OpenAI ×èÖ¹³¯ÏʺڿÍʹÓà ChatGPT ¾ÙÐжñÒâ»î¶¯

Ðû²¼Ê±¼ä 2025-02-25

1. OpenAI ×èÖ¹³¯ÏʺڿÍʹÓà ChatGPT ¾ÙÐжñÒâ»î¶¯


2ÔÂ24ÈÕ £¬£¬£¬£¬£¬£¬£¬OpenAI ½üÆÚ½ÓÄÉÐж¯ £¬£¬£¬£¬£¬£¬£¬×èÖ¹Á˶à¸ö³¯ÏʺڿÍ×é֯ʹÓÃChatGPTƽ̨Ñо¿Î´À´¹¥»÷Ä¿µÄ¼°ÈëÇÖÍøÂçÒªÁì¡£¡£¡£ÔÚÆä2025Äê2ÔµÄÍþвÇ鱨±¨¸æÖÐ £¬£¬£¬£¬£¬£¬£¬OpenAIÖ¸³öÒÑ·â½ûÓ볯ÏÊÃñÖ÷Ö÷ÒåÈËÃñ¹²ºÍ¹ú£¨DPRK£©Á¥ÊôÍþв×éÖ¯ÓйØÁªµÄÕË»§ £¬£¬£¬£¬£¬£¬£¬ÕâЩÕË»§Éæ¼°VELVET CHOLLIMAºÍSTARDUST CHOLLIMAµÈºÚ¿Í×éÖ¯¡£¡£¡£ÕâЩÕË»§Í¨¹ýʹÓÃChatGPT²éÕÒ¼ÓÃÜÇ®±ÒÏà¹ØÐÅÏ¢¡¢×·Çó±àÂë×ÊÖú¼°Ñо¿Ô¶³ÌÖÎÀí¹¤¾ßµÈ·½·¨ £¬£¬£¬£¬£¬£¬£¬ÊÔͼ¾ÙÐжñÒâ»î¶¯¡£¡£¡£OpenAI»¹·¢Ã÷ £¬£¬£¬£¬£¬£¬£¬³¯Ïʹ¥»÷ÕßÔÚʹÓÃChatGPTµ÷ÊÔ¹¥»÷ÊÖÒÕʱ £¬£¬£¬£¬£¬£¬£¬Ð¹Â¶ÁËδ֪¶ñÒâ¶þ½øÖÆÎļþµÄÔÝ´æURL £¬£¬£¬£¬£¬£¬£¬Ïà¹ØÐÅÏ¢ÒÑÌá½»¸øÇå¾²ÉçÇø¹²Ïí¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬£¬³¯Ïʺڿͻ¹Í¨¹ýChatGPTѯÎÊÓ¦ÓóÌÐòÎó²î¡¢¿ª·¢RDP¿Í»§¶Ë¡¢ÇëÇóÈÆ¹ýÇå¾²ÖÒÑԵĴúÂë¡¢±àдPowerShell¾ç±¾ÒÔ¼°Éè¼ÆÍøÂç´¹ÂÚÓʼþµÈ¡£¡£¡£OpenAI»¹Õ¥È¡ÁËÓëDZÔÚ³¯ÏÊIT¹¤ÈËÍýÏëÓйصÄÕË»§ £¬£¬£¬£¬£¬£¬£¬¸ÃÍýÏëÖ¼ÔÚͨ¹ý¹ÍÓ¶³¯ÏÊÈËΪƽÈÀÕþȨ»ñÈ¡ÊÕÈë¡£¡£¡£


https://www.bleepingcomputer.com/news/security/openai-bans-chatgpt-accounts-used-by-north-korean-hackers/


2. ¶íÂÞ˹NKTsKIÖÒÑÔ£ºÐÅ´û½ðÈÚÒµITЧÀÍÌṩÉÌLANITÔâ¹¥»÷


2ÔÂ24ÈÕ £¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹¹ú¼ÒÅÌËã»úÊÂÎñЭµ÷ÖÐÐÄ(NKTsKI)ÏòÐÅ´ûºÍ½ðÈÚ²¿·Ö×éÖ¯·¢³öÖÒÑÔ £¬£¬£¬£¬£¬£¬£¬Ö¸³ö¶íÂÞ˹Ö÷ÒªITЧÀͺÍÈí¼þÌṩÉÌLANIT±£´æÎ¥¹æÐÐΪ £¬£¬£¬£¬£¬£¬£¬ÆäÆìÏÂרÃÅ´ÓÊÂÒøÐÐÊÖÒÕºÍЧÀ͵ÄLLC LANTERºÍLLC LAN ATMservice¿ÉÄÜÓÚ2025Äê2ÔÂ21ÈÕÔâÊܹ¥»÷¡£¡£¡£LANIT¼¯ÍÅÊǶíÂÞ˹Ö÷ÒªµÄϵͳ¼¯³ÉÉÌ £¬£¬£¬£¬£¬£¬£¬¿Í»§°üÀ¨¶íÂÞ˹¹ú·À²¿µÈ×ÅÃûʵÌå £¬£¬£¬£¬£¬£¬£¬Òò´ËÓÚ2024Äê5ÔÂÊܵ½ÃÀ¹ú²ÆÎñ²¿ÖƲᣡ£¡£NKTsKI½¨ÒéËùÓпÉÄÜÊÜÓ°ÏìµÄ×éÖ¯ÂÖ»»ÃÜÂëºÍ»á¼ûÃÜÔ¿ £¬£¬£¬£¬£¬£¬£¬²¢¸ü¸ÄÔ¶³Ì»á¼ûƾ֤ £¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÔöÇ¿¶ÔLANIT¼¯ÍŹ«Ë¾¹¤³Ìʦ¿ª·¢¡¢°²ÅÅ»òά»¤µÄϵͳÖеÄÍþвºÍÐÅÏ¢Çå¾²ÊÂÎñµÄ¼à¿Ø¡£¡£¡£È»¶ø £¬£¬£¬£¬£¬£¬£¬NKTsKIÉÐδ͸¶¹¥»÷ÕßµÄÈëÇÖ·½·¨¡¢ÈëÇÖʱ¼ä¡¢±»µÁÊý¾ÝÒÔ¼°¹¥»÷ÕßÉí·Ý¡£¡£¡£½üÆÚ £¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹ATMÔËÓªÉ̺ÍÒøÐжà´Î³ÉΪÎÚ¿ËÀ¼ºÚ¿ÍµÄÄ¿µÄ £¬£¬£¬£¬£¬£¬£¬¶ø´Ë´ÎÖÐÑëЧÀÍÌṩÉ̵Äϵͳ±»ÉøÍ¸ £¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÒý·¢ÆÕ±éµÄ¹©Ó¦Á´Ë𺦡£¡£¡£


https://www.bleepingcomputer.com/news/security/russia-warns-financial-sector-of-major-it-service-provider-hack/


3. °ÄÕþ¸®Õ¥È¡¿¨°Í˹»ù²úÆ· £¬£¬£¬£¬£¬£¬£¬Ö¸Æä×é³ÉÖØ´óÇ徲Σº¦


2ÔÂ24ÈÕ £¬£¬£¬£¬£¬£¬£¬°Ä´óÀûÑÇÕþ¸®½üÆÚեȡÆäϵͳºÍ×°±¸Ê¹Óÿ¨°Í˹»ùʵÑéÊÒµÄËùÓвúÆ·ºÍÍøÂçЧÀÍ £¬£¬£¬£¬£¬£¬£¬ÕâÒ»¾öÒéÊÇ»ùÓÚÄÚÕþ²¿¶Ô¿¨°Í˹»ù×é³ÉµÄÇ徲Σº¦µÄÆÊÎö¡£¡£¡£ÄÚÕþ²¿²¿³¤Ë¹µÙ·ÒÄÝ¡¤¸£Ë¹ÌØÖ¸³ö £¬£¬£¬£¬£¬£¬£¬Ê¹Óÿ¨°Í˹»ùµÄ²úÆ·ºÍЧÀͶ԰ĴóÀûÑÇÕþ¸®¡¢ÍøÂçºÍÊý¾Ý×é³ÉÁ˲»¿É½ÓÊܵÄÇ徲Σº¦ £¬£¬£¬£¬£¬£¬£¬ÕâЩΣº¦Ö÷ÒªÔ´ÓÚÍâ¹ú¸ÉÔ¤¡¢Ìع¤ºÍÆÆËðµÄÍþв¡£¡£¡£Òò´Ë £¬£¬£¬£¬£¬£¬£¬ËùÓзǹ«Ë¾ÐÍÁª°îʵÌå±»ÒªÇóʶ±ð²¢É¾³ý¿¨°Í˹»ùµÄËùÓÐʵÀý £¬£¬£¬£¬£¬£¬£¬²¢±ÜÃâδÀ´×°Öᣡ£¡£¿£¿£¿¨°Í˹»ù·½ÃæÁÙ´ËÌåÏÖÒìÒé £¬£¬£¬£¬£¬£¬£¬³ÆÕâЩָ¿ØÃ»ÓÐÏêϸ֤¾ÝÖ§³Ö £¬£¬£¬£¬£¬£¬£¬²¢ÒÔΪ´Ë´Î½ûÁî´¿´â³öÓÚÕþÖÎÔµ¹ÊÔ­ÓÉ £¬£¬£¬£¬£¬£¬£¬Ã»ÓлñµÃ¹«Ë¾²úÆ·ÊÖÒÕÆÀ¹ÀµÄÖ§³Ö¡£¡£¡£ÕâÒ»Ðж¯ÊÇ¼ÌÆäËûÎ÷·½¹ú¼Ò³öÓÚÀàËÆµ£ÐĽÓÄÉÀàËÆÐж¯Ö®ºóµÄÓÖÒ»°¸Àý £¬£¬£¬£¬£¬£¬£¬°üÀ¨ÃÀ¹ú¡¢µÂ¹úºÍ¼ÓÄôóµÈ¹úÒѾ­»ò½¨ÒéեȡÔÚÕþ¸®ÏµÍ³»òÆóÒµÖÐʹÓÿ¨°Í˹»ù²úÆ·¡£¡£¡£


https://www.bleepingcomputer.com/news/security/australia-bans-all-kaspersky-products-on-government-systems/


4. ½©Ê¬ÍøÂçʹÓÃ13ÍòÊÜѬȾװ±¸¶ÔM365¾ÙÐÐÃÜÂëÅçÈ÷¹¥»÷


2ÔÂ24ÈÕ £¬£¬£¬£¬£¬£¬£¬Ò»¸öÓÉÁè¼Ý130,000̨ÊÜѬȾװ±¸×é³ÉµÄ½©Ê¬ÍøÂçÕý¶ÔÈ«ÇòMicrosoft 365£¨M365£©ÕÊ»§¾ÙÐÐÃÜÂëÅçÈ÷¹¥»÷ £¬£¬£¬£¬£¬£¬£¬Ö÷ҪĿµÄÊÇʹÓûù×Ô¼º·ÝÑéÖ¤£¨Basic Auth£©ÌӱܶàÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»£»£»£»¤¡£¡£¡£¾ÝSecurityScorecard±¨¸æ £¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»ñȡƾ֤ £¬£¬£¬£¬£¬£¬£¬Ê¹Ó÷ǽ»»¥Ê½µÇ¼ʵÑéÈÆ¹ýMFA £¬£¬£¬£¬£¬£¬£¬ÔÚ²»´¥·¢Çå¾²¾¯±¨µÄÇéÐÎÏ»ñȡδ¾­ÊÚȨµÄ»á¼û¡£¡£¡£»£»£»£»£»£»ù×Ô¼º·ÝÑéÖ¤ÊÇÒ»ÖÖ¹ýʱµÄÉí·ÝÑéÖ¤ÒªÁì £¬£¬£¬£¬£¬£¬£¬Î¢ÈíÒÑÍýÏëÔÚ2025Äê9ÔÂÆúÓà £¬£¬£¬£¬£¬£¬£¬µ«ÏÖÔÚÔÚijЩÇéÐÎÖÐÈÔÆôÓà £¬£¬£¬£¬£¬£¬£¬Ê¹Æä³ÉΪ¹¥»÷ÕßµÄÖ÷ҪĿµÄ¡£¡£¡£¸Ã½©Ê¬ÍøÂçʹÓó£Óûòй¶µÄÃÜÂëʵÑé¹¥»÷´ó×ÚÕÊ»§ £¬£¬£¬£¬£¬£¬£¬Ò»µ©Æ¾Ö¤»ñµÃÑéÖ¤ £¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¼´¿É»á¼û¾ÉʽЧÀÍ»òÔÚ¸üÖØ´óµÄÍøÂç´¹ÂÚ¹¥»÷ÖлñµÃÍêÈ«»á¼ûȨÏÞ¡£¡£¡£SecurityScorecardÖ¸³ö £¬£¬£¬£¬£¬£¬£¬¸Ã½©Ê¬ÍøÂçµÄÔËÓªÕßͨ¹ýÃÀ¹ú¹©Ó¦ÉÌÍйܵÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÔËÐÐ £¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÓëÖйúÏà¹ØµÄÔÆÐ§ÀÍÊðÀíÁ÷Á¿¡£¡£¡£×éÖ¯Ó¦½ûÓÃM365ÖеĻù×Ô¼º·ÝÑéÖ¤ £¬£¬£¬£¬£¬£¬£¬×èÖ¹Ïà¹ØIPµØµã £¬£¬£¬£¬£¬£¬£¬ÆôÓÃÌõ¼þ»á¼ûÕ½ÂÔ²¢ÔÚËùÓÐÕÊ»§ÉÏʹÓÃMFAÒÔÔöÇ¿Çå¾²ÐÔ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/botnet-targets-basic-auth-in-microsoft-365-password-spray-attacks/


5. ºÚ¿ÍʹÓà Google Docs ºÍ Steam Èö²¥ ACRStealer ÐÅÏ¢ÇÔÈ¡³ÌÐò


2ÔÂ24ÈÕ £¬£¬£¬£¬£¬£¬£¬AhnLabÇå¾²Ç鱨ÖÐÐÄ(ASEC)·¢Ã÷ £¬£¬£¬£¬£¬£¬£¬ÐÂÐÍÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þACRStealerÕýʹÓÃGoogle DocsºÍSteamµÈÕýµ±Æ½Ì¨¾ÙÐй¥»÷ £¬£¬£¬£¬£¬£¬£¬×Ô2025ÄêÒÔÀ´Èö²¥Á¿ÏÔÖøÔöÌí¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÈí¼þÆÆ½âºÍÃÜÔ¿ÌìÉúÆ÷¾ÙÐÐÈö²¥ £¬£¬£¬£¬£¬£¬£¬Î±×°³É²»·¨³ÌÐò £¬£¬£¬£¬£¬£¬£¬Äܹ»¼ì²â·À²¡¶¾½â¾ö¼Æ»®¡¢ÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°ü¡¢µÇ¼ƾ֤¡¢ä¯ÀÀÆ÷Êý¾ÝµÈ £¬£¬£¬£¬£¬£¬£¬Ê¹ÍøÂç·¸·¨·Ö×ÓÄܹ»Ãé×¼½ðÈÚ×ʲúºÍСÎÒ˽¼ÒÕË»§¡£¡£¡£ACRStealerʹÓÃDead Drop Resolver(DDR)ÒªÁì¾ÙÐÐC2ЧÀÍÆ÷ͨѶ £¬£¬£¬£¬£¬£¬£¬Í¨¹ýÁªÏµÕýµ±Ð§ÀͼìË÷C2ЧÀÍÆ÷µÄÓò £¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÇáËɸü¸ÄC2Óò¶øÎÞÐè¸üжñÒâÈí¼þ×Ô¼º¡£¡£¡£ËüÒÔ¶ñÒâÈí¼þ¼´Ð§ÀÍ(MaaS)ÐÎʽÔËÐÐ £¬£¬£¬£¬£¬£¬£¬Ê¹Ñ¬È¾×·×Ù±äµÃÄÑÌâ¡£¡£¡£Îª±ÜÃâѬȾ £¬£¬£¬£¬£¬£¬£¬½¨Òé×èÖ¹»á¼û·Ö·¢ÆÆ½â³ÌÐòºÍÃÜÔ¿ÌìÉúÆ÷µÄÍøÕ¾ £¬£¬£¬£¬£¬£¬£¬½ö´Ó¹Ù·½ÈªÔ´ÏÂÔØÈí¼þ £¬£¬£¬£¬£¬£¬£¬ÉóÉ÷¿´´ýδ¾­ÇëÇóµÄͨѶÖеÄÁ´½ÓºÍ¸½¼þ £¬£¬£¬£¬£¬£¬£¬ÆôÓöàÒòËØÉí·ÝÑéÖ¤ £¬£¬£¬£¬£¬£¬£¬²¢Î¬»¤ÓÐÓõķ´¶ñÒâÈí¼þ½â¾ö¼Æ»®¡£¡£¡£


https://hackread.com/hackers-google-docs-steam-drop-acrstealer-infostealer/


6. Fluent Bit Òªº¦0-dayÎó²îÍþÐ²ÔÆ»ù´¡ÉèÊ©Çå¾²


2ÔÂ24ÈÕ £¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËFluent BitÖеÄÁ½¸öÒªº¦0-dayÎó²î£¨CVE-2024-50608ºÍCVE-2024-50609£© £¬£¬£¬£¬£¬£¬£¬ÕâÁ½¸öÎó²îµÄCVSSÆÀ·ÖΪ8.9 £¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÆÕ±éÓ¦ÓÃÓÚAWS¡¢Google CloudºÍMicrosoft AzureµÈÔÆÐ§ÀÍÌṩÉ̵ÄÔÆ»ù´¡ÉèÊ©ÖеÄÈÕÖ¾ÍøÂ繤¾ß¡£¡£¡£ÕâЩÎó²îʹÓÃÁËFluent BitµÄPrometheus Remote WriteºÍOpenTelemetry²å¼þÖеĿÕÖ¸Õë½âÒýÓÃÈõµã £¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂЧÀÍÆ÷Í߽⡢¾Ü¾øÐ§À͹¥»÷»òÃô¸ÐÐÅϢй¶¡£¡£¡£Fluent BitÓµÓÐÁè¼Ý150ÒÚ´ÎÏÂÔØºÍÖðÈÕ1000Íò´Î°²ÅÅ £¬£¬£¬£¬£¬£¬£¬¶ÔÈ«ÇòÆóÒµºÍÔÆÉú̬ϵͳ×é³ÉÑÏÖØÍþв¡£¡£¡£¹¥»÷ÕßʹÓÃÕâЩÎó²î¿ÉÄÜ»áÆÆËðÈÕÖ¾¹ÜµÀ £¬£¬£¬£¬£¬£¬£¬Ó°ÏìÊÂÎñÏìÓ¦ºÍºÏ¹æÊÂÇéÁ÷³Ì¡£¡£¡£Fluent Bitά»¤ÕßÒÑÐû²¼²¹¶¡¾ÙÐÐÐÞ¸´ £¬£¬£¬£¬£¬£¬£¬²¢½¨ÒéÆóÒµÁ¬Ã¦ÎªFluent BitʵÀý´ò²¹¶¡¡¢ÏÞÖÆAPI»á¼û¡¢½ûÓÃδʹÓõĶ˵㠣¬£¬£¬£¬£¬£¬£¬²¢ÉóºËÉèÖá¢Ö§½â¼à¿ØÍøÂç £¬£¬£¬£¬£¬£¬£¬½ÓÄÉÒ»Á¬µÄÄ£ºý²âÊÔÕ½ÂÔ¡£¡£¡£Ö»¹ÜÐÐÒµÓëÔÆÐ§ÀÍÌṩÉÌЭ×÷Ðû²¼²¹¶¡ £¬£¬£¬£¬£¬£¬£¬µ«¼øÓÚÖðÈÕÓдó×Ú°²ÅÅÃæÁÙΣº¦ £¬£¬£¬£¬£¬£¬£¬Î´´ò²¹¶¡µÄϵͳÏìӦʱ¼ä¼«ÆäÓÐÏÞ¡£¡£¡£


https://cybersecuritynews.com/fluent-bit-0-day-vulnerabilities-exposes-billions-of-production-environments/