ServiceBridgeÊý¾Ý¿âÉèÖùýʧµ¼ÖÂÊý°ÙÍòÌõÃô¸Ð¼Í¼̻¶

Ðû²¼Ê±¼ä 2024-08-28
1. ServiceBridgeÊý¾Ý¿âÉèÖùýʧµ¼ÖÂÊý°ÙÍòÌõÃô¸Ð¼Í¼̻¶


8ÔÂ26ÈÕ £¬£¬£¬£¬ServiceBridgeÊÇÒ»¼Ò×ܲ¿Î»ÓÚÖ¥¼Ó¸çµÄ×ÅÃûÏÖ³¡Ð§ÀÍÖÎÀíÆ½Ì¨ £¬£¬£¬£¬½üÆÚÒòÒ»´ÎÑÏÖØµÄÊý¾Ý¿âÉèÖùýʧ¶øÏÝÈëÊý¾Ýй¶Î£»£»£»ú¡£¡£¡£¡£ÍøÂçÇ徲ר¼ÒJeremiah Fowler½ÒÆÆÁËÕâÒ»Îó²î £¬£¬£¬£¬µ¼ÖÂÁè¼Ý3100ÍòÌõ¼Í¼¡¢×ܼÆ2.68TBµÄÃô¸ÐÊý¾Ý̻¶ÓÚ¹«ÖÚÊÓÒ° £¬£¬£¬£¬ÆäÖв»·¦ÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëÒÔÖ²¿·ÖÐÅÓÿ¨ÐÅÏ¢¼°HIPAA»®¶¨µÄСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢¡£¡£¡£¡£¸ÃÊý¾Ý¿âÎÞÐèÈκÎÇå¾²ÈÏÖ¤¼´¿É»á¼û £¬£¬£¬£¬ÇÒÊý¾Ý¿ç¶È³¤´ïÊ®Äê £¬£¬£¬£¬Éæ¼°¶à¸öÐÐÒµµÄÆóÒµºÍСÎÒ˽¼Ò £¬£¬£¬£¬°üÀ¨Ñ§Ð£¡¢×ڽ̻ú¹¹¡¢Á¬Ëø²ÍÌü¼°Ò½ÁÆÐ§ÀÍÌṩÕߵȡ£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý¹æÄ£ÖØ´óÇÒÃô¸Ð¶È¸ß £¬£¬£¬£¬ÒýÆðÁËÆÕ±éµÄÇå¾²ºÍÒþ˽µ£ÐÄ¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ·¢Æ±Ú²Æ­¡¢Éí·Ý͵ÇԵȲ»·¨ÐÐΪ £¬£¬£¬£¬²»µ«Íþвµ½ÆóÒµµÄ²ÆÎñÇå¾²ºÍÉùÓþ £¬£¬£¬£¬»¹¿ÉÄܸøÐ¡ÎÒ˽¼Ò´øÀ´ÉîÖØµÄ¾­¼ÃËðʧºÍÒþ˽ÇÖÕ¼¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬Êý¾Ý¿âÖл¹°üÀ¨ÎïÀíÇå¾²Ïà¹ØµÄÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬Èç´óÃÅÃÜÂëºÍ»á¼û¼Í¼ £¬£¬£¬£¬½øÒ»²½¼Ó¾çÁËDZÔÚµÄÇ徲Σº¦¡£¡£¡£¡£ServiceBridgeÔÚ½Óµ½Í¨ÖªºóÁ¬Ã¦¹Ø±ÕÁËÊý¾Ý¿âµÄ¹ûÕæ»á¼ûȨÏÞ £¬£¬£¬£¬µ«¹ØÓÚÊý¾Ýй¶µÄÒ»Á¬Ê±¼ä¼°ÊÇ·ñÒÑÓеÚÈý·½½éÈëÈÔ²»µÃ¶øÖª¡£¡£¡£¡£


https://hackread.com/servicebridge-expose-2tb-records-cloud-misconfiguration/


2. TDECUÔâClopÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬³¬50ÍòСÎÒ˽¼ÒÐÅϢй¶


8ÔÂ26ÈÕ £¬£¬£¬£¬µÂ¿ËÈøË¹ÌÕÊÏÔ±¹¤ÐÅÓÃÏàÖúÉ磨TDECU£©½üÆÚÐû²¼ £¬£¬£¬£¬Áè¼Ý50ÍòÃû³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢ÔÚÈ¥ÄêµÄÒ»´ÎÓɶíÓïÀÕË÷Èí¼þ×éÖ¯Clop·¢¶¯µÄºÚ¿Í¹¥»÷Öв»ÐÒй¶¡£¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÁËMOVEit TransferÖÎÀíÎļþ´«Ê䣨MFT£©Èí¼þÖеÄÁãÈÕÎó²î£¨CVE-2023-34362£© £¬£¬£¬£¬¸ÃÎó²îÓÚ2023Äê5ÔÂ31ÈÕ±»Progress Software¹ûÕæÅû¶¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Emsisoft¹ÀËã £¬£¬£¬£¬´Ë´ÎÊÂÎñ²¨¼°Áè¼Ý2700¸ö×éÖ¯ £¬£¬£¬£¬Ó°ÏìÈËÊý¸ß´ïÔ¼9600Íò¡£¡£¡£¡£TDECUÓÚÉÏÖÜÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ±¨¸æ £¬£¬£¬£¬²¢Ïò500,474ÃûÊÜÓ°Ïì³ÉÔ±·¢ËÍÁË֪ͨÐÅ £¬£¬£¬£¬ÐÅÖÐÏêÊöÁ˺ڿʹÓMOVEitÇÔÈ¡µÄÃô¸ÐÐÅÏ¢¹æÄ£ £¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕË»§¼°ÐÅÓÿ¨ºÅ¡¢¼ÝÕպŵÈÒªº¦Ð¡ÎÒ˽¼ÒÉí·Ý¼°²ÆÎñÐÅÏ¢¡£¡£¡£¡£Ö»¹ÜTDECUÏÖÔÚδ·¢Ã÷Òò¸ÃÊÂÎñµ¼ÖµÄÖ±½ÓÉí·Ý»ò½ðÈÚڲƭ°¸Àý £¬£¬£¬£¬µ«ÈÔΪÊÜÓ°Ïì³ÉÔ±ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ £¬£¬£¬£¬²¢½¨ÒéËûÃÇÉèÖÃڲƭ¾¯±¨»òÉêÇëÇå¾²¶³½á £¬£¬£¬£¬ÒÔÌá·ÀDZÔÚΣº¦¡£¡£¡£¡£


https://www.securityweek.com/500k-impacted-by-texas-dow-employees-credit-union-data-breach/


3. ARRLÏòÀÕË÷Èí¼þÍÅ»ïÖ§¸¶ÁË100ÍòÃÀÔªÊê½ð


8ÔÂ26ÈÕ £¬£¬£¬£¬ÌìÏÂÒµÓàÎÞÏßµçЭ»áÃÀ¹úÎÞÏßµçÖмÌͬÃË£¨ARRL£©½üÆÚÅû¶ £¬£¬£¬£¬¸Ã×éÖ¯ÔÚ2024Äê5ÔÂ15ÈÕÔâÊÜÁËÒ»³¡ÆÆËðÐÔµÄÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬ËæºóÖ§¸¶ÁË100ÍòÃÀÔªÊê½ðÒÔ»Ö¸´±»¼ÓÃܵÄÄÚ²¿ÍøÂçϵͳ¡£¡£¡£¡£´Ë´Î¹¥»÷²»µ«É漰̨ʽ»ú¡¢Ìõ¼Ç±¾µçÄÔ £¬£¬£¬£¬»¹²¨¼°WindowsºÍLinuxЧÀÍÆ÷ £¬£¬£¬£¬ÏÔʾÁ˸߶ȵÄ×éÖ¯ÐÔºÍЭµ÷ÐÔ¡£¡£¡£¡£¹¥»÷ÕßÔÚÊýÖÜǰ¾ÍÒÑDZÈëARRLµÄÏÖ³¡ºÍÔÆÏµÍ³ £¬£¬£¬£¬Ê¹ÓðµÍøÐÅϢʵÑéÈëÇÖ¡£¡£¡£¡£ÃæÁÙÊý°ÙÍòÃÀÔªµÄÀÕË÷ÒªÇó £¬£¬£¬£¬ARRL¾­Ð­É̺óÖ§¸¶ÁË100ÍòÃÀÔª £¬£¬£¬£¬Òò¹¥»÷ÕßδÄÜ»ñÈ¡Ãô¸ÐÊý¾Ý¶ø½µµÍÁËÊê½ð½ð¶î¡£¡£¡£¡£ARRLÇ¿µ÷ £¬£¬£¬£¬´Ë¿î×Ó¼°ºóÐøÐÞ¸´ÓöÈÖ÷ÒªÓɰü¹Ü¼ç¸º¡£¡£¡£¡£Ð§ÀÍÖÐֹʱ´ú £¬£¬£¬£¬°üÀ¨¡°ÌìÏÂÈÕÖ¾¡±£¨LoTW£©ÔÚÄڵĶàÏîЧÀͱ»ÔÝʱ¹Ø±Õ £¬£¬£¬£¬Ö±µ½7ÔÂ1ÈÕLoTW»Ö¸´ £¬£¬£¬£¬Ö»¹ÜÆäЧÀÍÆ÷×Ô¼ºÎ´Ö±½ÓÊÜË𠣬£¬£¬£¬µ«ÒÀÀµÆäËûÊÜÓ°ÏìµÄЧÀÍÆ÷¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬ARRL´ó²¿·ÖϵͳÒѻָ´ £¬£¬£¬£¬µ«»ù´¡ÉèÊ©µÄÖÜÈ«ÐÞ¸´ÈÔÐèÒ»Á½¸öÔÂʱ¼ä¡£¡£¡£¡£¹ØÓÚСÎÒ˽¼ÒÐÅϢй¶ÇéÐÎ £¬£¬£¬£¬ARRLδÃ÷ȷ˵Ã÷ £¬£¬£¬£¬µ«ÒÑ֪ͨÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ £¬£¬£¬£¬¿ÉÄÜÓÐ150ÃûÔ±¹¤µÄÐÅÏ¢£¨ÈçÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂ룩Êܵ½Ó°Ïì¡£¡£¡£¡£


https://www.securityweek.com/american-radio-relay-league-paid-1-million-to-ransomware-gang/


4. ConnexureÔâBlackSuitÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬½ü°ÙÍòÈËÊý¾Ýй¶


8ÔÂ27ÈÕ £¬£¬£¬£¬Young Consulting£¨ÏÖ¸üÃûΪConnexure£© £¬£¬£¬£¬Ò»¼ÒרעÓÚ¹ÍÖ÷Ö¹ËðÊг¡µÄÑÇÌØÀ¼´óÈí¼þ½â¾ö¼Æ»®ÉÌ £¬£¬£¬£¬¿ËÈÕ×îÏÈÏòÔ¼954,177ÃûÓû§·¢ËÍÊý¾Ýй¶֪ͨ £¬£¬£¬£¬ÕâÔ´ÓÚ½ñÄê4ÔÂ10ÈÕÔâÊܵÄBlackSuitÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼Ö°üÀ¨¼ÓÖÝÀ¶¶Ü»áÔ±ÔÚÄÚµÄÓû§Êý¾Ý±»µÁ £¬£¬£¬£¬ÈýÌìºó¹«Ë¾²Å²ì¾õϵͳ±»¼ÓÃÜ¡£¡£¡£¡£¾­ÊÓ²ì £¬£¬£¬£¬È·ÈÏй¶ÐÅÏ¢°üÀ¨È«Ãû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¼°°ü¹ÜË÷ÅâÏêÇé¡£¡£¡£¡£Îª¼õÇáÓ°Ïì £¬£¬£¬£¬ConnexureΪÊÜÓ°ÏìµÄÓû§ÌṩCyberScoutµÄ12¸öÔÂÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍÖÁ2024Äê11ÔÂβ¡£¡£¡£¡£¼øÓÚBlackSuitÒÑÔÚ°µÍøÀÕË÷ÃÅ»§ÉÏÐû²¼²¿·ÖÊý¾Ý £¬£¬£¬£¬Óû§ÐèÁ¬Ã¦Ê¹ÓôËЧÀͲ¢Ð¡ÐÄδÊÚȨͨѶ¡¢ÍøÂç´¹ÂÚ¼°Õ©Æ­ÍýÏë¡£¡£¡£¡£ÍþвÕß²»µ«Ðû³Æ¶Ô¹¥»÷ÈÏÕæ £¬£¬£¬£¬»¹Íþв½øÒ»²½Ð¹Â¶¸ü¶àδÅû¶µÄÐÅÏ¢ £¬£¬£¬£¬ÈçÉÌÒµÌõÔ¼¡¢Ô±¹¤»¤ÕÕ¡¢¼Òͥϸ½Ú¼°²ÆÎñÊý¾ÝµÈ £¬£¬£¬£¬µ«Ïà¹ØËµ·¨ÉÐδ¾­×ÔÁ¦ÑéÖ¤¡£¡£¡£¡£

https://www.bleepingcomputer.com/news/security/blacksuit-ransomware-stole-data-of-950-000-from-software-vendor/


5. Microsoft SwayÔÚ´ó¹æÄ£¶þάÂëÍøÂç´¹ÂڻÖб»ÀÄÓÃ


8ÔÂ27ÈÕ £¬£¬£¬£¬NetskopeÍþвʵÑéÊÒ½üÆÚ½ÒÆÆÁËÒ»Æð´ó¹æÄ£µÄÍøÂç´¹Âڻ £¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃMicrosoft SwayÕâÒ»ÔÚÏßÑÝʾƽ̨ £¬£¬£¬£¬Í¨¹ýÍйܴ¹ÂÚµÇÂ¼Ò³Ãæ £¬£¬£¬£¬Õë¶ÔMicrosoft 365Óû§ÊµÑ鯾֤ÇÔÈ¡¡£¡£¡£¡£×Ô2024Äê7ÔÂÒÔÀ´ £¬£¬£¬£¬´ËÀ๥»÷ÊýÄ¿¼±¾çì­Éý £¬£¬£¬£¬Ö÷Òª²¨¼°ÑÇÖÞÓë±±ÃÀµØÇø £¬£¬£¬£¬¿Æ¼¼¡¢ÖÆÔì¼°½ðÈÚµÈÐÐÒµ³ÉÎªÖØÔÖÇø¡£¡£¡£¡£¹¥»÷ÕßÓÕµ¼Êܺ¦ÕßɨÃè¶þάÂë £¬£¬£¬£¬½ø¶øÌø×ªÖÁ¶ñÒâÍøÕ¾ £¬£¬£¬£¬ÓÈÆäʹÓÃÒÆ¶¯×°±¸Çå¾²±¡ÈõµÄÌØµã £¬£¬£¬£¬ÈƹýÇå¾²¼ì²â¡£¡£¡£¡£¹¥»÷ÊֶΰüÀ¨Í¸Ã÷ÍøÂç´¹ÂÚ £¬£¬£¬£¬ÇÔÈ¡¶àÒòËØÈÏÖ¤ÐÅÏ¢ £¬£¬£¬£¬Ê¹Êܺ¦ÕßÔÚ²»ÖªÇéϵǼÆäÕË»§¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃCloudflare Turnstile¹¤¾ß £¬£¬£¬£¬Òþ²Ø´¹ÂÚÄÚÈÝ £¬£¬£¬£¬Î¬»¤ÓòÃûÉùÓþ £¬£¬£¬£¬ÌÓ±ÜÍøÂç¹ýÂËЧÀÍ×èµ²¡£¡£¡£¡£´Ë´ÎÊÂÎñÓëÎåÄêǰµÄPerSwaysionÍøÂç´¹ÂڻÀàËÆ £¬£¬£¬£¬¾ùͨ¹ýMaaS²Ù×÷ £¬£¬£¬£¬ÀÖ³ÉÉøÍ¸¶à¼ÒÆóÒµ¸ß²ãÕË»§ £¬£¬£¬£¬°üÀ¨ÃÀ¹ú¡¢¼ÓÄôóµÈ¶à¹ú¹«Ë¾¸ß¹Ü¡£¡£¡£¡£ÕâÔÙ´ÎÌáÐÑÓû§ÐèÌá¸ßСÐÄ £¬£¬£¬£¬Ìá·À¶þάÂëÍøÂç´¹ÂÚΣº¦¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-sway-abused-in-massive-qr-code-phishing-campaign/


6. ¶ñÒâÈí¼þMalAgent.AutoITBot £¬£¬£¬£¬Gmail¼°¶àƽ̨ÕÊ»§µÄÒþÃØÍþв


8ÔÂ27ÈÕ £¬£¬£¬£¬SonicWall Capture Labs ×î½üÕ¹ÏÖÁËÃûΪ MalAgent.AutoITBot µÄÐÂÐͶñÒâÈí¼þ £¬£¬£¬£¬ËüרÃÅÕë¶Ô Gmail ÕË»§Ìᳫ¹¥»÷ £¬£¬£¬£¬µ«Íþв¹æÄ£Ô¶²»Ö¹ÓÚ´Ë¡£¡£¡£¡£Õâ¿îͨ¹ý AutoIT ±àÒëµÄ¡°File.exe¡±³ÌÐò £¬£¬£¬£¬Ê¹ÓöÁÈ¡¼ôÌù°å¡¢²¶»ñ°´¼üÒÔÖ¿ØÖƼüÅÌÊó±êµÈÖØ´óÊÖ¶ÎÈëÇÖÓû§ÏµÍ³¡£¡£¡£¡£MalAgent ²»µ«ÊÔͼͨ¹ýÖ÷Á÷ä¯ÀÀÆ÷»á¼û Gmail £¬£¬£¬£¬»¹Õ¹ÏÖ³öÊý¾ÝÇÔÈ¡¡¢ÏµÍ³Ê¹Óü°·´ÆÊÎöÄÜÁ¦µÄ¶àÃæÐÔ £¬£¬£¬£¬Ê¹ÆäÄÜÇáËÉÍøÂçÃô¸ÐÐÅÏ¢²¢×è°­Çå¾²ÆÊÎö¡£¡£¡£¡£SonicWall ʹÓÃרҵ¹¤¾ßÆÊÎöÆäÐÐΪ £¬£¬£¬£¬·¢Ã÷Æä¸ß¶È»ìÏýµÄ´úÂëºÍ¶¯Ì¬C2ÅþÁ¬ÉèÖà £¬£¬£¬£¬ÔöÌíÁË×·×ÙÄѶÈ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»¹°üÀ¨Õë¶ÔÆäËûÉ罻ýÌåÆ½Ì¨µÄµÇ¼Á´½Ó £¬£¬£¬£¬ÏÔʾ³öÆä¶àÄ¿µÄ¹¥»÷µÄÌØÕ÷¡£¡£¡£¡£ÁîÈ˵£ÐĵÄÊÇ £¬£¬£¬£¬MalAgent Äܾ²Ä¬ÔËÐжà¸öÀú³Ì £¬£¬£¬£¬ÈçÒþ²ØÒ³Ãæ²Ù×÷ºÍÍøÂçÌ×½Ó×ÖʵÑé £¬£¬£¬£¬ÒÔÌӱܼì²â¡£¡£¡£¡£ÕâÒ»·¢Ã÷Ç¿µ÷ÁËÔÚ´¦Öóͷ£Î´ÖªÎļþʱÐè¼á³Ö¸ß¶ÈСÐÄ £¬£¬£¬£¬ÒÔÃâ³ÉΪÆäDZÔÚÊܺ¦Õß¡£¡£¡£¡£


https://securityonline.info/sonicwall-warns-new-malware-targets-gmail/