MoneyGramÔâ·êÍøÂç¹¥»÷ £¬ÏµÍ³ÖжÏÒý·¢¿í·º¹Ø×¢

°ä²¼¹¦·ò 2024-09-26
1. MoneyGramÔâ·êÍøÂç¹¥»÷ £¬ÏµÍ³ÖжÏÒý·¢¿í·º¹Ø×¢


9ÔÂ24ÈÕ £¬»ã¿î¾ÞÍ·MoneyGram×ÔÉÏÖÜÎåÆðÔâ·êϵͳÖжÏ £¬²¢È·ÈÏÕâÊÇÓÉÍøÂç¹¥»÷ËùÖ¡£Ö»¹Ü´Ëǰ¹«Ë¾½öÌá¼°¡°ÍøÂçÖжϡ± £¬Î´Ã÷È·×¢Ã÷Ô­Òò £¬Ö±ÖÁÖÜÒ»²ÅÕýʽ²¼¸æÍøÂ簲ȫÊÂÎñÊÇÆäϵͳ̱»¾µÄ±¾Ô­¡£MoneyGram×÷ΪȫÇòµÚ¶þ´ó»ã¿î·þÎñÌṩÉÌ £¬Æä·þÎñ¸²¸Ç200¸ö¹ú¶ÈµÄ350,000¸öÍøµã¼°ÏßÉÏÆ½Ì¨ £¬ÄêÂòÂôÁ¿³¬1.2Òڱʡ£Õâ´Î¹¥»÷µ¼ÖÂÓû§ÎÞ·¨ÊµÏÖÂòÂô»ò½Ó¼û×ʽð £¬ÍøÕ¾Ò²ÎÞ·¨Ê¹Óà £¬Òý·¢ÁË¿í·º¹Ø×¢ºÍÓÇÓô¡£¹«Ë¾Ñ¸¿ì²ÉÈ¡Ðж¯ £¬½«ÊÜÓ°ÏìµÄϵͳÏÂÏßÒÔ¶ôÔì¹¥»÷ £¬²¢Óë±í²¿×¨¼ÒºÍ·¨Âɲ¿ÃÅçÇÃܺÏ×÷ÒÔ¸´Ô­·þÎñ¡£MoneyGramÇ¿µ÷Á˶ÔÊÂÎñÑϳÁÐÔµÄÒâʶ £¬²¢³Ðŵ¾¡¿ì¸´Ô­ÏµÍ³Õý³£ÔËÐС£È»¶ø £¬¹ØÓÚϵͳ¸´Ô­µÄ¾ßÌ幦·ò±íÉÐδ°ä²¼ £¬°µÊ¾¹¥»÷¿ÉÄÜÈÔÔÚ³ÖÐø»ò¸´Ô­¹¤×÷´¦ÓÚ³õÆÚ½×¶Î¡£Ö»¹Ü¹¥»÷ÀàÐÍÉÐδ¹«¿ª £¬µ«³¤¹¦·òµÄ·þÎñÖжϺÍÏνÓÎÊÌâÇ¿ÁÒ°µÊ¾Õâ¿ÉÄÜÊÇһ·ÀÕË÷Èí¼þ¹¥»÷¡£¼øÓÚMoneyGramÖØ´óµÄÓû§»ù´¡ £¬Õâ´ÎÊÂÎñÈôÉæ¼°Êý¾Ýй¶ £¬ÆäDZÔÚÓ°Ï콫¼«ÎªÉîÔ¶¡£


https://www.bleepingcomputer.com/news/security/moneygram-confirms-a-cyberattack-is-behind-dayslong-outage/


2. ºÚ¿ÍÒ»ÖÜÄÚµÚÈý´ÎÏ®»÷´÷¶û £¬500MBÃô¸ÐÊý¾ÝÔâй¶


9ÔÂ25ÈÕ £¬ºÚ¿Í¡°grep¡±ÔÙ´ÎÕë¶Ô¿Æ¼¼¾ÞÍ·´÷¶û·¢Æð¹¥»÷ £¬Ò»ÖÜÄÚµÚÈý´ÎÔì³ÉÊý¾Ýй¶ £¬Õâ´Îй¶ÁËÔ¼500MBµÄÃô¸ÐÊý¾Ý £¬Ô̺¬ÄÚ²¿Îĵµ¡¢Í¼Æ¬¡¢²âÊÔÊÓÆµ¼°¶à³ÁÉí·ÝÑéÖ¤£¨MFA£©Êý¾Ý¡£´÷¶ûÖÁ½ñδ×ö³öÕýʽ»ØÓ¦ £¬¶øºÚ¿Í¡°grep¡±Ôò¹«¿ªÐû³Æ¶ÔÕâ´ÎÐ¹Â¶ÕÆ¹Ü £¬²¢°µÊ¾Ëùº±¼û¾Ý¾ùÔ´×Ôµ¥´ÎÈëÇÖ £¬Ö»ÊÇÕ½ÊõÐԵطÖÅúÆØ¹â¡£Ð¹Â¶µÄÐÅÏ¢Öк­¸ÇÁËÄÚ²¿Æ±Îñϵͳϸ½Ú¡¢Öйú»ù´¡ÉèÊ©ÏîÄ¿Îļþ¼°°²È«ÓйØÎĵµ £¬Ò»µ©ÕâЩÃô¸ÐÐÅÏ¢±»²»µ±ÀûÓà £¬½«¶Ô´÷¶ûµÄÔËÓª°²È«×é³ÉÑϳÁÍþв¡£2024Äê 9 Ô 19 ÈÕ £¬¡°grep¡±Ð¹Â¶Á˳¬¹ý 12,000 Ãû´÷¶ûÔ±¹¤µÄÊý¾Ý £¬Òý·¢ÁËÄÚ²¿µ÷²é¡£¼¸Ììºó £¬¼´ 9 Ô 22 ÈÕ £¬¸ü¶àÃô¸ÐµÄÄÚ²¿Îļþ±»Ð¹Â¶ £¬¾Ý³ÆÊÇ´÷¶ûʹÓà Atlassian ¹¤¾ßʱй¶µÄ¡£½ØÖÁĿǰ £¬´÷¶ûÉÐδȷÈÏÕâ´ÎÊý¾Ýй¶µÄ¾ßÌåÓ°ÏìÁìÓò¼°ÊÇ·ñÉæ¼°µÚÈý·½·ì϶ £¬Ò»ÖÜÄÚ²úÉúÈýÆðÊý¾Ýй¶ÊÂÎñ £¬ÈËÃǶԴ÷¶ûÍøÂ簲ȫµÄÓÇÓôÓëÈÕ¾ãÔö¡£


https://hackread.com/dell-data-leak-in-week-amid-grep-cyberattacks/


3. ÍøÂ簲ȫ×êÑÐÈËÔ±ÖÒ¸æÐÂÐÍ»ùÓÚRustµÄSplinterºóÀûÓù¤¾ß


9ÔÂ25ÈÕ £¬ÍøÂ簲ȫÁìÓò½üÆÚ·¢ÏÖÁËÒ»ÖÖÃûΪSplinterµÄÐÂÐͺóÀûÓúì¶Ó¹¤¾ß £¬¸Ã¹¤¾ßÓÉPalo Alto Networks Unit 42ÔÚ¿Í»§ÏµÍ³Öмø±ð²¢°ä²¼¡£SplinterÓÉRust˵»°±àд £¬ËäÖ°Äܲ»ÈçCobalt StrikeµÈ¸ß¼¶¹¤¾ßÈ«Ãæ £¬µ«Èç±»ÀÄÓà £¬ÈÔ¶Ô×éÖ¯°²È«×é³ÉDZÔÚ·çÏÕ¡£¸Ã¹¤¾ßרΪºì¶ÓÐж¯Éè¼Æ £¬ÓÃÓÚ¼ø±ðÆóÒµÍøÂçÖеݲȫ·ì϶ £¬µ«Í¬Ñù´æÔÚ±»¶ñÒâÀûÓõķçÏÕ¡£Ä¿Ç° £¬ÉÐÎÞÖ¤¾ÝÅú×¢SplinterÓë¾ßÌåÍþвÐÐΪÕßÓйØÁª £¬ÇÒÆäÖØ´óÌå»ýÖØÒª¹éÒòÓÚÔ̺¬µÄRust¿âÊýÁ¿¡£Splinter¾ß±¸¶àÖÖÖ°ÄÜ £¬ÈçÖ´ÐÐWindowsºÅÁî¡¢Ô¶³Ì¹ý³Ì×¢Èë¡¢ÎļþÉÏ´«ÏÂÔØ¡¢ÔÆ·þÎñÕË»§ÐÅÏ¢ÍøÂç¼°×ÔÎÒɾ³ýµÈ £¬ÕâЩ¾ùͨ¹ýÆäÅäÖõÄC2·þÎñÆ÷½Ó¹Ü¹¤×÷ʵÏÖ¡£´Ë±í £¬½üÆÚ»¹ÆØ¹âÁËÆäËû¼¸Öָ߼¶¹¥»÷¼¼Êõ £¬Èçͨ¹ýMicrosoft Office RPC½Ó¿ÚºÍ¶ñÒâµæÆ¬ÊµÏÖµÄÒþÃØ´úÂë×¢ÈëÓëȨÏÞÌáÉý £¬ÒÔ¼°ÀûÓÃThread Name-Calling¼¼ÊõÈÆ¹ý¶Ëµã±£»¤½øÇ°¹ý³Ì×¢Èë¡£ÕâЩ·¢ÏÖÇ¿µ÷ÁËÔÚÍøÂ簲ȫÁìÓòά³ÖÔ¤·ÀºÍ¼ì²âÄÜÁ¦µÄ³ÁÒªÐÔ £¬ÓÉÓÚ·¸×ï·Ö×ӻ᲻ÐÝѡȡм¼ÊõÍþв×éÖ¯°²È«¡£


https://thehackernews.com/2024/09/cybersecurity-researchers-warn-of-new.html


4. ÒÆ¶¯ÍøÂç´¹µöÍþв¼¤Ôö £¬82%´¹µöÍøÕ¾¶Ô×¼ÒÆ¶¯É豸


9ÔÂ25ÈÕ £¬Ëæ×ÅÒÆ¶¯ÍøÂç´¹µö¹¥»÷µÄ¼¤Ôö £¬³¬¹ý°Ë³ÉµÄÍøÂç´¹µöÍøÕ¾ÏÖÒÑרһÓÚÒÆ¶¯É豸 £¬Ôö³¤ÂÊÏÔÖø¡£°²È«×êÑнÒʾ £¬ÎÞÊý·¸×ï·Ö×ÓÀûÓÃHTTPSºÍ̸¼Ù×°´¹µöÍøÕ¾°²È« £¬Ôö³¤Á˼ø±ðÄѶÈ £¬ÓÈÆäÔÚÒÆ¶¯¶Ë¡£È«ÇòÁìÓòÄÚ £¬¶ñÒâÈí¼þ¼°ÆóÒµ¼äµýÈí¼þÍþв´ó·ùÔö³¤ £¬³ö¸ñÊÇAndroidƽ̨·ì϶ÉÏÉýÏÔÖø¡£Í¬Ê± £¬ÏνӲ»°²È«ÍøÂçµÄÉ豸¼¤Ôö £¬Ò½ÁƱ£½¡ÐÐÒµ³ÉÎªÒÆ¶¯ÍøÂç´¹µö¹¥»÷µÄ³ÁÔÖÇø¡£×¨¼Ò½¨Òé £¬ÈçÒ½ÁƱ£½¡×é֯ӦѡȡÁãÐÅÀµ°²È«Ä£ÐÍ £¬½áºÏAIÇý¶¯µÄÍþвµý±¨Æ½Ì¨ÒÔ¼ÓÇ¿·ÀÓù¡£´Ë±í £¬¼ÓÇ¿ÒÆ¶¯É豸ÖÎÀí£¨MDM£©¡¢Ö´Ðжà³É·ÖÉí·ÝÑéÖ¤£¨MFA£©ºÍÃÜÂëÖÎÀíÕ½Êõ±»ÊÓΪ¹Ø¼ü·ÀÓù´ëÊ©¡£¶¨ÆÚ½øÐÐÔ±¹¤°²È«Åàѵ¡¢·ì϶ɨÃè¡¢·çÏÕÆÀ¹À¼°°²È«Éó¼ÆÒ²±Ø²»³ÉÉÙ¡£Õë¶Ô²àÔØÀûÓ÷¨Ê½µÄ°²È«·çÏÕ £¬×¨¼ÒÇ¿µ÷ÆäÈÆ¹ý¹Ù·½Éó²é¿ÉÄÜ´øÀ´µÄ·çÏÕ £¬²¢½¨ÒéÆóÒµÔì¶©ÑϸñÕþ²ßÏ޶ȲàÔØÀûÓÃ×°Öà £¬Í¨¹ýMDMϵͳ½ÚÔìÀûÓÃȨÏÞ £¬²¢½ÌÓýÔ±¹¤¼ø±ðÓйطçÏÕ¡£


https://securityboulevard.com/2024/09/mobile-phishing-attacks-explode-enterprise-devices-targeted/


5. RAISECOM GatewayÑϳÁ·ì϶CVE-2024-7120±»»ý¼«ÀûÓÃ


9ÔÂ25ÈÕ £¬RAISECOM GatewayÉ豸½üÆÚÆØ¹âµÄCVE-2024-7120·ì϶ £¬ÒÔÆä¼«¸ßµÄCVSSÆÀ·Ö9.8 £¬³ÉΪÆóÒµ°²È«ÁìÓòµÄÒ»´óÒþÓÇ¡£´Ë·ì϶ÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÊÜÓ°ÏìµÄWeb½çÃælist_base_config.php¾ç±¾Ö´ÐÐËÁÒâºÅÁî £¬Ö±½ÓÍþвµ½°æ±¾3.90µÄMSG1200¡¢MSG2100E¡¢MSG2200¼°MSG2300ÐͺÅÉ豸µÄ°²È« £¬¿ÉÄܵ¼ÖÂÑϳÁµÄÊý¾Ýй¶ºÍϵͳ±»·¸·¨ÈëÇÖ¡£°²È«½çÒÑÈ·Èϸ÷ì϶Ò×ÓÚ±»¶ñÒâÀûÓà £¬ÇÒ×Ô9Ô³õÆð £¬¹¥»÷»î¶¯ÆµÈÔ £¬ÓÚ9ÔÂ12ÈÕÖÁ13ÈÕ´ïµ½¶¥·å £¬ÏÔʾ³öÍþвÐÐΪÕߵĻý¼«Ì¬ÊÆ¡£Ãæ¶ÔÕâÒ»´¹Î£Çé¿ö £¬Ö»¹ÜRAISECOMÉÐδ°ä²¼¹Ù·½²¹¶¡ £¬µ«ÆóÒµ¸Ãµ±¼´²ÉÈ¡´ëÊ©½µµÍ·çÏÕ¡£Ê×Òª¹¤×÷ÊÇÑϸñÏ޶ȶÔÉ豸Web½çÃæµÄ½Ó¼ûȨÏÞ £¬½öÔÊÐíÊÜÐÅÀµµÄÍøÂçºÍÊÚȨÈËÔ±½ÓÈ롣ͬʱ £¬¼ÓÇ¿Web½çÃæµÄÊäÈëÑéÖ¤»úÔì £¬Ö´ÐÐÑϸñµÄËãÕÊ·¨Ê½ £¬ÒÔÕмܺÅÁî×¢Èë¹¥»÷¡£´Ë±í £¬²¿Êð¸ßЧµÄÍøÂç¼à¿ØºÍÈëÇÖ¼ì²âϵͳ £¬ÊµÊ±¼à¿ØÍøÂç»î¶¯ £¬ÊµÊ±·¢ÏÖ²¢Ó¦¶ÔÈκοÉÒÉÐÐΪ £¬Ò²ÊÇÖÁ¹Ø³ÁÒªµÄ·À»¤´ëÊ©¡£


https://securityonline.info/critical-flaw-in-raisecom-gateways-actively-exploited-exposing-thousands-to-remote-attacks/


6. DockerÓëKubernetesÔâÐÂÐͼÓÃÜÇ®±ÒÍÚ¾ò¶ñÒâÈí¼þ¹¥»÷


9ÔÂ25ÈÕ £¬Datadog Security Research¸æ·¢ÁËÒ»ÏîÕë¶ÔDockerºÍKubernetes»·¾³µÄ¸´ÔÓ¶ñÒâÈí¼þ»î¶¯ £¬¸Ã»î¶¯ÀûÓÃÈÝÆ÷±àÅż¼ÊõÖеݲȫ·ì϶ £¬³ö¸ñÊǶ³öÔÚ»¥ÁªÍøÉÏÇÒδÉèÖÃÊʵ±Éí·ÝÑéÖ¤µÄDocker API¶Ëµã £¬½øÐдó¹æÄ£¼ÓÃÜÇ®±ÒÍÚ¾ò¡£¹¥»÷Õßͨ¹ýɨÃ蹤¾ß¼ø±ðÒ×Êܹ¥»÷µÄÈÝÆ÷ £¬²¿ÊðXMRigÍÚ¾òÈí¼þ £¬²¢ÀûÓóõʼ»¯¾ç±¾ÏÂÔØ¶î±í¸ºÔØ¡¢×°ÖÃÊý¾Ý´«Ê乤¾ßºÍ¹ý³Ì°µ²Ø·¨Ê½ £¬ÒÔ¼ÓÇ¿Òñ±ÎÐԺʹ«²¼ÄÜÁ¦¡£´Ë¶ñÒâÈí¼þ²»½öÏÞÓÚµ¥Ò»DockerÊ·ý £¬»¹Í¨¹ýºáÏòÒÆ¶¯¼¼ÊõÈçkube.lateral.shµÈ¾ç±¾ £¬ÔÚÔÆ»ù´¡ÉèÊ©ÖÐ¿í·º´«²¼ £¬³ö¸ñÊÇÕë¶ÔKubernetes¼¯Èº £¬ÀûÓÃKubelet API²¿Êð¸ü¶àÍÚ¾òÈÝÆ÷ £¬À©´ó¹¥»÷ÁìÓò¡£´Ë±í £¬¹¥»÷Õß»¹ÀûÓÃDocker Hub°ä²¼¶ñÒâ¾µÏñ £¬²¢Í¨¹ý°Ñ³ÖDocker Swarm»·¾³ £¬½«ÊÜϰȾÖ÷»úÄÉÈë½©Ê¬ÍøÂç £¬ÊµÏÖ¼¯ÖнÚÔì¡£¸Ã»î¶¯Í¹ÏÔÁËÔÆ»·¾³ÖÐÅäÖÃÃýÎó £¬³ö¸ñÊÇδ±£»¤Docker API¶ËµãµÄÑϳÁ·çÏÕ¡£¹¥»÷ÕßÀûÓÃÕâЩ·ì϶ £¬ÒÔ¼«Ó×µÄ×ÌÈÅÔÚÔÆ»ù´¡ÉèÊ©ÖÐѸ¿ìÀ©É¢ £¬Ðγɴó¹æÄ£µÄÉ¢²¼Ê½¼ÓÃÜÍÚ¾òÍøÂç £¬Îª×ÔÉíıȡÀûÒæ¡£ÎªÓ¦¶Ô´ËÀàÍþв £¬ÔÆÖÎÀíÔ±Ðèµ±¼´²ÉÈ¡Ðж¯ £¬¼ÓÇ¿°²È«ÅäÖá£


https://securityonline.info/new-malware-campaign-mines-crypto-in-docker-kubernetes/