ÃÀ¹úÊ·ÉÏ×î´óÒ½ÁÆÊý¾Ýй¶ÊÂÎñ£ºChange HealthcareÔâÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2025-02-06

1. ÃÀ¹úÊ·ÉÏ×î´óÒ½ÁÆÊý¾Ýй¶ÊÂÎñ£ºChange HealthcareÔâÀÕË÷Èí¼þ¹¥»÷


1ÔÂ25ÈÕ£¬£¬£¬£¬ £¬£¬ÁªºÏ¿µ½¡¼¯ÍÅ×Ó¹«Ë¾Change HealthcareÔÚ2024Äê2ÔÂÔâÊÜÁËÀÕË÷Èí¼þ×éÖ¯ALPHV£¨ÓÖÃûBlack Cat£©µÄ¹¥»÷£¬£¬£¬£¬ £¬£¬µ¼ÖÂÔ¼1.9ÒÚÃÀ¹úÈ˵ÄÃô¸ÐÒ½ÁÆÊý¾Ýй¶£¬£¬£¬£¬ £¬£¬³ÉΪÃÀ¹úÀúÊ·ÉÏ×î´óµÄÒ½ÁÆÊý¾Ýй¶ÊÂÎñ ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÁËȱ·¦¶àÒòËØÉí·ÝÑéÖ¤µÄÊÜѬȾÕÊ»§ºÍCitrixÔ¶³Ì»á¼ûÈí¼þÉϵÄÊÜѬȾƾ֤£¬£¬£¬£¬ £¬£¬Ôì³ÉÁË8.72ÒÚÃÀÔªµÄ²ÆÎñËðʧºÍ6TBµÄÊý¾Ýй¶ ¡£¡£¡£¡£¡£¡£Ö»¹ÜºÚ¿Í½üÒ»ÄêÀ´Ò»Ö±ÔÚ»á¼û±»µÁÊý¾Ý£¬£¬£¬£¬ £¬£¬µ«UnitedHealthÉù³ÆÃ»ÓÐÖ¤¾ÝÅú×¢Êý¾Ý±»ÀÄÓà ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ £¬£¬´Ë´ÎÈëÇÖ̻¶Á˰üÀ¨¿µ½¡°ü¹ÜÏêϸÐÅÏ¢¡¢»¼ÕßÕï¶Ï¡¢²âÊÔЧ¹ûºÍÖÎÁÆÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÒ½ÁƼͼ£¬£¬£¬£¬ £¬£¬ÒÔ¼°Ð¡ÎÒ˽¼ÒÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕºÅÂëµÈÃô¸ÐÊý¾Ý ¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾Ö§¸¶ÁË2200ÍòÃÀÔªµÄÊê½ð£¬£¬£¬£¬ £¬£¬µ«BlackCatÓÕÆ­ÁËʵÑé´Ë´Î¹¥»÷µÄ¹ØÁª¹«Ë¾²¢Æ­È¡ÁËÊê½ð£¬£¬£¬£¬ £¬£¬µ¼Ö±»µÁÊý¾ÝÂäÈëÍøÂç·¸·¨·Ö×ÓÊÖÖÐ ¡£¡£¡£¡£¡£¡£´Ë´ÎйÃÜÊÂÎñ²»µ«Ö±½ÓÇÔÈ¡Êý¾Ý£¬£¬£¬£¬ £¬£¬»¹ÈÅÂÒÁËÌìϵÄÒ½ÁÆÐ§ÀÍ£¬£¬£¬£¬ £¬£¬¸øÔËÓª´øÀ´ÁËÖØ´óÌôÕ½£¬£¬£¬£¬ £¬£¬Òý·¢ÁËÈËÃǶԻ¼ÕßÒþ˽ºÍÊý¾ÝÇå¾²µÄµ£ÐÄ ¡£¡£¡£¡£¡£¡£ÎªÁË×ñÊØHIPAA£¬£¬£¬£¬ £¬£¬ÁªºÏ¿µ½¡¼¯ÍÅÒÑÏòÊÜÓ°Ïì×îÑÏÖØµÄСÎÒ˽¼Òת´ïÁ˴˴ι¥»÷ÊÂÎñ ¡£¡£¡£¡£¡£¡£


https://hackread.com/unitedhealth-groups-data-breach-impacts-americans/


2. TalkTalkÊý¾Ýй¶ÊÂÎñ£ºÍþвÕßÉù³ÆÇÔÈ¡1880ÍòÓû§Êý¾Ý


1ÔÂ27ÈÕ£¬£¬£¬£¬ £¬£¬Ó¢¹úµçÐŹ«Ë¾TalkTalkÔâÓöÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ £¬£¬Ò»Ãû×Ô³ÆÎª¡°b0nd¡±µÄÍþвÐÐΪÕßÔÚÍøÂç·¸·¨ÂÛ̳ÉÏÐû²¼¶Ô´Ë´ÎºÚ¿Í¹¥»÷ÈÏÕæ£¬£¬£¬£¬ £¬£¬²¢Éù³ÆÇÔÈ¡ÁËÁè¼Ý1880ÍòTalkTalkÓû§µÄÊý¾Ý£¬£¬£¬£¬ £¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢IPµØµã¡¢µç»°ºÅÂëºÍPINµÈÃô¸ÐÐÅÏ¢ ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ £¬£¬TalkTalk¹«Ë¾½²»°ÈËÌåÏÖÕâһ˵·¨¡°ÍêÈ«½û¾øÈ·ÇÒÑÏÖØÇ¿µ÷¡±£¬£¬£¬£¬ £¬£¬²¢Ö¸³ö´Ë´ÎÐ¹Â¶Éæ¼°µÚÈý·½Æ½Ì¨ ¡£¡£¡£¡£¡£¡£¾Ý͸¶£¬£¬£¬£¬ £¬£¬¸ÃÊÂÎñÔ´ÓÚÒ»¸öµÚÈý·½¹©Ó¦É̵Äϵͳ±»ÒâÍâ»á¼ûºÍÀÄÓ㬣¬£¬£¬ £¬£¬TalkTalkÕýÓ빩ӦÉÌÏàÖú½â¾ö¸ÃÎÊÌ⣬£¬£¬£¬ £¬£¬µ«²¢Î´Í¸Â¶¹©Ó¦ÉÌÃû³Æ ¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬ £¬£¬Ð¹Â¶µÄÊý¾ÝÊÇ´ÓµçÐÅÌṩÉÌʹÓõÄAscendon SaaSƽ̨ÇÔÈ¡µÄ£¬£¬£¬£¬ £¬£¬¶ø¸Ãƽ̨ÌṩÉÌCSGÈÏ¿ÉÊý¾ÝÊÇ´ÓÆäÆ½Ì¨ÉÏÇÔÈ¡µÄ£¬£¬£¬£¬ £¬£¬µ«ÌåÏÖÖ»ÓÐÒ»Ãû¿Í»§Êܵ½Ó°Ï죬£¬£¬£¬ £¬£¬ÇÒûÓÐÖ¤¾ÝÅú×¢ÆäÊÖÒÕºÍϵͳÊܵ½ÁËË𺦠¡£¡£¡£¡£¡£¡£Õâ²¢·ÇTalkTalkÊ×´ÎÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ £¬£¬2015Äê¸Ã¹«Ë¾Ð§ÀÍÆ÷Ò²ÔøÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬ £¬£¬Ó°ÏìÁË400ÍòÓû§ ¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/173526/cyber-crime/talktalk-confirms-data-breach.html


3. ʷŮʿ¼¯ÍÅÔâδ֪¹¥»÷ÕßÈëÇÖ£¬£¬£¬£¬ £¬£¬Åû¶Çå¾²Îó²î


1ÔÂ28ÈÕ£¬£¬£¬£¬ £¬£¬×ܲ¿Î»ÓÚÂ׶صĿç¹ú¹¤³Ì¾ÞͷʷŮʿ¼¯ÍÅ£¨Smiths Group£©½üÆÚÔâÓöÁËδ֪¹¥»÷ÕßµÄϵͳÈëÇÖ£¬£¬£¬£¬ £¬£¬µ¼ÖÂÇå¾²Îó²î±»Åû¶ ¡£¡£¡£¡£¡£¡£×÷Ϊһ¼ÒÔÚÂ×¶ØÖ¤È¯ÉúÒâËùÉÏÊеÄÓ¢¹ú¹«Ë¾£¬£¬£¬£¬ £¬£¬Ê·Å®Ê¿¼¯ÍÅÔÚ50¶à¸ö¹ú¼ÒÓµÓÐÁè¼Ý15,000ÃûÔ±¹¤£¬£¬£¬£¬ £¬£¬È¥ÄêÓªÊոߴï31.32ÒÚÓ¢°÷£¬£¬£¬£¬ £¬£¬Ö÷ҪЧÀÍÓÚÄÜÔ´¡¢Çå¾²¡¢°²±£¡¢º½¿Õº½ÌìºÍ¹ú·ÀÊг¡ ¡£¡£¡£¡£¡£¡£ÔÚÖܶþÌá½»¸øÂ×¶ØÖ¤È¯ÉúÒâËùµÄÎļþÖУ¬£¬£¬£¬ £¬£¬Ê·Å®Ê¿¼¯ÍÅ͸¶ÕýÔÚÊÓ²ìÒ»ÆðÉæ¼°¡°Î´¾­ÊÚȨ»á¼û¹«Ë¾ÏµÍ³¡±µÄÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬ £¬£¬²¢Á¬Ã¦¸ôÀëÁËÊÜÓ°ÏìµÄϵͳ£¬£¬£¬£¬ £¬£¬Æô¶¯ÁËÓªÒµÒ»Á¬ÐÔÍýÏë ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾ÕýÓëÍøÂçÇ徲ר¼ÒÏàÖú£¬£¬£¬£¬ £¬£¬Æð¾¢»Ö¸´ÏµÍ³²¢ÆÀ¹À¶ÔÓªÒµµÄÆÕ±éÓ°Ï죬£¬£¬£¬ £¬£¬Í¬Ê±ÔÊÐí½«½ÓÄÉÒ»ÇÐÐëÒª²½·¥×ñÊØÏà¹Øî¿ÏµÒªÇ󣬣¬£¬£¬ £¬£¬²¢ÔÚ»ñµÃ¸ü¶àÐÅϢʱÌṩ¸üР¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ £¬£¬Ê·Å®Ê¿¼¯ÍÅÉÐδ͸¶ÈëÇÖµÄÏêϸʱ¼äºÍÊÇ·ñÓÐÓªÒµ»ò¿Í»§Êý¾Ý±»µÁ ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/engineering-giant-smiths-group-discloses-security-breach/


4. ËþËþ¿Æ¼¼ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ £¬£¬²¿·ÖITЧÀͶÌÔÝÖÐÖ¹


1ÔÂ31ÈÕ£¬£¬£¬£¬ £¬£¬ËþËþ¿Æ¼¼ÓÐÏÞ¹«Ë¾£¨Tata Technologies Ltd.£©£¬£¬£¬£¬ £¬£¬×÷ΪËþËþÆû³µµÄ×Ó¹«Ë¾£¬£¬£¬£¬ £¬£¬ÊÇÒ»¼ÒרעÓÚÆû³µÉè¼Æ¡¢º½¿Õº½Ì칤³Ì¼°×ÛºÏÑз¢¹¤³ÌµÄÓ¡¶ÈÉÏÊпç¹ú¿Æ¼¼¹«Ë¾ ¡£¡£¡£¡£¡£¡£¿ËÈÕ£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾ÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ £¬£¬µ¼Ö²¿·ÖITЧÀͲ»µÃ²»ÔÝÍ£ ¡£¡£¡£¡£¡£¡£Ö»¹ÜËþËþ¿Æ¼¼Ñ¸ËÙ½ÓÄÉÐж¯²¢Ðû²¼IT×ʲúÒѻָ´£¬£¬£¬£¬ £¬£¬µ«´Ë´Î¹¥»÷µÄÏêϸϸ½ÚºÍÓ°ÏìÈÔÔÚÊÓ²ìÖÐ ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ £¬£¬¿Í»§½»¸¶Ð§ÀÍÔÚÍøÂç¹¥»÷ʱ´ú¼á³ÖÖÜÈ«ÔËÐУ¬£¬£¬£¬ £¬£¬Î´¶Ô¿Í»§ÔËÓªÔì³ÉÓ°Ïì ¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÊÇ·ñÀÖ³ÉÇÔÈ¡Á˸ù«Ë¾µÄÈκÎÊý¾Ý£¬£¬£¬£¬ £¬£¬µ«ÀÕË÷Èí¼þ¹¥»÷ͨ³£Éæ¼°Êý¾Ý͵ÇÔ£¬£¬£¬£¬ £¬£¬¶Ô¿Æ¼¼¹«Ë¾¶øÑÔ£¬£¬£¬£¬ £¬£¬´ËÀàÊÂÎñ¿ÉÄܵ¼Ö¹«Ë¾ÉñÃØÊý¾Ýй¶£¬£¬£¬£¬ £¬£¬Ëðº¦ÖªÊ¶²úȨºÍÊÖÒÕ×éºÏ ¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬ £¬£¬HiveÀÕË÷Èí¼þ×éÖ¯Ôø¶ÔÓ¡¶È×î´óµÄ×ۺϵçÁ¦¹«Ë¾ËþËþµçÁ¦·¢¶¯¹¥»÷£¬£¬£¬£¬ £¬£¬ÇÔÈ¡²¢Ð¹Â¶Á˰üÀ¨¹¤³ÌʾÒâͼ¡¢²ÆÎñ¼Í¼ºÍСÎÒ˽¼Ò¿Í»§ÐÅÏ¢ÔÚÄÚµÄÃô¸ÐÊý¾Ý ¡£¡£¡£¡£¡£¡£´Ë´ÎËþËþ¿Æ¼¼ÔâÊܵĹ¥»÷ÔÙ´ÎÌáÐÑÆóÒµÐèÔöÇ¿ÍøÂçÇå¾²·À»¤ ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/indian-tech-giant-tata-technologies-hit-by-ransomware-attack/


5. GrubHubÔâÊý¾Ýй¶£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßʹÓõÚÈý·½ÕË»§ÈëÇÖϵͳ


2ÔÂ4ÈÕ£¬£¬£¬£¬ £¬£¬Ê³ÎïÅäË͹«Ë¾GrubHubÔâÓöÁËÒ»´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ £¬£¬¹¥»÷Õßͨ¹ýµÚÈý·½Ð§ÀÍÌṩÉ̵ÄÕË»§ÈëÇÖÁËGrubHubϵͳ£¬£¬£¬£¬ £¬£¬Ó°ÏìÁ˿ͻ§¡¢É̼ҺÍ˾»úµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬ £¬£¬µ«ÏêϸÊÜÓ°ÏìÊýĿδ¹ûÕæ ¡£¡£¡£¡£¡£¡£GrubHubѸËÙ½ÓÄÉÐж¯£¬£¬£¬£¬ £¬£¬ÖÕÖ¹ÁËÈëÇÖÕË»§µÄ»á¼ûȨÏÞ£¬£¬£¬£¬ £¬£¬²¢É¾³ýÁ˸ÃЧÀÍÌṩÉÌ£¬£¬£¬£¬ £¬£¬Í¬Ê±Ô¼ÇëÍⲿר¼ÒÆÀ¹ÀÓ°Ïì¡¢ÂÖ»»ÃÜÂë²¢ÔöÇ¿ÁËÄÚ²¿Ð§À͵ÄÒì³£¼ì²â ¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬ £¬£¬¹¥»÷Õßδ»ñÈ¡Ãô¸ÐµÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢£¬£¬£¬£¬ £¬£¬µ«¿ÉÄÜ»ñÈ¡Á˲¿·ÖУ԰ʳÌÃÓû§µÄÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¼°²¿·ÖÖ§¸¶¿¨ÐÅÏ¢£¨°üÀ¨¿¨ÀàÐͺÍ×îºóËÄλ¿¨ºÅ£© ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬¹¥»÷Õß»¹»á¼ûÁËijЩÒÅÁôϵͳµÄÉ¢ÁÐÃÜÂ룬£¬£¬£¬ £¬£¬GrubHubÒÑ×Ô¶¯ÂÖ»»¿ÉÄܱ£´æÎ£º¦µÄÃÜÂ룬£¬£¬£¬ £¬£¬²¢±Þ²ß¿Í»§Ê¹ÓÃÆæÒìÃÜÂëÒÔ½µµÍΣº¦ ¡£¡£¡£¡£¡£¡£GrubHubÔÚÌìÏÂ4000¶à¸ö¶¼»áÓµÓÐÁè¼Ý375000¼ÒÉ̼ҺÍ200000ÃûÅäËÍÏàÖúͬ°é£¬£¬£¬£¬ £¬£¬È¥ÄêÒò¶àÏîÎ¥·¨ÐÐΪ֧¸¶ÁË2500ÍòÃÀԪϢÕù½ð ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/grubhub-data-breach-impacts-customers-drivers-and-merchants/


6. CISA ½«Ëĸö±»Æð¾¢Ê¹ÓõÄÎó²îÌí¼Óµ½ KEV Ŀ¼ÖÐ


2ÔÂ5ÈÕ£¬£¬£¬£¬ £¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÖܶþÐû²¼ÁËÒ»ÏîÖ÷ÒªÇ徲ͨ¸æ£¬£¬£¬£¬ £¬£¬ÏòÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖÐÐÂÔöÁËËĸöÇå¾²Îó²î£¬£¬£¬£¬ £¬£¬²¢ÖÒÑÔÕâЩÎó²îÕý±»Æð¾¢Ê¹Óà ¡£¡£¡£¡£¡£¡£ÕâЩÎó²î°üÀ¨£ºCVE-2024-45195£¬£¬£¬£¬ £¬£¬Ò»¸öApache OFBizÖеÄÇ¿ÖÆä¯ÀÀÎó²î£¬£¬£¬£¬ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß»ñȡδÊÚȨ»á¼ûȨÏÞ²¢Ö´ÐÐí§Òâ´úÂ루ÒÑÐÞ¸´£©£» £»£» £»CVE-2024-29059£¬£¬£¬£¬ £¬£¬Microsoft .NET FrameworkÖеÄÐÅϢй¶Îó²î£¬£¬£¬£¬ £¬£¬¿ÉÄÜ̻¶Ãô¸ÐÐÅÏ¢²¢µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¨ÒÑÐÞ¸´£©£» £»£» £»CVE-2018-9276£¬£¬£¬£¬ £¬£¬Paessler PRTGÍøÂç¼àÊÓÆ÷ÖеIJÙ×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬ £¬£¬ÔÊÐíÖÎÀíȨÏ޵Ĺ¥»÷ÕßÖ´ÐÐÏÂÁÒÑÐÞ¸´£©£» £»£» £»ÒÔ¼°CVE-2018-19410£¬£¬£¬£¬ £¬£¬Í¬ÑùÊÇPaessler PRTGÖеÄÍâµØÎļþ°üÀ¨Îó²î£¬£¬£¬£¬ £¬£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õß½¨Éè¾ßÓжÁдȨÏÞµÄÓû§£¨ÒÑÐÞ¸´£© ¡£¡£¡£¡£¡£¡£Ö»¹ÜÕâЩÎó²îÒÑÓɸ÷×Ô¹©Ó¦ÉÌÐÞ¸´£¬£¬£¬£¬ £¬£¬µ«ÏÖÔÚÉÐÎÞ¹ØÓÚËüÃÇÔõÑùÔÚÕæÊµ¹¥»÷Öб»Ê¹ÓõÄÏêϸ¹ûÕæ±¨¸æ ¡£¡£¡£¡£¡£¡£Îª´Ë£¬£¬£¬£¬ £¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©ÏÂÊô»ú¹¹±»½ôÆÈ±Þ²ßÔÚ2025Äê2ÔÂ25ÈÕǰӦÓÃÐëÒªµÄÐÞ¸´²½·¥£¬£¬£¬£¬ £¬£¬ÒÔÓÐÓÃÌá·ÀÕâЩ×Ô¶¯Íþв£¬£¬£¬£¬ £¬£¬È·±£ÍøÂçÇå¾² ¡£¡£¡£¡£¡£¡£



https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html