RhysidaÀÕË÷Èí¼þÍÅ»ïÃé×¼²Ð¼²ÈË·ÇÓªÀû×éÖ¯Easterseals

Ðû²¼Ê±¼ä 2024-10-25
1. RhysidaÀÕË÷Èí¼þÍÅ»ïÃé×¼²Ð¼²ÈË·ÇÓªÀû×éÖ¯Easterseals


10ÔÂ24ÈÕ£¬£¬£¬ £¬£¬RhysidaÀÕË÷Èí¼þÍÅ»ï¿ËÈÕ½«Ä¿µÄתÏòÁË×ÅÃû²Ð¼²ÈË·ÇÓªÀû×éÖ¯¸´Éú½Ú·âÓ¡(Easterseals)£¬£¬£¬ £¬£¬ÊÔͼÀÕË÷130ÍòÃÀÔª¡£¡£ ¡£¡£¸Ã×é֯Ϊ²Ð¼²¶ùͯ¡¢ÍíÄêÈË¡¢ÍËÎéÎäÊ¿µÈÌṩ֧³Ö¡£¡£ ¡£¡£¾ÝÃåÒòÖÝî¿Ïµ»ú¹¹Îļþ£¬£¬£¬ £¬£¬EastersealsλÓÚÒÁÀûŵÒÁÖÝÖв¿µÄ·ÖÖ§»ú¹¹ÔÚ4ÔÂÔâÓöÁËÍøÂç¹¥»÷£¬£¬£¬ £¬£¬µ¼ÖÂ14,855È˵ÄСÎÒ˽¼ÒÐÅϢй¶£¬£¬£¬ £¬£¬°üÀ¨È«Ãû¡¢µØµã¡¢¼ÝʻִÕÕ¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁÆÐÅÏ¢µÈ¡£¡£ ¡£¡£·¢Ã÷´ËÊÂÎñºó£¬£¬£¬ £¬£¬EastersealsÁ¬Ã¦ÇжÏÍøÂç»á¼û£¬£¬£¬ £¬£¬²¢Ô¼Çë×¨ÒµÍøÂçÇå¾²¹«Ë¾¾ÙÐÐȡ֤ÊӲ졣¡£ ¡£¡£RhysidaÔÚÆäйÃÜÍøÕ¾ÉÏÐû²¼ÁËEastersealsµÄÐÅÏ¢£¬£¬£¬ £¬£¬²¢ÒªÇóÔÚ10ÔÂ30ÈÕǰ֧¸¶20±ÈÌØ±Ò¡£¡£ ¡£¡£´Ëǰ£¬£¬£¬ £¬£¬RhysidaÒѶԶà¼ÒÒ½ÁÆ»ú¹¹Ìᳫ¹¥»÷£¬£¬£¬ £¬£¬°üÀ¨Ö¥¼Ó¸ç°²ÓëÂÞ²®ÌØH.¬Àï¶ùͯҽԺµÈ£¬£¬£¬ £¬£¬²¢ÔÚÈ¥Äê12Ô¶ÔÌìÏ»ù¶½½Ì»áÁªºÏ»áÌᳫ¹¥»÷¡£¡£ ¡£¡£


https://therecord.media/easterseals-central-illinois-data-breach


2. Cisco Talos½ÒÆÆTA866ÖØ´óÕ½ÂÔ¼°ÆäÓëWarmCookie¶ñÒâÈí¼þµÄÁªÏµ


10ÔÂ23ÈÕ£¬£¬£¬ £¬£¬Cisco Talos½ÒÆÆÁËÍþвÐÐΪÕßTA866£¨ÓÖÃûAsylum Ambuscade£©µÄÖØ´óÕ½ÂÔºÍÆäÓëBadSpace¼Ò×åµÄWarmCookie¶ñÒâÈí¼þÖ®¼äµÄÁªÏµ¡£¡£ ¡£¡£TA866×Ô2020ÄêÒÔÀ´Ò»Ö±»îÔ¾ÓÚ¾­¼ÃÄ¿µÄ¶ñÒâÈí¼þ»î¶¯ºÍÌØ¹¤»î¶¯£¬£¬£¬ £¬£¬½ÓÄɶà½×¶ÎѬȾÁ´£¬£¬£¬ £¬£¬°üÀ¨¶ñÒâJavaScriptÏÂÔØ³ÌÐò¡¢MSI°ü¡¢WasabiSeedÏÂÔØÆ÷¡¢Screenshotter¶ñÒâÈí¼þºÍAHK BotÄ£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þ¡£¡£ ¡£¡£WarmCookie¶ñÒâÈí¼þÓëTA866±£´æÁªÏµ£¬£¬£¬ £¬£¬¹²ÏíÓÕ¶üÖ÷Ìâ¡¢»ù´¡ÉèÊ©¡¢CSharp-Streamer-RATºÍCobalt Strike×÷ΪºóÐøÔØºÉ£¬£¬£¬ £¬£¬²¢Ê¹Óñà³ÌÌìÉúµÄSSLÖ¤Êé¡£¡£ ¡£¡£WarmCookieͨ¹ý¶ñÒâÀ¬»øÓʼþºÍ¹ã¸æÈö²¥£¬£¬£¬ £¬£¬ÌṩºóÃŹ¦Ð§¡£¡£ ¡£¡£TA866µÄÑݱäÅú×¢×éÖ¯ÔÚ·ÀÓùÍøÂçÍþв·½ÃæÃæÁÙÖØ´óÌôÕ½£¬£¬£¬ £¬£¬ÐèÒªÏàʶ×îÐÂÍþвÇ鱨²¢ÊµÑéÏȽøÇå¾²²½·¥¡£¡£ ¡£¡£


https://hackread.com/ta866-group-warmcookie-malware-espionage-campaign/


3. Webflow³É¼ÓÃÜÇ®±Ò´¹ÂÚ¹¥»÷й¤¾ß


10ÔÂ23ÈÕ£¬£¬£¬ £¬£¬Netskope Threat LabsµÄ×îÐÂÑо¿ÏÔʾ£¬£¬£¬ £¬£¬Õë¶Ô¼ÓÃÜÇ®±ÒÇ®°üµÄÍøÂç´¹ÂÚ¹¥»÷ÔÚ2024Äê4ÔÂÖÁ9ÔÂʱ´ú¼¤Ôö£¬£¬£¬ £¬£¬ÕâЩ¹¥»÷ʹÓÃÊ¢ÐеÄÍøÕ¾¹¹½¨Æ÷WebflowÖÆ×÷´¹ÂÚÒ³Ãæ£¬£¬£¬ £¬£¬Ä£ÄâÕýµ±µÄ¼ÓÃÜÇ®°üÍøÕ¾£¬£¬£¬ £¬£¬ÈçCoinbase¡¢MetaMaskµÈ£¬£¬£¬ £¬£¬ÒÔ¼°¹«Ë¾ÍøÂçÓʼþƽ̨ºÍMicrosoft 365µÄµÇ¼½çÃæ¡£¡£ ¡£¡£ÕâЩ¹¥»÷Ö÷ÒªÕë¶Ô±±ÃÀºÍÑÇÖ޵ĽðÈÚЧÀÍ¡¢ÒøÐкÍÊÖÒÕÐÐÒµ£¬£¬£¬ £¬£¬ÒÑÓÐÁè¼Ý120¸ö×éÖ¯Êܵ½Ó°Ïì¡£¡£ ¡£¡£Óë¹Å°å´¹ÂÚ¹¥»÷²î±ð£¬£¬£¬ £¬£¬´Ë´Î¹¥»÷ÎÞÐè±àд´úÂ룬£¬£¬ £¬£¬¹¥»÷Õßͨ¹ýWebflowµÄ±íµ¥¿éÍøÂçÊܺ¦Õߵį¾Ö¤£¬£¬£¬ £¬£¬ÌØÊâÊǼÓÃÜÇ®°üµÄÉñÃØ»Ö¸´¶ÌÓ£¬£¬ £¬£¬´Ó¶øÍêÈ«¿ØÖÆÇ®°ü²¢ÇÔÈ¡×ʲú¡£¡£ ¡£¡£ÕâЩ´¹ÂÚÒ³ÃæÍ¨³£Ê¹ÓÃÏÖʵǮ°üÖ÷Ò³µÄ½ØÍ¼ÖÆ×÷£¬£¬£¬ £¬£¬²¢½«Õû¸öÍøÒ³×ª»»Îª¿Éµã»÷µÄͼÏñ£¬£¬£¬ £¬£¬½«Êܺ¦ÕßÖØ¶¨Ïòµ½¶ñÒâÍøÕ¾¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬ £¬£¬ÕâÐ©ÍøÂç´¹Âڻ»¹³£ÓÃÓë֮ǰ¼ÓÃÜȦÌ×ÓйصÄ̸ÌìÆ½Ì¨¡°tawk.to¡±¾ÙÐÐڲƭÐÔÊÖÒÕÖ§³Ö¡£¡£ ¡£¡£


https://securityonline.info/webflow-weaponized-phishing-attacks-target-crypto-wallets/


4. Change HealthcareÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬ÖÂ1ÒÚÈË¿µ½¡ÐÅϢй¶


10ÔÂ24ÈÕ£¬£¬£¬ £¬£¬½ñÄê2Ô£¬£¬£¬ £¬£¬Change HealthcareÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬µ¼ÖÂÁè¼Ý1ÒÚÈ˵Ä˽ÈË¿µ½¡ÐÅÏ¢±»µÁ£¬£¬£¬ £¬£¬ÕâÊÇÃÀ¹úÒÑÖªµÄ×î´óÒ»ÆðÒ½ÁƼͼÊý×Ö͵ÇÔ°¸Ö®Ò»£¬£¬£¬ £¬£¬Ò²ÊÇÀúÊ·ÉÏ×î´óµÄÊý¾Ýй¶°¸Ö®Ò»¡£¡£ ¡£¡£´Ë´Î¹¥»÷Ôì³ÉÁËÊýÔµÄÖÐÖ¹£¬£¬£¬ £¬£¬¶ÔÃÀ¹úÒ½ÁƱ£½¡ÐÐÒµÔì³ÉÁËÆÕ±éÆÆË𡣡£ ¡£¡£¹¥»÷ÓɶíÓïÀÕË÷Èí¼þºÍڲƭÀÕË÷ÍÅ»ïALPHV/BlackCatËùΪ£¬£¬£¬ £¬£¬ËûÃÇØÊºóÈÏ¿ÉÔðÈβ¢Ç±ÌÓ£¬£¬£¬ £¬£¬Í¬Ê±Æ­È¡ÁËʵÑéºÚ¿Í¹¥»÷µÄ³Ð°üÉ̵ÄвƲú¡£¡£ ¡£¡£¸ÃÍŻﻹÏò¸Ã¿µ½¡¿Æ¼¼¹«Ë¾µÄĸ¹«Ë¾ÁªºÏ¿µ½¡¼¯ÍÅ£¨UHG£©ÀÕË÷Á˵ڶþ±ÊÊê½ð£¬£¬£¬ £¬£¬²¢ÔÚÍøÉÏÐû²¼Á˲¿·Ö±»µÁÎļþ¡£¡£ ¡£¡£ÔÚÖ§¸¶Êê½ðºó£¬£¬£¬ £¬£¬Change»ñµÃÁ˱»µÁÊý¾Ý¼¯µÄ¸±±¾£¬£¬£¬ £¬£¬ÒÔʶ±ð²¢Í¨ÖªÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£ ¡£¡£ÃÀ¹úÕþ¸®ÊÔͼץ²¶¸ÃÍŻﱳºóµÄºÚ¿Í£¬£¬£¬ £¬£¬µ«Î´ÄÜÀֳɡ£¡£ ¡£¡£´Ë´Î¹¥»÷µÄÔµ¹ÊÔ­Óɲ¿·Ö¹é×ïÓÚÆóÒµºÏ²¢µ¼ÖµÄÔã¸âÇå¾²ÐÔ£¬£¬£¬ £¬£¬ÒÔ¼°Î´ÊܶàÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»£»£»£»£»¤µÄ±»µÁƾ֤±»ÍøÂç·¸·¨·Ö×ÓʹÓᣡ£ ¡£¡£


https://techcrunch.com/2024/10/24/unitedhealth-change-healthcare-hacked-millions-health-records-ransomware/


5. Landmark AdminÔâÍøÂç¹¥»÷£¬£¬£¬ £¬£¬80ÓàÍòÈËÊý¾Ýй¶


10ÔÂ24ÈÕ£¬£¬£¬ £¬£¬°ü¹ÜÖÎÀíЧÀ͹«Ë¾ Landmark Admin ÖÒÑԳƣ¬£¬£¬ £¬£¬2024Äê5ÔÂÔâÊܵÄÍøÂç¹¥»÷µ¼ÖÂÊý¾Ýй¶£¬£¬£¬ £¬£¬Ó°ÏìÁËÁè¼Ý80ÍòÈË¡£¡£ ¡£¡£Landmark Admin ×÷Ϊ´óÐͰü¹Ü¹«Ë¾µÄµÚÈý·½ÖÎÀí¹«Ë¾£¬£¬£¬ £¬£¬Îª¶à¼Ò°ü¹Ü¹«Ë¾Ìṩºǫ́ЧÀÍ¡£¡£ ¡£¡£5ÔÂ13ÈÕ£¬£¬£¬ £¬£¬¹«Ë¾¼ì²âµ½¿ÉÒɻ²¢Á¬Ã¦¹Ø±ÕITϵͳºÍÔ¶³Ì»á¼û£¬£¬£¬ £¬£¬ÒÔ±ÜÃâ¹¥»÷À©É¢¡£¡£ ¡£¡£ÓëµÚÈý·½ÍøÂçÇå¾²¹«Ë¾ÏàÖúºó£¬£¬£¬ £¬£¬·¢Ã÷¹¥»÷ʱ´úÍþвÐÐΪÕß»á¼ûÁ˰üÀ¨806,519ÈËСÎÒ˽¼ÒÐÅÏ¢µÄÎļþ£¬£¬£¬ £¬£¬Éæ¼°ÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢½ðÈÚÕË»§ºÅÂë¡¢Ò½ÁÆÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£¡£ ¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬Landmark ÒÑÏò¿ÉÄÜÊÜÓ°ÏìµÄСÎÒ˽¼Ò·¢ËÍ֪ͨ£¬£¬£¬ £¬£¬²¢ÌáÐÑËûÃÇ¼à¿ØÐÅÓñ¨¸æºÍÒøÐÐÕË»§¡£¡£ ¡£¡£ÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬ £¬£¬ÉÐδȷ¶¨ÕâÊÇÀÕË÷Èí¼þ¹¥»÷Õվɴ¿´âµÄÊý¾Ý͵ÇÔ£¬£¬£¬ £¬£¬Í¬Ê±Ò²Ã»ÓÐÍþвÐÐΪÕßÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/insurance-admin-landmark-says-data-breach-impacts-800-000-people/


6. ÁªºÏ¹úÐÅÍлù½ðÊý¾Ý¿âÉèÖùýʧ£¬£¬£¬ £¬£¬Ãô¸ÐÊý¾ÝÔâ´ó¹æÄ£Ð¹Â¶


10ÔÂ24ÈÕ£¬£¬£¬ £¬£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷£¬£¬£¬ £¬£¬ÁªºÏ¹úÏû³ý±©Á¦Ë𺦸¾Å®ÐÐΪÐÅÍлù½ðµÄÒ»¸öÊý¾Ý¿â±£´æÉèÖùýʧ£¬£¬£¬ £¬£¬µ¼ÖÂÁè¼Ý115,000·ÝÃô¸ÐÎļþ±»Ð¹Â¶¡£¡£ ¡£¡£ÕâЩÎļþ°üÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢²ÆÎñ¼Í¼ºÍÊܺ¦ÕßÖ¤´ÊµÈÃô¸ÐÊý¾Ý£¬£¬£¬ £¬£¬×ÜÈÝÁ¿µÖ´ï228GB¡£¡£ ¡£¡£Ð¹Â¶µÄÊý¾Ý¶ÔÒþ˽ºÍÇå¾²×é³ÉÑÏÖØÍþв£¬£¬£¬ £¬£¬¿ÉÄܻᱻÓÃÓÚÍøÂç´¹ÂÚ¹¥»÷¡¢Éí·Ý͵ÇÔ¡¢Ú²Æ­¡¢ÀÕË÷µÈ¶ñÒâÄ¿µÄ¡£¡£ ¡£¡£Êܺ¦Õß¡¢´ÈÉÆÊÂÇéÕߺÍÁªºÏ¹úÊÇÇéÖ°Ô±¿ÉÄܳÉΪĿµÄ£¬£¬£¬ £¬£¬ÃæÁÙÉí·ÝÐÅÏ¢±»µÁÓá¢Ú²Æ­¡¢Ú²Æ­»òÀÕË÷µÈΣº¦¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬ £¬£¬ÆØ¹âµÄÄÚ²¿Îļþ»¹¿ÉÄÜÈ÷¸·¨·Ö×ÓÏàʶ×éÖ¯µÄÔË×÷·½·¨¡¢Òªº¦ÖÎÀíºÍ²ÆÎñ½á¹¹µÈÃô¸ÐÐÅÏ¢¡£¡£ ¡£¡£ÏÖÔÚÉв»ÇåÎúË­ÔÚÖÎÀí¸ÃÊý¾Ý¿â£¬£¬£¬ £¬£¬ÒÔ¼°Ëü̻¶Á˶೤ʱ¼ä¡£¡£ ¡£¡£µ«ÁªºÏ¹ú¸¾Å®ÊðÒѾ­½ÓÄÉÁËÐж¯£¬£¬£¬ £¬£¬±£»£»£»£»£»£»£»¤ÁËÊý¾Ý¿â£¬£¬£¬ £¬£¬²¢Ðû²¼ÁËÕ©Æ­¾¯±¨£¬£¬£¬ £¬£¬Æð¾¢¼õÇáÓëÊý¾Ýй¶Ïà¹ØµÄΣº¦¡£¡£ ¡£¡£ÕâÒ»ÊÂÎñ͹ÏÔÁËÇ¿ÓÐÁ¦µÄÍøÂçÇå¾²²½·¥¶Ô±£»£»£»£»£»£»£»¤Ãô¸ÐÊý¾ÝµÄÖ÷ÒªÐÔ¡£¡£ ¡£¡£


https://hackread.com/misconfigured-un-database-gender-violence-victims-data/