½¿ÔÏÊ«ÔâEverestÀÕË÷Èí¼þ¹¥»÷ÖÂ60Íò¿Í»§Êý¾Ýй¶
Ðû²¼Ê±¼ä 2025-09-171. ½¿ÔÏÊ«ÔâEverestÀÕË÷Èí¼þ¹¥»÷ÖÂ60Íò¿Í»§Êý¾Ýй¶
9ÔÂ15ÈÕ£¬£¬£¬£¬ÀÕË÷Èí¼þ¼¯ÍÅEverestÉù³Æ¶Ô·¨¹úÉݳ޻¤·ôÆ·¾ÞÍ·½¿ÔÏÊ«¼¯ÍÅÌᳫ¹¥»÷£¬£¬£¬£¬²¢½«ÆäÊý¾ÝÉÏ´«ÖÁ°µÍø²©¿Í¡£¡£¡£¸ÃÍÅ»ïÐû³Æ»ñÈ¡Á˽¿ÔÏÊ«Áè¼Ý60ÍòÃû¿Í»§µÄÏêϸÐÅÏ¢£¬£¬£¬£¬Éæ¼°ÃÀ¹ú¡¢·¨¹ú¡¢¼ÓÄôóµÈµØÇø£¬£¬£¬£¬Êý¾Ý°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¼°»¤·ôÆ·/»¯×±Æ·¹ºÖÃÀúÊ·µÈÃô¸ÐÄÚÈÝ¡£¡£¡£½¿ÔÏÊ«×÷Ϊ×ܲ¿Î»ÓÚ°ÍÀèµÄÉÝ»ª»¤·ôÆ·ÖÆÔìÉÌ£¬£¬£¬£¬ÄêÊÕÈëÔ¼20ÒÚÅ·Ôª£¬£¬£¬£¬Ô±¹¤¹æÄ£Ô¼8000ÈË£¬£¬£¬£¬ÔÚÎ÷Å·Êг¡Õ¼ÓÐÖ÷Ҫְλ¡£¡£¡£¾ÝCybernewsÍŶÓÊӲ죬£¬£¬£¬EverestÔÚ°µÍøÐû²¼µÄÌû×Ó½ö°üÀ¨²¿·ÖÊý¾Ý½ØÍ¼×÷Ϊ֤¾Ý£¬£¬£¬£¬Î´ÌṩÍêÕûÑù±¾£¬£¬£¬£¬µ«Ñù±¾Êý¾ÝÒÉËÆÀ´×Ô½¿ÔÏÊ«²î±ðµØÇøµÄÔÚÏßÊÐËÁ¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬´ËÀà´ó¹æÄ£Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÍøÂç´¹ÂÚ¡¢À¬»øÓʼþ¹¥»÷£¬£¬£¬£¬»ò×÷ΪÉí·Ý͵ÇԵŤ¾ß¡£¡£¡£
https://cybernews.com/security/clarins-user-data-breach-everest/
2. Phoenix RowHammer¹¥»÷ÔÚ109ÃëÄÚÈÆ¹ý¸ß¼¶DDR5ÄÚ´æ±£»£»£»£»£»¤
9ÔÂ16ÈÕ£¬£¬£¬£¬ËÕÀèÊÀÁª°îÀí¹¤Ñ§ÔºÓë¹È¸èÁªºÏÑо¿·¢Ã÷£¬£¬£¬£¬Õë¶ÔSK Hynix DDR5ÄÚ´æÐ¾Æ¬µÄÐÂÐÍRowHammer¹¥»÷±äÖÖ"Phoenix"£¨CVE-2025-6202£¬£¬£¬£¬CVSSÆÀ·Ö7.1£©ÒÑÍ»ÆÆÏÖÓзÀ»¤»úÖÆ¡£¡£¡£¸Ã¹¥»÷ͨ¹ýÖØ¸´»á¼ûÌØ¶¨ÄÚ´æÐд¥·¢ÏàÁÚÐÐλ·×ª£¬£¬£¬£¬¿ÉÔÚ109ÃëÄÚʵÏÖ±ê×¼DDR5×ÀÃæÏµÍ³µÄrootȨÏÞÌáÉý£¬£¬£¬£¬Ó°Ïì¹æÄ£ÁýÕÖ2021-2024ÄêÉú²úµÄ15¿îDDR5оƬ¡£¡£¡£Ñо¿Ö¤Êµ£¬£¬£¬£¬Ö»¹ÜDDR5ÄÚÖÃÆ¬ÉÏECC¾À´íºÍTRRÄ¿µÄÐÐˢеȷÀ»¤²½·¥£¬£¬£¬£¬ÈÔÎÞ·¨ÓÐÓõÖÓùPhoenix¹¥»÷¡£¡£¡£¹¥»÷Õß¿Éͨ¹ýλ·×ªÆÆËðSSHÉí·ÝÑéÖ¤£¨ÈçÇÔȡͬµØÐéÄâ»úRSA-2048ÃÜÔ¿£©»òʹÓÃsudo¶þ½øÖÆÎļþÌáȨ¡£¡£¡£ÊµÑéÏÔʾ£¬£¬£¬£¬ECCºÍTRRµÈ¹Å°å·ÀÓùÊֶζÔSMASH¡¢Half-DoubleµÈÖØ´ó¹¥»÷ͬÑùʧЧ£¬£¬£¬£¬¶øPhoenix¸üÊ×´ÎÔÚÉú²ú¼¶DDR5ϵͳʵÏֶ˵½¶ËÌáȨʹÓᣡ£¡£Ñо¿ÍŶÓÖ¸³ö£¬£¬£¬£¬DRAMÃܶÈÀ©Õ¹µ¼ÖÂ×°±¸ÌØÕ÷³ß´çËõС£¡£¡£¬£¬£¬£¬·´¶ø½µµÍÁË´¥·¢RowHammerËùÐèµÄ¼¤»î´ÎÊý£¬£¬£¬£¬Ê¹ÐÂÐÍоƬ¸üÒ×Êܹ¥»÷¡£¡£¡£Îó²îÃô¸ÐÐÔÉæ¼°Î¶ȡ¢µçѹ¡¢¹¤ÒÕת±ä¡¢Êý¾ÝģʽµÈ¶àά¶È±äÁ¿¡£¡£¡£×÷ΪӦ¶Ô£¬£¬£¬£¬½¨Ò齫ÄÚ´æË¢ÐÂÂÊÌáÉýÖÁ3±¶ÒÔ×èֹλ·×ª¡£¡£¡£
https://thehackernews.com/2025/09/phoenix-rowhammer-attack-bypasses.html
3. SlopAds£ºÈ«ÇòAndroid¹ã¸æÚ²ÆÐж¯±»½ÒÆÆ²¢´ì°Ü
9ÔÂ16ÈÕ£¬£¬£¬£¬ÃûΪ"SlopAds"µÄ´ó¹æÄ£Android¹ã¸æÚ²ÆÐж¯±»HUMANµÄSatoriÍþвÇ鱨ÍÅ¶Ó½ÒÆÆ²¢´ì°Ü¡£¡£¡£¸ÃÐж¯Í¨¹ýGoogle PlayÉϵÄ224¸ö¶ñÒâÓ¦ÓÃʵÑ飬£¬£¬£¬ÖðÈÕÌìÉú23ÒÚ´Î¹ã¸æÇëÇ󣬣¬£¬£¬ÀÛ¼ÆÏÂÔØÁ¿³¬3800Íò´Î£¬£¬£¬£¬ÁýÕÖÈ«Çò228¸ö¹ú¼Ò¼°µØÇø£¬£¬£¬£¬ÆäÖÐÃÀ¹úÒÔ30%µÄ¹ã¸æÕ¹Ê¾Á¿¾ÓÊ×£¬£¬£¬£¬Ó¡¶ÈºÍ°ÍÎ÷ÅÅÁжþ¡¢Èýλ¡£¡£¡£SlopAds½ÓÄɶà²ã¹æ±ÜÕ½ÂÔ£¬£¬£¬£¬Ê¹ÓûìÏýºÍÒþдÊõÒþ²Ø¶ñÒâÐÐΪ£¬£¬£¬£¬ÌÓ±ÜGoogleÉóºË¼°Çå¾²Èí¼þ¼ì²â¡£¡£¡£ÈôÓû§Í¨¹ý×ÔȻ;¾¶×°ÖÃÓ¦Ó㬣¬£¬£¬ÆäÌåÏÖÈçͨÀýÓ¦Ó㻣»£»£»£»µ«Èôͨ¹ýÍþвÕß¹ã¸æ»î¶¯×°Ö㬣¬£¬£¬Ôò´¥·¢¶ñÒâÄ£¿£¿£¿£¿£¿éÏÂÔØ¡£¡£¡£Ó¦ÓÃʹÓÃFirebase Remote Config»ñÈ¡¼ÓÃÜÉèÖÃÎļþ£¬£¬£¬£¬°üÀ¨¹ã¸æÚ²ÆÄ£¿£¿£¿£¿£¿é¡¢ÌáÏÖЧÀÍÆ÷¼°JavaScript¸ºÔØURL£¬£¬£¬£¬²¢Ñé֤װ±¸ÊÇ·ñΪÕýµ±Óû§ËùÓУ¬£¬£¬£¬×èÖ¹±»Ñо¿Ö°Ô±»òÇå¾²Èí¼þÆÊÎö¡£¡£¡£Ò»µ©Í¨¹ý¼ì²é£¬£¬£¬£¬Ó¦ÓÃÏÂÔØËÄÕź¬ÒþдÊõµÄPNGͼÏñ£¬£¬£¬£¬½âÃÜÖØ×éΪ"FatModule"¶ñÒâÈí¼þ¡£¡£¡£¼¤»îºó£¬£¬£¬£¬¸ÃÈí¼þͨ¹ýÒþ²ØµÄWebViewsÍøÂç×°±¸ÐÅÏ¢£¬£¬£¬£¬µ¼º½ÖÁ¹¥»÷Õß¿ØÖƵÄÚ²ÆÓò£¬£¬£¬£¬ÖðÈÕ±¬·¢³¬20ÒÚ´ÎÚ²Æ¹ã¸æÕ¹Ê¾¼°µã»÷£¬£¬£¬£¬Îª¹¥»÷Õß´´Á¢²»·¨ÊÕÈë¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬GoogleÒÑ´ÓPlay StoreÒÆ³ýËùÓÐSlopAdsÓ¦Ó㬣¬£¬£¬²¢¸üÐÂPlay Protect¹¦Ð§£¬£¬£¬£¬ÖÒÑÔÓû§Ð¶ÔØÉè±¹ØÁ¬Ä¶ñÒâÓ¦Óᣡ£¡£
https://www.bleepingcomputer.com/news/security/google-nukes-224-android-malware-apps-behind-massive-ad-fraud-campaign/
4. npm¹©Ó¦Á´Ôâ´ó¹æÄ£ÈëÇÖ£¬£¬£¬£¬187¸ö°ü±»Ä¾Âí»¯
9ÔÂ16ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬Ò»³¡ÃûΪ"Shai-Hulud"µÄÐͬÈä³æÊ½¹©Ó¦Á´¹¥»÷ÔÚnpmƽ̨±¬·¢£¬£¬£¬£¬ÖÁÉÙ187¸öÈí¼þ°üÔâÈëÇÖ²¢Ö²Èë×ÔÈö²¥¶ñÒâ¸ºÔØ¡£¡£¡£¸Ã¹¥»÷ʼÓÚ@ctrl/tinycolor°ü£¨ÖÜÏÂÔØÁ¿³¬200Íò´Î£©£¬£¬£¬£¬ËæºóѸËÙÀ©Õ¹ÖÁCrowdStrikeµÈ×ÅÃûÆóÒµµÄnpmÃüÃû¿Õ¼ä£¬£¬£¬£¬Ðγɿçά»¤ÕßµÄ×Ô¶¯Ä¾Âí»¯Èö²¥Á´¡£¡£¡£¹¥»÷»úÖÆÏÔʾ£¬£¬£¬£¬¶ñÒâÈí¼þͨ¹ýÐÞ¸Äpackage.jsonÎļþ×¢Èëbundle.js¾ç±¾£¬£¬£¬£¬Ê¹ÓÃTruffleHog¹¤¾ßɨÃèÖ÷»úÁîÅÆºÍÔÆÆ¾Ö¤£¬£¬£¬£¬ÑéÖ¤ºó½¨ÉèGitHub ActionsÊÂÇéÁ÷£¬£¬£¬£¬½«Ãô¸ÐÊý¾Ýй¶ÖÁÓ²±àÂëwebhook¶Ëµã¡£¡£¡£ÕâÖÖ"×ÔÎÒ×ÌÉú"ÌØÕ÷ʹ¹¥»÷ÄÜ×Ô¶¯Ñ¬È¾Í³Ò»Î¬»¤ÕߵįäËûÈí¼þ°ü£¬£¬£¬£¬Ðγɼ¶ÁªÐ§Ó¦¡£¡£¡£ÊÜÓ°ÏìÆóÒµ·½Ã棬£¬£¬£¬CrowdStrikeѸËÙɾ³ý¶ñÒâ°ü²¢ÂÖ»»ÃÜÔ¿£¬£¬£¬£¬Ç¿µ÷Æä½¹µãƽ̨δÊÜÓ°Ï죻£»£»£»£»¹È¸èGemini CLIËäÔ´´úÂëÇå¾²£¬£¬£¬£¬µ«Óû§Ðè¼ì²é×°ÖÃÇéÐΡ£¡£¡£ÊÂÎñ̻¶·ºÆð´úÈí¼þ¹©Ó¦Á´µÄųÈõÐÔ£¬£¬£¬£¬µ¥¸öά»¤ÕßÕË»§Ð¹Â¶¼´¿É²¨¼°Êý°ÙÏîÄ¿¡£¡£¡£
https://www.bleepingcomputer.com/news/security/self-propagating-supply-chain-attack-hits-187-npm-packages/
5. ÐÂÐÍFileFix¹¥»÷ʹÓÃÒþдÊõÖ²ÈëStealC¶ñÒâÈí¼þ
9ÔÂ16ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬Acronis·¢Ã÷Ò»ÖÖÃûΪFileFixµÄÐÂÐÍÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬¸Ã¹¥»÷ð³äMetaÕË»§ÔÝÍ£ÖÒÑÔ£¬£¬£¬£¬Í¨¹ýÈ«ÐÄÉè¼ÆµÄÍøÂç´¹ÂÚÒ³ÃæÓÕÆÓû§½«¶ñÒâPowerShellÏÂÁîÕ³ÌùÖÁÎļþ×ÊÔ´ÖÎÀíÆ÷µØµãÀ¸£¬£¬£¬£¬´Ó¶øÔÚ²»ÖªÇéµÄÇéÐÎÏÂ×°ÖÃStealCÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¹¥»÷Á÷³ÌÏÔʾ£¬£¬£¬£¬´¹ÂÚÒ³Ãæ»áÌáÐÑÓû§µã»÷¡°¸´ÖÆ¡±°´Å¥»ñÈ¡¿´ËÆÎļþ·¾¶µÄ¡°ÊÂÎñ±¨¸æ¡±£¬£¬£¬£¬ÏÖʵ¸´ÖƵÄÊÇÌí¼ÓÁ˿ոñµÄ¶ñÒâPowerShellÏÂÁî¡£¡£¡£µ±Óû§½«´ËÏÂÁîÕ³ÌùÖÁÎļþ×ÊÔ´ÖÎÀíÆ÷µØµãÀ¸Ê±£¬£¬£¬£¬½öÏÔʾÎļþ·¾¶£¬£¬£¬£¬Òþ²ØµÄ¶ñÒâÏÂÁîÔò±»Ö´ÐС£¡£¡£¸ÃÏÂÁî»á´ÓBitbucketÏÂÔØÒþ²ØÔÚJPGͼÏñÖеĵڶþ½×¶Î¾ç±¾£¬£¬£¬£¬Í¨¹ýÒþдÊõÌáÈ¡²¢½âÃÜÄÚ´æÖеÄÓÐÓÃÔØºÉ£¬£¬£¬£¬×îÖÕ°²ÅÅStealC¶ñÒâÈí¼þ¡£¡£¡£StealC¿ÉÇÔÈ¡Óû§×°±¸ÖеÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬°üÀ¨Chrome¡¢FirefoxµÈä¯ÀÀÆ÷µÄƾ֤ºÍÉí·ÝÑéÖ¤cookie£¬£¬£¬£¬Discord¡¢TelegramµÈͨѶӦÓÃµÄÆ¾Ö¤£¬£¬£¬£¬±ÈÌØ±Ò¡¢ÒÔÌ«·»µÈ¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢£¬£¬£¬£¬AWS¡¢AzureµÈÔÆÆ¾Ö¤£¬£¬£¬£¬ÒÔ¼°ProtonVPN¡¢Battle.netµÈVPNºÍÓÎÏ·Ó¦ÓÃÊý¾Ý£¬£¬£¬£¬Í¬Ê±¾ß±¸½ØÈ¡»î¶¯×ÀÃæÆÁÄ»½ØÍ¼µÄÄÜÁ¦¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-filefix-attack-uses-steganography-to-drop-stealc-malware/
6. °¢À˹¼ÓANHCÊý¾Ýй¶£¬£¬£¬£¬Ó°Ïì6ÍòÃû»¼Õß
9ÔÂ16ÈÕ£¬£¬£¬£¬°¢À˹¼ÓÖݰ²¿ËÀׯæÉçÇø¿µ½¡ÖÐÐÄ£¨ANHC£©¿ËÈÕÔâÓö´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ºÚ¿Í×éÖ¯Éù³ÆÒÑй¶6Íò·Ý»¼Õ߼ͼ¡£¡£¡£ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©°²¿ËÀׯæÐ§ÀÍ´¦ÒÑ×¢ÖØµ½¸ÃÖ¸¿Ø£¬£¬£¬£¬²¢ÌåÏÖ½«ÑÏËà¿´´ý´ËÀàÊÂÎñ£¬£¬£¬£¬µ«Æ¾Ö¤Õþ²ßÎÞ·¨Í¸Â¶ÊÓ²ìϸ½Ú¡£¡£¡£ANHC¹ÙÍøÖ¤ÊµÍøÂç±£´æÇå¾²ÊÂÎñ£¬£¬£¬£¬ÒÑÆô¶¯È¡Ö¤ÊӲ첢ÏÂÏßÊÜÓ°Ïìϵͳ£¬£¬£¬£¬Í¬Ê±ÓëµÚÈý·½ÍøÂçÇ徲ר¼ÒÏàÖú£¬£¬£¬£¬²¢Í¨ÖªÖ´·¨²¿·Ö¡£¡£¡£ÊÂÎñÓ°Ïì·½Ãæ£¬£¬£¬£¬»¼ÕßÒÁÀöɯ°×͸¶ÆäСÎÒ˽¼ÒÐÅÏ¢£¨°üÀ¨Éç±£ºÅ¡¢µØµã¡¢µç»°µÈ£©±»ºÚ¿Íͨ¹ýµç×ÓÓʼþÖ±½Óй¶¡£¡£¡£ANHC»ØÓ¦³ÆÒÑÏòÊÜÓ°Ï컼ÕßÌṩÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬²¢ÔÊÐíÒ»Äêºó¼ÌÐøÌṩÉí·Ý͵ÇÔ±£»£»£»£»£»¤£¬£¬£¬£¬µ«²¿·Ö»¼Õß·´Ó¦»ñȡЧÀÍÐè×Ô¶¯ÕùÈ¡¡£¡£¡£°¢À˹¼ÓÐÂÎÅÔ´¡¢Öݹ«¹²Çå¾²²¿µÈ¶à·½ÒÑÊÕµ½ºÚ¿ÍÓʼþ¸±±¾£¬£¬£¬£¬ANHC»¹Òâʶµ½Î´¾ÊÚȨ·½ÁªÏµÁËÉçÇø²¿·ÖСÎÒ˽¼Ò¡£¡£¡£
https://www.alaskasnewssource.com/2025/09/16/fbi-aware-anchorage-health-clinic-data-breach-hackers-claim-60k-patients-impacted/


¾©¹«Íø°²±¸11010802024551ºÅ