ThreeAMºÚ¿Í×é֯й¶Carolina ArthritisÒ½ÁÆÊý¾Ý

Ðû²¼Ê±¼ä 2024-10-29

1. ThreeAMºÚ¿Í×é֯й¶Carolina ArthritisÒ½ÁÆÊý¾Ý


10ÔÂ25ÈÕ £¬ºÚ¿Í×éÖ¯ThreeAM½«Æä¹¥»÷Ä¿±êCarolina ArthritisµÄÒ½ÁÆÊý¾ÝÌí¼Óµ½Ð¹ÃÜÍøÕ¾ÉÏ £¬²¢ÔÚ¼¸Ð¡Ê±ÄÚй¶ÁËËùÓÐÇÔÈ¡µÄÊý¾Ý £¬¶øÃ»ÓиøÓè¸ÃÒ½ÁÆ»ú¹¹¸¶¿îÆÚÏÞ»ò¾¯¸æ ¡£ThreeAMÉù³ÆÔÚ9ÔÂ27ÈÕ¹¥»÷Á˸ûú¹¹ £¬²¢¼ÓÃÜÁËÆäÎļþ ¡£±»ÇÔÈ¡µÄÊý¾Ý°üÂÞÊÜHIPAA±£»¤µÄ½¡¿µÐÅÏ¢ £¬Èç¸öÈËÐÅÏ¢¡¢²¡Ê·¡¢Ò½ÁƼǼºÍ¼ì²é½á¹ûµÈ ¡£ThreeAMÔøÓëCarolina ArthritisµÄ¹þÀï˹²©Ê¿½øÐÐ̸ÅÐ £¬µ«Î´Äܸ濢ЭÒé ¡£ThreeAMÔÚÎļþÖз¢ÏÖÁËÒ½ÉúµÄÍËÐÝÕË»§±¨±í £¬²¢¶Ô´ËÌåÏÖ²»Âú ¡£´ËÍâ £¬Ð¹Â¶µÄÎļþ»¹°üÂÞCarolina ArthritisµÄÄÚ²¿ÒµÎñ¼Ç¼ £¬ÈçÔ±¹¤Êý¾Ý¡¢ÈËΪµ¥¡¢Ë°ÎñÐÅÏ¢¡¢401kºÍÆäËû¸£ÀûÐÅÏ¢ £¬ÒÔ¼°¼ÆËã»úÓû§ÃûºÍÃÜÂë ¡£ÐèÒªÉó²é20¶àÄêµÄÎļþ²ÅÆøÈ·¶¨ÐèҪ֪ͨ˭ÒÔ¼°Éæ¼°ÄÄЩÀàÐ͵ÄÐÅÏ¢ ¡£Carolina Arthritisδ¶ÔѯÎÊ×÷³ö»ØÓ¦ £¬Éв»Çå³þÕâ´Î¹¥»÷ÊÇ·ñ¶Ô»¼Õß»¤Àí·¢ÉúÁËÓ°Ïì £¬ÒÔ¼°ËûÃÇÊÇ·ñÓÐÈκοÉÄܱ»¼ÓÃܵϼÕßÎļþµÄ¿ÉÓñ¸·Ý ¡£


https://databreaches.net/2024/10/25/carolina-arthritis-hit-by-threeam-ransomware-attack/


2. ÃÀ¹úÁÙÖÕ¾ì×¢Ò©·¿OPPCÔâÓö´ó¹æÄ£Êý¾Ýй¶


10ÔÂ25ÈÕ £¬ÃÀ¹úÁÙÖÕ¾ì×¢Ò©·¿OnePoint Patient Care£¨OPPC£©ÔâÓöÁËÊý¾Ýй¶Ê¼þ £¬µ¼ÖÂÔ¼80ÍòÈ˵ĸöÈËÐÅÏ¢±»Ð¹Â¶ ¡£OPPCÊÇÒ»¼ÒÌṩÁÙÖÕ¾ì×¢ºÍǨ¾ÍÖÎÁÆ·þÎñµÄÒ©µê £¬ÓëÒ½ÁƱ£½¡ÌṩÉ̺Ï×÷ £¬Îª»¼ÕßÌṩ¶¨ÖÆÒ©ÎïºÍÖ§³Ö ¡£2024Äê8ÔÂ8ÈÕ £¬OPPCÔÚÆä¼ÆËã»úÍøÂçÉϼì²âµ½¿ÉÒɻ £¬²¢Á¢¼´Æô¶¯ÄÚ²¿ÊÓ²ì £¬Í¬Ê±Æ¸Çë·¨Ò½Äþ¾²¹«Ë¾½øÒ»·¨Ê½²é ¡£8ÔÂ15ÈÕ £¬OPPCÈ·ÈÏÔÚ8ÔÂ6ÈÕÖÁ8ÈÕÆÚ¼ä £¬ÓÐÈËδ¾­ÊÚȨ·ÃÎÊÁËÆäϵͳ²¢»ñÈ¡Á˸öÈËÐÅÏ¢ £¬°üÂÞÐÕÃû¡¢¾ÓסÐÅÏ¢¡¢Ò½ÁƼǼ¡¢Õï¶Ï¡¢´¦·½ÏêÇéÒÔ¼°²¿ÃÅÊý¾ÝµÄÉç»áÄþ¾²ºÅÂë ¡£OPPCÒÑÏòÃÀ¹úÎÀÉúÓ빫ÖÚ·þÎñ²¿³ÂËß´Ë´ÎÄþ¾²Ê¼þ £¬²¢½¨ÒéÊÜÓ°ÏìµÄ¸öÈË¼à¿ØÐÅÓóÂËߺͱ¨±íÖÐÊÇ·ñ´æÔÚ¿ÉÒɻ £¬²¢ÏòÖ´·¨²¿ÃųÂËßÈÎºÎÆÛÕ©ÐÐΪ ¡£¾ÝϤ £¬´Ë´Îй¶Ê¼þÓëInc RansomÀÕË÷Èí¼þ×éÖ¯ÓйØ £¬¸Ã×éÖ¯ÔÚÆäTorйÃÜÍøÕ¾ÉϽ«OPPCÌí¼Óµ½Êܺ¦ÕßÃûµ¥ÖÐ £¬µ«OPPCûÓÐÖ§¸¶Êê½ð £¬µ¼ÖÂÊý¾Ý±»Ð¹Â¶ ¡£Inc Ransom×Ô2023Ä꿪ʼ»îÔ¾ £¬ÒÑÉù³Æ¶ÔÖÁÉÙ65¸ö×éÖ¯µÄÈëÇÖʼþÂôÁ¦ ¡£


https://securityaffairs.com/170247/data-breach/onepoint-patient-care-data-breach.html


3. ºÉÀ¼¾¯·½¡°Âí¸ñŬ˹Ðж¯¡±ÖØ´´RedlineºÍMetaÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ


10ÔÂ28ÈÕ £¬ºÉÀ¼¾¯·½ÔÚ¡°Âí¸ñŬ˹Ðж¯¡±ÖÐÀֳɲé·âÁËRedlineºÍMetaÕâÁ½¿îÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÍøÂç»ù´¡ÉèÊ© £¬²¢¾¯¸æÍøÂç·¸×ï·Ö×ÓËûÃǵÄÊý¾ÝÒѱ»Ö´·¨²¿ÃÅÕÆÎÕ ¡£ÕâÁ½¿î¶ñÒâÈí¼þ»á´ÓÊÜѬȾÉè±¹ØÁ¬Ää¯ÀÀÆ÷ÇÔÈ¡°üÂÞÆ¾Ö¤¡¢ä¯ÀÀÀúÊ·¼Ç¼¡¢Ãô¸ÐÎĵµµÈÔÚÄڵĶàÖÖÐÅÏ¢ £¬È»ºó³öÊÛ»òÓÃÓÚÍøÂç¹¥»÷ ¡£´Ë´ÎÐж¯µÃµ½Á˰üÂÞÃÀ¹úÁª°îÊÓ²ì¾Ö¡¢Å·ÖÞ˾·¨×éÖ¯µÈ¹ú¼ÊÖ´·¨»ï°éµÄÖ§³Ö ¡£¾¯·½²»½ö»ñµÃÁËÕâÁ½¿î¶ñÒâÈí¼þµÄÔ´´úÂë £¬»¹ÕÆÎÕÁË¿ÉÓÃÓÚ×·²éʹÓøöñÒâÈí¼þµÄÍøÂç·¸×ï·Ö×ÓµÄÖ¤¾Ý ¡£´ËÍâ £¬ºÉÀ¼¾¯·½»¹½ÓÄÉÔÚºÚ¿ÍÂÛ̳ÉÏ´´½¨Õ˺Ų¢·¢ËÍÖ±½ÓÏûÏ¢µÄ·½Ê½ £¬¾¯¸æÍþвÐÐΪÕßËûÃÇÕýÊܵ½ÃÜÇмàÊÓ ¡£ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÒѳÉΪÆóÒµÃæÁٵľ޴óÎÊÌâ £¬RedlineºÍMetaµÈ¶ñÒâÈí¼þÒѵ¼Ö´óÁ¿Ãô¸ÐÊý¾Ý±»ÇÔÈ¡ £¬²¢±»ÓÃÓÚÍøÂç¹¥»÷ ¡£ÕâЩ±»µÁƾ֤Òѱ»ÓÃÀ´·¢¶¯Ò»Ð©×îÑÏÖØµÄÎ¥¹æÐÐΪ £¬¶ÔÍøÂçÄþ¾²×é³ÉÑÏÖØÍþв ¡£


https://www.bleepingcomputer.com/news/legal/redline-meta-infostealer-malware-operations-seized-by-police/


4. TeamTNTÀûÓÃDocker©¶´Ìᳫкڿͻ


10ÔÂ28ÈÕ £¬ÎÛÃûÕÑÖøµÄºÚ¿Í×éÖ¯TeamTNT½üÆÚÌᳫÁËÒ»Ïîеĺڿͻ £¬¸Ã×éÖ¯ÀûÓÃ̻¶µÄDockerÊØ»¤·¨Ê½²¿Êð¶ñÒâÈí¼þ £¬²¢Í¨¹ýÊÜѬȾµÄ·þÎñÆ÷ºÍDocker Hub½øÐй¥»÷Á÷´« ¡£Aqua NautilusµÄÍøÂçÄþ¾²Ñо¿ÈËÔ±·¢ÏÖ £¬TeamTNT£¨ÓÖÃûAdept Libra£©Í¨¹ýÈëÇÖÒ»¸öºÏ·¨µÄDocker HubÕË»§ÍйܶñÒâÈí¼þ £¬ÉÏ´«ÁËÔ¼30¸ö¾µÏñ £¬°üÂÞÓÃÓÚÁ÷´«¶ñÒâÈí¼þµÄ»ù´¡ÉèÊ©¾µÏñºÍרעÓÚ¼ÓÃÜ»õ±ÒÍÚ¾ò»ò¼ÆËãÄÜÁ¦³ö×âµÄÓ°Ïì¾µÏñ ¡£TeamTNTʹÓÃDocker Gatling GunɨÃè´óÁ¿IPµØÖ· £¬²éÕÒÔÚÌØ¶¨¶Ë¿ÚÉÏÔËÐеÄDockerÊØ»¤·¨Ê½Â©¶´ £¬²¢²¿Êð¶ñÒâÈÝÆ÷ºÍ½Å±¾ ¡£ÎªÁËÌӱܼì²â £¬TeamTNTʹÓÃÏȽøµÄSliver¶ñÒâÈí¼þ £¬»ìÈëºÏ·¨½ø³Ì £¬ÇÔȡƾ֤²¢É¨ÃèÍøÂçѰÕÒÆäËûÄ¿±ê ¡£ËûÃǵÄ×îÖÕÄ¿±êÊǽٳÖ×ÊÔ´½øÐмÓÃÜ»õ±ÒÍÚ¾ò»ò³öÊÛÊÜѬȾϵͳµÄ·ÃÎÊȨÏÞ £¬Ê¹ÓöàÖÖÍÚ¿óÈí¼þ½øÐÐÓÅ»¯²Ù×÷ ¡£´Ë´Î»î¶¯Õ¹Ê¾ÁËTeamTNTµÄÊÊÓ¦ºÍÉú³¤ÄÜÁ¦ £¬¸÷×éÖ¯±ØÐë±£³Ö¾¯Ìè²¢¼ÓÇ¿ÍøÂçÄþ¾²Êµ¼ù £¬ÒÔ·À·¶¸Ã×éÖ¯µÄ¹¥»÷·çÏÕ ¡£


https://hackread.com/teamtnt-exploits-ips-malware-attack-docker-clusters/


5. Hot TopicÖ÷¹ËÊý¾ÝÔâй¶ £¬°µÍø¾ªÏÖ3.5ÒÚÌõ¸öÈËÐÅÏ¢


10ÔÂ25ÈÕ £¬ÒÔÉ«ÁÐÍøÂçÄþ¾²¹«Ë¾Hudson Rock·¢ÏÖ £¬ÔÚ°µÍøÉÏÓÐÒ»¸ö¾Ý³Æ°üÂÞ3.5ÒÚÌõHot TopicÖ÷¹Ë¸öÈ˺ÍÖ§¸¶Êý¾ÝµÄÅÓ´óÊý¾Ý¿âÕýÔÚ±»¹ûÈ»³öÊÛ ¡£¸ÃÊý¾Ý¿â¾Ý³ÆÓÉÃûΪSatanicµÄÍþв×éÖ¯Ðû²¼ £¬°üÂÞÓû§µÄÏêϸ¸öÈËÐÅÏ¢ºÍÖ§¸¶Ï¸½Ú £¬Éæ¼°Hot Topic¡¢TorridºÍBoxLunchÈý¼ÒÁãÊÛÆóÒµ ¡£ËäÈ»Hot TopicÉÐδ¹ûÈ»ÈÏ¿ÉÊý¾Ýй¶ £¬µ«Ëæ×ÅÄþ¾²Ñо¿ÈËÔ±·¢ÏÖµÄÖ¤¾ÝÔ½À´Ô½¶à £¬¸ÃʼþµÄÕæÊµÐÔÔ½À´Ô½¸ß ¡£Hudson Rock¾¯¸æ³Æ £¬Õ⽫¸øÓû§´øÀ´ÑÏÖØÄþ¾²Òþ»¼ £¬ÈçÉí·Ý͵ÇÔ¡¢½ðÈÚÆÛÕ©µÈ ¡£¾ÝÊÓ²ì £¬´Ë´ÎÊý¾Ýй¶¿ÉÄÜÔ´ÓÚinfo-stealerľÂíѬȾ £¬¸ÃľÂíÈëÇÖÁËΪHot TopicµÈÁãÊÛÉÌÌṩÊý¾Ýͳһ·þÎñµÄµÚÈý·½¹«Ë¾Ô±¹¤µÄ¼ÆËã»ú £¬¶øÈ±·¦¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©»úÖÆ¿ÉÄÜÊǵ¼Ö¸Ãʼþ·¢ÉúµÄºËÐÄÒòËØÖ®Ò» ¡£´ËÍâ £¬Hot TopicÔÚȨÏÞ¹ÜÀíÉÏÒ²´æÔÚ¾Þ´óÎÊÌâ £¬ÒòÔ±¹¤Æ¾Ö¤µ¼ÖµÄй¶Ê¼þÓ°ÏìÃæ½«»á·Ç³£¹ã ¡£SatanicÍþв×é֯ϣÍûÒÔ2ÍòÃÀÔªµÄ¼Û¸ñ³öÊÛ¸ÃÊý¾Ý¿â £¬»òÏòHot TopicÀÕË÷1ÍòÃÀԪɾ³ý¸ÃÌû×Ó ¡£


https://cybernews.com/security/hackers-put-350m-hot-topic-customers-records-for-sale/


6. ·¨¹úFree¹«Ë¾ÔâÍøÂç¹¥»÷ £¬¿Í»§¸öÈËÐÅÏ¢ÒÉÔâй¶


10ÔÂ28ÈÕ £¬·¨¹ú»¥ÁªÍø·þÎñÌṩÉÌFree £¬×÷Ϊ·¨¹úµÚ¶þ´óISP £¬ÓµÓÐÁè¼Ý2290ÍòÓû§ £¬½üÈÕÅû¶ÁËÒ»ÆðÍøÂç¹¥»÷ʼþ ¡£¾Ý³Æ £¬ÍþвÐÐΪÕß»ñµÃÁËFreeÄÚ²¿¹ÜÀí¹¤¾ßµÄ·ÃÎÊȨÏÞ £¬²¢ÍµÈ¡ÁËһЩ¶©ÔÄÕߵĸöÈËÊý¾Ý ¡£¸Ã¹«Ë¾ÔÚ10ÔÂ26ÈÕÏò·¨ÐÂÉç֤ʵÁËÕâÒ»ÏûÏ¢ £¬Ö¸³ö²¿ÃÅÓû§ÕË»§Ïà¹ØµÄ¸öÈËÊý¾Ý±»Î´¾­ÊÚȨ·ÃÎÊ £¬µ«ÃÜÂë¡¢ÒøÐп¨ÐÅÏ¢ºÍͨÐÅÄÚÈÝδÊÜÓ°Ïì ¡£¹«Ë¾ÒÑÌáÆðÐÌÊÂËßËÏ £¬²¢Í¨ÖªÁËÏà¹Ø¼à¹Ü»ú¹¹ ¡£Âô¼ÒÔÚÍøÂç·¸×ïÂÛ̳ÉÏÁгöÁËÁ½¸öÊý¾Ý¿â £¬°üÂÞ´óÁ¿¿Í»§ÕË»§ºÍIBANÏêϸÐÅÏ¢ £¬²¢Ðû²¼ÁËÊý¾ÝÑù±¾ºÍ½ØÍ¼ ¡£Ð¹Â¶µÄ¿Í»§Êý¾Ý°üÂÞÃû×Ö¡¢ÐÕÊÏ¡¢µç»°ºÅÂë¡¢ÍêÕûÓÊÕþµØÖ·¡¢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµÈ ¡£¾¡¹ÜÍøÂç·¸×ï·Ö×ÓÉù³Æ´Ë´ÎÊý¾Ýй¶ӰÏìÁËFree MobileºÍFreebox¿Í»§ £¬µ«¹«Ë¾ÌåÏÖÒѽÓÄÉ´ëÊ©ÖÆÖ¹¹¥»÷²¢¼ÓÇ¿ÐÅϢϵͳ±£»¤ ¡£


https://securityaffairs.com/170333/data-breach/free-suffered-a-cyber-attack.html