IO Data·ÓÉÆ÷ÏÖÁãÈÕÎó²î£¬£¬ £¬£¬£¬£¬Óû§ÃæÁٺڿ͹¥»÷Σº¦

Ðû²¼Ê±¼ä 2024-12-09

1. IO Data·ÓÉÆ÷ÏÖÁãÈÕÎó²î£¬£¬ £¬£¬£¬£¬Óû§ÃæÁٺڿ͹¥»÷Σº¦


12ÔÂ4ÈÕ£¬£¬ £¬£¬£¬£¬ÈÕ±¾ÅÌËã»úÓ¦¼±ÏìӦС×飨CERT£©·¢³öÖÒÑÔ£¬£¬ £¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃIO Data·ÓÉÆ÷×°±¸ÖеÄÁãÈÕÎó²î£¬£¬ £¬£¬£¬£¬ÐÞ¸Ä×°±¸ÉèÖá¢Ö´ÐÐÏÂÁ£¬ £¬£¬£¬£¬ÉõÖÁ¹Ø±Õ·À»ðǽ¡£¡£ ¡£¡£¡£¡£2024Äê11ÔÂ13ÈÕ·¢Ã÷µÄÈý¸öȱÏÝ»®·ÖÊÇÐÅϢй¶£¨CVE-2024-45841£©¡¢Ô¶³Ìí§Òâ²Ù×÷ϵͳÏÂÁîÖ´ÐУ¨CVE-2024-47133£©ºÍ½ûÓ÷À»ðǽµÄÄÜÁ¦£¨CVE-2024-52564£©£¬£¬ £¬£¬£¬£¬ËüÃÇÓ°ÏìÁËIO DataµÄ»ìÏýLTE·ÓÉÆ÷UD-LT1¼°Æä¹¤Òµ¼¶°æ±¾UD-LT1/EX¡£¡£ ¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬×îй̼þ°æ±¾v2.1.9½ö½â¾öÁËCVE-2024-52564Îó²î£¬£¬ £¬£¬£¬£¬¶øÁíÍâÁ½¸öÎó²îµÄÐÞ¸´½«ÔÚ2024Äê12ÔÂ18ÈÕÐû²¼µÄv2.2.0ÖÐÌṩ¡£¡£ ¡£¡£¡£¡£ÒÑÓпͻ§±¨¸æ³ÆÕâЩÎó²îÒѱ»Ê¹ÓþÙÐй¥»÷¡£¡£ ¡£¡£¡£¡£ÔÚÐÞ¸´³ÌÐòÐû²¼Ö®Ç°£¬£¬ £¬£¬£¬£¬IO Data½¨ÒéÓû§½ûÓÃÔ¶³ÌÖÎÀí¹¦Ð§£¬£¬ £¬£¬£¬£¬ÏÞÖÆ»á¼ûVPNÅþÁ¬µÄÍøÂ磬£¬ £¬£¬£¬£¬¸ü¸ÄĬÈÏ¡°guest¡±Óû§µÄÃÜÂ룬£¬ £¬£¬£¬£¬²¢°´ÆÚ¼à¿ØºÍÑé֤װ±¸ÉèÖᣡ£ ¡£¡£¡£¡£IO DATA UD-LT1ºÍUD-LT1/EX LTE·ÓÉÆ÷Ö÷ÒªÔÚÈÕ±¾ÏúÊÛ£¬£¬ £¬£¬£¬£¬Ö§³Ö¶à¼ÒÔËÓªÉÌ£¬£¬ £¬£¬£¬£¬²¢Óë¸Ã¹úÖ÷ÒªµÄMVNO SIM¿¨¼æÈÝ¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/japan-warns-of-io-data-zero-day-router-flaws-exploited-in-attacks/


2. 8BaseÀÕË÷Èí¼þ×éÖ¯¹¥»÷¿ËÂÞµØÑÇÀïÒ®¿¨¸Û


12ÔÂ7ÈÕ£¬£¬ £¬£¬£¬£¬8BaseÀÕË÷Èí¼þ×éÖ¯¶Ô¿ËÂÞµØÑÇ×î´óµÄ¸ÉÉ¢»õÌØÐíı»®ÉÌÀïÒ®¿¨¸Û·¢¶¯ÁËÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬²¢Éù³Æ¶Ô´Ë´ÎÇå¾²Îó²îÈÏÕæ¡£¡£ ¡£¡£¡£¡£ÀïÒ®¿¨¸Û (Luka Rijeka dd) ÊÇ¿ËÂÞµØÑÇ×î´óµÄ¸ÉÉ¢»õÌØÐíı»®ÉÌ£¬£¬ £¬£¬£¬£¬Ìṩº£ÉϽ»Í¨Ð§ÀÍ¡¢¿Ú°¶ÔËÓªºÍ»õÎïÖü´æ¡£¡£ ¡£¡£¡£¡£Ëü»¹ÌṩÖÖÖÖ¾­¼ÃЧÀÍ£¬£¬ £¬£¬£¬£¬°üÀ¨×°±¸Î¬»¤¡¢ÐÞ½¨Îï±£Ñø¡¢»õÎïÀο¿ºÍÖÊÁ¿¿ØÖÆ¡£¡£ ¡£¡£¡£¡£¸Ã×éÖ¯Éù³ÆÒѾ­ÇÔÈ¡Á˰üÀ¨»á¼ÆÐÅÏ¢¡¢ÌõÔ¼ÒÔ¼°ÆäËûÃô¸ÐÊý¾ÝÔÚÄڵĶàÖÖÎļþ£¬£¬ £¬£¬£¬£¬È緢Ʊ¡¢ÊÕÌõ¡¢»á¼ÆÆ¾Ö¤¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏ¡¢Ö¤Êé¡¢¹ÍÓ¶ÌõÔ¼¡¢±£ÃÜЭÒéµÈ£¬£¬ £¬£¬£¬£¬²¢ÔÚÆäTor×ßÂ©ÍøÕ¾ÉÏÐû²¼ÁËÕâЩÐÅÏ¢¡£¡£ ¡£¡£¡£¡£Ö»¹Ü¸Ã×éÖ¯¸ø³öÁËÊê½ð×èÖ¹ÈÕÆÚΪ2024Äê12ÔÂ10ÈÕ£¬£¬ £¬£¬£¬£¬µ«ÀïÒ®¿¨¸ÛµÄÊ×ϯִÐйٶÅ˹¿Æ¡¤¸ñÀ­²©Íß´ÄÌåÏÖ£¬£¬ £¬£¬£¬£¬Ö»¹ÜһЩÊý¾Ý±»µÁ£¬£¬ £¬£¬£¬£¬µ«¸ÃÊÂÎñ¶Ô¿Ú°¶µÄÔËÓª²¢Î´Ôì³ÉÓ°Ï죬£¬ £¬£¬£¬£¬Í¬Ê±ËûµÄ×éÖ¯Ò²²»»áÖ§¸¶ÀÕË÷Èí¼þÍÅ»ïÒªÇóµÄÊê½ð¡£¡£ ¡£¡£¡£¡£


https://securityaffairs.com/171779/cyber-crime/8base-ransomware-croatias-port-of-rijeka.html


3. TermiteÀÕË÷Èí¼þÍÅ»ïÐû³Æ¶ÔBlue YonderÈëÇÖÊÂÎñÈÏÕæ


12ÔÂ6ÈÕ£¬£¬ £¬£¬£¬£¬TermiteÀÕË÷Èí¼þÍÅ»ïÒÑÐû³Æ¶Ô11Ô·ÝÈ«Çò¹©Ó¦Á´Èí¼þ¹©Ó¦ÉÌBlue YonderµÄÈëÇÖÊÂÎñÈÏÕæ¡£¡£ ¡£¡£¡£¡£Blue YonderÊÇÒ»¼Ò×ܲ¿Î»ÓÚÑÇÀûÉ£ÄÇÖݵĹ«Ë¾£¬£¬ £¬£¬£¬£¬ÎªÁè¼Ý3000¼Ò¿Í»§ÌṩЧÀÍ£¬£¬ £¬£¬£¬£¬ÆäÖаüÀ¨Î¢Èí¡¢À×ŵ¡¢±¦½àµÈ×ÅÃû¹«Ë¾¡£¡£ ¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂBlue YonderµÄÍйÜЧÀÍÇéÐηºÆðÖÐÖ¹£¬£¬ £¬£¬£¬£¬Ó°ÏìÁËÆä¿Í»§µÄһϵÁÐÓªÒµÔËÓª£¬£¬ £¬£¬£¬£¬°üÀ¨ÐǰͿˡ¢MorrisonsºÍSainsbury'sµÈ¡£¡£ ¡£¡£¡£¡£ËäÈ»Blue YonderÒѻָ´²¿·ÖÊÜÓ°Ïì¿Í»§µÄÔÚÏßЧÀÍ£¬£¬ £¬£¬£¬£¬µ«ÉÐδ͸¶Óм¸¶à¿Í»§Êܵ½Ó°ÏìÒÔ¼°¹¥»÷ÕßÊÇ·ñ´ÓϵͳÖÐÇÔÈ¡ÁËÊý¾Ý¡£¡£ ¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬£¬TermiteÀÕË÷Èí¼þÍÅ»ïÔÚÆäйÃÜÍøÕ¾ÉÏÉù³ÆÒÑÇÔÈ¡680GBµÄÎļþ£¬£¬ £¬£¬£¬£¬°üÀ¨Êý¾Ý¿âת´¢¡¢Î´À´¹¥»÷µÄµç×ÓÓʼþÁÐ±í¡¢ÎĵµµÈ¡£¡£ ¡£¡£¡£¡£¾ÝÍþвÇ鱨¹«Ë¾³Æ£¬£¬ £¬£¬£¬£¬TermiteÊÇÒ»ÖÖзºÆðµÄÀÕË÷Èí¼þ£¬£¬ £¬£¬£¬£¬¼ÓÈëÊý¾Ý͵ÇÔ¡¢ÀÕË÷ºÍ¼ÓÃܹ¥»÷¡£¡£ ¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾Ç÷ÊÆ¿Æ¼¼ÌåÏÖ£¬£¬ £¬£¬£¬£¬TermiteµÄÀÕË÷Èí¼þ¼ÓÃÜÆ÷¿ÉÄÜÈÔ´¦ÓÚ¿ª·¢½×¶Î£¬£¬ £¬£¬£¬£¬±£´æ´úÂëÖ´ÐÐȱÏÝ¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/blue-yonder-saas-giant-breached-by-termite-ransomware-gang/


4. Ultralytics YOLO11Ô⹩ӦÁ´¹¥»÷£¬£¬ £¬£¬£¬£¬¼ÓÃܿ󹤶ñÒâ´úÂë±»Ö²Èë


12ÔÂ6ÈÕ£¬£¬ £¬£¬£¬£¬Ê¢ÐеÄUltralytics YOLO11 AIÄ£×ÓÔÚ¹©Ó¦Á´¹¥»÷ÖÐÔâµ½ÈëÇÖ¡£¡£ ¡£¡£¡£¡£¹¥»÷ÕßÔÚPyPIÉÏÐû²¼µÄ8.3.41ºÍ8.3.42°æ±¾Öа²ÅÅÁ˼ÓÃܿ󹤡£¡£ ¡£¡£¡£¡£UltralyticsÊÇÒ»¼ÒרעÓÚÅÌËã»úÊÓ¾õºÍAIµÄ¹«Ë¾£¬£¬ £¬£¬£¬£¬ÆäYOLOÄ£×Ó±»ÆÕ±éÓÃÓÚÎïÌå¼ì²âºÍͼÏñ´¦Öóͷ£¡£¡£ ¡£¡£¡£¡£ÕâÁ½¸öÊÜËð°æ±¾Òѱ»×÷·Ï£¬£¬ £¬£¬£¬£¬²¢Ì滻ΪÇå½àµÄ8.3.43°æ±¾¡£¡£ ¡£¡£¡£¡£¾ÝUltralyticsÊ×´´È˼æÊ×ϯִÐйÙGlenn Jocher³Æ£¬£¬ £¬£¬£¬£¬´Ë´Î¹¥»÷ÊÇÕë¶Ô¼ÓÃÜÇ®±ÒÍÚ¾òµÄ¶ñÒâ´úÂë×¢Èë¹¥»÷¡£¡£ ¡£¡£¡£¡£¿£¿£¿£¿£¿£¿ª·¢Ö°Ô±ÕýÔÚÊӲ칹½¨ÇéÐÎÖеÄDZÔÚÎó²î£¬£¬ £¬£¬£¬£¬ÒÔÈ·¶¨¹¥»÷ÔõÑù±¬·¢¡£¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬ÓÐÓû§±¨¸æPyPIÉÏ·ºÆðÁËÐµÄľÂí°æ±¾£¬£¬ £¬£¬£¬£¬Òò´Ë¹¥»÷¿ÉÄÜÈÔÔÚ¼ÌÐø¡£¡£ ¡£¡£¡£¡£³öÓÚÉóÉ÷˼Á¿£¬£¬ £¬£¬£¬£¬ÏÂÔØÁ˶ñÒâ°æ±¾µÄÓû§Ó¦¸ÃÖ´ÐÐÍêÕûµÄϵͳɨÃè¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ultralytics-ai-model-hijacked-to-infect-thousands-with-cryptominer/


5. Web3ÊÂÇéÕßÔâڲƭÐÔÊÓÆµ¾Û»áÈí¼þ¡°Meeten¡±¹¥»÷


12ÔÂ6ÈÕ£¬£¬ £¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓʹÓÃÃûΪ¡°Meeten¡±µÄڲƭÐÔÊÓÆµ¾Û»áƽ̨£¬£¬ £¬£¬£¬£¬Õë¶ÔWeb3ÁìÓòµÄÊÂÇéְԱʵÑé¹¥»÷£¬£¬ £¬£¬£¬£¬Í¨¹ýÐéαµÄÉÌÎñ¾Û»áÓÕÆ­Êܺ¦ÕßÏÂÔØ¶ñÒâÈí¼þ£¬£¬ £¬£¬£¬£¬ÒÔÇÔÈ¡¼ÓÃÜÇ®±Ò¡¢ÒøÐÐÐÅÏ¢¡¢ÍøÂçä¯ÀÀÆ÷´æ´¢µÄÐÅÏ¢¼°MacÉϵÄKeychainƾ֤µÈ¡£¡£ ¡£¡£¡£¡£¸Ã»î¶¯×Ô2024Äê9ÔÂÆðʵÑ飬£¬ £¬£¬£¬£¬¶ñÒâÈí¼þÓÐWindowsºÍmacOS°æ±¾£¬£¬ £¬£¬£¬£¬ÇÒÍþвÐÐΪÕßÒ»Ö±¸ü¸Äð³ä¾Û»áÈí¼þµÄÃû³ÆºÍÆ·ÅÆÒÔÔöÌíÕýµ±ÐÔ¡£¡£ ¡£¡£¡£¡£Êܺ¦Õßͨ³£Í¨¹ýTelegram»òµç»°½Ó´¥ºó±»Ö¸µ¼ÖÁMeetenÍøÕ¾ÏÂÔØ¶ñÒâÈí¼þ£¬£¬ £¬£¬£¬£¬¸ÃÍøÕ¾»¹ÍйÜJavaScriptÓÃÓÚÔÚ×°ÖÃǰÇÔÈ¡¼ÓÃÜÇ®±Ò¡£¡£ ¡£¡£¡£¡£CadoÇ徲ʵÑéÊÒ·¢Ã÷£¬£¬ £¬£¬£¬£¬³ýÁËRealst¶ñÒâÈí¼þÍ⣬£¬ £¬£¬£¬£¬MeetenÍøÕ¾»¹ÊÔͼºÄ¾¡ÅþÁ¬µ½¸ÃÍøÕ¾µÄÇ®°ü¡£¡£ ¡£¡£¡£¡£Óû§Ó¦ÉóÉ÷×°ÖÃÈí¼þ£¬£¬ £¬£¬£¬£¬ÏÈÑéÖ¤ÆäÕýµ±ÐÔÔÙʹÓöàÒýÇæ·À²¡¶¾¹¤¾ß¾ÙÐÐɨÃ裬£¬ £¬£¬£¬£¬ÓÈÆäÊÇWeb3ÁìÓòµÄÊÂÇéÖ°Ô±ÐèÌá¸ßСÐÄ¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/crypto-stealing-malware-posing-as-a-meeting-app-targets-web3-pros/


6. Atrium HealthÊý¾Ýй¶ÊÂÎñÓ°Ï쳬58ÍòÈË


12ÔÂ6ÈÕ£¬£¬ £¬£¬£¬£¬Ò½ÁƱ£½¡¹«Ë¾Atrium HealthÒÑÏòÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿(HHS)ת´ï£¬£¬ £¬£¬£¬£¬Ò»ÆðÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÁè¼Ý585,000ÈË¡£¡£ ¡£¡£¡£¡£¸ÃÊÂÎñ¿ÉÄÜÓë2015ÄêÖÁ2019Äêʱ´úAtrium Health»¼ÕßÃÅ»§ÍøÕ¾Éϱ£´æµÄÔÚÏß×·×ÙÊÖÒÕÎÊÌâÏà¹Ø¡£¡£ ¡£¡£¡£¡£¹«Ë¾ÌåÏÖ£¬£¬ £¬£¬£¬£¬ÕâЩÊÖÒÕ¿ÉÄÜÒѽ«Ä³Ð©Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬£¬£¬£¬ÈçIP¡¢cookie¡¢ÖÎÁÆ»òÌṩÕßÐÅÏ¢¡¢ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëºÍÏÖʵµØµãµÈ£¬£¬ £¬£¬£¬£¬´«Ê䏸Á˵ÚÈý·½¹©Ó¦ÉÌ£¬£¬ £¬£¬£¬£¬ÈçGoogleºÍFacebook£¨ÏÖΪMeta£©¡£¡£ ¡£¡£¡£¡£Ö»¹Ü2022ÄêµÄÆðÔ´Éó²éδ·¢Ã÷Òì³££¬£¬ £¬£¬£¬£¬µ«×î½üµÄÆÊÎöȷʵ·¢Ã÷ÁËÐÅϢй¶µÄÇéÐΡ£¡£ ¡£¡£¡£¡£AtriumÖ¸³ö£¬£¬ £¬£¬£¬£¬Ã»ÓÐÉæ¼°Éç»áÇå¾²ºÅÂë¡¢²ÆÎñÕË»§¡¢ÐÅÓÿ¨»ò½è¼Ç¿¨ÐÅÏ¢£¬£¬ £¬£¬£¬£¬Ò²Ã»ÓÐÖ¤¾ÝÅú×¢ÐÅÏ¢±»ÀÄÓ㬣¬ £¬£¬£¬£¬ÇÒÐÅÏ¢ÐÔ×Ó²»Ì«¿ÉÄܵ¼ÖÂÉí·Ý͵ÇÔ»ò²ÆÎñËðʧ¡£¡£ ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬£¬£¬£¬Õâ²¢·ÇAtrium½üÆÚÅû¶µÄΨÖðÒ»ÆðÍøÂçÇå¾²ÊÂÎñ¡£¡£ ¡£¡£¡£¡£9ÔÂÖÐÑ®£¬£¬ £¬£¬£¬£¬¸Ã¹«Ë¾»¹×ª´ïÁËÁíÒ»ÆðÍøÂç´¹ÂÚÊÂÎñ£¬£¬ £¬£¬£¬£¬µ¼Ö²¿·Ö»¼ÕߺÍÔ±¹¤µÄÐÅÏ¢£¬£¬ £¬£¬£¬£¬°üÀ¨Éç±£ºÅ¡¢ÒøÐÐÕË»§ÐÅÏ¢¡¢»á¼ûƾ֤ÒÔ¼°ÖÎÁÆ/Õï¶ÏÏêÇéµÈ±»Ð¹Â¶¡£¡£ ¡£¡£¡£¡£Atrium HealthÔÚ¶à¸öÖݵÄ1,400¶à¸öÕչ˻¤Ê¿»ú¹¹ºÍ40¼ÒÒ½ÔºÌṩҽÁƱ£½¡Ð§ÀÍ£¬£¬ £¬£¬£¬£¬´ËÇ°Ò²ÔøÔâÓö¹ýÊý¾Ýй¶ÊÂÎñ¡£¡£ ¡£¡£¡£¡£


https://www.securityweek.com/atrium-health-data-breach-impacts-585000-people/