MUT-1244ÍþвÐÐΪÕß´ó¹æÄ£ÇÔÈ¡WordPressƾ֤¼°Ãô¸ÐÐÅÏ¢

Ðû²¼Ê±¼ä 2024-12-17

1. MUT-1244ÍþвÐÐΪÕß´ó¹æÄ£ÇÔÈ¡WordPressƾ֤¼°Ãô¸ÐÐÅÏ¢


12ÔÂ14ÈÕ £¬£¬£¬£¬£¬£¬£¬ÃûΪMUT-1244µÄÍþвÐÐΪÕßÔÚÒ»³¡³¤´ïÒ»ÄêµÄ´ó¹æÄ£»£»£»£»£»£»î¶¯ÖÐ £¬£¬£¬£¬£¬£¬£¬Í¨¹ýľÂí²¡¶¾Ñ¬È¾µÄWordPressƾ֤¼ì²éÆ÷ÇÔÈ¡ÁËÁè¼Ý390,000¸öWordPressƾ֤¡£¡£¡£¡£Í¬Ê± £¬£¬£¬£¬£¬£¬£¬¸ÃÐÐΪÕß»¹´ÓÊý°ÙÃûÊܺ¦Õߣ¨°üÀ¨ºì¶Ó³ÉÔ±¡¢ÉøÍ¸²âÊÔÖ°Ô±¡¢Çå¾²Ñо¿Ö°Ô±ÒÔ¼°¶ñÒâÐÐΪÕߣ©µÄÊÜѬȾϵͳÖÐ͵ȡÁËSSH˽ԿºÍAWS»á¼ûÃÜÔ¿¡£¡£¡£¡£¹¥»÷ÕßʹÓñ»Ä¾Âí»¯µÄGitHub´æ´¢¿âÍÆËͶñÒâ¿´·¨ÑéÖ¤Îó²îºÍ¾ÙÐÐÍøÂç´¹Âڻ £¬£¬£¬£¬£¬£¬£¬ÓÕÆ­Ä¿µÄ×°ÖÃαװ³ÉCPU΢Âë¸üеļÙÄÚºËÉý¼¶¡£¡£¡£¡£ÕâЩ´æ´¢¿âÔöÌíÁËÆäÕýµ±ÐÔ £¬£¬£¬£¬£¬£¬£¬Ê¹µÃÇ徲רҵְԱºÍÍþвÐÐΪÕ߸üÈÝÒ×ÔËÐÐËüÃÇ¡£¡£¡£¡£¹¥»÷Õßͨ¹ýGitHub reposÒÔ¶àÖÖ·½·¨Í¶·ÅÓÐÓÃÔØºÉ £¬£¬£¬£¬£¬£¬£¬°üÀ¨´øÓкóÃŵÄÉèÖñàÒëÎļþ¡¢¶ñÒâPDFÎļþ¡¢PythonͶ·ÅÆ÷ÒÔ¼°¶ñÒânpm°ü¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯ÓëÁíÒ»´Î³¤´ïÒ»ÄêµÄ¹©Ó¦Á´¹¥»÷ÓÐÖØµþ £¬£¬£¬£¬£¬£¬£¬ÆäÖÐÉæ¼°ÇÔÈ¡Êý¾ÝºÍÍÚ¾òÃÅÂÞ±Ò¼ÓÃÜÇ®±Ò¡£¡£¡£¡£MUT-1244Äܹ»»á¼û²¢Ð¹Â¶Ë½ÈËSSHÃÜÔ¿¡¢AWSƾ֤µÈÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÍøÂçÇå¾²ÉçÇøÄÚµÄÐÅÈÎ £¬£¬£¬£¬£¬£¬£¬ÔÚÄ¿µÄ²»ÖªÇéµÄÇéÐÎÏÂÖ´ÐжñÒâÈí¼þ £¬£¬£¬£¬£¬£¬£¬ÈëÇÖÁËÊýʮ̨»úе¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/390-000-wordpress-accounts-stolen-from-hackers-in-supply-chain-attack/


2. CISA½«CleoÎó²îCVE-2024-50623Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖÐ


12ÔÂ14ÈÕ £¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Ó°ÏìCleo²úÆ·µÄÎó²îCVE-2024-50623£¨CVSSÆÀ·Ö8.8£©ÁÐÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£Cleo¹«Ë¾·¢Ã÷ÁËÒ»¸ö²»ÊÜÏÞÖÆµÄÎļþÉÏ´«ºÍÏÂÔØÎó²î £¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐÐ £¬£¬£¬£¬£¬£¬£¬²¢½¨Òé¿Í»§Á¬Ã¦½«Harmony¡¢VLTraderºÍLexiComʵÀýÉý¼¶µ½×îв¹¶¡°æ±¾5.8.0.21ÒÔ½â¾öDZÔÚ¹¥»÷ǰÑÔ¡£¡£¡£¡£È»¶ø £¬£¬£¬£¬£¬£¬£¬Çå¾²¹«Ë¾Huntress±¨¸æ³Æ £¬£¬£¬£¬£¬£¬£¬×ÝÈ»×°ÖÃÁ˸ò¹¶¡ £¬£¬£¬£¬£¬£¬£¬ÔËÐÐ5.8.0.21µÄϵͳÈÔ¿ÉÄܱ»Ê¹Óᣡ£¡£¡£Huntress·¢Ã÷ÁËÕë¶ÔCleoÎļþ´«ÊäÈí¼þµÄ×Ô¶¯¹¥»÷ £¬£¬£¬£¬£¬£¬£¬²¢¹ûÕæÁËÉæ¼°ÈýÖÖCleo²úÆ·µÄÒ»Á¬¹¥»÷¡£¡£¡£¡£Ê×ϯÇå¾²Ñо¿Ô±Caleb Stewart¿ª·¢ÁËʹÓÃí§ÒâÎļþдÈëÎó²îµÄPython¾ç±¾ £¬£¬£¬£¬£¬£¬£¬²¢Ö¤ÊµÁËÎó²îµÄÓÐÓÃÐÔ¡£¡£¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê1ÔÂ3ÈÕ֮ǰÐÞ¸´´ËÎó²î £¬£¬£¬£¬£¬£¬£¬×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î £¬£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»£»¤ÍøÂçÃâÊܹ¥»÷¡£¡£¡£¡£


https://securityaffairs.com/171973/security/u-s-cisa-adds-cleo-harmony-vltrader-and-lexicom-flaw-to-its-known-exploited-vulnerabilities-catalog.html


3. ConnectOnCallÔ¶³ÌÒ½ÁÆÆ½Ì¨ÔâÖØ´óÊý¾Ýй¶


12ÔÂ16ÈÕ £¬£¬£¬£¬£¬£¬£¬ConnectOnCallÊÇÒ»¸öרעÓÚÔöǿҽÁÆÐ§ÀÍÌṩÕßÓ뻼ÕßÏàͬµÄÔ¶³ÌÒ½ÁÆÆ½Ì¨ £¬£¬£¬£¬£¬£¬£¬¿ËÈÕÅû¶ÁËÒ»ÆðÖØ´óÊý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁè¼Ý900,000È˵ÄСÎÒ˽¼ÒÐÅÏ¢¼°Ò½ÁÆÐÅÏ¢Çå¾²¡£¡£¡£¡£¸Ãƽ̨Ìṩ×Ô¶¯»¼Õߺô½Ð¸ú×Ù¡¢HIPAAºÏ¹æÌ¸Ì칦Ч £¬£¬£¬£¬£¬£¬£¬²¢Óëµç×Ó¿µ½¡¼Í¼ϵͳ¼¯³É¡£¡£¡£¡£5ÔÂ12ÈÕ £¬£¬£¬£¬£¬£¬£¬ConnectOnCall·¢Ã÷Çå¾²Îó²î £¬£¬£¬£¬£¬£¬£¬¾­ÊÓ²ìÈ·ÈÏ £¬£¬£¬£¬£¬£¬£¬2024Äê2ÔÂ16ÈÕÖÁ5ÔÂ12ÈÕʱ´ú £¬£¬£¬£¬£¬£¬£¬ÓÐδ֪µÚÈý·½»á¼ûÁËÆ½Ì¨¼°Ó¦ÓóÌÐòÄڵIJ¿·ÖÊý¾Ý £¬£¬£¬£¬£¬£¬£¬°üÀ¨Ò½»¼Í¨Ñ¶ÐÅÏ¢¡£¡£¡£¡£ÊÂÎñÆØ¹âºó £¬£¬£¬£¬£¬£¬£¬¹«Ë¾Ñ¸ËÙÔ¼ÇëÍøÂçÇ徲ר¼Ò £¬£¬£¬£¬£¬£¬£¬ÏÂÏß²úÆ· £¬£¬£¬£¬£¬£¬£¬²¢ÔÚÇå¾²ÇéÐÎÖоÙÐÐÊý¾Ý»Ö¸´ £¬£¬£¬£¬£¬£¬£¬Í¬Ê±Í¨ÖªÁËÁª°îÖ´·¨²¿·Ö¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢¿ÉÄܰüÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅ¡¢Ò½ÁƼͼºÅ¼°¿µ½¡×´Ì¬µÈ¡£¡£¡£¡£Ö»¹ÜÏÖÔÚδ·¢Ã÷ÐÅÏ¢ÀÄÓûò»¼ÕßÊܺ¦ÇéÐÎ £¬£¬£¬£¬£¬£¬£¬ConnectOnCallÈÔ½¨ÒéÊÜÓ°ÏìСÎÒ˽¼Ò¼á³ÖСÐÄ £¬£¬£¬£¬£¬£¬£¬²¢±¨¸æ¿ÉÒÉÉí·Ý͵ÇÔ»òڲƭÐÐΪ¡£¡£¡£¡£¹«Ë¾ÒÑÏòÖ´·¨²¿·Ö±¨¸æ²¢Í¨ÖªÊÜÓ°ÏìСÎÒ˽¼Ò £¬£¬£¬£¬£¬£¬£¬ÎªÆäÖÐÓÐÏÞÊýÄ¿µÄÉç»áÇå¾²ºÅÂëÊÜÓ°ÏìÕßÌṩÉí·ÝºÍÐÅÓÃ¼à¿ØÐ§ÀÍ £¬£¬£¬£¬£¬£¬£¬Í¨¹ýÓʼÄ֪ͨÐŵķ½·¨¼û¸æÏà¹ØÇéÐΡ£¡£¡£¡£


https://securityaffairs.com/172053/data-breach/connectoncall-data-breach-impacted-over-900000-individuals.html


4. µÂ¿ËÈøË¹Àí¹¤´óѧ¿µ½¡¿ÆÑ§ÖÐÐÄÔâÍøÂç¹¥»÷


12ÔÂ16ÈÕ £¬£¬£¬£¬£¬£¬£¬µÂ¿ËÈøË¹Àí¹¤´óѧ¿µ½¡¿ÆÑ§ÖÐÐļ°Æä°£¶ûÅÁË÷·ÖУ½üÆÚÔâÊÜÁËÒ»´ÎÍøÂç¹¥»÷ £¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÅÌËã»úϵͳºÍÓ¦ÓóÌÐòÖÐÖ¹ £¬£¬£¬£¬£¬£¬£¬²¢¿ÉÄÜй¶ÁË140ÍòÃû»¼ÕßµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¸Ã»ú¹¹ÊÇÒ»¼Ò¹«¹²Ñ§ÊõÒ½ÁÆ»ú¹¹ £¬£¬£¬£¬£¬£¬£¬ÈÏÕæ½ÌÓý¡¢ÅàѵºÍ»¼ÕßÕչ˻¤Ê¿Ð§ÀÍ¡£¡£¡£¡£¹¥»÷µ¼ÖÂ2024Äê9ÔÂ17ÈÕÖÁ9ÔÂ29ÈÕʱ´ú´Ó¸Ã»ú¹¹ÍøÂçÖлá¼û»òɾ³ýÁËijЩÎļþºÍÎļþ¼Ð¡£¡£¡£¡£¿£¿£¿£¿£¿£¿ÉÄÜй¶¸øºÚ¿ÍµÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢Õþ¸®Éí·ÝÖ¤ºÅÂë¡¢²ÆÎñÕË»§ÐÅÏ¢¡¢¿µ½¡°ü¹ÜÐÅÏ¢¡¢Ò½ÁÆÐÅÏ¢¡¢Õ˵¥/Ë÷ÅâÊý¾Ý¡¢Õï¶ÏºÍÖÎÁÆÐÅÏ¢µÈ¡£¡£¡£¡£¸Ã»ú¹¹ÒÑ֪ͨÊÜÓ°ÏìµÄÈË £¬£¬£¬£¬£¬£¬£¬²¢ÎªËûÃÇÌṩÃâ·ÑµÄÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£½¨ÒéÊÜÓ°ÏìµÄСÎÒ˽¼Ò¼á³ÖСÐÄ £¬£¬£¬£¬£¬£¬£¬Ìá·ÀDZÔÚµÄÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¹¥»÷ £¬£¬£¬£¬£¬£¬£¬²¢¼à¿ØËûÃǵÄÐÅÓñ¨¸æºÍ¿µ½¡°ü¹ÜÕ˵¥¡£¡£¡£¡£¾Ý³Æ £¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÓÉÃûΪInterlockµÄÀÕË÷Èí¼þ×éÖ¯ÈÏÕæ £¬£¬£¬£¬£¬£¬£¬¸Ã×é֯й¶ÁË210Íò¸öÎļþ £¬£¬£¬£¬£¬£¬£¬×ܼÆ2.6TBµÄÊý¾Ý £¬£¬£¬£¬£¬£¬£¬¾Ý³ÆÊǴӸûú¹¹ÇÔÈ¡µÄ¡£¡£¡£¡£InterlockË÷ÒªµÄÊê½ð½ð¶î´ÓÊýÊ®ÍòÃÀÔªµ½Êý°ÙÍòÃÀÔª²»µÈ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/texas-tech-university-system-data-breach-impacts-14-million-patients/


5. ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯Èö²¥Lumma StealerÐÅÏ¢ÇÔÈ¡Èí¼þ


12ÔÂ16ÈÕ £¬£¬£¬£¬£¬£¬£¬Ò»ÏîÃûΪ¡°DeceptionAds¡±µÄ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯ÕýÔÚʹÓÃMonetag¹ã¸æÍøÂçÈö²¥Lumma StealerÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¸Ã»î¶¯Í¨¹ýÐéαµÄCAPTCHAÑéÖ¤Ò³ÃæÓÕÆ­Óû§ÔËÐжñÒâPowerShellÏÂÁî £¬£¬£¬£¬£¬£¬£¬´Ó¶øÑ¬È¾¶ñÒâÈí¼þ¡£¡£¡£¡£Guardio LabsºÍInfobloxµÄÑо¿Ö°Ô±·¢Ã÷ £¬£¬£¬£¬£¬£¬£¬ÕâÒ»²Ù×÷ÓÉÃûΪ¡°Vane Viper¡±µÄÍþвÐÐΪÕßʵÑé £¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÕýµ±¹ã¸æÍøÂçÉϵĴó¹æÄ£¹ã¸æ½«Óû§´øµ½ÐéαµÄCAPTCHAÒ³Ãæ¡£¡£¡£¡£CAPTCHAÒ³Ãæ°üÀ¨JavaScript´úÂë £¬£¬£¬£¬£¬£¬£¬½«¶ñÒâPowerShellÏÂÁî¸´ÖÆµ½Óû§¼ôÌù°å £¬£¬£¬£¬£¬£¬£¬²¢ÓÕµ¼Óû§Ö´ÐС£¡£¡£¡£Lumma Stealer¿É´Óä¯ÀÀÆ÷ÖÐÇÔÈ¡cookie¡¢Æ¾Ö¤¡¢ÃÜÂë¡¢ÐÅÓÿ¨ºÍä¯ÀÀÀúÊ·¼Í¼ £¬£¬£¬£¬£¬£¬£¬ÒÔ¼°¼ÓÃÜÇ®±ÒÇ®°ü¡¢Ë½Ô¿ºÍÃô¸ÐÎı¾Îļþ¡£¡£¡£¡£GuardioLabsÒÑÏòMonetagºÍBeMob±¨¸æ´ËÀÄÓÃÐÐΪ £¬£¬£¬£¬£¬£¬£¬²¢»ñµÃʵʱÏìÓ¦¡£¡£¡£¡£È»¶ø £¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯ÔÚ12Ô·ºÆðËÕÐÑ £¬£¬£¬£¬£¬£¬£¬Åú×¢ÍþвÐÐΪÕßÊÔͼͨ¹ý²î±ð¹ã¸æÍøÂç»Ö¸´ÔËÓª¡£¡£¡£¡£Óû§Ó¦×èÖ¹Ö´ÐÐÍøÕ¾ÌáÐѵÄÏÂÁî £¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇÄÇЩð³äÐÞ¸´»òÑéÖ¤ÂëµÄÏÂÁî £¬£¬£¬£¬£¬£¬£¬²¢ÉóÉ÷ʹÓõÁ°æÈí¼þ»ò²»·¨Á÷ýÌåÍøÕ¾¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/malicious-ads-push-lumma-infostealer-via-fake-captcha-pages/


6. Â޵µºÖÝRIBridgesϵͳÔâBrain CipherÀÕË÷Èí¼þ¹¥»÷


12ÔÂ16ÈÕ £¬£¬£¬£¬£¬£¬£¬Â޵µºÖÝÖÒÑÔ³Æ £¬£¬£¬£¬£¬£¬£¬ÆäÓɵÂÇÚÖÎÀíµÄRIBridgesϵͳÔâÊÜÁËBrain CipherÀÕË÷Èí¼þÍÅ»ïµÄÈëÇÖ £¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÊý¾Ýй¶ £¬£¬£¬£¬£¬£¬£¬Ì»Â¶ÁËסÃñµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£RIBridgesÊǸÃÖÝÓÃÓÚÖÎÀíºÍÌṩ¹«¹²Ô®ÖúÍýÏëµÄÏÖ´ú×ÛºÏ×ʸñϵͳ¡£¡£¡£¡£´Ë´ÎÊÂÎñÓÚ2024Äê12ÔÂ5ÈÕ±»·¢Ã÷ £¬£¬£¬£¬£¬£¬£¬µÂÇÚÆÀ¹ÀºóÒÔΪºÚ¿Í¿ÉÄÜÇÔÈ¡Á˰üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢ºÍÆäËûÊý¾ÝµÄÎļþ¡£¡£¡£¡£ÊÜÓ°ÏìµÄÏîÄ¿°üÀ¨Ò½ÁƽòÌù¡¢Ôö²¹ÓªÑøÔ®ÖúÍýÏ롢ƶÀ§¼ÒÍ¥ÔÝʱԮÖúµÈ¶à¸ö¹«¹²Ð§ÀÍÏîÄ¿¡£¡£¡£¡£Ö»¹Üй¶µÄÊý¾ÝÈÔÔÚÆÀ¹ÀÖÐ £¬£¬£¬£¬£¬£¬£¬µ«¿ÉÄܰüÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂëºÍÄ³Ð©ÒøÐÐÐÅÏ¢¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¼ÒÍ¥½«Í¨¹ýÓʼþÊÕµ½Í¨Öª £¬£¬£¬£¬£¬£¬£¬²¢¿ÉÖµçרÓúô½ÐÖÐÐÄ×·ÇóÖ§³Ö¡£¡£¡£¡£Â޵µºÖÝÕþ¸®½¨ÒéסÃñÖØÖÃÃÜÂë¡¢ÉèÖÃڲƭ¾¯±¨ºÍÐÅÓö³½á £¬£¬£¬£¬£¬£¬£¬²¢Æô¶¯ÒøÐÐÌṩµÄÇå¾²²½·¥¡£¡£¡£¡£µÂÇÚ½²»°ÈËÈ·ÈÏ £¬£¬£¬£¬£¬£¬£¬Â޵µºÖݵÄϵͳÊÇÊܵ½Brain CipherÊý¾Ýй¶ӰÏìµÄ¡°¼òµ¥¿Í»§¶Ëϵͳ¡± £¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖ½«Óë¿Í»§ºÍÖ´·¨¹ÙÔ±ÏàÖúÕö¿ªÊӲ졣¡£¡£¡£


https://www.bleepingcomputer.com/news/security/rhode-island-confirms-data-breach-after-brain-cipher-ransomware-attack/