OneBloodÔâÀÕË÷Èí¼þ¹¥»÷£¬Ï×ѪÕßСÎÒ˽¼ÒÐÅϢй¶
Ðû²¼Ê±¼ä 2025-01-151. OneBloodÔâÀÕË÷Èí¼þ¹¥»÷£¬Ï×ѪÕßСÎÒ˽¼ÒÐÅϢй¶
1ÔÂ13ÈÕ£¬·ÇÓ¯ÀûÏ×Ѫ»ú¹¹OneBlood֤ʵ£¬2024ÄêÑ×ÌìÔâÊÜÁËÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÏ×ѪÕßµÄСÎÒ˽¼ÒÐÅÏ¢±»ÇÔÈ¡¡£¸Ã»ú¹¹ÓÚ2024Äê7ÔÂ31ÈÕÊ״ιûÕæÁËÕâÒ»ÊÂÎñ£¬Ö¸³ö¹¥»÷Õß¼ÓÃÜÁËÆäÐéÄâ»ú£¬ÆÈʹÆä½ÓÄÉÊÖ¶¯Á÷³Ì£¬½ø¶øÓ°ÏìÁËѪҺÊÕÂÞ¡¢¼ì²âºÍ·ÖÅÉ£¬µ¼Ö²¿·ÖÕïËù·ºÆðÑÏÖØѪҺǷȱ¡£OneBloodËæ¼´·¢³ö½ôÆȺôÓõ£¬ÇëÇóļ¾èOÐÍѪ¡¢OÐÍѪÒõÐÔѪºÍѪС°å¡£ÉÏÖÜ£¬OneBlood×îÏÈÏòÊÜÓ°ÏìСÎÒ˽¼Ò·¢ËÍÊý¾Ýй¶֪ͨ£¬È·ÈÏ鶱¬·¢ÔÚ2024Äê7ÔÂ14ÈÕ£¬ÇÒÍþвÐÐΪÕßÖ±ÖÁ7ÔÂ29ÈÕ²ÅʧȥÍøÂç»á¼ûȨÏÞ¡£Ð¹Â¶Êý¾ÝÖ÷Òª°üÀ¨ÐÕÃûºÍÉç»áÇå¾²ºÅÂ루SSN£©£¬ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇԺͽðÈÚڲƣ¬Î£º¦Ò»Á¬¶àÄꡣΪ½µµÍΣº¦£¬OneBloodÌṩÁËÒ»ÄêÃâ·ÑÐÅÓüà¿Ø·þÎñ£¬²¢½¨ÒéÊÜÓ°ÏìСÎÒ˽¼ÒÉèÖÃÐÅÓö³½áºÍڲƾ¯±¨¡£Ö»¹ÜOneBloodÒÑÍÆÐÐ֪ͨÒåÎñ£¬µ«Áù¸öÔµÄÑÓ³ÙÈÔʹÊÜÓ°ÏìÕßÃæÁÙΣº¦¡£ÏÖÔÚ£¬ÀÕË÷Èí¼þ¹¥»÷µÄÏêϸÊÜÓ°ÏìÈËÊýÉÐδÅû¶¡£
https://www.bleepingcomputer.com/news/security/oneblood-confirms-personal-data-stolen-in-july-ransomware-attack/
2. ¶íÇ鱨¹ØÁªºÚ¿Í×é֯ʹÓùþÕþ¸®ÎļþÍøÂç´¹ÂÚ¹¥»÷ÖÐÑǹÙÔ±
1ÔÂ13ÈÕ£¬SekoiaÑо¿Ö°Ô±Õ¹ÏÖ£¬Ò»¸öÓë¶íÂÞ˹Ç鱨²¿·ÖÏà¹ØÁªµÄºÚ¿Í×éÖ¯£¬Ê¹Óÿ´ËÆÕýµ±µÄ¹þÈø¿Ë˹̹Õþ¸®Îļþ×÷ΪÍøÂç´¹ÂÚÓÕ¶ü£¬ÀÖ³ÉѬȾºÍ¼àÊÓÁËÖÐÑÇÕþ¸®¹ÙÔ±¡£ÕâЩÎļþ°üÀ¨¹þÈø¿Ë˹̹Õþ¸®µÄÍâ½»ÉùÃ÷¡¢Ðź¯µÈµ×¸å£¬ÇÒÄÚÈÝÓëÕæʵÎļþ¸ß¶ÈÏàËÆ£¬ÄÚǶÓжñÒâÈí¼þ¡£¸ÃºÚ¿Í×éÖ¯±»Ö¸ÒÔΪAPT 28£¨Fancy Bear£©£¬ÓëĪ˹¿ÆÖÐÑëÇ鱨¾Ö(GRU)ÓÐÁªÏµ¡£×Ô2024Äê7ÔÂÒÔÀ´£¬¸Ã×éÖ¯ÔÚÖÐÑÇ¡¢¶«ÑǺÍÅ·ÖÞµØÇøÒÑÓÕÆÊýÊ®ÃûÊܺ¦Õߣ¬Ê¹ÓÃHATVIBEºÍCHERRYSPYÁ½ÖÖ¶ñÒâÈí¼þ¡£ÕâЩÎĵµÔÚWordÖÐÖ´ÐжñÒâºêÎļþ£¬½µµÍ×°±¸Çå¾²ÉèÖã¬ÉúÑĶñÒâÈí¼þ±äÁ¿²¢Æô¶¯ÉñÃسÌÐò¡£´Ë´ÎÔ˶¯±»ÃüÃûΪ¡°Ë«»÷¡±¡£¾ÝÆÊÎö£¬HATVIBEÓëZEBROCYºóÃÅÊÖÒÕÖصþ£¬¾ùÖ¸ÏòFancy Bear¡£Ö»¹ÜÉв»ÇåÎúAPT 28ÔõÑù»ñÈ¡ÕâЩ¹þÈø¿Ë˹̹Õþ¸®Îļþ£¬µ«Ñо¿Ö°Ô±ÍƲâ¿ÉÄÜͨ¹ýÔçÆÚÍøÂçÐж¯Ð¹Â¶¡¢¿ªÔ´ÍøÂç»òÎïÀíÐж¯»ñµÃ¡£¹þÈø¿Ë˹̹ÒòÔÚÎÚ¿ËÀ¼Õ½ÕùµÈÎÊÌâÉÏÍÑÀë¶íÂÞ˹ӰÏ죬ÒÔ¼°³ÉΪÉÌÒµÖ÷Ҫͬ°éºÍ½¨ÉèºËµçÕ¾µÄ¹ú¼Ê¾ºÕù£¬³ÉΪÍøÂçÌع¤Ô˶¯µÄÖ÷ҪĿµÄ¡£¶íÂÞ˹ּÔÚÈ·±£¹þÈø¿Ë˹̹ÕþÖÎÒ»Ö£¬µÖÏû¾ºÕùµÐÊÖÓ°Ï죬²¢Àο¿ÆäÔڸõØÇøµÄ¾¼ÃºÍÕ½ÂÔְλ¡£
https://cyberscoop.com/fancy-bear-kazakhstan-russia-sekoia/
3. Aviatrix Controller¸ßΣ©¶¼òªư²ÅÅÊÜÍþв
1ÔÂ13ÈÕ£¬Aviatrix ControllerÖеÄÒ»¸ö¸ßÑÏÖØÐÔÎó²î£¨CVE-2024-50603£©±»Åû¶ºó£¬¶Ô¶à¸öÔÆ°²ÅÅ×é³ÉÁËÍþв¡£¸ÃÎó²îÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©£¬²¢ÇÒÔÚAWSÖеÄĬÈÏ°²Åű£´æȨÏÞÌáÉýΣº¦£¬Òò´ËÌØÊâΣÏÕ¡£Îó²îÓÚ1ÔÂ7ÈÕÅû¶£¬ÒÑÓйûÕæµÄ¿´·¨ÑéÖ¤£¨PoC£©Îó²î¡£Aviatrix ControllerÓÃÓÚ×ÊÖúÖÎÀíºÍ×Ô¶¯»¯AWS°²ÅÅ£¬Ö»¹ÜÖ»ÓÐÔ¼3%µÄAWS¿Í»§Ê¹ÓøòúÆ·£¬µ«ÔÚ65%µÄÔÆÇéÐÎÖУ¬Ëü°²ÅÅÔÚÐéÄâ»úÉÏ£¬±£´æºáÏòÒƶ¯Â·¾¶£¬ÔÊÐí¹¥»÷Õß»ñµÃÖÎÀíԱȨÏÞ¡£Ñо¿Ö°Ô±ÊӲ쵽ÀÖ³ÉÎó²îµ¼Ö¶ñÒâÈí¼þ°²ÅÅ£¬ÈçSilverºóÃźͼÓÃÜЮÖÆ¡£·ÀÓùÕß¿ÉÒÔÉý¼¶µ½7.2.4996°æ±¾ÒÔ×èÖ¹¸ÃÎó²î£¬²¢×èֹͨ¹ý¶Ë¿Ú443µÄ¹ûÕæ»á¼û¡£Aviatrix»¹ÌṩÁ˲¹¶¡£¬µ«Ö¸³öÔÚijЩÇéÐÎÏ¿ÉÄÜÐèÒªÖØÐÂÓ¦Óá£
https://www.theregister.com/2025/01/13/severe_aviatrix_controller_vulnerability/
4. ¡¶Á÷·Å֮·2¡·ÔâºÚ¿Í¹¥»÷£¬66¸öÍæ¼ÒÕÊ»§±»µÁ
1ÔÂ13ÈÕ£¬¡¶Á÷·Å֮·2¡·ÔâÊÜÁËÒ»ÆðÑÏÖصĺڿ͹¥»÷ÊÂÎñ£¬¹¥»÷Õßͨ¹ý͵ȡµÄÒ»¸ö¾ÉSteamÕÊ»§£¬»ñµÃÁËÓë¸ÃÕÊ»§Ïà¹ØÁªµÄÖÎÀíÔ±ÕÊ»§»á¼ûȨÏÞ¡£ÕâÒ»Îó²îʹµÃÍþвÐÐΪÕßÄܹ»¸ü¸ÄÖÁÉÙ66¸öÍæ¼ÒÕÊ»§µÄÃÜÂ룬²¢»á¼ûÕâЩÕÊ»§£¬µ¼ÖÂÐí¶àÍæ¼ÒɥʧÁËÓÎÏ·ÄÚ¹ºÖõÄÎïÆ·£¬°üÀ¨Õä¹ó×°±¸ºÍÆÆ·ÑÊý°ÙСʱ²Å»ñµÃµÄÎïÆ·¡£ÓÉÓÚÈÕÖ¾±£´æµÄʱ¼äÏÞÖÆ£¬¿ÉÄÜÉÐÓиü¶àÕÊ»§ÔÚ´Ë´ÎÎ¥¹æÐÐΪÖÐÊÜË𣬵«Ïêϸ¹æÄ£ÒÑÎÞ·¨È·¶¨¡£ÓÎÏ·¿ª·¢ÉÌGrinding Gear GamesµÄÓÎÏ·×ܼà֤ʵÁËÕâ´Î¹¥»÷£¬²¢ÌåÏÖÕâÊÇͨ¹ýÒ»¸ö±»µÁµÄÖÎÀíÔ±ÕÊ»§¾ÙÐеġ£Ëû»¹Í¸Â¶£¬ÓÎÏ·ºó¶Ë±£´æ¹ýʧºÍÇå¾²Îó²î£¬±¾¿ÉÒÔ×èÖ¹Õâ´Î¹¥»÷£¬µ«Òź¶µÄÊÇËûÃÇ¡°ÍêÈ«¸ãÔÒÁË¡±¡£Ö»¹Ü¿ª·¢ÉÌÒѾ½ÓÄÉÁËһЩÇå¾²²½·¥£¬µ«¹ØÓÚÄÇЩÊÜÓ°ÏìµÄÕÊ»§£¬ËûÃÇÉÐδÐû²¼ÈκÎÅâ³¥ÍýÏ룬²¢ÌåÏÖÎÞ·¨»Ö¸´±»µÁÎïÆ·¡£´Ë´ÎÊÂÎñ¶ÔÍæ¼ÒÉçÇøÔì³ÉÁËÖØ´óÓ°Ï죬Ðí¶àÍæ¼Ò¶ÔÓÎÏ·µÄÇå¾²ÐÔÌåÏÖµ£ÐÄ¡£
https://www.bleepingcomputer.com/news/security/stolen-path-of-exile-2-admin-account-used-to-hack-player-accounts/
5. AWS S3´æ´¢Í°ÔâCodefingerÀÕË÷Èí¼þ¼ÓÃܹ¥»÷
1ÔÂ13ÈÕ£¬Ò»ÖÖеÄÀÕË÷Èí¼þÔ˶¯ÕýÔÚʹÓÃAWSµÄ·þÎñÆ÷¶Ë¼ÓÃܺͿͻ§ÌṩµÄÃÜÔ¿£¨SSE-C£©À´¼ÓÃÜAmazon S3´æ´¢Í°ÖеÄÊý¾Ý£¬²¢ÒªÇóÖ§¸¶Êê½ð²Å»ª»ñµÃ½âÃÜÃÜÔ¿¡£ÕâÒ»Ô˶¯ÓÉÃûΪ¡°Codefinger¡±µÄÍþвÐÐΪÕßÌᳫ£¬²¢ÒÑÖÁÉÙ¶ÔÁ½ÃûÊܺ¦ÕßʵÑéÁ˹¥»÷¡£ÑÇÂíÑ·¼òÆÓ´æ´¢·þÎñ£¨S3£©ÊÇÒ»ÖÖ¿ÉÀ©Õ¹¡¢Çå¾²ÇÒ¸ßËٵŤ¾ß´æ´¢·þÎñ£¬¶øSSE-CÊÇÒ»ÖÖ¼ÓÃÜÑ¡ÏÔÊÐí¿Í»§Ê¹ÓÃ×Ô¼ºµÄ¼ÓÃÜÃÜԿͨ¹ýAES-256Ëã·¨¼ÓÃÜÏ¢ÕùÃÜÊý¾Ý¡£ÔÚCodefingerµÄ¹¥»÷ÖУ¬ÍþвÐÐΪÕßʹÓÃÊÜËðµÄAWSƾ֤¶¨Î»¾ßÓÐÌض¨È¨ÏÞµÄÊܺ¦ÕßÃÜÔ¿£¬È»ºóÔÚÍâµØÌìÉú¼ÓÃÜÃÜÔ¿À´¼ÓÃÜÄ¿µÄÊý¾Ý¡£ÓÉÓÚAWS²»´æ´¢ÕâЩ¼ÓÃÜÃÜÔ¿£¬Òò´ËÊý¾Ý»Ö¸´±äµÃ²»¿ÉÄÜ£¬³ý·Ç»ñµÃ¹¥»÷ÕßµÄÏàÖú¡£¹¥»÷Õß»¹ÉèÖÃÁËΪÆÚÆßÌìµÄÎļþɾ³ýÕ½ÂÔ£¬²¢ÔÚËùÓÐÊÜÓ°ÏìµÄĿ¼Öа²ÅÅÊê½ð֪ͨ£¬ÒªÇóÊܺ¦ÕßÔÚÖ¸¶¨µÄ±ÈÌرҵصãÉÏÖ§¸¶Êê½ð¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬ÑÇÂíÑ·½¨ÒéʵÑéÑÏ¿áµÄÇå¾²ÐÒ飬²¢ÃãÀøAWS¿Í»§ÉèÖÃÏÞÖÆÐÔÕ½ÂÔ£¬±ÜÃâÔÚÆäS3´æ´¢Í°ÉÏʹÓÃSSE-C¡£Í¬Ê±£¬Ó¦½ûÓÃδʹÓõÄAWSÃÜÔ¿£¬¾³£ÂÖ»»Ô˶¯ÃÜÔ¿£¬²¢½«ÕÊ»§È¨ÏÞ¼á³ÖÔÚËùÐèµÄ×î³õ¼¶±ð¡£
https://www.bleepingcomputer.com/news/security/ransomware-abuses-amazon-aws-feature-to-encrypt-s3-buckets/
6. °£Òò»ôÎÂÀí¹¤´óѧÔâÍøÂç¹¥»÷£¬½ôÆȹرÕÍøÂç²¢×÷·Ï½ÌÓýÔ˶¯
1ÔÂ13ÈÕ£¬°£Òò»ôÎÂÀí¹¤´óѧÔÚÖÜÁùÍíÉÏ9µã×óÓÒ¼ì²âµ½ÍøÂç¹¥»÷ºó£¬Ñ¸ËÙ½ÓÄÉÁ˹رÕÍøÂçµÄ²½·¥ÒÔ±ÜÃâ¸üÑÏÖصÄЧ¹û¡£Ö»¹Ü´Ë¾Ùµ¼ÖÂÒÀÀµ´óѧÍøÂçµÄÉèÊ©£¨Èçµç×ÓÓʼþ¡¢WiFiºÍʳÌÃÊÕÒø»ú£©ÎÞ·¨Ê¹Ó㬵«Ñ§ÉúºÍÔ±¹¤ÈÔ¿ÉÒÔ½øÈëУ԰¡£´óѧÔÚÖÜÈÕ½ÒÏþÉùÃ÷³Æ£¬ÓÉÓÚѧÉúÕýÔÚ×¼±¸¿¼ÊÔ£¬Ô¤¼Æ´Ë´ÎÍøÂç¹¥»÷¶Ô½Ìѧʱ¼äµÄÓ°Ï콫ÓÐÏÞ£¬Í¬Ê±Ç¿µ÷ÆäITÖ°Ô±ÕýÔÚÈ«Á¦ÊÓ²ì´Ë´Î¹¥»÷£¬²¢Ö¸³ÊÏÖÔÚÉÐÎÞ¼£ÏóÅú×¢Êý¾Ý±»µÁ¡£¸±Ð£³¤ÅÁÌØÀï¿Ë¡¤¸ñ³Ìغú˹ÌåÏÖ£¬ËûÃÇÒâʶµ½¹Ø±ÕÍøÂç»á´øÀ´ÑÏÖØЧ¹û£¬µ«ÕâÊÇΪÁ˱ÜÃâ¸üÔã¸âµÄЧ¹û±¬·¢£¬²¢Ï£Íû»ñµÃ¸÷È˵ÄÃ÷È·¡£Ö»¹Ü´Ë´Î¹¥»÷µÄÏêϸÐÔ×ÓÉÐδÅû¶£¬µ«Å·ÖÞÐí¶àÀí¹¤´óѧ½üÄêÀ´¶¼Êܵ½ÁËÀÕË÷Èí¼þ×éÖ¯µÄÓ°Ïì¡£ÖµµÃ×¢ÖصÄÊÇ£¬Ö»¹Ü°£Òò»ôÎÂÀí¹¤´óѧÓëÐí¶àÆóÒµ¼á³Ö×ÅÁªÏµ£¬µ«ÏÖÔÚûÓм£ÏóÅú×¢ÕâЩÆóÒµ¿ÉÄÜÊܵ½Ó°Ïì¡£
https://therecord.media/tu-eindhoven-cyberattack-lectures-canceled