NexOpt 30ÍòÁ¾Æû³µºÍÊý°ÙÍò´ÎÐгÌÐÅÏ¢ÔâÆØ¹â

Ðû²¼Ê±¼ä 2025-04-10

1. NexOpt 30ÍòÁ¾Æû³µºÍÊý°ÙÍò´ÎÐгÌÐÅÏ¢ÔâÆØ¹â


4ÔÂ9ÈÕ £¬³µÁ¾¸ú×Ù·þÎñÌṩÉÌNexOpt £¬Ò»¼Ò×ܲ¿ÉèÓڵ¹ú¡¢ÔÚÃÀ¹úºÍ°ÂµØÀûÉèÓзþÎñ´¦µÄ¹«Ë¾ £¬½üÆÚ±¬·¢Êý¾Ýй¶ÊÂÎñ £¬Ì»Â¶ÁËÉÌÓúͳËÓóµµÄÃô¸ÐʵʱºÍÀúÊ·ÐÐÊ»Êý¾Ý¡£NexOptÒ»Ö±Éù³Æ¡°°ü¹Ü×îºéÁ÷ƽµÄÊý¾ÝÇå¾²¡± £¬È»¶øCybernewsÑо¿ÍŶӷ¢Ã÷ £¬³µ¶Ó˾ÀíµÄÊý¾Ý±»±ÈÔ¤ÆÚ¸üÆÕ±éµÄÊÜÖÚ»á¼û¡£²»Çå¾²µÄ Nexopt Kibana ʵÀýй¶ÁË´ó×Ú¿Í»§ÏêϸÐÅÏ¢ £¬°üÀ¨³µÁ¾Ê¶ÓÖÃû¡¢ÊµÊ±´¬²°ºÍ³µÁ¾Î»ÖõÈ £¬×ß©µÄʵÀý°üÀ¨½ü1TBÊý¾Ý £¬ÆäÖв¿·ÖËÆºõ³öÓÚ¿ª·¢Ä¿µÄÌìÉú¡£ÔÚ¶à´ÎʵÑéÁªÏµNexOptºÍÏà¹ØCERTºó £¬Ì»Â¶µÄʵÀýÒѱ»¹Ø±Õ¡£CybernewsÐÅÏ¢Çå¾²Ñо¿Ô±Ö¸³ö £¬´Ë´ÎйÃÜÊÂÎñ¸øÏà¹Ø¸÷·½´øÀ´ÖÖÖÖΣÏÕ £¬Êý¾Ý¿ÉÄܱ»ÓÃÓÚÉÌÒµÇé±¨ÍøÂç £¬ÉõÖÁ×éÖ¯ÏÖʵÌìÏµķ¸·¨Ô˶¯¡£´Ë´Îй¶̻¶ÁËÊý°ÙÍòÌõÉÌÒµÐгÌÐÅÏ¢ £¬¿ÉÄÜ»¹°üÀ¨Ò»Ð©·ÇÉÌÒµÐгÌÐÅÏ¢ £¬ÊÜÓ°ÏìµÄÊý¾ÝËÆºõÀ´×ÔÁè¼Ý 30 ÍòÁ¾×ÔÁ¦³µÁ¾¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨³µÁ¾Ê¶ÓÖÃûÂë¡¢NexOpt ×°±¸ IMEI ±êʶ·û¡¢³µÁ¾Òƶ¯Êý¾Ý¡¢Ðг̳ö·¢µØ¡¢Ä¿µÄµØÊý¾Ý¡¢º½Ïß¡¢³µÁ¾È¼ÓÍ»òµçÁ¿Êý¾ÝÒÔ¼°¼ÝʻԱ×ùÒÎÊý¾ÝµÈ¡£ÓÉÓÚ VIN ºÅÂë¿ÉÓÃÓÚʶ±ð¸ü¶à³µÁ¾ÐÅÏ¢ £¬°üÀ¨³µÖ÷ÐÅÏ¢ £¬ÕâÔöÌíÁËÊý¾Ýй¶µÄÑÏÖØÐÔ¡£


https://cybernews.com/security/nexopt-data-leak-exposes-locations-vehicles/


2. ¹¤ÒµÊÖÒÕÖÆÔìÉÌSensata TechnologiesÔâÀÕË÷Èí¼þ¹¥»÷


4ÔÂ10ÈÕ £¬Sensata TechnologiesÊÇÒ»¼ÒÓµÓÐÁè¼Ý19,000ÃûÔ±¹¤µÄ¹¤ÒµÊÖÒÕ¹«Ë¾ £¬ÉÏÒ»²ÆÄêÓªÊÕ½ü40ÒÚÃÀÔª £¬×¨×¢ÓÚΪÆû³µ¡¢ÖØÐͳµÁ¾ºÍÔ½Ò°³µ¡¢¹¤ÒµºÍº½¿Õº½ÌìÊг¡Éú²ú´«¸ÐÆ÷¡¢µçÆø± £»¤Ôª¼þºÍÆäËû¹¤¾ß¡£ÉÏÖÜÈոù«Ë¾ÔâÊÜÀÕË÷Èí¼þ¹¥»÷ £¬ÆäϵͳÔâÊÜÑÏÖØÆÆËð¡£SensataËæ¼´ÁªÏµÁËÖ´·¨²¿·Ö¡£¹«Ë¾ÔÚ8-KÎļþÖÐ͸¶ £¬´Ë´ÎÊÂÎñÔÝʱӰÏìÁËÆäÔËÓª £¬°üÀ¨ÔËÊä¡¢ÊÕ»õ¡¢ÖÆÔìÉú²úÒÔ¼°ÆäËûÖÖÖÖÖ§³Ö¹¦Ð§¡£Ö»¹Ü¹«Ë¾ÒѽÓÄÉÔÝʱ²½·¥ÒÔ»Ö¸´²¿·Ö¹¦Ð§ £¬µ«ÖÜÈ«»Ö¸´µÄÏêϸʱ¼ä±íÉв»Ã÷È·¡£¸Ã¹«Ë¾ÓÚÖÜÈýÏòÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©×ª´ïÁËÕâÒ»ÊÂÎñ £¬²¢ÖÒÑÔͶ×ÊÕß £¬ÒòÀÕË÷Èí¼þ¹¥»÷ £¬¹«Ë¾¹ÙÔ±±»ÆÈ¹Ø±ÕÆäÍøÂç¡£³õ³ÌÐò²éÏÔʾ £¬ÓÐÎļþ´Ó¹«Ë¾ÇéÐÎÖб»µÁ¡£SensataÌåÏÖ £¬ÍøÂçÇ徲ר¼ÒÕýÔÚÈ«Á¦Ð­Öú»Ö¸´ÊÂÇé £¬²¢Æð¾¢Ê¶±ð±»µÁÎļþ £¬ÒÔ±ãʵʱ֪ͨÏà¹ØÖ°Ô±¡£Ö»¹Ü¹«Ë¾ÌåÏÖ²»ÒÔΪ´Ë´Î¹¥»÷»á¶Ô±¾¼¾¶ÈµÄ²ÆÎñ״̬±¬·¢ÖØ´óÓ°Ïì £¬µ«Ò²Ö¸³öÕâ¿ÉÄÜ»áÆ¾Ö¤»Ö¸´Ð§¹û¶øÓÐËùת±ä¡£×èÖ¹ÖÜÈýÍíÉÏ £¬ÉÐδÓÐÈκÎÀÕË÷Èí¼þÍÅ»ïÈϿɶԴ˴ÎÊÂÎñÈÏÕæ¡£


https://therecord.media/sensata-technologies-ransomware-attack


3. GrandoreiroµØÀíΧÀ¸ÍøÂç´¹ÂÚ¹¥»÷Ãé×¼À­ÃÀµØÇø


4ÔÂ9ÈÕ £¬Ò»³¡Õë¶ÔÀ­¶¡ÃÀÖÞÓû§µÄÍøÂç´¹ÂÚÔ˶¯ÕýËÁŰ £¬Æä½¹µãÊÇÎÛÃûÕÑÖøµÄÒøÐÐľÂíGrandoreiro £¬¸ÃľÂíÒÔÇÔÈ¡Ãô¸Ð²ÆÎñÊý¾ÝÖø³Æ¡£2ÔÂ19ÈÕÖÁ3ÔÂ14ÈÕʱ´ú £¬Ñо¿Ö°Ô±×¢Öص½Ïà¹ØÍøÂç´¹ÂÚÔ˶¯¼¤Ôö £¬ÇÒ¼£ÏóÅú×¢Ô˶¯ÈÔÔÚÒ»Á¬¡£GrandoreiroÒѱ£´æ¶àÄê £¬Ò»Ö±Ë¢ÐÂÒÔ¼á³ÖÁìÏÈְλ £¬Ö¼ÔÚÇÔÈ¡ÒøÐÐÆ¾Ö¤¡¢¼àÊÓÓû§Ô˶¯²¢ÊÚÓè¹¥»÷ÕßÔ¶³Ì»á¼ûȨÏÞ¡£´Ë´Î¹¥»÷Ô˶¯ÖÐ £¬µØÀíΧÀ¸ÊÖÒÕÓÈΪÒýÈËעĿ £¬¶ñÒâÈí¼þÔÚÔËÐÐǰ»á¼ì²éÊܺ¦ÕßIPµØÖ·ÒÔÈ·¶¨ÆäλÖà £¬ÈôÓû§²»ÔÚÄ¿µÄÀ­¶¡ÃÀÖÞ¹ú¼Ò/µØÇø £¬¶ñÒâÈí¼þ±ã»á×èÖ¹Ö´ÐÐ £¬ÕâʹµÃ¹¥»÷Ô½·¢¼¯ÖÐ £¬ïÔÌ­Á˲»ÐëÒªµÄÆØ¹â £¬²¢×ÊÖúÆä¶ã¹ýÈ«ÇòÇå¾²¼à¿Ø¡£Ñ¬È¾Ê¼ÓÚÒ»¸ö´¹ÂÚÒ³Ãæ £¬ÓÕÆ­Êܺ¦Õßµã»÷Á´½Ó»òÏÂÔØÐéαPDFÎĵµ £¬¸ÃÎļþʵΪ°üÀ¨Grandoreiro¼ÓÔØ³ÌÐòµÄѹËõ°ü¡£Ò»µ©Îļþ±»ÌáÈ¡²¢·­¿ª £¬¶ñÒâÈí¼þ±ã»áÏòip-apicom·¢ËÍÇëÇóÒÔÈ·¶¨Óû§µØÀíλÖà £¬²¢Æ¾Ö¤Ð§¹û¾öÒéÊÇ·ñ¼ÌÐø¹¥»÷¡£±ðµÄ £¬Grandoreiro»¹Í¨¹ýÏòdns.google·¢ËÍÇëÇóÀ´×èÖ¹ÍâµØDNSÅÌÎÊ £¬Èƹý»ùÓÚDNSµÄ×èÖ¹»úÖÆ¡£


https://hackread.com/grandoreiro-strikes-geofenced-phishing-attacks-latam/


4. AkiraBotÀ¬»øÓʼþÔ˶¯ÍþвСÐÍÆóÒµÍøÂçÇå¾²


4ÔÂ9ÈÕ £¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÓÉ¡°AkiraBot¡±Çý¶¯µÄÐÂÐÍÀ¬»øÓʼþÔ˶¯ £¬¸Ã»úеÈËרÃÅÕë¶ÔСÐÍÆóÒµÍøÕ¾·¢ËͶ¨ÖƵĴÙÏúÐÅÏ¢¡£×Ô2024Äê9ÔÂÒÔÀ´ £¬AkiraBotÒÑÀÖ³ÉÏòÖÁÉÙ80,000¸öÍøÕ¾·¢ËÍÀ¬»øÓʼþÁªÏµ±íµ¥ºÍ̸ÌìС¹¤¾ß £¬Ä¿µÄÍøÕ¾ÊýÄ¿Áè¼Ý400,000¸ö¡£AkiraBotʹÓÃOpenAIµÄGPT-4o-miniµÈÈ˹¤ÖÇÄÜÓïÑÔÄ£×Ó £¬ÆÊÎöÍøÕ¾ÄÚÈݲ¢ÌìÉú¸öÐÔ»¯ÐÅÏ¢ £¬ÍƹãڲƭÐÔSEO·þÎñ £¬Ê¹±ê×¼À¬»øÓʼþ¹ýÂËÆ÷¸üÄѼì²âºÍ×èµ²¡£¸ÃÔ˶¯Ö÷ÒªÕë¶ÔʹÓÃShopify¡¢GoDaddy¡¢WixºÍSquarespaceµÈÈÈÃŽ¨Õ¾Æ½Ì¨µÄÖÐСÐÍÆóÒµ¡£ÕâЩƽ̨ÒòÆäÒ×ÓÃÐÔ¶ø¹ãÊÜÖÐСÆóÒµÇàíù £¬È´Ò²³ÉΪÁËÀ¬»øÓʼþ·¢ËÍÕßµÄÄ¿µÄ¡£AkiraBot¾ß±¸¶àÖÖ¶ñÒâÔ˶¯ÄÜÁ¦ £¬°üÀ¨½¨ÉèAIÌìÉúµÄÐÂÎÅ¡¢ÈƹýÑéÖ¤Âë± £»¤¡¢Ãé׼СÐÍÆóÒµÒÔ¼°Ê¹ÓôúÀíÍøÂç×èÖ¹¼ì²â¡£¸Ã¹¤¾ßͨ¹ýFastCaptchaºÍNextCaptchaµÈ¹¤¾ß £¬ÉõÖÁʹÓÃä¯ÀÀÆ÷ÊôÐÔÀ´Ä£ÄâÕýµ±Óû§µÄÐÐΪ £¬´Ó¶øÓÕÆ­ÑéÖ¤Âëϵͳ¡£±ðµÄ £¬AkiraBot»¹Ê¹ÓôúÀí·þÎñ½«ÆäÁ÷Á¿Â·Óɵ½²î±ðµÄIPµØÖ· £¬ÒÔ×èÖ¹±»»ùÓÚÍøÂçµÄ± £»¤²½·¥×èµ²¡£


https://hackread.com/akirabot-abuses-openai-api-spam-website-contact-forms/


5. ºÚ¿ÍʹÓÃEC2ÍйÜÍøÕ¾ÖеÄSSRFÎó²îÇÔÈ¡AWSƾ֤


4ÔÂ9ÈÕ £¬F5 LabsÑо¿Ö°Ô±·¢Ã÷Ò»ÏîÓÐÕë¶ÔÐÔµÄÍøÂçÔ˶¯ £¬¸ÃÔ˶¯Ê¹ÓÃAWS EC2ʵÀýÉÏÍйܵÄÍøÕ¾ÖеķþÎñÆ÷¶ËÇëÇóαÔ죨SSRF£©Îó²î £¬ÌáÈ¡EC2ÔªÊý¾Ý £¬ÆäÖпÉÄܰüÀ¨À´×ÔIMDSv1¶ËµãµÄIAMƾ֤¡£¹¥»÷Õß½è´ËÌáÉýȨÏÞ £¬»á¼ûS3´æ´¢Í°»ò¿ØÖÆÆäËûAWS·þÎñ £¬¿ÉÄܵ¼ÖÂÃô¸ÐÊý¾Ýй¶¡¢Ê¹ÓúͷþÎñÖÐÖ¹¡ £Ô˶¯Ê¼ÓÚ3ÔÂ13ÈÕ £¬ÓÚ3ÔÂ15ÈÕÖÁ25ÈÕʱ´úÉý¼¶ÎªÖÜÈ«¹¥»÷¡£¹¥»÷ÕßʹÓÃSSRFÎó²î £¬Ô¶³ÌÅÌÎÊÄÚ²¿EC2ÔªÊý¾ÝURL²¢ÎüÊÕÃô¸ÐÊý¾Ý¡£ÓÉÓÚÒ×Êܹ¥»÷µÄʵÀýÔÚIMDSv1ÉÏÔËÐÐ £¬¹¥»÷Õ߿ɼìË÷°üÀ¨IAMƾ֤ÔÚÄÚµÄÔªÊý¾Ý¡£IMDSv1Òѱ»¸üÇå¾²µÄIMDSv2È¡´ú £¬ºóÕßÐè»á»°ÁîÅÆ¾ÙÐÐÉí·ÝÑéÖ¤¡£¹¥»÷ÕßÂÖ»»ÅÌÎʲÎÊýÃû³ÆºÍ×Ó·¾¶ £¬ÏÔʾÆäϵͳÐÔÇÔÈ¡Ãô¸ÐÊý¾ÝµÄÒªÁì¡£F5 LabsÔÚ2025Äê3ÔµÄÍþвÇ÷ÊÆ±¨¸æÖÐÇ¿µ÷ÁËÕâЩ¹¥»÷ £¬²¢Ö¸³ö¾ÉÎó²îÈԾ߸߶ÈÕë¶ÔÐÔ £¬40%±»Ê¹ÓõÄCVE¶¼ÊÇËÄÄêÒÔÉϵľÉÎó²î¡£Îª¼õÇá´ËÀàÍþв £¬½¨ÒéÓ¦ÓÿÉÓõÄÇå¾²¸üР£¬Ç¿»¯Â·ÓÉÆ÷ºÍÎïÁªÍø×°±¸ÉèÖà £¬²¢ÓÃÊÜÖ§³ÖµÄÐͺÅÌæ»»EoLÍøÂç×°±¸¡£


https://www.bleepingcomputer.com/news/security/hackers-target-ssrf-bugs-in-ec2-hosted-sites-to-steal-aws-credentials/


6. Magentoƽ̨³¬70ÍòÓû§µÄCRMÊý¾ÝÒÉÔâй¶


4ÔÂ9ÈÕ £¬Ò»Ãû×Գơ°Satanic¡±µÄºÚ¿Íͨ¹ýµÚÈý·½ÇþµÀÐû³Æ £¬¿ªÔ´µç×ÓÉÌÎñƽ̨MagentoÔâÓöÈëÇÖ £¬µ¼ÖÂÁè¼Ý70ÍòÓû§µÄCRMÊý¾Ýй¶ £¬Éæ¼°µç×ÓÓʼþ¡¢µç»°ºÅÂë¼°ÆóÒµÐÅÏ¢¡£¾ÝºÚ¿ÍÉù³Æ £¬´Ë´Î¹¥»÷±¬·¢ÓÚ2025Äê4ÔÂ9ÈÕ £¬Í¨¹ýµÚÈý·½¼¯³ÉÇÔÈ¡ÁË´ó×ÚÆóÒµºÍСÎÒ˽¼ÒÁªÏµÐÅÏ¢¡£Ö»¹ÜMagentoĸ¹«Ë¾AdobeÉÐδ֤ʵ´ËÊÂÎñ £¬µ«ºÚ¿ÍÐû²¼µÄй¶Êý¾Ý°üÀ¨74.5Íò¸ö×ÔÁ¦ÌõÄ¿ £¬°üÀ¨43Íò¸öµç×ÓÓʼþµØÖ·ºÍ26.1Íò¸öµç»°ºÅÂë £¬²¢ÔÚÍøÂç·¸·¨ÂÛ̳Breach ForumsÉϹûÕæ¡£Ð¹Â¶µÄÊý¾ÝËÆºõÔ´×ÔMagento°²ÅŵÄCRMϵͳ £¬Éæ¼°BBCµ½¡¶Ö¥¼Ó¸çÂÛ̳±¨¡·µÈ×éÖ¯ £¬°üÀ¨ÐÕÃû¡¢Ö°Î»¡¢¹«Ë¾µç×ÓÓʼþ¡¢ÓòÃû¡¢µç»°ºÅÂë¼°É罻ýÌåÁ´½Ó¡£ÎļþÏÔʾ £¬ÕâЩÐÅϢΪ½á¹¹»¯ÌõÄ¿ £¬Ïêϸ¼Í¼ÁËÿÌõ¼Í¼µÄÐÅÏ¢ £¬¿ÉÄܱ»ÓÃÓÚÍøÂç´¹ÂÚ¡¢B2Bð³äÕ©Æ­»ò¸ß¼ÛֵĿµÄÆÊÎö¡£±ðµÄ £¬²¿·Ö¼Í¼°üÀ¨ÒÑÑéÖ¤µÄLinkedInÕË»§¡¢¹«Ë¾µç×ÓÓʼþÓÖÃû¼°¿Í»§·þÎñÁªÏµ·½·¨¡£Êý¾Ý¿âÖеÄÊÖÒÕÔªÊý¾Ý»¹Õ¹ÏÖÁ˹«Ë¾µÄÊÖÒÕÕ»¡¢ÓªÏúƽ̨¼°Ö§¸¶´¦Öóͷ£Æ÷ £¬ÈçMagento¡¢Salesforce¡¢Adobe Experience ManagerºÍStripe¡£


https://hackread.com/hackers-magento-breach-3rd-party-crm-data-leak/