ÈËÁ¦×ÊÔ´¾ÞÍ·WorkdayÔÚSalesforce¹¥»÷ºóÅû¶Êý¾Ýй¶
°ä²¼¹¦·ò 2025-08-191. ÈËÁ¦×ÊÔ´¾ÞÍ·WorkdayÔÚSalesforce¹¥»÷ºóÅû¶Êý¾Ýй¶
8ÔÂ18ÈÕ£¬È«ÇòÈËÁ¦×ÊÔ´¾ÞÍ·Workday½üÈÕÅû¶һ·³Á´óÊý¾Ý°²È«ÊÂÎñ£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¼¿Á©ÈëÇÔìäµÚÈý·½¿Í»§¹ØÏµÖÎÀí£¨CRM£©Æ½Ì¨£¬µ¼Ö²¿·ÔìóÒµÁªÏµÐÅϢй¶¡£Õâ´ÎÊÂÎñÒý¿¯ÐÐÒµ¿í·º¹Ø×¢£¬²»½öÒòWorkdayµÄÖØ´ó¿Í»§»ù´¡£¬Æä·þÎñ¸²¸ÇÈ«Çò11,000Óà¼ÒÆóÒµ£¬Ô̺¬³¬60%µÄ¡¶²Æ¸»¡·500Ç¿ÆóÒµ£¬¸üÒò¸ÃÊÂÎñ±»Ö¤ÊµÓë½üÆÚÕë¶ÔSalesforce CRMÊ·ýµÄϵÁй¥»÷´æÔÚ¹ØÁª¡£¾ÝWorkday¹Ù·½Åû¶£¬8ÔÂ6ÈÕ¹«Ë¾¼à²âµ½Òì³£»î¶¯£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¼¿Á©ÓÕÆÔ±¹¤ÊÚȨ¶ñÒâOAuthÀûÓã¬×îÖÕ»ñÈ¡µÚÈý·½CRMƽ̨´æ´¢µÄóÒ×ÁªÏµÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¼°µç»°ºÅÂë¡£Ö»¹ÜWorkdayÇ¿µ÷¿Í»§Ö÷ÌâÊý¾ÝδÊÜÓ°Ï죬µ«Ð¹Â¶µÄÁªÏµ·½Ê½ÈÔ¿ÉÄܱ»ÓÃÓÚºóÐøÚ¿Æ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Õâ´Î¹¥»÷ģʽÓë³ôÃûÔ¶ÑïµÄShinyHuntersÀÕË÷×éÖ¯ÊÖ·¨¸ß¶ÈÎǺϣ¬¸Ã×éÖ¯×ÔËêÊׯðͨ¹ýÀàËÆ¼¿Á©ÈëÇÖ¶à¼ÒÆóÒµSalesforceÊ·ý£¬ÇÔÈ¡Êý¾Ý¿âºóÖ´ÐÐÀÕË÷£¬´ËǰÒѲ¨¼°°¢µÏ´ï˹¡¢°ÄÖÞº½¿Õ¡¢Â·Ò×ÍþµÇµÈÈ«Çò³ÛÃûÆóÒµ¡£
https://www.bleepingcomputer.com/news/security/hr-giant-workday-discloses-data-breach-amid-salesforce-attacks/
2. ÍþвÕßÐû³ÆÏúÊÛ1580Íò·Ý´¿Îı¾PayPalƾ֤
8ÔÂ18ÈÕ£¬ÍøÂç·¸×ïÂÛ̳ÉϳöÏÖһ·´ó¹æÄ£PayPalÕË»§Êý¾Ýй¶ÊÂÎñ¡£Ò»ÃûΪChucky_BFµÄÍþвÐÐΪÕß¹«¿ªÏúÊÛ±ê°ñΪ¡°È«ÇòPayPalƾ֤ת´¢2025¡±µÄÊý¾Ý¼¯£¬Ðû³ÆÔ̺¬1580Íò±Ê¼Í¼£¬Éæ¼°µç×ÓÓʼþµØÖ·¡¢Ã÷ÎÄÃÜÂë¼°Ö±½ÓÁ´½ÓÖÁPayPal·þÎñµÄURL£¬Êý¾Ý×ÜÁ¿´ï1.1GB¡£Âô¼Ò½«Æä³ÆÎª¡°ÍøÂç·¸×ï·Ö×ӵĽð¿ó¡±£¬²¢ÖÒ¸æ¸ÃÊý¾Ý¿ÉÄܱ»ÓÃÓÚÆ¾Ö¤Ìî³ä¹¥»÷¡¢ÍøÂç´¹µö¼°Ú²ÆÐÐΪ¡£¾Ý·ÖÎö£¬¸ÃÊý¾Ý¼¯µÄ½á¹¹ÇкÏÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÌØµã¡£´ËÀàÈí¼þͨ³£Í¨¹ýϰȾÓû§É豸£¬ÇÔÈ¡±£ÁôµÄµÇ¼ƾ֤¡¢ä¯ÀÀÆ÷Êý¾Ý¼°ÍøÕ¾»î¶¯£¬×îÖÕ½«ÍøÂçµÄÐÅÏ¢»ã×ÜÏúÊÛ¡£Ñù±¾ÏÔʾ£¬²¿ÃżÍ¼Ô̺¬GmailµÅ×ÊÏäÓëÃÜÂëµÄÅä¶Ô£¬ÇÒͳһÕË»§ÔÚÍøÂç°æºÍÒÆ¶¯°æPayPalÖеľßÌåÐÅÏ¢¾ù±»ÊÕ¼£¬°µÊ¾Êý¾ÝÀ´×ÔÈ«Çò¶àµØÊÜϰȾÉ豸¡£Ö»¹ÜÂô¼ÒÐû³Æ¡°´óÎÞÊýÃÜÂëÇ¿¶È¸ßÇÒ¹ÖÒ족£¬µ«Ò²ÈϿɴæÔÚ³Á¸´Ê¹ÓÃÇé¿ö£¬ÕâÒâζ×ÅÓû§ÔÚÆäËûƽ̨ʹÓÃÒ»ÑùÃÜÂëʱ¿ÉÄÜÃæ¶Ô¿çÕ¾·çÏÕ¡£Ä¿Ç°£¬PayPalÉÐδ֤ʵ¸ÃÊý¾Ý¼¯µÄÕæÊµÐÔ£¬ÎÞ·¨È·¶¨ÆäÊÇÆëÈ«ÕæÊµµÄ¼Í¼¡¢Ô̺¬ÐéαÐÅÏ¢£¬»¹ÊǶԺ¹Çàй¶Êý¾ÝµÄ³Áаü×°¡£
https://hackread.com/threat-actor-selling-plain-text-paypal-credentials/
3. Î÷½Ýº½¿ÕÈ·ÈÏÍøÂç¹¥»÷¶³öÁ˿ͻ§µÄÃô¸ÐÐÅÏ¢
8ÔÂ15ÈÕ£¬¼ÓÄôóµÚ¶þ´óº½¿Õ¹«Ë¾Î÷½Ýº½¿Õ½üÈÕ֤ʵ£¬Æä³Ë¿Í²¿ÃÅÓ×ÎÒÐÅÏ¢ÔÚ6Ô·ݵÄÍøÂç¹¥»÷Öб»ÇÔÈ¡£¬³ÉΪÓÖһ·Õë¶Ôº½¿ÕÒµµÄ´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£¾ÝÅû¶£¬6ÔÂ13ÈÕ£¬Î÷½Ýº½¿Õϵͳ¼ì²âµ½¿ÉÒɻ£¬·¸×ï·Ö×Óͨ¹ýһʱ½Ó¼ûȨÏÞÇÔÈ¡Á˳˿ÍÊý¾Ý¡£Ö»¹Ü¹«Ë¾Î´¹«¿ª¾ßÌåÊÜÓ°ÏìÈËÊý£¬µ«Ã÷È·°µÊ¾Ð¹Â¶ÐÅÏ¢¿ÉÄÜÒò³Ë¿Í¶øÒ죬º¸ÇÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢ÁªÏµÐÅÏ¢¡¢ÐԱ𡢹۹âÖ¤¼þÐÅÏ¢¼°½üÆÚÔ¤Ô¼¼Í¼¡£ÓÈΪֵÍ×ÌùÐĵÄÊÇ£¬»¤ÕÕµÈÓ×ÎÒÎļþ¿ÉÄܱ»ÓÃÓÚαÔìÉí·Ý»òÖ´ÐÐÆäËû·¸×ï»î¶¯£¬Òý·¢¶ÔÉí·Ý͵ÇÔ·çÏÕµÄÓÇÓô¡£Õâ´ÎÊÂÎñÖУ¬Î÷½Ýº½¿ÕÇ¿µ÷ÐÅÓþ¿¨ºÅ¡¢½è¼Ç¿¨¾ßÌåÐÅÏ¢¼°Óû§ÃÜÂëδ±»Ð¹Â¶£¬¿Ï¶¨Ë®Æ½ÉÏ»º½âÁËÓû§¶Ô²ÆÕþËðʧµÄÖ±½ÓÓÇÓô¡£¹«Ë¾»ØÓ¦³Æ£¬ÒÑÒÔ¡°×ΣºÍ×îÆ÷³ÁµÄ̬¶È¡±´¦ÖøÃÊÂÎñ£¬²¢²ÉÈ¡¶î±í°²È«´ëʩǿ»¯ÏµÍ³·À»¤£¬Ô¤·ÀÀàËÆÊÂÎñ³ÁÑÝ¡£ÎªÌí²¹Ç±ÔÚËðʧ£¬Î÷½Ýº½¿ÕÓëÐÅÓþ¼à²â»ú¹¹TransUnion CanadaºÏ×÷£¬ÎªÊÜÓ°Ïì³Ë¿ÍÌṩΪÆÚ24¸öÔµÄÃâ·ÑÉí·Ý͵ÇÔºÍÐÅÓþ¼à¿Ø·þÎñ¡£³Ë¿Í»¹¿Éͨ¹ý¡°Éí·Ý¸´Ô´úÀí¡±»ñȡרҵ֧³Ö£¬½â¾öÉí·Ý͵ÇÔÓйØÎÊÌ⣬²¢ÏíÓÐ×î¸ß100ÍòÃÀÔªµÄÓöȱ¨Ïú±£ÏÕÒÔÓ¦¶ÔÚ²ÆÊÂÎñ¡£
https://cybernews.com/news/westjet-confirms-cyber-breach-exposed-sensitive-details-of-customers/
4. ºÚ¿ÍÔÚNetflixÍøÂç´¹µöÖÐÇÔÈ¡FacebookµÇ¼ÐÅÏ¢
8ÔÂ15ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾Malwarebytes×îÐÂ×êÑнÒʾ£¬Ú¿ÆÕßÕýͨ¹ýαÔìNetflixÕÐÆ¸ÓʼþÖ´Ðо«×¼ÍøÂç´¹µö¹¥»÷£¬Ö¸±êÖ±Ö¸¿ÉÄܽӼûÆóÒµFacebookóÒ×ÕË»§µÄÓªÏúÈËÔ±¡£Õâ´Î¹¥»÷ÒÔ¡°¸ßнְλ¡±Îªµö¶ü£¬ÓÕµ¼Êܺ¦Õßй¶É罻ýÌ対֤£¬×îÖÕ¿ÉÄܱ»ÓÃÓÚ¶ñÒâ¸æ°×Ͷ·Å¡¢ÕË»§ÀÕË÷»ò´«²¼ÐéαÐÅÏ¢¡£¹¥»÷Á÷³ÌÏÔʾ£¬Ú¿ÆÕßÊ×ÏÈ·¢ËÍ¿´ËÆ×¨ÒµµÄÕÐÆ¸Óʼþ£¬±êÌâΪ¡°Netflix¸ß¹Üְλ»úÓö¡±£¬ÄÚÈݸ߶ȸöÐÔ»¯£¬ÔÞÑïÊܺ¦Õߵġ°ÓªÏú¸¨µ¼Á¦¡±²¢Ô¼ÇëÉêÇë¡°ÓªÏú¸±×ܲᱡ°É罻ýÌå×ܼࡱµÈְλ¡£ÓʼþÖи½ÓÐÐéαNetflixÖ°ÒµÍøÕ¾Á´½Ó£¬ÒªÇóÊܺ¦Õß´´½¨Ó×ÎÒµµ°¸²¢¹ØÁªFacebookÕË»§¡£µ±Óû§µã»÷¡°³ÖÐøÊ¹ÓÃFacebook¡±»òÓÊÏäµÇ¼ʱ£¬Ò³Ãæ»áÌø×ªÖÁαÔìµÄFacebookµÇ¼½çÃæ£¬ÓÕµ¼ÊäÈëÆ¾Ö¤¡£Malwarebytes×êÑÐÔ±Pieter ArntzÖ¸³ö£¬Õâ´Î¹¥»÷µÄ¼¼Êõ¸´ÔӶȽϸߣºÚ¿ÆÕßͨ¹ýwebsocket²½ÖèʵʱÀ¹½ØÓû§ÊäÈ룬ÔÚÊܺ¦ÕߺÁÎÞ¾õ²ìµÄÇé¿öϵǼÆäÕæÊµFacebookÕË»§£¬ÉõÖÁ¿ÉÄÜÈÆ¹ý¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©¡£Ò»µ©½ÚÔìÕË»§£¬¹¥»÷Õ߿ɵ±¼´×¢ÏúÊܺ¦ÕßÉ豸¡¢ÏòÆäÀÏÓÑ·¢ËÍÀ¬»øÓʼþ£¬»òÀûÓÃÆóÒµÖ§¸¶È¨ÏÞͶ·Å¶ñÒâ¸æ°×¡£
https://cybernews.com/security/netflix-phishing-campaign-facebook-login-targets-marketing-social-media-job-seekers/
5. ERMAC V3.0ÒøÐÐľÂíÔ´´úÂëй¶£¬Â¶³öÆëÈ«¶ñÒâÈí¼þ»ù´¡ÉèÊ©
8ÔÂ16ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕÅû¶ÁËÐÂÐÍAndroidÒøÐÐľÂíERMAC 3.0µÄ¾ßÌåÔË×÷»úÔ죬½ÒʾÆä×÷Ϊ¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©²úÆ·µÄÆëÈ«¼¼Êõ¼Ü¹¹¼°ÔËÓª·ì϶¡£¸Ã±äÖÖÓÉDukeEugeneÍþв×éÖ¯ÔËÓª£¬±»ÆÀ¹ÀΪCerberusºÍBlackRockµÄ½ø»¯°æ±¾£¬Æä¼¼ÊõѪͳ¿É×·ÒäÖÁHook£¨ERMAC 2.0£©¡¢PegasusµÈ³ÛÃû¶ñÒâÈí¼þ¼Ò×å¡£¾ÝHunt.io°ä²¼µÄ»ã±¨£¬ERMAC 3.0ʵÏÖÈý´ó¼¼ÊõÍ»ÆÆ£ºÊ×ÏÈ£¬Ö¸±êÀûÓÃÁìÓò´ó·ùÀ©´óÖÁ700Óà¸öÒøÐÓ×¢µçÉ̼°¼ÓÃÜÇ®±Òƽ̨£¬Í¨¹ý¼ÓÇ¿µÄ±íµ¥×¢ÈëÖ°ÄÜʵÏÖ¾«×¼Êý¾ÝÇÔÈ¡£»Æä´Î£¬Ñ¡È¡AES-CBC¼ÓÃÜͨѶºÍ̸£¬²¢³Á¹¹ÁË»ùÓÚPHP/LaravelµÄC2·þÎñÆ÷¡¢Reactǰ¶ËÃæ°å¡¢GolangÉøÈë·þÎñÆ÷¼°Kotlin±àдµÄAndroidºóÃŵÈȫջ×é¼þ£»×îºó£¬ÆäÄ£¿é»¯¹¹½¨Æ÷ÔÊÐí¿Í»§¶¨Ôì¶ñÒâÈí¼þ²ÎÊý£¬Ðγɰ´Ð趨ÔìµÄ¹¥»÷Á´¡£×êÑÐÍŶÓͨ¹ýÉøÈë·ÖÎö·¢ÏÖ£¬¸Ã×éÖ¯ÔËÓªµÄ·þÎñÆ÷´æÔÚÑϳÁ°²È«È±µã£ºÖÎÀíÃæ°åÊ¢¿ªÄäÃû×¢²á£¬Ä¬ÈÏʹÓþ²Ì¬ÖÎÀíÔ±ÁîÅÆºÍÓ²±àÂëJWTÃÜÔ¿£¬ºó¶ËÊý¾Ý¿âδ×öȨÏÞ¸ôÀë¡£ÕâЩ·ì϶µ¼Ö¹¥»÷ÕߵįëÈ«¼¼Êõ×ʲú±íй£¬Ô̺¬Ô´´úÂë¡¢É豸°ó¶¨»úÔì¡¢¸²¸Ç¹¥»÷Ä£°å¼°C2ͨѶºÍ̸¡£
https://thehackernews.com/2025/08/ermac-v30-banking-trojan-source-code.html
6. ΢ÈíÐéα̸ÌìGPT×ÀÃæÀûÓ÷¨Ê½ÌṩPipeMagicºóÃÅ
8ÔÂ18ÈÕ£¬Î¢Èí°²È«ÍŶӽüÈÕÅû¶һ·ÀûÓÃαÔìChatGPT×ÀÃæÀûÓô«²¼ÐÂÐͺóÃÅPipeMagicµÄ¹¥»÷ÊÂÎñ£¬¸ÃÊÂÎñÓëÕë¶ÔÈ«Çò½ðÈÚ¡¢·¿µØ²úµÈÐÐÒµµÄÀÕË÷Èí¼þ¹¥»÷ÓйØÁª£¬Æä¼¼Êõ¸´ÔÓÐÔ¼°Òñ±ÎÐÔÒý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¹¥»÷Õßͨ¹ý´Û¸ÄGitHubÉϵĿªÔ´ChatGPT×ÀÃæÏîÄ¿£¬ÔÚÆäÖÐÖ²Èë¶ñÒâ´úÂ룬ÓÕµ¼Óû§´Ó·Ç¹Ù·½Çþ·ÏÂÔØÄ¾Âí»¯¸±±¾¡£PipeMagicºóÃÅѡȡ¸ß¶ÈÄ£¿é»¯¼Ü¹¹£¬½«ºÅÁî½ÚÔìͨѶ¡¢ÓÐÐ§ÔØºÉÖ´ÐеÈÖ°Äܲð·ÖΪ¶ÀÁ¢×é¼þ£¬Í¨¹ý¼ÓÃܶ¨Ãû¹Ü·ºÍÄÚ´æ²Ù×÷ʵÏÖÒñ±ÎÔËÐС£ÆäÖ÷ÌâÉè¼ÆÔ̺¬Èý×éÁ´±í½á¹¹£ºÒ»×éÖÎÀí´ýÖ´ÐÐÄ£¿é£¬Ò»×é´¦ÖÃÍøÂçͨѶ£¬ÁíÒ»×鶯̬¼ÓÔØÖ°ÄÜ×é¼þ¡£ÕâÖÖ·ÖÀëʽ¼Ü¹¹²»½ö½µµÍÁ˼ì²âÄѶȣ¬»¹ÔÊÐí¹¥»÷Õßͨ¹ýרÓÃÍøÂçÄ£¿é³ÉÁ¢WebSocket·ç¸ñµÄ°²È«Í¨Â·£¬ÓëC2·þÎñÆ÷½»»¥ÏµÍ³ÐÅÏ¢²¢½Ó¹ÜÖ¸ÁʵÏÖÄ£¿é¶¯Ì¬¸üлò´úÌæ£¬ÎÞÐè³Áв¿ÊðÕû¸öºóÃÅ¡£Î¢Èí½«Õâ´Î¹¥»÷¹éÒòÓÚÒÔ¾¼ÃÀûÒæÎªµ¼ÏòµÄStorm-2460×éÖ¯¡£¸Ã×éÖ¯ÔڻÖÐÀûÓÃWindows CLFSÁãÈÕ·ì϶CVE-2025-29824£¬´Ó³õʼ½Ó¼û¼±¾çתÏòÀÕË÷Èí¼þ²¿Êð¡£Æä¹¥»÷ÁìÓò¸²¸ÇÃÀ¹ú¡¢Å·ÖÞ¡¢ÄÏÃÀ¼°Öж«µØÓò£¬Ö¸±êÔ̺¬½ðÈÚ¡¢·¿µØ²úµÈ¶àÐÐÒµ»ú¹¹¡£
https://hackread.com/fake-chatgpt-desktop-app-pipemagic-backdoor-microsoft/


¾©¹«Íø°²±¸11010802024551ºÅ