ÎÚ¿ËÀ¼Ôâ¶à×éÍþвÐÐΪÕßÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2025-08-081. ÎÚ¿ËÀ¼Ôâ¶à×éÍþвÐÐΪÕßÍøÂç¹¥»÷
8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×飨CERT-UA£©¿ËÈÕÐû²¼¾¯±¨£¬£¬£¬£¬£¬£¬Ö¸³ö¸Ã¹úÕþ¸®»ú¹¹¡¢¹ú·À²½¶Ó¼°¹ú·À¹¤ÒµÆóÒµÕýÔâÊܶà¸öÍþвÐÐΪÕßµÄÒ»Á¬ÍøÂç¹¥»÷¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬UAC-0099×éÖ¯ÓëGamaredonÕûÌåÓÈΪ»îÔ¾£¬£¬£¬£¬£¬£¬¶þÕß¾ùͨÏ꾡ÃÜÉè¼ÆµÄÍøÂç´¹ÂÚÊÖ¶ÎÉøÍ¸Ä¿µÄϵͳ£¬£¬£¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢½¨É賤ÆÚ»¯»á¼û¡£¡£¡£¡£UAC-0099×éÖ¯×Ô2023Äê6ÔÂÊ״α»¹ûÕæ¼Í¼ÒÔÀ´£¬£¬£¬£¬£¬£¬¶à´ÎÒÔÎÚ¿ËÀ¼ÊµÌåÎªÌØ¹¤»î¶¯Ä¿µÄ¡£¡£¡£¡£Æä×îй¥»÷ʹÓ÷¨Ôº´«Æ±Ö÷ÌâµÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬Í¨¹ýCuttlyµÈURLËõ¶ÌЧÀÍ·¢ËÍÁ´½Ó£¬£¬£¬£¬£¬£¬ÓÕµ¼Êܺ¦ÕßÏÂÔØ°üÀ¨HTMLÓ¦ÓóÌÐò£¨HTA£©µÄË«´æµµÎļþ¡£¡£¡£¡£Ö´Ðк󣬣¬£¬£¬£¬£¬»ìÏýµÄVisual Basic¾ç±¾»á½¨ÉèÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯£¬£¬£¬£¬£¬£¬²¢¼ÓÔØMATCHBOIL¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬×îÖÕͶ·ÅMATCHWOKºóÃż°DRAGSTAREÊý¾ÝÇÔÈ¡³ÌÐò¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬Çå¾²³§ÉÌESETµÄ±¨¸æÕ¹ÏÖ£¬£¬£¬£¬£¬£¬¶íÂÞ˹Åä¾°µÄGamaredonÕûÌåÔÚ2024ÄêϰëÄêÏÔÖøÔöÇ¿Á˶ÔÎÚ¿ËÀ¼µÄ¡°ÎÞÇ顱Óã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¸Ã×éÖ¯½ÓÄÉÁùÖÖÐÂÐ͹¤¾ß£¬£¬£¬£¬£¬£¬°üÀ¨ÓÃÓÚÕï¶ÏÊý¾ÝÍøÂçµÄPteroDespair¡¢ºáÏòÒÆ¶¯µÄPteroTickleÎäÆ÷»¯¹¤¾ß£¬£¬£¬£¬£¬£¬ÒÔ¼°Í¨¹ýTelegraph API½¨Éè¼ÓÃÜͨµÀµÄPteroGraphin³¤ÆÚ»¯¹¤¾ß¡£¡£¡£¡£
https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
2. Ç÷ÊÆ¿Æ¼¼Apex Oneƽ̨ÏÖ»îԾʹÓõÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î
8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²³§ÉÌÇ÷ÊÆ¿Æ¼¼¿ËÈÕÏò¿Í»§·¢³ö½ôÆÈÖÒÑÔ£¬£¬£¬£¬£¬£¬³ÆÆäApex One¶ËµãÇ徲ƽ̨ÕýÔâÊÜÕë¶ÔÁ½¸öÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-54948¡¢CVE-2025-54987£©µÄ»îԾʹÓ㬣¬£¬£¬£¬£¬±Þ²ßÓû§Á¬Ã¦½ÓÄÉ·À»¤²½·¥¡£¡£¡£¡£´Ë´ÎÎó²îÔ´ÓÚApex OneÖÎÀí¿ØÖÆÌ¨£¨ÍâµØ°æ£©µÄÏÂÁî×¢ÈëȱÏÝ£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¤ÏÈͨ¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚδÐÞ²¹µÄϵͳÉÏÔ¶³ÌÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£Ö»¹ÜÎó²îÐè¹¥»÷Õ߾߱¸¿ØÖÆÌ¨»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬µ«Ç÷ÊÆ¿Æ¼¼Ã÷È·ÌåÏÖÒÑÊӲ쵽ÖÁÉÙÒ»ÆðÒ°ÍâʹÓð¸Àý£¬£¬£¬£¬£¬£¬ÈÕ±¾CERTҲͬ²½Ðû²¼Ô¤¾¯£¬£¬£¬£¬£¬£¬Ç¿µ÷ÆäÏÖʵÍþвÐÔ¡£¡£¡£¡£ÎªÓ¦¶Ô½ôÆÈÇéÐΣ¬£¬£¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼³Æ2025Äê8ÔÂÖÐÑ®Ðû²¼²¹¶¡£¬£¬£¬£¬£¬£¬²¢Ìṩ¶ÌÆÚ»º½â¹¤¾ß¡£¡£¡£¡£¸Ã¹¤¾ßͨ¹ý½ûÓÃÖÎÀíÔ±´ÓApex One¿ØÖÆÌ¨Ô¶³Ì°²ÅÅÊðÀíµÄ¹¦Ð§£¬£¬£¬£¬£¬£¬¿ÉÍêÈ«×è¶ÏÒÑÖªÎó²îʹÓ÷¾¶£¬£¬£¬£¬£¬£¬µ«»áµ¼ÖÂÔÝʱʧȥԶ³ÌÖÎÀíÄÜÁ¦¡£¡£¡£¡£¹«Ë¾½¨ÒéÓû§ÓÅÏȰ²ÅŴ˹¤¾ß£¬£¬£¬£¬£¬£¬×ÝÈ»ÐèÎþÉü²¿·Ö±ãµ±ÐÔÒÔÈ·±£¶ËµãÇå¾²¡£¡£¡£¡£½øÒ»²½·À»¤½¨Òé°üÀ¨£ºÈô¿ØÖÆÌ¨IPµØµã̻¶ÓÚÍâ²¿ÍøÂ磬£¬£¬£¬£¬£¬Ó¦Á¬Ã¦ÊµÑéÔ´IPÏÞÖÆµÈ»á¼û¿ØÖƲ½·¥¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-endpoint-protection-zero-day-exploited-in-attacks/
3. еġ°ÓÄÁéµç»°¡±Õ½ÊõʹÓÃZoomºÍMicrosoft Teams¾ÙÐÐC2²Ù×÷
8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÔÚBlackHat USA 2025´ó»áÉÏ£¬£¬£¬£¬£¬£¬PraetorianÇå¾²Ñо¿Ô±Adam CrosserÕ¹ÏÖÁËÒ»ÖÖÃûΪ"ÓÄÁéºô½Ð"£¨Ghost Calls£©µÄÐÂÐͺóʹÓÃÏÂÁîÓë¿ØÖÆ£¨C2£©¹æ±ÜÊÖÒÕ¡£¡£¡£¡£¸ÃÊÖÒÕͨ¹ýÀÄÓÃZoom¡¢Microsoft TeamsµÈ¾Û»áÓ¦ÓóÌÐòʹÓõÄTURNÐÒéЧÀÍÆ÷£¬£¬£¬£¬£¬£¬½«¶ñÒâC2Á÷Á¿Î±×°³ÉÕý³£ÊÓÆµ¾Û»áͨѶ£¬£¬£¬£¬£¬£¬´Ó¶øÈƹý¹Å°åÍøÂçÇå¾²·ÀÓù¡£¡£¡£¡£TURNÐÒé±¾ÊÇÓÃÓÚ×ÊÖúNAT·À»ðǽºó×°±¸½¨ÉèÊÓÆµÍ¨»°¡¢VoIPµÈʵʱͨѶµÄ¸¨ÖúÐÒé¡£¡£¡£¡£µ±Óû§¼ÓÈëZoom»òTeams¾Û»áʱ£¬£¬£¬£¬£¬£¬¿Í»§¶Ë»á»ñÈ¡ÔÝʱTURNƾ֤ÒÔ½¨ÉèÖмÌÅþÁ¬¡£¡£¡£¡£"ÓÄÁéºô½Ð"ͨ¹ýÐ®ÖÆÕâЩÕýµ±Æ¾Ö¤£¬£¬£¬£¬£¬£¬ÔÚ¹¥»÷ÕßÓëÊܺ¦Õß×°±¸¼ä¹¹½¨»ùÓÚWebRTCµÄ¼ÓÃÜËíµÀ£¬£¬£¬£¬£¬£¬½«C2Ö¸Áîαװ³ÉͨÀýÊÓÆµ¾Û»áÁ÷Á¿¡£¡£¡£¡£ÓÉÓÚÁ÷Á¿¾ÆóÒµ³£ÓÃÓòÃû·ÓÉ£¬£¬£¬£¬£¬£¬ÇÒʹÓö˿Ú443µÄUDP/TCP×Ô˳Ӧ´«Ê䣬£¬£¬£¬£¬£¬¿ÉÈÆ¹ý·À»ðǽ¡¢ÊðÀí¼°TLS¼ì²é£¬£¬£¬£¬£¬£¬ÊµÏָ߶ÈÒþ²ØµÄÏÂÁî¿ØÖÆ¡£¡£¡£¡£CrosserÖ¸³ö£¬£¬£¬£¬£¬£¬Óë¹Å°åC2»úÖÆÏà±È£¬£¬£¬£¬£¬£¬¸ÃÒªÁì¾ß±¸Èý´óÓÅÊÆ£ºÆäÒ»£¬£¬£¬£¬£¬£¬ÎÞÐèÒÀÀµÈí¼þÎó²î£¬£¬£¬£¬£¬£¬½öͨ¹ýÀÄÓÃÕýµ±»ù´¡ÉèÊ©¼´¿ÉʵÏÖ£»£»£»Æä¶þ£¬£¬£¬£¬£¬£¬Ö§³Öʵʱ½»»¥£¬£¬£¬£¬£¬£¬Öª×ãVNCÔ¶³Ì¿ØÖƵÈÐèÒªµÍÑӳٵIJÙ×÷ÐèÇ󣻣»£»ÆäÈý£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÎÞÐè̻¶×ÔÓÐÓòÃû»ò»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬¼«´ó½µµÍ×·×ÙΣº¦¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-ghost-calls-tactic-abuses-zoom-and-microsoft-teams-for-c2-operations/
4. µÂ¹úµçÐÅMagentaTVƽ̨Òò¹ã¸æÆ½Ì¨Îó²îй¶Óû§Êý¾Ý
8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬µÂ¹úµçÐÅ£¨Deutsche Telekom£©ÆìÏÂÓÎýÌåÆ½Ì¨MagentaTVÒòµÚÈý·½¹ã¸æÆ½Ì¨Îó²îÔâÓöÓû§Êý¾Ýй¶£¬£¬£¬£¬£¬£¬Ð¹Â¶Ê±³¤´ïÊýÔ¡£¡£¡£¡£Ñо¿ÍŶÓÓÚ2025Äê6ÔÂÖÐÑ®·¢Ã÷£¬£¬£¬£¬£¬£¬ÓÉ¹ã¸æÊÖÒÕ¹«Ë¾EquativÆìϵÄServerside.aiÍйܵÄElasticsearchÊý¾Ý¿âδÉè±£»£»£»¤£¬£¬£¬£¬£¬£¬µ¼ÖÂMagentaTVÓû§ÈÕÖ¾±»¹ûÕæÌ»Â¶¡£¡£¡£¡£Ö»¹ÜµÂ¹úµçÐÅÔÚÍŶÓת´ïºóÒÑÏÂÏ߸ÃʵÀý£¬£¬£¬£¬£¬£¬µ«Ì»Â¶Ê±´ú£¨ÖÁÉÙ×Ô2025Äê2ÔÂÆð£©ÀÛ»ýµÄ³¬3.24ÒÚÌõÈÕÖ¾×ÜÁ¿´ï729GBÒÑÃæÁÙDZÔÚÀÄÓÃΣº¦¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾ÝÖ÷ÒªÔ´ÓÚÓû§ÓëMagentaTVƽ̨µÄ½»»¥ÇëÇ󣬣¬£¬£¬£¬£¬°üÀ¨HTTP±êÍ·ÖеķÇÃô¸ÐÐÅÏ¢£¨ÈçÓû§ÊðÀí£©¼°²¿·ÖÃô¸Ð±êʶ·û£¬£¬£¬£¬£¬£¬°üÀ¨Î¨Ò»×°±¸±êʶ£¨MACµØµã£©¡¢ÍøÂçÅþÁ¬±êʶ£¨IPµØµã£©¡¢ÕË»§¹ØÁªID£¨¿Í»§ID¼°»á»°ID£©¡£¡£¡£¡£Ö»¹Üµ¥ÌõÊý¾Ý¼ÛÖµÓÐÏÞ£¬£¬£¬£¬£¬£¬µ«¹¥»÷Õß¿Éͨ¹ý½»Ö¯ÒýÓöàԴй¶Êý¾Ý£¨ÈçÀúʷй¶µÄIPÓëÓû§ÐÅϢƥÅ䣩ʵÏÖÓû§Éí·Ý×·×Ù»ò×°±¸¶¨Î»¡£¡£¡£¡£
https://cybernews.com/security/deutsche-telekom-magentatv-data-leak/
5. ¹È¸èÔÚÒ»Á¬µÄSalesforceÊý¾Ý͵ÇÔ¹¥»÷ÖÐÔâÓöÊý¾Ýй¶
8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬¿Æ¼¼¾ÞÍ·Google¿ËÈÕÈ·ÈϳÉΪÀÕË÷×éÖ¯ShinyHuntersµÄ×îй¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬ÆäÆóÒµSalesforce¿Í»§¹ØÏµÖÎÀí£¨CRM£©ÏµÍ³ÔâÈëÇÖ£¬£¬£¬£¬£¬£¬µ¼Ö²¿·Ö¿Í»§Êý¾Ýй¶¡£¡£¡£¡£´Ë´ÎÊÂÎñÓë¸Ã×éÖ¯½üÆÚÕë¶ÔÈ«ÇòÆóÒµµÄ´ó¹æÄ£Êý¾ÝÇÔÈ¡Ðж¯Ïà¹Ø£¬£¬£¬£¬£¬£¬Éæ¼°ÓïÒô´¹ÂÚ£¨Vishing£©Éç»á¹¤³Ì¹¥»÷¼°Salesforceƽ̨Îó²îʹÓᣡ£¡£¡£¾ÝGoogleÅû¶£¬£¬£¬£¬£¬£¬6ÔÂʱ´ú£¬£¬£¬£¬£¬£¬ÆäÒ»¸öÓÃÓÚ´æ´¢ÖÐСÆóÒµÁªÏµÐÅÏ¢¼°Ïà¹Ø±¸×¢µÄSalesforceʵÀý£¬£¬£¬£¬£¬£¬ÒòÔâÓö±»×·×ÙΪ¡°UNC6040¡±»ò¡°UNC6240¡±µÄÍþвÐÐΪÕß¹¥»÷¶øÊ§ÏÝ¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÇÖÈëϵͳ£¬£¬£¬£¬£¬£¬ÔÚ¶ÌÔÝ»á¼û´°¿ÚÄÚÇÔÈ¡ÁË»ù´¡ÉÌÒµÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÆóÒµÃû³Æ¡¢ÁªÏµ·½·¨µÈ´ó²¿·ÖΪ¹ûÕæ»ò·ÇÃô¸ÐÊý¾Ý¡£¡£¡£¡£GoogleÇ¿µ÷ÒÑѸËÙÇжÏÈëÇÖ·¾¶²¢Íê³ÉÓ°ÏìÆÊÎö£¬£¬£¬£¬£¬£¬µ«Î´Ã÷È·ÏêϸÊÜÓ°Ïì¿Í»§ÊýÄ¿¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷Ä»ºóºÚÊÖʵΪÎÛÃûÕÑÖøµÄShinyHuntersÀÕË÷¼¯ÍÅ¡£¡£¡£¡£´Ë´ÎÐж¯ÖУ¬£¬£¬£¬£¬£¬ShinyHuntersͨ¹ýÈëÇÖÆóÒµSalesforceʵÀýÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬²¢ÒÔ¹ûÕæÐ¹Â¶»ò³öÊÛÊý¾ÝΪÍþв¾ÙÐÐÀÕË÷¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-suffers-data-breach-in-ongoing-salesforce-data-theft-attacks/
6. ·¨¹ú²¼ÒÁ¸ñµçÐÅÔâÓö´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬£¬£¬640Íò¿Í»§ÐÅÏ¢ÊÜÓ°Ïì
8ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬·¨¹úÖ÷ÒªµçÐÅÔËÓªÉ̲¼ÒÁ¸ñµçÐÅ£¨Bouygues Telecom£©Åû¶ÁËÒ»ÆðÖØ´óÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬Ô¼640Íò¿Í»§µÄСÎÒ˽¼ÒÊý¾ÝÔÚÕë¶ÔÐÔÍøÂç¹¥»÷ÖÐÔ⵽й¶¡£¡£¡£¡£×÷Ϊ·¨¹úµÚÈý´óÒÆ¶¯Ð§ÀÍÌṩÉÌ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÓµÓÐ1450ÍòÒÆ¶¯Óû§¼°9000ÃûÔ±¹¤£¬£¬£¬£¬£¬£¬2024ÄêÓªÊÕ´ï568ÒÚÅ·Ôª¡£¡£¡£¡£¾Ý¹Ù·½ÉùÃ÷£¬£¬£¬£¬£¬£¬¹¥»÷ÓÉ"ÒÑÖªÍøÂç·¸·¨¼¯ÍÅ"ʵÑ飬£¬£¬£¬£¬£¬Í¨¹ýÇÖÈëÌØ¶¨ÄÚ²¿×ÊÔ´»ñÈ¡Á˿ͻ§ÁªÏµ·½·¨¡¢ÌõÔ¼ÐÅÏ¢¡¢»éÒö״̬¡¢ÆóÒµ¿Í»§×ÊÁϼ°¹ú¼ÊÒøÐÐÕ˺ţ¨IBAN£©µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£ÖµµÃÇìÐÒµÄÊÇ£¬£¬£¬£¬£¬£¬ÐÅÓÿ¨ºÅ¡¢ÕË»§ÃÜÂëµÈ½¹µã²ÆÎñÐÅϢδ±»ÇÔÈ¡¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬£¬²¼ÒÁ¸ñµçÐÅÊÖÒÕÍŶÓѸËÙ×è¶Ï¹¥»÷Õß»á¼û·¾¶£¬£¬£¬£¬£¬£¬²¢Ðͬ·¨¹ú¹ú¼ÒÍøÂçÇå¾²¾Ö£¨ANSSI£©ºÍÊý¾Ý±£»£»£»¤»ú¹¹CNILÕö¿ªÊӲ죬£¬£¬£¬£¬£¬Í¬Ê±Ç¿»¯ÍøÂç¼à¿ØÓëÇå¾²·À»¤ÏµÍ³¡£¡£¡£¡£Ð¹Â¶ÊÂÎñ¶Ô¿Í»§×é³ÉDZÔÚΣº¦£¬£¬£¬£¬£¬£¬Ö»¹ÜIBANµ¥¶Àȱ·¦ÒÔÍê³ÉתÕ˲Ù×÷£¬£¬£¬£¬£¬£¬µ«ÊÜÓ°ÏìÓû§ÈÔ±»½¨Òé°´ÆÚºË²éÒøÐÐÉúÒâ¼Í¼£¬£¬£¬£¬£¬£¬²¢Ð¡ÐÄÒÔ¿Í»§ÐÕÃûºÍÕ˺ÅʵÑéµÄÍøÂç´¹ÂÚÕ©Æ¡£¡£¡£¡£¹«Ë¾ÒÑͨ¹ý¶ÌÐźÍÓʼþÖ±½Ó֪ͨÊܺ¦Õߣ¬£¬£¬£¬£¬£¬²¢Ã÷È·ÖÒÑÔÇÐÎðÏòÉù³ÆÕÆÎÕÆäСÎÒ˽¼ÒÐÅÏ¢µÄÀ´µçÕß͸¶µÇ¼ƾ֤µÈÃô¸Ð×ÊÁÏ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bouygues-telecom-confirms-data-breach-impacting-64-million-customers/


¾©¹«Íø°²±¸11010802024551ºÅ