OneBloodÔâÀÕË÷Èí¼þ¹¥»÷ £¬Ï×ѪÕßÓ×ÎÒÐÅϢй¶

°ä²¼¹¦·ò 2025-01-15

1. OneBloodÔâÀÕË÷Èí¼þ¹¥»÷ £¬Ï×ѪÕßÓ×ÎÒÐÅϢй¶


1ÔÂ13ÈÕ £¬·ÇÓ¯ÀûÏ×Ѫ»ú¹¹OneBlood֤ʵ £¬2024ÄêÏÄÌìÔâ·êÁËÒ»´ÎÀÕË÷Èí¼þ¹¥»÷ £¬µ¼ÖÂÏ×ѪÕßµÄÓ×ÎÒÐÅÏ¢±»ÇÔÈ¡¡£¸Ã»ú¹¹ÓÚ2024Äê7ÔÂ31ÈÕ³õ´Î¹«¿ªÁËÕâÒ»ÊÂÎñ £¬Ö¸³ö¹¥»÷Õß¼ÓÃÜÁËÆäÐé¹¹»ú £¬ÆÈʹÆäѡȡÊÖ¶¯Á÷³Ì £¬½ø¶øÓ°ÏìÁËѪҺ²É¼¯¡¢¼ì²âºÍ·ÖÅä £¬µ¼Ö²¿ÃÅÕïËù³öÏÖÑϳÁѪҺǷȱ¡£OneBloodËæ¼´·¢³ö´¹Î£ºôÓõ £¬ÒªÇó¾èÏ×OÐÍѪ¡¢OÐÍѪÒõÐÔѪºÍѪÓ×°å¡£ÉÏÖÜ £¬OneBloodÆðÍ·ÏòÊÜÓ°ÏìÓ×ÎÒ·¢ËÍÊý¾Ýй¶֪ͨ £¬È·ÈÏй¶²úÉúÔÚ2024Äê7ÔÂ14ÈÕ £¬ÇÒÍþвÐÐΪÕßÖ±ÖÁ7ÔÂ29ÈÕ²ÅÊ§È¥ÍøÂç½Ó¼ûȨÏÞ¡£Ð¹Â¶Êý¾ÝÖØÒªÔ̺¬ÐÕÃûºÍÉç»á°²È«ºÅÂ루SSN£© £¬ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇԺͽðÈÚڲƭ £¬·çÏÕ³ÖÐø¶àÄꡣΪ½µµÍ·çÏÕ £¬OneBloodÌṩÁËÒ»ÄêÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ £¬²¢½¨ÒéÊÜÓ°ÏìÓ×ÎÒÉèÏàÐÅÓþ¶³½áºÍڲƭ¾¯±¨¡£Ö»¹ÜOneBloodÒÑÍÆ¹ã֪ͨʹÃü £¬µ«Áù¸öÔµÄÑÓ³¤ÈÔʹÊÜÓ°ÏìÕßÃæ¶Ô·çÏÕ¡£Ä¿Ç° £¬ÀÕË÷Èí¼þ¹¥»÷µÄ¾ßÌåÊÜÓ°ÏìÈËÊýÉÐδÅû¶¡£


https://www.bleepingcomputer.com/news/security/oneblood-confirms-personal-data-stolen-in-july-ransomware-attack/


2. ¶íµý±¨¹ØÁªºÚ¿Í×éÖ¯ÀûÓùþµ±¾ÖÎļþÍøÂç´¹µö¹¥»÷ÖÐÑǹÙÔ±


1ÔÂ13ÈÕ £¬Sekoia×êÑÐÈËÔ±½Òʾ £¬Ò»¸öÓë¶íÂÞ˹µý±¨²¿ÃÅÓйØÁªµÄºÚ¿Í×éÖ¯ £¬ÀûÓÿ´ËƺϷ¨µÄ¹þÈø¿Ë˹̹µ±¾ÖÎļþ×÷ÎªÍøÂç´¹µöµö¶ü £¬³É¹¦Ï°È¾ºÍ¼à¶½ÁËÖÐÑǵ±¾Ö¹ÙÔ±¡£ÕâЩÎļþÔ̺¬¹þÈø¿Ë˹̹µ±¾ÖµÄ±í½»ÉêÃ÷¡¢Ðź¯µÈ²Ý¸å £¬ÇÒÄÚÈÝÓëÕæÊµÎļþ¸ß¶ÈÀàËÆ £¬ÄÚǶÓжñÒâÈí¼þ¡£¸ÃºÚ¿Í×éÖ¯±»Ö¸ÒÔΪAPT 28£¨Fancy Bear£© £¬ÓëĪ˹¿ÆÖÐÑëµý±¨¾Ö(GRU)ÓÐÁªÏµ¡£×Ô2024Äê7ÔÂÒÔÀ´ £¬¸Ã×éÖ¯ÔÚÖÐÑÇ¡¢¶«ÑǺÍÅ·ÖÞµØÓòÒÑÓÕÆ­ÊýÊ®ÃûÊܺ¦Õß £¬Ê¹ÓÃHATVIBEºÍCHERRYSPYÁ½ÖÖ¶ñÒâÈí¼þ¡£ÕâЩÎĵµÔÚWordÖÐÖ´ÐжñÒâºêÎļþ £¬½µµÍÉ豸°²È«ÉèÖà £¬±£Áô¶ñÒâÈí¼þ±äÁ¿²¢Æô¶¯°ÂÃØ·¨Ê½¡£Õâ´Î»î¶¯±»¶¨ÃûΪ¡°Ë«»÷¡±¡£¾Ý·ÖÎö £¬HATVIBEÓëZEBROCYºóÃż¼Êõ³Áµþ £¬¾ùÖ¸ÏòFancy Bear¡£Ö»¹ÜÉв»Ã÷ÏÔAPT 28ÈôºÎ»ñÈ¡ÕâЩ¹þÈø¿Ë˹̹µ±¾ÖÎļþ £¬µ«×êÑÐÈËÔ±´§Ä¦¿ÉÄÜͨ¹ýÔçÆÚÍøÂçÐж¯Ð¹Â¶¡¢¿ªÔ´ÍøÂç»òÎïÀíÐж¯»ñµÃ¡£¹þÈø¿Ë˹̹ÒòÔÚÎÚ¿ËÀ¼Õ½ÕùµÈÎÊÌâÉÏÍÑÀë¶íÂÞ˹ӰÏì £¬ÒÔ¼°³ÉΪҵÎñ³ÁҪͬ°éºÍ½¨ÉèºËµçÕ¾µÄ¹ú¼Ê¾ºÕù £¬³ÉÎªÍøÂç¼äµý»î¶¯µÄÖØÒªÖ¸±ê¡£¶íÂÞ˹ּÔÚÈ·±£¹þÈø¿Ë˹̹ÕþÖÎÒ»Ö £¬µÖÏû¾ºÕùµÐÊÖÓ°Ïì £¬²¢¼áÈÍÆäÔڸõØÓòµÄ¾­¼ÃºÍÕ½Êõְλ¡£


https://cyberscoop.com/fancy-bear-kazakhstan-russia-sekoia/


3. Aviatrix Controller¸ßΣ·ì϶ÖÂÔÆ²¿ÊðÊÜÍþв


1ÔÂ13ÈÕ £¬Aviatrix ControllerÖеÄÒ»¸ö¸ßÑϳÁÐÔ·ì϶£¨CVE-2024-50603£©±»Åû¶ºó £¬¶Ô¶à¸öÔÆ²¿Êð×é³ÉÁËÍþв¡£¸Ã·ì϶ÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¨RCE£© £¬²¢ÇÒÔÚAWSÖеÄĬÈϲ¿Êð´æÔÚȨÏÞÌáÉý·çÏÕ £¬Òò¶ø³ö¸ñΣÏÕ¡£·ì϶ÓÚ1ÔÂ7ÈÕÅû¶ £¬ÒÑÓй«¿ªµÄ¸ÅÏëÑéÖ¤£¨PoC£©·ì϶¡£Aviatrix ControllerÓÃÓÚÔ®ÊÖÖÎÀíºÍ×Ô¶¯»¯AWS²¿Ê𠣬ֻ¹ÜÖ»ÓÐÔ¼3%µÄAWS¿Í»§Ê¹ÓøòúÆ· £¬µ«ÔÚ65%µÄÔÆ»·¾³ÖÐ £¬Ëü²¿ÊðÔÚÐé¹¹»úÉÏ £¬´æÔÚºáÏòÒÆ¶¯õè¾¶ £¬ÔÊÐí¹¥»÷Õß»ñµÃÖÎÀíԱȨÏÞ¡£×êÑÐÈËÔ±¹Û²ìµ½³É¹¦·ì϶µ¼Ö¶ñÒâÈí¼þ²¿Ê𠣬ÈçSilverºóÃźͼÓÃܽٳÖ¡£·ÀÓùÕßÄܹ»Éý¼¶µ½7.2.4996°æ±¾ÒÔÔ¤·À¸Ã·ì϶ £¬²¢×èֹͨ¹ý¶Ë¿Ú443µÄ¹«¿ª½Ó¼û¡£Aviatrix»¹ÌṩÁ˲¹¶¡ £¬µ«Ö¸³öÔÚijЩÇé¿öÏ¿ÉÄܱØÒª³ÁÐÂÀûÓá£


https://www.theregister.com/2025/01/13/severe_aviatrix_controller_vulnerability/


4. ¡¶·ÅÖð֮·2¡·ÔâºÚ¿Í¹¥»÷ £¬66¸öÍæ¼ÒÕÊ»§±»µÁ


1ÔÂ13ÈÕ £¬¡¶·ÅÖð֮·2¡·Ôâ·êÁËһ·ÑϳÁµÄºÚ¿Í¹¥»÷ÊÂÎñ £¬¹¥»÷Õßͨ¹ýµÁÈ¡µÄÒ»¸ö¾ÉSteamÕÊ»§ £¬»ñµÃÁËÓë¸ÃÕÊ»§ÓйØÁªµÄÖÎÀíÔ¹ØÊ»§½Ó¼ûȨÏÞ¡£ÕâÒ»·ì϶ʹµÃÍþвÐÐΪÕß¿ÉÄܸü¸ÄÖÁÉÙ66¸öÍæ¼ÒÕÊ»§µÄÃÜÂë £¬²¢½Ó¼ûÕâЩÕÊ»§ £¬µ¼ÖºܶàÍæ¼ÒÃÔʧÁËÓÎÏ·ÄڲɰìµÄÎïÆ· £¬Ô̺¬¹ó³ÁÉ豸ºÍÆÆ·ÑÊý°ÙÓ×ʱ²Å»ñµÃµÄÎïÆ·¡£ÓÉÓÚÈÕÖ¾±£ÁôµÄ¹¦·òÏÞ¶È £¬¿ÉÄÜ»¹Óиü¶àÕÊ»§ÔÚÕâ´ÎÎ¥¹æÐÐΪÖÐÊÜË𠣬µ«¾ßÌåÁìÓòÒÑÎÞ·¨È·¶¨¡£ÓÎÏ·¿ª·¢ÉÌGrinding Gear GamesµÄÓÎÏ·×ܼà֤ʵÁËÕâ´Î¹¥»÷ £¬²¢°µÊ¾ÕâÊÇͨ¹ýÒ»¸ö±»µÁµÄÖÎÀíÔ¹ØÊ»§½øÐеÄ¡£Ëû»¹Ð¹Â© £¬ÓÎÏ·ºó¶Ë´æÔÚÃýÎóºÍ°²È«·ì϶ £¬±¾Äܹ»×èÖ¹Õâ´Î¹¥»÷ £¬µ«Òź¶µÄÊÇËûÃÇ¡°ÆëÈ«¸ãÔÒÁË¡±¡£Ö»¹Ü¿ª·¢ÉÌÒѾ­²ÉÈ¡ÁËһЩ°²È«´ëÊ© £¬µ«¶ÔÓÚÄÇЩÊÜÓ°ÏìµÄÕÊ»§ £¬ËûÃÇÉÐδ°ä·¢ÈκÎÅâ³¥´òËã £¬²¢°µÊ¾ÎÞ·¨¸´Ô­±»µÁÎïÆ·¡£Õâ´ÎÊÂÎñ¶ÔÍæ¼ÒÉçÇøÔì³ÉÁ˳Á´óÓ°Ïì £¬ºÜ¶àÍæ¼Ò¶ÔÓÎÏ·µÄ°²È«ÐÔ°µÊ¾ÓÇÓô¡£


https://www.bleepingcomputer.com/news/security/stolen-path-of-exile-2-admin-account-used-to-hack-player-accounts/


5. AWS S3´æ´¢Í°ÔâCodefingerÀÕË÷Èí¼þ¼ÓÃܹ¥»÷


1ÔÂ13ÈÕ £¬Ò»ÖÖеÄÀÕË÷Èí¼þ»î¶¯ÔÚÀûÓÃAWSµÄ·þÎñÆ÷¶Ë¼ÓÃܺͿͻ§ÌṩµÄÃÜÔ¿£¨SSE-C£©À´¼ÓÃÜAmazon S3´æ´¢Í°ÖеÄÊý¾Ý £¬²¢ÒªÇóÖ§¸¶Êê½ðÄÜÁ¦»ñµÃ½âÃÜÃÜÔ¿¡£ÕâÒ»»î¶¯ÓÉÃûΪ¡°Codefinger¡±µÄÍþвÐÐΪÕßÌáÒé £¬²¢ÒÑÖÁÉÙ¶ÔÁ½ÃûÊܺ¦ÕßÖ´ÐÐÁ˹¥»÷¡£ÑÇÂíÑ·µ¥Ò»´æ´¢·þÎñ£¨S3£©ÊÇÒ»ÖÖ¿ÉÀ©´ó¡¢°²È«ÇÒ¸ßËٵĶÔÏó´æ´¢·þÎñ £¬¶øSSE-CÊÇÒ»ÖÖ¼ÓÃÜÑ¡Ïî £¬ÔÊÐí¿Í»§Ê¹ÓÃ×Ô¼ºµÄ¼ÓÃÜÃÜԿͨ¹ýAES-256Ëã·¨¼ÓÃܺͽâÃÜÊý¾Ý¡£ÔÚCodefingerµÄ¹¥»÷ÖÐ £¬ÍþвÐÐΪÕßʹÓÃÊÜËðµÄAWSƾ֤¶¨Î»ÓµÓÐÌØ¶¨È¨ÏÞµÄÊܺ¦ÕßÃÜÔ¿ £¬¶øºóÔÚ±¾µØÌìÉú¼ÓÃÜÃÜÔ¿À´¼ÓÃÜÖ¸±êÊý¾Ý¡£ÓÉÓÚAWS²»´æ´¢ÕâЩ¼ÓÃÜÃÜÔ¿ £¬Òò¶øÊý¾Ý¸´Ô­±äµÃ²»³ÉÄÜ £¬³ý·ÇµÃµ½¹¥»÷ÕߵĺÏ×÷¡£¹¥»÷Õß»¹ÉèÖÃÁËΪÆÚÆßÌìµÄÎļþɾ³ýÕ½Êõ £¬²¢ÔÚËùÓÐÊÜÓ°ÏìµÄĿ¼ÖиéÖÃÊê½ð֪ͨ £¬ÒªÇóÊܺ¦ÕßÔÚÖ¸¶¨µÄ±ÈÌØ±ÒµØÖ·ÉÏÖ§¸¶Êê½ð¡£ÎªÁË·ÀÓù´ËÀ๥»÷ £¬ÑÇÂíÑ·½¨ÒéÖ´ÐÐÑϸñµÄ°²È«ºÍ̸ £¬²¢¼¤ÀøAWS¿Í»§ÉèÖÃÏÞ¶ÈÐÔÕ½Êõ £¬Ô¤·ÀÔÚÆäS3´æ´¢Í°ÉÏʹÓÃSSE-C¡£Í¬Ê± £¬Ó¦½ûÓÃδʹÓõÄAWSÃÜÔ¿ £¬Ê±Ê±ÂÖ»»»î¶¯ÃÜÔ¿ £¬²¢½«ÕÊ»§È¨ÏÞά³ÖÔÚËùÐèµÄ×îµÍ¼¶±ð¡£


https://www.bleepingcomputer.com/news/security/ransomware-abuses-amazon-aws-feature-to-encrypt-s3-buckets/


6. °£Òò»ôÎÂÀí¹¤´óѧÔâÍøÂç¹¥»÷ £¬´¹Î£¹Ø¹ØÍøÂ粢ȡµÞ½ÌÓý»î¶¯


1ÔÂ13ÈÕ £¬°£Òò»ôÎÂÀí¹¤´óѧÔÚÖÜÁùÍíÉÏ9µã×óÓÒ¼ì²âµ½ÍøÂç¹¥»÷ºó £¬Ñ¸ËÙ²ÉÈ¡Á˹عØÍøÂçµÄ´ëÊ©ÒÔÔ¤·À¸üÑϳÁµÄºó¹û¡£Ö»¹Ü´Ë¾Ùµ¼ÖÂÒÀÀµ´óÑ§ÍøÂçµÄÉèÊ©£¨Èçµç×ÓÓʼþ¡¢WiFiºÍʳÌÃÊÕÒø»ú£©ÎÞ·¨Ê¹Óà £¬µ«Ñ§ÉúºÍÔ±¹¤ÈÔÄܹ»½øÈëУ԰¡£´óѧÔÚÖÜÈÕ°ä·¢ÉêÃ÷³Æ £¬ÓÉÓÚѧÉúÔڳﱸ¿¼ÊÔ £¬Ô¤¼ÆÕâ´ÎÍøÂç¹¥»÷¶Ô½²ÊÚ¹¦·òµÄÓ°Ï콫ÓÐÏÞ £¬Í¬Ê±Ç¿µ÷ÆäITÈËÔ¹ØýÔÚÈ«Á¦µ÷²éÕâ´Î¹¥»÷ £¬²¢Ö¸³öĿǰÉÐÎÞ¼£ÏóÅú×¢Êý¾Ý±»µÁ¡£¸±Ð£³¤ÅÁÌØÀï¿Ë¡¤¸ñÂ³ÌØºú˹°µÊ¾ £¬ËûÃÇÒâʶµ½¹Ø¹ØÍøÂç»á´øÀ´ÑϳÁºó¹û £¬µ«ÕâÊÇΪÁËÔ¤·À¸üÔã¸âµÄÁ˾ֲúÉú £¬²¢µ«Ô¸µÃµ½¸÷È˵ÄÀí½â¡£Ö»¹ÜÕâ´Î¹¥»÷µÄ¾ßÌåÐÔÖÊÉÐδÅû¶ £¬µ«Å·Ö޺ܶàÀí¹¤´óѧ½üÄêÀ´¶¼Êܵ½ÁËÀÕË÷Èí¼þ×éÖ¯µÄÓ°Ïì¡£ÖµÍ×ÌùÐĵÄÊÇ £¬Ö»¹Ü°£Òò»ôÎÂÀí¹¤´óѧÓëºÜ¶àÆóҵά³Ö×ÅÁªÏµ £¬µ«Ä¿Ç°Ã»Óм£ÏóÅú×¢ÕâЩÆóÒµ¿ÉÄÜÊܵ½Ó°Ïì¡£


https://therecord.media/tu-eindhoven-cyberattack-lectures-canceled