°ÍÄÃÂí¾¼ÃºÍ²ÆÎñ²¿ÔâINCÀÕË÷Èí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2025-09-151. °ÍÄÃÂí¾¼ÃºÍ²ÆÎñ²¿ÔâINCÀÕË÷Èí¼þ¹¥»÷
9ÔÂ11ÈÕ£¬£¬£¬£¬°ÍÄÃÂí¾¼ÃºÍ²ÆÎñ²¿£¨MEF£©¿ËÈÕÅû¶£¬£¬£¬£¬Æäһ̨ÊÂÇéÕ¾ÅÌËã»ú¿ÉÄÜÔâÓö¶ñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬Õþ¸®ÒÑÆô¶¯Çå¾²³ÌÐò²¢Ç¿µ÷ÊÂÎñÒÑ»ñµÃ¿ØÖÆ£¬£¬£¬£¬Î´Ó°Ïì½¹µãϵͳÔËÓª¡£¡£¡£¡£MEFÔÚ¹Ù·½ÉùÃ÷ÖÐÖ¸³ö£¬£¬£¬£¬¼ì²âµ½Òì³£ºóÁ¬Ã¦¼¤»î¼È¶¨Çå¾²ÐÒ飬£¬£¬£¬ÔöÇ¿Õû¸öITϵͳµÄÔ¤·À²½·¥£¬£¬£¬£¬²¢Ã÷È·ÖÐÑëϵͳ¼°Æ½Ì¨¾ùδÊÜË𣬣¬£¬£¬ÏÖÔÚÕý³£ÔËÐС£¡£¡£¡£×÷Ϊ°ÍÄÃÂí½¹µã²ÆÎñÖÎÀí»ú¹¹£¬£¬£¬£¬MEFÈÏÕæ²ÆÎñÕþ²ßÖÆ¶©¡¢¹«¹²Ö§³öµ÷¿Ø¡¢Õ®ÎñÖÎÀí¼°°ÍÄÃÂíÔ˺ÓÊÕÈëÖÎÀí¡£¡£¡£¡£¸Ã²¿Ç¿µ÷£¬£¬£¬£¬Ð¡ÎÒ˽¼ÒÓë»ú¹¹Êý¾ÝÇå¾²£¬£¬£¬£¬²¢ÒÑʵÑéËùÓÐÐÐÒµ±ê×¼·À»¤²½·¥ÒÔÌá·ÀºóÐøÎ£º¦¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ÀÕË÷Èí¼þ×éÖ¯INC RansomÉÏÖÜÔÚ°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾Ðû²¼ÉùÃ÷£¬£¬£¬£¬Ðû³Æ¶ÔMEFÌᳫ¹¥»÷²¢ÇÔÈ¡Áè¼Ý1.5TBÊý¾Ý£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþ¡¢²ÆÎñÎļþ¡¢Ô¤ËãÃ÷ϸµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ9ÔÂ5ÈÕ½«MEFÁÐÈëÊܺ¦ÕßÃûµ¥£¬£¬£¬£¬²¢Ð¹Â¶ÄÚ²¿ÎļþÑù±¾×÷ΪΥ¹æÖ¤¾Ý¡£¡£¡£¡£INC Ransom½¨ÉèÓÚ2023ÄêÖÐÆÚ£¬£¬£¬£¬ÒÔÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©Ä£Ê½ÔË×÷£¬£¬£¬£¬Ôø¹¥»÷¶à¼Ò×ÅÃûÆóÒµ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/panama-ministry-of-economy-discloses-breach-claimed-by-inc-ransomware/
2. Farmer Bros.ÔâÍøÂç¹¥»÷ÖÂ1.4ÍòÈËÊý¾Ýй¶
9ÔÂ10ÈÕ£¬£¬£¬£¬×ܲ¿Î»Óڵ¿ËÈøË¹ÖݵĿ§·È¼°Ê³ÎïЧÀ͹«Ë¾Farmer Bros.¿ËÈÕÅû¶£¬£¬£¬£¬½ñÄê3Ô³õ±¬·¢µÄÒ»ÆðÍøÂç¹¥»÷µ¼ÖÂÁè¼Ý1.4ÍòÈËÊý¾Ýй¶¡£¡£¡£¡£¾Ý¸Ã¹«Ë¾Ìá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄ֪ͨ£¬£¬£¬£¬¹¥»÷ÕßÔÚϵͳÄÚ¡°áÝá塱½ü12Ììºó±»²ì¾õ£¬£¬£¬£¬¹«Ë¾Ëæ¼´Æô¶¯ÊӲ첢ת´ïÖ´·¨²¿·ÖÐÖú×·²é¡£¡£¡£¡£Êý¾Ýй¶֪ͨÏÔʾ£¬£¬£¬£¬¹¥»÷Õß»ñÈ¡Á˲¿·ÖСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬µ«Ïêϸй¶×ֶα»Í¿ºÚδ¹ûÕæ¡£¡£¡£¡£×÷Ϊµ÷½â²½·¥£¬£¬£¬£¬Farmer Bros.ΪÊÜÓ°Ïì¸öÌåÌṩÃâ·ÑÉí·Ý͵ÇÔ¼°ÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬´ËÀàЧÀÍͨ³£Õë¶Ô¿ÉÄܰüÀ¨ÐÕÃû¡¢ÓÊÏä¡¢Éç±£ºÅµÈÃô¸Ð±êʶ·ûµÄй¶³¡¾°£¬£¬£¬£¬ÒÔÌá·ÀÚ²ÆÎ£º¦¡£¡£¡£¡£¹«Ë¾ÌáÐÑÓû§°´ÆÚ¼ì²éÕË»§¼°ÐÅÓñ¨¸æ£¬£¬£¬£¬Ð¡ÐÄÒì³£»£»£»£»£»î¶¯¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬ChaosÀÕË÷Èí¼þÍÅ»ïÔøÓÚ½ñÄê4Ô³õÐû³ÆÕÆÎոù«Ë¾Êý¾Ý£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË650GBÐÅÏ¢¡£¡£¡£¡£ÏÖÔÚÉÐÎÞ·¨È·ÈϸÃÉùÃ÷Óë±¾´Îй¶ÊÂÎñµÄÖ±½Ó¹ØÁª£¬£¬£¬£¬µ«Ê±¼äÏߵĸ߶ÈÖØºÏÒý·¢Íâ½ç¶ÔÀÕË÷ÍÅ»ï¼ÓÈëµÄÍÆ²â¡£¡£¡£¡£
https://cybernews.com/security/farmer-bros-data-breach-victims/
3. CISA½«´ïË÷ϵͳ¸ßΣÎó²îÄÉÈëKEVĿ¼
9ÔÂ12ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«´ïË÷ϵͳDELMIA AprisoÈí¼þµÄ¸ßΣÎó²î£¨CVE-2025-5086£¬£¬£¬£¬CVSSÆÀ·Ö9.0£©ÁÐÈëÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¡£¡£¡£¸ÃÎó²îΪ²»ÊÜÐÅÈÎÊý¾Ý·´ÐòÁл¯ÎÊÌ⣬£¬£¬£¬Ó°ÏìDELMIA Apriso´Ó2020°æÖÁ2025°æµÄ¶à¸ö°æ±¾£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔ¶³ÌÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬¶Ô¹¤ÒµÖÆÔìÔËÓª×é³ÉÑÏÖØÍþв¡£¡£¡£¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄÔËÓªÖ¸ÁBOD£©22-01ÒªÇ󣬣¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ2025Äê10ÔÂ2ÈÕǰÍê³ÉÎó²îÐÞ¸´£¬£¬£¬£¬ÒÔ½µµÍÖØ´óΣº¦¡£¡£¡£¡£CISAͬʱ½¨Òé˽ÈË×éÖ¯Éó²éKEVĿ¼£¬£¬£¬£¬×Ô¶¯ÅŲ鲢ÐÞ¸´×ÔÉí»ù´¡ÉèÊ©ÖеÄͬÀàÎó²î¡£¡£¡£¡£´ïË÷ϵͳDELMIA Apriso×÷ÎªÖÆÔìÔËÓªÖÎÀí£¨MOM£©Æ½Ì¨£¬£¬£¬£¬ÆÕ±éÓ¦ÓÃÓÚÈ«Çò¹¤ÒµÆóÒµµÄÉú²ú¼à¿ØÓëÓÅ»¯£¬£¬£¬£¬ÆäÇå¾²ÐÔÖ±½Ó¹ØÏµµ½Òªº¦»ù´¡ÉèÊ©Îȹ̡£¡£¡£¡£±¾´ÎÎó²îÓÉHacktron AI±¨¸æ£¬£¬£¬£¬CISAͨ¹ýKEVĿ¼»úÖÆÍÆ¶¯¿ìËÙÏìÓ¦£¬£¬£¬£¬ÌåÏÖ¡°·¢Ã÷-ת´ï-ÐÞ¸´¡±µÄ±Õ»·ÖÎÀíÂß¼¡£¡£¡£¡£
https://securityaffairs.com/182120/hacking/u-s-cisa-adds-dassault-systemes-delmia-apriso-flaw-to-its-known-exploited-vulnerabilities-catalog.html
4. FBIÖÒÑÔUNC6040¡¢UNC6395ºÚ¿ÍÇÔÈ¡SalesforceÊý¾Ý
9ÔÂ14ÈÕ£¬£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©Ðû²¼FLASH¾¯±¨£¬£¬£¬£¬ÖÒÑÔÁ½¸öÍþв¼¯ÈºUNC6040ºÍUNC6395Õýͨ¹ý¹¥»÷×éÖ¯µÄSalesforceÇéÐÎÇÔÈ¡Êý¾Ý²¢ÊµÑéÀÕË÷¡£¡£¡£¡£Í¨¸æÖ¸³ö£¬£¬£¬£¬ÕâÁ½¸ö¼¯ÈºµÄ¶ñÒâ»î¶¯µ¼ÖÂÊý¾Ý͵ÇÔºÍÀÕË÷ÊÂÎñ¼¤Ôö£¬£¬£¬£¬FBIÏ£Íûͨ¹ýÐû²¼ÈëÇÖÖ¸±ê£¨IOC£©ÌáÉý¹«ÖÚ·ÀÓùÄÜÁ¦¡£¡£¡£¡£UNC6040ÓÚ2024Äê6ÔÂÓÉGoogleÍþвÇ鱨ÍŶÓÊ×´ÎÅû¶£¬£¬£¬£¬¸Ã¼¯Èº×Ô2024Äêµ×ÆðʹÓÃÉç»á¹¤³ÌºÍÓïÒô´¹ÂÚ¹¥»÷£¬£¬£¬£¬ÓÕÆÔ±¹¤½«¶ñÒâSalesforce Data Loader OAuthÓ¦ÓÃÅþÁ¬ÖÁÆóÒµÕË»§¡£¡£¡£¡£¹¥»÷Õß³£Ã°³äITÖ§³ÖÖ°Ô±£¬£¬£¬£¬Ê¹Óá°Î񵀮±ÎñÃÅ»§¡±µÈαװӦÓ㬣¬£¬£¬Í¨¹ýOAuthÅþÁ¬´ó¹æÄ£ÇÔÈ¡SalesforceÊý¾Ý£¬£¬£¬£¬ËæºóÓÉShinyHuntersÀÕË÷×é֯ʹÓÃÕâЩÊý¾Ý¾ÙÐÐÀÕË÷£¬£¬£¬£¬Ö÷ÒªÕë¶Ô´æ´¢¿Í»§Êý¾ÝµÄ¡°ÕË»§¡±ºÍ¡°ÁªÏµÈË¡±Êý¾Ý¿â¡£¡£¡£¡£8Ô£¬£¬£¬£¬ÁíÒ»¼¯ÈºUNC6395ͨ¹ý±»µÁµÄSalesloft Drift OAuthºÍË¢ÐÂÁîÅÆ¹¥»÷SalesforceʵÀý£¬£¬£¬£¬ÇÔȡ֧³Ö°¸ÀýÖеÄÉñÃØÐÅÏ¢£¬£¬£¬£¬°üÀ¨AWSÃÜÔ¿¡¢ÃÜÂëºÍSnowflakeÁîÅÆ£¬£¬£¬£¬½ø¶øÉøÍ¸ÆäËûÔÆÇéÐΡ£¡£¡£¡£SalesloftÒÑÓëSalesforceÏàÖú×÷·ÏËùÓÐDriftÁîÅÆ£¬£¬£¬£¬²¢ÒªÇó¿Í»§ÖØÐÂÈÏÖ¤¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fbi-warns-of-unc6040-unc6395-hackers-stealing-salesforce-data/
5. VoidProxyÍøÂç´¹ÂÚÆ½Ì¨Ê¹ÓÃÖÐÐÄÈ˹¥»÷ÇÔȡ΢Èí¹È¸èÕË»§Æ¾Ö¤
9ÔÂ14ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬Ò»¸öÃûΪVoidProxyµÄÐÂÐÍÍøÂç´¹ÂÚ¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨±»ÆØ¹â£¬£¬£¬£¬ÆäÕë¶ÔMicrosoft 365¡¢GoogleÕË»§¼°ÊÜOktaÆ·¼¶Èý·½µ¥µãµÇ¼£¨SSO£©±£»£»£»£»£»¤µÄÕË»§Ìᳫ¹¥»÷¡£¡£¡£¡£¸Ãƽ̨ÓÉOktaÍþвÇ鱨ÍŶӷ¢Ã÷£¬£¬£¬£¬±»ÐÎòΪ¡°¿ÉÀ©Õ¹¡¢¿É¹æ±ÜÇÒÖØ´ó¡±£¬£¬£¬£¬½ÓÄÉÖÐÐÄÈË£¨AitM£©Õ½ÂÔʵʱÇÔÈ¡Óû§Æ¾Ö¤¡¢¶àÒòËØÈÏÖ¤£¨MFA£©´úÂë¼°»á»°cookie¡£¡£¡£¡£¹¥»÷ʼÓÚÊÜѬȾµÄµç×ÓÓʼþЧÀÍÕË»§·¢ËͰüÀ¨Ëõ¶ÌÁ´½ÓµÄ´¹ÂÚÓʼþ¡£¡£¡£¡£ÊÕ¼þÈ˵ã»÷Á´½Óºó£¬£¬£¬£¬»áÂÄÀú¶à´ÎÖØ¶¨Ïò£¬£¬£¬£¬×îÖÕ»á¼ûÍйÜÔÚ.icu¡¢.sbs¡¢.xyzµÈµÍ±¾Ç®ÓòÃûÉϵĴ¹ÂÚÍøÕ¾¡£¡£¡£¡£ÕâÐ©ÍøÕ¾Ê¹ÓÃCloudflare±£»£»£»£»£»¤Òþ²ØÕæÊµIP£¬£¬£¬£¬²¢Í¨¹ýCloudflare WorkerÇéÐιýÂËÁ÷Á¿¡¢¼ÓÔØÒ³Ãæ¡£¡£¡£¡£»á¼ûÕßÐèÏÈͨ¹ýCloudflare CAPTCHAÑéÖ¤ÒÔɨ³ý»úеÈË£¬£¬£¬£¬ÔöÌíÒ³Ãæ¿ÉÐŶȡ£¡£¡£¡£´¹ÂÚÒ³ÃæÄ£ÄâMicrosoft»òGoogleµÇ¼½çÃæ£¬£¬£¬£¬²¿·ÖÄ¿µÄ»á±»Ö¸µ¼ÖÁÎÞº¦µÄ¡°½Ó´ý¡±Ò³ÃæÒÔ»ìÏý¼ì²â¡£¡£¡£¡£µ±Óû§ÊäÈëÆ¾Ö¤Ê±£¬£¬£¬£¬ÇëÇó»áͨ¹ýVoidProxyÊðÀíÖÁGoogle»òMicrosoftЧÀÍÆ÷¡£¡£¡£¡£¹ØÓÚʹÓÃOkta SSOµÄÁªºÏÕË»§£¬£¬£¬£¬¹¥»÷»á½øÈëµÚ¶þ½×¶Î£¬£¬£¬£¬Ã°³äOktaµÄSSOÁ÷³ÌÒ³Ãæ£¬£¬£¬£¬½øÒ»²½ÇÔÊØÐÅÏ¢¡£¡£¡£¡£VoidProxyµÄÊðÀíЧÀÍÆ÷ÔÚÊܺ¦ÕßÓëÕýµ±Ð§ÀͼäÖмÌÁ÷Á¿£¬£¬£¬£¬Í¬Ê±²¶»ñ´«ÊäÖеÄÓû§Ãû¡¢ÃÜÂë¡¢MFA´úÂ룬£¬£¬£¬²¢×èµ²Õýµ±Ð§ÀÍ·¢·ÅµÄ»á»°cookie£¬£¬£¬£¬¹©¹¥»÷ÕßÔÚÖÎÀíÃæ°åÖ±½ÓʹÓᣡ£¡£¡£
https://www.bleepingcomputer.com/news/security/new-voidproxy-phishing-service-targets-microsoft-365-google-accounts/
6. ÐÂÐÍHybridPetyaÀÕË÷Èí¼þÍ»ÆÆUEFIÇå¾²Æô¶¯ÊµÑé¹¥»÷
9ÔÂ12ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾ESET¿ËÈÕÔÚVirusTotalƽ̨·¢Ã÷ÃûΪHybridPetyaµÄÐÂÐÍÀÕË÷Èí¼þÑù±¾£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ¿ÉÈÆ¹ýUEFIÇå¾²Æô¶¯¹¦Ð§£¬£¬£¬£¬ÔÚEFIϵͳ·ÖÇø°²ÅŶñÒâ³ÌÐò¡£¡£¡£¡£HybridPetyaÏÔ×ÅÊÜ2016-2017ÄêPetya/NotPetya¶ñÒâÈí¼þÆô·¢£¬£¬£¬£¬ºóÕßÔøÔìÓñ³ÉÇò´ó¹æÄ£ÏµÍ³Ì±»¾ÇÒÎÞ»Ö¸´Ñ¡Ï£¬£¬£¬¶øHybridPetyaÔòÈÚºÏÁ½ÕßÌØµã£¬£¬£¬£¬¼È±£´æÊÓ¾õÆø¸ÅºÍ¹¥»÷Á´ÌØÕ÷£¬£¬£¬£¬ÓÖÐÂÔöÒªº¦ÊÖÒÕÍ»ÆÆ¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬HybridPetyaʹÓÃCVE-2024-7344Îó²îʵÏÖÇå¾²Æô¶¯Èƹý£¬£¬£¬£¬¸ÃÎó²î±£´æÓÚ΢ÈíÊðÃûÓ¦ÓÃÖУ¬£¬£¬£¬×ÝȻϵͳÆôÓÃÇå¾²Æô¶¯±£»£»£»£»£»¤ÈԿɱ»Ê¹Óᣡ£¡£¡£¹¥»÷ʱ£¬£¬£¬£¬¶ñÒâÈí¼þÊ×Ïȼì²âÖ÷»úÊÇ·ñ½ÓÄÉUEFI+GPT·ÖÇø×éºÏ£¬£¬£¬£¬Ëæºó½«°üÀ¨config¡¢verify¡¢counterµÈÎļþµÄÆô¶¯¹¤¾ß°üÖ²ÈëEFIϵͳ·ÖÇø¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬configÎļþ´æ´¢¼ÓÃܱê¼Ç¡¢ÃÜÔ¿¡¢Ëæ»úÊý¼°Êܺ¦ÕßID£¬£¬£¬£¬verifyÎļþÓÃÓÚÃÜÔ¿ÑéÖ¤£¬£¬£¬£¬counterÔò¸ú×Ù¼ÓÃܽø¶È¡£¡£¡£¡£¸ÃÈí¼þ»áÌæ»»Ôʼbootmgfw.efiΪ±£´æÎó²îµÄreloader.efi£¬£¬£¬£¬²¢É¾³ýbootx64.efi£¬£¬£¬£¬Í¬Ê±±¸·ÝÔʼָµ¼³ÌÐòÒÔ±ãÊê½ðÖ§¸¶ºó»Ö¸´ÏµÍ³¡£¡£¡£¡£¹¥»÷Á÷³ÌÖУ¬£¬£¬£¬HybridPetya´¥·¢À¶ÆÁ¹ýÊ§Ç¿ÖÆÏµÍ³ÖØÆô£¬£¬£¬£¬Ê¹¶ñÒâbootkitÔÚÆô¶¯½×¶ÎÖ´ÐС£¡£¡£¡£ËæºóʹÓÃSalsa20Ëã·¨¼ÓÃÜËùÓÐMFT¼¯Èº£¬£¬£¬£¬Ê±´úÏÔʾÐéαCHKDSKÐÂÎÅÎóµ¼Óû§¡£¡£¡£¡£¼ÓÃÜÍê³ÉºóÔÙ´ÎÖØÆô£¬£¬£¬£¬ÏòÊܺ¦ÕßË÷Òª1000ÃÀÔª±ÈÌØ±ÒÊê½ð£¬£¬£¬£¬»»È¡32×Ö·ûÃÜÔ¿ÒÔ»Ö¸´Ö¸µ¼³ÌÐòÏ¢ÕùÃÜÊý¾Ý¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-hybridpetya-ransomware-can-bypass-uefi-secure-boot/


¾©¹«Íø°²±¸11010802024551ºÅ