±¦Âí¼¯ÍÅÔâEverestÀÕË÷Èí¼þ¹¥»÷
°ä²¼¹¦·ò 2025-09-191. ±¦Âí¼¯ÍÅÔâEverestÀÕË÷Èí¼þ¹¥»÷
9ÔÂ17ÈÕ£¬µÂ¹ú±¦Âí¼¯ÍÅÔâ·êEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬³ÉΪ8ÔÂ31ÈսݱªÂ·»¢ºó²»µ½Ò»¸öÔÂÄÚµÚ¶þ¸ö±»ºÚµÄÉÝ»ªÆû³µÆ·ÅÆ¡£¸Ã×éÖ¯ÔÚ°µÍøÑó´ÐÕ¾µã°ä²¼²¼¸æ£¬Ðû³ÆÇÔÈ¡Á˱¦Âí¡°¹Ø¼üÉó¼ÆÎļþ¡±£¬²¢ÉèÖÃÁ½¸öµ¹¼ÆÊ±ÖÓ£¬Ò»¸öÏÔʾ9ÔÂ14ÈÕ¡°¹àÒô¡±½«²»³ÉÓã¨Ôü×Ò²»¼°24Ó×ʱ£©£¬ÁíÒ»¸öÒªÇó¹«Ë¾48Ó×ʱÄÚÁªÏµ½»Éæ¡£±¦Âí×ܲ¿Î»ÓÚĽÄáºÚ£¬Õ¼ÓÐ160,000ÃûÔ±¹¤£¬ÔÚ15¹úÉè30Óà³ö²ú»ùµØ£¬2024ÄêÈ«Çò²úÁ¿³¬240ÍòÁ¾£¨ÖйúÕ¼30%£©£¬ÄêÊÕÈ볬1.42ÒÚÅ·Ôª¡£Õâ´Î¹¥»÷Éæ¼°ÆìÏÂMini¡¢ÀÍ˹À³Ë¹¼°MotorradĦÍгµ²¿ÃÅ¡£Everestδй©ÊÇ·ñÇÔÈ¡¿Í»§Êý¾Ý¡£Everest×Ô2021Äê»îÔ¾£¬2023ÄêÒÔÀ´°µÍø²©¿ÍÁÐ248ÃûÊܺ¦Õߣ¬½ü12¸öÔ¹¥»÷³¬90Ãû×éÖ¯¡£±¦Âí¼¯ÍÅÉÐδ»ØÓ¦£¬ÊÂÎñµ÷²éÈÔÔÚ½øÐС£
https://cybernews.com/news/bmw-ransomware-attack-everest-claim-everest-luxury-target-jlr-trend/
2. ·ðÂÞÀï´ï²¼ÀïÍßµÂÒ½ÁÆÐ»áÔâ´ó¹æÄ£Êý¾Ýй¶
9ÔÂ18ÈÕ£¬×ܲ¿Î»ÓÚ·ðÂÞÀï´ïÖÝÄ«¶û±¾µÄ²¼ÀïÍßµÂÒ½ÁÆÐ»á1ÔÂÔâ·êÑϳÁÊý¾Ýй¶ÊÂÎñ£¬Ó°ÏìÁìÓò²¨¼°½ü25ÍòÈË¡£¸Ã»ú¹¹×÷Ϊ±¾µØ³ÁÒªÒ½ÁƱ£½¡·þÎñÌṩÕߣ¬ÓÚ1ÔÂÖÐÑ®·¢ÏÖϵͳÔâÈëÇÖ£¬¾µ÷²éÈ·ÈϹ¥»÷Õß¿ÉÄÜÇÔÈ¡ÁËÓ×ÎÒÉí·ÝÐÅÏ¢¼°Êܱ£»¤µÄ½¡È«Êý¾Ý¡£Ö»¹Ü9ÔÂ5ÈÕÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌύ֪ͨʱδÅû¶¾ßÌåÈËÊý£¬µ«ÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿Ò½ÁÆÊý¾Ýй¶׷×ÙϵͳÏÔʾ£¬ÏÖʵÊÜÓ°ÏìÈËÊý¸ß´ï246,711ÈË£¬º¸Ç»¼Õß¡¢Ô±¹¤¼°ºÏ×÷ͬ°éÓйØÃô¸ÐÐÅÏ¢¡£BianLianÀÕË÷Èí¼þ×éÖ¯ÒÑÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢Ðû³ÆÇÔÈ¡ÄÚÈݲ»½öÔ̺¬Ó×ÎÒÐÅÏ¢Ó뽡ȫ¼Í¼£¬»¹Éæ¼°¹ÜÕÊ¡¢ÈËÁ¦×ÊÔ´Êý¾Ý¿â¼°ºÏ×÷·½ÍùÀ´ÓʼþµÈÎļþ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¸Ã×éÖ¯×Ô3ÔÂµ×ÆðÒÑÎÞ¹«¿ª»î¶¯¼Í¼£¬Ä¿Ç°±»µÁÊý¾ÝÈ¥ÏòÈÔ²»Ã÷È·¡£Ä¿Ç°£¬ÊÂÎñµ÷²éÈÔÔÚ½øÐÐÖУ¬Óйػú¹¹ÕýÊÔͼ׷ÒäÊý¾ÝÁ÷Ïò²¢ÆÀ¹ÀDZÔÚ·çÏÕ¡£
https://www.securityweek.com/nearly-250000-impacted-by-data-breach-at-medical-associates-of-brevard/
3. ¶íÂÞ˹KrasAviaº½¿Õ¹«Ë¾ÒÉÔâÍøÂç¹¥»÷ÖÂÊý×Ö·þÎñÖжÏ
9ÔÂ18ÈÕ£¬¶íÂÞ˹µØÓòº½¿Õ¹«Ë¾KrasAvia°ä²¼ÉêÃ÷³Æ£¬Æä²¿ÃÅÊý×Ö·þÎñÒòϵͳ¹ÊÕÏÖжϣ¬³ÉΪÒÉËÆÍøÂç¹¥»÷º£³±Öиùúº½¿ÕÒµÔâ·êµÄ×îÐÂÊÂÎñ¡£Õâ¼Ò×ܲ¿Î»ÓÚ¿ËÀ˹ŵÑǶû˹¿ËµÄº½Ë¾°µÊ¾£¬×¨¼ÒÕýÈ«Á¦½µµÍº½°àʱ¿Ì±í·çÏÕ²¢¾¡¿ì¸´ÔÔËÓª¡£½ØÖÁ±¾µØ¹¦·òÖÜËÄÍí¼ä£¬ÆäÍøÕ¾ÒṈ̃»¾£¬ÔÚÏßÊÛÆ±ÔÝÍ££¬³Ë¿ÍÎÞ·¨½øÐÐÊý×ÖÖµ»ú£¬µ«º½°àÈÔ°´´òËãÔËÐС£¸Ã¹«Ë¾ÖØÒªÖ´·ÉÖÐÎ÷²®ÀûÑǼ°Ãɹź½Â·¡£Ö»¹ÜKrasAviaδÃ÷È·ÈÏ¿ÉÍøÂç¹¥»÷£¬µ«Ïò±¾µØÃ½Ìåй©Õâ´Î¹ÊÕÏÓë¶íÂÞ˹Æì½¢º½Ë¾Aeroflot 7Ôµ×Ôâ·êµÄ¹ÊÕÏÀàËÆ¡£Aeroflot´ËǰÒòÒÉËÆÍøÂç¹¥»÷µ¼ÖÂÑϳÁÑÓÎóºÍÈ¡µÞ£¬Ç×ÎÚ¿ËÀ¼ºÚ¿Í×éÖ¯¡°¹ÑÑÔÎÚÑ»¡±£¨Silent Crow£©¼°°×¶íÂÞË¹ÍøÂçÓλ÷¶Ó£¨Belarusian Cyber Partisans£©Ðû³Æ¶Ô´ËÕÆ¹Ü£¬²¢Ðû³ÆÇÔÈ¡ÁË·ÉÐмͼ¡¢ÄÚ²¿Í¨»°ÒôƵ¼°¼à¿Ø×ÊÁÏ¡£ÖÜËÄ£¬ÇøÓòÐÔTelegramƵ·Borus°ä²¼½ØÍ¼£¬ÏÔʾKrasAviaÍøÒ³±»´Û¸Ä£¬¶íº½¼°KrasAvia±êʶ±»»®µô£¬¸½ÎÄ¡°ÎÒÃÇ»¹Ã»ÆðÍ·¡¡¡±£¬²¢³öÏÖ¡°¹ÑÑÔÎÚÑ»¡±Í·Ïñͼ±ê¡£
https://therecord.media/russia-krasavia-airline-disrupted-suspected-cyberattack
4. SystemBC´úÀí½©Ê¬ÍøÂ磺³Ö¾Ã»îÔ¾µÄ¶ñÒâÁ÷Á¿ÒýÇæ
9ÔÂ18ÈÕ£¬SystemBC´úÀí½©Ê¬ÍøÂç×Ô2019ÄêÆð³ÖÐø»îÔ¾£¬³ÉΪ¶à¸öÀÕË÷Èí¼þÍŻP·¸×ï×éÖ¯´«µÝ¶ñÒâÔØºÉµÄÖ÷Ìâͨ·¡£¸ÃÍøÂçÈÕ¾ùÊØ»¤Ô¼1500¸ö»úеÈË½Úµã£¬ÖØÒªÀûÓÃÈ«ÇòÁìÓòÄÚ´æÔÚ佨²¹ÑϳÁ·ì϶µÄóÒ×Ð鹹רÓ÷þÎñÆ÷£¨VPS£©¹¹½¨£¬ÆäÖнü80%µÄ½ÚµãÀ´µÃÒâÐÍóÒ×¹©¸øÉ̵ÄÊÜϰȾVPSϵͳ¡£ÕâЩ·þÎñÆ÷¾ùÔÈ´æÔÚ20¸ö佨¸´µÄ°²È«ÎÊÌ⣬ÇÒÖÁÉÙÔ̺¬Ò»¸ö¸ßΣ·ì϶£¬²¿Ã۸ÀýÉõÖÁ¶³ö161¸ö·ì϶£¬µ¼ÖÂϰȾÊÙÃüÏÔÖøµ¢¸é£¬½ü40%µÄϵͳϰȾ¹¦·ò³¬¹ýÒ»¸öÔ¡£SystemBCµÄÖ÷ÌâÖ°ÄÜÊÇÔÊÐí¹¥»÷Õßͨ¹ýÊÜϰȾÖ÷»ú·ÓɶñÒâÁ÷Á¿£¬²¢°µ²ØºÅÁîÓë½ÚÔ죨C2£©»î¶¯ÒÔ¶ã±Ü¼ì²â¡£Æä80Óà¸öC2·þÎñÆ÷²»½öÖ±½ÓÏνӴúÀí½Úµã£¬»¹ÎªREM Proxy¡¢Ô½ÄÏVN5Socks´úÀíÍøÂç¼°¶íÂÞË¹ÍøÂçץȡ¹«Ë¾µÈ¿Í»§Ìṩ·Ö²ã·þÎñ¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬¸ÃÍøÂçÓë¶íÂÞ˹´æÔÚ¼¼Êõ¹ØÁª£ºÐÂϰȾ·þÎñÆ÷»áÏÂÔØ´øÓжíÓï×¢½âµÄshell¾ç±¾£¬Ç¿Ôì²¢×ßÔËÐÐËùÓÐSystemBCÑù±¾£»Ö÷Ìâ½ÚµãÍйÜÈ«Êý180¸ö¶ñÒâÈí¼þÑù±¾¡£
https://www.bleepingcomputer.com/news/security/systembc-malware-turns-infected-vps-systems-into-proxy-highway/
5. PyPIʹGhostAction¹©¸øÁ´¹¥»÷Öб»µÁµÄÁîÅÆÊ§Ð§
9ÔÂ18ÈÕ£¬PythonÈí¼þ»ù½ð»á°ä·¢ÒÑʹ9Ô³õGhostAction¹©¸øÁ´¹¥»÷ÖÐÇÔÈ¡µÄËùÓÐPyPIÁîÅÆÊ§Ð§£¬²¢È·ÈÏÍþвÐÐΪÕßδÀÄÓÃÕâЩÁîÅÆÔÚPython°üË÷Òý£¨PyPI£©°ä²¼¶ñÒâÈí¼þ¡£Õâ´ÎÊÂÎñÔ´ÓÚ9ÔÂ5ÈÕGitGuardianÔ±¹¤»ã±¨µÄ¶ñÒâGitHub Actions¹¤×÷Á÷£¨ÈçFastUUID£©ÊÔͼÇÔÈ¡PyPIÁîÅÆÖÁÔ¶³Ì·þÎñÆ÷£¬ÁíÒ»×êÑÐÈËԱͬÈÕ·¢Ë͵ÄÏêÇéÓʼþÒòÎóÈëÀ¬»øÓʼþÎļþ¼Ð£¬µ¼ÖÂPyPI°²È«ÍŶÓÖ±ÖÁ9ÔÂ10Èղůô¶¯ÏìÓ¦¡£µ÷²éÏÔʾ£¬¹¥»÷Õßͨ¹ýÅú¸Ä´æ´¢¿â¹¤×÷Á÷£¬½«´æ´¢ÎªGitHub»úÃܵÄPyPIÁîÅÆ·¢ËÍÖÁ±í²¿·þÎñÆ÷¡£Ö»¹Ü³É¹¦ÇÔÈ¡²¿ÃÅÁîÅÆ£¬µ«Î´ÔÚPyPIƽ̨ʹÓá£GitGuardianÔÚ³¬570¸öÊÜÓ°Ïì´æ´¢¿âÖÐÌá½»GitHubÎÊÌ⣬²¢´«µÝGitHub¡¢npm¼°PyPI°²È«ÍŶӡ£PyPIÍŶÓËæºóʹËùÓÐÊÜÓ°ÏìÁîÅÆÊ§Ð§£¬ÐÖúÏîÄ¿ËùÓÐÕß¼ÓÇ¿ÕË»§°²È«¡£ÖµÍ×ÌùÐĵÄÊÇ£¬GhostAction¹¥»÷²¨¼°ÁìÓòÔ¶³¬PyPI£ºGitGuardian¹À¼Æ³¬3.3Íò¸ö»úÃܱ»µÁ£¬Éæ¼°PyPI¡¢npm¡¢DockerHub¡¢GitHub¡¢Cloudflare APIÁîÅÆ¼°AWS½Ó¼ûÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈ£¬Ó°ÏìÔ̺¬Rust¡¢JavaScript¡¢GoÔÚÄڵĶà˵»°´úÂë¿â£¬²¿·ÔìóÒµÕû¸öSDK²úÆ·×éºÏÔâÈëÇÖ¡£
https://www.bleepingcomputer.com/news/security/pypi-invalidates-tokens-stolen-in-ghostaction-supply-chain-attack/
6. º«¹úÀÖÌ쿨ÔâºÚ¿Í¹¥»÷£¬300ÍòÓû§Êý¾Ýй¶
9ÔÂ18ÈÕ£¬º«¹úµÚÎå´óÐÅÓþ¿¨¿¯ÐÐÉÌÀÖÌ쿨ÓÚ9ÔÂÅû¶³Á´óÊý¾Ýй¶ÊÂÎñ£¬Éæ¼°297ÍòÓû§£¬³ÉΪ½ñÄêÈ«Çò×î´óÊý¾Ýй¶ÊÂÎñÖ®Ò»¡£½ðÈڼලԺµ÷²éÏÔʾ£¬7ÔÂ22ÈÕÖÁ8ÔÂ27ÈÕÆÚ¼ä£¬¸Ã¹«Ë¾ÔÚÏßÖ§¸¶·þÎñÆ÷ÔâºÚ¿Í¹¥»÷£¬³¬¹ý200GBÊý¾Ý±»ÇÔÈ¡¡£Ð¹Â¶ÐÅÏ¢Ô̺¬ÏνӼͼ¡¢Ðé¹¹Ö§¸¶´úÂë¡¢ÄÚ²¿¼ø±ðºÅ¼°ÂòÂôÀàÐ͵ȣ¬ÆäÖÐÔ¼28ÍòÓû§Òò¿¨ºÅ¡¢ÓÐЧÆÚºÍ°²È«ÂëÔÚµçÉ̳¡¾°Â¶³ö£¬Ãæ¶ÔÖ±½Ó·¸·¨Ê¹Ó÷çÏÕ¡£ÀÖÌ쿨ÒÑΪ¸ß·çÏÕÓû§Æô¶¯»»¿¨·¨Ê½£¬½ØÖÁÖÜÈýÒÑÓÐ5.5ÍòÓû§ÊµÏÖ»»¿¨£¬ÆäÓà269ÍòÓû§Êý¾Ý±»ÆÀ¹ÀΪµÍÃô¸Ð¶È£¬ÔÝÎÞÐè³Áз¢¿¨¡£Ä¿Ç°Î´¼ì²âµ½Î´¾ÊÚȨÂòÂô¡£ÊÂÎñ±¾ÔÖ±Ö¸°²È«ÖÎÀí·ì϶£º¹¥»÷ÕßÓÚ8ÔÂ12ÈÕɨÃè·þÎñÆ÷·ì϶£¬´ÎÈÕÖ²Èë¶ñÒâ´úÂ룬14-15ÈÕÇÔÈ¡1.7GBÊý¾Ý£¬ºóÐøÍ¨¹ý´úÀíWeb Shell³ÖÐøÌáÈ¡ÂòÂôÈÕÖ¾£¬×îÖÕ2700¸öй¶ÎļþÖнö56%¼ÓÃÜ¡£ÀÖÌ쿨ֱÖÁ8ÔÂ26ÈÕÀýÐв鳲ŷ¢ÏÖÈëÇÖ£¬ÏµÍ³Â¶³ö½üÁ½ÖÜ¡£¸üÁîÈËÕ𾪵ÄÊÇ£¬¸Ã·ì϶×îÔçÓÚ2017Äê±»·¢ÏÖ£¬µ«º£±íÖ§¸¶·þÎñÆ÷Òò½Ó¼ûÁ¿µÍ±»ÒÅ©½¨²¹£¬Ðγɹؼü°²È«È±¿Ú¡£
https://www.koreaherald.com/article/10578647


¾©¹«Íø°²±¸11010802024551ºÅ