SonicWall֤ʵ¿Í»§Ð¹Â¶ÊÂÎñϵ¹ú¼ÒºÚ¿ÍËùΪ

Ðû²¼Ê±¼ä 2025-11-07

1. SonicWall֤ʵ¿Í»§Ð¹Â¶ÊÂÎñϵ¹ú¼ÒºÚ¿ÍËùΪ


11ÔÂ5ÈÕ£¬ £¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾SonicWall¿ËÈÕÍê³É¶Ô9Ô¿ͻ§·À»ðǽÉèÖñ¸·ÝÎļþй¶ÊÂÎñµÄÊӲ죬 £¬£¬£¬£¬½áÂÛÏÔʾ´Ë´Î¹¥»÷Óɹú¼ÒÖ§³ÖµÄºÚ¿Í×é֯ʵÑé¡£¡£¡£¾ÝMandiantÊÂÎñÏìÓ¦ÍŶÓÈ·ÈÏ£¬ £¬£¬£¬£¬¶ñÒâ»î¶¯½öͨ¹ýAPIŲÓÃδÊÚȨ»á¼ûÌØ¶¨ÔÆÇéÐÎÖеı¸·ÝÎļþ£¬ £¬£¬£¬£¬Î´¶ÔSonicWall²úÆ·¡¢¹Ì¼þ¡¢ÏµÍ³¡¢¹¤¾ß¡¢Ô´´úÂë»ò¿Í»§ÍøÂçÔì³ÉÓ°Ïì¡£¡£¡£ÊÂÎñʼÓÚ9ÔÂ17ÈÕ£¬ £¬£¬£¬£¬SonicWallÅû¶¡°´æ´¢ÔÚ²¿·ÖMySonicWallÕË»§ÖеķÀ»ðǽÉèÖñ¸·ÝÎļþй¶¡±¡£¡£¡£¹¥»÷Õ߿ɴÓÕâЩÎļþÖÐÌáÈ¡»á¼ûƾ֤¡¢ÁîÅÆµÈÃô¸ÐÐÅÏ¢£¬ £¬£¬£¬£¬¿ÉÄÜÓÃÓÚ¹¥»÷¿Í»§·À»ðǽ¡£¡£¡£¹«Ë¾Ëæ¼´½¨Òé¿Í»§ÖØÖÃMySonicWallÕË»§Æ¾Ö¤¡¢ÔÝʱ»á¼û´úÂë¡¢LDAP/RADIUS/TACACS+ЧÀÍÆ÷ÃÜÂë¡¢L2TP/PPPoE/PPTP WAN½Ó¿ÚÃÜÂë¼°IPSec VPNÕ½ÂÔÖеĹ²ÏíÃÜÔ¿¡£¡£¡£10ÔÂ9ÈÕ£¬ £¬£¬£¬£¬SonicWall¸üÐÂ˵Ã÷£¬ £¬£¬£¬£¬´Ë´ÎÎó²îÓ°ÏìËùÓÐʹÓÃÆäÔÆ±¸·ÝЧÀÍ´æ´¢·À»ðǽÉèÖÃÎļþµÄ¿Í»§£¬ £¬£¬£¬£¬µ«Ç¿µ÷½öÏÞÓÚÔÆÇéÐÎÌØ¶¨²¿·Ö£¬ £¬£¬£¬£¬²úÆ·Çå¾²ÐÔδÊÜË𺦡£¡£¡£


https://www.bleepingcomputer.com/news/security/sonicwall-says-state-sponsored-hackers-behind-security-breach-in-september/


2. ¹ú¼ÊÁªºÏÐж¯µ·»Ù³¬3ÒÚÅ·ÔªÐÅÓÿ¨Ú²Æ­ÍøÂç


11ÔÂ5ÈÕ£¬ £¬£¬£¬£¬¹ú¼ÊÕþ¸®ÓÚ11ÔÂ4ÈÕ¿ªÕ¹´úºÅ¡°×·»ØÐж¯¡±£¨Operation Chargeback£©µÄ¿ç¹úÖ´·¨£¬ £¬£¬£¬£¬Àֳɵ·»ÙÈý¸ö´óÐÍÐÅÓÿ¨Ú²Æ­¼°Ï´Ç®ÍøÂ磬 £¬£¬£¬£¬Éæ°¸½ð¶î³¬3ÒÚÅ·Ôª£¨Ô¼3.44ÒÚÃÀÔª£©£¬ £¬£¬£¬£¬²¨¼°193¸ö¹ú¼ÒµÄ430ÓàÍò³Ö¿¨ÈË¡£¡£¡£´Ë´ÎÐж¯Óɵ¹úÉó²é¹ÙºÍÁª°îÐÌʾ¯Ô±¾Öǣͷ£¬ £¬£¬£¬£¬Å·ÖÞ˾·¨×éÖ¯ÓëÅ·ÖÞÐ̾¯×é֯Эµ÷£¬ £¬£¬£¬£¬µÂ¹ú¡¢ÃÀ¹ú¡¢¼ÓÄôó¡¢ÐÂ¼ÓÆÂµÈ¾Å¹úÁªºÏ¼ÓÈ룬 £¬£¬£¬£¬¹²¾Ð²¶44ÃûÏÓÒÉÈË£¬ £¬£¬£¬£¬ÆäÖÐ18ÈËÒѱ»¾Ð²¶£¬ £¬£¬£¬£¬°üÀ¨ÎåÃûµÂ¹úÖ÷ÒªÖ§¸¶Ð§ÀÍÌṩÉ̵ĸ߹ܼ°ÁùÃûÉæÏÓÓëÕ©Æ­ÍøÂ繴ͨµÄÖ§¸¶»ú¹¹Ö°Ô±¡£¡£¡£ÊÓ²ìÏÔʾ£¬ £¬£¬£¬£¬2016ÖÁ2021Äê¼ä£¬ £¬£¬£¬£¬·¸·¨ÍøÂçʹÓÃÐÅÓÿ¨Êý¾ÝÔÚÉ«Çé¡¢Ô¼»á¼°Á÷ýÌåÆ½Ì¨½¨É賬1900Íò¸öÐéα¶©ÔÄ£¬ £¬£¬£¬£¬µ¥±ÊÓöȿØÖÆÔÚ50Å·Ôª×óÓÒÇÒÐÎòģºý£¬ £¬£¬£¬£¬½µµÍÊܺ¦Õßʶ±ðÄѶȡ£¡£¡£ÏÓÒÉÈËͨ¹ýÓ¢¹ú¡¢ÈûÆÖ·˹ע²áµÄ¿Õ¿Ç¹«Ë¾×ªÒÆ×ʽ𣬠£¬£¬£¬£¬²¢Ê¹ÓÃËļҵ¹úÖ§¸¶Ð§ÀÍÌṩÉ̵Ļù´¡ÉèÊ©´¦Öóͷ£²»·¨ÉúÒ⣬ £¬£¬£¬£¬Ðγɡ°Õ©Æ­-Ï´Ç®¡±±Õ»·¡£¡£¡£µÂ¹ú¾¯·½ÔÚ8¸öÖÝÖ´ÐÐ29´ÎËѲ飬 £¬£¬£¬£¬²é»ñ¼ÛÖµ³¬3500ÍòÅ·Ôª×ʲú£¬ £¬£¬£¬£¬°üÀ¨ºÀ»ªÆû³µ¡¢¼ÓÃÜÇ®±Ò¡¢µç×Ó×°±¸µÈ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/europol-credit-card-fraud-rings-stole-eur-300-million-from-43-million-cardholders/


3. ²¨À¼ÔâϵÁÐÍøÂç¹¥»÷ÖÂÍ·²¿»ú¹¹Êý¾Ýй¶


11ÔÂ5ÈÕ£¬ £¬£¬£¬£¬²¨À¼Õþ¸®ÕýÊÓ²ì¶àÆðÕë¶Ô¹«¹²¼°Ë½ÈË»ù´¡ÉèÊ©µÄÍøÂç¹¥»÷ÊÂÎñ£¬ £¬£¬£¬£¬µ¼Ö¶à¼Ò´óÐÍÆóÒµÊý×ÖЧÀÍÖÐÖ¹ÓëСÎÒ˽¼ÒÊý¾Ýй¶£¬ £¬£¬£¬£¬Éæ¼°¸Ã¹úÍ·²¿ÔÚÏß´û¿îƽ̨SuperGrosz¡¢Ö÷Á÷ÒÆ¶¯Ö§¸¶ÏµÍ³Blik¼°×î´óÂÃÐÐÉçNowa Itaka¡£¡£¡£Êý×ÖÊÂÎñ²¿³¤¿ËÈÕʲÍзò¡¤¸ß¿Æ·ò˹»ùÖ¸³ö£¬ £¬£¬£¬£¬´ËÀ๥»÷ÒÑ¡°Ë¾¿Õ¼û¹ß¡±£¬ £¬£¬£¬£¬²¨À¼ÖðÈÕÎüÊÕÊýǧÆðÊÂÎñ±¨¸æ£¬ £¬£¬£¬£¬2025Äê»ò³ÉÍøÂç¹¥»÷´´¼Í¼Äê·Ý£¬ £¬£¬£¬£¬¹¥»÷Ä¿µÄÕý´ÓµØ·½¹«ÓÃÊÂÒµÀ©Õ¹ÖÁ½ðÈÚ¡¢ÄÜÔ´µÈÒªº¦ÏµÍ³¡£¡£¡£SuperGroszƽ̨ȷÈÏ£¬ £¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÇÔÈ¡³¬1ÍòÃû¿Í»§ÐÕÃû¡¢µØµã¡¢Éí·ÝÖ¤ºÅ¡¢Ë°ºÅ¡¢ÁªÏµ·½·¨¡¢¾ÍÒµÏêÇé¼°ÒøÐÐÕ˺ŵÈÃô¸ÐÐÅÏ¢£¬ £¬£¬£¬£¬ÏÖʵ¹æÄ£¿£¿£¿£¿£¿£¿£¿ÉÄܸü´ó£¬ £¬£¬£¬£¬¹«Ë¾ÒѾ¯Ê¾¿Í»§Ìá·ÀڲƭÐÅ´û»î¶¯¡£¡£¡£BlikÒÆ¶¯Ö§¸¶ÏµÍ³ÒòDDoS¹¥»÷¶ÌÔÝÖÐֹЧÀÍ£¬ £¬£¬£¬£¬¾­ÐÞ¸´ºóÒѻָ´£»£»£»£»Nowa ItakaÂÃÐÐÉçÔòй¶¿Í»§ÐÕÃû¡¢ÓÊÏä¼°µç»°ºÅÂ룬 £¬£¬£¬£¬µ«Ô¤¶©ÏêÇé¡¢²ÆÎñÊý¾Ý¼°ÕË»§ÃÜÂëδÊÜÓ°Ïì¡£¡£¡£¸ß¿Æ·ò˹»ùÇ¿µ÷£¬ £¬£¬£¬£¬Õë¶ÔBlikµÄ¹¥»÷¡°ÏßË÷Ö¸Ïò¶íÂÞ˹¡±£¬ £¬£¬£¬£¬²¢½«ÆäÊÓΪ¡°»ìÏýÕ½Õùн׶Ρ±¡£¡£¡£


https://therecord.media/poland-hacks-loan-platform-mobile-payments-system-travel-agency


4. ÈðÊ¿¹þ±ÈÒøÐÐÔâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷


11ÔÂ5ÈÕ£¬ £¬£¬£¬£¬ÈðÊ¿ËÕÀèÊÀ¹þ±ÈÒøÐУ¨Habib Bank AG Zurich£©Ôâ¶íÂÞ˹ºÚ¿Í×éÖ¯÷è÷ëÀÕË÷Èí¼þÍŻ﹥»÷£¬ £¬£¬£¬£¬¸ÃÍÅ»ïÓÚ11ÔÂ5ÈÕÔÚ°µÍø²©¿ÍÐû²¼×îÐÂÊܺ¦ÕßÃûµ¥£¬ £¬£¬£¬£¬Éù³ÆÇÔÈ¡³¬2.5TBÊý¾Ý¡¢½ü200Íò¸öÎļþ£¬ £¬£¬£¬£¬°üÀ¨¿Í»§»¤ÕÕºÅÂë¡¢ÒøÐÐÕË»§Óà¶î¡¢ÉúÒâÖ§¸¶³¡ºÏµÈÃô¸ÐÐÅÏ¢¼°ÄÚ²¿¹¤¾ßÔ´´úÂë¡£¡£¡£ÎªÊ©Ñ¹Êê½ðÖ§¸¶£¬ £¬£¬£¬£¬ÍÅ»ïÒѹûÕæ²¿·ÖÎļþ½ØÍ¼£¬ £¬£¬£¬£¬²¢ÍþвÈôÒªÇóδ֪×㽫½øÒ»²½Ð¹Â¶»ò³öÊÛÊý¾Ý¡£¡£¡£¹þ±ÈÒøÐн¨ÉèÓÚ1967Ä꣬ £¬£¬£¬£¬ÓªÒµÆÕ±éÈðÊ¿¡¢Ó¢¹ú¡¢°¢ÁªÇõ¡¢Ïã¸ÛµÈ15¹ú£¬ £¬£¬£¬£¬2024Äê¹ÍÓ¶7904ÃûÔ±¹¤£¬ £¬£¬£¬£¬ÊÕÈë´ï7.5ÒÚÃÀÔª¡£¡£¡£÷è÷ëÀÕË÷Èí¼þ×Ô2022Äê»îÔ¾ÓÚÀÕË÷ÁìÓò£¬ £¬£¬£¬£¬Æä°µÍøÐ¹Â¶ÍøÕ¾×Ô³Æ2021ÄêÔË×÷£¬ £¬£¬£¬£¬2024ÄêÒÑÓñ³ÉÇò×î»îÔ¾ÍÅ»ïÖ®Ò»£¬ £¬£¬£¬£¬×Ô2023ÄêÆðͨ¹ýRansomlooker¼à¿ØÏÔʾÒÑÁÐ959ÃûÊܺ¦Õߣ¬ £¬£¬£¬£¬º­¸ÇÒ½Ôº¡¢ÖÆÔìÒµ¡¢µçÁ¦¹«Ë¾¡¢Ò©Æ·¸£ÀûÖÎÀí»ú¹¹µÈ¡£¡£¡£¸ÃÍÅ»ïÓëLockBit¡¢DragonForce½áÃË£¬ £¬£¬£¬£¬Í¨¹ý×ÊÔ´¹²ÏíÌáÉý¹¥»÷Õ½ÂÔÖØÆ¯ºóÓë¹æÄ£¡£¡£¡£


https://cybernews.com/security/swiss-habib-bank-data-breach/


5. ¶íÂÞ˹ºË·ÏÎï´¦Öóͷ£³§RadonÔâÊý¾Ýй¶


11ÔÂ5ÈÕ£¬ £¬£¬£¬£¬¶íÂÞ˹¹ú¼ÒÔ­×ÓÄܹ«Ë¾ÆìϺ˷ÏÎï´¦Öóͷ£³§RadonµÄϵͳÔâÈëÇÖ£¬ £¬£¬£¬£¬¹¥»÷ÕßÉù³ÆÇÔÈ¡´ó×ÚÃô¸ÐÊý¾Ý²¢ÔÚÈÈÃÅÊý¾Ýй¶ÂÛ̳¹ûÕæ¡£¡£¡£´Ë´ÎÐ¹Â¶Éæ¼°²âÊÔÖ°Ô±ÐÕÃû¡¢Ä¥Á·Í³¼ÆÁ¿¡¢Óû§ID¡¢×´Ì¬Êý¾Ý¡¢µç×ÓÓʼþ¼°µç»°ºÅÂëµÈÒªº¦ÐÅÏ¢£¬ £¬£¬£¬£¬Êý¾ÝÑù±¾Òò¹¥»÷ÕßÉèÖÃÏÂÔØÏÞÖÆÔÝÎÞ·¨»á¼û£¬ £¬£¬£¬£¬Í¹ÏÔÊÂÎñÊܹØ×¢¶ÈÖ®¸ß¡£¡£¡£Radon¹«Ë¾×÷Ϊ¶íÂÞ˹Ö÷ÒªºËÉèÊ©ÍËÒÛÓëÕûÀíÔËÓªÉÌ£¬ £¬£¬£¬£¬×ܲ¿Î»ÓÚĪ˹¿Æ£¬ £¬£¬£¬£¬ÈÏÕæÍøÂç¡¢ÔËÊä¡¢Öü´æ¼°×îÖÕ´¦Öóͷ£µÍÖзÅÉäÐÔ·ÏÎLILW£©£¬ £¬£¬£¬£¬²¢Ö´ÐзøÉä¼à²â¡£¡£¡£ÆäÓªÒµÉæ¼°È«Çò×îÃô¸ÐÖÊÁÏÖ®Ò»£¬ £¬£¬£¬£¬·ÅÉäÐÔ·ÏÎïµÄ´¦Öóͷ££¬ £¬£¬£¬£¬ÔøÓÚ1986-1989Äê¼ÓÈëÇжûŵ±´ÀûºËµçվʹÊЧ¹ûÏû³ý£¬ £¬£¬£¬£¬Ö°Î»ÖÁ¹ØÖ÷Òª¡£¡£¡£´Ë´Î¹¥»÷µÄDZÔÚΣº¦ÓÈΪÑÏËà¡£¡£¡£Ð¹Â¶µÄ²âÊÔÊý¾Ý¿ÉÄܱ»ÓÃÓÚαÔìÇå¾²ÆÀ¹ÀÎĵµ£¬ £¬£¬£¬£¬Îóµ¼·ÅÉäÐÔÇøÓòΣº¦ÅжÏ£»£»£»£»½áÊÊÓû§Éí·ÝÐÅÏ¢£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÌᳫ¾«×¼Óã²æÊ½ÍøÂç´¹ÂÚ£¬ £¬£¬£¬£¬½øÒ»²½ÉøÍ¸¹«Ë¾ÏµÍ³¡£¡£¡£Ô±¹¤Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢Èô±»ÓÃÓÚÉç»á¹¤³Ì¹¥»÷£¬ £¬£¬£¬£¬»òÓëÆäËûÊý¾ÝÁ¬Ïµ¾ÙÐÐÉí·ÝÆÊÎö£¬ £¬£¬£¬£¬½«¼Ó¾çÇå¾²Íþв¡£¡£¡£


https://cybernews.com/security/nuclear-waste-plant-data-breach/


6. ÃÀ¹ú¹ú»áÔ¤Ëã°ì¹«ÊÒÒÉËÆÔâÊÜÍâ¹úÍøÂç¹¥»÷


11ÔÂ6ÈÕ£¬ £¬£¬£¬£¬ÃÀ¹ú¹ú»áÔ¤Ëã°ì¹«ÊÒ£¨CBO£©Ö¤ÊµÔâÓöÒÉËÆÍâ¹úºÚ¿ÍÍøÂç¹¥»÷£¬ £¬£¬£¬£¬Ãô¸ÐÊý¾Ý¿ÉÄÜй¶¡£¡£¡£CBO½²»°ÈË¿­ÌØÁÕ¡¤°¬ÂêÌåÏÖ£¬ £¬£¬£¬£¬¸Ã»ú¹¹ÒÑѸËÙ½ÓÄÉÐж¯¿ØÖÆÊÂ̬£¬ £¬£¬£¬£¬²¢ÊµÑéÌØÊâ¼à¿ØºÍÇå¾²²½·¥¡£¡£¡£´Ë´ÎÊÂÎñÓÉ¡¶»ªÊ¢¶ÙÓʱ¨¡·ÂÊÏÈÅû¶£¬ £¬£¬£¬£¬¹ÙÔ±³ÆºÚ¿Í¹¥»÷¿ÉÄÜÒÑй¶¹ú»á°ì¹«ÊÒÓëCBOÆÊÎöʦ¼äµÄµç×ÓÓʼþ¼°½»Á÷ÄÚÈÝ¡£¡£¡£Ö»¹Ü²¿·Ö¹ú»á°ì¹«ÊÒÒòÇå¾²¼Ç¹ÒÔÝÍ£ÓëCBOµÄÓʼþÍùÀ´£¬ £¬£¬£¬£¬µ«CBOÇ¿µ÷ÆäÊÂÇéÒ»Á¬¾ÙÐУ¬ £¬£¬£¬£¬²¢Ò»Á¬¼à¿ØÓ¦¶ÔÍþв¡£¡£¡£CBO×÷ΪÎÞµ³ÅÉ»ú¹¹£¬ £¬£¬£¬£¬ÈÏÕæÎªÁ¢·¨ÕßÌṩ¾­¼ÃÆÊÎö¼°Á¢·¨±¾Ç®¹ÀË㣬 £¬£¬£¬£¬Æä±¨¸æµ×¸å¡¢¾­¼ÃÕ¹Íû¼°ÄÚ²¿Í¨Ñ¶ÈôÔâй¶£¬ £¬£¬£¬£¬¿ÉÄÜÓ°ÏìÕþ²ßÖÆ¶©¡£¡£¡£CBOÔÚÉùÃ÷ÖÐÇ¿µ÷£¬ £¬£¬£¬£¬ÓëÆäËûÕþ¸®¼°Ë½Óª²¿·ÖÒ»Ñù£¬ £¬£¬£¬£¬ÆäÍøÂç³£ÃæÁÙÍþв£¬ £¬£¬£¬£¬ÐèÒ»Á¬ÔöÇ¿·À»¤¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬ÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬ £¬£¬£¬£¬CBOÕýÓëÏà¹Ø»ú¹¹ÏàÖúÆÀ¹ÀÓ°Ï첢ǿ»¯·ÀÓù²½·¥¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-congressional-budget-office-hit-by-suspected-foreign-cyberattack/