˹¿°ÄáÑÇÆóÒµ°ü¹Ü²¿·ÖÒÉÔâÈëÇÖ£¬3.4Íò·ÝÎļþ±»µÁ
Ðû²¼Ê±¼ä 2025-06-181. ˹¿°ÄáÑÇÆóÒµ°ü¹Ü²¿·ÖÒÉÔâÈëÇÖ£¬3.4Íò·ÝÎļþ±»µÁ
6ÔÂ16ÈÕ£¬ÈðµäÖ÷ÒªÉÌÓóµÖÆÔìÉÌ˹¿°ÄáÑÇÒÉËÆÔâÓöÊý¾Ýй¶ÊÂÎñ¡£¹¥»÷ÕßÔÚÒ»¸öÈÈÃÅ¡°½öÏÞÔ¼Ç롱µÄºÚ¿ÍÂÛ̳ÉÏÐû²¼ÈëÇÖÁË˹¿°ÄáÑÇµÄÆóÒµ°ü¹Ü²¿·Ö£¬²¢Éù³ÆÇÔÈ¡ÁË3.4Íò·Ý´Ëǰ´Óδ¹ûÕæ¹ýµÄÎļþ¡£×èÖ¹ÏÖÔÚ£¬ÕâЩÎļþ°üÀ¨µÄÏêϸÐÅÏ¢Éв»Ã÷È·¡£²»¹ý£¬¼øÓÚ˹¿°ÄáÑǹ«Ë¾°ü¹Üº¸ÇÉÌÓóµÁ¾£¬Ì»Â¶µÄÎļþ¼«ÓпÉÄÜÉæ¼°¿Í»§ÐÅÏ¢£¬Èç¿Í»§Éí·ÝÒÔ¼°ËûÃÇËùÓµÓеijµÁ¾ÐÅÏ¢£¨Í¨¹ý³µÁ¾Ê¶ÓÖÃûÂëVIN£©¡£ÏÖÔÚ£¬¹¥»÷ÕßÉù³ÆÇÔÈ¡Êý¾ÝµÄ˹¿°ÄáÑÇÍøÕ¾ÒÑÎÞ·¨»á¼û£¬·Ã¿ÍÖ»ÄÜ¿´µ½ÏµÍ³Î¬»¤ÏÂÏßµÄÐÂÎÅ£¬µ«Éв»ÇåÎú´Ë´Îά»¤ÊÇ·ñÓëºÚ¿Í¹¥»÷Óйء£Ë¹¿°ÄáÑÇ×÷Ϊ´óÐÍÉÌÓóµÖÆÔìÉÌ£¬ÔÚÅ·ÖÞÉÌÓóµÊг¡Õ¼Óнü19%µÄ·Ý¶î£¬ÓµÓÐ5.9ÍòÃûÔ±¹¤£¬2024ÄêÓªÊÕÔ¤¼Æ³¬220ÒÚÃÀÔª¡£¹¥»÷Õß³£½«Æû³µÖÆÔìÉÌ×÷ΪĿµÄ£¬Ôµ¹ÊÔÓÉÔÚÓÚ´óÐÍ¿ç¹ú¹«Ë¾ÕÆÎÕ×Å´ó×ÚÃô¸ÐµÄ¹«Ë¾ºÍ¿Í»§Êý¾Ý£¬ÇÒÔÚÔâÊÜÀÕË÷ʱ¾ß±¸Ö§¸¶Êê½ðµÄÄÜÁ¦¡£´Ëǰ£¬±¾ÔÂÔçЩʱ¼ä¹¥»÷Õß¾ÍÔøÉù³ÆÈëÇÖÁ˵¹úÆû³µ¾ÞÍ·¹«¹²Æû³µ¼¯ÍÅ¡£
https://cybernews.com/security/scania-insurance-data-breach-hackers/
2. °®¶ûÀ¼ÑÛ¿ÆÕչ˻¤Ê¿¹«Ë¾OcucoÊý¾Ýй¶ӰÏì24ÍòÈË
6ÔÂ16ÈÕ£¬×ܲ¿Î»ÓÚ°®¶ûÀ¼µÄÑÛ¿ÆÕչ˻¤Ê¿ÊÖÒÕ¹«Ë¾OcucoÏòÃÀ¹úÎÀÉúÓ빫ÖÚ·þÎñ²¿£¨HHS£©×ª´ïÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬´Ë´ÎÊÂÎñÓ°ÏìÁè¼Ý24ÍòÈË¡£Ocuco×Ô³ÆÊÇÈ«Çò×î´óµÄÑÛ¾µÁãÊÛÈí¼þÆóÒµ£¬ÆäÈí¼þ·þÎñÆÕ±éÁýÕÖ77¸ö¹ú¼Ò/µØÇøµÄ6000¸ö·þÎñµã¡£Ö»¹ÜOcucoÉÐδ¹ûÕæÐû²¼ÊÂÎñͨ¸æ£¬µ«ÖÖÖÖ¼£ÏóÅú×¢£¬¸ÃÊÂÎñºÜ¿ÉÄÜÓëÀÕË÷×éÖ¯KillSecµÄºÚ¿Í¹¥»÷Óйء£½ñÄêÔçЩʱ¼ä£¬KillSecÐû³Æ´ÓOcucoÇÔÈ¡ÁË´ó×ÚÎļþ£¬4Ô³õ£¬¸Ã×éÖ¯ÔÚÆä»ùÓÚTorµÄÐ¹Â¶ÍøÕ¾ÉÏÐû²¼ÁËOcucoµÄÐÅÏ¢£¬²¢Ðû²¼Á˶àÕŽØÍ¼×÷Ϊ¹¥»÷ÐÐΪµÄ×ôÖ¤¡£ÆäÖÐÒ»ÕŽØÍ¼ÏÔʾ£¬ºÚ¿ÍÖÁÉÙÇÔÈ¡ÁË67Íò·ÝÎļþ£¬×ܼÆ340GBÊý¾Ý¡£ËäÈ»ºÚ¿ÍÍøÕ¾Éù³Æ±»µÁÊý¾ÝÒѹûÕæ£¬µ«×èÖ¹·¢¸åʱ£¬OcucoµÄÊý¾ÝÉÐδ·ºÆðÔÚKillSecÍøÕ¾µÄ¿ÉÏÂÔØÁбíÖС£
https://www.securityweek.com/240000-impacted-by-data-breach-at-eyecare-tech-firm-ocuco/
3. ¡°ÂÓʳÂéȸ¡±¹¥»÷ÒÁÀÊÈüÅÁÒøÐУ¬Í¹ÏÔÒÔÒÁ³åÍ»ÖÐÍøÂçÕ½Éý¼¶
6ÔÂ17ÈÕ£¬ÒÁÀʹúÓÐÒøÐÐÈüÅÁÒøÐУ¨Bank Sepah£©ÍøÕ¾ÒòÔâºÚ¿Í×éÖ¯¡°ÂÓʳÂéȸ¡±£¨Predatory Sparrow£¬²¨Ë¹ÓïΪ¡°Gonjeshke Darande¡±£©¹¥»÷¶øÏÂÏß¡£¸Ã×éÖ¯ÖܶþÆÆÏþÔÚÉ罻ýÌåÐû³Æ¡°´Ý»ÙÁËÒÁÀʸïÃüÎÀ¶ÓÈüÅÁÒøÐеÄÊý¾Ý¡±¡£¾ÝÒÁÀÊýÌ屨µÀ£¬ÈüÅÁÒøÐзÖÐйرգ¬¿Í»§ÎÞ·¨»á¼ûÕË»§£¬Ö§¸¶´¦Öóͷ£ÖÐÖ¹£¬ÒÁÀÊ·¨¶û˹ͨѶÉçҲ֤ʵÆä»ù´¡ÉèÊ©ÔâÊÜÍøÂç¹¥»÷Ö·þÎñÖÐÖ¹¡£´Ë´ÎÕë¶ÔÒÁÀÊ×î´ó½ðÈÚ»ú¹¹Ö®Ò»µÄÏ®»÷£¬Í¹ÏÔÍøÂçÕ½ÔÚÒÔÉ«ÁкÍÒÁÀÊÒ»Ö±Éý¼¶µÄ³åÍ»ÖÐ×÷ÓÃÓú·¢Ö÷Òª£¬ÇÒ¶ÔÒÁÀÊÒªº¦»ù´¡ÉèÊ©±¬·¢Ö±½ÓÓ°Ïì¡£¡°ÂÓʳÂéȸ¡±×éÖ¯³Æ¹¥»÷ÈüÅÁÒøÐУ¬ÒòÆä¡°¹æ±Ü¹ú¼ÊÖÆ²Ã£¬ÓÃÒÁÀÊÈËÃñµÄÇ®×ÊÖúÕþȨµÄ¿Ö²ÀÖ÷ÒåÊðÀíÈË¡¢µ¯µÀµ¼µ¯ÍýÏëºÍ¾üʺËÍýÏ롱¡£¸Ã×éÖ¯´Ëǰ»¹Éù³Æ¶ÔÒÁÀʸÖÌú³§¡¢ÌúÂ·ÍøÂç¼°¼ÓÓÍÕ¾Ö§¸¶ÏµÍ³·¢¶¯¹¥»÷£¬ÆäÔ¼®¹ú²»Ã÷£¬µ«Ò»Ö±Õë¶ÔÒÁÀÊÕþȨ²¢Ö§³ÖÒÔÉ«ÁÐÔÚÒÁÄ¿µÄ¡£
https://cyberscoop.com/iran-bank-sepah-cyberattack/
4. Cock.liÈ·ÈÏÊý¾Ýй¶£¬³¬°ÙÍòÓû§ÐÅÏ¢ÔâÇÔ
6ÔÂ17ÈÕ£¬µç×ÓÓʼþÍйÜÌṩÉÌCock.liÈ·ÈÏÔâÓöÊý¾Ýй¶ÊÂÎñ¡£ÍþвÐÐΪÕßʹÓÃÆäÒÑÍËÒÛµÄRoundcubeÍøÂçÓʼþƽ̨Îó²î£¬ÇÔÈ¡ÁËÁè¼ÝÒ»°ÙÍò¸öÓû§¼Í¼¡£´Ë´Îй¶̻¶ÁË×Ô2016ÄêÒÔÀ´µÇ¼¸ÃÓʼþ·þÎñµÄËùÓÐÓû§£¨Ô¼1,023,800ÈË£©µÄÐÅÏ¢£¬ÒÔ¼°ÁíÍâ93,000ÃûÓû§µÄÁªÏµÈËÌõÄ¿¡£ÉÏÖÜÍíЩʱ¼ä£¬Cock.li·þÎñÖÐÖ¹µ«Î´¹ûÕæÚ¹ÊÍ£¬ËæºóÍþвÐÐΪÕßÉù³ÆÒª³öÊÛ°üÀ¨Ãô¸ÐÓû§ÐÅÏ¢µÄÊý¾Ý¿â¡£Cock.li×òÌì½ÒÏþÉùÃ÷֤ʵÁË´Ë´ÎйÃÜÊÂÎñ¼°ÍþвÐÐΪÕßÖ¸¿ØµÄÓÐÓÃÐÔ£¬È·ÈÏÁË1,023,800¸öÓû§ÕÊ»§µÄµç×ÓÓʼþ¡¢µÇ¼ʱ¼ä´ÁµÈÐÅÏ¢Òѱ»Ð¹Â¶£¬µ«Óû§ÕÊ»§ÃÜÂë¡¢µç×ÓÓʼþÄÚÈݺÍIPµØµã²¢Î´Ð¹Â¶¡£Í¬Ê±£¬µÚÈý·½ÁªÏµÐÅÏ¢±»Ð¹Â¶µÄ10,400ÃûÕË»§³ÖÓÐÈ˽«ÊÕµ½µ¥¶À֪ͨ£¬½¨Òé×Ô2016ÄêÒÔÀ´Ê¹Óø÷þÎñµÄËùÓÐÈËÖØÖÃÃÜÂë¡£Cock.liÒÔΪÊý¾ÝÊÇʹÓþɵÄRoundCube SQL×¢ÈëÎó²îÇÔÈ¡µÄ£¬¶ø´Ë´Îй¶ÊÂÎñ±¬·¢Ö®¼Ê£¬ËûÃÇ¸ÕÆÊÎöÁËRoundcubeÖеÄÒ»¸öRCEÎó²î²¢ÒÔΪ¸ÃÎó²îÔÚ¹¥»÷Öб»Æð¾¢Ê¹Ó㬴ÙʹCock.liÓÚ2025Äê6Ô½«¸ÃÈí¼þ´ÓÆäƽ̨ÉÏÒÆ³ý£¬²¢ÌåÏÖ½«²»ÔÙÌṩRoundcubeÍøÂçÓʼþ¡£
https://www.bleepingcomputer.com/news/security/hacker-steals-1-million-cockli-user-records-in-webmail-data-breach/
5. ºÚ¿ÍʹÓÃLangflowÑÏÖØÎó²îÊÍ·ÅFlodrix½©Ê¬ÍøÂç
6ÔÂ17ÈÕ£¬¹¥»÷ÕßÕýÆð¾¢Ê¹ÓûùÓÚPythonµÄWebÓ¦ÓóÌÐòLangflowÖеÄÒ»¸öÑÏÖØÈ±ÏÝ£¨CVE-2025-3248£©·¢¶¯¹¥»÷£¬¸ÃȱÏݱ£´æÓÚLangflow 1.3.0֮ǰµÄ°æ±¾ÖС£LangflowÊÇÊðÀíAIÁìÓòÆÕ±é½ÓÄɵŤ¾ß£¬ÔÊÐíÓû§¹¹½¨AIÇý¶¯µÄÊðÀíºÍÊÂÇéÁ÷£¬¶ø´ËÎó²îÊÇÒ»¸öÒ×ÓÚʹÓõÄÉí·ÝÑéÖ¤Îó²î£¬±£´æÓÚÆ½Ì¨µÄ´úÂëÑéÖ¤»úÖÆÖУ¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÍêÈ«½ÓÊÜLangflow·þÎñÆ÷¡£Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷£¬¹¥»÷Õßͨ¹ýÏò/api/v1/validate/code¶Ëµã·¢ËͶñÒâPOSTÇëÇóÀ´Ê¹ÓôËÎó²î£¬ÔÚÊÜѬȾµÄ·þÎñÆ÷ÉÏÖ´ÐÐÏÂÔØÆ÷¾ç±¾£¬ÒÔ»ñÈ¡²¢×°ÖÃFlodrix¶ñÒâÈí¼þ£¬½ø¶øÊÍ·ÅǿʢµÄ½©Ê¬ÍøÂ磬¿ÉÄܵ¼ÖÂϵͳ±»ÈëÇÖ¡¢DDoS¹¥»÷£¬ÒÔ¼°Ãô¸ÐÐÅϢɥʧ»òй¶¡£¼øÓÚLangflowÔÚGitHubÉÏÓµÓÐÁè¼Ý7Íò¿ÅÐÇ£¬Åú×¢ÆäÊÜ¿ª·¢ÕßÈϿɶȸߣ¬ÇÒÔÚÖÇÄÜ×Ô¶¯»¯ÔÐÍÉè¼ÆºÍ°²ÅÅ·½ÃæÊ©Õ¹Ö÷Òª×÷Óã¬Ò×Êܹ¥»÷µÄLangflow·þÎñÆ÷¶Ô¹¥»÷Õß¶øÑÔÊÇ¡°¼«¾ßÎüÒýÁ¦µÄÄ¿µÄ¡±¡£
https://www.darkreading.com/vulnerabilities-threats/hackers-exploit-langflow-flaw-flodrix-botnet
6. CISA¾¯Ê¾TP-LinkÈÈõè¾¶ÓÉÆ÷Îó²îÕý±»Æð¾¢Ê¹ÓÃ
6ÔÂ17ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¸üÐÂÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬½«TP-LinkÏÂÁî×¢ÈëÎó²îCVE-2023-33538ÄÉÈëÆäÖС£¸ÃÎó²îÁ½ÄêǰËäÒѱ»·¢Ã÷£¬µ«½üÆÚ±»ÍøÂç·¸·¨·Ö×ÓÆð¾¢Ê¹Óã¬ÆÀ·Ö¸ß´ï8.8·Ö£¬ÔÊÐí¹¥»÷ÕßÔÚδ¾ÊÚȨµÄÇéÐÎÏÂÔÚ·ÓÉÆ÷ÉÏÖ´ÐÐÏÂÁ×é³ÉÖØ´óΣº¦¡£ÊÜÓ°ÏìµÄTP-Link·ÓÉÆ÷ÐͺŰüÀ¨TL-WR940N V2/V4¡¢TL-WR841N V8/V10ÒÔ¼°TL-WR740N V1/V2µÈ£¬ÕâЩ·ÓÉÆ÷ÔÚÏûºÄÊг¡ÉϹãÊܽӴý£¬²¿·ÖÐͺÅÔÚÑÇÂíÑ·ÉÏÓµÓÐÊýÍòÌõ̸ÂÛ¡£È»¶ø£¬ÕâЩÊÜÓ°ÏìµÄÓ²¼þ°æ±¾ÒѵִïʹÓÃÊÙÃü£¬²»ÔÙÎüÊÕÇå¾²¸üУ¬ÇÒ×îй̼þ°æ±¾Ðû²¼Ê±¼ä¾ÃÔ¶£¬ÈçTL-WR940N V2/V4µÄ×îй̼þ°æ±¾ÓÚ2016ÄêÐû²¼£¬TL-WR841N V8/V10µÄ×îºóÒ»´Î¹Ì¼þ¸üÐÂÔòÊÇÔÚ2015Äê¡£CISAÖÒÑԳƣ¬ÕâЩ·ÓÉÆ÷±£´æÑÏÖØÇå¾²Òþ»¼£¬Óû§Ó¦×èֹʹÓ᣸ÃÎó²î±£´æÓÚ·ÓÉÆ÷µÄWebÖÎÀí½çÃæÖУ¬ÒòÎÞ·¨×¼È·ÑéÖ¤Óû§ÊäÈ룬ºÚ¿ÍµÃÒÔ×¢Èë¶ñÒâÏÂÁî¡£ËäÈ»¾ßÓÐÔ¶³Ì»á¼û¹¦Ð§µÄ¹ûÕæÂ·ÓÉÆ÷ÉÏ´ËÀàȱÏÝ×îΪΣÏÕ£¬µ«¹¥»÷ÕßÒ²¿É´ÓͳһÍâµØÍøÂçÄÚʹÓá£Îª´Ë£¬CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê7ÔÂ7ÈÕÇ°ÒÆ³ýÕâЩ·ÓÉÆ÷£¬²¢±Þ²ßËùÓÐ×é֯Ч·Â£¬ÒÔÈ·±£ÍøÂçÇå¾²¡£
https://cybernews.com/security/hackers-exploit-older-tp-link-routers-cisa-warns/


¾©¹«Íø°²±¸11010802024551ºÅ