EverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷±±ÃÀCrumbl±ý¸ÉÁ¬Ëøµê
°ä²¼¹¦·ò 2025-07-301. EverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷±±ÃÀCrumbl±ý¸ÉÁ¬Ëøµê
7ÔÂ26ÈÕ£¬±±ÃÀ³ÛÃûÃÀʳ±ý¸ÉÁ¬ËøµêCrumbl½üÈÕÔâ·êEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬µ¼Ö³¬¹ý29ÍòÃûÔ±¹¤Ó×ÎÒÐÅϢй¶¡£¸Ã×éÖ¯ÓÚ23ÈÕÔÚÆä°µÍøÐ¹ÃÜÍøÕ¾°ä²¼ÉêÃ÷£¬³ÆÒÑ»ñÈ¡Ô̺¬Ô±¹¤ÐÕÃû¡¢µç»°¡¢ÓÊÏ䡢ְλ¡¢µ®ÉúÈÕÆÚ¼°Éí·ÝÑéÖ¤ÁîÅÆµÈÃô¸ÐÐÅÏ¢µÄÄÚ²¿Îļþ£¬²¢¹«¿ªÁËÁ½¸öÔ̺¬¾ßÌåÔ±¹¤Êý¾ÝµÄÑù±¾¡£Õâ´Î¹¥»÷ÖУ¬Everestδѡȡ´«Í³´¿Îı¾ÀÕË÷ÐÅ£¬¶øÊÇͨ¹ýÓïÒôÐÂÎÅÏòCrumbl½»ÉæÈËÔ±·¢³ö×îºóͨ뺣¬ÒªÇóÔÚµ¹¼ÆÊ±ÆÚÏÞÄÚÁªÏµÒÔÖ§¸¶Î´¹«¿ªÊê½ð£¬²»È»½«¹«¿ªÈ«ÊýÊý¾Ý¡£½ØÖÁ25ÈÕ£¬Ôü×Ò½»É湦·òÔ¼ËÄÌì¡£CrumblÓÉÁ½Î»±íÐÖµÜÓÚ2017ÄêµÞÔ죬×ܲ¿Î»ÓÚÓÌËûÖÝ£¬Ä¿Ç°ÔÚÈ«Çò50¸öÖÝ¡¢¼ÓÄôóºÍ²¨¶àÀè¸÷Õ¼Óг¬1000¼ÒÃŵ꣬ÄêÊÕÈëÔ¤¼Æ´ï12ÒÚÃÀÔª£¬ÈÕ¾ù¹©¸ø³¬°ÙÍò·ÝÌðµã£¬ÉîÊÜÃûÈËÓëÍøºìÇàíù£¬ÒÔ±êÖ¾ÐÔ·ÛÉ«°ü×°ÎÅÃû¡£Õâ´ÎÊý¾ÝÐ¹Â¶Éæ¼°ÆäÖØ´óÔ±¹¤ÏµÍ³£¬¿ÉÄÜÒý·¢ÑϳÁÃûÓþÓë˾·¨·çÏÕ¡£EverestÀÕË÷Èí¼þ×éÖ¯Óë¶íÂÞ˹¹ØÁª£¬×Ô2021Äê7Ô³õ´Î³öÏÖÒÔÀ´£¬Òѽ«248ÃûÊܺ¦ÕßÁÐÈë°µÍøÃûµ¥£¬ÆäÖнüÒ»ÄêÄÚÐÂÔö90Æð°¸¼þ£¬Ö¸±êº¸Çµ±¾Ö»ú¹¹¡¢Ò½ÔºµÈÃô¸ÐÐÐÒµ¡£
https://cybernews.com/news/crumbl-cookie-company-everest-ransomware-attack-employee-data-compromised/
2. ·¨¹úµçОÞÍ·OrangeÔâÍøÂç¹¥»÷Ö·þÎñÖжÏ
7ÔÂ29ÈÕ£¬·¨¹úµçÐÅÔËÓªÉÌOrange½üÈÕÅû¶ÆäÍøÂçϵͳÔâ·ê³Á´ó°²È«ÊÂÎñ¡£7ÔÂ25ÈÕ£¬¸Ã¹«Ë¾ÍøÂ簲ȫÊýÃÅOrange Cyberdefense¼ì²âµ½ÐÅϢϵͳÔâ·êÍøÂç¹¥»÷£¬Ëæ¼´Æô¶¯Ó¦¼±ÏìÓ¦»úÔ죬½«ÊÜϰȾϵͳÓëÍøÂçÖ÷Ìå¸ôÀë¡£´Ë¾ÙËäÓÐЧ¶ôÔìÁ˹¥»÷À©É¢£¬µ«µ¼Ö·¨¹ú±¾ÍÁ²¿ÃÅóÒ׿ͻ§¼°Ïû·ÑÕß·þÎñµÄÖÎÀíÆ½Ì¨³öÏÖÔËÓªÖжϣ¬Ô¤¼ÆÓйطþÎñ½«ÓÚ7ÔÂ30ÈÕÉÏÎçÖ𲽸´Ô¡£OrangeÇ¿µ÷£¬Ä¿Ç°µ÷²éÉÐδ·¢ÏÖ¿Í»§Êý¾Ý»òÆóÒµÃô¸ÐÐÅÏ¢±»µÁµÄÖ¤¾Ý£¬µ«ÒÑÏò·¨Âɲ¿Ãű¨°¸²¢Ìá¸æ×´ËÏ¡£OrangeµÄÍøÂ簲ȫÌôÕ½²¢·Ç³õ´Î¡£½ñÄê2Ô£¬ÆäÂÞÂíÄáÑÇ·Ö¹«Ë¾ÔøÔâ·êÒÔ"Rey"Ϊ´úºÅµÄºÚ¿Í¹¥»÷£¬µ¼ÖÂÊýǧ·ÝÔ̺¬Ô±¹¤Êý¾Ý¡¢Óû§¼Í¼¼°Ô´´úÂëµÄÄÚ²¿Îļþй¶£¬Ë乫˾³Æ½ö·Ç¹Ø¼üÀûÓÃÊÜÓ°Ï죬µ«Â¶³ö³ö¹©¸øÁ´°²È«µÄÓÄ΢»·½Ú¡£×÷Ϊ·þÎñÅ·ÖÞ¡¢·ÇÖÞ¼°Öж«2.94ÒÚÓû§µÄÐÐÒµ¾ÞÍ·£¬Orangeͨ¹ýOrange BusinessÆ·ÅÆÎª¿ç¹úÆóÒµÌṩIT·þÎñ£¬2024ÄêÓªÊÕ´ï403ÒÚÅ·Ôª£¬Õ¼ÓÐ12.58ÍòÃûÔ±¹¤£¬Æäϵͳ²»±äÐÔ¶ÔÈ«ÇòÍ¨Ñ¶ÍøÂçÓµÓÐÕ½ÊõÒâ˼¡£
https://www.bleepingcomputer.com/news/security/french-telecommunications-giant-orange-discloses-cyberattack/
3. Ã÷ÄáËÕ´ïÖÝÊ¥±£ÂÞÊÐÔâÑϳÁÍøÂç¹¥»÷
7ÔÂ29ÈÕ£¬Ã÷ÄáËÕ´ïÖÝÊ׸®Ê¥±£ÂÞÊÐ×Ô24ÈÕÆðÔâ·êÑϳÁÍøÂç¹¥»÷£¬µ¼ÖÂÈ«ÊÐÊý×Ö·þÎñºÍ¹Ø¼üϵͳ´óÁìÓòÖжϣ¬Ó°Ïì³ÖÐøÕû¸öÖÜÄ©¡£Õâ´Î¹¥»÷Ôì³ÉÔÚÏßÖ§¸¶Ö°ÄÜ̱»¾£¬Í¼Êé¹Ý¡¢ÓéÀÖÖÐÐĵȷþÎñÁÙʱÎÞ·¨Ê¹Ó㬲¿ÃÅÊÐÕþ·þÎñÒòϵͳ½Ó¼ûÊÜÏÞ³öÏÖÑÓ³¤»òÖжϣ¬µ«´¹Î£·þÎñδÊܲ¨¼°¡£Ê¥±£ÂÞÊйÙÔ±°µÊ¾£¬Ä¿Ç°ÕýÓë±¾µØ¡¢Öݼ°Áª¹úºÏ×÷ͬ°éçÇÃܺÏ×÷£¬È«Á¦µ÷²é¹¥»÷Ô´Í·²¢¸´ÔÈ«ÊýÖ°ÄÜ¡£ÓÉÓÚÊÂÎñ¹æÄ£ºÍ¸´ÔÓÐÔ³¬³öÄÚ²¿¼°Ã³Ò×Ó¦¶ÔÄÜÁ¦£¬Ê¥±£ÂÞÊÐ29ÈÕÏòÖݵ±¾ÖÒªÇóÔöÔ®¡£Í¬ÈÕ£¬Ã÷ÄáËÕ´ïÖÝÖݳ¤µÙÄ·¡¤ÎÖ¶û×ÈÇ©Êð´¹Î£ÐÐÕþºÅÁÆô¶¯¹úÃñ¾¯ÎÀ¶ÓÍøÂç¶ÓÁÐÌṩ¡°ÍøÂç±£»¤Ö§³Ö¡±£¬ÒÔÐÖú½â¾öΣ»ú²¢È·±£³ÁÒªÊÐÕþ·þÎñ³ÖÐøÔËÐС£Æ¾¾ÝºÅÁ¹úÃñ¾¯ÎÀ¶Ó½«ÓëÊÓ×¢ÖÝ¡¢Áª¹ú¹ÙÔ±Ðͬ£¬»º½â³ÖÐø×ÌÈŲ¢±£ÏÕ¾ÓÃñ°²È«¡£ÎÖ¶û×ÈÇ¿µ÷£º¡°ÎÒÃǽ«ÓëÊ¥±£ÂÞÊÐçÇÃܺÏ×÷£¬¾¡¿ì¸´ÔÍøÂ簲ȫ¡£¡±
https://www.bleepingcomputer.com/news/security/minnesota-activates-national-guard-after-st-paul-cyberattack/
4. ÐÂÐͳäµç½Ù³Ö¹¥»÷ÈÆ¹ý°²È«»úÔì
7ÔÂ29ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖÒ»ÖÖÃûΪ¡°Ñ¡Ôñ½Ù³Ö¡±£¨Choicejacking£©µÄÐÂÐ͹¥»÷¼¿Á©£¬¿ÉÈÆ¹ýÖÇÄÜÊÖ»úÕë¶Ô¡°³äµç½Ù³Ö¡±µÄ´«Í³·À»¤»úÔ죬ÀûÓù«¹²³äµçÉ豸ÇÔÈ¡Êý¾Ý»òÖ²Èë¶ñÒâÈí¼þ¡£ÕâÒ»ÍþвÓɰµØÀû¸ñÀ´Ä¿Æ¼¼´óѧÍŶӽÒʾ¡£×ÔÊ®¶àÄêǰ¡°³äµç½Ù³Ö¡±³õ´ÎÒý·¢¹Ø×¢ºó£¬ÖÇÄÜÊÖ»ú²Ù×÷ϵͳÖð²½ÒýÈ밲ȫÌáÐÑ£¬ÒªÇóÓû§ÔÚÏνÓδ֪¶Ë¿ÚʱÊÖ¶¯ºË×¼Êý¾Ý´«Êä»òÑ¡Ôñ¡°½ö³äµç¡±Ä£Ê½¡£È»¶ø£¬×êÑÐÍŶÓͨ¹ý·ÂÕÕUSB/À¶ÑÀÊäÈëÉ豸²Ù×÷£¬³É¹¦Î±ÔìÓû§ÊÚȨ£º¶ñÒâ³äµçÕ¾¿ÉÔÚ133ºÁÃëÄÚÉ豸Çл»ÖÁÊý¾Ý´«Êä»òµ÷ÊÔģʽ£¬ÎÞÐèÓû§ÈκβÙ×÷¡£NordVPNÍøÂ簲ȫÕÕ·÷Adrianus WarmenhovenÖ¸³ö£¬¸Ã¹¥»÷ÀûÓá°½ÚÔì´í¾õ¡±µÀÀí£¬Ê¹Óû§ÔÚÆëÈ«²»ÖªÇéµÄÇé¿ö϶³öÊý¾Ý£¬¹¥»÷Õ߿ɽè´Ëä¯ÀÀÕÕÆ¬¡¢¶ÁÈ¡ÐÂÎÅÉõÖÁÖ²Èë¶ñÒâÈí¼þ¡£Õâ´Î·¢ÏÖÓ¡Ö¤ÁËר¼Ò³Ö¾ÃÒÔÀ´µÄÖҸ棺¹«¹²USB¶Ë¿Ú´æÔÚ¼«¸ß·çÏÕ¡£ÎÞÂÛÊÇ»ú³¡¡¢¾Æµê»¹ÊÇ¿§·È¹Ý£¬±»ÈëÇֵijäµçÉ豸¶¼¿ÉÄܳÉΪ¹¥»÷ÔØÌå¡£
https://hackread.com/choicejacking-attack-steals-data-phones-public-chargers/
5. ºÚ¿ÍÀûÓÃSAP NetWeaver·ì϶²¿ÊðLinux Auto-Color¶ñÒâÈí¼þ
7ÔÂ29ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾DarktraceÔÚ2025Äê4ÔµÄÊÂÎñÏìÓ¦Öз¢ÏÖ£¬ºÚ¿ÍÕýÀûÓÃSAP NetWeaverµÄÑϳÁ·ì϶CVE-2025-31324£¬¶ÔÒ»¼ÒÃÀ¹ú»¯Ñ§¹«Ë¾²¿ÊðÉý¼¶°æAuto-Color Linux¶ñÒâÈí¼þ¡£¸Ã·ì϶ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÉÏ´«¶ñÒâ¶þ½øÔìÎļþʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬SAPËäÓÚ4Ô°䲼½¨¸´²¹¶¡£¬µ«´ËǰÒÑÓж෽¹Û²ìµ½»îÔ¾ÀûÓó¢ÊÔ¡£Auto-Color¶ñÒâÈí¼þ×îÔçÓÉPalo Alto Networks Unit 42ÍŶÓÔÚ2025Äê2Լͼ£¬ÆäÒÔÒñ±ÎÐÔºÍÓÆ¾ÃÐÔÖø³Æ¡£×îа汾½øÒ»²½Ç¿»¯ÌÓ±ÜÕ½Êõ£ºÈôÎÞ·¨ÏνÓÓ²±àÂëµÄºÅÁîÓë½ÚÔì·þÎñÆ÷£¬¶ñÒâÈí¼þ»á×Ô¶¯ÒÖÔì´ó²¿ÃŶñÒâÖ°ÄÜ£¬ÔÚɳºÐ»ò¸ôÀë»·¾³ÖгöÏÖ¡°ÎÞº¦¡±×´Ì¬£¬ÒԴ˶ã±Ü°²È«·ÖÎö¡£Darktrace»ã±¨Ö¸³ö£¬¸ÃºóÃÅ¿ÉÆ¾¾ÝÓû§È¨ÏÞ¼¶±ðµ÷ÕûÐÐΪ£¬Í¨¹ý¡°ld.so.preload¡±¹²Ïí¶ÔÏó×¢ÈëʵÏÖÒþÃØÓÆ¾Ã»¯£¬²¢¼¯³ÉrootkitÄ£¿é°µ²Ø»î¶¯£¬¾ß±¸ËÁÒâºÅÁîÖ´ÐÓ×¢ÎļþÅú¸Ä¡¢·´Ïòshell¡¢´úÀíÁ÷Á¿×ª·¢¼°¶¯Ì¬ÅäÖøüеÈÖ°ÄÜ¡£¹¥»÷¹¦·òÏßÏÔʾ£¬ÍþвÐÐΪÕßÓÚ4ÔÂ25ÈÕÌáÒéÈëÇÖ£¬Á½Ììºó¼´´«ËÍELF¿ÉÖ´ÐÐÎļþÖÁÖ¸±ê»úе¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-sap-netweaver-bug-to-deploy-linux-auto-color-malware/
6. ÈûÉà¶ûóÒ×ÒøÐÐÔâÍøÂç¹¥»÷Ö¿ͻ§Êý¾Ýй¶
7ÔÂ29ÈÕ£¬Ò»ÃûºÚ¿ÍÐû³ÆÇÔÈ¡²¢ÏúÊÛÁËÈûÉà¶ûóÒ×ÒøÐпͻ§µÄÓ×ÎÒÊý¾Ý¡£×÷ΪÈûÉà¶ûµÄÖØÒª½ðÈÚ·þÎñ»ú¹¹£¬¸ÃÒøÐÐ25ÈÕ°µÊ¾ÒÑ¡°·¢ÏÖ²¢½ÚÔ족Õâ´Î¹¥»÷£¬µ«Î´Ð¹Â©¾ßÌå¼¼Êõϸ½Ú¡£¾ÝÒøÐв¼¸æ£¬¹¥»÷ÊÂÎñµ¼ÖÂÍøÉÏÒøÐпͻ§µÄÓ×ÎÒÐÅÏ¢¡°Òâ±íй¶¡±£¬Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¡¢ÕË»§ÀàÐͼ°Óà¶îµÈÃô¸ÐÐÅÏ¢£¬²¿ÃÅÕË»§»¹±»ÏóÕ÷Ϊ¡°»îÆÚÕË»§-µ±¾Ö¡±¡£ÒøÐÐÇ¿µ÷£¬Ä¿Ç°ÎÞÖ¤¾ÝÅú×¢¿Í»§×ʽðÔâµÁÓ㬲¢½¨ÒéÓû§Í¨¹ýATM»ò·ÖÐнâ¾öÒµÎñ¡£Âåɼí¶ÍøÂ簲ȫ¹«Ë¾ResecurityµÄ×êÑÐÈËÔ±Óë¹¥»÷Õß½Ó´¥ºó£¬Éó²éÁ˱»µÁÊý¾ÝÑù±¾£¬È·ÈÏÐÅÏ¢ÕæÊµÐÔ¡£Õâ´Îй¶¿ÉÄÜÉæ¼°´óÁ¿¿Í»§ÒþÖÔ£¬Òý·¢¶ÔÊý¾ÝÀÄÓ÷çÏÕµÄÓÇÓô¡£ÈûÉà¶ûÖÐÑëÒøÐÐÒÑÊÕµ½¸ÃÐеÄÕýʽ֪ͨ£¬µ«Î´½øÒ»²½Åû¶µ÷²é½øÕ¹¡£Ä¿Ç°£¬ÈûÉà¶ûóÒ×ÒøÐÐÒÑÔÝÍ£ÍøÉÏÒøÐзþÎñÒÔ½ÚÔì·çÏÕ£¬µ«Î´Ã÷È·¸´Ô¹¦·ò¡£
https://securityaffairs.com/180513/data-breach/seychelles-commercial-bank-reported-cybersecurity-incident.html


¾©¹«Íø°²±¸11010802024551ºÅ