Fortra GoAnywhere MFT¸ßΣÎó²îÔâ»îԾʹÓÃ

Ðû²¼Ê±¼ä 2025-09-29

1. Fortra GoAnywhere MFT¸ßΣÎó²îÔâ»îԾʹÓÃ


9ÔÂ26ÈÕ£¬ £¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÆð¾¢Ê¹ÓÃFortra GoAnywhereÖÎÀíÎļþ´«ÊäÈí¼þÖеÄ×î¸ßÑÏÖØÐÔÎó²îCVE-2025-10035Ìᳫ¹¥»÷¡£¡£¡£ ¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚÔÊÐíÖ¤ServletµÄ·´ÐòÁл¯È±ÏÝ£¬ £¬£¬£¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýαÔìÔÊÐíÖ¤ÏìÓ¦ÊðÃûÔ¶³Ì×¢ÈëÏÂÁ £¬£¬£¬£¬£¬£¬ÊµÏÖÔ¤ÊÚȨԶ³Ì´úÂëÖ´ÐС£¡£¡£ ¡£¡£¡£¡£FortraÓÚ9ÔÂ18ÈÕÕýʽÅû¶¸ÃÎó²î£¬ £¬£¬£¬£¬£¬£¬µ«ÏÖʵÔçÔÚ9ÔÂ10ÈÕ±ãÒѱ£´æÒ°ÍâʹÓÃÖ¤¾Ý¡£¡£¡£ ¡£¡£¡£¡£WatchTowr LabsÇå¾²Ñо¿Ö°Ô±Ö¤Êµ£¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õß×Ô9ÔÂ10ÈÕÆðÒÑʹÓôËÁãÈÕÎó²î£¬ £¬£¬£¬£¬£¬£¬±È¹Ù·½Í¨¸æÌáǰ8Ìì¡£¡£¡£ ¡£¡£¡£¡£Îó²îʹÓÃÀú³ÌÖУ¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õ߻ὨÉèÃûΪ"admin-go"µÄºóÃÅÖÎÀíÔ±ÕË»§£¬ £¬£¬£¬£¬£¬£¬²¢ÉÏ´«"zato_be.exe"ºÍ"jwunst.exe"£¨Õýµ±Ô¶³Ì»á¼û¹¤¾ßSimpleHelpµÄ¶ñÒâÀÄÓð汾£©µÈÓÐÓÃÔØºÉ£¬ £¬£¬£¬£¬£¬£¬ÍøÂçÓû§È¨ÏÞÐÅÏ¢²¢ÉúÑÄÖÁtest.txtÎļþ£¬ £¬£¬£¬£¬£¬£¬ÎªºáÏòÒÆ¶¯×ö×¼±¸¡£¡£¡£ ¡£¡£¡£¡£Fortra½¨ÒéϵͳÖÎÀíÔ±Á¬Ã¦Éý¼¶ÖÁÐÞ¸´°æ±¾7.8.4»ò7.6.3£¬ £¬£¬£¬£¬£¬£¬²¢½ÓÄÉ»º½â²½·¥£ºÏû³ýGoAnywhereÖÎÀí¿ØÖÆÌ¨µÄ¹«¹²»¥ÁªÍøÌ»Â¶£¬ £¬£¬£¬£¬£¬£¬¼ì²éÈÕÖ¾ÖÐ"SignedObject.getObject"¹ýʧÒÔÈ·ÈÏÊÇ·ñÊÜÓ°Ïì¡£¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/maximum-severity-goanywhere-mft-flaw-exploited-as-zero-day/


2. ÂíÀïÀ¼Öݽ»Í¨²¿MDOTÔâRhysidaÀÕË÷Èí¼þ¹¥»÷


9ÔÂ25ÈÕ£¬ £¬£¬£¬£¬£¬£¬ÃÀ¹úÂíÀïÀ¼Öݽ»Í¨²¿£¨MDOT£©ÔâÓöÓë¶íÂÞ˹ÓйصÄRhysidaÀÕË÷Èí¼þÍŻ﹥»÷£¬ £¬£¬£¬£¬£¬£¬¸Ã×é֯ͨ¹ý°µÍø²©¿ÍÐû²¼±»µÁÊý¾Ý½ØÍ¼£¬ £¬£¬£¬£¬£¬£¬°üÀ¨»¤ÕÕ¡¢Éí·ÝÖ¤¼þ¡¢Åä¾°ÊӲ졢Éç»á°ü¹Ü¿¨¼°·¸·¨Åä¾°ÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬²¢Ë÷Òª30±ÈÌØ±Ò£¨Ô¼330ÍòÃÀÔª£©Êê½ð¡£¡£¡£ ¡£¡£¡£¡£MDOT×÷ΪÂíÀïÀ¼Öݽ»Í¨½¹µãÖÎÀí»ú¹¹£¬ £¬£¬£¬£¬£¬£¬î¿ÏµÖݽ»Í¨ÖÎÀí¾Ö£¨MTA£©¡¢¸ÛÎñ¾Ö¡¢º½¿ÕÖÎÀí¾ÖµÈÁù´ó²¿·Ö£¬ £¬£¬£¬£¬£¬£¬ÆäÔËÓªµÄ»ªÊ¢¶Ù-°Í¶ûµÄĦ½»Í¨ÏµÍ³Äê¿ÍÁ÷Á¿³¬6700ÍòÈ˴Ρ£¡£¡£ ¡£¡£¡£¡£Æ¾Ö¤MDOT¹Ù·½Í¨Öª£¬ £¬£¬£¬£¬£¬£¬¹¥»÷½öÓ°ÏìMTA²¿·Öϵͳ£¬ £¬£¬£¬£¬£¬£¬½¹µãЧÀÍÈÔÕý³£ÔËÐУ¬ £¬£¬£¬£¬£¬£¬µ«²¿·Ö¹«½»³µÊµÊ±Êý¾ÝÖÐÖ¹¡£¡£¡£ ¡£¡£¡£¡£ÊÓ²ìÈ·Èϱ£´æÊý¾Ýɥʧ£¬ £¬£¬£¬£¬£¬£¬ÏêÏ¸Éæ¼°Ô±¹¤¼°ÂÿÍÃô¸ÐÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬¿ÉÄÜÒý·¢Éí·Ý͵ÇÔºÍÉç»á°ü¹ÜڲƭΣº¦¡£¡£¡£ ¡£¡£¡£¡£Ñо¿ÍŶӯÊÎöÏÔʾ£¬ £¬£¬£¬£¬£¬£¬±»µÁÊý¾Ý»¹°üÀ¨ÄÚ²¿²ÆÎñ±¨¸æºÍÔ¤ËãÎļþ£¬ £¬£¬£¬£¬£¬£¬µ«ÒòMDOTÔ¤Ëã͸Ã÷¶È½Ï¸ß£¬ £¬£¬£¬£¬£¬£¬´ËÀàÎļþ˽ÈËÐÅϢΣº¦½ÏµÍ¡£¡£¡£ ¡£¡£¡£¡£RhysidaÍÅ»ï×Ô2023ÄêÍ·×îÏÈ»îÔ¾£¬ £¬£¬£¬£¬£¬£¬Òѹ¥»÷³¬220¸ö×éÖ¯£¬ £¬£¬£¬£¬£¬£¬±»ËÝÔ´ÖÁ¶íÂÞ˹»ò¶ÀÁªÌå¹ú¼Ò£¬ £¬£¬£¬£¬£¬£¬ÓëVice SocietyÀÕË÷Èí¼þÍŻﱣ´æÊÖÒÕ¹ØÁª¼°ÊÕÒæ·Ö³É¡£¡£¡£ ¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬£¬MDOTÕýÁªºÏÖ´·¨»ú¹¹¼°µÚÈý·½ÍøÂçÇ徲ר¼ÒÊÓ²ìÊÂÎñ£¬ £¬£¬£¬£¬£¬£¬µ«ÉÐδÃ÷È·Êý¾Ýй¶ȫò¡£¡£¡£ ¡£¡£¡£¡£


https://cybernews.com/security/hackers-claim-maryland-transportation-rhysida/


3. µÂÖÝ¿¨³µË¾»úÊý¾Ýй¶£º³¬ÍòÃû˾»úÃô¸ÐÐÅÏ¢Ôâ̻¶


9ÔÂ25ÈÕ£¬ £¬£¬£¬£¬£¬£¬µÂ¿ËÈøË¹ÖÝAJT Compliance, LLC¹«Ë¾ÔËÓªµÄ¼ÝʻԱºÏ¹æÆ½Ì¨¡°DOT SHIELD¡±±¬·¢´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬£¬£¬£¬Ì»Â¶Áè¼ÝÒ»ÍòÃû¿¨³µË¾»úµÄСÎÒ˽¼ÒÎļþ£¬ £¬£¬£¬£¬£¬£¬Éæ¼°Ò©Îï²âÊÔ¡¢¹ÍÓ¶ÌõÔ¼¡¢Åä¾°ÊÓ²ìµÈ¸ß¶ÈÃô¸ÐÐÅÏ¢¡£¡£¡£ ¡£¡£¡£¡£¾­CybernewsÑо¿ÍŶÓÊӲ죬 £¬£¬£¬£¬£¬£¬Ð¹Â¶ÈªÔ´ÔÚÓڸù«Ë¾Ê¹ÓõÄAmazon S3´æ´¢Í°±»¹ýʧÉèÖÃΪ¹«¹²¶ÁÈ¡ºÍÁбíȨÏÞ£¬ £¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý18,000ÕÅÉç»á°ü¹Ü¿¨ÕÕÆ¬¡¢23,000ÕżÝÕÕͼÏñ¡¢ÔðÈΰü¹Ü¿¨¡¢³µÁ¾Ä¥Á·Ð§¹ûµÈÎļþÍâй¡£¡£¡£ ¡£¡£¡£¡£ÕâЩÊý¾Ý×Ô2022ÄêÆðÒ»Á¬ÉÏ´«£¬ £¬£¬£¬£¬£¬£¬²¿·ÖÃô¸ÐÎļþÔÚÊÓ²ìʱ´úÈÔ±»×Ô¶¯ÉÏ´«¡£¡£¡£ ¡£¡£¡£¡£ÊÜÓ°Ïì˾»úÖ÷ÒªÀ´×Ե¿ËÈøË¹ÖÝ»òÊܹÍÓÚ¸ÃÖÝ×¢²áµÄÎïÁ÷¹«Ë¾¡£¡£¡£ ¡£¡£¡£¡£×÷ΪÃÀ¹úÎïÁ÷ÖØÕò£¬ £¬£¬£¬£¬£¬£¬µÂÖÝÓµÓг¬21.2ÍòÃûÖØÐÍ¿¨³µË¾»ú¼°7.272ÍòÃûÇáÐÍ¿¨³µË¾»ú£¬ £¬£¬£¬£¬£¬£¬´Ë´Îй¶¿ÉÄÜÓ°Ïì¸ÃÖÝÔ¼10%µÄ¿¨³µË¾»ú¡£¡£¡£ ¡£¡£¡£¡£Ð¹Â¶µÄÃô¸ÐÐÅÏ¢ÈôÂäÈë²»·¨·Ö×ÓÊÖÖУ¬ £¬£¬£¬£¬£¬£¬¿ÉÄܱ»ÓÃÓÚ¿ªÉèÐÅÓÃÕË»§¡¢ÍµÈ¡Éç±£¸£Àû»òʵÑéÈËÈâËÑË÷µÈڲƭÐÐΪ£¬ £¬£¬£¬£¬£¬£¬¶ÔÊܺ¦ÕßÔì³ÉÑÏÖØÉí·Ý͵ÇÔΣº¦¡£¡£¡£ ¡£¡£¡£¡£AJT ComplianceÔÚÊÕµ½ÄäÃû¾Ù±¨ºóÈ·Èϴ洢ͰÉèÖùýʧ£¬ £¬£¬£¬£¬£¬£¬²¢ÒÑͨ¹ýÈÏÕæÈÎÅû¶ÐÞ¸´Îó²î£¬ £¬£¬£¬£¬£¬£¬È·±£Êý¾ÝÇå¾²¡£¡£¡£ ¡£¡£¡£¡£


https://cybernews.com/security/texas-truck-drivers-data-leak/


4. SonicWall SSL VPN×°±¸ÔâAkiraÀÕË÷Èí¼þÒ»Á¬¹¥»÷


9ÔÂ28ÈÕ£¬ £¬£¬£¬£¬£¬£¬Õë¶ÔSonicWall SSL VPN×°±¸µÄAkiraÀÕË÷Èí¼þ¹¥»÷Ò»Á¬Éý¼¶£¬ £¬£¬£¬£¬£¬£¬Ö»¹ÜÕË»§ÒÑÆôÓÃOTP¶àÒòËØÈÏÖ¤£¨MFA£©£¬ £¬£¬£¬£¬£¬£¬µ«ÍþвÐÐΪÕßÈÔÄÜÀֳɵǼ¡£¡£¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±ÍƲ⣬ £¬£¬£¬£¬£¬£¬Õâ¿ÉÄÜÔ´ÓÚ¹¥»÷ÕßÇÔÈ¡ÁËOTPÖÖ×Ó»òʹÓÃÁË2024Äê9ÔÂÅû¶µÄCVE-2024-40766²»µ±»á¼û¿ØÖÆÎó²î¡£¡£¡£ ¡£¡£¡£¡£¸ÃÎó²îËäÔÚ2024Äê8ÔÂÒÑÐÞ¸´£¬ £¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÈÔͨ¹ý´Ëǰ´ÓÒ×Êܹ¥»÷×°±¸ÖÐÇÔÈ¡µÄƾ֤һÁ¬ÈëÇÖ¡£¡£¡£ ¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾Arctic Wolf±¨¸æÖ¸³ö£¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÆôÓÃOTP MFAµÄÇéÐÎÏÂÈÔÄܵǼÕË»§£¬ £¬£¬£¬£¬£¬£¬µÇ¼ʵÑéʱ¶à´Î´¥·¢OTPÖÊѯºóÀֳɣ¬ £¬£¬£¬£¬£¬£¬ÌåÏÖOTPÖÖ×Ó¿ÉÄܱ»µÁ»ò±£´æÆäËûÌìÉúÓÐÓÃÁîÅÆµÄÒªÁì¡£¡£¡£ ¡£¡£¡£¡£SonicWallÒѽ«´ËÀ๥»÷ÓëCVE-2024-40766¹ØÁª£¬ £¬£¬£¬£¬£¬£¬²¢±Þ²ßÖÎÀíÔ±ÖØÖÃËùÓÐSSL VPNƾ֤²¢Éý¼¶ÖÁ×îÐÂSonicOS¹Ì¼þ¡£¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/akira-ransomware-breaching-mfa-protected-sonicwall-vpn-accounts/


5. MedusaÀÕË÷Èí¼þ¹¥»÷¿µ¿¨Ë¹ÌØ£¬ £¬£¬£¬£¬£¬£¬834GBÊý¾ÝÔâÇÔ


9ÔÂ29ÈÕ£¬ £¬£¬£¬£¬£¬£¬MedusaÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÈ«ÇòýÌåÊÖÒÕ¾ÞÍ·¿µ¿¨Ë¹Ìع«Ë¾Ìá³«ÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬£¬²¢ÒªÇóÖ§¸¶120ÍòÃÀÔªÊê½ðÒÔ×èÖ¹ÇÔÈ¡µÄ834.4GBÊý¾Ýй¶»ò³öÊÛ¡£¡£¡£ ¡£¡£¡£¡£¸Ã×éÖ¯ÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû²¼Ô¼20ÕÅÄÚ²¿Îļþ½ØÍ¼¼°°üÀ¨167,121ÏîÎļþµÄÇåµ¥£¬ £¬£¬£¬£¬£¬£¬Éæ¼°¾«Ë㱨¸æ¡¢²úÆ·ÖÎÀíÊý¾Ý¡¢°ü¹Ü½¨Ä£¾ç±¾¡¢ÀíÅâÆÊÎöÊý¾Ý¼°SQL¾ç±¾µÈÃô¸ÐÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬Â·¾¶Ê¾Àý°üÀ¨Esur_rerating_verification.xlsx¡¢Claim Data Specifications.xlsmµÈÎļþ£¬ £¬£¬£¬£¬£¬£¬ÌåÏÖÒÑ»ñÈ¡°ü¹ÜÅÌËã¡¢¿Í»§Êý¾Ý´¦Öóͷ£¼°Ë÷ÅâÖÎÀíϵͳȨÏÞ¡£¡£¡£ ¡£¡£¡£¡£¿£¿£¿µ¿¨Ë¹ÌØ×÷ΪӵÓÐNBCUniversalµÄÆóÒµ£¬ £¬£¬£¬£¬£¬£¬ÆìϺ­¸ÇNBC¡¢Telemundo¡¢»·ÇòÓ°Òµ¡¢Á÷ýÌåÆ½Ì¨Peacock¼°Å·ÖÞSkyÓªÒµ¡£¡£¡£ ¡£¡£¡£¡£Ö»¹Ü¸Ã¹«Ë¾Î´Òò´ó¹æÄ£Íø¹¥³ÉΪ½¹µã£¬ £¬£¬£¬£¬£¬£¬µ«2015ÄêÔøÓг¬20ÍòÓû§Æ¾Ö¤ÔÚ°µÍøÐ¹Â¶£¬ £¬£¬£¬£¬£¬£¬Æäʱ¿µ¿¨Ë¹ÌسÆÊý¾Ý¿ÉÄÜÔ´ÓÚÆ¾Ö¤¾ÛºÏ¶ø·Çϵͳֱ½ÓÈëÇÖ¡£¡£¡£ ¡£¡£¡£¡£MedusaÒÔÐû²¼²¿·ÖÎļþÖ¤¾ÝʩѹÊܺ¦ÕßÖøÃû¡£¡£¡£ ¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬ £¬£¬£¬£¬£¬£¬ÎļþÐÔ×ÓÖ¸Ïò²ÆÎñÓ뾫ËãÊý¾Ý¼¯£¬ £¬£¬£¬£¬£¬£¬ÈôÊôʵ£¬ £¬£¬£¬£¬£¬£¬¿µ¿¨Ë¹ÌØ»òÃæÁÙî¿ÏµÉó²éΣº¦¡£¡£¡£ ¡£¡£¡£¡£


https://hackread.com/medusa-ransomware-comcast-data-breach/


6. Notepad++ v8.8.3±»Åû¶±£´æ¸ßΣDLLÐ®ÖÆÎó²î


9ÔÂ29ÈÕ£¬ £¬£¬£¬£¬£¬£¬Notepad++ v8.8.3°æ±¾±»Åû¶±£´æ¸ßΣDLLÐ®ÖÆÎó²î£¨CVE-2025-56383£©£¬ £¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö´ï6.5·Ö¡£¡£¡£ ¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚNotepad++ÔÚÆô¶¯Ê±×Ô¶¯¼ÓÔØÌØ¶¨DLLÎļþµÄ»úÖÆÈ±ÏÝ£¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÌØÕ÷Ìæ»»ÊÜÐÅÈεÄDLLÎļþ£¨ÈçNppExport.dll£©£¬ £¬£¬£¬£¬£¬£¬×¢Èë¶ñÒâ´úÂëʵÏÖí§Òâ´úÂëÖ´ÐС£¡£¡£ ¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÖ»Ð轫¶ñÒâDLLÎļþ°²ÅÅÓÚNotepad++×°ÖÃĿ¼µÄplugins\NppExport\·¾¶Ï£¬ £¬£¬£¬£¬£¬£¬²¢È·±£Æäµ¼³öº¯Êýת·¢ÖÁԭʼDLLÎļþ¡£¡£¡£ ¡£¡£¡£¡£µ±Óû§Æô¶¯Notepad++ʱ£¬ £¬£¬£¬£¬£¬£¬³ÌÐò»áÓÅÏȼÓÔØ¸Ã¶ñÒâDLL£¬ £¬£¬£¬£¬£¬£¬ÔÚת·¢Õýµ±¹¦Ð§Å²ÓõÄͬʱִÐжñÒâ´úÂ룬 £¬£¬£¬£¬£¬£¬Ðγɡ°¹¦Ð§ÍêÕû+Çå¾²ÆÆË𡱵ÄË«ÖØÉøÍ¸¡£¡£¡£ ¡£¡£¡£¡£GitHubÒѹûÕæ¿´·¨ÑéÖ¤£¨PoC£©£¬ £¬£¬£¬£¬£¬£¬°üÀ¨ÍêÕûµÄ¹¥»÷Á´ÑÝʾ£¬ £¬£¬£¬£¬£¬£¬ÑéÖ¤ÁËÎó²îÔÚÍâµØÇéÐÎϵĿÉʹÓÃÐÔ¡£¡£¡£ ¡£¡£¡£¡£¸ÃÎó²îµÄ¹¥»÷Ó°Ïì¹æÄ£ÆÕ±é£¬ £¬£¬£¬£¬£¬£¬ÐèÍâµØ»á¼ûȨÏÞ»ò×°Ö÷¾¶Ð´ÈëÄÜÁ¦£¬ £¬£¬£¬£¬£¬£¬µ«Ò»µ©ÀÖ³ÉʹÓ㬠£¬£¬£¬£¬£¬£¬¿ÉʵÏÖ³¤ÆÚ»¯×¤ÁôÓëȨÏÞÌáÉý£¬ £¬£¬£¬£¬£¬£¬ÏÔÖøÔöÌí¹©Ó¦Á´¹¥»÷¡¢Ä¾Âí»¯×°ÖóÌÐò¼°ÄÚ²¿ÍþвΣº¦¡£¡£¡£ ¡£¡£¡£¡£½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁÐÞ¸´°æ±¾£¬ £¬£¬£¬£¬£¬£¬²¢°´ÆÚ¼ì²é×°ÖÃĿ¼ÎļþÍêÕûÐÔ¡£¡£¡£ ¡£¡£¡£¡£


https://securityonline.info/dll-hijacking-flaw-cve-2025-56383-found-in-notepad-allowing-arbitrary-code-execution-poc-available/