ÎÚ¿ËÀ¼Ôâ¶à×éÍþвÐÐΪÕßÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2025-08-08

1. ÎÚ¿ËÀ¼Ôâ¶à×éÍþвÐÐΪÕßÍøÂç¹¥»÷


8ÔÂ6ÈÕ£¬£¬£¬£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×飨CERT-UA£©¿ËÈÕÐû²¼¾¯±¨£¬£¬£¬£¬Ö¸³ö¸Ã¹úÕþ¸®»ú¹¹¡¢¹ú·À²½¶Ó¼°¹ú·À¹¤ÒµÆóÒµÕýÔâÊܶà¸öÍþвÐÐΪÕßµÄÒ»Á¬ÍøÂç¹¥»÷¡£¡£ ¡£ÆäÖУ¬£¬£¬£¬UAC-0099×éÖ¯ÓëGamaredonÕûÌåÓÈΪ»îÔ¾£¬£¬£¬£¬¶þÕß¾ùͨÏ꾡ÃÜÉè¼ÆµÄÍøÂç´¹ÂÚÊÖ¶ÎÉøÍ¸Ä¿µÄϵͳ£¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢½¨É賤ÆÚ»¯»á¼û¡£¡£ ¡£UAC-0099×éÖ¯×Ô2023Äê6ÔÂÊ״α»¹ûÕæ¼Í¼ÒÔÀ´£¬£¬£¬£¬¶à´ÎÒÔÎÚ¿ËÀ¼ÊµÌåÎªÌØ¹¤»î¶¯Ä¿µÄ¡£¡£ ¡£Æä×îй¥»÷ʹÓ÷¨Ôº´«Æ±Ö÷ÌâµÄ´¹ÂÚÓʼþ£¬£¬£¬£¬Í¨¹ýCuttlyµÈURLËõ¶ÌЧÀÍ·¢ËÍÁ´½Ó£¬£¬£¬£¬ÓÕµ¼Êܺ¦ÕßÏÂÔØ°üÀ¨HTMLÓ¦ÓóÌÐò£¨HTA£©µÄË«´æµµÎļþ¡£¡£ ¡£Ö´Ðк󣬣¬£¬£¬»ìÏýµÄVisual Basic¾ç±¾»á½¨ÉèÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯£¬£¬£¬£¬²¢¼ÓÔØMATCHBOIL¶ñÒâÈí¼þ£¬£¬£¬£¬×îÖÕͶ·ÅMATCHWOKºóÃż°DRAGSTAREÊý¾ÝÇÔÈ¡³ÌÐò¡£¡£ ¡£Óë´Ëͬʱ£¬£¬£¬£¬Çå¾²³§ÉÌESETµÄ±¨¸æÕ¹ÏÖ£¬£¬£¬£¬¶íÂÞ˹Åä¾°µÄGamaredonÕûÌåÔÚ2024ÄêϰëÄêÏÔÖøÔöÇ¿Á˶ÔÎÚ¿ËÀ¼µÄ¡°ÎÞÇ顱Óã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷¡£¡£ ¡£¸Ã×éÖ¯½ÓÄÉÁùÖÖÐÂÐ͹¤¾ß£¬£¬£¬£¬°üÀ¨ÓÃÓÚÕï¶ÏÊý¾ÝÍøÂçµÄPteroDespair¡¢ºáÏòÒÆ¶¯µÄPteroTickleÎäÆ÷»¯¹¤¾ß£¬£¬£¬£¬ÒÔ¼°Í¨¹ýTelegraph API½¨Éè¼ÓÃÜͨµÀµÄPteroGraphin³¤ÆÚ»¯¹¤¾ß¡£¡£ ¡£


https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html


2. Ç÷ÊÆ¿Æ¼¼Apex Oneƽ̨ÏÖ»îԾʹÓõÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î


8ÔÂ6ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²³§ÉÌÇ÷ÊÆ¿Æ¼¼¿ËÈÕÏò¿Í»§·¢³ö½ôÆÈÖÒÑÔ£¬£¬£¬£¬³ÆÆäApex One¶ËµãÇ徲ƽ̨ÕýÔâÊÜÕë¶ÔÁ½¸öÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-54948¡¢CVE-2025-54987£©µÄ»îԾʹÓ㬣¬£¬£¬±Þ²ßÓû§Á¬Ã¦½ÓÄÉ·À»¤²½·¥¡£¡£ ¡£´Ë´ÎÎó²îÔ´ÓÚApex OneÖÎÀí¿ØÖÆÌ¨£¨ÍâµØ°æ£©µÄÏÂÁî×¢ÈëȱÏÝ£¬£¬£¬£¬ÔÊÐíÔ¤ÏÈͨ¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚδÐÞ²¹µÄϵͳÉÏÔ¶³ÌÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£Ö»¹ÜÎó²îÐè¹¥»÷Õ߾߱¸¿ØÖÆÌ¨»á¼ûȨÏÞ£¬£¬£¬£¬µ«Ç÷ÊÆ¿Æ¼¼Ã÷È·ÌåÏÖÒÑÊӲ쵽ÖÁÉÙÒ»ÆðÒ°ÍâʹÓð¸Àý£¬£¬£¬£¬ÈÕ±¾CERTҲͬ²½Ðû²¼Ô¤¾¯£¬£¬£¬£¬Ç¿µ÷ÆäÏÖʵÍþвÐÔ¡£¡£ ¡£ÎªÓ¦¶Ô½ôÆÈÇéÐΣ¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼³Æ2025Äê8ÔÂÖÐÑ®Ðû²¼²¹¶¡£¬£¬£¬£¬²¢Ìṩ¶ÌÆÚ»º½â¹¤¾ß¡£¡£ ¡£¸Ã¹¤¾ßͨ¹ý½ûÓÃÖÎÀíÔ±´ÓApex One¿ØÖÆÌ¨Ô¶³Ì°²ÅÅÊðÀíµÄ¹¦Ð§£¬£¬£¬£¬¿ÉÍêÈ«×è¶ÏÒÑÖªÎó²îʹÓ÷¾¶£¬£¬£¬£¬µ«»áµ¼ÖÂÔÝʱʧȥԶ³ÌÖÎÀíÄÜÁ¦¡£¡£ ¡£¹«Ë¾½¨ÒéÓû§ÓÅÏȰ²ÅŴ˹¤¾ß£¬£¬£¬£¬×ÝÈ»ÐèÎþÉü²¿·Ö±ãµ±ÐÔÒÔÈ·±£¶ËµãÇå¾²¡£¡£ ¡£½øÒ»²½·À»¤½¨Òé°üÀ¨£ºÈô¿ØÖÆÌ¨IPµØµã̻¶ÓÚÍâ²¿ÍøÂ磬£¬£¬£¬Ó¦Á¬Ã¦ÊµÑéÔ´IPÏÞÖÆµÈ»á¼û¿ØÖƲ½·¥¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-endpoint-protection-zero-day-exploited-in-attacks/


3. еġ°ÓÄÁéµç»°¡±Õ½ÊõʹÓÃZoomºÍMicrosoft Teams¾ÙÐÐC2²Ù×÷


8ÔÂ6ÈÕ£¬£¬£¬£¬ÔÚBlackHat USA 2025´ó»áÉÏ£¬£¬£¬£¬PraetorianÇå¾²Ñо¿Ô±Adam CrosserÕ¹ÏÖÁËÒ»ÖÖÃûΪ"ÓÄÁéºô½Ð"£¨Ghost Calls£©µÄÐÂÐͺóʹÓÃÏÂÁîÓë¿ØÖÆ£¨C2£©¹æ±ÜÊÖÒÕ¡£¡£ ¡£¸ÃÊÖÒÕͨ¹ýÀÄÓÃZoom¡¢Microsoft TeamsµÈ¾Û»áÓ¦ÓóÌÐòʹÓõÄTURNЭÒéЧÀÍÆ÷£¬£¬£¬£¬½«¶ñÒâC2Á÷Á¿Î±×°³ÉÕý³£ÊÓÆµ¾Û»áͨѶ£¬£¬£¬£¬´Ó¶øÈƹý¹Å°åÍøÂçÇå¾²·ÀÓù¡£¡£ ¡£TURNЭÒé±¾ÊÇÓÃÓÚ×ÊÖúNAT·À»ðǽºó×°±¸½¨ÉèÊÓÆµÍ¨»°¡¢VoIPµÈʵʱͨѶµÄ¸¨ÖúЭÒé¡£¡£ ¡£µ±Óû§¼ÓÈëZoom»òTeams¾Û»áʱ£¬£¬£¬£¬¿Í»§¶Ë»á»ñÈ¡ÔÝʱTURNƾ֤ÒÔ½¨ÉèÖмÌÅþÁ¬¡£¡£ ¡£"ÓÄÁéºô½Ð"ͨ¹ýÐ®ÖÆÕâЩÕýµ±Æ¾Ö¤£¬£¬£¬£¬ÔÚ¹¥»÷ÕßÓëÊܺ¦Õß×°±¸¼ä¹¹½¨»ùÓÚWebRTCµÄ¼ÓÃÜËíµÀ£¬£¬£¬£¬½«C2Ö¸Áîαװ³ÉͨÀýÊÓÆµ¾Û»áÁ÷Á¿¡£¡£ ¡£ÓÉÓÚÁ÷Á¿¾­ÆóÒµ³£ÓÃÓòÃû·ÓÉ£¬£¬£¬£¬ÇÒʹÓö˿Ú443µÄUDP/TCP×Ô˳Ӧ´«Ê䣬£¬£¬£¬¿ÉÈÆ¹ý·À»ðǽ¡¢ÊðÀí¼°TLS¼ì²é£¬£¬£¬£¬ÊµÏָ߶ÈÒþ²ØµÄÏÂÁî¿ØÖÆ¡£¡£ ¡£CrosserÖ¸³ö£¬£¬£¬£¬Óë¹Å°åC2»úÖÆÏà±È£¬£¬£¬£¬¸ÃÒªÁì¾ß±¸Èý´óÓÅÊÆ£ºÆäÒ»£¬£¬£¬£¬ÎÞÐèÒÀÀµÈí¼þÎó²î£¬£¬£¬£¬½öͨ¹ýÀÄÓÃÕýµ±»ù´¡ÉèÊ©¼´¿ÉʵÏÖ£»£»£»£» £»£»Æä¶þ£¬£¬£¬£¬Ö§³Öʵʱ½»»¥£¬£¬£¬£¬Öª×ãVNCÔ¶³Ì¿ØÖƵÈÐèÒªµÍÑӳٵIJÙ×÷ÐèÇ󣻣»£»£» £»£»ÆäÈý£¬£¬£¬£¬¹¥»÷ÕßÎÞÐè̻¶×ÔÓÐÓòÃû»ò»ù´¡ÉèÊ©£¬£¬£¬£¬¼«´ó½µµÍ×·×ÙΣº¦¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/new-ghost-calls-tactic-abuses-zoom-and-microsoft-teams-for-c2-operations/


4. µÂ¹úµçÐÅMagentaTVƽ̨Òò¹ã¸æÆ½Ì¨Îó²îй¶Óû§Êý¾Ý


8ÔÂ6ÈÕ£¬£¬£¬£¬µÂ¹úµçÐÅ£¨Deutsche Telekom£©ÆìÏÂÓÎýÌåÆ½Ì¨MagentaTVÒòµÚÈý·½¹ã¸æÆ½Ì¨Îó²îÔâÓöÓû§Êý¾Ýй¶£¬£¬£¬£¬Ð¹Â¶Ê±³¤´ïÊýÔ¡£¡£ ¡£Ñо¿ÍŶÓÓÚ2025Äê6ÔÂÖÐÑ®·¢Ã÷£¬£¬£¬£¬ÓÉ¹ã¸æÊÖÒÕ¹«Ë¾EquativÆìϵÄServerside.aiÍйܵÄElasticsearchÊý¾Ý¿âδÉè±£»£»£»£» £»£»¤£¬£¬£¬£¬µ¼ÖÂMagentaTVÓû§ÈÕÖ¾±»¹ûÕæÌ»Â¶¡£¡£ ¡£Ö»¹ÜµÂ¹úµçÐÅÔÚÍŶÓת´ïºóÒÑÏÂÏ߸ÃʵÀý£¬£¬£¬£¬µ«Ì»Â¶Ê±´ú£¨ÖÁÉÙ×Ô2025Äê2ÔÂÆð£©ÀÛ»ýµÄ³¬3.24ÒÚÌõÈÕÖ¾×ÜÁ¿´ï729GBÒÑÃæÁÙDZÔÚÀÄÓÃΣº¦¡£¡£ ¡£´Ë´Îй¶µÄÊý¾ÝÖ÷ÒªÔ´ÓÚÓû§ÓëMagentaTVƽ̨µÄ½»»¥ÇëÇ󣬣¬£¬£¬°üÀ¨HTTP±êÍ·ÖеķÇÃô¸ÐÐÅÏ¢£¨ÈçÓû§ÊðÀí£©¼°²¿·ÖÃô¸Ð±êʶ·û£¬£¬£¬£¬°üÀ¨Î¨Ò»×°±¸±êʶ£¨MACµØµã£©¡¢ÍøÂçÅþÁ¬±êʶ£¨IPµØµã£©¡¢ÕË»§¹ØÁªID£¨¿Í»§ID¼°»á»°ID£©¡£¡£ ¡£Ö»¹Üµ¥ÌõÊý¾Ý¼ÛÖµÓÐÏÞ£¬£¬£¬£¬µ«¹¥»÷Õß¿Éͨ¹ý½»Ö¯ÒýÓöàԴй¶Êý¾Ý£¨ÈçÀúʷй¶µÄIPÓëÓû§ÐÅϢƥÅ䣩ʵÏÖÓû§Éí·Ý×·×Ù»ò×°±¸¶¨Î»¡£¡£ ¡£


https://cybernews.com/security/deutsche-telekom-magentatv-data-leak/


5. ¹È¸èÔÚÒ»Á¬µÄSalesforceÊý¾Ý͵ÇÔ¹¥»÷ÖÐÔâÓöÊý¾Ýй¶


8ÔÂ6ÈÕ£¬£¬£¬£¬¿Æ¼¼¾ÞÍ·Google¿ËÈÕÈ·ÈϳÉΪÀÕË÷×éÖ¯ShinyHuntersµÄ×îй¥»÷Ä¿µÄ£¬£¬£¬£¬ÆäÆóÒµSalesforce¿Í»§¹ØÏµÖÎÀí£¨CRM£©ÏµÍ³ÔâÈëÇÖ£¬£¬£¬£¬µ¼Ö²¿·Ö¿Í»§Êý¾Ýй¶¡£¡£ ¡£´Ë´ÎÊÂÎñÓë¸Ã×éÖ¯½üÆÚÕë¶ÔÈ«ÇòÆóÒµµÄ´ó¹æÄ£Êý¾ÝÇÔÈ¡Ðж¯Ïà¹Ø£¬£¬£¬£¬Éæ¼°ÓïÒô´¹ÂÚ£¨Vishing£©Éç»á¹¤³Ì¹¥»÷¼°Salesforceƽ̨Îó²îʹÓᣡ£ ¡£¾ÝGoogleÅû¶£¬£¬£¬£¬6ÔÂʱ´ú£¬£¬£¬£¬ÆäÒ»¸öÓÃÓÚ´æ´¢ÖÐСÆóÒµÁªÏµÐÅÏ¢¼°Ïà¹Ø±¸×¢µÄSalesforceʵÀý£¬£¬£¬£¬ÒòÔâÓö±»×·×ÙΪ¡°UNC6040¡±»ò¡°UNC6240¡±µÄÍþвÐÐΪÕß¹¥»÷¶øÊ§ÏÝ¡£¡£ ¡£¹¥»÷Õßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÇÖÈëϵͳ£¬£¬£¬£¬ÔÚ¶ÌÔÝ»á¼û´°¿ÚÄÚÇÔÈ¡ÁË»ù´¡ÉÌÒµÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÆóÒµÃû³Æ¡¢ÁªÏµ·½·¨µÈ´ó²¿·ÖΪ¹ûÕæ»ò·ÇÃô¸ÐÊý¾Ý¡£¡£ ¡£GoogleÇ¿µ÷ÒÑѸËÙÇжÏÈëÇÖ·¾¶²¢Íê³ÉÓ°ÏìÆÊÎö£¬£¬£¬£¬µ«Î´Ã÷È·ÏêϸÊÜÓ°Ïì¿Í»§ÊýÄ¿¡£¡£ ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬´Ë´Î¹¥»÷Ä»ºóºÚÊÖʵΪÎÛÃûÕÑÖøµÄShinyHuntersÀÕË÷¼¯ÍÅ¡£¡£ ¡£´Ë´ÎÐж¯ÖУ¬£¬£¬£¬ShinyHuntersͨ¹ýÈëÇÖÆóÒµSalesforceʵÀýÇÔÈ¡Êý¾Ý£¬£¬£¬£¬²¢ÒÔ¹ûÕæÐ¹Â¶»ò³öÊÛÊý¾ÝΪÍþв¾ÙÐÐÀÕË÷¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/google-suffers-data-breach-in-ongoing-salesforce-data-theft-attacks/


6. ·¨¹ú²¼ÒÁ¸ñµçÐÅÔâÓö´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬640Íò¿Í»§ÐÅÏ¢ÊÜÓ°Ïì


8ÔÂ7ÈÕ£¬£¬£¬£¬·¨¹úÖ÷ÒªµçÐÅÔËÓªÉ̲¼ÒÁ¸ñµçÐÅ£¨Bouygues Telecom£©Åû¶ÁËÒ»ÆðÖØ´óÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬Ô¼640Íò¿Í»§µÄСÎÒ˽¼ÒÊý¾ÝÔÚÕë¶ÔÐÔÍøÂç¹¥»÷ÖÐÔ⵽й¶¡£¡£ ¡£×÷Ϊ·¨¹úµÚÈý´óÒÆ¶¯Ð§ÀÍÌṩÉÌ£¬£¬£¬£¬¸Ã¹«Ë¾ÓµÓÐ1450ÍòÒÆ¶¯Óû§¼°9000ÃûÔ±¹¤£¬£¬£¬£¬2024ÄêÓªÊÕ´ï568ÒÚÅ·Ôª¡£¡£ ¡£¾Ý¹Ù·½ÉùÃ÷£¬£¬£¬£¬¹¥»÷ÓÉ"ÒÑÖªÍøÂç·¸·¨¼¯ÍÅ"ʵÑ飬£¬£¬£¬Í¨¹ýÇÖÈëÌØ¶¨ÄÚ²¿×ÊÔ´»ñÈ¡Á˿ͻ§ÁªÏµ·½·¨¡¢ÌõÔ¼ÐÅÏ¢¡¢»éÒö״̬¡¢ÆóÒµ¿Í»§×ÊÁϼ°¹ú¼ÊÒøÐÐÕ˺ţ¨IBAN£©µÈÃô¸ÐÊý¾Ý¡£¡£ ¡£ÖµµÃÇìÐÒµÄÊÇ£¬£¬£¬£¬ÐÅÓÿ¨ºÅ¡¢ÕË»§ÃÜÂëµÈ½¹µã²ÆÎñÐÅϢδ±»ÇÔÈ¡¡£¡£ ¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬²¼ÒÁ¸ñµçÐÅÊÖÒÕÍŶÓѸËÙ×è¶Ï¹¥»÷Õß»á¼û·¾¶£¬£¬£¬£¬²¢Ð­Í¬·¨¹ú¹ú¼ÒÍøÂçÇå¾²¾Ö£¨ANSSI£©ºÍÊý¾Ý±£»£»£»£» £»£»¤»ú¹¹CNILÕö¿ªÊӲ죬£¬£¬£¬Í¬Ê±Ç¿»¯ÍøÂç¼à¿ØÓëÇå¾²·À»¤ÏµÍ³¡£¡£ ¡£Ð¹Â¶ÊÂÎñ¶Ô¿Í»§×é³ÉDZÔÚΣº¦£¬£¬£¬£¬Ö»¹ÜIBANµ¥¶Àȱ·¦ÒÔÍê³ÉתÕ˲Ù×÷£¬£¬£¬£¬µ«ÊÜÓ°ÏìÓû§ÈÔ±»½¨Òé°´ÆÚºË²éÒøÐÐÉúÒâ¼Í¼£¬£¬£¬£¬²¢Ð¡ÐÄÒÔ¿Í»§ÐÕÃûºÍÕ˺ÅʵÑéµÄÍøÂç´¹ÂÚÕ©Æ­¡£¡£ ¡£¹«Ë¾ÒÑͨ¹ý¶ÌÐźÍÓʼþÖ±½Ó֪ͨÊܺ¦Õߣ¬£¬£¬£¬²¢Ã÷È·ÖÒÑÔÇÐÎðÏòÉù³ÆÕÆÎÕÆäСÎÒ˽¼ÒÐÅÏ¢µÄÀ´µçÕß͸¶µÇ¼ƾ֤µÈÃô¸Ð×ÊÁÏ¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/bouygues-telecom-confirms-data-breach-impacting-64-million-customers/