NexOpt 30ÍòÁ¾Æû³µºÍÊý°ÙÍò´ÎÐгÌÐÅÏ¢ÔâÆØ¹â

°ä²¼¹¦·ò 2025-04-10

1. NexOpt 30ÍòÁ¾Æû³µºÍÊý°ÙÍò´ÎÐгÌÐÅÏ¢ÔâÆØ¹â


4ÔÂ9ÈÕ £¬£¬£¬³µÁ¾¸ú×Ù·þÎñÌṩÉÌNexOpt £¬£¬£¬Ò»¼Ò×ܲ¿ÉèÓڵ¹ú¡¢¡¢¡¢ÔÚÃÀ¹úºÍ°ÂµØÀûÉèÓд¦Ê´¦µÄ¹«Ë¾ £¬£¬£¬½üÆÚ²úÉúÊý¾Ýй¶ÊÂÎñ £¬£¬£¬Â¶³öÁËÉÌÓúͳËÓóµµÄÃô¸ÐʵʱºÍº¹ÇàÐÐÊ»Êý¾Ý¡£¡£¡£NexOptÒ»ÏòÐû³Æ¡°±£ÕÏ×î´óˮƽµÄÊý¾Ý°²È«¡± £¬£¬£¬È»¶øCybernews×êÑÐÍŶӷ¢ÏÖ £¬£¬£¬³µ¶Ó¾­ÀíµÄÊý¾Ý±»±ÈÔ¤ÆÚ¸ü¿í·ºµÄÊÜÖÚ½Ó¼û¡£¡£¡£²»°²È«µÄ Nexopt Kibana ʵÀýй¶ÁË´óÁ¿¿Í»§¾ßÌåÐÅÏ¢ £¬£¬£¬Ô̺¬³µÁ¾¼ø±ðºÅ¡¢¡¢¡¢ÊµÊ±´¬²°ºÍ³µÁ¾µØÎ»µÈ £¬£¬£¬Ð¹Â©µÄʵÀýÔ̺¬½ü1TBÊý¾Ý £¬£¬£¬ÆäÖв¿ÃÅËÆºõ³öÓÚ¿ª·¢Ö÷ÕÅÌìÉú¡£¡£¡£ÔÚÂŴγ¢ÊÔÁªÏµNexOptºÍÓйØCERTºó £¬£¬£¬Â¶³öµÄʵÀýÒѱ»¹Ø±Õ¡£¡£¡£CybernewsÐÅÏ¢°²È«×êÑÐÔ±Ö¸³ö £¬£¬£¬Õâ´ÎйÃÜÊÂÎñ¸øÓйظ÷·½´øÀ´¸÷ÀàΣÏÕ £¬£¬£¬Êý¾Ý¿ÉÄܱ»ÓÃÓÚóÒ×µý±¨ÍøÂç £¬£¬£¬ÉõÖÁ×éÖ¯ÏÖʵÊÀ½çµÄ·¸×ï»î¶¯¡£¡£¡£Õâ´Îй¶¶³öÁËÊý°ÙÍòÌõóÒ×ÐгÌÐÅÏ¢ £¬£¬£¬¿ÉÄÜ»¹Ô̺¬Ò»Ð©·ÇóÒ×ÐгÌÐÅÏ¢ £¬£¬£¬ÊÜÓ°ÏìµÄÊý¾ÝËÆºõÀ´×Ô³¬¹ý 30 ÍòÁ¾¶ÀÁ¢³µÁ¾¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÔ̺¬³µÁ¾¼ø±ðºÅÂë¡¢¡¢¡¢NexOpt É豸 IMEI ±êʶ·û¡¢¡¢¡¢³µÁ¾Òƶ¯Êý¾Ý¡¢¡¢¡¢ÐÐ³ÌÆô³ÌµØ¡¢¡¢¡¢Ö÷ÕŵØÊý¾Ý¡¢¡¢¡¢º½Â·¡¢¡¢¡¢³µÁ¾È¼ÓÍ»òµçÁ¿Êý¾ÝÒÔ¼°¼ÝʻԱ×ùÒÎÊý¾ÝµÈ¡£¡£¡£ÓÉÓÚ VIN ºÅÂë¿ÉÓÃÓÚ¼ø±ð¸ü¶à³µÁ¾ÐÅÏ¢ £¬£¬£¬Ô̺¬³µÖ÷ÐÅÏ¢ £¬£¬£¬ÕâÔö³¤ÁËÊý¾Ýй¶µÄÑÏÖØÐÔ¡£¡£¡£


https://cybernews.com/security/nexopt-data-leak-exposes-locations-vehicles/


2. ¹¤Òµ¼¼ÊõÖÆ×÷ÉÌSensata TechnologiesÔâÀÕË÷Èí¼þ¹¥»÷


4ÔÂ10ÈÕ £¬£¬£¬Sensata TechnologiesÊÇÒ»¼ÒÕ¼Óг¬¹ý19,000ÃûÔ±¹¤µÄ¹¤Òµ¼¼Êõ¹«Ë¾ £¬£¬£¬ÉÏÒ»²ÆÄêÓªÊÕ½ü40ÒÚÃÀÔª £¬£¬£¬×¨Ò»ÓÚΪÆû³µ¡¢¡¢¡¢ÖØÐͳµÁ¾ºÍÔ½Ò°³µ¡¢¡¢¡¢¹¤ÒµºÍº½¿Õº½ÌìÊг¡³ö²ú´«¸ÐÆ÷¡¢¡¢¡¢µçÆø±£»£»£»¤Ôª¼þºÍÆäËû¹¤¾ß¡£¡£¡£ÉÏÖÜÈոù«Ë¾Ôâ·êÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬ÆäϵͳÔâ·êÑÏÖØ·ÛËé¡£¡£¡£SensataËæ¼´ÁªÏµÁË·¨Âɲ¿ÃÅ¡£¡£¡£¹«Ë¾ÔÚ8-KÎļþÖÐй© £¬£¬£¬Õâ´ÎÊÂÎñÁÙʱӰÏìÁËÆäÔËÓª £¬£¬£¬Ô̺¬ÔËÊä¡¢¡¢¡¢ÊÕ»õ¡¢¡¢¡¢ÖÆ×÷³ö²úÒÔ¼°ÆäËû¸÷ÀàÖ§³ÖÖ°ÄÜ¡£¡£¡£Ö»¹Ü¹«Ë¾ÒѲÉȡһʱ´ëÊ©ÒÔ¸´Ô­²¿ÃÅÖ°ÄÜ £¬£¬£¬µ«È«Ã渴ԭµÄ¾ßÌ幦·ò±íÉв»Ã÷È·¡£¡£¡£¸Ã¹«Ë¾ÓÚÖÜÈýÏòÃÀ¹ú֤ȯÂòÂôίԱ»á£¨SEC£©´«µÝÁËÕâÒ»ÊÂÎñ £¬£¬£¬²¢ÖÒ¸æÍ¶×ÊÕß £¬£¬£¬ÒòÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬¹«Ë¾¹ÙÔ±±»ÆÈ¹Ø±ÕÆäÍøÂç¡£¡£¡£³õ´ëÊ©²éÏÔʾ £¬£¬£¬ÓÐÎļþ´Ó¹«Ë¾»·¾³Öб»µÁ¡£¡£¡£Sensata°µÊ¾ £¬£¬£¬ÍøÂ簲ȫר¼ÒÕýÔÚÈ«Á¦Ð­Öú¸´Ô­¹¤×÷ £¬£¬£¬²¢ÖÂÁ¦¼ø±ð±»µÁÎļþ £¬£¬£¬ÒÔ±ãʵʱ֪ͨÓйØÈËÔ±¡£¡£¡£Ö»¹Ü¹«Ë¾°µÊ¾²»ÒÔΪÕâ´Î¹¥»÷»á¶Ô±¾¼¾¶ÈµÄ²ÆÕþÇé¿ö²úÉúÖØ´óÓ°Ïì £¬£¬£¬µ«Ò²Ö¸³öÕâ¿ÉÄÜ»áÆ¾¾Ý¸´Ô­Á˾ֶøÓÐËù±ä¶¯¡£¡£¡£½ØÖÁÖÜÈýÍíÉÏ £¬£¬£¬ÉÐδÓÐÈκÎÀÕË÷Èí¼þÍÅ»ïÈϿɶÔÕâ´ÎÊÂÎñÕÆ¹Ü¡£¡£¡£


https://therecord.media/sensata-technologies-ransomware-attack


3. GrandoreiroµØÀíΧÀ¸ÍøÂç´¹µö¹¥»÷¶Ô×¼À­ÃÀµØÓò


4ÔÂ9ÈÕ £¬£¬£¬Ò»³¡Õë¶ÔÀ­¶¡ÃÀÖÞÓû§µÄÍøÂç´¹µö»î¶¯ÕýËÁŰ £¬£¬£¬ÆäÖ÷ÌâÊdzôÃûÔ¶ÑïµÄÒøÐÐľÂíGrandoreiro £¬£¬£¬¸ÃľÂíÒÔÇÔÈ¡Ãô¸Ð²ÆÕþÊý¾ÝÖø³Æ¡£¡£¡£2ÔÂ19ÈÕÖÁ3ÔÂ14ÈÕÆÚ¼ä £¬£¬£¬×êÑÐÈËÔ±°ÑÎȵ½ÓйØÍøÂç´¹µö»î¶¯¼¤Ôö £¬£¬£¬ÇÒ¼£ÏóÅú×¢»î¶¯ÈÔÔÚ³ÖÐø¡£¡£¡£GrandoreiroÒÑ´æÔÚ¶àÄê £¬£¬£¬²»ÐݸĽøÒÔά³Öµ±ÏÈְλ £¬£¬£¬Ö¼ÔÚÇÔÈ¡ÒøÐÐÆ¾Ö¤¡¢¡¢¡¢¼à¶½Óû§»î¶¯²¢ÊÚÓè¹¥»÷ÕßÔ¶³Ì½Ó¼ûȨÏÞ¡£¡£¡£Õâ´Î¹¥»÷»î¶¯ÖÐ £¬£¬£¬µØÀíΧÀ¸¼¼ÊõÓÈΪÒýÈËÖõÄ¿ £¬£¬£¬¶ñÒâÈí¼þÔÚÔËÐÐǰ»á²é³­Êܺ¦ÕßIPµØÖ·ÒÔÈ·¶¨ÆäµØÎ» £¬£¬£¬ÈôÓû§²»ÔÚÖ¸±êÀ­¶¡ÃÀÖÞ¹ú¶È/µØÓò £¬£¬£¬¶ñÒâÈí¼þ±ã»áÖÕ³¡Ö´ÐÐ £¬£¬£¬ÕâʹµÃ¹¥»÷Ô½·¢¼¯ÖÐ £¬£¬£¬Ï÷¼õÁ˲»ÓÃÒªµÄÆØ¹â £¬£¬£¬²¢Ô®ÊÖÆä¶ã¹ýÈ«Çò°²È«¼à¿Ø¡£¡£¡£Ï°È¾Ê¼ÓÚÒ»¸ö´¹µöÒ³Ãæ £¬£¬£¬ÓÕÆ­Êܺ¦Õßµã»÷Á´½Ó»òÏÂÔØÐéαPDFÎĵµ £¬£¬£¬¸ÃÎļþʵΪÔ̺¬Grandoreiro¼ÓÔØ·¨Ê½µÄѹËõ°ü¡£¡£¡£Ò»µ©Îļþ±»ÌáÈ¡²¢´ò¿ª £¬£¬£¬¶ñÒâÈí¼þ±ã»áÏòip-apicom·¢ËÍÒªÇóÒÔÈ·¶¨Óû§µØÀíµØÎ» £¬£¬£¬²¢Æ¾¾ÝÁ˾־ö¶¨ÊÇ·ñ³ÖÐø¹¥»÷¡£¡£¡£´ËÍâ £¬£¬£¬Grandoreiro»¹Í¨¹ýÏòdns.google·¢ËÍÒªÇóÀ´Ô¤·À±¾µØDNS²éÎÊ £¬£¬£¬Èƹý»ùÓÚDNSµÄ×èÖ¹»úÖÆ¡£¡£¡£


https://hackread.com/grandoreiro-strikes-geofenced-phishing-attacks-latam/


4. AkiraBotÀ¬»øÓʼþ»î¶¯ÍþвСÐÍÆóÒµÍøÂ簲ȫ


4ÔÂ9ÈÕ £¬£¬£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÓÉ¡°AkiraBot¡±Çý¶¯µÄÐÂÐÍÀ¬»øÓʼþ»î¶¯ £¬£¬£¬¸Ã»úеÈËרÃÅÕë¶ÔСÐÍÆóÒµÍøÕ¾·¢ËͶ¨ÖƵĴÙÏúÐÅÏ¢¡£¡£¡£×Ô2024Äê9ÔÂÒÔÀ´ £¬£¬£¬AkiraBotÒѳɹ¦ÏòÖÁÉÙ80,000¸öÍøÕ¾·¢ËÍÀ¬»øÓʼþÁªÏµ±íµ¥ºÍ̸ÌìС¹¤¾ß £¬£¬£¬Ö¸±êÍøÕ¾ÊýÁ¿³¬¹ý400,000¸ö¡£¡£¡£AkiraBotÀûÓÃOpenAIµÄGPT-4o-miniµÈÈËΪÖÇÄÜ˵»°Ä£ÐÍ £¬£¬£¬·ÖÎöÍøÕ¾ÄÚÈݲ¢ÌìÉú¸öÐÔ»¯ÐÅÏ¢ £¬£¬£¬ÍƹãڲƭÐÔSEO·þÎñ £¬£¬£¬Ê¹³ß¶ÈÀ¬»øÓʼþ¹ýÂËÆ÷¸üÄѼì²âºÍÀ¹½Ø¡£¡£¡£¸Ã»î¶¯ÖØÒªÕë¶ÔʹÓÃShopify¡¢¡¢¡¢GoDaddy¡¢¡¢¡¢WixºÍSquarespaceµÈÈȵ㽨վƽ̨µÄÖÐСÐÍÆóÒµ¡£¡£¡£ÕâЩƽ̨ÒòÆäÒ×ÓÃÐÔ¶ø¹ãÊÜÖÐСÆóÒµÇàíù £¬£¬£¬È´Ò²³ÉΪÁËÀ¬»øÓʼþ·¢ËÍÕßµÄÖ¸±ê¡£¡£¡£AkiraBot¾ß±¸¶àÖÖ¶ñÒâ»î¶¯ÄÜÁ¦ £¬£¬£¬Ô̺¬´´½¨AIÌìÉúµÄÐÂÎÅ¡¢¡¢¡¢ÈƹýÑéÖ¤Âë±£»£»£»¤¡¢¡¢¡¢¶Ô׼СÐÍÆóÒµÒÔ¼°Ê¹ÓôúÀíÍøÂçÔ¤·À¼ì²â¡£¡£¡£¸Ã¹¤¾ßͨ¹ýFastCaptchaºÍNextCaptchaµÈ¹¤¾ß £¬£¬£¬ÉõÖÁ°Ñ³Öä¯ÀÀÆ÷ÊôÐÔÀ´·ÂÕպϷ¨Óû§µÄÐÐΪ £¬£¬£¬´Ó¶øºýŪÑéÖ¤Âëϵͳ¡£¡£¡£´ËÍâ £¬£¬£¬AkiraBot»¹Ê¹ÓôúÀí·þÎñ½«ÆäÁ÷Á¿Â·Óɵ½·ÖÆçµÄIPµØÖ· £¬£¬£¬ÒÔÔ¤·À±»»ùÓÚÍøÂçµÄ±£»£»£»¤´ëÊ©À¹½Ø¡£¡£¡£


https://hackread.com/akirabot-abuses-openai-api-spam-website-contact-forms/


5. ºÚ¿ÍÀûÓÃEC2ÍйÜÍøÕ¾ÖеÄSSRF·ì϶ÇÔÈ¡AWSƾ֤


4ÔÂ9ÈÕ £¬£¬£¬F5 Labs×êÑÐÈËÔ±·¢ÏÖÒ»ÏîÓÐÕë¶ÔÐÔµÄÍøÂç»î¶¯ £¬£¬£¬¸Ã»î¶¯ÀûÓÃAWS EC2ʵÀýÉÏÍйܵÄÍøÕ¾ÖеķþÎñÆ÷¶ËÒªÇóαÔ죨SSRF£©·ì϶ £¬£¬£¬ÌáÈ¡EC2ÔªÊý¾Ý £¬£¬£¬ÆäÖпÉÄÜÔ̺¬À´×ÔIMDSv1¶ËµãµÄIAMÍ´´¦¡£¡£¡£¹¥»÷Õß½è´ËÌáÉýȨÏÞ £¬£¬£¬½Ó¼ûS3´æ´¢Í°»ò½ÚÖÆÆäËûAWS·þÎñ £¬£¬£¬¿ÉÄܵ¼ÖÂÃô¸ÐÊý¾Ýй¶¡¢¡¢¡¢°Ñ³ÖºÍ·þÎñÖжϡ£¡£¡£»£»£»î¶¯Ê¼ÓÚ3ÔÂ13ÈÕ £¬£¬£¬ÓÚ3ÔÂ15ÈÕÖÁ25ÈÕÆÚ¼äÉý¼¶ÎªÈ«Ãæ¹¥»÷¡£¡£¡£¹¥»÷ÕßÀûÓÃSSRF·ì϶ £¬£¬£¬Ô¶³Ì²éÎÊÄÚ²¿EC2ÔªÊý¾ÝURL²¢½Ó¹ÜÃô¸ÐÊý¾Ý¡£¡£¡£ÓÉÓÚÒ×Êܹ¥»÷µÄʵÀýÔÚIMDSv1ÉÏÔËÐÐ £¬£¬£¬¹¥»÷Õ߿ɼìË÷Ô̺¬IAMƾ֤ÔÚÄÚµÄÔªÊý¾Ý¡£¡£¡£IMDSv1Òѱ»¸ü°²È«µÄIMDSv2È¡´ú £¬£¬£¬ºóÕßÐè»á»°ÁîÅÆ½øÐÐÉí·ÝÑéÖ¤¡£¡£¡£¹¥»÷ÕßÂÖ»»²éÎʲÎÊýÃû³ÆºÍ×Óõè¾¶ £¬£¬£¬ÏÔʾÆäϵͳÐÔÇÔÈ¡Ãô¸ÐÊý¾ÝµÄ²½Öè¡£¡£¡£F5 LabsÔÚ2025Äê3ÔµÄÍþвÇ÷Ïò»ã±¨ÖÐÇ¿µ÷ÁËÕâЩ¹¥»÷ £¬£¬£¬²¢Ö¸³ö¾É·ì϶ÈԾ߸߶ÈÕë¶ÔÐÔ £¬£¬£¬40%±»ÀûÓõÄCVE¶¼ÊÇËÄÄêÒÔÉϵľɷì϶¡£¡£¡£Îª¼õÇá´ËÀàÍþв £¬£¬£¬½¨ÒéÀûÓÿÉÓõݲȫ¸üР£¬£¬£¬Ç¿»¯Â·ÓÉÆ÷ºÍÎïÁªÍøÉ豸ÅäÖà £¬£¬£¬²¢ÓÃÊÜÖ§³ÖµÄÐͺŴúÌæEoLÍøÂçÉ豸¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-target-ssrf-bugs-in-ec2-hosted-sites-to-steal-aws-credentials/


6. Magentoƽ̨³¬70ÍòÓû§µÄCRMÊý¾ÝÒÉÔâй¶


4ÔÂ9ÈÕ £¬£¬£¬Ò»Ãû×Գơ°Satanic¡±µÄºÚ¿Íͨ¹ýµÚÈý·½ÇþµÀÐû³Æ £¬£¬£¬¿ªÔ´µç×ÓÉÌÎñƽ̨MagentoÔâ·êÈëÇÖ £¬£¬£¬µ¼Ö³¬¹ý70ÍòÓû§µÄCRMÊý¾Ýй¶ £¬£¬£¬Éæ¼°µç×ÓÓʼþ¡¢¡¢¡¢µç»°ºÅÂë¼°ÆóÒµÐÅÏ¢¡£¡£¡£¾ÝºÚ¿ÍÐû³Æ £¬£¬£¬Õâ´Î¹¥»÷²úÉúÓÚ2025Äê4ÔÂ9ÈÕ £¬£¬£¬Í¨¹ýµÚÈý·½¼¯³ÉÇÔÈ¡ÁË´óÁ¿ÆóÒµºÍСÎÒÁªÏµÐÅÏ¢¡£¡£¡£Ö»¹ÜMagentoĸ¹«Ë¾AdobeÉÐδ֤ʵ´ËÊÂÎñ £¬£¬£¬µ«ºÚ¿Í°ä²¼µÄй¶Êý¾ÝÔ̺¬74.5Íò¸ö¶ÀÁ¢Ìõ¿î £¬£¬£¬Ô̺¬43Íò¸öµç×ÓÓʼþµØÖ·ºÍ26.1Íò¸öµç»°ºÅÂë £¬£¬£¬²¢ÔÚÍøÂç·¸×ïÂÛ̳Breach ForumsÉϹ«¿ª¡£¡£¡£Ð¹Â¶µÄÊý¾ÝËÆºõÔ´×ÔMagento²¿ÊðµÄCRMϵͳ £¬£¬£¬Éæ¼°BBCµ½¡¶Ö¥¼Ó¸çÂÛ̳±¨¡·µÈ×éÖ¯ £¬£¬£¬Ô̺¬ÐÕÃû¡¢¡¢¡¢Ö°Î»¡¢¡¢¡¢¹«Ë¾µç×ÓÓʼþ¡¢¡¢¡¢ÓòÃû¡¢¡¢¡¢µç»°ºÅÂë¼°É罻ýÌåÁ´½Ó¡£¡£¡£ÎļþÏÔʾ £¬£¬£¬ÕâЩÐÅϢΪ½á¹¹»¯Ìõ¿î £¬£¬£¬¾ßÌå¼Í¼ÁËÿ±Ê¼Í¼µÄÐÅÏ¢ £¬£¬£¬¿ÉÄܱ»ÓÃÓÚÍøÂç´¹µö¡¢¡¢¡¢B2B¼ÙÒâÚ¿Æ­»ò¸ß¼ÛÖµÖ¸±ê·ÖÎö¡£¡£¡£´ËÍâ £¬£¬£¬²¿ÃżÍ¼Ô̺¬ÒÑÑéÖ¤µÄLinkedInÕË»§¡¢¡¢¡¢¹«Ë¾µç×ÓÓʼþ±ðºÅ¼°¿Í»§·þÎñÁªÏµ·½Ê½¡£¡£¡£Êý¾Ý¿âÖеļ¼ÊõÔªÊý¾Ý»¹½ÒʾÁ˹«Ë¾µÄ¼¼ÊõÕ»¡¢¡¢¡¢ÓªÏúƽ̨¼°Ö§¸¶´¦ÖÃÆ÷ £¬£¬£¬ÈçMagento¡¢¡¢¡¢Salesforce¡¢¡¢¡¢Adobe Experience ManagerºÍStripe¡£¡£¡£


https://hackread.com/hackers-magento-breach-3rd-party-crm-data-leak/