AcronisÆÊÎö¶à½×¶Î¶ñÒâÈí¼þÈö²¥Á´

Ðû²¼Ê±¼ä 2025-04-02

1. AcronisÆÊÎö¶à½×¶Î¶ñÒâÈí¼þÈö²¥Á´


4ÔÂ1ÈÕ£¬£¬ £¬AcronisÍþвÑо¿²¿·Ö(TRU)½üÆÚÆÊÎöÁËÒ»ÆðÖØ´óµÄ¶à½×¶Î¶ñÒâÈí¼þÈö²¥Á´£¬£¬ £¬Õ¹ÏÖÁ˹¥»÷ÕßÔõÑùʹÓûìÏýÊÖÒպͶà¾ç±¾ÓïÑÔÈÆ¹ýÇå¾²·ÀÓù¡£¡£¡£¡£¡£¹¥»÷ʼÓÚαװ³É"ÕË»§¿ÛѺ´«Æ±"µÄÎ÷°àÑÀÓï´¹ÂÚÓʼþ£¬£¬ £¬¸½¼þΪRARѹËõ°ü£¬£¬ £¬ÄÚº¬¸ß¶È»ìÏýµÄVisual Basic¾ç±¾(VBS)¡£¡£¡£¡£¡£Ö´Ðк󣬣¬ £¬VBSÌìÉúÅú´¦Öóͷ£Îļþ(BAT)£¬£¬ £¬ºóÕß¹¹½¨²¢Ö´ÐÐBase64±àÂëµÄPowerShell¾ç±¾¡£¡£¡£¡£¡£¸Ã¾ç±¾½âÂëÓÐÓÃÔØºÉ¡ª¡ª½ÓÄÉRunPEÊÖÒÕ¼ÓÔØµÄ.NET¿ÉÖ´ÐÐÎļþ£¬£¬ £¬Æä×ÊÔ´ÖаüÀ¨Ë«ÖؼÓÃÜÊý¾Ý¿é£¬£¬ £¬Ðèͨ¹ýÌØ¶¨ÃÜÔ¿½âÃÜ¡£¡£¡£¡£¡£×îÖÕÔØºÉΪDCRat»òRhadamanthysµÈÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬ £¬¿ÉÖÂÊý¾Ýй¶ºÍϵͳÈëÇÖ¡£¡£¡£¡£¡£ÆÊÎö·¢Ã÷£¬£¬ £¬¹¥»÷Á´µÄ¶à²ã»ìÏýÏÔÖøÔöÌíÁ˼ì²âÄѶÈ£¬£¬ £¬µ«ÒàÒýÈë¸ü¶à¹ÊÕϵ㣬£¬ £¬Îª·ÀÓùÌṩÁËÍ»ÆÆ¿Ú¡£¡£¡£¡£¡£AcronisÖ¸³ö£¬£¬ £¬¶à²ãÇå¾²¼Æ»®ÖÁ¹ØÖ÷Òª£º³õʼ½×¶ÎÐè×èµ²¶ñÒâÓʼþ¼°¸½¼þ£¬£¬ £¬¸ß¼¶Æô·¢Ê½ÆÊÎö¿Éʶ±ð¿ÉÒɾ籾ÐÐΪ£¬£¬ £¬¶øÄÚ´æ±£»£»£»£»£»£»£»¤ÊÖÒÕÄÜ×è¶Ï±àÂëÔØºÉÖ´ÐС£¡£¡£¡£¡£ÖµµÃÒ»ÌáµÄÊÇ£¬£¬ £¬¹¥»÷ÕßÔÚPowerShell¾ç±¾ÖÐÖ²ÈëÄá²ÉÕÜѧÓï¼£¬£¬ £¬ÊÔͼ»ìÏýÊÓÏߣ¬£¬ £¬Í¹Õ¹ÏÖ´ú¶ñÒâÈí¼þµÄ´´ÒâÓëÖØ´óÐÔ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/we-smell-a-dcrat-revealing-a-sophisticated-malware-delivery-chain/


2. ÎÞÎļþ¼ÓÃÜÍÚ¿ó¹¥»÷µ¼ÖÂ1500Óą̀PostgreSQLЧÀÍÆ÷Ôâ¹¥»÷


4ÔÂ1ÈÕ£¬£¬ £¬½üÆÚ£¬£¬ £¬Õë¶Ô̻¶µÄPostgreSQLÊý¾Ý¿âµÄ¹¥»÷»î¶¯Òý·¢Çå¾²½ç¹Ø×¢¡£¡£¡£¡£¡£ÔÆÇå¾²¹«Ë¾WizÅû¶£¬£¬ £¬¸Ã¹¥»÷»î¶¯ÓëAqua SecurityÓÚ2024Äê8Ô±ê¼ÇµÄÈëÇÖ¼¯±£´æ¹ØÁª£¬£¬ £¬¹¥»÷Õß±»×·×ÙΪJINX-0126£¬£¬ £¬ÆäʹÓÃÃûΪPG_MEMµÄ¶ñÒâÈí¼þʵÑé¹¥»÷¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬ £¬¹¥»÷ÕßÒ»Á¬½ø»¯¹¥»÷ÊÖ·¨£¬£¬ £¬Í¨¹ýΪÿ¸öÄ¿µÄ°²ÅžßÓÐΨһ¹þÏ£ÖµµÄ¶þ½øÖÆÎļþ²¢½ÓÄÉÎÞÎļþÊÖÒÕÖ´ÐÐÍÚ¿ó¸ºÔØ£¬£¬ £¬ÓÐÓùæ±ÜÁËÒÀÀµÎļþ¹þÏ£¼ì²âµÄÔÆÇå¾²½â¾ö¼Æ»®¡£¡£¡£¡£¡£¾ÝWizÆÀ¹À£¬£¬ £¬¸Ã»î¶¯Òѵ¼ÖÂÁè¼Ý1,500ÃûÊܺ¦Õߣ¬£¬ £¬Í¹ÏÔÁËÈõÃÜÂë»òĬÈÏÉèÖõÄPostgreSQLʵÀý×÷Ϊ¹¥»÷Ä¿µÄµÄÆÕ±éÐÔ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÈõÉèÖõÄPostgreSQLЧÀ;ÙÐÐÆðÔ´ÉøÍ¸£¬£¬ £¬Í¶·ÅBase64±àÂëµÄshell¾ç±¾£¬£¬ £¬¸Ã¾ç±¾²»µ«É¨³ý¾ºÕù¿ó¹¤£¬£¬ £¬»¹°²ÅÅÃûΪPG_COREµÄ¶þ½øÖÆÎļþ¡£¡£¡£¡£¡£½øÒ»²½£¬£¬ £¬Ð§ÀÍÆ÷ÏÂÔØÎ±×°³ÉÕýµ±PostgreSQLÀú³ÌµÄGolang¶þ½øÖÆÎļþ£¬£¬ £¬Æäͨ¹ý½¨Éè¸ßȨÏÞÓû§¡¢ÉèÖÃcron³¤ÆÚ»¯Ê¹Ãü£¬£¬ £¬ÖÕ´ÓGitHubÏÂÔØ×îаæXMRigÍÚ¿ó³ÌÐò£¬£¬ £¬Ê¹ÓÃLinuxÎÞÎļþÊÖÒÕÆô¶¯ÍÚ¿óÀú³Ì¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬¹¥»÷ÕßΪÿ¸öÊܺ¦Õß·ÖÅÉ×ÔÁ¦Ç®°üµØµã£¬£¬ £¬WizÒÑʶ±ðÈý¸ö¹ØÁªÇ®°ü£¬£¬ £¬Ã¿¸öÇ®°ü¹ØÁªÔ¼550¸öÍÚ¿ó½Úµã£¬£¬ £¬×ܼÆÁè¼Ý1,500̨װ±¸±»Ñ¬È¾¡£¡£¡£¡£¡£


https://thehackernews.com/2025/04/over-1500-postgresql-servers.html


3. Palo Alto Global ProtectɨÃèÀ˳±ÖÐÉæ¼°½ü24,000¸öIP


4ÔÂ1ÈÕ£¬£¬ £¬Õë¶ÔPalo Alto Networks GlobalProtectµÇ¼ÃÅ»§µÄÍøÂçɨÃè»î¶¯½üÆÚÏÔÖøÉý¼¶£¬£¬ £¬Òý·¢Çå¾²Ñо¿Ö°Ô±¶ÔDZÔÚ¹¥»÷µÄÔ¤¾¯¡£¡£¡£¡£¡£ÍþвÇ鱨¹«Ë¾GreyNoise¼à²âÊý¾ÝÏÔʾ£¬£¬ £¬¸ÃɨÃè»î¶¯Éæ¼°Áè¼Ý24,000¸öΨһԴIPµØµã£¬£¬ £¬ÓÚ2025Äê3ÔÂ17ÈÕµÖ´ïÖðÈÕ20,000¸öΨһIPµÄ·åÖµ£¬£¬ £¬²¢Ò»Á¬ÖÁ3ÔÂ26ÈÕ¡£¡£¡£¡£¡£IPµØµãÖУ¬£¬ £¬23,800¸ö±»±ê¼ÇΪ"¿ÉÒÉ"£¬£¬ £¬154¸ö±»È·ÒÔΪ"¶ñÒâ"£¬£¬ £¬Í¹ÏԻÒì³£ÐÔ¡£¡£¡£¡£¡£É¨ÃèȪԴÖ÷Òª¼¯ÖÐÔÚ±±ÃÀ£¬£¬ £¬Ä¿µÄϵͳËäÒÔÃÀ¹úΪÖ÷£¬£¬ £¬µ«·ºÆðÈ«Çò»¯ÌØÕ÷¡£¡£¡£¡£¡£GreyNoiseÖ¸³ö£¬£¬ £¬´ËÀàɨÃ輤Ôö³£ÓëÎó²îʹÓÃǰµÄÕì̽Ðж¯Ïà¹Ø£¬£¬ £¬ÀúʷģʽÏÔʾ£¬£¬ £¬É¨Ãèá¯Áëºó2-4ÖÜ¿ÉÄÜ·ºÆðÐÂÎó²îÅû¶»ò¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬´Ë´Î»î¶¯ÓëÁíÒ»ÏîÉæ¼°PAN-OSÅÀ³æµÄɨÃè±£´æÊ±¼ä¹ØÁªÐÔ£¬£¬ £¬ºóÕßÔÚ3ÔÂ26ÈÕͬ²½µÖ´ï2,580¸öIPµÄɨÃè·åÖµ¡£¡£¡£¡£¡£Ä¿½ñ£¬£¬ £¬¹¥»÷ÕßµÄÏêϸĿµÄºÍÄîÍ·Éв»Ã÷È·£¬£¬ £¬µ«Õë¶Ô̻¶ÔÚ»¥ÁªÍøµÄPalo Alto Networksϵͳ£¬£¬ £¬ÖÎÀíÔ±ÐèÌá¸ßСÐÄ¡£¡£¡£¡£¡£GreyNoise½¨ÒéÁ¬Ã¦Éó²é3ÔÂÖÐÑ®ÒÔÀ´µÄϵͳÈÕÖ¾£¬£¬ £¬ÅŲéÈëÇÖ¼£Ï󣬣¬ £¬Ç¿»¯µÇ¼ÃÅ»§Çå¾²·À»¤£¬£¬ £¬²¢·â±ÕÒÑÖª¶ñÒâIP¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/nearly-24-000-ips-behind-wave-of-palo-alto-global-protect-scans/


4. CrushFTP CVE-2025-2825Îó²îÕýÔÚ±»Ê¹ÓþÙÐй¥»÷


4ÔÂ1ÈÕ£¬£¬ £¬½üÆÚ£¬£¬ £¬¹¥»÷ÕßÕýÆð¾¢Ê¹ÓùûÕæµÄ¿´·¨ÑéÖ¤´úÂ루PoC£©¶ÔCrushFTPÎļþ´«ÊäÈí¼þÖеÄÒ»¸ö¸ßΣÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2025-2825£©ÊµÑé¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÓÉOutpost24±¨¸æ£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÎÞÐèÈÏÖ¤¼´¿É»á¼ûδÐÞ²¹µÄCrushFTP v10»òv11×°±¸¡£¡£¡£¡£¡£CrushFTPÔÚ3ÔÂ21ÈÕ½ôÆÈÐû²¼²¹¶¡Ê±Ç¿µ÷£¬£¬ £¬Ì»Â¶µÄHTTP(S)¶Ë¿Ú¿ÉÄÜÖ±½Óµ¼ÖÂδÊÚȨ»á¼û£¬£¬ £¬²¢½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁ10.8.4»ò11.3.1ÒÔÉϰ汾¡£¡£¡£¡£¡£×÷ΪÔÝʱ·À»¤²½·¥£¬£¬ £¬ÖÎÀíÔ±¿ÉÆôÓÃDMZÍâÎ§ÍøÂçÑ¡ÏîÔöÇ¿·À»¤¡£¡£¡£¡£¡£Ò»Öܺ󣬣¬ £¬Shadowserver¼à²âÊý¾ÝÏÔʾ£¬£¬ £¬ÆäÃÛ¹ÞϵͳÒѼì²âµ½ÊýÊ®´ÎÕë¶Ô̻¶ÔÚ»¥ÁªÍøµÄCrushFTPЧÀÍÆ÷µÄ¹¥»÷ʵÑ飬£¬ £¬ÆäʱÈÔÓÐÁè¼Ý1,500¸öδÐÞ²¹ÊµÀý´¦ÓÚΣº¦ÖС£¡£¡£¡£¡£´Ë´ÎÎó²îµÄ¹ûÕæPoCÓÉProjectDiscoveryÓÚÎó²îÅû¶ǰÊýÈÕÐû²¼£¬£¬ £¬¼ÓËÙÁ˹¥»÷ÕßµÄʹÓÃÀú³Ì¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬CrushFTPºã¾ÃλÁÐÀÕË÷Èí¼þÍŻÈçClop£©µÄ¸ß¼ÛֵĿµÄÃûµ¥£¬£¬ £¬´ËÇ°ÔøÔâÓö¶à´ÎÁãÈÕÎó²î¹¥»÷£¬£¬ £¬°üÀ¨2024Äê4ÔÂÐÞ²¹µÄCVE-2024-4040Îó²î£¬£¬ £¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÌÓÒÝÐéÄâÎļþϵͳ²¢ÇÔȡϵͳÎļþ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-auth-bypass-bug-in-crushftp-now-exploited-in-attacks/


5. VitenasÕûÐÎÍâ¿Æ»¼ÕßÊý¾ÝÔâºÚ¿ÍÈëÇÖ²¢Ð¹Â¶


4ÔÂ1ÈÕ£¬£¬ £¬ÃÀ¹úÐÝ˹¶Ù×ÅÃûÕûÐÎÍâ¿Æ»ú¹¹VitenasÕûÐÎÍâ¿ÆÔâÓöÖØ´óÍøÂç¹¥»÷£¬£¬ £¬µ¼Ö´ó×ÚÃô¸Ð»¼ÕßÊý¾Ýй¶¡£¡£¡£¡£¡£¸Ã»ú¹¹ÓÉÍâ¿ÆÒ½Ê¦Ñ§»áԺʿPaul Vitenas, Jr.½¨É裬£¬ £¬ÆìϰüÀ¨Mirror Mirror Beauty Boutique¼°µÂ¿ËÈøË¹ÖÝÐÝ˹¶ÙÍâ¿ÆÖÐÐÄ¡£¡£¡£¡£¡£3ÔÂ5ÈÕ£¬£¬ £¬Íþв×éÖ¯KairosÔÚÆä°µÍøÐ¹ÃÜÕ¾µã¹ûÕæÐû³ÆÒÑÈëÇÖVitenas²©Ê¿¹ÙÍø£¬£¬ £¬²¢Õ¹Ê¾Î´¾­±à¼­µÄ1.34GBй¶Îļþ¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨Î´¼ÓÃܵÄÊܱ£»£»£»£»£»£»£»¤¿µ½¡ÐÅÏ¢£¨PHI£©£¬£¬ £¬Éæ¼°»¼ÕßÂãÕÕ¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÁªÏµ·½·¨¡¢Éç±£ºÅ¡¢¼ÝÕÕÕÕÆ¬µÈÃô¸ÐÐÅÏ¢£¬£¬ £¬Í¬Ê±°üÀ¨Ô±¹¤ÐÅÏ¢¼°ÕïËùÔËÓªÎļþ¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý¶íÓïÂÛ̳¶µÊÛÊý¾Ý£¬£¬ £¬ÊÔͼѰÕÒÂò¼Ò¡£¡£¡£¡£¡£Kairos×éÖ¯Éù³ÆÍ¨¹ý±©Á¦¹¥»÷ÓÚ2ÔÂÀÖ³ÉÈëÇÖϵͳ£¬£¬ £¬ÇÒÕïËùIT²¿·ÖÒѲì¾õ¹¥»÷µ«Î´ÄÜ×èÖ¹Êý¾Ýй¶¡£¡£¡£¡£¡£¹¥»÷ÕßÌåÏÖÒÑÓëVitenas²©Ê¿¾ÙÐÐÔ¼Ò»¸öÔµÄ̸ÅУ¬£¬ £¬ÍþвÈôÎÞ·¨¾¡¿ìÕÒµ½Êý¾ÝÂò¼Ò£¬£¬ £¬½«¹ûÕæ×îÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£


https://databreaches.net/2025/04/01/vitenas-cosmetic-surgery-patient-data-hacked-and-leaked/


6. Å·ÖÞЧÀÍÆ½Ì¨Yoojoй¶ÍòÍòÃô¸ÐÎļþ


4ÔÂ1ÈÕ£¬£¬ £¬Å·ÖÞЧÀÍÊг¡Æ½Ì¨YoojoÒòÔÆ´æ´¢Í°ÉèÖùýʧ£¬£¬ £¬µ¼Ö³¬1450Íò·ÝÃô¸ÐÎļþ̻¶£¬£¬ £¬º­¸ÇÓû§»¤ÕÕ¡¢Í¨Ñ¶¼Í¼¡¢µç»°ºÅÂëµÈ½¹µãÒþ˽Êý¾Ý¡£¡£¡£¡£¡£×÷ΪÅþÁ¬Ð¡ÎÒ˽¼ÒÓëЧÀÍÌṩÉ̵ÄÊ¢ÐÐÆ½Ì¨£¬£¬ £¬Yoojo£¨Ç°ÉíΪYoupijobs£©ÔÚÓ¢·¨Î÷ºÉµÈ¶à¹úÔËÓª£¬£¬ £¬ÆäÓ¦ÓÃÏÂÔØÁ¿³¬50Íò´Î£¬£¬ £¬Ð§À͹æÄ£ÁýÕÖ¼ÒÕþ¡¢³èÎï¿´»¤µÈ¶àÁìÓò¡£¡£¡£¡£¡£´Ë´Îй¶µÄ´æ´¢Í°ÖÁÉÙ¹ûÕæ»á¼û´ï10Ì죬£¬ £¬ËäÈ»ÔÝÎÞÀÄÓü£Ï󣬣¬ £¬µ«Ñо¿Ö°Ô±ÖÒÑÔDZÔÚΣº¦ÏÔÖø£º¹¥»÷Õß¿ÉʹÓÃй¶µÄÉí·ÝÖ¤¼þʵÑéÉí·Ý͵ÇÔ£¬£¬ £¬Í¨¹ýÕæÊµµç»°ºÅÂë¹¹½¨ÐéαЧÀÍÊշѳ¡¾°£¬£¬ £¬ÉõÖÁÌᳫ¾«×¼ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£Ð¡ÎÒ˽¼ÒÐÅϢ̻¶»¹ÏÔÖøÔöÌíÓû§±»¸ú×ÙÀÕË÷µÄΣº¦¡£¡£¡£¡£¡£ÔÚÍøÂçÇå¾²ÍŶÓת´ïºó£¬£¬ £¬YoojoÒÑÐÞ¸´ÉèÖÃÎó²î²¢Íê³ÉÊý¾Ý±£»£»£»£»£»£»£»¤¡£¡£¡£¡£¡£Îª×èÖ¹ÀàËÆÊÂÎñ£¬£¬ £¬×¨¼Ò½¨Òé½ÓÄɶàÖØÇå¾²²½·¥£¬£¬ £¬°üÀ¨Ç¿»¯»á¼û¿ØÖÆ¡¢ÆôÓüÓÃÜ´«ÊäÓë´æ´¢¡¢°²ÅÅÃÜÔ¿ÖÎÀíЧÀÍ¡¢ÊµÑéSSL/TLSЭÒ飬£¬ £¬²¢ÔöÇ¿Çå¾²Éó¼ÆÓëÔ±¹¤Åàѵ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬´Ë´ÎÐ¹Â¶Éæ¼°´ó×ÚÕþ¸®Ç©·¢Ö¤¼þ¼°Óû§Í¨Ñ¶ÄÚÈÝ£¬£¬ £¬ÆäÃô¸ÐˮƽԶ³¬Í¨Ë×Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£


https://cybernews.com/security/yoojo-data-leak-exposed-passports/