EverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷±±ÃÀCrumbl±ý¸ÉÁ¬Ëøµê
Ðû²¼Ê±¼ä 2025-07-301. EverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷±±ÃÀCrumbl±ý¸ÉÁ¬Ëøµê
7ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬±±ÃÀ×ÅÃûÃÀʳ±ý¸ÉÁ¬ËøµêCrumbl¿ËÈÕÔâÓöEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý29ÍòÃûÔ±¹¤Ð¡ÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ23ÈÕÔÚÆä°µÍøÐ¹ÃÜÍøÕ¾Ðû²¼ÉùÃ÷£¬£¬£¬£¬£¬£¬³ÆÒÑ»ñÈ¡°üÀ¨Ô±¹¤ÐÕÃû¡¢µç»°¡¢ÓÊÏ䡢ְλ¡¢³öÉúÈÕÆÚ¼°Éí·ÝÑéÖ¤ÁîÅÆµÈÃô¸ÐÐÅÏ¢µÄÄÚ²¿Îļþ£¬£¬£¬£¬£¬£¬²¢¹ûÕæÁËÁ½¸ö°üÀ¨ÏêϸԱ¹¤Êý¾ÝµÄÑù±¾¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬£¬Everestδ½ÓÄɹŰ崿Îı¾ÀÕË÷ÐÅ£¬£¬£¬£¬£¬£¬¶øÊÇͨ¹ýÓïÒôÐÂÎÅÏòCrumbl̸ÅÐÖ°Ô±·¢³ö×îºóͨ뺣¬£¬£¬£¬£¬£¬ÒªÇóÔÚµ¹¼ÆÊ±ÏÞÆÚÄÚÁªÏµÒÔÖ§¸¶Î´¹ûÕæÊê½ð£¬£¬£¬£¬£¬£¬²»È»½«¹ûÕæËùÓÐÊý¾Ý¡£¡£¡£¡£¡£¡£×èÖ¹25ÈÕ£¬£¬£¬£¬£¬£¬Ê£Óà̸ÅÐʱ¼äÔ¼ËÄÌì¡£¡£¡£¡£¡£¡£CrumblÓÉÁ½Î»±íÐÖµÜÓÚ2017Ä꽨É裬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚÓÌËûÖÝ£¬£¬£¬£¬£¬£¬ÏÖÔÚÔÚÈ«Çò50¸öÖÝ¡¢¼ÓÄôóºÍ²¨¶àÀè¸÷ÓµÓг¬1000¼ÒÃŵ꣬£¬£¬£¬£¬£¬ÄêÊÕÈëÔ¤¼Æ´ï12ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬ÈÕ¾ù¹©Ó¦³¬°ÙÍò·ÝÌðµã£¬£¬£¬£¬£¬£¬ÉîÊÜÃûÈËÓëÍøºìÇàíù£¬£¬£¬£¬£¬£¬ÒÔ±ê¼ÇÐÔ·ÛÉ«°ü×°ÖøÃû¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾ÝÐ¹Â¶Éæ¼°ÆäÖØ´óÔ±¹¤ÏµÍ³£¬£¬£¬£¬£¬£¬¿ÉÄÜÒý·¢ÑÏÖØÉùÓþÓëÖ´·¨Î£º¦¡£¡£¡£¡£¡£¡£EverestÀÕË÷Èí¼þ×éÖ¯Óë¶íÂÞ˹¹ØÁª£¬£¬£¬£¬£¬£¬×Ô2021Äê7ÔÂÊ״ηºÆðÒÔÀ´£¬£¬£¬£¬£¬£¬Òѽ«248ÃûÊܺ¦ÕßÁÐÈë°µÍøÃûµ¥£¬£¬£¬£¬£¬£¬ÆäÖнüÒ»ÄêÄÚÐÂÔö90Æð°¸¼þ£¬£¬£¬£¬£¬£¬Ä¿µÄº¸ÇÕþ¸®»ú¹¹¡¢Ò½ÔºµÈÃô¸ÐÐÐÒµ¡£¡£¡£¡£¡£¡£
https://cybernews.com/news/crumbl-cookie-company-everest-ransomware-attack-employee-data-compromised/
2. ·¨¹úµçОÞÍ·OrangeÔâÍøÂç¹¥»÷ÖÂЧÀÍÖÐÖ¹
7ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬·¨¹úµçÐÅÔËÓªÉÌOrange¿ËÈÕÅû¶ÆäÍøÂçϵͳÔâÓöÖØ´óÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£7ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÍøÂçÇå¾²²¿·ÖOrange Cyberdefense¼ì²âµ½ÐÅϢϵͳÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Ëæ¼´Æô¶¯Ó¦¼±ÏìÓ¦»úÖÆ£¬£¬£¬£¬£¬£¬½«ÊÜѬȾϵͳÓëÍøÂçÖ÷Ìå¸ôÀë¡£¡£¡£¡£¡£¡£´Ë¾ÙËäÓÐÓÃ×èÖ¹Á˹¥»÷À©É¢£¬£¬£¬£¬£¬£¬µ«µ¼Ö·¨¹ú±¾ÍÁ²¿·ÖÉÌÒµ¿Í»§¼°ÏûºÄÕßЧÀ͵ÄÖÎÀíÆ½Ì¨·ºÆðÔËÓªÖÐÖ¹£¬£¬£¬£¬£¬£¬Ô¤¼ÆÏà¹ØÐ§Àͽ«ÓÚ7ÔÂ30ÈÕÉÏÎçÖð²½»Ö¸´¡£¡£¡£¡£¡£¡£OrangeÇ¿µ÷£¬£¬£¬£¬£¬£¬ÏÖÔÚÊÓ²ìÉÐδ·¢Ã÷¿Í»§Êý¾Ý»òÆóÒµÃô¸ÐÐÅÏ¢±»µÁµÄÖ¤¾Ý£¬£¬£¬£¬£¬£¬µ«ÒÑÏòÖ´·¨²¿·Ö±¨°¸²¢ÌáÆðËßËÏ¡£¡£¡£¡£¡£¡£OrangeµÄÍøÂçÇå¾²ÌôÕ½²¢·ÇÊ״Ρ£¡£¡£¡£¡£¡£½ñÄê2Ô£¬£¬£¬£¬£¬£¬ÆäÂÞÂíÄáÑÇ·Ö¹«Ë¾ÔøÔâÓöÒÔ"Rey"Ϊ´úºÅµÄºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÊýǧ·Ý°üÀ¨Ô±¹¤Êý¾Ý¡¢Óû§¼Í¼¼°Ô´´úÂëµÄÄÚ²¿Îļþй¶£¬£¬£¬£¬£¬£¬Ë乫˾³Æ½ö·ÇÒªº¦Ó¦ÓÃÊÜÓ°Ï죬£¬£¬£¬£¬£¬µ«Ì»Â¶³ö¹©Ó¦Á´Çå¾²µÄ±¡Èõ»·½Ú¡£¡£¡£¡£¡£¡£×÷ΪЧÀÍÅ·ÖÞ¡¢·ÇÖÞ¼°Öж«2.94ÒÚÓû§µÄÐÐÒµ¾ÞÍ·£¬£¬£¬£¬£¬£¬Orangeͨ¹ýOrange BusinessÆ·ÅÆÎª¿ç¹úÆóÒµÌṩITЧÀÍ£¬£¬£¬£¬£¬£¬2024ÄêÓªÊÕ´ï403ÒÚÅ·Ôª£¬£¬£¬£¬£¬£¬ÓµÓÐ12.58ÍòÃûÔ±¹¤£¬£¬£¬£¬£¬£¬ÆäϵͳÎȹÌÐÔ¶ÔÈ«ÇòÍ¨Ñ¶ÍøÂç¾ßÓÐÕ½ÂÔÒâÒå¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/french-telecommunications-giant-orange-discloses-cyberattack/
3. Ã÷ÄáËÕ´ïÖÝÊ¥±£ÂÞÊÐÔâÑÏÖØÍøÂç¹¥»÷
7ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬Ã÷ÄáËÕ´ïÖÝÊ׸®Ê¥±£ÂÞÊÐ×Ô24ÈÕÆðÔâÓöÑÏÖØÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÈ«ÊÐÊý×ÖЧÀͺÍÒªº¦ÏµÍ³´ó¹æÄ£ÖÐÖ¹£¬£¬£¬£¬£¬£¬Ó°ÏìÒ»Á¬Õû¸öÖÜÄ©¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ôì³ÉÔÚÏßÖ§¸¶¹¦Ð§Ì±»¾£¬£¬£¬£¬£¬£¬Í¼Êé¹Ý¡¢ÓéÀÖÖÐÐĵÈЧÀÍÔÝʱÎÞ·¨Ê¹Ó㬣¬£¬£¬£¬£¬²¿·ÖÊÐÕþЧÀÍÒòϵͳ»á¼ûÊÜÏÞ·ºÆðÑÓ³Ù»òÖÐÖ¹£¬£¬£¬£¬£¬£¬µ«½ôÆÈЧÀÍδÊܲ¨¼°¡£¡£¡£¡£¡£¡£Ê¥±£ÂÞÊйÙÔ±ÌåÏÖ£¬£¬£¬£¬£¬£¬ÏÖÔÚÕýÓëÍâµØ¡¢Öݼ°Áª°îÏàÖúͬ°éϸÃÜÐ×÷£¬£¬£¬£¬£¬£¬È«Á¦ÊӲ칥»÷Ô´Í·²¢»Ö¸´ËùÓй¦Ð§¡£¡£¡£¡£¡£¡£ÓÉÓÚÊÂÎñ¹æÄ£ºÍÖØ´óÐÔÁè¼ÝÄÚ²¿¼°ÉÌÒµÓ¦¶ÔÄÜÁ¦£¬£¬£¬£¬£¬£¬Ê¥±£ÂÞÊÐ29ÈÕÏòÖÝÕþ¸®ÇëÇóÖ§Ô®¡£¡£¡£¡£¡£¡£Í¬ÈÕ£¬£¬£¬£¬£¬£¬Ã÷ÄáËÕ´ïÖÝÖݳ¤µÙÄ·¡¤ÎÖ¶û×ÈÇ©Êð½ôÆÈÐÐÕþÏÂÁ£¬£¬£¬£¬£¬Æô¶¯¹úÃñ¾¯ÎÀ¶ÓÍøÂç²½¶ÓÌṩ¡°ÍøÂç±£»£»£»£»£»£»¤Ö§³Ö¡±£¬£¬£¬£¬£¬£¬ÒÔÐÖú½â¾öΣ»£»£»£»£»£»ú²¢È·±£Ö÷ÒªÊÐÕþЧÀÍÒ»Á¬ÔËÐС£¡£¡£¡£¡£¡£Æ¾Ö¤ÏÂÁ£¬£¬£¬£¬£¬¹úÃñ¾¯ÎÀ¶Ó½«ÓëÊС¢ÖÝ¡¢Áª°î¹ÙÔ±Ðͬ£¬£¬£¬£¬£¬£¬»º½âÒ»Á¬×ÌÈŲ¢°ü¹ÜסÃñÇå¾²¡£¡£¡£¡£¡£¡£ÎÖ¶û×ÈÇ¿µ÷£º¡°ÎÒÃǽ«ÓëÊ¥±£ÂÞÊÐϸÃÜÏàÖú£¬£¬£¬£¬£¬£¬¾¡¿ì»Ö¸´ÍøÂçÇå¾²¡£¡£¡£¡£¡£¡£¡±
https://www.bleepingcomputer.com/news/security/minnesota-activates-national-guard-after-st-paul-cyberattack/
4. ÐÂÐͳäµçÐ®ÖÆ¹¥»÷ÈÆ¹ýÇå¾²»úÖÆ
7ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»ÖÖÃûΪ¡°Ñ¡ÔñÐ®ÖÆ¡±£¨Choicejacking£©µÄÐÂÐ͹¥»÷ÊֶΣ¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ýÖÇÄÜÊÖ»úÕë¶Ô¡°³äµçÐ®ÖÆ¡±µÄ¹Å°å·À»¤»úÖÆ£¬£¬£¬£¬£¬£¬Ê¹Óù«¹²³äµç×°±¸ÇÔÈ¡Êý¾Ý»òÖ²Èë¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ÕâÒ»ÍþвÓɰµØÀû¸ñÀ´Ä¿Æ¼¼´óѧÍŶÓÕ¹ÏÖ¡£¡£¡£¡£¡£¡£×ÔÊ®¶àÄêǰ¡°³äµçÐ®ÖÆ¡±Ê×´ÎÒý·¢¹Ø×¢ºó£¬£¬£¬£¬£¬£¬ÖÇÄÜÊÖ»ú²Ù×÷ϵͳÖð²½ÒýÈëÇå¾²ÌáÐÑ£¬£¬£¬£¬£¬£¬ÒªÇóÓû§ÔÚÅþÁ¬Î´Öª¶Ë¿ÚʱÊÖ¶¯Åú×¼Êý¾Ý´«Êä»òÑ¡Ôñ¡°½ö³äµç¡±Ä£Ê½¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Ñо¿ÍŶÓͨ¹ýÄ£ÄâUSB/À¶ÑÀÊäÈë×°±¸²Ù×÷£¬£¬£¬£¬£¬£¬ÀÖ³ÉαÔìÓû§ÊÚȨ£º¶ñÒâ³äµçÕ¾¿ÉÔÚ133ºÁÃëÄÚ×°±¸Çл»ÖÁÊý¾Ý´«Êä»òµ÷ÊÔģʽ£¬£¬£¬£¬£¬£¬ÎÞÐèÓû§ÈκβÙ×÷¡£¡£¡£¡£¡£¡£NordVPNÍøÂçÇå¾²ÕÕÁÏAdrianus WarmenhovenÖ¸³ö£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ʹÓá°¿ØÖÆ´í¾õ¡±ÔÀí£¬£¬£¬£¬£¬£¬Ê¹Óû§ÔÚÍêÈ«²»ÖªÇéµÄÇéÐÎÏÂ̻¶Êý¾Ý£¬£¬£¬£¬£¬£¬¹¥»÷Õ߿ɽè´Ëä¯ÀÀÕÕÆ¬¡¢¶ÁÈ¡ÐÂÎÅÉõÖÁÖ²Èë¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£´Ë´Î·¢Ã÷Ó¡Ö¤ÁËר¼Òºã¾ÃÒÔÀ´µÄÖÒÑÔ£º¹«¹²USB¶Ë¿Ú±£´æ¼«¸ßΣº¦¡£¡£¡£¡£¡£¡£ÎÞÂÛÊÇ»ú³¡¡¢ÂùÝÕվɿ§·È¹Ý£¬£¬£¬£¬£¬£¬±»ÈëÇֵijäµç×°±¸¶¼¿ÉÄܳÉΪ¹¥»÷ÔØÌå¡£¡£¡£¡£¡£¡£
https://hackread.com/choicejacking-attack-steals-data-phones-public-chargers/
5. ºÚ¿ÍʹÓÃSAP NetWeaverÎó²î°²ÅÅLinux Auto-Color¶ñÒâÈí¼þ
7ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾DarktraceÔÚ2025Äê4ÔµÄÊÂÎñÏìÓ¦Öз¢Ã÷£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýʹÓÃSAP NetWeaverµÄÑÏÖØÎó²îCVE-2025-31324£¬£¬£¬£¬£¬£¬¶ÔÒ»¼ÒÃÀ¹ú»¯Ñ§¹«Ë¾°²ÅÅÉý¼¶°æAuto-Color Linux¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÉÏ´«¶ñÒâ¶þ½øÖÆÎļþʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬SAPËäÓÚ4ÔÂÐû²¼ÐÞ¸´²¹¶¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬µ«´ËǰÒÑÓж෽ÊӲ쵽»îԾʹÓÃʵÑé¡£¡£¡£¡£¡£¡£Auto-Color¶ñÒâÈí¼þ×îÔçÓÉPalo Alto Networks Unit 42ÍŶÓÔÚ2025Äê2Լͼ£¬£¬£¬£¬£¬£¬ÆäÒÔÒþ²ØÐԺͳ¤ÆÚÐÔÖø³Æ¡£¡£¡£¡£¡£¡£×îа汾½øÒ»²½Ç¿»¯ÌÓ±ÜÕ½ÂÔ£ºÈôÎÞ·¨ÅþÁ¬Ó²±àÂëµÄÏÂÁîÓë¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»á×Ô¶¯ÒÖÖÆ´ó²¿·Ö¶ñÒ⹦Ч£¬£¬£¬£¬£¬£¬ÔÚɳºÐ»ò¸ôÀëÇéÐÎÖзºÆð¡°ÎÞº¦¡±×´Ì¬£¬£¬£¬£¬£¬£¬ÒԴ˹æ±ÜÇå¾²ÆÊÎö¡£¡£¡£¡£¡£¡£Darktrace±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬¸ÃºóÃÅ¿ÉÆ¾Ö¤Óû§È¨ÏÞ¼¶±ðµ÷½âÐÐΪ£¬£¬£¬£¬£¬£¬Í¨¹ý¡°ld.so.preload¡±¹²Ïí¹¤¾ß×¢ÈëʵÏÖÒþÃØ³¤ÆÚ»¯£¬£¬£¬£¬£¬£¬²¢¼¯³ÉrootkitÄ£¿£¿£¿£¿£¿£¿éÒþ²Ø»î¶¯£¬£¬£¬£¬£¬£¬¾ß±¸í§ÒâÏÂÁîÖ´ÐС¢ÎļþÐ޸ġ¢·´Ïòshell¡¢ÊðÀíÁ÷Á¿×ª·¢¼°¶¯Ì¬ÉèÖøüеȹ¦Ð§¡£¡£¡£¡£¡£¡£¹¥»÷ʱ¼äÏßÏÔʾ£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÓÚ4ÔÂ25ÈÕÌᳫÈëÇÖ£¬£¬£¬£¬£¬£¬Á½Ììºó¼´´«ËÍELF¿ÉÖ´ÐÐÎļþÖÁÄ¿µÄ»úе¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-sap-netweaver-bug-to-deploy-linux-auto-color-malware/
6. ÈûÉà¶ûÉÌÒµÒøÐÐÔâÍøÂç¹¥»÷Ö¿ͻ§Êý¾Ýй¶
7ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÃûºÚ¿ÍÉù³ÆÇÔÈ¡²¢³öÊÛÁËÈûÉà¶ûÉÌÒµÒøÐпͻ§µÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£×÷ΪÈûÉà¶ûµÄÖ÷Òª½ðÈÚЧÀÍ»ú¹¹£¬£¬£¬£¬£¬£¬¸ÃÒøÐÐ25ÈÕÌåÏÖÒÑ¡°·¢Ã÷²¢¿ØÖÆ¡±´Ë´Î¹¥»÷£¬£¬£¬£¬£¬£¬µ«Î´Í¸Â¶ÏêϸÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¡£¾ÝÒøÐÐͨ¸æ£¬£¬£¬£¬£¬£¬¹¥»÷ÊÂÎñµ¼ÖÂÍøÉÏÒøÐпͻ§µÄСÎÒ˽¼ÒÐÅÏ¢¡°ÒâÍâй¶¡±£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢ÕË»§ÀàÐͼ°Óà¶îµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬²¿·ÖÕË»§»¹±»±ê¼ÇΪ¡°»îÆÚÕË»§-Õþ¸®¡±¡£¡£¡£¡£¡£¡£ÒøÐÐÇ¿µ÷£¬£¬£¬£¬£¬£¬ÏÖÔÚÎÞÖ¤¾ÝÅú×¢¿Í»§×ʽðÔâµÁÓ㬣¬£¬£¬£¬£¬²¢½¨ÒéÓû§Í¨¹ýATM»ò·ÖÐаìÀíÓªÒµ¡£¡£¡£¡£¡£¡£Âåɼí¶ÍøÂçÇå¾²¹«Ë¾ResecurityµÄÑо¿Ö°Ô±Óë¹¥»÷Õß½Ó´¥ºó£¬£¬£¬£¬£¬£¬Éó²éÁ˱»µÁÊý¾ÝÑù±¾£¬£¬£¬£¬£¬£¬È·ÈÏÐÅÏ¢ÕæÊµÐÔ¡£¡£¡£¡£¡£¡£´Ë´Îй¶¿ÉÄÜÉæ¼°´ó×Ú¿Í»§Òþ˽£¬£¬£¬£¬£¬£¬Òý·¢¶ÔÊý¾ÝÀÄÓÃΣº¦µÄµ£ÐÄ¡£¡£¡£¡£¡£¡£ÈûÉà¶ûÖÐÑëÒøÐÐÒÑÊÕµ½¸ÃÐеÄÕýʽ֪ͨ£¬£¬£¬£¬£¬£¬µ«Î´½øÒ»²½Åû¶ÊÓ²ìÏ£Íû¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÈûÉà¶ûÉÌÒµÒøÐÐÒÑÔÝÍ£ÍøÉÏÒøÐÐЧÀÍÒÔ¿ØÖÆÎ£º¦£¬£¬£¬£¬£¬£¬µ«Î´Ã÷È·»Ö¸´Ê±¼ä¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/180513/data-breach/seychelles-commercial-bank-reported-cybersecurity-incident.html


¾©¹«Íø°²±¸11010802024551ºÅ