¿¨µØÑÇϵͳÔâºÚ¿ÍÈëÇÖµ¼Ö¿ͻ§ÐÅϢй¶

Ðû²¼Ê±¼ä 2025-06-03

1. ¿¨µØÑÇϵͳÔâºÚ¿ÍÈëÇÖµ¼Ö¿ͻ§ÐÅϢй¶


6ÔÂ2ÈÕ £¬ÉݳÞʱÉÐÆ·ÅÆ¿¨µØÑÇ¿ËÈÕÏò¿Í»§·¢³öÖÒÑÔ £¬³ÆÆäϵͳÔâºÚ¿ÍÈëÇÖ £¬µ¼Ö¿ͻ§Ð¡ÎÒ˽¼ÒÐÅϢй¶¡£ÔÚ֪ͨÐÅÖÐ £¬¿¨µØÑÇ͸¶ºÚ¿Í»ñÈ¡ÁËÆäϵͳµÄÔÝʱ»á¼ûȨÏÞ £¬²¢ÇÔÈ¡ÁËÓÐÏÞÊýÄ¿µÄ¿Í»§ÐÅÏ¢ £¬°üÀ¨¿Í»§ÐÕÃû¡¢µç×ÓÓʼþµØµãºÍËùÔÚ¹ú¼Ò £¬µ«Î´Éæ¼°ÃÜÂë¡¢ÐÅÓÿ¨ºÅ»òÒøÐÐÏêϸÐÅÏ¢µÈ¸üÃô¸ÐÊý¾Ý¡£¿¨µØÑÇÇ¿µ÷ÒÑ¿ØÖÆ×¡ÎÊÌâ £¬²¢ÔöÇ¿ÁËϵͳºÍÊý¾ÝµÄ±£»¤ £¬Í¬Ê±¼û¸æÖ´·¨²¿·Ö £¬ÕýÓëÍâ²¿ÍøÂçÇå¾²¹«Ë¾ÏàÖúÐÞ¸´Îó²î¡£´Ë´ÎÇå¾²Îó²î²¢·Ç¸öÀý £¬ÒÑÍùÒ»¸öÔÂÄÚ £¬ÆäËûʱÉÐÆ·ÅÆÒ²Åû¶ÁËÀàËÆÇå¾²ÊÂÎñ¡£½ñÄê5Ô £¬µÏ°ÂÅû¶Êý¾Ýй¶ÊÂÎñ £¬ÍþвÐÐΪÕßÈëÇÖÆäϵͳ £¬ÇÔÈ¡Á˿ͻ§µÄÁªÏµ·½·¨¡¢¹ºÖÃÀúÊ·¼Í¼ºÍÆ«ºÃÉèÖã»Í¬ÑùÔÚÉϸöÔ £¬°¢µÏ´ï˹ÖÒÑÔ¿Í»§ £¬ÆäÒ»¼ÒµÚÈý·½·þÎñÌṩÉÌÔâÓöÈëÇÖ £¬µ¼ÖÂÁªÏµÐÅϢй¶ £¬µ«Î´»ñÈ¡¸¶¿îÏêÇé»òÕË»§Æ¾Ö¤£»ÉÏÖÜ £¬Î¬¶àÀûÑǵÄÉñÃØÒòÒ»Á¬Çå¾²ÊÂÎñ¹Ø±ÕÁËÆäÍøÕ¾ºÍ²¿·ÖÊÐËÁ·þÎñ £¬²¢ÒÑÓëÍøÂçÇ徲ר¼ÒÕö¿ªÊӲ졣ÕâһϵÁÐÊÂÎñÅú×¢ £¬Ê±ÉÐÆ·ÅÆÕýÃæÁÙ×ÅÈÕÒæÑÏËàµÄÍøÂçÇå¾²ÌôÕ½ £¬ÐèÔöÇ¿Çå¾²·À»¤²½·¥ £¬ÒÔ±£»¤¿Í»§ÐÅÏ¢²»±»Ð¹Â¶¡£


https://www.bleepingcomputer.com/news/security/cartier-discloses-data-breach-amid-fashion-brand-cyberattacks/


2. The North FaceÔâÆ¾Ö¤Ìî³ä¹¥»÷ £¬¿Í»§ÐÅϢй¶


6ÔÂ2ÈÕ £¬»§Íâ´ò°çÁãÊÛÉÌThe North FaceÖÒÑÔ¿Í»§ £¬ÆäСÎÒ˽¼ÒÐÅÏ¢ÔÚ4ÔÂ·ÝµÄÆ¾Ö¤Ìî³ä¹¥»÷Öб»µÁ¡£The North Face×÷ΪÃÀ¹ú´óÐÍ»§Íâ´ò°çºÍ×°±¸Æ·ÅÆ £¬ÄêÊÕÈ볬30ÒÚÃÀÔª £¬µç×ÓÉÌÎñÕ¼Æä×ÜÏúÊÛ¶îµÄ42%¡£Æ¾Ö¤Ìî³ä¹¥»÷ÖÐ £¬ÍþвÐÐΪÕßʹÓÃÏÈǰÊý¾Ýй¶ÖÐ̻¶µÄÓû§Ãû - ÃÜÂë¶Ô×Ô¶¯µÇ¼ £¬ÊÔͼ»ñÈ¡Óû§ÕÊ»§Î´¾­ÊÚȨµÄ»á¼û £¬´ËÊÖÒÕµÃÒæÓÚ¡°Æ¾Ö¤½ÓÄÉ¡± £¬¼´Óû§¶àƽ̨ʹÓÃÏàͬÓû§ÃûºÍÃÜÂë £¬µ«ÈôÕË»§ÊܶàÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»¤ £¬¹¥»÷»áʧ°Ü¡£The North FaceÒÑ×îÏÈÏòÊÜÓ°Ïì¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ £¬²¢Ïò·ðÃÉÌØÖÝ×ÜÉó²é³¤·ÖÏíʾÀý֪ͨ £¬¼û¸æÆäÍøÕ¾ÔÚ2025Äê4ÔÂ23ÈÕ·¢Ã÷Òì³£Ô˶¯ £¬¾­ÊÓ²ì £¬µ±ÈÕ¹¥»÷Õß·¢¶¯ÁËС¹æÄ£Æ¾Ö¤Ìî³ä¹¥»÷¡£ÒÑ̻¶µÄÊý¾Ý°üÀ¨ÐÕÃû¡¢¹ºÖÃÀúÊ·¼Í¼¡¢ÊÕ¼þµØµã¡¢µç×ÓÓʼþ¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂëµÈ £¬²»¹ý¸¶¿îÐÅϢδй¶ £¬ÒòÍøÕ¾¸¶¿îÓÉÍⲿÌṩÉÌ´¦Öóͷ£ £¬The North Face½ö±£´æÍê³ÉÁ÷³ÌËùÐèÁîÅÆ¡£ÖµµÃ×¢ÖØµÄÊÇ £¬The North Face¾öÒé²î³ØËùÓÐÕË»§Ç¿ÖÆÖ´ÐÐMFA £¬µ¼ÖÂÆä¿Í»§ÈºËðÊ§ÖØ´ó £¬ÕâÊÇ¸ÃÆ·ÅÆÍøÕ¾×Ô2020ÄêÒÔÀ´ÔâÓöµÄµÚËÄÆðƾ֤Ìî³äÊÂÎñ¡£


https://www.bleepingcomputer.com/news/security/the-north-face-warns-customers-of-april-credential-stuffing-attack/


3. SentinelOneÒòÈí¼þȱÏÝÖÂÆßСʱȫÇò·þÎñÖÐÖ¹


6ÔÂ2ÈÕ £¬ÃÀ¹úÍøÂçÇå¾²¹«Ë¾SentinelOneÉÏÖÜĩ͸¶ £¬ÒòÈí¼þÎó²îµ¼ÖÂÆäÖÜËÄ·ºÆð³¤´ïÆßСʱµÄ¡°È«Çò·þÎñÖÐÖ¹¡± £¬Ó°ÏìÁ˶à¸öÃæÏò¿Í»§µÄ·þÎñ¡£SentinelOneÔÚÖÜËÄÐû²¼µÄÌû×ÓÖÐÈÏ¿ÉÁË´Ë´ÎÖÐÖ¹ £¬²¢Ïò¿Í»§°ü¹ÜÆäϵͳÈÔÊܱ£»¤ £¬Ö»ÊÇÍйÜÏìÓ¦·þÎñÎÞ·¨»ñµÃ¿É¼ûÐÔ £¬ÍþвÊý¾Ý±¨¸æ½öÑÓ³Ùδɥʧ £¬ÇÒÆðÔ´ÆÊÎöÅú×¢Õâ²»ÊÇÇå¾²ÊÂÎñ¡£Á½Ììºó £¬¸Ã¹«Ë¾Ðû²¼»ù´¡Ôµ¹ÊÔ­ÓÉÆÊÎö £¬È·ÈÏÊÂÎñ²¢·ÇÍøÂç¹¥»÷»òÇå¾²Îó²îËùÖ £¬¶øÊÇ»ù´¡ÉèÊ©¿ØÖÆÏµÍ³ÖеÄÈí¼þȱÏÝÒý·¢¡£¸ÃȱÏÝ×Ô¶¯É¾³ýÁËÒªº¦ÍøÂç·ÓɺÍDNSÆÊÎöÆ÷¹æÔò £¬µ¼Ö·þÎñ´óÃæ»ýÖÐÖ¹¡£Ïêϸ¶øÑÔ £¬Òò´«³öµÄÔÆÖÎÀí¹¦Ð§±£´æÈ±ÏÝ £¬AWS Transit Gateway·ÓɱíµÄ±¸·Ý»Ö¸´Îª¿Õ £¬ÔÚËùÓбØÐèµÄÅþÁ¬»ù´¡ÉèÊ©»Ö¸´ºó £¬·þÎñÖÐÖ¹ÈÔÒ»Á¬¡£SentinelOneÚ¹ÊÍ³Æ £¬¹«Ë¾ÕýÔÚ½«Éú²úϵͳ¹ý¶Éµ½»ùÓÚ»ù´¡ÉèÊ©¼´´úÂ루IaC£©Ô­Ôò¹¹½¨µÄÐÂÔÆ¼Ü¹¹ £¬´Ë´Îɾ³ý²Ù×÷Óɼ´½«ÆúÓõĿØÖÆÏµÍ³Òò½¨ÉèÐÂÕË»§´¥·¢¡£¸Ã¿ØÖÆÏµÍ³ÉèÖýÏÁ¿¹¦Ð§±£´æÈí¼þȱÏÝ £¬¹ýʧʶ±ð²î±ð²¢Ó¦ÓÃÁËËùν׼ȷµÄÉèÖÃ״̬ £¬ÁýÕÖÁËÏÈÇ°ÍøÂçÉèÖà £¬µ¼Ö»ָ´ÁËÒ»¸ö¿ÕµÄ·Óɱí¡£´Ë´ÎÖÐÖ¹»¹ÖÂʹ¶Ô¹«Ë¾·þÎñµÄ³ÌÐò»á¼ûÖÐÖ¹ £¬Í³Ò»×ʲúÖÎÀí/¿â´æºÍÉí·Ý·þÎñ¹Ø±Õ £¬¿Í»§ÎÞ·¨Éó²éÎó²î»ò»á¼ûÉí·Ý¿ØÖÆÌ¨¡£±ðµÄ £¬¿ÉÄÜ»¹Ó°ÏìÁËÀ´×ÔÖÖÖÖµÚÈý·½·þÎñµÄÊý¾ÝÌáÈ¡ÒÔ¼°Íйܼì²âºÍÏìÓ¦£¨MDR£©¾¯±¨¡£


https://www.bleepingcomputer.com/news/technology/sentinelone-last-weeks-7-hour-outage-caused-by-software-flaw/


4. ÍøÂç¹¥»÷Ï®»÷ÁËCovenant HealthÔËÓªµÄÒ½Ôº


6ÔÂ2ÈÕ £¬2025Äê5ÔÂ26ÈÕÆð £¬·ÇÓªÀûÐÔÌìÖ÷½ÌÇøÓòÒ½ÁƱ£½¡ÏµÍ³Covenant HealthÔËÓªµÄÈý¼ÒÒ½ÔºÔâÊÜÍøÂç¹¥»÷ £¬±»ÆÈ¹Ø±ÕËùÓÐϵͳÒÔ¿ØÖÆÇå¾²ÊÂÎñ¡£Ê¥ÂêÀöÒ½ÁÆÏµÍ³³ÆÊ¥ÂêÀöÒ½ÔºÓö¹âÔÝʱϵͳ¹ÊÕÏ £¬²¿·Öµç»°ºÍÎĵµÏµÍ³ÊÜÓ°Ïì £¬Ò½ÁÆ·þÎñ¼ÌÐøµ«ºòÕïʱ¼ä¿ÉÄÜÑÓÉ죻ʥԼɪ·òÒ½ÔºÌåÏÖÒòϽµµÍÙʱ¹ÊÕÏ £¬5ÔÂ27ÈÕµ÷½âÃÅÕﻯÑé·þÎñ £¬½öÔÚÔºÇøÄÚ¿ª·ÅÇÒÆ¾ÊµÌå¶©µ¥Ìṩ¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷ÖÐÊý¾ÝÊDZ»µÁÕÕ¾ÉÔâµ½ÀÕË÷Èí¼þ¹¥»÷ £¬Covenant HealthÔ¼ÇëÁ˶¥¼¶ÍøÂçÇ徲ר¼ÒÀ´¿ØÖƺÍÊӲ졣ֻ¹Ü²¿·ÖϵͳºÍÃÅÕïʵÑéÊÒÊÜÓ°Ïì £¬µ«·þÎñÈÔÔÚ¼ÌÐø £¬ÖÐֹˮƽ¼«Ð¡ £¬Ðº±²¼Ê²¶ûÖݵÄʥԼɪ·òÒ½ÔººÍÃåÒòÖݵÄÁ½¼ÒÒ½Ôº¾ùÊܲ¨¼° £¬²»¹ý¸Ã»ú¹¹½¨Ò黼Õß׼ʱ¾ÍÕï¡£5ÔÂ26ÈÕ·¢Ã÷Î¥¹æÐÐΪӰÏìÕû¸ö×éÖ¯ÅþÁ¬ÐÔºó £¬³öÓÚÉóÉ÷˼Á¿ £¬Ò½Ôº¡¢ÕïËùºÍÒ½ÁÆ·þÎñÌṩÕßµÄËùÓÐÊý¾Ýϵͳ»á¼û±»Á¬Ã¦×èÖ¹¡£×èֹ׫д±¾ÎÄʱ £¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£


https://securityaffairs.com/178507/cyber-crime/a-cyberattack-hit-hospitals-operated-by-covenant-health.html


5. ºÚ¿ÍÕýÔÚʹÓÃvBulletinÂÛ̳Èí¼þµÄÑÏÖØÎó²î


5ÔÂ30ÈÕ £¬¿ªÔ´ÂÛ̳Èí¼þvBulletin±»·¢Ã÷±£´æÁ½¸öÑÏÖØÎó²î £¬±àºÅ»®·ÖΪCVE-2025-48827ºÍCVE-2025-48828 £¬ÆÀ¼¶ÎªÑÏÖØ £¬CVSS v3ÆÀ·Ö»®·ÖΪ10.0ºÍ9.0¡£ÕâÁ½¸öÎó²îÉæ¼°Í¨¹ýÄ£°åÒýÇæÀÄÓÃÎó²î¾ÙÐÐAPIÒªÁìŲÓúÍÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£µ±vBulletinÔÚPHP 8.1»ò¸ü¸ß°æ±¾ÉÏÔËÐÐʱ £¬°æ±¾5.0.0ÖÁ5.7.5ºÍ6.0.0ÖÁ6.0.3»áÊܵ½Ó°Ïì¡£ÕâЩÎó²î¿ÉÄÜÔÚÈ¥ÄêÒÑÇÄÈ»ÐÞ¸´ £¬µ«ÒòÐí¶àÍøÕ¾Î´Éý¼¶ £¬ÈÔ̻¶ÔÚΣº¦Ö®Ï¡£2025Äê5ÔÂ23ÈÕ £¬Çå¾²Ñо¿Ô±Egidio RomanoÔÚÆä²©¿ÍÉÏÏêϸڹÊÍÁËÔõÑùʹÓÃÕâЩÎó²î £¬Ö¸³öÎÊÌâÔ´ÓÚvBulletin¶ÔPHP·´ÉäAPIµÄÀÄÓà £¬¸ÃAPIÔÚPHP 8.1ÖеÄÐÐΪת±äÔÊÐíŲÓÃÊܱ£»¤ÒªÁì¶øÎÞÐèÃ÷È·µ÷½â¿É»á¼ûÐÔ¡£Îó²îÁ´°üÀ¨Í¨¹ýÈ«ÐÄÉè¼ÆµÄURLŲÓÃÊܱ£»¤ÒªÁì £¬ÒÔ¼°ÀÄÓÃvBulletinÄ£°åÒýÇæÄÚµÄÄ£°åÌõ¼þ¡£¹¥»÷Õß¿ÉʹÓÃÒ×Êܹ¥»÷µÄ¡°replaceAdTemplate¡±ÒªÁì×¢Èë¶ñÒâÄ£°å´úÂë £¬Èƹý¡°²»Çå¾²º¯Êý¡±¹ýÂËÆ÷ £¬´Ó¶øÔڵײã·þÎñÆ÷ÉÏʵÏÖÍêȫԶ³Ì¡¢Î´¾­Éí·ÝÑéÖ¤µÄ´úÂëÖ´ÐС£5ÔÂ26ÈÕ £¬Çå¾²Ñо¿Ô±Ryan Dewhurst±¨¸æ³ÆÔÚÃÛ¹ÞÈÕÖ¾Öз¢Ã÷¶Ô±£´æÎó²îµÄ¶ËµãµÄÇëÇó £¬²¢×·×Ùµ½Ò»ÃûÀ´×Ô²¨À¼µÄ¹¥»÷ÕßÊÔͼ°²ÅÅPHPºóÃÅÖ´ÐÐϵͳÏÂÁî¡£½¨ÒéÂÛ̳ÖÎÀíÔ±¾¡¿ìÓ¦ÓÃÇå¾²¸üлòÉý¼¶µ½×îа汾6.1.1ÒÔ×èֹΣº¦¡£


https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-critical-flaw-in-vbulletin-forum-software/


6. Netbird³ÉÓã²æÊ½´¹ÂÚй¤¾ß £¬Õë¶Ô¶àµØ²ÆÎñ¸ß¹Ü


6ÔÂ2ÈÕ £¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢³öÖÒÑÔ £¬Ò»³¡Ê¹ÓÃÕýµ±Ô¶³Ì»á¼û¹¤¾ßNetbirdµÄÐÂÓã²æÊ½´¹ÂÚ¹¥»÷Ô˶¯ÕýÔÚ¾ÙÐÐ £¬Ä¿µÄÕë¶ÔÅ·ÖÞ¡¢·ÇÖÞ¡¢¼ÓÄôó¡¢Öж«ºÍÄÏÑǵØÇøÒøÐС¢ÄÜÔ´¡¢°ü¹ÜºÍͶ×ʹ«Ë¾µÄ²ÆÎñ¸ß¹Ü¡£¸ÃÔ˶¯ÓÉTrellix¹«Ë¾ÓÚ2025Äê5ÔÂÖÐÑ®Ê״η¢Ã÷ £¬ÏÖÔÚÉÐδ¹éÒòÓÚÈκÎÒÑÖªÍþвÐÐΪÕß¡£´Ë´Î¹¥»÷ÒÔÒ»·âð³äRothschild&CoÕÐÆ¸Ö°Ô±µÄ´¹ÂÚÓʼþΪÆðÔ´ £¬Í¨¹ýαÔìµÄPDF¸½¼þÁ´½ÓÓÕʹÊܺ¦Õßµã»÷ £¬½ø¶ø±»Öض¨ÏòÖÁÍйÜÔÚFirebaseÓ¦ÓÃÉϵÄURL¡£¹¥»÷ÕßʹÓüÓÃܵÄÖØ¶¨ÏòURLºÍÑéÖ¤Âë¹Ø¿¨À´Èƹý·ÀÓùϵͳ £¬×îÖÕÖ¸µ¼Êܺ¦ÕßÏÂÔØ°üÀ¨¶ñÒâVBScriptµÄZIPѹËõ°ü¡£¸ÃVBScriptÈÏÕæ¼ìË÷²¢Ö´ÐÐÏÂÒ»½×¶ÎVBScript £¬ºóÕß»á½øÒ»²½»ñÈ¡ÓÐÓÃÔØºÉ £¬ÌáÈ¡²¢×°ÖÃNetBirdºÍOpenSSHÁ½¸ö³ÌÐò £¬½¨ÉèÒþ²ØÕË»§¡¢ÆôÓÃÔ¶³Ì×ÀÃæ»á¼û £¬²¢Í¨¹ýÉèÖÃÍýÏëʹÃüʹNetBirdÔÚÊÜѬȾϵͳÉϳ¤ÆÚ»¯ÔËÐÐ £¬Í¬Ê±É¾³ý×ÀÃæ¿ì½Ý·½·¨ÒÔÑÚÊÎÈëÇÖÐÐΪ¡£±ðµÄ £¬Trellix»¹·¢Ã÷Ò»¸öÒÑ»îÔ¾½üÒ»ÄêµÄÖØ¶¨ÏòURLÌṩÏàͬµÄVBScriptÓÐÓÃÔØºÉ £¬ÕâÅú×¢¸Ã¹¥»÷Ô˶¯¿ÉÄÜÒÑÒ»Á¬Ò»¶Îʱ¼ä¡£


https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html