LummaÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÔÚÖ´·¨¹¥»÷ºó¾íÍÁÖØÀ´
Ðû²¼Ê±¼ä 2025-07-231. LummaÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÔÚÖ´·¨¹¥»÷ºó¾íÍÁÖØÀ´
7ÔÂ22ÈÕ£¬LummaÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þƽ̨£¨MaaS£©ÔÚ2025Äê5ÔµĿç¹úÖ´·¨Ðж¯Öб»²é·â2300¸öÓòÃû¼°²¿·Ö»ù´¡ÉèÊ©£¬µ«Æä½¹µãÔËÓª²¢Î´ÖÕÖ¹¡£LummaÔËÓªÉÌÔÚXSSÂÛ̳ÉϹûÕæÈÏ¿ÉÖÐÑë·þÎñÆ÷ÔâÔ¶³Ì²Á³ý£¬µ«Ç¿µ÷Æäδ±»ÍêÈ«¿ØÖÆ£¬²¢Ñ¸ËÙÆô¶¯»Ö¸´ÍýÏë¡£Ç÷ÊÆ¿Æ¼¼Ò£²âÊý¾Ý֤ʵ£¬LummaµÄ»ù´¡ÉèÊ©ÖØÐÞËÙÂÊÁè¼ÝÔ¤ÆÚ£¬Æäͨ¹ýǨáãÔÆ·þÎñÌṩÉ̹æ±Ü½øÒ»²½·â±Õ£¬Í¬Ê±½ÓÄÉÕýµ±ÔÆ·þÎñ»ìÏý¶ñÒâÁ÷Á¿£¬ÏÔÖø½µµÍ±»Ì½²âµ½µÄ¿ÉÄÜÐÔ¡£Ä¿½ñ£¬LummaÒѹ¹½¨ËÄ´ó½¹µãÈö²¥ÇþµÀʵÏÖ¹æÄ£»¯Ñ¬È¾£ºÆäÒ»£¬Í¨¹ýÐéαÈí¼þÆÆ½â³ÌÐòÓë×¢²á»ú£¬Ê¹ÓöñÒâ¹ã¸æ¼°ËÑË÷Ч¹ûʹÓÃÊÖÒÕ£¬ÓÕµ¼Óû§»á¼û´îÔØÁ÷Á¿¼ì²âϵͳ£¨TDS£©µÄÚ²ÆÍøÕ¾£¬×îÖÕÏÂÔØLummaÔØºÉ£»Æä¶þ£¬½èÖú"ClickFix"ÊÖÒÕ£¬ÔÚÊÜÑ¬È¾ÍøÕ¾Õ¹Ê¾Î±ÔìÑéÖ¤ÂëÒ³Ãæ£¬ÓÕÆÓû§Ö´ÐÐPowerShellÏÂÁîÒÔÄÚ´æÐÎʽ¼ÓÔØ¶ñÒâÈí¼þ£¬¹æ±Ü¹Å°åÎļþ¼ì²â£»ÆäÈý£¬Ê¹ÓÃGitHubƽ̨½¨ÉèAIÌìÉúÄÚÈݿ⣬ÒÔÐéαÓÎÏ·×÷±×¹¤¾ßΪÓÕ¶ü£¬ÍйÜ"TempSpoofer.exe"µÈ¿ÉÖ´ÐÐÎļþ»òZIPѹËõ°ü£»ÆäËÄ£¬Í¨¹ýYouTubeÊÓÆµÓëFacebookÌû×ÓÍÆ¹ãÆÆ½âÈí¼þ£¬½«Óû§Ö¸µ¼ÖÁÀÄÓÃsites.google.comµÈ¿ÉÐÅ·þÎñµÄÍⲿվµã£¬Ðγɶà²ãÌø×ª¹¥»÷Á´¡£
https://www.bleepingcomputer.com/news/security/lumma-infostealer-malware-returns-after-law-enforcement-disruption/
2. ˼¿Æ½ôÆÈ¸üÐÂÇ徲ͨ¸æ£ºISE/ISE-PICÎó²îÔâʹÓÃ
7ÔÂ22ÈÕ£¬Ë¼¿Æ¿ËÈÕÐû²¼½ôÆÈÇ徲ͨ¸æ£¬È·ÈÏÆäÉí·Ý·þÎñÒýÇæ£¨ISE£©¼°ISE±»Æôº½·ÝÅþÁ¬Æ÷£¨ISE-PIC£©²úÆ·Öб£´æµÄÈý¸ö¸ßΣÎó²î£¨CVE-2025-20281¡¢CVE-2025-20282¡¢CVE-2025-20337£©ÒÑÔâµ½ÏÖʵ¹¥»÷ʵÑ飬²¢Ç¿ÁÒ½¨ÒéÓû§Éý¼¶ÖÁÐÞ¸´°æ±¾¡£´Ë´ÎÅû¶µÄÎó²î¾ù±»ÆÀ¶¨ÎªCVSS 10·ÖµÄ×î¸ßÑÏÖØÆ·¼¶£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÒÔrootȨÏÞÔڵײã²Ù×÷ϵͳִÐÐí§Òâ´úÂ룬¶ÔÒªº¦»ù´¡ÉèÊ©×é³ÉÖØ´óÍþв¡£ÏêϸÀ´¿´£¬CVE-2025-20281Ó°ÏìISE/ISE-PIC 3.3¼°ÒÔÉϰ汾£¬ÆäȪԴÔÚÓÚAPIÊäÈëÑé֤ȱ·¦£¬¹¥»÷Õß¿Éͨ¹ýÌá½»¶ñÒâAPIÇëÇóÖ±½Ó»ñȡװ±¸¿ØÖÆÈ¨£»CVE-2025-20282Ôò½öÕë¶Ô3.4°æ±¾£¬Òòȱ·¦ÎļþÉÏ´«ÑéÖ¤»úÖÆ£¬¹¥»÷Õß¿ÉÏòÌØÈ¨Ä¿Â¼Ð´Èë¶ñÒâÎļþ²¢Ö´ÐÐí§Òâ´úÂ룻¶øÉÏÖÜÐÞ¸´µÄCVE-2025-20337Îó²î»úÖÆÓëCVE-2025-20281ÀàËÆ£¬½øÒ»²½À©´óÁ˹¥»÷Ãæ¡£Ë¼¿Æ²úÆ·Çå¾²ÊÂÎñÏìÓ¦ÍŶӣ¨PSIRT£©Ö¤Êµ£¬2025Äê7ÔÂÒѼà²âµ½Õë¶ÔÕâЩÎó²îµÄ»îԾʹÓÃʵÑ飬µ«Î´Åû¶Ïêϸ¹¥»÷ȪԴ¼°ÍþвÐÐΪÕßÐÅÏ¢¡£
https://securityaffairs.com/180260/hacking/cisco-confirms-active-exploitation-of-ise-and-ise-pic-flaws.html
3. CoyoteÒøÐÐľÂíÀÄÓÃWindows¸¨Öú¹¦Ð§ÊµÑ龫׼ƾ֤͵ÇÔ
7ÔÂ22ÈÕ£¬AkamaiÇå¾²ÍŶÓÅû¶£¬ÐÂÐÍCoyoteÒøÐÐľÂí±äÖÖÕýͨ¹ýÀÄÓÃ΢ÈíWindows UI×Ô¶¯»¯¿ò¼Ü£¨UIA£©£¬¶Ô°ÍÎ÷Óû§Ìᳫ¶¨Ïòƾ֤͵ÇÔ¹¥»÷¡£¸Ã¶ñÒâÈí¼þ×Ô2024Äê2ÔÂÊ״ηºÆðÒÔÀ´Ò»Á¬½ø»¯£¬×îбäÖÖÍŽá¹Å°å¼üÅ̼ͼÓëÐÂÐÍUIAÊÖÒÕ£¬Õë¶Ô75¼ÒÒøÐм°¼ÓÃÜÇ®±Òƽ̨ʵÑ龫׼¹¥»÷¡£Î¢ÈíUIA¿ò¼Ü±¾ÓÃÓÚ¸¨Öú²ÐÕÏÓû§ÓëÓ¦ÓóÌÐò½»»¥£¬Æäͨ¹ýUI×Ô¶¯»¯Ê÷̻¶½çÃæÔªËØµÄ¹¦Ð§£¬È´±»Coyote¿ª·¢Õß¶ñÒâʹÓá£AkamaiÑо¿Ö°Ô±Ö¸³ö£¬µ±Ä¾ÂíÎÞ·¨Í¨¹ý´°¿ÚÎÊÌâʶ±ðÄ¿µÄÓ¦ÓÃʱ£¬»áŲÓÃUIA APIÆÊÎöä¯ÀÀÆ÷±êǩҳ»òµØµãÀ¸ÄÚÈÝ£¬ÌáÈ¡»á¼ûµÄÍøÖ·²¢ÓëÓ²±àÂëµÄÄ¿µÄ·þÎñÁÐ±í£¨°üÀ¨Banco do Brasil¡¢CaixaBank¡¢BinanceµÈ£©¾ÙÐн»Ö¯±È¶Ô£¬´Ó¶øËø¶¨¸ß¼ÛֵĿµÄ¡£ÕâÖÖÊÖÒÕÍ»ÆÆÁ˹Űå¼üÅ̼ͼµÄ¾ÖÏÞÐÔ£¬¼´±ãÓû§Í¨¹ýä¯ÀÀÆ÷»á¼ûÍøÒø£¬Ä¾ÂíÈÔ¿É׼ȷʶ±ð·þÎñÀàÐÍ¡£CoyoteµÄ½ø»¯Â·¾¶Í¹ÏÔÍøÂç·¸·¨µÄÊÖÒÕÉý¼¶Ç÷ÊÆ£ºÔÚ±£´æ¼üÅ̼ͼ¡¢ÍøÂç´¹ÂÚÁýÕֵȹŰåÊÖ·¨»ù´¡ÉÏ£¬ÐÂÔöUIAÀÄÓÃÄÜÁ¦£¬ÐγÉ"¶àÖØÑéÖ¤"µÄ¹¥»÷Á´¡£
https://www.bleepingcomputer.com/news/security/coyote-malware-abuses-windows-accessibility-framework-for-data-theft/
4. ÖÐÅ·Ò½ÁƾÞÍ·AMEOS¼¯ÍÅÔâÓöÖØ´óÊý¾Ýй¶
7ÔÂ22ÈÕ£¬ÖÐÅ·×î´ó˽Á¢Ò½Ôº¼¯ÍÅÖ®Ò»¡¢×ܲ¿Î»ÓÚËÕÀèÊÀµÄAMEOSÒ½ÁƼ¯ÍÅ¿ËÈÕÅûÂ¶ÖØ´óÇå¾²Îó²îÊÂÎñ£¬¿ÉÄܵ¼Ö¿ͻ§¡¢Ô±¹¤¼°ÏàÖúͬ°éÃô¸ÐÐÅϢй¶¡£Æ¾Ö¤¡¶Í¨ÓÃÊý¾Ý±£»¤ÌõÀý¡·£¨GDPR£©µÚ34ÌõÒªÇ󣬸ü¯ÍÅÔÚ¹Ù·½ÍøÕ¾Ðû²¼Í¨¸æ£¬È·ÈÏÍⲿÍþвÐÐΪÕßδ¾ÊÚȨÇÖÈëÆäITϵͳ£¬Ö»¹ÜÒÑʵÑé"ÆÕ±éÇå¾²²½·¥"£¬ÈÔÀֳɻñÈ¡°üÀ¨»¼ÕßÕïÁƼͼ¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¼°ÉÌÒµÏàÖúͬ°éÁªÏµÊý¾ÝÔÚÄÚµÄÃô¸ÐÄÚÈÝ¡£Í¨¸æÖÒÑԳƣ¬Ð¹Â¶Êý¾Ý±£´æ±»¶ñÒâÀÄÓûòͨ¹ý»¥ÁªÍø¶þ´ÎÈö²¥µÄΣº¦¡£×÷ΪDACHµØÇø£¨µÂ¹ú¡¢°ÂµØÀû¡¢ÈðÊ¿£©Ò½ÁÆÁìÓòµÄÁúÍ·ÆóÒµ£¬AMEOS¼¯ÍÅÔËÓª×ÅÁè¼Ý100¼ÒÒ½Ôº¡¢ÕïËù¼°¿µ¸´ÖÐÐÄ£¬ÓµÓÐ1.8ÍòÃûÔ±¹¤ºÍ1ÍòÕÅ´²Î»£¬ÄêÊÕÈ볬14ÒÚÃÀÔª¡£´Ë´ÎÊÂÎñµ¼ÖÂÆäÖÜÈ«¹Ø±ÕËùÓÐITϵͳ£¬ÇжÏÄÚÍâÍøÂçÅþÁ¬ÒÔ×èֹΣº¦À©É¢£¬²¢½ôÆÈÅÉDzÍⲿITÇå¾²ÍŶÓÓ뷨ҽר¼Ò½éÈëÊӲ졣ÏÖÔÚ£¬ÈðÊ¿¡¢µÂ¹ú¡¢°ÂµØÀûÈý¹úÊý¾Ý±£»¤»ú¹¹ÒÑ»ñÖªÇéÐΣ¬¾¯·½ÐÌÊÂËßËϳÌÐòͬ²½Æô¶¯¡£ÖµµÃ×¢ÖØµÄÊÇ£¬Ö»¹ÜAMEOSÇ¿µ÷"ÉÐÎÞÏêϸ֤¾ÝÅúעСÎÒ˽¼ÒÊý¾ÝÒÑÏÖʵй¶"£¬µ«Ã÷È·Ö¸³ö¹¥»÷Õß¿ÉÄÜͨ¹ýϵͳÎó²î»ñÈ¡ÁË´ó×ڽṹ»¯Êý¾Ý¡£¼¯ÍލÒé½üÆÚÔÚÆä»ú¹¹½ÓÊÜÒ½ÁÆ·þÎñµÄÖ°Ô±Ìá¸ßСÐÄ£¬Ìá·À´¹ÂÚ¹¥»÷¼°Éí·ÝÕ©Æ¡£
https://www.bleepingcomputer.com/news/security/major-european-healthcare-network-discloses-security-breach/
5. °Ä´óÀûÑÇʱÉÐÆ·ÅÆSABO³¬350Íò¿Í»§Êý¾Ýй¶
7ÔÂ22ÈÕ£¬°Ä´óÀûÑÇÈ«ÇòʱÉÐÉè¼Æ¹«Ë¾SABO¿ËÈÕÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬Áè¼Ý350ÍòÌõ¿Í»§¼Í¼ÒòÉèÖùýʧµÄÊý¾Ý¿â̻¶ÓÚ¹ûÕæÍøÂç£¬Éæ¼°292GBÃô¸ÐÐÅÏ¢¡£´Ë´ÎÎó²îÓÉÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷£¬Ì»Â¶Êý¾Ýº¸Ç2015ÄêÖÁ2025Äê6ÔÂ27ÈÕʱ´úµÄ¿Í»§ÐÕÃû¡¢ÏÖʵµØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬ÒÔ¼°ÁãÊÛºÍÉÌÒµ¿Í»§µÄÏêϸ¶©µ¥¼Í¼¡¢·¢Æ±¡¢×°Ïäµ¥ºÍÍË»õµ¥µÈÎļþ¡£Ö»¹ÜSABOÔÚFowlerÈÏÕæÈÎÅû¶ºóѸËÙ±£»¤ÁËÊý¾Ý¿â£¬µ«´Ë´ÎÊÂÎñÈÔÒý·¢¶ÔÊý¾Ý¼ÓÃÜÐëÒªÐÔµÄÆÕ±éÌÖÂÛ¡£Ì»Â¶ÐÅÏ¢ÖаüÀ¨Ïêϸ¶©µ¥ÈÕÆÚ¡¢²úÆ·Çåµ¥µÈ½á¹¹»¯Êý¾Ý£¬ÎªÍøÂç·¸·¨·Ö×ÓÌṩÁ˾«×¼ÊµÑéÉç½»¹¤³Ì¹¥»÷µÄËØ²Ä¡£Ç徲ר¼ÒÖÒÑÔ£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕæÊµ¶©µ¥ÐÅϢαÔì´¹ÂÚÓʼþ£¬ÓÕÆÓû§Ð¹Â¶¸ü¶à²ÆÎñÐÅÏ¢»ò¾ÙÐнðÈÚڲƣ¬´ËÀ๥»÷Òò»ùÓÚÕæÊµÊý¾Ý¶ø¼«¾ßÒÉ»óÐÔ¡£ÊÂÎñ̻¶ºó£¬SABOδÃ÷È·»ØÓ¦ÔðÈιéÊôÎÊÌ⣬½öÇ¿µ÷ÒѽÓÄÉÐÞ¸´²½·¥¡£ÍøÂçÇ徲ר¼Ò½¨ÒéÊÜÓ°ÏìÓû§ÔöǿСÐÄ£¬Í¨¹ý¹Ù·½ÇþµÀÑéÖ¤¿ÉÒÉͨѶ£¬×èÖ¹µã»÷²»Ã÷Á´½Ó»òÌṩСÎÒ˽¼ÒÐÅÏ¢¡£
https://hackread.com/global-fashion-label-sabo-customer-records-leaked/
6. ÃÀ¹úµÂÖݾƾ«¼ì²â¹«Ë¾TADTS³¬75ÍòÈËÐÅÏ¢±»ÇÔ
7ÔÂ21ÈÕ£¬ÃÀ¹úµÂ¿ËÈøË¹Öݾƾ«ÓëÒ©Îï¼ì²â·þÎñ¹«Ë¾£¨TADTS£©¿ËÈÕÅû¶£¬ÆäϵͳÔÚ2024Äê7ÔÂ9ÈÕÔâÓöδÊÚȨ»á¼û£¬µ¼ÖÂÔ¼74.9ÍòÈ˵ÄÃô¸ÐÐÅÏ¢±»ÇÔÈ¡¡£×÷ΪµÂÖÝÖ÷ÒªÖ°³¡¼°Ð¡ÎÒ˽¼Ò¾Æ¾«/Ò©Îï¼ì²â·þÎñÌṩÉÌ£¬¸Ã¹«Ë¾¾×¨ÒµÍŶÓÊÓ²ìÈ·ÈÏ£¬Ð¹Â¶Êý¾Ýº¸ÇÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç±£ºÅ¡¢¼ÝÕÕ/»¤Õպ𢲯ÎñÐÅÏ¢¡¢¿µ½¡°ü¹ÜÏêÇé¡¢ÉúÎïʶ±ðÊý¾Ý¡¢µÇ¼ƾ֤¼°ÒÆÃñµµ°¸ºÅµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ£¬²¿·ÖÐÅÏ¢Ô´×Ô¾Íҵɸ²é²âÊÔÖÐÊÚȨÌṩµÄСÎÒ˽¼Ò×ÊÁÏ¡£ÊÂÎñÆØ¹âºó£¬TADTS½ÓÄɶàÏîµ÷½â²½·¥£¬°üÀ¨ÖØÖÃȫϵͳÃÜÂë¡¢°²ÅÅÔöÇ¿ÐÍ¼à¿Ø¹¤¾ß¼°Ç¿»¯¶Ëµã¼ì²âÐÒ飬²¢ÒÑÏòÖ´·¨²¿·Ö±¨°¸¡£Ö»¹ÜÏÖÔÚÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»ÓÃÓÚڲƻòÉí·Ý͵ÇÔ£¬¹«Ë¾ÈÔ½¨ÒéÊÜÓ°ÏìÕß°´ÆÚºË²éÐÅÓñ¨¸æ¼°ÕË»§Òì³£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬TADTSÃ÷È·ÌåÏÖ²»»áÌṩÃâ·ÑÉí·Ý±£»¤·þÎñ£¬´Ë¾ÙÒý·¢¶ÔÊܺ¦ÕߺóÐø°ü¹ÜµÄµ£ÐÄ¡£´Ë´Î¹¥»÷ÒÉËÆÓëBianLianÀÕË÷ÍÅ»ïÏà¹Ø¡£¸Ã×éÖ¯ÓÚ2024Äê7ÔÂ14ÈÕÐû³ÆÇÔȡԼ218GBÊý¾Ý£¬µ«Æä»ùÓÚTorµÄйÃÜÍøÕ¾ÏÖÔÚÒÑÀëÏߣ¬ÇÒ×Ô2025Äê3ÔÂ31ÈÕÆðδÔÙ¸üÐÂÊܺ¦Õ߼ͼ£¬Êý¾ÝÏÖʵÈö²¥ÇéÐÎÉв»Ã÷È·¡£
https://www.securityweek.com/750000-impacted-by-data-breach-at-the-alcohol-drug-testing-service/


¾©¹«Íø°²±¸11010802024551ºÅ