MUT-1244ÍþвÐÐΪÕß´ó¹æÄ£ÇÔÈ¡WordPressƾ֤¼°Ãô¸ÐÐÅÏ¢
Ðû²¼Ê±¼ä 2024-12-171. MUT-1244ÍþвÐÐΪÕß´ó¹æÄ£ÇÔÈ¡WordPressƾ֤¼°Ãô¸ÐÐÅÏ¢
12ÔÂ14ÈÕ£¬ÃûΪMUT-1244µÄÍþвÐÐΪÕßÔÚÒ»³¡³¤´ïÒ»ÄêµÄ´ó¹æÄ£»î¶¯ÖУ¬Í¨¹ýľÂí²¡¶¾Ñ¬È¾µÄWordPressƾ֤¼ì²éÆ÷ÇÔÈ¡ÁËÁè¼Ý390,000¸öWordPressƾ֤¡£Í¬Ê±£¬¸ÃÐÐΪÕß»¹´ÓÊý°ÙÃûÊܺ¦Õߣ¨°üÂÞºì¶Ó³ÉÔ±¡¢ÉøÍ¸²âÊÔÈËÔ±¡¢Äþ¾²Ñо¿ÈËÔ±ÒÔ¼°¶ñÒâÐÐΪÕߣ©µÄÊÜѬȾϵͳÖÐ͵ȡÁËSSH˽ԿºÍAWS·ÃÎÊÃÜÔ¿¡£¹¥»÷ÕßÀûÓñ»Ä¾Âí»¯µÄGitHub´æ´¢¿âÍÆËͶñÒâ¿´·¨Ñé֤©¶´ºÍ½øÐÐÍøÂçµöÓã»î¶¯£¬ÆÛÆÄ¿±ê°²×°Î±×°³ÉCPU΢Âë¸üеļÙÄÚºËÉý¼¶¡£ÕâЩ´æ´¢¿âÔö¼ÓÁËÆäºÏ·¨ÐÔ£¬Ê¹µÃÄþ¾²×¨ÒµÈËÔ±ºÍÍþвÐÐΪÕ߸üÈÝÒ×ÔËÐÐËüÃÇ¡£¹¥»÷Õßͨ¹ýGitHub reposÒÔ¶àÖÖ·½Ê½Í¶·ÅÓÐÐ§ÔØºÉ£¬°üÂÞ´øÓкóÃŵÄÅäÖñàÒëÎļþ¡¢¶ñÒâPDFÎļþ¡¢PythonͶ·ÅÆ÷ÒÔ¼°¶ñÒânpm°ü¡£´Ë´Î¹¥»÷»î¶¯ÓëÁíÒ»´Î³¤´ïÒ»ÄêµÄ¹©Ó¦Á´¹¥»÷ÓÐÖØµþ£¬ÆäÖÐÉæ¼°ÇÔÈ¡Êý¾ÝºÍÍÚ¾òÃÅÂÞ±Ò¼ÓÃÜ»õ±Ò¡£MUT-1244Äܹ»·ÃÎʲ¢Ð¹Â¶Ë½ÈËSSHÃÜÔ¿¡¢AWSƾ֤µÈÃô¸ÐÐÅÏ¢£¬²¢ÀûÓÃÍøÂçÄþ¾²ÉçÇøÄÚµÄÐÅÈΣ¬ÔÚÄ¿±ê²»ÖªÇéµÄÇé¿öÏÂÖ´ÐжñÒâÈí¼þ£¬ÈëÇÖÁËÊýʮ̨»úÆ÷¡£
https://www.bleepingcomputer.com/news/security/390-000-wordpress-accounts-stolen-from-hackers-in-supply-chain-attack/
2. CISA½«Cleo©¶´CVE-2024-50623Ìí¼Óµ½ÆäÒÑÖª±»ÀûÓ鶴Ŀ¼ÖÐ
12ÔÂ14ÈÕ£¬ÃÀ¹úÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£¨CISA£©Òѽ«Ó°ÏìCleo²úÎïµÄ©¶´CVE-2024-50623£¨CVSSÆÀ·Ö8.8£©ÁÐÈëÆäÒÑÖªÀûÓé¶´£¨KEV£©Ä¿Â¼ÖС£Cleo¹«Ë¾·¢ÏÖÁËÒ»¸ö²»ÊÜÏÞÖÆµÄÎļþÉÏ´«ºÍÏÂÔØÂ©¶´£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¬²¢½¨Òé¿Í»§Á¢¼´½«Harmony¡¢VLTraderºÍLexiComʵÀýÉý¼¶µ½×îв¹¶¡°æ±¾5.8.0.21ÒÔ½â¾öDZÔÚ¹¥»÷ý½é¡£È»¶ø£¬Äþ¾²¹«Ë¾Huntress³ÂË߳ƣ¬¼´Ê¹°²×°Á˸ò¹¶¡£¬ÔËÐÐ5.8.0.21µÄϵͳÈÔ¿ÉÄܱ»ÀûÓá£Huntress·¢ÏÖÁËÕë¶ÔCleoÎļþ´«ÊäÈí¼þµÄÖ÷¶¯¹¥»÷£¬²¢¹ûÈ»ÁËÉæ¼°ÈýÖÖCleo²úÎïµÄÁ¬Ðø¹¥»÷¡£Ê×ϯÄþ¾²Ñо¿Ô±Caleb Stewart¿ª·¢ÁËÀûÓÃÈÎÒâÎļþдÈë©¶´µÄPython½Å±¾£¬²¢Ö¤ÊµÁË©¶´µÄÓÐЧÐÔ¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê1ÔÂ3ÈÕ֮ǰÐÞ¸´´Ë©¶´£¬×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄ©¶´£¬ÒÔ±£»¤ÍøÂçÃâÊܹ¥»÷¡£
https://securityaffairs.com/171973/security/u-s-cisa-adds-cleo-harmony-vltrader-and-lexicom-flaw-to-its-known-exploited-vulnerabilities-catalog.html
3. ConnectOnCallÔ¶³ÌÒ½ÁÆÆ½Ì¨ÔâÖØ´óÊý¾Ýй¶
12ÔÂ16ÈÕ£¬ConnectOnCallÊÇÒ»¸öרעÓÚ¼ÓǿҽÁÆ·þÎñÌṩÕßÓ뻼ÕßÏàͬµÄÔ¶³ÌÒ½ÁÆÆ½Ì¨£¬½üÈÕÅû¶ÁËÒ»ÆðÖØ´óÊý¾Ýй¶Ê¼þ£¬Ó°ÏìÁè¼Ý900,000È˵ĸöÈËÐÅÏ¢¼°Ò½ÁÆÐÅÏ¢Äþ¾²¡£¸Ãƽ̨Ìṩ×Ô¶¯»¼Õߺô½Ð¸ú×Ù¡¢HIPAAºÏ¹æÁÄÌ칦Ч£¬²¢Óëµç×Ó½¡¿µ¼Ç¼ϵͳ¼¯³É¡£5ÔÂ12ÈÕ£¬ConnectOnCall·¢ÏÖÄþ¾²Â©¶´£¬¾ÊÓ²ìÈ·ÈÏ£¬2024Äê2ÔÂ16ÈÕÖÁ5ÔÂ12ÈÕÆÚ¼ä£¬ÓÐδ֪µÚÈý·½·ÃÎÊÁËÆ½Ì¨¼°Ó¦Ó÷¨Ê½ÄڵIJ¿ÃÅÊý¾Ý£¬°üÂÞÒ½»¼Í¨ÐÅÐÅÏ¢¡£Ê¼þÆØ¹âºó£¬¹«Ë¾Ñ¸ËÙÆ¸ÇëÍøÂçÄþ¾²×¨¼Ò£¬ÏÂÏß²úÎ²¢ÔÚÄþ¾²»·¾³ÖнøÐÐÊý¾Ý»Ö¸´£¬Í¬Ê±Í¨ÖªÁËÁª°îÖ´·¨²¿ÃÅ¡£Ð¹Â¶ÐÅÏ¢¿ÉÄܰüÂÞÐÕÃû¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢Éç»á±£Ïպš¢Ò½ÁƼǼºÅ¼°½¡¿µ×´¿öµÈ¡£¾¡¹ÜĿǰδ·¢ÏÖÐÅÏ¢ÀÄÓûò»¼ÕßÊܺ¦Çé¿ö£¬ConnectOnCallÈÔ½¨ÒéÊÜÓ°Ïì¸öÈ˱£³Ö¾¯Ì裬²¢³ÂËß¿ÉÒÉÉí·Ý͵ÇÔ»òÆÛÕ©ÐÐΪ¡£¹«Ë¾ÒÑÏòÖ´·¨²¿ÃųÂËß²¢Í¨ÖªÊÜÓ°Ïì¸öÈË£¬ÎªÆäÖÐÓÐÏÞÊýÁ¿µÄÉç»áÄþ¾²ºÅÂëÊÜÓ°ÏìÕßÌṩÉí·ÝºÍÐÅÓÃ¼à¿Ø·þÎñ£¬Í¨¹ýÓʼÄ֪ͨÐŵķ½Ê½¼û¸æÏà¹ØÇé¿ö¡£
https://securityaffairs.com/172053/data-breach/connectoncall-data-breach-impacted-over-900000-individuals.html
4. µÂ¿ËÈøË¹Àí¹¤´óѧ½¡¿µ¿ÆÑ§ÖÐÐÄÔâÍøÂç¹¥»÷
12ÔÂ16ÈÕ£¬µÂ¿ËÈøË¹Àí¹¤´óѧ½¡¿µ¿ÆÑ§ÖÐÐļ°Æä°£¶ûÅÁË÷·ÖУ½üÆÚÔâÊÜÁËÒ»´ÎÍøÂç¹¥»÷£¬µ¼Ö¼ÆËã»úϵͳºÍÓ¦Ó÷¨Ê½Öжϣ¬²¢¿ÉÄÜй¶ÁË140ÍòÃû»¼ÕßµÄÃô¸ÐÊý¾Ý¡£¸Ã»ú¹¹ÊÇÒ»¼Ò¹«¹²Ñ§ÊõÒ½ÁÆ»ú¹¹£¬ÂôÁ¦½ÌÓý¡¢ÅàѵºÍ»¼Õß»¤Àí·þÎñ¡£¹¥»÷µ¼ÖÂ2024Äê9ÔÂ17ÈÕÖÁ9ÔÂ29ÈÕÆÚ¼ä´Ó¸Ã»ú¹¹ÍøÂçÖзÃÎÊ»òɾ³ýÁËijЩÎļþºÍÎļþ¼Ð¡£¿ÉÄÜй¶¸øºÚ¿ÍµÄÐÅÏ¢°üÂÞÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØÖ·¡¢Éç»áÄþ¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢Õþ¸®Éí·ÝÖ¤ºÅÂë¡¢²ÆÕþÕË»§ÐÅÏ¢¡¢½¡¿µ±£ÏÕÐÅÏ¢¡¢Ò½ÁÆÐÅÏ¢¡¢Õ˵¥/Ë÷ÅâÊý¾Ý¡¢Õï¶ÏºÍÖÎÁÆÐÅÏ¢µÈ¡£¸Ã»ú¹¹ÒÑ֪ͨÊÜÓ°ÏìµÄÈË£¬²¢ÎªËûÃÇÌṩÃâ·ÑµÄÐÅÓÃ¼à¿Ø·þÎñ¡£½¨ÒéÊÜÓ°ÏìµÄ¸öÈ˱£³Ö¾¯Ì裬·À·¶Ç±ÔÚµÄÍøÂçµöÓãºÍÉç»á¹¤³Ì¹¥»÷£¬²¢¼à¿ØËûÃǵÄÐÅÓóÂËߺͽ¡¿µ±£ÏÕÕ˵¥¡£¾Ý³Æ£¬´Ë´Î¹¥»÷ÓÉÃûΪInterlockµÄÀÕË÷Èí¼þ×éÖ¯ÂôÁ¦£¬¸Ã×é֯й¶ÁË210Íò¸öÎļþ£¬×ܼÆ2.6TBµÄÊý¾Ý£¬¾Ý³ÆÊǴӸûú¹¹ÇÔÈ¡µÄ¡£InterlockË÷ÒªµÄÊê½ð½ð¶î´ÓÊýÊ®ÍòÃÀÔªµ½Êý°ÙÍòÃÀÔª²»µÈ¡£
https://www.bleepingcomputer.com/news/security/texas-tech-university-system-data-breach-impacts-14-million-patients/
5. ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯Á÷´«Lumma StealerÐÅÏ¢ÇÔÈ¡Èí¼þ
12ÔÂ16ÈÕ£¬Ò»ÏîÃûΪ¡°DeceptionAds¡±µÄ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯ÕýÔÚÀûÓÃMonetag¹ã¸æÍøÂçÁ÷´«Lumma StealerÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¸Ã»î¶¯Í¨¹ýÐé¼ÙµÄCAPTCHAÑéÖ¤Ò³ÃæÓÕÆÓû§ÔËÐжñÒâPowerShellÃüÁ´Ó¶øÑ¬È¾¶ñÒâÈí¼þ¡£Guardio LabsºÍInfobloxµÄÑо¿ÈËÔ±·¢ÏÖ£¬ÕâÒ»²Ù×÷ÓÉÃûΪ¡°Vane Viper¡±µÄÍþвÐÐΪÕßʵʩ£¬ÀûÓúϷ¨¹ã¸æÍøÂçÉϵĴó¹æÄ£¹ã¸æ½«Óû§´øµ½Ðé¼ÙµÄCAPTCHAÒ³Ãæ¡£CAPTCHAÒ³Ãæ°üÂÞJavaScript´úÂ룬½«¶ñÒâPowerShellÃüÁî¸´ÖÆµ½Óû§¼ôÌù°å£¬²¢ÓÕµ¼Óû§Ö´ÐС£Lumma Stealer¿É´Óä¯ÀÀÆ÷ÖÐÇÔÈ¡cookie¡¢Æ¾¾Ý¡¢ÃÜÂë¡¢ÐÅÓÿ¨ºÍä¯ÀÀÀúÊ·¼Ç¼£¬ÒÔ¼°¼ÓÃÜ»õ±ÒÇ®°ü¡¢Ë½Ô¿ºÍÃô¸ÐÎı¾Îļþ¡£GuardioLabsÒÑÏòMonetagºÍBeMob³ÂËß´ËÀÄÓÃÐÐΪ£¬²¢µÃµ½¼°Ê±ÏìÓ¦¡£È»¶ø£¬¸Ã»î¶¯ÔÚ12Ô·ºÆðËÕÐÑ£¬±íÃ÷ÍþвÐÐΪÕßÊÔͼͨ¹ý²îÒì¹ã¸æÍøÂç»Ö¸´ÔËÓª¡£Óû§Ó¦ÖÆÖ¹Ö´ÐÐÍøÕ¾ÌáʾµÄÃüÁî£¬ÌØ±ðÊÇÄÇЩ¼Ù×°ÐÞ¸´»òÑéÖ¤ÂëµÄÃüÁ²¢½÷É÷ʹÓõÁ°æÈí¼þ»ò·Ç·¨Á÷ýÌåÍøÕ¾¡£
https://www.bleepingcomputer.com/news/security/malicious-ads-push-lumma-infostealer-via-fake-captcha-pages/
6. Â޵µºÖÝRIBridgesϵͳÔâBrain CipherÀÕË÷Èí¼þ¹¥»÷
12ÔÂ16ÈÕ£¬Â޵µºÖݾ¯¸æ³Æ£¬ÆäÓɵÂÇÚ¹ÜÀíµÄRIBridgesϵͳÔâÊÜÁËBrain CipherÀÕË÷Èí¼þÍÅ»ïµÄÈëÇÖ£¬µ¼ÖÂÊý¾Ýй¶£¬Ì»Â¶Á˾ÓÃñµÄ¸öÈËÐÅÏ¢¡£RIBridgesÊǸÃÖÝÓÃÓÚ¹ÜÀíºÍÌṩ¹«¹²Ô®Öú¼Æ»®µÄÏÖ´ú×ÛºÏ×ʸñϵͳ¡£´Ë´ÎʼþÓÚ2024Äê12ÔÂ5ÈÕ±»·¢ÏÖ£¬µÂÇÚÆÀ¹ÀºóÈÏΪºÚ¿Í¿ÉÄÜÇÔÈ¡Á˰üÂÞ¸öÈËÉí·ÝÐÅÏ¢ºÍÆäËûÊý¾ÝµÄÎļþ¡£ÊÜÓ°ÏìµÄÏîÄ¿°üÂÞÒ½ÁƲ¹Öú¡¢Ôö²¹ÓªÑøÔ®Öú¼Æ»®¡¢Æ¶À§¼ÒÍ¥ÁÙʱԮÖúµÈ¶à¸ö¹«¹²·þÎñÏîÄ¿¡£¾¡¹Üй¶µÄÊý¾ÝÈÔÔÚÆÀ¹ÀÖУ¬µ«¿ÉÄܰüÂÞÐÕÃû¡¢µØÖ·¡¢³öÉúÈÕÆÚ¡¢Éç»áÄþ¾²ºÅÂëºÍÄ³Ð©ÒøÐÐÐÅÏ¢¡£ÊÜÓ°ÏìµÄ¼ÒÍ¥½«Í¨¹ýÓʼþÊÕµ½Í¨Öª£¬²¢¿ÉÖµçרÓúô½ÐÖÐÐÄѰÇóÖ§³Ö¡£Â޵µºÖÝÕþ¸®½¨Òé¾ÓÃñÖØÖÃÃÜÂë¡¢ÉèÖÃÆÛÕ©¾¯±¨ºÍÐÅÓö³½á£¬²¢Æô¶¯ÒøÐÐÌṩµÄÄþ¾²´ëÊ©¡£µÂÇÚ·¢ÑÔÈËÈ·ÈÏ£¬Â޵µºÖݵÄϵͳÊÇÊܵ½Brain CipherÊý¾Ýй¶ӰÏìµÄ¡°µ¥Ò»¿Í»§¶Ëϵͳ¡±£¬²¢ÌåÏÖ½«Óë¿Í»§ºÍÖ´·¨¹ÙÔ±ºÏ×÷Õ¹¿ªÊӲ졣
https://www.bleepingcomputer.com/news/security/rhode-island-confirms-data-breach-after-brain-cipher-ransomware-attack/