˹¿°ÄáÑÇÆóÒµ°ü¹Ü²¿·ÖÒÉÔâÈëÇÖ£¬£¬£¬3.4Íò·ÝÎļþ±»µÁ

Ðû²¼Ê±¼ä 2025-06-18

1. ˹¿°ÄáÑÇÆóÒµ°ü¹Ü²¿·ÖÒÉÔâÈëÇÖ£¬£¬£¬3.4Íò·ÝÎļþ±»µÁ


6ÔÂ16ÈÕ£¬£¬£¬ÈðµäÖ÷ÒªÉÌÓóµÖÆÔìÉÌ˹¿°ÄáÑÇÒÉËÆÔâÓöÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¹¥»÷ÕßÔÚÒ»¸öÈÈÃÅ¡°½öÏÞÔ¼Ç롱µÄºÚ¿ÍÂÛ̳ÉÏÐû²¼ÈëÇÖÁË˹¿°ÄáÑÇµÄÆóÒµ°ü¹Ü²¿·Ö£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË3.4Íò·Ý´Ëǰ´Óδ¹ûÕæ¹ýµÄÎļþ¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬ÕâЩÎļþ°üÀ¨µÄÏêϸÐÅÏ¢Éв»Ã÷È·¡£¡£¡£¡£²»¹ý£¬£¬£¬¼øÓÚ˹¿°ÄáÑǹ«Ë¾°ü¹Üº­¸ÇÉÌÓóµÁ¾£¬£¬£¬Ì»Â¶µÄÎļþ¼«ÓпÉÄÜÉæ¼°¿Í»§ÐÅÏ¢£¬£¬£¬Èç¿Í»§Éí·ÝÒÔ¼°ËûÃÇËùÓµÓеijµÁ¾ÐÅÏ¢£¨Í¨¹ý³µÁ¾Ê¶ÓÖÃûÂëVIN£©¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¹¥»÷ÕßÉù³ÆÇÔÈ¡Êý¾ÝµÄ˹¿°ÄáÑÇÍøÕ¾ÒÑÎÞ·¨»á¼û£¬£¬£¬·Ã¿ÍÖ»ÄÜ¿´µ½ÏµÍ³Î¬»¤ÏÂÏßµÄÐÂÎÅ£¬£¬£¬µ«Éв»ÇåÎú´Ë´Îά»¤ÊÇ·ñÓëºÚ¿Í¹¥»÷ÓйØ¡£¡£¡£¡£Ë¹¿°ÄáÑÇ×÷Ϊ´óÐÍÉÌÓóµÖÆÔìÉÌ£¬£¬£¬ÔÚÅ·ÖÞÉÌÓóµÊг¡Õ¼Óнü19%µÄ·Ý¶î£¬£¬£¬ÓµÓÐ5.9ÍòÃûÔ±¹¤£¬£¬£¬2024ÄêÓªÊÕÔ¤¼Æ³¬220ÒÚÃÀÔª¡£¡£¡£¡£¹¥»÷Õß³£½«Æû³µÖÆÔìÉÌ×÷ΪĿµÄ£¬£¬£¬Ôµ¹ÊÔ­ÓÉÔÚÓÚ´óÐÍ¿ç¹ú¹«Ë¾ÕÆÎÕ×Å´ó×ÚÃô¸ÐµÄ¹«Ë¾ºÍ¿Í»§Êý¾Ý£¬£¬£¬ÇÒÔÚÔâÊÜÀÕË÷ʱ¾ß±¸Ö§¸¶Êê½ðµÄÄÜÁ¦¡£¡£¡£¡£´Ëǰ£¬£¬£¬±¾ÔÂÔçЩʱ¼ä¹¥»÷Õß¾ÍÔøÉù³ÆÈëÇÖÁ˵¹úÆû³µ¾ÞÍ·¹«¹²Æû³µ¼¯ÍÅ¡£¡£¡£¡£


https://cybernews.com/security/scania-insurance-data-breach-hackers/


2. °®¶ûÀ¼ÑÛ¿ÆÕչ˻¤Ê¿¹«Ë¾OcucoÊý¾Ýй¶ӰÏì24ÍòÈË


6ÔÂ16ÈÕ£¬£¬£¬×ܲ¿Î»ÓÚ°®¶ûÀ¼µÄÑÛ¿ÆÕչ˻¤Ê¿ÊÖÒÕ¹«Ë¾OcucoÏòÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©×ª´ïÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬´Ë´ÎÊÂÎñÓ°ÏìÁè¼Ý24ÍòÈË¡£¡£¡£¡£Ocuco×Ô³ÆÊÇÈ«Çò×î´óµÄÑÛ¾µÁãÊÛÈí¼þÆóÒµ£¬£¬£¬ÆäÈí¼þЧÀÍÆÕ±éÁýÕÖ77¸ö¹ú¼Ò/µØÇøµÄ6000¸öЧÀ͵ã¡£¡£¡£¡£Ö»¹ÜOcucoÉÐδ¹ûÕæÐû²¼ÊÂÎñͨ¸æ£¬£¬£¬µ«ÖÖÖÖ¼£ÏóÅú×¢£¬£¬£¬¸ÃÊÂÎñºÜ¿ÉÄÜÓëÀÕË÷×éÖ¯KillSecµÄºÚ¿Í¹¥»÷ÓйØ¡£¡£¡£¡£½ñÄêÔçЩʱ¼ä£¬£¬£¬KillSecÐû³Æ´ÓOcucoÇÔÈ¡ÁË´ó×ÚÎļþ£¬£¬£¬4Ô³õ£¬£¬£¬¸Ã×éÖ¯ÔÚÆä»ùÓÚTorµÄÐ¹Â¶ÍøÕ¾ÉÏÐû²¼ÁËOcucoµÄÐÅÏ¢£¬£¬£¬²¢Ðû²¼Á˶àÕŽØÍ¼×÷Ϊ¹¥»÷ÐÐΪµÄ×ôÖ¤¡£¡£¡£¡£ÆäÖÐÒ»ÕŽØÍ¼ÏÔʾ£¬£¬£¬ºÚ¿ÍÖÁÉÙÇÔÈ¡ÁË67Íò·ÝÎļþ£¬£¬£¬×ܼÆ340GBÊý¾Ý¡£¡£¡£¡£ËäÈ»ºÚ¿ÍÍøÕ¾Éù³Æ±»µÁÊý¾ÝÒѹûÕæ£¬£¬£¬µ«×èÖ¹·¢¸åʱ£¬£¬£¬OcucoµÄÊý¾ÝÉÐδ·ºÆðÔÚKillSecÍøÕ¾µÄ¿ÉÏÂÔØÁбíÖС£¡£¡£¡£


https://www.securityweek.com/240000-impacted-by-data-breach-at-eyecare-tech-firm-ocuco/


3. ¡°ÂÓʳÂéȸ¡±¹¥»÷ÒÁÀÊÈüÅÁÒøÐУ¬£¬£¬Í¹ÏÔÒÔÒÁ³åÍ»ÖÐÍøÂçÕ½Éý¼¶


6ÔÂ17ÈÕ£¬£¬£¬ÒÁÀʹúÓÐÒøÐÐÈüÅÁÒøÐУ¨Bank Sepah£©ÍøÕ¾ÒòÔâºÚ¿Í×éÖ¯¡°ÂÓʳÂéȸ¡±£¨Predatory Sparrow£¬£¬£¬²¨Ë¹ÓïΪ¡°Gonjeshke Darande¡±£©¹¥»÷¶øÏÂÏß¡£¡£¡£¡£¸Ã×éÖ¯ÖܶþÆÆÏþÔÚÉ罻ýÌåÐû³Æ¡°´Ý»ÙÁËÒÁÀʸïÃüÎÀ¶ÓÈüÅÁÒøÐеÄÊý¾Ý¡±¡£¡£¡£¡£¾ÝÒÁÀÊýÌ屨µÀ£¬£¬£¬ÈüÅÁÒøÐзÖÐйرգ¬£¬£¬¿Í»§ÎÞ·¨»á¼ûÕË»§£¬£¬£¬Ö§¸¶´¦Öóͷ£ÖÐÖ¹£¬£¬£¬ÒÁÀÊ·¨¶û˹ͨѶÉçҲ֤ʵÆä»ù´¡ÉèÊ©ÔâÊÜÍøÂç¹¥»÷ÖÂЧÀÍÖÐÖ¹¡£¡£¡£¡£´Ë´ÎÕë¶ÔÒÁÀÊ×î´ó½ðÈÚ»ú¹¹Ö®Ò»µÄÏ®»÷£¬£¬£¬Í¹ÏÔÍøÂçÕ½ÔÚÒÔÉ«ÁкÍÒÁÀÊÒ»Ö±Éý¼¶µÄ³åÍ»ÖÐ×÷ÓÃÓú·¢Ö÷Òª£¬£¬£¬ÇÒ¶ÔÒÁÀÊÒªº¦»ù´¡ÉèÊ©±¬·¢Ö±½ÓÓ°Ïì¡£¡£¡£¡£¡°ÂÓʳÂéȸ¡±×éÖ¯³Æ¹¥»÷ÈüÅÁÒøÐУ¬£¬£¬ÒòÆä¡°¹æ±Ü¹ú¼ÊÖÆ²Ã£¬£¬£¬ÓÃÒÁÀÊÈËÃñµÄÇ®×ÊÖúÕþȨµÄ¿Ö²ÀÖ÷ÒåÊðÀíÈË¡¢µ¯µÀµ¼µ¯ÍýÏëºÍ¾üʺËÍýÏ롱¡£¡£¡£¡£¸Ã×éÖ¯´Ëǰ»¹Éù³Æ¶ÔÒÁÀʸÖÌú³§¡¢ÌúÂ·ÍøÂç¼°¼ÓÓÍÕ¾Ö§¸¶ÏµÍ³·¢¶¯¹¥»÷£¬£¬£¬ÆäÔ­¼®¹ú²»Ã÷£¬£¬£¬µ«Ò»Ö±Õë¶ÔÒÁÀÊÕþȨ²¢Ö§³ÖÒÔÉ«ÁÐÔÚÒÁÄ¿µÄ¡£¡£¡£¡£


https://cyberscoop.com/iran-bank-sepah-cyberattack/


4. Cock.liÈ·ÈÏÊý¾Ýй¶£¬£¬£¬³¬°ÙÍòÓû§ÐÅÏ¢ÔâÇÔ


6ÔÂ17ÈÕ£¬£¬£¬µç×ÓÓʼþÍйÜÌṩÉÌCock.liÈ·ÈÏÔâÓöÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£ÍþвÐÐΪÕßʹÓÃÆäÒÑÍËÒÛµÄRoundcubeÍøÂçÓʼþƽ̨Îó²î£¬£¬£¬ÇÔÈ¡ÁËÁè¼ÝÒ»°ÙÍò¸öÓû§¼Í¼¡£¡£¡£¡£´Ë´Îй¶̻¶ÁË×Ô2016ÄêÒÔÀ´µÇ¼¸ÃÓʼþЧÀ͵ÄËùÓÐÓû§£¨Ô¼1,023,800ÈË£©µÄÐÅÏ¢£¬£¬£¬ÒÔ¼°ÁíÍâ93,000ÃûÓû§µÄÁªÏµÈËÌõÄ¿¡£¡£¡£¡£ÉÏÖÜÍíЩʱ¼ä£¬£¬£¬Cock.liЧÀÍÖÐÖ¹µ«Î´¹ûÕæÚ¹ÊÍ£¬£¬£¬ËæºóÍþвÐÐΪÕßÉù³ÆÒª³öÊÛ°üÀ¨Ãô¸ÐÓû§ÐÅÏ¢µÄÊý¾Ý¿â¡£¡£¡£¡£Cock.li×òÌì½ÒÏþÉùÃ÷֤ʵÁË´Ë´ÎйÃÜÊÂÎñ¼°ÍþвÐÐΪÕßÖ¸¿ØµÄÓÐÓÃÐÔ£¬£¬£¬È·ÈÏÁË1,023,800¸öÓû§ÕÊ»§µÄµç×ÓÓʼþ¡¢µÇ¼ʱ¼ä´ÁµÈÐÅÏ¢Òѱ»Ð¹Â¶£¬£¬£¬µ«Óû§ÕÊ»§ÃÜÂë¡¢µç×ÓÓʼþÄÚÈݺÍIPµØµã²¢Î´Ð¹Â¶¡£¡£¡£¡£Í¬Ê±£¬£¬£¬µÚÈý·½ÁªÏµÐÅÏ¢±»Ð¹Â¶µÄ10,400ÃûÕË»§³ÖÓÐÈ˽«ÊÕµ½µ¥¶À֪ͨ£¬£¬£¬½¨Òé×Ô2016ÄêÒÔÀ´Ê¹ÓøÃЧÀ͵ÄËùÓÐÈËÖØÖÃÃÜÂë¡£¡£¡£¡£Cock.liÒÔΪÊý¾ÝÊÇʹÓþɵÄRoundCube SQL×¢ÈëÎó²îÇÔÈ¡µÄ£¬£¬£¬¶ø´Ë´Îй¶ÊÂÎñ±¬·¢Ö®¼Ê£¬£¬£¬ËûÃÇ¸ÕÆÊÎöÁËRoundcubeÖеÄÒ»¸öRCEÎó²î²¢ÒÔΪ¸ÃÎó²îÔÚ¹¥»÷Öб»Æð¾¢Ê¹Ó㬣¬£¬´ÙʹCock.liÓÚ2025Äê6Ô½«¸ÃÈí¼þ´ÓÆäƽ̨ÉÏÒÆ³ý£¬£¬£¬²¢ÌåÏÖ½«²»ÔÙÌṩRoundcubeÍøÂçÓʼþ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hacker-steals-1-million-cockli-user-records-in-webmail-data-breach/


5. ºÚ¿ÍʹÓÃLangflowÑÏÖØÎó²îÊÍ·ÅFlodrix½©Ê¬ÍøÂç


6ÔÂ17ÈÕ£¬£¬£¬¹¥»÷ÕßÕýÆð¾¢Ê¹ÓûùÓÚPythonµÄWebÓ¦ÓóÌÐòLangflowÖеÄÒ»¸öÑÏÖØÈ±ÏÝ£¨CVE-2025-3248£©·¢¶¯¹¥»÷£¬£¬£¬¸ÃȱÏݱ£´æÓÚLangflow 1.3.0֮ǰµÄ°æ±¾ÖС£¡£¡£¡£LangflowÊÇÊðÀíAIÁìÓòÆÕ±é½ÓÄɵŤ¾ß£¬£¬£¬ÔÊÐíÓû§¹¹½¨AIÇý¶¯µÄÊðÀíºÍÊÂÇéÁ÷£¬£¬£¬¶ø´ËÎó²îÊÇÒ»¸öÒ×ÓÚʹÓõÄÉí·ÝÑéÖ¤Îó²î£¬£¬£¬±£´æÓÚÆ½Ì¨µÄ´úÂëÑéÖ¤»úÖÆÖУ¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÍêÈ«½ÓÊÜLangflowЧÀÍÆ÷¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬¹¥»÷Õßͨ¹ýÏò/api/v1/validate/code¶Ëµã·¢ËͶñÒâPOSTÇëÇóÀ´Ê¹ÓôËÎó²î£¬£¬£¬ÔÚÊÜѬȾµÄЧÀÍÆ÷ÉÏÖ´ÐÐÏÂÔØÆ÷¾ç±¾£¬£¬£¬ÒÔ»ñÈ¡²¢×°ÖÃFlodrix¶ñÒâÈí¼þ£¬£¬£¬½ø¶øÊÍ·ÅǿʢµÄ½©Ê¬ÍøÂ磬£¬£¬¿ÉÄܵ¼ÖÂϵͳ±»ÈëÇÖ¡¢DDoS¹¥»÷£¬£¬£¬ÒÔ¼°Ãô¸ÐÐÅϢɥʧ»òй¶¡£¡£¡£¡£¼øÓÚLangflowÔÚGitHubÉÏÓµÓÐÁè¼Ý7Íò¿ÅÐÇ£¬£¬£¬Åú×¢ÆäÊÜ¿ª·¢ÕßÈϿɶȸߣ¬£¬£¬ÇÒÔÚÖÇÄÜ×Ô¶¯»¯Ô­ÐÍÉè¼ÆºÍ°²ÅÅ·½ÃæÊ©Õ¹Ö÷Òª×÷Ó㬣¬£¬Ò×Êܹ¥»÷µÄLangflowЧÀÍÆ÷¶Ô¹¥»÷Õß¶øÑÔÊÇ¡°¼«¾ßÎüÒýÁ¦µÄÄ¿µÄ¡±¡£¡£¡£¡£


https://www.darkreading.com/vulnerabilities-threats/hackers-exploit-langflow-flaw-flodrix-botnet


6. CISA¾¯Ê¾TP-LinkÈÈõè¾¶ÓÉÆ÷Îó²îÕý±»Æð¾¢Ê¹ÓÃ


6ÔÂ17ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¸üÐÂÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬½«TP-LinkÏÂÁî×¢ÈëÎó²îCVE-2023-33538ÄÉÈëÆäÖС£¡£¡£¡£¸ÃÎó²îÁ½ÄêǰËäÒѱ»·¢Ã÷£¬£¬£¬µ«½üÆÚ±»ÍøÂç·¸·¨·Ö×ÓÆð¾¢Ê¹Ó㬣¬£¬ÆÀ·Ö¸ß´ï8.8·Ö£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚδ¾­ÊÚȨµÄÇéÐÎÏÂÔÚ·ÓÉÆ÷ÉÏÖ´ÐÐÏÂÁ£¬£¬×é³ÉÖØ´óΣº¦¡£¡£¡£¡£ÊÜÓ°ÏìµÄTP-Link·ÓÉÆ÷ÐͺŰüÀ¨TL-WR940N V2/V4¡¢TL-WR841N V8/V10ÒÔ¼°TL-WR740N V1/V2µÈ£¬£¬£¬ÕâЩ·ÓÉÆ÷ÔÚÏûºÄÊг¡ÉϹãÊܽӴý£¬£¬£¬²¿·ÖÐͺÅÔÚÑÇÂíÑ·ÉÏÓµÓÐÊýÍòÌõ̸ÂÛ¡£¡£¡£¡£È»¶ø£¬£¬£¬ÕâЩÊÜÓ°ÏìµÄÓ²¼þ°æ±¾ÒѵִïʹÓÃÊÙÃü£¬£¬£¬²»ÔÙÎüÊÕÇå¾²¸üУ¬£¬£¬ÇÒ×îй̼þ°æ±¾Ðû²¼Ê±¼ä¾ÃÔ¶£¬£¬£¬ÈçTL-WR940N V2/V4µÄ×îй̼þ°æ±¾ÓÚ2016ÄêÐû²¼£¬£¬£¬TL-WR841N V8/V10µÄ×îºóÒ»´Î¹Ì¼þ¸üÐÂÔòÊÇÔÚ2015Äê¡£¡£¡£¡£CISAÖÒÑԳƣ¬£¬£¬ÕâЩ·ÓÉÆ÷±£´æÑÏÖØÇå¾²Òþ»¼£¬£¬£¬Óû§Ó¦×èֹʹÓᣡ£¡£¡£¸ÃÎó²î±£´æÓÚ·ÓÉÆ÷µÄWebÖÎÀí½çÃæÖУ¬£¬£¬ÒòÎÞ·¨×¼È·ÑéÖ¤Óû§ÊäÈ룬£¬£¬ºÚ¿ÍµÃÒÔ×¢Èë¶ñÒâÏÂÁî¡£¡£¡£¡£ËäÈ»¾ßÓÐÔ¶³Ì»á¼û¹¦Ð§µÄ¹ûÕæÂ·ÓÉÆ÷ÉÏ´ËÀàȱÏÝ×îΪΣÏÕ£¬£¬£¬µ«¹¥»÷ÕßÒ²¿É´ÓͳһÍâµØÍøÂçÄÚʹÓᣡ£¡£¡£Îª´Ë£¬£¬£¬CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê7ÔÂ7ÈÕÇ°ÒÆ³ýÕâЩ·ÓÉÆ÷£¬£¬£¬²¢±Þ²ßËùÓÐ×é֯Ч·Â£¬£¬£¬ÒÔÈ·±£ÍøÂçÇå¾²¡£¡£¡£¡£


https://cybernews.com/security/hackers-exploit-older-tp-link-routers-cisa-warns/