MoneyGramÔâ·êÍøÂç¹¥»÷£¬ÏµÍ³ÖжÏÒý·¢¿í·º¹Ø×¢
°ä²¼¹¦·ò 2024-09-269ÔÂ24ÈÕ£¬»ã¿î¾ÞÍ·MoneyGram×ÔÉÏÖÜÎåÆðÔâ·êϵͳÖжϣ¬²¢È·ÈÏÕâÊÇÓÉÍøÂç¹¥»÷ËùÖ¡£Ö»¹Ü´Ëǰ¹«Ë¾½öÌá¼°¡°ÍøÂçÖжϡ±£¬Î´Ã÷È·×¢Ã÷ÔÒò£¬Ö±ÖÁÖÜÒ»²ÅÕýʽ²¼¸æÍøÂ簲ȫÊÂÎñÊÇÆäϵͳ̱»¾µÄ±¾Ô¡£MoneyGram×÷ΪȫÇòµÚ¶þ´ó»ã¿î·þÎñÌṩÉÌ£¬Æä·þÎñ¸²¸Ç200¸ö¹ú¶ÈµÄ350,000¸öÍøµã¼°ÏßÉÏÆ½Ì¨£¬ÄêÂòÂôÁ¿³¬1.2Òڱʡ£Õâ´Î¹¥»÷µ¼ÖÂÓû§ÎÞ·¨ÊµÏÖÂòÂô»ò½Ó¼û×ʽð£¬ÍøÕ¾Ò²ÎÞ·¨Ê¹Óã¬Òý·¢ÁË¿í·º¹Ø×¢ºÍÓÇÓô¡£¹«Ë¾Ñ¸¿ì²ÉÈ¡Ðж¯£¬½«ÊÜÓ°ÏìµÄϵͳÏÂÏßÒÔ¶ôÔì¹¥»÷£¬²¢Óë±í²¿×¨¼ÒºÍ·¨Âɲ¿ÃÅçÇÃܺÏ×÷ÒÔ¸´Ô·þÎñ¡£MoneyGramÇ¿µ÷Á˶ÔÊÂÎñÑϳÁÐÔµÄÒâʶ£¬²¢³Ðŵ¾¡¿ì¸´ÔϵͳÕý³£ÔËÐС£È»¶ø£¬¹ØÓÚϵͳ¸´ÔµÄ¾ßÌ幦·ò±íÉÐδ°ä²¼£¬°µÊ¾¹¥»÷¿ÉÄÜÈÔÔÚ³ÖÐø»ò¸´Ô¹¤×÷´¦ÓÚ³õÆÚ½×¶Î¡£Ö»¹Ü¹¥»÷ÀàÐÍÉÐδ¹«¿ª£¬µ«³¤¹¦·òµÄ·þÎñÖжϺÍÏνÓÎÊÌâÇ¿ÁÒ°µÊ¾Õâ¿ÉÄÜÊÇһ·ÀÕË÷Èí¼þ¹¥»÷¡£¼øÓÚMoneyGramÖØ´óµÄÓû§»ù´¡£¬Õâ´ÎÊÂÎñÈôÉæ¼°Êý¾Ýй¶£¬ÆäDZÔÚÓ°Ï콫¼«ÎªÉîÔ¶¡£
https://www.bleepingcomputer.com/news/security/moneygram-confirms-a-cyberattack-is-behind-dayslong-outage/
2. ºÚ¿ÍÒ»ÖÜÄÚµÚÈý´ÎÏ®»÷´÷¶û£¬500MBÃô¸ÐÊý¾ÝÔâй¶
9ÔÂ25ÈÕ£¬ºÚ¿Í¡°grep¡±ÔÙ´ÎÕë¶Ô¿Æ¼¼¾ÞÍ·´÷¶û·¢Æð¹¥»÷£¬Ò»ÖÜÄÚµÚÈý´ÎÔì³ÉÊý¾Ýй¶£¬Õâ´Îй¶ÁËÔ¼500MBµÄÃô¸ÐÊý¾Ý£¬Ô̺¬ÄÚ²¿Îĵµ¡¢Í¼Æ¬¡¢²âÊÔÊÓÆµ¼°¶à³ÁÉí·ÝÑéÖ¤£¨MFA£©Êý¾Ý¡£´÷¶ûÖÁ½ñδ×ö³öÕýʽ»ØÓ¦£¬¶øºÚ¿Í¡°grep¡±Ôò¹«¿ªÐû³Æ¶ÔÕâ´ÎÐ¹Â¶ÕÆ¹Ü£¬²¢°µÊ¾Ëùº±¼û¾Ý¾ùÔ´×Ôµ¥´ÎÈëÇÖ£¬Ö»ÊÇÕ½ÊõÐԵطÖÅúÆØ¹â¡£Ð¹Â¶µÄÐÅÏ¢Öк¸ÇÁËÄÚ²¿Æ±Îñϵͳϸ½Ú¡¢Öйú»ù´¡ÉèÊ©ÏîÄ¿Îļþ¼°°²È«ÓйØÎĵµ£¬Ò»µ©ÕâЩÃô¸ÐÐÅÏ¢±»²»µ±ÀûÓ㬽«¶Ô´÷¶ûµÄÔËÓª°²È«×é³ÉÑϳÁÍþв¡£2024Äê 9 Ô 19 ÈÕ£¬¡°grep¡±Ð¹Â¶Á˳¬¹ý 12,000 Ãû´÷¶ûÔ±¹¤µÄÊý¾Ý£¬Òý·¢ÁËÄÚ²¿µ÷²é¡£¼¸Ììºó£¬¼´ 9 Ô 22 ÈÕ£¬¸ü¶àÃô¸ÐµÄÄÚ²¿Îļþ±»Ð¹Â¶£¬¾Ý³ÆÊÇ´÷¶ûʹÓà Atlassian ¹¤¾ßʱй¶µÄ¡£½ØÖÁĿǰ£¬´÷¶ûÉÐδȷÈÏÕâ´ÎÊý¾Ýй¶µÄ¾ßÌåÓ°ÏìÁìÓò¼°ÊÇ·ñÉæ¼°µÚÈý·½·ì϶£¬Ò»ÖÜÄÚ²úÉúÈýÆðÊý¾Ýй¶ÊÂÎñ£¬ÈËÃǶԴ÷¶ûÍøÂ簲ȫµÄÓÇÓôÓëÈÕ¾ãÔö¡£
https://hackread.com/dell-data-leak-in-week-amid-grep-cyberattacks/
3. ÍøÂ簲ȫ×êÑÐÈËÔ±ÖÒ¸æÐÂÐÍ»ùÓÚRustµÄSplinterºóÀûÓù¤¾ß
9ÔÂ25ÈÕ£¬ÍøÂ簲ȫÁìÓò½üÆÚ·¢ÏÖÁËÒ»ÖÖÃûΪSplinterµÄÐÂÐͺóÀûÓúì¶Ó¹¤¾ß£¬¸Ã¹¤¾ßÓÉPalo Alto Networks Unit 42ÔÚ¿Í»§ÏµÍ³Öмø±ð²¢°ä²¼¡£SplinterÓÉRust˵»°±àд£¬ËäÖ°Äܲ»ÈçCobalt StrikeµÈ¸ß¼¶¹¤¾ßÈ«Ãæ£¬µ«Èç±»ÀÄÓã¬ÈÔ¶Ô×éÖ¯°²È«×é³ÉDZÔÚ·çÏÕ¡£¸Ã¹¤¾ßרΪºì¶ÓÐж¯Éè¼Æ£¬ÓÃÓÚ¼ø±ðÆóÒµÍøÂçÖеݲȫ·ì϶£¬µ«Í¬Ñù´æÔÚ±»¶ñÒâÀûÓõķçÏÕ¡£Ä¿Ç°£¬ÉÐÎÞÖ¤¾ÝÅú×¢SplinterÓë¾ßÌåÍþвÐÐΪÕßÓйØÁª£¬ÇÒÆäÖØ´óÌå»ýÖØÒª¹éÒòÓÚÔ̺¬µÄRust¿âÊýÁ¿¡£Splinter¾ß±¸¶àÖÖÖ°ÄÜ£¬ÈçÖ´ÐÐWindowsºÅÁî¡¢Ô¶³Ì¹ý³Ì×¢Èë¡¢ÎļþÉÏ´«ÏÂÔØ¡¢ÔÆ·þÎñÕË»§ÐÅÏ¢ÍøÂç¼°×ÔÎÒɾ³ýµÈ£¬ÕâЩ¾ùͨ¹ýÆäÅäÖõÄC2·þÎñÆ÷½Ó¹Ü¹¤×÷ʵÏÖ¡£´Ë±í£¬½üÆÚ»¹ÆØ¹âÁËÆäËû¼¸Öָ߼¶¹¥»÷¼¼Êõ£¬Èçͨ¹ýMicrosoft Office RPC½Ó¿ÚºÍ¶ñÒâµæÆ¬ÊµÏÖµÄÒþÃØ´úÂë×¢ÈëÓëȨÏÞÌáÉý£¬ÒÔ¼°ÀûÓÃThread Name-Calling¼¼ÊõÈÆ¹ý¶Ëµã±£»¤½øÇ°¹ý³Ì×¢Èë¡£ÕâЩ·¢ÏÖÇ¿µ÷ÁËÔÚÍøÂ簲ȫÁìÓòά³ÖÔ¤·ÀºÍ¼ì²âÄÜÁ¦µÄ³ÁÒªÐÔ£¬ÓÉÓÚ·¸×ï·Ö×ӻ᲻ÐÝѡȡм¼ÊõÍþв×éÖ¯°²È«¡£
https://thehackernews.com/2024/09/cybersecurity-researchers-warn-of-new.html
4. ÒÆ¶¯ÍøÂç´¹µöÍþв¼¤Ôö£¬82%´¹µöÍøÕ¾¶Ô×¼ÒÆ¶¯É豸
9ÔÂ25ÈÕ£¬Ëæ×ÅÒÆ¶¯ÍøÂç´¹µö¹¥»÷µÄ¼¤Ôö£¬³¬¹ý°Ë³ÉµÄÍøÂç´¹µöÍøÕ¾ÏÖÒÑרһÓÚÒÆ¶¯É豸£¬Ôö³¤ÂÊÏÔÖø¡£°²È«×êÑнÒʾ£¬ÎÞÊý·¸×ï·Ö×ÓÀûÓÃHTTPSºÍ̸¼Ù×°´¹µöÍøÕ¾°²È«£¬Ôö³¤Á˼ø±ðÄѶȣ¬ÓÈÆäÔÚÒÆ¶¯¶Ë¡£È«ÇòÁìÓòÄÚ£¬¶ñÒâÈí¼þ¼°ÆóÒµ¼äµýÈí¼þÍþв´ó·ùÔö³¤£¬³ö¸ñÊÇAndroidƽ̨·ì϶ÉÏÉýÏÔÖø¡£Í¬Ê±£¬ÏνӲ»°²È«ÍøÂçµÄÉ豸¼¤Ôö£¬Ò½ÁƱ£½¡ÐÐÒµ³ÉÎªÒÆ¶¯ÍøÂç´¹µö¹¥»÷µÄ³ÁÔÖÇø¡£×¨¼Ò½¨Ò飬ÈçÒ½ÁƱ£½¡×é֯ӦѡȡÁãÐÅÀµ°²È«Ä£ÐÍ£¬½áºÏAIÇý¶¯µÄÍþвµý±¨Æ½Ì¨ÒÔ¼ÓÇ¿·ÀÓù¡£´Ë±í£¬¼ÓÇ¿ÒÆ¶¯É豸ÖÎÀí£¨MDM£©¡¢Ö´Ðжà³É·ÖÉí·ÝÑéÖ¤£¨MFA£©ºÍÃÜÂëÖÎÀíÕ½Êõ±»ÊÓΪ¹Ø¼ü·ÀÓù´ëÊ©¡£¶¨ÆÚ½øÐÐÔ±¹¤°²È«Åàѵ¡¢·ì϶ɨÃè¡¢·çÏÕÆÀ¹À¼°°²È«Éó¼ÆÒ²±Ø²»³ÉÉÙ¡£Õë¶Ô²àÔØÀûÓ÷¨Ê½µÄ°²È«·çÏÕ£¬×¨¼ÒÇ¿µ÷ÆäÈÆ¹ý¹Ù·½Éó²é¿ÉÄÜ´øÀ´µÄ·çÏÕ£¬²¢½¨ÒéÆóÒµÔì¶©ÑϸñÕþ²ßÏ޶ȲàÔØÀûÓÃ×°Öã¬Í¨¹ýMDMϵͳ½ÚÔìÀûÓÃȨÏÞ£¬²¢½ÌÓýÔ±¹¤¼ø±ðÓйطçÏÕ¡£
https://securityboulevard.com/2024/09/mobile-phishing-attacks-explode-enterprise-devices-targeted/
5. RAISECOM GatewayÑϳÁ·ì϶CVE-2024-7120±»»ý¼«ÀûÓÃ
9ÔÂ25ÈÕ£¬RAISECOM GatewayÉ豸½üÆÚÆØ¹âµÄCVE-2024-7120·ì϶£¬ÒÔÆä¼«¸ßµÄCVSSÆÀ·Ö9.8£¬³ÉΪÆóÒµ°²È«ÁìÓòµÄÒ»´óÒþÓÇ¡£´Ë·ì϶ÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÊÜÓ°ÏìµÄWeb½çÃælist_base_config.php¾ç±¾Ö´ÐÐËÁÒâºÅÁֱ½ÓÍþвµ½°æ±¾3.90µÄMSG1200¡¢MSG2100E¡¢MSG2200¼°MSG2300ÐͺÅÉ豸µÄ°²È«£¬¿ÉÄܵ¼ÖÂÑϳÁµÄÊý¾Ýй¶ºÍϵͳ±»·¸·¨ÈëÇÖ¡£°²È«½çÒÑÈ·Èϸ÷ì϶Ò×ÓÚ±»¶ñÒâÀûÓã¬ÇÒ×Ô9Ô³õÆð£¬¹¥»÷»î¶¯ÆµÈÔ£¬ÓÚ9ÔÂ12ÈÕÖÁ13ÈÕ´ïµ½¶¥·å£¬ÏÔʾ³öÍþвÐÐΪÕߵĻý¼«Ì¬ÊÆ¡£Ãæ¶ÔÕâÒ»´¹Î£Çé¿ö£¬Ö»¹ÜRAISECOMÉÐδ°ä²¼¹Ù·½²¹¶¡£¬µ«ÆóÒµ¸Ãµ±¼´²ÉÈ¡´ëÊ©½µµÍ·çÏÕ¡£Ê×Òª¹¤×÷ÊÇÑϸñÏ޶ȶÔÉ豸Web½çÃæµÄ½Ó¼ûȨÏÞ£¬½öÔÊÐíÊÜÐÅÀµµÄÍøÂçºÍÊÚȨÈËÔ±½ÓÈ롣ͬʱ£¬¼ÓÇ¿Web½çÃæµÄÊäÈëÑéÖ¤»úÔ죬ִÐÐÑϸñµÄËãÕÊ·¨Ê½£¬ÒÔÕмܺÅÁî×¢Èë¹¥»÷¡£´Ë±í£¬²¿Êð¸ßЧµÄÍøÂç¼à¿ØºÍÈëÇÖ¼ì²âϵͳ£¬ÊµÊ±¼à¿ØÍøÂç»î¶¯£¬ÊµÊ±·¢ÏÖ²¢Ó¦¶ÔÈκοÉÒÉÐÐΪ£¬Ò²ÊÇÖÁ¹Ø³ÁÒªµÄ·À»¤´ëÊ©¡£
https://securityonline.info/critical-flaw-in-raisecom-gateways-actively-exploited-exposing-thousands-to-remote-attacks/
6. DockerÓëKubernetesÔâÐÂÐͼÓÃÜÇ®±ÒÍÚ¾ò¶ñÒâÈí¼þ¹¥»÷
9ÔÂ25ÈÕ£¬Datadog Security Research¸æ·¢ÁËÒ»ÏîÕë¶ÔDockerºÍKubernetes»·¾³µÄ¸´ÔÓ¶ñÒâÈí¼þ»î¶¯£¬¸Ã»î¶¯ÀûÓÃÈÝÆ÷±àÅż¼ÊõÖеݲȫ·ì϶£¬³ö¸ñÊǶ³öÔÚ»¥ÁªÍøÉÏÇÒδÉèÖÃÊʵ±Éí·ÝÑéÖ¤µÄDocker API¶Ëµã£¬½øÐдó¹æÄ£¼ÓÃÜÇ®±ÒÍÚ¾ò¡£¹¥»÷Õßͨ¹ýɨÃ蹤¾ß¼ø±ðÒ×Êܹ¥»÷µÄÈÝÆ÷£¬²¿ÊðXMRigÍÚ¾òÈí¼þ£¬²¢ÀûÓóõʼ»¯¾ç±¾ÏÂÔØ¶î±í¸ºÔØ¡¢×°ÖÃÊý¾Ý´«Ê乤¾ßºÍ¹ý³Ì°µ²Ø·¨Ê½£¬ÒÔ¼ÓÇ¿Òñ±ÎÐԺʹ«²¼ÄÜÁ¦¡£´Ë¶ñÒâÈí¼þ²»½öÏÞÓÚµ¥Ò»DockerÊ·ý£¬»¹Í¨¹ýºáÏòÒÆ¶¯¼¼ÊõÈçkube.lateral.shµÈ¾ç±¾£¬ÔÚÔÆ»ù´¡ÉèÊ©ÖÐ¿í·º´«²¼£¬³ö¸ñÊÇÕë¶ÔKubernetes¼¯Èº£¬ÀûÓÃKubelet API²¿Êð¸ü¶àÍÚ¾òÈÝÆ÷£¬À©´ó¹¥»÷ÁìÓò¡£´Ë±í£¬¹¥»÷Õß»¹ÀûÓÃDocker Hub°ä²¼¶ñÒâ¾µÏñ£¬²¢Í¨¹ý°Ñ³ÖDocker Swarm»·¾³£¬½«ÊÜϰȾÖ÷»úÄÉÈë½©Ê¬ÍøÂ磬ʵÏÖ¼¯ÖнÚÔì¡£¸Ã»î¶¯Í¹ÏÔÁËÔÆ»·¾³ÖÐÅäÖÃÃýÎ󣬳ö¸ñÊÇδ±£»¤Docker API¶ËµãµÄÑϳÁ·çÏÕ¡£¹¥»÷ÕßÀûÓÃÕâЩ·ì϶£¬ÒÔ¼«Ó×µÄ×ÌÈÅÔÚÔÆ»ù´¡ÉèÊ©ÖÐѸ¿ìÀ©É¢£¬Ðγɴó¹æÄ£µÄÉ¢²¼Ê½¼ÓÃÜÍÚ¾òÍøÂ磬Ϊ×ÔÉíıȡÀûÒæ¡£ÎªÓ¦¶Ô´ËÀàÍþв£¬ÔÆÖÎÀíÔ±Ðèµ±¼´²ÉÈ¡Ðж¯£¬¼ÓÇ¿°²È«ÅäÖá£
https://securityonline.info/new-malware-campaign-mines-crypto-in-docker-kubernetes/


¾©¹«Íø°²±¸11010802024551ºÅ