³ÛÃûÆû³µÆ·ÅÆÏµÍ³·ì϶Ö¿ͻ§Êý¾Ýй¶¼°³µÁ¾Ô¶³Ì½ÚÔì·çÏÕ

°ä²¼¹¦·ò 2025-08-13

1. ³ÛÃûÆû³µÆ·ÅÆÏµÍ³·ì϶Ö¿ͻ§Êý¾Ýй¶¼°³µÁ¾Ô¶³Ì½ÚÔì·çÏÕ


8ÔÂ11ÈÕ £¬½üÈÕ £¬ÔÚÃÀ¹úÕ¼Óг¬1000¼Ò¾­ÏúµêµÄijδ¹«¿ªÃû³ÆµÄ´óÐÍÆû³µÔì×÷É̱»ÆØ´æÔÚÑϳÁ°²È«·ì϶ £¬Æä¾­ÏúÉÌʹÓõÄÔÚÏßÃÅ»§ÍøÕ¾´æÔÚÉí·ÝÑé֤ȱµã £¬µ¼Ö¿ͻ§Êý¾Ýй¶¼°³µÁ¾Ô¶³Ì½ÚÔì·çÏÕ ¡£¸Ã·ì϶ÓɳÛÃû°²È«×êÑÐÔ±Eaton Zveare·¢ÏÖ²¢»ã±¨ £¬ÒÑÓÚ2025Äê2Ô½¨¸´ ¡£Zveareͨ¹ýÅú¸ÄÃÅ»§ÍøÕ¾´úÂë £¬³É¹¦ÈƹýµÇ¼°²È«»úÔì´´½¨ÁË"¹ú¶ÈÖÎÀíÔ±"ÕË»§ £¬´Ó¶ø»ñµÃ"ÎÞÏ޶ȽӼûȨÏÞ" ¡£¹¥»÷Õ߿ɽè´Ë»ñÈ¡ÊýǧÃû¿Í»§µÄ¸öÈËÐÅÏ¢ £¬Ô̺¬Ó×ÎÒÊý¾Ý¡¢²ÆÕþÐÅÏ¢¼°³µÁ¾¼ø±ðÂ루VIN£© ¡£¸üÑϸñµÄÊÇ £¬Í¨¹ýVIN»ò¿Í»§ÐÕÃû £¬ºÚ¿Í¿ÉÔ¶³Ì½ÚÔì³µÁ¾Ö°ÄÜ £¬Èç½âËø³µÃÅ £¬ÉõÖÁ´æÔÚ±»ÇÔÔôÀûÓõÄDZÔÚ·çÏÕ ¡£Ö»¹ÜZveareδ²âÊÔ³µÁ¾Æô¶¯Ö°ÄÜ £¬µ«·ì϶ÒÑ×ãÒÔ×é³É³Á´ó°²È«Òþ»¼ ¡£Õâ´ÎÊÂÎñ¶³öµÄϵͳȱµãÔ¶³¬¿Í»§Êý¾Ý²ãÃæ ¡£Æ¾½èÖÎÀíԱȨÏÞ £¬×êÑÐÈËÔ±»¹¿É²é¿´ËùÓо­ÏúÉ̵IJÆÕþÊý¾Ý £¬²¢ÊµÊ±×·×Ù×âÁÞ»ò´ú²½³µµÄµØÎ» ¡£ZveareÔÚDefcon°²È«»áÒéÑݳöʾ·ì϶ʱǿµ÷ £¬µ××ÓÎÊÌâÔ´ÓÚµ¥Ò»µÄÉí·ÝÑéÖ¤Éè¼ÆÈ±µã £¬"»ù´¡»·½Ú·¸´í»áµ¼ÖÂÕû¸öϵͳ±ÀÀ£" ¡£


https://hackread.com/carmaker-portal-flaw-hackers-unlock-cars-steal-data/


2. ºÉÀ¼¹Ø¼ü×éÖ¯ÔâCitrix NetScalerÁãÈÕ·ì϶¹¥»÷


8ÔÂ11ÈÕ £¬ºÉÀ¼¹ú¶ÈÍøÂ簲ȫÖÐÐÄ£¨NCSC£©½üÈÕ·¢³öÑϳÁÖÒ¸æ £¬Ö¸³öCitrix NetScalerÉ豸ÖдæÔÚµÄCVE-2025-6543·ì϶Òѱ»ÓÃÓÚÈëÇָùú¶à¸ö¹Ø¼ü×éÖ¯ £¬¹¥»÷ÕßÀûÓø÷ì϶ʵÏÖÁËÔ¶³Ì´úÂëÖ´Ðв¢¶Ï¸ùÈëÇÖºÛ¼£ £¬Ôì³É³Á´ó°²È«·çÏÕ ¡£¸Ã·ì϶ԴÓÚÄÚ´æÒç³öÃýÎó £¬¿Éµ¼ÖÂÊÜÓ°ÏìµÄNetScaler ADCºÍGatewayÉ豸³öÏÖ½ÚÔìÁ÷Òì³£»ò»Ø¾ø·þÎñ ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬¹¥»÷ÔçÓÚ²¹¶¡°ä²¼ £¬NCSC֤ʵ £¬ÖÁÉÙ×Ô5Ô³õÆð £¬¸Ã·ì϶±ã±»×÷ΪÁãÈÕ·ì϶ÀûÓà £¬½ÏCitrix 6ÔÂ25ÈÕ°ä²¼°²È«²¼¸æÌáǰ½üÁ½¸öÔ ¡£¹¥»÷ÕßÊÖ·¨ÏȽø £¬²»½öͨ¹ý·ì϶ʵÏÖÔ¶³Ì´úÂëÖ´ÐÐ £¬»¹¿ÌÒâ¶Ï¸ùÈëÇÖºÛ¼£ÒÔ¸²¸ÇÐÐΪ ¡£ºÉÀ¼¹«¹²¼ì²ì»ú¹Ø£¨OM£©Åû¶ £¬ÆäϵͳÒò¸Ã·ì϶Ôâ·êÑϳÁ·ÛËé £¬µ¼ÖÂÔËÓªÖжÏ £¬Ö±ÖÁÉÏÖܲÅÖ𲽸´Ô­µç×ÓÓʼþµÈÖ÷Ìâ·þÎñ ¡£NCSCÆÀ¹À £¬Õâ´Î¹¥»÷Õë¶Ô¶à¸ö³ÁÒª×éÖ¯ £¬Í¹ÏÔ·ì϶µÄÏÖʵ·çÏÕÐÔ ¡£ÎªÓ¦¶ÔÍþв £¬NCSCÇ¿µ÷±ØÐëÁ¢¼´Éý¼¶ÖÁÊÜÖ§³Ö°æ±¾ £¬²¢½¨Òé×°Öò¹¶¡ºóÖ´ÐÐÒÔϲÙ×÷£ºÍ¨¹ýºÅÁîÖÕÖ¹ËùÓл»á»° £¬¶Ï¸ùÓÆ¾Ã»á»° ¡£


https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/


3. ³¬2.9Íǫ̀佨²¹Exchange·þÎñÆ÷¶³ö¸ß·çÏÕ·ì϶


8ÔÂ11ÈÕ £¬½üÈÕ £¬³¬¹ý29,000̨佨²¹µÄMicrosoft Exchange·þÎñÆ÷Òò¸ßÑϳÁÐÔ·ì϶£¨CVE-2025-53786£©³ÖÐøÂ¶³öÓÚÍøÂç¹¥»÷·çÏÕÖÐ £¬¸Ã·ì϶¿ÉÄÜʹ¹¥»÷Õßͨ¹ýαÔìÁîÅÆ»òAPIŲÓÃÔÚÔÆ»·¾³ÖкáÏòÒÆ¶¯ £¬×îÖÕµ¼Ö»ìºÏÔÆ¼°±¾µØÓòµÄÆëÈ«ÈëÇÖ ¡£¾Ý°²È«Íþв¼à¿ØÆ½Ì¨Shadowserver 8ÔÂ10ÈÕɨÃèÁ˾Ö £¬È«ÇòÈÔÓÐ29,098̨佨²¹·þÎñÆ÷ £¬ÆäÖÐÃÀ¹ú£¨7,200Óą̀£©¡¢µÂ¹ú£¨6,700Óą̀£©¡¢¶íÂÞ˹£¨2,500Óą̀£©Îª³ÁÔÖÇø ¡£¸Ã·ì϶ӰÏìExchange Server 2016¡¢2019¼°¶©Ôİ棨»ìºÏÅäÖÃģʽ£© £¬ÆäµÀÀíÔÚÓÚÔÊÐíÒÑ»ñÈ¡±¾µØExchangeÖÎÀíȨÏÞµÄÍþвÐÐΪÕß £¬Í¨¹ý°Ñ³Ö¿ÉÐÅÁîÅÆ»òAPIŲÓÃÎÞºÛÌáÉýÔÆ»·¾³È¨ÏÞ £¬Î¢Èí½«ÆäÏóÕ÷Ϊ¡°¸ü¿ÉÄܱ»ÀûÓᱵĸßΣ·ì϶ ¡£Ö»¹ÜĿǰÉÐδ·¢ÏÖÏÖʵ¹¥»÷°¸Àý £¬µ«Î¢Èí4Ô°䲼µÄ½¨²¹·¨Ê½ÈÔδ±»¿í·ºÑ¡È¡ £¬µ¼Ö·çÏÕ³ÖÐøÀÛ»ý ¡£Õë¶ÔÕâÒ»Íþв £¬ÃÀ¹úÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Ñ¸ËÙÐж¯ £¬ÓÚ΢ÈíÅû¶·ì϶´ÎÈÕ°ä²¼´¹Î£Ö¸Áî25-02 £¬ÒªÇóËùÓÐÁª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÔÚÃÀ¹ú¶«²¿¹¦·òÖÜÒ»ÉÏÎç9µãǰʵÏÖ½¨¸´ ¡£


https://www.bleepingcomputer.com/news/security/over-29-000-exchange-servers-unpatched-against-high-severity-flaw/


4. Curly COMradesÍøÂç¼äµý×éÖ¯Õë¶Ô¶«Å·Ö¸±êÖ´ÐÐÐÂÐͶñÒâÈí¼þ¹¥»÷


8ÔÂ12ÈÕ £¬ÍøÂ簲ȫ¹«Ë¾Bitdefender½üÈÕÅû¶ £¬Ò»¸öÒÉËÆÖ§³Ö¶íÂÞ˹ÀûÒæµÄAPT×éÖ¯Curly COMrades×Ô2024ÄêÖÐÆÚÒÔÀ´ £¬Õë¶Ô¸ñ³¼ªÑǵ±¾Ö»ú¹¹¡¢Ë¾·¨²¿Ãż°Ä¦¶û¶àÍßÄÜÔ´¹«Ë¾·¢Õ¹ÍøÂç¼äµý»î¶¯ ¡£¸Ã×é֯ѡȡ×ÔÖ÷Ñз¢µÄÈý½×¶Î.NET¶ñÒâÈí¼þMucorAgent £¬Í¨¹ý¸´ÔӵĹ¥»÷Á´ÊµÏÖÓÆ¾Ã»¯ÉøÈë £¬Æä¼¼ÊõÌØµãÓëµØÔµÕþÖζ¯»úÒý·¢Òµ½ç¹Ø×¢ ¡£×êÑÐÏÔʾ £¬Curly COMradesµÄÖ÷Ì⹤¾ßMucorAgent±»Éè¼ÆÎªÒþÐκóÃÅ £¬¾ß±¸Ö´ÐÐAES¼ÓÃÜPowerShell¾ç±¾¡¢½«Á˾ֻش«C2·þÎñÆ÷µÄÄÜÁ¦ ¡£Æä¹¥»÷Á´Í¨¹ý½Ù³ÖWindows×é¼þ¶ÔÏóÄ£ÐÍ£¨COM£©¶ÔÏóʵÏÖ £¬²¢´óÁ¿ÒÀÀµcurl.exe½øÐÐÊý¾Ý±íйºÍͨѶ ¡£Ö»¹Üδ·¢ÏÖÓëÒÑÖª¶íÂÞ˹APT×éÖ¯µÄÖ±½Ó¹ØÁª £¬µ«¸Ã×éÖ¯¶Ô¶«Å·¹Ø¼ü»ù´¡ÉèÊ©µÄ¶¨Ïò¹¥»÷ £¬Óë¶íÂÞ˹Áª¹úµØÔµÕ½Êõ´æÔÚÏÔÖøÒ»ÖÂÐÔ ¡£¸Ã×éÖ¯µÄÓÆ¾Ã»¯»úÔìÆÄ¾ß´´ÐÂÐÔ£ºÍ¨¹ý½Ù³Ö.NET FrameworkµÄNGEN×é¼þ £¬½«¶ñÒâ´úÂëÖ²Èë¿´ËÆ²»»îÔ¾µÄ´òË㹤×÷ ¡£¹¥»÷Õß»¹²¿ÊðResocks¡¢×Ô½ç˵SOCKS5·þÎñÆ÷¼°SSH+Stunnel×éºÏ½øÐÐÁ÷Á¿»ìºÏ £¬ÉõÖÁͨ¹ýCurlCat¹¤¾ßÀûÓÃlibcurl¿âºÍÌØÊâBase64±àÂë £¬½«¶ñÒâÁ÷Á¿¼Ù×°³ÉºÏ·¨ÍøÕ¾Í¨Ñ¶ ¡£


https://www.bleepingcomputer.com/news/security/curly-comrades-cyberspies-hit-govt-orgs-with-custom-malware/


5. È«ÇòÈËÁ¦¾ÞÍ·ManpowerÔâRansomHubÀÕË÷¹¥»÷ £¬14.5ÍòÈËÊý¾Ýй¶


8ÔÂ12ÈÕ £¬È«ÇòÈËÁ¦×ÊÔ´·þÎñ¾ÞÍ·Manpower½üÈÕÅû¶һ·³Á´óÊý¾Ýй¶ÊÂÎñ £¬Ó°ÏìÁìÓò²¨¼°½ü14.5ÍòÃûÓ×ÎÒ ¡£Õâ´ÎÊÂÎñÔ´ÓÚ2024Äê12ÔÂ29ÈÕÖÁ2025Äê1ÔÂ12ÈÕÆÚ¼ä £¬Éí·Ý²»Ã÷µÄ¹¥»÷Õßδ¾­ÊÚȨÇÖÈëÆäϵͳ £¬¿ÉÄÜ»ñÈ¡ÁËÔ̺¬Éç»á°²È«ºÅÂë¡¢µØÖ·¡¢ÁªÏµÐÅÏ¢¡¢»¤ÕÕɨÃè¼þµÈÃô¸ÐÊý¾ÝµÄÎļþ ¡£×÷ΪÍò±¦Ê¢»ª¼¯ÍÅ£¨ManpowerGroup£©ÆìÏÂ×Ó¹«Ë¾ £¬ManpowerÔÚÈ«ÇòÕ¼Óг¬¹ý2700¸ö´¦Ê´¦ £¬·þÎñ³¬10Íò¼Ò¿Í»§ £¬2024ÄêÓªÊÕ´ï179ÒÚÃÀÔª ¡£ÊÂÎñ¶³öÔ´ÓÚ2025Äê1ÔÂ20ÈÕ £¬¸Ã¹«Ë¾À¼ÐÁ°ì¹«ÊÒITϵͳÖжÏÒý·¢µ÷²é ¡£Ëæºó £¬ManpowerÈ·ÈϹ¥»÷ÕßÔÚ´ËÆÚ¼ä³ÖÐø½Ó¼ûÆäÍøÂç £¬²¢ÓÚ7ÔÂ28ÈÕÆðÍ·ÏòÊÜÓ°Ïì¸ö±ð·¢³ö֪ͨ ¡£ÎªÓ¦¶ÔΣ»ú £¬¸Ã¹«Ë¾ÒÑÇ¿»¯IT°²È«´ëÊ© £¬ÓëÁª¹úµ÷²é¾Ö£¨FBI£©ºÏ×÷²é¾¿¹¥»÷Õß £¬²¢Í¨¹ýEquifaxΪÊܺ¦ÕßÌṩÃâ·ÑÐÅÓþ¼à¿Ø¼°Éí·Ý͵ÇÔ±£»¤·þÎñ ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬ÀÕË÷Èí¼þ×éÖ¯RansomHub¹«¿ªÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü £¬Ðû³ÆÇÔȡԼ500GBÊý¾Ý £¬Ô̺¬¿Í»§Êý¾Ý¿â¡¢²ÆÕþ±¨±í¡¢ÈËÁ¦×ÊÔ´·ÖÎö¡¢»úÃܺÏÒ»ÖÂÖ÷Ìâ×ÊÁÏ ¡£Ö»¹ÜManpowerδÃ÷È·ÈÏ¿ÉÖ§¸¶Êê½ð £¬µ«RansomHubÒÑ´ÓÆä°µÍøÐ¹ÃÜÕ¾µãÒÆ³ýÓйØÌõ¿î £¬°µÊ¾¿ÉÄÜ´æÔÚÊê½ðÂòÂô ¡£


https://www.bleepingcomputer.com/news/security/manpower-staffing-agency-discloses-data-breach-after-attack-claimed-by-ransomhub/


6. ºÚ¿ÍÏ®»÷ºÉÀ¼³¢ÊÔÊÒ £¬ÇÔÈ¡50ÍòÃû»¼ÕßÊý¾Ý


8ÔÂ12ÈÕ £¬ºÉÀ¼½üÈÕ²úÉúһ·³Á´óÊý¾Ýй¶ÊÂÎñ £¬Ó°Ï쳬¹ý48.5ÍòÃû¹¬¾±°©É¸²é´òËã²Î¼ÓÕß ¡£¾ÝºÉÀ¼È˶¡É¸²éЭ»á£¨BDO£©´«µÝ £¬7ÔÂ3ÈÕÖÁ6ÈÕÆÚ¼ä £¬Î»ÓÚÀ³Ë¹Î¤¿ËµÄEurofins Scientific×Ó¹«Ë¾ÁÙ´²Õï¶Ï³¢ÊÔÊÒNMDLÔâ²»Ã÷ÍþвÐÐΪÕßÈëÇÖ £¬µ¼Ö²μÓÕßÐÕÃû¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢¹«Ãñ·þÎñºÅÂ루BSN£©¡¢¼ì²âÁ˾ּ°Ò½ÁÆÌṩÕßÐÅÏ¢µÈÃô¸ÐÊý¾Ý±»µÁ £¬ÉÙÊýÊܺ¦Õßµç×ÓÓʼþºÍµç»°ºÅÂëÒà±»ÇÔÈ¡ ¡£Ö»¹Ü³¢ÊÔÊÒÔÚ8ÔÂ6ÈÕ²ÅÏòµ±¾Ö»ã±¨ £¬µ«BDOÒÑÔÝÍ£Æä·þÎñ²¢Æô¶¯¶ÀÁ¢IT°²È«µ÷²é £¬Í¬Ê±Ç¿µ÷ÆäËû³¢ÊÔÊÒ½«ÊÕÊÜɸ²éÁ˾ִ¦Öà £¬È·±£¹«Ãñ³ÖÐø²Î¼ÓÏîÄ¿ ¡£Õâ´ÎÊÂÎñ¶³ö³öµÚÈý·½·þÎñ»ú¹¹µÄ°²È«·ì϶ ¡£±¾µØ±¨Â·Ö¸³öºÚ¿Í¿ÉÄÜÇÔÈ¡ÁË´ÓǰÈýÄêʹÓøó¢ÊÔÊ񵀮äËû»¼ÕßÊý¾Ý £¬×ÜÁ¿´ï300GB £¬ÏÖʵӰÏìÁìÓò»òÔ¶³¬³õ²½Í³¼Æ ¡£Ä¿Ç° £¬ºÉÀ¼µ±¾ÖÕýÖðһ֪ͨÊܺ¦Õß £¬BDOÒàÖÒ¸æÆä¿ÉÄÜÃæ¶ÔÉí·Ý͵ÇÔ»òڲƭ·çÏÕ ¡£


https://www.infosecurity-magazine.com/news/hackers-raid-dutch-lab-steal-data/