±¦Âí¼¯ÍÅÔâEverestÀÕË÷Èí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2025-09-191. ±¦Âí¼¯ÍÅÔâEverestÀÕË÷Èí¼þ¹¥»÷
9ÔÂ17ÈÕ£¬µÂ¹ú±¦Âí¼¯ÍÅÔâÓöEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬³ÉΪ8ÔÂ31ÈսݱªÂ·»¢ºó²»µ½Ò»¸öÔÂÄÚµÚ¶þ¸ö±»ºÚµÄºÀ»ªÆû³µÆ·ÅÆ¡£¸Ã×éÖ¯ÔÚ°µÍøÑó´ÐÕ¾µãÐû²¼Í¨¸æ£¬Éù³ÆÇÔÈ¡Á˱¦Âí¡°Òªº¦Éó¼ÆÎļþ¡±£¬²¢ÉèÖÃÁ½¸öµ¹¼ÆÊ±ÖÓ£¬Ò»¸öÏÔʾ9ÔÂ14ÈÕ¡°Â¼Òô¡±½«²»¿ÉÓã¨Ê£Óàȱ·¦24Сʱ£©£¬ÁíÒ»¸öÒªÇó¹«Ë¾48СʱÄÚÁªÏµÌ¸ÅС£±¦Âí×ܲ¿Î»ÓÚĽÄáºÚ£¬ÓµÓÐ160,000ÃûÔ±¹¤£¬ÔÚ15¹úÉè30ÓàÉú²ú»ùµØ£¬2024ÄêÈ«Çò²úÁ¿³¬240ÍòÁ¾£¨ÖйúÕ¼30%£©£¬ÄêÊÕÈ볬1.42ÒÚÅ·Ôª¡£´Ë´Î¹¥»÷Éæ¼°ÆìÏÂMini¡¢ÀÍ˹À³Ë¹¼°MotorradĦÍгµ²¿·Ö¡£Everestδ͸¶ÊÇ·ñÇÔÈ¡¿Í»§Êý¾Ý¡£Everest×Ô2021Äê»îÔ¾£¬2023ÄêÒÔÀ´°µÍø²©¿ÍÁÐ248ÃûÊܺ¦Õߣ¬½ü12¸öÔ¹¥»÷³¬90Ãû×éÖ¯¡£±¦Âí¼¯ÍÅÉÐδ»ØÓ¦£¬ÊÂÎñÊÓ²ìÈÔÔÚ¾ÙÐС£
https://cybernews.com/news/bmw-ransomware-attack-everest-claim-everest-luxury-target-jlr-trend/
2. ·ðÂÞÀï´ï²¼ÀïÍßµÂÒ½ÁÆÐ»áÔâ´ó¹æÄ£Êý¾Ýй¶
9ÔÂ18ÈÕ£¬×ܲ¿Î»ÓÚ·ðÂÞÀï´ïÖÝÄ«¶û±¾µÄ²¼ÀïÍßµÂÒ½ÁÆÐ»á1ÔÂÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬Ó°Ïì¹æÄ£²¨¼°½ü25ÍòÈË¡£¸Ã»ú¹¹×÷ΪÍâµØÖ÷ÒªÒ½ÁƱ£½¡·þÎñÌṩÕߣ¬ÓÚ1ÔÂÖÐÑ®·¢Ã÷ϵͳÔâÈëÇÖ£¬¾ÊÓ²ìÈ·ÈϹ¥»÷Õß¿ÉÄÜÇÔÈ¡ÁËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¼°Êܱ£»¤µÄ¿µ½¡Êý¾Ý¡£Ö»¹Ü9ÔÂ5ÈÕÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌύ֪ͨʱδÅû¶ÏêϸÈËÊý£¬µ«ÃÀ¹úÎÀÉúÓ빫ÖÚ·þÎñ²¿Ò½ÁÆÊý¾Ýй¶׷×ÙϵͳÏÔʾ£¬ÏÖʵÊÜÓ°ÏìÈËÊý¸ß´ï246,711ÈË£¬º¸Ç»¼Õß¡¢Ô±¹¤¼°ÏàÖúͬ°éÏà¹ØÃô¸ÐÐÅÏ¢¡£BianLianÀÕË÷Èí¼þ×éÖ¯ÒÑÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬²¢Éù³ÆÇÔÈ¡ÄÚÈݲ»µ«°üÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢Ó뿵½¡¼Í¼£¬»¹Éæ¼°»á¼Æ¡¢ÈËÁ¦×ÊÔ´Êý¾Ý¿â¼°ÏàÖú·½ÍùÀ´ÓʼþµÈÎļþ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¸Ã×éÖ¯×Ô3ÔÂβÆðÒÑÎÞ¹ûÕæÔ˶¯¼Í¼£¬ÏÖÔÚ±»µÁÊý¾ÝÈ¥ÏòÈÔ²»Ã÷È·¡£ÏÖÔÚ£¬ÊÂÎñÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬Ïà¹Ø»ú¹¹ÕýÊÔͼ׷ËÝÊý¾ÝÁ÷Ïò²¢ÆÀ¹ÀDZÔÚΣº¦¡£
https://www.securityweek.com/nearly-250000-impacted-by-data-breach-at-medical-associates-of-brevard/
3. ¶íÂÞ˹KrasAviaº½¿Õ¹«Ë¾ÒÉÔâÍøÂç¹¥»÷ÖÂÊý×Ö·þÎñÖÐÖ¹
9ÔÂ18ÈÕ£¬¶íÂÞ˹µØÇøº½¿Õ¹«Ë¾KrasAviaÐû²¼ÉùÃ÷³Æ£¬Æä²¿·ÖÊý×Ö·þÎñÒòϵͳ¹ÊÕÏÖÐÖ¹£¬³ÉΪÒÉËÆÍøÂç¹¥»÷À˳±Öиùúº½¿ÕÒµÔâÓöµÄ×îÐÂÊÂÎñ¡£Õâ¼Ò×ܲ¿Î»ÓÚ¿ËÀ˹ŵÑǶû˹¿ËµÄº½Ë¾ÌåÏÖ£¬×¨¼ÒÕýÈ«Á¦½µµÍº½°àʱ¿Ì±íΣº¦²¢¾¡¿ì»Ö¸´ÔËÓª¡£×èÖ¹ÍâµØÊ±¼äÖÜËÄÍí¼ä£¬ÆäÍøÕ¾ÒṈ̃»¾£¬ÔÚÏßÊÛÆ±ÔÝÍ££¬ÂÿÍÎÞ·¨¾ÙÐÐÊý×ÖÖµ»ú£¬µ«º½°àÈÔ°´ÍýÏëÔËÐС£¸Ã¹«Ë¾Ö÷ÒªÖ´·ÉÖÐÎ÷²®ÀûÑǼ°Ãɹź½Ïß¡£Ö»¹ÜKrasAviaδÃ÷È·ÈÏ¿ÉÍøÂç¹¥»÷£¬µ«ÏòÍâµØÃ½Ìå͸¶´Ë´Î¹ÊÕÏÓë¶íÂÞ˹Æì½¢º½Ë¾Aeroflot 7ÔÂβÔâÓöµÄ¹ÊÕÏÀàËÆ¡£Aeroflot´ËǰÒòÒÉËÆÍøÂç¹¥»÷µ¼ÖÂÑÏÖØÑÓÎóºÍ×÷·Ï£¬Ç×ÎÚ¿ËÀ¼ºÚ¿Í×éÖ¯¡°Ä¬È»ÎÚÑ»¡±£¨Silent Crow£©¼°°×¶íÂÞË¹ÍøÂçÓλ÷¶Ó£¨Belarusian Cyber Partisans£©Ðû³Æ¶Ô´ËÈÏÕæ£¬²¢Éù³ÆÇÔÈ¡Á˺½Ðмͼ¡¢ÄÚ²¿Í¨»°ÒôƵ¼°¼à¿Ø×ÊÁÏ¡£ÖÜËÄ£¬ÇøÓòÐÔTelegramƵµÀBorusÐû²¼½ØÍ¼£¬ÏÔʾKrasAviaÍøÒ³±»¸Ä¶¯£¬¶íº½¼°KrasAvia±êʶ±»»®µô£¬¸½ÎÄ¡°ÎÒÃÇ»¹Ã»×îÏÈ¡¡¡±£¬²¢·ºÆð¡°Ä¬È»ÎÚÑ»¡±Í·Ïñͼ±ê¡£
https://therecord.media/russia-krasavia-airline-disrupted-suspected-cyberattack
4. SystemBCÊðÀí½©Ê¬ÍøÂ磺ºã¾Ã»îÔ¾µÄ¶ñÒâÁ÷Á¿ÒýÇæ
9ÔÂ18ÈÕ£¬SystemBCÊðÀí½©Ê¬ÍøÂç×Ô2019ÄêÆðÒ»Á¬»îÔ¾£¬³ÉΪ¶à¸öÀÕË÷Èí¼þÍŻP·¸·¨×é֯ת´ï¶ñÒâÔØºÉµÄ½¹µãͨµÀ¡£¸ÃÍøÂçÈÕ¾ùά»¤Ô¼1500¸ö»úеÈ˽ڵ㣬Ö÷ҪʹÓÃÈ«Çò¹æÄ£ÄÚ±£´æÎ´ÐÞ²¹ÑÏÖØÎó²îµÄÉÌÒµÐéÄâרÓ÷þÎñÆ÷£¨VPS£©¹¹½¨£¬ÆäÖнü80%µÄ½ÚµãÀ´×Ô×ðÐÍÉÌÒµ¹©Ó¦É̵ÄÊÜѬȾVPSϵͳ¡£ÕâЩ·þÎñÆ÷ƽ¾ù±£´æ20¸öδÐÞ¸´µÄÇå¾²ÎÊÌ⣬ÇÒÖÁÉÙ°üÀ¨Ò»¸ö¸ßΣÎó²î£¬²¿·Ö°¸ÀýÉõÖÁ̻¶161¸öÎó²î£¬µ¼ÖÂѬȾÊÙÃüÏÔÖøÑÓÉ죬½ü40%µÄϵͳѬȾʱ¼äÁè¼ÝÒ»¸öÔ¡£SystemBCµÄ½¹µã¹¦Ð§ÊÇÔÊÐí¹¥»÷Õßͨ¹ýÊÜѬȾÖ÷»ú·ÓɶñÒâÁ÷Á¿£¬²¢Òþ²ØÏÂÁîÓë¿ØÖÆ£¨C2£©Ô˶¯ÒÔ¹æ±Ü¼ì²â¡£Æä80Óà¸öC2·þÎñÆ÷²»µ«Ö±½ÓÅþÁ¬ÊðÀí½Úµã£¬»¹ÎªREM Proxy¡¢Ô½ÄÏVN5SocksÊðÀíÍøÂç¼°¶íÂÞË¹ÍøÂçץȡ¹«Ë¾µÈ¿Í»§Ìṩ·Ö²ã·þÎñ¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬¸ÃÍøÂçÓë¶íÂÞ˹±£´æÊÖÒÕ¹ØÁª£ºÐÂѬȾ·þÎñÆ÷»áÏÂÔØ´øÓжíÓï×¢Ê͵Äshell¾ç±¾£¬Ç¿ÖƲ¢ÐÐÔËÐÐËùÓÐSystemBCÑù±¾£»½¹µã½ÚµãÍйÜËùÓÐ180¸ö¶ñÒâÈí¼þÑù±¾¡£
https://www.bleepingcomputer.com/news/security/systembc-malware-turns-infected-vps-systems-into-proxy-highway/
5. PyPIʹGhostAction¹©Ó¦Á´¹¥»÷Öб»µÁµÄÁîÅÆÊ§Ð§
9ÔÂ18ÈÕ£¬PythonÈí¼þ»ù½ð»áÐû²¼ÒÑʹ9Ô³õGhostAction¹©Ó¦Á´¹¥»÷ÖÐÇÔÈ¡µÄËùÓÐPyPIÁîÅÆÊ§Ð§£¬²¢È·ÈÏÍþвÐÐΪÕßδÀÄÓÃÕâЩÁîÅÆÔÚPython°üË÷Òý£¨PyPI£©Ðû²¼¶ñÒâÈí¼þ¡£´Ë´ÎÊÂÎñÔ´ÓÚ9ÔÂ5ÈÕGitGuardianÔ±¹¤±¨¸æµÄ¶ñÒâGitHub ActionsÊÂÇéÁ÷£¨ÈçFastUUID£©ÊÔͼÇÔÈ¡PyPIÁîÅÆÖÁÔ¶³Ì·þÎñÆ÷£¬ÁíÒ»Ñо¿Ö°Ô±Í¬ÈÕ·¢Ë͵ÄÏêÇéÓʼþÒòÎóÈëÀ¬»øÓʼþÎļþ¼Ð£¬µ¼ÖÂPyPIÇå¾²ÍŶÓÖ±ÖÁ9ÔÂ10Èղůô¶¯ÏìÓ¦¡£ÊÓ²ìÏÔʾ£¬¹¥»÷Õßͨ¹ýÐ޸Ĵ洢¿âÊÂÇéÁ÷£¬½«´æ´¢ÎªGitHubÉñÃØµÄPyPIÁîÅÆ·¢ËÍÖÁÍⲿ·þÎñÆ÷¡£Ö»¹ÜÀÖ³ÉÇÔÈ¡²¿·ÖÁîÅÆ£¬µ«Î´ÔÚPyPIƽ̨ʹÓá£GitGuardianÔÚ³¬570¸öÊÜÓ°Ïì´æ´¢¿âÖÐÌá½»GitHubÎÊÌ⣬²¢×ª´ïGitHub¡¢npm¼°PyPIÇå¾²ÍŶӡ£PyPIÍŶÓËæºóʹËùÓÐÊÜÓ°ÏìÁîÅÆÊ§Ð§£¬ÐÖúÏîÄ¿ËùÓÐÕßÔöÇ¿ÕË»§Çå¾²¡£ÖµµÃ×¢ÖØµÄÊÇ£¬GhostAction¹¥»÷²¨¼°¹æÄ£Ô¶³¬PyPI£ºGitGuardianÔ¤¼Æ³¬3.3Íò¸öÉñÃØ±»µÁ£¬Éæ¼°PyPI¡¢npm¡¢DockerHub¡¢GitHub¡¢Cloudflare APIÁîÅÆ¼°AWS»á¼ûÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈ£¬Ó°Ïì°üÀ¨Rust¡¢JavaScript¡¢GoÔÚÄڵĶàÓïÑÔ´úÂë¿â£¬²¿·ÖÆóÒµÕû¸öSDK²úÆ·×éºÏÔâÈëÇÖ¡£
https://www.bleepingcomputer.com/news/security/pypi-invalidates-tokens-stolen-in-ghostaction-supply-chain-attack/
6. º«¹úÀÖÌ쿨ÔâºÚ¿Í¹¥»÷£¬300ÍòÓû§Êý¾Ýй¶
9ÔÂ18ÈÕ£¬º«¹úµÚÎå´óÐÅÓÿ¨¿¯ÐÐÉÌÀÖÌ쿨ÓÚ9ÔÂÅûÂ¶ÖØ´óÊý¾Ýй¶ÊÂÎñ£¬Éæ¼°297ÍòÓû§£¬³ÉΪ½ñÄêÈ«Çò×î´óÊý¾Ýй¶ÊÂÎñÖ®Ò»¡£½ðÈÚ¼àÊÓÔºÊÓ²ìÏÔʾ£¬7ÔÂ22ÈÕÖÁ8ÔÂ27ÈÕʱ´ú£¬¸Ã¹«Ë¾ÔÚÏßÖ§¸¶·þÎñÆ÷ÔâºÚ¿Í¹¥»÷£¬Áè¼Ý200GBÊý¾Ý±»ÇÔÈ¡¡£Ð¹Â¶ÐÅÏ¢°üÀ¨ÅþÁ¬¼Í¼¡¢ÐéÄâÖ§¸¶´úÂë¡¢ÄÚ²¿Ê¶ÓÖÃû¼°ÉúÒâÀàÐ͵ȣ¬ÆäÖÐÔ¼28ÍòÓû§Òò¿¨ºÅ¡¢ÓÐÓÃÆÚºÍÇå¾²ÂëÔÚµçêaê_¾°Ì»Â¶£¬ÃæÁÙÖ±½Ó²»·¨Ê¹ÓÃΣº¦¡£ÀÖÌ쿨ÒÑΪ¸ßΣº¦Óû§Æô¶¯»»¿¨³ÌÐò£¬×èÖ¹ÖÜÈýÒÑÓÐ5.5ÍòÓû§Íê³É»»¿¨£¬ÆäÓà269ÍòÓû§Êý¾Ý±»ÆÀ¹ÀΪµÍÃô¸Ð¶È£¬ÔÝÎÞÐèÖØÐ·¢¿¨¡£ÏÖÔÚδ¼ì²âµ½Î´¾ÊÚȨÉúÒâ¡£ÊÂÎñȪԴֱָÇå¾²ÖÎÀíÎó²î£º¹¥»÷ÕßÓÚ8ÔÂ12ÈÕɨÃè·þÎñÆ÷Îó²î£¬Ô½ÈÕÖ²Èë¶ñÒâ´úÂ룬14-15ÈÕÇÔÈ¡1.7GBÊý¾Ý£¬ºóÐøÍ¨¹ýÊðÀíWeb ShellÒ»Á¬ÌáÈ¡ÉúÒâÈÕÖ¾£¬×îÖÕ2700¸öй¶ÎļþÖнö56%¼ÓÃÜ¡£ÀÖÌ쿨ֱÖÁ8ÔÂ26ÈÕÀýÐмì²é²Å·¢Ã÷ÈëÇÖ£¬ÏµÍ³Ì»Â¶½üÁ½ÖÜ¡£¸üÁîÈËÕ𾪵ÄÊÇ£¬¸ÃÎó²î×îÔçÓÚ2017Äê±»·¢Ã÷£¬µ«ÍâÑóÖ§¸¶·þÎñÆ÷Òò»á¼ûÁ¿µÍ±»ÒÅ©ÐÞ²¹£¬ÐγÉÒªº¦Ç徲ȱ¿Ú¡£
https://www.koreaherald.com/article/10578647


¾©¹«Íø°²±¸11010802024551ºÅ