RhysidaÀÕË÷Èí¼þÍÅ»ï¶Ô×¼²Ð¼²ÈË·ÇͶ»ú×éÖ¯Easterseals

°ä²¼¹¦·ò 2024-10-25
1. RhysidaÀÕË÷Èí¼þÍÅ»ï¶Ô×¼²Ð¼²ÈË·ÇͶ»ú×éÖ¯Easterseals


10ÔÂ24ÈÕ £¬RhysidaÀÕË÷Èí¼þÍÅ»ï½üÈÕ½«Ö¸±êתÏòÁ˳ÛÃû²Ð¼²ÈË·ÇͶ»ú×éÖ¯ÐÂÉú½Ú·âÓ¡(Easterseals) £¬ÊÔͼÀÕË÷130ÍòÃÀÔª¡£¸Ã×é֯Ϊ²Ð¼²¶ùͯ¡¢ÀÏÄêÈË¡¢ÍËÒÛÎäÊ¿µÈÌṩ֧³Ö¡£¾ÝÃåÒòÖݼà¹Ü»ú¹¹Îļþ £¬EastersealsλÓÚÒÁÀûŵÒÁÖÝÖв¿µÄ·ÖÖ§»ú¹¹ÔÚ4ÔÂÔâ·êÁËÍøÂç¹¥»÷ £¬µ¼ÖÂ14,855È˵ÄÓ×ÎÒÐÅϢй¶ £¬Ô̺¬È«Ãû¡¢µØÖ·¡¢¼ÝÊ»ÅÆÕÕ¡¢Éç»á°²È«ºÅÂë¡¢Ò½ÁÆÐÅÏ¢µÈ¡£·¢ÏÖ´ËÊÂÎñºó £¬Eastersealsµ±¼´¶Â½ØÍøÂç½Ó¼û £¬²¢ÀñÆ¸×¨ÒµÍøÂ簲ȫ¹«Ë¾½øÐÐȡ֤µ÷²é¡£RhysidaÔÚÆäйÃÜÍøÕ¾Éϰ䲼ÁËEastersealsµÄÐÅÏ¢ £¬²¢ÒªÇóÔÚ10ÔÂ30ÈÕǰ֧¸¶20±ÈÌØ±Ò¡£´Ëǰ £¬RhysidaÒѶԶà¼ÒÒ½ÁÆ»ú¹¹ÌáÒé¹¥»÷ £¬Ô̺¬Ö¥¼Ó¸ç°²ÓëÂÞ²®ÌØH.¬Àï¶ùͯҽԺµÈ £¬²¢ÔÚÈ¥Äê12Ô¶ÔÊÀ½ç»ù¶½½Ì»á½áºÏ»áÌáÒé¹¥»÷¡£


https://therecord.media/easterseals-central-illinois-data-breach


2. Cisco Talos¸æ·¢TA866¸´ÔÓÕ½Êõ¼°ÆäÓëWarmCookie¶ñÒâÈí¼þµÄÁªÏµ


10ÔÂ23ÈÕ £¬Cisco Talos¸æ·¢ÁËÍþвÐÐΪÕßTA866£¨±ðÃûAsylum Ambuscade£©µÄ¸´ÔÓÕ½ÊõºÍÆäÓëBadSpace¼Ò×åµÄWarmCookie¶ñÒâÈí¼þÖ®¼äµÄÁªÏµ¡£TA866×Ô2020ÄêÒÔÀ´Ò»Ïò»îÔ¾ÓÚ¾­¼ÃÖ÷ÕŶñÒâÈí¼þ»î¶¯ºÍ¼äµý»î¶¯ £¬Ñ¡È¡¶à½×¶ÎϰȾÁ´ £¬Ô̺¬¶ñÒâJavaScriptÏÂÔØ·¨Ê½¡¢MSI°ü¡¢WasabiSeedÏÂÔØÆ÷¡¢Screenshotter¶ñÒâÈí¼þºÍAHK BotÄ £¿é»¯¶ñÒâÈí¼þ¡£WarmCookie¶ñÒâÈí¼þÓëTA866´æÔÚÁªÏµ £¬¹²Ïíµö¶üÖ÷Ìâ¡¢»ù´¡ÉèÊ©¡¢CSharp-Streamer-RATºÍCobalt Strike×÷ΪºóÐøÔØºÉ £¬²¢Ê¹Óñà³ÌÌìÉúµÄSSLÖ¤Êé¡£WarmCookieͨ¹ý¶ñÒâÀ¬»øÓʼþºÍ¸æ°×´«²¼ £¬ÌṩºóÃÅÖ°ÄÜ¡£TA866µÄÑݱäÅú×¢×éÖ¯ÔÚ·ÀÓùÍøÂçÍþв·½ÃæÃæ¶Ô¸´ÔÓÌôÕ½ £¬±ØÒªÏàʶ×îÐÂÍþвµý±¨²¢Ö´ÐÐÏȽø°²È«´ëÊ©¡£


https://hackread.com/ta866-group-warmcookie-malware-espionage-campaign/


3. Webflow³É¼ÓÃÜÇ®±Ò´¹µö¹¥»÷й¤¾ß


10ÔÂ23ÈÕ £¬Netskope Threat LabsµÄ×îÐÂ×êÑÐÏÔʾ £¬Õë¶Ô¼ÓÃÜÇ®±ÒÇ®°üµÄÍøÂç´¹µö¹¥»÷ÔÚ2024Äê4ÔÂÖÁ9ÔÂÆÚ¼ä¼¤Ôö £¬ÕâЩ¹¥»÷ÀûÓÃÊ¢ÐеÄÍøÕ¾¹¹½¨Æ÷WebflowÔì×÷´¹µöÒ³Ãæ £¬·ÂÕպϷ¨µÄ¼ÓÃÜÇ®°üÍøÕ¾ £¬ÈçCoinbase¡¢MetaMaskµÈ £¬ÒÔ¼°¹«Ë¾ÍøÂçÓʼþƽ̨ºÍMicrosoft 365µÄµÇ¼½çÃæ¡£ÕâЩ¹¥»÷ÖØÒªÕë¶Ô±±ÃÀºÍÑÇÖ޵ĽðÈÚ·þÎñ¡¢ÒøÐкͼ¼ÊõÐÐÒµ £¬ÒÑÓг¬¹ý120¸ö×éÖ¯Êܵ½Ó°Ïì¡£Ó봫ͳ´¹µö¹¥»÷·ÖÆç £¬Õâ´Î¹¥»÷ÎÞÐè±àд´úÂë £¬¹¥»÷Õßͨ¹ýWebflowµÄ±íµ¥¿éÍøÂçÊܺ¦ÕßµÄÍ´´¦ £¬³ö¸ñÊǼÓÃÜÇ®°üµÄ°ÂÃØ¸´Ô­¶ÌÓï £¬´Ó¶øÆëÈ«½ÚÔìÇ®°ü²¢ÇÔÈ¡×ʲú¡£ÕâЩ´¹µöÒ³ÃæÍ¨³£Ê¹ÓÃÏÖʵǮ°üÖ÷Ò³µÄ½ØÍ¼Ôì×÷ £¬²¢½«Õû¸öÍøÒ³×ª»»Îª¿Éµã»÷µÄͼÏñ £¬½«Êܺ¦Õß³Á¶¨Ïòµ½¶ñÒâÍøÕ¾¡£´Ë±í £¬ÕâÐ©ÍøÂç´¹µö»î¶¯»¹³£ÓÃÓë֮ǰ¼ÓÃÜȦÌ×ÓйصÄ̸ÌìÆ½Ì¨¡°tawk.to¡±½øÐÐڲƭÐÔ¼¼ÊõÖ§³Ö¡£


https://securityonline.info/webflow-weaponized-phishing-attacks-target-crypto-wallets/


4. Change HealthcareÔâÀÕË÷Èí¼þ¹¥»÷ £¬ÖÂ1ÒÚÈ˽¡È«ÐÅϢй¶


10ÔÂ24ÈÕ £¬½ñÄê2Ô £¬Change HealthcareÔâ·êÁËÀÕË÷Èí¼þ¹¥»÷ £¬µ¼Ö³¬¹ý1ÒÚÈ˵ĸöÈ˽¡È«ÐÅÏ¢±»µÁ £¬ÕâÊÇÃÀ¹úÒÑÖªµÄ×î´óһ·ҽÁƼͼÊý×Ö͵ÇÔ°¸Ö®Ò» £¬Ò²ÊǺ¹ÇàÉÏ×î´óµÄÊý¾Ýй¶°¸Ö®Ò»¡£Õâ´Î¹¥»÷Ôì³ÉÁËÊýÔµÄÖжÏ £¬¶ÔÃÀ¹úÒ½ÁƱ£½¡ÐÐÒµÔì³ÉÁË¿í·º·ÛËé¡£¹¥»÷ÓɶíÓïÀÕË÷Èí¼þºÍڲƭÀÕË÷ÍÅ»ïALPHV/BlackCatËùΪ £¬ËûÃǺóÀ´ÈÏ¿ÉÔðÈβ¢ÅÑÌÓ £¬Í¬Ê±Æ­È¡ÁËÖ´Ðкڿ͹¥»÷µÄ³Ð°üÉ̵ÄвƸ»¡£¸ÃÍŻﻹÏò¸Ã½¡È«¿Æ¼¼¹«Ë¾µÄĸ¹«Ë¾½áºÏ½¡È«¼¯ÍÅ£¨UHG£©ÀÕË÷Á˵ڶþ±ÊÊê½ð £¬²¢ÔÚÍøÉϰ䲼Á˲¿Ãű»µÁÎļþ¡£ÔÚÖ§¸¶Êê½ðºó £¬Change»ñµÃÁ˱»µÁÊý¾Ý¼¯µÄ¸±±¾ £¬ÒÔ¼ø±ð²¢Í¨ÖªÊÜÓ°ÏìµÄÓ×ÎÒ¡£ÃÀ¹úµÐÔÖÊÔͼץ²¶¸ÃÍŻﱳºóµÄºÚ¿Í £¬µ«Î´Äܳɹ¦¡£Õâ´Î¹¥»÷µÄÔ­Òò²¿ÃŹé×ïÓÚÆóÒµ¹é²¢µ¼ÖµÄÔã¸â°²È«ÐÔ £¬ÒÔ¼°Î´Êܶà³É·ÖÉí·ÝÑéÖ¤£¨MFA£©± £»¤µÄ±»µÁƾ֤±»ÍøÂç·¸×ï·Ö×ÓÀûÓá£


https://techcrunch.com/2024/10/24/unitedhealth-change-healthcare-hacked-millions-health-records-ransomware/


5. Landmark AdminÔâÍøÂç¹¥»÷ £¬80ÓàÍòÈËÊý¾Ýй¶


10ÔÂ24ÈÕ £¬±£ÏÕÖÎÀí·þÎñ¹«Ë¾ Landmark Admin ÖÒ¸æ³Æ £¬2024Äê5ÔÂÔâ·êµÄÍøÂç¹¥»÷µ¼ÖÂÊý¾Ýй¶ £¬Ó°ÏìÁ˳¬¹ý80ÍòÈË¡£Landmark Admin ×÷Ϊ´óÐͱ£ÏÕ¹«Ë¾µÄµÚÈý·½ÖÎÀí¹«Ë¾ £¬Îª¶à¼Ò±£ÏÕ¹«Ë¾Ìṩºó¶Ü·þÎñ¡£5ÔÂ13ÈÕ £¬¹«Ë¾¼ì²âµ½¿ÉÒɻ²¢µ±¼´¹Ø¹ØITϵͳºÍÔ¶³Ì½Ó¼û £¬ÒÔÔ¤·À¹¥»÷À©É¢¡£ÓëµÚÈý·½ÍøÂ簲ȫ¹«Ë¾ºÏ×÷ºó £¬·¢ÏÖ¹¥»÷ÆÚ¼äÍþвÐÐΪÕß½Ó¼ûÁËÔ̺¬806,519ÈËÓ×ÎÒÐÅÏ¢µÄÎļþ £¬Éæ¼°ÐÕÃû¡¢µØÖ·¡¢Éç»á°²È«ºÅÂë¡¢½ðÈÚÕË»§ºÅÂë¡¢Ò½ÁÆÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£Ä¿Ç° £¬Landmark ÒÑÏò¿ÉÄÜÊÜÓ°ÏìµÄÓ×ÎÒ·¢ËÍ֪ͨ £¬²¢ÌáÐÑËûÃÇ¼à¿ØÐÅÓþ»ã±¨ºÍÒøÐÐÕË»§¡£µ÷²éÈÔÔÚ½øÐÐÖÐ £¬ÉÐδȷ¶¨ÕâÊÇÀÕË÷Èí¼þ¹¥»÷»¹Êǵ¥´¿µÄÊý¾Ý͵ÇÔ £¬Í¬Ê±Ò²Ã»ÓÐÍþвÐÐΪÕßÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£


https://www.bleepingcomputer.com/news/security/insurance-admin-landmark-says-data-breach-impacts-800-000-people/


6. ½áºÏ¹úÐÅÈλù½ðÊý¾Ý¿âÅäÖÃÃýÎó £¬Ãô¸ÐÊý¾ÝÔâ´ó¹æÄ£Ð¹Â¶


10ÔÂ24ÈÕ £¬ÍøÂ簲ȫ×êÑÐÔ±Jeremiah Fowler·¢ÏÖ £¬½áºÏ¹ú½â³ý±©Á¦ÇÖº¦¸¾Å®ÐÐΪÐÅÈλù½ðµÄÒ»¸öÊý¾Ý¿â´æÔÚÅäÖÃÃýÎó £¬µ¼Ö³¬¹ý115,000·ÝÃô¸ÐÎļþ±»Ð¹Â¶¡£ÕâЩÎļþÔ̺¬Ó×ÎÒÐÅÏ¢¡¢²ÆÕþ¼Í¼ºÍÊܺ¦ÕßÖ¤´ÊµÈÃô¸ÐÊý¾Ý £¬×ÜÈÝÁ¿´ïµ½228GB¡£Ð¹Â¶µÄÊý¾Ý¶ÔÒþÖԺͰ²È«×é³ÉÑϳÁÍþв £¬¿ÉÄܻᱻÓÃÓÚÍøÂç´¹µö¹¥»÷¡¢Éí·Ý͵ÇÔ¡¢Ú²Æ­¡¢ÀÕË÷µÈ¶ñÒâÖ÷ÕÅ¡£Êܺ¦Õß¡¢´È±¯¹¤×÷ÕߺͽáºÏ¹ú¹¤×÷ÈËÔ±¿ÉÄܳÉΪָ±ê £¬Ãæ¶ÔÉí·ÝÐÅÏ¢±»µÁÓá¢Ú²Æ­¡¢Ú²Æ­»òÀÕË÷µÈ·çÏÕ¡£´Ë±í £¬ÆØ¹âµÄÄÚ²¿Îļþ»¹¿ÉÄÜÈ÷¸×ï·Ö×ÓÏàʶ×éÖ¯µÄÔË×÷·½Ê½¡¢¹Ø¼üÖÎÀíºÍ²ÆÕþ½á¹¹µÈÃô¸ÐÐÅÏ¢¡£Ä¿Ç°Éв»Ã÷ÏÔË­ÔÚÖÎÀí¸ÃÊý¾Ý¿â £¬ÒÔ¼°Ëü¶³öÁ˶೤¹¦·ò¡£µ«½áºÏ¹ú¸¾Å®ÊðÒѾ­²ÉÈ¡ÁËÐж¯ £¬± £»¤ÁËÊý¾Ý¿â £¬²¢°ä²¼ÁËÚ¿Æ­¾¯±¨ £¬ÖÂÁ¦¼õÇáÓëÊý¾Ýй¶ÓйصķçÏÕ¡£ÕâÒ»ÊÂÎñ͹ÏÔÁËÇ¿ÓÐÁ¦µÄÍøÂ簲ȫ´ëÊ©¶Ô± £»¤Ãô¸ÐÊý¾ÝµÄ³ÁÒªÐÔ¡£


https://hackread.com/misconfigured-un-database-gender-violence-victims-data/