³ÛÃûÆû³µÆ·ÅÆÏµÍ³·ì϶Ö¿ͻ§Êý¾Ýй¶¼°³µÁ¾Ô¶³Ì½ÚÖÆ·çÏÕ
°ä²¼¹¦·ò 2025-08-131. ³ÛÃûÆû³µÆ·ÅÆÏµÍ³·ì϶Ö¿ͻ§Êý¾Ýй¶¼°³µÁ¾Ô¶³Ì½ÚÖÆ·çÏÕ
8ÔÂ11ÈÕ£¬£¬½üÈÕ£¬£¬ÔÚÃÀ¹úÕ¼Óг¬1000¼Ò¾ÏúµêµÄijδ¹«¿ªÃû³ÆµÄ´óÐÍÆû³µÖÆ×÷É̱»ÆØ´æÔÚÑÏÖØ°²È«·ì϶£¬£¬Æä¾ÏúÉÌʹÓõÄÔÚÏßÃÅ»§ÍøÕ¾´æÔÚÉí·ÝÑé֤ȱµã£¬£¬µ¼Ö¿ͻ§Êý¾Ýй¶¼°³µÁ¾Ô¶³Ì½ÚÖÆ·çÏÕ¡£¡£¡£¡£¸Ã·ì϶ÓɳÛÃû°²È«×êÑÐÔ±Eaton Zveare·¢ÏÖ²¢»ã±¨£¬£¬ÒÑÓÚ2025Äê2ÔÂÐÞ¸´¡£¡£¡£¡£Zveareͨ¹ýÅú¸ÄÃÅ»§ÍøÕ¾´úÂ룬£¬³É¹¦ÈƹýµÇ¼°²È«»úÖÆ´´½¨ÁË"¹ú¶ÈÖÎÀíÔ±"ÕË»§£¬£¬´Ó¶ø»ñµÃ"ÎÞÏ޶ȽӼûȨÏÞ"¡£¡£¡£¡£¹¥»÷Õ߿ɽè´Ë»ñÈ¡ÊýǧÃû¿Í»§µÄ¸öÈËÐÅÏ¢£¬£¬Ô̺¬Ð¡ÎÒÊý¾Ý¡¢¡¢²ÆÕþÐÅÏ¢¼°³µÁ¾¼ø±ðÂ루VIN£©¡£¡£¡£¡£¸üÑϸñµÄÊÇ£¬£¬Í¨¹ýVIN»ò¿Í»§ÐÕÃû£¬£¬ºÚ¿Í¿ÉÔ¶³Ì½ÚÖÆ³µÁ¾Ö°ÄÜ£¬£¬Èç½âËø³µÃÅ£¬£¬ÉõÖÁ´æÔÚ±»ÇÔÔôÀûÓõÄDZÔÚ·çÏÕ¡£¡£¡£¡£Ö»¹ÜZveareδ²âÊÔ³µÁ¾Æô¶¯Ö°ÄÜ£¬£¬µ«·ì϶ÒÑ×ãÒÔ×é³ÉÖØ´ó°²È«Òþ»¼¡£¡£¡£¡£Õâ´ÎÊÂÎñ¶³öµÄϵͳȱµãÔ¶³¬¿Í»§Êý¾Ý²ãÃæ¡£¡£¡£¡£Æ¾½èÖÎÀíԱȨÏÞ£¬£¬×êÑÐÈËÔ±»¹¿É²é¿´ËùÓоÏúÉ̵IJÆÕþÊý¾Ý£¬£¬²¢ÊµÊ±×·×Ù×âÁÞ»ò´ú²½³µµÄµØÎ»¡£¡£¡£¡£ZveareÔÚDefcon°²È«»áÒéÑݳöʾ·ì϶ʱǿµ÷£¬£¬µ××ÓÎÊÌâÔ´ÓÚµ¥Ò»µÄÉí·ÝÑéÖ¤Éè¼ÆÈ±µã£¬£¬"»ù´¡»·½Ú·¸´í»áµ¼ÖÂÕû¸öϵͳ±ÀÀ£"¡£¡£¡£¡£
https://hackread.com/carmaker-portal-flaw-hackers-unlock-cars-steal-data/
2. ºÉÀ¼¹Ø¼ü×éÖ¯ÔâCitrix NetScalerÁãÈÕ·ì϶¹¥»÷
8ÔÂ11ÈÕ£¬£¬ºÉÀ¼¹ú¶ÈÍøÂ簲ȫÖÐÐÄ£¨NCSC£©½üÈÕ·¢³öÑÏÖØÖҸ棬£¬Ö¸³öCitrix NetScalerÉ豸ÖдæÔÚµÄCVE-2025-6543·ì϶Òѱ»ÓÃÓÚÈëÇָùú¶à¸ö¹Ø¼ü×éÖ¯£¬£¬¹¥»÷ÕßÀûÓø÷ì϶ʵÏÖÁËÔ¶³Ì´úÂëÖ´Ðв¢¶Ï¸ùÈëÇÖºÛ¼££¬£¬Ôì³ÉÖØ´ó°²È«·çÏÕ¡£¡£¡£¡£¸Ã·ì϶ԴÓÚÄÚ´æÒç³öÃýÎ󣬣¬¿Éµ¼ÖÂÊÜÓ°ÏìµÄNetScaler ADCºÍGatewayÉ豸³öÏÖ½ÚÖÆÁ÷Òì³£»ò»Ø¾ø·þÎñ¡£¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬¹¥»÷ÔçÓÚ²¹¶¡°ä²¼£¬£¬NCSC֤ʵ£¬£¬ÖÁÉÙ×Ô5Ô³õÆð£¬£¬¸Ã·ì϶±ã±»×÷ΪÁãÈÕ·ì϶ÀûÓ㬣¬½ÏCitrix 6ÔÂ25ÈÕ°ä²¼°²È«²¼¸æÌáǰ½üÁ½¸öÔ¡£¡£¡£¡£¹¥»÷ÕßÊÖ·¨ÏȽø£¬£¬²»½öͨ¹ý·ì϶ʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬»¹¿ÌÒâ¶Ï¸ùÈëÇÖºÛ¼£ÒÔ¸²¸ÇÐÐΪ¡£¡£¡£¡£º£º£ºÉÀ¼¹«¹²¼ì²ì»ú¹Ø£¨OM£©Åû¶£¬£¬ÆäϵͳÒò¸Ã·ì϶Ôâ·êÑÏÖØ·ÛË飬£¬µ¼ÖÂÔËÓªÖжϣ¬£¬Ö±ÖÁÉÏÖܲÅÖ𲽸´Ôµç×ÓÓʼþµÈÖ÷Ìâ·þÎñ¡£¡£¡£¡£NCSCÆÀ¹À£¬£¬Õâ´Î¹¥»÷Õë¶Ô¶à¸öÖØÒª×éÖ¯£¬£¬Í¹ÏÔ·ì϶µÄÏÖʵΣº£º£º¦ÐÔ¡£¡£¡£¡£ÎªÓ¦¶ÔÍþв£¬£¬NCSCÇ¿µ÷±ØÐëÁ¢¼´Éý¼¶ÖÁÊÜÖ§³Ö°æ±¾£¬£¬²¢½¨Òé×°Öò¹¶¡ºóÖ´ÐÐÒÔϲÙ×÷£º£º£ºÍ¨¹ýºÅÁîÖÕÖ¹ËùÓл»á»°£¬£¬¶Ï¸ùÓÆ¾Ã»á»°¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/
3. ³¬2.9Íǫ̀δÐÞ²¹Exchange·þÎñÆ÷¶³ö¸ß·çÏÕ·ì϶
8ÔÂ11ÈÕ£¬£¬½üÈÕ£¬£¬³¬¹ý29,000̨δÐÞ²¹µÄMicrosoft Exchange·þÎñÆ÷Òò¸ßÑÏÖØÐÔ·ì϶£¨CVE-2025-53786£©³ÖÐøÂ¶³öÓÚÍøÂç¹¥»÷·çÏÕÖУ¬£¬¸Ã·ì϶¿ÉÄÜʹ¹¥»÷Õßͨ¹ýαÔìÁîÅÆ»òAPIŲÓÃÔÚÔÆ»·¾³ÖкáÏòÒÆ¶¯£¬£¬×îÖÕµ¼Ö»ìºÏÔÆ¼°±¾µØÓòµÄÆëÈ«ÈëÇÖ¡£¡£¡£¡£¾Ý°²È«Íþв¼à¿ØÆ½Ì¨Shadowserver 8ÔÂ10ÈÕɨÃèÁ˾֣¬£¬È«ÇòÈÔÓÐ29,098̨δÐÞ²¹·þÎñÆ÷£¬£¬ÆäÖÐÃÀ¹ú£¨7,200Óą̀£©¡¢¡¢µÂ¹ú£¨6,700Óą̀£©¡¢¡¢¶íÂÞ˹£¨2,500Óą̀£©ÎªÖØÔÖÇø¡£¡£¡£¡£¸Ã·ì϶ӰÏìExchange Server 2016¡¢¡¢2019¼°¶©Ôİ棨»ìºÏÅäÖÃģʽ£©£¬£¬ÆäµÀÀíÔÚÓÚÔÊÐíÒÑ»ñÈ¡±¾µØExchangeÖÎÀíȨÏÞµÄÍþвÐÐΪÕߣ¬£¬Í¨¹ý°Ñ³Ö¿ÉÐÅÁîÅÆ»òAPIŲÓÃÎÞºÛÌáÉýÔÆ»·¾³È¨ÏÞ£¬£¬Î¢Èí½«ÆäÏóÕ÷Ϊ¡°¸ü¿ÉÄܱ»ÀûÓᱵĸßΣ·ì϶¡£¡£¡£¡£Ö»¹ÜĿǰÉÐδ·¢ÏÖÏÖʵ¹¥»÷°¸Àý£¬£¬µ«Î¢Èí4Ô°䲼µÄÐÞ²¹·¨Ê½ÈÔδ±»¿í·ºÑ¡È¡£¬£¬µ¼Ö·çÏÕ³ÖÐøÀÛ»ý¡£¡£¡£¡£Õë¶ÔÕâÒ»Íþв£¬£¬ÃÀ¹úÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Ñ¸ËÙÐж¯£¬£¬ÓÚ΢ÈíÅû¶·ì϶´ÎÈÕ°ä²¼´¹Î£Ö¸Áî25-02£¬£¬ÒªÇóËùÓÐÁª°îÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÔÚÃÀ¹ú¶«²¿¹¦·òÖÜÒ»ÉÏÎç9µãǰʵÏÖÐÞ¸´¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-29-000-exchange-servers-unpatched-against-high-severity-flaw/
4. Curly COMradesÍøÂç¼äµý×éÖ¯Õë¶Ô¶«Å·Ö¸±êÖ´ÐÐÐÂÐͶñÒâÈí¼þ¹¥»÷
8ÔÂ12ÈÕ£¬£¬ÍøÂ簲ȫ¹«Ë¾Bitdefender½üÈÕÅû¶£¬£¬Ò»¸öÒÉËÆÖ§³Ö¶íÂÞ˹ÀûÒæµÄAPT×éÖ¯Curly COMrades×Ô2024ÄêÖÐÆÚÒÔÀ´£¬£¬Õë¶Ô¸ñ³¼ªÑǵ±¾Ö»ú¹¹¡¢¡¢Ë¾·¨²¿Ãż°Ä¦¶û¶àÍßÄÜÔ´¹«Ë¾·¢Õ¹ÍøÂç¼äµý»î¶¯¡£¡£¡£¡£¸Ã×é֯ѡȡ×ÔÖ÷Ñз¢µÄÈý½×¶Î.NET¶ñÒâÈí¼þMucorAgent£¬£¬Í¨¹ý¸´ÔӵĹ¥»÷Á´ÊµÏÖÓÆ¾Ã»¯ÉøÈ룬£¬Æä¼¼ÊõÌØµãÓëµØÔµÕþÖζ¯»úÒý·¢Òµ½ç¹Ø×¢¡£¡£¡£¡£×êÑÐÏÔʾ£¬£¬Curly COMradesµÄÖ÷Ì⹤¾ßMucorAgent±»Éè¼ÆÎªÒþÐκóÃÅ£¬£¬¾ß±¸Ö´ÐÐAES¼ÓÃÜPowerShell¾ç±¾¡¢¡¢½«Á˾ֻش«C2·þÎñÆ÷µÄÄÜÁ¦¡£¡£¡£¡£Æä¹¥»÷Á´Í¨¹ý½Ù³ÖWindows×é¼þ¶ÔÏóÄ£ÐÍ£¨COM£©¶ÔÏóʵÏÖ£¬£¬²¢´óÁ¿ÒÀÀµcurl.exe½øÐÐÊý¾ÝÍâйºÍͨѶ¡£¡£¡£¡£Ö»¹Üδ·¢ÏÖÓëÒÑÖª¶íÂÞ˹APT×éÖ¯µÄÖ±½Ó¹ØÁª£¬£¬µ«¸Ã×éÖ¯¶Ô¶«Å·¹Ø¼ü»ù´¡ÉèÊ©µÄ¶¨Ïò¹¥»÷£¬£¬Óë¶íÂÞ˹Áª°îµØÔµÕ½Êõ´æÔÚÏÔÖøÒ»ÖÂÐÔ¡£¡£¡£¡£¸Ã×éÖ¯µÄÓÆ¾Ã»¯»úÖÆÆÄ¾ß´´ÐÂÐÔ£º£º£ºÍ¨¹ý½Ù³Ö.NET FrameworkµÄNGEN×é¼þ£¬£¬½«¶ñÒâ´úÂëÖ²Èë¿´ËÆ²»»îÔ¾µÄ´òË㹤×÷¡£¡£¡£¡£¹¥»÷Õß»¹²¿ÊðResocks¡¢¡¢×Ô½ç˵SOCKS5·þÎñÆ÷¼°SSH+Stunnel×éºÏ½øÐÐÁ÷Á¿»ìºÏ£¬£¬ÉõÖÁͨ¹ýCurlCat¹¤¾ßÀûÓÃlibcurl¿âºÍÌØÊâBase64±àÂ룬£¬½«¶ñÒâÁ÷Á¿¼Ù×°³ÉºÏ·¨ÍøÕ¾Í¨Ñ¶¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/curly-comrades-cyberspies-hit-govt-orgs-with-custom-malware/
5. È«ÇòÈËÁ¦¾ÞÍ·ManpowerÔâRansomHubÀÕË÷¹¥»÷£¬£¬14.5ÍòÈËÊý¾Ýй¶
8ÔÂ12ÈÕ£¬£¬È«ÇòÈËÁ¦×ÊÔ´·þÎñ¾ÞÍ·Manpower½üÈÕÅûÂ¶Ò»Â·ÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬Ó°ÏìÁìÓò²¨¼°½ü14.5ÍòÃûСÎÒ¡£¡£¡£¡£Õâ´ÎÊÂÎñÔ´ÓÚ2024Äê12ÔÂ29ÈÕÖÁ2025Äê1ÔÂ12ÈÕÆÚ¼ä£¬£¬Éí·Ý²»Ã÷µÄ¹¥»÷Õßδ¾ÊÚȨÇÖÈëÆäϵͳ£¬£¬¿ÉÄÜ»ñÈ¡ÁËÔ̺¬Éç»á°²È«ºÅÂë¡¢¡¢µØÖ·¡¢¡¢ÁªÏµÐÅÏ¢¡¢¡¢»¤ÕÕɨÃè¼þµÈÃô¸ÐÊý¾ÝµÄÎļþ¡£¡£¡£¡£×÷ΪÍò±¦Ê¢»ª¼¯ÍÅ£¨ManpowerGroup£©ÆìÏÂ×Ó¹«Ë¾£¬£¬ManpowerÔÚÈ«ÇòÕ¼Óг¬¹ý2700¸ö´¦Ê´¦£¬£¬·þÎñ³¬10Íò¼Ò¿Í»§£¬£¬2024ÄêÓªÊÕ´ï179ÒÚÃÀÔª¡£¡£¡£¡£ÊÂÎñ¶³öÔ´ÓÚ2025Äê1ÔÂ20ÈÕ£¬£¬¸Ã¹«Ë¾À¼ÐÁ°ì¹«ÊÒITϵͳÖжÏÒý·¢µ÷²é¡£¡£¡£¡£Ëæºó£¬£¬ManpowerÈ·ÈϹ¥»÷ÕßÔÚ´ËÆÚ¼ä³ÖÐø½Ó¼ûÆäÍøÂ磬£¬²¢ÓÚ7ÔÂ28ÈÕÆðÍ·ÏòÊÜÓ°Ïì¸ö±ð·¢³ö֪ͨ¡£¡£¡£¡£ÎªÓ¦¶ÔΣ»ú£¬£¬¸Ã¹«Ë¾ÒÑÇ¿»¯IT°²È«´ëÊ©£¬£¬ÓëÁª°îµ÷²é¾Ö£¨FBI£©ºÏ×÷²é¾¿¹¥»÷Õߣ¬£¬²¢Í¨¹ýEquifaxΪÊܺ¦ÕßÌṩÃâ·ÑÐÅÓþ¼à¿Ø¼°Éí·Ý͵ÇÔ±£»¤·þÎñ¡£¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬ÀÕË÷Èí¼þ×éÖ¯RansomHub¹«¿ªÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬£¬Ðû³ÆÇÔȡԼ500GBÊý¾Ý£¬£¬Ô̺¬¿Í»§Êý¾Ý¿â¡¢¡¢²ÆÕþ±¨±í¡¢¡¢ÈËÁ¦×ÊÔ´·ÖÎö¡¢¡¢»úÃܺÏÒ»ÖÂÖ÷Ìâ×ÊÁÏ¡£¡£¡£¡£Ö»¹ÜManpowerδÃ÷È·ÈÏ¿ÉÖ§¸¶Êê½ð£¬£¬µ«RansomHubÒÑ´ÓÆä°µÍøÐ¹ÃÜÕ¾µãÒÆ³ýÓйØÌõ¿î£¬£¬°µÊ¾¿ÉÄÜ´æÔÚÊê½ðÂòÂô¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/manpower-staffing-agency-discloses-data-breach-after-attack-claimed-by-ransomhub/
6. ºÚ¿ÍÏ®»÷ºÉÀ¼³¢ÊÔÊÒ£¬£¬ÇÔÈ¡50ÍòÃû»¼ÕßÊý¾Ý
8ÔÂ12ÈÕ£¬£¬ºÉÀ¼½üÈÕ²úÉúÒ»Â·ÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬Ó°Ï쳬¹ý48.5ÍòÃû¹¬¾±°©É¸²é´òËã²Î¼ÓÕß¡£¡£¡£¡£¾ÝºÉÀ¼È˶¡É¸²éлᣨBDO£©´«µÝ£¬£¬7ÔÂ3ÈÕÖÁ6ÈÕÆÚ¼ä£¬£¬Î»ÓÚÀ³Ë¹Î¤¿ËµÄEurofins Scientific×Ó¹«Ë¾ÁÙ´²Õï¶Ï³¢ÊÔÊÒNMDLÔâ²»Ã÷ÍþвÐÐΪÕßÈëÇÖ£¬£¬µ¼Ö²μÓÕßÐÕÃû¡¢¡¢µØÖ·¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢¹«Ãñ·þÎñºÅÂ루BSN£©¡¢¡¢¼ì²âÁ˾ּ°Ò½ÁÆÌṩÕßÐÅÏ¢µÈÃô¸ÐÊý¾Ý±»µÁ£¬£¬ÉÙÊýÊܺ¦Õßµç×ÓÓʼþºÍµç»°ºÅÂëÒà±»ÇÔÈ¡¡£¡£¡£¡£Ö»¹Ü³¢ÊÔÊÒÔÚ8ÔÂ6ÈÕ²ÅÏòµ±¾Ö»ã±¨£¬£¬µ«BDOÒÑÔÝÍ£Æä·þÎñ²¢Æô¶¯¶ÀÁ¢IT°²È«µ÷²é£¬£¬Í¬Ê±Ç¿µ÷ÆäËû³¢ÊÔÊÒ½«ÊÕÊÜɸ²éÁ˾ִ¦Ö㬣¬È·±£¹«Ãñ³ÖÐø²Î¼ÓÏîÄ¿¡£¡£¡£¡£Õâ´ÎÊÂÎñ¶³ö³öµÚÈý·½·þÎñ»ú¹¹µÄ°²È«·ì϶¡£¡£¡£¡£±¾µØ±¨µÀÖ¸³öºÚ¿Í¿ÉÄÜÇÔÈ¡ÁË´ÓǰÈýÄêʹÓøó¢ÊÔÊ񵀮äËû»¼ÕßÊý¾Ý£¬£¬×ÜÁ¿´ï300GB£¬£¬ÏÖʵӰÏìÁìÓò»òÔ¶³¬³õ²½Í³¼Æ¡£¡£¡£¡£Ä¿Ç°£¬£¬ºÉÀ¼µ±¾ÖÕýÖðһ֪ͨÊܺ¦Õߣ¬£¬BDOÒàÖÒ¸æÆä¿ÉÄÜÃæ¶ÔÉí·Ý͵ÇÔ»òڲƷçÏÕ¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/hackers-raid-dutch-lab-steal-data/


¾©¹«Íø°²±¸11010802024551ºÅ