ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾ÖÔâÓöÍøÂç¹¥»÷£¬£¬£¬²Ð¼²ÈËЧÀÍϵͳÊÜÓ°Ïì

Ðû²¼Ê±¼ä 2025-08-27

1. ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾ÖÔâÓöÍøÂç¹¥»÷£¬£¬£¬²Ð¼²ÈËЧÀÍϵͳÊÜÓ°Ïì


8ÔÂ26ÈÕ£¬£¬£¬ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾Ö£¨MTA£©¿ËÈÕÔâÓöÒ»ÆðÕë¶ÔÆä²Ð¼²È˽»Í¨Ð§ÀÍϵͳµÄÍøÂç¹¥»÷£¬£¬£¬µ¼Ö²¿·ÖÒªº¦¹¦Ð§ÖÐÖ¹¡£¡£¡£¡£¡£¡£ÖÜÈÕ£¬£¬£¬MTAͨ¹ýÉ罻ýÌåºÍ¹Ù·½ÍøÕ¾Ðû²¼ÖÒÑÔ£¬£¬£¬³Æ±¬·¢ÁËÒ»ÆðÉæ¼°Î´¾­ÊÚȨ»á¼ûijЩϵͳµÄÍøÂçÊÂÎñ¡£¡£¡£¡£¡£¡£Ö»¹Ü½¹µã½»Í¨Ð§ÀÍÈ繫½»Ïß·¡¢µØÌúºÍÇá¹ìϵͳδÊÜÓ°Ï죬£¬£¬µ«×¨ÃÅΪ²ÐÕÏÈËÊ¿ÌṩµÄ¡°³öÐÐЧÀÍ¡±£¨Mobility£©µÄʵʱÐÅϢϵͳ¼°ÆäËû¹¤¾ßÔâÊܹ¥»÷¡£¡£¡£¡£¡£¡£¸ÃЧÀÍÖ¼ÔÚΪÎÞ·¨×ÔÐÐǰÍù¹«½»³µÕ¾»òºò³µµÄȺÌåÌṩ¶¨ÖÆ»¯½»Í¨Ö§³Ö£¬£¬£¬Í¨¹ýÍøÕ¾Ô¤Ô¼ÊµÏÖ´Ó¼ÒÃŵ½Ä¿µÄµØµÄ½ÓËÍ¡£¡£¡£¡£¡£¡£¹¥»÷µ¼ÖÂMTAµÄÒÆ¶¯Ð§ÀÍÎÞ·¨°²ÅÅÐÂÐг̻òÖØÐÂÔ¤¶©ÏÖÓÐÐгÌ£¬£¬£¬²¿·ÖʵʱÐÅÏ¢¸üм°ºô½ÐÖÐÐĹ¦Ð§Òà¿ÉÄÜÊÜÏÞ¡£¡£¡£¡£¡£¡£MTAÌåÏÖ£¬£¬£¬ÒÑÓëµÚÈý·½ÍøÂçÇ徲ר¼Ò¼°Ö´·¨²¿·ÖÏàÖú£¬£¬£¬ÆÀ¹ÀÊÂÎñ¹æÄ£²¢½ÓÄÉ»º½â²½·¥¡£¡£¡£¡£¡£¡£Ö»¹Ü±¾ÖÜËùÓÐÒѰ²ÅŵijöÐÐÍýÏëÈÔÓÐÓ㬣¬£¬µ«ÐÂÓû§Ðèͨ¹ýÌæ»»¼Æ»®£¨ÈçCall-A-RideЧÀÍ£©¾ÙÐÐÔ¤Ô¼£¬£¬£¬¿Éͨ¹ý¹Ù·½ÍøÕ¾»òµç»°»á¼û¡£¡£¡£¡£¡£¡£


https://therecord.media/maryland-cyberattack-transit-disabled-people


2. ¶íÂÞ˹FSB¿ª·¢ÐÂÐÍAndroidÌØ¹¤Èí¼þ£¬£¬£¬Î±×°³É·À²¡¶¾¹¤¾ß


8ÔÂ24ÈÕ£¬£¬£¬¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©±»ÆØ¿ª·¢Ò»¿îÐÂÐÍAndroid¶ñÒâÈí¼þ£¬£¬£¬Î±×°³É·À²¡¶¾¹¤¾ß£¬£¬£¬×¨ÃÅÕë¶Ô¶íÂÞ˹ÆóÒµ¸ß¹ÜÌᳫ¶¨ÏòÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¾Ý¶íÂÞË¹ÒÆ¶¯Çå¾²¹«Ë¾Dr. WebµÄ×îб¨¸æ£¬£¬£¬¸Ã¶ñÒâÈí¼þ±»ÃüÃûΪ¡°Android.Backdoor.916.origin¡±£¬£¬£¬×Ô2025Äê1ÔÂÊ״η¢Ã÷ÒÔÀ´ÒÑÑÝ»¯¶à¸ö°æ±¾£¬£¬£¬ÏÔʾÆä´¦ÓÚÒ»Á¬¿ª·¢ÖС£¡£¡£¡£¡£¡£¸ÃÌØ¹¤Èí¼þ¾ß±¸¶àÏî¸ß¼¶¹¦Ð§£¬£¬£¬°üÀ¨¼àÌý¶Ô»°¡¢Í¨¹ýÊÖ»úÉãÏñͷʵʱ´«ÊäÊÓÆµ¡¢¼Í¼¼üÅÌÊäÈë¡¢ÇÔȡͨѶӦÓã¨ÈçTelegram¡¢WhatsApp¡¢Gmail£©Êý¾Ý£¬£¬£¬ÉõÖÁ²¶»ñÆÁÄ»ÄÚÈÝ¡£¡£¡£¡£¡£¡£×°Öú󣬣¬£¬¶ñÒâÈí¼þ»áÇëÇóµØÀíλÖᢶÌÐÅ»á¼û¡¢ÉãÏñÍ·/Âó¿Ë·çʹÓᢸ¨Öú¹¦Ð§Ð§À͵ȸßΣº¦È¨ÏÞ£¬£¬£¬²¢ºã¾ÃפÁôºǫ́¡£¡£¡£¡£¡£¡£ÆäÏÂÁîÓë¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷¿ÉÔ¶³ÌÖ¸ÁîÇÔÈ¡¶ÌÐÅ¡¢ÁªÏµÈË¡¢Í¨»°¼Í¼¼°´æ´¢Í¼Ïñ£¬£¬£¬»ò¼¤»îÂó¿Ë·ç¡¢ÉãÏñÍ·¾ÙÐÐʵʱ¼à¿Ø£¬£¬£¬ÉõÖÁÖ´ÐÐShellÏÂÁîÒÔά³Ö³¤ÆÚ»¯¿ØÖÆ¡£¡£¡£¡£¡£¡£Dr. WebÆÊÎöÖ¸³ö£¬£¬£¬¸Ã¶ñÒâÈí¼þͨ¹ý¶íÓï½çÃæ¡¢Ã°³ä¶íÂÞ˹¹Ù·½»ú¹¹£¨ÈçÖÐÑëÒøÐм°FSB×ÔÉí£©µÄÈí¼þ¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£Æä½ö¶íÓï½çÃæ¡¢Õë¶Ô¶íÂÞ˹ÆóÒµµÄ·Ö·¢Õ½ÂÔ¼°Ã°³ä±¾ÍÁ»ú¹¹µÄÐÐΪ£¬£¬£¬Ã÷È·Ö¸Ïò¶¨Ïò¹¥»÷£¬£¬£¬Ä¿µÄ»òΪ»ñÈ¡ÆóÒµÃô¸ÐÐÅÏ¢¼°¸ß¹ÜͨѶÊý¾Ý¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-android-malware-poses-as-antivirus-from-russian-intelligence-agency/


3. ¿Æ¼¼ÖÆÔìÉÌData I/OÔâÀÕË÷¹¥»÷£¬£¬£¬ÖÂÔËӪϵͳ̱»¾


8ÔÂ22ÈÕ£¬£¬£¬¿Æ¼¼ÖÆÔìÉÌData I/O Corporation£¨NASDAQ: DAIO£©¿ËÈÕÏòÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©Ìá½»±¨¸æ£¬£¬£¬Åû¶ÆäÓÚ8ÔÂ16ÈÕÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬µ¼ÖÂÔËÊä¡¢ÖÆÔì¡¢Éú²úµÈ½¹µãÔËӪϵͳ̱»¾¡£¡£¡£¡£¡£¡£Õâ¼Ò×ܲ¿Î»ÓÚ»ªÊ¢¶ÙÖÝÀ×µÂÃɵĹ«Ë¾×¨×¢ÓÚΪÆû³µµç×Ó¡¢ÏûºÄ×°±¸µÈÁìÓòÌṩ±à³ÌÓëÇå¾²°²ÅŽâ¾ö¼Æ»®£¬£¬£¬Æä¿Í»§º­¸ÇÌØË¹À­¡¢ËÉÏ¡¢ÑÇÂíÑ·¡¢¹È¸è¡¢Î¢ÈíµÈÈ«Çò×ÅÃûÆóÒµ£¬£¬£¬2025ÄêµÚ¶þ¼¾¶ÈÁè¼Ý65%µÄÓªÒµÀ´×ÔÆû³µµç×ÓÉú²ú£¬£¬£¬°üÀ¨ÓëÖйúµç¶¯³µÖÆÔìÉÌÏàÖúµÄ³äµçÕ¾ÊÖÒÕÏîÄ¿¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬Data I/OѸËÙ½ÓÄÉ×èÖ¹²½·¥£¬£¬£¬½«ÊÜÓ°ÏìϵͳÏÂÏßÒÔ±£»£»£»£»£»¤È«ÇòITÍøÂ磬£¬£¬²¢Æô¶¯µÚÈý·½ÊӲ졣¡£¡£¡£¡£¡£µ«×èÖ¹±¨¸æÌύʱ£¬£¬£¬ÏµÍ³»Ö¸´Ê±¼ä±íÈÔδÃ÷È·£¬£¬£¬¹«Ë¾ÖÒÑÔ³ÆÊÂÎñÏà¹Ø±¾Ç®£¨°üÀ¨ÍøÂçÇ徲ר¼ÒÓöȡ¢ÏµÍ³ÐÞ¸´Ö§³öµÈ£©¿ÉÄÜ¶ÔÆäı»®Òµ¼¨¼°²ÆÎñ״̬±¬·¢ÖØ´óÓ°Ïì¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¸Ã¹«Ë¾Éϼ¾¶ÈÏúÊÛ¶îΪ590ÍòÃÀÔª£¬£¬£¬½Ï2025ÄêµÚÒ»¼¾¶ÈïÔÌ­30ÍòÃÀÔª£¬£¬£¬´Ë´Î¹¥»÷»ò½øÒ»²½¼Ó¾çÆä²ÆÎñѹÁ¦¡£¡£¡£¡£¡£¡£


https://therecord.media/electronics-manufacturer-dataio-ransomware


4. ÄÚ»ª´ïÖÝÕþ¸®ÔâÍøÂç¹¥»÷ÖÂÍøÕ¾¼°µç»°ÏµÍ³ÖÜȫ̱»¾


8ÔÂ24ÈÕ£¬£¬£¬ÃÀº£ÄÚ»ª´ïÖÝÕþ¸®ÊÖÒÕϵͳÔâÓöÑÏÖØÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬µ¼ÖÂÖÝÕþ¸®ÍøÕ¾¡¢µç»°Ð§Àͼ°Ïßϰ칫ÖÜȫ̱»¾¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒ»Á¬Ó°ÏìÖÝÄÚ¶à¸ö¹«¹²Ð§ÀÍÇþµÀ£¬£¬£¬Òý·¢Õþ¸®ÓëÁª°î»ú¹¹µÄ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¡£¾ÝÖݳ¤ÇÇ¡¤Â¡°Í¶àÉùÃ÷£¬£¬£¬Ö»¹Ü½ôÆÈЧÀÍÈÔ¼á³ÖÔË×÷£¬£¬£¬µ«ÊÖÒÕϵͳµÄÒ»Á¬ÐÔ¹ÊÕÏÒÑÔì³ÉÏÔÖøÐ§ÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£×èÖ¹ÖÜÒ»Íí¼ä£¬£¬£¬ÖÝÕþ¸®¹Ù·½ÍøÕ¾ÈÔ´¦ÓÚÀëÏß״̬£¬£¬£¬µç»°Ïß·¼°²¿·ÖÏßÉÏЧÀÍ·ºÆðÏìÓ¦ÑÓ³Ù»òÖÐÖ¹¡£¡£¡£¡£¡£¡£Îª×î´óÏÞ¶Èά³Ö¹«¹²Ð§ÀÍ£¬£¬£¬ÖÝÕþ¸®ÒÑÆô¶¯ÔÝʱ·Óɼƻ®ºÍÌæ»»ÐÔ²Ù×÷Á÷³Ì£¬£¬£¬²¢ÓëµØ·½¡¢²¿Âä¼°Áª°îÏàÖúͬ°éÕö¿ªÁªºÏ»Ö¸´Ðж¯¡£¡£¡£¡£¡£¡£ÊÜÊÖÒÕ¹ÊÕÏÓ°Ï죬£¬£¬È«ÖÝÕþ¸®°ì¹«ÊÒÖÜÒ»ÔÝÍ£ÏßÏÂЧÀÍ£¬£¬£¬Ïêϸ»Ö¸´Ê±¼ä½«ÁíÐÐ֪ͨ¡£¡£¡£¡£¡£¡£ÊÂÎñÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬Áª°îÊÓ²ì¾ÖÒѽéÈëЭÖúËÝÔ´£¬£¬£¬µ«ÏÖÔÚÉÐÎÞÈκκڿÍ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£¡£¡£ÖÝÕþ¸®ÌØÊâÌáÐÑסÃñÌá¸ßСÐÄ£¬£¬£¬Ç¿µ÷¹Ù·½»ú¹¹¾ø²»»áͨ¹ýµç»°»òÓʼþË÷ȡСÎÒ˽¼ÒÐÅÏ¢»òÒøÐÐÕË»§×ÊÁÏ£¬£¬£¬½÷·ÀÕ©Æ­ÐÐΪ¡£¡£¡£¡£¡£¡£Õë¶Ô¹«ÖÚ¹ØÇеÄÊý¾Ýй¶Σº¦£¬£¬£¬Öݳ¤ÉùÃ÷ÌåÏÖ½«³¹µ×ÊÓ²ìÊÇ·ñ±£´æÃô¸ÐÐÅÏ¢ÍâйÇéÐΡ£¡£¡£¡£¡£¡£


https://therecord.media/nevada-state-websites-phones-cyberattack-disruption


5. Salesloftƽ̨ÔâºÚ¿ÍÈëÇÖÖÂSalesforceÊý¾Ýй¶ 


8ÔÂ26ÈÕ£¬£¬£¬ÃÀ¹úÏúÊÛ×Ô¶¯»¯Æ½Ì¨SalesloftÔâÓöÖØ´óÇå¾²ÊÂÎñ£¬£¬£¬ºÚ¿Íͨ¹ýÇÔÈ¡ÆäÓëSalesforce¼¯³ÉµÄDrift̸ÌìÊðÀíOAuthÁîÅÆ¼°Ë¢ÐÂÁîÅÆ£¬£¬£¬ÀÖ³ÉÇÖÈë¿Í»§ÇéÐβ¢ÊµÑé´ó¹æÄ£Êý¾Ý͵ÇÔ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ̻¶Á˵ÚÈý·½Æ½Ì¨¼¯³É´øÀ´µÄÇå¾²Òþ»¼£¬£¬£¬Òý·¢¶ÔÔÆ¶ËÆóҵЧÀÍÉú̬Á´Å³ÈõÐÔµÄÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£¡£¾ÝSalesloftÅû¶£¬£¬£¬ÍþвÐÐΪÕßÓÚ8ÔÂ8ÈÕÖÁ18ÈÕʱ´ú£¬£¬£¬Ê¹ÓÃÇÔÈ¡µÄÁîÅÆ»á¼ûÁËʹÓÃDrift-Salesforce¼¯³ÉµÄ¿Í»§SalesforceʵÀý£¬£¬£¬Í¨¹ýÖ´ÐÐSOQLÅÌÎÊÇÔÈ¡AWS»á¼ûÃÜÔ¿¡¢ÃÜÂë¼°SnowflakeÏà¹ØÁîÅÆµÈÃô¸Ðƾ֤¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÉõÖÁͨ¹ýɾ³ýÅÌÎÊÈÕÖ¾ÑÚÊÎÐÐ×Ù£¬£¬£¬µ«Î´Ó°ÏìϵͳÉ󼯼ͼ¡£¡£¡£¡£¡£¡£SalesloftÒÑÓëSalesforceЭ×÷£¬£¬£¬½ôÆÈ×÷·ÏËùÓÐDriftÓ¦ÓõĻîÔ¾ÁîÅÆ£¬£¬£¬²¢ÒªÇó¿Í»§ÖØÐÂÈÏÖ¤£¬£¬£¬ÖÎÀíÔ±Ðèͨ¹ý"ÉèÖÃ-¼¯³É-Salesforce"¶Ï¿ªÅþÁ¬ºóÖØÐÂÊÚȨ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÑÓÐøÁË2025ÄêÒÔÀ´Õë¶ÔSalesforceƽ̨µÄ¹¥»÷À˳±¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/salesloft-breached-to-steal-oauth-tokens-for-salesforce-data-theft-attacks/


6. CitrixÐÞ¸´ÁËÁãÈÕ¹¥»÷ÖÐʹÓõÄÑÏÖØNetScaler RCEÎó²î


8ÔÂ26ÈÕ£¬£¬£¬Citrix£¨ÔÆÈí¼þ¼¯ÍÅ£©Ðû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬ÐÞ¸´ÁËÓ°ÏìÆäNetScaler ADCºÍNetScaler Gateway×°±¸µÄÈý¸ö¸ßΣÎó²î£¬£¬£¬ÆäÖÐ×îÑÏÖØµÄCVE-2025-7775Òѱ»Ö¤ÊµÔâºÚ¿ÍÆð¾¢Ê¹ÓÃΪÁãÈÕÎó²î¡£¡£¡£¡£¡£¡£¸ÃÎó²îΪÄÚ´æÒçÍÉ»¯Î󣬣¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚδ´ò²¹¶¡µÄ×°±¸ÉÏÔ¶³ÌÖ´ÐÐí§Òâ´úÂ룬£¬£¬Ö±½ÓÍþвÆóÒµÍøÂç½¹µã»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£CitrixÔÚͨ¸æÖÐÇ¿µ÷£¬£¬£¬×èÖ¹8ÔÂ26ÈÕ£¬£¬£¬ÒÑÊӲ쵽Õë¶Ô믧½â×°±¸µÄÏÖʵ¹¥»÷°¸Àý£¬£¬£¬µ«Î´ÌṩÏêϸ¹¥»÷Ö¸±ê»òÊܺ¦ÕßÐÅÏ¢¡£¡£¡£¡£¡£¡£ÓÉÓÚȱ·¦ÔÝʱ»º½â²½·¥£¬£¬£¬¹«Ë¾¡°Ç¿ÁÒ½¨Ò顱ÖÎÀíÔ±Á¬Ã¦½«NetScaler¹Ì¼þÉý¼¶ÖÁ×îа汾¡£¡£¡£¡£¡£¡£Îª×ÊÖúÓû§×Ô²éΣº¦£¬£¬£¬CitrixÐû²¼ÁËÒ×Êܹ¥»÷×°±¸µÄÉèÖÃÌØÕ÷£º×°±¸ÐèÒÔÍø¹ØÄ£Ê½£¨VPN¡¢ICAÊðÀíµÈ£©ÔËÐУ¬£¬£¬»ò°ó¶¨IPv6ЧÀ͵ÄHTTP/SSL/HTTP_QUICÀàÐ͸ºÔØÆ½ºâÐéÄâЧÀÍÆ÷µÈÌØ¶¨ÉèÖᣡ£¡£¡£¡£¡£´Ë´Î¸üÐÂͬʱÐÞ¸´ÁËÁíÍâÁ½¸öÎó²î£º¾Ü¾øÐ§ÀÍÎó²îCVE-2025-7776ºÍÖÎÀí½çÃæ»á¼û¿ØÖÆÈ±ÏÝCVE-2025-8424¡£¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±Ö¸³ö£¬£¬£¬¹¥»÷Õß¿ÉÄÜͨ¹ýÎó²îÁ´Ê½Ê¹Ó㬣¬£¬ÏÈͨ¹ýCVE-2025-7775Ö²Èë¶ñÒâ´úÂ룬£¬£¬ÔÙʹÓÃCVE-2025-8424ºáÏòÉøÍ¸ÖÎÀí½çÃæ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/citrix-fixes-critical-netscaler-rce-flaw-exploited-in-zero-day-attacks/