ºÚ¿Í×éÖ¯ÈëÇÖÒÁÀʺ½ÔËϵͳÖÂ60ÓàËÒ´¬Ö»Í¨Ñ¶Ì±»¾
Ðû²¼Ê±¼ä 2025-08-261. ºÚ¿Í×éÖ¯ÈëÇÖÒÁÀʺ½ÔËϵͳÖÂ60ÓàËÒ´¬Ö»Í¨Ñ¶Ì±»¾
8ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬Ò»¸ö×Ô³Æ"Lip-Dochtjan"£¨ÓÖ³Æ"The Sewn Lips"£©µÄºÚ¿Í×éÖ¯ÏòÒÁÀʹú¼ÊýÌåÐû³Æ£¬£¬£¬£¬£¬£¬ÒÑÀÖ³ÉÈëÇÖÒÁÀʹú¼ÒÓÍÂÖ¹«Ë¾£¨NITC£©ÓëÒÁÀʺ½Ô˹«Ë¾£¨IRISL£©µÄ½¹µãϵͳ£¬£¬£¬£¬£¬£¬µ¼ÖÂ60ÓàËÒ´¬Ö»Í¨Ñ¶ÖÐÖ¹¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ͨ¹ýÒÁÀʿعɹ«Ë¾FannavaµÄÎÀÐÇÍ¨Ñ¶ÍøÂçʵÑ飬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÈÏÕæÎªÒÁÀʺ£ÉÏÔËÊäÌṩÎÀÐÇÊý¾Ý´«Êä¡¢´æ´¢¼°Ö§¸¶Ð§ÀÍ¡£¡£¡£¡£¡£¡£¾ÝºÚ¿Í×éÖ¯Åû¶£¬£¬£¬£¬£¬£¬Æäͨ¹ýÉøÍ¸Fannavaϵͳ£¬£¬£¬£¬£¬£¬Ö±½ÓÇÖÈë´¬Ö»ÎÀÐÇÖն˵Ľ¹µãLinux²Ù×÷ϵͳ£¬£¬£¬£¬£¬£¬ÀֳɽûÓÃÈÏÕæÒÁÀʺ£ÉÏͨѶµÄרÓóÌÐòFalcon£¬£¬£¬£¬£¬£¬Ôì³É39ËÒÓÍÂÖÓë25ËÒ»õ´¬ÎÞ·¨Óë¿Ú°¶¾ÙÐÐÐÅÏ¢½»»¥¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷¶ÔÒÁÀʺ½ÔËϵͳÔì³ÉË«ÖØ¹¥»÷£ºÊ×ÏÈ£¬£¬£¬£¬£¬£¬´¬Ö»Óë½µØÖ¸»ÓÖÐÐĵÄʵʱͨѶÖÐÖ¹£¬£¬£¬£¬£¬£¬µ¼Öº½Ðе÷Àí¡¢»õÎïÇ幨µÈÒªº¦»·½ÚÏÝÈëÕϰ£»£»£»£»Æä´Î£¬£¬£¬£¬£¬£¬ÎÀÐÇϵͳ±»¿ØÊ¹µÃ´¬Ö»¶¨Î»Êý¾Ý¡¢»õÎïÇåµ¥µÈÃô¸ÐÐÅÏ¢ÃæÁÙй¶Σº¦¡£¡£¡£¡£¡£¡£Ö»¹ÜÒÁÀʹٷ½ÉÐδ¶ÔÊÂÎñϸ½Ú×÷³ö»ØÓ¦£¬£¬£¬£¬£¬£¬µ«ºÚ¿Í×é֯ѡÔñͨ¹ýýÌå¹ûÕæ¹¥»÷ÊÂʵ£¬£¬£¬£¬£¬£¬ÌåÏÖÆä¾ß±¸Ò»Á¬ÍþвÄÜÁ¦¡£¡£¡£¡£¡£¡£
https://www.marineinsight.com/shipping-news/major-cyberattack-disrupts-communication-on-dozens-of-iranian-ships/
2. AspireÎÀÉúϵͳÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬14Íò»¼ÕßÃô¸ÐÊý¾Ýй¶
8ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÃÜЪ¸ùÖÝÅ©´åÎÀÉúϵͳAspireÔâÓöÍøÂç·¸·¨·Ö×Óºã¾ÃÉøÍ¸£¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý13.8ÍòÃû»¼ÕßµÄÃô¸ÐÊý¾Ý±»ÇÔÈ¡¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ò»Á¬ÊýÔÂδ±»·¢Ã÷£¬£¬£¬£¬£¬£¬³ÉΪ½üÄêÀ´Ó°Ïì¹æÄ£½Ï¹ãµÄÒ½ÁÆÁìÓòÊý¾Ýй¶ÊÂÎñÖ®Ò»¡£¡£¡£¡£¡£¡£Æ¾Ö¤AspireÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄ±¨¸æ£¬£¬£¬£¬£¬£¬¹¥»÷Õß»ñÈ¡µÄÐÅÏ¢º¸ÇСÎÒ˽¼ÒÉí·Ý¡¢²ÆÎñÐÅÏ¢¼°Ò½ÁÆ¿µ½¡Êý¾ÝÈý´óÀ࣬£¬£¬£¬£¬£¬Ïêϸ°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢½ðÈÚÕË»§ÏêÇé¡¢Ö§¸¶¿¨ºÅ¼°PINÂë¡¢Ò½ÁÆÕï¶Ï¼Í¼¡¢´¦·½ÐÅÏ¢¡¢°ü¹ÜÊý¾Ý¡¢ÉúÎïʶ±ð±êʶ·û¡¢¼ÝÕÕ¼°»¤ÕÕºÅÂëµÈ16Ïî¸ßÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬²¿·Ö»¼ÕßÊý¾Ý×éºÏÍêÕû¶È¼«¸ß£¬£¬£¬£¬£¬£¬ÀíÂÛÉϿɹ¹½¨³ö°üÀ¨Éí·Ý¡¢²ÆÎñÓëÒ½ÁÆÐÅÏ¢µÄ"ȫά¶ÈÊý×Ö»Ïñ"¡£¡£¡£¡£¡£¡£AspireÔÚÊÂÎñת´ïÖÐÇ¿µ÷£¬£¬£¬£¬£¬£¬ÏÖÔÚÉÐÎÞÃ÷È·Ö¤¾ÝÏÔʾÊý¾ÝÒѱ»ÏÖʵÀÄÓ㬣¬£¬£¬£¬£¬µ«Îª½µµÍDZÔÚÓ°Ï죬£¬£¬£¬£¬£¬ÒÑÆô¶¯µ÷½â²½·¥£ºÎªËùÓÐÊÜÓ°Ï컼ÕßÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÉí·Ý±£»£»£»£»¤¼°ÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬°üÀ¨ÊµÊ±ÐÅÓñ¨¸æ¼à²â¡¢Éí·Ý͵ÇÔ»Ö¸´Ö§³Ö¼°100ÍòÃÀÔª°ü¹ÜÅ⸶°ü¹Ü¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/michigan-aspire-health-system-data-breach/
3. »ùÓÚMiraiµÄGayfemboy½©Ê¬ÍøÂç¾íÍÁÖØÀ´
8ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬Gayfemboy½©Ê¬ÍøÂç×Ô2024Äê2ÔÂÊ×´ÎÏÖÉíÒÔÀ´£¬£¬£¬£¬£¬£¬ÒÑÑݱäΪ¸ß¶ÈÖØ´ó»¯µÄÎïÁªÍøÍþв£¬£¬£¬£¬£¬£¬Æä¹¥»÷¹æÄ£ÁýÕÖ°ÍÎ÷¡¢Ä«Î÷¸ç¡¢ÃÀ¹ú¡¢µÂ¹úµÈ8¸ö¹ú¼Ò£¬£¬£¬£¬£¬£¬Ä¿µÄÉæ¼°ÖÆÔìÒµ¡¢¿Æ¼¼Òµ¡¢ÐÞ½¨ÒµµÈÒªº¦ÐÐÒµ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÒÔMirai±äÖÖΪ»ù´¡£¬£¬£¬£¬£¬£¬Í¨¹ý¼¯³ÉN-dayÓë0-dayÎó²î¡¢TelnetÈõƾ֤±¬ÆÆ¼°¶à½×¶Î»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬¹¹½¨Æð¾ß±¸×ÔÎÒ³¤ÆÚ»¯¡¢É³ºÐ¹æ±ÜºÍ¾ºÕùÐÔɨ³ýÄÜÁ¦µÄ¹¥»÷ϵͳ¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬GayfemboyµÄÎó²îʹÓÃÕ½ÂÔ·ºÆðÏÔÖø½ø»¯¡£¡£¡£¡£¡£¡£2024Äê11Ô£¬£¬£¬£¬£¬£¬Æäͨ¹ýFour-Faith¹¤ÒµÂ·ÓÉÆ÷£¨CVE-2024-12856£©¡¢Neterbit·ÓÉÆ÷¼°VimarÖÇÄܼҾÓ×°±¸µÄÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬ÖðÈÕ»îÔ¾½ÚµãÍ»ÆÆ1.5Íò¸ö£»£»£»£»ÖÁ2025Äê7Ô£¬£¬£¬£¬£¬£¬¹¥»÷ÔØºÉÒÑÀ©Õ¹ÖÁ»ªË¶¡¢Vivo¡¢ZyxelºÍRealtekµÈ×°±¸£¬£¬£¬£¬£¬£¬²¢¼¯³ÉXMRigÍÚ¿óÄ£¿£¿£¿£¿£¿é¡£¡£¡£¡£¡£¡£GayfemboyÕ¹ÏÖ¶à²ã·ÀÓù»úÖÆ£ºÍ¨¹ýÐÞ¸ÄUPX±êͷѹËõ¶þ½øÖÆÎļþ¡¢ÒýÈë50ÄÉÃë¼¶ÑÓ³ÙɳºÐ¼ì²âÊÖÒÕ£¬£¬£¬£¬£¬£¬ÒÔ¼°»ùÓÚ¹«¹²DNSµÄËæ»úÓòÃûC2ͨѶ£¬£¬£¬£¬£¬£¬ÓÐÓùæ±ÜÇå¾²¼ì²â¡£¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçµÄ¹¥»÷ÐÐΪÒÑÔì³É¶àÖØÍþв£º³ý°²ÅÅÍÚ¿óÄ£¿£¿£¿£¿£¿éÍ⣬£¬£¬£¬£¬£¬»¹Õë¶ÔÑо¿Ö°Ô±ÌᳫDDoS·´ÖÆ£¬£¬£¬£¬£¬£¬²¢ÊµÑéͨ¹ý¶Ë¿ÚɨÃèºáÏòÀ©É¢¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/181480/cyber-crime/iot-under-siege-the-return-of-the-mirai-based-gayfemboy-botnet.html
4. ÃÀ¹úFarmers InsuranceÒòSalesforce¹¥»÷Ö°ÙÍò¿Í»§Êý¾Ýй¶
8ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹ú°ü¹Ü¾ÞÍ·Farmers InsuranceÅû¶һÆðÓ°Ïì110Íò¿Í»§µÄ´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬ÆäȪԴָÏò½ñÄêÒÔÀ´Õë¶ÔSalesforceƽ̨µÄ¶àÆðÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Í¨¹ý¹ÙÍøÍ¨¸æÖ¤Êµ£¬£¬£¬£¬£¬£¬2025Äê5ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬ÆäµÚÈý·½¹©Ó¦ÉÌÊý¾Ý¿âÔâδ¾ÊÚȨ»á¼û£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÇÖÈëSalesforceϵͳ£¬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕºÅÂë¼°Éç»áÇå¾²ºÅÂëºóËÄλµÈÃô¸ÐÐÅÏ¢±»µÁ¡£¡£¡£¡£¡£¡£FarmersÓÚ8ÔÂ22ÈÕÆô¶¯Êܺ¦Õß֪ͨ³ÌÐò£¬£¬£¬£¬£¬£¬²¢ÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»±¨¸æ£¬£¬£¬£¬£¬£¬µ«Î´¹ûÕæµÚÈý·½¹©Ó¦ÉÌÏêϸÃû³Æ¡£¡£¡£¡£¡£¡£FarmersÔÚÊÂÎñÏìÓ¦ÖÐÇ¿µ÷£¬£¬£¬£¬£¬£¬µÚÈý·½¹©Ó¦ÉÌͨ¹ý°²ÅÅ¼à¿Ø¹¤¾ßѸËÙ¼ì²âµ½Òì³£»£»£»£»î¶¯²¢×è¶Ï¹¥»÷·¾¶£¬£¬£¬£¬£¬£¬¹«Ë¾Í¬²½Æô¶¯ÖÜÈ«ÊӲ첢ת´ïÖ´·¨²¿·Ö¡£¡£¡£¡£¡£¡£Ö»¹Ü½ÓÄÉÁËÓ¦¼±²½·¥£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßʹÓÃSalesforceƽ̨¼¯Öд洢ÆóÒµ¿Í»§Êý¾ÝµÄÌØÕ÷£¬£¬£¬£¬£¬£¬ÈÔÔì³É°ÙÍò¼¶Óû§ÐÅϢй¶¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓë½ñÄêÈ«Çò¶àÆðSalesforceÊý¾Ý͵ÇÔ°¸±£´æ¹ØÁª¡£¡£¡£¡£¡£¡£Íþв×éÖ¯UNC6040/UNC6240ͨ¹ý"ÓïÒô´¹ÂÚ"£¨Vishing£©ÊµÑéÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬ÓÕÆÆóÒµÔ±¹¤½«¶ñÒâOAuthÓ¦ÓÃÓëSalesforceʵÀý¹ØÁª£¬£¬£¬£¬£¬£¬´Ó¶ø½¨É賤ÆÚ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/farmers-insurance-data-breach-impacts-11m-people-after-salesforce-attack/
5. ·¨¹úÅ·ÉÐÁãÊÛ¼¯ÍÅÔâÓö´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬£¬£¬Ó°ÏìÊýÊ®Íò¿Í»§
8ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬·¨¹ú¿ç¹úÁãÊÛ¾ÞÍ·Å·ÉУ¨Auchan£©¿ËÈÕÅû¶һÆðÓ°ÏìÊýÊ®Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬Æä»áÔ±Öҳ϶ÈÍýÏëÏà¹ØµÄÃô¸ÐÐÅÏ¢Ôâδ¾ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÏòÊÜÓ°ÏìÓû§·¢Ë͵Ä֪ͨÖÐ֤ʵ£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÍøÂç¹¥»÷»ñÈ¡Á˿ͻ§È«Ãû¡¢Ö°³Æ¡¢¿Í»§×´Ì¬¡¢ÓÊÕþµØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¼°»áÔ±¿¨ºÅµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«Ç¿µ÷ÒøÐÐÕË»§Êý¾Ý¡¢ÕË»§ÃÜÂë¼°PINÂëδÊܲ¨¼°¡£¡£¡£¡£¡£¡£×÷ΪŷÖÞ¼°·ÇÖÞ13¸ö¹ú¼ÒÓµÓг¬2100¼Ò·Öµê¡¢ÄêÊÕÈëÓâ350ÒÚÃÀÔªµÄÁãÊÛ¼¯ÍÅ£¬£¬£¬£¬£¬£¬Å·ÉÐÔÚÊÂÎñÏìÓ¦ÖÐÒÑÏò·¨¹úÊý¾Ý±£»£»£»£»¤¾Ö£¨CNIL£©Õýʽת´ï£¬£¬£¬£¬£¬£¬²¢ÌáÐÑÓû§Ð¡ÐÄDZÔÚµÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£Í¨ÖªÃ÷È·Ö¸³ö£¬£¬£¬£¬£¬£¬Å·Éоø²»»áͨ¹ýÈκÎÇþµÀË÷È¡Óû§µÇ¼ƾ֤¡¢ÃÜÂë»ò»áÔ±¿¨PINÂ룬£¬£¬£¬£¬£¬½¨ÒéÊÕµ½¿ÉÒÉÐÂÎŵÄÓû§Á¬Ã¦ºöÂÔ²¢×èÖ¹µã»÷Á´½Ó»ò»Ø²¦µç»°¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/auchan-retailer-data-breach-impacts-hundreds-of-thousands-of-customers/
6. Google PlayÒÑÒÆ³ý×°ÖÃÁ¿´ï1900ÍòµÄ¶ñÒâAndroidÓ¦ÓÃ
8ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬ZscalerµÄThreatLabsÍŶӿËÈÕÅû¶£¬£¬£¬£¬£¬£¬Google PlayÊÐËÁ±£´æ77¸ö¶ñÒâAndroidÓ¦Ó㬣¬£¬£¬£¬£¬×Ü×°ÖÃÁ¿Í»ÆÆ1900Íò´Î£¬£¬£¬£¬£¬£¬Éæ¼°Joker¡¢Harly¡¢Anatsa£¨Tea Bot£©µÈ¶à¸ö¶ñÒâÈí¼þ¼Ò×å¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬¹ã¸æÈí¼þ×é¼þÕ¼±È³¬66%£¬£¬£¬£¬£¬£¬¶øJoker×÷Ϊ×î»îÔ¾µÄÒøÐÐľÂí£¬£¬£¬£¬£¬£¬·ºÆðÔÚ½ü25%µÄÆÊÎöÑù±¾ÖС£¡£¡£¡£¡£¡£´ËÀà¶ñÒâÈí¼þͨ¹ýαװ³ÉÕýµ±Ó¦Óã¨ÈçÓÎÏ·¡¢±ÚÖ½¡¢¹¤¾ßÀàÈí¼þ£©Èö²¥£¬£¬£¬£¬£¬£¬²¿·ÖÓ¦ÓÃÉõÖÁ½ÓÄÉ"ÑÚÂëÈí¼þ"ÊÖÒÕ£¬£¬£¬£¬£¬£¬ÔÚÌṩÕý³£¹¦Ð§µÄͬʱ£¬£¬£¬£¬£¬£¬ºǫִ́ÐÐÇÔÈ¡¶ÌÐÅ¡¢ÁªÏµÈË¡¢ÒøÐÐÆ¾Ö¤¼°¶©Ôĸ߼¶Ð§À͵ȶñÒâ²Ù×÷¡£¡£¡£¡£¡£¡£Ñо¿ÖصãÕ¹ÏÖÁËAnatsaÒøÐÐľÂíµÄÒ»Á¬½ø»¯¡£¡£¡£¡£¡£¡£¸ÃľÂí×îа汾½«Ä¿µÄÒøÐм°¼ÓÃÜÇ®±ÒÓ¦ÓÃÊýÄ¿´Ó650¸öÀ©Õ¹ÖÁ831¸ö£¬£¬£¬£¬£¬£¬ÁýÕֵ¹ú¡¢º«¹úµÈÐÂÇøÓò£¬£¬£¬£¬£¬£¬²¢ÐÂÔö¼üÅ̼Í¼ģ¿£¿£¿£¿£¿é¡£¡£¡£¡£¡£¡£ÆäÈö²¥Õ½ÂÔÒ²Éý¼¶ÎªÖ±½Ó×°ÖÃÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬Ìæ»»´ËǰµÄÔ¶³ÌDEX¶¯Ì¬¼ÓÔØ¡£¡£¡£¡£¡£¡£Îª¹æ±ÜÉó²é£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÃûÌùýʧµÄAPKµµ°¸Í»ÆÆ¾²Ì¬ÆÊÎö£¬£¬£¬£¬£¬£¬Á¬ÏµDES¼ÓÃÜ×Ö·û´®½âÃܼ°Ä£Äâ¼ì²âÊÖÒÕ£¬£¬£¬£¬£¬£¬²¢°´ÆÚÌæ»»Èí¼þ°üÃû³ÆºÍ¹þÏ£Öµ¡£¡£¡£¡£¡£¡£Anatsa»¹ÀÄÓÃAndroid¸¨Öú¹¦Ð§È¨ÏÞ×Ô¶¯»ñÈ¡ÌØÈ¨£¬£¬£¬£¬£¬£¬Í¨¹ý´¹ÂÚÒ³ÃæÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¹È¸èÒÑɾ³ýËùÓÐÉæÊÂÓ¦Ó㬣¬£¬£¬£¬£¬²¢½¨ÒéÓû§ÆôÓÃPlay ProtectЧÀÍ¡¢½öÊÚȨÐëҪȨÏÞ¡¢Ñ¡Ôñ¿ÉÐÅ¿ª·¢Õß¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-android-apps-with-19m-installs-removed-from-google-play/


¾©¹«Íø°²±¸11010802024551ºÅ