±¦Âí¼¯ÍÅÔâEverestÀÕË÷Èí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2025-09-191. ±¦Âí¼¯ÍÅÔâEverestÀÕË÷Èí¼þ¹¥»÷
9ÔÂ17ÈÕ£¬£¬£¬µÂ¹ú±¦Âí¼¯ÍÅÔâÓöEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬³ÉΪ8ÔÂ31ÈսݱªÂ·»¢ºó²»µ½Ò»¸öÔÂÄÚµÚ¶þ¸ö±»ºÚµÄºÀ»ªÆû³µÆ·ÅÆ¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÚ°µÍøÑó´ÐÕ¾µãÐû²¼Í¨¸æ£¬£¬£¬Éù³ÆÇÔÈ¡Á˱¦Âí¡°Òªº¦Éó¼ÆÎļþ¡±£¬£¬£¬²¢ÉèÖÃÁ½¸öµ¹¼ÆÊ±ÖÓ£¬£¬£¬Ò»¸öÏÔʾ9ÔÂ14ÈÕ¡°Â¼Òô¡±½«²»¿ÉÓã¨Ê£Óàȱ·¦24Сʱ£©£¬£¬£¬ÁíÒ»¸öÒªÇó¹«Ë¾48СʱÄÚÁªÏµÌ¸ÅС£¡£¡£¡£¡£±¦Âí×ܲ¿Î»ÓÚĽÄáºÚ£¬£¬£¬ÓµÓÐ160,000ÃûÔ±¹¤£¬£¬£¬ÔÚ15¹úÉè30ÓàÉú²ú»ùµØ£¬£¬£¬2024ÄêÈ«Çò²úÁ¿³¬240ÍòÁ¾£¨ÖйúÕ¼30%£©£¬£¬£¬ÄêÊÕÈ볬1.42ÒÚÅ·Ôª¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Éæ¼°ÆìÏÂMini¡¢ÀÍ˹À³Ë¹¼°MotorradĦÍгµ²¿·Ö¡£¡£¡£¡£¡£Everestδ͸¶ÊÇ·ñÇÔÈ¡¿Í»§Êý¾Ý¡£¡£¡£¡£¡£Everest×Ô2021Äê»îÔ¾£¬£¬£¬2023ÄêÒÔÀ´°µÍø²©¿ÍÁÐ248ÃûÊܺ¦Õߣ¬£¬£¬½ü12¸öÔ¹¥»÷³¬90Ãû×éÖ¯¡£¡£¡£¡£¡£±¦Âí¼¯ÍÅÉÐδ»ØÓ¦£¬£¬£¬ÊÂÎñÊÓ²ìÈÔÔÚ¾ÙÐС£¡£¡£¡£¡£
https://cybernews.com/news/bmw-ransomware-attack-everest-claim-everest-luxury-target-jlr-trend/
2. ·ðÂÞÀï´ï²¼ÀïÍßµÂÒ½ÁÆÐ»áÔâ´ó¹æÄ£Êý¾Ýй¶
9ÔÂ18ÈÕ£¬£¬£¬×ܲ¿Î»ÓÚ·ðÂÞÀï´ïÖÝÄ«¶û±¾µÄ²¼ÀïÍßµÂÒ½ÁÆÐ»á1ÔÂÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬Ó°Ïì¹æÄ£²¨¼°½ü25ÍòÈË¡£¡£¡£¡£¡£¸Ã»ú¹¹×÷ΪÍâµØÖ÷ÒªÒ½ÁƱ£½¡Ð§ÀÍÌṩÕߣ¬£¬£¬ÓÚ1ÔÂÖÐÑ®·¢Ã÷ϵͳÔâÈëÇÖ£¬£¬£¬¾ÊÓ²ìÈ·ÈϹ¥»÷Õß¿ÉÄÜÇÔÈ¡ÁËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¼°Êܱ£»£»£»£»£»£»¤µÄ¿µ½¡Êý¾Ý¡£¡£¡£¡£¡£Ö»¹Ü9ÔÂ5ÈÕÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌύ֪ͨʱδÅû¶ÏêϸÈËÊý£¬£¬£¬µ«ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Ò½ÁÆÊý¾Ýй¶׷×ÙϵͳÏÔʾ£¬£¬£¬ÏÖʵÊÜÓ°ÏìÈËÊý¸ß´ï246,711ÈË£¬£¬£¬º¸Ç»¼Õß¡¢Ô±¹¤¼°ÏàÖúͬ°éÏà¹ØÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£BianLianÀÕË÷Èí¼þ×éÖ¯ÒÑÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÄÚÈݲ»µ«°üÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢Ó뿵½¡¼Í¼£¬£¬£¬»¹Éæ¼°»á¼Æ¡¢ÈËÁ¦×ÊÔ´Êý¾Ý¿â¼°ÏàÖú·½ÍùÀ´ÓʼþµÈÎļþ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¸Ã×éÖ¯×Ô3ÔÂβÆðÒÑÎÞ¹ûÕæ»î¶¯¼Í¼£¬£¬£¬ÏÖÔÚ±»µÁÊý¾ÝÈ¥ÏòÈÔ²»Ã÷È·¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ÊÂÎñÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬Ïà¹Ø»ú¹¹ÕýÊÔͼ׷ËÝÊý¾ÝÁ÷Ïò²¢ÆÀ¹ÀDZÔÚΣº¦¡£¡£¡£¡£¡£
https://www.securityweek.com/nearly-250000-impacted-by-data-breach-at-medical-associates-of-brevard/
3. ¶íÂÞ˹KrasAviaº½¿Õ¹«Ë¾ÒÉÔâÍøÂç¹¥»÷ÖÂÊý×ÖЧÀÍÖÐÖ¹
9ÔÂ18ÈÕ£¬£¬£¬¶íÂÞ˹µØÇøº½¿Õ¹«Ë¾KrasAviaÐû²¼ÉùÃ÷³Æ£¬£¬£¬Æä²¿·ÖÊý×ÖЧÀÍÒòϵͳ¹ÊÕÏÖÐÖ¹£¬£¬£¬³ÉΪÒÉËÆÍøÂç¹¥»÷À˳±Öиùúº½¿ÕÒµÔâÓöµÄ×îÐÂÊÂÎñ¡£¡£¡£¡£¡£Õâ¼Ò×ܲ¿Î»ÓÚ¿ËÀ˹ŵÑǶû˹¿ËµÄº½Ë¾ÌåÏÖ£¬£¬£¬×¨¼ÒÕýÈ«Á¦½µµÍº½°àʱ¿Ì±íΣº¦²¢¾¡¿ì»Ö¸´ÔËÓª¡£¡£¡£¡£¡£×èÖ¹ÍâµØÊ±¼äÖÜËÄÍí¼ä£¬£¬£¬ÆäÍøÕ¾ÒṈ̃»¾£¬£¬£¬ÔÚÏßÊÛÆ±ÔÝÍ££¬£¬£¬ÂÿÍÎÞ·¨¾ÙÐÐÊý×ÖÖµ»ú£¬£¬£¬µ«º½°àÈÔ°´ÍýÏëÔËÐС£¡£¡£¡£¡£¸Ã¹«Ë¾Ö÷ÒªÖ´·ÉÖÐÎ÷²®ÀûÑǼ°Ãɹź½Ïß¡£¡£¡£¡£¡£Ö»¹ÜKrasAviaδÃ÷È·ÈÏ¿ÉÍøÂç¹¥»÷£¬£¬£¬µ«ÏòÍâµØÃ½Ìå͸¶´Ë´Î¹ÊÕÏÓë¶íÂÞ˹Æì½¢º½Ë¾Aeroflot 7ÔÂβÔâÓöµÄ¹ÊÕÏÀàËÆ¡£¡£¡£¡£¡£Aeroflot´ËǰÒòÒÉËÆÍøÂç¹¥»÷µ¼ÖÂÑÏÖØÑÓÎóºÍ×÷·Ï£¬£¬£¬Ç×ÎÚ¿ËÀ¼ºÚ¿Í×éÖ¯¡°Ä¬È»ÎÚÑ»¡±£¨Silent Crow£©¼°°×¶íÂÞË¹ÍøÂçÓλ÷¶Ó£¨Belarusian Cyber Partisans£©Ðû³Æ¶Ô´ËÈÏÕæ£¬£¬£¬²¢Éù³ÆÇÔÈ¡Á˺½Ðмͼ¡¢ÄÚ²¿Í¨»°ÒôƵ¼°¼à¿Ø×ÊÁÏ¡£¡£¡£¡£¡£ÖÜËÄ£¬£¬£¬ÇøÓòÐÔTelegramƵµÀBorusÐû²¼½ØÍ¼£¬£¬£¬ÏÔʾKrasAviaÍøÒ³±»¸Ä¶¯£¬£¬£¬¶íº½¼°KrasAvia±êʶ±»»®µô£¬£¬£¬¸½ÎÄ¡°ÎÒÃÇ»¹Ã»×îÏÈ¡¡¡±£¬£¬£¬²¢·ºÆð¡°Ä¬È»ÎÚÑ»¡±Í·Ïñͼ±ê¡£¡£¡£¡£¡£
https://therecord.media/russia-krasavia-airline-disrupted-suspected-cyberattack
4. SystemBCÊðÀí½©Ê¬ÍøÂ磺ºã¾Ã»îÔ¾µÄ¶ñÒâÁ÷Á¿ÒýÇæ
9ÔÂ18ÈÕ£¬£¬£¬SystemBCÊðÀí½©Ê¬ÍøÂç×Ô2019ÄêÆðÒ»Á¬»îÔ¾£¬£¬£¬³ÉΪ¶à¸öÀÕË÷Èí¼þÍŻP·¸·¨×é֯ת´ï¶ñÒâÔØºÉµÄ½¹µãͨµÀ¡£¡£¡£¡£¡£¸ÃÍøÂçÈÕ¾ùά»¤Ô¼1500¸ö»úеÈ˽ڵ㣬£¬£¬Ö÷ҪʹÓÃÈ«Çò¹æÄ£ÄÚ±£´æÎ´ÐÞ²¹ÑÏÖØÎó²îµÄÉÌÒµÐéÄâרÓÃЧÀÍÆ÷£¨VPS£©¹¹½¨£¬£¬£¬ÆäÖнü80%µÄ½ÚµãÀ´×Ô×ðÐÍÉÌÒµ¹©Ó¦É̵ÄÊÜѬȾVPSϵͳ¡£¡£¡£¡£¡£ÕâЩЧÀÍÆ÷ƽ¾ù±£´æ20¸öδÐÞ¸´µÄÇå¾²ÎÊÌ⣬£¬£¬ÇÒÖÁÉÙ°üÀ¨Ò»¸ö¸ßΣÎó²î£¬£¬£¬²¿·Ö°¸ÀýÉõÖÁ̻¶161¸öÎó²î£¬£¬£¬µ¼ÖÂѬȾÊÙÃüÏÔÖøÑÓÉ죬£¬£¬½ü40%µÄϵͳѬȾʱ¼äÁè¼ÝÒ»¸öÔ¡£¡£¡£¡£¡£SystemBCµÄ½¹µã¹¦Ð§ÊÇÔÊÐí¹¥»÷Õßͨ¹ýÊÜѬȾÖ÷»ú·ÓɶñÒâÁ÷Á¿£¬£¬£¬²¢Òþ²ØÏÂÁîÓë¿ØÖÆ£¨C2£©»î¶¯ÒÔ¹æ±Ü¼ì²â¡£¡£¡£¡£¡£Æä80Óà¸öC2ЧÀÍÆ÷²»µ«Ö±½ÓÅþÁ¬ÊðÀí½Úµã£¬£¬£¬»¹ÎªREM Proxy¡¢Ô½ÄÏVN5SocksÊðÀíÍøÂç¼°¶íÂÞË¹ÍøÂçץȡ¹«Ë¾µÈ¿Í»§Ìṩ·Ö²ãЧÀÍ¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬¸ÃÍøÂçÓë¶íÂÞ˹±£´æÊÖÒÕ¹ØÁª£ºÐÂѬȾЧÀÍÆ÷»áÏÂÔØ´øÓжíÓï×¢Ê͵Äshell¾ç±¾£¬£¬£¬Ç¿ÖƲ¢ÐÐÔËÐÐËùÓÐSystemBCÑù±¾£»£»£»£»£»£»½¹µã½ÚµãÍйÜËùÓÐ180¸ö¶ñÒâÈí¼þÑù±¾¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/systembc-malware-turns-infected-vps-systems-into-proxy-highway/
5. PyPIʹGhostAction¹©Ó¦Á´¹¥»÷Öб»µÁµÄÁîÅÆÊ§Ð§
9ÔÂ18ÈÕ£¬£¬£¬PythonÈí¼þ»ù½ð»áÐû²¼ÒÑʹ9Ô³õGhostAction¹©Ó¦Á´¹¥»÷ÖÐÇÔÈ¡µÄËùÓÐPyPIÁîÅÆÊ§Ð§£¬£¬£¬²¢È·ÈÏÍþвÐÐΪÕßδÀÄÓÃÕâЩÁîÅÆÔÚPython°üË÷Òý£¨PyPI£©Ðû²¼¶ñÒâÈí¼þ¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚ9ÔÂ5ÈÕGitGuardianÔ±¹¤±¨¸æµÄ¶ñÒâGitHub ActionsÊÂÇéÁ÷£¨ÈçFastUUID£©ÊÔͼÇÔÈ¡PyPIÁîÅÆÖÁÔ¶³ÌЧÀÍÆ÷£¬£¬£¬ÁíÒ»Ñо¿Ö°Ô±Í¬ÈÕ·¢Ë͵ÄÏêÇéÓʼþÒòÎóÈëÀ¬»øÓʼþÎļþ¼Ð£¬£¬£¬µ¼ÖÂPyPIÇå¾²ÍŶÓÖ±ÖÁ9ÔÂ10Èղůô¶¯ÏìÓ¦¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬¹¥»÷Õßͨ¹ýÐ޸Ĵ洢¿âÊÂÇéÁ÷£¬£¬£¬½«´æ´¢ÎªGitHubÉñÃØµÄPyPIÁîÅÆ·¢ËÍÖÁÍⲿЧÀÍÆ÷¡£¡£¡£¡£¡£Ö»¹ÜÀÖ³ÉÇÔÈ¡²¿·ÖÁîÅÆ£¬£¬£¬µ«Î´ÔÚPyPIƽ̨ʹÓᣡ£¡£¡£¡£GitGuardianÔÚ³¬570¸öÊÜÓ°Ïì´æ´¢¿âÖÐÌá½»GitHubÎÊÌ⣬£¬£¬²¢×ª´ïGitHub¡¢npm¼°PyPIÇå¾²ÍŶӡ£¡£¡£¡£¡£PyPIÍŶÓËæºóʹËùÓÐÊÜÓ°ÏìÁîÅÆÊ§Ð§£¬£¬£¬ÐÖúÏîÄ¿ËùÓÐÕßÔöÇ¿ÕË»§Çå¾²¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬GhostAction¹¥»÷²¨¼°¹æÄ£Ô¶³¬PyPI£ºGitGuardianÔ¤¼Æ³¬3.3Íò¸öÉñÃØ±»µÁ£¬£¬£¬Éæ¼°PyPI¡¢npm¡¢DockerHub¡¢GitHub¡¢Cloudflare APIÁîÅÆ¼°AWS»á¼ûÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈ£¬£¬£¬Ó°Ïì°üÀ¨Rust¡¢JavaScript¡¢GoÔÚÄڵĶàÓïÑÔ´úÂë¿â£¬£¬£¬²¿·ÖÆóÒµÕû¸öSDK²úÆ·×éºÏÔâÈëÇÖ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/pypi-invalidates-tokens-stolen-in-ghostaction-supply-chain-attack/
6. º«¹úÀÖÌ쿨ÔâºÚ¿Í¹¥»÷£¬£¬£¬300ÍòÓû§Êý¾Ýй¶
9ÔÂ18ÈÕ£¬£¬£¬º«¹úµÚÎå´óÐÅÓÿ¨¿¯ÐÐÉÌÀÖÌ쿨ÓÚ9ÔÂÅûÂ¶ÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬Éæ¼°297ÍòÓû§£¬£¬£¬³ÉΪ½ñÄêÈ«Çò×î´óÊý¾Ýй¶ÊÂÎñÖ®Ò»¡£¡£¡£¡£¡£½ðÈÚ¼àÊÓÔºÊÓ²ìÏÔʾ£¬£¬£¬7ÔÂ22ÈÕÖÁ8ÔÂ27ÈÕʱ´ú£¬£¬£¬¸Ã¹«Ë¾ÔÚÏßÖ§¸¶Ð§ÀÍÆ÷ÔâºÚ¿Í¹¥»÷£¬£¬£¬Áè¼Ý200GBÊý¾Ý±»ÇÔÈ¡¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨ÅþÁ¬¼Í¼¡¢ÐéÄâÖ§¸¶´úÂë¡¢ÄÚ²¿Ê¶ÓÖÃû¼°ÉúÒâÀàÐ͵ȣ¬£¬£¬ÆäÖÐÔ¼28ÍòÓû§Òò¿¨ºÅ¡¢ÓÐÓÃÆÚºÍÇå¾²ÂëÔÚµçêaê_¾°Ì»Â¶£¬£¬£¬ÃæÁÙÖ±½Ó²»·¨Ê¹ÓÃΣº¦¡£¡£¡£¡£¡£ÀÖÌ쿨ÒÑΪ¸ßΣº¦Óû§Æô¶¯»»¿¨³ÌÐò£¬£¬£¬×èÖ¹ÖÜÈýÒÑÓÐ5.5ÍòÓû§Íê³É»»¿¨£¬£¬£¬ÆäÓà269ÍòÓû§Êý¾Ý±»ÆÀ¹ÀΪµÍÃô¸Ð¶È£¬£¬£¬ÔÝÎÞÐèÖØÐ·¢¿¨¡£¡£¡£¡£¡£ÏÖÔÚδ¼ì²âµ½Î´¾ÊÚȨÉúÒâ¡£¡£¡£¡£¡£ÊÂÎñȪԴֱָÇå¾²ÖÎÀíÎó²î£º¹¥»÷ÕßÓÚ8ÔÂ12ÈÕɨÃèЧÀÍÆ÷Îó²î£¬£¬£¬Ô½ÈÕÖ²Èë¶ñÒâ´úÂ룬£¬£¬14-15ÈÕÇÔÈ¡1.7GBÊý¾Ý£¬£¬£¬ºóÐøÍ¨¹ýÊðÀíWeb ShellÒ»Á¬ÌáÈ¡ÉúÒâÈÕÖ¾£¬£¬£¬×îÖÕ2700¸öй¶ÎļþÖнö56%¼ÓÃÜ¡£¡£¡£¡£¡£ÀÖÌ쿨ֱÖÁ8ÔÂ26ÈÕÀýÐмì²é²Å·¢Ã÷ÈëÇÖ£¬£¬£¬ÏµÍ³Ì»Â¶½üÁ½ÖÜ¡£¡£¡£¡£¡£¸üÁîÈËÕ𾪵ÄÊÇ£¬£¬£¬¸ÃÎó²î×îÔçÓÚ2017Äê±»·¢Ã÷£¬£¬£¬µ«ÍâÑóÖ§¸¶Ð§ÀÍÆ÷Òò»á¼ûÁ¿µÍ±»ÒÅ©ÐÞ²¹£¬£¬£¬ÐγÉÒªº¦Ç徲ȱ¿Ú¡£¡£¡£¡£¡£
https://www.koreaherald.com/article/10578647


¾©¹«Íø°²±¸11010802024551ºÅ