ShadowLeak¹¥»÷£ºChatGPTЧÀÍÆ÷¶ËÊý¾ÝÇÔÈ¡µÄÐÂÍþв
Ðû²¼Ê±¼ä 2025-09-221. ShadowLeak¹¥»÷£ºChatGPTЧÀÍÆ÷¶ËÊý¾ÝÇÔÈ¡µÄÐÂÍþв
9ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬RadwareÑо¿Ö°Ô±·¢Ã÷ÃûΪShadowLeakµÄÐÂÐ͹¥»÷£¬£¬£¬£¬£¬£¬Ê¹ÓÃChatGPTµÄDeep ResearchÊðÀíʵÏÖÁãµã»÷ЧÀÍÆ÷¶ËÊý¾ÝÇÔÈ¡¡£¡£¡£¡£¸Ã¹¥»÷ͨ¹ýÈ«ÐÄÉè¼ÆµÄµç×ÓÓʼþÖÐÒþ²ØHTMLÖ¸Á£¬£¬£¬£¬£¬ÔÚÓû§ÎÞ²Ù×÷»ò¿É¼û½çÃæÌáÐѵÄÇéÐÎÏ£¬£¬£¬£¬£¬£¬´¥·¢ÊðÀí´ÓGmailÊÕ¼þÏäÌáȡСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©²¢¾²Ä¬·¢ËÍÖÁ¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷¡£¡£¡£¡£Çø±ðÓÚÒÀÀµ¿Í»§¶ËͼÏñäÖȾµÄ¿Í»§¶Ë¹¥»÷£¬£¬£¬£¬£¬£¬ShadowLeakÖ±½Ó´ÓOpenAIÔÆ»ù´¡Éèʩй¶Êý¾Ý£¬£¬£¬£¬£¬£¬Ê¹ÆóÒµ·ÀÓùϵͳÄÑÒÔ¼ì²â£¬£¬£¬£¬£¬£¬Óû§ÒàÎÞ¸ÐÖª¡£¡£¡£¡£Deep ResearchÔÊÐíChatGPT×ÔÖ÷ä¯ÀÀÍøÒ³5-30·ÖÖÓÌìÉúÏêϸ±¨¸æ£¬£¬£¬£¬£¬£¬²¢ÓëGmailµÈÓ¦Óü¯³É¡£¡£¡£¡£¹¥»÷Á÷³ÌÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õß·¢ËͰüÀ¨Éç»á¹¤³ÌÕ½ÂÔµÄÓʼþ£¬£¬£¬£¬£¬£¬ÊðÀí¶ÁÈ¡¶ñÒâÄÚÈݺóÖ´ÐÐÒþ²ØÖ¸Á£¬£¬£¬£¬£¬½«PII×¢Èë¹¥»÷ÕßURL£¬£¬£¬£¬£¬£¬ÊµÏÖ¾²Ä¬Êý¾ÝÉøÍ¸¡£¡£¡£¡£¸Ã¹¥»÷²»µ«ÏÞÓÚGmail£¬£¬£¬£¬£¬£¬ÈκÎDeep ResearchÅþÁ¬Æ÷¾ù¿É³ÉÎªÔØÌ壬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÇÔÈ¡ÌõÔ¼¡¢¾Û»á¼Í¼µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£Ð§ÀͶ˹¥»÷Σº¦¸ü¸ß£¬£¬£¬£¬£¬£¬ÒòÊý¾Ýй¶Դ×ÔÌṩÉÌ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬ÆóÒµÎÞ·¨Í¨¹ý¿Í»§¶Ë·À»¤×èµ²£¬£¬£¬£¬£¬£¬ÇÒÊðÀí×÷Ϊ¿ÉÐÅÖнé¿ÉÈÆ¹ýURLÏÞÖÆ£¬£¬£¬£¬£¬£¬½«Êý¾Ýµ¼³öÖÁí§ÒâÄ¿µÄµØ¡£¡£¡£¡£
https://securityaffairs.com/182334/hacking/shadowleak-radware-uncovers-zero-click-attack-on-chatgpt.html
2. ¶íºÚ¿Í×éÖ¯GamaredonÓëTurlaÁªÊÖ¹¥»÷ÎÚ¿ËÀ¼
9ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESETÅû¶£¬£¬£¬£¬£¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯GamaredonÓëTurla×Ô2025ÄêÆðÔÚÎÚ¿ËÀ¼·¢¶¯ÁªºÏ¹¥»÷£¬£¬£¬£¬£¬£¬Í¨¹ý¹¤¾ßÁ´Ðͬ°²ÅźóÃųÌÐò¡£¡£¡£¡£ESETÊӲ쵽£¬£¬£¬£¬£¬£¬2025Äê2Ô£¬£¬£¬£¬£¬£¬GamaredonµÄPteroGraphin¹¤¾ßÔÚÎÚ¿ËÀ¼¶ËµãÖØÆôTurlaµÄKazuar v3ºóÃÅ£¬£¬£¬£¬£¬£¬ÓÃÓÚ»Ö¸´±ÀÀ£»£»£»£»£»£»£»òδ×Ô¶¯Æô¶¯µÄ¶ñÒâ³ÌÐò£»£»£»£»£»£»£»4ÔºÍ6Ô£¬£¬£¬£¬£¬£¬PteroOddºÍPteroPaste¹¤¾ß½øÒ»²½°²ÅÅKazuar v2£¬£¬£¬£¬£¬£¬Ðγɡ°³õʼ»á¼û-ÔØºÉͶµÝ-ºóÃÅÖ²È롱µÄÍêÕû¹¥»÷Á´¡£¡£¡£¡£Á½¸ö×éÖ¯¾ùÓë¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©¹ØÁª£ºGamaredon£¨ÓÖÃûAqua Blizzard£©×Ô2013ÄêÆðÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼Õþ¸®»ú¹¹£»£»£»£»£»£»£»Turla£¨ÓÖÃûVenomous Bear£©×Ô2004Äê»îÔ¾£¬£¬£¬£¬£¬£¬ÉÆÓÚÌØ¹¤»î¶¯¡£¡£¡£¡£´Ë´ÎÏàÖúÖУ¬£¬£¬£¬£¬£¬GamaredonÌṩ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬TurlaÔòͨ¹ýKazuarºóÃÅÍøÂçϵͳÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢Í¨¹ýCloudflare Workers×ÓÓò»òαװ³ÉESETÕýµ±ÎļþµÄÓòÃû´«ÊäÊý¾Ý¡£¡£¡£¡£¹¥»÷Á´ÏÔʾ£¬£¬£¬£¬£¬£¬GamaredonʹÓÃPteroGraphinºÍPteroOddÏÂÔØÆ÷£¬£¬£¬£¬£¬£¬´ÓTelegraph API»ñÈ¡ÓÐÓÃÔØºÉÖ´ÐÐKazuar¡£¡£¡£¡£2025Äê1ÔÂÖÁ6Ô£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼¹²7̨»úе¼ì²âµ½TurlaÏà¹ØÖ¸±ê£¬£¬£¬£¬£¬£¬ÆäÖÐ4̨ÓÚ1Ô±»Gamaredon¹¥ÆÆ£¬£¬£¬£¬£¬£¬2ÔÂβ°²ÅÅKazuar v3¡£¡£¡£¡£
https://thehackernews.com/2025/09/russian-hackers-gamaredon-and-turla.html
3. ¶íÂÞ˹ÀÕË÷Èí¼þÍŶÓʹÓÃCountLoaderÀ©´ó¹¥»÷¹æÄ£
9ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿î´úºÅΪ¡°CountLoader¡±µÄÐÂÐͶñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬£¬£¬£¬Òѱ»¶íÂÞ˹ÀÕË÷Èí¼þÍŻÈçLockBit¡¢Black Basta¡¢Qilin£©ÓÃÓÚͶ·ÅºóÐøÉøÍ¸¹¤¾ß£¨Cobalt Strike¡¢AdaptixC2£©¼°¡°PureHVNC RAT¡±Ô¶³Ì»á¼ûľÂí¡£¡£¡£¡£¸Ã¼ÓÔØÆ÷±£´æ.NET¡¢PowerShellºÍJavaScriptÈý¸ö°æ±¾£¬£¬£¬£¬£¬£¬Í¨¹ýαÔìÎÚ¿ËÀ¼¹ú¼Ò¾¯Ô±¾ÖÉí·ÝµÄ´¹ÂÚPDFÎļþ¹¥»÷ÎÚ¿ËÀ¼Ð¡ÎÒ˽¼ÒÓû§£¬£¬£¬£¬£¬£¬ÆäPowerShell°æ±¾ÔøÍ¨¹ýÓëDeepSeekÏà¹ØµÄÓÕ¶üÎļþÈö²¥£¬£¬£¬£¬£¬£¬×îÖÕ°²ÅÅ¡°BrowserVenom¡±Ö²Èë³ÌÐòÒÔ²Ù¿ØÍøÂçÁ÷Á¿²¢ÍøÂçÊý¾Ý¡£¡£¡£¡£CountLoader¹¦Ð§Ç¿Ê¢£ºJavaScript°æ±¾Ö§³ÖÁùÖÖÎļþÏÂÔØ·½·¨ºÍÈýÖÖ¶ñÒâÈí¼þÔËÐÐÒªÁ죬£¬£¬£¬£¬£¬¿ÉÍøÂçϵͳÐÅÏ¢²¢½¨Éèαװ³É¹È¸èChrome¸üÐÂʹÃüµÄÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯£»£»£»£»£»£»£»ÆäʹÓá°ÒôÀÖÎļþ¼Ð¡±×÷Ϊ¶ñÒâÈí¼þÔÝ´æÇø£¬£¬£¬£¬£¬£¬.NETÓëJavaScript°æ±¾Ëä¹¦Ð§ÖØµþ£¬£¬£¬£¬£¬£¬µ«½öÖ§³ÖÁ½ÖÖÏÂÁîÀàÐÍ£¬£¬£¬£¬£¬£¬Êô¾«¼ò°æ¡£¡£¡£¡£¸Ã¼ÓÔØÆ÷ÒÀÍÐ20Óà¸öÓòÃûµÄ»ù´¡ÉèÊ©ÔËÐУ¬£¬£¬£¬£¬£¬½¹µã×÷Ϊ´«ÊäͨµÀͶ·ÅºóÐø¶ñÒâÈí¼þ¡£¡£¡£¡£
https://thehackernews.com/2025/09/countloader-broadens-russian-ransomware.html
4. ¿ÂÁÖ˹ÓÔâÍøÂç¹¥»÷ÖÂÅ·ÖÞ¶à»ú³¡ÏµÍ³Ì±»¾
9ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úº½¿ÕÊÖÒÕ¾ÞÍ·¿ÂÁÖ˹Ó£¨Á¥ÊôRTX¼¯ÍÅ£¬£¬£¬£¬£¬£¬Ç°ÉíΪÀ×ÉñÊÖÒÕ¹«Ë¾£©ÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäMuseÈí¼þϵͳ¹ÊÕÏ£¬£¬£¬£¬£¬£¬Òý·¢Å·ÖÞÈý´óÊàŦ»ú³¡¡ª¡ªÂ×¶ØÏ£Ë¼ÂÞ¡¢²¼Â³Èû¶ûºÍ°ØÁÖ»ú³¡µÄµÇ»úÓëÖµ»úϵͳÖÜÈ«ÖÐÖ¹¡£¡£¡£¡£´Ë´ÎÊÂÎñÔì³É´ó¹æÄ£º½°àÑÓÎó¼°×÷·Ï£¬£¬£¬£¬£¬£¬ÆÈʹº½¿Õ¹«Ë¾ÆôÓÃÈ˹¤²Ù×÷ģʽ£¬£¬£¬£¬£¬£¬ÊýǧÃûÓοÍÖÍÁô»ú³¡ÊýСʱ£¬£¬£¬£¬£¬£¬ÅŶӳ¤ÁúÉìÕÅÖÁº½Õ¾Â¥Íâ¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿ÂÁÖ˹×÷Ϊº½¿Õµç×Ó×°±¸¡¢ÄÚÊμ°Ê¹ÃüϵͳµÄ½¹µã¹©Ó¦ÉÌ£¬£¬£¬£¬£¬£¬ÆäMuseÈí¼þÖ§³Ö×ÅÅ·ÖÞ¶à»ú³¡µÄµç×ÓÖµ»úÓëÐÐÀîÍÐÔËÁ÷³Ì¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬£¬£¬£¬RTX¼¯ÍŽÒÏþÉùÃ÷³ÆÎÊÌâ½öÏÞÓÚµç×ÓЧÀÍ£¬£¬£¬£¬£¬£¬¿Éͨ¹ýÈ˹¤Öµ»ú»º½â£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷ÕýÈ«Á¦ÐÞ¸´ÏµÍ³¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬²¼Â³Èû¶û»ú³¡ÖÒÑԳƹ¥»÷Ó°Ï콫һÁ¬ÖÁÖÜÁù£¬£¬£¬£¬£¬£¬°ØÁÖ»ú³¡ºò»úʱ¼äÏÔÖøÑÓÉ죬£¬£¬£¬£¬£¬Ï£Ë¼ÂÞ»ú³¡ÔòºôÓõÓοͳöÐÐǰȷÈϺ½°à״̬¡£¡£¡£¡£¾Ýº½¿ÕÊý¾ÝÉÌCiriumͳ¼Æ£¬£¬£¬£¬£¬£¬Èý»ú³¡ÀÛ¼Æ×÷·Ï29¸öº½°à£¬£¬£¬£¬£¬£¬ÖÜÁùÏÖʵÔËÓªº½°àÁ¿»®·ÖΪ651¼Ü´Î£¨Ï£Ë¼ÂÞ£©¡¢228¼Ü´Î£¨²¼Â³Èû¶û£©ºÍ226¼Ü´Î£¨°ØÁÖ£©¡£¡£¡£¡£Å·ÃËίԱ»á½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬ÏÖÔÚÎÞÖ¤¾ÝÏÔʾ´Ë´ÎΪ¡°´ó¹æÄ£ÑÏÖØÏ®»÷¡±£¬£¬£¬£¬£¬£¬ÒòÓÉÈÔÔÚÊÓ²ìÖС£¡£¡£¡£
https://securityaffairs.com/182363/hacking/a-cyberattack-on-collins-aerospace-disrupted-operations-at-major-european-airports.html
5. CISAÖÒÑÔʹÓÃIvanti EPMMÎó²î°²ÅŶñÒâÈí¼þ
9ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÊÖÒÕ±¨¸æ£¬£¬£¬£¬£¬£¬Õ¹ÏÖÕë¶ÔIvanti Endpoint Manager Mobile£¨EPMM£©Èí¼þµÄCVE-2025-4427£¨Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö5.3£©ºÍCVE-2025-4428£¨Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö7.2£©µÄ¶ñÒâ¹¥»÷ϸ½Ú¡£¡£¡£¡£¹¥»÷Õßͨ¹ý´®ÁªÕâÁ½¸öÎó²îʵÏÖÎÞÐèÈÏÖ¤µÄÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬ÈëÇÖijδǩ×Ö×éÖ¯ÍøÂç²¢°²ÅÅÁ½×é¶ñÒâÈí¼þ¡£¡£¡£¡£µÚÒ»×é¶ñÒâÈí¼þʹÓÃαװ³ÉApache×é¼þµÄReflectUtil.class¼ÓÔØÆ÷£¬£¬£¬£¬£¬£¬½«SecurityHandlerWanListener¼àÌýÆ÷×¢ÈëTomcatЧÀÍÆ÷£¬£¬£¬£¬£¬£¬Í¨¹ý×èµ²ÌØ¶¨HTTPÇëÇó½âÃÜÒþ²ØµÄÓÐÓøºÔØ£¬£¬£¬£¬£¬£¬¶¯Ì¬½¨ÉèJavaÀàÒÔÖ´ÐÐí§Òâ´úÂë¡¢¼á³Ö³¤ÆÚÐÔ²¢ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£µÚ¶þ×éÔòαװ³ÉMobileIronЧÀ͵ÄWebAndroidAppInstaller.class¼ÓÔØÆ÷£¬£¬£¬£¬£¬£¬Í¨¹ý×èµ²±íµ¥±àÂëµÄHTTPÇëÇ󣬣¬£¬£¬£¬£¬Ê¹ÓÃÓ²±àÂëAESÃÜÔ¿½âÃܲÎÊý²¢Ö´ÐжñÒâ´úÂ룬£¬£¬£¬£¬£¬ÊµÏÖϵͳ½ÓÊÜ¡£¡£¡£¡£Ivanti¹«Ë¾ÒÑÓÚ5ÔÂÖÐÑ®ÐÞ¸´Îó²î£¬£¬£¬£¬£¬£¬²¢È·ÈÏÎó²îÔ´ÓÚµÚÈý·½¿ªÔ´¿â¶ø·Ç×ÔÉí´úÂë¡£¡£¡£¡£CISAÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý/mifs/rs/api/v2/¶ËµãÖ´ÐÐÏÂÁ£¬£¬£¬£¬£¬¾ÙÐÐϵͳÊý¾ÝÍøÂç¡¢¶ñÒâÈí¼þÏÂÔØ¡¢ÍøÂçÓ³Éä¼°LDAPƾ֤ÇÔÈ¡£¬£¬£¬£¬£¬£¬²¢Í¨¹ý/tmpĿ¼дÈë¶ñÒâÎļþά³Ö³¤ÆÚÐÔ¡£¡£¡£¡£
https://securityaffairs.com/182350/malware/cisa-warns-of-malware-deployed-through-ivanti-epmm-flaws.html
6. ¼ÓÄôó»Ê¼ÒÆï¾¯ÆÆ»ñÊ×Àý¼ÓÃÜÇ®±ÒÉúÒâËù¹Ø±Õ°¸
9ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬¼ÓÄôó»Ê¼ÒÆï¾¯£¨RCMP£©Æ¾Ö¤Å·ÖÞÐ̾¯×éÖ¯ÌṩµÄÏßË÷£¬£¬£¬£¬£¬£¬ÁªºÏÏ´Ç®ÊÓ²ì×飨MLIT£©¶ÔרעÓÚÒþ˽ÉúÒâµÄСÐͼÓÃÜÇ®±Òƽ̨TradeOgreÕö¿ª×¨ÏîÐж¯£¬£¬£¬£¬£¬£¬×îÖÕÀֳɹرոÃÉúÒâËù²¢²é»ñÁè¼Ý4000ÍòÃÀÔª×ʽ𣬣¬£¬£¬£¬£¬¾ÝÐÅÕâЩ×ʽð¶àÔ´ÓÚÍøÂç·¸·¨»î¶¯¡£¡£¡£¡£´Ë´ÎÐж¯²»µ«ÊǼÓÄôóÖ´·¨²¿·ÖÊ״ιرռÓÃÜÇ®±ÒÉúÒâËù£¬£¬£¬£¬£¬£¬¸ü´´Ï¸ùúÀúÊ·ÉÏ×î´ó¹æÄ£×ʲú¿ÛѺ¼Í¼¡£¡£¡£¡£TradeOgreƽ̨ÒòÖ§³ÖСÖÚɽկ±Ò¼°ÄÑÒÔ×·×ÙµÄÃÅÂÞ±Ò£¨Monero£©ÉúÒâ¶øÖøÃû£¬£¬£¬£¬£¬£¬ÆäÔËӪģʽ±£´æÑÏÖØÖ´·¨Îó²î£¬£¬£¬£¬£¬£¬Î´ÒªÇóÓû§Í¨¹ýKYC£¨ÏàʶÄúµÄ¿Í»§£©Õþ²ß¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬ÇÒδÏò¼ÓÄôó½ðÈÚÉúÒâºÍ±¨¸æÆÊÎöÖÐÐÄ£¨FINTRAC£©×¢²áΪǮ±ÒЧÀÍÆóÒµ£¬£¬£¬£¬£¬£¬Î¥·´Á˼ÓÄôó·´Ï´Ç®¹æÔò¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬¸Ãƽ̨ÒòÄäÃûÐÔÌØÕ÷±»ÍøÂç·¸·¨·Ö×ÓÆÕ±éÓÃÓÚÏ´Ç®²Ù×÷£¬£¬£¬£¬£¬£¬ÀýÈç½»Á÷ÀÕË÷Èí¼þÊÕÒæ¡¢ÊµÑéSIM¿¨½»Á÷թƵȡ£¡£¡£¡£Æ½Ì¨ÏÂÏߺ󣬣¬£¬£¬£¬£¬²¿·ÖÓû§ÖÊÒɴ˾ÙΪ¡°Í˳öȦÌס±£¬£¬£¬£¬£¬£¬µ«Ö´·¨»ú¹¹Ã÷È·ÌåÏֹرÕÐж¯»ùÓÚÕýµ±ÊӲ졣¡£¡£¡£¹ØÓÚ·Ç·¸·¨Óû§Ìá³öµÄ×·Ë÷ȨÎÊÌ⣬£¬£¬£¬£¬£¬¾¯·½Ö¸³ö¿Éͨ¹ý¼ÓÄôó·¨ÔºÏµÍ³×·Çó¾ÈÔ®¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/canada-dismantles-tradeogre-exchange-seizes-40-million-in-crypto/


¾©¹«Íø°²±¸11010802024551ºÅ