SogoTradeÔ±¹¤Îó´¥¶ñÒâÁ´½ÓÖÂÊýÍòÓû§ÐÅϢй¶
Ðû²¼Ê±¼ä 2025-05-141. SogoTradeÔ±¹¤Îó´¥¶ñÒâÁ´½ÓÖÂÊýÍòÓû§ÐÅϢй¶
5ÔÂ9ÈÕ£¬ÃÀ¹úÔÚÏ߹ɯ±¾¼Í¹«Ë¾SogoTradeÒòÔ±¹¤µã»÷¶ñÒâÁ´½Ó£¬µ¼ÖÂÊýÍòÈËСÎÒ˽¼ÒÐÅϢ̻¶£¬´Ë´ÎÊÂÎñ͹ÏÔÁËÌá·ÀÍøÂç´¹ÂÚµÄÐëÒªÐÔ¡£½ñÄêÔçЩʱ¼ä£¬SogoTradeÔâÊÜÁËÒ»´Îµä·¶µÄÍøÂç´¹ÂÚ¹¥»÷£¬Ëĸöµç×ÓÓʼþÕË»§±»µÁ£¬¹¥»÷Õßͨ¹ýµç×ÓÓʼþÀÖ³ÉÈö²¥¶ñÒâÈí¼þ¡£ÔÚ»ñÈ¡ÊÜѬȾÕË»§ºó£¬¹¥»÷Õß¿ÉÄÜÇÔÈ¡Á˽ü4.9ÍòÃûÓû§µÄÊý¾Ý¡£¸Ã¹«Ë¾Ìá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄÐÅÏ¢ÏÔʾ£¬´Ë´ÎÈëÇÖÊÂÎñ²¢·ÇÒ»´ÎÐÔ£¬¶øÊÇÒ»Á¬ÁË2024Äê5ÔÂ8ÈÕÖÁ5ÔÂ22ÈÕ£¬SogoTradeÔÚ½ñÄê3ÔÂβ²Å·¢Ã÷´Ë´Î¹¥»÷¡£±»Ð¹Â¶µÄСÎÒ˽¼ÒÐÅÏ¢°üÀ¨Ãû×Ö¡¢ÐÕÊÏ¡¢²ÆÎñÕË»§ºÅÂë¡¢Éç»áÇå¾²ºÅÂëÒÔ¼°Ë°ºÅµÈÃô¸ÐÊý¾Ý¡£¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩй¶µÄÐÅÏ¢¾ÙÐÐÉí·Ý͵ÇÔ¡¢¿ªÉèÚ²ÆÐÔÕË»§ÒÔ»ñÈ¡´û¿îµÈ¶ñÒâÐÐΪ£¬¸øÓû§´øÀ´ÑÏÖØÎ£º¦¡£SogoTrade¶Ô´Ë´ÎÊÂÎñÉî¸ÐÒź¶£¬²¢ÔÚµÃÖªÊý¾ÝÇå¾²ÊÂÎñºó£¬Á¬Ã¦Éó²éÁËÆäÍøÂç´¹ÂÚ´¦Öóͷ£Á÷³Ì£¬²¢ÔöÇ¿ÁËÇå¾²ÒâʶÅàѵ¡£ÎªÌî²¹Óû§Ëðʧ£¬¸Ã¹«Ë¾ÌåÏÖ½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÃâ·ÑµÄÉí·Ý¼à¿Ø·þÎñ¡£È»¶ø£¬ÊÜÓ°ÏìµÄСÎÒ˽¼ÒÈÔÐè¼á³Ö¸ß¶ÈСÐÄ£¬°´ÆÚÉó²éÕË»§Õ˵¥ºÍÐÅÓñ¨¸æ£¬ÒÔʵʱ·¢Ã÷²¢Ó¦¶ÔDZÔÚµÄÉí·Ý͵ÇÔΣº¦¡£
https://cybernews.com/privacy/sogotrade-phishing-attack-customer-data-breach/
2. ³¯ÏÊKonni APTʹÓöñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼
5ÔÂ13ÈÕ£¬½üÆÚ£¬Ó볯ÏÊÓйصÄÍþв×éÖ¯Konni APT±»Ö¸ÓëÕë¶ÔÎÚ¿ËÀ¼Õþ¸®»ú¹¹µÄ´¹ÂÚÔ˶¯Ïà¹Ø£¬Æä¹¥»÷Ä¿µÄÀ©Õ¹ÖÁ¶íÂÞ˹ÒÔÍâµØÇø¡£ÆóÒµÇå¾²¹«Ë¾Proofpoint³Æ£¬´Ë´ÎÔ˶¯Ö¼ÔÚÍøÂç¡°¶íÂÞ˹ÈëÇֹ켣¡±Ç鱨¡£Çå¾²Ñо¿Ö°Ô±Ö¸³ö£¬¸Ã×éÖ¯¶ÔÎÚ¿ËÀ¼µÄ¹Ø×¢ÑÓÐøÁËÆäÕë¶Ô¶íÂÞ˹Õþ¸®»ú¹¹¾ÙÐÐÕ½ÂÔÇé±¨ÍøÂçµÄÀúʷģʽ¡£Konni APTÊÇÒ»¸öºã¾ÃÕë¶Ôº«¹ú¡¢ÃÀ¹úºÍ¶íÂÞ˹ʵÌåµÄÍøÂçÌØ¹¤×éÖ¯£¬Ô˶¯ÖÁÉÙ¿É×·ËÝÖÁ2014Ä꣬ͨ³£Í¨¹ý´¹ÂÚÓʼþ·Ö·¢¶ñÒâÈí¼þ¡£ÍøÂçÇå¾²¹«Ë¾¼Í¼µÄ×îй¥»÷ÖУ¬¹¥»÷ÕßʹÓÃαװ³ÉÐé¹¹ÖÇ¿âµÄ´¹ÂÚÓʼþ£¬Óʼþº¬ÍйÜÔÚMEGAÔÆ·þÎñµÄÃÜÂë±£»¤RARѹËõ°üÁ´½Ó£¬·¿ªºó»áÆô¶¯Ñ¬È¾Á´£¬CHMÎļþÏÔʾÓÕ¶üÄÚÈÝ£¬Êܺ¦Õßµã»÷ºó½«ÏÂÔØµÚ¶þ½×¶ÎÔØºÉ£¬ÐÂÆô¶¯µÄPowerShell¾ç±¾¿ÉÍøÂçϵͳÐÅÏ¢¡£±ðµÄ£¬ÉÐÓд¹ÂÚÓʼþÖ±½Ó¸½¼ÓHTMLÎļþµÄÇéÐΣ¬ÓÕµ¼Êܺ¦ÕßÏÂÔØ°üÀ¨Á¼ÐÔPDFºÍLNKÎļþµÄZIPѹËõ°ü£¬Ö´ÐÐLNKÎļþ»áÔËÐжñÒâ¾ç±¾¡£´Ë´ÎÅû¶ÕýÖµKonni¼¯Íű»Ö¸¼ÓÈëÕë¶Ôº«¹úʵÌåµÄÖØ´ó¶ñÒâÈí¼þÔ˶¯¡£
https://thehackernews.com/2025/05/north-korean-konni-apt-targets-ukraine.html
3. SAPÐû²¼²¹¶¡Ó¦¶ÔNetWeaverÁãÈÕ¹¥»÷ÐÂÎó²î
5ÔÂ13ÈÕ£¬SAPÒÑÐû²¼²¹¶¡ÒÔ½â¾ö½üÆÚÕë¶ÔSAP NetWeaver·þÎñÆ÷µÄÁãÈÕ¹¥»÷ÖÐʹÓõĵڶþ¸öÎó²îCVE-2025-42999¡£¸ÃÎó²îÊÇSAPÔÚÊÓ²ìÉæ¼°SAP NetWeaver Visual ComposerÖÐÁíÒ»¸öδ¾Éí·ÝÑéÖ¤µÄÎļþÉÏ´«Îó²îCVE-2025-31324µÄÁãÈÕ¹¥»÷ʱ·¢Ã÷µÄ£¬ºóÕßÒÑÓÚ4Ô·ÝÐÞ¸´¡£SAP½²»°ÈËÌåÏÖÒÑÒâʶµ½Îó²î²¢×ÅÊÖ½â¾ö£¬ÒªÇóʹÓÃSAP NETWEAVERµÄ¿Í»§×°Öò¹¶¡±£»¤×ÔÉí£¬Ç徲˵Ã÷¿ÉÔÚÖ¸¶¨Î»ÖÃÕÒµ½¡£ReliaQuestÓÚ4ÔÂÊ״μì²âµ½Ê¹ÓÃCVE-2025-31324µÄÁãÈÕ¹¥»÷£¬ÍþвÐÐΪÕßͨ¹ý¸ÃÎó²îÈëÇÖ¿Í»§ÏµÍ³ºóÉÏ´«JSP Web ShellºÍBrute Ratelºì¶Ó¹¤¾ß¡£ÍøÂçÇå¾²¹«Ë¾watchTowrºÍOnapsisҲ֤ʵÁ˶ñÒâÔ˶¯£¬ÊӲ쵽¹¥»÷ÕßÔÚδÐÞ²¹ÊµÀýÉÏÉÏ´«Web ShellºóÃÅ¡£OnypheÊ×ϯÊÖÒÕ¹Ù³ÆÔ¼20¼Ò²Æ²ú/È«Çò500Ç¿¹«Ë¾±£´æÎó²î£¬Ðí¶àÒÑÊܹ¥»÷£¬ÆäÊ±ÍøÉÏ̻¶µÄÎó²îʵÀýÓÐ1284¸ö£¬474¸öÒÑÊܹ¥»÷¡£Shadowserver»ù½ð»áÕýÔÚ×·×Ù³¬2040̨Ò×Êܹ¥»÷µÄSAP Netweaver·þÎñÆ÷¡£ËäÈ»SAPÉÐδȷÈÏCVE-2025-42999ÊÇ·ñÒѱ»Ê¹Ó㬵«OnapsisÊ×ϯÊÖÒÕ¹ÙÌåÏÖÍþвÐÐΪÕß×Ô1Ô·ÝÒÔÀ´¾ÍÒ»Ö±ÔÚʹÓÃÕâÁ½¸öÎó²î£¬ÕâÖÖ×éºÏ¹¥»÷ÔÊÐíÔ¶³ÌÖ´ÐÐí§ÒâÏÂÁÎÞÐèϵͳȨÏÞ¡£
https://www.bleepingcomputer.com/news/security/sap-patches-second-zero-day-flaw-exploited-in-recent-attacks/
4. PrepHeroÊý¾Ý¿âй¶300ÍòѧÉúºÍ½ÌÁ·Êý¾Ý
5ÔÂ13ÈÕ£¬´óѧÕÐÉúƽ̨PrepHeroÆØ³öÖØ´óÇå¾²Îó²î£¬³¬Èý°ÙÍòÌõδ¼ÓÃܼͼÔâй¶£¬É漰ѧÉúÔË·¢¶¯¼°Æä½ÌÁ·Ãô¸ÐÐÅÏ¢¡£¸ÃÊý¾Ý¿âÓÉÖ¥¼Ó¸ç¹«Ë¾PrepHero£¨ÓÉEXACT SportsÔËÓª£©ËùÓУ¬ÓÃÓÚ×ÊÖú¸ßÖÐÔË·¢¶¯½¨ÉèÕÐļµµ°¸²¢Óë´óѧ½ÌÁ·Ïàͬ¡£ÍøÂçÇå¾²Ñо¿Ô±Jeremiah FowlerÓÚ2025Äê5ÔÂ12ÈÕ·¢Ã÷²¢±¨¸æÁËÕâÒ»Îó²î£¬Êý¾Ý¿â°üÀ¨315ÍòÓàÌõ¼Í¼£¬×ܼÆÔ¼135GB£¬È´Î´½ÓÄÉÃÜÂë»ò¼ÓÃܲ½·¥±£»¤¡£Ð¹Â¶ÐÅÏ¢º¸ÇѧÉúÔË·¢¶¯µÄÐÕÃû¡¢µç»°¡¢ÓÊÏä¡¢¼Òͥסַ¡¢»¤ÕÕÐÅÏ¢£¬ÒÔ¼°¼Ò³¤ºÍ½ÌÁ·ÁªÏµ·½·¨£¬ÉõÖÁ°üÀ¨Ñ§ÉúÔË·¢¶¯»¤ÕÕͼÏñÁ´½ÓµÄδÊܱ£»¤Îļþ¡£ÓÈΪÑÏÖØµÄÊÇ£¬Êý¾Ý¿âÖС°Óʼþ»º´æ¡±Îļþ¼ÐÉúÑÄÁË2017ÄêÖÁ2025ÄêµÄ10GBµç×ÓÓʼþ£¬°üÀ¨¸öÐÔ»¯ÍøÒ³Á´½Ó£¬¿É¹ûÕæ»á¼ûСÎÒ˽¼ÒÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Ð½³êµÈÏêϸÐÅÏ¢£¬²¿·ÖÓʼþ»¹º¬ÔÝʱÃÜÂ룬½øÒ»²½¼Ó¾çÒþ˽Σº¦¡£±ðµÄ£¬½ÌÁ·Ô±Â¼ÒôÒ²±»·¢Ã÷£¬Éæ¼°½ÌÁ·ÐÕÃû¡¢ËùÔÚ´óѧ¼°¶ÔѧÉúÔË·¢¶¯µÄÆÀ¹À¡£Fowler·¢Ã÷ºóÁ¬Ã¦Í¨ÖªPrepHero£¬ºóÕßѸËÙ±£»¤Êý¾Ý¿â¡£µ«ÏÖÔÚÉв»ÇåÎúÊý¾Ý¿âÓÉËÖ±½ÓÖÎÀí£¬ÒÔ¼°Ãô¸ÐÐÅϢй¶ʱ³¤ºÍ»á¼ûÇéÐΡ£
https://hackread.com/prephero-database-exposed-students-coaches-data/
5. Ó¢ÌØ¶ûCPUÐÂÎó²îµ¼ÖÂÌØÈ¨ÄÚ´æÖеÄÃô¸ÐÊý¾Ýй¶
5ÔÂ13ÈÕ£¬¿ËÈÕ£¬ËÕÀèÊÀÁª°îÀí¹¤Ñ§ÔºÑо¿Ö°Ô±·¢Ã÷ËùÓÐÏÖ´úÓ¢ÌØ¶ûCPU±£´æ¡°·Ö֧ȨÏÞ×¢È롱Îó²î£¨CVE-2024-45332£©£¬¸ÃÎó²î¿ÉÈù¥»÷Õß´ÓÌØÈ¨Èí¼þÄÚ´æÇøÓòй¶Ãô¸ÐÊý¾Ý¡£Í¨³£ÕâÐ©ÇøÓò°üÀ¨ÃÜÂë¡¢¼ÓÃÜÃÜÔ¿µÈÖ÷ÒªÐÅÏ¢£¬±£»¤ÆäÃâÔâ×ß©¼«ÎªÒªº¦¡£Ö»¹ÜSpectre v2»º½â²½·¥ÒÑʵÑéÁùÄ꣬µ«´ËÐÂÎó²îͨ¹ý¡°·ÖÖ§Õ¹ÍûÆ÷¾ºÕùÌõ¼þ¡±ÈƹýÁËÕâЩ²½·¥¡£·ÖÖ§Õ¹ÍûÆ÷ÓÃÓÚÍÆ²â·ÖÖ§Ö¸ÁîЧ¹ûÒÔ¼á³ÖCPUÁ÷Ë®ÏßÂúÔØ£¬µ«Ó¢ÌضûµÄ·ÖÖ§Õ¹ÍûÆ÷¸üÐÂÓëÖ¸ÁîÖ´Ðвî±ð²½£¬µ¼Ö¸üпçÔ½ÌØÈ¨½çÏߣ¬ÔÚȨÏÞÇл»Ê±±£´æÊ±»ú´°¿Ú£¬Ê¹·ÇÌØÈ¨Óû§¿ÉÐ¹Â¶ÌØÈ¨Àú³ÌÊý¾Ý¡£Ñо¿Ö°Ô±¿ª·¢Îó²î£¬ÑµÁ·CPUÕ¹ÍûÌØ¶¨·ÖÖ§Ä¿µÄ£¬Í¨¹ýϵͳŲÓþÙÐÐÍÆ²âÖ´ÐУ¬Ê¹ÓòàÐŵÀÒªÁ콫ÉñÃØÊý¾Ýй¶¸ø¹¥»÷Õß¡£¸ÃÎó²îÓ°ÏìµÚ¾Å´ú¼°ÒÔºóµÄËùÓÐÓ¢ÌØ¶ûCPU£¬°üÀ¨¶à¿îÈÈÃÅÐͺţ¬¶øArmºÍAMDµÄоƬδÌåÏÖ³öÏàÙÉÐÐΪ£¬²»Ò×Êܹ¥»÷¡£¸ÃÎó²îËäÔÚLinuxÉÏÑÝʾ£¬µ«±£´æÓÚÓ²¼þ¼¶±ð£¬ÀíÂÛÉÏWindowsÒ²¿ÉʹÓá£Ñо¿Ö°Ô±ÒÑÏòÓ¢ÌØ¶û±¨¸æ£¬Ó¢ÌضûÐû²¼Î¢´úÂë¸üÐÂÒÔ»º½â´ËÎó²î£¬¹Ì¼þ¼¶»º½â²½·¥´øÀ´2.7%ÐÔÄÜ¿ªÏú£¬Èí¼þ»º½â²½·¥¶ÔÐÔÄÜÓ°ÏìÒòCPU¶øÒì¡£¹ØÓÚͨË×Óû§£¬Î£º¦½ÏµÍ£¬µ«ÈÔ½¨ÒéÓ¦ÓÃ×îиüС£
https://www.bleepingcomputer.com/news/security/new-intel-cpu-flaws-leak-sensitive-data-from-privileged-memory/
6. Ó¢¹úÂêɯ°Ù»õ³Æ¿Í»§Êý¾ÝÔÚÍøÂç¹¥»÷Öб»ÇÔÈ¡
5ÔÂ13ÈÕ£¬Ó¢¹ú×ÅÃûÁãÊÛÉÌÂêɯ°Ù»õÌåÏÖ£¬Æä²¿·Ö¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢ÔÚÍøÂç¹¥»÷Öб»µÁ£¬ÇÒÔÚÏßÓªÒµÒṈ̃»¾ÈýÖܶࡣÂêɯ°Ù»õ×÷ΪӢ¹ú×ÅÃûÉÌÒµÆ·ÅÆ£¬×Ô4ÔÂ25ÈÕÆð×èÖ¹½ÓÊÜÍøÉ϶©µ¥£¬×Ô¸´Éú½ÚÖÜÄ©¶©µ¥·ºÆðÎÊÌâÒÔÀ´£¬¹É¼ÛÒÑϵø15%¡£¾Ý±¨µÀ£¬¸ÃÁãÊÛÉÌÒѳÉΪÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õߣ¬·¸·¨·Ö×ÓÇÖÈëÆäÅÌËã»úϵͳ¾ÙÐмÓÃÜ£¬²¢ÒªÇ󸶿îÒÔ»Ö¸´¿ØÖÆ¡£Âêɯ°Ù»õ³Æ²¿·ÖÖ÷¹ËÐÅÏ¢±»µÁ£¬µ«Ç¿µ÷ÕâЩÊý¾Ý²»°üÀ¨¿ÉÓõĸ¶¿î»òÒøÐп¨ÐÅÏ¢£¬Ò²²»°üÀ¨ÈκÎÕË»§ÃÜÂ룬ÇÒÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»¹²Ïí¡£¹«Ë¾¼û¸æ¿Í»§ÎÞÐè½ÓÄÉÐж¯£¬²¢ÌåÏÖÕýÔÚÆð¾¢»Ö¸´Õý³£ÔËÓª£¬ÒѽÓÄɲ½·¥±£»¤ÏµÍ³£¬²¢ÓëÍøÂçÇ徲ר¼Ò¡¢Ö´·¨²¿·ÖºÍÕþ¸®»ú¹¹ÏàÖú¡£Âêɯ°Ù»õ¾Ü¾øÁ¿»¯´Ë´Î¹¥»÷´øÀ´µÄ²ÆÎñÓ°Ï죬µ«ÓÉÓÚ´íʧм¾ÏµÁÐÏúÊÛÁ¼»ú£¬ÇÒÔ¼Èý·ÖÖ®Ò»µÄ´ò°çºÍ¼Ò¾Ó²úÆ·ÏúÊÛ¶îÀ´×ÔÏßÉÏ£¬Æä²ÆÎñÓ°ÏìÕýÈÕÒæ¼ÓÖØ¡£µÂÒâÖ¾ÒøÐÐÆÊÎöʦԤ¼Æ£¬ÀûÈóËðʧÖÁÉÙΪ3000ÍòÓ¢°÷£¬Ã¿ÖÜÓªÒµ¶îԼΪ1500ÍòÓ¢°÷£¬Ö»¹ÜÍøÂç°ü¹Ü¿ÉÄܺ¸Ç´ó²¿·ÖÓ°Ï죬µ«°ü¹Üʱ¼äͨ³£ÓÐÏÞ¡£Âêɯ°Ù»õÓÚ4ÔÂ21ÈÕÊ×´ÎÏòÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ·¢³ö¾¯±¨£¬³Æ¹¥»÷µ¼Ö²¿·ÖÉÌÆ·Ç·È±¡£ÆðÔ´±¨¸æÏÔʾ£¬¡°Scattered Spider¡±ºÚ¿Í×éÖ¯¿ÉÄÜÊÇÄ»ºóºÚÊÖ£¬µ«Ò²Óп´·¨ÒÔΪ¡°Dragon Force¡±×éÖ¯²ÅÊÇÖ÷ı¡£
https://cybernews.com/news/marks-spencer-customer-data-leak/


¾©¹«Íø°²±¸11010802024551ºÅ