ÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾È·ÈÏÔâÀÕË÷¹¥»÷£¬£¬£¬28ÍòÓû§Êý¾Ýй¶
°ä²¼¹¦·ò 2025-05-271. ÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾È·ÈÏÔâÀÕË÷¹¥»÷£¬£¬£¬28ÍòÓû§Êý¾Ýй¶
5ÔÂ26ÈÕ£¬£¬£¬¼ÓÄôóÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾ÓÚ5ÔÂ23ÈÕÅû¶£¬£¬£¬ÆäÔâ·êµÄÍøÂ簲ȫÊÂÎñ±»È·ÒÔΪ¡°¸ß¶È¸´ÔÓµÄÀÕË÷Èí¼þ¹¥»÷¡±¡£¡£¡£¡£¡£Õâ´ÎÊÂÎñʼÓÚ3ÔÂ19ÈÕ£¬£¬£¬¹¥»÷Õßͨ¹ýδÊÚȨϵͳ½Ó¼û£¬£¬£¬×îÖÕÇÔÈ¡ÁËÔ¼28ÍòÃû¿Í»§£¨Õ¼¸ÃÊ¡55ÍòÓû§×ÜÊýµÄ51%£©µÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£±»Ð¹Â¶ÐÅÏ¢º¸Ç¶à¸ö·½Ã棺СÎÒÉí·ÝÐÅÏ¢£¬£¬£¬ÈçÐÕÃû¡¢µ®ÉúÈÕÆÚµÈ£»²ÆÕþÊý¾Ý£¬£¬£¬Ô̺¬Ô¤ÊÚȨ֧¸¶ÕË»§µÄÒøÐÐÕ˺ŵȣ»µ±¾ÖÖ¤¼þÐÅÏ¢£¬£¬£¬Ïñ¼ÝÕÕºÅÂë¡¢Éç»á±£ÏÕºÅÂ룻ÒÔ¼°ÄÜԴʹÓÃϸ½Ú£¬£¬£¬ÈçÓõçÁ¿Êý¾Ý¡¢·þÎñÒªÇó¼Í¼µÈ¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷ÕßÇÖÈëóÒ×ÍøÂçϵͳ£¬£¬£¬µ«µçÁ¦¹«Ë¾Ö÷Ìâ»ù´¡ÉèÊ©£¬£¬£¬Èç·¢µç¡¢ÊäµçµÈδÊÜÓ°Ïì¡£¡£¡£¡£¡£¸Ã¹«Ë¾±ðÀëÔÚ4ÔÂ28ÈÕÓëĸ¹«Ë¾½áºÏ°ä²¼³õ´Î°²È«¹«¸æ£¬£¬£¬5ÔÂ1ÈÕÈ·ÈÏÊý¾ÝÔâÇÔ£¬£¬£¬5ÔÂ14ÈÕÆðÂ½ÐøÏòÊÜÓ°Ïì¿Í»§·¢ËÍ֪ͨÐÅ¡£¡£¡£¡£¡£¹¥»÷ÕßÒѽ«±»µÁÊý¾Ý°ä²¼ÓÚ°µÍø£¬£¬£¬²»Íâ½ØÖÁ5ÔÂ27ÈÕ£¬£¬£¬ÉÐδÓÐÀÕË÷×éÖ¯Ðû³Æ¶Ô´ËÕÆ¹Ü¡£¡£¡£¡£¡£ÐÂ˹¿ÆÉáµçÁ¦¹«Ë¾×ܲñ˵ᤸñÀ׸ñ°µÊ¾£¬£¬£¬¹«Ë¾Ñϸñ×ñÑÂÉÀýºÍ·¨Âɲ¿ÃލÒ飬£¬£¬²»Ö§¸¶Êê½ð¡£¡£¡£¡£¡£Ä¿Ç°¸Ã¹«Ë¾ÕýÓëµÚÈý·½ÍøÂ簲ȫר¼ÒºÏ×÷£¬£¬£¬ÆÀ¹ÀÊý¾Ýй¶ÁìÓò£¬£¬£¬²¢ÎªÊÜÓ°Ïì¿Í»§ÌṩΪÆÚÁ½ÄêµÄTransUnionÐÅÓþ¼à¿Ø·þÎñ¡£¡£¡£¡£¡£ÄÜÔ´¼à¹Ü»ú¹¹Ò²ÒÑÆô¶¯ÊÂÎñÉó²é·¨Ê½¡£¡£¡£¡£¡£
https://www.securityweek.com/nova-scotia-power-confirms-ransomware-attack-280k-notified-of-data-breach/
2. Å·ÖÞElit AviaÔâQilinÀÕË÷¹¥»÷£¬£¬£¬»ú×éÐÅϢй¶
5ÔÂ26ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬Å·ÖÞ¸öÈË·É»úÔËÓªÉÌElit Avia±»ÆØ³Ê´Ë¿ÌÀÕË÷Èí¼þÍÅ»ïQilinµÄ°µÍøÐ¹Â¶Õ¾µã¡£¡£¡£¡£¡£¹¥»÷ÕßÐû³ÆÇÔÈ¡ÁËElit AviaµÄÊý¾Ý£¬£¬£¬²¢¹«¿ªÁË»ú×éÈËÔ±µÄ»¤ÕÕÐÅÏ¢µÈÎļþ¡£¡£¡£¡£¡£Elit Avia×ܲ¿Î»ÓÚÅ·ÖÞ£¬£¬£¬³ÉÁ¢ÓÚ2006Ä꣬£¬£¬Ö÷Óª·É»úÖÎÀí¡¢°ü»ú·þÎñ¼°¸ß¶ËÉÌÎñ»úÏúÊÛ¡£¡£¡£¡£¡£QilinÔÚ°µÍø°ä²¼µÄÌû×ÓÔ̺¬¶àÕÅ»ú×éÈËÔ±»¤ÕÕ½ØÍ¼¼°·ÉÐй¤×÷Îļþ£¬£¬£¬²»Íâ²¢Î´Éæ¼°¿Í»§ÐÅÏ¢¡£¡£¡£¡£¡£ÍøÂ簲ȫ×êÑÐÍŶӷÖÎöÖ¸³ö£¬£¬£¬´ÓÏÖÓÐй¶ÄÚÈÝÀ´¿´£¬£¬£¬ÉÐδÏÔʾ³ö´æÔÚÖØ´óÊý¾Ý·ì϶£¬£¬£¬µ«Ä¿Ç°ÈÔÎÞ·¨È·ÈϹ¥»÷ÕßÏÖʵÇÔÈ¡µÄÊý¾Ý¹æÄ£¡£¡£¡£¡£¡£×êÑÐÍŶÓÖÒ¸æ³Æ£¬£¬£¬»ú×éÈËÔ±»¤ÕÕÐÅÏ¢µÈÃô¸ÐÊý¾ÝÍâй£¬£¬£¬»áʹԱ¹¤Ãæ¶Ô´¹µö¹¥»÷¡¢Éí·ÝµÁÓõÈÖî¶à·çÏÕ¡£¡£¡£¡£¡£Ä¿Ç°£¬£¬£¬Elit AviaÉÐδ¶Ô´ËÊÂÎñ×÷³ö»ØÓ¦£¬£¬£¬¶øQilinÍÅ»ïÔòͨ¹ý¹«¿ªÊܺ¦ÕßÐÅÏ¢µÄ·½Ê½£¬£¬£¬ÏòÆóҵʩѹÒÔÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¸ÃÍÅ»ï×Ô2022Äê»îÔ¾ÖÁ½ñ£¬£¬£¬ÔÚ´Óǰ12¸öÔÂÀïÀۼƹ¥»÷ÁËÖÁÉÙ312¼Ò»ú¹¹¡£¡£¡£¡£¡£
https://cybernews.com/security/private-charter-ransomware-attack-data-leaked/
3. StormousÍÅ»ïй¶¶à¼Ò·¨¹úµ±¾Ö»ú¹¹µÄµç×ÓÓʼþºÍÃÜÂë
5ÔÂ26ÈÕ£¬£¬£¬³ÛÃûÀÕË÷Èí¼þÍÅ»ïStormousÔÚ°µÍøÂÛ̳°ä²¼´óÁ¿¾Ý³ÆÊôÓÚ·¨¹úµ±¾Ö»ú¹¹¼°×éÖ¯µÄµç×ÓÓʼþÓëÃÜÂëÊý¾Ý£¬£¬£¬²¢Ðû³ÆÕâ´ÎÐ¹Â¶Éæ¼°¡°·¨¹úµ±¾ÖÖØÒª²¿ÃÅÈ«ÃæÊý¾Ý¡±¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ÍøÂ簲ȫ×êÑÐÍŶӵ÷²é·¢ÏÖ£¬£¬£¬Ö»¹ÜÊý¾Ý¼¯Ô̺¬²¿ÃÅÕæÊµÐÅÏ¢£¬£¬£¬µ«ÆäÖÊÁ¿´æÒÉ¡£¡£¡£¡£¡£Ð¹Â¶Êý¾ÝÖеÄÃÜÂëѡȡÒѱ»ÒÔΪ´àÈõµÄMD5¹þÏ£Ëã·¨¼ÓÃÜ£¬£¬£¬×êÑÐÈËÔ±´§Ä¦Õâ¿ÉÄÜÊÇÔçÆÚ°²È«³ß¶È²»ÃÀÂúʱÆÚµÄº¹ÇàÊý¾Ý¡£¡£¡£¡£¡£ÈôÊý¾ÝÊôʵ£¬£¬£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÐÅÏ¢Ö´Ðо«×¼´¹µö¹¥»÷£¬£¬£¬Èç¼ÙÒâµ±¾Ö»ú¹¹Ë÷ÒªÃô¸ÐÐÅÏ¢£¬£¬£¬ÉõÖÁͨ¹ýÆÆ½â¹þÏ£Öµ»ñȡϵͳ½Ó¼ûȨÏÞ£¬£¬£¬³ö¸ñÊǵ±Óйػú¹¹´æÔÚÃÜÂ븴ÓûòÈõ¿ÚÁîÎÊÌâʱ£¬£¬£¬·çÏÕ½«½øÒ»²½¼Ó¾ç¡£¡£¡£¡£¡£±»ÆØ¹âµÄ»ú¹¹Ãûµ¥º¸Ç·¨¹ú¿ª·¢Êð¡¢°ÍÀè´óÇøÎÀÉú¾Ö¡¢¼ÒÍ¥½òÌù»ù½ðµÈ¶à¸ö²¿Ãż°»ú¹¹£¬£¬£¬·ÖÆç»ú¹¹Ð¹Â¶µÄÓÊÏäÊýÁ¿²î¾àÏÔÖø¡£¡£¡£¡£¡£ÁªÏµ·¨¹ú¹ú¶ÈÍøÂ簲ȫ¾Ö£¨ANSSI£©ÖÃÆÀ£¬£¬£¬µ«Ä¿Ç°ÉÐδ»ñµÃ»Ø¸´¡£¡£¡£¡£¡£
https://cybernews.com/security/french-government-email-data-leak/
4. GhostSpy£º¸ß¼¶Android RATÇÔÈ¡ÒøÐÐÐÅÏ¢²¢Èƹý°²È«´ëÊ©
5ÔÂ27ÈÕ£¬£¬£¬ÍøÂ簲ȫ¹«Ë¾CYFIRMA×êÑÐÈËÔ±·¢ÏÖÒ»¿îÃûΪGhostSpyµÄ¸ß¶ÈÏȽø°²×¿Ô¶³Ì½Ó¼ûľÂí£¬£¬£¬¸Ã¶ñÒâÈí¼þչʾÁËÒÆ¶¯¶Ë¼äµýÈí¼þµÄ½ø»¯Ë®Æ½¡£¡£¡£¡£¡£GhostSpy¹¥»÷ʼÓÚÓµÓкýŪÐԵijõʼװÖðü£¬£¬£¬ÀÄÓð²×¿ÎÞ×è°·þÎñºÍUI×Ô¶¯»¯Ö°ÄÜ£¬£¬£¬°µÖмÓÔØ´Î¼¶ÓÐÐ§ÔØºÉ£¬£¬£¬²¢Í¨¹ý·ÂÕÕÓû§µã»÷²Ù×÷×Ô¶¯ÊÚÓè×ÔÉíËùÓÐËùÐèȨÏÞ£¬£¬£¬ÈƹýÈËΪ½»»¥»·½Ú¡£¡£¡£¡£¡£Ò»µ©×°Öóɹ¦£¬£¬£¬GhostSpy¾Íת±äΪְÄÜÍêÕûµÄ¼à¿Ø¹¤¾ß£¬£¬£¬Äܼͼ¼üÅÌÊäÈë¡¢½ØÈ¡ÆÁÄ»»î¶¯¡¢»ñÈ¡ÉãÏñÍ·ºÍÂó¿Ë·çÊý¾ÝÁ÷¡¢ÊµÊ±¼à¿ØGPS¶¨Î»ÐÅÏ¢ÒÔ¼°Ö´ÐÐÔ¶³ÌÖ¸Á£¬£¬Ô̺¬É豸²Á³ý¡£¡£¡£¡£¡£ÎªÎ¬³Ö³Ö¾ÃפÁô£¬£¬£¬GhostSpyѡȡ¶àÖÖ¶ã±Ü¼¿Á©£¬£¬£¬ÈçÀÄÓÃÉ豸ÖÎÀíAPI¡¢×èÖ¹ÏµÍ³Ð¶ÔØ³¢ÊÔ£¬£¬£¬²¢Í¨¹ýÈ«ÆÁ¸²¸Ç²ãÏÞ¶ÈÓû§²Ù×÷£¬£¬£¬ÔÚÓû§³¢ÊÔÐ¶ÔØÊ±ÏÔʾÐéαÖҸ档¡£¡£¡£¡£´ËÍ⣬£¬£¬GhostSpy»¹ÄÜÈÆ¹ýÒøÐкͰ²È«ÀûÓõĽØÍ¼±£»¤»úÖÆ£¬£¬£¬ÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÏνÓÖÁ»îÔ¾µÄC2·þÎñÆ÷£¬£¬£¬ÒÑÈ·ÈϵĽڵãÔ̺¬¶à¸öÍøÖ·ºÍIPµØÖ·£¬£¬£¬Ö»¹Ü²¿ÃÅ·þÎñÆ÷ÒÑÏÂÏߣ¬£¬£¬µ«×êÑÐÈËÔ±·¢ÏÖ¶à¸ö±¸Óö˿ںÍÓòÃû£¬£¬£¬Åú×¢ÆäÈÔÔÚ»ý¼«¿ª·¢ºÍ¿í·ºÊ¹Óᣡ£¡£¡£¡£¿£¿ªÔ´µý±¨Êý¾Ý½«GhostSpyÓë°ÍÎ÷ºÚ¿Í×éÖ¯ÓйØÁª£¬£¬£¬ÓйØTelegramƵµÀºÍYouTubeƵµÀ½øÒ»²½×ôÖ¤ÁËÕâÒ»¹ØÁª¡£¡£¡£¡£¡£
https://securityonline.info/ghostspy-advanced-android-rat-steals-banking-info-bypasses-security/
5. Ghostscript·ì϶µ¼Ö¼ÓÃÜPDFÎļþй¶Ã÷ÎÄÃÜÂë
5ÔÂ25ÈÕ£¬£¬£¬¿í·ºÀûÓõÄPDFÓëPostScript´¦ÖÃÆ÷Artifex GhostscriptÆØ³öCVE-2025-48708·ì϶£¬£¬£¬¸Ã·ì϶»òÖÂÃ÷ÎÄÃÜÂë²»²âǶÈë¼ÓÃÜPDF£¬£¬£¬ÍþвÓû§Êý¾Ý°²È«£¬£¬£¬10.05.1֮ǰ°æ±¾¾ùÊÜÓ°Ïì¡£¡£¡£¡£¡£·ì϶ÆðÒòÓÚbase/gslibctx.cÖÐgs_lib_ctx_stash_sanitized_argº¯Êý²ÎÊýËãÕʲ»³¹µ×£¬£¬£¬GhostscriptÔÚÌìÉúÃÜÂë±£»¤PDFʱδ¶Ï¸ùÃô¸ÐÖµ£¬£¬£¬ÈçUserPasswordºÍOwnerPassword£¬£¬£¬ÒÔÖÁÆëÈ«ºÅÁîÐУ¨º¬ÃÜÂ룩±»Ç¶ÈëPDFÎļþÕØÊ¼´¦¡£¡£¡£¡£¡£°²È«×êÑÐÔ±Vasileios FlengasÔÚWindows 10ÉϲâÊÔʱ·¢ÏÖ´ËÎÊÌ⣬£¬£¬Ö¸³öº¬Ã÷ÎÄÃÜÂëµÄÆëÈ«ºÅÁîÐб»Ç¶ÈëÌìÉúPDFµÄ¿ªÍ·¡£¡£¡£¡£¡£ÖØÏָ÷ì϶¼«ÎªÇá±ã£¬£¬£¬´Ó¹Ù·½GitHub×°ÖÃGhostscript£¬£¬£¬ÔËÐк¬ÃÜÂëºÅÁîÌìÉúPDF£¬£¬£¬ÔÙÓÃÎı¾²é¿´Æ÷´ò¿ª¼´¿É¼ûδ¼ÓÃܵÄÃ÷ÎÄÃÜÂë¡£¡£¡£¡£¡£GhostscriptÒÑÔÚ10.05.1°æ±¾°ä²¼²¹¶¡£¬£¬£¬Í¨¹ýÔÚǶÈëÔªÊý¾ÝǰËãÕʺÅÁîÐÐÊäÈëÀ´ÐÞ¸´·ì϶¡£¡£¡£¡£¡£ÆóÒµºÍÓû§Ó¦¾¡¿ì¸üÐÂÖÁ×îа汾£¬£¬£¬ÒÔ±£ÏÕÊý¾Ý°²È«£¬£¬£¬¶ã±ÜÒòʹÓú¬·ì϶¾É°æ±¾¶øÒý·¢µÄÊý¾Ýй¶·çÏÕ¡£¡£¡£¡£¡£
https://securityonline.info/ghostscript-flaw-leaks-plaintext-passwords-in-encrypted-pdfs/
6. TikTokÏÖAIÊÓÆµÐÂÍþв£ºÓÕÆÖ´ÐкÅÁî´«²¼ÇÔÃÜÈí¼þ
5ÔÂ24ÈÕ£¬£¬£¬Ç÷Ïò¿Æ¼¼×îÐÂ×êÑнÒʾ£¬£¬£¬TikTokƽ̨ÕýÃæ¶ÔÒ»ÖÖÐÂÐÍAIÇý¶¯µÄÉç½»¹¤³Ì¹¥»÷Íþв¡£¡£¡£¡£¡£ºÚ¿ÍÀûÓÃTikTokµÄ¿í·º´«²¼¸öÐÔ£¬£¬£¬Í¨¹ýAIÌìÉú¿´ËÆÎÞº¦µÄÊÓÆµ½Ì³Ì£¬£¬£¬ÓÕÆÓû§Ö´ÐжñÒâPowerShellºÅÁ£¬£¬´Ó¶ø´«²¼VidarºÍStealCµÈ¸´ÔÓµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ@gitallowed¡¢@zane.houghtonºÍ@sysglow.wowµÈTikTokÕ˺ŷÖÏíµÄÄäÃû½Ì³ÌÊÓÆµ£¬£¬£¬ÕâЩÊÓÆµÁìµ¼¹ÛÖÚ¼¤»îÈí¼þ£¬£¬£¬µ«ÏÖʵ»áÊèµ¼Óû§Ö´ÐÐÌØ¶¨PowerShellºÅÁ£¬£¬ÈçÏÂÔØ²¢ÔËÐÐÔ¶³Ì¾ç±¾¡£¡£¡£¡£¡£¸Ã¾ç±¾»áÆô¶¯Ò»¸öÒñ±ÎÇÒÓÆ¾ÃµÄ¶ñÒâÈí¼þͶ·ÅÁ´£¬£¬£¬Ô̺¬ÔÚAPPDATAºÍLOCALAPPDATA´´½¨°µ²ØÄ¿Â¼¡¢Ôö³¤µ½Windows DefenderÅųýÁÐ±í¡¢ÏÂÔØ¶þ¼¶ÓÐÐ§ÔØºÉ£¨Í¨³£ÊÇVidar»òStealC£©ÒÔ¼°»ñÈ¡×îÖÕÓÆ¾Ã»¯¾ç±¾£¬£¬£¬Ê¹¶ñÒâÈí¼þÄÜÔÚÏµÍ³ÖØÆôºó³ÖÐøÔËÐУ¬£¬£¬²¢É¾³ýÈÕÖ¾ºÍһʱÎļþ¼ÐÒÔ¸²¸ÇÖ¤¾Ý¡£¡£¡£¡£¡£Ç÷Ïò¿Æ¼¼Ç¿µ÷£¬£¬£¬¾ç±¾Ñ¡È¡ÖØÊÔÂ߼ȷ±£ÓÐÐ§ÔØºÉ³É¹¦ÏÂÔØ£¬£¬£¬²¢ÒÔ°µ²ØµÄÌáÉýȨÏÞ¹ý³ÌÆô¶¯¶ñÒâÈí¼þ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£´ËÍ⣬£¬£¬¶ñÒâÈí¼þ¼¤»îºó»¹»áÀûÓÃÐÂÐͶã±Ü¼¼ÊõÓëºÅÁî½ÚÖÆ£¨C&C£©·þÎñÆ÷ͨѶ£¬£¬£¬ÈçVidarÀÄÓÃSteamºÍTelegramµÈºÏ·¨·þÎñ×÷ΪËÀͶ½âÎöÆ÷°µ²ØÕæÊµ·þÎñÆ÷µØÖ·¡£¡£¡£¡£¡£
https://securityonline.info/ai-generated-malware-tiktok-videos-push-infostealers-with-powershell-commands/


¾©¹«Íø°²±¸11010802024551ºÅ