MTN¼¯ÍÅÔâÍøÂ簲ȫÊÂÎñÖÂÓû§ÐÅϢй¶

°ä²¼¹¦·ò 2025-04-27

1. MTN¼¯ÍÅÔâÍøÂ簲ȫÊÂÎñÖÂÓû§ÐÅϢй¶


4ÔÂ25ÈÕ  £¬·ÇÖÞÒÆ¶¯¾ÞÍ·MTN¼¯ÍÅ£¨Ç°ÉíΪM-Cell£©Ôâ·êÍøÂ簲ȫÊÂÎñ  £¬²¿ÃŹú¶ÈÓû§Ó×ÎÒÐÅÏ¢Ôâй¶ ¡£MTN¼¯Íų¤¶ÌÖÞ×î´óµÄÒÆ¶¯ÍøÂçÔËÓªÉÌ  £¬ÒµÎñ¸²¸Ç20¸ö¹ú¶È  £¬Õ¼Óнü3ÒÚÓû§  £¬ÄêÊÕÈ볬110ÒÚÃÀÔª  £¬ÇÒÔÚÑÇÖÞÊг¡Ó°ÏìÁ¦×³´ó ¡£Õâ´ÎÊÂÎñÖÐ  £¬MTN¼¯ÍÅÇ¿µ÷ÆäÖ÷ÌâÍøÂç¡¢¼Æ·ÑϵͳºÍ½ðÈÚ·þÎñ»ù´¡ÉèʩδÊܹ¥»÷Ó°Ïì  £¬ÈÔ°²È«ÇÒÈ«ÃæÔËÐÐ  £¬µ«ÒÑ×ÅÊÖµ÷²éÒÔÃ÷È·ÊÂÎñ¼òÖ±ÇÐÁìÓòºÍÓ°Ïì ¡£MTN¼¯ÍŲ¼¸æ³Æ  £¬ÓÓװδ֪µÚÈý·½¡±Ðû³Æ½Ó¼ûÁ˹«Ë¾Êý¾Ý  £¬µ¼Ö²¿ÃÅÊг¡²¿Ãſͻ§µÄÓ×ÎÒÐÅÏ¢±»Î´¾­ÊÚȨ½Ó¼û ¡£²»Íâ  £¬MTNµÄµ÷²éÉÐδ֤ʵ¿Í»§Ç®°üºÍÕË»§Êܵ½ÇÖº¦  £¬¾ßÌå¶³öÐÅÏ¢Éв»Ã÷È· ¡£ÊÂÎñ²úÉúºó  £¬MTN¼¯ÍÅѸËÙ²ÉÈ¡Ðж¯  £¬ÒÑ֪ͨÄϷǾ¯·½¼°Óйؼà¹ÜºÍÊý¾Ý±£»¤»ú¹¹Ð­Öúµ÷²é  £¬²¢´òË㾡¿ì֪ͨÊÜÓ°ÏìµÄ¿Í»§ ¡£Îª±£»¤¿Í»§ÃâÊܽøÒ»²½¹¥»÷  £¬MTN¼¯ÍÅÌá³öһϵÁн¨Òé  £¬Ô̺¬ÉèÖÃڲƭ¾¯±¨¡¢¸üÐÂÀûÓ÷¨Ê½¡¢Ê¹ÓÃÇ¿ÃÜÂë¡¢Ô¤·À¿ÉÒÉÁ´½Ó²¢ÆôÓöà³É·ÖÉí·ÝÑéÖ¤ ¡£½ØÖÁĿǰ  £¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯¶Ô´ËÕÆ¹Ü ¡£


https://www.bleepingcomputer.com/news/security/mobile-provider-mtn-says-cyberattack-compromised-customer-data/


2. SAP NetWeaverÑϳÁ·ì϶CVE-2025-31324Õý±»»ý¼«ÀûÓÃ


4ÔÂ26ÈÕ  £¬SAP NetWeaver Visual Composer´æÔÚÑϳÁ·ì϶CVE-2025-31324  £¬Ê¹ÏµÍ³Ãæ¶ÔÆëÈ«ÈëÇÖ·çÏÕ ¡£Onapsis Threat Intelligence»ã±¨ÏÔʾ  £¬¸Ã·ì϶ÑϳÁˮƽÆÀ·ÖΪÂú·Ö10.0  £¬Ô´ÓÚϵͳ¶ÌȱÑéÖ¤Óû§È¨Ï޵IJ鳭ÇÒÕý±»»ý¼«ÀûÓà ¡£×êÑÐÅú×¢  £¬ÏÖÓÐSAP NetWeaverÀûÓ÷þÎñÆ÷JavaϵͳÖÐ50%µ½70%´æÔÚ´Ë·ì϶ ¡£¸Ã·ì϶ÓÉReliaQuest³õ´Î¼Í¼  £¬´æÔÚÓÚdevelopmentserver SAP Visual ComposerµÄÌØ¶¨²¿ÃÅ  £¬¶øSAP Visual ComposerÊÇSAP NetWeaver 7.xxµÄ×é¼þ  £¬Ö¼ÔÚÎÞÐè´úÂë´´½¨ÒµÎñ¹¤¾ß ¡£ÎÊÌâÔÚÓÚϵͳδÕýÈ·²é³­½Ó¼ûÔªÊý¾ÝÉÏ´«Æ÷Ö°ÄܵÄÓû§È¨ÏÞ  £¬²»×ãÊʵ±Éí·ÝÑéÖ¤ºÍÊÚȨ  £¬Ê¹Î´µÇ¼Óû§Ò²ÄܽӼû׳´óÖ°ÄÜ ¡£4ÔÂ22ÈÕ  £¬ReliaQuestÔÚÒѽ¨²¹·þÎñÆ÷ÉÏ·¢ÏÖ¿ÉÒɻ  £¬SAPͬÈÕÈÏ¿ÉÔÚJavaϵͳÖз¢ÏÖÒì³£Îļþ ¡£4ÔÂ24ÈÕ  £¬SAP°ä²¼³£¼ûÎÊÌâ½â´ðÎĵµ  £¬È·ÈÏÌØ¶¨Îļþ¼ÐÖÐÌØ¶¨À©´óÃûÎļþºÜ¿ÉÄÜÊǶñÒâÎļþ  £¬²¢Õýʽ°ä²¼¸Ã·ì϶  £¬Ö¸³öÆäµ××ÓÔ­ÒòÊǶÌȱÊÚȨ²é³­  £¬µ¼ÖÂδ¾­ÊÚȨÓû§ÉÏ´«Î£ÏÕ¿ÉÖ´ÐÐÎļþ  £¬ÀûÓú󽫴øÀ´ÏµÍ³ÊÕÊܳÁ´ó·çÏÕ  £¬SAPÒѰ䲼NetWeaver´ø±í´¹Î£¸üР¡£


https://hackread.com/sap-netweaver-flaw-severity-hackers-deploy-web-shells/


3. Microsoft DefenderÎóÅÐÖ³¬1700·ÝÃô¸ÐÎļþ¹«¿ª


4ÔÂ25ÈÕ  £¬½üÈÕ  £¬ÒòMicrosoft Defender³öÏÖÎóÅÐ  £¬µ¼Ö³¬¹ý1700·ÝÃô¸ÐÎļþͨ¹ýANY.RUNƽ̨±»ÎÞÒâÖй«¿ª¹²Ïí ¡£ANY.RUN×÷Ϊ½»»¥Ê½ÔÚÏßɳÏä  £¬±¾ÒâÊÇÈÃÓû§ÔÚÊܿػ·¾³ÖзÖÎö¼ì²â¶ñÒâÈí¼þ  £¬µ«ÆäÃ÷È·ÖÒ¸æÃâ·Ñ´òËãÓû§  £¬ÉÏ´«µ½¸Ãƽ̨µÄÎļþ¾ùΪ¹«¿ª×´Ì¬ ¡£ANY.RUNÔÚÉêÃ÷ÖÐÖ¸³ö  £¬·¢ÏÖ´óÁ¿Adobe Acrobat CloudÁ´½Ó±»ÉÏ´«ÖÁɳºÐ  £¬¾­×êÑÐ  £¬ÊÇMicrosoft Defender XDRÃýÎ󵨽«¡°acrobat[.]adobe[.]com/id/urn:aaid:sc:¡±ÏóÕ÷Ϊ¶ñÒâÎļþ ¡£ÕâÒ»ÎóÅÐÒÔÖÁÃâ·Ñ´òËãÓû§ÉÏ´«ÁËÔ̺¬Êý°Ù¼Ò¹«Ë¾Ãô¸ÐÊý¾ÝµÄAdobeÎļþ  £¬ÓÃÓÚ¹«¿ªÄ£Ê½·ÖÎö ¡£Ö»¹ÜANY.RUNËæºó½«ËùÓÐÓйطÖÎöÉèΪ˽ÃÜ  £¬ÒÔÔ¤·À½øÒ»²½Ð¹Â¶  £¬µ«ÈÔÓÐЧ»§×ÔÐй«¿ª·ÖÏí»úÃÜÎļþ ¡£ANY.RUNΪ´ËÖÒ¸æÓû§  £¬Ö´Ðй¤×÷Óйع¤×÷ʱӦʹÓÃóÒ×Ðí¿ÉÖ¤  £¬ÒÔ±£ÏÕÒþÖÔÓëºÏ¹æÐÔ ¡£Õâ´ÎÊÂÎñÖÐ  £¬½öͨ¹ýANY.RUNƽ̨¾ÍÓг¬1700·Ý¸öÈËÃô¸ÐÎļþ±»¹«¿ª ¡£ÆäËû¶ñÒâÈí¼þ·ÖÎöƽ̨ÈçVirusTotalͬÑù´æÔÚÀàËÆ·çÏÕ  £¬ÔÊÐíÓû§ÉÏ´«¿ÉÒÉÎļþ¿ÉÄܵ¼ÖÂÎļþÎÞÒâй¶ ¡£


https://cybernews.com/security/anyrun-users-leak-sensitive-data-after-microsoft-defender-misfire/


4. Ç×¶íºÚ¿ÍNoName¶ÔµÂ¹ú·¢ÆðDDoS¹¥»÷


4ÔÂ25ÈÕ  £¬³öÓÚÕþÖζ¯»úµÄÇ×¶íºÚ¿Í×éÖ¯Noname057(16)Õý¼Ó´ó¶ÔµÂ¹ú×éÖ¯µÄÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷Á¦¶È  £¬¸øµÂ¹ú¶àÁìÓò´øÀ´ÍøÂ簲ȫÍþв ¡£¸Ã×éÖ¯Óë¶íÂÞ˹½áÃË  £¬Ðû³ÆÒѶԵ¹ú¶à¼Ò³ÁÒª»ú¹¹ºÍÆóÒµÍøÕ¾·¢Æð¹¥»÷  £¬Êܹ¥»÷¶ÔÏ󺭸ǽðÈÚ¡¢Å©Òµ¡¢Ôì×÷ÒµµÈ¶à¸öÐÐÒµ  £¬Ô̺¬µÂ¹ú´óÐ͹úÓÐÒøÐаͷ¥ÀûÑÇÖÝÒøÐÓעȫÇòÐÔÆóÒµBayWa AG¡¢»ú³¡°à³µÔì×÷ÉÌCOBUS IndustriesÒÔ¼°ÂÁºÏ½ð³ö²úÉÌAluminium Rheinfelden AlloysµÈ  £¬»¹ÔÚTelegramÉÏÐû³ÆÕâЩ×éÖ¯ÍøÕ¾Òѱ»ÏÂÏß ¡£¾Ýgolem.de±¨Â·  £¬Noname057(16)Õâ´ÎÇ¿»¯¶ÔµÂ¹¥»÷  £¬¿ÉÄÜÊǶԼ´½«ÉÏÈεĵ¹ú×ÜÀí¸¥ÀïµÂÀïÏ£¡¤Ã·¶û´Ä´òËãÏòÎÚ¿ËÀ¼Ìṩ½ðÅ£×ùѲº½µ¼µ¯µÄ»ØÓ¦ ¡£±¾µØÃ½Ìå½øÒ»²½Åû¶  £¬¸Ã×éÖ¯¹¥»÷ÁìÓò²»½öÏÞÓÚÆóÒµ  £¬»¹Éæ¼°ººÅµÍþ¡¢¶ÅÈû¶û¶à·ò¡¢À³±ÈÎý¡¢°ØÁÖ¡¢·¨À¼¿Ë¸£ºÍ¿ÆÂ¡µÈ¶à¸ö³ÇÊеÄÊе±¾ÖÍøÕ¾  £¬²¢ÊÔͼ¶Ô¹«¹²Æû³µ¡¢µÂ¹úóÒ×ÒøÐÓ×¢Baywa¡¢Å·Ë¾ÀÊ¡¢µÂ¹úÖÐÑëºÏ×÷ÒøÐеȴóÐ͹«Ë¾ÍøÕ¾ÌáÒé¹¥»÷ ¡£


https://cybernews.com/security/noname-launch-ddos-attacks-in-germany/


5. AnubisÀÕË÷ÍÅ»ïÐû³Æ½Ù³Ö7ÒÚ¿¨ÍаÍË«Íõ¶Ä³¡À¶Í¼


4ÔÂ24ÈÕ  £¬Ò»¸öÃûΪ¡°Anubis¡±µÄÀÕË÷Èí¼þÍÅ»ïÐû³Æ½Ù³ÖÁ˺Ä×Ê7ÒÚÃÀÔªµÄ¿¨ÍаÍË«Íõ¶Ä³¡¶È¼Ù´åÀ¶Í¼  £¬ÈôÊÇÊôʵ  £¬Æä°ÑÎÕµÄÐÅÏ¢¿ÉÄܱȶij¡½¨ÔìÕ߸üÏ꾡 ¡£¸Ã¶È¼Ù´åλÓÚ±±¿¨ÂÞÀ´ÄÉÖݹúÍõɽ  £¬ÓÉ¿¨ÍаÍÓ¡µÚ°²²¿Â俪·¢  £¬2024Äê6ÔÂÆÆÍÁ¶¯¹¤  £¬Ô¤¼Æ2026ÄêÊ¢¿ª  £¬¿¢¹¤ºó½«½¨Éè´óÁ¿ÀÏ»¢»ú¡¢¶Ä×À¼°¾Æµê¿Í·¿  £¬Ä¿Ç°Ò»Ê±ÉèÊ©ÒÑÔËÓª ¡£4ÔÂ23ÈÕ  £¬AnubisÔÚ°µÍøÐ¹ÃÜÍøÕ¾°ä²¼Êê½ðÍþв  £¬³ÆÕ¼Óжij¡¸÷ÇøÓò¾ßÌåÀ¶Í¼  £¬Ô̺¬Ö÷Â¥²ã¡¢Í£³µ³¡¡¢¾Æµê´óÂ¥¼°ºó¶ÜÏÞ¶ÈÇøÓòµÈ  £¬»¹°ÑÎÕ·þÎñÆ÷»ú·¿¡¢³ïÂë¿â¡¢Ï޶ȳöÈëÃÅ¡¢¼à¿ØÉãÏñÍ·¡¢Ô±¹¤ÉóÅÐÊÒ¼°·Öɢ·Ïß²¼¾ÖµÈ¹Ø¼üÐÅÏ¢  £¬ÕâЩÊý¾Ý¿°³Æ¶Ä³¡Â°Âӵġ°È«Ì×¹¤¾ß¡± ¡£´Ë±í  £¬¸ÃÍŻﻹÐû³Æ»ñÈ¡Á˵ؼ®Êý¾Ý¡¢µØÕðÎļþºÍ˾·¨¼Í¼  £¬ÕâÎÞÒÉ»á¸ø±¾¾Í³ä³âÕþÖÎÕùÒéµÄ¿ª·¢ÏîÄ¿´øÀ´¸ü¶àÂé·³ ¡£ÊÂʵÉÏ  £¬ÔÚÀÕË÷Èí¼þÍÅ»ïȾָǰ  £¬¸ÃÏîÄ¿¾ÍÒÑÉîÏÝÕùÒé ¡£2022Äê  £¬¹ú¶ÈÓ¡µÚ°²²©²ÊίԱ»áÖ¸¿Ø²¿ÂäÎ¥¹æÔËÓª¶Ä³¡²¢Íþв·£¿î£»2024Äê  £¬Ç°¿ª·¢ºÏ×÷ͬ°éÌá¸æ×´ËÏ  £¬Ö¸¿Ø²¿Âä·¸·¨ÇÖÈ뼰ŤתµØÆ¤Óô¦£»¶«²¿ÇÐÂÞ»ùÓ¡µÚ°²ÈËÒ²¶àÄêÀ´·ñ¾ö¸ÃÏîÄ¿ ¡£


https://cybernews.com/security/catawba-two-kings-casino-cyberattack/


6. ÐÂÐ͵çÁ¦¼ÄÉú³æ´¹µö¹¥»÷¶Ô×¼ÄÜÔ´¹«Ë¾ºÍÖØÒªÆ·ÅÆ


4ÔÂ26ÈÕ  £¬×Ô2024ÄêÆð  £¬Ò»³¡ÃûΪ¡°µçÁ¦¼ÄÉú³æ¡±µÄ¸´ÔÓÍøÂç´¹µö»î¶¯³ÖÐøÕë¶ÔÈ«ÇòÄÜÔ´¾ÞÍ·¼°ÖØÒªÆ·ÅÆ·¢Õ¹¹¥»÷ ¡£¸Ã»î¶¯ÖØÒªÀûÓÃÎ÷ÃÅ×ÓÄÜÔ´¡¢Ê©ÄÍµÂµçÆø¡¢·¨¹úµçÁ¦ÄÜÔ´¡¢ÀׯÕË÷¶û¹«Ë¾ºÍÉ­¿ÆÄÜÔ´µÈ³ÛÃûÄÜÔ´¹«Ë¾µÄÆ·ÅÆ  £¬Í¨¹ýͶ×ÊȦÌ×ÓëÐéα¹¤×÷»úÓöÖ´ÐÐÚ¿Æ­ ¡£¹¥»÷Õß¹¹½¨ÁËÓÉ150¶à¸ö»îÔ¾ÓòÃû×é³ÉµÄÖØ´óÍøÂç  £¬¼Ù×°³ÉºÏ·¨¹«Ë¾  £¬³Áµã¶Ô×¼ÃϼÓÀ­¹ú¡¢Äá²´¶ûºÍÓ¡¶ÈµÈÑÇÖÞ¹ú¶ÈµÄÓ×ÎÒ ¡£Ú¿Æ­·Ö×Óͨ¹ýºýŪÐÔÍøÕ¾¡¢É罻ýÌåȺ×é¼°TelegramƵ·µÈÇþ·½Ó´¥Êܺ¦Õß  £¬²¢Ñ¡È¡Ó¢Óï¡¢ÆÏÌÑÑÀÓï¡¢Î÷°àÑÀÓï¡¢Ó¡ÄáÓï¡¢°¢À­²®ÓïºÍÃϼÓÀ­ÓïµÈ±¾µØ»¯ÄÚÈÝÌáÉýÚ¿Æ­³ÉЧ ¡£×êÑÐÏÔʾ  £¬ÍþвÐÐΪÕßѡȡ¡°¹ãÈöÍø¡±Õ½Êõ  £¬ÀÄÓöà¸öÆ·ÅÆÃû³Æ²¢²¿Êð¶à¸öÍøÕ¾ÒÔÀ©´óÊܺ¦ÕßÁìÓò ¡£Æä»ù´¡ÉèÊ©·ÖÎöÅú×¢  £¬¹¥»÷ÕßʹÓÃÔ̺¬¡°SE¡±£¨´ú±íÎ÷ÃÅ×ÓÄÜÔ´£©ºÍ¡°AMD¡±£¨´ú±í¸ß¼¶Î¢É豸£©µÈ¹Ø¼ü×ÖµÄÓòÃû  £¬½áºÏ¶àÖÖÓòÃûºó׺´´½¨ÓòÃûģʽ ¡£¸Ã»î¶¯Í¨¹ýÁ½ÖÖÉç»á¹¤³Ìѧ²½ÖèÖ´ÐÐÚ¿Æ­£ºÍ¶×ÊÚ¿Æ­±äÌåÖÐ  £¬Êܺ¦Õß±»ÐéαͶ×ÊÆ½Ì¨ÒԸ߻ر¨³ÐŵÒýÓÕ  £¬ÕâЩƽ̨Ðû³ÆÓɳÛÃûÄÜÔ´¹«Ë¾Ö§³Ö£»ÇóÖ°Ú¿Æ­±äÖÖÔòÒÔÐéα¾ÍÒµ»úÓöΪµö¶ü  £¬ÒªÇóӦƸÕßÌṩÃô¸ÐÓ×ÎҺͲÆÕþÐÅÏ¢ ¡£


https://cybersecuritynews.com/new-power-parasites-phishing-attack/