OneBloodÔâÀÕË÷Èí¼þ¹¥»÷£¬Ï×ѪÕßÓ×ÎÒÐÅϢй¶
°ä²¼¹¦·ò 2025-01-151. OneBloodÔâÀÕË÷Èí¼þ¹¥»÷£¬Ï×ѪÕßÓ×ÎÒÐÅϢй¶
1ÔÂ13ÈÕ£¬·ÇÓ¯ÀûÏ×Ѫ»ú¹¹OneBlood֤ʵ£¬2024ÄêÏÄÌìÔâ·êÁËÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÏ×ѪÕßµÄÓ×ÎÒÐÅÏ¢±»ÇÔÈ¡¡£¸Ã»ú¹¹ÓÚ2024Äê7ÔÂ31ÈÕ³õ´Î¹«¿ªÁËÕâÒ»ÊÂÎñ£¬Ö¸³ö¹¥»÷Õß¼ÓÃÜÁËÆäÐé¹¹»ú£¬ÆÈʹÆäѡȡÊÖ¶¯Á÷³Ì£¬½ø¶øÓ°ÏìÁËѪҺ²É¼¯¡¢¼ì²âºÍ·ÖÅ䣬µ¼Ö²¿ÃÅÕïËù³öÏÖÑϳÁѪҺǷȱ¡£OneBloodËæ¼´·¢³ö´¹Î£ºôÓõ£¬ÒªÇó¾èÏ×OÐÍѪ¡¢OÐÍѪÒõÐÔѪºÍѪÓ×°å¡£ÉÏÖÜ£¬OneBloodÆðÍ·ÏòÊÜÓ°ÏìÓ×ÎÒ·¢ËÍÊý¾Ýй¶֪ͨ£¬È·ÈÏй¶²úÉúÔÚ2024Äê7ÔÂ14ÈÕ£¬ÇÒÍþвÐÐΪÕßÖ±ÖÁ7ÔÂ29ÈÕ²ÅÊ§È¥ÍøÂç½Ó¼ûȨÏÞ¡£Ð¹Â¶Êý¾ÝÖØÒªÔ̺¬ÐÕÃûºÍÉç»á°²È«ºÅÂ루SSN£©£¬ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇԺͽðÈÚڲƣ¬·çÏÕ³ÖÐø¶àÄꡣΪ½µµÍ·çÏÕ£¬OneBloodÌṩÁËÒ»ÄêÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ£¬²¢½¨ÒéÊÜÓ°ÏìÓ×ÎÒÉèÏàÐÅÓþ¶³½áºÍڲƾ¯±¨¡£Ö»¹ÜOneBloodÒÑÍÆ¹ã֪ͨʹÃü£¬µ«Áù¸öÔµÄÑÓ³¤ÈÔʹÊÜÓ°ÏìÕßÃæ¶Ô·çÏÕ¡£Ä¿Ç°£¬ÀÕË÷Èí¼þ¹¥»÷µÄ¾ßÌåÊÜÓ°ÏìÈËÊýÉÐδÅû¶¡£
https://www.bleepingcomputer.com/news/security/oneblood-confirms-personal-data-stolen-in-july-ransomware-attack/
2. ¶íµý±¨¹ØÁªºÚ¿Í×éÖ¯ÀûÓùþµ±¾ÖÎļþÍøÂç´¹µö¹¥»÷ÖÐÑǹÙÔ±
1ÔÂ13ÈÕ£¬Sekoia×êÑÐÈËÔ±½Òʾ£¬Ò»¸öÓë¶íÂÞ˹µý±¨²¿ÃÅÓйØÁªµÄºÚ¿Í×éÖ¯£¬ÀûÓÿ´ËƺϷ¨µÄ¹þÈø¿Ë˹̹µ±¾ÖÎļþ×÷ÎªÍøÂç´¹µöµö¶ü£¬³É¹¦Ï°È¾ºÍ¼à¶½ÁËÖÐÑǵ±¾Ö¹ÙÔ±¡£ÕâЩÎļþÔ̺¬¹þÈø¿Ë˹̹µ±¾ÖµÄ±í½»ÉêÃ÷¡¢Ðź¯µÈ²Ý¸å£¬ÇÒÄÚÈÝÓëÕæÊµÎļþ¸ß¶ÈÀàËÆ£¬ÄÚǶÓжñÒâÈí¼þ¡£¸ÃºÚ¿Í×éÖ¯±»Ö¸ÒÔΪAPT 28£¨Fancy Bear£©£¬ÓëĪ˹¿ÆÖÐÑëµý±¨¾Ö(GRU)ÓÐÁªÏµ¡£×Ô2024Äê7ÔÂÒÔÀ´£¬¸Ã×éÖ¯ÔÚÖÐÑÇ¡¢¶«ÑǺÍÅ·ÖÞµØÓòÒÑÓÕÆÊýÊ®ÃûÊܺ¦Õߣ¬Ê¹ÓÃHATVIBEºÍCHERRYSPYÁ½ÖÖ¶ñÒâÈí¼þ¡£ÕâЩÎĵµÔÚWordÖÐÖ´ÐжñÒâºêÎļþ£¬½µµÍÉ豸°²È«ÉèÖ㬱£Áô¶ñÒâÈí¼þ±äÁ¿²¢Æô¶¯°ÂÃØ·¨Ê½¡£Õâ´Î»î¶¯±»¶¨ÃûΪ¡°Ë«»÷¡±¡£¾Ý·ÖÎö£¬HATVIBEÓëZEBROCYºóÃż¼Êõ³Áµþ£¬¾ùÖ¸ÏòFancy Bear¡£Ö»¹ÜÉв»Ã÷ÏÔAPT 28ÈôºÎ»ñÈ¡ÕâЩ¹þÈø¿Ë˹̹µ±¾ÖÎļþ£¬µ«×êÑÐÈËÔ±´§Ä¦¿ÉÄÜͨ¹ýÔçÆÚÍøÂçÐж¯Ð¹Â¶¡¢¿ªÔ´ÍøÂç»òÎïÀíÐж¯»ñµÃ¡£¹þÈø¿Ë˹̹ÒòÔÚÎÚ¿ËÀ¼Õ½ÕùµÈÎÊÌâÉÏÍÑÀë¶íÂÞ˹ӰÏ죬ÒÔ¼°³ÉΪҵÎñ³ÁҪͬ°éºÍ½¨ÉèºËµçÕ¾µÄ¹ú¼Ê¾ºÕù£¬³ÉÎªÍøÂç¼äµý»î¶¯µÄÖØÒªÖ¸±ê¡£¶íÂÞ˹ּÔÚÈ·±£¹þÈø¿Ë˹̹ÕþÖÎÒ»Ö£¬µÖÏû¾ºÕùµÐÊÖÓ°Ï죬²¢¼áÈÍÆäÔڸõØÓòµÄ¾¼ÃºÍÕ½Êõְλ¡£
https://cyberscoop.com/fancy-bear-kazakhstan-russia-sekoia/
3. Aviatrix Controller¸ßΣ·ì϶ÖÂÔÆ²¿ÊðÊÜÍþв
1ÔÂ13ÈÕ£¬Aviatrix ControllerÖеÄÒ»¸ö¸ßÑϳÁÐÔ·ì϶£¨CVE-2024-50603£©±»Åû¶ºó£¬¶Ô¶à¸öÔÆ²¿Êð×é³ÉÁËÍþв¡£¸Ã·ì϶ÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©£¬²¢ÇÒÔÚAWSÖеÄĬÈϲ¿Êð´æÔÚȨÏÞÌáÉý·çÏÕ£¬Òò¶ø³ö¸ñΣÏÕ¡£·ì϶ÓÚ1ÔÂ7ÈÕÅû¶£¬ÒÑÓй«¿ªµÄ¸ÅÏëÑéÖ¤£¨PoC£©·ì϶¡£Aviatrix ControllerÓÃÓÚÔ®ÊÖÖÎÀíºÍ×Ô¶¯»¯AWS²¿Êð£¬Ö»¹ÜÖ»ÓÐÔ¼3%µÄAWS¿Í»§Ê¹ÓøòúÆ·£¬µ«ÔÚ65%µÄÔÆ»·¾³ÖУ¬Ëü²¿ÊðÔÚÐé¹¹»úÉÏ£¬´æÔÚºáÏòÒÆ¶¯õè¾¶£¬ÔÊÐí¹¥»÷Õß»ñµÃÖÎÀíԱȨÏÞ¡£×êÑÐÈËÔ±¹Û²ìµ½³É¹¦·ì϶µ¼Ö¶ñÒâÈí¼þ²¿Êð£¬ÈçSilverºóÃźͼÓÃܽٳ֡£·ÀÓùÕßÄܹ»Éý¼¶µ½7.2.4996°æ±¾ÒÔÔ¤·À¸Ã·ì϶£¬²¢×èֹͨ¹ý¶Ë¿Ú443µÄ¹«¿ª½Ó¼û¡£Aviatrix»¹ÌṩÁ˲¹¶¡£¬µ«Ö¸³öÔÚijЩÇé¿öÏ¿ÉÄܱØÒª³ÁÐÂÀûÓá£
https://www.theregister.com/2025/01/13/severe_aviatrix_controller_vulnerability/
4. ¡¶·ÅÖð֮·2¡·ÔâºÚ¿Í¹¥»÷£¬66¸öÍæ¼ÒÕÊ»§±»µÁ
1ÔÂ13ÈÕ£¬¡¶·ÅÖð֮·2¡·Ôâ·êÁËһ·ÑϳÁµÄºÚ¿Í¹¥»÷ÊÂÎñ£¬¹¥»÷Õßͨ¹ýµÁÈ¡µÄÒ»¸ö¾ÉSteamÕÊ»§£¬»ñµÃÁËÓë¸ÃÕÊ»§ÓйØÁªµÄÖÎÀíÔ¹ØÊ»§½Ó¼ûȨÏÞ¡£ÕâÒ»·ì϶ʹµÃÍþвÐÐΪÕß¿ÉÄܸü¸ÄÖÁÉÙ66¸öÍæ¼ÒÕÊ»§µÄÃÜÂ룬²¢½Ó¼ûÕâЩÕÊ»§£¬µ¼ÖºܶàÍæ¼ÒÃÔʧÁËÓÎÏ·ÄڲɰìµÄÎïÆ·£¬Ô̺¬¹ó³ÁÉ豸ºÍÆÆ·ÑÊý°ÙÓ×ʱ²Å»ñµÃµÄÎïÆ·¡£ÓÉÓÚÈÕÖ¾±£ÁôµÄ¹¦·òÏÞ¶È£¬¿ÉÄÜ»¹Óиü¶àÕÊ»§ÔÚÕâ´ÎÎ¥¹æÐÐΪÖÐÊÜË𣬵«¾ßÌåÁìÓòÒÑÎÞ·¨È·¶¨¡£ÓÎÏ·¿ª·¢ÉÌGrinding Gear GamesµÄÓÎÏ·×ܼà֤ʵÁËÕâ´Î¹¥»÷£¬²¢°µÊ¾ÕâÊÇͨ¹ýÒ»¸ö±»µÁµÄÖÎÀíÔ¹ØÊ»§½øÐеġ£Ëû»¹Ð¹Â©£¬ÓÎÏ·ºó¶Ë´æÔÚÃýÎóºÍ°²È«·ì϶£¬±¾Äܹ»×èÖ¹Õâ´Î¹¥»÷£¬µ«Òź¶µÄÊÇËûÃÇ¡°ÆëÈ«¸ãÔÒÁË¡±¡£Ö»¹Ü¿ª·¢ÉÌÒѾ²ÉÈ¡ÁËһЩ°²È«´ëÊ©£¬µ«¶ÔÓÚÄÇЩÊÜÓ°ÏìµÄÕÊ»§£¬ËûÃÇÉÐδ°ä·¢ÈκÎÅâ³¥´òË㣬²¢°µÊ¾ÎÞ·¨¸´Ô±»µÁÎïÆ·¡£Õâ´ÎÊÂÎñ¶ÔÍæ¼ÒÉçÇøÔì³ÉÁ˳Á´óÓ°Ï죬ºÜ¶àÍæ¼Ò¶ÔÓÎÏ·µÄ°²È«ÐÔ°µÊ¾ÓÇÓô¡£
https://www.bleepingcomputer.com/news/security/stolen-path-of-exile-2-admin-account-used-to-hack-player-accounts/
5. AWS S3´æ´¢Í°ÔâCodefingerÀÕË÷Èí¼þ¼ÓÃܹ¥»÷
1ÔÂ13ÈÕ£¬Ò»ÖÖеÄÀÕË÷Èí¼þ»î¶¯ÔÚÀûÓÃAWSµÄ·þÎñÆ÷¶Ë¼ÓÃܺͿͻ§ÌṩµÄÃÜÔ¿£¨SSE-C£©À´¼ÓÃÜAmazon S3´æ´¢Í°ÖеÄÊý¾Ý£¬²¢ÒªÇóÖ§¸¶Êê½ðÄÜÁ¦»ñµÃ½âÃÜÃÜÔ¿¡£ÕâÒ»»î¶¯ÓÉÃûΪ¡°Codefinger¡±µÄÍþвÐÐΪÕßÌáÒ飬²¢ÒÑÖÁÉÙ¶ÔÁ½ÃûÊܺ¦ÕßÖ´ÐÐÁ˹¥»÷¡£ÑÇÂíÑ·µ¥Ò»´æ´¢·þÎñ£¨S3£©ÊÇÒ»ÖÖ¿ÉÀ©´ó¡¢°²È«ÇҸ߿ìµÄ¶ÔÏó´æ´¢·þÎñ£¬¶øSSE-CÊÇÒ»ÖÖ¼ÓÃÜÑ¡ÏÔÊÐí¿Í»§Ê¹ÓÃ×Ô¼ºµÄ¼ÓÃÜÃÜԿͨ¹ýAES-256Ëã·¨¼ÓÃܺͽâÃÜÊý¾Ý¡£ÔÚCodefingerµÄ¹¥»÷ÖУ¬ÍþвÐÐΪÕßʹÓÃÊÜËðµÄAWSƾ֤¶¨Î»ÓµÓÐÌØ¶¨È¨ÏÞµÄÊܺ¦ÕßÃÜÔ¿£¬¶øºóÔÚ±¾µØÌìÉú¼ÓÃÜÃÜÔ¿À´¼ÓÃÜÖ¸±êÊý¾Ý¡£ÓÉÓÚAWS²»´æ´¢ÕâЩ¼ÓÃÜÃÜÔ¿£¬Òò¶øÊý¾Ý¸´Ô±äµÃ²»³ÉÄÜ£¬³ý·ÇµÃµ½¹¥»÷ÕߵĺÏ×÷¡£¹¥»÷Õß»¹ÉèÖÃÁËΪÆÚÆßÌìµÄÎļþɾ³ýÕ½Êõ£¬²¢ÔÚËùÓÐÊÜÓ°ÏìµÄĿ¼ÖиéÖÃÊê½ð֪ͨ£¬ÒªÇóÊܺ¦ÕßÔÚÖ¸¶¨µÄ±ÈÌØ±ÒµØÖ·ÉÏÖ§¸¶Êê½ð¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬ÑÇÂíÑ·½¨ÒéÖ´ÐÐÑϸñµÄ°²È«ºÍ̸£¬²¢¼¤ÀøAWS¿Í»§ÉèÖÃÏÞ¶ÈÐÔÕ½Êõ£¬Ô¤·ÀÔÚÆäS3´æ´¢Í°ÉÏʹÓÃSSE-C¡£Í¬Ê±£¬Ó¦½ûÓÃδʹÓõÄAWSÃÜÔ¿£¬Ê±Ê±ÂÖ»»»î¶¯ÃÜÔ¿£¬²¢½«ÕÊ»§È¨ÏÞά³ÖÔÚËùÐèµÄ×îµÍ¼¶±ð¡£
https://www.bleepingcomputer.com/news/security/ransomware-abuses-amazon-aws-feature-to-encrypt-s3-buckets/
6. °£Òò»ôÎÂÀí¹¤´óѧÔâÍøÂç¹¥»÷£¬´¹Î£¹Ø¹ØÍøÂ粢ȡµÞ½ÌÓý»î¶¯
1ÔÂ13ÈÕ£¬°£Òò»ôÎÂÀí¹¤´óѧÔÚÖÜÁùÍíÉÏ9µã×óÓÒ¼ì²âµ½ÍøÂç¹¥»÷ºó£¬Ñ¸¿ì²ÉÈ¡Á˹عØÍøÂçµÄ´ëÊ©ÒÔÔ¤·À¸üÑϳÁµÄºó¹û¡£Ö»¹Ü´Ë¾Ùµ¼ÖÂÒÀÀµ´óÑ§ÍøÂçµÄÉèÊ©£¨Èçµç×ÓÓʼþ¡¢WiFiºÍʳÌÃÊÕÒø»ú£©ÎÞ·¨Ê¹Ó㬵«Ñ§ÉúºÍÔ±¹¤ÈÔÄܹ»½øÈëУ԰¡£´óѧÔÚÖÜÈÕ°ä·¢ÉêÃ÷³Æ£¬ÓÉÓÚѧÉúÔڳﱸ¿¼ÊÔ£¬Ô¤¼ÆÕâ´ÎÍøÂç¹¥»÷¶Ô½²ÊÚ¹¦·òµÄÓ°Ï콫ÓÐÏÞ£¬Í¬Ê±Ç¿µ÷ÆäITÈËÔ¹ØýÔÚÈ«Á¦µ÷²éÕâ´Î¹¥»÷£¬²¢Ö¸³öĿǰÉÐÎÞ¼£ÏóÅú×¢Êý¾Ý±»µÁ¡£¸±Ð£³¤ÅÁÌØÀï¿Ë¡¤¸ñÂ³ÌØºú˹°µÊ¾£¬ËûÃÇÒâʶµ½¹Ø¹ØÍøÂç»á´øÀ´ÑϳÁºó¹û£¬µ«ÕâÊÇΪÁËÔ¤·À¸üÔã¸âµÄÁ˾ֲúÉú£¬²¢µ«Ô¸µÃµ½¸÷È˵ÄÀí½â¡£Ö»¹ÜÕâ´Î¹¥»÷µÄ¾ßÌåÐÔÖÊÉÐδÅû¶£¬µ«Å·Ö޺ܶàÀí¹¤´óѧ½üÄêÀ´¶¼Êܵ½ÁËÀÕË÷Èí¼þ×éÖ¯µÄÓ°Ïì¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Ö»¹Ü°£Òò»ôÎÂÀí¹¤´óѧÓëºÜ¶àÆóҵά³Ö×ÅÁªÏµ£¬µ«Ä¿Ç°Ã»Óм£ÏóÅú×¢ÕâЩÆóÒµ¿ÉÄÜÊܵ½Ó°Ïì¡£
https://therecord.media/tu-eindhoven-cyberattack-lectures-canceled


¾©¹«Íø°²±¸11010802024551ºÅ