LummaÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÔÚ·¨Âɽø¹¥ºó¾íÍÁ³ÁÀ´
°ä²¼¹¦·ò 2025-07-231. LummaÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÔÚ·¨Âɽø¹¥ºó¾íÍÁ³ÁÀ´
7ÔÂ22ÈÕ£¬LummaÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þƽ̨£¨MaaS£©ÔÚ2025Äê5ÔµĿç¹ú·¨ÂÉÐж¯Öб»²é·â2300¸öÓòÃû¼°²¿ÃÅ»ù´¡ÉèÊ©£¬µ«ÆäÖ÷ÌâÔËÓª²¢Î´ÖÕÖ¹¡£LummaÔËÓªÉÌÔÚXSSÂÛ̳ÉϹ«¿ªÈÏ¿ÉÖÐÑë·þÎñÆ÷ÔâÔ¶³Ì²Á³ý£¬µ«Ç¿µ÷Æäδ±»ÆëÈ«½ÚÔ죬²¢Ñ¸¿ìÆô¶¯¸´Ô´òËã¡£Ç÷Ïò¿Æ¼¼Ò£²âÊý¾Ý֤ʵ£¬LummaµÄ»ù´¡ÉèÊ©³Á½¨¿ìÂʳ¬³öÔ¤ÆÚ£¬Æäͨ¹ýǨáãÔÆ·þÎñÌṩÉ̶ã±Ü½øÒ»²½¹Ø±Õ£¬Í¬Ê±Ñ¡È¡ºÏ·¨ÔÆ·þÎñ»ìºÏ¶ñÒâÁ÷Á¿£¬ÏÔÖø½µµÍ±»Ì½²âµ½µÄ¿ÉÄÜÐÔ¡£µ±Ç°£¬LummaÒѹ¹½¨ËÄ´óÖ÷Ìâ´«²¼Çþ·ʵÏÖ¹æÄ£»¯Ï°È¾£ºÆäÒ»£¬Í¨¹ýÐéαÈí¼þÆÆ½â·¨Ê½Óë×¢²á»ú£¬ÀûÓöñÒâ¸æ°×¼°ËÑË÷Á˾ְѳּ¼Êõ£¬ÓÕµ¼Óû§½Ó¼û´îÔØÁ÷Á¿¼ì²âϵͳ£¨TDS£©µÄÚ²ÆÍøÕ¾£¬×îÖÕÏÂÔØLummaÔØºÉ£»Æä¶þ£¬½èÖú"ClickFix"¼¼Êõ£¬ÔÚÊÜÏ°È¾ÍøÕ¾Õ¹Ê¾Î±ÔìÑéÖ¤ÂëÒ³Ãæ£¬ÓÕÆÓû§Ö´ÐÐPowerShellºÅÁîÒÔÄÚ´æ´ó¾Ö¼ÓÔØ¶ñÒâÈí¼þ£¬¶ã±Ü´«Í³Îļþ¼ì²â£»ÆäÈý£¬ÀûÓÃGitHubƽ̨´´½¨AIÌìÉúÄÚÈݿ⣬ÒÔÐéαÓÎÏ·Îè±×¹¤¾ßΪµö¶ü£¬ÍйÜ"TempSpoofer.exe"µÈ¿ÉÖ´ÐÐÎļþ»òZIPѹËõ°ü£»ÆäËÄ£¬Í¨¹ýYouTubeÊÓÆµÓëFacebookÌû×ÓÍÆ¹ãÆÆ½âÈí¼þ£¬½«Óû§Êèµ¼ÖÁÀÄÓÃsites.google.comµÈ¿ÉÕÛ·þÎñµÄ±í²¿Õ¾µã£¬Ðγɶà²ãÌø×ª¹¥»÷Á´¡£
https://www.bleepingcomputer.com/news/security/lumma-infostealer-malware-returns-after-law-enforcement-disruption/
2. ˼¿Æ´¹Î£¸üа²È«²¼¸æ£ºISE/ISE-PIC·ì϶ÔâÀûÓÃ
7ÔÂ22ÈÕ£¬Ë¼¿Æ½üÈÕ°ä²¼´¹Î£°²È«²¼¸æ£¬È·ÈÏÆäÉí·Ý·þÎñÒýÇæ£¨ISE£©¼°ISE±»½âÀ·ÝÏÎ½ÓÆ÷£¨ISE-PIC£©²úÆ·ÖдæÔÚµÄÈý¸ö¸ßΣ·ì϶£¨CVE-2025-20281¡¢CVE-2025-20282¡¢CVE-2025-20337£©ÒÑÔâµ½ÏÖʵ¹¥»÷³¢ÊÔ£¬²¢Ç¿ÁÒ½¨ÒéÓû§Éý¼¶ÖÁ½¨¸´°æ±¾¡£Õâ´ÎÅû¶µÄ·ì϶¾ù±»ÆÀ¶¨ÎªCVSS 10·ÖµÄ×î¸ßÑϳÁµÈ¼¶£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÒÔrootȨÏÞÔڵײã²Ù×÷ϵͳִÐÐËÁÒâ´úÂ룬¶Ô¹Ø¼ü»ù´¡ÉèÊ©×é³É³Á´óÍþв¡£¾ßÌåÀ´¿´£¬CVE-2025-20281Ó°ÏìISE/ISE-PIC 3.3¼°ÒÔÉϰ汾£¬Æä±¾ÔÔÚÓÚAPIÊäÈëÑéÖ¤²»¼°£¬¹¥»÷Õß¿Éͨ¹ýÌá·´Ä¿ÒâAPIÒªÇóÖ±½Ó»ñÈ¡É豸½ÚÔìȨ£»CVE-2025-20282Ôò½öÕë¶Ô3.4°æ±¾£¬Òò²»×ãÎļþÉÏ´«ÑéÖ¤»úÔ죬¹¥»÷Õß¿ÉÏòÌØÈ¨Ä¿Â¼Ð´Èë¶ñÒâÎļþ²¢Ö´ÐÐËÁÒâ´úÂ룻¶øÉÏÖܽ¨¸´µÄCVE-2025-20337·ì϶»úÔìÓëCVE-2025-20281ÀàËÆ£¬½øÒ»²½À©´óÁ˹¥»÷Ãæ¡£Ë¼¿Æ²úÆ·°²È«ÊÂÎñÏìÓ¦ÍŶӣ¨PSIRT£©Ö¤Êµ£¬2025Äê7ÔÂÒѼà²âµ½Õë¶ÔÕâЩ·ì϶µÄ»îÔ¾ÀûÓó¢ÊÔ£¬µ«Î´Åû¶¾ßÌå¹¥»÷ÆðÔ´¼°ÍþвÐÐΪÕßÐÅÏ¢¡£
https://securityaffairs.com/180260/hacking/cisco-confirms-active-exploitation-of-ise-and-ise-pic-flaws.html
3. CoyoteÒøÐÐľÂíÀÄÓÃWindows¸¨ÖúÖ°ÄÜÖ´Ðо«×¼Æ¾Ö¤ÍµÇÔ
7ÔÂ22ÈÕ£¬Akamai°²È«ÍŶÓÅû¶£¬ÐÂÐÍCoyoteÒøÐÐľÂí±äÖÖÕýͨ¹ýÀÄÓÃ΢ÈíWindows UI×Ô¶¯»¯¿ò¼Ü£¨UIA£©£¬¶Ô°ÍÎ÷Óû§ÌáÒ鶨Ïòƾ֤͵ÇÔ¹¥»÷¡£¸Ã¶ñÒâÈí¼þ×Ô2024Äê2Ô³õ´Î³öÏÖÒÔÀ´³ÖÐø½ø»¯£¬×îбäÖÖ½áºÏ´«Í³¼üÅ̼ͼÓëÐÂÐÍUIA¼¼Êõ£¬Õë¶Ô75¼ÒÒøÐм°¼ÓÃÜÇ®±Òƽִ̨Ðо«×¼¹¥»÷¡£Î¢ÈíUIA¿ò¼Ü±¾ÓÃÓÚ¸¨Öú²ÐÕÏÓû§ÓëÀûÓ÷¨Ê½½»»¥£¬Æäͨ¹ýUI×Ô¶¯»¯Ê÷¶³ö½çÃæÔªËØµÄÖ°ÄÜ£¬È´±»Coyote¿ª·¢Õß¶ñÒâÀûÓá£Akamai×êÑÐÈËÔ±Ö¸³ö£¬µ±Ä¾ÂíÎÞ·¨Í¨¹ý´°¿Ú±êÌâ¼ø±ðÖ¸±êÀûÓÃʱ£¬»áŲÓÃUIA API½âÎöä¯ÀÀÆ÷±êǩҳ»òµØÖ·À¸ÄÚÈÝ£¬ÌáÈ¡½Ó¼ûµÄÍøÖ·²¢ÓëÓ²±àÂëµÄÖ¸±ê·þÎñÁÐ±í£¨Ô̺¬Banco do Brasil¡¢CaixaBank¡¢BinanceµÈ£©½øÐн»²æ±È¶Ô£¬´Ó¶øËø¶¨¸ß¼ÛÖµÖ¸±ê¡£ÕâÖÖ¼¼ÊõÍ»ÆÆÁË´«Í³¼üÅ̼ͼµÄ¾ÖÏÞÐÔ£¬¼´±ãÓû§Í¨¹ýä¯ÀÀÆ÷½Ó¼ûÍøÒø£¬Ä¾ÂíÈÔ¿ÉÕýÈ·¼ø±ð·þÎñÀàÐÍ¡£CoyoteµÄ½ø»¯õ辶͹ÏÔÍøÂç·¸×ïµÄ¼¼ÊõÉý¼¶Ç÷Ïò£ºÔÚ±£Áô¼üÅ̼ͼ¡¢ÍøÂç´¹µö¸²¸ÇµÈ´«Í³ÊÖ·¨»ù´¡ÉÏ£¬ÐÂÔöUIAÀÄÓÃÄÜÁ¦£¬ÐγÉ"¶à³ÁÑéÖ¤"µÄ¹¥»÷Á´¡£
https://www.bleepingcomputer.com/news/security/coyote-malware-abuses-windows-accessibility-framework-for-data-theft/
4. ÖÐÅ·Ò½ÁƾÞÍ·AMEOS¼¯ÍÅÔâ·ê³Á´óÊý¾Ýй¶
7ÔÂ22ÈÕ£¬ÖÐÅ·×î´ó˽Á¢Ò½Ôº¼¯ÍÅÖ®Ò»¡¢×ܲ¿Î»ÓÚËÕÀèÊÀµÄAMEOSÒ½ÁƼ¯ÍŽüÈÕÅû¶³Á´ó°²È«·ì϶ÊÂÎñ£¬¿ÉÄܵ¼Ö¿ͻ§¡¢Ô±¹¤¼°ºÏ×÷ͬ°éÃô¸ÐÐÅϢй¶¡£Æ¾¾Ý¡¶Í¨ÓÃÊý¾Ý±£»¤ÌõÀý¡·£¨GDPR£©µÚ34ÌõÒªÇ󣬸ü¯ÍÅÔÚ¹Ù·½ÍøÕ¾°ä²¼²¼¸æ£¬È·ÈÏ±í²¿ÍþвÐÐΪÕßδ¾ÊÚȨÇÖÈëÆäITϵͳ£¬Ö»¹ÜÒÑÖ´ÐÐ"¿í·º°²È«´ëÊ©"£¬ÈԳɹ¦»ñÈ¡Ô̺¬»¼ÕßÕïÁƼͼ¡¢Ô±¹¤Ó×ÎÒÐÅÏ¢¼°Ã³Ò׺Ï×÷ͬ°éÁªÏµÊý¾ÝÔÚÄÚµÄÃô¸ÐÄÚÈÝ¡£²¼¸æÖÒ¸æ³Æ£¬Ð¹Â¶Êý¾Ý´æÔÚ±»¶ñÒâÀÄÓûòͨ¹ý»¥ÁªÍø¶þ´Î´«²¼µÄ·çÏÕ¡£×÷ΪDACHµØÓò£¨µÂ¹ú¡¢°ÂµØÀû¡¢ÈðÊ¿£©Ò½ÁÆÁìÓòµÄÁúÍ·ÆóÒµ£¬AMEOS¼¯ÍÅÔËÓª×ų¬¹ý100¼ÒÒ½Ôº¡¢ÕïËù¼°¿µ¸´ÖÐÐÄ£¬Õ¼ÓÐ1.8ÍòÃûÔ±¹¤ºÍ1ÍòÕÅ´²Î»£¬ÄêÊÕÈ볬14ÒÚÃÀÔª¡£Õâ´ÎÊÂÎñµ¼ÖÂÆäÈ«Ãæ¹Ø¹ØËùÓÐITϵͳ£¬¶Â½ØÄÚ±íÍøÂçÏνÓÒÔ¶ôÔì·çÏÕÀ©É¢£¬²¢´¹Î£µ÷ÅÉ±í²¿IT°²È«ÍŶÓÓ뷨ҽר¼ÒȾָµ÷²é¡£Ä¿Ç°£¬ÈðÊ¿¡¢µÂ¹ú¡¢°ÂµØÀûÈý¹úÊý¾Ý±£»¤»ú¹¹ÒÑ»ñÖªÇé¿ö£¬¾¯·½ÐÌÊÂËßËÏ·¨Ê½Í¬²½Æô¶¯¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Ö»¹ÜAMEOSÇ¿µ÷"ÉÐÎÞ¾ßÌåÖ¤¾ÝÅú×¢Ó×ÎÒÊý¾ÝÒÑÏÖʵй¶"£¬µ«Ã÷È·Ö¸³ö¹¥»÷Õß¿ÉÄÜͨ¹ýϵͳ·ì϶»ñÈ¡ÁË´óÁ¿½á¹¹»¯Êý¾Ý¡£¼¯ÍލÒé½üÆÚÔÚÆä»ú¹¹½ÓÊÜÒ½ÁÆ·þÎñµÄÈËÔ±Ìá¸ß¾¯Ì裬·À±¸´¹µö¹¥»÷¼°Éí·ÝÚ¿Æ¡£
https://www.bleepingcomputer.com/news/security/major-european-healthcare-network-discloses-security-breach/
5. °Ä´óÀûÑÇʱÉÐÆ·ÅÆSABO³¬350Íò¿Í»§Êý¾Ýй¶
7ÔÂ22ÈÕ£¬°Ä´óÀûÑÇÈ«ÇòʱÉÐÉè¼Æ¹«Ë¾SABO½üÈÕÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ£¬³¬¹ý350ÍòÌõ¿Í»§¼Í¼ÒòÅäÖÃÃýÎóµÄÊý¾Ý¿â¶³öÓÚ¹«¿ªÍøÂç£¬Éæ¼°292GBÃô¸ÐÐÅÏ¢¡£Õâ´Î·ì϶ÓÉÍøÂ簲ȫ×êÑÐÔ±Jeremiah Fowler·¢ÏÖ£¬Â¶³öÊý¾Ýº¸Ç2015ÄêÖÁ2025Äê6ÔÂ27ÈÕÆÚ¼äµÄ¿Í»§ÐÕÃû¡¢ÏÖʵµØÖ·¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëµÈÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©£¬ÒÔ¼°ÁãÊÛºÍóÒ׿ͻ§µÄ¾ßÌå¶©µ¥¼Í¼¡¢·¢Æ±¡¢×°Ïäµ¥ºÍÍË»õµ¥µÈÎļþ¡£Ö»¹ÜSABOÔÚFowlerÕÆ¹ÜÈÎÅû¶ºóѸ¿ì±£»¤ÁËÊý¾Ý¿â£¬µ«Õâ´ÎÊÂÎñÈÔÒý·¢¶ÔÊý¾Ý¼ÓÃܱØÒªÐÔµÄ¿í·º»áÉÌ¡£Â¶³öÐÅÏ¢ÖÐÔ̺¬¾ßÌå¶©µ¥ÈÕÆÚ¡¢²úÆ·Çåµ¥µÈ½á¹¹»¯Êý¾Ý£¬ÎªÍøÂç·¸×ï·Ö×ÓÌṩÁ˾«×¼Ö´ÐÐÉç½»¹¤³Ì¹¥»÷µÄËØ²Ä¡£°²È«×¨¼ÒÖҸ棬¹¥»÷Õß¿ÉÄÜÀûÓÃÕæÊµ¶©µ¥ÐÅϢαÔì´¹µöÓʼþ£¬ÓÕÆÓû§Ð¹Â¶¸ü¶à²ÆÕþÐÅÏ¢»ò½øÐнðÈÚڲƣ¬´ËÀ๥»÷Òò»ùÓÚÕæÊµÊý¾Ý¶ø¼«¾ß¹Æ»óÐÔ¡£ÊÂÎñ¶³öºó£¬SABOδÃ÷È·»ØÓ¦ÔðÈιéÊôÎÊÌ⣬½öÇ¿µ÷ÒѲÉÈ¡½¨¸´´ëÊ©¡£ÍøÂ簲ȫר¼Ò½¨ÒéÊÜÓ°ÏìÓû§¼ÓÇ¿¾¯Ì裬ͨ¹ý¹Ù·½Çþ·ÑéÖ¤¿ÉÒÉͨѶ£¬Ô¤·Àµã»÷²»Ã÷Á´½Ó»òÌṩÓ×ÎÒÐÅÏ¢¡£
https://hackread.com/global-fashion-label-sabo-customer-records-leaked/
6. ÃÀ¹úµÂÖݾƾ«¼ì²â¹«Ë¾TADTS³¬75ÍòÈËÐÅÏ¢±»ÇÔ
7ÔÂ21ÈÕ£¬ÃÀ¹úµÂ¿ËÈøË¹Öݾƾ«ÓëÒ©Îï¼ì²â·þÎñ¹«Ë¾£¨TADTS£©½üÈÕÅû¶£¬ÆäϵͳÔÚ2024Äê7ÔÂ9ÈÕÔâ·êδÊÚȨ½Ó¼û£¬µ¼ÖÂÔ¼74.9ÍòÈ˵ÄÃô¸ÐÐÅÏ¢±»ÇÔÈ¡¡£×÷ΪµÂÖÝÖØÒªÖ°³¡¼°Ó×ÎҾƾ«/Ò©Îï¼ì²â·þÎñÌṩÉÌ£¬¸Ã¹«Ë¾¾×¨ÒµÍŶӵ÷²éÈ·ÈÏ£¬Ð¹Â¶Êý¾Ýº¸ÇÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢Éç±£ºÅ¡¢¼ÝÕÕ/»¤Õպ𢲯ÕþÐÅÏ¢¡¢½¡È«±£ÏÕÏêÇé¡¢ÉúÎï¼ø±ðÊý¾Ý¡¢µÇ¼ƾ֤¼°ÒÆÃñµµ°¸ºÅµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ£¬²¿ÃÅÐÅÏ¢Ô´×Ô¾Íҵɸ²é²âÊÔÖÐÊÚȨÌṩµÄÓ×ÎÒ×ÊÁÏ¡£ÊÂÎñÆØ¹âºó£¬TADTS²ÉÈ¡¶àÏî²¹¾È´ëÊ©£¬Ô̺¬³ÁÖÃÕûϵͳÃÜÂë¡¢²¿Êð¼ÓÇ¿ÐÍ¼à¿Ø¹¤¾ß¼°Ç¿»¯¶Ëµã¼ì²âºÍ̸£¬²¢ÒÑÏò·¨Âɲ¿Ãű¨°¸¡£Ö»¹ÜĿǰÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»ÓÃÓÚڲƻòÉí·Ý͵ÇÔ£¬¹«Ë¾ÈÔ½¨ÒéÊÜÓ°ÏìÕß¶¨ÆÚºË²éÐÅÓþ»ã±¨¼°ÕË»§Òì³£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬TADTSÃ÷È·°µÊ¾²»»áÌṩÃâ·ÑÉí·Ý±£»¤·þÎñ£¬´Ë¾ÙÒý·¢¶ÔÊܺ¦ÕߺóÐø±£ÏÕµÄÓÇÓô¡£Õâ´Î¹¥»÷ÒÉËÆÓëBianLianÀÕË÷ÍÅ»ïÓйء£¸Ã×éÖ¯ÓÚ2024Äê7ÔÂ14ÈÕÐû³ÆÇÔȡԼ218GBÊý¾Ý£¬µ«Æä»ùÓÚTorµÄйÃÜÍøÕ¾Ä¿Ç°ÒÑÀëÏߣ¬ÇÒ×Ô2025Äê3ÔÂ31ÈÕÆðδÔÙ¸üÐÂÊܺ¦Õ߼ͼ£¬Êý¾ÝÏÖʵ´«²¼Çé¿öÉв»Ã÷È·¡£
https://www.securityweek.com/750000-impacted-by-data-breach-at-the-alcohol-drug-testing-service/


¾©¹«Íø°²±¸11010802024551ºÅ