Salesforce AI¹¥»÷µ¼ÖÂCRMÊý¾Ý±»ÇÔÈ¡

Ðû²¼Ê±¼ä 2025-09-28

1. Salesforce AI¹¥»÷µ¼ÖÂCRMÊý¾Ý±»ÇÔÈ¡


9ÔÂ25ÈÕ£¬Noma SecurityÑо¿Ö°Ô±¿ËÈÕÅû¶һÖÖÃûΪ"ForcedLeak"µÄÐÂÐ͹¥»÷ÒªÁ죬¿ÉʹÓÃÌáÐÑ×¢ÈëºÍÓâÆÚÓòÃû¶ÔSalesforceµÄAgentforceƽ̨ʵÑéÊý¾ÝÇÔÈ¡¡£¸Ã¹¥»÷ÓÉ·¢Ã÷¸ÃÎó²îµÄNoma Security¹«Ë¾ÑéÖ¤£¬¸Ã¹«Ë¾½üÆÚ¸ÕÍê³É1ÒÚÃÀÔªÈÚ×ÊÒÔÇ¿»¯ÆäAIÊðÀíÇ徲ƽ̨¡£Ñо¿ÏÔʾ£¬¹¥»÷Õßͨ¹ýÀÄÓÃAgentforceµÄWeb-to-Lead¹¦Ð§ÊµÑé¹¥»÷¡£¸Ã¹¦Ð§ÔÊÐíÆóÒµ½¨ÉèÍøÒ³±íµ¥ÍøÂçÍⲿÓû§µÄDZÔÚ¿Í»§ÐÅÏ¢£¬²¢×Ô¶¯´æÈëCRMϵͳ¡£¹¥»÷Õß¿ÉÏòÕâЩ±íµ¥Ìá½»°üÀ¨¶ñÒâÖ¸ÁîµÄÌØÖÆ¸ºÔØ£¬µ±AgentforceÊðÀí´¦Öóͷ£´ËÀàÐÅϢʱ£¬½«´¥·¢ÌáÐÑ×¢ÈëÎó²î£¬µ¼ÖÂÊðÀíÖ´Ðй¥»÷ÕßÖ¸¶¨µÄ²Ù×÷¡£ÀýÈ磬Ñо¿Ö°Ô±ÑÝʾÁËͨ¹ý¸ºÔØÒªÇóAIÊðÀíÍøÂçCRMÖеĵç×ÓÓʼþµØµã£¬²¢½«ÆäÌí¼Óµ½·¢ËÍÖÁÔ¶³Ì·þÎñÆ÷µÄÇëÇó²ÎÊýÖУ¬´Ó¶øÊµÏÖÊý¾Ýй¶¡£¸üÒþ²ØµÄ¹¥»÷·¾¶Éæ¼°ÒÑÓâÆÚµÄSalesforceÓòÃû¡£Ñо¿Ö°Ô±·¢Ã÷£¬¹¥»÷Õß¿ÉÕùÏÈ×¢²áÓâÆÚÓòÃû£¬²¢½«ÆäÉèÖÃΪÎüÊÕÇÔÈ¡Êý¾ÝµÄ·þÎñÆ÷¡£ÓÉÓÚ¸ÃÓòÃûÔøÊôÓÚSalesforceÐÅÍÐÓò£¬¹¥»÷¿ÉÄܺã¾Ãδ±»²ì¾õ¡£


https://www.securityweek.com/salesforce-ai-hack-enabled-crm-data-theft/


2. Rust Crates.ioÏÖ¶ñÒâ°üÇÔÈ¡¼ÓÃÜ˽Կ


9ÔÂ25ÈÕ£¬Rust¹Ù·½°ü¿ÍÕ»Crates.io¿ËÈÕÆØ³öÁ½¸ö¶ñÒâÈí¼þ°üfastest_logºÍasync_println£¬×ÜÏÂÔØÁ¿½ü8500´Î£¬Æäͨ¹ýαװ³ÉÕýµ±°üʵÑé¼ÓÃÜÇ®±Ò˽ԿÇÔÈ¡¹¥»÷¡£ÕâÁ½¸ö°üÓÚ5ÔÂ25ÈÕÐû²¼£¬»®·Ö±»ÏÂÔØ7200´ÎºÍ1200´Î£¬Ã°³äÈÈÃÅÈÕÖ¾¿âfast_log£¬¸´ÖÆÆäREADMEÎļþ¡¢´æ´¢¿âÔªÊý¾Ý£¬²¢±£´æÕæÊµÏîÄ¿µÄÈÕÖ¾¹¦Ð§ÒÔ½µµÍ¿ª·¢ÕßСÐÄ¡£¹¥»÷ÕßʹÓÃÈÕÖ¾´ò°ü¹¦Ð§É¨ÃèÊܺ¦ÏµÍ³£¬ÖصãÇÔÈ¡ÈýÀàÃô¸ÐÐÅÏ¢£ºÒÔÌ«·»Ë½Ô¿µÄÊ®Áù½øÖÆ×Ö·û´®¡¢SolanaÃÜÔ¿/µØµãµÄBase58×Ö·û´®£¬ÒÔ¼°¿ÉÄÜÒþ²ØÃÜÔ¿µÄÀ¨ºÅÄÚ×Ö½ÚÊý×顣ƥÅäµ½ÕâЩģʽºó£¬Êý¾Ý»á±»´ò°ü²¢·¢Ë͵½Ó²±àÂëµÄCloudflare Worker URL£¬¸Ã¶Ëµã¾­²âÊÔÈ·ÈÏ´¦ÓÚÔ˶¯×´Ì¬Çҷǹٷ½Solana RPC½Úµã¡£´úÂëÇå¾²¹«Ë¾SocketÂÊÏÈ·¢Ã÷´Ë¹¥»÷²¢ÏòCrates.io±¨¸æ£¬Æ½Ì¨ÓÚ9ÔÂ24ÈÕɾ³ýÕâÁ½¸ö°ü²¢·â½ûÐû²¼ÕßÕË»§¡°rustguruman¡±ºÍ¡°dumbnbased¡±¡£Crates.ioͨ¸æÖ¸³ö£¬ÕâЩ¶ñÒâ°üÎÞÏÂÓÎÒÀÀµ£¬·â½ûÕË»§Î´Ìá½»ÆäËûÏîÄ¿£¬¹¥»÷ÒÑ»ù±¾É¨³ý¡£µ«ÒÑÏÂÔØ°üµÄ¿ª·¢Ö°Ô±ÈÔÐèÖ´ÐÐϵͳÕûÀí£¬²¢½«Êý×Ö×ʲú×ªÒÆÖÁÐÂÇ®°üÒÔ±ÜÃâ±»µÁ¡£


https://www.bleepingcomputer.com/news/security/malicious-rust-packages-on-cratesio-steal-crypto-wallet-keys/


3. ¶íº¥¶íÖÝÍŽáÏØÔâÓö´ó¹æÄ£ÀÕË÷Èí¼þ¹¥»÷


9ÔÂ27ÈÕ£¬ÃÀ¹ú¶íº¥¶íÖÝÍŽáÏØ5ÔÂ18ÈÕ±¬·¢Ò»ÆðÑÏÖØµÄÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ£¬µ¼ÖÂÔ¼45,487ÃûסÃñ¼°ÊÂÇéÖ°Ô±µÄÉç»áÇå¾²ºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢¡¢¼ÝÕÕºÅÂë¡¢Ö¸ÎÆÊý¾Ý¡¢Ò½ÁƼͼ¼°»¤ÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢±»µÁ¡£¾­ÊÓ²ìÈ·ÈÏ£¬ÍøÂç·¸·¨·Ö×Ó×Ô5ÔÂ6ÈÕÆð±ãÒÑÇÖÈë¸ÃÏØÍøÂçϵͳ£¬Ö±ÖÁ18ÈÕÀÕË÷Èí¼þ±»¼ì²â·¢Ã÷£¬Ê±´úÒ»Á¬ÇÔÈ¡Êý¾Ý¡£ÊÂÎñ±¬·¢ºó£¬ÍŽáÏØÑ¸ËÙÆô¶¯Ó¦¼±ÏìÓ¦»úÖÆ£¬ÍŽáµÚÈý·½ÍøÂçÇ徲ר¼ÒÓëÁª°îÖ´·¨²¿·ÖÕö¿ªÖÜÈ«ÊӲ죬²¢ÓÚ8ÔÂ25ÈÕÍê³ÉÊÂÎñÉó²éºóÕýʽÆô¶¯Êܺ¦Õß֪ͨ³ÌÐò¡£ÍŽáÏØÔÚÖÂÊÜÓ°ÏìÕßµÄÊý¾Ýй¶֪ͨÐÅÖÐÃ÷È·Ö¸³ö£¬¹¥»÷±¬·¢ºóÒÑÁ¬Ã¦ÓëÌìÏÂ×ÅÃûÍøÂçÇå¾²ÕÕÁÏÏàÖú£¬ÔÚ°ü¹ÜϵͳÇå¾²µÄͬʱ½ç¶¨Ãü¾Ýй¶¹æÄ££¬²¢Í¬²½ÏòÁª°îÖ´·¨»ú¹¹¼°ÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ±¨±¸¡£Æ¾Ö¤¹Ù·½Åû¶£¬±»µÁÊý¾ÝÀàÐͺ­¸ÇСÎÒ˽¼ÒÉí·Ý½¹µãÐÅÏ¢¼°½ðÈÚ¡¢Ò½ÁƵÈÃô¸ÐÁìÓò£¬Ïêϸ°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕË»§ÏêÇé¡¢ÉúÎïʶ±ðÐÅÏ¢¼°¹ú¼ÊÂÃÐÐÖ¤¼þ±àºÅµÈ¡£×èÖ¹ÏÖÔÚ£¬ÉÐÎÞÈκÎÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£


https://securityaffairs.com/182689/uncategorized/ohios-union-county-suffers-ransomware-attack-impacting-45000-people.html


4. ºÚ¿ÍʹÓÃSEOÖж¾Óë¶ñÒâ¹ã¸æÖ²ÈëOysterºóÃÅ


9ÔÂ27ÈÕ£¬ºÚ¿Íͨ¹ýSEOÖж¾ºÍËÑË÷ÒýÇæ¹ã¸æÍƹãÐéαMicrosoft Teams×°ÖóÌÐò£¬Ê¹ÓÃOysterºóÃÅѬȾWindows×°±¸£¬ÎªÆóÒµÍøÂç»ñÈ¡³õʼ»á¼ûȨÏÞ¡£Oyster¶ñÒâÈí¼þ£¨ÓÖÃûBroomstick¡¢CleanUpLoader£©×Ô2023ÄêÖÐÊ״ηºÆðºó£¬ÒѹØÁª¶àÆð¶ñÒâÔ˶¯¡£¸ÃºóÃÅÔÊÐí¹¥»÷ÕßÔ¶³ÌÖ´ÐÐÏÂÁî¡¢°²ÅÅÌØÊâ¸ºÔØ¼°´«ÊäÎļþ£¬³£Í¨¹ýð³äPutty¡¢WinSCPµÈÊ¢ÐÐIT¹¤¾ßµÄ¶ñÒâ¹ã¸æÈö²¥£¬ÉõÖÁ±»RhysidaÀÕË÷Èí¼þ×éÖ¯ÓÃÓÚÈëÇÖÆóÒµÍøÂç¡£Blackpoint SOC×îÐÂÅû¶µÄ¹¥»÷Á´ÏÔʾ£¬ÍþвÐÐΪÕßÔÚÓû§ËÑË÷¡°TeamsÏÂÔØ¡±Ê±£¬Í¨¹ý·Ç΢ÈíÓòÃûµÄ¹ã¸æºÍÓòÃûÖ¸µ¼ÖÁαÔìµÄTeamsÏÂÔØÒ³Ãæ¡£Óû§µã»÷ÏÂÔØµÄ¡°MSTeamsSetup.exe¡±Îļþ£¬ËäʹÓÃαÔìµÄ¡°4th State Oy¡±ºÍ¡°NRM NETWORK RISK MANAGEMENT INC¡±Ö¤ÊéÊðÃûÒÔÔöÇ¿¿ÉÐŶÈ£¬µ«Ö´Ðкó»á½«¶ñÒâDLLÖ²Èë%APPDATA%\RoamingÎļþ¼Ð£¬²¢½¨ÉèÃûΪ¡°CaptureService¡±µÄÍýÏëʹÃü£¬Ã¿11·ÖÖÓÖ´ÐÐÒ»´ÎDLL£¬È·±£ºóÃÅÔÚÏµÍ³ÖØÆôºóÒ»Á¬»îÔ¾¡£BlackpointÇ¿µ÷£¬¹¥»÷ÕßÕýʹÓÃÓû§¶ÔËÑË÷Ч¹û¼°×ÅÃûÆ·ÅÆµÄÐÅÍÐʵÑéÉøÍ¸£¬ITÖÎÀíÔ±×÷Ϊ¸ßȨÏÞÄ¿µÄÐè¸ñÍâСÐÄ¡£


https://www.bleepingcomputer.com/news/security/fake-microsoft-teams-installers-push-oyster-malware-via-malvertising/


5. Archer HealthÉèÖùýʧ´æ´¢Í°ÖÂ14.5Íò·ÝÃô¸ÐÎļþ̻¶


9ÔÂ26ÈÕ£¬Çå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷Ò»¸öδ¼ÓÃÜÇÒÎÞÃÜÂë±£»¤µÄÉèÖùýʧ´æ´¢Í°£¬ÄÚº¬Ô¼14.5Íò¸öÎļþ£¨×ܼÆ23GB£©£¬Éæ¼°´ó×ÚÒ½ÁÆÃô¸ÐÊý¾Ý¡£¾­³éÑùºË²é£¬¸ÃÊý¾Ý¿â°üÀ¨»¼ÕßÐÕÃû¡¢IDºÅ¡¢Éç»áÇå¾²ºÅÂ루SSN£©¡¢×¡Ö·¡¢µç»°ºÅÂëµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬ÒÔ¼°Õï¶Ï¼Í¼¡¢ÖÎÁƼƻ®¡¢Õչ˻¤Ê¿ÍýÏë¡¢³öÔº±í¸ñµÈÊܱ£»¤¿µ½¡ÐÅÏ¢£¨PHI£©¡£ÎļþȪԴÒÉËÆÖ¸ÏòÒ½ÁÆÖÎÀíÈí¼þ£¬²¿·ÖÎļþ¼ÐÖ±½ÓÒÔ»¼ÕßÐÕÃûÃüÃû£¬ÉÐÓС°´«Õæ¶©µ¥¡±¡°ºÏ²¢PDFÎļþ¡±ÖзÖÀ̻࣬¶ÁË»¼ÕßÓëÒ½ÁÆ·þÎñÌṩÕßµÄÏêϸÔ˶¯ÈÕÖ¾¡¢Èճ̰²ÅŵÈÒþ˽ÄÚÈÝ¡£FowlerÓÚ8ÔÂβÊ״η¢Ã÷Êý¾Ýй¶£¬9ÔÂ1ÈÕ-2ÈÕÍê³ÉÉó²éºó£¬ÓÚ9ÔÂ4ÈÕÏòArcher Home Health·¢³öÈÏÕæÈÎÅû¶¾¯±¨£¬¶Ô·½ÔÚ24СʱÄÚ»ØÓ¦¡£È»¶ø£¬9ÔÂ7ÈÕ£¬°µÍø×éÖ¯KillSec3Òѽ«Archer HealthÁÐÈëÆäйÃÜÍøÕ¾£¬²¢ÓÚÔ½ÈÕ¹ûÕæÐ¹Â¶8GBÊý¾Ý¡£¸Ã×éÖ¯´Ëǰ±»ÆØºã¾ÃʹÓÃGrayhatwarfareµÈƽ̨Õ÷²É¹ûÕæÌ»Â¶µÄÊý¾Ý£¬Í¨¹ýÏÂÔØ²¢ÍþвʵÌå¾ÙÐÐÀÕË÷¡£


https://databreaches.net/2025/09/26/archer-health-was-leaking-protected-health-information-criminals-appear-to-have-found-it/


6. ApolloMDÔâ°µÍø×éÖ¯÷è÷ëÍþвÊý¾Ýй¶


9ÔÂ26ÈÕ£¬°µÍø×éÖ¯¡°÷è÷롱6ÔÂ12ÈÕ½«Ò½ÁÆÏàÖúͬ°éApolloMDÁÐÈëÆä×ßÂ©ÍøÕ¾£¬Éù³ÆÓµÓÐ238GBÎļþ²¢±ê×¢ÈÕÆÚΪ6ÔÂ6ÈÕ¡£È»¶ø£¬÷è÷ëδ¶ÒÏÖ6ÔÂ16ÈÕ¹ûÕæÊý¾ÝµÄÍþв£¬ÏÂÔØÁ´½ÓÖÐδ·¢Ã÷ÏÖʵÊý¾Ý¡£ApolloMD×ܲ¿Î»ÓÚ×ôÖÎÑÇÖÝ£¬×Ô1983ÄêÆð×÷ΪҽÉúÏòµ¼µÄ˽È˼¯ÍÅ£¬ÎªÒ½ÔºÌṩÁÙ´²ÔËÓª¡¢»¼ÕßÕչ˻¤Ê¿¼°²ÆÎñÓÅ»¯·þÎñ¡£÷è÷ëÐû²¼µÄÇåµ¥°üÀ¨²ÆÎñÐÅÏ¢½ØÍ¼£¬µ«Î´É漰СÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©»òÊܱ£»¤¿µ½¡ÐÅÏ¢£¨PHI£©¡£ApolloMDÓÚ9ÔÂ15ÈÕÔÚ¹ÙÍøÐû²¼Ì滻֪ͨ£¬Åû¶5ÔÂ22ÈÕÖÁ23ÈÕ±¬·¢Î´¾­ÊÚȨ»á¼û£¬µ«Î´Ìá¼°ÍþвÕßÃû³Æ¡¢Îļþ¼ÓÃÜÇéÐλòÊê½ðÒªÇó¡£DataBreachesÏòÆäѯÎÊÏà¹ØÏ¸½Ú£¬×èÖ¹ÏÖÔÚδ»ñ»Ø¸´¡£ApolloMD֪ͨÁË11¼Ò¹ØÁªÒ½ÁÆ»ú¹¹£¬°üÀ¨ÅÁÈû¿ËÒ½Ôº·þÎñÓÐÏÞ¹«Ë¾¡¢ÅíÈø¿ÆÀ­×¡ÔºÒ½Ê¦ÓÐÏÞÔðÈι«Ë¾µÈ£¬Ê±¼ä¹æÄ£´Ó2015Äê7ÔÂÖÁ2025Äê9Ô¡£9ÔÂ17ÈÕ£¬ApolloMDÏòÊÜÓ°Ï컼Õß·¢ËÍ֪ͨÐÅ£¬Ã÷ȷй¶Êý¾ÝÉæ¼°»¼ÕßÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢Õï¶ÏÐÅÏ¢¡¢Ò½ÁÆ·þÎñÌṩÕßÐÕÃû¡¢·þÎñÈÕÆÚ¡¢ÖÎÁÆÐÅÏ¢¼°¿µ½¡°ü¹ÜÐÅÏ¢£¬²¿·Ö»¼Õß¿ÉÄÜ̻¶Éç»áÇå¾²ºÅÂ루SSN£©¡£CyberScoutΪ»¼ÕßÌṩÃâ·ÑÐÅÓÃ¼à¿Ø·þÎñ¡£


https://databreaches.net/2025/09/26/apollomd-notifies-patients-of-11-physician-practices-affected-by-a-june-cyberattack/