Central GroupÔâÓöÐÂÊý¾Ýй¶£¬500Íò»áÔ±ÐÅϢΣÔÚ³¯Ï¦
Ðû²¼Ê±¼ä 2024-11-221.Central GroupÔâÓöÐÂÊý¾Ýй¶£¬500Íò»áÔ±ÐÅϢΣÔÚ³¯Ï¦
11ÔÂ20ÈÕ£¬Ì©¹ú¿ç¹úÆóÒµ¼¯ÍÅCentral Group½üÆÚÔâÓöÁËÊý¾Ýй¶ÊÂÎñ¡£¾ÝDataBreaches±¨¸æ£¬2021Äê10Ô£¬Central Restaurant GroupÔøÔâµ½ÃûΪDESORDENµÄÍþвÐÐΪÕß¹¥»÷¡£¶ø½üÆÚ£¬ÁíÒ»ÃûÍþвÐÐΪÕß0mid16BÉù³Æ£¬ÔÚ2024Äê8ÔÂÖÁ11ÔÂʱ´ú£¬Í¨¹ýCentral RetailÍøÂç̻¶µÄÊÜËðAPI¶Ëµã£¬»á¼û²¢ÇÔÈ¡ÁË5,108,826ÌõCentral Group The1 Card»áԱСÎÒ˽¼ÒÐÅÏ¢¼Í¼¡£The1 CardÊÇCentral GroupÆìÏÂËùÓÐÁãÊÛºÍÏûºÄÆ·ÅƽÓÄɵĻáԱϵͳ£¬ÓµÓÐÁè¼Ý1700Íò»áÔ±¡£0mid16BÌåÏÖ£¬ÓÉÓÚÓëCentral GroupµÄ̸ÅÐʧ°Ü£¬¾öÒé³öÊÛÕâЩ»áԱСÎÒ˽¼ÒÐÅÏ¢¼Í¼£¬°üÀ¨Ãû×Ö¡¢ÐÕÊÏ¡¢»áÔ±ºÅÂë¡¢¹úÃñÉí·ÝÖ¤ºÅÂë¡¢¹ú¼Ò¡¢ÊÖ»úµç»°ºÍµç×ÓÓʼþµÈÃô¸ÐÐÅÏ¢£¬×ܾÞϸΪ582MB¡£¸ÃºÚ¿ÍÔÚºÚ¿ÍÂÛ̳ºÍX.comÉÏÐû²¼ÁËÊý¾ÝÁÐ±í£¬²¢ÌṩÁËÊý¾ÝÑù±¾ºÍÑéÖ¤ÕæʵÐÔµÄÒªÁì¡£±ðµÄ£¬0mid16B»¹Ö¸ÔðÌ©¹ú¹«Ë¾²»ÖØÊÓÊý¾Ý±£»¤£¬ÓÉÓÚ²»»áÊܵ½ÈÎÄÇÀï·£¡£DataBreachesÔøʵÑéÁªÏµCentral Group£¬µ«×èÖ¹·¢¸åʱÉÐδÊÕµ½»Ø¸´¡£
https://databreaches.net/2024/11/20/thai-loyalty-membership-card-data-of-5-million-customers-put-up-for-sale-on-hacking-forum/
2. ¡°Ghost Tap¡±£ºÍøÂç·¸·¨·Ö×ÓʹÓÃNFCÊÖÒÕÌ×ÏÖÐÂÕ½ÂÔ
11ÔÂ20ÈÕ£¬ÍøÂç·¸·¨·Ö×Ó½ÓÄÉÁËÒ»ÖÖÃûΪ¡°Ghost Tap¡±µÄÐÂÓ±Ì×ÏÖÒªÁ죬¸ÃÒªÁìʹÓñ»µÁµÄÐÅÓÿ¨ÐÅÏ¢£¬ÌØÊâÊÇÓëApple PayºÍGoogle PayµÈÒƶ¯Ö§¸¶ÏµÍ³Ïà¹ØµÄÊý¾Ý£¬Í¨¹ýÈ«Çò¹æÄ£Äڵġ°Ç®Â⡱ʵÏÖ²»·¨×¬Ç®¡£ÓëÏÈÇ°µÄÒƶ¯¶ñÒâÈí¼þÈçNGateÏà±È£¬Ghost Tap¸üΪÒþ²ØÇÒÄÑÒÔ¼ì²â£¬ÎÞÐèÊܺ¦ÕßµÄʵÌ忨»ò×°±¸£¬Ò²²»ÐèÒ»ÅþÁÚ´¥Êܺ¦Õߣ¬¶øÊÇͨ¹ýÔ¶³Ì½»»¥Íê³É¡£¸ÃÕ½ÂÔÊ×ÏÈÉæ¼°ÇÔÈ¡Ö§¸¶¿¨Êý¾ÝºÍÒ»´ÎÐÔÃÜÂ루OTP£©£¬Õâ¿ÉÒÔͨ¹ýÒøÐжñÒâÈí¼þ¡¢´¹ÂÚÒ³Ãæ»ò¼üÅ̼ͼµÈ·½·¨ÊµÏÖ¡£È»ºó£¬Ê¹ÓÃNFCGate¹¤¾ßºÍÖм̷þÎñÆ÷£¬½«Ö§¸¶ÐÅÏ¢·¢Ë͸øÖØ´óµÄÇ®ÂâÍøÂ磬ÕâЩǮÂâʹÓÃÆä×°±¸µÄNFCоƬÔÚ¶à¸öËùÔÚ¾ÙÐÐÁãÊÛ¹ºÖ㬴ӶøÑÚÊÎÁËÖ÷Òª¹¥»÷ÕßµÄ×Ù¼£¡£ÓÉÓÚÉúÒâ¿´ËÆÕýµ±ÇÒÊèÉ¢ÓÚ²î±ðËùÔÚ£¬½ðÈÚ»ú¹¹ÄÑÒÔ·¢Ã÷ºÍ×èÖ¹ÕâÖÖÕ½ÂÔ£¬ÓÈÆäÊǵ±Éæ¼°´ó×ÚС¶îÖ§¸¶Ê±¡£ÎªÁËÌÓ±Ü×·×Ù£¬Ç®ÂâÃÇ»¹»á½«×°±¸ÖÃÓÚº½ÐÐģʽ£¬µ«¼á³ÖNFCϵͳÔËÐС£ÎªÁËÌá·À¡°Ghost Tap¡±£¬ÒøÐÐÐèÒª±ê¼ÇʹÓÃͳһÕÅ¿¨ÔÚ²î±ðËùÔÚ¾ÙÐеķÇÏÖʵ¿É´ïµÄÉúÒ⣬¶øÏûºÄÕßÔòÐè¼à¿ØÚ²ÆÉúÒâ²¢Á¬Ã¦ÏòÒøÐб¨¸æ¡£
https://www.bleepingcomputer.com/news/security/new-ghost-tap-attack-abuses-nfc-mobile-payments-to-steal-money/
3. Ubuntu Server needrestart°üÆسöÊ®ÄêÂõÎó²î£¬ÔÊÐíÍâµØÌáȨ
11ÔÂ20ÈÕ£¬Ubuntu Server×Ô21.04°æÆðĬÈÏ×°ÖõÄneedrestart°üÖб£´æ¶à¸öÒÑÓÐÊ®ÄêÀúÊ·µÄÇå¾²Îó²î£¬ÕâЩÎó²î¿ÉÄÜʹÍâµØ¹¥»÷ÕßÎÞÐèÓû§½»»¥¼´¿É»ñµÃrootȨÏÞ¡£QualysÍþвÑо¿²¿·ÖÓÚÉÏÔ·¢Ã÷²¢±¨¸æÁËÕâЩÎó²î£¬Ö¸³öËüÃǼ«Ò×±»Ê¹Óã¬Óû§ÐèѸËÙÐж¯ÐÞ¸´¡£Îó²î×Ô2014Äê4ÔÂ27ÈÕneedrestart 0.8°æÒýÈëÚ¹ÊÍÆ÷Ö§³ÖºóÒ»Ö±±£´æ£¬Ó°ÏìDebian¡¢UbuntuµÈLinux¿¯Ðа档NeedrestartÊÇÒ»¸öÓÃÓÚɨÃèϵͳÒÔÈ·¶¨ÔÚ¹²Ïí¿â¸üкóÐèÖØÆôµÄ·þÎñ£¬ÒÔ×èֹϵͳÖÜÈ«ÖØÆôµÄÊÊÓóÌÐò¡£Ëü¼¯³Éµ½·þÎñÆ÷Ó³ÏñÖУ¬ÔÚAPT²Ù×÷ºó×Ô¶¯ÔËÐУ¬Ê¶±ðÒªº¦¿â¸üкóÐèÖØÆôµÄ·þÎñ£¬È·±£·þÎñʹÓÃ×îпâ°æ±¾£¬Ìá¸ßÕý³£ÔËÐÐʱ¼äºÍÐÔÄÜ¡£Qualys·¢Ã÷µÄÎå¸öÎó²î°üÀ¨Í¨¹ýÓÕÆneedrestartʹÓù¥»÷Õß¿ØÖƵÄPYTHONPATH»òRUBYLIBÇéÐαäÁ¿ÔËÐÐÚ¹ÊÍÆ÷£¬»òÒÔrootÉí·ÝÖ´ÐÐí§ÒâshellÏÂÁî¡£UbuntuÖ¸³öÒÑÔÚ3.8°æÖнâ¾öÕâЩÎÊÌ⣬²¢½¨ÒéÓû§ÏÂÔØ×îв¹¶¡£¬»ò½ûÓÃÚ¹ÊÍÆ÷ɨÃèÆ÷×÷ΪÔÝʱ»º½â²½·¥¡£
https://thehackernews.com/2024/11/decades-old-security-vulnerabilities.html
4. Ä«Î÷¸çÕþ¸®Ö´·¨ÊÂÎñ°ì¹«ÊÒÔâRansomhubÀÕË÷Èí¼þ¹¥»÷
11ÔÂ21ÈÕ£¬Ëæ×ÅÍøÂçÇå¾²ÍþвµÄÒ»Ö±¼Ó¾ç£¬Ä«Î÷¸ç×Üͳ¿ËÀ͵Ïæ«¡¤ÐÁ±«Ä·Ö¤Êµ£¬Õþ¸®ÕýÔÚÊÓ²ìÒ»ÆðÕë¶ÔÆäÖ´·¨ÊÂÎñ°ì¹«ÊÒµÄÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ¡£¾Ý³Æ£¬ÀÕË÷Èí¼þÍÅ»ïRansomhub¶Ô´Ë´Î¹¥»÷ÈÏÕ棬²¢ÒÑÐû²¼Õþ¸®Êý¾Ý¿âÖеÄСÎÒ˽¼ÒÐÅÏ¢Ñù±¾£¬Éù³ÆÇÔÈ¡ÁË313 GBµÄÊý¾Ý£¬°üÀ¨ÌõÔ¼¡¢°ü¹ÜºÍ²ÆÎñÎļþµÈ¡£RansomhubÔÚÆäйÃÜÍøÕ¾ÉÏÐû²¼Á˱»µÁÎļþÑù±¾£¬ÕâЩÎļþËƺõÀ´×ÔÕþ¸®¹ÍÔ±Êý¾Ý¿â¡£´Ë´ÎÊÂÎñ²¢·ÇÄ«Î÷¸ç×Üͳ°ì¹«ÊÒÊ×´ÎÔâÓöÉæ¼°Ãô¸ÐÐÅÏ¢µÄºÚ¿Í¹¥»÷£¬½ñÄê1Ô¾ÍÔø±¬·¢263Ãû±¨µÀ×ÜͳÔ˶¯µÄ¼ÇÕßµÄСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶µÄÊÂÎñ¡£RansomHubÊÇÒ»¸öÏà¶Ô½ÏеÄÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©×éÖ¯£¬ÒòÆ伤½øÕ½ÂԺͶÔÒªº¦»ù´¡ÉèÊ©µÄ¹Ø×¢¶øÉùÃûÉ¢ÂÒ£¬±»ÒÔΪÊÇKnightÀÕË÷Èí¼þµÄ¸Ä°æ£¬¸Ã¶ñÒâÈí¼þÕë¶Ô¶à¸öƽ̨£¬²¢½ÓÄÉÁËË«ÖØÀÕË÷Ä£×Ó¡£
https://securityaffairs.com/171257/data-breach/mexico-suffers-ransomware-attack.html
5. ΢ÈíÖØȹ¥»÷ONNXÍøÂç´¹ÂÚ·þÎñ£¬²é·â240¸öÓòÃû
11ÔÂ21ÈÕ£¬×Ô2017ÄêÆð£¬Î¢ÈíÒѲé·âONNX£¨Ò»¸öÍøÂç´¹ÂÚ¼´·þÎñƽ̨£©¿Í»§Ê¹ÓõÄ240¸öÓòÃû£¬ÕâЩÓòÃû±»ÓÃÓÚÕë¶ÔÈ«Çò¹«Ë¾¼°Ð¡ÎÒ˽¼Ò¡£¾Ý΢Èí¡¶2024ÄêÊý×Ö·ÀÓù±¨¸æ¡·£¬ONNX£¨ÓÖ³ÆCaffeineºÍFUHRER£©ÊÇ2024ÄêÉÏ°ëÄê×î´óµÄÖÐÐÄÈËÍøÂç´¹ÂÚ·þÎñ£¬Ã¿Ô·¢ËÍÊýÍòÍòÖÁÊýÒÚ·â´¹ÂÚÓʼþ£¬Ö÷ÒªÃé×¼Microsoft 365ÕÊ»§¼°ÆäËû¿Æ¼¼¹«Ë¾¿Í»§¡£ONNXͨ¹ýTelegramÍƹãÏúÊÛ´¹ÂÚ¹¤¾ß°ü£¬Ìṩ¶àÖÖ¶©ÔÄģʽ£¬²¢½ÓÄɶþάÂë´¹ÂÚµÈÊֶΡ£ÕâЩ¹¥»÷ÄÑÒÔͨ¹ýµä·¶¶Ëµã¼ì²â¼à¿Ø£¬¶ÔÍøÂçÇå¾²ÌṩÉÌ×é³ÉÌôÕ½¡£ÔÚDark AtlasÇå¾²Ñо¿Ö°Ô±Åû¶ÆäËùÓÐÕßAbanoub Nady£¨ÍøÃûMRxC0DER£©Éí·Ýºó£¬ONNXÔËÓªÓÚ6ÔÂ×èÖ¹¡£Î¢Èíͨ¹ýÃñÊ·¨Í¥ÏÂÁ¶ñÒâÊÖÒÕ»ù´¡ÉèÊ©Öض¨ÏòÖÁ×ÔÉí·þÎñÆ÷£¬ÇжÏÍþвÐÐΪÕß»á¼ûȨÏÞ£¬²¢ÓÀÊÀ×èÖ¹ÕâЩÓòÃûÓÃÓÚδÀ´´¹ÂÚ¹¥»÷¡£Î¢Èí»¹ÓëLF ProjectsÏàÖú£¬¸Ã¹«Ë¾ÊÇONNXÃû³ÆºÍ»Õ±êµÄÕýµ±ËùÓÐÕß¡£
https://www.bleepingcomputer.com/news/security/microsoft-disrupts-onnx-phishing-as-a-service-infrastructure/
6. È«Çò¹¤Òµ¿ØÖÆϵͳ£¨ICS£©»¥ÁªÍø̻¶ÇéÐÎÑÏËà
11ÔÂ21ÈÕ£¬ÐµÄÑо¿ÏÔʾ£¬È«Çò175¸ö¹ú¼Ò/µØÇø±£´æÁè¼Ý145,000¸ö̻¶ÔÚ»¥ÁªÍøÉϵĹ¤Òµ¿ØÖÆϵͳ£¨ICS£©£¬ÆäÖÐÃÀ¹úÕ¼±ÈÁè¼ÝÈý·ÖÖ®Ò»¡£ÕâЩICS·þÎñ̻¶Ö÷ÒªÔ´ÓÚ³£ÓõÄICSÐÒ飬ÈçModbus¡¢IEC 60870-5-104µÈ£¬ÇÒµØÇø¼ä±£´æ²î±ð¡£ÀýÈ磬Modbus¡¢S7ºÍIEC 60870-5-104ÔÚÅ·ÖÞ¸ü³£¼û£¬¶øFox¡¢BACnetµÈÔÚ±±ÃÀ¸ü³£¼û¡£Censys¹«Ë¾µÄÆÊÎöÖ¸³ö£¬Ðí¶àICSÐÒé¿É×·ËÝÖÁ20ÊÀ¼Í70ÄêÔ£¬µ«²¢Î´ÊµÏÖÓëÆäËûµØÇøÏàͬµÄÇ徲ˢС£Ö»¹ÜרÃÅÕë¶ÔICSϵͳµÄÍøÂç¹¥»÷Ïà¶Ô½ÏÉÙ£¬µ«½üÄêÀ´ÓÐËùÔöÌí£¬ÌØÊâÊÇÔÚ¶íÎÚÕ½Õùºó¡£±ðµÄ£¬HMIÒ²Ô½À´Ô½¶àµØͨ¹ý»¥ÁªÍøÌṩÒÔÖ§³ÖÔ¶³Ì»á¼û£¬ÇÒ´ó´ó¶¼Ì»Â¶µÄHMIλÓÚÃÀ¹ú¡£Censys»¹Ö¸³ö£¬ÓÃÓÚ¼à¿ØºÍÓëICSϵͳ½»»¥µÄHMIºÍICS·þÎñ´ó¶àλÓÚÒƶ¯»òÉÌÒµ¼¶»¥ÁªÍø·þÎñÌṩÉÌÉÏ£¬ÕâÔöÌíÁËʶ±ðºÍ֪ͨËùÓÐÕßµÄÄѶȡ£Òò´Ë£¬×éÖ¯±ØÐè½ÓÄɲ½·¥Ê¶±ðºÍ±£»¤Ì»Â¶µÄOTºÍICS×°±¸£¬¸üÐÂĬÈÏƾ֤£¬²¢¼à¿ØÍøÂçÊÇ·ñ±£´æ¶ñÒâÔ˶¯¡£
https://thehackernews.com/2024/11/over-145000-industrial-control-systems.html