ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾ÖÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬²Ð¼²ÈËЧÀÍϵͳÊÜÓ°Ïì
Ðû²¼Ê±¼ä 2025-08-271. ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾ÖÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬²Ð¼²ÈËЧÀÍϵͳÊÜÓ°Ïì
8ÔÂ26ÈÕ£¬£¬£¬£¬£¬ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾Ö£¨MTA£©¿ËÈÕÔâÓöÒ»ÆðÕë¶ÔÆä²Ð¼²È˽»Í¨Ð§ÀÍϵͳµÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ¼Ö²¿·ÖÒªº¦¹¦Ð§ÖÐÖ¹¡£¡£¡£¡£¡£ÖÜÈÕ£¬£¬£¬£¬£¬MTAͨ¹ýÉ罻ýÌåºÍ¹Ù·½ÍøÕ¾Ðû²¼ÖÒÑÔ£¬£¬£¬£¬£¬³Æ±¬·¢ÁËÒ»ÆðÉæ¼°Î´¾ÊÚȨ»á¼ûijЩϵͳµÄÍøÂçÊÂÎñ¡£¡£¡£¡£¡£Ö»¹Ü½¹µã½»Í¨Ð§ÀÍÈ繫½»Ïß·¡¢µØÌúºÍÇá¹ìϵͳδÊÜÓ°Ï죬£¬£¬£¬£¬µ«×¨ÃÅΪ²ÐÕÏÈËÊ¿ÌṩµÄ¡°³öÐÐЧÀÍ¡±£¨Mobility£©µÄʵʱÐÅϢϵͳ¼°ÆäËû¹¤¾ßÔâÊܹ¥»÷¡£¡£¡£¡£¡£¸ÃЧÀÍÖ¼ÔÚΪÎÞ·¨×ÔÐÐǰÍù¹«½»³µÕ¾»òºò³µµÄȺÌåÌṩ¶¨ÖÆ»¯½»Í¨Ö§³Ö£¬£¬£¬£¬£¬Í¨¹ýÍøÕ¾Ô¤Ô¼ÊµÏÖ´Ó¼ÒÃŵ½Ä¿µÄµØµÄ½ÓËÍ¡£¡£¡£¡£¡£¹¥»÷µ¼ÖÂMTAµÄÒÆ¶¯Ð§ÀÍÎÞ·¨°²ÅÅÐÂÐг̻òÖØÐÂÔ¤¶©ÏÖÓÐÐг̣¬£¬£¬£¬£¬²¿·ÖʵʱÐÅÏ¢¸üм°ºô½ÐÖÐÐĹ¦Ð§Òà¿ÉÄÜÊÜÏÞ¡£¡£¡£¡£¡£MTAÌåÏÖ£¬£¬£¬£¬£¬ÒÑÓëµÚÈý·½ÍøÂçÇ徲ר¼Ò¼°Ö´·¨²¿·ÖÏàÖú£¬£¬£¬£¬£¬ÆÀ¹ÀÊÂÎñ¹æÄ£²¢½ÓÄÉ»º½â²½·¥¡£¡£¡£¡£¡£Ö»¹Ü±¾ÖÜËùÓÐÒѰ²ÅŵijöÐÐÍýÏëÈÔÓÐÓ㬣¬£¬£¬£¬µ«ÐÂÓû§Ðèͨ¹ýÌæ»»¼Æ»®£¨ÈçCall-A-RideЧÀÍ£©¾ÙÐÐÔ¤Ô¼£¬£¬£¬£¬£¬¿Éͨ¹ý¹Ù·½ÍøÕ¾»òµç»°»á¼û¡£¡£¡£¡£¡£
https://therecord.media/maryland-cyberattack-transit-disabled-people
2. ¶íÂÞ˹FSB¿ª·¢ÐÂÐÍAndroidÌØ¹¤Èí¼þ£¬£¬£¬£¬£¬Î±×°³É·À²¡¶¾¹¤¾ß
8ÔÂ24ÈÕ£¬£¬£¬£¬£¬¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©±»ÆØ¿ª·¢Ò»¿îÐÂÐÍAndroid¶ñÒâÈí¼þ£¬£¬£¬£¬£¬Î±×°³É·À²¡¶¾¹¤¾ß£¬£¬£¬£¬£¬×¨ÃÅÕë¶Ô¶íÂÞ˹ÆóÒµ¸ß¹ÜÌᳫ¶¨ÏòÍøÂç¹¥»÷¡£¡£¡£¡£¡£¾Ý¶íÂÞË¹ÒÆ¶¯Çå¾²¹«Ë¾Dr. WebµÄ×îб¨¸æ£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ±»ÃüÃûΪ¡°Android.Backdoor.916.origin¡±£¬£¬£¬£¬£¬×Ô2025Äê1ÔÂÊ״η¢Ã÷ÒÔÀ´ÒÑÑÝ»¯¶à¸ö°æ±¾£¬£¬£¬£¬£¬ÏÔʾÆä´¦ÓÚÒ»Á¬¿ª·¢ÖС£¡£¡£¡£¡£¸ÃÌØ¹¤Èí¼þ¾ß±¸¶àÏî¸ß¼¶¹¦Ð§£¬£¬£¬£¬£¬°üÀ¨¼àÌý¶Ô»°¡¢Í¨¹ýÊÖ»úÉãÏñͷʵʱ´«ÊäÊÓÆµ¡¢¼Í¼¼üÅÌÊäÈë¡¢ÇÔȡͨѶӦÓã¨ÈçTelegram¡¢WhatsApp¡¢Gmail£©Êý¾Ý£¬£¬£¬£¬£¬ÉõÖÁ²¶»ñÆÁÄ»ÄÚÈÝ¡£¡£¡£¡£¡£×°Öú󣬣¬£¬£¬£¬¶ñÒâÈí¼þ»áÇëÇóµØÀíλÖᢶÌÐÅ»á¼û¡¢ÉãÏñÍ·/Âó¿Ë·çʹÓᢸ¨Öú¹¦Ð§Ð§À͵ȸßΣº¦È¨ÏÞ£¬£¬£¬£¬£¬²¢ºã¾ÃפÁôºǫ́¡£¡£¡£¡£¡£ÆäÏÂÁîÓë¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷¿ÉÔ¶³ÌÖ¸ÁîÇÔÈ¡¶ÌÐÅ¡¢ÁªÏµÈË¡¢Í¨»°¼Í¼¼°´æ´¢Í¼Ïñ£¬£¬£¬£¬£¬»ò¼¤»îÂó¿Ë·ç¡¢ÉãÏñÍ·¾ÙÐÐʵʱ¼à¿Ø£¬£¬£¬£¬£¬ÉõÖÁÖ´ÐÐShellÏÂÁîÒÔά³Ö³¤ÆÚ»¯¿ØÖÆ¡£¡£¡£¡£¡£Dr. WebÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þͨ¹ý¶íÓï½çÃæ¡¢Ã°³ä¶íÂÞ˹¹Ù·½»ú¹¹£¨ÈçÖÐÑëÒøÐм°FSB×ÔÉí£©µÄÈí¼þ¾ÙÐзַ¢¡£¡£¡£¡£¡£Æä½ö¶íÓï½çÃæ¡¢Õë¶Ô¶íÂÞ˹ÆóÒµµÄ·Ö·¢Õ½ÂÔ¼°Ã°³ä±¾ÍÁ»ú¹¹µÄÐÐΪ£¬£¬£¬£¬£¬Ã÷È·Ö¸Ïò¶¨Ïò¹¥»÷£¬£¬£¬£¬£¬Ä¿µÄ»òΪ»ñÈ¡ÆóÒµÃô¸ÐÐÅÏ¢¼°¸ß¹ÜͨѶÊý¾Ý¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-android-malware-poses-as-antivirus-from-russian-intelligence-agency/
3. ¿Æ¼¼ÖÆÔìÉÌData I/OÔâÀÕË÷¹¥»÷£¬£¬£¬£¬£¬ÖÂÔËӪϵͳ̱»¾
8ÔÂ22ÈÕ£¬£¬£¬£¬£¬¿Æ¼¼ÖÆÔìÉÌData I/O Corporation£¨NASDAQ: DAIO£©¿ËÈÕÏòÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©Ìá½»±¨¸æ£¬£¬£¬£¬£¬Åû¶ÆäÓÚ8ÔÂ16ÈÕÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÔËÊä¡¢ÖÆÔì¡¢Éú²úµÈ½¹µãÔËӪϵͳ̱»¾¡£¡£¡£¡£¡£Õâ¼Ò×ܲ¿Î»ÓÚ»ªÊ¢¶ÙÖÝÀ×µÂÃɵĹ«Ë¾×¨×¢ÓÚΪÆû³µµç×Ó¡¢ÏûºÄ×°±¸µÈÁìÓòÌṩ±à³ÌÓëÇå¾²°²ÅŽâ¾ö¼Æ»®£¬£¬£¬£¬£¬Æä¿Í»§º¸ÇÌØË¹À¡¢ËÉÏ¡¢ÑÇÂíÑ·¡¢¹È¸è¡¢Î¢ÈíµÈÈ«Çò×ÅÃûÆóÒµ£¬£¬£¬£¬£¬2025ÄêµÚ¶þ¼¾¶ÈÁè¼Ý65%µÄÓªÒµÀ´×ÔÆû³µµç×ÓÉú²ú£¬£¬£¬£¬£¬°üÀ¨ÓëÖйúµç¶¯³µÖÆÔìÉÌÏàÖúµÄ³äµçÕ¾ÊÖÒÕÏîÄ¿¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬£¬£¬Data I/OѸËÙ½ÓÄÉ×èÖ¹²½·¥£¬£¬£¬£¬£¬½«ÊÜÓ°ÏìϵͳÏÂÏßÒÔ±£»£»£»£»£»¤È«ÇòITÍøÂ磬£¬£¬£¬£¬²¢Æô¶¯µÚÈý·½ÊӲ졣¡£¡£¡£¡£µ«×èÖ¹±¨¸æÌύʱ£¬£¬£¬£¬£¬ÏµÍ³»Ö¸´Ê±¼ä±íÈÔδÃ÷È·£¬£¬£¬£¬£¬¹«Ë¾ÖÒÑÔ³ÆÊÂÎñÏà¹Ø±¾Ç®£¨°üÀ¨ÍøÂçÇ徲ר¼ÒÓöȡ¢ÏµÍ³ÐÞ¸´Ö§³öµÈ£©¿ÉÄÜ¶ÔÆäı»®Òµ¼¨¼°²ÆÎñ״̬±¬·¢ÖØ´óÓ°Ïì¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬¸Ã¹«Ë¾Éϼ¾¶ÈÏúÊÛ¶îΪ590ÍòÃÀÔª£¬£¬£¬£¬£¬½Ï2025ÄêµÚÒ»¼¾¶ÈïÔÌ30ÍòÃÀÔª£¬£¬£¬£¬£¬´Ë´Î¹¥»÷»ò½øÒ»²½¼Ó¾çÆä²ÆÎñѹÁ¦¡£¡£¡£¡£¡£
https://therecord.media/electronics-manufacturer-dataio-ransomware
4. ÄÚ»ª´ïÖÝÕþ¸®ÔâÍøÂç¹¥»÷ÖÂÍøÕ¾¼°µç»°ÏµÍ³ÖÜȫ̱»¾
8ÔÂ24ÈÕ£¬£¬£¬£¬£¬ÃÀº£ÄÚ»ª´ïÖÝÕþ¸®ÊÖÒÕϵͳÔâÓöÑÏÖØÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬µ¼ÖÂÖÝÕþ¸®ÍøÕ¾¡¢µç»°Ð§Àͼ°Ïßϰ칫ÖÜȫ̱»¾¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒ»Á¬Ó°ÏìÖÝÄÚ¶à¸ö¹«¹²Ð§ÀÍÇþµÀ£¬£¬£¬£¬£¬Òý·¢Õþ¸®ÓëÁª°î»ú¹¹µÄ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¾ÝÖݳ¤ÇÇ¡¤Â¡°Í¶àÉùÃ÷£¬£¬£¬£¬£¬Ö»¹Ü½ôÆÈЧÀÍÈÔ¼á³ÖÔË×÷£¬£¬£¬£¬£¬µ«ÊÖÒÕϵͳµÄÒ»Á¬ÐÔ¹ÊÕÏÒÑÔì³ÉÏÔÖøÐ§ÀÍÖÐÖ¹¡£¡£¡£¡£¡£×èÖ¹ÖÜÒ»Íí¼ä£¬£¬£¬£¬£¬ÖÝÕþ¸®¹Ù·½ÍøÕ¾ÈÔ´¦ÓÚÀëÏß״̬£¬£¬£¬£¬£¬µç»°Ïß·¼°²¿·ÖÏßÉÏЧÀÍ·ºÆðÏìÓ¦ÑÓ³Ù»òÖÐÖ¹¡£¡£¡£¡£¡£Îª×î´óÏÞ¶Èά³Ö¹«¹²Ð§ÀÍ£¬£¬£¬£¬£¬ÖÝÕþ¸®ÒÑÆô¶¯ÔÝʱ·Óɼƻ®ºÍÌæ»»ÐÔ²Ù×÷Á÷³Ì£¬£¬£¬£¬£¬²¢ÓëµØ·½¡¢²¿Âä¼°Áª°îÏàÖúͬ°éÕö¿ªÁªºÏ»Ö¸´Ðж¯¡£¡£¡£¡£¡£ÊÜÊÖÒÕ¹ÊÕÏÓ°Ï죬£¬£¬£¬£¬È«ÖÝÕþ¸®°ì¹«ÊÒÖÜÒ»ÔÝÍ£ÏßÏÂЧÀÍ£¬£¬£¬£¬£¬Ïêϸ»Ö¸´Ê±¼ä½«ÁíÐÐ֪ͨ¡£¡£¡£¡£¡£ÊÂÎñÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬Áª°îÊÓ²ì¾ÖÒѽéÈëÐÖúËÝÔ´£¬£¬£¬£¬£¬µ«ÏÖÔÚÉÐÎÞÈκκڿÍ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£¡£ÖÝÕþ¸®ÌØÊâÌáÐÑסÃñÌá¸ßСÐÄ£¬£¬£¬£¬£¬Ç¿µ÷¹Ù·½»ú¹¹¾ø²»»áͨ¹ýµç»°»òÓʼþË÷ȡСÎÒ˽¼ÒÐÅÏ¢»òÒøÐÐÕË»§×ÊÁÏ£¬£¬£¬£¬£¬½÷·ÀÕ©ÆÐÐΪ¡£¡£¡£¡£¡£Õë¶Ô¹«ÖÚ¹ØÇеÄÊý¾Ýй¶Σº¦£¬£¬£¬£¬£¬Öݳ¤ÉùÃ÷ÌåÏÖ½«³¹µ×ÊÓ²ìÊÇ·ñ±£´æÃô¸ÐÐÅÏ¢ÍâйÇéÐΡ£¡£¡£¡£¡£
https://therecord.media/nevada-state-websites-phones-cyberattack-disruption
5. Salesloftƽ̨ÔâºÚ¿ÍÈëÇÖÖÂSalesforceÊý¾Ýй¶
8ÔÂ26ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÏúÊÛ×Ô¶¯»¯Æ½Ì¨SalesloftÔâÓöÖØ´óÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýÇÔÈ¡ÆäÓëSalesforce¼¯³ÉµÄDrift̸ÌìÊðÀíOAuthÁîÅÆ¼°Ë¢ÐÂÁîÅÆ£¬£¬£¬£¬£¬ÀÖ³ÉÇÖÈë¿Í»§ÇéÐβ¢ÊµÑé´ó¹æÄ£Êý¾Ý͵ÇÔ¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ̻¶Á˵ÚÈý·½Æ½Ì¨¼¯³É´øÀ´µÄÇå¾²Òþ»¼£¬£¬£¬£¬£¬Òý·¢¶ÔÔÆ¶ËÆóҵЧÀÍÉú̬Á´Å³ÈõÐÔµÄÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£¾ÝSalesloftÅû¶£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÓÚ8ÔÂ8ÈÕÖÁ18ÈÕʱ´ú£¬£¬£¬£¬£¬Ê¹ÓÃÇÔÈ¡µÄÁîÅÆ»á¼ûÁËʹÓÃDrift-Salesforce¼¯³ÉµÄ¿Í»§SalesforceʵÀý£¬£¬£¬£¬£¬Í¨¹ýÖ´ÐÐSOQLÅÌÎÊÇÔÈ¡AWS»á¼ûÃÜÔ¿¡¢ÃÜÂë¼°SnowflakeÏà¹ØÁîÅÆµÈÃô¸Ðƾ֤¡£¡£¡£¡£¡£¹¥»÷ÕßÉõÖÁͨ¹ýɾ³ýÅÌÎÊÈÕÖ¾ÑÚÊÎÐÐ×Ù£¬£¬£¬£¬£¬µ«Î´Ó°ÏìϵͳÉ󼯼ͼ¡£¡£¡£¡£¡£SalesloftÒÑÓëSalesforceÐ×÷£¬£¬£¬£¬£¬½ôÆÈ×÷·ÏËùÓÐDriftÓ¦ÓõĻîÔ¾ÁîÅÆ£¬£¬£¬£¬£¬²¢ÒªÇó¿Í»§ÖØÐÂÈÏÖ¤£¬£¬£¬£¬£¬ÖÎÀíÔ±Ðèͨ¹ý"ÉèÖÃ-¼¯³É-Salesforce"¶Ï¿ªÅþÁ¬ºóÖØÐÂÊÚȨ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÑÓÐøÁË2025ÄêÒÔÀ´Õë¶ÔSalesforceƽ̨µÄ¹¥»÷À˳±¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/salesloft-breached-to-steal-oauth-tokens-for-salesforce-data-theft-attacks/
6. CitrixÐÞ¸´ÁËÁãÈÕ¹¥»÷ÖÐʹÓõÄÑÏÖØNetScaler RCEÎó²î
8ÔÂ26ÈÕ£¬£¬£¬£¬£¬Citrix£¨ÔÆÈí¼þ¼¯ÍÅ£©Ðû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÁËÓ°ÏìÆäNetScaler ADCºÍNetScaler Gateway×°±¸µÄÈý¸ö¸ßΣÎó²î£¬£¬£¬£¬£¬ÆäÖÐ×îÑÏÖØµÄCVE-2025-7775Òѱ»Ö¤ÊµÔâºÚ¿ÍÆð¾¢Ê¹ÓÃΪÁãÈÕÎó²î¡£¡£¡£¡£¡£¸ÃÎó²îΪÄÚ´æÒçÍÉ»¯Î󣬣¬£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚδ´ò²¹¶¡µÄ×°±¸ÉÏÔ¶³ÌÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬Ö±½ÓÍþвÆóÒµÍøÂç½¹µã»ù´¡ÉèÊ©¡£¡£¡£¡£¡£CitrixÔÚͨ¸æÖÐÇ¿µ÷£¬£¬£¬£¬£¬×èÖ¹8ÔÂ26ÈÕ£¬£¬£¬£¬£¬ÒÑÊӲ쵽Õë¶Ô믧½â×°±¸µÄÏÖʵ¹¥»÷°¸Àý£¬£¬£¬£¬£¬µ«Î´ÌṩÏêϸ¹¥»÷Ö¸±ê»òÊܺ¦ÕßÐÅÏ¢¡£¡£¡£¡£¡£ÓÉÓÚȱ·¦ÔÝʱ»º½â²½·¥£¬£¬£¬£¬£¬¹«Ë¾¡°Ç¿ÁÒ½¨Ò顱ÖÎÀíÔ±Á¬Ã¦½«NetScaler¹Ì¼þÉý¼¶ÖÁ×îа汾¡£¡£¡£¡£¡£Îª×ÊÖúÓû§×Ô²éΣº¦£¬£¬£¬£¬£¬CitrixÐû²¼ÁËÒ×Êܹ¥»÷×°±¸µÄÉèÖÃÌØÕ÷£º×°±¸ÐèÒÔÍø¹ØÄ£Ê½£¨VPN¡¢ICAÊðÀíµÈ£©ÔËÐУ¬£¬£¬£¬£¬»ò°ó¶¨IPv6ЧÀ͵ÄHTTP/SSL/HTTP_QUICÀàÐ͸ºÔØÆ½ºâÐéÄâЧÀÍÆ÷µÈÌØ¶¨ÉèÖᣡ£¡£¡£¡£´Ë´Î¸üÐÂͬʱÐÞ¸´ÁËÁíÍâÁ½¸öÎó²î£º¾Ü¾øÐ§ÀÍÎó²îCVE-2025-7776ºÍÖÎÀí½çÃæ»á¼û¿ØÖÆÈ±ÏÝCVE-2025-8424¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±Ö¸³ö£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜͨ¹ýÎó²îÁ´Ê½Ê¹Ó㬣¬£¬£¬£¬ÏÈͨ¹ýCVE-2025-7775Ö²Èë¶ñÒâ´úÂ룬£¬£¬£¬£¬ÔÙʹÓÃCVE-2025-8424ºáÏòÉøÍ¸ÖÎÀí½çÃæ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/citrix-fixes-critical-netscaler-rce-flaw-exploited-in-zero-day-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ