CISAÖÒÑÔSonicWallSMA×°±¸Îó²îÕýÔÚ±»Æð¾¢Ê¹ÓÃ

Ðû²¼Ê±¼ä 2025-04-18

1. CISAÖÒÑÔSonicWallSMA×°±¸Îó²îÕýÔÚ±»Æð¾¢Ê¹ÓÃ


4ÔÂ17ÈÕ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÓÚÖÜÈý½«Ó°ÏìSonicWallÇå¾²ÒÆ¶¯»á¼û£¨SMA£©100ϵÁÐÍø¹ØµÄ¸ßÑÏÖØÐÔÇå¾²Îó²îCVE-2021-20035£¨CVSSÆÀ·Ö£º7.2£©Ìí¼ÓÖÁÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£´ËÎó²îÓë²Ù×÷ϵͳÏÂÁî×¢ÈëÓÐ¹Ø £¬¿ÉÄܵ¼Ö´úÂëÖ´ÐС£SonicWallÔÚ2021Äê9ÔÂÐû²¼µÄÇ徲ͨ¸æÖÐÖ¸³ö £¬SMA100¹ÜÀí½çÃæÖÐÌØÊâÔªËØµÄ²»µ±ÖÐºÍ £¬ÔÊÐíÔ¶³Ì¾­ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÒÔ'nobody'Óû§Éí·Ý×¢Èëí§ÒâÏÂÁî £¬½ø¶ø¿ÉÄܵ¼Ö´úÂëÖ´ÐС£¸ÃÎó²îÓ°ÏìÔËÐÐÌØ¶¨°æ±¾µÄSMA200¡¢SMA210¡¢SMA400¡¢SMA410ºÍSMA500v£¨ESX¡¢KVM¡¢AWS¡¢Azure£©×°±¸ £¬Ïêϸ°üÀ¨10.2.1.0-17sv¼°¸üÔç°æ±¾¡¢10.2.0.7-34sv¼°¸üÔç°æ±¾ºÍ9.0.0.10-28sv¼°¸üÔç°æ±¾¡£ÕâЩ°æ±¾ÒÑÔÚºóÐøµÄ¸üÐÂÖлñµÃÐÞ¸´ £¬»®·ÖΪ10.2.1.1-19sv¼°¸ü¸ß°æ±¾¡¢10.2.0.8-37sv¼°¸ü¸ß°æ±¾ºÍ9.0.0.11-31sv¼°¸ü¸ß°æ±¾¡£Ö»¹ÜÏÖÔÚÉв»ÇåÎú¸ÃÎó²îµÄÏêϸʹÓÃϸ½Ú £¬µ«SonicWallÒÑÐÞ¸Äͨ¸æ £¬ÈϿɴËÎó²î¿ÉÄÜÕýÔÚ±»Ò°ÍâʹÓá£Îª´Ë £¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±»ÒªÇóÔÚ2025Äê5ÔÂ7ÈÕ֮ǰ½ÓÄÉÐëÒªµÄ»º½â²½·¥ £¬ÒÔ±£»¤ÆäÍøÂçÃâÊÜ×Ô¶¯Íþв¡£


https://thehackernews.com/2025/04/cisa-flags-actively-exploited.html


2. TheLoopƽ̨210Íò·ÝÃô¸ÐÐÅϢй¶


4ÔÂ16ÈÕ £¬ÓÉMTV¸ß¹Ü½¨ÉèµÄ°Ä´óÀûÑÇÒ»¾­×îÈÈÃŵĴ´ÒâÊÂÇéÆ½Ì¨TheLoopÓÚ2024Äê¹Ø±Õ £¬È»¶øÆäÓû§Ãô¸ÐÊý¾Ýй¶Î£»úÖÁ½ñδ½â¡£2025Äê2Ô £¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷ £¬¸Ãƽ̨¹ýʧÉèÖõÄGoogleCloud´æ´¢Í°µ¼ÖÂ210Íò·ÝÎļþй¶ £¬°üÀ¨º¬È«Ãû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢ÓÊÏä¼°ÍêÕûÖ°ÒµÂÄÀúµÄ¼òÀú¡£ÕâЩÊý¾ÝΪթƭÕßÌṩÁ˼«´ó±ãµ±¡£Õ©Æ­Õß¿ÉʹÓÃй¶ÐÅϢʵÑé¸ß¶È¶¨ÏòµÄ´¹ÂÚ¹¥»÷¡¢ÓïÒô´¹ÂںͶÌÐÅ´¹ÂÚ¡£ÒÀ¸½Ïêϸ¼òÀú £¬Õ©Æ­ÕßÄÜÖÆ×÷¼«¶Ë±ÆÕæµÄ¸öÐÔ»¯´¹ÂÚÓʼþ £¬Ìá¼°Êܺ¦ÕßÕæÊµÖ°Î»Ãû³Æ¡¢¹ýÍù¿Í»§ÉõÖÁÒ»Ñùƽ³£Ê¹Óù¤¾ß £¬»¹¿ÉÄܸ½´øÐéαְλÑûÔ¼¡¢´ýÇ©ÊðÌõÔ¼»òÒªÇóÑéÖ¤Éí·Ý£¨ÐèÌṩ»¤ÕÕ¸´Ó¡¼þ£©¡£µ±Õ©Æ­ÕßÕÆÎյ绰ºÅÂëºÍÅä¾°ÐÅϢʱ £¬ÓïÒô´¹ÂںͶÌÐÅ´¹ÂÚ¼«¾ß˵·þÁ¦ £¬Èç×Ô³ÆÀ´×ÔÊܺ¦ÕßÔøÓ¦Æ¸µÄ´´Òâ»ú¹¹ £¬ÒªÇó×îÖÕÈ·ÈÏÒøÐÐÐÅÏ¢¡£±ðµÄ £¬Õ©Æ­Õß»¹ÄÜαװ³ÉÊܺ¦ÕßÏò¿Í»§»ò¹ÍÖ÷·¢ËÍÐéα·¢Æ±¡£Çå¾²Ñо¿Ö°Ô±ÊµÑéÁªÏµ¸Ã¹«Ë¾¼°ÅÌËã»úÓ¦¼±ÏìÓ¦×é £¬µ«Î´ÊÕµ½»ØÓ¦¡£


https://cybernews.com/security/loop-leaks-personal-data-creatives-exposed/


3. ÀÕË÷Èí¼þʹÓÃAWSÃÜÔ¿¹¥»÷AWSS3´æ´¢Í°


4ÔÂ16ÈÕ £¬¿ËÈÕ £¬Ò»ÆðÓÐÊýÇÒ¿ÉÄÜÊ·ÎÞǰÀýµÄЭͬÀÕË÷Ô˶¯ÆØ¹â £¬Éæ¼°Áè¼Ý1.2ÒÚÌõй¶µÄAWSÃÜÔ¿¼Í¼ £¬×îÖÕÖ¸Ïò1,229¸öΨһƾ֤¡£¹¥»÷ÕßʹÓÃÕâЩƾ֤¶ÔS3´æ´¢Í°ÖеÄÊý¾ÝÓ¦ÓÃÁË·þÎñÆ÷¶Ë¼ÓÃÜ£¨SSE-C£© £¬ËæºóÁôÏÂÀÕË÷ÐÅÒªÇóÒÔ±ÈÌØ±ÒÖ§¸¶Êê½ð £¬Ã¿Î»Êܺ¦ÕßÀÕË÷½ð¶îΪ0.3BTC£¨Ô¼25,000ÃÀÔª£©¡£´Ë´Î¶ñÒâÔ˶¯¸ß¶È×Ô¶¯»¯ £¬ÇÒûÓÐÃ÷È·µÄ¹éÊô¡£ÍþвÐÐΪÕßÔÚÿ¸ö¼ÓÃܵÄS3´æ´¢Í°ÖÐÁôÏÂÃûΪwarning.txtµÄÀÕË÷ÐÅÏ¢ £¬²¢¸½´øÎ¨Ò»µÄ±ÈÌØ±ÒµØÖ·ºÍawsdecrypt[@]techie.comµÄµç×ÓÓʼþµØÖ·ÓÃÓÚÁªÏµ¡£¹¥»÷ÕßʹÓÃAWSÔ­Éú·þÎñÆ÷¶Ë¼ÓÃÜ£¨Ê¹Óÿͻ§ÌṩµÄÃÜÔ¿£©À´¼ÓÃÜS3´æ´¢Í°Êý¾Ý £¬ÌìÉú×Ô¼ºµÄAES-256¼ÓÃÜÃÜÔ¿Ëø¶¨Ãü¾Ý £¬Ê¹µÃÊܺ¦ÕßÎÞ·¨»Ö¸´¡£ÕâÖÖ¹¥»÷ģʽÔÊÐí¡°¾²Ä¬ÈëÇÖ¡± £¬ÈëÇÖʱ²»»á·¢³ö¾¯±¨»ò±¨¸æ £¬Ò²²»»áÁôÏÂÎļþɾ³ýÈÕÖ¾ £¬ÍþвÕß±£´æ´æ´¢Í°½á¹¹ £¬ÉõÖÁδÇÔÈ¡Êý¾Ý¾ÙÐÐË«ÖØÀÕË÷¡£´Ëǰ £¬¹¥»÷Õß»¹ÔøÉèÖÃS3ÉúÃüÖÜÆÚÕ½ÂÔ £¬ÔÚ7ÌìÄÚɾ³ý¼ÓÃÜÊý¾Ý £¬½øÒ»²½ÏòÊܺ¦Õßʩѹ¡£ÁîÈËÕ𾪵ÄÊÇ £¬ÔÚ¶à¸öÇéÐÎÏ £¬ÊÜÓ°ÏìµÄAWSÇéÐÎÈÔÔÚ¼ÌÐøÔËÐÐ £¬Åú×¢Êܺ¦Õß¿ÉÄÜÈÔδÒâʶµ½ÕâÒ»Îó²î¡£Ñо¿Ö°Ô±Ö¸³ö £¬¹¥»÷Õß»ñÈ¡AWSÃÜÔ¿µÄÏêϸҪÁìÉÐδ֤ʵ¡£


https://cybernews.com/security/aws-cloud-storage-bucket-ransomware-attacks/


4. ÓéÀÖ·þÎñ¾ÞÍ·LegendsInternationalÅû¶Êý¾Ýй¶ÊÂÎñ


4ÔÂ17ÈÕ £¬LegendsInternationalÊÇÈ«ÇòÌåÓýºÍÓéÀÖ·þÎñ¹«Ë¾ £¬ÓªÒµº­¸ÇÔ°µØÍýÏë¡¢ÏúÊÛ¡¢ºÏ×÷¡¢½Ó´ý¡¢ÉÌÆ·ºÍÊÖÒÕ½â¾ö¼Æ»® £¬ÄêÊÕÈ볬11ÒÚÃÀÔª¡£¸Ã¹«Ë¾¹ÜÀí×ÅÎå´óÖÞ350¶à¸ö³¡¹Ý £¬ÏñÂåÉ¼í¶µÄSoFiÌåÓý³¡¡¢Å¦Ô¼µÄÒ»ºÅÌìϹ۾°Ì¨µÈ×ÅÃû³¡¹Ý¾ùÔÚÆäÁС£½üÆÚ £¬Ëü»¹Í¨¹ýÊÕ¹ºASMGlobalÀ©´óÁËÓªÒµ¹æÄ£¡£LegendsInternational·¢³öÖÒÑÔ £¬ÆäÓÚ2024Äê11Ô±¬·¢Êý¾Ýй¶ £¬ÆìÏÂÔ±¹¤Ó볡ºÏ·Ã¿ÍÊÜÓ°Ïì¡£ÔÚÓëÕþ¸®µÄ֪ͨº¯Àï £¬¸Ã¹«Ë¾³Æ11ÔÂ9ÈÕÔÚITϵͳ¼ì²âµ½Î´¾­ÊÚȨÔ˶¯ £¬Ëæ¼´ÔÚÍâ²¿ÍøÂçÇ徲ר¼ÒЭÖúÏÂÕö¿ªÊӲ졣ÊÓ²ì֤ʵÈëÇÖÕßÇÔÈ¡ÁËСÎÒ˽¼ÒÊý¾ÝÎļþ £¬µ«ÐżþδÃ÷ȷй¶Êý¾ÝÀàÐÍ¡£ÏÖÔÚ £¬´Ë´ÎÊý¾Ýй¶µÄ¹æÄ£ºÍÊÜÓ°ÏìÈËÊý²»Ã÷ £¬µ«¼øÓÚ¹«Ë¾ÖØ´óµÄÔËÓª¹æÄ£ºÍ¹ÜÀíµÄº£Á¿Ãô¸ÐÊý¾Ý £¬µ£ÐÄÇéÐ÷ÄÑÃâ¡£ÔÚÖÂÊÜÓ°ÏìÓû§µÄÐź¯ÖÐ £¬LegendsInternationalÌåÏÖÊÂÎñǰÒѽÓÄÉÇå¾²²½·¥ £¬ÏµÍ³»Ö¸´ºóҲʵÑéÁËÌØÊâ²½·¥ £¬µ«Î´ÌṩÏêϸϸ½Ú¡£ÐżþÊÕ¼þÈË¿Éͨ¹ýExperian»ñµÃ24¸öÔµÄÉí·Ý͵ÇÔ¼ì²â·þÎñ°ü¹Ü £¬ÐèÔÚ2025Äê7ÔÂ31ÈÕǰע²á¡£¹«Ë¾³ÆÎ´·¢Ã÷СÎÒ˽¼ÒÐÅÏ¢±»ÀÄÓõÄÖ¤¾Ý £¬µ«½¨ÒéÓû§¼á³ÖСÐÄ¡£


https://www.bleepingcomputer.com/news/security/entertainment-services-giant-legends-international-discloses-data-breach/


5. INCRansomÀÕË÷Èí¼þ¹¥»÷ºó £¬AholdDelhaizeÈ·ÈÏÊý¾Ý±»µÁ


4ÔÂ17ÈÕ £¬°¢»ôµÂµÂ¶ûº£×È(AholdDelhaize)ÊÇ¿ç¹úÁãÊÛºÍÅú·¢¾ÞÍ· £¬ÔÚÎ÷ŷı»®½ü8000¼ÒÊÐËÁ £¬ÓµÓг¬41ÍòÃûÔ±¹¤ £¬ÄêÊÕÈëÔ¼1000ÒÚÃÀÔª £¬ÔÚÃÀ¹úı»®FoodLionµÈÆ·ÅÆ¡£2024Äê11Ô £¬¸Ã¹«Ë¾¹ûÕæÅûÂ¶ÍøÂçÇå¾²ÊÂÎñ £¬²¢¹Ø±ÕITϵͳ±£»¤¡£Æä³ÆÎÊÌâ¼°»º½â²½·¥ÒÑÓ°ÏìÃÀ¹úÄ³Ð©Æ·ÅÆºÍ·þÎñ £¬°üÀ¨²¿·ÖÒ©µêºÍµçÉÌÓªÒµ¡£×òÈÕ £¬ÀÕË÷Èí¼þ×éÖ¯INCRansom½«AholdDelhaizeÌí¼ÓÖÁÆä°µÍøÊý¾Ýй¿àÕË÷ÍøÕ¾ £¬²¢Ðû²¼ÒÉËÆÇÔÈ¡µÄÎļþÑù±¾¡£AholdDelhaize½²»°ÈË֤ʵÊý¾Ýй¶ £¬µ«Î´Ì¸ÂÛÀÕË÷Èí¼þÊÇ·ñ¼ÓÈë´Ë´Î¹¥»÷¡£ÏÖÔÚ £¬¸Ã¹«Ë¾¶ÔÊÂÎñµÄÊÓ²ìÈÔÔÚ¾ÙÐÐÖÐ £¬ÈôÈ·ÈϿͻ§Êý¾ÝÊÜÓ°Ïì £¬½«Í¨ÖªÏà¹ØÖ°Ô±¡£Í¬Ê± £¬ÆäËùÓÐÊÐËÁºÍµçÉÌ·þÎñÈÔÕý³£ÔËÓª £¬Ö÷¹Ë²»ÊÜÓ°Ïì¡£


https://www.bleepingcomputer.com/news/security/ahold-delhaize-confirms-data-theft-after-inc-ransomware-claims-attack/


6. CISAÖÒÑÔOracle¹Å°åÔÆ·þÎñÆ÷ÔâÈëÇÖ¼Ó¾çÆ¾Ö¤Ð¹Â¶Î£º¦


4ÔÂ17ÈÕ £¬CISA·¢³öÖÒÑÔ £¬½ñÄêÔçЩʱ¼äOracle¹Å°åÔÆ·þÎñÆ÷ÔâÈëÇÖºó £¬Î¥¹æÎ£º¦¼Ó¾ç £¬ÆóÒµÍøÂçÃæÁÙÖØ´óÍþв¡£CISAÖ¸³ö £¬Ëù±¨¸æÔ˶¯¶Ô×éÖ¯ºÍСÎÒ˽¼Ò×é³ÉDZÔÚΣº¦ £¬Æ¾Ö¤ÖÊÁÏ¿ÉÄÜй¶¡¢Öظ´Ê¹ÓûòǶÈëϵͳ £¬ËäÆä¹æÄ£ºÍÓ°ÏìÉÐδ֤ʵ £¬µ«Æ¾Ö¤ÖÊÁÏÒ»µ©Ç¶Èë¾ÍÄÑÒÔ·¢Ã÷ £¬Ì»Â¶ºó»òÖºã¾Ãδ¾­ÊÚȨ»á¼û £¬¶ÔÆóÒµÇéÐÎ×é³ÉÖØ´óΣº¦¡£Îª´Ë £¬CISAÐû²¼Ö¸ÄÏ £¬±Þ²ßÍøÂç·ÀÓùÕßÖØÖÃÊÜÓ°ÏìÓû§ÃÜÂë £¬Ìæ»»Ó²±àÂë»òǶÈëʽƾ֤ £¬ÊµÑé·ÀÍøÂç´¹ÂڵĶàÒòËØÉí·ÝÑéÖ¤ £¬²¢¼à¿ØÉí·ÝÑéÖ¤ÈÕÖ¾¡£´Ëǰ £¬¼×¹ÇÎÄÈ·ÈÏÒ»ÃûÍþвÐÐΪÕßй¶ÁË´Ó¡°Á½Ì¨¹ýʱµÄ·þÎñÆ÷¡±ÖÐÇÔÈ¡µÄƾ֤ £¬²»¹ýÆäÔÆ·þÎñÆ÷δÊܹ¥»÷ £¬ÊÂÎñδӰÏìÔÆ·þÎñ»ò¿Í»§Êý¾Ý¡£¹¥»÷ÕßÇÔÈ¡Á˾ɿͻ§Æ¾Ö¤ £¬²¢ÔÚBreachForumsÉÏÐû²¼2025Äê¸üмͼ £¬ÓëýÌå¹²Ïí2024Äêµ×Êý¾Ý £¬ÇÒй¶Êý¾ÝÑù±¾¾­¶àλOracle¿Í»§È·ÈÏÓÐÓá£3ÔÂβ £¬CybelAngel͸¶Oracle¼û¸æ¿Í»§ £¬ÔçÔÚ2025Äê1Ô £¬¹¥»÷Õß¾ÍÔÚ²¿·ÖGen1·þÎñÆ÷Éϰ²ÅÅÁËWebShellºÍÆäËû¶ñÒâÈí¼þ £¬Ö±ÖÁ2ÔÂβ·¢Ã÷Îó²î £¬¹¥»÷Õß´ÓOracleIdentityManagerÊý¾Ý¿âÖÐÇÔÈ¡ÁËÊý¾Ý¡£±ðµÄ £¬ÉϸöÔÂýÌ屨µÀ³Æ¼×¹ÇÎÄ¿µ½¡¹«Ë¾1Ô·ÝÒ²±¬·¢Êý¾Ýй¶ÊÂÎñ £¬Ó°Ïì¶à¼ÒÃÀ¹úÒ½ÁÆ»ú¹¹ºÍÒ½ÔºµÄ»¼ÕßÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-increased-breach-risks-following-oracle-cloud-leak/