ÃÀ¹úÊ·ÉÏ×î´óÒ½ÁÆÊý¾Ýй¶ÊÂÎñ£ºChange HealthcareÔâÀÕË÷Èí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2025-02-061. ÃÀ¹úÊ·ÉÏ×î´óÒ½ÁÆÊý¾Ýй¶ÊÂÎñ£ºChange HealthcareÔâÀÕË÷Èí¼þ¹¥»÷
1ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬ÁªºÏ¿µ½¡¼¯ÍÅ×Ó¹«Ë¾Change HealthcareÔÚ2024Äê2ÔÂÔâÊÜÁËÀÕË÷Èí¼þ×éÖ¯ALPHV£¨ÓÖÃûBlack Cat£©µÄ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ¼1.9ÒÚÃÀ¹úÈ˵ÄÃô¸ÐÒ½ÁÆÊý¾Ýй¶£¬£¬£¬£¬£¬£¬³ÉΪÃÀ¹úÀúÊ·ÉÏ×î´óµÄÒ½ÁÆÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÁËȱ·¦¶àÒòËØÉí·ÝÑéÖ¤µÄÊÜѬȾÕÊ»§ºÍCitrixÔ¶³Ì»á¼ûÈí¼þÉϵÄÊÜѬȾƾ֤£¬£¬£¬£¬£¬£¬Ôì³ÉÁË8.72ÒÚÃÀÔªµÄ²ÆÎñËðʧºÍ6TBµÄÊý¾Ýй¶¡£¡£¡£¡£¡£¡£Ö»¹ÜºÚ¿Í½üÒ»ÄêÀ´Ò»Ö±ÔÚ»á¼û±»µÁÊý¾Ý£¬£¬£¬£¬£¬£¬µ«UnitedHealthÉù³ÆÃ»ÓÐÖ¤¾ÝÅú×¢Êý¾Ý±»ÀÄÓᣡ£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬´Ë´ÎÈëÇÖ̻¶Á˰üÀ¨¿µ½¡°ü¹ÜÏêϸÐÅÏ¢¡¢»¼ÕßÕï¶Ï¡¢²âÊÔЧ¹ûºÍÖÎÁÆÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÒ½ÁƼͼ£¬£¬£¬£¬£¬£¬ÒÔ¼°Ð¡ÎÒ˽¼ÒÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕºÅÂëµÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ö§¸¶ÁË2200ÍòÃÀÔªµÄÊê½ð£¬£¬£¬£¬£¬£¬µ«BlackCatÓÕÆÁËʵÑé´Ë´Î¹¥»÷µÄ¹ØÁª¹«Ë¾²¢ÆÈ¡ÁËÊê½ð£¬£¬£¬£¬£¬£¬µ¼Ö±»µÁÊý¾ÝÂäÈëÍøÂç·¸·¨·Ö×ÓÊÖÖС£¡£¡£¡£¡£¡£´Ë´ÎйÃÜÊÂÎñ²»µ«Ö±½ÓÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬»¹ÈÅÂÒÁËÌìϵÄÒ½ÁÆÐ§ÀÍ£¬£¬£¬£¬£¬£¬¸øÔËÓª´øÀ´ÁËÖØ´óÌôÕ½£¬£¬£¬£¬£¬£¬Òý·¢ÁËÈËÃǶԻ¼ÕßÒþ˽ºÍÊý¾ÝÇå¾²µÄµ£ÐÄ¡£¡£¡£¡£¡£¡£ÎªÁË×ñÊØHIPAA£¬£¬£¬£¬£¬£¬ÁªºÏ¿µ½¡¼¯ÍÅÒÑÏòÊÜÓ°Ïì×îÑÏÖØµÄСÎÒ˽¼Òת´ïÁ˴˴ι¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£
https://hackread.com/unitedhealth-groups-data-breach-impacts-americans/
2. TalkTalkÊý¾Ýй¶ÊÂÎñ£ºÍþвÕßÉù³ÆÇÔÈ¡1880ÍòÓû§Êý¾Ý
1ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬Ó¢¹úµçÐŹ«Ë¾TalkTalkÔâÓöÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬Ò»Ãû×Ô³ÆÎª¡°b0nd¡±µÄÍþвÐÐΪÕßÔÚÍøÂç·¸·¨ÂÛ̳ÉÏÐû²¼¶Ô´Ë´ÎºÚ¿Í¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁËÁè¼Ý1880ÍòTalkTalkÓû§µÄÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢IPµØµã¡¢µç»°ºÅÂëºÍPINµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬TalkTalk¹«Ë¾½²»°ÈËÌåÏÖÕâһ˵·¨¡°ÍêÈ«½û¾øÈ·ÇÒÑÏÖØÇ¿µ÷¡±£¬£¬£¬£¬£¬£¬²¢Ö¸³ö´Ë´ÎÐ¹Â¶Éæ¼°µÚÈý·½Æ½Ì¨¡£¡£¡£¡£¡£¡£¾Ý͸¶£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÔ´ÓÚÒ»¸öµÚÈý·½¹©Ó¦É̵Äϵͳ±»ÒâÍâ»á¼ûºÍÀÄÓ㬣¬£¬£¬£¬£¬TalkTalkÕýÓ빩ӦÉÌÏàÖú½â¾ö¸ÃÎÊÌ⣬£¬£¬£¬£¬£¬µ«²¢Î´Í¸Â¶¹©Ó¦ÉÌÃû³Æ¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÊý¾ÝÊÇ´ÓµçÐÅÌṩÉÌʹÓõÄAscendon SaaSƽ̨ÇÔÈ¡µÄ£¬£¬£¬£¬£¬£¬¶ø¸Ãƽ̨ÌṩÉÌCSGÈÏ¿ÉÊý¾ÝÊÇ´ÓÆäÆ½Ì¨ÉÏÇÔÈ¡µÄ£¬£¬£¬£¬£¬£¬µ«ÌåÏÖÖ»ÓÐÒ»Ãû¿Í»§Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬ÇÒûÓÐÖ¤¾ÝÅú×¢ÆäÊÖÒÕºÍϵͳÊܵ½ÁËË𺦡£¡£¡£¡£¡£¡£Õâ²¢·ÇTalkTalkÊ×´ÎÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬2015Äê¸Ã¹«Ë¾Ð§ÀÍÆ÷Ò²ÔøÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Ó°ÏìÁË400ÍòÓû§¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/173526/cyber-crime/talktalk-confirms-data-breach.html
3. ʷŮʿ¼¯ÍÅÔâδ֪¹¥»÷ÕßÈëÇÖ£¬£¬£¬£¬£¬£¬Åû¶Çå¾²Îó²î
1ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚÂ׶صĿç¹ú¹¤³Ì¾ÞͷʷŮʿ¼¯ÍÅ£¨Smiths Group£©½üÆÚÔâÓöÁËδ֪¹¥»÷ÕßµÄϵͳÈëÇÖ£¬£¬£¬£¬£¬£¬µ¼ÖÂÇå¾²Îó²î±»Åû¶¡£¡£¡£¡£¡£¡£×÷Ϊһ¼ÒÔÚÂ×¶ØÖ¤È¯ÉúÒâËùÉÏÊеÄÓ¢¹ú¹«Ë¾£¬£¬£¬£¬£¬£¬Ê·Å®Ê¿¼¯ÍÅÔÚ50¶à¸ö¹ú¼ÒÓµÓÐÁè¼Ý15,000ÃûÔ±¹¤£¬£¬£¬£¬£¬£¬È¥ÄêÓªÊոߴï31.32ÒÚÓ¢°÷£¬£¬£¬£¬£¬£¬Ö÷ҪЧÀÍÓÚÄÜÔ´¡¢Çå¾²¡¢°²±£¡¢º½¿Õº½ÌìºÍ¹ú·ÀÊг¡¡£¡£¡£¡£¡£¡£ÔÚÖܶþÌá½»¸øÂ×¶ØÖ¤È¯ÉúÒâËùµÄÎļþÖУ¬£¬£¬£¬£¬£¬Ê·Å®Ê¿¼¯ÍÅ͸¶ÕýÔÚÊÓ²ìÒ»ÆðÉæ¼°¡°Î´¾ÊÚȨ»á¼û¹«Ë¾ÏµÍ³¡±µÄÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬²¢Á¬Ã¦¸ôÀëÁËÊÜÓ°ÏìµÄϵͳ£¬£¬£¬£¬£¬£¬Æô¶¯ÁËÓªÒµÒ»Á¬ÐÔÍýÏë¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÕýÓëÍøÂçÇ徲ר¼ÒÏàÖú£¬£¬£¬£¬£¬£¬Æð¾¢»Ö¸´ÏµÍ³²¢ÆÀ¹À¶ÔÓªÒµµÄÆÕ±éÓ°Ï죬£¬£¬£¬£¬£¬Í¬Ê±ÔÊÐí½«½ÓÄÉÒ»ÇÐÐëÒª²½·¥×ñÊØÏà¹Øî¿ÏµÒªÇ󣬣¬£¬£¬£¬£¬²¢ÔÚ»ñµÃ¸ü¶àÐÅϢʱÌṩ¸üС£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Ê·Å®Ê¿¼¯ÍÅÉÐδ͸¶ÈëÇÖµÄÏêϸʱ¼äºÍÊÇ·ñÓÐÓªÒµ»ò¿Í»§Êý¾Ý±»µÁ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/engineering-giant-smiths-group-discloses-security-breach/
4. ËþËþ¿Æ¼¼ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬²¿·ÖITЧÀͶÌÔÝÖÐÖ¹
1ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬ËþËþ¿Æ¼¼ÓÐÏÞ¹«Ë¾£¨Tata Technologies Ltd.£©£¬£¬£¬£¬£¬£¬×÷ΪËþËþÆû³µµÄ×Ó¹«Ë¾£¬£¬£¬£¬£¬£¬ÊÇÒ»¼ÒרעÓÚÆû³µÉè¼Æ¡¢º½¿Õº½Ì칤³Ì¼°×ÛºÏÑз¢¹¤³ÌµÄÓ¡¶ÈÉÏÊпç¹ú¿Æ¼¼¹«Ë¾¡£¡£¡£¡£¡£¡£¿ËÈÕ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼Ö²¿·ÖITЧÀͲ»µÃ²»ÔÝÍ£¡£¡£¡£¡£¡£¡£Ö»¹ÜËþËþ¿Æ¼¼Ñ¸ËÙ½ÓÄÉÐж¯²¢Ðû²¼IT×ʲúÒѻָ´£¬£¬£¬£¬£¬£¬µ«´Ë´Î¹¥»÷µÄÏêϸϸ½ÚºÍÓ°ÏìÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬¿Í»§½»¸¶Ð§ÀÍÔÚÍøÂç¹¥»÷ʱ´ú¼á³ÖÖÜÈ«ÔËÐУ¬£¬£¬£¬£¬£¬Î´¶Ô¿Í»§ÔËÓªÔì³ÉÓ°Ïì¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÊÇ·ñÀÖ³ÉÇÔÈ¡Á˸ù«Ë¾µÄÈκÎÊý¾Ý£¬£¬£¬£¬£¬£¬µ«ÀÕË÷Èí¼þ¹¥»÷ͨ³£Éæ¼°Êý¾Ý͵ÇÔ£¬£¬£¬£¬£¬£¬¶Ô¿Æ¼¼¹«Ë¾¶øÑÔ£¬£¬£¬£¬£¬£¬´ËÀàÊÂÎñ¿ÉÄܵ¼Ö¹«Ë¾ÉñÃØÊý¾Ýй¶£¬£¬£¬£¬£¬£¬Ëðº¦ÖªÊ¶²úȨºÍÊÖÒÕ×éºÏ¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬HiveÀÕË÷Èí¼þ×éÖ¯Ôø¶ÔÓ¡¶È×î´óµÄ×ۺϵçÁ¦¹«Ë¾ËþËþµçÁ¦·¢¶¯¹¥»÷£¬£¬£¬£¬£¬£¬ÇÔÈ¡²¢Ð¹Â¶Á˰üÀ¨¹¤³ÌʾÒâͼ¡¢²ÆÎñ¼Í¼ºÍСÎÒ˽¼Ò¿Í»§ÐÅÏ¢ÔÚÄÚµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£´Ë´ÎËþËþ¿Æ¼¼ÔâÊܵĹ¥»÷ÔÙ´ÎÌáÐÑÆóÒµÐèÔöÇ¿ÍøÂçÇå¾²·À»¤¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/indian-tech-giant-tata-technologies-hit-by-ransomware-attack/
5. GrubHubÔâÊý¾Ýй¶£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓõÚÈý·½ÕË»§ÈëÇÖϵͳ
2ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬Ê³ÎïÅäË͹«Ë¾GrubHubÔâÓöÁËÒ»´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýµÚÈý·½Ð§ÀÍÌṩÉ̵ÄÕË»§ÈëÇÖÁËGrubHubϵͳ£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˿ͻ§¡¢É̼ҺÍ˾»úµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«ÏêϸÊÜÓ°ÏìÊýĿδ¹ûÕæ¡£¡£¡£¡£¡£¡£GrubHubѸËÙ½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬ÖÕÖ¹ÁËÈëÇÖÕË»§µÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬²¢É¾³ýÁ˸ÃЧÀÍÌṩÉÌ£¬£¬£¬£¬£¬£¬Í¬Ê±Ô¼ÇëÍⲿר¼ÒÆÀ¹ÀÓ°Ïì¡¢ÂÖ»»ÃÜÂë²¢ÔöÇ¿ÁËÄÚ²¿Ð§À͵ÄÒì³£¼ì²â¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬¹¥»÷Õßδ»ñÈ¡Ãô¸ÐµÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«¿ÉÄÜ»ñÈ¡Á˲¿·ÖУ԰ʳÌÃÓû§µÄÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¼°²¿·ÖÖ§¸¶¿¨ÐÅÏ¢£¨°üÀ¨¿¨ÀàÐͺÍ×îºóËÄλ¿¨ºÅ£©¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹»á¼ûÁËijЩÒÅÁôϵͳµÄÉ¢ÁÐÃÜÂ룬£¬£¬£¬£¬£¬GrubHubÒÑ×Ô¶¯ÂÖ»»¿ÉÄܱ£´æÎ£º¦µÄÃÜÂ룬£¬£¬£¬£¬£¬²¢±Þ²ß¿Í»§Ê¹ÓÃÆæÒìÃÜÂëÒÔ½µµÍΣº¦¡£¡£¡£¡£¡£¡£GrubHubÔÚÌìÏÂ4000¶à¸ö¶¼»áÓµÓÐÁè¼Ý375000¼ÒÉ̼ҺÍ200000ÃûÅäËÍÏàÖúͬ°é£¬£¬£¬£¬£¬£¬È¥ÄêÒò¶àÏîÎ¥·¨ÐÐΪ֧¸¶ÁË2500ÍòÃÀԪϢÕù½ð¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/grubhub-data-breach-impacts-customers-drivers-and-merchants/
6. CISA ½«Ëĸö±»Æð¾¢Ê¹ÓõÄÎó²îÌí¼Óµ½ KEV Ŀ¼ÖÐ
2ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÖܶþÐû²¼ÁËÒ»ÏîÖ÷ÒªÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬ÏòÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖÐÐÂÔöÁËËĸöÇå¾²Îó²î£¬£¬£¬£¬£¬£¬²¢ÖÒÑÔÕâЩÎó²îÕý±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£ÕâЩÎó²î°üÀ¨£ºCVE-2024-45195£¬£¬£¬£¬£¬£¬Ò»¸öApache OFBizÖеÄÇ¿ÖÆä¯ÀÀÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß»ñȡδÊÚȨ»á¼ûȨÏÞ²¢Ö´ÐÐí§Òâ´úÂ루ÒÑÐÞ¸´£©£»£»£»£»£»£»CVE-2024-29059£¬£¬£¬£¬£¬£¬Microsoft .NET FrameworkÖеÄÐÅϢй¶Îó²î£¬£¬£¬£¬£¬£¬¿ÉÄÜ̻¶Ãô¸ÐÐÅÏ¢²¢µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¨ÒÑÐÞ¸´£©£»£»£»£»£»£»CVE-2018-9276£¬£¬£¬£¬£¬£¬Paessler PRTGÍøÂç¼àÊÓÆ÷ÖеIJÙ×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÖÎÀíȨÏ޵Ĺ¥»÷ÕßÖ´ÐÐÏÂÁÒÑÐÞ¸´£©£»£»£»£»£»£»ÒÔ¼°CVE-2018-19410£¬£¬£¬£¬£¬£¬Í¬ÑùÊÇPaessler PRTGÖеÄÍâµØÎļþ°üÀ¨Îó²î£¬£¬£¬£¬£¬£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õß½¨Éè¾ßÓжÁдȨÏÞµÄÓû§£¨ÒÑÐÞ¸´£©¡£¡£¡£¡£¡£¡£Ö»¹ÜÕâЩÎó²îÒÑÓɸ÷×Ô¹©Ó¦ÉÌÐÞ¸´£¬£¬£¬£¬£¬£¬µ«ÏÖÔÚÉÐÎÞ¹ØÓÚËüÃÇÔõÑùÔÚÕæÊµ¹¥»÷Öб»Ê¹ÓõÄÏêϸ¹ûÕæ±¨¸æ¡£¡£¡£¡£¡£¡£Îª´Ë£¬£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©ÏÂÊô»ú¹¹±»½ôÆÈ±Þ²ßÔÚ2025Äê2ÔÂ25ÈÕǰӦÓÃÐëÒªµÄÐÞ¸´²½·¥£¬£¬£¬£¬£¬£¬ÒÔÓÐÓÃÌá·ÀÕâЩ×Ô¶¯Íþв£¬£¬£¬£¬£¬£¬È·±£ÍøÂçÇå¾²¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html