ServiceBridgeÊý¾Ý¿âÉèÖùýʧµ¼ÖÂÊý°ÙÍòÌõÃô¸Ð¼Í¼̻¶
Ðû²¼Ê±¼ä 2024-08-288ÔÂ26ÈÕ£¬£¬£¬£¬£¬ServiceBridgeÊÇÒ»¼Ò×ܲ¿Î»ÓÚÖ¥¼Ó¸çµÄ×ÅÃûÏÖ³¡Ð§ÀÍÖÎÀíÆ½Ì¨£¬£¬£¬£¬£¬½üÆÚÒòÒ»´ÎÑÏÖØµÄÊý¾Ý¿âÉèÖùýʧ¶øÏÝÈëÊý¾Ýй¶Σ»£»£»£»£»ú¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼ÒJeremiah Fowler½ÒÆÆÁËÕâÒ»Îó²î£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý3100ÍòÌõ¼Í¼¡¢×ܼÆ2.68TBµÄÃô¸ÐÊý¾Ý̻¶ÓÚ¹«ÖÚÊÓÒ°£¬£¬£¬£¬£¬ÆäÖв»·¦ÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëÒÔÖ²¿·ÖÐÅÓÿ¨ÐÅÏ¢¼°HIPAA»®¶¨µÄСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÎÞÐèÈκÎÇå¾²ÈÏÖ¤¼´¿É»á¼û£¬£¬£¬£¬£¬ÇÒÊý¾Ý¿ç¶È³¤´ïÊ®Ä꣬£¬£¬£¬£¬Éæ¼°¶à¸öÐÐÒµµÄÆóÒµºÍСÎÒ˽¼Ò£¬£¬£¬£¬£¬°üÀ¨Ñ§Ð£¡¢×ڽ̻ú¹¹¡¢Á¬Ëø²ÍÌü¼°Ò½ÁÆÐ§ÀÍÌṩÕߵȡ£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý¹æÄ£ÖØ´óÇÒÃô¸Ð¶È¸ß£¬£¬£¬£¬£¬ÒýÆðÁËÆÕ±éµÄÇå¾²ºÍÒþ˽µ£ÐÄ¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ·¢Æ±Ú²Æ¡¢Éí·Ý͵ÇԵȲ»·¨ÐÐΪ£¬£¬£¬£¬£¬²»µ«Íþвµ½ÆóÒµµÄ²ÆÎñÇå¾²ºÍÉùÓþ£¬£¬£¬£¬£¬»¹¿ÉÄܸøÐ¡ÎÒ˽¼Ò´øÀ´ÉîÖØµÄ¾¼ÃËðʧºÍÒþ˽ÇÖÕ¼¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Êý¾Ý¿âÖл¹°üÀ¨ÎïÀíÇå¾²Ïà¹ØµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬Èç´óÃÅÃÜÂëºÍ»á¼û¼Í¼£¬£¬£¬£¬£¬½øÒ»²½¼Ó¾çÁËDZÔÚµÄÇ徲Σº¦¡£¡£¡£¡£¡£ServiceBridgeÔÚ½Óµ½Í¨ÖªºóÁ¬Ã¦¹Ø±ÕÁËÊý¾Ý¿âµÄ¹ûÕæ»á¼ûȨÏÞ£¬£¬£¬£¬£¬µ«¹ØÓÚÊý¾Ýй¶µÄÒ»Á¬Ê±¼ä¼°ÊÇ·ñÒÑÓеÚÈý·½½éÈëÈÔ²»µÃ¶øÖª¡£¡£¡£¡£¡£
https://hackread.com/servicebridge-expose-2tb-records-cloud-misconfiguration/
2. TDECUÔâClopÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬³¬50ÍòСÎÒ˽¼ÒÐÅϢй¶
8ÔÂ26ÈÕ£¬£¬£¬£¬£¬µÂ¿ËÈøË¹ÌÕÊÏÔ±¹¤ÐÅÓÃÏàÖúÉ磨TDECU£©½üÆÚÐû²¼£¬£¬£¬£¬£¬Áè¼Ý50ÍòÃû³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢ÔÚÈ¥ÄêµÄÒ»´ÎÓɶíÓïÀÕË÷Èí¼þ×éÖ¯Clop·¢¶¯µÄºÚ¿Í¹¥»÷Öв»ÐÒй¶¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÁËMOVEit TransferÖÎÀíÎļþ´«Ê䣨MFT£©Èí¼þÖеÄÁãÈÕÎó²î£¨CVE-2023-34362£©£¬£¬£¬£¬£¬¸ÃÎó²îÓÚ2023Äê5ÔÂ31ÈÕ±»Progress Software¹ûÕæÅû¶¡£¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Emsisoft¹ÀË㣬£¬£¬£¬£¬´Ë´ÎÊÂÎñ²¨¼°Áè¼Ý2700¸ö×éÖ¯£¬£¬£¬£¬£¬Ó°ÏìÈËÊý¸ß´ïÔ¼9600Íò¡£¡£¡£¡£¡£TDECUÓÚÉÏÖÜÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ±¨¸æ£¬£¬£¬£¬£¬²¢Ïò500,474ÃûÊÜÓ°Ïì³ÉÔ±·¢ËÍÁË֪ͨÐÅ£¬£¬£¬£¬£¬ÐÅÖÐÏêÊöÁ˺ڿʹÓMOVEitÇÔÈ¡µÄÃô¸ÐÐÅÏ¢¹æÄ££¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕË»§¼°ÐÅÓÿ¨ºÅ¡¢¼ÝÕպŵÈÒªº¦Ð¡ÎÒ˽¼ÒÉí·Ý¼°²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£Ö»¹ÜTDECUÏÖÔÚδ·¢Ã÷Òò¸ÃÊÂÎñµ¼ÖµÄÖ±½ÓÉí·Ý»ò½ðÈÚڲư¸Àý£¬£¬£¬£¬£¬µ«ÈÔΪÊÜÓ°Ïì³ÉÔ±ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬²¢½¨ÒéËûÃÇÉèÖÃڲƾ¯±¨»òÉêÇëÇå¾²¶³½á£¬£¬£¬£¬£¬ÒÔÌá·ÀDZÔÚΣº¦¡£¡£¡£¡£¡£
https://www.securityweek.com/500k-impacted-by-texas-dow-employees-credit-union-data-breach/
3. ARRLÏòÀÕË÷Èí¼þÍÅ»ïÖ§¸¶ÁË100ÍòÃÀÔªÊê½ð
8ÔÂ26ÈÕ£¬£¬£¬£¬£¬ÌìÏÂÒµÓàÎÞÏßµçлáÃÀ¹úÎÞÏßµçÖмÌͬÃË£¨ARRL£©½üÆÚÅû¶£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔÚ2024Äê5ÔÂ15ÈÕÔâÊÜÁËÒ»³¡ÆÆËðÐÔµÄÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ËæºóÖ§¸¶ÁË100ÍòÃÀÔªÊê½ðÒÔ»Ö¸´±»¼ÓÃܵÄÄÚ²¿ÍøÂçϵͳ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²»µ«É漰̨ʽ»ú¡¢Ìõ¼Ç±¾µçÄÔ£¬£¬£¬£¬£¬»¹²¨¼°WindowsºÍLinuxЧÀÍÆ÷£¬£¬£¬£¬£¬ÏÔʾÁ˸߶ȵÄ×éÖ¯ÐÔºÍе÷ÐÔ¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÊýÖÜǰ¾ÍÒÑDZÈëARRLµÄÏÖ³¡ºÍÔÆÏµÍ³£¬£¬£¬£¬£¬Ê¹ÓðµÍøÐÅϢʵÑéÈëÇÖ¡£¡£¡£¡£¡£ÃæÁÙÊý°ÙÍòÃÀÔªµÄÀÕË÷ÒªÇ󣬣¬£¬£¬£¬ARRL¾ÐÉ̺óÖ§¸¶ÁË100ÍòÃÀÔª£¬£¬£¬£¬£¬Òò¹¥»÷ÕßδÄÜ»ñÈ¡Ãô¸ÐÊý¾Ý¶ø½µµÍÁËÊê½ð½ð¶î¡£¡£¡£¡£¡£ARRLÇ¿µ÷£¬£¬£¬£¬£¬´Ë¿î×Ó¼°ºóÐøÐÞ¸´ÓöÈÖ÷ÒªÓɰü¹Ü¼ç¸º¡£¡£¡£¡£¡£Ð§ÀÍÖÐֹʱ´ú£¬£¬£¬£¬£¬°üÀ¨¡°ÌìÏÂÈÕÖ¾¡±£¨LoTW£©ÔÚÄڵĶàÏîЧÀͱ»ÔÝʱ¹Ø±Õ£¬£¬£¬£¬£¬Ö±µ½7ÔÂ1ÈÕLoTW»Ö¸´£¬£¬£¬£¬£¬Ö»¹ÜÆäЧÀÍÆ÷×Ô¼ºÎ´Ö±½ÓÊÜË𣬣¬£¬£¬£¬µ«ÒÀÀµÆäËûÊÜÓ°ÏìµÄЧÀÍÆ÷¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ARRL´ó²¿·ÖϵͳÒѻָ´£¬£¬£¬£¬£¬µ«»ù´¡ÉèÊ©µÄÖÜÈ«ÐÞ¸´ÈÔÐèÒ»Á½¸öÔÂʱ¼ä¡£¡£¡£¡£¡£¹ØÓÚСÎÒ˽¼ÒÐÅϢй¶ÇéÐΣ¬£¬£¬£¬£¬ARRLδÃ÷ȷ˵Ã÷£¬£¬£¬£¬£¬µ«ÒÑ֪ͨÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ£¬£¬£¬£¬£¬¿ÉÄÜÓÐ150ÃûÔ±¹¤µÄÐÅÏ¢£¨ÈçÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂ룩Êܵ½Ó°Ïì¡£¡£¡£¡£¡£
https://www.securityweek.com/american-radio-relay-league-paid-1-million-to-ransomware-gang/
4. ConnexureÔâBlackSuitÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬½ü°ÙÍòÈËÊý¾Ýй¶
8ÔÂ27ÈÕ£¬£¬£¬£¬£¬Young Consulting£¨ÏÖ¸üÃûΪConnexure£©£¬£¬£¬£¬£¬Ò»¼ÒרעÓÚ¹ÍÖ÷Ö¹ËðÊг¡µÄÑÇÌØÀ¼´óÈí¼þ½â¾ö¼Æ»®ÉÌ£¬£¬£¬£¬£¬¿ËÈÕ×îÏÈÏòÔ¼954,177ÃûÓû§·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬ÕâÔ´ÓÚ½ñÄê4ÔÂ10ÈÕÔâÊܵÄBlackSuitÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼Ö°üÀ¨¼ÓÖÝÀ¶¶Ü»áÔ±ÔÚÄÚµÄÓû§Êý¾Ý±»µÁ£¬£¬£¬£¬£¬ÈýÌìºó¹«Ë¾²Å²ì¾õϵͳ±»¼ÓÃÜ¡£¡£¡£¡£¡£¾ÊӲ죬£¬£¬£¬£¬È·ÈÏй¶ÐÅÏ¢°üÀ¨È«Ãû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¼°°ü¹ÜË÷ÅâÏêÇé¡£¡£¡£¡£¡£Îª¼õÇáÓ°Ï죬£¬£¬£¬£¬ConnexureΪÊÜÓ°ÏìµÄÓû§ÌṩCyberScoutµÄ12¸öÔÂÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍÖÁ2024Äê11ÔÂβ¡£¡£¡£¡£¡£¼øÓÚBlackSuitÒÑÔÚ°µÍøÀÕË÷ÃÅ»§ÉÏÐû²¼²¿·ÖÊý¾Ý£¬£¬£¬£¬£¬Óû§ÐèÁ¬Ã¦Ê¹ÓôËЧÀͲ¢Ð¡ÐÄδÊÚȨͨѶ¡¢ÍøÂç´¹ÂÚ¼°Õ©ÆÍýÏë¡£¡£¡£¡£¡£ÍþвÕß²»µ«Ðû³Æ¶Ô¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬»¹Íþв½øÒ»²½Ð¹Â¶¸ü¶àδÅû¶µÄÐÅÏ¢£¬£¬£¬£¬£¬ÈçÉÌÒµÌõÔ¼¡¢Ô±¹¤»¤ÕÕ¡¢¼Òͥϸ½Ú¼°²ÆÎñÊý¾ÝµÈ£¬£¬£¬£¬£¬µ«Ïà¹ØËµ·¨ÉÐδ¾×ÔÁ¦ÑéÖ¤¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/blacksuit-ransomware-stole-data-of-950-000-from-software-vendor/
5. Microsoft SwayÔÚ´ó¹æÄ£¶þάÂëÍøÂç´¹ÂڻÖб»ÀÄÓÃ
https://www.bleepingcomputer.com/news/security/microsoft-sway-abused-in-massive-qr-code-phishing-campaign/
6. ¶ñÒâÈí¼þMalAgent.AutoITBot£¬£¬£¬£¬£¬Gmail¼°¶àƽ̨ÕÊ»§µÄÒþÃØÍþв
8ÔÂ27ÈÕ£¬£¬£¬£¬£¬SonicWall Capture Labs ×î½üÕ¹ÏÖÁËÃûΪ MalAgent.AutoITBot µÄÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬£¬ËüרÃÅÕë¶Ô Gmail ÕË»§Ìᳫ¹¥»÷£¬£¬£¬£¬£¬µ«Íþв¹æÄ£Ô¶²»Ö¹ÓÚ´Ë¡£¡£¡£¡£¡£Õâ¿îͨ¹ý AutoIT ±àÒëµÄ¡°File.exe¡±³ÌÐò£¬£¬£¬£¬£¬Ê¹ÓöÁÈ¡¼ôÌù°å¡¢²¶»ñ°´¼üÒÔÖ¿ØÖƼüÅÌÊó±êµÈÖØ´óÊÖ¶ÎÈëÇÖÓû§ÏµÍ³¡£¡£¡£¡£¡£MalAgent ²»µ«ÊÔͼͨ¹ýÖ÷Á÷ä¯ÀÀÆ÷»á¼û Gmail£¬£¬£¬£¬£¬»¹Õ¹ÏÖ³öÊý¾ÝÇÔÈ¡¡¢ÏµÍ³Ê¹Óü°·´ÆÊÎöÄÜÁ¦µÄ¶àÃæÐÔ£¬£¬£¬£¬£¬Ê¹ÆäÄÜÇáËÉÍøÂçÃô¸ÐÐÅÏ¢²¢×è°Çå¾²ÆÊÎö¡£¡£¡£¡£¡£SonicWall ʹÓÃרҵ¹¤¾ßÆÊÎöÆäÐÐΪ£¬£¬£¬£¬£¬·¢Ã÷Æä¸ß¶È»ìÏýµÄ´úÂëºÍ¶¯Ì¬C2ÅþÁ¬ÉèÖ㬣¬£¬£¬£¬ÔöÌíÁË×·×ÙÄѶȡ£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»¹°üÀ¨Õë¶ÔÆäËûÉ罻ýÌåÆ½Ì¨µÄµÇ¼Á´½Ó£¬£¬£¬£¬£¬ÏÔʾ³öÆä¶àÄ¿µÄ¹¥»÷µÄÌØÕ÷¡£¡£¡£¡£¡£ÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬£¬£¬MalAgent Äܾ²Ä¬ÔËÐжà¸öÀú³Ì£¬£¬£¬£¬£¬ÈçÒþ²ØÒ³Ãæ²Ù×÷ºÍÍøÂçÌ×½Ó×ÖʵÑ飬£¬£¬£¬£¬ÒÔÌӱܼì²â¡£¡£¡£¡£¡£ÕâÒ»·¢Ã÷Ç¿µ÷ÁËÔÚ´¦Öóͷ£Î´ÖªÎļþʱÐè¼á³Ö¸ß¶ÈСÐÄ£¬£¬£¬£¬£¬ÒÔÃâ³ÉΪÆäDZÔÚÊܺ¦Õß¡£¡£¡£¡£¡£
https://securityonline.info/sonicwall-warns-new-malware-targets-gmail/


¾©¹«Íø°²±¸11010802024551ºÅ