±¦Âí¼¯ÍÅÔâEverestÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2025-09-19

1. ±¦Âí¼¯ÍÅÔâEverestÀÕË÷Èí¼þ¹¥»÷


9ÔÂ17ÈÕ£¬£¬£¬£¬£¬µÂ¹ú±¦Âí¼¯ÍÅÔâÓöEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬£¬£¬³ÉΪ8ÔÂ31ÈսݱªÂ·»¢ºó²»µ½Ò»¸öÔÂÄÚµÚ¶þ¸ö±»ºÚµÄºÀ»ªÆû³µÆ·ÅÆ¡£¡£ ¡£¸Ã×éÖ¯ÔÚ°µÍøÑó´ÐÕ¾µãÐû²¼Í¨¸æ£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡Á˱¦Âí¡°Òªº¦Éó¼ÆÎļþ¡±£¬£¬£¬£¬£¬²¢ÉèÖÃÁ½¸öµ¹¼ÆÊ±ÖÓ£¬£¬£¬£¬£¬Ò»¸öÏÔʾ9ÔÂ14ÈÕ¡°Â¼Òô¡±½«²»¿ÉÓã¨Ê£Óàȱ·¦24Сʱ£©£¬£¬£¬£¬£¬ÁíÒ»¸öÒªÇó¹«Ë¾48СʱÄÚÁªÏµÌ¸ÅС£¡£ ¡£±¦Âí×ܲ¿Î»ÓÚĽÄáºÚ£¬£¬£¬£¬£¬ÓµÓÐ160,000ÃûÔ±¹¤£¬£¬£¬£¬£¬ÔÚ15¹úÉè30ÓàÉú²ú»ùµØ£¬£¬£¬£¬£¬2024ÄêÈ«Çò²úÁ¿³¬240ÍòÁ¾£¨ÖйúÕ¼30%£©£¬£¬£¬£¬£¬ÄêÊÕÈ볬1.42ÒÚÅ·Ôª¡£¡£ ¡£´Ë´Î¹¥»÷Éæ¼°ÆìÏÂMini¡¢ÀÍ˹À³Ë¹¼°MotorradĦÍгµ²¿·Ö¡£¡£ ¡£Everestδ͸¶ÊÇ·ñÇÔÈ¡¿Í»§Êý¾Ý¡£¡£ ¡£Everest×Ô2021Äê»îÔ¾£¬£¬£¬£¬£¬2023ÄêÒÔÀ´°µÍø²©¿ÍÁÐ248ÃûÊܺ¦Õߣ¬£¬£¬£¬£¬½ü12¸öÔ¹¥»÷³¬90Ãû×éÖ¯¡£¡£ ¡£±¦Âí¼¯ÍÅÉÐδ»ØÓ¦£¬£¬£¬£¬£¬ÊÂÎñÊÓ²ìÈÔÔÚ¾ÙÐС£¡£ ¡£


https://cybernews.com/news/bmw-ransomware-attack-everest-claim-everest-luxury-target-jlr-trend/


2. ·ðÂÞÀï´ï²¼ÀïÍßµÂÒ½ÁÆÐ­»áÔâ´ó¹æÄ£Êý¾Ýй¶


9ÔÂ18ÈÕ£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚ·ðÂÞÀï´ïÖÝÄ«¶û±¾µÄ²¼ÀïÍßµÂÒ½ÁÆÐ­»á1ÔÂÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£²¨¼°½ü25ÍòÈË¡£¡£ ¡£¸Ã»ú¹¹×÷ΪÍâµØÖ÷ÒªÒ½ÁƱ£½¡Ð§ÀÍÌṩÕߣ¬£¬£¬£¬£¬ÓÚ1ÔÂÖÐÑ®·¢Ã÷ϵͳÔâÈëÇÖ£¬£¬£¬£¬£¬¾­ÊÓ²ìÈ·ÈϹ¥»÷Õß¿ÉÄÜÇÔÈ¡ÁËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¼°Êܱ£»£»£»£»£»£» £»¤µÄ¿µ½¡Êý¾Ý¡£¡£ ¡£Ö»¹Ü9ÔÂ5ÈÕÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌύ֪ͨʱδÅû¶ÏêϸÈËÊý£¬£¬£¬£¬£¬µ«ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Ò½ÁÆÊý¾Ýй¶׷×ÙϵͳÏÔʾ£¬£¬£¬£¬£¬ÏÖʵÊÜÓ°ÏìÈËÊý¸ß´ï246,711ÈË£¬£¬£¬£¬£¬º­¸Ç»¼Õß¡¢Ô±¹¤¼°ÏàÖúͬ°éÏà¹ØÃô¸ÐÐÅÏ¢¡£¡£ ¡£BianLianÀÕË÷Èí¼þ×éÖ¯ÒÑÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÄÚÈݲ»µ«°üÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢Ó뿵½¡¼Í¼£¬£¬£¬£¬£¬»¹Éæ¼°»á¼Æ¡¢ÈËÁ¦×ÊÔ´Êý¾Ý¿â¼°ÏàÖú·½ÍùÀ´ÓʼþµÈÎļþ¡£¡£ ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬¸Ã×éÖ¯×Ô3ÔÂβÆðÒÑÎÞ¹ûÕæ»î¶¯¼Í¼£¬£¬£¬£¬£¬ÏÖÔÚ±»µÁÊý¾ÝÈ¥ÏòÈÔ²»Ã÷È·¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÊÂÎñÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬Ïà¹Ø»ú¹¹ÕýÊÔͼ׷ËÝÊý¾ÝÁ÷Ïò²¢ÆÀ¹ÀDZÔÚΣº¦¡£¡£ ¡£


https://www.securityweek.com/nearly-250000-impacted-by-data-breach-at-medical-associates-of-brevard/


3. ¶íÂÞ˹KrasAviaº½¿Õ¹«Ë¾ÒÉÔâÍøÂç¹¥»÷ÖÂÊý×ÖЧÀÍÖÐÖ¹


9ÔÂ18ÈÕ£¬£¬£¬£¬£¬¶íÂÞ˹µØÇøº½¿Õ¹«Ë¾KrasAviaÐû²¼ÉùÃ÷³Æ£¬£¬£¬£¬£¬Æä²¿·ÖÊý×ÖЧÀÍÒòϵͳ¹ÊÕÏÖÐÖ¹£¬£¬£¬£¬£¬³ÉΪÒÉËÆÍøÂç¹¥»÷À˳±Öиùúº½¿ÕÒµÔâÓöµÄ×îÐÂÊÂÎñ¡£¡£ ¡£Õâ¼Ò×ܲ¿Î»ÓÚ¿ËÀ­Ë¹ÅµÑǶû˹¿ËµÄº½Ë¾ÌåÏÖ£¬£¬£¬£¬£¬×¨¼ÒÕýÈ«Á¦½µµÍº½°àʱ¿Ì±íΣº¦²¢¾¡¿ì»Ö¸´ÔËÓª¡£¡£ ¡£×èÖ¹ÍâµØÊ±¼äÖÜËÄÍí¼ä£¬£¬£¬£¬£¬ÆäÍøÕ¾ÒṈ̃»¾£¬£¬£¬£¬£¬ÔÚÏßÊÛÆ±ÔÝÍ££¬£¬£¬£¬£¬ÂÿÍÎÞ·¨¾ÙÐÐÊý×ÖÖµ»ú£¬£¬£¬£¬£¬µ«º½°àÈÔ°´ÍýÏëÔËÐС£¡£ ¡£¸Ã¹«Ë¾Ö÷ÒªÖ´·ÉÖÐÎ÷²®ÀûÑǼ°Ãɹź½Ïß¡£¡£ ¡£Ö»¹ÜKrasAviaδÃ÷È·ÈÏ¿ÉÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ«ÏòÍâµØÃ½Ìå͸¶´Ë´Î¹ÊÕÏÓë¶íÂÞ˹Æì½¢º½Ë¾Aeroflot 7ÔÂβÔâÓöµÄ¹ÊÕÏÀàËÆ¡£¡£ ¡£Aeroflot´ËǰÒòÒÉËÆÍøÂç¹¥»÷µ¼ÖÂÑÏÖØÑÓÎóºÍ×÷·Ï£¬£¬£¬£¬£¬Ç×ÎÚ¿ËÀ¼ºÚ¿Í×éÖ¯¡°Ä¬È»ÎÚÑ»¡±£¨Silent Crow£©¼°°×¶íÂÞË¹ÍøÂçÓλ÷¶Ó£¨Belarusian Cyber Partisans£©Ðû³Æ¶Ô´ËÈÏÕæ£¬£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡Á˺½Ðмͼ¡¢ÄÚ²¿Í¨»°ÒôƵ¼°¼à¿Ø×ÊÁÏ¡£¡£ ¡£ÖÜËÄ£¬£¬£¬£¬£¬ÇøÓòÐÔTelegramƵµÀBorusÐû²¼½ØÍ¼£¬£¬£¬£¬£¬ÏÔʾKrasAviaÍøÒ³±»¸Ä¶¯£¬£¬£¬£¬£¬¶íº½¼°KrasAvia±êʶ±»»®µô£¬£¬£¬£¬£¬¸½ÎÄ¡°ÎÒÃÇ»¹Ã»×îÏÈ¡­¡­¡±£¬£¬£¬£¬£¬²¢·ºÆð¡°Ä¬È»ÎÚÑ»¡±Í·Ïñͼ±ê¡£¡£ ¡£


https://therecord.media/russia-krasavia-airline-disrupted-suspected-cyberattack


4. SystemBCÊðÀí½©Ê¬ÍøÂ磺ºã¾Ã»îÔ¾µÄ¶ñÒâÁ÷Á¿ÒýÇæ


9ÔÂ18ÈÕ£¬£¬£¬£¬£¬SystemBCÊðÀí½©Ê¬ÍøÂç×Ô2019ÄêÆðÒ»Á¬»îÔ¾£¬£¬£¬£¬£¬³ÉΪ¶à¸öÀÕË÷Èí¼þÍŻP·¸·¨×é֯ת´ï¶ñÒâÔØºÉµÄ½¹µãͨµÀ¡£¡£ ¡£¸ÃÍøÂçÈÕ¾ùά»¤Ô¼1500¸ö»úеÈ˽ڵ㣬£¬£¬£¬£¬Ö÷ҪʹÓÃÈ«Çò¹æÄ£ÄÚ±£´æÎ´ÐÞ²¹ÑÏÖØÎó²îµÄÉÌÒµÐéÄâרÓÃЧÀÍÆ÷£¨VPS£©¹¹½¨£¬£¬£¬£¬£¬ÆäÖнü80%µÄ½ÚµãÀ´×Ô×ðÐÍÉÌÒµ¹©Ó¦É̵ÄÊÜѬȾVPSϵͳ¡£¡£ ¡£ÕâЩЧÀÍÆ÷ƽ¾ù±£´æ20¸öδÐÞ¸´µÄÇå¾²ÎÊÌ⣬£¬£¬£¬£¬ÇÒÖÁÉÙ°üÀ¨Ò»¸ö¸ßΣÎó²î£¬£¬£¬£¬£¬²¿·Ö°¸ÀýÉõÖÁ̻¶161¸öÎó²î£¬£¬£¬£¬£¬µ¼ÖÂѬȾÊÙÃüÏÔÖøÑÓÉ죬£¬£¬£¬£¬½ü40%µÄϵͳѬȾʱ¼äÁè¼ÝÒ»¸öÔ¡£¡£ ¡£SystemBCµÄ½¹µã¹¦Ð§ÊÇÔÊÐí¹¥»÷Õßͨ¹ýÊÜѬȾÖ÷»ú·ÓɶñÒâÁ÷Á¿£¬£¬£¬£¬£¬²¢Òþ²ØÏÂÁîÓë¿ØÖÆ£¨C2£©»î¶¯ÒÔ¹æ±Ü¼ì²â¡£¡£ ¡£Æä80Óà¸öC2ЧÀÍÆ÷²»µ«Ö±½ÓÅþÁ¬ÊðÀí½Úµã£¬£¬£¬£¬£¬»¹ÎªREM Proxy¡¢Ô½ÄÏVN5SocksÊðÀíÍøÂç¼°¶íÂÞË¹ÍøÂçץȡ¹«Ë¾µÈ¿Í»§Ìṩ·Ö²ãЧÀÍ¡£¡£ ¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬¸ÃÍøÂçÓë¶íÂÞ˹±£´æÊÖÒÕ¹ØÁª£ºÐÂѬȾЧÀÍÆ÷»áÏÂÔØ´øÓжíÓï×¢Ê͵Äshell¾ç±¾£¬£¬£¬£¬£¬Ç¿ÖƲ¢ÐÐÔËÐÐËùÓÐSystemBCÑù±¾£»£»£»£»£»£» £»½¹µã½ÚµãÍйÜËùÓÐ180¸ö¶ñÒâÈí¼þÑù±¾¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/systembc-malware-turns-infected-vps-systems-into-proxy-highway/


5. PyPIʹGhostAction¹©Ó¦Á´¹¥»÷Öб»µÁµÄÁîÅÆÊ§Ð§


9ÔÂ18ÈÕ£¬£¬£¬£¬£¬PythonÈí¼þ»ù½ð»áÐû²¼ÒÑʹ9Ô³õGhostAction¹©Ó¦Á´¹¥»÷ÖÐÇÔÈ¡µÄËùÓÐPyPIÁîÅÆÊ§Ð§£¬£¬£¬£¬£¬²¢È·ÈÏÍþвÐÐΪÕßδÀÄÓÃÕâЩÁîÅÆÔÚPython°üË÷Òý£¨PyPI£©Ðû²¼¶ñÒâÈí¼þ¡£¡£ ¡£´Ë´ÎÊÂÎñÔ´ÓÚ9ÔÂ5ÈÕGitGuardianÔ±¹¤±¨¸æµÄ¶ñÒâGitHub ActionsÊÂÇéÁ÷£¨ÈçFastUUID£©ÊÔͼÇÔÈ¡PyPIÁîÅÆÖÁÔ¶³ÌЧÀÍÆ÷£¬£¬£¬£¬£¬ÁíÒ»Ñо¿Ö°Ô±Í¬ÈÕ·¢Ë͵ÄÏêÇéÓʼþÒòÎóÈëÀ¬»øÓʼþÎļþ¼Ð£¬£¬£¬£¬£¬µ¼ÖÂPyPIÇå¾²ÍŶÓÖ±ÖÁ9ÔÂ10Èղůô¶¯ÏìÓ¦¡£¡£ ¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÐ޸Ĵ洢¿âÊÂÇéÁ÷£¬£¬£¬£¬£¬½«´æ´¢ÎªGitHubÉñÃØµÄPyPIÁîÅÆ·¢ËÍÖÁÍⲿЧÀÍÆ÷¡£¡£ ¡£Ö»¹ÜÀÖ³ÉÇÔÈ¡²¿·ÖÁîÅÆ£¬£¬£¬£¬£¬µ«Î´ÔÚPyPIƽ̨ʹÓᣡ£ ¡£GitGuardianÔÚ³¬570¸öÊÜÓ°Ïì´æ´¢¿âÖÐÌá½»GitHubÎÊÌ⣬£¬£¬£¬£¬²¢×ª´ïGitHub¡¢npm¼°PyPIÇå¾²ÍŶÓ¡£¡£ ¡£PyPIÍŶÓËæºóʹËùÓÐÊÜÓ°ÏìÁîÅÆÊ§Ð§£¬£¬£¬£¬£¬Ð­ÖúÏîÄ¿ËùÓÐÕßÔöÇ¿ÕË»§Çå¾²¡£¡£ ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬GhostAction¹¥»÷²¨¼°¹æÄ£Ô¶³¬PyPI£ºGitGuardianÔ¤¼Æ³¬3.3Íò¸öÉñÃØ±»µÁ£¬£¬£¬£¬£¬Éæ¼°PyPI¡¢npm¡¢DockerHub¡¢GitHub¡¢Cloudflare APIÁîÅÆ¼°AWS»á¼ûÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈ£¬£¬£¬£¬£¬Ó°Ïì°üÀ¨Rust¡¢JavaScript¡¢GoÔÚÄڵĶàÓïÑÔ´úÂë¿â£¬£¬£¬£¬£¬²¿·ÖÆóÒµÕû¸öSDK²úÆ·×éºÏÔâÈëÇÖ¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/pypi-invalidates-tokens-stolen-in-ghostaction-supply-chain-attack/


6. º«¹úÀÖÌ쿨ÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬300ÍòÓû§Êý¾Ýй¶


9ÔÂ18ÈÕ£¬£¬£¬£¬£¬º«¹úµÚÎå´óÐÅÓÿ¨¿¯ÐÐÉÌÀÖÌ쿨ÓÚ9ÔÂÅûÂ¶ÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Éæ¼°297ÍòÓû§£¬£¬£¬£¬£¬³ÉΪ½ñÄêÈ«Çò×î´óÊý¾Ýй¶ÊÂÎñÖ®Ò»¡£¡£ ¡£½ðÈÚ¼àÊÓÔºÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬7ÔÂ22ÈÕÖÁ8ÔÂ27ÈÕʱ´ú£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚÏßÖ§¸¶Ð§ÀÍÆ÷ÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬Áè¼Ý200GBÊý¾Ý±»ÇÔÈ¡¡£¡£ ¡£Ð¹Â¶ÐÅÏ¢°üÀ¨ÅþÁ¬¼Í¼¡¢ÐéÄâÖ§¸¶´úÂë¡¢ÄÚ²¿Ê¶ÓÖÃû¼°ÉúÒâÀàÐ͵ȣ¬£¬£¬£¬£¬ÆäÖÐÔ¼28ÍòÓû§Òò¿¨ºÅ¡¢ÓÐÓÃÆÚºÍÇå¾²ÂëÔÚµçêaê_¾°Ì»Â¶£¬£¬£¬£¬£¬ÃæÁÙÖ±½Ó²»·¨Ê¹ÓÃΣº¦¡£¡£ ¡£ÀÖÌ쿨ÒÑΪ¸ßΣº¦Óû§Æô¶¯»»¿¨³ÌÐò£¬£¬£¬£¬£¬×èÖ¹ÖÜÈýÒÑÓÐ5.5ÍòÓû§Íê³É»»¿¨£¬£¬£¬£¬£¬ÆäÓà269ÍòÓû§Êý¾Ý±»ÆÀ¹ÀΪµÍÃô¸Ð¶È£¬£¬£¬£¬£¬ÔÝÎÞÐèÖØÐ·¢¿¨¡£¡£ ¡£ÏÖÔÚδ¼ì²âµ½Î´¾­ÊÚȨÉúÒâ¡£¡£ ¡£ÊÂÎñȪԴֱָÇå¾²ÖÎÀíÎó²î£º¹¥»÷ÕßÓÚ8ÔÂ12ÈÕɨÃèЧÀÍÆ÷Îó²î£¬£¬£¬£¬£¬Ô½ÈÕÖ²Èë¶ñÒâ´úÂ룬£¬£¬£¬£¬14-15ÈÕÇÔÈ¡1.7GBÊý¾Ý£¬£¬£¬£¬£¬ºóÐøÍ¨¹ýÊðÀíWeb ShellÒ»Á¬ÌáÈ¡ÉúÒâÈÕÖ¾£¬£¬£¬£¬£¬×îÖÕ2700¸öй¶ÎļþÖнö56%¼ÓÃÜ¡£¡£ ¡£ÀÖÌ쿨ֱÖÁ8ÔÂ26ÈÕÀýÐмì²é²Å·¢Ã÷ÈëÇÖ£¬£¬£¬£¬£¬ÏµÍ³Ì»Â¶½üÁ½ÖÜ¡£¡£ ¡£¸üÁîÈËÕ𾪵ÄÊÇ£¬£¬£¬£¬£¬¸ÃÎó²î×îÔçÓÚ2017Äê±»·¢Ã÷£¬£¬£¬£¬£¬µ«ÍâÑóÖ§¸¶Ð§ÀÍÆ÷Òò»á¼ûÁ¿µÍ±»ÒÅ©ÐÞ²¹£¬£¬£¬£¬£¬ÐγÉÒªº¦Ç徲ȱ¿Ú¡£¡£ ¡£


https://www.koreaherald.com/article/10578647