ÃÀ¹úÊ·ÉÏ×î´óÒ½ÁÆÊý¾Ýй¶ÊÂÎñ£ºChange HealthcareÔâÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2025-02-06

1. ÃÀ¹úÊ·ÉÏ×î´óÒ½ÁÆÊý¾Ýй¶ÊÂÎñ£ºChange HealthcareÔâÀÕË÷Èí¼þ¹¥»÷


1ÔÂ25ÈÕ£¬£¬ £¬£¬£¬£¬£¬ÁªºÏ¿µ½¡¼¯ÍÅ×Ó¹«Ë¾Change HealthcareÔÚ2024Äê2ÔÂÔâÊÜÁËÀÕË÷Èí¼þ×éÖ¯ALPHV£¨ÓÖÃûBlack Cat£©µÄ¹¥»÷£¬£¬ £¬£¬£¬£¬£¬µ¼ÖÂÔ¼1.9ÒÚÃÀ¹úÈ˵ÄÃô¸ÐÒ½ÁÆÊý¾Ýй¶£¬£¬ £¬£¬£¬£¬£¬³ÉΪÃÀ¹úÀúÊ·ÉÏ×î´óµÄÒ½ÁÆÊý¾Ýй¶ÊÂÎñ¡£ ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÁËȱ·¦¶àÒòËØÉí·ÝÑéÖ¤µÄÊÜѬȾÕÊ»§ºÍCitrixÔ¶³Ì»á¼ûÈí¼þÉϵÄÊÜѬȾƾ֤£¬£¬ £¬£¬£¬£¬£¬Ôì³ÉÁË8.72ÒÚÃÀÔªµÄ²ÆÎñËðʧºÍ6TBµÄÊý¾Ýй¶¡£ ¡£¡£¡£¡£¡£¡£Ö»¹ÜºÚ¿Í½üÒ»ÄêÀ´Ò»Ö±ÔÚ»á¼û±»µÁÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬µ«UnitedHealthÉù³ÆÃ»ÓÐÖ¤¾ÝÅú×¢Êý¾Ý±»ÀÄÓᣠ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬£¬£¬´Ë´ÎÈëÇÖ̻¶Á˰üÀ¨¿µ½¡°ü¹ÜÏêϸÐÅÏ¢¡¢»¼ÕßÕï¶Ï¡¢²âÊÔЧ¹ûºÍÖÎÁÆÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÒ½ÁƼͼ£¬£¬ £¬£¬£¬£¬£¬ÒÔ¼°Ð¡ÎÒ˽¼ÒÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕºÅÂëµÈÃô¸ÐÊý¾Ý¡£ ¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾Ö§¸¶ÁË2200ÍòÃÀÔªµÄÊê½ð£¬£¬ £¬£¬£¬£¬£¬µ«BlackCatÓÕÆ­ÁËʵÑé´Ë´Î¹¥»÷µÄ¹ØÁª¹«Ë¾²¢Æ­È¡ÁËÊê½ð£¬£¬ £¬£¬£¬£¬£¬µ¼Ö±»µÁÊý¾ÝÂäÈëÍøÂç·¸·¨·Ö×ÓÊÖÖС£ ¡£¡£¡£¡£¡£¡£´Ë´ÎйÃÜÊÂÎñ²»µ«Ö±½ÓÇÔÈ¡Êý¾Ý£¬£¬ £¬£¬£¬£¬£¬»¹ÈÅÂÒÁËÌìϵÄÒ½ÁÆÐ§ÀÍ£¬£¬ £¬£¬£¬£¬£¬¸øÔËÓª´øÀ´ÁËÖØ´óÌôÕ½£¬£¬ £¬£¬£¬£¬£¬Òý·¢ÁËÈËÃǶԻ¼ÕßÒþ˽ºÍÊý¾ÝÇå¾²µÄµ£ÐÄ¡£ ¡£¡£¡£¡£¡£¡£ÎªÁË×ñÊØHIPAA£¬£¬ £¬£¬£¬£¬£¬ÁªºÏ¿µ½¡¼¯ÍÅÒÑÏòÊÜÓ°Ïì×îÑÏÖØµÄСÎÒ˽¼Òת´ïÁ˴˴ι¥»÷ÊÂÎñ¡£ ¡£¡£¡£¡£¡£¡£


https://hackread.com/unitedhealth-groups-data-breach-impacts-americans/


2. TalkTalkÊý¾Ýй¶ÊÂÎñ£ºÍþвÕßÉù³ÆÇÔÈ¡1880ÍòÓû§Êý¾Ý


1ÔÂ27ÈÕ£¬£¬ £¬£¬£¬£¬£¬Ó¢¹úµçÐŹ«Ë¾TalkTalkÔâÓöÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬Ò»Ãû×Ô³ÆÎª¡°b0nd¡±µÄÍþвÐÐΪÕßÔÚÍøÂç·¸·¨ÂÛ̳ÉÏÐû²¼¶Ô´Ë´ÎºÚ¿Í¹¥»÷ÈÏÕæ£¬£¬ £¬£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁËÁè¼Ý1880ÍòTalkTalkÓû§µÄÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢IPµØµã¡¢µç»°ºÅÂëºÍPINµÈÃô¸ÐÐÅÏ¢¡£ ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬£¬£¬TalkTalk¹«Ë¾½²»°ÈËÌåÏÖÕâһ˵·¨¡°ÍêÈ«½û¾øÈ·ÇÒÑÏÖØÇ¿µ÷¡±£¬£¬ £¬£¬£¬£¬£¬²¢Ö¸³ö´Ë´ÎÐ¹Â¶Éæ¼°µÚÈý·½Æ½Ì¨¡£ ¡£¡£¡£¡£¡£¡£¾Ý͸¶£¬£¬ £¬£¬£¬£¬£¬¸ÃÊÂÎñÔ´ÓÚÒ»¸öµÚÈý·½¹©Ó¦É̵Äϵͳ±»ÒâÍâ»á¼ûºÍÀÄÓ㬣¬ £¬£¬£¬£¬£¬TalkTalkÕýÓ빩ӦÉÌÏàÖú½â¾ö¸ÃÎÊÌ⣬£¬ £¬£¬£¬£¬£¬µ«²¢Î´Í¸Â¶¹©Ó¦ÉÌÃû³Æ¡£ ¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬ £¬£¬£¬£¬£¬Ð¹Â¶µÄÊý¾ÝÊÇ´ÓµçÐÅÌṩÉÌʹÓõÄAscendon SaaSƽ̨ÇÔÈ¡µÄ£¬£¬ £¬£¬£¬£¬£¬¶ø¸Ãƽ̨ÌṩÉÌCSGÈÏ¿ÉÊý¾ÝÊÇ´ÓÆäÆ½Ì¨ÉÏÇÔÈ¡µÄ£¬£¬ £¬£¬£¬£¬£¬µ«ÌåÏÖÖ»ÓÐÒ»Ãû¿Í»§Êܵ½Ó°Ï죬£¬ £¬£¬£¬£¬£¬ÇÒûÓÐÖ¤¾ÝÅú×¢ÆäÊÖÒÕºÍϵͳÊܵ½ÁËË𺦡£ ¡£¡£¡£¡£¡£¡£Õâ²¢·ÇTalkTalkÊ×´ÎÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬2015Äê¸Ã¹«Ë¾Ð§ÀÍÆ÷Ò²ÔøÔâÊÜÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬£¬Ó°ÏìÁË400ÍòÓû§¡£ ¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/173526/cyber-crime/talktalk-confirms-data-breach.html


3. ʷŮʿ¼¯ÍÅÔâδ֪¹¥»÷ÕßÈëÇÖ£¬£¬ £¬£¬£¬£¬£¬Åû¶Çå¾²Îó²î


1ÔÂ28ÈÕ£¬£¬ £¬£¬£¬£¬£¬×ܲ¿Î»ÓÚÂ׶صĿç¹ú¹¤³Ì¾ÞͷʷŮʿ¼¯ÍÅ£¨Smiths Group£©½üÆÚÔâÓöÁËδ֪¹¥»÷ÕßµÄϵͳÈëÇÖ£¬£¬ £¬£¬£¬£¬£¬µ¼ÖÂÇå¾²Îó²î±»Åû¶¡£ ¡£¡£¡£¡£¡£¡£×÷Ϊһ¼ÒÔÚÂ×¶ØÖ¤È¯ÉúÒâËùÉÏÊеÄÓ¢¹ú¹«Ë¾£¬£¬ £¬£¬£¬£¬£¬Ê·Å®Ê¿¼¯ÍÅÔÚ50¶à¸ö¹ú¼ÒÓµÓÐÁè¼Ý15,000ÃûÔ±¹¤£¬£¬ £¬£¬£¬£¬£¬È¥ÄêÓªÊոߴï31.32ÒÚÓ¢°÷£¬£¬ £¬£¬£¬£¬£¬Ö÷ҪЧÀÍÓÚÄÜÔ´¡¢Çå¾²¡¢°²±£¡¢º½¿Õº½ÌìºÍ¹ú·ÀÊг¡¡£ ¡£¡£¡£¡£¡£¡£ÔÚÖܶþÌá½»¸øÂ×¶ØÖ¤È¯ÉúÒâËùµÄÎļþÖУ¬£¬ £¬£¬£¬£¬£¬Ê·Å®Ê¿¼¯ÍÅ͸¶ÕýÔÚÊÓ²ìÒ»ÆðÉæ¼°¡°Î´¾­ÊÚȨ»á¼û¹«Ë¾ÏµÍ³¡±µÄÍøÂçÇå¾²ÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬²¢Á¬Ã¦¸ôÀëÁËÊÜÓ°ÏìµÄϵͳ£¬£¬ £¬£¬£¬£¬£¬Æô¶¯ÁËÓªÒµÒ»Á¬ÐÔÍýÏë¡£ ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾ÕýÓëÍøÂçÇ徲ר¼ÒÏàÖú£¬£¬ £¬£¬£¬£¬£¬Æð¾¢»Ö¸´ÏµÍ³²¢ÆÀ¹À¶ÔÓªÒµµÄÆÕ±éÓ°Ï죬£¬ £¬£¬£¬£¬£¬Í¬Ê±ÔÊÐí½«½ÓÄÉÒ»ÇÐÐëÒª²½·¥×ñÊØÏà¹Øî¿ÏµÒªÇ󣬣¬ £¬£¬£¬£¬£¬²¢ÔÚ»ñµÃ¸ü¶àÐÅϢʱÌṩ¸üС£ ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬£¬£¬Ê·Å®Ê¿¼¯ÍÅÉÐδ͸¶ÈëÇÖµÄÏêϸʱ¼äºÍÊÇ·ñÓÐÓªÒµ»ò¿Í»§Êý¾Ý±»µÁ¡£ ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/engineering-giant-smiths-group-discloses-security-breach/


4. ËþËþ¿Æ¼¼ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬£¬£¬²¿·ÖITЧÀͶÌÔÝÖÐÖ¹


1ÔÂ31ÈÕ£¬£¬ £¬£¬£¬£¬£¬ËþËþ¿Æ¼¼ÓÐÏÞ¹«Ë¾£¨Tata Technologies Ltd.£©£¬£¬ £¬£¬£¬£¬£¬×÷ΪËþËþÆû³µµÄ×Ó¹«Ë¾£¬£¬ £¬£¬£¬£¬£¬ÊÇÒ»¼ÒרעÓÚÆû³µÉè¼Æ¡¢º½¿Õº½Ì칤³Ì¼°×ÛºÏÑз¢¹¤³ÌµÄÓ¡¶ÈÉÏÊпç¹ú¿Æ¼¼¹«Ë¾¡£ ¡£¡£¡£¡£¡£¡£¿ËÈÕ£¬£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬£¬£¬µ¼Ö²¿·ÖITЧÀͲ»µÃ²»ÔÝÍ£¡£ ¡£¡£¡£¡£¡£¡£Ö»¹ÜËþËþ¿Æ¼¼Ñ¸ËÙ½ÓÄÉÐж¯²¢Ðû²¼IT×ʲúÒѻָ´£¬£¬ £¬£¬£¬£¬£¬µ«´Ë´Î¹¥»÷µÄÏêϸϸ½ÚºÍÓ°ÏìÈÔÔÚÊÓ²ìÖС£ ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬£¬£¬£¬£¬¿Í»§½»¸¶Ð§ÀÍÔÚÍøÂç¹¥»÷ʱ´ú¼á³ÖÖÜÈ«ÔËÐУ¬£¬ £¬£¬£¬£¬£¬Î´¶Ô¿Í»§ÔËÓªÔì³ÉÓ°Ïì¡£ ¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÊÇ·ñÀÖ³ÉÇÔÈ¡Á˸ù«Ë¾µÄÈκÎÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬µ«ÀÕË÷Èí¼þ¹¥»÷ͨ³£Éæ¼°Êý¾Ý͵ÇÔ£¬£¬ £¬£¬£¬£¬£¬¶Ô¿Æ¼¼¹«Ë¾¶øÑÔ£¬£¬ £¬£¬£¬£¬£¬´ËÀàÊÂÎñ¿ÉÄܵ¼Ö¹«Ë¾ÉñÃØÊý¾Ýй¶£¬£¬ £¬£¬£¬£¬£¬Ëðº¦ÖªÊ¶²úȨºÍÊÖÒÕ×éºÏ¡£ ¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬ £¬£¬£¬£¬£¬HiveÀÕË÷Èí¼þ×éÖ¯Ôø¶ÔÓ¡¶È×î´óµÄ×ۺϵçÁ¦¹«Ë¾ËþËþµçÁ¦·¢¶¯¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ÇÔÈ¡²¢Ð¹Â¶Á˰üÀ¨¹¤³ÌʾÒâͼ¡¢²ÆÎñ¼Í¼ºÍСÎÒ˽¼Ò¿Í»§ÐÅÏ¢ÔÚÄÚµÄÃô¸ÐÊý¾Ý¡£ ¡£¡£¡£¡£¡£¡£´Ë´ÎËþËþ¿Æ¼¼ÔâÊܵĹ¥»÷ÔÙ´ÎÌáÐÑÆóÒµÐèÔöÇ¿ÍøÂçÇå¾²·À»¤¡£ ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/indian-tech-giant-tata-technologies-hit-by-ransomware-attack/


5. GrubHubÔâÊý¾Ýй¶£¬£¬ £¬£¬£¬£¬£¬¹¥»÷ÕßʹÓõÚÈý·½ÕË»§ÈëÇÖϵͳ


2ÔÂ4ÈÕ£¬£¬ £¬£¬£¬£¬£¬Ê³ÎïÅäË͹«Ë¾GrubHubÔâÓöÁËÒ»´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýµÚÈý·½Ð§ÀÍÌṩÉ̵ÄÕË»§ÈëÇÖÁËGrubHubϵͳ£¬£¬ £¬£¬£¬£¬£¬Ó°ÏìÁ˿ͻ§¡¢É̼ҺÍ˾»úµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬µ«ÏêϸÊÜÓ°ÏìÊýĿδ¹ûÕæ¡£ ¡£¡£¡£¡£¡£¡£GrubHubѸËÙ½ÓÄÉÐж¯£¬£¬ £¬£¬£¬£¬£¬ÖÕÖ¹ÁËÈëÇÖÕË»§µÄ»á¼ûȨÏÞ£¬£¬ £¬£¬£¬£¬£¬²¢É¾³ýÁ˸ÃЧÀÍÌṩÉÌ£¬£¬ £¬£¬£¬£¬£¬Í¬Ê±Ô¼ÇëÍⲿר¼ÒÆÀ¹ÀÓ°Ïì¡¢ÂÖ»»ÃÜÂë²¢ÔöÇ¿ÁËÄÚ²¿Ð§À͵ÄÒì³£¼ì²â¡£ ¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õßδ»ñÈ¡Ãô¸ÐµÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬µ«¿ÉÄÜ»ñÈ¡Á˲¿·ÖУ԰ʳÌÃÓû§µÄÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¼°²¿·ÖÖ§¸¶¿¨ÐÅÏ¢£¨°üÀ¨¿¨ÀàÐͺÍ×îºóËÄλ¿¨ºÅ£©¡£ ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õß»¹»á¼ûÁËijЩÒÅÁôϵͳµÄÉ¢ÁÐÃÜÂ룬£¬ £¬£¬£¬£¬£¬GrubHubÒÑ×Ô¶¯ÂÖ»»¿ÉÄܱ£´æÎ£º¦µÄÃÜÂ룬£¬ £¬£¬£¬£¬£¬²¢±Þ²ß¿Í»§Ê¹ÓÃÆæÒìÃÜÂëÒÔ½µµÍΣº¦¡£ ¡£¡£¡£¡£¡£¡£GrubHubÔÚÌìÏÂ4000¶à¸ö¶¼»áÓµÓÐÁè¼Ý375000¼ÒÉ̼ҺÍ200000ÃûÅäËÍÏàÖúͬ°é£¬£¬ £¬£¬£¬£¬£¬È¥ÄêÒò¶àÏîÎ¥·¨ÐÐΪ֧¸¶ÁË2500ÍòÃÀԪϢÕù½ð¡£ ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/grubhub-data-breach-impacts-customers-drivers-and-merchants/


6. CISA ½«Ëĸö±»Æð¾¢Ê¹ÓõÄÎó²îÌí¼Óµ½ KEV Ŀ¼ÖÐ


2ÔÂ5ÈÕ£¬£¬ £¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÖܶþÐû²¼ÁËÒ»ÏîÖ÷ÒªÇ徲ͨ¸æ£¬£¬ £¬£¬£¬£¬£¬ÏòÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖÐÐÂÔöÁËËĸöÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬£¬²¢ÖÒÑÔÕâЩÎó²îÕý±»Æð¾¢Ê¹Óᣠ¡£¡£¡£¡£¡£¡£ÕâЩÎó²î°üÀ¨£ºCVE-2024-45195£¬£¬ £¬£¬£¬£¬£¬Ò»¸öApache OFBizÖеÄÇ¿ÖÆä¯ÀÀÎó²î£¬£¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß»ñȡδÊÚȨ»á¼ûȨÏÞ²¢Ö´ÐÐí§Òâ´úÂ루ÒÑÐÞ¸´£©£»£»£»CVE-2024-29059£¬£¬ £¬£¬£¬£¬£¬Microsoft .NET FrameworkÖеÄÐÅϢй¶Îó²î£¬£¬ £¬£¬£¬£¬£¬¿ÉÄÜ̻¶Ãô¸ÐÐÅÏ¢²¢µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¨ÒÑÐÞ¸´£©£»£»£»CVE-2018-9276£¬£¬ £¬£¬£¬£¬£¬Paessler PRTGÍøÂç¼àÊÓÆ÷ÖеIJÙ×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬£¬ £¬£¬£¬£¬£¬ÔÊÐíÖÎÀíȨÏ޵Ĺ¥»÷ÕßÖ´ÐÐÏÂÁÒÑÐÞ¸´£©£»£»£»ÒÔ¼°CVE-2018-19410£¬£¬ £¬£¬£¬£¬£¬Í¬ÑùÊÇPaessler PRTGÖеÄÍâµØÎļþ°üÀ¨Îó²î£¬£¬ £¬£¬£¬£¬£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õß½¨Éè¾ßÓжÁдȨÏÞµÄÓû§£¨ÒÑÐÞ¸´£©¡£ ¡£¡£¡£¡£¡£¡£Ö»¹ÜÕâЩÎó²îÒÑÓɸ÷×Ô¹©Ó¦ÉÌÐÞ¸´£¬£¬ £¬£¬£¬£¬£¬µ«ÏÖÔÚÉÐÎÞ¹ØÓÚËüÃÇÔõÑùÔÚÕæÊµ¹¥»÷Öб»Ê¹ÓõÄÏêϸ¹ûÕæ±¨¸æ¡£ ¡£¡£¡£¡£¡£¡£Îª´Ë£¬£¬ £¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©ÏÂÊô»ú¹¹±»½ôÆÈ±Þ²ßÔÚ2025Äê2ÔÂ25ÈÕǰӦÓÃÐëÒªµÄÐÞ¸´²½·¥£¬£¬ £¬£¬£¬£¬£¬ÒÔÓÐÓÃÌá·ÀÕâЩ×Ô¶¯Íþв£¬£¬ £¬£¬£¬£¬£¬È·±£ÍøÂçÇå¾²¡£ ¡£¡£¡£¡£¡£¡£



https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html