ÈËÁ¦×ÊÔ´¾ÞÍ·WorkdayÔÚSalesforce¹¥»÷ºóÅû¶Êý¾Ýй¶

Ðû²¼Ê±¼ä 2025-08-19

1. ÈËÁ¦×ÊÔ´¾ÞÍ·WorkdayÔÚSalesforce¹¥»÷ºóÅû¶Êý¾Ýй¶


8ÔÂ18ÈÕ£¬È«ÇòÈËÁ¦×ÊÔ´¾ÞÍ·Workday¿ËÈÕÅû¶һÆðÖØ´óÊý¾ÝÇå¾²ÊÂÎñ£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÈëÇÖÆäµÚÈý·½¿Í»§¹ØÏµÖÎÀí£¨CRM£©Æ½Ì¨£¬µ¼Ö²¿·ÖÆóÒµÁªÏµÐÅϢй¶¡£´Ë´ÎÊÂÎñÒý¿¯ÐÐÒµÆÕ±é¹Ø×¢£¬²»µ«ÒòWorkdayµÄÖØ´ó¿Í»§»ù´¡£¬Æä·þÎñÁýÕÖÈ«Çò11,000Óà¼ÒÆóÒµ£¬°üÀ¨³¬60%µÄ¡¶²Æ²ú¡·500Ç¿ÆóÒµ£¬¸üÒò¸ÃÊÂÎñ±»Ö¤ÊµÓë½üÆÚÕë¶ÔSalesforce CRMʵÀýµÄϵÁй¥»÷±£´æ¹ØÁª¡£¾ÝWorkday¹Ù·½Åû¶£¬8ÔÂ6ÈÕ¹«Ë¾¼à²âµ½Òì³£Ô˶¯£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³ÌÊÖ¶ÎÓÕÆ­Ô±¹¤ÊÚȨ¶ñÒâOAuthÓ¦Óã¬×îÖÕ»ñÈ¡µÚÈý·½CRMƽ̨´æ´¢µÄÉÌÒµÁªÏµÐÅÏ¢£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¼°µç»°ºÅÂë¡£Ö»¹ÜWorkdayÇ¿µ÷¿Í»§½¹µãÊý¾ÝδÊÜÓ°Ï죬µ«Ð¹Â¶µÄÁªÏµ·½·¨ÈÔ¿ÉÄܱ»ÓÃÓÚºóÐøÕ©Æ­¡£ÖµµÃ×¢ÖØµÄÊÇ£¬´Ë´Î¹¥»÷ģʽÓëÎÛÃûÕÑÖøµÄShinyHuntersÀÕË÷×éÖ¯ÊÖ·¨¸ß¶ÈÎǺÏ£¬¸Ã×éÖ¯×ÔÄêÍ·Æðͨ¹ýÀàËÆÊÖ¶ÎÈëÇÖ¶à¼ÒÆóÒµSalesforceʵÀý£¬ÇÔÈ¡Êý¾Ý¿âºóʵÑéÀÕË÷£¬´ËǰÒѲ¨¼°°¢µÏ´ï˹¡¢°ÄÖÞº½¿Õ¡¢Â·Ò×ÍþµÇµÈÈ«Çò×ÅÃûÆóÒµ¡£


https://www.bleepingcomputer.com/news/security/hr-giant-workday-discloses-data-breach-amid-salesforce-attacks/


2. ÍþвÕßÉù³Æ³öÊÛ1580Íò·Ý´¿Îı¾PayPalƾ֤


8ÔÂ18ÈÕ£¬ÍøÂç·¸·¨ÂÛ̳ÉÏ·ºÆðÒ»Æð´ó¹æÄ£PayPalÕË»§Êý¾Ýй¶ÊÂÎñ¡£Ò»ÃûΪChucky_BFµÄÍþвÐÐΪÕß¹ûÕæ³öÊÛ±ê°ñΪ¡°È«ÇòPayPalƾ֤ת´¢2025¡±µÄÊý¾Ý¼¯£¬Éù³Æ°üÀ¨1580ÍòÌõ¼Í¼£¬Éæ¼°µç×ÓÓʼþµØµã¡¢Ã÷ÎÄÃÜÂë¼°Ö±½ÓÁ´½ÓÖÁPayPal·þÎñµÄURL£¬Êý¾Ý×ÜÁ¿´ï1.1GB¡£Âô¼Ò½«Æä³ÆÎª¡°ÍøÂç·¸·¨·Ö×ӵĽð¿ó¡±£¬²¢ÖÒÑÔ¸ÃÊý¾Ý¿ÉÄܱ»ÓÃÓÚÆ¾Ö¤Ìî³ä¹¥»÷¡¢ÍøÂç´¹ÂÚ¼°Ú²Æ­ÐÐΪ¡£¾ÝÆÊÎö£¬¸ÃÊý¾Ý¼¯µÄ½á¹¹ÇкÏÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÌØÕ÷¡£´ËÀàÈí¼þͨ³£Í¨¹ýѬȾÓû§×°±¸£¬ÇÔÈ¡ÉúÑĵĵǼƾ֤¡¢ä¯ÀÀÆ÷Êý¾Ý¼°ÍøÕ¾Ô˶¯£¬×îÖÕ½«ÍøÂçµÄÐÅÏ¢»ã×ܳöÊÛ¡£Ñù±¾ÏÔʾ£¬²¿·Ö¼Í¼°üÀ¨GmailµÈÓÊÏäÓëÃÜÂëµÄÅä¶Ô£¬ÇÒͳһÕË»§ÔÚÍøÂç°æºÍÒÆ¶¯°æPayPalÖеÄÏêϸÐÅÏ¢¾ù±»ÊÕ¼£¬ÌåÏÖÊý¾ÝÀ´×ÔÈ«Çò¶àµØÊÜѬȾװ±¸¡£Ö»¹ÜÂôÃÅ·ç³Æ¡°´ó´ó¶¼ÃÜÂëÇ¿¶È¸ßÇÒÆæÒ족£¬µ«Ò²ÈϿɱ£´æÖظ´Ê¹ÓÃÇéÐΣ¬ÕâÒâζ×ÅÓû§ÔÚÆäËûƽ̨ʹÓÃÏàͬÃÜÂëʱ¿ÉÄÜÃæÁÙ¿çվΣº¦¡£ÏÖÔÚ£¬PayPalÉÐδ֤ʵ¸ÃÊý¾Ý¼¯µÄÕæÊµÐÔ£¬ÎÞ·¨È·¶¨ÆäÊÇÍêÈ«ÕæÊµµÄ¼Í¼¡¢°üÀ¨ÐéαÐÅÏ¢£¬ÕվɶÔÀúʷй¶Êý¾ÝµÄÖØÐ°ü×°¡£


https://hackread.com/threat-actor-selling-plain-text-paypal-credentials/


3. Î÷½Ýº½¿ÕÈ·ÈÏÍøÂç¹¥»÷̻¶Á˿ͻ§µÄÃô¸ÐÐÅÏ¢


8ÔÂ15ÈÕ£¬¼ÓÄôóµÚ¶þ´óº½¿Õ¹«Ë¾Î÷½Ýº½¿Õ¿ËÈÕ֤ʵ£¬ÆäÂÿͲ¿·ÖСÎÒ˽¼ÒÐÅÏ¢ÔÚ6Ô·ݵÄÍøÂç¹¥»÷Öб»ÇÔÈ¡£¬³ÉΪÓÖÒ»ÆðÕë¶Ôº½¿ÕÒµµÄ´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£¾ÝÅû¶£¬6ÔÂ13ÈÕ£¬Î÷½Ýº½¿Õϵͳ¼ì²âµ½¿ÉÒÉÔ˶¯£¬·¸·¨·Ö×Óͨ¹ýÔÝʱ»á¼ûȨÏÞÇÔÈ¡ÁËÂÿÍÊý¾Ý¡£Ö»¹Ü¹«Ë¾Î´¹ûÕæÏêϸÊÜÓ°ÏìÈËÊý£¬µ«Ã÷È·ÌåÏÖй¶ÐÅÏ¢¿ÉÄÜÒòÂÿͶøÒ죬º­¸ÇÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÁªÏµÐÅÏ¢¡¢ÐÔ±ð¡¢ÂÃÐÐÖ¤¼þÐÅÏ¢¼°½üÆÚÔ¤¶©¼Í¼¡£ÓÈΪֵµÃ×¢ÖØµÄÊÇ£¬»¤ÕÕµÈСÎÒ˽¼ÒÎļþ¿ÉÄܱ»ÓÃÓÚαÔìÉí·Ý»òʵÑéÆäËû·¸·¨Ô˶¯£¬Òý·¢¶ÔÉí·Ý͵ÇÔΣº¦µÄµ£ÐÄ¡£´Ë´ÎÊÂÎñÖУ¬Î÷½Ýº½¿ÕÇ¿µ÷ÐÅÓÿ¨ºÅ¡¢½è¼Ç¿¨ÏêϸÐÅÏ¢¼°Óû§ÃÜÂëδ±»Ð¹Â¶£¬Ò»¶¨Ë®Æ½ÉÏ»º½âÁËÓû§¶Ô²ÆÎñËðʧµÄÖ±½Óµ£ÐÄ¡£¹«Ë¾»ØÓ¦³Æ£¬ÒÑÒÔ¡°×î½ôÆÈºÍ×îÖØÊÓµÄ̬¶È¡±´¦Öóͷ£¸ÃÊÂÎñ£¬²¢½ÓÄÉÌØÊâÇå¾²²½·¥Ç¿»¯ÏµÍ³·À»¤£¬±ÜÃâÀàËÆÊÂÎñÖØÑÝ¡£ÎªÌDZÔÚËðʧ£¬Î÷½Ýº½¿ÕÓëÐÅÓüà²â»ú¹¹TransUnion CanadaÏàÖú£¬ÎªÊÜÓ°ÏìÂÿÍÌṩΪÆÚ24¸öÔµÄÃâ·ÑÉí·Ý͵ÇÔºÍÐÅÓÃ¼à¿Ø·þÎñ¡£Âÿͻ¹¿Éͨ¹ý¡°Éí·Ý»Ö¸´ÊðÀí¡±»ñȡרҵ֧³Ö£¬½â¾öÉí·Ý͵ÇÔÏà¹ØÎÊÌ⣬²¢ÏíÓÐ×î¸ß100ÍòÃÀÔªµÄÓöȱ¨Ïú°ü¹ÜÒÔÓ¦¶ÔڲƭÊÂÎñ¡£


https://cybernews.com/news/westjet-confirms-cyber-breach-exposed-sensitive-details-of-customers/


4. ºÚ¿ÍÔÚNetflixÍøÂç´¹ÂÚÖÐÇÔÈ¡FacebookµÇ¼ÐÅÏ¢


8ÔÂ15ÈÕ£¬ÍøÂçÇå¾²¹«Ë¾Malwarebytes×îÐÂÑо¿Õ¹ÏÖ£¬Õ©Æ­ÕßÕýͨ¹ýαÔìNetflixÕÐÆ¸ÓʼþʵÑé¾«×¼ÍøÂç´¹ÂÚ¹¥»÷£¬Ä¿µÄÖ±Ö¸Äܹ»»á¼ûÆóÒµFacebookÉÌÒµÕË»§µÄÓªÏúÖ°Ô±¡£´Ë´Î¹¥»÷ÒÔ¡°¸ßнְλ¡±ÎªÓÕ¶ü£¬ÓÕµ¼Êܺ¦Õßй¶É罻ýÌ対֤£¬×îÖÕ¿ÉÄܱ»ÓÃÓÚ¶ñÒâ¹ã¸æÍ¶·Å¡¢ÕË»§ÀÕË÷»òÈö²¥ÐéαÐÅÏ¢¡£¹¥»÷Á÷³ÌÏÔʾ£¬Õ©Æ­ÕßÊ×ÏÈ·¢ËÍ¿´ËÆ×¨ÒµµÄÕÐÆ¸Óʼþ£¬ÎÊÌâΪ¡°Netflix¸ß¹Üְλʱ»ú¡±£¬ÄÚÈݸ߶ȸöÐÔ»¯£¬ÔÞÑïÊܺ¦Õߵġ°ÓªÏúÏòµ¼Á¦¡±²¢Ô¼ÇëÉêÇë¡°ÓªÏú¸±×ܲᱡ°É罻ýÌå×ܼࡱµÈְλ¡£ÓʼþÖи½ÓÐÐéαNetflixÖ°ÒµÍøÕ¾Á´½Ó£¬ÒªÇóÊܺ¦Õß½¨ÉèСÎÒ˽¼Òµµ°¸²¢¹ØÁªFacebookÕË»§¡£µ±Óû§µã»÷¡°¼ÌÐøÊ¹ÓÃFacebook¡±»òÓÊÏäµÇ¼ʱ£¬Ò³Ãæ»áÌø×ªÖÁαÔìµÄFacebookµÇ¼½çÃæ£¬ÓÕµ¼ÊäÈëÆ¾Ö¤¡£MalwarebytesÑо¿Ô±Pieter ArntzÖ¸³ö£¬´Ë´Î¹¥»÷µÄÊÖÒÕÖØÆ¯ºó½Ï¸ß£ºÕ©Æ­Õßͨ¹ýwebsocketÒªÁìʵʱ×èµ²Óû§ÊäÈ룬ÔÚÊܺ¦ÕߺÁÎÞ²ì¾õµÄÇéÐÎϵǼÆäÕæÊµFacebookÕË»§£¬ÉõÖÁ¿ÉÄÜÈÆ¹ý¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©¡£Ò»µ©¿ØÖÆÕË»§£¬¹¥»÷Õß¿ÉÁ¬Ã¦×¢ÏúÊܺ¦Õß×°±¸¡¢ÏòÆäÖ¿ÓÑ·¢ËÍÀ¬»øÓʼþ£¬»òʹÓÃÆóÒµÖ§¸¶È¨ÏÞͶ·Å¶ñÒâ¹ã¸æ¡£


https://cybernews.com/security/netflix-phishing-campaign-facebook-login-targets-marketing-social-media-job-seekers/


5. ERMAC V3.0ÒøÐÐľÂíÔ´´úÂëй¶£¬Ì»Â¶ÍêÕû¶ñÒâÈí¼þ»ù´¡ÉèÊ©


8ÔÂ16ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶ÁËÐÂÐÍAndroidÒøÐÐľÂíERMAC 3.0µÄÏêϸÔË×÷»úÖÆ£¬Õ¹ÏÖÆä×÷Ϊ¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©²úÆ·µÄÍêÕûÊÖÒռܹ¹¼°ÔËÓªÎó²î¡£¸Ã±äÖÖÓÉDukeEugeneÍþв×éÖ¯ÔËÓª£¬±»ÆÀ¹ÀΪCerberusºÍBlackRockµÄ½ø»¯°æ±¾£¬ÆäÊÖÒÕѪͳ¿É×·ËÝÖÁHook£¨ERMAC 2.0£©¡¢PegasusµÈ×ÅÃû¶ñÒâÈí¼þ¼Ò×å¡£¾ÝHunt.ioÐû²¼µÄ±¨¸æ£¬ERMAC 3.0ʵÏÖÈý´óÊÖÒÕÍ»ÆÆ£ºÊ×ÏÈ£¬Ä¿µÄÓ¦ÓùæÄ£´ó·ùÀ©Õ¹ÖÁ700Óà¸öÒøÐС¢µçÉ̼°¼ÓÃÜÇ®±Òƽ̨£¬Í¨¹ýÔöÇ¿µÄ±íµ¥×¢È빦ЧʵÏÖ¾«×¼Êý¾ÝÇÔÈ¡£»Æä´Î£¬½ÓÄÉAES-CBC¼ÓÃÜͨѶЭÒ飬²¢Öع¹ÁË»ùÓÚPHP/LaravelµÄC2·þÎñÆ÷¡¢Reactǰ¶ËÃæ°å¡¢GolangÉøÍ¸·þÎñÆ÷¼°Kotlin±àдµÄAndroidºóÃŵÈȫջ×é¼þ£»×îºó£¬ÆäÄ£¿é»¯¹¹½¨Æ÷ÔÊÐí¿Í»§¶¨ÖƶñÒâÈí¼þ²ÎÊý£¬Ðγɰ´Ðè¶¨ÖÆµÄ¹¥»÷Á´¡£Ñо¿ÍŶÓͨ¹ýÉøÍ¸ÆÊÎö·¢Ã÷£¬¸Ã×éÖ¯ÔËÓªµÄ·þÎñÆ÷±£´æÑÏÖØÇ徲ȱÏÝ£ºÖÎÀíÃæ°å¿ª·ÅÄäÃû×¢²á£¬Ä¬ÈÏʹÓþ²Ì¬ÖÎÀíÔ±ÁîÅÆºÍÓ²±àÂëJWTÃÜÔ¿£¬ºó¶ËÊý¾Ý¿âδ×öȨÏÞ¸ôÀë¡£ÕâЩÎó²îµ¼Ö¹¥»÷ÕßµÄÍêÕûÊÖÒÕ×ʲúÍâй£¬°üÀ¨Ô´´úÂë¡¢×°±¸°ó¶¨»úÖÆ¡¢ÁýÕÖ¹¥»÷Ä£°å¼°C2ͨѶЭÒé¡£


https://thehackernews.com/2025/08/ermac-v30-banking-trojan-source-code.html


6. ΢ÈíÐéα̸ÌìGPT×ÀÃæÓ¦ÓóÌÐòÌṩPipeMagicºóÃÅ


8ÔÂ18ÈÕ£¬Î¢ÈíÇå¾²ÍŶӿËÈÕÅû¶һÆðʹÓÃαÔìChatGPT×ÀÃæÓ¦ÓÃÈö²¥ÐÂÐͺóÃÅPipeMagicµÄ¹¥»÷ÊÂÎñ£¬¸ÃÊÂÎñÓëÕë¶ÔÈ«Çò½ðÈÚ¡¢·¿µØ²úµÈÐÐÒµµÄÀÕË÷Èí¼þ¹¥»÷Ïà¹ØÁª£¬ÆäÊÖÒÕÖØ´óÐÔ¼°Òþ²ØÐÔÒý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¹¥»÷Õßͨ¹ý¸Ä¶¯GitHubÉϵĿªÔ´ChatGPT×ÀÃæÏîÄ¿£¬ÔÚÆäÖÐÖ²Èë¶ñÒâ´úÂ룬ÓÕµ¼Óû§´Ó·Ç¹Ù·½ÇþµÀÏÂÔØÄ¾Âí»¯¸±±¾¡£PipeMagicºóÃŽÓÄɸ߶ÈÄ£¿é»¯¼Ü¹¹£¬½«ÏÂÁî¿ØÖÆÍ¨Ñ¶¡¢ÓÐÓÃÔØºÉÖ´Ðеȹ¦Ð§²ð·ÖΪ×ÔÁ¦×é¼þ£¬Í¨¹ý¼ÓÃÜÃüÃû¹ÜµÀºÍÄÚ´æ²Ù×÷ʵÏÖÒþ²ØÔËÐС£Æä½¹µãÉè¼Æ°üÀ¨Èý×éÁ´±í½á¹¹£ºÒ»×éÖÎÀí´ýÖ´ÐÐÄ£¿é£¬Ò»×é´¦Öóͷ£ÍøÂçͨѶ£¬ÁíÒ»×鶯̬¼ÓÔØ¹¦Ð§×é¼þ¡£ÕâÖÖÊèɢʽ¼Ü¹¹²»µ«½µµÍÁ˼ì²âÄѶÈ£¬»¹ÔÊÐí¹¥»÷Õßͨ¹ýרÓÃÍøÂçÄ£¿é½¨ÉèWebSocketÆø¸ÅµÄÇ徲ͨµÀ£¬ÓëC2·þÎñÆ÷½»»¥ÏµÍ³ÐÅÏ¢²¢ÎüÊÕÖ¸ÁʵÏÖÄ£¿é¶¯Ì¬¸üлòÌæ»»£¬ÎÞÐèÖØÐ°²ÅÅÕû¸öºóÃÅ¡£Î¢Èí½«´Ë´Î¹¥»÷¹éÒòÓÚÒÔ¾­¼ÃÀûÒæÎªµ¼ÏòµÄStorm-2460×éÖ¯¡£¸Ã×éÖ¯ÔÚÔ˶¯ÖÐʹÓÃWindows CLFSÁãÈÕÎó²îCVE-2025-29824£¬´Ó³õʼ»á¼û¿ìËÙתÏòÀÕË÷Èí¼þ°²ÅÅ¡£Æä¹¥»÷¹æÄ£ÁýÕÖÃÀ¹ú¡¢Å·ÖÞ¡¢ÄÏÃÀ¼°Öж«µØÇø£¬Ä¿µÄ°üÀ¨½ðÈÚ¡¢·¿µØ²úµÈ¶àÐÐÒµ»ú¹¹¡£


https://hackread.com/fake-chatgpt-desktop-app-pipemagic-backdoor-microsoft/