¹È¸è½¨¸´ÁËChromeÖб»»ý¼«ÀûÓõÄɳºÐÌÓÒÝÁãÈÕ·ì϶
°ä²¼¹¦·ò 2025-07-181. ¹È¸è½¨¸´ÁËChromeÖб»»ý¼«ÀûÓõÄɳºÐÌÓÒÝÁãÈÕ·ì϶
7ÔÂ16ÈÕ£¬¹È¸è½üÈÕ°ä²¼Chromeä¯ÀÀÆ÷°²È«¸üУ¬´¹Î£½¨¸´Áù¸ö°²È«·ì϶£¬ÆäÖбàºÅΪCVE-2025-6558µÄ¸ßΣ·ì϶Òѱ»¹¥»÷ÕßÀûÓã¬ÊµÏÖɳºÐÌÓÒÝ¡£¸Ã·ì϶ÑϳÁµÈ¼¶´ï8.8·Ö£¬Ó°Ïì138.0.7204.157֮ǰ°æ±¾µÄChrome£¬¹È¸èÍþв·ÖÎöÓ××飨TAG£©ÓÚ6ÔÂ23ÈÕ·¢ÏÖºóѸ¿ìÍÆ³ö²¹¶¡£¬½¨ÒéÓû§µ±¼´Éý¼¶ÖÁ138.0.7204.157/158°æ±¾¡£CVE-2025-6558µÄÖ÷ÌâÎÊÌâÔÚÓÚChromeµÄͼÐÎÒýÇæ×é¼þANGLE¶Ô²»ÊÜÐÅÀµÊäÈëµÄÑéÖ¤²»¼°¡£ANGLE×÷Ϊ¿ªÔ´Í¼ÐγéÏó²ã£¬Õƹܽ«OpenGL ESŲÓÃת»»ÎªÆäËûͼÐÎAPI£¨ÈçDirect3D¡¢Vulkan£©£¬µ«ÆäÔÚ´¦ÖÃWebGLÍøÕ¾µÈÆðÔ´µÄGPUºÅÁîʱ´æÔÚȱµã£¬ÔÊÐí¹¥»÷Õßͨ¹ýÌØÔìHTMLÒ³ÃæÔÚGPU¹ý³ÌÖÐÖ´ÐÐËÁÒâ´úÂ룬²¢×îÖÕÍ»ÆÆä¯ÀÀÆ÷ɳºÐÏÞ¶È¡£É³ºÐ»úÔì±¾ÊÇChromeµÄÖ÷Ìⰲȫ·À»¤£¬ÓÃÓÚ¸ôÀëä¯ÀÀÆ÷¹ý³ÌÓë²Ù×÷ϵͳ£¬Ô¤·À¶ñÒâÈí¼þÀ©É¢ÖÁÉ豸ÆäËû²¿ÃÅ¡£Õâ´Î·ì϶µÄÍ»ÆÆ£¬¿ÉÄÜʹ¹¥»÷ÕßÖ±½Ó½ÚÔìÓû§É豸£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý»ò²¿Êð¶ñÒâÈí¼þ¡£
https://www.bleepingcomputer.com/news/security/google-fixes-actively-exploited-sandbox-escape-zero-day-in-chrome/
2. ¸ñÀµÂÄáÊÕÑø»ú¹¹Êý¾Ýй¶£¬110Íò±Ê¼Í¼±»ÆØ¹â
7ÔÂ17ÈÕ£¬ÍøÂ簲ȫ×êÑÐÔ±Jeremiah FowlerÔÚÍøÂçɨÃèÖз¢ÏÖ£¬ÃÀ¹ú¸ñÀµÂÄáÊÕÑøÖÐÐÄÓйصĴóÁ¿Î´Êܱ£»¤Êý¾ÝÔÚÏß¶³ö£¬Òý·¢ÑϳÁÒþÖÔΣ»ú¡£Õâ´Îй¶µÄÊý¾Ý¿âÈÝÁ¿´ï2.49GB£¬Ô̺¬³¬¹ý110ÍòÌõÃô¸Ð¼Í¼£¬Éæ¼°¶ùͯ¡¢Ñø¸¸Ä¸¡¢Ç×Éú¼ÒÍ¥¼°»ú¹¹Ô±¹¤£¬º¸ÇÐÕÃû¡¢ÁªÏµ·½Ê½¡¢²¡Àý¼Í¼¡¢¸öÈËÆÀ¹ÀµÈ¸ß¶ÈÒþÖÔÐÅÏ¢¡£ÕâЩÊý¾ÝδÉèÖÃÃÜÂë»ò¼ÓÃܱ£»¤£¬Èκξ߱¸»ù´¡ÍøÂç֪ʶµÄÓû§¾ù¿Éͨ¹ý¶³öµÄÔÆ·þÎñÆ÷Ö±½Ó½Ó¼û£¬ÓÈÆäÒ×±»ÍøÂç·¸×ï·Ö×ÓÀûÓá£Fowler·¢ÏÖÊý¾Ýºóµ±¼´ÏòÓйØ×éÖ¯ÌáÒéÕÆ¹ÜÈÎÅû¶£¬´ÎÈÕÊý¾ÝËä±»´¹Î£ÏÂÏߣ¬µ«Â¶³öʱ³¤¼°ÊÇ·ñÔâ¶ñÒâ½Ó¼ûÈÔ´æÒÉ¡£Ð¹Â¶¼Í¼Դ×Ըûú¹¹ÓÃÓÚÖÎÀí°¸ÀýÓ빵ͨµÄCRMƽ̨£¬Îļþ¼Ð±ê×¢"ÁªÏµÈË""ÉêÇë""Ç×Éú¸¸Ç×"µÈ£¬¾ßÌå¼Í¼ÉêÇëÈ˼ÒÍ¥²¼¾°¡¢±»¾ÜÊÕÑøÔÒò¡¢Ò©ÎïÀÄÓûò˾·¨ÎÊÌâµÈϸ½Ú¡£Ö»¹ÜδÔ̺¬ÆëÈ«°¸¼þµµ°¸£¬µ«µ¥±Ê¼Í¼ÒÑÔ̺¬×ã¹»ÐÅÏ¢£¬×ãÒÔ³ÉΪÉç»á¹¤³Ì¹¥»÷»òڿƵÄÖ¸±ê¡£ÓÈΪÃô¸ÐµÄÊÇ28.4ÍòÌõµç×ÓÓʼþÔªÊý¾Ý£¬ËäÎ´ÆØ¹âÆëÈ«ÓʼþÕýÎÄ£¬µ«Ö÷ÌâÐпÉÄÜй¶ÐÕÃû»ò²Î¿¼ÐÅÏ¢£¬Èô½áºÏ»ú¹¹ÓëÒ½ÁÆ¡¢Éç»á·þÎñ»ú¹¹µÄ¹ØÁª¼Í¼£¬ÒþÖÔ·çÏÕ½«½øÒ»²½À©´ó¡£¼¼Êõ·ÖÎöÏÔʾ£¬¸ÃÊý¾Ý¿âÓÉ´¿Îı¾ÓëͨÓÃΨһ±êʶ·û£¨UUID£©×é³É£¬ËäUUID¿´ËƸ´ÔÓ£¬µ«²»×ã¼ÓÃܱ£»¤£¬ÎÞ·¨×èֹδ¾ÊÚȨ½Ó¼û¡£
https://hackread.com/massive-data-leak-texas-adoption-agency-million-records/
3. ÎÚ¿ËÀ¼·¢ÏÖAPT28ÀûÓÃLLMµÄÐÂÐͶñÒâÈí¼þLameHug
7ÔÂ17ÈÕ£¬ÎÚ¿ËÀ¼¹ú¶ÈÍøÂçÊÂÎñÏìÓ¦Ó××飨CERT-UA£©½üÈÕÅû¶ÁËÒ»ÖÖÃûΪLameHugµÄÐÂÐͶñÒâÈí¼þ£¬ÆäÍ»ÆÆÐÔÌØµãÔÚÓÚ³õ´Î¹«¿ª¼Í¼ÁËÀûÓôóÐÍ˵»°Ä£ÐÍ£¨LLM£©¶¯Ì¬ÌìÉú¹¥»÷ºÅÁîµÄ¹¥»÷ģʽ£¬²¢½«¹¥»÷¹éÒòÓÚ¶íÂÞ˹¹ú¶ÈÖ§³ÖµÄAPT28£¨Fancy Bear£©×éÖ¯¡£¸Ã¶ñÒâÈí¼þÓÉPython±àд£¬Í¨¹ýHugging Face APIÓë°¢ÀïÔÆ¿ªÔ´µÄQwen 2.5-Coder-32B-InstructÄ£Ðͽ»»¥¡£LameHugµÄ¹¥»÷Á´ÌõʼÓÚ¶ñÒâµç×ÓÓʼþ£º¹¥»÷Õß¼ÙÒâµ±¾Ö¹ÙÔ±£¬Ïòµ±¾ÖÐÐÕþ»ú¹¹·¢ËÍÔ̺¬ZIP¸½¼þµÄ´¹µöÓʼþ£¬¸½¼þÄÚǶLameHug¼ÓÔØ·¨Ê½¡£Ò»µ©Ö´ÐУ¬¶ñÒâÈí¼þ»áͨ¹ýLLM¶¯Ì¬ÌìÉúϵͳ¿úËÅÓëÊý¾ÝÇÔÈ¡ºÅÁ¾ßÌå²Ù×÷Ô̺¬£ºÍøÂçϵͳÐÅÏ¢²¢±£ÁôÖÁ¡°info.txt¡±Îļþ£»µÝ¹éËÑË÷¡°Îĵµ¡±¡°×ÀÃæ¡±¡°ÏÂÔØ¡±µÈ¹Ø¼üWindowsĿ¼ÖеÄÎĵµ£»×îÖÕͨ¹ýSFTP»òHTTP POSTÒªÇó½«Êý¾ÝÇÔÈ¡ÖÁ¹¥»÷Õß½ÚÔìµÄ·þÎñÆ÷¡£¼¼Êõ²ãÃæ£¬LameHugµÄ´´ÐÂÐÔÌå´Ë¿ÌÁ½·½Ã棺ÆäÒ»£¬ËüÊÇÊ׸ö¹«¿ª¼Í¼µÄÀûÓÃLLMÖ§³Ö¹¥»÷Õß¹¤×÷µÄ¶ñÒâÈí¼þ£¬Ê¹ÍþвÐÐΪÕßÄÜÔÚ¹¥»÷¹ý³ÌÖÐʵʱµ÷ÕûÕ½Êõ£¬ÎÞÐ貿ÊðÐÂÓÐÐ§ÔØºÉ£»Æä¶þ£¬Í¨¹ýHugging Face»ù´¡ÉèÊ©½øÐÐÖ¸»Ó½ÚÔ죨C2£©Í¨Ñ¶£¬½µµÍÁË´«Í³C2·þÎñÆ÷µÄ¶³ö·çÏÕ£¬µ¢¸éÁËÈëÇÖÒñ±ÎÆÚ¡£´Ë±í£¬¶¯Ì¬ÌìÉúµÄºÅÁî¿É¶ã±Ü»ùÓÚ¾²Ì¬Ìصã¼ì²âµÄ°²È«Èí¼þ£¬Ôö³¤ÁË·ÀÓùÄѶȡ£
https://www.bleepingcomputer.com/news/security/lamehug-malware-uses-ai-llm-to-craft-windows-data-theft-commands-in-real-time/
4. StormousÀÕË÷Èí¼þÍÅ»ïÇÔÈ¡ÑÇÀûÉ£ÄÇÖÝÒ½ÁÆÖÐÐÄ60Íò»¼ÕßÊý¾Ý
7ÔÂ17ÈÕ£¬Ç×¶íÀÕË÷Èí¼þ×éÖ¯Stormous½üÈÕÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû³Æ£¬³É¹¦ÈëÇÖÃÀ¹úÑÇÀûÉ£ÄÇÖݱ±²¿·ÇͶ»úÐÔÁª¹úÈÏÖ¤Ò½ÁÆÖÐÐÄ£¨FQHC£©North Country HealthCare£¬ÇÔÈ¡ÁËÔ¼60ÍòÃû»¼ÕßµÄÃô¸ÐÐÅÏ¢¡£¸ÃÒ½ÁÆÖÐÐÄÔÚ11¸öÉçÇøµÄ14¸öµØÖ·Ìṩȫ¿ÆÒ½ÁÆ·þÎñ£¬¸²¸Ç¼Òͥҽѧ¡¢¶ù¿Æ¡¢ÐÐΪ½¡È«¡¢ÑÀ¿Æ»¤ÀíµÈ¶àÁìÓò£¬²¢½ÓÊÜ´óÎÞÊý±£ÏÕ´òË㼰ΪδͶ±£»¼ÕßÌṩÓöÈÕÛ¿Û¡£StormousÍÅ»ïÐû³Æ£¬ÇÔÈ¡µÄÊý¾ÝÔ̺¬ÆëÈ«µÄÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡¢Êܱ£»¤½¡È«ÐÅÏ¢£¨PHI£©¡¢Õï¶Ï´úÂ루ICD£©¼°ÕïËùÓëÒ½ÁÆ·þÎñÌṩÕßÏêÇ飬¾ßÌåÔ̺¬»¼ÕßÈ«Ãû¡¢µ®ÉúÈÕÆÚ¡¢ÁªÏµ·½Ê½¡¢¾ÍÕïÈÕÆÚÓëµØÖ·¡¢±£ÏÕ¹«Ë¾ÐÅÏ¢¡¢Õï¶ÏÃèÊöµÈ¡£¸Ã×é֯ѡȡ¡°Ë«³ÁÀÕË÷¡±Ä£Ê½£ºÆäÖÐ10ÍòÃû»¼ÕßµÄÊý¾Ý±»¹ÒÅÆÏúÊÛ£¬Ôü×Ò50Íò±Ê¼Í¼ÔòÓÚ7ÔÂ15ÈÕ±»Ãâ·Ñ¹«¿ªÖÁйÃÜÍøÕ¾£¬½øÒ»²½À©´óÁËÊý¾Ý¶³ö·çÏÕ¡£Stormous×Ô2022ËêÊ×»îÔ¾ÒÔÀ´£¬ÒÑÕë¶ÔÒ½ÁƱ£½¡¡¢¾Æµê¡¢¿Æ¼¼¡¢µ±¾ÖµÈÁìÓòµÄÖÁÉÙ150¸ö×éÖ¯·¢Æð¹¥»÷£¬Êܺ¦Õß¼¯ÖÐÓÚÎ÷°àÑÀ¡¢ÃÀ¹ú¡¢°¢ÁªÇõ¡¢·¨¹úºÍ°ÍÎ÷¡£
https://securityaffairs.com/180057/data-breach/180057stormous-ransomware-gang-targets-north-country-healthcare-claims-600k-patient-data-stolen.html
5. BigONEÂòÂôËùÔâºÚ¿Í¹¥»÷£¬2700ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»µÁ
7ÔÂ16ÈÕ£¬¼ÓÃÜÇ®±ÒÂòÂôËùBigONE¼ì²âµ½Æ½Ì¨²¿ÃÅ×ʲú³öÏÖÒì³£¸Ä¹Û£¬¾µ÷²éÈ·ÈÏϵÕë¶ÔÆäÈÈÇ®°üµÄµÚÈý·½¹¥»÷ËùÖ£¬ºÚ¿ÍÇÔÈ¡Á˼ÛÖµÔ¼2700ÍòÃÀÔªµÄ¸÷ÀàÊý×Ö×ʲú¡£BigONEËæ¼´°ä²¼²¼¸æ³Æ£¬Óû§Ë½Ô¿¼°Ó×ÎÒÊý¾ÝδÊÜÓ°Ï죬ËùÓÐËðʧ½«ÓÉÆ½Ì¨´¢Ðî½ðÈ«¶î³Ðµ££¬Óû§×ʲú²»»áÔâ·êÄÚÈÝÐÔËðʧ¡£Ä¿Ç°£¬Æ½Ì¨ÒÑÓ밲ȫ¹«Ë¾SlowMistºÏ×÷×·×Ù±»µÁ×ʽ𣬲¢¼à¿ØÆäÔÚÇø¿éÁ´ÉϵÄÁ÷¶¯Çé¿ö£¬Í¬Ê±°ä·¢´æ¿îºÍÂòÂô·þÎñÒÑÆëÈ«¸´Ô£¬µ«ÌáÏÖ¼°OTCÖ°ÄÜÉÐδ³ÁÆô¡£Ö»¹Ü¹¥»÷²½ÖèÒѱ»½ÚÔ죬µ«¾ßÌåÈëÇÖ¼¿Á©ÈÔδÃ÷È·¡£SlowMist³õ²½ÅжÏÕâ´ÎÊÂÎñΪ¹©¸øÁ´¹¥»÷£¬¶øÇø¿éÁ´¹Û²ì»ú¹¹LookochainÔòÅû¶£¬ºÚ¿ÍÒÑÆðÍ·Ï´Ç®²Ù×÷£¬½«Ôß¿î¶Ò»»Îª120ö±ÈÌØ±Ò£¨BTC£©¡¢1272öÒÔÌ«±Ò£¨ETH£©¡¢2625öSolana£¨SOL£©¼°2330ÍòöTron£¨TRX£©¡£
https://www.bleepingcomputer.com/news/security/hacker-steals-27-million-in-bigone-exchange-crypto-breach/
6. Ïã¸Û½ðÈÚ»ú¹¹ÔâSquidLoader¶ñÒâÈí¼þ¹¥»÷
7ÔÂ16ÈÕ£¬°²È«×êÑÐÈËÔ±½üÈÕ·¢ÏÖ£¬Õë¶ÔÏã¸Û½ðÈÚ»ú¹¹µÄÐÂÐͶñÒâÈí¼þ¹¥»÷À˳¹ØýÔÚÊæÕ¹£¬ÆäÖ÷ÌâΪ¾ß±¸¸ß¶È¶ã±ÜÄÜÁ¦µÄ¼ÓÔØÆ÷SquidLoader¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶à½×¶ÎϰȾÁ´²¿ÊðCobalt Strike Beacon£¬²¢Ñ¡È¡¶àÖÖÏȽø¿¹·ÖÎöÕ½Êõ£¬¶ÔÖ¸±ê»ú¹¹×é³ÉÑϳÁÍþв¡£¹¥»÷ʼÓÚÓã²æÊ½´¹µöÓʼþ¡£ÕâЩÒÔͨ³£»°×«Ð´µÄÓʼþ¼ÙÒâ½ðÈÚ»ú¹¹£¬¸½´ø¼Ù×°³É·¢Æ±µÄÃÜÂë±£»¤RARѹËõ°ü¡£Óû§½âѹºó£¬»á·¢ÏÖÒ»¸ö¼Ù×°³ÉMicrosoft WordÎĵµµÄ¶ñÒâPE¶þ½øÔìÎļþ£¬ÆäÎļþÃû·ÂÕպϷ¨·¨Ê½¡°AMDRSServ.exe¡±£¬ÒÔ¼ÓÇ¿Éç»á¹¤³ÌºýŪÐÔ¡£Ò»µ©Ö´ÐУ¬SquidLoader±ãÆô¶¯¶à½×¶ÎϰȾÁ÷³Ì£ºÊ×ÏÈ×ÔÎÒ½â°üÒÔ½âÃÜÄÚ²¿¸ºÔØ£¬Ëæºóͨ¹ý»ìºÏ´úÂ붯̬½âÎö¹Ø¼üWindows API£¬²¢³õʼ»¯»ùÓÚ²Ö¿âµÄ×Ô½ç˵½á¹¹´æ´¢²Ù×÷Êý¾Ý¡£Îª¶ã±ÜɳÏä¡¢µ÷ÊÔÆ÷¼°·À²¡¶¾¹¤¾ß£¬¸Ã¶ñÒâÈí¼þÖ´Ðжà³Á¶ã±ÜÀý³Ì£¬Ô̺¬»·¾³²é³¡¢×Ö·û´®»ìºÏ¡¢½ÚÔìÁ÷»ìºÏ¼°Å²ÓÃδ¹«¿ªµÄWindowsϵͳŲÓá£Èô¼ì²âµ½·ÖÎö¹¤¾ß»òµ÷ÊÔ¼£Ï󣬯ä»áµ±¼´ÖÕÖ¹ÔËÐС£´Ë±í£¬SquidLoader»¹Ñ¡È¡ÑÓ³¤Ïß³Ì˯Ãß¡¢Òì²½¹ý³ÌŲÓõȼ¼ÊõÈÆ¹ý×Ô¶¯»¯É³Ï䡣ͨ¹ý²é³ºó£¬¶ñÒâÈí¼þ»áͨ¹ý·ÂÕÕKubernetes·þÎñõè¾¶µÄURLÁªÏµC2·þÎñÆ÷£¬ÍøÂç²¢´«ÊäÖ÷»úÊý¾Ý£¬×îÖմӴμ¶IPµØÖ·ÏÂÔØCobalt Strike Beacon¡£
https://www.infosecurity-magazine.com/news/squidloader-malware-targets-hong/


¾©¹«Íø°²±¸11010802024551ºÅ