Ç×¶íºÚ¿ÍNoname057(16)Õë¶ÔÒâ´óÀû·¢¶¯´ó¹æÄ£ÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2025-01-141. Ç×¶íºÚ¿ÍNoname057(16)Õë¶ÔÒâ´óÀû·¢¶¯´ó¹æÄ£ÍøÂç¹¥»÷
1ÔÂ12ÈÕ£¬£¬£¬£¬£¬Ç×¶íºÚ¿Í×éÖ¯NoName057(16)¶ÔÒâ´óÀûÌᳫÁËһϵÁÐÍøÂç¹¥»÷£¬£¬£¬£¬£¬Ä¿µÄ°üÀ¨¸÷²¿Î¯¡¢Õþ¸®»ú¹¹¡¢Òªº¦»ù´¡ÉèÊ©ÍøÕ¾ÒÔ¼°Ë½ÈË×éÖ¯£¬£¬£¬£¬£¬Ç¡·êÎÚ¿ËÀ¼×ÜͳÔóÁ¬Ë¹»ù»á¼ûÒâ´óÀû¡£¡£¡£¡£¡£¡£¸ÃºÚ¿Í×éÖ¯ÔÚÆäTelegramƵµÀÉÏÐû²¼¶Ô´ËÈÏÕæ£¬£¬£¬£¬£¬²¢Ö¸³ö¹¥»÷ÊÇÓÉÓÚÒâ´óÀû×ÜÀí÷ÂåÄáÔÚ»á¼ûÔóÁ¬Ë¹»ùÊ±ÖØÉêÁ˶ÔÎÚ¿ËÀ¼µÄÖÜȫ֧³Ö¡£¡£¡£¡£¡£¡£¹¥»÷´ÓÖÜÁù×îÏÈ£¬£¬£¬£¬£¬Õë¶ÔÒâ´óÀû¸÷²¿Î¯ºÍÕþ¸®»ú¹¹£¬£¬£¬£¬£¬ÖÜÈÕÔò²¨¼°Òâ´óÀûÒøÐкÍ˽ӪÆóÒµ¡£¡£¡£¡£¡£¡£Ö»¹Ü´ËÀàºÚ¿Í»î¶¯²¢²»ÓÐÊý£¬£¬£¬£¬£¬µ«´Ë´Î¹¥»÷Ôì³ÉÁËÆÆËðºÍÔÝʱµÄЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£¹ú¼ÒÍøÂçÇå¾²¾Ö(ACN)µÄר¼ÒѸËÙ½éÈ룬£¬£¬£¬£¬ÎªÊÜÓ°Ïì×éÖ¯Ìṩ֧³Ö¡£¡£¡£¡£¡£¡£×Ô2022Äê3ÔÂÒÔÀ´£¬£¬£¬£¬£¬¸Ã×éÖ¯Ò»Ö±»îÔ¾ÓÚÈ«Çò£¬£¬£¬£¬£¬ÒÔÕþ¸®ºÍÒªº¦»ù´¡ÉèʩΪĿµÄ£¬£¬£¬£¬£¬Ê¹ÓöàÖÖ¹¤¾ß¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÔÚÊ¥µ®½Ú¼ÙÆÚʱ´ú£¬£¬£¬£¬£¬¾ßÓÐÕ½ÂÔÒâÒ壬£¬£¬£¬£¬ÓÉÓÚ´Ëʱ×éÖ¯Ö°Ô±ïÔÌ£¬£¬£¬£¬£¬ÏìӦʱ¼ä±äÂý£¬£¬£¬£¬£¬Ê¹µÃ¹¥»÷Ô½·¢ÄÑÒÔ±»·¢Ã÷»ººÍ½â¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/172982/hacktivism/noname057-targets-italy.html
2. ΢ÈíÆðËßÍâ¹úºÚ¿Í×éÖ¯ÀÄÓÃAzure AIЧÀÍÖÆ×÷Óк¦ÄÚÈÝ
1ÔÂ11ÈÕ£¬£¬£¬£¬£¬Î¢Èí¿ËÈÕÐû²¼¶ÔÒ»¸öÔËÓª¡°ºÚ¿Í¼´Ð§ÀÍ¡±»ù´¡ÉèÊ©µÄÍâ¹úºÚ¿Í×éÖ¯ÌáÆðËßËÏ¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÈÆ¹ý΢ÈíÌìÉúʽAIЧÀ͵ÄÇå¾²¿ØÖÆ£¬£¬£¬£¬£¬ÖÆ×÷ð·¸ÐÔºÍÓк¦ÄÚÈÝ¡£¡£¡£¡£¡£¡£¾Ý΢ÈíÊý×Ö·¸·¨²¿·Ö£¨DCU£©³Æ£¬£¬£¬£¬£¬¸Ã×éÖ¯¿ª·¢ÁËÖØ´óÈí¼þ£¬£¬£¬£¬£¬×¥È¡²¢Ê¹ÓÃ̻¶µÄ¿Í»§Æ¾Ö¤£¬£¬£¬£¬£¬ÊÔͼ²»·¨»á¼ûÓµÓÐAIЧÀ͵ÄÕË»§£¬£¬£¬£¬£¬²¢¸Ä±äÕâЩЧÀ͵ÄÄÜÁ¦¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬ËûÃǽ«»á¼ûȨÏÞ³öÊÛ¸øÆäËû¶ñÒâÐÐΪÕߣ¬£¬£¬£¬£¬²¢ÌṩÏêϸ˵Ã÷ÔõÑùʹÓÃÕâЩ¹¤¾ßÌìÉúÓк¦ÄÚÈÝ¡£¡£¡£¡£¡£¡£Î¢ÈíÒÑ×÷·Ï¹¥»÷Õß»á¼ûȨÏÞ£¬£¬£¬£¬£¬ÊµÑéÁËеÄÓ¦¶Ô²½·¥£¬£¬£¬£¬£¬²¢Ç¿»¯ÁËÇå¾²²½·¥¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Î¢Èí»¹»ñµÃÁËÒ»Ïî·¨ÔºÏÂÁ£¬£¬£¬£¬²é·âÁËÒªº¦ÍøÕ¾¡°aitism[.]net¡±¡£¡£¡£¡£¡£¡£¾Ý·¨Í¥ÎļþÏÔʾ£¬£¬£¬£¬£¬ÖÁÉÙÓÐÈýÃûδ֪СÎÒ˽¼Ò¼ÓÈëÁË´Ë´ÎÐж¯£¬£¬£¬£¬£¬Ê¹Óñ»µÁµÄAzure APIÃÜÔ¿ºÍ¿Í»§Éí·ÝÑéÖ¤ÐÅÏ¢ÇÖÈëϵͳ£¬£¬£¬£¬£¬²¢Î¥·´Ê¹ÓÃÕþ²ß½¨ÉèÓк¦Í¼Ïñ¡£¡£¡£¡£¡£¡£Î¢ÈíÖ¸³ö£¬£¬£¬£¬£¬±»¸æÊ¹Óö¨ÖÆ·´ÏòÊðÀíЧÀÍ£¬£¬£¬£¬£¬Í¨¹ýAzure OpenAI Service APIŲÓò»·¨ÌìÉúÊýǧÕÅÓк¦Í¼Ïñ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬´ËÊÂÎñ²»µ«ÏÞÓÚ¶Ô΢ÈíµÄ¹¥»÷£¬£¬£¬£¬£¬AzureÀÄÓÃÆóÒµÒ»Ö±ÔÚÕë¶ÔÆäËûAIЧÀÍÌṩÉ̲¢ÔâÊÜÆäº¦¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/01/microsoft-sues-hacking-group-exploiting.html
3. Teton OrthopaedicsÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬»¼ÕßÓëÔ±¹¤Êý¾Ýй¶
1ÔÂ12ÈÕ£¬£¬£¬£¬£¬2024Äê3ÔÂ25ÈÕ£¬£¬£¬£¬£¬DataBreachesÍøÕ¾ÔÚÔ¶ÈÊÂÇé±íÉϼͼÁËTeton OrthopaedicsÔâÊÜÀÕË÷Èí¼þ¹¥»÷µÄÊÂÎñ£¬£¬£¬£¬£¬¸ÃÊÂÎñÓÉÃûΪDragonForceµÄ×éÖ¯Éù³ÆÈÏÕæ£¬£¬£¬£¬£¬ËûÃÇÉù³ÆÒÑÇÔÈ¡²¢¼ÓÃÜÁ˸ÃÌṩÉ̵ÄÎļþ¡£¡£¡£¡£¡£¡£Ö»¹ÜDataBreachesͨ¹ýGoogleËÑË÷ÑéÖ¤Á˲¿·Öй¶µÄ²¡È˼ͼ£¬£¬£¬£¬£¬µ«Ö±µ½2024Äê12Ô£¬£¬£¬£¬£¬Teton Orthopaedics²Å֪ͨÊÜÓ°ÏìµÄ»¼ÕߺÍÖÝסÃñ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ÔÚ·¢Ã÷Îó²îºóµÄ60ÌìÄÚ£¬£¬£¬£¬£¬ËûÃDz¢Î´ÏòÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©·¢³ö֪ͨ£¬£¬£¬£¬£¬Ö»¹ÜÍøÕ¾Í¨ÖªÈÏ¿ÉËûÃÇÔÚ3ÔÂ25ÈÕ·¢Ã÷ÁËÎó²î¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Teton OrthopaedicsÓëDragonForceÖ®¼äµÄ̸ÅÐËÆºõҲδȡµÃÀֳɡ£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ²»µ«Ó°ÏìÁË»¼ÕßÊý¾Ý£¬£¬£¬£¬£¬»¹Ó°ÏìÁËÔ±¹¤Êý¾Ý£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¿µ½¡°ü¹ÜÐÅÏ¢ºÍÒ½ÁÆÐÅÏ¢µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£Teton OrthopaedicsÒѽÓÄɲ½·¥ÔöÇ¿Çå¾²ÐÔ£¬£¬£¬£¬£¬µ«²¢Î´Îª»¼ÕßÌṩÃâ·ÑµÄЧÀÍ£¬£¬£¬£¬£¬ÈçÐÅÓÃ¼à¿Ø»òÉí·Ý͵ÇÔ»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£¡£
https://databreaches.net/2025/01/12/nine-months-after-discovering-a-ransomware-attack-teton-orthopaedics-notifies-patients/
4. Gravy AnalyticsÊý¾Ýй¶£ºÈ«ÇòÊý°ÙÍòÓû§Òþ˽ÊÜÍþв
1ÔÂ13ÈÕ£¬£¬£¬£¬£¬Î»ÖÃÊý¾Ý¾¼Í¹«Ë¾Gravy Analytics½üÆÚÔâÓöÁËÑÏÖØµÄºÚ¿Í¹¥»÷ºÍÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬µ¼ÖÂÈ«ÇòÊý°ÙÍòÈ˵ÄÒþ˽Êܵ½Íþв¡£¡£¡£¡£¡£¡£ºÚ¿Í´ÓÒ»¸ö¹Ø±ÕµÄ¶íÓïÍøÂç·¸·¨ÂÛ̳ÉÏÐû²¼ÁË´ó×ÚλÖÃÊý¾ÝÑù±¾£¬£¬£¬£¬£¬ÕâЩÊý¾Ýº¸ÇÁ˽¡Éí¡¢¿µ½¡¡¢Ô¼»á¡¢½»Í¨Ó¦ÓÃÒÔ¼°ÈÈÃÅÓÎÏ·µÈ¶à¸öÁìÓò£¬£¬£¬£¬£¬´ú±íÁËÊýÍòÍò¸öСÎÒ˽¼ÒλÖÃÊý¾Ýµã¡£¡£¡£¡£¡£¡£¾ÝŲÍþ¹ã²¥¹«Ë¾NRK±¨µÀ£¬£¬£¬£¬£¬Gravy AnalyticsµÄĸ¹«Ë¾UnacastÒÑÏòŲÍþÊý¾Ý±£»£»£»£»£»£»¤»ú¹¹Åû¶ÁËÕâһΥ¹æÐÐΪ¡£¡£¡£¡£¡£¡£UnacastÌåÏÖ£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýµÁÓÃÃÜÔ¿´ÓÆäÑÇÂíÑ·ÔÆÇéÐÎÖÐÇÔÈ¡ÁËÊýTBµÄÏûºÄÕßÊý¾Ý¡£¡£¡£¡£¡£¡£×èÖ¹±¨µÀʱ£¬£¬£¬£¬£¬Gravy AnalyticsµÄÍøÕ¾ÈÔ´¦ÓÚ̱»¾×´Ì¬¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬´Ë´Îй¶µÄÊý¾ÝµãÒÑÁè¼Ý3000Íò£¬£¬£¬£¬£¬°üÀ¨Î»ÓÚÃô¸ÐËùÔÚµÄ×°±¸ÐÅÏ¢£¬£¬£¬£¬£¬Èç°×¹¬¡¢¿ËÀïÄ·ÁÖ¹¬ºÍÈ«Çò¾üÊ»ùµØ¡£¡£¡£¡£¡£¡£ÕâЩÊý¾Ý²»µ«¿ÉÄÜ̻¶ͨË×È˵ÄÐÐ×Ù£¬£¬£¬£¬£¬»¹¿ÉÄܶÔLGBTQ+Óû§×é³ÉΣº¦¡£¡£¡£¡£¡£¡£Çå¾²Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬ÕâЩÊý¾Ý»¹¿ÉÒÔÇáËÉÈÃͨË×СÎÒ˽¼ÒµÄÉí·Ý±»È¥ÄäÃû»¯¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÃÀ¹úÁª°îÉÌҵίԱ»á´ËǰÒÑեȡGravy Analytics¼°Æä×Ó¹«Ë¾Î´¾ÏûºÄÕßÔÞ³ÉÍøÂçºÍ³öÊÛλÖÃÊý¾Ý¡£¡£¡£¡£¡£¡£Gravy AnalyticsµÄλÖÃÊý¾ÝÖ÷ҪȪԴÓÚÔÚÏß¹ã¸æÐÐÒµµÄʵʱ¾º¼ÛÀú³Ì£¬£¬£¬£¬£¬µ«ÕâÒ»Àú³ÌÖб£´æÊý¾Ýй¶µÄΣº¦¡£¡£¡£¡£¡£¡£
https://techcrunch.com/2025/01/13/gravy-analytics-data-broker-breach-trove-of-location-data-threatens-privacy-millions/
5. Ó¢¹úÓòÃû¾ÞÍ·NominetÔâIvanti VPNÎó²îºÚ¿Í¹¥»÷
1ÔÂ13ÈÕ£¬£¬£¬£¬£¬Ó¢¹úÓòÃû×¢²á»ú¹¹Nominet½üÆÚÔâÓöÁËÒ»´ÎÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬¸ÃÊÂÎñÓëºÚ¿ÍʹÓÃIvanti VPNÈí¼þµÄÐÂÎó²îÓйء£¡£¡£¡£¡£¡£NominetÈÏÕæÎ¬»¤.co.ukÓòÃû£¬£¬£¬£¬£¬ÆäÔÚ·¢¸ø¿Í»§µÄµç×ÓÓʼþÖÐÖÒÑԳƣ¬£¬£¬£¬£¬ÕýÔÚÊÓ²ìÒ»Æð¡°ÕýÔÚ±¬·¢µÄÇå¾²ÊÂÎñ¡±¡£¡£¡£¡£¡£¡£¾ÝNominet͸¶£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýIvantiÌṩµÄµÚÈý·½VPNÈí¼þ»á¼ûÁËÆäϵͳ£¬£¬£¬£¬£¬ÇÒ´Ë´ÎÈëÇÖʹÓÃÁËÁãÈÕÎó²î£¬£¬£¬£¬£¬ÖÂʹNominetÎÞ·¨ÊµÊ±´ò²¹¶¡¾ÙÐзÀÓù¡£¡£¡£¡£¡£¡£IvantiÉÏÖÜÒÑ֤ʵÆäÆÕ±éʹÓÃµÄÆóÒµVPN×°±¸Connect Secure±£´æÎó²î£¬£¬£¬£¬£¬²¢Ôâµ½ºÚ¿ÍʹÓþÙÐÐÈëÇÖ¡£¡£¡£¡£¡£¡£Ö»¹ÜIvantiδ͸¶ÏêϸÊÜÓ°Ïì¿Í»§ÊýÄ¿£¬£¬£¬£¬£¬µ«ÍøÂçÇå¾²¹«Ë¾watchTowr LabsÒÑ·¢Ã÷¡°ÆÕ±é¡±µÄÈëÇÖÐÐΪ¡£¡£¡£¡£¡£¡£Nominet×÷ΪÊ×¼Ò¹ûÕæÈ·ÈÏÊÜIvantiÎó²îÓ°ÏìµÄ×éÖ¯£¬£¬£¬£¬£¬ÌåÏÖÏÖÔÚ¡°Ã»ÓÐÊý¾Ýй¶»ò×ß©µÄÖ¤¾Ý¡±£¬£¬£¬£¬£¬²¢ÔÚÊÓ²ìʱ´úÏÞÖÆÁ˶ÔVPNÈí¼þµÄ»á¼û¡£¡£¡£¡£¡£¡£
https://techcrunch.com/2025/01/13/uk-domain-giant-nominet-confirms-cybersecurity-incident-linked-to-ivanti-vpn-hacks/
6. CISA¸üÐÂÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬£¬ÒªÇó»ú¹¹ÊµÊ±ÐÞ¸´
1ÔÂ13ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½üÆÚ¸üÐÂÁËÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬£¬£¬ÐÂÔöÁËÁ½¸öÖ÷ÒªÎó²î¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬CVE-2024-12686ÊÇÒ»¸ö±£´æÓÚBeyondTrustÌØÈ¨Ô¶³Ì»á¼û£¨PRA£©ºÍÔ¶³ÌÖ§³Ö£¨RS£©ÖеIJÙ×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ6.6¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐí¾ßÓÐÖÎÀíȨÏ޵Ĺ¥»÷ÕßÉÏ´«¶ñÒâÎļþ£¬£¬£¬£¬£¬²¢ÔÚÕ¾µãÓû§ÉÏÏÂÎÄÖÐÖ´Ðеײã²Ù×÷ϵͳÏÂÁî¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬BeyondTrust¹«Ë¾ÔøÔÚ2024Äê12Ô³õÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬²¿·ÖÔ¶³ÌÖ§³ÖSaaSʵÀý±»ÈëÇÖ£¬£¬£¬£¬£¬¶øCVE-2024-12686ÕýÊǴ˴ι¥»÷Öз¢Ã÷µÄÎó²îÖ®Ò»¡£¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²îÊÇCVE-2023-48365£¬£¬£¬£¬£¬ËüÊÇQlik SenseÖеÄHTTPËíµÀÎó²î£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.6£¬£¬£¬£¬£¬¿Éʹ¹¥»÷ÕßÌáÉýȨÏÞ²¢Ïòºó¶ËЧÀÍÆ÷·¢ËÍHTTPÇëÇ󡣡£¡£¡£¡£¡£Æ¾Ö¤CISAÐû²¼µÄ¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸Á£¬£¬£¬£¬Áª°î»ú¹¹±ØÐèÔÚ2025Äê2ÔÂ3ÈÕ֮ǰ½â¾öÕâЩÒÑ·¢Ã÷µÄÎó²î£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»£»¤ÆäÍøÂçÃâÊܹ¥»÷¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²éCISAµÄKEVĿ¼£¬£¬£¬£¬£¬²¢ÊµÊ±½â¾öÆä»ù´¡ÉèÊ©Öб£´æµÄÎó²î¡£¡£¡£¡£¡£¡£ÕâЩ²½·¥¹ØÓÚÌá¸ßÍøÂçÇå¾²·À»¤ÄÜÁ¦¾ßÓÐÖ÷ÒªÒâÒå¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/173031/security/u-s-cisa-adds-beyondtrust-pra-and-rs-and-qlik-sense-flaws-to-its-known-exploited-vulnerabilities-catalog.html


¾©¹«Íø°²±¸11010802024551ºÅ