RhysidaÀÕË÷Èí¼þÍÅ»ïÃé×¼²Ð¼²ÈË·ÇÓªÀû×éÖ¯Easterseals
Ðû²¼Ê±¼ä 2024-10-2510ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬RhysidaÀÕË÷Èí¼þÍÅ»ï¿ËÈÕ½«Ä¿µÄתÏòÁË×ÅÃû²Ð¼²ÈË·ÇÓªÀû×éÖ¯¸´Éú½Ú·âÓ¡(Easterseals)£¬£¬£¬£¬£¬£¬ÊÔͼÀÕË÷130ÍòÃÀÔª¡£¡£¡£¡£¸Ã×é֯Ϊ²Ð¼²¶ùͯ¡¢ÍíÄêÈË¡¢ÍËÎéÎäÊ¿µÈÌṩ֧³Ö¡£¡£¡£¡£¾ÝÃåÒòÖÝî¿Ïµ»ú¹¹Îļþ£¬£¬£¬£¬£¬£¬EastersealsλÓÚÒÁÀûŵÒÁÖÝÖв¿µÄ·ÖÖ§»ú¹¹ÔÚ4ÔÂÔâÓöÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂ14,855È˵ÄСÎÒ˽¼ÒÐÅϢй¶£¬£¬£¬£¬£¬£¬°üÀ¨È«Ãû¡¢µØµã¡¢¼ÝʻִÕÕ¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁÆÐÅÏ¢µÈ¡£¡£¡£¡£·¢Ã÷´ËÊÂÎñºó£¬£¬£¬£¬£¬£¬EastersealsÁ¬Ã¦ÇжÏÍøÂç»á¼û£¬£¬£¬£¬£¬£¬²¢Ô¼Çë×¨ÒµÍøÂçÇå¾²¹«Ë¾¾ÙÐÐȡ֤ÊӲ졣¡£¡£¡£RhysidaÔÚÆäйÃÜÍøÕ¾ÉÏÐû²¼ÁËEastersealsµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢ÒªÇóÔÚ10ÔÂ30ÈÕǰ֧¸¶20±ÈÌØ±Ò¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬RhysidaÒѶԶà¼ÒÒ½ÁÆ»ú¹¹Ìᳫ¹¥»÷£¬£¬£¬£¬£¬£¬°üÀ¨Ö¥¼Ó¸ç°²ÓëÂÞ²®ÌØH.¬Àï¶ùͯҽԺµÈ£¬£¬£¬£¬£¬£¬²¢ÔÚÈ¥Äê12Ô¶ÔÌìÏ»ù¶½½Ì»áÁªºÏ»áÌᳫ¹¥»÷¡£¡£¡£¡£
https://therecord.media/easterseals-central-illinois-data-breach
2. Cisco Talos½ÒÆÆTA866ÖØ´óÕ½ÂÔ¼°ÆäÓëWarmCookie¶ñÒâÈí¼þµÄÁªÏµ
10ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬Cisco Talos½ÒÆÆÁËÍþвÐÐΪÕßTA866£¨ÓÖÃûAsylum Ambuscade£©µÄÖØ´óÕ½ÂÔºÍÆäÓëBadSpace¼Ò×åµÄWarmCookie¶ñÒâÈí¼þÖ®¼äµÄÁªÏµ¡£¡£¡£¡£TA866×Ô2020ÄêÒÔÀ´Ò»Ö±»îÔ¾ÓÚ¾¼ÃÄ¿µÄ¶ñÒâÈí¼þ»î¶¯ºÍÌØ¹¤»î¶¯£¬£¬£¬£¬£¬£¬½ÓÄɶà½×¶ÎѬȾÁ´£¬£¬£¬£¬£¬£¬°üÀ¨¶ñÒâJavaScriptÏÂÔØ³ÌÐò¡¢MSI°ü¡¢WasabiSeedÏÂÔØÆ÷¡¢Screenshotter¶ñÒâÈí¼þºÍAHK BotÄ£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þ¡£¡£¡£¡£WarmCookie¶ñÒâÈí¼þÓëTA866±£´æÁªÏµ£¬£¬£¬£¬£¬£¬¹²ÏíÓÕ¶üÖ÷Ìâ¡¢»ù´¡ÉèÊ©¡¢CSharp-Streamer-RATºÍCobalt Strike×÷ΪºóÐøÔØºÉ£¬£¬£¬£¬£¬£¬²¢Ê¹Óñà³ÌÌìÉúµÄSSLÖ¤Êé¡£¡£¡£¡£WarmCookieͨ¹ý¶ñÒâÀ¬»øÓʼþºÍ¹ã¸æÈö²¥£¬£¬£¬£¬£¬£¬ÌṩºóÃŹ¦Ð§¡£¡£¡£¡£TA866µÄÑݱäÅú×¢×éÖ¯ÔÚ·ÀÓùÍøÂçÍþв·½ÃæÃæÁÙÖØ´óÌôÕ½£¬£¬£¬£¬£¬£¬ÐèÒªÏàʶ×îÐÂÍþвÇ鱨²¢ÊµÑéÏȽøÇå¾²²½·¥¡£¡£¡£¡£
https://hackread.com/ta866-group-warmcookie-malware-espionage-campaign/
3. Webflow³É¼ÓÃÜÇ®±Ò´¹ÂÚ¹¥»÷й¤¾ß
10ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬Netskope Threat LabsµÄ×îÐÂÑо¿ÏÔʾ£¬£¬£¬£¬£¬£¬Õë¶Ô¼ÓÃÜÇ®±ÒÇ®°üµÄÍøÂç´¹ÂÚ¹¥»÷ÔÚ2024Äê4ÔÂÖÁ9ÔÂʱ´ú¼¤Ôö£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷ʹÓÃÊ¢ÐеÄÍøÕ¾¹¹½¨Æ÷WebflowÖÆ×÷´¹ÂÚÒ³Ãæ£¬£¬£¬£¬£¬£¬Ä£ÄâÕýµ±µÄ¼ÓÃÜÇ®°üÍøÕ¾£¬£¬£¬£¬£¬£¬ÈçCoinbase¡¢MetaMaskµÈ£¬£¬£¬£¬£¬£¬ÒÔ¼°¹«Ë¾ÍøÂçÓʼþƽ̨ºÍMicrosoft 365µÄµÇ¼½çÃæ¡£¡£¡£¡£ÕâЩ¹¥»÷Ö÷ÒªÕë¶Ô±±ÃÀºÍÑÇÖ޵ĽðÈÚЧÀÍ¡¢ÒøÐкÍÊÖÒÕÐÐÒµ£¬£¬£¬£¬£¬£¬ÒÑÓÐÁè¼Ý120¸ö×éÖ¯Êܵ½Ó°Ïì¡£¡£¡£¡£Óë¹Å°å´¹ÂÚ¹¥»÷²î±ð£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÎÞÐè±àд´úÂ룬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýWebflowµÄ±íµ¥¿éÍøÂçÊܺ¦Õߵį¾Ö¤£¬£¬£¬£¬£¬£¬ÌØÊâÊǼÓÃÜÇ®°üµÄÉñÃØ»Ö¸´¶ÌÓ£¬£¬£¬£¬£¬´Ó¶øÍêÈ«¿ØÖÆÇ®°ü²¢ÇÔÈ¡×ʲú¡£¡£¡£¡£ÕâЩ´¹ÂÚÒ³ÃæÍ¨³£Ê¹ÓÃÏÖʵǮ°üÖ÷Ò³µÄ½ØÍ¼ÖÆ×÷£¬£¬£¬£¬£¬£¬²¢½«Õû¸öÍøÒ³×ª»»Îª¿Éµã»÷µÄͼÏñ£¬£¬£¬£¬£¬£¬½«Êܺ¦ÕßÖØ¶¨Ïòµ½¶ñÒâÍøÕ¾¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÕâÐ©ÍøÂç´¹Âڻ»¹³£ÓÃÓë֮ǰ¼ÓÃÜȦÌ×ÓйصÄ̸ÌìÆ½Ì¨¡°tawk.to¡±¾ÙÐÐÚ²ÆÐÔÊÖÒÕÖ§³Ö¡£¡£¡£¡£
https://securityonline.info/webflow-weaponized-phishing-attacks-target-crypto-wallets/
4. Change HealthcareÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ÖÂ1ÒÚÈË¿µ½¡ÐÅϢй¶
10ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬½ñÄê2Ô£¬£¬£¬£¬£¬£¬Change HealthcareÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý1ÒÚÈ˵Ä˽ÈË¿µ½¡ÐÅÏ¢±»µÁ£¬£¬£¬£¬£¬£¬ÕâÊÇÃÀ¹úÒÑÖªµÄ×î´óÒ»ÆðÒ½ÁƼͼÊý×Ö͵ÇÔ°¸Ö®Ò»£¬£¬£¬£¬£¬£¬Ò²ÊÇÀúÊ·ÉÏ×î´óµÄÊý¾Ýй¶°¸Ö®Ò»¡£¡£¡£¡£´Ë´Î¹¥»÷Ôì³ÉÁËÊýÔµÄÖÐÖ¹£¬£¬£¬£¬£¬£¬¶ÔÃÀ¹úÒ½ÁƱ£½¡ÐÐÒµÔì³ÉÁËÆÕ±éÆÆË𡣡£¡£¡£¹¥»÷ÓɶíÓïÀÕË÷Èí¼þºÍÚ²ÆÀÕË÷ÍÅ»ïALPHV/BlackCatËùΪ£¬£¬£¬£¬£¬£¬ËûÃÇØÊºóÈÏ¿ÉÔðÈβ¢Ç±ÌÓ£¬£¬£¬£¬£¬£¬Í¬Ê±ÆÈ¡ÁËʵÑéºÚ¿Í¹¥»÷µÄ³Ð°üÉ̵ÄвƲú¡£¡£¡£¡£¸ÃÍŻﻹÏò¸Ã¿µ½¡¿Æ¼¼¹«Ë¾µÄĸ¹«Ë¾ÁªºÏ¿µ½¡¼¯ÍÅ£¨UHG£©ÀÕË÷Á˵ڶþ±ÊÊê½ð£¬£¬£¬£¬£¬£¬²¢ÔÚÍøÉÏÐû²¼Á˲¿·Ö±»µÁÎļþ¡£¡£¡£¡£ÔÚÖ§¸¶Êê½ðºó£¬£¬£¬£¬£¬£¬Change»ñµÃÁ˱»µÁÊý¾Ý¼¯µÄ¸±±¾£¬£¬£¬£¬£¬£¬ÒÔʶ±ð²¢Í¨ÖªÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£¡£ÃÀ¹úÕþ¸®ÊÔͼץ²¶¸ÃÍŻﱳºóµÄºÚ¿Í£¬£¬£¬£¬£¬£¬µ«Î´ÄÜÀֳɡ£¡£¡£¡£´Ë´Î¹¥»÷µÄÔµ¹ÊÔÓɲ¿·Ö¹é×ïÓÚÆóÒµºÏ²¢µ¼ÖµÄÔã¸âÇå¾²ÐÔ£¬£¬£¬£¬£¬£¬ÒÔ¼°Î´ÊܶàÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»£»¤µÄ±»µÁƾ֤±»ÍøÂç·¸·¨·Ö×ÓʹÓᣡ£¡£¡£
https://techcrunch.com/2024/10/24/unitedhealth-change-healthcare-hacked-millions-health-records-ransomware/
5. Landmark AdminÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬80ÓàÍòÈËÊý¾Ýй¶
10ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬°ü¹ÜÖÎÀíЧÀ͹«Ë¾ Landmark Admin ÖÒÑԳƣ¬£¬£¬£¬£¬£¬2024Äê5ÔÂÔâÊܵÄÍøÂç¹¥»÷µ¼ÖÂÊý¾Ýй¶£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÁè¼Ý80ÍòÈË¡£¡£¡£¡£Landmark Admin ×÷Ϊ´óÐͰü¹Ü¹«Ë¾µÄµÚÈý·½ÖÎÀí¹«Ë¾£¬£¬£¬£¬£¬£¬Îª¶à¼Ò°ü¹Ü¹«Ë¾Ìṩºǫ́ЧÀÍ¡£¡£¡£¡£5ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬¹«Ë¾¼ì²âµ½¿ÉÒɻ²¢Á¬Ã¦¹Ø±ÕITϵͳºÍÔ¶³Ì»á¼û£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâ¹¥»÷À©É¢¡£¡£¡£¡£ÓëµÚÈý·½ÍøÂçÇå¾²¹«Ë¾ÏàÖúºó£¬£¬£¬£¬£¬£¬·¢Ã÷¹¥»÷ʱ´úÍþвÐÐΪÕß»á¼ûÁ˰üÀ¨806,519ÈËСÎÒ˽¼ÒÐÅÏ¢µÄÎļþ£¬£¬£¬£¬£¬£¬Éæ¼°ÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢½ðÈÚÕË»§ºÅÂë¡¢Ò½ÁÆÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Landmark ÒÑÏò¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢ËÍ֪ͨ£¬£¬£¬£¬£¬£¬²¢ÌáÐÑËûÃÇ¼à¿ØÐÅÓñ¨¸æºÍÒøÐÐÕË»§¡£¡£¡£¡£ÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬ÉÐδȷ¶¨ÕâÊÇÀÕË÷Èí¼þ¹¥»÷Õվɴ¿´âµÄÊý¾Ý͵ÇÔ£¬£¬£¬£¬£¬£¬Í¬Ê±Ò²Ã»ÓÐÍþвÐÐΪÕßÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/insurance-admin-landmark-says-data-breach-impacts-800-000-people/
6. ÁªºÏ¹úÐÅÍлù½ðÊý¾Ý¿âÉèÖùýʧ£¬£¬£¬£¬£¬£¬Ãô¸ÐÊý¾ÝÔâ´ó¹æÄ£Ð¹Â¶
10ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷£¬£¬£¬£¬£¬£¬ÁªºÏ¹úÏû³ý±©Á¦Ë𺦸¾Å®ÐÐΪÐÅÍлù½ðµÄÒ»¸öÊý¾Ý¿â±£´æÉèÖùýʧ£¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý115,000·ÝÃô¸ÐÎļþ±»Ð¹Â¶¡£¡£¡£¡£ÕâЩÎļþ°üÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢²ÆÎñ¼Í¼ºÍÊܺ¦ÕßÖ¤´ÊµÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬×ÜÈÝÁ¿µÖ´ï228GB¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý¶ÔÒþ˽ºÍÇå¾²×é³ÉÑÏÖØÍþв£¬£¬£¬£¬£¬£¬¿ÉÄܻᱻÓÃÓÚÍøÂç´¹ÂÚ¹¥»÷¡¢Éí·Ý͵ÇÔ¡¢Ú²Æ¡¢ÀÕË÷µÈ¶ñÒâÄ¿µÄ¡£¡£¡£¡£Êܺ¦Õß¡¢´ÈÉÆÊÂÇéÕߺÍÁªºÏ¹úÊÇÇéÖ°Ô±¿ÉÄܳÉΪĿµÄ£¬£¬£¬£¬£¬£¬ÃæÁÙÉí·ÝÐÅÏ¢±»µÁÓá¢Ú²Æ¡¢Ú²Æ»òÀÕË÷µÈΣº¦¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÆØ¹âµÄÄÚ²¿Îļþ»¹¿ÉÄÜÈ÷¸·¨·Ö×ÓÏàʶ×éÖ¯µÄÔË×÷·½·¨¡¢Òªº¦ÖÎÀíºÍ²ÆÎñ½á¹¹µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúËÔÚÖÎÀí¸ÃÊý¾Ý¿â£¬£¬£¬£¬£¬£¬ÒÔ¼°Ëü̻¶Á˶೤ʱ¼ä¡£¡£¡£¡£µ«ÁªºÏ¹ú¸¾Å®ÊðÒѾ½ÓÄÉÁËÐж¯£¬£¬£¬£¬£¬£¬±£»£»£»£»¤ÁËÊý¾Ý¿â£¬£¬£¬£¬£¬£¬²¢Ðû²¼ÁËթƾ¯±¨£¬£¬£¬£¬£¬£¬Æð¾¢¼õÇáÓëÊý¾Ýй¶Ïà¹ØµÄΣº¦¡£¡£¡£¡£ÕâÒ»ÊÂÎñ͹ÏÔÁËÇ¿ÓÐÁ¦µÄÍøÂçÇå¾²²½·¥¶Ô±£»£»£»£»¤Ãô¸ÐÊý¾ÝµÄÖ÷ÒªÐÔ¡£¡£¡£¡£
https://hackread.com/misconfigured-un-database-gender-violence-victims-data/