ÈËÁ¦×ÊÔ´¾ÞÍ·WorkdayÔÚSalesforce¹¥»÷ºóÅû¶Êý¾Ýй¶

°ä²¼¹¦·ò 2025-08-19

1. ÈËÁ¦×ÊÔ´¾ÞÍ·WorkdayÔÚSalesforce¹¥»÷ºóÅû¶Êý¾Ýй¶


8ÔÂ18ÈÕ £¬È«ÇòÈËÁ¦×ÊÔ´¾ÞÍ·Workday½üÈÕÅû¶һ·³Á´óÊý¾Ý°²È«ÊÂÎñ £¬¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¼¿Á©ÈëÇÔìäµÚÈý·½¿Í»§¹ØÏµÖÎÀí£¨CRM£©Æ½Ì¨ £¬µ¼Ö²¿·ÔìóÒµÁªÏµÐÅϢй¶¡£Õâ´ÎÊÂÎñÒý¿¯ÐÐÒµ¿í·º¹Ø×¢ £¬²»½öÒòWorkdayµÄÖØ´ó¿Í»§»ù´¡ £¬Æä·þÎñ¸²¸ÇÈ«Çò11,000Óà¼ÒÆóÒµ £¬Ô̺¬³¬60%µÄ¡¶²Æ¸»¡·500Ç¿ÆóÒµ £¬¸üÒò¸ÃÊÂÎñ±»Ö¤ÊµÓë½üÆÚÕë¶ÔSalesforce CRMÊ·ýµÄϵÁй¥»÷´æÔÚ¹ØÁª¡£¾ÝWorkday¹Ù·½Åû¶ £¬8ÔÂ6ÈÕ¹«Ë¾¼à²âµ½Òì³£»î¶¯ £¬¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¼¿Á©ÓÕÆ­Ô±¹¤ÊÚȨ¶ñÒâOAuthÀûÓà £¬×îÖÕ»ñÈ¡µÚÈý·½CRMƽ̨´æ´¢µÄóÒ×ÁªÏµÐÅÏ¢ £¬Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¼°µç»°ºÅÂë¡£Ö»¹ÜWorkdayÇ¿µ÷¿Í»§Ö÷ÌâÊý¾ÝδÊÜÓ°Ïì £¬µ«Ð¹Â¶µÄÁªÏµ·½Ê½ÈÔ¿ÉÄܱ»ÓÃÓÚºóÐøÚ¿Æ­¡£ÖµÍ×ÌùÐĵÄÊÇ £¬Õâ´Î¹¥»÷ģʽÓë³ôÃûÔ¶ÑïµÄShinyHuntersÀÕË÷×éÖ¯ÊÖ·¨¸ß¶ÈÎǺÏ £¬¸Ã×éÖ¯×ÔËêÊׯðͨ¹ýÀàËÆ¼¿Á©ÈëÇÖ¶à¼ÒÆóÒµSalesforceÊ·ý £¬ÇÔÈ¡Êý¾Ý¿âºóÖ´ÐÐÀÕË÷ £¬´ËǰÒѲ¨¼°°¢µÏ´ï˹¡¢°ÄÖÞº½¿Õ¡¢Â·Ò×ÍþµÇµÈÈ«Çò³ÛÃûÆóÒµ¡£


https://www.bleepingcomputer.com/news/security/hr-giant-workday-discloses-data-breach-amid-salesforce-attacks/


2. ÍþвÕßÐû³ÆÏúÊÛ1580Íò·Ý´¿Îı¾PayPalƾ֤


8ÔÂ18ÈÕ £¬ÍøÂç·¸×ïÂÛ̳ÉϳöÏÖһ·´ó¹æÄ£PayPalÕË»§Êý¾Ýй¶ÊÂÎñ¡£Ò»ÃûΪChucky_BFµÄÍþвÐÐΪÕß¹«¿ªÏúÊÛ±ê°ñΪ¡°È«ÇòPayPalƾ֤ת´¢2025¡±µÄÊý¾Ý¼¯ £¬Ðû³ÆÔ̺¬1580Íò±Ê¼Í¼ £¬Éæ¼°µç×ÓÓʼþµØÖ·¡¢Ã÷ÎÄÃÜÂë¼°Ö±½ÓÁ´½ÓÖÁPayPal·þÎñµÄURL £¬Êý¾Ý×ÜÁ¿´ï1.1GB¡£Âô¼Ò½«Æä³ÆÎª¡°ÍøÂç·¸×ï·Ö×ӵĽð¿ó¡± £¬²¢ÖÒ¸æ¸ÃÊý¾Ý¿ÉÄܱ»ÓÃÓÚÆ¾Ö¤Ìî³ä¹¥»÷¡¢ÍøÂç´¹µö¼°Ú²Æ­ÐÐΪ¡£¾Ý·ÖÎö £¬¸ÃÊý¾Ý¼¯µÄ½á¹¹ÇкÏÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÌØµã¡£´ËÀàÈí¼þͨ³£Í¨¹ýϰȾÓû§É豸 £¬ÇÔÈ¡±£ÁôµÄµÇ¼ƾ֤¡¢ä¯ÀÀÆ÷Êý¾Ý¼°ÍøÕ¾»î¶¯ £¬×îÖÕ½«ÍøÂçµÄÐÅÏ¢»ã×ÜÏúÊÛ¡£Ñù±¾ÏÔʾ £¬²¿ÃżÍ¼Ô̺¬GmailµÅ×ÊÏäÓëÃÜÂëµÄÅä¶Ô £¬ÇÒͳһÕË»§ÔÚÍøÂç°æºÍÒÆ¶¯°æPayPalÖеľßÌåÐÅÏ¢¾ù±»ÊÕ¼ £¬°µÊ¾Êý¾ÝÀ´×ÔÈ«Çò¶àµØÊÜϰȾÉ豸¡£Ö»¹ÜÂô¼ÒÐû³Æ¡°´óÎÞÊýÃÜÂëÇ¿¶È¸ßÇÒ¹ÖÒ족 £¬µ«Ò²ÈϿɴæÔÚ³Á¸´Ê¹ÓÃÇé¿ö £¬ÕâÒâζ×ÅÓû§ÔÚÆäËûƽ̨ʹÓÃÒ»ÑùÃÜÂëʱ¿ÉÄÜÃæ¶Ô¿çÕ¾·çÏÕ¡£Ä¿Ç° £¬PayPalÉÐδ֤ʵ¸ÃÊý¾Ý¼¯µÄÕæÊµÐÔ £¬ÎÞ·¨È·¶¨ÆäÊÇÆëÈ«ÕæÊµµÄ¼Í¼¡¢Ô̺¬ÐéαÐÅÏ¢ £¬»¹ÊǶԺ¹Çàй¶Êý¾ÝµÄ³Áаü×°¡£


https://hackread.com/threat-actor-selling-plain-text-paypal-credentials/


3. Î÷½Ýº½¿ÕÈ·ÈÏÍøÂç¹¥»÷¶³öÁ˿ͻ§µÄÃô¸ÐÐÅÏ¢


8ÔÂ15ÈÕ £¬¼ÓÄôóµÚ¶þ´óº½¿Õ¹«Ë¾Î÷½Ýº½¿Õ½üÈÕ֤ʵ £¬Æä³Ë¿Í²¿ÃÅÓ×ÎÒÐÅÏ¢ÔÚ6Ô·ݵÄÍøÂç¹¥»÷Öб»ÇÔÈ¡ £¬³ÉΪÓÖһ·Õë¶Ôº½¿ÕÒµµÄ´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£¾ÝÅû¶ £¬6ÔÂ13ÈÕ £¬Î÷½Ýº½¿Õϵͳ¼ì²âµ½¿ÉÒɻ £¬·¸×ï·Ö×Óͨ¹ýһʱ½Ó¼ûȨÏÞÇÔÈ¡Á˳˿ÍÊý¾Ý¡£Ö»¹Ü¹«Ë¾Î´¹«¿ª¾ßÌåÊÜÓ°ÏìÈËÊý £¬µ«Ã÷È·°µÊ¾Ð¹Â¶ÐÅÏ¢¿ÉÄÜÒò³Ë¿Í¶øÒì £¬º­¸ÇÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢ÁªÏµÐÅÏ¢¡¢ÐԱ𡢹۹âÖ¤¼þÐÅÏ¢¼°½üÆÚÔ¤Ô¼¼Í¼¡£ÓÈΪֵÍ×ÌùÐĵÄÊÇ £¬»¤ÕÕµÈÓ×ÎÒÎļþ¿ÉÄܱ»ÓÃÓÚαÔìÉí·Ý»òÖ´ÐÐÆäËû·¸×ï»î¶¯ £¬Òý·¢¶ÔÉí·Ý͵ÇÔ·çÏÕµÄÓÇÓô¡£Õâ´ÎÊÂÎñÖÐ £¬Î÷½Ýº½¿ÕÇ¿µ÷ÐÅÓþ¿¨ºÅ¡¢½è¼Ç¿¨¾ßÌåÐÅÏ¢¼°Óû§ÃÜÂëδ±»Ð¹Â¶ £¬¿Ï¶¨Ë®Æ½ÉÏ»º½âÁËÓû§¶Ô²ÆÕþËðʧµÄÖ±½ÓÓÇÓô¡£¹«Ë¾»ØÓ¦³Æ £¬ÒÑÒÔ¡°×ΣºÍ×îÆ÷³ÁµÄ̬¶È¡±´¦ÖøÃÊÂÎñ £¬²¢²ÉÈ¡¶î±í°²È«´ëʩǿ»¯ÏµÍ³·À»¤ £¬Ô¤·ÀÀàËÆÊÂÎñ³ÁÑÝ¡£ÎªÌí²¹Ç±ÔÚËðʧ £¬Î÷½Ýº½¿ÕÓëÐÅÓþ¼à²â»ú¹¹TransUnion CanadaºÏ×÷ £¬ÎªÊÜÓ°Ïì³Ë¿ÍÌṩΪÆÚ24¸öÔµÄÃâ·ÑÉí·Ý͵ÇÔºÍÐÅÓþ¼à¿Ø·þÎñ¡£³Ë¿Í»¹¿Éͨ¹ý¡°Éí·Ý¸´Ô­´úÀí¡±»ñȡרҵ֧³Ö £¬½â¾öÉí·Ý͵ÇÔÓйØÎÊÌâ £¬²¢ÏíÓÐ×î¸ß100ÍòÃÀÔªµÄÓöȱ¨Ïú±£ÏÕÒÔÓ¦¶ÔڲƭÊÂÎñ¡£


https://cybernews.com/news/westjet-confirms-cyber-breach-exposed-sensitive-details-of-customers/


4. ºÚ¿ÍÔÚNetflixÍøÂç´¹µöÖÐÇÔÈ¡FacebookµÇ¼ÐÅÏ¢


8ÔÂ15ÈÕ £¬ÍøÂ簲ȫ¹«Ë¾Malwarebytes×îÐÂ×êÑнÒʾ £¬Ú¿Æ­ÕßÕýͨ¹ýαÔìNetflixÕÐÆ¸ÓʼþÖ´Ðо«×¼ÍøÂç´¹µö¹¥»÷ £¬Ö¸±êÖ±Ö¸¿ÉÄܽӼûÆóÒµFacebookóÒ×ÕË»§µÄÓªÏúÈËÔ±¡£Õâ´Î¹¥»÷ÒÔ¡°¸ßнְλ¡±Îªµö¶ü £¬ÓÕµ¼Êܺ¦Õßй¶É罻ýÌ対֤ £¬×îÖÕ¿ÉÄܱ»ÓÃÓÚ¶ñÒâ¸æ°×Ͷ·Å¡¢ÕË»§ÀÕË÷»ò´«²¼ÐéαÐÅÏ¢¡£¹¥»÷Á÷³ÌÏÔʾ £¬Ú¿Æ­ÕßÊ×ÏÈ·¢ËÍ¿´ËÆ×¨ÒµµÄÕÐÆ¸Óʼþ £¬±êÌâΪ¡°Netflix¸ß¹Üְλ»úÓö¡± £¬ÄÚÈݸ߶ȸöÐÔ»¯ £¬ÔÞÑïÊܺ¦Õߵġ°ÓªÏú¸¨µ¼Á¦¡±²¢Ô¼ÇëÉêÇë¡°ÓªÏú¸±×ܲᱡ°É罻ýÌå×ܼࡱµÈְλ¡£ÓʼþÖи½ÓÐÐéαNetflixÖ°ÒµÍøÕ¾Á´½Ó £¬ÒªÇóÊܺ¦Õß´´½¨Ó×ÎÒµµ°¸²¢¹ØÁªFacebookÕË»§¡£µ±Óû§µã»÷¡°³ÖÐøÊ¹ÓÃFacebook¡±»òÓÊÏäµÇ¼ʱ £¬Ò³Ãæ»áÌø×ªÖÁαÔìµÄFacebookµÇ¼½çÃæ £¬ÓÕµ¼ÊäÈëÆ¾Ö¤¡£Malwarebytes×êÑÐÔ±Pieter ArntzÖ¸³ö £¬Õâ´Î¹¥»÷µÄ¼¼Êõ¸´ÔӶȽϸߣºÚ¿Æ­Õßͨ¹ýwebsocket²½ÖèʵʱÀ¹½ØÓû§ÊäÈë £¬ÔÚÊܺ¦ÕߺÁÎÞ¾õ²ìµÄÇé¿öϵǼÆäÕæÊµFacebookÕË»§ £¬ÉõÖÁ¿ÉÄÜÈÆ¹ý¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©¡£Ò»µ©½ÚÔìÕË»§ £¬¹¥»÷Õ߿ɵ±¼´×¢ÏúÊܺ¦ÕßÉ豸¡¢ÏòÆäÀÏÓÑ·¢ËÍÀ¬»øÓʼþ £¬»òÀûÓÃÆóÒµÖ§¸¶È¨ÏÞͶ·Å¶ñÒâ¸æ°×¡£


https://cybernews.com/security/netflix-phishing-campaign-facebook-login-targets-marketing-social-media-job-seekers/


5. ERMAC V3.0ÒøÐÐľÂíÔ´´úÂëй¶ £¬Â¶³öÆëÈ«¶ñÒâÈí¼þ»ù´¡ÉèÊ©


8ÔÂ16ÈÕ £¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕÅû¶ÁËÐÂÐÍAndroidÒøÐÐľÂíERMAC 3.0µÄ¾ßÌåÔË×÷»úÔì £¬½ÒʾÆä×÷Ϊ¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©²úÆ·µÄÆëÈ«¼¼Êõ¼Ü¹¹¼°ÔËÓª·ì϶¡£¸Ã±äÖÖÓÉDukeEugeneÍþв×éÖ¯ÔËÓª £¬±»ÆÀ¹ÀΪCerberusºÍBlackRockµÄ½ø»¯°æ±¾ £¬Æä¼¼ÊõѪͳ¿É×·ÒäÖÁHook£¨ERMAC 2.0£©¡¢PegasusµÈ³ÛÃû¶ñÒâÈí¼þ¼Ò×å¡£¾ÝHunt.io°ä²¼µÄ»ã±¨ £¬ERMAC 3.0ʵÏÖÈý´ó¼¼ÊõÍ»ÆÆ£ºÊ×ÏÈ £¬Ö¸±êÀûÓÃÁìÓò´ó·ùÀ©´óÖÁ700Óà¸öÒøÐÓ×¢µçÉ̼°¼ÓÃÜÇ®±Òƽ̨ £¬Í¨¹ý¼ÓÇ¿µÄ±íµ¥×¢ÈëÖ°ÄÜʵÏÖ¾«×¼Êý¾ÝÇÔÈ¡£»Æä´Î £¬Ñ¡È¡AES-CBC¼ÓÃÜͨѶºÍ̸ £¬²¢³Á¹¹ÁË»ùÓÚPHP/LaravelµÄC2·þÎñÆ÷¡¢Reactǰ¶ËÃæ°å¡¢GolangÉøÈë·þÎñÆ÷¼°Kotlin±àдµÄAndroidºóÃŵÈȫջ×é¼þ£»×îºó £¬ÆäÄ£¿é»¯¹¹½¨Æ÷ÔÊÐí¿Í»§¶¨Ôì¶ñÒâÈí¼þ²ÎÊý £¬Ðγɰ´Ð趨ÔìµÄ¹¥»÷Á´¡£×êÑÐÍŶÓͨ¹ýÉøÈë·ÖÎö·¢ÏÖ £¬¸Ã×éÖ¯ÔËÓªµÄ·þÎñÆ÷´æÔÚÑϳÁ°²È«È±µã£ºÖÎÀíÃæ°åÊ¢¿ªÄäÃû×¢²á £¬Ä¬ÈÏʹÓþ²Ì¬ÖÎÀíÔ±ÁîÅÆºÍÓ²±àÂëJWTÃÜÔ¿ £¬ºó¶ËÊý¾Ý¿âδ×öȨÏÞ¸ôÀë¡£ÕâЩ·ì϶µ¼Ö¹¥»÷ÕߵįëÈ«¼¼Êõ×ʲú±íй £¬Ô̺¬Ô´´úÂë¡¢É豸°ó¶¨»úÔì¡¢¸²¸Ç¹¥»÷Ä£°å¼°C2ͨѶºÍ̸¡£


https://thehackernews.com/2025/08/ermac-v30-banking-trojan-source-code.html


6. ΢ÈíÐéα̸ÌìGPT×ÀÃæÀûÓ÷¨Ê½ÌṩPipeMagicºóÃÅ


8ÔÂ18ÈÕ £¬Î¢Èí°²È«ÍŶӽüÈÕÅû¶һ·ÀûÓÃαÔìChatGPT×ÀÃæÀûÓô«²¼ÐÂÐͺóÃÅPipeMagicµÄ¹¥»÷ÊÂÎñ £¬¸ÃÊÂÎñÓëÕë¶ÔÈ«Çò½ðÈÚ¡¢·¿µØ²úµÈÐÐÒµµÄÀÕË÷Èí¼þ¹¥»÷ÓйØÁª £¬Æä¼¼Êõ¸´ÔÓÐÔ¼°Òñ±ÎÐÔÒý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¹¥»÷Õßͨ¹ý´Û¸ÄGitHubÉϵĿªÔ´ChatGPT×ÀÃæÏîÄ¿ £¬ÔÚÆäÖÐÖ²Èë¶ñÒâ´úÂë £¬ÓÕµ¼Óû§´Ó·Ç¹Ù·½Çþ·ÏÂÔØÄ¾Âí»¯¸±±¾¡£PipeMagicºóÃÅѡȡ¸ß¶ÈÄ£¿é»¯¼Ü¹¹ £¬½«ºÅÁî½ÚÔìͨѶ¡¢ÓÐÐ§ÔØºÉÖ´ÐеÈÖ°Äܲð·ÖΪ¶ÀÁ¢×é¼þ £¬Í¨¹ý¼ÓÃܶ¨Ãû¹Ü·ºÍÄÚ´æ²Ù×÷ʵÏÖÒñ±ÎÔËÐС£ÆäÖ÷ÌâÉè¼ÆÔ̺¬Èý×éÁ´±í½á¹¹£ºÒ»×éÖÎÀí´ýÖ´ÐÐÄ£¿é £¬Ò»×é´¦ÖÃÍøÂçͨѶ £¬ÁíÒ»×鶯̬¼ÓÔØÖ°ÄÜ×é¼þ¡£ÕâÖÖ·ÖÀëʽ¼Ü¹¹²»½ö½µµÍÁ˼ì²âÄѶÈ £¬»¹ÔÊÐí¹¥»÷Õßͨ¹ýרÓÃÍøÂçÄ£¿é³ÉÁ¢WebSocket·ç¸ñµÄ°²È«Í¨Â· £¬ÓëC2·þÎñÆ÷½»»¥ÏµÍ³ÐÅÏ¢²¢½Ó¹ÜÖ¸Áî £¬ÊµÏÖÄ£¿é¶¯Ì¬¸üлò´úÌæ £¬ÎÞÐè³Áв¿ÊðÕû¸öºóÃÅ¡£Î¢Èí½«Õâ´Î¹¥»÷¹éÒòÓÚÒÔ¾­¼ÃÀûÒæÎªµ¼ÏòµÄStorm-2460×éÖ¯¡£¸Ã×éÖ¯ÔڻÖÐÀûÓÃWindows CLFSÁãÈÕ·ì϶CVE-2025-29824 £¬´Ó³õʼ½Ó¼û¼±¾çתÏòÀÕË÷Èí¼þ²¿Êð¡£Æä¹¥»÷ÁìÓò¸²¸ÇÃÀ¹ú¡¢Å·ÖÞ¡¢ÄÏÃÀ¼°Öж«µØÓò £¬Ö¸±êÔ̺¬½ðÈÚ¡¢·¿µØ²úµÈ¶àÐÐÒµ»ú¹¹¡£


https://hackread.com/fake-chatgpt-desktop-app-pipemagic-backdoor-microsoft/