AcronisÆÊÎö¶à½×¶Î¶ñÒâÈí¼þÈö²¥Á´

Ðû²¼Ê±¼ä 2025-04-02

1. AcronisÆÊÎö¶à½×¶Î¶ñÒâÈí¼þÈö²¥Á´


4ÔÂ1ÈÕ£¬AcronisÍþвÑо¿²¿·Ö(TRU)½üÆÚÆÊÎöÁËÒ»ÆðÖØ´óµÄ¶à½×¶Î¶ñÒâÈí¼þÈö²¥Á´£¬Õ¹ÏÖÁ˹¥»÷ÕßÔõÑùʹÓûìÏýÊÖÒպͶà¾ç±¾ÓïÑÔÈÆ¹ýÇå¾²·ÀÓù¡£¹¥»÷ʼÓÚαװ³É"ÕË»§¿ÛѺ´«Æ±"µÄÎ÷°àÑÀÓï´¹ÂÚÓʼþ£¬¸½¼þΪRARѹËõ°ü£¬ÄÚº¬¸ß¶È»ìÏýµÄVisual Basic¾ç±¾(VBS)¡£Ö´Ðкó£¬VBSÌìÉúÅú´¦Öóͷ£Îļþ(BAT)£¬ºóÕß¹¹½¨²¢Ö´ÐÐBase64±àÂëµÄPowerShell¾ç±¾¡£¸Ã¾ç±¾½âÂëÓÐÓÃÔØºÉ¡ª¡ª½ÓÄÉRunPEÊÖÒÕ¼ÓÔØµÄ.NET¿ÉÖ´ÐÐÎļþ£¬Æä×ÊÔ´ÖаüÀ¨Ë«ÖؼÓÃÜÊý¾Ý¿é£¬Ðèͨ¹ýÌØ¶¨ÃÜÔ¿½âÃÜ¡£×îÖÕÔØºÉΪDCRat»òRhadamanthysµÈÐÅÏ¢ÇÔÈ¡³ÌÐò£¬¿ÉÖÂÊý¾Ýй¶ºÍϵͳÈëÇÖ¡£ÆÊÎö·¢Ã÷£¬¹¥»÷Á´µÄ¶à²ã»ìÏýÏÔÖøÔöÌíÁ˼ì²âÄѶÈ£¬µ«ÒàÒýÈë¸ü¶à¹ÊÕϵ㣬Ϊ·ÀÓùÌṩÁËÍ»ÆÆ¿Ú¡£AcronisÖ¸³ö£¬¶à²ãÇå¾²¼Æ»®ÖÁ¹ØÖ÷Òª£º³õʼ½×¶ÎÐè×èµ²¶ñÒâÓʼþ¼°¸½¼þ£¬¸ß¼¶Æô·¢Ê½ÆÊÎö¿Éʶ±ð¿ÉÒɾ籾ÐÐΪ£¬¶øÄÚ´æ± £»¤ÊÖÒÕÄÜ×è¶Ï±àÂëÔØºÉÖ´ÐС£ÖµµÃÒ»ÌáµÄÊÇ£¬¹¥»÷ÕßÔÚPowerShell¾ç±¾ÖÐÖ²ÈëÄá²ÉÕÜѧÓï¼£¬ÊÔͼ»ìÏýÊÓÏߣ¬Í¹Õ¹ÏÖ´ú¶ñÒâÈí¼þµÄ´´ÒâÓëÖØ´óÐÔ¡£


https://www.bleepingcomputer.com/news/security/we-smell-a-dcrat-revealing-a-sophisticated-malware-delivery-chain/


2. ÎÞÎļþ¼ÓÃÜÍÚ¿ó¹¥»÷µ¼ÖÂ1500Óą̀PostgreSQL·þÎñÆ÷Ôâ¹¥»÷


4ÔÂ1ÈÕ£¬½üÆÚ£¬Õë¶Ô̻¶µÄPostgreSQLÊý¾Ý¿âµÄ¹¥»÷Ô˶¯Òý·¢Çå¾²½ç¹Ø×¢¡£ÔÆÇå¾²¹«Ë¾WizÅû¶£¬¸Ã¹¥»÷Ô˶¯ÓëAqua SecurityÓÚ2024Äê8Ô±ê¼ÇµÄÈëÇÖ¼¯±£´æ¹ØÁª£¬¹¥»÷Õß±»×·×ÙΪJINX-0126£¬ÆäʹÓÃÃûΪPG_MEMµÄ¶ñÒâÈí¼þʵÑé¹¥»÷¡£Ñо¿Ö°Ô±Ö¸³ö£¬¹¥»÷ÕßÒ»Á¬½ø»¯¹¥»÷ÊÖ·¨£¬Í¨¹ýΪÿ¸öÄ¿µÄ°²ÅžßÓÐΨһ¹þÏ£ÖµµÄ¶þ½øÖÆÎļþ²¢½ÓÄÉÎÞÎļþÊÖÒÕÖ´ÐÐÍÚ¿ó¸ºÔØ£¬ÓÐÓùæ±ÜÁËÒÀÀµÎļþ¹þÏ£¼ì²âµÄÔÆÇå¾²½â¾ö¼Æ»®¡£¾ÝWizÆÀ¹À£¬¸ÃÔ˶¯Òѵ¼ÖÂÁè¼Ý1,500ÃûÊܺ¦Õߣ¬Í¹ÏÔÁËÈõÃÜÂë»òĬÈÏÉèÖõÄPostgreSQLʵÀý×÷Ϊ¹¥»÷Ä¿µÄµÄÆÕ±éÐÔ¡£¹¥»÷ÕßʹÓÃÈõÉèÖõÄPostgreSQL·þÎñ¾ÙÐÐÆðÔ´ÉøÍ¸£¬Í¶·ÅBase64±àÂëµÄshell¾ç±¾£¬¸Ã¾ç±¾²»µ«É¨³ý¾ºÕù¿ó¹¤£¬»¹°²ÅÅÃûΪPG_COREµÄ¶þ½øÖÆÎļþ¡£½øÒ»²½£¬·þÎñÆ÷ÏÂÔØÎ±×°³ÉÕýµ±PostgreSQLÀú³ÌµÄGolang¶þ½øÖÆÎļþ£¬Æäͨ¹ý½¨Éè¸ßȨÏÞÓû§¡¢ÉèÖÃcron³¤ÆÚ»¯Ê¹Ãü£¬ÖÕ´ÓGitHubÏÂÔØ×îаæXMRigÍÚ¿ó³ÌÐò£¬Ê¹ÓÃLinuxÎÞÎļþÊÖÒÕÆô¶¯ÍÚ¿óÀú³Ì¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¹¥»÷ÕßΪÿ¸öÊܺ¦Õß·ÖÅÉ×ÔÁ¦Ç®°üµØµã£¬WizÒÑʶ±ðÈý¸ö¹ØÁªÇ®°ü£¬Ã¿¸öÇ®°ü¹ØÁªÔ¼550¸öÍÚ¿ó½Úµã£¬×ܼÆÁè¼Ý1,500̨װ±¸±»Ñ¬È¾¡£


https://thehackernews.com/2025/04/over-1500-postgresql-servers.html


3. Palo Alto Global ProtectɨÃèÀ˳±ÖÐÉæ¼°½ü24,000¸öIP


4ÔÂ1ÈÕ£¬Õë¶ÔPalo Alto Networks GlobalProtectµÇ¼ÃÅ»§µÄÍøÂçɨÃèÔ˶¯½üÆÚÏÔÖøÉý¼¶£¬Òý·¢Çå¾²Ñо¿Ö°Ô±¶ÔDZÔÚ¹¥»÷µÄÔ¤¾¯¡£ÍþвÇ鱨¹«Ë¾GreyNoise¼à²âÊý¾ÝÏÔʾ£¬¸ÃɨÃèÔ˶¯Éæ¼°Áè¼Ý24,000¸öΨһԴIPµØµã£¬ÓÚ2025Äê3ÔÂ17ÈÕµÖ´ïÖðÈÕ20,000¸öΨһIPµÄ·åÖµ£¬²¢Ò»Á¬ÖÁ3ÔÂ26ÈÕ¡£IPµØµãÖУ¬23,800¸ö±»±ê¼ÇΪ"¿ÉÒÉ"£¬154¸ö±»È·ÒÔΪ"¶ñÒâ"£¬Í¹ÏÔÔ˶¯Òì³£ÐÔ¡£É¨ÃèȪԴÖ÷Òª¼¯ÖÐÔÚ±±ÃÀ£¬Ä¿µÄϵͳËäÒÔÃÀ¹úΪÖ÷£¬µ«·ºÆðÈ«Çò»¯ÌØÕ÷¡£GreyNoiseÖ¸³ö£¬´ËÀàɨÃ輤Ôö³£ÓëÎó²îʹÓÃǰµÄÕì̽Ðж¯Ïà¹Ø£¬ÀúʷģʽÏÔʾ£¬É¨Ãèá¯Áëºó2-4ÖÜ¿ÉÄÜ·ºÆðÐÂÎó²îÅû¶»ò¹¥»÷ÊÂÎñ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬´Ë´ÎÔ˶¯ÓëÁíÒ»ÏîÉæ¼°PAN-OSÅÀ³æµÄɨÃè±£´æÊ±¼ä¹ØÁªÐÔ£¬ºóÕßÔÚ3ÔÂ26ÈÕͬ²½µÖ´ï2,580¸öIPµÄɨÃè·åÖµ¡£Ä¿½ñ£¬¹¥»÷ÕßµÄÏêϸĿµÄºÍÄîÍ·Éв»Ã÷È·£¬µ«Õë¶Ô̻¶ÔÚ»¥ÁªÍøµÄPalo Alto Networksϵͳ£¬ÖÎÀíÔ±ÐèÌá¸ßСÐÄ¡£GreyNoise½¨ÒéÁ¬Ã¦Éó²é3ÔÂÖÐÑ®ÒÔÀ´µÄϵͳÈÕÖ¾£¬ÅŲéÈëÇÖ¼£Ïó£¬Ç¿»¯µÇ¼ÃÅ»§Çå¾²·À»¤£¬²¢·â±ÕÒÑÖª¶ñÒâIP¡£


https://www.bleepingcomputer.com/news/security/nearly-24-000-ips-behind-wave-of-palo-alto-global-protect-scans/


4. CrushFTP CVE-2025-2825Îó²îÕýÔÚ±»Ê¹ÓþÙÐй¥»÷


4ÔÂ1ÈÕ£¬½üÆÚ£¬¹¥»÷ÕßÕýÆð¾¢Ê¹ÓùûÕæµÄ¿´·¨ÑéÖ¤´úÂ루PoC£©¶ÔCrushFTPÎļþ´«ÊäÈí¼þÖеÄÒ»¸ö¸ßΣÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2025-2825£©ÊµÑé¹¥»÷¡£¸ÃÎó²îÓÉOutpost24±¨¸æ£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÎÞÐèÈÏÖ¤¼´¿É»á¼ûδÐÞ²¹µÄCrushFTP v10»òv11×°±¸¡£CrushFTPÔÚ3ÔÂ21ÈÕ½ôÆÈÐû²¼²¹¶¡Ê±Ç¿µ÷£¬Ì»Â¶µÄHTTP(S)¶Ë¿Ú¿ÉÄÜÖ±½Óµ¼ÖÂδÊÚȨ»á¼û£¬²¢½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁ10.8.4»ò11.3.1ÒÔÉϰ汾¡£×÷ΪÔÝʱ·À»¤²½·¥£¬ÖÎÀíÔ±¿ÉÆôÓÃDMZÍâÎ§ÍøÂçÑ¡ÏîÔöÇ¿·À»¤¡£Ò»Öܺó£¬Shadowserver¼à²âÊý¾ÝÏÔʾ£¬ÆäÃÛ¹ÞϵͳÒѼì²âµ½ÊýÊ®´ÎÕë¶Ô̻¶ÔÚ»¥ÁªÍøµÄCrushFTP·þÎñÆ÷µÄ¹¥»÷ʵÑ飬ÆäʱÈÔÓÐÁè¼Ý1,500¸öδÐÞ²¹ÊµÀý´¦ÓÚΣº¦ÖС£´Ë´ÎÎó²îµÄ¹ûÕæPoCÓÉProjectDiscoveryÓÚÎó²îÅû¶ǰÊýÈÕÐû²¼£¬¼ÓËÙÁ˹¥»÷ÕßµÄʹÓÃÀú³Ì¡£ÖµµÃ×¢ÖØµÄÊÇ£¬CrushFTPºã¾ÃλÁÐÀÕË÷Èí¼þÍŻÈçClop£©µÄ¸ß¼ÛֵĿµÄÃûµ¥£¬´ËÇ°ÔøÔâÓö¶à´ÎÁãÈÕÎó²î¹¥»÷£¬°üÀ¨2024Äê4ÔÂÐÞ²¹µÄCVE-2024-4040Îó²î£¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÌÓÒÝÐéÄâÎļþϵͳ²¢ÇÔȡϵͳÎļþ¡£


https://www.bleepingcomputer.com/news/security/critical-auth-bypass-bug-in-crushftp-now-exploited-in-attacks/


5. VitenasÕûÐÎÍâ¿Æ»¼ÕßÊý¾ÝÔâºÚ¿ÍÈëÇÖ²¢Ð¹Â¶


4ÔÂ1ÈÕ£¬ÃÀ¹úÐÝ˹¶Ù×ÅÃûÕûÐÎÍâ¿Æ»ú¹¹VitenasÕûÐÎÍâ¿ÆÔâÓöÖØ´óÍøÂç¹¥»÷£¬µ¼Ö´ó×ÚÃô¸Ð»¼ÕßÊý¾Ýй¶¡£¸Ã»ú¹¹ÓÉÍâ¿ÆÒ½Ê¦Ñ§»áԺʿPaul Vitenas, Jr.½¨É裬ÆìϰüÀ¨Mirror Mirror Beauty Boutique¼°µÂ¿ËÈøË¹ÖÝÐÝ˹¶ÙÍâ¿ÆÖÐÐÄ¡£3ÔÂ5ÈÕ£¬Íþв×éÖ¯KairosÔÚÆä°µÍøÐ¹ÃÜÕ¾µã¹ûÕæÐû³ÆÒÑÈëÇÖVitenas²©Ê¿¹ÙÍø£¬²¢Õ¹Ê¾Î´¾­±à¼­µÄ1.34GBй¶Îļþ¡£Ð¹Â¶Êý¾Ý°üÀ¨Î´¼ÓÃܵÄÊܱ £»¤¿µ½¡ÐÅÏ¢£¨PHI£©£¬Éæ¼°»¼ÕßÂãÕÕ¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÁªÏµ·½·¨¡¢Éç±£ºÅ¡¢¼ÝÕÕÕÕÆ¬µÈÃô¸ÐÐÅÏ¢£¬Í¬Ê±°üÀ¨Ô±¹¤ÐÅÏ¢¼°ÕïËùÔËÓªÎļþ¡£¹¥»÷Õßͨ¹ý¶íÓïÂÛ̳¶µÊÛÊý¾Ý£¬ÊÔͼѰÕÒÂò¼Ò¡£Kairos×éÖ¯Éù³ÆÍ¨¹ý±©Á¦¹¥»÷ÓÚ2ÔÂÀÖ³ÉÈëÇÖϵͳ£¬ÇÒÕïËùIT²¿·ÖÒѲì¾õ¹¥»÷µ«Î´ÄÜ×èÖ¹Êý¾Ýй¶¡£¹¥»÷ÕßÌåÏÖÒÑÓëVitenas²©Ê¿¾ÙÐÐÔ¼Ò»¸öÔµÄ̸ÅУ¬ÍþвÈôÎÞ·¨¾¡¿ìÕÒµ½Êý¾ÝÂò¼Ò£¬½«¹ûÕæ×îÃô¸ÐÐÅÏ¢¡£


https://databreaches.net/2025/04/01/vitenas-cosmetic-surgery-patient-data-hacked-and-leaked/


6. Å·ÖÞ·þÎñƽ̨Yoojoй¶ÍòÍòÃô¸ÐÎļþ


4ÔÂ1ÈÕ£¬Å·ÖÞ·þÎñÊг¡Æ½Ì¨YoojoÒòÔÆ´æ´¢Í°ÉèÖùýʧ£¬µ¼Ö³¬1450Íò·ÝÃô¸ÐÎļþ̻¶£¬º­¸ÇÓû§»¤ÕÕ¡¢Í¨Ñ¶¼Í¼¡¢µç»°ºÅÂëµÈ½¹µãÒþ˽Êý¾Ý¡£×÷ΪÅþÁ¬Ð¡ÎÒ˽¼ÒÓë·þÎñÌṩÉ̵ÄÊ¢ÐÐÆ½Ì¨£¬Yoojo£¨Ç°ÉíΪYoupijobs£©ÔÚÓ¢·¨Î÷ºÉµÈ¶à¹úÔËÓª£¬ÆäÓ¦ÓÃÏÂÔØÁ¿³¬50Íò´Î£¬·þÎñ¹æÄ£ÁýÕÖ¼ÒÕþ¡¢³èÎï¿´»¤µÈ¶àÁìÓò¡£´Ë´Îй¶µÄ´æ´¢Í°ÖÁÉÙ¹ûÕæ»á¼û´ï10Ì죬ËäÈ»ÔÝÎÞÀÄÓü£Ï󣬵«Ñо¿Ö°Ô±ÖÒÑÔDZÔÚΣº¦ÏÔÖø£º¹¥»÷Õß¿ÉʹÓÃй¶µÄÉí·ÝÖ¤¼þʵÑéÉí·Ý͵ÇÔ£¬Í¨¹ýÕæÊµµç»°ºÅÂë¹¹½¨Ðéα·þÎñÊշѳ¡¾°£¬ÉõÖÁÌᳫ¾«×¼ÍøÂç´¹ÂÚ¹¥»÷¡£Ð¡ÎÒ˽¼ÒÐÅϢ̻¶»¹ÏÔÖøÔöÌíÓû§±»¸ú×ÙÀÕË÷µÄΣº¦¡£ÔÚÍøÂçÇå¾²ÍŶÓת´ïºó£¬YoojoÒÑÐÞ¸´ÉèÖÃÎó²î²¢Íê³ÉÊý¾Ý± £»¤¡£Îª×èÖ¹ÀàËÆÊÂÎñ£¬×¨¼Ò½¨Òé½ÓÄɶàÖØÇå¾²²½·¥£¬°üÀ¨Ç¿»¯»á¼û¿ØÖÆ¡¢ÆôÓüÓÃÜ´«ÊäÓë´æ´¢¡¢°²ÅÅÃÜÔ¿ÖÎÀí·þÎñ¡¢ÊµÑéSSL/TLSЭÒ飬²¢ÔöÇ¿Çå¾²Éó¼ÆÓëÔ±¹¤Åàѵ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬´Ë´ÎÐ¹Â¶Éæ¼°´ó×ÚÕþ¸®Ç©·¢Ö¤¼þ¼°Óû§Í¨Ñ¶ÄÚÈÝ£¬ÆäÃô¸ÐˮƽԶ³¬Í¨Ë×Êý¾Ýй¶ÊÂÎñ¡£


https://cybernews.com/security/yoojo-data-leak-exposed-passports/