¹È¸èÐÞ¸´ÁËChromeÖб»Æð¾¢Ê¹ÓõÄɳºÐÌÓÒÝÁãÈÕÎó²î
Ðû²¼Ê±¼ä 2025-07-181. ¹È¸èÐÞ¸´ÁËChromeÖб»Æð¾¢Ê¹ÓõÄɳºÐÌÓÒÝÁãÈÕÎó²î
7ÔÂ16ÈÕ£¬¹È¸è¿ËÈÕÐû²¼Chromeä¯ÀÀÆ÷Çå¾²¸üУ¬½ôÆÈÐÞ¸´Áù¸öÇå¾²Îó²î£¬ÆäÖбàºÅΪCVE-2025-6558µÄ¸ßΣÎó²îÒѱ»¹¥»÷ÕßʹÓã¬ÊµÏÖɳºÐÌÓÒÝ¡£¸ÃÎó²îÑÏÖØÆ·¼¶´ï8.8·Ö£¬Ó°Ïì138.0.7204.157֮ǰ°æ±¾µÄChrome£¬¹È¸èÍþвÆÊÎöС×飨TAG£©ÓÚ6ÔÂ23ÈÕ·¢Ã÷ºóѸËÙÍÆ³ö²¹¶¡£¬½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁ138.0.7204.157/158°æ±¾¡£CVE-2025-6558µÄ½¹µãÎÊÌâÔÚÓÚChromeµÄͼÐÎÒýÇæ×é¼þANGLE¶Ô²»ÊÜÐÅÍÐÊäÈëµÄÑé֤ȱ·¦¡£ANGLE×÷Ϊ¿ªÔ´Í¼ÐÎÁýͳ²ã£¬ÈÏÕæ½«OpenGL ESŲÓÃת»»ÎªÆäËûͼÐÎAPI£¨ÈçDirect3D¡¢Vulkan£©£¬µ«ÆäÔÚ´¦Öóͷ£WebGLÍøÕ¾µÈȪԴµÄGPUÏÂÁîʱ±£´æÈ±ÏÝ£¬ÔÊÐí¹¥»÷Õßͨ¹ýÌØÖÆHTMLÒ³ÃæÔÚGPUÀú³ÌÖÐÖ´ÐÐí§Òâ´úÂ룬²¢×îÖÕÍ»ÆÆä¯ÀÀÆ÷ɳºÐÏÞÖÆ¡£É³ºÐ»úÖÆ±¾ÊÇChromeµÄ½¹µãÇå¾²·À»¤£¬ÓÃÓÚ¸ôÀëä¯ÀÀÆ÷Àú³ÌÓë²Ù×÷ϵͳ£¬±ÜÃâ¶ñÒâÈí¼þÀ©É¢ÖÁ×°±¸ÆäËû²¿·Ö¡£´Ë´ÎÎó²îµÄÍ»ÆÆ£¬¿ÉÄÜʹ¹¥»÷ÕßÖ±½Ó¿ØÖÆÓû§×°±¸£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý»ò°²ÅŶñÒâÈí¼þ¡£
https://www.bleepingcomputer.com/news/security/google-fixes-actively-exploited-sandbox-escape-zero-day-in-chrome/
2. ¸ñÀµÂÄáÊÕÑø»ú¹¹Êý¾Ýй¶£¬110ÍòÌõ¼Í¼±»ÆØ¹â
7ÔÂ17ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah FowlerÔÚÍøÂçɨÃèÖз¢Ã÷£¬ÃÀ¹ú¸ñÀµÂÄáÊÕÑøÖÐÐÄÏà¹ØµÄ´ó×ÚδÊܱ£»¤Êý¾ÝÔÚÏß̻¶£¬Òý·¢ÑÏÖØÒþ˽Σ»ú¡£´Ë´Îй¶µÄÊý¾Ý¿âÈÝÁ¿´ï2.49GB£¬°üÀ¨Áè¼Ý110ÍòÌõÃô¸Ð¼Í¼£¬Éæ¼°¶ùͯ¡¢ÑøâïÊÑ¡¢Ç×Éú¼ÒÍ¥¼°»ú¹¹Ô±¹¤£¬º¸ÇÐÕÃû¡¢ÁªÏµ·½·¨¡¢²¡Àý¼Í¼¡¢Ë½ÈËÆÀ¹ÀµÈ¸ß¶ÈÒþ˽ÐÅÏ¢¡£ÕâЩÊý¾ÝδÉèÖÃÃÜÂë»ò¼ÓÃܱ£»¤£¬Èκξ߱¸»ù´¡ÍøÂç֪ʶµÄÓû§¾ù¿Éͨ¹ý̻¶µÄÔÆ·þÎñÆ÷Ö±½Ó»á¼û£¬ÓÈÆäÒ×±»ÍøÂç·¸·¨·Ö×ÓʹÓá£Fowler·¢Ã÷Êý¾ÝºóÁ¬Ã¦ÏòÏà¹Ø×éÖ¯ÌᳫÈÏÕæÈÎÅû¶£¬Ô½ÈÕÊý¾ÝËä±»½ôÆÈÏÂÏߣ¬µ«Ì»Â¶Ê±³¤¼°ÊÇ·ñÔâ¶ñÒâ»á¼ûÈÔ´æÒÉ¡£Ð¹Â¶¼Í¼Դ×Ըûú¹¹ÓÃÓÚÖÎÀí°¸ÀýÓëÏàͬµÄCRMƽ̨£¬Îļþ¼Ð±ê×¢"ÁªÏµÈË""ÉêÇë""Ç×Éú¸¸Ç×"µÈ£¬Ïêϸ¼Í¼ÉêÇëÈ˼ÒÍ¥Åä¾°¡¢±»¾ÜÊÕÑøÔµ¹ÊÔÓÉ¡¢Ò©ÎïÀÄÓûòÖ´·¨ÎÊÌâµÈϸ½Ú¡£Ö»¹Üδ°üÀ¨ÍêÕû°¸¼þµµ°¸£¬µ«µ¥Ìõ¼Í¼ÒѰüÀ¨×ã¹»ÐÅÏ¢£¬×ãÒÔ³ÉΪÉç»á¹¤³Ì¹¥»÷»òթƵÄÄ¿µÄ¡£ÓÈΪÃô¸ÐµÄÊÇ28.4ÍòÌõµç×ÓÓʼþÔªÊý¾Ý£¬ËäÎ´ÆØ¹âÍêÕûÓʼþÕýÎÄ£¬µ«Ö÷ÌâÐпÉÄÜй¶ÐÕÃû»ò²Î¿¼ÐÅÏ¢£¬ÈôÍŽá»ú¹¹ÓëÒ½ÁÆ¡¢Éç»á·þÎñ»ú¹¹µÄ¹ØÁª¼Í¼£¬Òþ˽Σº¦½«½øÒ»²½À©´ó¡£ÊÖÒÕÆÊÎöÏÔʾ£¬¸ÃÊý¾Ý¿âÓÉ´¿Îı¾ÓëͨÓÃΨһ±êʶ·û£¨UUID£©×é³É£¬ËäUUID¿´ËÆÖش󣬵«È±·¦¼ÓÃܱ£»¤£¬ÎÞ·¨×èֹδ¾ÊÚȨ»á¼û¡£
https://hackread.com/massive-data-leak-texas-adoption-agency-million-records/
3. ÎÚ¿ËÀ¼·¢Ã÷APT28ʹÓÃLLMµÄÐÂÐͶñÒâÈí¼þLameHug
7ÔÂ17ÈÕ£¬ÎÚ¿ËÀ¼¹ú¼ÒÍøÂçÊÂÎñÏìӦС×飨CERT-UA£©¿ËÈÕÅû¶ÁËÒ»ÖÖÃûΪLameHugµÄÐÂÐͶñÒâÈí¼þ£¬ÆäÍ»ÆÆÐÔÌØÕ÷ÔÚÓÚÊ״ιûÕæ¼Í¼ÁËʹÓôóÐÍÓïÑÔÄ£×Ó£¨LLM£©¶¯Ì¬ÌìÉú¹¥»÷ÏÂÁîµÄ¹¥»÷ģʽ£¬²¢½«¹¥»÷¹éÒòÓÚ¶íÂÞ˹¹ú¼ÒÖ§³ÖµÄAPT28£¨Fancy Bear£©×éÖ¯¡£¸Ã¶ñÒâÈí¼þÓÉPython±àд£¬Í¨¹ýHugging Face APIÓë°¢ÀïÔÆ¿ªÔ´µÄQwen 2.5-Coder-32B-InstructÄ£×Ó½»»¥¡£LameHugµÄ¹¥»÷Á´ÌõʼÓÚ¶ñÒâµç×ÓÓʼþ£º¹¥»÷Õßð³äÕþ¸®¹ÙÔ±£¬ÏòÕþ¸®ÐÐÕþ»ú¹¹·¢ËͰüÀ¨ZIP¸½¼þµÄ´¹ÂÚÓʼþ£¬¸½¼þÄÚǶLameHug¼ÓÔØ³ÌÐò¡£Ò»µ©Ö´ÐУ¬¶ñÒâÈí¼þ»áͨ¹ýLLM¶¯Ì¬ÌìÉúϵͳÕì̽ÓëÊý¾ÝÇÔÈ¡ÏÂÁÏêϸ²Ù×÷°üÀ¨£ºÍøÂçϵͳÐÅÏ¢²¢ÉúÑÄÖÁ¡°info.txt¡±Îļþ£»µÝ¹éËÑË÷¡°Îĵµ¡±¡°×ÀÃæ¡±¡°ÏÂÔØ¡±µÈÒªº¦WindowsĿ¼ÖеÄÎĵµ£»×îÖÕͨ¹ýSFTP»òHTTP POSTÇëÇó½«Êý¾ÝÇÔÈ¡ÖÁ¹¥»÷Õß¿ØÖƵķþÎñÆ÷¡£ÊÖÒÕ²ãÃæ£¬LameHugµÄÁ¢ÒìÐÔÌåÏÖÔÚÁ½·½Ã棺ÆäÒ»£¬ËüÊÇÊ׸ö¹ûÕæ¼Í¼µÄʹÓÃLLMÖ§³Ö¹¥»÷ÕßʹÃüµÄ¶ñÒâÈí¼þ£¬Ê¹ÍþвÐÐΪÕßÄÜÔÚ¹¥»÷Àú³ÌÖÐʵʱµ÷½âÕ½ÂÔ£¬ÎÞÐè°²ÅÅÐÂÓÐÓÃÔØºÉ£»Æä¶þ£¬Í¨¹ýHugging Face»ù´¡ÉèÊ©¾ÙÐÐÖ¸»Ó¿ØÖÆ£¨C2£©Í¨Ñ¶£¬½µµÍÁ˹ŰåC2·þÎñÆ÷µÄ̻¶Σº¦£¬ÑÓÉìÁËÈëÇÖÒþ²ØÆÚ¡£±ðµÄ£¬¶¯Ì¬ÌìÉúµÄÏÂÁî¿É¹æ±Ü»ùÓÚ¾²Ì¬ÌØÕ÷¼ì²âµÄÇå¾²Èí¼þ£¬ÔöÌíÁË·ÀÓùÄѶȡ£
https://www.bleepingcomputer.com/news/security/lamehug-malware-uses-ai-llm-to-craft-windows-data-theft-commands-in-real-time/
4. StormousÀÕË÷Èí¼þÍÅ»ïÇÔÈ¡ÑÇÀûÉ£ÄÇÖÝÒ½ÁÆÖÐÐÄ60Íò»¼ÕßÊý¾Ý
7ÔÂ17ÈÕ£¬Ç×¶íÀÕË÷Èí¼þ×éÖ¯Stormous¿ËÈÕÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû³Æ£¬ÀÖ³ÉÈëÇÖÃÀ¹úÑÇÀûÉ£ÄÇÖݱ±²¿·ÇÓªÀûÐÔÁª°îÈÏÖ¤Ò½ÁÆÖÐÐÄ£¨FQHC£©North Country HealthCare£¬ÇÔÈ¡ÁËÔ¼60ÍòÃû»¼ÕßµÄÃô¸ÐÐÅÏ¢¡£¸ÃÒ½ÁÆÖÐÐÄÔÚ11¸öÉçÇøµÄ14¸öËùÔÚÌṩȫ¿ÆÒ½ÁÆ·þÎñ£¬ÁýÕÖ¼Òͥҽѧ¡¢¶ù¿Æ¡¢ÐÐΪ¿µ½¡¡¢ÑÀ¿ÆÕչ˻¤Ê¿µÈ¶àÁìÓò£¬²¢½ÓÊÜ´ó´ó¶¼°ü¹ÜÍýÏ뼰ΪδͶ±£»¼ÕßÌṩÓöÈÕÛ¿Û¡£StormousÍÅ»ïÉù³Æ£¬ÇÔÈ¡µÄÊý¾Ý°üÀ¨ÍêÕûµÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡¢Êܱ£»¤¿µ½¡ÐÅÏ¢£¨PHI£©¡¢Õï¶Ï´úÂ루ICD£©¼°ÕïËùÓëÒ½ÁÆ·þÎñÌṩÕßÏêÇ飬Ïêϸ°üÀ¨»¼ÕßÈ«Ãû¡¢³öÉúÈÕÆÚ¡¢ÁªÏµ·½·¨¡¢¾ÍÕïÈÕÆÚÓëËùÔÚ¡¢°ü¹Ü¹«Ë¾ÐÅÏ¢¡¢Õï¶ÏÐÎòµÈ¡£¸Ã×éÖ¯½ÓÄÉ¡°Ë«ÖØÀÕË÷¡±Ä£Ê½£ºÆäÖÐ10ÍòÃû»¼ÕßµÄÊý¾Ý±»¹ÒÅÆ³öÊÛ£¬Ê£Óà50ÍòÌõ¼Í¼ÔòÓÚ7ÔÂ15ÈÕ±»Ãâ·Ñ¹ûÕæÖÁйÃÜÍøÕ¾£¬½øÒ»²½À©´óÁËÊý¾Ý̻¶Σº¦¡£Stormous×Ô2022ÄêÍ·»îÔ¾ÒÔÀ´£¬ÒÑÕë¶ÔÒ½ÁƱ£½¡¡¢Âùݡ¢¿Æ¼¼¡¢Õþ¸®µÈÁìÓòµÄÖÁÉÙ150¸ö×éÖ¯·¢¶¯¹¥»÷£¬Êܺ¦Õß¼¯ÖÐÓÚÎ÷°àÑÀ¡¢ÃÀ¹ú¡¢°¢ÁªÇõ¡¢·¨¹úºÍ°ÍÎ÷¡£
https://securityaffairs.com/180057/data-breach/180057stormous-ransomware-gang-targets-north-country-healthcare-claims-600k-patient-data-stolen.html
5. BigONEÉúÒâËùÔâºÚ¿Í¹¥»÷£¬2700ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»µÁ
7ÔÂ16ÈÕ£¬¼ÓÃÜÇ®±ÒÉúÒâËùBigONE¼ì²âµ½Æ½Ì¨²¿·Ö×ʲú·ºÆðÒì³£±ä»»£¬¾ÊÓ²ìÈ·ÈÏϵÕë¶ÔÆäÈÈÇ®°üµÄµÚÈý·½¹¥»÷ËùÖ£¬ºÚ¿ÍÇÔÈ¡Á˼ÛÖµÔ¼2700ÍòÃÀÔªµÄÖÖÖÖÊý×Ö×ʲú¡£BigONEËæ¼´Ðû²¼Í¨¸æ³Æ£¬Óû§Ë½Ô¿¼°Ð¡ÎÒ˽¼ÒÊý¾ÝδÊÜÓ°Ï죬ËùÓÐËðʧ½«ÓÉÆ½Ì¨´¢±¸½ðÈ«¶î¼ç¸º£¬Óû§×ʲú²»»áÔâÊÜʵÖÊÐÔËðʧ¡£ÏÖÔÚ£¬Æ½Ì¨ÒÑÓëÇå¾²¹«Ë¾SlowMistÏàÖú×·×Ù±»µÁ×ʽ𣬲¢¼à¿ØÆäÔÚÇø¿éÁ´ÉϵÄÁ÷¶¯ÇéÐΣ¬Í¬Ê±Ðû²¼´æ¿îºÍÉúÒâ·þÎñÒÑÍêÈ«»Ö¸´£¬µ«ÌáÏÖ¼°OTC¹¦Ð§ÉÐÎ´ÖØÆô¡£Ö»¹Ü¹¥»÷ÒªÁìÒѱ»¿ØÖÆ£¬µ«ÏêϸÈëÇÖÊÖ¶ÎÈÔδÃ÷È·¡£SlowMistÆðÔ´Åжϴ˴ÎÊÂÎñΪ¹©Ó¦Á´¹¥»÷£¬¶øÇø¿éÁ´ÊÓ²ì»ú¹¹LookochainÔòÅû¶£¬ºÚ¿ÍÒÑ×îÏÈÏ´Ç®²Ù×÷£¬½«Ôß¿î¶Ò»»Îª120ö±ÈÌØ±Ò£¨BTC£©¡¢1272öÒÔÌ«±Ò£¨ETH£©¡¢2625öSolana£¨SOL£©¼°2330ÍòöTron£¨TRX£©¡£
https://www.bleepingcomputer.com/news/security/hacker-steals-27-million-in-bigone-exchange-crypto-breach/
6. Ïã¸Û½ðÈÚ»ú¹¹ÔâSquidLoader¶ñÒâÈí¼þ¹¥»÷
7ÔÂ16ÈÕ£¬Çå¾²Ñо¿Ö°Ô±¿ËÈÕ·¢Ã÷£¬Õë¶ÔÏã¸Û½ðÈÚ»ú¹¹µÄÐÂÐͶñÒâÈí¼þ¹¥»÷À˳±ÕýÔÚÉìÕÅ£¬Æä½¹µãΪ¾ß±¸¸ß¶È¹æ±ÜÄÜÁ¦µÄ¼ÓÔØÆ÷SquidLoader¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶à½×¶ÎѬȾÁ´°²ÅÅCobalt Strike Beacon£¬²¢½ÓÄɶàÖÖÏȽø¿¹ÆÊÎöÕ½ÂÔ£¬¶ÔÄ¿µÄ»ú¹¹×é³ÉÑÏÖØÍþв¡£¹¥»÷ʼÓÚÓã²æÊ½´¹ÂÚÓʼþ¡£ÕâЩÒÔͨË×»°×«Ð´µÄÓʼþð³ä½ðÈÚ»ú¹¹£¬¸½´øÎ±×°³É·¢Æ±µÄÃÜÂë±£»¤RARѹËõ°ü¡£Óû§½âѹºó£¬»á·¢Ã÷Ò»¸öαװ³ÉMicrosoft WordÎĵµµÄ¶ñÒâPE¶þ½øÖÆÎļþ£¬ÆäÎļþÃûÄ£ÄâÕýµ±³ÌÐò¡°AMDRSServ.exe¡±£¬ÒÔÔöÇ¿Éç»á¹¤³ÌÓÕÆÐÔ¡£Ò»µ©Ö´ÐУ¬SquidLoader±ãÆô¶¯¶à½×¶ÎѬȾÁ÷³Ì£ºÊ×ÏÈ×ÔÎÒ½â°üÒÔ½âÃÜÄÚ²¿¸ºÔØ£¬Ëæºóͨ¹ý»ìÏý´úÂ붯̬ÆÊÎöÒªº¦Windows API£¬²¢³õʼ»¯»ùÓÚ¿ÍÕ»µÄ×Ô½ç˵½á¹¹´æ´¢²Ù×÷Êý¾Ý¡£Îª¹æ±ÜɳÏä¡¢µ÷ÊÔÆ÷¼°·À²¡¶¾¹¤¾ß£¬¸Ã¶ñÒâÈí¼þÖ´ÐжàÖØ¹æ±ÜÀý³Ì£¬°üÀ¨ÇéÐμì²é¡¢×Ö·û´®»ìÏý¡¢¿ØÖÆÁ÷»ìÏý¼°Å²ÓÃδ¹ûÕæµÄWindowsϵͳŲÓá£Èô¼ì²âµ½ÆÊÎö¹¤¾ß»òµ÷ÊÔ¼£Ï󣬯ä»áÁ¬Ã¦ÖÕÖ¹ÔËÐС£±ðµÄ£¬SquidLoader»¹½ÓÄÉÑÓ³ÙÏß³Ì˯Ãß¡¢Òì²½Àú³ÌŲÓõÈÊÖÒÕÈÆ¹ý×Ô¶¯»¯É³Ï䡣ͨ¹ý¼ì²éºó£¬¶ñÒâÈí¼þ»áͨ¹ýÄ£ÄâKubernetes·þÎñ·¾¶µÄURLÁªÏµC2·þÎñÆ÷£¬ÍøÂç²¢´«ÊäÖ÷»úÊý¾Ý£¬×îÖմӴμ¶IPµØµãÏÂÔØCobalt Strike Beacon¡£
https://www.infosecurity-magazine.com/news/squidloader-malware-targets-hong/


¾©¹«Íø°²±¸11010802024551ºÅ