CISA½«D-Link·ÓÉÆ÷¸ßΣÎó²îÄÉÈëÒÑÖª±»Ê¹ÓÃĿ¼

Ðû²¼Ê±¼ä 2025-08-07

1. CISA½«D-Link·ÓÉÆ÷¸ßΣÎó²îÄÉÈëÒÑÖª±»Ê¹ÓÃĿ¼


8ÔÂ6ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½«Ó°ÏìD-Link·ÓÉÆ÷µÄÈý¸ö¾ÉÇå¾²Îó²îÁÐÈëÆä¡°ÒÑÖª±»Ê¹ÓÃÎó²î¡±£¨KEV£©Ä¿Â¼£¬£¬£¬£¬Ôµ¹ÊÔ­ÓÉÊÇÕâЩÎó²îÔÚÒ°Íâ±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£´Ë´ÎÄÉÈëµÄÎó²îÉæ¼°D-Link¶à¿î×°±¸£¬£¬£¬£¬°üÀ¨DCS-2530L¡¢DCS-2670LºÍDNR-322LÐͺţ¬£¬£¬£¬CVSSÆÀ·Ö¾ù´ï7.5ÖÁ8.8µÄ¸ßΣ¼¶±ð¡£¡£¡£¡£¡£¡£Ïêϸ¶øÑÔ£¬£¬£¬£¬CVE-2020-25078£¨CVSS 7.5£©¿ÉÄܵ¼ÖÂÔ¶³ÌÖÎÀíÔ±ÃÜÂëй¶ £»£»£»£»CVE-2020-25079£¨CVSS 8.8£©Îª¾­ÓÉÉí·ÝÑéÖ¤µÄÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬ÍþвÕ߿ɽè´ËÔÚ×°±¸ÉÏÖ´ÐвÙ×÷ϵͳ¼¶ÏÂÁî £»£»£»£»CVE-2020-40799£¨CVSS 8.8£©ÔòÒòȱ·¦´úÂëÍêÕûÐÔ¼ì²é£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÈÆ¹ýÑéÖ¤Ö±½ÓÖ²Èë¶ñÒâÖ¸Áî¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬DNR-322L×°±¸×Ô2021Äê11ÔÂÆðÒÑ¿¢ÊÂÉúÃüÖÜÆÚ£¨EoL£©£¬£¬£¬£¬³§ÉÌδÌṩ²¹¶¡£¡£¡£¡£¡£¡£¬£¬£¬£¬CISA½¨ÒéÈÔÔÚʹÓøÃÐͺŵÄÓû§Á¬Ã¦Í£Óò¢Ìæ»»×°±¸¡£¡£¡£¡£¡£¡£ÆäÓàÁ½¿î×°±¸µÄÎó²îÒÑÓÚ2020ÄêÐû²¼ÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£¡£CISAÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÔÚ2025Äê8ÔÂ26ÈÕǰÍê³É»º½â²½·¥£¬£¬£¬£¬°üÀ¨¸üÐÂ×°±¸¡¢¸ôÀëÊÜÓ°Ïìϵͳ»òÌæ»»Í£²úÐͺÅ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html


2. CandiruÌØ¹¤Èí¼þ½èлù´¡ÉèÊ©»îԾȫÇò


8ÔÂ6ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿»ú¹¹Recorded FutureÆìÏÂInsiktС×é¿ËÈÕÐû²¼±¨¸æ£¬£¬£¬£¬½ÒÆÆÒÔÉ«ÁÐÌØ¹¤Èí¼þÖÆÔìÉÌCandiruͨ¹ýÉý¼¶ºóµÄ»ù´¡ÉèÊ©£¬£¬£¬£¬Ò»Á¬Ê¹ÓÃÆäWindows¶ñÒâÈí¼þ¡°DevilsTongue¡±¿ªÕ¹È«Çò¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£Ñо¿Ê¶±ð³öÓë¸ÃÌØ¹¤Èí¼þ¹ØÁªµÄ°Ë¸ö²Ù×÷¼¯Èº£¬£¬£¬£¬ÆäÖÐÎå¸öÈÔ´¦Óڸ߶ȻîԾ״̬£¬£¬£¬£¬Éæ¼°ÐÙÑÀÀû¡¢É³Ìذ¢À­²®¼°Ó¡ÄáµÈ¹ú£¬£¬£¬£¬ÁíÁ½¸öÓë°¢Èû°Ý½®Ïà¹ØµÄ¼¯Èº×´Ì¬²»Ã÷¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬CandiruµÄлù´¡ÉèÊ©°üÀ¨ÃæÏòÊܺ¦ÕߵݲÅÅ¿ØÖÆ×é¼þ¼°Ìع¤Èí¼þ²Ù×÷ÕßʹÓõĸ߲ã¼Ü¹¹£¬£¬£¬£¬²¿·Ö¼¯ÈºÖ±½ÓÖÎÀí¹¥»÷ǰ¶Ë£¬£¬£¬£¬ÆäÓàÔòͨ¹ýÖÐÐIJã»òTor°µÍø¾ÙÐÐÒþ²Ø²Ù¿Ø¡£¡£¡£¡£¡£¡£¡°DevilsTongue¡±×÷Ϊ΢ÈíÃüÃûµÄWindowsÌØ¹¤Èí¼þ£¬£¬£¬£¬ÆäÈö²¥Í¾¾¶°üÀ¨Óã²æÊ½ÍøÂç´¹ÂÚÁ´½Ó¡¢Ë®¿Ó¹¥»÷¡¢ÖÐÐÄÈ˹¥»÷¼°ÎïÀí½Ó´¥×°±¸µÈ·½·¨£¬£¬£¬£¬µ«ÍêÕû°²ÅÅÊÖ·¨ÉÐδÍêÈ«¹ûÕæ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬CandiruÔÚ2021Äê±»ÃÀ¹úÉÌÎñ²¿ÁÐÈ롰ʵÌåÇåµ¥¡±ºó£¬£¬£¬£¬Æä×ʲúÓÚ2025Äê4Ô±»ÃÀ¹úͶ×ʹ«Ë¾¡°³ÏÐÅͬ°é»ù½ð¡±£¨Integrity Partners£©ÒÔ3000ÍòÃÀÔªÊÕ¹º£¬£¬£¬£¬²¢×ªÒÆÖÁн¨ÉèµÄÒÔÉ«ÁÐ˽ӪʵÌå¡°Integrity Labs Ltd¡±¡£¡£¡£¡£¡£¡£ÆÊÎöÒÔΪ£¬£¬£¬£¬´Ë´ÎÖØ×éÖ¼ÔÚ¹æ±ÜÃÀ¹úÖÆ²ÃÏÞÖÆ¡£¡£¡£¡£¡£¡£


https://therecord.media/candiru-spyware-active-infrastructure-hungary-saudi-arabia


3. ¿â¿Ëά¶ûÒ½ÁÆÖÐÐÄÔâRhysidaÀÕË÷¹¥»÷


8ÔÂ5ÈÕ£¬£¬£¬£¬ÃÀ¹úÌïÄÉÎ÷ÖÝ¿â¿Ëά¶ûµØÇøÒ½ÁÆÖÐÐÄ£¨CRMC£©×Ô2025Äê7ÔÂ13ÈÕÔâÓöRhysidaÀÕË÷Èí¼þ¹¥»÷ÒÔÀ´£¬£¬£¬£¬ÈÔÔÚÈ«Á¦»Ö¸´ÏµÍ³²¢Ó¦¶ÔÊý¾Ýй¶Σº¦¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹ÎªÌïÄÉÎ÷ÖÝÉÏ¿²²®À¼µØÇø¼°¿ÏËþ»ùÖÝÔ¼25ÍòÃû»¼ÕßÌṩЧÀÍ£¬£¬£¬£¬ÓµÓÐ2500ÓàÃûÔ±¹¤ºÍ40Óà¸öÒ½ÁÆ×¨¿Æ£¬£¬£¬£¬´Ë´Î¹¥»÷µ¼ÖÂÆäÅÌËã»úϵͳ̱»¾£¬£¬£¬£¬²¿·ÖЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£CRMCÔÚ·¢Ã÷¡°Òì³£ÊÖÒջ¡±ºóÁ¬Ã¦Æô¶¯Ó¦¼±ÏìÓ¦£¬£¬£¬£¬ÆäÐÅÏ¢Çå¾²ÍŶÓÓëÍⲿר¼Ò¼°Áª°îÖ´·¨²¿·ÖÏàÖúÊӲ졣¡£¡£¡£¡£¡£Ö»¹ÜÒ½ÔºÉù³Æ»¼ÕßÕչ˻¤Ê¿Î´ÊܸùÌìÐÔÓ°Ï죬£¬£¬£¬µ«ÏÖʵÔËÓªÖÐÈÔ·ºÆðX¹â¼ì²éЧ¹ûÑÓ³Ù¡¢ÃÅÕïÔ¤Ô¼×÷·Ï¼°ÊÖÊõ°²ÅÅÎÊÌ⣬£¬£¬£¬Òý·¢»¼Õß¶ÔÏàͬЧÂÊµÄÆ·ÆÀ¡£¡£¡£¡£¡£¡£Ò½ÔºÔÊÐí½«ÔÚÈ·ÈÏÊý¾Ýй¶ºó֪ͨÊÜÓ°Ï컼Õߣ¬£¬£¬£¬²¢Ç¿µ÷¡°»¼ÕßÐÅÏ¢Òþ˽ÊÇÖ÷ҪʹÃü¡±¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÓÉÇ×¶íÂÞ˹µÄRhysidaÍÅ»ïʵÑ飬£¬£¬£¬¸Ã×éÖ¯ÓÚ8ÔÂ2ÈÕ½«CRMCÁÐÈë°µÍøÐ¹ÃÜÍøÕ¾£¬£¬£¬£¬ÒªÇóÆäÔÚËÄÌìÄÚÖ§¸¶Î´¹ûÕæÊê½ð£¬£¬£¬£¬²»È»½«ÒÔ10±ÈÌØ±Ò£¨Ô¼115ÍòÃÀÔª£©³öÊÛ±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£Ð¹Â¶Ñù±¾ÏÔʾ£¬£¬£¬£¬Êý¾Ý°üÀ¨»¼ÕßÒ½ÁƵµ°¸¡¢Ô±¹¤Ë°ÎñÎļþ¼°¼ÝÕÕÐÅÏ¢£¬£¬£¬£¬²¿·ÖÎļþ¿É×·ËÝÖÁ2018Äê¡£¡£¡£¡£¡£¡£


https://cybernews.com/news/tennessee-cookeville-regional-medical-center-rhysidia-ransomware-attack/


4. ÍþÄá˹ӰϷ½ÚÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬¶àÃû¼ÓÈëÕßÊý¾Ý±»Ð¹Â¶


8ÔÂ6ÈÕ£¬£¬£¬£¬È«ÇòÀúÊ·×îÓÆ¾ÃµÄÍþÄá˹¹ú¼ÊÓ°Ï·½ÚÈÕǰȷÈϱ¬·¢ÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Òý·¢¹ú¼ÊÓ°ÊÓÐÐÒµ¶ÔÍøÂçÇå¾²µÄ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¡£¾Ý¡¶ºÃÀ³Î뱨µÀ¡·Åû¶£¬£¬£¬£¬´Ë´Î¹¥»÷±¬·¢ÓÚ2025Äê7ÔÂ7ÈÕ£¬£¬£¬£¬ÕýÖµµÚ82½ìÍþÄá˹¹ú¼ÊÓ°Ï·½Ú×¼±¸Òªº¦ÆÚ¡£¡£¡£¡£¡£¡£ºÚ¿Íͨ¹ýδ¾­ÊÚȨµÄϵͳÈëÇÖ£¬£¬£¬£¬Àֳɸ´ÖƲ¢ÇÔÈ¡ÁËÓ°Ï·½ÚЧÀÍÆ÷´æ´¢µÄÃô¸ÐÎļþ£¬£¬£¬£¬µ¼Ö°üÀ¨Ã½Ìå¼ÇÕß¡¢ÐÐÒµ´ÓÒµÕßµÈÔÚÄڵļÓÈëÕßСÎÒ˽¼ÒÐÅÏ¢Íâй¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº­¸Ç¶àÏî½¹µãСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬Ïêϸ°üÀ¨ÐÕÃûÈ«³Æ¡¢µç×ÓÓÊÏ䵨µã¡¢ÁªÏµµç»°ºÅÂ롢˰ÎñʶÓÖÃû¼°ÊµÌåÓʼĵصãµÈÎåÀàÒªº¦Êý¾Ý¡£¡£¡£¡£¡£¡£Ö»¹ÜÖ÷Àí·½Ç¿µ÷"±»µÁÊý¾ÝÁ¿½ÏС"£¬£¬£¬£¬µ«É漰˰ºÅµÈ¸ß¶ÈÃô¸ÐµÄ²ÆÎñÐÅÏ¢£¬£¬£¬£¬ÈÔ¿ÉÄܶÔÊÜÓ°ÏìÖ°Ô±Ôì³ÉDZÔÚΣº¦¡£¡£¡£¡£¡£¡£ÊÂÎñÆØ¹âÔ´ÓÚ¡¶ºÃÀ³Î뱨µÀ¡·¼ÇÕßÊÕµ½Ó°Ï·½Ú¹Ù·½·¢³öµÄй¶֪ͨº¯£¬£¬£¬£¬¸Ãº²ÔýÊ×´ÎÏòÍâ½ç֤ʵÁËÍøÂçÇ徲ʹʵı£´æ¡£¡£¡£¡£¡£¡£ÃæÁÙÍ»·¢Î £»£»£»£»ú£¬£¬£¬£¬Ó°Ï·½ÚÊÖÒÕÍŶÓѸËÙÆô¶¯Ó¦¼±ÏìÓ¦»úÖÆ¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬ÏµÍ³»Ö¸´ÊÂÇéÒÑ»ù±¾Íê³É£¬£¬£¬£¬µ«ÉÐδÐû²¼ÏêϸÊÜÓ°ÏìÈËÊý¼°Êý¾Ýй¶¹æÄ£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/venice-film-festival-hack/


5. ·¨º½ÓëºÉº½ÔâÓöµÚÈý·½Êý¾Ýй¶£¬£¬£¬£¬¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢ÃæÁÙÇ徲Σº¦


8ÔÂ6ÈÕ£¬£¬£¬£¬·¨¹úº½¿Õ£¨Air France£©ÓëºÉÀ¼»Ê¼Òº½¿Õ£¨KLM Royal Dutch Airlines£©¿ËÈÕÈ·Èϱ¬·¢µÚÈý·½Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ó°ÏìÆä²¿·Ö¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£×÷ΪŷÖÞº½¿ÕÒµÖ÷Òª¼ÓÈëÕߣ¬£¬£¬£¬Á½¼ÒͬÊô·¨º½-ºÉº½¿Ø¹É¹«Ë¾µÄº½¿Õ¾Þͷͨ¹ýй¶֪ͨÏòÊÜÓ°Ïì¿Í»§Åû¶ÁËÊÂÎñϸ½Ú¡£¡£¡£¡£¡£¡£¾ÝºÉÀ¼¿Æ¼¼Ã½ÌåTweakers.com»ñÈ¡µÄ֪ͨÏÔʾ£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÈëÇÖµÚÈý·½Ð§ÀÍÌṩÉ̵Äϵͳ»ñÈ¡Á˺ɺ½¿Í»§Êý¾Ý¡£¡£¡£¡£¡£¡£·¨º½ÓëºÉº½ÏÖÔÚÕýÁªºÏÊÓ²ì¸÷×ÔÊý¾ÝÔâ²»·¨»á¼ûµÄÏêϸÇéÐΡ£¡£¡£¡£¡£¡£ºÉº½ÔÚÉùÃ÷ÖÐÖ¸³ö£¬£¬£¬£¬Æä¿Í·þÖÐÐÄʹÓõĵÚÈý·½Æ½Ì¨¼ì²âµ½Òì³ £»£»£»£»î¶¯ºó£¬£¬£¬£¬ITÇå¾²ÍŶÓÁ¬Ã¦ÓëÏà¹ØµÚÈý·½ÏµÍ³Ð­×÷ʵÑé¾ÀÕý²½·¥ÒÔÖÕÖ¹ÊÂÎñ¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾ÝÉæ¼°¿Í»§¶àÏîСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÐÕÊÏ¡¢Ãû×Ö¡¢ÁªÏµ·½·¨¡¢"À¶Ì캽ÐÐ"£¨Flying Blue Miles£©ÖÒ³ÏÍýÏë»áÔ±ºÅ¼°Æ·¼¶¡¢Ð§ÀÍÇëÇóÓʼþÖ÷ÌâÐС£¡£¡£¡£¡£¡£µ«»¤ÕÕºÅÂë¡¢Ö§¸¶¿¨ÏêϸÐÅÏ¢¡¢ÕË»§ÃÜÂë¼°Àï³ÌÓà¶îδÔڴ˴ι¥»÷ÖÐй¶¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜʹÓûñÈ¡µÄÐÅϢʵÑéÉí·ÝµÁÓ㬣¬£¬£¬ÀýÈ翪ÉèڲƭÕË»§£¬£¬£¬£¬»òͨ¹ýÉç»á¹¤³Ì¹¥»÷ð³äº½¿Õ¹«Ë¾´ú±í¾ÙÐо«×¼Õ©Æ­¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/air-france-klm-customer-data-breach/


6. ·ðÂÞÀï´ïÊý¾Ý¹«Ë¾IMDataCenterÔâÓöÖØ´óй¶


8ÔÂ6ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ô±½ÜÀïÂõÑÇ¡¤¸£ÀÕ¿ËÈÕ·¢Ã÷£¬£¬£¬£¬ÃÀ¹ú·ðÂÞÀï´ïÖÝÊý¾Ý½â¾ö¼Æ»®ÌṩÉÌIMDataCenterÒòÊý¾Ý¿â¹ýʧÉèÖÃÒý·¢ÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ì»Â¶Á˺£Á¿Ãô¸ÐÓû§ÐÅÏ¢¡£¡£¡£¡£¡£¡£´Ë´Îй¶ԴÓÚÒ»¸öδÉèÃÜÂë± £»£»£»£»¤»ò¼ÓÃܵĹûÕæÊý¾Ý¿â£¬£¬£¬£¬°üÀ¨10,820ÌõCSVºÍPDFÃûÌõļͼ£¬£¬£¬£¬×ÜÊý¾ÝÁ¿´ï38GB£¬£¬£¬£¬º­¸ÇÐÕÃû¡¢ÏÖʵµØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬¸üÉæ¼°ÉúÑÄ·½·¨¡¢ºâÓî»ò³µÁ¾ËùÓÐȨµÈÉî¶ÈÒþ˽Êý¾Ý¡£¡£¡£¡£¡£¡£IMDataCenterµÄÓªÒµÁýÕÖÒ½ÁÆ¡¢°ü¹Ü¡¢ÕþÖÎÔ˶¯µÈ¶à¸öÐÐÒµ£¬£¬£¬£¬ÆäÊý¾Ý¿âÉù³Æ´æ´¢³¬2.6ÒÚСÎÒ˽¼Ò¼°6ÒÚµç×ÓÓʼþµØµãµÄÏêϸÐÅÏ¢£¬£¬£¬£¬±¾ÓÃÓÚ¾«×¼ÓªÏú¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬´Ë´ÎÉèÖÃʧÎóʹÕâЩ¸ß¼ÛÖµÊý¾Ý̻¶ÓÚ¹ûÕæÍøÂ磬£¬£¬£¬³ÉÎªÍøÂç·¸·¨µÄDZÔÚ¹¤¾ß¡£¡£¡£¡£¡£¡£¸£ÀÕÖ¸³ö£¬£¬£¬£¬Òòµ¥¸öCSVÎļþ¼´º¬ÊýǧÌõ¼Í¼£¬£¬£¬£¬ÏÖʵÊÜÓ°ÏìÈËÊý»òÔ¶³¬Íâòͳ¼Æ¡£¡£¡£¡£¡£¡£IMDataCenterËäѸËÙÏÂÏßÊý¾Ý¿â²¢»ØÓ¦¡°¸ß¶ÈÖØÊÓÊý¾ÝÇå¾²¡±£¬£¬£¬£¬µ«ºóÐøÉú³¤¸üÎªÖØ´ó¡£¡£¡£¡£¡£¡£2025Äê7Ô£¬£¬£¬£¬ºÚ¿ÍÂÛ̳Óû§ThinkingOneÉù³ÆÒÑÌáǰ»á¼û¸Ã¹«Ë¾µÄAWS´æ´¢Í°£¬£¬£¬£¬ÏÂÔØÁ˰üÀ¨2000ÍòΨһÓÊÏä¡¢3700Íòµç»°ºÅÂ룬£¬£¬£¬ÒÔ¼°³¬5Íò¸öÉç±£ºÅÂë¡¢³öÉúÈÕÆÚµÈÃô¸ÐÊý¾ÝµÄÎļþ¡£¡£¡£¡£¡£¡£


https://hackread.com/hacker-accesses-imdatacenter-records-exposed-aws-bucket/