ServiceBridgeÊý¾Ý¿âÉèÖùýʧµ¼ÖÂÊý°ÙÍòÌõÃô¸Ð¼Í¼̻¶

Ðû²¼Ê±¼ä 2024-08-28
1. ServiceBridgeÊý¾Ý¿âÉèÖùýʧµ¼ÖÂÊý°ÙÍòÌõÃô¸Ð¼Í¼̻¶


8ÔÂ26ÈÕ £¬£¬£¬£¬£¬£¬ServiceBridgeÊÇÒ»¼Ò×ܲ¿Î»ÓÚÖ¥¼Ó¸çµÄ×ÅÃûÏÖ³¡Ð§ÀÍÖÎÀíÆ½Ì¨ £¬£¬£¬£¬£¬£¬½üÆÚÒòÒ»´ÎÑÏÖØµÄÊý¾Ý¿âÉèÖùýʧ¶øÏÝÈëÊý¾Ýй¶Î£» £»£»£»£»£»ú¡£¡£¡£¡£ ¡£¡£ÍøÂçÇ徲ר¼ÒJeremiah Fowler½ÒÆÆÁËÕâÒ»Îó²î £¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý3100ÍòÌõ¼Í¼¡¢×ܼÆ2.68TBµÄÃô¸ÐÊý¾Ý̻¶ÓÚ¹«ÖÚÊÓÒ° £¬£¬£¬£¬£¬£¬ÆäÖв»·¦ÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëÒÔÖ²¿·ÖÐÅÓÿ¨ÐÅÏ¢¼°HIPAA»®¶¨µÄСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢¡£¡£¡£¡£ ¡£¡£¸ÃÊý¾Ý¿âÎÞÐèÈκÎÇå¾²ÈÏÖ¤¼´¿É»á¼û £¬£¬£¬£¬£¬£¬ÇÒÊý¾Ý¿ç¶È³¤´ïÊ®Äê £¬£¬£¬£¬£¬£¬Éæ¼°¶à¸öÐÐÒµµÄÆóÒµºÍСÎÒ˽¼Ò £¬£¬£¬£¬£¬£¬°üÀ¨Ñ§Ð£¡¢×ڽ̻ú¹¹¡¢Á¬Ëø²ÍÌü¼°Ò½ÁÆÐ§ÀÍÌṩÕߵȡ£¡£¡£¡£ ¡£¡£´Ë´Îй¶µÄÊý¾Ý¹æÄ£ÖØ´óÇÒÃô¸Ð¶È¸ß £¬£¬£¬£¬£¬£¬ÒýÆðÁËÆÕ±éµÄÇå¾²ºÍÒþ˽µ£ÐÄ¡£¡£¡£¡£ ¡£¡£Ð¹Â¶µÄÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ·¢Æ±Ú²Æ­¡¢Éí·Ý͵ÇԵȲ»·¨ÐÐΪ £¬£¬£¬£¬£¬£¬²»µ«Íþвµ½ÆóÒµµÄ²ÆÎñÇå¾²ºÍÉùÓþ £¬£¬£¬£¬£¬£¬»¹¿ÉÄܸøÐ¡ÎÒ˽¼Ò´øÀ´ÉîÖØµÄ¾­¼ÃËðʧºÍÒþ˽ÇÖÕ¼¡£¡£¡£¡£ ¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬Êý¾Ý¿âÖл¹°üÀ¨ÎïÀíÇå¾²Ïà¹ØµÄÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬£¬£¬Èç´óÃÅÃÜÂëºÍ»á¼û¼Í¼ £¬£¬£¬£¬£¬£¬½øÒ»²½¼Ó¾çÁËDZÔÚµÄÇ徲Σº¦¡£¡£¡£¡£ ¡£¡£ServiceBridgeÔÚ½Óµ½Í¨ÖªºóÁ¬Ã¦¹Ø±ÕÁËÊý¾Ý¿âµÄ¹ûÕæ»á¼ûȨÏÞ £¬£¬£¬£¬£¬£¬µ«¹ØÓÚÊý¾Ýй¶µÄÒ»Á¬Ê±¼ä¼°ÊÇ·ñÒÑÓеÚÈý·½½éÈëÈÔ²»µÃ¶øÖª¡£¡£¡£¡£ ¡£¡£


https://hackread.com/servicebridge-expose-2tb-records-cloud-misconfiguration/


2. TDECUÔâClopÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬³¬50ÍòСÎÒ˽¼ÒÐÅϢй¶


8ÔÂ26ÈÕ £¬£¬£¬£¬£¬£¬µÂ¿ËÈøË¹ÌÕÊÏÔ±¹¤ÐÅÓÃÏàÖúÉ磨TDECU£©½üÆÚÐû²¼ £¬£¬£¬£¬£¬£¬Áè¼Ý50ÍòÃû³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢ÔÚÈ¥ÄêµÄÒ»´ÎÓɶíÓïÀÕË÷Èí¼þ×éÖ¯Clop·¢¶¯µÄºÚ¿Í¹¥»÷Öв»ÐÒй¶¡£¡£¡£¡£ ¡£¡£´Ë´Î¹¥»÷ʹÓÃÁËMOVEit TransferÖÎÀíÎļþ´«Ê䣨MFT£©Èí¼þÖеÄÁãÈÕÎó²î£¨CVE-2023-34362£© £¬£¬£¬£¬£¬£¬¸ÃÎó²îÓÚ2023Äê5ÔÂ31ÈÕ±»Progress Software¹ûÕæÅû¶¡£¡£¡£¡£ ¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Emsisoft¹ÀËã £¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ²¨¼°Áè¼Ý2700¸ö×éÖ¯ £¬£¬£¬£¬£¬£¬Ó°ÏìÈËÊý¸ß´ïÔ¼9600Íò¡£¡£¡£¡£ ¡£¡£TDECUÓÚÉÏÖÜÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ±¨¸æ £¬£¬£¬£¬£¬£¬²¢Ïò500,474ÃûÊÜÓ°Ïì³ÉÔ±·¢ËÍÁË֪ͨÐÅ £¬£¬£¬£¬£¬£¬ÐÅÖÐÏêÊöÁ˺ڿʹÓMOVEitÇÔÈ¡µÄÃô¸ÐÐÅÏ¢¹æÄ£ £¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕË»§¼°ÐÅÓÿ¨ºÅ¡¢¼ÝÕպŵÈÒªº¦Ð¡ÎÒ˽¼ÒÉí·Ý¼°²ÆÎñÐÅÏ¢¡£¡£¡£¡£ ¡£¡£Ö»¹ÜTDECUÏÖÔÚδ·¢Ã÷Òò¸ÃÊÂÎñµ¼ÖµÄÖ±½ÓÉí·Ý»ò½ðÈÚڲƭ°¸Àý £¬£¬£¬£¬£¬£¬µ«ÈÔΪÊÜÓ°Ïì³ÉÔ±ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ £¬£¬£¬£¬£¬£¬²¢½¨ÒéËûÃÇÉèÖÃڲƭ¾¯±¨»òÉêÇëÇå¾²¶³½á £¬£¬£¬£¬£¬£¬ÒÔÌá·ÀDZÔÚΣº¦¡£¡£¡£¡£ ¡£¡£


https://www.securityweek.com/500k-impacted-by-texas-dow-employees-credit-union-data-breach/


3. ARRLÏòÀÕË÷Èí¼þÍÅ»ïÖ§¸¶ÁË100ÍòÃÀÔªÊê½ð


8ÔÂ26ÈÕ £¬£¬£¬£¬£¬£¬ÌìÏÂÒµÓàÎÞÏßµçЭ»áÃÀ¹úÎÞÏßµçÖмÌͬÃË£¨ARRL£©½üÆÚÅû¶ £¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔÚ2024Äê5ÔÂ15ÈÕÔâÊÜÁËÒ»³¡ÆÆËðÐÔµÄÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬ËæºóÖ§¸¶ÁË100ÍòÃÀÔªÊê½ðÒÔ»Ö¸´±»¼ÓÃܵÄÄÚ²¿ÍøÂçϵͳ¡£¡£¡£¡£ ¡£¡£´Ë´Î¹¥»÷²»µ«É漰̨ʽ»ú¡¢Ìõ¼Ç±¾µçÄÔ £¬£¬£¬£¬£¬£¬»¹²¨¼°WindowsºÍLinuxЧÀÍÆ÷ £¬£¬£¬£¬£¬£¬ÏÔʾÁ˸߶ȵÄ×éÖ¯ÐÔºÍЭµ÷ÐÔ¡£¡£¡£¡£ ¡£¡£¹¥»÷ÕßÔÚÊýÖÜǰ¾ÍÒÑDZÈëARRLµÄÏÖ³¡ºÍÔÆÏµÍ³ £¬£¬£¬£¬£¬£¬Ê¹ÓðµÍøÐÅϢʵÑéÈëÇÖ¡£¡£¡£¡£ ¡£¡£ÃæÁÙÊý°ÙÍòÃÀÔªµÄÀÕË÷ÒªÇó £¬£¬£¬£¬£¬£¬ARRL¾­Ð­É̺óÖ§¸¶ÁË100ÍòÃÀÔª £¬£¬£¬£¬£¬£¬Òò¹¥»÷ÕßδÄÜ»ñÈ¡Ãô¸ÐÊý¾Ý¶ø½µµÍÁËÊê½ð½ð¶î¡£¡£¡£¡£ ¡£¡£ARRLÇ¿µ÷ £¬£¬£¬£¬£¬£¬´Ë¿î×Ó¼°ºóÐøÐÞ¸´ÓöÈÖ÷ÒªÓɰü¹Ü¼ç¸º¡£¡£¡£¡£ ¡£¡£Ð§ÀÍÖÐֹʱ´ú £¬£¬£¬£¬£¬£¬°üÀ¨¡°ÌìÏÂÈÕÖ¾¡±£¨LoTW£©ÔÚÄڵĶàÏîЧÀͱ»ÔÝʱ¹Ø±Õ £¬£¬£¬£¬£¬£¬Ö±µ½7ÔÂ1ÈÕLoTW»Ö¸´ £¬£¬£¬£¬£¬£¬Ö»¹ÜÆäЧÀÍÆ÷×Ô¼ºÎ´Ö±½ÓÊÜË𠣬£¬£¬£¬£¬£¬µ«ÒÀÀµÆäËûÊÜÓ°ÏìµÄЧÀÍÆ÷¡£¡£¡£¡£ ¡£¡£ÏÖÔÚ £¬£¬£¬£¬£¬£¬ARRL´ó²¿·ÖϵͳÒѻָ´ £¬£¬£¬£¬£¬£¬µ«»ù´¡ÉèÊ©µÄÖÜÈ«ÐÞ¸´ÈÔÐèÒ»Á½¸öÔÂʱ¼ä¡£¡£¡£¡£ ¡£¡£¹ØÓÚСÎÒ˽¼ÒÐÅϢй¶ÇéÐÎ £¬£¬£¬£¬£¬£¬ARRLδÃ÷ȷ˵Ã÷ £¬£¬£¬£¬£¬£¬µ«ÒÑ֪ͨÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ £¬£¬£¬£¬£¬£¬¿ÉÄÜÓÐ150ÃûÔ±¹¤µÄÐÅÏ¢£¨ÈçÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂ룩Êܵ½Ó°Ïì¡£¡£¡£¡£ ¡£¡£


https://www.securityweek.com/american-radio-relay-league-paid-1-million-to-ransomware-gang/


4. ConnexureÔâBlackSuitÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬½ü°ÙÍòÈËÊý¾Ýй¶


8ÔÂ27ÈÕ £¬£¬£¬£¬£¬£¬Young Consulting£¨ÏÖ¸üÃûΪConnexure£© £¬£¬£¬£¬£¬£¬Ò»¼ÒרעÓÚ¹ÍÖ÷Ö¹ËðÊг¡µÄÑÇÌØÀ¼´óÈí¼þ½â¾ö¼Æ»®ÉÌ £¬£¬£¬£¬£¬£¬¿ËÈÕ×îÏÈÏòÔ¼954,177ÃûÓû§·¢ËÍÊý¾Ýй¶֪ͨ £¬£¬£¬£¬£¬£¬ÕâÔ´ÓÚ½ñÄê4ÔÂ10ÈÕÔâÊܵÄBlackSuitÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£ ¡£¡£´Ë´Î¹¥»÷µ¼Ö°üÀ¨¼ÓÖÝÀ¶¶Ü»áÔ±ÔÚÄÚµÄÓû§Êý¾Ý±»µÁ £¬£¬£¬£¬£¬£¬ÈýÌìºó¹«Ë¾²Å²ì¾õϵͳ±»¼ÓÃÜ¡£¡£¡£¡£ ¡£¡£¾­ÊÓ²ì £¬£¬£¬£¬£¬£¬È·ÈÏй¶ÐÅÏ¢°üÀ¨È«Ãû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¼°°ü¹ÜË÷ÅâÏêÇé¡£¡£¡£¡£ ¡£¡£Îª¼õÇáÓ°Ïì £¬£¬£¬£¬£¬£¬ConnexureΪÊÜÓ°ÏìµÄÓû§ÌṩCyberScoutµÄ12¸öÔÂÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍÖÁ2024Äê11ÔÂβ¡£¡£¡£¡£ ¡£¡£¼øÓÚBlackSuitÒÑÔÚ°µÍøÀÕË÷ÃÅ»§ÉÏÐû²¼²¿·ÖÊý¾Ý £¬£¬£¬£¬£¬£¬Óû§ÐèÁ¬Ã¦Ê¹ÓôËЧÀͲ¢Ð¡ÐÄδÊÚȨͨѶ¡¢ÍøÂç´¹ÂÚ¼°Õ©Æ­ÍýÏë¡£¡£¡£¡£ ¡£¡£ÍþвÕß²»µ«Ðû³Æ¶Ô¹¥»÷ÈÏÕæ £¬£¬£¬£¬£¬£¬»¹Íþв½øÒ»²½Ð¹Â¶¸ü¶àδÅû¶µÄÐÅÏ¢ £¬£¬£¬£¬£¬£¬ÈçÉÌÒµÌõÔ¼¡¢Ô±¹¤»¤ÕÕ¡¢¼Òͥϸ½Ú¼°²ÆÎñÊý¾ÝµÈ £¬£¬£¬£¬£¬£¬µ«Ïà¹ØËµ·¨ÉÐδ¾­×ÔÁ¦ÑéÖ¤¡£¡£¡£¡£ ¡£¡£

https://www.bleepingcomputer.com/news/security/blacksuit-ransomware-stole-data-of-950-000-from-software-vendor/


5. Microsoft SwayÔÚ´ó¹æÄ£¶þάÂëÍøÂç´¹ÂڻÖб»ÀÄÓÃ


8ÔÂ27ÈÕ £¬£¬£¬£¬£¬£¬NetskopeÍþвʵÑéÊÒ½üÆÚ½ÒÆÆÁËÒ»Æð´ó¹æÄ£µÄÍøÂç´¹Âڻ £¬£¬£¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃMicrosoft SwayÕâÒ»ÔÚÏßÑÝʾƽ̨ £¬£¬£¬£¬£¬£¬Í¨¹ýÍйܴ¹ÂÚµÇÂ¼Ò³Ãæ £¬£¬£¬£¬£¬£¬Õë¶ÔMicrosoft 365Óû§ÊµÑ鯾֤ÇÔÈ¡¡£¡£¡£¡£ ¡£¡£×Ô2024Äê7ÔÂÒÔÀ´ £¬£¬£¬£¬£¬£¬´ËÀ๥»÷ÊýÄ¿¼±¾çì­Éý £¬£¬£¬£¬£¬£¬Ö÷Òª²¨¼°ÑÇÖÞÓë±±ÃÀµØÇø £¬£¬£¬£¬£¬£¬¿Æ¼¼¡¢ÖÆÔì¼°½ðÈÚµÈÐÐÒµ³ÉÎªÖØÔÖÇø¡£¡£¡£¡£ ¡£¡£¹¥»÷ÕßÓÕµ¼Êܺ¦ÕßɨÃè¶þάÂë £¬£¬£¬£¬£¬£¬½ø¶øÌø×ªÖÁ¶ñÒâÍøÕ¾ £¬£¬£¬£¬£¬£¬ÓÈÆäʹÓÃÒÆ¶¯×°±¸Çå¾²±¡ÈõµÄÌØµã £¬£¬£¬£¬£¬£¬ÈƹýÇå¾²¼ì²â¡£¡£¡£¡£ ¡£¡£¹¥»÷ÊֶΰüÀ¨Í¸Ã÷ÍøÂç´¹ÂÚ £¬£¬£¬£¬£¬£¬ÇÔÈ¡¶àÒòËØÈÏÖ¤ÐÅÏ¢ £¬£¬£¬£¬£¬£¬Ê¹Êܺ¦ÕßÔÚ²»ÖªÇéϵǼÆäÕË»§¡£¡£¡£¡£ ¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃCloudflare Turnstile¹¤¾ß £¬£¬£¬£¬£¬£¬Òþ²Ø´¹ÂÚÄÚÈÝ £¬£¬£¬£¬£¬£¬Î¬»¤ÓòÃûÉùÓþ £¬£¬£¬£¬£¬£¬ÌÓ±ÜÍøÂç¹ýÂËЧÀÍ×èµ²¡£¡£¡£¡£ ¡£¡£´Ë´ÎÊÂÎñÓëÎåÄêǰµÄPerSwaysionÍøÂç´¹ÂڻÀàËÆ £¬£¬£¬£¬£¬£¬¾ùͨ¹ýMaaS²Ù×÷ £¬£¬£¬£¬£¬£¬ÀÖ³ÉÉøÍ¸¶à¼ÒÆóÒµ¸ß²ãÕË»§ £¬£¬£¬£¬£¬£¬°üÀ¨ÃÀ¹ú¡¢¼ÓÄôóµÈ¶à¹ú¹«Ë¾¸ß¹Ü¡£¡£¡£¡£ ¡£¡£ÕâÔÙ´ÎÌáÐÑÓû§ÐèÌá¸ßСÐÄ £¬£¬£¬£¬£¬£¬Ìá·À¶þάÂëÍøÂç´¹ÂÚΣº¦¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-sway-abused-in-massive-qr-code-phishing-campaign/


6. ¶ñÒâÈí¼þMalAgent.AutoITBot £¬£¬£¬£¬£¬£¬Gmail¼°¶àƽ̨ÕÊ»§µÄÒþÃØÍþв


8ÔÂ27ÈÕ £¬£¬£¬£¬£¬£¬SonicWall Capture Labs ×î½üÕ¹ÏÖÁËÃûΪ MalAgent.AutoITBot µÄÐÂÐͶñÒâÈí¼þ £¬£¬£¬£¬£¬£¬ËüרÃÅÕë¶Ô Gmail ÕË»§Ìᳫ¹¥»÷ £¬£¬£¬£¬£¬£¬µ«Íþв¹æÄ£Ô¶²»Ö¹ÓÚ´Ë¡£¡£¡£¡£ ¡£¡£Õâ¿îͨ¹ý AutoIT ±àÒëµÄ¡°File.exe¡±³ÌÐò £¬£¬£¬£¬£¬£¬Ê¹ÓöÁÈ¡¼ôÌù°å¡¢²¶»ñ°´¼üÒÔÖ¿ØÖƼüÅÌÊó±êµÈÖØ´óÊÖ¶ÎÈëÇÖÓû§ÏµÍ³¡£¡£¡£¡£ ¡£¡£MalAgent ²»µ«ÊÔͼͨ¹ýÖ÷Á÷ä¯ÀÀÆ÷»á¼û Gmail £¬£¬£¬£¬£¬£¬»¹Õ¹ÏÖ³öÊý¾ÝÇÔÈ¡¡¢ÏµÍ³Ê¹Óü°·´ÆÊÎöÄÜÁ¦µÄ¶àÃæÐÔ £¬£¬£¬£¬£¬£¬Ê¹ÆäÄÜÇáËÉÍøÂçÃô¸ÐÐÅÏ¢²¢×è°­Çå¾²ÆÊÎö¡£¡£¡£¡£ ¡£¡£SonicWall ʹÓÃרҵ¹¤¾ßÆÊÎöÆäÐÐΪ £¬£¬£¬£¬£¬£¬·¢Ã÷Æä¸ß¶È»ìÏýµÄ´úÂëºÍ¶¯Ì¬C2ÅþÁ¬ÉèÖà £¬£¬£¬£¬£¬£¬ÔöÌíÁË×·×ÙÄѶȡ£¡£¡£¡£ ¡£¡£¸Ã¶ñÒâÈí¼þ»¹°üÀ¨Õë¶ÔÆäËûÉ罻ýÌåÆ½Ì¨µÄµÇ¼Á´½Ó £¬£¬£¬£¬£¬£¬ÏÔʾ³öÆä¶àÄ¿µÄ¹¥»÷µÄÌØÕ÷¡£¡£¡£¡£ ¡£¡£ÁîÈ˵£ÐĵÄÊÇ £¬£¬£¬£¬£¬£¬MalAgent Äܾ²Ä¬ÔËÐжà¸öÀú³Ì £¬£¬£¬£¬£¬£¬ÈçÒþ²ØÒ³Ãæ²Ù×÷ºÍÍøÂçÌ×½Ó×ÖʵÑé £¬£¬£¬£¬£¬£¬ÒÔÌӱܼì²â¡£¡£¡£¡£ ¡£¡£ÕâÒ»·¢Ã÷Ç¿µ÷ÁËÔÚ´¦Öóͷ£Î´ÖªÎļþʱÐè¼á³Ö¸ß¶ÈСÐÄ £¬£¬£¬£¬£¬£¬ÒÔÃâ³ÉΪÆäDZÔÚÊܺ¦Õß¡£¡£¡£¡£ ¡£¡£


https://securityonline.info/sonicwall-warns-new-malware-targets-gmail/