¹È¸è½¨¸´ÁËChromeÖб»»ý¼«ÀûÓõÄɳºÐÌÓÒÝÁãÈÕ·ì϶

°ä²¼¹¦·ò 2025-07-18

1. ¹È¸è½¨¸´ÁËChromeÖб»»ý¼«ÀûÓõÄɳºÐÌÓÒÝÁãÈÕ·ì϶


7ÔÂ16ÈÕ £¬¹È¸è½üÈÕ°ä²¼Chromeä¯ÀÀÆ÷°²È«¸üР£¬´¹Î£½¨¸´Áù¸ö°²È«·ì϶ £¬ÆäÖбàºÅΪCVE-2025-6558µÄ¸ßΣ·ì϶Òѱ»¹¥»÷ÕßÀûÓà £¬ÊµÏÖɳºÐÌÓÒÝ¡£¸Ã·ì϶ÑϳÁµÈ¼¶´ï8.8·Ö £¬Ó°Ïì138.0.7204.157֮ǰ°æ±¾µÄChrome £¬¹È¸èÍþв·ÖÎöÓ××飨TAG£©ÓÚ6ÔÂ23ÈÕ·¢ÏÖºóѸËÙÍÆ³ö²¹¶¡ £¬½¨ÒéÓû§Á¢¼´Éý¼¶ÖÁ138.0.7204.157/158°æ±¾¡£CVE-2025-6558µÄÖ÷ÌâÎÊÌâÔÚÓÚChromeµÄͼÐÎÒýÇæ×é¼þANGLE¶Ô²»ÊÜÐÅÀµÊäÈëµÄÑéÖ¤²»¼°¡£ANGLE×÷Ϊ¿ªÔ´Í¼ÐγéÏó²ã £¬Õƹܽ«OpenGL ESŲÓÃת»»ÎªÆäËûͼÐÎAPI£¨ÈçDirect3D¡¢Vulkan£© £¬µ«ÆäÔÚ´¦ÖÃWebGLÍøÕ¾µÈÆðÔ´µÄGPUºÅÁîʱ´æÔÚȱµã £¬ÔÊÐí¹¥»÷Õßͨ¹ýÌØÔìHTMLÒ³ÃæÔÚGPU¹ý³ÌÖÐÖ´ÐÐËÁÒâ´úÂë £¬²¢×îÖÕÍ»ÆÆä¯ÀÀÆ÷ɳºÐÏÞ¶È¡£É³ºÐ»úÔì±¾ÊÇChromeµÄÖ÷Ìⰲȫ·À»¤ £¬ÓÃÓÚ¸ôÀëä¯ÀÀÆ÷¹ý³ÌÓë²Ù×÷ϵͳ £¬Ô¤·À¶ñÒâÈí¼þÀ©É¢ÖÁÉ豸ÆäËû²¿ÃÅ¡£Õâ´Î·ì϶µÄÍ»ÆÆ £¬¿ÉÄÜʹ¹¥»÷ÕßÖ±½Ó½ÚÔìÓû§É豸 £¬ÇÔÈ¡Ãô¸ÐÊý¾Ý»ò²¿Êð¶ñÒâÈí¼þ¡£


https://www.bleepingcomputer.com/news/security/google-fixes-actively-exploited-sandbox-escape-zero-day-in-chrome/


2. ¸ñÀ­µÂÄáÊÕÑø»ú¹¹Êý¾Ýй¶ £¬110Íò±Ê¼Í¼±»ÆØ¹â


7ÔÂ17ÈÕ £¬ÍøÂ簲ȫ×êÑÐÔ±Jeremiah FowlerÔÚÍøÂçɨÃèÖз¢ÏÖ £¬ÃÀ¹ú¸ñÀ­µÂÄáÊÕÑøÖÐÐÄÓйصĴóÁ¿Î´Êܱ£»¤Êý¾ÝÔÚÏß¶³ö £¬Òý·¢ÑϳÁÒþÖÔΣ»ú¡£Õâ´Îй¶µÄÊý¾Ý¿âÈÝÁ¿´ï2.49GB £¬Ô̺¬³¬¹ý110ÍòÌõÃô¸Ð¼Í¼ £¬Éæ¼°¶ùͯ¡¢Ñø¸¸Ä¸¡¢Ç×Éú¼ÒÍ¥¼°»ú¹¹Ô±¹¤ £¬º­¸ÇÐÕÃû¡¢ÁªÏµ·½Ê½¡¢²¡Àý¼Í¼¡¢¸öÈËÆÀ¹ÀµÈ¸ß¶ÈÒþÖÔÐÅÏ¢¡£ÕâЩÊý¾ÝδÉèÖÃÃÜÂë»ò¼ÓÃܱ£»¤ £¬Èκξ߱¸»ù´¡ÍøÂç֪ʶµÄÓû§¾ù¿Éͨ¹ý¶³öµÄÔÆ·þÎñÆ÷Ö±½Ó½Ó¼û £¬ÓÈÆäÒ×±»ÍøÂç·¸×ï·Ö×ÓÀûÓá£Fowler·¢ÏÖÊý¾ÝºóÁ¢¼´ÏòÓйØ×éÖ¯ÌáÒéÕÆ¹ÜÈÎÅû¶ £¬´ÎÈÕÊý¾ÝËä±»´¹Î£ÏÂÏß £¬µ«Â¶³öʱ³¤¼°ÊÇ·ñÔâ¶ñÒâ½Ó¼ûÈÔ´æÒÉ¡£Ð¹Â¶¼Í¼Դ×Ըûú¹¹ÓÃÓÚÖÎÀí°¸ÀýÓ빵ͨµÄCRMƽ̨ £¬Îļþ¼Ð±ê×¢"ÁªÏµÈË""ÉêÇë""Ç×Éú¸¸Ç×"µÈ £¬¾ßÌå¼Í¼ÉêÇëÈ˼ÒÍ¥²¼¾°¡¢±»¾ÜÊÕÑøÔ­Òò¡¢Ò©ÎïÀÄÓûò˾·¨ÎÊÌâµÈϸ½Ú¡£Ö»¹ÜδÔ̺¬ÆëÈ«°¸¼þµµ°¸ £¬µ«µ¥±Ê¼Í¼ÒÑÔ̺¬×ã¹»ÐÅÏ¢ £¬×ãÒÔ³ÉΪÉç»á¹¤³Ì¹¥»÷»òÚ¿Æ­µÄÖ¸±ê¡£ÓÈΪÃô¸ÐµÄÊÇ28.4ÍòÌõµç×ÓÓʼþÔªÊý¾Ý £¬ËäÎ´ÆØ¹âÆëÈ«ÓʼþÕýÎÄ £¬µ«Ö÷ÌâÐпÉÄÜй¶ÐÕÃû»ò²Î¿¼ÐÅÏ¢ £¬Èô½áºÏ»ú¹¹ÓëÒ½ÁÆ¡¢Éç»á·þÎñ»ú¹¹µÄ¹ØÁª¼Í¼ £¬ÒþÖÔ·çÏÕ½«½øÒ»²½À©´ó¡£¼¼Êõ·ÖÎöÏÔʾ £¬¸ÃÊý¾Ý¿âÓÉ´¿Îı¾ÓëͨÓÃΨһ±êʶ·û£¨UUID£©×é³É £¬ËäUUID¿´ËƸ´ÔÓ £¬µ«²»×ã¼ÓÃܱ£»¤ £¬ÎÞ·¨×èֹδ¾­ÊÚȨ½Ó¼û¡£


https://hackread.com/massive-data-leak-texas-adoption-agency-million-records/


3. ÎÚ¿ËÀ¼·¢ÏÖAPT28ÀûÓÃLLMµÄÐÂÐͶñÒâÈí¼þLameHug


7ÔÂ17ÈÕ £¬ÎÚ¿ËÀ¼¹ú¶ÈÍøÂçÊÂÎñÏìÓ¦Ó××飨CERT-UA£©½üÈÕÅû¶ÁËÒ»ÖÖÃûΪLameHugµÄÐÂÐͶñÒâÈí¼þ £¬ÆäÍ»ÆÆÐÔÌØµãÔÚÓÚ³õ´Î¹«¿ª¼Í¼ÁËÀûÓôóÐÍ˵»°Ä£ÐÍ£¨LLM£©¶¯Ì¬ÌìÉú¹¥»÷ºÅÁîµÄ¹¥»÷ģʽ £¬²¢½«¹¥»÷¹éÒòÓÚ¶íÂÞ˹¹ú¶ÈÖ§³ÖµÄAPT28£¨Fancy Bear£©×éÖ¯¡£¸Ã¶ñÒâÈí¼þÓÉPython±àд £¬Í¨¹ýHugging Face APIÓë°¢ÀïÔÆ¿ªÔ´µÄQwen 2.5-Coder-32B-InstructÄ£Ðͽ»»¥¡£LameHugµÄ¹¥»÷Á´ÌõʼÓÚ¶ñÒâµç×ÓÓʼþ£º¹¥»÷Õß¼ÙÒâµ±¾Ö¹ÙÔ± £¬Ïòµ±¾ÖÐÐÕþ»ú¹¹·¢ËÍÔ̺¬ZIP¸½¼þµÄ´¹µöÓʼþ £¬¸½¼þÄÚǶLameHug¼ÓÔØ·¨Ê½¡£Ò»µ©Ö´ÐÐ £¬¶ñÒâÈí¼þ»áͨ¹ýLLM¶¯Ì¬ÌìÉúϵͳ¿úËÅÓëÊý¾ÝÇÔÈ¡ºÅÁî £¬¾ßÌå²Ù×÷Ô̺¬£ºÍøÂçϵͳÐÅÏ¢²¢±£ÁôÖÁ¡°info.txt¡±Îļþ£»µÝ¹éËÑË÷¡°Îĵµ¡±¡°×ÀÃæ¡±¡°ÏÂÔØ¡±µÈ¹Ø¼üWindowsĿ¼ÖеÄÎĵµ£»×îÖÕͨ¹ýSFTP»òHTTP POSTÒªÇó½«Êý¾ÝÇÔÈ¡ÖÁ¹¥»÷Õß½ÚÔìµÄ·þÎñÆ÷¡£¼¼Êõ²ãÃæ £¬LameHugµÄ´´ÐÂÐÔÌå´Ë¿ÌÁ½·½Ã棺ÆäÒ» £¬ËüÊÇÊ׸ö¹«¿ª¼Í¼µÄÀûÓÃLLMÖ§³Ö¹¥»÷Õß¹¤×÷µÄ¶ñÒâÈí¼þ £¬Ê¹ÍþвÐÐΪÕßÄÜÔÚ¹¥»÷¹ý³ÌÖÐʵʱµ÷ÕûÕ½Êõ £¬ÎÞÐ貿ÊðÐÂÓÐÐ§ÔØºÉ£»Æä¶þ £¬Í¨¹ýHugging Face»ù´¡ÉèÊ©½øÐÐÖ¸»Ó½ÚÔ죨C2£©Í¨Ñ¶ £¬½µµÍÁË´«Í³C2·þÎñÆ÷µÄ¶³ö·çÏÕ £¬µ¢¸éÁËÈëÇÖÒñ±ÎÆÚ¡£´Ë±í £¬¶¯Ì¬ÌìÉúµÄºÅÁî¿É¶ã±Ü»ùÓÚ¾²Ì¬Ìصã¼ì²âµÄ°²È«Èí¼þ £¬Ôö³¤ÁË·ÀÓùÄѶÈ¡£


https://www.bleepingcomputer.com/news/security/lamehug-malware-uses-ai-llm-to-craft-windows-data-theft-commands-in-real-time/


4. StormousÀÕË÷Èí¼þÍÅ»ïÇÔÈ¡ÑÇÀûÉ£ÄÇÖÝÒ½ÁÆÖÐÐÄ60Íò»¼ÕßÊý¾Ý


7ÔÂ17ÈÕ £¬Ç×¶íÀÕË÷Èí¼þ×éÖ¯Stormous½üÈÕÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû³Æ £¬³É¹¦ÈëÇÖÃÀ¹úÑÇÀûÉ£ÄÇÖݱ±²¿·ÇͶ»úÐÔÁª¹úÈÏÖ¤Ò½ÁÆÖÐÐÄ£¨FQHC£©North Country HealthCare £¬ÇÔÈ¡ÁËÔ¼60ÍòÃû»¼ÕßµÄÃô¸ÐÐÅÏ¢¡£¸ÃÒ½ÁÆÖÐÐÄÔÚ11¸öÉçÇøµÄ14¸öµØÖ·Ìṩȫ¿ÆÒ½ÁÆ·þÎñ £¬¸²¸Ç¼Òͥҽѧ¡¢¶ù¿Æ¡¢ÐÐΪ½¡È«¡¢ÑÀ¿Æ»¤ÀíµÈ¶àÁìÓò £¬²¢½ÓÊÜ´óÎÞÊý±£ÏÕ´òË㼰ΪδͶ±£»¼ÕßÌṩÓöÈÕÛ¿Û¡£StormousÍÅ»ïÐû³Æ £¬ÇÔÈ¡µÄÊý¾ÝÔ̺¬ÆëÈ«µÄÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡¢Êܱ£»¤½¡È«ÐÅÏ¢£¨PHI£©¡¢Õï¶Ï´úÂ루ICD£©¼°ÕïËùÓëÒ½ÁÆ·þÎñÌṩÕßÏêÇé £¬¾ßÌåÔ̺¬»¼ÕßÈ«Ãû¡¢µ®ÉúÈÕÆÚ¡¢ÁªÏµ·½Ê½¡¢¾ÍÕïÈÕÆÚÓëµØÖ·¡¢±£ÏÕ¹«Ë¾ÐÅÏ¢¡¢Õï¶ÏÃèÊöµÈ¡£¸Ã×é֯ѡȡ¡°Ë«³ÁÀÕË÷¡±Ä£Ê½£ºÆäÖÐ10ÍòÃû»¼ÕßµÄÊý¾Ý±»¹ÒÅÆÏúÊÛ £¬Ôü×Ò50Íò±Ê¼Í¼ÔòÓÚ7ÔÂ15ÈÕ±»Ãâ·Ñ¹«¿ªÖÁйÃÜÍøÕ¾ £¬½øÒ»²½À©´óÁËÊý¾Ý¶³ö·çÏÕ¡£Stormous×Ô2022ËêÊ×»îÔ¾ÒÔÀ´ £¬ÒÑÕë¶ÔÒ½ÁƱ£½¡¡¢¾Æµê¡¢¿Æ¼¼¡¢µ±¾ÖµÈÁìÓòµÄÖÁÉÙ150¸ö×éÖ¯·¢Æð¹¥»÷ £¬Êܺ¦Õß¼¯ÖÐÓÚÎ÷°àÑÀ¡¢ÃÀ¹ú¡¢°¢ÁªÇõ¡¢·¨¹úºÍ°ÍÎ÷¡£


https://securityaffairs.com/180057/data-breach/180057stormous-ransomware-gang-targets-north-country-healthcare-claims-600k-patient-data-stolen.html


5. BigONEÂòÂôËùÔâºÚ¿Í¹¥»÷ £¬2700ÍòÃÀÔª¼ÓÃÜÇ®±Ò±»µÁ


7ÔÂ16ÈÕ £¬¼ÓÃÜÇ®±ÒÂòÂôËùBigONE¼ì²âµ½Æ½Ì¨²¿ÃÅ×ʲú³öÏÖÒì³£¸Ä¹Û £¬¾­µ÷²éÈ·ÈÏϵÕë¶ÔÆäÈÈÇ®°üµÄµÚÈý·½¹¥»÷ËùÖ £¬ºÚ¿ÍÇÔÈ¡Á˼ÛÖµÔ¼2700ÍòÃÀÔªµÄ¸÷ÀàÊý×Ö×ʲú¡£BigONEËæ¼´°ä²¼²¼¸æ³Æ £¬Óû§Ë½Ô¿¼°Ó×ÎÒÊý¾ÝδÊÜÓ°Ïì £¬ËùÓÐËðʧ½«ÓÉÆ½Ì¨´¢Ðî½ðÈ«¶î³Ðµ£ £¬Óû§×ʲú²»»áÔâ·êÄÚÈÝÐÔËðʧ¡£Ä¿Ç° £¬Æ½Ì¨ÒÑÓ밲ȫ¹«Ë¾SlowMistºÏ×÷×·×Ù±»µÁ×ʽ𠣬²¢¼à¿ØÆäÔÚÇø¿éÁ´ÉϵÄÁ÷¶¯Çé¿ö £¬Í¬Ê±°ä·¢´æ¿îºÍÂòÂô·þÎñÒÑÆëÈ«¸´Ô­ £¬µ«ÌáÏÖ¼°OTCÖ°ÄÜÉÐδ³ÁÆô¡£Ö»¹Ü¹¥»÷²½ÖèÒѱ»½ÚÔì £¬µ«¾ßÌåÈëÇÖ¼¿Á©ÈÔδÃ÷È·¡£SlowMist³õ²½ÅжÏÕâ´ÎÊÂÎñΪ¹©¸øÁ´¹¥»÷ £¬¶øÇø¿éÁ´¹Û²ì»ú¹¹LookochainÔòÅû¶ £¬ºÚ¿ÍÒÑÆðÍ·Ï´Ç®²Ù×÷ £¬½«Ôß¿î¶Ò»»Îª120ö±ÈÌØ±Ò£¨BTC£©¡¢1272öÒÔÌ«±Ò£¨ETH£©¡¢2625öSolana£¨SOL£©¼°2330ÍòöTron£¨TRX£©¡£


https://www.bleepingcomputer.com/news/security/hacker-steals-27-million-in-bigone-exchange-crypto-breach/


6. Ïã¸Û½ðÈÚ»ú¹¹ÔâSquidLoader¶ñÒâÈí¼þ¹¥»÷


7ÔÂ16ÈÕ £¬°²È«×êÑÐÈËÔ±½üÈÕ·¢ÏÖ £¬Õë¶ÔÏã¸Û½ðÈÚ»ú¹¹µÄÐÂÐͶñÒâÈí¼þ¹¥»÷À˳¹ØýÔÚÊæÕ¹ £¬ÆäÖ÷ÌâΪ¾ß±¸¸ß¶È¶ã±ÜÄÜÁ¦µÄ¼ÓÔØÆ÷SquidLoader¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶à½×¶ÎϰȾÁ´²¿ÊðCobalt Strike Beacon £¬²¢Ñ¡È¡¶àÖÖÏȽø¿¹·ÖÎöÕ½Êõ £¬¶ÔÖ¸±ê»ú¹¹×é³ÉÑϳÁÍþв¡£¹¥»÷ʼÓÚÓã²æÊ½´¹µöÓʼþ¡£ÕâЩÒÔͨ³£»°×«Ð´µÄÓʼþ¼ÙÒâ½ðÈÚ»ú¹¹ £¬¸½´ø¼Ù×°³É·¢Æ±µÄÃÜÂë±£»¤RARѹËõ°ü¡£Óû§½âѹºó £¬»á·¢ÏÖÒ»¸ö¼Ù×°³ÉMicrosoft WordÎĵµµÄ¶ñÒâPE¶þ½øÔìÎļþ £¬ÆäÎļþÃû·ÂÕպϷ¨·¨Ê½¡°AMDRSServ.exe¡± £¬ÒÔ¼ÓÇ¿Éç»á¹¤³ÌºýŪÐÔ¡£Ò»µ©Ö´ÐÐ £¬SquidLoader±ãÆô¶¯¶à½×¶ÎϰȾÁ÷³Ì£ºÊ×ÏÈ×ÔÎÒ½â°üÒÔ½âÃÜÄÚ²¿¸ºÔØ £¬Ëæºóͨ¹ý»ìºÏ´úÂ붯̬½âÎö¹Ø¼üWindows API £¬²¢³õʼ»¯»ùÓÚ²Ö¿âµÄ×Ô½ç˵½á¹¹´æ´¢²Ù×÷Êý¾Ý¡£Îª¶ã±ÜɳÏä¡¢µ÷ÊÔÆ÷¼°·À²¡¶¾¹¤¾ß £¬¸Ã¶ñÒâÈí¼þÖ´Ðжà³Á¶ã±ÜÀý³Ì £¬Ô̺¬»·¾³²é³­¡¢×Ö·û´®»ìºÏ¡¢½ÚÔìÁ÷»ìºÏ¼°Å²ÓÃδ¹«¿ªµÄWindowsϵͳŲÓá£Èô¼ì²âµ½·ÖÎö¹¤¾ß»òµ÷ÊÔ¼£Ïó £¬Æä»áÁ¢¼´ÖÕÖ¹ÔËÐС£´Ë±í £¬SquidLoader»¹Ñ¡È¡ÑÓ³¤Ïß³Ì˯Ãß¡¢Òì²½¹ý³ÌŲÓõȼ¼ÊõÈÆ¹ý×Ô¶¯»¯É³Ï䡣ͨ¹ý²é³­ºó £¬¶ñÒâÈí¼þ»áͨ¹ý·ÂÕÕKubernetes·þÎñõè¾¶µÄURLÁªÏµC2·þÎñÆ÷ £¬ÍøÂç²¢´«ÊäÖ÷»úÊý¾Ý £¬×îÖմӴμ¶IPµØÖ·ÏÂÔØCobalt Strike Beacon¡£


https://www.infosecurity-magazine.com/news/squidloader-malware-targets-hong/