IO Data·ÓÉÆ÷ÏÖÁãÈÕ·ì϶ £¬Óû§Ãæ¶ÔºÚ¿Í¹¥»÷·çÏÕ

°ä²¼¹¦·ò 2024-12-09

1. IO Data·ÓÉÆ÷ÏÖÁãÈÕ·ì϶ £¬Óû§Ãæ¶ÔºÚ¿Í¹¥»÷·çÏÕ


12ÔÂ4ÈÕ £¬ÈÕ±¾ÍÆËã»úÓ¦¼±ÏìÓ¦Ó××飨CERT£©·¢³öÖÒ¸æ £¬ºÚ¿ÍÔÚÀûÓÃIO Data·ÓÉÆ÷É豸ÖеÄÁãÈÕ·ì϶ £¬Åú¸ÄÉ豸ÉèÖá¢Ö´ÐкÅÁî £¬ÉõÖÁ¹Ø¹Ø·À»ðǽ ¡£2024Äê11ÔÂ13ÈÕ·¢ÏÖµÄÈý¸öȱµã±ðÀëÊÇÐÅϢй¶£¨CVE-2024-45841£©¡¢Ô¶³ÌËÁÒâ²Ù×÷ϵͳºÅÁîÖ´ÐУ¨CVE-2024-47133£©ºÍ½ûÓ÷À»ðǽµÄÄÜÁ¦£¨CVE-2024-52564£© £¬ËüÃÇÓ°ÏìÁËIO DataµÄ»ìºÏLTE·ÓÉÆ÷UD-LT1¼°Æä¹¤Òµ¼¶°æ±¾UD-LT1/EX ¡£Ä¿Ç° £¬×îй̼þ°æ±¾v2.1.9½ö½â¾öÁËCVE-2024-52564·ì϶ £¬¶øÁí±íÁ½¸ö·ì϶µÄ½¨¸´½«ÔÚ2024Äê12ÔÂ18ÈÕ°ä²¼µÄv2.2.0ÖÐÌṩ ¡£ÒÑÓпͻ§»ã±¨³ÆÕâЩ·ì϶Òѱ»ÀûÓýøÐй¥»÷ ¡£ÔÚ½¨¸´·¨Ê½°ä²¼Ö®Ç° £¬IO Data½¨ÒéÓû§½ûÓÃÔ¶³ÌÖÎÀíÖ°ÄÜ £¬Ï޶ȽӼûVPNÏνӵÄÍøÂç £¬¸ü¸ÄĬÈÏ¡°guest¡±Óû§µÄÃÜÂë £¬²¢¶¨ÆÚ¼à¿ØºÍÑéÖ¤É豸ÉèÖà ¡£IO DATA UD-LT1ºÍUD-LT1/EX LTE·ÓÉÆ÷ÖØÒªÔÚÈÕ±¾ÏúÊÛ £¬Ö§³Ö¶à¼ÒÔËÓªÉÌ £¬²¢Óë¸Ã¹úÖØÒªµÄMVNO SIM¿¨¼æÈÝ ¡£


https://www.bleepingcomputer.com/news/security/japan-warns-of-io-data-zero-day-router-flaws-exploited-in-attacks/


2. 8BaseÀÕË÷Èí¼þ×éÖ¯¹¥»÷¿ËÂÞµØÑÇÀïÒ®¿¨¸Û


12ÔÂ7ÈÕ £¬8BaseÀÕË÷Èí¼þ×éÖ¯¶Ô¿ËÂÞµØÑÇ×î´óµÄ¸ÉÉ¢»õÌØÐí¾­ÓªÉÌÀïÒ®¿¨¸Û·¢ÆðÁËÍøÂç¹¥»÷ £¬²¢Ðû³Æ¶ÔÕâ´Î°²È«·ìÏ¶ÕÆ¹Ü ¡£ÀïÒ®¿¨¸Û (Luka Rijeka dd) ÊÇ¿ËÂÞµØÑÇ×î´óµÄ¸ÉÉ¢»õÌØÐí¾­ÓªÉÌ £¬Ìṩº£ÉϽ»Í¨·þÎñ¡¢¸Û¿ÚÔËÓªºÍ»õÎïÖü´æ ¡£Ëü»¹Ìṩ¸÷Àྭ¼Ã·þÎñ £¬Ô̺¬Éè±¸ÊØ»¤¡¢¹¹ÖþÎï±£Ñø¡¢»õÎï¹Ì¶¨ºÍÖÊÁ¿½ÚÔì ¡£¸Ã×éÖ¯Ðû³ÆÒѾ­ÇÔÈ¡ÁËÔ̺¬¹ÜÕÊÐÅÏ¢¡¢ºÏͬÒÔ¼°ÆäËûÃô¸ÐÊý¾ÝÔÚÄڵĶàÖÖÎļþ £¬È緢Ʊ¡¢ÊÕÌõ¡¢¹ÜÕÊÆ¾Ö¤¡¢Ó×ÎÒ×ÊÁÏ¡¢Ö¤Êé¡¢¹ÍÓ¶ºÏͬ¡¢±£ÃܺÍ̸µÈ £¬²¢ÔÚÆäTorÐ¹Â©ÍøÕ¾Éϰ䲼ÁËÕâЩÐÅÏ¢ ¡£Ö»¹Ü¸Ã×éÖ¯¸ø³öÁËÊê½ð½ØÖ¹ÈÕÆÚΪ2024Äê12ÔÂ10ÈÕ £¬µ«ÀïÒ®¿¨¸ÛµÄÊ×ϯִÐйٶÅ˹¿Æ¡¤¸ñÀ­²©Íߴݵʾ £¬Ö»¹ÜһЩÊý¾Ý±»µÁ £¬µ«¸ÃÊÂÎñ¶Ô¸Û¿ÚµÄÔËÓª²¢Î´Ôì³ÉÓ°Ïì £¬Í¬Ê±ËûµÄ×éÖ¯Ò²²»»áÖ§¸¶ÀÕË÷Èí¼þÍÅ»ïÒªÇóµÄÊê½ð ¡£


https://securityaffairs.com/171779/cyber-crime/8base-ransomware-croatias-port-of-rijeka.html


3. TermiteÀÕË÷Èí¼þÍÅ»ïÐû³Æ¶ÔBlue YonderÈëÇÖÊÂÎñÕÆ¹Ü


12ÔÂ6ÈÕ £¬TermiteÀÕË÷Èí¼þÍÅ»ïÒÑÐû³Æ¶Ô11Ô·ÝÈ«Çò¹©¸øÁ´Èí¼þ¹©¸øÉÌBlue YonderµÄÈëÇÖÊÂÎñÕÆ¹Ü ¡£Blue YonderÊÇÒ»¼Ò×ܲ¿Î»ÓÚÑÇÀûÉ£ÄÇÖݵĹ«Ë¾ £¬Îª³¬¹ý3000¼Ò¿Í»§Ìṩ·þÎñ £¬ÆäÖÐÔ̺¬Î¢Èí¡¢À×ŵ¡¢±¦½àµÈ³ÛÃû¹«Ë¾ ¡£Õâ´Î¹¥»÷µ¼ÖÂBlue YonderµÄÍйܷþÎñ»·¾³³öÏÖÖжÏ £¬Ó°ÏìÁËÆä¿Í»§µÄһϵÁÐÒµÎñÔËÓª £¬Ô̺¬ÐǰͿˡ¢MorrisonsºÍSainsbury'sµÈ ¡£¹ÌÈ»Blue YonderÒѸ´Ô­²¿ÃÅÊÜÓ°Ïì¿Í»§µÄÔÚÏß·þÎñ £¬µ«ÉÐδй©Óм¸¶à¿Í»§Êܵ½Ó°ÏìÒÔ¼°¹¥»÷ÕßÊÇ·ñ´ÓϵͳÖÐÇÔÈ¡ÁËÊý¾Ý ¡£È»¶ø £¬TermiteÀÕË÷Èí¼þÍÅ»ïÔÚÆäйÃÜÍøÕ¾ÉÏÐû³ÆÒÑÇÔÈ¡680GBµÄÎļþ £¬Ô̺¬Êý¾Ý¿âת´¢¡¢½«À´¹¥»÷µÄµç×ÓÓʼþÁÐ±í¡¢ÎĵµµÈ ¡£¾ÝÍþвµý±¨¹«Ë¾³Æ £¬TermiteÊÇÒ»ÖÖгöÏÖµÄÀÕË÷Èí¼þ £¬²Î¼ÓÊý¾Ý͵ÇÔ¡¢ÀÕË÷ºÍ¼ÓÃܹ¥»÷ ¡£ÍøÂ簲ȫ¹«Ë¾Ç÷Ïò¿Æ¼¼°µÊ¾ £¬TermiteµÄÀÕË÷Èí¼þ¼ÓÃÜÆ÷¿ÉÄÜÈÔ´¦ÓÚ¿ª·¢½×¶Î £¬´æÔÚ´úÂëÖ´ÐÐȱµã ¡£


https://www.bleepingcomputer.com/news/security/blue-yonder-saas-giant-breached-by-termite-ransomware-gang/


4. Ultralytics YOLO11Ô⹩¸øÁ´¹¥»÷ £¬¼ÓÃܿ󹤶ñÒâ´úÂë±»Ö²Èë


12ÔÂ6ÈÕ £¬Ê¢ÐеÄUltralytics YOLO11 AIÄ£ÐÍÔÚ¹©¸øÁ´¹¥»÷ÖÐÔâµ½ÈëÇÖ ¡£¹¥»÷ÕßÔÚPyPIÉϰ䲼µÄ8.3.41ºÍ8.3.42°æ±¾Öв¿ÊðÁ˼ÓÃÜ¿ó¹¤ ¡£UltralyticsÊÇÒ»¼ÒרһÓÚÍÆËã»úÊÓ¾õºÍAIµÄ¹«Ë¾ £¬ÆäYOLOÄ£Ðͱ»¿í·ºÓÃÓÚÎïÌå¼ì²âºÍͼÏñ´¦Öà ¡£ÕâÁ½¸öÊÜËð°æ±¾Òѱ»³·Ïú £¬²¢´úÌæÎª¸É¾»µÄ8.3.43°æ±¾ ¡£¾ÝUltralyticsÊ×´´È˼æÊ×ϯִÐйÙGlenn Jocher³Æ £¬Õâ´Î¹¥»÷ÊÇÕë¶Ô¼ÓÃÜÇ®±ÒÍÚ¾òµÄ¶ñÒâ´úÂë×¢Èë¹¥»÷ ¡ £¿ª·¢ÈËÔ¹ØýÔÚµ÷²é¹¹½¨»·¾³ÖеÄDZÔÚ·ì϶ £¬ÒÔÈ·¶¨¹¥»÷ÈôºÎ²úÉú ¡£´Ë±í £¬ÓÐЧ»§»ã±¨PyPIÉϳöÏÖÁËÐµÄľÂí°æ±¾ £¬Òò¶ø¹¥»÷¿ÉÄÜÈÔÔÚ³ÖÐø ¡£³öÓÚÉóÉ÷˼¿¼ £¬ÏÂÔØÁ˶ñÒâ°æ±¾µÄÓû§Ó¦¸ÃÖ´ÐÐÆëÈ«µÄϵͳɨÃè ¡£


https://www.bleepingcomputer.com/news/security/ultralytics-ai-model-hijacked-to-infect-thousands-with-cryptominer/


5. Web3¹¤×÷ÕßÔâڲƭÐÔÊÓÆµ»áÒéÈí¼þ¡°Meeten¡±¹¥»÷


12ÔÂ6ÈÕ £¬ÍøÂç·¸×ï·Ö×ÓÀûÓÃÃûΪ¡°Meeten¡±µÄڲƭÐÔÊÓÆµ»áÒéÆ½Ì¨ £¬Õë¶ÔWeb3ÁìÓòµÄ¹¤×÷ÈËÔ±Ö´Ðй¥»÷ £¬Í¨¹ýÐéαµÄÉÌÎñ»áÒéÓÕÆ­Êܺ¦ÕßÏÂÔØ¶ñÒâÈí¼þ £¬ÒÔÇÔÈ¡¼ÓÃÜÇ®±Ò¡¢ÒøÐÐÐÅÏ¢¡¢ÍøÂçä¯ÀÀÆ÷´æ´¢µÄÐÅÏ¢¼°MacÉϵÄKeychainÍ´´¦µÈ ¡£¸Ã»î¶¯×Ô2024Äê9ÔÂÆðÖ´ÐÐ £¬¶ñÒâÈí¼þÓÐWindowsºÍmacOS°æ±¾ £¬ÇÒÍþвÐÐΪÕß²»Ðݸü¸Ä¼Ùð»áÒéÈí¼þµÄÃû³ÆºÍÆ·ÅÆÒÔÔö³¤ºÏ·¨ÐÔ ¡£Êܺ¦Õßͨ³£Í¨¹ýTelegram»òµç»°½Ó´¥ºó±»Êèµ¼ÖÁMeetenÍøÕ¾ÏÂÔØ¶ñÒâÈí¼þ £¬¸ÃÍøÕ¾»¹ÍйÜJavaScriptÓÃÓÚÔÚ×°ÖÃǰÇÔÈ¡¼ÓÃÜÇ®±Ò ¡£Cado°²È«³¢ÊÔÊÒ·¢ÏÖ £¬³ýÁËRealst¶ñÒâÈí¼þ±í £¬MeetenÍøÕ¾»¹ÊÔͼºÄ¾¡Ïνӵ½¸ÃÍøÕ¾µÄÇ®°ü ¡£Óû§Ó¦ÉóÉ÷×°ÖÃÈí¼þ £¬ÏÈÑéÖ¤ÆäºÏ·¨ÐÔÔÙʹÓöàÒýÇæ·À²¡¶¾¹¤¾ß½øÐÐɨÃè £¬ÓÈÆäÊÇWeb3ÁìÓòµÄ¹¤×÷ÈËÔ±ÐèÌá¸ß¾¯Ìè ¡£


https://www.bleepingcomputer.com/news/security/crypto-stealing-malware-posing-as-a-meeting-app-targets-web3-pros/


6. Atrium HealthÊý¾Ýй¶ÊÂÎñÓ°Ï쳬58ÍòÈË


12ÔÂ6ÈÕ £¬Ò½ÁƱ£½¡¹«Ë¾Atrium HealthÒÑÏòÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿(HHS)´«µÝ £¬Ò»Â·Êý¾Ýй¶ÊÂÎñÓ°ÏìÁ˳¬¹ý585,000ÈË ¡£¸ÃÊÂÎñ¿ÉÄÜÓë2015ÄêÖÁ2019ÄêÆÚ¼äAtrium Health»¼ÕßÃÅ»§ÍøÕ¾ÉÏ´æÔÚµÄÔÚÏß×·×Ù¼¼ÊõÎÊÌâÓйØ ¡£¹«Ë¾°µÊ¾ £¬ÕâЩ¼¼Êõ¿ÉÄÜÒѽ«Ä³Ð©Ó×ÎÒÐÅÏ¢ £¬ÈçIP¡¢cookie¡¢Ò½ÖλòÌṩÕßÐÅÏ¢¡¢ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëºÍÏÖʵµØÖ·µÈ £¬´«Ê䏸Á˵ÚÈý·½¹©¸øÉÌ £¬ÈçGoogleºÍFacebook£¨ÏÖΪMeta£© ¡£Ö»¹Ü2022ÄêµÄ³õ²½Éó²éδ·¢ÏÖÒì³£ £¬µ«×î½üµÄ·ÖÎöµÄÈ··¢ÏÖÁËÐÅϢй¶µÄÇé¿ö ¡£AtriumÖ¸³ö £¬Ã»ÓÐÉæ¼°Éç»á°²È«ºÅÂë¡¢²ÆÕþÕË»§¡¢ÐÅÓþ¿¨»ò½è¼Ç¿¨ÐÅÏ¢ £¬Ò²Ã»ÓÐÖ¤¾ÝÅú×¢ÐÅÏ¢±»ÀÄÓà £¬ÇÒÐÅÏ¢ÐÔÖʲ»Ì«¿ÉÄܵ¼ÖÂÉí·Ý͵ÇÔ»ò²ÆÕþËðʧ ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬Õâ²¢·ÇAtrium½üÆÚÅû¶µÄΨÖðÒ»Â·ÍøÂ簲ȫÊÂÎñ ¡£9ÔÂÖÐÑ® £¬¸Ã¹«Ë¾»¹´«µÝÁËÁíÒ»Â·ÍøÂç´¹µöÊÂÎñ £¬µ¼Ö²¿ÃÅ»¼ÕߺÍÔ±¹¤µÄÐÅÏ¢ £¬Ô̺¬Éç±£ºÅ¡¢ÒøÐÐÕË»§ÐÅÏ¢¡¢½Ó¼ûƾ֤ÒÔ¼°Ò½ÖÎ/Õï¶ÏÏêÇéµÈ±»Ð¹Â¶ ¡£Atrium HealthÔÚ¶à¸öÖݵÄ1,400¶à¸ö»¤Àí»ú¹¹ºÍ40¼ÒÒ½ÔºÌṩҽÁƱ£½¡·þÎñ £¬´ËÇ°Ò²ÔøÔâ·ê¹ýÊý¾Ýй¶ÊÂÎñ ¡£


https://www.securityweek.com/atrium-health-data-breach-impacts-585000-people/