MoneyGramÔâÓöÍøÂç¹¥»÷£¬ÏµÍ³ÖÐÖ¹Òý·¢ÆÕ±é¹Ø×¢
Ðû²¼Ê±¼ä 2024-09-269ÔÂ24ÈÕ£¬»ã¿î¾ÞÍ·MoneyGram×ÔÉÏÖÜÎåÆðÔâÓöϵͳÖÐÖ¹£¬²¢È·ÈÏÕâÊÇÓÉÍøÂç¹¥»÷ËùÖ¡£Ö»¹Ü´ËÇ°¹«Ë¾½öÌá¼°¡°ÍøÂçÖÐÖ¹¡±£¬Î´Ã÷ȷ˵Ã÷Ôµ¹ÊÔÓÉ£¬Ö±ÖÁÖÜÒ»²ÅÕýʽͨ¸æÍøÂçÇå¾²ÊÂÎñÊÇÆäϵͳ̱»¾µÄȪԴ¡£MoneyGram×÷ΪȫÇòµÚ¶þ´ó»ã¿î·þÎñÌṩÉÌ£¬Æä·þÎñÁýÕÖ200¸ö¹ú¼ÒµÄ350,000¸öÍøµã¼°ÏßÉÏƽ̨£¬ÄêÉúÒâÁ¿³¬1.2Òڱʡ£´Ë´Î¹¥»÷µ¼ÖÂÓû§ÎÞ·¨Íê³ÉÉúÒâ»ò»á¼û×ʽð£¬ÍøÕ¾Ò²ÎÞ·¨Ê¹Óã¬Òý·¢ÁËÆÕ±é¹Ø×¢ºÍµ£ÐÄ¡£¹«Ë¾Ñ¸ËÙ½ÓÄÉÐж¯£¬½«ÊÜÓ°ÏìµÄϵͳÏÂÏßÒÔ×èÖ¹¹¥»÷£¬²¢ÓëÍⲿר¼ÒºÍÖ´·¨²¿·ÖϸÃÜÏàÖúÒÔ»Ö¸´·þÎñ¡£MoneyGramÇ¿µ÷Á˶ÔÊÂÎñÑÏÖØÐÔµÄÊìϤ£¬²¢ÔÊÐí¾¡¿ì»Ö¸´ÏµÍ³Õý³£ÔËÐС£È»¶ø£¬¹ØÓÚϵͳ»Ö¸´µÄÏêϸʱ¼ä±íÉÐδÐû²¼£¬ÌåÏÖ¹¥»÷¿ÉÄÜÈÔÔÚÒ»Á¬»ò»Ö¸´ÊÂÇé´¦ÓÚ³õÆڽ׶Ρ£Ö»¹Ü¹¥»÷ÀàÐÍÉÐδ¹ûÕ棬µ«³¤Ê±¼äµÄ·þÎñÖÐÖ¹ºÍÅþÁ¬ÎÊÌâÇ¿ÁÒÌåÏÖÕâ¿ÉÄÜÊÇÒ»ÆðÀÕË÷Èí¼þ¹¥»÷¡£¼øÓÚMoneyGramÖØ´óµÄÓû§»ù´¡£¬´Ë´ÎÊÂÎñÈôÉæ¼°Êý¾Ýй¶£¬ÆäDZÔÚÓ°Ï콫¼«ÎªÉîÔ¶¡£
https://www.bleepingcomputer.com/news/security/moneygram-confirms-a-cyberattack-is-behind-dayslong-outage/
2. ºÚ¿ÍÒ»ÖÜÄÚµÚÈý´ÎÏ®»÷´÷¶û£¬500MBÃô¸ÐÊý¾ÝÔâй¶
9ÔÂ25ÈÕ£¬ºÚ¿Í¡°grep¡±ÔÙ´ÎÕë¶Ô¿Æ¼¼¾ÞÍ·´÷¶û·¢¶¯¹¥»÷£¬Ò»ÖÜÄÚµÚÈý´ÎÔì³ÉÊý¾Ýй¶£¬´Ë´Îй¶ÁËÔ¼500MBµÄÃô¸ÐÊý¾Ý£¬°üÀ¨ÄÚ²¿Îĵµ¡¢Í¼Æ¬¡¢²âÊÔÊÓƵ¼°¶àÖØÉí·ÝÑéÖ¤£¨MFA£©Êý¾Ý¡£´÷¶ûÖÁ½ñδ×ö³öÕýʽ»ØÓ¦£¬¶øºÚ¿Í¡°grep¡±Ôò¹ûÕæÐû³Æ¶Ô´Ë´Îй¶ÈÏÕ棬²¢ÌåÏÖËùÓÐÊý¾Ý¾ùÔ´×Ôµ¥´ÎÈëÇÖ£¬Ö»ÊÇÕ½ÂÔÐԵطÖÅúÆع⡣鶵ÄÐÅÏ¢Öк¸ÇÁËÄÚ²¿Æ±Îñϵͳϸ½Ú¡¢Öйú»ù´¡ÉèÊ©ÏîÄ¿Îļþ¼°Çå¾²Ïà¹ØÎĵµ£¬Ò»µ©ÕâЩÃô¸ÐÐÅÏ¢±»²»µ±Ê¹Ó㬽«¶Ô´÷¶ûµÄÔËÓªÇå¾²×é³ÉÑÏÖØÍþв¡£2024Äê 9 Ô 19 ÈÕ£¬¡°grep¡±Ð¹Â¶ÁËÁè¼Ý 12,000 Ãû´÷¶ûÔ±¹¤µÄÊý¾Ý£¬Òý·¢ÁËÄÚ²¿ÊӲ졣¼¸Ììºó£¬¼´ 9 Ô 22 ÈÕ£¬¸ü¶àÃô¸ÐµÄÄÚ²¿Îļþ±»Ð¹Â¶£¬¾Ý³ÆÊÇ´÷¶ûʹÓà Atlassian ¹¤¾ßʱй¶µÄ¡£×èÖ¹ÏÖÔÚ£¬´÷¶ûÉÐδȷÈÏ´Ë´ÎÊý¾Ý鶵ÄÏêϸӰÏì¹æÄ£¼°ÊÇ·ñÉæ¼°µÚÈý·½Îó²î£¬Ò»ÖÜÄÚ±¬·¢ÈýÆðÊý¾Ýй¶ÊÂÎñ£¬ÈËÃǶԴ÷¶ûÍøÂçÇå¾²µÄµ£ÐÄÓëÈÕ¾ãÔö¡£
https://hackread.com/dell-data-leak-in-week-amid-grep-cyberattacks/
3. ÍøÂçÇå¾²Ñо¿Ö°Ô±ÖÒÑÔÐÂÐÍ»ùÓÚRustµÄSplinterºóʹÓù¤¾ß
9ÔÂ25ÈÕ£¬ÍøÂçÇå¾²ÁìÓò½üÆÚ·¢Ã÷ÁËÒ»ÖÖÃûΪSplinterµÄÐÂÐͺóʹÓúì¶Ó¹¤¾ß£¬¸Ã¹¤¾ßÓÉPalo Alto Networks Unit 42ÔÚ¿Í»§ÏµÍ³ÖÐʶ±ð²¢Ðû²¼¡£SplinterÓÉRustÓïÑÔ±àд£¬Ë书Ч²»ÈçCobalt StrikeµÈ¸ß¼¶¹¤¾ßÖÜÈ«£¬µ«Èç±»ÀÄÓã¬ÈÔ¶Ô×éÖ¯Çå¾²×é³ÉDZÔÚΣº¦¡£¸Ã¹¤¾ßרΪºì¶ÓÐж¯Éè¼Æ£¬ÓÃÓÚʶ±ðÆóÒµÍøÂçÖеÄÇå¾²Îó²î£¬µ«Í¬Ñù±£´æ±»¶ñÒâʹÓõÄΣº¦¡£ÏÖÔÚ£¬ÉÐÎÞÖ¤¾ÝÅú×¢SplinterÓëÏêϸÍþвÐÐΪÕßÏà¹ØÁª£¬ÇÒÆäÅÓ¸ÅÂÔ»ýÖ÷Òª¹éÒòÓÚ°üÀ¨µÄRust¿âÊýÄ¿¡£Splinter¾ß±¸¶àÖÖ¹¦Ð§£¬ÈçÖ´ÐÐWindowsÏÂÁî¡¢Ô¶³ÌÀú³Ì×¢Èë¡¢ÎļþÉÏ´«ÏÂÔØ¡¢ÔÆ·þÎñÕË»§ÐÅÏ¢ÍøÂç¼°×ÔÎÒɾ³ýµÈ£¬ÕâЩ¾ùͨ¹ýÆäÉèÖõÄC2·þÎñÆ÷ÎüÊÕʹÃüʵÏÖ¡£±ðµÄ£¬½üÆÚ»¹ÆعâÁËÆäËû¼¸Öָ߼¶¹¥»÷ÊÖÒÕ£¬Èçͨ¹ýMicrosoft Office RPC½Ó¿ÚºÍ¶ñÒâµæƬʵÏÖµÄÒþÃØ´úÂë×¢ÈëÓëȨÏÞÌáÉý£¬ÒÔ¼°Ê¹ÓÃThread Name-CallingÊÖÒÕÈƹý¶Ëµã±£»¤¾ÙÐÐÀú³Ì×¢Èë¡£ÕâЩ·¢Ã÷Ç¿µ÷ÁËÔÚÍøÂçÇå¾²ÁìÓò¼á³ÖÔ¤·ÀºÍ¼ì²âÄÜÁ¦µÄÖ÷ÒªÐÔ£¬ÓÉÓÚ·¸·¨·Ö×Ó»áÒ»Ö±½ÓÄÉÐÂÊÖÒÕÍþв×éÖ¯Çå¾²¡£
https://thehackernews.com/2024/09/cybersecurity-researchers-warn-of-new.html
4. Òƶ¯ÍøÂç´¹ÂÚÍþв¼¤Ôö£¬82%´¹ÂÚÍøÕ¾Ãé×¼Òƶ¯×°±¸
9ÔÂ25ÈÕ£¬Ëæ×ÅÒƶ¯ÍøÂç´¹ÂÚ¹¥»÷µÄ¼¤Ôö£¬Áè¼Ý°Ë³ÉµÄÍøÂç´¹ÂÚÍøÕ¾ÏÖÒÑרעÓÚÒƶ¯×°±¸£¬ÔöÌíÂÊÏÔÖø¡£Çå¾²Ñо¿Õ¹ÏÖ£¬´ó¶¼·¸·¨·Ö×ÓʹÓÃHTTPSÐÒéαװ´¹ÂÚÍøÕ¾Çå¾²£¬ÔöÌíÁËʶ±ðÄѶȣ¬ÓÈÆäÔÚÒƶ¯¶Ë¡£È«Çò¹æÄ£ÄÚ£¬¶ñÒâÈí¼þ¼°ÆóÒµÌع¤Èí¼þÍþв´ó·ùÔöÌí£¬ÌØÊâÊÇAndroidƽ̨Îó²îÉÏÉýÏÔÖø¡£Í¬Ê±£¬ÅþÁ¬²»Çå¾²ÍøÂçµÄ×°±¸¼¤Ôö£¬Ò½ÁƱ£½¡ÐÐÒµ³ÉΪÒƶ¯ÍøÂç´¹ÂÚ¹¥»÷µÄÖØÔÖÇø¡£×¨¼Ò½¨Ò飬ÈçÒ½ÁƱ£½¡×éÖ¯Ó¦½ÓÄÉÁãÐÅÍÐÇ徲ģ×Ó£¬ÍŽáAIÇý¶¯µÄÍþвÇ鱨ƽ̨ÒÔÔöÇ¿·ÀÓù¡£±ðµÄ£¬ÔöÇ¿Òƶ¯×°±¸ÖÎÀí£¨MDM£©¡¢ÊµÑé¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©ºÍÃÜÂëÖÎÀíÕ½ÂÔ±»ÊÓΪҪº¦·ÀÓù²½·¥¡£°´ÆÚ¾ÙÐÐÔ±¹¤Çå¾²Åàѵ¡¢Îó²îɨÃ衢Σº¦ÆÀ¹À¼°Çå¾²Éó¼ÆÒ²±Ø²»¿ÉÉÙ¡£Õë¶Ô²àÔØÓ¦ÓóÌÐòµÄÇ徲Σº¦£¬×¨¼ÒÇ¿µ÷ÆäÈƹý¹Ù·½Éó²é¿ÉÄÜ´øÀ´µÄΣº¦£¬²¢½¨ÒéÆóÒµÖƶ©ÑÏ¿áÕþ²ßÏÞÖƲàÔØÓ¦ÓÃ×°Öã¬Í¨¹ýMDMϵͳ¿ØÖÆÓ¦ÓÃȨÏÞ£¬²¢½ÌÓýÔ±¹¤Ê¶±ðÏà¹ØΣº¦¡£
https://securityboulevard.com/2024/09/mobile-phishing-attacks-explode-enterprise-devices-targeted/
5. RAISECOM GatewayÑÏÖØÎó²îCVE-2024-7120±»Æð¾¢Ê¹ÓÃ
9ÔÂ25ÈÕ£¬RAISECOM Gateway×°±¸½üÆÚÆعâµÄCVE-2024-7120Îó²î£¬ÒÔÆ伫¸ßµÄCVSSÆÀ·Ö9.8£¬³ÉΪÆóÒµÇå¾²ÁìÓòµÄÒ»´óÒþÓÇ¡£´ËÎó²îÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÊÜÓ°ÏìµÄWeb½çÃælist_base_config.php¾ç±¾Ö´ÐÐí§ÒâÏÂÁֱ½ÓÍþвµ½°æ±¾3.90µÄMSG1200¡¢MSG2100E¡¢MSG2200¼°MSG2300ÐͺÅ×°±¸µÄÇå¾²£¬¿ÉÄܵ¼ÖÂÑÏÖصÄÊý¾Ýй¶ºÍϵͳ±»²»·¨ÈëÇÖ¡£Çå¾²½çÒÑÈ·ÈϸÃÎó²îÒ×ÓÚ±»¶ñÒâʹÓã¬ÇÒ×Ô9Ô³õÆ𣬹¥»÷Ô˶¯ÆµÈÔ£¬ÓÚ9ÔÂ12ÈÕÖÁ13ÈÕµÖ´ïá¯Á룬ÏÔʾ³öÍþвÐÐΪÕßµÄÆð¾¢Ì¬ÊÆ¡£ÃæÁÙÕâÒ»½ôÆÈ״̬£¬Ö»¹ÜRAISECOMÉÐδÐû²¼¹Ù·½²¹¶¡£¬µ«ÆóÒµÓ¦Á¬Ã¦½ÓÄɲ½·¥½µµÍΣº¦¡£Ö÷ҪʹÃüÊÇÑÏ¿áÏÞÖƶÔ×°±¸Web½çÃæµÄ»á¼ûȨÏÞ£¬½öÔÊÐíÊÜÐÅÍеÄÍøÂçºÍÊÚȨְԱ½ÓÈ롣ͬʱ£¬ÔöÇ¿Web½çÃæµÄÊäÈëÑéÖ¤»úÖÆ£¬ÊµÑéÑÏ¿áµÄÕûÀí³ÌÐò£¬ÒÔµÖÓùÏÂÁî×¢Èë¹¥»÷¡£±ðµÄ£¬°²ÅŸßЧµÄÍøÂç¼à¿ØºÍÈëÇÖ¼ì²âϵͳ£¬ÊµÊ±¼à¿ØÍøÂçÔ˶¯£¬ÊµÊ±·¢Ã÷²¢Ó¦¶ÔÈκοÉÒÉÐÐΪ£¬Ò²ÊÇÖÁ¹ØÖ÷ÒªµÄ·À»¤²½·¥¡£
https://securityonline.info/critical-flaw-in-raisecom-gateways-actively-exploited-exposing-thousands-to-remote-attacks/
6. DockerÓëKubernetesÔâÐÂÐͼÓÃÜÇ®±ÒÍÚ¾ò¶ñÒâÈí¼þ¹¥»÷
9ÔÂ25ÈÕ£¬Datadog Security Research½ÒÆÆÁËÒ»ÏîÕë¶ÔDockerºÍKubernetesÇéÐεÄÖØ´ó¶ñÒâÈí¼þÔ˶¯£¬¸ÃÔ˶¯Ê¹ÓÃÈÝÆ÷±àÅÅÊÖÒÕÖеÄÇå¾²Îó²î£¬ÌØÊâÊÇ̻¶ÔÚ»¥ÁªÍøÉÏÇÒδÉèÖÃÊʵ±Éí·ÝÑéÖ¤µÄDocker API¶Ëµã£¬¾ÙÐдó¹æÄ£¼ÓÃÜÇ®±ÒÍÚ¾ò¡£¹¥»÷Õßͨ¹ýɨÃ蹤¾ßʶ±ðÒ×Êܹ¥»÷µÄÈÝÆ÷£¬°²ÅÅXMRigÍÚ¾òÈí¼þ£¬²¢Ê¹Óóõʼ»¯¾ç±¾ÏÂÔØÌØÊ⸺ÔØ¡¢×°ÖÃÊý¾Ý´«Ê乤¾ßºÍÀú³ÌÒþ²Ø³ÌÐò£¬ÒÔÔöÇ¿Òþ²ØÐÔºÍÈö²¥ÄÜÁ¦¡£´Ë¶ñÒâÈí¼þ²»µ«ÏÞÓÚ¼òµ¥DockerʵÀý£¬»¹Í¨¹ýºáÏòÒÆÏÂÊÖÒÕÈçkube.lateral.shµÈ¾ç±¾£¬ÔÚÔÆ»ù´¡ÉèÊ©ÖÐÆÕ±éÈö²¥£¬ÌØÊâÊÇÕë¶ÔKubernetes¼¯Èº£¬Ê¹ÓÃKubelet API°²ÅŸü¶àÍÚ¾òÈÝÆ÷£¬À©´ó¹¥»÷¹æÄ£¡£±ðµÄ£¬¹¥»÷Õß»¹Ê¹ÓÃDocker HubÐû²¼¶ñÒâ¾µÏñ£¬²¢Í¨¹ýʹÓÃDocker SwarmÇéÐΣ¬½«ÊÜѬȾÖ÷»úÄÉÈ뽩ʬÍøÂ磬ʵÏÖ¼¯ÖпØÖÆ¡£¸ÃÔ˶¯Í¹ÏÔÁËÔÆÇéÐÎÖÐÉèÖùýʧ£¬ÌØÊâÊÇδ±£»¤Docker API¶ËµãµÄÑÏÖØΣº¦¡£¹¥»÷ÕßʹÓÃÕâЩÎó²î£¬ÒÔ¼«Ð¡µÄ×ÌÈÅÔÚÔÆ»ù´¡ÉèÊ©ÖÐѸËÙÀ©É¢£¬Ðγɴó¹æÄ£µÄÂþÑÜʽ¼ÓÃÜÍÚ¾òÍøÂ磬Ϊ×ÔÉíıȡÀûÒ档ΪӦ¶Ô´ËÀàÍþв£¬ÔÆÖÎÀíÔ±ÐèÁ¬Ã¦½ÓÄÉÐж¯£¬ÔöÇ¿Çå¾²ÉèÖá£
https://securityonline.info/new-malware-campaign-mines-crypto-in-docker-kubernetes/