ÃÀ¹úÊ·ÉÏ×î´óÒ½ÁÆÊý¾Ýй¶ÊÂÎñ£ºChange HealthcareÔâÀÕË÷Èí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2025-02-061. ÃÀ¹úÊ·ÉÏ×î´óÒ½ÁÆÊý¾Ýй¶ÊÂÎñ£ºChange HealthcareÔâÀÕË÷Èí¼þ¹¥»÷
1ÔÂ25ÈÕ£¬£¬£¬ÁªºÏ¿µ½¡¼¯ÍÅ×Ó¹«Ë¾Change HealthcareÔÚ2024Äê2ÔÂÔâÊÜÁËÀÕË÷Èí¼þ×éÖ¯ALPHV£¨ÓÖÃûBlack Cat£©µÄ¹¥»÷£¬£¬£¬µ¼ÖÂÔ¼1.9ÒÚÃÀ¹úÈ˵ÄÃô¸ÐÒ½ÁÆÊý¾Ýй¶£¬£¬£¬³ÉΪÃÀ¹úÀúÊ·ÉÏ×î´óµÄÒ½ÁÆÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÁËȱ·¦¶àÒòËØÉí·ÝÑéÖ¤µÄÊÜѬȾÕÊ»§ºÍCitrixÔ¶³Ì»á¼ûÈí¼þÉϵÄÊÜѬȾƾ֤£¬£¬£¬Ôì³ÉÁË8.72ÒÚÃÀÔªµÄ²ÆÎñËðʧºÍ6TBµÄÊý¾Ýй¶¡£¡£¡£¡£¡£¡£Ö»¹ÜºÚ¿Í½üÒ»ÄêÀ´Ò»Ö±ÔÚ»á¼û±»µÁÊý¾Ý£¬£¬£¬µ«UnitedHealthÉù³ÆÃ»ÓÐÖ¤¾ÝÅú×¢Êý¾Ý±»ÀÄÓᣡ£¡£¡£¡£¡£È»¶ø£¬£¬£¬´Ë´ÎÈëÇÖ̻¶Á˰üÀ¨¿µ½¡°ü¹ÜÏêϸÐÅÏ¢¡¢»¼ÕßÕï¶Ï¡¢²âÊÔЧ¹ûºÍÖÎÁÆÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÒ½ÁƼͼ£¬£¬£¬ÒÔ¼°Ð¡ÎÒ˽¼ÒÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕºÅÂëµÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬¸Ã¹«Ë¾Ö§¸¶ÁË2200ÍòÃÀÔªµÄÊê½ð£¬£¬£¬µ«BlackCatÓÕÆÁËʵÑé´Ë´Î¹¥»÷µÄ¹ØÁª¹«Ë¾²¢ÆÈ¡ÁËÊê½ð£¬£¬£¬µ¼Ö±»µÁÊý¾ÝÂäÈëÍøÂç·¸·¨·Ö×ÓÊÖÖС£¡£¡£¡£¡£¡£´Ë´ÎйÃÜÊÂÎñ²»µ«Ö±½ÓÇÔÈ¡Êý¾Ý£¬£¬£¬»¹ÈÅÂÒÁËÌìϵÄÒ½ÁÆÐ§ÀÍ£¬£¬£¬¸øÔËÓª´øÀ´ÁËÖØ´óÌôÕ½£¬£¬£¬Òý·¢ÁËÈËÃǶԻ¼ÕßÒþ˽ºÍÊý¾ÝÇå¾²µÄµ£ÐÄ¡£¡£¡£¡£¡£¡£ÎªÁË×ñÊØHIPAA£¬£¬£¬ÁªºÏ¿µ½¡¼¯ÍÅÒÑÏòÊÜÓ°Ïì×îÑÏÖØµÄСÎÒ˽¼Òת´ïÁ˴˴ι¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£
https://hackread.com/unitedhealth-groups-data-breach-impacts-americans/
2. TalkTalkÊý¾Ýй¶ÊÂÎñ£ºÍþвÕßÉù³ÆÇÔÈ¡1880ÍòÓû§Êý¾Ý
1ÔÂ27ÈÕ£¬£¬£¬Ó¢¹úµçÐŹ«Ë¾TalkTalkÔâÓöÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬Ò»Ãû×Ô³ÆÎª¡°b0nd¡±µÄÍþвÐÐΪÕßÔÚÍøÂç·¸·¨ÂÛ̳ÉÏÐû²¼¶Ô´Ë´ÎºÚ¿Í¹¥»÷ÈÏÕæ£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁËÁè¼Ý1880ÍòTalkTalkÓû§µÄÊý¾Ý£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢IPµØµã¡¢µç»°ºÅÂëºÍPINµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬TalkTalk¹«Ë¾½²»°ÈËÌåÏÖÕâһ˵·¨¡°ÍêÈ«½û¾øÈ·ÇÒÑÏÖØÇ¿µ÷¡±£¬£¬£¬²¢Ö¸³ö´Ë´ÎÐ¹Â¶Éæ¼°µÚÈý·½Æ½Ì¨¡£¡£¡£¡£¡£¡£¾Ý͸¶£¬£¬£¬¸ÃÊÂÎñÔ´ÓÚÒ»¸öµÚÈý·½¹©Ó¦É̵Äϵͳ±»ÒâÍâ»á¼ûºÍÀÄÓ㬣¬£¬TalkTalkÕýÓ빩ӦÉÌÏàÖú½â¾ö¸ÃÎÊÌ⣬£¬£¬µ«²¢Î´Í¸Â¶¹©Ó¦ÉÌÃû³Æ¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬Ð¹Â¶µÄÊý¾ÝÊÇ´ÓµçÐÅÌṩÉÌʹÓõÄAscendon SaaSƽ̨ÇÔÈ¡µÄ£¬£¬£¬¶ø¸Ãƽ̨ÌṩÉÌCSGÈÏ¿ÉÊý¾ÝÊÇ´ÓÆäÆ½Ì¨ÉÏÇÔÈ¡µÄ£¬£¬£¬µ«ÌåÏÖÖ»ÓÐÒ»Ãû¿Í»§Êܵ½Ó°Ï죬£¬£¬ÇÒûÓÐÖ¤¾ÝÅú×¢ÆäÊÖÒÕºÍϵͳÊܵ½ÁËË𺦡£¡£¡£¡£¡£¡£Õâ²¢·ÇTalkTalkÊ×´ÎÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬2015Äê¸Ã¹«Ë¾Ð§ÀÍÆ÷Ò²ÔøÔâÊÜÍøÂç¹¥»÷£¬£¬£¬Ó°ÏìÁË400ÍòÓû§¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/173526/cyber-crime/talktalk-confirms-data-breach.html
3. ʷŮʿ¼¯ÍÅÔâδ֪¹¥»÷ÕßÈëÇÖ£¬£¬£¬Åû¶Çå¾²Îó²î
1ÔÂ28ÈÕ£¬£¬£¬×ܲ¿Î»ÓÚÂ׶صĿç¹ú¹¤³Ì¾ÞͷʷŮʿ¼¯ÍÅ£¨Smiths Group£©½üÆÚÔâÓöÁËδ֪¹¥»÷ÕßµÄϵͳÈëÇÖ£¬£¬£¬µ¼ÖÂÇå¾²Îó²î±»Åû¶¡£¡£¡£¡£¡£¡£×÷Ϊһ¼ÒÔÚÂ×¶ØÖ¤È¯ÉúÒâËùÉÏÊеÄÓ¢¹ú¹«Ë¾£¬£¬£¬Ê·Å®Ê¿¼¯ÍÅÔÚ50¶à¸ö¹ú¼ÒÓµÓÐÁè¼Ý15,000ÃûÔ±¹¤£¬£¬£¬È¥ÄêÓªÊոߴï31.32ÒÚÓ¢°÷£¬£¬£¬Ö÷ҪЧÀÍÓÚÄÜÔ´¡¢Çå¾²¡¢°²±£¡¢º½¿Õº½ÌìºÍ¹ú·ÀÊг¡¡£¡£¡£¡£¡£¡£ÔÚÖܶþÌá½»¸øÂ×¶ØÖ¤È¯ÉúÒâËùµÄÎļþÖУ¬£¬£¬Ê·Å®Ê¿¼¯ÍÅ͸¶ÕýÔÚÊÓ²ìÒ»ÆðÉæ¼°¡°Î´¾ÊÚȨ»á¼û¹«Ë¾ÏµÍ³¡±µÄÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬²¢Á¬Ã¦¸ôÀëÁËÊÜÓ°ÏìµÄϵͳ£¬£¬£¬Æô¶¯ÁËÓªÒµÒ»Á¬ÐÔÍýÏë¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸Ã¹«Ë¾ÕýÓëÍøÂçÇ徲ר¼ÒÏàÖú£¬£¬£¬Æð¾¢»Ö¸´ÏµÍ³²¢ÆÀ¹À¶ÔÓªÒµµÄÆÕ±éÓ°Ï죬£¬£¬Í¬Ê±ÔÊÐí½«½ÓÄÉÒ»ÇÐÐëÒª²½·¥×ñÊØÏà¹Øî¿ÏµÒªÇ󣬣¬£¬²¢ÔÚ»ñµÃ¸ü¶àÐÅϢʱÌṩ¸üС£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬Ê·Å®Ê¿¼¯ÍÅÉÐδ͸¶ÈëÇÖµÄÏêϸʱ¼äºÍÊÇ·ñÓÐÓªÒµ»ò¿Í»§Êý¾Ý±»µÁ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/engineering-giant-smiths-group-discloses-security-breach/
4. ËþËþ¿Æ¼¼ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬²¿·ÖITЧÀͶÌÔÝÖÐÖ¹
1ÔÂ31ÈÕ£¬£¬£¬ËþËþ¿Æ¼¼ÓÐÏÞ¹«Ë¾£¨Tata Technologies Ltd.£©£¬£¬£¬×÷ΪËþËþÆû³µµÄ×Ó¹«Ë¾£¬£¬£¬ÊÇÒ»¼ÒרעÓÚÆû³µÉè¼Æ¡¢º½¿Õº½Ì칤³Ì¼°×ÛºÏÑз¢¹¤³ÌµÄÓ¡¶ÈÉÏÊпç¹ú¿Æ¼¼¹«Ë¾¡£¡£¡£¡£¡£¡£¿ËÈÕ£¬£¬£¬¸Ã¹«Ë¾ÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬µ¼Ö²¿·ÖITЧÀͲ»µÃ²»ÔÝÍ£¡£¡£¡£¡£¡£¡£Ö»¹ÜËþËþ¿Æ¼¼Ñ¸ËÙ½ÓÄÉÐж¯²¢Ðû²¼IT×ʲúÒѻָ´£¬£¬£¬µ«´Ë´Î¹¥»÷µÄÏêϸϸ½ÚºÍÓ°ÏìÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¿Í»§½»¸¶Ð§ÀÍÔÚÍøÂç¹¥»÷ʱ´ú¼á³ÖÖÜÈ«ÔËÐУ¬£¬£¬Î´¶Ô¿Í»§ÔËÓªÔì³ÉÓ°Ïì¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÊÇ·ñÀÖ³ÉÇÔÈ¡Á˸ù«Ë¾µÄÈκÎÊý¾Ý£¬£¬£¬µ«ÀÕË÷Èí¼þ¹¥»÷ͨ³£Éæ¼°Êý¾Ý͵ÇÔ£¬£¬£¬¶Ô¿Æ¼¼¹«Ë¾¶øÑÔ£¬£¬£¬´ËÀàÊÂÎñ¿ÉÄܵ¼Ö¹«Ë¾ÉñÃØÊý¾Ýй¶£¬£¬£¬Ëðº¦ÖªÊ¶²úȨºÍÊÖÒÕ×éºÏ¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬HiveÀÕË÷Èí¼þ×éÖ¯Ôø¶ÔÓ¡¶È×î´óµÄ×ۺϵçÁ¦¹«Ë¾ËþËþµçÁ¦·¢¶¯¹¥»÷£¬£¬£¬ÇÔÈ¡²¢Ð¹Â¶Á˰üÀ¨¹¤³ÌʾÒâͼ¡¢²ÆÎñ¼Í¼ºÍСÎÒ˽¼Ò¿Í»§ÐÅÏ¢ÔÚÄÚµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£´Ë´ÎËþËþ¿Æ¼¼ÔâÊܵĹ¥»÷ÔÙ´ÎÌáÐÑÆóÒµÐèÔöÇ¿ÍøÂçÇå¾²·À»¤¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/indian-tech-giant-tata-technologies-hit-by-ransomware-attack/
5. GrubHubÔâÊý¾Ýй¶£¬£¬£¬¹¥»÷ÕßʹÓõÚÈý·½ÕË»§ÈëÇÖϵͳ
2ÔÂ4ÈÕ£¬£¬£¬Ê³ÎïÅäË͹«Ë¾GrubHubÔâÓöÁËÒ»´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬£¬¹¥»÷Õßͨ¹ýµÚÈý·½Ð§ÀÍÌṩÉ̵ÄÕË»§ÈëÇÖÁËGrubHubϵͳ£¬£¬£¬Ó°ÏìÁ˿ͻ§¡¢É̼ҺÍ˾»úµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬µ«ÏêϸÊÜÓ°ÏìÊýĿδ¹ûÕæ¡£¡£¡£¡£¡£¡£GrubHubѸËÙ½ÓÄÉÐж¯£¬£¬£¬ÖÕÖ¹ÁËÈëÇÖÕË»§µÄ»á¼ûȨÏÞ£¬£¬£¬²¢É¾³ýÁ˸ÃЧÀÍÌṩÉÌ£¬£¬£¬Í¬Ê±Ô¼ÇëÍⲿר¼ÒÆÀ¹ÀÓ°Ïì¡¢ÂÖ»»ÃÜÂë²¢ÔöÇ¿ÁËÄÚ²¿Ð§À͵ÄÒì³£¼ì²â¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬¹¥»÷Õßδ»ñÈ¡Ãô¸ÐµÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢£¬£¬£¬µ«¿ÉÄÜ»ñÈ¡Á˲¿·ÖУ԰ʳÌÃÓû§µÄÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¼°²¿·ÖÖ§¸¶¿¨ÐÅÏ¢£¨°üÀ¨¿¨ÀàÐͺÍ×îºóËÄλ¿¨ºÅ£©¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬¹¥»÷Õß»¹»á¼ûÁËijЩÒÅÁôϵͳµÄÉ¢ÁÐÃÜÂ룬£¬£¬GrubHubÒÑ×Ô¶¯ÂÖ»»¿ÉÄܱ£´æÎ£º¦µÄÃÜÂ룬£¬£¬²¢±Þ²ß¿Í»§Ê¹ÓÃÆæÒìÃÜÂëÒÔ½µµÍΣº¦¡£¡£¡£¡£¡£¡£GrubHubÔÚÌìÏÂ4000¶à¸ö¶¼»áÓµÓÐÁè¼Ý375000¼ÒÉ̼ҺÍ200000ÃûÅäËÍÏàÖúͬ°é£¬£¬£¬È¥ÄêÒò¶àÏîÎ¥·¨ÐÐΪ֧¸¶ÁË2500ÍòÃÀԪϢÕù½ð¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/grubhub-data-breach-impacts-customers-drivers-and-merchants/
6. CISA ½«Ëĸö±»Æð¾¢Ê¹ÓõÄÎó²îÌí¼Óµ½ KEV Ŀ¼ÖÐ
2ÔÂ5ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÖܶþÐû²¼ÁËÒ»ÏîÖ÷ÒªÇ徲ͨ¸æ£¬£¬£¬ÏòÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖÐÐÂÔöÁËËĸöÇå¾²Îó²î£¬£¬£¬²¢ÖÒÑÔÕâЩÎó²îÕý±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£ÕâЩÎó²î°üÀ¨£ºCVE-2024-45195£¬£¬£¬Ò»¸öApache OFBizÖеÄÇ¿ÖÆä¯ÀÀÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß»ñȡδÊÚȨ»á¼ûȨÏÞ²¢Ö´ÐÐí§Òâ´úÂ루ÒÑÐÞ¸´£©£»£»£»£»CVE-2024-29059£¬£¬£¬Microsoft .NET FrameworkÖеÄÐÅϢй¶Îó²î£¬£¬£¬¿ÉÄÜ̻¶Ãô¸ÐÐÅÏ¢²¢µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¨ÒÑÐÞ¸´£©£»£»£»£»CVE-2018-9276£¬£¬£¬Paessler PRTGÍøÂç¼àÊÓÆ÷ÖеIJÙ×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬£¬£¬ÔÊÐíÖÎÀíȨÏ޵Ĺ¥»÷ÕßÖ´ÐÐÏÂÁÒÑÐÞ¸´£©£»£»£»£»ÒÔ¼°CVE-2018-19410£¬£¬£¬Í¬ÑùÊÇPaessler PRTGÖеÄÍâµØÎļþ°üÀ¨Îó²î£¬£¬£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õß½¨Éè¾ßÓжÁдȨÏÞµÄÓû§£¨ÒÑÐÞ¸´£©¡£¡£¡£¡£¡£¡£Ö»¹ÜÕâЩÎó²îÒÑÓɸ÷×Ô¹©Ó¦ÉÌÐÞ¸´£¬£¬£¬µ«ÏÖÔÚÉÐÎÞ¹ØÓÚËüÃÇÔõÑùÔÚÕæÊµ¹¥»÷Öб»Ê¹ÓõÄÏêϸ¹ûÕæ±¨¸æ¡£¡£¡£¡£¡£¡£Îª´Ë£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©ÏÂÊô»ú¹¹±»½ôÆÈ±Þ²ßÔÚ2025Äê2ÔÂ25ÈÕǰӦÓÃÐëÒªµÄÐÞ¸´²½·¥£¬£¬£¬ÒÔÓÐÓÃÌá·ÀÕâЩ×Ô¶¯Íþв£¬£¬£¬È·±£ÍøÂçÇå¾²¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html


¾©¹«Íø°²±¸11010802024551ºÅ