°ÍÄÃÂí¾­¼ÃºÍ²ÆÎñ²¿ÔâINCÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2025-09-15

1. °ÍÄÃÂí¾­¼ÃºÍ²ÆÎñ²¿ÔâINCÀÕË÷Èí¼þ¹¥»÷


9ÔÂ11ÈÕ £¬°ÍÄÃÂí¾­¼ÃºÍ²ÆÎñ²¿£¨MEF£©¿ËÈÕÅû¶ £¬Æäһ̨ÊÂÇéÕ¾ÅÌËã»ú¿ÉÄÜÔâÓö¶ñÒâÈí¼þ¹¥»÷ £¬Õþ¸®ÒÑÆô¶¯Çå¾²³ÌÐò²¢Ç¿µ÷ÊÂÎñÒÑ»ñµÃ¿ØÖÆ £¬Î´Ó°Ïì½¹µãϵͳÔËÓª ¡£MEFÔÚ¹Ù·½ÉùÃ÷ÖÐÖ¸³ö £¬¼ì²âµ½Òì³£ºóÁ¬Ã¦¼¤»î¼È¶¨Ç徲ЭÒé £¬ÔöÇ¿Õû¸öITϵͳµÄÔ¤·À²½·¥ £¬²¢Ã÷È·ÖÐÑëϵͳ¼°Æ½Ì¨¾ùδÊÜË𠣬ÏÖÔÚÕý³£ÔËÐÐ ¡£×÷Ϊ°ÍÄÃÂí½¹µã²ÆÎñÖÎÀí»ú¹¹ £¬MEFÈÏÕæ²ÆÎñÕþ²ßÖÆ¶©¡¢¹«¹²Ö§³öµ÷¿Ø¡¢Õ®ÎñÖÎÀí¼°°ÍÄÃÂíÔ˺ÓÊÕÈëÖÎÀí ¡£¸Ã²¿Ç¿µ÷ £¬Ð¡ÎÒ˽¼ÒÓë»ú¹¹Êý¾ÝÇå¾² £¬²¢ÒÑʵÑéËùÓÐÐÐÒµ±ê×¼·À»¤²½·¥ÒÔÌá·ÀºóÐøÎ£º¦ ¡£È»¶ø £¬ÀÕË÷Èí¼þ×éÖ¯INC RansomÉÏÖÜÔÚ°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾Ðû²¼ÉùÃ÷ £¬Ðû³Æ¶ÔMEFÌᳫ¹¥»÷²¢ÇÔÈ¡Áè¼Ý1.5TBÊý¾Ý £¬°üÀ¨µç×ÓÓʼþ¡¢²ÆÎñÎļþ¡¢Ô¤ËãÃ÷ϸµÈÃô¸ÐÐÅÏ¢ ¡£¸Ã×éÖ¯ÓÚ9ÔÂ5ÈÕ½«MEFÁÐÈëÊܺ¦ÕßÃûµ¥ £¬²¢Ð¹Â¶ÄÚ²¿ÎļþÑù±¾×÷ΪΥ¹æÖ¤¾Ý ¡£INC Ransom½¨ÉèÓÚ2023ÄêÖÐÆÚ £¬ÒÔÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©Ä£Ê½ÔË×÷ £¬Ôø¹¥»÷¶à¼Ò×ÅÃûÆóÒµ ¡£


https://www.bleepingcomputer.com/news/security/panama-ministry-of-economy-discloses-breach-claimed-by-inc-ransomware/


2. Farmer Bros.ÔâÍøÂç¹¥»÷ÖÂ1.4ÍòÈËÊý¾Ýй¶


9ÔÂ10ÈÕ £¬×ܲ¿Î»Óڵ¿ËÈøË¹ÖݵĿ§·È¼°Ê³Îï·þÎñ¹«Ë¾Farmer Bros.¿ËÈÕÅû¶ £¬½ñÄê3Ô³õ±¬·¢µÄÒ»ÆðÍøÂç¹¥»÷µ¼ÖÂÁè¼Ý1.4ÍòÈËÊý¾Ýй¶ ¡£¾Ý¸Ã¹«Ë¾Ìá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄ֪ͨ £¬¹¥»÷ÕßÔÚϵͳÄÚ¡°áÝá塱½ü12Ììºó±»²ì¾õ £¬¹«Ë¾Ëæ¼´Æô¶¯ÊӲ첢ת´ïÖ´·¨²¿·ÖЭÖú×·²é ¡£Êý¾Ýй¶֪ͨÏÔʾ £¬¹¥»÷Õß»ñÈ¡Á˲¿·ÖСÎÒ˽¼ÒÐÅÏ¢ £¬µ«Ïêϸй¶×ֶα»Í¿ºÚδ¹ûÕæ ¡£×÷Ϊµ÷½â²½·¥ £¬Farmer Bros.ΪÊÜÓ°Ïì¸öÌåÌṩÃâ·ÑÉí·Ý͵ÇÔ¼°ÐÅÓÃ¼à¿Ø·þÎñ £¬´ËÀà·þÎñͨ³£Õë¶Ô¿ÉÄܰüÀ¨ÐÕÃû¡¢ÓÊÏä¡¢Éç±£ºÅµÈÃô¸Ð±êʶ·ûµÄй¶³¡¾° £¬ÒÔÌá·ÀڲƭΣº¦ ¡£¹«Ë¾ÌáÐÑÓû§°´ÆÚ¼ì²éÕË»§¼°ÐÅÓñ¨¸æ £¬Ð¡ÐÄÒì³£Ô˶¯ ¡£ÖµµÃ¹Ø×¢µÄÊÇ £¬ChaosÀÕË÷Èí¼þÍÅ»ïÔøÓÚ½ñÄê4Ô³õÐû³ÆÕÆÎոù«Ë¾Êý¾Ý £¬²¢Éù³ÆÇÔÈ¡ÁË650GBÐÅÏ¢ ¡£ÏÖÔÚÉÐÎÞ·¨È·ÈϸÃÉùÃ÷Óë±¾´Îй¶ÊÂÎñµÄÖ±½Ó¹ØÁª £¬µ«Ê±¼äÏߵĸ߶ÈÖØºÏÒý·¢Íâ½ç¶ÔÀÕË÷ÍÅ»ï¼ÓÈëµÄÍÆ²â ¡£


https://cybernews.com/security/farmer-bros-data-breach-victims/


3. CISA½«´ïË÷ϵͳ¸ßΣÎó²îÄÉÈëKEVĿ¼


9ÔÂ12ÈÕ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«´ïË÷ϵͳDELMIA AprisoÈí¼þµÄ¸ßΣÎó²î£¨CVE-2025-5086 £¬CVSSÆÀ·Ö9.0£©ÁÐÈëÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ ¡£¸ÃÎó²îΪ²»ÊÜÐÅÍÐÊý¾Ý·´ÐòÁл¯ÎÊÌâ £¬Ó°ÏìDELMIA Apriso´Ó2020°æÖÁ2025°æµÄ¶à¸ö°æ±¾ £¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔ¶³ÌÖ´ÐÐí§Òâ´úÂë £¬¶Ô¹¤ÒµÖÆÔìÔËÓª×é³ÉÑÏÖØÍþв ¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄÔËÓªÖ¸ÁBOD£©22-01ÒªÇó £¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ2025Äê10ÔÂ2ÈÕǰÍê³ÉÎó²îÐÞ¸´ £¬ÒÔ½µµÍÖØ´óΣº¦ ¡£CISAͬʱ½¨Òé˽ÈË×éÖ¯Éó²éKEVĿ¼ £¬×Ô¶¯ÅŲ鲢ÐÞ¸´×ÔÉí»ù´¡ÉèÊ©ÖеÄͬÀàÎó²î ¡£´ïË÷ϵͳDELMIA Apriso×÷ÎªÖÆÔìÔËÓªÖÎÀí£¨MOM£©Æ½Ì¨ £¬ÆÕ±éÓ¦ÓÃÓÚÈ«Çò¹¤ÒµÆóÒµµÄÉú²ú¼à¿ØÓëÓÅ»¯ £¬ÆäÇå¾²ÐÔÖ±½Ó¹ØÏµµ½Òªº¦»ù´¡ÉèÊ©ÎȹÌ ¡£±¾´ÎÎó²îÓÉHacktron AI±¨¸æ £¬CISAͨ¹ýKEVĿ¼»úÖÆÍÆ¶¯¿ìËÙÏìÓ¦ £¬ÌåÏÖ¡°·¢Ã÷-ת´ï-ÐÞ¸´¡±µÄ±Õ»·ÖÎÀíÂß¼­ ¡£


https://securityaffairs.com/182120/hacking/u-s-cisa-adds-dassault-systemes-delmia-apriso-flaw-to-its-known-exploited-vulnerabilities-catalog.html


4. FBIÖÒÑÔUNC6040¡¢UNC6395ºÚ¿ÍÇÔÈ¡SalesforceÊý¾Ý


9ÔÂ14ÈÕ £¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©Ðû²¼FLASH¾¯±¨ £¬ÖÒÑÔÁ½¸öÍþв¼¯ÈºUNC6040ºÍUNC6395Õýͨ¹ý¹¥»÷×éÖ¯µÄSalesforceÇéÐÎÇÔÈ¡Êý¾Ý²¢ÊµÑéÀÕË÷ ¡£Í¨¸æÖ¸³ö £¬ÕâÁ½¸ö¼¯ÈºµÄ¶ñÒâÔ˶¯µ¼ÖÂÊý¾Ý͵ÇÔºÍÀÕË÷ÊÂÎñ¼¤Ôö £¬FBIÏ£Íûͨ¹ýÐû²¼ÈëÇÖÖ¸±ê£¨IOC£©ÌáÉý¹«ÖÚ·ÀÓùÄÜÁ¦ ¡£UNC6040ÓÚ2024Äê6ÔÂÓÉGoogleÍþвÇ鱨ÍŶÓÊ×´ÎÅû¶ £¬¸Ã¼¯Èº×Ô2024Äêµ×ÆðʹÓÃÉç»á¹¤³ÌºÍÓïÒô´¹ÂÚ¹¥»÷ £¬ÓÕÆ­Ô±¹¤½«¶ñÒâSalesforce Data Loader OAuthÓ¦ÓÃÅþÁ¬ÖÁÆóÒµÕË»§ ¡£¹¥»÷Õß³£Ã°³äITÖ§³ÖÖ°Ô± £¬Ê¹Óá°Î񵀮±ÎñÃÅ»§¡±µÈαװӦÓà £¬Í¨¹ýOAuthÅþÁ¬´ó¹æÄ£ÇÔÈ¡SalesforceÊý¾Ý £¬ËæºóÓÉShinyHuntersÀÕË÷×é֯ʹÓÃÕâЩÊý¾Ý¾ÙÐÐÀÕË÷ £¬Ö÷ÒªÕë¶Ô´æ´¢¿Í»§Êý¾ÝµÄ¡°ÕË»§¡±ºÍ¡°ÁªÏµÈË¡±Êý¾Ý¿â ¡£8Ô £¬ÁíÒ»¼¯ÈºUNC6395ͨ¹ý±»µÁµÄSalesloft Drift OAuthºÍË¢ÐÂÁîÅÆ¹¥»÷SalesforceʵÀý £¬ÇÔȡ֧³Ö°¸ÀýÖеÄÉñÃØÐÅÏ¢ £¬°üÀ¨AWSÃÜÔ¿¡¢ÃÜÂëºÍSnowflakeÁîÅÆ £¬½ø¶øÉøÍ¸ÆäËûÔÆÇéÐÎ ¡£SalesloftÒÑÓëSalesforceÏàÖú×÷·ÏËùÓÐDriftÁîÅÆ £¬²¢ÒªÇó¿Í»§ÖØÐÂÈÏÖ¤ ¡£


https://www.bleepingcomputer.com/news/security/fbi-warns-of-unc6040-unc6395-hackers-stealing-salesforce-data/


5. VoidProxyÍøÂç´¹ÂÚÆ½Ì¨Ê¹ÓÃÖÐÐÄÈ˹¥»÷ÇÔȡ΢Èí¹È¸èÕË»§Æ¾Ö¤


9ÔÂ14ÈÕ £¬¿ËÈÕ £¬Ò»¸öÃûΪVoidProxyµÄÐÂÐÍÍøÂç´¹ÂÚ¼´·þÎñ£¨PhaaS£©Æ½Ì¨±»ÆØ¹â £¬ÆäÕë¶ÔMicrosoft 365¡¢GoogleÕË»§¼°ÊÜOktaÆ·¼¶Èý·½µ¥µãµÇ¼£¨SSO£©±£»¤µÄÕË»§Ìᳫ¹¥»÷ ¡£¸Ãƽ̨ÓÉOktaÍþвÇ鱨ÍŶӷ¢Ã÷ £¬±»ÐÎòΪ¡°¿ÉÀ©Õ¹¡¢¿É¹æ±ÜÇÒÖØ´ó¡± £¬½ÓÄÉÖÐÐÄÈË£¨AitM£©Õ½ÂÔʵʱÇÔÈ¡Óû§Æ¾Ö¤¡¢¶àÒòËØÈÏÖ¤£¨MFA£©´úÂë¼°»á»°cookie ¡£¹¥»÷ʼÓÚÊÜѬȾµÄµç×ÓÓʼþ·þÎñÕË»§·¢ËͰüÀ¨Ëõ¶ÌÁ´½ÓµÄ´¹ÂÚÓʼþ ¡£ÊÕ¼þÈ˵ã»÷Á´½Óºó £¬»áÂÄÀú¶à´ÎÖØ¶¨Ïò £¬×îÖÕ»á¼ûÍйÜÔÚ.icu¡¢.sbs¡¢.xyzµÈµÍ±¾Ç®ÓòÃûÉϵĴ¹ÂÚÍøÕ¾ ¡£ÕâÐ©ÍøÕ¾Ê¹ÓÃCloudflare±£»¤Òþ²ØÕæÊµIP £¬²¢Í¨¹ýCloudflare WorkerÇéÐιýÂËÁ÷Á¿¡¢¼ÓÔØÒ³Ãæ ¡£»á¼ûÕßÐèÏÈͨ¹ýCloudflare CAPTCHAÑéÖ¤ÒÔɨ³ý»úеÈË £¬ÔöÌíÒ³Ãæ¿ÉÐŶÈ ¡£´¹ÂÚÒ³ÃæÄ£ÄâMicrosoft»òGoogleµÇ¼½çÃæ £¬²¿·ÖÄ¿µÄ»á±»Ö¸µ¼ÖÁÎÞº¦µÄ¡°½Ó´ý¡±Ò³ÃæÒÔ»ìÏý¼ì²â ¡£µ±Óû§ÊäÈëÆ¾Ö¤Ê± £¬ÇëÇó»áͨ¹ýVoidProxyÊðÀíÖÁGoogle»òMicrosoft·þÎñÆ÷ ¡£¹ØÓÚʹÓÃOkta SSOµÄÍŽáÕË»§ £¬¹¥»÷»á½øÈëµÚ¶þ½×¶Î £¬Ã°³äOktaµÄSSOÁ÷³ÌÒ³Ãæ £¬½øÒ»²½ÇÔÊØÐÅÏ¢ ¡£VoidProxyµÄÊðÀí·þÎñÆ÷ÔÚÊܺ¦ÕßÓëÕýµ±·þÎñ¼äÖмÌÁ÷Á¿ £¬Í¬Ê±²¶»ñ´«ÊäÖеÄÓû§Ãû¡¢ÃÜÂë¡¢MFA´úÂë £¬²¢×èµ²Õýµ±·þÎñ·¢·ÅµÄ»á»°cookie £¬¹©¹¥»÷ÕßÔÚÖÎÀíÃæ°åÖ±½ÓʹÓà ¡£


https://www.bleepingcomputer.com/news/security/new-voidproxy-phishing-service-targets-microsoft-365-google-accounts/


6. ÐÂÐÍHybridPetyaÀÕË÷Èí¼þÍ»ÆÆUEFIÇå¾²Æô¶¯ÊµÑé¹¥»÷


9ÔÂ12ÈÕ £¬ÍøÂçÇå¾²¹«Ë¾ESET¿ËÈÕÔÚVirusTotalƽ̨·¢Ã÷ÃûΪHybridPetyaµÄÐÂÐÍÀÕË÷Èí¼þÑù±¾ £¬¸Ã¶ñÒâÈí¼þ¿ÉÈÆ¹ýUEFIÇå¾²Æô¶¯¹¦Ð§ £¬ÔÚEFIϵͳ·ÖÇø°²ÅŶñÒâ³ÌÐò ¡£HybridPetyaÏÔ×ÅÊÜ2016-2017ÄêPetya/NotPetya¶ñÒâÈí¼þÆô·¢ £¬ºóÕßÔøÔìÓñ³ÉÇò´ó¹æÄ£ÏµÍ³Ì±»¾ÇÒÎÞ»Ö¸´Ñ¡Ïî £¬¶øHybridPetyaÔòÈÚºÏÁ½ÕßÌØµã £¬¼È±£´æÊÓ¾õÆø¸ÅºÍ¹¥»÷Á´ÌØÕ÷ £¬ÓÖÐÂÔöÒªº¦ÊÖÒÕÍ»ÆÆ ¡£Ñо¿ÏÔʾ £¬HybridPetyaʹÓÃCVE-2024-7344Îó²îʵÏÖÇå¾²Æô¶¯Èƹý £¬¸ÃÎó²î±£´æÓÚ΢ÈíÊðÃûÓ¦ÓÃÖÐ £¬×ÝȻϵͳÆôÓÃÇå¾²Æô¶¯±£»¤ÈԿɱ»Ê¹Óà ¡£¹¥»÷ʱ £¬¶ñÒâÈí¼þÊ×Ïȼì²âÖ÷»úÊÇ·ñ½ÓÄÉUEFI+GPT·ÖÇø×éºÏ £¬Ëæºó½«°üÀ¨config¡¢verify¡¢counterµÈÎļþµÄÆô¶¯¹¤¾ß°üÖ²ÈëEFIϵͳ·ÖÇø ¡£ÆäÖÐ £¬configÎļþ´æ´¢¼ÓÃܱê¼Ç¡¢ÃÜÔ¿¡¢Ëæ»úÊý¼°Êܺ¦ÕßID £¬verifyÎļþÓÃÓÚÃÜÔ¿ÑéÖ¤ £¬counterÔò¸ú×Ù¼ÓÃܽø¶È ¡£¸ÃÈí¼þ»áÌæ»»Ô­Ê¼bootmgfw.efiΪ±£´æÎó²îµÄreloader.efi £¬²¢É¾³ýbootx64.efi £¬Í¬Ê±±¸·Ýԭʼָµ¼³ÌÐòÒÔ±ãÊê½ðÖ§¸¶ºó»Ö¸´ÏµÍ³ ¡£¹¥»÷Á÷³ÌÖÐ £¬HybridPetya´¥·¢À¶ÆÁ¹ýÊ§Ç¿ÖÆÏµÍ³ÖØÆô £¬Ê¹¶ñÒâbootkitÔÚÆô¶¯½×¶ÎÖ´ÐÐ ¡£ËæºóʹÓÃSalsa20Ëã·¨¼ÓÃÜËùÓÐMFT¼¯Èº £¬Ê±´úÏÔʾÐéαCHKDSKÐÂÎÅÎóµ¼Óû§ ¡£¼ÓÃÜÍê³ÉºóÔÙ´ÎÖØÆô £¬ÏòÊܺ¦ÕßË÷Òª1000ÃÀÔª±ÈÌØ±ÒÊê½ð £¬»»È¡32×Ö·ûÃÜÔ¿ÒÔ»Ö¸´Ö¸µ¼³ÌÐòÏ¢ÕùÃÜÊý¾Ý ¡£


https://www.bleepingcomputer.com/news/security/new-hybridpetya-ransomware-can-bypass-uefi-secure-boot/