Salesforce AI¹¥»÷µ¼ÖÂCRMÊý¾Ý±»ÇÔÈ¡
°ä²¼¹¦·ò 2025-09-281. Salesforce AI¹¥»÷µ¼ÖÂCRMÊý¾Ý±»ÇÔÈ¡
9ÔÂ25ÈÕ£¬Noma Security×êÑÐÈËÔ±½üÈÕÅû¶һÖÖÃûΪ"ForcedLeak"µÄÐÂÐ͹¥»÷²½Ö裬¿ÉÀûÓÃÌáÐÑ×¢ÈëºÍ¹ýÆÚÓòÃû¶ÔSalesforceµÄAgentforceƽִ̨ÐÐÊý¾ÝÇÔÈ¡¡£¸Ã¹¥»÷ÓÉ·¢Ïָ÷ì϶µÄNoma Security¹«Ë¾ÑéÖ¤£¬¸Ã¹«Ë¾½üÆÚ¸ÕʵÏÖ1ÒÚÃÀÔªÈÚ×ÊÒÔÇ¿»¯ÆäAI´úÀí°²È«Æ½Ì¨¡£×êÑÐÏÔʾ£¬¹¥»÷Õßͨ¹ýÀÄÓÃAgentforceµÄWeb-to-LeadÖ°ÄÜÖ´Ðй¥»÷¡£¸ÃÖ°ÄÜÔÊÐíÆóÒµ´´½¨ÍøÒ³±íµ¥ÍøÂç±í²¿Óû§µÄDZÔÚ¿Í»§ÐÅÏ¢£¬²¢×Ô¶¯´æÈëCRMϵͳ¡£¹¥»÷Õß¿ÉÏòÕâЩ±íµ¥Ìá½»Ô̺¬¶ñÒâÖ¸ÁîµÄÌØÔì¸ºÔØ£¬µ±Agentforce´úÀí´¦ÖôËÀàÐÅϢʱ£¬½«´¥·¢ÌáÐÑ×¢Èë·ì϶£¬µ¼Ö´úÀíÖ´Ðй¥»÷ÕßÖ¸¶¨µÄ²Ù×÷¡£ÀýÈ磬×êÑÐÈËÔ±ÑÝʾÁËͨ¹ý¸ºÔØÒªÇóAI´úÀíÍøÂçCRMÖеĵç×ÓÓʼþµØÖ·£¬²¢½«ÆäÔö³¤µ½·¢ËÍÖÁÔ¶³Ì·þÎñÆ÷µÄÒªÇó²ÎÊýÖУ¬´Ó¶øÊµÏÖÊý¾Ýй¶¡£¸üÒñ±ÎµÄ¹¥»÷õè¾¶Éæ¼°ÒѹýÆÚµÄSalesforceÓòÃû¡£×êÑÐÈËÔ±·¢ÏÖ£¬¹¥»÷Õß¿ÉÕùÏÈ×¢²á¹ýÆÚÓòÃû£¬²¢½«ÆäÅäÖÃΪ½Ó¹ÜÇÔÈ¡Êý¾ÝµÄ·þÎñÆ÷¡£ÓÉÓÚ¸ÃÓòÃûÔøÊôÓÚSalesforceÐÅÀµÓò£¬¹¥»÷¿ÉÄܳ־Ãδ±»¾õ²ì¡£
https://www.securityweek.com/salesforce-ai-hack-enabled-crm-data-theft/
2. Rust Crates.ioÏÖ¶ñÒâ°üÇÔÈ¡¼ÓÃÜ˽Կ
9ÔÂ25ÈÕ£¬Rust¹Ù·½°ü²Ö¿âCrates.io½üÈÕÆØ³öÁ½¸ö¶ñÒâÈí¼þ°üfastest_logºÍasync_println£¬×ÜÏÂÔØÁ¿½ü8500´Î£¬Æäͨ¹ý¼Ù×°³ÉºÏ·¨°üÖ´ÐмÓÃÜÇ®±Ò˽ԿÇÔÈ¡¹¥»÷¡£ÕâÁ½¸ö°üÓÚ5ÔÂ25ÈÕ°ä²¼£¬±ðÀë±»ÏÂÔØ7200´ÎºÍ1200´Î£¬¼ÙÒâÈȵãÈÕÖ¾¿âfast_log£¬¸´ÔìÆäREADMEÎļþ¡¢´æ´¢¿âÔªÊý¾Ý£¬²¢±£ÁôÕæÊµÏîÖ÷ÕÅÈÕÖ¾Ö°ÄÜÒÔ½µµÍ¿ª·¢Õß¾¯Ìè¡£¹¥»÷ÕßÀûÓÃÈÕÖ¾´ò°üÖ°ÄÜɨÃèÊܺ¦ÏµÍ³£¬³ÁµãÇÔÈ¡ÈýÀàÃô¸ÐÐÅÏ¢£ºÒÔÌ«·»Ë½Ô¿µÄÊ®Áù½øÔì×Ö·û´®¡¢SolanaÃÜÔ¿/µØÖ·µÄBase58×Ö·û´®£¬ÒÔ¼°¿ÉÄܰµ²ØÃÜÔ¿µÄÀ¨ºÅÄÚ×Ö½ÚÊý×顣ƥÅäµ½ÕâЩģʽºó£¬Êý¾Ý»á±»´ò°ü²¢·¢Ë͵½Ó²±àÂëµÄCloudflare Worker URL£¬¸Ã¶Ëµã¾²âÊÔÈ·ÈÏ´¦Óڻ״̬Çҷǹٷ½Solana RPC½Úµã¡£´úÂ밲ȫ¹«Ë¾SocketÂÊÏÈ·¢Ïִ˹¥»÷²¢ÏòCrates.io»ã±¨£¬Æ½Ì¨ÓÚ9ÔÂ24ÈÕɾ³ýÕâÁ½¸ö°ü²¢·â½û°ä²¼ÕßÕË»§¡°rustguruman¡±ºÍ¡°dumbnbased¡±¡£Crates.io²¼¸æÖ¸³ö£¬ÕâЩ¶ñÒâ°üÎÞÏÂÓÎÒÀÀµ£¬·â½ûÕË»§Î´Ìá½»ÆäËûÏîÄ¿£¬¹¥»÷ÒѸù»ù¶Ï¸ù¡£µ«ÒÑÏÂÔØ°üµÄ¿ª·¢ÈËÔ±ÈÔÐèÖ´ÐÐϵͳËãÕÊ£¬²¢½«Êý×Ö×ʲú×ªÒÆÖÁÐÂÇ®°üÒÔÔ¤·À±»µÁ¡£
https://www.bleepingcomputer.com/news/security/malicious-rust-packages-on-cratesio-steal-crypto-wallet-keys/
3. ¶íº¥¶íÖݽáºÏÏØÔâ·ê´ó¹æÄ£ÀÕË÷Èí¼þ¹¥»÷
9ÔÂ27ÈÕ£¬ÃÀ¹ú¶íº¥¶íÖݽáºÏÏØ5ÔÂ18ÈÕ²úÉúһ·ÑϳÁµÄÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ£¬µ¼ÖÂÔ¼45,487Ãû¾ÓÃñ¼°¹¤×÷ÈËÔ±µÄÉç»á°²È«ºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢¡¢¼ÝÕÕºÅÂë¡¢Ö¸ÎÆÊý¾Ý¡¢Ò½ÁƼͼ¼°»¤ÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢±»µÁ¡£¾µ÷²éÈ·ÈÏ£¬ÍøÂç·¸×ï·Ö×Ó×Ô5ÔÂ6ÈÕÆð±ãÒÑÇÖÈë¸ÃÏØÍøÂçϵͳ£¬Ö±ÖÁ18ÈÕÀÕË÷Èí¼þ±»¼ì²â·¢ÏÖ£¬ÆÚ¼ä³ÖÐøÇÔÈ¡Êý¾Ý¡£ÊÂÎñ²úÉúºó£¬½áºÏÏØÑ¸¿ìÆô¶¯Ó¦¼±ÏìÓ¦»úÔ죬½áºÏµÚÈý·½ÍøÂ簲ȫר¼ÒÓëÁª¹ú·¨Âɲ¿ÃÅ·¢Õ¹È«Ãæµ÷²é£¬²¢ÓÚ8ÔÂ25ÈÕʵÏÖÊÂÎñÉó²éºóÕýʽÆô¶¯Êܺ¦Õß֪ͨ·¨Ê½¡£½áºÏÏØÔÚÖÂÊÜÓ°ÏìÕßµÄÊý¾Ýй¶֪ͨÐÅÖÐÃ÷È·Ö¸³ö£¬¹¥»÷²úÉúºóÒѵ±¼´ÓëÈ«¹ú³ÛÃûÍøÂ簲ȫÕÕ·÷ºÏ×÷£¬ÔÚ±£ÏÕϵͳ°²È«µÄͬʱ½ç¶¨Êý¾Ýй¶ÁìÓò£¬²¢Í¬²½ÏòÁª¹ú·¨ÂÉ»ú¹¹¼°ÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒ±¨±¸¡£Æ¾¾Ý¹Ù·½Åû¶£¬±»µÁÊý¾ÝÀàÐͺ¸ÇÓ×ÎÒÉí·ÝÖ÷ÌâÐÅÏ¢¼°½ðÈÚ¡¢Ò½ÁƵÈÃô¸ÐÁìÓò£¬¾ßÌåÔ̺¬ÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢ÒøÐÐÕË»§ÏêÇé¡¢ÉúÎï¼ø±ðÐÅÏ¢¼°¹ú¼Ê¹Û¹âÖ¤¼þ±àºÅµÈ¡£½ØÖÁĿǰ£¬ÉÐÎÞÈκÎÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£
https://securityaffairs.com/182689/uncategorized/ohios-union-county-suffers-ransomware-attack-impacting-45000-people.html
4. ºÚ¿ÍÀûÓÃSEOÖж¾Óë¶ñÒâ¸æ°×Ö²ÈëOysterºóÃÅ
9ÔÂ27ÈÕ£¬ºÚ¿Íͨ¹ýSEOÖж¾ºÍËÑË÷ÒýÇæ¸æ°×ÍÆ¹ãÐéαMicrosoft Teams×°Ö÷¨Ê½£¬ÀûÓÃOysterºóÃÅϰȾWindowsÉ豸£¬ÎªÆóÒµÍøÂç»ñÈ¡³õʼ½Ó¼ûȨÏÞ¡£Oyster¶ñÒâÈí¼þ£¨±ðºÅBroomstick¡¢CleanUpLoader£©×Ô2023ÄêÖгõ´Î³öÏÖºó£¬ÒѹØÁª¶àÆð¶ñÒâ»î¶¯¡£¸ÃºóÃÅÔÊÐí¹¥»÷ÕßÔ¶³ÌÖ´ÐкÅÁî¡¢²¿Êð¶î±í¸ºÔؼ°´«ÊäÎļþ£¬³£Í¨¹ý¼ÙÒâPutty¡¢WinSCPµÈÊ¢ÐÐIT¹¤¾ßµÄ¶ñÒâ¸æ°×´«²¼£¬ÉõÖÁ±»RhysidaÀÕË÷Èí¼þ×éÖ¯ÓÃÓÚÈëÇÔìóÒµÍøÂç¡£Blackpoint SOC×îÐÂÅû¶µÄ¹¥»÷Á´ÏÔʾ£¬ÍþвÐÐΪÕßÔÚÓû§ËÑË÷¡°TeamsÏÂÔØ¡±Ê±£¬Í¨¹ý·Ç΢ÈíÓòÃûµÄ¸æ°×ºÍÓòÃûÊèµ¼ÖÁαÔìµÄTeamsÏÂÔØÒ³Ãæ¡£Óû§µã»÷ÏÂÔØµÄ¡°MSTeamsSetup.exe¡±Îļþ£¬ËäʹÓÃαÔìµÄ¡°4th State Oy¡±ºÍ¡°NRM NETWORK RISK MANAGEMENT INC¡±Ö¤ÊéÊðÃûÒÔ¼ÓÇ¿¿ÉÐŶȣ¬µ«Ö´Ðкó»á½«¶ñÒâDLLÖ²Èë%APPDATA%\RoamingÎļþ¼Ð£¬²¢´´½¨ÃûΪ¡°CaptureService¡±µÄ´òË㹤×÷£¬Ã¿11·ÖÖÓÖ´ÐÐÒ»´ÎDLL£¬È·±£ºóÃÅÔÚϵͳ³ÁÆôºó³ÖÐø»îÔ¾¡£BlackpointÇ¿µ÷£¬¹¥»÷ÕßÕýÀûÓÃÓû§¶ÔËÑË÷Á˾ּ°³ÛÃûÆ·ÅÆµÄÐÅÀµÖ´ÐÐÉøÈ룬ITÖÎÀíÔ±×÷Ϊ¸ßȨÏÞÖ¸±êÐè¸ñ±í¾¯Ìè¡£
https://www.bleepingcomputer.com/news/security/fake-microsoft-teams-installers-push-oyster-malware-via-malvertising/
5. Archer HealthÅäÖÃÃýÎó´æ´¢Í°ÖÂ14.5Íò·ÝÃô¸ÐÎļþ¶³ö
9ÔÂ26ÈÕ£¬°²È«×êÑÐÔ±Jeremiah Fowler·¢ÏÖÒ»¸öδ¼ÓÃÜÇÒÎÞÃÜÂë±£»¤µÄÅäÖÃÃýÎó´æ´¢Í°£¬ÄÚº¬Ô¼14.5Íò¸öÎļþ£¨×ܼÆ23GB£©£¬Éæ¼°´óÁ¿Ò½ÁÆÃô¸ÐÊý¾Ý¡£¾³éÑùºË²é£¬¸ÃÊý¾Ý¿âÔ̺¬»¼ÕßÐÕÃû¡¢IDºÅ¡¢Éç»á°²È«ºÅÂ루SSN£©¡¢×¡Ö·¡¢µç»°ºÅÂëµÈÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©£¬ÒÔ¼°Õï¶Ï¼Í¼¡¢Ò½Öι滮¡¢»¤Àí´òËã¡¢³öÔº±í¸ñµÈÊܱ£»¤½¡È«ÐÅÏ¢£¨PHI£©¡£ÎļþÆðÔ´ÒÉËÆÖ¸ÏòÒ½ÁÆÖÎÀíÈí¼þ£¬²¿ÃÅÎļþ¼ÐÖ±½ÓÒÔ»¼ÕßÐÕÃû¶¨Ãû£¬»¹ÓÓ×°´«Õæ¶©µ¥¡±¡°¹é²¢PDFÎļþ¡±µÈ·ÖÀ࣬¶³öÁË»¼ÕßÓëÒ½ÁÆ·þÎñÌṩÕߵľßÌå»î¶¯ÈÕÖ¾¡¢ÈÕ³ÌÆÌÅŵÈÒþÖÔÄÚÈÝ¡£FowlerÓÚ8Ôµ׳õ´Î·¢ÏÖÊý¾Ýй¶£¬9ÔÂ1ÈÕ-2ÈÕʵÏÖÉó²éºó£¬ÓÚ9ÔÂ4ÈÕÏòArcher Home Health·¢³öÕÆ¹ÜÈÎÅû¶¾¯±¨£¬¶Ô·½ÔÚ24Ó×ʱÄÚ»ØÓ¦¡£È»¶ø£¬9ÔÂ7ÈÕ£¬°µÍø×éÖ¯KillSec3Òѽ«Archer HealthÁÐÈëÆäйÃÜÍøÕ¾£¬²¢ÓÚ´ÎÈÕ¹«¿ªÐ¹Â¶8GBÊý¾Ý¡£¸Ã×éÖ¯´Ëǰ±»ÆØ³Ö¾ÃÀûÓÃGrayhatwarfareµÈƽ̨ËÑË÷¹«¿ªÂ¶³öµÄÊý¾Ý£¬Í¨¹ýÏÂÔØ²¢ÍþвʵÌå½øÐÐÀÕË÷¡£
https://databreaches.net/2025/09/26/archer-health-was-leaking-protected-health-information-criminals-appear-to-have-found-it/
6. ApolloMDÔâ°µÍø×éÖ¯÷è÷ëÍþвÊý¾Ýй¶
9ÔÂ26ÈÕ£¬°µÍø×éÖ¯¡°÷è÷롱6ÔÂ12ÈÕ½«Ò½ÁƺÏ×÷ͬ°éApolloMDÁÐÈëÆäÐ¹Â©ÍøÕ¾£¬Ðû³ÆÕ¼ÓÐ238GBÎļþ²¢±ê×¢ÈÕÆÚΪ6ÔÂ6ÈÕ¡£È»¶ø£¬÷è÷ëδ¶ÒÏÖ6ÔÂ16ÈÕ¹«¿ªÊý¾ÝµÄÍþв£¬ÏÂÔØÁ´½ÓÖÐδ·¢ÏÖÏÖʵÊý¾Ý¡£ApolloMD×ܲ¿Î»ÓÚ×ôÖÎÑÇÖÝ£¬×Ô1983ÄêÆð×÷ΪҽÉú¸¨µ¼µÄ¸öÈ˼¯ÍÅ£¬ÎªÒ½ÔºÌṩÁÙ´²ÔËÓª¡¢»¼Õß»¤Àí¼°²ÆÕþÓÅ»¯·þÎñ¡£÷è÷ë°ä²¼µÄÇåµ¥Ô̺¬²ÆÕþÐÅÏ¢½ØÍ¼£¬µ«Î´Éæ¼°Ó×ÎÒÉí·ÝÐÅÏ¢£¨PII£©»òÊܱ£»¤½¡È«ÐÅÏ¢£¨PHI£©¡£ApolloMDÓÚ9ÔÂ15ÈÕÔÚ¹ÙÍø°ä²¼´úÌæÍ¨Öª£¬Åû¶5ÔÂ22ÈÕÖÁ23ÈÕ²úÉúδ¾ÊÚȨ½Ó¼û£¬µ«Î´Ìá¼°ÍþвÕßÃû³Æ¡¢Îļþ¼ÓÃÜÇé¿ö»òÊê½ðÒªÇó¡£DataBreachesÏòÆäѯÎÊÓйØÏ¸½Ú£¬½ØÖÁĿǰδ»ñ»Ø¸´¡£ApolloMD֪ͨÁË11¼Ò¹ØÁªÒ½ÁÆ»ú¹¹£¬Ô̺¬ÅÁÈû¿ËÒ½Ôº·þÎñÓÐÏÞ¹«Ë¾¡¢ÅíÈø¿ÆÀסԺҽʦÓÐÏÞÔðÈι«Ë¾µÈ£¬¹¦·òÁìÓò´Ó2015Äê7ÔÂÖÁ2025Äê9Ô¡£9ÔÂ17ÈÕ£¬ApolloMDÏòÊÜÓ°Ï컼Õß·¢ËÍ֪ͨÐÅ£¬Ã÷ȷй¶Êý¾ÝÉæ¼°»¼ÕßÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢µØÖ·¡¢Õï¶ÏÐÅÏ¢¡¢Ò½ÁÆ·þÎñÌṩÕßÐÕÃû¡¢·þÎñÈÕÆÚ¡¢Ò½ÖÎÐÅÏ¢¼°½¡È«±£ÏÕÐÅÏ¢£¬²¿ÃÅ»¼Õß¿ÉÄܶ³öÉç»á°²È«ºÅÂ루SSN£©¡£CyberScoutΪ»¼ÕßÌṩÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ¡£
https://databreaches.net/2025/09/26/apollomd-notifies-patients-of-11-physician-practices-affected-by-a-june-cyberattack/


¾©¹«Íø°²±¸11010802024551ºÅ