ThreeAMºÚ¿Í×é֯й¶Carolina ArthritisÒ½ÁÆÊý¾Ý

Ðû²¼Ê±¼ä 2024-10-29

1. ThreeAMºÚ¿Í×é֯й¶Carolina ArthritisÒ½ÁÆÊý¾Ý


10ÔÂ25ÈÕ£¬ºÚ¿Í×éÖ¯ThreeAM½«Æä¹¥»÷Ä¿±êCarolina ArthritisµÄÒ½ÁÆÊý¾ÝÌí¼Óµ½Ð¹ÃÜÍøÕ¾ÉÏ£¬²¢ÔÚ¼¸Ð¡Ê±ÄÚй¶ÁËËùÓÐÇÔÈ¡µÄÊý¾Ý£¬¶øûÓиøÓè¸ÃÒ½ÁÆ»ú¹¹¸¶¿îÆÚÏÞ»ò¾¯¸æ¡£ThreeAMÉù³ÆÔÚ9ÔÂ27ÈÕ¹¥»÷Á˸ûú¹¹£¬²¢¼ÓÃÜÁËÆäÎļþ¡£±»ÇÔÈ¡µÄÊý¾Ý°üÂÞÊÜHIPAA±£»¤µÄ½¡¿µÐÅÏ¢£¬Èç¸öÈËÐÅÏ¢¡¢²¡Ê·¡¢Ò½ÁƼǼºÍ¼ì²é½á¹ûµÈ¡£ThreeAMÔøÓëCarolina ArthritisµÄ¹þÀï˹²©Ê¿½øÐÐ̸ÅУ¬µ«Î´Äܸ濢ЭÒé¡£ThreeAMÔÚÎļþÖз¢ÏÖÁËÒ½ÉúµÄÍËÐÝÕË»§±¨±í£¬²¢¶Ô´ËÌåÏÖ²»Âú¡£´ËÍ⣬鶵ÄÎļþ»¹°üÂÞCarolina ArthritisµÄÄÚ²¿ÒµÎñ¼Ç¼£¬ÈçÔ±¹¤Êý¾Ý¡¢ÈËΪµ¥¡¢Ë°ÎñÐÅÏ¢¡¢401kºÍÆäËû¸£ÀûÐÅÏ¢£¬ÒÔ¼°¼ÆËã»úÓû§ÃûºÍÃÜÂë¡£ÐèÒªÉó²é20¶àÄêµÄÎļþ²ÅÆøÈ·¶¨ÐèҪ֪ͨ˭ÒÔ¼°Éæ¼°ÄÄЩÀàÐ͵ÄÐÅÏ¢¡£Carolina Arthritisδ¶ÔѯÎÊ×÷³ö»ØÓ¦£¬Éв»Çå³þÕâ´Î¹¥»÷ÊÇ·ñ¶Ô»¼Õß»¤Àí·¢ÉúÁËÓ°Ï죬ÒÔ¼°ËûÃÇÊÇ·ñÓÐÈκοÉÄܱ»¼ÓÃܵĻ¼ÕßÎļþµÄ¿ÉÓñ¸·Ý¡£


https://databreaches.net/2024/10/25/carolina-arthritis-hit-by-threeam-ransomware-attack/


2. ÃÀ¹úÁÙÖÕ¾ì×¢Ò©·¿OPPCÔâÓö´ó¹æÄ£Êý¾Ýй¶


10ÔÂ25ÈÕ£¬ÃÀ¹úÁÙÖÕ¾ì×¢Ò©·¿OnePoint Patient Care£¨OPPC£©ÔâÓöÁËÊý¾Ýй¶Ê¼þ£¬µ¼ÖÂÔ¼80ÍòÈ˵ĸöÈËÐÅÏ¢±»Ð¹Â¶¡£OPPCÊÇÒ»¼ÒÌṩÁÙÖÕ¾ì×¢ºÍǨ¾ÍÖÎÁÆ·þÎñµÄÒ©µê£¬ÓëÒ½ÁƱ£½¡ÌṩÉ̺Ï×÷£¬Îª»¼ÕßÌṩ¶¨ÖÆÒ©ÎïºÍÖ§³Ö¡£2024Äê8ÔÂ8ÈÕ£¬OPPCÔÚÆä¼ÆËã»úÍøÂçÉϼì²âµ½¿ÉÒɻ£¬²¢Á¢¼´Æô¶¯ÄÚ²¿ÊӲ죬ͬʱƸÇë·¨Ò½Äþ¾²¹«Ë¾½øÒ»·¨Ê½²é¡£8ÔÂ15ÈÕ£¬OPPCÈ·ÈÏÔÚ8ÔÂ6ÈÕÖÁ8ÈÕÆڼ䣬ÓÐÈËδ¾­ÊÚȨ·ÃÎÊÁËÆäϵͳ²¢»ñÈ¡Á˸öÈËÐÅÏ¢£¬°üÂÞÐÕÃû¡¢¾ÓסÐÅÏ¢¡¢Ò½ÁƼǼ¡¢Õï¶Ï¡¢´¦·½ÏêÇéÒÔ¼°²¿ÃÅÊý¾ÝµÄÉç»áÄþ¾²ºÅÂë¡£OPPCÒÑÏòÃÀ¹úÎÀÉúÓ빫ÖÚ·þÎñ²¿³ÂËß´Ë´ÎÄþ¾²Ê¼þ£¬²¢½¨ÒéÊÜÓ°ÏìµÄ¸öÈ˼à¿ØÐÅÓóÂËߺͱ¨±íÖÐÊÇ·ñ´æÔÚ¿ÉÒɻ£¬²¢ÏòÖ´·¨²¿ÃųÂËßÈκÎÆÛÕ©ÐÐΪ¡£¾ÝϤ£¬´Ë´Îй¶Ê¼þÓëInc RansomÀÕË÷Èí¼þ×éÖ¯ÓйØ£¬¸Ã×éÖ¯ÔÚÆäTorйÃÜÍøÕ¾ÉϽ«OPPCÌí¼Óµ½Êܺ¦ÕßÃûµ¥ÖУ¬µ«OPPCûÓÐÖ§¸¶Êê½ð£¬µ¼ÖÂÊý¾Ý±»Ð¹Â¶¡£Inc Ransom×Ô2023Ä꿪ʼ»îÔ¾£¬ÒÑÉù³Æ¶ÔÖÁÉÙ65¸ö×éÖ¯µÄÈëÇÖʼþÂôÁ¦¡£


https://securityaffairs.com/170247/data-breach/onepoint-patient-care-data-breach.html


3. ºÉÀ¼¾¯·½¡°Âí¸ñŬ˹Ðж¯¡±ÖØ´´RedlineºÍMetaÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ


10ÔÂ28ÈÕ£¬ºÉÀ¼¾¯·½ÔÚ¡°Âí¸ñŬ˹Ðж¯¡±ÖÐÀֳɲé·âÁËRedlineºÍMetaÕâÁ½¿îÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÍøÂç»ù´¡ÉèÊ©£¬²¢¾¯¸æÍøÂç·¸×ï·Ö×ÓËûÃǵÄÊý¾ÝÒѱ»Ö´·¨²¿ÃÅÕÆÎÕ¡£ÕâÁ½¿î¶ñÒâÈí¼þ»á´ÓÊÜѬȾÉè±¹ØÁ¬Ää¯ÀÀÆ÷ÇÔÈ¡°üÂÞƾ֤¡¢ä¯ÀÀÀúÊ·¼Ç¼¡¢Ãô¸ÐÎĵµµÈÔÚÄڵĶàÖÖÐÅÏ¢£¬È»ºó³öÊÛ»òÓÃÓÚÍøÂç¹¥»÷¡£´Ë´ÎÐж¯µÃµ½ÁË°üÂÞÃÀ¹úÁª°îÊÓ²ì¾Ö¡¢Å·ÖÞ˾·¨×éÖ¯µÈ¹ú¼ÊÖ´·¨»ï°éµÄÖ§³Ö¡£¾¯·½²»½ö»ñµÃÁËÕâÁ½¿î¶ñÒâÈí¼þµÄÔ´´úÂ룬»¹ÕÆÎÕÁË¿ÉÓÃÓÚ×·²éʹÓøöñÒâÈí¼þµÄÍøÂç·¸×ï·Ö×ÓµÄÖ¤¾Ý¡£´ËÍ⣬ºÉÀ¼¾¯·½»¹½ÓÄÉÔÚºÚ¿ÍÂÛ̳ÉÏ´´½¨Õ˺Ų¢·¢ËÍÖ±½ÓÏûÏ¢µÄ·½Ê½£¬¾¯¸æÍþвÐÐΪÕßËûÃÇÕýÊܵ½ÃÜÇмàÊÓ¡£ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÒѳÉΪÆóÒµÃæÁٵľ޴óÎÊÌ⣬RedlineºÍMetaµÈ¶ñÒâÈí¼þÒѵ¼Ö´óÁ¿Ãô¸ÐÊý¾Ý±»ÇÔÈ¡£¬²¢±»ÓÃÓÚÍøÂç¹¥»÷¡£ÕâЩ±»µÁƾ֤Òѱ»ÓÃÀ´·¢¶¯Ò»Ð©×îÑÏÖصÄÎ¥¹æÐÐΪ£¬¶ÔÍøÂçÄþ¾²×é³ÉÑÏÖØÍþв¡£


https://www.bleepingcomputer.com/news/legal/redline-meta-infostealer-malware-operations-seized-by-police/


4. TeamTNTÀûÓÃDocker©¶´Ìᳫкڿͻ


10ÔÂ28ÈÕ£¬ÎÛÃûÕÑÖøµÄºÚ¿Í×éÖ¯TeamTNT½üÆÚÌᳫÁËÒ»Ïîеĺڿͻ£¬¸Ã×éÖ¯ÀûÓÃ̻¶µÄDockerÊØ»¤·¨Ê½²¿Êð¶ñÒâÈí¼þ£¬²¢Í¨¹ýÊÜѬȾµÄ·þÎñÆ÷ºÍDocker Hub½øÐй¥»÷Á÷´«¡£Aqua NautilusµÄÍøÂçÄþ¾²Ñо¿ÈËÔ±·¢ÏÖ£¬TeamTNT£¨ÓÖÃûAdept Libra£©Í¨¹ýÈëÇÖÒ»¸öºÏ·¨µÄDocker HubÕË»§ÍйܶñÒâÈí¼þ£¬ÉÏ´«ÁËÔ¼30¸ö¾µÏñ£¬°üÂÞÓÃÓÚÁ÷´«¶ñÒâÈí¼þµÄ»ù´¡ÉèÊ©¾µÏñºÍרעÓÚ¼ÓÃÜ»õ±ÒÍÚ¾ò»ò¼ÆËãÄÜÁ¦³ö×âµÄÓ°Ïì¾µÏñ¡£TeamTNTʹÓÃDocker Gatling GunɨÃè´óÁ¿IPµØÖ·£¬²éÕÒÔÚÌض¨¶Ë¿ÚÉÏÔËÐеÄDockerÊØ»¤·¨Ê½Â©¶´£¬²¢²¿Êð¶ñÒâÈÝÆ÷ºÍ½Å±¾¡£ÎªÁËÌӱܼì²â£¬TeamTNTʹÓÃÏȽøµÄSliver¶ñÒâÈí¼þ£¬»ìÈëºÏ·¨½ø³Ì£¬ÇÔȡƾ֤²¢É¨ÃèÍøÂçÑ°ÕÒÆäËûÄ¿±ê¡£ËûÃǵÄ×îÖÕÄ¿±êÊǽٳÖ×ÊÔ´½øÐмÓÃÜ»õ±ÒÍÚ¾ò»ò³öÊÛÊÜѬȾϵͳµÄ·ÃÎÊȨÏÞ£¬Ê¹ÓöàÖÖÍÚ¿óÈí¼þ½øÐÐÓÅ»¯²Ù×÷¡£´Ë´Î»î¶¯Õ¹Ê¾ÁËTeamTNTµÄÊÊÓ¦ºÍÉú³¤ÄÜÁ¦£¬¸÷×éÖ¯±ØÐë±£³Ö¾¯Ìè²¢¼ÓÇ¿ÍøÂçÄþ¾²Êµ¼ù£¬ÒÔ·À·¶¸Ã×éÖ¯µÄ¹¥»÷·çÏÕ¡£


https://hackread.com/teamtnt-exploits-ips-malware-attack-docker-clusters/


5. Hot TopicÖ÷¹ËÊý¾ÝÔâй¶£¬°µÍø¾ªÏÖ3.5ÒÚÌõ¸öÈËÐÅÏ¢


10ÔÂ25ÈÕ£¬ÒÔÉ«ÁÐÍøÂçÄþ¾²¹«Ë¾Hudson Rock·¢ÏÖ£¬ÔÚ°µÍøÉÏÓÐÒ»¸ö¾Ý³Æ°üÂÞ3.5ÒÚÌõHot TopicÖ÷¹Ë¸öÈ˺ÍÖ§¸¶Êý¾ÝµÄÅÓ´óÊý¾Ý¿âÕýÔÚ±»¹ûÈ»³öÊÛ¡£¸ÃÊý¾Ý¿â¾Ý³ÆÓÉÃûΪSatanicµÄÍþв×éÖ¯Ðû²¼£¬°üÂÞÓû§µÄÏêϸ¸öÈËÐÅÏ¢ºÍÖ§¸¶Ï¸½Ú£¬Éæ¼°Hot Topic¡¢TorridºÍBoxLunchÈý¼ÒÁãÊÛÆóÒµ¡£ËäÈ»Hot TopicÉÐδ¹ûÈ»ÈÏ¿ÉÊý¾Ýй¶£¬µ«Ëæ×ÅÄþ¾²Ñо¿ÈËÔ±·¢ÏÖµÄÖ¤¾ÝÔ½À´Ô½¶à£¬¸ÃʼþµÄÕæʵÐÔÔ½À´Ô½¸ß¡£Hudson Rock¾¯¸æ³Æ£¬Õ⽫¸øÓû§´øÀ´ÑÏÖØÄþ¾²Òþ»¼£¬ÈçÉí·Ý͵ÇÔ¡¢½ðÈÚÆÛÕ©µÈ¡£¾ÝÊӲ죬´Ë´ÎÊý¾Ýй¶¿ÉÄÜÔ´ÓÚinfo-stealerľÂíѬȾ£¬¸ÃľÂíÈëÇÖÁËΪHot TopicµÈÁãÊÛÉÌÌṩÊý¾Ýͳһ·þÎñµÄµÚÈý·½¹«Ë¾Ô±¹¤µÄ¼ÆËã»ú£¬¶øȱ·¦¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©»úÖÆ¿ÉÄÜÊǵ¼Ö¸Ãʼþ·¢ÉúµÄºËÐÄÒòËØÖ®Ò»¡£´ËÍ⣬Hot TopicÔÚȨÏÞ¹ÜÀíÉÏÒ²´æÔÚ¾Þ´óÎÊÌ⣬ÒòÔ±¹¤Æ¾Ö¤µ¼ÖµÄй¶Ê¼þÓ°ÏìÃ潫»á·Ç³£¹ã¡£SatanicÍþв×é֯ϣÍûÒÔ2ÍòÃÀÔªµÄ¼Û¸ñ³öÊÛ¸ÃÊý¾Ý¿â£¬»òÏòHot TopicÀÕË÷1ÍòÃÀԪɾ³ý¸ÃÌû×Ó¡£


https://cybernews.com/security/hackers-put-350m-hot-topic-customers-records-for-sale/


6. ·¨¹úFree¹«Ë¾ÔâÍøÂç¹¥»÷£¬¿Í»§¸öÈËÐÅÏ¢ÒÉÔâй¶


10ÔÂ28ÈÕ£¬·¨¹ú»¥ÁªÍø·þÎñÌṩÉÌFree£¬×÷Ϊ·¨¹úµÚ¶þ´óISP£¬ÓµÓÐÁè¼Ý2290ÍòÓû§£¬½üÈÕÅû¶ÁËÒ»ÆðÍøÂç¹¥»÷ʼþ¡£¾Ý³Æ£¬ÍþвÐÐΪÕß»ñµÃÁËFreeÄÚ²¿¹ÜÀí¹¤¾ßµÄ·ÃÎÊȨÏÞ£¬²¢ÍµÈ¡ÁËһЩ¶©ÔÄÕߵĸöÈËÊý¾Ý¡£¸Ã¹«Ë¾ÔÚ10ÔÂ26ÈÕÏò·¨ÐÂÉç֤ʵÁËÕâÒ»ÏûÏ¢£¬Ö¸³ö²¿ÃÅÓû§ÕË»§Ïà¹ØµÄ¸öÈËÊý¾Ý±»Î´¾­ÊÚȨ·ÃÎÊ£¬µ«ÃÜÂë¡¢ÒøÐп¨ÐÅÏ¢ºÍͨÐÅÄÚÈÝδÊÜÓ°Ïì¡£¹«Ë¾ÒÑÌáÆðÐÌÊÂËßËÏ£¬²¢Í¨ÖªÁËÏà¹Ø¼à¹Ü»ú¹¹¡£Âô¼ÒÔÚÍøÂç·¸×ïÂÛ̳ÉÏÁгöÁËÁ½¸öÊý¾Ý¿â£¬°üÂÞ´óÁ¿¿Í»§ÕË»§ºÍIBANÏêϸÐÅÏ¢£¬²¢Ðû²¼ÁËÊý¾ÝÑù±¾ºÍ½Øͼ¡£Ð¹Â¶µÄ¿Í»§Êý¾Ý°üÂÞÃû×Ö¡¢ÐÕÊÏ¡¢µç»°ºÅÂë¡¢ÍêÕûÓÊÕþµØÖ·¡¢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµÈ¡£¾¡¹ÜÍøÂç·¸×ï·Ö×ÓÉù³Æ´Ë´ÎÊý¾Ýй¶ӰÏìÁËFree MobileºÍFreebox¿Í»§£¬µ«¹«Ë¾ÌåÏÖÒѽÓÄÉ´ëÊ©ÖÆÖ¹¹¥»÷²¢¼ÓÇ¿ÐÅϢϵͳ±£»¤¡£


https://securityaffairs.com/170333/data-breach/free-suffered-a-cyber-attack.html