½¿ÔÏÊ«ÔâEverestÀÕË÷Èí¼þ¹¥»÷ÖÂ60Íò¿Í»§Êý¾Ýй¶
Ðû²¼Ê±¼ä 2025-09-171. ½¿ÔÏÊ«ÔâEverestÀÕË÷Èí¼þ¹¥»÷ÖÂ60Íò¿Í»§Êý¾Ýй¶
9ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ¼¯ÍÅEverestÉù³Æ¶Ô·¨¹úÉݳ޻¤·ôÆ·¾ÞÍ·½¿ÔÏÊ«¼¯ÍÅÌᳫ¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢½«ÆäÊý¾ÝÉÏ´«ÖÁ°µÍø²©¿Í¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÐû³Æ»ñÈ¡Á˽¿ÔÏÊ«Áè¼Ý60ÍòÃû¿Í»§µÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Éæ¼°ÃÀ¹ú¡¢·¨¹ú¡¢¼ÓÄôóµÈµØÇø£¬£¬£¬£¬£¬£¬£¬Êý¾Ý°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¼°»¤·ôÆ·/»¯×±Æ·¹ºÖÃÀúÊ·µÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£½¿ÔÏÊ«×÷Ϊ×ܲ¿Î»ÓÚ°ÍÀèµÄÉÝ»ª»¤·ôÆ·ÖÆÔìÉÌ£¬£¬£¬£¬£¬£¬£¬ÄêÊÕÈëÔ¼20ÒÚÅ·Ôª£¬£¬£¬£¬£¬£¬£¬Ô±¹¤¹æÄ£Ô¼8000ÈË£¬£¬£¬£¬£¬£¬£¬ÔÚÎ÷Å·Êг¡Õ¼ÓÐÖ÷Ҫְλ¡£¡£¡£¡£¡£¡£¡£¾ÝCybernewsÍŶÓÊӲ죬£¬£¬£¬£¬£¬£¬EverestÔÚ°µÍøÐû²¼µÄÌû×Ó½ö°üÀ¨²¿·ÖÊý¾Ý½ØÍ¼×÷Ϊ֤¾Ý£¬£¬£¬£¬£¬£¬£¬Î´ÌṩÍêÕûÑù±¾£¬£¬£¬£¬£¬£¬£¬µ«Ñù±¾Êý¾ÝÒÉËÆÀ´×Ô½¿ÔÏÊ«²î±ðµØÇøµÄÔÚÏßÊÐËÁ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬£¬´ËÀà´ó¹æÄ£Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÍøÂç´¹ÂÚ¡¢À¬»øÓʼþ¹¥»÷£¬£¬£¬£¬£¬£¬£¬»ò×÷ΪÉí·Ý͵ÇԵŤ¾ß¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/clarins-user-data-breach-everest/
2. Phoenix RowHammer¹¥»÷ÔÚ109ÃëÄÚÈÆ¹ý¸ß¼¶DDR5ÄÚ´æ±£»£»£»£»¤
9ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ËÕÀèÊÀÁª°îÀí¹¤Ñ§ÔºÓë¹È¸èÁªºÏÑо¿·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Õë¶ÔSK Hynix DDR5ÄÚ´æÐ¾Æ¬µÄÐÂÐÍRowHammer¹¥»÷±äÖÖ"Phoenix"£¨CVE-2025-6202£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö7.1£©ÒÑÍ»ÆÆÏÖÓзÀ»¤»úÖÆ¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ͨ¹ýÖØ¸´»á¼ûÌØ¶¨ÄÚ´æÐд¥·¢ÏàÁÚÐÐλ·×ª£¬£¬£¬£¬£¬£¬£¬¿ÉÔÚ109ÃëÄÚʵÏÖ±ê×¼DDR5×ÀÃæÏµÍ³µÄrootȨÏÞÌáÉý£¬£¬£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£ÁýÕÖ2021-2024ÄêÉú²úµÄ15¿îDDR5оƬ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö¤Êµ£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜDDR5ÄÚÖÃÆ¬ÉÏECC¾À´íºÍTRRÄ¿µÄÐÐˢеȷÀ»¤²½·¥£¬£¬£¬£¬£¬£¬£¬ÈÔÎÞ·¨ÓÐÓõÖÓùPhoenix¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ýλ·×ªÆÆËðSSHÉí·ÝÑéÖ¤£¨ÈçÇÔȡͬµØÐéÄâ»úRSA-2048ÃÜÔ¿£©»òʹÓÃsudo¶þ½øÖÆÎļþÌáȨ¡£¡£¡£¡£¡£¡£¡£ÊµÑéÏÔʾ£¬£¬£¬£¬£¬£¬£¬ECCºÍTRRµÈ¹Å°å·ÀÓùÊֶζÔSMASH¡¢Half-DoubleµÈÖØ´ó¹¥»÷ͬÑùʧЧ£¬£¬£¬£¬£¬£¬£¬¶øPhoenix¸üÊ×´ÎÔÚÉú²ú¼¶DDR5ϵͳʵÏֶ˵½¶ËÌáȨʹÓᣡ£¡£¡£¡£¡£¡£Ñо¿ÍŶÓÖ¸³ö£¬£¬£¬£¬£¬£¬£¬DRAMÃܶÈÀ©Õ¹µ¼ÖÂ×°±¸ÌØÕ÷³ß´çËõС£¬£¬£¬£¬£¬£¬£¬·´¶ø½µµÍÁË´¥·¢RowHammerËùÐèµÄ¼¤»î´ÎÊý£¬£¬£¬£¬£¬£¬£¬Ê¹ÐÂÐÍоƬ¸üÒ×Êܹ¥»÷¡£¡£¡£¡£¡£¡£¡£Îó²îÃô¸ÐÐÔÉæ¼°Î¶ȡ¢µçѹ¡¢¹¤ÒÕת±ä¡¢Êý¾ÝģʽµÈ¶àά¶È±äÁ¿¡£¡£¡£¡£¡£¡£¡£×÷ΪӦ¶Ô£¬£¬£¬£¬£¬£¬£¬½¨Ò齫ÄÚ´æË¢ÐÂÂÊÌáÉýÖÁ3±¶ÒÔ×èֹλ·×ª¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/09/phoenix-rowhammer-attack-bypasses.html
3. SlopAds£ºÈ«ÇòAndroid¹ã¸æÚ²ÆÐж¯±»½ÒÆÆ²¢´ì°Ü
9ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃûΪ"SlopAds"µÄ´ó¹æÄ£Android¹ã¸æÚ²ÆÐж¯±»HUMANµÄSatoriÍþвÇ鱨ÍÅ¶Ó½ÒÆÆ²¢´ì°Ü¡£¡£¡£¡£¡£¡£¡£¸ÃÐж¯Í¨¹ýGoogle PlayÉϵÄ224¸ö¶ñÒâÓ¦ÓÃʵÑ飬£¬£¬£¬£¬£¬£¬ÖðÈÕÌìÉú23ÒÚ´Î¹ã¸æÇëÇ󣬣¬£¬£¬£¬£¬£¬ÀÛ¼ÆÏÂÔØÁ¿³¬3800Íò´Î£¬£¬£¬£¬£¬£¬£¬ÁýÕÖÈ«Çò228¸ö¹ú¼Ò¼°µØÇø£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÃÀ¹úÒÔ30%µÄ¹ã¸æÕ¹Ê¾Á¿¾ÓÊ×£¬£¬£¬£¬£¬£¬£¬Ó¡¶ÈºÍ°ÍÎ÷ÅÅÁжþ¡¢Èýλ¡£¡£¡£¡£¡£¡£¡£SlopAds½ÓÄɶà²ã¹æ±ÜÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓûìÏýºÍÒþдÊõÒþ²Ø¶ñÒâÐÐΪ£¬£¬£¬£¬£¬£¬£¬ÌÓ±ÜGoogleÉóºË¼°Çå¾²Èí¼þ¼ì²â¡£¡£¡£¡£¡£¡£¡£ÈôÓû§Í¨¹ý×ÔȻ;¾¶×°ÖÃÓ¦Ó㬣¬£¬£¬£¬£¬£¬ÆäÌåÏÖÈçͨÀýÓ¦Ó㻣»£»£»µ«Èôͨ¹ýÍþвÕß¹ã¸æ»î¶¯×°Ö㬣¬£¬£¬£¬£¬£¬Ôò´¥·¢¶ñÒâÄ£¿£¿£¿£¿£¿£¿éÏÂÔØ¡£¡£¡£¡£¡£¡£¡£Ó¦ÓÃʹÓÃFirebase Remote Config»ñÈ¡¼ÓÃÜÉèÖÃÎļþ£¬£¬£¬£¬£¬£¬£¬°üÀ¨¹ã¸æÚ²ÆÄ£¿£¿£¿£¿£¿£¿é¡¢ÌáÏÖЧÀÍÆ÷¼°JavaScript¸ºÔØURL£¬£¬£¬£¬£¬£¬£¬²¢Ñé֤װ±¸ÊÇ·ñΪÕýµ±Óû§ËùÓУ¬£¬£¬£¬£¬£¬£¬×èÖ¹±»Ñо¿Ö°Ô±»òÇå¾²Èí¼þÆÊÎö¡£¡£¡£¡£¡£¡£¡£Ò»µ©Í¨¹ý¼ì²é£¬£¬£¬£¬£¬£¬£¬Ó¦ÓÃÏÂÔØËÄÕź¬ÒþдÊõµÄPNGͼÏñ£¬£¬£¬£¬£¬£¬£¬½âÃÜÖØ×éΪ"FatModule"¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¼¤»îºó£¬£¬£¬£¬£¬£¬£¬¸ÃÈí¼þͨ¹ýÒþ²ØµÄWebViewsÍøÂç×°±¸ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ¼º½ÖÁ¹¥»÷Õß¿ØÖƵÄÚ²ÆÓò£¬£¬£¬£¬£¬£¬£¬ÖðÈÕ±¬·¢³¬20ÒÚ´ÎÚ²Æ¹ã¸æÕ¹Ê¾¼°µã»÷£¬£¬£¬£¬£¬£¬£¬Îª¹¥»÷Õß´´Á¢²»·¨ÊÕÈë¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬GoogleÒÑ´ÓPlay StoreÒÆ³ýËùÓÐSlopAdsÓ¦Ó㬣¬£¬£¬£¬£¬£¬²¢¸üÐÂPlay Protect¹¦Ð§£¬£¬£¬£¬£¬£¬£¬ÖÒÑÔÓû§Ð¶ÔØÉè±¹ØÁ¬Ä¶ñÒâÓ¦Óᣡ£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-nukes-224-android-malware-apps-behind-massive-ad-fraud-campaign/
4. npm¹©Ó¦Á´Ôâ´ó¹æÄ£ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬187¸ö°ü±»Ä¾Âí»¯
9ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»³¡ÃûΪ"Shai-Hulud"µÄÐͬÈä³æÊ½¹©Ó¦Á´¹¥»÷ÔÚnpmƽ̨±¬·¢£¬£¬£¬£¬£¬£¬£¬ÖÁÉÙ187¸öÈí¼þ°üÔâÈëÇÖ²¢Ö²Èë×ÔÈö²¥¶ñÒâ¸ºÔØ¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ʼÓÚ@ctrl/tinycolor°ü£¨ÖÜÏÂÔØÁ¿³¬200Íò´Î£©£¬£¬£¬£¬£¬£¬£¬ËæºóѸËÙÀ©Õ¹ÖÁCrowdStrikeµÈ×ÅÃûÆóÒµµÄnpmÃüÃû¿Õ¼ä£¬£¬£¬£¬£¬£¬£¬Ðγɿçά»¤ÕßµÄ×Ô¶¯Ä¾Âí»¯Èö²¥Á´¡£¡£¡£¡£¡£¡£¡£¹¥»÷»úÖÆÏÔʾ£¬£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þͨ¹ýÐÞ¸Äpackage.jsonÎļþ×¢Èëbundle.js¾ç±¾£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃTruffleHog¹¤¾ßɨÃèÖ÷»úÁîÅÆºÍÔÆÆ¾Ö¤£¬£¬£¬£¬£¬£¬£¬ÑéÖ¤ºó½¨ÉèGitHub ActionsÊÂÇéÁ÷£¬£¬£¬£¬£¬£¬£¬½«Ãô¸ÐÊý¾Ýй¶ÖÁÓ²±àÂëwebhook¶Ëµã¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ"×ÔÎÒ×ÌÉú"ÌØÕ÷ʹ¹¥»÷ÄÜ×Ô¶¯Ñ¬È¾Í³Ò»Î¬»¤ÕߵįäËûÈí¼þ°ü£¬£¬£¬£¬£¬£¬£¬Ðγɼ¶ÁªÐ§Ó¦¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìÆóÒµ·½Ã棬£¬£¬£¬£¬£¬£¬CrowdStrikeѸËÙɾ³ý¶ñÒâ°ü²¢ÂÖ»»ÃÜÔ¿£¬£¬£¬£¬£¬£¬£¬Ç¿µ÷Æä½¹µãƽ̨δÊÜÓ°Ï죻£»£»£»¹È¸èGemini CLIËäÔ´´úÂëÇå¾²£¬£¬£¬£¬£¬£¬£¬µ«Óû§Ðè¼ì²é×°ÖÃÇéÐΡ£¡£¡£¡£¡£¡£¡£ÊÂÎñ̻¶·ºÆð´úÈí¼þ¹©Ó¦Á´µÄųÈõÐÔ£¬£¬£¬£¬£¬£¬£¬µ¥¸öά»¤ÕßÕË»§Ð¹Â¶¼´¿É²¨¼°Êý°ÙÏîÄ¿¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/self-propagating-supply-chain-attack-hits-187-npm-packages/
5. ÐÂÐÍFileFix¹¥»÷ʹÓÃÒþдÊõÖ²ÈëStealC¶ñÒâÈí¼þ
9ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬Acronis·¢Ã÷Ò»ÖÖÃûΪFileFixµÄÐÂÐÍÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ð³äMetaÕË»§ÔÝÍ£ÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÈ«ÐÄÉè¼ÆµÄÍøÂç´¹ÂÚÒ³ÃæÓÕÆÓû§½«¶ñÒâPowerShellÏÂÁîÕ³ÌùÖÁÎļþ×ÊÔ´ÖÎÀíÆ÷µØµãÀ¸£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔÚ²»ÖªÇéµÄÇéÐÎÏÂ×°ÖÃStealCÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á÷³ÌÏÔʾ£¬£¬£¬£¬£¬£¬£¬´¹ÂÚÒ³Ãæ»áÌáÐÑÓû§µã»÷¡°¸´ÖÆ¡±°´Å¥»ñÈ¡¿´ËÆÎļþ·¾¶µÄ¡°ÊÂÎñ±¨¸æ¡±£¬£¬£¬£¬£¬£¬£¬ÏÖʵ¸´ÖƵÄÊÇÌí¼ÓÁ˿ոñµÄ¶ñÒâPowerShellÏÂÁî¡£¡£¡£¡£¡£¡£¡£µ±Óû§½«´ËÏÂÁîÕ³ÌùÖÁÎļþ×ÊÔ´ÖÎÀíÆ÷µØµãÀ¸Ê±£¬£¬£¬£¬£¬£¬£¬½öÏÔʾÎļþ·¾¶£¬£¬£¬£¬£¬£¬£¬Òþ²ØµÄ¶ñÒâÏÂÁîÔò±»Ö´ÐС£¡£¡£¡£¡£¡£¡£¸ÃÏÂÁî»á´ÓBitbucketÏÂÔØÒþ²ØÔÚJPGͼÏñÖеĵڶþ½×¶Î¾ç±¾£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÒþдÊõÌáÈ¡²¢½âÃÜÄÚ´æÖеÄÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬£¬×îÖÕ°²ÅÅStealC¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£StealC¿ÉÇÔÈ¡Óû§×°±¸ÖеÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨Chrome¡¢FirefoxµÈä¯ÀÀÆ÷µÄƾ֤ºÍÉí·ÝÑéÖ¤cookie£¬£¬£¬£¬£¬£¬£¬Discord¡¢TelegramµÈͨѶӦÓÃµÄÆ¾Ö¤£¬£¬£¬£¬£¬£¬£¬±ÈÌØ±Ò¡¢ÒÔÌ«·»µÈ¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬AWS¡¢AzureµÈÔÆÆ¾Ö¤£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ProtonVPN¡¢Battle.netµÈVPNºÍÓÎÏ·Ó¦ÓÃÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Í¬Ê±¾ß±¸½ØÈ¡»î¶¯×ÀÃæÆÁÄ»½ØÍ¼µÄÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-filefix-attack-uses-steganography-to-drop-stealc-malware/
6. °¢À˹¼ÓANHCÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬Ó°Ïì6ÍòÃû»¼Õß
9ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬°¢À˹¼ÓÖݰ²¿ËÀׯæÉçÇø¿µ½¡ÖÐÐÄ£¨ANHC£©¿ËÈÕÔâÓö´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯Éù³ÆÒÑй¶6Íò·Ý»¼Õ߼ͼ¡£¡£¡£¡£¡£¡£¡£ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©°²¿ËÀׯæÐ§ÀÍ´¦ÒÑ×¢ÖØµ½¸ÃÖ¸¿Ø£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖ½«ÑÏËà¿´´ý´ËÀàÊÂÎñ£¬£¬£¬£¬£¬£¬£¬µ«Æ¾Ö¤Õþ²ßÎÞ·¨Í¸Â¶ÊÓ²ìϸ½Ú¡£¡£¡£¡£¡£¡£¡£ANHC¹ÙÍøÖ¤ÊµÍøÂç±£´æÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ÒÑÆô¶¯È¡Ö¤ÊӲ첢ÏÂÏßÊÜÓ°Ïìϵͳ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÓëµÚÈý·½ÍøÂçÇ徲ר¼ÒÏàÖú£¬£¬£¬£¬£¬£¬£¬²¢Í¨ÖªÖ´·¨²¿·Ö¡£¡£¡£¡£¡£¡£¡£ÊÂÎñÓ°Ïì·½Ãæ£¬£¬£¬£¬£¬£¬£¬»¼ÕßÒÁÀöɯ°×͸¶ÆäСÎÒ˽¼ÒÐÅÏ¢£¨°üÀ¨Éç±£ºÅ¡¢µØµã¡¢µç»°µÈ£©±»ºÚ¿Íͨ¹ýµç×ÓÓʼþÖ±½Óй¶¡£¡£¡£¡£¡£¡£¡£ANHC»ØÓ¦³ÆÒÑÏòÊÜÓ°Ï컼ÕßÌṩÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬£¬²¢ÔÊÐíÒ»Äêºó¼ÌÐøÌṩÉí·Ý͵ÇÔ±£»£»£»£»¤£¬£¬£¬£¬£¬£¬£¬µ«²¿·Ö»¼Õß·´Ó¦»ñȡЧÀÍÐè×Ô¶¯ÕùÈ¡¡£¡£¡£¡£¡£¡£¡£°¢À˹¼ÓÐÂÎÅÔ´¡¢Öݹ«¹²Çå¾²²¿µÈ¶à·½ÒÑÊÕµ½ºÚ¿ÍÓʼþ¸±±¾£¬£¬£¬£¬£¬£¬£¬ANHC»¹Òâʶµ½Î´¾ÊÚȨ·½ÁªÏµÁËÉçÇø²¿·ÖСÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£¡£
https://www.alaskasnewssource.com/2025/09/16/fbi-aware-anchorage-health-clinic-data-breach-hackers-claim-60k-patients-impacted/


¾©¹«Íø°²±¸11010802024551ºÅ