ºÚ¿Í×éÖ¯ÈëÇÖÒÁÀʺ½ÔËϵͳÖÂ60ÓàËÒ´¬Ö»Í¨Ñ¶Ì±»¾
Ðû²¼Ê±¼ä 2025-08-261. ºÚ¿Í×éÖ¯ÈëÇÖÒÁÀʺ½ÔËϵͳÖÂ60ÓàËÒ´¬Ö»Í¨Ñ¶Ì±»¾
8ÔÂ23ÈÕ£¬Ò»¸ö×Ô³Æ"Lip-Dochtjan"£¨ÓÖ³Æ"The Sewn Lips"£©µÄºÚ¿Í×éÖ¯ÏòÒÁÀʹú¼ÊýÌåÐû³Æ£¬ÒÑÀÖ³ÉÈëÇÖÒÁÀʹú¼ÒÓÍÂÖ¹«Ë¾£¨NITC£©ÓëÒÁÀʺ½Ô˹«Ë¾£¨IRISL£©µÄ½¹µãϵͳ£¬µ¼ÖÂ60ÓàËÒ´¬Ö»Í¨Ñ¶ÖÐÖ¹¡£´Ë´Î¹¥»÷ͨ¹ýÒÁÀʿعɹ«Ë¾FannavaµÄÎÀÐÇÍ¨Ñ¶ÍøÂçʵÑ飬¸Ã¹«Ë¾ÈÏÕæÎªÒÁÀʺ£ÉÏÔËÊäÌṩÎÀÐÇÊý¾Ý´«Êä¡¢´æ´¢¼°Ö§¸¶·þÎñ¡£¾ÝºÚ¿Í×éÖ¯Åû¶£¬Æäͨ¹ýÉøÍ¸Fannavaϵͳ£¬Ö±½ÓÇÖÈë´¬Ö»ÎÀÐÇÖն˵Ľ¹µãLinux²Ù×÷ϵͳ£¬ÀֳɽûÓÃÈÏÕæÒÁÀʺ£ÉÏͨѶµÄרÓóÌÐòFalcon£¬Ôì³É39ËÒÓÍÂÖÓë25ËÒ»õ´¬ÎÞ·¨Óë¿Ú°¶¾ÙÐÐÐÅÏ¢½»»¥¡£´Ë´Î¹¥»÷¶ÔÒÁÀʺ½ÔËϵͳÔì³ÉË«ÖØ¹¥»÷£ºÊ×ÏÈ£¬´¬Ö»Óë½µØÖ¸»ÓÖÐÐĵÄʵʱͨѶÖÐÖ¹£¬µ¼Öº½Ðе÷Àí¡¢»õÎïÇ幨µÈÒªº¦»·½ÚÏÝÈëÕϰ£»Æä´Î£¬ÎÀÐÇϵͳ±»¿ØÊ¹µÃ´¬Ö»¶¨Î»Êý¾Ý¡¢»õÎïÇåµ¥µÈÃô¸ÐÐÅÏ¢ÃæÁÙй¶Σº¦¡£Ö»¹ÜÒÁÀʹٷ½ÉÐδ¶ÔÊÂÎñϸ½Ú×÷³ö»ØÓ¦£¬µ«ºÚ¿Í×é֯ѡÔñͨ¹ýýÌå¹ûÕæ¹¥»÷ÊÂʵ£¬ÌåÏÖÆä¾ß±¸Ò»Á¬ÍþвÄÜÁ¦¡£
https://www.marineinsight.com/shipping-news/major-cyberattack-disrupts-communication-on-dozens-of-iranian-ships/
2. AspireÎÀÉúϵͳÔâÍøÂç¹¥»÷£¬14Íò»¼ÕßÃô¸ÐÊý¾Ýй¶
8ÔÂ24ÈÕ£¬ÃÀ¹úÃÜЪ¸ùÖÝÅ©´åÎÀÉúϵͳAspireÔâÓöÍøÂç·¸·¨·Ö×Óºã¾ÃÉøÍ¸£¬µ¼ÖÂÁè¼Ý13.8ÍòÃû»¼ÕßµÄÃô¸ÐÊý¾Ý±»ÇÔÈ¡¡£´Ë´Î¹¥»÷Ò»Á¬ÊýÔÂδ±»·¢Ã÷£¬³ÉΪ½üÄêÀ´Ó°Ïì¹æÄ£½Ï¹ãµÄÒ½ÁÆÁìÓòÊý¾Ýй¶ÊÂÎñÖ®Ò»¡£Æ¾Ö¤AspireÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄ±¨¸æ£¬¹¥»÷Õß»ñÈ¡µÄÐÅÏ¢º¸ÇСÎÒ˽¼ÒÉí·Ý¡¢²ÆÎñÐÅÏ¢¼°Ò½ÁÆ¿µ½¡Êý¾ÝÈý´óÀ࣬Ïêϸ°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢½ðÈÚÕË»§ÏêÇé¡¢Ö§¸¶¿¨ºÅ¼°PINÂë¡¢Ò½ÁÆÕï¶Ï¼Í¼¡¢´¦·½ÐÅÏ¢¡¢°ü¹ÜÊý¾Ý¡¢ÉúÎïʶ±ð±êʶ·û¡¢¼ÝÕÕ¼°»¤ÕÕºÅÂëµÈ16Ïî¸ßÃô¸ÐÄÚÈÝ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬²¿·Ö»¼ÕßÊý¾Ý×éºÏÍêÕû¶È¼«¸ß£¬ÀíÂÛÉϿɹ¹½¨³ö°üÀ¨Éí·Ý¡¢²ÆÎñÓëÒ½ÁÆÐÅÏ¢µÄ"ȫά¶ÈÊý×Ö»Ïñ"¡£AspireÔÚÊÂÎñת´ïÖÐÇ¿µ÷£¬ÏÖÔÚÉÐÎÞÃ÷È·Ö¤¾ÝÏÔʾÊý¾ÝÒѱ»ÏÖʵÀÄÓ㬵«Îª½µµÍDZÔÚÓ°Ï죬ÒÑÆô¶¯µ÷½â²½·¥£ºÎªËùÓÐÊÜÓ°Ï컼ÕßÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÉí·Ý±£»¤¼°ÐÅÓÃ¼à¿Ø·þÎñ£¬°üÀ¨ÊµÊ±ÐÅÓñ¨¸æ¼à²â¡¢Éí·Ý͵ÇÔ»Ö¸´Ö§³Ö¼°100ÍòÃÀÔª°ü¹ÜÅ⸶°ü¹Ü¡£
https://cybernews.com/security/michigan-aspire-health-system-data-breach/
3. »ùÓÚMiraiµÄGayfemboy½©Ê¬ÍøÂç¾íÍÁÖØÀ´
8ÔÂ24ÈÕ£¬Gayfemboy½©Ê¬ÍøÂç×Ô2024Äê2ÔÂÊ×´ÎÏÖÉíÒÔÀ´£¬ÒÑÑݱäΪ¸ß¶ÈÖØ´ó»¯µÄÎïÁªÍøÍþв£¬Æä¹¥»÷¹æÄ£ÁýÕÖ°ÍÎ÷¡¢Ä«Î÷¸ç¡¢ÃÀ¹ú¡¢µÂ¹úµÈ8¸ö¹ú¼Ò£¬Ä¿µÄÉæ¼°ÖÆÔìÒµ¡¢¿Æ¼¼Òµ¡¢ÐÞ½¨ÒµµÈÒªº¦ÐÐÒµ¡£¸Ã¶ñÒâÈí¼þÒÔMirai±äÖÖΪ»ù´¡£¬Í¨¹ý¼¯³ÉN-dayÓë0-dayÎó²î¡¢TelnetÈõƾ֤±¬ÆÆ¼°¶à½×¶Î»ìÏýÊÖÒÕ£¬¹¹½¨Æð¾ß±¸×ÔÎÒ³¤ÆÚ»¯¡¢É³ºÐ¹æ±ÜºÍ¾ºÕùÐÔɨ³ýÄÜÁ¦µÄ¹¥»÷ϵͳ¡£Ñо¿ÏÔʾ£¬GayfemboyµÄÎó²îʹÓÃÕ½ÂÔ·ºÆðÏÔÖø½ø»¯¡£2024Äê11Ô£¬Æäͨ¹ýFour-Faith¹¤ÒµÂ·ÓÉÆ÷£¨CVE-2024-12856£©¡¢Neterbit·ÓÉÆ÷¼°VimarÖÇÄܼҾÓ×°±¸µÄÁãÈÕÎó²î£¬ÖðÈÕ»îÔ¾½ÚµãÍ»ÆÆ1.5Íò¸ö£»ÖÁ2025Äê7Ô£¬¹¥»÷ÔØºÉÒÑÀ©Õ¹ÖÁ»ªË¶¡¢Vivo¡¢ZyxelºÍRealtekµÈ×°±¸£¬²¢¼¯³ÉXMRigÍÚ¿óÄ£¿é¡£GayfemboyÕ¹ÏÖ¶à²ã·ÀÓù»úÖÆ£ºÍ¨¹ýÐÞ¸ÄUPX±êͷѹËõ¶þ½øÖÆÎļþ¡¢ÒýÈë50ÄÉÃë¼¶ÑÓ³ÙɳºÐ¼ì²âÊÖÒÕ£¬ÒÔ¼°»ùÓÚ¹«¹²DNSµÄËæ»úÓòÃûC2ͨѶ£¬ÓÐÓùæ±ÜÇå¾²¼ì²â¡£¸Ã½©Ê¬ÍøÂçµÄ¹¥»÷ÐÐΪÒÑÔì³É¶àÖØÍþв£º³ý°²ÅÅÍÚ¿óÄ£¿éÍ⣬»¹Õë¶ÔÑо¿Ö°Ô±ÌᳫDDoS·´ÖÆ£¬²¢ÊµÑéͨ¹ý¶Ë¿ÚɨÃèºáÏòÀ©É¢¡£
https://securityaffairs.com/181480/cyber-crime/iot-under-siege-the-return-of-the-mirai-based-gayfemboy-botnet.html
4. ÃÀ¹úFarmers InsuranceÒòSalesforce¹¥»÷Ö°ÙÍò¿Í»§Êý¾Ýй¶
8ÔÂ25ÈÕ£¬ÃÀ¹ú°ü¹Ü¾ÞÍ·Farmers InsuranceÅû¶һÆðÓ°Ïì110Íò¿Í»§µÄ´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬ÆäȪԴָÏò½ñÄêÒÔÀ´Õë¶ÔSalesforceƽ̨µÄ¶àÆðÍøÂç¹¥»÷¡£¸Ã¹«Ë¾Í¨¹ý¹ÙÍøÍ¨¸æÖ¤Êµ£¬2025Äê5ÔÂ29ÈÕ£¬ÆäµÚÈý·½¹©Ó¦ÉÌÊý¾Ý¿âÔâδ¾ÊÚȨ»á¼û£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÇÖÈëSalesforceϵͳ£¬µ¼Ö¿ͻ§ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕºÅÂë¼°Éç»áÇå¾²ºÅÂëºóËÄλµÈÃô¸ÐÐÅÏ¢±»µÁ¡£FarmersÓÚ8ÔÂ22ÈÕÆô¶¯Êܺ¦Õß֪ͨ³ÌÐò£¬²¢ÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»±¨¸æ£¬µ«Î´¹ûÕæµÚÈý·½¹©Ó¦ÉÌÏêϸÃû³Æ¡£FarmersÔÚÊÂÎñÏìÓ¦ÖÐÇ¿µ÷£¬µÚÈý·½¹©Ó¦ÉÌͨ¹ý°²ÅÅ¼à¿Ø¹¤¾ßѸËÙ¼ì²âµ½Òì³£Ô˶¯²¢×è¶Ï¹¥»÷·¾¶£¬¹«Ë¾Í¬²½Æô¶¯ÖÜÈ«ÊӲ첢ת´ïÖ´·¨²¿·Ö¡£Ö»¹Ü½ÓÄÉÁËÓ¦¼±²½·¥£¬µ«¹¥»÷ÕßʹÓÃSalesforceƽ̨¼¯Öд洢ÆóÒµ¿Í»§Êý¾ÝµÄÌØÕ÷£¬ÈÔÔì³É°ÙÍò¼¶Óû§ÐÅϢй¶¡£´Ë´ÎÊÂÎñÓë½ñÄêÈ«Çò¶àÆðSalesforceÊý¾Ý͵ÇÔ°¸±£´æ¹ØÁª¡£Íþв×éÖ¯UNC6040/UNC6240ͨ¹ý"ÓïÒô´¹ÂÚ"£¨Vishing£©ÊµÑéÉç»á¹¤³Ì¹¥»÷£¬ÓÕÆÆóÒµÔ±¹¤½«¶ñÒâOAuthÓ¦ÓÃÓëSalesforceʵÀý¹ØÁª£¬´Ó¶ø½¨É賤ÆÚ»á¼ûȨÏÞ¡£
https://www.bleepingcomputer.com/news/security/farmers-insurance-data-breach-impacts-11m-people-after-salesforce-attack/
5. ·¨¹úÅ·ÉÐÁãÊÛ¼¯ÍÅÔâÓö´ó¹æÄ£Êý¾Ýй¶£¬Ó°ÏìÊýÊ®Íò¿Í»§
8ÔÂ25ÈÕ£¬·¨¹ú¿ç¹úÁãÊÛ¾ÞÍ·Å·ÉУ¨Auchan£©¿ËÈÕÅû¶һÆðÓ°ÏìÊýÊ®Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ£¬Æä»áÔ±Öҳ϶ÈÍýÏëÏà¹ØµÄÃô¸ÐÐÅÏ¢Ôâδ¾ÊÚȨ»á¼û¡£¸Ã¹«Ë¾ÔÚÏòÊÜÓ°ÏìÓû§·¢Ë͵Ä֪ͨÖÐ֤ʵ£¬¹¥»÷Õßͨ¹ýÍøÂç¹¥»÷»ñÈ¡Á˿ͻ§È«Ãû¡¢Ö°³Æ¡¢¿Í»§×´Ì¬¡¢ÓÊÕþµØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¼°»áÔ±¿¨ºÅµÈСÎÒ˽¼ÒÐÅÏ¢£¬µ«Ç¿µ÷ÒøÐÐÕË»§Êý¾Ý¡¢ÕË»§ÃÜÂë¼°PINÂëδÊܲ¨¼°¡£×÷ΪŷÖÞ¼°·ÇÖÞ13¸ö¹ú¼ÒÓµÓг¬2100¼Ò·Öµê¡¢ÄêÊÕÈëÓâ350ÒÚÃÀÔªµÄÁãÊÛ¼¯ÍÅ£¬Å·ÉÐÔÚÊÂÎñÏìÓ¦ÖÐÒÑÏò·¨¹úÊý¾Ý±£»¤¾Ö£¨CNIL£©Õýʽת´ï£¬²¢ÌáÐÑÓû§Ð¡ÐÄDZÔÚµÄÍøÂç´¹ÂÚ¹¥»÷¡£Í¨ÖªÃ÷È·Ö¸³ö£¬Å·Éоø²»»áͨ¹ýÈκÎÇþµÀË÷È¡Óû§µÇ¼ƾ֤¡¢ÃÜÂë»ò»áÔ±¿¨PINÂ룬½¨ÒéÊÕµ½¿ÉÒÉÐÂÎŵÄÓû§Á¬Ã¦ºöÂÔ²¢×èÖ¹µã»÷Á´½Ó»ò»Ø²¦µç»°¡£
https://www.bleepingcomputer.com/news/security/auchan-retailer-data-breach-impacts-hundreds-of-thousands-of-customers/
6. Google PlayÒÑÒÆ³ý×°ÖÃÁ¿´ï1900ÍòµÄ¶ñÒâAndroidÓ¦ÓÃ
8ÔÂ25ÈÕ£¬ZscalerµÄThreatLabsÍŶӿËÈÕÅû¶£¬Google PlayÊÐËÁ±£´æ77¸ö¶ñÒâAndroidÓ¦Óã¬×Ü×°ÖÃÁ¿Í»ÆÆ1900Íò´Î£¬Éæ¼°Joker¡¢Harly¡¢Anatsa£¨Tea Bot£©µÈ¶à¸ö¶ñÒâÈí¼þ¼Ò×å¡£ÆäÖУ¬¹ã¸æÈí¼þ×é¼þÕ¼±È³¬66%£¬¶øJoker×÷Ϊ×î»îÔ¾µÄÒøÐÐľÂí£¬·ºÆðÔÚ½ü25%µÄÆÊÎöÑù±¾ÖС£´ËÀà¶ñÒâÈí¼þͨ¹ýαװ³ÉÕýµ±Ó¦Óã¨ÈçÓÎÏ·¡¢±ÚÖ½¡¢¹¤¾ßÀàÈí¼þ£©Èö²¥£¬²¿·ÖÓ¦ÓÃÉõÖÁ½ÓÄÉ"ÑÚÂëÈí¼þ"ÊÖÒÕ£¬ÔÚÌṩÕý³£¹¦Ð§µÄͬʱ£¬ºǫִ́ÐÐÇÔÈ¡¶ÌÐÅ¡¢ÁªÏµÈË¡¢ÒøÐÐÆ¾Ö¤¼°¶©Ôĸ߼¶·þÎñµÈ¶ñÒâ²Ù×÷¡£Ñо¿ÖصãÕ¹ÏÖÁËAnatsaÒøÐÐľÂíµÄÒ»Á¬½ø»¯¡£¸ÃľÂí×îа汾½«Ä¿µÄÒøÐм°¼ÓÃÜÇ®±ÒÓ¦ÓÃÊýÄ¿´Ó650¸öÀ©Õ¹ÖÁ831¸ö£¬ÁýÕֵ¹ú¡¢º«¹úµÈÐÂÇøÓò£¬²¢ÐÂÔö¼üÅ̼ͼģ¿é¡£ÆäÈö²¥Õ½ÂÔÒ²Éý¼¶ÎªÖ±½Ó×°ÖÃÓÐÓÃÔØºÉ£¬Ìæ»»´ËǰµÄÔ¶³ÌDEX¶¯Ì¬¼ÓÔØ¡£Îª¹æ±ÜÉó²é£¬¹¥»÷ÕßʹÓÃÃûÌùýʧµÄAPKµµ°¸Í»ÆÆ¾²Ì¬ÆÊÎö£¬ÍŽáDES¼ÓÃÜ×Ö·û´®½âÃܼ°Ä£Äâ¼ì²âÊÖÒÕ£¬²¢°´ÆÚÌæ»»Èí¼þ°üÃû³ÆºÍ¹þÏ£Öµ¡£Anatsa»¹ÀÄÓÃAndroid¸¨Öú¹¦Ð§È¨ÏÞ×Ô¶¯»ñÈ¡ÌØÈ¨£¬Í¨¹ý´¹ÂÚÒ³ÃæÇÔÈ¡Êý¾Ý¡£¹È¸èÒÑɾ³ýËùÓÐÉæÊÂÓ¦Ó㬲¢½¨ÒéÓû§ÆôÓÃPlay Protect·þÎñ¡¢½öÊÚȨÐëҪȨÏÞ¡¢Ñ¡Ôñ¿ÉÐÅ¿ª·¢Õß¡£
https://www.bleepingcomputer.com/news/security/malicious-android-apps-with-19m-installs-removed-from-google-play/


¾©¹«Íø°²±¸11010802024551ºÅ