BlackbaudÔÞ³ÉÒÔ4950ÍòÃÀÔª½â¾öÊý¾Ýй¶ÊÂÎñµÄÖ¸¿Ø

Ðû²¼Ê±¼ä 2023-10-08

1¡¢BlackbaudÔÞ³ÉÒÔ4950ÍòÃÀÔª½â¾öÊý¾Ýй¶ÊÂÎñµÄÖ¸¿Ø


¾Ý10ÔÂ6ÈÕ±¨µÀ£¬£¬£¬ £¬ £¬ÔÆÅÌËãÌṩÉÌBlackbaudÓëÃÀ¹ú49¸öÖݸ濢ÁË4950ÍòÃÀÔªµÄЭÒ飬£¬£¬ £¬ £¬ÒÔÏ¢ÕùÕë¶Ô2020Äê5ÔµÄÀÕË÷¹¥»÷¼°ÓÉ´ËÒý·¢µÄÊý¾Ýй¶µÄÖ¸¿Ø¡£¡£¡£¡£¡£¸ÃÊÂÎñÓ°ÏìÁËÊý°ÙÍòÓû§£¬£¬£¬ £¬ £¬¹¥»÷ÕßÇÔÈ¡ÁËÓû§Î´¼ÓÃܵÄÒøÐÐÐÅÏ¢¡¢µÇ¼ƾ֤ºÍÉç»áÇå¾²ºÅÂë¡£¡£¡£¡£¡£BlackbaudÔÚ±»¼û¸æËùÓб»µÁÊý¾ÝÒѱ»Ïú»Ùºó£¬£¬£¬ £¬ £¬½»ÁËÊê½ð¡£¡£¡£¡£¡£´Ë´Î¸æ¿¢µÄ4950ÍòÃÀԪϢÕùЭÒé½â¾öÁËBlackbaudÎ¥·´ÖÝÏûºÄÕß±£»£»£»£»£»£»£»¤·¨¡¢Î¥·´Í¨Öª¹æÔòÒÔ¼°¿µ½¡°ü¹ÜÁ÷ͨÓëÔðÈη¨°¸(HIPAA)µÄÖ¸¿Ø¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/blackbaud-agrees-to-495-million-settlement-for-ransomware-data-breach/


2¡¢¸çÂ×±ÈÑÇÌØÇøÑ¡¾ÙίԱ»áÔâµ½¹¥»÷²¿·ÖÑ¡ÃñÐÅϢй¶


¾ÝýÌå10ÔÂ6ÈÕ±¨µÀ£¬£¬£¬ £¬ £¬¸çÂ×±ÈÑÇÌØÇøÑ¡¾ÙίԱ»á(DCBOE)ÏÖÔÚÕýÔÚÊӲ첿·ÖÑ¡ÃñÐÅϢй¶ÊÂÎñ¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬ £¬ £¬¹¥»÷Õßͨ¹ýÑ¡¾Ù»ú¹¹µÄÍйÜÌṩÉÌDataNetµÄЧÀÍÆ÷»á¼ûÁËÕâЩÐÅÏ¢£¬£¬£¬ £¬ £¬µ«DCBOEµÄÄÚ²¿Êý¾Ý¿âºÍЧÀÍÆ÷²¢Î´Êܵ½¹¥»÷¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬ £¬DCBOEµÄÍøÕ¾Òѹرղ¢ÏÔʾά»¤Ò³Ãæ¡£¡£¡£¡£¡£RansomedVCÉù³ÆÈëÇÖÁËDCBOE²¢»ñµÃÁËÁè¼Ý60ÍòÌõÃÀ¹úÑ¡ÃñµÄÐÅÏ¢£¬£¬£¬ £¬ £¬ËüÔÚ°µÍøÉϳöÊÛ±»µÁÐÅÏ¢£¬£¬£¬ £¬ £¬»¹¹ûÕæÁËÒ»Ìõ¼Í¼ÒÔ֤ʵÊý¾ÝµÄÕæÊµÐÔ¡£¡£¡£¡£¡£¿ÉÊǾݱ¨µÀ£¬£¬£¬ £¬ £¬DCBOE±»µÁÊý¾Ý¿â×îÏÈÊÇÓÉÃûΪpwncoderµÄÓû§ÔÚºÚ¿ÍÂÛ̳ÖгöÊ۵쬣¬£¬ £¬ £¬ÕâЩÌû×ÓÏÖÔÚÒѱ»É¾³ý¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/dc-board-of-elections-confirms-voter-data-stolen-in-site-hack/


3¡¢Î¢ÈíÏêÊö¹¥»÷Õßͨ¹ýSQL ServerºáÏòÒÆ¶¯µ½ÔƵķ½·¨


΢ÈíÔÚ10ÔÂ3ÈÕ³ÆÆä×î½ü·¢Ã÷ÁËÒ»´Î¹¥»÷»î¶¯£¬£¬£¬ £¬ £¬ÆäÖй¥»÷ÕßÊÔͼͨ¹ýSQL ServerʵÀýºáÏòÒÆ¶¯µ½ÔÆÇéÐΡ£¡£¡£¡£¡£ÕâÖÖ¹¥»÷·½·¨ÔÚÆäËüÔÆÐ§ÀÍ£¨ÀýÈçVMºÍKubernetes£©ÖÐÓз¢Ã÷¹ý£¬£¬£¬ £¬ £¬µ«ÔÚSQL ServerÖÐȴûÓС£¡£¡£¡£¡£¹¥»÷Õß×î³õʹÓÃÄ¿µÄϵͳµÄÓ¦ÓóÌÐòÖеÄSQL×¢ÈëÎó²î£¬£¬£¬ £¬ £¬À´»á¼û°²ÅÅÔÚAzure ÐéÄâ»ú£¨VM£©ÖеÄMicrosoft SQL ServerʵÀý²¢ÌáÉýÆäȨÏÞ¡£¡£¡£¡£¡£È»ºó£¬£¬£¬ £¬ £¬¹¥»÷ÕßʹÓûñµÃµÄ¸ß¼¶È¨ÏÞ£¬£¬£¬ £¬ £¬ÊÔͼͨ¹ýÀÄÓÃЧÀÍÆ÷µÄÔÆÉí·ÝºáÏòÒÆ¶¯µ½ÆäËüÔÆ×ÊÔ´¡£¡£¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2023/10/03/defending-new-vectors-threat-actors-attempt-sql-server-to-cloud-lateral-movement/


4¡¢Really Simple SystemsÉèÖùýʧй¶300Íò¿Í»§¼Í¼


ýÌå10ÔÂ5Èճƣ¬£¬£¬ £¬ £¬Ñо¿Ö°Ô±·¢Ã÷ÁËB2B CRM ÌṩÉÌReally Simple Systems°üÀ¨300¶àÍòÌõ¼Í¼µÄÎÞÃÜÂë±£»£»£»£»£»£»£»¤Êý¾Ý¿â¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓµÓÐÁè¼Ý18000¸ö¿Í»§£¬£¬£¬ £¬ £¬°üÀ¨»Ê¼ÒѧԺ¡¢ºìÊ®×ֻᡢNHSºÍIBMµÈ¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢Éæ¼°¾ÝÒ½ÁƼͼ¡¢ÐÅÓñ¨¸æ¡¢Éí·ÝÖ¤¼þ¡¢Ë°ÎñÎļþºÍÖ´·¨ÎļþµÈ£¬£¬£¬ £¬ £¬Ö÷ÒªÓ°ÏìÁËλÓÚÓ¢¹ú¡¢ÃÀ¹ú¡¢Å·Ö޺ͰĴóÀûÑÇµÄÆóÒµ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬ £¬²»Çå¾²µÄÊý¾Ý¿âÒѱ»±£»£»£»£»£»£»£»¤ÆðÀ´£¬£¬£¬ £¬ £¬Éв»ÇåÎú¸ÃÊý¾Ý¿â̻¶µÄʱ¼ä£¬£¬£¬ £¬ £¬ÒÔ¼°ÊÇ·ñÓÐÈË»á¼û¹ýËü¡£¡£¡£¡£¡£


https://www.hackread.com/crm-provider-really-simple-systems-data-leak/


5¡¢Checkmarx·¢Ã÷Êý°Ù¸öÇÔÈ¡Ãô¸ÐÊý¾ÝµÄ¶ñÒâPython°ü


10ÔÂ3ÈÕ£¬£¬£¬ £¬ £¬Checkmarx³ÆÒ»³¡¶ñÒâ»î¶¯ÒÑÔÚ¿ªÔ´Æ½Ì¨ÉÏÖ²ÈëÁËÊý°Ù¸öÐÅÏ¢ÇÔÈ¡°ü£¬£¬£¬ £¬ £¬ÏÂÔØÁ¿Ô¼Îª75000´Î¡£¡£¡£¡£¡£×Ô4Ô³õÒÔÀ´£¬£¬£¬ £¬ £¬ÔÚPythonÉú̬ϵͳÖУ¬£¬£¬ £¬ £¬¹¥»÷Õßͨ¹ýÖÖÖÖÓû§Ãû°²ÅÅÁËÊý°Ù¸ö¶ñÒâÈí¼þ°ü¡£¡£¡£¡£¡£×ÔÊ״η¢Ã÷ÒÔÀ´£¬£¬£¬ £¬ £¬¹¥»÷±äµÃÔ½À´Ô½Öش󣬣¬£¬ £¬ £¬´ÓÃ÷ÎĹý¶Éµ½¼ÓÃÜ£¬£¬£¬ £¬ £¬ËæºóÓÖ¹ý¶Éµ½¶à²ã»ìÏýºÍ¶þ´Î·´»ã±àpayload¡£¡£¡£¡£¡£¶ñÒâ°üÖ¼ÔÚÇÔÈ¡´ó×ÚÃô¸ÐÊý¾Ý£¬£¬£¬ £¬ £¬°üÀ¨Ä¿µÄϵͳ¡¢Ó¦ÓóÌÐò¡¢ä¯ÀÀÆ÷ºÍÓû§µÄÊý¾Ý¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬ £¬ËüÃÇ»¹Í¨¹ýÐ޸ļÓÃÜÇ®±ÒµØµã½«ÉúÒâÖØ¶¨Ïòµ½¹¥»÷Õß¡£¡£¡£¡£¡£


https://checkmarx.com/blog/the-evolutionary-tale-of-a-persistent-python-threat/


6¡¢Check PointÐû²¼9Ô·ݵÄÈ«ÇòÍþвָÊýÆÊÎö±¨¸æ


10ÔÂ6ÈÕ£¬£¬£¬ £¬ £¬Check PointÐû²¼ÁË9Ô·ݵÄÈ«ÇòÍþвָÊýÆÊÎö±¨¸æ¡£¡£¡£¡£¡£9Ô·Ý£¬£¬£¬ £¬ £¬Ñо¿Ö°Ô±·¢Ã÷ÁËÕë¶Ô¸çÂ×±ÈÑǶà¸öÐÐÒµµÄ40¶à¼Ò¹«Ë¾µÄ´ó¹æÄ£´¹Âڻ£¬£¬£¬ £¬ £¬Ö¼ÔÚ·Ö·¢Remcos RAT¡£¡£¡£¡£¡£ÔÚQbot±»µ·»Ùºó£¬£¬£¬ £¬ £¬Æäºã¾ÃÕ¼ÓаñÊ×µÄÊ±ÊÆÒѾ­¿¢Ê£¬£¬£¬ £¬ £¬9Ô·Ý×î³£¼ûµÄ¶ñÒâÈí¼þ±äΪFormbook£¬£¬£¬ £¬ £¬Æä´ÎÊÇRemcosºÍEmotet¡£¡£¡£¡£¡£Ôâµ½¹¥»÷×îÑÏÖØµÄÊǽÌÓýºÍÑо¿ÐÐÒµ£¬£¬£¬ £¬ £¬Æä´ÎÊÇͨѶÒÔ¼°¾üÕþÁìÓò¡£¡£¡£¡£¡£×î³£±»Ê¹ÓõÄÎó²îÊÇWebЧÀÍÆ÷¶ñÒâURLĿ¼±éÀúÎó²î£¬£¬£¬ £¬ £¬×î³£¼ûµÄÒÆ¶¯¶ñÒâÈí¼þÈÔÈ»ÊÇAnubis¡£¡£¡£¡£¡£


https://blog.checkpoint.com/security/september-2023s-most-wanted-malware-remcos-wreaks-havoc-in-colombia-and-formbook-takes-top-spot-after-qbot-shutdown/