Central GroupÔâÓöÐÂÊý¾Ýй¶ £¬500Íò»áÔ±ÐÅϢΣÔÚµ©Ï¦

Ðû²¼Ê±¼ä 2024-11-22

1.Central GroupÔâÓöÐÂÊý¾Ýй¶ £¬500Íò»áÔ±ÐÅϢΣÔÚµ©Ï¦


11ÔÂ20ÈÕ £¬Ì©¹ú¿ç¹úÆóÒµ¼¯ÍÅCentral Group½üÆÚÔâÓöÁËÊý¾Ýй¶Ê¼þ¡£¾ÝDataBreaches³ÂËß £¬2021Äê10Ô £¬Central Restaurant GroupÔøÔâµ½ÃûΪDESORDENµÄÍþвÐÐΪÕß¹¥»÷¡£¶ø½üÆÚ £¬ÁíÒ»ÃûÍþвÐÐΪÕß0mid16BÉù³Æ £¬ÔÚ2024Äê8ÔÂÖÁ11ÔÂÆÚ¼ä £¬Í¨¹ýCentral RetailÍøÂç̻¶µÄÊÜËðAPI¶Ëµã £¬·ÃÎʲ¢ÇÔÈ¡ÁË5,108,826ÌõCentral Group The1 Card»áÔ±¸öÈËÐÅÏ¢¼Ç¼¡£The1 CardÊÇCentral GroupÆìÏÂËùÓÐÁãÊÛºÍÏû·ÑÆ·ÅƽÓÄɵĻáԱϵͳ £¬ÓµÓÐÁè¼Ý1700Íò»áÔ±¡£0mid16BÌåÏÖ £¬ÓÉÓÚÓëCentral GroupµÄ̸ÅÐʧ°Ü £¬¾ö¶¨³öÊÛÕâЩ»áÔ±¸öÈËÐÅÏ¢¼Ç¼ £¬°üÂÞÃû×Ö¡¢ÐÕÊÏ¡¢»áÔ±ºÅÂë¡¢¹úÃñÉí·ÝÖ¤ºÅÂë¡¢¹ú¼Ò¡¢ÊÖ»úµç»°ºÍµç×ÓÓʼþµÈÃô¸ÐÐÅÏ¢ £¬×ܾÞϸΪ582MB¡£¸ÃºÚ¿ÍÔÚºÚ¿ÍÂÛ̳ºÍX.comÉÏÐû²¼ÁËÊý¾ÝÁбí £¬²¢ÌṩÁËÊý¾ÝÑù±¾ºÍÑéÖ¤ÕæʵÐÔµÄÒªÁì¡£´ËÍâ £¬0mid16B»¹Ö¸ÔðÌ©¹ú¹«Ë¾²»ÖØÊÓÊý¾Ý±£»¤ £¬ÒòΪ²»»áÊܵ½Èκδ¦·£¡£DataBreachesÔøʵÑéÁªÏµCentral Group £¬µ«½ØÖÁ·¢¸åʱÉÐδÊÕµ½»Ø¸´¡£


https://databreaches.net/2024/11/20/thai-loyalty-membership-card-data-of-5-million-customers-put-up-for-sale-on-hacking-forum/


2. ¡°Ghost Tap¡±£ºÍøÂç·¸×ï·Ö×ÓÀûÓÃNFC¼¼ÊõÌ×ÏÖмÆı


11ÔÂ20ÈÕ £¬ÍøÂç·¸×ï·Ö×Ó½ÓÄÉÁËÒ»ÖÖÃûΪ¡°Ghost Tap¡±µÄÐÂÓ±Ì×ÏÖÒªÁì £¬¸ÃÒªÁìÀûÓñ»µÁµÄÐÅÓÿ¨ÐÅÏ¢ £¬ÌرðÊÇÓëApple PayºÍGoogle PayµÈÒƶ¯Ö§¸¶ÏµÍ³Ïà¹ØµÄÊý¾Ý £¬Í¨¹ýÈ«Çò·¶Î§Äڵġ°Ç®Â⡱ʵÏÖ·Ç·¨»ñÀû¡£ÓëÏÈÇ°µÄÒƶ¯¶ñÒâÈí¼þÈçNGateÏà±È £¬Ghost Tap¸üΪÒþ±ÎÇÒÄÑÒÔ¼ì²â £¬ÎÞÐèÊܺ¦ÕßµÄʵÌ忨»òÉ豸 £¬Ò²²»ÐèÁ¬Ðø½Ó´¥Êܺ¦Õß £¬¶øÊÇͨ¹ýÔ¶³Ì½»»¥Íê³É¡£¸Ã¼ÆıÊ×ÏÈÉæ¼°ÇÔÈ¡Ö§¸¶¿¨Êý¾ÝºÍÒ»´ÎÐÔÃÜÂ루OTP£© £¬Õâ¿ÉÒÔͨ¹ýÒøÐжñÒâÈí¼þ¡¢µöÓãÒ³Ãæ»ò¼üÅ̼ǼµÈ·½Ê½ÊµÏÖ¡£È»ºó £¬ÀûÓÃNFCGate¹¤¾ßºÍÖм̷þÎñÆ÷ £¬½«Ö§¸¶ÐÅÏ¢·¢Ë͸øÅÓ´óµÄÇ®ÂâÍøÂç £¬ÕâЩǮÂâʹÓÃÆäÉ豸µÄNFCоƬÔÚ¶à¸öËùÔÚ½øÐÐÁãÊÛ¹ºÖà £¬´Ó¶øÑÚ¸ÇÁËÖ÷Òª¹¥»÷ÕßµÄ×Ù¼£¡£ÓÉÓÚ½»Ò׿´ËƺϷ¨ÇÒÊèÉ¢ÓÚ²îÒìËùÔÚ £¬½ðÈÚ»ú¹¹ÄÑÒÔ·¢ÏÖºÍ×èÖ¹ÕâÖÖ¼Æı £¬ÓÈÆäÊǵ±Éæ¼°´óÁ¿Ð¡¶îÖ§¸¶Ê±¡£ÎªÁËÌÓ±Ü×·×Ù £¬Ç®ÂâÃÇ»¹»á½«É豸ÖÃÓÚ·ÉÐÐģʽ £¬µ«±£³ÖNFCϵͳÔËÐС£ÎªÁË·À·¶¡°Ghost Tap¡± £¬ÒøÐÐÐèÒª±ê־ʹÓÃͬһÕÅ¿¨ÔÚ²îÒìËùÔÚ½øÐеķÇʵ¼Ê¿É´ïµÄ½»Ò× £¬¶øÏû·ÑÕßÔòÐè¼à¿ØÆÛÕ©½»Òײ¢Á¢¼´ÏòÒøÐгÂËß¡£


https://www.bleepingcomputer.com/news/security/new-ghost-tap-attack-abuses-nfc-mobile-payments-to-steal-money/


3. Ubuntu Server needrestart°üÆسöÊ®ÄêÀÏ©¶´ £¬ÔÊÐíµ±µØÌáȨ


11ÔÂ20ÈÕ £¬Ubuntu Server×Ô21.04°æÆðĬÈÏ°²×°µÄneedrestart°üÖдæÔÚ¶à¸öÒÑÓÐÊ®ÄêÀúÊ·µÄÄþ¾²Â©¶´ £¬ÕâЩ©¶´¿ÉÄÜʹµ±µØ¹¥»÷ÕßÎÞÐèÓû§½»»¥¼´¿É»ñµÃrootȨÏÞ¡£QualysÍþвÑо¿²¿ÃÅÓÚÉÏÔ·¢ÏÖ²¢³ÂËßÁËÕâЩ©¶´ £¬Ö¸³öËüÃǼ«Ò×±»ÀûÓà £¬Óû§ÐèѸËÙÐж¯ÐÞ¸´¡£Â©¶´×Ô2014Äê4ÔÂ27ÈÕneedrestart 0.8°æÒýÈë½âÊÍÆ÷Ö§³ÖºóÒ»Ö±´æÔÚ £¬Ó°ÏìDebian¡¢UbuntuµÈLinux¿¯Ðаæ¡£NeedrestartÊÇÒ»¸öÓÃÓÚɨÃèϵͳÒÔÈ·¶¨ÔÚ¹²Ïí¿â¸üкóÐèÖØÆôµÄ·þÎñ £¬ÒÔÖÆֹϵͳȫÃæÖØÆôµÄʵÓ÷¨Ê½¡£Ëü¼¯³Éµ½·þÎñÆ÷Ó³ÏñÖÐ £¬ÔÚAPT²Ù×÷ºó×Ô¶¯ÔËÐÐ £¬Ê¶±ðÒªº¦¿â¸üкóÐèÖØÆôµÄ·þÎñ £¬È·±£·þÎñʹÓÃ×îпâ°æ±¾ £¬Ìá¸ßÕý³£ÔËÐÐʱ¼äºÍÐÔÄÜ¡£Qualys·¢ÏÖµÄÎå¸ö©¶´°üÂÞͨ¹ýÓÕÆ­needrestartʹÓù¥»÷Õß¿ØÖƵÄPYTHONPATH»òRUBYLIB»·¾³±äÁ¿ÔËÐнâÊÍÆ÷ £¬»òÒÔrootÉí·ÝÖ´ÐÐÈÎÒâshellÃüÁî¡£UbuntuÖ¸³öÒÑÔÚ3.8°æÖнâ¾öÕâЩÎÊÌâ £¬²¢½¨ÒéÓû§ÏÂÔØ×îв¹¶¡ £¬»ò½ûÓýâÊÍÆ÷ɨÃèÆ÷×÷ΪÁÙʱ»º½â´ëÊ©¡£


https://thehackernews.com/2024/11/decades-old-security-vulnerabilities.html


4. Ä«Î÷¸çÕþ¸®Ö´·¨ÊÂÎñ°ì¹«ÊÒÔâRansomhubÀÕË÷Èí¼þ¹¥»÷


11ÔÂ21ÈÕ £¬Ëæ×ÅÍøÂçÄþ¾²ÍþвµÄ²»Í£¼Ó¾ç £¬Ä«Î÷¸ç×Üͳ¿ËÀ͵Ïæ«¡¤ÐÁ±«Ä·Ö¤Êµ £¬Õþ¸®ÕýÔÚÊÓ²ìÒ»ÆðÕë¶ÔÆäÖ´·¨ÊÂÎñ°ì¹«ÊÒµÄÀÕË÷Èí¼þ¹¥»÷ʼþ¡£¾Ý³Æ £¬ÀÕË÷Èí¼þÍÅ»ïRansomhub¶Ô´Ë´Î¹¥»÷ÂôÁ¦ £¬²¢ÒÑÐû²¼Õþ¸®Êý¾Ý¿âÖеĸöÈËÐÅÏ¢Ñù±¾ £¬Éù³ÆÇÔÈ¡ÁË313 GBµÄÊý¾Ý £¬°üÂÞºÏͬ¡¢±£ÏպͲÆÕþÎļþµÈ¡£RansomhubÔÚÆäйÃÜÍøÕ¾ÉÏÐû²¼Á˱»µÁÎļþÑù±¾ £¬ÕâЩÎļþËƺõÀ´×ÔÕþ¸®¹ÍÔ±Êý¾Ý¿â¡£´Ë´Îʼþ²¢·ÇÄ«Î÷¸ç×Üͳ°ì¹«ÊÒÊ×´ÎÔâÓöÉæ¼°Ãô¸ÐÐÅÏ¢µÄºÚ¿Í¹¥»÷ £¬½ñÄê1Ô¾ÍÔø·¢Éú263Ãû±¨µÀ×Üͳ»î¶¯µÄ¼ÇÕߵĸöÈËÐÅÏ¢±»Ð¹Â¶µÄʼþ¡£RansomHubÊÇÒ»¸öÏà¶Ô½ÏеÄÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©×éÖ¯ £¬ÒòÆ伤½ø¼ÆıºÍ¶ÔÒªº¦»ù´¡ÉèÊ©µÄ¹Ø×¢¶øÉùÃûÀǽå £¬±»ÈÏΪÊÇKnightÀÕË÷Èí¼þµÄ¸Ä°æ £¬¸Ã¶ñÒâÈí¼þÕë¶Ô¶à¸öƽ̨ £¬²¢½ÓÄÉÁËË«ÖØÀÕË÷Ä£ÐÍ¡£


https://securityaffairs.com/171257/data-breach/mexico-suffers-ransomware-attack.html


5. ΢ÈíÖØÈ­¹¥»÷ONNXÍøÂçµöÓã·þÎñ £¬²é·â240¸öÓòÃû


11ÔÂ21ÈÕ £¬×Ô2017ÄêÆ𠣬΢ÈíÒѲé·âONNX£¨Ò»¸öÍøÂçµöÓã¼´·þÎñƽ̨£©¿Í»§Ê¹ÓõÄ240¸öÓòÃû £¬ÕâЩÓòÃû±»ÓÃÓÚÕë¶ÔÈ«Çò¹«Ë¾¼°¸öÈË¡£¾Ý΢Èí¡¶2024ÄêÊý×Ö·ÀÓù³ÂËß¡· £¬ONNX£¨ÓÖ³ÆCaffeineºÍFUHRER£©ÊÇ2024ÄêÉÏ°ëÄê×î´óµÄÖмäÈËÍøÂçµöÓã·þÎñ £¬Ã¿Ô·¢ËÍÊýǧÍòÖÁÊýÒÚ·âµöÓãÓʼþ £¬Ö÷ÒªÃé×¼Microsoft 365ÕÊ»§¼°ÆäËû¿Æ¼¼¹«Ë¾¿Í»§¡£ONNXͨ¹ýTelegramÍƹãÏúÊÛµöÓ㹤¾ß°ü £¬Ìṩ¶àÖÖ¶©ÔÄģʽ £¬²¢½ÓÄɶþάÂëµöÓãµÈÊֶΡ£ÕâЩ¹¥»÷ÄÑÒÔͨ¹ýµäÐͶ˵ã¼ì²â¼à¿Ø £¬¶ÔÍøÂçÄþ¾²ÌṩÉÌ×é³ÉÌôÕ½¡£ÔÚDark AtlasÄþ¾²Ñо¿ÈËÔ±Åû¶ÆäËùÓÐÕßAbanoub Nady£¨ÍøÃûMRxC0DER£©Éí·Ýºó £¬ONNXÔËÓªÓÚ6ÔÂÍ£Ö¹¡£Î¢Èíͨ¹ýÃñÊ·¨Í¥ÃüÁ¶ñÒâ¼¼Êõ»ù´¡ÉèÊ©Öض¨ÏòÖÁ×ÔÉí·þÎñÆ÷ £¬ÇжÏÍþвÐÐΪÕß·ÃÎÊȨÏÞ £¬²¢ÓÀ¾Ã×èÖ¹ÕâЩÓòÃûÓÃÓÚδÀ´µöÓã¹¥»÷¡£Î¢Èí»¹ÓëLF ProjectsºÏ×÷ £¬¸Ã¹«Ë¾ÊÇONNXÃû³ÆºÍ»Õ±êµÄºÏ·¨ËùÓÐÕß¡£


https://www.bleepingcomputer.com/news/security/microsoft-disrupts-onnx-phishing-as-a-service-infrastructure/


6. È«Çò¹¤Òµ¿ØÖÆϵͳ£¨ICS£©»¥ÁªÍø̻¶Çé¿öÑϾþ


11ÔÂ21ÈÕ £¬ÐµÄÑо¿ÏÔʾ £¬È«Çò175¸ö¹ú¼Ò/µØÓò´æÔÚÁè¼Ý145,000¸ö̻¶ÔÚ»¥ÁªÍøÉϵĹ¤Òµ¿ØÖÆϵͳ£¨ICS£© £¬ÆäÖÐÃÀ¹úÕ¼±ÈÁè¼ÝÈý·ÖÖ®Ò»¡£ÕâЩICS·þÎñ̻¶Ö÷ÒªÔ´ÓÚ³£ÓõÄICSЭÒé £¬ÈçModbus¡¢IEC 60870-5-104µÈ £¬ÇÒµØÓò¼ä´æÔÚ²îÒì¡£ÀýÈç £¬Modbus¡¢S7ºÍIEC 60870-5-104ÔÚÅ·ÖÞ¸ü³£¼û £¬¶øFox¡¢BACnetµÈÔÚ±±ÃÀ¸ü³£¼û¡£Censys¹«Ë¾µÄ·ÖÎöÖ¸³ö £¬Ðí¶àICSЭÒé¿É×·ËÝÖÁ20ÊÀ¼Í70Äê´ú £¬µ«²¢Î´ÊµÏÖÓëÆäËûµØÓòÏàͬµÄÄþ¾²¸ïС£¾¡¹ÜרÃÅÕë¶ÔICSϵͳµÄÍøÂç¹¥»÷Ïà¶Ô½ÏÉÙ £¬µ«½üÄêÀ´ÓÐËùÔö¼Ó £¬ÌرðÊÇÔÚ¶íÎÚÕ½Õùºó¡£´ËÍâ £¬HMIÒ²Ô½À´Ô½¶àµØͨ¹ý»¥ÁªÍøÌṩÒÔÖ§³ÖÔ¶³Ì·ÃÎÊ £¬ÇÒ´ó¶àÊý̻¶µÄHMIλÓÚÃÀ¹ú¡£Censys»¹Ö¸³ö £¬ÓÃÓÚ¼à¿ØºÍÓëICSϵͳ½»»¥µÄHMIºÍICS·þÎñ´ó¶àλÓÚÒƶ¯»òÉÌÒµ¼¶»¥ÁªÍø·þÎñÌṩÉÌÉÏ £¬ÕâÔö¼ÓÁËʶ±ðºÍ֪ͨËùÓÐÕßµÄÄѶÈ¡£Òò´Ë £¬×éÖ¯±ØÐë½ÓÄÉ´ëʩʶ±ðºÍ±£»¤Ì»Â¶µÄOTºÍICSÉ豸 £¬¸üÐÂĬÈÏƾ¾Ý £¬²¢¼à¿ØÍøÂçÊÇ·ñ´æÔÚ¶ñÒâ»î¶¯¡£


https://thehackernews.com/2024/11/over-145000-industrial-control-systems.html