MUT-1244ÍþвÐÐΪÕß´ó¹æÄ£ÇÔÈ¡WordPressƾ֤¼°Ãô¸ÐÐÅÏ¢
Ðû²¼Ê±¼ä 2024-12-171. MUT-1244ÍþвÐÐΪÕß´ó¹æÄ£ÇÔÈ¡WordPressƾ֤¼°Ãô¸ÐÐÅÏ¢
12ÔÂ14ÈÕ£¬£¬£¬£¬ÃûΪMUT-1244µÄÍþвÐÐΪÕßÔÚÒ»³¡³¤´ïÒ»ÄêµÄ´ó¹æÄ£»£»£»£»î¶¯ÖУ¬£¬£¬£¬Í¨¹ýľÂí²¡¶¾Ñ¬È¾µÄWordPressƾ֤¼ì²éÆ÷ÇÔÈ¡ÁËÁè¼Ý390,000¸öWordPressƾ֤¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬¸ÃÐÐΪÕß»¹´ÓÊý°ÙÃûÊܺ¦Õߣ¨°üÀ¨ºì¶Ó³ÉÔ±¡¢ÉøÍ¸²âÊÔÖ°Ô±¡¢Çå¾²Ñо¿Ö°Ô±ÒÔ¼°¶ñÒâÐÐΪÕߣ©µÄÊÜѬȾϵͳÖÐ͵ȡÁËSSH˽ԿºÍAWS»á¼ûÃÜÔ¿¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓñ»Ä¾Âí»¯µÄGitHub´æ´¢¿âÍÆËͶñÒâ¿´·¨ÑéÖ¤Îó²îºÍ¾ÙÐÐÍøÂç´¹Âڻ£¬£¬£¬£¬ÓÕÆÄ¿µÄ×°ÖÃαװ³ÉCPU΢Âë¸üеļÙÄÚºËÉý¼¶¡£¡£¡£¡£¡£¡£¡£ÕâЩ´æ´¢¿âÔöÌíÁËÆäÕýµ±ÐÔ£¬£¬£¬£¬Ê¹µÃÇ徲רҵְԱºÍÍþвÐÐΪÕ߸üÈÝÒ×ÔËÐÐËüÃÇ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýGitHub reposÒÔ¶àÖÖ·½·¨Í¶·ÅÓÐÓÃÔØºÉ£¬£¬£¬£¬°üÀ¨´øÓкóÃŵÄÉèÖñàÒëÎļþ¡¢¶ñÒâPDFÎļþ¡¢PythonͶ·ÅÆ÷ÒÔ¼°¶ñÒânpm°ü¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯ÓëÁíÒ»´Î³¤´ïÒ»ÄêµÄ¹©Ó¦Á´¹¥»÷ÓÐÖØµþ£¬£¬£¬£¬ÆäÖÐÉæ¼°ÇÔÈ¡Êý¾ÝºÍÍÚ¾òÃÅÂÞ±Ò¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¡£MUT-1244Äܹ»»á¼û²¢Ð¹Â¶Ë½ÈËSSHÃÜÔ¿¡¢AWSƾ֤µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬²¢Ê¹ÓÃÍøÂçÇå¾²ÉçÇøÄÚµÄÐÅÈΣ¬£¬£¬£¬ÔÚÄ¿µÄ²»ÖªÇéµÄÇéÐÎÏÂÖ´ÐжñÒâÈí¼þ£¬£¬£¬£¬ÈëÇÖÁËÊýʮ̨»úе¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/390-000-wordpress-accounts-stolen-from-hackers-in-supply-chain-attack/
2. CISA½«CleoÎó²îCVE-2024-50623Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖÐ
12ÔÂ14ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Ó°ÏìCleo²úÆ·µÄÎó²îCVE-2024-50623£¨CVSSÆÀ·Ö8.8£©ÁÐÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£¡£¡£¡£Cleo¹«Ë¾·¢Ã÷ÁËÒ»¸ö²»ÊÜÏÞÖÆµÄÎļþÉÏ´«ºÍÏÂÔØÎó²î£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬²¢½¨Òé¿Í»§Á¬Ã¦½«Harmony¡¢VLTraderºÍLexiComʵÀýÉý¼¶µ½×îв¹¶¡°æ±¾5.8.0.21ÒÔ½â¾öDZÔÚ¹¥»÷ǰÑÔ¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬Çå¾²¹«Ë¾Huntress±¨¸æ³Æ£¬£¬£¬£¬×ÝÈ»×°ÖÃÁ˸ò¹¶¡£¬£¬£¬£¬ÔËÐÐ5.8.0.21µÄϵͳÈÔ¿ÉÄܱ»Ê¹Óᣡ£¡£¡£¡£¡£¡£Huntress·¢Ã÷ÁËÕë¶ÔCleoÎļþ´«ÊäÈí¼þµÄ×Ô¶¯¹¥»÷£¬£¬£¬£¬²¢¹ûÕæÁËÉæ¼°ÈýÖÖCleo²úÆ·µÄÒ»Á¬¹¥»÷¡£¡£¡£¡£¡£¡£¡£Ê×ϯÇå¾²Ñо¿Ô±Caleb Stewart¿ª·¢ÁËʹÓÃí§ÒâÎļþдÈëÎó²îµÄPython¾ç±¾£¬£¬£¬£¬²¢Ö¤ÊµÁËÎó²îµÄÓÐÓÃÐÔ¡£¡£¡£¡£¡£¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê1ÔÂ3ÈÕ֮ǰÐÞ¸´´ËÎó²î£¬£¬£¬£¬×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬£¬£¬£¬ÒÔ±£»£»£»£»¤ÍøÂçÃâÊܹ¥»÷¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/171973/security/u-s-cisa-adds-cleo-harmony-vltrader-and-lexicom-flaw-to-its-known-exploited-vulnerabilities-catalog.html
3. ConnectOnCallÔ¶³ÌÒ½ÁÆÆ½Ì¨ÔâÖØ´óÊý¾Ýй¶
12ÔÂ16ÈÕ£¬£¬£¬£¬ConnectOnCallÊÇÒ»¸öרעÓÚÔöǿҽÁÆÐ§ÀÍÌṩÕßÓ뻼ÕßÏàͬµÄÔ¶³ÌÒ½ÁÆÆ½Ì¨£¬£¬£¬£¬¿ËÈÕÅû¶ÁËÒ»ÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ó°ÏìÁè¼Ý900,000È˵ÄСÎÒ˽¼ÒÐÅÏ¢¼°Ò½ÁÆÐÅÏ¢Çå¾²¡£¡£¡£¡£¡£¡£¡£¸Ãƽ̨Ìṩ×Ô¶¯»¼Õߺô½Ð¸ú×Ù¡¢HIPAAºÏ¹æÌ¸Ì칦Ч£¬£¬£¬£¬²¢Óëµç×Ó¿µ½¡¼Í¼ϵͳ¼¯³É¡£¡£¡£¡£¡£¡£¡£5ÔÂ12ÈÕ£¬£¬£¬£¬ConnectOnCall·¢Ã÷Çå¾²Îó²î£¬£¬£¬£¬¾ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬2024Äê2ÔÂ16ÈÕÖÁ5ÔÂ12ÈÕʱ´ú£¬£¬£¬£¬ÓÐδ֪µÚÈý·½»á¼ûÁËÆ½Ì¨¼°Ó¦ÓóÌÐòÄڵIJ¿·ÖÊý¾Ý£¬£¬£¬£¬°üÀ¨Ò½»¼Í¨Ñ¶ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬¹«Ë¾Ñ¸ËÙÔ¼ÇëÍøÂçÇ徲ר¼Ò£¬£¬£¬£¬ÏÂÏß²úÆ·£¬£¬£¬£¬²¢ÔÚÇå¾²ÇéÐÎÖоÙÐÐÊý¾Ý»Ö¸´£¬£¬£¬£¬Í¬Ê±Í¨ÖªÁËÁª°îÖ´·¨²¿·Ö¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢¿ÉÄܰüÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅ¡¢Ò½ÁƼͼºÅ¼°¿µ½¡×´Ì¬µÈ¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚδ·¢Ã÷ÐÅÏ¢ÀÄÓûò»¼ÕßÊܺ¦ÇéÐΣ¬£¬£¬£¬ConnectOnCallÈÔ½¨ÒéÊÜÓ°ÏìСÎÒ˽¼Ò¼á³ÖСÐÄ£¬£¬£¬£¬²¢±¨¸æ¿ÉÒÉÉí·Ý͵ÇÔ»òÚ²ÆÐÐΪ¡£¡£¡£¡£¡£¡£¡£¹«Ë¾ÒÑÏòÖ´·¨²¿·Ö±¨¸æ²¢Í¨ÖªÊÜÓ°ÏìСÎÒ˽¼Ò£¬£¬£¬£¬ÎªÆäÖÐÓÐÏÞÊýÄ¿µÄÉç»áÇå¾²ºÅÂëÊÜÓ°ÏìÕßÌṩÉí·ÝºÍÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬Í¨¹ýÓʼÄ֪ͨÐŵķ½·¨¼û¸æÏà¹ØÇéÐΡ£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/172053/data-breach/connectoncall-data-breach-impacted-over-900000-individuals.html
4. µÂ¿ËÈøË¹Àí¹¤´óѧ¿µ½¡¿ÆÑ§ÖÐÐÄÔâÍøÂç¹¥»÷
12ÔÂ16ÈÕ£¬£¬£¬£¬µÂ¿ËÈøË¹Àí¹¤´óѧ¿µ½¡¿ÆÑ§ÖÐÐļ°Æä°£¶ûÅÁË÷·ÖУ½üÆÚÔâÊÜÁËÒ»´ÎÍøÂç¹¥»÷£¬£¬£¬£¬µ¼ÖÂÅÌËã»úϵͳºÍÓ¦ÓóÌÐòÖÐÖ¹£¬£¬£¬£¬²¢¿ÉÄÜй¶ÁË140ÍòÃû»¼ÕßµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹ÊÇÒ»¼Ò¹«¹²Ñ§ÊõÒ½ÁÆ»ú¹¹£¬£¬£¬£¬ÈÏÕæ½ÌÓý¡¢ÅàѵºÍ»¼ÕßÕչ˻¤Ê¿Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£¹¥»÷µ¼ÖÂ2024Äê9ÔÂ17ÈÕÖÁ9ÔÂ29ÈÕʱ´ú´Ó¸Ã»ú¹¹ÍøÂçÖлá¼û»òɾ³ýÁËijЩÎļþºÍÎļþ¼Ð¡£¡£¡£¡£¡£¡£¡£¿£¿£¿ÉÄÜй¶¸øºÚ¿ÍµÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢Õþ¸®Éí·ÝÖ¤ºÅÂë¡¢²ÆÎñÕË»§ÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Ò½ÁÆÐÅÏ¢¡¢Õ˵¥/Ë÷ÅâÊý¾Ý¡¢Õï¶ÏºÍÖÎÁÆÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹ÒÑ֪ͨÊÜÓ°ÏìµÄÈË£¬£¬£¬£¬²¢ÎªËûÃÇÌṩÃâ·ÑµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£½¨ÒéÊÜÓ°ÏìµÄСÎÒ˽¼Ò¼á³ÖСÐÄ£¬£¬£¬£¬Ìá·ÀDZÔÚµÄÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬²¢¼à¿ØËûÃǵÄÐÅÓñ¨¸æºÍ¿µ½¡°ü¹ÜÕ˵¥¡£¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬´Ë´Î¹¥»÷ÓÉÃûΪInterlockµÄÀÕË÷Èí¼þ×éÖ¯ÈÏÕæ£¬£¬£¬£¬¸Ã×é֯й¶ÁË210Íò¸öÎļþ£¬£¬£¬£¬×ܼÆ2.6TBµÄÊý¾Ý£¬£¬£¬£¬¾Ý³ÆÊǴӸûú¹¹ÇÔÈ¡µÄ¡£¡£¡£¡£¡£¡£¡£InterlockË÷ÒªµÄÊê½ð½ð¶î´ÓÊýÊ®ÍòÃÀÔªµ½Êý°ÙÍòÃÀÔª²»µÈ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/texas-tech-university-system-data-breach-impacts-14-million-patients/
5. ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯Èö²¥Lumma StealerÐÅÏ¢ÇÔÈ¡Èí¼þ
12ÔÂ16ÈÕ£¬£¬£¬£¬Ò»ÏîÃûΪ¡°DeceptionAds¡±µÄ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯ÕýÔÚʹÓÃMonetag¹ã¸æÍøÂçÈö²¥Lumma StealerÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Í¨¹ýÐéαµÄCAPTCHAÑéÖ¤Ò³ÃæÓÕÆÓû§ÔËÐжñÒâPowerShellÏÂÁ£¬£¬£¬´Ó¶øÑ¬È¾¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£Guardio LabsºÍInfobloxµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬ÕâÒ»²Ù×÷ÓÉÃûΪ¡°Vane Viper¡±µÄÍþвÐÐΪÕßʵÑ飬£¬£¬£¬Ê¹ÓÃÕýµ±¹ã¸æÍøÂçÉϵĴó¹æÄ£¹ã¸æ½«Óû§´øµ½ÐéαµÄCAPTCHAÒ³Ãæ¡£¡£¡£¡£¡£¡£¡£CAPTCHAÒ³Ãæ°üÀ¨JavaScript´úÂ룬£¬£¬£¬½«¶ñÒâPowerShellÏÂÁî¸´ÖÆµ½Óû§¼ôÌù°å£¬£¬£¬£¬²¢ÓÕµ¼Óû§Ö´ÐС£¡£¡£¡£¡£¡£¡£Lumma Stealer¿É´Óä¯ÀÀÆ÷ÖÐÇÔÈ¡cookie¡¢Æ¾Ö¤¡¢ÃÜÂë¡¢ÐÅÓÿ¨ºÍä¯ÀÀÀúÊ·¼Í¼£¬£¬£¬£¬ÒÔ¼°¼ÓÃÜÇ®±ÒÇ®°ü¡¢Ë½Ô¿ºÍÃô¸ÐÎı¾Îļþ¡£¡£¡£¡£¡£¡£¡£GuardioLabsÒÑÏòMonetagºÍBeMob±¨¸æ´ËÀÄÓÃÐÐΪ£¬£¬£¬£¬²¢»ñµÃʵʱÏìÓ¦¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬¸Ã»î¶¯ÔÚ12Ô·ºÆðËÕÐÑ£¬£¬£¬£¬Åú×¢ÍþвÐÐΪÕßÊÔͼͨ¹ý²î±ð¹ã¸æÍøÂç»Ö¸´ÔËÓª¡£¡£¡£¡£¡£¡£¡£Óû§Ó¦×èÖ¹Ö´ÐÐÍøÕ¾ÌáÐѵÄÏÂÁ£¬£¬£¬ÌØÊâÊÇÄÇЩð³äÐÞ¸´»òÑéÖ¤ÂëµÄÏÂÁ£¬£¬£¬²¢ÉóÉ÷ʹÓõÁ°æÈí¼þ»ò²»·¨Á÷ýÌåÍøÕ¾¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-ads-push-lumma-infostealer-via-fake-captcha-pages/
6. Â޵µºÖÝRIBridgesϵͳÔâBrain CipherÀÕË÷Èí¼þ¹¥»÷
12ÔÂ16ÈÕ£¬£¬£¬£¬Â޵µºÖÝÖÒÑԳƣ¬£¬£¬£¬ÆäÓɵÂÇÚÖÎÀíµÄRIBridgesϵͳÔâÊÜÁËBrain CipherÀÕË÷Èí¼þÍÅ»ïµÄÈëÇÖ£¬£¬£¬£¬µ¼ÖÂÊý¾Ýй¶£¬£¬£¬£¬Ì»Â¶ÁËסÃñµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£RIBridgesÊǸÃÖÝÓÃÓÚÖÎÀíºÍÌṩ¹«¹²Ô®ÖúÍýÏëµÄÏÖ´ú×ÛºÏ×ʸñϵͳ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓÚ2024Äê12ÔÂ5ÈÕ±»·¢Ã÷£¬£¬£¬£¬µÂÇÚÆÀ¹ÀºóÒÔΪºÚ¿Í¿ÉÄÜÇÔÈ¡Á˰üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢ºÍÆäËûÊý¾ÝµÄÎļþ¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÏîÄ¿°üÀ¨Ò½ÁƽòÌù¡¢Ôö²¹ÓªÑøÔ®ÖúÍýÏ롢ƶÀ§¼ÒÍ¥ÔÝʱԮÖúµÈ¶à¸ö¹«¹²Ð§ÀÍÏîÄ¿¡£¡£¡£¡£¡£¡£¡£Ö»¹Üй¶µÄÊý¾ÝÈÔÔÚÆÀ¹ÀÖУ¬£¬£¬£¬µ«¿ÉÄܰüÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂëºÍÄ³Ð©ÒøÐÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¼ÒÍ¥½«Í¨¹ýÓʼþÊÕµ½Í¨Öª£¬£¬£¬£¬²¢¿ÉÖµçרÓúô½ÐÖÐÐÄ×·ÇóÖ§³Ö¡£¡£¡£¡£¡£¡£¡£Â޵µºÖÝÕþ¸®½¨ÒéסÃñÖØÖÃÃÜÂë¡¢ÉèÖÃڲƾ¯±¨ºÍÐÅÓö³½á£¬£¬£¬£¬²¢Æô¶¯ÒøÐÐÌṩµÄÇå¾²²½·¥¡£¡£¡£¡£¡£¡£¡£µÂÇÚ½²»°ÈËÈ·ÈÏ£¬£¬£¬£¬Â޵µºÖݵÄϵͳÊÇÊܵ½Brain CipherÊý¾Ýй¶ӰÏìµÄ¡°¼òµ¥¿Í»§¶Ëϵͳ¡±£¬£¬£¬£¬²¢ÌåÏÖ½«Óë¿Í»§ºÍÖ´·¨¹ÙÔ±ÏàÖúÕö¿ªÊӲ졣¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/rhode-island-confirms-data-breach-after-brain-cipher-ransomware-attack/


¾©¹«Íø°²±¸11010802024551ºÅ