ÃÀ¹úCISAÖÒ¸æMotex Lanscope¸ßΣ·ì϶Ôâ»ý¼«ÀûÓÃ
°ä²¼¹¦·ò 2025-10-241. ÃÀ¹úCISAÖÒ¸æMotex Lanscope¸ßΣ·ì϶Ôâ»ý¼«ÀûÓÃ
10ÔÂ23ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÖÜÈý½«Ó°ÏìMotex Lanscope Endpoint ManagerµÄÑϳÁ°²È«·ì϶CVE-2025-61932£¨CVSS v4ÆÀ·Ö9.3£©ÄÉÈëÆäÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬²¢Ã÷È·¸Ã·ì϶Òѱ»»ý¼«ÀûÓ᣸÷ì϶ԴÓÚLanscope Endpoint Manager±¾µØ°æ±¾Öпͻ§¶Ë·¨Ê½ºÍ¼ì²â´úÀíµÄͨѶͨ·ÑéÖ¤»úÔìȱµã£¬¹¥»÷Õß¿Éͨ¹ý·¢ËÍÌØÔìÊý¾Ý°üÔÚÊÜÓ°ÏìϵͳÉÏÖ´ÐÐËÁÒâ´úÂ룬×é³É³Á´ó°²È«Íþв¡£¾ÝCISAÅû¶£¬·ì϶ӰÏì9.4.7.1¼°¸üÔç°æ±¾£¬Éæ¼°¶à¸öº¹Çà°æ±¾¡£MotexÒѰ䲼½¨¸´²¹¶¡¡£ÈÕ±¾·ì϶עÃ÷£¨JVN£©ÃÅ»§ÍøÕ¾±¾Öܾ¯±¨ÏÔʾ£¬MotexÒÑÈ·ÈÏÓÐδ¾ßÃû¿Í»§¡°ÊÕµ½ÒÉËÆÕë¶Ô¸Ã·ì϶µÄ¶ñÒâÊý¾Ý°ü¡±£¬Ö¤Êµ¹¥»÷ÒѲúÉú£¬µ«Ä»ºóºÚÊÖ¼°¹¥»÷¹æÄ£ÈÔ´ý½øÒ»´ëÊ©²é¡£CISAÇ¿µ÷£¬Áª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÐèÔÚ2025Äê11ÔÂ12ÈÕǰʵÏÖ·ì϶½¨¸´£¬ÒÔ±£»¤ÆäÍøÂçÃâÊÜDZÔÚ¹¥»÷¡£
https://thehackernews.com/2025/10/critical-lanscope-endpoint-manager-bug.html
2. ³¯ÏÊLazarus¡°ÍýÏ빤×÷Ðж¯¡±¹¥»÷Å·ÖÞÎÞÈË»úÔì×÷ÉÌ
10ÔÂ23ÈÕ£¬³¯ÏÊLazarus¼¯ÍÅÕë¶ÔÅ·ÖÞÖÐÅ·¼°¶«ÄÏÅ·µØÓòµÄÎÞÈË»úÔì×÷ÉÌÌáÒéÐÂÒ»ÂÖÍøÂç¼äµý¹¥»÷£¬Ö¼ÔÚÇÔȡרÓÐÎÞÈË»úÔì×÷¼¼Êõ¼°Éè¼Æ¹¤ÒÕ£¬ÒÔÖ§³Ôì½ÈÀÀ©´óÆä¹úÄÚÎÞÈË»úÏîÖ÷ÕÅÕ½ÊõÖ¸±ê¡£¾ÝESET×êÑÐÈËÔ±Åû¶£¬Õâ´Î¹¥»÷ÖÁÉÙ²¨¼°Èý¼Ò³ö²ú¾üÊÂÉ豸µÄ×éÖ¯£¬²¿ÃÅÉ豸ÒÑͶÈëÎÚ¿ËÀ¼Õ½³¡Æ¥µÐ¶íÂÞ˹¡£ESET½«´ËÂÖ¹¥»÷ÆÀ¹ÀΪ¡°ÍýÏ빤×÷Ðж¯¡±£¨Operation DreamJob£©µÄ×îа汾£¬¸ÃÐж¯×Ô2022ÄêÆð³ÖÐø»îÔ¾£¬´ËǰÒÑÕë¶Ô»¯¹¤¡¢ÐÅÏ¢¼¼Êõ¡¢½ðÈÚ·þÎñµÈ¶àÐÐÒµÖ´ÐÐÍøÂç¼äµý»î¶¯¡£¹¥»÷Ö÷ÌâÔØºÉΪScoringMathTeaÔ¶³Ì½Ó¼ûľÂí£¨RAT£©£¬×Ô2022Äê³õ´ÎÔÚVirusTotal³öÏÖÒÔÀ´Ö°Äܸù»ùδ±ä£¬Ö§³ÖÔ¼40¸öºÅÁº¸ÇÎļþ²Ù×÷¡¢¹ý³Ì½ÚÔ졢ϵͳ¿úËż°¶ñÒâÔØºÉÏÂÔØµÈ½»»¥Ê½½ÚÔìÄÜÁ¦¡£¼¼Êõ¼¿Á©·½Ã棬¹¥»÷ÕßÒ»Á¬¡°¹¤×÷µö¶ü¡±Õ½Êõ£¬Í¨¹ýαÔìÇóÖ°ÎļþÓÕÆÊܺ¦Õß×°ÖöñÒâÈí¼þ£¬²¢ÀûÓÃGitHubÉϱ»ÈëÇֵĿªÔ´ÏîÄ¿£¨ÈçNotepad++¡¢WinMerge²å¼þ£©Åú¸Ä±¾µØ´úÂ룬²¿ÊðÒñ±ÎÐÔ¸ü¸ßµÄ¶ñÒⷨʽÒÔÈÆ¹ý¼ì²â¡£
https://www.darkreading.com/cyberattacks-data-breaches/lazarus-group-hunts-european-drone-manufacturing-data
3. Jingle ThiefºÚ¿ÍÀûÓÃÔÆ»ù´¡ÉèÊ©ÇÔÈ¡Êý°ÙÍòÀñÎ│
10ÔÂ23ÈÕ£¬Palo Alto Networks Unit 42½üÈո淢ÃûΪ"Jingle Thief"µÄÍøÂç·¸×OÍÅ£¬¸Ã×éÖ¯×Ô2021Äêµ×Æð³ÖÐøÕë¶ÔÁãÊÛ¼°Ïû·ÑÕß·þÎñÐÐÒµµÄÔÆ»·¾³Ê©Ê©ÀñÎ│ڲơ£×êÑÐÈËÔ±Stav SettyºÍShachar RoitmanÖ¸³ö£¬¹¥»÷Õßͨ¹ý´¹µöÓʼþ¡¢¶ÌÐÅ´¹µö¼°¶¨Ô컯´¹µöÒ³ÃæÇÔÈ¡Microsoft 365ƾ֤£¬ÈëÇÖÀñÎ│¿¯Ðлú¹¹ºó£¬Í¨¹ýºáÏòÒÆ¶¯»ñÈ¡¿¯ÐÐϵͳ½Ó¼ûȨÏÞ£¬×îÖÕÔÚ»ÒÉ«Êг¡×ªÊÛδ¾ÊÚȨµÄ¸ß¼ÛÖ·ñÆ·¿¨Ä²Àû¡£¸Ã¼¯ÍÅÉÆÓÚ³Ö¾ÃפÁôÊܺ¦ÏµÍ³£¬²¿Ã۸ÀýÏÔʾÆäÂñ·üÆÚ³¬10¸öÔ£¬ÆÚ¼äͨ¹ý¿úËÅÔÆ»·¾³¡¢½Ó¼ûSharePoint/OneDrive»ñȡҵÎñÔËÓª¡¢²ÆÕþÁ÷³Ì¼°ÀñÎ│¿¯Ðй¤×÷Á÷µÈÃô¸ÐÐÅÏ¢¡£Îª¶ã±Ü¼ì²â£¬¹¥»÷ÕßѡȡÉí·ÝÀÄÓÃÕ½Êõ¶ø·Ç²¿Êð×Ô½ç˵¶ñÒâÈí¼þ£ºÀýÈç´´½¨ÊÕ¼þÏ乿¶¨×Ô¶¯×ª·¢ÓʼþÖÁ¹¥»÷Õß½ÚÔìµØÖ·£¬×¢²á¶ñÒâÉí·ÝÑéÖ¤Æ÷ÈÆ¹ý¶à³É·ÖÈÏÖ¤£¨MFA£©£¬ÉõÖÁ½«É豸ע²áÖÁEntra IDÒÔά³ÖÓÆ¾Ã½Ó¼û¡£Unit 42×·×ٸûΪCL-CRI-1032£¬²¢ÖеÈˮƽ¹éÒòÓÚĦÂå¸ç¾¼Ã·¸×ïÍÅ»ïAtlas Lion/Storm-0539¡£
https://thehackernews.com/2025/10/jingle-thief-hackers-exploit-cloud.html
4. ÀÕË÷Èí¼þMedusaй¶¿µ¿¨Ë¹ÌØ834 GBÊý¾Ý
10ÔÂ23ÈÕ£¬½üÈÕ£¬MedusaÀÕË÷Èí¼þ×éÖ¯¹«¿ªÐ¹Â¶ÁË´ÓÈ«ÇòýÌå¿Æ¼¼¾ÞÍ·¿µ¿¨Ë¹Ìع«Ë¾ÇÔÈ¡µÄ186.36GBѹËõÊý¾Ý£¬²¢Ðû³ÆÔʼÊý¾Ý×ÜÁ¿´ï834GB¡£¸Ã×éÖ¯´ËǰÓÚ9ÔÂÏÂÑ®ÈëÇÖ¿µ¿¨Ë¹ÌØ£¬×î³õÒªÇóDZÔÚÂò¼ÒÖ§¸¶120ÍòÃÀÔªÏÂÔØÊý¾Ý£¬ÕâÒ»½ð¶îÓëÆäÏò¿µ¿¨Ë¹ÌØË÷ÒªµÄ¡°É¾³ýÊý¾Ý¡±ÓöÈÒ»Ö¡£Ð¹Â¶µÄÊý¾Ý±»²ð·ÖΪ47¸öÎļþ£¨45¸ö4GBÎļþ¡¢1¸ö2GBÎļþ¼°1¸ö2GBÎļþ£©£¬ÎļþÃû¾ùΪ"Comcast_FS"¡£Êý¾ÝÔ̺¬Esur_rerating_verification.xlsx¡¢Claim Data Specifications.xlsmµÈExcelÎļþ£¬ÒÔ¼°Éæ¼°Æû³µ±£·ÑÓ°Ïì·ÖÎöµÄPythonºÍSQL¾ç±¾¡£½ØÖÁĿǰ£¬¿µ¿¨Ë¹ÌØÎ´¶Ô´ËÊÂ×÷³öÈκλØÓ¦¡£Medusa×éÖ¯ÒÔ¹¥»÷´óÐÍÆóÒµÎÅÃû¡£±¾Ô£¬Î¢Èí°ä²¼°²È«²¼¸æÖҸ棬MedusaÕýÀûÓÃGoAnywhere MFT·ì϶£¨CVE-2025-10035£¬CVSSÆÀ·Ö10.0£©Ö´ÐÐδ¾ÈÏÖ¤µÄÔ¶³Ì´úÂëÖ´Ðй¥»÷¡£
https://hackread.com/medusa-ransomware-comcast-data-leak/
5. ¼ÓÄôóÍæ¾ß·´¶·³ÇÔâ·ê¿Í»§Êý¾Ýй¶ÊÂÎñ
10ÔÂ23ÈÕ£¬¼ÓÄôóÍæ¾ß·´¶·³ÇÏò¿Í»§·¢³öÊý¾Ýй¶֪ͨ£¬Åû¶Æä¿Í»§Êý¾Ý¿âÔâδ¾ÊÚȨµÄµÚÈý·½ÇÔÈ¡²¢Ð¹Â¶²¿ÃżÍ¼¡£ÊÂÎñÆðÒòÓÚÍþвÐÐΪÕßÓÚ7ÔÂ30ÈÕÔÚ°µÍø°ä²¼Ðû³ÆÇÔÈ¡×Ըù«Ë¾ÏµÍ³µÄ¿Í»§Êý¾Ý£¬¹«Ë¾Í¨¹ýδË÷Òý»¥ÁªÍøÌû×Ó»ñÖªºó£¬µ±¼´½áºÏµÚÈý·½ÍøÂ簲ȫר¼Ò·¢Õ¹µ÷²é£¬×îÖÕ֤ʵÊý¾ÝÕæÊµÐÔ¡£¾Ý¹«Ë¾Åû¶£¬Ð¹Â¶Êý¾Ýº¸ÇÐÕÃû¡¢ÏÖʵµØÖ·¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëµÈÓ×ÎÒÐÅÏ¢£¬µ«Ã÷È·ÅųýÕË»§ÃÜÂë¡¢ÐÅÓþ¿¨ÐÅÏ¢¼°ÆäËû¡°ÀàËÆ»úÃÜÊý¾Ý¡±¡£Õâ´ÎÊÂÎñÓ°ÏìÁìÓòÉæ¼°¼ÓÄôóÍæ¾ß·´¶·³ÇÈ«¹ú40¼ÒÃŵêµÄ¿Í»§ÈºÌ壬¾ßÌåÊÜÓ°ÏìÈËÊýÉÐδ¹«¿ª¡£¹«Ë¾Ç¿µ÷£¬Ð¹Â¶Êý¾ÝÀàÐÍÒò¿Í»§¶øÒ죬¿ÉÄÜÔ̺¬ÉÏÊöÐÅÏ¢ÖеÄÒ»Ïî»ò¶àÏî×éºÏ¡£ÊÂÎñ²úÉúºó£¬¼ÓÄôóÍæ¾ß·´¶·³ÇÔÚר¼ÒÁìµ¼ÏÂÉý¼¶ITϵͳ°²È«ÐÔ£¬²¢×Ô¶¯Ïò¼ÓÄôóÒþÖÔ¼à¹Ü»ú¹¹´«µÝÇé¿ö¡£Í¬Ê±£¬¹«Ë¾Ïò¿Í»§·¢³ö¾¯Ê¾£¬½¨ÒéºöÂÔδ¾ÒªÇóµÄͨѶ£¬¾¯Ìè¼ÙÒâÆ·ÅÆ½øÐÐÓ×ÎÒÐÅÏ¢Ë÷È¡µÄÍøÂç´¹µöÐÐΪ¡£
https://www.bleepingcomputer.com/news/security/toys-r-us-canada-warns-customers-info-leaked-in-data-breach/
6. ¡°Shadow Escape¡±¹¥»÷£ºAI¸±ÊÖÁãµã»÷ÇÔÈ¡Ãô¸ÐÊý¾Ý
10ÔÂ23ÈÕ£¬×êÑй«Ë¾Operant AI°ä²¼»ã±¨½ÒʾÁËÒ»ÖÖÃûΪ¡°Shadow Escape¡±µÄÐÂÐͰ²È«·çÏÕ£¬¸Ã¼¼Êõ¿ÉÎÞÉùÎÞÏ¢µØ´ÓÆóҵʹÓõÄAI¸±ÊÖÖÐÇÔÈ¡´óÁ¿Ãô¸ÐÐÅÏ¢¡£ÕâÖÖ¹¥»÷ÀûÓÃÄ£Ð͸ߵÍÎĺÍ̸£¨MCP£©µÄ¼¼Êõ³ß¶È£¬Æóҵͨ¹ýMCP½«ChatGPT¡¢ClaudeµÈ´óÐÍ˵»°Ä£ÐÍ£¨LLM£©ÏνÓÖÁÄÚ²¿Êý¾Ý¿âºÍ¹¤¾ßʱ²úÉúµÄ·ì϶£¬ÎÞÐèÓû§µã»÷´¹µöÁ´½Ó»ò×Ô¶¯²Ù×÷¼´¿ÉÖ´ÐС£¹¥»÷Ö÷ÌâÔÚÓÚ¡°Áãµã»÷¡±¸öÐÔ£º¶ñÒâÖ¸Áî¿É°µ²ØÔÚ¿´ËÆÎÞº¦µÄÎĵµÖУ¬ÈçÔ±¹¤ÊÖ²á»òÏÂÔØµÄPDFÎļþ¡£µ±Ô±¹¤½«ÕâЩÎļþÉÏ´«ÖÁ¹¤×÷AI¸±ÊÖʱ£¬°µ²ØÖ¸Áî»áÅúʾAI×Ô¶¯ÍøÂç²¢°ÂÃØ·¢ËͿͻ§µÄ¸öÈËÊý¾Ý£¬Ô̺¬Éç»á°²È«ºÅÂë¡¢Ò½ÁƼͼ¡¢²ÆÕþÏêÇéµÈ¡£Ó봫ͳ¹¥»÷ÒÀÀµ´¹µöÓʼþ·ÖÆç£¬Shadow Escapeͨ¹ý³ß¶ÈMCPÉèÖúÍĬÈÏȨÏÞ¼´¿ÉÇáËÉÖ´ÐУ¬×êÑÐÈËÔ±ÖÒ¸æÆä¿ÉÄܵ¼Ö¡°ÊýÍòÒÚÌõ¸öÈ˼ͼй¶ÖÁ°µÍø¡±¡£ÎÊÌâ¹Ø¼üÔÚÓÚMCP¸³ÓèAI¸±ÊÖ¡°Ç°ËùδÓеÄ×é֯ϵͳ½Ó¼ûȨÏÞ¡±£¬ÈκÎʹÓÃMCPÏνÓÊý¾Ý¿â¡¢Îļþϵͳ»òAPIµÄAI¸±ÊÖ¾ù¿ÉÄܳÉΪ¹¥»÷Ö¸±ê¡£
https://hackread.com/shadow-escape-0-click-attack-ai-assistants-risk/


¾©¹«Íø°²±¸11010802024551ºÅ