µÂ¿ËÈøË¹ÖÝÓëÒÁÀûŵÒÁÖݵ±¾Ö»ú¹¹ÆØÊý¾Ýй¶
°ä²¼¹¦·ò 2025-06-101. µÂ¿ËÈøË¹ÖÝÓëÒÁÀûŵÒÁÖݵ±¾Ö»ú¹¹ÆØÊý¾Ýй¶
6ÔÂ10ÈÕ£¬½üÈÕ£¬µÂ¿ËÈøË¹ÖݺÍÒÁÀûŵÒÁÖÝÈ·µ±¾Ö»ú¹¹Ïà¼Ì°ä²¼Êý¾Ýй¶ÖҸ棬ÊýǧÈËÃô¸ÐÐÅÏ¢ÊÜÓ°Ïì¡£µÂ¿ËÈøË¹Öݽ»Í¨²¿£¨TxDOT£©5ÔÂ12ÈÕÔâ·êºÚ¿ÍÈëÇÖ£¬Æä±äÂҼͼÐÅϢϵͳ£¨CRIS£©³öÏÖÒì³£»î¶¯£¬±»µÁÕË»§±»ÓÃÓÚ½Ó¼ûºÍÏÂÔØ½ü30Íò·Ý±äÂһ㱨¡£ÕâЩ»ã±¨Ô̺¬ÐÕÃû¡¢µØÖ·¡¢¼ÝÕÕºÅÂë¡¢³µÉ̱êÂë¡¢Æû³µ±£ÏÕµ¥ºÅÂëÒÔ¼°±äÂÒÖÐÊÜÉËÇé¿öºÍ±äÂÒÐðÊöµÈÃô¸ÐÐÅÏ¢¡£Ö»¹Ü˾·¨Î´ÒªÇ󴫵ݸÃÊÂÎñ£¬µ«µÂ¿ËÈøË¹Öݾö¶¨Í¨¹ýÐź¯·î¸æÊÜÓ°ÏìÓ×ÎÒ¡£ÊÂÎñÆØ¹âºó£¬±»µÁÕË»§±»µ±¼´¹Ø¹Ø£¬Óйز¿ÃÅÔÚ³ÖÐøµ÷²é£¬½»Í¨²¿ÉÐδ¶ÔºÚ¿ÍÈëÇÖÊÂÎñ×÷³ö»ØÓ¦£¬½öÈ·ÈÏÔÚµ÷²é¡£Í¬Ê±£¬·¢¸øÊܺ¦Õߵĺ¯¼þÌáÐÑËûÃǾ¯ÌèÓë´Óǰ±äÂÒÓйصĵç×ÓÓʼþ¡¢¶ÌÐÅ»òµç»°£¬²¢ÉèÁ¢ÁËÕ÷ѯÈÈÏßÒÔ½â´ðÒÉÄÑ¡£Óë´Ëͬʱ£¬ÒÁÀûŵÒÁÖÝÒ½ÁƱ£½¡ºÍ¼ÒÍ¥·þÎñ²¿£¨HFS£©Ò²»ã±¨ÁËһ·Êý¾Ýй¶ÊÂÎñ¡£2Ô·ݣ¬Ò»ÃûºÚ¿Íͨ¹ýÓÕÆ¼¿Á©³É¹¦»ñÈ¡ÁËHFSÒ»ÃûÔ±¹¤µÄÐÅÀµ£¬µ¼ÖÂ933È˵ÄÐÅÏ¢±»µÁ¡£ºÚ¿ÍÀûÓÃÁíÒ»¸ö±»ÈëÇÖÈ·µ±¾Öµç×ÓÓʼþÕË»§ÏòHFSÔ±¹¤·¢ËÍ¿´ËÆ¿ÉÐŵĵç×ÓÓʼþ£¬½ø¶øÐ¹Â¶ÁËHFSÔ±¹¤µÄµç×ÓÓʼþºÍÎļþ¡£±»µÁÐÅÏ¢Ô̺¬Éç»á°²È«ºÅÂë¡¢¼ÝÊ»ÅÆÕÕ¡¢ÖÝÉí·ÝÖ¤ÒÔ¼°Óë×ÓÅ®·öÑø·Ñ¡¢Ò½ÁƲ¹ÖúµÈÓйصIJÆÕþÐÅÏ¢¡£
https://therecord.media/car-crash-records-stolen-texas-transportation-department
2. ÉÈøËþ¿Æ¼¼ÔâÀÕË÷Èí¼þ¹¥»÷ºóÈ·ÈÏÊý¾Ýй¶
6ÔÂ9ÈÕ£¬ÉÈøËþ¿Æ¼¼£¨Sensata Technologies£©ÔÚµ÷²é4Ô·ÝÀÕË÷Èí¼þ¹¥»÷ÊÂÎñºó£¬ÏòÆäǰÈκÍÏÖÈÎÔ±¹¤·¢³öÊý¾Ýй¶ÖҸ档ÉÈøËþÊÇÒ»¼ÒרһÓڹؼü¹¤×÷´«¸ÐÆ÷¡¢½ÚÔìÆ÷ºÍµçÆø±£»¤ÏµÍ³µÄÈ«Çò¹¤Òµ¿Æ¼¼¹«Ë¾£¬·þÎñÓÚÆû³µ¡¢º½¿Õº½Ìì¡¢¹ú·ÀµÈÐÐÒµ£¬ÄêÊÕÈ볬40ÒÚÃÀÔª¡£½ñÄê4Ô£¬¸Ã¹«Ë¾ÏòÃÀ¹ú֤ȯÂòÂôίԱ»áÌá½»8-KÎļþ£¬Åû¶4ÔÂ6ÈÕÔâ·êÀÕË÷Èí¼þ¹¥»÷²¢°éËæÊý¾Ý͵ÇÔ¡£Õâ´ÎÍøÂ簲ȫÊÂÎñÓ°ÏìÁËÆäº½ÔË¡¢Ôì×÷ºÍÆäËûÒµÎñÔËÓª¡£Ö»¹Ü³õ´ëÊ©²é֤ʵÁËÊý¾Ýй¶£¬µ«Æäʱδȷ¶¨±»µÁÊý¾ÝºÍй¶ÁìÓò¡£ºóÐøµ÷²éÏÔʾ£¬ÀÕË÷Èí¼þ¹¥»÷ÕßÓÚ2025Äê3ÔÂ28ÈÕÈëÇÖÁËSensataµÄÍøÂ磬֤¾ÝÅú×¢ÔÚ2025Äê3ÔÂ28ÈÕÖÁ4ÔÂ6ÈÕÆÚ¼ä£¬ÍøÂç´æÔÚδ¾ÊÚȨ»î¶¯£¬Ò»Ãûδ¾ÊÚȨÈËÔ±²é¿´²¢»ñÈ¡ÁËÍøÂçÖеÄÎļþ¡£¾×ÐϸÉó²é£¬¸Ã¹«Ë¾ÓÚ5ÔÂ23ÈÕÈ·¶¨Îļþ¿ÉÄÜÔ̺¬ÊÜÓ°ÏìÈËÔ±µÄÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢µØÖ·¡¢Éç»á°²È«ºÅÂë¡¢¼ÝÊ»ÅÆÕÕºÅÂë¡¢ÖÝÉí·ÝÖ¤ºÅÂë¡¢»¤ÕÕºÅÂë¡¢²ÆÕþÕË»§ÐÅÏ¢¡¢Ö§¸¶¿¨ÐÅÏ¢¡¢Ò½ÁÆÐÅÏ¢¡¢½¡È«±£ÏÕÐÅÏ¢¼°µ®ÉúÈÕÆÚµÈ¡£Õâ´ÎйÃÜÊÂÎñÓ°ÏìÁËSensataÏÖÈκÍǰÈÎÔ±¹¤¼°Æä¾ìÊô£¬ÇÒÿÓ×ÎÒй¶µÄÐÅÏ¢¸÷²»Ò»Ñù¡£¹«Ë¾ÔÚÐÅÖи½ÉÏÁ˲ÎÓëÒ»ÄêÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñµÄ×¢Ã÷¡£½ØÖÁĿǰ£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£
https://www.bleepingcomputer.com/news/security/sensata-technologies-says-personal-data-stolen-by-ransomware-gang/
3. ±±ÃÀ×î´óʳƷÅú·¢ÉÌUNFIÔâ·êÍøÂç¹¥»÷
6ÔÂ9ÈÕ£¬±±ÃÀ×î´óÉÏÊÐÅú·¢·ÖÏúÉ̽áºÏÌìȻʳƷ¹«Ë¾£¨UNFI£©ÔÚ½üÆÚÔâ·êÍøÂç¹¥»÷ºó£¬±»ÆÈ¹Ø¹Ø²¿ÃÅϵͳ£¬Ó°Ïì¿Í»§¶©µ¥¡£UNFI×ܲ¿Î»ÓÚÂ޵µº£¬¾Óª53¸öÅäËÍÖÐÐÄ£¬ÎªÃÀ¹úºÍ¼ÓÄôó30,000¶à¸öµØÖ·ÌṩÐÂÏʺÍÀä¶³²úÆ·£¬ÊÇÑÇÂíѷȫʳ³¬ÊеÄÖØÒª·ÖÏúÉÌ£¬2024Äê8ÔÂÄêÊÕÈë´ï310ÒÚÃÀÔª¡£6ÔÂ5ÈÕ£¬UNFI·¢ÏÖÍøÂç¹¥»÷£¬Ñ¸¿ìÆô¶¯ÊÂÎñÏìÓ¦´òËã²¢Ö´ÐжôÔì´ëÊ©£¬Ô̺¬×Ô¶¯¹Ø¹Ø²¿ÃÅϵͳ£¬ÕâÁÙʱӰÏìÁËÆäÍÆ¹ãºÍ·Ö·¢¿Í»§¶©µ¥µÄÄÜÁ¦£¬µ¼ÖÂÒµÎñÔËÓªÁÙʱÖжϡ£×Ô¾õÏÖÎ¥¹æÐÐΪÒÔÀ´£¬UNFIÒÑ֪ͨÓйط¨Âɲ¿ÃÅ£¬²¢ÀñƸ±í²¿ÍøÂ簲ȫר¼Òµ÷²é´ËÊÂÎñ¡£Í¬Ê±£¬¹«Ë¾²ÉÈ¡´ëʩά³Ö¿Í»§·þÎñÂ½ÐøÐÔ£¬Ö´Ðбäͨ´ëʩֱµ½ÊÜÓ°Ïìϵͳ¸´Ô¡£UNFIÔÚµÚÈý·½ÍøÂ簲ȫרҵÈËÔ±ÐÖúÏ»ý¼«ÆÀ¹À¡¢»º½âºÍ²¹¾È¸ÃÊÂÎñ£¬²¢ÒÑ֪ͨ·¨Âɲ¿ÃÅ¡£¹«Ë¾ÉÐδй©Õâ´Î¹¥»÷µÄÐÔÖÊ£¬Ò²Î´È·ÈϹ¥»÷ÕßÊÇ·ñÇÔÈ¡Êý¾Ý£¬ÇÒÉÐÎÞÀÕË÷Èí¼þÔËÓª»ú¹¹Ðû³Æ¶ÔÕâ´ÎÊÂÎñÕÆ¹Ü¡£UNFI½²»°È˰µÊ¾£¬¹«Ë¾ÔÚÆÀ¹Àδ¾ÊÚȨµÄ»î¶¯£¬²¢ÖÂÁ¦¸´Ôϵͳ£¬¿Í»§¡¢¹©¸øÉ̺ͺÏ×÷ͬ°éÊÇÊ×Òª¹¤×÷¡£
https://www.bleepingcomputer.com/news/security/grocery-wholesale-giant-united-natural-foods-hit-by-cyberattack/
4. ³¬8.4ÍòRoundcubeÊ·ýÆØCVE-2025-49113·ì϶
6ÔÂ9ÈÕ£¬RoundcubeÍøÂçÓʼþϵͳ´æÔÚÒ»¸öÑϳÁµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©·ì϶CVE-2025-49113£¬¸Ã·ì϶ӰÏìRoundcube 1.1.0ÖÁ1.6.10°æ±¾£¬³ÖÐø¹¦·ò³¬¹ýÊ®Äֱ꣬ÖÁ2025Äê6ÔÂ1Èղŵõ½½¨²¹¡£²¹¶¡°ä²¼ºó²»¾Ã£¬ºÚ¿Í±ãÄæÏò¹¤³Ì¿ª·¢³ö¿ÉÓ÷ì϶£¬²¢ÔÚµØÏÂÂÛ̳ÏúÊÛ¡£Ö»¹ÜÀûÓô˷ì϶ÐèÉí·ÝÑéÖ¤£¬µ«¹¥»÷ÕßÐû³Æ¿Éͨ¹ýCSRF¡¢ÈÕ־ץȡ»ò±©Á¦ÆÆ½â»ñÈ¡ÓÐЧƾ֤¡£°²È«×êÑÐÔ±Kirill FirsovÔÚ²©¿ÍÉÏ·ÖÏíÁË·ì϶¼¼Êõϸ½Ú£¬ÒÔÔ®ÊÖ·ÀÓù¿ÉÄܵÄ×Ô¶¯ÀûÓÃ̰ͼ¡£Roundcube¿í·ºÀûÓÃÓÚ¹²ÏíÖ÷»ú¼°µ±¾Ö¡¢½ÌÓýºÍ¿Æ¼¼ÁìÓò£¬ÔÚÏ߿ɼûÊ·ý³¬120Íò¸ö¡£Íþв¼à¿ØÆ½Ì¨Shadowserver Foundation»ã±¨³Æ£¬½ØÖÁ2025Äê6ÔÂ8ÈÕ£¬ÓÐ84,925¸öRoundcubeÊ·ý´æÔÚ´Ë·ì϶£¬ÖØÒªÉ¢²¼ÔÚÃÀ¹ú¡¢Ó¡¶È¡¢µÂ¹ú¡¢·¨¹ú¡¢¼ÓÄôóºÍÓ¢¹ú¡£Ë¼¿¼µ½±»ÀûÓõĸ߷çÏÕºÍÊý¾Ý±»µÁµÄ¿ÉÄÜÐÔ£¬ÕâЩÊ·ýµÄ¶³ö×é³É³Á´óÍøÂ簲ȫ·çÏÕ¡£½¨ÒéϵͳÖÎÀíÔ±¾¡¿ì¸üе½Òѽâ¾ö´ËÎÊÌâµÄ1.6.11ºÍ1.5.10°æ±¾¡£Ä¿Ç°Éв»Ã÷ÏԸ÷ì϶ÊÇ·ñÒѱ»ÏÖʵÀûÓü°¹æÄ£´óÓ×£¬µ«½¨Òéµ±¼´²ÉÈ¡Ðж¯£¬ÈôÎÞ·¨Éý¼¶£¬ÔòÓ¦Ï޶ȶÔÍøÂçÓʼþµÄ½Ó¼û£¬¹Ø¹ØÎļþÉÏ´«£¬Ôö³¤CSRF±£»¤£¬×èÖ¹ÓзçÏÕµÄPHPÖ°ÄÜ£¬²¢¼à¿Ø·ì϶ָ±ê¡£
https://www.bleepingcomputer.com/news/security/over-84-000-roundcube-instances-vulnerable-to-actively-exploited-flaw/
5. UnterwegsÔâÍøÂç¹¥»÷µ¼Ö¿ͻ§Êý¾Ýй¶
6ÔÂ5ÈÕ£¬»§±íÓÃÆ·×¨¼ÒUnterwegs½üÈÕÖÒ¸æÆä¿Í»§²úÉúÊý¾Ýй¶ÊÂÎñ¡£¸Ã¹«Ë¾ÓÚÎåÔµ×Ôâ·êÍøÂç¹¥»÷£¬¹¥»÷Õß¿ÉÄÜÒÑ»ñÈ¡¿Í»§Êý¾Ý¡£UnterwegsÔÚÖ¿ͻ§µÄ֪ͨÖаµÊ¾£¬Æ¾¾Ýµ÷²éÁ˾֣¬ÎÞ·¨Åųý¿Í»§Êý¾Ý±»´Û¸ÄºÍ/»ò¸´ÔìµÄ¿ÉÄÜÐÔ¡£Õâ´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÔÚÏßÉ̵êºÍʵÌåµêµÄ¹Ë¿Í£¬UnterwegsÔڵ¹ú¸÷µØ¾Óª×Å24¼ÒÃŵꡣ¿ÉÄÜÊÜÓ°ÏìµÄ¿Í»§Êý¾ÝÔ̺¬Íøµê×¢²áÓû§µÄÈ«Ãû¡¢ËÍ»õºÍÕ˵¥µØÖ·¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëÒÔ¼°µÇ¼ƾ֤£¬µ«ÒøÐÐÐÅÏ¢²¢Î´Ð¹Â¶¡£ÎªÓ¦¶ÔÕâ´ÎÊý¾Ýй¶£¬UnterwegsÒѲÉÈ¡ÁËһϵÁа²È«´ëÊ©¡£¸Ã¹«Ë¾ÒѳÁÖÃunterwegs.bizÍøµêµÄÃÜÂ룬²¢ÖÒ¸æ³ÆÕâЩÊý¾Ý¿ÉÄܱ»ÓÃÓÚÍøÂç´¹µö¹¥»÷ºÍÆäËûÔÚÏßڲƻ¡£³öÓÚ°²È«Ë¼¿¼£¬Unterwegs½¨ÒéËùÓÐÊÜÓ°ÏìµÄ¿Í»§¶ÔÒªÇóÌṩÓ×ÎÒÐÅÏ¢»òµÇ¼¾ßÌåÐÅÏ¢µÄµç×ÓÓʼþ»òÐÂÎÅά³ÖÉóÉ÷¡£Ä¿Ç°£¬¹ØÓÚÕâ´Î¹¥»÷µÄ¸ü¶àÐÅÏ¢ÉÐδ°ä²¼£¬Ô̺¬¹¥»÷ÕßÊÇÈôºÎÈëÇÖÕâ¼Ò»§±íÉ̵êϵͳµÄ£¬ÒÔ¼°ÊÇ·ñÓкڿÍ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£Unterwegs°µÊ¾£¬ËùÓÐÓйز¿ÃžùÒÑ»ñϤ´ËÊ£¬²¢ÔÚ²ÉÈ¡´ëʩӦ¶ÔDZÔڵݲȫ·çÏÕ¡£
https://www.csoonline.com/article/4002447/outdoor-shop-unterwegs-von-cyberattacke-betroffen.html
6. Unit 42ÖҸ棺ÐÂÐÍBlitz¶ñÒâÈí¼þ½èÓÎÏ·Îè±×¹¤¾ß´«²¼
6ÔÂ9ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾Palo Alto NetworksÆìÏÂUnit 42ÍŶӷ¢³öÖҸ棬³ÆÐÂÐÍWindows¶ñÒâÈí¼þBlitzÕýͨ¹ýº¬ºóÃŵÄÓÎÏ·Îè±×¹¤¾ß°ü´«²¼£¬¶ÔÓÎÏ·Îè±×Õß×é³ÉÍþв¡£¸Ã¶ñÒâÈí¼þ×îÔçÓÚ2024Äê±»·¢ÏÖ£¬²¢³ÖÐø¸üа汾½øÐй¥»÷¡£ÓëÕý¹æÓÎÏ·¸¨Öú¹¤¾ßBlitz.ggÎ޹أ¬Blitz¶ñÒâÈí¼þ¼Ù×°³ÉÓÎÏ·Îè±×¹¤¾ß£¬·ÖÁ½¸ö½×¶ÎÖ´Ðй¥»÷£ºÏÈͨ¹ýÏÂÔØÆ÷»ñÈ¡½©Ê¬·¨Ê½Ôغɣ¬Ê¹ºÚ¿Í»ñµÃÍÆËã»úÈ«ÃæÔ¶³Ì½ÚÔìȨ¡£ÍøÂç·¸×ï·Ö×ÓÀÄÓúϷ¨´úÂëÍÐ¹ÜÆ½Ì¨ÈçHugging Face SpacesÉ¢²¼ÐéαÎè±×¹¤¾ß£¬²¢Í¨¹ýTelegramµÈÉ罻ƽ̨´«²¼¡£Unit 42×êÑÐÈËÔ±Ö¸³ö£¬BlitzÄ»ºó°Ñ³ÖÕßÒÉËÆ¶íÓïʹÓÃÕߣ¬Í¨¹ýTelegramÇþ·ɢ²¼º¬ºóÃŵÄÓÎÏ·Îè±×¹¤¾ß×÷Ϊ³õÊ¼Ï°È¾ÔØÌå¡£¸Ã¶ñÒâÈí¼þÖÁÉÙÒÑ·¢ÆðÁ½²¨¹¥»÷£¬ÔçÆÚͨ¹ý·ÂðÕý¹æÈí¼þÆÆ½â×°Öðü´«²¼£¬ºóÆÚתΪÓÎÏ·Îè±×¹¤¾ß°ü£¬ÖØÒªÕë¶ÔÈȵãÊÖÓΡ¶Standoff 2¡·Íæ¼Ò¡£Óû§ÏÂÔØ²¢ÔËÐк¬ÐéαÎè±×¹¤¾ßµÄ.exeÎļþºó£¬BlitzÏÂÔØÆ÷½«ÔÚºó¶Ü¼¤»î£¬Í¨¹ý¼ÓÃܺͷ´É³ºÐ¼ì²â¶ã±Ü²éɱ£¬ÏνÓÔ¶³Ì·þÎñÆ÷»ñÈ¡Blitz½©Ê¬·¨Ê½¡£¸Ã½©Ê¬·¨Ê½¿ÉʵÏÖ¼üÅ̼ͼ¡¢ÆÁÄ»¼à¿Ø¡¢¼ÓÃÜÇ®±ÒÍÚ¿ó¡¢DDoS¹¥»÷¼°Ô¶³ÌºÅÁîÖ´ÐеÈÖ°ÄÜ¡£×êÑÐÈËÔ±ÌáÈ¡µÄ289¸öÒÑ×¢²á½©Ê¬Ö÷»úÏÔʾ£¬¶íÂÞ˹Óû§Õ¼±È×î¸ß¡£Unit 42°ä²¼Íþвµý±¨ºó£¬¶ñÒâÈí¼þÔËÓªÕß°ä²¼ÎÕ±ðÉêÃ÷²¢ÌṩľÂí¶Ï¸ù¹¤¾ß¡£ÍŶÓÇ¿ÁÒ½¨ÒéÓû§Ô¤·ÀÏÂÔØÆÆ½âÈí¼þ¼°ÓÎÏ·Îè±×¹¤¾ß£¬ÒÔÃâÃæ¶Ô³Á´ó°²È«·çÏÕ¡£
https://cybernews.com/security/blitz-malware-target-game-cheaters/


¾©¹«Íø°²±¸11010802024551ºÅ