ServiceBridgeÊý¾Ý¿âÉèÖùýʧµ¼ÖÂÊý°ÙÍòÌõÃô¸Ð¼Í¼̻¶

Ðû²¼Ê±¼ä 2024-08-28
1. ServiceBridgeÊý¾Ý¿âÉèÖùýʧµ¼ÖÂÊý°ÙÍòÌõÃô¸Ð¼Í¼̻¶


8ÔÂ26ÈÕ£¬£¬£¬£¬£¬ £¬£¬ServiceBridgeÊÇÒ»¼Ò×ܲ¿Î»ÓÚÖ¥¼Ó¸çµÄ×ÅÃûÏÖ³¡Ð§ÀÍÖÎÀíÆ½Ì¨£¬£¬£¬£¬£¬ £¬£¬½üÆÚÒòÒ»´ÎÑÏÖØµÄÊý¾Ý¿âÉèÖùýʧ¶øÏÝÈëÊý¾Ýй¶Σ» £»£»£»ú¡£¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼ÒJeremiah Fowler½ÒÆÆÁËÕâÒ»Îó²î£¬£¬£¬£¬£¬ £¬£¬µ¼ÖÂÁè¼Ý3100ÍòÌõ¼Í¼¡¢×ܼÆ2.68TBµÄÃô¸ÐÊý¾Ý̻¶ÓÚ¹«ÖÚÊÓÒ°£¬£¬£¬£¬£¬ £¬£¬ÆäÖв»·¦ÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëÒÔÖ²¿·ÖÐÅÓÿ¨ÐÅÏ¢¼°HIPAA»®¶¨µÄСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÎÞÐèÈκÎÇå¾²ÈÏÖ¤¼´¿É»á¼û£¬£¬£¬£¬£¬ £¬£¬ÇÒÊý¾Ý¿ç¶È³¤´ïÊ®Ä꣬£¬£¬£¬£¬ £¬£¬Éæ¼°¶à¸öÐÐÒµµÄÆóÒµºÍСÎÒ˽¼Ò£¬£¬£¬£¬£¬ £¬£¬°üÀ¨Ñ§Ð£¡¢×ڽ̻ú¹¹¡¢Á¬Ëø²ÍÌü¼°Ò½ÁÆÐ§ÀÍÌṩÕߵȡ£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý¹æÄ£ÖØ´óÇÒÃô¸Ð¶È¸ß£¬£¬£¬£¬£¬ £¬£¬ÒýÆðÁËÆÕ±éµÄÇå¾²ºÍÒþ˽µ£ÐÄ¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ·¢Æ±Ú²Æ­¡¢Éí·Ý͵ÇԵȲ»·¨ÐÐΪ£¬£¬£¬£¬£¬ £¬£¬²»µ«Íþвµ½ÆóÒµµÄ²ÆÎñÇå¾²ºÍÉùÓþ£¬£¬£¬£¬£¬ £¬£¬»¹¿ÉÄܸøÐ¡ÎÒ˽¼Ò´øÀ´ÉîÖØµÄ¾­¼ÃËðʧºÍÒþ˽ÇÖÕ¼¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬Êý¾Ý¿âÖл¹°üÀ¨ÎïÀíÇå¾²Ïà¹ØµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬Èç´óÃÅÃÜÂëºÍ»á¼û¼Í¼£¬£¬£¬£¬£¬ £¬£¬½øÒ»²½¼Ó¾çÁËDZÔÚµÄÇ徲Σº¦¡£¡£¡£¡£¡£¡£ServiceBridgeÔÚ½Óµ½Í¨ÖªºóÁ¬Ã¦¹Ø±ÕÁËÊý¾Ý¿âµÄ¹ûÕæ»á¼ûȨÏÞ£¬£¬£¬£¬£¬ £¬£¬µ«¹ØÓÚÊý¾Ýй¶µÄÒ»Á¬Ê±¼ä¼°ÊÇ·ñÒÑÓеÚÈý·½½éÈëÈÔ²»µÃ¶øÖª¡£¡£¡£¡£¡£¡£


https://hackread.com/servicebridge-expose-2tb-records-cloud-misconfiguration/


2. TDECUÔâClopÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ £¬£¬³¬50ÍòСÎÒ˽¼ÒÐÅϢй¶


8ÔÂ26ÈÕ£¬£¬£¬£¬£¬ £¬£¬µÂ¿ËÈøË¹ÌÕÊÏÔ±¹¤ÐÅÓÃÏàÖúÉ磨TDECU£©½üÆÚÐû²¼£¬£¬£¬£¬£¬ £¬£¬Áè¼Ý50ÍòÃû³ÉÔ±µÄСÎÒ˽¼ÒÐÅÏ¢ÔÚÈ¥ÄêµÄÒ»´ÎÓɶíÓïÀÕË÷Èí¼þ×éÖ¯Clop·¢¶¯µÄºÚ¿Í¹¥»÷Öв»ÐÒй¶¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÁËMOVEit TransferÖÎÀíÎļþ´«Ê䣨MFT£©Èí¼þÖеÄÁãÈÕÎó²î£¨CVE-2023-34362£©£¬£¬£¬£¬£¬ £¬£¬¸ÃÎó²îÓÚ2023Äê5ÔÂ31ÈÕ±»Progress Software¹ûÕæÅû¶¡£¡£¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Emsisoft¹ÀË㣬£¬£¬£¬£¬ £¬£¬´Ë´ÎÊÂÎñ²¨¼°Áè¼Ý2700¸ö×éÖ¯£¬£¬£¬£¬£¬ £¬£¬Ó°ÏìÈËÊý¸ß´ïÔ¼9600Íò¡£¡£¡£¡£¡£¡£TDECUÓÚÉÏÖÜÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ±¨¸æ£¬£¬£¬£¬£¬ £¬£¬²¢Ïò500,474ÃûÊÜÓ°Ïì³ÉÔ±·¢ËÍÁË֪ͨÐÅ£¬£¬£¬£¬£¬ £¬£¬ÐÅÖÐÏêÊöÁ˺ڿʹÓMOVEitÇÔÈ¡µÄÃô¸ÐÐÅÏ¢¹æÄ££¬£¬£¬£¬£¬ £¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕË»§¼°ÐÅÓÿ¨ºÅ¡¢¼ÝÕպŵÈÒªº¦Ð¡ÎÒ˽¼ÒÉí·Ý¼°²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¡£Ö»¹ÜTDECUÏÖÔÚδ·¢Ã÷Òò¸ÃÊÂÎñµ¼ÖµÄÖ±½ÓÉí·Ý»ò½ðÈÚڲƭ°¸Àý£¬£¬£¬£¬£¬ £¬£¬µ«ÈÔΪÊÜÓ°Ïì³ÉÔ±ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬ £¬£¬²¢½¨ÒéËûÃÇÉèÖÃڲƭ¾¯±¨»òÉêÇëÇå¾²¶³½á£¬£¬£¬£¬£¬ £¬£¬ÒÔÌá·ÀDZÔÚΣº¦¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/500k-impacted-by-texas-dow-employees-credit-union-data-breach/


3. ARRLÏòÀÕË÷Èí¼þÍÅ»ïÖ§¸¶ÁË100ÍòÃÀÔªÊê½ð


8ÔÂ26ÈÕ£¬£¬£¬£¬£¬ £¬£¬ÌìÏÂÒµÓàÎÞÏßµçЭ»áÃÀ¹úÎÞÏßµçÖмÌͬÃË£¨ARRL£©½üÆÚÅû¶£¬£¬£¬£¬£¬ £¬£¬¸Ã×éÖ¯ÔÚ2024Äê5ÔÂ15ÈÕÔâÊÜÁËÒ»³¡ÆÆËðÐÔµÄÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ £¬£¬ËæºóÖ§¸¶ÁË100ÍòÃÀÔªÊê½ðÒÔ»Ö¸´±»¼ÓÃܵÄÄÚ²¿ÍøÂçϵͳ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²»µ«É漰̨ʽ»ú¡¢Ìõ¼Ç±¾µçÄÔ£¬£¬£¬£¬£¬ £¬£¬»¹²¨¼°WindowsºÍLinuxЧÀÍÆ÷£¬£¬£¬£¬£¬ £¬£¬ÏÔʾÁ˸߶ȵÄ×éÖ¯ÐÔºÍЭµ÷ÐÔ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÊýÖÜǰ¾ÍÒÑDZÈëARRLµÄÏÖ³¡ºÍÔÆÏµÍ³£¬£¬£¬£¬£¬ £¬£¬Ê¹ÓðµÍøÐÅϢʵÑéÈëÇÖ¡£¡£¡£¡£¡£¡£ÃæÁÙÊý°ÙÍòÃÀÔªµÄÀÕË÷ÒªÇ󣬣¬£¬£¬£¬ £¬£¬ARRL¾­Ð­É̺óÖ§¸¶ÁË100ÍòÃÀÔª£¬£¬£¬£¬£¬ £¬£¬Òò¹¥»÷ÕßδÄÜ»ñÈ¡Ãô¸ÐÊý¾Ý¶ø½µµÍÁËÊê½ð½ð¶î¡£¡£¡£¡£¡£¡£ARRLÇ¿µ÷£¬£¬£¬£¬£¬ £¬£¬´Ë¿î×Ó¼°ºóÐøÐÞ¸´ÓöÈÖ÷ÒªÓɰü¹Ü¼ç¸º¡£¡£¡£¡£¡£¡£Ð§ÀÍÖÐֹʱ´ú£¬£¬£¬£¬£¬ £¬£¬°üÀ¨¡°ÌìÏÂÈÕÖ¾¡±£¨LoTW£©ÔÚÄڵĶàÏîЧÀͱ»ÔÝʱ¹Ø±Õ£¬£¬£¬£¬£¬ £¬£¬Ö±µ½7ÔÂ1ÈÕLoTW»Ö¸´£¬£¬£¬£¬£¬ £¬£¬Ö»¹ÜÆäЧÀÍÆ÷×Ô¼ºÎ´Ö±½ÓÊÜË𣬣¬£¬£¬£¬ £¬£¬µ«ÒÀÀµÆäËûÊÜÓ°ÏìµÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ £¬£¬ARRL´ó²¿·ÖϵͳÒѻָ´£¬£¬£¬£¬£¬ £¬£¬µ«»ù´¡ÉèÊ©µÄÖÜÈ«ÐÞ¸´ÈÔÐèÒ»Á½¸öÔÂʱ¼ä¡£¡£¡£¡£¡£¡£¹ØÓÚСÎÒ˽¼ÒÐÅϢй¶ÇéÐΣ¬£¬£¬£¬£¬ £¬£¬ARRLδÃ÷ȷ˵Ã÷£¬£¬£¬£¬£¬ £¬£¬µ«ÒÑ֪ͨÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ£¬£¬£¬£¬£¬ £¬£¬¿ÉÄÜÓÐ150ÃûÔ±¹¤µÄÐÅÏ¢£¨ÈçÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂ룩Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/american-radio-relay-league-paid-1-million-to-ransomware-gang/


4. ConnexureÔâBlackSuitÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ £¬£¬½ü°ÙÍòÈËÊý¾Ýй¶


8ÔÂ27ÈÕ£¬£¬£¬£¬£¬ £¬£¬Young Consulting£¨ÏÖ¸üÃûΪConnexure£©£¬£¬£¬£¬£¬ £¬£¬Ò»¼ÒרעÓÚ¹ÍÖ÷Ö¹ËðÊг¡µÄÑÇÌØÀ¼´óÈí¼þ½â¾ö¼Æ»®ÉÌ£¬£¬£¬£¬£¬ £¬£¬¿ËÈÕ×îÏÈÏòÔ¼954,177ÃûÓû§·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬ £¬£¬ÕâÔ´ÓÚ½ñÄê4ÔÂ10ÈÕÔâÊܵÄBlackSuitÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼Ö°üÀ¨¼ÓÖÝÀ¶¶Ü»áÔ±ÔÚÄÚµÄÓû§Êý¾Ý±»µÁ£¬£¬£¬£¬£¬ £¬£¬ÈýÌìºó¹«Ë¾²Å²ì¾õϵͳ±»¼ÓÃÜ¡£¡£¡£¡£¡£¡£¾­ÊӲ죬£¬£¬£¬£¬ £¬£¬È·ÈÏй¶ÐÅÏ¢°üÀ¨È«Ãû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¼°°ü¹ÜË÷ÅâÏêÇé¡£¡£¡£¡£¡£¡£Îª¼õÇáÓ°Ï죬£¬£¬£¬£¬ £¬£¬ConnexureΪÊÜÓ°ÏìµÄÓû§ÌṩCyberScoutµÄ12¸öÔÂÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍÖÁ2024Äê11ÔÂβ¡£¡£¡£¡£¡£¡£¼øÓÚBlackSuitÒÑÔÚ°µÍøÀÕË÷ÃÅ»§ÉÏÐû²¼²¿·ÖÊý¾Ý£¬£¬£¬£¬£¬ £¬£¬Óû§ÐèÁ¬Ã¦Ê¹ÓôËЧÀͲ¢Ð¡ÐÄδÊÚȨͨѶ¡¢ÍøÂç´¹ÂÚ¼°Õ©Æ­ÍýÏë¡£¡£¡£¡£¡£¡£ÍþвÕß²»µ«Ðû³Æ¶Ô¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬ £¬£¬»¹Íþв½øÒ»²½Ð¹Â¶¸ü¶àδÅû¶µÄÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬ÈçÉÌÒµÌõÔ¼¡¢Ô±¹¤»¤ÕÕ¡¢¼Òͥϸ½Ú¼°²ÆÎñÊý¾ÝµÈ£¬£¬£¬£¬£¬ £¬£¬µ«Ïà¹ØËµ·¨ÉÐδ¾­×ÔÁ¦ÑéÖ¤¡£¡£¡£¡£¡£¡£

https://www.bleepingcomputer.com/news/security/blacksuit-ransomware-stole-data-of-950-000-from-software-vendor/


5. Microsoft SwayÔÚ´ó¹æÄ£¶þάÂëÍøÂç´¹ÂڻÖб»ÀÄÓÃ


8ÔÂ27ÈÕ£¬£¬£¬£¬£¬ £¬£¬NetskopeÍþвʵÑéÊÒ½üÆÚ½ÒÆÆÁËÒ»Æð´ó¹æÄ£µÄÍøÂç´¹Âڻ£¬£¬£¬£¬£¬ £¬£¬¸Ã»î¶¯Ê¹ÓÃMicrosoft SwayÕâÒ»ÔÚÏßÑÝʾƽ̨£¬£¬£¬£¬£¬ £¬£¬Í¨¹ýÍйܴ¹ÂÚµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬ £¬£¬Õë¶ÔMicrosoft 365Óû§ÊµÑ鯾֤ÇÔÈ¡¡£¡£¡£¡£¡£¡£×Ô2024Äê7ÔÂÒÔÀ´£¬£¬£¬£¬£¬ £¬£¬´ËÀ๥»÷ÊýÄ¿¼±¾çì­Éý£¬£¬£¬£¬£¬ £¬£¬Ö÷Òª²¨¼°ÑÇÖÞÓë±±ÃÀµØÇø£¬£¬£¬£¬£¬ £¬£¬¿Æ¼¼¡¢ÖÆÔì¼°½ðÈÚµÈÐÐÒµ³ÉÎªÖØÔÖÇø¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÓÕµ¼Êܺ¦ÕßɨÃè¶þάÂ룬£¬£¬£¬£¬ £¬£¬½ø¶øÌø×ªÖÁ¶ñÒâÍøÕ¾£¬£¬£¬£¬£¬ £¬£¬ÓÈÆäʹÓÃÒÆ¶¯×°±¸Çå¾²±¡ÈõµÄÌØµã£¬£¬£¬£¬£¬ £¬£¬ÈƹýÇå¾²¼ì²â¡£¡£¡£¡£¡£¡£¹¥»÷ÊֶΰüÀ¨Í¸Ã÷ÍøÂç´¹ÂÚ£¬£¬£¬£¬£¬ £¬£¬ÇÔÈ¡¶àÒòËØÈÏÖ¤ÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬Ê¹Êܺ¦ÕßÔÚ²»ÖªÇéϵǼÆäÕË»§¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬¹¥»÷Õß»¹Ê¹ÓÃCloudflare Turnstile¹¤¾ß£¬£¬£¬£¬£¬ £¬£¬Òþ²Ø´¹ÂÚÄÚÈÝ£¬£¬£¬£¬£¬ £¬£¬Î¬»¤ÓòÃûÉùÓþ£¬£¬£¬£¬£¬ £¬£¬ÌÓ±ÜÍøÂç¹ýÂËЧÀÍ×èµ²¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓëÎåÄêǰµÄPerSwaysionÍøÂç´¹ÂڻÀàËÆ£¬£¬£¬£¬£¬ £¬£¬¾ùͨ¹ýMaaS²Ù×÷£¬£¬£¬£¬£¬ £¬£¬ÀÖ³ÉÉøÍ¸¶à¼ÒÆóÒµ¸ß²ãÕË»§£¬£¬£¬£¬£¬ £¬£¬°üÀ¨ÃÀ¹ú¡¢¼ÓÄôóµÈ¶à¹ú¹«Ë¾¸ß¹Ü¡£¡£¡£¡£¡£¡£ÕâÔÙ´ÎÌáÐÑÓû§ÐèÌá¸ßСÐÄ£¬£¬£¬£¬£¬ £¬£¬Ìá·À¶þάÂëÍøÂç´¹ÂÚΣº¦¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-sway-abused-in-massive-qr-code-phishing-campaign/


6. ¶ñÒâÈí¼þMalAgent.AutoITBot£¬£¬£¬£¬£¬ £¬£¬Gmail¼°¶àƽ̨ÕÊ»§µÄÒþÃØÍþв


8ÔÂ27ÈÕ£¬£¬£¬£¬£¬ £¬£¬SonicWall Capture Labs ×î½üÕ¹ÏÖÁËÃûΪ MalAgent.AutoITBot µÄÐÂÐͶñÒâÈí¼þ£¬£¬£¬£¬£¬ £¬£¬ËüרÃÅÕë¶Ô Gmail ÕË»§Ìᳫ¹¥»÷£¬£¬£¬£¬£¬ £¬£¬µ«Íþв¹æÄ£Ô¶²»Ö¹ÓÚ´Ë¡£¡£¡£¡£¡£¡£Õâ¿îͨ¹ý AutoIT ±àÒëµÄ¡°File.exe¡±³ÌÐò£¬£¬£¬£¬£¬ £¬£¬Ê¹ÓöÁÈ¡¼ôÌù°å¡¢²¶»ñ°´¼üÒÔÖ¿ØÖƼüÅÌÊó±êµÈÖØ´óÊÖ¶ÎÈëÇÖÓû§ÏµÍ³¡£¡£¡£¡£¡£¡£MalAgent ²»µ«ÊÔͼͨ¹ýÖ÷Á÷ä¯ÀÀÆ÷»á¼û Gmail£¬£¬£¬£¬£¬ £¬£¬»¹Õ¹ÏÖ³öÊý¾ÝÇÔÈ¡¡¢ÏµÍ³Ê¹Óü°·´ÆÊÎöÄÜÁ¦µÄ¶àÃæÐÔ£¬£¬£¬£¬£¬ £¬£¬Ê¹ÆäÄÜÇáËÉÍøÂçÃô¸ÐÐÅÏ¢²¢×è°­Çå¾²ÆÊÎö¡£¡£¡£¡£¡£¡£SonicWall ʹÓÃרҵ¹¤¾ßÆÊÎöÆäÐÐΪ£¬£¬£¬£¬£¬ £¬£¬·¢Ã÷Æä¸ß¶È»ìÏýµÄ´úÂëºÍ¶¯Ì¬C2ÅþÁ¬ÉèÖ㬣¬£¬£¬£¬ £¬£¬ÔöÌíÁË×·×ÙÄѶÈ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»¹°üÀ¨Õë¶ÔÆäËûÉ罻ýÌåÆ½Ì¨µÄµÇ¼Á´½Ó£¬£¬£¬£¬£¬ £¬£¬ÏÔʾ³öÆä¶àÄ¿µÄ¹¥»÷µÄÌØÕ÷¡£¡£¡£¡£¡£¡£ÁîÈ˵£ÐĵÄÊÇ£¬£¬£¬£¬£¬ £¬£¬MalAgent Äܾ²Ä¬ÔËÐжà¸öÀú³Ì£¬£¬£¬£¬£¬ £¬£¬ÈçÒþ²ØÒ³Ãæ²Ù×÷ºÍÍøÂçÌ×½Ó×ÖʵÑ飬£¬£¬£¬£¬ £¬£¬ÒÔÌӱܼì²â¡£¡£¡£¡£¡£¡£ÕâÒ»·¢Ã÷Ç¿µ÷ÁËÔÚ´¦Öóͷ£Î´ÖªÎļþʱÐè¼á³Ö¸ß¶ÈСÐÄ£¬£¬£¬£¬£¬ £¬£¬ÒÔÃâ³ÉΪÆäDZÔÚÊܺ¦Õß¡£¡£¡£¡£¡£¡£


https://securityonline.info/sonicwall-warns-new-malware-targets-gmail/