ºÚ¿Í¿ÉÒÔ»á¼ûÁè¼Ý120Íǫ̀ҽÁÆ×°±¸µÄÃô¸ÐÊý¾Ý

Ðû²¼Ê±¼ä 2025-08-11

1. ºÚ¿Í¿ÉÒÔ»á¼ûÁè¼Ý120Íǫ̀ҽÁÆ×°±¸µÄÃô¸ÐÊý¾Ý


8ÔÂ7ÈÕ£¬Å·ÖÞÍøÂçÇå¾²¹«Ë¾Modat½üÆÚÑо¿Õ¹ÏÖ£¬È«Çò¹æÄ£ÄÚÁè¼Ý120Íǫ̀ÉèÖùýʧµÄÁªÍøÒ½ÁÆ×°±¸¼°ÏµÍ³ÒòÇå¾²Îó²î̻¶ÓÚ»¥ÁªÍø£¬ÎªºÚ¿ÍÇÔÈ¡»¼ÕßÃô¸ÐÊý¾ÝÉõÖÁ¸Ä¶¯Ò½ÁƼͼÌṩÁ˿ɳËÖ®»ú¡£ÕâЩÒ×Êܹ¥»÷×°±¸º­¸Ç70ÓàÖÖÀàÐÍ£¬°üÀ¨MRI¡¢CT¡¢X¹â»ú¡¢DICOMÉó²éÆ÷¡¢ÑªÒº¼ì²âϵͳ¼°Ò½ÔºÖÎÀíϵͳµÈÒªº¦Ò½ÁÆÉèÊ©¡£¹¥»÷Õß¿Éͨ¹ýÍøÂçÖ±½Ó»á¼û»¼ÕßµÄÉñÃØÒ½Ñ§Ó°Ïñ¡¢ÑªÒº¼ì²âЧ¹û¼°ÉúÎïÌØÕ÷Êý¾Ý£¬²¿·ÖϵͳÉõÖÁÔÊÐíÐÞ¸ÄÀúÊ·¼Í¼£¬¿ÉÄܵ¼ÖÂÕï¶ÏЧ¹û±»¶ñÒâ¸Ä¶¯¡£Ñо¿ÏÔʾ£¬ÃÀ¹ú£¨17.4Íǫ̀£©¡¢ÄÏ·Ç£¨17.2Íǫ̀£©ºÍ°Ä´óÀûÑÇ£¨11.1Íǫ̀£©ÊÇ̻¶װ±¸×î¶àµÄ¹ú¼Ò£¬°ÍÎ÷¡¢µÂ¹ú¡¢Ó¢¹úµÈÁù¹ú×°±¸ÊýĿҲÁè¼Ý7Íǫ̀£¬ÈÕ±¾¼°ÆäËûµØÇøÔòÓÐÊýÍǫ̀װ±¸´¦ÓÚΣº¦×´Ì¬¡£Îó²î³ÉÒòÖ÷Òª°üÀ¨×°±¸Î´ÉèÖÃÉí·ÝÑéÖ¤¡¢Ê¹Óóö³§Ä¬ÈÏÃÜÂë»òÈõÃÜÂ룬ÒÔ¼°ÔËÐÐδÐÞ²¹µÄ¹ýʱÈí¼þ¡£²¿·Ö×°±¸ÉõÖÁÊôÓÚÒÑ×èÖ¹Ö§³ÖµÄÒÅÁôϵͳ£¬ºã¾Ãȱ·¦Çå¾²¸üС£Ñо¿Ö°Ô±Í¨¹ýModat Magnifyƽ̨ɨÃ貢ʶ±ð³öÕâЩװ±¸£¬½ØÍ¼Ö¤¾ÝÏÔʾ£¬¹¥»÷Õ߿ɻñÈ¡»¼ÕßÉúÃüÌåÕ÷¡¢ÄÔ²¿¼°Ðز¿É¨ÃèͼÏñµÈ¸ßÃô¸ÐÐÅÏ¢£¬²¿·Öϵͳ¼Í¼ÉõÖÁ×·ËÝÖÁ¶àÄêǰ¡£


https://cybernews.com/security/million-medical-devices-exposed-to-hackers/


2. ÐÂÐÍEDRɱÊÖ¹¤¾ß±»°Ë´óÀÕË÷ÍÅ»ï½ÓÄÉ


8ÔÂ7ÈÕ£¬¾ÝSophosÇå¾²ÍŶÓÑо¿£¬Ò»ÖÖ±»ÊÓΪRansomHub¿ª·¢µÄ"EDRKillShifter"ÑÝ±ä°æµÄÐÂÐÍEDRɱÊÖ¹¤¾ß£¬ÒÑÔڰ˸ö²î±ðÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷Öб»·¢Ã÷£¬Éæ¼°RansomHub¡¢Blacksuit¡¢Medusa¡¢Qilin¡¢Dragonforce¡¢Crytox¡¢LynxºÍINC×éÖ¯¡£¸Ã¹¤¾ßµÄ½¹µã¹¦Ð§ÊÇ×ÊÖú¹¥»÷Õ߹رձ»¹¥ÆÆÏµÍ³ÉϵÄÇå¾²²úÆ·£¬Îª°²ÅÅÀÕË÷Èí¼þÓÐÓÃÔØºÉ¡¢ÌáÉýȨÏÞ¡¢ºáÏòÒÆ¶¯¼°Òþ²Ø¼ÓÃÜ×°±¸´´Á¢Ìõ¼þ¡£ÊÖÒÕ²ãÃæ£¬¸Ã¹¤¾ß½ÓÄɸ߶ȻìÏýµÄ¶þ½øÖÆÎļþ£¬ÔËÐÐʱ×ÔÎÒ½âÂë²¢×¢ÈëÕýµ±Ó¦ÓóÌÐòÖС£ÆäÒªº¦»úÖÆÊÇËÑË÷Ó²±àÂëÔÚ¿ÉÖ´ÐÐÎļþÖеÄËæ»úÎå¸ö×Ö·ûÃû³ÆµÄÊý×ÖÊðÃûÇý¶¯³ÌÐò£¬Ò»µ©·¢Ã÷±ã¼ÓÔØ¶ñÒâÄÚºËÇý¶¯£¬Í¨¹ý"×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò"£¨BYOVD£©¹¥»÷»ñÈ¡ÄÚºËȨÏÞ£¬½ø¶øÖÕÖ¹ÓëAV/EDRÏà¹ØµÄÀú³Ì¼°·þÎñ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¸ÃÇý¶¯³£Î±×°³ÉÕýµ±Îļþ£¬µ«¼¤»îºó»áÖ±½ÓĨɱĿµÄÇå¾²¹¤¾ß¡£ÆäÁýÕֵij§É̹æÄ£ÆÕ±é£¬°üÀ¨Sophos¡¢Microsoft Defender¡¢¿¨°Í˹»ù¡¢ÈüÃÅÌú¿Ë¡¢Ç÷ÊÆ¿Æ¼¼¡¢SentinelOne¡¢Cylance¡¢McAfee¡¢F-Secure¡¢HitmanProºÍWebrootµÈÖ÷Á÷Çå¾²²úÆ·¡£


https://www.bleepingcomputer.com/news/security/new-edr-killer-tool-used-by-eight-different-ransomware-groups/


3. È«Çò×î´ó²»·¨IPTVƽ̨Rare Breed TVÔâACEÈ¡µÞ


8ÔÂ7ÈÕ£¬´´ÒâÓëÓéÀÖͬÃË£¨ACE£©¿ËÈÕÐû²¼ÀֳɹرÕÈ«Çò×î´ó²»·¨IPTV·þÎñÌṩÉÌRare Breed TV£¬²¢ÓëÆäÔËÓªÉ̸濢²ÆÎñÏ¢ÕùЭÒé¡£×ܲ¿Î»ÓÚ±±¿¨ÂÞÀ´ÄÉÖݵÄRare Breed TVÊÇÊý×ÖµÁ°æÁìÓòµÄ¾ÞÍ·£¬Éù³ÆÓµÓÐÁè¼Ý28,000¸öÖ±²¥ÆµµÀ¼°100,000²¿Ó°Ï·ºÍµçÊÓ¾çµÄ²»·¨×ÊÔ´¿â£¬ÆäÊÓÆµµã²¥Æ½Ì¨¸ü°üÀ¨14,000¸öδ¾­ÊÚȨµÄ½ÚÄ¿£¬ºã¾Ãͨ¹ýÿÔÂ15.99ÃÀÔªÖÁÕûÄê79.99ÃÀÔªµÄ¶©ÔÄģʽIJÀû¡£ACE×÷ΪÓÉÈ«Çò50Óà¼ÒÓ°ÊÓÓéÀÖ¾ÞÍ·×é³ÉµÄ·´µÁ°æÍ¬ÃË£¬ÆäÖÎÀíίԱ»áº­¸ÇÑÇÂíÑ·¡¢µÏÊ¿Äá¡¢Netflix¡¢»ªÄÉÐֵܵȶ¥¼¶¹«Ë¾¡£´Ë´ÎÐж¯ÖУ¬ACEͨ¹ýÖ´·¨Í¾¾¶Ëø¶¨Rare Breed TV±³ºóµÄʹÓÃÕߣ¬ÆÈʹÆäÓÀÊÀ¹Ø±Õ²»·¨Æ½Ì¨²¢Ö§¸¶¾Þ¶îÅâ³¥½ð¡£Ö»¹ÜÔÚÉùÃ÷Ðû²¼Ê±£¬Rare Breed TVÍøÕ¾ÈÔÔÝʱÔÚÏߣ¬µ«ACEÇ¿µ÷ÔËÓªÉÌÒÑÔÊÐí×èÖ¹ÇÖȨÐÐΪ£¬²¢½«ÅäºÏºóÐøÊӲ졣


https://www.bleepingcomputer.com/news/technology/massive-illegal-iptv-service-provider-rare-breed-tv-taken-offline/


4. ¸çÂ×±ÈÑÇ´óѧÔâÓö´ó¹æÄ£Êý¾Ýй¶£¬½ü87ÍòÈËÃô¸ÐÐÅÏ¢ÔâÇÔ


8ÔÂ8ÈÕ£¬ÃÀ¹ú¸çÂ×±ÈÑÇ´óѧ¿ËÈÕÅû¶һÆðÖØ´óÍøÂçÇå¾²ÊÂÎñ£¬Ô¼868,969ÃûÏÖÈμ°Ç°ÈÎѧÉú¡¢Ô±¹¤¡¢ÉêÇëÈ˼°¾ìÊôµÄСÎÒ˽¼ÒÐÅÏ¢ÔÚ2025Äê5ÔÂ16ÈÕµÄÍøÂç¹¥»÷Öб»µÁ¡£×÷Ϊ³£´ºÌÙÃËУ֮һ£¬¸ÃУӵÓÐ35,000ÓàÃûѧÉúºÍ20,000ÃûÔ±¹¤£¬2024ÄêÔ¤Ëã´ï66ÒÚÃÀÔª¡£ÊÂÎñÔ´ÓÚ6ÔÂ24ÈÕ²¿·ÖϵͳÒì³£ÖÐÖ¹£¬¾­Íâ²¿ÍøÂçÇ徲ר¼ÒЭÖúÊÓ²ìºó£¬Ñ§Ð£È·ÈÏδ¾­ÊÚȨµÄµÚÈý·½»á¼ûÁËÆäÍøÂç²¢ÇÔÈ¡Îļþ¡£Ö»¹ÜºÚ¿ÍÔøÐû³Æ»ñÈ¡460GBÊý¾Ý£¬µ«Ð£·½ÉùÃ÷δ֤ʵÏêϸÊý¾ÝÁ¿£¬½öÃ÷ȷй¶ÐÅÏ¢º­¸ÇÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢ÁªÏµ·½·¨¡¢Ñ§ÊõÀúÊ·¡¢²ÆÎñÔ®Öú¼Í¼¡¢°ü¹ÜÐÅÏ¢¼°¿µ½¡Êý¾ÝµÈÃô¸ÐÄÚÈÝ¡£ÖµµÃÇìÐÒµÄÊÇ£¬Á¥ÊôµÄÅ·ÎÄҽѧÖÐÐÄ»¼Õ߼ͼδÊܲ¨¼°¡£¸çÂ×±ÈÑÇ´óѧÒÑÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»Õýʽ֪ͨ£¬²¢Í¨¹ýÃÀ¹úÓÊÕþ·þÎñ֪ͨÊÜÓ°Ïì¸öÌ塣Ϊ½µµÍΣº¦£¬¸ÃУ½«Í¨¹ýKroll¹«Ë¾ÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿Ø¡¢Ú²Æ­×Éѯ¼°Éí·Ý͵ÇÔ»Ö¸´·þÎñ¡£


https://www.bleepingcomputer.com/news/security/columbia-university-data-breach-impacts-nearly-870-000-students-applicants-employees/


5. RubyGems¹©Ó¦Á´Ôâ¶ñÒâÈí¼þ¹¥»÷£º60¸öÇÔÃÜ×é¼þÏÂÔØ³¬27.5Íò´Î


8ÔÂ9ÈÕ£¬×Ô2023Äê3ÔÂÆð£¬Ò»³¡Õë¶ÔRuby¿ª·¢ÕߵĴó¹æÄ£¹©Ó¦Á´¹¥»÷ÔÚRubyGemsƽ̨һÁ¬·¢½Í¡£Çå¾²»ú¹¹SocketÅû¶£¬60¸öαװ³ÉÕýµ±¹¤¾ßµÄ¶ñÒâRuby×é¼þ£¨gem£©±»ÏÂÔØÁè¼Ý27.5Íò´Î£¬Æäͨ¹ýÇÔÈ¡¿ª·¢ÕßÕË»§Æ¾Ö¤ÊµÑéÍøÂç´¹ÂÚ£¬³ÉΪ½üÄêÀ´×îÑÏÖØµÄ¿ªÔ´Éú̬Çå¾²ÊÂÎñÖ®Ò»¡£ÕâЩ¶ñÒâ×é¼þÓɶà¸ö¹ØÁªÕË»§£¨Èçzon¡¢nowonµÈ£©ÒÔÓÖÃûÐÎʽÐû²¼£¬Ä£ÄâWordPress¡¢Telegram¡¢NaverµÈÖ÷Á÷ƽ̨µÄ×Ô¶¯»¯¹¤¾ßÃüÃû£¨Èçwp_posting_duo¡¢tg_send_zonµÈ£©£¬²¢Å䱸ÐéαͼÐνçÃæ£¨GUI£©ÓÕµ¼Óû§ÊäÈëÃô¸ÐÐÅÏ¢¡£¹¥»÷Õßͨ¹ýÓ²±àÂëµÄC2·þÎñÆ÷ÇÔÈ¡Ã÷ÎÄÓû§ÃûÃÜÂë¡¢×°±¸MACµØµã¼°Èí¼þ°üʹÓÃÊý¾Ý£¬²¿·Ö×é¼þÉõÖÁαÔìAPIÏìÓ¦ÓÕÆ­Óû§¡£SocketÔÚ¶íÓï°µÍøÊг¡·¢Ã÷À´×Ômarketingduo.co.krµÄ±»µÁƾ֤ÈÕÖ¾£¬Ö¤Êµ¹¥»÷ÕßÒѽ«Êý¾ÝÓÃÓÚ²»·¨ÉúÒâ¡£RubyGems×÷ΪRubyÓïÑԵĹٷ½°ü¹ÜÀíÆ÷£¬ÆäÉú̬Çå¾²ÐÔÔÚ´Ë´ÎÊÂÎñÖÐÌ»Â¶ÖØ´óÒþ»¼¡£Ö»¹ÜSocketÒÑÏò¹Ù·½ÍŶӾٱ¨ËùÓÐ60¸ö¶ñÒâ×é¼þ£¬µ«×èÖ¹±¨¸æÐû²¼Ê±ÈÔÓÐ16¸öδ±»Ï¼Ü¡£


https://www.bleepingcomputer.com/news/security/60-malicious-ruby-gems-downloaded-275-000-times-steal-credentials/


6. WinRARÁãÈÕÎó²îÔâ¶íÂÞ˹ºÚ¿Í×é֯ʹÓÃ


8ÔÂ8ÈÕ£¬½üÆÚ£¬Ò»¸ö±àºÅΪCVE-2025-8088µÄWinRARĿ¼±éÀúÎó²î±»ÆØ¹â£¬¸ÃÎó²îÒѱ»¹¥»÷ÕßʹÓÃΪÁãÈÕÎó²îÌá³«ÍøÂç´¹ÂÚ¹¥»÷£¬ÓÃÓÚÈö²¥Óë¶íÂÞ˹¹ØÁªµÄRomCom¶ñÒâÈí¼þ¡£¾ÝÇå¾²³§ÉÌESETÅû¶£¬¸ÃÎó²î±£´æÓÚWinRAR 7.13°æ±¾Ö®Ç°µÄËùÓÐWindowsƽ̨²úÆ·ÖУ¬°üÀ¨RAR¡¢UnRAR½âѹ¹¤¾ß¼°UnRAR.dll¿â£¬¶øLinux/UnixºÍAndroid°æ±¾²»ÊÜÓ°Ïì¡£Îó²îµÄ½¹µã»úÖÆÔÚÓÚ£¬¹¥»÷Õß¿Éͨ¹ý½á¹¹¶ñÒâRARѹËõ°ü£¬ÈƹýWinRARĬÈϵĽâѹ·¾¶ÏÞÖÆ£¬½«ÎļþÖ±½ÓÌáÈ¡ÖÁWindowsϵͳµÄ×Ô¶¯ÔËÐÐĿ¼¡£µ±Êܺ¦ÕßÏ´εǼϵͳʱ£¬ÕâЩ±»Ö²ÈëµÄ¿ÉÖ´ÐÐÎļþ½«×Ô¶¯ÔËÐУ¬´Ó¶øÊµÏÖÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£ESETÑо¿Ö°Ô±Peter Stry?ekÖ¸³ö£¬ÏÖÔÚ¸ÃÎó²îÒѱ»ÓÃÓÚÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬Í¨¹ý°üÀ¨¶ñÒâRARÎļþµÄÓʼþ¸½¼þÈö²¥RomComºóÃųÌÐò¡£ÖµµÃ×¢ÖØµÄÊÇ£¬WinRAR¹Ù·½ÒÑÔÚ7.13°æ±¾ÖÐÐÞ¸´´ËÎó²î£¬µ«ÒòÆäȱ·¦×Ô¶¯¸üлúÖÆ£¬Óû§ÐèÊÖ¶¯´Ó¹ÙÍøÏÂÔØ×îÐÂ×°Öðü¡£


https://www.bleepingcomputer.com/news/security/winrar-zero-day-flaw-exploited-by-romcom-hackers-in-phishing-attacks/