Omni Family HealthÔâ·ê´ó¹æÄ£Êý¾Ýй¶£¬½ü47ÍòÈËÊÜÓ°Ïì
°ä²¼¹¦·ò 2024-10-2110ÔÂ18ÈÕ£¬¼ÓÖݽ¡È«ÖÐÐÄÍøÂçOmni Family Health½üÈÕ֪ͨÁ˽ü470,000ÃûÓ×ÎÒ£¬ËûÃǵÄÓ×ÎÒÐÅÏ¢ÔÚ½ñÄêÔçЩʱ³½µÄÒ»´ÎÍøÂç¹¥»÷Öб»µÁ¡£8ÔÂ7ÈÕ£¬OmniÔÚµÃÖªÍþвÐÐΪÕßÔÚ°µÍøÉϰ䲼ÁË¾Ý³Æ´ÓÆäÍøÂçÇÔÈ¡µÄÊý¾Ýºó£¬·¢ÏÖÁËÕâ´ÎÊý¾Ýй¶ÊÂÎñ¡£Ð¹Â¶µÄÐÅÏ¢Éæ¼°ÏÖÈκÍǰÈλ¼Õß¼°Ô±¹¤£¬¹²468,344ÈËÊܵ½Ó°Ïì¡£»¼ÕßµÄÐÕÃû¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢Éç»á°²È«ºÅÂë¡¢½¡È«±£ÏÕ´òËãºÍÒ½ÁÆÐÅÏ¢¿ÉÄÜй¶£¬¶øÔ±¹¤µÄÊý¾Ýй¶»¹Ô̺¬²ÆÕþÕË»§¾ßÌåÐÅÏ¢ºÍÓйؾìÊô¡¢ÊÜÒæÈ˵ÄÐÅÏ¢¡£Ö»¹ÜOmni²¢Î´»ñϤÓÐÈκÎÓ×ÎÒÒò¸ÃÊÂÎñ¶ø³ÉΪڲÆÊܺ¦ÕßµÄÖ¸¿Ø£¬µ«ÈÔ¼¤ÀøÓ×ÎÒ²ÉÈ¡´ëÊ©±£»¤×Ô¼ºµÄÓ×ÎÒÐÅÏ¢£¬²¢ÎªÊÜÓ°ÏìµÄÓ×ÎÒÌṩ12¸öÔµÄÃâ·ÑÐÅÓþ¼à¿ØºÍÉí·Ý±£»¤·þÎñ¡£¹ÌÈ»Omniδ¾ßÌå×¢Ã÷Ôâ·êµÄÍøÂç¹¥»÷ÀàÐÍ£¬µ«Hunters InternationalÀÕË÷Èí¼þÍÅ»ïÐû³ÆÇÔÈ¡ÁË2.7TBµÄÊý¾Ý£¬²¢ÓÚ8ÔÂ23ÈÕ¹«¿ªÁËËùÓÐÉæÏÓ±»µÁµÄÐÅÏ¢¡£Omni Family HealthΪ¿Ë¶÷ÏØ¡¢½ðË¹ÏØ¡¢Í¼À³ÀïÏØºÍ¸¥À×Ë¹ÅµÏØÌṩҽÁƱ£½¡·þÎñ£¬ÒÑÆðÍ·ÏòÊÜÓ°ÏìµÄÓ×ÎÒ·¢ËÍÊý¾Ýй¶֪ͨÐÅ£¬²¢Ïò¼ÓÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»ÁËÒ»·ÝÑù±¾¡£
https://www.securityweek.com/omni-family-health-data-breach-impacts-470000-individuals/
2. ÐÂÐËÍøÂçÍþвÐÐΪÕßCrypt GhoulsÕë¶Ô¶íÂÞ˹ÌáÒéÀÕË÷Èí¼þ¹¥»÷
10ÔÂ19ÈÕ£¬Ò»¸öÃûΪCrypt Ghouls µÄÐÂÐËÍþвÐÐΪÕßÉæÏÓ¶Ô¶íÂÞ˹ÆóÒµºÍµ±¾Ö»ú¹¹ÌáÒéÁËһϵÁÐÍøÂç¹¥»÷£¬ÖØÒªÀûÓÃÀÕË÷Èí¼þÀ´·ÛËéÆóÒµÔËÓª²¢Ä±È¡¾¼ÃÀûÒæ¡£¾Ý¶íÂÞË¹ÍøÂ簲ȫ¹©¸øÉÌ¿¨°Í˹»ùй©£¬ÕâЩ¹¥»÷Éæ¼°¶àÖÖʵÓ÷¨Ê½£¬Ô̺¬Mimikatz¡¢XenAllPasswordProµÈ£¬×îÖÕʹÓõÄÀÕË÷Èí¼þΪLockBit 3.0ºÍBabuk¡£Êܺ¦Õߺ¸ÇÁ˵±¾Ö»ú¹¹ÒÔ¼°¿óÒµ¡¢ÄÜÔ´¡¢½ðÈÚºÍÁãÊ۵ȶà¸öÐÐÒµ¡£¿¨°Í˹»ùÖ¸³ö£¬¹¥»÷Õßͨ¹ýÀûÓóаüÉ̵ĵǼƾ֤£¬Í¨¹ýVPNÏνӵ½ÄÚ²¿ÏµÍ³£¬ÊÔIJÀûÓÃÐÅÀµ¹ØÏµ¶ã±Ü¼à¿Ø¡£¹¥»÷¹ý³ÌÖУ¬ËûÃÇʹÓÃÁ˶àÖÖ¹¤¾ß½øÐÐÍøÂç¿úËÅ¡¢ÍøÂçÉí·ÝÑéÖ¤Êý¾Ý¡¢ÌáÈ¡Êܺ¦Õ߯¾Ö¤£¬²¢×îÖÕ¼ÓÃÜϵͳÊý¾Ý¡£¹¥»÷Õß»¹ÔڻỰÐÂÎÅ·þÎñÖÐÁôÏÂÀÕË÷ÐÅ£¬Ô̺¬ÁªÏµÆäµÄÁ´½Ó¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Crypt GhoulsÔÚÕâЩ¹¥»÷ÖÐʹÓõŤ¾ßºÍ»ù´¡ÉèÊ©Óë½ü¼¸¸öÔÂÕë¶Ô¶íÂÞ˹µÄÆäËû×éÖ¯·¢Õ¹µÄÀàËÆ»î¶¯³Áµþ£¬ÍøÂç·¸×ï·Ö×ÓÔÚÀûÓñ»µÁÓÃµÄÆ¾Ö¤ºÍÊ¢ÐеĿªÔ´¹¤¾ß£¬¹²Ïí¹¤¾ß°üºÍ֪ʶ£¬Ê¹µÃ¼ø±ðÕë¶Ô¶íÂÞ˹×éÖ¯µÄ¹¥»÷±³ºóµÄ¾ßÌå¶ñÒâÐÐΪÕß±äµÃÔ½·¢¸´ÔÓ¡£
https://thehackernews.com/2024/10/crypt-ghouls-targets-russian-firms-with.html
3. ÐÂÐ˽©Ê¬ÍøÂçGorillÌáÒéÈ«Çò´ó¹æÄ£DDoS¹¥»÷
10ÔÂ20ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±³ÆÒ»¸öеÄGorilla½©Ê¬ÍøÂçÕý¶ÔÈ«Çò×é³ÉÈÕÒæÑϳÁµÄÍþв¡£¸Ã½©Ê¬ÍøÂçÀûÓÃMirai½©Ê¬ÍøÂçÔ´´úÂëºÍÏȽø¼¼Êõ£¬×Ô2024Äê9ÔÂÆðÌáÒéÁË´ó¹æÄ£É¢²¼Ê½»Ø¾ø·þÎñ¹¥»÷£¨DDoS¹¥»÷£©£¬¸²¸Ç100¶à¸ö¹ú¶È£¬³¬¹ý30Íò¸öÖ¸±ê¡£Gorilla Botnetͨ¹ýϰȾÎïÁªÍøÉ豸£¬Èç¾ü¶ÓµÈ£¬·¢Æð¹¥»÷£¬Ê¹Ö¸±êϵͳ³äÒç´óÁ¿Á÷Á¿£¬µ¼ÖÂÓû§ÎÞ·¨½Ó¼û¡£ÆäΣÏÕÖ®´¦ÔÚÓÚʹÓüÓÃܼ¼Êõ°µ²Ø¹Ø¼üÊý¾Ý£¬Ö§³Ö¸÷ÀàCPU¼Ü¹¹£¬ÀûÓÃÉ¢²¼Ê½C&CÍøÂçÖÎÀíÔËÓª£¬²¢Ìṩ¶àÖÖDDoS¹¥»÷²½Öè¡£¶Ì¶ÌÒ»¸öÔÂÄÚ£¬Gorilla Botnet¿ªÊÍÁ˳¬¹ý30ÍòÌõ¹¥»÷ºÅÁ¾ùÔÈÿÌì¸ß´ï2ÍòÌõ¡£¹Ø¼ü»ù´¡ÉèÊ©Èç´óѧ¡¢µ±¾ÖÍøÕ¾¡¢µçÐÅ¡¢ÒøÐкÍÓÎϷƽ̨µÈÒ²³ÉΪÊܺ¦Õß¡£´Ë±í£¬Gorilla Botnet»¹Ñ¡È¡KeksecºÚ¿Í×éÖ¯³£ÓõļÓÃÜËã·¨£¬ÄÑÒÔ¼ì²âºÍ·ÖÎö£¬²¢ÀûÓ÷ì϶װÖÃ×Ô¶¯Ö´ÐеķþÎñ£¬²û·¢³öÇ¿ÁÒµÄÓÆ¾ÃÐÔ¡£×éÖ¯Ó¦¼ÓÇ¿ÍøÂ簲ȫ£¬Ê¹Ó÷À»ðǽ¡¢ÈëÇÖ¼ì²âϵͳ£¨IDS£©ºÍ»ùÓÚÔÆµÄDDoS±£»¤µÈ´ëÊ©£¬ÒÔÓ¦¶ÔÈÕÒæÑϳÁµÄGorilla BotnetÍþв¡£
https://hackread.com/mira-gorilla-botnet-ddos-attacks-hit-100-countries/
4. »¥ÁªÍøµµ°¸¹ÝÔÙ´ÎÒò½Ó¼ûÁîÅÆ±»µÁ¶øÔâÈëÇÖ
10ÔÂ20ÈÕ£¬»¥ÁªÍøµµ°¸¹ÝÔÙ´ÎÔâµ½ÈëÇÖ£¬Õâ´ÎÊÇÔÚÆäZendeskµç×ÓÓʼþÖ§³Ôì½Ì¨ÉÏ¡£ÍþвÐÐΪÕßÐû³Æ£¬ÓÉÓÚ»¥ÁªÍøµµ°¸¹ÝδÕýÈ·ÂÖ»»±»µÁµÄÉí·ÝÑéÖ¤ÁîÅÆ£¬ËûÃǵÃÒÔÈëÇÖ¸Ã×éÖ¯¡£Õâ´ÎÈëÇÖʹµÃÍþвÐÐΪÕß¿ÉÄܽӼû×Ô2018ÄêÒÔÀ´·¢ËÍÖÁinfo@archive.orgµÄ800,000¶àÌõÖ§³Ôì±Ö¤£¬Ô̺¬ÒªÇó´ÓWayback MachineÖÐɾ³ýÒ³ÃæÊ±ÉÏ´«µÄÓ×ÎÒÉí·ÝÖ¤Ã÷¸½¼þ¡£´Ëǰ£¬BleepingComputerÔøÂÅ´ÎÖҸ滥ÁªÍøµµ°¸¹Ý£¬ÆäÔ´´úÂëÒÑͨ¹ý¶³öµÄGitLabÉí·ÝÑéÖ¤ÁîÅÆ±»µÁ¡£Õâ´ÎÈëÇÖ²¢·Ç³öÓÚÕþÖλò½ðÇ®ÔÒò£¬¶øÊÇΪÁËÌá¸ßÍþвÐÐΪÕßÔÚÍøÂç½ÖÍ·µÄÃûÓþ¡£¹ÌȻûÓÐÈ˹«¿ªÐû³ÆÖ´ÐÐÁËÕâ´ÎÈëÇÖ£¬µ«¾ÝϤÕâ´ÎÈëÇÖÊÇÔÚÍþвÐÐΪÕßÓëÆäËûÈ˵ÄȺÁÄÖвúÉúµÄ£¬Êý¾Ý¿â´Ë¿Ì¿ÉÄÜÔÚÊý¾Ýй¶ÉçÇøÖÐÂòÂô£¬½«À´¿ÉÄÜ»áÔÚºÚ¿ÍÂÛ̳Éϱ»Ãâ·Ñй¶¡£
https://www.bleepingcomputer.com/news/security/internet-archive-breached-again-through-stolen-access-tokens/
5. ºÚ¿ÍÀûÓÃÐéαµÄESETµç×ÓÓʼþÏòÒÔÉ«ÁÐ×éÖ¯·¢ËÍÊý¾Ý²Á³ýÆ÷
10ÔÂ19ÈÕ£¬½üÆÚºÚ¿Í¼ÙÒâÍøÂ簲ȫ¹«Ë¾ESET£¬Õë¶ÔÒÔÉ«ÁÐ×éÖ¯ÌáÒéÁËÒ»´ÎÍøÂç´¹µö¹¥»÷¡£ËûÃÇ·¢ËÍÐû³ÆÀ´×ÔESETµÄ¶ñÒâµç×ÓÓʼþ£¬ÖÒ¸æÊÕ¼þÈËÃæ¶Ô¹ú¶ÈÖ§³ÖµÄºÚ¿Í¹¥»÷£¬²¢ÓÕµ¼ËûÃÇÏÂÔØÃûΪ¡°ESET Unleashed¡±µÄ²»´æÔÚ·¨Ê½£¬ÊµÔòÊÇÔ̺¬²Á³ýÆ÷¶ñÒâÈí¼þµÄZIPÎļþ£¬Ö¼ÔÚ²Á³ýÊÜϰȾÉ豸ÉϵÄÊý¾Ý¡£°²È«×êÑÐÔ±Kevin Beaumont¸æ·¢ÁËÕâ´Î¹¥»÷£¬Ö¸³öºÚ¿ÍÍ»ÆÆÁËESETµÄ·ÀÓùϵͳ£¬ÔÚÆä·þÎñÆ÷ÉÏÍйܶñÒâÎļþ¡£È»¶ø£¬ESET·ñ¶¨Æä»ù´¡ÉèÊ©Ôâµ½ÈëÇÖ£¬¶øÊÇÖ¸³öÆäÒÔÉ«ÁкÏ×÷ͬ°éComsecure²úÉúÁ˰²È«ÊÂÎñ¡£ÕâЩ´¹µöÓʼþרÃÅÕë¶ÔÒÔÉ«ÁÐ×éÖ¯ÄÚµÄÍøÂ簲ȫÈËÔ±£¬ÇÒ·¢ËÍÈÕÆÚÕýÖµ¹þÂí˹ºÍÆäËû°ÍÀÕ˹̹¼¤½ø×éÖ¯Îä×°ÈëÇÖÒÔÉ«ÁÐÖÜÄêÁôÏëÈյĵڶþÌì¡£Ö»¹Ü¾ßÌåÍþвÕßÉв»Ã÷ÏÔ£¬µ«Ê¹ÓõÄÕ½ÊõÓëÇ×°ÍÀÕ˹̹×éÖ¯HandalaÀàËÆ£¬ºóÕß×î½üÒ²Õë¶ÔÒÔÉ«ÁÐ×éÖ¯·¢ÆðÁ˸´ÔÓ¹¥»÷¡£Õâ´ÎÊÂÎñÒѱ»×èÖ¹£¬µ«Ëü͹ÏÔÁËÍøÂç´¹µö¹¥»÷µÄ³ÖÐøÍþв£¬²¢Òý·¢Á˶ÔÍøÂ簲ȫ´ëÊ©ºÍºÏ×÷ͬ°é»ù´¡ÉèÊ©°²È«ÐÔµÄÓÇÓô¡£ÎªÔ¤·ÀÀàËÆ¹¥»÷£¬×éÖ¯Ó¦Æ÷³ÁÑéÖ¤ÐÂÎÅÕæÊµÐÔ²¢Ö´Ðи߼¶°²È«´ëÊ©¡£
https://hackread.com/hackers-fake-eset-emails-israeli-wiper-malware/
6. ¿Æ¼¼¾ÞÍ·NidecÈ·ÈÏÀÕË÷Èí¼þ¹¥»÷ºóÊý¾Ýй¶
10ÔÂ18ÈÕ£¬ÈÕ±¾µç²úÖêʽ»áÉ磨Nidec Corporation£©´«µÝ³Æ£¬½ñÄêÔçЩʱ³½ÆäÔ½ÄÏ·Ö²¿ÈÕ±¾µç²ú¾«Ãܹ¤Òµ¹«Ë¾£¨Nidec Precision£©Ôâ·êÁËÀÕË÷Èí¼þ¹¥»÷¡£ºÚ¿ÍÇÔÈ¡²¢Ð¹Â¶ÁËÊý¾Ýµ½°µÍø£¬Ö»¹ÜÎļþδ±»¼ÓÃÜ£¬µ«ÊÂÎñÒѵõ½²¹¾È¡£Ð¹Â¶µÄÊý¾Ý¿ÉÄÜÓÃÓÚ¸üÓÐÕë¶ÔÐÔµÄÍøÂç´¹µö¹¥»÷¡£ºÚ¿Íͨ¹ý»ñÈ¡ÓÐЧµÄVPNÕÊ»§Æ¾Ö¤½Ó¼ûÁËÔ̺¬»úÃÜÐÅÏ¢µÄ·þÎñÆ÷£¬¹²ÇÔÈ¡ÁË50,694·ÝÎļþ£¬Ô̺¬ÄÚ²¿Îļþ¡¢Ã³Ò×ͬ°éÀ´ÐÅ¡¢ÂÌÉ«²É¹ºÓйØÎļþ¡¢ÀͶ¯°²È«Ó뽡ȫÕþ²ß¡¢Ã³Ò×ÎļþºÍºÏÒ»Ö¡£8BASEºÍEverestÀÕË÷Èí¼þÍÅ»ïÐû³Æ¶ÔÏ®»÷ÊÂÎñÕÆ¹Ü£¬ÆäÖÐEverestÔÚ8ÔÂ8ÈÕ°ä²¼Á˾ݳƴÓNidecÇÔÈ¡µÄÊý¾Ý¡£NidecÈÏ¿ÉÕâЩÊý¾ÝÀ´×ÔÆäϵͳ£¬µ«ÒÔΪй¶µÄÊý¾Ý²»»á¶ÔÆä»òÆä³Ð°üÉÌÔì³ÉÖ±½ÓµÄ²ÆÕþËðʧ£¬Ò²Î´·¢ÏÖÐÅÏ¢±»Î´¾ÊÚȨʹÓõÄÇé¿ö¡£¸Ã¹«Ë¾ÒѼÓÇ¿Á˰²È«´ëÊ©£¬²¢ÔÚÅàѵԱ¹¤ÒÔ½µµÍ´ËÀà·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/tech-giant-nidec-confirms-data-breach-following-ransomware-attack/


¾©¹«Íø°²±¸11010802024551ºÅ