ÀïÊ¿Âú·ÅÉäѧлáÅû¶³¬140ÍòÈËÊý¾Ýй¶ÊÂÎñ
Ðû²¼Ê±¼ä 2025-07-211. ÀïÊ¿Âú·ÅÉäѧлáÅû¶³¬140ÍòÈËÊý¾Ýй¶ÊÂÎñ
7ÔÂ20ÈÕ£¬£¬£¬£¬£¬ÓµÓаÙÄêÀúÊ·µÄÃÀ¹ú¸¥¼ªÄáÑÇÖÝ˽ÈË·ÅÉä¿ÆÕïËùÀïÊ¿Âú·ÅÉäѧлᣨRadiology Associates of Richmond, RAR£©¹ûÕæÅû¶ÁËÒ»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£ÁýÕÖÁè¼Ý140ÍòÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢¼°Êܱ£»£»£»£»£»£»£»¤¿µ½¡ÐÅÏ¢£¨PHI£©¡£¡£¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬ÍþвÐÐΪÕßÓÚ2024Äê4ÔÂ2ÈÕÖÁ6ÈÕʱ´úÈëÇÖRARϵͳ£¬£¬£¬£¬£¬µ«Ö±ÖÁ2025Äê5ÔÂ2ÈÕͨ¹ýÍâ²¿ÍøÂçÇ徲ר¼ÒÐÖúµÄȡ֤ÆÊÎö£¬£¬£¬£¬£¬²ÅÈ·ÈÏÆäÍøÂçÇéÐÎÖб£´æÎ´¾ÊÚȨµÄ»á¼û£¬£¬£¬£¬£¬²¢µ¼Ö°üÀ¨Éç±£ºÅÂëµÈÃô¸ÐÊý¾ÝµÄй¶¡£¡£¡£¡£¡£¡£¡£RARÇ¿µ÷£¬£¬£¬£¬£¬Ö»¹ÜÏÖÔÚÎÞÖ¤¾ÝÅú×¢Êý¾ÝÒѱ»ÀÄÓ㬣¬£¬£¬£¬µ«ÒÑ×Ô¶¯Í¨ÖªÊÜÓ°Ïì¸öÌ壬£¬£¬£¬£¬²¢ÎªÉç±£ºÅÂëй¶ÕßÌṩÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬Í¬Ê±½¨ÒéÏà¹ØÖ°Ô±Ò»Á¬¹Ø×¢²ÆÎñ¼°Ò½ÁƼͼÒì³£¡£¡£¡£¡£¡£¡£¡£×÷Ϊ¸¥¼ªÄáÑÇÖÝÖв¿Ö÷ÒªµÄÒ½ÁÆÓ°ÏñЧÀÍÌṩÉÌ£¬£¬£¬£¬£¬RAR×Ô1905Ä꽨ÉèÒÔÀ´£¬£¬£¬£¬£¬Ê¼ÖÕΪ¶à¼ÒÒ½ÔººÍÃÅÕï»ú¹¹ÌṩX¹â¡¢CT¡¢MRIµÈÕï¶Ï¼°½éÈëÊÖÊõÖ§³Ö¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ̻¶³öÆäÍøÂçÇå¾²·ÀÓùµÄDZÔÚÎó²î£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýºã¾ÃDZÔÚʵÏÖÁ˶ÔϵͳµÄÉî¶ÈÉøÍ¸£¬£¬£¬£¬£¬Í¹ÏÔÒ½ÁÆÐÐÒµÔÚÊý¾Ý±£»£»£»£»£»£»£»¤ÉÏÃæÁÙµÄÑÏËàÌôÕ½¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/180128/data-breach/radiology-associates-of-richmond-data-breach-impacts-1-4-million-people.html
2. Ê¢ÐеÄnpm°ü±»ÍøÂç´¹ÂÚÐ®ÖÆ£¬£¬£¬£¬£¬ÓÃÓÚÖ²Èë¶ñÒâÈí¼þ
7ÔÂ19ÈÕ£¬£¬£¬£¬£¬Ê¢ÐÐnpm°üeslint-config-prettier¼°Æä¹ØÁª¿âÒòά»¤ÕßÔâÓöÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬±»Ö²Èë¶ñÒâ´úÂë²¢Ðû²¼ÖÁ¹Ù·½¿ÍÕ»£¬£¬£¬£¬£¬Ó°ÏìÊý°ÙÍò¿ª·¢Õß¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹©Ó¦Á´¹¥»÷ͨ¹ýÇÔȡά»¤Õ߯¾Ö¤ÊµÏÖ£¬£¬£¬£¬£¬Í¹ÏÔ¿ªÔ´Éú̬ϵͳµÄÇ徲ųÈõÐÔ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Ä¿µÄ°üÀ¨Ã¿ÖÜÏÂÔØÁ¿³¬3000Íò´ÎµÄeslint-config-prettier¼°ÆäËû¹ØÁª°ü¡£¡£¡£¡£¡£¡£¡£Î¬»¤ÕßJounQinÈ·ÈÏ£¬£¬£¬£¬£¬ÆänpmÁîÅÆÒòµã»÷αװ³É¡°support@npmjs.com¡±µÄ´¹ÂÚÓʼþ±»µÁ£¬£¬£¬£¬£¬µ¼Ö¹¥»÷ÕßÐû²¼¶ñÒâ°æ±¾¡£¡£¡£¡£¡£¡£¡£ÕâЩ°æ±¾µÄºó×°Öþ籾£¨install.js£©°üÀ¨Òþ²Øº¯ÊýlogDiskSpace()£¬£¬£¬£¬£¬ÏÖʵͨ¹ýrundll32Ö´ÐÐÀ¦°óµÄnode-gyp.dllľÂí¡£¡£¡£¡£¡£¡£¡£¸ÃDLLÔÚVirusTotalÉϼì²âÂʽö19/72£¬£¬£¬£¬£¬Åú×¢´ó¶¼É±¶¾Èí¼þδÄÜʶ±ð¡£¡£¡£¡£¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬£¬¿ªÔ´ÉçÇøÑ¸ËÙÏìÓ¦£ºJounQinÒÑ×÷·Ï±»µÁÁîÅÆ²¢ÍýÏëÐû²¼ÐÞ¸´°æ±¾£¬£¬£¬£¬£¬ÊÜÓ°Ïì°ü±»±ê¼ÇΪ¡°ÒÑÆúÓᱡ£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿ª·¢Õß±»ÖÒÑÔ×èֹʹÓÃÌØ¶¨¶ñÒâ°æ±¾£¬£¬£¬£¬£¬²¢Ðè¼ì²épackage-lock.jsonµÈËøÎļþ¼°CIÈÕÖ¾£¬£¬£¬£¬£¬ÓÈÆäÊÇWindowsÇéÐÎϵÄÒì³£ÐÐΪ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬½¨ÒéÂÖ»»¿ÉÄÜ̻¶µÄÃÜÔ¿£¬£¬£¬£¬£¬²¢Ð¡ÐÄά»¤Õ߯äËû°üµÄDZÔڸ͝¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/popular-npm-linter-packages-hijacked-via-phishing-to-drop-malware/
3. еÄCrushFTPÁãÈÕÎó²î±»Ê¹ÓÃÀ´Ð®ÖÆÐ§ÀÍÆ÷
7ÔÂ18ÈÕ£¬£¬£¬£¬£¬ÆóÒµÎļþ´«ÊäЧÀÍÆ÷CrushFTPÅû¶һÆðÕýÔÚ±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î£¨CVE-2025-54309£©£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷Õßͨ¹ýWeb½çÃæÖ±½Ó»ñȡЧÀÍÆ÷ÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¡£¡£×÷Ϊ֧³ÖFTP¡¢SFTP¡¢HTTP/SµÈÐÒéµÄÇå¾²Îļþ¹²ÏíÆ½Ì¨£¬£¬£¬£¬£¬CrushFTPµÄÎó²î̻¶Òý·¢¶ÔÒªº¦»ù´¡ÉèÊ©Êý¾Ýй¶Σº¦µÄÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£¡£¡£¾ÝCrushFTPÊ×ϯִÐйÙBen Spink֤ʵ£¬£¬£¬£¬£¬ÍþвÐÐΪÕß×Ô7ÔÂ18ÈÕÆð×îÏÈ´ó¹æÄ£Ê¹ÓôËÎó²î£¬£¬£¬£¬£¬µ«ÏÖʵ¹¥»÷¿ÉÄÜÔçÓÚ7ÔÂ1ÈÕÐû²¼µÄ¾É°æ±¾£¨v10.8.5¼°v11.3.4_23֮ǰ£©¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬¸Ã¹«Ë¾´ËǰÕë¶ÔHTTP(S)ÐÒéÖÐAS2Ïà¹ØÎÊÌâµÄÐÞ¸´ÒâÍâ×è¶ÏÁË´Ë´ÎÁãÈÕÎó²îµÄʹÓ÷¾¶£¬£¬£¬£¬£¬Í¨¹ýĬÈϹرղ¿·ÖµÍƵ¹¦Ð§£¬£¬£¬£¬£¬¼ä½ÓÌáÉýÁËϵͳÇå¾²ÐÔ¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÄæÏò¹¤³Ìʶ±ð³öδ±»ÍêÈ«ÐÞ¸´µÄÎó²î£¬£¬£¬£¬£¬²¢Õë¶Ôδ¸üÐÂϵͳÌᳫ¶¨Ïò¹¥»÷¡£¡£¡£¡£¡£¡£¡£CrushFTPÇ¿µ÷£¬£¬£¬£¬£¬ÊµÊ±Éý¼¶ÖÁ×îа汾¿ÉÍêÈ«¹æ±ÜΣº¦£¬£¬£¬£¬£¬¶ø½ÓÄÉDMZ¸ôÀëÖ÷ЧÀÍÆ÷µÄÆóÒµ¿Í»§Ôò²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¹ØÓÚÒÑÔâÈëÇÖµÄϵͳ£¬£¬£¬£¬£¬ÖÎÀíÔ±Ðè¼ì²éMainUsers/default/user.XMLÎļþÊÇ·ñ±£´æÒì³£Ð޸Ļòδ֪ÖÎÀíÔ±ÕË»§¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÉÏ´«ÏÂÔØÈÕÖ¾ÖеÄÒì³£»£»£»£»£»£»£»î¶¯¡¢Ä¬ÈÏÓû§ÉèÖñ»¸Ä¶¯µÈ¾ùΪҪº¦ÈëÇÖÖ¸±ê¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-crushftp-zero-day-exploited-in-attacks-to-hijack-servers/
4. ÈÕ±¾ÁªºÏ¹ú¼Ê»ú¹¹Ðû²¼PhobosºÍ8BaseÀÕË÷Èí¼þÃ⺬»ìÃÜÆ÷
7ÔÂ18ÈÕ£¬£¬£¬£¬£¬ÈÕ±¾¾¯·½ÁªºÏÅ·ÖÞÐ̾¯×éÖ¯µÈ»ú¹¹£¬£¬£¬£¬£¬Õë¶ÔÆÕ±éÈö²¥µÄPhobosºÍ8BaseÀÕË÷Èí¼þ¼Ò×åÐû²¼Ã⺬»ìÃܹ¤¾ß£¬£¬£¬£¬£¬ÎªÈ«ÇòÊܺ¦ÕßÌṩÎÞÐèÖ§¸¶Êê½ðµÄÎļþ»Ö¸´¼Æ»®¡£¡£¡£¡£¡£¡£¡£¸Ã½âÃÜÆ÷Ö§³Ö.phobos¡¢.8base¡¢.elbie¡¢.faust¡¢.LIZARDµÈ¶àÖÖÀ©Õ¹ÃûÎļþ£¬£¬£¬£¬£¬¿É´ÓÈÕ±¾¾¯·½¹ÙÍø¼°Å·ÖÞÐ̾¯×éÖ¯¡°NoMoreRansom¡±Æ½Ì¨ÏÂÔØ¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü²¿·Öä¯ÀÀÆ÷Î󱍯äÇå¾²ÐÔ£¬£¬£¬£¬£¬µ«¾²âÊԸù¤¾ßÓÐÓÃÇÒÎÞº¦£¬£¬£¬£¬£¬Òѱ»ÃÀ¹úFBIµÈ»ú¹¹ÍƹãΪ¹Ù·½Êý¾Ý»Ö¸´½â¾ö¼Æ»®¡£¡£¡£¡£¡£¡£¡£²»¹ý£¬£¬£¬£¬£¬NoMoreRansomÌáÐÑÓû§£¬£¬£¬£¬£¬Ê¹ÓÃǰÐèÏÈÓÿɿ¿·À²¡¶¾Èí¼þɨ³ýϵͳÄÚ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬²»È»Îļþ¿ÉÄܱ»Öظ´¼ÓÃÜ¡£¡£¡£¡£¡£¡£¡£PhobosÀÕË÷Èí¼þ×Ô2019Äê5ÔÂÆðÒÔ¡°ÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©¡±Ä£Ê½»îÔ¾£¬£¬£¬£¬£¬Æä±äÖÖͨ¹ý´¹ÂÚÓʼþ¡¢RDP¶Ë¿ÚɨÃèµÈÊÖ¶ÎÈëÇÖÍøÂ磬£¬£¬£¬£¬Ê¹ÓÃSmokeloader¡¢Cobalt StrikeµÈ¿ªÔ´¹¤¾ßÈö²¥¡£¡£¡£¡£¡£¡£¡£2023Ä꣬£¬£¬£¬£¬¹ØÁª×éÖ¯8Base¸¡ÏÖ£¬£¬£¬£¬£¬½ÓÄÉË«ÖØÀÕË÷Õ½ÂÔ£¬£¬£¬£¬£¬²¢½«ÀÕË÷Èí¼þ×é¼þǶÈë¼ÓÃÜÔØºÉ£¬£¬£¬£¬£¬Í¨¹ýSmokeLoaderÄÚ´æ¼ÓÔØÊµÑé¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2022Äê3ÔÂÆðÕë¶Ô½ðÈÚ¡¢ÖÆÔìµÈÐÐÒµµÄÖÐСÐÍÆóÒµ£¬£¬£¬£¬£¬2023Äê5-6Ô»¼¤Ôö£¬£¬£¬£¬£¬2024Äê3Ô±»ÃÀ¹úCISA¡¢FBIµÈ»ú¹¹ÁªºÏÔ¤¾¯¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/180108/malware/authorities-released-free-decryptor-for-phobos-and-8base-ransomware.html
5. ¶íÂÞ˹×î´ó¾ÆÀàÁãÊÛÉÌWineLabÔâÍøÂç¹¥»÷ÖÂÃÅµê¹Ø±Õ
7ÔÂ18ÈÕ£¬£¬£¬£¬£¬¶íÂÞ˹×î´ó¾ÆÀàרÂôÁ¬ËøµêWineLab¼°Æäĸ¹«Ë¾Novabev Group¿ËÈÕÔâÓö´ó¹æÄ£ÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÆäITϵͳ̱»¾¡¢ÃÅµê¹Ø±Õ¼°ÏßÉÏЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ±»Novabev³ÆÎª¡°Ø¨¹ÅδÓеÄÐͬ¹¥»÷¡±£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÈëÇÖ¼¯ÍÅIT»ù´¡ÉèÊ©£¬£¬£¬£¬£¬ÔÝʱÖÐÖ¹Á˲¿·ÖÒªº¦Ð§Àͺ͹¤¾ßµÄ¿ÉÓÃÐÔ£¬£¬£¬£¬£¬Ö±½ÓÓ°ÏìWineLabÊýǧ¼ÒʵÌåµê¼°ÏßÉÏÓªÒµµÄÕý³£ÔËÓª¡£¡£¡£¡£¡£¡£¡£×èÖ¹±¨µÀÐû²¼Ê±£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÍøÕ¾ÈÔ´¦ÓÚÀëÏß״̬£¬£¬£¬£¬£¬Òƶ¯Ó¦ÓùºÖù¦Ð§ÒàÊÜÏÞ£¬£¬£¬£¬£¬ITÍŶÓÕýÈ«ÌìºòÐÞ¸´ÏµÍ³¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂÌìÏÂÃŵê×Ô7ÔÂ14ÈÕÆð¹Ø±Õ£¬£¬£¬£¬£¬ÏßÉÏÅäËÍϵͳ̱»¾£¬£¬£¬£¬£¬³ÉΪ¶íÂÞ˹½üÄêÀ´Ó°Ïì×îÆÕ±éµÄÆóÒµ¼¶ÍøÂç¹¥»÷ÊÂÎñÖ®Ò»¡£¡£¡£¡£¡£¡£¡£Novabev¼¯ÍÅÈ·ÈÏ£¬£¬£¬£¬£¬¹¥»÷ÕßÌá³öÊê½ðÒªÇ󣬣¬£¬£¬£¬µ«¹«Ë¾Ã÷È·¾Ü¾øÖ§¸¶£¬£¬£¬£¬£¬²¢Ç¿µ÷¡°²»»áÖª×ãÈκÎÍþвÐÐΪÕßµÄÌõ¼þ¡±¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÊÓ²ìÈÔÔÚ¾ÙÐУ¬£¬£¬£¬£¬¸Ã¹«Ë¾ÌåÏÖÉÐδ·¢Ã÷¿Í»§Ð¡ÎÒ˽¼ÒÊý¾Ýй¶µÄÖ¤¾Ý¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯¹ûÕæÈÏÁì´Ë´Î¹¥»÷¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/russian-alcohol-retailer-winelab-closes-stores-after-ransomware-attack/
6. ÃÀ¹ú°²Äݰ¢Â׵¶ûƤ·ô¿ÆÕïËùÊý¾Ýй¶ӰÏì190ÍòÈË
7ÔÂ18ÈÕ£¬£¬£¬£¬£¬2025Äê2ÔÂ14ÈÕÖÁ5ÔÂ13ÈÕʱ´ú£¬£¬£¬£¬£¬ÃÀ¹úÖдóÎ÷Ñó¼°¶«Äϲ¿×î´óµÄƤ·ô¿ÆÒ½ÁÆ»ú¹¹Ö®Ò»°²Äݰ¢Â׵¶ûƤ·ô¿ÆÕïËù£¨AAD£©ÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£ÁýÕÖÁè¼Ý190ÍòÈË¡£¡£¡£¡£¡£¡£¡£¸ÃÕïËù½¨ÉèÓÚ50¶àÄêǰ£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚÂíÀïÀ¼ÖÝ£¬£¬£¬£¬£¬ÔÚÆß¸öÖÝÔËÓª×Å100Óà¼ÒÕïËù£¬£¬£¬£¬£¬ÓµÓÐ275ÃûÁÙ´²Ò½Éú£¬£¬£¬£¬£¬ÌṩÄÚ¿Æ¡¢Íâ¿Æ¡¢ÃÀÈݼ°Æ¤·ô²¡ÀíѧµÈÈ«¿ÆÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬AADѸËÙ¼ì²âµ½ÏµÍ³Òì³£²¢Æô¶¯·À»¤²½·¥£¬£¬£¬£¬£¬Õö¿ªÖÜÈ«ÊӲ졣¡£¡£¡£¡£¡£¡£5ÔÂ20ÈÕ£¬£¬£¬£¬£¬Éó²éÈ·ÈÏÈëÇÖÕß»á¼ûÁ˰üÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢»ò¿µ½¡ÐÅÏ¢µÄÎļþ£»£»£»£»£»£»£»6ÔÂ27ÈÕ£¬£¬£¬£¬£¬ÕïËùÕýʽ֪ͨÊÜÓ°Ïì¸öÌ壬£¬£¬£¬£¬³Æ¡°¿ÉÄÜÉæ¼°ÐÕÃû¡¢ÁªÏµ·½·¨¡¢Ò½ÁƼͼµÈÃô¸ÐÊý¾Ý¡±£¬£¬£¬£¬£¬µ«Ç¿µ÷ÏÖÔÚδ·¢Ã÷ÐÅÏ¢±»ÏÖʵÀÄÓûòڲƵÄÖ¤¾Ý¡£¡£¡£¡£¡£¡£¡£Îª½µµÍΣº¦£¬£¬£¬£¬£¬AADΪÊÜÓ°ÏìÕßÌṩ24¸öÔµÄÃâ·ÑÉí·Ý±£»£»£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬²¢½¨Òé°´ÆÚ¼à¿ØÕË»§ÉúÒâ¼°ÐÅÓñ¨¸æ¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/180100/data-breach/anne-arundel-dermatology-data-breach-impacts-1-9-million-people.html


¾©¹«Íø°²±¸11010802024551ºÅ