AcronisÆÊÎö¶à½×¶Î¶ñÒâÈí¼þÈö²¥Á´

Ðû²¼Ê±¼ä 2025-04-02

1. AcronisÆÊÎö¶à½×¶Î¶ñÒâÈí¼þÈö²¥Á´


4ÔÂ1ÈÕ £¬£¬AcronisÍþвÑо¿²¿·Ö(TRU)½üÆÚÆÊÎöÁËÒ»ÆðÖØ´óµÄ¶à½×¶Î¶ñÒâÈí¼þÈö²¥Á´ £¬£¬Õ¹ÏÖÁ˹¥»÷ÕßÔõÑùʹÓûìÏýÊÖÒպͶà¾ç±¾ÓïÑÔÈÆ¹ýÇå¾²·ÀÓù¡£¡£¹¥»÷ʼÓÚαװ³É"ÕË»§¿ÛѺ´«Æ±"µÄÎ÷°àÑÀÓï´¹ÂÚÓʼþ £¬£¬¸½¼þΪRARѹËõ°ü £¬£¬ÄÚº¬¸ß¶È»ìÏýµÄVisual Basic¾ç±¾(VBS)¡£¡£Ö´ÐÐºó £¬£¬VBSÌìÉúÅú´¦Öóͷ£Îļþ(BAT) £¬£¬ºóÕß¹¹½¨²¢Ö´ÐÐBase64±àÂëµÄPowerShell¾ç±¾¡£¡£¸Ã¾ç±¾½âÂëÓÐÓÃÔØºÉ¡ª¡ª½ÓÄÉRunPEÊÖÒÕ¼ÓÔØµÄ.NET¿ÉÖ´ÐÐÎļþ £¬£¬Æä×ÊÔ´ÖаüÀ¨Ë«ÖؼÓÃÜÊý¾Ý¿é £¬£¬Ðèͨ¹ýÌØ¶¨ÃÜÔ¿½âÃÜ¡£¡£×îÖÕÔØºÉΪDCRat»òRhadamanthysµÈÐÅÏ¢ÇÔÈ¡³ÌÐò £¬£¬¿ÉÖÂÊý¾Ýй¶ºÍϵͳÈëÇÖ¡£¡£ÆÊÎö·¢Ã÷ £¬£¬¹¥»÷Á´µÄ¶à²ã»ìÏýÏÔÖøÔöÌíÁ˼ì²âÄÑ¶È £¬£¬µ«ÒàÒýÈë¸ü¶à¹ÊÕϵ㠣¬£¬Îª·ÀÓùÌṩÁËÍ»ÆÆ¿Ú¡£¡£AcronisÖ¸³ö £¬£¬¶à²ãÇå¾²¼Æ»®ÖÁ¹ØÖ÷Òª£º³õʼ½×¶ÎÐè×èµ²¶ñÒâÓʼþ¼°¸½¼þ £¬£¬¸ß¼¶Æô·¢Ê½ÆÊÎö¿Éʶ±ð¿ÉÒɾ籾ÐÐΪ £¬£¬¶øÄÚ´æ±£»£»£»£»£»¤ÊÖÒÕÄÜ×è¶Ï±àÂëÔØºÉÖ´ÐС£¡£ÖµµÃÒ»ÌáµÄÊÇ £¬£¬¹¥»÷ÕßÔÚPowerShell¾ç±¾ÖÐÖ²ÈëÄá²ÉÕÜѧÓï¼ £¬£¬ÊÔͼ»ìÏýÊÓÏß £¬£¬Í¹Õ¹ÏÖ´ú¶ñÒâÈí¼þµÄ´´ÒâÓëÖØ´óÐÔ¡£¡£


https://www.bleepingcomputer.com/news/security/we-smell-a-dcrat-revealing-a-sophisticated-malware-delivery-chain/


2. ÎÞÎļþ¼ÓÃÜÍÚ¿ó¹¥»÷µ¼ÖÂ1500Óą̀PostgreSQLЧÀÍÆ÷Ôâ¹¥»÷


4ÔÂ1ÈÕ £¬£¬½üÆÚ £¬£¬Õë¶Ô̻¶µÄPostgreSQLÊý¾Ý¿âµÄ¹¥»÷»î¶¯Òý·¢Çå¾²½ç¹Ø×¢¡£¡£ÔÆÇå¾²¹«Ë¾WizÅû¶ £¬£¬¸Ã¹¥»÷»î¶¯ÓëAqua SecurityÓÚ2024Äê8Ô±ê¼ÇµÄÈëÇÖ¼¯±£´æ¹ØÁª £¬£¬¹¥»÷Õß±»×·×ÙΪJINX-0126 £¬£¬ÆäʹÓÃÃûΪPG_MEMµÄ¶ñÒâÈí¼þʵÑé¹¥»÷¡£¡£Ñо¿Ö°Ô±Ö¸³ö £¬£¬¹¥»÷ÕßÒ»Á¬½ø»¯¹¥»÷ÊÖ·¨ £¬£¬Í¨¹ýΪÿ¸öÄ¿µÄ°²ÅžßÓÐΨһ¹þÏ£ÖµµÄ¶þ½øÖÆÎļþ²¢½ÓÄÉÎÞÎļþÊÖÒÕÖ´ÐÐÍÚ¿ó¸ºÔØ £¬£¬ÓÐÓùæ±ÜÁËÒÀÀµÎļþ¹þÏ£¼ì²âµÄÔÆÇå¾²½â¾ö¼Æ»®¡£¡£¾ÝWizÆÀ¹À £¬£¬¸Ã»î¶¯Òѵ¼ÖÂÁè¼Ý1,500ÃûÊܺ¦Õß £¬£¬Í¹ÏÔÁËÈõÃÜÂë»òĬÈÏÉèÖõÄPostgreSQLʵÀý×÷Ϊ¹¥»÷Ä¿µÄµÄÆÕ±éÐÔ¡£¡£¹¥»÷ÕßʹÓÃÈõÉèÖõÄPostgreSQLЧÀ;ÙÐÐÆðÔ´ÉøÍ¸ £¬£¬Í¶·ÅBase64±àÂëµÄshell¾ç±¾ £¬£¬¸Ã¾ç±¾²»µ«É¨³ý¾ºÕù¿ó¹¤ £¬£¬»¹°²ÅÅÃûΪPG_COREµÄ¶þ½øÖÆÎļþ¡£¡£½øÒ»²½ £¬£¬Ð§ÀÍÆ÷ÏÂÔØÎ±×°³ÉÕýµ±PostgreSQLÀú³ÌµÄGolang¶þ½øÖÆÎļþ £¬£¬Æäͨ¹ý½¨Éè¸ßȨÏÞÓû§¡¢ÉèÖÃcron³¤ÆÚ»¯Ê¹Ãü £¬£¬ÖÕ´ÓGitHubÏÂÔØ×îаæXMRigÍÚ¿ó³ÌÐò £¬£¬Ê¹ÓÃLinuxÎÞÎļþÊÖÒÕÆô¶¯ÍÚ¿óÀú³Ì¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬¹¥»÷ÕßΪÿ¸öÊܺ¦Õß·ÖÅÉ×ÔÁ¦Ç®°üµØµã £¬£¬WizÒÑʶ±ðÈý¸ö¹ØÁªÇ®°ü £¬£¬Ã¿¸öÇ®°ü¹ØÁªÔ¼550¸öÍÚ¿ó½Úµã £¬£¬×ܼÆÁè¼Ý1,500̨װ±¸±»Ñ¬È¾¡£¡£


https://thehackernews.com/2025/04/over-1500-postgresql-servers.html


3. Palo Alto Global ProtectɨÃèÀ˳±ÖÐÉæ¼°½ü24,000¸öIP


4ÔÂ1ÈÕ £¬£¬Õë¶ÔPalo Alto Networks GlobalProtectµÇ¼ÃÅ»§µÄÍøÂçɨÃè»î¶¯½üÆÚÏÔÖøÉý¼¶ £¬£¬Òý·¢Çå¾²Ñо¿Ö°Ô±¶ÔDZÔÚ¹¥»÷µÄÔ¤¾¯¡£¡£ÍþвÇ鱨¹«Ë¾GreyNoise¼à²âÊý¾ÝÏÔʾ £¬£¬¸ÃɨÃè»î¶¯Éæ¼°Áè¼Ý24,000¸öΨһԴIPµØµã £¬£¬ÓÚ2025Äê3ÔÂ17ÈÕµÖ´ïÖðÈÕ20,000¸öΨһIPµÄ·åÖµ £¬£¬²¢Ò»Á¬ÖÁ3ÔÂ26ÈÕ¡£¡£IPµØµãÖÐ £¬£¬23,800¸ö±»±ê¼ÇΪ"¿ÉÒÉ" £¬£¬154¸ö±»È·ÒÔΪ"¶ñÒâ" £¬£¬Í¹ÏԻÒì³£ÐÔ¡£¡£É¨ÃèȪԴÖ÷Òª¼¯ÖÐÔÚ±±ÃÀ £¬£¬Ä¿µÄϵͳËäÒÔÃÀ¹úΪÖ÷ £¬£¬µ«·ºÆðÈ«Çò»¯ÌØÕ÷¡£¡£GreyNoiseÖ¸³ö £¬£¬´ËÀàɨÃ輤Ôö³£ÓëÎó²îʹÓÃǰµÄÕì̽Ðж¯Ïà¹Ø £¬£¬ÀúʷģʽÏÔʾ £¬£¬É¨Ãèá¯Áëºó2-4ÖÜ¿ÉÄÜ·ºÆðÐÂÎó²îÅû¶»ò¹¥»÷ÊÂÎñ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬´Ë´Î»î¶¯ÓëÁíÒ»ÏîÉæ¼°PAN-OSÅÀ³æµÄɨÃè±£´æÊ±¼ä¹ØÁªÐÔ £¬£¬ºóÕßÔÚ3ÔÂ26ÈÕͬ²½µÖ´ï2,580¸öIPµÄɨÃè·åÖµ¡£¡£Ä¿½ñ £¬£¬¹¥»÷ÕßµÄÏêϸĿµÄºÍÄîÍ·Éв»Ã÷È· £¬£¬µ«Õë¶Ô̻¶ÔÚ»¥ÁªÍøµÄPalo Alto Networksϵͳ £¬£¬ÖÎÀíÔ±ÐèÌá¸ßСÐÄ¡£¡£GreyNoise½¨ÒéÁ¬Ã¦Éó²é3ÔÂÖÐÑ®ÒÔÀ´µÄϵͳÈÕÖ¾ £¬£¬ÅŲéÈëÇÖ¼£Ïó £¬£¬Ç¿»¯µÇ¼ÃÅ»§Çå¾²·À»¤ £¬£¬²¢·â±ÕÒÑÖª¶ñÒâIP¡£¡£


https://www.bleepingcomputer.com/news/security/nearly-24-000-ips-behind-wave-of-palo-alto-global-protect-scans/


4. CrushFTP CVE-2025-2825Îó²îÕýÔÚ±»Ê¹ÓþÙÐй¥»÷


4ÔÂ1ÈÕ £¬£¬½üÆÚ £¬£¬¹¥»÷ÕßÕýÆð¾¢Ê¹ÓùûÕæµÄ¿´·¨ÑéÖ¤´úÂ루PoC£©¶ÔCrushFTPÎļþ´«ÊäÈí¼þÖеÄÒ»¸ö¸ßΣÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2025-2825£©ÊµÑé¹¥»÷¡£¡£¸ÃÎó²îÓÉOutpost24±¨¸æ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÎÞÐèÈÏÖ¤¼´¿É»á¼ûδÐÞ²¹µÄCrushFTP v10»òv11×°±¸¡£¡£CrushFTPÔÚ3ÔÂ21ÈÕ½ôÆÈÐû²¼²¹¶¡Ê±Ç¿µ÷ £¬£¬Ì»Â¶µÄHTTP(S)¶Ë¿Ú¿ÉÄÜÖ±½Óµ¼ÖÂδÊÚȨ»á¼û £¬£¬²¢½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁ10.8.4»ò11.3.1ÒÔÉϰ汾¡£¡£×÷ΪÔÝʱ·À»¤²½·¥ £¬£¬ÖÎÀíÔ±¿ÉÆôÓÃDMZÍâÎ§ÍøÂçÑ¡ÏîÔöÇ¿·À»¤¡£¡£Ò»ÖÜºó £¬£¬Shadowserver¼à²âÊý¾ÝÏÔʾ £¬£¬ÆäÃÛ¹ÞϵͳÒѼì²âµ½ÊýÊ®´ÎÕë¶Ô̻¶ÔÚ»¥ÁªÍøµÄCrushFTPЧÀÍÆ÷µÄ¹¥»÷ʵÑé £¬£¬ÆäʱÈÔÓÐÁè¼Ý1,500¸öδÐÞ²¹ÊµÀý´¦ÓÚΣº¦ÖС£¡£´Ë´ÎÎó²îµÄ¹ûÕæPoCÓÉProjectDiscoveryÓÚÎó²îÅû¶ǰÊýÈÕÐû²¼ £¬£¬¼ÓËÙÁ˹¥»÷ÕßµÄʹÓÃÀú³Ì¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬CrushFTPºã¾ÃλÁÐÀÕË÷Èí¼þÍŻÈçClop£©µÄ¸ß¼ÛֵĿµÄÃûµ¥ £¬£¬´ËÇ°ÔøÔâÓö¶à´ÎÁãÈÕÎó²î¹¥»÷ £¬£¬°üÀ¨2024Äê4ÔÂÐÞ²¹µÄCVE-2024-4040Îó²î £¬£¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÌÓÒÝÐéÄâÎļþϵͳ²¢ÇÔȡϵͳÎļþ¡£¡£


https://www.bleepingcomputer.com/news/security/critical-auth-bypass-bug-in-crushftp-now-exploited-in-attacks/


5. VitenasÕûÐÎÍâ¿Æ»¼ÕßÊý¾ÝÔâºÚ¿ÍÈëÇÖ²¢Ð¹Â¶


4ÔÂ1ÈÕ £¬£¬ÃÀ¹úÐÝ˹¶Ù×ÅÃûÕûÐÎÍâ¿Æ»ú¹¹VitenasÕûÐÎÍâ¿ÆÔâÓöÖØ´óÍøÂç¹¥»÷ £¬£¬µ¼Ö´ó×ÚÃô¸Ð»¼ÕßÊý¾Ýй¶¡£¡£¸Ã»ú¹¹ÓÉÍâ¿ÆÒ½Ê¦Ñ§»áԺʿPaul Vitenas, Jr.½¨Éè £¬£¬ÆìϰüÀ¨Mirror Mirror Beauty Boutique¼°µÂ¿ËÈøË¹ÖÝÐÝ˹¶ÙÍâ¿ÆÖÐÐÄ¡£¡£3ÔÂ5ÈÕ £¬£¬Íþв×éÖ¯KairosÔÚÆä°µÍøÐ¹ÃÜÕ¾µã¹ûÕæÐû³ÆÒÑÈëÇÖVitenas²©Ê¿¹ÙÍø £¬£¬²¢Õ¹Ê¾Î´¾­±à¼­µÄ1.34GBй¶Îļþ¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨Î´¼ÓÃܵÄÊܱ£»£»£»£»£»¤¿µ½¡ÐÅÏ¢£¨PHI£© £¬£¬Éæ¼°»¼ÕßÂãÕÕ¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÁªÏµ·½·¨¡¢Éç±£ºÅ¡¢¼ÝÕÕÕÕÆ¬µÈÃô¸ÐÐÅÏ¢ £¬£¬Í¬Ê±°üÀ¨Ô±¹¤ÐÅÏ¢¼°ÕïËùÔËÓªÎļþ¡£¡£¹¥»÷Õßͨ¹ý¶íÓïÂÛ̳¶µÊÛÊý¾Ý £¬£¬ÊÔͼѰÕÒÂò¼Ò¡£¡£Kairos×éÖ¯Éù³ÆÍ¨¹ý±©Á¦¹¥»÷ÓÚ2ÔÂÀÖ³ÉÈëÇÖϵͳ £¬£¬ÇÒÕïËùIT²¿·ÖÒѲì¾õ¹¥»÷µ«Î´ÄÜ×èÖ¹Êý¾Ýй¶¡£¡£¹¥»÷ÕßÌåÏÖÒÑÓëVitenas²©Ê¿¾ÙÐÐÔ¼Ò»¸öÔµÄ̸ÅÐ £¬£¬ÍþвÈôÎÞ·¨¾¡¿ìÕÒµ½Êý¾ÝÂò¼Ò £¬£¬½«¹ûÕæ×îÃô¸ÐÐÅÏ¢¡£¡£


https://databreaches.net/2025/04/01/vitenas-cosmetic-surgery-patient-data-hacked-and-leaked/


6. Å·ÖÞЧÀÍÆ½Ì¨Yoojoй¶ÍòÍòÃô¸ÐÎļþ


4ÔÂ1ÈÕ £¬£¬Å·ÖÞЧÀÍÊг¡Æ½Ì¨YoojoÒòÔÆ´æ´¢Í°ÉèÖùýʧ £¬£¬µ¼Ö³¬1450Íò·ÝÃô¸ÐÎļþ̻¶ £¬£¬º­¸ÇÓû§»¤ÕÕ¡¢Í¨Ñ¶¼Í¼¡¢µç»°ºÅÂëµÈ½¹µãÒþ˽Êý¾Ý¡£¡£×÷ΪÅþÁ¬Ð¡ÎÒ˽¼ÒÓëЧÀÍÌṩÉ̵ÄÊ¢ÐÐÆ½Ì¨ £¬£¬Yoojo£¨Ç°ÉíΪYoupijobs£©ÔÚÓ¢·¨Î÷ºÉµÈ¶à¹úÔËÓª £¬£¬ÆäÓ¦ÓÃÏÂÔØÁ¿³¬50Íò´Î £¬£¬Ð§À͹æÄ£ÁýÕÖ¼ÒÕþ¡¢³èÎï¿´»¤µÈ¶àÁìÓò¡£¡£´Ë´Îй¶µÄ´æ´¢Í°ÖÁÉÙ¹ûÕæ»á¼û´ï10Ìì £¬£¬ËäÈ»ÔÝÎÞÀÄÓü£Ïó £¬£¬µ«Ñо¿Ö°Ô±ÖÒÑÔDZÔÚΣº¦ÏÔÖø£º¹¥»÷Õß¿ÉʹÓÃй¶µÄÉí·ÝÖ¤¼þʵÑéÉí·Ý͵ÇÔ £¬£¬Í¨¹ýÕæÊµµç»°ºÅÂë¹¹½¨ÐéαЧÀÍÊշѳ¡¾° £¬£¬ÉõÖÁÌᳫ¾«×¼ÍøÂç´¹ÂÚ¹¥»÷¡£¡£Ð¡ÎÒ˽¼ÒÐÅϢ̻¶»¹ÏÔÖøÔöÌíÓû§±»¸ú×ÙÀÕË÷µÄΣº¦¡£¡£ÔÚÍøÂçÇå¾²ÍŶÓת´ïºó £¬£¬YoojoÒÑÐÞ¸´ÉèÖÃÎó²î²¢Íê³ÉÊý¾Ý±£»£»£»£»£»¤¡£¡£Îª×èÖ¹ÀàËÆÊÂÎñ £¬£¬×¨¼Ò½¨Òé½ÓÄɶàÖØÇå¾²²½·¥ £¬£¬°üÀ¨Ç¿»¯»á¼û¿ØÖÆ¡¢ÆôÓüÓÃÜ´«ÊäÓë´æ´¢¡¢°²ÅÅÃÜÔ¿ÖÎÀíЧÀÍ¡¢ÊµÑéSSL/TLSЭÒé £¬£¬²¢ÔöÇ¿Çå¾²Éó¼ÆÓëÔ±¹¤Åàѵ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬´Ë´ÎÐ¹Â¶Éæ¼°´ó×ÚÕþ¸®Ç©·¢Ö¤¼þ¼°Óû§Í¨Ñ¶ÄÚÈÝ £¬£¬ÆäÃô¸ÐˮƽԶ³¬Í¨Ë×Êý¾Ýй¶ÊÂÎñ¡£¡£


https://cybernews.com/security/yoojo-data-leak-exposed-passports/