ÃÀ¹úÁª°î˾·¨»ú¹¹È·ÈÏÍøÂç¹¥»÷£¬£¬£¬Ãô¸Ð°¸¼þÎļþÇå¾²ÔâÍþв

Ðû²¼Ê±¼ä 2025-08-12

1. ÃÀ¹úÁª°î˾·¨»ú¹¹È·ÈÏÍøÂç¹¥»÷£¬£¬£¬Ãô¸Ð°¸¼þÎļþÇå¾²ÔâÍþв


8ÔÂ8ÈÕ£¬£¬£¬ÃÀ¹úÁª°î˾·¨»ú¹¹¿ËÈÕ֤ʵ£¬£¬£¬ÆäÓÃÓÚÖÎÀíÉñÃØ·¨Í¥ÎļþµÄµç×Ó°¸¼þÖÎÀíϵͳÕýÔâÓöÖØ´óÇÒÒ»Á¬µÄÍøÂç¹¥»÷£¬£¬£¬²¢ÒѽÓÄÉÌØÊâÇå¾²²½·¥ÔöÇ¿·À»¤¡£¡£ ¡£¡£¡£´Ë´ÎÊܹ¥»÷µÄϵͳ°üÀ¨Áª°î·¨ÔºÎļþÖÎÀíµÄ½¹µãƽ̨CM/ECF£¨°¸¼þÖÎÀí/µç×Ó°¸¼þµµ°¸ÏµÍ³£©ºÍPACER£¨¹«¹²»á¼û·¨Ôºµç×Ӽͼϵͳ£©£¬£¬£¬ºóÕß×÷ΪÁª°î˾·¨Îļþ¹ûÕæÓë´æ´¢µÄÖ§Öù£¬£¬£¬ÆäÇå¾²ÐÔÖ±½Ó¹Øºõ´ó×ÚËßËϵ±ÊÂÈ˵ÄÃô¸ÐÐÅÏ¢¡£¡£ ¡£¡£¡£Ö»¹Ü˾·¨»ú¹¹ÉùÃ÷δֱ½ÓÈ·ÈÏPolitico±¨µÀÖÐÌáµ½µÄ¡°ÉñÃØÏßÈËÉí·Ýй¶¡±µÈÏêϸָ¿Ø£¬£¬£¬µ«ÆäÔÚͨ¸æÖÐÇ¿µ÷£¬£¬£¬²¿·ÖÃÜ·âÎļþÒò°üÀ¨Ãô¸ÐÐÅÏ¢£¬£¬£¬ÏÖÒÑͨ¹ý¸üÑÏ¿áµÄ»á¼û¿ØÖÆÊÖÒÕÔöÇ¿±£»£»£»£»£»£»£»¤£¬£¬£¬Ö¼ÔÚ×è¶ÏºÚ¿Í¹¥»÷·¾¶¡£¡£ ¡£¡£¡£Ë¾·¨²¿·ÖͬʱÌåÏÖ£¬£¬£¬ÕýÓÅÏÈÓë¸÷¼¶·¨ÔºÐ­×÷£¬£¬£¬ÒÔ¼õÇá¹¥»÷¶ÔËßËϵ±ÊÂÈË¿ÉÄÜÔì³ÉµÄÓ°Ï죬£¬£¬²¢Ò»Á¬Éý¼¶ÏµÍ³Çå¾²ÐÔÒÔÌá·ÀδÀ´Íþв¡£¡£ ¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚ2025Äê7Ô³õ£¬£¬£¬Ë¾·¨»ú¹¹Í¨¹ýÄäÃûÐÂÎÅÔ´»ñϤ¹¥»÷ÑÏÖØÐԺ󣬣¬£¬ÓÚ7ÔÂ4ÈÕÆô¶¯ÄÚ²¿ÊӲ첢¼ò±¨Ïà¹ØÇéÐΣ¬£¬£¬µ«Î´Á¬Ã¦¹ûÕæÉùÃ÷¡£¡£ ¡£¡£¡£Ö±ÖÁPolitico±¨µÀÅû¶¡°Ãô¸ÐÐÅϢй¶ӰÏì¶àÁª°îµØÇø¡±ºó£¬£¬£¬Ë¾·¨»ú¹¹²ÅÐû²¼Í¨¸æ»ØÓ¦£¬£¬£¬µ«Î´Ïêϸ˵Ã÷¹¥»÷ȪԴ»òÏêϸËðʧ¹æÄ£¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-judiciary-confirms-breach-of-court-electronic-records-service/


2. °Í»ù˹̹ʯÓÍÓÐÏÞ¹«Ë¾£¨PPL£©ÀÖ³É×èÖ¹ÀÕË÷Èí¼þ¹¥»÷


8ÔÂ8ÈÕ£¬£¬£¬°Í»ù˹̹ʯÓÍÓÐÏÞ¹«Ë¾£¨PPL£©ÓÚ2025Äê8ÔÂ6ÈÕÔâÓöÒ»ÆðÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬Æä²¿·ÖIT»ù´¡ÉèÊ©Êܵ½Ó°Ï죬£¬£¬µ«¹«Ë¾Í¨¹ý¿ìËÙÏìÓ¦ºÍ¶à²ãÍøÂçÇå¾²²½·¥ÀֳɿØÖÆÁËÊÂÎñ£¬£¬£¬½¹µãÔËӪϵͳ¼°Ãô¸ÐÊý¾ÝδÔâй¶¡£¡£ ¡£¡£¡£PPLÔÚÏò°Í»ù˹̹֤ȯÉúÒâËù£¨PSX£©Ìá½»µÄ֪ͨÖÐÅû¶£¬£¬£¬ÊÂÎñ±¬·¢ºó£¬£¬£¬¹«Ë¾Á¬Ã¦Æô¶¯ÄÚ²¿ÍøÂçÇ徲ЭÒ飬£¬£¬ITÍŶÓÓëÍⲿר¼ÒЭͬ½ÓÄÉ×èÖ¹²½·¥£¬£¬£¬°üÀ¨ÔÝÍ£²¿·Ö·ÇÒªº¦ITЧÀÍÒÔÏÞÖÆÇ±ÔÚÓ°Ï죬£¬£¬È·±£ÏµÍ³ÍêÕûÐÔ¡£¡£ ¡£¡£¡£¹«Ë¾ÉùÃ÷Ç¿µ÷£¬£¬£¬Æä¶à²ãÍøÂçÇå¾²¿ò¼ÜÓÐÓøôÀëÁËÍþв£¬£¬£¬Î´·¢Ã÷Òªº¦ÓªÒµÊý¾Ý»òÃô¸ÐÐÅÏ¢±»Ð¹Â¶£¬£¬£¬½¹µãÔËӪϵͳ¼á³ÖÕý³£ÔËÐУ¬£¬£¬Î´·ºÆðÖÐÖ¹¡£¡£ ¡£¡£¡£Ö»¹ÜÊÕµ½ÍⲿְԱµÄÀÕË÷֪ͨ£¬£¬£¬PPLÃ÷È·ÌåÏÖδÓëºÚ¿Í½¨ÉèÁªÏµ£¬£¬£¬²¢ÒÑÒÀ¾ÝÖ´·¨ÒªÇó½«ÊÂÎñÉϱ¨ÖÁÏà¹ØÖ´·¨¼°î¿Ïµ»ú¹¹£¬£¬£¬ÏÖÔÚÕýÅäºÏ¿ªÕ¹ÊӲ졣¡£ ¡£¡£¡£Îª°ü¹Ü½ðÈÚÉúÒâÇå¾²£¬£¬£¬¹«Ë¾ÔÚɨÃèʱ´úÔÝͣϵͳÉúÒ⹦Ч£¬£¬£¬¸ÄÓÃÊÖ¶¯·½·¨Íê³É¸¶¿îÁ÷³Ì£¬£¬£¬×èֹΣº¦À©É¢¡£¡£ ¡£¡£¡£


https://www.brecorder.com/news/amp/40376980


3. ³¯ÏʺڿÍ×éÖ¯ScarCruftÊ״ΰ²ÅÅÀÕË÷Èí¼þ


8ÔÂ8ÈÕ£¬£¬£¬º«¹úÇå¾²¹«Ë¾S2W¿ËÈÕÅû¶£¬£¬£¬Ó볯ÏÊÕþ¸®¹ØÁªµÄºÚ¿Í×éÖ¯ScarCruft£¨APT37£©ÔÚ½üÆÚÍøÂç¹¥»÷ÖÐÊ×´ÎʹÓÃÁËÐÂÐÍÀÕË÷Èí¼þ£¬£¬£¬±ê¼Ç×ÅÆäÐж¯Ä¿µÄ¿ÉÄܴӹŰåÌØ¹¤»î¶¯×ªÏò¾­¼ÃÀûÒæÇý¶¯¡£¡£ ¡£¡£¡£¸Ã×éÖ¯ºã¾ÃÒÔº«¹ú¡¢ÈÕ±¾¡¢Ô½ÄϵȹúµÄ¸ß¼ÛֵСÎÒ˽¼Ò¼°Õþ¸®»ú¹¹Îª¹¥»÷Ä¿µÄ£¬£¬£¬µ«´Ë´ÎÐж¯ÖУ¬£¬£¬Æäͨ¹ýÓã²æÊ½´¹ÂÚÓʼþͶµÝº¬¶ñÒâѹËõ°üµÄÓÕ¶üÎļþ£¬£¬£¬ÀÖ³ÉÈëÇÖϵͳ²¢°²ÅÅÁËÃûΪ¡°VCD¡±µÄÀÕË÷Èí¼þ¡£¡£ ¡£¡£¡£VCDÀÕË÷Èí¼þ»á¶Ô¼ÓÃÜÎļþÌí¼Ó¡°.vcd¡±À©Õ¹Ãû£¬£¬£¬²¢ÌìÉúÓ¢ÎÄÓ뺫ÎÄË«°æ±¾ÀÕË÷֪ͨ£¬£¬£¬ÒªÇóÊܺ¦ÕßÖ§¸¶Êê½ð¡£¡£ ¡£¡£¡£S2WÆÊÎöÖ¸³ö£¬£¬£¬ÕâÒ»ÐÐΪÌåÏÖScarCruft¿ÉÄÜÍØÕ¹Á˰üÀ¨ÆÆËðÐÔ¼°ÀÕË÷Õ½ÂÔµÄÔËӪĿµÄ£¬£¬£¬»òÊÔͼͨ¹ý¾­¼ÃÊÖ¶ÎΪÊÜÖÆ²ÃÕþȨ³ï¼¯×ʽ𡣡£ ¡£¡£¡£Ñо¿»¹Ê¶±ð³ö¹¥»÷ÖÐʹÓõÄÁè¼Ý9Àà¶ñÒâÈí¼þ£¬£¬£¬°üÀ¨ÐÅÏ¢ÇÔÈ¡¹¤¾ßLightPeek¡¢¿ÉÂ¼ÖÆÒôƵ¼°¼Í¼»÷¼üµÄFadeStealer£¬£¬£¬ÒÔ¼°Ê¹ÓÃÕýµ±ÊµÊ±Í¨Ñ¶Æ½Ì¨PubNub¾ÙÐÐÒþ²ØÏÂÁî¿ØÖÆ£¨C2£©Í¨Ñ¶µÄºóÃųÌÐòNubSpy¡£¡£ ¡£¡£¡£Í¨¹ý½«¶ñÒâÁ÷Á¿Î±×°³ÉÕý³£ÍøÂçͨѶ£¬£¬£¬¹¥»÷ÕßÓÐÓÃÒþ²ØÁËÐÐ×Ù¡£¡£ ¡£¡£¡£´Ë´Î¹¥»÷±»¹éÒòÓÚScarCruftÏÂÊôС×éChinopuNK£¬£¬£¬¸ÃС×éÔøÈö²¥Ö§³ÖWindows/Android˫ƽ̨¹¥»÷µÄChinotto¶ñÒâÈí¼þ£¬£¬£¬²¢ÔÚ±¾´ÎÐж¯ÖÐʹÓÃÁËбäÖÖChillyChino¡£¡£ ¡£¡£¡£


https://therecord.media/scarcruft-north-korea-hackers-add-ransomware


4. ¹È¸èÐÞ¸´GeminiÈÕÀúÔ¼ÇëÎó²î


8ÔÂ10ÈÕ£¬£¬£¬¹È¸è¿ËÈÕÐÞ¸´ÁËÒ»Ïî¸ßΣÎó²î£¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷Õßͨ¹ýÈ«ÐÄÖÆ×÷µÄGoogleÈÕÀúÔ¼Ç룬£¬£¬Ô¶³Ì½ÓÊÜÓû§×°±¸ÉÏÔËÐеÄGeminiÊðÀí²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£ ¡£¡£¡£´Ë´Î¹¥»÷ÎÞÐèÓû§×Ô¶¯µã»÷¶ñÒâÁ´½Ó»òÏÂÔØÎļþ£¬£¬£¬½öÐèÒ»Ñùƽ³£ÓëGeminiÖúÊÖ»¥¶¯¼´¿É´¥·¢£¬£¬£¬¶ÔÒÀÀµ¸ÃЧÀ͵ÄÓû§×é³ÉÏÔÖøÍþв¡£¡£ ¡£¡£¡£Gemini×÷Ϊ¹È¸è¼¯³ÉÔÚAndroid¡¢GoogleÍøÂçЧÀͼ°WorkspaceÓ¦ÓÃÖеĴóÐÍÓïÑÔÄ£×Ó£¨LLM£©ÖúÊÖ£¬£¬£¬¿É»á¼ûGmail¡¢ÈÕÀúºÍGoogle HomeµÈ½¹µã¹¦Ð§¡£¡£ ¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËͰüÀ¨Ç¶ÈëʽÌáÐÑ×¢ÈëµÄÈÕÀúÔ¼Ç룬£¬£¬¿ÉʹÓÃGeminiµÄ¿ç¹¤¾ßȨÏÞÖ´ÐжñÒâ²Ù×÷¡£¡£ ¡£¡£¡£ÀýÈ磬£¬£¬µ±Óû§Ñ¯ÎÊ¡°½ñÈÕÈÕÀúÊÂÎñ¡±Ê±£¬£¬£¬Gemini»á´ÓÈÕÀúÖÐÌáÈ¡ËùÓÐÊÂÎñ£¬£¬£¬°üÀ¨¹¥»÷ÕßÖ²ÈëµÄ¶ñÒâÎÊÌâ¡£¡£ ¡£¡£¡£ÕâЩÒþ²ØÖ¸Áî¿ÉÆÈʹGeminiÇÔÈ¡µç×ÓÓʼþÄÚÈÝ¡¢¸ú×ÙÓû§Î»Öá¢Í¨¹ýGoogle Home¿ØÖÆÖÇÄܼҾÓ×°±¸¡¢ÔÚAndroid×°±¸ÉÏ·­¿ªÓ¦ÓóÌÐò£¬£¬£¬ÉõÖÁ´¥·¢ZoomÊÓÆµÍ¨»°¡£¡£ ¡£¡£¡£¹È¸èÇå¾²ÍŶÓÈ·ÈÏÎó²îºóѸËÙÐÞ¸´£¬£¬£¬²¢Ç¿µ÷Æäͨ¹ýºì¶ÓÑÝÁ·ºÍ¿çÐÐҵЭ×÷Ò»Á¬Ç¿»¯·ÀÓù¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/google-calendar-invites-let-researchers-hijack-gemini-to-leak-user-data/


5. ConnexÐÅÓÃÏàÖúÉçÔâÊý¾Ýй¶£¬£¬£¬7Íò»áÔ±ÐÅÏ¢±»ÇÔ


8ÔÂ11ÈÕ£¬£¬£¬¿µÄùµÒ¸ñÖÝ×î´óµÄ·ÇÓªÀûÐÔÐÅÓÃÏàÖúÉçÖ®Ò»Connex¿ËÈÕÅû¶£¬£¬£¬ÆäϵͳÔÚ2025Äê6Ô³õÔâÓöδ֪¹¥»÷ÕßÈëÇÖ£¬£¬£¬µ¼Ö´ó×Ú»áԱСÎÒ˽¼Ò¼°²ÆÎñÐÅϢй¶¡£¡£ ¡£¡£¡£ÊÂÎñʱ¼äÏßÏÔʾ£¬£¬£¬¹¥»÷ÕßÓÚ6ÔÂ2ÈÕÖÁ3ÈÕʱ´ú²»·¨»á¼û²¢ÏÂÔØÁ˲¿·ÖÎļþ£¬£¬£¬ConnexÔÚ6ÔÂ3ÈÕ¼ì²âµ½Òì³££¬£¬£¬²¢ÓÚ7ÔÂ27ÈÕÈ·ÈÏÐ¹Â¶Éæ¼°ÐÕÃû¡¢Õ˺š¢½è¼Ç¿¨ÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¼°Õþ¸®Éí·ÝÖ¤µÈÃô¸ÐÊý¾Ý£¬£¬£¬µ«Î´·¢Ã÷×ʽð»òÕË»§±»Ö±½ÓÇÔÈ¡µÄÖ¤¾Ý¡£¡£ ¡£¡£¡£×÷ΪӦ¶Ô²½·¥£¬£¬£¬ConnexÒÑͨ¹ýÃÀ¹úÓÊÕþÏòÊÜÓ°Ïì»áÔ±·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬²¢ÔÚ¹ÙÍøÐû²¼Õ©Æ­¾¯±¨£¬£¬£¬ÌáÐÑ»áԱСÐÄÕ©Æ­·Ö×Óð³äÆäÔ±¹¤ÊµÑéÍøÂç´¹ÂÚ¹¥»÷¡£¡£ ¡£¡£¡£¾¯±¨Ã÷È·Ö¸³ö£¬£¬£¬Connex¾ø²»»áͨ¹ýµç»°»ò¶ÌÐÅË÷Òª»áÔ±µÄPINÂë¡¢ÃÜÂë»òÕ˺Å£¬£¬£¬ºôÓõÊÕµ½¿ÉÒÉÁªÏµÊ±Á¬Ã¦¹Ò¶Ï²¢²¦´ò¹Ù·½µç»°ºËʵ¡£¡£ ¡£¡£¡£Ö»¹ÜConnexδÌá¼°´Ë´Îй¶ÊÇ·ñÓëÀÕË÷ÍÅ»ïÖ±½ÓÏà¹Ø£¬£¬£¬µ«ÆäÐû²¼µÄÕ©Æ­Ô¤¾¯ÌåÏÖ¹¥»÷Õß¿ÉÄÜʹÓñ»µÁÐÅÏ¢½øÒ»²½ÊµÑ龫׼´¹ÂÚ£¬£¬£¬¼Ó¾ç»áԱΣº¦¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/connex-credit-union-discloses-data-breach-impacting-172-000-people/


6. ³¯ÏʺڿÍ×éÖ¯KimsukyÔâÆ·µÂºÚ¿Í·´ÖÆ£¬£¬£¬8.9GBÉñÃØÊý¾Ýй¶


8ÔÂ11ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬³¯ÏÊÕþ¸®Åä¾°µÄºÚ¿Í×éÖ¯KimsukyÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬Á½Ãû×Ô³Æ"Saber"ºÍ"cyb0rg"µÄÆ·µÂºÚ¿ÍÒÔ×èµ²ÕþÖβÙŪΪÓÉ£¬£¬£¬½«ÆäÇÔÈ¡µÄÉñÃØÊý¾Ý¹ûÕæÖÁÍøÂç¡£¡£ ¡£¡£¡£´Ë´ÎÐж¯ÔÚDEF CON 33ºÚ¿Í´ó»áʱ´úͨ¹ý´«ÆæºÚ¿ÍÔÓÖ¾PhrackµÚ72ÆÚÆØ¹â£¬£¬£¬Òý·¢È«ÇòÍøÂçÇå¾²½ç¹Ø×¢¡£¡£ ¡£¡£¡£¾ÝÅû¶£¬£¬£¬Ð¹Â¶µÄ8.9GBÊý¾Ý°üÀ¨Kimsuky×éÖ¯¶à¸ö½¹µã×ʲú£ºº­¸Çº«¹ú¹ú·À·´Ç鱨˾Á£¨dcc.mil.kr£©µÈÕþ¸®»ú¹¹¡¢Ö÷Á÷ÓÊÏäЧÀÍÉÌ£¨naver/daum/kakao£©µÄÍøÂç´¹ÂÚÈÕÖ¾£¬£¬£¬ÒÔ¼°º«ÍâÑó½»²¿µç×ÓÓʼþƽ̨"Kebi"µÄÍêÕûÔ´´úÂë¡£¡£ ¡£¡£¡£ÊÖÒÕÎĵµÏÔʾ£¬£¬£¬¸Ã×é֯ʹÓö¨ÖÆ»¯PHP¹¤¾ß°ü¹¹½¨¾ß±¸¼ì²â¹æ±Ü¹¦Ð§µÄ´¹ÂÚÍøÕ¾£¬£¬£¬²¢Å䱸ʵʱ¸üеĴ¹ÂÚ¹¤¾ß°ü¡£¡£ ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬×ª´¢ÎļþÖл¹°üÀ¨Î´±»VirusTotal±ê¼ÇµÄδ֪¶þ½øÖÆÎļþºÍCobalt Strike¼ÓÔØÆ÷µÈ¸ß¼¶¹¥»÷¹¤¾ß¡£¡£ ¡£¡£¡£Çå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬KimsukyµÄ»ù´¡ÉèÊ©±£´æÏÔÖøÌØÕ÷£ºÆä³ÉԱƵÈÔʹÓÃGoogle·­Òë´¦Öóͷ£ÖÐÎĹýʧÐÅÏ¢£¬£¬£¬»á¼ų̂Íå¾üÕþÍøÕ¾£¬£¬£¬²¢Í¨¹ýPureVPNµÈЧÀÍÉ̹ºÖÃVPNЧÀÍ¡£¡£ ¡£¡£¡£BashÀúÊ·¼Í¼ÏÔʾ£¬£¬£¬¸Ã×éÖ¯ÔøÍ¨¹ýSSHÅþÁ¬ÄÚ²¿ÏµÍ³£¬£¬£¬²¢¹ØÁª¶à¸ö¿ÉÒÉGitHubÕ˺źͺڿÍÂÛ̳¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/north-korean-kimsuky-hackers-exposed-in-alleged-data-breach/