ÃÀ¹úCISAÖÒÑÔMotex Lanscope¸ßΣÎó²îÔâÆð¾¢Ê¹ÓÃ

Ðû²¼Ê±¼ä 2025-10-24

1. ÃÀ¹úCISAÖÒÑÔMotex Lanscope¸ßΣÎó²îÔâÆð¾¢Ê¹ÓÃ


10ÔÂ23ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÖÜÈý½«Ó°ÏìMotex Lanscope Endpoint ManagerµÄÑÏÖØÇå¾²Îó²îCVE-2025-61932£¨CVSS v4ÆÀ·Ö9.3£©ÄÉÈëÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬£¬£¬²¢Ã÷È·¸ÃÎó²îÒѱ»Æð¾¢Ê¹Óᣡ£¡£¡£¸ÃÎó²îÔ´ÓÚLanscope Endpoint ManagerÍâµØ°æ±¾Öпͻ§¶Ë³ÌÐòºÍ¼ì²âÊðÀíµÄͨѶͨµÀÑéÖ¤»úÖÆÈ±ÏÝ£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý·¢ËÍÌØÖÆÊý¾Ý°üÔÚÊÜÓ°ÏìϵͳÉÏÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬×é³ÉÖØ´óÇå¾²Íþв¡£¡£¡£¡£¾ÝCISAÅû¶£¬£¬£¬£¬£¬Îó²îÓ°Ïì9.4.7.1¼°¸üÔç°æ±¾£¬£¬£¬£¬£¬Éæ¼°¶à¸öÀúÊ·°æ±¾¡£¡£¡£¡£MotexÒÑÐû²¼ÐÞ¸´²¹¶¡¡£¡£¡£¡£ÈÕ±¾Îó²î˵Ã÷£¨JVN£©ÃÅ»§ÍøÕ¾±¾Öܾ¯±¨ÏÔʾ£¬£¬£¬£¬£¬MotexÒÑÈ·ÈÏÓÐδǩ×Ö¿Í»§¡°ÊÕµ½ÒÉËÆÕë¶Ô¸ÃÎó²îµÄ¶ñÒâÊý¾Ý°ü¡±£¬£¬£¬£¬£¬Ö¤Êµ¹¥»÷Òѱ¬·¢£¬£¬£¬£¬£¬µ«Ä»ºóºÚÊÖ¼°¹¥»÷¹æÄ£ÈÔ´ý½øÒ»³ÌÐò²é¡£¡£¡£¡£CISAÇ¿µ÷£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÐèÔÚ2025Äê11ÔÂ12ÈÕǰÍê³ÉÎó²îÐÞ¸´£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£» £»£»¤ÆäÍøÂçÃâÊÜDZÔÚ¹¥»÷¡£¡£¡£¡£


https://thehackernews.com/2025/10/critical-lanscope-endpoint-manager-bug.html


2. ³¯ÏÊLazarus¡°ÃÎÏëÊÂÇéÐж¯¡±¹¥»÷Å·ÖÞÎÞÈË»úÖÆÔìÉÌ


10ÔÂ23ÈÕ£¬£¬£¬£¬£¬³¯ÏÊLazarus¼¯ÍÅÕë¶ÔÅ·ÖÞÖÐÅ·¼°¶«ÄÏÅ·µØÇøµÄÎÞÈË»úÖÆÔìÉÌÌᳫÐÂÒ»ÂÖÍøÂçÌØ¹¤¹¥»÷£¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡרÓÐÎÞÈË»úÖÆÔìÊÖÒÕ¼°Éè¼Æ¹¤ÒÕ£¬£¬£¬£¬£¬ÒÔÖ§³ÖƽÈÀÀ©´óÆäº£ÄÚÎÞÈË»úÏîÄ¿µÄÕ½ÂÔÄ¿µÄ¡£¡£¡£¡£¾ÝESETÑо¿Ö°Ô±Åû¶£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÖÁÉÙ²¨¼°Èý¼ÒÉú²ú¾üÊÂ×°±¸µÄ×éÖ¯£¬£¬£¬£¬£¬²¿·Ö×°±¸ÒÑͶÈëÎÚ¿ËÀ¼Õ½³¡¶Ô¿¹¶íÂÞ˹¡£¡£¡£¡£ESET½«´ËÂÖ¹¥»÷ÆÀ¹ÀΪ¡°ÃÎÏëÊÂÇéÐж¯¡±£¨Operation DreamJob£©µÄ×îа汾£¬£¬£¬£¬£¬¸ÃÐж¯×Ô2022ÄêÆðÒ»Á¬»îÔ¾£¬£¬£¬£¬£¬´ËǰÒÑÕë¶Ô»¯¹¤¡¢ÐÅÏ¢ÊÖÒÕ¡¢½ðÈÚЧÀ͵ȶàÐÐҵʵÑéÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¡£¹¥»÷½¹µãÔØºÉΪScoringMathTeaÔ¶³Ì»á¼ûľÂí£¨RAT£©£¬£¬£¬£¬£¬×Ô2022ÄêÊ×´ÎÔÚVirusTotal·ºÆðÒÔÀ´¹¦Ð§»ù±¾Î´±ä£¬£¬£¬£¬£¬Ö§³ÖÔ¼40¸öÏÂÁ£¬£¬£¬£¬º­¸ÇÎļþ²Ù×÷¡¢Àú³Ì¿ØÖÆ¡¢ÏµÍ³Õì̽¼°¶ñÒâÔØºÉÏÂÔØµÈ½»»¥Ê½¿ØÖÆÄÜÁ¦¡£¡£¡£¡£ÊÖÒÕÊֶη½Ã棬£¬£¬£¬£¬¹¥»÷ÕßÑÓÐø¡°ÊÂÇéÓÕ¶ü¡±Õ½ÂÔ£¬£¬£¬£¬£¬Í¨¹ýαÔìÇóÖ°ÎļþÓÕÆ­Êܺ¦Õß×°ÖöñÒâÈí¼þ£¬£¬£¬£¬£¬²¢Ê¹ÓÃGitHubÉϱ»ÈëÇֵĿªÔ´ÏîÄ¿£¨ÈçNotepad++¡¢WinMerge²å¼þ£©ÐÞ¸ÄÍâµØ´úÂ룬£¬£¬£¬£¬°²ÅÅÒþ²ØÐÔ¸ü¸ßµÄ¶ñÒâ³ÌÐòÒÔÈÆ¹ý¼ì²â¡£¡£¡£¡£


https://www.darkreading.com/cyberattacks-data-breaches/lazarus-group-hunts-european-drone-manufacturing-data


3. Jingle ThiefºÚ¿ÍʹÓÃÔÆ»ù´¡ÉèÊ©ÇÔÈ¡Êý°ÙÍòÀñÎ│


10ÔÂ23ÈÕ£¬£¬£¬£¬£¬Palo Alto Networks Unit 42¿ËÈÕ½ÒÆÆÃûΪ"Jingle Thief"µÄÍøÂç·¸·¨¼¯ÍÅ£¬£¬£¬£¬£¬¸Ã×éÖ¯×Ô2021Äêµ×ÆðÒ»Á¬Õë¶ÔÁãÊÛ¼°ÏûºÄÕßЧÀÍÐÐÒµµÄÔÆÇéÐÎʵÑéÀñÎ│ڲƭ¡£¡£¡£¡£Ñо¿Ö°Ô±Stav SettyºÍShachar RoitmanÖ¸³ö£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý´¹ÂÚÓʼþ¡¢¶ÌÐÅ´¹ÂÚ¼°¶¨ÖÆ»¯´¹ÂÚÒ³ÃæÇÔÈ¡Microsoft 365ƾ֤£¬£¬£¬£¬£¬ÈëÇÖÀñÎ│¿¯Ðлú¹¹ºó£¬£¬£¬£¬£¬Í¨¹ýºáÏòÒÆ¶¯»ñÈ¡¿¯ÐÐϵͳ»á¼ûȨÏÞ£¬£¬£¬£¬£¬×îÖÕÔÚ»ÒÉ«Êг¡×ªÊÛδ¾­ÊÚȨµÄ¸ß¼ÛÖµÀñÎ│IJÀû¡£¡£¡£¡£¸Ã¼¯ÍÅÉÆÓÚºã¾ÃפÁôÊܺ¦ÏµÍ³£¬£¬£¬£¬£¬²¿·Ö°¸ÀýÏÔʾÆäDZÔÚÆÚ³¬10¸öÔ£¬£¬£¬£¬£¬Ê±´úͨ¹ýÕìÌ½ÔÆÇéÐΡ¢»á¼ûSharePoint/OneDrive»ñȡӪҵÔËÓª¡¢²ÆÎñÁ÷³Ì¼°ÀñÎ│¿¯ÐÐÊÂÇéÁ÷µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£Îª¹æ±Ü¼ì²â£¬£¬£¬£¬£¬¹¥»÷Õß½ÓÄÉÉí·ÝÀÄÓÃÕ½ÂÔ¶ø·Ç°²ÅÅ×Ô½ç˵¶ñÒâÈí¼þ£ºÀýÈ罨ÉèÊÕ¼þÏ乿Ôò×Ô¶¯×ª·¢ÓʼþÖÁ¹¥»÷Õß¿ØÖƵص㣬£¬£¬£¬£¬×¢²á¶ñÒâÉí·ÝÑéÖ¤Æ÷ÈÆ¹ý¶àÒòËØÈÏÖ¤£¨MFA£©£¬£¬£¬£¬£¬ÉõÖÁ½«×°±¸×¢²áÖÁEntra IDÒÔά³Ö³¤ÆÚ»á¼û¡£¡£¡£¡£Unit 42×·×ٸûΪCL-CRI-1032£¬£¬£¬£¬£¬²¢ÖеÈˮƽ¹éÒòÓÚĦÂå¸ç¾­¼Ã·¸·¨ÍÅ»ïAtlas Lion/Storm-0539¡£¡£¡£¡£


https://thehackernews.com/2025/10/jingle-thief-hackers-exploit-cloud.html


4. ÀÕË÷Èí¼þMedusaй¶¿µ¿¨Ë¹ÌØ834 GBÊý¾Ý


10ÔÂ23ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬MedusaÀÕË÷Èí¼þ×éÖ¯¹ûÕæÐ¹Â¶ÁË´ÓÈ«ÇòýÌå¿Æ¼¼¾ÞÍ·¿µ¿¨Ë¹Ìع«Ë¾ÇÔÈ¡µÄ186.36GBѹËõÊý¾Ý£¬£¬£¬£¬£¬²¢Éù³ÆÔ­Ê¼Êý¾Ý×ÜÁ¿´ï834GB¡£¡£¡£¡£¸Ã×éÖ¯´ËǰÓÚ9ÔÂÏÂÑ®ÈëÇÖ¿µ¿¨Ë¹ÌØ£¬£¬£¬£¬£¬×î³õÒªÇóDZÔÚÂò¼ÒÖ§¸¶120ÍòÃÀÔªÏÂÔØÊý¾Ý£¬£¬£¬£¬£¬ÕâÒ»½ð¶îÓëÆäÏò¿µ¿¨Ë¹ÌØË÷ÒªµÄ¡°É¾³ýÊý¾Ý¡±ÓöÈÒ»Ö¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý±»²ð·ÖΪ47¸öÎļþ£¨45¸ö4GBÎļþ¡¢1¸ö2GBÎļþ¼°1¸ö2GBÎļþ£©£¬£¬£¬£¬£¬ÎļþÃû¾ùΪ"Comcast_FS"¡£¡£¡£¡£Êý¾Ý°üÀ¨Esur_rerating_verification.xlsx¡¢Claim Data Specifications.xlsmµÈExcelÎļþ£¬£¬£¬£¬£¬ÒÔ¼°Éæ¼°Æû³µ±£·ÑÓ°ÏìÆÊÎöµÄPythonºÍSQL¾ç±¾¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬¿µ¿¨Ë¹ÌØÎ´¶Ô´ËÊÂ×÷³öÈκλØÓ¦¡£¡£¡£¡£Medusa×éÖ¯ÒÔ¹¥»÷´óÐÍÆóÒµÖøÃû¡£¡£¡£¡£±¾Ô£¬£¬£¬£¬£¬Î¢ÈíÐû²¼Ç徲ͨ¸æÖÒÑÔ£¬£¬£¬£¬£¬MedusaÕýʹÓÃGoAnywhere MFTÎó²î£¨CVE-2025-10035£¬£¬£¬£¬£¬CVSSÆÀ·Ö10.0£©ÊµÑéδ¾­ÈÏÖ¤µÄÔ¶³Ì´úÂëÖ´Ðй¥»÷¡£¡£¡£¡£


https://hackread.com/medusa-ransomware-comcast-data-leak/


5. ¼ÓÄôóÍæ¾ß·´¶·³ÇÔâÓö¿Í»§Êý¾Ýй¶ÊÂÎñ


10ÔÂ23ÈÕ£¬£¬£¬£¬£¬¼ÓÄôóÍæ¾ß·´¶·³ÇÏò¿Í»§·¢³öÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬Åû¶Æä¿Í»§Êý¾Ý¿âÔâδ¾­ÊÚȨµÄµÚÈý·½ÇÔÈ¡²¢Ð¹Â¶²¿·Ö¼Í¼¡£¡£¡£¡£ÊÂÎñÒòÓÉÓÚÍþвÐÐΪÕßÓÚ7ÔÂ30ÈÕÔÚ°µÍøÐû²¼Éù³ÆÇÔÈ¡×Ըù«Ë¾ÏµÍ³µÄ¿Í»§Êý¾Ý£¬£¬£¬£¬£¬¹«Ë¾Í¨¹ýδË÷Òý»¥ÁªÍøÌû×Ó»ñÖªºó£¬£¬£¬£¬£¬Á¬Ã¦ÁªºÏµÚÈý·½ÍøÂçÇ徲ר¼ÒÕö¿ªÊӲ죬£¬£¬£¬£¬×îÖÕ֤ʵÊý¾ÝÕæÊµÐÔ¡£¡£¡£¡£¾Ý¹«Ë¾Åû¶£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ýº­¸ÇÐÕÃû¡¢ÏÖʵµØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬µ«Ã÷ȷɨ³ýÕË»§ÃÜÂë¡¢ÐÅÓÿ¨ÐÅÏ¢¼°ÆäËû¡°ÀàËÆÉñÃØÊý¾Ý¡±¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£Éæ¼°¼ÓÄôóÍæ¾ß·´¶·³ÇÌìÏÂ40¼ÒÃŵêµÄ¿Í»§ÈºÌ壬£¬£¬£¬£¬ÏêϸÊÜÓ°ÏìÈËÊýÉÐδ¹ûÕæ¡£¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬£¬£¬Ð¹Â¶Êý¾ÝÀàÐÍÒò¿Í»§¶øÒ죬£¬£¬£¬£¬¿ÉÄܰüÀ¨ÉÏÊöÐÅÏ¢ÖеÄÒ»Ïî»ò¶àÏî×éºÏ¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬¼ÓÄôóÍæ¾ß·´¶·³ÇÔÚר¼ÒÖ¸µ¼ÏÂÉý¼¶ITϵͳÇå¾²ÐÔ£¬£¬£¬£¬£¬²¢×Ô¶¯Ïò¼ÓÄôóÒþ˽î¿Ïµ»ú¹¹×ª´ïÇéÐΡ£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬¹«Ë¾Ïò¿Í»§·¢³ö¾¯Ê¾£¬£¬£¬£¬£¬½¨ÒéºöÂÔδ¾­ÇëÇóµÄͨѶ£¬£¬£¬£¬£¬Ð¡ÐÄð³äÆ·ÅÆ¾ÙÐÐСÎÒ˽¼ÒÐÅÏ¢Ë÷È¡µÄÍøÂç´¹ÂÚÐÐΪ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/toys-r-us-canada-warns-customers-info-leaked-in-data-breach/


6. ¡°Shadow Escape¡±¹¥»÷£ºAIÖúÊÖÁãµã»÷ÇÔÈ¡Ãô¸ÐÊý¾Ý


10ÔÂ23ÈÕ£¬£¬£¬£¬£¬Ñо¿¹«Ë¾Operant AIÐû²¼±¨¸æÕ¹ÏÖÁËÒ»ÖÖÃûΪ¡°Shadow Escape¡±µÄÐÂÐÍÇ徲Σº¦£¬£¬£¬£¬£¬¸ÃÊÖÒÕ¿ÉÎÞÉùÎÞÏ¢µØ´ÓÆóҵʹÓõÄAIÖúÊÖÖÐÇÔÈ¡´ó×ÚÃô¸ÐÐÅÏ¢¡£¡£¡£¡£ÕâÖÖ¹¥»÷ʹÓÃÄ£×ÓÉÏÏÂÎÄЭÒ飨MCP£©µÄÊÖÒÕ±ê×¼£¬£¬£¬£¬£¬Æóҵͨ¹ýMCP½«ChatGPT¡¢ClaudeµÈ´óÐÍÓïÑÔÄ£×Ó£¨LLM£©ÅþÁ¬ÖÁÄÚ²¿Êý¾Ý¿âºÍ¹¤¾ßʱ±¬·¢µÄÎó²î£¬£¬£¬£¬£¬ÎÞÐèÓû§µã»÷´¹ÂÚÁ´½Ó»ò×Ô¶¯²Ù×÷¼´¿ÉʵÑé¡£¡£¡£¡£¹¥»÷½¹µãÔÚÓÚ¡°Áãµã»÷¡±ÌØÕ÷£º¶ñÒâÖ¸Áî¿ÉÒþ²ØÔÚ¿´ËÆÎÞº¦µÄÎĵµÖУ¬£¬£¬£¬£¬ÈçÔ±¹¤ÊÖ²á»òÏÂÔØµÄPDFÎļþ¡£¡£¡£¡£µ±Ô±¹¤½«ÕâЩÎļþÉÏ´«ÖÁÊÂÇéAIÖúÊÖʱ£¬£¬£¬£¬£¬Òþ²ØÖ¸Áî»áָʾAI×Ô¶¯ÍøÂç²¢ÉñÃØ·¢ËͿͻ§µÄ˽ÈËÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨Éç»áÇå¾²ºÅÂë¡¢Ò½ÁƼͼ¡¢²ÆÎñÏêÇéµÈ¡£¡£¡£¡£Óë¹Å°å¹¥»÷ÒÀÀµ´¹ÂÚÓʼþ²î±ð£¬£¬£¬£¬£¬Shadow Escapeͨ¹ý±ê×¼MCPÉèÖúÍĬÈÏȨÏÞ¼´¿ÉÇáËÉʵÑ飬£¬£¬£¬£¬Ñо¿Ö°Ô±ÖÒÑÔÆä¿ÉÄܵ¼Ö¡°ÊýÍòÒÚÌõ˽È˼ͼй¶ÖÁ°µÍø¡±¡£¡£¡£¡£ÎÊÌâÒªº¦ÔÚÓÚMCP¸¶ÓëAIÖúÊÖ¡°Ø¨¹ÅδÓеÄ×é֯ϵͳ»á¼ûȨÏÞ¡±£¬£¬£¬£¬£¬ÈκÎʹÓÃMCPÅþÁ¬Êý¾Ý¿â¡¢Îļþϵͳ»òAPIµÄAIÖúÊÖ¾ù¿ÉÄܳÉΪ¹¥»÷Ä¿µÄ¡£¡£¡£¡£


https://hackread.com/shadow-escape-0-click-attack-ai-assistants-risk/