½¿ÔÏÊ«ÔâEverestÀÕË÷Èí¼þ¹¥»÷ÖÂ60Íò¿Í»§Êý¾Ýй¶

Ðû²¼Ê±¼ä 2025-09-17

1. ½¿ÔÏÊ«ÔâEverestÀÕË÷Èí¼þ¹¥»÷ÖÂ60Íò¿Í»§Êý¾Ýй¶


9ÔÂ15ÈÕ£¬ÀÕË÷Èí¼þ¼¯ÍÅEverestÉù³Æ¶Ô·¨¹úÉݳ޻¤·ôÆ·¾ÞÍ·½¿ÔÏÊ«¼¯ÍÅÌᳫ¹¥»÷£¬²¢½«ÆäÊý¾ÝÉÏ´«ÖÁ°µÍø²©¿Í¡£¸ÃÍÅ»ïÐû³Æ»ñÈ¡Á˽¿ÔÏÊ«Áè¼Ý60ÍòÃû¿Í»§µÄÏêϸÐÅÏ¢£¬Éæ¼°ÃÀ¹ú¡¢·¨¹ú¡¢¼ÓÄôóµÈµØÇø£¬Êý¾Ý°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¼°»¤·ôÆ·/»¯×±Æ·¹ºÖÃÀúÊ·µÈÃô¸ÐÄÚÈÝ¡£½¿ÔÏÊ«×÷Ϊ×ܲ¿Î»ÓÚ°ÍÀèµÄÉÝ»ª»¤·ôÆ·ÖÆÔìÉÌ£¬ÄêÊÕÈëÔ¼20ÒÚÅ·Ôª£¬Ô±¹¤¹æÄ£Ô¼8000ÈË£¬ÔÚÎ÷Å·Êг¡Õ¼ÓÐÖ÷Ҫְλ¡£¾ÝCybernewsÍŶÓÊӲ죬EverestÔÚ°µÍøÐû²¼µÄÌû×Ó½ö°üÀ¨²¿·ÖÊý¾Ý½ØÍ¼×÷Ϊ֤¾Ý£¬Î´ÌṩÍêÕûÑù±¾£¬µ«Ñù±¾Êý¾ÝÒÉËÆÀ´×Ô½¿ÔÏÊ«²î±ðµØÇøµÄÔÚÏßÊÐËÁ¡£Ñо¿Ö°Ô±Ö¸³ö£¬´ËÀà´ó¹æÄ£Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÍøÂç´¹ÂÚ¡¢À¬»øÓʼþ¹¥»÷£¬»ò×÷ΪÉí·Ý͵ÇԵŤ¾ß¡£


https://cybernews.com/security/clarins-user-data-breach-everest/


2. Phoenix RowHammer¹¥»÷ÔÚ109ÃëÄÚÈÆ¹ý¸ß¼¶DDR5ÄÚ´æ±£»¤


9ÔÂ16ÈÕ£¬ËÕÀèÊÀÁª°îÀí¹¤Ñ§ÔºÓë¹È¸èÍŽáÑо¿·¢Ã÷£¬Õë¶ÔSK Hynix DDR5ÄÚ´æÐ¾Æ¬µÄÐÂÐÍRowHammer¹¥»÷±äÖÖ"Phoenix"£¨CVE-2025-6202£¬CVSSÆÀ·Ö7.1£©ÒÑÍ»ÆÆÏÖÓзÀ»¤»úÖÆ¡£¸Ã¹¥»÷ͨ¹ýÖØ¸´»á¼ûÌØ¶¨ÄÚ´æÐд¥·¢ÏàÁÚÐÐλ·­×ª£¬¿ÉÔÚ109ÃëÄÚʵÏÖ±ê×¼DDR5×ÀÃæÏµÍ³µÄrootȨÏÞÌáÉý£¬Ó°Ïì¹æÄ£ÁýÕÖ2021-2024ÄêÉú²úµÄ15¿îDDR5оƬ¡£Ñо¿Ö¤Êµ£¬Ö»¹ÜDDR5ÄÚÖÃÆ¬ÉÏECC¾À´íºÍTRRÄ¿µÄÐÐˢеȷÀ»¤²½·¥£¬ÈÔÎÞ·¨ÓÐÓõÖÓùPhoenix¹¥»÷¡£¹¥»÷Õß¿Éͨ¹ýλ·­×ªÆÆËðSSHÉí·ÝÑéÖ¤£¨ÈçÇÔȡͬµØÐéÄâ»úRSA-2048ÃÜÔ¿£©»òʹÓÃsudo¶þ½øÖÆÎļþÌáȨ¡£ÊµÑéÏÔʾ£¬ECCºÍTRRµÈ¹Å°å·ÀÓùÊֶζÔSMASH¡¢Half-DoubleµÈÖØ´ó¹¥»÷ͬÑùʧЧ£¬¶øPhoenix¸üÊ×´ÎÔÚÉú²ú¼¶DDR5ϵͳʵÏֶ˵½¶ËÌáȨʹÓá£Ñо¿ÍŶÓÖ¸³ö£¬DRAMÃܶÈÀ©Õ¹µ¼ÖÂ×°±¸ÌØÕ÷³ß´çËõС£¬·´¶ø½µµÍÁË´¥·¢RowHammerËùÐèµÄ¼¤»î´ÎÊý£¬Ê¹ÐÂÐÍоƬ¸üÒ×Êܹ¥»÷¡£Îó²îÃô¸ÐÐÔÉæ¼°Î¶ȡ¢µçѹ¡¢¹¤ÒÕת±ä¡¢Êý¾ÝģʽµÈ¶àά¶È±äÁ¿¡£×÷ΪӦ¶Ô£¬½¨Ò齫ÄÚ´æË¢ÐÂÂÊÌáÉýÖÁ3±¶ÒÔ×èֹλ·­×ª¡£


https://thehackernews.com/2025/09/phoenix-rowhammer-attack-bypasses.html


3. SlopAds£ºÈ«ÇòAndroid¹ã¸æÚ²Æ­Ðж¯±»½ÒÆÆ²¢´ì°Ü


9ÔÂ16ÈÕ£¬ÃûΪ"SlopAds"µÄ´ó¹æÄ£Android¹ã¸æÚ²Æ­Ðж¯±»HUMANµÄSatoriÍþвÇ鱨ÍÅ¶Ó½ÒÆÆ²¢´ì°Ü¡£¸ÃÐж¯Í¨¹ýGoogle PlayÉϵÄ224¸ö¶ñÒâÓ¦ÓÃʵÑ飬ÖðÈÕÌìÉú23ÒÚ´Î¹ã¸æÇëÇó£¬ÀÛ¼ÆÏÂÔØÁ¿³¬3800Íò´Î£¬ÁýÕÖÈ«Çò228¸ö¹ú¼Ò¼°µØÇø£¬ÆäÖÐÃÀ¹úÒÔ30%µÄ¹ã¸æÕ¹Ê¾Á¿¾ÓÊ×£¬Ó¡¶ÈºÍ°ÍÎ÷ÅÅÁжþ¡¢Èýλ¡£SlopAds½ÓÄɶà²ã¹æ±ÜÕ½ÂÔ£¬Ê¹ÓûìÏýºÍÒþдÊõÒþ²Ø¶ñÒâÐÐΪ£¬ÌÓ±ÜGoogleÉóºË¼°Çå¾²Èí¼þ¼ì²â¡£ÈôÓû§Í¨¹ý×ÔȻ;¾¶×°ÖÃÓ¦Óã¬ÆäÌåÏÖÈçͨÀýÓ¦Ó㻵«Èôͨ¹ýÍþвÕß¹ã¸æÔ˶¯×°Öã¬Ôò´¥·¢¶ñÒâÄ£¿éÏÂÔØ¡£Ó¦ÓÃʹÓÃFirebase Remote Config»ñÈ¡¼ÓÃÜÉèÖÃÎļþ£¬°üÀ¨¹ã¸æÚ²Æ­Ä£¿é¡¢ÌáÏÖ·þÎñÆ÷¼°JavaScript¸ºÔØURL£¬²¢Ñé֤װ±¸ÊÇ·ñΪÕýµ±Óû§ËùÓУ¬×èÖ¹±»Ñо¿Ö°Ô±»òÇå¾²Èí¼þÆÊÎö¡£Ò»µ©Í¨¹ý¼ì²é£¬Ó¦ÓÃÏÂÔØËÄÕź¬ÒþдÊõµÄPNGͼÏñ£¬½âÃÜÖØ×éΪ"FatModule"¶ñÒâÈí¼þ¡£¼¤»îºó£¬¸ÃÈí¼þͨ¹ýÒþ²ØµÄWebViewsÍøÂç×°±¸ÐÅÏ¢£¬µ¼º½ÖÁ¹¥»÷Õß¿ØÖƵÄڲƭÓò£¬ÖðÈÕ±¬·¢³¬20ÒÚ´Îڲƭ¹ã¸æÕ¹Ê¾¼°µã»÷£¬Îª¹¥»÷Õß´´Á¢²»·¨ÊÕÈë¡£ÏÖÔÚ£¬GoogleÒÑ´ÓPlay StoreÒÆ³ýËùÓÐSlopAdsÓ¦Ó㬲¢¸üÐÂPlay Protect¹¦Ð§£¬ÖÒÑÔÓû§Ð¶ÔØÉè±¹ØÁ¬Ä¶ñÒâÓ¦Óá£


https://www.bleepingcomputer.com/news/security/google-nukes-224-android-malware-apps-behind-massive-ad-fraud-campaign/


4. npm¹©Ó¦Á´Ôâ´ó¹æÄ£ÈëÇÖ£¬187¸ö°ü±»Ä¾Âí»¯


9ÔÂ16ÈÕ£¬¿ËÈÕ£¬Ò»³¡ÃûΪ"Shai-Hulud"µÄЭͬÈä³æÊ½¹©Ó¦Á´¹¥»÷ÔÚnpmƽ̨±¬·¢£¬ÖÁÉÙ187¸öÈí¼þ°üÔâÈëÇÖ²¢Ö²Èë×ÔÈö²¥¶ñÒâ¸ºÔØ¡£¸Ã¹¥»÷ʼÓÚ@ctrl/tinycolor°ü£¨ÖÜÏÂÔØÁ¿³¬200Íò´Î£©£¬ËæºóѸËÙÀ©Õ¹ÖÁCrowdStrikeµÈ×ÅÃûÆóÒµµÄnpmÃüÃû¿Õ¼ä£¬Ðγɿçά»¤ÕßµÄ×Ô¶¯Ä¾Âí»¯Èö²¥Á´¡£¹¥»÷»úÖÆÏÔʾ£¬¶ñÒâÈí¼þͨ¹ýÐÞ¸Äpackage.jsonÎļþ×¢Èëbundle.js¾ç±¾£¬Ê¹ÓÃTruffleHog¹¤¾ßɨÃèÖ÷»úÁîÅÆºÍÔÆÆ¾Ö¤£¬ÑéÖ¤ºó½¨ÉèGitHub ActionsÊÂÇéÁ÷£¬½«Ãô¸ÐÊý¾Ýй¶ÖÁÓ²±àÂëwebhook¶Ëµã¡£ÕâÖÖ"×ÔÎÒ×ÌÉú"ÌØÕ÷ʹ¹¥»÷ÄÜ×Ô¶¯Ñ¬È¾Í³Ò»Î¬»¤ÕߵįäËûÈí¼þ°ü£¬Ðγɼ¶ÁªÐ§Ó¦¡£ÊÜÓ°ÏìÆóÒµ·½Ã棬CrowdStrikeѸËÙɾ³ý¶ñÒâ°ü²¢ÂÖ»»ÃÜÔ¿£¬Ç¿µ÷Æä½¹µãƽ̨δÊÜÓ°Ï죻¹È¸èGemini CLIËäÔ´´úÂëÇå¾²£¬µ«Óû§Ðè¼ì²é×°ÖÃÇéÐΡ£ÊÂÎñ̻¶·ºÆð´úÈí¼þ¹©Ó¦Á´µÄųÈõÐÔ£¬µ¥¸öά»¤ÕßÕË»§Ð¹Â¶¼´¿É²¨¼°Êý°ÙÏîÄ¿¡£


https://www.bleepingcomputer.com/news/security/self-propagating-supply-chain-attack-hits-187-npm-packages/


5. ÐÂÐÍFileFix¹¥»÷ʹÓÃÒþдÊõÖ²ÈëStealC¶ñÒâÈí¼þ


9ÔÂ16ÈÕ£¬¿ËÈÕ£¬Acronis·¢Ã÷Ò»ÖÖÃûΪFileFixµÄÐÂÐÍÉç»á¹¤³Ì¹¥»÷£¬¸Ã¹¥»÷ð³äMetaÕË»§ÔÝÍ£ÖÒÑÔ£¬Í¨¹ýÈ«ÐÄÉè¼ÆµÄÍøÂç´¹ÂÚÒ³ÃæÓÕÆ­Óû§½«¶ñÒâPowerShellÏÂÁîÕ³ÌùÖÁÎļþ×ÊÔ´ÖÎÀíÆ÷µØµãÀ¸£¬´Ó¶øÔÚ²»ÖªÇéµÄÇéÐÎÏÂ×°ÖÃStealCÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¹¥»÷Á÷³ÌÏÔʾ£¬´¹ÂÚÒ³Ãæ»áÌáÐÑÓû§µã»÷¡°¸´ÖÆ¡±°´Å¥»ñÈ¡¿´ËÆÎļþ·¾¶µÄ¡°ÊÂÎñ±¨¸æ¡±£¬ÏÖʵ¸´ÖƵÄÊÇÌí¼ÓÁ˿ոñµÄ¶ñÒâPowerShellÏÂÁî¡£µ±Óû§½«´ËÏÂÁîÕ³ÌùÖÁÎļþ×ÊÔ´ÖÎÀíÆ÷µØµãÀ¸Ê±£¬½öÏÔʾÎļþ·¾¶£¬Òþ²ØµÄ¶ñÒâÏÂÁîÔò±»Ö´ÐС£¸ÃÏÂÁî»á´ÓBitbucketÏÂÔØÒþ²ØÔÚJPGͼÏñÖеĵڶþ½×¶Î¾ç±¾£¬Í¨¹ýÒþдÊõÌáÈ¡²¢½âÃÜÄÚ´æÖеÄÓÐÓÃÔØºÉ£¬×îÖÕ°²ÅÅStealC¶ñÒâÈí¼þ¡£StealC¿ÉÇÔÈ¡Óû§×°±¸ÖеÄÃô¸ÐÊý¾Ý£¬°üÀ¨Chrome¡¢FirefoxµÈä¯ÀÀÆ÷µÄƾ֤ºÍÉí·ÝÑéÖ¤cookie£¬Discord¡¢TelegramµÈͨѶӦÓÃµÄÆ¾Ö¤£¬±ÈÌØ±Ò¡¢ÒÔÌ«·»µÈ¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢£¬AWS¡¢AzureµÈÔÆÆ¾Ö¤£¬ÒÔ¼°ProtonVPN¡¢Battle.netµÈVPNºÍÓÎÏ·Ó¦ÓÃÊý¾Ý£¬Í¬Ê±¾ß±¸½ØÈ¡Ô˶¯×ÀÃæÆÁÄ»½ØÍ¼µÄÄÜÁ¦¡£


https://www.bleepingcomputer.com/news/security/new-filefix-attack-uses-steganography-to-drop-stealc-malware/


6. °¢À­Ë¹¼ÓANHCÊý¾Ýй¶£¬Ó°Ïì6ÍòÃû»¼Õß


9ÔÂ16ÈÕ£¬°¢À­Ë¹¼ÓÖݰ²¿ËÀׯæÉçÇø¿µ½¡ÖÐÐÄ£¨ANHC£©¿ËÈÕÔâÓö´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬ºÚ¿Í×éÖ¯Éù³ÆÒÑй¶6Íò·Ý»¼Õ߼ͼ¡£ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©°²¿ËÀׯæ·þÎñ´¦ÒÑ×¢ÖØµ½¸ÃÖ¸¿Ø£¬²¢ÌåÏÖ½«ÑÏËà¿´´ý´ËÀàÊÂÎñ£¬µ«Æ¾Ö¤Õþ²ßÎÞ·¨Í¸Â¶ÊÓ²ìϸ½Ú¡£ANHC¹ÙÍøÖ¤ÊµÍøÂç±£´æÇå¾²ÊÂÎñ£¬ÒÑÆô¶¯È¡Ö¤ÊӲ첢ÏÂÏßÊÜÓ°Ïìϵͳ£¬Í¬Ê±ÓëµÚÈý·½ÍøÂçÇ徲ר¼ÒÏàÖú£¬²¢Í¨ÖªÖ´·¨²¿·Ö¡£ÊÂÎñÓ°Ïì·½Ãæ£¬»¼ÕßÒÁÀöɯ°×͸¶ÆäСÎÒ˽¼ÒÐÅÏ¢£¨°üÀ¨Éç±£ºÅ¡¢µØµã¡¢µç»°µÈ£©±»ºÚ¿Íͨ¹ýµç×ÓÓʼþÖ±½Óй¶¡£ANHC»ØÓ¦³ÆÒÑÏòÊÜÓ°Ï컼ÕßÌṩÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£»¤·þÎñ£¬²¢ÔÊÐíÒ»Äêºó¼ÌÐøÌṩÉí·Ý͵ÇÔ±£»¤£¬µ«²¿·Ö»¼Õß·´Ó¦»ñÈ¡·þÎñÐè×Ô¶¯ÕùÈ¡¡£°¢À­Ë¹¼ÓÐÂÎÅÔ´¡¢Öݹ«¹²Çå¾²²¿µÈ¶à·½ÒÑÊÕµ½ºÚ¿ÍÓʼþ¸±±¾£¬ANHC»¹Òâʶµ½Î´¾­ÊÚȨ·½ÁªÏµÁËÉçÇø²¿·ÖСÎÒ˽¼Ò¡£


https://www.alaskasnewssource.com/2025/09/16/fbi-aware-anchorage-health-clinic-data-breach-hackers-claim-60k-patients-impacted/