MUT-1244ÍþвÐÐΪÕß´ó¹æÄ£ÇÔÈ¡WordPressƾ֤¼°Ãô¸ÐÐÅÏ¢
Ðû²¼Ê±¼ä 2024-12-171. MUT-1244ÍþвÐÐΪÕß´ó¹æÄ£ÇÔÈ¡WordPressƾ֤¼°Ãô¸ÐÐÅÏ¢
12ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬ÃûΪMUT-1244µÄÍþвÐÐΪÕßÔÚÒ»³¡³¤´ïÒ»ÄêµÄ´ó¹æÄ£»£»£»£»î¶¯ÖУ¬£¬£¬£¬£¬£¬Í¨¹ýľÂí²¡¶¾Ñ¬È¾µÄWordPressƾ֤¼ì²éÆ÷ÇÔÈ¡ÁËÁè¼Ý390,000¸öWordPressƾ֤¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬¸ÃÐÐΪÕß»¹´ÓÊý°ÙÃûÊܺ¦Õߣ¨°üÀ¨ºì¶Ó³ÉÔ±¡¢ÉøÍ¸²âÊÔÖ°Ô±¡¢Çå¾²Ñо¿Ö°Ô±ÒÔ¼°¶ñÒâÐÐΪÕߣ©µÄÊÜѬȾϵͳÖÐ͵ȡÁËSSH˽ԿºÍAWS»á¼ûÃÜÔ¿¡£¡£¡£¡£¹¥»÷ÕßʹÓñ»Ä¾Âí»¯µÄGitHub´æ´¢¿âÍÆËͶñÒâ¿´·¨ÑéÖ¤Îó²îºÍ¾ÙÐÐÍøÂç´¹Âڻ£¬£¬£¬£¬£¬£¬ÓÕÆÄ¿µÄ×°ÖÃαװ³ÉCPU΢Âë¸üеļÙÄÚºËÉý¼¶¡£¡£¡£¡£ÕâЩ´æ´¢¿âÔöÌíÁËÆäÕýµ±ÐÔ£¬£¬£¬£¬£¬£¬Ê¹µÃÇ徲רҵְԱºÍÍþвÐÐΪÕ߸üÈÝÒ×ÔËÐÐËüÃÇ¡£¡£¡£¡£¹¥»÷Õßͨ¹ýGitHub reposÒÔ¶àÖÖ·½·¨Í¶·ÅÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬°üÀ¨´øÓкóÃŵÄÉèÖñàÒëÎļþ¡¢¶ñÒâPDFÎļþ¡¢PythonͶ·ÅÆ÷ÒÔ¼°¶ñÒânpm°ü¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯ÓëÁíÒ»´Î³¤´ïÒ»ÄêµÄ¹©Ó¦Á´¹¥»÷ÓÐÖØµþ£¬£¬£¬£¬£¬£¬ÆäÖÐÉæ¼°ÇÔÈ¡Êý¾ÝºÍÍÚ¾òÃÅÂÞ±Ò¼ÓÃÜÇ®±Ò¡£¡£¡£¡£MUT-1244Äܹ»»á¼û²¢Ð¹Â¶Ë½ÈËSSHÃÜÔ¿¡¢AWSƾ֤µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÍøÂçÇå¾²ÉçÇøÄÚµÄÐÅÈΣ¬£¬£¬£¬£¬£¬ÔÚÄ¿µÄ²»ÖªÇéµÄÇéÐÎÏÂÖ´ÐжñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÈëÇÖÁËÊýʮ̨»úе¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/390-000-wordpress-accounts-stolen-from-hackers-in-supply-chain-attack/
2. CISA½«CleoÎó²îCVE-2024-50623Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖÐ
12ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Ó°ÏìCleo²úÆ·µÄÎó²îCVE-2024-50623£¨CVSSÆÀ·Ö8.8£©ÁÐÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£Cleo¹«Ë¾·¢Ã÷ÁËÒ»¸ö²»ÊÜÏÞÖÆµÄÎļþÉÏ´«ºÍÏÂÔØÎó²î£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬²¢½¨Òé¿Í»§Á¬Ã¦½«Harmony¡¢VLTraderºÍLexiComʵÀýÉý¼¶µ½×îв¹¶¡°æ±¾5.8.0.21ÒÔ½â¾öDZÔÚ¹¥»÷ǰÑÔ¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Çå¾²¹«Ë¾Huntress±¨¸æ³Æ£¬£¬£¬£¬£¬£¬×ÝÈ»×°ÖÃÁ˸ò¹¶¡£¬£¬£¬£¬£¬£¬ÔËÐÐ5.8.0.21µÄϵͳÈÔ¿ÉÄܱ»Ê¹Óᣡ£¡£¡£Huntress·¢Ã÷ÁËÕë¶ÔCleoÎļþ´«ÊäÈí¼þµÄ×Ô¶¯¹¥»÷£¬£¬£¬£¬£¬£¬²¢¹ûÕæÁËÉæ¼°ÈýÖÖCleo²úÆ·µÄÒ»Á¬¹¥»÷¡£¡£¡£¡£Ê×ϯÇå¾²Ñо¿Ô±Caleb Stewart¿ª·¢ÁËʹÓÃí§ÒâÎļþдÈëÎó²îµÄPython¾ç±¾£¬£¬£¬£¬£¬£¬²¢Ö¤ÊµÁËÎó²îµÄÓÐÓÃÐÔ¡£¡£¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê1ÔÂ3ÈÕ֮ǰÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬£¬×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»¤ÍøÂçÃâÊܹ¥»÷¡£¡£¡£¡£
https://securityaffairs.com/171973/security/u-s-cisa-adds-cleo-harmony-vltrader-and-lexicom-flaw-to-its-known-exploited-vulnerabilities-catalog.html
3. ConnectOnCallÔ¶³ÌÒ½ÁÆÆ½Ì¨ÔâÖØ´óÊý¾Ýй¶
12ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬ConnectOnCallÊÇÒ»¸öרעÓÚÔöǿҽÁÆÐ§ÀÍÌṩÕßÓ뻼ÕßÏàͬµÄÔ¶³ÌÒ½ÁÆÆ½Ì¨£¬£¬£¬£¬£¬£¬¿ËÈÕÅû¶ÁËÒ»ÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬Ó°ÏìÁè¼Ý900,000È˵ÄСÎÒ˽¼ÒÐÅÏ¢¼°Ò½ÁÆÐÅÏ¢Çå¾²¡£¡£¡£¡£¸Ãƽ̨Ìṩ×Ô¶¯»¼Õߺô½Ð¸ú×Ù¡¢HIPAAºÏ¹æÌ¸Ì칦Ч£¬£¬£¬£¬£¬£¬²¢Óëµç×Ó¿µ½¡¼Í¼ϵͳ¼¯³É¡£¡£¡£¡£5ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬ConnectOnCall·¢Ã÷Çå¾²Îó²î£¬£¬£¬£¬£¬£¬¾ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬£¬£¬2024Äê2ÔÂ16ÈÕÖÁ5ÔÂ12ÈÕʱ´ú£¬£¬£¬£¬£¬£¬ÓÐδ֪µÚÈý·½»á¼ûÁËÆ½Ì¨¼°Ó¦ÓóÌÐòÄڵIJ¿·ÖÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨Ò½»¼Í¨Ñ¶ÐÅÏ¢¡£¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬£¬£¬¹«Ë¾Ñ¸ËÙÔ¼ÇëÍøÂçÇ徲ר¼Ò£¬£¬£¬£¬£¬£¬ÏÂÏß²úÆ·£¬£¬£¬£¬£¬£¬²¢ÔÚÇå¾²ÇéÐÎÖоÙÐÐÊý¾Ý»Ö¸´£¬£¬£¬£¬£¬£¬Í¬Ê±Í¨ÖªÁËÁª°îÖ´·¨²¿·Ö¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢¿ÉÄܰüÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅ¡¢Ò½ÁƼͼºÅ¼°¿µ½¡×´Ì¬µÈ¡£¡£¡£¡£Ö»¹ÜÏÖÔÚδ·¢Ã÷ÐÅÏ¢ÀÄÓûò»¼ÕßÊܺ¦ÇéÐΣ¬£¬£¬£¬£¬£¬ConnectOnCallÈÔ½¨ÒéÊÜÓ°ÏìСÎÒ˽¼Ò¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬²¢±¨¸æ¿ÉÒÉÉí·Ý͵ÇÔ»òÚ²ÆÐÐΪ¡£¡£¡£¡£¹«Ë¾ÒÑÏòÖ´·¨²¿·Ö±¨¸æ²¢Í¨ÖªÊÜÓ°ÏìСÎÒ˽¼Ò£¬£¬£¬£¬£¬£¬ÎªÆäÖÐÓÐÏÞÊýÄ¿µÄÉç»áÇå¾²ºÅÂëÊÜÓ°ÏìÕßÌṩÉí·ÝºÍÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬Í¨¹ýÓʼÄ֪ͨÐŵķ½·¨¼û¸æÏà¹ØÇéÐΡ£¡£¡£¡£
https://securityaffairs.com/172053/data-breach/connectoncall-data-breach-impacted-over-900000-individuals.html
4. µÂ¿ËÈøË¹Àí¹¤´óѧ¿µ½¡¿ÆÑ§ÖÐÐÄÔâÍøÂç¹¥»÷
12ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬µÂ¿ËÈøË¹Àí¹¤´óѧ¿µ½¡¿ÆÑ§ÖÐÐļ°Æä°£¶ûÅÁË÷·ÖУ½üÆÚÔâÊÜÁËÒ»´ÎÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÅÌËã»úϵͳºÍÓ¦ÓóÌÐòÖÐÖ¹£¬£¬£¬£¬£¬£¬²¢¿ÉÄÜй¶ÁË140ÍòÃû»¼ÕßµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¸Ã»ú¹¹ÊÇÒ»¼Ò¹«¹²Ñ§ÊõÒ½ÁÆ»ú¹¹£¬£¬£¬£¬£¬£¬ÈÏÕæ½ÌÓý¡¢ÅàѵºÍ»¼ÕßÕչ˻¤Ê¿Ð§ÀÍ¡£¡£¡£¡£¹¥»÷µ¼ÖÂ2024Äê9ÔÂ17ÈÕÖÁ9ÔÂ29ÈÕʱ´ú´Ó¸Ã»ú¹¹ÍøÂçÖлá¼û»òɾ³ýÁËijЩÎļþºÍÎļþ¼Ð¡£¡£¡£¡£¿£¿£¿£¿ÉÄÜй¶¸øºÚ¿ÍµÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢Õþ¸®Éí·ÝÖ¤ºÅÂë¡¢²ÆÎñÕË»§ÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Ò½ÁÆÐÅÏ¢¡¢Õ˵¥/Ë÷ÅâÊý¾Ý¡¢Õï¶ÏºÍÖÎÁÆÐÅÏ¢µÈ¡£¡£¡£¡£¸Ã»ú¹¹ÒÑ֪ͨÊÜÓ°ÏìµÄÈË£¬£¬£¬£¬£¬£¬²¢ÎªËûÃÇÌṩÃâ·ÑµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£½¨ÒéÊÜÓ°ÏìµÄСÎÒ˽¼Ò¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬Ìá·ÀDZÔÚµÄÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬²¢¼à¿ØËûÃǵÄÐÅÓñ¨¸æºÍ¿µ½¡°ü¹ÜÕ˵¥¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÓÉÃûΪInterlockµÄÀÕË÷Èí¼þ×éÖ¯ÈÏÕæ£¬£¬£¬£¬£¬£¬¸Ã×é֯й¶ÁË210Íò¸öÎļþ£¬£¬£¬£¬£¬£¬×ܼÆ2.6TBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬¾Ý³ÆÊǴӸûú¹¹ÇÔÈ¡µÄ¡£¡£¡£¡£InterlockË÷ÒªµÄÊê½ð½ð¶î´ÓÊýÊ®ÍòÃÀÔªµ½Êý°ÙÍòÃÀÔª²»µÈ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/texas-tech-university-system-data-breach-impacts-14-million-patients/
5. ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯Èö²¥Lumma StealerÐÅÏ¢ÇÔÈ¡Èí¼þ
12ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÏîÃûΪ¡°DeceptionAds¡±µÄ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯ÕýÔÚʹÓÃMonetag¹ã¸æÍøÂçÈö²¥Lumma StealerÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¸Ã»î¶¯Í¨¹ýÐéαµÄCAPTCHAÑéÖ¤Ò³ÃæÓÕÆÓû§ÔËÐжñÒâPowerShellÏÂÁ£¬£¬£¬£¬£¬´Ó¶øÑ¬È¾¶ñÒâÈí¼þ¡£¡£¡£¡£Guardio LabsºÍInfobloxµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ÕâÒ»²Ù×÷ÓÉÃûΪ¡°Vane Viper¡±µÄÍþвÐÐΪÕßʵÑ飬£¬£¬£¬£¬£¬Ê¹ÓÃÕýµ±¹ã¸æÍøÂçÉϵĴó¹æÄ£¹ã¸æ½«Óû§´øµ½ÐéαµÄCAPTCHAÒ³Ãæ¡£¡£¡£¡£CAPTCHAÒ³Ãæ°üÀ¨JavaScript´úÂ룬£¬£¬£¬£¬£¬½«¶ñÒâPowerShellÏÂÁî¸´ÖÆµ½Óû§¼ôÌù°å£¬£¬£¬£¬£¬£¬²¢ÓÕµ¼Óû§Ö´ÐС£¡£¡£¡£Lumma Stealer¿É´Óä¯ÀÀÆ÷ÖÐÇÔÈ¡cookie¡¢Æ¾Ö¤¡¢ÃÜÂë¡¢ÐÅÓÿ¨ºÍä¯ÀÀÀúÊ·¼Í¼£¬£¬£¬£¬£¬£¬ÒÔ¼°¼ÓÃÜÇ®±ÒÇ®°ü¡¢Ë½Ô¿ºÍÃô¸ÐÎı¾Îļþ¡£¡£¡£¡£GuardioLabsÒÑÏòMonetagºÍBeMob±¨¸æ´ËÀÄÓÃÐÐΪ£¬£¬£¬£¬£¬£¬²¢»ñµÃʵʱÏìÓ¦¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬¸Ã»î¶¯ÔÚ12Ô·ºÆðËÕÐÑ£¬£¬£¬£¬£¬£¬Åú×¢ÍþвÐÐΪÕßÊÔͼͨ¹ý²î±ð¹ã¸æÍøÂç»Ö¸´ÔËÓª¡£¡£¡£¡£Óû§Ó¦×èÖ¹Ö´ÐÐÍøÕ¾ÌáÐѵÄÏÂÁ£¬£¬£¬£¬£¬ÌØÊâÊÇÄÇЩð³äÐÞ¸´»òÑéÖ¤ÂëµÄÏÂÁ£¬£¬£¬£¬£¬²¢ÉóÉ÷ʹÓõÁ°æÈí¼þ»ò²»·¨Á÷ýÌåÍøÕ¾¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-ads-push-lumma-infostealer-via-fake-captcha-pages/
6. Â޵µºÖÝRIBridgesϵͳÔâBrain CipherÀÕË÷Èí¼þ¹¥»÷
12ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬Â޵µºÖÝÖÒÑԳƣ¬£¬£¬£¬£¬£¬ÆäÓɵÂÇÚÖÎÀíµÄRIBridgesϵͳÔâÊÜÁËBrain CipherÀÕË÷Èí¼þÍÅ»ïµÄÈëÇÖ£¬£¬£¬£¬£¬£¬µ¼ÖÂÊý¾Ýй¶£¬£¬£¬£¬£¬£¬Ì»Â¶ÁËסÃñµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£RIBridgesÊǸÃÖÝÓÃÓÚÖÎÀíºÍÌṩ¹«¹²Ô®ÖúÍýÏëµÄÏÖ´ú×ÛºÏ×ʸñϵͳ¡£¡£¡£¡£´Ë´ÎÊÂÎñÓÚ2024Äê12ÔÂ5ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬£¬µÂÇÚÆÀ¹ÀºóÒÔΪºÚ¿Í¿ÉÄÜÇÔÈ¡Á˰üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢ºÍÆäËûÊý¾ÝµÄÎļþ¡£¡£¡£¡£ÊÜÓ°ÏìµÄÏîÄ¿°üÀ¨Ò½ÁƽòÌù¡¢Ôö²¹ÓªÑøÔ®ÖúÍýÏ롢ƶÀ§¼ÒÍ¥ÔÝʱԮÖúµÈ¶à¸ö¹«¹²Ð§ÀÍÏîÄ¿¡£¡£¡£¡£Ö»¹Üй¶µÄÊý¾ÝÈÔÔÚÆÀ¹ÀÖУ¬£¬£¬£¬£¬£¬µ«¿ÉÄܰüÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂëºÍÄ³Ð©ÒøÐÐÐÅÏ¢¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¼ÒÍ¥½«Í¨¹ýÓʼþÊÕµ½Í¨Öª£¬£¬£¬£¬£¬£¬²¢¿ÉÖµçרÓúô½ÐÖÐÐÄ×·ÇóÖ§³Ö¡£¡£¡£¡£Â޵µºÖÝÕþ¸®½¨ÒéסÃñÖØÖÃÃÜÂë¡¢ÉèÖÃڲƾ¯±¨ºÍÐÅÓö³½á£¬£¬£¬£¬£¬£¬²¢Æô¶¯ÒøÐÐÌṩµÄÇå¾²²½·¥¡£¡£¡£¡£µÂÇÚ½²»°ÈËÈ·ÈÏ£¬£¬£¬£¬£¬£¬Â޵µºÖݵÄϵͳÊÇÊܵ½Brain CipherÊý¾Ýй¶ӰÏìµÄ¡°¼òµ¥¿Í»§¶Ëϵͳ¡±£¬£¬£¬£¬£¬£¬²¢ÌåÏÖ½«Óë¿Í»§ºÍÖ´·¨¹ÙÔ±ÏàÖúÕö¿ªÊӲ졣¡£¡£¡£
https://www.bleepingcomputer.com/news/security/rhode-island-confirms-data-breach-after-brain-cipher-ransomware-attack/


¾©¹«Íø°²±¸11010802024551ºÅ