OneBloodÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬Ï×ѪÕßСÎÒÐÅϢй¶
°ä²¼¹¦·ò 2025-01-151. OneBloodÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬Ï×ѪÕßСÎÒÐÅϢй¶
1ÔÂ13ÈÕ£¬£¬£¬·ÇÓ¯ÀûÏ×Ѫ»ú¹¹OneBlood֤ʵ£¬£¬£¬2024ÄêÏÄÌìÔâ·êÁËÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬µ¼ÖÂÏ×ѪÕßµÄСÎÒÐÅÏ¢±»ÇÔÈ¡¡£¸Ã»ú¹¹ÓÚ2024Äê7ÔÂ31ÈÕ³õ´Î¹«¿ªÁËÕâÒ»ÊÂÎñ£¬£¬£¬Ö¸³ö¹¥»÷Õß¼ÓÃÜÁËÆäÐé¹¹»ú£¬£¬£¬ÆÈʹÆäѡȡÊÖ¶¯Á÷³Ì£¬£¬£¬½ø¶øÓ°ÏìÁËѪҺ²É¼¯¡¢¡¢¡¢¼ì²âºÍ·ÖÅ䣬£¬£¬µ¼Ö²¿ÃÅÕïËù³öÏÖÑÏÖØÑªÒºÇ·È±¡£OneBloodËæ¼´·¢³ö´¹Î£ºôÓõ£¬£¬£¬ÒªÇó¾èÏ×OÐÍѪ¡¢¡¢¡¢OÐÍѪÒõÐÔѪºÍѪС°å¡£ÉÏÖÜ£¬£¬£¬OneBloodÆðÍ·ÏòÊÜÓ°ÏìСÎÒ·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬È·ÈÏй¶²úÉúÔÚ2024Äê7ÔÂ14ÈÕ£¬£¬£¬ÇÒÍþвÐÐΪÕßÖ±ÖÁ7ÔÂ29ÈÕ²ÅÊ§È¥ÍøÂç½Ó¼ûȨÏÞ¡£Ð¹Â¶Êý¾ÝÖØÒªÔ̺¬ÐÕÃûºÍÉç»á°²È«ºÅÂ루SSN£©£¬£¬£¬ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇԺͽðÈÚڲƣ¬£¬£¬·çÏÕ³ÖÐø¶àÄꡣΪ½µµÍ·çÏÕ£¬£¬£¬OneBloodÌṩÁËÒ»ÄêÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ£¬£¬£¬²¢½¨ÒéÊÜÓ°ÏìСÎÒÉèÏàÐÅÓþ¶³½áºÍڲƾ¯±¨¡£Ö»¹ÜOneBloodÒÑÍÆ¹ã֪ͨʹÃü£¬£¬£¬µ«Áù¸öÔµÄÑÓ³¤ÈÔʹÊÜÓ°ÏìÕßÃæ¶Ô·çÏÕ¡£Ä¿Ç°£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷µÄ¾ßÌåÊÜÓ°ÏìÈËÊýÉÐδÅû¶¡£
https://www.bleepingcomputer.com/news/security/oneblood-confirms-personal-data-stolen-in-july-ransomware-attack/
2. ¶íµý±¨¹ØÁªºÚ¿Í×éÖ¯ÀûÓùþµ±¾ÖÎļþÍøÂç´¹µö¹¥»÷ÖÐÑǹÙÔ±
1ÔÂ13ÈÕ£¬£¬£¬Sekoia×êÑÐÈËÔ±½Òʾ£¬£¬£¬Ò»¸öÓë¶íÂÞ˹µý±¨²¿ÃÅÓйØÁªµÄºÚ¿Í×éÖ¯£¬£¬£¬ÀûÓÿ´ËƺϷ¨µÄ¹þÈø¿Ë˹̹µ±¾ÖÎļþ×÷ÎªÍøÂç´¹µöµö¶ü£¬£¬£¬³É¹¦Ï°È¾ºÍ¼à¶½ÁËÖÐÑǵ±¾Ö¹ÙÔ±¡£ÕâЩÎļþÔ̺¬¹þÈø¿Ë˹̹µ±¾ÖµÄÍâ½»ÉêÃ÷¡¢¡¢¡¢Ðź¯µÈ²Ý¸å£¬£¬£¬ÇÒÄÚÈÝÓëÕæÊµÎļþ¸ß¶ÈÀàËÆ£¬£¬£¬ÄÚǶÓжñÒâÈí¼þ¡£¸ÃºÚ¿Í×éÖ¯±»Ö¸ÒÔΪAPT 28£¨Fancy Bear£©£¬£¬£¬ÓëĪ˹¿ÆÖÐÑëµý±¨¾Ö(GRU)ÓÐÁªÏµ¡£×Ô2024Äê7ÔÂÒÔÀ´£¬£¬£¬¸Ã×éÖ¯ÔÚÖÐÑÇ¡¢¡¢¡¢¶«ÑǺÍÅ·ÖÞµØÓòÒÑÓÕÆÊýÊ®ÃûÊܺ¦Õߣ¬£¬£¬Ê¹ÓÃHATVIBEºÍCHERRYSPYÁ½ÖÖ¶ñÒâÈí¼þ¡£ÕâЩÎĵµÔÚWordÖÐÖ´ÐжñÒâºêÎļþ£¬£¬£¬½µµÍÉ豸°²È«ÉèÖ㬣¬£¬±£Áô¶ñÒâÈí¼þ±äÁ¿²¢Æô¶¯°ÂÃØ·¨Ê½¡£Õâ´Î»î¶¯±»¶¨ÃûΪ¡°Ë«»÷¡±¡£¾Ý·ÖÎö£¬£¬£¬HATVIBEÓëZEBROCYºóÃż¼ÊõÖØµþ£¬£¬£¬¾ùÖ¸ÏòFancy Bear¡£Ö»¹ÜÉв»Ã÷ÏÔAPT 28ÈôºÎ»ñÈ¡ÕâЩ¹þÈø¿Ë˹̹µ±¾ÖÎļþ£¬£¬£¬µ«×êÑÐÈËÔ±´§Ä¦¿ÉÄÜͨ¹ýÔçÆÚÍøÂçÐж¯Ð¹Â¶¡¢¡¢¡¢¿ªÔ´ÍøÂç»òÎïÀíÐж¯»ñµÃ¡£¹þÈø¿Ë˹̹ÒòÔÚÎÚ¿ËÀ¼Õ½ÕùµÈÎÊÌâÉÏÍÑÀë¶íÂÞ˹ӰÏ죬£¬£¬ÒÔ¼°³ÉΪҵÎñÖØÒªÍ¬°éºÍ½¨ÉèºËµçÕ¾µÄ¹ú¼Ê¾ºÕù£¬£¬£¬³ÉÎªÍøÂç¼äµý»î¶¯µÄÖØÒªÖ¸±ê¡£¶íÂÞ˹ּÔÚÈ·±£¹þÈø¿Ë˹̹ÕþÖÎÒ»Ö£¬£¬£¬µÖÏû¾ºÕùµÐÊÖÓ°Ï죬£¬£¬²¢¼áÈÍÆäÔڸõØÓòµÄ¾¼ÃºÍÕ½Êõְλ¡£
https://cyberscoop.com/fancy-bear-kazakhstan-russia-sekoia/
3. Aviatrix Controller¸ßΣ·ì϶ÖÂÔÆ²¿ÊðÊÜÍþв
1ÔÂ13ÈÕ£¬£¬£¬Aviatrix ControllerÖеÄÒ»¸ö¸ßÑÏÖØÐÔ·ì϶£¨CVE-2024-50603£©±»Åû¶ºó£¬£¬£¬¶Ô¶à¸öÔÆ²¿Êð×é³ÉÁËÍþв¡£¸Ã·ì϶ÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©£¬£¬£¬²¢ÇÒÔÚAWSÖеÄĬÈϲ¿Êð´æÔÚȨÏÞÌáÉý·çÏÕ£¬£¬£¬Òò¶ø³ö¸ñΣÏÕ¡£·ì϶ÓÚ1ÔÂ7ÈÕÅû¶£¬£¬£¬ÒÑÓй«¿ªµÄ¸ÅÄîÑéÖ¤£¨PoC£©·ì϶¡£Aviatrix ControllerÓÃÓÚÔ®ÊÖÖÎÀíºÍ×Ô¶¯»¯AWS²¿Ê𣬣¬£¬Ö»¹ÜÖ»ÓÐÔ¼3%µÄAWS¿Í»§Ê¹ÓøòúÆ·£¬£¬£¬µ«ÔÚ65%µÄÔÆ»·¾³ÖУ¬£¬£¬Ëü²¿ÊðÔÚÐé¹¹»úÉÏ£¬£¬£¬´æÔÚºáÏòÒÆ¶¯õè¾¶£¬£¬£¬ÔÊÐí¹¥»÷Õß»ñµÃÖÎÀíԱȨÏÞ¡£×êÑÐÈËÔ±¹Û²ìµ½³É¹¦·ì϶µ¼Ö¶ñÒâÈí¼þ²¿Ê𣬣¬£¬ÈçSilverºóÃźͼÓÃܽٳ֡£·ÀÓùÕßÄܹ»Éý¼¶µ½7.2.4996°æ±¾ÒÔÔ¤·À¸Ã·ì϶£¬£¬£¬²¢×èֹͨ¹ý¶Ë¿Ú443µÄ¹«¿ª½Ó¼û¡£Aviatrix»¹ÌṩÁ˲¹¶¡£¬£¬£¬µ«Ö¸³öÔÚijЩÇé¿öÏ¿ÉÄܱØÒªÖØÐÂÀûÓá£
https://www.theregister.com/2025/01/13/severe_aviatrix_controller_vulnerability/
4. ¡¶·ÅÖð֮·2¡·ÔâºÚ¿Í¹¥»÷£¬£¬£¬66¸öÍæ¼ÒÕÊ»§±»µÁ
1ÔÂ13ÈÕ£¬£¬£¬¡¶·ÅÖð֮·2¡·Ôâ·êÁËһ·ÑÏÖØµÄºÚ¿Í¹¥»÷ÊÂÎñ£¬£¬£¬¹¥»÷Õßͨ¹ýµÁÈ¡µÄÒ»¸ö¾ÉSteamÕÊ»§£¬£¬£¬»ñµÃÁËÓë¸ÃÕÊ»§ÓйØÁªµÄÖÎÀíÔ±ÕÊ»§½Ó¼ûȨÏÞ¡£ÕâÒ»·ì϶ʹµÃÍþвÐÐΪÕß¿ÉÄܸü¸ÄÖÁÉÙ66¸öÍæ¼ÒÕÊ»§µÄÃÜÂ룬£¬£¬²¢½Ó¼ûÕâЩÕÊ»§£¬£¬£¬µ¼ÖºܶàÍæ¼ÒÃÔʧÁËÓÎÏ·ÄڲɰìµÄÎïÆ·£¬£¬£¬Ô̺¬¹óÖØÉ豸ºÍÆÆ·ÑÊý°ÙСʱ²Å»ñµÃµÄÎïÆ·¡£ÓÉÓÚÈÕÖ¾±£ÁôµÄ¹¦·òÏÞ¶È£¬£¬£¬¿ÉÄÜ»¹Óиü¶àÕÊ»§ÔÚÕâ´ÎÎ¥¹æÐÐΪÖÐÊÜË𣬣¬£¬µ«¾ßÌåÁìÓòÒÑÎÞ·¨È·¶¨¡£ÓÎÏ·¿ª·¢ÉÌGrinding Gear GamesµÄÓÎÏ·×ܼà֤ʵÁËÕâ´Î¹¥»÷£¬£¬£¬²¢°µÊ¾ÕâÊÇͨ¹ýÒ»¸ö±»µÁµÄÖÎÀíÔ±ÕÊ»§½øÐеġ£Ëû»¹Ð¹Â©£¬£¬£¬ÓÎÏ·ºó¶Ë´æÔÚÃýÎóºÍ°²È«·ì϶£¬£¬£¬±¾Äܹ»×èÖ¹Õâ´Î¹¥»÷£¬£¬£¬µ«Òź¶µÄÊÇËûÃÇ¡°ÆëÈ«¸ãÔÒÁË¡±¡£Ö»¹Ü¿ª·¢ÉÌÒѾ²ÉÈ¡ÁËһЩ°²È«´ëÊ©£¬£¬£¬µ«¶ÔÓÚÄÇЩÊÜÓ°ÏìµÄÕÊ»§£¬£¬£¬ËûÃÇÉÐδ°ä·¢ÈκÎÅâ³¥´òË㣬£¬£¬²¢°µÊ¾ÎÞ·¨¸´Ô±»µÁÎïÆ·¡£Õâ´ÎÊÂÎñ¶ÔÍæ¼ÒÉçÇøÔì³ÉÁËÖØ´óÓ°Ï죬£¬£¬ºÜ¶àÍæ¼Ò¶ÔÓÎÏ·µÄ°²È«ÐÔ°µÊ¾ÓÇÓô¡£
https://www.bleepingcomputer.com/news/security/stolen-path-of-exile-2-admin-account-used-to-hack-player-accounts/
5. AWS S3´æ´¢Í°ÔâCodefingerÀÕË÷Èí¼þ¼ÓÃܹ¥»÷
1ÔÂ13ÈÕ£¬£¬£¬Ò»ÖÖеÄÀÕË÷Èí¼þ»î¶¯ÕýÔÚÀûÓÃAWSµÄ·þÎñÆ÷¶Ë¼ÓÃܺͿͻ§ÌṩµÄÃÜÔ¿£¨SSE-C£©À´¼ÓÃÜAmazon S3´æ´¢Í°ÖеÄÊý¾Ý£¬£¬£¬²¢ÒªÇóÖ§¸¶Êê½ðÄÜÁ¦»ñµÃ½âÃÜÃÜÔ¿¡£ÕâÒ»»î¶¯ÓÉÃûΪ¡°Codefinger¡±µÄÍþвÐÐΪÕßÌáÒ飬£¬£¬²¢ÒÑÖÁÉÙ¶ÔÁ½ÃûÊܺ¦ÕßÖ´ÐÐÁ˹¥»÷¡£ÑÇÂíÑ·µ¥Ò»´æ´¢·þÎñ£¨S3£©ÊÇÒ»ÖÖ¿ÉÀ©´ó¡¢¡¢¡¢°²È«ÇÒ¸ßËٵĶÔÏó´æ´¢·þÎñ£¬£¬£¬¶øSSE-CÊÇÒ»ÖÖ¼ÓÃÜÑ¡Ï£¬£¬ÔÊÐí¿Í»§Ê¹ÓÃ×Ô¼ºµÄ¼ÓÃÜÃÜԿͨ¹ýAES-256Ëã·¨¼ÓÃܺͽâÃÜÊý¾Ý¡£ÔÚCodefingerµÄ¹¥»÷ÖУ¬£¬£¬ÍþвÐÐΪÕßʹÓÃÊÜËðµÄAWSƾ֤¶¨Î»ÓµÓÐÌØ¶¨È¨ÏÞµÄÊܺ¦ÕßÃÜÔ¿£¬£¬£¬¶øºóÔÚ±¾µØÌìÉú¼ÓÃÜÃÜÔ¿À´¼ÓÃÜÖ¸±êÊý¾Ý¡£ÓÉÓÚAWS²»´æ´¢ÕâЩ¼ÓÃÜÃÜÔ¿£¬£¬£¬Òò¶øÊý¾Ý¸´Ô±äµÃ²»³ÉÄÜ£¬£¬£¬³ý·ÇµÃµ½¹¥»÷ÕߵĺÏ×÷¡£¹¥»÷Õß»¹ÉèÖÃÁËΪÆÚÆßÌìµÄÎļþɾ³ýÕ½Êõ£¬£¬£¬²¢ÔÚËùÓÐÊÜÓ°ÏìµÄĿ¼ÖиéÖÃÊê½ð֪ͨ£¬£¬£¬ÒªÇóÊܺ¦ÕßÔÚÖ¸¶¨µÄ±ÈÌØ±ÒµØÖ·ÉÏÖ§¸¶Êê½ð¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬£¬£¬ÑÇÂíÑ·½¨ÒéÖ´ÐÐÑϸñµÄ°²È«ºÍ̸£¬£¬£¬²¢¼¤ÀøAWS¿Í»§ÉèÖÃÏÞ¶ÈÐÔÕ½Êõ£¬£¬£¬Ô¤·ÀÔÚÆäS3´æ´¢Í°ÉÏʹÓÃSSE-C¡£Í¬Ê±£¬£¬£¬Ó¦½ûÓÃδʹÓõÄAWSÃÜÔ¿£¬£¬£¬Ê±Ê±ÂÖ»»»î¶¯ÃÜÔ¿£¬£¬£¬²¢½«ÕÊ»§È¨ÏÞά³ÖÔÚËùÐèµÄ×îµÍ¼¶±ð¡£
https://www.bleepingcomputer.com/news/security/ransomware-abuses-amazon-aws-feature-to-encrypt-s3-buckets/
6. °£Òò»ôÎÂÀí¹¤´óѧÔâÍøÂç¹¥»÷£¬£¬£¬´¹Î£¹Ø±ÕÍøÂ粢ȡµÞ½ÌÓý»î¶¯
1ÔÂ13ÈÕ£¬£¬£¬°£Òò»ôÎÂÀí¹¤´óѧÔÚÖÜÁùÍíÉÏ9µã×óÓÒ¼ì²âµ½ÍøÂç¹¥»÷ºó£¬£¬£¬Ñ¸ËÙ²ÉÈ¡Á˹رÕÍøÂçµÄ´ëÊ©ÒÔÔ¤·À¸üÑÏÖØµÄºó¹û¡£Ö»¹Ü´Ë¾Ùµ¼ÖÂÒÀÀµ´óÑ§ÍøÂçµÄÉèÊ©£¨Èçµç×ÓÓʼþ¡¢¡¢¡¢WiFiºÍʳÌÃÊÕÒø»ú£©ÎÞ·¨Ê¹Ó㬣¬£¬µ«Ñ§ÉúºÍÔ±¹¤ÈÔÄܹ»½øÈëУ԰¡£´óѧÔÚÖÜÈÕ°ä·¢ÉêÃ÷³Æ£¬£¬£¬ÓÉÓÚѧÉúÕýÔڳﱸ¿¼ÊÔ£¬£¬£¬Ô¤¼ÆÕâ´ÎÍøÂç¹¥»÷¶Ô½²ÊÚ¹¦·òµÄÓ°Ï콫ÓÐÏÞ£¬£¬£¬Í¬Ê±Ç¿µ÷ÆäITÈËÔ±ÕýÔÚÈ«Á¦µ÷²éÕâ´Î¹¥»÷£¬£¬£¬²¢Ö¸³öĿǰÉÐÎÞ¼£ÏóÅú×¢Êý¾Ý±»µÁ¡£¸±Ð£³¤ÅÁÌØÀï¿Ë¡¤¸ñÂ³ÌØºú˹°µÊ¾£¬£¬£¬ËûÃÇÒâʶµ½¹Ø±ÕÍøÂç»á´øÀ´ÑÏÖØºó¹û£¬£¬£¬µ«ÕâÊÇΪÁËÔ¤·À¸üÔã¸âµÄÁ˾ֲúÉú£¬£¬£¬²¢µ«Ô¸µÃµ½¸÷È˵ÄÀí½â¡£Ö»¹ÜÕâ´Î¹¥»÷µÄ¾ßÌåÐÔÖÊÉÐδÅû¶£¬£¬£¬µ«Å·Ö޺ܶàÀí¹¤´óѧ½üÄêÀ´¶¼Êܵ½ÁËÀÕË÷Èí¼þ×éÖ¯µÄÓ°Ïì¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬Ö»¹Ü°£Òò»ôÎÂÀí¹¤´óѧÓëºÜ¶àÆóҵά³Ö×ÅÁªÏµ£¬£¬£¬µ«Ä¿Ç°Ã»Óм£ÏóÅú×¢ÕâЩÆóÒµ¿ÉÄÜÊܵ½Ó°Ïì¡£
https://therecord.media/tu-eindhoven-cyberattack-lectures-canceled


¾©¹«Íø°²±¸11010802024551ºÅ