ºÚ¿Í×éÖ¯ÈëÇÖÒÁÀʺ½ÔËϵͳÖÂ60ÓàËÒ´¬Ö»Í¨Ñ¶Ì±»¾

°ä²¼¹¦·ò 2025-08-26

1. ºÚ¿Í×éÖ¯ÈëÇÖÒÁÀʺ½ÔËϵͳÖÂ60ÓàËÒ´¬Ö»Í¨Ñ¶Ì±»¾


8ÔÂ23ÈÕ£¬£¬Ò»¸ö×Ô³Æ"Lip-Dochtjan"£¨ÓÖ³Æ"The Sewn Lips"£©µÄºÚ¿Í×éÖ¯ÏòÒÁÀʹú¼ÊýÌåÐû³Æ£¬£¬Òѳɹ¦ÈëÇÖÒÁÀʹú¶ÈÓÍÂÖ¹«Ë¾£¨NITC£©ÓëÒÁÀʺ½Ô˹«Ë¾£¨IRISL£©µÄÖ÷Ìâϵͳ£¬£¬µ¼ÖÂ60ÓàËÒ´¬Ö»Í¨Ñ¶ÖжÏ¡£Õâ´Î¹¥»÷ͨ¹ýÒÁÀʿعɹ«Ë¾FannavaµÄÎÀÐÇÍ¨Ñ¶ÍøÂçÖ´ÐУ¬£¬¸Ã¹«Ë¾ÕƹÜΪÒÁÀʺ£ÉÏÔËÊäÌṩÎÀÐÇÊý¾Ý´«Êä¡¢¡¢´æ´¢¼°Ö§¸¶·þÎñ¡£¾ÝºÚ¿Í×éÖ¯Åû¶£¬£¬Æäͨ¹ýÉøÈëFannavaϵͳ£¬£¬Ö±½ÓÇÖÈë´¬Ö»ÎÀÐÇÖն˵ÄÖ÷ÌâLinux²Ù×÷ϵͳ£¬£¬³É¹¦½ûÓÃÕÆ¹ÜÒÁÀʺ£ÉÏͨѶµÄרÓ÷¨Ê½Falcon£¬£¬Ôì³É39ËÒÓÍÂÖÓë25ËÒ»õ´¬ÎÞ·¨Óë¸Û¿Ú½øÐÐÐÅÏ¢½»»¥¡£Õâ´Î¹¥»÷¶ÔÒÁÀʺ½ÔËϵͳÔì³ÉË«ÖØ³å»÷ £º£º£ºÊ×ÏÈ£¬£¬´¬Ö»Óë½µØÖ¸»ÓÖÐÐĵÄʵʱͨѶÖжÏ£¬£¬µ¼Öº½Ðе÷¶È¡¢¡¢»õÎïÇ幨µÈ¹Ø¼ü»·½ÚÏÝÈëÖͰ­£»Æä´Î£¬£¬ÎÀÐÇϵͳ±»¿ØÊ¹µÃ´¬Ö»¶¨Î»Êý¾Ý¡¢¡¢»õÎïÇåµ¥µÈÃô¸ÐÐÅÏ¢Ãæ¶Ôй¶·çÏÕ¡£Ö»¹ÜÒÁÀʹٷ½ÉÐδ¶ÔÊÂÎñϸ½Ú×÷³ö»ØÓ¦£¬£¬µ«ºÚ¿Í×é֯ѡÔñͨ¹ýýÌ幫¿ª¹¥»÷ÊÂʵ£¬£¬°µÊ¾Æä¾ß±¸³ÖÐøÍþвÄÜÁ¦¡£


https://www.marineinsight.com/shipping-news/major-cyberattack-disrupts-communication-on-dozens-of-iranian-ships/


2. AspireÎÀÉúϵͳÔâÍøÂç¹¥»÷£¬£¬14Íò»¼ÕßÃô¸ÐÊý¾Ýй¶


8ÔÂ24ÈÕ£¬£¬ÃÀ¹úÃÜЪ¸ùÖÝ´åÂäÎÀÉúϵͳAspireÔâ·êÍøÂç·¸×ï·Ö×Ó³Ö¾ÃÉøÈ룬£¬µ¼Ö³¬¹ý13.8ÍòÃû»¼ÕßµÄÃô¸ÐÊý¾Ý±»ÇÔÈ¡¡£Õâ´Î¹¥»÷³ÖÐøÊýÔÂδ±»·¢ÏÖ£¬£¬³ÉΪ½üÄêÀ´Ó°ÏìÁìÓò½Ï¹ãµÄÒ½ÁÆÁìÓòÊý¾Ýй¶ÊÂÎñÖ®Ò»¡£Æ¾¾ÝAspireÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»µÄ»ã±¨£¬£¬¹¥»÷Õß»ñÈ¡µÄÐÅÏ¢º­¸ÇСÎÒÉí·Ý¡¢¡¢²ÆÕþÐÅÏ¢¼°Ò½Áƽ¡¿µÊý¾ÝÈý´óÀ࣬£¬¾ßÌåÔ̺¬ÐÕÃû¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢Éç»á°²È«ºÅÂë¡¢¡¢½ðÈÚÕË»§ÏêÇé¡¢¡¢Ö§¸¶¿¨ºÅ¼°PINÂë¡¢¡¢Ò½ÁÆÕï¶Ï¼Í¼¡¢¡¢´¦·½ÐÅÏ¢¡¢¡¢±£ÏÕÊý¾Ý¡¢¡¢ÉúÎï¼ø±ð±êʶ·û¡¢¡¢¼ÝÕÕ¼°»¤ÕÕºÅÂëµÈ16Ïî¸ßÃô¸ÐÄÚÈÝ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬²¿ÃÅ»¼ÕßÊý¾Ý×éºÏÆëÈ«¶È¼«¸ß£¬£¬ÀíÂÛÉϿɹ¹½¨³öÔ̺¬Éí·Ý¡¢¡¢²ÆÕþÓëÒ½ÁÆÐÅÏ¢µÄ"ȫά¶ÈÊý×Ö»­Ïñ"¡£AspireÔÚÊÂÎñ´«µÝÖÐÇ¿µ÷£¬£¬Ä¿Ç°ÉÐÎÞÃ÷È·Ö¤¾ÝÏÔʾÊý¾ÝÒѱ»ÏÖʵÀÄÓ㬣¬µ«Îª½µµÍDZÔÚÓ°Ï죬£¬ÒÑÆô¶¯²¹¾È´ëÊ© £º£º£ºÎªËùÓÐÊÜÓ°Ï컼ÕßÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÉí·Ý±£»¤¼°ÐÅÓþ¼à¿Ø·þÎñ£¬£¬Ô̺¬ÊµÊ±ÐÅÓþ»ã±¨¼à²â¡¢¡¢Éí·Ý͵ÇÔ¸´Ô­Ö§³Ö¼°100ÍòÃÀÔª±£ÏÕÅ⸶±£ÏÕ¡£


https://cybernews.com/security/michigan-aspire-health-system-data-breach/


3. »ùÓÚMiraiµÄGayfemboy½©Ê¬ÍøÂ綫ɽÔÙÆð


8ÔÂ24ÈÕ£¬£¬Gayfemboy½©Ê¬ÍøÂç×Ô2024Äê2Ô³õ´ÎÏÖÉíÒÔÀ´£¬£¬ÒÑÑݱäΪ¸ß¶È¸´ÔÓ»¯µÄÎïÁªÍøÍþв£¬£¬Æä¹¥»÷ÁìÓò¸²¸Ç°ÍÎ÷¡¢¡¢Ä«Î÷¸ç¡¢¡¢ÃÀ¹ú¡¢¡¢µÂ¹úµÈ8¸ö¹ú¶È£¬£¬Ö¸±êÉæ¼°ÖÆ×÷Òµ¡¢¡¢¿Æ¼¼Òµ¡¢¡¢¹¹ÖþÒµµÈ¹Ø¼üÐÐÒµ¡£¸Ã¶ñÒâÈí¼þÒÔMirai±äÖÖΪ»ù´¡£¬£¬Í¨¹ý¼¯³ÉN-dayÓë0-day·ì϶¡¢¡¢TelnetÈõÍ´´¦±¬ÆÆ¼°¶à½×¶Î»ìºÏ¼¼Êõ£¬£¬¹¹½¨Æð¾ß±¸×ÔÎÒÓÆ¾Ã»¯¡¢¡¢É³ºÐ¶ã±ÜºÍ¾ºÕùÐԶϸùÄÜÁ¦µÄ¹¥»÷ϵͳ¡£×êÑÐÏÔʾ£¬£¬GayfemboyµÄ·ì϶ÀûÓÃÕ½Êõ³öÏÖÏÔÖø½ø»¯¡£2024Äê11Ô£¬£¬Æäͨ¹ýFour-Faith¹¤ÒµÂ·ÓÉÆ÷£¨CVE-2024-12856£©¡¢¡¢Neterbit·ÓÉÆ÷¼°VimarÖÇÄܼҾÓÉ豸µÄÁãÈÕ·ì϶£¬£¬ÖðÈÕ»îÔ¾½ÚµãÍ»ÆÆ1.5Íò¸ö£»ÖÁ2025Äê7Ô£¬£¬¹¥»÷ÔØºÉÒÑÀ©´óÖÁ»ªË¶¡¢¡¢Vivo¡¢¡¢ZyxelºÍRealtekµÈÉ豸£¬£¬²¢¼¯³ÉXMRigÍÚ¿óÄ£¿£¿é¡£Gayfemboyչʾ¶à²ã·ÀÓù»úÖÆ £º£º£ºÍ¨¹ýÅú¸ÄUPX±êͷѹËõ¶þ½øÖÆÎļþ¡¢¡¢ÒýÈë50ÄÉÃë¼¶ÑÓ³¤É³ºÐ¼ì²â¼¼Êõ£¬£¬ÒÔ¼°»ùÓÚ¹«¹²DNSµÄËæ»úÓòÃûC2ͨѶ£¬£¬ÓÐЧ¶ã±Ü°²È«¼ì²â¡£¸Ã½©Ê¬ÍøÂçµÄ¹¥»÷ÐÐΪÒÑÔì³É¶àÖØÍþв £º£º£º³ý²¿ÊðÍÚ¿óÄ£¿£¿éÍ⣬£¬»¹Õë¶Ô×êÑÐÈËÔ±ÌáÒéDDoS·´ÖÆ£¬£¬²¢³¢ÊÔͨ¹ý¶Ë¿ÚɨÃèºáÏòÀ©É¢¡£


https://securityaffairs.com/181480/cyber-crime/iot-under-siege-the-return-of-the-mirai-based-gayfemboy-botnet.html


4. ÃÀ¹úFarmers InsuranceÒòSalesforce¹¥»÷Ö°ÙÍò¿Í»§Êý¾Ýй¶


8ÔÂ25ÈÕ£¬£¬ÃÀ¹ú±£ÏÕ¾ÞÍ·Farmers InsuranceÅû¶һ·ӰÏì110Íò¿Í»§µÄ´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬Æä±¾Ô­Ö¸Ïò½ñÄêÒÔÀ´Õë¶ÔSalesforceƽ̨µÄ¶àÆðÍøÂç¹¥»÷¡£¸Ã¹«Ë¾Í¨¹ý¹ÙÍø²¼¸æÖ¤Êµ£¬£¬2025Äê5ÔÂ29ÈÕ£¬£¬ÆäµÚÈý·½¹©¸øÉÌÊý¾Ý¿âÔâδ¾­ÊÚȨ½Ó¼û£¬£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¼¿Á©ÇÖÈëSalesforceϵͳ£¬£¬µ¼Ö¿ͻ§ÐÕÃû¡¢¡¢µØÖ·¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢¼ÝÕÕºÅÂë¼°Éç»á°²È«ºÅÂëºóËÄλµÈÃô¸ÐÐÅÏ¢±»µÁ¡£FarmersÓÚ8ÔÂ22ÈÕÆô¶¯Êܺ¦Õß֪ͨ·¨Ê½£¬£¬²¢ÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»»ã±¨£¬£¬µ«Î´¹«¿ªµÚÈý·½¹©¸øÉ̾ßÌåÃû³Æ¡£FarmersÔÚÊÂÎñÏìÓ¦ÖÐÇ¿µ÷£¬£¬µÚÈý·½¹©¸øÉÌͨ¹ý²¿Êð¼à¿Ø¹¤¾ßѸËÙ¼ì²âµ½Òì³£»î¶¯²¢×è¶Ï¹¥»÷õè¾¶£¬£¬¹«Ë¾Í¬²½Æô¶¯È«Ãæµ÷²é²¢´«µÝ·¨Âɲ¿ÃÅ¡£Ö»¹Ü²ÉÈ¡ÁËÓ¦¼±´ëÊ©£¬£¬µ«¹¥»÷ÕßÀûÓÃSalesforceƽ̨¼¯Öд洢ÆóÒµ¿Í»§Êý¾ÝµÄ¸öÐÔ£¬£¬ÈÔÔì³É°ÙÍò¼¶Óû§ÐÅϢй¶¡£Õâ´ÎÊÂÎñÓë½ñÄêÈ«Çò¶àÆðSalesforceÊý¾Ý͵ÇÔ°¸´æÔÚ¹ØÁª¡£Íþв×éÖ¯UNC6040/UNC6240ͨ¹ý"ÓïÒô´¹µö"£¨Vishing£©Ö´ÐÐÉç»á¹¤³Ì¹¥»÷£¬£¬ÓÕÆ­ÆóÒµÔ±¹¤½«¶ñÒâOAuthÀûÓÃÓëSalesforceʵÀý¹ØÁª£¬£¬´Ó¶ø³ÉÁ¢ÓƾýӼûȨÏÞ¡£


https://www.bleepingcomputer.com/news/security/farmers-insurance-data-breach-impacts-11m-people-after-salesforce-attack/


5. ·¨¹úÅ·ÉÐÁãÊÛ¼¯ÍÅÔâ·ê´ó¹æÄ£Êý¾Ýй¶£¬£¬Ó°ÏìÊýÊ®Íò¿Í»§


8ÔÂ25ÈÕ£¬£¬·¨¹ú¿ç¹úÁãÊÛ¾ÞÍ·Å·ÉУ¨Auchan£©½üÈÕÅû¶һ·ӰÏìÊýÊ®Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ£¬£¬Æä»áÔ±Öҳ϶ȴòËãÓйصÄÃô¸ÐÐÅÏ¢Ôâδ¾­ÊÚȨ½Ó¼û¡£¸Ã¹«Ë¾ÔÚÏòÊÜÓ°ÏìÓû§·¢Ë͵Ä֪ͨÖÐ֤ʵ£¬£¬¹¥»÷Õßͨ¹ýÍøÂç¹¥»÷»ñÈ¡Á˿ͻ§È«Ãû¡¢¡¢Ö°³Æ¡¢¡¢¿Í»§×´Ì¬¡¢¡¢ÓÊÕþµØÖ·¡¢¡¢µç×ÓÓʼþµØÖ·¡¢¡¢µç»°ºÅÂë¼°»áÔ±¿¨ºÅµÈСÎÒÐÅÏ¢£¬£¬µ«Ç¿µ÷ÒøÐÐÕË»§Êý¾Ý¡¢¡¢ÕË»§ÃÜÂë¼°PINÂëδÊܲ¨¼°¡£×÷ΪŷÖÞ¼°·ÇÖÞ13¸ö¹ú¶ÈÕ¼Óг¬2100¼Ò·Öµê¡¢¡¢ÄêÊÕÈëÓâ350ÒÚÃÀÔªµÄÁãÊÛ¼¯ÍÅ£¬£¬Å·ÉÐÔÚÊÂÎñÏìÓ¦ÖÐÒÑÏò·¨¹úÊý¾Ý±£»¤¾Ö£¨CNIL£©Õýʽ´«µÝ£¬£¬²¢ÌáÐÑÓû§¾¯ÌèDZÔÚµÄÍøÂç´¹µö¹¥»÷¡£Í¨ÖªÃ÷È·Ö¸³ö£¬£¬Å·Éоø²»»áͨ¹ýÈκÎÇþµÀË÷È¡Óû§µÇ¼ƾ֤¡¢¡¢ÃÜÂë»ò»áÔ±¿¨PINÂ룬£¬½¨ÒéÊÕµ½¿ÉÒÉÐÂÎŵÄÓû§Á¢¼´ºöÂÔ²¢Ô¤·Àµã»÷Á´½Ó»ò»Ø²¦µç»°¡£


https://www.bleepingcomputer.com/news/security/auchan-retailer-data-breach-impacts-hundreds-of-thousands-of-customers/


6. Google PlayÒÑÒÆ³ý×°ÖÃÁ¿´ï1900ÍòµÄ¶ñÒâAndroidÀûÓÃ


8ÔÂ25ÈÕ£¬£¬ZscalerµÄThreatLabsÍŶӽüÈÕÅû¶£¬£¬Google PlayÉÌµê´æÔÚ77¸ö¶ñÒâAndroidÀûÓ㬣¬×Ü×°ÖÃÁ¿Í»ÆÆ1900Íò´Î£¬£¬Éæ¼°Joker¡¢¡¢Harly¡¢¡¢Anatsa£¨Tea Bot£©µÈ¶à¸ö¶ñÒâÈí¼þ¼Ò×å¡£ÆäÖУ¬£¬¸æ°×Èí¼þ×é¼þÕ¼±È³¬66%£¬£¬¶øJoker×÷Ϊ×î»îÔ¾µÄÒøÐÐľÂí£¬£¬³Ê´Ë¿Ì½ü25%µÄ·ÖÎöÑù±¾ÖС£´ËÀà¶ñÒâÈí¼þͨ¹ý¼Ù×°³ÉºÏ·¨ÀûÓã¨ÈçÓÎÏ·¡¢¡¢±ÚÖ½¡¢¡¢¹¤¾ßÀàÈí¼þ£©´«²¼£¬£¬²¿ÃÅÀûÓÃÉõÖÁѡȡ"ÑÚÂëÈí¼þ"¼¼Êõ£¬£¬ÔÚÌṩÕý³£Ö°ÄܵÄͬʱ£¬£¬ºó¶ÜÖ´ÐÐÇÔÈ¡¶ÌÐÅ¡¢¡¢ÁªÏµÈË¡¢¡¢ÒøÐÐÆ¾Ö¤¼°¶©Ôĸ߼¶·þÎñµÈ¶ñÒâ²Ù×÷¡£×êÑÐÖØµã½ÒʾÁËAnatsaÒøÐÐľÂíµÄ³ÖÐø½ø»¯¡£¸ÃľÂí×îа汾½«Ö¸±êÒøÐм°¼ÓÃÜÇ®±ÒÀûÓÃÊýÁ¿´Ó650¸öÀ©´óÖÁ831¸ö£¬£¬¸²¸ÇµÂ¹ú¡¢¡¢º«¹úµÈÐÂÇøÓò£¬£¬²¢ÐÂÔö¼üÅ̼ͼÄ£¿£¿é¡£Æä´«²¼Õ½ÊõÒ²Éý¼¶ÎªÖ±½Ó×°ÖÃÓÐÐ§ÔØºÉ£¬£¬´úÌæ´ËǰµÄÔ¶³ÌDEX¶¯Ì¬¼ÓÔØ¡£Îª¶ã±ÜÉó²é£¬£¬¹¥»÷ÕßʹÓÃÌåʽÃýÎóµÄAPKµµ°¸Í»ÆÆ¾²Ì¬·ÖÎö£¬£¬½áºÏDES¼ÓÃÜ×Ö·û´®½âÃܼ°·ÂÕÕ¼ì²â¼¼Êõ£¬£¬²¢¶¨ÆÚ¸ü»»Èí¼þ°üÃû³ÆºÍ¹þÏ£Öµ¡£Anatsa»¹ÀÄÓÃAndroid¸¨ÖúÖ°ÄÜȨÏÞ×Ô¶¯»ñÈ¡ÌØÈ¨£¬£¬Í¨¹ý´¹µöÒ³ÃæÇÔÈ¡Êý¾Ý¡£¹È¸èÒÑɾ³ýËùÓÐÉæÊÂÀûÓ㬣¬²¢½¨ÒéÓû§ÆôÓÃPlay Protect·þÎñ¡¢¡¢½öÊÚȨ±ØÒªÈ¨ÏÞ¡¢¡¢Ñ¡Ôñ¿ÉÐÅ¿ª·¢Õß¡£


https://www.bleepingcomputer.com/news/security/malicious-android-apps-with-19m-installs-removed-from-google-play/