OneBloodÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬Ï×ѪÕßСÎÒ˽¼ÒÐÅϢй¶
Ðû²¼Ê±¼ä 2025-01-151. OneBloodÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬Ï×ѪÕßСÎÒ˽¼ÒÐÅϢй¶
1ÔÂ13ÈÕ£¬£¬£¬£¬·ÇÓ¯ÀûÏ×Ѫ»ú¹¹OneBlood֤ʵ£¬£¬£¬£¬2024ÄêÑ×ÌìÔâÊÜÁËÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ¼ÖÂÏ×ѪÕßµÄСÎÒ˽¼ÒÐÅÏ¢±»ÇÔÈ¡¡£¡£¡£¡£¸Ã»ú¹¹ÓÚ2024Äê7ÔÂ31ÈÕÊ״ιûÕæÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬Ö¸³ö¹¥»÷Õß¼ÓÃÜÁËÆäÐéÄâ»ú£¬£¬£¬£¬ÆÈʹÆä½ÓÄÉÊÖ¶¯Á÷³Ì£¬£¬£¬£¬½ø¶øÓ°ÏìÁËѪҺÊÕÂÞ¡¢¼ì²âºÍ·ÖÅÉ£¬£¬£¬£¬µ¼Ö²¿·ÖÕïËù·ºÆðÑÏÖØÑªÒºÇ·È±¡£¡£¡£¡£OneBloodËæ¼´·¢³ö½ôÆÈºôÓõ£¬£¬£¬£¬ÇëÇóļ¾èOÐÍѪ¡¢OÐÍѪÒõÐÔѪºÍѪС°å¡£¡£¡£¡£ÉÏÖÜ£¬£¬£¬£¬OneBlood×îÏÈÏòÊÜÓ°ÏìСÎÒ˽¼Ò·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬È·ÈÏй¶±¬·¢ÔÚ2024Äê7ÔÂ14ÈÕ£¬£¬£¬£¬ÇÒÍþвÐÐΪÕßÖ±ÖÁ7ÔÂ29ÈÕ²ÅÊ§È¥ÍøÂç»á¼ûȨÏÞ¡£¡£¡£¡£Ð¹Â¶Êý¾ÝÖ÷Òª°üÀ¨ÐÕÃûºÍÉç»áÇå¾²ºÅÂ루SSN£©£¬£¬£¬£¬ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇԺͽðÈÚڲƣ¬£¬£¬£¬Î£º¦Ò»Á¬¶àÄê¡£¡£¡£¡£Îª½µµÍΣº¦£¬£¬£¬£¬OneBloodÌṩÁËÒ»ÄêÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬²¢½¨ÒéÊÜÓ°ÏìСÎÒ˽¼ÒÉèÖÃÐÅÓö³½áºÍڲƾ¯±¨¡£¡£¡£¡£Ö»¹ÜOneBloodÒÑÍÆÐÐ֪ͨÒåÎñ£¬£¬£¬£¬µ«Áù¸öÔµÄÑÓ³ÙÈÔʹÊÜÓ°ÏìÕßÃæÁÙΣº¦¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷µÄÏêϸÊÜÓ°ÏìÈËÊýÉÐδÅû¶¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/oneblood-confirms-personal-data-stolen-in-july-ransomware-attack/
2. ¶íÇ鱨¹ØÁªºÚ¿Í×é֯ʹÓùþÕþ¸®ÎļþÍøÂç´¹ÂÚ¹¥»÷ÖÐÑǹÙÔ±
1ÔÂ13ÈÕ£¬£¬£¬£¬SekoiaÑо¿Ö°Ô±Õ¹ÏÖ£¬£¬£¬£¬Ò»¸öÓë¶íÂÞ˹Ç鱨²¿·ÖÏà¹ØÁªµÄºÚ¿Í×éÖ¯£¬£¬£¬£¬Ê¹Óÿ´ËÆÕýµ±µÄ¹þÈø¿Ë˹̹Õþ¸®Îļþ×÷ÎªÍøÂç´¹ÂÚÓÕ¶ü£¬£¬£¬£¬ÀÖ³ÉѬȾºÍ¼àÊÓÁËÖÐÑÇÕþ¸®¹ÙÔ±¡£¡£¡£¡£ÕâЩÎļþ°üÀ¨¹þÈø¿Ë˹̹Õþ¸®µÄÍâ½»ÉùÃ÷¡¢Ðź¯µÈµ×¸å£¬£¬£¬£¬ÇÒÄÚÈÝÓëÕæÊµÎļþ¸ß¶ÈÏàËÆ£¬£¬£¬£¬ÄÚǶÓжñÒâÈí¼þ¡£¡£¡£¡£¸ÃºÚ¿Í×éÖ¯±»Ö¸ÒÔΪAPT 28£¨Fancy Bear£©£¬£¬£¬£¬ÓëĪ˹¿ÆÖÐÑëÇ鱨¾Ö(GRU)ÓÐÁªÏµ¡£¡£¡£¡£×Ô2024Äê7ÔÂÒÔÀ´£¬£¬£¬£¬¸Ã×éÖ¯ÔÚÖÐÑÇ¡¢¶«ÑǺÍÅ·ÖÞµØÇøÒÑÓÕÆÊýÊ®ÃûÊܺ¦Õߣ¬£¬£¬£¬Ê¹ÓÃHATVIBEºÍCHERRYSPYÁ½ÖÖ¶ñÒâÈí¼þ¡£¡£¡£¡£ÕâЩÎĵµÔÚWordÖÐÖ´ÐжñÒâºêÎļþ£¬£¬£¬£¬½µµÍ×°±¸Çå¾²ÉèÖ㬣¬£¬£¬ÉúÑĶñÒâÈí¼þ±äÁ¿²¢Æô¶¯ÉñÃØ³ÌÐò¡£¡£¡£¡£´Ë´Î»î¶¯±»ÃüÃûΪ¡°Ë«»÷¡±¡£¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬£¬HATVIBEÓëZEBROCYºóÃÅÊÖÒÕÖØµþ£¬£¬£¬£¬¾ùÖ¸ÏòFancy Bear¡£¡£¡£¡£Ö»¹ÜÉв»ÇåÎúAPT 28ÔõÑù»ñÈ¡ÕâЩ¹þÈø¿Ë˹̹Õþ¸®Îļþ£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÍƲâ¿ÉÄÜͨ¹ýÔçÆÚÍøÂçÐж¯Ð¹Â¶¡¢¿ªÔ´ÍøÂç»òÎïÀíÐж¯»ñµÃ¡£¡£¡£¡£¹þÈø¿Ë˹̹ÒòÔÚÎÚ¿ËÀ¼Õ½ÕùµÈÎÊÌâÉÏÍÑÀë¶íÂÞ˹ӰÏ죬£¬£¬£¬ÒÔ¼°³ÉΪÉÌÒµÖ÷Ҫͬ°éºÍ½¨ÉèºËµçÕ¾µÄ¹ú¼Ê¾ºÕù£¬£¬£¬£¬³ÉÎªÍøÂçÌØ¹¤»î¶¯µÄÖ÷ҪĿµÄ¡£¡£¡£¡£¶íÂÞ˹ּÔÚÈ·±£¹þÈø¿Ë˹̹ÕþÖÎÒ»Ö£¬£¬£¬£¬µÖÏû¾ºÕùµÐÊÖÓ°Ï죬£¬£¬£¬²¢Àο¿ÆäÔڸõØÇøµÄ¾¼ÃºÍÕ½ÂÔְλ¡£¡£¡£¡£
https://cyberscoop.com/fancy-bear-kazakhstan-russia-sekoia/
3. Aviatrix Controller¸ßΣ©¶¼òªư²ÅÅÊÜÍþв
1ÔÂ13ÈÕ£¬£¬£¬£¬Aviatrix ControllerÖеÄÒ»¸ö¸ßÑÏÖØÐÔÎó²î£¨CVE-2024-50603£©±»Åû¶ºó£¬£¬£¬£¬¶Ô¶à¸öÔÆ°²ÅÅ×é³ÉÁËÍþв¡£¡£¡£¡£¸ÃÎó²îÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©£¬£¬£¬£¬²¢ÇÒÔÚAWSÖеÄĬÈϰ²Åű£´æÈ¨ÏÞÌáÉýΣº¦£¬£¬£¬£¬Òò´ËÌØÊâΣÏÕ¡£¡£¡£¡£Îó²îÓÚ1ÔÂ7ÈÕÅû¶£¬£¬£¬£¬ÒÑÓйûÕæµÄ¿´·¨ÑéÖ¤£¨PoC£©Îó²î¡£¡£¡£¡£Aviatrix ControllerÓÃÓÚ×ÊÖúÖÎÀíºÍ×Ô¶¯»¯AWS°²ÅÅ£¬£¬£¬£¬Ö»¹ÜÖ»ÓÐÔ¼3%µÄAWS¿Í»§Ê¹ÓøòúÆ·£¬£¬£¬£¬µ«ÔÚ65%µÄÔÆÇéÐÎÖУ¬£¬£¬£¬Ëü°²ÅÅÔÚÐéÄâ»úÉÏ£¬£¬£¬£¬±£´æºáÏòÒÆ¶¯Â·¾¶£¬£¬£¬£¬ÔÊÐí¹¥»÷Õß»ñµÃÖÎÀíԱȨÏÞ¡£¡£¡£¡£Ñо¿Ö°Ô±ÊӲ쵽ÀÖ³ÉÎó²îµ¼Ö¶ñÒâÈí¼þ°²ÅÅ£¬£¬£¬£¬ÈçSilverºóÃźͼÓÃÜÐ®ÖÆ¡£¡£¡£¡£·ÀÓùÕß¿ÉÒÔÉý¼¶µ½7.2.4996°æ±¾ÒÔ×èÖ¹¸ÃÎó²î£¬£¬£¬£¬²¢×èֹͨ¹ý¶Ë¿Ú443µÄ¹ûÕæ»á¼û¡£¡£¡£¡£Aviatrix»¹ÌṩÁ˲¹¶¡£¬£¬£¬£¬µ«Ö¸³öÔÚijЩÇéÐÎÏ¿ÉÄÜÐèÒªÖØÐÂÓ¦Óᣡ£¡£¡£
https://www.theregister.com/2025/01/13/severe_aviatrix_controller_vulnerability/
4. ¡¶Á÷·Å֮·2¡·ÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬66¸öÍæ¼ÒÕÊ»§±»µÁ
1ÔÂ13ÈÕ£¬£¬£¬£¬¡¶Á÷·Å֮·2¡·ÔâÊÜÁËÒ»ÆðÑÏÖØµÄºÚ¿Í¹¥»÷ÊÂÎñ£¬£¬£¬£¬¹¥»÷Õßͨ¹ý͵ȡµÄÒ»¸ö¾ÉSteamÕÊ»§£¬£¬£¬£¬»ñµÃÁËÓë¸ÃÕÊ»§Ïà¹ØÁªµÄÖÎÀíÔ±ÕÊ»§»á¼ûȨÏÞ¡£¡£¡£¡£ÕâÒ»Îó²îʹµÃÍþвÐÐΪÕßÄܹ»¸ü¸ÄÖÁÉÙ66¸öÍæ¼ÒÕÊ»§µÄÃÜÂ룬£¬£¬£¬²¢»á¼ûÕâЩÕÊ»§£¬£¬£¬£¬µ¼ÖÂÐí¶àÍæ¼ÒɥʧÁËÓÎÏ·ÄÚ¹ºÖõÄÎïÆ·£¬£¬£¬£¬°üÀ¨Õä¹ó×°±¸ºÍÆÆ·ÑÊý°ÙСʱ²Å»ñµÃµÄÎïÆ·¡£¡£¡£¡£ÓÉÓÚÈÕÖ¾±£´æµÄʱ¼äÏÞÖÆ£¬£¬£¬£¬¿ÉÄÜÉÐÓиü¶àÕÊ»§ÔÚ´Ë´ÎÎ¥¹æÐÐΪÖÐÊÜË𣬣¬£¬£¬µ«Ïêϸ¹æÄ£ÒÑÎÞ·¨È·¶¨¡£¡£¡£¡£ÓÎÏ·¿ª·¢ÉÌGrinding Gear GamesµÄÓÎÏ·×ܼà֤ʵÁËÕâ´Î¹¥»÷£¬£¬£¬£¬²¢ÌåÏÖÕâÊÇͨ¹ýÒ»¸ö±»µÁµÄÖÎÀíÔ±ÕÊ»§¾ÙÐеġ£¡£¡£¡£Ëû»¹Í¸Â¶£¬£¬£¬£¬ÓÎÏ·ºó¶Ë±£´æ¹ýʧºÍÇå¾²Îó²î£¬£¬£¬£¬±¾¿ÉÒÔ×èÖ¹Õâ´Î¹¥»÷£¬£¬£¬£¬µ«Òź¶µÄÊÇËûÃÇ¡°ÍêÈ«¸ãÔÒÁË¡±¡£¡£¡£¡£Ö»¹Ü¿ª·¢ÉÌÒѾ½ÓÄÉÁËһЩÇå¾²²½·¥£¬£¬£¬£¬µ«¹ØÓÚÄÇЩÊÜÓ°ÏìµÄÕÊ»§£¬£¬£¬£¬ËûÃÇÉÐδÐû²¼ÈκÎÅâ³¥ÍýÏ룬£¬£¬£¬²¢ÌåÏÖÎÞ·¨»Ö¸´±»µÁÎïÆ·¡£¡£¡£¡£´Ë´ÎÊÂÎñ¶ÔÍæ¼ÒÉçÇøÔì³ÉÁËÖØ´óÓ°Ï죬£¬£¬£¬Ðí¶àÍæ¼Ò¶ÔÓÎÏ·µÄÇå¾²ÐÔÌåÏÖµ£ÐÄ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/stolen-path-of-exile-2-admin-account-used-to-hack-player-accounts/
5. AWS S3´æ´¢Í°ÔâCodefingerÀÕË÷Èí¼þ¼ÓÃܹ¥»÷
1ÔÂ13ÈÕ£¬£¬£¬£¬Ò»ÖÖеÄÀÕË÷Èí¼þ»î¶¯ÕýÔÚʹÓÃAWSµÄЧÀÍÆ÷¶Ë¼ÓÃܺͿͻ§ÌṩµÄÃÜÔ¿£¨SSE-C£©À´¼ÓÃÜAmazon S3´æ´¢Í°ÖеÄÊý¾Ý£¬£¬£¬£¬²¢ÒªÇóÖ§¸¶Êê½ð²Å»ª»ñµÃ½âÃÜÃÜÔ¿¡£¡£¡£¡£ÕâÒ»»î¶¯ÓÉÃûΪ¡°Codefinger¡±µÄÍþвÐÐΪÕßÌᳫ£¬£¬£¬£¬²¢ÒÑÖÁÉÙ¶ÔÁ½ÃûÊܺ¦ÕßʵÑéÁ˹¥»÷¡£¡£¡£¡£ÑÇÂíÑ·¼òÆÓ´æ´¢Ð§ÀÍ£¨S3£©ÊÇÒ»ÖÖ¿ÉÀ©Õ¹¡¢Çå¾²ÇÒ¸ßËٵŤ¾ß´æ´¢Ð§ÀÍ£¬£¬£¬£¬¶øSSE-CÊÇÒ»ÖÖ¼ÓÃÜÑ¡Ï£¬£¬£¬ÔÊÐí¿Í»§Ê¹ÓÃ×Ô¼ºµÄ¼ÓÃÜÃÜԿͨ¹ýAES-256Ëã·¨¼ÓÃÜÏ¢ÕùÃÜÊý¾Ý¡£¡£¡£¡£ÔÚCodefingerµÄ¹¥»÷ÖУ¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃÊÜËðµÄAWSƾ֤¶¨Î»¾ßÓÐÌØ¶¨È¨ÏÞµÄÊܺ¦ÕßÃÜÔ¿£¬£¬£¬£¬È»ºóÔÚÍâµØÌìÉú¼ÓÃÜÃÜÔ¿À´¼ÓÃÜÄ¿µÄÊý¾Ý¡£¡£¡£¡£ÓÉÓÚAWS²»´æ´¢ÕâЩ¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬Òò´ËÊý¾Ý»Ö¸´±äµÃ²»¿ÉÄÜ£¬£¬£¬£¬³ý·Ç»ñµÃ¹¥»÷ÕßµÄÏàÖú¡£¡£¡£¡£¹¥»÷Õß»¹ÉèÖÃÁËΪÆÚÆßÌìµÄÎļþɾ³ýÕ½ÂÔ£¬£¬£¬£¬²¢ÔÚËùÓÐÊÜÓ°ÏìµÄĿ¼Öа²ÅÅÊê½ð֪ͨ£¬£¬£¬£¬ÒªÇóÊܺ¦ÕßÔÚÖ¸¶¨µÄ±ÈÌØ±ÒµØµãÉÏÖ§¸¶Êê½ð¡£¡£¡£¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬£¬£¬£¬ÑÇÂíÑ·½¨ÒéʵÑéÑÏ¿áµÄÇå¾²ÐÒ飬£¬£¬£¬²¢ÃãÀøAWS¿Í»§ÉèÖÃÏÞÖÆÐÔÕ½ÂÔ£¬£¬£¬£¬±ÜÃâÔÚÆäS3´æ´¢Í°ÉÏʹÓÃSSE-C¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬Ó¦½ûÓÃδʹÓõÄAWSÃÜÔ¿£¬£¬£¬£¬¾³£ÂÖ»»»î¶¯ÃÜÔ¿£¬£¬£¬£¬²¢½«ÕÊ»§È¨ÏÞ¼á³ÖÔÚËùÐèµÄ×î³õ¼¶±ð¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ransomware-abuses-amazon-aws-feature-to-encrypt-s3-buckets/
6. °£Òò»ôÎÂÀí¹¤´óѧÔâÍøÂç¹¥»÷£¬£¬£¬£¬½ôÆÈ¹Ø±ÕÍøÂç²¢×÷·Ï½ÌÓý»î¶¯
1ÔÂ13ÈÕ£¬£¬£¬£¬°£Òò»ôÎÂÀí¹¤´óѧÔÚÖÜÁùÍíÉÏ9µã×óÓÒ¼ì²âµ½ÍøÂç¹¥»÷ºó£¬£¬£¬£¬Ñ¸ËÙ½ÓÄÉÁ˹رÕÍøÂçµÄ²½·¥ÒÔ±ÜÃâ¸üÑÏÖØµÄЧ¹û¡£¡£¡£¡£Ö»¹Ü´Ë¾Ùµ¼ÖÂÒÀÀµ´óÑ§ÍøÂçµÄÉèÊ©£¨Èçµç×ÓÓʼþ¡¢WiFiºÍʳÌÃÊÕÒø»ú£©ÎÞ·¨Ê¹Ó㬣¬£¬£¬µ«Ñ§ÉúºÍÔ±¹¤ÈÔ¿ÉÒÔ½øÈëУ԰¡£¡£¡£¡£´óѧÔÚÖÜÈÕ½ÒÏþÉùÃ÷³Æ£¬£¬£¬£¬ÓÉÓÚѧÉúÕýÔÚ×¼±¸¿¼ÊÔ£¬£¬£¬£¬Ô¤¼Æ´Ë´ÎÍøÂç¹¥»÷¶Ô½Ìѧʱ¼äµÄÓ°Ï콫ÓÐÏÞ£¬£¬£¬£¬Í¬Ê±Ç¿µ÷ÆäITÖ°Ô±ÕýÔÚÈ«Á¦ÊÓ²ì´Ë´Î¹¥»÷£¬£¬£¬£¬²¢Ö¸³ÊÏÖÔÚÉÐÎÞ¼£ÏóÅú×¢Êý¾Ý±»µÁ¡£¡£¡£¡£¸±Ð£³¤ÅÁÌØÀï¿Ë¡¤¸ñÂ³ÌØºú˹ÌåÏÖ£¬£¬£¬£¬ËûÃÇÒâʶµ½¹Ø±ÕÍøÂç»á´øÀ´ÑÏÖØÐ§¹û£¬£¬£¬£¬µ«ÕâÊÇΪÁ˱ÜÃâ¸üÔã¸âµÄЧ¹û±¬·¢£¬£¬£¬£¬²¢Ï£Íû»ñµÃ¸÷È˵ÄÃ÷È·¡£¡£¡£¡£Ö»¹Ü´Ë´Î¹¥»÷µÄÏêϸÐÔ×ÓÉÐδÅû¶£¬£¬£¬£¬µ«Å·ÖÞÐí¶àÀí¹¤´óѧ½üÄêÀ´¶¼Êܵ½ÁËÀÕË÷Èí¼þ×éÖ¯µÄÓ°Ïì¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬Ö»¹Ü°£Òò»ôÎÂÀí¹¤´óѧÓëÐí¶àÆóÒµ¼á³Ö×ÅÁªÏµ£¬£¬£¬£¬µ«ÏÖÔÚûÓм£ÏóÅú×¢ÕâЩÆóÒµ¿ÉÄÜÊܵ½Ó°Ïì¡£¡£¡£¡£
https://therecord.media/tu-eindhoven-cyberattack-lectures-canceled