Allianz LifeÊý¾Ýй¶ÊÂÎñ¶³ö140Íò¿Í»§ÐÅÏ¢
°ä²¼¹¦·ò 2025-07-281. Allianz LifeÊý¾Ýй¶ÊÂÎñ¶³ö140Íò¿Í»§ÐÅÏ¢
7ÔÂ27ÈÕ£¬£¬°²ÁªÈËÊÙ£¨Allianz Life£©È·ÈÏ7ÔÂ16ÈÕ²úÉúÁËһ·ÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬µ¼ÖÂÆä140Íò¿Í»§ÖеĴóÎÞÊýСÎÒÐÅÏ¢Ô⵽¶³ö¡£¡£¡£¡£Æ¾¾Ý¹«Ë¾½²»°È˵ÄÉêÃ÷£¬£¬Õâ´ÎÊÂÎñÊÇÓÉÓÚÍþвÐÐΪÕßͨ¹ýÉç»á¹¤³Ì¹¥»÷ÈëÇÖÁ˵ÚÈý·½»ùÓÚÔÆµÄ¿Í»§¹ØÏµÖÎÀí£¨CRM£©ÏµÍ³¡£¡£¡£¡£¹¥»÷Õ߳ɹ¦»ñÈ¡ÁËÓë°²ÁªÈËÊÙ¿Í»§¡¢¡¢½ðÈÚרҵÈËÊ¿ÒÔ¼°²¿ÃÅÔ±¹¤ÓйصÄСÎÒÉí·ÝÐÅÏ¢£¨PII£©¡£¡£¡£¡£°²ÁªÈËÊÙѸËÙ²ÉÈ¡´ëÊ©¶ôÖÆ²¢»º½âÁËÕâÒ»ÊÂÎñ£¬£¬²¢ÏòÃÀ¹úÁª°îµ÷²é¾Ö£¨FBI£©»ã±¨Á˸ÃÊÂÎñ¡£¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬Ä¿Ç°Ã»ÓÐÖ¤¾ÝÅú×¢ÆäÄÚ²¿ÍøÂç»ò¹Ø¼üϵͳ£¨ÀýÈç±£µ¥ÖÎÀíϵͳ£©Ôâµ½½Ó¼û¡£¡£¡£¡£È»¶ø£¬£¬Óйص÷²éÈÔÔÚ½øÐÐÖУ¬£¬ÊÜÓ°ÏìµÄСÎÒÒÑÆðÍ·ÊÕµ½Í¨Öª£¬£¬Í¬Ê±¹«Ë¾ÌṩÁËרÃŵÄÖ§³Ö·þÎñ¡£¡£¡£¡£°²ÁªÈËÊÙ»¹ÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»ÁËÓйØÕâ´ÎÊý¾Ýй¶µÄÎļþ¡£¡£¡£¡£Ö»¹Ü¹«Ë¾Î´Ã÷È·Ö¸³ö±³ºóµÄÍþвÐÐΪÕߣ¬£¬µ«¾Ý±¨µÀ³Æ£¬£¬Õâ´Î¹¥»÷¿ÉÄÜÓë³ôÃûÔ¶ÑïµÄºÚ¿Í×éÖ¯ShinyHuntersÓйء£¡£¡£¡£ShinyHuntersÊÇÒ»¸ö»îÔ¾µÄºÚ¿ÍÍŻ£¬ÔøÂÅ´ÎÔÚ°µÍøÉÏÏúÊÛ´Ó¶à¼Ò³ÛÃûÆóÒµÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£
https://securityaffairs.com/180445/data-breach/allianz-life-data-breach-exposed-the-data-of-most-of-its-1-4m-customers.html
2. Scattered SpiderÕýÔÚ´ó¾Ù¹¥»÷VMware ESXi
7ÔÂ27ÈÕ£¬£¬ÒÔ¾¼ÃÀûÒæÎªµ¼ÏòµÄºÚ¿Í×éÖ¯Scattered Spider£¨±ðºÅUNC3944¡¢¡¢Octo Tempest£©½üÈÕÕë¶ÔÃÀ¹ú¼°Ó¢¹úÁãÊÛ¡¢¡¢º½¿Õ¡¢¡¢ÔËÊä¡¢¡¢±£ÏÕµÈÐÐÒµÆóÒµÌáÒé´ó¹æÄ£¹¥»÷£¬£¬Æä´´ÐÂÊÖ·¨Òý·¢°²È«½ç¹Ø×¢¡£¡£¡£¡£¸Ã×éÖ¯ÞðÆú´«Í³·ì϶ÀûÓÃģʽ£¬£¬×ª¶øÍ¨¹ý¾«ÃÜÉç»á¹¤³ÌѧսÊõ£¬£¬Ö±½ÓÍ»ÆÆÆóÒµÐé¹¹»¯»·¾³·À»¤¡£¡£¡£¡£¹¥»÷Á´³öÏÖÎå¸öÇ峺½×¶Î£º£º£ºÊ×ÏÈͨ¹ý¼ÙÒâÔ±¹¤ÕûµçIT·þÎñ̨£¬£¬ÓÕʹ¼¼ÊõÖ§³ÖÈËÔ±ÖØÖøßȨÏÞÕË»§ÃÜÂ룬£¬»ñÈ¡³õʼ½Ó¼ûȨÏÞ£»ËæºóɨÃèActive Directory¼°ÌØÈ¨½Ó¼ûÖÎÀí£¨PAM£©ÏµÍ³£¬£¬¾«×¼¶¨Î»ÓòÖÎÀíÔ±¡¢¡¢vSphereÖÎÀíÔ±µÈÖ÷ÌâÕË»§ÐÅÏ¢£»¼Ì¶øÍ¨¹ýÂŴμÙ×°ÌØÈ¨Óû§Öµ磬£¬×îÖÕ½ÚÖÆ¹Ø¼üÕ˺آɸÈëVMware vCenter Server Appliance£¨vCSA£©£¬£¬¸Ã×é¼þÕÆ¹ÜÖÎÀíÔ̺¬ESXiÐé¹¹»úÖÎÀí·¨Ê½µÄvSphere»·¾³¡£¡£¡£¡£»ñµÃvCSA½ÚÖÆÈ¨ºó£¬£¬¹¥»÷ÕßÖ´ÐÐÁ½Ïî¹Ø¼ü²Ù×÷£º£º£ºÆäһͨ¹ýÆôÓÃSSHÏνӲ¢ÖØÖÃESXiÖ÷»úrootÃÜÂ룬£¬³ÉÁ¢Óƾû¯½Ó¼ûͨµÀ£»Æä¶þÖ´Ðд´ÐµÄ"´ÅÅÌ»¥»»"¹¥»÷£¬£¬¹Ø±ÕÓò½ÚÖÆÆ÷Ðé¹¹»úºó·ÖÀëÆäÐé¹¹´ÅÅÌ£¬£¬½«Æä¹ÒÔØÖÁ¹¥»÷Õß½ÚÖÆµÄÐé¹¹»úÒÔÇÔÈ¡Ô̺¬Óû§¹þÏ£ÖµµÄNTDS.ditÊý¾Ý¿â¡£¡£¡£¡£×îÖս׶Σ¬£¬¹¥»÷Õßͨ¹ýSSHͨµÀ²¿ÊðÀÕË÷Èí¼þ£¬£¬¼ÓÃÜÊý¾Ý´æ´¢ÇøËùÓÐÐé¹¹»úÎļþ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/scattered-spider-is-running-a-vmware-esxi-hacking-spree/
3. ³¬20ÍòWordPressÍøÕ¾Ãæ¶ÔPost SMTP²å¼þ·ì϶·çÏÕ
7ÔÂ26ÈÕ£¬£¬Ò»ÏîÓ°Ï쳬¹ý20Íò¸öWordPressÍøÕ¾µÄÑÏÖØ°²È«·ì϶½üÈÕ±»ÆØ¹â¡£¡£¡£¡£¸Ã·ì϶´æÔÚÓÚ»îÔ¾×°ÖÃÁ¿³¬40ÍòµÄÈȵã²å¼þPost SMTPµÄ3.2.0¼°ÒÔϰ汾ÖУ¬£¬±»×·×ÙΪCVE-2025-24000£¬£¬CVSSÆÀ·Ö´ï8.8¡£¡£¡£¡£·ì϶Ö÷ÌâÔ´ÓÚ²å¼þREST API¶ËµãµÄ½Ó¼û½ÚÖÆ»úÖÆÈ±µã£¬£¬½öÑéÖ¤Óû§ÊÇ·ñµÇ¼£¬£¬¶øÎ´²é³ÆäȨÏÞ¼¶±ð£¬£¬µ¼ÖµÍȨÏÞÓû§£¨Èç¶©ÔÄÕߣ©¿É½Ó¼ûÔ̺¬ÆëÈ«ÓʼþÄÚÈݵÄÈÕÖ¾£¬£¬²¢´¥·¢ÖÎÀíÔ±ÕË»§ÃÜÂëÖØÖÃÁ÷³Ì¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ýÀ¹½ØÖØÖÃÓʼþʵÏÖÕË»§ÊÕÊÜ£¬£¬×îÖÕ½ÚÖÆÕû¸öÍøÕ¾¡£¡£¡£¡£¸Ã·ì϶Óɰ²È«×êÑÐÈËÔ±ÓÚ5ÔÂ23Èջ㱨ÖÁWordPress°²È«³§ÉÌPatchStack£¬£¬²å¼þ¿ª·¢ÕßSaad IqbalѸËÙÏìÓ¦£¬£¬5ÔÂ26ÈÕÌá½»ÐÞ¸´¹æ»®²¢Í¨¹ýÔÚ"get_logs_permission"º¯ÊýÖÐÔö³¤È¨ÏÞУÑ飬£¬È·±£½öÖÎÀíÔ±¿É½Ó¼ûÃô¸ÐAPI¡£¡£¡£¡£ÐÞ¸´°æ±¾3.3.0ÓÚ6ÔÂ11ÈÕ°ä²¼£¬£¬µ«WordPress.orgͳ¼ÆÊý¾ÝÏÔʾ£¬£¬½ØÖÁµ±Ç°½ö48.5%Óû§ÊµÏÖÉý¼¶£¬£¬Òâζ×ÅÈÔÓг¬20Íò¸öÍøÕ¾Â¶³öÔÚ·çÏÕÖС£¡£¡£¡£¸üÑϸñµÄÊÇ£¬£¬24.2%£¨Ô¼9.68Íò¸ö£©Õ¾µãÈÔÔËÐдæÔÚÆäËûº¹Çà·ì϶µÄ2.x¾É°æ±¾£¬£¬°²È«¾ÖÊÆ²»ÈÝÀÖ¹Û¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/post-smtp-plugin-flaw-exposes-200k-wordpress-sites-to-hijacking-attacks/
4. ÑÇÂíÑ·AI±àÂë´úÀíÔâºÚ¿Í¹¥»÷£¬£¬×¢ÈëÊý¾Ý²Á³ýºÅÁî
7ÔÂ25ÈÕ£¬£¬ÑÇÂíÑ·ÆìÏÂÌìÉúʽAI¿ª·¢ÖúÊÖAmazon QµÄVisual Studio CodeÀ©´ó½üÈÕÔâ·ê°²È«ÊÂÎñ£¬£¬Òý·¢Òµ½ç¶Ô¿ªÔ´¹©¸øÁ´°²È«µÄ¹Ø×¢¡£¡£¡£¡£Õâ¿îÕ¼Óнü°ÙÍò×°ÖÃÁ¿µÄÃâ·ÑÀ©´ó·¨Ê½£¬£¬Í¨¹ýÌìÉúʽAI¸¨Öú¿ª·¢Õß±àÂë¡¢¡¢µ÷ÊÔ¼°ÅäÖÃÖÎÀí£¬£¬È´ÔÚGitHub´úÂëÍйÜÁ÷³ÌÖгöÏÖ·ì϶£¬£¬±»ºÚ¿ÍÖ²ÈëÊý¾Ý²Á³ý´úÂë¡£¡£¡£¡£ÊÂÎñÔ´ÓÚ7ÔÂ13ÈÕ£¬£¬ºÚ¿Í"lkmanka58"ͨ¹ýÀȡҪÇóÏòAmazon QµÄGitHub²Ö¿âÌύδ¾ÉóÅúµÄ´úÂ룬£¬×¢ÈëÔ̺¬"¶Ï¸ùϵͳÖÁ³ö³§×´Ì¬²¢É¾³ýÎļþϵͳ¼°ÔÆ×ÊÔ´"Ö¸ÁîµÄ¶ñÒâÌáÐÑ¡£¡£¡£¡£ÓÉÓÚÏîĿȨÏÞÖÎÀíÊè©»ò¹¤×÷Á÷³ÌÅäÖÃÃýÎ󣬣¬¸ÃÌá½»²»²â»ñµÃ´æ´¢¿â½Ó¼ûȨÏÞ£¬£¬µ¼ÖÂÔ̺¬¶ñÒâ´úÂëµÄ1.84.0°æ±¾ÓÚ7ÔÂ17ÈÕÔÚVS CodeÊг¡°ä²¼¡£¡£¡£¡£Ö»¹ÜÑÇÂíÑ·¹ýºóÐû³Æ´úÂëÌåʽÃýÎóδÏÖʵִÐУ¬£¬ÇÒδÔì³ÉÄÚÈÝΣº£º£º¦£¬£¬µ«°²È«×êÑÐÈËÔ±ÈÔÖ¸³öÕâ¶³öÁËÑÏÖØµÄ¹©¸øÁ´·çÏÕ£¬£¬Èô´úÂë¾¹ýÓÐЧ¼Ù×°£¬£¬¿ÉÄÜÒý·¢´ó¹æÄ£Êý¾Ý·ÛËé¡£¡£¡£¡£7ÔÂ23ÈÕ£¬£¬ÑÇÂíѷͨ¹ý°²È«»ã±¨»ñϤ¸ÃÎÊÌâºó£¬£¬Á¢¼´Æô¶¯È¡Ö¤µ÷²é¡£¡£¡£¡£´ÎÈÕ¼´°ä²¼ÐÞ¸´°æ±¾1.85.0£¬£¬³¹µ×ÒÆ³ý¶ñÒâ´úÂë²¢¸üÐÂÆ¾Ö¤¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/amazon-ai-coding-agent-hacked-to-inject-data-wiping-commands/
5. Ô¼»á°²È«ÀûÓÃTeaÔâºÚ¿ÍÈëÇÖ£¬£¬7.2ÍòÓû§ÒþÖÔÕÕÆ¬Ð¹Â¶
7ÔÂ26ÈÕ£¬£¬Ö÷´òÅ®ÐÔÓû§°²È«µÄÔ¼»áÆÀÂÛÀûÓÃTea½üÈÕÔâ·êÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬³¬7.2ÍòÕÅÓû§ÕÕÆ¬±»ºÚ¿Í»ñÈ¡²¢´«²¼£¬£¬Òý·¢ÒþÖÔ°²È«ÕùÒé¡£¡£¡£¡£Õâ¿îÔÊÐíÅ®ÐÔÄäÃûÆÀ¼ÛÔ¼»á¶ÔÏóµÄÀûÓ÷¨Ê½ÓÚ25ÈÕ°ä²¼ÉêÃ÷£¬£¬Ö¤ÊµÆäϵͳÔâÈëÇÖ£¬£¬Ð¹Â¶Êý¾ÝÔ̺¬Á½ÀàÃô¸ÐͼÏñ£º£º£º1.3ÍòÕÅÓÃÓÚÕË»§ÑéÖ¤µÄ×ÔÅļ°Éí·ÝÖ¤¼þÕÕ£¬£¬ÒÔ¼°5.9ÍòÕÅÀ´×ÔÓû§°ä²¼ÄÚÈÝ¡¢¡¢ÆÀÂÛºÍ˽ÐŵÄͼƬ¡£¡£¡£¡£Ö»¹Ü¹«Ë¾Ç¿µ÷δй¶ÓÊÏ䵨ַ»òµç»°ºÅÂ룬£¬ÇÒÊÂÎñ½öÓ°Ïì2024Äê2ÔÂǰע²áµÄÓû§£¬£¬µ«Éí·ÝÖ¤¼þÓë˽ÃÜ»¥¶¯ÄÚÈݵͳöÈÔ×é³ÉÑÏÖØÒþÖÔ·çÏÕ¡£¡£¡£¡£ÊÂÎñÆØ¹âÔ´ÓÚ4chanÓû§·¢ÏÖ²¢´«²¼Á˶³öµÄÊý¾Ý¿â£¬£¬ºÚ¿Íͨ¹ýδÃ÷È·×¢Ã÷µÄ·ì϶»ñÈ¡ÁË´æ´¢Óû§ÕÕÆ¬µÄºó¶Ü×ÊÔ´¡£¡£¡£¡£Tea¹«Ë¾»ØÓ¦³ÆÒÑ´¹Î£ÀñƸµÚÈý·½ÍøÂ簲ȫÍŶӣ¬£¬24Ð¡Ê±ÍÆ¶¯ÏµÍ³¼Ó¹Ì£¬£¬²¢Ðû³Æ"ÒÑÖ´ÐжîÍⰲȫ´ëÊ©ÇÒÐÞ¸´Êý¾ÝÎÊÌâ"£¬£¬µ«Î´Ð¹Â©¾ßÌå¼¼Êõϸ½Ú¡£¡£¡£¡£Ä¿Ç°£¬£¬TeaÒѰ䲼ÐÞ¸´°æ±¾²¢ºôÓõÓû§¸üС£¡£¡£¡£
https://techcrunch.com/2025/07/26/dating-safety-app-tea-breached-exposing-72000-user-images/
6. Operation CargoTalonÕë¶Ô¶íÂÞ˹º½¿Õº½ÌìÁìÓòµÄÍøÂç¼äµý»î¶¯
7ÔÂ25ÈÕ£¬£¬ÍøÂ簲ȫר¼ÒÅû¶ÁËÒ»ÏîÃûΪOperation CargoTalonµÄÍøÂç¼äµý»î¶¯£¬£¬¸Ã»î¶¯Õë¶Ô¶íÂÞ˹µÄº½¿Õº½ÌìÓë¹ú·À²¿ÃÅ£¬£¬³ö¸ñÊÇÎÖÂÞÄùÈÕ·É»úÖÆ×÷лá(VASO)¡£¡£¡£¡£×êÑÐÈËԱͨ¹ýµ÷²é·¢ÏÖ£¬£¬¹¥»÷ÕßÀûÓüÙ×°³É¡°»õÎïÔËÊäµ¥¡±(TTN)ÎļþµÄ¶ñÒ⸽¼þ½øÐд¹µö¹¥»÷¡£¡£¡£¡£ÕâЩÎļþÀíÂÛÉÏΪZIPѹËõ°ü£¬£¬µ«ÏÖʵÉÏÔ̺¬¶ñÒâLNK¿ì½Ý·½Ê½ºÍDLLÖ²È뷨ʽ£¬£¬×îÖÕ¿ªÊͲ¢Ö´ÐÐÃûΪEAGLETµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£EAGLETÊÇÒ»ÖÖ¶¨ÖÆ»¯µÄPEÎļþºóÃÅ·¨Ê½£¬£¬¾ß±¸ÌìÉúΨһGUID±êʶÊܺ¦Õß¡¢¡¢ÍøÂçϵͳÐÅÏ¢¡¢¡¢´´½¨°µ²ØÄ¿Â¼ÒÔ¼°Í¨¹ýHTTPÏνӺÅÁîÓë½ÚÖÆ(C2)·þÎñÆ÷µÄÖ°ÄÜ¡£¡£¡£¡£ÆäÖ§³ÖÔ¶³ÌShell½Ó¼û¡¢¡¢ÎļþÏÂÔØºÍÊý¾ÝÇÔÈ¡£¬£¬²¢¿ÉÄÜͨ¹ýºÏ·¨Windows APIÖ´ÐÐÍøÂç²Ù×÷ÒÔʵÏÖÒñ±ÎͨѶ¡£¡£¡£¡£¹¥»÷Á´´Ó´¹µöÓʼþÆðÍ·£¬£¬¾¹ý¶à½×¶ÎµÄϰȾ¹ý³Ì£¬£¬×îÖÕʵÏÖÊý¾ÝÇÔÈ¡¹¤×÷¡£¡£¡£¡£×êÑÐÈËÔ±ÒÔΪ£¬£¬Õâ´Î»î¶¯ÓÉÒ»¸ö±»×·×ÙΪUNG0901µÄÍþв×éÖ¯ÌáÒ飬£¬ÇÒÓë´Ëǰ·¢ÏÖµÄHead MareÍþв¼¯Èº´æÔÚÖ°ÄÜÖØµþºÍÕ½ÊõÀàËÆÐÔ¡£¡£¡£¡£¶þÕß¾ùʹÓÃÀàËÆµÄµö¶ü¶¨Ãû¹æ¶¨ºÍºóÃŹ¤¾ß£¨ÀýÈçPhantomDL£©£¬£¬Åú×¢ÕâЩ¹¥»÷Ðж¯¿ÉÄܹ²Ïí²¿ÃÅ×ÊÔ´»òÕ½Êõ¡£¡£¡£¡£
https://securityaffairs.com/180378/intelligence/operation-cargotalon-targets-russias-aerospace-with-eaglet-malware.html


¾©¹«Íø°²±¸11010802024551ºÅ