RhysidaÀÕË÷Èí¼þÍÅ»ïÃé×¼²Ð¼²ÈË·ÇÓªÀû×éÖ¯Easterseals
Ðû²¼Ê±¼ä 2024-10-2510ÔÂ24ÈÕ£¬£¬£¬£¬RhysidaÀÕË÷Èí¼þÍÅ»ï¿ËÈÕ½«Ä¿µÄתÏòÁË×ÅÃû²Ð¼²ÈË·ÇÓªÀû×éÖ¯¸´Éú½Ú·âÓ¡(Easterseals)£¬£¬£¬£¬ÊÔͼÀÕË÷130ÍòÃÀÔª¡£¡£¡£¸Ã×é֯Ϊ²Ð¼²¶ùͯ¡¢ÍíÄêÈË¡¢ÍËÎéÎäÊ¿µÈÌṩ֧³Ö¡£¡£¡£¾ÝÃåÒòÖÝî¿Ïµ»ú¹¹Îļþ£¬£¬£¬£¬EastersealsλÓÚÒÁÀûŵÒÁÖÝÖв¿µÄ·ÖÖ§»ú¹¹ÔÚ4ÔÂÔâÓöÁËÍøÂç¹¥»÷£¬£¬£¬£¬µ¼ÖÂ14,855È˵ÄСÎÒ˽¼ÒÐÅϢй¶£¬£¬£¬£¬°üÀ¨È«Ãû¡¢µØµã¡¢¼ÝʻִÕÕ¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁÆÐÅÏ¢µÈ¡£¡£¡£·¢Ã÷´ËÊÂÎñºó£¬£¬£¬£¬EastersealsÁ¬Ã¦ÇжÏÍøÂç»á¼û£¬£¬£¬£¬²¢Ô¼Çë×¨ÒµÍøÂçÇå¾²¹«Ë¾¾ÙÐÐȡ֤ÊӲ졣¡£¡£RhysidaÔÚÆäйÃÜÍøÕ¾ÉÏÐû²¼ÁËEastersealsµÄÐÅÏ¢£¬£¬£¬£¬²¢ÒªÇóÔÚ10ÔÂ30ÈÕǰ֧¸¶20±ÈÌØ±Ò¡£¡£¡£´Ëǰ£¬£¬£¬£¬RhysidaÒѶԶà¼ÒÒ½ÁÆ»ú¹¹Ìᳫ¹¥»÷£¬£¬£¬£¬°üÀ¨Ö¥¼Ó¸ç°²ÓëÂÞ²®ÌØH.¬Àï¶ùͯҽԺµÈ£¬£¬£¬£¬²¢ÔÚÈ¥Äê12Ô¶ÔÌìÏ»ù¶½½Ì»áÁªºÏ»áÌᳫ¹¥»÷¡£¡£¡£
https://therecord.media/easterseals-central-illinois-data-breach
2. Cisco Talos½ÒÆÆTA866ÖØ´óÕ½ÂÔ¼°ÆäÓëWarmCookie¶ñÒâÈí¼þµÄÁªÏµ
10ÔÂ23ÈÕ£¬£¬£¬£¬Cisco Talos½ÒÆÆÁËÍþвÐÐΪÕßTA866£¨ÓÖÃûAsylum Ambuscade£©µÄÖØ´óÕ½ÂÔºÍÆäÓëBadSpace¼Ò×åµÄWarmCookie¶ñÒâÈí¼þÖ®¼äµÄÁªÏµ¡£¡£¡£TA866×Ô2020ÄêÒÔÀ´Ò»Ö±»îÔ¾ÓÚ¾¼ÃÄ¿µÄ¶ñÒâÈí¼þ»î¶¯ºÍÌØ¹¤»î¶¯£¬£¬£¬£¬½ÓÄɶà½×¶ÎѬȾÁ´£¬£¬£¬£¬°üÀ¨¶ñÒâJavaScriptÏÂÔØ³ÌÐò¡¢MSI°ü¡¢WasabiSeedÏÂÔØÆ÷¡¢Screenshotter¶ñÒâÈí¼þºÍAHK BotÄ£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þ¡£¡£¡£WarmCookie¶ñÒâÈí¼þÓëTA866±£´æÁªÏµ£¬£¬£¬£¬¹²ÏíÓÕ¶üÖ÷Ìâ¡¢»ù´¡ÉèÊ©¡¢CSharp-Streamer-RATºÍCobalt Strike×÷ΪºóÐøÔØºÉ£¬£¬£¬£¬²¢Ê¹Óñà³ÌÌìÉúµÄSSLÖ¤Êé¡£¡£¡£WarmCookieͨ¹ý¶ñÒâÀ¬»øÓʼþºÍ¹ã¸æÈö²¥£¬£¬£¬£¬ÌṩºóÃŹ¦Ð§¡£¡£¡£TA866µÄÑݱäÅú×¢×éÖ¯ÔÚ·ÀÓùÍøÂçÍþв·½ÃæÃæÁÙÖØ´óÌôÕ½£¬£¬£¬£¬ÐèÒªÏàʶ×îÐÂÍþвÇ鱨²¢ÊµÑéÏȽøÇå¾²²½·¥¡£¡£¡£
https://hackread.com/ta866-group-warmcookie-malware-espionage-campaign/
3. Webflow³É¼ÓÃÜÇ®±Ò´¹ÂÚ¹¥»÷й¤¾ß
10ÔÂ23ÈÕ£¬£¬£¬£¬Netskope Threat LabsµÄ×îÐÂÑо¿ÏÔʾ£¬£¬£¬£¬Õë¶Ô¼ÓÃÜÇ®±ÒÇ®°üµÄÍøÂç´¹ÂÚ¹¥»÷ÔÚ2024Äê4ÔÂÖÁ9ÔÂʱ´ú¼¤Ôö£¬£¬£¬£¬ÕâЩ¹¥»÷ʹÓÃÊ¢ÐеÄÍøÕ¾¹¹½¨Æ÷WebflowÖÆ×÷´¹ÂÚÒ³Ãæ£¬£¬£¬£¬Ä£ÄâÕýµ±µÄ¼ÓÃÜÇ®°üÍøÕ¾£¬£¬£¬£¬ÈçCoinbase¡¢MetaMaskµÈ£¬£¬£¬£¬ÒÔ¼°¹«Ë¾ÍøÂçÓʼþƽ̨ºÍMicrosoft 365µÄµÇ¼½çÃæ¡£¡£¡£ÕâЩ¹¥»÷Ö÷ÒªÕë¶Ô±±ÃÀºÍÑÇÖ޵ĽðÈÚЧÀÍ¡¢ÒøÐкÍÊÖÒÕÐÐÒµ£¬£¬£¬£¬ÒÑÓÐÁè¼Ý120¸ö×éÖ¯Êܵ½Ó°Ïì¡£¡£¡£Óë¹Å°å´¹ÂÚ¹¥»÷²î±ð£¬£¬£¬£¬´Ë´Î¹¥»÷ÎÞÐè±àд´úÂ룬£¬£¬£¬¹¥»÷Õßͨ¹ýWebflowµÄ±íµ¥¿éÍøÂçÊܺ¦Õߵį¾Ö¤£¬£¬£¬£¬ÌØÊâÊǼÓÃÜÇ®°üµÄÉñÃØ»Ö¸´¶ÌÓ£¬£¬£¬´Ó¶øÍêÈ«¿ØÖÆÇ®°ü²¢ÇÔÈ¡×ʲú¡£¡£¡£ÕâЩ´¹ÂÚÒ³ÃæÍ¨³£Ê¹ÓÃÏÖʵǮ°üÖ÷Ò³µÄ½ØÍ¼ÖÆ×÷£¬£¬£¬£¬²¢½«Õû¸öÍøÒ³×ª»»Îª¿Éµã»÷µÄͼÏñ£¬£¬£¬£¬½«Êܺ¦ÕßÖØ¶¨Ïòµ½¶ñÒâÍøÕ¾¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÕâÐ©ÍøÂç´¹Âڻ»¹³£ÓÃÓë֮ǰ¼ÓÃÜȦÌ×ÓйصÄ̸ÌìÆ½Ì¨¡°tawk.to¡±¾ÙÐÐÚ²ÆÐÔÊÖÒÕÖ§³Ö¡£¡£¡£
https://securityonline.info/webflow-weaponized-phishing-attacks-target-crypto-wallets/
4. Change HealthcareÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ÖÂ1ÒÚÈË¿µ½¡ÐÅϢй¶
10ÔÂ24ÈÕ£¬£¬£¬£¬½ñÄê2Ô£¬£¬£¬£¬Change HealthcareÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ¼ÖÂÁè¼Ý1ÒÚÈ˵Ä˽ÈË¿µ½¡ÐÅÏ¢±»µÁ£¬£¬£¬£¬ÕâÊÇÃÀ¹úÒÑÖªµÄ×î´óÒ»ÆðÒ½ÁƼͼÊý×Ö͵ÇÔ°¸Ö®Ò»£¬£¬£¬£¬Ò²ÊÇÀúÊ·ÉÏ×î´óµÄÊý¾Ýй¶°¸Ö®Ò»¡£¡£¡£´Ë´Î¹¥»÷Ôì³ÉÁËÊýÔµÄÖÐÖ¹£¬£¬£¬£¬¶ÔÃÀ¹úÒ½ÁƱ£½¡ÐÐÒµÔì³ÉÁËÆÕ±éÆÆË𡣡£¡£¹¥»÷ÓɶíÓïÀÕË÷Èí¼þºÍÚ²ÆÀÕË÷ÍÅ»ïALPHV/BlackCatËùΪ£¬£¬£¬£¬ËûÃÇØÊºóÈÏ¿ÉÔðÈβ¢Ç±ÌÓ£¬£¬£¬£¬Í¬Ê±ÆÈ¡ÁËʵÑéºÚ¿Í¹¥»÷µÄ³Ð°üÉ̵ÄвƲú¡£¡£¡£¸ÃÍŻﻹÏò¸Ã¿µ½¡¿Æ¼¼¹«Ë¾µÄĸ¹«Ë¾ÁªºÏ¿µ½¡¼¯ÍÅ£¨UHG£©ÀÕË÷Á˵ڶþ±ÊÊê½ð£¬£¬£¬£¬²¢ÔÚÍøÉÏÐû²¼Á˲¿·Ö±»µÁÎļþ¡£¡£¡£ÔÚÖ§¸¶Êê½ðºó£¬£¬£¬£¬Change»ñµÃÁ˱»µÁÊý¾Ý¼¯µÄ¸±±¾£¬£¬£¬£¬ÒÔʶ±ð²¢Í¨ÖªÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£ÃÀ¹úÕþ¸®ÊÔͼץ²¶¸ÃÍŻﱳºóµÄºÚ¿Í£¬£¬£¬£¬µ«Î´ÄÜÀֳɡ£¡£¡£´Ë´Î¹¥»÷µÄÔµ¹ÊÔÓɲ¿·Ö¹é×ïÓÚÆóÒµºÏ²¢µ¼ÖµÄÔã¸âÇå¾²ÐÔ£¬£¬£¬£¬ÒÔ¼°Î´ÊܶàÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»£»¤µÄ±»µÁƾ֤±»ÍøÂç·¸·¨·Ö×ÓʹÓᣡ£¡£
https://techcrunch.com/2024/10/24/unitedhealth-change-healthcare-hacked-millions-health-records-ransomware/
5. Landmark AdminÔâÍøÂç¹¥»÷£¬£¬£¬£¬80ÓàÍòÈËÊý¾Ýй¶
10ÔÂ24ÈÕ£¬£¬£¬£¬°ü¹ÜÖÎÀíЧÀ͹«Ë¾ Landmark Admin ÖÒÑԳƣ¬£¬£¬£¬2024Äê5ÔÂÔâÊܵÄÍøÂç¹¥»÷µ¼ÖÂÊý¾Ýй¶£¬£¬£¬£¬Ó°ÏìÁËÁè¼Ý80ÍòÈË¡£¡£¡£Landmark Admin ×÷Ϊ´óÐͰü¹Ü¹«Ë¾µÄµÚÈý·½ÖÎÀí¹«Ë¾£¬£¬£¬£¬Îª¶à¼Ò°ü¹Ü¹«Ë¾Ìṩºǫ́ЧÀÍ¡£¡£¡£5ÔÂ13ÈÕ£¬£¬£¬£¬¹«Ë¾¼ì²âµ½¿ÉÒɻ²¢Á¬Ã¦¹Ø±ÕITϵͳºÍÔ¶³Ì»á¼û£¬£¬£¬£¬ÒÔ±ÜÃâ¹¥»÷À©É¢¡£¡£¡£ÓëµÚÈý·½ÍøÂçÇå¾²¹«Ë¾ÏàÖúºó£¬£¬£¬£¬·¢Ã÷¹¥»÷ʱ´úÍþвÐÐΪÕß»á¼ûÁ˰üÀ¨806,519ÈËСÎÒ˽¼ÒÐÅÏ¢µÄÎļþ£¬£¬£¬£¬Éæ¼°ÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢½ðÈÚÕË»§ºÅÂë¡¢Ò½ÁÆÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Landmark ÒÑÏò¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢ËÍ֪ͨ£¬£¬£¬£¬²¢ÌáÐÑËûÃÇ¼à¿ØÐÅÓñ¨¸æºÍÒøÐÐÕË»§¡£¡£¡£ÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬ÉÐδȷ¶¨ÕâÊÇÀÕË÷Èí¼þ¹¥»÷Õվɴ¿´âµÄÊý¾Ý͵ÇÔ£¬£¬£¬£¬Í¬Ê±Ò²Ã»ÓÐÍþвÐÐΪÕßÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/insurance-admin-landmark-says-data-breach-impacts-800-000-people/
6. ÁªºÏ¹úÐÅÍлù½ðÊý¾Ý¿âÉèÖùýʧ£¬£¬£¬£¬Ãô¸ÐÊý¾ÝÔâ´ó¹æÄ£Ð¹Â¶
10ÔÂ24ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷£¬£¬£¬£¬ÁªºÏ¹úÏû³ý±©Á¦Ë𺦸¾Å®ÐÐΪÐÅÍлù½ðµÄÒ»¸öÊý¾Ý¿â±£´æÉèÖùýʧ£¬£¬£¬£¬µ¼ÖÂÁè¼Ý115,000·ÝÃô¸ÐÎļþ±»Ð¹Â¶¡£¡£¡£ÕâЩÎļþ°üÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢²ÆÎñ¼Í¼ºÍÊܺ¦ÕßÖ¤´ÊµÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬×ÜÈÝÁ¿µÖ´ï228GB¡£¡£¡£Ð¹Â¶µÄÊý¾Ý¶ÔÒþ˽ºÍÇå¾²×é³ÉÑÏÖØÍþв£¬£¬£¬£¬¿ÉÄܻᱻÓÃÓÚÍøÂç´¹ÂÚ¹¥»÷¡¢Éí·Ý͵ÇÔ¡¢Ú²Æ¡¢ÀÕË÷µÈ¶ñÒâÄ¿µÄ¡£¡£¡£Êܺ¦Õß¡¢´ÈÉÆÊÂÇéÕߺÍÁªºÏ¹úÊÇÇéÖ°Ô±¿ÉÄܳÉΪĿµÄ£¬£¬£¬£¬ÃæÁÙÉí·ÝÐÅÏ¢±»µÁÓá¢Ú²Æ¡¢Ú²Æ»òÀÕË÷µÈΣº¦¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÆØ¹âµÄÄÚ²¿Îļþ»¹¿ÉÄÜÈ÷¸·¨·Ö×ÓÏàʶ×éÖ¯µÄÔË×÷·½·¨¡¢Òªº¦ÖÎÀíºÍ²ÆÎñ½á¹¹µÈÃô¸ÐÐÅÏ¢¡£¡£¡£ÏÖÔÚÉв»ÇåÎúËÔÚÖÎÀí¸ÃÊý¾Ý¿â£¬£¬£¬£¬ÒÔ¼°Ëü̻¶Á˶೤ʱ¼ä¡£¡£¡£µ«ÁªºÏ¹ú¸¾Å®ÊðÒѾ½ÓÄÉÁËÐж¯£¬£¬£¬£¬±£»£»£»£»¤ÁËÊý¾Ý¿â£¬£¬£¬£¬²¢Ðû²¼ÁËթƾ¯±¨£¬£¬£¬£¬Æð¾¢¼õÇáÓëÊý¾Ýй¶Ïà¹ØµÄΣº¦¡£¡£¡£ÕâÒ»ÊÂÎñ͹ÏÔÁËÇ¿ÓÐÁ¦µÄÍøÂçÇå¾²²½·¥¶Ô±£»£»£»£»¤Ãô¸ÐÊý¾ÝµÄÖ÷ÒªÐÔ¡£¡£¡£
https://hackread.com/misconfigured-un-database-gender-violence-victims-data/