ÃÀ¶à³ÇÖÒ¸æÒƶ¯ÍøÂç´¹µö¶ÌÐżÙÒâÍ£³µÎ¥¹æ·£¿îÚ¿Æ­

°ä²¼¹¦·ò 2025-03-10

1. ÃÀ¶à³ÇÖÒ¸æÒƶ¯ÍøÂç´¹µö¶ÌÐżÙÒâÍ£³µÎ¥¹æ·£¿îÚ¿Æ­


3ÔÂ9ÈÕ £¬½üÆÚ £¬ÃÀ¹ú¶à¸ö³ÇÊÐÔ̺¬°²Äɲ¨Àû˹¡¢²¨Ê¿¶Ù¡¢¸ñÁÖÍþÖΡ¢µ¤·ð¡¢µ×ÌØÂÉ¡¢ÐÝ˹¶Ù¡¢ÃܶûÎÖ»ù¡¢Ñκþ³Ç¡¢ÏÄÂåÌØ¡¢Ê¥µØÑǸ硢¾É½ðɽµÈµØ·×·×·¢³öÖÒ¸æ £¬Ö¸³öÓÐÒÆ¶¯ÍøÂç´¹µö»î¶¯Í¨¹ý¼Ù×°³É³ÇÊÐÍ£³µÎ¥¹æ²¿ÃŵĶÌÐŽøÐÐÚ¿Æ­¡£ÕâЩ¶ÌÐÅÐû³ÆÓû§ÓÐδ¸¶Í£³µ×Ê £¬²¢ÍþвÈô²»Ö§¸¶ £¬Ã¿Ì콫¶î±í·£¿î35ÃÀÔª £¬Í¬Ê±ÌṩÁ´½ÓÓÕµ¼Óû§µã»÷Ö§¸¶¡£¾ÝBleepingComputer±¨Â· £¬×ÔÈ¥Äê12ÔÂÆð £¬´ËÀà¶ÌÐų±³ÖÐø²»ÐÝ £¬ÇÒ¶à¸ö³ÇÊÐÊÕµ½µÄÚ¿Æ­¶ÌÐÅѡȡÁËÒ»ÑùµÄÄ£°å¡£Ú¿Æ­ÕßÀûÓÃGoogle.comµÄÊ¢¿ª³Á¶¨ÏòÖ°ÄÜ £¬½«Óû§³Á¶¨ÏòÖÁ¼ÙðµÄ³ÇÊд¹µöÍøÕ¾ £¬ÈçŦԼÊеÄnycparkclient[.]com¡£Ö»¹ÜÆ»¹ûÒÑÍÆ³ö°²È«Ö°ÄܽûÓÃÀ´×Ôδ֪·¢¼þÈ˺ͿÉÒÉÓòÃûµÄ¶ÌÐÅÁ´½Ó £¬µ«ÓÉÓÚGoogle.comÊÇÊÜÐÅÀµÓòÃû £¬ÕâÒ»·ì϶ʹµÃÚ¿Æ­Õ߸üÒ×µÃÊÖ¡£Óû§µã»÷Á´½Óºó»á±»Êèµ¼ÖÁ¼ÙðµÄ¡°Å¦Ô¼ÊвÆÕþ²¿£ºÍ£³µºÍÉãÏñÍ·Î¥¹æÐÐΪ¡±ÍøÕ¾ £¬ÒªÇóÊäÈëÓ×ÎÒÐÅÏ¢ £¬½ø¶øÃæ¶ÔÊý¾ÝÇÔÈ¡·çÏÕ £¬Ô̺¬ÐÕÃû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþ¼°ÐÅÓþ¿¨ÐÅÏ¢µÈ¡£ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ½øÒ»²½µÄÍøÂç´¹µö¹¥»÷¡¢Éí·Ý͵ÇÔ¡¢½ðÈÚڲƭ»ò½«Êý¾ÝÏúÊÛ¸øÆäËûÍþвÐÐΪÕß¡£


https://www.bleepingcomputer.com/news/security/us-cities-warn-of-wave-of-unpaid-parking-phishing-texts/


2. NTT Com֤ʵ½ü18000¼ÒÆóÒµ¿Í»§Êý¾ÝÔâºÚ¿Í½Ó¼û


3ÔÂ7ÈÕ £¬ÈÕ±¾µçОÞÍ·NTTͨѶ£¨NTT Com£©Ö¤Êµ £¬ÔÚ2Ô·ݵÄÍøÂç¹¥»÷ÖÐ £¬½ü18,000¼ÒÆóÒµ¿Í»§µÄÊý¾ÝÔâµ½ºÚ¿Í½Ó¼û £¬µ«ÊÜÓ°ÏìÓ×ÎҵľßÌåÊýÁ¿Éв»Ã÷ÏÔ¡£NTT ComΪȫÇò70¸ö¹ú¶ÈµÄ³¬¹ý100,000¸öÆóÒµÌṩµç»°ºÍÍøÂç¼¼Êõ·þÎñ £¬Õâ´Îй¶µÄÊý¾ÝÔ̺¬17,891¸ö×éÖ¯µÄ¿Í»§ÐÕÃû¡¢ºÏͬºÅ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·¡¢ÏÖʵµØÖ·ºÍ·þÎñʹÓÃÐÅÏ¢¡£Ö»¹ÜNTT ComÔÚ2ÔÂ5ÈÕ·¢ÏÖÄÚ²¿ÏµÍ³±»¡°Î´¾­ÊÚȨ½Ó¼û¡±ºóµ±¼´ÏÞ¶ÈÁËÊÜϰȾÉ豸µÄ½Ó¼û £¬µ«2ÔÂ15ÈÕÓÖ·¢ÏÖ¹¥»÷ÕßÒÑÈëÇÔìäÄÚ²¿ÍøÂçÖеÄÁíһ̨É豸²¢µ±¼´¶Ï¿ªÏνÓ¡£Ä¿Ç° £¬ºÚ¿Í¹¥»÷ÊÂÎñ±³ºóµÄÈËÎïºÍÍøÂç¹¥»÷µÄ¾ßÌåÐÔÖÊÉв»Ã÷ÏÔ £¬Ò²Ã»ÓÐÈκδóÐÍÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´ËÕÆ¹Ü¡£½üÄêÀ´ £¬µçÐÅ×éÖ¯ÒѳÉÎªÍøÂç·¸×ï·Ö×Ӻ͹ú¶ÈÖ§³ÖµÄºÚ¿ÍµÄÖØÒª¹¥»÷Ö¸±ê £¬ÍøÂç·¸×ï·Ö×Ó»¹»á¹¥»÷µçОÞÍ·´æ´¢µÄµç»°¼Í¼¿âÒÔ·¢Æð½øÒ»²½µÄÍøÂç¹¥»÷¡£


https://techcrunch.com/2025/03/07/japanese-telco-giant-ntt-com-says-hackers-accessed-details-of-almost-18000-organizations/


3. YouTubeÐéα°æÈ¨ÍþÐ²ÍÆ¹ã¶ñÒâÍÚ¿óÈí¼þ


3ÔÂ8ÈÕ £¬ÍøÂç·¸×ï·Ö×ÓÀûÓÃYouTubeƽ̨ £¬Í¨¹ý·¢ËÍÐéα°æÈ¨ÉêÃ÷ £¬Ð²ÆÈ´´×÷ÕßÔÚÊÓÆµÖÐÐû´«¶ñÒâÈí¼þºÍ¼ÓÃÜÇ®±Ò¿ó¹¤¡£ËûÃǶÔ×¼Á˰䲼ÓйØWindowsÊý¾Ý°üת·¢£¨WPD£©¹¤¾ß½Ì³ÌµÄ´´×÷Õß £¬ÕâЩ¹¤¾ßÔÚ¶íÂÞ˹¹ãÊÜÓ­½Ó £¬ÒòÆäÄÜÈÆ¹ý»¥ÁªÍøÉó²é¡£·¸×ï·Ö×Ó¼ÙÒ⹤¾ß°æÈ¨³ÖÓÐÕß £¬ÏòYouTubeÌá³ö°æÈ¨Í¶Ëß £¬²¢Íþв´´×÷ÕßÈô²»ºÏ×÷½«Ãæ¶ÔƵ··â½û¡£ºÜ¶à´´×÷ÕßÒò²»°²Ê§È¥ÆµÂ·¶øÇü·þ £¬Ôö³¤ÁËÖ¸Ïò¶ñÒâGitHub´æ´¢¿âµÄÁ´½Ó £¬ÕâЩÁ´½ÓÏÖʵÉÏÔ̺¬¼ÓÃÜÇ®±ÒÍÚ¿óÈí¼þµÄľÂí°æ±¾¡£¿¨°Í˹»ù·¢ÏÖ £¬ÓйØÊÓÆµµÄÅÔ¹Û´ÎÊý³¬¹ý40Íò´Î £¬¶ñÒâÁ´½ÓÔÚ±»É¾³ýǰÒѱ»ÏÂÔØ4Íò´Î¡£´Ë±í £¬Ò»¸öÕ¼ÓÐ34Íò¶©ÔÄÕßµÄTelegramƵ·Ҳ²Î¼ÓÁ˶ñÒâÈí¼þµÄÍÆ¹ã¡£¾Ý¿¨°Í˹»ùÒ£²â £¬¸Ã¶ñÒâÈí¼þÒÑÓ°Ïì¶íÂÞ˹2000¶àÃûÊܺ¦Õß £¬µ«ÏÖʵÊý×Ö¿ÉÄܸü¸ß¡£¸Ã¶ñÒâÈí¼þͨ¹ýPython¼ÓÔØÆ÷Æô¶¯ £¬Õë¶Ô¶íÂÞ˹IPµØÖ·Ö´ÐÐ £¬ÓµÓÐÌӱܷÀ²¡¶¾·ÖÎöºÍ·´É³ºÐÖ°ÄÜ £¬×îÖÕÏÂÔØSilentCryptoMinerÍÚ¿ó»ú £¬ÍÚ¾ò¶àÖÖ¼ÓÃÜÇ®±Ò¡£¸ÃÍÚ¿ó»ú¶¨ÆÚ¸üÐÂÅäÖà £¬²¢Ê¹Óùý³ÌÍÚ¿Õ¼¼ÊõÌӱܼì²â¡£Ö»¹ÜÄ¿Ç°ÖØÒªÕë¶Ô¶íÂÞ˹Óû§ £¬µ«´ËÀ๥»÷Õ½Êõ¿ÉÄܱ»ÓÃÓÚ¸ü¿í·ºµÄÁìÓò £¬´«²¼¸ß·çÏÕ¶ñÒâÈí¼þ¡£


https://www.bleepingcomputer.com/news/security/youtubers-extorted-via-copyright-strikes-to-spread-malware/


4. ̨±±ÂíÙÉÁôÏëÒ½ÔºÔâÍøÂç¹¥»÷ÖÂÐÅϢй¶²¢Â·Ç¸


3ÔÂ6ÈÕ £¬Ì¨±±ÂíÙÉÁôÏëÒ½Ôº½üÈվͱ¾Ô³õÔâ·êÃûΪ¡°Crazy Hunter¡±µÄÀÕË÷Èí¼þ¹¥»÷µ¼ÖµÄÐÅϢй¶ÊÂÎñÏò¹«¼Ò·Ǹ¡£¾Ý±¨Â· £¬Õâ´Î¹¥»÷µ¼Ö¸ÃÒ½Ôº500¶àÌ¨ÍÆËã»ú±ÀÀ£ £¬²¢Óиߴï32.5GBµÄÐÅÏ¢±»µÁ £¬ÆäÖÐÔ̺¬À´×Ǫ̂Íå¸÷µØÂíÙÉ·ÖÔºµÄ1660ÍòÃû»¼ÕßµÄÓ×ÎÒÐÅÏ¢¡£Ëæºó £¬Ò»ÃûºÚ¿ÍÔÚÍøÂçÂÛÌÓð»¯ù³ÆÕ¼ÓÐÕâ´Î¹¥»÷µÄÊý¾Ý²¢ÔÚÍøÉÏÏúÊÛ¡£Õë¶ÔÕâ´ÎÊÂÎñ £¬Ò½Ôº°µÊ¾ÒÑ×ñÑ­´¹Î£ºÍ̸ £¬²¢Ê¹ÓÃÎÀÉú²¿µÄÍøÂ簲ȫƽ̨Ìá½»»ã±¨¡£Í¬Ê± £¬Ò½ÔºÒ²³ÎÇåÁËÓйØÇé¿ö £¬²¢½¨Ò鹫¼ÒÌá¸ß¾¯Ìè £¬²»ÒªÐ§ÂÊÅúʾ´Ó×Ô¶¯È¡¿î»úȡǮ»òÔÚ¿ÉÒɵ绰ÖÐÌṩÓ×ÎÒÐÅÏ¢¡£Îª·À±¸ÀàËÆÊÂÎñÔٴβúÉú £¬Ò½Ôº½«¼ÓÇ¿ÍøÂç°²Õûϵͳ £¬²¢¶¨ÆÚ½øÐÐϵͳ²é³­¡£´Ë±í £¬ÎÀÉú¸£Àû²¿×ÊѶÖÎÀí˾˾³¤ÀÕðµÊ¾ £¬¹ÌÈ»±»··ÂôµÄ×ÊÁÏ¿´ËÆÒ½ÁÆ×ÊѶ £¬µ«ÊÇ·ñÀ´×ÔÂíÙÉÒ½ÔºÈÔÐèÈ·ÈÏ¡£Ëûͬʱָ³ö £¬Õû¯»ù¶½½ÌÒ½Ôº×î½üÒ²Ôâµ½ºÚ¿Í¹¥»÷ £¬¹¥»÷Õß»ñµÃÁËÖÎÀíԱȨÏÞ £¬Òò¶øºôÓõ¸÷Ò½Ôº¼ÓÇ¿ÍøÂ簲ȫ´ëÊ© £¬È·± £»¼ÕßÐÅÏ¢µÄ°²È«¡£


https://www.taiwannews.com.tw/news/6053546


5. Edimax IC-7100ÉãÏñ»úÑϳÁ·ì϶Ôâ½©Ê¬ÍøÂç¹¥»÷ÀûÓÃ


3ÔÂ7ÈÕ £¬Ò»¸öÓ°ÏìEdimax IC-7100 IPÉãÏñ»úµÄÑϳÁºÅÁî×¢Èë·ì϶£¨CVE-2025-1316£©ÔÚ±»½©Ê¬ÍøÂç¶ñÒâÈí¼þÀûÓà £¬µ¼ÖÂÉ豸ÊÜË𡣸÷ì϶ÓÉAkamaiµÄ×êÑÐÈËÔ±·¢ÏÖ £¬²¢Òѻ㱨¸øÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©¾Ö(CISA) £¬µ«¹©¸øÉÌEdimaxδ»ØÓ¦¡£Edimax IC-7100ÊÇÒ»¿îÓÃÓÚÔ¶³Ì¼à¿ØµÄIP°²È«ÉãÏñ»ú £¬¹ÌÈ»ÒÑÍ£²ú £¬µ«ÈÔ¿ÉÄÜÔÚÈ«ÇòÁìÓòÄÚʹÓá£Ô¶³Ì¹¥»÷ÕßÄܹ»Í¨¹ý·¢ËÍÌØÔìÒªÇóÀ´»ñµÃÔ¶³Ì´úÂëÖ´ÐÐ £¬ÀûÓô˷ì϶·ÛËéÉ豸¡£½©Ê¬ÍøÂçͨ³£Ê¹ÓÃÕâЩÉ豸ÌáÒéÉ¢²¼Ê½»Ø¾ø·þÎñ(DDoS)¹¥»÷¡¢´úÀí¶ñÒâÁ÷Á¿»ò¹¥»÷Í³Ò»ÍøÂçÉÏµÄÆäËûÉ豸¡£CISA½¨ÒéÓû§½«ÊÜÓ°ÏìÉ豸ÏÂÏß¡¢ÖÃÓÚ·À»ðǽºóÃæ¡¢Óë¹Ø¼üÒµÎñÍøÂç¸ôÀë £¬²¢ÔÚ±ØÒªÊ±Ê¹ÓÃ×îеÄVPN²úƷʵÏÖ°²È«µÄÔ¶³Ì½Ó¼û¡£ÎïÁªÍøÉ豸ÊÜËðµÄ³£¼û¼£ÏóÔ̺¬»úÄܽµÂä¡¢¹ýÈÈ¡¢É豸ÉèÖÃÒâ±í±ä¶¯ÒÔ¼°·ÇµäÐÍ/Òì³£µÄÍøÂçÁ÷Á¿¡£


https://www.bleepingcomputer.com/news/security/unpatched-edimax-ip-camera-flaw-actively-exploited-in-botnet-attacks/


6. ³¬10ÒÚÉ豸ʹÓõÄSP32΢оƬ±»ÆØº¬Î´¼Í¼¡°ºóÃÅ¡±ºÅÁî


3ÔÂ8ÈÕ £¬ÀÖöÎ(Espressif)³ö²úµÄESP32΢оƬ £¬×÷ΪȫÇòÎïÁªÍøÉ豸ÖÐÓÃÓÚWi-FiºÍÀ¶ÑÀÏνӵÄ×î¿í·ºÊ¹ÓõÄоƬ֮һ £¬Òѱ»³¬¹ý10ÒŲ́É豸ѡȡ¡£È»¶ø £¬Î÷°àÑÀTarlogic SecurityµÄ×êÑÐÈËÔ±·¢ÏÖ £¬ESP32ÖдæÔÚ29Ìõδ¼Í¼µÄºÅÁî £¬ÕâЩºÅÁî¿ÉÄܱ»ÓÃ×÷¡°ºóÃÅ¡± £¬ÔÊÐí¹¥»÷Õß½øÐмÙÒâ¹¥»÷¡¢Î´¾­ÊÚȨµÄÊý¾Ý½Ó¼û¡¢×ªÏòÍøÂçÉÏµÄÆäËûÉ豸 £¬²¢³ÉÁ¢³Ö¾ÃÓÆ¾ÃÐÔ¡£ÕâЩºÅÁîÔ̺¬ÄÚ´æ²Ù×÷¡¢MACµØÖ·ºýŪºÍLMP/LLCPÊý¾Ý°ü×¢ÈëµÈ¡£×êÑÐÈËÔ±ÔÚÂíµÂÀïµÄRootedCONÉÏչʾÁËËûÃǵÄ×êÑгɾÍ £¬²¢ÖÒ¸æ³Æ £¬ÓÉÓÚESP32µÄ¿í·ºÀûÓà £¬·çÏպܴó¡£´ËÎʱêÌâǰÒÑÔÚCVE-2025-27840ϽøÐиú×Ù¡£ÀÖöÎÉÐδ¹«¿ª¼Í¼ÕâЩºÅÁî £¬Òò¶øÕâЩºÅÁî¿ÉÄÜÊDZ»ÃýÎóµØÒÅ©»òÕý±¾¾ÍÎÞ·¨½Ó¼û¡£×êÑÐÈËÔ±Ö¸³ö £¬ÕâЩºÅÁî´øÀ´µÄ·çÏÕÔ̺¬OEM¼¶´ËÍâ¶ñÒâÖ´Ðк͹©¸øÁ´¹¥»÷ £¬ÓÈÆäÊǵ±¹¥»÷ÕßÒѾ­Õ¼ÓÐÎïÀí½Ó¼ûÉ豸µÄUSB»òUART½Ó¿Úʱ¡£ÈôÊǹ¥»÷Õß¿ÉÄÜÀûÓÃÕâЩºÅÁî £¬ËûÃǽ«¿ÉÄÜÆëÈ«½ÚÔìESP32оƬ £¬²¢Í¨¹ýÔÊÐíRAMºÍFlashÅú¸ÄµÄºÅÁî»ñµÃоƬµÄÓÆ¾ÃÐÔ £¬´Ó¶ø¶ÔÆäËûÉ豸ִÐÐÀ¶ÑÀ»òWi-Fi¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/