ÃÀ¹úÁª°î˾·¨»ú¹¹È·ÈÏÍøÂç¹¥»÷£¬£¬£¬£¬£¬Ãô¸Ð°¸¼þÎļþÇå¾²ÔâÍþв
Ðû²¼Ê±¼ä 2025-08-121. ÃÀ¹úÁª°î˾·¨»ú¹¹È·ÈÏÍøÂç¹¥»÷£¬£¬£¬£¬£¬Ãô¸Ð°¸¼þÎļþÇå¾²ÔâÍþв
8ÔÂ8ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÁª°î˾·¨»ú¹¹¿ËÈÕ֤ʵ£¬£¬£¬£¬£¬ÆäÓÃÓÚÖÎÀíÉñÃØ·¨Í¥ÎļþµÄµç×Ó°¸¼þÖÎÀíϵͳÕýÔâÓöÖØ´óÇÒÒ»Á¬µÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬²¢ÒѽÓÄÉÌØÊâÇå¾²²½·¥ÔöÇ¿·À»¤¡£¡£¡£¡£¡£´Ë´ÎÊܹ¥»÷µÄϵͳ°üÀ¨Áª°î·¨ÔºÎļþÖÎÀíµÄ½¹µãƽ̨CM/ECF£¨°¸¼þÖÎÀí/µç×Ó°¸¼þµµ°¸ÏµÍ³£©ºÍPACER£¨¹«¹²»á¼û·¨Ôºµç×Ӽͼϵͳ£©£¬£¬£¬£¬£¬ºóÕß×÷ΪÁª°î˾·¨Îļþ¹ûÕæÓë´æ´¢µÄÖ§Öù£¬£¬£¬£¬£¬ÆäÇå¾²ÐÔÖ±½Ó¹Øºõ´ó×ÚËßËϵ±ÊÂÈ˵ÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£Ö»¹Ü˾·¨»ú¹¹ÉùÃ÷δֱ½ÓÈ·ÈÏPolitico±¨µÀÖÐÌáµ½µÄ¡°ÉñÃØÏßÈËÉí·Ýй¶¡±µÈÏêϸָ¿Ø£¬£¬£¬£¬£¬µ«ÆäÔÚͨ¸æÖÐÇ¿µ÷£¬£¬£¬£¬£¬²¿·ÖÃÜ·âÎļþÒò°üÀ¨Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬ÏÖÒÑͨ¹ý¸üÑÏ¿áµÄ»á¼û¿ØÖÆÊÖÒÕÔöÇ¿±£»£»£»£»£»£»¤£¬£¬£¬£¬£¬Ö¼ÔÚ×è¶ÏºÚ¿Í¹¥»÷·¾¶¡£¡£¡£¡£¡£Ë¾·¨²¿·ÖͬʱÌåÏÖ£¬£¬£¬£¬£¬ÕýÓÅÏÈÓë¸÷¼¶·¨ÔºÐ×÷£¬£¬£¬£¬£¬ÒÔ¼õÇá¹¥»÷¶ÔËßËϵ±ÊÂÈË¿ÉÄÜÔì³ÉµÄÓ°Ï죬£¬£¬£¬£¬²¢Ò»Á¬Éý¼¶ÏµÍ³Çå¾²ÐÔÒÔÌá·ÀδÀ´Íþв¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚ2025Äê7Ô³õ£¬£¬£¬£¬£¬Ë¾·¨»ú¹¹Í¨¹ýÄäÃûÐÂÎÅÔ´»ñϤ¹¥»÷ÑÏÖØÐԺ󣬣¬£¬£¬£¬ÓÚ7ÔÂ4ÈÕÆô¶¯ÄÚ²¿ÊӲ첢¼ò±¨Ïà¹ØÇéÐΣ¬£¬£¬£¬£¬µ«Î´Á¬Ã¦¹ûÕæÉùÃ÷¡£¡£¡£¡£¡£Ö±ÖÁPolitico±¨µÀÅû¶¡°Ãô¸ÐÐÅϢй¶ӰÏì¶àÁª°îµØÇø¡±ºó£¬£¬£¬£¬£¬Ë¾·¨»ú¹¹²ÅÐû²¼Í¨¸æ»ØÓ¦£¬£¬£¬£¬£¬µ«Î´Ïêϸ˵Ã÷¹¥»÷ȪԴ»òÏêϸËðʧ¹æÄ£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/us-judiciary-confirms-breach-of-court-electronic-records-service/
2. °Í»ù˹̹ʯÓÍÓÐÏÞ¹«Ë¾£¨PPL£©ÀÖ³É×èÖ¹ÀÕË÷Èí¼þ¹¥»÷
8ÔÂ8ÈÕ£¬£¬£¬£¬£¬°Í»ù˹̹ʯÓÍÓÐÏÞ¹«Ë¾£¨PPL£©ÓÚ2025Äê8ÔÂ6ÈÕÔâÓöÒ»ÆðÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬Æä²¿·ÖIT»ù´¡ÉèÊ©Êܵ½Ó°Ï죬£¬£¬£¬£¬µ«¹«Ë¾Í¨¹ý¿ìËÙÏìÓ¦ºÍ¶à²ãÍøÂçÇå¾²²½·¥ÀֳɿØÖÆÁËÊÂÎñ£¬£¬£¬£¬£¬½¹µãÔËӪϵͳ¼°Ãô¸ÐÊý¾ÝδÔâй¶¡£¡£¡£¡£¡£PPLÔÚÏò°Í»ù˹̹֤ȯÉúÒâËù£¨PSX£©Ìá½»µÄ֪ͨÖÐÅû¶£¬£¬£¬£¬£¬ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬¹«Ë¾Á¬Ã¦Æô¶¯ÄÚ²¿ÍøÂçÇå¾²ÐÒ飬£¬£¬£¬£¬ITÍŶÓÓëÍⲿר¼ÒÐͬ½ÓÄÉ×èÖ¹²½·¥£¬£¬£¬£¬£¬°üÀ¨ÔÝÍ£²¿·Ö·ÇÒªº¦ITЧÀÍÒÔÏÞÖÆÇ±ÔÚÓ°Ï죬£¬£¬£¬£¬È·±£ÏµÍ³ÍêÕûÐÔ¡£¡£¡£¡£¡£¹«Ë¾ÉùÃ÷Ç¿µ÷£¬£¬£¬£¬£¬Æä¶à²ãÍøÂçÇå¾²¿ò¼ÜÓÐÓøôÀëÁËÍþв£¬£¬£¬£¬£¬Î´·¢Ã÷Òªº¦ÓªÒµÊý¾Ý»òÃô¸ÐÐÅÏ¢±»Ð¹Â¶£¬£¬£¬£¬£¬½¹µãÔËӪϵͳ¼á³ÖÕý³£ÔËÐУ¬£¬£¬£¬£¬Î´·ºÆðÖÐÖ¹¡£¡£¡£¡£¡£Ö»¹ÜÊÕµ½ÍⲿְԱµÄÀÕË÷֪ͨ£¬£¬£¬£¬£¬PPLÃ÷È·ÌåÏÖδÓëºÚ¿Í½¨ÉèÁªÏµ£¬£¬£¬£¬£¬²¢ÒÑÒÀ¾ÝÖ´·¨ÒªÇó½«ÊÂÎñÉϱ¨ÖÁÏà¹ØÖ´·¨¼°î¿Ïµ»ú¹¹£¬£¬£¬£¬£¬ÏÖÔÚÕýÅäºÏ¿ªÕ¹ÊӲ졣¡£¡£¡£¡£Îª°ü¹Ü½ðÈÚÉúÒâÇå¾²£¬£¬£¬£¬£¬¹«Ë¾ÔÚɨÃèʱ´úÔÝͣϵͳÉúÒ⹦Ч£¬£¬£¬£¬£¬¸ÄÓÃÊÖ¶¯·½·¨Íê³É¸¶¿îÁ÷³Ì£¬£¬£¬£¬£¬×èֹΣº¦À©É¢¡£¡£¡£¡£¡£
https://www.brecorder.com/news/amp/40376980
3. ³¯ÏʺڿÍ×éÖ¯ScarCruftÊ״ΰ²ÅÅÀÕË÷Èí¼þ
8ÔÂ8ÈÕ£¬£¬£¬£¬£¬º«¹úÇå¾²¹«Ë¾S2W¿ËÈÕÅû¶£¬£¬£¬£¬£¬Ó볯ÏÊÕþ¸®¹ØÁªµÄºÚ¿Í×éÖ¯ScarCruft£¨APT37£©ÔÚ½üÆÚÍøÂç¹¥»÷ÖÐÊ×´ÎʹÓÃÁËÐÂÐÍÀÕË÷Èí¼þ£¬£¬£¬£¬£¬±ê¼Ç×ÅÆäÐж¯Ä¿µÄ¿ÉÄܴӹŰåÌØ¹¤»î¶¯×ªÏò¾¼ÃÀûÒæÇý¶¯¡£¡£¡£¡£¡£¸Ã×éÖ¯ºã¾ÃÒÔº«¹ú¡¢ÈÕ±¾¡¢Ô½ÄϵȹúµÄ¸ß¼ÛֵСÎÒ˽¼Ò¼°Õþ¸®»ú¹¹Îª¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬µ«´Ë´ÎÐж¯ÖУ¬£¬£¬£¬£¬Æäͨ¹ýÓã²æÊ½´¹ÂÚÓʼþͶµÝº¬¶ñÒâѹËõ°üµÄÓÕ¶üÎļþ£¬£¬£¬£¬£¬ÀÖ³ÉÈëÇÖϵͳ²¢°²ÅÅÁËÃûΪ¡°VCD¡±µÄÀÕË÷Èí¼þ¡£¡£¡£¡£¡£VCDÀÕË÷Èí¼þ»á¶Ô¼ÓÃÜÎļþÌí¼Ó¡°.vcd¡±À©Õ¹Ãû£¬£¬£¬£¬£¬²¢ÌìÉúÓ¢ÎÄÓ뺫ÎÄË«°æ±¾ÀÕË÷֪ͨ£¬£¬£¬£¬£¬ÒªÇóÊܺ¦ÕßÖ§¸¶Êê½ð¡£¡£¡£¡£¡£S2WÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬ÕâÒ»ÐÐΪÌåÏÖScarCruft¿ÉÄÜÍØÕ¹Á˰üÀ¨ÆÆËðÐÔ¼°ÀÕË÷Õ½ÂÔµÄÔËӪĿµÄ£¬£¬£¬£¬£¬»òÊÔͼͨ¹ý¾¼ÃÊÖ¶ÎΪÊÜÖÆ²ÃÕþȨ³ï¼¯×ʽ𡣡£¡£¡£¡£Ñо¿»¹Ê¶±ð³ö¹¥»÷ÖÐʹÓõÄÁè¼Ý9Àà¶ñÒâÈí¼þ£¬£¬£¬£¬£¬°üÀ¨ÐÅÏ¢ÇÔÈ¡¹¤¾ßLightPeek¡¢¿ÉÂ¼ÖÆÒôƵ¼°¼Í¼»÷¼üµÄFadeStealer£¬£¬£¬£¬£¬ÒÔ¼°Ê¹ÓÃÕýµ±ÊµÊ±Í¨Ñ¶Æ½Ì¨PubNub¾ÙÐÐÒþ²ØÏÂÁî¿ØÖÆ£¨C2£©Í¨Ñ¶µÄºóÃųÌÐòNubSpy¡£¡£¡£¡£¡£Í¨¹ý½«¶ñÒâÁ÷Á¿Î±×°³ÉÕý³£ÍøÂçͨѶ£¬£¬£¬£¬£¬¹¥»÷ÕßÓÐÓÃÒþ²ØÁËÐÐ×Ù¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±»¹éÒòÓÚScarCruftÏÂÊôС×éChinopuNK£¬£¬£¬£¬£¬¸ÃС×éÔøÈö²¥Ö§³ÖWindows/Android˫ƽ̨¹¥»÷µÄChinotto¶ñÒâÈí¼þ£¬£¬£¬£¬£¬²¢ÔÚ±¾´ÎÐж¯ÖÐʹÓÃÁËбäÖÖChillyChino¡£¡£¡£¡£¡£
https://therecord.media/scarcruft-north-korea-hackers-add-ransomware
4. ¹È¸èÐÞ¸´GeminiÈÕÀúÔ¼ÇëÎó²î
8ÔÂ10ÈÕ£¬£¬£¬£¬£¬¹È¸è¿ËÈÕÐÞ¸´ÁËÒ»Ïî¸ßΣÎó²î£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷Õßͨ¹ýÈ«ÐÄÖÆ×÷µÄGoogleÈÕÀúÔ¼Ç룬£¬£¬£¬£¬Ô¶³Ì½ÓÊÜÓû§×°±¸ÉÏÔËÐеÄGeminiÊðÀí²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÎÞÐèÓû§×Ô¶¯µã»÷¶ñÒâÁ´½Ó»òÏÂÔØÎļþ£¬£¬£¬£¬£¬½öÐèÒ»Ñùƽ³£ÓëGeminiÖúÊÖ»¥¶¯¼´¿É´¥·¢£¬£¬£¬£¬£¬¶ÔÒÀÀµ¸ÃЧÀ͵ÄÓû§×é³ÉÏÔÖøÍþв¡£¡£¡£¡£¡£Gemini×÷Ϊ¹È¸è¼¯³ÉÔÚAndroid¡¢GoogleÍøÂçЧÀͼ°WorkspaceÓ¦ÓÃÖеĴóÐÍÓïÑÔÄ£×Ó£¨LLM£©ÖúÊÖ£¬£¬£¬£¬£¬¿É»á¼ûGmail¡¢ÈÕÀúºÍGoogle HomeµÈ½¹µã¹¦Ð§¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËͰüÀ¨Ç¶ÈëʽÌáÐÑ×¢ÈëµÄÈÕÀúÔ¼Ç룬£¬£¬£¬£¬¿ÉʹÓÃGeminiµÄ¿ç¹¤¾ßȨÏÞÖ´ÐжñÒâ²Ù×÷¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬£¬µ±Óû§Ñ¯ÎÊ¡°½ñÈÕÈÕÀúÊÂÎñ¡±Ê±£¬£¬£¬£¬£¬Gemini»á´ÓÈÕÀúÖÐÌáÈ¡ËùÓÐÊÂÎñ£¬£¬£¬£¬£¬°üÀ¨¹¥»÷ÕßÖ²ÈëµÄ¶ñÒâÎÊÌâ¡£¡£¡£¡£¡£ÕâЩÒþ²ØÖ¸Áî¿ÉÆÈʹGeminiÇÔÈ¡µç×ÓÓʼþÄÚÈÝ¡¢¸ú×ÙÓû§Î»Öá¢Í¨¹ýGoogle Home¿ØÖÆÖÇÄܼҾÓ×°±¸¡¢ÔÚAndroid×°±¸ÉÏ·¿ªÓ¦ÓóÌÐò£¬£¬£¬£¬£¬ÉõÖÁ´¥·¢ZoomÊÓÆµÍ¨»°¡£¡£¡£¡£¡£¹È¸èÇå¾²ÍŶÓÈ·ÈÏÎó²îºóѸËÙÐÞ¸´£¬£¬£¬£¬£¬²¢Ç¿µ÷Æäͨ¹ýºì¶ÓÑÝÁ·ºÍ¿çÐÐÒµÐ×÷Ò»Á¬Ç¿»¯·ÀÓù¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-calendar-invites-let-researchers-hijack-gemini-to-leak-user-data/
5. ConnexÐÅÓÃÏàÖúÉçÔâÊý¾Ýй¶£¬£¬£¬£¬£¬7Íò»áÔ±ÐÅÏ¢±»ÇÔ
8ÔÂ11ÈÕ£¬£¬£¬£¬£¬¿µÄùµÒ¸ñÖÝ×î´óµÄ·ÇÓªÀûÐÔÐÅÓÃÏàÖúÉçÖ®Ò»Connex¿ËÈÕÅû¶£¬£¬£¬£¬£¬ÆäϵͳÔÚ2025Äê6Ô³õÔâÓöδ֪¹¥»÷ÕßÈëÇÖ£¬£¬£¬£¬£¬µ¼Ö´ó×Ú»áԱСÎÒ˽¼Ò¼°²ÆÎñÐÅϢй¶¡£¡£¡£¡£¡£ÊÂÎñʱ¼äÏßÏÔʾ£¬£¬£¬£¬£¬¹¥»÷ÕßÓÚ6ÔÂ2ÈÕÖÁ3ÈÕʱ´ú²»·¨»á¼û²¢ÏÂÔØÁ˲¿·ÖÎļþ£¬£¬£¬£¬£¬ConnexÔÚ6ÔÂ3ÈÕ¼ì²âµ½Òì³££¬£¬£¬£¬£¬²¢ÓÚ7ÔÂ27ÈÕÈ·ÈÏÐ¹Â¶Éæ¼°ÐÕÃû¡¢Õ˺š¢½è¼Ç¿¨ÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¼°Õþ¸®Éí·ÝÖ¤µÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬µ«Î´·¢Ã÷×ʽð»òÕË»§±»Ö±½ÓÇÔÈ¡µÄÖ¤¾Ý¡£¡£¡£¡£¡£×÷ΪӦ¶Ô²½·¥£¬£¬£¬£¬£¬ConnexÒÑͨ¹ýÃÀ¹úÓÊÕþÏòÊÜÓ°Ïì»áÔ±·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬²¢ÔÚ¹ÙÍøÐû²¼Õ©Æ¾¯±¨£¬£¬£¬£¬£¬ÌáÐÑ»áԱСÐÄÕ©Æ·Ö×Óð³äÆäÔ±¹¤ÊµÑéÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¾¯±¨Ã÷È·Ö¸³ö£¬£¬£¬£¬£¬Connex¾ø²»»áͨ¹ýµç»°»ò¶ÌÐÅË÷Òª»áÔ±µÄPINÂë¡¢ÃÜÂë»òÕ˺ţ¬£¬£¬£¬£¬ºôÓõÊÕµ½¿ÉÒÉÁªÏµÊ±Á¬Ã¦¹Ò¶Ï²¢²¦´ò¹Ù·½µç»°ºËʵ¡£¡£¡£¡£¡£Ö»¹ÜConnexδÌá¼°´Ë´Îй¶ÊÇ·ñÓëÀÕË÷ÍÅ»ïÖ±½ÓÏà¹Ø£¬£¬£¬£¬£¬µ«ÆäÐû²¼µÄÕ©ÆÔ¤¾¯ÌåÏÖ¹¥»÷Õß¿ÉÄÜʹÓñ»µÁÐÅÏ¢½øÒ»²½ÊµÑ龫׼´¹ÂÚ£¬£¬£¬£¬£¬¼Ó¾ç»áԱΣº¦¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/connex-credit-union-discloses-data-breach-impacting-172-000-people/
6. ³¯ÏʺڿÍ×éÖ¯KimsukyÔâÆ·µÂºÚ¿Í·´ÖÆ£¬£¬£¬£¬£¬8.9GBÉñÃØÊý¾Ýй¶
8ÔÂ11ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬³¯ÏÊÕþ¸®Åä¾°µÄºÚ¿Í×éÖ¯KimsukyÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Á½Ãû×Ô³Æ"Saber"ºÍ"cyb0rg"µÄÆ·µÂºÚ¿ÍÒÔ×èµ²ÕþÖβÙŪΪÓÉ£¬£¬£¬£¬£¬½«ÆäÇÔÈ¡µÄÉñÃØÊý¾Ý¹ûÕæÖÁÍøÂç¡£¡£¡£¡£¡£´Ë´ÎÐж¯ÔÚDEF CON 33ºÚ¿Í´ó»áʱ´úͨ¹ý´«ÆæºÚ¿ÍÔÓÖ¾PhrackµÚ72ÆÚÆØ¹â£¬£¬£¬£¬£¬Òý·¢È«ÇòÍøÂçÇå¾²½ç¹Ø×¢¡£¡£¡£¡£¡£¾ÝÅû¶£¬£¬£¬£¬£¬Ð¹Â¶µÄ8.9GBÊý¾Ý°üÀ¨Kimsuky×éÖ¯¶à¸ö½¹µã×ʲú£ºº¸Çº«¹ú¹ú·À·´Ç鱨˾Á£¨dcc.mil.kr£©µÈÕþ¸®»ú¹¹¡¢Ö÷Á÷ÓÊÏäЧÀÍÉÌ£¨naver/daum/kakao£©µÄÍøÂç´¹ÂÚÈÕÖ¾£¬£¬£¬£¬£¬ÒÔ¼°º«ÍâÑó½»²¿µç×ÓÓʼþƽ̨"Kebi"µÄÍêÕûÔ´´úÂë¡£¡£¡£¡£¡£ÊÖÒÕÎĵµÏÔʾ£¬£¬£¬£¬£¬¸Ã×é֯ʹÓö¨ÖÆ»¯PHP¹¤¾ß°ü¹¹½¨¾ß±¸¼ì²â¹æ±Ü¹¦Ð§µÄ´¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬²¢Å䱸ʵʱ¸üеĴ¹ÂÚ¹¤¾ß°ü¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬×ª´¢ÎļþÖл¹°üÀ¨Î´±»VirusTotal±ê¼ÇµÄδ֪¶þ½øÖÆÎļþºÍCobalt Strike¼ÓÔØÆ÷µÈ¸ß¼¶¹¥»÷¹¤¾ß¡£¡£¡£¡£¡£Çå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬KimsukyµÄ»ù´¡ÉèÊ©±£´æÏÔÖøÌØÕ÷£ºÆä³ÉԱƵÈÔʹÓÃGoogle·Òë´¦Öóͷ£ÖÐÎĹýʧÐÅÏ¢£¬£¬£¬£¬£¬»á¼ų̂Íå¾üÕþÍøÕ¾£¬£¬£¬£¬£¬²¢Í¨¹ýPureVPNµÈЧÀÍÉ̹ºÖÃVPNЧÀÍ¡£¡£¡£¡£¡£BashÀúÊ·¼Í¼ÏÔʾ£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔøÍ¨¹ýSSHÅþÁ¬ÄÚ²¿ÏµÍ³£¬£¬£¬£¬£¬²¢¹ØÁª¶à¸ö¿ÉÒÉGitHubÕ˺źͺڿÍÂÛ̳¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/north-korean-kimsuky-hackers-exposed-in-alleged-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ