¼ÙÒâBooking.comµÄÍøÂç´¹µö»î¶¯ÀûÓÃClickFix¹¥»÷ÇÔÊØÐÅÏ¢
°ä²¼¹¦·ò 2025-03-141. ¼ÙÒâBooking.comµÄÍøÂç´¹µö»î¶¯ÀûÓÃClickFix¹¥»÷ÇÔÊØÐÅÏ¢
3ÔÂ13ÈÕ£¬Î¢Èí½üÈÕ·¢³öÖҸ棬ָ³ö´æÔÚһ·¼ÙÒâBooking.comµÄÍøÂç´¹µö»î¶¯£¬¸Ã»î¶¯×Ô2024Äê12ÔÂÆð³ÖÐøÖÁ½ñ£¬ÖØÒªÕë¶Ô¾Æµê¡¢¹Û¹âÉçµÈʹÓÃBooking.comÔ¤Ô¼·þÎñµÄ×éÖ¯Ô±¹¤¡£¹¥»÷ÕßÀûÓÃClickFixÉç»á¹¤³Ì¹¥»÷¼¿Á©£¬Í¨¹ý·¢Ëͺ¬ÓжñÒâÈí¼þµÄµç×ÓÓʼþ£¬Òâͼ½Ù³ÖÔ±¹¤ÕË»§²¢ÇÔÈ¡¿Í»§¸¶¿îÏêÇéºÍÓ×ÎÒÐÅÏ¢¡£¾Ý΢Èí°²È«×êÑÐÈËÔ±·ÖÎö£¬Õâ´Î»î¶¯ÓÉÃûΪ¡°Storm-1865¡±µÄÍþв×éÖ¯ÌáÒé¡£ÔÚÕâ´Î»î¶¯ÖУ¬¹¥»÷Õß·¢ËͼÙ×°³É¿ÍÈËѯÎÊBooking.comÓйØÊºú˵ĵç×ÓÓʼþ£¬ÓʼþÖÐÔ̺¬ÐéαµÄCAPTCHAÒ³ÃæÁ´½Ó»òPDF¸½¼þ£¬ÓÕÆÊܺ¦ÕßÖ´Ðаµ²ØµÄmshta.exeºÅÁî¡£¸ÃºÅÁî»áÔÚ¹¥»÷Õß·þÎñÆ÷ÉÏÖ´ÐжñÒâHTMLÎļþ£¬½ø¶øÏÂÔØ²¢×°ÖöàÖÖRATºÍÐÅÏ¢ÇÔÈ¡Èí¼þ£¬ÈçXWorm¡¢Lumma stealerµÈ¡£ÕâЩÓÐÐ§ÔØºÉÓµÓÐÇÔÈ¡²ÆÕþÊý¾ÝºÍƾ֤ÒÔ¹©Ú²ÆÊ¹ÓõÄÄÜÁ¦£¬ÊÇStorm-1865»î¶¯µÄµäÐÍÌØµã¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬Î¢Èí½¨ÒéÓû§Ê¼ÖÕÈ·ÈÏ·¢¼þÈ˵ØÖ·µÄºÏ·¨ÐÔ£¬¶Ô´¹Î£Ðж¯ºôÓõά³Ö¾¯Ì裬²¢Ñ°ÕÒ¿ÉÄܵį´Ð´ÃýÎóÒÔ¼ø±ðÚ¿Æ¡£Í¬Ê±£¬½¨Òéͨ¹ý¶ÀÁ¢µÇ¼ƽ̨ÑéÖ¤Booking.comÕË»§×´Ì¬ºÍ´ý´¦Öþ¯±¨£¬Ô¤·Àµã»÷µç×ÓÓʼþÖеÄÁ´½Ó£¬ÒÔ½µµÍ±»¹¥»÷µÄ·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/clickfix-attack-delivers-infostealers-rats-in-fake-bookingcom-emails/
2. Mora_001ÀûÓÃFortinet·ì϶²¿ÊðSuperBlackÀÕË÷Èí¼þ
3ÔÂ13ÈÕ£¬ÃûΪ¡°Mora_001¡±µÄÀÕË÷Èí¼þÔËÓªÉÌÔÚÀûÓÃFortinetÅû¶µÄÁ½¸öÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2024-55591ºÍCVE-2025-24472£©À´»ñÈ¡·À»ðǽÉ豸µÄδÊÚȨ½Ó¼û£¬²¢²¿Êð¶¨ÔìµÄSuperBlackÀÕË÷Èí¼þ¡£ÕâÁ½¸ö·ì϶±ðÀëÔÚ2024Äê1ÔºÍ2Ô±»Fortinet¹«¿ª£¬µ«CVE-2024-55591×Ô2024Äê11ÔÂÆð¾ÍÒѱ»ÓÃ×÷ÁãÈÕ·ì϶½øÐй¥»÷¡£¶ø¹ØÓÚCVE-2025-24472£¬Ö»¹Ü×î³õFortinet°µÊ¾²»Ã÷ÏÔÊÇ·ñ±»ÀûÓ㬵«Forescout×êÑÐÈËÔ±ÔÚ2025Äê1ÔÂÏÂÑ®·¢ÏÖÁËSuperBlack¹¥»÷£¬Åú×¢¸Ã·ì϶ҲÒѱ»ÀûÓá£Mora_001ÔËÓªÉÌͨ¹ýÕâÁ½¸ö·ì϶»ñµÃ¡°super_admin¡±È¨ÏÞ£¬´´½¨ÐÂÖÎÀíÔ¹ØÊ»§£¬²¢³¢ÊÔºáÏòÒÆ¶¯ÒÔÇÔÈ¡Êý¾Ý¡£Ö®ºó£¬ËûÃÇʹÓÃ×Ô½ç˵¹¤¾ß¼ÓÃÜÎļþÒÔ½øÐÐË«³ÁÀÕË÷£¬²¢ÔÚ¼ÓÃÜʵÏÖºó¸éÖÃÀÕË÷ÐÅ¡£´Ë±í£¬»¹²¿ÊðÁËÃûΪ¡°WipeBlack¡±µÄ¶¨Ôì²Á³ýÆ÷ÒÔɾ³ýºÛ¼£¡£Forescout·¢ÏÖSuperBlackÓëLockBitÀÕË÷Èí¼þÖ®¼ä´æÔÚçÇÃÜÁªÏµ£¬Ö»¹ÜǰÕßËÆºõÊǶÀÁ¢Ðж¯£¬µ«Á½ÕßÔÚ¼ÓÃÜÆ÷½á¹¹¡¢Êê½ð¼Í¼ÖеÄTOX̸ÌìIDÒÔ¼°IPµØÖ·µÈ·½Ãæ´æÔÚ´óÁ¿³Áµþ¡£Forescout·ÖÏíÁËÓëSuperBlack¹¥»÷ÓйصÄÈëÇÖÖ¸±êÁбíÒÔ¹©·ÀÓù²Î¿¼¡£
https://www.bleepingcomputer.com/news/security/new-superblack-ransomware-exploits-fortinet-auth-bypass-flaws/
3. CISAÖÒ¸æApple WebKitÔ½½çдÈë·ì϶ÔÚ±»Ò°±íÀûÓÃ
3ÔÂ13ÈÕ£¬½üÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©·¢³öÖҸ棬ָ³öÆ»¹ûWebKitä¯ÀÀÆ÷ÒýÇæ´æÔÚÒ»¸öÒѱ»Ò°±íÀûÓõÄÁãÈÕ·ì϶£¬±àºÅΪCVE-2025-24201¡£ÕâÊÇÒ»¸öÔ½½çдÈëÎÊÌ⣬¹¥»÷Õß¿Éͨ¹ý¾«ÐÄ»ú¹ØµÄ¶ñÒâÍøÒ³ÄÚÈÝ£¬Í»ÆÆWeb ContentɳºÐ¸ôÀ룬ÔÚÊÜÓ°ÏìÉ豸ÉÏÖ´ÐÐδ¾ÊÚȨµÄ´úÂ룬ÉõÖÁ²¿Êð¼äµýÈí¼þ¡£¸Ã·ì϶¿í·ºÓ°ÏìiPhone XS¼°ºóÐø»úÐÍ¡¢iPad ProϵÁÓ×¢iPad AirϵÁÓ×¢iPadϵÁÓ×¢iPad miniϵÁÓ×¢ÔËÐÐmacOS SequoiaµÄMacÉ豸ÒÔ¼°Apple Vision Pro£¬Í¬Ê±iOSºÍiPadOSÉϵĵÚÈý·½ä¯ÀÀÆ÷Ò²Êܵ½Ó°Ï죬ÓÉÓÚËüÃDZØÐëʹÓÃWebKitÒýÇæ¡£Æ»¹ûÒÑÈ·ÈÏ£¬¸Ã·ì϶¿ÉÄÜÔÚÕë¶ÔÌØ¶¨Ó×Îҵġ°¼«Æä¸´ÔÓ¡±µÄ¹¥»÷Öб»ÀûÓ㬲¢ÒѰ䲼¸üнøÐн¨¸´¡£CISA½¨ÒéÓû§ÒÀÕÕ¹©¸øÉÌÅúʾ²ÉÈ¡»º½â´ëÊ©£¬Ô̺¬µ±¼´¸üÐÂÉ豸¡¢Ô¤·Àµã»÷²»³ÉÐÅÁ´½ÓºÍ½Ó¼ûÎ´ÖªÍøÕ¾¡¢¼à¿ØÉ豸ÐÐΪÒÔ¼°ÆôÓÃ×Ô¶¯¸üС£¶ÔÓڸ߷çÏÕÓû§ºÍÆóÊÂÒµÓû§£¬½¨ÒéÆôÓÃËø¶¨Ä£Ê½ÒÔ¼ÓÇ¿·À»¤ÄÜÁ¦¡£ÆóÒµÓû§»¹Ó¦²¿ÊðÒÆ¶¯É豸ÖÎÀí½â¾ö¹æ»®£¬È·±£É豸ʵʱ¸üУ¬²¢¼à¿ØÍøÂç»î¶¯ÒÔ·¢ÏÖDZÔÚ¹¥»÷¼£Ïó¡£
https://cybersecuritynews.com/cisa-warns-of-apple-webkit-out-of-bounds-write/
4. ESHYFTÊý¾Ý¿âÅäÖÃÃýÎóÖÂ86,000ÃûÒ½»¤ÈËÔ±Ãô¸ÐÊý¾Ýй¶
3ÔÂ13ÈÕ£¬ESHYFT ÊÇÒ»¼Ò×ܲ¿Î»ÓÚÐÂÔóÎ÷ÖݵĽ¡È«¿Æ¼¼¹«Ë¾£¬ÒµÎñ±é¼° 29 ¸öÖÝ¡£½üÈÕ£¬Ò»¸öÅäÖÃÃýÎóµÄÊý¾Ý¿â¶³öÁËESHYFTÆìÏÂ86,000¶àÃûÒ½»¤ÈËÔ±µÄ108.8 GBÃô¸ÐÊý¾Ý£¬Ô̺¬SSN¡¢Éí·ÝÖ¤¼þɨÃè¼þ¡¢Ð½×ÊÏêÇéµÈÓ×ÎÒÉí·ÝÐÅÏ¢¡£¸ÃÊý¾Ý¿âûÓÐÃÜÂë±£»¤»ò¼ÓÃÜ£¬ÓÉÍøÂ簲ȫ×êÑÐÔ±Jeremiah Fowler·¢ÏÖ¡£±»Ð¹Â¶µÄÊý¾Ý»¹Ô̺¬Ó×ÎÒ×ÊÁÏͼÏñ¡¢Ã沿ͼÏñ¡¢×¨ÒµÖ¤Êé¡¢¹¤×÷¹¤×÷ºÍ̸µÈ£¬ÒÔ¼°Ò»·Ý¾ßÌå¼Í¼ÁË80¶àÍòÌõ»¤Ê¿ÐÅÏ¢µÄµç×Ó±í¸ñ¡£´Ë±í£¬Ò½ÁÆÎļþÒ²±»Ð¹Â¶£¬¿ÉÄÜÊܵ½HIPAAÂÉÀýµÄÔ¼Êø¡£Ö»¹ÜFowlerµ±¼´Í¨ÖªÁËESHYFT£¬µ«¸Ã¹«Ë¾»¨ÁËÒ»¸ö¶àÔ²ÅÏ޶ȹ«¼Ò½Ó¼û¡£Ä¿Ç°Éв»Ã÷ÏÔÊý¾Ý¿âÊÇ·ñÓÉESHYFTÕ¼ÓлòÖ±ÊÕÊÜÀí£¬ÒÔ¼°Â¶³öµÄ³ÖÐø¹¦·òºÍÊÇ·ñÓÐδ¾ÊÚȨµÄÈËÔ±½Ó¼ûÊý¾Ý¡£ÍøÂç·¸×ï·Ö×Ó¿ÉÄÜ»áÀûÓÃÕâЩÊý¾ÝÖ´Ðз¸×ï»òºýŪÊܺ¦Õß¡£Òò¶ø£¬HealthTech±ØÐëÖ´ÐÐÊʵ±µÄÍøÂ簲ȫ´ëÊ©£¬ÈçÇ¿Ôì¼ÓÃÜÃô¸ÐÊý¾Ý¡¢Ê¹Óöà³É·ÖÉí·ÝÑéÖ¤¡¢½øÐж¨ÆÚ°²È«ÉóºËµÈ£¬ÒÔ±£»¤Óû§Êý¾Ý°²È«¡£Í¬Ê±£¬Ôì¶©Êý¾Ýй¶Ӧ¶Ô´òËã¡¢³ÉÁ¢¹µÍ¨Çþ·¡¢Ìá¹©ÕÆ¹ÜÈεÄÅû¶֪ͨ²¢½ÌÓýÓû§¼ø±ðÍøÂç´¹µö̰ͼҲÊDZØÒªµÄ¡£
https://hackread.com/healthtech-database-exposed-medical-employment-records/
5. ºÚ¿ÍÀÄÓÃMicrosoft Copilot½øÐи´ÔÓµÄÍøÂç´¹µö¹¥»÷
3ÔÂ13ÈÕ£¬Ëæ×ÅMicrosoft CopilotÔÚ2023ÄêÍÆ³ö²¢Ñ¸¿ì³ÉΪºÜ¶à×éÖ¯²»³É»òȱµÄ³ö²úÁ¦¹¤¾ß£¬ÍøÂç·¸×ï·Ö×ÓÒ²¶Ô×¼ÁËÕâһй¥»÷ý½é¡£ËûÃÇÀûÓþ«ÐÄÔì×÷µÄÍøÂç´¹µöµç×ÓÓʼþ£¬·ÂÕպϷ¨µÄMicrosoftͨѶ£¬ÓÕÆÓû§µã»÷Á´½Ó£¬´Ó¶ø³Á¶¨Ïòµ½Î±ÔìµÄMicrosoft CopilotÓ½ÓÒ³Ãæ¡£ÕâÐ©Ò³ÃæÓëºÏ·¨µÄMicrosoft½çÃæ¸ß¶ÈÀàËÆ£¬µ«URL²¢²»ÊôÓÚMicrosoftÓò¡£¹¥»÷Õß½øÒ»²½·ÂÕÕMicrosoftÉí·ÝÑéÖ¤¹ý³Ì£¬ÓÕʹÓû§ÊäÈëÆ¾Ö¤£¬²¢³ÊÏÔìÛÕ©ÐÔµÄMicrosoft Authenticator¶à³ÁÉí·ÝÑéÖ¤Ò³Ãæ¡£´ËÀàÍøÂç´¹µö»î¶¯ÒѾÏÔʾ³öÆäÑϳÁÐÔ£¬¹¥»÷ÕßÉõÖÁ·¢Ë͵ç×ÓÓʼþÐû³ÆÏòÓû§ÊÕÈ¡Microsoft Copilot·þÎñÓöȡ£Ëæ×Å΢Èí³ÖÐøÔÚÆä²úÆ·Ì×¼þÖм¯³ÉÈËΪÖÇÄÜÖ°ÄÜ£¬°²È«×¨ÒµÈËÔ±±ØÐ뾯ÌèгöÏÖµÄÍþв£¬Ö´ÐÐÈ«ÃæµÄ°²È«´ëÊ©ÒÔ·ÀÓùÕâЩÍþв¡£Î¢ÈíºÍCofenseµÈ¹¤¾ßÄܹ»Ô®ÊÖ¼ø±ðºÍÖÎÀíºýŪ·¢¼þÈË£¬×èֹDZÔÚÍþв¡£ÏàʶÕâЩ¹¥»÷²½Öè²¢Ö´ÐÐÊʵ±µÄ±£»¤´ëÊ©£¬Äܹ»½µµÍ×éÖ¯·çÏÕ£¬Í¬Ê±ÒÀÈ»ÊÜÒæÓÚMicrosoft CopilotµÈ¹¤¾ßÌṩµÄ³ö²úÁ¦ÓÅÊÆ¡£
https://cybersecuritynews.com/microsoft-copilot-phishing-attack/
6. ½Ý±ªÂ·»¢Ôâ¡°Rey¡±ºÚ¿ÍÈëÇÖ£¬700·ÝÃô¸ÐÊý¾Ýй¶
3ÔÂ12ÈÕ£¬½üÆÚ£¬Ò»Ãû»¯Ãû¡°Rey¡±µÄÍþвÐÐΪÕßÈëÇÖÁËÓ¢¹ú³ÛÃûÆû³µÔì×÷É̽ݱªÂ·»¢£¨JLR£©µÄÄÚ²¿ÏµÍ³£¬²¢Ð¹Â¶ÁËÔ¼700·ÝÔ̺¬Ãô¸Ð¼¼ÊõºÍÔËÓªÊý¾ÝµÄÄÚ²¿Îļþ£¬³õ´ÎÔÚ°µÍøÂÛ̳Éϰ䲼¡£Ð¹Â¶µÄÊý¾ÝÉæ¼°¶à¸öÀà±ð£¬Ô̺¬×¨ÓÐÔ´´úÂë¡¢³µÁ¾¿ª·¢ÈÕÖ¾¡¢¸ú×ÙÊý¾Ý¼¯ÒÔ¼°Ô±¹¤Êý¾Ý¿âµÈ£¬¿ÉÄܶԸù«Ë¾µÄ֪ʶ²úȨ°²È«ºÍÔ±¹¤ÒþÖÔÔì³ÉÑϳÁÍþв¡£Õâ´ÎйÃÜÊÂÎñÈôÊǵõ½Ö¤Êµ£¬½«³ÉΪ½Ý±ªÂ·»¢Ãæ¶ÔµÄ×îÑϳÁµÄÍøÂ簲ȫÍþв֮һ¡£ÍøÂ簲ȫ·ÖÎöʦ´§Ä¦£¬Êý¾Ýй¶¿ÉÄÜÔ´×ÔÊܵ½¹¥»÷µÄ¹«Ë¾·þÎñÆ÷»òÔÆ´æ´¢¿â¡£Ö»¹ÜÉÐδÃ÷È·Ìá¼°Êê½ðÒªÇ󣬵«Ð¹Â¶Êý¾ÝµÄ¼¼ÊõÐÔÖÊ¿ÉÄÜʹ¾ºÕùµÐÊÖÊÜÒæ¡£½Ý±ªÂ·»¢ÉÐδ¾Í´Ë°ä·¢¹Ù·½ÉêÃ÷£¬µ«ÍøÂ簲ȫ¹«Ë¾ÒÑÆðÍ·Ñé֤й¶Êý¾ÝµÄÕæÊµÐÔ¡£Õâ´ÎÊÂÎñ͹ÏÔÁËÆû³µÐÐÒµÊý×Ö»ù´¡ÉèÊ©µÄ´àÈõÐÔ£¬×¨¼Ò½¨ÒéJLRµ±¼´ÉóºË´úÂë´æ´¢¿â£¬¼ÓÇ¿¿ª·¢ÕßÕË»§µÄ°²È«´ëÊ©£¬²¢½øÐÐÉøÈë²âÊÔ¡£¶ÔÓÚÔ±¹¤À´Ëµ£¬Æ¾Ö¤¼à¿ØºÍ°²È«ÒâʶÅàѵҲÖÁ¹Ø³ÁÒª¡£Õâ´ÎйÃÜÊÂÎñÔٴξ¯ÐÑÈËÃÇ£¬Æû³µÔì×÷ÉÌÔÚÈÕÒæÓÉÈí¼þÇý¶¯µÄÐÐÒµÖÐÃæ¶Ô×Ų»Ðݱ䶯µÄÍþв£¬´´ÐÂÓëÍøÂ簲ȫ֮¼äµÄƽºâÒÀÈ»²»²»±ä¡£
https://cybersecuritynews.com/threat-actor-allegedly-claiming-breach/


¾©¹«Íø°²±¸11010802024551ºÅ