±¦Âí¼¯ÍÅÔâEverestÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2025-09-19

1. ±¦Âí¼¯ÍÅÔâEverestÀÕË÷Èí¼þ¹¥»÷


9ÔÂ17ÈÕ£¬£¬ £¬µÂ¹ú±¦Âí¼¯ÍÅÔâÓöEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬ £¬³ÉΪ8ÔÂ31ÈսݱªÂ·»¢ºó²»µ½Ò»¸öÔÂÄÚµÚ¶þ¸ö±»ºÚµÄºÀ»ªÆû³µÆ·ÅÆ¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÚ°µÍøÑó´ÐÕ¾µãÐû²¼Í¨¸æ£¬£¬ £¬Éù³ÆÇÔÈ¡Á˱¦Âí¡°Òªº¦Éó¼ÆÎļþ¡±£¬£¬ £¬²¢ÉèÖÃÁ½¸öµ¹¼ÆÊ±ÖÓ£¬£¬ £¬Ò»¸öÏÔʾ9ÔÂ14ÈÕ¡°Â¼Òô¡±½«²»¿ÉÓã¨Ê£Óàȱ·¦24Сʱ£©£¬£¬ £¬ÁíÒ»¸öÒªÇó¹«Ë¾48СʱÄÚÁªÏµÌ¸ÅС£¡£¡£¡£¡£±¦Âí×ܲ¿Î»ÓÚĽÄáºÚ£¬£¬ £¬ÓµÓÐ160,000ÃûÔ±¹¤£¬£¬ £¬ÔÚ15¹úÉè30ÓàÉú²ú»ùµØ£¬£¬ £¬2024ÄêÈ«Çò²úÁ¿³¬240ÍòÁ¾£¨ÖйúÕ¼30%£©£¬£¬ £¬ÄêÊÕÈ볬1.42ÒÚÅ·Ôª¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Éæ¼°ÆìÏÂMini¡¢ÀÍ˹À³Ë¹¼°MotorradĦÍгµ²¿·Ö¡£¡£¡£¡£¡£Everestδ͸¶ÊÇ·ñÇÔÈ¡¿Í»§Êý¾Ý¡£¡£¡£¡£¡£Everest×Ô2021Äê»îÔ¾£¬£¬ £¬2023ÄêÒÔÀ´°µÍø²©¿ÍÁÐ248ÃûÊܺ¦Õߣ¬£¬ £¬½ü12¸öÔ¹¥»÷³¬90Ãû×éÖ¯¡£¡£¡£¡£¡£±¦Âí¼¯ÍÅÉÐδ»ØÓ¦£¬£¬ £¬ÊÂÎñÊÓ²ìÈÔÔÚ¾ÙÐС£¡£¡£¡£¡£


https://cybernews.com/news/bmw-ransomware-attack-everest-claim-everest-luxury-target-jlr-trend/


2. ·ðÂÞÀï´ï²¼ÀïÍßµÂÒ½ÁÆÐ­»áÔâ´ó¹æÄ£Êý¾Ýй¶


9ÔÂ18ÈÕ£¬£¬ £¬×ܲ¿Î»ÓÚ·ðÂÞÀï´ïÖÝÄ«¶û±¾µÄ²¼ÀïÍßµÂÒ½ÁÆÐ­»á1ÔÂÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬Ó°Ïì¹æÄ£²¨¼°½ü25ÍòÈË¡£¡£¡£¡£¡£¸Ã»ú¹¹×÷ΪÍâµØÖ÷ÒªÒ½ÁƱ£½¡Ð§ÀÍÌṩÕߣ¬£¬ £¬ÓÚ1ÔÂÖÐÑ®·¢Ã÷ϵͳÔâÈëÇÖ£¬£¬ £¬¾­ÊÓ²ìÈ·ÈϹ¥»÷Õß¿ÉÄÜÇÔÈ¡ÁËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¼°Êܱ£»£»£»£»£»£»¤µÄ¿µ½¡Êý¾Ý¡£¡£¡£¡£¡£Ö»¹Ü9ÔÂ5ÈÕÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌύ֪ͨʱδÅû¶ÏêϸÈËÊý£¬£¬ £¬µ«ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Ò½ÁÆÊý¾Ýй¶׷×ÙϵͳÏÔʾ£¬£¬ £¬ÏÖʵÊÜÓ°ÏìÈËÊý¸ß´ï246,711ÈË£¬£¬ £¬º­¸Ç»¼Õß¡¢Ô±¹¤¼°ÏàÖúͬ°éÏà¹ØÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£BianLianÀÕË÷Èí¼þ×éÖ¯ÒÑÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬ £¬²¢Éù³ÆÇÔÈ¡ÄÚÈݲ»µ«°üÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢Ó뿵½¡¼Í¼£¬£¬ £¬»¹Éæ¼°»á¼Æ¡¢ÈËÁ¦×ÊÔ´Êý¾Ý¿â¼°ÏàÖú·½ÍùÀ´ÓʼþµÈÎļþ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬¸Ã×éÖ¯×Ô3ÔÂβÆðÒÑÎÞ¹ûÕæ»î¶¯¼Í¼£¬£¬ £¬ÏÖÔÚ±»µÁÊý¾ÝÈ¥ÏòÈÔ²»Ã÷È·¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬ÊÂÎñÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬ £¬Ïà¹Ø»ú¹¹ÕýÊÔͼ׷ËÝÊý¾ÝÁ÷Ïò²¢ÆÀ¹ÀDZÔÚΣº¦¡£¡£¡£¡£¡£


https://www.securityweek.com/nearly-250000-impacted-by-data-breach-at-medical-associates-of-brevard/


3. ¶íÂÞ˹KrasAviaº½¿Õ¹«Ë¾ÒÉÔâÍøÂç¹¥»÷ÖÂÊý×ÖЧÀÍÖÐÖ¹


9ÔÂ18ÈÕ£¬£¬ £¬¶íÂÞ˹µØÇøº½¿Õ¹«Ë¾KrasAviaÐû²¼ÉùÃ÷³Æ£¬£¬ £¬Æä²¿·ÖÊý×ÖЧÀÍÒòϵͳ¹ÊÕÏÖÐÖ¹£¬£¬ £¬³ÉΪÒÉËÆÍøÂç¹¥»÷À˳±Öиùúº½¿ÕÒµÔâÓöµÄ×îÐÂÊÂÎñ¡£¡£¡£¡£¡£Õâ¼Ò×ܲ¿Î»ÓÚ¿ËÀ­Ë¹ÅµÑǶû˹¿ËµÄº½Ë¾ÌåÏÖ£¬£¬ £¬×¨¼ÒÕýÈ«Á¦½µµÍº½°àʱ¿Ì±íΣº¦²¢¾¡¿ì»Ö¸´ÔËÓª¡£¡£¡£¡£¡£×èÖ¹ÍâµØÊ±¼äÖÜËÄÍí¼ä£¬£¬ £¬ÆäÍøÕ¾ÒṈ̃»¾£¬£¬ £¬ÔÚÏßÊÛÆ±ÔÝÍ££¬£¬ £¬ÂÿÍÎÞ·¨¾ÙÐÐÊý×ÖÖµ»ú£¬£¬ £¬µ«º½°àÈÔ°´ÍýÏëÔËÐС£¡£¡£¡£¡£¸Ã¹«Ë¾Ö÷ÒªÖ´·ÉÖÐÎ÷²®ÀûÑǼ°Ãɹź½Ïß¡£¡£¡£¡£¡£Ö»¹ÜKrasAviaδÃ÷È·ÈÏ¿ÉÍøÂç¹¥»÷£¬£¬ £¬µ«ÏòÍâµØÃ½Ìå͸¶´Ë´Î¹ÊÕÏÓë¶íÂÞ˹Æì½¢º½Ë¾Aeroflot 7ÔÂβÔâÓöµÄ¹ÊÕÏÀàËÆ¡£¡£¡£¡£¡£Aeroflot´ËǰÒòÒÉËÆÍøÂç¹¥»÷µ¼ÖÂÑÏÖØÑÓÎóºÍ×÷·Ï£¬£¬ £¬Ç×ÎÚ¿ËÀ¼ºÚ¿Í×éÖ¯¡°Ä¬È»ÎÚÑ»¡±£¨Silent Crow£©¼°°×¶íÂÞË¹ÍøÂçÓλ÷¶Ó£¨Belarusian Cyber Partisans£©Ðû³Æ¶Ô´ËÈÏÕæ£¬£¬ £¬²¢Éù³ÆÇÔÈ¡Á˺½Ðмͼ¡¢ÄÚ²¿Í¨»°ÒôƵ¼°¼à¿Ø×ÊÁÏ¡£¡£¡£¡£¡£ÖÜËÄ£¬£¬ £¬ÇøÓòÐÔTelegramƵµÀBorusÐû²¼½ØÍ¼£¬£¬ £¬ÏÔʾKrasAviaÍøÒ³±»¸Ä¶¯£¬£¬ £¬¶íº½¼°KrasAvia±êʶ±»»®µô£¬£¬ £¬¸½ÎÄ¡°ÎÒÃÇ»¹Ã»×îÏÈ¡­¡­¡±£¬£¬ £¬²¢·ºÆð¡°Ä¬È»ÎÚÑ»¡±Í·Ïñͼ±ê¡£¡£¡£¡£¡£


https://therecord.media/russia-krasavia-airline-disrupted-suspected-cyberattack


4. SystemBCÊðÀí½©Ê¬ÍøÂ磺ºã¾Ã»îÔ¾µÄ¶ñÒâÁ÷Á¿ÒýÇæ


9ÔÂ18ÈÕ£¬£¬ £¬SystemBCÊðÀí½©Ê¬ÍøÂç×Ô2019ÄêÆðÒ»Á¬»îÔ¾£¬£¬ £¬³ÉΪ¶à¸öÀÕË÷Èí¼þÍŻP·¸·¨×é֯ת´ï¶ñÒâÔØºÉµÄ½¹µãͨµÀ¡£¡£¡£¡£¡£¸ÃÍøÂçÈÕ¾ùά»¤Ô¼1500¸ö»úеÈ˽ڵ㣬£¬ £¬Ö÷ҪʹÓÃÈ«Çò¹æÄ£ÄÚ±£´æÎ´ÐÞ²¹ÑÏÖØÎó²îµÄÉÌÒµÐéÄâרÓÃЧÀÍÆ÷£¨VPS£©¹¹½¨£¬£¬ £¬ÆäÖнü80%µÄ½ÚµãÀ´×Ô×ðÐÍÉÌÒµ¹©Ó¦É̵ÄÊÜѬȾVPSϵͳ¡£¡£¡£¡£¡£ÕâЩЧÀÍÆ÷ƽ¾ù±£´æ20¸öδÐÞ¸´µÄÇå¾²ÎÊÌ⣬£¬ £¬ÇÒÖÁÉÙ°üÀ¨Ò»¸ö¸ßΣÎó²î£¬£¬ £¬²¿·Ö°¸ÀýÉõÖÁ̻¶161¸öÎó²î£¬£¬ £¬µ¼ÖÂѬȾÊÙÃüÏÔÖøÑÓÉ죬£¬ £¬½ü40%µÄϵͳѬȾʱ¼äÁè¼ÝÒ»¸öÔ¡£¡£¡£¡£¡£SystemBCµÄ½¹µã¹¦Ð§ÊÇÔÊÐí¹¥»÷Õßͨ¹ýÊÜѬȾÖ÷»ú·ÓɶñÒâÁ÷Á¿£¬£¬ £¬²¢Òþ²ØÏÂÁîÓë¿ØÖÆ£¨C2£©»î¶¯ÒÔ¹æ±Ü¼ì²â¡£¡£¡£¡£¡£Æä80Óà¸öC2ЧÀÍÆ÷²»µ«Ö±½ÓÅþÁ¬ÊðÀí½Úµã£¬£¬ £¬»¹ÎªREM Proxy¡¢Ô½ÄÏVN5SocksÊðÀíÍøÂç¼°¶íÂÞË¹ÍøÂçץȡ¹«Ë¾µÈ¿Í»§Ìṩ·Ö²ãЧÀÍ¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬ £¬¸ÃÍøÂçÓë¶íÂÞ˹±£´æÊÖÒÕ¹ØÁª£ºÐÂѬȾЧÀÍÆ÷»áÏÂÔØ´øÓжíÓï×¢Ê͵Äshell¾ç±¾£¬£¬ £¬Ç¿ÖƲ¢ÐÐÔËÐÐËùÓÐSystemBCÑù±¾£»£»£»£»£»£»½¹µã½ÚµãÍйÜËùÓÐ180¸ö¶ñÒâÈí¼þÑù±¾¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/systembc-malware-turns-infected-vps-systems-into-proxy-highway/


5. PyPIʹGhostAction¹©Ó¦Á´¹¥»÷Öб»µÁµÄÁîÅÆÊ§Ð§


9ÔÂ18ÈÕ£¬£¬ £¬PythonÈí¼þ»ù½ð»áÐû²¼ÒÑʹ9Ô³õGhostAction¹©Ó¦Á´¹¥»÷ÖÐÇÔÈ¡µÄËùÓÐPyPIÁîÅÆÊ§Ð§£¬£¬ £¬²¢È·ÈÏÍþвÐÐΪÕßδÀÄÓÃÕâЩÁîÅÆÔÚPython°üË÷Òý£¨PyPI£©Ðû²¼¶ñÒâÈí¼þ¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚ9ÔÂ5ÈÕGitGuardianÔ±¹¤±¨¸æµÄ¶ñÒâGitHub ActionsÊÂÇéÁ÷£¨ÈçFastUUID£©ÊÔͼÇÔÈ¡PyPIÁîÅÆÖÁÔ¶³ÌЧÀÍÆ÷£¬£¬ £¬ÁíÒ»Ñо¿Ö°Ô±Í¬ÈÕ·¢Ë͵ÄÏêÇéÓʼþÒòÎóÈëÀ¬»øÓʼþÎļþ¼Ð£¬£¬ £¬µ¼ÖÂPyPIÇå¾²ÍŶÓÖ±ÖÁ9ÔÂ10Èղůô¶¯ÏìÓ¦¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬ £¬¹¥»÷Õßͨ¹ýÐ޸Ĵ洢¿âÊÂÇéÁ÷£¬£¬ £¬½«´æ´¢ÎªGitHubÉñÃØµÄPyPIÁîÅÆ·¢ËÍÖÁÍⲿЧÀÍÆ÷¡£¡£¡£¡£¡£Ö»¹ÜÀÖ³ÉÇÔÈ¡²¿·ÖÁîÅÆ£¬£¬ £¬µ«Î´ÔÚPyPIƽ̨ʹÓᣡ£¡£¡£¡£GitGuardianÔÚ³¬570¸öÊÜÓ°Ïì´æ´¢¿âÖÐÌá½»GitHubÎÊÌ⣬£¬ £¬²¢×ª´ïGitHub¡¢npm¼°PyPIÇå¾²ÍŶÓ¡£¡£¡£¡£¡£PyPIÍŶÓËæºóʹËùÓÐÊÜÓ°ÏìÁîÅÆÊ§Ð§£¬£¬ £¬Ð­ÖúÏîÄ¿ËùÓÐÕßÔöÇ¿ÕË»§Çå¾²¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬GhostAction¹¥»÷²¨¼°¹æÄ£Ô¶³¬PyPI£ºGitGuardianÔ¤¼Æ³¬3.3Íò¸öÉñÃØ±»µÁ£¬£¬ £¬Éæ¼°PyPI¡¢npm¡¢DockerHub¡¢GitHub¡¢Cloudflare APIÁîÅÆ¼°AWS»á¼ûÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈ£¬£¬ £¬Ó°Ïì°üÀ¨Rust¡¢JavaScript¡¢GoÔÚÄڵĶàÓïÑÔ´úÂë¿â£¬£¬ £¬²¿·ÖÆóÒµÕû¸öSDK²úÆ·×éºÏÔâÈëÇÖ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pypi-invalidates-tokens-stolen-in-ghostaction-supply-chain-attack/


6. º«¹úÀÖÌ쿨ÔâºÚ¿Í¹¥»÷£¬£¬ £¬300ÍòÓû§Êý¾Ýй¶


9ÔÂ18ÈÕ£¬£¬ £¬º«¹úµÚÎå´óÐÅÓÿ¨¿¯ÐÐÉÌÀÖÌ쿨ÓÚ9ÔÂÅûÂ¶ÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬Éæ¼°297ÍòÓû§£¬£¬ £¬³ÉΪ½ñÄêÈ«Çò×î´óÊý¾Ýй¶ÊÂÎñÖ®Ò»¡£¡£¡£¡£¡£½ðÈÚ¼àÊÓÔºÊÓ²ìÏÔʾ£¬£¬ £¬7ÔÂ22ÈÕÖÁ8ÔÂ27ÈÕʱ´ú£¬£¬ £¬¸Ã¹«Ë¾ÔÚÏßÖ§¸¶Ð§ÀÍÆ÷ÔâºÚ¿Í¹¥»÷£¬£¬ £¬Áè¼Ý200GBÊý¾Ý±»ÇÔÈ¡¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨ÅþÁ¬¼Í¼¡¢ÐéÄâÖ§¸¶´úÂë¡¢ÄÚ²¿Ê¶ÓÖÃû¼°ÉúÒâÀàÐ͵È£¬£¬ £¬ÆäÖÐÔ¼28ÍòÓû§Òò¿¨ºÅ¡¢ÓÐÓÃÆÚºÍÇå¾²ÂëÔÚµçêaê_¾°Ì»Â¶£¬£¬ £¬ÃæÁÙÖ±½Ó²»·¨Ê¹ÓÃΣº¦¡£¡£¡£¡£¡£ÀÖÌ쿨ÒÑΪ¸ßΣº¦Óû§Æô¶¯»»¿¨³ÌÐò£¬£¬ £¬×èÖ¹ÖÜÈýÒÑÓÐ5.5ÍòÓû§Íê³É»»¿¨£¬£¬ £¬ÆäÓà269ÍòÓû§Êý¾Ý±»ÆÀ¹ÀΪµÍÃô¸Ð¶È£¬£¬ £¬ÔÝÎÞÐèÖØÐ·¢¿¨¡£¡£¡£¡£¡£ÏÖÔÚδ¼ì²âµ½Î´¾­ÊÚȨÉúÒâ¡£¡£¡£¡£¡£ÊÂÎñȪԴֱָÇå¾²ÖÎÀíÎó²î£º¹¥»÷ÕßÓÚ8ÔÂ12ÈÕɨÃèЧÀÍÆ÷Îó²î£¬£¬ £¬Ô½ÈÕÖ²Èë¶ñÒâ´úÂ룬£¬ £¬14-15ÈÕÇÔÈ¡1.7GBÊý¾Ý£¬£¬ £¬ºóÐøÍ¨¹ýÊðÀíWeb ShellÒ»Á¬ÌáÈ¡ÉúÒâÈÕÖ¾£¬£¬ £¬×îÖÕ2700¸öй¶ÎļþÖнö56%¼ÓÃÜ¡£¡£¡£¡£¡£ÀÖÌ쿨ֱÖÁ8ÔÂ26ÈÕÀýÐмì²é²Å·¢Ã÷ÈëÇÖ£¬£¬ £¬ÏµÍ³Ì»Â¶½üÁ½ÖÜ¡£¡£¡£¡£¡£¸üÁîÈËÕ𾪵ÄÊÇ£¬£¬ £¬¸ÃÎó²î×îÔçÓÚ2017Äê±»·¢Ã÷£¬£¬ £¬µ«ÍâÑóÖ§¸¶Ð§ÀÍÆ÷Òò»á¼ûÁ¿µÍ±»ÒÅ©ÐÞ²¹£¬£¬ £¬ÐγÉÒªº¦Ç徲ȱ¿Ú¡£¡£¡£¡£¡£


https://www.koreaherald.com/article/10578647