ÈËÁ¦×ÊÔ´¾ÞÍ·WorkdayÔÚSalesforce¹¥»÷ºóÅû¶Êý¾Ýй¶
°ä²¼¹¦·ò 2025-08-191. ÈËÁ¦×ÊÔ´¾ÞÍ·WorkdayÔÚSalesforce¹¥»÷ºóÅû¶Êý¾Ýй¶
8ÔÂ18ÈÕ£¬È«ÇòÈËÁ¦×ÊÔ´¾ÞÍ·Workday½üÈÕÅûÂ¶Ò»Â·ÖØ´óÊý¾Ý°²È«ÊÂÎñ£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¼¿Á©ÈëÇÖÆäµÚÈý·½¿Í»§¹ØÏµÖÎÀí£¨CRM£©Æ½Ì¨£¬µ¼Ö²¿ÃÅÆóÒµÁªÏµÐÅϢй¶¡£¡£Õâ´ÎÊÂÎñÒý¿¯ÐÐÒµ¿í·º¹Ø×¢£¬²»½öÒòWorkdayµÄÖØ´ó¿Í»§»ù´¡£¡£¬Æä·þÎñ¸²¸ÇÈ«Çò11,000Óà¼ÒÆóÒµ£¬Ô̺¬³¬60%µÄ¡¶²Æ¸»¡·500Ç¿ÆóÒµ£¬¸üÒò¸ÃÊÂÎñ±»Ö¤ÊµÓë½üÆÚÕë¶ÔSalesforce CRMʵÀýµÄϵÁй¥»÷´æÔÚ¹ØÁª¡£¡£¾ÝWorkday¹Ù·½Åû¶£¬8ÔÂ6ÈÕ¹«Ë¾¼à²âµ½Òì³£»£»î¶¯£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¼¿Á©ÓÕÆÔ±¹¤ÊÚȨ¶ñÒâOAuthÀûÓã¬×îÖÕ»ñÈ¡µÚÈý·½CRMƽ̨´æ´¢µÄóÒ×ÁªÏµÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢¡¢µç×ÓÓʼþµØÖ·¼°µç»°ºÅÂë¡£¡£Ö»¹ÜWorkdayÇ¿µ÷¿Í»§Ö÷ÌâÊý¾ÝδÊÜÓ°Ï죬µ«Ð¹Â¶µÄÁªÏµ·½Ê½ÈÔ¿ÉÄܱ»ÓÃÓÚºóÐøÚ¿Æ¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Õâ´Î¹¥»÷ģʽÓë³ôÃûÔ¶ÑïµÄShinyHuntersÀÕË÷×éÖ¯ÊÖ·¨¸ß¶ÈÎǺϣ¬¸Ã×éÖ¯×ÔËêÊׯðͨ¹ýÀàËÆ¼¿Á©ÈëÇÖ¶à¼ÒÆóÒµSalesforceʵÀý£¬ÇÔÈ¡Êý¾Ý¿âºóÖ´ÐÐÀÕË÷£¬´ËǰÒѲ¨¼°°¢µÏ´ï˹¡¢¡¢°ÄÖÞº½¿Õ¡¢¡¢Â·Ò×ÍþµÇµÈÈ«Çò³ÛÃûÆóÒµ¡£¡£
https://www.bleepingcomputer.com/news/security/hr-giant-workday-discloses-data-breach-amid-salesforce-attacks/
2. ÍþвÕßÐû³ÆÏúÊÛ1580Íò·Ý´¿Îı¾PayPalƾ֤
8ÔÂ18ÈÕ£¬ÍøÂç·¸×ïÂÛ̳ÉϳöÏÖһ·´ó¹æÄ£PayPalÕË»§Êý¾Ýй¶ÊÂÎñ¡£¡£Ò»ÃûΪChucky_BFµÄÍþвÐÐΪÕß¹«¿ªÏúÊÛ±ê°ñΪ¡°È«ÇòPayPalƾ֤ת´¢2025¡±µÄÊý¾Ý¼¯£¬Ðû³ÆÔ̺¬1580Íò±Ê¼Í¼£¬Éæ¼°µç×ÓÓʼþµØÖ·¡¢¡¢Ã÷ÎÄÃÜÂë¼°Ö±½ÓÁ´½ÓÖÁPayPal·þÎñµÄURL£¬Êý¾Ý×ÜÁ¿´ï1.1GB¡£¡£Âô¼Ò½«Æä³ÆÎª¡°ÍøÂç·¸×ï·Ö×ӵĽð¿ó¡±£¬²¢ÖÒ¸æ¸ÃÊý¾Ý¿ÉÄܱ»ÓÃÓÚÆ¾Ö¤Ìî³ä¹¥»÷¡¢¡¢ÍøÂç´¹µö¼°Ú²ÆÐÐΪ¡£¡£¾Ý·ÖÎö£¬¸ÃÊý¾Ý¼¯µÄ½á¹¹ÇкÏÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÌØµã¡£¡£´ËÀàÈí¼þͨ³£Í¨¹ýϰȾÓû§É豸£¬ÇÔÈ¡±£ÁôµÄµÇ¼ƾ֤¡¢¡¢ä¯ÀÀÆ÷Êý¾Ý¼°ÍøÕ¾»î¶¯£¬×îÖÕ½«ÍøÂçµÄÐÅÏ¢»ã×ÜÏúÊÛ¡£¡£Ñù±¾ÏÔʾ£¬²¿ÃżÍ¼Ô̺¬GmailµÈÓÊÏäÓëÃÜÂëµÄÅä¶Ô£¬ÇÒͳһÕË»§ÔÚÍøÂç°æºÍÒÆ¶¯°æPayPalÖеľßÌåÐÅÏ¢¾ù±»ÊÕ¼£¬°µÊ¾Êý¾ÝÀ´×ÔÈ«Çò¶àµØÊÜϰȾÉ豸¡£¡£Ö»¹ÜÂô¼ÒÐû³Æ¡°´óÎÞÊýÃÜÂëÇ¿¶È¸ßÇÒ¹ÖÒ족£¬µ«Ò²ÈϿɴæÔÚ·´¸´Ê¹ÓÃÇé¿ö£¬ÕâÒâζ×ÅÓû§ÔÚÆäËûƽ̨ʹÓÃÒ»ÑùÃÜÂëʱ¿ÉÄÜÃæ¶Ô¿çÕ¾·çÏÕ¡£¡£Ä¿Ç°£¬PayPalÉÐδ֤ʵ¸ÃÊý¾Ý¼¯µÄÕæÊµÐÔ£¬ÎÞ·¨È·¶¨ÆäÊÇÆëÈ«ÕæÊµµÄ¼Í¼¡¢¡¢Ô̺¬ÐéαÐÅÏ¢£¬»¹ÊǶԺ¹Çàй¶Êý¾ÝµÄÖØÐ°ü×°¡£¡£
https://hackread.com/threat-actor-selling-plain-text-paypal-credentials/
3. Î÷½Ýº½¿ÕÈ·ÈÏÍøÂç¹¥»÷¶³öÁ˿ͻ§µÄÃô¸ÐÐÅÏ¢
8ÔÂ15ÈÕ£¬¼ÓÄôóµÚ¶þ´óº½¿Õ¹«Ë¾Î÷½Ýº½¿Õ½üÈÕ֤ʵ£¬Æä³Ë¿Í²¿ÃÅСÎÒÐÅÏ¢ÔÚ6Ô·ݵÄÍøÂç¹¥»÷Öб»ÇÔÈ¡£¡£¬³ÉΪÓÖһ·Õë¶Ôº½¿ÕÒµµÄ´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£¡£¾ÝÅû¶£¬6ÔÂ13ÈÕ£¬Î÷½Ýº½¿Õϵͳ¼ì²âµ½¿ÉÒɻ£¬·¸×ï·Ö×Óͨ¹ýһʱ½Ó¼ûȨÏÞÇÔÈ¡Á˳˿ÍÊý¾Ý¡£¡£Ö»¹Ü¹«Ë¾Î´¹«¿ª¾ßÌåÊÜÓ°ÏìÈËÊý£¬µ«Ã÷È·°µÊ¾Ð¹Â¶ÐÅÏ¢¿ÉÄÜÒò³Ë¿Í¶øÒ죬º¸ÇÐÕÃû¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢ÁªÏµÐÅÏ¢¡¢¡¢ÐԱ𡢡¢¹Û¹âÖ¤¼þÐÅÏ¢¼°½üÆÚÔ¤Ô¼¼Í¼¡£¡£ÓÈΪֵÍ×ÌùÐĵÄÊÇ£¬»¤ÕÕµÈСÎÒÎļþ¿ÉÄܱ»ÓÃÓÚαÔìÉí·Ý»òÖ´ÐÐÆäËû·¸×ï»î¶¯£¬Òý·¢¶ÔÉí·Ý͵ÇÔ·çÏÕµÄÓÇÓô¡£¡£Õâ´ÎÊÂÎñÖУ¬Î÷½Ýº½¿ÕÇ¿µ÷ÐÅÓþ¿¨ºÅ¡¢¡¢½è¼Ç¿¨¾ßÌåÐÅÏ¢¼°Óû§ÃÜÂëδ±»Ð¹Â¶£¬¿Ï¶¨Ë®Æ½ÉÏ»º½âÁËÓû§¶Ô²ÆÕþËðʧµÄÖ±½ÓÓÇÓô¡£¡£¹«Ë¾»ØÓ¦³Æ£¬ÒÑÒÔ¡°×ΣºÍ×îÆ÷ÖØµÄ̬¶È¡±´¦ÖøÃÊÂÎñ£¬²¢²ÉÈ¡¶îÍⰲȫ´ëʩǿ»¯ÏµÍ³·À»¤£¬Ô¤·ÀÀàËÆÊÂÎñÖØÑÝ¡£¡£ÎªÌí²¹Ç±ÔÚËðʧ£¬Î÷½Ýº½¿ÕÓëÐÅÓþ¼à²â»ú¹¹TransUnion CanadaºÏ×÷£¬ÎªÊÜÓ°Ïì³Ë¿ÍÌṩΪÆÚ24¸öÔµÄÃâ·ÑÉí·Ý͵ÇÔºÍÐÅÓþ¼à¿Ø·þÎñ¡£¡£³Ë¿Í»¹¿Éͨ¹ý¡°Éí·Ý¸´Ô´úÀí¡±»ñȡרҵ֧³Ö£¬½â¾öÉí·Ý͵ÇÔÓйØÎÊÌ⣬²¢ÏíÓÐ×î¸ß100ÍòÃÀÔªµÄÓöȱ¨Ïú±£ÏÕÒÔÓ¦¶ÔÚ²ÆÊÂÎñ¡£¡£
https://cybernews.com/news/westjet-confirms-cyber-breach-exposed-sensitive-details-of-customers/
4. ºÚ¿ÍÔÚNetflixÍøÂç´¹µöÖÐÇÔÈ¡FacebookµÇ¼ÐÅÏ¢
8ÔÂ15ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾Malwarebytes×îÐÂ×êÑнÒʾ£¬Ú¿ÆÕßÕýͨ¹ýαÔìNetflixÕÐÆ¸ÓʼþÖ´Ðо«×¼ÍøÂç´¹µö¹¥»÷£¬Ö¸±êÖ±Ö¸¿ÉÄܽӼûÆóÒµFacebookóÒ×ÕË»§µÄÓªÏúÈËÔ±¡£¡£Õâ´Î¹¥»÷ÒÔ¡°¸ßнְλ¡±Îªµö¶ü£¬ÓÕµ¼Êܺ¦Õßй¶É罻ýÌ対֤£¬×îÖÕ¿ÉÄܱ»ÓÃÓÚ¶ñÒâ¸æ°×Ͷ·Å¡¢¡¢ÕË»§ÀÕË÷»ò´«²¼ÐéαÐÅÏ¢¡£¡£¹¥»÷Á÷³ÌÏÔʾ£¬Ú¿ÆÕßÊ×ÏÈ·¢ËÍ¿´ËÆ×¨ÒµµÄÕÐÆ¸Óʼþ£¬±êÌâΪ¡°Netflix¸ß¹Üְλ»úÓö¡±£¬ÄÚÈݸ߶ȸöÐÔ»¯£¬ÔÞÑïÊܺ¦Õߵġ°ÓªÏú¸¨µ¼Á¦¡±²¢Ô¼ÇëÉêÇë¡°ÓªÏú¸±×ܲᱡ°É罻ýÌå×ܼࡱµÈְλ¡£¡£ÓʼþÖи½ÓÐÐéαNetflixÖ°ÒµÍøÕ¾Á´½Ó£¬ÒªÇóÊܺ¦Õß´´½¨Ð¡ÎÒµµ°¸²¢¹ØÁªFacebookÕË»§¡£¡£µ±Óû§µã»÷¡°³ÖÐøÊ¹ÓÃFacebook¡±»òÓÊÏäµÇ¼ʱ£¬Ò³Ãæ»áÌø×ªÖÁαÔìµÄFacebookµÇ¼½çÃæ£¬ÓÕµ¼ÊäÈëÆ¾Ö¤¡£¡£Malwarebytes×êÑÐÔ±Pieter ArntzÖ¸³ö£¬Õâ´Î¹¥»÷µÄ¼¼Êõ¸´ÔӶȽϸߣº£ºÚ¿ÆÕßͨ¹ýwebsocket²½ÖèʵʱÀ¹½ØÓû§ÊäÈ룬ÔÚÊܺ¦ÕߺÁÎÞ¾õ²ìµÄÇé¿öϵǼÆäÕæÊµFacebookÕË»§£¬ÉõÖÁ¿ÉÄÜÈÆ¹ý¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©¡£¡£Ò»µ©½ÚÖÆÕË»§£¬¹¥»÷Õß¿ÉÁ¢¼´×¢ÏúÊܺ¦ÕßÉ豸¡¢¡¢ÏòÆäÀÏÓÑ·¢ËÍÀ¬»øÓʼþ£¬»òÀûÓÃÆóÒµÖ§¸¶È¨ÏÞͶ·Å¶ñÒâ¸æ°×¡£¡£
https://cybernews.com/security/netflix-phishing-campaign-facebook-login-targets-marketing-social-media-job-seekers/
5. ERMAC V3.0ÒøÐÐľÂíÔ´´úÂëй¶£¬Â¶³öÆëÈ«¶ñÒâÈí¼þ»ù´¡ÉèÊ©
8ÔÂ16ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕÅû¶ÁËÐÂÐÍAndroidÒøÐÐľÂíERMAC 3.0µÄ¾ßÌåÔË×÷»úÖÆ£¬½ÒʾÆä×÷Ϊ¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©²úÆ·µÄÆëÈ«¼¼Êõ¼Ü¹¹¼°ÔËÓª·ì϶¡£¡£¸Ã±äÖÖÓÉDukeEugeneÍþв×éÖ¯ÔËÓª£¬±»ÆÀ¹ÀΪCerberusºÍBlackRockµÄ½ø»¯°æ±¾£¬Æä¼¼ÊõѪͳ¿É×·ÒäÖÁHook£¨ERMAC 2.0£©¡¢¡¢PegasusµÈ³ÛÃû¶ñÒâÈí¼þ¼Ò×å¡£¡£¾ÝHunt.io°ä²¼µÄ»ã±¨£¬ERMAC 3.0ʵÏÖÈý´ó¼¼ÊõÍ»ÆÆ£º£ºÊ×ÏÈ£¬Ö¸±êÀûÓÃÁìÓò´ó·ùÀ©´óÖÁ700Óà¸öÒøÐС¢¡¢µçÉ̼°¼ÓÃÜÇ®±Òƽ̨£¬Í¨¹ý¼ÓÇ¿µÄ±íµ¥×¢ÈëÖ°ÄÜʵÏÖ¾«×¼Êý¾ÝÇÔÈ¡£¡£»£»Æä´Î£¬Ñ¡È¡AES-CBC¼ÓÃÜͨѶºÍ̸£¬²¢Öع¹ÁË»ùÓÚPHP/LaravelµÄC2·þÎñÆ÷¡¢¡¢Reactǰ¶ËÃæ°å¡¢¡¢GolangÉøÈë·þÎñÆ÷¼°Kotlin±àдµÄAndroidºóÃŵÈȫջ×é¼þ£»£»×îºó£¬ÆäÄ£¿é»¯¹¹½¨Æ÷ÔÊÐí¿Í»§¶¨ÖƶñÒâÈí¼þ²ÎÊý£¬Ðγɰ´Ðè¶¨ÖÆµÄ¹¥»÷Á´¡£¡£×êÑÐÍŶÓͨ¹ýÉøÈë·ÖÎö·¢ÏÖ£¬¸Ã×éÖ¯ÔËÓªµÄ·þÎñÆ÷´æÔÚÑÏÖØ°²È«È±µã£º£ºÖÎÀíÃæ°åÊ¢¿ªÄäÃû×¢²á£¬Ä¬ÈÏʹÓþ²Ì¬ÖÎÀíÔ±ÁîÅÆºÍÓ²±àÂëJWTÃÜÔ¿£¬ºó¶ËÊý¾Ý¿âδ×öȨÏÞ¸ôÀë¡£¡£ÕâЩ·ì϶µ¼Ö¹¥»÷ÕߵįëÈ«¼¼Êõ×ʲúÍâй£¬Ô̺¬Ô´´úÂë¡¢¡¢É豸°ó¶¨»úÖÆ¡¢¡¢¸²¸Ç¹¥»÷Ä£°å¼°C2ͨѶºÍ̸¡£¡£
https://thehackernews.com/2025/08/ermac-v30-banking-trojan-source-code.html
6. ΢ÈíÐéα̸ÌìGPT×ÀÃæÀûÓ÷¨Ê½ÌṩPipeMagicºóÃÅ
8ÔÂ18ÈÕ£¬Î¢Èí°²È«ÍŶӽüÈÕÅû¶һ·ÀûÓÃαÔìChatGPT×ÀÃæÀûÓô«²¼ÐÂÐͺóÃÅPipeMagicµÄ¹¥»÷ÊÂÎñ£¬¸ÃÊÂÎñÓëÕë¶ÔÈ«Çò½ðÈÚ¡¢¡¢·¿µØ²úµÈÐÐÒµµÄÀÕË÷Èí¼þ¹¥»÷ÓйØÁª£¬Æä¼¼Êõ¸´ÔÓÐÔ¼°Òñ±ÎÐÔÒý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¡£¹¥»÷Õßͨ¹ý´Û¸ÄGitHubÉϵĿªÔ´ChatGPT×ÀÃæÏîÄ¿£¬ÔÚÆäÖÐÖ²Èë¶ñÒâ´úÂ룬ÓÕµ¼Óû§´Ó·Ç¹Ù·½ÇþµÀÏÂÔØÄ¾Âí»¯¸±±¾¡£¡£PipeMagicºóÃÅѡȡ¸ß¶ÈÄ£¿é»¯¼Ü¹¹£¬½«ºÅÁî½ÚÖÆÍ¨Ñ¶¡¢¡¢ÓÐÐ§ÔØºÉÖ´ÐеÈÖ°Äܲð·ÖΪ¶ÀÁ¢×é¼þ£¬Í¨¹ý¼ÓÃܶ¨Ãû¹ÜµÀºÍÄÚ´æ²Ù×÷ʵÏÖÒñ±ÎÔËÐС£¡£ÆäÖ÷ÌâÉè¼ÆÔ̺¬Èý×éÁ´±í½á¹¹£º£ºÒ»×éÖÎÀí´ýÖ´ÐÐÄ£¿é£¬Ò»×é´¦ÖÃÍøÂçͨѶ£¬ÁíÒ»×鶯̬¼ÓÔØÖ°ÄÜ×é¼þ¡£¡£ÕâÖÖ·ÖÀëʽ¼Ü¹¹²»½ö½µµÍÁ˼ì²âÄѶȣ¬»¹ÔÊÐí¹¥»÷Õßͨ¹ýרÓÃÍøÂçÄ£¿é³ÉÁ¢WebSocket·ç¸ñµÄ°²È«Í¨µÀ£¬ÓëC2·þÎñÆ÷½»»¥ÏµÍ³ÐÅÏ¢²¢½Ó¹ÜÖ¸ÁʵÏÖÄ£¿é¶¯Ì¬¸üлò´úÌæ£¬ÎÞÐèÖØÐ²¿ÊðÕû¸öºóÃÅ¡£¡£Î¢Èí½«Õâ´Î¹¥»÷¹éÒòÓÚÒÔ¾¼ÃÀûÒæÎªµ¼ÏòµÄStorm-2460×éÖ¯¡£¡£¸Ã×éÖ¯ÔڻÖÐÀûÓÃWindows CLFSÁãÈÕ·ì϶CVE-2025-29824£¬´Ó³õʼ½Ó¼û¼±¾çתÏòÀÕË÷Èí¼þ²¿Ê𡣡£Æä¹¥»÷ÁìÓò¸²¸ÇÃÀ¹ú¡¢¡¢Å·ÖÞ¡¢¡¢ÄÏÃÀ¼°Öж«µØÓò£¬Ö¸±êÔ̺¬½ðÈÚ¡¢¡¢·¿µØ²úµÈ¶àÐÐÒµ»ú¹¹¡£¡£
https://hackread.com/fake-chatgpt-desktop-app-pipemagic-backdoor-microsoft/


¾©¹«Íø°²±¸11010802024551ºÅ