iCloudÈÕÀú±»ÀÄÓôÓApple·þÎñÆ÷·¢ËÍ´¹µöÓʼþ
°ä²¼¹¦·ò 2025-09-091. iCloudÈÕÀú±»ÀÄÓôÓApple·þÎñÆ÷·¢ËÍ´¹µöÓʼþ
9ÔÂ7ÈÕ£¬½üÆÚÒ»ÖÖÀûÓÃiCloudÈÕÀúÔ¼ÇëÖ°ÄܵÄÐÂÐÍÍøÂç´¹µö¹¥»÷ÆØ¹â¡£¹¥»÷Õßͨ¹ý´´½¨Ô̺¬´¹µöÎı¾µÄiCloudÈÕÀúÊÂÎñ£¬²¢Ô¼Çë½ÚÔìµÄ±í²¿ÓÊÏ䵨ַ£¬µ¼ÖÂApple¹Ù·½·þÎñÆ÷×Ô¶¯·¢ËͼÙ×°³ÉPayPal¸¶¿î֪ͨµÄ´¹µöÓʼþ¡£´ËÀàÓʼþÐû³ÆÓû§ÕË»§±»¿Û¿î599ÃÀÔª£¬¸½ÓÓ×°Ö§³Öµç»°¡±ÓÕµ¼Êܺ¦Õß²¦´òڿƺÅÂ룬½ø¶øÍ¨¹ýÔ¶³Ì½Ó¼ûÇÔÈ¡×ʽ𡢲¿Êð¶ñÒâÈí¼þ»òÇÔÈ¡Êý¾Ý¡£¸Ã¹¥»÷ÆæÃîÀûÓÃÁËAppleÓʼþ·þÎñÆ÷µÄÐÅÀµ±³Ê飺Óʼþͨ¹ýSPF¡¢DMARCºÍDKIMÈý³Á°²È«ÈÏÖ¤£¬ÏÔʾΪ¡°ºÏ·¨ÆðÔ´¡±£¬¼«´ó½µµÍÁ˱»À¬»øÓʼþ¹ýÂËÆ÷À¹½ØµÄ¸ÅÂÊ¡£¾ßÌå»úÔìÏÔʾ£¬¹¥»÷ÕßÔÚiCloudÈÕÀúµÄNotes×Ö¶ÎǶÈë´¹µöÄÚÈÝ£¬Ô¼ÇëMicrosoft 365ÓÊÏ䵨ַ£¬µ±Óʼþ¾ÓÉMicrosoft 365ÓʼþÁбíת·¢Ê±£¬ÏµÍ³Í¨¹ý·¢¼þÈ˳Áд¹æ»®£¨SRS£©½«·µ»Øõè¾¶Åú¸ÄΪ¹ØÁªµØÖ·£¬Î¬³ÖSPF²é³Í¨¹ý£¬È·±£ÓʼþÖ±´ïÊÕ¼þÏä¡£´ËÀ๥»÷ÓëPayPal¡°ÐµØÖ·¡±´¹µöÊÖ·¨ÀàËÆ£¬¾ùÒÀÀµºÏ·¨Æ½Ì¨Ö°ÄÜÖ´ÐкýŪ¡£Ö»¹Ü´¹µöµö¶ü×ÔÉíÎÞ´´Ð£¬µ«½áºÏApple·þÎñÆ÷±³ÊéºÍÈÕÀúÔ¼ÇëµÄ¡°¹Ù·½ÊôÐÔ¡±£¬¹¥»÷¸ü¾ß¹Æ»óÐÔ¡£
https://www.bleepingcomputer.com/news/security/icloud-calendar-abused-to-send-phishing-emails-from-apples-servers/
2. AnuvuÔâºÚ¿Í¹¥»÷й¼ûô¸ÐÊý¾Ý£¬Â¶³öº½¿Õ¿Í»§StarlinkʹÓÃÐÅÏ¢
9ÔÂ5ÈÕ£¬»úÉÏÓéÀÖÓëÏνӷþÎñÌṩÉÌAnuvu£¨ÔGlobal Eagle£©Ôâ·êÑϳÁÊý¾Ýй¶ÊÂÎñ£¬¹¥»÷ÕßÔÚ°µÍøÂÛ̳Ðû³ÆÇÔÈ¡´óÁ¿ÖÎÀíÔ±¼¶±ðƾ֤£¬¿É½Ó¼ûÆäAWS¼°PostgresÊý¾Ý¿â¡£Ð¹Â¶ÄÚÈÝÔ̺¬º£Ê¿ͻ§¹«Ë¾Ãû³Æ¡¢Salesforce±êʶ·û¼°Êг¡ÀàÐÍ£»2024ÄêÓû§Æ¾Ö¤£¨º¬È«Ãû¡¢ÓÊÏä¡¢ÃÜÂë¹þÏ£¡¢µØÖ·£©£»ÖÎÀíÈËÔ±Ó×ÎÒÐÅÏ¢¼°°ì¹«µØÖ·£»¸ü¹Ø¼üµÄÊÇ£¬StarlinkºÏͬÃ÷ϸÔâ¶³ö£¬Ö±½ÓÏÔʾÄÄЩ¿Í»§Í¨¹ýAnuvuʹÓÃStarlink·þÎñ¡£Anuvu×÷ΪÄêÊÕÈëÔ¼3.7ÒÚÃÀÔª¡¢·þÎñÈ«Çò150Óà¼Òº½¿Õ¹«Ë¾¼°30¼ÒÓÊÂÖ¹«Ë¾µÄÐÐÒµ¾ÞÍ·£¬ÆäºÏ×÷ͬ°éº¸Ç·¨º½¡¢´ïÃÀº½¿ÕµÈ³ÛÃûº½Ë¾¡£Õâ´Î¹¥»÷¶³öµÄÃô¸ÐÐÅÏ¢´æÔÚ¶à³Á·çÏÕ£º¹¥»÷Õß¿ÉÄÜÀûÓÃδÅú¸ÄµÄ2024ÄêÃÜÂëÖ´ÐÐÆ¾Ö¤Ìî³ä¹¥»÷£»Ð¹Â¶µÄ¿Í»§ÐÅÏ¢¿É±»ÓÃÓÚ¶¨Ïò´¹µö¹¥»÷£¬»òÌáÇ°Ëø¶¨¹¥»÷Ö¸±ê£»ÖÎÀíÈËÔ±¼°Óû§µØÖ·µÄ¶³ö¸ü¿ÉÄÜÒý·¢¶þ´ÎÉç»á¹¤³Ì¹¥»÷¡£Anuvu·½ÃæÉÐδ¶Ô´ËÊÂ×÷³öÕýʽ»ØÓ¦¡£
https://cybernews.com/security/anuvu-airline-data-breach-credentials/
3. NPM¹©¸øÁ´Ôâ´¹µö¹¥»÷£º¸ßÏÂÔØÁ¿°ü±»×¢Èë¼ÓÃܽٳֶñÒâÈí¼þ
9ÔÂ8ÈÕ£¬½üÈÕÒ»³¡Õë¶ÔNPMÈí¼þ°üµÄ¹©¸øÁ´¹¥»÷Òý·¢¿í·º¹Ø×¢¡£¹¥»÷Õßͨ¹ý´¹µöÓʼþÈëÇÖÈí¼þ°üÊØ»¤ÕßJosh Junon£¨qix£©µÈÕË»§£¬ÀûÓÃαÔìnpmjs.comÓòÃûµÄnpmjs[.]helpÍøÕ¾£¬ÒÔ"2FAƾ֤¹ýÆÚ½«Ëø¶¨ÕË»§"ΪÓÉÓÕµ¼µã»÷Á´½Ó£¬½ø¶ø×¢Èë¶ñÒâ´úÂëÖÁ¸ßÏÂÔØÁ¿NPM°üÖС£¾Ý·ÖÎö£¬±»½Ù³ÖµÄ18¸öÈí¼þ°üÿÖÜ×ÜÏÂÔØÁ¿³¬26ÒڴΣ¬Ô̺¬debug£¨3.576ÒڴΣ©¡¢chalk£¨2.9999ÒڴΣ©¡¢ansi-styles£¨3.7141ÒڴΣ©µÈÖ÷Ì⹤¾ß¡£¶ñÒâ´úÂëͨ¹ý×¢Èëindex.jsÎļþ£¬ÔÚä¯ÀÀÆ÷¶ËÔËÐлùÓÚä¯ÀÀÆ÷µÄÀ¹½ØÆ÷£¬¼à¿ØÒÔÌ«·»¡¢±ÈÌØ±ÒµÈ¼ÓÃÜÇ®±ÒÂòÂô£¬µ±¼ì²âµ½ÍøÂçÏìÓ¦Ô̺¬¼ÓÃÜÂòÂôʱ£¬×Ô¶¯½«Ö¸±êÇ®°üµØÖ·´úÌæÎª¹¥»÷Õß½ÚÔìµØÖ·£¬½Ù³ÖÂòÂôÊðÃûǰµÄ×ʽðÁ÷Ïò£¬ÇÒÓû§ÎÞÏÔÖø¸ÐÖª¡£¸Ã¶ñÒâÈí¼þͨ¹ý¹Ò¹³JavaScriptº¯Êý¼°Ç®°üAPIʵÏÖÁ÷Á¿´Û¸Ä£¬²»½öÅú¸ÄÍøÒ³ÏÔʾÄÚÈÝ£¬»¹Ö±½Ó°Ñ³ÖAPIŲÓü°Óû§Ç©ÊðµÄÂòÂôÄÚÈÝ£¬Ðγɶ൵´Î¹¥»÷¡£NPMÍŶÓÒÑ´¹Î£É¾³ý²¿ÃŶñÒâ°æ±¾£¬µ«²¿ÃŰüÈÔ´æÔÚ·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/hackers-hijack-npm-packages-with-2-billion-weekly-downloads-in-supply-chain-attack/
4. PlexÉí·ÝÑéÖ¤ÐÅϢʧÇÔ£¬Óû§Ð费Σ³ÁÖÃÃÜÂë
9ÔÂ8ÈÕ£¬Ã½ÌåÁ÷ýÌåÆ½Ì¨Plex½üÈÕÔâ·êÑϳÁÊý¾Ýй¶ÊÂÎñ£¬ºÚ¿Í´ÓÆäÊý¾Ý¿âÖÐÇÔÈ¡Á˿ͻ§Éí·ÝÑéÖ¤Êý¾Ý£¬Éæ¼°µç×ÓÓʼþµØÖ·¡¢Óû§Ãû¡¢°²È«É¢ÁÐÃÜÂë¼°Éí·ÝÑéÖ¤Êý¾Ý¡£PlexÔÚ֪ͨÖÐ֤ʵ£¬Î´¾ÊÚȨµÄµÚÈý·½½Ó¼ûÁË"ÓÐÏ޵Ŀͻ§Êý¾Ý×Ó¼¯"£¬Ô̺¬µç×ÓÓʼþ¡¢Óû§ÃûºÍ¾¹ý°²È«É¢Áд¦ÖõÄÃÜÂ룬µ«Ç¿µ÷Ö§¸¶¿¨ÐÅϢδ´æ´¢ÓÚ·þÎñÆ÷¹ÊδÊܲ¨¼°¡£Ö»¹ÜPlexÐû³ÆÃÜÂëÒѰ´"×î¼Ñʵ¼Ê"½øÐа²È«É¢ÁУ¬µ«Î´¹«¿ª¾ßÌå¹þÏ£Ëã·¨£¬ÕâÔö³¤Á˹¥»÷Õß³¢ÊÔÆÆ½âÃÜÂëµÄ·çÏÕ¡£Îª´Ë£¬PlexÇ¿ÁÒ½¨ÒéÓû§µ±¼´Í¨¹ý¹ÙÍø³ÁÖÃÃÜÂ룬²¢ÆôÓÃ"¸ü¸ÄÃÜÂëºóÍ˳öÏνÓÉ豸"Ñ¡Ï´Ë²Ù×÷½«Ç¿ÔìËùÓÐʹÓÃ¾ÉÆ¾Ö¤µÄÉ豸³ÁеǼ¡£¶ÔÓÚʹÓõ¥µãµÇ¼£¨SSO£©µÄÓû§£¬Ðè½Ó¼û°²È«Ò³Ãæµã»÷"Í˳öËùÓÐÉ豸"°´Å¥£¬ÖÕÖ¹ËùÓл»á»°ºó³ÁÐÂÈÏÖ¤¡£Plex³ö¸ñÌáÐÑÓû§ÆôÓÃË«³É·ÖÉí·ÝÑéÖ¤£¨2FA£©ÒÔ¼ÓÇ¿ÕË»§±£»¤£¬²¢³ÁÉê¾ø²»»áͨ¹ýµç×ÓÓʼþË÷ÒªÃÜÂë»òÐÅÓþ¿¨ÐÅÏ¢¡£¹«Ë¾°µÊ¾Òѽ¨¸´·þÎñÆ÷ÈëÇÖ·ì϶£¬µ«Î´Åû¶¾ßÌå¼¼Êõϸ½Ú¡£
https://www.bleepingcomputer.com/news/security/plex-tells-users-to-reset-passwords-after-new-data-breach/
5. ˼¿ÆASAÉ豸Ôâ´ó¹æÄ£ÍøÂçɨÃ裬¾¯Ìèзì϶·çÏÕ
9ÔÂ8ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ¹Øë¶Ô˼¿ÆASAÉ豸µÄ´ó¹æÄ£ÍøÂçɨÃè»î¶¯·¢³öÔ¤¾¯£¬¸Ã¾°Ïó»òԤʾ²úÆ·¼´½«³öÏÖзì϶¡£¾ÝGreyNoise¼à²â£¬8Ôµ׳öÏÖÁ½´ÎÏÔָɍÃè·åÖµ£¬Éæ¼°2.5Íò¸öΨһIPµØÖ·Ì½²âASAµÇ¼ÃÅ»§¼°Cisco IOS Telnet/SSH·þÎñ¡£ÆäÖУ¬8ÔÂ26ÈÕµÚ¶þ²¨¹¥»÷ÖУ¬80%µÄɨÃèÁ÷Á¿Ô´×Ô°ÍÎ÷½©Ê¬ÍøÂç£¬Éæ¼°Ô¼1.7Íò¸öIPµØÖ·¡£Á½²¨¹¥»÷¾ùʹÓø߶ÈÀàËÆµÄChromeÓû§´úÀí£¬°µÊ¾´æÔÚ¹²Í¬ÍþвÆðÔ´¡£É¨Ãè»î¶¯ÖØÒª¼¯ÖÐÔÚÃÀ¹ú£¬Í¬Ê±¸²¸ÇÓ¢¹úºÍµÂ¹ú¡£É¨ÃèÐÐΪ¼È¿ÉÄÜÊÇÕë¶ÔÒѽ¨¸´·ì϶µÄʧ°ÜÀûÓó¢ÊÔ£¬Ò²¿ÉÄÜÊÇΪзì϶ÀûÓýøÐеÄö¾ÙºÍÓ³É乤×÷¡£ÏµÍ³ÖÎÀíÔ±"NadSec ¨C Rat5ak"µÄ»ã±¨ÏÔʾ£¬Óйػ×Ô7ÔÂ31ÈÕÆðÒÔµÍÆµÉ¨ÃèÆô¶¯£¬8ÔÂÖÐÑ®Öð²½Éý¼¶£¬8ÔÂ28ÈÕ´ïµ½µ¥ÈÕ20Íò´Îµã»÷µÄ·åÖµ£¬Á÷Á¿³öÏָ߶È×Ô¶¯»¯Ìص㣬Դ×ÔNybula¡¢Cheapy-HostºÍGlobal Connectivity Solutions LLPÈý¸öASN¡£ÎªÓ¦¶Ô·çÏÕ£¬½¨ÒéÖÎÀíÔ±µ±¼´ÀûÓÃCisco ASA×îа²È«²¹¶¡£¬¶ÔËùÓÐÔ¶³ÌµÇ¼ִÐжà³É·ÖÈÏÖ¤£¨MFA£©£¬Ô¤·ÀÖ±½Ó¶³ö/+CSCOE+/logon.html¡¢WebVPN¡¢Telnet»òSSH·þÎñ¡£ÈçÐè±í²¿½Ó¼û£¬Ó¦Í¨¹ýVPN¼¯ÖÐÆ÷¡¢·´Ïò´úÀí»ò½Ó¼ûÍø¹Ø³ÉÁ¢¶î±í½ÚÔì²ã¡£Í¬Ê±£¬¿ÉÀûÓÃGreyNoiseºÍRat5ak»ã±¨ÖеÄɨÃèÖ¸±ê½øÐйرպÍÏÞ¶È¡£
https://www.bleepingcomputer.com/news/security/surge-in-networks-scans-targeting-cisco-asa-devices-raise-concerns/
6. GhostAction¹©¸øÁ´¹¥»÷Ö³¬3300¸ö»úÃÜй¶
9ÔÂ8ÈÕ£¬GitGuardian×êÑÐÈËÔ±Åû¶һ·ÃûΪ¡°GhostAction¡±µÄGitHub¹©¸øÁ´¹¥»÷ÊÂÎñ£¬Òѵ¼ÖÂ3325¸ö»úÃÜÐÅϢй¶£¬º¸ÇPyPI¡¢npm¡¢DockerHub¡¢GitHubÁîÅÆ¼°Cloudflare¡¢AWSµÈ¹Ø¼üƾ֤¡£Õâ´Î¹¥»÷ʼÓÚ2025Äê9ÔÂ2ÈÕ£¬ÒÔFastUUIDÏîĿΪÊ׸öÖ¸±ê£¬Í¨¹ý½Ù³ÖÊØ»¤ÕßÕË»§Ìá·´Ä¿ÒâGitHub Actions¹¤×÷Á÷ÎļþʵÏÖ¡£¹¥»÷ÕßÀûÓøÃÎļþÔÚ¡°ÍÆËÍ¡±»òÊÖ¶¯µ÷¶Èʱ×Ô¶¯´¥·¢£¬´ÓGitHub Actions»·¾³¶ÁÈ¡»úÃÜ£¬²¢Í¨¹ýcurl POSTÒªÇó½«Êý¾Ýй¶ÖÁ¹¥»÷Õß½ÚÔìµÄ±í²¿Óò¡£µ÷²éÏÔʾ£¬¹¥»÷ÁìÓòÔ¶³¬FastUUID£¬Éæ¼°ÖÁÉÙ817¸ö´æ´¢¿â£¬ËùÓжñÒâÌá½»¾ùÖ¸Ïòͳһй¶¶Ëµã¡£¹¥»÷Õßͨ¹ýö¾ÙºÏ·¨¹¤×÷Á÷ÖеĻúÃÜÃû³Æ²¢Ó²±àÂëÖÁ¶ñÒâ¾ç±¾£¬ÇÔÈ¡ÁËPyPIÁîÅÆ¡¢npmÁîÅÆ¡¢DockerHubÁîÅÆ¡¢GitHubÁîÅÆ¡¢Cloudflare APIÁîÅÆ¡¢AWS½Ó¼ûÃÜÔ¿¼°Êý¾Ý¿âƾ֤µÈ¶àÀà»úÃÜ¡£Ö»¹ÜFastUUIDµÄPyPIÁîÅÆ±»ÇÔ£¬µ«Î´·¢ÏÖ¶ñÒâÈí¼þ°ü°ä²¼¡£GitGuardianÓÚ9ÔÂ5ÈÕÏò573¸öÊÜÓ°Ïì´æ´¢¿âÌá½»GitHubÎÊÌ⣬²¢Í¬²½Í¨ÖªGitHub¡¢npm¡¢PyPI°²È«ÍŶӡ£Ä¿Ç°£¬100¸ö´æ´¢¿âÒѼì²â²¢¸´Ô¶ñÒâ¸ü¸Ä£¬Ð¹Â¶¶ËµãÔÚÊÂÎñÆØ¹âºóÖÕ³¡½âÎö¡£×êÑÐÈËÔ±Ö¸³ö£¬ÖÁÉÙ9¸önpm°üºÍ15¸öPyPI°ü¿ÉÄÜÒò»úÃÜй¶°ä²¼¶ñÒâ°æ±¾£¬Íþв¶à¸ö°üÉú̬ϵͳ¡£
https://www.bleepingcomputer.com/news/security/hackers-steal-3-325-secrets-in-ghostaction-github-supply-chain-attack/


¾©¹«Íø°²±¸11010802024551ºÅ