Ç×¶íºÚ¿ÍNoname057(16)Õë¶ÔÒâ´óÀû·¢¶¯´ó¹æÄ£ÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2025-01-14

1. Ç×¶íºÚ¿ÍNoname057(16)Õë¶ÔÒâ´óÀû·¢¶¯´ó¹æÄ£ÍøÂç¹¥»÷


1ÔÂ12ÈÕ£¬£¬£¬ £¬£¬£¬£¬Ç×¶íºÚ¿Í×éÖ¯NoName057(16)¶ÔÒâ´óÀûÌᳫÁËһϵÁÐÍøÂç¹¥»÷£¬£¬£¬ £¬£¬£¬£¬Ä¿µÄ°üÀ¨¸÷²¿Î¯¡¢Õþ¸®»ú¹¹¡¢Òªº¦»ù´¡ÉèÊ©ÍøÕ¾ÒÔ¼°Ë½ÈË×éÖ¯£¬£¬£¬ £¬£¬£¬£¬Ç¡·êÎÚ¿ËÀ¼×ÜͳÔóÁ¬Ë¹»ù»á¼ûÒâ´óÀû¡£¡£¡£¡£¡£¸ÃºÚ¿Í×éÖ¯ÔÚÆäTelegramƵµÀÉÏÐû²¼¶Ô´ËÈÏÕæ£¬£¬£¬ £¬£¬£¬£¬²¢Ö¸³ö¹¥»÷ÊÇÓÉÓÚÒâ´óÀû×ÜÀí÷ÂåÄáÔÚ»á¼ûÔóÁ¬Ë¹»ùÊ±ÖØÉêÁ˶ÔÎÚ¿ËÀ¼µÄÖÜȫ֧³Ö¡£¡£¡£¡£¡£¹¥»÷´ÓÖÜÁù×îÏÈ£¬£¬£¬ £¬£¬£¬£¬Õë¶ÔÒâ´óÀû¸÷²¿Î¯ºÍÕþ¸®»ú¹¹£¬£¬£¬ £¬£¬£¬£¬ÖÜÈÕÔò²¨¼°Òâ´óÀûÒøÐкÍ˽ӪÆóÒµ¡£¡£¡£¡£¡£Ö»¹Ü´ËÀàºÚ¿Í»î¶¯²¢²»ÓÐÊý£¬£¬£¬ £¬£¬£¬£¬µ«´Ë´Î¹¥»÷Ôì³ÉÁËÆÆËðºÍÔÝʱµÄЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¹ú¼ÒÍøÂçÇå¾²¾Ö(ACN)µÄר¼ÒѸËÙ½éÈ룬£¬£¬ £¬£¬£¬£¬ÎªÊÜÓ°Ïì×éÖ¯Ìṩ֧³Ö¡£¡£¡£¡£¡£×Ô2022Äê3ÔÂÒÔÀ´£¬£¬£¬ £¬£¬£¬£¬¸Ã×éÖ¯Ò»Ö±»îÔ¾ÓÚÈ«Çò£¬£¬£¬ £¬£¬£¬£¬ÒÔÕþ¸®ºÍÒªº¦»ù´¡ÉèʩΪĿµÄ£¬£¬£¬ £¬£¬£¬£¬Ê¹ÓöàÖÖ¹¤¾ß¾ÙÐй¥»÷¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÔÚÊ¥µ®½Ú¼ÙÆÚʱ´ú£¬£¬£¬ £¬£¬£¬£¬¾ßÓÐÕ½ÂÔÒâÒ壬£¬£¬ £¬£¬£¬£¬ÓÉÓÚ´Ëʱ×éÖ¯Ö°Ô±ïÔÌ­£¬£¬£¬ £¬£¬£¬£¬ÏìӦʱ¼ä±äÂý£¬£¬£¬ £¬£¬£¬£¬Ê¹µÃ¹¥»÷Ô½·¢ÄÑÒÔ±»·¢Ã÷»ººÍ½â¡£¡£¡£¡£¡£


https://securityaffairs.com/172982/hacktivism/noname057-targets-italy.html


2. ΢ÈíÆðËßÍâ¹úºÚ¿Í×éÖ¯ÀÄÓÃAzure AIЧÀÍÖÆ×÷Óк¦ÄÚÈÝ


1ÔÂ11ÈÕ£¬£¬£¬ £¬£¬£¬£¬Î¢Èí¿ËÈÕÐû²¼¶ÔÒ»¸öÔËÓª¡°ºÚ¿Í¼´Ð§ÀÍ¡±»ù´¡ÉèÊ©µÄÍâ¹úºÚ¿Í×éÖ¯ÌáÆðËßËÏ¡£¡£¡£¡£¡£¸Ã×éÖ¯ÈÆ¹ý΢ÈíÌìÉúʽAIЧÀ͵ÄÇå¾²¿ØÖÆ£¬£¬£¬ £¬£¬£¬£¬ÖÆ×÷ð·¸ÐÔºÍÓк¦ÄÚÈÝ¡£¡£¡£¡£¡£¾Ý΢ÈíÊý×Ö·¸·¨²¿·Ö£¨DCU£©³Æ£¬£¬£¬ £¬£¬£¬£¬¸Ã×éÖ¯¿ª·¢ÁËÖØ´óÈí¼þ£¬£¬£¬ £¬£¬£¬£¬×¥È¡²¢Ê¹ÓÃ̻¶µÄ¿Í»§Æ¾Ö¤£¬£¬£¬ £¬£¬£¬£¬ÊÔͼ²»·¨»á¼ûÓµÓÐAIЧÀ͵ÄÕË»§£¬£¬£¬ £¬£¬£¬£¬²¢¸Ä±äÕâЩЧÀ͵ÄÄÜÁ¦¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬ £¬£¬£¬£¬ËûÃǽ«»á¼ûȨÏÞ³öÊÛ¸øÆäËû¶ñÒâÐÐΪÕߣ¬£¬£¬ £¬£¬£¬£¬²¢ÌṩÏêϸ˵Ã÷ÔõÑùʹÓÃÕâЩ¹¤¾ßÌìÉúÓк¦ÄÚÈÝ¡£¡£¡£¡£¡£Î¢ÈíÒÑ×÷·Ï¹¥»÷Õß»á¼ûȨÏÞ£¬£¬£¬ £¬£¬£¬£¬ÊµÑéÁËеÄÓ¦¶Ô²½·¥£¬£¬£¬ £¬£¬£¬£¬²¢Ç¿»¯ÁËÇå¾²²½·¥¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬Î¢Èí»¹»ñµÃÁËÒ»Ïî·¨ÔºÏÂÁ£¬£¬ £¬£¬£¬£¬²é·âÁËÒªº¦ÍøÕ¾¡°aitism[.]net¡±¡£¡£¡£¡£¡£¾Ý·¨Í¥ÎļþÏÔʾ£¬£¬£¬ £¬£¬£¬£¬ÖÁÉÙÓÐÈýÃûδ֪СÎÒ˽¼Ò¼ÓÈëÁË´Ë´ÎÐж¯£¬£¬£¬ £¬£¬£¬£¬Ê¹Óñ»µÁµÄAzure APIÃÜÔ¿ºÍ¿Í»§Éí·ÝÑéÖ¤ÐÅÏ¢ÇÖÈëϵͳ£¬£¬£¬ £¬£¬£¬£¬²¢Î¥·´Ê¹ÓÃÕþ²ß½¨ÉèÓк¦Í¼Ïñ¡£¡£¡£¡£¡£Î¢ÈíÖ¸³ö£¬£¬£¬ £¬£¬£¬£¬±»¸æÊ¹Óö¨ÖÆ·´ÏòÊðÀíЧÀÍ£¬£¬£¬ £¬£¬£¬£¬Í¨¹ýAzure OpenAI Service APIŲÓò»·¨ÌìÉúÊýǧÕÅÓк¦Í¼Ïñ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬£¬£¬£¬´ËÊÂÎñ²»µ«ÏÞÓÚ¶Ô΢ÈíµÄ¹¥»÷£¬£¬£¬ £¬£¬£¬£¬AzureÀÄÓÃÆóÒµÒ»Ö±ÔÚÕë¶ÔÆäËûAIЧÀÍÌṩÉ̲¢ÔâÊÜÆäº¦¡£¡£¡£¡£¡£


https://thehackernews.com/2025/01/microsoft-sues-hacking-group-exploiting.html


3. Teton OrthopaedicsÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬£¬£¬»¼ÕßÓëÔ±¹¤Êý¾Ýй¶


1ÔÂ12ÈÕ£¬£¬£¬ £¬£¬£¬£¬2024Äê3ÔÂ25ÈÕ£¬£¬£¬ £¬£¬£¬£¬DataBreachesÍøÕ¾ÔÚÔ¶ÈÊÂÇé±íÉϼͼÁËTeton OrthopaedicsÔâÊÜÀÕË÷Èí¼þ¹¥»÷µÄÊÂÎñ£¬£¬£¬ £¬£¬£¬£¬¸ÃÊÂÎñÓÉÃûΪDragonForceµÄ×éÖ¯Éù³ÆÈÏÕæ£¬£¬£¬ £¬£¬£¬£¬ËûÃÇÉù³ÆÒÑÇÔÈ¡²¢¼ÓÃÜÁ˸ÃÌṩÉ̵ÄÎļþ¡£¡£¡£¡£¡£Ö»¹ÜDataBreachesͨ¹ýGoogleËÑË÷ÑéÖ¤Á˲¿·Öй¶µÄ²¡È˼ͼ£¬£¬£¬ £¬£¬£¬£¬µ«Ö±µ½2024Äê12Ô£¬£¬£¬ £¬£¬£¬£¬Teton Orthopaedics²Å֪ͨÊÜÓ°ÏìµÄ»¼ÕߺÍÖÝסÃñ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ £¬£¬£¬£¬ÔÚ·¢Ã÷Îó²îºóµÄ60ÌìÄÚ£¬£¬£¬ £¬£¬£¬£¬ËûÃDz¢Î´ÏòÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©·¢³ö֪ͨ£¬£¬£¬ £¬£¬£¬£¬Ö»¹ÜÍøÕ¾Í¨ÖªÈÏ¿ÉËûÃÇÔÚ3ÔÂ25ÈÕ·¢Ã÷ÁËÎó²î¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬Teton OrthopaedicsÓëDragonForceÖ®¼äµÄ̸ÅÐËÆºõҲδȡµÃÀֳɡ£¡£¡£¡£¡£´Ë´ÎÊÂÎñ²»µ«Ó°ÏìÁË»¼ÕßÊý¾Ý£¬£¬£¬ £¬£¬£¬£¬»¹Ó°ÏìÁËÔ±¹¤Êý¾Ý£¬£¬£¬ £¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¿µ½¡°ü¹ÜÐÅÏ¢ºÍÒ½ÁÆÐÅÏ¢µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£Teton OrthopaedicsÒѽÓÄɲ½·¥ÔöÇ¿Çå¾²ÐÔ£¬£¬£¬ £¬£¬£¬£¬µ«²¢Î´Îª»¼ÕßÌṩÃâ·ÑµÄЧÀÍ£¬£¬£¬ £¬£¬£¬£¬ÈçÐÅÓÃ¼à¿Ø»òÉí·Ý͵ÇÔ»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£


https://databreaches.net/2025/01/12/nine-months-after-discovering-a-ransomware-attack-teton-orthopaedics-notifies-patients/


4. Gravy AnalyticsÊý¾Ýй¶£ºÈ«ÇòÊý°ÙÍòÓû§Òþ˽ÊÜÍþв


1ÔÂ13ÈÕ£¬£¬£¬ £¬£¬£¬£¬Î»ÖÃÊý¾Ý¾­¼Í¹«Ë¾Gravy Analytics½üÆÚÔâÓöÁËÑÏÖØµÄºÚ¿Í¹¥»÷ºÍÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬£¬£¬£¬µ¼ÖÂÈ«ÇòÊý°ÙÍòÈ˵ÄÒþ˽Êܵ½Íþв¡£¡£¡£¡£¡£ºÚ¿Í´ÓÒ»¸ö¹Ø±ÕµÄ¶íÓïÍøÂç·¸·¨ÂÛ̳ÉÏÐû²¼ÁË´ó×ÚλÖÃÊý¾ÝÑù±¾£¬£¬£¬ £¬£¬£¬£¬ÕâЩÊý¾Ýº­¸ÇÁ˽¡Éí¡¢¿µ½¡¡¢Ô¼»á¡¢½»Í¨Ó¦ÓÃÒÔ¼°ÈÈÃÅÓÎÏ·µÈ¶à¸öÁìÓò£¬£¬£¬ £¬£¬£¬£¬´ú±íÁËÊýÍòÍò¸öСÎÒ˽¼ÒλÖÃÊý¾Ýµã¡£¡£¡£¡£¡£¾ÝŲÍþ¹ã²¥¹«Ë¾NRK±¨µÀ£¬£¬£¬ £¬£¬£¬£¬Gravy AnalyticsµÄĸ¹«Ë¾UnacastÒÑÏòŲÍþÊý¾Ý±£»£»£»£»£»¤»ú¹¹Åû¶ÁËÕâһΥ¹æÐÐΪ¡£¡£¡£¡£¡£UnacastÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬ºÚ¿Íͨ¹ýµÁÓÃÃÜÔ¿´ÓÆäÑÇÂíÑ·ÔÆÇéÐÎÖÐÇÔÈ¡ÁËÊýTBµÄÏûºÄÕßÊý¾Ý¡£¡£¡£¡£¡£×èÖ¹±¨µÀʱ£¬£¬£¬ £¬£¬£¬£¬Gravy AnalyticsµÄÍøÕ¾ÈÔ´¦ÓÚ̱»¾×´Ì¬¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬ £¬£¬£¬£¬´Ë´Îй¶µÄÊý¾ÝµãÒÑÁè¼Ý3000Íò£¬£¬£¬ £¬£¬£¬£¬°üÀ¨Î»ÓÚÃô¸ÐËùÔÚµÄ×°±¸ÐÅÏ¢£¬£¬£¬ £¬£¬£¬£¬Èç°×¹¬¡¢¿ËÀïÄ·ÁÖ¹¬ºÍÈ«Çò¾üÊ»ùµØ¡£¡£¡£¡£¡£ÕâЩÊý¾Ý²»µ«¿ÉÄÜ̻¶ͨË×È˵ÄÐÐ×Ù£¬£¬£¬ £¬£¬£¬£¬»¹¿ÉÄܶÔLGBTQ+Óû§×é³ÉΣº¦¡£¡£¡£¡£¡£Çå¾²Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬ £¬£¬£¬£¬ÕâЩÊý¾Ý»¹¿ÉÒÔÇáËÉÈÃͨË×СÎÒ˽¼ÒµÄÉí·Ý±»È¥ÄäÃû»¯¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬ÃÀ¹úÁª°îÉÌҵίԱ»á´ËǰÒÑեȡGravy Analytics¼°Æä×Ó¹«Ë¾Î´¾­ÏûºÄÕßÔÞ³ÉÍøÂçºÍ³öÊÛλÖÃÊý¾Ý¡£¡£¡£¡£¡£Gravy AnalyticsµÄλÖÃÊý¾ÝÖ÷ҪȪԴÓÚÔÚÏß¹ã¸æÐÐÒµµÄʵʱ¾º¼ÛÀú³Ì£¬£¬£¬ £¬£¬£¬£¬µ«ÕâÒ»Àú³ÌÖб£´æÊý¾Ýй¶µÄΣº¦¡£¡£¡£¡£¡£


https://techcrunch.com/2025/01/13/gravy-analytics-data-broker-breach-trove-of-location-data-threatens-privacy-millions/


5. Ó¢¹úÓòÃû¾ÞÍ·NominetÔâIvanti VPNÎó²îºÚ¿Í¹¥»÷


1ÔÂ13ÈÕ£¬£¬£¬ £¬£¬£¬£¬Ó¢¹úÓòÃû×¢²á»ú¹¹Nominet½üÆÚÔâÓöÁËÒ»´ÎÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬ £¬£¬£¬£¬¸ÃÊÂÎñÓëºÚ¿ÍʹÓÃIvanti VPNÈí¼þµÄÐÂÎó²îÓйØ¡£¡£¡£¡£¡£NominetÈÏÕæÎ¬»¤.co.ukÓòÃû£¬£¬£¬ £¬£¬£¬£¬ÆäÔÚ·¢¸ø¿Í»§µÄµç×ÓÓʼþÖÐÖÒÑԳƣ¬£¬£¬ £¬£¬£¬£¬ÕýÔÚÊÓ²ìÒ»Æð¡°ÕýÔÚ±¬·¢µÄÇå¾²ÊÂÎñ¡±¡£¡£¡£¡£¡£¾ÝNominet͸¶£¬£¬£¬ £¬£¬£¬£¬ºÚ¿Íͨ¹ýIvantiÌṩµÄµÚÈý·½VPNÈí¼þ»á¼ûÁËÆäϵͳ£¬£¬£¬ £¬£¬£¬£¬ÇÒ´Ë´ÎÈëÇÖʹÓÃÁËÁãÈÕÎó²î£¬£¬£¬ £¬£¬£¬£¬ÖÂʹNominetÎÞ·¨ÊµÊ±´ò²¹¶¡¾ÙÐзÀÓù¡£¡£¡£¡£¡£IvantiÉÏÖÜÒÑ֤ʵÆäÆÕ±éʹÓÃµÄÆóÒµVPN×°±¸Connect Secure±£´æÎó²î£¬£¬£¬ £¬£¬£¬£¬²¢Ôâµ½ºÚ¿ÍʹÓþÙÐÐÈëÇÖ¡£¡£¡£¡£¡£Ö»¹ÜIvantiδ͸¶ÏêϸÊÜÓ°Ïì¿Í»§ÊýÄ¿£¬£¬£¬ £¬£¬£¬£¬µ«ÍøÂçÇå¾²¹«Ë¾watchTowr LabsÒÑ·¢Ã÷¡°ÆÕ±é¡±µÄÈëÇÖÐÐΪ¡£¡£¡£¡£¡£Nominet×÷ΪÊ×¼Ò¹ûÕæÈ·ÈÏÊÜIvantiÎó²îÓ°ÏìµÄ×éÖ¯£¬£¬£¬ £¬£¬£¬£¬ÌåÏÖÏÖÔÚ¡°Ã»ÓÐÊý¾Ýй¶»ò×ß©µÄÖ¤¾Ý¡±£¬£¬£¬ £¬£¬£¬£¬²¢ÔÚÊÓ²ìʱ´úÏÞÖÆÁ˶ÔVPNÈí¼þµÄ»á¼û¡£¡£¡£¡£¡£


https://techcrunch.com/2025/01/13/uk-domain-giant-nominet-confirms-cybersecurity-incident-linked-to-ivanti-vpn-hacks/


6. CISA¸üÐÂÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬ £¬£¬£¬£¬ÒªÇó»ú¹¹ÊµÊ±ÐÞ¸´


1ÔÂ13ÈÕ£¬£¬£¬ £¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½üÆÚ¸üÐÂÁËÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬ £¬£¬£¬£¬ÐÂÔöÁËÁ½¸öÖ÷ÒªÎó²î¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬ £¬£¬£¬£¬CVE-2024-12686ÊÇÒ»¸ö±£´æÓÚBeyondTrustÌØÈ¨Ô¶³Ì»á¼û£¨PRA£©ºÍÔ¶³ÌÖ§³Ö£¨RS£©ÖеIJÙ×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬£¬£¬ £¬£¬£¬£¬CVSSÆÀ·ÖΪ6.6¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐí¾ßÓÐÖÎÀíȨÏ޵Ĺ¥»÷ÕßÉÏ´«¶ñÒâÎļþ£¬£¬£¬ £¬£¬£¬£¬²¢ÔÚÕ¾µãÓû§ÉÏÏÂÎÄÖÐÖ´Ðеײã²Ù×÷ϵͳÏÂÁî¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬£¬£¬£¬BeyondTrust¹«Ë¾ÔøÔÚ2024Äê12Ô³õÔâÊÜÍøÂç¹¥»÷£¬£¬£¬ £¬£¬£¬£¬²¿·ÖÔ¶³ÌÖ§³ÖSaaSʵÀý±»ÈëÇÖ£¬£¬£¬ £¬£¬£¬£¬¶øCVE-2024-12686ÕýÊǴ˴ι¥»÷Öз¢Ã÷µÄÎó²îÖ®Ò»¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²îÊÇCVE-2023-48365£¬£¬£¬ £¬£¬£¬£¬ËüÊÇQlik SenseÖеÄHTTPËíµÀÎó²î£¬£¬£¬ £¬£¬£¬£¬CVSSÆÀ·ÖΪ9.6£¬£¬£¬ £¬£¬£¬£¬¿Éʹ¹¥»÷ÕßÌáÉýȨÏÞ²¢Ïòºó¶ËЧÀÍÆ÷·¢ËÍHTTPÇëÇ󡣡£¡£¡£¡£Æ¾Ö¤CISAÐû²¼µÄ¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸Á£¬£¬ £¬£¬£¬£¬Áª°î»ú¹¹±ØÐèÔÚ2025Äê2ÔÂ3ÈÕ֮ǰ½â¾öÕâЩÒÑ·¢Ã÷µÄÎó²î£¬£¬£¬ £¬£¬£¬£¬ÒÔ±£»£»£»£»£»¤ÆäÍøÂçÃâÊܹ¥»÷¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬ £¬£¬£¬£¬×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²éCISAµÄKEVĿ¼£¬£¬£¬ £¬£¬£¬£¬²¢ÊµÊ±½â¾öÆä»ù´¡ÉèÊ©Öб£´æµÄÎó²î¡£¡£¡£¡£¡£ÕâЩ²½·¥¹ØÓÚÌá¸ßÍøÂçÇå¾²·À»¤ÄÜÁ¦¾ßÓÐÖ÷ÒªÒâÒå¡£¡£¡£¡£¡£


https://securityaffairs.com/173031/security/u-s-cisa-adds-beyondtrust-pra-and-rs-and-qlik-sense-flaws-to-its-known-exploited-vulnerabilities-catalog.html