IO Data·ÓÉÆ÷ÏÖÁãÈÕ©¶´£¬Óû§ÃæÁٺڿ͹¥»÷·çÏÕ

Ðû²¼Ê±¼ä 2024-12-09

1. IO Data·ÓÉÆ÷ÏÖÁãÈÕ©¶´£¬Óû§ÃæÁٺڿ͹¥»÷·çÏÕ


12ÔÂ4ÈÕ£¬ÈÕ±¾¼ÆËã»úÓ¦¼±ÏìӦС×飨CERT£©·¢³ö¾¯¸æ£¬ºÚ¿ÍÕýÔÚÀûÓÃIO Data·ÓÉÆ÷É豸ÖеÄÁãÈÕ©¶´£¬ÐÞ¸ÄÉ豸ÉèÖá¢Ö´ÐÐÃüÁÉõÖÁ¹Ø±Õ·À»ðǽ¡£2024Äê11ÔÂ13ÈÕ·¢ÏÖµÄÈý¸öȱÏÝ·Ö±ðÊÇÐÅϢй¶£¨CVE-2024-45841£©¡¢Ô¶³ÌÈÎÒâ²Ù×÷ϵͳÃüÁîÖ´ÐУ¨CVE-2024-47133£©ºÍ½ûÓ÷À»ðǽµÄÄÜÁ¦£¨CVE-2024-52564£©£¬ËüÃÇÓ°ÏìÁËIO DataµÄ»ìºÏLTE·ÓÉÆ÷UD-LT1¼°Æä¹¤Òµ¼¶°æ±¾UD-LT1/EX¡£Ä¿Ç°£¬×îй̼þ°æ±¾v2.1.9½ö½â¾öÁËCVE-2024-52564©¶´£¬¶øÁíÍâÁ½¸ö©¶´µÄÐÞ¸´½«ÔÚ2024Äê12ÔÂ18ÈÕÐû²¼µÄv2.2.0ÖÐÌṩ¡£ÒÑÓпͻ§³ÂËß³ÆÕâЩ©¶´Òѱ»ÀûÓýøÐй¥»÷¡£ÔÚÐÞ¸´·¨Ê½Ðû²¼Ö®Ç°£¬IO Data½¨ÒéÓû§½ûÓÃÔ¶³Ì¹ÜÀí¹¦Ð§£¬ÏÞÖÆ·ÃÎÊVPNÁ¬½ÓµÄÍøÂ磬¸ü¸ÄĬÈÏ¡°guest¡±Óû§µÄÃÜÂ룬²¢¶¨ÆÚ¼à¿ØºÍÑéÖ¤É豸ÉèÖá£IO DATA UD-LT1ºÍUD-LT1/EX LTE·ÓÉÆ÷Ö÷ÒªÔÚÈÕ±¾ÏúÊÛ£¬Ö§³Ö¶à¼ÒÔËÓªÉÌ£¬²¢Óë¸Ã¹úÖ÷ÒªµÄMVNO SIM¿¨¼æÈÝ¡£


https://www.bleepingcomputer.com/news/security/japan-warns-of-io-data-zero-day-router-flaws-exploited-in-attacks/


2. 8BaseÀÕË÷Èí¼þ×éÖ¯¹¥»÷¿ËÂÞµØÑÇÀïÒ®¿¨¸Û


12ÔÂ7ÈÕ£¬8BaseÀÕË÷Èí¼þ×éÖ¯¶Ô¿ËÂÞµØÑÇ×î´óµÄ¸ÉÉ¢»õÌØÐí¾­ÓªÉÌÀïÒ®¿¨¸Û·¢¶¯ÁËÍøÂç¹¥»÷£¬²¢Éù³Æ¶Ô´Ë´ÎÄþ¾²Â©¶´ÂôÁ¦¡£ÀïÒ®¿¨¸Û (Luka Rijeka dd) ÊÇ¿ËÂÞµØÑÇ×î´óµÄ¸ÉÉ¢»õÌØÐí¾­ÓªÉÌ£¬Ìṩº£ÉϽ»Í¨·þÎñ¡¢¿Ú°¶ÔËÓªºÍ»õÎï´¢´æ¡£Ëü»¹ÌṩÖÖÖÖ¾­¼Ã·þÎñ£¬°üÂÞÉ豸ά»¤¡¢½¨ÖþÎïµ÷Ñø¡¢»õÎïÀι̺ÍÖÊÁ¿¿ØÖÆ¡£¸Ã×éÖ¯Éù³ÆÒѾ­ÇÔÈ¡Á˰üÂÞ»á¼ÆÐÅÏ¢¡¢ºÏͬÒÔ¼°ÆäËûÃô¸ÐÊý¾ÝÔÚÄڵĶàÖÖÎļþ£¬È緢Ʊ¡¢Êվݡ¢»á¼ÆÆ¾Ö¤¡¢¸öÈË×ÊÁÏ¡¢Ö¤Êé¡¢¹ÍÓ¶ºÏͬ¡¢±£ÃÜЭÒéµÈ£¬²¢ÔÚÆäTorÐ¹Â©ÍøÕ¾ÉÏÐû²¼ÁËÕâЩÐÅÏ¢¡£¾¡¹Ü¸Ã×éÖ¯¸ø³öÁËÊê½ð½ØÖ¹ÈÕÆÚΪ2024Äê12ÔÂ10ÈÕ£¬µ«ÀïÒ®¿¨¸ÛµÄÊ×ϯִÐйٶÅ˹¿Æ¡¤¸ñÀ­²©Íß´ÄÌåÏÖ£¬¾¡¹ÜһЩÊý¾Ý±»µÁ£¬µ«¸Ãʼþ¶Ô¿Ú°¶µÄÔËÓª²¢Î´Ôì³ÉÓ°Ï죬ͬʱËûµÄ×éÖ¯Ò²²»»áÖ§¸¶ÀÕË÷Èí¼þÍÅ»ïÒªÇóµÄÊê½ð¡£


https://securityaffairs.com/171779/cyber-crime/8base-ransomware-croatias-port-of-rijeka.html


3. TermiteÀÕË÷Èí¼þÍÅ»ïÐû³Æ¶ÔBlue YonderÈëÇÖʼþÂôÁ¦


12ÔÂ6ÈÕ£¬TermiteÀÕË÷Èí¼þÍÅ»ïÒÑÐû³Æ¶Ô11Ô·ÝÈ«Çò¹©Ó¦Á´Èí¼þ¹©Ó¦ÉÌBlue YonderµÄÈëÇÖʼþÂôÁ¦¡£Blue YonderÊÇÒ»¼Ò×ܲ¿Î»ÓÚÑÇÀûÉ£ÄÇÖݵĹ«Ë¾£¬ÎªÁè¼Ý3000¼Ò¿Í»§Ìṩ·þÎñ£¬ÆäÖаüÂÞ΢Èí¡¢À×ŵ¡¢±¦½àµÈÖªÃû¹«Ë¾¡£´Ë´Î¹¥»÷µ¼ÖÂBlue YonderµÄÍйܷþÎñ»·¾³·ºÆðÖжÏ£¬Ó°ÏìÁËÆä¿Í»§µÄһϵÁÐÒµÎñÔËÓª£¬°üÂÞÐǰͿˡ¢MorrisonsºÍSainsbury'sµÈ¡£ËäÈ»Blue YonderÒѻָ´²¿ÃÅÊÜÓ°Ïì¿Í»§µÄÔÚÏß·þÎñ£¬µ«ÉÐδ͸¶Óм¸¶à¿Í»§Êܵ½Ó°ÏìÒÔ¼°¹¥»÷ÕßÊÇ·ñ´ÓϵͳÖÐÇÔÈ¡ÁËÊý¾Ý¡£È»¶ø£¬TermiteÀÕË÷Èí¼þÍÅ»ïÔÚÆäйÃÜÍøÕ¾ÉÏÉù³ÆÒÑÇÔÈ¡680GBµÄÎļþ£¬°üÂÞÊý¾Ý¿âת´¢¡¢Î´À´¹¥»÷µÄµç×ÓÓʼþÁÐ±í¡¢ÎĵµµÈ¡£¾ÝÍþвÇ鱨¹«Ë¾³Æ£¬TermiteÊÇÒ»ÖÖзºÆðµÄÀÕË÷Èí¼þ£¬¼ÓÈëÊý¾Ý͵ÇÔ¡¢ÀÕË÷ºÍ¼ÓÃܹ¥»÷¡£ÍøÂçÄþ¾²¹«Ë¾Ç÷ÊÆ¿Æ¼¼ÌåÏÖ£¬TermiteµÄÀÕË÷Èí¼þ¼ÓÃÜÆ÷¿ÉÄÜÈÔ´¦ÓÚ¿ª·¢½×¶Î£¬´æÔÚ´úÂëÖ´ÐÐȱÏÝ¡£


https://www.bleepingcomputer.com/news/security/blue-yonder-saas-giant-breached-by-termite-ransomware-gang/


4. Ultralytics YOLO11Ô⹩ӦÁ´¹¥»÷£¬¼ÓÃܿ󹤶ñÒâ´úÂë±»Ö²Èë


12ÔÂ6ÈÕ£¬Á÷ÐеÄUltralytics YOLO11 AIÄ£ÐÍÔÚ¹©Ó¦Á´¹¥»÷ÖÐÔâµ½ÈëÇÖ¡£¹¥»÷ÕßÔÚPyPIÉÏÐû²¼µÄ8.3.41ºÍ8.3.42°æ±¾Öв¿ÊðÁ˼ÓÃܿ󹤡£UltralyticsÊÇÒ»¼ÒרעÓÚ¼ÆËã»úÊÓ¾õºÍAIµÄ¹«Ë¾£¬ÆäYOLOÄ£Ðͱ»¹ã·ºÓÃÓÚÎïÌå¼ì²âºÍͼÏñ´¦Öá£ÕâÁ½¸öÊÜËð°æ±¾Òѱ»È¡Ïû£¬²¢Ì滻Ϊ½à¾»µÄ8.3.43°æ±¾¡£¾ÝUltralyticsÊ×´´È˼æÊ×ϯִÐйÙGlenn Jocher³Æ£¬´Ë´Î¹¥»÷ÊÇÕë¶Ô¼ÓÃÜ»õ±ÒÍÚ¾òµÄ¶ñÒâ´úÂë×¢Èë¹¥»÷¡ £¿ª·¢ÈËÔ±ÕýÔÚÊӲ칹½¨»·¾³ÖеÄDZÔÚ©¶´£¬ÒÔÈ·¶¨¹¥»÷ÈçºÎ·¢Éú¡£´ËÍ⣬ÓÐÓû§³ÂËßPyPIÉÏ·ºÆðÁËÐµÄľÂí°æ±¾£¬Òò´Ë¹¥»÷¿ÉÄÜÈÔÔÚ¼ÌÐø¡£³öÓÚ½÷É÷¿¼ÂÇ£¬ÏÂÔØÁ˶ñÒâ°æ±¾µÄÓû§Ó¦¸ÃÖ´ÐÐÍêÕûµÄϵͳɨÃè¡£


https://www.bleepingcomputer.com/news/security/ultralytics-ai-model-hijacked-to-infect-thousands-with-cryptominer/


5. Web3ÊÂÇéÕßÔâÆÛÕ©ÐÔÊÓÆµ»áÒéÈí¼þ¡°Meeten¡±¹¥»÷


12ÔÂ6ÈÕ£¬ÍøÂç·¸×ï·Ö×ÓÀûÓÃÃûΪ¡°Meeten¡±µÄÆÛÕ©ÐÔÊÓÆµ»áÒéÆ½Ì¨£¬Õë¶ÔWeb3ÁìÓòµÄÊÂÇéÈËԱʵʩ¹¥»÷£¬Í¨¹ýÐé¼ÙµÄÉÌÎñ»áÒéÓÕÆ­Êܺ¦ÕßÏÂÔØ¶ñÒâÈí¼þ£¬ÒÔÇÔÈ¡¼ÓÃÜ»õ±Ò¡¢ÒøÐÐÐÅÏ¢¡¢ÍøÂçä¯ÀÀÆ÷´æ´¢µÄÐÅÏ¢¼°MacÉϵÄKeychainƾ¾ÝµÈ¡£¸Ã»î¶¯×Ô2024Äê9ÔÂÆðʵʩ£¬¶ñÒâÈí¼þÓÐWindowsºÍmacOS°æ±¾£¬ÇÒÍþвÐÐΪÕß²»Í£¸ü¸Ä¼Ùð»áÒéÈí¼þµÄÃû³ÆºÍÆ·ÅÆÒÔÔö¼ÓºÏ·¨ÐÔ¡£Êܺ¦Õßͨ³£Í¨¹ýTelegram»òµç»°½Ó´¥ºó±»Òýµ¼ÖÁMeetenÍøÕ¾ÏÂÔØ¶ñÒâÈí¼þ£¬¸ÃÍøÕ¾»¹ÍйÜJavaScriptÓÃÓÚÔÚ°²×°Ç°ÇÔÈ¡¼ÓÃÜ»õ±Ò¡£CadoÄþ¾²ÊµÑéÊÒ·¢ÏÖ£¬³ýÁËRealst¶ñÒâÈí¼þÍ⣬MeetenÍøÕ¾»¹ÊÔͼºÄ¾¡Á¬½Óµ½¸ÃÍøÕ¾µÄÇ®°ü¡£Óû§Ó¦½÷É÷°²×°Èí¼þ£¬ÏÈÑéÖ¤ÆäºÏ·¨ÐÔÔÙʹÓöàÒýÇæ·À²¡¶¾¹¤¾ß½øÐÐɨÃ裬ÓÈÆäÊÇWeb3ÁìÓòµÄÊÂÇéÈËÔ±ÐèÌá¸ß¾¯Ìè¡£


https://www.bleepingcomputer.com/news/security/crypto-stealing-malware-posing-as-a-meeting-app-targets-web3-pros/


6. Atrium HealthÊý¾Ýй¶Ê¼þÓ°Ï쳬58ÍòÈË


12ÔÂ6ÈÕ£¬Ò½ÁƱ£½¡¹«Ë¾Atrium HealthÒÑÏòÃÀ¹úÎÀÉúÓ빫ÖÚ·þÎñ²¿(HHS)ͨ±¨£¬Ò»ÆðÊý¾Ýй¶Ê¼þÓ°ÏìÁËÁè¼Ý585,000ÈË¡£¸Ãʼþ¿ÉÄÜÓë2015ÄêÖÁ2019ÄêÆÚ¼äAtrium Health»¼ÕßÃÅ»§ÍøÕ¾ÉÏ´æÔÚµÄÔÚÏß×·×Ù¼¼ÊõÎÊÌâÏà¹Ø¡£¹«Ë¾ÌåÏÖ£¬ÕâЩ¼¼Êõ¿ÉÄÜÒѽ«Ä³Ð©¸öÈËÐÅÏ¢£¬ÈçIP¡¢cookie¡¢ÖÎÁÆ»òÌṩÕßÐÅÏ¢¡¢ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëºÍʵ¼ÊµØÖ·µÈ£¬´«Ê䏸Á˵ÚÈý·½¹©Ó¦ÉÌ£¬ÈçGoogleºÍFacebook£¨ÏÖΪMeta£©¡£¾¡¹Ü2022ÄêµÄ¿ª¶ËÉó²éδ·¢ÏÖÒì³££¬µ«×î½üµÄ·ÖÎöȷʵ·¢ÏÖÁËÐÅϢй¶µÄÇé¿ö¡£AtriumÖ¸³ö£¬Ã»ÓÐÉæ¼°Éç»áÄþ¾²ºÅÂë¡¢²ÆÕþÕË»§¡¢ÐÅÓÿ¨»ò½è¼Ç¿¨ÐÅÏ¢£¬Ò²Ã»ÓÐÖ¤¾Ý±íÃ÷ÐÅÏ¢±»ÀÄÓã¬ÇÒÐÅÏ¢ÐÔÖʲ»Ì«¿ÉÄܵ¼ÖÂÉí·Ý͵ÇÔ»ò²ÆÕþËðʧ¡£ÖµµÃ×¢ÒâµÄÊÇ£¬Õâ²¢·ÇAtrium½üÆÚÅû¶µÄΨһһÆðÍøÂçÄþ¾²Ê¼þ¡£9ÔÂÖÐÑ®£¬¸Ã¹«Ë¾»¹Í¨±¨ÁËÁíÒ»ÆðÍøÂçµöÓãʼþ£¬µ¼Ö²¿ÃÅ»¼ÕߺÍÔ±¹¤µÄÐÅÏ¢£¬°üÂÞÉç±£ºÅ¡¢ÒøÐÐÕË»§ÐÅÏ¢¡¢·ÃÎÊÆ¾Ö¤ÒÔ¼°ÖÎÁÆ/Õï¶ÏÏêÇéµÈ±»Ð¹Â¶¡£Atrium HealthÔÚ¶à¸öÖݵÄ1,400¶à¸ö»¤Àí»ú¹¹ºÍ40¼ÒÒ½ÔºÌṩҽÁƱ£½¡·þÎñ£¬´ËÇ°Ò²ÔøÔâÓö¹ýÊý¾Ýй¶Ê¼þ¡£


https://www.securityweek.com/atrium-health-data-breach-impacts-585000-people/