Central GroupÔâ·êÐÂÊý¾Ýй¶£¬500Íò»áÔ±ÐÅϢΣÔÚÔçÍí

°ä²¼¹¦·ò 2024-11-22

1.Central GroupÔâ·êÐÂÊý¾Ýй¶£¬500Íò»áÔ±ÐÅϢΣÔÚÔçÍí


11ÔÂ20ÈÕ£¬Ì©¹ú¿ç¹úÆóÒµ¼¯ÍÅCentral Group½üÆÚÔâ·êÁËÊý¾Ýй¶ÊÂÎñ¡£¾ÝDataBreaches»ã±¨£¬2021Äê10Ô£¬Central Restaurant GroupÔøÔâµ½ÃûΪDESORDENµÄÍþвÐÐΪÕß¹¥»÷¡£¶ø½üÆÚ£¬ÁíÒ»ÃûÍþвÐÐΪÕß0mid16BÐû³Æ£¬ÔÚ2024Äê8ÔÂÖÁ11ÔÂÆÚ¼ä£¬Í¨¹ýCentral RetailÍøÂç¶³öµÄÊÜËðAPI¶Ëµã£¬½Ó¼û²¢ÇÔÈ¡ÁË5,108,826ÌõCentral Group The1 Card»áÔ±Ó×ÎÒÐÅÏ¢¼Í¼¡£The1 CardÊÇCentral GroupÆìÏÂËùÓÐÁãÊÛºÍÏû·ÑÆ·ÅÆÑ¡È¡µÄ»áԱϵͳ£¬Õ¼Óг¬¹ý1700Íò»áÔ±¡£0mid16B°µÊ¾£¬ÓÉÓÚÓëCentral GroupµÄ½»ÉæÊ§°Ü£¬¾ö¶¨ÏúÊÛÕâЩ»áÔ±Ó×ÎÒÐÅÏ¢¼Í¼£¬Ô̺¬Ãû×Ö¡¢ÐÕÊÏ¡¢»áÔ±ºÅÂë¡¢¹úÃñÉí·ÝÖ¤ºÅÂë¡¢¹ú¶È¡¢ÊÖ»úµç»°ºÍµç×ÓÓʼþµÈÃô¸ÐÐÅÏ¢£¬×Ü´óÓ×Ϊ582MB¡£¸ÃºÚ¿ÍÔÚºÚ¿ÍÂÛ̳ºÍX.comÉϰ䲼ÁËÊý¾ÝÁбí£¬²¢ÌṩÁËÊý¾ÝÑù±¾ºÍÑéÖ¤ÕæÊµÐԵIJ½Öè¡£´Ë±í£¬0mid16B»¹Ôð¹ÖÌ©¹ú¹«Ë¾²»Æ÷³ÁÊý¾Ý±£»¤£¬ÓÉÓÚ²»»áÊܵ½ÈκγÍÖΡ£DataBreachesÔø³¢ÊÔÁªÏµCentral Group£¬µ«½ØÖÁ·¢¸åʱÉÐδÊÕµ½»Ø¸´¡£


https://databreaches.net/2024/11/20/thai-loyalty-membership-card-data-of-5-million-customers-put-up-for-sale-on-hacking-forum/


2. ¡°Ghost Tap¡±£ºÍøÂç·¸×ï·Ö×ÓÀûÓÃNFC¼¼ÊõÌ×ÏÖÐÂÕ½Êõ


11ÔÂ20ÈÕ£¬ÍøÂç·¸×ï·Ö×ÓѡȡÁËÒ»ÖÖÃûΪ¡°Ghost Tap¡±µÄÐÂÏÊÌ×ÏÖ²½Ö裬¸Ã²½ÖèÀûÓñ»µÁµÄÐÅÓþ¿¨ÐÅÏ¢£¬³ö¸ñÊÇÓëApple PayºÍGoogle PayµÈÒÆ¶¯Ö§¸¶ÏµÍ³ÓйصÄÊý¾Ý£¬Í¨¹ýÈ«ÇòÁìÓòÄڵġ°Ç®Â⡱ʵÏÖ·¸·¨»ñÀû¡£ÓëÏÈǰµÄÒÆ¶¯¶ñÒâÈí¼þÈçNGateÏà±È£¬Ghost Tap¸üΪÒñ±ÎÇÒÄÑÒÔ¼ì²â£¬ÎÞÐèÊܺ¦ÕßµÄʵÌ忨»òÉ豸£¬Ò²²»Ðè³ÖÐø½Ó´¥Êܺ¦Õߣ¬¶øÊÇͨ¹ýÔ¶³Ì½»»¥ÊµÏÖ¡£¸ÃÕ½ÊõÊ×ÏÈÉæ¼°ÇÔȡ֧¸¶¿¨Êý¾ÝºÍÒ»´ÎÐÔÃÜÂ루OTP£©£¬ÕâÄܹ»Í¨¹ýÒøÐжñÒâÈí¼þ¡¢´¹µöÒ³Ãæ»ò¼üÅ̼ͼµÈ·½Ê½ÊµÏÖ¡£¶øºó£¬ÀûÓÃNFCGate¹¤¾ßºÍÖм̷þÎñÆ÷£¬½«Ö§¸¶ÐÅÏ¢·¢Ë͸øÖØ´óµÄÇ®ÂâÍøÂ磬ÕâЩǮÂâʹÓÃÆäÉ豸µÄNFCоƬÔÚ¶à¸öµØÖ·½øÐÐÁãÊ۲ɰ죬´Ó¶ø¸²¸ÇÁËÖØÒª¹¥»÷ÕßµÄ×ÙÓ°¡£ÓÉÓÚÂòÂô¿´ËƺϷ¨ÇÒ·ÖÉ¢ÓÚ·ÖÆçµØÖ·£¬½ðÈÚ»ú¹¹ÄÑÒÔ·¢ÏÖºÍ×èÖ¹ÕâÖÖÕ½Êõ£¬ÓÈÆäÊǵ±Éæ¼°´óÁ¿Ó×¶îÖ§¸¶Ê±¡£ÎªÁËÌÓ±Ü×·×Ù£¬Ç®ÂâÃÇ»¹»á½«É豸ÖÃÓÚ·ÉÐÐģʽ£¬µ«Î¬³ÖNFCϵͳÔËÐС£ÎªÁË·À±¸¡°Ghost Tap¡±£¬ÒøÐбØÒªÏóÕ÷ʹÓÃͳһÕÅ¿¨ÔÚ·ÖÆçµØÖ·½øÐеķÇÏÖʵ¿É´ïµÄÂòÂô£¬¶øÏû·ÑÕßÔòÐè¼à¿ØÚ²Æ­ÂòÂô²¢µ±¼´ÏòÒøÐл㱨¡£


https://www.bleepingcomputer.com/news/security/new-ghost-tap-attack-abuses-nfc-mobile-payments-to-steal-money/


3. Ubuntu Server needrestart°üÆØ³öÊ®´ó¸ç·ì϶£¬ÔÊÐí±¾µØÌáȨ


11ÔÂ20ÈÕ£¬Ubuntu Server×Ô21.04°æÆðĬÈÏ×°ÖõÄneedrestart°üÖдæÔÚ¶à¸öÒÑÓÐÊ®Ä꺹ÇàµÄ°²È«·ì϶£¬ÕâЩ·ì϶¿ÉÄÜʹ±¾µØ¹¥»÷ÕßÎÞÐèÓû§½»»¥¼´¿É»ñµÃrootȨÏÞ¡£QualysÍþв×êÑв¿ÃÅÓÚÉÏÔ·¢ÏÖ²¢»ã±¨ÁËÕâЩ·ì϶£¬Ö¸³öËüÃǼ«Ò×±»ÀûÓã¬Óû§ÐèѸ¿ìÐж¯½¨¸´¡£·ì϶×Ô2014Äê4ÔÂ27ÈÕneedrestart 0.8°æÒýÈëÚ¹ÊÍÆ÷Ö§³ÖºóÒ»Ïò´æÔÚ£¬Ó°ÏìDebian¡¢UbuntuµÈLinux¿¯Ðаæ¡£NeedrestartÊÇÒ»¸öÓÃÓÚɨÃèϵͳÒÔÈ·¶¨ÔÚ¹²Ïí¿â¸üкóÐè³ÁÆôµÄ·þÎñ£¬ÒÔÔ¤·ÀÏµÍ³È«Ãæ³ÁÆôµÄʵÓ÷¨Ê½¡£Ëü¼¯³Éµ½·þÎñÆ÷Ó³ÏñÖУ¬ÔÚAPT²Ù×÷ºó×Ô¶¯ÔËÐУ¬¼ø±ð¹Ø¼ü¿â¸üкóÐè³ÁÆôµÄ·þÎñ£¬È·±£·þÎñʹÓÃ×îÐÂ¿â°æ±¾£¬Ìá¸ßÕý³£ÔËÐй¦·òºÍ»úÄÜ¡£Qualys·¢ÏÖµÄÎå¸ö·ì϶Ô̺¬Í¨¹ýÓÕÆ­needrestartʹÓù¥»÷Õß½ÚÔìµÄPYTHONPATH»òRUBYLIB»·¾³±äÁ¿ÔËÐÐÚ¹ÊÍÆ÷£¬»òÒÔrootÉí·ÝÖ´ÐÐËÁÒâshellºÅÁî¡£UbuntuÖ¸³öÒÑÔÚ3.8°æÖнâ¾öÕâЩÎÊÌ⣬²¢½¨ÒéÓû§ÏÂÔØ×îв¹¶¡£¬»ò½ûÓÃÚ¹ÊÍÆ÷ɨÃèÆ÷×÷Ϊһʱ»º½â´ëÊ©¡£


https://thehackernews.com/2024/11/decades-old-security-vulnerabilities.html


4. Ä«Î÷¸çµ±¾Ö˾·¨ÊÂÎñ°ì¹«ÊÒÔâRansomhubÀÕË÷Èí¼þ¹¥»÷


11ÔÂ21ÈÕ£¬Ëæ×ÅÍøÂ簲ȫÍþвµÄ²»ÐݼӾ磬īÎ÷¸ç×Üͳ¿ËÀÍµÏæ«¡¤ÐÁ±«Ä·Ö¤Êµ£¬µ±¾ÖÔÚµ÷²éһ·Õë¶ÔÆä˾·¨ÊÂÎñ°ì¹«ÊÒµÄÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ¡£¾Ý³Æ£¬ÀÕË÷Èí¼þÍÅ»ïRansomhub¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢ÒѰ䲼µÐÔÖÊý¾Ý¿âÖеÄÓ×ÎÒÐÅÏ¢Ñù±¾£¬Ðû³ÆÇÔÈ¡ÁË313 GBµÄÊý¾Ý£¬Ô̺¬ºÏͬ¡¢±£ÏպͲÆÕþÎļþµÈ¡£RansomhubÔÚÆäйÃÜÍøÕ¾Éϰ䲼Á˱»µÁÎļþÑù±¾£¬ÕâЩÎļþËÆºõÀ´×Ôµ±¾Ö¹ÍÔ±Êý¾Ý¿â¡£Õâ´ÎÊÂÎñ²¢·ÇÄ«Î÷¸ç×Üͳ°ì¹«ÊÒ³õ´ÎÔâ·êÉæ¼°Ãô¸ÐÐÅÏ¢µÄºÚ¿Í¹¥»÷£¬½ñÄê1Ô¾ÍÔø²úÉú263Ãû±¨Â·×Üͳ»î¶¯µÄ¼ÇÕßµÄÓ×ÎÒÐÅÏ¢±»Ð¹Â¶µÄÊÂÎñ¡£RansomHubÊÇÒ»¸öÏà¶Ô½ÏеÄÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©×éÖ¯£¬ÒòÆä¼¤½øÕ½ÊõºÍ¶Ô¹Ø¼ü»ù´¡ÉèÊ©µÄ¹Ø×¢¶øÉùÃûÀǽ壬±»ÒÔΪÊÇKnightÀÕË÷Èí¼þµÄ¸Ä°æ£¬¸Ã¶ñÒâÈí¼þÕë¶Ô¶à¸öƽ̨£¬²¢Ñ¡È¡ÁËË«³ÁÀÕË÷Ä£ÐÍ¡£


https://securityaffairs.com/171257/data-breach/mexico-suffers-ransomware-attack.html


5. ΢Èí³ÁÈ­½ø¹¥ONNXÍøÂç´¹µö·þÎñ£¬²é·â240¸öÓòÃû


11ÔÂ21ÈÕ£¬×Ô2017ÄêÆð£¬Î¢ÈíÒѲé·âONNX£¨Ò»¸öÍøÂç´¹µö¼´·þÎñƽ̨£©¿Í»§Ê¹ÓõÄ240¸öÓòÃû£¬ÕâЩÓòÃû±»ÓÃÓÚÕë¶ÔÈ«Çò¹«Ë¾¼°Ó×ÎÒ¡£¾Ý΢Èí¡¶2024ÄêÊý×Ö·ÀÓù»ã±¨¡·£¬ONNX£¨ÓÖ³ÆCaffeineºÍFUHRER£©ÊÇ2024ÄêÉϰëÄê×î´óµÄÖÐÑëÈËÍøÂç´¹µö·þÎñ£¬Ã¿Ô·¢ËÍÊýǧÍòÖÁÊýÒÚ·â´¹µöÓʼþ£¬ÖØÒª¶Ô×¼Microsoft 365ÕÊ»§¼°ÆäËû¿Æ¼¼¹«Ë¾¿Í»§¡£ONNXͨ¹ýTelegramÍÆ¹ãÏúÊÛ´¹µö¹¤¾ß°ü£¬Ìṩ¶àÖÖ¶©ÔÄģʽ£¬²¢Ñ¡È¡¶þάÂë´¹µöµÈ¼¿Á©¡£ÕâЩ¹¥»÷ÄÑÒÔͨ¹ýµäÐͶ˵ã¼ì²â¼à¿Ø£¬¶ÔÍøÂ簲ȫÌṩÉÌ×é³ÉÌôÕ½¡£ÔÚDark Atlas°²È«×êÑÐÈËÔ±Åû¶ÆäËùÓÐÕßAbanoub Nady£¨ÍøÃûMRxC0DER£©Éí·Ýºó£¬ONNXÔËÓªÓÚ6ÔÂÖÕ³¡¡£Î¢Èíͨ¹ýÃñÊ·¨Í¥ºÅÁ¶ñÒâ¼¼Êõ»ù´¡ÉèÊ©³Á¶¨ÏòÖÁ×ÔÉí·þÎñÆ÷£¬¶Â½ØÍþвÐÐΪÕß½Ó¼ûȨÏÞ£¬²¢ÓÀÔ¶×èÖ¹ÕâЩÓòÃûÓÃÓÚ½«À´´¹µö¹¥»÷¡£Î¢Èí»¹ÓëLF ProjectsºÏ×÷£¬¸Ã¹«Ë¾ÊÇONNXÃû³ÆºÍ»Õ±êµÄºÏ·¨ËùÓÐÕß¡£


https://www.bleepingcomputer.com/news/security/microsoft-disrupts-onnx-phishing-as-a-service-infrastructure/


6. È«Çò¹¤Òµ½ÚÔìϵͳ£¨ICS£©»¥ÁªÍøÂ¶³öÇé¿öÑϸñ


11ÔÂ21ÈÕ£¬ÐµÄ×êÑÐÏÔʾ£¬È«Çò175¸ö¹ú¶È/µØÓò´æÔÚ³¬¹ý145,000¸ö¶³öÔÚ»¥ÁªÍøÉϵĹ¤Òµ½ÚÔìϵͳ£¨ICS£©£¬ÆäÖÐÃÀ¹úÕ¼±È³¬¹ýÈý·ÖÖ®Ò»¡£ÕâЩICS·þÎñ¶³öÖØÒªÔ´ÓÚ³£ÓõÄICSºÍ̸£¬ÈçModbus¡¢IEC 60870-5-104µÈ£¬ÇÒµØÓò¼ä´æÔÚ²î¾à¡£ÀýÈ磬Modbus¡¢S7ºÍIEC 60870-5-104ÔÚÅ·ÖÞ¸ü³£¼û£¬¶øFox¡¢BACnetµÈÔÚ±±ÃÀ¸ü³£¼û¡£Censys¹«Ë¾µÄ·ÖÎöÖ¸³ö£¬ºÜ¶àICSºÍ̸¿É×·ÒäÖÁ20ÊÀ¼Í70Äê´ú£¬µ«²¢Î´ÊµÏÖÓëÆäËûµØÓòÒ»ÑùµÄ°²È«¸Ä½ø¡£Ö»¹ÜרÃÅÕë¶ÔICSϵͳµÄÍøÂç¹¥»÷Ïà¶Ô½ÏÉÙ£¬µ«½üÄêÀ´ÓÐËùÔö³¤£¬³ö¸ñÊÇÔÚ¶íÎÚÕ½Õùºó¡£´Ë±í£¬HMIÒ²Ô½À´Ô½¶àµØÍ¨¹ý»¥ÁªÍøÌṩÒÔÖ§³ÖÔ¶³Ì½Ó¼û£¬ÇÒ´óÎÞÊý¶³öµÄHMIλÓÚÃÀ¹ú¡£Censys»¹Ö¸³ö£¬ÓÃÓÚ¼à¿ØºÍÓëICSϵͳ½»»¥µÄHMIºÍICS·þÎñ´ó¶àλÓÚÒÆ¶¯»òóÒ×¼¶»¥ÁªÍø·þÎñÌṩÉÌÉÏ£¬ÕâÔö³¤Á˼ø±ðºÍ֪ͨËùÓÐÕßµÄÄѶÈ¡£Òò¶ø£¬×éÖ¯±ØÐë²ÉÈ¡´ëÊ©¼ø±ðºÍ±£»¤Â¶³öµÄOTºÍICSÉ豸£¬¸üÐÂĬÈÏÍ´´¦£¬²¢¼à¿ØÍøÂçÊÇ·ñ´æÔÚ¶ñÒâ»î¶¯¡£


https://thehackernews.com/2024/11/over-145000-industrial-control-systems.html