µÂ¿ËÈøË¹ÖÝÓëÒÁÀûŵÒÁÖݵ±¾Ö»ú¹¹ÆØÊý¾Ýй¶

°ä²¼¹¦·ò 2025-06-10

1. µÂ¿ËÈøË¹ÖÝÓëÒÁÀûŵÒÁÖݵ±¾Ö»ú¹¹ÆØÊý¾Ýй¶


6ÔÂ10ÈÕ £¬½üÈÕ £¬µÂ¿ËÈøË¹ÖݺÍÒÁÀûŵÒÁÖÝÈ·µ±¾Ö»ú¹¹Ïà¼Ì°ä²¼Êý¾Ýй¶ÖÒ¸æ £¬ÊýǧÈËÃô¸ÐÐÅÏ¢ÊÜÓ°Ïì¡£µÂ¿ËÈøË¹Öݽ»Í¨²¿£¨TxDOT£©5ÔÂ12ÈÕÔâ·êºÚ¿ÍÈëÇÖ £¬Æä±äÂҼͼÐÅϢϵͳ£¨CRIS£©³öÏÖÒì³£»î¶¯ £¬±»µÁÕË»§±»ÓÃÓÚ½Ó¼ûºÍÏÂÔØ½ü30Íò·Ý±äÂһ㱨¡£ÕâЩ»ã±¨Ô̺¬ÐÕÃû¡¢µØÖ·¡¢¼ÝÕÕºÅÂë¡¢³µÉ̱êÂë¡¢Æû³µ±£ÏÕµ¥ºÅÂëÒÔ¼°±äÂÒÖÐÊÜÉËÇé¿öºÍ±äÂÒÐðÊöµÈÃô¸ÐÐÅÏ¢¡£Ö»¹Ü˾·¨Î´ÒªÇ󴫵ݸÃÊÂÎñ £¬µ«µÂ¿ËÈøË¹Öݾö¶¨Í¨¹ýÐź¯·î¸æÊÜÓ°ÏìÓ×ÎÒ¡£ÊÂÎñÆØ¹âºó £¬±»µÁÕË»§±»µ±¼´¹Ø¹Ø £¬Óйز¿ÃÅÔÚ³ÖÐøµ÷²é £¬½»Í¨²¿ÉÐδ¶ÔºÚ¿ÍÈëÇÖÊÂÎñ×÷³ö»ØÓ¦ £¬½öÈ·ÈÏÔÚµ÷²é¡£Í¬Ê± £¬·¢¸øÊܺ¦Õߵĺ¯¼þÌáÐÑËûÃǾ¯ÌèÓë´Óǰ±äÂÒÓйصĵç×ÓÓʼþ¡¢¶ÌÐÅ»òµç»° £¬²¢ÉèÁ¢ÁËÕ÷ѯÈÈÏßÒÔ½â´ðÒÉÄÑ¡£Óë´Ëͬʱ £¬ÒÁÀûŵÒÁÖÝÒ½ÁƱ£½¡ºÍ¼ÒÍ¥·þÎñ²¿£¨HFS£©Ò²»ã±¨ÁËһ·Êý¾Ýй¶ÊÂÎñ¡£2ÔÂ·Ý £¬Ò»ÃûºÚ¿Íͨ¹ýÓÕÆ­¼¿Á©³É¹¦»ñÈ¡ÁËHFSÒ»ÃûÔ±¹¤µÄÐÅÀµ £¬µ¼ÖÂ933È˵ÄÐÅÏ¢±»µÁ¡£ºÚ¿ÍÀûÓÃÁíÒ»¸ö±»ÈëÇÖÈ·µ±¾Öµç×ÓÓʼþÕË»§ÏòHFSÔ±¹¤·¢ËÍ¿´ËÆ¿ÉÐŵĵç×ÓÓʼþ £¬½ø¶øÐ¹Â¶ÁËHFSÔ±¹¤µÄµç×ÓÓʼþºÍÎļþ¡£±»µÁÐÅÏ¢Ô̺¬Éç»á°²È«ºÅÂë¡¢¼ÝÊ»ÅÆÕÕ¡¢ÖÝÉí·ÝÖ¤ÒÔ¼°Óë×ÓÅ®·öÑø·Ñ¡¢Ò½ÁƲ¹ÖúµÈÓйصIJÆÕþÐÅÏ¢¡£


https://therecord.media/car-crash-records-stolen-texas-transportation-department


2. É­ÈøËþ¿Æ¼¼ÔâÀÕË÷Èí¼þ¹¥»÷ºóÈ·ÈÏÊý¾Ýй¶


6ÔÂ9ÈÕ £¬É­ÈøËþ¿Æ¼¼£¨Sensata Technologies£©ÔÚµ÷²é4Ô·ÝÀÕË÷Èí¼þ¹¥»÷ÊÂÎñºó £¬ÏòÆäǰÈκÍÏÖÈÎÔ±¹¤·¢³öÊý¾Ýй¶ÖÒ¸æ¡£É­ÈøËþÊÇÒ»¼ÒרһÓڹؼü¹¤×÷´«¸ÐÆ÷¡¢½ÚÔìÆ÷ºÍµçÆø±£»¤ÏµÍ³µÄÈ«Çò¹¤Òµ¿Æ¼¼¹«Ë¾ £¬·þÎñÓÚÆû³µ¡¢º½¿Õº½Ìì¡¢¹ú·ÀµÈÐÐÒµ £¬ÄêÊÕÈ볬40ÒÚÃÀÔª¡£½ñÄê4Ô £¬¸Ã¹«Ë¾ÏòÃÀ¹ú֤ȯÂòÂôίԱ»áÌá½»8-KÎļþ £¬Åû¶4ÔÂ6ÈÕÔâ·êÀÕË÷Èí¼þ¹¥»÷²¢°éËæÊý¾Ý͵ÇÔ¡£Õâ´ÎÍøÂ簲ȫÊÂÎñÓ°ÏìÁËÆäº½ÔË¡¢Ôì×÷ºÍÆäËûÒµÎñÔËÓª¡£Ö»¹Ü³õ´ëÊ©²é֤ʵÁËÊý¾Ýй¶ £¬µ«Æäʱδȷ¶¨±»µÁÊý¾ÝºÍй¶ÁìÓò¡£ºóÐøµ÷²éÏÔʾ £¬ÀÕË÷Èí¼þ¹¥»÷ÕßÓÚ2025Äê3ÔÂ28ÈÕÈëÇÖÁËSensataµÄÍøÂç £¬Ö¤¾ÝÅú×¢ÔÚ2025Äê3ÔÂ28ÈÕÖÁ4ÔÂ6ÈÕÆÚ¼ä £¬ÍøÂç´æÔÚδ¾­ÊÚȨ»î¶¯ £¬Ò»Ãûδ¾­ÊÚȨÈËÔ±²é¿´²¢»ñÈ¡ÁËÍøÂçÖеÄÎļþ¡£¾­×ÐϸÉó²é £¬¸Ã¹«Ë¾ÓÚ5ÔÂ23ÈÕÈ·¶¨Îļþ¿ÉÄÜÔ̺¬ÊÜÓ°ÏìÈËÔ±µÄÐÅÏ¢ £¬Ô̺¬ÐÕÃû¡¢µØÖ·¡¢Éç»á°²È«ºÅÂë¡¢¼ÝÊ»ÅÆÕÕºÅÂë¡¢ÖÝÉí·ÝÖ¤ºÅÂë¡¢»¤ÕÕºÅÂë¡¢²ÆÕþÕË»§ÐÅÏ¢¡¢Ö§¸¶¿¨ÐÅÏ¢¡¢Ò½ÁÆÐÅÏ¢¡¢½¡È«±£ÏÕÐÅÏ¢¼°µ®ÉúÈÕÆÚµÈ¡£Õâ´ÎйÃÜÊÂÎñÓ°ÏìÁËSensataÏÖÈκÍǰÈÎÔ±¹¤¼°Æä¾ìÊô £¬ÇÒÿÓ×ÎÒй¶µÄÐÅÏ¢¸÷²»Ò»Ñù¡£¹«Ë¾ÔÚÐÅÖи½ÉÏÁ˲ÎÓëÒ»ÄêÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñµÄ×¢Ã÷¡£½ØÖÁĿǰ £¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£


https://www.bleepingcomputer.com/news/security/sensata-technologies-says-personal-data-stolen-by-ransomware-gang/


3. ±±ÃÀ×î´óʳƷÅú·¢ÉÌUNFIÔâ·êÍøÂç¹¥»÷


6ÔÂ9ÈÕ £¬±±ÃÀ×î´óÉÏÊÐÅú·¢·ÖÏúÉ̽áºÏÌìȻʳƷ¹«Ë¾£¨UNFI£©ÔÚ½üÆÚÔâ·êÍøÂç¹¥»÷ºó £¬±»ÆÈ¹Ø¹Ø²¿ÃÅϵͳ £¬Ó°Ïì¿Í»§¶©µ¥¡£UNFI×ܲ¿Î»ÓÚÂ޵µº £¬¾­Óª53¸öÅäËÍÖÐÐÄ £¬ÎªÃÀ¹úºÍ¼ÓÄôó30,000¶à¸öµØÖ·ÌṩÐÂÏʺÍÀä¶³²úÆ· £¬ÊÇÑÇÂíѷȫʳ³¬ÊеÄÖØÒª·ÖÏúÉÌ £¬2024Äê8ÔÂÄêÊÕÈë´ï310ÒÚÃÀÔª¡£6ÔÂ5ÈÕ £¬UNFI·¢ÏÖÍøÂç¹¥»÷ £¬Ñ¸¿ìÆô¶¯ÊÂÎñÏìÓ¦´òËã²¢Ö´ÐжôÔì´ëÊ© £¬Ô̺¬×Ô¶¯¹Ø¹Ø²¿ÃÅϵͳ £¬ÕâÁÙʱӰÏìÁËÆäÍÆ¹ãºÍ·Ö·¢¿Í»§¶©µ¥µÄÄÜÁ¦ £¬µ¼ÖÂÒµÎñÔËÓªÁÙʱÖжÏ¡£×Ô¾õÏÖÎ¥¹æÐÐΪÒÔÀ´ £¬UNFIÒÑ֪ͨÓйط¨Âɲ¿ÃÅ £¬²¢ÀñƸ±í²¿ÍøÂ簲ȫר¼Òµ÷²é´ËÊÂÎñ¡£Í¬Ê± £¬¹«Ë¾²ÉÈ¡´ëʩά³Ö¿Í»§·þÎñÂ½ÐøÐÔ £¬Ö´Ðбäͨ´ëʩֱµ½ÊÜÓ°Ïìϵͳ¸´Ô­¡£UNFIÔÚµÚÈý·½ÍøÂ簲ȫרҵÈËԱЭÖúÏ»ý¼«ÆÀ¹À¡¢»º½âºÍ²¹¾È¸ÃÊÂÎñ £¬²¢ÒÑ֪ͨ·¨Âɲ¿ÃÅ¡£¹«Ë¾ÉÐδй©Õâ´Î¹¥»÷µÄÐÔÖÊ £¬Ò²Î´È·ÈϹ¥»÷ÕßÊÇ·ñÇÔÈ¡Êý¾Ý £¬ÇÒÉÐÎÞÀÕË÷Èí¼þÔËÓª»ú¹¹Ðû³Æ¶ÔÕâ´ÎÊÂÎñÕÆ¹Ü¡£UNFI½²»°È˰µÊ¾ £¬¹«Ë¾ÔÚÆÀ¹Àδ¾­ÊÚȨµÄ»î¶¯ £¬²¢ÖÂÁ¦¸´Ô­ÏµÍ³ £¬¿Í»§¡¢¹©¸øÉ̺ͺÏ×÷ͬ°éÊÇÊ×Òª¹¤×÷¡£


https://www.bleepingcomputer.com/news/security/grocery-wholesale-giant-united-natural-foods-hit-by-cyberattack/


4. ³¬8.4ÍòRoundcubeÊ·ýÆØCVE-2025-49113·ì϶


6ÔÂ9ÈÕ £¬RoundcubeÍøÂçÓʼþϵͳ´æÔÚÒ»¸öÑϳÁµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©·ì϶CVE-2025-49113 £¬¸Ã·ì϶ӰÏìRoundcube 1.1.0ÖÁ1.6.10°æ±¾ £¬³ÖÐø¹¦·ò³¬¹ýÊ®Äê £¬Ö±ÖÁ2025Äê6ÔÂ1Èղŵõ½½¨²¹¡£²¹¶¡°ä²¼ºó²»¾Ã £¬ºÚ¿Í±ãÄæÏò¹¤³Ì¿ª·¢³ö¿ÉÓ÷ì϶ £¬²¢ÔÚµØÏÂÂÛ̳ÏúÊÛ¡£Ö»¹ÜÀûÓô˷ì϶ÐèÉí·ÝÑéÖ¤ £¬µ«¹¥»÷ÕßÐû³Æ¿Éͨ¹ýCSRF¡¢ÈÕ־ץȡ»ò±©Á¦ÆÆ½â»ñÈ¡ÓÐЧƾ֤¡£°²È«×êÑÐÔ±Kirill FirsovÔÚ²©¿ÍÉÏ·ÖÏíÁË·ì϶¼¼Êõϸ½Ú £¬ÒÔÔ®ÊÖ·ÀÓù¿ÉÄܵÄ×Ô¶¯ÀûÓÃ̰ͼ¡£Roundcube¿í·ºÀûÓÃÓÚ¹²ÏíÖ÷»ú¼°µ±¾Ö¡¢½ÌÓýºÍ¿Æ¼¼ÁìÓò £¬ÔÚÏ߿ɼûÊ·ý³¬120Íò¸ö¡£Íþв¼à¿ØÆ½Ì¨Shadowserver Foundation»ã±¨³Æ £¬½ØÖÁ2025Äê6ÔÂ8ÈÕ £¬ÓÐ84,925¸öRoundcubeÊ·ý´æÔÚ´Ë·ì϶ £¬ÖØÒªÉ¢²¼ÔÚÃÀ¹ú¡¢Ó¡¶È¡¢µÂ¹ú¡¢·¨¹ú¡¢¼ÓÄôóºÍÓ¢¹ú¡£Ë¼¿¼µ½±»ÀûÓõĸ߷çÏÕºÍÊý¾Ý±»µÁµÄ¿ÉÄÜÐÔ £¬ÕâЩÊ·ýµÄ¶³ö×é³É³Á´óÍøÂ簲ȫ·çÏÕ¡£½¨ÒéϵͳÖÎÀíÔ±¾¡¿ì¸üе½Òѽâ¾ö´ËÎÊÌâµÄ1.6.11ºÍ1.5.10°æ±¾¡£Ä¿Ç°Éв»Ã÷ÏԸ÷ì϶ÊÇ·ñÒѱ»ÏÖʵÀûÓü°¹æÄ£´óÓ× £¬µ«½¨Òéµ±¼´²ÉÈ¡Ðж¯ £¬ÈôÎÞ·¨Éý¼¶ £¬ÔòÓ¦Ï޶ȶÔÍøÂçÓʼþµÄ½Ó¼û £¬¹Ø¹ØÎļþÉÏ´« £¬Ôö³¤CSRF±£»¤ £¬×èÖ¹ÓзçÏÕµÄPHPÖ°ÄÜ £¬²¢¼à¿Ø·ì϶ָ±ê¡£


https://www.bleepingcomputer.com/news/security/over-84-000-roundcube-instances-vulnerable-to-actively-exploited-flaw/


5. UnterwegsÔâÍøÂç¹¥»÷µ¼Ö¿ͻ§Êý¾Ýй¶


6ÔÂ5ÈÕ £¬»§±íÓÃÆ·×¨¼ÒUnterwegs½üÈÕÖÒ¸æÆä¿Í»§²úÉúÊý¾Ýй¶ÊÂÎñ¡£¸Ã¹«Ë¾ÓÚÎåÔµ×Ôâ·êÍøÂç¹¥»÷ £¬¹¥»÷Õß¿ÉÄÜÒÑ»ñÈ¡¿Í»§Êý¾Ý¡£UnterwegsÔÚÖ¿ͻ§µÄ֪ͨÖаµÊ¾ £¬Æ¾¾Ýµ÷²éÁË¾Ö £¬ÎÞ·¨Åųý¿Í»§Êý¾Ý±»´Û¸ÄºÍ/»ò¸´ÔìµÄ¿ÉÄÜÐÔ¡£Õâ´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÔÚÏßÉ̵êºÍʵÌåµêµÄ¹Ë¿Í £¬UnterwegsÔڵ¹ú¸÷µØ¾­Óª×Å24¼ÒÃŵê¡£¿ÉÄÜÊÜÓ°ÏìµÄ¿Í»§Êý¾ÝÔ̺¬Íøµê×¢²áÓû§µÄÈ«Ãû¡¢ËÍ»õºÍÕ˵¥µØÖ·¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëÒÔ¼°µÇ¼ƾ֤ £¬µ«ÒøÐÐÐÅÏ¢²¢Î´Ð¹Â¶¡£ÎªÓ¦¶ÔÕâ´ÎÊý¾Ýй¶ £¬UnterwegsÒѲÉÈ¡ÁËһϵÁа²È«´ëÊ©¡£¸Ã¹«Ë¾ÒѳÁÖÃunterwegs.bizÍøµêµÄÃÜÂë £¬²¢ÖÒ¸æ³ÆÕâЩÊý¾Ý¿ÉÄܱ»ÓÃÓÚÍøÂç´¹µö¹¥»÷ºÍÆäËûÔÚÏßڲƭ»î¶¯¡£³öÓÚ°²È«Ë¼¿¼ £¬Unterwegs½¨ÒéËùÓÐÊÜÓ°ÏìµÄ¿Í»§¶ÔÒªÇóÌṩÓ×ÎÒÐÅÏ¢»òµÇ¼¾ßÌåÐÅÏ¢µÄµç×ÓÓʼþ»òÐÂÎÅά³ÖÉóÉ÷¡£Ä¿Ç° £¬¹ØÓÚÕâ´Î¹¥»÷µÄ¸ü¶àÐÅÏ¢ÉÐδ°ä²¼ £¬Ô̺¬¹¥»÷ÕßÊÇÈôºÎÈëÇÖÕâ¼Ò»§±íÉ̵êϵͳµÄ £¬ÒÔ¼°ÊÇ·ñÓкڿÍ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£Unterwegs°µÊ¾ £¬ËùÓÐÓйز¿ÃžùÒÑ»ñϤ´ËÊ £¬²¢ÔÚ²ÉÈ¡´ëʩӦ¶ÔDZÔڵݲȫ·çÏÕ¡£


https://www.csoonline.com/article/4002447/outdoor-shop-unterwegs-von-cyberattacke-betroffen.html


6. Unit 42ÖҸ棺ÐÂÐÍBlitz¶ñÒâÈí¼þ½èÓÎÏ·Îè±×¹¤¾ß´«²¼


6ÔÂ9ÈÕ £¬ÍøÂ簲ȫ¹«Ë¾Palo Alto NetworksÆìÏÂUnit 42ÍŶӷ¢³öÖÒ¸æ £¬³ÆÐÂÐÍWindows¶ñÒâÈí¼þBlitzÕýͨ¹ýº¬ºóÃŵÄÓÎÏ·Îè±×¹¤¾ß°ü´«²¼ £¬¶ÔÓÎÏ·Îè±×Õß×é³ÉÍþв¡£¸Ã¶ñÒâÈí¼þ×îÔçÓÚ2024Äê±»·¢ÏÖ £¬²¢³ÖÐø¸üа汾½øÐй¥»÷¡£ÓëÕý¹æÓÎÏ·¸¨Öú¹¤¾ßBlitz.ggÎÞ¹Ø £¬Blitz¶ñÒâÈí¼þ¼Ù×°³ÉÓÎÏ·Îè±×¹¤¾ß £¬·ÖÁ½¸ö½×¶ÎÖ´Ðй¥»÷£ºÏÈͨ¹ýÏÂÔØÆ÷»ñÈ¡½©Ê¬·¨Ê½ÔØºÉ £¬Ê¹ºÚ¿Í»ñµÃÍÆËã»úÈ«ÃæÔ¶³Ì½ÚÔìȨ¡£ÍøÂç·¸×ï·Ö×ÓÀÄÓúϷ¨´úÂëÍÐ¹ÜÆ½Ì¨ÈçHugging Face SpacesÉ¢²¼ÐéαÎè±×¹¤¾ß £¬²¢Í¨¹ýTelegramµÈÉ罻ƽ̨´«²¼¡£Unit 42×êÑÐÈËÔ±Ö¸³ö £¬BlitzÄ»ºó°Ñ³ÖÕßÒÉËÆ¶íÓïʹÓÃÕß £¬Í¨¹ýTelegramÇþ·ɢ²¼º¬ºóÃŵÄÓÎÏ·Îè±×¹¤¾ß×÷Ϊ³õÊ¼Ï°È¾ÔØÌå¡£¸Ã¶ñÒâÈí¼þÖÁÉÙÒÑ·¢ÆðÁ½²¨¹¥»÷ £¬ÔçÆÚͨ¹ý·ÂðÕý¹æÈí¼þÆÆ½â×°Öðü´«²¼ £¬ºóÆÚתΪÓÎÏ·Îè±×¹¤¾ß°ü £¬ÖØÒªÕë¶ÔÈȵãÊÖÓΡ¶Standoff 2¡·Íæ¼Ò¡£Óû§ÏÂÔØ²¢ÔËÐк¬ÐéαÎè±×¹¤¾ßµÄ.exeÎļþºó £¬BlitzÏÂÔØÆ÷½«ÔÚºó¶Ü¼¤»î £¬Í¨¹ý¼ÓÃܺͷ´É³ºÐ¼ì²â¶ã±Ü²éɱ £¬ÏνÓÔ¶³Ì·þÎñÆ÷»ñÈ¡Blitz½©Ê¬·¨Ê½¡£¸Ã½©Ê¬·¨Ê½¿ÉʵÏÖ¼üÅ̼ͼ¡¢ÆÁÄ»¼à¿Ø¡¢¼ÓÃÜÇ®±ÒÍÚ¿ó¡¢DDoS¹¥»÷¼°Ô¶³ÌºÅÁîÖ´ÐеÈÖ°ÄÜ¡£×êÑÐÈËÔ±ÌáÈ¡µÄ289¸öÒÑ×¢²á½©Ê¬Ö÷»úÏÔʾ £¬¶íÂÞ˹Óû§Õ¼±È×î¸ß¡£Unit 42°ä²¼Íþвµý±¨ºó £¬¶ñÒâÈí¼þÔËÓªÕß°ä²¼ÎÕ±ðÉêÃ÷²¢ÌṩľÂí¶Ï¸ù¹¤¾ß¡£ÍŶÓÇ¿ÁÒ½¨ÒéÓû§Ô¤·ÀÏÂÔØÆÆ½âÈí¼þ¼°ÓÎÏ·Îè±×¹¤¾ß £¬ÒÔÃâÃæ¶Ô³Á´ó°²È«·çÏÕ¡£


https://cybernews.com/security/blitz-malware-target-game-cheaters/