ThreeAMºÚ¿Í×é֯й¶Carolina ArthritisÒ½ÁÆÊý¾Ý

Ðû²¼Ê±¼ä 2024-10-29

1. ThreeAMºÚ¿Í×é֯й¶Carolina ArthritisÒ½ÁÆÊý¾Ý


10ÔÂ25ÈÕ£¬ºÚ¿Í×éÖ¯ThreeAM½«Æä¹¥»÷Ä¿µÄCarolina ArthritisµÄÒ½ÁÆÊý¾ÝÌí¼Óµ½Ð¹ÃÜÍøÕ¾ÉÏ£¬²¢ÔÚ¼¸Ð¡Ê±ÄÚй¶ÁËËùÓÐÇÔÈ¡µÄÊý¾Ý£¬¶øûÓиøÓè¸ÃÒ½ÁÆ»ú¹¹¸¶¿îÏÞÆÚ»òÖÒÑÔ¡£ThreeAMÉù³ÆÔÚ9ÔÂ27ÈÕ¹¥»÷Á˸ûú¹¹£¬²¢¼ÓÃÜÁËÆäÎļþ¡£±»ÇÔÈ¡µÄÊý¾Ý°üÀ¨ÊÜHIPAA±£»¤µÄ¿µ½¡ÐÅÏ¢£¬ÈçСÎÒ˽¼ÒÐÅÏ¢¡¢²¡Ê·¡¢Ò½ÁƼͼºÍ¼ì²éЧ¹ûµÈ¡£ThreeAMÔøÓëCarolina ArthritisµÄ¹þÀï˹²©Ê¿¾ÙÐÐ̸ÅУ¬µ«Î´Äܸ濢ЭÒé¡£ThreeAMÔÚÎļþÖз¢Ã÷ÁËÒ½ÉúµÄÍËÐÝÕË»§±¨±í£¬²¢¶Ô´ËÌåÏÖ²»Âú¡£±ðµÄ£¬Ð¹Â¶µÄÎļþ»¹°üÀ¨Carolina ArthritisµÄÄÚ²¿ÓªÒµ¼Í¼£¬ÈçÔ±¹¤Êý¾Ý¡¢ÈËΪµ¥¡¢Ë°ÎñÐÅÏ¢¡¢401kºÍÆäËû¸£ÀûÐÅÏ¢£¬ÒÔ¼°ÅÌËã»úÓû§ÃûºÍÃÜÂë¡£ÐèÒªÉó²é20¶àÄêµÄÎļþ²Å»ªÈ·¶¨ÐèҪ֪ͨ˭ÒÔ¼°Éæ¼°ÄÄЩÀàÐ͵ÄÐÅÏ¢¡£Carolina Arthritisδ¶ÔѯÎÊ×÷³ö»ØÓ¦£¬Éв»ÇåÎúÕâ´Î¹¥»÷ÊÇ·ñ¶Ô»¼Õß»¤ÌêÍ·ÉúÁËÓ°Ï죬ÒÔ¼°ËûÃÇÊÇ·ñÓÐÈκοÉÄܱ»¼ÓÃܵĻ¼ÕßÎļþµÄ¿ÉÓñ¸·Ý¡£


https://databreaches.net/2024/10/25/carolina-arthritis-hit-by-threeam-ransomware-attack/


2. ÃÀ¹úÁÙÖÕ¾ì×¢Ò©·¿OPPCÔâÓö´ó¹æÄ£Êý¾Ýй¶


10ÔÂ25ÈÕ£¬ÃÀ¹úÁÙÖÕ¾ì×¢Ò©·¿OnePoint Patient Care£¨OPPC£©ÔâÓöÁËÊý¾Ýй¶ÊÂÎñ£¬µ¼ÖÂÔ¼80ÍòÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶¡£OPPCÊÇÒ»¼ÒÌṩÁÙÖÕ¾ì×¢ºÍǨ¾ÍÖÎÁÆ·þÎñµÄÒ©µê£¬ÓëÒ½ÁƱ£½¡ÌṩÉÌÏàÖú£¬Îª»¼ÕßÌṩ¶¨ÖÆÒ©ÎïºÍÖ§³Ö¡£2024Äê8ÔÂ8ÈÕ£¬OPPCÔÚÆäÅÌËã»úÍøÂçÉϼì²âµ½¿ÉÒÉÔ˶¯£¬²¢Á¬Ã¦Æô¶¯ÄÚ²¿ÊӲ죬ͬʱԼÇë·¨Ò½Çå¾²¹«Ë¾½øÒ»³ÌÐò²é¡£8ÔÂ15ÈÕ£¬OPPCÈ·ÈÏÔÚ8ÔÂ6ÈÕÖÁ8ÈÕʱ´ú£¬ÓÐÈËδ¾­ÊÚȨ»á¼ûÁËÆäϵͳ²¢»ñÈ¡ÁËСÎÒ˽¼ÒÐÅÏ¢£¬°üÀ¨ÐÕÃû¡¢ÆÜÉíÐÅÏ¢¡¢Ò½ÁƼͼ¡¢Õï¶Ï¡¢´¦·½ÏêÇéÒÔ¼°²¿·ÖÊý¾ÝµÄÉç»áÇå¾²ºÅÂë¡£OPPCÒÑÏòÃÀ¹úÎÀÉúÓ빫ÖÚ·þÎñ²¿±¨¸æ´Ë´ÎÇå¾²ÊÂÎñ£¬²¢½¨ÒéÊÜÓ°ÏìµÄСÎÒ˽¼Ò¼à¿ØÐÅÓñ¨¸æºÍ±¨±íÖÐÊÇ·ñ±£´æ¿ÉÒÉÔ˶¯£¬²¢ÏòÖ´·¨²¿·Ö±¨¸æÈκÎڲƭÐÐΪ¡£¾ÝϤ£¬´Ë´Îй¶ÊÂÎñÓëInc RansomÀÕË÷Èí¼þ×éÖ¯ÓйØ£¬¸Ã×éÖ¯ÔÚÆäTorйÃÜÍøÕ¾ÉϽ«OPPCÌí¼Óµ½Êܺ¦ÕßÃûµ¥ÖУ¬µ«OPPCûÓÐÖ§¸¶Êê½ð£¬µ¼ÖÂÊý¾Ý±»Ð¹Â¶¡£Inc Ransom×Ô2023Äê×îÏÈ»îÔ¾£¬ÒÑÉù³Æ¶ÔÖÁÉÙ65¸ö×éÖ¯µÄÈëÇÖÊÂÎñÈÏÕæ¡£


https://securityaffairs.com/170247/data-breach/onepoint-patient-care-data-breach.html


3. ºÉÀ¼¾¯·½¡°Âí¸ñŬ˹Ðж¯¡±ÖØ´´RedlineºÍMetaÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ


10ÔÂ28ÈÕ£¬ºÉÀ¼¾¯·½ÔÚ¡°Âí¸ñŬ˹Ðж¯¡±ÖÐÀֳɲé·âÁËRedlineºÍMetaÕâÁ½¿îÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÍøÂç»ù´¡ÉèÊ©£¬²¢ÖÒÑÔÍøÂç·¸·¨·Ö×ÓËûÃǵÄÊý¾ÝÒѱ»Ö´·¨²¿·ÖÕÆÎÕ¡£ÕâÁ½¿î¶ñÒâÈí¼þ»á´ÓÊÜѬȾÉè±¹ØÁ¬Ää¯ÀÀÆ÷ÇÔÈ¡°üÀ¨Æ¾Ö¤¡¢ä¯ÀÀÀúÊ·¼Í¼¡¢Ãô¸ÐÎĵµµÈÔÚÄڵĶàÖÖÐÅÏ¢£¬È»ºó³öÊÛ»òÓÃÓÚÍøÂç¹¥»÷¡£´Ë´ÎÐж¯»ñµÃÁË°üÀ¨ÃÀ¹úÁª°îÊÓ²ì¾Ö¡¢Å·ÖÞ˾·¨×éÖ¯µÈ¹ú¼ÊÖ´·¨Í¬°éµÄÖ§³Ö¡£¾¯·½²»µ«»ñµÃÁËÕâÁ½¿î¶ñÒâÈí¼þµÄÔ´´úÂ룬»¹ÕÆÎÕÁË¿ÉÓÃÓÚ×·²éʹÓøöñÒâÈí¼þµÄÍøÂç·¸·¨·Ö×ÓµÄÖ¤¾Ý¡£±ðµÄ£¬ºÉÀ¼¾¯·½»¹½ÓÄÉÔÚºÚ¿ÍÂÛ̳ÉϽ¨ÉèÕ˺Ų¢·¢ËÍÖ±½ÓÐÂÎŵķ½·¨£¬ÖÒÑÔÍþвÐÐΪÕßËûÃÇÕýÊܵ½Ç×½ü¼àÊÓ¡£ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÒѳÉΪÆóÒµÃæÁÙµÄÖØ´óÎÊÌ⣬RedlineºÍMetaµÈ¶ñÒâÈí¼þÒѵ¼Ö´ó×ÚÃô¸ÐÊý¾Ý±»ÇÔÈ¡£¬²¢±»ÓÃÓÚÍøÂç¹¥»÷¡£ÕâЩ±»µÁƾ֤Òѱ»ÓÃÀ´·¢¶¯Ò»Ð©×îÑÏÖصÄÎ¥¹æÐÐΪ£¬¶ÔÍøÂçÇå¾²×é³ÉÑÏÖØÍþв¡£


https://www.bleepingcomputer.com/news/legal/redline-meta-infostealer-malware-operations-seized-by-police/


4. TeamTNTʹÓÃDockerÎó²îÌᳫкڿÍÔ˶¯


10ÔÂ28ÈÕ£¬ÎÛÃûÕÑÖøµÄºÚ¿Í×éÖ¯TeamTNT½üÆÚÌᳫÁËÒ»ÏîеĺڿÍÔ˶¯£¬¸Ã×é֯ʹÓÃ̻¶µÄDockerÊØ»¤³ÌÐò°²ÅŶñÒâÈí¼þ£¬²¢Í¨¹ýÊÜѬȾµÄ·þÎñÆ÷ºÍDocker Hub¾ÙÐй¥»÷Èö²¥¡£Aqua NautilusµÄÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬TeamTNT£¨ÓÖÃûAdept Libra£©Í¨¹ýÈëÇÖÒ»¸öÕýµ±µÄDocker HubÕË»§ÍйܶñÒâÈí¼þ£¬ÉÏ´«ÁËÔ¼30¸ö¾µÏñ£¬°üÀ¨ÓÃÓÚÈö²¥¶ñÒâÈí¼þµÄ»ù´¡ÉèÊ©¾µÏñºÍרעÓÚ¼ÓÃÜÇ®±ÒÍÚ¾ò»òÅÌËãÄÜÁ¦³ö×âµÄÓ°Ïì¾µÏñ¡£TeamTNTʹÓÃDocker Gatling GunɨÃè´ó×ÚIPµØµã£¬²éÕÒÔÚÌض¨¶Ë¿ÚÉÏÔËÐеÄDockerÊØ»¤³ÌÐòÎó²î£¬²¢°²ÅŶñÒâÈÝÆ÷ºÍ¾ç±¾¡£ÎªÁËÌӱܼì²â£¬TeamTNTʹÓÃÏȽøµÄSliver¶ñÒâÈí¼þ£¬»ìÈëÕýµ±Àú³Ì£¬ÇÔȡƾ֤²¢É¨ÃèÍøÂçÑ°ÕÒÆäËûÄ¿µÄ¡£ËûÃǵÄ×îÖÕÄ¿µÄÊÇЮÖÆ×ÊÔ´¾ÙÐмÓÃÜÇ®±ÒÍÚ¾ò»ò³öÊÛÊÜѬȾϵͳµÄ»á¼ûȨÏÞ£¬Ê¹ÓöàÖÖÍÚ¿óÈí¼þ¾ÙÐÐÓÅ»¯²Ù×÷¡£´Ë´ÎÔ˶¯Õ¹Ê¾ÁËTeamTNTµÄ˳ӦºÍÉú³¤ÄÜÁ¦£¬¸÷×éÖ¯±ØÐè¼á³ÖСÐIJ¢ÔöÇ¿ÍøÂçÇ徲ʵ¼ù£¬ÒÔÌá·À¸Ã×éÖ¯µÄ¹¥»÷Σº¦¡£


https://hackread.com/teamtnt-exploits-ips-malware-attack-docker-clusters/


5. Hot TopicÖ÷¹ËÊý¾ÝÔâй¶£¬°µÍø¾ªÏÖ3.5ÒÚÌõСÎÒ˽¼ÒÐÅÏ¢


10ÔÂ25ÈÕ£¬ÒÔÉ«ÁÐÍøÂçÇå¾²¹«Ë¾Hudson Rock·¢Ã÷£¬ÔÚ°µÍøÉÏÓÐÒ»¸ö¾Ý³Æ°üÀ¨3.5ÒÚÌõHot TopicÖ÷¹ËСÎÒ˽¼ÒºÍÖ§¸¶Êý¾ÝµÄÖØ´óÊý¾Ý¿âÕýÔÚ±»¹ûÕæ³öÊÛ¡£¸ÃÊý¾Ý¿â¾Ý³ÆÓÉÃûΪSatanicµÄÍþв×éÖ¯Ðû²¼£¬°üÀ¨Óû§µÄÏêϸСÎÒ˽¼ÒÐÅÏ¢ºÍÖ§¸¶Ï¸½Ú£¬Éæ¼°Hot Topic¡¢TorridºÍBoxLunchÈý¼ÒÁãÊÛÆóÒµ¡£ËäÈ»Hot TopicÉÐδ¹ûÕæÈÏ¿ÉÊý¾Ýй¶£¬µ«Ëæ×ÅÇå¾²Ñо¿Ö°Ô±·¢Ã÷µÄÖ¤¾ÝÔ½À´Ô½¶à£¬¸ÃÊÂÎñµÄÕæʵÐÔÔ½À´Ô½¸ß¡£Hudson RockÖÒÑԳƣ¬Õ⽫¸øÓû§´øÀ´ÑÏÖØÇå¾²Òþ»¼£¬ÈçÉí·Ý͵ÇÔ¡¢½ðÈÚڲƭµÈ¡£¾ÝÊӲ죬´Ë´ÎÊý¾Ýй¶¿ÉÄÜÔ´ÓÚinfo-stealerľÂíѬȾ£¬¸ÃľÂíÈëÇÖÁËΪHot TopicµÈÁãÊÛÉÌÌṩÊý¾Ýͳһ·þÎñµÄµÚÈý·½¹«Ë¾Ô±¹¤µÄÅÌËã»ú£¬¶øȱ·¦¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©»úÖÆ¿ÉÄÜÊǵ¼Ö¸ÃÊÂÎñ±¬·¢µÄ½¹µãÒòËØÖ®Ò»¡£±ðµÄ£¬Hot TopicÔÚȨÏÞÖÎÀíÉÏÒ²±£´æÖØ´óÎÊÌ⣬ÒòÔ±¹¤Æ¾Ö¤µ¼ÖµÄй¶ÊÂÎñÓ°ÏìÃ潫»áºÜÊǹã¡£SatanicÍþв×é֯ϣÍûÒÔ2ÍòÃÀÔªµÄ¼ÛÇ®³öÊÛ¸ÃÊý¾Ý¿â£¬»òÏòHot TopicÀÕË÷1ÍòÃÀԪɾ³ý¸ÃÌû×Ó¡£


https://cybernews.com/security/hackers-put-350m-hot-topic-customers-records-for-sale/


6. ·¨¹úFree¹«Ë¾ÔâÍøÂç¹¥»÷£¬¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢ÒÉÔâй¶


10ÔÂ28ÈÕ£¬·¨¹ú»¥ÁªÍø·þÎñÌṩÉÌFree£¬×÷Ϊ·¨¹úµÚ¶þ´óISP£¬ÓµÓÐÁè¼Ý2290ÍòÓû§£¬¿ËÈÕÅû¶ÁËÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ¡£¾Ý³Æ£¬ÍþвÐÐΪÕß»ñµÃÁËFreeÄÚ²¿ÖÎÀí¹¤¾ßµÄ»á¼ûȨÏÞ£¬²¢ÍµÈ¡ÁËһЩ¶©ÔÄÕßµÄСÎÒ˽¼ÒÊý¾Ý¡£¸Ã¹«Ë¾ÔÚ10ÔÂ26ÈÕÏò·¨ÐÂÉç֤ʵÁËÕâÒ»ÐÂÎÅ£¬Ö¸³ö²¿·ÖÓû§ÕË»§Ïà¹ØµÄСÎÒ˽¼ÒÊý¾Ý±»Î´¾­ÊÚȨ»á¼û£¬µ«ÃÜÂë¡¢ÒøÐп¨ÐÅÏ¢ºÍͨѶÄÚÈÝδÊÜÓ°Ïì¡£¹«Ë¾ÒÑÌáÆðÐÌÊÂËßËÏ£¬²¢Í¨ÖªÁËÏà¹Øî¿Ïµ»ú¹¹¡£Âô¼ÒÔÚÍøÂç·¸·¨ÂÛ̳ÉÏÁгöÁËÁ½¸öÊý¾Ý¿â£¬°üÀ¨´ó×Ú¿Í»§ÕË»§ºÍIBANÏêϸÐÅÏ¢£¬²¢Ðû²¼ÁËÊý¾ÝÑù±¾ºÍ½Øͼ¡£Ð¹Â¶µÄ¿Í»§Êý¾Ý°üÀ¨Ãû×Ö¡¢ÐÕÊÏ¡¢µç»°ºÅÂë¡¢ÍêÕûÓÊÕþµØµã¡¢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµÈ¡£Ö»¹ÜÍøÂç·¸·¨·Ö×ÓÉù³Æ´Ë´ÎÊý¾Ýй¶ӰÏìÁËFree MobileºÍFreebox¿Í»§£¬µ«¹«Ë¾ÌåÏÖÒѽÓÄɲ½·¥×èÖ¹¹¥»÷²¢ÔöÇ¿ÐÅϢϵͳ±£»¤¡£


https://securityaffairs.com/170333/data-breach/free-suffered-a-cyber-attack.html