ÃÀ¹úÊ·ÉÏ×î´óÒ½ÁÆÊý¾Ýй¶ÊÂÎñ£ºChange HealthcareÔâÀÕË÷Èí¼þ¹¥»÷
°ä²¼¹¦·ò 2025-02-061. ÃÀ¹úÊ·ÉÏ×î´óÒ½ÁÆÊý¾Ýй¶ÊÂÎñ£ºChange HealthcareÔâÀÕË÷Èí¼þ¹¥»÷
1ÔÂ25ÈÕ£¬½áºÏ½¡È«¼¯ÍÅ×Ó¹«Ë¾Change HealthcareÔÚ2024Äê2ÔÂÔâ·êÁËÀÕË÷Èí¼þ×éÖ¯ALPHV£¨±ðÃûBlack Cat£©µÄ¹¥»÷£¬µ¼ÖÂÔ¼1.9ÒÚÃÀ¹úÈ˵ÄÃô¸ÐÒ½ÁÆÊý¾Ýй¶£¬³ÉΪÃÀ¹úº¹ÇàÉÏ×î´óµÄÒ½ÁÆÊý¾Ýй¶ÊÂÎñ¡£Õâ´Î¹¥»÷ÀûÓÃÁ˲»×ã¶à³É·ÖÉí·ÝÑéÖ¤µÄÊÜϰȾÕÊ»§ºÍCitrixÔ¶³Ì½Ó¼ûÈí¼þÉϵÄÊÜϰȾʹ´¦£¬Ôì³ÉÁË8.72ÒÚÃÀÔªµÄ²ÆÕþËðʧºÍ6TBµÄÊý¾Ýй¶¡£Ö»¹ÜºÚ¿Í½üÒ»ÄêÀ´Ò»ÏòÔÚ½Ó¼û±»µÁÊý¾Ý£¬µ«UnitedHealthÐû³ÆÃ»ÓÐÖ¤¾ÝÅú×¢Êý¾Ý±»ÀÄÓá£È»¶ø£¬Õâ´ÎÈëÇÖ¶³öÁËÔ̺¬½¡È«±£ÏÕ¾ßÌåÐÅÏ¢¡¢»¼ÕßÕï¶Ï¡¢²âÊÔÁ˾ֺÍÒ½ÖÎÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÒ½ÁƼͼ£¬ÒÔ¼°Ó×ÎÒÐÕÃû¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢Éç»á°²È«ºÅÂë¡¢¼ÝÕÕºÅÂëµÈÃô¸ÐÊý¾Ý¡£¹¥»÷²úÉúºó£¬¸Ã¹«Ë¾Ö§¸¶ÁË2200ÍòÃÀÔªµÄÊê½ð£¬µ«BlackCatºýŪÁËÖ´ÐÐÕâ´Î¹¥»÷µÄ¹ØÁª¹«Ë¾²¢ÆÈ¡ÁËÊê½ð£¬µ¼Ö±»µÁÊý¾ÝÂäÈëÍøÂç·¸×ï·Ö×ÓÊÖÖС£Õâ´ÎйÃÜÊÂÎñ²»½öÖ±½ÓÇÔÈ¡Êý¾Ý£¬»¹ÇÖÈÅÁËÈ«¹úµÄÒ½ÁÆ·þÎñ£¬¸øÔËÓª´øÀ´Á˳Á´óÌôÕ½£¬Òý·¢ÁËÈËÃǶԻ¼ÕßÒþÖÔºÍÊý¾Ý°²È«µÄÓÇÓô¡£ÎªÁË×ñÊØHIPAA£¬½áºÏ½¡È«¼¯ÍÅÒÑÏòÊÜÓ°Ïì×îÑϳÁµÄÓ×ÎÒ´«µÝÁËÕâ´Î¹¥»÷ÊÂÎñ¡£
https://hackread.com/unitedhealth-groups-data-breach-impacts-americans/
2. TalkTalkÊý¾Ýй¶ÊÂÎñ£ºÍþвÕßÐû³ÆÇÔÈ¡1880ÍòÓû§Êý¾Ý
1ÔÂ27ÈÕ£¬Ó¢¹úµçÐŹ«Ë¾TalkTalkÔâ·êÁËһ·Êý¾Ýй¶ÊÂÎñ£¬Ò»Ãû×Ô³ÆÎª¡°b0nd¡±µÄÍþвÐÐΪÕßÔÚÍøÂç·¸×ïÂÛ̳Éϰ䷢¶ÔÕâ´ÎºÚ¿Í¹¥»÷ÕÆ¹Ü£¬²¢Ðû³ÆÇÔÈ¡Á˳¬¹ý1880ÍòTalkTalkÓû§µÄÊý¾Ý£¬Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢IPµØÖ·¡¢µç»°ºÅÂëºÍPINµÈÃô¸ÐÐÅÏ¢¡£È»¶ø£¬TalkTalk¹«Ë¾½²»°È˰µÊ¾Õâһ˵·¨¡°ÆëÈ«²»ÕýÈ·ÇÒÑϳÁ¿ä´ó¡±£¬²¢Ö¸³öÕâ´ÎÐ¹Â¶Éæ¼°µÚÈý·½Æ½Ì¨¡£¾Ýй©£¬¸ÃÊÂÎñÔ´ÓÚÒ»¸öµÚÈý·½¹©¸øÉ̵Äϵͳ±»Òâ±í½Ó¼ûºÍÀÄÓã¬TalkTalkÕýÓ빩¸øÉ̺Ï×÷½â¾ö¸ÃÎÊÌ⣬µ«²¢Î´Ð¹Â©¹©¸øÉÌÃû³Æ¡£¾Ý³Æ£¬Ð¹Â¶µÄÊý¾ÝÊÇ´ÓµçÐÅÌṩÉÌʹÓõÄAscendon SaaSƽ̨ÇÔÈ¡µÄ£¬¶ø¸Ãƽ̨ÌṩÉÌCSGÈÏ¿ÉÊý¾ÝÊÇ´ÓÆäÆ½Ì¨ÉÏÇÔÈ¡µÄ£¬µ«°µÊ¾Ö»ÓÐÒ»Ãû¿Í»§Êܵ½Ó°Ï죬ÇÒûÓÐÖ¤¾ÝÅú×¢Æä¼¼ÊõºÍϵͳÊܵ½ÁËÇÖº¦¡£Õâ²¢·ÇTalkTalk³õ´ÎÔâ·êÊý¾Ýй¶ÊÂÎñ£¬2015Äê¸Ã¹«Ë¾·þÎñÆ÷Ò²ÔøÔâ·êÍøÂç¹¥»÷£¬Ó°ÏìÁË400ÍòÓû§¡£
https://securityaffairs.com/173526/cyber-crime/talktalk-confirms-data-breach.html
3. ʷŮʿ¼¯ÍÅÔâδ֪¹¥»÷ÕßÈëÇÖ£¬Åû¶°²È«·ì϶
1ÔÂ28ÈÕ£¬×ܲ¿Î»ÓÚÂ׶صĿç¹ú¹¤³Ì¾ÞͷʷŮʿ¼¯ÍÅ£¨Smiths Group£©½üÆÚÔâ·êÁËδ֪¹¥»÷ÕßµÄϵͳÈëÇÖ£¬µ¼Ö°²È«·ì϶±»Åû¶¡£×÷Ϊһ¼ÒÔÚÂ×¶ØÖ¤È¯ÂòÂôËùÉÏÊеÄÓ¢¹ú¹«Ë¾£¬Ê·Å®Ê¿¼¯ÍÅÔÚ50¶à¸ö¹ú¶ÈÕ¼Óг¬¹ý15,000ÃûÔ±¹¤£¬È¥ÄêÓªÊոߴï31.32ÒÚÓ¢°÷£¬ÖØÒª·þÎñÓÚÄÜÔ´¡¢°²È«¡¢°²±£¡¢º½¿Õº½ÌìºÍ¹ú·ÀÊг¡¡£ÔÚÖܶþÌá½»¸øÂ×¶ØÖ¤È¯ÂòÂôËùµÄÎļþÖУ¬Ê·Å®Ê¿¼¯ÍÅй©ÔÚµ÷²éÒ»Â·Éæ¼°¡°Î´¾ÊÚȨ½Ó¼û¹«Ë¾ÏµÍ³¡±µÄÍøÂ簲ȫÊÂÎñ£¬²¢µ±¼´¸ôÀëÁËÊÜÓ°ÏìµÄϵͳ£¬Æô¶¯ÁËÒµÎñÂ½ÐøÐÔ´òË㡣Ŀǰ£¬¸Ã¹«Ë¾ÕýÓëÍøÂ簲ȫר¼ÒºÏ×÷£¬ÖÂÁ¦¸´Ôϵͳ²¢ÆÀ¹À¶ÔÒµÎñµÄ¿í·ºÓ°Ï죬ͬʱ³Ô¼µ½«²ÉÈ¡ËùÓбØÒª´ëÊ©×ñÊØÓйؼà¹ÜÒªÇ󣬲¢ÔÚ»ñµÃ¸ü¶àÐÅϢʱÌṩ¸üС£È»¶ø£¬Ê·Å®Ê¿¼¯ÍÅÉÐδй©ÈëÇֵľßÌ幦·òºÍÊÇ·ñÓÐÒµÎñ»ò¿Í»§Êý¾Ý±»µÁ¡£
https://www.bleepingcomputer.com/news/security/engineering-giant-smiths-group-discloses-security-breach/
4. ËþËþ¿Æ¼¼ÔâÀÕË÷Èí¼þ¹¥»÷£¬²¿ÃÅIT·þÎñ¶ÌÔÝÖжÏ
1ÔÂ31ÈÕ£¬ËþËþ¿Æ¼¼ÓÐÏÞ¹«Ë¾£¨Tata Technologies Ltd.£©£¬×÷ΪËþËþÆû³µµÄ×Ó¹«Ë¾£¬ÊÇÒ»¼ÒרһÓÚÆû³µÉè¼Æ¡¢º½¿Õº½Ì칤³Ì¼°×ÛºÏÑз¢¹¤³ÌµÄÓ¡¶ÈÉÏÊпç¹ú¿Æ¼¼¹«Ë¾¡£½üÈÕ£¬¸Ã¹«Ë¾Ôâ·êÁËÀÕË÷Èí¼þ¹¥»÷£¬µ¼Ö²¿ÃÅIT·þÎñ²»µÃ²»ÔÝÍ£¡£Ö»¹ÜËþËþ¿Æ¼¼Ñ¸¿ì²ÉÈ¡Ðж¯²¢°ä·¢IT×ʲúÒѸ´Ô£¬µ«Õâ´Î¹¥»÷µÄ¾ßÌåϸ½ÚºÍÓ°ÏìÈÔÔÚµ÷²éÖС£ÖµÍ×ÌùÐĵÄÊÇ£¬¿Í»§½»¸¶·þÎñÔÚÍøÂç¹¥»÷ÆÚ¼äά³ÖÈ«ÃæÔËÐУ¬Î´¶Ô¿Í»§ÔËÓªÔì³ÉÓ°Ï졣ĿǰÉв»Ã÷ÏÔ¹¥»÷ÕßÊÇ·ñ³É¹¦ÇÔÈ¡Á˸ù«Ë¾µÄÈκÎÊý¾Ý£¬µ«ÀÕË÷Èí¼þ¹¥»÷ͨ³£Éæ¼°Êý¾Ý͵ÇÔ£¬¶Ô¿Æ¼¼¹«Ë¾¶øÑÔ£¬´ËÀàÊÂÎñ¿ÉÄܵ¼Ö¹«Ë¾»úÃÜÊý¾Ýй¶£¬ÇÖº¦ÖªÊ¶²úȨºÍ¼¼Êõ×éºÏ¡£´Ëǰ£¬HiveÀÕË÷Èí¼þ×éÖ¯Ôø¶ÔÓ¡¶È×î´óµÄ×ۺϵçÁ¦¹«Ë¾ËþËþµçÁ¦·¢Æð¹¥»÷£¬ÇÔÈ¡²¢Ð¹Â¶ÁËÔ̺¬¹¤³ÌʾÒâͼ¡¢²ÆÕþ¼Í¼ºÍÓ×ÎÒ¿Í»§ÐÅÏ¢ÔÚÄÚµÄÃô¸ÐÊý¾Ý¡£Õâ´ÎËþËþ¿Æ¼¼Ôâ·êµÄ¹¥»÷ÔÙ´ÎÌáÐÑÆóÒµÐè¼ÓÇ¿ÍøÂ簲ȫ·À»¤¡£
https://www.bleepingcomputer.com/news/security/indian-tech-giant-tata-technologies-hit-by-ransomware-attack/
5. GrubHubÔâÊý¾Ýй¶£¬¹¥»÷ÕßÀûÓõÚÈý·½ÕË»§ÈëÇÖϵͳ
2ÔÂ4ÈÕ£¬Ê³Æ·ÅäË͹«Ë¾GrubHubÔâ·êÁËÒ»´ÎÊý¾Ýй¶ÊÂÎñ£¬¹¥»÷Õßͨ¹ýµÚÈý·½·þÎñÌṩÉ̵ÄÕË»§ÈëÇÖÁËGrubHubϵͳ£¬Ó°ÏìÁ˿ͻ§¡¢É̼ҺÍ˾»úµÄÓ×ÎÒÐÅÏ¢£¬µ«¾ßÌåÊÜÓ°ÏìÊýÁ¿Î´¹«¿ª¡£GrubHubѸ¿ì²ÉÈ¡Ðж¯£¬ÖÕÖ¹ÁËÈëÇÖÕË»§µÄ½Ó¼ûȨÏÞ£¬²¢É¾³ýÁ˸÷þÎñÌṩÉÌ£¬Í¬Ê±ÀñƸ±í²¿×¨¼ÒÆÀ¹ÀÓ°Ïì¡¢ÂÖ»»ÃÜÂë²¢¼ÓÇ¿ÁËÄÚ²¿·þÎñµÄÒì³£¼ì²â¡£µ÷²éÏÔʾ£¬¹¥»÷Õßδ»ñÈ¡Ãô¸ÐµÄÓ×ÎҺͲÆÕþÐÅÏ¢£¬µ«¿ÉÄÜ»ñÈ¡Á˲¿ÃÅУ԰ʳÌÃÓû§µÄÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¼°²¿ÃÅÖ§¸¶¿¨ÐÅÏ¢£¨Ô̺¬¿¨ÀàÐͺÍ×îºóËÄλ¿¨ºÅ£©¡£´Ë±í£¬¹¥»÷Õß»¹½Ó¼ûÁËijЩÒÅÁôϵͳµÄÉ¢ÁÐÃÜÂ룬GrubHubÒÑ×Ô¶¯ÂÖ»»¿ÉÄÜ´æÔÚ·çÏÕµÄÃÜÂ룬²¢¶½´Ù¿Í»§Ê¹ÓùÖÒìÃÜÂëÒÔ½µµÍ·çÏÕ¡£GrubHubÔÚÈ«¹ú4000¶à¸ö³ÇÊÐÕ¼Óг¬¹ý375000¼ÒÉ̼ҺÍ200000ÃûÅäËͺÏ×÷ͬ°é£¬È¥ÄêÒò¶àÏîÎ¥·¨ÐÐΪ֧¸¶ÁË2500ÍòÃÀÔªºÍ½â½ð¡£
https://www.bleepingcomputer.com/news/security/grubhub-data-breach-impacts-customers-drivers-and-merchants/
6. CISA ½«Ëĸö±»»ý¼«ÀûÓõķì϶Ôö³¤µ½ KEV Ŀ¼ÖÐ
2ÔÂ5ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Öܶþ°ä²¼ÁËÒ»Ïî³ÁÒª°²È«²¼¸æ£¬ÏòÆäÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ÖÐÐÂÔöÁËËĸö°²È«·ì϶£¬²¢ÖÒ¸æÕâЩ·ì϶Õý±»»ý¼«ÀûÓá£ÕâЩ·ì϶Ô̺¬£ºCVE-2024-45195£¬Ò»¸öApache OFBizÖеÄÇ¿Ôìä¯ÀÀ·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß»ñȡδÊÚȨ½Ó¼ûȨÏÞ²¢Ö´ÐÐËÁÒâ´úÂ루Òѽ¨¸´£©£»CVE-2024-29059£¬Microsoft .NET FrameworkÖеÄÐÅϢй¶·ì϶£¬¿ÉÄܶ³öÃô¸ÐÐÅÏ¢²¢µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¨Òѽ¨¸´£©£»CVE-2018-9276£¬Paessler PRTGÍøÂç¼à¶½Æ÷ÖеIJÙ×÷ϵͳºÅÁî×¢Èë·ì϶£¬ÔÊÐíÖÎÀíȨÏ޵Ĺ¥»÷ÕßÖ´ÐкÅÁÒѽ¨¸´£©£»ÒÔ¼°CVE-2018-19410£¬Í¬ÑùÊÇPaessler PRTGÖеı¾µØÎļþÔ̺¬·ì϶£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õß´´½¨ÓµÓжÁдȨÏÞµÄÓû§£¨Òѽ¨¸´£©¡£Ö»¹ÜÕâЩ·ì϶ÒÑÓɸ÷×Ô¹©¸øÉ̽¨¸´£¬µ«Ä¿Ç°ÉÐÎÞ¹ØÓÚËüÃÇÈôºÎÔÚÕæÊµ¹¥»÷Öб»ÀûÓõľßÌ幫¿ª»ã±¨¡£Îª´Ë£¬Áª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©ÏÂÊô»ú¹¹±»´¹Î£¶½´ÙÔÚ2025Äê2ÔÂ25ÈÕǰÀûÓñØÒªµÄ½¨¸´´ëÊ©£¬ÒÔÓÐЧ·À±¸ÕâЩ×Ô¶¯Íþв£¬È·±£ÍøÂ簲ȫ¡£
https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html


¾©¹«Íø°²±¸11010802024551ºÅ