ð³äBooking.comµÄÍøÂç´¹ÂÚÔ˶¯Ê¹ÓÃClickFix¹¥»÷ÇÔÊØÐÅÏ¢
Ðû²¼Ê±¼ä 2025-03-141. ð³äBooking.comµÄÍøÂç´¹ÂÚÔ˶¯Ê¹ÓÃClickFix¹¥»÷ÇÔÊØÐÅÏ¢
3ÔÂ13ÈÕ£¬Î¢Èí¿ËÈÕ·¢³öÖÒÑÔ£¬Ö¸³ö±£´æÒ»Æðð³äBooking.comµÄÍøÂç´¹ÂÚÔ˶¯£¬¸ÃÔ˶¯×Ô2024Äê12ÔÂÆðÒ»Á¬ÖÁ½ñ£¬Ö÷ÒªÕë¶ÔÂùݡ¢ÂÃÐÐÉçµÈʹÓÃBooking.comÔ¤¶©·þÎñµÄ×éÖ¯Ô±¹¤¡£¹¥»÷ÕßʹÓÃClickFixÉç»á¹¤³Ì¹¥»÷ÊֶΣ¬Í¨¹ý·¢Ëͺ¬ÓжñÒâÈí¼þµÄµç×ÓÓʼþ£¬ÒâÍ¼Ð®ÖÆÔ±¹¤ÕË»§²¢ÇÔÈ¡¿Í»§¸¶¿îÏêÇéºÍСÎÒ˽¼ÒÐÅÏ¢¡£¾Ý΢ÈíÇå¾²Ñо¿Ö°Ô±ÆÊÎö£¬´Ë´ÎÔ˶¯ÓÉÃûΪ¡°Storm-1865¡±µÄÍþв×éÖ¯Ìᳫ¡£ÔÚ´Ë´ÎÔ˶¯ÖУ¬¹¥»÷Õß·¢ËÍαװ³É¿ÍÈËѯÎÊBooking.comÏà¹ØÊÂÒ˵ĵç×ÓÓʼþ£¬ÓʼþÖаüÀ¨ÐéαµÄCAPTCHAÒ³ÃæÁ´½Ó»òPDF¸½¼þ£¬ÓÕÆÊܺ¦ÕßÖ´ÐÐÒþ²ØµÄmshta.exeÏÂÁî¡£¸ÃÏÂÁî»áÔÚ¹¥»÷Õß·þÎñÆ÷ÉÏÖ´ÐжñÒâHTMLÎļþ£¬½ø¶øÏÂÔØ²¢×°ÖöàÖÖRATºÍÐÅÏ¢ÇÔÈ¡Èí¼þ£¬ÈçXWorm¡¢Lumma stealerµÈ¡£ÕâЩÓÐÓÃÔØºÉ¾ßÓÐÇÔÈ¡²ÆÎñÊý¾ÝºÍƾ֤ÒÔ¹©Ú²ÆÊ¹ÓõÄÄÜÁ¦£¬ÊÇStorm-1865Ô˶¯µÄµä·¶ÌØÕ÷¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬Î¢Èí½¨ÒéÓû§Ê¼ÖÕÈ·ÈÏ·¢¼þÈ˵صãµÄÕýµ±ÐÔ£¬¶Ô½ôÆÈÐж¯ºôÓõ¼á³ÖСÐÄ£¬²¢Ñ°ÕÒ¿ÉÄܵį´Ð´¹ýʧÒÔʶ±ðÕ©Æ¡£Í¬Ê±£¬½¨Òéͨ¹ý×ÔÁ¦µÇ¼ƽ̨ÑéÖ¤Booking.comÕË»§×´Ì¬ºÍ´ý´¦Öóͷ£¾¯±¨£¬×èÖ¹µã»÷µç×ÓÓʼþÖеÄÁ´½Ó£¬ÒÔ½µµÍ±»¹¥»÷µÄΣº¦¡£
https://www.bleepingcomputer.com/news/security/clickfix-attack-delivers-infostealers-rats-in-fake-bookingcom-emails/
2. Mora_001ʹÓÃFortinetÎó²î°²ÅÅSuperBlackÀÕË÷Èí¼þ
3ÔÂ13ÈÕ£¬ÃûΪ¡°Mora_001¡±µÄÀÕË÷Èí¼þÔËÓªÉÌÕýÔÚʹÓÃFortinetÅû¶µÄÁ½¸öÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2024-55591ºÍCVE-2025-24472£©À´»ñÈ¡·À»ðǽװ±¸µÄδÊÚȨ»á¼û£¬²¢°²ÅŶ¨ÖƵÄSuperBlackÀÕË÷Èí¼þ¡£ÕâÁ½¸öÎó²î»®·ÖÔÚ2024Äê1ÔºÍ2Ô±»Fortinet¹ûÕæ£¬µ«CVE-2024-55591×Ô2024Äê11ÔÂÆð¾ÍÒѱ»ÓÃ×÷ÁãÈÕÎó²î¾ÙÐй¥»÷¡£¶ø¹ØÓÚCVE-2025-24472£¬Ö»¹Ü×î³õFortinetÌåÏÖ²»ÇåÎúÊÇ·ñ±»Ê¹Ó㬵«ForescoutÑо¿Ö°Ô±ÔÚ2025Äê1ÔÂÏÂÑ®·¢Ã÷ÁËSuperBlack¹¥»÷£¬Åú×¢¸ÃÎó²îÒ²Òѱ»Ê¹Óá£Mora_001ÔËÓªÉÌͨ¹ýÕâÁ½¸öÎó²î»ñµÃ¡°super_admin¡±È¨ÏÞ£¬½¨ÉèÐÂÖÎÀíÔ±ÕÊ»§£¬²¢ÊµÑéºáÏòÒÆ¶¯ÒÔÇÔÈ¡Êý¾Ý¡£Ö®ºó£¬ËûÃÇʹÓÃ×Ô½ç˵¹¤¾ß¼ÓÃÜÎļþÒÔ¾ÙÐÐË«ÖØÀÕË÷£¬²¢ÔÚ¼ÓÃÜ¿¢Êºó°²ÅÅÀÕË÷ÐÅ¡£±ðµÄ£¬»¹°²ÅÅÁËÃûΪ¡°WipeBlack¡±µÄ¶¨ÖƲÁ³ýÆ÷ÒÔɾ³ýºÛ¼£¡£Forescout·¢Ã÷SuperBlackÓëLockBitÀÕË÷Èí¼þÖ®¼ä±£´æÏ¸ÃÜÁªÏµ£¬Ö»¹ÜǰÕßËÆºõÊÇ×ÔÁ¦Ðж¯£¬µ«Á½ÕßÔÚ¼ÓÃÜÆ÷½á¹¹¡¢Êê½ð¼Í¼ÖеÄTOX̸ÌìIDÒÔ¼°IPµØµãµÈ·½Ãæ±£´æ´ó×ÚÖØµþ¡£Forescout·ÖÏíÁËÓëSuperBlack¹¥»÷Ïà¹ØµÄÈëÇÖÖ¸±êÁбíÒÔ¹©·ÀÓù²Î¿¼¡£
https://www.bleepingcomputer.com/news/security/new-superblack-ransomware-exploits-fortinet-auth-bypass-flaws/
3. CISAÖÒÑÔApple WebKitÔ½½çдÈëÎó²îÕýÔÚ±»Ò°ÍâʹÓÃ
3ÔÂ13ÈÕ£¬¿ËÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©·¢³öÖÒÑÔ£¬Ö¸³öÆ»¹ûWebKitä¯ÀÀÆ÷ÒýÇæ±£´æÒ»¸öÒѱ»Ò°ÍâʹÓõÄÁãÈÕÎó²î£¬±àºÅΪCVE-2025-24201¡£ÕâÊÇÒ»¸öÔ½½çдÈëÎÊÌ⣬¹¥»÷Õß¿Éͨ¹ýÈ«ÐĽṹµÄ¶ñÒâÍøÒ³ÄÚÈÝ£¬Í»ÆÆWeb ContentɳºÐ¸ôÀ룬ÔÚÊÜÓ°Ïì×°±¸ÉÏÖ´ÐÐδ¾ÊÚȨµÄ´úÂ룬ÉõÖÁ°²ÅÅÌØ¹¤Èí¼þ¡£¸ÃÎó²îÆÕ±éÓ°ÏìiPhone XS¼°ºóÐø»úÐÍ¡¢iPad ProϵÁС¢iPad AirϵÁС¢iPadϵÁС¢iPad miniϵÁС¢ÔËÐÐmacOS SequoiaµÄMac×°±¸ÒÔ¼°Apple Vision Pro£¬Í¬Ê±iOSºÍiPadOSÉϵĵÚÈý·½ä¯ÀÀÆ÷Ò²Êܵ½Ó°Ï죬ÓÉÓÚËüÃDZØÐèʹÓÃWebKitÒýÇæ¡£Æ»¹ûÒÑÈ·ÈÏ£¬¸ÃÎó²î¿ÉÄÜÔÚÕë¶ÔÌØ¶¨Ð¡ÎÒ˽¼ÒµÄ¡°¼«ÆäÖØ´ó¡±µÄ¹¥»÷Öб»Ê¹Ó㬲¢ÒÑÐû²¼¸üоÙÐÐÐÞ¸´¡£CISA½¨ÒéÓû§Æ¾Ö¤¹©Ó¦ÉÌָʾ½ÓÄÉ»º½â²½·¥£¬°üÀ¨Á¬Ã¦¸üÐÂ×°±¸¡¢×èÖ¹µã»÷²»¿ÉÐÅÁ´½ÓºÍ»á¼ûÎ´ÖªÍøÕ¾¡¢¼à¿Ø×°±¸ÐÐΪÒÔ¼°ÆôÓÃ×Ô¶¯¸üС£¹ØÓÚ¸ßΣº¦Óû§ºÍÆóÊÂÒµÓû§£¬½¨ÒéÆôÓÃËø¶¨Ä£Ê½ÒÔÔöÇ¿·À»¤ÄÜÁ¦¡£ÆóÒµÓû§»¹Ó¦°²ÅÅÒÆ¶¯×°±¸ÖÎÃ÷È·¾ö¼Æ»®£¬È·±£×°±¸ÊµÊ±¸üУ¬²¢¼à¿ØÍøÂçÔ˶¯ÒÔ·¢Ã÷DZÔÚ¹¥»÷¼£Ïó¡£
https://cybersecuritynews.com/cisa-warns-of-apple-webkit-out-of-bounds-write/
4. ESHYFTÊý¾Ý¿âÉèÖùýʧÖÂ86,000ÃûÒ½»¤Ö°Ô±Ãô¸ÐÊý¾Ýй¶
3ÔÂ13ÈÕ£¬ESHYFT ÊÇÒ»¼Ò×ܲ¿Î»ÓÚÐÂÔóÎ÷ÖݵĿµ½¡¿Æ¼¼¹«Ë¾£¬ÓªÒµÆÕ±é 29 ¸öÖÝ¡£¿ËÈÕ£¬Ò»¸öÉèÖùýʧµÄÊý¾Ý¿â̻¶ÁËESHYFTÆìÏÂ86,000¶àÃûÒ½»¤Ö°Ô±µÄ108.8 GBÃô¸ÐÊý¾Ý£¬°üÀ¨SSN¡¢Éí·ÝÖ¤¼þɨÃè¼þ¡¢Ð½×ÊÏêÇéµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¸ÃÊý¾Ý¿âûÓÐÃÜÂë±£»¤»ò¼ÓÃÜ£¬ÓÉÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷¡£±»Ð¹Â¶µÄÊý¾Ý»¹°üÀ¨Ð¡ÎÒ˽¼Ò×ÊÁÏͼÏñ¡¢Ã沿ͼÏñ¡¢×¨ÒµÖ¤Êé¡¢ÊÂÇéʹÃüÐÒéµÈ£¬ÒÔ¼°Ò»·ÝÏêϸ¼Í¼ÁË80¶àÍòÌõ»¤Ê¿ÐÅÏ¢µÄµç×Ó±í¸ñ¡£±ðµÄ£¬Ò½ÁÆÎļþÒ²±»Ð¹Â¶£¬¿ÉÄÜÊܵ½HIPAA¹æÔòµÄÔ¼Êø¡£Ö»¹ÜFowlerÁ¬Ã¦Í¨ÖªÁËESHYFT£¬µ«¸Ã¹«Ë¾»¨ÁËÒ»¸ö¶àÔ²ÅÏÞÖÆ¹«ÖÚ»á¼û¡£ÏÖÔÚÉв»ÇåÎúÊý¾Ý¿âÊÇ·ñÓÉESHYFTÓµÓлòÖ±½ÓÖÎÀí£¬ÒÔ¼°Ì»Â¶µÄÒ»Á¬Ê±¼äºÍÊÇ·ñÓÐδ¾ÊÚȨµÄÖ°Ô±»á¼ûÊý¾Ý¡£ÍøÂç·¸·¨·Ö×Ó¿ÉÄÜ»áʹÓÃÕâЩÊý¾ÝʵÑé·¸·¨»òÓÕÆÊܺ¦Õß¡£Òò´Ë£¬HealthTech±ØÐèʵÑéÊʵ±µÄÍøÂçÇå¾²²½·¥£¬ÈçÇ¿ÖÆ¼ÓÃÜÃô¸ÐÊý¾Ý¡¢Ê¹ÓöàÒòËØÉí·ÝÑéÖ¤¡¢¾ÙÐа´ÆÚÇå¾²ÉóºËµÈ£¬ÒÔ±£»¤Óû§Êý¾ÝÇå¾²¡£Í¬Ê±£¬Öƶ©Êý¾Ýй¶Ӧ¶ÔÍýÏë¡¢½¨ÉèÏàͬÇþµÀ¡¢ÌṩÈÏÕæÈεÄÅû¶֪ͨ²¢½ÌÓýÓû§Ê¶±ðÍøÂç´¹ÂÚÍýÏëÒ²ÊÇÐëÒªµÄ¡£
https://hackread.com/healthtech-database-exposed-medical-employment-records/
5. ºÚ¿ÍÀÄÓÃMicrosoft Copilot¾ÙÐÐÖØ´óµÄÍøÂç´¹ÂÚ¹¥»÷
3ÔÂ13ÈÕ£¬Ëæ×ÅMicrosoft CopilotÔÚ2023ÄêÍÆ³ö²¢Ñ¸ËÙ³ÉΪÐí¶à×éÖ¯²»¿É»òȱµÄÉú²úÁ¦¹¤¾ß£¬ÍøÂç·¸·¨·Ö×ÓÒ²Ãé×¼ÁËÕâһй¥»÷ǰÑÔ¡£ËûÃÇʹÓÃÈ«ÐÄÖÆ×÷µÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬Ä£ÄâÕýµ±µÄMicrosoftͨѶ£¬ÓÕÆÓû§µã»÷Á´½Ó£¬´Ó¶øÖض¨Ïòµ½Î±ÔìµÄMicrosoft Copilot½Ó´ýÒ³Ãæ¡£ÕâÐ©Ò³ÃæÓëÕýµ±µÄMicrosoft½çÃæ¸ß¶ÈÏàËÆ£¬µ«URL²¢²»ÊôÓÚMicrosoftÓò¡£¹¥»÷Õß½øÒ»²½Ä£ÄâMicrosoftÉí·ÝÑéÖ¤Àú³Ì£¬ÓÕʹÓû§ÊäÈëÆ¾Ö¤£¬²¢·ºÆðÚ²ÆÐÔµÄMicrosoft Authenticator¶àÖØÉí·ÝÑéÖ¤Ò³Ãæ¡£´ËÀàÍøÂç´¹ÂÚÔ˶¯ÒѾÏÔʾ³öÆäÑÏÖØÐÔ£¬¹¥»÷ÕßÉõÖÁ·¢Ë͵ç×ÓÓʼþÉù³ÆÏòÓû§ÊÕÈ¡Microsoft Copilot·þÎñÓöȡ£Ëæ×Å΢Èí¼ÌÐøÔÚÆä²úÆ·Ì×¼þÖм¯³ÉÈ˹¤ÖÇÄܹ¦Ð§£¬Ç徲רҵְԱ±ØÐèСÐÄзºÆðµÄÍþв£¬ÊµÑéÖÜÈ«µÄÇå¾²²½·¥ÒÔ·ÀÓùÕâЩÍþв¡£Î¢ÈíºÍCofenseµÈ¹¤¾ß¿ÉÒÔ×ÊÖúʶ±ðºÍÖÎÀíÓÕÆ·¢¼þÈË£¬×èֹDZÔÚÍþв¡£ÏàʶÕâЩ¹¥»÷ÒªÁ첢ʵÑéÊʵ±µÄ±£»¤²½·¥£¬¿ÉÒÔ½µµÍ×é֯Σº¦£¬Í¬Ê±ÈÔÈ»ÊÜÒæÓÚMicrosoft CopilotµÈ¹¤¾ßÌṩµÄÉú²úÁ¦ÓÅÊÆ¡£
https://cybersecuritynews.com/microsoft-copilot-phishing-attack/
6. ½Ý±ªÂ·»¢Ôâ¡°Rey¡±ºÚ¿ÍÈëÇÖ£¬700·ÝÃô¸ÐÊý¾Ýй¶
3ÔÂ12ÈÕ£¬½üÆÚ£¬Ò»Ãû¼ÙÃû¡°Rey¡±µÄÍþвÐÐΪÕßÈëÇÖÁËÓ¢¹úÖøÃûÆû³µÖÆÔìÉ̽ݱªÂ·»¢£¨JLR£©µÄÄÚ²¿ÏµÍ³£¬²¢Ð¹Â¶ÁËÔ¼700·Ý°üÀ¨Ãô¸ÐÊÖÒÕºÍÔËÓªÊý¾ÝµÄÄÚ²¿Îļþ£¬Ê×´ÎÔÚ°µÍøÂÛ̳ÉÏÐû²¼¡£Ð¹Â¶µÄÊý¾ÝÉæ¼°¶à¸öÖֱ𣬰üÀ¨×¨ÓÐÔ´´úÂë¡¢³µÁ¾¿ª·¢ÈÕÖ¾¡¢¸ú×ÙÊý¾Ý¼¯ÒÔ¼°Ô±¹¤Êý¾Ý¿âµÈ£¬¿ÉÄܶԸù«Ë¾µÄ֪ʶ²úȨÇå¾²ºÍÔ±¹¤Òþ˽Ôì³ÉÑÏÖØÍþв¡£´Ë´ÎйÃÜÊÂÎñÈôÊÇ»ñµÃ֤ʵ£¬½«³ÉΪ½Ý±ªÂ·»¢ÃæÁÙµÄ×îÑÏÖØµÄÍøÂçÇå¾²Íþв֮һ¡£ÍøÂçÇå¾²ÆÊÎöÊ¦ÍÆ²â£¬Êý¾Ýй¶¿ÉÄÜÔ´×ÔÊܵ½¹¥»÷µÄ¹«Ë¾·þÎñÆ÷»òÔÆ´æ´¢¿â¡£Ö»¹ÜÉÐδÃ÷È·Ìá¼°Êê½ðÒªÇ󣬵«Ð¹Â¶Êý¾ÝµÄÊÖÒÕÐÔ×Ó¿ÉÄÜʹ¾ºÕùµÐÊÖÊÜÒæ¡£½Ý±ªÂ·»¢ÉÐδ¾Í´Ë½ÒÏþ¹Ù·½ÉùÃ÷£¬µ«ÍøÂçÇå¾²¹«Ë¾ÒÑ×îÏÈÑé֤й¶Êý¾ÝµÄÕæÊµÐÔ¡£´Ë´ÎÊÂÎñ͹ÏÔÁËÆû³µÐÐÒµÊý×Ö»ù´¡ÉèÊ©µÄųÈõÐÔ£¬×¨¼Ò½¨ÒéJLRÁ¬Ã¦ÉóºË´úÂë´æ´¢¿â£¬ÔöÇ¿¿ª·¢ÕßÕË»§µÄÇå¾²²½·¥£¬²¢¾ÙÐÐÉøÍ¸²âÊÔ¡£¹ØÓÚÔ±¹¤À´Ëµ£¬Æ¾Ö¤¼à¿ØºÍÇå¾²ÒâʶÅàѵҲÖÁ¹ØÖ÷Òª¡£´Ë´ÎйÃÜÊÂÎñÔٴξ¯ÐÑÈËÃÇ£¬Æû³µÖÆÔìÉÌÔÚÈÕÒæÓÉÈí¼þÇý¶¯µÄÐÐÒµÖÐÃæÁÙ×Åһֱת±äµÄÍþв£¬Á¢ÒìÓëÍøÂçÇå¾²Ö®¼äµÄƽºâÈÔÈ»²»Îȹ̡£
https://cybersecuritynews.com/threat-actor-allegedly-claiming-breach/


¾©¹«Íø°²±¸11010802024551ºÅ