EverestÀÕË÷Èí¼þÍŶÓй¶PPMG»¼ÕßÃô¸ÐÐÅÏ¢

Ðû²¼Ê±¼ä 2024-11-26

1. EverestÀÕË÷Èí¼þÍŶÓй¶PPMG»¼ÕßÃô¸ÐÐÅÏ¢


11ÔÂ23ÈÕ£¬£¬£¬£¬£¬¼ÓÀû¸£ÄáÑÇÖݵÄ̫ƽÑó·Î²¿Ò½ÁƼ¯ÍÅ(PPMG)ÔâÓöÁËÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ¡£ ¡£¡£10ÔÂ25ÈÕ£¬£¬£¬£¬£¬EverestÀÕË÷Èí¼þÍŶÓÔÚ°µÍøÉÏÐû²¼ÁËPPMGµÄ»¼ÕßÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨2021ÖÁ2024ÄêµÄδ¼ÓÃÜСÎÒ˽¼ÒºÍÊܱ£»£»¤¿µ½¡ÐÅÏ¢¡£ ¡£¡£Ð¹Â¶µÄÊý¾ÝÒÔ150¶à¸öͼÏñÎļþºÍ¶à¸ö.csvÎļþµÄÐÎʽ±£´æ£¬£¬£¬£¬£¬Í¼ÏñÎļþÖ÷Ҫչʾ»¼ÕßµÄÖ÷´Î°ü¹Ü¿¨¼°²¿·Ö¼ÝÕÕÐÅÏ¢£¬£¬£¬£¬£¬¶ø.csvÎļþÔòº­¸ÇÁËÁ½ÖÜÄڵϼÕß¾ÍÕï¼Í¼£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµØµã¡¢¿µ½¡ÐÅÏ¢¼°Õ˵¥ÏêÇéµÈÃô¸ÐÄÚÈÝ¡£ ¡£¡£×îÐÂÒ»ÅúÊý¾Ý×èÖ¹10ÔÂ4ÈÕ£¬£¬£¬£¬£¬Ã¿Á½ÖܵÄ.csvÎļþ¼Í¼×Å300µ½500Ãû»¼ÕߵľÍÕïÇéÐΡ£ ¡£¡£È»¶ø£¬£¬£¬£¬£¬Ö±ÖÁÐÅÏ¢Ðû²¼Ê±£¬£¬£¬£¬£¬PPMGÍøÕ¾¼°ÃÀ¹úÎÀÉúÓ빫¹²Ð§ÀͲ¿(HHS)µÄ¹«¹²Î¥¹æ¹¤¾ßÉϾùδÐû²¼Ïà¹ØÍ¨Öª¡£ ¡£¡£DataBreachesÒÑÏòPPMGºÍEverest·¢ËÍѯÎÊ£¬£¬£¬£¬£¬µ«ÉÐδÊÕµ½»Ø¸´¡£ ¡£¡£


https://databreaches.net/2024/11/23/pacific-pulmonary-medical-group-patient-information-dumped-by-everest-ransomware-team/


2. Áè¼Ý2000̨Palo Alto Networks×°±¸ÔâºÚ¿ÍÈëÇÖ


11ÔÂ21ÈÕ£¬£¬£¬£¬£¬Palo Alto Networks ±¨¸æ³ÆÆä¶à´ï2000̨װ±¸¿ÉÄÜÒÑÔ⵽ʹÓÃÐÂÅû¶Çå¾²Îó²îµÄ¹¥»÷¡£ ¡£¡£¾ÝShadowserver»ù½ð»áͳ¼Æ£¬£¬£¬£¬£¬ÃÀ¹ú£¨554Àý£©ºÍÓ¡¶È£¨461Àý£©µÄѬȾ²¡Àý×î¶à£¬£¬£¬£¬£¬ÆäËûÊÜÓ°Ïì¹ú¼Ò°üÀ¨Ì©¹ú¡¢Ä«Î÷¸ç¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÍÁ¶úÆä¡¢Ó¢¹ú¡¢ÃØÂ³ºÍÄÏ·Ç¡£ ¡£¡£CensysÔò·¢Ã÷13,324¸ö¹ûÕæÌ»Â¶µÄÏÂÒ»´ú·À»ðǽ£¨NGFW£©ÖÎÀí½Ó¿Ú£¬£¬£¬£¬£¬ÆäÖÐ34%λÓÚÃÀ¹ú£¬£¬£¬£¬£¬µ«²¢·ÇËùÓÐ̻¶µÄÖ÷»ú¶¼±£´æÎó²î¡£ ¡£¡£Éæ¼°µÄÇå¾²Îó²î°üÀ¨CVE-2024-0012£¨CVSS·ÖÊý9.3£©ºÍCVE-2024-9474£¨CVSS·ÖÊý6.9£©£¬£¬£¬£¬£¬ËüÃÇ¿ÉÄܵ¼ÖÂÉí·ÝÑéÖ¤ÈÆ¹ýºÍȨÏÞÌáÉý£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄÜÖ´ÐжñÒâ²Ù×÷¡£ ¡£¡£Palo Alto NetworksÕý×·×Ù´úºÅΪOperation Lunar PeekµÄÎó²îʹÓÃÇéÐΣ¬£¬£¬£¬£¬²¢ÖÒÑÔ³ÆÕâЩÎó²îÒѱ»ÎäÆ÷»¯£¬£¬£¬£¬£¬¿ÉÄÜÒý·¢¸üÆÕ±éµÄÍþв»î¶¯¡£ ¡£¡£¸Ã¹«Ë¾ÒÑÊӲ쵽ÊÖ¶¯ºÍ×Ô¶¯É¨Ãè»î¶¯£¬£¬£¬£¬£¬²¢±Þ²ßÓû§¾¡¿ìÓ¦ÓÃÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬ÏÞÖÆÖÎÀí½çÃæ»á¼û£¬£¬£¬£¬£¬ÒÔ±ÜÃâÍⲿ»á¼û¡£ ¡£¡£


https://thehackernews.com/2024/11/warning-over-2000-palo-alto-networks.html


3. Blue YonderÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬¹©Ó¦Á´Ð§ÀÍÖÐÖ¹Ó°ÏìÆÕ±é


11ÔÂ25ÈÕ£¬£¬£¬£¬£¬¹©Ó¦Á´ÖÎÀí¹«Ë¾Blue Yonder£¨Ô­ÎªJDA Software£©£¬£¬£¬£¬£¬×÷ΪËÉϵÄ×Ó¹«Ë¾£¬£¬£¬£¬£¬ÄêÊÕÈ볬10ÒÚÃÀÔª£¬£¬£¬£¬£¬ÓµÓÐ6000ÃûÔ±¹¤£¬£¬£¬£¬£¬Îª°üÀ¨DHL¡¢À×ŵ¡¢È¸³²¡¢ÌØÒ×¹º¡¢ÐǰͿ˵È×ÅÃûÆóÒµÔÚÄÚµÄ3000Ãû¿Í»§ÌṩÈ˹¤ÖÇÄÜÇý¶¯µÄ¹©Ó¦Á´½â¾ö¼Æ»®¡£ ¡£¡£È»¶ø£¬£¬£¬£¬£¬¸Ã¹«Ë¾½üÆÚÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÆäÍйÜЧÀÍÍйÜÇéÐηºÆðÖÐÖ¹£¬£¬£¬£¬£¬Ó°ÏìÁËÆä¿Í»§£¬£¬£¬£¬£¬ÌØÊâÊÇÓ¢¹úµÄÔÓ»õµêÁ¬Ëøµê¡£ ¡£¡£Blue YonderÒÑÓëÍâ²¿ÍøÂçÇå¾²¹«Ë¾ÏàÖúÓ¦¶Ô´ËÊÂÎñ£¬£¬£¬£¬£¬²¢ÊµÑéÁ˶àÏî·ÀÓùºÍȡ֤ЭÒ飬£¬£¬£¬£¬µ«ÔÚÆä¹«¹²ÔÆÇéÐÎÖÐδ¼ì²âµ½¿ÉÒɻ¡£ ¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬Blue YonderÈÔÔÚ´¦Öóͷ£¶àÖÖ»Ö¸´Õ½ÂÔ£¬£¬£¬£¬£¬µ«ÉÐδ͸¶ÖÜÈ«»Ö¸´µÄÏêϸʱ¼ä±í¡£ ¡£¡£ÊÜÓ°ÏìµÄ¿Í»§£¬£¬£¬£¬£¬ÈçMorrisonsºÍSainsbury£¬£¬£¬£¬£¬ÒѽÓÄÉÓ¦¼±²½·¥À´Õ½Ê¤ÕâÒ»ÖÐÖ¹¡£ ¡£¡£×èÖ¹×îÐÂÐÂÎÅ£¬£¬£¬£¬£¬Blue YonderÉÐδÐû²¼ÓйØÇéÐεÄ×îÐÂÏ£Íû£¬£¬£¬£¬£¬ÍƲâÆäÍйÜЧÀÍÇéÐÎÈÔÈ»Êܵ½Ó°Ïì¡£ ¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÉÐδÓÐÈκÎÀÕË÷Èí¼þÍÅ»ïÐû²¼¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/blue-yonder-ransomware-attack-disrupts-grocery-store-supply-chain/


4. MetaÖØÈ­¹¥»÷ɱÖíÕ©Æ­£¬£¬£¬£¬£¬¹Ø±Õ200ÍòڲƭÕË»§


11ÔÂ24ÈÕ£¬£¬£¬£¬£¬×Ô½ñÄêÄêÍ·ÒÔÀ´£¬£¬£¬£¬£¬MetaÒÑ¹Ø±ÕÆäÆ½Ì¨ÉÏ200Íò¸öÓëɱÖíÕ©Æ­ºÍÆäËûڲƭÐÐΪÏà¹ØµÄÕË»§£¬£¬£¬£¬£¬ÕâЩÕË»§Ö÷ÒªÀ´×ÔÃåµé¡¢ÀÏÎΡ¢°¢ÁªÇõ¡¢·ÆÂɱöºÍ¼íÆÒÕ¯µÈÒÔ¡°Õ©Æ­ÆÍ´Ó¡±»î¶¯ÖøÃûµÄ¹ú¼Ò¡£ ¡£¡£ÕâЩթƭÖÐÐÄͨ¹ýÐû²¼ÐéαÕÐÆ¸ÐÅÏ¢ÒýÓÕÇóÖ°Õߣ¬£¬£¬£¬£¬Ç¿ÆÈËûÃÇ´ÓÊÂÍøÂçÕ©Æ­£¬£¬£¬£¬£¬²¢ÒÔÈËÉíݱ¶¾×÷ΪÍþв¡£ ¡£¡£MetaÓëÕâЩ¹ú¼ÒµÄÖ´·¨»ú¹¹ÏàÖú£¬£¬£¬£¬£¬·ÖÏíÇ鱨£¬£¬£¬£¬£¬¹¥»÷Õ©Æ­ÐÐΪ¡£ ¡£¡£ÆäÖУ¬£¬£¬£¬£¬¡°É±Öí¡±Õ©Æ­ÊÇÒ»ÖÖÆÆËðÐԵĽðÈÚͶ×ÊȦÌ×£¬£¬£¬£¬£¬ÒÀÀµÓÚºã¾ÃʹÓú͸߼¶ÓÕÆ­£¬£¬£¬£¬£¬Ä¿µÄÓû§±é²¼È«Çò¡£ ¡£¡£ËäÈ»¿´ËÆÏÝÈëȦÌ×µÄÈËÊýδ¼¸£¬£¬£¬£¬£¬µ«ÒѳÉΪÕâЩÓÐ×éÖ¯·¸·¨¼¯Íŵľ޶îÊÕÈëȪԴ¡£ ¡£¡£Meta½ÓÄÉÁËһϵÁв½·¥£¬£¬£¬£¬£¬°üÀ¨Ö´ÐÐΣÏÕ×éÖ¯ºÍСÎÒ˽¼ÒÕþ²ß¡¢Ê¹ÓÃÐÐΪºÍÊÖÒÕÐźÅʶ±ðºÍ×èÖ¹Õ©Æ­Ïà¹ØÕË»§ºÍ»ù´¡ÉèÊ©¡¢ÓëÈ«ÇòÖ´·¨²¿·ÖÏàÖú¡¢Óë¿Æ¼¼¹«Ë¾ºÍ×éÖ¯ÏàÖú¡¢ÌṩÓû§±£»£»¤¹¦Ð§ºÍ½¨ÒéµÈ£¬£¬£¬£¬£¬ÒÔ¼ì²âºÍ×èÖ¹ÕâЩȦÌ×£¬£¬£¬£¬£¬±£»£»¤Óû§ÃâÊÜڲƭ¡£ ¡£¡£MetaÌáÐÑÓû§ÉóÉ÷¿´´ýδ¾­ÇëÇóµÄͨѶ£¬£¬£¬£¬£¬×èÖ¹ÔÚÉ罻ýÌåºÍͨѶƽ̨ÉÏÆò´û»ò¼ÓÈë¿ÉÒÉͶ×ÊÍýÏë¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/meta-removes-over-2-million-accounts-pushing-pig-butchering-scams/


5. Ì©¹ú¾¯·½ÆÆ»ñ´ó¹æÄ£¶ÌÐÅ´¹ÂÚÕ©Æ­°¸£¬£¬£¬£¬£¬¾Ð²¶»õ³µË¾»ú


11ÔÂ24ÈÕ£¬£¬£¬£¬£¬Ì©¹ú¾¯·½ÀÖ³ÉÆÆ»ñÒ»Æð´ó¹æÄ£¶ÌÐÅÕ©Æ­°¸£¬£¬£¬£¬£¬¾Ð²¶ÁË»õ³µË¾»ú¡£ ¡£¡£¸Ã»õ³µ×°±¸Á˶ÌÐÅ·¢ÉäÆ÷£¬£¬£¬£¬£¬Äܹ»ÔÚ3¹«Àï¹æÄ£ÄÚÿСʱ·¢ËÍ10ÍòÌõ´¹ÂÚ¶ÌÐÅ¡£ ¡£¡£Õ©Æ­¶ÌÐÅÉù³ÆÓû§µÄ»ý·Ö¼´½«ÓâÆÚ£¬£¬£¬£¬£¬ÒýÓÕËûÃǵã»÷°üÀ¨¡°aisthailand¡±×Ö·û´®µÄ´¹ÂÚÍøÕ¾Á´½Ó£¬£¬£¬£¬£¬¸ÃÁ´½Óαװ³ÉÌ©¹ú×î´óÒÆ¶¯µç»°ÔËÓªÉÌAISµÄ¹Ù·½ÍøÕ¾¡£ ¡£¡£Óû§Ò»µ©µã»÷Á´½Ó²¢ÊäÈëÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢¾Í»á±»·¢»Ø¸øÕ©Æ­ÍŻ£¬£¬£¬£¬ÓÃÓÚÔÚÆäËû¹ú¼Ò¾ÙÐÐδ¾­ÊÚȨµÄÉúÒâ¡£ ¡£¡£¾ÝϤ£¬£¬£¬£¬£¬¸ÃÕ©Æ­ÍŻﲿ·Ö³ÉÔ±ÔÚÌ©¹ú£¬£¬£¬£¬£¬²¿·ÖÔÚÍâÑ󣬣¬£¬£¬£¬Í¨¹ý˽ÈËTelegramƵµÀЭµ÷Ðж¯¡£ ¡£¡£ÔÚÈýÌìÄÚ£¬£¬£¬£¬£¬¸ÃÍÅ»ïÏòÂü¹ÈסÃñ·¢ËÍÁ˽üÒ»°ÙÍòÌõÕ©Æ­¶ÌÐÅ¡£ ¡£¡£¾¯ÆÓÖ±ÔÚ×·²¶ÖÁÉÙÁíÍâÁ½ÃûÍÅ»ï³ÉÔ±£¬£¬£¬£¬£¬²¢»ñµÃÁËAISµÄЭÖú¶¨Î»¶ÌÐÅ·¢ÉäÆ÷¡£ ¡£¡£Ö»¹ÜÍøÂç´¹ÂÚÐÅÏ¢µÄÀÖ³ÉÂÊÒò¹«ÖÚÒâʶÌá¸ß¶ø½µµÍ£¬£¬£¬£¬£¬µ«ÔÚÉú³Ý÷缯µØÇøÒÔ¸ßËÙÈö²¥Ê±£¬£¬£¬£¬£¬ÈÔÄÜΪ·¸·¨Õß´øÀ´¿É¹ÛÊÕÒæ¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/bangkok-busts-sms-blaster-sending-1-million-scam-texts-from-a-van/


6. ΢Èí¶àÏî½¹µãЧÀÍÔâÓöÈ«ÇòÐÔ´ó¹æÄ£ÖÐÖ¹


11ÔÂ25ÈÕ£¬£¬£¬£¬£¬Î¢ÈíµÄ¶àÏî½¹µãЧÀÍ£¬£¬£¬£¬£¬°üÀ¨Microsoft 365¡¢Exchange Online¡¢TeamsºÍOutlook£¬£¬£¬£¬£¬ÔâÓöÁËÈ«ÇòÐԵĴó¹æÄ£ÖÐÖ¹£¬£¬£¬£¬£¬µ¼ÖÂÓû§ÔÚÉ罻ýÌåÉÏ·×·×±¨¸æÎÞ·¨·¢ËÍÓʼþ¡¢ÍøÕ¾Í߽⼰¹ýÊ§Ò³ÃæµÈÎÊÌâ¡£ ¡£¡£ÔÚÁùСʱÄÚ£¬£¬£¬£¬£¬DowndetectorÒÑÊÕµ½Êýǧ·ÝÓû§±¨¸æ£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄÓû§»¹ÌåÏÖÔÚÅþÁ¬OneDrive¡¢Purview¡¢CopilotµÈЧÀÍʱҲÓöµ½ÁËÕϰ­¡£ ¡£¡£Î¢ÈíËæºóÈÏ¿ÉÎÊÌâ±£´æ£¬£¬£¬£¬£¬²¢ÔÚÆ½Ì¨ÉÏÐû²¼ÉùÃ÷³ÆÕýÔڻعöÏà¹Ø±ä»»²¢Ñ°ÕÒÆäËû»º½â²½·¥£¬£¬£¬£¬£¬Í¬Ê±ÁгöÁËÊÜÓ°ÏìµÄЧÀͺÍʹÓó¡¾°¡£ ¡£¡£¹ÊÕÏÒ»Á¬11¸öСʱºó£¬£¬£¬£¬£¬Î¢ÈíÑ¡ÔñÊÖ¶¯ÖØÆôЧÀÍÆ÷£¬£¬£¬£¬£¬²¢ÔÚÖÎÀíÖÐÐĵÄÊÂÎñ±¨¸æÖÐÈ·ÈϸÃÖÐÖ¹×èÖ¹Á˿ͻ§Í¨¹ý¶àÖÖ·½·¨»á¼ûExchange Online¡£ ¡£¡£Í¬Ê±£¬£¬£¬£¬£¬Ò»Ð©¿Í»§ÔÚʹÓÃMicrosoft Fabric¡¢Microsoft BookingsºÍMicrosoft Defender for Office 365µÈЧÀÍʱҲÓöµ½ÁËÎÊÌâ¡£ ¡£¡£Î¢ÈíÌåÏÖÒÑ×îÏȰ²ÅÅÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬²¢ÊÖ¶¯ÖØÆô²¿·Ö²»¿µ½¡µÄ»úе£¬£¬£¬£¬£¬µ«Ö±µ½25ÈÕ12µã33·Ö£¨EST£©£¬£¬£¬£¬£¬°²ÅŵÄÐÞ¸´³ÌÐòÉÐδµ¼ÖÂÍêÈ«µÄЧÀͻָ´¡£ ¡£¡£18µã25·Ö£¨EST£©£¬£¬£¬£¬£¬Î¢Èí½øÒ»²½·ÖÏíÁËÊÂÎñÐÅÏ¢£¬£¬£¬£¬£¬³ÆÊ¹ÊÊÇÓÉÒ»¸öµ¼ÖÂЧÀÍÆ÷·ÓÉÖØÊÔÇëÇó¼¤ÔöµÄ¸ü¸ÄÒýÆðµÄ£¬£¬£¬£¬£¬ÍŶÓÕýÔÚÆð¾¢Ö´ÐкóÐøÐж¯£¬£¬£¬£¬£¬²¢Æð¾¢»Ö¸´ËùÓй¦Ð§¡£ ¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-365-outage-impacts-exchange-online-teams-sharepoint/