ShadowLeak¹¥»÷£ºChatGPTЧÀÍÆ÷¶ËÊý¾ÝÇÔÈ¡µÄÐÂÍþв

Ðû²¼Ê±¼ä 2025-09-22

1. ShadowLeak¹¥»÷£ºChatGPTЧÀÍÆ÷¶ËÊý¾ÝÇÔÈ¡µÄÐÂÍþв


9ÔÂ18ÈÕ£¬£¬£¬ £¬RadwareÑо¿Ö°Ô±·¢Ã÷ÃûΪShadowLeakµÄÐÂÐ͹¥»÷£¬£¬£¬ £¬Ê¹ÓÃChatGPTµÄDeep ResearchÊðÀíʵÏÖÁãµã»÷ЧÀÍÆ÷¶ËÊý¾ÝÇÔÈ¡¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ͨ¹ýÈ«ÐÄÉè¼ÆµÄµç×ÓÓʼþÖÐÒþ²ØHTMLÖ¸Á£¬£¬ £¬ÔÚÓû§ÎÞ²Ù×÷»ò¿É¼û½çÃæÌáÐѵÄÇéÐÎÏ£¬£¬£¬ £¬´¥·¢ÊðÀí´ÓGmailÊÕ¼þÏäÌáȡСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©²¢¾²Ä¬·¢ËÍÖÁ¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£Çø±ðÓÚÒÀÀµ¿Í»§¶ËͼÏñäÖȾµÄ¿Í»§¶Ë¹¥»÷£¬£¬£¬ £¬ShadowLeakÖ±½Ó´ÓOpenAIÔÆ»ù´¡Éèʩй¶Êý¾Ý£¬£¬£¬ £¬Ê¹ÆóÒµ·ÀÓùϵͳÄÑÒÔ¼ì²â£¬£¬£¬ £¬Óû§ÒàÎÞ¸ÐÖª¡£¡£¡£¡£¡£¡£¡£Deep ResearchÔÊÐíChatGPT×ÔÖ÷ä¯ÀÀÍøÒ³5-30·ÖÖÓÌìÉúÏêϸ±¨¸æ£¬£¬£¬ £¬²¢ÓëGmailµÈÓ¦Óü¯³É¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á÷³ÌÖУ¬£¬£¬ £¬¹¥»÷Õß·¢ËͰüÀ¨Éç»á¹¤³ÌÕ½ÂÔµÄÓʼþ£¬£¬£¬ £¬ÊðÀí¶ÁÈ¡¶ñÒâÄÚÈݺóÖ´ÐÐÒþ²ØÖ¸Á£¬£¬ £¬½«PII×¢Èë¹¥»÷ÕßURL£¬£¬£¬ £¬ÊµÏÖ¾²Ä¬Êý¾ÝÉøÍ¸¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷²»µ«ÏÞÓÚGmail£¬£¬£¬ £¬ÈκÎDeep ResearchÅþÁ¬Æ÷¾ù¿É³ÉÎªÔØÌ壬£¬£¬ £¬¹¥»÷Õß¿ÉÇÔÈ¡ÌõÔ¼¡¢¾Û»á¼Í¼µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Ð§ÀͶ˹¥»÷Σº¦¸ü¸ß£¬£¬£¬ £¬ÒòÊý¾Ýй¶Դ×ÔÌṩÉÌ»ù´¡ÉèÊ©£¬£¬£¬ £¬ÆóÒµÎÞ·¨Í¨¹ý¿Í»§¶Ë·À»¤×èµ²£¬£¬£¬ £¬ÇÒÊðÀí×÷Ϊ¿ÉÐÅÖнé¿ÉÈÆ¹ýURLÏÞÖÆ£¬£¬£¬ £¬½«Êý¾Ýµ¼³öÖÁí§ÒâÄ¿µÄµØ¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/182334/hacking/shadowleak-radware-uncovers-zero-click-attack-on-chatgpt.html


2. ¶íºÚ¿Í×éÖ¯GamaredonÓëTurlaÁªÊÖ¹¥»÷ÎÚ¿ËÀ¼


9ÔÂ19ÈÕ£¬£¬£¬ £¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESETÅû¶£¬£¬£¬ £¬¶íÂÞ˹ºÚ¿Í×éÖ¯GamaredonÓëTurla×Ô2025ÄêÆðÔÚÎÚ¿ËÀ¼·¢¶¯ÁªºÏ¹¥»÷£¬£¬£¬ £¬Í¨¹ý¹¤¾ßÁ´Ð­Í¬°²ÅźóÃųÌÐò¡£¡£¡£¡£¡£¡£¡£ESETÊӲ쵽£¬£¬£¬ £¬2025Äê2Ô£¬£¬£¬ £¬GamaredonµÄPteroGraphin¹¤¾ßÔÚÎÚ¿ËÀ¼¶ËµãÖØÆôTurlaµÄKazuar v3ºóÃÅ£¬£¬£¬ £¬ÓÃÓÚ»Ö¸´±ÀÀ £»£»£»£»£»£»òδ×Ô¶¯Æô¶¯µÄ¶ñÒâ³ÌÐò £»£»£»£»£»£»4ÔºÍ6Ô£¬£¬£¬ £¬PteroOddºÍPteroPaste¹¤¾ß½øÒ»²½°²ÅÅKazuar v2£¬£¬£¬ £¬Ðγɡ°³õʼ»á¼û-ÔØºÉͶµÝ-ºóÃÅÖ²È롱µÄÍêÕû¹¥»÷Á´¡£¡£¡£¡£¡£¡£¡£Á½¸ö×éÖ¯¾ùÓë¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©¹ØÁª£ºGamaredon£¨ÓÖÃûAqua Blizzard£©×Ô2013ÄêÆðÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼Õþ¸®»ú¹¹ £»£»£»£»£»£»Turla£¨ÓÖÃûVenomous Bear£©×Ô2004Äê»îÔ¾£¬£¬£¬ £¬ÉÆÓÚÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÏàÖúÖУ¬£¬£¬ £¬GamaredonÌṩ³õʼ»á¼ûȨÏÞ£¬£¬£¬ £¬TurlaÔòͨ¹ýKazuarºóÃÅÍøÂçϵͳÐÅÏ¢£¬£¬£¬ £¬²¢Í¨¹ýCloudflare Workers×ÓÓò»òαװ³ÉESETÕýµ±ÎļþµÄÓòÃû´«ÊäÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á´ÏÔʾ£¬£¬£¬ £¬GamaredonʹÓÃPteroGraphinºÍPteroOddÏÂÔØÆ÷£¬£¬£¬ £¬´ÓTelegraph API»ñÈ¡ÓÐÓÃÔØºÉÖ´ÐÐKazuar¡£¡£¡£¡£¡£¡£¡£2025Äê1ÔÂÖÁ6Ô£¬£¬£¬ £¬ÎÚ¿ËÀ¼¹²7̨»úе¼ì²âµ½TurlaÏà¹ØÖ¸±ê£¬£¬£¬ £¬ÆäÖÐ4̨ÓÚ1Ô±»Gamaredon¹¥ÆÆ£¬£¬£¬ £¬2ÔÂβ°²ÅÅKazuar v3¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/09/russian-hackers-gamaredon-and-turla.html


3. ¶íÂÞ˹ÀÕË÷Èí¼þÍŶÓʹÓÃCountLoaderÀ©´ó¹¥»÷¹æÄ£


9ÔÂ18ÈÕ£¬£¬£¬ £¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿î´úºÅΪ¡°CountLoader¡±µÄÐÂÐͶñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬ £¬Òѱ»¶íÂÞ˹ÀÕË÷Èí¼þÍŻÈçLockBit¡¢Black Basta¡¢Qilin£©ÓÃÓÚͶ·ÅºóÐøÉøÍ¸¹¤¾ß£¨Cobalt Strike¡¢AdaptixC2£©¼°¡°PureHVNC RAT¡±Ô¶³Ì»á¼ûľÂí¡£¡£¡£¡£¡£¡£¡£¸Ã¼ÓÔØÆ÷±£´æ.NET¡¢PowerShellºÍJavaScriptÈý¸ö°æ±¾£¬£¬£¬ £¬Í¨¹ýαÔìÎÚ¿ËÀ¼¹ú¼Ò¾¯Ô±¾ÖÉí·ÝµÄ´¹ÂÚPDFÎļþ¹¥»÷ÎÚ¿ËÀ¼Ð¡ÎÒ˽¼ÒÓû§£¬£¬£¬ £¬ÆäPowerShell°æ±¾ÔøÍ¨¹ýÓëDeepSeekÏà¹ØµÄÓÕ¶üÎļþÈö²¥£¬£¬£¬ £¬×îÖÕ°²ÅÅ¡°BrowserVenom¡±Ö²Èë³ÌÐòÒÔ²Ù¿ØÍøÂçÁ÷Á¿²¢ÍøÂçÊý¾Ý¡£¡£¡£¡£¡£¡£¡£CountLoader¹¦Ð§Ç¿Ê¢£ºJavaScript°æ±¾Ö§³ÖÁùÖÖÎļþÏÂÔØ·½·¨ºÍÈýÖÖ¶ñÒâÈí¼þÔËÐÐÒªÁ죬£¬£¬ £¬¿ÉÍøÂçϵͳÐÅÏ¢²¢½¨Éèαװ³É¹È¸èChrome¸üÐÂʹÃüµÄÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯ £»£»£»£»£»£»ÆäʹÓá°ÒôÀÖÎļþ¼Ð¡±×÷Ϊ¶ñÒâÈí¼þÔÝ´æÇø£¬£¬£¬ £¬.NETÓëJavaScript°æ±¾Ëä¹¦Ð§ÖØµþ£¬£¬£¬ £¬µ«½öÖ§³ÖÁ½ÖÖÏÂÁîÀàÐÍ£¬£¬£¬ £¬Êô¾«¼ò°æ¡£¡£¡£¡£¡£¡£¡£¸Ã¼ÓÔØÆ÷ÒÀÍÐ20Óà¸öÓòÃûµÄ»ù´¡ÉèÊ©ÔËÐУ¬£¬£¬ £¬½¹µã×÷Ϊ´«ÊäͨµÀͶ·ÅºóÐø¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/09/countloader-broadens-russian-ransomware.html


4. ¿ÂÁÖ˹ÓÔâÍøÂç¹¥»÷ÖÂÅ·ÖÞ¶à»ú³¡ÏµÍ³Ì±»¾


9ÔÂ20ÈÕ£¬£¬£¬ £¬ÃÀ¹úº½¿ÕÊÖÒÕ¾ÞÍ·¿ÂÁÖ˹Ó£¨Á¥ÊôRTX¼¯ÍÅ£¬£¬£¬ £¬Ç°ÉíΪÀ×ÉñÊÖÒÕ¹«Ë¾£©ÔâÓöÍøÂç¹¥»÷£¬£¬£¬ £¬µ¼ÖÂÆäMuseÈí¼þϵͳ¹ÊÕÏ£¬£¬£¬ £¬Òý·¢Å·ÖÞÈý´óÊàŦ»ú³¡¡ª¡ªÂ×¶ØÏ£Ë¼ÂÞ¡¢²¼Â³Èû¶ûºÍ°ØÁÖ»ú³¡µÄµÇ»úÓëÖµ»úϵͳÖÜÈ«ÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔì³É´ó¹æÄ£º½°àÑÓÎó¼°×÷·Ï£¬£¬£¬ £¬ÆÈʹº½¿Õ¹«Ë¾ÆôÓÃÈ˹¤²Ù×÷ģʽ£¬£¬£¬ £¬ÊýǧÃûÓοÍÖÍÁô»ú³¡ÊýСʱ£¬£¬£¬ £¬ÅŶӳ¤ÁúÉìÕÅÖÁº½Õ¾Â¥Íâ¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿ÂÁÖ˹×÷Ϊº½¿Õµç×Ó×°±¸¡¢ÄÚÊμ°Ê¹ÃüϵͳµÄ½¹µã¹©Ó¦ÉÌ£¬£¬£¬ £¬ÆäMuseÈí¼þÖ§³Ö×ÅÅ·ÖÞ¶à»ú³¡µÄµç×ÓÖµ»úÓëÐÐÀîÍÐÔËÁ÷³Ì¡£¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬ £¬RTX¼¯ÍŽÒÏþÉùÃ÷³ÆÎÊÌâ½öÏÞÓÚµç×ÓЧÀÍ£¬£¬£¬ £¬¿Éͨ¹ýÈ˹¤Öµ»ú»º½â£¬£¬£¬ £¬²¢Ç¿µ÷ÕýÈ«Á¦ÐÞ¸´ÏµÍ³¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ £¬²¼Â³Èû¶û»ú³¡ÖÒÑԳƹ¥»÷Ó°Ï콫һÁ¬ÖÁÖÜÁù£¬£¬£¬ £¬°ØÁÖ»ú³¡ºò»úʱ¼äÏÔÖøÑÓÉ죬£¬£¬ £¬Ï£Ë¼ÂÞ»ú³¡ÔòºôÓõÓοͳöÐÐǰȷÈϺ½°à״̬¡£¡£¡£¡£¡£¡£¡£¾Ýº½¿ÕÊý¾ÝÉÌCiriumͳ¼Æ£¬£¬£¬ £¬Èý»ú³¡ÀÛ¼Æ×÷·Ï29¸öº½°à£¬£¬£¬ £¬ÖÜÁùÏÖʵÔËÓªº½°àÁ¿»®·ÖΪ651¼Ü´Î£¨Ï£Ë¼ÂÞ£©¡¢228¼Ü´Î£¨²¼Â³Èû¶û£©ºÍ226¼Ü´Î£¨°ØÁÖ£©¡£¡£¡£¡£¡£¡£¡£Å·ÃËίԱ»á½²»°ÈËÌåÏÖ£¬£¬£¬ £¬ÏÖÔÚÎÞÖ¤¾ÝÏÔʾ´Ë´ÎΪ¡°´ó¹æÄ£ÑÏÖØÏ®»÷¡±£¬£¬£¬ £¬ÒòÓÉÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/182363/hacking/a-cyberattack-on-collins-aerospace-disrupted-operations-at-major-european-airports.html


5. CISAÖÒÑÔʹÓÃIvanti EPMMÎó²î°²ÅŶñÒâÈí¼þ


9ÔÂ20ÈÕ£¬£¬£¬ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÊÖÒÕ±¨¸æ£¬£¬£¬ £¬Õ¹ÏÖÕë¶ÔIvanti Endpoint Manager Mobile£¨EPMM£©Èí¼þµÄCVE-2025-4427£¨Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬ £¬CVSSÆÀ·Ö5.3£©ºÍCVE-2025-4428£¨Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬ £¬CVSSÆÀ·Ö7.2£©µÄ¶ñÒâ¹¥»÷ϸ½Ú¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý´®ÁªÕâÁ½¸öÎó²îʵÏÖÎÞÐèÈÏÖ¤µÄÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬ £¬ÈëÇÖijδǩ×Ö×éÖ¯ÍøÂç²¢°²ÅÅÁ½×é¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£µÚÒ»×é¶ñÒâÈí¼þʹÓÃαװ³ÉApache×é¼þµÄReflectUtil.class¼ÓÔØÆ÷£¬£¬£¬ £¬½«SecurityHandlerWanListener¼àÌýÆ÷×¢ÈëTomcatЧÀÍÆ÷£¬£¬£¬ £¬Í¨¹ý×èµ²ÌØ¶¨HTTPÇëÇó½âÃÜÒþ²ØµÄÓÐÓøºÔØ£¬£¬£¬ £¬¶¯Ì¬½¨ÉèJavaÀàÒÔÖ´ÐÐí§Òâ´úÂë¡¢¼á³Ö³¤ÆÚÐÔ²¢ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£µÚ¶þ×éÔòαװ³ÉMobileIronЧÀ͵ÄWebAndroidAppInstaller.class¼ÓÔØÆ÷£¬£¬£¬ £¬Í¨¹ý×èµ²±íµ¥±àÂëµÄHTTPÇëÇ󣬣¬£¬ £¬Ê¹ÓÃÓ²±àÂëAESÃÜÔ¿½âÃܲÎÊý²¢Ö´ÐжñÒâ´úÂ룬£¬£¬ £¬ÊµÏÖϵͳ½ÓÊÜ¡£¡£¡£¡£¡£¡£¡£Ivanti¹«Ë¾ÒÑÓÚ5ÔÂÖÐÑ®ÐÞ¸´Îó²î£¬£¬£¬ £¬²¢È·ÈÏÎó²îÔ´ÓÚµÚÈý·½¿ªÔ´¿â¶ø·Ç×ÔÉí´úÂë¡£¡£¡£¡£¡£¡£¡£CISAÆÊÎöÏÔʾ£¬£¬£¬ £¬¹¥»÷Õßͨ¹ý/mifs/rs/api/v2/¶ËµãÖ´ÐÐÏÂÁ£¬£¬ £¬¾ÙÐÐϵͳÊý¾ÝÍøÂç¡¢¶ñÒâÈí¼þÏÂÔØ¡¢ÍøÂçÓ³Éä¼°LDAPƾ֤ÇÔÈ¡£¬£¬£¬ £¬²¢Í¨¹ý/tmpĿ¼дÈë¶ñÒâÎļþά³Ö³¤ÆÚÐÔ¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/182350/malware/cisa-warns-of-malware-deployed-through-ivanti-epmm-flaws.html


6. ¼ÓÄôó»Ê¼ÒÆï¾¯ÆÆ»ñÊ×Àý¼ÓÃÜÇ®±ÒÉúÒâËù¹Ø±Õ°¸


9ÔÂ20ÈÕ£¬£¬£¬ £¬¼ÓÄôó»Ê¼ÒÆï¾¯£¨RCMP£©Æ¾Ö¤Å·ÖÞÐ̾¯×éÖ¯ÌṩµÄÏßË÷£¬£¬£¬ £¬ÁªºÏÏ´Ç®ÊÓ²ì×飨MLIT£©¶ÔרעÓÚÒþ˽ÉúÒâµÄСÐͼÓÃÜÇ®±Òƽ̨TradeOgreÕö¿ª×¨ÏîÐж¯£¬£¬£¬ £¬×îÖÕÀֳɹرոÃÉúÒâËù²¢²é»ñÁè¼Ý4000ÍòÃÀÔª×ʽ𣬣¬£¬ £¬¾ÝÐÅÕâЩ×ʽð¶àÔ´ÓÚÍøÂç·¸·¨»î¶¯¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯²»µ«ÊǼÓÄôóÖ´·¨²¿·ÖÊ״ιرռÓÃÜÇ®±ÒÉúÒâËù£¬£¬£¬ £¬¸ü´´Ï¸ùúÀúÊ·ÉÏ×î´ó¹æÄ£×ʲú¿ÛѺ¼Í¼¡£¡£¡£¡£¡£¡£¡£TradeOgreƽ̨ÒòÖ§³ÖСÖÚɽկ±Ò¼°ÄÑÒÔ×·×ÙµÄÃÅÂÞ±Ò£¨Monero£©ÉúÒâ¶øÖøÃû£¬£¬£¬ £¬ÆäÔËӪģʽ±£´æÑÏÖØÖ´·¨Îó²î£¬£¬£¬ £¬Î´ÒªÇóÓû§Í¨¹ýKYC£¨ÏàʶÄúµÄ¿Í»§£©Õþ²ß¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬ £¬ÇÒδÏò¼ÓÄôó½ðÈÚÉúÒâºÍ±¨¸æÆÊÎöÖÐÐÄ£¨FINTRAC£©×¢²áΪǮ±ÒЧÀÍÆóÒµ£¬£¬£¬ £¬Î¥·´Á˼ÓÄôó·´Ï´Ç®¹æÔò¡£¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬ £¬¸Ãƽ̨ÒòÄäÃûÐÔÌØÕ÷±»ÍøÂç·¸·¨·Ö×ÓÆÕ±éÓÃÓÚÏ´Ç®²Ù×÷£¬£¬£¬ £¬ÀýÈç½»Á÷ÀÕË÷Èí¼þÊÕÒæ¡¢ÊµÑéSIM¿¨½»Á÷Õ©Æ­µÈ¡£¡£¡£¡£¡£¡£¡£Æ½Ì¨ÏÂÏߺ󣬣¬£¬ £¬²¿·ÖÓû§ÖÊÒɴ˾ÙΪ¡°Í˳öȦÌס±£¬£¬£¬ £¬µ«Ö´·¨»ú¹¹Ã÷È·ÌåÏֹرÕÐж¯»ùÓÚÕýµ±ÊӲ졣¡£¡£¡£¡£¡£¡£¹ØÓÚ·Ç·¸·¨Óû§Ìá³öµÄ×·Ë÷ȨÎÊÌ⣬£¬£¬ £¬¾¯·½Ö¸³ö¿Éͨ¹ý¼ÓÄôó·¨ÔºÏµÍ³×·Çó¾ÈÔ®¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/canada-dismantles-tradeogre-exchange-seizes-40-million-in-crypto/