ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾ÖÔâ·êÍøÂç¹¥»÷£¬²Ð¼²ÈË·þÎñϵͳÊÜÓ°Ïì
°ä²¼¹¦·ò 2025-08-271. ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾ÖÔâ·êÍøÂç¹¥»÷£¬²Ð¼²ÈË·þÎñϵͳÊÜÓ°Ïì
8ÔÂ26ÈÕ£¬ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾Ö£¨MTA£©½üÈÕÔâ·êһ·Õë¶ÔÆä²Ð¼²È˽»Í¨·þÎñϵͳµÄÍøÂç¹¥»÷£¬µ¼Ö²¿ÃŹؼüÖ°ÄÜÖжϡ£ÖÜÈÕ£¬MTAͨ¹ýÉ罻ýÌåºÍ¹Ù·½ÍøÕ¾°ä²¼ÖҸ棬³Æ²úÉúÁËÒ»Â·Éæ¼°Î´¾ÊÚȨ½Ó¼ûijЩϵͳµÄÍøÂçÊÂÎñ¡£Ö»¹ÜÖ÷Ì⽻ͨ·þÎñÈ繫½»Ïß·¡¢µØÌúºÍÇá¹ìϵͳδÊÜÓ°Ï죬µ«×¨ÃÅΪ²ÐÕÏÈËÊ¿ÌṩµÄ¡°³öÐзþÎñ¡±£¨Mobility£©µÄʵʱÐÅϢϵͳ¼°ÆäËû¹¤¾ßÔâ·ê³å»÷¡£¸Ã·þÎñÖ¼ÔÚΪÎÞ·¨×ÔÐÐǰÍù¹«½»³µÕ¾»òºò³µµÄȺÌåÌṩ¶¨Ô컯½»Í¨Ö§³Ö£¬Í¨¹ýÍøÕ¾Ô¤Ô¼ÊµÏÖ´Ó¼ÒÃŵ½Ö÷ÕŵصĽÓËÍ¡£¹¥»÷µ¼ÖÂMTAµÄÒÆ¶¯·þÎñÎÞ·¨ÆÌÅÅÐÂÐг̻ò³ÁÐÂÔ¤Ô¼ÏÖÓÐÐг̣¬²¿ÃÅʵʱÐÅÏ¢¸üм°ºô½ÐÖÐÐÄÖ°ÄÜÒà¿ÉÄÜÊÜÏÞ¡£MTA°µÊ¾£¬ÒÑÓëµÚÈý·½ÍøÂ簲ȫר¼Ò¼°·¨Âɲ¿ÃźÏ×÷£¬ÆÀ¹ÀÊÂÎñÁìÓò²¢²ÉÈ¡»º½â´ëÊ©¡£Ö»¹Ü±¾ÖÜËùÓÐÒÑÆÌÅŵijöÐдòËãÈÔÓÐЧ£¬µ«ÐÂÓû§Ðèͨ¹ý´úÌæ¹æ»®£¨ÈçCall-A-Ride·þÎñ£©½øÐÐÔ¤Ô¼£¬¿Éͨ¹ý¹Ù·½ÍøÕ¾»òµç»°½Ó¼û¡£
https://therecord.media/maryland-cyberattack-transit-disabled-people
2. ¶íÂÞ˹FSB¿ª·¢ÐÂÐÍAndroid¼äµýÈí¼þ£¬¼Ù×°³É·À²¡¶¾¹¤¾ß
8ÔÂ24ÈÕ£¬¶íÂÞ˹Áª¹ú°²È«¾Ö£¨FSB£©±»ÆØ¿ª·¢Ò»¿îÐÂÐÍAndroid¶ñÒâÈí¼þ£¬¼Ù×°³É·À²¡¶¾¹¤¾ß£¬×¨ÃÅÕë¶Ô¶íÂÞ˹ÆóÒµ¸ß¹ÜÌáÒ鶨ÏòÍøÂç¹¥»÷¡£¾Ý¶íÂÞË¹ÒÆ¶¯°²È«¹«Ë¾Dr. WebµÄ×îл㱨£¬¸Ã¶ñÒâÈí¼þ±»¶¨ÃûΪ¡°Android.Backdoor.916.origin¡±£¬×Ô2025Äê1Ô³õ´Î·¢ÏÖÒÔÀ´ÒÑÑÝ»¯¶à¸ö°æ±¾£¬ÏÔʾÆä´¦ÓÚ³ÖÐø¿ª·¢ÖС£¸Ã¼äµýÈí¼þ¾ß±¸¶àÏî¸ß¼¶Ö°ÄÜ£¬Ô̺¬¼àÌý¶Ô»°¡¢Í¨¹ýÊÖ»úÉãÏñͷʵʱ´«ÊäÊÓÆµ¡¢¼Í¼¼üÅÌÊäÈë¡¢ÇÔȡͨѶÀûÓã¨ÈçTelegram¡¢WhatsApp¡¢Gmail£©Êý¾Ý£¬ÉõÖÁ²¶»ñÆÁÄ»ÄÚÈÝ¡£×°Öú󣬶ñÒâÈí¼þ»áÒªÇóµØÀíµØÎ»¡¢¶ÌÐŽӼû¡¢ÉãÏñÍ·/Âó¿Ë·çʹÓᢸ¨ÖúÖ°ÄÜ·þÎñµÈ¸ß·çÏÕȨÏÞ£¬²¢³Ö¾ÃפÁôºó¶Ü¡£ÆäºÅÁîÓë½ÚÔ죨C2£©·þÎñÆ÷¿ÉÔ¶³ÌÖ¸ÁîÇÔÈ¡¶ÌÐÅ¡¢ÁªÏµÈË¡¢Í¨»°¼Í¼¼°´æ´¢Í¼Ïñ£¬»ò¼¤»îÂó¿Ë·ç¡¢ÉãÏñÍ·½øÐÐʵʱ¼à¿Ø£¬ÉõÖÁÖ´ÐÐShellºÅÁîÒÔά³ÖÓÆ¾Ã»¯½ÚÔì¡£Dr. Web·ÖÎöÖ¸³ö£¬¸Ã¶ñÒâÈí¼þͨ¹ý¶íÓï½çÃæ¡¢¼ÙÒâ¶íÂÞ˹¹Ù·½»ú¹¹£¨ÈçÖÐÑëÒøÐм°FSB×ÔÉí£©µÄÈí¼þ½øÐзַ¢¡£Æä½ö¶íÓï½çÃæ¡¢Õë¶Ô¶íÂÞ˹ÆóÒµµÄ·Ö·¢Õ½Êõ¼°¼ÙÒâ±¾ÍÁ»ú¹¹µÄÐÐΪ£¬Ã÷È·Ö¸Ïò¶¨Ïò¹¥»÷£¬Ö¸±ê»òΪ»ñÈ¡ÆóÒµÃô¸ÐÐÅÏ¢¼°¸ß¹ÜͨѶÊý¾Ý¡£
https://www.bleepingcomputer.com/news/security/new-android-malware-poses-as-antivirus-from-russian-intelligence-agency/
3. ¿Æ¼¼Ôì×÷ÉÌData I/OÔâÀÕË÷¹¥»÷£¬ÖÂÔËӪϵͳ̱»¾
8ÔÂ22ÈÕ£¬¿Æ¼¼Ôì×÷ÉÌData I/O Corporation£¨NASDAQ: DAIO£©½üÈÕÏòÃÀ¹ú֤ȯÂòÂôίԱ»á£¨SEC£©Ìá½»»ã±¨£¬Åû¶ÆäÓÚ8ÔÂ16ÈÕÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÔËÊä¡¢Ôì×÷¡¢³ö²úµÈÖ÷ÌâÔËӪϵͳ̱»¾¡£Õâ¼Ò×ܲ¿Î»ÓÚ»ªÊ¢¶ÙÖÝÀ×µÂÃɵĹ«Ë¾×¨Ò»ÓÚΪÆû³µµç×Ó¡¢Ïû·ÑÉ豸µÈÁìÓòÌṩ±à³ÌÓ밲ȫÊýÊð½â¾ö¹æ»®£¬Æä¿Í»§º¸ÇÌØË¹À¡¢ËÉÏ¡¢ÑÇÂíÑ·¡¢¹È¸è¡¢Î¢ÈíµÈÈ«Çò³ÛÃûÆóÒµ£¬2025ÄêµÚ¶þ¼¾¶È³¬¹ý65%µÄÒµÎñÀ´×ÔÆû³µµç×Ó³ö²ú£¬Ô̺¬ÓëÖйúµç¶¯³µÔì×÷É̺Ï×÷µÄ³äµçÕ¾¼¼ÊõÏîÄ¿¡£¹¥»÷²úÉúºó£¬Data I/OѸ¿ì²ÉÈ¡¶ôÔì´ëÊ©£¬½«ÊÜÓ°ÏìϵͳÏÂÏßÒÔ±£»¤È«ÇòITÍøÂ磬²¢Æô¶¯µÚÈý·½µ÷²é¡£µ«½ØÖÁ»ã±¨Ìύʱ£¬ÏµÍ³¸´Ô¹¦·ò±íÈÔδÃ÷È·£¬¹«Ë¾ÖÒ¸æ³ÆÊÂÎñÓйسɱ¾£¨Ô̺¬ÍøÂ簲ȫר¼ÒÓöȡ¢ÏµÍ³½¨¸´Ö§³öµÈ£©¿ÉÄÜ¶ÔÆä¾½»Ò×¼¨¼°²ÆÕþÇé¿ö²úÉú³Á´óÓ°Ïì¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¸Ã¹«Ë¾Éϼ¾¶ÈÏúÊÛ¶îΪ590ÍòÃÀÔª£¬½Ï2025ÄêµÚÒ»¼¾¶ÈÏ÷¼õ30ÍòÃÀÔª£¬Õâ´Î¹¥»÷»ò½øÒ»²½¼Ó¾çÆä²ÆÕþѹÁ¦¡£
https://therecord.media/electronics-manufacturer-dataio-ransomware
4. ÄÚ»ª´ïÖݵ±¾ÖÔâÍøÂç¹¥»÷ÖÂÍøÕ¾¼°µç»°ÏµÍ³È«ÃæÌ±»¾
8ÔÂ24ÈÕ£¬ÃÀ¹úÄÚ»ª´ïÖݵ±¾ÐļÊõϵͳÔâ·êÑϳÁÍøÂ簲ȫÊÂÎñ£¬µ¼ÖÂÖݵ±¾ÖÍøÕ¾¡¢µç»°·þÎñ¼°ÏßÏÂ°ì¹«È«ÃæÌ±»¾¡£Õâ´ÎÊÂÎñ³ÖÐøÓ°ÏìÖÝÄÚ¶à¸ö¹«¹²·þÎñÇþ·£¬Òý·¢µ±¾ÖÓëÁª¹ú»ú¹¹µÄ¸ß¶È¹Ø×¢¡£¾ÝÖݳ¤ÇÇ¡¤Â¡°Í¶àÉêÃ÷£¬Ö»¹Ü´¹Î£·þÎñÈÔά³ÖÔË×÷£¬µ«¼¼ÊõϵͳµÄ³ÖÐøÐÔ¹ÊÕÏÒÑÔì³ÉÏÔÖø·þÎñÖжϡ£½ØÖÁÖÜÒ»Íí¼ä£¬Öݵ±¾Ö¹Ù·½ÍøÕ¾ÈÔ´¦ÓÚÀëÏß״̬£¬µç»°Ïß·¼°²¿ÃÅÏßÉÏ·þÎñ³öÏÖÏìÓ¦ÑÓ³¤»òÖжϡ£Îª×î´óÏÞ¶Èά³Ö¹«¹²·þÎñ£¬Öݵ±¾ÖÒÑÆô¶¯Ò»Ê±Â·Óɹ滮ºÍ´úÌæÐÔ²Ù×÷Á÷³Ì£¬²¢Óë´¦Ëù¡¢²¿Âä¼°Áª¹úºÏ×÷ͬ°é·¢Õ¹½áºÏ¸´ÔÐж¯¡£Êܼ¼Êõ¹ÊÕÏÓ°Ï죬ȫÖݵ±¾Ö°ì¹«ÊÒÖÜÒ»ÔÝÍ£ÏßÏ·þÎñ£¬¾ßÌ帴Թ¦·ò½«ÁíÐÐ֪ͨ¡£ÊÂÎñµ÷²éÈÔÔÚ½øÐÐÖУ¬Áª¹úµ÷²é¾ÖÒÑȾָÐÖúËÝÔ´£¬µ«Ä¿Ç°ÉÐÎÞÈκκڿÍ×éÖ¯Ðû³Æ¶Ô´ËÕÆ¹Ü¡£Öݵ±¾Ö³ö¸ñÌáÐѾÓÃñÌá¸ß¾¯Ì裬ǿµ÷¹Ù·½»ú¹¹¾ø²»»áͨ¹ýµç»°»òÓʼþË÷È¡Ó×ÎÒÐÅÏ¢»òÒøÐÐÕË»§×ÊÁÏ£¬½÷·ÀÚ¿ÆÐÐΪ¡£Õë¶Ô¹«¼Ò¹ØÇеÄÊý¾Ýй¶·çÏÕ£¬Öݳ¤ÉêÃ÷°µÊ¾½«³¹µ×µ÷²éÊÇ·ñ´æÔÚÃô¸ÐÐÅÏ¢±íйÇé¿ö¡£
https://therecord.media/nevada-state-websites-phones-cyberattack-disruption
5. Salesloftƽ̨ÔâºÚ¿ÍÈëÇÖÖÂSalesforceÊý¾Ýй¶
8ÔÂ26ÈÕ£¬ÃÀ¹úÏúÊÛ×Ô¶¯»¯Æ½Ì¨SalesloftÔâ·ê³Á´ó°²È«ÊÂÎñ£¬ºÚ¿Íͨ¹ýÇÔÈ¡ÆäÓëSalesforce¼¯³ÉµÄDrift̸Ìì´úÀíOAuthÁîÅÆ¼°Ë¢ÐÂÁîÅÆ£¬³É¹¦ÇÖÈë¿Í»§»·¾³²¢Ö´Ðдó¹æÄ£Êý¾Ý͵ÇÔ¡£Õâ´ÎÊÂÎñ¶³öÁ˵ÚÈý·½Æ½Ì¨¼¯³É´øÀ´µÄ°²È«Òþ»¼£¬Òý·¢¶ÔÔÆ¶ËÆóÒµ·þÎñÉú̬Á´´àÈõÐÔµÄ¿í·º¹Ø×¢¡£¾ÝSalesloftÅû¶£¬ÍþвÐÐΪÕßÓÚ8ÔÂ8ÈÕÖÁ18ÈÕÆÚ¼ä£¬ÀûÓÃÇÔÈ¡µÄÁîÅÆ½Ó¼ûÁËʹÓÃDrift-Salesforce¼¯³ÉµÄ¿Í»§SalesforceÊ·ý£¬Í¨¹ýÖ´ÐÐSOQL²éÎÊÇÔÈ¡AWS½Ó¼ûÃÜÔ¿¡¢ÃÜÂë¼°SnowflakeÓйØÁîÅÆµÈÃô¸Ðƾ֤¡£¹¥»÷ÕßÉõÖÁͨ¹ýɾ³ý²éÎÊÈÕÖ¾¸²¸ÇÐÐ×Ù£¬µ«Î´Ó°ÏìϵͳÉ󼯼ͼ¡£SalesloftÒÑÓëSalesforceºÏ×÷£¬´¹Î£³·ÏúËùÓÐDriftÀûÓõĻîÔ¾ÁîÅÆ£¬²¢ÒªÇó¿Í»§³ÁÐÂÈÏÖ¤£¬ÖÎÀíÔ±Ðèͨ¹ý"ÉèÖÃ-¼¯³É-Salesforce"¶Ï¿ªÏνӺó³ÁÐÂÊÚȨ¡£Õâ´Î¹¥»÷Ò»Á¬ÁË2025ÄêÒÔÀ´Õë¶ÔSalesforceƽ̨µÄ¹¥»÷º£³±¡£
https://www.bleepingcomputer.com/news/security/salesloft-breached-to-steal-oauth-tokens-for-salesforce-data-theft-attacks/
6. Citrix½¨¸´ÁËÁãÈÕ¹¥»÷ÖÐÀûÓõÄÑϳÁNetScaler RCE·ì϶
8ÔÂ26ÈÕ£¬Citrix£¨ÔÆÈí¼þ¼¯ÍÅ£©°ä²¼´¹Î£°²È«¸üУ¬½¨¸´ÁËÓ°ÏìÆäNetScaler ADCºÍNetScaler GatewayÉ豸µÄÈý¸ö¸ßΣ·ì϶£¬ÆäÖÐ×îÑϳÁµÄCVE-2025-7775Òѱ»Ö¤ÊµÔâºÚ¿Í»ý¼«ÀûÓÃΪÁãÈÕ·ì϶¡£¸Ã·ì϶ΪÄÚ´æÒç³öÃýÎó£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚδ´ò²¹¶¡µÄÉ豸ÉÏÔ¶³ÌÖ´ÐÐËÁÒâ´úÂ룬ֱ½ÓÍþвÆóÒµÍøÂçÖ÷Ìâ»ù´¡ÉèÊ©¡£CitrixÔÚ²¼¸æÖÐÇ¿µ÷£¬½ØÖÁ8ÔÂ26ÈÕ£¬Òѹ۲쵽Õë¶Ô믧½âÉ豸µÄÏÖʵ¹¥»÷°¸Àý£¬µ«Î´Ìṩ¾ßÌå¹¥»÷Ö¸±ê»òÊܺ¦ÕßÐÅÏ¢¡£ÓÉÓÚ²»×ãһʱ»º½â´ëÊ©£¬¹«Ë¾¡°Ç¿ÁÒ½¨Ò顱ÖÎÀíÔ±µ±¼´½«NetScaler¹Ì¼þÉý¼¶ÖÁ×îа汾¡£ÎªÔ®ÊÖÓû§×Ô²é·çÏÕ£¬Citrix°ä²¼ÁËÒ×Êܹ¥»÷É豸µÄÅäÖÃÌØµã£ºÉ豸ÐèÒÔÍø¹ØÄ£Ê½£¨VPN¡¢ICA´úÀíµÈ£©ÔËÐУ¬»ò°ó¶¨IPv6·þÎñµÄHTTP/SSL/HTTP_QUICÀàÐ͸ºÔØÆ½ºâÐé¹¹·þÎñÆ÷µÈÌØ¶¨ÅäÖá£Õâ´Î¸üÐÂͬʱ½¨¸´ÁËÁí±íÁ½¸ö·ì϶£º»Ø¾ø·þÎñ·ì϶CVE-2025-7776ºÍÖÎÀí½çÃæ½Ó¼û½ÚÔìȱµãCVE-2025-8424¡£°²È«×êÑÐÔ±Ö¸³ö£¬¹¥»÷Õß¿ÉÄÜͨ¹ý·ì϶Á´Ê½ÀûÓã¬ÏÈͨ¹ýCVE-2025-7775Ö²Èë¶ñÒâ´úÂ룬ÔÙÀûÓÃCVE-2025-8424ºáÏòÉøÈëÖÎÀí½çÃæ¡£
https://www.bleepingcomputer.com/news/security/citrix-fixes-critical-netscaler-rce-flaw-exploited-in-zero-day-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ