½¿ÔÏÊ«ÔâEverestÀÕË÷Èí¼þ¹¥»÷ÖÂ60Íò¿Í»§Êý¾Ýй¶
Ðû²¼Ê±¼ä 2025-09-171. ½¿ÔÏÊ«ÔâEverestÀÕË÷Èí¼þ¹¥»÷ÖÂ60Íò¿Í»§Êý¾Ýй¶
9ÔÂ15ÈÕ£¬£¬£¬ÀÕË÷Èí¼þ¼¯ÍÅEverestÉù³Æ¶Ô·¨¹úÉݳ޻¤·ôÆ·¾ÞÍ·½¿ÔÏÊ«¼¯ÍÅÌᳫ¹¥»÷£¬£¬£¬²¢½«ÆäÊý¾ÝÉÏ´«ÖÁ°µÍø²©¿Í¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÐû³Æ»ñÈ¡Á˽¿ÔÏÊ«Áè¼Ý60ÍòÃû¿Í»§µÄÏêϸÐÅÏ¢£¬£¬£¬Éæ¼°ÃÀ¹ú¡¢·¨¹ú¡¢¼ÓÄôóµÈµØÇø£¬£¬£¬Êý¾Ý°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¼°»¤·ôÆ·/»¯×±Æ·¹ºÖÃÀúÊ·µÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£½¿ÔÏÊ«×÷Ϊ×ܲ¿Î»ÓÚ°ÍÀèµÄÉÝ»ª»¤·ôÆ·ÖÆÔìÉÌ£¬£¬£¬ÄêÊÕÈëÔ¼20ÒÚÅ·Ôª£¬£¬£¬Ô±¹¤¹æÄ£Ô¼8000ÈË£¬£¬£¬ÔÚÎ÷Å·Êг¡Õ¼ÓÐÖ÷Ҫְλ¡£¡£¡£¡£¡£¡£¾ÝCybernewsÍŶÓÊӲ죬£¬£¬EverestÔÚ°µÍøÐû²¼µÄÌû×Ó½ö°üÀ¨²¿·ÖÊý¾Ý½ØÍ¼×÷Ϊ֤¾Ý£¬£¬£¬Î´ÌṩÍêÕûÑù±¾£¬£¬£¬µ«Ñù±¾Êý¾ÝÒÉËÆÀ´×Ô½¿ÔÏÊ«²î±ðµØÇøµÄÔÚÏßÊÐËÁ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬´ËÀà´ó¹æÄ£Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÍøÂç´¹ÂÚ¡¢À¬»øÓʼþ¹¥»÷£¬£¬£¬»ò×÷ΪÉí·Ý͵ÇԵŤ¾ß¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/clarins-user-data-breach-everest/
2. Phoenix RowHammer¹¥»÷ÔÚ109ÃëÄÚÈÆ¹ý¸ß¼¶DDR5ÄÚ´æ±£»£»£»£»£»¤
9ÔÂ16ÈÕ£¬£¬£¬ËÕÀèÊÀÁª°îÀí¹¤Ñ§ÔºÓë¹È¸èÁªºÏÑо¿·¢Ã÷£¬£¬£¬Õë¶ÔSK Hynix DDR5ÄÚ´æÐ¾Æ¬µÄÐÂÐÍRowHammer¹¥»÷±äÖÖ"Phoenix"£¨CVE-2025-6202£¬£¬£¬CVSSÆÀ·Ö7.1£©ÒÑÍ»ÆÆÏÖÓзÀ»¤»úÖÆ¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ͨ¹ýÖØ¸´»á¼ûÌØ¶¨ÄÚ´æÐд¥·¢ÏàÁÚÐÐλ·×ª£¬£¬£¬¿ÉÔÚ109ÃëÄÚʵÏÖ±ê×¼DDR5×ÀÃæÏµÍ³µÄrootȨÏÞÌáÉý£¬£¬£¬Ó°Ïì¹æÄ£ÁýÕÖ2021-2024ÄêÉú²úµÄ15¿îDDR5оƬ¡£¡£¡£¡£¡£¡£Ñо¿Ö¤Êµ£¬£¬£¬Ö»¹ÜDDR5ÄÚÖÃÆ¬ÉÏECC¾À´íºÍTRRÄ¿µÄÐÐˢеȷÀ»¤²½·¥£¬£¬£¬ÈÔÎÞ·¨ÓÐÓõÖÓùPhoenix¹¥»÷¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ýλ·×ªÆÆËðSSHÉí·ÝÑéÖ¤£¨ÈçÇÔȡͬµØÐéÄâ»úRSA-2048ÃÜÔ¿£©»òʹÓÃsudo¶þ½øÖÆÎļþÌáȨ¡£¡£¡£¡£¡£¡£ÊµÑéÏÔʾ£¬£¬£¬ECCºÍTRRµÈ¹Å°å·ÀÓùÊֶζÔSMASH¡¢Half-DoubleµÈÖØ´ó¹¥»÷ͬÑùʧЧ£¬£¬£¬¶øPhoenix¸üÊ×´ÎÔÚÉú²ú¼¶DDR5ϵͳʵÏֶ˵½¶ËÌáȨʹÓᣡ£¡£¡£¡£¡£Ñо¿ÍŶÓÖ¸³ö£¬£¬£¬DRAMÃܶÈÀ©Õ¹µ¼ÖÂ×°±¸ÌØÕ÷³ß´çËõС£¬£¬£¬·´¶ø½µµÍÁË´¥·¢RowHammerËùÐèµÄ¼¤»î´ÎÊý£¬£¬£¬Ê¹ÐÂÐÍоƬ¸üÒ×Êܹ¥»÷¡£¡£¡£¡£¡£¡£Îó²îÃô¸ÐÐÔÉæ¼°Î¶ȡ¢µçѹ¡¢¹¤ÒÕת±ä¡¢Êý¾ÝģʽµÈ¶àά¶È±äÁ¿¡£¡£¡£¡£¡£¡£×÷ΪӦ¶Ô£¬£¬£¬½¨Ò齫ÄÚ´æË¢ÐÂÂÊÌáÉýÖÁ3±¶ÒÔ×èֹλ·×ª¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/09/phoenix-rowhammer-attack-bypasses.html
3. SlopAds£ºÈ«ÇòAndroid¹ã¸æÚ²ÆÐж¯±»½ÒÆÆ²¢´ì°Ü
9ÔÂ16ÈÕ£¬£¬£¬ÃûΪ"SlopAds"µÄ´ó¹æÄ£Android¹ã¸æÚ²ÆÐж¯±»HUMANµÄSatoriÍþвÇ鱨ÍÅ¶Ó½ÒÆÆ²¢´ì°Ü¡£¡£¡£¡£¡£¡£¸ÃÐж¯Í¨¹ýGoogle PlayÉϵÄ224¸ö¶ñÒâÓ¦ÓÃʵÑ飬£¬£¬ÖðÈÕÌìÉú23ÒÚ´Î¹ã¸æÇëÇ󣬣¬£¬ÀÛ¼ÆÏÂÔØÁ¿³¬3800Íò´Î£¬£¬£¬ÁýÕÖÈ«Çò228¸ö¹ú¼Ò¼°µØÇø£¬£¬£¬ÆäÖÐÃÀ¹úÒÔ30%µÄ¹ã¸æÕ¹Ê¾Á¿¾ÓÊ×£¬£¬£¬Ó¡¶ÈºÍ°ÍÎ÷ÅÅÁжþ¡¢Èýλ¡£¡£¡£¡£¡£¡£SlopAds½ÓÄɶà²ã¹æ±ÜÕ½ÂÔ£¬£¬£¬Ê¹ÓûìÏýºÍÒþдÊõÒþ²Ø¶ñÒâÐÐΪ£¬£¬£¬ÌÓ±ÜGoogleÉóºË¼°Çå¾²Èí¼þ¼ì²â¡£¡£¡£¡£¡£¡£ÈôÓû§Í¨¹ý×ÔȻ;¾¶×°ÖÃÓ¦Ó㬣¬£¬ÆäÌåÏÖÈçͨÀýÓ¦Ó㻣»£»£»£»µ«Èôͨ¹ýÍþвÕß¹ã¸æ»î¶¯×°Ö㬣¬£¬Ôò´¥·¢¶ñÒâÄ£¿£¿£¿£¿£¿éÏÂÔØ¡£¡£¡£¡£¡£¡£Ó¦ÓÃʹÓÃFirebase Remote Config»ñÈ¡¼ÓÃÜÉèÖÃÎļþ£¬£¬£¬°üÀ¨¹ã¸æÚ²ÆÄ£¿£¿£¿£¿£¿é¡¢ÌáÏÖЧÀÍÆ÷¼°JavaScript¸ºÔØURL£¬£¬£¬²¢Ñé֤װ±¸ÊÇ·ñΪÕýµ±Óû§ËùÓУ¬£¬£¬×èÖ¹±»Ñо¿Ö°Ô±»òÇå¾²Èí¼þÆÊÎö¡£¡£¡£¡£¡£¡£Ò»µ©Í¨¹ý¼ì²é£¬£¬£¬Ó¦ÓÃÏÂÔØËÄÕź¬ÒþдÊõµÄPNGͼÏñ£¬£¬£¬½âÃÜÖØ×éΪ"FatModule"¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¼¤»îºó£¬£¬£¬¸ÃÈí¼þͨ¹ýÒþ²ØµÄWebViewsÍøÂç×°±¸ÐÅÏ¢£¬£¬£¬µ¼º½ÖÁ¹¥»÷Õß¿ØÖƵÄÚ²ÆÓò£¬£¬£¬ÖðÈÕ±¬·¢³¬20ÒÚ´ÎÚ²Æ¹ã¸æÕ¹Ê¾¼°µã»÷£¬£¬£¬Îª¹¥»÷Õß´´Á¢²»·¨ÊÕÈë¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬GoogleÒÑ´ÓPlay StoreÒÆ³ýËùÓÐSlopAdsÓ¦Ó㬣¬£¬²¢¸üÐÂPlay Protect¹¦Ð§£¬£¬£¬ÖÒÑÔÓû§Ð¶ÔØÉè±¹ØÁ¬Ä¶ñÒâÓ¦Óᣡ£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-nukes-224-android-malware-apps-behind-massive-ad-fraud-campaign/
4. npm¹©Ó¦Á´Ôâ´ó¹æÄ£ÈëÇÖ£¬£¬£¬187¸ö°ü±»Ä¾Âí»¯
9ÔÂ16ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬Ò»³¡ÃûΪ"Shai-Hulud"µÄÐͬÈä³æÊ½¹©Ó¦Á´¹¥»÷ÔÚnpmƽ̨±¬·¢£¬£¬£¬ÖÁÉÙ187¸öÈí¼þ°üÔâÈëÇÖ²¢Ö²Èë×ÔÈö²¥¶ñÒâ¸ºÔØ¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ʼÓÚ@ctrl/tinycolor°ü£¨ÖÜÏÂÔØÁ¿³¬200Íò´Î£©£¬£¬£¬ËæºóѸËÙÀ©Õ¹ÖÁCrowdStrikeµÈ×ÅÃûÆóÒµµÄnpmÃüÃû¿Õ¼ä£¬£¬£¬Ðγɿçά»¤ÕßµÄ×Ô¶¯Ä¾Âí»¯Èö²¥Á´¡£¡£¡£¡£¡£¡£¹¥»÷»úÖÆÏÔʾ£¬£¬£¬¶ñÒâÈí¼þͨ¹ýÐÞ¸Äpackage.jsonÎļþ×¢Èëbundle.js¾ç±¾£¬£¬£¬Ê¹ÓÃTruffleHog¹¤¾ßɨÃèÖ÷»úÁîÅÆºÍÔÆÆ¾Ö¤£¬£¬£¬ÑéÖ¤ºó½¨ÉèGitHub ActionsÊÂÇéÁ÷£¬£¬£¬½«Ãô¸ÐÊý¾Ýй¶ÖÁÓ²±àÂëwebhook¶Ëµã¡£¡£¡£¡£¡£¡£ÕâÖÖ"×ÔÎÒ×ÌÉú"ÌØÕ÷ʹ¹¥»÷ÄÜ×Ô¶¯Ñ¬È¾Í³Ò»Î¬»¤ÕߵįäËûÈí¼þ°ü£¬£¬£¬Ðγɼ¶ÁªÐ§Ó¦¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìÆóÒµ·½Ã棬£¬£¬CrowdStrikeѸËÙɾ³ý¶ñÒâ°ü²¢ÂÖ»»ÃÜÔ¿£¬£¬£¬Ç¿µ÷Æä½¹µãƽ̨δÊÜÓ°Ï죻£»£»£»£»¹È¸èGemini CLIËäÔ´´úÂëÇå¾²£¬£¬£¬µ«Óû§Ðè¼ì²é×°ÖÃÇéÐΡ£¡£¡£¡£¡£¡£ÊÂÎñ̻¶·ºÆð´úÈí¼þ¹©Ó¦Á´µÄųÈõÐÔ£¬£¬£¬µ¥¸öά»¤ÕßÕË»§Ð¹Â¶¼´¿É²¨¼°Êý°ÙÏîÄ¿¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/self-propagating-supply-chain-attack-hits-187-npm-packages/
5. ÐÂÐÍFileFix¹¥»÷ʹÓÃÒþдÊõÖ²ÈëStealC¶ñÒâÈí¼þ
9ÔÂ16ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬Acronis·¢Ã÷Ò»ÖÖÃûΪFileFixµÄÐÂÐÍÉç»á¹¤³Ì¹¥»÷£¬£¬£¬¸Ã¹¥»÷ð³äMetaÕË»§ÔÝÍ£ÖÒÑÔ£¬£¬£¬Í¨¹ýÈ«ÐÄÉè¼ÆµÄÍøÂç´¹ÂÚÒ³ÃæÓÕÆÓû§½«¶ñÒâPowerShellÏÂÁîÕ³ÌùÖÁÎļþ×ÊÔ´ÖÎÀíÆ÷µØµãÀ¸£¬£¬£¬´Ó¶øÔÚ²»ÖªÇéµÄÇéÐÎÏÂ×°ÖÃStealCÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¹¥»÷Á÷³ÌÏÔʾ£¬£¬£¬´¹ÂÚÒ³Ãæ»áÌáÐÑÓû§µã»÷¡°¸´ÖÆ¡±°´Å¥»ñÈ¡¿´ËÆÎļþ·¾¶µÄ¡°ÊÂÎñ±¨¸æ¡±£¬£¬£¬ÏÖʵ¸´ÖƵÄÊÇÌí¼ÓÁ˿ոñµÄ¶ñÒâPowerShellÏÂÁî¡£¡£¡£¡£¡£¡£µ±Óû§½«´ËÏÂÁîÕ³ÌùÖÁÎļþ×ÊÔ´ÖÎÀíÆ÷µØµãÀ¸Ê±£¬£¬£¬½öÏÔʾÎļþ·¾¶£¬£¬£¬Òþ²ØµÄ¶ñÒâÏÂÁîÔò±»Ö´ÐС£¡£¡£¡£¡£¡£¸ÃÏÂÁî»á´ÓBitbucketÏÂÔØÒþ²ØÔÚJPGͼÏñÖеĵڶþ½×¶Î¾ç±¾£¬£¬£¬Í¨¹ýÒþдÊõÌáÈ¡²¢½âÃÜÄÚ´æÖеÄÓÐÓÃÔØºÉ£¬£¬£¬×îÖÕ°²ÅÅStealC¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£StealC¿ÉÇÔÈ¡Óû§×°±¸ÖеÄÃô¸ÐÊý¾Ý£¬£¬£¬°üÀ¨Chrome¡¢FirefoxµÈä¯ÀÀÆ÷µÄƾ֤ºÍÉí·ÝÑéÖ¤cookie£¬£¬£¬Discord¡¢TelegramµÈͨѶӦÓÃµÄÆ¾Ö¤£¬£¬£¬±ÈÌØ±Ò¡¢ÒÔÌ«·»µÈ¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢£¬£¬£¬AWS¡¢AzureµÈÔÆÆ¾Ö¤£¬£¬£¬ÒÔ¼°ProtonVPN¡¢Battle.netµÈVPNºÍÓÎÏ·Ó¦ÓÃÊý¾Ý£¬£¬£¬Í¬Ê±¾ß±¸½ØÈ¡»î¶¯×ÀÃæÆÁÄ»½ØÍ¼µÄÄÜÁ¦¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-filefix-attack-uses-steganography-to-drop-stealc-malware/
6. °¢À˹¼ÓANHCÊý¾Ýй¶£¬£¬£¬Ó°Ïì6ÍòÃû»¼Õß
9ÔÂ16ÈÕ£¬£¬£¬°¢À˹¼ÓÖݰ²¿ËÀׯæÉçÇø¿µ½¡ÖÐÐÄ£¨ANHC£©¿ËÈÕÔâÓö´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬ºÚ¿Í×éÖ¯Éù³ÆÒÑй¶6Íò·Ý»¼Õ߼ͼ¡£¡£¡£¡£¡£¡£ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©°²¿ËÀׯæÐ§ÀÍ´¦ÒÑ×¢ÖØµ½¸ÃÖ¸¿Ø£¬£¬£¬²¢ÌåÏÖ½«ÑÏËà¿´´ý´ËÀàÊÂÎñ£¬£¬£¬µ«Æ¾Ö¤Õþ²ßÎÞ·¨Í¸Â¶ÊÓ²ìϸ½Ú¡£¡£¡£¡£¡£¡£ANHC¹ÙÍøÖ¤ÊµÍøÂç±£´æÇå¾²ÊÂÎñ£¬£¬£¬ÒÑÆô¶¯È¡Ö¤ÊӲ첢ÏÂÏßÊÜÓ°Ïìϵͳ£¬£¬£¬Í¬Ê±ÓëµÚÈý·½ÍøÂçÇ徲ר¼ÒÏàÖú£¬£¬£¬²¢Í¨ÖªÖ´·¨²¿·Ö¡£¡£¡£¡£¡£¡£ÊÂÎñÓ°Ïì·½Ãæ£¬£¬£¬»¼ÕßÒÁÀöɯ°×͸¶ÆäСÎÒ˽¼ÒÐÅÏ¢£¨°üÀ¨Éç±£ºÅ¡¢µØµã¡¢µç»°µÈ£©±»ºÚ¿Íͨ¹ýµç×ÓÓʼþÖ±½Óй¶¡£¡£¡£¡£¡£¡£ANHC»ØÓ¦³ÆÒÑÏòÊÜÓ°Ï컼ÕßÌṩÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬²¢ÔÊÐíÒ»Äêºó¼ÌÐøÌṩÉí·Ý͵ÇÔ±£»£»£»£»£»¤£¬£¬£¬µ«²¿·Ö»¼Õß·´Ó¦»ñȡЧÀÍÐè×Ô¶¯ÕùÈ¡¡£¡£¡£¡£¡£¡£°¢À˹¼ÓÐÂÎÅÔ´¡¢Öݹ«¹²Çå¾²²¿µÈ¶à·½ÒÑÊÕµ½ºÚ¿ÍÓʼþ¸±±¾£¬£¬£¬ANHC»¹Òâʶµ½Î´¾ÊÚȨ·½ÁªÏµÁËÉçÇø²¿·ÖСÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£
https://www.alaskasnewssource.com/2025/09/16/fbi-aware-anchorage-health-clinic-data-breach-hackers-claim-60k-patients-impacted/


¾©¹«Íø°²±¸11010802024551ºÅ