EverestÀÕË÷Èí¼þÍŶÓй¶PPMG»¼ÕßÃô¸ÐÐÅÏ¢

Ðû²¼Ê±¼ä 2024-11-26

1. EverestÀÕË÷Èí¼þÍŶÓй¶PPMG»¼ÕßÃô¸ÐÐÅÏ¢


11ÔÂ23ÈÕ£¬£¬£¬£¬¼ÓÀû¸£ÄáÑÇÖݵÄ̫ƽÑó·Î²¿Ò½ÁƼ¯ÍÅ(PPMG)ÔâÓöÁËÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£10ÔÂ25ÈÕ£¬£¬£¬£¬EverestÀÕË÷Èí¼þÍŶÓÔÚ°µÍøÉÏÐû²¼ÁËPPMGµÄ»¼ÕßÐÅÏ¢£¬£¬£¬£¬°üÀ¨2021ÖÁ2024ÄêµÄδ¼ÓÃÜСÎÒ˽¼ÒºÍÊܱ£»£»£»£»¤¿µ½¡ÐÅÏ¢¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÒÔ150¶à¸öͼÏñÎļþºÍ¶à¸ö.csvÎļþµÄÐÎʽ±£´æ£¬£¬£¬£¬Í¼ÏñÎļþÖ÷Ҫչʾ»¼ÕßµÄÖ÷´Î°ü¹Ü¿¨¼°²¿·Ö¼ÝÕÕÐÅÏ¢£¬£¬£¬£¬¶ø.csvÎļþÔòº­¸ÇÁËÁ½ÖÜÄڵϼÕß¾ÍÕï¼Í¼£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµØµã¡¢¿µ½¡ÐÅÏ¢¼°Õ˵¥ÏêÇéµÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£×îÐÂÒ»ÅúÊý¾Ý×èÖ¹10ÔÂ4ÈÕ£¬£¬£¬£¬Ã¿Á½ÖܵÄ.csvÎļþ¼Í¼×Å300µ½500Ãû»¼ÕߵľÍÕïÇéÐΡ£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬Ö±ÖÁÐÅÏ¢Ðû²¼Ê±£¬£¬£¬£¬PPMGÍøÕ¾¼°ÃÀ¹úÎÀÉúÓ빫¹²Ð§ÀͲ¿(HHS)µÄ¹«¹²Î¥¹æ¹¤¾ßÉϾùδÐû²¼Ïà¹ØÍ¨Öª¡£¡£¡£¡£¡£¡£DataBreachesÒÑÏòPPMGºÍEverest·¢ËÍѯÎÊ£¬£¬£¬£¬µ«ÉÐδÊÕµ½»Ø¸´¡£¡£¡£¡£¡£¡£


https://databreaches.net/2024/11/23/pacific-pulmonary-medical-group-patient-information-dumped-by-everest-ransomware-team/


2. Áè¼Ý2000̨Palo Alto Networks×°±¸ÔâºÚ¿ÍÈëÇÖ


11ÔÂ21ÈÕ£¬£¬£¬£¬Palo Alto Networks ±¨¸æ³ÆÆä¶à´ï2000̨װ±¸¿ÉÄÜÒÑÔ⵽ʹÓÃÐÂÅû¶Çå¾²Îó²îµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¾ÝShadowserver»ù½ð»áͳ¼Æ£¬£¬£¬£¬ÃÀ¹ú£¨554Àý£©ºÍÓ¡¶È£¨461Àý£©µÄѬȾ²¡Àý×î¶à£¬£¬£¬£¬ÆäËûÊÜÓ°Ïì¹ú¼Ò°üÀ¨Ì©¹ú¡¢Ä«Î÷¸ç¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÍÁ¶úÆä¡¢Ó¢¹ú¡¢ÃØÂ³ºÍÄÏ·Ç¡£¡£¡£¡£¡£¡£CensysÔò·¢Ã÷13,324¸ö¹ûÕæÌ»Â¶µÄÏÂÒ»´ú·À»ðǽ£¨NGFW£©ÖÎÀí½Ó¿Ú£¬£¬£¬£¬ÆäÖÐ34%λÓÚÃÀ¹ú£¬£¬£¬£¬µ«²¢·ÇËùÓÐ̻¶µÄÖ÷»ú¶¼±£´æÎó²î¡£¡£¡£¡£¡£¡£Éæ¼°µÄÇå¾²Îó²î°üÀ¨CVE-2024-0012£¨CVSS·ÖÊý9.3£©ºÍCVE-2024-9474£¨CVSS·ÖÊý6.9£©£¬£¬£¬£¬ËüÃÇ¿ÉÄܵ¼ÖÂÉí·ÝÑéÖ¤ÈÆ¹ýºÍȨÏÞÌáÉý£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄÜÖ´ÐжñÒâ²Ù×÷¡£¡£¡£¡£¡£¡£Palo Alto NetworksÕý×·×Ù´úºÅΪOperation Lunar PeekµÄÎó²îʹÓÃÇéÐΣ¬£¬£¬£¬²¢ÖÒÑÔ³ÆÕâЩÎó²îÒѱ»ÎäÆ÷»¯£¬£¬£¬£¬¿ÉÄÜÒý·¢¸üÆÕ±éµÄÍþв»î¶¯¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒÑÊӲ쵽ÊÖ¶¯ºÍ×Ô¶¯É¨Ãè»î¶¯£¬£¬£¬£¬²¢±Þ²ßÓû§¾¡¿ìÓ¦ÓÃÐÞ¸´³ÌÐò£¬£¬£¬£¬ÏÞÖÆÖÎÀí½çÃæ»á¼û£¬£¬£¬£¬ÒÔ±ÜÃâÍⲿ»á¼û¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2024/11/warning-over-2000-palo-alto-networks.html


3. Blue YonderÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬¹©Ó¦Á´Ð§ÀÍÖÐÖ¹Ó°ÏìÆÕ±é


11ÔÂ25ÈÕ£¬£¬£¬£¬¹©Ó¦Á´ÖÎÀí¹«Ë¾Blue Yonder£¨Ô­ÎªJDA Software£©£¬£¬£¬£¬×÷ΪËÉϵÄ×Ó¹«Ë¾£¬£¬£¬£¬ÄêÊÕÈ볬10ÒÚÃÀÔª£¬£¬£¬£¬ÓµÓÐ6000ÃûÔ±¹¤£¬£¬£¬£¬Îª°üÀ¨DHL¡¢À×ŵ¡¢È¸³²¡¢ÌØÒ×¹º¡¢ÐǰͿ˵È×ÅÃûÆóÒµÔÚÄÚµÄ3000Ãû¿Í»§ÌṩÈ˹¤ÖÇÄÜÇý¶¯µÄ¹©Ó¦Á´½â¾ö¼Æ»®¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬¸Ã¹«Ë¾½üÆÚÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ¼ÖÂÆäÍйÜЧÀÍÍйÜÇéÐηºÆðÖÐÖ¹£¬£¬£¬£¬Ó°ÏìÁËÆä¿Í»§£¬£¬£¬£¬ÌØÊâÊÇÓ¢¹úµÄÔÓ»õµêÁ¬Ëøµê¡£¡£¡£¡£¡£¡£Blue YonderÒÑÓëÍâ²¿ÍøÂçÇå¾²¹«Ë¾ÏàÖúÓ¦¶Ô´ËÊÂÎñ£¬£¬£¬£¬²¢ÊµÑéÁ˶àÏî·ÀÓùºÍȡ֤ЭÒ飬£¬£¬£¬µ«ÔÚÆä¹«¹²ÔÆÇéÐÎÖÐδ¼ì²âµ½¿ÉÒɻ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Blue YonderÈÔÔÚ´¦Öóͷ£¶àÖÖ»Ö¸´Õ½ÂÔ£¬£¬£¬£¬µ«ÉÐδ͸¶ÖÜÈ«»Ö¸´µÄÏêϸʱ¼ä±í¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¿Í»§£¬£¬£¬£¬ÈçMorrisonsºÍSainsbury£¬£¬£¬£¬ÒѽÓÄÉÓ¦¼±²½·¥À´Õ½Ê¤ÕâÒ»ÖÐÖ¹¡£¡£¡£¡£¡£¡£×èÖ¹×îÐÂÐÂÎÅ£¬£¬£¬£¬Blue YonderÉÐδÐû²¼ÓйØÇéÐεÄ×îÐÂÏ£Íû£¬£¬£¬£¬ÍƲâÆäÍйÜЧÀÍÇéÐÎÈÔÈ»Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ÉÐδÓÐÈκÎÀÕË÷Èí¼þÍÅ»ïÐû²¼¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/blue-yonder-ransomware-attack-disrupts-grocery-store-supply-chain/


4. MetaÖØÈ­¹¥»÷ɱÖíÕ©Æ­£¬£¬£¬£¬¹Ø±Õ200ÍòڲƭÕË»§


11ÔÂ24ÈÕ£¬£¬£¬£¬×Ô½ñÄêÄêÍ·ÒÔÀ´£¬£¬£¬£¬MetaÒÑ¹Ø±ÕÆäÆ½Ì¨ÉÏ200Íò¸öÓëɱÖíÕ©Æ­ºÍÆäËûڲƭÐÐΪÏà¹ØµÄÕË»§£¬£¬£¬£¬ÕâЩÕË»§Ö÷ÒªÀ´×ÔÃåµé¡¢ÀÏÎΡ¢°¢ÁªÇõ¡¢·ÆÂɱöºÍ¼íÆÒÕ¯µÈÒÔ¡°Õ©Æ­ÆÍ´Ó¡±»î¶¯ÖøÃûµÄ¹ú¼Ò¡£¡£¡£¡£¡£¡£ÕâЩթƭÖÐÐÄͨ¹ýÐû²¼ÐéαÕÐÆ¸ÐÅÏ¢ÒýÓÕÇóÖ°Õߣ¬£¬£¬£¬Ç¿ÆÈËûÃÇ´ÓÊÂÍøÂçÕ©Æ­£¬£¬£¬£¬²¢ÒÔÈËÉíݱ¶¾×÷ΪÍþв¡£¡£¡£¡£¡£¡£MetaÓëÕâЩ¹ú¼ÒµÄÖ´·¨»ú¹¹ÏàÖú£¬£¬£¬£¬·ÖÏíÇ鱨£¬£¬£¬£¬¹¥»÷Õ©Æ­ÐÐΪ¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬¡°É±Öí¡±Õ©Æ­ÊÇÒ»ÖÖÆÆËðÐԵĽðÈÚͶ×ÊȦÌ×£¬£¬£¬£¬ÒÀÀµÓÚºã¾ÃʹÓú͸߼¶ÓÕÆ­£¬£¬£¬£¬Ä¿µÄÓû§±é²¼È«Çò¡£¡£¡£¡£¡£¡£ËäÈ»¿´ËÆÏÝÈëȦÌ×µÄÈËÊýδ¼¸£¬£¬£¬£¬µ«ÒѳÉΪÕâЩÓÐ×éÖ¯·¸·¨¼¯Íŵľ޶îÊÕÈëȪԴ¡£¡£¡£¡£¡£¡£Meta½ÓÄÉÁËһϵÁв½·¥£¬£¬£¬£¬°üÀ¨Ö´ÐÐΣÏÕ×éÖ¯ºÍСÎÒ˽¼ÒÕþ²ß¡¢Ê¹ÓÃÐÐΪºÍÊÖÒÕÐźÅʶ±ðºÍ×èÖ¹Õ©Æ­Ïà¹ØÕË»§ºÍ»ù´¡ÉèÊ©¡¢ÓëÈ«ÇòÖ´·¨²¿·ÖÏàÖú¡¢Óë¿Æ¼¼¹«Ë¾ºÍ×éÖ¯ÏàÖú¡¢ÌṩÓû§±£»£»£»£»¤¹¦Ð§ºÍ½¨ÒéµÈ£¬£¬£¬£¬ÒÔ¼ì²âºÍ×èÖ¹ÕâЩȦÌ×£¬£¬£¬£¬±£»£»£»£»¤Óû§ÃâÊÜڲƭ¡£¡£¡£¡£¡£¡£MetaÌáÐÑÓû§ÉóÉ÷¿´´ýδ¾­ÇëÇóµÄͨѶ£¬£¬£¬£¬×èÖ¹ÔÚÉ罻ýÌåºÍͨѶƽ̨ÉÏÆò´û»ò¼ÓÈë¿ÉÒÉͶ×ÊÍýÏë¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/meta-removes-over-2-million-accounts-pushing-pig-butchering-scams/


5. Ì©¹ú¾¯·½ÆÆ»ñ´ó¹æÄ£¶ÌÐÅ´¹ÂÚÕ©Æ­°¸£¬£¬£¬£¬¾Ð²¶»õ³µË¾»ú


11ÔÂ24ÈÕ£¬£¬£¬£¬Ì©¹ú¾¯·½ÀÖ³ÉÆÆ»ñÒ»Æð´ó¹æÄ£¶ÌÐÅÕ©Æ­°¸£¬£¬£¬£¬¾Ð²¶ÁË»õ³µË¾»ú¡£¡£¡£¡£¡£¡£¸Ã»õ³µ×°±¸Á˶ÌÐÅ·¢ÉäÆ÷£¬£¬£¬£¬Äܹ»ÔÚ3¹«Àï¹æÄ£ÄÚÿСʱ·¢ËÍ10ÍòÌõ´¹ÂÚ¶ÌÐÅ¡£¡£¡£¡£¡£¡£Õ©Æ­¶ÌÐÅÉù³ÆÓû§µÄ»ý·Ö¼´½«ÓâÆÚ£¬£¬£¬£¬ÒýÓÕËûÃǵã»÷°üÀ¨¡°aisthailand¡±×Ö·û´®µÄ´¹ÂÚÍøÕ¾Á´½Ó£¬£¬£¬£¬¸ÃÁ´½Óαװ³ÉÌ©¹ú×î´óÒÆ¶¯µç»°ÔËÓªÉÌAISµÄ¹Ù·½ÍøÕ¾¡£¡£¡£¡£¡£¡£Óû§Ò»µ©µã»÷Á´½Ó²¢ÊäÈëÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬ÕâЩÐÅÏ¢¾Í»á±»·¢»Ø¸øÕ©Æ­ÍŻ£¬£¬£¬ÓÃÓÚÔÚÆäËû¹ú¼Ò¾ÙÐÐδ¾­ÊÚȨµÄÉúÒâ¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬¸ÃÕ©Æ­ÍŻﲿ·Ö³ÉÔ±ÔÚÌ©¹ú£¬£¬£¬£¬²¿·ÖÔÚÍâÑ󣬣¬£¬£¬Í¨¹ý˽ÈËTelegramƵµÀЭµ÷Ðж¯¡£¡£¡£¡£¡£¡£ÔÚÈýÌìÄÚ£¬£¬£¬£¬¸ÃÍÅ»ïÏòÂü¹ÈסÃñ·¢ËÍÁ˽üÒ»°ÙÍòÌõÕ©Æ­¶ÌÐÅ¡£¡£¡£¡£¡£¡£¾¯ÆÓÖ±ÔÚ×·²¶ÖÁÉÙÁíÍâÁ½ÃûÍÅ»ï³ÉÔ±£¬£¬£¬£¬²¢»ñµÃÁËAISµÄЭÖú¶¨Î»¶ÌÐÅ·¢ÉäÆ÷¡£¡£¡£¡£¡£¡£Ö»¹ÜÍøÂç´¹ÂÚÐÅÏ¢µÄÀÖ³ÉÂÊÒò¹«ÖÚÒâʶÌá¸ß¶ø½µµÍ£¬£¬£¬£¬µ«ÔÚÉú³Ý÷缯µØÇøÒÔ¸ßËÙÈö²¥Ê±£¬£¬£¬£¬ÈÔÄÜΪ·¸·¨Õß´øÀ´¿É¹ÛÊÕÒæ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/bangkok-busts-sms-blaster-sending-1-million-scam-texts-from-a-van/


6. ΢Èí¶àÏî½¹µãЧÀÍÔâÓöÈ«ÇòÐÔ´ó¹æÄ£ÖÐÖ¹


11ÔÂ25ÈÕ£¬£¬£¬£¬Î¢ÈíµÄ¶àÏî½¹µãЧÀÍ£¬£¬£¬£¬°üÀ¨Microsoft 365¡¢Exchange Online¡¢TeamsºÍOutlook£¬£¬£¬£¬ÔâÓöÁËÈ«ÇòÐԵĴó¹æÄ£ÖÐÖ¹£¬£¬£¬£¬µ¼ÖÂÓû§ÔÚÉ罻ýÌåÉÏ·×·×±¨¸æÎÞ·¨·¢ËÍÓʼþ¡¢ÍøÕ¾Í߽⼰¹ýÊ§Ò³ÃæµÈÎÊÌâ¡£¡£¡£¡£¡£¡£ÔÚÁùСʱÄÚ£¬£¬£¬£¬DowndetectorÒÑÊÕµ½Êýǧ·ÝÓû§±¨¸æ£¬£¬£¬£¬ÊÜÓ°ÏìµÄÓû§»¹ÌåÏÖÔÚÅþÁ¬OneDrive¡¢Purview¡¢CopilotµÈЧÀÍʱҲÓöµ½ÁËÕϰ­¡£¡£¡£¡£¡£¡£Î¢ÈíËæºóÈÏ¿ÉÎÊÌâ±£´æ£¬£¬£¬£¬²¢ÔÚÆ½Ì¨ÉÏÐû²¼ÉùÃ÷³ÆÕýÔڻعöÏà¹Ø±ä»»²¢Ñ°ÕÒÆäËû»º½â²½·¥£¬£¬£¬£¬Í¬Ê±ÁгöÁËÊÜÓ°ÏìµÄЧÀͺÍʹÓó¡¾°¡£¡£¡£¡£¡£¡£¹ÊÕÏÒ»Á¬11¸öСʱºó£¬£¬£¬£¬Î¢ÈíÑ¡ÔñÊÖ¶¯ÖØÆôЧÀÍÆ÷£¬£¬£¬£¬²¢ÔÚÖÎÀíÖÐÐĵÄÊÂÎñ±¨¸æÖÐÈ·ÈϸÃÖÐÖ¹×èÖ¹Á˿ͻ§Í¨¹ý¶àÖÖ·½·¨»á¼ûExchange Online¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬Ò»Ð©¿Í»§ÔÚʹÓÃMicrosoft Fabric¡¢Microsoft BookingsºÍMicrosoft Defender for Office 365µÈЧÀÍʱҲÓöµ½ÁËÎÊÌâ¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖÒÑ×îÏȰ²ÅÅÐÞ¸´³ÌÐò£¬£¬£¬£¬²¢ÊÖ¶¯ÖØÆô²¿·Ö²»¿µ½¡µÄ»úе£¬£¬£¬£¬µ«Ö±µ½25ÈÕ12µã33·Ö£¨EST£©£¬£¬£¬£¬°²ÅŵÄÐÞ¸´³ÌÐòÉÐδµ¼ÖÂÍêÈ«µÄЧÀͻָ´¡£¡£¡£¡£¡£¡£18µã25·Ö£¨EST£©£¬£¬£¬£¬Î¢Èí½øÒ»²½·ÖÏíÁËÊÂÎñÐÅÏ¢£¬£¬£¬£¬³ÆÊ¹ÊÊÇÓÉÒ»¸öµ¼ÖÂЧÀÍÆ÷·ÓÉÖØÊÔÇëÇó¼¤ÔöµÄ¸ü¸ÄÒýÆðµÄ£¬£¬£¬£¬ÍŶÓÕýÔÚÆð¾¢Ö´ÐкóÐøÐж¯£¬£¬£¬£¬²¢Æð¾¢»Ö¸´ËùÓй¦Ð§¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-365-outage-impacts-exchange-online-teams-sharepoint/