Central GroupÔâÓöÐÂÊý¾Ýй¶£¬£¬£¬£¬£¬£¬500Íò»áÔ±ÐÅϢΣÔÚ³¯Ï¦
Ðû²¼Ê±¼ä 2024-11-221.Central GroupÔâÓöÐÂÊý¾Ýй¶£¬£¬£¬£¬£¬£¬500Íò»áÔ±ÐÅϢΣÔÚ³¯Ï¦
11ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬Ì©¹ú¿ç¹úÆóÒµ¼¯ÍÅCentral Group½üÆÚÔâÓöÁËÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¾ÝDataBreaches±¨¸æ£¬£¬£¬£¬£¬£¬2021Äê10Ô£¬£¬£¬£¬£¬£¬Central Restaurant GroupÔøÔâµ½ÃûΪDESORDENµÄÍþвÐÐΪÕß¹¥»÷¡£¡£¡£¡£¡£¡£¶ø½üÆÚ£¬£¬£¬£¬£¬£¬ÁíÒ»ÃûÍþвÐÐΪÕß0mid16BÉù³Æ£¬£¬£¬£¬£¬£¬ÔÚ2024Äê8ÔÂÖÁ11ÔÂʱ´ú£¬£¬£¬£¬£¬£¬Í¨¹ýCentral RetailÍøÂç̻¶µÄÊÜËðAPI¶Ëµã£¬£¬£¬£¬£¬£¬»á¼û²¢ÇÔÈ¡ÁË5,108,826ÌõCentral Group The1 Card»áԱСÎÒ˽¼ÒÐÅÏ¢¼Í¼¡£¡£¡£¡£¡£¡£The1 CardÊÇCentral GroupÆìÏÂËùÓÐÁãÊÛºÍÏûºÄÆ·ÅÆ½ÓÄɵĻáԱϵͳ£¬£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý1700Íò»áÔ±¡£¡£¡£¡£¡£¡£0mid16BÌåÏÖ£¬£¬£¬£¬£¬£¬ÓÉÓÚÓëCentral GroupµÄ̸ÅÐʧ°Ü£¬£¬£¬£¬£¬£¬¾öÒé³öÊÛÕâЩ»áԱСÎÒ˽¼ÒÐÅÏ¢¼Í¼£¬£¬£¬£¬£¬£¬°üÀ¨Ãû×Ö¡¢ÐÕÊÏ¡¢»áÔ±ºÅÂë¡¢¹úÃñÉí·ÝÖ¤ºÅÂë¡¢¹ú¼Ò¡¢ÊÖ»úµç»°ºÍµç×ÓÓʼþµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬×ܾÞϸΪ582MB¡£¡£¡£¡£¡£¡£¸ÃºÚ¿ÍÔÚºÚ¿ÍÂÛ̳ºÍX.comÉÏÐû²¼ÁËÊý¾ÝÁÐ±í£¬£¬£¬£¬£¬£¬²¢ÌṩÁËÊý¾ÝÑù±¾ºÍÑéÖ¤ÕæÊµÐÔµÄÒªÁì¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬0mid16B»¹Ö¸ÔðÌ©¹ú¹«Ë¾²»ÖØÊÓÊý¾Ý±£»£»£»¤£¬£¬£¬£¬£¬£¬ÓÉÓÚ²»»áÊܵ½ÈÎÄÇÀï·£¡£¡£¡£¡£¡£¡£DataBreachesÔøÊµÑéÁªÏµCentral Group£¬£¬£¬£¬£¬£¬µ«×èÖ¹·¢¸åʱÉÐδÊÕµ½»Ø¸´¡£¡£¡£¡£¡£¡£
https://databreaches.net/2024/11/20/thai-loyalty-membership-card-data-of-5-million-customers-put-up-for-sale-on-hacking-forum/
2. ¡°Ghost Tap¡±£ºÍøÂç·¸·¨·Ö×ÓʹÓÃNFCÊÖÒÕÌ×ÏÖÐÂÕ½ÂÔ
11ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó½ÓÄÉÁËÒ»ÖÖÃûΪ¡°Ghost Tap¡±µÄÐÂÓ±Ì×ÏÖÒªÁ죬£¬£¬£¬£¬£¬¸ÃÒªÁìʹÓñ»µÁµÄÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÌØÊâÊÇÓëApple PayºÍGoogle PayµÈÒÆ¶¯Ö§¸¶ÏµÍ³Ïà¹ØµÄÊý¾Ý£¬£¬£¬£¬£¬£¬Í¨¹ýÈ«Çò¹æÄ£Äڵġ°Ç®Â⡱ʵÏÖ²»·¨×¬Ç®¡£¡£¡£¡£¡£¡£ÓëÏÈǰµÄÒÆ¶¯¶ñÒâÈí¼þÈçNGateÏà±È£¬£¬£¬£¬£¬£¬Ghost Tap¸üΪÒþ²ØÇÒÄÑÒÔ¼ì²â£¬£¬£¬£¬£¬£¬ÎÞÐèÊܺ¦ÕßµÄʵÌ忨»ò×°±¸£¬£¬£¬£¬£¬£¬Ò²²»ÐèÒ»ÅþÁÚ´¥Êܺ¦Õߣ¬£¬£¬£¬£¬£¬¶øÊÇͨ¹ýÔ¶³Ì½»»¥Íê³É¡£¡£¡£¡£¡£¡£¸ÃÕ½ÂÔÊ×ÏÈÉæ¼°ÇÔȡ֧¸¶¿¨Êý¾ÝºÍÒ»´ÎÐÔÃÜÂ루OTP£©£¬£¬£¬£¬£¬£¬Õâ¿ÉÒÔͨ¹ýÒøÐжñÒâÈí¼þ¡¢´¹ÂÚÒ³Ãæ»ò¼üÅ̼ͼµÈ·½·¨ÊµÏÖ¡£¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬Ê¹ÓÃNFCGate¹¤¾ßºÍÖмÌЧÀÍÆ÷£¬£¬£¬£¬£¬£¬½«Ö§¸¶ÐÅÏ¢·¢Ë͸øÖØ´óµÄÇ®ÂâÍøÂ磬£¬£¬£¬£¬£¬ÕâЩǮÂâʹÓÃÆä×°±¸µÄNFCоƬÔÚ¶à¸öËùÔÚ¾ÙÐÐÁãÊÛ¹ºÖ㬣¬£¬£¬£¬£¬´Ó¶øÑÚÊÎÁËÖ÷Òª¹¥»÷ÕßµÄ×Ù¼£¡£¡£¡£¡£¡£¡£ÓÉÓÚÉúÒâ¿´ËÆÕýµ±ÇÒÊèÉ¢ÓÚ²î±ðËùÔÚ£¬£¬£¬£¬£¬£¬½ðÈÚ»ú¹¹ÄÑÒÔ·¢Ã÷ºÍ×èÖ¹ÕâÖÖÕ½ÂÔ£¬£¬£¬£¬£¬£¬ÓÈÆäÊǵ±Éæ¼°´ó×ÚС¶îÖ§¸¶Ê±¡£¡£¡£¡£¡£¡£ÎªÁËÌÓ±Ü×·×Ù£¬£¬£¬£¬£¬£¬Ç®ÂâÃÇ»¹»á½«×°±¸ÖÃÓÚº½ÐÐģʽ£¬£¬£¬£¬£¬£¬µ«¼á³ÖNFCϵͳÔËÐС£¡£¡£¡£¡£¡£ÎªÁËÌá·À¡°Ghost Tap¡±£¬£¬£¬£¬£¬£¬ÒøÐÐÐèÒª±ê¼ÇʹÓÃͳһÕÅ¿¨ÔÚ²î±ðËùÔÚ¾ÙÐеķÇÏÖʵ¿É´ïµÄÉúÒ⣬£¬£¬£¬£¬£¬¶øÏûºÄÕßÔòÐè¼à¿ØÚ²ÆÉúÒâ²¢Á¬Ã¦ÏòÒøÐб¨¸æ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-ghost-tap-attack-abuses-nfc-mobile-payments-to-steal-money/
3. Ubuntu Server needrestart°üÆØ³öÊ®ÄêÂõÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÍâµØÌáȨ
11ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬Ubuntu Server×Ô21.04°æÆðĬÈÏ×°ÖõÄneedrestart°üÖб£´æ¶à¸öÒÑÓÐÊ®ÄêÀúÊ·µÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÕâЩÎó²î¿ÉÄÜʹÍâµØ¹¥»÷ÕßÎÞÐèÓû§½»»¥¼´¿É»ñµÃrootȨÏÞ¡£¡£¡£¡£¡£¡£QualysÍþвÑо¿²¿·ÖÓÚÉÏÔ·¢Ã÷²¢±¨¸æÁËÕâЩÎó²î£¬£¬£¬£¬£¬£¬Ö¸³öËüÃǼ«Ò×±»Ê¹Ó㬣¬£¬£¬£¬£¬Óû§ÐèѸËÙÐж¯ÐÞ¸´¡£¡£¡£¡£¡£¡£Îó²î×Ô2014Äê4ÔÂ27ÈÕneedrestart 0.8°æÒýÈëÚ¹ÊÍÆ÷Ö§³ÖºóÒ»Ö±±£´æ£¬£¬£¬£¬£¬£¬Ó°ÏìDebian¡¢UbuntuµÈLinux¿¯Ðа档¡£¡£¡£¡£¡£NeedrestartÊÇÒ»¸öÓÃÓÚɨÃèϵͳÒÔÈ·¶¨ÔÚ¹²Ïí¿â¸üкóÐèÖØÆôµÄЧÀÍ£¬£¬£¬£¬£¬£¬ÒÔ×èֹϵͳÖÜÈ«ÖØÆôµÄÊÊÓóÌÐò¡£¡£¡£¡£¡£¡£Ëü¼¯³Éµ½Ð§ÀÍÆ÷Ó³ÏñÖУ¬£¬£¬£¬£¬£¬ÔÚAPT²Ù×÷ºó×Ô¶¯ÔËÐУ¬£¬£¬£¬£¬£¬Ê¶±ðÒªº¦¿â¸üкóÐèÖØÆôµÄЧÀÍ£¬£¬£¬£¬£¬£¬È·±£Ð§ÀÍʹÓÃ×îÐÂ¿â°æ±¾£¬£¬£¬£¬£¬£¬Ìá¸ßÕý³£ÔËÐÐʱ¼äºÍÐÔÄÜ¡£¡£¡£¡£¡£¡£Qualys·¢Ã÷µÄÎå¸öÎó²î°üÀ¨Í¨¹ýÓÕÆneedrestartʹÓù¥»÷Õß¿ØÖƵÄPYTHONPATH»òRUBYLIBÇéÐαäÁ¿ÔËÐÐÚ¹ÊÍÆ÷£¬£¬£¬£¬£¬£¬»òÒÔrootÉí·ÝÖ´ÐÐí§ÒâshellÏÂÁî¡£¡£¡£¡£¡£¡£UbuntuÖ¸³öÒÑÔÚ3.8°æÖнâ¾öÕâЩÎÊÌ⣬£¬£¬£¬£¬£¬²¢½¨ÒéÓû§ÏÂÔØ×îв¹¶¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬»ò½ûÓÃÚ¹ÊÍÆ÷ɨÃèÆ÷×÷ΪÔÝʱ»º½â²½·¥¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2024/11/decades-old-security-vulnerabilities.html
4. Ä«Î÷¸çÕþ¸®Ö´·¨ÊÂÎñ°ì¹«ÊÒÔâRansomhubÀÕË÷Èí¼þ¹¥»÷
11ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬Ëæ×ÅÍøÂçÇå¾²ÍþвµÄÒ»Ö±¼Ó¾ç£¬£¬£¬£¬£¬£¬Ä«Î÷¸ç×Üͳ¿ËÀÍµÏæ«¡¤ÐÁ±«Ä·Ö¤Êµ£¬£¬£¬£¬£¬£¬Õþ¸®ÕýÔÚÊÓ²ìÒ»ÆðÕë¶ÔÆäÖ´·¨ÊÂÎñ°ì¹«ÊÒµÄÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïRansomhub¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬²¢ÒÑÐû²¼Õþ¸®Êý¾Ý¿âÖеÄСÎÒ˽¼ÒÐÅÏ¢Ñù±¾£¬£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡ÁË313 GBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨ÌõÔ¼¡¢°ü¹ÜºÍ²ÆÎñÎļþµÈ¡£¡£¡£¡£¡£¡£RansomhubÔÚÆäйÃÜÍøÕ¾ÉÏÐû²¼Á˱»µÁÎļþÑù±¾£¬£¬£¬£¬£¬£¬ÕâЩÎļþËÆºõÀ´×ÔÕþ¸®¹ÍÔ±Êý¾Ý¿â¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ²¢·ÇÄ«Î÷¸ç×Üͳ°ì¹«ÊÒÊ×´ÎÔâÓöÉæ¼°Ãô¸ÐÐÅÏ¢µÄºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬½ñÄê1Ô¾ÍÔø±¬·¢263Ãû±¨µÀ×Üͳ»î¶¯µÄ¼ÇÕßµÄСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶µÄÊÂÎñ¡£¡£¡£¡£¡£¡£RansomHubÊÇÒ»¸öÏà¶Ô½ÏеÄÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©×éÖ¯£¬£¬£¬£¬£¬£¬ÒòÆä¼¤½øÕ½ÂԺͶÔÒªº¦»ù´¡ÉèÊ©µÄ¹Ø×¢¶øÉùÃûÉ¢ÂÒ£¬£¬£¬£¬£¬£¬±»ÒÔΪÊÇKnightÀÕË÷Èí¼þµÄ¸Ä°æ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÕë¶Ô¶à¸öƽ̨£¬£¬£¬£¬£¬£¬²¢½ÓÄÉÁËË«ÖØÀÕË÷Ä£×Ó¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/171257/data-breach/mexico-suffers-ransomware-attack.html
5. ΢ÈíÖØÈ¹¥»÷ONNXÍøÂç´¹ÂÚЧÀÍ£¬£¬£¬£¬£¬£¬²é·â240¸öÓòÃû
11ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬×Ô2017ÄêÆð£¬£¬£¬£¬£¬£¬Î¢ÈíÒѲé·âONNX£¨Ò»¸öÍøÂç´¹ÂÚ¼´Ð§ÀÍÆ½Ì¨£©¿Í»§Ê¹ÓõÄ240¸öÓòÃû£¬£¬£¬£¬£¬£¬ÕâЩÓòÃû±»ÓÃÓÚÕë¶ÔÈ«Çò¹«Ë¾¼°Ð¡ÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£¾Ý΢Èí¡¶2024ÄêÊý×Ö·ÀÓù±¨¸æ¡·£¬£¬£¬£¬£¬£¬ONNX£¨ÓÖ³ÆCaffeineºÍFUHRER£©ÊÇ2024ÄêÉϰëÄê×î´óµÄÖÐÐÄÈËÍøÂç´¹ÂÚЧÀÍ£¬£¬£¬£¬£¬£¬Ã¿Ô·¢ËÍÊýÍòÍòÖÁÊýÒÚ·â´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬Ö÷ÒªÃé×¼Microsoft 365ÕÊ»§¼°ÆäËû¿Æ¼¼¹«Ë¾¿Í»§¡£¡£¡£¡£¡£¡£ONNXͨ¹ýTelegramÍÆ¹ãÏúÊÛ´¹ÂÚ¹¤¾ß°ü£¬£¬£¬£¬£¬£¬Ìṩ¶àÖÖ¶©ÔÄģʽ£¬£¬£¬£¬£¬£¬²¢½ÓÄɶþάÂë´¹ÂÚµÈÊֶΡ£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÄÑÒÔͨ¹ýµä·¶¶Ëµã¼ì²â¼à¿Ø£¬£¬£¬£¬£¬£¬¶ÔÍøÂçÇå¾²ÌṩÉÌ×é³ÉÌôÕ½¡£¡£¡£¡£¡£¡£ÔÚDark AtlasÇå¾²Ñо¿Ö°Ô±Åû¶ÆäËùÓÐÕßAbanoub Nady£¨ÍøÃûMRxC0DER£©Éí·Ýºó£¬£¬£¬£¬£¬£¬ONNXÔËÓªÓÚ6ÔÂ×èÖ¹¡£¡£¡£¡£¡£¡£Î¢Èíͨ¹ýÃñÊ·¨Í¥ÏÂÁ¶ñÒâÊÖÒÕ»ù´¡ÉèÊ©ÖØ¶¨ÏòÖÁ×ÔÉíЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÇжÏÍþвÐÐΪÕß»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬²¢ÓÀÊÀ×èÖ¹ÕâЩÓòÃûÓÃÓÚδÀ´´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£Î¢Èí»¹ÓëLF ProjectsÏàÖú£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÊÇONNXÃû³ÆºÍ»Õ±êµÄÕýµ±ËùÓÐÕß¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/microsoft-disrupts-onnx-phishing-as-a-service-infrastructure/
6. È«Çò¹¤Òµ¿ØÖÆÏµÍ³£¨ICS£©»¥ÁªÍøÌ»Â¶ÇéÐÎÑÏËà
11ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬ÐµÄÑо¿ÏÔʾ£¬£¬£¬£¬£¬£¬È«Çò175¸ö¹ú¼Ò/µØÇø±£´æÁè¼Ý145,000¸ö̻¶ÔÚ»¥ÁªÍøÉϵĹ¤Òµ¿ØÖÆÏµÍ³£¨ICS£©£¬£¬£¬£¬£¬£¬ÆäÖÐÃÀ¹úÕ¼±ÈÁè¼ÝÈý·ÖÖ®Ò»¡£¡£¡£¡£¡£¡£ÕâЩICSЧÀÍ̻¶Ö÷ÒªÔ´ÓÚ³£ÓõÄICSÐÒ飬£¬£¬£¬£¬£¬ÈçModbus¡¢IEC 60870-5-104µÈ£¬£¬£¬£¬£¬£¬ÇÒµØÇø¼ä±£´æ²î±ð¡£¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬£¬£¬Modbus¡¢S7ºÍIEC 60870-5-104ÔÚÅ·ÖÞ¸ü³£¼û£¬£¬£¬£¬£¬£¬¶øFox¡¢BACnetµÈÔÚ±±ÃÀ¸ü³£¼û¡£¡£¡£¡£¡£¡£Censys¹«Ë¾µÄÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬£¬Ðí¶àICSÐÒé¿É×·ËÝÖÁ20ÊÀ¼Í70ÄêÔ£¬£¬£¬£¬£¬£¬µ«²¢Î´ÊµÏÖÓëÆäËûµØÇøÏàͬµÄÇ徲ˢС£¡£¡£¡£¡£¡£Ö»¹ÜרÃÅÕë¶ÔICSϵͳµÄÍøÂç¹¥»÷Ïà¶Ô½ÏÉÙ£¬£¬£¬£¬£¬£¬µ«½üÄêÀ´ÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬ÌØÊâÊÇÔÚ¶íÎÚÕ½Õùºó¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬HMIÒ²Ô½À´Ô½¶àµØÍ¨¹ý»¥ÁªÍøÌṩÒÔÖ§³ÖÔ¶³Ì»á¼û£¬£¬£¬£¬£¬£¬ÇÒ´ó´ó¶¼Ì»Â¶µÄHMIλÓÚÃÀ¹ú¡£¡£¡£¡£¡£¡£Censys»¹Ö¸³ö£¬£¬£¬£¬£¬£¬ÓÃÓÚ¼à¿ØºÍÓëICSϵͳ½»»¥µÄHMIºÍICSЧÀÍ´ó¶àλÓÚÒÆ¶¯»òÉÌÒµ¼¶»¥ÁªÍøÐ§ÀÍÌṩÉÌÉÏ£¬£¬£¬£¬£¬£¬ÕâÔöÌíÁËʶ±ðºÍ֪ͨËùÓÐÕßµÄÄѶȡ£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬×éÖ¯±ØÐè½ÓÄɲ½·¥Ê¶±ðºÍ±£»£»£»¤Ì»Â¶µÄOTºÍICS×°±¸£¬£¬£¬£¬£¬£¬¸üÐÂĬÈÏÆ¾Ö¤£¬£¬£¬£¬£¬£¬²¢¼à¿ØÍøÂçÊÇ·ñ±£´æ¶ñÒâ»î¶¯¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2024/11/over-145000-industrial-control-systems.html