Fortra GoAnywhere MFT¸ßΣÎó²îÔâ»îԾʹÓÃ
Ðû²¼Ê±¼ä 2025-09-291. Fortra GoAnywhere MFT¸ßΣÎó²îÔâ»îԾʹÓÃ
9ÔÂ26ÈÕ£¬ºÚ¿ÍÕýÆð¾¢Ê¹ÓÃFortra GoAnywhereÖÎÀíÎļþ´«ÊäÈí¼þÖеÄ×î¸ßÑÏÖØÐÔÎó²îCVE-2025-10035Ìᳫ¹¥»÷¡£¸ÃÎó²îÔ´ÓÚÔÊÐíÖ¤ServletµÄ·´ÐòÁл¯È±ÏÝ£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýαÔìÔÊÐíÖ¤ÏìÓ¦ÊðÃûÔ¶³Ì×¢ÈëÏÂÁʵÏÖÔ¤ÊÚȨԶ³Ì´úÂëÖ´ÐС£FortraÓÚ9ÔÂ18ÈÕÕýʽÅû¶¸ÃÎó²î£¬µ«ÏÖʵÔçÔÚ9ÔÂ10ÈÕ±ãÒѱ£´æÒ°ÍâʹÓÃÖ¤¾Ý¡£WatchTowr LabsÇå¾²Ñо¿Ö°Ô±Ö¤Êµ£¬¹¥»÷Õß×Ô9ÔÂ10ÈÕÆðÒÑʹÓôËÁãÈÕÎó²î£¬±È¹Ù·½Í¨¸æÌáǰ8Ìì¡£Îó²îʹÓÃÀú³ÌÖУ¬¹¥»÷Õ߻ὨÉèÃûΪ"admin-go"µÄºóÃÅÖÎÀíÔ±ÕË»§£¬²¢ÉÏ´«"zato_be.exe"ºÍ"jwunst.exe"£¨Õýµ±Ô¶³Ì»á¼û¹¤¾ßSimpleHelpµÄ¶ñÒâÀÄÓð汾£©µÈÓÐÓÃÔØºÉ£¬ÍøÂçÓû§È¨ÏÞÐÅÏ¢²¢ÉúÑÄÖÁtest.txtÎļþ£¬ÎªºáÏòÒÆ¶¯×ö×¼±¸¡£Fortra½¨ÒéϵͳÖÎÀíÔ±Á¬Ã¦Éý¼¶ÖÁÐÞ¸´°æ±¾7.8.4»ò7.6.3£¬²¢½ÓÄÉ»º½â²½·¥£ºÏû³ýGoAnywhereÖÎÀí¿ØÖÆÌ¨µÄ¹«¹²»¥ÁªÍøÌ»Â¶£¬¼ì²éÈÕÖ¾ÖÐ"SignedObject.getObject"¹ýʧÒÔÈ·ÈÏÊÇ·ñÊÜÓ°Ïì¡£
https://www.bleepingcomputer.com/news/security/maximum-severity-goanywhere-mft-flaw-exploited-as-zero-day/
2. ÂíÀïÀ¼Öݽ»Í¨²¿MDOTÔâRhysidaÀÕË÷Èí¼þ¹¥»÷
9ÔÂ25ÈÕ£¬ÃÀ¹úÂíÀïÀ¼Öݽ»Í¨²¿£¨MDOT£©ÔâÓöÓë¶íÂÞ˹ÓйصÄRhysidaÀÕË÷Èí¼þÍŻ﹥»÷£¬¸Ã×é֯ͨ¹ý°µÍø²©¿ÍÐû²¼±»µÁÊý¾Ý½ØÍ¼£¬°üÀ¨»¤ÕÕ¡¢Éí·ÝÖ¤¼þ¡¢Åä¾°ÊӲ졢Éç»á°ü¹Ü¿¨¼°·¸·¨Åä¾°ÐÅÏ¢£¬²¢Ë÷Òª30±ÈÌØ±Ò£¨Ô¼330ÍòÃÀÔª£©Êê½ð¡£MDOT×÷ΪÂíÀïÀ¼Öݽ»Í¨½¹µãÖÎÀí»ú¹¹£¬î¿ÏµÖݽ»Í¨ÖÎÀí¾Ö£¨MTA£©¡¢¸ÛÎñ¾Ö¡¢º½¿ÕÖÎÀí¾ÖµÈÁù´ó²¿·Ö£¬ÆäÔËÓªµÄ»ªÊ¢¶Ù-°Í¶ûµÄĦ½»Í¨ÏµÍ³Äê¿ÍÁ÷Á¿³¬6700ÍòÈ˴Ρ£Æ¾Ö¤MDOT¹Ù·½Í¨Öª£¬¹¥»÷½öÓ°ÏìMTA²¿·Öϵͳ£¬½¹µã·þÎñÈÔÕý³£ÔËÐУ¬µ«²¿·Ö¹«½»³µÊµÊ±Êý¾ÝÖÐÖ¹¡£ÊÓ²ìÈ·Èϱ£´æÊý¾Ýɥʧ£¬ÏêÏ¸Éæ¼°Ô±¹¤¼°ÂÿÍÃô¸ÐÐÅÏ¢£¬¿ÉÄÜÒý·¢Éí·Ý͵ÇÔºÍÉç»á°ü¹ÜÚ²ÆÎ£º¦¡£Ñо¿ÍŶӯÊÎöÏÔʾ£¬±»µÁÊý¾Ý»¹°üÀ¨ÄÚ²¿²ÆÎñ±¨¸æºÍÔ¤ËãÎļþ£¬µ«ÒòMDOTÔ¤Ëã͸Ã÷¶È½Ï¸ß£¬´ËÀàÎļþ˽ÈËÐÅϢΣº¦½ÏµÍ¡£RhysidaÍÅ»ï×Ô2023ÄêÍ·×îÏÈ»îÔ¾£¬Òѹ¥»÷³¬220¸ö×éÖ¯£¬±»ËÝÔ´ÖÁ¶íÂÞ˹»ò¶ÀÁªÌå¹ú¼Ò£¬ÓëVice SocietyÀÕË÷Èí¼þÍŻﱣ´æÊÖÒÕ¹ØÁª¼°ÊÕÒæ·Ö³É¡£ÏÖÔÚ£¬MDOTÕýÍŽáÖ´·¨»ú¹¹¼°µÚÈý·½ÍøÂçÇ徲ר¼ÒÊÓ²ìÊÂÎñ£¬µ«ÉÐδÃ÷È·Êý¾Ýй¶ȫò¡£
https://cybernews.com/security/hackers-claim-maryland-transportation-rhysida/
3. µÂÖÝ¿¨³µË¾»úÊý¾Ýй¶£º³¬ÍòÃû˾»úÃô¸ÐÐÅÏ¢Ôâ̻¶
9ÔÂ25ÈÕ£¬µÂ¿ËÈøË¹ÖÝAJT Compliance, LLC¹«Ë¾ÔËÓªµÄ¼ÝʻԱºÏ¹æÆ½Ì¨¡°DOT SHIELD¡±±¬·¢´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬Ì»Â¶Áè¼ÝÒ»ÍòÃû¿¨³µË¾»úµÄСÎÒ˽¼ÒÎļþ£¬Éæ¼°Ò©Îï²âÊÔ¡¢¹ÍÓ¶ÌõÔ¼¡¢Åä¾°ÊÓ²ìµÈ¸ß¶ÈÃô¸ÐÐÅÏ¢¡£¾CybernewsÑо¿ÍŶÓÊӲ죬й¶ȪԴÔÚÓڸù«Ë¾Ê¹ÓõÄAmazon S3´æ´¢Í°±»¹ýʧÉèÖÃΪ¹«¹²¶ÁÈ¡ºÍÁбíȨÏÞ£¬µ¼ÖÂÁè¼Ý18,000ÕÅÉç»á°ü¹Ü¿¨ÕÕÆ¬¡¢23,000ÕżÝÕÕͼÏñ¡¢ÔðÈΰü¹Ü¿¨¡¢³µÁ¾Ä¥Á·Ð§¹ûµÈÎļþÍâй¡£ÕâЩÊý¾Ý×Ô2022ÄêÆðÒ»Á¬ÉÏ´«£¬²¿·ÖÃô¸ÐÎļþÔÚÊÓ²ìʱ´úÈÔ±»×Ô¶¯ÉÏ´«¡£ÊÜÓ°Ïì˾»úÖ÷ÒªÀ´×Ե¿ËÈøË¹ÖÝ»òÊܹÍÓÚ¸ÃÖÝ×¢²áµÄÎïÁ÷¹«Ë¾¡£×÷ΪÃÀ¹úÎïÁ÷ÖØÕò£¬µÂÖÝÓµÓг¬21.2ÍòÃûÖØÐÍ¿¨³µË¾»ú¼°7.272ÍòÃûÇáÐÍ¿¨³µË¾»ú£¬´Ë´Îй¶¿ÉÄÜÓ°Ïì¸ÃÖÝÔ¼10%µÄ¿¨³µË¾»ú¡£Ð¹Â¶µÄÃô¸ÐÐÅÏ¢ÈôÂäÈë²»·¨·Ö×ÓÊÖÖУ¬¿ÉÄܱ»ÓÃÓÚ¿ªÉèÐÅÓÃÕË»§¡¢ÍµÈ¡Éç±£¸£Àû»òʵÑéÈËÈâËÑË÷µÈÚ²ÆÐÐΪ£¬¶ÔÊܺ¦ÕßÔì³ÉÑÏÖØÉí·Ý͵ÇÔΣº¦¡£AJT ComplianceÔÚÊÕµ½ÄäÃû¾Ù±¨ºóÈ·Èϴ洢ͰÉèÖùýʧ£¬²¢ÒÑͨ¹ýÈÏÕæÈÎÅû¶ÐÞ¸´Îó²î£¬È·±£Êý¾ÝÇå¾²¡£
https://cybernews.com/security/texas-truck-drivers-data-leak/
4. SonicWall SSL VPN×°±¸ÔâAkiraÀÕË÷Èí¼þÒ»Á¬¹¥»÷
9ÔÂ28ÈÕ£¬Õë¶ÔSonicWall SSL VPN×°±¸µÄAkiraÀÕË÷Èí¼þ¹¥»÷Ò»Á¬Éý¼¶£¬Ö»¹ÜÕË»§ÒÑÆôÓÃOTP¶àÒòËØÈÏÖ¤£¨MFA£©£¬µ«ÍþвÐÐΪÕßÈÔÄÜÀֳɵǼ¡£Ñо¿Ö°Ô±ÍƲ⣬Õâ¿ÉÄÜÔ´ÓÚ¹¥»÷ÕßÇÔÈ¡ÁËOTPÖÖ×Ó»òʹÓÃÁË2024Äê9ÔÂÅû¶µÄCVE-2024-40766²»µ±»á¼û¿ØÖÆÎó²î¡£¸ÃÎó²îËäÔÚ2024Äê8ÔÂÒÑÐÞ¸´£¬µ«¹¥»÷ÕßÈÔͨ¹ý´Ëǰ´ÓÒ×Êܹ¥»÷×°±¸ÖÐÇÔÈ¡µÄƾ֤һÁ¬ÈëÇÖ¡£ÍøÂçÇå¾²¹«Ë¾Arctic Wolf±¨¸æÖ¸³ö£¬¹¥»÷ÕßÔÚÆôÓÃOTP MFAµÄÇéÐÎÏÂÈÔÄܵǼÕË»§£¬µÇ¼ʵÑéʱ¶à´Î´¥·¢OTPÖÊѯºóÀֳɣ¬ÌåÏÖOTPÖÖ×Ó¿ÉÄܱ»µÁ»ò±£´æÆäËûÌìÉúÓÐÓÃÁîÅÆµÄÒªÁì¡£SonicWallÒѽ«´ËÀ๥»÷ÓëCVE-2024-40766¹ØÁª£¬²¢±Þ²ßÖÎÀíÔ±ÖØÖÃËùÓÐSSL VPNƾ֤²¢Éý¼¶ÖÁ×îÐÂSonicOS¹Ì¼þ¡£
https://www.bleepingcomputer.com/news/security/akira-ransomware-breaching-mfa-protected-sonicwall-vpn-accounts/
5. MedusaÀÕË÷Èí¼þ¹¥»÷¿µ¿¨Ë¹ÌØ£¬834GBÊý¾ÝÔâÇÔ
9ÔÂ29ÈÕ£¬MedusaÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÈ«ÇòýÌåÊÖÒÕ¾ÞÍ·¿µ¿¨Ë¹Ìع«Ë¾Ìá³«ÍøÂç¹¥»÷£¬²¢ÒªÇóÖ§¸¶120ÍòÃÀÔªÊê½ðÒÔ×èÖ¹ÇÔÈ¡µÄ834.4GBÊý¾Ýй¶»ò³öÊÛ¡£¸Ã×éÖ¯ÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû²¼Ô¼20ÕÅÄÚ²¿Îļþ½ØÍ¼¼°°üÀ¨167,121ÏîÎļþµÄÇåµ¥£¬Éæ¼°¾«Ë㱨¸æ¡¢²úÆ·ÖÎÀíÊý¾Ý¡¢°ü¹Ü½¨Ä£¾ç±¾¡¢ÀíÅâÆÊÎöÊý¾Ý¼°SQL¾ç±¾µÈÃô¸ÐÐÅÏ¢£¬Â·¾¶Ê¾Àý°üÀ¨Esur_rerating_verification.xlsx¡¢Claim Data Specifications.xlsmµÈÎļþ£¬ÌåÏÖÒÑ»ñÈ¡°ü¹ÜÅÌËã¡¢¿Í»§Êý¾Ý´¦Öóͷ£¼°Ë÷ÅâÖÎÀíϵͳȨÏÞ¡£¿µ¿¨Ë¹ÌØ×÷ΪӵÓÐNBCUniversalµÄÆóÒµ£¬ÆìϺ¸ÇNBC¡¢Telemundo¡¢¾ÙÊÀÓ°Òµ¡¢Á÷ýÌåÆ½Ì¨Peacock¼°Å·ÖÞSkyÓªÒµ¡£Ö»¹Ü¸Ã¹«Ë¾Î´Òò´ó¹æÄ£Íø¹¥³ÉΪ½¹µã£¬µ«2015ÄêÔøÓг¬20ÍòÓû§Æ¾Ö¤ÔÚ°µÍøÐ¹Â¶£¬Æäʱ¿µ¿¨Ë¹ÌسÆÊý¾Ý¿ÉÄÜÔ´ÓÚÆ¾Ö¤¾ÛºÏ¶ø·Çϵͳֱ½ÓÈëÇÖ¡£MedusaÒÔÐû²¼²¿·ÖÎļþÖ¤¾ÝʩѹÊܺ¦ÕßÖøÃû¡£´Ë´Î¹¥»÷ÖУ¬ÎļþÐÔ×ÓÖ¸Ïò²ÆÎñÓ뾫ËãÊý¾Ý¼¯£¬ÈôÊôʵ£¬¿µ¿¨Ë¹ÌØ»òÃæÁÙî¿ÏµÉó²éΣº¦¡£
https://hackread.com/medusa-ransomware-comcast-data-breach/
6. Notepad++ v8.8.3±»Åû¶±£´æ¸ßΣDLLÐ®ÖÆÎó²î
9ÔÂ29ÈÕ£¬Notepad++ v8.8.3°æ±¾±»Åû¶±£´æ¸ßΣDLLÐ®ÖÆÎó²î£¨CVE-2025-56383£©£¬CVSSÆÀ·Ö´ï6.5·Ö¡£¸ÃÎó²îÔ´ÓÚNotepad++ÔÚÆô¶¯Ê±×Ô¶¯¼ÓÔØÌØ¶¨DLLÎļþµÄ»úÖÆÈ±ÏÝ£¬¹¥»÷Õß¿ÉʹÓôËÌØÕ÷Ìæ»»ÊÜÐÅÍеÄDLLÎļþ£¨ÈçNppExport.dll£©£¬×¢Èë¶ñÒâ´úÂëʵÏÖí§Òâ´úÂëÖ´ÐС£ÊÖÒÕÆÊÎöÏÔʾ£¬¹¥»÷ÕßÖ»Ð轫¶ñÒâDLLÎļþ°²ÅÅÓÚNotepad++×°ÖÃĿ¼µÄplugins\NppExport\·¾¶Ï£¬²¢È·±£Æäµ¼³öº¯Êýת·¢ÖÁÔʼDLLÎļþ¡£µ±Óû§Æô¶¯Notepad++ʱ£¬³ÌÐò»áÓÅÏȼÓÔØ¸Ã¶ñÒâDLL£¬ÔÚת·¢Õýµ±¹¦Ð§Å²ÓõÄͬʱִÐжñÒâ´úÂ룬Ðγɡ°¹¦Ð§ÍêÕû+Çå¾²ÆÆË𡱵ÄË«ÖØÉøÍ¸¡£GitHubÒѹûÕæ¿´·¨ÑéÖ¤£¨PoC£©£¬°üÀ¨ÍêÕûµÄ¹¥»÷Á´ÑÝʾ£¬ÑéÖ¤ÁËÎó²îÔÚÍâµØÇéÐÎϵĿÉʹÓÃÐÔ¡£¸ÃÎó²îµÄ¹¥»÷Ó°Ïì¹æÄ£ÆÕ±é£¬ÐèÍâµØ»á¼ûȨÏÞ»ò×°Ö÷¾¶Ð´ÈëÄÜÁ¦£¬µ«Ò»µ©ÀÖ³ÉʹÓ㬿ÉʵÏÖ³¤ÆÚ»¯×¤ÁôÓëȨÏÞÌáÉý£¬ÏÔÖøÔöÌí¹©Ó¦Á´¹¥»÷¡¢Ä¾Âí»¯×°ÖóÌÐò¼°ÄÚ²¿ÍþвΣº¦¡£½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁÐÞ¸´°æ±¾£¬²¢°´ÆÚ¼ì²é×°ÖÃĿ¼ÎļþÍêÕûÐÔ¡£
https://securityonline.info/dll-hijacking-flaw-cve-2025-56383-found-in-notepad-allowing-arbitrary-code-execution-poc-available/


¾©¹«Íø°²±¸11010802024551ºÅ