Òâ´óÀû·ÄÖ¯¾ÞÍ·FulgarÔâRansomHouseÀÕË÷¹¥»÷
Ðû²¼Ê±¼ä 2025-11-171. Òâ´óÀû·ÄÖ¯¾ÞÍ·FulgarÔâRansomHouseÀÕË÷¹¥»÷
11ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬ÎªH&M¡¢°¢µÏ´ï˹¡¢Calzedonia¡¢WolfordµÈÆ·ÅÆ¹©»õµÄÒâ´óÀû·ÄÖ¯Òµ¾ÞÍ·FulgarÈ·ÈÏÔâÓöRansomHouseÀÕË÷Èí¼þÍŻ﹥»÷¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÓÚ11ÔÂ12ÈÕÔÚ°µÍøÐ¹Â¶ÍøÕ¾Ðû²¼ÍþвÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Éù³Æ×Ô10ÔÂ31ÈÕÆðÒÑÕÆÎÕ¼ÓÃÜÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢ÒªÇóÖÎÀí²ãÖ§¸¶Êê½ðÒÔ×èÖ¹ÉñÃØÊý¾Ýй¶»ò³öÊÛ¡£¡£¡£¡£¡£¡£FulgarËæºóÐû²¼Í¨¸æÖ¤Êµ£¬£¬£¬£¬£¬£¬£¬11ÔÂ3ÈÕÆäÌìÏÂITϵͳÔâÍøÂç·¸·¨¹¥»÷£¬£¬£¬£¬£¬£¬£¬×÷ΪԤ·À²½·¥£¬£¬£¬£¬£¬£¬£¬Òâ´óÀûËùÓÐITϵͳÒѹرգ¬£¬£¬£¬£¬£¬£¬ÏÖÔÚËäδµ¥¶Àʶ±ðÏêϸй¶µÄСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬£¬£¬µ«ÄÚ²¿Îļþ¡¢ÒøÐÐÕË»§Óà¶î¡¢Õþ¸®»ú¹¹Í¨Ñ¶¼Í¼¼°·¢Æ±µÈÃô¸ÐÐÅÏ¢¿ÉÄÜÒÑÍâй¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²»µ«¿ÉÄÜͨ¹ý¶¨ÖÆ»¯ÍøÂç´¹ÂÚ½øÒ»²½ÉøÍ¸¹«Ë¾ÏµÍ³£¬£¬£¬£¬£¬£¬£¬¸ü½«µ¼ÖÂÕ½ÂÔÐÅϢй¶£¬£¬£¬£¬£¬£¬£¬Ê¹¾ºÕùµÐÊÖ»ñÈ¡ÔËÓª¡¢¿Í»§¼°¶¨¼Û½á¹¹µÈÒªº¦ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Ï÷ÈõÊг¡ÓÅÊÆ¡£¡£¡£¡£¡£¡£RansomHouse²¢·ÇÐÂÃæÄ¿£¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ï×Ô2021Äê12Ô½øÈ빫ÖÚÊÓÒ°£¬£¬£¬£¬£¬£¬£¬ÒÑÔÚÆäÐ¹Â¶ÍøÕ¾Áгö148ÃûÊܺ¦Õß¡£¡£¡£¡£¡£¡£¾ÝÃÀ¹úÍøÂçÇå¾²»ú¹¹2024ÄêÁªºÏÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÓëÒÁÀÊÏàÖúʵÑé¼ÓÃܹ¥»÷£¬£¬£¬£¬£¬£¬£¬ÒÔ»ñÈ¡Êê½ð·Ö³É¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/fulgar-ransomware-attack-adidas/
2. FortiWeb·¾¶±éÀúÎó²îÔâÈ«Çò¹æÄ£Ê¹ÓÃ
11ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍþвÇ鱨¹«Ë¾DefusedÓÚ10ÔÂ6ÈÕÊ״η¢Ã÷Fortinet FortiWeb 8.0.1¼°¸üÔç°æ±¾±£´æÑÏÖØÂ·¾¶±éÀúÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÔÚÎÞÐèÉí·ÝÑéÖ¤µÄÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÏòÌØ¶¨API·¾¶·¢ËͰüÀ¨¶ñÒâÓÐÓÃÔØºÉµÄHTTP POSTÇëÇ󣬣¬£¬£¬£¬£¬£¬ÔÚ̻¶װ±¸ÉϽ¨ÉèÍâµØÖÎÀíÔ±¼¶±ðÕË»§¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÒÑʹÓøÃÎó²îÔÚÈ«Çò¹æÄ£ÄÚÌᳫ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¶à¸öIPµØµãʵÑé²Ù×÷£¬£¬£¬£¬£¬£¬£¬½¨ÉèµÄÓû§ÃûÈçTestpoint¡¢trader1µÈ£¬£¬£¬£¬£¬£¬£¬ÃÜÂë°üÀ¨3eMIXX43¡¢AFT3$tH4ckµÈÖØ´ó×éºÏ£¬£¬£¬£¬£¬£¬£¬ÊÔͼͨ¹ý¶àÕË»§ÊµÑéÉøÍ¸ÏµÍ³¡£¡£¡£¡£¡£¡£FortinetÒÑÐû²¼8.0.2°æ±¾ÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬£¬£¬ÆäPSIRTÍøÕ¾ÉÐδÅû¶Ïà¹ØÎó²îÐÅÏ¢¡£¡£¡£¡£¡£¡£Ä¿½ñ£¬£¬£¬£¬£¬£¬£¬ÖÎÀíÔ±ÐèÁ¬Ã¦½«×°±¸Éý¼¶ÖÁ8.0.2°æ±¾£¬£¬£¬£¬£¬£¬£¬²¢¼ì²éϵͳÊÇ·ñ±£´æÒì³£ÖÎÀíÕË»§¡¢ÈÕÖ¾ÖÐfwbcgi·¾¶µÄÒì³£ÇëÇó¼°¿ÉÒÉIPµØµã»î¶¯¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬Ó¦ÑÏ¿áÏÞÖÆÖÎÀí½çÃæ½öͨ¹ýÊÜÐÅÈÎÍøÂç»òVPN»á¼û£¬£¬£¬£¬£¬£¬£¬×èֹ̻¶ÔÚ¹«Íø¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fortiweb-flaw-with-public-poc-actively-exploited-to-create-admin-users/
3. DoorDash 10ÔÂÉç½»¹¤³Ì¹¥»÷Ö°ÙÍòÓû§ÐÅϢй¶
11ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍâÂô¾ÞÍ·DoorDashÅû¶ÓÚ10ÔÂ25ÈÕÓÉÔ±¹¤Éç½»¹¤³ÌÕ©ÆÒý·¢µÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Éæ¼°ÃÀ¹ú¡¢¼ÓÄô󡢰ĴóÀûÑǼ°ÐÂÎ÷À¼Êý°ÙÍòÓû§¡£¡£¡£¡£¡£¡£¾ÝDoorDash¹Ù·½Í¨Öª£¬£¬£¬£¬£¬£¬£¬Î´¾ÊÚȨµÄµÚÈý·½Í¨¹ýÔ±¹¤Õ˺ŻñÈ¡ÁËÓû§ÐÕÃû¡¢ÏÖʵµØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµÈÁªÏµÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¿·ÖÓû§»¹¿ÉÄÜÉæ¼°Éç»áÇå¾²ºÅÂ루ÃÀ¹ú£©»òÉç»á°ü¹ÜºÅÂ루¼ÓÄô󣩣¬£¬£¬£¬£¬£¬£¬µ«DoorDashÇ¿µ÷Ãô¸Ð²ÆÎñÊý¾Ýδ±»Ð¹Â¶¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÊÇDoorDashµÚÈý´ÎÖØ´óÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬2019ÄêÔøÐ¹Â¶Ô¼500ÍòÓû§Êý¾Ý£¬£¬£¬£¬£¬£¬£¬2022ÄêÓÖÔâÓëTwilio¹¥»÷ͬԴµÄºÚ¿ÍÈëÇÖ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬DoorDashÔÚÊÂÎñ±¬·¢ºó19Ìì²Å×îÏÈ֪ͨÓû§£¬£¬£¬£¬£¬£¬£¬Òý·¢ÆÕ±éÆ·ÆÀ¡£¡£¡£¡£¡£¡£¼ÓÄôóÓû§ÊÕµ½¸½´ø·¨Óï·ÒëµÄ֪ͨ£¬£¬£¬£¬£¬£¬£¬µ«Í¨¸æÎ´Ã÷È·ÆäËûµØÇøÊÜÓ°Ïì¹æÄ£¡£¡£¡£¡£¡£¡£DoorDash»ØÓ¦³ÆÒѽÓÄɶàÏî²½·¥£¬£¬£¬£¬£¬£¬£¬°üÀ¨Çжϲ»·¨»á¼û¡¢Éý¼¶Ç徲ϵͳ¡¢ÔöǿԱ¹¤Åàѵ¡¢Ô¼ÇëÍøÂçÇ徲ȡ֤¹«Ë¾ÊӲ죬£¬£¬£¬£¬£¬£¬²¢ÅäºÏÖ´·¨²¿·ÖÐж¯¡£¡£¡£¡£¡£¡£¹«Ë¾ÌáÐÑÓû§Ð¡ÐÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬×èÖ¹µã»÷¿ÉÒÉÁ´½Ó»òй¶СÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Í¬Ê±¿ªÍ¨Ãâ·Ñµç»°Ìṩ×Éѯ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/doordash-hit-by-new-data-breach-in-october-exposing-user-information/
4. ÂÞ¼¼ÔâClopÀÕË÷ÍŻ﹥»÷ÖÂ1.8TBÊý¾Ýй¶
11ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬Ó²¼þÅä¼þ¾ÞÍ·ÂÞ¼¼¹«Ë¾¿ËÈÕ֤ʵÔâÓöÓÉÀÕË÷ÍÅ»ïClopÌᳫµÄÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÉù³ÆÊ¹ÓÃÁËOracle E-Business SuiteµÄÁãÈÕÎó²îCVE-2025-61882ʵÑé¹¥»÷¡£¡£¡£¡£¡£¡£ÂÞ¼¼ÒÑÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»8-K±í¸ñÅû¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Ç¿µ÷´Ë´ÎÍøÂçÇå¾²ÊÂÎñδӰÏìÆä²úÆ·¡¢ÓªÒµÔËÓª»òÉú²úϵͳ¡£¡£¡£¡£¡£¡£¾ÝÂÞ¼¼¹Ù·½ÉùÃ÷£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý¿ÉÄܰüÀ¨Ô±¹¤¡¢ÏûºÄÕß¡¢¿Í»§¼°¹©Ó¦É̵IJ¿·ÖÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ«Î´Éæ¼°¹úÃñÉí·ÝÖ¤ºÅÂë¡¢ÐÅÓÿ¨µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÒòÏà¹ØÊý¾Ýδ´æ´¢ÔÚ±»ÈëÇÖϵͳÖС£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ô´ÓÚµÚÈý·½ÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬£¬ÂÞ¼¼ÔÚ·¢Ã÷Îó²îºóÒÑÁ¬Ã¦ÁªºÏÍâ²¿ÍøÂçÇå¾²¹«Ë¾¾ÙÐÐÊӲ첢ÐÞ¸´ÏµÍ³¡£¡£¡£¡£¡£¡£ClopÍÅ»ïÉÏÖÜÒѽ«ÂÞ¼¼ÁÐÈëÆäÊý¾Ýй¿àÕË÷ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬¹ûÕæÁ˾ݳÆÇÔÈ¡µÄ½ü1.8TBÊý¾Ý¡£¡£¡£¡£¡£¡£±¾´ÎOracle E-Business SuiteÎó²îÓ°Ïì¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬£¬£¬³ýÂÞ¼¼Í⣬£¬£¬£¬£¬£¬£¬¹þ·ð´óѧ¡¢Envoy Air¼°¡¶»ªÊ¢¶ÙÓʱ¨¡·µÈ»ú¹¹ÒàÊܲ¨¼°¡£¡£¡£¡£¡£¡£Oracle´ËǰÒÑÐû²¼½ôÆÈ¸üÐÂÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬²¢½¨ÒéÓû§Éý¼¶ÖÁÇå¾²°æ±¾¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/logitech-confirms-data-breach-after-clop-extortion-attack/
5. FingerÏÂÁîÀÄÓù¥»÷£º´ÓÀúÊ·¹¤¾ßµ½ÐÂÐÍÍþÐ²ÔØÌå
11ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬±£´æÊýÊ®ÄêµÄ"finger"ÏÂÁîÕý³ÉÎªÍøÂç¹¥»÷ÐÂÔØÌ壬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ý¸ÃÐÒéÔÚWindows×°±¸Ö´ÐжñÒâ²Ù×÷¡£¡£¡£¡£¡£¡£¸ÃÏÂÁîÆðÔ´ÓÚUnix/Linuxϵͳ£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÅÌÎÊÓû§ÐÅÏ¢£¨ÈçµÇ¼Ãû¡¢Ö÷Ŀ¼¡¢ÔÚÏß״̬µÈ£©£¬£¬£¬£¬£¬£¬£¬ºó±»Windowsϵͳ¼æÈÝ¡£¡£¡£¡£¡£¡£Ö»¹ÜÄ¿½ñʹÓÃÆµÂʽµµÍ£¬£¬£¬£¬£¬£¬£¬µ«ÆäÐÒéÌØÕ÷ÈÔ±»¶ñÒâʹÓᣡ£¡£¡£¡£¡£½üÆÚ¹¥»÷°¸ÀýÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý"finger"ÐÒéʵÑéClickFix¹¥»÷£ºÀýÈ磬£¬£¬£¬£¬£¬£¬Åú´¦Öóͷ£ÎļþÖ´ÐÐfingerÏÂÁ£¬£¬£¬£¬£¬£¬´ÓÔ¶³ÌЧÀÍÆ÷¼ìË÷¶ñÒâÖ¸Á£¬£¬£¬£¬£¬£¬¾cmd.exe¹ÜµÀÔÚÍâµØÔËÐС£¡£¡£¡£¡£¡£´ËÀ๥»÷³£Î±×°³É"ÑéÖ¤ÈËÀà"µÄÑéÖ¤ÂëÁ÷³Ì£¬£¬£¬£¬£¬£¬£¬ÓÕµ¼Óû§Ö´ÐаüÀ¨fingerÏÂÁîµÄWindowsÖ¸Á£¬£¬£¬£¬£¬£¬×îÖÕµ¼Ö¶ñÒâÈí¼þÏÂÔØÓëÖ´ÐС£¡£¡£¡£¡£¡£Ïêϸ¹¥»÷Á´Â·ÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃfingerÏÂÁî´ÓÌØ¶¨ÓòÃû»ñÈ¡ÏÂÁ£¬£¬£¬£¬£¬£¬´¥·¢curl.exeÏÂÔØÎ±×°³ÉPDFµÄzip°ü£¬£¬£¬£¬£¬£¬£¬½âѹºóÖ´ÐÐPython¶ñÒâ³ÌÐò¡£¡£¡£¡£¡£¡£¸üÖØ´óµÄ¹¥»÷»á¼ì²âϵͳÊÇ·ñ×°ÖöñÒâÈí¼þÆÊÎö¹¤¾ß£¬£¬£¬£¬£¬£¬£¬Èô±£´æÔòÖÕÖ¹¹¥»÷£¬£¬£¬£¬£¬£¬£¬²»È»ÏÂÔØNetSupport Manager RAT²¢ÉèÖÃÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯¿ØÖÆ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/decades-old-finger-protocol-abused-in-clickfix-malware-attacks/
6. ÃÀ˾·¨²¿ÆÆ»ñ³¯ÍøÂç·¸·¨°¸£ºÎåÈËÈÏ×ïÉæ3.8ÒÚ
11ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú˾·¨²¿¿ËÈÕÐû²¼£¬£¬£¬£¬£¬£¬£¬ÎåÃûÉæ°¸Ö°Ô±ÈÏ¿ÉÐÖú³¯ÏÊʵÑé²»·¨´´Êջ£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ô¶³ÌITÊÂÇéÕßڲƺͼÓÃÜÇ®±Ò͵ÇÔ¡£¡£¡£¡£¡£¡£¸Ã°¸¼þÉæ¼°³¯ÏÊAPT38Íþв×éÖ¯¼°LazarusºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÕþ¸®Õý×·ÇóûÊÕ¸Ã×é֯ͨ¹ý1500ÍòÃÀÔª¼ÓÃÜÇ®±Ò͵ÇÔ°¸ËùµÃµÄ²»·¨×ʲú¡£¡£¡£¡£¡£¡£ÎåÃûÈÏ×ïÕß°üÀ¨ËÄÃûÃÀ¹ú¹«ÃñºÍÒ»ÃûÎÚ¿ËÀ¼ÈË£¬£¬£¬£¬£¬£¬£¬ËûÃÇͨ¹ýαÔì»òÇÔÈ¡µÄÃÀ¹ú¹«ÃñÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬×ÊÖú³¯ÏÊÌØ¹¤ÒÔ¡°Ô¶³ÌITÊÂÇéÕß¡±Éí·Ý±»136¼ÒÃÀ¹ú¹«Ë¾¹ÍÓ¶¡£¡£¡£¡£¡£¡£ÕâÐ©ÌØ¹¤½«ÈËΪ¼°²¿·ÖÇÔÈ¡Êý¾ÝÔËËÍÖÁ³¯ÏÊÕþ¸®£¬£¬£¬£¬£¬£¬£¬ÀÛ¼ÆÎª³¯ÏÊÕþȨ´´Á¢³¬220ÍòÃÀÔª²»·¨ÊÕÈë¡£¡£¡£¡£¡£¡£Ïêϸ°¸¼þÖУ¬£¬£¬£¬£¬£¬£¬°ÂÁпËÉ£µÂ¡¤µÏ¼ȡÒòµçÐÅÕ©ÆÍ¬Ä±¼°ÑÏÖØÉí·Ý͵ÇÔ×ï±»Ö¸¿Ø£¬£¬£¬£¬£¬£¬£¬Æäͨ¹ýUpWorkSellƽ̨ÏòÍâÑóITÖ°Ô±³öÊÛÇÔÈ¡µÄÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Ê¹40¼ÒÃÀ¹ú¹«Ë¾ÊÜÆ£»£»£»°£Àï¿Ë¡¤ÆÕÁÖ˹Ôòͨ¹ýÆä¹«Ë¾Taggcar Inc.ʹÓÃÇÔÈ¡Éí·Ý°²¶Ù64ÃûÍâÑóÖ°Ô±£¬£¬£¬£¬£¬£¬£¬×¬Ç®8.9ÍòÃÀÔª²¢Ôì³É³¬94ÍòÃÀÔªËðʧ£»£»£»°ÂµÂÀï¿Ë¡¤·¨¸ñÄÉÈü¡¢½ÜÉ¡¤ÈøÀÔú¶ûºÍÑÇÀúɽ´ó¡¤ÌØÀά˹ÈýÈ˼ÓÈë2019-2022Äêթƻ£¬£¬£¬£¬£¬£¬£¬×ܼÆÔì³É128ÍòÃÀÔªËðʧ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/five-plead-guilty-to-helping-north-koreans-infiltrate-us-firms/


¾©¹«Íø°²±¸11010802024551ºÅ