ºÚ¿Í×éÖ¯ÈëÇÖÒÁÀʺ½ÔËϵͳÖÂ60ÓàËÒ´¬Ö»Í¨Ñ¶Ì±»¾
°ä²¼¹¦·ò 2025-08-261. ºÚ¿Í×éÖ¯ÈëÇÖÒÁÀʺ½ÔËϵͳÖÂ60ÓàËÒ´¬Ö»Í¨Ñ¶Ì±»¾
8ÔÂ23ÈÕ£¬Ò»¸ö×Ô³Æ"Lip-Dochtjan"£¨ÓÖ³Æ"The Sewn Lips"£©µÄºÚ¿Í×éÖ¯ÏòÒÁÀʹú¼ÊýÌåÐû³Æ£¬Òѳɹ¦ÈëÇÖÒÁÀʹú¶ÈÓÍÂÖ¹«Ë¾£¨NITC£©ÓëÒÁÀʺ½Ô˹«Ë¾£¨IRISL£©µÄÖ÷Ìâϵͳ£¬µ¼ÖÂ60ÓàËÒ´¬Ö»Í¨Ñ¶Öжϡ£Õâ´Î¹¥»÷ͨ¹ýÒÁÀʿعɹ«Ë¾FannavaµÄÎÀÐÇÍ¨Ñ¶ÍøÂçÖ´ÐУ¬¸Ã¹«Ë¾ÕƹÜΪÒÁÀʺ£ÉÏÔËÊäÌṩÎÀÐÇÊý¾Ý´«Êä¡¢´æ´¢¼°Ö§¸¶·þÎñ¡£¾ÝºÚ¿Í×éÖ¯Åû¶£¬Æäͨ¹ýÉøÈëFannavaϵͳ£¬Ö±½ÓÇÖÈë´¬Ö»ÎÀÐÇÖն˵ÄÖ÷ÌâLinux²Ù×÷ϵͳ£¬³É¹¦½ûÓÃÕÆ¹ÜÒÁÀʺ£ÉÏͨѶµÄרÓ÷¨Ê½Falcon£¬Ôì³É39ËÒÓÍÂÖÓë25ËÒ»õ´¬ÎÞ·¨Óë¸Û¿Ú½øÐÐÐÅÏ¢½»»¥¡£Õâ´Î¹¥»÷¶ÔÒÁÀʺ½ÔËϵͳÔì³ÉË«³Á³å»÷£ºÊ×ÏÈ£¬´¬Ö»Óë½µØÖ¸»ÓÖÐÐĵÄʵʱͨѶÖжϣ¬µ¼Öº½Ðе÷¶È¡¢»õÎïÇ幨µÈ¹Ø¼ü»·½ÚÏÝÈëÖͰ£»Æä´Î£¬ÎÀÐÇϵͳ±»¿ØÊ¹µÃ´¬Ö»¶¨Î»Êý¾Ý¡¢»õÎïÇåµ¥µÈÃô¸ÐÐÅÏ¢Ãæ¶Ôй¶·çÏÕ¡£Ö»¹ÜÒÁÀʹٷ½ÉÐδ¶ÔÊÂÎñϸ½Ú×÷³ö»ØÓ¦£¬µ«ºÚ¿Í×é֯ѡÔñͨ¹ýýÌ幫¿ª¹¥»÷ÊÂʵ£¬°µÊ¾Æä¾ß±¸³ÖÐøÍþвÄÜÁ¦¡£
https://www.marineinsight.com/shipping-news/major-cyberattack-disrupts-communication-on-dozens-of-iranian-ships/
2. AspireÎÀÉúϵͳÔâÍøÂç¹¥»÷£¬14Íò»¼ÕßÃô¸ÐÊý¾Ýй¶
8ÔÂ24ÈÕ£¬ÃÀ¹úÃÜЪ¸ùÖÝ´åÂäÎÀÉúϵͳAspireÔâ·êÍøÂç·¸×ï·Ö×Ó³Ö¾ÃÉøÈ룬µ¼Ö³¬¹ý13.8ÍòÃû»¼ÕßµÄÃô¸ÐÊý¾Ý±»ÇÔÈ¡¡£Õâ´Î¹¥»÷³ÖÐøÊýÔÂδ±»·¢ÏÖ£¬³ÉΪ½üÄêÀ´Ó°ÏìÁìÓò½Ï¹ãµÄÒ½ÁÆÁìÓòÊý¾Ýй¶ÊÂÎñÖ®Ò»¡£Æ¾¾ÝAspireÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»µÄ»ã±¨£¬¹¥»÷Õß»ñÈ¡µÄÐÅÏ¢º¸ÇÓ×ÎÒÉí·Ý¡¢²ÆÕþÐÅÏ¢¼°Ò½Áƽ¡È«Êý¾ÝÈý´óÀ࣬¾ßÌåÔ̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢Éç»á°²È«ºÅÂë¡¢½ðÈÚÕË»§ÏêÇé¡¢Ö§¸¶¿¨ºÅ¼°PINÂë¡¢Ò½ÁÆÕï¶Ï¼Í¼¡¢´¦·½ÐÅÏ¢¡¢±£ÏÕÊý¾Ý¡¢ÉúÎï¼ø±ð±êʶ·û¡¢¼ÝÕÕ¼°»¤ÕÕºÅÂëµÈ16Ïî¸ßÃô¸ÐÄÚÈÝ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬²¿ÃÅ»¼ÕßÊý¾Ý×éºÏÆëÈ«¶È¼«¸ß£¬ÀíÂÛÉϿɹ¹½¨³öÔ̺¬Éí·Ý¡¢²ÆÕþÓëÒ½ÁÆÐÅÏ¢µÄ"ȫά¶ÈÊý×Ö»Ïñ"¡£AspireÔÚÊÂÎñ´«µÝÖÐÇ¿µ÷£¬Ä¿Ç°ÉÐÎÞÃ÷È·Ö¤¾ÝÏÔʾÊý¾ÝÒѱ»ÏÖʵÀÄÓ㬵«Îª½µµÍDZÔÚÓ°Ï죬ÒÑÆô¶¯²¹¾È´ëÊ©£ºÎªËùÓÐÊÜÓ°Ï컼ÕßÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÉí·Ý±£»¤¼°ÐÅÓþ¼à¿Ø·þÎñ£¬Ô̺¬ÊµÊ±ÐÅÓþ»ã±¨¼à²â¡¢Éí·Ý͵ÇÔ¸´ÔÖ§³Ö¼°100ÍòÃÀÔª±£ÏÕÅ⸶±£ÏÕ¡£
https://cybernews.com/security/michigan-aspire-health-system-data-breach/
3. »ùÓÚMiraiµÄGayfemboy½©Ê¬ÍøÂç¾íÍÁ³ÁÀ´
8ÔÂ24ÈÕ£¬Gayfemboy½©Ê¬ÍøÂç×Ô2024Äê2Ô³õ´ÎÏÖÉíÒÔÀ´£¬ÒÑÑݱäΪ¸ß¶È¸´ÔÓ»¯µÄÎïÁªÍøÍþв£¬Æä¹¥»÷ÁìÓò¸²¸Ç°ÍÎ÷¡¢Ä«Î÷¸ç¡¢ÃÀ¹ú¡¢µÂ¹úµÈ8¸ö¹ú¶È£¬Ö¸±êÉæ¼°Ôì×÷Òµ¡¢¿Æ¼¼Òµ¡¢¹¹ÖþÒµµÈ¹Ø¼üÐÐÒµ¡£¸Ã¶ñÒâÈí¼þÒÔMirai±äÖÖΪ»ù´¡£¬Í¨¹ý¼¯³ÉN-dayÓë0-day·ì϶¡¢TelnetÈõÍ´´¦±¬ÆÆ¼°¶à½×¶Î»ìºÏ¼¼Êõ£¬¹¹½¨Æð¾ß±¸×ÔÎÒÓÆ¾Ã»¯¡¢É³ºÐ¶ã±ÜºÍ¾ºÕùÐԶϸùÄÜÁ¦µÄ¹¥»÷ϵͳ¡£×êÑÐÏÔʾ£¬GayfemboyµÄ·ì϶ÀûÓÃÕ½Êõ³öÏÖÏÔÖø½ø»¯¡£2024Äê11Ô£¬Æäͨ¹ýFour-Faith¹¤ÒµÂ·ÓÉÆ÷£¨CVE-2024-12856£©¡¢Neterbit·ÓÉÆ÷¼°VimarÖÇÄܼҾÓÉ豸µÄÁãÈÕ·ì϶£¬ÖðÈÕ»îÔ¾½ÚµãÍ»ÆÆ1.5Íò¸ö£»ÖÁ2025Äê7Ô£¬¹¥»÷ÔØºÉÒÑÀ©´óÖÁ»ªË¶¡¢Vivo¡¢ZyxelºÍRealtekµÈÉ豸£¬²¢¼¯³ÉXMRigÍÚ¿óÄ£¿é¡£Gayfemboyչʾ¶à²ã·ÀÓù»úÔ죺ͨ¹ýÅú¸ÄUPX±êͷѹËõ¶þ½øÔìÎļþ¡¢ÒýÈë50ÄÉÃë¼¶ÑÓ³¤É³ºÐ¼ì²â¼¼Êõ£¬ÒÔ¼°»ùÓÚ¹«¹²DNSµÄËæ»úÓòÃûC2ͨѶ£¬ÓÐЧ¶ã±Ü°²È«¼ì²â¡£¸Ã½©Ê¬ÍøÂçµÄ¹¥»÷ÐÐΪÒÑÔì³É¶à³ÁÍþв£º³ý²¿ÊðÍÚ¿óÄ£¿é±í£¬»¹Õë¶Ô×êÑÐÈËÔ±ÌáÒéDDoS·´Ô죬²¢³¢ÊÔͨ¹ý¶Ë¿ÚɨÃèºáÏòÀ©É¢¡£
https://securityaffairs.com/181480/cyber-crime/iot-under-siege-the-return-of-the-mirai-based-gayfemboy-botnet.html
4. ÃÀ¹úFarmers InsuranceÒòSalesforce¹¥»÷Ö°ÙÍò¿Í»§Êý¾Ýй¶
8ÔÂ25ÈÕ£¬ÃÀ¹ú±£ÏÕ¾ÞÍ·Farmers InsuranceÅû¶һ·ӰÏì110Íò¿Í»§µÄ´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬Æä±¾ÔÖ¸Ïò½ñÄêÒÔÀ´Õë¶ÔSalesforceƽ̨µÄ¶àÆðÍøÂç¹¥»÷¡£¸Ã¹«Ë¾Í¨¹ý¹ÙÍø²¼¸æÖ¤Êµ£¬2025Äê5ÔÂ29ÈÕ£¬ÆäµÚÈý·½¹©¸øÉÌÊý¾Ý¿âÔâδ¾ÊÚȨ½Ó¼û£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¼¿Á©ÇÖÈëSalesforceϵͳ£¬µ¼Ö¿ͻ§ÐÕÃû¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢¼ÝÕÕºÅÂë¼°Éç»á°²È«ºÅÂëºóËÄλµÈÃô¸ÐÐÅÏ¢±»µÁ¡£FarmersÓÚ8ÔÂ22ÈÕÆô¶¯Êܺ¦Õß֪ͨ·¨Ê½£¬²¢ÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»»ã±¨£¬µ«Î´¹«¿ªµÚÈý·½¹©¸øÉ̾ßÌåÃû³Æ¡£FarmersÔÚÊÂÎñÏìÓ¦ÖÐÇ¿µ÷£¬µÚÈý·½¹©¸øÉÌͨ¹ý²¿Êð¼à¿Ø¹¤¾ßѸ¿ì¼ì²âµ½Òì³£»î¶¯²¢×è¶Ï¹¥»÷õè¾¶£¬¹«Ë¾Í¬²½Æô¶¯È«Ãæµ÷²é²¢´«µÝ·¨Âɲ¿ÃÅ¡£Ö»¹Ü²ÉÈ¡ÁËÓ¦¼±´ëÊ©£¬µ«¹¥»÷ÕßÀûÓÃSalesforceƽ̨¼¯Öд洢ÆóÒµ¿Í»§Êý¾ÝµÄ¸öÐÔ£¬ÈÔÔì³É°ÙÍò¼¶Óû§ÐÅϢй¶¡£Õâ´ÎÊÂÎñÓë½ñÄêÈ«Çò¶àÆðSalesforceÊý¾Ý͵ÇÔ°¸´æÔÚ¹ØÁª¡£Íþв×éÖ¯UNC6040/UNC6240ͨ¹ý"ÓïÒô´¹µö"£¨Vishing£©Ö´ÐÐÉç»á¹¤³Ì¹¥»÷£¬ÓÕÆÆóÒµÔ±¹¤½«¶ñÒâOAuthÀûÓÃÓëSalesforceÊ·ý¹ØÁª£¬´Ó¶ø³ÉÁ¢ÓƾýӼûȨÏÞ¡£
https://www.bleepingcomputer.com/news/security/farmers-insurance-data-breach-impacts-11m-people-after-salesforce-attack/
5. ·¨¹úÅ·ÉÐÁãÊÛ¼¯ÍÅÔâ·ê´ó¹æÄ£Êý¾Ýй¶£¬Ó°ÏìÊýÊ®Íò¿Í»§
8ÔÂ25ÈÕ£¬·¨¹ú¿ç¹úÁãÊÛ¾ÞÍ·Å·ÉУ¨Auchan£©½üÈÕÅû¶һ·ӰÏìÊýÊ®Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ£¬Æä»áÔ±Öҳ϶ȴòËãÓйصÄÃô¸ÐÐÅÏ¢Ôâδ¾ÊÚȨ½Ó¼û¡£¸Ã¹«Ë¾ÔÚÏòÊÜÓ°ÏìÓû§·¢Ë͵Ä֪ͨÖÐ֤ʵ£¬¹¥»÷Õßͨ¹ýÍøÂç¹¥»÷»ñÈ¡Á˿ͻ§È«Ãû¡¢Ö°³Æ¡¢¿Í»§×´Ì¬¡¢ÓÊÕþµØÖ·¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¼°»áÔ±¿¨ºÅµÈÓ×ÎÒÐÅÏ¢£¬µ«Ç¿µ÷ÒøÐÐÕË»§Êý¾Ý¡¢ÕË»§ÃÜÂë¼°PINÂëδÊܲ¨¼°¡£×÷ΪŷÖÞ¼°·ÇÖÞ13¸ö¹ú¶ÈÕ¼Óг¬2100¼Ò·Öµê¡¢ÄêÊÕÈëÓâ350ÒÚÃÀÔªµÄÁãÊÛ¼¯ÍÅ£¬Å·ÉÐÔÚÊÂÎñÏìÓ¦ÖÐÒÑÏò·¨¹úÊý¾Ý±£»¤¾Ö£¨CNIL£©Õýʽ´«µÝ£¬²¢ÌáÐÑÓû§¾¯ÌèDZÔÚµÄÍøÂç´¹µö¹¥»÷¡£Í¨ÖªÃ÷È·Ö¸³ö£¬Å·Éоø²»»áͨ¹ýÈκÎÇþ·Ë÷È¡Óû§µÇ¼ƾ֤¡¢ÃÜÂë»ò»áÔ±¿¨PINÂ룬½¨ÒéÊÕµ½¿ÉÒÉÐÂÎŵÄÓû§µ±¼´ºöÂÔ²¢Ô¤·Àµã»÷Á´½Ó»ò»Ø²¦µç»°¡£
https://www.bleepingcomputer.com/news/security/auchan-retailer-data-breach-impacts-hundreds-of-thousands-of-customers/
6. Google PlayÒÑÒÆ³ý×°ÖÃÁ¿´ï1900ÍòµÄ¶ñÒâAndroidÀûÓÃ
8ÔÂ25ÈÕ£¬ZscalerµÄThreatLabsÍŶӽüÈÕÅû¶£¬Google PlayÉÌµê´æÔÚ77¸ö¶ñÒâAndroidÀûÓã¬×Ü×°ÖÃÁ¿Í»ÆÆ1900Íò´Î£¬Éæ¼°Joker¡¢Harly¡¢Anatsa£¨Tea Bot£©µÈ¶à¸ö¶ñÒâÈí¼þ¼Ò×å¡£ÆäÖУ¬¸æ°×Èí¼þ×é¼þÕ¼±È³¬66%£¬¶øJoker×÷Ϊ×î»îÔ¾µÄÒøÐÐľÂí£¬³Ê´Ë¿Ì½ü25%µÄ·ÖÎöÑù±¾ÖС£´ËÀà¶ñÒâÈí¼þͨ¹ý¼Ù×°³ÉºÏ·¨ÀûÓã¨ÈçÓÎÏ·¡¢±ÚÖ½¡¢¹¤¾ßÀàÈí¼þ£©´«²¼£¬²¿ÃÅÀûÓÃÉõÖÁѡȡ"ÑÚÂëÈí¼þ"¼¼Êõ£¬ÔÚÌṩÕý³£Ö°ÄܵÄͬʱ£¬ºó¶ÜÖ´ÐÐÇÔÈ¡¶ÌÐÅ¡¢ÁªÏµÈË¡¢ÒøÐÐÆ¾Ö¤¼°¶©Ôĸ߼¶·þÎñµÈ¶ñÒâ²Ù×÷¡£×êÑгÁµã½ÒʾÁËAnatsaÒøÐÐľÂíµÄ³ÖÐø½ø»¯¡£¸ÃľÂí×îа汾½«Ö¸±êÒøÐм°¼ÓÃÜÇ®±ÒÀûÓÃÊýÁ¿´Ó650¸öÀ©´óÖÁ831¸ö£¬¸²¸ÇµÂ¹ú¡¢º«¹úµÈÐÂÇøÓò£¬²¢ÐÂÔö¼üÅ̼ͼģ¿é¡£Æä´«²¼Õ½ÊõÒ²Éý¼¶ÎªÖ±½Ó×°ÖÃÓÐÐ§ÔØºÉ£¬´úÌæ´ËǰµÄÔ¶³ÌDEX¶¯Ì¬¼ÓÔØ¡£Îª¶ã±ÜÉó²é£¬¹¥»÷ÕßʹÓÃÌåʽÃýÎóµÄAPKµµ°¸Í»ÆÆ¾²Ì¬·ÖÎö£¬½áºÏDES¼ÓÃÜ×Ö·û´®½âÃܼ°·ÂÕÕ¼ì²â¼¼Êõ£¬²¢¶¨ÆÚ¸ü»»Èí¼þ°üÃû³ÆºÍ¹þÏ£Öµ¡£Anatsa»¹ÀÄÓÃAndroid¸¨ÖúÖ°ÄÜȨÏÞ×Ô¶¯»ñÈ¡ÌØÈ¨£¬Í¨¹ý´¹µöÒ³ÃæÇÔÈ¡Êý¾Ý¡£¹È¸èÒÑɾ³ýËùÓÐÉæÊÂÀûÓ㬲¢½¨ÒéÓû§ÆôÓÃPlay Protect·þÎñ¡¢½öÊÚȨ±ØÒªÈ¨ÏÞ¡¢Ñ¡Ôñ¿ÉÐÅ¿ª·¢Õß¡£
https://www.bleepingcomputer.com/news/security/malicious-android-apps-with-19m-installs-removed-from-google-play/


¾©¹«Íø°²±¸11010802024551ºÅ