MUT-1244ÍþвÐÐΪÕß´ó¹æÄ£ÇÔÈ¡WordPressƾ֤¼°Ãô¸ÐÐÅÏ¢
Ðû²¼Ê±¼ä 2024-12-171. MUT-1244ÍþвÐÐΪÕß´ó¹æÄ£ÇÔÈ¡WordPressƾ֤¼°Ãô¸ÐÐÅÏ¢
12ÔÂ14ÈÕ£¬£¬£¬£¬ÃûΪMUT-1244µÄÍþвÐÐΪÕßÔÚÒ»³¡³¤´ïÒ»ÄêµÄ´ó¹æÄ£»£»£»£»£»£»£»£»î¶¯ÖУ¬£¬£¬£¬Í¨¹ýľÂí²¡¶¾Ñ¬È¾µÄWordPressƾ֤¼ì²éÆ÷ÇÔÈ¡ÁËÁè¼Ý390,000¸öWordPressƾ֤¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬¸ÃÐÐΪÕß»¹´ÓÊý°ÙÃûÊܺ¦Õߣ¨°üÀ¨ºì¶Ó³ÉÔ±¡¢ÉøÍ¸²âÊÔÖ°Ô±¡¢Çå¾²Ñо¿Ö°Ô±ÒÔ¼°¶ñÒâÐÐΪÕߣ©µÄÊÜѬȾϵͳÖÐ͵ȡÁËSSH˽ԿºÍAWS»á¼ûÃÜÔ¿¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓñ»Ä¾Âí»¯µÄGitHub´æ´¢¿âÍÆËͶñÒâ¿´·¨ÑéÖ¤Îó²îºÍ¾ÙÐÐÍøÂç´¹Âڻ£¬£¬£¬£¬ÓÕÆÄ¿µÄ×°ÖÃαװ³ÉCPU΢Âë¸üеļÙÄÚºËÉý¼¶¡£¡£¡£¡£¡£ÕâЩ´æ´¢¿âÔöÌíÁËÆäÕýµ±ÐÔ£¬£¬£¬£¬Ê¹µÃÇ徲רҵְԱºÍÍþвÐÐΪÕ߸üÈÝÒ×ÔËÐÐËüÃÇ¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýGitHub reposÒÔ¶àÖÖ·½·¨Í¶·ÅÓÐÓÃÔØºÉ£¬£¬£¬£¬°üÀ¨´øÓкóÃŵÄÉèÖñàÒëÎļþ¡¢¶ñÒâPDFÎļþ¡¢PythonͶ·ÅÆ÷ÒÔ¼°¶ñÒânpm°ü¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯ÓëÁíÒ»´Î³¤´ïÒ»ÄêµÄ¹©Ó¦Á´¹¥»÷ÓÐÖØµþ£¬£¬£¬£¬ÆäÖÐÉæ¼°ÇÔÈ¡Êý¾ÝºÍÍÚ¾òÃÅÂÞ±Ò¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£MUT-1244Äܹ»»á¼û²¢Ð¹Â¶Ë½ÈËSSHÃÜÔ¿¡¢AWSƾ֤µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬²¢Ê¹ÓÃÍøÂçÇå¾²ÉçÇøÄÚµÄÐÅÈΣ¬£¬£¬£¬ÔÚÄ¿µÄ²»ÖªÇéµÄÇéÐÎÏÂÖ´ÐжñÒâÈí¼þ£¬£¬£¬£¬ÈëÇÖÁËÊýʮ̨»úе¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/390-000-wordpress-accounts-stolen-from-hackers-in-supply-chain-attack/
2. CISA½«CleoÎó²îCVE-2024-50623Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖÐ
12ÔÂ14ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Ó°ÏìCleo²úÆ·µÄÎó²îCVE-2024-50623£¨CVSSÆÀ·Ö8.8£©ÁÐÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£¡£Cleo¹«Ë¾·¢Ã÷ÁËÒ»¸ö²»ÊÜÏÞÖÆµÄÎļþÉÏ´«ºÍÏÂÔØÎó²î£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬²¢½¨Òé¿Í»§Á¬Ã¦½«Harmony¡¢VLTraderºÍLexiComʵÀýÉý¼¶µ½×îв¹¶¡°æ±¾5.8.0.21ÒÔ½â¾öDZÔÚ¹¥»÷ǰÑÔ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬Çå¾²¹«Ë¾Huntress±¨¸æ³Æ£¬£¬£¬£¬×ÝÈ»×°ÖÃÁ˸ò¹¶¡£¬£¬£¬£¬ÔËÐÐ5.8.0.21µÄϵͳÈÔ¿ÉÄܱ»Ê¹Óᣡ£¡£¡£¡£Huntress·¢Ã÷ÁËÕë¶ÔCleoÎļþ´«ÊäÈí¼þµÄ×Ô¶¯¹¥»÷£¬£¬£¬£¬²¢¹ûÕæÁËÉæ¼°ÈýÖÖCleo²úÆ·µÄÒ»Á¬¹¥»÷¡£¡£¡£¡£¡£Ê×ϯÇå¾²Ñо¿Ô±Caleb Stewart¿ª·¢ÁËʹÓÃí§ÒâÎļþдÈëÎó²îµÄPython¾ç±¾£¬£¬£¬£¬²¢Ö¤ÊµÁËÎó²îµÄÓÐÓÃÐÔ¡£¡£¡£¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê1ÔÂ3ÈÕ֮ǰÐÞ¸´´ËÎó²î£¬£¬£¬£¬×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬£¬£¬£¬ÒÔ±£»£»£»£»£»£»£»£»¤ÍøÂçÃâÊܹ¥»÷¡£¡£¡£¡£¡£
https://securityaffairs.com/171973/security/u-s-cisa-adds-cleo-harmony-vltrader-and-lexicom-flaw-to-its-known-exploited-vulnerabilities-catalog.html
3. ConnectOnCallÔ¶³ÌÒ½ÁÆÆ½Ì¨ÔâÖØ´óÊý¾Ýй¶
12ÔÂ16ÈÕ£¬£¬£¬£¬ConnectOnCallÊÇÒ»¸öרעÓÚÔöǿҽÁÆÐ§ÀÍÌṩÕßÓ뻼ÕßÏàͬµÄÔ¶³ÌÒ½ÁÆÆ½Ì¨£¬£¬£¬£¬¿ËÈÕÅû¶ÁËÒ»ÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ó°ÏìÁè¼Ý900,000È˵ÄСÎÒ˽¼ÒÐÅÏ¢¼°Ò½ÁÆÐÅÏ¢Çå¾²¡£¡£¡£¡£¡£¸Ãƽ̨Ìṩ×Ô¶¯»¼Õߺô½Ð¸ú×Ù¡¢HIPAAºÏ¹æÌ¸Ì칦Ч£¬£¬£¬£¬²¢Óëµç×Ó¿µ½¡¼Í¼ϵͳ¼¯³É¡£¡£¡£¡£¡£5ÔÂ12ÈÕ£¬£¬£¬£¬ConnectOnCall·¢Ã÷Çå¾²Îó²î£¬£¬£¬£¬¾ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬2024Äê2ÔÂ16ÈÕÖÁ5ÔÂ12ÈÕʱ´ú£¬£¬£¬£¬ÓÐδ֪µÚÈý·½»á¼ûÁËÆ½Ì¨¼°Ó¦ÓóÌÐòÄڵIJ¿·ÖÊý¾Ý£¬£¬£¬£¬°üÀ¨Ò½»¼Í¨Ñ¶ÐÅÏ¢¡£¡£¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬¹«Ë¾Ñ¸ËÙÔ¼ÇëÍøÂçÇ徲ר¼Ò£¬£¬£¬£¬ÏÂÏß²úÆ·£¬£¬£¬£¬²¢ÔÚÇå¾²ÇéÐÎÖоÙÐÐÊý¾Ý»Ö¸´£¬£¬£¬£¬Í¬Ê±Í¨ÖªÁËÁª°îÖ´·¨²¿·Ö¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢¿ÉÄܰüÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅ¡¢Ò½ÁƼͼºÅ¼°¿µ½¡×´Ì¬µÈ¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚδ·¢Ã÷ÐÅÏ¢ÀÄÓûò»¼ÕßÊܺ¦ÇéÐΣ¬£¬£¬£¬ConnectOnCallÈÔ½¨ÒéÊÜÓ°ÏìСÎÒ˽¼Ò¼á³ÖСÐÄ£¬£¬£¬£¬²¢±¨¸æ¿ÉÒÉÉí·Ý͵ÇÔ»òÚ²ÆÐÐΪ¡£¡£¡£¡£¡£¹«Ë¾ÒÑÏòÖ´·¨²¿·Ö±¨¸æ²¢Í¨ÖªÊÜÓ°ÏìСÎÒ˽¼Ò£¬£¬£¬£¬ÎªÆäÖÐÓÐÏÞÊýÄ¿µÄÉç»áÇå¾²ºÅÂëÊÜÓ°ÏìÕßÌṩÉí·ÝºÍÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬Í¨¹ýÓʼÄ֪ͨÐŵķ½·¨¼û¸æÏà¹ØÇéÐΡ£¡£¡£¡£¡£
https://securityaffairs.com/172053/data-breach/connectoncall-data-breach-impacted-over-900000-individuals.html
4. µÂ¿ËÈøË¹Àí¹¤´óѧ¿µ½¡¿ÆÑ§ÖÐÐÄÔâÍøÂç¹¥»÷
12ÔÂ16ÈÕ£¬£¬£¬£¬µÂ¿ËÈøË¹Àí¹¤´óѧ¿µ½¡¿ÆÑ§ÖÐÐļ°Æä°£¶ûÅÁË÷·ÖУ½üÆÚÔâÊÜÁËÒ»´ÎÍøÂç¹¥»÷£¬£¬£¬£¬µ¼ÖÂÅÌËã»úϵͳºÍÓ¦ÓóÌÐòÖÐÖ¹£¬£¬£¬£¬²¢¿ÉÄÜй¶ÁË140ÍòÃû»¼ÕßµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¸Ã»ú¹¹ÊÇÒ»¼Ò¹«¹²Ñ§ÊõÒ½ÁÆ»ú¹¹£¬£¬£¬£¬ÈÏÕæ½ÌÓý¡¢ÅàѵºÍ»¼ÕßÕչ˻¤Ê¿Ð§ÀÍ¡£¡£¡£¡£¡£¹¥»÷µ¼ÖÂ2024Äê9ÔÂ17ÈÕÖÁ9ÔÂ29ÈÕʱ´ú´Ó¸Ã»ú¹¹ÍøÂçÖлá¼û»òɾ³ýÁËijЩÎļþºÍÎļþ¼Ð¡£¡£¡£¡£¡£¿£¿£¿£¿£¿ÉÄÜй¶¸øºÚ¿ÍµÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢Õþ¸®Éí·ÝÖ¤ºÅÂë¡¢²ÆÎñÕË»§ÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Ò½ÁÆÐÅÏ¢¡¢Õ˵¥/Ë÷ÅâÊý¾Ý¡¢Õï¶ÏºÍÖÎÁÆÐÅÏ¢µÈ¡£¡£¡£¡£¡£¸Ã»ú¹¹ÒÑ֪ͨÊÜÓ°ÏìµÄÈË£¬£¬£¬£¬²¢ÎªËûÃÇÌṩÃâ·ÑµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£½¨ÒéÊÜÓ°ÏìµÄСÎÒ˽¼Ò¼á³ÖСÐÄ£¬£¬£¬£¬Ìá·ÀDZÔÚµÄÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬²¢¼à¿ØËûÃǵÄÐÅÓñ¨¸æºÍ¿µ½¡°ü¹ÜÕ˵¥¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬´Ë´Î¹¥»÷ÓÉÃûΪInterlockµÄÀÕË÷Èí¼þ×éÖ¯ÈÏÕæ£¬£¬£¬£¬¸Ã×é֯й¶ÁË210Íò¸öÎļþ£¬£¬£¬£¬×ܼÆ2.6TBµÄÊý¾Ý£¬£¬£¬£¬¾Ý³ÆÊǴӸûú¹¹ÇÔÈ¡µÄ¡£¡£¡£¡£¡£InterlockË÷ÒªµÄÊê½ð½ð¶î´ÓÊýÊ®ÍòÃÀÔªµ½Êý°ÙÍòÃÀÔª²»µÈ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/texas-tech-university-system-data-breach-impacts-14-million-patients/
5. ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯Èö²¥Lumma StealerÐÅÏ¢ÇÔÈ¡Èí¼þ
12ÔÂ16ÈÕ£¬£¬£¬£¬Ò»ÏîÃûΪ¡°DeceptionAds¡±µÄ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯ÕýÔÚʹÓÃMonetag¹ã¸æÍøÂçÈö²¥Lumma StealerÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¸Ã»î¶¯Í¨¹ýÐéαµÄCAPTCHAÑéÖ¤Ò³ÃæÓÕÆÓû§ÔËÐжñÒâPowerShellÏÂÁ£¬£¬£¬´Ó¶øÑ¬È¾¶ñÒâÈí¼þ¡£¡£¡£¡£¡£Guardio LabsºÍInfobloxµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬ÕâÒ»²Ù×÷ÓÉÃûΪ¡°Vane Viper¡±µÄÍþвÐÐΪÕßʵÑ飬£¬£¬£¬Ê¹ÓÃÕýµ±¹ã¸æÍøÂçÉϵĴó¹æÄ£¹ã¸æ½«Óû§´øµ½ÐéαµÄCAPTCHAÒ³Ãæ¡£¡£¡£¡£¡£CAPTCHAÒ³Ãæ°üÀ¨JavaScript´úÂ룬£¬£¬£¬½«¶ñÒâPowerShellÏÂÁî¸´ÖÆµ½Óû§¼ôÌù°å£¬£¬£¬£¬²¢ÓÕµ¼Óû§Ö´ÐС£¡£¡£¡£¡£Lumma Stealer¿É´Óä¯ÀÀÆ÷ÖÐÇÔÈ¡cookie¡¢Æ¾Ö¤¡¢ÃÜÂë¡¢ÐÅÓÿ¨ºÍä¯ÀÀÀúÊ·¼Í¼£¬£¬£¬£¬ÒÔ¼°¼ÓÃÜÇ®±ÒÇ®°ü¡¢Ë½Ô¿ºÍÃô¸ÐÎı¾Îļþ¡£¡£¡£¡£¡£GuardioLabsÒÑÏòMonetagºÍBeMob±¨¸æ´ËÀÄÓÃÐÐΪ£¬£¬£¬£¬²¢»ñµÃʵʱÏìÓ¦¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬¸Ã»î¶¯ÔÚ12Ô·ºÆðËÕÐÑ£¬£¬£¬£¬Åú×¢ÍþвÐÐΪÕßÊÔͼͨ¹ý²î±ð¹ã¸æÍøÂç»Ö¸´ÔËÓª¡£¡£¡£¡£¡£Óû§Ó¦×èÖ¹Ö´ÐÐÍøÕ¾ÌáÐѵÄÏÂÁ£¬£¬£¬ÌØÊâÊÇÄÇЩð³äÐÞ¸´»òÑéÖ¤ÂëµÄÏÂÁ£¬£¬£¬²¢ÉóÉ÷ʹÓõÁ°æÈí¼þ»ò²»·¨Á÷ýÌåÍøÕ¾¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-ads-push-lumma-infostealer-via-fake-captcha-pages/
6. Â޵µºÖÝRIBridgesϵͳÔâBrain CipherÀÕË÷Èí¼þ¹¥»÷
12ÔÂ16ÈÕ£¬£¬£¬£¬Â޵µºÖÝÖÒÑԳƣ¬£¬£¬£¬ÆäÓɵÂÇÚÖÎÀíµÄRIBridgesϵͳÔâÊÜÁËBrain CipherÀÕË÷Èí¼þÍÅ»ïµÄÈëÇÖ£¬£¬£¬£¬µ¼ÖÂÊý¾Ýй¶£¬£¬£¬£¬Ì»Â¶ÁËסÃñµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£RIBridgesÊǸÃÖÝÓÃÓÚÖÎÀíºÍÌṩ¹«¹²Ô®ÖúÍýÏëµÄÏÖ´ú×ÛºÏ×ʸñϵͳ¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓÚ2024Äê12ÔÂ5ÈÕ±»·¢Ã÷£¬£¬£¬£¬µÂÇÚÆÀ¹ÀºóÒÔΪºÚ¿Í¿ÉÄÜÇÔÈ¡Á˰üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢ºÍÆäËûÊý¾ÝµÄÎļþ¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÏîÄ¿°üÀ¨Ò½ÁƽòÌù¡¢Ôö²¹ÓªÑøÔ®ÖúÍýÏ롢ƶÀ§¼ÒÍ¥ÔÝʱԮÖúµÈ¶à¸ö¹«¹²Ð§ÀÍÏîÄ¿¡£¡£¡£¡£¡£Ö»¹Üй¶µÄÊý¾ÝÈÔÔÚÆÀ¹ÀÖУ¬£¬£¬£¬µ«¿ÉÄܰüÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂëºÍÄ³Ð©ÒøÐÐÐÅÏ¢¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¼ÒÍ¥½«Í¨¹ýÓʼþÊÕµ½Í¨Öª£¬£¬£¬£¬²¢¿ÉÖµçרÓúô½ÐÖÐÐÄ×·ÇóÖ§³Ö¡£¡£¡£¡£¡£Â޵µºÖÝÕþ¸®½¨ÒéסÃñÖØÖÃÃÜÂë¡¢ÉèÖÃڲƾ¯±¨ºÍÐÅÓö³½á£¬£¬£¬£¬²¢Æô¶¯ÒøÐÐÌṩµÄÇå¾²²½·¥¡£¡£¡£¡£¡£µÂÇÚ½²»°ÈËÈ·ÈÏ£¬£¬£¬£¬Â޵µºÖݵÄϵͳÊÇÊܵ½Brain CipherÊý¾Ýй¶ӰÏìµÄ¡°¼òµ¥¿Í»§¶Ëϵͳ¡±£¬£¬£¬£¬²¢ÌåÏÖ½«Óë¿Í»§ºÍÖ´·¨¹ÙÔ±ÏàÖúÕö¿ªÊӲ졣¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/rhode-island-confirms-data-breach-after-brain-cipher-ransomware-attack/


¾©¹«Íø°²±¸11010802024551ºÅ