ServiceBridgeÊý¾Ý¿âÉèÖùýʧµ¼ÖÂÊý°ÙÍòÌõÃô¸Ð¼Í¼̻¶
Ðû²¼Ê±¼ä 2024-08-288ÔÂ26ÈÕ£¬£¬£¬£¬ServiceBridgeÊÇÒ»¼Ò×ܲ¿Î»ÓÚÖ¥¼Ó¸çµÄ×ÅÃûÏÖ³¡Ð§ÀÍÖÎÀíÆ½Ì¨£¬£¬£¬£¬½üÆÚÒòÒ»´ÎÑÏÖØµÄÊý¾Ý¿âÉèÖùýʧ¶øÏÝÈëÊý¾Ýй¶Σ»£»£»ú¡£¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼ÒJeremiah Fowler½ÒÆÆÁËÕâÒ»Îó²î£¬£¬£¬£¬µ¼ÖÂÁè¼Ý3100ÍòÌõ¼Í¼¡¢×ܼÆ2.68TBµÄÃô¸ÐÊý¾Ý̻¶ÓÚ¹«ÖÚÊÓÒ°£¬£¬£¬£¬ÆäÖв»·¦ÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëÒÔÖ²¿·ÖÐÅÓÿ¨ÐÅÏ¢¼°HIPAA»®¶¨µÄСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÎÞÐèÈκÎÇå¾²ÈÏÖ¤¼´¿É»á¼û£¬£¬£¬£¬ÇÒÊý¾Ý¿ç¶È³¤´ïÊ®Ä꣬£¬£¬£¬Éæ¼°¶à¸öÐÐÒµµÄÆóÒµºÍСÎÒ˽¼Ò£¬£¬£¬£¬°üÀ¨Ñ§Ð£¡¢×ڽ̻ú¹¹¡¢Á¬Ëø²ÍÌü¼°Ò½ÁÆÐ§ÀÍÌṩÕߵȡ£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý¹æÄ£ÖØ´óÇÒÃô¸Ð¶È¸ß£¬£¬£¬£¬ÒýÆðÁËÆÕ±éµÄÇå¾²ºÍÒþ˽µ£ÐÄ¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ·¢Æ±Ú²Æ¡¢Éí·Ý͵ÇԵȲ»·¨ÐÐΪ£¬£¬£¬£¬²»µ«Íþвµ½ÆóÒµµÄ²ÆÎñÇå¾²ºÍÉùÓþ£¬£¬£¬£¬»¹¿ÉÄܸøÐ¡ÎÒ˽¼Ò´øÀ´ÉîÖØµÄ¾¼ÃËðʧºÍÒþ˽ÇÖÕ¼¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Êý¾Ý¿âÖл¹°üÀ¨ÎïÀíÇå¾²Ïà¹ØµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬Èç´óÃÅÃÜÂëºÍ»á¼û¼Í¼£¬£¬£¬£¬½øÒ»²½¼Ó¾çÁËDZÔÚµÄÇ徲Σº¦¡£¡£¡£¡£¡£¡£ServiceBridgeÔÚ½Óµ½Í¨ÖªºóÁ¬Ã¦¹Ø±ÕÁËÊý¾Ý¿âµÄ¹ûÕæ»á¼ûȨÏÞ£¬£¬£¬£¬µ«¹ØÓÚÊý¾Ýй¶µÄÒ»Á¬Ê±¼ä¼°ÊÇ·ñÒÑÓеÚÈý·½½éÈëÈÔ²»µÃ¶øÖª¡£¡£¡£¡£¡£¡£
https://hackread.com/servicebridge-expose-2tb-records-cloud-misconfiguration/
2. TDECUÔâClopÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬³¬50ÍòСÎÒ˽¼ÒÐÅϢй¶
8ÔÂ26ÈÕ£¬£¬£¬£¬µÂ¿ËÈøË¹ÌÕÊÏÔ±¹¤ÐÅÓÃÏàÖúÉ磨TDECU£©½üÆÚÐû²¼£¬£¬£¬£¬Áè¼Ý50ÍòÃû³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢ÔÚÈ¥ÄêµÄÒ»´ÎÓɶíÓïÀÕË÷Èí¼þ×éÖ¯Clop·¢¶¯µÄºÚ¿Í¹¥»÷Öв»ÐÒй¶¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÁËMOVEit TransferÖÎÀíÎļþ´«Ê䣨MFT£©Èí¼þÖеÄÁãÈÕÎó²î£¨CVE-2023-34362£©£¬£¬£¬£¬¸ÃÎó²îÓÚ2023Äê5ÔÂ31ÈÕ±»Progress Software¹ûÕæÅû¶¡£¡£¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Emsisoft¹ÀË㣬£¬£¬£¬´Ë´ÎÊÂÎñ²¨¼°Áè¼Ý2700¸ö×éÖ¯£¬£¬£¬£¬Ó°ÏìÈËÊý¸ß´ïÔ¼9600Íò¡£¡£¡£¡£¡£¡£TDECUÓÚÉÏÖÜÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ±¨¸æ£¬£¬£¬£¬²¢Ïò500,474ÃûÊÜÓ°Ïì³ÉÔ±·¢ËÍÁË֪ͨÐÅ£¬£¬£¬£¬ÐÅÖÐÏêÊöÁ˺ڿʹÓMOVEitÇÔÈ¡µÄÃô¸ÐÐÅÏ¢¹æÄ££¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕË»§¼°ÐÅÓÿ¨ºÅ¡¢¼ÝÕպŵÈÒªº¦Ð¡ÎÒ˽¼ÒÉí·Ý¼°²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¡£Ö»¹ÜTDECUÏÖÔÚδ·¢Ã÷Òò¸ÃÊÂÎñµ¼ÖµÄÖ±½ÓÉí·Ý»ò½ðÈÚڲư¸Àý£¬£¬£¬£¬µ«ÈÔΪÊÜÓ°Ïì³ÉÔ±ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬²¢½¨ÒéËûÃÇÉèÖÃڲƾ¯±¨»òÉêÇëÇå¾²¶³½á£¬£¬£¬£¬ÒÔÌá·ÀDZÔÚΣº¦¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/500k-impacted-by-texas-dow-employees-credit-union-data-breach/
3. ARRLÏòÀÕË÷Èí¼þÍÅ»ïÖ§¸¶ÁË100ÍòÃÀÔªÊê½ð
8ÔÂ26ÈÕ£¬£¬£¬£¬ÌìÏÂÒµÓàÎÞÏßµçлáÃÀ¹úÎÞÏßµçÖмÌͬÃË£¨ARRL£©½üÆÚÅû¶£¬£¬£¬£¬¸Ã×éÖ¯ÔÚ2024Äê5ÔÂ15ÈÕÔâÊÜÁËÒ»³¡ÆÆËðÐÔµÄÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ËæºóÖ§¸¶ÁË100ÍòÃÀÔªÊê½ðÒÔ»Ö¸´±»¼ÓÃܵÄÄÚ²¿ÍøÂçϵͳ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²»µ«É漰̨ʽ»ú¡¢Ìõ¼Ç±¾µçÄÔ£¬£¬£¬£¬»¹²¨¼°WindowsºÍLinuxЧÀÍÆ÷£¬£¬£¬£¬ÏÔʾÁ˸߶ȵÄ×éÖ¯ÐÔºÍе÷ÐÔ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÊýÖÜǰ¾ÍÒÑDZÈëARRLµÄÏÖ³¡ºÍÔÆÏµÍ³£¬£¬£¬£¬Ê¹ÓðµÍøÐÅϢʵÑéÈëÇÖ¡£¡£¡£¡£¡£¡£ÃæÁÙÊý°ÙÍòÃÀÔªµÄÀÕË÷ÒªÇ󣬣¬£¬£¬ARRL¾ÐÉ̺óÖ§¸¶ÁË100ÍòÃÀÔª£¬£¬£¬£¬Òò¹¥»÷ÕßδÄÜ»ñÈ¡Ãô¸ÐÊý¾Ý¶ø½µµÍÁËÊê½ð½ð¶î¡£¡£¡£¡£¡£¡£ARRLÇ¿µ÷£¬£¬£¬£¬´Ë¿î×Ó¼°ºóÐøÐÞ¸´ÓöÈÖ÷ÒªÓɰü¹Ü¼ç¸º¡£¡£¡£¡£¡£¡£Ð§ÀÍÖÐֹʱ´ú£¬£¬£¬£¬°üÀ¨¡°ÌìÏÂÈÕÖ¾¡±£¨LoTW£©ÔÚÄڵĶàÏîЧÀͱ»ÔÝʱ¹Ø±Õ£¬£¬£¬£¬Ö±µ½7ÔÂ1ÈÕLoTW»Ö¸´£¬£¬£¬£¬Ö»¹ÜÆäЧÀÍÆ÷×Ô¼ºÎ´Ö±½ÓÊÜË𣬣¬£¬£¬µ«ÒÀÀµÆäËûÊÜÓ°ÏìµÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ARRL´ó²¿·ÖϵͳÒѻָ´£¬£¬£¬£¬µ«»ù´¡ÉèÊ©µÄÖÜÈ«ÐÞ¸´ÈÔÐèÒ»Á½¸öÔÂʱ¼ä¡£¡£¡£¡£¡£¡£¹ØÓÚСÎÒ˽¼ÒÐÅϢй¶ÇéÐΣ¬£¬£¬£¬ARRLδÃ÷ȷ˵Ã÷£¬£¬£¬£¬µ«ÒÑ֪ͨÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ£¬£¬£¬£¬¿ÉÄÜÓÐ150ÃûÔ±¹¤µÄÐÅÏ¢£¨ÈçÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂ룩Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/american-radio-relay-league-paid-1-million-to-ransomware-gang/
4. ConnexureÔâBlackSuitÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬½ü°ÙÍòÈËÊý¾Ýй¶
8ÔÂ27ÈÕ£¬£¬£¬£¬Young Consulting£¨ÏÖ¸üÃûΪConnexure£©£¬£¬£¬£¬Ò»¼ÒרעÓÚ¹ÍÖ÷Ö¹ËðÊг¡µÄÑÇÌØÀ¼´óÈí¼þ½â¾ö¼Æ»®ÉÌ£¬£¬£¬£¬¿ËÈÕ×îÏÈÏòÔ¼954,177ÃûÓû§·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬ÕâÔ´ÓÚ½ñÄê4ÔÂ10ÈÕÔâÊܵÄBlackSuitÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼Ö°üÀ¨¼ÓÖÝÀ¶¶Ü»áÔ±ÔÚÄÚµÄÓû§Êý¾Ý±»µÁ£¬£¬£¬£¬ÈýÌìºó¹«Ë¾²Å²ì¾õϵͳ±»¼ÓÃÜ¡£¡£¡£¡£¡£¡£¾ÊӲ죬£¬£¬£¬È·ÈÏй¶ÐÅÏ¢°üÀ¨È«Ãû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¼°°ü¹ÜË÷ÅâÏêÇé¡£¡£¡£¡£¡£¡£Îª¼õÇáÓ°Ï죬£¬£¬£¬ConnexureΪÊÜÓ°ÏìµÄÓû§ÌṩCyberScoutµÄ12¸öÔÂÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍÖÁ2024Äê11ÔÂβ¡£¡£¡£¡£¡£¡£¼øÓÚBlackSuitÒÑÔÚ°µÍøÀÕË÷ÃÅ»§ÉÏÐû²¼²¿·ÖÊý¾Ý£¬£¬£¬£¬Óû§ÐèÁ¬Ã¦Ê¹ÓôËЧÀͲ¢Ð¡ÐÄδÊÚȨͨѶ¡¢ÍøÂç´¹ÂÚ¼°Õ©ÆÍýÏë¡£¡£¡£¡£¡£¡£ÍþвÕß²»µ«Ðû³Æ¶Ô¹¥»÷ÈÏÕæ£¬£¬£¬£¬»¹Íþв½øÒ»²½Ð¹Â¶¸ü¶àδÅû¶µÄÐÅÏ¢£¬£¬£¬£¬ÈçÉÌÒµÌõÔ¼¡¢Ô±¹¤»¤ÕÕ¡¢¼Òͥϸ½Ú¼°²ÆÎñÊý¾ÝµÈ£¬£¬£¬£¬µ«Ïà¹ØËµ·¨ÉÐδ¾×ÔÁ¦ÑéÖ¤¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/blacksuit-ransomware-stole-data-of-950-000-from-software-vendor/
5. Microsoft SwayÔÚ´ó¹æÄ£¶þάÂëÍøÂç´¹ÂڻÖб»ÀÄÓÃ
https://www.bleepingcomputer.com/news/security/microsoft-sway-abused-in-massive-qr-code-phishing-campaign/
6. ¶ñÒâÈí¼þMalAgent.AutoITBot£¬£¬£¬£¬Gmail¼°¶àƽ̨ÕÊ»§µÄÒþÃØÍþв
8ÔÂ27ÈÕ£¬£¬£¬£¬SonicWall Capture Labs ×î½üÕ¹ÏÖÁËÃûΪ MalAgent.AutoITBot µÄÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬ËüרÃÅÕë¶Ô Gmail ÕË»§Ìᳫ¹¥»÷£¬£¬£¬£¬µ«Íþв¹æÄ£Ô¶²»Ö¹ÓÚ´Ë¡£¡£¡£¡£¡£¡£Õâ¿îͨ¹ý AutoIT ±àÒëµÄ¡°File.exe¡±³ÌÐò£¬£¬£¬£¬Ê¹ÓöÁÈ¡¼ôÌù°å¡¢²¶»ñ°´¼üÒÔÖ¿ØÖƼüÅÌÊó±êµÈÖØ´óÊÖ¶ÎÈëÇÖÓû§ÏµÍ³¡£¡£¡£¡£¡£¡£MalAgent ²»µ«ÊÔͼͨ¹ýÖ÷Á÷ä¯ÀÀÆ÷»á¼û Gmail£¬£¬£¬£¬»¹Õ¹ÏÖ³öÊý¾ÝÇÔÈ¡¡¢ÏµÍ³Ê¹Óü°·´ÆÊÎöÄÜÁ¦µÄ¶àÃæÐÔ£¬£¬£¬£¬Ê¹ÆäÄÜÇáËÉÍøÂçÃô¸ÐÐÅÏ¢²¢×è°Çå¾²ÆÊÎö¡£¡£¡£¡£¡£¡£SonicWall ʹÓÃרҵ¹¤¾ßÆÊÎöÆäÐÐΪ£¬£¬£¬£¬·¢Ã÷Æä¸ß¶È»ìÏýµÄ´úÂëºÍ¶¯Ì¬C2ÅþÁ¬ÉèÖ㬣¬£¬£¬ÔöÌíÁË×·×ÙÄѶȡ£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»¹°üÀ¨Õë¶ÔÆäËûÉ罻ýÌåÆ½Ì¨µÄµÇ¼Á´½Ó£¬£¬£¬£¬ÏÔʾ³öÆä¶àÄ¿µÄ¹¥»÷µÄÌØÕ÷¡£¡£¡£¡£¡£¡£ÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬£¬MalAgent Äܾ²Ä¬ÔËÐжà¸öÀú³Ì£¬£¬£¬£¬ÈçÒþ²ØÒ³Ãæ²Ù×÷ºÍÍøÂçÌ×½Ó×ÖʵÑ飬£¬£¬£¬ÒÔÌӱܼì²â¡£¡£¡£¡£¡£¡£ÕâÒ»·¢Ã÷Ç¿µ÷ÁËÔÚ´¦Öóͷ£Î´ÖªÎļþʱÐè¼á³Ö¸ß¶ÈСÐÄ£¬£¬£¬£¬ÒÔÃâ³ÉΪÆäDZÔÚÊܺ¦Õß¡£¡£¡£¡£¡£¡£
https://securityonline.info/sonicwall-warns-new-malware-targets-gmail/


¾©¹«Íø°²±¸11010802024551ºÅ