MUT-1244ÍþвÐÐΪÕß´ó¹æÄ£ÇÔÈ¡WordPressƾ֤¼°Ãô¸ÐÐÅÏ¢
Ðû²¼Ê±¼ä 2024-12-171. MUT-1244ÍþвÐÐΪÕß´ó¹æÄ£ÇÔÈ¡WordPressƾ֤¼°Ãô¸ÐÐÅÏ¢
12ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃûΪMUT-1244µÄÍþвÐÐΪÕßÔÚÒ»³¡³¤´ïÒ»ÄêµÄ´ó¹æÄ£»£»£»£»î¶¯ÖУ¬£¬£¬£¬£¬£¬£¬Í¨¹ýľÂí²¡¶¾Ñ¬È¾µÄWordPressƾ֤¼ì²éÆ÷ÇÔÈ¡ÁËÁè¼Ý390,000¸öWordPressƾ֤¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬¸ÃÐÐΪÕß»¹´ÓÊý°ÙÃûÊܺ¦Õߣ¨°üÀ¨ºì¶Ó³ÉÔ±¡¢ÉøÍ¸²âÊÔÖ°Ô±¡¢Çå¾²Ñо¿Ö°Ô±ÒÔ¼°¶ñÒâÐÐΪÕߣ©µÄÊÜѬȾϵͳÖÐ͵ȡÁËSSH˽ԿºÍAWS»á¼ûÃÜÔ¿¡£¡£¡£¹¥»÷ÕßʹÓñ»Ä¾Âí»¯µÄGitHub´æ´¢¿âÍÆËͶñÒâ¿´·¨ÑéÖ¤Îó²îºÍ¾ÙÐÐÍøÂç´¹Âڻ£¬£¬£¬£¬£¬£¬£¬ÓÕÆÄ¿µÄ×°ÖÃαװ³ÉCPU΢Âë¸üеļÙÄÚºËÉý¼¶¡£¡£¡£ÕâЩ´æ´¢¿âÔöÌíÁËÆäÕýµ±ÐÔ£¬£¬£¬£¬£¬£¬£¬Ê¹µÃÇ徲רҵְԱºÍÍþвÐÐΪÕ߸üÈÝÒ×ÔËÐÐËüÃÇ¡£¡£¡£¹¥»÷Õßͨ¹ýGitHub reposÒÔ¶àÖÖ·½·¨Í¶·ÅÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬£¬°üÀ¨´øÓкóÃŵÄÉèÖñàÒëÎļþ¡¢¶ñÒâPDFÎļþ¡¢PythonͶ·ÅÆ÷ÒÔ¼°¶ñÒânpm°ü¡£¡£¡£´Ë´Î¹¥»÷»î¶¯ÓëÁíÒ»´Î³¤´ïÒ»ÄêµÄ¹©Ó¦Á´¹¥»÷ÓÐÖØµþ£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÉæ¼°ÇÔÈ¡Êý¾ÝºÍÍÚ¾òÃÅÂÞ±Ò¼ÓÃÜÇ®±Ò¡£¡£¡£MUT-1244Äܹ»»á¼û²¢Ð¹Â¶Ë½ÈËSSHÃÜÔ¿¡¢AWSƾ֤µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÍøÂçÇå¾²ÉçÇøÄÚµÄÐÅÈΣ¬£¬£¬£¬£¬£¬£¬ÔÚÄ¿µÄ²»ÖªÇéµÄÇéÐÎÏÂÖ´ÐжñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÈëÇÖÁËÊýʮ̨»úе¡£¡£¡£
https://www.bleepingcomputer.com/news/security/390-000-wordpress-accounts-stolen-from-hackers-in-supply-chain-attack/
2. CISA½«CleoÎó²îCVE-2024-50623Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖÐ
12ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Ó°ÏìCleo²úÆ·µÄÎó²îCVE-2024-50623£¨CVSSÆÀ·Ö8.8£©ÁÐÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£Cleo¹«Ë¾·¢Ã÷ÁËÒ»¸ö²»ÊÜÏÞÖÆµÄÎļþÉÏ´«ºÍÏÂÔØÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬£¬²¢½¨Òé¿Í»§Á¬Ã¦½«Harmony¡¢VLTraderºÍLexiComʵÀýÉý¼¶µ½×îв¹¶¡°æ±¾5.8.0.21ÒÔ½â¾öDZÔÚ¹¥»÷ǰÑÔ¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬Çå¾²¹«Ë¾Huntress±¨¸æ³Æ£¬£¬£¬£¬£¬£¬£¬×ÝÈ»×°ÖÃÁ˸ò¹¶¡£¬£¬£¬£¬£¬£¬£¬ÔËÐÐ5.8.0.21µÄϵͳÈÔ¿ÉÄܱ»Ê¹Óᣡ£¡£Huntress·¢Ã÷ÁËÕë¶ÔCleoÎļþ´«ÊäÈí¼þµÄ×Ô¶¯¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢¹ûÕæÁËÉæ¼°ÈýÖÖCleo²úÆ·µÄÒ»Á¬¹¥»÷¡£¡£¡£Ê×ϯÇå¾²Ñо¿Ô±Caleb Stewart¿ª·¢ÁËʹÓÃí§ÒâÎļþдÈëÎó²îµÄPython¾ç±¾£¬£¬£¬£¬£¬£¬£¬²¢Ö¤ÊµÁËÎó²îµÄÓÐÓÃÐÔ¡£¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê1ÔÂ3ÈÕ֮ǰÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬£¬£¬×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»¤ÍøÂçÃâÊܹ¥»÷¡£¡£¡£
https://securityaffairs.com/171973/security/u-s-cisa-adds-cleo-harmony-vltrader-and-lexicom-flaw-to-its-known-exploited-vulnerabilities-catalog.html
3. ConnectOnCallÔ¶³ÌÒ½ÁÆÆ½Ì¨ÔâÖØ´óÊý¾Ýй¶
12ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ConnectOnCallÊÇÒ»¸öרעÓÚÔöǿҽÁÆÐ§ÀÍÌṩÕßÓ뻼ÕßÏàͬµÄÔ¶³ÌÒ½ÁÆÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬¿ËÈÕÅû¶ÁËÒ»ÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁè¼Ý900,000È˵ÄСÎÒ˽¼ÒÐÅÏ¢¼°Ò½ÁÆÐÅÏ¢Çå¾²¡£¡£¡£¸Ãƽ̨Ìṩ×Ô¶¯»¼Õߺô½Ð¸ú×Ù¡¢HIPAAºÏ¹æÌ¸Ì칦Ч£¬£¬£¬£¬£¬£¬£¬²¢Óëµç×Ó¿µ½¡¼Í¼ϵͳ¼¯³É¡£¡£¡£5ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬ConnectOnCall·¢Ã÷Çå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬¾ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬£¬£¬£¬2024Äê2ÔÂ16ÈÕÖÁ5ÔÂ12ÈÕʱ´ú£¬£¬£¬£¬£¬£¬£¬ÓÐδ֪µÚÈý·½»á¼ûÁËÆ½Ì¨¼°Ó¦ÓóÌÐòÄڵIJ¿·ÖÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ò½»¼Í¨Ñ¶ÐÅÏ¢¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬£¬£¬£¬¹«Ë¾Ñ¸ËÙÔ¼ÇëÍøÂçÇ徲ר¼Ò£¬£¬£¬£¬£¬£¬£¬ÏÂÏß²úÆ·£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÇå¾²ÇéÐÎÖоÙÐÐÊý¾Ý»Ö¸´£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Í¨ÖªÁËÁª°îÖ´·¨²¿·Ö¡£¡£¡£Ð¹Â¶ÐÅÏ¢¿ÉÄܰüÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅ¡¢Ò½ÁƼͼºÅ¼°¿µ½¡×´Ì¬µÈ¡£¡£¡£Ö»¹ÜÏÖÔÚδ·¢Ã÷ÐÅÏ¢ÀÄÓûò»¼ÕßÊܺ¦ÇéÐΣ¬£¬£¬£¬£¬£¬£¬ConnectOnCallÈÔ½¨ÒéÊÜÓ°ÏìСÎÒ˽¼Ò¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬£¬²¢±¨¸æ¿ÉÒÉÉí·Ý͵ÇÔ»òÚ²ÆÐÐΪ¡£¡£¡£¹«Ë¾ÒÑÏòÖ´·¨²¿·Ö±¨¸æ²¢Í¨ÖªÊÜÓ°ÏìСÎÒ˽¼Ò£¬£¬£¬£¬£¬£¬£¬ÎªÆäÖÐÓÐÏÞÊýÄ¿µÄÉç»áÇå¾²ºÅÂëÊÜÓ°ÏìÕßÌṩÉí·ÝºÍÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÓʼÄ֪ͨÐŵķ½·¨¼û¸æÏà¹ØÇéÐΡ£¡£¡£
https://securityaffairs.com/172053/data-breach/connectoncall-data-breach-impacted-over-900000-individuals.html
4. µÂ¿ËÈøË¹Àí¹¤´óѧ¿µ½¡¿ÆÑ§ÖÐÐÄÔâÍøÂç¹¥»÷
12ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬µÂ¿ËÈøË¹Àí¹¤´óѧ¿µ½¡¿ÆÑ§ÖÐÐļ°Æä°£¶ûÅÁË÷·ÖУ½üÆÚÔâÊÜÁËÒ»´ÎÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÅÌËã»úϵͳºÍÓ¦ÓóÌÐòÖÐÖ¹£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÄÜй¶ÁË140ÍòÃû»¼ÕßµÄÃô¸ÐÊý¾Ý¡£¡£¡£¸Ã»ú¹¹ÊÇÒ»¼Ò¹«¹²Ñ§ÊõÒ½ÁÆ»ú¹¹£¬£¬£¬£¬£¬£¬£¬ÈÏÕæ½ÌÓý¡¢ÅàѵºÍ»¼ÕßÕչ˻¤Ê¿Ð§ÀÍ¡£¡£¡£¹¥»÷µ¼ÖÂ2024Äê9ÔÂ17ÈÕÖÁ9ÔÂ29ÈÕʱ´ú´Ó¸Ã»ú¹¹ÍøÂçÖлá¼û»òɾ³ýÁËijЩÎļþºÍÎļþ¼Ð¡£¡£¡£¿£¿£¿£¿£¿ÉÄÜй¶¸øºÚ¿ÍµÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢Õþ¸®Éí·ÝÖ¤ºÅÂë¡¢²ÆÎñÕË»§ÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Ò½ÁÆÐÅÏ¢¡¢Õ˵¥/Ë÷ÅâÊý¾Ý¡¢Õï¶ÏºÍÖÎÁÆÐÅÏ¢µÈ¡£¡£¡£¸Ã»ú¹¹ÒÑ֪ͨÊÜÓ°ÏìµÄÈË£¬£¬£¬£¬£¬£¬£¬²¢ÎªËûÃÇÌṩÃâ·ÑµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£½¨ÒéÊÜÓ°ÏìµÄСÎÒ˽¼Ò¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬£¬Ìá·ÀDZÔÚµÄÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢¼à¿ØËûÃǵÄÐÅÓñ¨¸æºÍ¿µ½¡°ü¹ÜÕ˵¥¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÓÉÃûΪInterlockµÄÀÕË÷Èí¼þ×éÖ¯ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬¸Ã×é֯й¶ÁË210Íò¸öÎļþ£¬£¬£¬£¬£¬£¬£¬×ܼÆ2.6TBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬¾Ý³ÆÊǴӸûú¹¹ÇÔÈ¡µÄ¡£¡£¡£InterlockË÷ÒªµÄÊê½ð½ð¶î´ÓÊýÊ®ÍòÃÀÔªµ½Êý°ÙÍòÃÀÔª²»µÈ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/texas-tech-university-system-data-breach-impacts-14-million-patients/
5. ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯Èö²¥Lumma StealerÐÅÏ¢ÇÔÈ¡Èí¼þ
12ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÏîÃûΪ¡°DeceptionAds¡±µÄ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯ÕýÔÚʹÓÃMonetag¹ã¸æÍøÂçÈö²¥Lumma StealerÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¸Ã»î¶¯Í¨¹ýÐéαµÄCAPTCHAÑéÖ¤Ò³ÃæÓÕÆÓû§ÔËÐжñÒâPowerShellÏÂÁ£¬£¬£¬£¬£¬£¬´Ó¶øÑ¬È¾¶ñÒâÈí¼þ¡£¡£¡£Guardio LabsºÍInfobloxµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÕâÒ»²Ù×÷ÓÉÃûΪ¡°Vane Viper¡±µÄÍþвÐÐΪÕßʵÑ飬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÕýµ±¹ã¸æÍøÂçÉϵĴó¹æÄ£¹ã¸æ½«Óû§´øµ½ÐéαµÄCAPTCHAÒ³Ãæ¡£¡£¡£CAPTCHAÒ³Ãæ°üÀ¨JavaScript´úÂ룬£¬£¬£¬£¬£¬£¬½«¶ñÒâPowerShellÏÂÁî¸´ÖÆµ½Óû§¼ôÌù°å£¬£¬£¬£¬£¬£¬£¬²¢ÓÕµ¼Óû§Ö´ÐС£¡£¡£Lumma Stealer¿É´Óä¯ÀÀÆ÷ÖÐÇÔÈ¡cookie¡¢Æ¾Ö¤¡¢ÃÜÂë¡¢ÐÅÓÿ¨ºÍä¯ÀÀÀúÊ·¼Í¼£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°¼ÓÃÜÇ®±ÒÇ®°ü¡¢Ë½Ô¿ºÍÃô¸ÐÎı¾Îļþ¡£¡£¡£GuardioLabsÒÑÏòMonetagºÍBeMob±¨¸æ´ËÀÄÓÃÐÐΪ£¬£¬£¬£¬£¬£¬£¬²¢»ñµÃʵʱÏìÓ¦¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯ÔÚ12Ô·ºÆðËÕÐÑ£¬£¬£¬£¬£¬£¬£¬Åú×¢ÍþвÐÐΪÕßÊÔͼͨ¹ý²î±ð¹ã¸æÍøÂç»Ö¸´ÔËÓª¡£¡£¡£Óû§Ó¦×èÖ¹Ö´ÐÐÍøÕ¾ÌáÐѵÄÏÂÁ£¬£¬£¬£¬£¬£¬ÌØÊâÊÇÄÇЩð³äÐÞ¸´»òÑéÖ¤ÂëµÄÏÂÁ£¬£¬£¬£¬£¬£¬²¢ÉóÉ÷ʹÓõÁ°æÈí¼þ»ò²»·¨Á÷ýÌåÍøÕ¾¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-ads-push-lumma-infostealer-via-fake-captcha-pages/
6. Â޵µºÖÝRIBridgesϵͳÔâBrain CipherÀÕË÷Èí¼þ¹¥»÷
12ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬Â޵µºÖÝÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬ÆäÓɵÂÇÚÖÎÀíµÄRIBridgesϵͳÔâÊÜÁËBrain CipherÀÕË÷Èí¼þÍÅ»ïµÄÈëÇÖ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬Ì»Â¶ÁËסÃñµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£RIBridgesÊǸÃÖÝÓÃÓÚÖÎÀíºÍÌṩ¹«¹²Ô®ÖúÍýÏëµÄÏÖ´ú×ÛºÏ×ʸñϵͳ¡£¡£¡£´Ë´ÎÊÂÎñÓÚ2024Äê12ÔÂ5ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬µÂÇÚÆÀ¹ÀºóÒÔΪºÚ¿Í¿ÉÄÜÇÔÈ¡Á˰üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢ºÍÆäËûÊý¾ÝµÄÎļþ¡£¡£¡£ÊÜÓ°ÏìµÄÏîÄ¿°üÀ¨Ò½ÁƽòÌù¡¢Ôö²¹ÓªÑøÔ®ÖúÍýÏ롢ƶÀ§¼ÒÍ¥ÔÝʱԮÖúµÈ¶à¸ö¹«¹²Ð§ÀÍÏîÄ¿¡£¡£¡£Ö»¹Üй¶µÄÊý¾ÝÈÔÔÚÆÀ¹ÀÖУ¬£¬£¬£¬£¬£¬£¬µ«¿ÉÄܰüÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂëºÍÄ³Ð©ÒøÐÐÐÅÏ¢¡£¡£¡£ÊÜÓ°ÏìµÄ¼ÒÍ¥½«Í¨¹ýÓʼþÊÕµ½Í¨Öª£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÖµçרÓúô½ÐÖÐÐÄ×·ÇóÖ§³Ö¡£¡£¡£Â޵µºÖÝÕþ¸®½¨ÒéסÃñÖØÖÃÃÜÂë¡¢ÉèÖÃڲƾ¯±¨ºÍÐÅÓö³½á£¬£¬£¬£¬£¬£¬£¬²¢Æô¶¯ÒøÐÐÌṩµÄÇå¾²²½·¥¡£¡£¡£µÂÇÚ½²»°ÈËÈ·ÈÏ£¬£¬£¬£¬£¬£¬£¬Â޵µºÖݵÄϵͳÊÇÊܵ½Brain CipherÊý¾Ýй¶ӰÏìµÄ¡°¼òµ¥¿Í»§¶Ëϵͳ¡±£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖ½«Óë¿Í»§ºÍÖ´·¨¹ÙÔ±ÏàÖúÕö¿ªÊӲ졣¡£¡£
https://www.bleepingcomputer.com/news/security/rhode-island-confirms-data-breach-after-brain-cipher-ransomware-attack/