ÃÀ¶à³ÇÖÒÑÔÒÆ¶¯ÍøÂç´¹ÂÚ¶ÌÐÅð³äÍ£³µÎ¥¹æ·£¿ £¿£¿£¿£¿ £¿îÕ©Æ­

Ðû²¼Ê±¼ä 2025-03-10

1. ÃÀ¶à³ÇÖÒÑÔÒÆ¶¯ÍøÂç´¹ÂÚ¶ÌÐÅð³äÍ£³µÎ¥¹æ·£¿ £¿£¿£¿£¿ £¿îÕ©Æ­


3ÔÂ9ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬ÃÀ¹ú¶à¸ö¶¼»á°üÀ¨°²Äɲ¨Àû˹¡¢²¨Ê¿¶Ù¡¢¸ñÁÖÍþÖΡ¢µ¤·ð¡¢µ×ÌØÂÉ¡¢ÐÝ˹¶Ù¡¢ÃܶûÎÖ»ù¡¢Ñκþ³Ç¡¢ÏÄÂåÌØ¡¢Ê¥µØÑǸ硢¾É½ðɽµÈµØ·×·×·¢³öÖÒÑÔ£¬£¬£¬Ö¸³öÓÐÒÆ¶¯ÍøÂç´¹Âڻͨ¹ýαװ³É¶¼»áÍ£³µÎ¥¹æ²¿·ÖµÄ¶ÌОÙÐÐÕ©Æ­¡£¡£¡£ÕâЩ¶ÌÐÅÉù³ÆÓû§ÓÐδ¸¶Í£³µ·Ñ£¬£¬£¬²¢ÍþвÈô²»Ö§¸¶£¬£¬£¬ÌìÌì½«ÌØÊâ·£¿ £¿£¿£¿£¿ £¿î35ÃÀÔª£¬£¬£¬Í¬Ê±ÌṩÁ´½ÓÓÕµ¼Óû§µã»÷Ö§¸¶¡£¡£¡£¾ÝBleepingComputer±¨µÀ£¬£¬£¬×ÔÈ¥Äê12ÔÂÆð£¬£¬£¬´ËÀà¶ÌÐų±Ò»Á¬Ò»Ö±£¬£¬£¬ÇÒ¶à¸ö¶¼»áÊÕµ½µÄÕ©Æ­¶ÌÐŽÓÄÉÁËÏàͬµÄÄ£°å¡£¡£¡£Õ©Æ­ÕßʹÓÃGoogle.comµÄ¿ª·ÅÖØ¶¨Ïò¹¦Ð§£¬£¬£¬½«Óû§Öض¨ÏòÖÁð³äµÄ¶¼»á´¹ÂÚÍøÕ¾£¬£¬£¬ÈçŦԼÊеÄnycparkclient[.]com¡£¡£¡£Ö»¹ÜÆ»¹ûÒÑÍÆ³öÇå¾²¹¦Ð§½ûÓÃÀ´×Ôδ֪·¢¼þÈ˺ͿÉÒÉÓòÃûµÄ¶ÌÐÅÁ´½Ó£¬£¬£¬µ«ÓÉÓÚGoogle.comÊÇÊÜÐÅÈÎÓòÃû£¬£¬£¬ÕâÒ»Îó²îʹµÃÕ©Æ­Õ߸üÒ×µ½ÊÖ¡£¡£¡£Óû§µã»÷Á´½Óºó»á±»Ö¸µ¼ÖÁð³äµÄ¡°Å¦Ô¼ÊвÆÎñ²¿£ºÍ£³µºÍÉãÏñÍ·Î¥¹æÐÐΪ¡±ÍøÕ¾£¬£¬£¬ÒªÇóÊäÈëСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬½ø¶øÃæÁÙÊý¾ÝÇÔȡΣº¦£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþ¼°ÐÅÓÿ¨ÐÅÏ¢µÈ¡£¡£¡£ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ½øÒ»²½µÄÍøÂç´¹ÂÚ¹¥»÷¡¢Éí·Ý͵ÇÔ¡¢½ðÈÚڲƭ»ò½«Êý¾Ý³öÊÛ¸øÆäËûÍþвÐÐΪÕß¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-cities-warn-of-wave-of-unpaid-parking-phishing-texts/


2. NTT Com֤ʵ½ü18000¼ÒÆóÒµ¿Í»§Êý¾ÝÔâºÚ¿Í»á¼û


3ÔÂ7ÈÕ£¬£¬£¬ÈÕ±¾µçОÞÍ·NTTͨѶ£¨NTT Com£©Ö¤Êµ£¬£¬£¬ÔÚ2Ô·ݵÄÍøÂç¹¥»÷ÖУ¬£¬£¬½ü18,000¼ÒÆóÒµ¿Í»§µÄÊý¾ÝÔâµ½ºÚ¿Í»á¼û£¬£¬£¬µ«ÊÜÓ°ÏìСÎÒ˽¼ÒµÄÏêϸÊýÄ¿Éв»ÇåÎú¡£¡£¡£NTT ComΪȫÇò70¸ö¹ú¼ÒµÄÁè¼Ý100,000¸öÆóÒµÌṩµç»°ºÍÍøÂçÊÖÒÕЧÀÍ£¬£¬£¬´Ë´Îй¶µÄÊý¾Ý°üÀ¨17,891¸ö×éÖ¯µÄ¿Í»§ÐÕÃû¡¢ÌõÔ¼ºÅ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢ÏÖʵµØµãºÍЧÀÍʹÓÃÐÅÏ¢¡£¡£¡£Ö»¹ÜNTT ComÔÚ2ÔÂ5ÈÕ·¢Ã÷ÄÚ²¿ÏµÍ³±»¡°Î´¾­ÊÚȨ»á¼û¡±ºóÁ¬Ã¦ÏÞÖÆÁËÊÜѬȾװ±¸µÄ»á¼û£¬£¬£¬µ«2ÔÂ15ÈÕÓÖ·¢Ã÷¹¥»÷ÕßÒÑÈëÇÖÆäÄÚ²¿ÍøÂçÖеÄÁíһ̨װ±¸²¢Á¬Ã¦¶Ï¿ªÅþÁ¬¡£¡£¡£ÏÖÔÚ£¬£¬£¬ºÚ¿Í¹¥»÷ÊÂÎñ±³ºóµÄÈËÎïºÍÍøÂç¹¥»÷µÄÏêϸÐÔ×ÓÉв»ÇåÎú£¬£¬£¬Ò²Ã»ÓÐÈκδóÐÍÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´ËÈÏÕæ¡£¡£¡£½üÄêÀ´£¬£¬£¬µçÐÅ×éÖ¯ÒѳÉÎªÍøÂç·¸·¨·Ö×Ӻ͹ú¼ÒÖ§³ÖµÄºÚ¿ÍµÄÖ÷Òª¹¥»÷Ä¿µÄ£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó»¹»á¹¥»÷µçОÞÍ·´æ´¢µÄµç»°¼Í¼¿âÒÔ·¢¶¯½øÒ»²½µÄÍøÂç¹¥»÷¡£¡£¡£


https://techcrunch.com/2025/03/07/japanese-telco-giant-ntt-com-says-hackers-accessed-details-of-almost-18000-organizations/


3. YouTubeÐéα°æÈ¨ÍþÐ²ÍÆ¹ã¶ñÒâÍÚ¿óÈí¼þ


3ÔÂ8ÈÕ£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓʹÓÃYouTubeƽ̨£¬£¬£¬Í¨¹ý·¢ËÍÐéα°æÈ¨ÉùÃ÷£¬£¬£¬Ç¿ÆÈ´´×÷ÕßÔÚÊÓÆµÖÐÐû´«¶ñÒâÈí¼þºÍ¼ÓÃÜÇ®±Ò¿ó¹¤¡£¡£¡£ËûÃÇÃé×¼ÁËÐû²¼ÓйØWindowsÊý¾Ý°üת·¢£¨WPD£©¹¤¾ß½Ì³ÌµÄ´´×÷Õߣ¬£¬£¬ÕâЩ¹¤¾ßÔÚ¶íÂÞ˹¹ãÊܽӴý£¬£¬£¬ÒòÆäÄÜÈÆ¹ý»¥ÁªÍøÉó²é¡£¡£¡£·¸·¨·Ö×Óð³ä¹¤¾ß°æÈ¨³ÖÓÐÕߣ¬£¬£¬ÏòYouTubeÌá³öÊéȨͶËߣ¬£¬£¬²¢Íþв´´×÷ÕßÈô²»ÏàÖú½«ÃæÁÙÆµµÀ·â½û¡£¡£¡£Ðí¶à´´×÷ÕßÒòµ£ÐÄʧȥƵµÀ¶øÇü·þ£¬£¬£¬Ìí¼ÓÁËÖ¸Ïò¶ñÒâGitHub´æ´¢¿âµÄÁ´½Ó£¬£¬£¬ÕâЩÁ´½ÓÏÖʵÉϰüÀ¨¼ÓÃÜÇ®±ÒÍÚ¿óÈí¼þµÄľÂí°æ±¾¡£¡£¡£¿ £¿£¿£¿£¿ £¿¨°Í˹»ù·¢Ã÷£¬£¬£¬Ïà¹ØÊÓÆµµÄԢĿ¼ÊýÁè¼Ý40Íò´Î£¬£¬£¬¶ñÒâÁ´½ÓÔÚ±»É¾³ýǰÒѱ»ÏÂÔØ4Íò´Î¡£¡£¡£±ðµÄ£¬£¬£¬Ò»¸öÓµÓÐ34Íò¶©ÔÄÕßµÄTelegramƵµÀÒ²¼ÓÈëÁ˶ñÒâÈí¼þµÄÍÆ¹ã¡£¡£¡£¾Ý¿¨°Í˹»ùÒ£²â£¬£¬£¬¸Ã¶ñÒâÈí¼þÒÑÓ°Ïì¶íÂÞ˹2000¶àÃûÊܺ¦Õߣ¬£¬£¬µ«ÏÖʵÊý×Ö¿ÉÄܸü¸ß¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýPython¼ÓÔØÆ÷Æô¶¯£¬£¬£¬Õë¶Ô¶íÂÞ˹IPµØµãÖ´ÐУ¬£¬£¬¾ßÓÐÌӱܷÀ²¡¶¾ÆÊÎöºÍ·´É³ºÐ¹¦Ð§£¬£¬£¬×îÖÕÏÂÔØSilentCryptoMinerÍÚ¿ó»ú£¬£¬£¬ÍÚ¾ò¶àÖÖ¼ÓÃÜÇ®±Ò¡£¡£¡£¸ÃÍÚ¿ó»ú°´ÆÚ¸üÐÂÉèÖ㬣¬£¬²¢Ê¹ÓÃÀú³ÌÍÚ¿ÕÊÖÒÕÌӱܼì²â¡£¡£¡£Ö»¹ÜÏÖÔÚÖ÷ÒªÕë¶Ô¶íÂÞ˹Óû§£¬£¬£¬µ«´ËÀ๥»÷Õ½ÂÔ¿ÉÄܱ»ÓÃÓÚ¸üÆÕ±éµÄ¹æÄ££¬£¬£¬Èö²¥¸ß·çа¶ñÒâÈí¼þ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/youtubers-extorted-via-copyright-strikes-to-spread-malware/


4. ̨±±ÂíÙɼÍÄîÒ½ÔºÔâÍøÂç¹¥»÷ÖÂÐÅϢй¶²¢ÖÂǸ


3ÔÂ6ÈÕ£¬£¬£¬Ì¨±±ÂíÙɼÍÄîÒ½Ôº¿ËÈվͱ¾Ô³õÔâÊÜÃûΪ¡°Crazy Hunter¡±µÄÀÕË÷Èí¼þ¹¥»÷µ¼ÖµÄÐÅϢй¶ÊÂÎñÏò¹«ÖÚÖÂǸ¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬´Ë´Î¹¥»÷µ¼Ö¸ÃÒ½Ôº500¶ą̀ÅÌËã»úÍ߽⣬£¬£¬²¢Óиߴï32.5GBµÄÐÅÏ¢±»µÁ£¬£¬£¬ÆäÖаüÀ¨À´×Ǫ̂Íå¸÷µØÂíÙÉ·ÖÔºµÄ1660ÍòÃû»¼ÕßµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£Ëæºó£¬£¬£¬Ò»ÃûºÚ¿ÍÔÚÍøÂçÂÛ̳ÉÏÉù³ÆÓµÓд˴ι¥»÷µÄÊý¾Ý²¢ÔÚÍøÉϳöÊÛ¡£¡£¡£Õë¶Ô´Ë´ÎÊÂÎñ£¬£¬£¬Ò½ÔºÌåÏÖÒÑ×ñÕÕ½ôÆÈЭÒ飬£¬£¬²¢Ê¹ÓÃÎÀÉú²¿µÄÍøÂçÇ徲ƽ̨Ìá½»±¨¸æ¡£¡£¡£Í¬Ê±£¬£¬£¬Ò½ÔºÒ²³ÎÇåÁËÏà¹ØÇéÐΣ¬£¬£¬²¢½¨Ò鹫ÖÚÌá¸ßСÐÄ£¬£¬£¬²»ÒªÌý´Óָʾ´Ó×Ô¶¯È¡¿î»úȡǮ»òÔÚ¿ÉÒɵ绰ÖÐÌṩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£ÎªÌá·ÀÀàËÆÊÂÎñÔٴα¬·¢£¬£¬£¬Ò½Ôº½«ÔöÇ¿ÍøÂçÇ徲ϵͳ£¬£¬£¬²¢°´ÆÚ¾ÙÐÐϵͳ¼ì²é¡£¡£¡£±ðµÄ£¬£¬£¬ÎÀÉú¸£Àû²¿×ÊѶÖÎÀí˾˾³¤ÀÕÃÌåÏÖ£¬£¬£¬ËäÈ»±»ÏúÊÛµÄ×ÊÁÏ¿´ËÆÒ½ÁÆ×ÊѶ£¬£¬£¬¿ÉÊÇ·ñÀ´×ÔÂíÙÉÒ½ÔºÈÔÐèÈ·ÈÏ¡£¡£¡£Ëûͬʱָ³ö£¬£¬£¬Õû¯»ù¶½½ÌÒ½Ôº×î½üÒ²Ôâµ½ºÚ¿Í¹¥»÷£¬£¬£¬¹¥»÷Õß»ñµÃÁËÖÎÀíԱȨÏÞ£¬£¬£¬Òò´ËºôÓõ¸÷Ò½ÔºÔöÇ¿ÍøÂçÇå¾²²½·¥£¬£¬£¬È·±£» £»£»£»¼ÕßÐÅÏ¢µÄÇå¾²¡£¡£¡£


https://www.taiwannews.com.tw/news/6053546


5. Edimax IC-7100ÉãÏñ»úÑÏÖØÎó²îÔâ½©Ê¬ÍøÂç¹¥»÷ʹÓÃ


3ÔÂ7ÈÕ£¬£¬£¬Ò»¸öÓ°ÏìEdimax IC-7100 IPÉãÏñ»úµÄÑÏÖØÏÂÁî×¢ÈëÎó²î£¨CVE-2025-1316£©ÕýÔÚ±»½©Ê¬ÍøÂç¶ñÒâÈí¼þʹÓ㬣¬£¬µ¼ÖÂ×°±¸ÊÜË𡣡£¡£¸ÃÎó²îÓÉAkamaiµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬²¢Òѱ¨¸æ¸øÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©¾Ö(CISA)£¬£¬£¬µ«¹©Ó¦ÉÌEdimaxδ»ØÓ¦¡£¡£¡£Edimax IC-7100ÊÇÒ»¿îÓÃÓÚÔ¶³Ì¼à¿ØµÄIPÇå¾²ÉãÏñ»ú£¬£¬£¬ËäÈ»ÒÑÍ£²ú£¬£¬£¬µ«ÈÔ¿ÉÄÜÔÚÈ«Çò¹æÄ£ÄÚʹÓᣡ£¡£Ô¶³Ì¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËÍÌØÖÆÇëÇóÀ´»ñµÃÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬Ê¹ÓôËÎó²îÆÆËð×°±¸¡£¡£¡£½©Ê¬ÍøÂçͨ³£Ê¹ÓÃÕâЩװ±¸ÌᳫÂþÑÜʽ¾Ü¾øÐ§ÀÍ(DDoS)¹¥»÷¡¢ÊðÀí¶ñÒâÁ÷Á¿»ò¹¥»÷Í³Ò»ÍøÂçÉÏµÄÆäËû×°±¸¡£¡£¡£CISA½¨ÒéÓû§½«ÊÜÓ°Ïì×°±¸ÏÂÏß¡¢ÖÃÓÚ·À»ðǽºóÃæ¡¢ÓëÒªº¦ÓªÒµÍøÂç¸ôÀ룬£¬£¬²¢ÔÚÐèҪʱʹÓÃ×îеÄVPN²úƷʵÏÖÇå¾²µÄÔ¶³Ì»á¼û¡£¡£¡£ÎïÁªÍø×°±¸ÊÜËðµÄ³£¼û¼£Ïó°üÀ¨ÐÔÄÜϽµ¡¢¹ýÈÈ¡¢×°±¸ÉèÖÃÒâÍâת±äÒÔ¼°·Çµä·¶/Òì³£µÄÍøÂçÁ÷Á¿¡£¡£¡£


https://www.bleepingcomputer.com/news/security/unpatched-edimax-ip-camera-flaw-actively-exploited-in-botnet-attacks/


6. ³¬10ÒÚ×°±¸Ê¹ÓõÄSP32΢оƬ±»ÆØº¬Î´¼Í¼¡°ºóÃÅ¡±ÏÂÁî


3ÔÂ8ÈÕ£¬£¬£¬ÀÖöÎ(Espressif)Éú²úµÄESP32΢оƬ£¬£¬£¬×÷ΪȫÇòÎïÁªÍø×°±¸ÖÐÓÃÓÚWi-FiºÍÀ¶ÑÀÅþÁ¬µÄ×îÆÕ±éʹÓõÄоƬ֮һ£¬£¬£¬Òѱ»Áè¼Ý10ÒŲ́װ±¸½ÓÄÉ¡£¡£¡£È»¶ø£¬£¬£¬Î÷°àÑÀTarlogic SecurityµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬ESP32Öб£´æ29Ìõδ¼Í¼µÄÏÂÁ£¬£¬ÕâЩÏÂÁî¿ÉÄܱ»ÓÃ×÷¡°ºóÃÅ¡±£¬£¬£¬ÔÊÐí¹¥»÷Õß¾ÙÐÐð³ä¹¥»÷¡¢Î´¾­ÊÚȨµÄÊý¾Ý»á¼û¡¢×ªÏòÍøÂçÉÏµÄÆäËû×°±¸£¬£¬£¬²¢½¨Éèºã¾Ã³¤ÆÚÐÔ¡£¡£¡£ÕâЩÏÂÁî°üÀ¨ÄÚ´æ²Ù×÷¡¢MACµØµãÓÕÆ­ºÍLMP/LLCPÊý¾Ý°ü×¢ÈëµÈ¡£¡£¡£Ñо¿Ö°Ô±ÔÚÂíµÂÀïµÄRootedCONÉÏչʾÁËËûÃǵÄÑо¿Ð§¹û£¬£¬£¬²¢ÖÒÑԳƣ¬£¬£¬ÓÉÓÚESP32µÄÆÕ±éÓ¦Ó㬣¬£¬Î£º¦ºÜ´ó¡£¡£¡£´ËÎÊÌâÏÖÔÚÒÑÔÚCVE-2025-27840ϾÙÐиú×Ù¡£¡£¡£ÀÖöÎÉÐδ¹ûÕæ¼Í¼ÕâЩÏÂÁ£¬£¬Òò´ËÕâЩÏÂÁî¿ÉÄÜÊDZ»¹ýʧµØÒÅ©»òÔ­À´¾ÍÎÞ·¨»á¼û¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬ÕâЩÏÂÁî´øÀ´µÄΣº¦°üÀ¨OEM¼¶±ðµÄ¶ñÒâʵÑéºÍ¹©Ó¦Á´¹¥»÷£¬£¬£¬ÓÈÆäÊǵ±¹¥»÷ÕßÒѾ­ÓµÓÐÎïÆÊÎö¼û×°±¸µÄUSB»òUART½Ó¿Úʱ¡£¡£¡£ÈôÊǹ¥»÷ÕßÄܹ»Ê¹ÓÃÕâЩÏÂÁ£¬£¬ËûÃǽ«Äܹ»ÍêÈ«¿ØÖÆESP32оƬ£¬£¬£¬²¢Í¨¹ýÔÊÐíRAMºÍFlashÐ޸ĵÄÏÂÁî»ñµÃоƬµÄ³¤ÆÚÐÔ£¬£¬£¬´Ó¶ø¶ÔÆäËû×°±¸Ö´ÐÐÀ¶ÑÀ»òWi-Fi¹¥»÷¡£¡£¡£


https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/