ÎÚ¿ËÀ¼Ôâ¶à×éÍþвÐÐΪÕßÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2025-08-081. ÎÚ¿ËÀ¼Ôâ¶à×éÍþвÐÐΪÕßÍøÂç¹¥»÷
8ÔÂ6ÈÕ£¬£¬£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×飨CERT-UA£©¿ËÈÕÐû²¼¾¯±¨£¬£¬£¬Ö¸³ö¸Ã¹úÕþ¸®»ú¹¹¡¢¹ú·À²½¶Ó¼°¹ú·À¹¤ÒµÆóÒµÕýÔâÊܶà¸öÍþвÐÐΪÕßµÄÒ»Á¬ÍøÂç¹¥»÷¡£¡£¡£ÆäÖУ¬£¬£¬UAC-0099×éÖ¯ÓëGamaredonÕûÌåÓÈΪ»îÔ¾£¬£¬£¬¶þÕß¾ùͨÏ꾡ÃÜÉè¼ÆµÄÍøÂç´¹ÂÚÊÖ¶ÎÉøÍ¸Ä¿µÄϵͳ£¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢½¨É賤ÆÚ»¯»á¼û¡£¡£¡£UAC-0099×éÖ¯×Ô2023Äê6ÔÂÊ״α»¹ûÕæ¼Í¼ÒÔÀ´£¬£¬£¬¶à´ÎÒÔÎÚ¿ËÀ¼ÊµÌåÎªÌØ¹¤»î¶¯Ä¿µÄ¡£¡£¡£Æä×îй¥»÷ʹÓ÷¨Ôº´«Æ±Ö÷ÌâµÄ´¹ÂÚÓʼþ£¬£¬£¬Í¨¹ýCuttlyµÈURLËõ¶ÌЧÀÍ·¢ËÍÁ´½Ó£¬£¬£¬ÓÕµ¼Êܺ¦ÕßÏÂÔØ°üÀ¨HTMLÓ¦ÓóÌÐò£¨HTA£©µÄË«´æµµÎļþ¡£¡£¡£Ö´Ðк󣬣¬£¬»ìÏýµÄVisual Basic¾ç±¾»á½¨ÉèÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯£¬£¬£¬²¢¼ÓÔØMATCHBOIL¶ñÒâÈí¼þ£¬£¬£¬×îÖÕͶ·ÅMATCHWOKºóÃż°DRAGSTAREÊý¾ÝÇÔÈ¡³ÌÐò¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬Çå¾²³§ÉÌESETµÄ±¨¸æÕ¹ÏÖ£¬£¬£¬¶íÂÞ˹Åä¾°µÄGamaredonÕûÌåÔÚ2024ÄêϰëÄêÏÔÖøÔöÇ¿Á˶ÔÎÚ¿ËÀ¼µÄ¡°ÎÞÇ顱Óã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¸Ã×éÖ¯½ÓÄÉÁùÖÖÐÂÐ͹¤¾ß£¬£¬£¬°üÀ¨ÓÃÓÚÕï¶ÏÊý¾ÝÍøÂçµÄPteroDespair¡¢ºáÏòÒÆ¶¯µÄPteroTickleÎäÆ÷»¯¹¤¾ß£¬£¬£¬ÒÔ¼°Í¨¹ýTelegraph API½¨Éè¼ÓÃÜͨµÀµÄPteroGraphin³¤ÆÚ»¯¹¤¾ß¡£¡£¡£
https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
2. Ç÷ÊÆ¿Æ¼¼Apex Oneƽ̨ÏÖ»îԾʹÓõÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î
8ÔÂ6ÈÕ£¬£¬£¬ÍøÂçÇå¾²³§ÉÌÇ÷ÊÆ¿Æ¼¼¿ËÈÕÏò¿Í»§·¢³ö½ôÆÈÖÒÑÔ£¬£¬£¬³ÆÆäApex One¶ËµãÇ徲ƽ̨ÕýÔâÊÜÕë¶ÔÁ½¸öÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-54948¡¢CVE-2025-54987£©µÄ»îԾʹÓ㬣¬£¬±Þ²ßÓû§Á¬Ã¦½ÓÄÉ·À»¤²½·¥¡£¡£¡£´Ë´ÎÎó²îÔ´ÓÚApex OneÖÎÀí¿ØÖÆÌ¨£¨ÍâµØ°æ£©µÄÏÂÁî×¢ÈëȱÏÝ£¬£¬£¬ÔÊÐíÔ¤ÏÈͨ¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚδÐÞ²¹µÄϵͳÉÏÔ¶³ÌÖ´ÐÐí§Òâ´úÂë¡£¡£¡£Ö»¹ÜÎó²îÐè¹¥»÷Õ߾߱¸¿ØÖÆÌ¨»á¼ûȨÏÞ£¬£¬£¬µ«Ç÷ÊÆ¿Æ¼¼Ã÷È·ÌåÏÖÒÑÊӲ쵽ÖÁÉÙÒ»ÆðÒ°ÍâʹÓð¸Àý£¬£¬£¬ÈÕ±¾CERTҲͬ²½Ðû²¼Ô¤¾¯£¬£¬£¬Ç¿µ÷ÆäÏÖʵÍþвÐÔ¡£¡£¡£ÎªÓ¦¶Ô½ôÆÈÇéÐΣ¬£¬£¬Ç÷ÊÆ¿Æ¼¼³Æ2025Äê8ÔÂÖÐÑ®Ðû²¼²¹¶¡£¡£¡£¬£¬£¬²¢Ìṩ¶ÌÆÚ»º½â¹¤¾ß¡£¡£¡£¸Ã¹¤¾ßͨ¹ý½ûÓÃÖÎÀíÔ±´ÓApex One¿ØÖÆÌ¨Ô¶³Ì°²ÅÅÊðÀíµÄ¹¦Ð§£¬£¬£¬¿ÉÍêÈ«×è¶ÏÒÑÖªÎó²îʹÓ÷¾¶£¬£¬£¬µ«»áµ¼ÖÂÔÝʱʧȥԶ³ÌÖÎÀíÄÜÁ¦¡£¡£¡£¹«Ë¾½¨ÒéÓû§ÓÅÏȰ²ÅŴ˹¤¾ß£¬£¬£¬×ÝÈ»ÐèÎþÉü²¿·Ö±ãµ±ÐÔÒÔÈ·±£¶ËµãÇå¾²¡£¡£¡£½øÒ»²½·À»¤½¨Òé°üÀ¨£ºÈô¿ØÖÆÌ¨IPµØµã̻¶ÓÚÍâ²¿ÍøÂ磬£¬£¬Ó¦Á¬Ã¦ÊµÑéÔ´IPÏÞÖÆµÈ»á¼û¿ØÖƲ½·¥¡£¡£¡£
https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-endpoint-protection-zero-day-exploited-in-attacks/
3. еġ°ÓÄÁéµç»°¡±Õ½ÊõʹÓÃZoomºÍMicrosoft Teams¾ÙÐÐC2²Ù×÷
8ÔÂ6ÈÕ£¬£¬£¬ÔÚBlackHat USA 2025´ó»áÉÏ£¬£¬£¬PraetorianÇå¾²Ñо¿Ô±Adam CrosserÕ¹ÏÖÁËÒ»ÖÖÃûΪ"ÓÄÁéºô½Ð"£¨Ghost Calls£©µÄÐÂÐͺóʹÓÃÏÂÁîÓë¿ØÖÆ£¨C2£©¹æ±ÜÊÖÒÕ¡£¡£¡£¸ÃÊÖÒÕͨ¹ýÀÄÓÃZoom¡¢Microsoft TeamsµÈ¾Û»áÓ¦ÓóÌÐòʹÓõÄTURNÐÒéЧÀÍÆ÷£¬£¬£¬½«¶ñÒâC2Á÷Á¿Î±×°³ÉÕý³£ÊÓÆµ¾Û»áͨѶ£¬£¬£¬´Ó¶øÈƹý¹Å°åÍøÂçÇå¾²·ÀÓù¡£¡£¡£TURNÐÒé±¾ÊÇÓÃÓÚ×ÊÖúNAT·À»ðǽºó×°±¸½¨ÉèÊÓÆµÍ¨»°¡¢VoIPµÈʵʱͨѶµÄ¸¨ÖúÐÒé¡£¡£¡£µ±Óû§¼ÓÈëZoom»òTeams¾Û»áʱ£¬£¬£¬¿Í»§¶Ë»á»ñÈ¡ÔÝʱTURNƾ֤ÒÔ½¨ÉèÖмÌÅþÁ¬¡£¡£¡£"ÓÄÁéºô½Ð"ͨ¹ýÐ®ÖÆÕâЩÕýµ±Æ¾Ö¤£¬£¬£¬ÔÚ¹¥»÷ÕßÓëÊܺ¦Õß×°±¸¼ä¹¹½¨»ùÓÚWebRTCµÄ¼ÓÃÜËíµÀ£¬£¬£¬½«C2Ö¸Áîαװ³ÉͨÀýÊÓÆµ¾Û»áÁ÷Á¿¡£¡£¡£ÓÉÓÚÁ÷Á¿¾ÆóÒµ³£ÓÃÓòÃû·ÓÉ£¬£¬£¬ÇÒʹÓö˿Ú443µÄUDP/TCP×Ô˳Ӧ´«Ê䣬£¬£¬¿ÉÈÆ¹ý·À»ðǽ¡¢ÊðÀí¼°TLS¼ì²é£¬£¬£¬ÊµÏָ߶ÈÒþ²ØµÄÏÂÁî¿ØÖÆ¡£¡£¡£CrosserÖ¸³ö£¬£¬£¬Óë¹Å°åC2»úÖÆÏà±È£¬£¬£¬¸ÃÒªÁì¾ß±¸Èý´óÓÅÊÆ£ºÆäÒ»£¬£¬£¬ÎÞÐèÒÀÀµÈí¼þÎó²î£¬£¬£¬½öͨ¹ýÀÄÓÃÕýµ±»ù´¡ÉèÊ©¼´¿ÉʵÏÖ£»£»£»£»£»£»Æä¶þ£¬£¬£¬Ö§³Öʵʱ½»»¥£¬£¬£¬Öª×ãVNCÔ¶³Ì¿ØÖƵÈÐèÒªµÍÑӳٵIJÙ×÷ÐèÇ󣻣»£»£»£»£»ÆäÈý£¬£¬£¬¹¥»÷ÕßÎÞÐè̻¶×ÔÓÐÓòÃû»ò»ù´¡ÉèÊ©£¬£¬£¬¼«´ó½µµÍ×·×ÙΣº¦¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-ghost-calls-tactic-abuses-zoom-and-microsoft-teams-for-c2-operations/
4. µÂ¹úµçÐÅMagentaTVƽ̨Òò¹ã¸æÆ½Ì¨Îó²îй¶Óû§Êý¾Ý
8ÔÂ6ÈÕ£¬£¬£¬µÂ¹úµçÐÅ£¨Deutsche Telekom£©ÆìÏÂÓÎýÌåÆ½Ì¨MagentaTVÒòµÚÈý·½¹ã¸æÆ½Ì¨Îó²îÔâÓöÓû§Êý¾Ýй¶£¬£¬£¬Ð¹Â¶Ê±³¤´ïÊýÔ¡£¡£¡£Ñо¿ÍŶÓÓÚ2025Äê6ÔÂÖÐÑ®·¢Ã÷£¬£¬£¬ÓÉ¹ã¸æÊÖÒÕ¹«Ë¾EquativÆìϵÄServerside.aiÍйܵÄElasticsearchÊý¾Ý¿âδÉè±£»£»£»£»£»£»¤£¬£¬£¬µ¼ÖÂMagentaTVÓû§ÈÕÖ¾±»¹ûÕæÌ»Â¶¡£¡£¡£Ö»¹ÜµÂ¹úµçÐÅÔÚÍŶÓת´ïºóÒÑÏÂÏ߸ÃʵÀý£¬£¬£¬µ«Ì»Â¶Ê±´ú£¨ÖÁÉÙ×Ô2025Äê2ÔÂÆð£©ÀÛ»ýµÄ³¬3.24ÒÚÌõÈÕÖ¾×ÜÁ¿´ï729GBÒÑÃæÁÙDZÔÚÀÄÓÃΣº¦¡£¡£¡£´Ë´Îй¶µÄÊý¾ÝÖ÷ÒªÔ´ÓÚÓû§ÓëMagentaTVƽ̨µÄ½»»¥ÇëÇ󣬣¬£¬°üÀ¨HTTP±êÍ·ÖеķÇÃô¸ÐÐÅÏ¢£¨ÈçÓû§ÊðÀí£©¼°²¿·ÖÃô¸Ð±êʶ·û£¬£¬£¬°üÀ¨Î¨Ò»×°±¸±êʶ£¨MACµØµã£©¡¢ÍøÂçÅþÁ¬±êʶ£¨IPµØµã£©¡¢ÕË»§¹ØÁªID£¨¿Í»§ID¼°»á»°ID£©¡£¡£¡£Ö»¹Üµ¥ÌõÊý¾Ý¼ÛÖµÓÐÏÞ£¬£¬£¬µ«¹¥»÷Õß¿Éͨ¹ý½»Ö¯ÒýÓöàԴй¶Êý¾Ý£¨ÈçÀúʷй¶µÄIPÓëÓû§ÐÅϢƥÅ䣩ʵÏÖÓû§Éí·Ý×·×Ù»ò×°±¸¶¨Î»¡£¡£¡£
https://cybernews.com/security/deutsche-telekom-magentatv-data-leak/
5. ¹È¸èÔÚÒ»Á¬µÄSalesforceÊý¾Ý͵ÇÔ¹¥»÷ÖÐÔâÓöÊý¾Ýй¶
8ÔÂ6ÈÕ£¬£¬£¬¿Æ¼¼¾ÞÍ·Google¿ËÈÕÈ·ÈϳÉΪÀÕË÷×éÖ¯ShinyHuntersµÄ×îй¥»÷Ä¿µÄ£¬£¬£¬ÆäÆóÒµSalesforce¿Í»§¹ØÏµÖÎÀí£¨CRM£©ÏµÍ³ÔâÈëÇÖ£¬£¬£¬µ¼Ö²¿·Ö¿Í»§Êý¾Ýй¶¡£¡£¡£´Ë´ÎÊÂÎñÓë¸Ã×éÖ¯½üÆÚÕë¶ÔÈ«ÇòÆóÒµµÄ´ó¹æÄ£Êý¾ÝÇÔÈ¡Ðж¯Ïà¹Ø£¬£¬£¬Éæ¼°ÓïÒô´¹ÂÚ£¨Vishing£©Éç»á¹¤³Ì¹¥»÷¼°Salesforceƽ̨Îó²îʹÓᣡ£¡£¾ÝGoogleÅû¶£¬£¬£¬6ÔÂʱ´ú£¬£¬£¬ÆäÒ»¸öÓÃÓÚ´æ´¢ÖÐСÆóÒµÁªÏµÐÅÏ¢¼°Ïà¹Ø±¸×¢µÄSalesforceʵÀý£¬£¬£¬ÒòÔâÓö±»×·×ÙΪ¡°UNC6040¡±»ò¡°UNC6240¡±µÄÍþвÐÐΪÕß¹¥»÷¶øÊ§ÏÝ¡£¡£¡£¹¥»÷Õßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÇÖÈëϵͳ£¬£¬£¬ÔÚ¶ÌÔÝ»á¼û´°¿ÚÄÚÇÔÈ¡ÁË»ù´¡ÉÌÒµÐÅÏ¢£¬£¬£¬°üÀ¨ÆóÒµÃû³Æ¡¢ÁªÏµ·½·¨µÈ´ó²¿·ÖΪ¹ûÕæ»ò·ÇÃô¸ÐÊý¾Ý¡£¡£¡£GoogleÇ¿µ÷ÒÑѸËÙÇжÏÈëÇÖ·¾¶²¢Íê³ÉÓ°ÏìÆÊÎö£¬£¬£¬µ«Î´Ã÷È·ÏêϸÊÜÓ°Ïì¿Í»§ÊýÄ¿¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬´Ë´Î¹¥»÷Ä»ºóºÚÊÖʵΪÎÛÃûÕÑÖøµÄShinyHuntersÀÕË÷¼¯ÍÅ¡£¡£¡£´Ë´ÎÐж¯ÖУ¬£¬£¬ShinyHuntersͨ¹ýÈëÇÖÆóÒµSalesforceʵÀýÇÔÈ¡Êý¾Ý£¬£¬£¬²¢ÒÔ¹ûÕæÐ¹Â¶»ò³öÊÛÊý¾ÝΪÍþв¾ÙÐÐÀÕË÷¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-suffers-data-breach-in-ongoing-salesforce-data-theft-attacks/
6. ·¨¹ú²¼ÒÁ¸ñµçÐÅÔâÓö´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬640Íò¿Í»§ÐÅÏ¢ÊÜÓ°Ïì
8ÔÂ7ÈÕ£¬£¬£¬·¨¹úÖ÷ÒªµçÐÅÔËÓªÉ̲¼ÒÁ¸ñµçÐÅ£¨Bouygues Telecom£©Åû¶ÁËÒ»ÆðÖØ´óÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬Ô¼640Íò¿Í»§µÄСÎÒ˽¼ÒÊý¾ÝÔÚÕë¶ÔÐÔÍøÂç¹¥»÷ÖÐÔ⵽й¶¡£¡£¡£×÷Ϊ·¨¹úµÚÈý´óÒÆ¶¯Ð§ÀÍÌṩÉÌ£¬£¬£¬¸Ã¹«Ë¾ÓµÓÐ1450ÍòÒÆ¶¯Óû§¼°9000ÃûÔ±¹¤£¬£¬£¬2024ÄêÓªÊÕ´ï568ÒÚÅ·Ôª¡£¡£¡£¾Ý¹Ù·½ÉùÃ÷£¬£¬£¬¹¥»÷ÓÉ"ÒÑÖªÍøÂç·¸·¨¼¯ÍÅ"ʵÑ飬£¬£¬Í¨¹ýÇÖÈëÌØ¶¨ÄÚ²¿×ÊÔ´»ñÈ¡Á˿ͻ§ÁªÏµ·½·¨¡¢ÌõÔ¼ÐÅÏ¢¡¢»éÒö״̬¡¢ÆóÒµ¿Í»§×ÊÁϼ°¹ú¼ÊÒøÐÐÕ˺ţ¨IBAN£©µÈÃô¸ÐÊý¾Ý¡£¡£¡£ÖµµÃÇìÐÒµÄÊÇ£¬£¬£¬ÐÅÓÿ¨ºÅ¡¢ÕË»§ÃÜÂëµÈ½¹µã²ÆÎñÐÅϢδ±»ÇÔÈ¡¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬²¼ÒÁ¸ñµçÐÅÊÖÒÕÍŶÓѸËÙ×è¶Ï¹¥»÷Õß»á¼û·¾¶£¬£¬£¬²¢Ðͬ·¨¹ú¹ú¼ÒÍøÂçÇå¾²¾Ö£¨ANSSI£©ºÍÊý¾Ý±£»£»£»£»£»£»¤»ú¹¹CNILÕö¿ªÊӲ죬£¬£¬Í¬Ê±Ç¿»¯ÍøÂç¼à¿ØÓëÇå¾²·À»¤ÏµÍ³¡£¡£¡£Ð¹Â¶ÊÂÎñ¶Ô¿Í»§×é³ÉDZÔÚΣº¦£¬£¬£¬Ö»¹ÜIBANµ¥¶Àȱ·¦ÒÔÍê³ÉתÕ˲Ù×÷£¬£¬£¬µ«ÊÜÓ°ÏìÓû§ÈÔ±»½¨Òé°´ÆÚºË²éÒøÐÐÉúÒâ¼Í¼£¬£¬£¬²¢Ð¡ÐÄÒÔ¿Í»§ÐÕÃûºÍÕ˺ÅʵÑéµÄÍøÂç´¹ÂÚÕ©Æ¡£¡£¡£¹«Ë¾ÒÑͨ¹ý¶ÌÐźÍÓʼþÖ±½Ó֪ͨÊܺ¦Õߣ¬£¬£¬²¢Ã÷È·ÖÒÑÔÇÐÎðÏòÉù³ÆÕÆÎÕÆäСÎÒ˽¼ÒÐÅÏ¢µÄÀ´µçÕß͸¶µÇ¼ƾ֤µÈÃô¸Ð×ÊÁÏ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bouygues-telecom-confirms-data-breach-impacting-64-million-customers/


¾©¹«Íø°²±¸11010802024551ºÅ