iCloudÈÕÀú±»ÀÄÓôÓApple·þÎñÆ÷·¢ËÍ´¹ÂÚÓʼþ
Ðû²¼Ê±¼ä 2025-09-091. iCloudÈÕÀú±»ÀÄÓôÓApple·þÎñÆ÷·¢ËÍ´¹ÂÚÓʼþ
9ÔÂ7ÈÕ£¬½üÆÚÒ»ÖÖʹÓÃiCloudÈÕÀúÔ¼Ç빦ЧµÄÐÂÐÍÍøÂç´¹ÂÚ¹¥»÷ÆØ¹â¡£¹¥»÷Õßͨ¹ý½¨Éè°üÀ¨´¹ÂÚÎı¾µÄiCloudÈÕÀúÊÂÎñ£¬²¢Ô¼Çë¿ØÖÆµÄÍⲿÓÊÏ䵨µã£¬µ¼ÖÂApple¹Ù·½·þÎñÆ÷×Ô¶¯·¢ËÍαװ³ÉPayPal¸¶¿î֪ͨµÄ´¹ÂÚÓʼþ¡£´ËÀàÓʼþÉù³ÆÓû§ÕË»§±»¿Û¿î599ÃÀÔª£¬¸½ÓС°Ö§³Öµç»°¡±ÓÕµ¼Êܺ¦Õß²¦´òթƺÅÂ룬½ø¶øÍ¨¹ýÔ¶³Ì»á¼ûÇÔÈ¡×ʽ𡢰²ÅŶñÒâÈí¼þ»òÇÔÈ¡Êý¾Ý¡£¸Ã¹¥»÷ÇÉÃîʹÓÃÁËAppleÓʼþ·þÎñÆ÷µÄÐÅÍб³Ê飺Óʼþͨ¹ýSPF¡¢DMARCºÍDKIMÈýÖØÇå¾²ÈÏÖ¤£¬ÏÔʾΪ¡°Õýµ±ÈªÔ´¡±£¬¼«´ó½µµÍÁ˱»À¬»øÓʼþ¹ýÂËÆ÷×èµ²µÄ¸ÅÂÊ¡£Ïêϸ»úÖÆÏÔʾ£¬¹¥»÷ÕßÔÚiCloudÈÕÀúµÄNotes×Ö¶ÎǶÈë´¹ÂÚÄÚÈÝ£¬Ô¼ÇëMicrosoft 365ÓÊÏ䵨µã£¬µ±Óʼþ¾ÓÉMicrosoft 365ÓʼþÁбíת·¢Ê±£¬ÏµÍ³Í¨¹ý·¢¼þÈËÖØÐ´¼Æ»®£¨SRS£©½«·µ»ØÂ·¾¶ÐÞ¸ÄΪ¹ØÁªµØµã£¬Î¬³ÖSPF¼ì²éͨ¹ý£¬È·±£ÓʼþÖ±´ïÊÕ¼þÏä¡£´ËÀ๥»÷ÓëPayPal¡°Ðµص㡱´¹ÂÚÊÖ·¨ÀàËÆ£¬¾ùÒÀÀµÕýµ±Æ½Ì¨¹¦Ð§ÊµÑéÓÕÆ¡£Ö»¹Ü´¹ÂÚÓÕ¶ü×Ô¼ºÎÞÁ¢Ò죬µ«ÍŽáApple·þÎñÆ÷±³ÊéºÍÈÕÀúÔ¼ÇëµÄ¡°¹Ù·½ÊôÐÔ¡±£¬¹¥»÷¸ü¾ßÒÉ»óÐÔ¡£
https://www.bleepingcomputer.com/news/security/icloud-calendar-abused-to-send-phishing-emails-from-apples-servers/
2. AnuvuÔâºÚ¿Í¹¥»÷й¶Ãô¸ÐÊý¾Ý£¬Ì»Â¶º½¿Õ¿Í»§StarlinkʹÓÃÐÅÏ¢
9ÔÂ5ÈÕ£¬»úÉÏÓéÀÖÓëÅþÁ¬·þÎñÌṩÉÌAnuvu£¨ÔGlobal Eagle£©ÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬¹¥»÷ÕßÔÚ°µÍøÂÛ̳Ðû³ÆÇÔÈ¡´ó×ÚÖÎÀíÔ±¼¶±ðƾ֤£¬¿É»á¼ûÆäAWS¼°PostgresÊý¾Ý¿â¡£Ð¹Â¶ÄÚÈݰüÀ¨º£Ê¿ͻ§¹«Ë¾Ãû³Æ¡¢Salesforce±êʶ·û¼°Êг¡ÀàÐÍ£»2024ÄêÓû§Æ¾Ö¤£¨º¬È«Ãû¡¢ÓÊÏä¡¢ÃÜÂë¹þÏ£¡¢µØµã£©£»ÖÎÀíְԱСÎÒ˽¼ÒÐÅÏ¢¼°°ì¹«µØµã£»¸üÒªº¦µÄÊÇ£¬StarlinkÌõÔ¼Ã÷ϸÔâ̻¶£¬Ö±½ÓÏÔʾÄÄЩ¿Í»§Í¨¹ýAnuvuʹÓÃStarlink·þÎñ¡£Anuvu×÷ΪÄêÊÕÈëÔ¼3.7ÒÚÃÀÔª¡¢·þÎñÈ«Çò150Óà¼Òº½¿Õ¹«Ë¾¼°30¼ÒÓÊÂÖ¹«Ë¾µÄÐÐÒµ¾ÞÍ·£¬ÆäÏàÖúͬ°éº¸Ç·¨º½¡¢´ïÃÀº½¿ÕµÈ×ÅÃûº½Ë¾¡£´Ë´Î¹¥»÷̻¶µÄÃô¸ÐÐÅÏ¢±£´æ¶àÖØÎ£º¦£º¹¥»÷Õß¿ÉÄÜʹÓÃδÐ޸ĵÄ2024ÄêÃÜÂëʵÑ鯾֤Ìî³ä¹¥»÷£»Ð¹Â¶µÄ¿Í»§ÐÅÏ¢¿É±»ÓÃÓÚ¶¨Ïò´¹ÂÚ¹¥»÷£¬»òÌáÇ°Ëø¶¨¹¥»÷Ä¿µÄ£»ÖÎÀíÖ°Ô±¼°Óû§µØµãµÄ̻¶¸ü¿ÉÄÜÒý·¢¶þ´ÎÉç»á¹¤³Ì¹¥»÷¡£Anuvu·½ÃæÉÐδ¶Ô´ËÊÂ×÷³öÕýʽ»ØÓ¦¡£
https://cybernews.com/security/anuvu-airline-data-breach-credentials/
3. NPM¹©Ó¦Á´Ôâ´¹ÂÚ¹¥»÷£º¸ßÏÂÔØÁ¿°ü±»×¢Èë¼ÓÃÜÐ®ÖÆ¶ñÒâÈí¼þ
9ÔÂ8ÈÕ£¬¿ËÈÕÒ»³¡Õë¶ÔNPMÈí¼þ°üµÄ¹©Ó¦Á´¹¥»÷Òý·¢ÆÕ±é¹Ø×¢¡£¹¥»÷Õßͨ¹ý´¹ÂÚÓʼþÈëÇÖÈí¼þ°üά»¤ÕßJosh Junon£¨qix£©µÈÕË»§£¬Ê¹ÓÃαÔìnpmjs.comÓòÃûµÄnpmjs[.]helpÍøÕ¾£¬ÒÔ"2FAƾ֤ÓâÆÚ½«Ëø¶¨ÕË»§"ΪÓÉÓÕµ¼µã»÷Á´½Ó£¬½ø¶ø×¢Èë¶ñÒâ´úÂëÖÁ¸ßÏÂÔØÁ¿NPM°üÖС£¾ÝÆÊÎö£¬±»Ð®ÖƵÄ18¸öÈí¼þ°üÿÖÜ×ÜÏÂÔØÁ¿³¬26ÒڴΣ¬°üÀ¨debug£¨3.576ÒڴΣ©¡¢chalk£¨2.9999ÒڴΣ©¡¢ansi-styles£¨3.7141ÒڴΣ©µÈ½¹µã¹¤¾ß¡£¶ñÒâ´úÂëͨ¹ý×¢Èëindex.jsÎļþ£¬ÔÚä¯ÀÀÆ÷¶ËÔËÐлùÓÚä¯ÀÀÆ÷µÄ×èµ²Æ÷£¬¼à¿ØÒÔÌ«·»¡¢±ÈÌØ±ÒµÈ¼ÓÃÜÇ®±ÒÉúÒ⣬µ±¼ì²âµ½ÍøÂçÏìÓ¦°üÀ¨¼ÓÃÜÉúÒâʱ£¬×Ô¶¯½«Ä¿µÄÇ®°üµØµãÌæ»»Îª¹¥»÷Õß¿ØÖÆµØµã£¬Ð®ÖÆÉúÒâÊðÃûǰµÄ×ʽðÁ÷Ïò£¬ÇÒÓû§ÎÞÏÔןÐÖª¡£¸Ã¶ñÒâÈí¼þͨ¹ý¹Ò¹³JavaScriptº¯Êý¼°Ç®°üAPIʵÏÖÁ÷Á¿¸Ä¶¯£¬²»µ«ÐÞ¸ÄÍøÒ³ÏÔʾÄÚÈÝ£¬»¹Ö±½ÓʹÓÃAPIŲÓü°Óû§Ç©ÊðµÄÉúÒâÄÚÈÝ£¬ÐγɶàÌõÀí¹¥»÷¡£NPMÍŶÓÒѽôÆÈɾ³ý²¿·Ö¶ñÒâ°æ±¾£¬µ«²¿·Ö°üÈÔ±£´æÎ£º¦¡£
https://www.bleepingcomputer.com/news/security/hackers-hijack-npm-packages-with-2-billion-weekly-downloads-in-supply-chain-attack/
4. PlexÉí·ÝÑéÖ¤ÐÅϢʧÔô£¬Óû§Ðè½ôÆÈÖØÖÃÃÜÂë
9ÔÂ8ÈÕ£¬Ã½ÌåÁ÷ýÌåÆ½Ì¨Plex¿ËÈÕÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬ºÚ¿Í´ÓÆäÊý¾Ý¿âÖÐÇÔÈ¡Á˿ͻ§Éí·ÝÑéÖ¤Êý¾Ý£¬Éæ¼°µç×ÓÓʼþµØµã¡¢Óû§Ãû¡¢Ç徲ɢÁÐÃÜÂë¼°Éí·ÝÑéÖ¤Êý¾Ý¡£PlexÔÚ֪ͨÖÐ֤ʵ£¬Î´¾ÊÚȨµÄµÚÈý·½»á¼ûÁË"ÓÐÏ޵Ŀͻ§Êý¾Ý×Ó¼¯"£¬°üÀ¨µç×ÓÓʼþ¡¢Óû§ÃûºÍ¾ÓÉÇ徲ɢÁд¦Öóͷ£µÄÃÜÂ룬µ«Ç¿µ÷Ö§¸¶¿¨ÐÅϢδ´æ´¢ÓÚ·þÎñÆ÷¹ÊδÊܲ¨¼°¡£Ö»¹ÜPlexÐû³ÆÃÜÂëÒѰ´"×î¼Ñʵ¼ù"¾ÙÐÐÇ徲ɢÁУ¬µ«Î´¹ûÕæÏêϸ¹þÏ£Ëã·¨£¬ÕâÔöÌíÁ˹¥»÷ÕßʵÑ鯯½âÃÜÂëµÄΣº¦¡£Îª´Ë£¬PlexÇ¿ÁÒ½¨ÒéÓû§Á¬Ã¦Í¨¹ý¹ÙÍøÖØÖÃÃÜÂ룬²¢ÆôÓÃ"¸ü¸ÄÃÜÂëÍËÈ´³öÅþÁ¬×°±¸"Ñ¡Ï´Ë²Ù×÷½«Ç¿ÖÆËùÓÐʹÓÃ¾ÉÆ¾Ö¤µÄ×°±¸ÖØÐµÇ¼¡£¹ØÓÚʹÓõ¥µãµÇ¼£¨SSO£©µÄÓû§£¬Ðè»á¼ûÇå¾²Ò³Ãæµã»÷"Í˳öËùÓÐ×°±¸"°´Å¥£¬ÖÕÖ¹ËùÓÐÔ˶¯»á»°ºóÖØÐÂÈÏÖ¤¡£PlexÌØÊâÌáÐÑÓû§ÆôÓÃË«ÒòËØÉí·ÝÑéÖ¤£¨2FA£©ÒÔÔöÇ¿ÕË»§±£»¤£¬²¢ÖØÉê¾ø²»»áͨ¹ýµç×ÓÓʼþË÷ÒªÃÜÂë»òÐÅÓÿ¨ÐÅÏ¢¡£¹«Ë¾ÌåÏÖÒÑÐÞ¸´·þÎñÆ÷ÈëÇÖÎó²î£¬µ«Î´Åû¶ÏêϸÊÖÒÕϸ½Ú¡£
https://www.bleepingcomputer.com/news/security/plex-tells-users-to-reset-passwords-after-new-data-breach/
5. ˼¿ÆASA×°±¸Ôâ´ó¹æÄ£ÍøÂçɨÃ裬СÐÄÐÂÎó²îΣº¦
9ÔÂ8ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Õë¶Ô˼¿ÆASA×°±¸µÄ´ó¹æÄ£ÍøÂçɨÃèÔ˶¯·¢³öÔ¤¾¯£¬¸ÃÕ÷Ïó»òԤʾ²úÆ·¼´½«·ºÆðÐÂÎó²î¡£¾ÝGreyNoise¼à²â£¬8ÔÂβ·ºÆðÁ½´ÎÏÔָɍÃè·åÖµ£¬Éæ¼°2.5Íò¸öΨһIPµØµã̽²âASAµÇ¼ÃÅ»§¼°Cisco IOS Telnet/SSH·þÎñ¡£ÆäÖУ¬8ÔÂ26ÈÕµÚ¶þ²¨¹¥»÷ÖУ¬80%µÄɨÃèÁ÷Á¿Ô´×Ô°ÍÎ÷½©Ê¬ÍøÂç£¬Éæ¼°Ô¼1.7Íò¸öIPµØµã¡£Á½²¨¹¥»÷¾ùʹÓø߶ÈÏàËÆµÄChromeÓû§ÊðÀí£¬ÌåÏÖ±£´æÅäºÏÍþвȪԴ¡£É¨ÃèÔ˶¯Ö÷Òª¼¯ÖÐÔÚÃÀ¹ú£¬Í¬Ê±ÁýÕÖÓ¢¹úºÍµÂ¹ú¡£É¨ÃèÐÐΪ¼È¿ÉÄÜÊÇÕë¶ÔÒÑÐÞ¸´Îó²îµÄʧ°ÜʹÓÃʵÑ飬Ҳ¿ÉÄÜÊÇΪÐÂÎó²îʹÓþÙÐеÄö¾ÙºÍÓ³ÉäÊÂÇ顣ϵͳÖÎÀíÔ±"NadSec ¨C Rat5ak"µÄ±¨¸æÏÔʾ£¬Ïà¹ØÔ˶¯×Ô7ÔÂ31ÈÕÆðÒÔµÍÆµÉ¨ÃèÆô¶¯£¬8ÔÂÖÐÑ®Öð²½Éý¼¶£¬8ÔÂ28ÈÕµÖ´ïµ¥ÈÕ20Íò´Îµã»÷µÄ·åÖµ£¬Á÷Á¿·ºÆð¸ß¶È×Ô¶¯»¯ÌØÕ÷£¬Ô´×ÔNybula¡¢Cheapy-HostºÍGlobal Connectivity Solutions LLPÈý¸öASN¡£ÎªÓ¦¶ÔΣº¦£¬½¨ÒéÖÎÀíÔ±Á¬Ã¦Ó¦ÓÃCisco ASA×îÐÂÇå¾²²¹¶¡£¬¶ÔËùÓÐÔ¶³ÌµÇ¼ʵÑé¶àÒòËØÈÏÖ¤£¨MFA£©£¬×èÖ¹Ö±½Ó̻¶/+CSCOE+/logon.html¡¢WebVPN¡¢Telnet»òSSH·þÎñ¡£ÈçÐèÍⲿ»á¼û£¬Ó¦Í¨¹ýVPN¼¯ÖÐÆ÷¡¢·´ÏòÊðÀí»ò»á¼ûÍø¹Ø½¨ÉèÌØÊâ¿ØÖÆ²ã¡£Í¬Ê±£¬¿ÉʹÓÃGreyNoiseºÍRat5ak±¨¸æÖеÄɨÃèÖ¸±ê¾ÙÐзâ±ÕºÍÏÞÖÆ¡£
https://www.bleepingcomputer.com/news/security/surge-in-networks-scans-targeting-cisco-asa-devices-raise-concerns/
6. GhostAction¹©Ó¦Á´¹¥»÷Ö³¬3300¸öÉñÃØÐ¹Â¶
9ÔÂ8ÈÕ£¬GitGuardianÑо¿Ö°Ô±Åû¶һÆðÃûΪ¡°GhostAction¡±µÄGitHub¹©Ó¦Á´¹¥»÷ÊÂÎñ£¬Òѵ¼ÖÂ3325¸öÉñÃØÐÅϢй¶£¬º¸ÇPyPI¡¢npm¡¢DockerHub¡¢GitHubÁîÅÆ¼°Cloudflare¡¢AWSµÈÒªº¦Æ¾Ö¤¡£´Ë´Î¹¥»÷ʼÓÚ2025Äê9ÔÂ2ÈÕ£¬ÒÔFastUUIDÏîĿΪÊ׸öÄ¿µÄ£¬Í¨¹ýÐ®ÖÆÎ¬»¤ÕßÕË»§Ìá½»¶ñÒâGitHub ActionsÊÂÇéÁ÷ÎļþʵÏÖ¡£¹¥»÷ÕßʹÓøÃÎļþÔÚ¡°ÍÆËÍ¡±»òÊÖ¶¯µ÷Àíʱ×Ô¶¯´¥·¢£¬´ÓGitHub ActionsÇéÐζÁÈ¡ÉñÃØ£¬²¢Í¨¹ýcurl POSTÇëÇó½«Êý¾Ýй¶ÖÁ¹¥»÷Õß¿ØÖƵÄÍⲿÓò¡£ÊÓ²ìÏÔʾ£¬¹¥»÷¹æÄ£Ô¶³¬FastUUID£¬Éæ¼°ÖÁÉÙ817¸ö´æ´¢¿â£¬ËùÓжñÒâÌá½»¾ùÖ¸Ïòͳһй¶¶Ëµã¡£¹¥»÷Õßͨ¹ýö¾ÙÕýµ±ÊÂÇéÁ÷ÖеÄÉñÃØÃû³Æ²¢Ó²±àÂëÖÁ¶ñÒâ¾ç±¾£¬ÇÔÈ¡ÁËPyPIÁîÅÆ¡¢npmÁîÅÆ¡¢DockerHubÁîÅÆ¡¢GitHubÁîÅÆ¡¢Cloudflare APIÁîÅÆ¡¢AWS»á¼ûÃÜÔ¿¼°Êý¾Ý¿âƾ֤µÈ¶àÀàÉñÃØ¡£Ö»¹ÜFastUUIDµÄPyPIÁîÅÆ±»ÇÔ£¬µ«Î´·¢Ã÷¶ñÒâÈí¼þ°üÐû²¼¡£GitGuardianÓÚ9ÔÂ5ÈÕÏò573¸öÊÜÓ°Ïì´æ´¢¿âÌá½»GitHubÎÊÌ⣬²¢Í¬²½Í¨ÖªGitHub¡¢npm¡¢PyPIÇå¾²ÍŶӡ£ÏÖÔÚ£¬100¸ö´æ´¢¿âÒѼì²â²¢»Ö¸´¶ñÒâ¸ü¸Ä£¬Ð¹Â¶¶ËµãÔÚÊÂÎñÆØ¹âºó×èÖ¹ÆÊÎö¡£Ñо¿Ö°Ô±Ö¸³ö£¬ÖÁÉÙ9¸önpm°üºÍ15¸öPyPI°ü¿ÉÄÜÒòÉñÃØÐ¹Â¶Ðû²¼¶ñÒâ°æ±¾£¬Íþв¶à¸ö°üÉú̬ϵͳ¡£
https://www.bleepingcomputer.com/news/security/hackers-steal-3-325-secrets-in-ghostaction-github-supply-chain-attack/


¾©¹«Íø°²±¸11010802024551ºÅ