Omni Family HealthÔâÓö´ó¹æÄ£Êý¾Ýй¶ £¬½ü47ÍòÈËÊÜÓ°Ïì

Ðû²¼Ê±¼ä 2024-10-21
1. Omni Family HealthÔâÓö´ó¹æÄ£Êý¾Ýй¶ £¬½ü47ÍòÈËÊÜÓ°Ïì


10ÔÂ18ÈÕ £¬¼ÓÖݽ¡¿µÖÐÐÄÍøÂçOmni Family Health½üÈÕ֪ͨÁ˽ü470,000Ãû¸öÈË £¬ËûÃǵĸöÈËÐÅÏ¢ÔÚ½ñÄêÔçЩʱºòµÄÒ»´ÎÍøÂç¹¥»÷Öб»µÁ¡£8ÔÂ7ÈÕ £¬OmniÔÚµÃÖªÍþвÐÐΪÕßÔÚ°µÍøÉÏÐû²¼Á˾ݳƴÓÆäÍøÂçÇÔÈ¡µÄÊý¾Ýºó £¬·¢ÏÖÁË´Ë´ÎÊý¾Ýй¶Ê¼þ¡£Ð¹Â¶µÄÐÅÏ¢Éæ¼°ÏÖÈκÍÇ°Èλ¼Õß¼°Ô±¹¤ £¬¹²468,344ÈËÊܵ½Ó°Ïì¡ £»¼ÕßµÄÐÕÃû¡¢µØÖ·¡¢³öÉúÈÕÆÚ¡¢Éç»áÄþ¾²ºÅÂë¡¢½¡¿µ±£Ïռƻ®ºÍÒ½ÁÆÐÅÏ¢¿ÉÄÜй¶ £¬¶øÔ±¹¤µÄÊý¾Ý鶻¹°üÂÞ²ÆÕþÕË»§ÏêϸÐÅÏ¢ºÍÓйؼÒÊô¡¢ÊÜÒæÈ˵ÄÐÅÏ¢¡£¾¡¹ÜOmni²¢Î´»ñϤÓÐÈκθöÈËÒò¸Ãʼþ¶ø³ÉΪÆÛÕ©Êܺ¦ÕßµÄÖ¸¿Ø £¬µ«ÈÔÃãÀø¸öÈ˽ÓÄÉ´ëÊ©± £»¤×Ô¼ºµÄ¸öÈËÐÅÏ¢ £¬²¢ÎªÊÜÓ°ÏìµÄ¸öÈËÌṩ12¸öÔµÄÃâ·ÑÐÅÓüà¿ØºÍÉí·Ý± £»¤·þÎñ¡£ËäÈ»Omniδ¾ßÌå˵Ã÷ÔâÊܵÄÍøÂç¹¥»÷ÀàÐÍ £¬µ«Hunters InternationalÀÕË÷Èí¼þÍÅ»ïÉù³ÆÇÔÈ¡ÁË2.7TBµÄÊý¾Ý £¬²¢ÓÚ8ÔÂ23ÈÕ¹ûÈ»ÁËËùÓÐÉæÏÓ±»µÁµÄÐÅÏ¢¡£Omni Family HealthΪ¿Ë¶÷ÏØ¡¢½ð˹ÏØ¡¢Í¼À³ÀïÏغ͸¥À×˹ŵÏØÌṩҽÁƱ£½¡·þÎñ £¬ÒÑ¿ªÊ¼ÏòÊÜÓ°ÏìµÄ¸öÈË·¢ËÍÊý¾Ýй¶֪ͨÐÅ £¬²¢Ïò¼ÓÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»ÁËÒ»·ÝÑù±¾¡£


https://www.securityweek.com/omni-family-health-data-breach-impacts-470000-individuals/


2. ÐÂÐËÍøÂçÍþвÐÐΪÕßCrypt GhoulsÕë¶Ô¶íÂÞ˹ÌᳫÀÕË÷Èí¼þ¹¥»÷


10ÔÂ19ÈÕ £¬Ò»¸öÃûΪCrypt Ghouls µÄÐÂÐËÍþвÐÐΪÕßÉæÏÓ¶Ô¶íÂÞ˹ÆóÒµºÍÕþ¸®»ú¹¹ÌᳫÁËһϵÁÐÍøÂç¹¥»÷ £¬Ö÷ÒªÀûÓÃÀÕË÷Èí¼þÀ´ÆÆ»µÆóÒµÔËÓª²¢Ä±È¡¾­¼ÃÀûÒæ¡£¾Ý¶íÂÞ˹ÍøÂçÄþ¾²¹©Ó¦ÉÌ¿¨°Í˹»ù͸¶ £¬ÕâЩ¹¥»÷Éæ¼°¶àÖÖʵÓ÷¨Ê½ £¬°üÂÞMimikatz¡¢XenAllPasswordProµÈ £¬×îÖÕʹÓõÄÀÕË÷Èí¼þΪLockBit 3.0ºÍBabuk¡£Êܺ¦Õߺ­¸ÇÁËÕþ¸®»ú¹¹ÒÔ¼°¿óÒµ¡¢ÄÜÔ´¡¢½ðÈÚºÍÁãÊ۵ȶà¸öÐÐÒµ¡£¿¨°Í˹»ùÖ¸³ö £¬¹¥»÷Õßͨ¹ýÀûÓóаüÉ̵ĵǼƾ֤ £¬Í¨¹ýVPNÁ¬½Óµ½ÄÚ²¿ÏµÍ³ £¬ÊÔͼÀûÓÃÐÅÈιØϵ¶ã±Ü¼à¿Ø¡£¹¥»÷¹ý³ÌÖÐ £¬ËûÃÇʹÓÃÁ˶àÖÖ¹¤¾ß½øÐÐÍøÂçÕì²ì¡¢ÊÕ¼¯Éí·ÝÑéÖ¤Êý¾Ý¡¢ÌáÈ¡Êܺ¦Õßƾ֤ £¬²¢×îÖÕ¼ÓÃÜϵͳÊý¾Ý¡£¹¥»÷Õß»¹ÔڻỰÏûÏ¢·þÎñÖÐÁôÏÂÀÕË÷ÐÅ £¬°üÂÞÁªÏµÆäµÄÁ´½Ó¡£ÖµµÃ×¢ÒâµÄÊÇ £¬Crypt GhoulsÔÚÕâЩ¹¥»÷ÖÐʹÓõŤ¾ßºÍ»ù´¡ÉèÊ©Óë½ü¼¸¸öÔÂÕë¶Ô¶íÂÞ˹µÄÆäËû×éÖ¯¿ªÕ¹µÄÀàËƻÖصþ £¬ÍøÂç·¸×ï·Ö×ÓÕýÔÚÀûÓñ»µÁÓõÄƾ֤ºÍÁ÷ÐеĿªÔ´¹¤¾ß £¬¹²Ïí¹¤¾ß°üºÍ֪ʶ £¬Ê¹µÃʶ±ðÕë¶Ô¶íÂÞ˹×éÖ¯µÄ¹¥»÷±³ºóµÄ¾ßÌå¶ñÒâÐÐΪÕß±äµÃÔ½·¢ÅÓ´ó¡£


https://thehackernews.com/2024/10/crypt-ghouls-targets-russian-firms-with.html


3. ÐÂÐ˽©Ê¬ÍøÂçGorillÌᳫȫÇò´ó¹æÄ£DDoS¹¥»÷


10ÔÂ20ÈÕ £¬ÍøÂçÄþ¾²Ñо¿ÈËÔ±³ÆÒ»¸öеÄGorilla½©Ê¬ÍøÂçÕý¶ÔÈ«Çò×é³ÉÈÕÒæÑÏÖصÄÍþв¡£¸Ã½©Ê¬ÍøÂçÀûÓÃMirai½©Ê¬ÍøÂçÔ´´úÂëºÍÏȽø¼¼Êõ £¬×Ô2024Äê9ÔÂÆðÌᳫÁË´ó¹æÄ£ÂþÑÜʽ¾Ü¾ø·þÎñ¹¥»÷£¨DDoS¹¥»÷£© £¬ÁýÕÖ100¶à¸ö¹ú¼Ò £¬Áè¼Ý30Íò¸öÄ¿±ê¡£Gorilla Botnetͨ¹ýѬȾÎïÁªÍøÉ豸 £¬Èç¾ü¶ÓµÈ £¬·¢¶¯¹¥»÷ £¬Ê¹Ä¿±êϵͳ³ä³â´óÁ¿Á÷Á¿ £¬µ¼ÖÂÓû§ÎÞ·¨·ÃÎÊ¡£ÆäΣÏÕÖ®´¦ÔÚÓÚʹÓüÓÃܼ¼ÊõÒþ²ØÒªº¦Êý¾Ý £¬Ö§³ÖÖÖÖÖCPU¼Ü¹¹ £¬ÀûÓÃÂþÑÜʽC&CÍøÂç¹ÜÀíÔËÓª £¬²¢Ìṩ¶àÖÖDDoS¹¥»÷ÒªÁì¡£¶Ì¶ÌÒ»¸öÔÂÄÚ £¬Gorilla BotnetÊÍ·ÅÁËÁè¼Ý30ÍòÌõ¹¥»÷ÃüÁî £¬Æ½¾ùÿÌì¸ß´ï2ÍòÌõ¡£Òªº¦»ù´¡ÉèÊ©Èç´óѧ¡¢Õþ¸®ÍøÕ¾¡¢µçÐÅ¡¢ÒøÐкÍÓÎϷƽ̨µÈÒ²³ÉΪÊܺ¦Õß¡£´ËÍâ £¬Gorilla Botnet»¹½ÓÄÉKeksecºÚ¿Í×éÖ¯³£ÓõļÓÃÜËã·¨ £¬ÄÑÒÔ¼ì²âºÍ·ÖÎö £¬²¢ÀûÓ鶴°²×°×Ô¶¯Ö´ÐеķþÎñ £¬ÌåÏÖ³öÇ¿Áҵij־ÃÐÔ¡£×éÖ¯Ó¦¼ÓÇ¿ÍøÂçÄþ¾² £¬Ê¹Ó÷À»ðǽ¡¢ÈëÇÖ¼ì²âϵͳ£¨IDS£©ºÍ»ùÓÚÔƵÄDDoS± £»¤µÈ´ëÊ© £¬ÒÔÓ¦¶ÔÈÕÒæÑÏÖصÄGorilla BotnetÍþв¡£


https://hackread.com/mira-gorilla-botnet-ddos-attacks-hit-100-countries/


4. »¥ÁªÍøµµ°¸¹ÝÔÙ´ÎÒò·ÃÎÊÁîÅƱ»µÁ¶øÔâÈëÇÖ


10ÔÂ20ÈÕ £¬»¥ÁªÍøµµ°¸¹ÝÔÙ´ÎÔâµ½ÈëÇÖ £¬Õâ´ÎÊÇÔÚÆäZendeskµç×ÓÓʼþÖ§³Öƽ̨ÉÏ¡£ÍþвÐÐΪÕßÉù³Æ £¬ÓÉÓÚ»¥ÁªÍøµµ°¸¹ÝδÕýÈ·ÂÖ»»±»µÁµÄÉí·ÝÑéÖ¤ÁîÅÆ £¬ËûÃǵÃÒÔÈëÇÖ¸Ã×éÖ¯¡£´Ë´ÎÈëÇÖʹµÃÍþвÐÐΪÕßÄܹ»·ÃÎÊ×Ô2018ÄêÒÔÀ´·¢ËÍÖÁinfo@archive.orgµÄ800,000¶àÌõÖ§³ÖƱ֤ £¬°üÂÞÇëÇó´ÓWayback MachineÖÐɾ³ýÒ³ÃæʱÉÏ´«µÄ¸öÈËÉí·ÝÖ¤Ã÷¸½¼þ¡£´ËÇ° £¬BleepingComputerÔø¶à´Î¾¯¸æ»¥ÁªÍøµµ°¸¹Ý £¬ÆäÔ´´úÂëÒÑͨ¹ý̻¶µÄGitLabÉí·ÝÑéÖ¤ÁîÅƱ»µÁ¡£´Ë´ÎÈëÇÖ²¢·Ç³öÓÚÕþÖλò½ðǮԭÒò £¬¶øÊÇΪÁËÌá¸ßÍþвÐÐΪÕßÔÚÍøÂç½ÖÍ·µÄÉùÓþ¡£ËäȻûÓÐÈ˹ûÈ»Éù³ÆʵʩÁË´Ë´ÎÈëÇÖ £¬µ«¾ÝϤ´Ë´ÎÈëÇÖÊÇÔÚÍþвÐÐΪÕßÓëÆäËûÈ˵ÄȺÁÄÖз¢ÉúµÄ £¬Êý¾Ý¿âÏÖÔÚ¿ÉÄÜÕýÔÚÊý¾Ýй¶ÉçÇøÖн»Ò× £¬Î´À´¿ÉÄÜ»áÔÚºÚ¿ÍÂÛ̳Éϱ»Ãâ·Ñй¶¡£


https://www.bleepingcomputer.com/news/security/internet-archive-breached-again-through-stolen-access-tokens/


5. ºÚ¿ÍÀûÓÃÐé¼ÙµÄESETµç×ÓÓʼþÏòÒÔÉ«ÁÐ×éÖ¯·¢ËÍÊý¾Ý²Á³ýÆ÷


10ÔÂ19ÈÕ £¬½üÆÚºÚ¿Íð³äÍøÂçÄþ¾²¹«Ë¾ESET £¬Õë¶ÔÒÔÉ«ÁÐ×éÖ¯ÌᳫÁËÒ»´ÎÍøÂçµöÓã¹¥»÷¡£ËûÃÇ·¢ËÍÉù³ÆÀ´×ÔESETµÄ¶ñÒâµç×ÓÓʼþ £¬¾¯¸æÊÕ¼þÈËÃæÁÙ¹ú¼ÒÖ§³ÖµÄºÚ¿Í¹¥»÷ £¬²¢ÓÕµ¼ËûÃÇÏÂÔØÃûΪ¡°ESET Unleashed¡±µÄ²»´æÔÚ·¨Ê½ £¬ÊµÔòÊÇ°üÂÞ²Á³ýÆ÷¶ñÒâÈí¼þµÄZIPÎļþ £¬Ö¼ÔÚ²Á³ýÊÜѬȾÉè±¹ØÁ¬ÄÊý¾Ý¡£Äþ¾²Ñо¿Ô±Kevin Beaumont½Ò¶ÁËÕâ´Î¹¥»÷ £¬Ö¸³öºÚ¿ÍÍ»ÆÆÁËESETµÄ·ÀÓùϵͳ £¬ÔÚÆä·þÎñÆ÷ÉÏÍйܶñÒâÎļþ¡£È»¶ø £¬ESET·ñÈÏÆä»ù´¡ÉèÊ©Ôâµ½ÈëÇÖ £¬¶øÊÇÖ¸³öÆäÒÔÉ«ÁкÏ×÷»ï°éComsecure·¢ÉúÁËÄþ¾²Ê¼þ¡£ÕâЩµöÓãÓʼþרÃÅÕë¶ÔÒÔÉ«ÁÐ×éÖ¯ÄÚµÄÍøÂçÄþ¾²ÈËÔ± £¬ÇÒ·¢ËÍÈÕÆÚÕýÖµ¹þÂí˹ºÍÆäËû°ÍÀÕ˹̹¼¤½ø×éÖ¯Îä×°ÈëÇÖÒÔÉ«ÁÐÖÜÄê¼ÍÄîÈյĵڶþÌì¡£¾¡¹Ü¾ßÌåÍþвÕßÉв»Çå³þ £¬µ«Ê¹ÓõļÆıÓëÇ×°ÍÀÕ˹̹×éÖ¯HandalaÏàËÆ £¬ºóÕß×î½üÒ²Õë¶ÔÒÔÉ«ÁÐ×éÖ¯·¢¶¯ÁËÅÓ´ó¹¥»÷¡£´Ë´ÎʼþÒѱ»×èÖ¹ £¬µ«Ëü͹ÏÔÁËÍøÂçµöÓã¹¥»÷µÄÁ¬ÐøÍþв £¬²¢Òý·¢Á˶ÔÍøÂçÄþ¾²´ëÊ©ºÍºÏ×÷»ï°é»ù´¡ÉèÊ©Äþ¾²ÐԵĵ£ÓÇ¡£Îª·ÀÖ¹ÀàËƹ¥»÷ £¬×éÖ¯Ó¦ÖØÊÓÑéÖ¤ÏûÏ¢ÕæʵÐÔ²¢ÊµÊ©¸ß¼¶Äþ¾²´ëÊ©¡£


https://hackread.com/hackers-fake-eset-emails-israeli-wiper-malware/


6. ¿Æ¼¼¾ÞÍ·NidecÈ·ÈÏÀÕË÷Èí¼þ¹¥»÷ºóÊý¾Ýй¶


10ÔÂ18ÈÕ £¬ÈÕ±¾µç²úÖêʽ»áÉ磨Nidec Corporation£©Í¨±¨³Æ £¬½ñÄêÔçЩʱºòÆäÔ½ÄÏ·Ö²¿ÈÕ±¾µç²ú¾«Ãܹ¤Òµ¹«Ë¾£¨Nidec Precision£©ÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷¡£ºÚ¿ÍÇÔÈ¡²¢Ð¹Â¶ÁËÊý¾Ýµ½°µÍø £¬¾¡¹ÜÎļþδ±»¼ÓÃÜ £¬µ«Ê¼þÒѵõ½µ÷Í£¡£Ð¹Â¶µÄÊý¾Ý¿ÉÄÜÓÃÓÚ¸üÓÐÕë¶ÔÐÔµÄÍøÂçµöÓã¹¥»÷¡£ºÚ¿Íͨ¹ý»ñÈ¡ÓÐЧµÄVPNÕÊ»§Æ¾Ö¤·ÃÎÊÁË°üÂÞ»úÃÜÐÅÏ¢µÄ·þÎñÆ÷ £¬¹²ÇÔÈ¡ÁË50,694·ÝÎļþ £¬°üÂÞÄÚ²¿Îļþ¡¢ÉÌÒµ»ï°éÀ´ÐÅ¡¢ÂÌÉ«²É¹ºÏà¹ØÎļþ¡¢ÀͶ¯Äþ¾²Ó뽡¿µÕþ²ß¡¢ÉÌÒµÎļþºÍºÏͬµÈ¡£8BASEºÍEverestÀÕË÷Èí¼þÍÅ»ïÉù³Æ¶ÔÏ®»÷ʼþÂôÁ¦ £¬ÆäÖÐEverestÔÚ8ÔÂ8ÈÕÐû²¼Á˾ݳƴÓNidecÇÔÈ¡µÄÊý¾Ý¡£NidecÈÏ¿ÉÕâЩÊý¾ÝÀ´×ÔÆäϵͳ £¬µ«ÈÏΪ鶵ÄÊý¾Ý²»»á¶ÔÆä»òÆä³Ð°üÉÌÔì³ÉÖ±½ÓµÄ²ÆÕþËðʧ £¬Ò²Î´·¢ÏÖÐÅÏ¢±»Î´¾­ÊÚȨʹÓõÄÇé¿ö¡£¸Ã¹«Ë¾ÒѼÓÇ¿ÁËÄþ¾²´ëÊ© £¬²¢ÕýÔÚÅàѵԱ¹¤ÒÔ½µµÍ´ËÀà·çÏÕ¡£


https://www.bleepingcomputer.com/news/security/tech-giant-nidec-confirms-data-breach-following-ransomware-attack/