GE ³¬Éù×°±¸Îó²î°Ù³öÒ×ÔâÊÜÀÕË÷Èí¼þºÍÊý¾Ý͵ÇÔ
Ðû²¼Ê±¼ä 2024-05-205ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚ GE HealthCare µÄ Vivid Ultrasound ϵÁвúÆ·ÒÔ¼°Á½¸öÏà¹ØÈí¼þ³ÌÐòÖз¢Ã÷ÁË 11 ¸öÇå¾²Îó²î¡£¡£¡£¡£¡£¡£¡£ÎÊÌâ¶àÖÖ¶àÑù£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ãô¸ÐÊý¾ÝȱÉÙ¼ÓÃÜ¡¢Ê¹ÓÃÓ²±àÂëÆ¾Ö¤µÈµÈ¡£¡£¡£¡£¡£¡£¡£CVSS 3.1 ÆÀ·ÖϵͳµÄÑÏÖØË®Æ½´Ó 5.7 µ½ 9.6 ²»µÈ¡£¡£¡£¡£¡£¡£¡£ÕýÈç Nozomi NetworksÔÚÆä±¨¸æÖÐËùÚ¹Ê͵ÄÄÇÑù£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩ¹ýʧ¿ÉÄܻᵼÖ¾ßÓÐÍêȫȨÏÞµÄÔ¶³Ì´úÂëÖ´ÐÐ (RCE) ÒÔ¼°´ËÀàȨÏÞ¿ÉÄÜ´øÀ´µÄÈκÎÊýÄ¿µÄ¹¥»÷³¡¾°¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬£¬×îÑÏÖØµÄÇéÐλ¹ÐèÒªÎïÆÊÎö¼ûÏà¹Ø×°±¸£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶ø´ó´ó½µµÍÒ½ÁÆ»ú¹¹µÄDZÔÚΣº¦¡£¡£¡£¡£¡£¡£¡£ÊÂʵÉÏ£¬£¬£¬£¬£¬£¬£¬£¬³¬Éù²¨»úÓÃÓÚÍⲿְԱ¾³£»á¼ûµÄÒ½ÔººÍÕïËù£¬£¬£¬£¬£¬£¬£¬£¬¶ø¿·¢k8Ñо¿Åú×¢£¬£¬£¬£¬£¬£¬£¬£¬Ö»ÐèÒ»·ÖÖÓµÄÎïÆÊÎö¼û¾Í×ãÒÔÖ´Ðй¥»÷¡£¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬£¬£¬ÎÒÃÇÒÔΪ²»µ«ÊǶñÒâµÄÄÚ²¿Ö°Ô±£¬£¬£¬£¬£¬£¬£¬£¬µ«ÍâÈËÒ²¿ÉÄÜÓÐʱ»úÍê³É¹¥»÷¡£¡£¡£¡£¡£¡£¡£
https://www.darkreading.com/vulnerabilities-threats/ge-ultrasound-gear-riddled-with-bugs-open-to-ransomware-data-theft
2. µç×Ó´¦·½ÌṩÉÌ MEDISECURE Êܵ½ÀÕË÷Èí¼þ¹¥»÷µÄÓ°Ïì
5ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬°Ä´óÀûÑǵĵç×Ó´¦·½ÌṩÉÌ MediSecure ÔâÊÜÁË¿ÉÄÜÀ´×ÔµÚÈý·½¹©Ó¦É̵ÄÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¡£MediSecure ÊÇÒ»¼ÒÌṩÊý×Ö¿µ½¡½â¾ö¼Æ»®µÄ¹«Ë¾£¬£¬£¬£¬£¬£¬£¬£¬ÌØÊâרעÓÚ°Ä´óÀûÑǵÄÇå¾²µç×Ó´¦·½½»¸¶Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÔâÊÜÍøÂç¹¥»÷ºó±»ÆÈ¹Ø±ÕÆäÍøÕ¾ºÍµç»°Ïß·£¬£¬£¬£¬£¬£¬£¬£¬µ«Ã»ÓÐÌá¼°ÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕß»ñµÃÁËÊýÄ¿²»ÏêµÄСÎÒ˽¼ÒµÄСÎÒ˽¼ÒºÍ¿µ½¡ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÈÔÔÚ¹ú¼ÒÍøÂçÇ徲е÷Ô±µÄ×ÊÖúÏÂÊÓ²ìÕâÒ»Çå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾Í¸Â¶£¬£¬£¬£¬£¬£¬£¬£¬ÔçÆÚ¼£ÏóÅú×¢¸ÃÊÂÎñÔ´×ÔÆäµÚÈý·½¹©Ó¦ÉÌÖ®Ò»¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/163257/cyber-crime/medisecure-impacted-by-ransomware-attack.html
3. ºÚ¿ÍʹÓÃÐéα DocuSign Ä£°åÀ´Õ©Æ×éÖ¯
5ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ê¹Óÿ´ËÆÀ´×Ô DocuSign µÄµç×ÓÓʼþµÄÍøÂç´¹ÂÚ¹¥»÷¼¤Ôö£¬£¬£¬£¬£¬£¬£¬£¬ÊÇÓɶíÂÞ˹°µÍøÊг¡Íƶ¯µÄ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÊг¡ÓµÓÐÖÖÖÖÄ£°åºÍµÇ¼ƾ֤¡£¡£¡£¡£¡£¡£¡£ÕâЩڲÆÐÔµç×ÓÓʼþ¾ÓÉÈ«ÐÄÉè¼Æ£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÄ£ÄâÕýµ±µÄÎĵµÊðÃûÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬ÒýÓÕºÁÎÞ½äÐĵÄÊÕ¼þÈ˵ã»÷¶ñÒâÁ´½Ó»òй¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£×î½üÕâЩ¹¥»÷µÄÔöÌí¿É¹éÒòÓÚ¼¸¸öÒòËØ£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨¸Ãƽ̨ÔÚ¸÷¸öÐÐÒµµÄÆÕ±é½ÓÄÉ¡¢ÆäÖµµÃÐÅÈεÄÉùÓþ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°×îÖ÷ÒªµÄÊÇÍøÂç·¸·¨Õ½ÂÔµÄÈÕÒæÖØ´ó¡£¡£¡£¡£¡£¡£¡£ÔÚÕâÖÖÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬£¬Òì³£Ñо¿Ö°Ô±´Ó¶Ô¿Í»§µÄÒ»´Î¹¥»÷ÖлñÈ¡ÁËÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚµØÏÂÂÛ̳ºÍÍøÂçÉϾÙÐÐÁËËÑË÷¡£¡£¡£¡£¡£¡£¡£×îÖÕ£¬£¬£¬£¬£¬£¬£¬£¬ËÑË÷½«ËûÃÇ´øµ½Á˶íÂÞ˹Êг¡£¬£¬£¬£¬£¬£¬£¬£¬ÔÚÄÇÀïËûÃÇÕÒµ½ÁËÏàͬµÄ DocuSign Ä£°å¡£¡£¡£¡£¡£¡£¡£²»Á¼ÐÐΪÕßÔËÐÐÍøÂç´¹Âڻʱ£¬£¬£¬£¬£¬£¬£¬£¬»áÊÔͼͨ¹ýÈõç×ÓÓʼþ¿´ÆðÀ´À´×ÔÕýµ±ÈªÔ´£¨ÀýÈçÆóÒµ»òСÎÒ˽¼Ò£©À´ÓªÔìÕæÊµµÄÆø·Õ£¬£¬£¬£¬£¬£¬£¬£¬ÕâÖÖÇéÐβ¢²»ÓÐÊý¡£¡£¡£¡£¡£¡£¡£½ü¼¸¸öÔÂÀ´£¬£¬£¬£¬£¬£¬£¬£¬Óб¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬£¬ÓÐÈËÔÚÊÕµ½¿´ËÆÀ´×ÔÃÀ¹úÓÊÕþЧÀ͵ĶÌÐźóÏÝÈëÕ©Æ¡£¡£¡£¡£¡£¡£¡£
https://securityboulevard.com/2024/05/hackers-use-fake-docusign-templates-to-scam-organizations/
4. ɣ̹µÂÒøÐб¬·¢Êý¾ÝÐ¹Â¶Éæ¼°µÚÈý·½¹©Ó¦ÉÌ
5ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Î÷°àÑÀÒøÐлú¹¹É£Ì¹µÂÒøÐÐ (Santander) Ðû²¼£¬£¬£¬£¬£¬£¬£¬£¬¸Ã»ú¹¹×î½üÔâÊÜÁËÒ»´ÎÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬Êܺ¦Õß»ñµÃÁ˶ԵÚÈý·½ÌṩÉÌÍйܵÄÊý¾Ý¿âµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£Î¥¹æÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬£¬£¬£¬É£Ì¹µÂÒøÐÐÁ¬Ã¦½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ý×èÖ¹¶ÔÊÜËðÊý¾Ý¿âµÄ»á¼ûÀ´ÏÞÖÆÈëÇÖ¹æÄ£¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÒ»·ÝÐÂΟåÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬»¹½¨ÉèÁËÚ²ÆÔ¤·À¿ØÖƲ½·¥£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»£»£»¤ÊÜÎ¥¹æÓ°ÏìµÄ¿Í»§£¬£¬£¬£¬£¬£¬£¬£¬µ«Î´Ìá¼°ÌṩÉ̵ÄÃû³Æ¡£¡£¡£¡£¡£¡£¡£É£Ì¹µÂÒøÐеÄÒ»·ÝÉùÃ÷³Æ£º¡°Êý¾Ý¿âÖв»°üÀ¨ÉúÒâÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬Ò²²»°üÀ¨ÈκÎÔÊÐíÔÚÕË»§ÉϾÙÐÐÉúÒâµÄƾ֤£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÍøÉÏÒøÐÐÏêϸÐÅÏ¢ºÍÃÜÂë¡£¡£¡£¡£¡£¡£¡£¡±Ëü»¹Ö¸³ö£¬£¬£¬£¬£¬£¬£¬£¬ÒøÐеÄÔËÓªºÍϵͳûÓÐÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬£¬ÕâÒâζ×ſͻ§ÈÔÈ»¿ÉÒÔÑ¡Ôñ¾ÙÐÐÉúÒâ¡£¡£¡£¡£¡£¡£¡£ÔÚ¶ÔÍøÂçÊÂÎñµÄÊÓ²ìÖУ¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾·¢Ã÷ÓëÖÇÀû¡¢Î÷°àÑÀºÍÎÚÀ¹ç¿Í»§Ïà¹ØµÄÐÅÏ¢ÒÔ¼°²¿·Öǰɣ̹µÂÒøÐÐÔ±¹¤µÄÐÅÏ¢±»»á¼û¡£¡£¡£¡£¡£¡£¡£
https://www.darkreading.com/cyberattacks-data-breaches/santander-falls-victim-to-data-breach-involving-third-party-provider
5. Kimsuky ºÚ¿ÍÔÚ¶Ôº«¹úµÄ¹¥»÷Öа²ÅÅÐ嵀 Linux ºóÃÅ
5ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬³¯ÏʺڿÍ×éÖ¯ Kimsuki Ò»Ö±ÔÚʹÓÃÒ»ÖÖÃûΪ Gomir µÄРLinux ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬ËüÊÇͨ¹ýľÂíÈí¼þ×°ÖóÌÐòÈö²¥µÄ GoBear ºóÃŵÄÒ»¸ö°æ±¾¡£¡£¡£¡£¡£¡£¡£Kimsuky ÊÇÒ»¸öÊܹú¼ÒÖ§³ÖµÄÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬£¬£¬Ó볯ÏʾüÊÂÇ鱨»ú¹¹Õì̽×Ü¾Ö (RGB) ÓÐÁªÏµ¡£¡£¡£¡£¡£¡£¡£2024 Äê 2 ÔÂÉÏÑ®£¬£¬£¬£¬£¬£¬£¬£¬SW2 ÍþвÇ鱨¹«Ë¾µÄÑо¿Ö°Ô±±¨¸æÁËÒ»Ïî»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ Kimsuky ʹÓÃÖÖÖÖÈí¼þ½â¾ö¼Æ»®µÄľÂí°æ±¾£¨ÀýÈç SGA Solutions¡¢Wizvera VeraPort µÄ TrustPKI ºÍ NX_PRNMAN£©£¬£¬£¬£¬£¬£¬£¬£¬Ê¹Óà Troll Stealer ºÍ»ùÓÚ Go µÄ¶ñÒâÈí¼þѬȾº«¹úÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£Windows ¶ñÒâÈí¼þ GoBear¡£¡£¡£¡£¡£¡£¡£Broadcom ¹«Ë¾ÈüÃÅÌú¿ËµÄÆÊÎöʦÔÚÊÓ²ìÕë¶Ôº«¹úÕþ¸®×éÖ¯µÄͳһ»î¶¯Ê±·¢Ã÷ÁËÒ»ÖÖеĶñÒ⹤¾ß£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ßËÆºõÊÇ GoBear ºóÃÅµÄ Linux ±äÌå¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/kimsuky-hackers-deploy-new-linux-backdoor-in-attacks-on-south-korea/
6. Singing RiverµÄÒ½ÁÆÏµÍ³±¬·¢´ó¹æÄ£Êý¾Ýй¶
5ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÃÜÎ÷Î÷±ÈÖÝ Singing River µÄÒ»¼ÒÖ÷ÒªÒ½ÁƱ£½¡ÌṩÉÌ×î½üÅû¶£¬£¬£¬£¬£¬£¬£¬£¬2023 Äê 8 ÔµÄÒ»´ÎÍøÂç¹¥»÷Ó°ÏìÁË 895,204 È˵ÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¸ÃÒ½ÁÆÍøÂç°üÀ¨ÅÁ˹¿¨¹ÅÀ¡¢º£ÈªÊк͸ñ¶û·ò²¨ÌصÄÒ½ÔºÒÔ¼°¸ÃµØÇøµÄÆäËûÒ½ÁÆ»ú¹¹¡£¡£¡£¡£¡£¡£¡£2023 Äê 8 Ô 19 ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ðû²¼³ÉÎªÖØ´óÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÒ½ÔºÖÐÖ¹ºÍDZÔÚµÄÊý¾Ý͵ÇÔ¡£¡£¡£¡£¡£¡£¡£×èÖ¹ 8 ÔÂ⣬£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯Òѱ»ÁÐÈëÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿ÃñȨ°ì¹«ÊÒµÄÎ¥¹æÃÅ»§ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìÈËÊýÔݶ¨Îª 501 ÈË¡£¡£¡£¡£¡£¡£¡£2023 Äê 9 Ô 13 ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬È·ÈÏÊý¾Ý±»µÁ£¬£¬£¬£¬£¬£¬£¬£¬×èֹͬÄê 12 Ô 18 ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¾Ý±¨µÀ¸ÃÎó²îÒÑÓ°Ïì 252,890 ÈË¡£¡£¡£¡£¡£¡£¡£¼¸ÌìǰÏòÃåÒòÖÝÕþ¸®ÌṩµÄ×îиüÐÂÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìÈËÊýÔöÌíÖÁ 895,204 ÈË¡£¡£¡£¡£¡£¡£¡£
https://meterpreter.org/massive-data-breach-at-singing-river-health-system-nearly-900000-affected/


¾©¹«Íø°²±¸11010802024551ºÅ