˹¿°ÄáÑÇÆóÒµ±£ÏÕ²¿ÃÅÒÉÔâÈëÇÖ£¬3.4Íò·ÝÎļþ±»µÁ
°ä²¼¹¦·ò 2025-06-181. ˹¿°ÄáÑÇÆóÒµ±£ÏÕ²¿ÃÅÒÉÔâÈëÇÖ£¬3.4Íò·ÝÎļþ±»µÁ
6ÔÂ16ÈÕ£¬ÈðµäÖØÒªÉÌÓóµÔì×÷ÉÌ˹¿°ÄáÑÇÒÉËÆÔâ·êÊý¾Ýй¶ÊÂÎñ¡£¹¥»÷ÕßÔÚÒ»¸öÈȵ㡰½öÏÞÔ¼Ç롱µÄºÚ¿ÍÂÛ̳Éϰ䷢ÈëÇÖÁË˹¿°ÄáÑÇµÄÆóÒµ±£ÏÕ²¿ÃÅ£¬²¢Ðû³ÆÇÔÈ¡ÁË3.4Íò·Ý´Ëǰ´Óδ¹«¿ª¹ýµÄÎļþ¡£½ØÖÁĿǰ£¬ÕâЩÎļþÔ̺¬µÄ¾ßÌåÐÅÏ¢Éв»Ã÷È·¡£²»Í⣬¼øÓÚ˹¿°ÄáÑǹ«Ë¾±£ÏÕº¸ÇÉÌÓóµÁ¾£¬Â¶³öµÄÎļþ¼«ÓпÉÄÜÉæ¼°¿Í»§ÐÅÏ¢£¬Èç¿Í»§Éí·ÝÒÔ¼°ËûÃÇËùÕ¼ÓеijµÁ¾ÐÅÏ¢£¨Í¨¹ý³µÁ¾¼ø±ðºÅÂëVIN£©¡£Ä¿Ç°£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡Êý¾ÝµÄ˹¿°ÄáÑÇÍøÕ¾ÒÑÎÞ·¨½Ó¼û£¬·Ã¿ÍÖ»ÄÜ¿´µ½ÏµÍ³ÊØ»¤ÏÂÏßµÄÐÂÎÅ£¬µ«Éв»Ã÷ÏÔÕâ´ÎÊØ»¤ÊÇ·ñÓëºÚ¿Í¹¥»÷Óйء£Ë¹¿°ÄáÑÇ×÷Ϊ´óÐÍÉÌÓóµÔì×÷ÉÌ£¬ÔÚÅ·ÖÞÉÌÓóµÊг¡Õ¼¾Ý½ü19%µÄ·Ý¶î£¬Õ¼ÓÐ5.9ÍòÃûÔ±¹¤£¬2024ÄêÓªÊÕÔ¤¼Æ³¬220ÒÚÃÀÔª¡£¹¥»÷Õß³£½«Æû³µÔì×÷ÉÌ×÷Ϊָ±ê£¬ÔÒòÔÚÓÚ´óÐÍ¿ç¹ú¹«Ë¾°ÑÎÕ×Å´óÁ¿Ãô¸ÐµÄ¹«Ë¾ºÍ¿Í»§Êý¾Ý£¬ÇÒÔÚÔâ·êÀÕË÷ʱ¾ß±¸Ö§¸¶Êê½ðµÄÄÜÁ¦¡£´Ëǰ£¬±¾ÔÂÔçЩʱ³½¹¥»÷Õß¾ÍÔøÐû³ÆÈëÇÖÁ˵¹úÆû³µ¾ÞÍ·¹«¹²Æû³µ¼¯ÍÅ¡£
https://cybernews.com/security/scania-insurance-data-breach-hackers/
2. °®¶ûÀ¼ÑÛ¿Æ»¤Àí¹«Ë¾OcucoÊý¾Ýй¶ӰÏì24ÍòÈË
6ÔÂ16ÈÕ£¬×ܲ¿Î»ÓÚ°®¶ûÀ¼µÄÑÛ¿Æ»¤Àí¼¼Êõ¹«Ë¾OcucoÏòÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿£¨HHS£©´«µÝÁËһ·Êý¾Ýй¶ÊÂÎñ£¬Õâ´ÎÊÂÎñÓ°Ï쳬¹ý24ÍòÈË¡£Ocuco×Ô³ÆÊÇÈ«Çò×î´óµÄÑÛ¾µÁãÊÛÈí¼þÆóÒµ£¬ÆäÈí¼þ·þÎñ¿í·º¸²¸Ç77¸ö¹ú¶È/µØÓòµÄ6000¸ö·þÎñµã¡£Ö»¹ÜOcucoÉÐδ¹«¿ª°ä²¼ÊÂÎñ¹«¸æ£¬µ«¸÷ÖÖ¼£ÏóÅú×¢£¬¸ÃÊÂÎñºÜ¿ÉÄÜÓëÀÕË÷×éÖ¯KillSecµÄºÚ¿Í¹¥»÷Óйء£½ñÄêÔçЩʱ³½£¬KillSecÐû³Æ´ÓOcucoÇÔÈ¡ÁË´óÁ¿Îļþ£¬4Ô³õ£¬¸Ã×éÖ¯ÔÚÆä»ùÓÚTorµÄÐ¹Â¶ÍøÕ¾Éϰ䲼ÁËOcucoµÄÐÅÏ¢£¬²¢°ä²¼Á˶àÕŽØÍ¼×÷Ϊ¹¥»÷ÐÐΪµÄ×ôÖ¤¡£ÆäÖÐÒ»ÕŽØÍ¼ÏÔʾ£¬ºÚ¿ÍÖÁÉÙÇÔÈ¡ÁË67Íò·ÝÎļþ£¬×ܼÆ340GBÊý¾Ý¡£¹ÌÈ»ºÚ¿ÍÍøÕ¾Ðû³Æ±»µÁÊý¾ÝÒѹ«¿ª£¬µ«½ØÖÁ·¢¸åʱ£¬OcucoµÄÊý¾ÝÉÐδ³Ê´Ë¿ÌKillSecÍøÕ¾µÄ¿ÉÏÂÔØÁбíÖС£
https://www.securityweek.com/240000-impacted-by-data-breach-at-eyecare-tech-firm-ocuco/
3. ¡°ÂÓʳÂéȸ¡±¹¥»÷ÒÁÀÊÈüÅÁÒøÐУ¬Í¹ÏÔÒÔÒÁì¶ÜÖÐÍøÂçÕ½Éý¼¶
6ÔÂ17ÈÕ£¬ÒÁÀʹúÓÐÒøÐÐÈüÅÁÒøÐУ¨Bank Sepah£©ÍøÕ¾ÒòÔâºÚ¿Í×éÖ¯¡°ÂÓʳÂéȸ¡±£¨Predatory Sparrow£¬²¨Ë¹ÓïΪ¡°Gonjeshke Darande¡±£©¹¥»÷¶øÏÂÏß¡£¸Ã×éÖ¯ÖܶþÁ賿ÔÚÉ罻ýÌåÐû³Æ¡°·ÛËéÁËÒÁÀʸïÃüÎÀ¶ÓÈüÅÁÒøÐеÄÊý¾Ý¡±¡£¾ÝÒÁÀÊýÌ屨·£¬ÈüÅÁÒøÐзÖÐйعأ¬¿Í»§ÎÞ·¨½Ó¼ûÕË»§£¬Ö§¸¶´¦ÖÃÖжϣ¬ÒÁÀÊ·¨¶û˹ͨѶÉçҲ֤ʵÆä»ù´¡ÉèÊ©Ôâ·êÍøÂç¹¥»÷Ö·þÎñÖжϡ£Õâ´ÎÕë¶ÔÒÁÀÊ×î´ó½ðÈÚ»ú¹¹Ö®Ò»µÄÏ®»÷£¬Í¹ÏÔÍøÂçÕ½ÔÚÒÔÉ«ÁкÍÒÁÀʲ»ÐÝÉý¼¶µÄì¶ÜÖÐ×÷ÓÃÓú·¢³ÁÒª£¬ÇÒ¶ÔÒÁÀʹؼü»ù´¡ÉèÊ©²úÉúÖ±½ÓÓ°Ïì¡£¡°ÂÓʳÂéȸ¡±×éÖ¯³Æ¹¥»÷ÈüÅÁÒøÐУ¬ÒòÆä¡°¶ã±Ü¹ú¼ÊÔì²Ã£¬ÓÃÒÁÀÊÈËÃñµÄÇ®ÔÞÖúÕþȨµÄ¿Ö²ÀÖ÷Òå´úÀíÈË¡¢µ¯Â·µ¼µ¯´òËãºÍ¾üʺ˴òË㡱¡£¸Ã×éÖ¯´Ëǰ»¹Ðû³Æ¶ÔÒÁÀʸÖÌú³§¡¢ÌúÂ·ÍøÂç¼°¼ÓÓÍÕ¾Ö§¸¶ÏµÍ³·¢Æð¹¥»÷£¬ÆäÔ¼®¹ú²»Ã÷£¬µ«Ò»Ö¹Øë¶ÔÒÁÀÊÕþȨ²¢Ö§³ÖÒÔÉ«ÁÐÔÚÒÁÖ¸±ê¡£
https://cyberscoop.com/iran-bank-sepah-cyberattack/
4. Cock.liÈ·ÈÏÊý¾Ýй¶£¬³¬°ÙÍòÓû§ÐÅÏ¢ÔâÇÔ
6ÔÂ17ÈÕ£¬µç×ÓÓʼþÍйÜÌṩÉÌCock.liÈ·ÈÏÔâ·êÊý¾Ýй¶ÊÂÎñ¡£ÍþвÐÐΪÕßÀûÓÃÆäÒÑÍËÒÛµÄRoundcubeÍøÂçÓʼþƽ̨·ì϶£¬ÇÔÈ¡Á˳¬¹ýÒ»°ÙÍò¸öÓû§¼Í¼¡£Õâ´Îй¶¶³öÁË×Ô2016ÄêÒÔÀ´µÇ¼¸ÃÓʼþ·þÎñµÄËùÓÐЧ»§£¨Ô¼1,023,800ÈË£©µÄÐÅÏ¢£¬ÒÔ¼°Áí±í93,000ÃûÓû§µÄÁªÏµÈËÌõ¿î¡£ÉÏÖÜÍíЩʱ³½£¬Cock.li·þÎñÖжϵ«Î´¹«¿ªÚ¹ÊÍ£¬ËæºóÍþвÐÐΪÕßÐû³ÆÒªÏúÊÛÔ̺¬Ãô¸ÐÓû§ÐÅÏ¢µÄÊý¾Ý¿â¡£Cock.li×òÌì°ä·¢ÉêÃ÷֤ʵÁËÕâ´ÎйÃÜÊÂÎñ¼°ÍþвÐÐΪÕßÖ¸¿ØµÄÓÐЧÐÔ£¬È·ÈÏÁË1,023,800¸öÓû§ÕÊ»§µÄµç×ÓÓʼþ¡¢µÇ¼¹¦·ò´ÁµÈÐÅÏ¢Òѱ»Ð¹Â¶£¬µ«Óû§ÕÊ»§ÃÜÂë¡¢µç×ÓÓʼþÄÚÈݺÍIPµØÖ·²¢Î´Ð¹Â¶¡£Í¬Ê±£¬µÚÈý·½ÁªÏµÐÅÏ¢±»Ð¹Â¶µÄ10,400ÃûÕË»§³ÖÓÐÈ˽«ÊÕµ½µ¥¶À֪ͨ£¬½¨Òé×Ô2016ÄêÒÔÀ´Ê¹Óø÷þÎñµÄËùÓÐÈ˳ÁÖÃÃÜÂë¡£Cock.liÒÔΪÊý¾ÝÊÇÀûÓþɵÄRoundCube SQL×¢Èë·ì϶ÇÔÈ¡µÄ£¬¶øÕâ´Îй¶ÊÂÎñ²úÉúÖ®¼Ê£¬ËûÃǸշÖÎöÁËRoundcubeÖеÄÒ»¸öRCE·ì϶²¢ÒÔΪ¸Ã·ì϶ÔÚ¹¥»÷Öб»»ý¼«ÀûÓ㬴ÙʹCock.liÓÚ2025Äê6Ô½«¸ÃÈí¼þ´ÓÆäƽ̨ÉÏÒÆ³ý£¬²¢°µÊ¾½«²»ÔÙÌṩRoundcubeÍøÂçÓʼþ¡£
https://www.bleepingcomputer.com/news/security/hacker-steals-1-million-cockli-user-records-in-webmail-data-breach/
5. ºÚ¿ÍÀûÓÃLangflowÑϳÁ·ì϶¿ªÊÍFlodrix½©Ê¬ÍøÂç
6ÔÂ17ÈÕ£¬¹¥»÷ÕßÕý»ý¼«ÀûÓûùÓÚPythonµÄWebÀûÓ÷¨Ê½LangflowÖеÄÒ»¸öÑϳÁȱµã£¨CVE-2025-3248£©·¢Æð¹¥»÷£¬¸Ãȱµã´æÔÚÓÚLangflow 1.3.0֮ǰµÄ°æ±¾ÖС£LangflowÊÇ´úÀíAIÁìÓò¿í·ºÑ¡È¡µÄ¹¤¾ß£¬ÔÊÐíÓû§¹¹½¨AIÇý¶¯µÄ´úÀíºÍ¹¤×÷Á÷£¬¶ø´Ë·ì϶ÊÇÒ»¸öÒ×ÓÚÀûÓõÄÉí·ÝÑéÖ¤·ì϶£¬´æÔÚÓÚÆ½Ì¨µÄ´úÂëÑéÖ¤»úÔìÖУ¬ÔÊÐíÔ¶³Ì¹¥»÷Õ߯ëÈ«ÊÕÊÜLangflow·þÎñÆ÷¡£Ç÷Ïò¿Æ¼¼×êÑÐÈËÔ±·¢ÏÖ£¬¹¥»÷Õßͨ¹ýÏò/api/v1/validate/code¶Ëµã·¢ËͶñÒâPOSTÒªÇóÀ´ÀûÓô˷ì϶£¬ÔÚÊÜϰȾµÄ·þÎñÆ÷ÉÏÖ´ÐÐÏÂÔØÆ÷¾ç±¾£¬ÒÔ»ñÈ¡²¢×°ÖÃFlodrix¶ñÒâÈí¼þ£¬½ø¶ø¿ªÊÍ׳´óµÄ½©Ê¬ÍøÂ磬¿ÉÄܵ¼ÖÂϵͳ±»ÈëÇÖ¡¢DDoS¹¥»÷£¬ÒÔ¼°Ãô¸ÐÐÅÏ¢ÃÔʧ»òй¶¡£¼øÓÚLangflowÔÚGitHubÉÏÕ¼Óг¬¹ý7Íò¿ÅÐÇ£¬Åú×¢ÆäÊÜ¿ª·¢ÕßÈϿɶȸߣ¬ÇÒÔÚÖÇÄÜ×Ô¶¯»¯ÔÐÍÉè¼ÆºÍ²¿Êð·½Ãæ²ûÑï³ÁÒª×÷Óã¬Ò×Êܹ¥»÷µÄLangflow·þÎñÆ÷¶Ô¹¥»÷Õß¶øÑÔÊÇ¡°¼«¾ßÎüÒýÁ¦µÄÖ¸±ê¡±¡£
https://www.darkreading.com/vulnerabilities-threats/hackers-exploit-langflow-flaw-flodrix-botnet
6. CISA¾¯Ê¾TP-LinkÈÈõè¾¶ÓÉÆ÷·ì϶Õý±»»ý¼«ÀûÓÃ
6ÔÂ17ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©¸üÐÂÒÑÖª±»ÀûÓ÷ì϶Ŀ¼£¬½«TP-LinkºÅÁî×¢Èë·ì϶CVE-2023-33538ÄÉÈëÆäÖС£¸Ã·ì϶Á½ÄêǰËäÒѱ»·¢ÏÖ£¬µ«½üÆÚ±»ÍøÂç·¸×ï·Ö×Ó»ý¼«ÀûÓã¬ÆÀ·Ö¸ß´ï8.8·Ö£¬ÔÊÐí¹¥»÷ÕßÔÚδ¾ÊÚȨµÄÇé¿öÏÂÔÚ·ÓÉÆ÷ÉÏÖ´ÐкÅÁ×é³É³Á´ó·çÏÕ¡£ÊÜÓ°ÏìµÄTP-Link·ÓÉÆ÷ÐͺÅÔ̺¬TL-WR940N V2/V4¡¢TL-WR841N V8/V10ÒÔ¼°TL-WR740N V1/V2µÈ£¬ÕâЩ·ÓÉÆ÷ÔÚÏû·ÑÊг¡ÉϹãÊÜÓ½Ó£¬²¿ÃÅÐͺÅÔÚÑÇÂíÑ·ÉÏÓµº±¼ûÍòÌõÆÀÂÛ¡£È»¶ø£¬ÕâЩÊÜÓ°ÏìµÄÓ²¼þ°æ±¾ÒѴﵽʹÓÃÊÙÃü£¬²»Ôٽӹܰ²È«¸üУ¬ÇÒ×îй̼þ°æ±¾°ä²¼¹¦·ò³¤Ô¶£¬ÈçTL-WR940N V2/V4µÄ×îй̼þ°æ±¾ÓÚ2016Äê°ä²¼£¬TL-WR841N V8/V10µÄ×îºóÒ»´Î¹Ì¼þ¸üÐÂÔòÊÇÔÚ2015Äê¡£CISAÖÒ¸æ³Æ£¬ÕâЩ·ÓÉÆ÷´æÔÚÑϳÁ°²È«Òþ»¼£¬Óû§Ó¦ÖÕ³¡Ê¹Ó᣸÷ì϶´æÔÚÓÚ·ÓÉÆ÷µÄWebÖÎÀí½çÃæÖУ¬ÒòÎÞ·¨ÕýÈ·ÑéÖ¤Óû§ÊäÈ룬ºÚ¿ÍµÃÒÔ×¢Èë¶ñÒâºÅÁî¡£¹ÌȻӵÓÐÔ¶³Ì½Ó¼ûÖ°ÄܵĹ«¿ªÂ·ÓÉÆ÷ÉÏ´ËÀàȱµã×îΪΣÏÕ£¬µ«¹¥»÷ÕßÒ²¿É´Óͳһ±¾µØÍøÂçÄÚÀûÓá£Îª´Ë£¬CISAÒªÇóÁª¹ú»ú¹¹ÔÚ2025Äê7ÔÂ7ÈÕÇ°ÒÆ³ýÕâЩ·ÓÉÆ÷£¬²¢¶½´ÙËùÓÐ×é֯Ч·Â£¬ÒÔÈ·±£ÍøÂ簲ȫ¡£
https://cybernews.com/security/hackers-exploit-older-tp-link-routers-cisa-warns/


¾©¹«Íø°²±¸11010802024551ºÅ