ÎÚ¿ËÀ¼Ôâ¶à×éÍþвÐÐΪÕßÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2025-08-08

1. ÎÚ¿ËÀ¼Ôâ¶à×éÍþвÐÐΪÕßÍøÂç¹¥»÷


8ÔÂ6ÈÕ£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×飨CERT-UA£©¿ËÈÕÐû²¼¾¯±¨£¬Ö¸³ö¸Ã¹úÕþ¸®»ú¹¹¡¢¹ú·À²½¶Ó¼°¹ú·À¹¤ÒµÆóÒµÕýÔâÊܶà¸öÍþвÐÐΪÕßµÄÒ»Á¬ÍøÂç¹¥»÷¡£ÆäÖУ¬UAC-0099×éÖ¯ÓëGamaredonÕûÌåÓÈΪ»îÔ¾£¬¶þÕß¾ùͨÏ꾡ÃÜÉè¼ÆµÄÍøÂç´¹ÂÚÊÖ¶ÎÉøÍ¸Ä¿µÄϵͳ£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢½¨É賤ÆÚ»¯»á¼û¡£UAC-0099×éÖ¯×Ô2023Äê6ÔÂÊ״α»¹ûÕæ¼Í¼ÒÔÀ´£¬¶à´ÎÒÔÎÚ¿ËÀ¼ÊµÌåÎªÌØ¹¤Ô˶¯Ä¿µÄ¡£Æä×îй¥»÷ʹÓ÷¨Ôº´«Æ±Ö÷ÌâµÄ´¹ÂÚÓʼþ£¬Í¨¹ýCuttlyµÈURLËõ¶Ì·þÎñ·¢ËÍÁ´½Ó£¬ÓÕµ¼Êܺ¦ÕßÏÂÔØ°üÀ¨HTMLÓ¦ÓóÌÐò£¨HTA£©µÄË«´æµµÎļþ¡£Ö´Ðк󣬻ìÏýµÄVisual Basic¾ç±¾»á½¨ÉèÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯£¬²¢¼ÓÔØMATCHBOIL¶ñÒâÈí¼þ£¬×îÖÕͶ·ÅMATCHWOKºóÃż°DRAGSTAREÊý¾ÝÇÔÈ¡³ÌÐò¡£Óë´Ëͬʱ£¬Çå¾²³§ÉÌESETµÄ±¨¸æÕ¹ÏÖ£¬¶íÂÞ˹Åä¾°µÄGamaredonÕûÌåÔÚ2024ÄêϰëÄêÏÔÖøÔöÇ¿Á˶ÔÎÚ¿ËÀ¼µÄ¡°ÎÞÇ顱Óã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷¡£¸Ã×éÖ¯½ÓÄÉÁùÖÖÐÂÐ͹¤¾ß£¬°üÀ¨ÓÃÓÚÕï¶ÏÊý¾ÝÍøÂçµÄPteroDespair¡¢ºáÏòÒÆ¶¯µÄPteroTickleÎäÆ÷»¯¹¤¾ß£¬ÒÔ¼°Í¨¹ýTelegraph API½¨Éè¼ÓÃÜͨµÀµÄPteroGraphin³¤ÆÚ»¯¹¤¾ß¡£


https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html


2. Ç÷ÊÆ¿Æ¼¼Apex Oneƽ̨ÏÖ»îԾʹÓõÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î


8ÔÂ6ÈÕ£¬ÍøÂçÇå¾²³§ÉÌÇ÷ÊÆ¿Æ¼¼¿ËÈÕÏò¿Í»§·¢³ö½ôÆÈÖÒÑÔ£¬³ÆÆäApex One¶ËµãÇ徲ƽ̨ÕýÔâÊÜÕë¶ÔÁ½¸öÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-54948¡¢CVE-2025-54987£©µÄ»îԾʹÓ㬱޲ßÓû§Á¬Ã¦½ÓÄÉ·À»¤²½·¥¡£´Ë´ÎÎó²îÔ´ÓÚApex OneÖÎÀí¿ØÖÆÌ¨£¨ÍâµØ°æ£©µÄÏÂÁî×¢ÈëȱÏÝ£¬ÔÊÐíÔ¤ÏÈͨ¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚδÐÞ²¹µÄϵͳÉÏÔ¶³ÌÖ´ÐÐí§Òâ´úÂë¡£Ö»¹ÜÎó²îÐè¹¥»÷Õ߾߱¸¿ØÖÆÌ¨»á¼ûȨÏÞ£¬µ«Ç÷ÊÆ¿Æ¼¼Ã÷È·ÌåÏÖÒÑÊӲ쵽ÖÁÉÙÒ»ÆðÒ°ÍâʹÓð¸Àý£¬ÈÕ±¾CERTҲͬ²½Ðû²¼Ô¤¾¯£¬Ç¿µ÷ÆäÏÖʵÍþвÐÔ¡£ÎªÓ¦¶Ô½ôÆÈÇéÐΣ¬Ç÷ÊÆ¿Æ¼¼³Æ2025Äê8ÔÂÖÐÑ®Ðû²¼²¹¶¡£¬²¢Ìṩ¶ÌÆÚ»º½â¹¤¾ß¡£¸Ã¹¤¾ßͨ¹ý½ûÓÃÖÎÀíÔ±´ÓApex One¿ØÖÆÌ¨Ô¶³Ì°²ÅÅÊðÀíµÄ¹¦Ð§£¬¿ÉÍêÈ«×è¶ÏÒÑÖªÎó²îʹÓ÷¾¶£¬µ«»áµ¼ÖÂÔÝʱʧȥԶ³ÌÖÎÀíÄÜÁ¦¡£¹«Ë¾½¨ÒéÓû§ÓÅÏȰ²ÅŴ˹¤¾ß£¬×ÝÈ»ÐèÎþÉü²¿·Ö±ãµ±ÐÔÒÔÈ·±£¶ËµãÇå¾²¡£½øÒ»²½·À»¤½¨Òé°üÀ¨£ºÈô¿ØÖÆÌ¨IPµØµã̻¶ÓÚÍâ²¿ÍøÂ磬ӦÁ¬Ã¦ÊµÑéÔ´IPÏÞÖÆµÈ»á¼û¿ØÖƲ½·¥¡£


https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-endpoint-protection-zero-day-exploited-in-attacks/


3. еġ°ÓÄÁéµç»°¡±Õ½ÊõʹÓÃZoomºÍMicrosoft Teams¾ÙÐÐC2²Ù×÷


8ÔÂ6ÈÕ£¬ÔÚBlackHat USA 2025´ó»áÉÏ£¬PraetorianÇå¾²Ñо¿Ô±Adam CrosserÕ¹ÏÖÁËÒ»ÖÖÃûΪ"ÓÄÁéºô½Ð"£¨Ghost Calls£©µÄÐÂÐͺóʹÓÃÏÂÁîÓë¿ØÖÆ£¨C2£©¹æ±ÜÊÖÒÕ¡£¸ÃÊÖÒÕͨ¹ýÀÄÓÃZoom¡¢Microsoft TeamsµÈ¾Û»áÓ¦ÓóÌÐòʹÓõÄTURNЭÒé·þÎñÆ÷£¬½«¶ñÒâC2Á÷Á¿Î±×°³ÉÕý³£ÊÓÆµ¾Û»áͨѶ£¬´Ó¶øÈƹý¹Å°åÍøÂçÇå¾²·ÀÓù¡£TURNЭÒé±¾ÊÇÓÃÓÚ×ÊÖúNAT·À»ðǽºó×°±¸½¨ÉèÊÓÆµÍ¨»°¡¢VoIPµÈʵʱͨѶµÄ¸¨ÖúЭÒé¡£µ±Óû§¼ÓÈëZoom»òTeams¾Û»áʱ£¬¿Í»§¶Ë»á»ñÈ¡ÔÝʱTURNƾ֤ÒÔ½¨ÉèÖмÌÅþÁ¬¡£"ÓÄÁéºô½Ð"ͨ¹ýÐ®ÖÆÕâЩÕýµ±Æ¾Ö¤£¬ÔÚ¹¥»÷ÕßÓëÊܺ¦Õß×°±¸¼ä¹¹½¨»ùÓÚWebRTCµÄ¼ÓÃÜËíµÀ£¬½«C2Ö¸Áîαװ³ÉͨÀýÊÓÆµ¾Û»áÁ÷Á¿¡£ÓÉÓÚÁ÷Á¿¾­ÆóÒµ³£ÓÃÓòÃû·ÓÉ£¬ÇÒʹÓö˿Ú443µÄUDP/TCP×Ô˳Ӧ´«Ê䣬¿ÉÈÆ¹ý·À»ðǽ¡¢ÊðÀí¼°TLS¼ì²é£¬ÊµÏָ߶ÈÒþ²ØµÄÏÂÁî¿ØÖÆ¡£CrosserÖ¸³ö£¬Óë¹Å°åC2»úÖÆÏà±È£¬¸ÃÒªÁì¾ß±¸Èý´óÓÅÊÆ£ºÆäÒ»£¬ÎÞÐèÒÀÀµÈí¼þÎó²î£¬½öͨ¹ýÀÄÓÃÕýµ±»ù´¡ÉèÊ©¼´¿ÉʵÏÖ£»Æä¶þ£¬Ö§³Öʵʱ½»»¥£¬Öª×ãVNCÔ¶³Ì¿ØÖƵÈÐèÒªµÍÑӳٵIJÙ×÷ÐèÇ󣻯äÈý£¬¹¥»÷ÕßÎÞÐè̻¶×ÔÓÐÓòÃû»ò»ù´¡ÉèÊ©£¬¼«´ó½µµÍ×·×ÙΣº¦¡£


https://www.bleepingcomputer.com/news/security/new-ghost-calls-tactic-abuses-zoom-and-microsoft-teams-for-c2-operations/


4. µÂ¹úµçÐÅMagentaTVƽ̨Òò¹ã¸æÆ½Ì¨Îó²îй¶Óû§Êý¾Ý


8ÔÂ6ÈÕ£¬µÂ¹úµçÐÅ£¨Deutsche Telekom£©ÆìÏÂÓÎýÌåÆ½Ì¨MagentaTVÒòµÚÈý·½¹ã¸æÆ½Ì¨Îó²îÔâÓöÓû§Êý¾Ýй¶£¬Ð¹Â¶Ê±³¤´ïÊýÔ¡£Ñо¿ÍŶÓÓÚ2025Äê6ÔÂÖÐÑ®·¢Ã÷£¬ÓÉ¹ã¸æÊÖÒÕ¹«Ë¾EquativÆìϵÄServerside.aiÍйܵÄElasticsearchÊý¾Ý¿âδÉè±£»¤£¬µ¼ÖÂMagentaTVÓû§ÈÕÖ¾±»¹ûÕæÌ»Â¶¡£Ö»¹ÜµÂ¹úµçÐÅÔÚÍŶÓת´ïºóÒÑÏÂÏ߸ÃʵÀý£¬µ«Ì»Â¶Ê±´ú£¨ÖÁÉÙ×Ô2025Äê2ÔÂÆð£©ÀÛ»ýµÄ³¬3.24ÒÚÌõÈÕÖ¾×ÜÁ¿´ï729GBÒÑÃæÁÙDZÔÚÀÄÓÃΣº¦¡£´Ë´Îй¶µÄÊý¾ÝÖ÷ÒªÔ´ÓÚÓû§ÓëMagentaTVƽ̨µÄ½»»¥ÇëÇ󣬰üÀ¨HTTP±êÍ·ÖеķÇÃô¸ÐÐÅÏ¢£¨ÈçÓû§ÊðÀí£©¼°²¿·ÖÃô¸Ð±êʶ·û£¬°üÀ¨Î¨Ò»×°±¸±êʶ£¨MACµØµã£©¡¢ÍøÂçÅþÁ¬±êʶ£¨IPµØµã£©¡¢ÕË»§¹ØÁªID£¨¿Í»§ID¼°»á»°ID£©¡£Ö»¹Üµ¥ÌõÊý¾Ý¼ÛÖµÓÐÏÞ£¬µ«¹¥»÷Õß¿Éͨ¹ý½»Ö¯ÒýÓöàԴй¶Êý¾Ý£¨ÈçÀúʷй¶µÄIPÓëÓû§ÐÅϢƥÅ䣩ʵÏÖÓû§Éí·Ý×·×Ù»ò×°±¸¶¨Î»¡£


https://cybernews.com/security/deutsche-telekom-magentatv-data-leak/


5. ¹È¸èÔÚÒ»Á¬µÄSalesforceÊý¾Ý͵ÇÔ¹¥»÷ÖÐÔâÓöÊý¾Ýй¶


8ÔÂ6ÈÕ£¬¿Æ¼¼¾ÞÍ·Google¿ËÈÕÈ·ÈϳÉΪÀÕË÷×éÖ¯ShinyHuntersµÄ×îй¥»÷Ä¿µÄ£¬ÆäÆóÒµSalesforce¿Í»§¹ØÏµÖÎÀí£¨CRM£©ÏµÍ³ÔâÈëÇÖ£¬µ¼Ö²¿·Ö¿Í»§Êý¾Ýй¶¡£´Ë´ÎÊÂÎñÓë¸Ã×éÖ¯½üÆÚÕë¶ÔÈ«ÇòÆóÒµµÄ´ó¹æÄ£Êý¾ÝÇÔÈ¡Ðж¯Ïà¹Ø£¬Éæ¼°ÓïÒô´¹ÂÚ£¨Vishing£©Éç»á¹¤³Ì¹¥»÷¼°Salesforceƽ̨Îó²îʹÓ᣾ÝGoogleÅû¶£¬6ÔÂʱ´ú£¬ÆäÒ»¸öÓÃÓÚ´æ´¢ÖÐСÆóÒµÁªÏµÐÅÏ¢¼°Ïà¹Ø±¸×¢µÄSalesforceʵÀý£¬ÒòÔâÓö±»×·×ÙΪ¡°UNC6040¡±»ò¡°UNC6240¡±µÄÍþвÐÐΪÕß¹¥»÷¶øÊ§ÏÝ¡£¹¥»÷Õßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÇÖÈëϵͳ£¬ÔÚ¶ÌÔÝ»á¼û´°¿ÚÄÚÇÔÈ¡ÁË»ù´¡ÉÌÒµÐÅÏ¢£¬°üÀ¨ÆóÒµÃû³Æ¡¢ÁªÏµ·½·¨µÈ´ó²¿·ÖΪ¹ûÕæ»ò·ÇÃô¸ÐÊý¾Ý¡£GoogleÇ¿µ÷ÒÑѸËÙÇжÏÈëÇÖ·¾¶²¢Íê³ÉÓ°ÏìÆÊÎö£¬µ«Î´Ã÷È·ÏêϸÊÜÓ°Ïì¿Í»§ÊýÄ¿¡£ÖµµÃ×¢ÖØµÄÊÇ£¬´Ë´Î¹¥»÷Ä»ºóºÚÊÖʵΪÎÛÃûÕÑÖøµÄShinyHuntersÀÕË÷¼¯ÍÅ¡£´Ë´ÎÐж¯ÖУ¬ShinyHuntersͨ¹ýÈëÇÖÆóÒµSalesforceʵÀýÇÔÈ¡Êý¾Ý£¬²¢ÒÔ¹ûÕæÐ¹Â¶»ò³öÊÛÊý¾ÝΪÍþв¾ÙÐÐÀÕË÷¡£


https://www.bleepingcomputer.com/news/security/google-suffers-data-breach-in-ongoing-salesforce-data-theft-attacks/


6. ·¨¹ú²¼ÒÁ¸ñµçÐÅÔâÓö´ó¹æÄ£Êý¾Ýй¶£¬640Íò¿Í»§ÐÅÏ¢ÊÜÓ°Ïì


8ÔÂ7ÈÕ£¬·¨¹úÖ÷ÒªµçÐÅÔËÓªÉ̲¼ÒÁ¸ñµçÐÅ£¨Bouygues Telecom£©Åû¶ÁËÒ»ÆðÖØ´óÍøÂçÇå¾²ÊÂÎñ£¬Ô¼640Íò¿Í»§µÄСÎÒ˽¼ÒÊý¾ÝÔÚÕë¶ÔÐÔÍøÂç¹¥»÷ÖÐÔ⵽й¶¡£×÷Ϊ·¨¹úµÚÈý´óÒÆ¶¯·þÎñÌṩÉÌ£¬¸Ã¹«Ë¾ÓµÓÐ1450ÍòÒÆ¶¯Óû§¼°9000ÃûÔ±¹¤£¬2024ÄêÓªÊÕ´ï568ÒÚÅ·Ôª¡£¾Ý¹Ù·½ÉùÃ÷£¬¹¥»÷ÓÉ"ÒÑÖªÍøÂç·¸·¨¼¯ÍÅ"ʵÑ飬ͨ¹ýÇÖÈëÌØ¶¨ÄÚ²¿×ÊÔ´»ñÈ¡Á˿ͻ§ÁªÏµ·½·¨¡¢ÌõÔ¼ÐÅÏ¢¡¢»éÒö״̬¡¢ÆóÒµ¿Í»§×ÊÁϼ°¹ú¼ÊÒøÐÐÕ˺ţ¨IBAN£©µÈÃô¸ÐÊý¾Ý¡£ÖµµÃÇìÐÒµÄÊÇ£¬ÐÅÓÿ¨ºÅ¡¢ÕË»§ÃÜÂëµÈ½¹µã²ÆÎñÐÅϢδ±»ÇÔÈ¡¡£ÊÂÎñ±¬·¢ºó£¬²¼ÒÁ¸ñµçÐÅÊÖÒÕÍŶÓѸËÙ×è¶Ï¹¥»÷Õß»á¼û·¾¶£¬²¢Ð­Í¬·¨¹ú¹ú¼ÒÍøÂçÇå¾²¾Ö£¨ANSSI£©ºÍÊý¾Ý±£»¤»ú¹¹CNILÕö¿ªÊӲ죬ͬʱǿ»¯ÍøÂç¼à¿ØÓëÇå¾²·À»¤ÏµÍ³¡£Ð¹Â¶ÊÂÎñ¶Ô¿Í»§×é³ÉDZÔÚΣº¦£¬Ö»¹ÜIBANµ¥¶Àȱ·¦ÒÔÍê³ÉתÕ˲Ù×÷£¬µ«ÊÜÓ°ÏìÓû§ÈÔ±»½¨Òé°´ÆÚºË²éÒøÐÐÉúÒâ¼Í¼£¬²¢Ð¡ÐÄÒÔ¿Í»§ÐÕÃûºÍÕ˺ÅʵÑéµÄÍøÂç´¹ÂÚÕ©Æ­¡£¹«Ë¾ÒÑͨ¹ý¶ÌÐźÍÓʼþÖ±½Ó֪ͨÊܺ¦Õߣ¬²¢Ã÷È·ÖÒÑÔÇÐÎðÏòÉù³ÆÕÆÎÕÆäСÎÒ˽¼ÒÐÅÏ¢µÄÀ´µçÕß͸¶µÇ¼ƾ֤µÈÃô¸Ð×ÊÁÏ¡£


https://www.bleepingcomputer.com/news/security/bouygues-telecom-confirms-data-breach-impacting-64-million-customers/