Allianz LifeÊý¾Ýй¶ÊÂÎñ¶³ö140Íò¿Í»§ÐÅÏ¢

°ä²¼¹¦·ò 2025-07-28

1. Allianz LifeÊý¾Ýй¶ÊÂÎñ¶³ö140Íò¿Í»§ÐÅÏ¢


7ÔÂ27ÈÕ £¬°²ÁªÈËÊÙ£¨Allianz Life£©È·ÈÏ7ÔÂ16ÈÕ²úÉúÁËһ·ÑϳÁµÄÊý¾Ýй¶ÊÂÎñ £¬µ¼ÖÂÆä140Íò¿Í»§ÖеĴóÎÞÊýÓ×ÎÒÐÅÏ¢Ô⵽¶³ö¡£Æ¾¾Ý¹«Ë¾½²»°È˵ÄÉêÃ÷ £¬Õâ´ÎÊÂÎñÊÇÓÉÓÚÍþвÐÐΪÕßͨ¹ýÉç»á¹¤³Ì¹¥»÷ÈëÇÖÁ˵ÚÈý·½»ùÓÚÔÆµÄ¿Í»§¹ØÏµÖÎÀí£¨CRM£©ÏµÍ³¡£¹¥»÷Õ߳ɹ¦»ñÈ¡ÁËÓë°²ÁªÈËÊÙ¿Í»§¡¢½ðÈÚרҵÈËÊ¿ÒÔ¼°²¿ÃÅÔ±¹¤ÓйصÄÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡£°²ÁªÈËÊÙѸËÙ²ÉÈ¡´ëÊ©¶ôÔì²¢»º½âÁËÕâÒ»ÊÂÎñ £¬²¢ÏòÃÀ¹úÁª¹úµ÷²é¾Ö£¨FBI£©»ã±¨Á˸ÃÊÂÎñ¡£¹«Ë¾Ç¿µ÷ £¬Ä¿Ç°Ã»ÓÐÖ¤¾ÝÅú×¢ÆäÄÚ²¿ÍøÂç»ò¹Ø¼üϵͳ£¨ÀýÈç±£µ¥ÖÎÀíϵͳ£©Ôâµ½½Ó¼û¡£È»¶ø £¬Óйص÷²éÈÔÔÚ½øÐÐÖÐ £¬ÊÜÓ°ÏìµÄÓ×ÎÒÒÑÆðÍ·ÊÕµ½Í¨Öª £¬Í¬Ê±¹«Ë¾ÌṩÁËרÃŵÄÖ§³Ö·þÎñ¡£°²ÁªÈËÊÙ»¹ÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»ÁËÓйØÕâ´ÎÊý¾Ýй¶µÄÎļþ¡£Ö»¹Ü¹«Ë¾Î´Ã÷È·Ö¸³ö±³ºóµÄÍþвÐÐΪÕß £¬µ«¾Ý±¨Â·³Æ £¬Õâ´Î¹¥»÷¿ÉÄÜÓë³ôÃûÔ¶ÑïµÄºÚ¿Í×éÖ¯ShinyHuntersÓйØ¡£ShinyHuntersÊÇÒ»¸ö»îÔ¾µÄºÚ¿ÍÍÅ»ï £¬ÔøÂÅ´ÎÔÚ°µÍøÉÏÏúÊÛ´Ó¶à¼Ò³ÛÃûÆóÒµÇÔÈ¡µÄÊý¾Ý¡£


https://securityaffairs.com/180445/data-breach/allianz-life-data-breach-exposed-the-data-of-most-of-its-1-4m-customers.html


2. Scattered SpiderÔÚ´ó¾Ù¹¥»÷VMware ESXi


7ÔÂ27ÈÕ £¬ÒÔ¾­¼ÃÀûÒæÎªµ¼ÏòµÄºÚ¿Í×éÖ¯Scattered Spider£¨±ðºÅUNC3944¡¢Octo Tempest£©½üÈÕÕë¶ÔÃÀ¹ú¼°Ó¢¹úÁãÊÛ¡¢º½¿Õ¡¢ÔËÊä¡¢±£ÏÕµÈÐÐÒµÆóÒµÌáÒé´ó¹æÄ£¹¥»÷ £¬Æä´´ÐÂÊÖ·¨Òý·¢°²È«½ç¹Ø×¢¡£¸Ã×éÖ¯ÞðÆú´«Í³·ì϶ÀûÓÃģʽ £¬×ª¶øÍ¨¹ý¾«ÃÜÉç»á¹¤³ÌѧսÊõ £¬Ö±½ÓÍ»ÆÆÆóÒµÐé¹¹»¯»·¾³·À»¤¡£¹¥»÷Á´³öÏÖÎå¸öÇ峺½×¶Î£ºÊ×ÏÈͨ¹ý¼ÙÒâÔ±¹¤ÕûµçIT·þÎñ̨ £¬ÓÕʹ¼¼ÊõÖ§³ÖÈËÔ±³ÁÖøßȨÏÞÕË»§ÃÜÂë £¬»ñÈ¡³õʼ½Ó¼ûȨÏÞ£»ËæºóɨÃèActive Directory¼°ÌØÈ¨½Ó¼ûÖÎÀí£¨PAM£©ÏµÍ³ £¬¾«×¼¶¨Î»ÓòÖÎÀíÔ±¡¢vSphereÖÎÀíÔ±µÈÖ÷ÌâÕË»§ÐÅÏ¢£»¼Ì¶øÍ¨¹ýÂŴμÙ×°ÌØÈ¨Óû§Öµç £¬×îÖÕ½ÚÔì¹Ø¼üÕ˺آɸÈëVMware vCenter Server Appliance£¨vCSA£© £¬¸Ã×é¼þÕÆ¹ÜÖÎÀíÔ̺¬ESXiÐé¹¹»úÖÎÀí·¨Ê½µÄvSphere»·¾³¡£»ñµÃvCSA½ÚÔìȨºó £¬¹¥»÷ÕßÖ´ÐÐÁ½Ïî¹Ø¼ü²Ù×÷£ºÆäһͨ¹ýÆôÓÃSSHÏνӲ¢³ÁÖÃESXiÖ÷»úrootÃÜÂë £¬³ÉÁ¢Óƾû¯½Ó¼ûͨ·£»Æä¶þÖ´Ðд´ÐµÄ"´ÅÅÌ»¥»»"¹¥»÷ £¬¹Ø¹ØÓò½ÚÔìÆ÷Ðé¹¹»úºó·ÖÀëÆäÐé¹¹´ÅÅÌ £¬½«Æä¹ÒÔØÖÁ¹¥»÷Õß½ÚÔìµÄÐé¹¹»úÒÔÇÔÈ¡Ô̺¬Óû§¹þÏ£ÖµµÄNTDS.ditÊý¾Ý¿â¡£×îÖÕ½×¶Î £¬¹¥»÷Õßͨ¹ýSSHͨ·²¿ÊðÀÕË÷Èí¼þ £¬¼ÓÃÜÊý¾Ý´æ´¢ÇøËùÓÐÐé¹¹»úÎļþ¡£


https://www.bleepingcomputer.com/news/security/scattered-spider-is-running-a-vmware-esxi-hacking-spree/


3. ³¬20ÍòWordPressÍøÕ¾Ãæ¶ÔPost SMTP²å¼þ·ì϶·çÏÕ


7ÔÂ26ÈÕ £¬Ò»ÏîÓ°Ï쳬¹ý20Íò¸öWordPressÍøÕ¾µÄÑϳÁ°²È«·ì϶½üÈÕ±»ÆØ¹â¡£¸Ã·ì϶´æÔÚÓÚ»îÔ¾×°ÖÃÁ¿³¬40ÍòµÄÈȵã²å¼þPost SMTPµÄ3.2.0¼°ÒÔϰ汾ÖÐ £¬±»×·×ÙΪCVE-2025-24000 £¬CVSSÆÀ·Ö´ï8.8¡£·ì϶Ö÷ÌâÔ´ÓÚ²å¼þREST API¶ËµãµÄ½Ó¼û½ÚÔì»úÔìȱµã £¬½öÑéÖ¤Óû§ÊÇ·ñµÇ¼ £¬¶øÎ´²é³­ÆäȨÏÞ¼¶±ð £¬µ¼ÖµÍȨÏÞÓû§£¨Èç¶©ÔÄÕߣ©¿É½Ó¼ûÔ̺¬ÆëÈ«ÓʼþÄÚÈݵÄÈÕÖ¾ £¬²¢´¥·¢ÖÎÀíÔ¹ØË»§ÃÜÂë³ÁÖÃÁ÷³Ì¡£¹¥»÷Õß¿Éͨ¹ýÀ¹½Ø³ÁÖÃÓʼþʵÏÖÕË»§ÊÕÊÜ £¬×îÖÕ½ÚÔìÕû¸öÍøÕ¾¡£¸Ã·ì϶Óɰ²È«×êÑÐÈËÔ±ÓÚ5ÔÂ23Èջ㱨ÖÁWordPress°²È«³§ÉÌPatchStack £¬²å¼þ¿ª·¢ÕßSaad IqbalѸËÙÏìÓ¦ £¬5ÔÂ26ÈÕÌá½»½¨¸´¹æ»®²¢Í¨¹ýÔÚ"get_logs_permission"º¯ÊýÖÐÔö³¤È¨ÏÞУÑé £¬È·±£½öÖÎÀíÔ±¿É½Ó¼ûÃô¸ÐAPI¡£½¨¸´°æ±¾3.3.0ÓÚ6ÔÂ11ÈÕ°ä²¼ £¬µ«WordPress.orgͳ¼ÆÊý¾ÝÏÔʾ £¬½ØÖÁµ±Ç°½ö48.5%Óû§ÊµÏÖÉý¼¶ £¬Òâζ×ÅÈÔÓг¬20Íò¸öÍøÕ¾Â¶³öÔÚ·çÏÕÖС£¸üÑϸñµÄÊÇ £¬24.2%£¨Ô¼9.68Íò¸ö£©Õ¾µãÈÔÔËÐдæÔÚÆäËûº¹Çà·ì϶µÄ2.x¾É°æ±¾ £¬°²È«¾ÖÊÆ²»ÈÝÀÖ¹Û¡£


https://www.bleepingcomputer.com/news/security/post-smtp-plugin-flaw-exposes-200k-wordpress-sites-to-hijacking-attacks/


4. ÑÇÂíÑ·AI±àÂë´úÀíÔâºÚ¿Í¹¥»÷ £¬×¢ÈëÊý¾Ý²Á³ýºÅÁî


7ÔÂ25ÈÕ £¬ÑÇÂíÑ·ÆìÏÂÌìÉúʽAI¿ª·¢¸±ÊÖAmazon QµÄVisual Studio CodeÀ©´ó½üÈÕÔâ·ê°²È«ÊÂÎñ £¬Òý·¢Òµ½ç¶Ô¿ªÔ´¹©¸øÁ´°²È«µÄ¹Ø×¢¡£Õâ¿îÕ¼Óнü°ÙÍò×°ÖÃÁ¿µÄÃâ·ÑÀ©´ó·¨Ê½ £¬Í¨¹ýÌìÉúʽAI¸¨Öú¿ª·¢Õß±àÂë¡¢µ÷ÊÔ¼°ÅäÖÃÖÎÀí £¬È´ÔÚGitHub´úÂëÍйÜÁ÷³ÌÖгöÏÖ·ì϶ £¬±»ºÚ¿ÍÖ²ÈëÊý¾Ý²Á³ý´úÂë¡£ÊÂÎñÔ´ÓÚ7ÔÂ13ÈÕ £¬ºÚ¿Í"lkmanka58"ͨ¹ýÀ­È¡ÒªÇóÏòAmazon QµÄGitHub²Ö¿âÌύδ¾­ÉóÅúµÄ´úÂë £¬×¢ÈëÔ̺¬"¶Ï¸ùϵͳÖÁ³ö³§×´Ì¬²¢É¾³ýÎļþϵͳ¼°ÔÆ×ÊÔ´"Ö¸ÁîµÄ¶ñÒâÌáÐÑ¡£ÓÉÓÚÏîĿȨÏÞÖÎÀíÊè©»ò¹¤×÷Á÷³ÌÅäÖÃÃýÎó £¬¸ÃÌá½»Òâ±í»ñµÃ´æ´¢¿â½Ó¼ûȨÏÞ £¬µ¼ÖÂÔ̺¬¶ñÒâ´úÂëµÄ1.84.0°æ±¾ÓÚ7ÔÂ17ÈÕÔÚVS CodeÊг¡°ä²¼¡£Ö»¹ÜÑÇÂíÑ·¹ýºóÐû³Æ´úÂëÌåʽÃýÎóδÏÖʵִÐÐ £¬ÇÒδÔì³ÉÄÚÈÝ·çÏÕ £¬µ«°²È«×êÑÐÈËÔ±ÈÔÖ¸³öÕâ¶³öÁËÑϳÁµÄ¹©¸øÁ´·çÏÕ £¬Èô´úÂë¾­¹ýÓÐЧ¼Ù×° £¬¿ÉÄÜÒý·¢´ó¹æÄ£Êý¾Ý·ÛËé¡£7ÔÂ23ÈÕ £¬ÑÇÂíѷͨ¹ý°²È«»ã±¨»ñϤ¸ÃÎÊÌâºó £¬Á¢¼´Æô¶¯È¡Ö¤µ÷²é¡£´ÎÈÕ¼´°ä²¼½¨¸´°æ±¾1.85.0 £¬³¹µ×ÒÆ³ý¶ñÒâ´úÂë²¢¸üÐÂÆ¾Ö¤¡£


https://www.bleepingcomputer.com/news/security/amazon-ai-coding-agent-hacked-to-inject-data-wiping-commands/


5. Ô¼»á°²È«ÀûÓÃTeaÔâºÚ¿ÍÈëÇÖ £¬7.2ÍòÓû§ÒþÖÔÕÕÆ¬Ð¹Â¶


7ÔÂ26ÈÕ £¬Ö÷´òÅ®ÐÔÓû§°²È«µÄÔ¼»áÆÀÂÛÀûÓÃTea½üÈÕÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ £¬³¬7.2ÍòÕÅÓû§ÕÕÆ¬±»ºÚ¿Í»ñÈ¡²¢´«²¼ £¬Òý·¢ÒþÖÔ°²È«ÕùÒé¡£Õâ¿îÔÊÐíÅ®ÐÔÄäÃûÆÀ¼ÛÔ¼»á¶ÔÏóµÄÀûÓ÷¨Ê½ÓÚ25ÈÕ°ä²¼ÉêÃ÷ £¬Ö¤ÊµÆäϵͳÔâÈëÇÖ £¬Ð¹Â¶Êý¾ÝÔ̺¬Á½ÀàÃô¸ÐͼÏñ£º1.3ÍòÕÅÓÃÓÚÕË»§ÑéÖ¤µÄ×ÔÅļ°Éí·ÝÖ¤¼þÕÕ £¬ÒÔ¼°5.9ÍòÕÅÀ´×ÔÓû§°ä²¼ÄÚÈÝ¡¢ÆÀÂÛºÍ˽ÐŵÄͼƬ¡£Ö»¹Ü¹«Ë¾Ç¿µ÷δй¶ÓÊÏ䵨ַ»òµç»°ºÅÂë £¬ÇÒÊÂÎñ½öÓ°Ïì2024Äê2ÔÂǰע²áµÄÓû§ £¬µ«Éí·ÝÖ¤¼þÓë˽ÃÜ»¥¶¯ÄÚÈݵͳöÈÔ×é³ÉÑϳÁÒþÖÔ·çÏÕ¡£ÊÂÎñÆØ¹âÔ´ÓÚ4chanÓû§·¢ÏÖ²¢´«²¼Á˶³öµÄÊý¾Ý¿â £¬ºÚ¿Íͨ¹ýδÃ÷È·×¢Ã÷µÄ·ì϶»ñÈ¡ÁË´æ´¢Óû§ÕÕÆ¬µÄºó¶Ü×ÊÔ´¡£Tea¹«Ë¾»ØÓ¦³ÆÒÑ´¹Î£ÀñƸµÚÈý·½ÍøÂ簲ȫÍŶÓ £¬24Ó×Ê±ÍÆ¶¯ÏµÍ³¼Ó¹Ì £¬²¢Ðû³Æ"ÒÑÖ´Ðжî±í°²È«´ëÊ©ÇÒ½¨¸´Êý¾ÝÎÊÌâ" £¬µ«Î´Ð¹Â©¾ßÌå¼¼Êõϸ½Ú¡£Ä¿Ç° £¬TeaÒѰ䲼½¨¸´°æ±¾²¢ºôÓõÓû§¸üС£


https://techcrunch.com/2025/07/26/dating-safety-app-tea-breached-exposing-72000-user-images/


6. Operation CargoTalonÕë¶Ô¶íÂÞ˹º½¿Õº½ÌìÁìÓòµÄÍøÂç¼äµý»î¶¯


7ÔÂ25ÈÕ £¬ÍøÂ簲ȫר¼ÒÅû¶ÁËÒ»ÏîÃûΪOperation CargoTalonµÄÍøÂç¼äµý»î¶¯ £¬¸Ã»î¶¯Õë¶Ô¶íÂÞ˹µÄº½¿Õº½ÌìÓë¹ú·À²¿ÃÅ £¬³ö¸ñÊÇÎÖÂÞÄùÈÕ·É»úÔì×÷Э»á(VASO)¡£×êÑÐÈËԱͨ¹ýµ÷²é·¢ÏÖ £¬¹¥»÷ÕßÀûÓüÙ×°³É¡°»õÎïÔËÊäµ¥¡±(TTN)ÎļþµÄ¶ñÒ⸽¼þ½øÐд¹µö¹¥»÷¡£ÕâЩÎļþ±í±íÉÏΪZIPѹËõ°ü £¬µ«ÏÖʵÉÏÔ̺¬¶ñÒâLNK¿ì½Ý·½Ê½ºÍDLLÖ²È뷨ʽ £¬×îÖÕ¿ªÊͲ¢Ö´ÐÐÃûΪEAGLETµÄ¶ñÒâÈí¼þ¡£EAGLETÊÇÒ»ÖÖ¶¨Ô컯µÄPEÎļþºóÃÅ·¨Ê½ £¬¾ß±¸ÌìÉúΨһGUID±êʶÊܺ¦Õß¡¢ÍøÂçϵͳÐÅÏ¢¡¢´´½¨°µ²ØÄ¿Â¼ÒÔ¼°Í¨¹ýHTTPÏνӺÅÁîÓë½ÚÔì(C2)·þÎñÆ÷µÄÖ°ÄÜ¡£ÆäÖ§³ÖÔ¶³ÌShell½Ó¼û¡¢ÎļþÏÂÔØºÍÊý¾ÝÇÔÈ¡ £¬²¢¿ÉÄÜͨ¹ýºÏ·¨Windows APIÖ´ÐÐÍøÂç²Ù×÷ÒÔʵÏÖÒñ±ÎͨѶ¡£¹¥»÷Á´´Ó´¹µöÓʼþÆðÍ· £¬¾­¹ý¶à½×¶ÎµÄϰȾ¹ý³Ì £¬×îÖÕʵÏÖÊý¾ÝÇÔÈ¡¹¤×÷¡£×êÑÐÈËÔ±ÒÔΪ £¬Õâ´Î»î¶¯ÓÉÒ»¸ö±»×·×ÙΪUNG0901µÄÍþв×éÖ¯ÌáÒé £¬ÇÒÓë´Ëǰ·¢ÏÖµÄHead MareÍþв¼¯Èº´æÔÚÖ°ÄܳÁµþºÍÕ½ÊõÀàËÆÐÔ¡£¶þÕß¾ùʹÓÃÀàËÆµÄµö¶ü¶¨Ãû¹æ¶¨ºÍºóÃŹ¤¾ß£¨ÀýÈçPhantomDL£© £¬Åú×¢ÕâЩ¹¥»÷Ðж¯¿ÉÄܹ²Ïí²¿ÃÅ×ÊÔ´»òÕ½Êõ¡£


https://securityaffairs.com/180378/intelligence/operation-cargotalon-targets-russias-aerospace-with-eaglet-malware.html