Òâ´óÀû·ÄÖ¯¾ÞÍ·FulgarÔâRansomHouseÀÕË÷¹¥»÷

Ðû²¼Ê±¼ä 2025-11-17

1. Òâ´óÀû·ÄÖ¯¾ÞÍ·FulgarÔâRansomHouseÀÕË÷¹¥»÷


11ÔÂ12ÈÕ£¬£¬£¬£¬£¬ÎªH&M¡¢°¢µÏ´ï˹¡¢Calzedonia¡¢WolfordµÈÆ·ÅÆ¹©»õµÄÒâ´óÀû·ÄÖ¯Òµ¾ÞÍ·FulgarÈ·ÈÏÔâÓöRansomHouseÀÕË÷Èí¼þÍŻ﹥»÷¡£¡£¡£¡£ ¡£¡£¸ÃÍÅ»ïÓÚ11ÔÂ12ÈÕÔÚ°µÍøÐ¹Â¶ÍøÕ¾Ðû²¼ÍþвÐÅÏ¢£¬£¬£¬£¬£¬Éù³Æ×Ô10ÔÂ31ÈÕÆðÒÑÕÆÎÕ¼ÓÃÜÊý¾Ý£¬£¬£¬£¬£¬²¢ÒªÇóÖÎÀí²ãÖ§¸¶Êê½ðÒÔ×èÖ¹ÉñÃØÊý¾Ýй¶»ò³öÊÛ¡£¡£¡£¡£ ¡£¡£FulgarËæºóÐû²¼Í¨¸æÖ¤Êµ£¬£¬£¬£¬£¬11ÔÂ3ÈÕÆäÌìÏÂITϵͳÔâÍøÂç·¸·¨¹¥»÷£¬£¬£¬£¬£¬×÷ΪԤ·À²½·¥£¬£¬£¬£¬£¬Òâ´óÀûËùÓÐITϵͳÒѹرգ¬£¬£¬£¬£¬ÏÖÔÚËäδµ¥¶Àʶ±ðÏêϸй¶µÄСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬µ«ÄÚ²¿Îļþ¡¢ÒøÐÐÕË»§Óà¶î¡¢Õþ¸®»ú¹¹Í¨Ñ¶¼Í¼¼°·¢Æ±µÈÃô¸ÐÐÅÏ¢¿ÉÄÜÒÑÍâй¡£¡£¡£¡£ ¡£¡£´Ë´Î¹¥»÷²»µ«¿ÉÄÜͨ¹ý¶¨ÖÆ»¯ÍøÂç´¹ÂÚ½øÒ»²½ÉøÍ¸¹«Ë¾ÏµÍ³£¬£¬£¬£¬£¬¸ü½«µ¼ÖÂÕ½ÂÔÐÅϢй¶£¬£¬£¬£¬£¬Ê¹¾ºÕùµÐÊÖ»ñÈ¡ÔËÓª¡¢¿Í»§¼°¶¨¼Û½á¹¹µÈÒªº¦ÐÅÏ¢£¬£¬£¬£¬£¬Ï÷ÈõÊг¡ÓÅÊÆ¡£¡£¡£¡£ ¡£¡£RansomHouse²¢·ÇÐÂÃæÄ¿£¬£¬£¬£¬£¬¸ÃÍÅ»ï×Ô2021Äê12Ô½øÈ빫ÖÚÊÓÒ°£¬£¬£¬£¬£¬ÒÑÔÚÆäÐ¹Â¶ÍøÕ¾Áгö148ÃûÊܺ¦Õß¡£¡£¡£¡£ ¡£¡£¾ÝÃÀ¹úÍøÂçÇå¾²»ú¹¹2024ÄêÁªºÏÖÒÑÔ£¬£¬£¬£¬£¬¸ÃÍÅ»ïÓëÒÁÀÊÏàÖúʵÑé¼ÓÃܹ¥»÷£¬£¬£¬£¬£¬ÒÔ»ñÈ¡Êê½ð·Ö³É¡£¡£¡£¡£ ¡£¡£


https://cybernews.com/security/fulgar-ransomware-attack-adidas/


2. FortiWeb·¾¶±éÀúÎó²îÔâÈ«Çò¹æÄ£Ê¹ÓÃ


11ÔÂ13ÈÕ£¬£¬£¬£¬£¬ÍþвÇ鱨¹«Ë¾DefusedÓÚ10ÔÂ6ÈÕÊ״η¢Ã÷Fortinet FortiWeb 8.0.1¼°¸üÔç°æ±¾±£´æÑÏÖØÂ·¾¶±éÀúÎó²î£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÔÚÎÞÐèÉí·ÝÑéÖ¤µÄÇéÐÎÏ£¬£¬£¬£¬£¬Í¨¹ýÏòÌØ¶¨API·¾¶·¢ËͰüÀ¨¶ñÒâÓÐÓÃÔØºÉµÄHTTP POSTÇëÇ󣬣¬£¬£¬£¬ÔÚ̻¶װ±¸ÉϽ¨ÉèÍâµØÖÎÀíÔ±¼¶±ðÕË»§¡£¡£¡£¡£ ¡£¡£¹¥»÷ÕßÒÑʹÓøÃÎó²îÔÚÈ«Çò¹æÄ£ÄÚÌᳫ¹¥»÷£¬£¬£¬£¬£¬Í¨¹ý¶à¸öIPµØµãʵÑé²Ù×÷£¬£¬£¬£¬£¬½¨ÉèµÄÓû§ÃûÈçTestpoint¡¢trader1µÈ£¬£¬£¬£¬£¬ÃÜÂë°üÀ¨3eMIXX43¡¢AFT3$tH4ckµÈÖØ´ó×éºÏ£¬£¬£¬£¬£¬ÊÔͼͨ¹ý¶àÕË»§ÊµÑéÉøÍ¸ÏµÍ³¡£¡£¡£¡£ ¡£¡£FortinetÒÑÐû²¼8.0.2°æ±¾ÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬ÆäPSIRTÍøÕ¾ÉÐδÅû¶Ïà¹ØÎó²îÐÅÏ¢¡£¡£¡£¡£ ¡£¡£Ä¿½ñ£¬£¬£¬£¬£¬ÖÎÀíÔ±ÐèÁ¬Ã¦½«×°±¸Éý¼¶ÖÁ8.0.2°æ±¾£¬£¬£¬£¬£¬²¢¼ì²éϵͳÊÇ·ñ±£´æÒì³£ÖÎÀíÕË»§¡¢ÈÕÖ¾ÖÐfwbcgi·¾¶µÄÒì³£ÇëÇó¼°¿ÉÒÉIPµØµã»î¶¯¡£¡£¡£¡£ ¡£¡£Í¬Ê±£¬£¬£¬£¬£¬Ó¦ÑÏ¿áÏÞÖÆÖÎÀí½çÃæ½öͨ¹ýÊÜÐÅÈÎÍøÂç»òVPN»á¼û£¬£¬£¬£¬£¬×èֹ̻¶ÔÚ¹«Íø¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/fortiweb-flaw-with-public-poc-actively-exploited-to-create-admin-users/


3. DoorDash 10ÔÂÉç½»¹¤³Ì¹¥»÷Ö°ÙÍòÓû§ÐÅϢй¶


11ÔÂ13ÈÕ£¬£¬£¬£¬£¬ÍâÂô¾ÞÍ·DoorDashÅû¶ÓÚ10ÔÂ25ÈÕÓÉÔ±¹¤Éç½»¹¤³ÌÕ©Æ­Òý·¢µÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Éæ¼°ÃÀ¹ú¡¢¼ÓÄô󡢰ĴóÀûÑǼ°ÐÂÎ÷À¼Êý°ÙÍòÓû§¡£¡£¡£¡£ ¡£¡£¾ÝDoorDash¹Ù·½Í¨Öª£¬£¬£¬£¬£¬Î´¾­ÊÚȨµÄµÚÈý·½Í¨¹ýÔ±¹¤Õ˺ŻñÈ¡ÁËÓû§ÐÕÃû¡¢ÏÖʵµØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµÈÁªÏµÐÅÏ¢£¬£¬£¬£¬£¬²¿·ÖÓû§»¹¿ÉÄÜÉæ¼°Éç»áÇå¾²ºÅÂ루ÃÀ¹ú£©»òÉç»á°ü¹ÜºÅÂ루¼ÓÄô󣩣¬£¬£¬£¬£¬µ«DoorDashÇ¿µ÷Ãô¸Ð²ÆÎñÊý¾Ýδ±»Ð¹Â¶¡£¡£¡£¡£ ¡£¡£´Ë´ÎÊÂÎñÊÇDoorDashµÚÈý´ÎÖØ´óÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬2019ÄêÔøÐ¹Â¶Ô¼500ÍòÓû§Êý¾Ý£¬£¬£¬£¬£¬2022ÄêÓÖÔâÓëTwilio¹¥»÷ͬԴµÄºÚ¿ÍÈëÇÖ¡£¡£¡£¡£ ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬DoorDashÔÚÊÂÎñ±¬·¢ºó19Ìì²Å×îÏÈ֪ͨÓû§£¬£¬£¬£¬£¬Òý·¢ÆÕ±éÆ·ÆÀ¡£¡£¡£¡£ ¡£¡£¼ÓÄôóÓû§ÊÕµ½¸½´ø·¨Óï·­ÒëµÄ֪ͨ£¬£¬£¬£¬£¬µ«Í¨¸æÎ´Ã÷È·ÆäËûµØÇøÊÜÓ°Ïì¹æÄ£¡£¡£¡£¡£ ¡£¡£DoorDash»ØÓ¦³ÆÒѽÓÄɶàÏî²½·¥£¬£¬£¬£¬£¬°üÀ¨Çжϲ»·¨»á¼û¡¢Éý¼¶Ç徲ϵͳ¡¢ÔöǿԱ¹¤Åàѵ¡¢Ô¼ÇëÍøÂçÇ徲ȡ֤¹«Ë¾ÊӲ죬£¬£¬£¬£¬²¢ÅäºÏÖ´·¨²¿·ÖÐж¯¡£¡£¡£¡£ ¡£¡£¹«Ë¾ÌáÐÑÓû§Ð¡ÐÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬×èÖ¹µã»÷¿ÉÒÉÁ´½Ó»òй¶СÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬Í¬Ê±¿ªÍ¨Ãâ·Ñµç»°Ìṩ×Éѯ¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/doordash-hit-by-new-data-breach-in-october-exposing-user-information/


4. ÂÞ¼¼ÔâClopÀÕË÷ÍŻ﹥»÷ÖÂ1.8TBÊý¾Ýй¶


11ÔÂ14ÈÕ£¬£¬£¬£¬£¬Ó²¼þÅä¼þ¾ÞÍ·ÂÞ¼¼¹«Ë¾¿ËÈÕ֤ʵÔâÓöÓÉÀÕË÷ÍÅ»ïClopÌᳫµÄÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬¸ÃÍÅ»ïÉù³ÆÊ¹ÓÃÁËOracle E-Business SuiteµÄÁãÈÕÎó²îCVE-2025-61882ʵÑé¹¥»÷¡£¡£¡£¡£ ¡£¡£ÂÞ¼¼ÒÑÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»8-K±í¸ñÅû¶ÊÂÎñ£¬£¬£¬£¬£¬Ç¿µ÷´Ë´ÎÍøÂçÇå¾²ÊÂÎñδӰÏìÆä²úÆ·¡¢ÓªÒµÔËÓª»òÉú²úϵͳ¡£¡£¡£¡£ ¡£¡£¾ÝÂÞ¼¼¹Ù·½ÉùÃ÷£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý¿ÉÄܰüÀ¨Ô±¹¤¡¢ÏûºÄÕß¡¢¿Í»§¼°¹©Ó¦É̵IJ¿·ÖÐÅÏ¢£¬£¬£¬£¬£¬µ«Î´Éæ¼°¹úÃñÉí·ÝÖ¤ºÅÂë¡¢ÐÅÓÿ¨µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬ÒòÏà¹ØÊý¾Ýδ´æ´¢ÔÚ±»ÈëÇÖϵͳÖС£¡£¡£¡£ ¡£¡£´Ë´Î¹¥»÷Ô´ÓÚµÚÈý·½ÁãÈÕÎó²î£¬£¬£¬£¬£¬ÂÞ¼¼ÔÚ·¢Ã÷Îó²îºóÒÑÁ¬Ã¦ÁªºÏÍâ²¿ÍøÂçÇå¾²¹«Ë¾¾ÙÐÐÊӲ첢ÐÞ¸´ÏµÍ³¡£¡£¡£¡£ ¡£¡£ClopÍÅ»ïÉÏÖÜÒѽ«ÂÞ¼¼ÁÐÈëÆäÊý¾Ýй¿àÕË÷ÍøÕ¾£¬£¬£¬£¬£¬¹ûÕæÁ˾ݳÆÇÔÈ¡µÄ½ü1.8TBÊý¾Ý¡£¡£¡£¡£ ¡£¡£±¾´ÎOracle E-Business SuiteÎó²îÓ°Ïì¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬³ýÂÞ¼¼Í⣬£¬£¬£¬£¬¹þ·ð´óѧ¡¢Envoy Air¼°¡¶»ªÊ¢¶ÙÓʱ¨¡·µÈ»ú¹¹ÒàÊܲ¨¼°¡£¡£¡£¡£ ¡£¡£Oracle´ËǰÒÑÐû²¼½ôÆÈ¸üÐÂÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬²¢½¨ÒéÓû§Éý¼¶ÖÁÇå¾²°æ±¾¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/logitech-confirms-data-breach-after-clop-extortion-attack/


5. FingerÏÂÁîÀÄÓù¥»÷£º´ÓÀúÊ·¹¤¾ßµ½ÐÂÐÍÍþÐ²ÔØÌå


11ÔÂ15ÈÕ£¬£¬£¬£¬£¬±£´æÊýÊ®ÄêµÄ"finger"ÏÂÁîÕý³ÉÎªÍøÂç¹¥»÷ÐÂÔØÌ壬£¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ý¸ÃЭÒéÔÚWindows×°±¸Ö´ÐжñÒâ²Ù×÷¡£¡£¡£¡£ ¡£¡£¸ÃÏÂÁîÆðÔ´ÓÚUnix/Linuxϵͳ£¬£¬£¬£¬£¬ÓÃÓÚÅÌÎÊÓû§ÐÅÏ¢£¨ÈçµÇ¼Ãû¡¢Ö÷Ŀ¼¡¢ÔÚÏß״̬µÈ£©£¬£¬£¬£¬£¬ºó±»Windowsϵͳ¼æÈÝ¡£¡£¡£¡£ ¡£¡£Ö»¹ÜÄ¿½ñʹÓÃÆµÂʽµµÍ£¬£¬£¬£¬£¬µ«ÆäЭÒéÌØÕ÷ÈÔ±»¶ñÒâʹÓᣡ£¡£¡£ ¡£¡£½üÆÚ¹¥»÷°¸ÀýÏÔʾ£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý"finger"ЭÒéʵÑéClickFix¹¥»÷£ºÀýÈ磬£¬£¬£¬£¬Åú´¦Öóͷ£ÎļþÖ´ÐÐfingerÏÂÁ£¬£¬£¬£¬´ÓÔ¶³ÌЧÀÍÆ÷¼ìË÷¶ñÒâÖ¸Á£¬£¬£¬£¬¾­cmd.exe¹ÜµÀÔÚÍâµØÔËÐС£¡£¡£¡£ ¡£¡£´ËÀ๥»÷³£Î±×°³É"ÑéÖ¤ÈËÀà"µÄÑéÖ¤ÂëÁ÷³Ì£¬£¬£¬£¬£¬ÓÕµ¼Óû§Ö´ÐаüÀ¨fingerÏÂÁîµÄWindowsÖ¸Á£¬£¬£¬£¬×îÖÕµ¼Ö¶ñÒâÈí¼þÏÂÔØÓëÖ´ÐС£¡£¡£¡£ ¡£¡£Ïêϸ¹¥»÷Á´Â·ÖУ¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃfingerÏÂÁî´ÓÌØ¶¨ÓòÃû»ñÈ¡ÏÂÁ£¬£¬£¬£¬´¥·¢curl.exeÏÂÔØÎ±×°³ÉPDFµÄzip°ü£¬£¬£¬£¬£¬½âѹºóÖ´ÐÐPython¶ñÒâ³ÌÐò¡£¡£¡£¡£ ¡£¡£¸üÖØ´óµÄ¹¥»÷»á¼ì²âϵͳÊÇ·ñ×°ÖöñÒâÈí¼þÆÊÎö¹¤¾ß£¬£¬£¬£¬£¬Èô±£´æÔòÖÕÖ¹¹¥»÷£¬£¬£¬£¬£¬²»È»ÏÂÔØNetSupport Manager RAT²¢ÉèÖÃÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯¿ØÖÆ¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/decades-old-finger-protocol-abused-in-clickfix-malware-attacks/


6. ÃÀ˾·¨²¿ÆÆ»ñ³¯ÍøÂç·¸·¨°¸£ºÎåÈËÈÏ×ïÉæ3.8ÒÚ


11ÔÂ14ÈÕ£¬£¬£¬£¬£¬ÃÀ¹ú˾·¨²¿¿ËÈÕÐû²¼£¬£¬£¬£¬£¬ÎåÃûÉæ°¸Ö°Ô±ÈÏ¿ÉЭÖú³¯ÏÊʵÑé²»·¨´´Êջ£¬£¬£¬£¬£¬°üÀ¨Ô¶³ÌITÊÂÇéÕßڲƭºÍ¼ÓÃÜÇ®±Ò͵ÇÔ¡£¡£¡£¡£ ¡£¡£¸Ã°¸¼þÉæ¼°³¯ÏÊAPT38Íþв×éÖ¯¼°LazarusºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬ÃÀ¹úÕþ¸®Õý×·ÇóûÊÕ¸Ã×é֯ͨ¹ý1500ÍòÃÀÔª¼ÓÃÜÇ®±Ò͵ÇÔ°¸ËùµÃµÄ²»·¨×ʲú¡£¡£¡£¡£ ¡£¡£ÎåÃûÈÏ×ïÕß°üÀ¨ËÄÃûÃÀ¹ú¹«ÃñºÍÒ»ÃûÎÚ¿ËÀ¼ÈË£¬£¬£¬£¬£¬ËûÃÇͨ¹ýαÔì»òÇÔÈ¡µÄÃÀ¹ú¹«ÃñÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬×ÊÖú³¯ÏÊÌØ¹¤ÒÔ¡°Ô¶³ÌITÊÂÇéÕß¡±Éí·Ý±»136¼ÒÃÀ¹ú¹«Ë¾¹ÍÓ¶¡£¡£¡£¡£ ¡£¡£ÕâÐ©ÌØ¹¤½«ÈËΪ¼°²¿·ÖÇÔÈ¡Êý¾ÝÔËËÍÖÁ³¯ÏÊÕþ¸®£¬£¬£¬£¬£¬ÀÛ¼ÆÎª³¯ÏÊÕþȨ´´Á¢³¬220ÍòÃÀÔª²»·¨ÊÕÈë¡£¡£¡£¡£ ¡£¡£Ïêϸ°¸¼þÖУ¬£¬£¬£¬£¬°ÂÁпËÉ£µÂ¡¤µÏ¼ȡÒòµçÐÅթƭͬı¼°ÑÏÖØÉí·Ý͵ÇÔ×ï±»Ö¸¿Ø£¬£¬£¬£¬£¬Æäͨ¹ýUpWorkSellƽ̨ÏòÍâÑóITÖ°Ô±³öÊÛÇÔÈ¡µÄÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬Ê¹40¼ÒÃÀ¹ú¹«Ë¾ÊÜÆ­ £» £»£»£»£»£»£»°£Àï¿Ë¡¤ÆÕÁÖ˹Ôòͨ¹ýÆä¹«Ë¾Taggcar Inc.ʹÓÃÇÔÈ¡Éí·Ý°²¶Ù64ÃûÍâÑóÖ°Ô±£¬£¬£¬£¬£¬×¬Ç®8.9ÍòÃÀÔª²¢Ôì³É³¬94ÍòÃÀÔªËðʧ £» £»£»£»£»£»£»°ÂµÂÀï¿Ë¡¤·¨¸ñÄÉÈü¡¢½ÜÉ­¡¤ÈøÀ­Ôú¶ûºÍÑÇÀúɽ´ó¡¤ÌØÀ­Î¬Ë¹ÈýÈ˼ÓÈë2019-2022ÄêÕ©Æ­»î¶¯£¬£¬£¬£¬£¬×ܼÆÔì³É128ÍòÃÀÔªËðʧ¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/five-plead-guilty-to-helping-north-koreans-infiltrate-us-firms/