GlobalProtect VPNÔâ230Íò´ÎɨÃè»á»°µÄ̽²â
Ðû²¼Ê±¼ä 2025-11-241. GlobalProtect VPNÔâ230Íò´ÎɨÃè»á»°µÄ̽²â
11ÔÂ20ÈÕ£¬£¬£¬£¬£¬ÊµÊ±Ç鱨¹«Ë¾GreyNoise¼à²âµ½£¬£¬£¬£¬£¬Õë¶ÔPalo Alto Networks GlobalProtect VPNµÇ¼ÃÅ»§µÄ¶ñÒâɨÃè»î¶¯ÔÚ2025Äê11ÔÂ14ÈÕÖÁ19Èռ䷺Æð±¬·¢Ê½ÔöÌí£¬£¬£¬£¬£¬24СʱÄڻÁ¿¼¤Ôö40±¶£¬£¬£¬£¬£¬´´90Ììиߣ¬£¬£¬£¬£¬Ò»ÖÜÄÚµÖ´ï·åÖµ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷³±¾Û½¹ÓÚGlobalProtectµÄ*/global-protect/login.esp URI¶Ëµã£¬£¬£¬£¬£¬¸ÃÒ³ÃæÊÇÓû§¾ÙÐÐVPNÉí·ÝÑéÖ¤µÄ¹ûÕæÈë¿Ú£¬£¬£¬£¬£¬Ê±´úÀۼƼì²âµ½230Íò´Î»á¼ûʵÑ飬£¬£¬£¬£¬Ä¿µÄ¹ú¼Ò¼¯ÖÐÔÚÃÀ¹ú¡¢Ä«Î÷¸çºÍ°Í»ù˹̹¡£¡£¡£¡£¡£GreyNoiseÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬¹¥»÷ÌØÕ÷·ºÆð¸ß¶È×éÖ¯»¯£ºÖظ´·ºÆðµÄTCP/JA4tÖ¸ÎÆ¡¢ÏàͬASN£¨×ÔÖÎϵͳ±àºÅ£©µÄÖØ¸´Ê¹Óü°»î¶¯á¯Áëʱ¼äÒ»ÖÂÐÔ£¬£¬£¬£¬£¬Åú×¢ÓëÀúÊ·¹¥»÷±£´æ¹ØÁª¡£¡£¡£¡£¡£Ö÷Òª¹¥»÷Ô´ASNΪAS200373£¨3xK Tech GmbH£¬£¬£¬£¬£¬62% IPλÓڵ¹ú£©ºÍAS208885£¨Noyobzoda Faridduni Saidilhom£¬£¬£¬£¬£¬15% IPλÓÚ¼ÓÄô󣩡£¡£¡£¡£¡£ÀúÊ·Êý¾ÝÏÔʾ£¬£¬£¬£¬£¬´ËÀàɨÃèá¯Áë80%ÏÈÓÚÐÂÇå¾²Îó²îÅû¶£¬£¬£¬£¬£¬Palo Alto²úÆ·¹ØÁªÐÔÓÈΪÏÔÖø¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/globalprotect-vpn-portals-probed-with-23-million-scan-sessions/
2. µÏ°ÝÏû·À¾ÞÍ·NAFFCOÔâINCÀÕË÷Èí¼þ¹¥»÷
11ÔÂ20ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬µÏ°ÝÏû·ÀÇå¾²¾ÞÍ·NAFFCO FZCOÔâÎÛÃûÕÑÖøµÄINCÀÕË÷Èí¼þÍŻ﹥»÷£¬£¬£¬£¬£¬1TBÄÚ²¿Êý¾Ý±»ÇÔ²¢Ð¹Â¶ÖÁ°µÍø£¬£¬£¬£¬£¬Òý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£NAFFCO×÷Ϊº£ÍåµØÇø×î´óÏû·À×°±¸¼°ÏµÍ³¹©Ó¦ÉÌÖ®Ò»£¬£¬£¬£¬£¬ÄêÊÕÈë´ï44ÒÚÃÀÔª£¬£¬£¬£¬£¬¿Í»§º¸ÇµÏ°Ý¹þÀû·¨Ëþ¡¢°¢²¼Ôú±È¬¸¡¹¬µÈ±ê¼ÇÐÔÐÞ½¨£¬£¬£¬£¬£¬ÒÔ¼°ADNOCµÈʯÓ;ÞÍ·¼°Õþ¸®»ú¹¹¡£¡£¡£¡£¡£INCÍÅ»ïÓÚ11ÔÂ17ÈÕÔÚ°µÍøÐ¹Â¶ÍøÕ¾Ðû²¼NAFFCOÐÅÏ¢£¬£¬£¬£¬£¬²¢¸½ÉÏ47ÕÅÊý¾Ý½ØÍ¼£¬£¬£¬£¬£¬ÏÔʾй¶ÄÚÈÝÉæ¼°¹«Ë¾ÔËÓªÏêÇ飨ÈçÔ±¹¤ÐÕÃû¡¢Ö°Î»¡¢ÁªÏµ·½·¨¡¢Éí·ÝÖ¤ÕÕÆ¬¼°Ç©Ö¤ÐÅÏ¢£©¡¢Äê¶ÈÌõÔ¼Çåµ¥£¨º¬¿Í»§Ãû³Æ¡¢½ð¶î¼°ÏúÊÛ´ú±í£©¡¢µ¥¶ÀÌõÔ¼Îļþ¼°ÏîÄ¿×ʽðÊý¾ÝµÈ¡£¡£¡£¡£¡£´ËÀàÃô¸ÐÐÅϢй¶½«µ¼ÖÂÔ±¹¤ÃæÁÙÉí·Ý͵ÇÔ¼°Éç»á¹¤³Ì¹¥»÷Σº¦£¬£¬£¬£¬£¬Í¬Ê±Ì»Â¶¹«Ë¾ÓªÒµÔËӪϸ½Ú£¬£¬£¬£¬£¬Ôì³ÉÑÏÖØÉùÓþË𺦡£¡£¡£¡£¡£INCÀÕË÷Èí¼þÍŻィÉèÓÚ2023Äê7Ô£¬£¬£¬£¬£¬¿ÉÄÜÓë¶íÂÞ˹¹ØÁª£¬£¬£¬£¬£¬ÒÔ¡°¶àÖØÀÕË÷¡±×÷°¸ÊÖ·¨ÖøÃû¡£¡£¡£¡£¡£¸ÃÍÅ»ïÒÑÔì³É453ÃûÊܺ¦Õߣ¬£¬£¬£¬£¬¹¥»÷Ä¿µÄº¸ÇÒ½Ôº¡¢Ñ§Ð£¡¢Õþ¸®»ú¹¹¼°¿Æ¼¼¹«Ë¾¡£¡£¡£¡£¡£
https://cybernews.com/security/naffco-ransomware-incident-data-leak/
3. SturnusľÂí£ºÈÆ¹ý¼ÓÃܵÄÈ«¹¦Ð§×°±¸¿ØÖÆÍþв
11ÔÂ20ÈÕ£¬£¬£¬£¬£¬Ò»¿îÃûΪSturnusµÄÐÂÐͰ²×¿ÒøÐÐľÂíÕýÒý·¢ÍøÂçÇå¾²½ç¸ß¶ÈСÐÄ¡£¡£¡£¡£¡£¸ÃľÂí¾ß±¸¡°ÍêÈ«¿ØÖÆ×°±¸¡±ÄÜÁ¦£¬£¬£¬£¬£¬Æä¹¥»÷Ä¿µÄÖ±Ö¸WhatsApp¡¢Telegram¡¢SignalµÈ¼ÓÃÜͨѶÈí¼þ£¬£¬£¬£¬£¬Í¨¹ý²¶»ñÆÁÄ»ÄÚÈÝÈÆ¹ý¶Ëµ½¶Ë¼ÓÃÜ£¬£¬£¬£¬£¬ÇÔÈ¡ÒøÐÐÆ¾Ö¤¡¢¼à¿ØÊµÊ±¶Ô»°£¬£¬£¬£¬£¬²¢Òþ²ØÚ²ÆÐÐΪ¡£¡£¡£¡£¡£ThreatFabricÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬SturnusËä´¦ÓÚ¿ª·¢½×¶Î»òÓÐÏÞ²âÊÔÆÚ£¬£¬£¬£¬£¬µ«ÒÑÃé×¼ÖÐÄÏÅ·½ðÈÚ»ú¹¹£¬£¬£¬£¬£¬Ô¤Ê¾¹¥»÷ÕßÕýΪ´ó¹æÄ£¹¥»÷×ö×¼±¸¡£¡£¡£¡£¡£¸ÃľÂíÊÖÒÕÏȽø£¬£¬£¬£¬£¬ÔÚÍ¨Ñ¶ÐæÅºÍ×°±¸Ö§³ÖÉÏÓâÔ½¹Å°åľÂí¼Ò×å¡£¡£¡£¡£¡£ÆäͨѶģʽģÄâ×ϳáé£ÄñÃù½Ð£¬£¬£¬£¬£¬ÔÚÃ÷ÎÄ¡¢RSA¡¢AESÐÂÎżäËæ»úÇл»£¬£¬£¬£¬£¬Í¨¹ýHTTP POST×¢²á×°±¸²¢Íê³ÉÃÜÔ¿½»Á÷ºó£¬£¬£¬£¬£¬½ÓÄÉAES-256¼ÓÃÜ´«ÊäÊý¾Ý¡£¡£¡£¡£¡£Êý¾ÝÇÔÈ¡ÒÀÀµÁ½ÖÖ»¥²¹»úÖÆ£ºHTMLÁýÕÖ²ãºÍÎÞÕϰЧÀͼüÅ̼ͼ£¬£¬£¬£¬£¬¿Éʵʱ¶ÁÈ¡ÆÁÄ»ËùÓÐÄÚÈÝ£¬£¬£¬£¬£¬°üÀ¨ÁªÏµÈË¡¢¶Ô»°Ï̼߳°ÐÂÎÅ£¬£¬£¬£¬£¬Ö±½ÓÈÆÆðÔ´µ½¶Ë¼ÓÃÜ¡£¡£¡£¡£¡£Ëü»¹Í¨¹ý×°±¸ÖÎÀíԱȨÏÞÔöÇ¿³¤ÆÚÐÔ£¬£¬£¬£¬£¬¼à¿Ø½âËøÊÂÎñ¡¢×èֹȨÏÞ×÷·Ï¼°Ð¶ÔØ£¬£¬£¬£¬£¬²¢×·×Ùϵͳ±ä»»¡¢ÍøÂç״̬¡¢SIM¿¨Ìæ»»µÈ£¬£¬£¬£¬£¬µ÷½âÕ½ÂÔ¹æ±ÜÆÊÎö¡£¡£¡£¡£¡£
https://securityaffairs.com/184878/cyber-crime/sturnus-new-android-banking-trojan-targets-whatsapp-telegram-and-signal.html
4. Æû³µµçÉÌÆ½Ì¨Revolution PartsÔâ´ó¹æÄ£Êý¾Ýй¶
11ÔÂ23ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÑÇÀûÉ£ÄÇÖÝ̹ÅåÊÐµÄÆû³µµçÉÌÆ½Ì¨Revolution PartsÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡ÁËÁè¼Ý500ÍòÓû§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓÊÏä¡¢IPµØµã¡¢µç»°ºÅÂë¡¢¼Òͥסַ¡¢×°±¸Êý¾Ý¼°È«ÃûµÈ½¹µãÐÅÏ¢¡£¡£¡£¡£¡£¸Ã¹«Ë¾Í¨¹ý¾ÏúÉÌÍøÂçÿÄêÏúÊÛ¼ÛÖµ³¬6ÒÚÃÀÔªµÄÆû³µÁ㲿¼þ£¬£¬£¬£¬£¬ÆäÓû§Êý¾Ýº¸Ç¶©µ¥ÏêÇéºÍÕ˺Å×¢²áÐÅÏ¢£¬£¬£¬£¬£¬Óë¹¥»÷ÕßÉù³ÆµÄÇÔÈ¡ÄÚÈݸ߶ÈÎǺϡ£¡£¡£¡£¡£¹¥»÷ÉùÃ÷Ðû²¼ÓÚ×ÅÃûÊý¾Ýй¶ÂÛ̳£¬£¬£¬£¬£¬¸Ãƽ̨ÊÇÍøÂç×ï·¸½»Á÷±»µÁÊý¾ÝµÄÖ÷ÒªÇþµÀ¡£¡£¡£¡£¡£CybernewsÑо¿ÍŶӶԹ¥»÷ÕßÌṩµÄÑù±¾Êý¾Ý¾ÙÐÐÁ˺˲飬£¬£¬£¬£¬Ö¤ÊµÑù±¾°üÀ¨Óû§È«Ãû¡¢µç×ÓÓÊÏä¡¢µç»°ºÅÂë¡¢¼Òͥסַ¡¢IPµØµã¼°×°±¸Êý¾Ý£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢ÓëµçÉÌÆ½Ì¨Óû§¹ºÎïʱÌîдµÄ¶©µ¥ÏêÇé¼°×¢²áÐÅÏ¢ÍêȫһÖ¡£¡£¡£¡£¡£Ñо¿ÍŶÓÖ¸³ö£¬£¬£¬£¬£¬´ËÀàÊý¾Ý¿É±»ÓÃÓÚÉí·Ý͵ÇԺ;«×¼´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬¹¥»÷Õß¿É̫ͨ¹ýÎöÓû§Æ«ºÃ¡¢µØÀíλÖõÈÐÅÏ¢£¬£¬£¬£¬£¬Î±×°³ÉÕýµ±ÆóÒµÓÕÆÓû§Ð¹Â¶¸üÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬»òͨ¹ý·¢ËÍ´ø¶¾ÓʼþÓÕµ¼Êܺ¦ÕßÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£
https://cybernews.com/security/revolution-parts-data-breach-claims/
5. ÒÁ±ÈÀûÑǺ½¿ÕÒò¹©Ó¦ÉÌÇå¾²Îó²îÖ¿ͻ§Êý¾Ýй¶
11ÔÂ23ÈÕ£¬£¬£¬£¬£¬Î÷°àÑÀ¹ú¼Òº½¿Õ¹«Ë¾ÒÁ±ÈÀûÑǺ½¿Õ¿ËÈÕת´ï£¬£¬£¬£¬£¬ÒòµÚÈý·½¹©Ó¦ÉÌϵͳÔâδ¾ÊÚȨ»á¼û£¬£¬£¬£¬£¬µ¼Ö²¿·Ö¿Í»§ÐÅϢй¶¡£¡£¡£¡£¡£¾ÝÍþвÇ鱨ƽ̨HackmanacÅû¶µÄÓʼþÏÔʾ£¬£¬£¬£¬£¬Ð¹Â¶Êý¾ÝÉæ¼°¿Í»§ÐÕÃû¡¢µç×ÓÓʼþ¼°ÒÁ±ÈÀûÑǺ½¿Õ¾ãÀÖ²¿»áÔ±¿¨Ê¶ÓÖÃûÂ룬£¬£¬£¬£¬µ«ÕË»§µÇ¼ƾ֤¡¢ÃÜÂë¼°ÒøÐÐÖ§¸¶ÐÅϢδ±»²¨¼°¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬Ò»ÃûÍøÂçÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳Éù³Æ»ñÈ¡ÁË77GB¾Ý³ÆÀ´×Ըú½¿Õ¹«Ë¾µÄÊý¾Ý£¬£¬£¬£¬£¬²¢ÒÔ15ÍòÃÀÔª¹ûÕæ½ÐÂô¡£¡£¡£¡£¡£¹¥»÷ÕßÐû³ÆÊý¾Ý°üÀ¨A320/A321ÊÖÒÕÎĵµ¡¢AMPά»¤Îļþ¼°·¢ÄîÍ·ÐÅÏ¢µÈÄÚ²¿×ÊÁÏ£¬£¬£¬£¬£¬µ«º½¿Õ¹«Ë¾Ã÷È·½«Ð¹Â¶¹éÒòÓÚ¹©Ó¦ÉÌ£¬£¬£¬£¬£¬Ç¿µ÷Æä×ÔÉíϵͳδÊÜÖ±½ÓÓ°Ïì¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬ÒÁ±ÈÀûÑǺ½¿ÕÁ¬Ã¦Æô¶¯Çå¾²ÐÒ飬£¬£¬£¬£¬ÊµÑéÊÖÒÕ¼°×éÖ¯²½·¥¿ØÖÆÊÂ̬¡£¡£¡£¡£¡£¹«Ë¾ÒѶԿͻ§ÕË»§¹ØÁªµÄµç×ÓÓʼþµØµãÔöÌíÌØÊâ±£»£»£»£»¤²ã£¬£¬£¬£¬£¬Èç²Ù×÷ǰÐèͨ¹ýÑéÖ¤ÂëÑéÖ¤£¬£¬£¬£¬£¬²¢Ò»Á¬¼à¿ØÏµÍ³¿ÉÒɻ¡£¡£¡£¡£¡£Ïà¹Ø²¿·ÖÒÑ»ñ֪ͨ£¬£¬£¬£¬£¬ÕýÓëÉæÊ¹©Ó¦ÉÌÐͬÊӲ졣¡£¡£¡£¡£º½¿Õ¹«Ë¾½¨Òé¿Í»§Ð¡ÐÄ¿ÉÒÉÐÅÏ¢£¬£¬£¬£¬£¬Í¨¹ýÖ¸¶¨µç»°±¨¸æÒì³£»£»£»£»î¶¯£¬£¬£¬£¬£¬Ìá·ÀÍøÂç´¹ÂÚ¼°Éç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/iberia-discloses-customer-data-leak-after-vendor-security-breach/
6. Cox EnterprisesÔâOracleÁãÈÕÎó²î¹¥»÷ÖÂÊý¾Ýй¶
11ÔÂ22ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÆóÒµ¼¯ÍÅCox EnterprisesÒòOracle E-Business SuiteµÄÁãÈÕÎó²îCVE-2025-61882ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬µ¼ÖÂ9,479ÃûСÎÒ˽¼ÒÊý¾Ýй¶¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ9ÔÂ29ÈÕ·¢Ã÷¿ÉÒɻ£¬£¬£¬£¬£¬ËÝÔ´ÖÁ8ÔÂ9ÈÕÖÁ14ÈÕʱ´ú¹¥»÷ÕßʹÓøÃδ֪Îó²îʵÑé¹¥»÷¡£¡£¡£¡£¡£Cox Enterprises×÷ΪÄêÊÕÈë230ÒÚÃÀÔª¡¢ÓµÓÐ5.5ÍòÃûÔ±¹¤µÄ¿ç¹úÆóÒµ£¬£¬£¬£¬£¬Éæ¼°µçÐÅ¡¢Æû³µÐ§À͵ÈÓªÒµ£¬£¬£¬£¬£¬ØÊºǫ́ÔËӪƽ̨ÔâÉøÍ¸ºó£¬£¬£¬£¬£¬ÍþвÐÐΪÕßClopÀÕË÷Èí¼þÓÚ10ÔÂ27ÈÕ½«CoxÁÐÈë°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾£¬£¬£¬£¬£¬²¢Ðû²¼ÇÔÊØÐÅÏ¢¡£¡£¡£¡£¡£OracleËäÔÚ10ÔÂ5ÈÕÐû²¼²¹¶¡£¡£¡£¡£¡£¬£¬£¬£¬£¬µ«Îó²îÒѱ»ÌáǰʹÓᣡ£¡£¡£¡£CoxÔÚ֪ͨÖÐδÅû¶Ïêϸй¶Êý¾ÝÀàÐÍ£¬£¬£¬£¬£¬µ«ÎªÊÜÓ°ÏìÕßÌṩ12¸öÔÂÃâ·ÑÉí·Ý͵ÇÔ±£»£»£»£»¤¼°ÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ClopͬÆÚÐû²¼Á˶à¼ÒÐÂÊܺ¦ÆóÒµ£¬£¬£¬£¬£¬º¸ÇÆû³µ¡¢Èí¼þ¡¢¿Æ¼¼ÐÐÒµ£¬£¬£¬£¬£¬ÂÞ¼¼¡¢¹þ·ð´óѧµÈ»ú¹¹´ËǰÒà֤ʵ±£´æÏà¹ØÎó²î¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cox-enterprises-discloses-oracle-e-business-suite-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ