄÃÀ¹ú¹«ÃñÉí·ÝÐÅÏ¢£¬×ÊÖú³¯ÏÊÌØ¹¤ÒÔ¡°Ô¶³ÌITÊÂÇéÕß¡±Éí·Ý±»136¼ÒÃÀ¹ú¹«Ë¾¹ÍÓ¶¡£ÕâÐ©ÌØ¹¤½«ÈËΪ¼°²¿·ÖÇÔÈ¡Êý¾ÝÔËËÍÖÁ³¯ÏÊÕþ¸®£¬ÀÛ¼ÆÎª³¯ÏÊÕþȨ´´Á¢³¬220ÍòÃÀÔª²»·¨ÊÕÈë¡£Ïêϸ°¸¼þÖУ¬°ÂÁпËÉ£µÂ¡¤µÏ¼ȡÒòµçÐÅÕ©ÆÍ¬Ä±¼°ÑÏÖØÉí·Ý͵ÇÔ×ï±»Ö¸¿Ø£¬Æäͨ¹ýUpWorkSellƽ̨ÏòÍâÑóITÖ°Ô±³öÊÛÇÔÈ¡µÄÉí·ÝÐÅÏ¢£¬Ê¹40¼ÒÃÀ¹ú¹«Ë¾ÊÜÆ£»°£Àï¿Ë¡¤ÆÕÁÖ˹Ôòͨ¹ýÆä¹«Ë¾Taggcar Inc.ʹÓÃÇÔÈ¡Éí·Ý°²¶Ù64ÃûÍâÑóÖ°Ô±£¬×¬Ç®8.9ÍòÃÀÔª²¢Ôì³É³¬94ÍòÃÀÔªËðʧ£»°ÂµÂÀï¿Ë¡¤·¨¸ñÄÉÈü¡¢½ÜÉ¡¤ÈøÀÔú¶ûºÍÑÇÀúɽ´ó¡¤ÌØÀά˹ÈýÈ˼ÓÈë2019-2022ÄêÕ©ÆÔ˶¯£¬×ܼÆÔì³É128ÍòÃÀÔªËðʧ¡£
https://www.bleepingcomputer.com/news/security/five-plead-guilty-to-helping-north-koreans-infiltrate-us-firms/


¾©¹«Íø°²±¸11010802024551ºÅ