ÃÀ¹úË®Îñ¹«Ë¾ÔâÍøÂç¹¥»÷ £¬²¿ÃÅϵͳ¹Ø±Õ²¢Æô¶¯ÊÓ²ì

Ðû²¼Ê±¼ä 2024-10-08

1. ÃÀ¹úË®Îñ¹«Ë¾ÔâÍøÂç¹¥»÷ £¬²¿ÃÅϵͳ¹Ø±Õ²¢Æô¶¯ÊÓ²ì


10ÔÂ7ÈÕ £¬ÃÀ¹úË®Îñ¹«Ë¾ £¬×÷Ϊ¸Ã¹ú×î´óµÄÉÏÊÐË®ÎñºÍÎÛË®´¦Öù«ÓÃÊÂÒµ¹«Ë¾ £¬½üÆÚÔâÊÜÁËÍøÂç¹¥»÷ £¬µ¼Ö²¿ÃÅϵͳ±»ÆȹرÕ¡£¹«Ë¾ÒÑƸÇëµÚÈý·½ÍøÂçÄþ¾²×¨¼Ò½éÈë £¬²¢ÏòÖ´·¨²¿ÃųÂËß´Ëʼþ £¬Ð­µ÷ÁªºÏÊӲ졣ΪӦ¶Ô¹¥»÷ £¬¹«Ë¾½ÓÄÉÁ˶Ͽª»òÍ£ÓÃijЩϵͳµÄ´ëÊ© £¬²¢¹Ø±ÕÁËÔÚÏß¿Í»§ÃÅ»§·þÎñMyWater £¬ÔÝÍ£Á˼ƷѷþÎñ¡£¹«Ë¾·¢ÑÔÈËÌåÏÖ £¬Æڼ䲻»áÏò¿Í»§ÊÕÈ¡ÖÍÄɽ𠣬²¢Ç¿µ÷¹©Ë®»ò·ÏË®ÉèÊ©¼°ÔËӪδÊÜ´Ë´ÎʼþÓ°Ïì¡£ÃÀ¹úË®Îñ¹«Ë¾ÓµÓÐ6,500¶àÃûÔ±¹¤ £¬Îª14¸öÖݺÍ18¸ö¾üÊ»ùµØµÄÁè¼Ý1,400ÍòÈËÌṩ·þÎñ¡£´ËÇ° £¬ÀàËÆʼþÒ²Ôø·¢Éú £¬Èç¿°Èø˹ÖÝ°¢¿ÏÉ«³ÇµÄË®´¦Öó§ÔÚÖÜÄ©ÔâÊÜÍøÂç¹¥»÷ºóתΪÊÖ¶¯²Ù×÷¡£´ËÍâ £¬Ë®ÐÅÏ¢¹²ÏíÓë·ÖÎöÖÐÐÄÔøÐû²¼¾¯¸æ³Æ¶íÂÞ˹Õë¶ÔË®Îñ²¿ÃÅÌᳫÍøÂç¹¥»÷¡£ÃÀ¹ú»·¾³± £»¤ÊðÒ²Ðû²¼ÁËÖ¸µ¼Òâ¼û £¬×ÊÖúÆÀ¹ÀÍøÂçÄþ¾²Êµ¼ù²¢È·¶¨¼õÉÙ¹¥»÷·çÏյĴëÊ©¡£


https://www.bleepingcomputer.com/news/security/american-water-shuts-down-online-services-after-cyberattack/


2. Cloudflare×èÖ¹ÁËÊ·ÉÏ×î´óÁ÷Á¿DDoS¹¥»÷ £¬·åÖµµ½´ï3.8Tbps


10ÔÂ3ÈÕ £¬½ðÈÚ·þÎñ¡¢»¥ÁªÍøºÍµçÐÅÐÐÒµÔâÊÜÁËÒ»³¡Ç°ËùδÓеÄÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷ £¬·åÖµÁ÷Á¿¸ß´ïÿÃë3.8½ðÈÚ·þÎñ¡¢»¥ÁªÍøºÍµçÐÅÐÐÒµÔâÊÜÁËÒ»³¡Ç°ËùδÓеÄÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷ £¬·åÖµÁ÷Á¿¸ß´ïÿÃë3.8Tbps £¬´´ÏÂÁ˹ûÈ»¼Ç¼µÄ×î´óÖµ¡£Õⳡ¹¥»÷Á¬ÐøÁËÒ»¸öÔ £¬°üÂÞÁËÁè¼Ý100´ÎµÄ³¬´óÁ÷Á¿DDoS¹¥»÷ £¬Í¨¹ýÀ¬»øÊý¾ÝÑÍûÍøÂç»ù´¡ÉèÊ©¡£ÔÚÈÝÁ¿Ãܼ¯ÐÍDDoS¹¥»÷ÖÐ £¬´óÁ¿Êý¾Ýµ¼Ö´ø¿íÏûºÄ´ù¾¡ £¬Ó¦Ó÷¨Ê½ºÍÉ豸×ÊÔ´¿Ý½ß £¬ºÏ·¨Óû§ÎÞ·¨·ÃÎÊ¡£ÊÜѬȾµÄÉ豸°üÂÞAsus·ÓÉÆ÷¡¢MikroTikÉ豸¡¢DVRºÍÍøÂç·þÎñÆ÷ £¬Çұ鲼ȫÇò £¬¶íÂÞ˹¡¢Ô½ÄÏ¡¢ÃÀ¹ú¡¢°ÍÎ÷ºÍÎ÷°àÑÀÓÈΪ¼¯ÖС£CloudflareÀֳɻº½âÁËËùÓй¥»÷ £¬²¢Ö¸³ö·åÖµ¹¥»÷Á¬ÐøÁË65Ãë¡£¶ñÒâÉ豸Ö÷ҪʹÓÃUDPЭÒé £¬¸ÃЭÒéÊý¾Ý´«ÊäËٶȿì £¬µ«ÎÞÐ轨Á¢ÕýʽÁ¬½Ó¡£´ËÇ° £¬Î¢ÈíÔø±£³Ö·ÀÓù×î´óDDoS¹¥»÷µÄ¼Ç¼ £¬Á÷Á¿Îª3.47Tbps¡£


https://www.bleepingcomputer.com/news/security/cloudflare-blocks-largest-recorded-ddos-attack-peaking-at-38tbps/


3. CosmicSting¹¥»÷ÍþвAdobe CommerceºÍMagentoÉ̵êÄþ¾²


10ÔÂ3ÈÕ £¬Adobe CommerceºÍMagentoÔÚÏßÉ̵êÕýÃæÁÙÃûΪ¡°CosmicSting¡±µÄÑÏÖع¥»÷ £¬¸Ã¹¥»÷ÒÑÈëÇÖÔ¼5%µÄÉ̵ê¡£CosmicSting©¶´£¨CVE-2024-34102£©ÊÇÒ»¸ö¸ßÑÏÖØÐÔµÄÐÅϢ鶩¶´ £¬µ±ÓëglibcµÄiconvº¯ÊýÖеÄÁíÒ»Äþ¾²ÎÊÌ⣨CVE-2024-2961£©½áºÏʱ £¬¹¥»÷Õß¿ÉÔÚÄ¿±ê·þÎñÆ÷ÉÏʵÏÖÔ¶³Ì´úÂëÖ´ÐС£ÊÜÓ°ÏìµÄ²úÎï°üÂÞAdobe CommerceµÄ¶à¸ö°æ±¾¡¢Magento¿ªÔ´µÄ¶à¸ö°æ±¾ÒÔ¼°Adobe Commerce Webhooks²å¼þµÄijЩ°æ±¾¡£×Ô2024Äê6ÔÂÒÔÀ´ £¬ÍøÕ¾Äþ¾²¹«Ë¾SansecÒÑ×·×Ùµ½4,275¼ÒÉ̵êÔÚCosmicSting¹¥»÷ÖÐÔâµ½ÈëÇÖ £¬ÖªÃûÊܺ¦Õß°üÂ޻ݶøÆÖ¡¢À×Åó¡¢¹ú¼ÒµØÀí¡¢Èü¸ñÍþºÍ˼¿ÆµÈ¡£Sansec¾¯¸æ³Æ £¬ÓÉÓÚÐÞ²¹ËÙ¶ÈÓëÇé¿öÑÏÖØÐÔ²»Æ¥Åä £¬Ä¿Ç°¶à¸öÍþвÐÐΪÕßÕýÔÚÀûÓÃCosmicSting©¶´ÈëÇÖδ´ò²¹¶¡µÄÍøÕ¾¡£ÕâЩÍþв×éÖ¯ÃûΪ¡°Bobry¡±¡¢¡°Polyovki¡±µÈ £¬ËûÃdzöÓÚ¾­¼Ã¶¯»ú £¬ÈëÇÖÍøÕ¾ÒÔÇÔÈ¡ÐÅÓÿ¨ºÍ¿Í»§ÐÅÏ¢¡£¶ñÒâ½Å±¾»á´Óαװ³ÉÖªÃûJavaScript¿â»ò·ÖÎö°üµÄÓòÃû×¢ÈëÊÜѬȾµÄÍøÕ¾¡£Òò´Ë £¬Ç¿ÁÒ½¨ÒéÍøÕ¾¹ÜÀíÔ±¾¡¿ìÉý¼¶µ½Äþ¾²µÄÈí¼þ°æ±¾¡£


https://www.bleepingcomputer.com/news/security/over-4-000-adobe-commerce-magento-shops-hacked-in-cosmicsting-attacks/


4. ZimbraÓʼþ·þÎñÆ÷ÑÏÖØ©¶´CVE-2024-45519Òý·¢Äþ¾²¾¯±¨


10ÔÂ4ÈÕ £¬ÃÀ¹úÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£¨CISA£©Òѽ«Zimbraµç×ÓÓʼþ·þÎñÆ÷ÖеÄÑÏÖØÔ¶³Ì´úÂëÖ´ÐЩ¶´CVE-2024-45519Ìí¼Óµ½ÆäÒÑÖªÀûÓ鶴Ŀ¼ÖÐ £¬¸Ã©¶´Õë¶ÔZimbraµÄpostjournal·þÎñ £¬ÔÊÐí¹¥»÷Õßͨ¹ý·¢ËÍÌØÖƵç×ÓÓʼþÀûÓÃϵͳ £¬Ö´ÐÐÈÎÒâÃüÁî¡£´Ë©¶´ÒÑÒýÆðÕþ¸®ºÍÒªº¦»ù´¡ÉèÊ©²¿Ãŵľ¯Ìè £¬ÒòΪ¹¥»÷ÕßÕýÔÚ»ý¼«ÀûÓÃËü £¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡¢ÏµÍ³ÈëÇÖ»òδ¾­ÊÚȨµÄ·ÃÎʵÈÑÏÖغó¹û¡£ZimbraÒÑÐû²¼²¹¶¡ÐÞ¸´´Ë©¶´ £¬½¨Òéϵͳ¹ÜÀíÔ±Á¢¼´Ó¦ÓᣴËÍâ £¬ProjectDiscoveryµÄÑо¿ÈËÔ±Ìá³öÁËÁ½ÖÖ»º½â´ëÊ©£ºÈç¹ûPostjournal·þÎñ²»ÖØÒª £¬Çë½ûÓÃËü £»²¢È·±£¡°mynetworks¡±ÉèÖÃÕýÈ·ÅäÖÃÒÔ×èֹδ¾­ÊÚȨµÄ·ÃÎÊ¡£¼øÓÚZimbraÔÚÈ«ÇòµÄ¹ã·ºÊ¹Óà £¬ºöÊÓÕâЩ·ÀÓù´ëÊ©¿ÉÄÜ»áʹϵͳ̻¶ÓÚÖ÷¶¯¹¥»÷µÄ·çÏÕÖС£CISAÒÑ·¢³öÇ¿ÁÒ¾¯¸æ £¬²¢É趨ÁËÁª°î»º½â´ëÊ©µÄ×îºóÆÚÏÞΪ2024Äê10ÔÂ24ÈÕ £¬ÎªÁª°î»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯ÌṩÁ˽ôÆȵÄʱ¼äÀ´Ó¦Óò¹¶¡»òֹͣʹÓÃZimbraµÄÈÕÖ¾·þÎñ¡£


https://securityonline.info/zimbra-email-servers-under-attack-cisa-flags-cve-2024-45519-as-actively-exploited/


5. perfctl¶ñÒâÈí¼þ£ºÕë¶ÔLinux·þÎñÆ÷µÄÒþ±Î³Ö¾Ã¹¥»÷Óë×ÊÔ´½Ù³Ö


10ÔÂ4ÈÕ £¬Aqua Nautilus µÄÑо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪ perfctl µÄ Linux ¶ñÒâÈí¼þ £¬ËüÒÑÕë¶ÔÅäÖôíÎóµÄ Linux ·þÎñÆ÷½øÐÐÁ˳¤´ï 3-4 ÄêµÄ¹¥»÷¡£¸Ã¶ñÒâÈí¼þʹÓà rootkit Òþ²ØÆä´æÔÚ £¬Í¨¹ý TOR ½øÐÐͨÐÅ £¬²¢ÔÚ·þÎñÆ÷¿ÕÏÐʱִÐмÓÃÜ»õ±Ò¿ó¹¤ºÍÊðÀí½Ù³ÖÈí¼þ¡£¹¥»÷ÕßÀûÓ鶴»ò´íÎóÅäÖà £¬´Ó¿ØÖÆµÄ HTTP ·þÎñÆ÷ÏÂÔضà²ã½á¹¹µÄÓÐЧÔØºÉ £¬Í¨¹ýÖØÃüÃûºÍɾ³ýԭʼ¶þ½øÖÆÎļþÀ´ÑÚ¸Ç×Ù¼£¡£Ëü»¹»áͶ·ÅÒ»¸ö rootkit ºÍ¾­¹ýÐÞ¸ÄµÄ Linux ʵÓ÷¨Ê½ £¬Ê¹Óø߼¶Ìӱܼ¼ÊõÈç¼ì²âÐÂÓû§Ê±Í£Ö¹»î¶¯ £¬²¢ÖÕÖ¹¾ºÕù¶ñÒâÈí¼þ¡£ÎªÁ˱£³Ö³Ö¾ÃÐÔ £¬¶ñÒâÈí¼þ»áÐÞ¸ÄÓû§µÇ¼½Å±¾ £¬ÔÚÓû§µÇ¼ʱִÐÐ £¬²¢ÔÚºǫ́ÔËÐÐÒÔÈ·±£ÆäÁ¬ÐøÔËÐС£¸Ã¶ñÒâÈí¼þµÄÖ÷ÒªÓ°ÏìÊÇ×ÊÔ´½Ù³Ö £¬Í¨¹ýÖ´ÐÐÃÅÂÞ±ÒÍÚ¿ó·¨Ê½À´ºÄ¾¡·þÎñÆ÷ CPU ×ÊÔ´¡£Òª¼ì²â perfctl ¶ñÒâÈí¼þ £¬ÐèÒª¼ì²ì CPU ʹÓÃÂÊÊÇ·ñ·ºÆðÒì³£·åÖµ»òϵͳÊÇ·ñ±äÂý¡£


https://securityaffairs.com/169351/malware/perfctl-malware-targets-misconfigured-linux-servers.html


6. UMC Health SystemÔâÀÕË÷Èí¼þ¹¥»÷ £¬»¼ÕßתÒÆÓë·þÎñÊÜ×è


10ÔÂ1ÈÕ £¬µÂ¿ËÈø˹ÖÝÒ½ÁƱ£½¡ÌṩÉÌUMC Health System½üÆÚÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷ £¬µ¼ÖÂÆäITϵͳ·ºÆðÒì³ £»î¶¯¡£ÎªÍ£Ö¹Ê¼þ £¬UMCÁ¢¼´¶Ï¿ªÏµÍ³²¢Õ¹¿ªÊÓ²ì £¬È·ÈÏ´Ë´ÎÒì³ £»î¶¯ÓëÀÕË÷Èí¼þʼþÓйØ¡£¾¡¹ÜÉÐδÓдóÐÍÀÕË÷Èí¼þ×éÖ¯¶Ô¹¥»÷ÂôÁ¦ £¬µ«¹¥»÷ÒÑÆÈʹUMC½«²¿ÃÅ»¼ÕßתÒƵ½ÆäËûËùÔÚ £¬²¢µ¼ÖÂһЩ¿ÆÊҹرջòÖ»ÄÜÌṩÑÓ³Ù·þÎñ £¬ÆäÖзÅÉä¿ÆÊÜÓ°ÏìÓÈΪÑÏÖØ¡£´ËÍâ £¬ÓÉÓÚITϵͳ¹ÊÕÏ £¬UMCÕïËùÎÞ·¨ÌṩҽÁÆ´¦·½Çåµ¥ £¬½¨Ò黼ÕßËæÉíЯ´ø £¬Ò½ÁƼǼËä¿ÉÔÚ»¼ÕßÃÅ»§ÍøÕ¾ÉÏÕÒµ½ £¬µ«ÎÞ·¨´òÓ¡¡£Ä¿Ç° £¬Í¨¹ýµç»°»òÔÚÏßÃÅ»§½¨Á¢ÏàͬҲÎÞ·¨±£Ö¤ £¬½¨ÒéÐèÒªÁ¢¼´×ÊÖúµÄÈËÇ°ÍùÕïËù¡£´Ë´Î¹¥»÷¿ÉÄÜÉæ¼°Êý¾Ý͵ÇÔ £¬ÊýÊ®ÍòÈ˵ÄÃô¸ÐÒ½ÁÆÐÅÏ¢¿ÉÄÜÊܵ½Ó°Ïì £¬UMCÕýÔڶԴ˽øÐÐÊÓ²ì £¬²¢ÌåÏÖ½«ÔÚÓиü¶àÐÅϢʱÌṩ¸üС£


https://www.bleepingcomputer.com/news/security/ransomware-attack-forces-umc-health-system-to-divert-some-patients/