ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾ÖÔâÓöÍøÂç¹¥»÷£¬²Ð¼²ÈË·þÎñϵͳÊÜÓ°Ïì

Ðû²¼Ê±¼ä 2025-08-27

1. ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾ÖÔâÓöÍøÂç¹¥»÷£¬²Ð¼²ÈË·þÎñϵͳÊÜÓ°Ïì


8ÔÂ26ÈÕ£¬ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾Ö£¨MTA£©¿ËÈÕÔâÓöÒ»ÆðÕë¶ÔÆä²Ð¼²È˽»Í¨·þÎñϵͳµÄÍøÂç¹¥»÷£¬µ¼Ö²¿·ÖÒªº¦¹¦Ð§ÖÐÖ¹¡£ÖÜÈÕ£¬MTAͨ¹ýÉ罻ýÌåºÍ¹Ù·½ÍøÕ¾Ðû²¼ÖÒÑÔ£¬³Æ±¬·¢ÁËÒ»ÆðÉæ¼°Î´¾­ÊÚȨ»á¼ûijЩϵͳµÄÍøÂçÊÂÎñ¡£Ö»¹Ü½¹µã½»Í¨·þÎñÈ繫½»Ïß·¡¢µØÌúºÍÇá¹ìϵͳδÊÜÓ°Ï죬µ«×¨ÃÅΪ²ÐÕÏÈËÊ¿ÌṩµÄ¡°³öÐзþÎñ¡±£¨Mobility£©µÄʵʱÐÅϢϵͳ¼°ÆäËû¹¤¾ßÔâÊܹ¥»÷¡£¸Ã·þÎñÖ¼ÔÚΪÎÞ·¨×ÔÐÐǰÍù¹«½»³µÕ¾»òºò³µµÄȺÌåÌṩ¶¨ÖÆ»¯½»Í¨Ö§³Ö£¬Í¨¹ýÍøÕ¾Ô¤Ô¼ÊµÏÖ´Ó¼ÒÃŵ½Ä¿µÄµØµÄ½ÓËÍ¡£¹¥»÷µ¼ÖÂMTAµÄÒÆ¶¯·þÎñÎÞ·¨°²ÅÅÐÂÐг̻òÖØÐÂÔ¤¶©ÏÖÓÐÐгÌ£¬²¿·ÖʵʱÐÅÏ¢¸üм°ºô½ÐÖÐÐĹ¦Ð§Òà¿ÉÄÜÊÜÏÞ¡£MTAÌåÏÖ£¬ÒÑÓëµÚÈý·½ÍøÂçÇ徲ר¼Ò¼°Ö´·¨²¿·ÖÏàÖú£¬ÆÀ¹ÀÊÂÎñ¹æÄ£²¢½ÓÄÉ»º½â²½·¥¡£Ö»¹Ü±¾ÖÜËùÓÐÒѰ²ÅŵijöÐÐÍýÏëÈÔÓÐÓ㬵«ÐÂÓû§Ðèͨ¹ýÌæ»»¼Æ»®£¨ÈçCall-A-Ride·þÎñ£©¾ÙÐÐÔ¤Ô¼£¬¿Éͨ¹ý¹Ù·½ÍøÕ¾»òµç»°»á¼û¡£


https://therecord.media/maryland-cyberattack-transit-disabled-people


2. ¶íÂÞ˹FSB¿ª·¢ÐÂÐÍAndroidÌØ¹¤Èí¼þ£¬Î±×°³É·À²¡¶¾¹¤¾ß


8ÔÂ24ÈÕ£¬¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©±»ÆØ¿ª·¢Ò»¿îÐÂÐÍAndroid¶ñÒâÈí¼þ£¬Î±×°³É·À²¡¶¾¹¤¾ß£¬×¨ÃÅÕë¶Ô¶íÂÞ˹ÆóÒµ¸ß¹ÜÌᳫ¶¨ÏòÍøÂç¹¥»÷¡£¾Ý¶íÂÞË¹ÒÆ¶¯Çå¾²¹«Ë¾Dr. WebµÄ×îб¨¸æ£¬¸Ã¶ñÒâÈí¼þ±»ÃüÃûΪ¡°Android.Backdoor.916.origin¡±£¬×Ô2025Äê1ÔÂÊ״η¢Ã÷ÒÔÀ´ÒÑÑÝ»¯¶à¸ö°æ±¾£¬ÏÔʾÆä´¦ÓÚÒ»Á¬¿ª·¢ÖС£¸ÃÌØ¹¤Èí¼þ¾ß±¸¶àÏî¸ß¼¶¹¦Ð§£¬°üÀ¨¼àÌý¶Ô»°¡¢Í¨¹ýÊÖ»úÉãÏñͷʵʱ´«ÊäÊÓÆµ¡¢¼Í¼¼üÅÌÊäÈë¡¢ÇÔȡͨѶӦÓã¨ÈçTelegram¡¢WhatsApp¡¢Gmail£©Êý¾Ý£¬ÉõÖÁ²¶»ñÆÁÄ»ÄÚÈÝ¡£×°Öú󣬶ñÒâÈí¼þ»áÇëÇóµØÀíλÖᢶÌÐÅ»á¼û¡¢ÉãÏñÍ·/Âó¿Ë·çʹÓᢸ¨Öú¹¦Ð§·þÎñµÈ¸ßΣº¦È¨ÏÞ£¬²¢ºã¾ÃפÁôºǫ́¡£ÆäÏÂÁîÓë¿ØÖÆ£¨C2£©·þÎñÆ÷¿ÉÔ¶³ÌÖ¸ÁîÇÔÈ¡¶ÌÐÅ¡¢ÁªÏµÈË¡¢Í¨»°¼Í¼¼°´æ´¢Í¼Ïñ£¬»ò¼¤»îÂó¿Ë·ç¡¢ÉãÏñÍ·¾ÙÐÐʵʱ¼à¿Ø£¬ÉõÖÁÖ´ÐÐShellÏÂÁîÒÔά³Ö³¤ÆÚ»¯¿ØÖÆ¡£Dr. WebÆÊÎöÖ¸³ö£¬¸Ã¶ñÒâÈí¼þͨ¹ý¶íÓï½çÃæ¡¢Ã°³ä¶íÂÞ˹¹Ù·½»ú¹¹£¨ÈçÖÐÑëÒøÐм°FSB×ÔÉí£©µÄÈí¼þ¾ÙÐзַ¢¡£Æä½ö¶íÓï½çÃæ¡¢Õë¶Ô¶íÂÞ˹ÆóÒµµÄ·Ö·¢Õ½ÂÔ¼°Ã°³ä±¾ÍÁ»ú¹¹µÄÐÐΪ£¬Ã÷È·Ö¸Ïò¶¨Ïò¹¥»÷£¬Ä¿µÄ»òΪ»ñÈ¡ÆóÒµÃô¸ÐÐÅÏ¢¼°¸ß¹ÜͨѶÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/new-android-malware-poses-as-antivirus-from-russian-intelligence-agency/


3. ¿Æ¼¼ÖÆÔìÉÌData I/OÔâÀÕË÷¹¥»÷£¬ÖÂÔËӪϵͳ̱»¾


8ÔÂ22ÈÕ£¬¿Æ¼¼ÖÆÔìÉÌData I/O Corporation£¨NASDAQ: DAIO£©¿ËÈÕÏòÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©Ìá½»±¨¸æ£¬Åû¶ÆäÓÚ8ÔÂ16ÈÕÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÔËÊä¡¢ÖÆÔì¡¢Éú²úµÈ½¹µãÔËӪϵͳ̱»¾¡£Õâ¼Ò×ܲ¿Î»ÓÚ»ªÊ¢¶ÙÖÝÀ×µÂÃɵĹ«Ë¾×¨×¢ÓÚΪÆû³µµç×Ó¡¢ÏûºÄ×°±¸µÈÁìÓòÌṩ±à³ÌÓëÇå¾²°²ÅŽâ¾ö¼Æ»®£¬Æä¿Í»§º­¸ÇÌØË¹À­¡¢ËÉÏ¡¢ÑÇÂíÑ·¡¢¹È¸è¡¢Î¢ÈíµÈÈ«Çò×ÅÃûÆóÒµ£¬2025ÄêµÚ¶þ¼¾¶ÈÁè¼Ý65%µÄÓªÒµÀ´×ÔÆû³µµç×ÓÉú²ú£¬°üÀ¨ÓëÖйúµç¶¯³µÖÆÔìÉÌÏàÖúµÄ³äµçÕ¾ÊÖÒÕÏîÄ¿¡£¹¥»÷±¬·¢ºó£¬Data I/OѸËÙ½ÓÄÉ×èÖ¹²½·¥£¬½«ÊÜÓ°ÏìϵͳÏÂÏßÒÔ±£»¤È«ÇòITÍøÂ磬²¢Æô¶¯µÚÈý·½ÊӲ졣µ«×èÖ¹±¨¸æÌύʱ£¬ÏµÍ³»Ö¸´Ê±¼ä±íÈÔδÃ÷È·£¬¹«Ë¾ÖÒÑÔ³ÆÊÂÎñÏà¹Ø±¾Ç®£¨°üÀ¨ÍøÂçÇ徲ר¼ÒÓöȡ¢ÏµÍ³ÐÞ¸´Ö§³öµÈ£©¿ÉÄÜ¶ÔÆäı»®Òµ¼¨¼°²ÆÎñ״̬±¬·¢ÖØ´óÓ°Ïì¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¸Ã¹«Ë¾Éϼ¾¶ÈÏúÊÛ¶îΪ590ÍòÃÀÔª£¬½Ï2025ÄêµÚÒ»¼¾¶ÈïÔÌ­30ÍòÃÀÔª£¬´Ë´Î¹¥»÷»ò½øÒ»²½¼Ó¾çÆä²ÆÎñѹÁ¦¡£


https://therecord.media/electronics-manufacturer-dataio-ransomware


4. ÄÚ»ª´ïÖÝÕþ¸®ÔâÍøÂç¹¥»÷ÖÂÍøÕ¾¼°µç»°ÏµÍ³ÖÜȫ̱»¾


8ÔÂ24ÈÕ£¬ÃÀº£ÄÚ»ª´ïÖÝÕþ¸®ÊÖÒÕϵͳÔâÓöÑÏÖØÍøÂçÇå¾²ÊÂÎñ£¬µ¼ÖÂÖÝÕþ¸®ÍøÕ¾¡¢µç»°·þÎñ¼°Ïßϰ칫ÖÜȫ̱»¾¡£´Ë´ÎÊÂÎñÒ»Á¬Ó°ÏìÖÝÄÚ¶à¸ö¹«¹²·þÎñÇþµÀ£¬Òý·¢Õþ¸®ÓëÁª°î»ú¹¹µÄ¸ß¶È¹Ø×¢¡£¾ÝÖݳ¤ÇÇ¡¤Â¡°Í¶àÉùÃ÷£¬Ö»¹Ü½ôÆÈ·þÎñÈÔ¼á³ÖÔË×÷£¬µ«ÊÖÒÕϵͳµÄÒ»Á¬ÐÔ¹ÊÕÏÒÑÔì³ÉÏÔÖø·þÎñÖÐÖ¹¡£×èÖ¹ÖÜÒ»Íí¼ä£¬ÖÝÕþ¸®¹Ù·½ÍøÕ¾ÈÔ´¦ÓÚÀëÏß״̬£¬µç»°Ïß·¼°²¿·ÖÏßÉÏ·þÎñ·ºÆðÏìÓ¦ÑÓ³Ù»òÖÐÖ¹¡£Îª×î´óÏÞ¶Èά³Ö¹«¹²·þÎñ£¬ÖÝÕþ¸®ÒÑÆô¶¯ÔÝʱ·Óɼƻ®ºÍÌæ»»ÐÔ²Ù×÷Á÷³Ì£¬²¢ÓëµØ·½¡¢²¿Âä¼°Áª°îÏàÖúͬ°éÕö¿ªÍŽá»Ö¸´Ðж¯¡£ÊÜÊÖÒÕ¹ÊÕÏÓ°Ï죬ȫÖÝÕþ¸®°ì¹«ÊÒÖÜÒ»ÔÝÍ£ÏßÏ·þÎñ£¬Ïêϸ»Ö¸´Ê±¼ä½«ÁíÐÐ֪ͨ¡£ÊÂÎñÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬Áª°îÊÓ²ì¾ÖÒѽéÈëЭÖúËÝÔ´£¬µ«ÏÖÔÚÉÐÎÞÈκκڿÍ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ¡£ÖÝÕþ¸®ÌØÊâÌáÐÑסÃñÌá¸ßСÐÄ£¬Ç¿µ÷¹Ù·½»ú¹¹¾ø²»»áͨ¹ýµç»°»òÓʼþË÷ȡСÎÒ˽¼ÒÐÅÏ¢»òÒøÐÐÕË»§×ÊÁÏ£¬½÷·ÀÕ©Æ­ÐÐΪ¡£Õë¶Ô¹«ÖÚ¹ØÇеÄÊý¾Ýй¶Σº¦£¬Öݳ¤ÉùÃ÷ÌåÏÖ½«³¹µ×ÊÓ²ìÊÇ·ñ±£´æÃô¸ÐÐÅÏ¢ÍâйÇéÐΡ£


https://therecord.media/nevada-state-websites-phones-cyberattack-disruption


5. Salesloftƽ̨ÔâºÚ¿ÍÈëÇÖÖÂSalesforceÊý¾Ýй¶ 


8ÔÂ26ÈÕ£¬ÃÀ¹úÏúÊÛ×Ô¶¯»¯Æ½Ì¨SalesloftÔâÓöÖØ´óÇå¾²ÊÂÎñ£¬ºÚ¿Íͨ¹ýÇÔÈ¡ÆäÓëSalesforce¼¯³ÉµÄDrift̸ÌìÊðÀíOAuthÁîÅÆ¼°Ë¢ÐÂÁîÅÆ£¬ÀÖ³ÉÇÖÈë¿Í»§ÇéÐβ¢ÊµÑé´ó¹æÄ£Êý¾Ý͵ÇÔ¡£´Ë´ÎÊÂÎñ̻¶Á˵ÚÈý·½Æ½Ì¨¼¯³É´øÀ´µÄÇå¾²Òþ»¼£¬Òý·¢¶ÔÔÆ¶ËÆóÒµ·þÎñÉú̬Á´Å³ÈõÐÔµÄÆÕ±é¹Ø×¢¡£¾ÝSalesloftÅû¶£¬ÍþвÐÐΪÕßÓÚ8ÔÂ8ÈÕÖÁ18ÈÕʱ´ú£¬Ê¹ÓÃÇÔÈ¡µÄÁîÅÆ»á¼ûÁËʹÓÃDrift-Salesforce¼¯³ÉµÄ¿Í»§SalesforceʵÀý£¬Í¨¹ýÖ´ÐÐSOQLÅÌÎÊÇÔÈ¡AWS»á¼ûÃÜÔ¿¡¢ÃÜÂë¼°SnowflakeÏà¹ØÁîÅÆµÈÃô¸Ðƾ֤¡£¹¥»÷ÕßÉõÖÁͨ¹ýɾ³ýÅÌÎÊÈÕÖ¾ÑÚÊÎÐÐ×Ù£¬µ«Î´Ó°ÏìϵͳÉ󼯼ͼ¡£SalesloftÒÑÓëSalesforceЭ×÷£¬½ôÆÈ×÷·ÏËùÓÐDriftÓ¦ÓõĻîÔ¾ÁîÅÆ£¬²¢ÒªÇó¿Í»§ÖØÐÂÈÏÖ¤£¬ÖÎÀíÔ±Ðèͨ¹ý"ÉèÖÃ-¼¯³É-Salesforce"¶Ï¿ªÅþÁ¬ºóÖØÐÂÊÚȨ¡£´Ë´Î¹¥»÷ÑÓÐøÁË2025ÄêÒÔÀ´Õë¶ÔSalesforceƽ̨µÄ¹¥»÷À˳±¡£


https://www.bleepingcomputer.com/news/security/salesloft-breached-to-steal-oauth-tokens-for-salesforce-data-theft-attacks/


6. CitrixÐÞ¸´ÁËÁãÈÕ¹¥»÷ÖÐʹÓõÄÑÏÖØNetScaler RCEÎó²î


8ÔÂ26ÈÕ£¬Citrix£¨ÔÆÈí¼þ¼¯ÍÅ£©Ðû²¼½ôÆÈÇå¾²¸üУ¬ÐÞ¸´ÁËÓ°ÏìÆäNetScaler ADCºÍNetScaler Gateway×°±¸µÄÈý¸ö¸ßΣÎó²î£¬ÆäÖÐ×îÑÏÖØµÄCVE-2025-7775Òѱ»Ö¤ÊµÔâºÚ¿ÍÆð¾¢Ê¹ÓÃΪÁãÈÕÎó²î¡£¸ÃÎó²îΪÄÚ´æÒçÍÉ»¯Îó£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚδ´ò²¹¶¡µÄ×°±¸ÉÏÔ¶³ÌÖ´ÐÐí§Òâ´úÂ룬ֱ½ÓÍþвÆóÒµÍøÂç½¹µã»ù´¡ÉèÊ©¡£CitrixÔÚͨ¸æÖÐÇ¿µ÷£¬×èÖ¹8ÔÂ26ÈÕ£¬ÒÑÊӲ쵽Õë¶Ô믧½â×°±¸µÄÏÖʵ¹¥»÷°¸Àý£¬µ«Î´ÌṩÏêϸ¹¥»÷Ö¸±ê»òÊܺ¦ÕßÐÅÏ¢¡£ÓÉÓÚȱ·¦ÔÝʱ»º½â²½·¥£¬¹«Ë¾¡°Ç¿ÁÒ½¨Ò顱ÖÎÀíÔ±Á¬Ã¦½«NetScaler¹Ì¼þÉý¼¶ÖÁ×îа汾¡£Îª×ÊÖúÓû§×Ô²éΣº¦£¬CitrixÐû²¼ÁËÒ×Êܹ¥»÷×°±¸µÄÉèÖÃÌØÕ÷£º×°±¸ÐèÒÔÍø¹ØÄ£Ê½£¨VPN¡¢ICAÊðÀíµÈ£©ÔËÐУ¬»ò°ó¶¨IPv6·þÎñµÄHTTP/SSL/HTTP_QUICÀàÐ͸ºÔØÆ½ºâÐéÄâ·þÎñÆ÷µÈÌØ¶¨ÉèÖᣴ˴θüÐÂͬʱÐÞ¸´ÁËÁíÍâÁ½¸öÎó²î£º¾Ü¾ø·þÎñÎó²îCVE-2025-7776ºÍÖÎÀí½çÃæ»á¼û¿ØÖÆÈ±ÏÝCVE-2025-8424¡£Çå¾²Ñо¿Ô±Ö¸³ö£¬¹¥»÷Õß¿ÉÄÜͨ¹ýÎó²îÁ´Ê½Ê¹Óã¬ÏÈͨ¹ýCVE-2025-7775Ö²Èë¶ñÒâ´úÂ룬ÔÙʹÓÃCVE-2025-8424ºáÏòÉøÍ¸ÖÎÀí½çÃæ¡£


https://www.bleepingcomputer.com/news/security/citrix-fixes-critical-netscaler-rce-flaw-exploited-in-zero-day-attacks/