ÃÀ¹úË®Îñ¹«Ë¾ÔâÍøÂç¹¥»÷£¬²¿·Öϵͳ¹Ø±Õ²¢Æô¶¯ÊÓ²ì

Ðû²¼Ê±¼ä 2024-10-08

1. ÃÀ¹úË®Îñ¹«Ë¾ÔâÍøÂç¹¥»÷£¬²¿·Öϵͳ¹Ø±Õ²¢Æô¶¯ÊÓ²ì


10ÔÂ7ÈÕ£¬ÃÀ¹úË®Îñ¹«Ë¾£¬×÷Ϊ¸Ã¹ú×î´óµÄÉÏÊÐË®ÎñºÍÎÛË®´¦Öóͷ£¹«ÓÃÊÂÒµ¹«Ë¾£¬½üÆÚÔâÊÜÁËÍøÂç¹¥»÷£¬µ¼Ö²¿·Öϵͳ±»ÆȹرÕ¡£¹«Ë¾ÒÑÔ¼ÇëµÚÈý·½ÍøÂçÇ徲ר¼Ò½éÈ룬²¢ÏòÖ´·¨²¿·Ö±¨¸æ´ËÊÂÎñ£¬Ð­µ÷ÍŽáÊӲ졣ΪӦ¶Ô¹¥»÷£¬¹«Ë¾½ÓÄÉÁ˶Ͽª»òÍ£ÓÃijЩϵͳµÄ²½·¥£¬²¢¹Ø±ÕÁËÔÚÏß¿Í»§ÃÅ»§·þÎñMyWater£¬ÔÝÍ£Á˼ƷѷþÎñ¡£¹«Ë¾½²»°ÈËÌåÏÖ£¬Ê±´ú²»»áÏò¿Í»§ÊÕÈ¡ÖÍÄɽ𣬲¢Ç¿µ÷¹©Ë®»ò·ÏË®ÉèÊ©¼°ÔËӪδÊÜ´Ë´ÎÊÂÎñÓ°Ïì¡£ÃÀ¹úË®Îñ¹«Ë¾ÓµÓÐ6,500¶àÃûÔ±¹¤£¬Îª14¸öÖݺÍ18¸ö¾üÊ»ùµØµÄÁè¼Ý1,400ÍòÈËÌṩ·þÎñ¡£´ËÇ°£¬ÀàËÆÊÂÎñÒ²Ôø±¬·¢£¬Èç¿°Èø˹ÖÝ°¢¿ÏÉ«³ÇµÄË®´¦Öóͷ£³§ÔÚÖÜÄ©ÔâÊÜÍøÂç¹¥»÷ºóתΪÊÖ¶¯²Ù×÷¡£±ðµÄ£¬Ë®ÐÅÏ¢¹²ÏíÓëÆÊÎöÖÐÐÄÔøÐû²¼ÖÒÑԳƶíÂÞ˹Õë¶ÔË®Îñ²¿·ÖÌᳫÍøÂç¹¥»÷¡£ÃÀ¹úÇéÐα£»¤ÊðÒ²Ðû²¼ÁËÖ¸µ¼Òâ¼û£¬×ÊÖúÆÀ¹ÀÍøÂçÇ徲ʵ¼ù²¢È·¶¨ïÔÌ­¹¥»÷Σº¦µÄ²½·¥¡£


https://www.bleepingcomputer.com/news/security/american-water-shuts-down-online-services-after-cyberattack/


2. Cloudflare×èÖ¹ÁËÊ·ÉÏ×î´óÁ÷Á¿DDoS¹¥»÷£¬·åÖµµÖ´ï3.8Tbps


10ÔÂ3ÈÕ£¬½ðÈÚ·þÎñ¡¢»¥ÁªÍøºÍµçÐÅÐÐÒµÔâÊÜÁËÒ»³¡Ø¨¹ÅδÓеÄÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷£¬·åÖµÁ÷Á¿¸ß´ïÿÃë3.8½ðÈÚ·þÎñ¡¢»¥ÁªÍøºÍµçÐÅÐÐÒµÔâÊÜÁËÒ»³¡Ø¨¹ÅδÓеÄÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷£¬·åÖµÁ÷Á¿¸ß´ïÿÃë3.8Tbps£¬´´ÏÂÁ˹ûÕæ¼Í¼µÄ×î´óÖµ¡£Õⳡ¹¥»÷Ò»Á¬ÁËÒ»¸öÔ£¬°üÀ¨ÁËÁè¼Ý100´ÎµÄ³¬´óÁ÷Á¿DDoS¹¥»÷£¬Í¨¹ýÀ¬»øÊý¾ÝÑÍûÍøÂç»ù´¡ÉèÊ©¡£ÔÚÈÝÁ¿÷缯ÐÍDDoS¹¥»÷ÖУ¬´ó×ÚÊý¾Ýµ¼Ö´ø¿íÏûºÄ´ù¾¡£¬Ó¦ÓóÌÐòºÍ×°±¸×ÊÔ´¿Ý½ß£¬Õýµ±Óû§ÎÞ·¨»á¼û¡£ÊÜѬȾµÄ×°±¸°üÀ¨Asus·ÓÉÆ÷¡¢MikroTik×°±¸¡¢DVRºÍÍøÂç·þÎñÆ÷£¬Çұ鲼ȫÇò£¬¶íÂÞ˹¡¢Ô½ÄÏ¡¢ÃÀ¹ú¡¢°ÍÎ÷ºÍÎ÷°àÑÀÓÈΪ¼¯ÖС£CloudflareÀֳɻº½âÁËËùÓй¥»÷£¬²¢Ö¸³ö·åÖµ¹¥»÷Ò»Á¬ÁË65Ãë¡£¶ñÒâ×°±¸Ö÷ҪʹÓÃUDPЭÒ飬¸ÃЭÒéÊý¾Ý´«ÊäËÙÂʿ죬µ«ÎÞÐ轨ÉèÕýʽÅþÁ¬¡£´ËÇ°£¬Î¢ÈíÔø¼á³Ö·ÀÓù×î´óDDoS¹¥»÷µÄ¼Í¼£¬Á÷Á¿Îª3.47Tbps¡£


https://www.bleepingcomputer.com/news/security/cloudflare-blocks-largest-recorded-ddos-attack-peaking-at-38tbps/


3. CosmicSting¹¥»÷ÍþвAdobe CommerceºÍMagentoÊÐËÁÇå¾²


10ÔÂ3ÈÕ£¬Adobe CommerceºÍMagentoÔÚÏßÊÐËÁÕýÃæÁÙÃûΪ¡°CosmicSting¡±µÄÑÏÖع¥»÷£¬¸Ã¹¥»÷ÒÑÈëÇÖÔ¼5%µÄÊÐËÁ¡£CosmicStingÎó²î£¨CVE-2024-34102£©ÊÇÒ»¸ö¸ßÑÏÖØÐÔµÄÐÅϢй¶Îó²î£¬µ±ÓëglibcµÄiconvº¯ÊýÖеÄÁíÒ»Çå¾²ÎÊÌ⣨CVE-2024-2961£©½áÊÊʱ£¬¹¥»÷Õß¿ÉÔÚÄ¿µÄ·þÎñÆ÷ÉÏʵÏÖÔ¶³Ì´úÂëÖ´ÐС£ÊÜÓ°ÏìµÄ²úÆ·°üÀ¨Adobe CommerceµÄ¶à¸ö°æ±¾¡¢Magento¿ªÔ´µÄ¶à¸ö°æ±¾ÒÔ¼°Adobe Commerce Webhooks²å¼þµÄijЩ°æ±¾¡£×Ô2024Äê6ÔÂÒÔÀ´£¬ÍøÕ¾Çå¾²¹«Ë¾SansecÒÑ×·×Ùµ½4,275¼ÒÊÐËÁÔÚCosmicSting¹¥»÷ÖÐÔâµ½ÈëÇÖ£¬×ÅÃûÊܺ¦Õß°üÀ¨»Ý¶øÆÖ¡¢À×Åó¡¢¹ú¼ÒµØÀí¡¢Èü¸ñÍþºÍ˼¿ÆµÈ¡£SansecÖÒÑԳƣ¬ÓÉÓÚÐÞ²¹ËÙÂÊÓëÇéÐÎÑÏÖØÐÔ²»Æ¥Å䣬ÏÖÔÚ¶à¸öÍþвÐÐΪÕßÕýÔÚʹÓÃCosmicStingÎó²îÈëÇÖδ´ò²¹¶¡µÄÍøÕ¾¡£ÕâЩÍþв×éÖ¯ÃûΪ¡°Bobry¡±¡¢¡°Polyovki¡±µÈ£¬ËûÃdzöÓÚ¾­¼ÃÄîÍ·£¬ÈëÇÖÍøÕ¾ÒÔÇÔÊØÐÅÓÿ¨ºÍ¿Í»§ÐÅÏ¢¡£¶ñÒâ¾ç±¾»á´Óαװ³É×ÅÃûJavaScript¿â»òÆÊÎö°üµÄÓòÃû×¢ÈëÊÜѬȾµÄÍøÕ¾¡£Òò´Ë£¬Ç¿ÁÒ½¨ÒéÍøÕ¾ÖÎÀíÔ±¾¡¿ìÉý¼¶µ½Çå¾²µÄÈí¼þ°æ±¾¡£


https://www.bleepingcomputer.com/news/security/over-4-000-adobe-commerce-magento-shops-hacked-in-cosmicsting-attacks/


4. ZimbraÓʼþ·þÎñÆ÷ÑÏÖØÎó²îCVE-2024-45519Òý·¢Çå¾²¾¯±¨


10ÔÂ4ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Zimbraµç×ÓÓʼþ·þÎñÆ÷ÖеÄÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2024-45519Ìí¼Óµ½ÆäÒÑ֪ʹÓÃÎó²îĿ¼ÖУ¬¸ÃÎó²îÕë¶ÔZimbraµÄpostjournal·þÎñ£¬ÔÊÐí¹¥»÷Õßͨ¹ý·¢ËÍÌØÖƵç×ÓÓʼþʹÓÃϵͳ£¬Ö´ÐÐí§ÒâÏÂÁî¡£´ËÎó²îÒÑÒýÆðÕþ¸®ºÍÒªº¦»ù´¡ÉèÊ©²¿·ÖµÄСÐÄ£¬ÓÉÓÚ¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓÃËü£¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡¢ÏµÍ³ÈëÇÖ»òδ¾­ÊÚȨµÄ»á¼ûµÈÑÏÖØЧ¹û¡£ZimbraÒÑÐû²¼²¹¶¡ÐÞ¸´´ËÎó²î£¬½¨ÒéϵͳÖÎÀíÔ±Á¬Ã¦Ó¦ÓᣱðµÄ£¬ProjectDiscoveryµÄÑо¿Ö°Ô±Ìá³öÁËÁ½ÖÖ»º½â²½·¥£ºÈôÊÇPostjournal·þÎñ²»Ö÷Òª£¬Çë½ûÓÃËü£»²¢È·±£¡°mynetworks¡±ÉèÖÃ׼ȷÉèÖÃÒÔ×èֹδ¾­ÊÚȨµÄ»á¼û¡£¼øÓÚZimbraÔÚÈ«ÇòµÄÆÕ±éʹÓ㬺öÊÓÕâЩ·ÀÓù²½·¥¿ÉÄÜ»áʹϵͳ̻¶ÓÚ×Ô¶¯¹¥»÷µÄΣº¦ÖС£CISAÒÑ·¢³öÇ¿ÁÒÖÒÑÔ£¬²¢É趨ÁËÁª°î»º½â²½·¥µÄ×îºóÏÞÆÚΪ2024Äê10ÔÂ24ÈÕ£¬ÎªÁª°î»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯ÌṩÁ˽ôÆȵÄʱ¼äÀ´Ó¦Óò¹¶¡»ò×èֹʹÓÃZimbraµÄÈÕÖ¾·þÎñ¡£


https://securityonline.info/zimbra-email-servers-under-attack-cisa-flags-cve-2024-45519-as-actively-exploited/


5. perfctl¶ñÒâÈí¼þ£ºÕë¶ÔLinux·þÎñÆ÷µÄÒþ²Ø³¤ÆÚ¹¥»÷Óë×ÊԴЮÖÆ


10ÔÂ4ÈÕ£¬Aqua Nautilus µÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪ perfctl µÄ Linux ¶ñÒâÈí¼þ£¬ËüÒÑÕë¶ÔÉèÖùýʧµÄ Linux ·þÎñÆ÷¾ÙÐÐÁ˳¤´ï 3-4 ÄêµÄ¹¥»÷¡£¸Ã¶ñÒâÈí¼þʹÓà rootkit Òþ²ØÆä±£´æ£¬Í¨¹ý TOR ¾ÙÐÐͨѶ£¬²¢ÔÚ·þÎñÆ÷¿ÕÏÐʱִÐмÓÃÜÇ®±Ò¿ó¹¤ºÍÊðÀíЮÖÆÈí¼þ¡£¹¥»÷ÕßʹÓÃÎó²î»ò¹ýʧÉèÖ㬴ӿØÖÆµÄ HTTP ·þÎñÆ÷ÏÂÔضà²ã½á¹¹µÄÓÐÓÃÔغÉ£¬Í¨¹ýÖØÃüÃûºÍɾ³ýԭʼ¶þ½øÖÆÎļþÀ´ÑÚÊÎ×Ù¼£¡£Ëü»¹»áͶ·ÅÒ»¸ö rootkit ºÍ¾­ÓÉÐÞ¸ÄµÄ Linux ÊÊÓóÌÐò£¬Ê¹Óø߼¶ÌÓ±ÜÊÖÒÕÈç¼ì²âÐÂÓû§Ê±×èÖ¹Ô˶¯£¬²¢ÖÕÖ¹¾ºÕù¶ñÒâÈí¼þ¡£ÎªÁ˼á³Ö³¤ÆÚÐÔ£¬¶ñÒâÈí¼þ»áÐÞ¸ÄÓû§µÇ¼¾ç±¾£¬ÔÚÓû§µÇ¼ʱִÐУ¬²¢ÔÚºǫ́ÔËÐÐÒÔÈ·±£ÆäÒ»Á¬ÔËÐС£¸Ã¶ñÒâÈí¼þµÄÖ÷ÒªÓ°ÏìÊÇ×ÊԴЮÖÆ£¬Í¨¹ýÖ´ÐÐÃÅÂÞ±ÒÍÚ¿ó³ÌÐòÀ´ºÄ¾¡·þÎñÆ÷ CPU ×ÊÔ´¡£Òª¼ì²â perfctl ¶ñÒâÈí¼þ£¬ÐèÒªÉó²é CPU ʹÓÃÂÊÊÇ·ñ·ºÆðÒì³£·åÖµ»òϵͳÊÇ·ñ±äÂý¡£


https://securityaffairs.com/169351/malware/perfctl-malware-targets-misconfigured-linux-servers.html


6. UMC Health SystemÔâÀÕË÷Èí¼þ¹¥»÷£¬»¼ÕßתÒÆÓë·þÎñÊÜ×è


10ÔÂ1ÈÕ£¬µÂ¿ËÈø˹ÖÝÒ½ÁƱ£½¡ÌṩÉÌUMC Health System½üÆÚÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÆäITϵͳ·ºÆðÒì³£Ô˶¯¡£Îª×èÖ¹ÊÂÎñ£¬UMCÁ¬Ã¦¶Ï¿ªÏµÍ³²¢Õö¿ªÊӲ죬ȷÈÏ´Ë´ÎÒì³£Ô˶¯ÓëÀÕË÷Èí¼þÊÂÎñÓйØ¡£Ö»¹ÜÉÐδÓдóÐÍÀÕË÷Èí¼þ×éÖ¯¶Ô¹¥»÷ÈÏÕ棬µ«¹¥»÷ÒÑÆÈʹUMC½«²¿·Ö»¼ÕßתÒƵ½ÆäËûËùÔÚ£¬²¢µ¼ÖÂһЩ¿ÆÊҹرջòÖ»ÄÜÌṩÑÓ³Ù·þÎñ£¬ÆäÖзÅÉä¿ÆÊÜÓ°ÏìÓÈΪÑÏÖØ¡£±ðµÄ£¬ÓÉÓÚITϵͳ¹ÊÕÏ£¬UMCÕïËùÎÞ·¨ÌṩҽÁÆ´¦·½Çåµ¥£¬½¨Ò黼ÕßËæÉíЯ´ø£¬Ò½ÁƼͼËä¿ÉÔÚ»¼ÕßÃÅ»§ÍøÕ¾ÉÏÕÒµ½£¬µ«ÎÞ·¨´òÓ¡¡£ÏÖÔÚ£¬Í¨¹ýµç»°»òÔÚÏßÃÅ»§½¨ÉèÏàͬҲÎÞ·¨°ü¹Ü£¬½¨ÒéÐèÒªÁ¬Ã¦×ÊÖúµÄÈËÇ°ÍùÕïËù¡£´Ë´Î¹¥»÷¿ÉÄÜÉæ¼°Êý¾Ý͵ÇÔ£¬ÊýÊ®ÍòÈ˵ÄÃô¸ÐÒ½ÁÆÐÅÏ¢¿ÉÄÜÊܵ½Ó°Ï죬UMCÕýÔڶԴ˾ÙÐÐÊӲ죬²¢ÌåÏÖ½«ÔÚÓиü¶àÐÅϢʱÌṩ¸üС£


https://www.bleepingcomputer.com/news/security/ransomware-attack-forces-umc-health-system-to-divert-some-patients/