ShadowLeak¹¥»÷£ºChatGPTЧÀÍÆ÷¶ËÊý¾ÝÇÔÈ¡µÄÐÂÍþв

Ðû²¼Ê±¼ä 2025-09-22

1. ShadowLeak¹¥»÷£ºChatGPTЧÀÍÆ÷¶ËÊý¾ÝÇÔÈ¡µÄÐÂÍþв


9ÔÂ18ÈÕ£¬£¬£¬£¬ £¬£¬RadwareÑо¿Ö°Ô±·¢Ã÷ÃûΪShadowLeakµÄÐÂÐ͹¥»÷£¬£¬£¬£¬ £¬£¬Ê¹ÓÃChatGPTµÄDeep ResearchÊðÀíʵÏÖÁãµã»÷ЧÀÍÆ÷¶ËÊý¾ÝÇÔÈ¡¡£¡£¡£¡£¸Ã¹¥»÷ͨ¹ýÈ«ÐÄÉè¼ÆµÄµç×ÓÓʼþÖÐÒþ²ØHTMLÖ¸Á£¬£¬£¬ £¬£¬ÔÚÓû§ÎÞ²Ù×÷»ò¿É¼û½çÃæÌáÐѵÄÇéÐÎÏ£¬£¬£¬£¬ £¬£¬´¥·¢ÊðÀí´ÓGmailÊÕ¼þÏäÌáȡСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©²¢¾²Ä¬·¢ËÍÖÁ¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷¡£¡£¡£¡£Çø±ðÓÚÒÀÀµ¿Í»§¶ËͼÏñäÖȾµÄ¿Í»§¶Ë¹¥»÷£¬£¬£¬£¬ £¬£¬ShadowLeakÖ±½Ó´ÓOpenAIÔÆ»ù´¡Éèʩй¶Êý¾Ý£¬£¬£¬£¬ £¬£¬Ê¹ÆóÒµ·ÀÓùϵͳÄÑÒÔ¼ì²â£¬£¬£¬£¬ £¬£¬Óû§ÒàÎÞ¸ÐÖª¡£¡£¡£¡£Deep ResearchÔÊÐíChatGPT×ÔÖ÷ä¯ÀÀÍøÒ³5-30·ÖÖÓÌìÉúÏêϸ±¨¸æ£¬£¬£¬£¬ £¬£¬²¢ÓëGmailµÈÓ¦Óü¯³É¡£¡£¡£¡£¹¥»÷Á÷³ÌÖУ¬£¬£¬£¬ £¬£¬¹¥»÷Õß·¢ËͰüÀ¨Éç»á¹¤³ÌÕ½ÂÔµÄÓʼþ£¬£¬£¬£¬ £¬£¬ÊðÀí¶ÁÈ¡¶ñÒâÄÚÈݺóÖ´ÐÐÒþ²ØÖ¸Á£¬£¬£¬ £¬£¬½«PII×¢Èë¹¥»÷ÕßURL£¬£¬£¬£¬ £¬£¬ÊµÏÖ¾²Ä¬Êý¾ÝÉøÍ¸¡£¡£¡£¡£¸Ã¹¥»÷²»µ«ÏÞÓÚGmail£¬£¬£¬£¬ £¬£¬ÈκÎDeep ResearchÅþÁ¬Æ÷¾ù¿É³ÉÎªÔØÌ壬£¬£¬£¬ £¬£¬¹¥»÷Õß¿ÉÇÔÈ¡ÌõÔ¼¡¢¾Û»á¼Í¼µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£Ð§ÀͶ˹¥»÷Σº¦¸ü¸ß£¬£¬£¬£¬ £¬£¬ÒòÊý¾Ýй¶Դ×ÔÌṩÉÌ»ù´¡ÉèÊ©£¬£¬£¬£¬ £¬£¬ÆóÒµÎÞ·¨Í¨¹ý¿Í»§¶Ë·À»¤×èµ²£¬£¬£¬£¬ £¬£¬ÇÒÊðÀí×÷Ϊ¿ÉÐÅÖнé¿ÉÈÆ¹ýURLÏÞÖÆ£¬£¬£¬£¬ £¬£¬½«Êý¾Ýµ¼³öÖÁí§ÒâÄ¿µÄµØ¡£¡£¡£¡£


https://securityaffairs.com/182334/hacking/shadowleak-radware-uncovers-zero-click-attack-on-chatgpt.html


2. ¶íºÚ¿Í×éÖ¯GamaredonÓëTurlaÁªÊÖ¹¥»÷ÎÚ¿ËÀ¼


9ÔÂ19ÈÕ£¬£¬£¬£¬ £¬£¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESETÅû¶£¬£¬£¬£¬ £¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯GamaredonÓëTurla×Ô2025ÄêÆðÔÚÎÚ¿ËÀ¼·¢¶¯ÁªºÏ¹¥»÷£¬£¬£¬£¬ £¬£¬Í¨¹ý¹¤¾ßÁ´Ð­Í¬°²ÅźóÃųÌÐò¡£¡£¡£¡£ESETÊӲ쵽£¬£¬£¬£¬ £¬£¬2025Äê2Ô£¬£¬£¬£¬ £¬£¬GamaredonµÄPteroGraphin¹¤¾ßÔÚÎÚ¿ËÀ¼¶ËµãÖØÆôTurlaµÄKazuar v3ºóÃÅ£¬£¬£¬£¬ £¬£¬ÓÃÓÚ»Ö¸´±ÀÀ£» £»£»£»£»£»£»òδ×Ô¶¯Æô¶¯µÄ¶ñÒâ³ÌÐò£» £»£»£»£»£»£»4ÔºÍ6Ô£¬£¬£¬£¬ £¬£¬PteroOddºÍPteroPaste¹¤¾ß½øÒ»²½°²ÅÅKazuar v2£¬£¬£¬£¬ £¬£¬Ðγɡ°³õʼ»á¼û-ÔØºÉͶµÝ-ºóÃÅÖ²È롱µÄÍêÕû¹¥»÷Á´¡£¡£¡£¡£Á½¸ö×éÖ¯¾ùÓë¶íÂÞ˹Áª°îÇå¾²¾Ö£¨FSB£©¹ØÁª£ºGamaredon£¨ÓÖÃûAqua Blizzard£©×Ô2013ÄêÆðÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼Õþ¸®»ú¹¹£» £»£»£»£»£»£»Turla£¨ÓÖÃûVenomous Bear£©×Ô2004Äê»îÔ¾£¬£¬£¬£¬ £¬£¬ÉÆÓÚÌØ¹¤»î¶¯¡£¡£¡£¡£´Ë´ÎÏàÖúÖУ¬£¬£¬£¬ £¬£¬GamaredonÌṩ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬ £¬£¬TurlaÔòͨ¹ýKazuarºóÃÅÍøÂçϵͳÐÅÏ¢£¬£¬£¬£¬ £¬£¬²¢Í¨¹ýCloudflare Workers×ÓÓò»òαװ³ÉESETÕýµ±ÎļþµÄÓòÃû´«ÊäÊý¾Ý¡£¡£¡£¡£¹¥»÷Á´ÏÔʾ£¬£¬£¬£¬ £¬£¬GamaredonʹÓÃPteroGraphinºÍPteroOddÏÂÔØÆ÷£¬£¬£¬£¬ £¬£¬´ÓTelegraph API»ñÈ¡ÓÐÓÃÔØºÉÖ´ÐÐKazuar¡£¡£¡£¡£2025Äê1ÔÂÖÁ6Ô£¬£¬£¬£¬ £¬£¬ÎÚ¿ËÀ¼¹²7̨»úе¼ì²âµ½TurlaÏà¹ØÖ¸±ê£¬£¬£¬£¬ £¬£¬ÆäÖÐ4̨ÓÚ1Ô±»Gamaredon¹¥ÆÆ£¬£¬£¬£¬ £¬£¬2ÔÂβ°²ÅÅKazuar v3¡£¡£¡£¡£


https://thehackernews.com/2025/09/russian-hackers-gamaredon-and-turla.html


3. ¶íÂÞ˹ÀÕË÷Èí¼þÍŶÓʹÓÃCountLoaderÀ©´ó¹¥»÷¹æÄ£


9ÔÂ18ÈÕ£¬£¬£¬£¬ £¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿î´úºÅΪ¡°CountLoader¡±µÄÐÂÐͶñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬£¬ £¬£¬Òѱ»¶íÂÞ˹ÀÕË÷Èí¼þÍŻÈçLockBit¡¢Black Basta¡¢Qilin£©ÓÃÓÚͶ·ÅºóÐøÉøÍ¸¹¤¾ß£¨Cobalt Strike¡¢AdaptixC2£©¼°¡°PureHVNC RAT¡±Ô¶³Ì»á¼ûľÂí¡£¡£¡£¡£¸Ã¼ÓÔØÆ÷±£´æ.NET¡¢PowerShellºÍJavaScriptÈý¸ö°æ±¾£¬£¬£¬£¬ £¬£¬Í¨¹ýαÔìÎÚ¿ËÀ¼¹ú¼Ò¾¯Ô±¾ÖÉí·ÝµÄ´¹ÂÚPDFÎļþ¹¥»÷ÎÚ¿ËÀ¼Ð¡ÎÒ˽¼ÒÓû§£¬£¬£¬£¬ £¬£¬ÆäPowerShell°æ±¾ÔøÍ¨¹ýÓëDeepSeekÏà¹ØµÄÓÕ¶üÎļþÈö²¥£¬£¬£¬£¬ £¬£¬×îÖÕ°²ÅÅ¡°BrowserVenom¡±Ö²Èë³ÌÐòÒÔ²Ù¿ØÍøÂçÁ÷Á¿²¢ÍøÂçÊý¾Ý¡£¡£¡£¡£CountLoader¹¦Ð§Ç¿Ê¢£ºJavaScript°æ±¾Ö§³ÖÁùÖÖÎļþÏÂÔØ·½·¨ºÍÈýÖÖ¶ñÒâÈí¼þÔËÐÐÒªÁ죬£¬£¬£¬ £¬£¬¿ÉÍøÂçϵͳÐÅÏ¢²¢½¨Éèαװ³É¹È¸èChrome¸üÐÂʹÃüµÄÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯£» £»£»£»£»£»£»ÆäʹÓá°ÒôÀÖÎļþ¼Ð¡±×÷Ϊ¶ñÒâÈí¼þÔÝ´æÇø£¬£¬£¬£¬ £¬£¬.NETÓëJavaScript°æ±¾Ëä¹¦Ð§ÖØµþ£¬£¬£¬£¬ £¬£¬µ«½öÖ§³ÖÁ½ÖÖÏÂÁîÀàÐÍ£¬£¬£¬£¬ £¬£¬Êô¾«¼ò°æ¡£¡£¡£¡£¸Ã¼ÓÔØÆ÷ÒÀÍÐ20Óà¸öÓòÃûµÄ»ù´¡ÉèÊ©ÔËÐУ¬£¬£¬£¬ £¬£¬½¹µã×÷Ϊ´«ÊäͨµÀͶ·ÅºóÐø¶ñÒâÈí¼þ¡£¡£¡£¡£


https://thehackernews.com/2025/09/countloader-broadens-russian-ransomware.html


4. ¿ÂÁÖ˹ÓÔâÍøÂç¹¥»÷ÖÂÅ·ÖÞ¶à»ú³¡ÏµÍ³Ì±»¾


9ÔÂ20ÈÕ£¬£¬£¬£¬ £¬£¬ÃÀ¹úº½¿ÕÊÖÒÕ¾ÞÍ·¿ÂÁÖ˹Ó£¨Á¥ÊôRTX¼¯ÍÅ£¬£¬£¬£¬ £¬£¬Ç°ÉíΪÀ×ÉñÊÖÒÕ¹«Ë¾£©ÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬ £¬£¬µ¼ÖÂÆäMuseÈí¼þϵͳ¹ÊÕÏ£¬£¬£¬£¬ £¬£¬Òý·¢Å·ÖÞÈý´óÊàŦ»ú³¡¡ª¡ªÂ×¶ØÏ£Ë¼ÂÞ¡¢²¼Â³Èû¶ûºÍ°ØÁÖ»ú³¡µÄµÇ»úÓëÖµ»úϵͳÖÜÈ«ÖÐÖ¹¡£¡£¡£¡£´Ë´ÎÊÂÎñÔì³É´ó¹æÄ£º½°àÑÓÎó¼°×÷·Ï£¬£¬£¬£¬ £¬£¬ÆÈʹº½¿Õ¹«Ë¾ÆôÓÃÈ˹¤²Ù×÷ģʽ£¬£¬£¬£¬ £¬£¬ÊýǧÃûÓοÍÖÍÁô»ú³¡ÊýСʱ£¬£¬£¬£¬ £¬£¬ÅŶӳ¤ÁúÉìÕÅÖÁº½Õ¾Â¥Íâ¡£¡£¡£¡ £¿£¿£¿ £¿£¿£¿£¿ÂÁÖ˹×÷Ϊº½¿Õµç×Ó×°±¸¡¢ÄÚÊμ°Ê¹ÃüϵͳµÄ½¹µã¹©Ó¦ÉÌ£¬£¬£¬£¬ £¬£¬ÆäMuseÈí¼þÖ§³Ö×ÅÅ·ÖÞ¶à»ú³¡µÄµç×ÓÖµ»úÓëÐÐÀîÍÐÔËÁ÷³Ì¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬£¬ £¬£¬RTX¼¯ÍŽÒÏþÉùÃ÷³ÆÎÊÌâ½öÏÞÓÚµç×ÓЧÀÍ£¬£¬£¬£¬ £¬£¬¿Éͨ¹ýÈ˹¤Öµ»ú»º½â£¬£¬£¬£¬ £¬£¬²¢Ç¿µ÷ÕýÈ«Á¦ÐÞ¸´ÏµÍ³¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ £¬£¬²¼Â³Èû¶û»ú³¡ÖÒÑԳƹ¥»÷Ó°Ï콫һÁ¬ÖÁÖÜÁù£¬£¬£¬£¬ £¬£¬°ØÁÖ»ú³¡ºò»úʱ¼äÏÔÖøÑÓÉ죬£¬£¬£¬ £¬£¬Ï£Ë¼ÂÞ»ú³¡ÔòºôÓõÓοͳöÐÐǰȷÈϺ½°à״̬¡£¡£¡£¡£¾Ýº½¿ÕÊý¾ÝÉÌCiriumͳ¼Æ£¬£¬£¬£¬ £¬£¬Èý»ú³¡ÀÛ¼Æ×÷·Ï29¸öº½°à£¬£¬£¬£¬ £¬£¬ÖÜÁùÏÖʵÔËÓªº½°àÁ¿»®·ÖΪ651¼Ü´Î£¨Ï£Ë¼ÂÞ£©¡¢228¼Ü´Î£¨²¼Â³Èû¶û£©ºÍ226¼Ü´Î£¨°ØÁÖ£©¡£¡£¡£¡£Å·ÃËίԱ»á½²»°ÈËÌåÏÖ£¬£¬£¬£¬ £¬£¬ÏÖÔÚÎÞÖ¤¾ÝÏÔʾ´Ë´ÎΪ¡°´ó¹æÄ£ÑÏÖØÏ®»÷¡±£¬£¬£¬£¬ £¬£¬ÒòÓÉÈÔÔÚÊÓ²ìÖС£¡£¡£¡£


https://securityaffairs.com/182363/hacking/a-cyberattack-on-collins-aerospace-disrupted-operations-at-major-european-airports.html


5. CISAÖÒÑÔʹÓÃIvanti EPMMÎó²î°²ÅŶñÒâÈí¼þ


9ÔÂ20ÈÕ£¬£¬£¬£¬ £¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÊÖÒÕ±¨¸æ£¬£¬£¬£¬ £¬£¬Õ¹ÏÖÕë¶ÔIvanti Endpoint Manager Mobile£¨EPMM£©Èí¼þµÄCVE-2025-4427£¨Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬ £¬£¬CVSSÆÀ·Ö5.3£©ºÍCVE-2025-4428£¨Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬ £¬£¬CVSSÆÀ·Ö7.2£©µÄ¶ñÒâ¹¥»÷ϸ½Ú¡£¡£¡£¡£¹¥»÷Õßͨ¹ý´®ÁªÕâÁ½¸öÎó²îʵÏÖÎÞÐèÈÏÖ¤µÄÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬ £¬£¬ÈëÇÖijδǩ×Ö×éÖ¯ÍøÂç²¢°²ÅÅÁ½×é¶ñÒâÈí¼þ¡£¡£¡£¡£µÚÒ»×é¶ñÒâÈí¼þʹÓÃαװ³ÉApache×é¼þµÄReflectUtil.class¼ÓÔØÆ÷£¬£¬£¬£¬ £¬£¬½«SecurityHandlerWanListener¼àÌýÆ÷×¢ÈëTomcatЧÀÍÆ÷£¬£¬£¬£¬ £¬£¬Í¨¹ý×èµ²ÌØ¶¨HTTPÇëÇó½âÃÜÒþ²ØµÄÓÐÓøºÔØ£¬£¬£¬£¬ £¬£¬¶¯Ì¬½¨ÉèJavaÀàÒÔÖ´ÐÐí§Òâ´úÂë¡¢¼á³Ö³¤ÆÚÐÔ²¢ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£µÚ¶þ×éÔòαװ³ÉMobileIronЧÀ͵ÄWebAndroidAppInstaller.class¼ÓÔØÆ÷£¬£¬£¬£¬ £¬£¬Í¨¹ý×èµ²±íµ¥±àÂëµÄHTTPÇëÇ󣬣¬£¬£¬ £¬£¬Ê¹ÓÃÓ²±àÂëAESÃÜÔ¿½âÃܲÎÊý²¢Ö´ÐжñÒâ´úÂ룬£¬£¬£¬ £¬£¬ÊµÏÖϵͳ½ÓÊÜ¡£¡£¡£¡£Ivanti¹«Ë¾ÒÑÓÚ5ÔÂÖÐÑ®ÐÞ¸´Îó²î£¬£¬£¬£¬ £¬£¬²¢È·ÈÏÎó²îÔ´ÓÚµÚÈý·½¿ªÔ´¿â¶ø·Ç×ÔÉí´úÂë¡£¡£¡£¡£CISAÆÊÎöÏÔʾ£¬£¬£¬£¬ £¬£¬¹¥»÷Õßͨ¹ý/mifs/rs/api/v2/¶ËµãÖ´ÐÐÏÂÁ£¬£¬£¬ £¬£¬¾ÙÐÐϵͳÊý¾ÝÍøÂç¡¢¶ñÒâÈí¼þÏÂÔØ¡¢ÍøÂçÓ³Éä¼°LDAPƾ֤ÇÔÈ¡£¬£¬£¬£¬ £¬£¬²¢Í¨¹ý/tmpĿ¼дÈë¶ñÒâÎļþά³Ö³¤ÆÚÐÔ¡£¡£¡£¡£


https://securityaffairs.com/182350/malware/cisa-warns-of-malware-deployed-through-ivanti-epmm-flaws.html


6. ¼ÓÄôó»Ê¼ÒÆï¾¯ÆÆ»ñÊ×Àý¼ÓÃÜÇ®±ÒÉúÒâËù¹Ø±Õ°¸


9ÔÂ20ÈÕ£¬£¬£¬£¬ £¬£¬¼ÓÄôó»Ê¼ÒÆï¾¯£¨RCMP£©Æ¾Ö¤Å·ÖÞÐ̾¯×éÖ¯ÌṩµÄÏßË÷£¬£¬£¬£¬ £¬£¬ÁªºÏÏ´Ç®ÊÓ²ì×飨MLIT£©¶ÔרעÓÚÒþ˽ÉúÒâµÄСÐͼÓÃÜÇ®±Òƽ̨TradeOgreÕö¿ª×¨ÏîÐж¯£¬£¬£¬£¬ £¬£¬×îÖÕÀֳɹرոÃÉúÒâËù²¢²é»ñÁè¼Ý4000ÍòÃÀÔª×ʽ𣬣¬£¬£¬ £¬£¬¾ÝÐÅÕâЩ×ʽð¶àÔ´ÓÚÍøÂç·¸·¨»î¶¯¡£¡£¡£¡£´Ë´ÎÐж¯²»µ«ÊǼÓÄôóÖ´·¨²¿·ÖÊ״ιرռÓÃÜÇ®±ÒÉúÒâËù£¬£¬£¬£¬ £¬£¬¸ü´´Ï¸ùúÀúÊ·ÉÏ×î´ó¹æÄ£×ʲú¿ÛѺ¼Í¼¡£¡£¡£¡£TradeOgreƽ̨ÒòÖ§³ÖСÖÚɽկ±Ò¼°ÄÑÒÔ×·×ÙµÄÃÅÂÞ±Ò£¨Monero£©ÉúÒâ¶øÖøÃû£¬£¬£¬£¬ £¬£¬ÆäÔËӪģʽ±£´æÑÏÖØÖ´·¨Îó²î£¬£¬£¬£¬ £¬£¬Î´ÒªÇóÓû§Í¨¹ýKYC£¨ÏàʶÄúµÄ¿Í»§£©Õþ²ß¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬£¬ £¬£¬ÇÒδÏò¼ÓÄôó½ðÈÚÉúÒâºÍ±¨¸æÆÊÎöÖÐÐÄ£¨FINTRAC£©×¢²áΪǮ±ÒЧÀÍÆóÒµ£¬£¬£¬£¬ £¬£¬Î¥·´Á˼ÓÄôó·´Ï´Ç®¹æÔò¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬ £¬£¬¸Ãƽ̨ÒòÄäÃûÐÔÌØÕ÷±»ÍøÂç·¸·¨·Ö×ÓÆÕ±éÓÃÓÚÏ´Ç®²Ù×÷£¬£¬£¬£¬ £¬£¬ÀýÈç½»Á÷ÀÕË÷Èí¼þÊÕÒæ¡¢ÊµÑéSIM¿¨½»Á÷Õ©Æ­µÈ¡£¡£¡£¡£Æ½Ì¨ÏÂÏߺ󣬣¬£¬£¬ £¬£¬²¿·ÖÓû§ÖÊÒɴ˾ÙΪ¡°Í˳öȦÌס±£¬£¬£¬£¬ £¬£¬µ«Ö´·¨»ú¹¹Ã÷È·ÌåÏֹرÕÐж¯»ùÓÚÕýµ±ÊӲ졣¡£¡£¡£¹ØÓÚ·Ç·¸·¨Óû§Ìá³öµÄ×·Ë÷ȨÎÊÌ⣬£¬£¬£¬ £¬£¬¾¯·½Ö¸³ö¿Éͨ¹ý¼ÓÄôó·¨ÔºÏµÍ³×·Çó¾ÈÔ®¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/canada-dismantles-tradeogre-exchange-seizes-40-million-in-crypto/