GE ³¬Éù×°±¸Îó²î°Ù³öÒ×ÔâÊÜÀÕË÷Èí¼þºÍÊý¾Ý͵ÇÔ

Ðû²¼Ê±¼ä 2024-05-20
1. GE ³¬Éù×°±¸Îó²î°Ù³öÒ×ÔâÊÜÀÕË÷Èí¼þºÍÊý¾Ý͵ÇÔ


5ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚ GE HealthCare µÄ Vivid Ultrasound ϵÁвúÆ·ÒÔ¼°Á½¸öÏà¹ØÈí¼þ³ÌÐòÖз¢Ã÷ÁË 11 ¸öÇå¾²Îó²î¡£¡£¡£¡£ÎÊÌâ¶àÖÖ¶àÑù£¬£¬£¬£¬£¬£¬°üÀ¨Ãô¸ÐÊý¾ÝȱÉÙ¼ÓÃÜ¡¢Ê¹ÓÃÓ²±àÂëÆ¾Ö¤µÈµÈ¡£¡£¡£¡£CVSS 3.1 ÆÀ·ÖϵͳµÄÑÏÖØË®Æ½´Ó 5.7 µ½ 9.6 ²»µÈ¡£¡£¡£¡£ÕýÈç Nozomi NetworksÔÚÆä±¨¸æÖÐËùÚ¹Ê͵ÄÄÇÑù£¬£¬£¬£¬£¬£¬ÕâЩ¹ýʧ¿ÉÄܻᵼÖ¾ßÓÐÍêȫȨÏÞµÄÔ¶³Ì´úÂëÖ´ÐÐ (RCE) ÒÔ¼°´ËÀàȨÏÞ¿ÉÄÜ´øÀ´µÄÈκÎÊýÄ¿µÄ¹¥»÷³¡¾°¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬×îÑÏÖØµÄÇéÐλ¹ÐèÒªÎïÆÊÎö¼ûÏà¹Ø×°±¸£¬£¬£¬£¬£¬£¬´Ó¶ø´ó´ó½µµÍÒ½ÁÆ»ú¹¹µÄDZÔÚΣº¦¡£¡£¡£¡£ÊÂʵÉÏ£¬£¬£¬£¬£¬£¬³¬Éù²¨»úÓÃÓÚÍⲿְԱ¾­³£»á¼ûµÄÒ½ÔººÍÕïËù£¬£¬£¬£¬£¬£¬¶øZ6×ðÁú¿­Ê±Ñо¿Åú×¢£¬£¬£¬£¬£¬£¬Ö»ÐèÒ»·ÖÖÓµÄÎïÆÊÎö¼û¾Í×ãÒÔÖ´Ðй¥»÷¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬ÎÒÃÇÒÔΪ²»µ«ÊǶñÒâµÄÄÚ²¿Ö°Ô±£¬£¬£¬£¬£¬£¬µ«ÍâÈËÒ²¿ÉÄÜÓÐʱ»úÍê³É¹¥»÷¡£¡£¡£¡£


https://www.darkreading.com/vulnerabilities-threats/ge-ultrasound-gear-riddled-with-bugs-open-to-ransomware-data-theft


2. µç×Ó´¦·½ÌṩÉÌ MEDISECURE Êܵ½ÀÕË÷Èí¼þ¹¥»÷µÄÓ°Ïì


5ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬°Ä´óÀûÑǵĵç×Ó´¦·½ÌṩÉÌ MediSecure ÔâÊÜÁË¿ÉÄÜÀ´×ÔµÚÈý·½¹©Ó¦É̵ÄÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£MediSecure ÊÇÒ»¼ÒÌṩÊý×Ö¿µ½¡½â¾ö¼Æ»®µÄ¹«Ë¾£¬£¬£¬£¬£¬£¬ÌØÊâרעÓÚ°Ä´óÀûÑǵÄÇå¾²µç×Ó´¦·½½»¸¶Ð§ÀÍ¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÔâÊÜÍøÂç¹¥»÷ºó±»ÆÈ¹Ø±ÕÆäÍøÕ¾ºÍµç»°Ïß·£¬£¬£¬£¬£¬£¬µ«Ã»ÓÐÌá¼°ÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£ÍþвÐÐΪÕß»ñµÃÁËÊýÄ¿²»ÏêµÄСÎÒ˽¼ÒµÄСÎÒ˽¼ÒºÍ¿µ½¡ÐÅÏ¢¡£¡£¡£¡£¸Ã¹«Ë¾ÈÔÔÚ¹ú¼ÒÍøÂçÇ徲Эµ÷Ô±µÄ×ÊÖúÏÂÊÓ²ìÕâÒ»Çå¾²Îó²î£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾Í¸Â¶£¬£¬£¬£¬£¬£¬ÔçÆÚ¼£ÏóÅú×¢¸ÃÊÂÎñÔ´×ÔÆäµÚÈý·½¹©Ó¦ÉÌÖ®Ò»¡£¡£¡£¡£


https://securityaffairs.com/163257/cyber-crime/medisecure-impacted-by-ransomware-attack.html


3. ºÚ¿ÍʹÓÃÐéα DocuSign Ä£°åÀ´Õ©Æ­×éÖ¯


5ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬Ê¹Óÿ´ËÆÀ´×Ô DocuSign µÄµç×ÓÓʼþµÄÍøÂç´¹ÂÚ¹¥»÷¼¤Ôö£¬£¬£¬£¬£¬£¬ÊÇÓɶíÂÞ˹°µÍøÊг¡Íƶ¯µÄ£¬£¬£¬£¬£¬£¬¸ÃÊг¡ÓµÓÐÖÖÖÖÄ£°åºÍµÇ¼ƾ֤¡£¡£¡£¡£ÕâЩڲƭÐÔµç×ÓÓʼþ¾­ÓÉÈ«ÐÄÉè¼Æ£¬£¬£¬£¬£¬£¬Ö¼ÔÚÄ£ÄâÕýµ±µÄÎĵµÊðÃûÇëÇ󣬣¬£¬£¬£¬£¬ÒýÓÕºÁÎÞ½äÐĵÄÊÕ¼þÈ˵ã»÷¶ñÒâÁ´½Ó»òй¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£×î½üÕâЩ¹¥»÷µÄÔöÌí¿É¹éÒòÓÚ¼¸¸öÒòËØ£¬£¬£¬£¬£¬£¬°üÀ¨¸Ãƽ̨ÔÚ¸÷¸öÐÐÒµµÄÆÕ±é½ÓÄÉ¡¢ÆäÖµµÃÐÅÈεÄÉùÓþ£¬£¬£¬£¬£¬£¬ÒÔ¼°×îÖ÷ÒªµÄÊÇÍøÂç·¸·¨Õ½ÂÔµÄÈÕÒæÖØ´ó¡£¡£¡£¡£ÔÚÕâÖÖÇéÐÎÏ£¬£¬£¬£¬£¬£¬Òì³£Ñо¿Ö°Ô±´Ó¶Ô¿Í»§µÄÒ»´Î¹¥»÷ÖлñÈ¡ÁËÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢ÔÚµØÏÂÂÛ̳ºÍÍøÂçÉϾÙÐÐÁËËÑË÷¡£¡£¡£¡£×îÖÕ£¬£¬£¬£¬£¬£¬ËÑË÷½«ËûÃÇ´øµ½Á˶íÂÞ˹Êг¡£¬£¬£¬£¬£¬£¬ÔÚÄÇÀïËûÃÇÕÒµ½ÁËÏàͬµÄ DocuSign Ä£°å¡£¡£¡£¡£²»Á¼ÐÐΪÕßÔËÐÐÍøÂç´¹Âڻʱ£¬£¬£¬£¬£¬£¬»áÊÔͼͨ¹ýÈõç×ÓÓʼþ¿´ÆðÀ´À´×ÔÕýµ±ÈªÔ´£¨ÀýÈçÆóÒµ»òСÎÒ˽¼Ò£©À´ÓªÔìÕæÊµµÄÆø·Õ£¬£¬£¬£¬£¬£¬ÕâÖÖÇéÐβ¢²»ÓÐÊý¡£¡£¡£¡£½ü¼¸¸öÔÂÀ´£¬£¬£¬£¬£¬£¬Óб¨µÀ³Æ£¬£¬£¬£¬£¬£¬ÓÐÈËÔÚÊÕµ½¿´ËÆÀ´×ÔÃÀ¹úÓÊÕþЧÀ͵ĶÌÐźóÏÝÈëÕ©Æ­¡£¡£¡£¡£


https://securityboulevard.com/2024/05/hackers-use-fake-docusign-templates-to-scam-organizations/


4. ɣ̹µÂÒøÐб¬·¢Êý¾ÝÐ¹Â¶Éæ¼°µÚÈý·½¹©Ó¦ÉÌ


5ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬Î÷°àÑÀÒøÐлú¹¹É£Ì¹µÂÒøÐÐ (Santander) Ðû²¼£¬£¬£¬£¬£¬£¬¸Ã»ú¹¹×î½üÔâÊÜÁËÒ»´ÎÊý¾Ýй¶£¬£¬£¬£¬£¬£¬Êܺ¦Õß»ñµÃÁ˶ԵÚÈý·½ÌṩÉÌÍйܵÄÊý¾Ý¿âµÄ»á¼ûȨÏÞ¡£¡£¡£¡£Î¥¹æÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬£¬É£Ì¹µÂÒøÐÐÁ¬Ã¦½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬Í¨¹ý×èÖ¹¶ÔÊÜËðÊý¾Ý¿âµÄ»á¼ûÀ´ÏÞÖÆÈëÇÖ¹æÄ£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÒ»·ÝÐÂΟåÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬»¹½¨ÉèÁËڲƭԤ·À¿ØÖƲ½·¥£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»£»¤ÊÜÎ¥¹æÓ°ÏìµÄ¿Í»§£¬£¬£¬£¬£¬£¬µ«Î´Ìá¼°ÌṩÉ̵ÄÃû³Æ¡£¡£¡£¡£É£Ì¹µÂÒøÐеÄÒ»·ÝÉùÃ÷³Æ£º¡°Êý¾Ý¿âÖв»°üÀ¨ÉúÒâÊý¾Ý£¬£¬£¬£¬£¬£¬Ò²²»°üÀ¨ÈκÎÔÊÐíÔÚÕË»§ÉϾÙÐÐÉúÒâµÄƾ֤£¬£¬£¬£¬£¬£¬°üÀ¨ÍøÉÏÒøÐÐÏêϸÐÅÏ¢ºÍÃÜÂë¡£¡£¡£¡£¡±Ëü»¹Ö¸³ö£¬£¬£¬£¬£¬£¬ÒøÐеÄÔËÓªºÍϵͳûÓÐÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬ÕâÒâζ×ſͻ§ÈÔÈ»¿ÉÒÔÑ¡Ôñ¾ÙÐÐÉúÒâ¡£¡£¡£¡£ÔÚ¶ÔÍøÂçÊÂÎñµÄÊÓ²ìÖУ¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾·¢Ã÷ÓëÖÇÀû¡¢Î÷°àÑÀºÍÎÚÀ­¹ç¿Í»§Ïà¹ØµÄÐÅÏ¢ÒÔ¼°²¿·Öǰɣ̹µÂÒøÐÐÔ±¹¤µÄÐÅÏ¢±»»á¼û¡£¡£¡£¡£


https://www.darkreading.com/cyberattacks-data-breaches/santander-falls-victim-to-data-breach-involving-third-party-provider


5. Kimsuky ºÚ¿ÍÔÚ¶Ôº«¹úµÄ¹¥»÷Öа²ÅÅÐ嵀 Linux ºóÃÅ


5ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬³¯ÏʺڿÍ×éÖ¯ Kimsuki Ò»Ö±ÔÚʹÓÃÒ»ÖÖÃûΪ Gomir µÄРLinux ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ËüÊÇͨ¹ýľÂíÈí¼þ×°ÖóÌÐòÈö²¥µÄ GoBear ºóÃŵÄÒ»¸ö°æ±¾¡£¡£¡£¡£Kimsuky ÊÇÒ»¸öÊܹú¼ÒÖ§³ÖµÄÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬Ó볯ÏʾüÊÂÇ鱨»ú¹¹Õì̽×Ü¾Ö (RGB) ÓÐÁªÏµ¡£¡£¡£¡£2024 Äê 2 ÔÂÉÏÑ®£¬£¬£¬£¬£¬£¬SW2 ÍþвÇ鱨¹«Ë¾µÄÑо¿Ö°Ô±±¨¸æÁËÒ»Ïî»î¶¯£¬£¬£¬£¬£¬£¬ÆäÖÐ Kimsuky ʹÓÃÖÖÖÖÈí¼þ½â¾ö¼Æ»®µÄľÂí°æ±¾£¨ÀýÈç SGA Solutions¡¢Wizvera VeraPort µÄ TrustPKI ºÍ NX_PRNMAN£©£¬£¬£¬£¬£¬£¬Ê¹Óà Troll Stealer ºÍ»ùÓÚ Go µÄ¶ñÒâÈí¼þѬȾº«¹úÄ¿µÄ¡£¡£¡£¡£Windows ¶ñÒâÈí¼þ GoBear¡£¡£¡£¡£Broadcom ¹«Ë¾ÈüÃÅÌú¿ËµÄÆÊÎöʦÔÚÊÓ²ìÕë¶Ôº«¹úÕþ¸®×éÖ¯µÄͳһ»î¶¯Ê±·¢Ã÷ÁËÒ»ÖÖеĶñÒ⹤¾ß£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ßËÆºõÊÇ GoBear ºóÃÅµÄ Linux ±äÌå¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/kimsuky-hackers-deploy-new-linux-backdoor-in-attacks-on-south-korea/


6. Singing RiverµÄÒ½ÁÆÏµÍ³±¬·¢´ó¹æÄ£Êý¾Ýй¶


5ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬ÃÜÎ÷Î÷±ÈÖÝ Singing River µÄÒ»¼ÒÖ÷ÒªÒ½ÁƱ£½¡ÌṩÉÌ×î½üÅû¶£¬£¬£¬£¬£¬£¬2023 Äê 8 ÔµÄÒ»´ÎÍøÂç¹¥»÷Ó°ÏìÁË 895,204 È˵ÄÊý¾Ý¡£¡£¡£¡£¸ÃÒ½ÁÆÍøÂç°üÀ¨ÅÁ˹¿¨¹ÅÀ­¡¢º£ÈªÊк͸ñ¶û·ò²¨ÌصÄÒ½ÔºÒÔ¼°¸ÃµØÇøµÄÆäËûÒ½ÁÆ»ú¹¹¡£¡£¡£¡£2023 Äê 8 Ô 19 ÈÕ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ðû²¼³ÉÎªÖØ´óÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õߣ¬£¬£¬£¬£¬£¬µ¼ÖÂÒ½ÔºÖÐÖ¹ºÍDZÔÚµÄÊý¾Ý͵ÇÔ¡£¡£¡£¡£×èÖ¹ 8 ÔÂ⣬£¬£¬£¬£¬£¬¸Ã×éÖ¯Òѱ»ÁÐÈëÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿ÃñȨ°ì¹«ÊÒµÄÎ¥¹æÃÅ»§ÍøÕ¾£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìÈËÊýÔݶ¨Îª 501 ÈË¡£¡£¡£¡£2023 Äê 9 Ô 13 ÈÕ£¬£¬£¬£¬£¬£¬È·ÈÏÊý¾Ý±»µÁ£¬£¬£¬£¬£¬£¬×èֹͬÄê 12 Ô 18 ÈÕ£¬£¬£¬£¬£¬£¬¾Ý±¨µÀ¸ÃÎó²îÒÑÓ°Ïì 252,890 ÈË¡£¡£¡£¡£¼¸ÌìǰÏòÃåÒòÖÝÕþ¸®ÌṩµÄ×îиüÐÂÏÔʾ£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìÈËÊýÔöÌíÖÁ 895,204 ÈË¡£¡£¡£¡£


https://meterpreter.org/massive-data-breach-at-singing-river-health-system-nearly-900000-affected/