CISAÖÒÑÔBroadcom VMware vCenterÎó²îÔâʹÓÃ
Ðû²¼Ê±¼ä 2026-01-271. CISAÖÒÑÔBroadcom VMware vCenterÎó²îÔâʹÓÃ
1ÔÂ24ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Broadcom VMware vCenter ServerµÄÑÏÖØÎó²îCVE-2024-37079£¨CVSSÆÀ·Ö9.8£©ÄÉÈëÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¸ÃÎó²îÔ´ÓÚvCenter Server¶ÔDCERPCÐÒéʵÏֵĶÑÒçÓÐȱÏÝ£¬¹¥»÷Õßͨ¹ýÍøÂç»á¼û¼´¿É·¢ËÍÌØÖÆÊý¾Ý°ü´¥·¢Îó²î£¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐлòȨÏÞÌáÉý¡£vCenter ServerÊÇVMware¿ª·¢µÄÐéÄ⻯ÇéÐμ¯ÖÐÖÎÀíÆ½Ì¨¡£2024Äê6Ô£¬VMwareÐÞ¸´ÁËCVE-2024-37079¼°¹ØÁªÎó²îCVE-2024-37080£¬¶þÕß¾ù±»ÆÀ¹ÀΪ¡°ÑÏÖØ¡±¼¶±ð¡£²©Í¨¹«Ë¾ËæºóÈ·ÈÏ£¬CVE-2024-37079ÒÑÔâÏÖʵʹÓ㬵«Ïêϸ¹¥»÷ϸ½ÚÉÐδ¹ûÕæ¡£ÔÚ2025ÄêÑÇÖÞºÚñ´ó»áÉÏ£¬Ñо¿Ö°Ô±Åû¶CVE-2024-37079ʵΪËĸöDCE/RPCÎó²îÁ´µÄÒ»²¿·Ö£¬°üÀ¨Èý¸ö¶ÑÒç³öÎó²îºÍÒ»¸öȨÏÞÌáÉýÎó²î¡£ÆäÖÐÁ½¸öÏà¹ØÎó²îÒÑÓÚ2024Äê9ÔÂÐÞ¸´£¬¶øÌض¨¶ÑÒç³öÎó²î¿ÉÓëCVE-2024-38813ÍŽᣬÔÚESXiÖ÷»úÉÏ»ñȡԶ³ÌrootȨÏÞ¡£Ñо¿Ö°Ô±Ç¿µ÷£¬Í¨¹ý×éºÏʹÓÃÕâЩÎó²î£¬ËûÃÇÀÖ³ÉÔÚ2024ÄêMatrix CupÎó²îÌôÕ½ÈüÖÐʵÏÖδ¾ÊÚȨµÄÔ¶³Ìroot»á¼û¡£
https://securityaffairs.com/187267/security/u-s-cisa-adds-a-flaw-in-broadcom-vmware-vcenter-server-to-its-known-exploited-vulnerabilities-catalog.html
2. 11ÄêδÐÞ¸´µÄGNU Telnetd¸ßΣÎó²îÔâÐͬ¹¥»÷
1ÔÂ23ÈÕ£¬¿ËÈÕ£¬Ò»¸ö±£´æ³¤´ï11ÄêµÄGNU InetUtils telnetd·þÎñÆ÷ÑÏÖØÎó²î£¨CVE-2026-24061£©±»ÆØÔâÐͬ¹¥»÷¡£¸ÃÎó²îÔ´ÓÚtelnetdδÕûÀíÓû§¿ØÖƵÄUSERÇéÐαäÁ¿£¬¹¥»÷Õß¿ÉÉèÖÃUSER=-f root²¢Í¨¹ýtelnet -aÏÂÁîÅþÁ¬£¬Ö±½ÓÈÆ¹ýÉí·ÝÑéÖ¤»ñÈ¡rootȨÏÞ¡£Îó²îÓ°Ïì2015ÄêÐû²¼µÄ1.9.3ÖÁ2.7°æ±¾£¬2.8°æ±¾ÒÑÐÞ¸´£¬ÎÞ·¨Éý¼¶µÄÓû§¿Éͨ¹ý½ûÓ÷þÎñ»ò·â±ÕTCP 23¶Ë¿Ú»º½â¡£GNU InetUtilsÊÇGNUÏîĿά»¤µÄ¾µäÍøÂ繤¾ß¼¯£¬°üÀ¨telnet/ftpµÈ¿Í»§¶ËºÍ·þÎñÆ÷£¬ÆÕ±éÓ¦ÓÃÓÚLinux¿¯Ðа档ֻ¹ÜTelnetÒòÇå¾²ÐԲSSHÈ¡´ú£¬µ«ÔÚ¹¤ÒµÎïÁªÍø¡¢ÉãÏñÍ·¡¢´«¸ÐÆ÷¼°OTÍøÂçÖÐÈÔÆÕ±é±£´æ£¬ÕâЩװ±¸³£Òò¼æÈÝÐÔ»òÉý¼¶ÐèÖØÆô¶øºã¾ÃÔËÐоɰæÏµÍ³¡£Zerotak¹«Ë¾Ö¸³ö£¬OT/ICSÇéÐÎÖÐÒªº¦ÏµÍ³Ìæ»»ÄÑÌ⣬ÒÅÁô×°±¸µ¼ÖÂTelnetÄÑÒÔÍêÈ«ïÔÌ¡£Íþв¼à¿Ø¹«Ë¾GreyNoise¼ì²âµ½Õë¶Ô¸ÃÎó²îµÄ¹¥»÷Ô˶¯£º1ÔÂ21-22ÈÕ£¬18¸ö¹¥»÷IPͨ¹ý60´ÎTelnet»á»°Ìᳫ100%¶ñÒâ¹¥»÷£¬·¢ËÍ1525¸öÊý¾Ý°ü£¨×ܼÆ101.6KB£©¡£¹¥»÷ʹÓÃTelnet IACÑ¡ÏîÐÉÌ»ú֯עÈë"USER=-f "²ÎÊý£¬83.3%µÄÄ¿µÄÊÇrootÓû§¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-telnetd-auth-bypass-flaw-to-get-root/
3. StanleyÐÂÐÍMaaSͨ¹ýChromeÊÐËÁ·Ö·¢´¹ÂÚÀ©Õ¹
1ÔÂ26ÈÕ£¬Ò»ÖÖÃûΪ"Stanley"µÄÐÂÐͶñÒâÈí¼þ¼´·þÎñ£¨MaaS£©¿ËÈÕÒý·¢Çå¾²½ç¹Ø×¢£¬¸Ã·þÎñͨ¹ýChromeÍøÉÏÓ¦ÓÃÊÐËÁ·Ö·¢¶ñÒâÀ©Õ¹³ÌÐòʵÑéÍøÂç´¹ÂÚ¹¥»÷¡£¾Ý¶Ëµ½¶ËÊý¾ÝÇå¾²¹«Ë¾VaronisÑо¿£¬StanleyÓɼÙÃûÏàͬµÄÂô¼Ò¿ª·¢£¬Æä½¹µã¹¦Ð§ÊÇÔÚÓû§ä¯ÀÀÆ÷ÖÐÁýÕÖÈ«ÆÁiframeÏÔʾ´¹ÂÚÄÚÈÝ£¬Í¬Ê±¼á³ÖµØµãÀ¸ÏÔʾÕýµ±ÓòÃûÒÔÔöÇ¿ÓÕÆÐÔ¡£¸ÃMaaS·þÎñÖ§³ÖChrome¡¢EdgeºÍBraveä¯ÀÀÆ÷¾²Ä¬×Ô¶¯×°Ö㬲¢Ìṩ¶¨ÖÆ»¯¹¦Ð§¡£Æä¶©ÔÄģʽ°üÀ¨¶à¸ö²ã¼¶£¬×î¸ß¼¶µÄ"LuxeÌײÍ"Å䱸Web¿ØÖÆÃæ°å£¬Ö§³Ö½«¶ñÒâÀ©Õ¹Ö±½ÓÐû²¼ÖÁChromeÓ¦ÓÃÊÐËÁ¡£StanleyµÄ¹¥»÷»úÖÆÍ¨¹ý×èµ²Ò³Ãæµ¼º½²¢ÓÃiframeÁýÕÖÍøÒ³ÊµÏÖ£¬²Ù×÷Ö°Ô±¿Éͨ¹ý¿ØÖÆÃæ°åʵʱÆôÓÃ/½ûÓÃÐ®ÖÆ¹æÔò£¬ÉõÖÁÖ±½ÓÏòÊܺ¦Õßä¯ÀÀÆ÷ÍÆËÍ֪ͨÓÕµ¼»á¼ûÌØ¶¨Ò³Ãæ¡£ÊÖÒÕ²ãÃæ£¬Stanleyÿ10ÃëÖ´ÐÐC2ÂÖѯ²¢Ö§³Ö±¸·ÝÓòÂÖ»»ÒÔÔöÇ¿¿¹·â±ÕÄÜÁ¦¡£Æä´úÂë±£´æ¶íÓï×¢ÊÍ¡¢¿Õcatch¿éºÍ²»¹æ·¶¹ýʧ´¦Öóͷ£µÈÎÊÌ⣬±»ÆÀ¼ÛΪ"ÊÖÒÕ´Ö²Ú"¡£µ«ÕæÕýʹÆäÍÑÓ±¶ø³öµÄÊÇÆäÆæÒìµÄ·Ö·¢Õ½ÂÔ£¬Ê¹ÓÃChromeÓ¦ÓÃÊÐËÁ×÷Ϊ¿ÉÐÅÆ½Ì¨ÈƹýͨÀýÉóºËÁ÷³Ì¡£
https://www.bleepingcomputer.com/news/security/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store/
4. αÔìCAPTCHAÓëApp-V¾ç±¾Èö²¥AmateraÇÔÃܳÌÐò
1ÔÂ26ÈÕ£¬Ò»ÏîÍŽáClickFixÒªÁ졢αÔìCAPTCHA¼°ÒÑÊðÃûMicrosoft App-V¾ç±¾µÄÐÂÐͶñÒâ¹¥»÷ÕýÈö²¥AmateraÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¾ÝBlackPoint CyberÑо¿£¬¹¥»÷ʼÓÚαÔìµÄCAPTCHAÑéÖ¤£¬ÓÕµ¼Êܺ¦Õßͨ¹ýWindowsÔËÐжԻ°¿òÖ´ÐжñÒâÏÂÁî¡£ÕâЩÏÂÁîÀÄÓÃÕýµ±µÄSyncAppvPublishingServer.vbs¾ç±¾£¬Í¨¹ýÊÜÐÅÍеÄwscript.exeÖ´ÐÐPowerShell´úÂ룬ʵÏÖ¶ñÒâÔ˶¯Òþ²Ø»¯¡£¸Ã¹¥»÷Ê×´ÎÔÚClickFix³¡¾°Öм¯³ÉApp-V¾ç±¾¡£¹¥»÷Á÷³Ì°üÀ¨¶à½×¶ÎÑéÖ¤£º³õʼÏÂÁî»á¼ì²éÊÇ·ñÊÖ¶¯Ö´ÐС¢Ö´ÐÐ˳ÐòÊÇ·ñºÏ¹æ¼°¼ôÌù°åÄÚÈÝÊÇ·ñ±»¸Ä¶¯£¬ÒÔ¹æ±ÜɳÏä¼ì²â¡£Èô·¢Ã÷ÆÊÎöÇéÐΣ¬Ö´Ðн«ÎÞÏÞÆÚÔÝÍ£ÒÔÏûºÄ×Ô¶¯»¯ÆÊÎö×ÊÔ´¡£Öª×ãÌõ¼þºó£¬¶ñÒâÈí¼þ´ÓGoogleÈÕÀúÎļþÖмìË÷base64±àÂëµÄÉèÖÃÊý¾Ý£¬Í¨¹ýWMI¿ò¼ÜÌìÉúÒþ²ØµÄ32λPowerShellÀú³Ì£¬½«Ç¶Ì×ÓÐÓÃÔØºÉ½âÃܲ¢¼ÓÔØÖÁÄÚ´æ¡£ºóÐø½×¶Î½ÓÄÉÒþдÊõ£º¼ÓÃܵÄPowerShellÓÐÓÃÔØºÉǶÈ빫¹²CDNÍйܵÄPNGͼÏñ£¬Í¨¹ýWinINet API¶¯Ì¬ÌáÈ¡£¬¾LSBÒþдÊõÆÊÎö¡¢GZip½âѹºóÄÚ´æÖ´ÐС£×îÖս׶νâÃܲ¢Æô¶¯ÔÉúshellcode£¬Ó³ÉäÖ´ÐÐAmateraÇÔÃܳÌÐò¡£
https://www.bleepingcomputer.com/news/security/new-clickfix-attacks-abuse-windows-app-v-scripts-to-push-malware/
5. ¶à¶ûÂí¿¨°ÍÃŽûϵͳÎó²î»òÖÂÔ¶³Ì¿ªÃÅ
1ÔÂ26ÈÕ£¬¿ËÈÕ£¬¶à¶ûÂí¿¨°Í£¨Dormakaba£©ÎïÀíÃŽûϵͳ±»ÆØ±£´æÑÏÖØÇå¾²Îó²î£¬¿ÉÄÜʹºÚ¿ÍÔ¶³Ì·¿ª´óÐÍ»ú¹¹´óÃÅ¡£¸ÃÎó²îÓÉAtosÆìÏÂEviden¹«Ë¾µÄÍøÂçÇå¾²×Éѯ¹«Ë¾SEC Consultר¼Ò·¢Ã÷£¬Ó°Ïì¹æÄ£º¸ÇDormakabaµÄExosÖÐÑëÖÎÀíÈí¼þ¡¢Ó²¼þ»á¼ûÖÎÀíÆ÷¼°Ö§³Ö¼üÅÌ¡¢Ö¸ÎÆ¡¢Ð¾Æ¬¿¨»á¼ûµÄ×¢²áµ¥Î»µÈ½¹µã²úÆ·¡£Ñо¿ÍŶӹ²·¢Ã÷20Óà¸öÎó²îÀàÐÍ£¬°üÀ¨Ó²±àÂëÆ¾Ö¤Óë¼ÓÃÜÃÜÔ¿¡¢ÈõÃÜÂë¡¢Éí·ÝÑé֤ȱʧ¡¢²»Çå¾²ÃÜÂëÌìÉú¡¢ÍâµØÈ¨ÏÞÌáÉý¡¢Êý¾Ýй¶¡¢Â·¾¶±éÀú¼°ÏÂÁî×¢ÈëµÈ¡£ÕâЩÎó²îÖ÷Òª±»Å·ÖÞ´óÐÍÆóҵʹÓã¬Éæ¼°¹¤Òµ¹«Ë¾¡¢ÄÜÔ´¹©Ó¦ÉÌ¡¢ÎïÁ÷ÆóÒµ¼°»ú³¡ÔËÓªÉ̵ȸßÇå¾²ÐèÇ󳡾°¡£SEC ConsultÖ¸³ö£¬¹¥»÷ÕßÈôʹÓÃÕâЩÎó²î£¬¿ÉÖ±½Ó½âËøÃŽû¡¢ÇÔÈ¡»á¼ûPINÂ룬»òÔÚÊÜ¿ØÇéÐÎÖÐÌᳫ½øÒ»²½¹¥»÷¡£Dormakaba͸¶£¬¿ÉÄÜÊýǧÃû¿Í»§ÊÜÓ°Ï죬ÆäÖв¿·Ö¸ßÇå¾²ÐèÇó¿Í»§Î£º¦ÓÈΪͻ³ö¡£DormakabaÔÚÒÑÍùÒ»Äê°ëÄÚÒ»Á¬Ðû²¼²¹¶¡¼°¼Ó¹ÌÖ¸ÄÏ£¬²¢ÓëÖ÷Òª¿Í»§ÏàÖúÐÞ¸´ÏµÍ³Îó²î£¬Í¬Ê±ÌåÏÖÉÐδ·¢Ã÷ÏÖʵʹÓð¸Àý¡£
https://www.securityweek.com/access-system-flaws-enabled-hackers-to-unlock-doors-at-major-european-firms/
6. CrunchbaseÔâShinyHunters¹¥»÷Ö³¬200ÍòÌõÊý¾Ýй¶
1ÔÂ26ÈÕ£¬¿ËÈÕ£¬ÆóÒµÊý¾Ýƽ̨Crunchbase֤ʵ±¬·¢ÑÏÖØÊý¾Ýй¶ÊÂÎñ¡£ÍøÂç·¸·¨×éÖ¯ShinyHuntersÐû³Æ´ÓÆäϵͳÖÐÇÔÈ¡ÁËÁè¼Ý200ÍòÌõСÎÒ˽¼Ò¼Í¼£¬ÒòÀÕË÷δ¹û£¬¸Ã×éÖ¯ÔÚTor°µÍøÍøÕ¾Ð¹Â¶Á˰üÀ¨402MBÊý¾ÝµÄѹËõÎļþ¡£Crunchbase»ØÓ¦³Æ£¬´Ë´ÎÇå¾²ÊÂÎñδ¶ÔÓªÒµÔËÓªÔì³É×ÌÈÅ£¬ÏÖÔÚÎó²îÒÑ»ñµÃ¿ØÖÆ£¬ÏµÍ³Ç徲״̬Òѻָ´¡£¾ÝCrunchbaseÅû¶£¬ÊÂÎñ±¬·¢ºó£¬¹«Ë¾Á¬Ã¦Ô¼ÇëÍøÂçÇ徲ר¼ÒÐÖúÊӲ죬²¢ÒÑ֪ͨÁª°îÖ´·¨²¿·Ö¡£×÷ΪÊÂÎñÏìÓ¦Á÷³ÌµÄÒ»²¿·Ö£¬CrunchbaseÕýÔÚÉó²éй¶Êý¾ÝµÄÏêϸÄÚÈÝ£¬ÒÔÈ·¶¨ÊÇ·ñÐèÒªÒÀ¾ÝÏà¹ØÖ´·¨ÒªÇóÏòÊÜÓ°ÏìÓû§·¢ËÍÕýʽ֪ͨ¡£¸Ã¹«Ë¾Ç¿µ÷£¬¹¥»÷ÕßÐû²¼µÄÎļþ°üÀ¨ÆóÒµÍøÂçÖеÄÌØ¶¨ÐÅÏ¢£¬µ«½¹µãӪҵϵͳδÊÜʵÖÊÐÔÓ°Ïì¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ShinyHunters×éÖ¯½üÆÚÖØÆôÁËÆäTorÊý¾Ýй¶վµã£¬½«CrunchbaseÓëSoundCloud¡¢BettermentÅäºÏÁÐÈë"Êý¾Ýй¶Êܺ¦ÕßÃûµ¥"£¬ºóÁ½¼Ò¹«Ë¾´Ëǰ¾ùÒÑ֤ʵÔâÓöÀàËÆ¹¥»÷¡£
https://securityaffairs.com/187340/data-breach/shinyhunters-claims-2-million-crunchbase-records-company-confirms-breach.html


¾©¹«Íø°²±¸11010802024551ºÅ