ÎÚ¿ËÀ¼Ôâ¶à×éÍþвÐÐΪÕßÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2025-08-081. ÎÚ¿ËÀ¼Ôâ¶à×éÍþвÐÐΪÕßÍøÂç¹¥»÷
8ÔÂ6ÈÕ£¬£¬£¬£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×飨CERT-UA£©¿ËÈÕÐû²¼¾¯±¨£¬£¬£¬£¬Ö¸³ö¸Ã¹úÕþ¸®»ú¹¹¡¢¹ú·À²½¶Ó¼°¹ú·À¹¤ÒµÆóÒµÕýÔâÊܶà¸öÍþвÐÐΪÕßµÄÒ»Á¬ÍøÂç¹¥»÷¡£¡£¡£ÆäÖУ¬£¬£¬£¬UAC-0099×éÖ¯ÓëGamaredonÕûÌåÓÈΪ»îÔ¾£¬£¬£¬£¬¶þÕß¾ùͨÏ꾡ÃÜÉè¼ÆµÄÍøÂç´¹ÂÚÊÖ¶ÎÉøÍ¸Ä¿µÄϵͳ£¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢½¨É賤ÆÚ»¯»á¼û¡£¡£¡£UAC-0099×éÖ¯×Ô2023Äê6ÔÂÊ״α»¹ûÕæ¼Í¼ÒÔÀ´£¬£¬£¬£¬¶à´ÎÒÔÎÚ¿ËÀ¼ÊµÌåÎªÌØ¹¤»î¶¯Ä¿µÄ¡£¡£¡£Æä×îй¥»÷ʹÓ÷¨Ôº´«Æ±Ö÷ÌâµÄ´¹ÂÚÓʼþ£¬£¬£¬£¬Í¨¹ýCuttlyµÈURLËõ¶ÌЧÀÍ·¢ËÍÁ´½Ó£¬£¬£¬£¬ÓÕµ¼Êܺ¦ÕßÏÂÔØ°üÀ¨HTMLÓ¦ÓóÌÐò£¨HTA£©µÄË«´æµµÎļþ¡£¡£¡£Ö´Ðк󣬣¬£¬£¬»ìÏýµÄVisual Basic¾ç±¾»á½¨ÉèÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯£¬£¬£¬£¬²¢¼ÓÔØMATCHBOIL¶ñÒâÈí¼þ£¬£¬£¬£¬×îÖÕͶ·ÅMATCHWOKºóÃż°DRAGSTAREÊý¾ÝÇÔÈ¡³ÌÐò¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬Çå¾²³§ÉÌESETµÄ±¨¸æÕ¹ÏÖ£¬£¬£¬£¬¶íÂÞ˹Åä¾°µÄGamaredonÕûÌåÔÚ2024ÄêϰëÄêÏÔÖøÔöÇ¿Á˶ÔÎÚ¿ËÀ¼µÄ¡°ÎÞÇ顱Óã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¸Ã×éÖ¯½ÓÄÉÁùÖÖÐÂÐ͹¤¾ß£¬£¬£¬£¬°üÀ¨ÓÃÓÚÕï¶ÏÊý¾ÝÍøÂçµÄPteroDespair¡¢ºáÏòÒÆ¶¯µÄPteroTickleÎäÆ÷»¯¹¤¾ß£¬£¬£¬£¬ÒÔ¼°Í¨¹ýTelegraph API½¨Éè¼ÓÃÜͨµÀµÄPteroGraphin³¤ÆÚ»¯¹¤¾ß¡£¡£¡£
https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
2. Ç÷ÊÆ¿Æ¼¼Apex Oneƽ̨ÏÖ»îԾʹÓõÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î
8ÔÂ6ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²³§ÉÌÇ÷ÊÆ¿Æ¼¼¿ËÈÕÏò¿Í»§·¢³ö½ôÆÈÖÒÑÔ£¬£¬£¬£¬³ÆÆäApex One¶ËµãÇ徲ƽ̨ÕýÔâÊÜÕë¶ÔÁ½¸öÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-54948¡¢CVE-2025-54987£©µÄ»îԾʹÓ㬣¬£¬£¬±Þ²ßÓû§Á¬Ã¦½ÓÄÉ·À»¤²½·¥¡£¡£¡£´Ë´ÎÎó²îÔ´ÓÚApex OneÖÎÀí¿ØÖÆÌ¨£¨ÍâµØ°æ£©µÄÏÂÁî×¢ÈëȱÏÝ£¬£¬£¬£¬ÔÊÐíÔ¤ÏÈͨ¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚδÐÞ²¹µÄϵͳÉÏÔ¶³ÌÖ´ÐÐí§Òâ´úÂë¡£¡£¡£Ö»¹ÜÎó²îÐè¹¥»÷Õ߾߱¸¿ØÖÆÌ¨»á¼ûȨÏÞ£¬£¬£¬£¬µ«Ç÷ÊÆ¿Æ¼¼Ã÷È·ÌåÏÖÒÑÊӲ쵽ÖÁÉÙÒ»ÆðÒ°ÍâʹÓð¸Àý£¬£¬£¬£¬ÈÕ±¾CERTҲͬ²½Ðû²¼Ô¤¾¯£¬£¬£¬£¬Ç¿µ÷ÆäÏÖʵÍþвÐÔ¡£¡£¡£ÎªÓ¦¶Ô½ôÆÈÇéÐΣ¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼³Æ2025Äê8ÔÂÖÐÑ®Ðû²¼²¹¶¡£¬£¬£¬£¬²¢Ìṩ¶ÌÆÚ»º½â¹¤¾ß¡£¡£¡£¸Ã¹¤¾ßͨ¹ý½ûÓÃÖÎÀíÔ±´ÓApex One¿ØÖÆÌ¨Ô¶³Ì°²ÅÅÊðÀíµÄ¹¦Ð§£¬£¬£¬£¬¿ÉÍêÈ«×è¶ÏÒÑÖªÎó²îʹÓ÷¾¶£¬£¬£¬£¬µ«»áµ¼ÖÂÔÝʱʧȥԶ³ÌÖÎÀíÄÜÁ¦¡£¡£¡£¹«Ë¾½¨ÒéÓû§ÓÅÏȰ²ÅŴ˹¤¾ß£¬£¬£¬£¬×ÝÈ»ÐèÎþÉü²¿·Ö±ãµ±ÐÔÒÔÈ·±£¶ËµãÇå¾²¡£¡£¡£½øÒ»²½·À»¤½¨Òé°üÀ¨£ºÈô¿ØÖÆÌ¨IPµØµã̻¶ÓÚÍâ²¿ÍøÂ磬£¬£¬£¬Ó¦Á¬Ã¦ÊµÑéÔ´IPÏÞÖÆµÈ»á¼û¿ØÖƲ½·¥¡£¡£¡£
https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-endpoint-protection-zero-day-exploited-in-attacks/
3. еġ°ÓÄÁéµç»°¡±Õ½ÊõʹÓÃZoomºÍMicrosoft Teams¾ÙÐÐC2²Ù×÷
8ÔÂ6ÈÕ£¬£¬£¬£¬ÔÚBlackHat USA 2025´ó»áÉÏ£¬£¬£¬£¬PraetorianÇå¾²Ñо¿Ô±Adam CrosserÕ¹ÏÖÁËÒ»ÖÖÃûΪ"ÓÄÁéºô½Ð"£¨Ghost Calls£©µÄÐÂÐͺóʹÓÃÏÂÁîÓë¿ØÖÆ£¨C2£©¹æ±ÜÊÖÒÕ¡£¡£¡£¸ÃÊÖÒÕͨ¹ýÀÄÓÃZoom¡¢Microsoft TeamsµÈ¾Û»áÓ¦ÓóÌÐòʹÓõÄTURNÐÒéЧÀÍÆ÷£¬£¬£¬£¬½«¶ñÒâC2Á÷Á¿Î±×°³ÉÕý³£ÊÓÆµ¾Û»áͨѶ£¬£¬£¬£¬´Ó¶øÈƹý¹Å°åÍøÂçÇå¾²·ÀÓù¡£¡£¡£TURNÐÒé±¾ÊÇÓÃÓÚ×ÊÖúNAT·À»ðǽºó×°±¸½¨ÉèÊÓÆµÍ¨»°¡¢VoIPµÈʵʱͨѶµÄ¸¨ÖúÐÒé¡£¡£¡£µ±Óû§¼ÓÈëZoom»òTeams¾Û»áʱ£¬£¬£¬£¬¿Í»§¶Ë»á»ñÈ¡ÔÝʱTURNƾ֤ÒÔ½¨ÉèÖмÌÅþÁ¬¡£¡£¡£"ÓÄÁéºô½Ð"ͨ¹ýÐ®ÖÆÕâЩÕýµ±Æ¾Ö¤£¬£¬£¬£¬ÔÚ¹¥»÷ÕßÓëÊܺ¦Õß×°±¸¼ä¹¹½¨»ùÓÚWebRTCµÄ¼ÓÃÜËíµÀ£¬£¬£¬£¬½«C2Ö¸Áîαװ³ÉͨÀýÊÓÆµ¾Û»áÁ÷Á¿¡£¡£¡£ÓÉÓÚÁ÷Á¿¾ÆóÒµ³£ÓÃÓòÃû·ÓÉ£¬£¬£¬£¬ÇÒʹÓö˿Ú443µÄUDP/TCP×Ô˳Ӧ´«Ê䣬£¬£¬£¬¿ÉÈÆ¹ý·À»ðǽ¡¢ÊðÀí¼°TLS¼ì²é£¬£¬£¬£¬ÊµÏָ߶ÈÒþ²ØµÄÏÂÁî¿ØÖÆ¡£¡£¡£CrosserÖ¸³ö£¬£¬£¬£¬Óë¹Å°åC2»úÖÆÏà±È£¬£¬£¬£¬¸ÃÒªÁì¾ß±¸Èý´óÓÅÊÆ£ºÆäÒ»£¬£¬£¬£¬ÎÞÐèÒÀÀµÈí¼þÎó²î£¬£¬£¬£¬½öͨ¹ýÀÄÓÃÕýµ±»ù´¡ÉèÊ©¼´¿ÉʵÏÖ£»£»£»Æä¶þ£¬£¬£¬£¬Ö§³Öʵʱ½»»¥£¬£¬£¬£¬Öª×ãVNCÔ¶³Ì¿ØÖƵÈÐèÒªµÍÑӳٵIJÙ×÷ÐèÇ󣻣»£»ÆäÈý£¬£¬£¬£¬¹¥»÷ÕßÎÞÐè̻¶×ÔÓÐÓòÃû»ò»ù´¡ÉèÊ©£¬£¬£¬£¬¼«´ó½µµÍ×·×ÙΣº¦¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-ghost-calls-tactic-abuses-zoom-and-microsoft-teams-for-c2-operations/
4. µÂ¹úµçÐÅMagentaTVƽ̨Òò¹ã¸æÆ½Ì¨Îó²îй¶Óû§Êý¾Ý
8ÔÂ6ÈÕ£¬£¬£¬£¬µÂ¹úµçÐÅ£¨Deutsche Telekom£©ÆìÏÂÓÎýÌåÆ½Ì¨MagentaTVÒòµÚÈý·½¹ã¸æÆ½Ì¨Îó²îÔâÓöÓû§Êý¾Ýй¶£¬£¬£¬£¬Ð¹Â¶Ê±³¤´ïÊýÔ¡£¡£¡£Ñо¿ÍŶÓÓÚ2025Äê6ÔÂÖÐÑ®·¢Ã÷£¬£¬£¬£¬ÓÉ¹ã¸æÊÖÒÕ¹«Ë¾EquativÆìϵÄServerside.aiÍйܵÄElasticsearchÊý¾Ý¿âδÉè±£»£»£»¤£¬£¬£¬£¬µ¼ÖÂMagentaTVÓû§ÈÕÖ¾±»¹ûÕæÌ»Â¶¡£¡£¡£Ö»¹ÜµÂ¹úµçÐÅÔÚÍŶÓת´ïºóÒÑÏÂÏ߸ÃʵÀý£¬£¬£¬£¬µ«Ì»Â¶Ê±´ú£¨ÖÁÉÙ×Ô2025Äê2ÔÂÆð£©ÀÛ»ýµÄ³¬3.24ÒÚÌõÈÕÖ¾×ÜÁ¿´ï729GBÒÑÃæÁÙDZÔÚÀÄÓÃΣº¦¡£¡£¡£´Ë´Îй¶µÄÊý¾ÝÖ÷ÒªÔ´ÓÚÓû§ÓëMagentaTVƽ̨µÄ½»»¥ÇëÇ󣬣¬£¬£¬°üÀ¨HTTP±êÍ·ÖеķÇÃô¸ÐÐÅÏ¢£¨ÈçÓû§ÊðÀí£©¼°²¿·ÖÃô¸Ð±êʶ·û£¬£¬£¬£¬°üÀ¨Î¨Ò»×°±¸±êʶ£¨MACµØµã£©¡¢ÍøÂçÅþÁ¬±êʶ£¨IPµØµã£©¡¢ÕË»§¹ØÁªID£¨¿Í»§ID¼°»á»°ID£©¡£¡£¡£Ö»¹Üµ¥ÌõÊý¾Ý¼ÛÖµÓÐÏÞ£¬£¬£¬£¬µ«¹¥»÷Õß¿Éͨ¹ý½»Ö¯ÒýÓöàԴй¶Êý¾Ý£¨ÈçÀúʷй¶µÄIPÓëÓû§ÐÅϢƥÅ䣩ʵÏÖÓû§Éí·Ý×·×Ù»ò×°±¸¶¨Î»¡£¡£¡£
https://cybernews.com/security/deutsche-telekom-magentatv-data-leak/
5. ¹È¸èÔÚÒ»Á¬µÄSalesforceÊý¾Ý͵ÇÔ¹¥»÷ÖÐÔâÓöÊý¾Ýй¶
8ÔÂ6ÈÕ£¬£¬£¬£¬¿Æ¼¼¾ÞÍ·Google¿ËÈÕÈ·ÈϳÉΪÀÕË÷×éÖ¯ShinyHuntersµÄ×îй¥»÷Ä¿µÄ£¬£¬£¬£¬ÆäÆóÒµSalesforce¿Í»§¹ØÏµÖÎÀí£¨CRM£©ÏµÍ³ÔâÈëÇÖ£¬£¬£¬£¬µ¼Ö²¿·Ö¿Í»§Êý¾Ýй¶¡£¡£¡£´Ë´ÎÊÂÎñÓë¸Ã×éÖ¯½üÆÚÕë¶ÔÈ«ÇòÆóÒµµÄ´ó¹æÄ£Êý¾ÝÇÔÈ¡Ðж¯Ïà¹Ø£¬£¬£¬£¬Éæ¼°ÓïÒô´¹ÂÚ£¨Vishing£©Éç»á¹¤³Ì¹¥»÷¼°Salesforceƽ̨Îó²îʹÓᣡ£¡£¾ÝGoogleÅû¶£¬£¬£¬£¬6ÔÂʱ´ú£¬£¬£¬£¬ÆäÒ»¸öÓÃÓÚ´æ´¢ÖÐСÆóÒµÁªÏµÐÅÏ¢¼°Ïà¹Ø±¸×¢µÄSalesforceʵÀý£¬£¬£¬£¬ÒòÔâÓö±»×·×ÙΪ¡°UNC6040¡±»ò¡°UNC6240¡±µÄÍþвÐÐΪÕß¹¥»÷¶øÊ§ÏÝ¡£¡£¡£¹¥»÷Õßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÇÖÈëϵͳ£¬£¬£¬£¬ÔÚ¶ÌÔÝ»á¼û´°¿ÚÄÚÇÔÈ¡ÁË»ù´¡ÉÌÒµÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÆóÒµÃû³Æ¡¢ÁªÏµ·½·¨µÈ´ó²¿·ÖΪ¹ûÕæ»ò·ÇÃô¸ÐÊý¾Ý¡£¡£¡£GoogleÇ¿µ÷ÒÑѸËÙÇжÏÈëÇÖ·¾¶²¢Íê³ÉÓ°ÏìÆÊÎö£¬£¬£¬£¬µ«Î´Ã÷È·ÏêϸÊÜÓ°Ïì¿Í»§ÊýÄ¿¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬´Ë´Î¹¥»÷Ä»ºóºÚÊÖʵΪÎÛÃûÕÑÖøµÄShinyHuntersÀÕË÷¼¯ÍÅ¡£¡£¡£´Ë´ÎÐж¯ÖУ¬£¬£¬£¬ShinyHuntersͨ¹ýÈëÇÖÆóÒµSalesforceʵÀýÇÔÈ¡Êý¾Ý£¬£¬£¬£¬²¢ÒÔ¹ûÕæÐ¹Â¶»ò³öÊÛÊý¾ÝΪÍþв¾ÙÐÐÀÕË÷¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-suffers-data-breach-in-ongoing-salesforce-data-theft-attacks/
6. ·¨¹ú²¼ÒÁ¸ñµçÐÅÔâÓö´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬640Íò¿Í»§ÐÅÏ¢ÊÜÓ°Ïì
8ÔÂ7ÈÕ£¬£¬£¬£¬·¨¹úÖ÷ÒªµçÐÅÔËÓªÉ̲¼ÒÁ¸ñµçÐÅ£¨Bouygues Telecom£©Åû¶ÁËÒ»ÆðÖØ´óÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬Ô¼640Íò¿Í»§µÄСÎÒ˽¼ÒÊý¾ÝÔÚÕë¶ÔÐÔÍøÂç¹¥»÷ÖÐÔ⵽й¶¡£¡£¡£×÷Ϊ·¨¹úµÚÈý´óÒÆ¶¯Ð§ÀÍÌṩÉÌ£¬£¬£¬£¬¸Ã¹«Ë¾ÓµÓÐ1450ÍòÒÆ¶¯Óû§¼°9000ÃûÔ±¹¤£¬£¬£¬£¬2024ÄêÓªÊÕ´ï568ÒÚÅ·Ôª¡£¡£¡£¾Ý¹Ù·½ÉùÃ÷£¬£¬£¬£¬¹¥»÷ÓÉ"ÒÑÖªÍøÂç·¸·¨¼¯ÍÅ"ʵÑ飬£¬£¬£¬Í¨¹ýÇÖÈëÌØ¶¨ÄÚ²¿×ÊÔ´»ñÈ¡Á˿ͻ§ÁªÏµ·½·¨¡¢ÌõÔ¼ÐÅÏ¢¡¢»éÒö״̬¡¢ÆóÒµ¿Í»§×ÊÁϼ°¹ú¼ÊÒøÐÐÕ˺ţ¨IBAN£©µÈÃô¸ÐÊý¾Ý¡£¡£¡£ÖµµÃÇìÐÒµÄÊÇ£¬£¬£¬£¬ÐÅÓÿ¨ºÅ¡¢ÕË»§ÃÜÂëµÈ½¹µã²ÆÎñÐÅϢδ±»ÇÔÈ¡¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬²¼ÒÁ¸ñµçÐÅÊÖÒÕÍŶÓѸËÙ×è¶Ï¹¥»÷Õß»á¼û·¾¶£¬£¬£¬£¬²¢Ðͬ·¨¹ú¹ú¼ÒÍøÂçÇå¾²¾Ö£¨ANSSI£©ºÍÊý¾Ý±£»£»£»¤»ú¹¹CNILÕö¿ªÊӲ죬£¬£¬£¬Í¬Ê±Ç¿»¯ÍøÂç¼à¿ØÓëÇå¾²·À»¤ÏµÍ³¡£¡£¡£Ð¹Â¶ÊÂÎñ¶Ô¿Í»§×é³ÉDZÔÚΣº¦£¬£¬£¬£¬Ö»¹ÜIBANµ¥¶Àȱ·¦ÒÔÍê³ÉתÕ˲Ù×÷£¬£¬£¬£¬µ«ÊÜÓ°ÏìÓû§ÈÔ±»½¨Òé°´ÆÚºË²éÒøÐÐÉúÒâ¼Í¼£¬£¬£¬£¬²¢Ð¡ÐÄÒÔ¿Í»§ÐÕÃûºÍÕ˺ÅʵÑéµÄÍøÂç´¹ÂÚÕ©Æ¡£¡£¡£¹«Ë¾ÒÑͨ¹ý¶ÌÐźÍÓʼþÖ±½Ó֪ͨÊܺ¦Õߣ¬£¬£¬£¬²¢Ã÷È·ÖÒÑÔÇÐÎðÏòÉù³ÆÕÆÎÕÆäСÎÒ˽¼ÒÐÅÏ¢µÄÀ´µçÕß͸¶µÇ¼ƾ֤µÈÃô¸Ð×ÊÁÏ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bouygues-telecom-confirms-data-breach-impacting-64-million-customers/


¾©¹«Íø°²±¸11010802024551ºÅ