ð³äBooking.comµÄÍøÂç´¹ÂڻʹÓÃClickFix¹¥»÷ÇÔÊØÐÅÏ¢

Ðû²¼Ê±¼ä 2025-03-14

1. ð³äBooking.comµÄÍøÂç´¹ÂڻʹÓÃClickFix¹¥»÷ÇÔÊØÐÅÏ¢


3ÔÂ13ÈÕ£¬£¬£¬Î¢Èí¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬Ö¸³ö±£´æÒ»Æðð³äBooking.comµÄÍøÂç´¹Âڻ£¬£¬£¬¸Ã»î¶¯×Ô2024Äê12ÔÂÆðÒ»Á¬ÖÁ½ñ£¬£¬£¬Ö÷ÒªÕë¶ÔÂùݡ¢ÂÃÐÐÉçµÈʹÓÃBooking.comÔ¤¶©Ð§À͵Ä×éÖ¯Ô±¹¤¡£¡£¡£¡£¹¥»÷ÕßʹÓÃClickFixÉç»á¹¤³Ì¹¥»÷ÊֶΣ¬£¬£¬Í¨¹ý·¢Ëͺ¬ÓжñÒâÈí¼þµÄµç×ÓÓʼþ£¬£¬£¬ÒâÍ¼Ð®ÖÆÔ±¹¤ÕË»§²¢ÇÔÈ¡¿Í»§¸¶¿îÏêÇéºÍСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¾Ý΢ÈíÇå¾²Ñо¿Ö°Ô±ÆÊÎö£¬£¬£¬´Ë´Î»î¶¯ÓÉÃûΪ¡°Storm-1865¡±µÄÍþв×éÖ¯Ìᳫ¡£¡£¡£¡£Ôڴ˴λÖУ¬£¬£¬¹¥»÷Õß·¢ËÍαװ³É¿ÍÈËѯÎÊBooking.comÏà¹ØÊÂÒ˵ĵç×ÓÓʼþ£¬£¬£¬ÓʼþÖаüÀ¨ÐéαµÄCAPTCHAÒ³ÃæÁ´½Ó»òPDF¸½¼þ£¬£¬£¬ÓÕÆ­Êܺ¦ÕßÖ´ÐÐÒþ²ØµÄmshta.exeÏÂÁî¡£¡£¡£¡£¸ÃÏÂÁî»áÔÚ¹¥»÷ÕßЧÀÍÆ÷ÉÏÖ´ÐжñÒâHTMLÎļþ£¬£¬£¬½ø¶øÏÂÔØ²¢×°ÖöàÖÖRATºÍÐÅÏ¢ÇÔÈ¡Èí¼þ£¬£¬£¬ÈçXWorm¡¢Lumma stealerµÈ¡£¡£¡£¡£ÕâЩÓÐÓÃÔØºÉ¾ßÓÐÇÔÈ¡²ÆÎñÊý¾ÝºÍƾ֤ÒÔ¹©Ú²Æ­Ê¹ÓõÄÄÜÁ¦£¬£¬£¬ÊÇStorm-1865»î¶¯µÄµä·¶ÌØÕ÷¡£¡£¡£¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬£¬£¬Î¢Èí½¨ÒéÓû§Ê¼ÖÕÈ·ÈÏ·¢¼þÈ˵صãµÄÕýµ±ÐÔ£¬£¬£¬¶Ô½ôÆÈÐж¯ºôÓõ¼á³ÖСÐÄ£¬£¬£¬²¢Ñ°ÕÒ¿ÉÄܵį´Ð´¹ýʧÒÔʶ±ðÕ©Æ­¡£¡£¡£¡£Í¬Ê±£¬£¬£¬½¨Òéͨ¹ý×ÔÁ¦µÇ¼ƽ̨ÑéÖ¤Booking.comÕË»§×´Ì¬ºÍ´ý´¦Öóͷ£¾¯±¨£¬£¬£¬×èÖ¹µã»÷µç×ÓÓʼþÖеÄÁ´½Ó£¬£¬£¬ÒÔ½µµÍ±»¹¥»÷µÄΣº¦¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/clickfix-attack-delivers-infostealers-rats-in-fake-bookingcom-emails/


2. Mora_001ʹÓÃFortinetÎó²î°²ÅÅSuperBlackÀÕË÷Èí¼þ


3ÔÂ13ÈÕ£¬£¬£¬ÃûΪ¡°Mora_001¡±µÄÀÕË÷Èí¼þÔËÓªÉÌÕýÔÚʹÓÃFortinetÅû¶µÄÁ½¸öÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2024-55591ºÍCVE-2025-24472£©À´»ñÈ¡·À»ðǽװ±¸µÄδÊÚȨ»á¼û£¬£¬£¬²¢°²ÅŶ¨ÖƵÄSuperBlackÀÕË÷Èí¼þ¡£¡£¡£¡£ÕâÁ½¸öÎó²î»®·ÖÔÚ2024Äê1ÔºÍ2Ô±»Fortinet¹ûÕæ£¬£¬£¬µ«CVE-2024-55591×Ô2024Äê11ÔÂÆð¾ÍÒѱ»ÓÃ×÷ÁãÈÕÎó²î¾ÙÐй¥»÷¡£¡£¡£¡£¶ø¹ØÓÚCVE-2025-24472£¬£¬£¬Ö»¹Ü×î³õFortinetÌåÏÖ²»ÇåÎúÊÇ·ñ±»Ê¹Ó㬣¬£¬µ«ForescoutÑо¿Ö°Ô±ÔÚ2025Äê1ÔÂÏÂÑ®·¢Ã÷ÁËSuperBlack¹¥»÷£¬£¬£¬Åú×¢¸ÃÎó²îÒ²Òѱ»Ê¹Óᣡ£¡£¡£Mora_001ÔËÓªÉÌͨ¹ýÕâÁ½¸öÎó²î»ñµÃ¡°super_admin¡±È¨ÏÞ£¬£¬£¬½¨ÉèÐÂÖÎÀíÔ±ÕÊ»§£¬£¬£¬²¢ÊµÑéºáÏòÒÆ¶¯ÒÔÇÔÈ¡Êý¾Ý¡£¡£¡£¡£Ö®ºó£¬£¬£¬ËûÃÇʹÓÃ×Ô½ç˵¹¤¾ß¼ÓÃÜÎļþÒÔ¾ÙÐÐË«ÖØÀÕË÷£¬£¬£¬²¢ÔÚ¼ÓÃÜ¿¢Êºó°²ÅÅÀÕË÷ÐÅ¡£¡£¡£¡£±ðµÄ£¬£¬£¬»¹°²ÅÅÁËÃûΪ¡°WipeBlack¡±µÄ¶¨ÖƲÁ³ýÆ÷ÒÔɾ³ýºÛ¼£¡£¡£¡£¡£Forescout·¢Ã÷SuperBlackÓëLockBitÀÕË÷Èí¼þÖ®¼ä±£´æÏ¸ÃÜÁªÏµ£¬£¬£¬Ö»¹ÜǰÕßËÆºõÊÇ×ÔÁ¦Ðж¯£¬£¬£¬µ«Á½ÕßÔÚ¼ÓÃÜÆ÷½á¹¹¡¢Êê½ð¼Í¼ÖеÄTOX̸ÌìIDÒÔ¼°IPµØµãµÈ·½Ãæ±£´æ´ó×ÚÖØµþ¡£¡£¡£¡£Forescout·ÖÏíÁËÓëSuperBlack¹¥»÷Ïà¹ØµÄÈëÇÖÖ¸±êÁбíÒÔ¹©·ÀÓù²Î¿¼¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-superblack-ransomware-exploits-fortinet-auth-bypass-flaws/


3. CISAÖÒÑÔApple WebKitÔ½½çдÈëÎó²îÕýÔÚ±»Ò°ÍâʹÓÃ


3ÔÂ13ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©·¢³öÖÒÑÔ£¬£¬£¬Ö¸³öÆ»¹ûWebKitä¯ÀÀÆ÷ÒýÇæ±£´æÒ»¸öÒѱ»Ò°ÍâʹÓõÄÁãÈÕÎó²î£¬£¬£¬±àºÅΪCVE-2025-24201¡£¡£¡£¡£ÕâÊÇÒ»¸öÔ½½çдÈëÎÊÌ⣬£¬£¬¹¥»÷Õß¿Éͨ¹ýÈ«ÐĽṹµÄ¶ñÒâÍøÒ³ÄÚÈÝ£¬£¬£¬Í»ÆÆWeb ContentɳºÐ¸ôÀ룬£¬£¬ÔÚÊÜÓ°Ïì×°±¸ÉÏÖ´ÐÐδ¾­ÊÚȨµÄ´úÂ룬£¬£¬ÉõÖÁ°²ÅÅÌØ¹¤Èí¼þ¡£¡£¡£¡£¸ÃÎó²îÆÕ±éÓ°ÏìiPhone XS¼°ºóÐø»úÐÍ¡¢iPad ProϵÁС¢iPad AirϵÁС¢iPadϵÁС¢iPad miniϵÁС¢ÔËÐÐmacOS SequoiaµÄMac×°±¸ÒÔ¼°Apple Vision Pro£¬£¬£¬Í¬Ê±iOSºÍiPadOSÉϵĵÚÈý·½ä¯ÀÀÆ÷Ò²Êܵ½Ó°Ï죬£¬£¬ÓÉÓÚËüÃDZØÐèʹÓÃWebKitÒýÇæ¡£¡£¡£¡£Æ»¹ûÒÑÈ·ÈÏ£¬£¬£¬¸ÃÎó²î¿ÉÄÜÔÚÕë¶ÔÌØ¶¨Ð¡ÎÒ˽¼ÒµÄ¡°¼«ÆäÖØ´ó¡±µÄ¹¥»÷Öб»Ê¹Ó㬣¬£¬²¢ÒÑÐû²¼¸üоÙÐÐÐÞ¸´¡£¡£¡£¡£CISA½¨ÒéÓû§Æ¾Ö¤¹©Ó¦ÉÌָʾ½ÓÄÉ»º½â²½·¥£¬£¬£¬°üÀ¨Á¬Ã¦¸üÐÂ×°±¸¡¢×èÖ¹µã»÷²»¿ÉÐÅÁ´½ÓºÍ»á¼ûÎ´ÖªÍøÕ¾¡¢¼à¿Ø×°±¸ÐÐΪÒÔ¼°ÆôÓÃ×Ô¶¯¸üС£¡£¡£¡£¹ØÓÚ¸ßΣº¦Óû§ºÍÆóÊÂÒµÓû§£¬£¬£¬½¨ÒéÆôÓÃËø¶¨Ä£Ê½ÒÔÔöÇ¿·À»¤ÄÜÁ¦¡£¡£¡£¡£ÆóÒµÓû§»¹Ó¦°²ÅÅÒÆ¶¯×°±¸ÖÎÃ÷È·¾ö¼Æ»®£¬£¬£¬È·±£×°±¸ÊµÊ±¸üУ¬£¬£¬²¢¼à¿ØÍøÂç»î¶¯ÒÔ·¢Ã÷DZÔÚ¹¥»÷¼£Ï󡣡£¡£¡£


https://cybersecuritynews.com/cisa-warns-of-apple-webkit-out-of-bounds-write/


4. ESHYFTÊý¾Ý¿âÉèÖùýʧÖÂ86,000ÃûÒ½»¤Ö°Ô±Ãô¸ÐÊý¾Ýй¶


3ÔÂ13ÈÕ£¬£¬£¬ESHYFT ÊÇÒ»¼Ò×ܲ¿Î»ÓÚÐÂÔóÎ÷ÖݵĿµ½¡¿Æ¼¼¹«Ë¾£¬£¬£¬ÓªÒµÆÕ±é 29 ¸öÖÝ¡£¡£¡£¡£¿ËÈÕ£¬£¬£¬Ò»¸öÉèÖùýʧµÄÊý¾Ý¿â̻¶ÁËESHYFTÆìÏÂ86,000¶àÃûÒ½»¤Ö°Ô±µÄ108.8 GBÃô¸ÐÊý¾Ý£¬£¬£¬°üÀ¨SSN¡¢Éí·ÝÖ¤¼þɨÃè¼þ¡¢Ð½×ÊÏêÇéµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£¡£¡£¸ÃÊý¾Ý¿âûÓÐÃÜÂë±£»£»£»£»£»£»¤»ò¼ÓÃÜ£¬£¬£¬ÓÉÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷¡£¡£¡£¡£±»Ð¹Â¶µÄÊý¾Ý»¹°üÀ¨Ð¡ÎÒ˽¼Ò×ÊÁÏͼÏñ¡¢Ã沿ͼÏñ¡¢×¨ÒµÖ¤Êé¡¢ÊÂÇéʹÃüЭÒéµÈ£¬£¬£¬ÒÔ¼°Ò»·ÝÏêϸ¼Í¼ÁË80¶àÍòÌõ»¤Ê¿ÐÅÏ¢µÄµç×Ó±í¸ñ¡£¡£¡£¡£±ðµÄ£¬£¬£¬Ò½ÁÆÎļþÒ²±»Ð¹Â¶£¬£¬£¬¿ÉÄÜÊܵ½HIPAA¹æÔòµÄÔ¼Êø¡£¡£¡£¡£Ö»¹ÜFowlerÁ¬Ã¦Í¨ÖªÁËESHYFT£¬£¬£¬µ«¸Ã¹«Ë¾»¨ÁËÒ»¸ö¶àÔ²ÅÏÞÖÆ¹«ÖÚ»á¼û¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÊý¾Ý¿âÊÇ·ñÓÉESHYFTÓµÓлòÖ±½ÓÖÎÀí£¬£¬£¬ÒÔ¼°Ì»Â¶µÄÒ»Á¬Ê±¼äºÍÊÇ·ñÓÐδ¾­ÊÚȨµÄÖ°Ô±»á¼ûÊý¾Ý¡£¡£¡£¡£ÍøÂç·¸·¨·Ö×Ó¿ÉÄÜ»áʹÓÃÕâЩÊý¾ÝʵÑé·¸·¨»òÓÕÆ­Êܺ¦Õß¡£¡£¡£¡£Òò´Ë£¬£¬£¬HealthTech±ØÐèʵÑéÊʵ±µÄÍøÂçÇå¾²²½·¥£¬£¬£¬ÈçÇ¿ÖÆ¼ÓÃÜÃô¸ÐÊý¾Ý¡¢Ê¹ÓöàÒòËØÉí·ÝÑéÖ¤¡¢¾ÙÐа´ÆÚÇå¾²ÉóºËµÈ£¬£¬£¬ÒÔ±£»£»£»£»£»£»¤Óû§Êý¾ÝÇå¾²¡£¡£¡£¡£Í¬Ê±£¬£¬£¬Öƶ©Êý¾Ýй¶Ӧ¶ÔÍýÏë¡¢½¨ÉèÏàͬÇþµÀ¡¢ÌṩÈÏÕæÈεÄÅû¶֪ͨ²¢½ÌÓýÓû§Ê¶±ðÍøÂç´¹ÂÚÍýÏëÒ²ÊÇÐëÒªµÄ¡£¡£¡£¡£


https://hackread.com/healthtech-database-exposed-medical-employment-records/


5. ºÚ¿ÍÀÄÓÃMicrosoft Copilot¾ÙÐÐÖØ´óµÄÍøÂç´¹ÂÚ¹¥»÷


3ÔÂ13ÈÕ£¬£¬£¬Ëæ×ÅMicrosoft CopilotÔÚ2023ÄêÍÆ³ö²¢Ñ¸ËÙ³ÉΪÐí¶à×éÖ¯²»¿É»òȱµÄÉú²úÁ¦¹¤¾ß£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÒ²Ãé×¼ÁËÕâһй¥»÷ǰÑÔ¡£¡£¡£¡£ËûÃÇʹÓÃÈ«ÐÄÖÆ×÷µÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬Ä£ÄâÕýµ±µÄMicrosoftͨѶ£¬£¬£¬ÓÕÆ­Óû§µã»÷Á´½Ó£¬£¬£¬´Ó¶øÖض¨Ïòµ½Î±ÔìµÄMicrosoft Copilot½Ó´ýÒ³Ãæ¡£¡£¡£¡£ÕâÐ©Ò³ÃæÓëÕýµ±µÄMicrosoft½çÃæ¸ß¶ÈÏàËÆ£¬£¬£¬µ«URL²¢²»ÊôÓÚMicrosoftÓò¡£¡£¡£¡£¹¥»÷Õß½øÒ»²½Ä£ÄâMicrosoftÉí·ÝÑéÖ¤Àú³Ì£¬£¬£¬ÓÕʹÓû§ÊäÈëÆ¾Ö¤£¬£¬£¬²¢·ºÆðڲƭÐÔµÄMicrosoft Authenticator¶àÖØÉí·ÝÑéÖ¤Ò³Ãæ¡£¡£¡£¡£´ËÀàÍøÂç´¹ÂڻÒѾ­ÏÔʾ³öÆäÑÏÖØÐÔ£¬£¬£¬¹¥»÷ÕßÉõÖÁ·¢Ë͵ç×ÓÓʼþÉù³ÆÏòÓû§ÊÕÈ¡Microsoft CopilotЧÀÍÓöȡ£¡£¡£¡£Ëæ×Å΢Èí¼ÌÐøÔÚÆä²úÆ·Ì×¼þÖм¯³ÉÈ˹¤ÖÇÄܹ¦Ð§£¬£¬£¬Ç徲רҵְԱ±ØÐèСÐÄзºÆðµÄÍþв£¬£¬£¬ÊµÑéÖÜÈ«µÄÇå¾²²½·¥ÒÔ·ÀÓùÕâЩÍþв¡£¡£¡£¡£Î¢ÈíºÍCofenseµÈ¹¤¾ß¿ÉÒÔ×ÊÖúʶ±ðºÍÖÎÀíÓÕÆ­·¢¼þÈË£¬£¬£¬×èֹDZÔÚÍþв¡£¡£¡£¡£ÏàʶÕâЩ¹¥»÷ÒªÁ첢ʵÑéÊʵ±µÄ±£»£»£»£»£»£»¤²½·¥£¬£¬£¬¿ÉÒÔ½µµÍ×é֯Σº¦£¬£¬£¬Í¬Ê±ÈÔÈ»ÊÜÒæÓÚMicrosoft CopilotµÈ¹¤¾ßÌṩµÄÉú²úÁ¦ÓÅÊÆ¡£¡£¡£¡£


https://cybersecuritynews.com/microsoft-copilot-phishing-attack/


6. ½Ý±ªÂ·»¢Ôâ¡°Rey¡±ºÚ¿ÍÈëÇÖ£¬£¬£¬700·ÝÃô¸ÐÊý¾Ýй¶


3ÔÂ12ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬Ò»Ãû¼ÙÃû¡°Rey¡±µÄÍþвÐÐΪÕßÈëÇÖÁËÓ¢¹úÖøÃûÆû³µÖÆÔìÉ̽ݱªÂ·»¢£¨JLR£©µÄÄÚ²¿ÏµÍ³£¬£¬£¬²¢Ð¹Â¶ÁËÔ¼700·Ý°üÀ¨Ãô¸ÐÊÖÒÕºÍÔËÓªÊý¾ÝµÄÄÚ²¿Îļþ£¬£¬£¬Ê×´ÎÔÚ°µÍøÂÛ̳ÉÏÐû²¼¡£¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÉæ¼°¶à¸öÖֱ𣬣¬£¬°üÀ¨×¨ÓÐÔ´´úÂë¡¢³µÁ¾¿ª·¢ÈÕÖ¾¡¢¸ú×ÙÊý¾Ý¼¯ÒÔ¼°Ô±¹¤Êý¾Ý¿âµÈ£¬£¬£¬¿ÉÄܶԸù«Ë¾µÄ֪ʶ²úȨÇå¾²ºÍÔ±¹¤Òþ˽Ôì³ÉÑÏÖØÍþв¡£¡£¡£¡£´Ë´ÎйÃÜÊÂÎñÈôÊÇ»ñµÃ֤ʵ£¬£¬£¬½«³ÉΪ½Ý±ªÂ·»¢ÃæÁÙµÄ×îÑÏÖØµÄÍøÂçÇå¾²Íþв֮һ¡£¡£¡£¡£ÍøÂçÇå¾²ÆÊÎöÊ¦ÍÆ²â£¬£¬£¬Êý¾Ýй¶¿ÉÄÜÔ´×ÔÊܵ½¹¥»÷µÄ¹«Ë¾Ð§ÀÍÆ÷»òÔÆ´æ´¢¿â¡£¡£¡£¡£Ö»¹ÜÉÐδÃ÷È·Ìá¼°Êê½ðÒªÇ󣬣¬£¬µ«Ð¹Â¶Êý¾ÝµÄÊÖÒÕÐÔ×Ó¿ÉÄÜʹ¾ºÕùµÐÊÖÊÜÒæ¡£¡£¡£¡£½Ý±ªÂ·»¢ÉÐδ¾Í´Ë½ÒÏþ¹Ù·½ÉùÃ÷£¬£¬£¬µ«ÍøÂçÇå¾²¹«Ë¾ÒÑ×îÏÈÑé֤й¶Êý¾ÝµÄÕæÊµÐÔ¡£¡£¡£¡£´Ë´ÎÊÂÎñ͹ÏÔÁËÆû³µÐÐÒµÊý×Ö»ù´¡ÉèÊ©µÄųÈõÐÔ£¬£¬£¬×¨¼Ò½¨ÒéJLRÁ¬Ã¦ÉóºË´úÂë´æ´¢¿â£¬£¬£¬ÔöÇ¿¿ª·¢ÕßÕË»§µÄÇå¾²²½·¥£¬£¬£¬²¢¾ÙÐÐÉøÍ¸²âÊÔ¡£¡£¡£¡£¹ØÓÚÔ±¹¤À´Ëµ£¬£¬£¬Æ¾Ö¤¼à¿ØºÍÇå¾²ÒâʶÅàѵҲÖÁ¹ØÖ÷Òª¡£¡£¡£¡£´Ë´ÎйÃÜÊÂÎñÔٴξ¯ÐÑÈËÃÇ£¬£¬£¬Æû³µÖÆÔìÉÌÔÚÈÕÒæÓÉÈí¼þÇý¶¯µÄÐÐÒµÖÐÃæÁÙ×Åһֱת±äµÄÍþв£¬£¬£¬Á¢ÒìÓëÍøÂçÇå¾²Ö®¼äµÄƽºâÈÔÈ»²»Îȹ̡£¡£¡£¡£


https://cybersecuritynews.com/threat-actor-allegedly-claiming-breach/