˹¿°ÄáÑÇÆóÒµ±£ÏÕ²¿ÃÅÒÉÔâÈëÇÖ £¬3.4Íò·ÝÎļþ±»µÁ

°ä²¼¹¦·ò 2025-06-18

1. ˹¿°ÄáÑÇÆóÒµ±£ÏÕ²¿ÃÅÒÉÔâÈëÇÖ £¬3.4Íò·ÝÎļþ±»µÁ


6ÔÂ16ÈÕ £¬ÈðµäÖØÒªÉÌÓóµÔì×÷ÉÌ˹¿°ÄáÑÇÒÉËÆÔâ·êÊý¾Ýй¶ÊÂÎñ ¡£¹¥»÷ÕßÔÚÒ»¸öÈȵ㡰½öÏÞÔ¼Ç롱µÄºÚ¿ÍÂÛ̳Éϰ䷢ÈëÇÖÁË˹¿°ÄáÑÇµÄÆóÒµ±£ÏÕ²¿ÃÅ £¬²¢Ðû³ÆÇÔÈ¡ÁË3.4Íò·Ý´Ëǰ´Óδ¹«¿ª¹ýµÄÎļþ ¡£½ØÖÁĿǰ £¬ÕâЩÎļþÔ̺¬µÄ¾ßÌåÐÅÏ¢Éв»Ã÷È· ¡£²»Íâ £¬¼øÓÚ˹¿°ÄáÑǹ«Ë¾±£ÏÕº­¸ÇÉÌÓóµÁ¾ £¬Â¶³öµÄÎļþ¼«ÓпÉÄÜÉæ¼°¿Í»§ÐÅÏ¢ £¬Èç¿Í»§Éí·ÝÒÔ¼°ËûÃÇËùÕ¼ÓеijµÁ¾ÐÅÏ¢£¨Í¨¹ý³µÁ¾¼ø±ðºÅÂëVIN£© ¡£Ä¿Ç° £¬¹¥»÷ÕßÐû³ÆÇÔÈ¡Êý¾ÝµÄ˹¿°ÄáÑÇÍøÕ¾ÒÑÎÞ·¨½Ó¼û £¬·Ã¿ÍÖ»ÄÜ¿´µ½ÏµÍ³ÊØ»¤ÏÂÏßµÄÐÂÎÅ £¬µ«Éв»Ã÷ÏÔÕâ´ÎÊØ»¤ÊÇ·ñÓëºÚ¿Í¹¥»÷ÓйØ ¡£Ë¹¿°ÄáÑÇ×÷Ϊ´óÐÍÉÌÓóµÔì×÷ÉÌ £¬ÔÚÅ·ÖÞÉÌÓóµÊг¡Õ¼¾Ý½ü19%µÄ·Ý¶î £¬Õ¼ÓÐ5.9ÍòÃûÔ±¹¤ £¬2024ÄêÓªÊÕÔ¤¼Æ³¬220ÒÚÃÀÔª ¡£¹¥»÷Õß³£½«Æû³µÔì×÷ÉÌ×÷Ϊָ±ê £¬Ô­ÒòÔÚÓÚ´óÐÍ¿ç¹ú¹«Ë¾°ÑÎÕ×Å´óÁ¿Ãô¸ÐµÄ¹«Ë¾ºÍ¿Í»§Êý¾Ý £¬ÇÒÔÚÔâ·êÀÕË÷ʱ¾ß±¸Ö§¸¶Êê½ðµÄÄÜÁ¦ ¡£´Ëǰ £¬±¾ÔÂÔçЩʱ³½¹¥»÷Õß¾ÍÔøÐû³ÆÈëÇÖÁ˵¹úÆû³µ¾ÞÍ·¹«¹²Æû³µ¼¯ÍÅ ¡£


https://cybernews.com/security/scania-insurance-data-breach-hackers/


2. °®¶ûÀ¼ÑÛ¿Æ»¤Àí¹«Ë¾OcucoÊý¾Ýй¶ӰÏì24ÍòÈË


6ÔÂ16ÈÕ £¬×ܲ¿Î»ÓÚ°®¶ûÀ¼µÄÑÛ¿Æ»¤Àí¼¼Êõ¹«Ë¾OcucoÏòÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿£¨HHS£©´«µÝÁËһ·Êý¾Ýй¶ÊÂÎñ £¬Õâ´ÎÊÂÎñÓ°Ï쳬¹ý24ÍòÈË ¡£Ocuco×Ô³ÆÊÇÈ«Çò×î´óµÄÑÛ¾µÁãÊÛÈí¼þÆóÒµ £¬ÆäÈí¼þ·þÎñ¿í·º¸²¸Ç77¸ö¹ú¶È/µØÓòµÄ6000¸ö·þÎñµã ¡£Ö»¹ÜOcucoÉÐδ¹«¿ª°ä²¼ÊÂÎñ¹«¸æ £¬µ«¸÷ÖÖ¼£ÏóÅú×¢ £¬¸ÃÊÂÎñºÜ¿ÉÄÜÓëÀÕË÷×éÖ¯KillSecµÄºÚ¿Í¹¥»÷ÓйØ ¡£½ñÄêÔçЩʱ³½ £¬KillSecÐû³Æ´ÓOcucoÇÔÈ¡ÁË´óÁ¿Îļþ £¬4Ô³õ £¬¸Ã×éÖ¯ÔÚÆä»ùÓÚTorµÄÐ¹Â¶ÍøÕ¾Éϰ䲼ÁËOcucoµÄÐÅÏ¢ £¬²¢°ä²¼Á˶àÕŽØÍ¼×÷Ϊ¹¥»÷ÐÐΪµÄ×ôÖ¤ ¡£ÆäÖÐÒ»ÕŽØÍ¼ÏÔʾ £¬ºÚ¿ÍÖÁÉÙÇÔÈ¡ÁË67Íò·ÝÎļþ £¬×ܼÆ340GBÊý¾Ý ¡£¹ÌÈ»ºÚ¿ÍÍøÕ¾Ðû³Æ±»µÁÊý¾ÝÒѹ«¿ª £¬µ«½ØÖÁ·¢¸åʱ £¬OcucoµÄÊý¾ÝÉÐδ³Ê´Ë¿ÌKillSecÍøÕ¾µÄ¿ÉÏÂÔØÁбíÖÐ ¡£


https://www.securityweek.com/240000-impacted-by-data-breach-at-eyecare-tech-firm-ocuco/


3. ¡°ÂÓʳÂéȸ¡±¹¥»÷ÒÁÀÊÈüÅÁÒøÐÐ £¬Í¹ÏÔÒÔÒÁì¶ÜÖÐÍøÂçÕ½Éý¼¶


6ÔÂ17ÈÕ £¬ÒÁÀʹúÓÐÒøÐÐÈüÅÁÒøÐУ¨Bank Sepah£©ÍøÕ¾ÒòÔâºÚ¿Í×éÖ¯¡°ÂÓʳÂéȸ¡±£¨Predatory Sparrow £¬²¨Ë¹ÓïΪ¡°Gonjeshke Darande¡±£©¹¥»÷¶øÏÂÏß ¡£¸Ã×éÖ¯ÖܶþÁ賿ÔÚÉ罻ýÌåÐû³Æ¡°·ÛËéÁËÒÁÀʸïÃüÎÀ¶ÓÈüÅÁÒøÐеÄÊý¾Ý¡± ¡£¾ÝÒÁÀÊýÌ屨· £¬ÈüÅÁÒøÐзÖÐйعØ £¬¿Í»§ÎÞ·¨½Ó¼ûÕË»§ £¬Ö§¸¶´¦ÖÃÖжÏ £¬ÒÁÀÊ·¨¶û˹ͨѶÉçҲ֤ʵÆä»ù´¡ÉèÊ©Ôâ·êÍøÂç¹¥»÷Ö·þÎñÖжÏ ¡£Õâ´ÎÕë¶ÔÒÁÀÊ×î´ó½ðÈÚ»ú¹¹Ö®Ò»µÄÏ®»÷ £¬Í¹ÏÔÍøÂçÕ½ÔÚÒÔÉ«ÁкÍÒÁÀʲ»ÐÝÉý¼¶µÄì¶ÜÖÐ×÷ÓÃÓú·¢³ÁÒª £¬ÇÒ¶ÔÒÁÀʹؼü»ù´¡ÉèÊ©²úÉúÖ±½ÓÓ°Ïì ¡£¡°ÂÓʳÂéȸ¡±×éÖ¯³Æ¹¥»÷ÈüÅÁÒøÐÐ £¬ÒòÆä¡°¶ã±Ü¹ú¼ÊÔì²Ã £¬ÓÃÒÁÀÊÈËÃñµÄÇ®ÔÞÖúÕþȨµÄ¿Ö²ÀÖ÷Òå´úÀíÈË¡¢µ¯Â·µ¼µ¯´òËãºÍ¾üʺ˴òË㡱 ¡£¸Ã×éÖ¯´Ëǰ»¹Ðû³Æ¶ÔÒÁÀʸÖÌú³§¡¢ÌúÂ·ÍøÂç¼°¼ÓÓÍÕ¾Ö§¸¶ÏµÍ³·¢Æð¹¥»÷ £¬ÆäÔ­¼®¹ú²»Ã÷ £¬µ«Ò»Ö¹Øë¶ÔÒÁÀÊÕþȨ²¢Ö§³ÖÒÔÉ«ÁÐÔÚÒÁÖ¸±ê ¡£


https://cyberscoop.com/iran-bank-sepah-cyberattack/


4. Cock.liÈ·ÈÏÊý¾Ýй¶ £¬³¬°ÙÍòÓû§ÐÅÏ¢ÔâÇÔ


6ÔÂ17ÈÕ £¬µç×ÓÓʼþÍйÜÌṩÉÌCock.liÈ·ÈÏÔâ·êÊý¾Ýй¶ÊÂÎñ ¡£ÍþвÐÐΪÕßÀûÓÃÆäÒÑÍËÒÛµÄRoundcubeÍøÂçÓʼþƽ̨·ì϶ £¬ÇÔÈ¡Á˳¬¹ýÒ»°ÙÍò¸öÓû§¼Í¼ ¡£Õâ´Îй¶¶³öÁË×Ô2016ÄêÒÔÀ´µÇ¼¸ÃÓʼþ·þÎñµÄËùÓÐЧ»§£¨Ô¼1,023,800ÈË£©µÄÐÅÏ¢ £¬ÒÔ¼°Áí±í93,000ÃûÓû§µÄÁªÏµÈËÌõ¿î ¡£ÉÏÖÜÍíЩʱ³½ £¬Cock.li·þÎñÖжϵ«Î´¹«¿ªÚ¹ÊÍ £¬ËæºóÍþвÐÐΪÕßÐû³ÆÒªÏúÊÛÔ̺¬Ãô¸ÐÓû§ÐÅÏ¢µÄÊý¾Ý¿â ¡£Cock.li×òÌì°ä·¢ÉêÃ÷֤ʵÁËÕâ´ÎйÃÜÊÂÎñ¼°ÍþвÐÐΪÕßÖ¸¿ØµÄÓÐЧÐÔ £¬È·ÈÏÁË1,023,800¸öÓû§ÕÊ»§µÄµç×ÓÓʼþ¡¢µÇ¼¹¦·ò´ÁµÈÐÅÏ¢Òѱ»Ð¹Â¶ £¬µ«Óû§ÕÊ»§ÃÜÂë¡¢µç×ÓÓʼþÄÚÈݺÍIPµØÖ·²¢Î´Ð¹Â¶ ¡£Í¬Ê± £¬µÚÈý·½ÁªÏµÐÅÏ¢±»Ð¹Â¶µÄ10,400ÃûÕË»§³ÖÓÐÈ˽«ÊÕµ½µ¥¶À֪ͨ £¬½¨Òé×Ô2016ÄêÒÔÀ´Ê¹Óø÷þÎñµÄËùÓÐÈ˳ÁÖÃÃÜÂë ¡£Cock.liÒÔΪÊý¾ÝÊÇÀûÓþɵÄRoundCube SQL×¢Èë·ì϶ÇÔÈ¡µÄ £¬¶øÕâ´Îй¶ÊÂÎñ²úÉúÖ®¼Ê £¬ËûÃǸշÖÎöÁËRoundcubeÖеÄÒ»¸öRCE·ì϶²¢ÒÔΪ¸Ã·ì϶ÔÚ¹¥»÷Öб»»ý¼«ÀûÓà £¬´ÙʹCock.liÓÚ2025Äê6Ô½«¸ÃÈí¼þ´ÓÆäƽ̨ÉÏÒÆ³ý £¬²¢°µÊ¾½«²»ÔÙÌṩRoundcubeÍøÂçÓʼþ ¡£


https://www.bleepingcomputer.com/news/security/hacker-steals-1-million-cockli-user-records-in-webmail-data-breach/


5. ºÚ¿ÍÀûÓÃLangflowÑϳÁ·ì϶¿ªÊÍFlodrix½©Ê¬ÍøÂç


6ÔÂ17ÈÕ £¬¹¥»÷ÕßÕý»ý¼«ÀûÓûùÓÚPythonµÄWebÀûÓ÷¨Ê½LangflowÖеÄÒ»¸öÑϳÁȱµã£¨CVE-2025-3248£©·¢Æð¹¥»÷ £¬¸Ãȱµã´æÔÚÓÚLangflow 1.3.0֮ǰµÄ°æ±¾ÖÐ ¡£LangflowÊÇ´úÀíAIÁìÓò¿í·ºÑ¡È¡µÄ¹¤¾ß £¬ÔÊÐíÓû§¹¹½¨AIÇý¶¯µÄ´úÀíºÍ¹¤×÷Á÷ £¬¶ø´Ë·ì϶ÊÇÒ»¸öÒ×ÓÚÀûÓõÄÉí·ÝÑéÖ¤·ì϶ £¬´æÔÚÓÚÆ½Ì¨µÄ´úÂëÑéÖ¤»úÔìÖÐ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õ߯ëÈ«ÊÕÊÜLangflow·þÎñÆ÷ ¡£Ç÷Ïò¿Æ¼¼×êÑÐÈËÔ±·¢ÏÖ £¬¹¥»÷Õßͨ¹ýÏò/api/v1/validate/code¶Ëµã·¢ËͶñÒâPOSTÒªÇóÀ´ÀûÓô˷ì϶ £¬ÔÚÊÜϰȾµÄ·þÎñÆ÷ÉÏÖ´ÐÐÏÂÔØÆ÷¾ç±¾ £¬ÒÔ»ñÈ¡²¢×°ÖÃFlodrix¶ñÒâÈí¼þ £¬½ø¶ø¿ªÊÍ׳´óµÄ½©Ê¬ÍøÂç £¬¿ÉÄܵ¼ÖÂϵͳ±»ÈëÇÖ¡¢DDoS¹¥»÷ £¬ÒÔ¼°Ãô¸ÐÐÅÏ¢ÃÔʧ»òй¶ ¡£¼øÓÚLangflowÔÚGitHubÉÏÕ¼Óг¬¹ý7Íò¿ÅÐÇ £¬Åú×¢ÆäÊÜ¿ª·¢ÕßÈϿɶȸß £¬ÇÒÔÚÖÇÄÜ×Ô¶¯»¯Ô­ÐÍÉè¼ÆºÍ²¿Êð·½Ãæ²ûÑï³ÁÒª×÷Óà £¬Ò×Êܹ¥»÷µÄLangflow·þÎñÆ÷¶Ô¹¥»÷Õß¶øÑÔÊÇ¡°¼«¾ßÎüÒýÁ¦µÄÖ¸±ê¡± ¡£


https://www.darkreading.com/vulnerabilities-threats/hackers-exploit-langflow-flaw-flodrix-botnet


6. CISA¾¯Ê¾TP-LinkÈÈõè¾¶ÓÉÆ÷·ì϶Õý±»»ý¼«ÀûÓÃ


6ÔÂ17ÈÕ £¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©¸üÐÂÒÑÖª±»ÀûÓ÷ì϶Ŀ¼ £¬½«TP-LinkºÅÁî×¢Èë·ì϶CVE-2023-33538ÄÉÈëÆäÖÐ ¡£¸Ã·ì϶Á½ÄêǰËäÒѱ»·¢ÏÖ £¬µ«½üÆÚ±»ÍøÂç·¸×ï·Ö×Ó»ý¼«ÀûÓà £¬ÆÀ·Ö¸ß´ï8.8·Ö £¬ÔÊÐí¹¥»÷ÕßÔÚδ¾­ÊÚȨµÄÇé¿öÏÂÔÚ·ÓÉÆ÷ÉÏÖ´ÐкÅÁî £¬×é³É³Á´ó·çÏÕ ¡£ÊÜÓ°ÏìµÄTP-Link·ÓÉÆ÷ÐͺÅÔ̺¬TL-WR940N V2/V4¡¢TL-WR841N V8/V10ÒÔ¼°TL-WR740N V1/V2µÈ £¬ÕâЩ·ÓÉÆ÷ÔÚÏû·ÑÊг¡ÉϹãÊÜÓ­½Ó £¬²¿ÃÅÐͺÅÔÚÑÇÂíÑ·ÉÏÓµº±¼ûÍòÌõÆÀÂÛ ¡£È»¶ø £¬ÕâЩÊÜÓ°ÏìµÄÓ²¼þ°æ±¾ÒѴﵽʹÓÃÊÙÃü £¬²»Ôٽӹܰ²È«¸üР£¬ÇÒ×îй̼þ°æ±¾°ä²¼¹¦·ò³¤Ô¶ £¬ÈçTL-WR940N V2/V4µÄ×îй̼þ°æ±¾ÓÚ2016Äê°ä²¼ £¬TL-WR841N V8/V10µÄ×îºóÒ»´Î¹Ì¼þ¸üÐÂÔòÊÇÔÚ2015Äê ¡£CISAÖÒ¸æ³Æ £¬ÕâЩ·ÓÉÆ÷´æÔÚÑϳÁ°²È«Òþ»¼ £¬Óû§Ó¦ÖÕ³¡Ê¹Óà ¡£¸Ã·ì϶´æÔÚÓÚ·ÓÉÆ÷µÄWebÖÎÀí½çÃæÖÐ £¬ÒòÎÞ·¨ÕýÈ·ÑéÖ¤Óû§ÊäÈë £¬ºÚ¿ÍµÃÒÔ×¢Èë¶ñÒâºÅÁî ¡£¹ÌȻӵÓÐÔ¶³Ì½Ó¼ûÖ°ÄܵĹ«¿ªÂ·ÓÉÆ÷ÉÏ´ËÀàȱµã×îΪΣÏÕ £¬µ«¹¥»÷ÕßÒ²¿É´Óͳһ±¾µØÍøÂçÄÚÀûÓà ¡£Îª´Ë £¬CISAÒªÇóÁª¹ú»ú¹¹ÔÚ2025Äê7ÔÂ7ÈÕÇ°ÒÆ³ýÕâЩ·ÓÉÆ÷ £¬²¢¶½´ÙËùÓÐ×é֯Ч·Â £¬ÒÔÈ·±£ÍøÂ簲ȫ ¡£


https://cybernews.com/security/hackers-exploit-older-tp-link-routers-cisa-warns/