ÃÀ¹úË®Îñ¹«Ë¾ÔâÍøÂç¹¥»÷£¬²¿ÃÅϵͳ¹Ø¹Ø²¢Æô¶¯µ÷²é
°ä²¼¹¦·ò 2024-10-081. ÃÀ¹úË®Îñ¹«Ë¾ÔâÍøÂç¹¥»÷£¬²¿ÃÅϵͳ¹Ø¹Ø²¢Æô¶¯µ÷²é
10ÔÂ7ÈÕ£¬ÃÀ¹úË®Îñ¹«Ë¾£¬×÷Ϊ¸Ã¹ú×î´óµÄÉÏÊÐË®ÎñºÍÎÛË®´¦Öù«ÓÃÊÂÒµ¹«Ë¾£¬½üÆÚÔâ·êÁËÍøÂç¹¥»÷£¬µ¼Ö²¿ÃÅϵͳ±»ÆÈ¹Ø¹Ø¡£¹«Ë¾ÒÑÀñƸµÚÈý·½ÍøÂ簲ȫר¼ÒȾָ£¬²¢Ïò·¨Âɲ¿ÃŻ㱨´ËÊÂÎñ£¬Ðµ÷½áºÏµ÷²é¡£ÎªÓ¦¶Ô¹¥»÷£¬¹«Ë¾²ÉÈ¡Á˶Ͽª»òÍ£ÓÃijЩϵͳµÄ´ëÊ©£¬²¢¹Ø¹ØÁËÔÚÏ߿ͻ§ÃÅ»§·þÎñMyWater£¬ÔÝÍ£Á˼ƷѷþÎñ¡£¹«Ë¾½²»°È˰µÊ¾£¬ÆÚ¼ä²»»áÏò¿Í»§ÊÕÈ¡ÖÍÄɽ𣬲¢Ç¿µ÷¹©Ë®»ò·ÏË®ÉèÊ©¼°ÔËӪδÊÜÕâ´ÎÊÂÎñÓ°Ïì¡£ÃÀ¹úË®Îñ¹«Ë¾Õ¼ÓÐ6,500¶àÃûÔ±¹¤£¬Îª14¸öÖݺÍ18¸ö¾üÊ»ùµØµÄ³¬¹ý1,400ÍòÈËÌṩ·þÎñ¡£´Ëǰ£¬ÀàËÆÊÂÎñÒ²Ôø²úÉú£¬Èç¿°ÈøË¹Öݰ¢¿ÏÉ«³ÇµÄË®´¦Öó§ÔÚÖÜÄ©Ôâ·êÍøÂç¹¥»÷ºóתΪÊÖ¶¯²Ù×÷¡£´Ë±í£¬Ë®ÐÅÏ¢¹²ÏíÓë·ÖÎöÖÐÐÄÔø°ä²¼ÖÒ¸æ³Æ¶íÂÞ˹Õë¶ÔË®Îñ²¿ÃÅÌáÒéÍøÂç¹¥»÷¡£ÃÀ¹ú»·¾³±£»¤ÊðÒ²°ä²¼ÁËÁìµ¼¶¨¼û£¬Ô®ÊÔìÀ¹ÀÍøÂ簲ȫʵ¼Ê²¢È·¶¨Ï÷¼õ¹¥»÷·çÏյĴëÊ©¡£
https://www.bleepingcomputer.com/news/security/american-water-shuts-down-online-services-after-cyberattack/
2. Cloudflare×èÖ¹ÁËÊ·ÉÏ×î´óÁ÷Á¿DDoS¹¥»÷£¬·åÖµ´ïµ½3.8Tbps
10ÔÂ3ÈÕ£¬½ðÈÚ·þÎñ¡¢»¥ÁªÍøºÍµçÐÅÐÐÒµÔâ·êÁËÒ»³¡Ç°ËùδÓеÄÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷£¬·åÖµÁ÷Á¿¸ß´ïÿÃë3.8½ðÈÚ·þÎñ¡¢»¥ÁªÍøºÍµçÐÅÐÐÒµÔâ·êÁËÒ»³¡Ç°ËùδÓеÄÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷£¬·åÖµÁ÷Á¿¸ß´ïÿÃë3.8Tbps£¬´´ÏÂÁ˹«¿ª¼Í¼µÄ×î´óÖµ¡£Õⳡ¹¥»÷³ÖÐøÁËÒ»¸öÔ£¬Ô̺¬Á˳¬¹ý100´ÎµÄ³¬´óÁ÷Á¿DDoS¹¥»÷£¬Í¨¹ýÀ¬»øÊý¾Ý¸²Ã»ÍøÂç»ù´¡ÉèÊ©¡£ÔÚÈÝÁ¿Ãܼ¯ÐÍDDoS¹¥»÷ÖУ¬´óÁ¿Êý¾Ýµ¼Ö´ø¿í¿÷Ëð´ù¾¡£¬ÀûÓ÷¨Ê½ºÍÉ豸×ÊÔ´¿Ý½ß£¬ºÏ·¨Óû§ÎÞ·¨½Ó¼û¡£ÊÜϰȾµÄÉ豸Ô̺¬Asus·ÓÉÆ÷¡¢MikroTikÉ豸¡¢DVRºÍÍøÂç·þÎñÆ÷£¬Çұ鲼ȫÇò£¬¶íÂÞ˹¡¢Ô½ÄÏ¡¢ÃÀ¹ú¡¢°ÍÎ÷ºÍÎ÷°àÑÀÓÈΪ¼¯ÖС£Cloudflare³É¹¦»º½âÁËËùÓй¥»÷£¬²¢Ö¸³ö·åÖµ¹¥»÷³ÖÐøÁË65Ãë¡£¶ñÒâÉè±¸ÖØÒªÊ¹ÓÃUDPºÍ̸£¬¸ÃºÍ̸Êý¾Ý´«Êä¿ìÂʿ죬µ«ÎÞÐè³ÉÁ¢ÕýʽÏνӡ£´Ëǰ£¬Î¢ÈíÔøÎ¬³Ö·ÀÓù×î´óDDoS¹¥»÷µÄ¼Í¼£¬Á÷Á¿Îª3.47Tbps¡£
https://www.bleepingcomputer.com/news/security/cloudflare-blocks-largest-recorded-ddos-attack-peaking-at-38tbps/
3. CosmicSting¹¥»÷ÍþвAdobe CommerceºÍMagentoÉ̵갲ȫ
10ÔÂ3ÈÕ£¬Adobe CommerceºÍMagentoÔÚÏßÉ̵êÕýÃæ¶ÔÃûΪ¡°CosmicSting¡±µÄÑϳÁ¹¥»÷£¬¸Ã¹¥»÷ÒÑÈëÇÖÔ¼5%µÄÉ̵ꡣCosmicSting·ì϶£¨CVE-2024-34102£©ÊÇÒ»¸ö¸ßÑϳÁÐÔµÄÐÅϢй¶·ì϶£¬µ±ÓëglibcµÄiconvº¯ÊýÖеÄÁíÒ»°²È«ÎÊÌ⣨CVE-2024-2961£©½áӦʱ£¬¹¥»÷Õß¿ÉÔÚÖ¸±ê·þÎñÆ÷ÉÏʵÏÖÔ¶³Ì´úÂëÖ´ÐС£ÊÜÓ°ÏìµÄ²úÆ·Ô̺¬Adobe CommerceµÄ¶à¸ö°æ±¾¡¢Magento¿ªÔ´µÄ¶à¸ö°æ±¾ÒÔ¼°Adobe Commerce Webhooks²å¼þµÄijЩ°æ±¾¡£×Ô2024Äê6ÔÂÒÔÀ´£¬ÍøÕ¾°²È«¹«Ë¾SansecÒÑ×·×Ùµ½4,275¼ÒÉ̵êÔÚCosmicSting¹¥»÷ÖÐÔâµ½ÈëÇÖ£¬³ÛÃûÊܺ¦ÕßÔ̺¬»Ý¶øÆÖ¡¢À×Åó¡¢¹ú¶ÈµØÀí¡¢Èü¸ñÍþºÍ˼¿ÆµÈ¡£SansecÖÒ¸æ³Æ£¬ÓÉÓÚ½¨²¹¿ì¶Å×ëÇé¿öÑϳÁÐÔ²»Æ¥Å䣬Ŀǰ¶à¸öÍþвÐÐΪÕßÔÚÀûÓÃCosmicSting·ì϶ÈëÇÖδ´ò²¹¶¡µÄÍøÕ¾¡£ÕâЩÍþв×éÖ¯ÃûΪ¡°Bobry¡±¡¢¡°Polyovki¡±µÈ£¬ËûÃdzöÓÚ¾¼Ã¶¯»ú£¬ÈëÇÖÍøÕ¾ÒÔÇÔÊØÐÅÓþ¿¨ºÍ¿Í»§ÐÅÏ¢¡£¶ñÒâ¾ç±¾»á´Ó¼Ù×°³É³ÛÃûJavaScript¿â»ò·ÖÎö°üµÄÓòÃû×¢ÈëÊÜϰȾµÄÍøÕ¾¡£Òò¶ø£¬Ç¿ÁÒ½¨ÒéÍøÕ¾ÖÎÀíÔ±¾¡¿ìÉý¼¶µ½°²È«µÄÈí¼þ°æ±¾¡£
https://www.bleepingcomputer.com/news/security/over-4-000-adobe-commerce-magento-shops-hacked-in-cosmicsting-attacks/
4. ZimbraÓʼþ·þÎñÆ÷ÑϳÁ·ì϶CVE-2024-45519Òý·¢°²È«¾¯±¨
10ÔÂ4ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Òѽ«Zimbraµç×ÓÓʼþ·þÎñÆ÷ÖеÄÑϳÁÔ¶³Ì´úÂëÖ´Ðзì϶CVE-2024-45519Ôö³¤µ½ÆäÒÑÖªÀûÓ÷ì϶Ŀ¼ÖУ¬¸Ã·ì϶Õë¶ÔZimbraµÄpostjournal·þÎñ£¬ÔÊÐí¹¥»÷Õßͨ¹ý·¢ËÍÌØÔìµç×ÓÓʼþÀûÓÃϵͳ£¬Ö´ÐÐËÁÒâºÅÁî¡£´Ë·ì϶ÒÑÒýÆðµ±¾ÖºÍ¹Ø¼ü»ù´¡ÉèÊ©²¿Ãŵľ¯Ì裬ÓÉÓÚ¹¥»÷ÕßÔÚ»ý¼«ÀûÓÃËü£¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡¢ÏµÍ³ÈëÇÖ»òδ¾ÊÚȨµÄ½Ó¼ûµÈÑϳÁºó¹û¡£ZimbraÒѰ䲼²¹¶¡½¨¸´´Ë·ì϶£¬½¨ÒéϵͳÖÎÀíÔ±µ±¼´ÀûÓá£´Ë±í£¬ProjectDiscoveryµÄ×êÑÐÈËÔ±Ìá³öÁËÁ½ÖÖ»º½â´ëÊ©£ºÈôÊÇPostjournal·þÎñ²»³ÁÒª£¬Çë½ûÓÃËü£»²¢È·±£¡°mynetworks¡±ÉèÖÃÕýÈ·ÅäÖÃÒÔ×èֹδ¾ÊÚȨµÄ½Ó¼û¡£¼øÓÚZimbraÔÚÈ«ÇòµÄ¿í·ºÊ¹Ó㬺öÊÓÕâЩ·ÀÓù´ëÊ©¿ÉÄÜ»áʹϵͳ¶³öÓÚ×Ô¶¯¹¥»÷µÄ·çÏÕÖС£CISAÒÑ·¢³öÇ¿ÁÒÖҸ棬²¢É趨ÁËÁª¹ú»º½â´ëÊ©µÄ×îºóÆÚÏÞΪ2024Äê10ÔÂ24ÈÕ£¬ÎªÁª¹ú»ú¹¹ºÍ¹Ø¼ü»ù´¡ÉèÊ©×éÖ¯ÌṩÁ˽ôÆÈµÄ¹¦·òÀ´ÀûÓò¹¶¡»òÖÕ³¡Ê¹ÓÃZimbraµÄÈÕÖ¾·þÎñ¡£
https://securityonline.info/zimbra-email-servers-under-attack-cisa-flags-cve-2024-45519-as-actively-exploited/
5. perfctl¶ñÒâÈí¼þ£ºÕë¶ÔLinux·þÎñÆ÷µÄÒñ±ÎÓÆ¾Ã¹¥»÷Óë×ÊÔ´½Ù³Ö
10ÔÂ4ÈÕ£¬Aqua Nautilus µÄ×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪ perfctl µÄ Linux ¶ñÒâÈí¼þ£¬ËüÒÑÕë¶ÔÅäÖÃÃýÎóµÄ Linux ·þÎñÆ÷½øÐÐÁ˳¤´ï 3-4 ÄêµÄ¹¥»÷¡£¸Ã¶ñÒâÈí¼þʹÓà rootkit °µ²ØÆä´æÔÚ£¬Í¨¹ý TOR ½øÐÐͨѶ£¬²¢ÔÚ·þÎñÆ÷¿ÕÏÐʱִÐмÓÃÜÇ®±Ò¿ó¹¤ºÍ´úÀí½Ù³ÖÈí¼þ¡£¹¥»÷ÕßÀûÓ÷ì϶»òÃýÎóÅäÖ㬴ӽÚÔìµÄ HTTP ·þÎñÆ÷ÏÂÔØ¶à²ã½á¹¹µÄÓÐÐ§ÔØºÉ£¬Í¨¹ý³Á¶¨ÃûºÍɾ³ýÔʼ¶þ½øÔìÎļþÀ´¸²¸Ç×ÙÓ°¡£Ëü»¹»áͶ·ÅÒ»¸ö rootkit ºÍ¾¹ýÅú¸ÄµÄ Linux ʵÓ÷¨Ê½£¬Ê¹Óø߼¶Ìӱܼ¼ÊõÈç¼ì²âÐÂÓû§Ê±ÖÕ³¡»î¶¯£¬²¢ÖÕÖ¹¾ºÕù¶ñÒâÈí¼þ¡£ÎªÁËά³ÖÓÆ¾ÃÐÔ£¬¶ñÒâÈí¼þ»áÅú¸ÄÓû§µÇ¼¾ç±¾£¬ÔÚÓû§µÇ¼ʱִÐУ¬²¢ÔÚºó¶ÜÔËÐÐÒÔÈ·±£Æä³ÖÐøÔËÐС£¸Ã¶ñÒâÈí¼þµÄÖØÒªÓ°ÏìÊÇ×ÊÔ´½Ù³Ö£¬Í¨¹ýÖ´ÐÐÃÅÂÞ±ÒÍÚ¿ó·¨Ê½À´ºÄ¾¡·þÎñÆ÷ CPU ×ÊÔ´¡£Òª¼ì²â perfctl ¶ñÒâÈí¼þ£¬±ØÒª²é¿´ CPU ʹÓÃÂÊÊÇ·ñ³öÏÖÒì³£·åÖµ»òϵͳÊÇ·ñ±äÂý¡£
https://securityaffairs.com/169351/malware/perfctl-malware-targets-misconfigured-linux-servers.html
6. UMC Health SystemÔâÀÕË÷Èí¼þ¹¥»÷£¬»¼Õß×ªÒÆÓë·þÎñÅö±Ú
10ÔÂ1ÈÕ£¬µÂ¿ËÈøË¹ÖÝÒ½ÁƱ£½¡ÌṩÉÌUMC Health System½üÆÚÔâ·êÁËÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÆäITϵͳ³öÏÖÒì³£»î¶¯¡£Îª¶ôÔìÊÂÎñ£¬UMCµ±¼´¶Ï¿ªÏµÍ³²¢·¢Õ¹µ÷²é£¬È·ÈÏÕâ´ÎÒì³£»î¶¯ÓëÀÕË÷Èí¼þÊÂÎñÓйء£Ö»¹ÜÉÐδÓдóÐÍÀÕË÷Èí¼þ×éÖ¯¶Ô¹¥»÷ÕÆ¹Ü£¬µ«¹¥»÷ÒÑÆÈʹUMC½«²¿ÃÅ»¼Õß×ªÒÆµ½ÆäËûµØÖ·£¬²¢µ¼ÖÂһЩ¿ÆÊҹعػòÖ»ÄÜÌṩÑÓ³¤·þÎñ£¬ÆäÖзÅÉä¿ÆÊÜÓ°ÏìÓÈΪÑϳÁ¡£´Ë±í£¬ÓÉÓÚITϵͳ¹ÊÕÏ£¬UMCÕïËùÎÞ·¨ÌṩҽÁÆ´¦·½Çåµ¥£¬½¨Ò黼ÕßËæÉíЯ´ø£¬Ò½ÁƼͼËä¿ÉÔÚ»¼ÕßÃÅ»§ÍøÕ¾ÉÏÕÒµ½£¬µ«ÎÞ·¨´òÓ¡¡£Ä¿Ç°£¬Í¨¹ýµç»°»òÔÚÏßÃÅ»§³ÉÁ¢¹µÍ¨Ò²ÎÞ·¨±£ÕÏ£¬½¨Òé±ØÒªµ±¼´Ô®ÊÖµÄÈËǰÍùÕïËù¡£Õâ´Î¹¥»÷¿ÉÄÜÉæ¼°Êý¾Ý͵ÇÔ£¬ÊýÊ®ÍòÈ˵ÄÃô¸ÐÒ½ÁÆÐÅÏ¢¿ÉÄÜÊܵ½Ó°Ï죬UMCÔڶԴ˽øÐе÷²é£¬²¢°µÊ¾½«ÔÚÓиü¶àÐÅϢʱÌṩ¸üС£
https://www.bleepingcomputer.com/news/security/ransomware-attack-forces-umc-health-system-to-divert-some-patients/


¾©¹«Íø°²±¸11010802024551ºÅ