ÃÀ¹úË®Îñ¹«Ë¾ÔâÍøÂç¹¥»÷£¬²¿ÃÅϵͳ¹Ø±Õ²¢Æô¶¯ÊÓ²ì
Ðû²¼Ê±¼ä 2024-10-081. ÃÀ¹úË®Îñ¹«Ë¾ÔâÍøÂç¹¥»÷£¬²¿ÃÅϵͳ¹Ø±Õ²¢Æô¶¯ÊÓ²ì
10ÔÂ7ÈÕ£¬ÃÀ¹úË®Îñ¹«Ë¾£¬×÷Ϊ¸Ã¹ú×î´óµÄÉÏÊÐË®ÎñºÍÎÛË®´¦Öù«ÓÃÊÂÒµ¹«Ë¾£¬½üÆÚÔâÊÜÁËÍøÂç¹¥»÷£¬µ¼Ö²¿ÃÅϵͳ±»Æȹرա£¹«Ë¾ÒÑƸÇëµÚÈý·½ÍøÂçÄþ¾²×¨¼Ò½éÈ룬²¢ÏòÖ´·¨²¿ÃųÂËß´Ëʼþ£¬Ðµ÷ÁªºÏÊӲ졣ΪӦ¶Ô¹¥»÷£¬¹«Ë¾½ÓÄÉÁ˶Ͽª»òÍ£ÓÃijЩϵͳµÄ´ëÊ©£¬²¢¹Ø±ÕÁËÔÚÏß¿Í»§ÃÅ»§·þÎñMyWater£¬ÔÝÍ£Á˼ƷѷþÎñ¡£¹«Ë¾·¢ÑÔÈËÌåÏÖ£¬Æڼ䲻»áÏò¿Í»§ÊÕÈ¡ÖÍÄɽ𣬲¢Ç¿µ÷¹©Ë®»ò·ÏË®ÉèÊ©¼°ÔËӪδÊÜ´Ë´ÎʼþÓ°Ïì¡£ÃÀ¹úË®Îñ¹«Ë¾ÓµÓÐ6,500¶àÃûÔ±¹¤£¬Îª14¸öÖݺÍ18¸ö¾üÊ»ùµØµÄÁè¼Ý1,400ÍòÈËÌṩ·þÎñ¡£´ËÇ°£¬ÀàËÆʼþÒ²Ôø·¢Éú£¬Èç¿°Èø˹ÖÝ°¢¿ÏÉ«³ÇµÄË®´¦Öó§ÔÚÖÜÄ©ÔâÊÜÍøÂç¹¥»÷ºóתΪÊÖ¶¯²Ù×÷¡£´ËÍ⣬ˮÐÅÏ¢¹²ÏíÓë·ÖÎöÖÐÐÄÔøÐû²¼¾¯¸æ³Æ¶íÂÞ˹Õë¶ÔË®Îñ²¿ÃÅÌᳫÍøÂç¹¥»÷¡£ÃÀ¹ú»·¾³±£»¤ÊðÒ²Ðû²¼ÁËÖ¸µ¼Òâ¼û£¬×ÊÖúÆÀ¹ÀÍøÂçÄþ¾²Êµ¼ù²¢È·¶¨¼õÉÙ¹¥»÷·çÏյĴëÊ©¡£
https://www.bleepingcomputer.com/news/security/american-water-shuts-down-online-services-after-cyberattack/
2. Cloudflare×èÖ¹ÁËÊ·ÉÏ×î´óÁ÷Á¿DDoS¹¥»÷£¬·åÖµµ½´ï3.8Tbps
10ÔÂ3ÈÕ£¬½ðÈÚ·þÎñ¡¢»¥ÁªÍøºÍµçÐÅÐÐÒµÔâÊÜÁËÒ»³¡Ç°ËùδÓеÄÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷£¬·åÖµÁ÷Á¿¸ß´ïÿÃë3.8½ðÈÚ·þÎñ¡¢»¥ÁªÍøºÍµçÐÅÐÐÒµÔâÊÜÁËÒ»³¡Ç°ËùδÓеÄÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷£¬·åÖµÁ÷Á¿¸ß´ïÿÃë3.8Tbps£¬´´ÏÂÁ˹ûÈ»¼Ç¼µÄ×î´óÖµ¡£Õⳡ¹¥»÷Á¬ÐøÁËÒ»¸öÔ£¬°üÂÞÁËÁè¼Ý100´ÎµÄ³¬´óÁ÷Á¿DDoS¹¥»÷£¬Í¨¹ýÀ¬»øÊý¾ÝÑÍûÍøÂç»ù´¡ÉèÊ©¡£ÔÚÈÝÁ¿Ãܼ¯ÐÍDDoS¹¥»÷ÖУ¬´óÁ¿Êý¾Ýµ¼Ö´ø¿íÏûºÄ´ù¾¡£¬Ó¦Ó÷¨Ê½ºÍÉ豸×ÊÔ´¿Ý½ß£¬ºÏ·¨Óû§ÎÞ·¨·ÃÎÊ¡£ÊÜѬȾµÄÉ豸°üÂÞAsus·ÓÉÆ÷¡¢MikroTikÉ豸¡¢DVRºÍÍøÂç·þÎñÆ÷£¬Çұ鲼ȫÇò£¬¶íÂÞ˹¡¢Ô½ÄÏ¡¢ÃÀ¹ú¡¢°ÍÎ÷ºÍÎ÷°àÑÀÓÈΪ¼¯ÖС£CloudflareÀֳɻº½âÁËËùÓй¥»÷£¬²¢Ö¸³ö·åÖµ¹¥»÷Á¬ÐøÁË65Ãë¡£¶ñÒâÉ豸Ö÷ҪʹÓÃUDPÐÒ飬¸ÃÐÒéÊý¾Ý´«ÊäËٶȿ죬µ«ÎÞÐ轨Á¢ÕýʽÁ¬½Ó¡£´ËÇ°£¬Î¢ÈíÔø±£³Ö·ÀÓù×î´óDDoS¹¥»÷µÄ¼Ç¼£¬Á÷Á¿Îª3.47Tbps¡£
https://www.bleepingcomputer.com/news/security/cloudflare-blocks-largest-recorded-ddos-attack-peaking-at-38tbps/
3. CosmicSting¹¥»÷ÍþвAdobe CommerceºÍMagentoÉ̵êÄþ¾²
10ÔÂ3ÈÕ£¬Adobe CommerceºÍMagentoÔÚÏßÉ̵êÕýÃæÁÙÃûΪ¡°CosmicSting¡±µÄÑÏÖع¥»÷£¬¸Ã¹¥»÷ÒÑÈëÇÖÔ¼5%µÄÉ̵ꡣCosmicSting©¶´£¨CVE-2024-34102£©ÊÇÒ»¸ö¸ßÑÏÖØÐÔµÄÐÅϢ鶩¶´£¬µ±ÓëglibcµÄiconvº¯ÊýÖеÄÁíÒ»Äþ¾²ÎÊÌ⣨CVE-2024-2961£©½áºÏʱ£¬¹¥»÷Õß¿ÉÔÚÄ¿±ê·þÎñÆ÷ÉÏʵÏÖÔ¶³Ì´úÂëÖ´ÐС£ÊÜÓ°ÏìµÄ²úÎï°üÂÞAdobe CommerceµÄ¶à¸ö°æ±¾¡¢Magento¿ªÔ´µÄ¶à¸ö°æ±¾ÒÔ¼°Adobe Commerce Webhooks²å¼þµÄijЩ°æ±¾¡£×Ô2024Äê6ÔÂÒÔÀ´£¬ÍøÕ¾Äþ¾²¹«Ë¾SansecÒÑ×·×Ùµ½4,275¼ÒÉ̵êÔÚCosmicSting¹¥»÷ÖÐÔâµ½ÈëÇÖ£¬ÖªÃûÊܺ¦Õß°üÂ޻ݶøÆÖ¡¢À×Åó¡¢¹ú¼ÒµØÀí¡¢Èü¸ñÍþºÍ˼¿ÆµÈ¡£Sansec¾¯¸æ³Æ£¬ÓÉÓÚÐÞ²¹ËÙ¶ÈÓëÇé¿öÑÏÖØÐÔ²»Æ¥Å䣬Ŀǰ¶à¸öÍþвÐÐΪÕßÕýÔÚÀûÓÃCosmicSting©¶´ÈëÇÖδ´ò²¹¶¡µÄÍøÕ¾¡£ÕâЩÍþв×éÖ¯ÃûΪ¡°Bobry¡±¡¢¡°Polyovki¡±µÈ£¬ËûÃdzöÓÚ¾¼Ã¶¯»ú£¬ÈëÇÖÍøÕ¾ÒÔÇÔÈ¡ÐÅÓÿ¨ºÍ¿Í»§ÐÅÏ¢¡£¶ñÒâ½Å±¾»á´Óαװ³ÉÖªÃûJavaScript¿â»ò·ÖÎö°üµÄÓòÃû×¢ÈëÊÜѬȾµÄÍøÕ¾¡£Òò´Ë£¬Ç¿ÁÒ½¨ÒéÍøÕ¾¹ÜÀíÔ±¾¡¿ìÉý¼¶µ½Äþ¾²µÄÈí¼þ°æ±¾¡£
https://www.bleepingcomputer.com/news/security/over-4-000-adobe-commerce-magento-shops-hacked-in-cosmicsting-attacks/
4. ZimbraÓʼþ·þÎñÆ÷ÑÏÖØ©¶´CVE-2024-45519Òý·¢Äþ¾²¾¯±¨
10ÔÂ4ÈÕ£¬ÃÀ¹úÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£¨CISA£©Òѽ«Zimbraµç×ÓÓʼþ·þÎñÆ÷ÖеÄÑÏÖØÔ¶³Ì´úÂëÖ´ÐЩ¶´CVE-2024-45519Ìí¼Óµ½ÆäÒÑÖªÀûÓ鶴Ŀ¼ÖУ¬¸Ã©¶´Õë¶ÔZimbraµÄpostjournal·þÎñ£¬ÔÊÐí¹¥»÷Õßͨ¹ý·¢ËÍÌØÖƵç×ÓÓʼþÀûÓÃϵͳ£¬Ö´ÐÐÈÎÒâÃüÁî¡£´Ë©¶´ÒÑÒýÆðÕþ¸®ºÍÒªº¦»ù´¡ÉèÊ©²¿Ãŵľ¯Ì裬ÒòΪ¹¥»÷ÕßÕýÔÚ»ý¼«ÀûÓÃËü£¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡¢ÏµÍ³ÈëÇÖ»òδ¾ÊÚȨµÄ·ÃÎʵÈÑÏÖغó¹û¡£ZimbraÒÑÐû²¼²¹¶¡ÐÞ¸´´Ë©¶´£¬½¨Òéϵͳ¹ÜÀíÔ±Á¢¼´Ó¦ÓᣴËÍ⣬ProjectDiscoveryµÄÑо¿ÈËÔ±Ìá³öÁËÁ½ÖÖ»º½â´ëÊ©£ºÈç¹ûPostjournal·þÎñ²»ÖØÒª£¬Çë½ûÓÃËü£»²¢È·±£¡°mynetworks¡±ÉèÖÃÕýÈ·ÅäÖÃÒÔ×èֹδ¾ÊÚȨµÄ·ÃÎÊ¡£¼øÓÚZimbraÔÚÈ«ÇòµÄ¹ã·ºÊ¹Ó㬺öÊÓÕâЩ·ÀÓù´ëÊ©¿ÉÄÜ»áʹϵͳ̻¶ÓÚÖ÷¶¯¹¥»÷µÄ·çÏÕÖС£CISAÒÑ·¢³öÇ¿ÁÒ¾¯¸æ£¬²¢É趨ÁËÁª°î»º½â´ëÊ©µÄ×îºóÆÚÏÞΪ2024Äê10ÔÂ24ÈÕ£¬ÎªÁª°î»ú¹¹ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯ÌṩÁ˽ôÆȵÄʱ¼äÀ´Ó¦Óò¹¶¡»òֹͣʹÓÃZimbraµÄÈÕÖ¾·þÎñ¡£
https://securityonline.info/zimbra-email-servers-under-attack-cisa-flags-cve-2024-45519-as-actively-exploited/
5. perfctl¶ñÒâÈí¼þ£ºÕë¶ÔLinux·þÎñÆ÷µÄÒþ±Î³Ö¾Ã¹¥»÷Óë×ÊÔ´½Ù³Ö
10ÔÂ4ÈÕ£¬Aqua Nautilus µÄÑо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪ perfctl µÄ Linux ¶ñÒâÈí¼þ£¬ËüÒÑÕë¶ÔÅäÖôíÎóµÄ Linux ·þÎñÆ÷½øÐÐÁ˳¤´ï 3-4 ÄêµÄ¹¥»÷¡£¸Ã¶ñÒâÈí¼þʹÓà rootkit Òþ²ØÆä´æÔÚ£¬Í¨¹ý TOR ½øÐÐͨÐÅ£¬²¢ÔÚ·þÎñÆ÷¿ÕÏÐʱִÐмÓÃÜ»õ±Ò¿ó¹¤ºÍÊðÀí½Ù³ÖÈí¼þ¡£¹¥»÷ÕßÀûÓ鶴»ò´íÎóÅäÖ㬴ӿØÖÆµÄ HTTP ·þÎñÆ÷ÏÂÔضà²ã½á¹¹µÄÓÐЧÔغɣ¬Í¨¹ýÖØÃüÃûºÍɾ³ýÔʼ¶þ½øÖÆÎļþÀ´ÑÚ¸Ç×Ù¼£¡£Ëü»¹»áͶ·ÅÒ»¸ö rootkit ºÍ¾¹ýÐÞ¸ÄµÄ Linux ʵÓ÷¨Ê½£¬Ê¹Óø߼¶Ìӱܼ¼ÊõÈç¼ì²âÐÂÓû§Ê±Í£Ö¹»î¶¯£¬²¢ÖÕÖ¹¾ºÕù¶ñÒâÈí¼þ¡£ÎªÁ˱£³Ö³Ö¾ÃÐÔ£¬¶ñÒâÈí¼þ»áÐÞ¸ÄÓû§µÇ¼½Å±¾£¬ÔÚÓû§µÇ¼ʱִÐУ¬²¢ÔÚºǫ́ÔËÐÐÒÔÈ·±£ÆäÁ¬ÐøÔËÐС£¸Ã¶ñÒâÈí¼þµÄÖ÷ÒªÓ°ÏìÊÇ×ÊÔ´½Ù³Ö£¬Í¨¹ýÖ´ÐÐÃÅÂÞ±ÒÍÚ¿ó·¨Ê½À´ºÄ¾¡·þÎñÆ÷ CPU ×ÊÔ´¡£Òª¼ì²â perfctl ¶ñÒâÈí¼þ£¬ÐèÒª¼ì²ì CPU ʹÓÃÂÊÊÇ·ñ·ºÆðÒì³£·åÖµ»òϵͳÊÇ·ñ±äÂý¡£
https://securityaffairs.com/169351/malware/perfctl-malware-targets-misconfigured-linux-servers.html
6. UMC Health SystemÔâÀÕË÷Èí¼þ¹¥»÷£¬»¼ÕßתÒÆÓë·þÎñÊÜ×è
10ÔÂ1ÈÕ£¬µÂ¿ËÈø˹ÖÝÒ½ÁƱ£½¡ÌṩÉÌUMC Health System½üÆÚÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÆäITϵͳ·ºÆðÒì³£»î¶¯¡£ÎªÍ£Ö¹Ê¼þ£¬UMCÁ¢¼´¶Ï¿ªÏµÍ³²¢Õ¹¿ªÊӲ죬ȷÈÏ´Ë´ÎÒì³£»î¶¯ÓëÀÕË÷Èí¼þʼþÓйء£¾¡¹ÜÉÐδÓдóÐÍÀÕË÷Èí¼þ×éÖ¯¶Ô¹¥»÷ÂôÁ¦£¬µ«¹¥»÷ÒÑÆÈʹUMC½«²¿ÃÅ»¼ÕßתÒƵ½ÆäËûËùÔÚ£¬²¢µ¼ÖÂһЩ¿ÆÊҹرջòÖ»ÄÜÌṩÑÓ³Ù·þÎñ£¬ÆäÖзÅÉä¿ÆÊÜÓ°ÏìÓÈΪÑÏÖØ¡£´ËÍ⣬ÓÉÓÚITϵͳ¹ÊÕÏ£¬UMCÕïËùÎÞ·¨ÌṩҽÁÆ´¦·½Çåµ¥£¬½¨Ò黼ÕßËæÉíЯ´ø£¬Ò½ÁƼǼËä¿ÉÔÚ»¼ÕßÃÅ»§ÍøÕ¾ÉÏÕÒµ½£¬µ«ÎÞ·¨´òÓ¡¡£Ä¿Ç°£¬Í¨¹ýµç»°»òÔÚÏßÃÅ»§½¨Á¢ÏàͬҲÎÞ·¨±£Ö¤£¬½¨ÒéÐèÒªÁ¢¼´×ÊÖúµÄÈËÇ°ÍùÕïËù¡£´Ë´Î¹¥»÷¿ÉÄÜÉæ¼°Êý¾Ý͵ÇÔ£¬ÊýÊ®ÍòÈ˵ÄÃô¸ÐÒ½ÁÆÐÅÏ¢¿ÉÄÜÊܵ½Ó°Ï죬UMCÕýÔڶԴ˽øÐÐÊӲ죬²¢ÌåÏÖ½«ÔÚÓиü¶àÐÅϢʱÌṩ¸üС£
https://www.bleepingcomputer.com/news/security/ransomware-attack-forces-umc-health-system-to-divert-some-patients/