OneBloodÔâÀÕË÷Èí¼þ¹¥»÷£¬Ï×ѪÕ߸öÈËÐÅϢй¶

Ðû²¼Ê±¼ä 2025-01-15

1. OneBloodÔâÀÕË÷Èí¼þ¹¥»÷£¬Ï×ѪÕ߸öÈËÐÅϢй¶


1ÔÂ13ÈÕ£¬·ÇÓ¯ÀûÏ×Ѫ»ú¹¹OneBlood֤ʵ£¬2024ÄêÏÄÌìÔâÊÜÁËÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÏ×ѪÕߵĸöÈËÐÅÏ¢±»ÇÔÈ¡¡£¸Ã»ú¹¹ÓÚ2024Äê7ÔÂ31ÈÕÊ״ιûÈ»ÁËÕâһʼþ£¬Ö¸³ö¹¥»÷Õß¼ÓÃÜÁËÆäÐéÄâ»ú£¬ÆÈʹÆä½ÓÄÉÊÖ¶¯Á÷³Ì£¬½ø¶øÓ°ÏìÁËѪҺÊÕÂÞ¡¢¼ì²âºÍ·ÖÅ䣬µ¼Ö²¿ÃÅÕïËù·ºÆðÑÏÖØѪҺ¶Ìȱ¡£OneBloodËæ¼´·¢³ö½ô¼±ºôÓõ£¬ÇëÇó¾èÏ×OÐÍѪ¡¢OÐÍѪÒõÐÔѪºÍѪС°å¡£ÉÏÖÜ£¬OneBlood¿ªÊ¼ÏòÊÜÓ°Ïì¸öÈË·¢ËÍÊý¾Ýй¶֪ͨ£¬È·ÈÏй¶·¢ÉúÔÚ2024Äê7ÔÂ14ÈÕ£¬ÇÒÍþвÐÐΪÕßÖ±ÖÁ7ÔÂ29ÈÕ²ÅʧȥÍøÂç·ÃÎÊȨÏÞ¡£Ð¹Â¶Êý¾ÝÖ÷Òª°üÂÞÐÕÃûºÍÉç»áÄþ¾²ºÅÂ루SSN£©£¬ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇԺͽðÈÚÆÛÕ©£¬·çÏÕÁ¬Ðø¶àÄꡣΪ½µµÍ·çÏÕ£¬OneBloodÌṩÁËÒ»ÄêÃâ·ÑÐÅÓüà¿Ø·þÎñ£¬²¢½¨ÒéÊÜÓ°Ïì¸öÈËÉèÖÃÐÅÓö³½áºÍÆÛÕ©¾¯±¨¡£¾¡¹ÜOneBloodÒÑÂÄÐÐ֪ͨÒåÎñ£¬µ«Áù¸öÔµÄÑÓ³ÙÈÔʹÊÜÓ°ÏìÕßÃæÁÙ·çÏÕ¡£Ä¿Ç°£¬ÀÕË÷Èí¼þ¹¥»÷µÄ¾ßÌåÊÜÓ°ÏìÈËÊýÉÐδÅû¶¡£


https://www.bleepingcomputer.com/news/security/oneblood-confirms-personal-data-stolen-in-july-ransomware-attack/


2. ¶íÇ鱨¹ØÁªºÚ¿Í×éÖ¯ÀûÓùþÕþ¸®ÎļþÍøÂçµöÓã¹¥»÷ÖÐÑǹÙÔ±


1ÔÂ13ÈÕ£¬SekoiaÑо¿ÈËÔ±½Òʾ£¬Ò»¸öÓë¶íÂÞ˹Ç鱨²¿ÃÅÏà¹ØÁªµÄºÚ¿Í×éÖ¯£¬ÀûÓÿ´ËƺϷ¨µÄ¹þÈø¿Ë˹̹Õþ¸®Îļþ×÷ΪÍøÂçµöÓãÓÕ¶ü£¬ÀÖ³ÉѬȾºÍ¼àÊÓÁËÖÐÑÇÕþ¸®¹ÙÔ±¡£ÕâЩÎļþ°üÂÞ¹þÈø¿Ë˹̹Õþ¸®µÄÍâ½»ÉùÃ÷¡¢Ðź¯µÈ²Ý¸å£¬ÇÒÄÚÈÝÓëÕæʵÎļþ¸ß¶ÈÏàËÆ£¬ÄÚǶÓжñÒâÈí¼þ¡£¸ÃºÚ¿Í×éÖ¯±»Ö¸ÈÏΪAPT 28£¨Fancy Bear£©£¬ÓëĪ˹¿ÆÖÐÑëÇ鱨¾Ö(GRU)ÓÐÁªÏµ¡£×Ô2024Äê7ÔÂÒÔÀ´£¬¸Ã×éÖ¯ÔÚÖÐÑÇ¡¢¶«ÑǺÍÅ·ÖÞµØÓòÒÑÓÕÆ­ÊýÊ®ÃûÊܺ¦Õߣ¬Ê¹ÓÃHATVIBEºÍCHERRYSPYÁ½ÖÖ¶ñÒâÈí¼þ¡£ÕâЩÎĵµÔÚWordÖÐÖ´ÐжñÒâºêÎļþ£¬½µµÍÉ豸Äþ¾²ÉèÖã¬Éú´æ¶ñÒâÈí¼þ±äÁ¿²¢Æô¶¯ÃØÃÜ·¨Ê½¡£´Ë´Î»î¶¯±»ÃüÃûΪ¡°Ë«»÷¡±¡£¾Ý·ÖÎö£¬HATVIBEÓëZEBROCYºóÃż¼ÊõÖصþ£¬¾ùÖ¸ÏòFancy Bear¡£¾¡¹ÜÉв»Çå³þAPT 28ÈçºÎ»ñÈ¡ÕâЩ¹þÈø¿Ë˹̹Õþ¸®Îļþ£¬µ«Ñо¿ÈËÔ±ÍƲâ¿ÉÄÜͨ¹ýÔçÆÚÍøÂçÐж¯Ð¹Â¶¡¢¿ªÔ´ÊÕ¼¯»òÎïÀíÐж¯»ñµÃ¡£¹þÈø¿Ë˹̹ÒòÔÚÎÚ¿ËÀ¼Õ½ÕùµÈÎÊÌâÉÏÍÑÀë¶íÂÞ˹ӰÏ죬ÒÔ¼°³ÉΪóÒ×ÖØÒª»ï°éºÍ½¨ÉèºËµçÕ¾µÄ¹ú¼Ê¾ºÕù£¬³ÉΪÍøÂç¼äµý»î¶¯µÄÖ÷ҪĿ±ê¡£¶íÂÞ˹ּÔÚÈ·±£¹þÈø¿Ë˹̹ÕþÖÎÒ»Ö£¬µÖÏû¾ºÕù¶ÔÊÖÓ°Ï죬²¢ÀιÌÆäÔڸõØÓòµÄ¾­¼ÃºÍÕ½ÂÔְλ¡£


https://cyberscoop.com/fancy-bear-kazakhstan-russia-sekoia/


3. Aviatrix Controller¸ßΣ©¶´óÂÔƲ¿ÊðÊÜÍþв


1ÔÂ13ÈÕ£¬Aviatrix ControllerÖеÄÒ»¸ö¸ßÑÏÖØÐÔ©¶´£¨CVE-2024-50603£©±»Åû¶ºó£¬¶Ô¶à¸öÔƲ¿Êð×é³ÉÁËÍþв¡£¸Ã©¶´ÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©£¬¶øÇÒÔÚAWSÖеÄĬÈϲ¿Êð´æÔÚȨÏÞÌáÉý·çÏÕ£¬Òò´ËÌرðΣÏÕ¡£Â©¶´ÓÚ1ÔÂ7ÈÕÅû¶£¬ÒÑÓйûÈ»µÄ¿´·¨ÑéÖ¤£¨PoC£©Â©¶´¡£Aviatrix ControllerÓÃÓÚ×ÊÖú¹ÜÀíºÍ×Ô¶¯»¯AWS²¿Ê𣬾¡¹ÜÖ»ÓÐÔ¼3%µÄAWS¿Í»§Ê¹ÓøòúÎµ«ÔÚ65%µÄÔÆ»·¾³ÖУ¬Ëü²¿ÊðÔÚÐéÄâ»úÉÏ£¬´æÔÚºáÏòÒƶ¯Â·¾¶£¬ÔÊÐí¹¥»÷Õß»ñµÃ¹ÜÀíԱȨÏÞ¡£Ñо¿ÈËÔ±ÊӲ쵽Àֳɩ¶´µ¼Ö¶ñÒâÈí¼þ²¿Êð£¬ÈçSilverºóÃźͼÓÃܽٳÖ¡£·ÀÓùÕß¿ÉÒÔÉý¼¶µ½7.2.4996°æ±¾ÒÔÖÆÖ¹¸Ã©¶´£¬²¢×èֹͨ¹ý¶Ë¿Ú443µÄ¹ûÈ»·ÃÎÊ¡£Aviatrix»¹ÌṩÁ˲¹¶¡£¬µ«Ö¸³öÔÚijЩÇé¿öÏ¿ÉÄÜÐèÒªÖØÐÂÓ¦Óá£


https://www.theregister.com/2025/01/13/severe_aviatrix_controller_vulnerability/


4. ¡¶Á÷·Å֮·2¡·ÔâºÚ¿Í¹¥»÷£¬66¸öÍæ¼ÒÕÊ»§±»µÁ


1ÔÂ13ÈÕ£¬¡¶Á÷·Å֮·2¡·ÔâÊÜÁËÒ»ÆðÑÏÖصĺڿ͹¥»÷ʼþ£¬¹¥»÷Õßͨ¹ý͵ȡµÄÒ»¸ö¾ÉSteamÕÊ»§£¬»ñµÃÁËÓë¸ÃÕÊ»§Ïà¹ØÁªµÄ¹ÜÀíÔ±ÕÊ»§·ÃÎÊȨÏÞ¡£Õâһ©¶´Ê¹µÃÍþвÐÐΪÕßÄܹ»¸ü¸ÄÖÁÉÙ66¸öÍæ¼ÒÕÊ»§µÄÃÜÂ룬²¢·ÃÎÊÕâЩÕÊ»§£¬µ¼ÖÂÐí¶àÍæ¼Ò¶ªÊ§ÁËÓÎÏ·ÄÚ¹ºÖõÄÎïÆ·£¬°üÂÞ¹óÖØ×°±¸ºÍ»¨·ÑÊý°ÙСʱ²Å»ñµÃµÄÎïÆ·¡£ÓÉÓÚÈÕÖ¾±£ÁôµÄʱ¼äÏÞÖÆ£¬¿ÉÄÜ»¹Óиü¶àÕÊ»§ÔÚ´Ë´ÎÎ¥¹æÐÐΪÖÐÊÜË𣬵«¾ßÌ巶ΧÒÑÎÞ·¨È·¶¨¡£ÓÎÏ·¿ª·¢ÉÌGrinding Gear GamesµÄÓÎÏ·×ܼà֤ʵÁËÕâ´Î¹¥»÷£¬²¢ÌåÏÖÕâÊÇͨ¹ýÒ»¸ö±»µÁµÄ¹ÜÀíÔ±ÕÊ»§½øÐеÄ¡£Ëû»¹Í¸Â¶£¬ÓÎÏ·ºó¶Ë´æÔÚ´íÎóºÍÄþ¾²Â©¶´£¬±¾¿ÉÒÔ×èÖ¹Õâ´Î¹¥»÷£¬µ«Òź¶µÄÊÇËûÃÇ¡°ÍêÈ«¸ãÔÒÁË¡±¡£¾¡¹Ü¿ª·¢ÉÌÒѾ­½ÓÄÉÁËһЩÄþ¾²´ëÊ©£¬µ«¶ÔÓÚÄÇЩÊÜÓ°ÏìµÄÕÊ»§£¬ËûÃÇÉÐδÐû²¼ÈκÎÅâ³¥¼Æ»®£¬²¢ÌåÏÖÎÞ·¨»Ö¸´±»µÁÎïÆ·¡£´Ë´Îʼþ¶ÔÍæ¼ÒÉçÇøÔì³ÉÁËÖØ´óÓ°Ï죬Ðí¶àÍæ¼Ò¶ÔÓÎÏ·µÄÄþ¾²ÐÔÌåÏÖµ£ÓÇ¡£


https://www.bleepingcomputer.com/news/security/stolen-path-of-exile-2-admin-account-used-to-hack-player-accounts/


5. AWS S3´æ´¢Í°ÔâCodefingerÀÕË÷Èí¼þ¼ÓÃܹ¥»÷


1ÔÂ13ÈÕ£¬Ò»ÖÖеÄÀÕË÷Èí¼þ»î¶¯ÕýÔÚÀûÓÃAWSµÄ·þÎñÆ÷¶Ë¼ÓÃܺͿͻ§ÌṩµÄÃÜÔ¿£¨SSE-C£©À´¼ÓÃÜAmazon S3´æ´¢Í°ÖеÄÊý¾Ý£¬²¢ÒªÇóÖ§¸¶Êê½ð²ÅÆø»ñµÃ½âÃÜÃÜÔ¿¡£ÕâÒ»»î¶¯ÓÉÃûΪ¡°Codefinger¡±µÄÍþвÐÐΪÕßÌᳫ£¬²¢ÒÑÖÁÉÙ¶ÔÁ½ÃûÊܺ¦ÕßʵʩÁ˹¥»÷¡£ÑÇÂíÑ·¼òµ¥´æ´¢·þÎñ£¨S3£©ÊÇÒ»ÖÖ¿ÉÀ©Õ¹¡¢Äþ¾²ÇÒ¸ßËٵŤ¾ß´æ´¢·þÎñ£¬¶øSSE-CÊÇÒ»ÖÖ¼ÓÃÜÑ¡ÏÔÊÐí¿Í»§Ê¹ÓÃ×Ô¼ºµÄ¼ÓÃÜÃÜԿͨ¹ýAES-256Ëã·¨¼ÓÃܺͽâÃÜÊý¾Ý¡£ÔÚCodefingerµÄ¹¥»÷ÖУ¬ÍþвÐÐΪÕßʹÓÃÊÜËðµÄAWSƾ֤¶¨Î»¾ßÓÐÌض¨È¨ÏÞµÄÊܺ¦ÕßÃÜÔ¿£¬È»ºóÔÚµ±µØÉú³É¼ÓÃÜÃÜÔ¿À´¼ÓÃÜÄ¿±êÊý¾Ý¡£ÓÉÓÚAWS²»´æ´¢ÕâЩ¼ÓÃÜÃÜÔ¿£¬Òò´ËÊý¾Ý»Ö¸´±äµÃ²»ÐÐÄÜ£¬³ý·ÇµÃµ½¹¥»÷ÕߵĺÏ×÷¡£¹¥»÷Õß»¹ÉèÖÃÁËΪÆÚÆßÌìµÄÎļþɾ³ý¼Æı£¬²¢ÔÚËùÓÐÊÜÓ°ÏìµÄĿ¼ÖзÅÖÃÊê½ð֪ͨ£¬ÒªÇóÊܺ¦ÕßÔÚÖ¸¶¨µÄ±ÈÌرҵØÖ·ÉÏÖ§¸¶Êê½ð¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬ÑÇÂíÑ·½¨ÒéʵʩÑϸñµÄÄþ¾²Ð­Ò飬²¢ÃãÀøAWS¿Í»§ÉèÖÃÏÞÖÆÐÔ¼Æı£¬·ÀÖ¹ÔÚÆäS3´æ´¢Í°ÉÏʹÓÃSSE-C¡£Í¬Ê±£¬Ó¦½ûÓÃδʹÓõÄAWSÃÜÔ¿£¬¾­³£ÂÖ»»»î¶¯ÃÜÔ¿£¬²¢½«ÕÊ»§È¨ÏÞ±£³ÖÔÚËùÐèµÄ×îµÍ¼¶±ð¡£


https://www.bleepingcomputer.com/news/security/ransomware-abuses-amazon-aws-feature-to-encrypt-s3-buckets/


6. °£Òò»ôÎÂÀí¹¤´óѧÔâÍøÂç¹¥»÷£¬½ô¼±¹Ø±ÕÍøÂ粢ȡÏû½ÌÓý»î¶¯


1ÔÂ13ÈÕ£¬°£Òò»ôÎÂÀí¹¤´óѧÔÚÖÜÁùÍíÉÏ9µã×óÓÒ¼ì²âµ½ÍøÂç¹¥»÷ºó£¬Ñ¸ËÙ½ÓÄÉÁ˹رÕÍøÂçµÄ´ëÊ©ÒÔ·ÀÖ¹¸üÑÏÖصĺó¹û¡£¾¡¹Ü´Ë¾Ùµ¼ÖÂÒÀÀµ´óѧÍøÂçµÄÉèÊ©£¨Èçµç×ÓÓʼþ¡¢WiFiºÍʳÌÃÊÕÒø»ú£©ÎÞ·¨Ê¹Ó㬵«Ñ§ÉúºÍÔ±¹¤ÈÔ¿ÉÒÔ½øÈëУ԰¡£´óѧÔÚÖÜÈÕ·¢±íÉùÃ÷³Æ£¬ÓÉÓÚѧÉúÕýÔÚ×¼±¸¿¼ÊÔ£¬Ô¤¼Æ´Ë´ÎÍøÂç¹¥»÷¶Ô½Ìѧʱ¼äµÄÓ°Ï콫ÓÐÏÞ£¬Í¬Ê±Ç¿µ÷ÆäITÈËÔ±ÕýÔÚÈ«Á¦ÊÓ²ì´Ë´Î¹¥»÷£¬²¢Ö¸³öÄ¿Ç°ÉÐÎÞ¼£Ïó±íÃ÷Êý¾Ý±»µÁ¡£¸±Ð£³¤ÅÁÌØÀï¿Ë¡¤¸ñ³Ìغú˹ÌåÏÖ£¬ËûÃÇÒâʶµ½¹Ø±ÕÍøÂç»á´øÀ´ÑÏÖغó¹û£¬µ«ÕâÊÇΪÁË·ÀÖ¹¸üÔã¸âµÄ½á¹û·¢Éú£¬²¢Ï£ÍûµÃµ½¸÷È˵ÄÀí½â¡£¾¡¹Ü´Ë´Î¹¥»÷µÄ¾ßÌåÐÔÖÊÉÐδÅû¶£¬µ«Å·ÖÞÐí¶àÀí¹¤´óѧ½üÄêÀ´¶¼Êܵ½ÁËÀÕË÷Èí¼þ×éÖ¯µÄÓ°Ïì¡£ÖµµÃ×¢ÒâµÄÊÇ£¬¾¡¹Ü°£Òò»ôÎÂÀí¹¤´óѧÓëÐí¶àÆóÒµ±£³Ö×ÅÁªÏµ£¬µ«Ä¿Ç°Ã»Óм£Ïó±íÃ÷ÕâЩÆóÒµ¿ÉÄÜÊܵ½Ó°Ïì¡£


https://therecord.media/tu-eindhoven-cyberattack-lectures-canceled