Central GroupÔâÓöÐÂÊý¾Ýй¶£¬£¬ £¬£¬ £¬£¬£¬500Íò»áÔ±ÐÅϢΣÔÚ³¯Ï¦

Ðû²¼Ê±¼ä 2024-11-22

1.Central GroupÔâÓöÐÂÊý¾Ýй¶£¬£¬ £¬£¬ £¬£¬£¬500Íò»áÔ±ÐÅϢΣÔÚ³¯Ï¦


11ÔÂ20ÈÕ£¬£¬ £¬£¬ £¬£¬£¬Ì©¹ú¿ç¹úÆóÒµ¼¯ÍÅCentral Group½üÆÚÔâÓöÁËÊý¾Ýй¶ÊÂÎñ¡£¡£ ¡£¡£¡£¾ÝDataBreaches±¨¸æ£¬£¬ £¬£¬ £¬£¬£¬2021Äê10Ô£¬£¬ £¬£¬ £¬£¬£¬Central Restaurant GroupÔøÔâµ½ÃûΪDESORDENµÄÍþвÐÐΪÕß¹¥»÷¡£¡£ ¡£¡£¡£¶ø½üÆÚ£¬£¬ £¬£¬ £¬£¬£¬ÁíÒ»ÃûÍþвÐÐΪÕß0mid16BÉù³Æ£¬£¬ £¬£¬ £¬£¬£¬ÔÚ2024Äê8ÔÂÖÁ11ÔÂʱ´ú£¬£¬ £¬£¬ £¬£¬£¬Í¨¹ýCentral RetailÍøÂç̻¶µÄÊÜËðAPI¶Ëµã£¬£¬ £¬£¬ £¬£¬£¬»á¼û²¢ÇÔÈ¡ÁË5,108,826ÌõCentral Group The1 Card»áԱСÎÒ˽¼ÒÐÅÏ¢¼Í¼¡£¡£ ¡£¡£¡£The1 CardÊÇCentral GroupÆìÏÂËùÓÐÁãÊÛºÍÏûºÄÆ·ÅÆ½ÓÄɵĻáԱϵͳ£¬£¬ £¬£¬ £¬£¬£¬ÓµÓÐÁè¼Ý1700Íò»áÔ±¡£¡£ ¡£¡£¡£0mid16BÌåÏÖ£¬£¬ £¬£¬ £¬£¬£¬ÓÉÓÚÓëCentral GroupµÄ̸ÅÐʧ°Ü£¬£¬ £¬£¬ £¬£¬£¬¾öÒé³öÊÛÕâЩ»áԱСÎÒ˽¼ÒÐÅÏ¢¼Í¼£¬£¬ £¬£¬ £¬£¬£¬°üÀ¨Ãû×Ö¡¢ÐÕÊÏ¡¢»áÔ±ºÅÂë¡¢¹úÃñÉí·ÝÖ¤ºÅÂë¡¢¹ú¼Ò¡¢ÊÖ»úµç»°ºÍµç×ÓÓʼþµÈÃô¸ÐÐÅÏ¢£¬£¬ £¬£¬ £¬£¬£¬×ܾÞϸΪ582MB¡£¡£ ¡£¡£¡£¸ÃºÚ¿ÍÔÚºÚ¿ÍÂÛ̳ºÍX.comÉÏÐû²¼ÁËÊý¾ÝÁбí£¬£¬ £¬£¬ £¬£¬£¬²¢ÌṩÁËÊý¾ÝÑù±¾ºÍÑéÖ¤ÕæÊµÐÔµÄÒªÁì¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬ £¬£¬ £¬£¬£¬0mid16B»¹Ö¸ÔðÌ©¹ú¹«Ë¾²»ÖØÊÓÊý¾Ý±£» £»£»£»£»¤£¬£¬ £¬£¬ £¬£¬£¬ÓÉÓÚ²»»áÊܵ½ÈÎÄÇÀï·£¡£¡£ ¡£¡£¡£DataBreachesÔøÊµÑéÁªÏµCentral Group£¬£¬ £¬£¬ £¬£¬£¬µ«×èÖ¹·¢¸åʱÉÐδÊÕµ½»Ø¸´¡£¡£ ¡£¡£¡£


https://databreaches.net/2024/11/20/thai-loyalty-membership-card-data-of-5-million-customers-put-up-for-sale-on-hacking-forum/


2. ¡°Ghost Tap¡±£ºÍøÂç·¸·¨·Ö×ÓʹÓÃNFCÊÖÒÕÌ×ÏÖÐÂÕ½ÂÔ


11ÔÂ20ÈÕ£¬£¬ £¬£¬ £¬£¬£¬ÍøÂç·¸·¨·Ö×Ó½ÓÄÉÁËÒ»ÖÖÃûΪ¡°Ghost Tap¡±µÄÐÂÓ±Ì×ÏÖÒªÁ죬£¬ £¬£¬ £¬£¬£¬¸ÃÒªÁìʹÓñ»µÁµÄÐÅÓÿ¨ÐÅÏ¢£¬£¬ £¬£¬ £¬£¬£¬ÌØÊâÊÇÓëApple PayºÍGoogle PayµÈÒÆ¶¯Ö§¸¶ÏµÍ³Ïà¹ØµÄÊý¾Ý£¬£¬ £¬£¬ £¬£¬£¬Í¨¹ýÈ«Çò¹æÄ£Äڵġ°Ç®Â⡱ʵÏÖ²»·¨×¬Ç®¡£¡£ ¡£¡£¡£ÓëÏÈǰµÄÒÆ¶¯¶ñÒâÈí¼þÈçNGateÏà±È£¬£¬ £¬£¬ £¬£¬£¬Ghost Tap¸üΪÒþ²ØÇÒÄÑÒÔ¼ì²â£¬£¬ £¬£¬ £¬£¬£¬ÎÞÐèÊܺ¦ÕßµÄʵÌ忨»ò×°±¸£¬£¬ £¬£¬ £¬£¬£¬Ò²²»ÐèÒ»ÅþÁÚ´¥Êܺ¦Õߣ¬£¬ £¬£¬ £¬£¬£¬¶øÊÇͨ¹ýÔ¶³Ì½»»¥Íê³É¡£¡£ ¡£¡£¡£¸ÃÕ½ÂÔÊ×ÏÈÉæ¼°ÇÔȡ֧¸¶¿¨Êý¾ÝºÍÒ»´ÎÐÔÃÜÂ루OTP£©£¬£¬ £¬£¬ £¬£¬£¬Õâ¿ÉÒÔͨ¹ýÒøÐжñÒâÈí¼þ¡¢´¹ÂÚÒ³Ãæ»ò¼üÅ̼ͼµÈ·½·¨ÊµÏÖ¡£¡£ ¡£¡£¡£È»ºó£¬£¬ £¬£¬ £¬£¬£¬Ê¹ÓÃNFCGate¹¤¾ßºÍÖмÌЧÀÍÆ÷£¬£¬ £¬£¬ £¬£¬£¬½«Ö§¸¶ÐÅÏ¢·¢Ë͸øÖØ´óµÄÇ®ÂâÍøÂ磬£¬ £¬£¬ £¬£¬£¬ÕâЩǮÂâʹÓÃÆä×°±¸µÄNFCоƬÔÚ¶à¸öËùÔÚ¾ÙÐÐÁãÊÛ¹ºÖ㬣¬ £¬£¬ £¬£¬£¬´Ó¶øÑÚÊÎÁËÖ÷Òª¹¥»÷ÕßµÄ×Ù¼£¡£¡£ ¡£¡£¡£ÓÉÓÚÉúÒâ¿´ËÆÕýµ±ÇÒÊèÉ¢ÓÚ²î±ðËùÔÚ£¬£¬ £¬£¬ £¬£¬£¬½ðÈÚ»ú¹¹ÄÑÒÔ·¢Ã÷ºÍ×èÖ¹ÕâÖÖÕ½ÂÔ£¬£¬ £¬£¬ £¬£¬£¬ÓÈÆäÊǵ±Éæ¼°´ó×ÚС¶îÖ§¸¶Ê±¡£¡£ ¡£¡£¡£ÎªÁËÌÓ±Ü×·×Ù£¬£¬ £¬£¬ £¬£¬£¬Ç®ÂâÃÇ»¹»á½«×°±¸ÖÃÓÚº½ÐÐģʽ£¬£¬ £¬£¬ £¬£¬£¬µ«¼á³ÖNFCϵͳÔËÐС£¡£ ¡£¡£¡£ÎªÁËÌá·À¡°Ghost Tap¡±£¬£¬ £¬£¬ £¬£¬£¬ÒøÐÐÐèÒª±ê¼ÇʹÓÃͳһÕÅ¿¨ÔÚ²î±ðËùÔÚ¾ÙÐеķÇÏÖʵ¿É´ïµÄÉúÒ⣬£¬ £¬£¬ £¬£¬£¬¶øÏûºÄÕßÔòÐè¼à¿ØÚ²Æ­ÉúÒâ²¢Á¬Ã¦ÏòÒøÐб¨¸æ¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-ghost-tap-attack-abuses-nfc-mobile-payments-to-steal-money/


3. Ubuntu Server needrestart°üÆØ³öÊ®ÄêÂõÎó²î£¬£¬ £¬£¬ £¬£¬£¬ÔÊÐíÍâµØÌáȨ


11ÔÂ20ÈÕ£¬£¬ £¬£¬ £¬£¬£¬Ubuntu Server×Ô21.04°æÆðĬÈÏ×°ÖõÄneedrestart°üÖб£´æ¶à¸öÒÑÓÐÊ®ÄêÀúÊ·µÄÇå¾²Îó²î£¬£¬ £¬£¬ £¬£¬£¬ÕâЩÎó²î¿ÉÄÜʹÍâµØ¹¥»÷ÕßÎÞÐèÓû§½»»¥¼´¿É»ñµÃrootȨÏÞ¡£¡£ ¡£¡£¡£QualysÍþвÑо¿²¿·ÖÓÚÉÏÔ·¢Ã÷²¢±¨¸æÁËÕâЩÎó²î£¬£¬ £¬£¬ £¬£¬£¬Ö¸³öËüÃǼ«Ò×±»Ê¹Ó㬣¬ £¬£¬ £¬£¬£¬Óû§ÐèѸËÙÐж¯ÐÞ¸´¡£¡£ ¡£¡£¡£Îó²î×Ô2014Äê4ÔÂ27ÈÕneedrestart 0.8°æÒýÈëÚ¹ÊÍÆ÷Ö§³ÖºóÒ»Ö±±£´æ£¬£¬ £¬£¬ £¬£¬£¬Ó°ÏìDebian¡¢UbuntuµÈLinux¿¯Ðаæ¡£¡£ ¡£¡£¡£NeedrestartÊÇÒ»¸öÓÃÓÚɨÃèϵͳÒÔÈ·¶¨ÔÚ¹²Ïí¿â¸üкóÐèÖØÆôµÄЧÀÍ£¬£¬ £¬£¬ £¬£¬£¬ÒÔ×èֹϵͳÖÜÈ«ÖØÆôµÄÊÊÓóÌÐò¡£¡£ ¡£¡£¡£Ëü¼¯³Éµ½Ð§ÀÍÆ÷Ó³ÏñÖУ¬£¬ £¬£¬ £¬£¬£¬ÔÚAPT²Ù×÷ºó×Ô¶¯ÔËÐУ¬£¬ £¬£¬ £¬£¬£¬Ê¶±ðÒªº¦¿â¸üкóÐèÖØÆôµÄЧÀÍ£¬£¬ £¬£¬ £¬£¬£¬È·±£Ð§ÀÍʹÓÃ×îÐÂ¿â°æ±¾£¬£¬ £¬£¬ £¬£¬£¬Ìá¸ßÕý³£ÔËÐÐʱ¼äºÍÐÔÄÜ¡£¡£ ¡£¡£¡£Qualys·¢Ã÷µÄÎå¸öÎó²î°üÀ¨Í¨¹ýÓÕÆ­needrestartʹÓù¥»÷Õß¿ØÖƵÄPYTHONPATH»òRUBYLIBÇéÐαäÁ¿ÔËÐÐÚ¹ÊÍÆ÷£¬£¬ £¬£¬ £¬£¬£¬»òÒÔrootÉí·ÝÖ´ÐÐí§ÒâshellÏÂÁî¡£¡£ ¡£¡£¡£UbuntuÖ¸³öÒÑÔÚ3.8°æÖнâ¾öÕâЩÎÊÌ⣬£¬ £¬£¬ £¬£¬£¬²¢½¨ÒéÓû§ÏÂÔØ×îв¹¶¡£¬£¬ £¬£¬ £¬£¬£¬»ò½ûÓÃÚ¹ÊÍÆ÷ɨÃèÆ÷×÷ΪÔÝʱ»º½â²½·¥¡£¡£ ¡£¡£¡£


https://thehackernews.com/2024/11/decades-old-security-vulnerabilities.html


4. Ä«Î÷¸çÕþ¸®Ö´·¨ÊÂÎñ°ì¹«ÊÒÔâRansomhubÀÕË÷Èí¼þ¹¥»÷


11ÔÂ21ÈÕ£¬£¬ £¬£¬ £¬£¬£¬Ëæ×ÅÍøÂçÇå¾²ÍþвµÄÒ»Ö±¼Ó¾ç£¬£¬ £¬£¬ £¬£¬£¬Ä«Î÷¸ç×Üͳ¿ËÀÍµÏæ«¡¤ÐÁ±«Ä·Ö¤Êµ£¬£¬ £¬£¬ £¬£¬£¬Õþ¸®ÕýÔÚÊÓ²ìÒ»ÆðÕë¶ÔÆäÖ´·¨ÊÂÎñ°ì¹«ÊÒµÄÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ¡£¡£ ¡£¡£¡£¾Ý³Æ£¬£¬ £¬£¬ £¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïRansomhub¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬ £¬£¬ £¬£¬£¬²¢ÒÑÐû²¼Õþ¸®Êý¾Ý¿âÖеÄСÎÒ˽¼ÒÐÅÏ¢Ñù±¾£¬£¬ £¬£¬ £¬£¬£¬Éù³ÆÇÔÈ¡ÁË313 GBµÄÊý¾Ý£¬£¬ £¬£¬ £¬£¬£¬°üÀ¨ÌõÔ¼¡¢°ü¹ÜºÍ²ÆÎñÎļþµÈ¡£¡£ ¡£¡£¡£RansomhubÔÚÆäйÃÜÍøÕ¾ÉÏÐû²¼Á˱»µÁÎļþÑù±¾£¬£¬ £¬£¬ £¬£¬£¬ÕâЩÎļþËÆºõÀ´×ÔÕþ¸®¹ÍÔ±Êý¾Ý¿â¡£¡£ ¡£¡£¡£´Ë´ÎÊÂÎñ²¢·ÇÄ«Î÷¸ç×Üͳ°ì¹«ÊÒÊ×´ÎÔâÓöÉæ¼°Ãô¸ÐÐÅÏ¢µÄºÚ¿Í¹¥»÷£¬£¬ £¬£¬ £¬£¬£¬½ñÄê1Ô¾ÍÔø±¬·¢263Ãû±¨µÀ×Üͳ»î¶¯µÄ¼ÇÕßµÄСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶µÄÊÂÎñ¡£¡£ ¡£¡£¡£RansomHubÊÇÒ»¸öÏà¶Ô½ÏеÄÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©×éÖ¯£¬£¬ £¬£¬ £¬£¬£¬ÒòÆä¼¤½øÕ½ÂԺͶÔÒªº¦»ù´¡ÉèÊ©µÄ¹Ø×¢¶øÉùÃûÉ¢ÂÒ£¬£¬ £¬£¬ £¬£¬£¬±»ÒÔΪÊÇKnightÀÕË÷Èí¼þµÄ¸Ä°æ£¬£¬ £¬£¬ £¬£¬£¬¸Ã¶ñÒâÈí¼þÕë¶Ô¶à¸öƽ̨£¬£¬ £¬£¬ £¬£¬£¬²¢½ÓÄÉÁËË«ÖØÀÕË÷Ä£×Ó¡£¡£ ¡£¡£¡£


https://securityaffairs.com/171257/data-breach/mexico-suffers-ransomware-attack.html


5. ΢ÈíÖØÈ­¹¥»÷ONNXÍøÂç´¹ÂÚЧÀÍ£¬£¬ £¬£¬ £¬£¬£¬²é·â240¸öÓòÃû


11ÔÂ21ÈÕ£¬£¬ £¬£¬ £¬£¬£¬×Ô2017ÄêÆð£¬£¬ £¬£¬ £¬£¬£¬Î¢ÈíÒѲé·âONNX£¨Ò»¸öÍøÂç´¹ÂÚ¼´Ð§ÀÍÆ½Ì¨£©¿Í»§Ê¹ÓõÄ240¸öÓòÃû£¬£¬ £¬£¬ £¬£¬£¬ÕâЩÓòÃû±»ÓÃÓÚÕë¶ÔÈ«Çò¹«Ë¾¼°Ð¡ÎÒ˽¼Ò¡£¡£ ¡£¡£¡£¾Ý΢Èí¡¶2024ÄêÊý×Ö·ÀÓù±¨¸æ¡·£¬£¬ £¬£¬ £¬£¬£¬ONNX£¨ÓÖ³ÆCaffeineºÍFUHRER£©ÊÇ2024ÄêÉϰëÄê×î´óµÄÖÐÐÄÈËÍøÂç´¹ÂÚЧÀÍ£¬£¬ £¬£¬ £¬£¬£¬Ã¿Ô·¢ËÍÊýÍòÍòÖÁÊýÒÚ·â´¹ÂÚÓʼþ£¬£¬ £¬£¬ £¬£¬£¬Ö÷ÒªÃé×¼Microsoft 365ÕÊ»§¼°ÆäËû¿Æ¼¼¹«Ë¾¿Í»§¡£¡£ ¡£¡£¡£ONNXͨ¹ýTelegramÍÆ¹ãÏúÊÛ´¹ÂÚ¹¤¾ß°ü£¬£¬ £¬£¬ £¬£¬£¬Ìṩ¶àÖÖ¶©ÔÄģʽ£¬£¬ £¬£¬ £¬£¬£¬²¢½ÓÄɶþάÂë´¹ÂÚµÈÊֶΡ£¡£ ¡£¡£¡£ÕâЩ¹¥»÷ÄÑÒÔͨ¹ýµä·¶¶Ëµã¼ì²â¼à¿Ø£¬£¬ £¬£¬ £¬£¬£¬¶ÔÍøÂçÇå¾²ÌṩÉÌ×é³ÉÌôÕ½¡£¡£ ¡£¡£¡£ÔÚDark AtlasÇå¾²Ñо¿Ö°Ô±Åû¶ÆäËùÓÐÕßAbanoub Nady£¨ÍøÃûMRxC0DER£©Éí·Ýºó£¬£¬ £¬£¬ £¬£¬£¬ONNXÔËÓªÓÚ6ÔÂ×èÖ¹¡£¡£ ¡£¡£¡£Î¢Èíͨ¹ýÃñÊ·¨Í¥ÏÂÁ¶ñÒâÊÖÒÕ»ù´¡ÉèÊ©ÖØ¶¨ÏòÖÁ×ÔÉíЧÀÍÆ÷£¬£¬ £¬£¬ £¬£¬£¬ÇжÏÍþвÐÐΪÕß»á¼ûȨÏÞ£¬£¬ £¬£¬ £¬£¬£¬²¢ÓÀÊÀ×èÖ¹ÕâЩÓòÃûÓÃÓÚδÀ´´¹ÂÚ¹¥»÷¡£¡£ ¡£¡£¡£Î¢Èí»¹ÓëLF ProjectsÏàÖú£¬£¬ £¬£¬ £¬£¬£¬¸Ã¹«Ë¾ÊÇONNXÃû³ÆºÍ»Õ±êµÄÕýµ±ËùÓÐÕß¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-disrupts-onnx-phishing-as-a-service-infrastructure/


6. È«Çò¹¤Òµ¿ØÖÆÏµÍ³£¨ICS£©»¥ÁªÍøÌ»Â¶ÇéÐÎÑÏËà


11ÔÂ21ÈÕ£¬£¬ £¬£¬ £¬£¬£¬ÐµÄÑо¿ÏÔʾ£¬£¬ £¬£¬ £¬£¬£¬È«Çò175¸ö¹ú¼Ò/µØÇø±£´æÁè¼Ý145,000¸ö̻¶ÔÚ»¥ÁªÍøÉϵĹ¤Òµ¿ØÖÆÏµÍ³£¨ICS£©£¬£¬ £¬£¬ £¬£¬£¬ÆäÖÐÃÀ¹úÕ¼±ÈÁè¼ÝÈý·ÖÖ®Ò»¡£¡£ ¡£¡£¡£ÕâЩICSЧÀÍ̻¶Ö÷ÒªÔ´ÓÚ³£ÓõÄICSЭÒ飬£¬ £¬£¬ £¬£¬£¬ÈçModbus¡¢IEC 60870-5-104µÈ£¬£¬ £¬£¬ £¬£¬£¬ÇÒµØÇø¼ä±£´æ²î±ð¡£¡£ ¡£¡£¡£ÀýÈ磬£¬ £¬£¬ £¬£¬£¬Modbus¡¢S7ºÍIEC 60870-5-104ÔÚÅ·ÖÞ¸ü³£¼û£¬£¬ £¬£¬ £¬£¬£¬¶øFox¡¢BACnetµÈÔÚ±±ÃÀ¸ü³£¼û¡£¡£ ¡£¡£¡£Censys¹«Ë¾µÄÆÊÎöÖ¸³ö£¬£¬ £¬£¬ £¬£¬£¬Ðí¶àICSЭÒé¿É×·ËÝÖÁ20ÊÀ¼Í70ÄêÔ£¬£¬ £¬£¬ £¬£¬£¬µ«²¢Î´ÊµÏÖÓëÆäËûµØÇøÏàͬµÄÇ徲ˢС£¡£ ¡£¡£¡£Ö»¹ÜרÃÅÕë¶ÔICSϵͳµÄÍøÂç¹¥»÷Ïà¶Ô½ÏÉÙ£¬£¬ £¬£¬ £¬£¬£¬µ«½üÄêÀ´ÓÐËùÔöÌí£¬£¬ £¬£¬ £¬£¬£¬ÌØÊâÊÇÔÚ¶íÎÚÕ½Õùºó¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬ £¬£¬ £¬£¬£¬HMIÒ²Ô½À´Ô½¶àµØÍ¨¹ý»¥ÁªÍøÌṩÒÔÖ§³ÖÔ¶³Ì»á¼û£¬£¬ £¬£¬ £¬£¬£¬ÇÒ´ó´ó¶¼Ì»Â¶µÄHMIλÓÚÃÀ¹ú¡£¡£ ¡£¡£¡£Censys»¹Ö¸³ö£¬£¬ £¬£¬ £¬£¬£¬ÓÃÓÚ¼à¿ØºÍÓëICSϵͳ½»»¥µÄHMIºÍICSЧÀÍ´ó¶àλÓÚÒÆ¶¯»òÉÌÒµ¼¶»¥ÁªÍøÐ§ÀÍÌṩÉÌÉÏ£¬£¬ £¬£¬ £¬£¬£¬ÕâÔöÌíÁËʶ±ðºÍ֪ͨËùÓÐÕßµÄÄѶÈ¡£¡£ ¡£¡£¡£Òò´Ë£¬£¬ £¬£¬ £¬£¬£¬×éÖ¯±ØÐè½ÓÄɲ½·¥Ê¶±ðºÍ±£» £»£»£»£»¤Ì»Â¶µÄOTºÍICS×°±¸£¬£¬ £¬£¬ £¬£¬£¬¸üÐÂĬÈÏÆ¾Ö¤£¬£¬ £¬£¬ £¬£¬£¬²¢¼à¿ØÍøÂçÊÇ·ñ±£´æ¶ñÒâ»î¶¯¡£¡£ ¡£¡£¡£


https://thehackernews.com/2024/11/over-145000-industrial-control-systems.html