ÃÀ¶à³ÇÖÒ¸æÒƶ¯ÍøÂç´¹µö¶ÌÐżÙÒâÍ£³µÎ¥¹æ·£¿îÚ¿Æ
°ä²¼¹¦·ò 2025-03-101. ÃÀ¶à³ÇÖÒ¸æÒƶ¯ÍøÂç´¹µö¶ÌÐżÙÒâÍ£³µÎ¥¹æ·£¿îÚ¿Æ
3ÔÂ9ÈÕ£¬½üÆÚ£¬ÃÀ¹ú¶à¸ö³ÇÊÐÔ̺¬°²Äɲ¨Àû˹¡¢²¨Ê¿¶Ù¡¢¸ñÁÖÍþÖΡ¢µ¤·ð¡¢µ×ÌØÂÉ¡¢ÐÝ˹¶Ù¡¢ÃܶûÎÖ»ù¡¢Ñκþ³Ç¡¢ÏÄÂåÌØ¡¢Ê¥µØÑǸ硢¾É½ðɽµÈµØ·×·×·¢³öÖҸ棬ָ³öÓÐÒÆ¶¯ÍøÂç´¹µö»î¶¯Í¨¹ý¼Ù×°³É³ÇÊÐÍ£³µÎ¥¹æ²¿ÃŵĶÌÐŽøÐÐÚ¿Æ¡£ÕâЩ¶ÌÐÅÐû³ÆÓû§ÓÐδ¸¶Í£³µ×Ê£¬²¢ÍþвÈô²»Ö§¸¶£¬Ã¿Ì콫¶î±í·£¿î35ÃÀÔª£¬Í¬Ê±ÌṩÁ´½ÓÓÕµ¼Óû§µã»÷Ö§¸¶¡£¾ÝBleepingComputer±¨Â·£¬×ÔÈ¥Äê12ÔÂÆð£¬´ËÀà¶ÌÐų±³ÖÐø²»ÐÝ£¬ÇÒ¶à¸ö³ÇÊÐÊÕµ½µÄڿƶÌÐÅѡȡÁËÒ»ÑùµÄÄ£°å¡£Ú¿ÆÕßÀûÓÃGoogle.comµÄÊ¢¿ª³Á¶¨ÏòÖ°ÄÜ£¬½«Óû§³Á¶¨ÏòÖÁ¼ÙðµÄ³ÇÊд¹µöÍøÕ¾£¬ÈçŦԼÊеÄnycparkclient[.]com¡£Ö»¹ÜÆ»¹ûÒÑÍÆ³ö°²È«Ö°ÄܽûÓÃÀ´×Ôδ֪·¢¼þÈ˺ͿÉÒÉÓòÃûµÄ¶ÌÐÅÁ´½Ó£¬µ«ÓÉÓÚGoogle.comÊÇÊÜÐÅÀµÓòÃû£¬ÕâÒ»·ì϶ʹµÃÚ¿ÆÕ߸üÒ×µÃÊÖ¡£Óû§µã»÷Á´½Óºó»á±»Êèµ¼ÖÁ¼ÙðµÄ¡°Å¦Ô¼ÊвÆÕþ²¿£ºÍ£³µºÍÉãÏñÍ·Î¥¹æÐÐΪ¡±ÍøÕ¾£¬ÒªÇóÊäÈëÓ×ÎÒÐÅÏ¢£¬½ø¶øÃæ¶ÔÊý¾ÝÇÔÈ¡·çÏÕ£¬Ô̺¬ÐÕÃû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþ¼°ÐÅÓþ¿¨ÐÅÏ¢µÈ¡£ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ½øÒ»²½µÄÍøÂç´¹µö¹¥»÷¡¢Éí·Ý͵ÇÔ¡¢½ðÈÚڲƻò½«Êý¾ÝÏúÊÛ¸øÆäËûÍþвÐÐΪÕß¡£
https://www.bleepingcomputer.com/news/security/us-cities-warn-of-wave-of-unpaid-parking-phishing-texts/
2. NTT Com֤ʵ½ü18000¼ÒÆóÒµ¿Í»§Êý¾ÝÔâºÚ¿Í½Ó¼û
3ÔÂ7ÈÕ£¬ÈÕ±¾µçОÞÍ·NTTͨѶ£¨NTT Com£©Ö¤Êµ£¬ÔÚ2Ô·ݵÄÍøÂç¹¥»÷ÖУ¬½ü18,000¼ÒÆóÒµ¿Í»§µÄÊý¾ÝÔâµ½ºÚ¿Í½Ó¼û£¬µ«ÊÜÓ°ÏìÓ×ÎҵľßÌåÊýÁ¿Éв»Ã÷ÏÔ¡£NTT ComΪȫÇò70¸ö¹ú¶ÈµÄ³¬¹ý100,000¸öÆóÒµÌṩµç»°ºÍÍøÂç¼¼Êõ·þÎñ£¬Õâ´Îй¶µÄÊý¾ÝÔ̺¬17,891¸ö×éÖ¯µÄ¿Í»§ÐÕÃû¡¢ºÏͬºÅ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·¡¢ÏÖʵµØÖ·ºÍ·þÎñʹÓÃÐÅÏ¢¡£Ö»¹ÜNTT ComÔÚ2ÔÂ5ÈÕ·¢ÏÖÄÚ²¿ÏµÍ³±»¡°Î´¾ÊÚȨ½Ó¼û¡±ºóµ±¼´ÏÞ¶ÈÁËÊÜϰȾÉ豸µÄ½Ó¼û£¬µ«2ÔÂ15ÈÕÓÖ·¢ÏÖ¹¥»÷ÕßÒÑÈëÇÔìäÄÚ²¿ÍøÂçÖеÄÁíһ̨É豸²¢µ±¼´¶Ï¿ªÏνӡ£Ä¿Ç°£¬ºÚ¿Í¹¥»÷ÊÂÎñ±³ºóµÄÈËÎïºÍÍøÂç¹¥»÷µÄ¾ßÌåÐÔÖÊÉв»Ã÷ÏÔ£¬Ò²Ã»ÓÐÈκδóÐÍÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÕÆ¹Ü¡£½üÄêÀ´£¬µçÐÅ×éÖ¯ÒѳÉÎªÍøÂç·¸×ï·Ö×Ӻ͹ú¶ÈÖ§³ÖµÄºÚ¿ÍµÄÖØÒª¹¥»÷Ö¸±ê£¬ÍøÂç·¸×ï·Ö×Ó»¹»á¹¥»÷µçОÞÍ·´æ´¢µÄµç»°¼Í¼¿âÒÔ·¢Æð½øÒ»²½µÄÍøÂç¹¥»÷¡£
https://techcrunch.com/2025/03/07/japanese-telco-giant-ntt-com-says-hackers-accessed-details-of-almost-18000-organizations/
3. YouTubeÐéα°æÈ¨ÍþÐ²ÍÆ¹ã¶ñÒâÍÚ¿óÈí¼þ
3ÔÂ8ÈÕ£¬ÍøÂç·¸×ï·Ö×ÓÀûÓÃYouTubeƽ̨£¬Í¨¹ý·¢ËÍÐéα°æÈ¨ÉêÃ÷£¬Ð²ÆÈ´´×÷ÕßÔÚÊÓÆµÖÐÐû´«¶ñÒâÈí¼þºÍ¼ÓÃÜÇ®±Ò¿ó¹¤¡£ËûÃǶÔ×¼Á˰䲼ÓйØWindowsÊý¾Ý°üת·¢£¨WPD£©¹¤¾ß½Ì³ÌµÄ´´×÷Õߣ¬ÕâЩ¹¤¾ßÔÚ¶íÂÞ˹¹ãÊÜÓ½Ó£¬ÒòÆäÄÜÈÆ¹ý»¥ÁªÍøÉó²é¡£·¸×ï·Ö×Ó¼ÙÒ⹤¾ß°æÈ¨³ÖÓÐÕߣ¬ÏòYouTubeÌá³ö°æÈ¨Í¶Ëߣ¬²¢Íþв´´×÷ÕßÈô²»ºÏ×÷½«Ãæ¶ÔƵ··â½û¡£ºÜ¶à´´×÷ÕßÒò²»°²Ê§È¥ÆµÂ·¶øÇü·þ£¬Ôö³¤ÁËÖ¸Ïò¶ñÒâGitHub´æ´¢¿âµÄÁ´½Ó£¬ÕâЩÁ´½ÓÏÖʵÉÏÔ̺¬¼ÓÃÜÇ®±ÒÍÚ¿óÈí¼þµÄľÂí°æ±¾¡£¿¨°Í˹»ù·¢ÏÖ£¬ÓйØÊÓÆµµÄÅÔ¹Û´ÎÊý³¬¹ý40Íò´Î£¬¶ñÒâÁ´½ÓÔÚ±»É¾³ýǰÒѱ»ÏÂÔØ4Íò´Î¡£´Ë±í£¬Ò»¸öÕ¼ÓÐ34Íò¶©ÔÄÕßµÄTelegramƵ·Ҳ²Î¼ÓÁ˶ñÒâÈí¼þµÄÍÆ¹ã¡£¾Ý¿¨°Í˹»ùÒ£²â£¬¸Ã¶ñÒâÈí¼þÒÑÓ°Ïì¶íÂÞ˹2000¶àÃûÊܺ¦Õߣ¬µ«ÏÖʵÊý×Ö¿ÉÄܸü¸ß¡£¸Ã¶ñÒâÈí¼þͨ¹ýPython¼ÓÔØÆ÷Æô¶¯£¬Õë¶Ô¶íÂÞ˹IPµØÖ·Ö´ÐУ¬ÓµÓÐÌӱܷÀ²¡¶¾·ÖÎöºÍ·´É³ºÐÖ°ÄÜ£¬×îÖÕÏÂÔØSilentCryptoMinerÍÚ¿ó»ú£¬ÍÚ¾ò¶àÖÖ¼ÓÃÜÇ®±Ò¡£¸ÃÍÚ¿ó»ú¶¨ÆÚ¸üÐÂÅäÖ㬲¢Ê¹Óùý³ÌÍÚ¿Õ¼¼ÊõÌӱܼì²â¡£Ö»¹ÜÄ¿Ç°ÖØÒªÕë¶Ô¶íÂÞ˹Óû§£¬µ«´ËÀ๥»÷Õ½Êõ¿ÉÄܱ»ÓÃÓÚ¸ü¿í·ºµÄÁìÓò£¬´«²¼¸ß·çÏÕ¶ñÒâÈí¼þ¡£
https://www.bleepingcomputer.com/news/security/youtubers-extorted-via-copyright-strikes-to-spread-malware/
4. ̨±±ÂíÙÉÁôÏëÒ½ÔºÔâÍøÂç¹¥»÷ÖÂÐÅϢй¶²¢Â·Ç¸
3ÔÂ6ÈÕ£¬Ì¨±±ÂíÙÉÁôÏëÒ½Ôº½üÈվͱ¾Ô³õÔâ·êÃûΪ¡°Crazy Hunter¡±µÄÀÕË÷Èí¼þ¹¥»÷µ¼ÖµÄÐÅϢй¶ÊÂÎñÏò¹«¼Ò·Ǹ¡£¾Ý±¨Â·£¬Õâ´Î¹¥»÷µ¼Ö¸ÃÒ½Ôº500¶àÌ¨ÍÆËã»ú±ÀÀ££¬²¢Óиߴï32.5GBµÄÐÅÏ¢±»µÁ£¬ÆäÖÐÔ̺¬À´×Ǫ̂Íå¸÷µØÂíÙÉ·ÖÔºµÄ1660ÍòÃû»¼ÕßµÄÓ×ÎÒÐÅÏ¢¡£Ëæºó£¬Ò»ÃûºÚ¿ÍÔÚÍøÂçÂÛÌÓð»¯ù³ÆÕ¼ÓÐÕâ´Î¹¥»÷µÄÊý¾Ý²¢ÔÚÍøÉÏÏúÊÛ¡£Õë¶ÔÕâ´ÎÊÂÎñ£¬Ò½Ôº°µÊ¾ÒÑ×ñÑ´¹Î£ºÍ̸£¬²¢Ê¹ÓÃÎÀÉú²¿µÄÍøÂ簲ȫƽ̨Ìá½»»ã±¨¡£Í¬Ê±£¬Ò½ÔºÒ²³ÎÇåÁËÓйØÇé¿ö£¬²¢½¨Ò鹫¼ÒÌá¸ß¾¯Ì裬²»ÒªÐ§ÂÊÅúʾ´Ó×Ô¶¯È¡¿î»úȡǮ»òÔÚ¿ÉÒɵ绰ÖÐÌṩÓ×ÎÒÐÅÏ¢¡£Îª·À±¸ÀàËÆÊÂÎñÔٴβúÉú£¬Ò½Ôº½«¼ÓÇ¿ÍøÂç°²Õûϵͳ£¬²¢¶¨ÆÚ½øÐÐϵͳ²é³¡£´Ë±í£¬ÎÀÉú¸£Àû²¿×ÊѶÖÎÀí˾˾³¤ÀÕðµÊ¾£¬¹ÌÈ»±»··ÂôµÄ×ÊÁÏ¿´ËÆÒ½ÁÆ×ÊѶ£¬µ«ÊÇ·ñÀ´×ÔÂíÙÉÒ½ÔºÈÔÐèÈ·ÈÏ¡£Ëûͬʱָ³ö£¬Õû¯»ù¶½½ÌÒ½Ôº×î½üÒ²Ôâµ½ºÚ¿Í¹¥»÷£¬¹¥»÷Õß»ñµÃÁËÖÎÀíԱȨÏÞ£¬Òò¶øºôÓõ¸÷Ò½Ôº¼ÓÇ¿ÍøÂ簲ȫ´ëÊ©£¬È·±£»¼ÕßÐÅÏ¢µÄ°²È«¡£
https://www.taiwannews.com.tw/news/6053546
5. Edimax IC-7100ÉãÏñ»úÑϳÁ·ì϶Ôâ½©Ê¬ÍøÂç¹¥»÷ÀûÓÃ
3ÔÂ7ÈÕ£¬Ò»¸öÓ°ÏìEdimax IC-7100 IPÉãÏñ»úµÄÑϳÁºÅÁî×¢Èë·ì϶£¨CVE-2025-1316£©ÔÚ±»½©Ê¬ÍøÂç¶ñÒâÈí¼þÀûÓ㬵¼ÖÂÉ豸ÊÜË𡣸÷ì϶ÓÉAkamaiµÄ×êÑÐÈËÔ±·¢ÏÖ£¬²¢Òѻ㱨¸øÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©¾Ö(CISA)£¬µ«¹©¸øÉÌEdimaxδ»ØÓ¦¡£Edimax IC-7100ÊÇÒ»¿îÓÃÓÚÔ¶³Ì¼à¿ØµÄIP°²È«ÉãÏñ»ú£¬¹ÌÈ»ÒÑÍ£²ú£¬µ«ÈÔ¿ÉÄÜÔÚÈ«ÇòÁìÓòÄÚʹÓá£Ô¶³Ì¹¥»÷ÕßÄܹ»Í¨¹ý·¢ËÍÌØÔìÒªÇóÀ´»ñµÃÔ¶³Ì´úÂëÖ´ÐУ¬ÀûÓô˷ì϶·ÛËéÉ豸¡£½©Ê¬ÍøÂçͨ³£Ê¹ÓÃÕâЩÉ豸ÌáÒéÉ¢²¼Ê½»Ø¾ø·þÎñ(DDoS)¹¥»÷¡¢´úÀí¶ñÒâÁ÷Á¿»ò¹¥»÷Í³Ò»ÍøÂçÉÏµÄÆäËûÉ豸¡£CISA½¨ÒéÓû§½«ÊÜÓ°ÏìÉ豸ÏÂÏß¡¢ÖÃÓÚ·À»ðǽºóÃæ¡¢Óë¹Ø¼üÒµÎñÍøÂç¸ôÀ룬²¢ÔÚ±ØÒªÊ±Ê¹ÓÃ×îеÄVPN²úƷʵÏÖ°²È«µÄÔ¶³Ì½Ó¼û¡£ÎïÁªÍøÉ豸ÊÜËðµÄ³£¼û¼£ÏóÔ̺¬»úÄܽµÂä¡¢¹ýÈÈ¡¢É豸ÉèÖÃÒâ±í±ä¶¯ÒÔ¼°·ÇµäÐÍ/Òì³£µÄÍøÂçÁ÷Á¿¡£
https://www.bleepingcomputer.com/news/security/unpatched-edimax-ip-camera-flaw-actively-exploited-in-botnet-attacks/
6. ³¬10ÒÚÉ豸ʹÓõÄSP32΢оƬ±»ÆØº¬Î´¼Í¼¡°ºóÃÅ¡±ºÅÁî
3ÔÂ8ÈÕ£¬ÀÖöÎ(Espressif)³ö²úµÄESP32΢оƬ£¬×÷ΪȫÇòÎïÁªÍøÉ豸ÖÐÓÃÓÚWi-FiºÍÀ¶ÑÀÏνӵÄ×î¿í·ºÊ¹ÓõÄоƬ֮һ£¬Òѱ»³¬¹ý10ÒŲ́É豸ѡȡ¡£È»¶ø£¬Î÷°àÑÀTarlogic SecurityµÄ×êÑÐÈËÔ±·¢ÏÖ£¬ESP32ÖдæÔÚ29Ìõδ¼Í¼µÄºÅÁÕâЩºÅÁî¿ÉÄܱ»ÓÃ×÷¡°ºóÃÅ¡±£¬ÔÊÐí¹¥»÷Õß½øÐмÙÒâ¹¥»÷¡¢Î´¾ÊÚȨµÄÊý¾Ý½Ó¼û¡¢×ªÏòÍøÂçÉÏµÄÆäËûÉ豸£¬²¢³ÉÁ¢³Ö¾ÃÓÆ¾ÃÐÔ¡£ÕâЩºÅÁîÔ̺¬ÄÚ´æ²Ù×÷¡¢MACµØÖ·ºýŪºÍLMP/LLCPÊý¾Ý°ü×¢ÈëµÈ¡£×êÑÐÈËÔ±ÔÚÂíµÂÀïµÄRootedCONÉÏչʾÁËËûÃǵÄ×êÑгɾͣ¬²¢ÖÒ¸æ³Æ£¬ÓÉÓÚESP32µÄ¿í·ºÀûÓ㬷çÏպܴ󡣴ËÎʱêÌâǰÒÑÔÚCVE-2025-27840ϽøÐиú×Ù¡£ÀÖöÎÉÐδ¹«¿ª¼Í¼ÕâЩºÅÁÒò¶øÕâЩºÅÁî¿ÉÄÜÊDZ»ÃýÎóµØÒÅ©»òÕý±¾¾ÍÎÞ·¨½Ó¼û¡£×êÑÐÈËÔ±Ö¸³ö£¬ÕâЩºÅÁî´øÀ´µÄ·çÏÕÔ̺¬OEM¼¶´ËÍâ¶ñÒâÖ´Ðк͹©¸øÁ´¹¥»÷£¬ÓÈÆäÊǵ±¹¥»÷ÕßÒѾռÓÐÎïÀí½Ó¼ûÉ豸µÄUSB»òUART½Ó¿Úʱ¡£ÈôÊǹ¥»÷Õß¿ÉÄÜÀûÓÃÕâЩºÅÁËûÃǽ«¿ÉÄÜÆëÈ«½ÚÔìESP32оƬ£¬²¢Í¨¹ýÔÊÐíRAMºÍFlashÅú¸ÄµÄºÅÁî»ñµÃоƬµÄÓÆ¾ÃÐÔ£¬´Ó¶ø¶ÔÆäËûÉ豸ִÐÐÀ¶ÑÀ»òWi-Fi¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/


¾©¹«Íø°²±¸11010802024551ºÅ