Òâ´óÀû·ÄÖ¯¾ÞÍ·FulgarÔâRansomHouseÀÕË÷¹¥»÷

Ðû²¼Ê±¼ä 2025-11-17

1. Òâ´óÀû·ÄÖ¯¾ÞÍ·FulgarÔâRansomHouseÀÕË÷¹¥»÷


11ÔÂ12ÈÕ £¬£¬£¬£¬ £¬£¬£¬ÎªH&M¡¢°¢µÏ´ï˹¡¢Calzedonia¡¢WolfordµÈÆ·ÅÆ¹©»õµÄÒâ´óÀû·ÄÖ¯Òµ¾ÞÍ·FulgarÈ·ÈÏÔâÓöRansomHouseÀÕË÷Èí¼þÍŻ﹥»÷¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÓÚ11ÔÂ12ÈÕÔÚ°µÍøÐ¹Â¶ÍøÕ¾Ðû²¼ÍþвÐÅÏ¢ £¬£¬£¬£¬ £¬£¬£¬Éù³Æ×Ô10ÔÂ31ÈÕÆðÒÑÕÆÎÕ¼ÓÃÜÊý¾Ý £¬£¬£¬£¬ £¬£¬£¬²¢ÒªÇóÖÎÀí²ãÖ§¸¶Êê½ðÒÔ×èÖ¹ÉñÃØÊý¾Ýй¶»ò³öÊÛ¡£¡£¡£¡£¡£¡£FulgarËæºóÐû²¼Í¨¸æÖ¤Êµ £¬£¬£¬£¬ £¬£¬£¬11ÔÂ3ÈÕÆäÌìÏÂITϵͳÔâÍøÂç·¸·¨¹¥»÷ £¬£¬£¬£¬ £¬£¬£¬×÷ΪԤ·À²½·¥ £¬£¬£¬£¬ £¬£¬£¬Òâ´óÀûËùÓÐITϵͳÒÑ¹Ø±Õ £¬£¬£¬£¬ £¬£¬£¬ÏÖÔÚËäδµ¥¶Àʶ±ðÏêϸй¶µÄСÎÒ˽¼ÒÊý¾Ý £¬£¬£¬£¬ £¬£¬£¬µ«ÄÚ²¿Îļþ¡¢ÒøÐÐÕË»§Óà¶î¡¢Õþ¸®»ú¹¹Í¨Ñ¶¼Í¼¼°·¢Æ±µÈÃô¸ÐÐÅÏ¢¿ÉÄÜÒÑÍâй¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²»µ«¿ÉÄÜͨ¹ý¶¨ÖÆ»¯ÍøÂç´¹ÂÚ½øÒ»²½ÉøÍ¸¹«Ë¾ÏµÍ³ £¬£¬£¬£¬ £¬£¬£¬¸ü½«µ¼ÖÂÕ½ÂÔÐÅϢй¶ £¬£¬£¬£¬ £¬£¬£¬Ê¹¾ºÕùµÐÊÖ»ñÈ¡ÔËÓª¡¢¿Í»§¼°¶¨¼Û½á¹¹µÈÒªº¦ÐÅÏ¢ £¬£¬£¬£¬ £¬£¬£¬Ï÷ÈõÊг¡ÓÅÊÆ¡£¡£¡£¡£¡£¡£RansomHouse²¢·ÇÐÂÃæÄ¿ £¬£¬£¬£¬ £¬£¬£¬¸ÃÍÅ»ï×Ô2021Äê12Ô½øÈ빫ÖÚÊÓÒ° £¬£¬£¬£¬ £¬£¬£¬ÒÑÔÚÆäÐ¹Â¶ÍøÕ¾Áгö148ÃûÊܺ¦Õß¡£¡£¡£¡£¡£¡£¾ÝÃÀ¹úÍøÂçÇå¾²»ú¹¹2024ÄêÁªºÏÖÒÑÔ £¬£¬£¬£¬ £¬£¬£¬¸ÃÍÅ»ïÓëÒÁÀÊÏàÖúʵÑé¼ÓÃܹ¥»÷ £¬£¬£¬£¬ £¬£¬£¬ÒÔ»ñÈ¡Êê½ð·Ö³É¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/fulgar-ransomware-attack-adidas/


2. FortiWeb·¾¶±éÀúÎó²îÔâÈ«Çò¹æÄ£Ê¹ÓÃ


11ÔÂ13ÈÕ £¬£¬£¬£¬ £¬£¬£¬ÍþвÇ鱨¹«Ë¾DefusedÓÚ10ÔÂ6ÈÕÊ״η¢Ã÷Fortinet FortiWeb 8.0.1¼°¸üÔç°æ±¾±£´æÑÏÖØÂ·¾¶±éÀúÎó²î £¬£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÔÚÎÞÐèÉí·ÝÑéÖ¤µÄÇéÐÎÏ £¬£¬£¬£¬ £¬£¬£¬Í¨¹ýÏòÌØ¶¨API·¾¶·¢ËͰüÀ¨¶ñÒâÓÐÓÃÔØºÉµÄHTTP POSTÇëÇó £¬£¬£¬£¬ £¬£¬£¬ÔÚ̻¶װ±¸ÉϽ¨ÉèÍâµØÖÎÀíÔ±¼¶±ðÕË»§¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÒÑʹÓøÃÎó²îÔÚÈ«Çò¹æÄ£ÄÚÌᳫ¹¥»÷ £¬£¬£¬£¬ £¬£¬£¬Í¨¹ý¶à¸öIPµØµãʵÑé²Ù×÷ £¬£¬£¬£¬ £¬£¬£¬½¨ÉèµÄÓû§ÃûÈçTestpoint¡¢trader1µÈ £¬£¬£¬£¬ £¬£¬£¬ÃÜÂë°üÀ¨3eMIXX43¡¢AFT3$tH4ckµÈÖØ´ó×éºÏ £¬£¬£¬£¬ £¬£¬£¬ÊÔͼͨ¹ý¶àÕË»§ÊµÑéÉøÍ¸ÏµÍ³¡£¡£¡£¡£¡£¡£FortinetÒÑÐû²¼8.0.2°æ±¾ÐÞ¸´´ËÎó²î £¬£¬£¬£¬ £¬£¬£¬ÆäPSIRTÍøÕ¾ÉÐδÅû¶Ïà¹ØÎó²îÐÅÏ¢¡£¡£¡£¡£¡£¡£Ä¿½ñ £¬£¬£¬£¬ £¬£¬£¬ÖÎÀíÔ±ÐèÁ¬Ã¦½«×°±¸Éý¼¶ÖÁ8.0.2°æ±¾ £¬£¬£¬£¬ £¬£¬£¬²¢¼ì²éϵͳÊÇ·ñ±£´æÒì³£ÖÎÀíÕË»§¡¢ÈÕÖ¾ÖÐfwbcgi·¾¶µÄÒì³£ÇëÇó¼°¿ÉÒÉIPµØµã»î¶¯¡£¡£¡£¡£¡£¡£Í¬Ê± £¬£¬£¬£¬ £¬£¬£¬Ó¦ÑÏ¿áÏÞÖÆÖÎÀí½çÃæ½öͨ¹ýÊÜÐÅÈÎÍøÂç»òVPN»á¼û £¬£¬£¬£¬ £¬£¬£¬×èֹ̻¶ÔÚ¹«Íø¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fortiweb-flaw-with-public-poc-actively-exploited-to-create-admin-users/


3. DoorDash 10ÔÂÉç½»¹¤³Ì¹¥»÷Ö°ÙÍòÓû§ÐÅϢй¶


11ÔÂ13ÈÕ £¬£¬£¬£¬ £¬£¬£¬ÍâÂô¾ÞÍ·DoorDashÅû¶ÓÚ10ÔÂ25ÈÕÓÉÔ±¹¤Éç½»¹¤³ÌÕ©Æ­Òý·¢µÄÊý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬ £¬£¬£¬Éæ¼°ÃÀ¹ú¡¢¼ÓÄô󡢰ĴóÀûÑǼ°ÐÂÎ÷À¼Êý°ÙÍòÓû§¡£¡£¡£¡£¡£¡£¾ÝDoorDash¹Ù·½Í¨Öª £¬£¬£¬£¬ £¬£¬£¬Î´¾­ÊÚȨµÄµÚÈý·½Í¨¹ýÔ±¹¤Õ˺ŻñÈ¡ÁËÓû§ÐÕÃû¡¢ÏÖʵµØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµÈÁªÏµÐÅÏ¢ £¬£¬£¬£¬ £¬£¬£¬²¿·ÖÓû§»¹¿ÉÄÜÉæ¼°Éç»áÇå¾²ºÅÂ루ÃÀ¹ú£©»òÉç»á°ü¹ÜºÅÂ루¼ÓÄÃ´ó£© £¬£¬£¬£¬ £¬£¬£¬µ«DoorDashÇ¿µ÷Ãô¸Ð²ÆÎñÊý¾Ýδ±»Ð¹Â¶¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÊÇDoorDashµÚÈý´ÎÖØ´óÇå¾²ÊÂÎñ £¬£¬£¬£¬ £¬£¬£¬2019ÄêÔøÐ¹Â¶Ô¼500ÍòÓû§Êý¾Ý £¬£¬£¬£¬ £¬£¬£¬2022ÄêÓÖÔâÓëTwilio¹¥»÷ͬԴµÄºÚ¿ÍÈëÇÖ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬ £¬£¬£¬DoorDashÔÚÊÂÎñ±¬·¢ºó19Ìì²Å×îÏÈ֪ͨÓû§ £¬£¬£¬£¬ £¬£¬£¬Òý·¢ÆÕ±éÆ·ÆÀ¡£¡£¡£¡£¡£¡£¼ÓÄôóÓû§ÊÕµ½¸½´ø·¨Óï·­ÒëµÄ֪ͨ £¬£¬£¬£¬ £¬£¬£¬µ«Í¨¸æÎ´Ã÷È·ÆäËûµØÇøÊÜÓ°Ïì¹æÄ£¡£¡£¡£¡£¡£¡£DoorDash»ØÓ¦³ÆÒѽÓÄɶàÏî²½·¥ £¬£¬£¬£¬ £¬£¬£¬°üÀ¨Çжϲ»·¨»á¼û¡¢Éý¼¶Ç徲ϵͳ¡¢ÔöǿԱ¹¤Åàѵ¡¢Ô¼ÇëÍøÂçÇ徲ȡ֤¹«Ë¾ÊÓ²ì £¬£¬£¬£¬ £¬£¬£¬²¢ÅäºÏÖ´·¨²¿·ÖÐж¯¡£¡£¡£¡£¡£¡£¹«Ë¾ÌáÐÑÓû§Ð¡ÐÄ´¹ÂÚÓʼþ £¬£¬£¬£¬ £¬£¬£¬×èÖ¹µã»÷¿ÉÒÉÁ´½Ó»òй¶СÎÒ˽¼ÒÐÅÏ¢ £¬£¬£¬£¬ £¬£¬£¬Í¬Ê±¿ªÍ¨Ãâ·Ñµç»°Ìṩ×Éѯ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/doordash-hit-by-new-data-breach-in-october-exposing-user-information/


4. ÂÞ¼¼ÔâClopÀÕË÷ÍŻ﹥»÷ÖÂ1.8TBÊý¾Ýй¶


11ÔÂ14ÈÕ £¬£¬£¬£¬ £¬£¬£¬Ó²¼þÅä¼þ¾ÞÍ·ÂÞ¼¼¹«Ë¾¿ËÈÕ֤ʵÔâÓöÓÉÀÕË÷ÍÅ»ïClopÌᳫµÄÑÏÖØÊý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬ £¬£¬£¬¸ÃÍÅ»ïÉù³ÆÊ¹ÓÃÁËOracle E-Business SuiteµÄÁãÈÕÎó²îCVE-2025-61882ʵÑé¹¥»÷¡£¡£¡£¡£¡£¡£ÂÞ¼¼ÒÑÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»8-K±í¸ñÅû¶ÊÂÎñ £¬£¬£¬£¬ £¬£¬£¬Ç¿µ÷´Ë´ÎÍøÂçÇå¾²ÊÂÎñδӰÏìÆä²úÆ·¡¢ÓªÒµÔËÓª»òÉú²úϵͳ¡£¡£¡£¡£¡£¡£¾ÝÂÞ¼¼¹Ù·½ÉùÃ÷ £¬£¬£¬£¬ £¬£¬£¬Ð¹Â¶Êý¾Ý¿ÉÄܰüÀ¨Ô±¹¤¡¢ÏûºÄÕß¡¢¿Í»§¼°¹©Ó¦É̵IJ¿·ÖÐÅÏ¢ £¬£¬£¬£¬ £¬£¬£¬µ«Î´Éæ¼°¹úÃñÉí·ÝÖ¤ºÅÂë¡¢ÐÅÓÿ¨µÈÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬ £¬£¬£¬ÒòÏà¹ØÊý¾Ýδ´æ´¢ÔÚ±»ÈëÇÖϵͳÖС£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ô´ÓÚµÚÈý·½ÁãÈÕÎó²î £¬£¬£¬£¬ £¬£¬£¬ÂÞ¼¼ÔÚ·¢Ã÷Îó²îºóÒÑÁ¬Ã¦ÁªºÏÍâ²¿ÍøÂçÇå¾²¹«Ë¾¾ÙÐÐÊӲ첢ÐÞ¸´ÏµÍ³¡£¡£¡£¡£¡£¡£ClopÍÅ»ïÉÏÖÜÒѽ«ÂÞ¼¼ÁÐÈëÆäÊý¾Ýй¿àÕË÷ÍøÕ¾ £¬£¬£¬£¬ £¬£¬£¬¹ûÕæÁ˾ݳÆÇÔÈ¡µÄ½ü1.8TBÊý¾Ý¡£¡£¡£¡£¡£¡£±¾´ÎOracle E-Business SuiteÎó²îÓ°Ïì¹æÄ£ÆÕ±é £¬£¬£¬£¬ £¬£¬£¬³ýÂÞ¼¼Íâ £¬£¬£¬£¬ £¬£¬£¬¹þ·ð´óѧ¡¢Envoy Air¼°¡¶»ªÊ¢¶ÙÓʱ¨¡·µÈ»ú¹¹ÒàÊܲ¨¼°¡£¡£¡£¡£¡£¡£Oracle´ËǰÒÑÐû²¼½ôÆÈ¸üÐÂÐÞ¸´¸ÃÎó²î £¬£¬£¬£¬ £¬£¬£¬²¢½¨ÒéÓû§Éý¼¶ÖÁÇå¾²°æ±¾¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/logitech-confirms-data-breach-after-clop-extortion-attack/


5. FingerÏÂÁîÀÄÓù¥»÷£º´ÓÀúÊ·¹¤¾ßµ½ÐÂÐÍÍþÐ²ÔØÌå


11ÔÂ15ÈÕ £¬£¬£¬£¬ £¬£¬£¬±£´æÊýÊ®ÄêµÄ"finger"ÏÂÁîÕý³ÉÎªÍøÂç¹¥»÷ÐÂÔØÌå £¬£¬£¬£¬ £¬£¬£¬ÍþвÐÐΪÕßͨ¹ý¸ÃЭÒéÔÚWindows×°±¸Ö´ÐжñÒâ²Ù×÷¡£¡£¡£¡£¡£¡£¸ÃÏÂÁîÆðÔ´ÓÚUnix/Linuxϵͳ £¬£¬£¬£¬ £¬£¬£¬ÓÃÓÚÅÌÎÊÓû§ÐÅÏ¢£¨ÈçµÇ¼Ãû¡¢Ö÷Ŀ¼¡¢ÔÚÏß״̬µÈ£© £¬£¬£¬£¬ £¬£¬£¬ºó±»Windowsϵͳ¼æÈÝ¡£¡£¡£¡£¡£¡£Ö»¹ÜÄ¿½ñʹÓÃÆµÂʽµµÍ £¬£¬£¬£¬ £¬£¬£¬µ«ÆäЭÒéÌØÕ÷ÈÔ±»¶ñÒâʹÓᣡ£¡£¡£¡£¡£½üÆÚ¹¥»÷°¸ÀýÏÔʾ £¬£¬£¬£¬ £¬£¬£¬¹¥»÷Õßͨ¹ý"finger"ЭÒéʵÑéClickFix¹¥»÷£ºÀýÈç £¬£¬£¬£¬ £¬£¬£¬Åú´¦Öóͷ£ÎļþÖ´ÐÐfingerÏÂÁî £¬£¬£¬£¬ £¬£¬£¬´ÓÔ¶³ÌЧÀÍÆ÷¼ìË÷¶ñÒâÖ¸Áî £¬£¬£¬£¬ £¬£¬£¬¾­cmd.exe¹ÜµÀÔÚÍâµØÔËÐС£¡£¡£¡£¡£¡£´ËÀ๥»÷³£Î±×°³É"ÑéÖ¤ÈËÀà"µÄÑéÖ¤ÂëÁ÷³Ì £¬£¬£¬£¬ £¬£¬£¬ÓÕµ¼Óû§Ö´ÐаüÀ¨fingerÏÂÁîµÄWindowsÖ¸Áî £¬£¬£¬£¬ £¬£¬£¬×îÖÕµ¼Ö¶ñÒâÈí¼þÏÂÔØÓëÖ´ÐС£¡£¡£¡£¡£¡£Ïêϸ¹¥»÷Á´Â·ÖÐ £¬£¬£¬£¬ £¬£¬£¬¹¥»÷ÕßʹÓÃfingerÏÂÁî´ÓÌØ¶¨ÓòÃû»ñÈ¡ÏÂÁî £¬£¬£¬£¬ £¬£¬£¬´¥·¢curl.exeÏÂÔØÎ±×°³ÉPDFµÄzip°ü £¬£¬£¬£¬ £¬£¬£¬½âѹºóÖ´ÐÐPython¶ñÒâ³ÌÐò¡£¡£¡£¡£¡£¡£¸üÖØ´óµÄ¹¥»÷»á¼ì²âϵͳÊÇ·ñ×°ÖöñÒâÈí¼þÆÊÎö¹¤¾ß £¬£¬£¬£¬ £¬£¬£¬Èô±£´æÔòÖÕÖ¹¹¥»÷ £¬£¬£¬£¬ £¬£¬£¬²»È»ÏÂÔØNetSupport Manager RAT²¢ÉèÖÃÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯¿ØÖÆ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/decades-old-finger-protocol-abused-in-clickfix-malware-attacks/


6. ÃÀ˾·¨²¿ÆÆ»ñ³¯ÍøÂç·¸·¨°¸£ºÎåÈËÈÏ×ïÉæ3.8ÒÚ


11ÔÂ14ÈÕ £¬£¬£¬£¬ £¬£¬£¬ÃÀ¹ú˾·¨²¿¿ËÈÕÐû²¼ £¬£¬£¬£¬ £¬£¬£¬ÎåÃûÉæ°¸Ö°Ô±ÈÏ¿ÉЭÖú³¯ÏÊʵÑé²»·¨´´Êջ £¬£¬£¬£¬ £¬£¬£¬°üÀ¨Ô¶³ÌITÊÂÇéÕßڲƭºÍ¼ÓÃÜÇ®±Ò͵ÇÔ¡£¡£¡£¡£¡£¡£¸Ã°¸¼þÉæ¼°³¯ÏÊAPT38Íþв×éÖ¯¼°LazarusºÚ¿Í×éÖ¯ £¬£¬£¬£¬ £¬£¬£¬ÃÀ¹úÕþ¸®Õý×·ÇóûÊÕ¸Ã×é֯ͨ¹ý1500ÍòÃÀÔª¼ÓÃÜÇ®±Ò͵ÇÔ°¸ËùµÃµÄ²»·¨×ʲú¡£¡£¡£¡£¡£¡£ÎåÃûÈÏ×ïÕß°üÀ¨ËÄÃûÃÀ¹ú¹«ÃñºÍÒ»ÃûÎÚ¿ËÀ¼ÈË £¬£¬£¬£¬ £¬£¬£¬ËûÃÇͨ¹ýαÔì»òÇÔÈ¡µÄÃÀ¹ú¹«ÃñÉí·ÝÐÅÏ¢ £¬£¬£¬£¬ £¬£¬£¬×ÊÖú³¯ÏÊÌØ¹¤ÒÔ¡°Ô¶³ÌITÊÂÇéÕß¡±Éí·Ý±»136¼ÒÃÀ¹ú¹«Ë¾¹ÍÓ¶¡£¡£¡£¡£¡£¡£ÕâÐ©ÌØ¹¤½«ÈËΪ¼°²¿·ÖÇÔÈ¡Êý¾ÝÔËËÍÖÁ³¯ÏÊÕþ¸® £¬£¬£¬£¬ £¬£¬£¬ÀÛ¼ÆÎª³¯ÏÊÕþȨ´´Á¢³¬220ÍòÃÀÔª²»·¨ÊÕÈë¡£¡£¡£¡£¡£¡£Ïêϸ°¸¼þÖÐ £¬£¬£¬£¬ £¬£¬£¬°ÂÁпËÉ£µÂ¡¤µÏ¼ȡÒòµçÐÅթƭͬı¼°ÑÏÖØÉí·Ý͵ÇÔ×ï±»Ö¸¿Ø £¬£¬£¬£¬ £¬£¬£¬Æäͨ¹ýUpWorkSellƽ̨ÏòÍâÑóITÖ°Ô±³öÊÛÇÔÈ¡µÄÉí·ÝÐÅÏ¢ £¬£¬£¬£¬ £¬£¬£¬Ê¹40¼ÒÃÀ¹ú¹«Ë¾ÊÜÆ­£»£»£»°£Àï¿Ë¡¤ÆÕÁÖ˹Ôòͨ¹ýÆä¹«Ë¾Taggcar Inc.ʹÓÃÇÔÈ¡Éí·Ý°²¶Ù64ÃûÍâÑóÖ°Ô± £¬£¬£¬£¬ £¬£¬£¬×¬Ç®8.9ÍòÃÀÔª²¢Ôì³É³¬94ÍòÃÀÔªËðʧ£»£»£»°ÂµÂÀï¿Ë¡¤·¨¸ñÄÉÈü¡¢½ÜÉ­¡¤ÈøÀ­Ôú¶ûºÍÑÇÀúɽ´ó¡¤ÌØÀ­Î¬Ë¹ÈýÈ˼ÓÈë2019-2022ÄêÕ©Æ­»î¶¯ £¬£¬£¬£¬ £¬£¬£¬×ܼÆÔì³É128ÍòÃÀÔªËðʧ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/five-plead-guilty-to-helping-north-koreans-infiltrate-us-firms/