¶ñÒâÈí¼þHerodotusͨ¹ý¡°È˵À»¯¡°ÑÓ³¤ÊäÈëÌӱܼì²â

°ä²¼¹¦·ò 2025-10-30

1. ¶ñÒâÈí¼þHerodotusͨ¹ý"È˵À»¯"ÑÓ³¤ÊäÈëÌӱܼì²â


10ÔÂ28ÈÕ£¬£¬¾ÝThreat Fabric»ã±¨£¬£¬Ò»ÖÖÃûΪHerodotusµÄÐÂÐÍAndroid¶ñÒâÈí¼þ¼Ò×åÕýͨ¹ý¶ÌÐÅ´¹µö£¨smishing£©ÔÚÒâ´óÀû¡¢¡¢°ÍÎ÷µÈ¹ú´«²¼¡£¡£¡£¸Ã¶ñÒâÈí¼þÊôÓÚ¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Æ½Ì¨£¬£¬ÓÉÓëBrokewellÔËÓªÕß¹ØÁªµÄ·¸×ï·Ö×ÓÌṩ£¬£¬ÖØÒªÕë¶Ô¾­¼ÃÀûÒæÇý¶¯µÄÍøÂç·¸×ï»î¶¯¡£¡£¡£HerodotusµÄÖ÷Ìâ¼¼ÊõÌØµãÔÚÓÚÆäÊäÈëÀý³Ìµ±Ñ¡È¡µÄËæ»úÑÓ³¤×¢Èë»úÖÆ£¬£¬Í¨¹ý0.3ÖÁ3ÃëµÄËæ»ú¾àÀë·ÂÕÕÈËÀà´ò×Ö½ÚÅÄ£¬£¬ÓÐЧ¶ã±Ü°²È«Èí¼þ»ùÓÚ¹¦·òµÄÐÐΪ¼ì²â¡£¡£¡£ÕâÖÖ"È˵À»¯"Éè¼ÆÊ¹ÆäÄÜÈÆ¹ýAndroid 13¼°ÒÔÉϰ汾µÄ¸¨ÖúÖ°ÄÜȨÏÞÏÞ¶È£º £º¶ñÒâ¶ÌÐÅÔ̺¬µÄÁ´½Ó»áÊèµ¼Óû§ÏÂÔØ×Ô½ç˵ֲÈ뷨ʽ£¬£¬¸Ã·¨Ê½»áÏÈ´ò¿ª¸¨ÖúÖ°ÄÜÉèÖ㬣¬Í¨¹ýÐéα¼ÓÔØ´°¿Ú°µ²ØÈ¨ÏÞÊÚÓè²½Ö裬£¬×îÖÕ»ñµÃÓëÓû§½çÃæ½»»¥µÄÄÜÁ¦¡£¡£¡£³ý»ù´¡½»»¥Ö°ÄÜÍ⣬£¬Herodotus»¹¾ß±¸¶àÏî¸ß¼¶Ö°ÄÜ£º £º½ÚÖÆÃæ°åÖ§³Ö×Ô½ç˵¶ÌÐÅÎı¾£»·ÂÕÕÒøÐÐ/¼ÓÃÜÀûÓø²¸ÇÒ³ÃæÇÔÈ¡ÕË»§Æ¾Ö¤£»²»Í¨Ã÷¸²¸Ç²ã°µ²ØÚ²Æ­ÐÐΪ£»¶ÌÐÅÇÔÈ¡·¨Ê½À¹½ØË«³É·ÖÈÏÖ¤´úÂ룻ÆÁÄ»ÄÚÈݲ¶»ñµÈ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-herodotus-android-malware-fakes-human-typing-to-avoid-detection/


2. ÷è÷ëÍøÂç·¸×ïÍŻ﹥»÷ÃÀ¹úMedImpact¹«Ë¾


10ÔÂ28ÈÕ£¬£¬¶íÂÞË¹ÍøÂç·¸×ï×éÖ¯"÷è÷ë"Ðû³Æ¶Ô700ÓàÆðÀÕË÷Èí¼þ¹¥»÷ÕÆ¹Ü£¬£¬Æä×îÐÂÖ¸±êΪÃÀ¹ú´óÐÍÒ©Æ·¸£ÀûÖÎÀí¹«Ë¾MedImpact¡£¡£¡£¸Ã×éÖ¯ÔÚйÃÜÍøÕ¾Ðû³ÆÒѹ¥ÆÆÕâ¼Ò·þÎñ5000Íò»áÔ±¡¢¡¢ºÏ×÷½¡¿µ´òËã¼°µ±¾ÖÏîÖ÷ÕÅÒ½ÁÆÆóÒµ¡£¡£¡£MedImpactѸËÙÈ·Èϲ¿ÃÅϵͳÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬£¬²¢Æô¶¯"¶ôÖÆÓ뻺½â´ëÊ©"£¬£¬Í¬Ê±½áºÏ¹úÄÚ¶¥¼âÍøÂ簲ȫ¹«Ë¾·¢Õ¹µ÷²é£¬£¬½«ÊÜÓ°ÏìϵͳǨáãÖÁ¶à²ã·ÀÓùµÄл·¾³¸´Ô­ÔËÐС£¡£¡£¾Ý·ÖÎö£¬£¬÷è÷ëй¶µÄÊý¾ÝÑù±¾ÏÔʾÆä»ñÈ¡ÁËMedImpactµÄ²ÆÕþÔËӪϸ½Ú£¬£¬Ô̺¬ºÏ×÷ͬ°éÓ¶½ð¡¢¡¢ÀíÅâ»ã¿î»ã±¨¼°Ô¶ÈÒøÐÐÕË»§ÌáÒª£¨º¬Õ˺𢡢ÂòÂôÈÕÖ¾£©£¬£¬µ«Î´·¢ÏÖÖ±½ÓÉæ¼°»¼ÕßµÄÃô¸ÐСÎÒÐÅÏ¢¡£¡£¡£×êÑÐÈËÔ±Ö¸³ö£¬£¬´ËÀà²ÆÕþÊý¾Ý¿ÉÄܶ³öóÒ×Õ½Êõ£¬£¬ÉõÖÁ±»ÓÃÓÚ¾ºÕùµý±¨¿úËÅ¡£¡£¡£¿£Ë¼¿¼µ½MedImpactÈÕ¾ù´¦Öó¬°ÙÍò·ÝÒ½ÁÆË÷Å⣬£¬÷è÷ë¿ÉÄܳÖÓиü¶àδ¹«¿ªµÄÃô¸ÐÐÅÏ¢¡£¡£¡£


https://cybernews.com/security/qilin-medimpact-data-breach-healthcare/


3. ºÚ¿ÍÏúÊÛ800Íò·ÝÄ«Î÷¸çÕ®Îñ´ßÊÕ»ú¹¹Êý¾Ý


10ÔÂ28ÈÕ£¬£¬ÍøÂç·¸×ï·Ö×ÓÔÚ°µÍøÂÛ̳Ðû³ÆÏúÊÛÔ̺¬³¬800Íò±Ê¼Í¼µÄÄ«Î÷¸çÕ®ÎñÈËÊý¾Ý¿â£¬£¬Éæ¼°2023ÖÁ2025Äê¼äÍøÂçµÄСÎÒ¼°²ÆÕþÃô¸ÐÐÅÏ¢¡£¡£¡£¸ÃÊý¾Ý¿âÔ´×ÔÄ«Î÷¸çijծÎñ´ßÊÕ»ú¹¹£¬£¬¸Ã»ú¹¹×¨ÃÅÕÆ¹Ü´ßÌÖ¿Í»§ÓâÆÚ¿î×Ó¡£¡£¡£ÍþвÐÐΪÕßÐû³ÆÒÑÉøÈëÆäϵͳ£¬£¬µ«Î´¹«¿ª¾ßÌå»ú¹¹Ãû³Æ£¬£¬½ö°µÊ¾ÈԿɽӼûÆäϵͳ£¬£¬²¢É趨ÁËÊý¾Ý¼¯¼ÛÖµ±êÇ©¡£¡£¡£¾Ýй¶Ñù±¾ÏÔʾ£¬£¬±»µÁÊý¾Ýº­¸ÇÐÕÃû¡¢¡¢Õ®Îñ½ð¶î¡¢¡¢ÆëÈ«µØÖ·¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢CURP£¨Ä«Î÷¸çСÎÒÉí·ÝÖ¤ºÅ£©¡¢¡¢µç»°ºÅÂë¡¢¡¢ÒøÐÐÐÅÏ¢¡¢¡¢½ðÈÚ²úÆ·¼°ÓâÆÚͶ×Ê×éºÏ·ÖÅäÈÕÆÚµÈ¡£¡£¡£CURP×÷ΪīÎ÷¸çµ±¾ÖÏò¹«ÃñºÍ¾ÓÃñ·¢·ÅµÄΨһÉí·Ý±êʶ£¬£¬ÆäÖ°ÄÜÀàËÆÃÀ¹úÉç»á°²È«ºÅÂ룬£¬¿É±»ÓÃÓÚÉí·Ý͵ÇÔ¡¢¡¢Ú¿Æ­¼°¿ªÉèÐéÎ±ÒøÐÐÕË»§µÈ·¸·¨»î¶¯£¬£¬¶ÔÊܺ¦Õß°²È«×é³ÉÑÏÖØÍþв¡£¡£¡£×êÑÐÍŶÓÖ¸³ö£¬£¬´ËÀàÊý¾Ýй¶¿ÉÄܵ¼ÖÂÉí·Ý͵ÇÔ¡¢¡¢Ú²Æ­¼°Éç»á¹¤³Ì¹¥»÷£¬£¬µ«½öƾÑù±¾ÉÐÎÞ·¨Æëȫȷ¶¨Êý¾Ý»ñÈ¡õè¾¶¼°¾ßÌåÆðÔ´¡£¡£¡£


https://cybernews.com/security/mexico-debtors-data-leak-darkweb/


4. NCX¼ÓÃÜÆ½Ì¨³¬500ÍòÌõÃô¸ÐÊý¾Ýй¶


10ÔÂ28ÈÕ£¬£¬½üÈÕ£¬£¬Cybernews×êÑÐÍŶӷ¢ÏÖ¼ÓÃÜÇ®±ÒÂòÂôƽ̨NCXÒòδÊÜÕäÊÓµÄMongoDBÊý¾Ý¿âй¶³¬500ÍòÌõÓû§Ãô¸ÐÐÅÏ¢£¬£¬Éæ¼°Ë«³É·ÖÉí·ÝÑéÖ¤Âë¡¢¡¢¹þÏ£ÃÜÂë¡¢¡¢Ç®°üµØÖ·¡¢¡¢KYCÎļþÁ´½ÓµÈÖ÷ÌâÊý¾Ý£¬£¬Ð¹Â¶Êý¾Ý×ÜÁ¿³¬¹ý1GB¡£¡£¡£¸ÃÊý¾Ý¿âÒò±¨´ðÅäÖÃÃýÎóδÆôÓÃÉí·ÝÑéÖ¤£¬£¬µ¼ÖÂÈ«ÇòÓû§ÐÅÏ¢³Ö¾Ã¶³öÓÚ¹«¿ªÍøÂ磬£¬²¿ÃÅÊý¾Ý×îÔç¿É×·ÒäÖÁÊýÔÂǰ¡£¡£¡£Ð¹Â¶Êý¾Ýº­¸Ç°Ë´ó¼¯ÖУ¬£¬×î´ó¼¯ÖÐÔ̺¬³¬200Íò±Ê¼Í¼£¬£¬×îС×éºÏ¸÷º¬17ÍòÌõÒÔÉÏ£¬£¬ËùÓмͼ¾ùΪ×îÐÂÊý¾Ý£¬£¬·´Ó³Æ½Ì¨¸ß»îÔ¾¶È¡£¡£¡£¾ßÌå¶³öÐÅÏ¢Ô̺¬£º £ºÈ«Ãû¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢µç×ÓÓʼþ¡¢¡¢Óû§ÉÏ´«µÄÉí·ÝÖ¤¼þÁ´½Ó¡¢¡¢Ë«³É·ÖÈÏÖ¤£¨TFA£©´úÂë¼°URL¡¢¡¢ÄÚ²¿APIÃÜÔ¿¡¢¡¢IPµØÖ·¡¢¡¢¹þÏ£ÃÜÂë¡¢¡¢Ð¡ÎÒ×ÊÁÏÕÕÆ¬¡¢¡¢Ç®°üµØÖ·¡¢¡¢Çø¿éÁ´ÂòÂô¼Í¼¡¢¡¢´æ¿î/È¡¿îº¹Çà¡¢¡¢ÖÎÀíÔ±Ö§³ÖÈÕÖ¾µÈ¡£¡£¡£×êÑÐÍŶÓÖ¸³ö£¬£¬´ËÀàÊý¾Ý×éºÏ¿É±»ÓÃÓÚÉí·Ý͵ÇÔ¡¢¡¢ÕË»§ÊÕÊÜ¡¢¡¢¼ÓÃÜÇ®°ü·ì϶¹¥»÷¼°Éç»á¹¤³ÌÚ¿Æ­£¬£¬ÓÈÆäKYCÎļþºÍÄÚ²¿ÃÜÔ¿µÄй¶¶³öÁËÆ½Ì¨¹Ø¼ü»ù´¡ÉèÊ©µÄ°²È«·ì϶¡£¡£¡£


https://cybernews.com/security/ncx-exchange-data-leak-wallets-exposed/


5. ΢ÈíDNS·þÎñÖжÏÓ°ÏìAzureºÍMicrosoft 365·þÎñ


10ÔÂ29ÈÕ£¬£¬Î¢ÈíÔâ·êÈ«ÇòÐÔDNS·þÎñÖжÏÊÂÎñ£¬£¬Ó°ÏìÁìÓò²¨¼°AzureÔÆÆ½Ì¨¡¢¡¢Microsoft 365¼°¹ØÁª·þÎñ£¬£¬µ¼ÖÂÈ«ÇòÊýÍòÓû§ÎÞ·¨µÇ¼ÆóÒµÍøÂç¡¢¡¢½Ó¼ûÔÚÏ߯½Ì¨¼°Ö´ÐйؼüÒµÎñ²Ù×÷¡£¡£¡£Õâ´Î¹ÊÕÏʼÓÚUTC¹¦·ò16:00×óÓÒ£¬£¬DownDetector¼°É罻ýÌåÏÔʾÓû§¼¯Öл㱨·þÎñÆ÷ÏνÓʧ°Ü¡¢¡¢ÍøÕ¾½Ó¼ûÒì³£µÈÎÊÌâ¡£¡£¡£¾ßÌåÓ°Ïì²ãÃæ£¬£¬Óû§·´À¡Ô̺¬Intune¡¢¡¢AzureÃÅ»§¡¢¡¢ExchangeÖÎÀíÖÐÐÄÎÞ·¨½Ó¼û£¬£¬Azure Front DoorÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©·þÎṉ̃»¾£¬£¬Ò½ÁÆ»ú¹¹µÈ¹Ø¼ü¿Í»§Ôâ·êÉí·ÝÑéÖ¤¹ÊÕÏ£¬£¬Ô±¹¤ÎÞ·¨µÇ¼ҵÎñϵͳ¡£¡£¡£º £ºÉÀ¼Ìú·ϵͳµÈ¹«¹²ÉèÊ©ÒàÊܲ¨¼°£¬£¬ÆäÔÚÏß¹Û¹â¹æ»®Æ½Ì¨¼°ÊÛÆ±»ú³öÏÖ²Ù×÷ÖжÏ¡£¡£¡£×îнøÕ¹ÏÔʾ£¬£¬Î¢ÈíÒÑÈ·ÈϹÊÕÏÓÉAzure Front DoorÅäÖõ÷»»´¥·¢£¬£¬ÏµÎÞÒâ²Ù×÷µ¼Ö¡£¡£¡£¹«Ë¾Õýͬ²½Ö´ÐÐÁ½ÏîÐж¯£º £º¶³½áAFD·þÎñµ÷»»È¨ÏÞ£¬£¬²¢½«ÏµÍ³»Ø¹öÖÁ×îºóÒ»´Î²»±ä״̬¡£¡£¡£Ô¤¼ÆÆëÈ«¸´Ô­Ðè4Сʱ£¬£¬Ö¸±êʵÏÖ¹¦·òΪUTC 23:20¡£¡£¡£Î¢Èí½¨Òé¿Í»§ÆôÓÃAzureÁ÷Á¿ÖÎÀíÆ÷Ö´ÐйÊÕÏ×ªÒÆ£¬£¬½«Á÷Á¿´ÓAFDתÏòÔ´·þÎñÆ÷£¬£¬²¢³ÐŵÿÁ½Ð¡Ê±¸üнøÕ¹¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-dns-outage-impacts-azure-and-microsoft-365-services/


6. ¼ÓÄÃ´ó³ÆºÚ¿Í×éÖ¯ÈëÇÖÁËË®ÎñºÍÄÜÔ´ÉèÊ©


10ÔÂ29ÈÕ£¬£¬¼ÓÄôóÍøÂ簲ȫÖÐÐĽüÈÕ°ä²¼´¹Î£ÖҸ棬£¬Ö¸³öºÚ¿ÍÐж¯Ö÷ÒåÕßÒÑÂÅ´ÎÈëÇÖÈ«¹ú¹Ø¼ü»ù´¡Éèʩϵͳ£¬£¬Í¨¹ý´Û¸Ä¹¤Òµ½ÚÖÆÏµÍ³£¨ICS£©ÖÆ×÷DZÔÚΣÏÕ¡£¡£¡£µ±¾ÖÇ¿µ÷£¬£¬´ËÀàÕë¶Ô¶³öÓÚ»¥ÁªÍøµÄICSÉ豸µÄ¶ñÒâ»î¶¯Õý³ÊÉÏÉýÇ÷Ïò£¬£¬Ø½Ðè²ÉÈ¡¸üÇ¿°²È«´ëÊ©ÒÔ×èÖ¹¹¥»÷¡£¡£¡£¾¯±¨ÁоÙÁËÈýÆðµäÐÍÊÂÎñ£º £ºÆäÒ»£¬£¬Ä³¹©Ë®ÉèÊ©ÔâÈëÇÖ£¬£¬Ë®Ñ¹Öµ±»¶ñÒâÅú¸Ä£¬£¬µ¼ÖÂÉçÇø¹©Ë®·þÎñ½µÂ䣻Æä¶þ£¬£¬¼ÓÄôóijʯÓÍÌìÈ»Æø¹«Ë¾µÄ×Ô¶¯Ó͹ÞҺλ¼Æ£¨ATG£©±»°Ñ³Ö£¬£¬´¥·¢Ðéα¾¯±¨£»ÆäÈý£¬£¬Ä³Å©³¡¹ÈÎï¸ÉÔïͲ²ÖµÄζÈÓëʪ¶ÈˮƽÔⱨ´ð´Û¸Ä£¬£¬Èôδʵʱ·¢ÏÖ¿ÉÄÜÒý·¢°²È«±äÂÒ¡£¡£¡£ÕâЩϮ»÷±»È϶¨Îª»úÓöÖ÷ÒåÐÐΪ£¬£¬Ö¼ÔÚÖÆ×÷ýÌåºä¶¯¡¢¡¢·ÛË鹫¼Ò¶Ôµ±¾ÖÐÅÀµ²¢ÇÖº¦¹ú¶ÈÃûÓþ£¬£¬¶ø·ÇÓдòËã¡¢¡¢ÓÐԤıµÄ¹¥»÷¡£¡£¡£º £ºÚ¿ÍÐж¯Ö÷ÒåÕß³£Óë¸ß¼¶³ÖÐøÐÔÍþв£¨APT£©×éÖ¯ºÏ×÷£¬£¬Í¨¹ýÉ¢²¥Õ𾪺ÍÍþв¸ÐʵÏÖÆäÖ¸±ê¡£¡£¡£ÎªÓ¦¶ÔÈÕÒæ·è¿ñµÄºÚ¿ÍÐж¯Ö÷Òå»î¶¯£¬£¬¼ÓÄô󵱾ÖÌá³ö½¨Ò飬£¬Ô̺¬È«ÃæÅ̵㲢ÆÀ¹ÀËùÓпɽӼû»¥ÁªÍøµÄICSÉ豸µÈ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/canada-says-hacktivists-breached-water-and-energy-facilities/