ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾ÖÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬²Ð¼²ÈËЧÀÍϵͳÊÜÓ°Ïì
Ðû²¼Ê±¼ä 2025-08-271. ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾ÖÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬²Ð¼²ÈËЧÀÍϵͳÊÜÓ°Ïì
8ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬ÂíÀïÀ¼Öݽ»Í¨ÖÎÀí¾Ö£¨MTA£©¿ËÈÕÔâÓöÒ»ÆðÕë¶ÔÆä²Ð¼²È˽»Í¨Ð§ÀÍϵͳµÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼Ö²¿·ÖÒªº¦¹¦Ð§ÖÐÖ¹¡£¡£¡£¡£¡£¡£ÖÜÈÕ£¬£¬£¬£¬£¬£¬MTAͨ¹ýÉ罻ýÌåºÍ¹Ù·½ÍøÕ¾Ðû²¼ÖÒÑÔ£¬£¬£¬£¬£¬£¬³Æ±¬·¢ÁËÒ»ÆðÉæ¼°Î´¾ÊÚȨ»á¼ûijЩϵͳµÄÍøÂçÊÂÎñ¡£¡£¡£¡£¡£¡£Ö»¹Ü½¹µã½»Í¨Ð§ÀÍÈ繫½»Ïß·¡¢µØÌúºÍÇá¹ìϵͳδÊÜÓ°Ï죬£¬£¬£¬£¬£¬µ«×¨ÃÅΪ²ÐÕÏÈËÊ¿ÌṩµÄ¡°³öÐÐЧÀÍ¡±£¨Mobility£©µÄʵʱÐÅϢϵͳ¼°ÆäËû¹¤¾ßÔâÊܹ¥»÷¡£¡£¡£¡£¡£¡£¸ÃЧÀÍÖ¼ÔÚΪÎÞ·¨×ÔÐÐǰÍù¹«½»³µÕ¾»òºò³µµÄȺÌåÌṩ¶¨ÖÆ»¯½»Í¨Ö§³Ö£¬£¬£¬£¬£¬£¬Í¨¹ýÍøÕ¾Ô¤Ô¼ÊµÏÖ´Ó¼ÒÃŵ½Ä¿µÄµØµÄ½ÓËÍ¡£¡£¡£¡£¡£¡£¹¥»÷µ¼ÖÂMTAµÄÒÆ¶¯Ð§ÀÍÎÞ·¨°²ÅÅÐÂÐг̻òÖØÐÂÔ¤¶©ÏÖÓÐÐг̣¬£¬£¬£¬£¬£¬²¿·ÖʵʱÐÅÏ¢¸üм°ºô½ÐÖÐÐĹ¦Ð§Òà¿ÉÄÜÊÜÏÞ¡£¡£¡£¡£¡£¡£MTAÌåÏÖ£¬£¬£¬£¬£¬£¬ÒÑÓëµÚÈý·½ÍøÂçÇ徲ר¼Ò¼°Ö´·¨²¿·ÖÏàÖú£¬£¬£¬£¬£¬£¬ÆÀ¹ÀÊÂÎñ¹æÄ£²¢½ÓÄÉ»º½â²½·¥¡£¡£¡£¡£¡£¡£Ö»¹Ü±¾ÖÜËùÓÐÒѰ²ÅŵijöÐÐÍýÏëÈÔÓÐÓ㬣¬£¬£¬£¬£¬µ«ÐÂÓû§Ðèͨ¹ýÌæ»»¼Æ»®£¨ÈçCall-A-RideЧÀÍ£©¾ÙÐÐÔ¤Ô¼£¬£¬£¬£¬£¬£¬¿Éͨ¹ý¹Ù·½ÍøÕ¾»òµç»°»á¼û¡£¡£¡£¡£¡£¡£
https://therecord.media/maryland-cyberattack-transit-disabled-people
2. ¶íÂÞ˹FSB¿ª·¢ÐÂÐÍAndroidÌØ¹¤Èí¼þ£¬£¬£¬£¬£¬£¬Î±×°³É·À²¡¶¾¹¤¾ß
8ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©±»ÆØ¿ª·¢Ò»¿îÐÂÐÍAndroid¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Î±×°³É·À²¡¶¾¹¤¾ß£¬£¬£¬£¬£¬£¬×¨ÃÅÕë¶Ô¶íÂÞ˹ÆóÒµ¸ß¹ÜÌᳫ¶¨ÏòÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¾Ý¶íÂÞË¹ÒÆ¶¯Çå¾²¹«Ë¾Dr. WebµÄ×îб¨¸æ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ±»ÃüÃûΪ¡°Android.Backdoor.916.origin¡±£¬£¬£¬£¬£¬£¬×Ô2025Äê1ÔÂÊ״η¢Ã÷ÒÔÀ´ÒÑÑÝ»¯¶à¸ö°æ±¾£¬£¬£¬£¬£¬£¬ÏÔʾÆä´¦ÓÚÒ»Á¬¿ª·¢ÖС£¡£¡£¡£¡£¡£¸ÃÌØ¹¤Èí¼þ¾ß±¸¶àÏî¸ß¼¶¹¦Ð§£¬£¬£¬£¬£¬£¬°üÀ¨¼àÌý¶Ô»°¡¢Í¨¹ýÊÖ»úÉãÏñͷʵʱ´«ÊäÊÓÆµ¡¢¼Í¼¼üÅÌÊäÈë¡¢ÇÔȡͨѶӦÓã¨ÈçTelegram¡¢WhatsApp¡¢Gmail£©Êý¾Ý£¬£¬£¬£¬£¬£¬ÉõÖÁ²¶»ñÆÁÄ»ÄÚÈÝ¡£¡£¡£¡£¡£¡£×°Öú󣬣¬£¬£¬£¬£¬¶ñÒâÈí¼þ»áÇëÇóµØÀíλÖᢶÌÐÅ»á¼û¡¢ÉãÏñÍ·/Âó¿Ë·çʹÓᢸ¨Öú¹¦Ð§Ð§À͵ȸßΣº¦È¨ÏÞ£¬£¬£¬£¬£¬£¬²¢ºã¾ÃפÁôºǫ́¡£¡£¡£¡£¡£¡£ÆäÏÂÁîÓë¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷¿ÉÔ¶³ÌÖ¸ÁîÇÔÈ¡¶ÌÐÅ¡¢ÁªÏµÈË¡¢Í¨»°¼Í¼¼°´æ´¢Í¼Ïñ£¬£¬£¬£¬£¬£¬»ò¼¤»îÂó¿Ë·ç¡¢ÉãÏñÍ·¾ÙÐÐʵʱ¼à¿Ø£¬£¬£¬£¬£¬£¬ÉõÖÁÖ´ÐÐShellÏÂÁîÒÔά³Ö³¤ÆÚ»¯¿ØÖÆ¡£¡£¡£¡£¡£¡£Dr. WebÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þͨ¹ý¶íÓï½çÃæ¡¢Ã°³ä¶íÂÞ˹¹Ù·½»ú¹¹£¨ÈçÖÐÑëÒøÐм°FSB×ÔÉí£©µÄÈí¼þ¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£Æä½ö¶íÓï½çÃæ¡¢Õë¶Ô¶íÂÞ˹ÆóÒµµÄ·Ö·¢Õ½ÂÔ¼°Ã°³ä±¾ÍÁ»ú¹¹µÄÐÐΪ£¬£¬£¬£¬£¬£¬Ã÷È·Ö¸Ïò¶¨Ïò¹¥»÷£¬£¬£¬£¬£¬£¬Ä¿µÄ»òΪ»ñÈ¡ÆóÒµÃô¸ÐÐÅÏ¢¼°¸ß¹ÜͨѶÊý¾Ý¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-android-malware-poses-as-antivirus-from-russian-intelligence-agency/
3. ¿Æ¼¼ÖÆÔìÉÌData I/OÔâÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬ÖÂÔËӪϵͳ̱»¾
8ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬¿Æ¼¼ÖÆÔìÉÌData I/O Corporation£¨NASDAQ: DAIO£©¿ËÈÕÏòÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©Ìá½»±¨¸æ£¬£¬£¬£¬£¬£¬Åû¶ÆäÓÚ8ÔÂ16ÈÕÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÔËÊä¡¢ÖÆÔì¡¢Éú²úµÈ½¹µãÔËӪϵͳ̱»¾¡£¡£¡£¡£¡£¡£Õâ¼Ò×ܲ¿Î»ÓÚ»ªÊ¢¶ÙÖÝÀ×µÂÃɵĹ«Ë¾×¨×¢ÓÚΪÆû³µµç×Ó¡¢ÏûºÄ×°±¸µÈÁìÓòÌṩ±à³ÌÓëÇå¾²°²ÅŽâ¾ö¼Æ»®£¬£¬£¬£¬£¬£¬Æä¿Í»§º¸ÇÌØË¹À¡¢ËÉÏ¡¢ÑÇÂíÑ·¡¢¹È¸è¡¢Î¢ÈíµÈÈ«Çò×ÅÃûÆóÒµ£¬£¬£¬£¬£¬£¬2025ÄêµÚ¶þ¼¾¶ÈÁè¼Ý65%µÄÓªÒµÀ´×ÔÆû³µµç×ÓÉú²ú£¬£¬£¬£¬£¬£¬°üÀ¨ÓëÖйúµç¶¯³µÖÆÔìÉÌÏàÖúµÄ³äµçÕ¾ÊÖÒÕÏîÄ¿¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬£¬£¬£¬Data I/OѸËÙ½ÓÄÉ×èÖ¹²½·¥£¬£¬£¬£¬£¬£¬½«ÊÜÓ°ÏìϵͳÏÂÏßÒÔ±£»£»£»£»£»£»£»¤È«ÇòITÍøÂ磬£¬£¬£¬£¬£¬²¢Æô¶¯µÚÈý·½ÊӲ졣¡£¡£¡£¡£¡£µ«×èÖ¹±¨¸æÌύʱ£¬£¬£¬£¬£¬£¬ÏµÍ³»Ö¸´Ê±¼ä±íÈÔδÃ÷È·£¬£¬£¬£¬£¬£¬¹«Ë¾ÖÒÑÔ³ÆÊÂÎñÏà¹Ø±¾Ç®£¨°üÀ¨ÍøÂçÇ徲ר¼ÒÓöȡ¢ÏµÍ³ÐÞ¸´Ö§³öµÈ£©¿ÉÄÜ¶ÔÆäı»®Òµ¼¨¼°²ÆÎñ״̬±¬·¢ÖØ´óÓ°Ïì¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Éϼ¾¶ÈÏúÊÛ¶îΪ590ÍòÃÀÔª£¬£¬£¬£¬£¬£¬½Ï2025ÄêµÚÒ»¼¾¶ÈïÔÌ30ÍòÃÀÔª£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷»ò½øÒ»²½¼Ó¾çÆä²ÆÎñѹÁ¦¡£¡£¡£¡£¡£¡£
https://therecord.media/electronics-manufacturer-dataio-ransomware
4. ÄÚ»ª´ïÖÝÕþ¸®ÔâÍøÂç¹¥»÷ÖÂÍøÕ¾¼°µç»°ÏµÍ³ÖÜȫ̱»¾
8ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬ÃÀº£ÄÚ»ª´ïÖÝÕþ¸®ÊÖÒÕϵͳÔâÓöÑÏÖØÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬µ¼ÖÂÖÝÕþ¸®ÍøÕ¾¡¢µç»°Ð§Àͼ°Ïßϰ칫ÖÜȫ̱»¾¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒ»Á¬Ó°ÏìÖÝÄÚ¶à¸ö¹«¹²Ð§ÀÍÇþµÀ£¬£¬£¬£¬£¬£¬Òý·¢Õþ¸®ÓëÁª°î»ú¹¹µÄ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¡£¾ÝÖݳ¤ÇÇ¡¤Â¡°Í¶àÉùÃ÷£¬£¬£¬£¬£¬£¬Ö»¹Ü½ôÆÈЧÀÍÈÔ¼á³ÖÔË×÷£¬£¬£¬£¬£¬£¬µ«ÊÖÒÕϵͳµÄÒ»Á¬ÐÔ¹ÊÕÏÒÑÔì³ÉÏÔÖøÐ§ÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£×èÖ¹ÖÜÒ»Íí¼ä£¬£¬£¬£¬£¬£¬ÖÝÕþ¸®¹Ù·½ÍøÕ¾ÈÔ´¦ÓÚÀëÏß״̬£¬£¬£¬£¬£¬£¬µç»°Ïß·¼°²¿·ÖÏßÉÏЧÀÍ·ºÆðÏìÓ¦ÑÓ³Ù»òÖÐÖ¹¡£¡£¡£¡£¡£¡£Îª×î´óÏÞ¶Èά³Ö¹«¹²Ð§ÀÍ£¬£¬£¬£¬£¬£¬ÖÝÕþ¸®ÒÑÆô¶¯ÔÝʱ·Óɼƻ®ºÍÌæ»»ÐÔ²Ù×÷Á÷³Ì£¬£¬£¬£¬£¬£¬²¢ÓëµØ·½¡¢²¿Âä¼°Áª°îÏàÖúͬ°éÕö¿ªÁªºÏ»Ö¸´Ðж¯¡£¡£¡£¡£¡£¡£ÊÜÊÖÒÕ¹ÊÕÏÓ°Ï죬£¬£¬£¬£¬£¬È«ÖÝÕþ¸®°ì¹«ÊÒÖÜÒ»ÔÝÍ£ÏßÏÂЧÀÍ£¬£¬£¬£¬£¬£¬Ïêϸ»Ö¸´Ê±¼ä½«ÁíÐÐ֪ͨ¡£¡£¡£¡£¡£¡£ÊÂÎñÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬Áª°îÊÓ²ì¾ÖÒѽéÈëÐÖúËÝÔ´£¬£¬£¬£¬£¬£¬µ«ÏÖÔÚÉÐÎÞÈκκڿÍ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£¡£¡£ÖÝÕþ¸®ÌØÊâÌáÐÑסÃñÌá¸ßСÐÄ£¬£¬£¬£¬£¬£¬Ç¿µ÷¹Ù·½»ú¹¹¾ø²»»áͨ¹ýµç»°»òÓʼþË÷ȡСÎÒ˽¼ÒÐÅÏ¢»òÒøÐÐÕË»§×ÊÁÏ£¬£¬£¬£¬£¬£¬½÷·ÀÕ©ÆÐÐΪ¡£¡£¡£¡£¡£¡£Õë¶Ô¹«ÖÚ¹ØÇеÄÊý¾Ýй¶Σº¦£¬£¬£¬£¬£¬£¬Öݳ¤ÉùÃ÷ÌåÏÖ½«³¹µ×ÊÓ²ìÊÇ·ñ±£´æÃô¸ÐÐÅÏ¢ÍâйÇéÐΡ£¡£¡£¡£¡£¡£
https://therecord.media/nevada-state-websites-phones-cyberattack-disruption
5. Salesloftƽ̨ÔâºÚ¿ÍÈëÇÖÖÂSalesforceÊý¾Ýй¶
8ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÏúÊÛ×Ô¶¯»¯Æ½Ì¨SalesloftÔâÓöÖØ´óÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýÇÔÈ¡ÆäÓëSalesforce¼¯³ÉµÄDrift̸ÌìÊðÀíOAuthÁîÅÆ¼°Ë¢ÐÂÁîÅÆ£¬£¬£¬£¬£¬£¬ÀÖ³ÉÇÖÈë¿Í»§ÇéÐβ¢ÊµÑé´ó¹æÄ£Êý¾Ý͵ÇÔ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ̻¶Á˵ÚÈý·½Æ½Ì¨¼¯³É´øÀ´µÄÇå¾²Òþ»¼£¬£¬£¬£¬£¬£¬Òý·¢¶ÔÔÆ¶ËÆóҵЧÀÍÉú̬Á´Å³ÈõÐÔµÄÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£¡£¾ÝSalesloftÅû¶£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÓÚ8ÔÂ8ÈÕÖÁ18ÈÕʱ´ú£¬£¬£¬£¬£¬£¬Ê¹ÓÃÇÔÈ¡µÄÁîÅÆ»á¼ûÁËʹÓÃDrift-Salesforce¼¯³ÉµÄ¿Í»§SalesforceʵÀý£¬£¬£¬£¬£¬£¬Í¨¹ýÖ´ÐÐSOQLÅÌÎÊÇÔÈ¡AWS»á¼ûÃÜÔ¿¡¢ÃÜÂë¼°SnowflakeÏà¹ØÁîÅÆµÈÃô¸Ðƾ֤¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÉõÖÁͨ¹ýɾ³ýÅÌÎÊÈÕÖ¾ÑÚÊÎÐÐ×Ù£¬£¬£¬£¬£¬£¬µ«Î´Ó°ÏìϵͳÉ󼯼ͼ¡£¡£¡£¡£¡£¡£SalesloftÒÑÓëSalesforceÐ×÷£¬£¬£¬£¬£¬£¬½ôÆÈ×÷·ÏËùÓÐDriftÓ¦ÓõĻîÔ¾ÁîÅÆ£¬£¬£¬£¬£¬£¬²¢ÒªÇó¿Í»§ÖØÐÂÈÏÖ¤£¬£¬£¬£¬£¬£¬ÖÎÀíÔ±Ðèͨ¹ý"ÉèÖÃ-¼¯³É-Salesforce"¶Ï¿ªÅþÁ¬ºóÖØÐÂÊÚȨ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÑÓÐøÁË2025ÄêÒÔÀ´Õë¶ÔSalesforceƽ̨µÄ¹¥»÷À˳±¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/salesloft-breached-to-steal-oauth-tokens-for-salesforce-data-theft-attacks/
6. CitrixÐÞ¸´ÁËÁãÈÕ¹¥»÷ÖÐʹÓõÄÑÏÖØNetScaler RCEÎó²î
8ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬Citrix£¨ÔÆÈí¼þ¼¯ÍÅ£©Ðû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÓ°ÏìÆäNetScaler ADCºÍNetScaler Gateway×°±¸µÄÈý¸ö¸ßΣÎó²î£¬£¬£¬£¬£¬£¬ÆäÖÐ×îÑÏÖØµÄCVE-2025-7775Òѱ»Ö¤ÊµÔâºÚ¿ÍÆð¾¢Ê¹ÓÃΪÁãÈÕÎó²î¡£¡£¡£¡£¡£¡£¸ÃÎó²îΪÄÚ´æÒçÍÉ»¯Î󣬣¬£¬£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚδ´ò²¹¶¡µÄ×°±¸ÉÏÔ¶³ÌÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬Ö±½ÓÍþвÆóÒµÍøÂç½¹µã»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£CitrixÔÚͨ¸æÖÐÇ¿µ÷£¬£¬£¬£¬£¬£¬×èÖ¹8ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬ÒÑÊӲ쵽Õë¶Ô믧½â×°±¸µÄÏÖʵ¹¥»÷°¸Àý£¬£¬£¬£¬£¬£¬µ«Î´ÌṩÏêϸ¹¥»÷Ö¸±ê»òÊܺ¦ÕßÐÅÏ¢¡£¡£¡£¡£¡£¡£ÓÉÓÚȱ·¦ÔÝʱ»º½â²½·¥£¬£¬£¬£¬£¬£¬¹«Ë¾¡°Ç¿ÁÒ½¨Ò顱ÖÎÀíÔ±Á¬Ã¦½«NetScaler¹Ì¼þÉý¼¶ÖÁ×îа汾¡£¡£¡£¡£¡£¡£Îª×ÊÖúÓû§×Ô²éΣº¦£¬£¬£¬£¬£¬£¬CitrixÐû²¼ÁËÒ×Êܹ¥»÷×°±¸µÄÉèÖÃÌØÕ÷£º×°±¸ÐèÒÔÍø¹ØÄ£Ê½£¨VPN¡¢ICAÊðÀíµÈ£©ÔËÐУ¬£¬£¬£¬£¬£¬»ò°ó¶¨IPv6ЧÀ͵ÄHTTP/SSL/HTTP_QUICÀàÐ͸ºÔØÆ½ºâÐéÄâЧÀÍÆ÷µÈÌØ¶¨ÉèÖᣡ£¡£¡£¡£¡£´Ë´Î¸üÐÂͬʱÐÞ¸´ÁËÁíÍâÁ½¸öÎó²î£º¾Ü¾øÐ§ÀÍÎó²îCVE-2025-7776ºÍÖÎÀí½çÃæ»á¼û¿ØÖÆÈ±ÏÝCVE-2025-8424¡£¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜͨ¹ýÎó²îÁ´Ê½Ê¹Ó㬣¬£¬£¬£¬£¬ÏÈͨ¹ýCVE-2025-7775Ö²Èë¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬ÔÙʹÓÃCVE-2025-8424ºáÏòÉøÍ¸ÖÎÀí½çÃæ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/citrix-fixes-critical-netscaler-rce-flaw-exploited-in-zero-day-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ