ÎÚ¿ËÀ¼Ôâ¶à×éÍþвÐÐΪÕßÍøÂç¹¥»÷
°ä²¼¹¦·ò 2025-08-081. ÎÚ¿ËÀ¼Ôâ¶à×éÍþвÐÐΪÕßÍøÂç¹¥»÷
8ÔÂ6ÈÕ£¬£¬ÎÚ¿ËÀ¼ÍÆËã»úÓ¦¼±ÏìӦС×飨CERT-UA£©½üÈÕ°ä²¼¾¯±¨£¬£¬Ö¸³ö¸Ã¹úµ±¾Ö»ú¹¹¡¢¹ú·À¶ÓÁм°¹ú·À¹¤ÒµÆóÒµÕýÔâ·ê¶à¸öÍþвÐÐΪÕߵijÖÐøÍøÂç¹¥»÷¡£¡£ÆäÖУ¬£¬UAC-0099×éÖ¯ÓëGamaredon¼¯ÌåÓÈΪ»îÔ¾£¬£¬¶þÕß¾ùͨ¹ý¾«ÃÜÉè¼ÆµÄÍøÂç´¹µö¼¿Á©ÉøÈëÖ¸±êϵͳ£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢³ÉÁ¢Óƾû¯½Ó¼û¡£¡£UAC-0099×éÖ¯×Ô2023Äê6Ô³õ´Î±»¹«¿ª¼Í¼ÒÔÀ´£¬£¬ÂÅ´ÎÒÔÎÚ¿ËÀ¼ÊµÌåΪ¼äµý»î¶¯Ö¸±ê¡£¡£Æä×îй¥»÷ÀûÓ÷¨Ôº´«Æ±Ö÷ÌâµÄ´¹µöÓʼþ£¬£¬Í¨¹ýCuttlyµÈURLËõ¶Ì·þÎñ·¢ËÍÁ´½Ó£¬£¬ÓÕµ¼Êܺ¦ÕßÏÂÔØÔ̺¬HTMLÀûÓ÷¨Ê½£¨HTA£©µÄË«´æµµÎļþ¡£¡£Ö´Ðк󣬣¬»ìºÏµÄVisual Basic¾ç±¾»á´´½¨´òË㹤×÷ʵÏÖÓÆ¾Ã»¯£¬£¬²¢¼ÓÔØMATCHBOIL¶ñÒâÈí¼þ£¬£¬×îÖÕͶ·ÅMATCHWOKºóÃż°DRAGSTAREÊý¾ÝÇÔÈ¡·¨Ê½¡£¡£Óë´Ëͬʱ£¬£¬°²È«³§ÉÌESETµÄ»ã±¨½Òʾ£¬£¬¶íÂÞ˹²¼¾°µÄGamaredon¼¯ÌåÔÚ2024ÄêϰëÄêÏÔÖø¼ÓÇ¿Á˶ÔÎÚ¿ËÀ¼µÄ¡°ÎÞÇ顱Óã²æÊ½ÍøÂç´¹µö¹¥»÷¡£¡£¸Ã×é֯ѡȡÁùÖÖÐÂÐ͹¤¾ß£¬£¬Ô̺¬ÓÃÓÚÕï¶ÏÊý¾ÝÍøÂçµÄPteroDespair¡¢ºáÏòÒÆ¶¯µÄPteroTickle±øÆ÷»¯¹¤¾ß£¬£¬ÒÔ¼°Í¨¹ýTelegraph API³ÉÁ¢¼ÓÃÜͨµÀµÄPteroGraphinÓÆ¾Ã»¯¹¤¾ß¡£¡£
https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
2. Ç÷Ïò¿Æ¼¼Apex Oneƽ̨ÏÖ»îÔ¾ÀûÓõÄÔ¶³Ì´úÂëÖ´Ðзì϶
8ÔÂ6ÈÕ£¬£¬ÍøÂ簲ȫ³§ÉÌÇ÷Ïò¿Æ¼¼½üÈÕÏò¿Í»§·¢³ö´¹Î£ÖҸ棬£¬³ÆÆäApex One¶Ëµã°²È«Æ½Ì¨ÕýÔâ·êÕë¶ÔÁ½¸öÑÏÖØÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2025-54948¡¢CVE-2025-54987£©µÄ»îÔ¾ÀûÓ㬣¬¶½´ÙÓû§Á¢¼´²ÉÈ¡·À»¤´ëÊ©¡£¡£Õâ´Î·ì϶ԴÓÚApex OneÖÎÀí½ÚÖÆÌ¨£¨±¾µØ°æ£©µÄºÅÁî×¢Èëȱµã£¬£¬ÔÊÐíÔ¤ÏÈͨ¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚδÐÞ²¹µÄϵͳÉÏÔ¶³ÌÖ´ÐÐËÁÒâ´úÂë¡£¡£Ö»¹Ü·ì϶Ðè¹¥»÷Õ߾߱¸½ÚÖÆÌ¨½Ó¼ûȨÏÞ£¬£¬µ«Ç÷Ïò¿Æ¼¼Ã÷È·°µÊ¾Òѹ۲⵽ÖÁÉÙһ·ҰÍâÀûÓð¸Àý£¬£¬ÈÕ±¾CERTҲͬ²½°ä²¼Ô¤¾¯£¬£¬Ç¿µ÷ÆäÏÖʵÍþвÐÔ¡£¡£ÎªÓ¦¶Ô´¹Î£Çé¿ö£¬£¬Ç÷Ïò¿Æ¼¼³Æ2025Äê8ÔÂÖÐÑ®°ä²¼²¹¶¡£¬£¬²¢Ìṩ¶ÌÆÚ»º½â¹¤¾ß¡£¡£¸Ã¹¤¾ßͨ¹ý½ûÓÃÖÎÀíÔ±´ÓApex One½ÚÖÆÌ¨Ô¶³Ì²¿Êð´úÀíµÄÖ°ÄÜ£¬£¬¿ÉÆëÈ«×è¶ÏÒÑÖª·ì϶ÀûÓÃõè¾¶£¬£¬µ«»áµ¼ÖÂÁÙʱʧȥԶ³ÌÖÎÀíÄÜÁ¦¡£¡£¹«Ë¾½¨ÒéÓû§ÓÅÏȲ¿Êð´Ë¹¤¾ß£¬£¬¼´±ãÐè¾ÍÒ岿ÃÅ·½±ãÐÔÒÔÈ·±£¶Ëµã°²È«¡£¡£½øÒ»²½·À»¤½¨ÒéÔ̺¬£º£º£ºÈô½ÚÖÆÌ¨IPµØÖ·Â¶³öÓÚÍâ²¿ÍøÂ磬£¬Ó¦Á¢¼´Ö´ÐÐÔ´IPÏ޶ȵȽӼû½ÚÖÆ´ëÊ©¡£¡£
https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-endpoint-protection-zero-day-exploited-in-attacks/
3. еġ°¹í»êµç»°¡±Õ½ÊõÀûÓÃZoomºÍMicrosoft Teams½øÐÐC2²Ù×÷
8ÔÂ6ÈÕ£¬£¬ÔÚBlackHat USA 2025´ó»áÉÏ£¬£¬Praetorian°²È«×êÑÐÔ±Adam Crosser½ÒʾÁËÒ»ÖÖÃûΪ"¹í»êºô½Ð"£¨Ghost Calls£©µÄÐÂÐͺóÀûÓúÅÁîÓë½ÚÖÆ£¨C2£©¶ã±Ü¼¼Êõ¡£¡£¸Ã¼¼Êõͨ¹ýÀÄÓÃZoom¡¢Microsoft TeamsµÈ»áÒéÀûÓ÷¨Ê½Ê¹ÓõÄTURNºÍ̸·þÎñÆ÷£¬£¬½«¶ñÒâC2Á÷Á¿¼Ù×°³ÉÕý³£ÊÓÆµ»áÒéͨѶ£¬£¬´Ó¶øÈƹý´«Í³ÍøÂ簲ȫ·ÀÓù¡£¡£TURNºÍ̸±¾ÊÇÓÃÓÚÔ®ÊÖNAT·À»ðǽºóÉ豸³ÉÁ¢ÊÓÆµÍ¨»°¡¢VoIPµÈʵʱͨѶµÄ¸¨ÖúºÍ̸¡£¡£µ±Óû§²ÎÓëZoom»òTeams»áÒéʱ£¬£¬¿Í»§¶Ë»á»ñȡһʱTURNÍ´´¦ÒÔ³ÉÁ¢ÖмÌÏνӡ£¡£"¹í»êºô½Ð"ͨ¹ý½Ù³ÖÕâЩºÏ·¨Í´´¦£¬£¬ÔÚ¹¥»÷ÕßÓëÊܺ¦ÕßÉ豸¼ä¹¹½¨»ùÓÚWebRTCµÄ¼ÓÃÜËíµÀ£¬£¬½«C2Ö¸Áî¼Ù×°³ÉͨÀýÊÓÆµ»áÒéÁ÷Á¿¡£¡£ÓÉÓÚÁ÷Á¿¾ÆóÒµ³£ÓÃÓòÃû·ÓÉ£¬£¬ÇÒʹÓö˿Ú443µÄUDP/TCP×ÔÊÊÓ¦´«Ê䣬£¬¿ÉÈÆ¹ý·À»ðǽ¡¢´úÀí¼°TLS²é³£¬£¬ÊµÏָ߶ÈÒñ±ÎµÄºÅÁî½ÚÖÆ¡£¡£CrosserÖ¸³ö£¬£¬Ó봫ͳC2»úÖÆÏà±È£¬£¬¸Ã²½Öè¾ß±¸Èý´óÓÅÊÆ£º£º£ºÆäÒ»£¬£¬ÎÞÐèÒÀÀµÈí¼þ·ì϶£¬£¬½öͨ¹ýÀÄÓúϷ¨»ù´¡ÉèÊ©¼´¿ÉʵÏÖ£»£»£»Æä¶þ£¬£¬Ö§³Öʵʱ½»»¥£¬£¬Âú×ãVNCÔ¶³Ì½ÚÖÆµÈ±ØÒªµÍÑÓ³¤µÄ²Ù×÷ÐèÒª£»£»£»ÆäÈý£¬£¬¹¥»÷ÕßÎÞÐè¶³ö×ÔÓÐÓòÃû»ò»ù´¡ÉèÊ©£¬£¬¼«´ó½µµÍ×·×Ù·çÏÕ¡£¡£
https://www.bleepingcomputer.com/news/security/new-ghost-calls-tactic-abuses-zoom-and-microsoft-teams-for-c2-operations/
4. µÂ¹úµçÐÅMagentaTVƽ̨Òò¸æ°×ƽ̨·ì϶й¶Óû§Êý¾Ý
8ÔÂ6ÈÕ£¬£¬µÂ¹úµçÐÅ£¨Deutsche Telekom£©ÆìϼúýÌåÆ½Ì¨MagentaTVÒòµÚÈý·½¸æ°×ƽ̨·ì϶Ôâ·êÓû§Êý¾Ýй¶£¬£¬Ð¹Â¶Ê±³¤´ïÊýÔ¡£¡£×êÑÐÍŶÓÓÚ2025Äê6ÔÂÖÐÑ®·¢ÏÖ£¬£¬Óɸæ°×¼¼Êõ¹«Ë¾EquativÆìϵÄServerside.aiÍйܵÄElasticsearchÊý¾Ý¿âδÉè±£»£»£»¤£¬£¬µ¼ÖÂMagentaTVÓû§ÈÕÖ¾±»¹«¿ªÂ¶³ö¡£¡£Ö»¹ÜµÂ¹úµçÐÅÔÚÍŶӴ«µÝºóÒÑÏÂÏ߸ÃʵÀý£¬£¬µ«Â¶³öÆÚ¼ä£¨ÖÁÉÙ×Ô2025Äê2ÔÂÆð£©ÀÛ»ýµÄ³¬3.24ÒÚÌõÈÕÖ¾×ÜÁ¿´ï729GBÒÑÃæ¶ÔDZÔÚÀÄÓ÷çÏÕ¡£¡£Õâ´Îй¶µÄÊý¾ÝÖØÒªÔ´ÓÚÓû§ÓëMagentaTVƽ̨µÄ½»»¥ÒªÇ󣬣¬Ô̺¬HTTP±êÍ·ÖеķÇÃô¸ÐÐÅÏ¢£¨ÈçÓû§´úÀí£©¼°²¿ÃÅÃô¸Ð±êʶ·û£¬£¬Ô̺¬Î¨Ò»É豸±êʶ£¨MACµØÖ·£©¡¢ÍøÂçÏνӱêʶ£¨IPµØÖ·£©¡¢ÕË»§¹ØÁªID£¨¿Í»§ID¼°»á»°ID£©¡£¡£Ö»¹Üµ¥ÌõÊý¾Ý¼ÛÖµÓÐÏÞ£¬£¬µ«¹¥»÷Õß¿Éͨ¹ý½»²æÒýÓöàԴй¶Êý¾Ý£¨È纹Çàй¶µÄIPÓëÓû§ÐÅϢƥÅ䣩ʵÏÖÓû§Éí·Ý×·×Ù»òÉ豸¶¨Î»¡£¡£
https://cybernews.com/security/deutsche-telekom-magentatv-data-leak/
5. ¹È¸èÔÚ³ÖÐøµÄSalesforceÊý¾Ý͵ÇÔ¹¥»÷ÖÐÔâ·êÊý¾Ýй¶
8ÔÂ6ÈÕ£¬£¬¿Æ¼¼¾ÞÍ·Google½üÈÕÈ·ÈϳÉΪÀÕË÷×éÖ¯ShinyHuntersµÄ×îй¥»÷Ö¸±ê£¬£¬ÆäÆóÒµSalesforce¿Í»§¹ØÏµÖÎÀí£¨CRM£©ÏµÍ³ÔâÈëÇÖ£¬£¬µ¼Ö²¿Ãſͻ§Êý¾Ýй¶¡£¡£Õâ´ÎÊÂÎñÓë¸Ã×éÖ¯½üÆÚÕë¶ÔÈ«ÇòÆóÒµµÄ´ó¹æÄ£Êý¾ÝÇÔÈ¡Ðж¯Óйأ¬£¬Éæ¼°ÓïÒô´¹µö£¨Vishing£©Éç»á¹¤³Ì¹¥»÷¼°Salesforceƽ̨·ì϶ÀûÓᣡ£¾ÝGoogleÅû¶£¬£¬6ÔÂÆÚ¼ä£¬£¬ÆäÒ»¸öÓÃÓÚ´æ´¢ÖÐСÆóÒµÁªÏµÐÅÏ¢¼°Óйر¸×¢µÄSalesforceʵÀý£¬£¬ÒòÔâ·ê±»×·×ÙΪ¡°UNC6040¡±»ò¡°UNC6240¡±µÄÍþвÐÐΪÕß¹¥»÷¶øÊ§ÏÝ¡£¡£¹¥»÷Õßͨ¹ýÉç»á¹¤³Ì¼¿Á©ÇÖÈëϵͳ£¬£¬ÔÚ¶ÌÔݽӼû´°¿ÚÄÚÇÔÈ¡ÁË»ù´¡Ã³Ò×ÐÅÏ¢£¬£¬Ô̺¬ÆóÒµÃû³Æ¡¢ÁªÏµ·½Ê½µÈ´ó²¿ÃÅΪ¹«¿ª»ò·ÇÃô¸ÐÊý¾Ý¡£¡£GoogleÇ¿µ÷ÒÑѸËٶ½ØÈëÇÖõè¾¶²¢ÊµÏÖÓ°Ïì·ÖÎö£¬£¬µ«Î´Ã÷È·¾ßÌåÊÜÓ°Ïì¿Í»§ÊýÁ¿¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬Õâ´Î¹¥»÷Ä»ºóºÚÊÖʵΪ³ôÃûÔ¶ÑïµÄShinyHuntersÀÕË÷¼¯ÍÅ¡£¡£Õâ´ÎÐж¯ÖУ¬£¬ShinyHuntersͨ¹ýÈëÇÖÆóÒµSalesforceʵÀýÇÔÈ¡Êý¾Ý£¬£¬²¢ÒÔ¹«¿ªÐ¹Â¶»òÏúÊÛÊý¾ÝΪÍþв½øÐÐÀÕË÷¡£¡£
https://www.bleepingcomputer.com/news/security/google-suffers-data-breach-in-ongoing-salesforce-data-theft-attacks/
6. ·¨¹ú²¼ÒÁ¸ñµçÐÅÔâ·ê´ó¹æÄ£Êý¾Ýй¶£¬£¬640Íò¿Í»§ÐÅÏ¢ÊÜÓ°Ïì
8ÔÂ7ÈÕ£¬£¬·¨¹úÖØÒªµçÐÅÔËÓªÉ̲¼ÒÁ¸ñµçÐÅ£¨Bouygues Telecom£©Åû¶ÁËÒ»Â·ÖØ´óÍøÂ簲ȫÊÂÎñ£¬£¬Ô¼640Íò¿Í»§µÄСÎÒÊý¾ÝÔÚÕë¶ÔÐÔÍøÂç¹¥»÷ÖÐÔ⵽й¶¡£¡£×÷Ϊ·¨¹úµÚÈý´óÒÆ¶¯·þÎñÌṩÉÌ£¬£¬¸Ã¹«Ë¾Õ¼ÓÐ1450ÍòÒÆ¶¯Óû§¼°9000ÃûÔ±¹¤£¬£¬2024ÄêÓªÊÕ´ï568ÒÚÅ·Ôª¡£¡£¾Ý¹Ù·½ÉêÃ÷£¬£¬¹¥»÷ÓÉ"ÒÑÖªÍøÂç·¸×OÍÅ"Ö´ÐУ¬£¬Í¨¹ýÇÖÈëÌØ¶¨ÄÚ²¿×ÊÔ´»ñÈ¡Á˿ͻ§ÁªÏµ·½Ê½¡¢ºÏͬÐÅÏ¢¡¢»éÒöÇé¿ö¡¢ÆóÒµ¿Í»§×ÊÁϼ°¹ú¼ÊÒøÐÐÕ˺ţ¨IBAN£©µÈÃô¸ÐÊý¾Ý¡£¡£ÖµµÃÇìÐÒµÄÊÇ£¬£¬ÐÅÓþ¿¨ºÅ¡¢ÕË»§ÃÜÂëµÈÖ÷Ìâ²ÆÕþÐÅϢδ±»ÇÔÈ¡¡£¡£ÊÂÎñ²úÉúºó£¬£¬²¼ÒÁ¸ñµçÐż¼ÊõÍŶÓѸËÙ×è¶Ï¹¥»÷Õß½Ó¼ûõè¾¶£¬£¬²¢Ðͬ·¨¹ú¹ú¶ÈÍøÂ簲ȫ¾Ö£¨ANSSI£©ºÍÊý¾Ý±£»£»£»¤»ú¹¹CNIL·¢Õ¹µ÷²é£¬£¬Í¬Ê±Ç¿»¯ÍøÂç¼à¿ØÓ밲ȫ·À»¤ÏµÍ³¡£¡£Ð¹Â¶ÊÂÎñ¶Ô¿Í»§×é³ÉDZÔÚ·çÏÕ£¬£¬Ö»¹ÜIBANµ¥¶À²»¼°ÒÔʵÏÖתÕ˲Ù×÷£¬£¬µ«ÊÜÓ°ÏìÓû§ÈÔ±»½¨Ò鶨ÆÚºË²éÒøÐÐÂòÂô¼Í¼£¬£¬²¢¾¯ÌèÒÔ¿Í»§ÐÕÃûºÍÕ˺ÅÖ´ÐеÄÍøÂç´¹µöÚ¿Æ¡£¡£¹«Ë¾ÒÑͨ¹ý¶ÌÐźÍÓʼþÖ±½Ó֪ͨÊܺ¦Õߣ¬£¬²¢Ã÷È·ÖÒ¸æÇÐÎðÏòÐû³Æ°ÑÎÕÆäСÎÒÐÅÏ¢µÄÀ´µçÕßй©µÇ¼ƾ֤µÈÃô¸Ð×ÊÁÏ¡£¡£
https://www.bleepingcomputer.com/news/security/bouygues-telecom-confirms-data-breach-impacting-64-million-customers/


¾©¹«Íø°²±¸11010802024551ºÅ