ÃÀ¹úCISAÖÒÑÔMotex Lanscope¸ßΣÎó²îÔâÆð¾¢Ê¹ÓÃ
Ðû²¼Ê±¼ä 2025-10-241. ÃÀ¹úCISAÖÒÑÔMotex Lanscope¸ßΣÎó²îÔâÆð¾¢Ê¹ÓÃ
10ÔÂ23ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÖÜÈý½«Ó°ÏìMotex Lanscope Endpoint ManagerµÄÑÏÖØÇå¾²Îó²îCVE-2025-61932£¨CVSS v4ÆÀ·Ö9.3£©ÄÉÈëÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬²¢Ã÷È·¸ÃÎó²îÒѱ»Æð¾¢Ê¹Óᣡ£¡£¸ÃÎó²îÔ´ÓÚLanscope Endpoint ManagerÍâµØ°æ±¾Öпͻ§¶Ë³ÌÐòºÍ¼ì²âÊðÀíµÄͨѶͨµÀÑéÖ¤»úÖÆÈ±ÏÝ£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý·¢ËÍÌØÖÆÊý¾Ý°üÔÚÊÜÓ°ÏìϵͳÉÏÖ´ÐÐí§Òâ´úÂ룬£¬£¬×é³ÉÖØ´óÇå¾²Íþв¡£¡£¡£¾ÝCISAÅû¶£¬£¬£¬Îó²îÓ°Ïì9.4.7.1¼°¸üÔç°æ±¾£¬£¬£¬Éæ¼°¶à¸öÀúÊ·°æ±¾¡£¡£¡£MotexÒÑÐû²¼ÐÞ¸´²¹¶¡¡£¡£¡£ÈÕ±¾Îó²î˵Ã÷£¨JVN£©ÃÅ»§ÍøÕ¾±¾Öܾ¯±¨ÏÔʾ£¬£¬£¬MotexÒÑÈ·ÈÏÓÐδǩ×Ö¿Í»§¡°ÊÕµ½ÒÉËÆÕë¶Ô¸ÃÎó²îµÄ¶ñÒâÊý¾Ý°ü¡±£¬£¬£¬Ö¤Êµ¹¥»÷Òѱ¬·¢£¬£¬£¬µ«Ä»ºóºÚÊÖ¼°¹¥»÷¹æÄ£ÈÔ´ý½øÒ»³ÌÐò²é¡£¡£¡£CISAÇ¿µ÷£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÐèÔÚ2025Äê11ÔÂ12ÈÕǰÍê³ÉÎó²îÐÞ¸´£¬£¬£¬ÒÔ±£»£»£»£»£»£»£»¤ÆäÍøÂçÃâÊÜDZÔÚ¹¥»÷¡£¡£¡£
https://thehackernews.com/2025/10/critical-lanscope-endpoint-manager-bug.html
2. ³¯ÏÊLazarus¡°ÃÎÏëÊÂÇéÐж¯¡±¹¥»÷Å·ÖÞÎÞÈË»úÖÆÔìÉÌ
10ÔÂ23ÈÕ£¬£¬£¬³¯ÏÊLazarus¼¯ÍÅÕë¶ÔÅ·ÖÞÖÐÅ·¼°¶«ÄÏÅ·µØÇøµÄÎÞÈË»úÖÆÔìÉÌÌᳫÐÂÒ»ÂÖÍøÂçÌØ¹¤¹¥»÷£¬£¬£¬Ö¼ÔÚÇÔȡרÓÐÎÞÈË»úÖÆÔìÊÖÒÕ¼°Éè¼Æ¹¤ÒÕ£¬£¬£¬ÒÔÖ§³ÖƽÈÀÀ©´óÆäº£ÄÚÎÞÈË»úÏîÄ¿µÄÕ½ÂÔÄ¿µÄ¡£¡£¡£¾ÝESETÑо¿Ö°Ô±Åû¶£¬£¬£¬´Ë´Î¹¥»÷ÖÁÉÙ²¨¼°Èý¼ÒÉú²ú¾üÊÂ×°±¸µÄ×éÖ¯£¬£¬£¬²¿·Ö×°±¸ÒÑͶÈëÎÚ¿ËÀ¼Õ½³¡¶Ô¿¹¶íÂÞ˹¡£¡£¡£ESET½«´ËÂÖ¹¥»÷ÆÀ¹ÀΪ¡°ÃÎÏëÊÂÇéÐж¯¡±£¨Operation DreamJob£©µÄ×îа汾£¬£¬£¬¸ÃÐж¯×Ô2022ÄêÆðÒ»Á¬»îÔ¾£¬£¬£¬´ËǰÒÑÕë¶Ô»¯¹¤¡¢ÐÅÏ¢ÊÖÒÕ¡¢½ðÈÚЧÀ͵ȶàÐÐҵʵÑéÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¹¥»÷½¹µãÔØºÉΪScoringMathTeaÔ¶³Ì»á¼ûľÂí£¨RAT£©£¬£¬£¬×Ô2022ÄêÊ×´ÎÔÚVirusTotal·ºÆðÒÔÀ´¹¦Ð§»ù±¾Î´±ä£¬£¬£¬Ö§³ÖÔ¼40¸öÏÂÁ£¬£¬º¸ÇÎļþ²Ù×÷¡¢Àú³Ì¿ØÖÆ¡¢ÏµÍ³Õì̽¼°¶ñÒâÔØºÉÏÂÔØµÈ½»»¥Ê½¿ØÖÆÄÜÁ¦¡£¡£¡£ÊÖÒÕÊֶη½Ã棬£¬£¬¹¥»÷ÕßÑÓÐø¡°ÊÂÇéÓÕ¶ü¡±Õ½ÂÔ£¬£¬£¬Í¨¹ýαÔìÇóÖ°ÎļþÓÕÆÊܺ¦Õß×°ÖöñÒâÈí¼þ£¬£¬£¬²¢Ê¹ÓÃGitHubÉϱ»ÈëÇֵĿªÔ´ÏîÄ¿£¨ÈçNotepad++¡¢WinMerge²å¼þ£©ÐÞ¸ÄÍâµØ´úÂ룬£¬£¬°²ÅÅÒþ²ØÐÔ¸ü¸ßµÄ¶ñÒâ³ÌÐòÒÔÈÆ¹ý¼ì²â¡£¡£¡£
https://www.darkreading.com/cyberattacks-data-breaches/lazarus-group-hunts-european-drone-manufacturing-data
3. Jingle ThiefºÚ¿ÍʹÓÃÔÆ»ù´¡ÉèÊ©ÇÔÈ¡Êý°ÙÍòÀñÎ│
10ÔÂ23ÈÕ£¬£¬£¬Palo Alto Networks Unit 42¿ËÈÕ½ÒÆÆÃûΪ"Jingle Thief"µÄÍøÂç·¸·¨¼¯ÍÅ£¬£¬£¬¸Ã×éÖ¯×Ô2021Äêµ×ÆðÒ»Á¬Õë¶ÔÁãÊÛ¼°ÏûºÄÕßЧÀÍÐÐÒµµÄÔÆÇéÐÎʵÑéÀñÎ│ڲơ£¡£¡£Ñо¿Ö°Ô±Stav SettyºÍShachar RoitmanÖ¸³ö£¬£¬£¬¹¥»÷Õßͨ¹ý´¹ÂÚÓʼþ¡¢¶ÌÐÅ´¹ÂÚ¼°¶¨ÖÆ»¯´¹ÂÚÒ³ÃæÇÔÈ¡Microsoft 365ƾ֤£¬£¬£¬ÈëÇÖÀñÎ│¿¯Ðлú¹¹ºó£¬£¬£¬Í¨¹ýºáÏòÒÆ¶¯»ñÈ¡¿¯ÐÐϵͳ»á¼ûȨÏÞ£¬£¬£¬×îÖÕÔÚ»ÒÉ«Êг¡×ªÊÛδ¾ÊÚȨµÄ¸ß¼ÛÖµÀñÎ│IJÀû¡£¡£¡£¸Ã¼¯ÍÅÉÆÓÚºã¾ÃפÁôÊܺ¦ÏµÍ³£¬£¬£¬²¿·Ö°¸ÀýÏÔʾÆäDZÔÚÆÚ³¬10¸öÔ£¬£¬£¬Ê±´úͨ¹ýÕìÌ½ÔÆÇéÐΡ¢»á¼ûSharePoint/OneDrive»ñȡӪҵÔËÓª¡¢²ÆÎñÁ÷³Ì¼°ÀñÎ│¿¯ÐÐÊÂÇéÁ÷µÈÃô¸ÐÐÅÏ¢¡£¡£¡£Îª¹æ±Ü¼ì²â£¬£¬£¬¹¥»÷Õß½ÓÄÉÉí·ÝÀÄÓÃÕ½ÂÔ¶ø·Ç°²ÅÅ×Ô½ç˵¶ñÒâÈí¼þ£ºÀýÈ罨ÉèÊÕ¼þÏ乿Ôò×Ô¶¯×ª·¢ÓʼþÖÁ¹¥»÷Õß¿ØÖƵص㣬£¬£¬×¢²á¶ñÒâÉí·ÝÑéÖ¤Æ÷ÈÆ¹ý¶àÒòËØÈÏÖ¤£¨MFA£©£¬£¬£¬ÉõÖÁ½«×°±¸×¢²áÖÁEntra IDÒÔά³Ö³¤ÆÚ»á¼û¡£¡£¡£Unit 42×·×ٸûΪCL-CRI-1032£¬£¬£¬²¢ÖеÈˮƽ¹éÒòÓÚĦÂå¸ç¾¼Ã·¸·¨ÍÅ»ïAtlas Lion/Storm-0539¡£¡£¡£
https://thehackernews.com/2025/10/jingle-thief-hackers-exploit-cloud.html
4. ÀÕË÷Èí¼þMedusaй¶¿µ¿¨Ë¹ÌØ834 GBÊý¾Ý
10ÔÂ23ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬MedusaÀÕË÷Èí¼þ×éÖ¯¹ûÕæÐ¹Â¶ÁË´ÓÈ«ÇòýÌå¿Æ¼¼¾ÞÍ·¿µ¿¨Ë¹Ìع«Ë¾ÇÔÈ¡µÄ186.36GBѹËõÊý¾Ý£¬£¬£¬²¢Éù³ÆÔʼÊý¾Ý×ÜÁ¿´ï834GB¡£¡£¡£¸Ã×éÖ¯´ËǰÓÚ9ÔÂÏÂÑ®ÈëÇÖ¿µ¿¨Ë¹ÌØ£¬£¬£¬×î³õÒªÇóDZÔÚÂò¼ÒÖ§¸¶120ÍòÃÀÔªÏÂÔØÊý¾Ý£¬£¬£¬ÕâÒ»½ð¶îÓëÆäÏò¿µ¿¨Ë¹ÌØË÷ÒªµÄ¡°É¾³ýÊý¾Ý¡±ÓöÈÒ»Ö¡£¡£¡£Ð¹Â¶µÄÊý¾Ý±»²ð·ÖΪ47¸öÎļþ£¨45¸ö4GBÎļþ¡¢1¸ö2GBÎļþ¼°1¸ö2GBÎļþ£©£¬£¬£¬ÎļþÃû¾ùΪ"Comcast_FS"¡£¡£¡£Êý¾Ý°üÀ¨Esur_rerating_verification.xlsx¡¢Claim Data Specifications.xlsmµÈExcelÎļþ£¬£¬£¬ÒÔ¼°Éæ¼°Æû³µ±£·ÑÓ°ÏìÆÊÎöµÄPythonºÍSQL¾ç±¾¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬¿µ¿¨Ë¹ÌØÎ´¶Ô´ËÊÂ×÷³öÈκλØÓ¦¡£¡£¡£Medusa×éÖ¯ÒÔ¹¥»÷´óÐÍÆóÒµÖøÃû¡£¡£¡£±¾Ô£¬£¬£¬Î¢ÈíÐû²¼Ç徲ͨ¸æÖÒÑÔ£¬£¬£¬MedusaÕýʹÓÃGoAnywhere MFTÎó²î£¨CVE-2025-10035£¬£¬£¬CVSSÆÀ·Ö10.0£©ÊµÑéδ¾ÈÏÖ¤µÄÔ¶³Ì´úÂëÖ´Ðй¥»÷¡£¡£¡£
https://hackread.com/medusa-ransomware-comcast-data-leak/
5. ¼ÓÄôóÍæ¾ß·´¶·³ÇÔâÓö¿Í»§Êý¾Ýй¶ÊÂÎñ
10ÔÂ23ÈÕ£¬£¬£¬¼ÓÄôóÍæ¾ß·´¶·³ÇÏò¿Í»§·¢³öÊý¾Ýй¶֪ͨ£¬£¬£¬Åû¶Æä¿Í»§Êý¾Ý¿âÔâδ¾ÊÚȨµÄµÚÈý·½ÇÔÈ¡²¢Ð¹Â¶²¿·Ö¼Í¼¡£¡£¡£ÊÂÎñÒòÓÉÓÚÍþвÐÐΪÕßÓÚ7ÔÂ30ÈÕÔÚ°µÍøÐû²¼Éù³ÆÇÔÈ¡×Ըù«Ë¾ÏµÍ³µÄ¿Í»§Êý¾Ý£¬£¬£¬¹«Ë¾Í¨¹ýδË÷Òý»¥ÁªÍøÌû×Ó»ñÖªºó£¬£¬£¬Á¬Ã¦ÁªºÏµÚÈý·½ÍøÂçÇ徲ר¼ÒÕö¿ªÊӲ죬£¬£¬×îÖÕ֤ʵÊý¾ÝÕæÊµÐÔ¡£¡£¡£¾Ý¹«Ë¾Åû¶£¬£¬£¬Ð¹Â¶Êý¾Ýº¸ÇÐÕÃû¡¢ÏÖʵµØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬µ«Ã÷ȷɨ³ýÕË»§ÃÜÂë¡¢ÐÅÓÿ¨ÐÅÏ¢¼°ÆäËû¡°ÀàËÆÉñÃØÊý¾Ý¡±¡£¡£¡£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£Éæ¼°¼ÓÄôóÍæ¾ß·´¶·³ÇÌìÏÂ40¼ÒÃŵêµÄ¿Í»§ÈºÌ壬£¬£¬ÏêϸÊÜÓ°ÏìÈËÊýÉÐδ¹ûÕæ¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬Ð¹Â¶Êý¾ÝÀàÐÍÒò¿Í»§¶øÒ죬£¬£¬¿ÉÄܰüÀ¨ÉÏÊöÐÅÏ¢ÖеÄÒ»Ïî»ò¶àÏî×éºÏ¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬¼ÓÄôóÍæ¾ß·´¶·³ÇÔÚר¼ÒÖ¸µ¼ÏÂÉý¼¶ITϵͳÇå¾²ÐÔ£¬£¬£¬²¢×Ô¶¯Ïò¼ÓÄôóÒþ˽î¿Ïµ»ú¹¹×ª´ïÇéÐΡ£¡£¡£Í¬Ê±£¬£¬£¬¹«Ë¾Ïò¿Í»§·¢³ö¾¯Ê¾£¬£¬£¬½¨ÒéºöÂÔδ¾ÇëÇóµÄͨѶ£¬£¬£¬Ð¡ÐÄð³äÆ·ÅÆ¾ÙÐÐСÎÒ˽¼ÒÐÅÏ¢Ë÷È¡µÄÍøÂç´¹ÂÚÐÐΪ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/toys-r-us-canada-warns-customers-info-leaked-in-data-breach/
6. ¡°Shadow Escape¡±¹¥»÷£ºAIÖúÊÖÁãµã»÷ÇÔÈ¡Ãô¸ÐÊý¾Ý
10ÔÂ23ÈÕ£¬£¬£¬Ñо¿¹«Ë¾Operant AIÐû²¼±¨¸æÕ¹ÏÖÁËÒ»ÖÖÃûΪ¡°Shadow Escape¡±µÄÐÂÐÍÇ徲Σº¦£¬£¬£¬¸ÃÊÖÒÕ¿ÉÎÞÉùÎÞÏ¢µØ´ÓÆóҵʹÓõÄAIÖúÊÖÖÐÇÔÈ¡´ó×ÚÃô¸ÐÐÅÏ¢¡£¡£¡£ÕâÖÖ¹¥»÷ʹÓÃÄ£×ÓÉÏÏÂÎÄÐÒ飨MCP£©µÄÊÖÒÕ±ê×¼£¬£¬£¬Æóҵͨ¹ýMCP½«ChatGPT¡¢ClaudeµÈ´óÐÍÓïÑÔÄ£×Ó£¨LLM£©ÅþÁ¬ÖÁÄÚ²¿Êý¾Ý¿âºÍ¹¤¾ßʱ±¬·¢µÄÎó²î£¬£¬£¬ÎÞÐèÓû§µã»÷´¹ÂÚÁ´½Ó»ò×Ô¶¯²Ù×÷¼´¿ÉʵÑé¡£¡£¡£¹¥»÷½¹µãÔÚÓÚ¡°Áãµã»÷¡±ÌØÕ÷£º¶ñÒâÖ¸Áî¿ÉÒþ²ØÔÚ¿´ËÆÎÞº¦µÄÎĵµÖУ¬£¬£¬ÈçÔ±¹¤ÊÖ²á»òÏÂÔØµÄPDFÎļþ¡£¡£¡£µ±Ô±¹¤½«ÕâЩÎļþÉÏ´«ÖÁÊÂÇéAIÖúÊÖʱ£¬£¬£¬Òþ²ØÖ¸Áî»áָʾAI×Ô¶¯ÍøÂç²¢ÉñÃØ·¢ËͿͻ§µÄ˽ÈËÊý¾Ý£¬£¬£¬°üÀ¨Éç»áÇå¾²ºÅÂë¡¢Ò½ÁƼͼ¡¢²ÆÎñÏêÇéµÈ¡£¡£¡£Óë¹Å°å¹¥»÷ÒÀÀµ´¹ÂÚÓʼþ²î±ð£¬£¬£¬Shadow Escapeͨ¹ý±ê×¼MCPÉèÖúÍĬÈÏȨÏÞ¼´¿ÉÇáËÉʵÑ飬£¬£¬Ñо¿Ö°Ô±ÖÒÑÔÆä¿ÉÄܵ¼Ö¡°ÊýÍòÒÚÌõ˽È˼ͼй¶ÖÁ°µÍø¡±¡£¡£¡£ÎÊÌâÒªº¦ÔÚÓÚMCP¸¶ÓëAIÖúÊÖ¡°Ø¨¹ÅδÓеÄ×é֯ϵͳ»á¼ûȨÏÞ¡±£¬£¬£¬ÈκÎʹÓÃMCPÅþÁ¬Êý¾Ý¿â¡¢Îļþϵͳ»òAPIµÄAIÖúÊÖ¾ù¿ÉÄܳÉΪ¹¥»÷Ä¿µÄ¡£¡£¡£
https://hackread.com/shadow-escape-0-click-attack-ai-assistants-risk/


¾©¹«Íø°²±¸11010802024551ºÅ