GE ³¬Éù×°±¸Îó²î°Ù³öÒ×ÔâÊÜÀÕË÷Èí¼þºÍÊý¾Ý͵ÇÔ
Ðû²¼Ê±¼ä 2024-05-205ÔÂ17ÈÕ£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚ GE HealthCare µÄ Vivid Ultrasound ϵÁвúÆ·ÒÔ¼°Á½¸öÏà¹ØÈí¼þ³ÌÐòÖз¢Ã÷ÁË 11 ¸öÇå¾²Îó²î¡£¡£¡£¡£¡£¡£¡£ÎÊÌâ¶àÖÖ¶àÑù£¬£¬£¬£¬°üÀ¨Ãô¸ÐÊý¾ÝȱÉÙ¼ÓÃÜ¡¢Ê¹ÓÃÓ²±àÂëÆ¾Ö¤µÈµÈ¡£¡£¡£¡£¡£¡£¡£CVSS 3.1 ÆÀ·ÖϵͳµÄÑÏÖØË®Æ½´Ó 5.7 µ½ 9.6 ²»µÈ¡£¡£¡£¡£¡£¡£¡£ÕýÈç Nozomi NetworksÔÚÆä±¨¸æÖÐËùÚ¹Ê͵ÄÄÇÑù£¬£¬£¬£¬ÕâЩ¹ýʧ¿ÉÄܻᵼÖ¾ßÓÐÍêȫȨÏÞµÄÔ¶³Ì´úÂëÖ´ÐÐ (RCE) ÒÔ¼°´ËÀàȨÏÞ¿ÉÄÜ´øÀ´µÄÈκÎÊýÄ¿µÄ¹¥»÷³¡¾°¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬×îÑÏÖØµÄÇéÐλ¹ÐèÒªÎïÆÊÎö¼ûÏà¹Ø×°±¸£¬£¬£¬£¬´Ó¶ø´ó´ó½µµÍÒ½ÁÆ»ú¹¹µÄDZÔÚΣº¦¡£¡£¡£¡£¡£¡£¡£ÊÂʵÉÏ£¬£¬£¬£¬³¬Éù²¨»úÓÃÓÚÍⲿְԱ¾³£»á¼ûµÄÒ½ÔººÍÕïËù£¬£¬£¬£¬¶ø¼øºÚµ£±£ÍøÑо¿Åú×¢£¬£¬£¬£¬Ö»ÐèÒ»·ÖÖÓµÄÎïÆÊÎö¼û¾Í×ãÒÔÖ´Ðй¥»÷¡£¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬ÎÒÃÇÒÔΪ²»µ«ÊǶñÒâµÄÄÚ²¿Ö°Ô±£¬£¬£¬£¬µ«ÍâÈËÒ²¿ÉÄÜÓÐʱ»úÍê³É¹¥»÷¡£¡£¡£¡£¡£¡£¡£
https://www.darkreading.com/vulnerabilities-threats/ge-ultrasound-gear-riddled-with-bugs-open-to-ransomware-data-theft
2. µç×Ó´¦·½ÌṩÉÌ MEDISECURE Êܵ½ÀÕË÷Èí¼þ¹¥»÷µÄÓ°Ïì
5ÔÂ16ÈÕ£¬£¬£¬£¬°Ä´óÀûÑǵĵç×Ó´¦·½ÌṩÉÌ MediSecure ÔâÊÜÁË¿ÉÄÜÀ´×ÔµÚÈý·½¹©Ó¦É̵ÄÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¡£MediSecure ÊÇÒ»¼ÒÌṩÊý×Ö¿µ½¡½â¾ö¼Æ»®µÄ¹«Ë¾£¬£¬£¬£¬ÌØÊâרעÓÚ°Ä´óÀûÑǵÄÇå¾²µç×Ó´¦·½½»¸¶Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÔâÊÜÍøÂç¹¥»÷ºó±»ÆÈ¹Ø±ÕÆäÍøÕ¾ºÍµç»°Ïß·£¬£¬£¬£¬µ«Ã»ÓÐÌá¼°ÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕß»ñµÃÁËÊýÄ¿²»ÏêµÄСÎÒ˽¼ÒµÄСÎÒ˽¼ÒºÍ¿µ½¡ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÈÔÔÚ¹ú¼ÒÍøÂçÇ徲е÷Ô±µÄ×ÊÖúÏÂÊÓ²ìÕâÒ»Çå¾²Îó²î£¬£¬£¬£¬µ«¸Ã¹«Ë¾Í¸Â¶£¬£¬£¬£¬ÔçÆÚ¼£ÏóÅú×¢¸ÃÊÂÎñÔ´×ÔÆäµÚÈý·½¹©Ó¦ÉÌÖ®Ò»¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/163257/cyber-crime/medisecure-impacted-by-ransomware-attack.html
3. ºÚ¿ÍʹÓÃÐéα DocuSign Ä£°åÀ´Õ©Æ×éÖ¯
5ÔÂ17ÈÕ£¬£¬£¬£¬Ê¹Óÿ´ËÆÀ´×Ô DocuSign µÄµç×ÓÓʼþµÄÍøÂç´¹ÂÚ¹¥»÷¼¤Ôö£¬£¬£¬£¬ÊÇÓɶíÂÞ˹°µÍøÊг¡Íƶ¯µÄ£¬£¬£¬£¬¸ÃÊг¡ÓµÓÐÖÖÖÖÄ£°åºÍµÇ¼ƾ֤¡£¡£¡£¡£¡£¡£¡£ÕâЩڲÆÐÔµç×ÓÓʼþ¾ÓÉÈ«ÐÄÉè¼Æ£¬£¬£¬£¬Ö¼ÔÚÄ£ÄâÕýµ±µÄÎĵµÊðÃûÇëÇ󣬣¬£¬£¬ÒýÓÕºÁÎÞ½äÐĵÄÊÕ¼þÈ˵ã»÷¶ñÒâÁ´½Ó»òй¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£×î½üÕâЩ¹¥»÷µÄÔöÌí¿É¹éÒòÓÚ¼¸¸öÒòËØ£¬£¬£¬£¬°üÀ¨¸Ãƽ̨ÔÚ¸÷¸öÐÐÒµµÄÆÕ±é½ÓÄÉ¡¢ÆäÖµµÃÐÅÈεÄÉùÓþ£¬£¬£¬£¬ÒÔ¼°×îÖ÷ÒªµÄÊÇÍøÂç·¸·¨Õ½ÂÔµÄÈÕÒæÖØ´ó¡£¡£¡£¡£¡£¡£¡£ÔÚÕâÖÖÇéÐÎÏ£¬£¬£¬£¬Òì³£Ñо¿Ö°Ô±´Ó¶Ô¿Í»§µÄÒ»´Î¹¥»÷ÖлñÈ¡ÁËÐÅÏ¢£¬£¬£¬£¬²¢ÔÚµØÏÂÂÛ̳ºÍÍøÂçÉϾÙÐÐÁËËÑË÷¡£¡£¡£¡£¡£¡£¡£×îÖÕ£¬£¬£¬£¬ËÑË÷½«ËûÃÇ´øµ½Á˶íÂÞ˹Êг¡£¡£¡£¡£¡£¡£¡£¬£¬£¬£¬ÔÚÄÇÀïËûÃÇÕÒµ½ÁËÏàͬµÄ DocuSign Ä£°å¡£¡£¡£¡£¡£¡£¡£²»Á¼ÐÐΪÕßÔËÐÐÍøÂç´¹Âڻʱ£¬£¬£¬£¬»áÊÔͼͨ¹ýÈõç×ÓÓʼþ¿´ÆðÀ´À´×ÔÕýµ±ÈªÔ´£¨ÀýÈçÆóÒµ»òСÎÒ˽¼Ò£©À´ÓªÔìÕæÊµµÄÆø·Õ£¬£¬£¬£¬ÕâÖÖÇéÐβ¢²»ÓÐÊý¡£¡£¡£¡£¡£¡£¡£½ü¼¸¸öÔÂÀ´£¬£¬£¬£¬Óб¨µÀ³Æ£¬£¬£¬£¬ÓÐÈËÔÚÊÕµ½¿´ËÆÀ´×ÔÃÀ¹úÓÊÕþЧÀ͵ĶÌÐźóÏÝÈëÕ©Æ¡£¡£¡£¡£¡£¡£¡£
https://securityboulevard.com/2024/05/hackers-use-fake-docusign-templates-to-scam-organizations/
4. ɣ̹µÂÒøÐб¬·¢Êý¾ÝÐ¹Â¶Éæ¼°µÚÈý·½¹©Ó¦ÉÌ
5ÔÂ18ÈÕ£¬£¬£¬£¬Î÷°àÑÀÒøÐлú¹¹É£Ì¹µÂÒøÐÐ (Santander) Ðû²¼£¬£¬£¬£¬¸Ã»ú¹¹×î½üÔâÊÜÁËÒ»´ÎÊý¾Ýй¶£¬£¬£¬£¬Êܺ¦Õß»ñµÃÁ˶ԵÚÈý·½ÌṩÉÌÍйܵÄÊý¾Ý¿âµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£Î¥¹æÊÂÎñ±¬·¢ºó£¬£¬£¬£¬É£Ì¹µÂÒøÐÐÁ¬Ã¦½ÓÄÉÐж¯£¬£¬£¬£¬Í¨¹ý×èÖ¹¶ÔÊÜËðÊý¾Ý¿âµÄ»á¼ûÀ´ÏÞÖÆÈëÇÖ¹æÄ£¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÒ»·ÝÐÂΟåÖÐÌåÏÖ£¬£¬£¬£¬»¹½¨ÉèÁËÚ²ÆÔ¤·À¿ØÖƲ½·¥£¬£¬£¬£¬ÒÔ±£»£»£»£»£»£»£»¤ÊÜÎ¥¹æÓ°ÏìµÄ¿Í»§£¬£¬£¬£¬µ«Î´Ìá¼°ÌṩÉ̵ÄÃû³Æ¡£¡£¡£¡£¡£¡£¡£É£Ì¹µÂÒøÐеÄÒ»·ÝÉùÃ÷³Æ£º¡°Êý¾Ý¿âÖв»°üÀ¨ÉúÒâÊý¾Ý£¬£¬£¬£¬Ò²²»°üÀ¨ÈκÎÔÊÐíÔÚÕË»§ÉϾÙÐÐÉúÒâµÄƾ֤£¬£¬£¬£¬°üÀ¨ÍøÉÏÒøÐÐÏêϸÐÅÏ¢ºÍÃÜÂë¡£¡£¡£¡£¡£¡£¡£¡±Ëü»¹Ö¸³ö£¬£¬£¬£¬ÒøÐеÄÔËÓªºÍϵͳûÓÐÊܵ½Ó°Ï죬£¬£¬£¬ÕâÒâζ×ſͻ§ÈÔÈ»¿ÉÒÔÑ¡Ôñ¾ÙÐÐÉúÒâ¡£¡£¡£¡£¡£¡£¡£ÔÚ¶ÔÍøÂçÊÂÎñµÄÊÓ²ìÖУ¬£¬£¬£¬¸Ã¹«Ë¾·¢Ã÷ÓëÖÇÀû¡¢Î÷°àÑÀºÍÎÚÀ¹ç¿Í»§Ïà¹ØµÄÐÅÏ¢ÒÔ¼°²¿·Öǰɣ̹µÂÒøÐÐÔ±¹¤µÄÐÅÏ¢±»»á¼û¡£¡£¡£¡£¡£¡£¡£
https://www.darkreading.com/cyberattacks-data-breaches/santander-falls-victim-to-data-breach-involving-third-party-provider
5. Kimsuky ºÚ¿ÍÔÚ¶Ôº«¹úµÄ¹¥»÷Öа²ÅÅÐ嵀 Linux ºóÃÅ
5ÔÂ18ÈÕ£¬£¬£¬£¬³¯ÏʺڿÍ×éÖ¯ Kimsuki Ò»Ö±ÔÚʹÓÃÒ»ÖÖÃûΪ Gomir µÄРLinux ¶ñÒâÈí¼þ£¬£¬£¬£¬ËüÊÇͨ¹ýľÂíÈí¼þ×°ÖóÌÐòÈö²¥µÄ GoBear ºóÃŵÄÒ»¸ö°æ±¾¡£¡£¡£¡£¡£¡£¡£Kimsuky ÊÇÒ»¸öÊܹú¼ÒÖ§³ÖµÄÍþвÐÐΪÕߣ¬£¬£¬£¬Ó볯ÏʾüÊÂÇ鱨»ú¹¹Õì̽×Ü¾Ö (RGB) ÓÐÁªÏµ¡£¡£¡£¡£¡£¡£¡£2024 Äê 2 ÔÂÉÏÑ®£¬£¬£¬£¬SW2 ÍþвÇ鱨¹«Ë¾µÄÑо¿Ö°Ô±±¨¸æÁËÒ»Ïî»î¶¯£¬£¬£¬£¬ÆäÖÐ Kimsuky ʹÓÃÖÖÖÖÈí¼þ½â¾ö¼Æ»®µÄľÂí°æ±¾£¨ÀýÈç SGA Solutions¡¢Wizvera VeraPort µÄ TrustPKI ºÍ NX_PRNMAN£©£¬£¬£¬£¬Ê¹Óà Troll Stealer ºÍ»ùÓÚ Go µÄ¶ñÒâÈí¼þѬȾº«¹úÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£Windows ¶ñÒâÈí¼þ GoBear¡£¡£¡£¡£¡£¡£¡£Broadcom ¹«Ë¾ÈüÃÅÌú¿ËµÄÆÊÎöʦÔÚÊÓ²ìÕë¶Ôº«¹úÕþ¸®×éÖ¯µÄͳһ»î¶¯Ê±·¢Ã÷ÁËÒ»ÖÖеĶñÒ⹤¾ß£¬£¬£¬£¬¸Ã¹¤¾ßËÆºõÊÇ GoBear ºóÃÅµÄ Linux ±äÌå¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/kimsuky-hackers-deploy-new-linux-backdoor-in-attacks-on-south-korea/
6. Singing RiverµÄÒ½ÁÆÏµÍ³±¬·¢´ó¹æÄ£Êý¾Ýй¶
5ÔÂ17ÈÕ£¬£¬£¬£¬ÃÜÎ÷Î÷±ÈÖÝ Singing River µÄÒ»¼ÒÖ÷ÒªÒ½ÁƱ£½¡ÌṩÉÌ×î½üÅû¶£¬£¬£¬£¬2023 Äê 8 ÔµÄÒ»´ÎÍøÂç¹¥»÷Ó°ÏìÁË 895,204 È˵ÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¸ÃÒ½ÁÆÍøÂç°üÀ¨ÅÁ˹¿¨¹ÅÀ¡¢º£ÈªÊк͸ñ¶û·ò²¨ÌصÄÒ½ÔºÒÔ¼°¸ÃµØÇøµÄÆäËûÒ½ÁÆ»ú¹¹¡£¡£¡£¡£¡£¡£¡£2023 Äê 8 Ô 19 ÈÕ£¬£¬£¬£¬¸Ã¹«Ë¾Ðû²¼³ÉÎªÖØ´óÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õߣ¬£¬£¬£¬µ¼ÖÂÒ½ÔºÖÐÖ¹ºÍDZÔÚµÄÊý¾Ý͵ÇÔ¡£¡£¡£¡£¡£¡£¡£×èÖ¹ 8 ÔÂ⣬£¬£¬£¬¸Ã×éÖ¯Òѱ»ÁÐÈëÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿ÃñȨ°ì¹«ÊÒµÄÎ¥¹æÃÅ»§ÍøÕ¾£¬£¬£¬£¬ÊÜÓ°ÏìÈËÊýÔݶ¨Îª 501 ÈË¡£¡£¡£¡£¡£¡£¡£2023 Äê 9 Ô 13 ÈÕ£¬£¬£¬£¬È·ÈÏÊý¾Ý±»µÁ£¬£¬£¬£¬×èֹͬÄê 12 Ô 18 ÈÕ£¬£¬£¬£¬¾Ý±¨µÀ¸ÃÎó²îÒÑÓ°Ïì 252,890 ÈË¡£¡£¡£¡£¡£¡£¡£¼¸ÌìǰÏòÃåÒòÖÝÕþ¸®ÌṩµÄ×îиüÐÂÏÔʾ£¬£¬£¬£¬ÊÜÓ°ÏìÈËÊýÔöÌíÖÁ 895,204 ÈË¡£¡£¡£¡£¡£¡£¡£
https://meterpreter.org/massive-data-breach-at-singing-river-health-system-nearly-900000-affected/