MoneyGramÔâÓöÍøÂç¹¥»÷ £¬ÏµÍ³ÖÐÖ¹Òý·¢ÆÕ±é¹Ø×¢

Ðû²¼Ê±¼ä 2024-09-26
1. MoneyGramÔâÓöÍøÂç¹¥»÷ £¬ÏµÍ³ÖÐÖ¹Òý·¢ÆÕ±é¹Ø×¢


9ÔÂ24ÈÕ £¬»ã¿î¾ÞÍ·MoneyGram×ÔÉÏÖÜÎåÆðÔâÓöϵͳÖÐÖ¹ £¬²¢È·ÈÏÕâÊÇÓÉÍøÂç¹¥»÷ËùÖ ¡£Ö»¹Ü´Ëǰ¹«Ë¾½öÌá¼°¡°ÍøÂçÖÐÖ¹¡± £¬Î´Ã÷ȷ˵Ã÷Ôµ¹ÊÔ­ÓÉ £¬Ö±ÖÁÖÜÒ»²ÅÕýʽͨ¸æÍøÂçÇå¾²ÊÂÎñÊÇÆäϵͳ̱»¾µÄȪԴ ¡£MoneyGram×÷ΪȫÇòµÚ¶þ´ó»ã¿î·þÎñÌṩÉÌ £¬Æä·þÎñÁýÕÖ200¸ö¹ú¼ÒµÄ350,000¸öÍøµã¼°ÏßÉÏÆ½Ì¨ £¬ÄêÉúÒâÁ¿³¬1.2ÒÚ±Ê ¡£´Ë´Î¹¥»÷µ¼ÖÂÓû§ÎÞ·¨Íê³ÉÉúÒâ»ò»á¼û×ʽð £¬ÍøÕ¾Ò²ÎÞ·¨Ê¹Óà £¬Òý·¢ÁËÆÕ±é¹Ø×¢ºÍµ£ÐÄ ¡£¹«Ë¾Ñ¸ËÙ½ÓÄÉÐж¯ £¬½«ÊÜÓ°ÏìµÄϵͳÏÂÏßÒÔ×èÖ¹¹¥»÷ £¬²¢ÓëÍⲿר¼ÒºÍÖ´·¨²¿·ÖϸÃܺÏ×÷ÒÔ»Ö¸´·þÎñ ¡£MoneyGramÇ¿µ÷Á˶ÔÊÂÎñÑÏÖØÐÔµÄÊìϤ £¬²¢ÔÊÐí¾¡¿ì»Ö¸´ÏµÍ³Õý³£ÔËÐÐ ¡£È»¶ø £¬¹ØÓÚϵͳ»Ö¸´µÄÏêϸʱ¼ä±íÉÐδÐû²¼ £¬ÌåÏÖ¹¥»÷¿ÉÄÜÈÔÔÚÒ»Á¬»ò»Ö¸´ÊÂÇé´¦ÓÚ³õÆÚ½×¶Î ¡£Ö»¹Ü¹¥»÷ÀàÐÍÉÐδ¹ûÕæ £¬µ«³¤Ê±¼äµÄ·þÎñÖÐÖ¹ºÍÅþÁ¬ÎÊÌâÇ¿ÁÒÌåÏÖÕâ¿ÉÄÜÊÇÒ»ÆðÀÕË÷Èí¼þ¹¥»÷ ¡£¼øÓÚMoneyGramÖØ´óµÄÓû§»ù´¡ £¬´Ë´ÎÊÂÎñÈôÉæ¼°Êý¾Ýй¶ £¬ÆäDZÔÚÓ°Ï콫¼«ÎªÉîÔ¶ ¡£


https://www.bleepingcomputer.com/news/security/moneygram-confirms-a-cyberattack-is-behind-dayslong-outage/


2. ºÚ¿ÍÒ»ÖÜÄÚµÚÈý´ÎÏ®»÷´÷¶û £¬500MBÃô¸ÐÊý¾ÝÔâй¶


9ÔÂ25ÈÕ £¬ºÚ¿Í¡°grep¡±ÔÙ´ÎÕë¶Ô¿Æ¼¼¾ÞÍ·´÷¶û·¢¶¯¹¥»÷ £¬Ò»ÖÜÄÚµÚÈý´ÎÔì³ÉÊý¾Ýй¶ £¬´Ë´Îй¶ÁËÔ¼500MBµÄÃô¸ÐÊý¾Ý £¬°üÀ¨ÄÚ²¿Îĵµ¡¢Í¼Æ¬¡¢²âÊÔÊÓÆµ¼°¶àÖØÉí·ÝÑéÖ¤£¨MFA£©Êý¾Ý ¡£´÷¶ûÖÁ½ñδ×ö³öÕýʽ»ØÓ¦ £¬¶øºÚ¿Í¡°grep¡±Ôò¹ûÕæÐû³Æ¶Ô´Ë´Îй¶ÈÏÕæ £¬²¢ÌåÏÖËùÓÐÊý¾Ý¾ùÔ´×Ôµ¥´ÎÈëÇÖ £¬Ö»ÊÇÕ½ÂÔÐԵطÖÅúÆØ¹â ¡£Ð¹Â¶µÄÐÅÏ¢Öк­¸ÇÁËÄÚ²¿Æ±Îñϵͳϸ½Ú¡¢Öйú»ù´¡ÉèÊ©ÏîÄ¿Îļþ¼°Çå¾²Ïà¹ØÎĵµ £¬Ò»µ©ÕâЩÃô¸ÐÐÅÏ¢±»²»µ±Ê¹Óà £¬½«¶Ô´÷¶ûµÄÔËÓªÇå¾²×é³ÉÑÏÖØÍþв ¡£2024Äê 9 Ô 19 ÈÕ £¬¡°grep¡±Ð¹Â¶ÁËÁè¼Ý 12,000 Ãû´÷¶ûÔ±¹¤µÄÊý¾Ý £¬Òý·¢ÁËÄÚ²¿ÊÓ²ì ¡£¼¸Ììºó £¬¼´ 9 Ô 22 ÈÕ £¬¸ü¶àÃô¸ÐµÄÄÚ²¿Îļþ±»Ð¹Â¶ £¬¾Ý³ÆÊÇ´÷¶ûʹÓà Atlassian ¹¤¾ßʱй¶µÄ ¡£×èÖ¹ÏÖÔÚ £¬´÷¶ûÉÐδȷÈÏ´Ë´ÎÊý¾Ýй¶µÄÏêϸӰÏì¹æÄ£¼°ÊÇ·ñÉæ¼°µÚÈý·½Îó²î £¬Ò»ÖÜÄÚ±¬·¢ÈýÆðÊý¾Ýй¶ÊÂÎñ £¬ÈËÃǶԴ÷¶ûÍøÂçÇå¾²µÄµ£ÐÄÓëÈÕ¾ãÔö ¡£


https://hackread.com/dell-data-leak-in-week-amid-grep-cyberattacks/


3. ÍøÂçÇå¾²Ñо¿Ö°Ô±ÖÒÑÔÐÂÐÍ»ùÓÚRustµÄSplinterºóʹÓù¤¾ß


9ÔÂ25ÈÕ £¬ÍøÂçÇå¾²ÁìÓò½üÆÚ·¢Ã÷ÁËÒ»ÖÖÃûΪSplinterµÄÐÂÐͺóʹÓúì¶Ó¹¤¾ß £¬¸Ã¹¤¾ßÓÉPalo Alto Networks Unit 42ÔÚ¿Í»§ÏµÍ³ÖÐʶ±ð²¢Ðû²¼ ¡£SplinterÓÉRustÓïÑÔ±àд £¬Ë书Ч²»ÈçCobalt StrikeµÈ¸ß¼¶¹¤¾ßÖÜÈ« £¬µ«Èç±»ÀÄÓà £¬ÈÔ¶Ô×éÖ¯Çå¾²×é³ÉDZÔÚΣº¦ ¡£¸Ã¹¤¾ßרΪºì¶ÓÐж¯Éè¼Æ £¬ÓÃÓÚʶ±ðÆóÒµÍøÂçÖеÄÇå¾²Îó²î £¬µ«Í¬Ñù±£´æ±»¶ñÒâʹÓõÄΣº¦ ¡£ÏÖÔÚ £¬ÉÐÎÞÖ¤¾ÝÅú×¢SplinterÓëÏêϸÍþвÐÐΪÕßÏà¹ØÁª £¬ÇÒÆäÅÓ¸ÅÂÔ»ýÖ÷Òª¹éÒòÓÚ°üÀ¨µÄRust¿âÊýÄ¿ ¡£Splinter¾ß±¸¶àÖÖ¹¦Ð§ £¬ÈçÖ´ÐÐWindowsÏÂÁî¡¢Ô¶³ÌÀú³Ì×¢Èë¡¢ÎļþÉÏ´«ÏÂÔØ¡¢ÔÆ·þÎñÕË»§ÐÅÏ¢ÍøÂç¼°×ÔÎÒɾ³ýµÈ £¬ÕâЩ¾ùͨ¹ýÆäÉèÖõÄC2·þÎñÆ÷ÎüÊÕʹÃüʵÏÖ ¡£±ðµÄ £¬½üÆÚ»¹ÆØ¹âÁËÆäËû¼¸Öָ߼¶¹¥»÷ÊÖÒÕ £¬Èçͨ¹ýMicrosoft Office RPC½Ó¿ÚºÍ¶ñÒâµæÆ¬ÊµÏÖµÄÒþÃØ´úÂë×¢ÈëÓëȨÏÞÌáÉý £¬ÒÔ¼°Ê¹ÓÃThread Name-CallingÊÖÒÕÈÆ¹ý¶Ëµã±£»¤¾ÙÐÐÀú³Ì×¢Èë ¡£ÕâЩ·¢Ã÷Ç¿µ÷ÁËÔÚÍøÂçÇå¾²ÁìÓò¼á³ÖÔ¤·ÀºÍ¼ì²âÄÜÁ¦µÄÖ÷ÒªÐÔ £¬ÓÉÓÚ·¸·¨·Ö×Ó»áÒ»Ö±½ÓÄÉÐÂÊÖÒÕÍþв×éÖ¯Çå¾² ¡£


https://thehackernews.com/2024/09/cybersecurity-researchers-warn-of-new.html


4. ÒÆ¶¯ÍøÂç´¹ÂÚÍþв¼¤Ôö £¬82%´¹ÂÚÍøÕ¾Ãé×¼ÒÆ¶¯×°±¸


9ÔÂ25ÈÕ £¬Ëæ×ÅÒÆ¶¯ÍøÂç´¹ÂÚ¹¥»÷µÄ¼¤Ôö £¬Áè¼Ý°Ë³ÉµÄÍøÂç´¹ÂÚÍøÕ¾ÏÖÒÑרעÓÚÒÆ¶¯×°±¸ £¬ÔöÌíÂÊÏÔÖø ¡£Çå¾²Ñо¿Õ¹ÏÖ £¬´ó¶¼·¸·¨·Ö×ÓʹÓÃHTTPSЭÒéαװ´¹ÂÚÍøÕ¾Çå¾² £¬ÔöÌíÁËʶ±ðÄѶÈ £¬ÓÈÆäÔÚÒÆ¶¯¶Ë ¡£È«Çò¹æÄ£ÄÚ £¬¶ñÒâÈí¼þ¼°ÆóÒµÌØ¹¤Èí¼þÍþв´ó·ùÔöÌí £¬ÌØÊâÊÇAndroidƽ̨Îó²îÉÏÉýÏÔÖø ¡£Í¬Ê± £¬ÅþÁ¬²»Çå¾²ÍøÂçµÄ×°±¸¼¤Ôö £¬Ò½ÁƱ£½¡ÐÐÒµ³ÉÎªÒÆ¶¯ÍøÂç´¹ÂÚ¹¥»÷µÄÖØÔÖÇø ¡£×¨¼Ò½¨Òé £¬ÈçÒ½ÁƱ£½¡×éÖ¯Ó¦½ÓÄÉÁãÐÅÈÎÇ徲ģ×Ó £¬ÍŽáAIÇý¶¯µÄÍþвÇ鱨ƽ̨ÒÔÔöÇ¿·ÀÓù ¡£±ðµÄ £¬ÔöÇ¿ÒÆ¶¯×°±¸¹ÜÀí£¨MDM£©¡¢ÊµÑé¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©ºÍÃÜÂë¹ÜÀíÕ½ÂÔ±»ÊÓΪҪº¦·ÀÓù²½·¥ ¡£°´ÆÚ¾ÙÐÐÔ±¹¤Çå¾²Åàѵ¡¢Îó²îɨÃ衢Σº¦ÆÀ¹À¼°Çå¾²Éó¼ÆÒ²±Ø²»¿ÉÉÙ ¡£Õë¶Ô²àÔØÓ¦ÓóÌÐòµÄÇ徲Σº¦ £¬×¨¼ÒÇ¿µ÷ÆäÈÆ¹ý¹Ù·½Éó²é¿ÉÄÜ´øÀ´µÄΣº¦ £¬²¢½¨ÒéÆóÒµÖÆ¶©ÑÏ¿áÕþ²ßÏÞÖÆ²àÔØÓ¦ÓÃ×°Öà £¬Í¨¹ýMDMϵͳ¿ØÖÆÓ¦ÓÃȨÏÞ £¬²¢½ÌÓýÔ±¹¤Ê¶±ðÏà¹ØÎ£º¦ ¡£


https://securityboulevard.com/2024/09/mobile-phishing-attacks-explode-enterprise-devices-targeted/


5. RAISECOM GatewayÑÏÖØÎó²îCVE-2024-7120±»Æð¾¢Ê¹ÓÃ


9ÔÂ25ÈÕ £¬RAISECOM Gateway×°±¸½üÆÚÆØ¹âµÄCVE-2024-7120Îó²î £¬ÒÔÆä¼«¸ßµÄCVSSÆÀ·Ö9.8 £¬³ÉΪÆóÒµÇå¾²ÁìÓòµÄÒ»´óÒþÓÇ ¡£´ËÎó²îÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÊÜÓ°ÏìµÄWeb½çÃælist_base_config.php¾ç±¾Ö´ÐÐí§ÒâÏÂÁî £¬Ö±½ÓÍþвµ½°æ±¾3.90µÄMSG1200¡¢MSG2100E¡¢MSG2200¼°MSG2300ÐͺÅ×°±¸µÄÇå¾² £¬¿ÉÄܵ¼ÖÂÑÏÖØµÄÊý¾Ýй¶ºÍϵͳ±»²»·¨ÈëÇÖ ¡£Çå¾²½çÒÑÈ·ÈϸÃÎó²îÒ×ÓÚ±»¶ñÒâʹÓà £¬ÇÒ×Ô9Ô³õÆð £¬¹¥»÷»î¶¯ÆµÈÔ £¬ÓÚ9ÔÂ12ÈÕÖÁ13ÈÕµÖ´ïá¯Áë £¬ÏÔʾ³öÍþвÐÐΪÕߵįð¾¢Ì¬ÊÆ ¡£ÃæÁÙÕâÒ»½ôÆÈ״̬ £¬Ö»¹ÜRAISECOMÉÐδÐû²¼¹Ù·½²¹¶¡ £¬µ«ÆóÒµÓ¦Á¬Ã¦½ÓÄɲ½·¥½µµÍΣº¦ ¡£Ö÷ҪʹÃüÊÇÑÏ¿áÏÞÖÆ¶Ô×°±¸Web½çÃæµÄ»á¼ûȨÏÞ £¬½öÔÊÐíÊÜÐÅÈεÄÍøÂçºÍÊÚȨְԱ½ÓÈë ¡£Í¬Ê± £¬ÔöÇ¿Web½çÃæµÄÊäÈëÑéÖ¤»úÖÆ £¬ÊµÑéÑÏ¿áµÄÕûÀí³ÌÐò £¬ÒÔµÖÓùÏÂÁî×¢Èë¹¥»÷ ¡£±ðµÄ £¬°²ÅŸßЧµÄÍøÂç¼à¿ØºÍÈëÇÖ¼ì²âϵͳ £¬ÊµÊ±¼à¿ØÍøÂç»î¶¯ £¬ÊµÊ±·¢Ã÷²¢Ó¦¶ÔÈκοÉÒÉÐÐΪ £¬Ò²ÊÇÖÁ¹ØÖ÷ÒªµÄ·À»¤²½·¥ ¡£


https://securityonline.info/critical-flaw-in-raisecom-gateways-actively-exploited-exposing-thousands-to-remote-attacks/


6. DockerÓëKubernetesÔâÐÂÐͼÓÃÜÇ®±ÒÍÚ¾ò¶ñÒâÈí¼þ¹¥»÷


9ÔÂ25ÈÕ £¬Datadog Security Research½ÒÆÆÁËÒ»ÏîÕë¶ÔDockerºÍKubernetesÇéÐεÄÖØ´ó¶ñÒâÈí¼þ»î¶¯ £¬¸Ã»î¶¯Ê¹ÓÃÈÝÆ÷±àÅÅÊÖÒÕÖеÄÇå¾²Îó²î £¬ÌØÊâÊÇ̻¶ÔÚ»¥ÁªÍøÉÏÇÒδÉèÖÃÊʵ±Éí·ÝÑéÖ¤µÄDocker API¶Ëµã £¬¾ÙÐдó¹æÄ£¼ÓÃÜÇ®±ÒÍÚ¾ò ¡£¹¥»÷Õßͨ¹ýɨÃ蹤¾ßʶ±ðÒ×Êܹ¥»÷µÄÈÝÆ÷ £¬°²ÅÅXMRigÍÚ¾òÈí¼þ £¬²¢Ê¹Óóõʼ»¯¾ç±¾ÏÂÔØÌØÊâ¸ºÔØ¡¢×°ÖÃÊý¾Ý´«Ê乤¾ßºÍÀú³ÌÒþ²Ø³ÌÐò £¬ÒÔÔöÇ¿Òþ²ØÐÔºÍÈö²¥ÄÜÁ¦ ¡£´Ë¶ñÒâÈí¼þ²»µ«ÏÞÓÚ¼òµ¥DockerʵÀý £¬»¹Í¨¹ýºáÏòÒÆÏÂÊÖÒÕÈçkube.lateral.shµÈ¾ç±¾ £¬ÔÚÔÆ»ù´¡ÉèÊ©ÖÐÆÕ±éÈö²¥ £¬ÌØÊâÊÇÕë¶ÔKubernetes¼¯Èº £¬Ê¹ÓÃKubelet API°²ÅŸü¶àÍÚ¾òÈÝÆ÷ £¬À©´ó¹¥»÷¹æÄ£ ¡£±ðµÄ £¬¹¥»÷Õß»¹Ê¹ÓÃDocker HubÐû²¼¶ñÒâ¾µÏñ £¬²¢Í¨¹ýʹÓÃDocker SwarmÇéÐÎ £¬½«ÊÜѬȾÖ÷»úÄÉÈë½©Ê¬ÍøÂç £¬ÊµÏÖ¼¯ÖпØÖÆ ¡£¸Ã»î¶¯Í¹ÏÔÁËÔÆÇéÐÎÖÐÉèÖùýʧ £¬ÌØÊâÊÇδ±£»¤Docker API¶ËµãµÄÑÏÖØÎ£º¦ ¡£¹¥»÷ÕßʹÓÃÕâЩÎó²î £¬ÒÔ¼«Ð¡µÄ×ÌÈÅÔÚÔÆ»ù´¡ÉèÊ©ÖÐѸËÙÀ©É¢ £¬Ðγɴó¹æÄ£µÄÂþÑÜʽ¼ÓÃÜÍÚ¾òÍøÂç £¬Îª×ÔÉíıȡÀûÒæ ¡£ÎªÓ¦¶Ô´ËÀàÍþв £¬ÔƹÜÀíÔ±ÐèÁ¬Ã¦½ÓÄÉÐж¯ £¬ÔöÇ¿Çå¾²ÉèÖà ¡£


https://securityonline.info/new-malware-campaign-mines-crypto-in-docker-kubernetes/