ShadowLeak¹¥»÷£ºChatGPT·þÎñÆ÷¶ËÊý¾ÝÇÔÈ¡µÄÐÂÍþв

Ðû²¼Ê±¼ä 2025-09-22

1. ShadowLeak¹¥»÷£ºChatGPT·þÎñÆ÷¶ËÊý¾ÝÇÔÈ¡µÄÐÂÍþв


9ÔÂ18ÈÕ£¬RadwareÑо¿Ö°Ô±·¢Ã÷ÃûΪShadowLeakµÄÐÂÐ͹¥»÷£¬Ê¹ÓÃChatGPTµÄDeep ResearchÊðÀíʵÏÖÁãµã»÷·þÎñÆ÷¶ËÊý¾ÝÇÔÈ¡¡£¸Ã¹¥»÷ͨ¹ýÈ«ÐÄÉè¼ÆµÄµç×ÓÓʼþÖÐÒþ²ØHTMLÖ¸ÁÔÚÓû§ÎÞ²Ù×÷»ò¿É¼û½çÃæÌáÐѵÄÇéÐÎÏ£¬´¥·¢ÊðÀí´ÓGmailÊÕ¼þÏäÌáȡСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©²¢¾²Ä¬·¢ËÍÖÁ¹¥»÷Õß¿ØÖƵķþÎñÆ÷¡£Çø±ðÓÚÒÀÀµ¿Í»§¶ËͼÏñäÖȾµÄ¿Í»§¶Ë¹¥»÷£¬ShadowLeakÖ±½Ó´ÓOpenAIÔÆ»ù´¡Éèʩй¶Êý¾Ý£¬Ê¹ÆóÒµ·ÀÓùϵͳÄÑÒÔ¼ì²â£¬Óû§ÒàÎÞ¸ÐÖª¡£Deep ResearchÔÊÐíChatGPT×ÔÖ÷ä¯ÀÀÍøÒ³5-30·ÖÖÓÌìÉúÏêϸ±¨¸æ£¬²¢ÓëGmailµÈÓ¦Óü¯³É¡£¹¥»÷Á÷³ÌÖУ¬¹¥»÷Õß·¢ËͰüÀ¨Éç»á¹¤³ÌÕ½ÂÔµÄÓʼþ£¬ÊðÀí¶ÁÈ¡¶ñÒâÄÚÈݺóÖ´ÐÐÒþ²ØÖ¸Á½«PII×¢Èë¹¥»÷ÕßURL£¬ÊµÏÖ¾²Ä¬Êý¾ÝÉøÍ¸¡£¸Ã¹¥»÷²»µ«ÏÞÓÚGmail£¬ÈκÎDeep ResearchÅþÁ¬Æ÷¾ù¿É³ÉÎªÔØÌ壬¹¥»÷Õß¿ÉÇÔÈ¡ÌõÔ¼¡¢¾Û»á¼Í¼µÈÃô¸ÐÊý¾Ý¡£·þÎñ¶Ë¹¥»÷Σº¦¸ü¸ß£¬ÒòÊý¾Ýй¶Դ×ÔÌṩÉÌ»ù´¡ÉèÊ©£¬ÆóÒµÎÞ·¨Í¨¹ý¿Í»§¶Ë·À»¤×èµ²£¬ÇÒÊðÀí×÷Ϊ¿ÉÐÅÖнé¿ÉÈÆ¹ýURLÏÞÖÆ£¬½«Êý¾Ýµ¼³öÖÁí§ÒâÄ¿µÄµØ¡£


https://securityaffairs.com/182334/hacking/shadowleak-radware-uncovers-zero-click-attack-on-chatgpt.html


2. ¶íºÚ¿Í×éÖ¯GamaredonÓëTurlaÁªÊÖ¹¥»÷ÎÚ¿ËÀ¼


9ÔÂ19ÈÕ£¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESETÅû¶£¬¶íÂÞ˹ºÚ¿Í×éÖ¯GamaredonÓëTurla×Ô2025ÄêÆðÔÚÎÚ¿ËÀ¼·¢¶¯ÍŽṥ»÷£¬Í¨¹ý¹¤¾ßÁ´Ð­Í¬°²ÅźóÃųÌÐò¡£ESETÊӲ쵽£¬2025Äê2Ô£¬GamaredonµÄPteroGraphin¹¤¾ßÔÚÎÚ¿ËÀ¼¶ËµãÖØÆôTurlaµÄKazuar v3ºóÃÅ£¬ÓÃÓÚ»Ö¸´±ÀÀ£»òδ×Ô¶¯Æô¶¯µÄ¶ñÒâ³ÌÐò£»4ÔºÍ6Ô£¬PteroOddºÍPteroPaste¹¤¾ß½øÒ»²½°²ÅÅKazuar v2£¬Ðγɡ°³õʼ»á¼û-ÔØºÉͶµÝ-ºóÃÅÖ²È롱µÄÍêÕû¹¥»÷Á´¡£Á½¸ö×éÖ¯¾ùÓë¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©¹ØÁª£ºGamaredon£¨ÓÖÃûAqua Blizzard£©×Ô2013ÄêÆðÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼Õþ¸®»ú¹¹£»Turla£¨ÓÖÃûVenomous Bear£©×Ô2004Äê»îÔ¾£¬ÉÆÓÚÌØ¹¤Ô˶¯¡£´Ë´ÎÏàÖúÖУ¬GamaredonÌṩ³õʼ»á¼ûȨÏÞ£¬TurlaÔòͨ¹ýKazuarºóÃÅÍøÂçϵͳÐÅÏ¢£¬²¢Í¨¹ýCloudflare Workers×ÓÓò»òαװ³ÉESETÕýµ±ÎļþµÄÓòÃû´«ÊäÊý¾Ý¡£¹¥»÷Á´ÏÔʾ£¬GamaredonʹÓÃPteroGraphinºÍPteroOddÏÂÔØÆ÷£¬´ÓTelegraph API»ñÈ¡ÓÐÓÃÔØºÉÖ´ÐÐKazuar¡£2025Äê1ÔÂÖÁ6Ô£¬ÎÚ¿ËÀ¼¹²7̨»úе¼ì²âµ½TurlaÏà¹ØÖ¸±ê£¬ÆäÖÐ4̨ÓÚ1Ô±»Gamaredon¹¥ÆÆ£¬2ÔÂβ°²ÅÅKazuar v3¡£


https://thehackernews.com/2025/09/russian-hackers-gamaredon-and-turla.html


3. ¶íÂÞ˹ÀÕË÷Èí¼þÍŶÓʹÓÃCountLoaderÀ©´ó¹¥»÷¹æÄ£


9ÔÂ18ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿î´úºÅΪ¡°CountLoader¡±µÄÐÂÐͶñÒâÈí¼þ¼ÓÔØÆ÷£¬Òѱ»¶íÂÞ˹ÀÕË÷Èí¼þÍŻÈçLockBit¡¢Black Basta¡¢Qilin£©ÓÃÓÚͶ·ÅºóÐøÉøÍ¸¹¤¾ß£¨Cobalt Strike¡¢AdaptixC2£©¼°¡°PureHVNC RAT¡±Ô¶³Ì»á¼ûľÂí¡£¸Ã¼ÓÔØÆ÷±£´æ.NET¡¢PowerShellºÍJavaScriptÈý¸ö°æ±¾£¬Í¨¹ýαÔìÎÚ¿ËÀ¼¹ú¼Ò¾¯Ô±¾ÖÉí·ÝµÄ´¹ÂÚPDFÎļþ¹¥»÷ÎÚ¿ËÀ¼Ð¡ÎÒ˽¼ÒÓû§£¬ÆäPowerShell°æ±¾ÔøÍ¨¹ýÓëDeepSeekÏà¹ØµÄÓÕ¶üÎļþÈö²¥£¬×îÖÕ°²ÅÅ¡°BrowserVenom¡±Ö²Èë³ÌÐòÒÔ²Ù¿ØÍøÂçÁ÷Á¿²¢ÍøÂçÊý¾Ý¡£CountLoader¹¦Ð§Ç¿Ê¢£ºJavaScript°æ±¾Ö§³ÖÁùÖÖÎļþÏÂÔØ·½·¨ºÍÈýÖÖ¶ñÒâÈí¼þÔËÐÐÒªÁ죬¿ÉÍøÂçϵͳÐÅÏ¢²¢½¨Éèαװ³É¹È¸èChrome¸üÐÂʹÃüµÄÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯£»ÆäʹÓá°ÒôÀÖÎļþ¼Ð¡±×÷Ϊ¶ñÒâÈí¼þÔÝ´æÇø£¬.NETÓëJavaScript°æ±¾Ëä¹¦Ð§ÖØµþ£¬µ«½öÖ§³ÖÁ½ÖÖÏÂÁîÀàÐÍ£¬Êô¾«¼ò°æ¡£¸Ã¼ÓÔØÆ÷ÒÀÍÐ20Óà¸öÓòÃûµÄ»ù´¡ÉèÊ©ÔËÐУ¬½¹µã×÷Ϊ´«ÊäͨµÀͶ·ÅºóÐø¶ñÒâÈí¼þ¡£


https://thehackernews.com/2025/09/countloader-broadens-russian-ransomware.html


4. ¿ÂÁÖ˹ÓÔâÍøÂç¹¥»÷ÖÂÅ·ÖÞ¶à»ú³¡ÏµÍ³Ì±»¾


9ÔÂ20ÈÕ£¬ÃÀ¹úº½¿ÕÊÖÒÕ¾ÞÍ·¿ÂÁÖ˹Ó£¨Á¥ÊôRTX¼¯ÍÅ£¬Ç°ÉíΪÀ×ÉñÊÖÒÕ¹«Ë¾£©ÔâÓöÍøÂç¹¥»÷£¬µ¼ÖÂÆäMuseÈí¼þϵͳ¹ÊÕÏ£¬Òý·¢Å·ÖÞÈý´óÊàŦ»ú³¡¡ª¡ªÂ×¶ØÏ£Ë¼ÂÞ¡¢²¼Â³Èû¶ûºÍ°ØÁÖ»ú³¡µÄµÇ»úÓëÖµ»úϵͳÖÜÈ«ÖÐÖ¹¡£´Ë´ÎÊÂÎñÔì³É´ó¹æÄ£º½°àÑÓÎó¼°×÷·Ï£¬ÆÈʹº½¿Õ¹«Ë¾ÆôÓÃÈ˹¤²Ù×÷ģʽ£¬ÊýǧÃûÓοÍÖÍÁô»ú³¡ÊýСʱ£¬ÅŶӳ¤ÁúÉìÕÅÖÁº½Õ¾Â¥Íâ¡£¿ÂÁÖ˹×÷Ϊº½¿Õµç×Ó×°±¸¡¢ÄÚÊμ°Ê¹ÃüϵͳµÄ½¹µã¹©Ó¦ÉÌ£¬ÆäMuseÈí¼þÖ§³Ö×ÅÅ·ÖÞ¶à»ú³¡µÄµç×ÓÖµ»úÓëÐÐÀîÍÐÔËÁ÷³Ì¡£¹¥»÷±¬·¢ºó£¬RTX¼¯ÍŽÒÏþÉùÃ÷³ÆÎÊÌâ½öÏÞÓÚµç×Ó·þÎñ£¬¿Éͨ¹ýÈ˹¤Öµ»ú»º½â£¬²¢Ç¿µ÷ÕýÈ«Á¦ÐÞ¸´ÏµÍ³¡£È»¶ø£¬²¼Â³Èû¶û»ú³¡ÖÒÑԳƹ¥»÷Ó°Ï콫һÁ¬ÖÁÖÜÁù£¬°ØÁÖ»ú³¡ºò»úʱ¼äÏÔÖøÑÓÉ죬ϣ˼ÂÞ»ú³¡ÔòºôÓõÓοͳöÐÐǰȷÈϺ½°à״̬¡£¾Ýº½¿ÕÊý¾ÝÉÌCiriumͳ¼Æ£¬Èý»ú³¡ÀÛ¼Æ×÷·Ï29¸öº½°à£¬ÖÜÁùÏÖʵÔËÓªº½°àÁ¿»®·ÖΪ651¼Ü´Î£¨Ï£Ë¼ÂÞ£©¡¢228¼Ü´Î£¨²¼Â³Èû¶û£©ºÍ226¼Ü´Î£¨°ØÁÖ£©¡£Å·ÃËίԱ»á½²»°ÈËÌåÏÖ£¬ÏÖÔÚÎÞÖ¤¾ÝÏÔʾ´Ë´ÎΪ¡°´ó¹æÄ£ÑÏÖØÏ®»÷¡±£¬ÒòÓÉÈÔÔÚÊÓ²ìÖС£


https://securityaffairs.com/182363/hacking/a-cyberattack-on-collins-aerospace-disrupted-operations-at-major-european-airports.html


5. CISAÖÒÑÔʹÓÃIvanti EPMMÎó²î°²ÅŶñÒâÈí¼þ


9ÔÂ20ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÊÖÒÕ±¨¸æ£¬Õ¹ÏÖÕë¶ÔIvanti Endpoint Manager Mobile£¨EPMM£©Èí¼þµÄCVE-2025-4427£¨Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬CVSSÆÀ·Ö5.3£©ºÍCVE-2025-4428£¨Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¬CVSSÆÀ·Ö7.2£©µÄ¶ñÒâ¹¥»÷ϸ½Ú¡£¹¥»÷Õßͨ¹ý´®ÁªÕâÁ½¸öÎó²îʵÏÖÎÞÐèÈÏÖ¤µÄÔ¶³Ì´úÂëÖ´ÐУ¬ÈëÇÖijδǩ×Ö×éÖ¯ÍøÂç²¢°²ÅÅÁ½×é¶ñÒâÈí¼þ¡£µÚÒ»×é¶ñÒâÈí¼þʹÓÃαװ³ÉApache×é¼þµÄReflectUtil.class¼ÓÔØÆ÷£¬½«SecurityHandlerWanListener¼àÌýÆ÷×¢ÈëTomcat·þÎñÆ÷£¬Í¨¹ý×èµ²ÌØ¶¨HTTPÇëÇó½âÃÜÒþ²ØµÄÓÐÓøºÔØ£¬¶¯Ì¬½¨ÉèJavaÀàÒÔÖ´ÐÐí§Òâ´úÂë¡¢¼á³Ö³¤ÆÚÐÔ²¢ÇÔÈ¡Êý¾Ý¡£µÚ¶þ×éÔòαװ³ÉMobileIron·þÎñµÄWebAndroidAppInstaller.class¼ÓÔØÆ÷£¬Í¨¹ý×èµ²±íµ¥±àÂëµÄHTTPÇëÇó£¬Ê¹ÓÃÓ²±àÂëAESÃÜÔ¿½âÃܲÎÊý²¢Ö´ÐжñÒâ´úÂ룬ʵÏÖϵͳ½ÓÊÜ¡£Ivanti¹«Ë¾ÒÑÓÚ5ÔÂÖÐÑ®ÐÞ¸´Îó²î£¬²¢È·ÈÏÎó²îÔ´ÓÚµÚÈý·½¿ªÔ´¿â¶ø·Ç×ÔÉí´úÂë¡£CISAÆÊÎöÏÔʾ£¬¹¥»÷Õßͨ¹ý/mifs/rs/api/v2/¶ËµãÖ´ÐÐÏÂÁ¾ÙÐÐϵͳÊý¾ÝÍøÂç¡¢¶ñÒâÈí¼þÏÂÔØ¡¢ÍøÂçÓ³Éä¼°LDAPƾ֤ÇÔÈ¡£¬²¢Í¨¹ý/tmpĿ¼дÈë¶ñÒâÎļþά³Ö³¤ÆÚÐÔ¡£


https://securityaffairs.com/182350/malware/cisa-warns-of-malware-deployed-through-ivanti-epmm-flaws.html


6. ¼ÓÄôó»Ê¼ÒÆï¾¯ÆÆ»ñÊ×Àý¼ÓÃÜÇ®±ÒÉúÒâËù¹Ø±Õ°¸


9ÔÂ20ÈÕ£¬¼ÓÄôó»Ê¼ÒÆï¾¯£¨RCMP£©Æ¾Ö¤Å·ÖÞÐ̾¯×éÖ¯ÌṩµÄÏßË÷£¬ÍŽáÏ´Ç®ÊÓ²ì×飨MLIT£©¶ÔרעÓÚÒþ˽ÉúÒâµÄСÐͼÓÃÜÇ®±Òƽ̨TradeOgreÕö¿ª×¨ÏîÐж¯£¬×îÖÕÀֳɹرոÃÉúÒâËù²¢²é»ñÁè¼Ý4000ÍòÃÀÔª×ʽ𣬾ÝÐÅÕâЩ×ʽð¶àÔ´ÓÚÍøÂç·¸·¨Ô˶¯¡£´Ë´ÎÐж¯²»µ«ÊǼÓÄôóÖ´·¨²¿·ÖÊ״ιرռÓÃÜÇ®±ÒÉúÒâËù£¬¸ü´´Ï¸ùúÀúÊ·ÉÏ×î´ó¹æÄ£×ʲú¿ÛѺ¼Í¼¡£TradeOgreƽ̨ÒòÖ§³ÖСÖÚɽկ±Ò¼°ÄÑÒÔ×·×ÙµÄÃÅÂÞ±Ò£¨Monero£©ÉúÒâ¶øÖøÃû£¬ÆäÔËӪģʽ±£´æÑÏÖØÖ´·¨Îó²î£¬Î´ÒªÇóÓû§Í¨¹ýKYC£¨ÏàʶÄúµÄ¿Í»§£©Õþ²ß¾ÙÐÐÉí·ÝÑéÖ¤£¬ÇÒδÏò¼ÓÄôó½ðÈÚÉúÒâºÍ±¨¸æÆÊÎöÖÐÐÄ£¨FINTRAC£©×¢²áΪǮ±Ò·þÎñÆóÒµ£¬Î¥·´Á˼ÓÄôó·´Ï´Ç®¹æÔò¡£ÊÓ²ìÏÔʾ£¬¸Ãƽ̨ÒòÄäÃûÐÔÌØÕ÷±»ÍøÂç·¸·¨·Ö×ÓÆÕ±éÓÃÓÚÏ´Ç®²Ù×÷£¬ÀýÈç½»Á÷ÀÕË÷Èí¼þÊÕÒæ¡¢ÊµÑéSIM¿¨½»Á÷Õ©Æ­µÈ¡£Æ½Ì¨ÏÂÏߺ󣬲¿·ÖÓû§ÖÊÒɴ˾ÙΪ¡°Í˳öȦÌס±£¬µ«Ö´·¨»ú¹¹Ã÷È·ÌåÏֹرÕÐж¯»ùÓÚÕýµ±ÊӲ졣¹ØÓÚ·Ç·¸·¨Óû§Ìá³öµÄ×·Ë÷ȨÎÊÌ⣬¾¯·½Ö¸³ö¿Éͨ¹ý¼ÓÄôó·¨ÔºÏµÍ³×·Çó¾ÈÔ®¡£


https://www.bleepingcomputer.com/news/security/canada-dismantles-tradeogre-exchange-seizes-40-million-in-crypto/