MoneyGramÔâÓöÍøÂç¹¥»÷£¬ÏµÍ³ÖжÏÒý·¢¹ã·º¹Ø×¢
Ðû²¼Ê±¼ä 2024-09-269ÔÂ24ÈÕ£¬»ã¿î¾ÞÍ·MoneyGram×ÔÉÏÖÜÎåÆðÔâÓöϵͳÖжϣ¬²¢È·ÈÏÕâÊÇÓÉÍøÂç¹¥»÷ËùÖ¡£¾¡¹Ü´ËÇ°¹«Ë¾½öÌá¼°¡°ÍøÂçÖжϡ±£¬Î´Ã÷ȷ˵Ã÷ÔÒò£¬Ö±ÖÁÖÜÒ»²ÅÕýʽͨ¸æÍøÂçÄþ¾²Ê¼þÊÇÆäϵͳ̱»¾µÄȪԴ¡£MoneyGram×÷ΪȫÇòµÚ¶þ´ó»ã¿î·þÎñÌṩÉÌ£¬Æä·þÎñÁýÕÖ200¸ö¹ú¼ÒµÄ350,000¸öÍøµã¼°ÏßÉÏƽ̨£¬Äê½»Ò×Á¿³¬1.2Òڱʡ£´Ë´Î¹¥»÷µ¼ÖÂÓû§ÎÞ·¨Íê³É½»Ò×»ò·ÃÎÊ×ʽð£¬ÍøÕ¾Ò²ÎÞ·¨Ê¹Óã¬Òý·¢Á˹㷺¹Ø×¢ºÍµ£ÓÇ¡£¹«Ë¾Ñ¸ËÙ½ÓÄÉÐж¯£¬½«ÊÜÓ°ÏìµÄϵͳÏÂÏßÒÔÍ£Ö¹¹¥»÷£¬²¢ÓëÍⲿר¼ÒºÍÖ´·¨²¿ÃŽôÃܺÏ×÷ÒÔ»Ö¸´·þÎñ¡£MoneyGramÇ¿µ÷Á˶ÔʼþÑÏÖØÐÔµÄÈÏʶ£¬²¢ÔÊÐí¾¡¿ì»Ö¸´ÏµÍ³Õý³£ÔËÐС£È»¶ø£¬¹ØÓÚϵͳ»Ö¸´µÄ¾ßÌåʱ¼ä±íÉÐδÐû²¼£¬ÌåÏÖ¹¥»÷¿ÉÄÜÈÔÔÚÁ¬Ðø»ò»Ö¸´ÊÂÇé´¦ÓÚ³õÆڽ׶Ρ£¾¡¹Ü¹¥»÷ÀàÐÍÉÐδ¹ûÈ»£¬µ«³¤Ê±¼äµÄ·þÎñÖжϺÍÁ¬½ÓÎÊÌâÇ¿ÁÒÌåÏÖÕâ¿ÉÄÜÊÇÒ»ÆðÀÕË÷Èí¼þ¹¥»÷¡£¼øÓÚMoneyGramÅÓ´óµÄÓû§»ù´¡£¬´Ë´ÎʼþÈôÉæ¼°Êý¾Ýй¶£¬ÆäDZÔÚÓ°Ï콫¼«ÎªÉîÔ¶¡£
https://www.bleepingcomputer.com/news/security/moneygram-confirms-a-cyberattack-is-behind-dayslong-outage/
2. ºÚ¿ÍÒ»ÖÜÄÚµÚÈý´ÎÏ®»÷´÷¶û£¬500MBÃô¸ÐÊý¾ÝÔâй¶
9ÔÂ25ÈÕ£¬ºÚ¿Í¡°grep¡±ÔÙ´ÎÕë¶Ô¿Æ¼¼¾ÞÍ·´÷¶û·¢¶¯¹¥»÷£¬Ò»ÖÜÄÚµÚÈý´ÎÔì³ÉÊý¾Ýй¶£¬´Ë´Îй¶ÁËÔ¼500MBµÄÃô¸ÐÊý¾Ý£¬°üÂÞÄÚ²¿Îĵµ¡¢Í¼Æ¬¡¢²âÊÔÊÓƵ¼°¶àÖØÉí·ÝÑéÖ¤£¨MFA£©Êý¾Ý¡£´÷¶ûÖÁ½ñδ×ö³öÕýʽ»ØÓ¦£¬¶øºÚ¿Í¡°grep¡±Ôò¹ûÈ»Ðû³Æ¶Ô´Ë´Îй¶ÂôÁ¦£¬²¢ÌåÏÖËùÓÐÊý¾Ý¾ùÔ´×Ôµ¥´ÎÈëÇÖ£¬Ö»ÊǼÆıÐԵطÖÅúÆع⡣鶵ÄÐÅÏ¢Öк¸ÇÁËÄÚ²¿Æ±Îñϵͳϸ½Ú¡¢Öйú»ù´¡ÉèÊ©ÏîÄ¿Îļþ¼°Äþ¾²Ïà¹ØÎĵµ£¬Ò»µ©ÕâЩÃô¸ÐÐÅÏ¢±»²»Í×ÀûÓ㬽«¶Ô´÷¶ûµÄÔËÓªÄþ¾²×é³ÉÑÏÖØÍþв¡£2024Äê 9 Ô 19 ÈÕ£¬¡°grep¡±Ð¹Â¶ÁËÁè¼Ý 12,000 Ãû´÷¶ûÔ±¹¤µÄÊý¾Ý£¬Òý·¢ÁËÄÚ²¿ÊӲ졣¼¸Ììºó£¬¼´ 9 Ô 22 ÈÕ£¬¸ü¶àÃô¸ÐµÄÄÚ²¿Îļþ±»Ð¹Â¶£¬¾Ý³ÆÊÇ´÷¶ûʹÓà Atlassian ¹¤¾ßʱй¶µÄ¡£½ØÖÁÄ¿Ç°£¬´÷¶ûÉÐδȷÈÏ´Ë´ÎÊý¾Ýй¶µÄ¾ßÌåÓ°Ï췶Χ¼°ÊÇ·ñÉæ¼°µÚÈý·½Â©¶´£¬Ò»ÖÜÄÚ·¢ÉúÈýÆðÊý¾Ýй¶Ê¼þ£¬ÈËÃǶԴ÷¶ûÍøÂçÄþ¾²µÄµ£ÓÇÓëÈÕ¾ãÔö¡£
https://hackread.com/dell-data-leak-in-week-amid-grep-cyberattacks/
3. ÍøÂçÄþ¾²Ñо¿ÈËÔ±¾¯¸æÐÂÐÍ»ùÓÚRustµÄSplinterºóÀûÓù¤¾ß
9ÔÂ25ÈÕ£¬ÍøÂçÄþ¾²ÁìÓò½üÆÚ·¢ÏÖÁËÒ»ÖÖÃûΪSplinterµÄÐÂÐͺóÀûÓúì¶Ó¹¤¾ß£¬¸Ã¹¤¾ßÓÉPalo Alto Networks Unit 42ÔÚ¿Í»§ÏµÍ³ÖÐʶ±ð²¢Ðû²¼¡£SplinterÓÉRustÓïÑÔ±àд£¬Ë书Ч²»ÈçCobalt StrikeµÈ¸ß¼¶¹¤¾ßÈ«Ã棬µ«Èç±»ÀÄÓã¬ÈÔ¶Ô×éÖ¯Äþ¾²×é³ÉDZÔÚ·çÏÕ¡£¸Ã¹¤¾ßרΪºì¶ÓÐж¯Éè¼Æ£¬ÓÃÓÚʶ±ðÆóÒµÍøÂçÖеÄÄþ¾²Â©¶´£¬µ«Í¬Ñù´æÔÚ±»¶ñÒâÀûÓõķçÏÕ¡£Ä¿Ç°£¬ÉÐÎÞÖ¤¾Ý±íÃ÷SplinterÓë¾ßÌåÍþвÐÐΪÕßÏà¹ØÁª£¬ÇÒÆäÅÓ¸ÅÂÔ»ýÖ÷Òª¹éÒòÓÚ°üÂÞµÄRust¿âÊýÁ¿¡£Splinter¾ß±¸¶àÖÖ¹¦Ð§£¬ÈçÖ´ÐÐWindowsÃüÁî¡¢Ô¶³Ì½ø³Ì×¢Èë¡¢ÎļþÉÏ´«ÏÂÔØ¡¢ÔÆ·þÎñÕË»§ÐÅÏ¢ÊÕ¼¯¼°×ÔÎÒɾ³ýµÈ£¬ÕâЩ¾ùͨ¹ýÆäÅäÖõÄC2·þÎñÆ÷½ÓÊÕÈÎÎñʵÏÖ¡£´ËÍ⣬½üÆÚ»¹ÆعâÁËÆäËû¼¸Öָ߼¶¹¥»÷¼¼Êõ£¬Èçͨ¹ýMicrosoft Office RPC½Ó¿ÚºÍ¶ñÒâµæƬʵÏÖµÄÒþÃØ´úÂë×¢ÈëÓëȨÏÞÌáÉý£¬ÒÔ¼°ÀûÓÃThread Name-Calling¼¼ÊõÈƹý¶Ëµã±£»¤½øÐнø³Ì×¢Èë¡£ÕâЩ·¢ÏÖÇ¿µ÷ÁËÔÚÍøÂçÄþ¾²ÁìÓò±£³ÖÔ¤·ÀºÍ¼ì²âÄÜÁ¦µÄÖØÒªÐÔ£¬ÒòΪ·¸×ï·Ö×ӻ᲻ͣ½ÓÄÉм¼ÊõÍþв×éÖ¯Äþ¾²¡£
https://thehackernews.com/2024/09/cybersecurity-researchers-warn-of-new.html
4. Òƶ¯ÍøÂçµöÓãÍþв¼¤Ôö£¬82%µöÓãÍøÕ¾Ãé×¼Òƶ¯É豸
9ÔÂ25ÈÕ£¬Ëæ×ÅÒƶ¯ÍøÂçµöÓã¹¥»÷µÄ¼¤Ôö£¬Áè¼Ý°Ë³ÉµÄÍøÂçµöÓãÍøÕ¾ÏÖÒÑרעÓÚÒƶ¯É豸£¬Ôö³¤ÂÊÏÔÖø¡£Äþ¾²Ñо¿½Òʾ£¬¶àÊý·¸×ï·Ö×ÓÀûÓÃHTTPSÐÒéαװµöÓãÍøÕ¾Äþ¾²£¬Ôö¼ÓÁËʶ±ðÄѶȣ¬ÓÈÆäÔÚÒƶ¯¶Ë¡£È«Çò·¶Î§ÄÚ£¬¶ñÒâÈí¼þ¼°ÆóÒµ¼äµýÈí¼þÍþв´ó·ùÔö¼Ó£¬ÌرðÊÇAndroidƽ̨©¶´ÉÏÉýÏÔÖø¡£Í¬Ê±£¬Á¬½Ó²»Äþ¾²ÍøÂçµÄÉ豸¼¤Ôö£¬Ò½ÁƱ£½¡ÐÐÒµ³ÉΪÒƶ¯ÍøÂçµöÓã¹¥»÷µÄÖØÔÖÇø¡£×¨¼Ò½¨Ò飬ÈçÒ½ÁƱ£½¡×éÖ¯Ó¦½ÓÄÉÁãÐÅÈÎÄþ¾²Ä£ÐÍ£¬½áºÏAIÇý¶¯µÄÍþвÇ鱨ƽ̨ÒÔÔöÇ¿·ÀÓù¡£´ËÍ⣬¼ÓÇ¿Òƶ¯É豸¹ÜÀí£¨MDM£©¡¢ÊµÊ©¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©ºÍÃÜÂë¹ÜÀí¼Æı±»ÊÓΪҪº¦·ÀÓù´ëÊ©¡£¶¨ÆÚ½øÐÐÔ±¹¤Äþ¾²Åàѵ¡¢Â©¶´É¨Ãè¡¢·çÏÕÆÀ¹À¼°Äþ¾²Éó¼ÆÒ²±Ø²»ÐÐÉÙ¡£Õë¶Ô²àÔØÓ¦Ó÷¨Ê½µÄÄþ¾²·çÏÕ£¬×¨¼ÒÇ¿µ÷ÆäÈƹý¹Ù·½Éó²é¿ÉÄÜ´øÀ´µÄΣº¦£¬²¢½¨ÒéÆóÒµÖƶ¨ÑϸñÕþ²ßÏÞÖƲàÔØÓ¦Óð²×°£¬Í¨¹ýMDMϵͳ¿ØÖÆÓ¦ÓÃȨÏÞ£¬²¢½ÌÓýÔ±¹¤Ê¶±ðÏà¹Ø·çÏÕ¡£
https://securityboulevard.com/2024/09/mobile-phishing-attacks-explode-enterprise-devices-targeted/
5. RAISECOM GatewayÑÏÖØ©¶´CVE-2024-7120±»»ý¼«ÀûÓÃ
9ÔÂ25ÈÕ£¬RAISECOM GatewayÉ豸½üÆÚÆعâµÄCVE-2024-7120©¶´£¬ÒÔÆ伫¸ßµÄCVSSÆÀ·Ö9.8£¬³ÉΪÆóÒµÄþ¾²ÁìÓòµÄÒ»´óÒþÓÇ¡£´Ë©¶´ÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÊÜÓ°ÏìµÄWeb½çÃælist_base_config.php½Å±¾Ö´ÐÐÈÎÒâÃüÁֱ½ÓÍþвµ½°æ±¾3.90µÄMSG1200¡¢MSG2100E¡¢MSG2200¼°MSG2300ÐͺÅÉ豸µÄÄþ¾²£¬¿ÉÄܵ¼ÖÂÑÏÖصÄÊý¾Ýй¶ºÍϵͳ±»·Ç·¨ÈëÇÖ¡£Äþ¾²½çÒÑÈ·Èϸ鶴Ò×ÓÚ±»¶ñÒâÀûÓã¬ÇÒ×Ô9Ô³õÆ𣬹¥»÷»î¶¯Æµ·±£¬ÓÚ9ÔÂ12ÈÕÖÁ13ÈÕµ½´ïá¯Á룬ÏÔʾ³öÍþвÐÐΪÕߵĻý¼«Ì¬ÊÆ¡£Ãæ¶ÔÕâÒ»½ô¼±×´¿ö£¬¾¡¹ÜRAISECOMÉÐδÐû²¼¹Ù·½²¹¶¡£¬µ«ÆóÒµÓ¦Á¢¼´½ÓÄÉ´ëÊ©½µµÍ·çÏÕ¡£Ê×ÒªÈÎÎñÊÇÑϸñÏÞÖƶÔÉ豸Web½çÃæµÄ·ÃÎÊȨÏÞ£¬½öÔÊÐíÊÜÐÅÈεÄÍøÂçºÍÊÚȨÈËÔ±½ÓÈ롣ͬʱ£¬¼ÓÇ¿Web½çÃæµÄÊäÈëÑéÖ¤»úÖÆ£¬ÊµÊ©ÑϸñµÄÇåÀí·¨Ê½£¬ÒÔµÖÓùÃüÁî×¢Èë¹¥»÷¡£´ËÍ⣬²¿Êð¸ßЧµÄÍøÂç¼à¿ØºÍÈëÇÖ¼ì²âϵͳ£¬ÊµÊ±¼à¿ØÍøÂç»î¶¯£¬¼°Ê±·¢ÏÖ²¢Ó¦¶ÔÈκοÉÒÉÐÐΪ£¬Ò²ÊÇÖÁ¹ØÖØÒªµÄ·À»¤´ëÊ©¡£
https://securityonline.info/critical-flaw-in-raisecom-gateways-actively-exploited-exposing-thousands-to-remote-attacks/
6. DockerÓëKubernetesÔâÐÂÐͼÓÃÜ»õ±ÒÍÚ¾ò¶ñÒâÈí¼þ¹¥»÷
9ÔÂ25ÈÕ£¬Datadog Security Research½Ò¶ÁËÒ»ÏîÕë¶ÔDockerºÍKubernetes»·¾³µÄÅÓ´ó¶ñÒâÈí¼þ»î¶¯£¬¸Ã»î¶¯ÀûÓÃÈÝÆ÷±àÅż¼ÊõÖеÄÄþ¾²Â©¶´£¬ÌرðÊÇ̻¶ÔÚ»¥ÁªÍøÉÏÇÒδÉèÖÃÊʵ±Éí·ÝÑéÖ¤µÄDocker API¶Ëµã£¬½øÐдó¹æÄ£¼ÓÃÜ»õ±ÒÍÚ¾ò¡£¹¥»÷Õßͨ¹ýɨÃ蹤¾ßʶ±ðÒ×Êܹ¥»÷µÄÈÝÆ÷£¬²¿ÊðXMRigÍÚ¾òÈí¼þ£¬²¢ÀûÓóõʼ»¯½Å±¾ÏÂÔØÌرð¸ºÔØ¡¢°²×°Êý¾Ý´«Ê乤¾ßºÍ½ø³ÌÒþ²Ø·¨Ê½£¬ÒÔÔöÇ¿Òþ±ÎÐÔºÍÁ÷´«ÄÜÁ¦¡£´Ë¶ñÒâÈí¼þ²»½öÏÞÓÚµ¥Ò»DockerʵÀý£¬»¹Í¨¹ýºáÏòÒƶ¯¼¼ÊõÈçkube.lateral.shµÈ½Å±¾£¬ÔÚÔÆ»ù´¡ÉèÊ©Öй㷺Á÷´«£¬ÌرðÊÇÕë¶ÔKubernetes¼¯Èº£¬ÀûÓÃKubelet API²¿Êð¸ü¶àÍÚ¾òÈÝÆ÷£¬À©´ó¹¥»÷·¶Î§¡£´ËÍ⣬¹¥»÷Õß»¹ÀûÓÃDocker HubÐû²¼¶ñÒâ¾µÏñ£¬²¢Í¨¹ýÀûÓÃDocker Swarm»·¾³£¬½«ÊÜѬȾÖ÷»úÄÉÈ뽩ʬÍøÂ磬ʵÏÖ¼¯ÖпØÖÆ¡£¸Ã»î¶¯Í¹ÏÔÁËÔÆ»·¾³ÖÐÅäÖôíÎó£¬ÌرðÊÇδ±£»¤Docker API¶ËµãµÄÑÏÖØ·çÏÕ¡£¹¥»÷ÕßÀûÓÃÕâЩ©¶´£¬ÒÔ¼«Ð¡µÄ×ÌÈÅÔÚÔÆ»ù´¡ÉèÊ©ÖÐѸËÙÀ©É¢£¬Ðγɴó¹æÄ£µÄÂþÑÜʽ¼ÓÃÜÍÚ¾òÍøÂ磬Ϊ×ÔÉíıȡÀûÒ档ΪӦ¶Ô´ËÀàÍþв£¬ÔƹÜÀíÔ±ÐèÁ¢¼´½ÓÄÉÐж¯£¬¼ÓÇ¿Äþ¾²ÅäÖá£
https://securityonline.info/new-malware-campaign-mines-crypto-in-docker-kubernetes/