ShadowLeak¹¥»÷£ºChatGPTЧÀÍÆ÷¶ËÊý¾ÝÇÔÈ¡µÄÐÂÍþв
Ðû²¼Ê±¼ä 2025-09-221. ShadowLeak¹¥»÷£ºChatGPTЧÀÍÆ÷¶ËÊý¾ÝÇÔÈ¡µÄÐÂÍþв
9ÔÂ18ÈÕ£¬£¬£¬£¬RadwareÑо¿Ö°Ô±·¢Ã÷ÃûΪShadowLeakµÄÐÂÐ͹¥»÷£¬£¬£¬£¬Ê¹ÓÃChatGPTµÄDeep ResearchÊðÀíʵÏÖÁãµã»÷ЧÀÍÆ÷¶ËÊý¾ÝÇÔÈ¡¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ͨ¹ýÈ«ÐÄÉè¼ÆµÄµç×ÓÓʼþÖÐÒþ²ØHTMLÖ¸Á£¬£¬£¬ÔÚÓû§ÎÞ²Ù×÷»ò¿É¼û½çÃæÌáÐѵÄÇéÐÎÏ£¬£¬£¬£¬´¥·¢ÊðÀí´ÓGmailÊÕ¼þÏäÌáȡСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©²¢¾²Ä¬·¢ËÍÖÁ¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£Çø±ðÓÚÒÀÀµ¿Í»§¶ËͼÏñäÖȾµÄ¿Í»§¶Ë¹¥»÷£¬£¬£¬£¬ShadowLeakÖ±½Ó´ÓOpenAIÔÆ»ù´¡Éèʩй¶Êý¾Ý£¬£¬£¬£¬Ê¹ÆóÒµ·ÀÓùϵͳÄÑÒÔ¼ì²â£¬£¬£¬£¬Óû§ÒàÎÞ¸ÐÖª¡£¡£¡£¡£¡£¡£¡£Deep ResearchÔÊÐíChatGPT×ÔÖ÷ä¯ÀÀÍøÒ³5-30·ÖÖÓÌìÉúÏêϸ±¨¸æ£¬£¬£¬£¬²¢ÓëGmailµÈÓ¦Óü¯³É¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á÷³ÌÖУ¬£¬£¬£¬¹¥»÷Õß·¢ËͰüÀ¨Éç»á¹¤³ÌÕ½ÂÔµÄÓʼþ£¬£¬£¬£¬ÊðÀí¶ÁÈ¡¶ñÒâÄÚÈݺóÖ´ÐÐÒþ²ØÖ¸Á£¬£¬£¬½«PII×¢Èë¹¥»÷ÕßURL£¬£¬£¬£¬ÊµÏÖ¾²Ä¬Êý¾ÝÉøÍ¸¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷²»µ«ÏÞÓÚGmail£¬£¬£¬£¬ÈκÎDeep ResearchÅþÁ¬Æ÷¾ù¿É³ÉÎªÔØÌ壬£¬£¬£¬¹¥»÷Õß¿ÉÇÔÈ¡ÌõÔ¼¡¢¾Û»á¼Í¼µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Ð§ÀͶ˹¥»÷Σº¦¸ü¸ß£¬£¬£¬£¬ÒòÊý¾Ýй¶Դ×ÔÌṩÉÌ»ù´¡ÉèÊ©£¬£¬£¬£¬ÆóÒµÎÞ·¨Í¨¹ý¿Í»§¶Ë·À»¤×èµ²£¬£¬£¬£¬ÇÒÊðÀí×÷Ϊ¿ÉÐÅÖнé¿ÉÈÆ¹ýURLÏÞÖÆ£¬£¬£¬£¬½«Êý¾Ýµ¼³öÖÁí§ÒâÄ¿µÄµØ¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/182334/hacking/shadowleak-radware-uncovers-zero-click-attack-on-chatgpt.html
2. ¶íºÚ¿Í×éÖ¯GamaredonÓëTurlaÁªÊÖ¹¥»÷ÎÚ¿ËÀ¼
9ÔÂ19ÈÕ£¬£¬£¬£¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESETÅû¶£¬£¬£¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯GamaredonÓëTurla×Ô2025ÄêÆðÔÚÎÚ¿ËÀ¼·¢¶¯ÁªºÏ¹¥»÷£¬£¬£¬£¬Í¨¹ý¹¤¾ßÁ´Ðͬ°²ÅźóÃųÌÐò¡£¡£¡£¡£¡£¡£¡£ESETÊӲ쵽£¬£¬£¬£¬2025Äê2Ô£¬£¬£¬£¬GamaredonµÄPteroGraphin¹¤¾ßÔÚÎÚ¿ËÀ¼¶ËµãÖØÆôTurlaµÄKazuar v3ºóÃÅ£¬£¬£¬£¬ÓÃÓÚ»Ö¸´±ÀÀ£»£»£»£»£»£»òδ×Ô¶¯Æô¶¯µÄ¶ñÒâ³ÌÐò£»£»£»£»£»£»4ÔºÍ6Ô£¬£¬£¬£¬PteroOddºÍPteroPaste¹¤¾ß½øÒ»²½°²ÅÅKazuar v2£¬£¬£¬£¬Ðγɡ°³õʼ»á¼û-ÔØºÉͶµÝ-ºóÃÅÖ²È롱µÄÍêÕû¹¥»÷Á´¡£¡£¡£¡£¡£¡£¡£Á½¸ö×éÖ¯¾ùÓë¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©¹ØÁª£ºGamaredon£¨ÓÖÃûAqua Blizzard£©×Ô2013ÄêÆðÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼Õþ¸®»ú¹¹£»£»£»£»£»£»Turla£¨ÓÖÃûVenomous Bear£©×Ô2004Äê»îÔ¾£¬£¬£¬£¬ÉÆÓÚÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÏàÖúÖУ¬£¬£¬£¬GamaredonÌṩ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬TurlaÔòͨ¹ýKazuarºóÃÅÍøÂçϵͳÐÅÏ¢£¬£¬£¬£¬²¢Í¨¹ýCloudflare Workers×ÓÓò»òαװ³ÉESETÕýµ±ÎļþµÄÓòÃû´«ÊäÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á´ÏÔʾ£¬£¬£¬£¬GamaredonʹÓÃPteroGraphinºÍPteroOddÏÂÔØÆ÷£¬£¬£¬£¬´ÓTelegraph API»ñÈ¡ÓÐÓÃÔØºÉÖ´ÐÐKazuar¡£¡£¡£¡£¡£¡£¡£2025Äê1ÔÂÖÁ6Ô£¬£¬£¬£¬ÎÚ¿ËÀ¼¹²7̨»úе¼ì²âµ½TurlaÏà¹ØÖ¸±ê£¬£¬£¬£¬ÆäÖÐ4̨ÓÚ1Ô±»Gamaredon¹¥ÆÆ£¬£¬£¬£¬2ÔÂβ°²ÅÅKazuar v3¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/09/russian-hackers-gamaredon-and-turla.html
3. ¶íÂÞ˹ÀÕË÷Èí¼þÍŶÓʹÓÃCountLoaderÀ©´ó¹¥»÷¹æÄ£
9ÔÂ18ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿î´úºÅΪ¡°CountLoader¡±µÄÐÂÐͶñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬£¬Òѱ»¶íÂÞ˹ÀÕË÷Èí¼þÍŻÈçLockBit¡¢Black Basta¡¢Qilin£©ÓÃÓÚͶ·ÅºóÐøÉøÍ¸¹¤¾ß£¨Cobalt Strike¡¢AdaptixC2£©¼°¡°PureHVNC RAT¡±Ô¶³Ì»á¼ûľÂí¡£¡£¡£¡£¡£¡£¡£¸Ã¼ÓÔØÆ÷±£´æ.NET¡¢PowerShellºÍJavaScriptÈý¸ö°æ±¾£¬£¬£¬£¬Í¨¹ýαÔìÎÚ¿ËÀ¼¹ú¼Ò¾¯Ô±¾ÖÉí·ÝµÄ´¹ÂÚPDFÎļþ¹¥»÷ÎÚ¿ËÀ¼Ð¡ÎÒ˽¼ÒÓû§£¬£¬£¬£¬ÆäPowerShell°æ±¾ÔøÍ¨¹ýÓëDeepSeekÏà¹ØµÄÓÕ¶üÎļþÈö²¥£¬£¬£¬£¬×îÖÕ°²ÅÅ¡°BrowserVenom¡±Ö²Èë³ÌÐòÒÔ²Ù¿ØÍøÂçÁ÷Á¿²¢ÍøÂçÊý¾Ý¡£¡£¡£¡£¡£¡£¡£CountLoader¹¦Ð§Ç¿Ê¢£ºJavaScript°æ±¾Ö§³ÖÁùÖÖÎļþÏÂÔØ·½·¨ºÍÈýÖÖ¶ñÒâÈí¼þÔËÐÐÒªÁ죬£¬£¬£¬¿ÉÍøÂçϵͳÐÅÏ¢²¢½¨Éèαװ³É¹È¸èChrome¸üÐÂʹÃüµÄÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯£»£»£»£»£»£»ÆäʹÓá°ÒôÀÖÎļþ¼Ð¡±×÷Ϊ¶ñÒâÈí¼þÔÝ´æÇø£¬£¬£¬£¬.NETÓëJavaScript°æ±¾Ëä¹¦Ð§ÖØµþ£¬£¬£¬£¬µ«½öÖ§³ÖÁ½ÖÖÏÂÁîÀàÐÍ£¬£¬£¬£¬Êô¾«¼ò°æ¡£¡£¡£¡£¡£¡£¡£¸Ã¼ÓÔØÆ÷ÒÀÍÐ20Óà¸öÓòÃûµÄ»ù´¡ÉèÊ©ÔËÐУ¬£¬£¬£¬½¹µã×÷Ϊ´«ÊäͨµÀͶ·ÅºóÐø¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/09/countloader-broadens-russian-ransomware.html
4. ¿ÂÁÖ˹ÓÔâÍøÂç¹¥»÷ÖÂÅ·ÖÞ¶à»ú³¡ÏµÍ³Ì±»¾
9ÔÂ20ÈÕ£¬£¬£¬£¬ÃÀ¹úº½¿ÕÊÖÒÕ¾ÞÍ·¿ÂÁÖ˹Ó£¨Á¥ÊôRTX¼¯ÍÅ£¬£¬£¬£¬Ç°ÉíΪÀ×ÉñÊÖÒÕ¹«Ë¾£©ÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬µ¼ÖÂÆäMuseÈí¼þϵͳ¹ÊÕÏ£¬£¬£¬£¬Òý·¢Å·ÖÞÈý´óÊàŦ»ú³¡¡ª¡ªÂ×¶ØÏ£Ë¼ÂÞ¡¢²¼Â³Èû¶ûºÍ°ØÁÖ»ú³¡µÄµÇ»úÓëÖµ»úϵͳÖÜÈ«ÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔì³É´ó¹æÄ£º½°àÑÓÎó¼°×÷·Ï£¬£¬£¬£¬ÆÈʹº½¿Õ¹«Ë¾ÆôÓÃÈ˹¤²Ù×÷ģʽ£¬£¬£¬£¬ÊýǧÃûÓοÍÖÍÁô»ú³¡ÊýСʱ£¬£¬£¬£¬ÅŶӳ¤ÁúÉìÕÅÖÁº½Õ¾Â¥Íâ¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿ÂÁÖ˹×÷Ϊº½¿Õµç×Ó×°±¸¡¢ÄÚÊμ°Ê¹ÃüϵͳµÄ½¹µã¹©Ó¦ÉÌ£¬£¬£¬£¬ÆäMuseÈí¼þÖ§³Ö×ÅÅ·ÖÞ¶à»ú³¡µÄµç×ÓÖµ»úÓëÐÐÀîÍÐÔËÁ÷³Ì¡£¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬£¬RTX¼¯ÍŽÒÏþÉùÃ÷³ÆÎÊÌâ½öÏÞÓÚµç×ÓЧÀÍ£¬£¬£¬£¬¿Éͨ¹ýÈ˹¤Öµ»ú»º½â£¬£¬£¬£¬²¢Ç¿µ÷ÕýÈ«Á¦ÐÞ¸´ÏµÍ³¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬²¼Â³Èû¶û»ú³¡ÖÒÑԳƹ¥»÷Ó°Ï콫һÁ¬ÖÁÖÜÁù£¬£¬£¬£¬°ØÁÖ»ú³¡ºò»úʱ¼äÏÔÖøÑÓÉ죬£¬£¬£¬Ï£Ë¼ÂÞ»ú³¡ÔòºôÓõÓοͳöÐÐǰȷÈϺ½°à״̬¡£¡£¡£¡£¡£¡£¡£¾Ýº½¿ÕÊý¾ÝÉÌCiriumͳ¼Æ£¬£¬£¬£¬Èý»ú³¡ÀÛ¼Æ×÷·Ï29¸öº½°à£¬£¬£¬£¬ÖÜÁùÏÖʵÔËÓªº½°àÁ¿»®·ÖΪ651¼Ü´Î£¨Ï£Ë¼ÂÞ£©¡¢228¼Ü´Î£¨²¼Â³Èû¶û£©ºÍ226¼Ü´Î£¨°ØÁÖ£©¡£¡£¡£¡£¡£¡£¡£Å·ÃËίԱ»á½²»°ÈËÌåÏÖ£¬£¬£¬£¬ÏÖÔÚÎÞÖ¤¾ÝÏÔʾ´Ë´ÎΪ¡°´ó¹æÄ£ÑÏÖØÏ®»÷¡±£¬£¬£¬£¬ÒòÓÉÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/182363/hacking/a-cyberattack-on-collins-aerospace-disrupted-operations-at-major-european-airports.html
5. CISAÖÒÑÔʹÓÃIvanti EPMMÎó²î°²ÅŶñÒâÈí¼þ
9ÔÂ20ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÊÖÒÕ±¨¸æ£¬£¬£¬£¬Õ¹ÏÖÕë¶ÔIvanti Endpoint Manager Mobile£¨EPMM£©Èí¼þµÄCVE-2025-4427£¨Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬CVSSÆÀ·Ö5.3£©ºÍCVE-2025-4428£¨Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬CVSSÆÀ·Ö7.2£©µÄ¶ñÒâ¹¥»÷ϸ½Ú¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý´®ÁªÕâÁ½¸öÎó²îʵÏÖÎÞÐèÈÏÖ¤µÄÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬ÈëÇÖijδǩ×Ö×éÖ¯ÍøÂç²¢°²ÅÅÁ½×é¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£µÚÒ»×é¶ñÒâÈí¼þʹÓÃαװ³ÉApache×é¼þµÄReflectUtil.class¼ÓÔØÆ÷£¬£¬£¬£¬½«SecurityHandlerWanListener¼àÌýÆ÷×¢ÈëTomcatЧÀÍÆ÷£¬£¬£¬£¬Í¨¹ý×èµ²ÌØ¶¨HTTPÇëÇó½âÃÜÒþ²ØµÄÓÐÓøºÔØ£¬£¬£¬£¬¶¯Ì¬½¨ÉèJavaÀàÒÔÖ´ÐÐí§Òâ´úÂë¡¢¼á³Ö³¤ÆÚÐÔ²¢ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£µÚ¶þ×éÔòαװ³ÉMobileIronЧÀ͵ÄWebAndroidAppInstaller.class¼ÓÔØÆ÷£¬£¬£¬£¬Í¨¹ý×èµ²±íµ¥±àÂëµÄHTTPÇëÇ󣬣¬£¬£¬Ê¹ÓÃÓ²±àÂëAESÃÜÔ¿½âÃܲÎÊý²¢Ö´ÐжñÒâ´úÂ룬£¬£¬£¬ÊµÏÖϵͳ½ÓÊÜ¡£¡£¡£¡£¡£¡£¡£Ivanti¹«Ë¾ÒÑÓÚ5ÔÂÖÐÑ®ÐÞ¸´Îó²î£¬£¬£¬£¬²¢È·ÈÏÎó²îÔ´ÓÚµÚÈý·½¿ªÔ´¿â¶ø·Ç×ÔÉí´úÂë¡£¡£¡£¡£¡£¡£¡£CISAÆÊÎöÏÔʾ£¬£¬£¬£¬¹¥»÷Õßͨ¹ý/mifs/rs/api/v2/¶ËµãÖ´ÐÐÏÂÁ£¬£¬£¬¾ÙÐÐϵͳÊý¾ÝÍøÂç¡¢¶ñÒâÈí¼þÏÂÔØ¡¢ÍøÂçÓ³Éä¼°LDAPƾ֤ÇÔÈ¡£¬£¬£¬£¬²¢Í¨¹ý/tmpĿ¼дÈë¶ñÒâÎļþά³Ö³¤ÆÚÐÔ¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/182350/malware/cisa-warns-of-malware-deployed-through-ivanti-epmm-flaws.html
6. ¼ÓÄôó»Ê¼ÒÆï¾¯ÆÆ»ñÊ×Àý¼ÓÃÜÇ®±ÒÉúÒâËù¹Ø±Õ°¸
9ÔÂ20ÈÕ£¬£¬£¬£¬¼ÓÄôó»Ê¼ÒÆï¾¯£¨RCMP£©Æ¾Ö¤Å·ÖÞÐ̾¯×éÖ¯ÌṩµÄÏßË÷£¬£¬£¬£¬ÁªºÏÏ´Ç®ÊÓ²ì×飨MLIT£©¶ÔרעÓÚÒþ˽ÉúÒâµÄСÐͼÓÃÜÇ®±Òƽ̨TradeOgreÕö¿ª×¨ÏîÐж¯£¬£¬£¬£¬×îÖÕÀֳɹرոÃÉúÒâËù²¢²é»ñÁè¼Ý4000ÍòÃÀÔª×ʽ𣬣¬£¬£¬¾ÝÐÅÕâЩ×ʽð¶àÔ´ÓÚÍøÂç·¸·¨»î¶¯¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯²»µ«ÊǼÓÄôóÖ´·¨²¿·ÖÊ״ιرռÓÃÜÇ®±ÒÉúÒâËù£¬£¬£¬£¬¸ü´´Ï¸ùúÀúÊ·ÉÏ×î´ó¹æÄ£×ʲú¿ÛѺ¼Í¼¡£¡£¡£¡£¡£¡£¡£TradeOgreƽ̨ÒòÖ§³ÖСÖÚɽկ±Ò¼°ÄÑÒÔ×·×ÙµÄÃÅÂÞ±Ò£¨Monero£©ÉúÒâ¶øÖøÃû£¬£¬£¬£¬ÆäÔËӪģʽ±£´æÑÏÖØÖ´·¨Îó²î£¬£¬£¬£¬Î´ÒªÇóÓû§Í¨¹ýKYC£¨ÏàʶÄúµÄ¿Í»§£©Õþ²ß¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬£¬ÇÒδÏò¼ÓÄôó½ðÈÚÉúÒâºÍ±¨¸æÆÊÎöÖÐÐÄ£¨FINTRAC£©×¢²áΪǮ±ÒЧÀÍÆóÒµ£¬£¬£¬£¬Î¥·´Á˼ÓÄôó·´Ï´Ç®¹æÔò¡£¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬¸Ãƽ̨ÒòÄäÃûÐÔÌØÕ÷±»ÍøÂç·¸·¨·Ö×ÓÆÕ±éÓÃÓÚÏ´Ç®²Ù×÷£¬£¬£¬£¬ÀýÈç½»Á÷ÀÕË÷Èí¼þÊÕÒæ¡¢ÊµÑéSIM¿¨½»Á÷թƵȡ£¡£¡£¡£¡£¡£¡£Æ½Ì¨ÏÂÏߺ󣬣¬£¬£¬²¿·ÖÓû§ÖÊÒɴ˾ÙΪ¡°Í˳öȦÌס±£¬£¬£¬£¬µ«Ö´·¨»ú¹¹Ã÷È·ÌåÏֹرÕÐж¯»ùÓÚÕýµ±ÊӲ졣¡£¡£¡£¡£¡£¡£¹ØÓÚ·Ç·¸·¨Óû§Ìá³öµÄ×·Ë÷ȨÎÊÌ⣬£¬£¬£¬¾¯·½Ö¸³ö¿Éͨ¹ý¼ÓÄôó·¨ÔºÏµÍ³×·Çó¾ÈÔ®¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/canada-dismantles-tradeogre-exchange-seizes-40-million-in-crypto/


¾©¹«Íø°²±¸11010802024551ºÅ