MoneyGramÔâÓöÍøÂç¹¥»÷ £¬ÏµÍ³ÖжÏÒý·¢¹ã·º¹Ø×¢

Ðû²¼Ê±¼ä 2024-09-26
1. MoneyGramÔâÓöÍøÂç¹¥»÷ £¬ÏµÍ³ÖжÏÒý·¢¹ã·º¹Ø×¢


9ÔÂ24ÈÕ £¬»ã¿î¾ÞÍ·MoneyGram×ÔÉÏÖÜÎåÆðÔâÓöϵͳÖжÏ £¬²¢È·ÈÏÕâÊÇÓÉÍøÂç¹¥»÷ËùÖ ¡£¾¡¹Ü´Ëǰ¹«Ë¾½öÌá¼°¡°ÍøÂçÖжϡ± £¬Î´Ã÷ȷ˵Ã÷Ô­Òò £¬Ö±ÖÁÖÜÒ»²ÅÕýʽͨ¸æÍøÂçÄþ¾²Ê¼þÊÇÆäϵͳ̱»¾µÄȪԴ ¡£MoneyGram×÷ΪȫÇòµÚ¶þ´ó»ã¿î·þÎñÌṩÉÌ £¬Æä·þÎñÁýÕÖ200¸ö¹ú¼ÒµÄ350,000¸öÍøµã¼°ÏßÉÏÆ½Ì¨ £¬Äê½»Ò×Á¿³¬1.2ÒÚ±Ê ¡£´Ë´Î¹¥»÷µ¼ÖÂÓû§ÎÞ·¨Íê³É½»Ò×»ò·ÃÎÊ×ʽð £¬ÍøÕ¾Ò²ÎÞ·¨Ê¹Óà £¬Òý·¢Á˹㷺¹Ø×¢ºÍµ£ÓÇ ¡£¹«Ë¾Ñ¸ËÙ½ÓÄÉÐж¯ £¬½«ÊÜÓ°ÏìµÄϵͳÏÂÏßÒÔÍ£Ö¹¹¥»÷ £¬²¢ÓëÍⲿר¼ÒºÍÖ´·¨²¿ÃŽôÃܺÏ×÷ÒÔ»Ö¸´·þÎñ ¡£MoneyGramÇ¿µ÷Á˶ÔʼþÑÏÖØÐÔµÄÈÏʶ £¬²¢ÔÊÐí¾¡¿ì»Ö¸´ÏµÍ³Õý³£ÔËÐÐ ¡£È»¶ø £¬¹ØÓÚϵͳ»Ö¸´µÄ¾ßÌåʱ¼ä±íÉÐδÐû²¼ £¬ÌåÏÖ¹¥»÷¿ÉÄÜÈÔÔÚÁ¬Ðø»ò»Ö¸´ÊÂÇé´¦ÓÚ³õÆÚ½×¶Î ¡£¾¡¹Ü¹¥»÷ÀàÐÍÉÐδ¹ûÈ» £¬µ«³¤Ê±¼äµÄ·þÎñÖжϺÍÁ¬½ÓÎÊÌâÇ¿ÁÒÌåÏÖÕâ¿ÉÄÜÊÇÒ»ÆðÀÕË÷Èí¼þ¹¥»÷ ¡£¼øÓÚMoneyGramÅÓ´óµÄÓû§»ù´¡ £¬´Ë´ÎʼþÈôÉæ¼°Êý¾Ýй¶ £¬ÆäDZÔÚÓ°Ï콫¼«ÎªÉîÔ¶ ¡£


https://www.bleepingcomputer.com/news/security/moneygram-confirms-a-cyberattack-is-behind-dayslong-outage/


2. ºÚ¿ÍÒ»ÖÜÄÚµÚÈý´ÎÏ®»÷´÷¶û £¬500MBÃô¸ÐÊý¾ÝÔâй¶


9ÔÂ25ÈÕ £¬ºÚ¿Í¡°grep¡±ÔÙ´ÎÕë¶Ô¿Æ¼¼¾ÞÍ·´÷¶û·¢¶¯¹¥»÷ £¬Ò»ÖÜÄÚµÚÈý´ÎÔì³ÉÊý¾Ýй¶ £¬´Ë´Îй¶ÁËÔ¼500MBµÄÃô¸ÐÊý¾Ý £¬°üÂÞÄÚ²¿Îĵµ¡¢Í¼Æ¬¡¢²âÊÔÊÓÆµ¼°¶àÖØÉí·ÝÑéÖ¤£¨MFA£©Êý¾Ý ¡£´÷¶ûÖÁ½ñδ×ö³öÕýʽ»ØÓ¦ £¬¶øºÚ¿Í¡°grep¡±Ôò¹ûÈ»Ðû³Æ¶Ô´Ë´Îй¶ÂôÁ¦ £¬²¢ÌåÏÖËùÓÐÊý¾Ý¾ùÔ´×Ôµ¥´ÎÈëÇÖ £¬Ö»ÊǼÆÄ±ÐԵطÖÅúÆØ¹â ¡£Ð¹Â¶µÄÐÅÏ¢Öк­¸ÇÁËÄÚ²¿Æ±Îñϵͳϸ½Ú¡¢Öйú»ù´¡ÉèÊ©ÏîÄ¿Îļþ¼°Äþ¾²Ïà¹ØÎĵµ £¬Ò»µ©ÕâЩÃô¸ÐÐÅÏ¢±»²»Í×ÀûÓà £¬½«¶Ô´÷¶ûµÄÔËÓªÄþ¾²×é³ÉÑÏÖØÍþв ¡£2024Äê 9 Ô 19 ÈÕ £¬¡°grep¡±Ð¹Â¶ÁËÁè¼Ý 12,000 Ãû´÷¶ûÔ±¹¤µÄÊý¾Ý £¬Òý·¢ÁËÄÚ²¿ÊÓ²ì ¡£¼¸Ììºó £¬¼´ 9 Ô 22 ÈÕ £¬¸ü¶àÃô¸ÐµÄÄÚ²¿Îļþ±»Ð¹Â¶ £¬¾Ý³ÆÊÇ´÷¶ûʹÓà Atlassian ¹¤¾ßʱй¶µÄ ¡£½ØÖÁĿǰ £¬´÷¶ûÉÐδȷÈÏ´Ë´ÎÊý¾Ýй¶µÄ¾ßÌåÓ°Ï췶Χ¼°ÊÇ·ñÉæ¼°µÚÈý·½Â©¶´ £¬Ò»ÖÜÄÚ·¢ÉúÈýÆðÊý¾Ýй¶Ê¼þ £¬ÈËÃǶԴ÷¶ûÍøÂçÄþ¾²µÄµ£ÓÇÓëÈÕ¾ãÔö ¡£


https://hackread.com/dell-data-leak-in-week-amid-grep-cyberattacks/


3. ÍøÂçÄþ¾²Ñо¿ÈËÔ±¾¯¸æÐÂÐÍ»ùÓÚRustµÄSplinterºóÀûÓù¤¾ß


9ÔÂ25ÈÕ £¬ÍøÂçÄþ¾²ÁìÓò½üÆÚ·¢ÏÖÁËÒ»ÖÖÃûΪSplinterµÄÐÂÐͺóÀûÓúì¶Ó¹¤¾ß £¬¸Ã¹¤¾ßÓÉPalo Alto Networks Unit 42ÔÚ¿Í»§ÏµÍ³ÖÐʶ±ð²¢Ðû²¼ ¡£SplinterÓÉRustÓïÑÔ±àд £¬Ë书Ч²»ÈçCobalt StrikeµÈ¸ß¼¶¹¤¾ßÈ«Ãæ £¬µ«Èç±»ÀÄÓà £¬ÈÔ¶Ô×éÖ¯Äþ¾²×é³ÉDZÔÚ·çÏÕ ¡£¸Ã¹¤¾ßרΪºì¶ÓÐж¯Éè¼Æ £¬ÓÃÓÚʶ±ðÆóÒµÍøÂçÖеÄÄþ¾²Â©¶´ £¬µ«Í¬Ñù´æÔÚ±»¶ñÒâÀûÓõķçÏÕ ¡£Ä¿Ç° £¬ÉÐÎÞÖ¤¾Ý±íÃ÷SplinterÓë¾ßÌåÍþвÐÐΪÕßÏà¹ØÁª £¬ÇÒÆäÅÓ¸ÅÂÔ»ýÖ÷Òª¹éÒòÓÚ°üÂÞµÄRust¿âÊýÁ¿ ¡£Splinter¾ß±¸¶àÖÖ¹¦Ð§ £¬ÈçÖ´ÐÐWindowsÃüÁî¡¢Ô¶³Ì½ø³Ì×¢Èë¡¢ÎļþÉÏ´«ÏÂÔØ¡¢ÔÆ·þÎñÕË»§ÐÅÏ¢ÊÕ¼¯¼°×ÔÎÒɾ³ýµÈ £¬ÕâЩ¾ùͨ¹ýÆäÅäÖõÄC2·þÎñÆ÷½ÓÊÕÈÎÎñʵÏÖ ¡£´ËÍâ £¬½üÆÚ»¹ÆØ¹âÁËÆäËû¼¸Öָ߼¶¹¥»÷¼¼Êõ £¬Èçͨ¹ýMicrosoft Office RPC½Ó¿ÚºÍ¶ñÒâµæÆ¬ÊµÏÖµÄÒþÃØ´úÂë×¢ÈëÓëȨÏÞÌáÉý £¬ÒÔ¼°ÀûÓÃThread Name-Calling¼¼ÊõÈÆ¹ý¶Ëµã±£»¤½øÐнø³Ì×¢Èë ¡£ÕâЩ·¢ÏÖÇ¿µ÷ÁËÔÚÍøÂçÄþ¾²ÁìÓò±£³ÖÔ¤·ÀºÍ¼ì²âÄÜÁ¦µÄÖØÒªÐÔ £¬ÒòΪ·¸×ï·Ö×ӻ᲻ͣ½ÓÄÉм¼ÊõÍþв×éÖ¯Äþ¾² ¡£


https://thehackernews.com/2024/09/cybersecurity-researchers-warn-of-new.html


4. ÒÆ¶¯ÍøÂçµöÓãÍþв¼¤Ôö £¬82%µöÓãÍøÕ¾Ãé×¼ÒÆ¶¯É豸


9ÔÂ25ÈÕ £¬Ëæ×ÅÒÆ¶¯ÍøÂçµöÓã¹¥»÷µÄ¼¤Ôö £¬Áè¼Ý°Ë³ÉµÄÍøÂçµöÓãÍøÕ¾ÏÖÒÑרעÓÚÒÆ¶¯É豸 £¬Ôö³¤ÂÊÏÔÖø ¡£Äþ¾²Ñо¿½Òʾ £¬¶àÊý·¸×ï·Ö×ÓÀûÓÃHTTPSЭÒéαװµöÓãÍøÕ¾Äþ¾² £¬Ôö¼ÓÁËʶ±ðÄѶÈ £¬ÓÈÆäÔÚÒÆ¶¯¶Ë ¡£È«Çò·¶Î§ÄÚ £¬¶ñÒâÈí¼þ¼°ÆóÒµ¼äµýÈí¼þÍþв´ó·ùÔö¼Ó £¬ÌرðÊÇAndroidƽ̨©¶´ÉÏÉýÏÔÖø ¡£Í¬Ê± £¬Á¬½Ó²»Äþ¾²ÍøÂçµÄÉ豸¼¤Ôö £¬Ò½ÁƱ£½¡ÐÐÒµ³ÉÎªÒÆ¶¯ÍøÂçµöÓã¹¥»÷µÄÖØÔÖÇø ¡£×¨¼Ò½¨Òé £¬ÈçÒ½ÁƱ£½¡×éÖ¯Ó¦½ÓÄÉÁãÐÅÈÎÄþ¾²Ä£ÐÍ £¬½áºÏAIÇý¶¯µÄÍþвÇ鱨ƽ̨ÒÔÔöÇ¿·ÀÓù ¡£´ËÍâ £¬¼ÓÇ¿ÒÆ¶¯É豸¹ÜÀí£¨MDM£©¡¢ÊµÊ©¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©ºÍÃÜÂë¹ÜÀí¼ÆÄ±±»ÊÓΪҪº¦·ÀÓù´ëÊ© ¡£¶¨ÆÚ½øÐÐÔ±¹¤Äþ¾²Åàѵ¡¢Â©¶´É¨Ãè¡¢·çÏÕÆÀ¹À¼°Äþ¾²Éó¼ÆÒ²±Ø²»ÐÐÉÙ ¡£Õë¶Ô²àÔØÓ¦Ó÷¨Ê½µÄÄþ¾²·çÏÕ £¬×¨¼ÒÇ¿µ÷ÆäÈÆ¹ý¹Ù·½Éó²é¿ÉÄÜ´øÀ´µÄΣº¦ £¬²¢½¨ÒéÆóÒµÖÆ¶¨ÑϸñÕþ²ßÏÞÖÆ²àÔØÓ¦Óð²×° £¬Í¨¹ýMDMϵͳ¿ØÖÆÓ¦ÓÃȨÏÞ £¬²¢½ÌÓýÔ±¹¤Ê¶±ðÏà¹Ø·çÏÕ ¡£


https://securityboulevard.com/2024/09/mobile-phishing-attacks-explode-enterprise-devices-targeted/


5. RAISECOM GatewayÑÏÖØÂ©¶´CVE-2024-7120±»»ý¼«ÀûÓÃ


9ÔÂ25ÈÕ £¬RAISECOM GatewayÉ豸½üÆÚÆØ¹âµÄCVE-2024-7120©¶´ £¬ÒÔÆä¼«¸ßµÄCVSSÆÀ·Ö9.8 £¬³ÉΪÆóÒµÄþ¾²ÁìÓòµÄÒ»´óÒþÓÇ ¡£´Ë©¶´ÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÊÜÓ°ÏìµÄWeb½çÃælist_base_config.php½Å±¾Ö´ÐÐÈÎÒâÃüÁî £¬Ö±½ÓÍþвµ½°æ±¾3.90µÄMSG1200¡¢MSG2100E¡¢MSG2200¼°MSG2300ÐͺÅÉ豸µÄÄþ¾² £¬¿ÉÄܵ¼ÖÂÑÏÖØµÄÊý¾Ýй¶ºÍϵͳ±»·Ç·¨ÈëÇÖ ¡£Äþ¾²½çÒÑÈ·Èϸé¶´Ò×ÓÚ±»¶ñÒâÀûÓà £¬ÇÒ×Ô9Ô³õÆð £¬¹¥»÷»î¶¯Æµ·± £¬ÓÚ9ÔÂ12ÈÕÖÁ13ÈÕµ½´ïá¯Áë £¬ÏÔʾ³öÍþвÐÐΪÕߵĻý¼«Ì¬ÊÆ ¡£Ãæ¶ÔÕâÒ»½ô¼±×´¿ö £¬¾¡¹ÜRAISECOMÉÐδÐû²¼¹Ù·½²¹¶¡ £¬µ«ÆóÒµÓ¦Á¢¼´½ÓÄÉ´ëÊ©½µµÍ·çÏÕ ¡£Ê×ÒªÈÎÎñÊÇÑϸñÏÞÖÆ¶ÔÉ豸Web½çÃæµÄ·ÃÎÊȨÏÞ £¬½öÔÊÐíÊÜÐÅÈεÄÍøÂçºÍÊÚȨÈËÔ±½ÓÈë ¡£Í¬Ê± £¬¼ÓÇ¿Web½çÃæµÄÊäÈëÑéÖ¤»úÖÆ £¬ÊµÊ©ÑϸñµÄÇåÀí·¨Ê½ £¬ÒÔµÖÓùÃüÁî×¢Èë¹¥»÷ ¡£´ËÍâ £¬²¿Êð¸ßЧµÄÍøÂç¼à¿ØºÍÈëÇÖ¼ì²âϵͳ £¬ÊµÊ±¼à¿ØÍøÂç»î¶¯ £¬¼°Ê±·¢ÏÖ²¢Ó¦¶ÔÈκοÉÒÉÐÐΪ £¬Ò²ÊÇÖÁ¹ØÖØÒªµÄ·À»¤´ëÊ© ¡£


https://securityonline.info/critical-flaw-in-raisecom-gateways-actively-exploited-exposing-thousands-to-remote-attacks/


6. DockerÓëKubernetesÔâÐÂÐͼÓÃÜ»õ±ÒÍÚ¾ò¶ñÒâÈí¼þ¹¥»÷


9ÔÂ25ÈÕ £¬Datadog Security Research½Ò¶ÁËÒ»ÏîÕë¶ÔDockerºÍKubernetes»·¾³µÄÅÓ´ó¶ñÒâÈí¼þ»î¶¯ £¬¸Ã»î¶¯ÀûÓÃÈÝÆ÷±àÅż¼ÊõÖеÄÄþ¾²Â©¶´ £¬ÌرðÊÇ̻¶ÔÚ»¥ÁªÍøÉÏÇÒδÉèÖÃÊʵ±Éí·ÝÑéÖ¤µÄDocker API¶Ëµã £¬½øÐдó¹æÄ£¼ÓÃÜ»õ±ÒÍÚ¾ò ¡£¹¥»÷Õßͨ¹ýɨÃ蹤¾ßʶ±ðÒ×Êܹ¥»÷µÄÈÝÆ÷ £¬²¿ÊðXMRigÍÚ¾òÈí¼þ £¬²¢ÀûÓóõʼ»¯½Å±¾ÏÂÔØÌØ±ð¸ºÔØ¡¢°²×°Êý¾Ý´«Ê乤¾ßºÍ½ø³ÌÒþ²Ø·¨Ê½ £¬ÒÔÔöÇ¿Òþ±ÎÐÔºÍÁ÷´«ÄÜÁ¦ ¡£´Ë¶ñÒâÈí¼þ²»½öÏÞÓÚµ¥Ò»DockerʵÀý £¬»¹Í¨¹ýºáÏòÒÆ¶¯¼¼ÊõÈçkube.lateral.shµÈ½Å±¾ £¬ÔÚÔÆ»ù´¡ÉèÊ©Öй㷺Á÷´« £¬ÌرðÊÇÕë¶ÔKubernetes¼¯Èº £¬ÀûÓÃKubelet API²¿Êð¸ü¶àÍÚ¾òÈÝÆ÷ £¬À©´ó¹¥»÷·¶Î§ ¡£´ËÍâ £¬¹¥»÷Õß»¹ÀûÓÃDocker HubÐû²¼¶ñÒâ¾µÏñ £¬²¢Í¨¹ýÀûÓÃDocker Swarm»·¾³ £¬½«ÊÜѬȾÖ÷»úÄÉÈë½©Ê¬ÍøÂç £¬ÊµÏÖ¼¯ÖпØÖÆ ¡£¸Ã»î¶¯Í¹ÏÔÁËÔÆ»·¾³ÖÐÅäÖôíÎó £¬ÌرðÊÇδ±£»¤Docker API¶ËµãµÄÑÏÖØ·çÏÕ ¡£¹¥»÷ÕßÀûÓÃÕâЩ©¶´ £¬ÒÔ¼«Ð¡µÄ×ÌÈÅÔÚÔÆ»ù´¡ÉèÊ©ÖÐѸËÙÀ©É¢ £¬Ðγɴó¹æÄ£µÄÂþÑÜʽ¼ÓÃÜÍÚ¾òÍøÂç £¬Îª×ÔÉíıȡÀûÒæ ¡£ÎªÓ¦¶Ô´ËÀàÍþв £¬ÔƹÜÀíÔ±ÐèÁ¢¼´½ÓÄÉÐж¯ £¬¼ÓÇ¿Äþ¾²ÅäÖà ¡£


https://securityonline.info/new-malware-campaign-mines-crypto-in-docker-kubernetes/