SogoTradeÔ±¹¤Îó´¥¶ñÒâÁ´½ÓÖÂÊýÍòÓû§ÐÅϢй¶

°ä²¼¹¦·ò 2025-05-14

1. SogoTradeÔ±¹¤Îó´¥¶ñÒâÁ´½ÓÖÂÊýÍòÓû§ÐÅϢй¶


5ÔÂ9ÈÕ£¬ÃÀ¹úÔÚÏ߹ɯ±¾­¼Í¹«Ë¾SogoTradeÒòÔ±¹¤µã»÷¶ñÒâÁ´½Ó£¬µ¼ÖÂÊýÍòÈËÓ×ÎÒÐÅϢ¶³ö£¬Õâ´ÎÊÂÎñ͹ÏÔÁË·À±¸ÍøÂç´¹µöµÄ±ØÒªÐÔ¡£½ñÄêÔçЩʱ³½£¬SogoTradeÔâ·êÁËÒ»´ÎµäÐ͵ÄÍøÂç´¹µö¹¥»÷£¬Ëĸöµç×ÓÓʼþÕË»§±»µÁ£¬¹¥»÷Õßͨ¹ýµç×ÓÓʼþ³É¹¦´«²¼¶ñÒâÈí¼þ¡£ÔÚ»ñÈ¡ÊÜϰȾÕË»§ºó£¬¹¥»÷Õß¿ÉÄÜÇÔÈ¡Á˽ü4.9ÍòÃûÓû§µÄÊý¾Ý¡£¸Ã¹«Ë¾Ìá½»¸øÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒµÄÐÅÏ¢ÏÔʾ£¬Õâ´ÎÈëÇÖÊÂÎñ²¢·ÇÒ»´ÎÐÔ£¬¶øÊdzÖÐøÁË2024Äê5ÔÂ8ÈÕÖÁ5ÔÂ22ÈÕ£¬SogoTradeÔÚ½ñÄê3Ôµײŷ¢ÏÖÕâ´Î¹¥»÷¡£±»Ð¹Â¶µÄÓ×ÎÒÐÅÏ¢Ô̺¬Ãû×Ö¡¢ÐÕÊÏ¡¢²ÆÕþÕË»§ºÅÂë¡¢Éç»á°²È«ºÅÂëÒÔ¼°Ë°ºÅµÈÃô¸ÐÊý¾Ý¡£¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩй¶µÄÐÅÏ¢½øÐÐÉí·Ý͵ÇÔ¡¢¿ªÉèڲƭÐÔÕË»§ÒÔ»ñÈ¡´û¿îµÈ¶ñÒâÐÐΪ£¬¸øÓû§´øÀ´ÑϳÁ·çÏÕ¡£SogoTrade¶ÔÕâ´ÎÊÂÎñÉî¸ÐÒź¶£¬²¢ÔÚµÃÖªÊý¾Ý°²È«ÊÂÎñºó£¬µ±¼´Éó²éÁËÆäÍøÂç´¹µö´¦ÖÃÁ÷³Ì£¬²¢¼ÓÇ¿Á˰²È«ÒâʶÅàѵ¡£ÎªÌí²¹Óû§Ëðʧ£¬¸Ã¹«Ë¾°µÊ¾½«ÎªÊÜÓ°ÏìµÄÓ×ÎÒÌṩÃâ·ÑµÄÉí·Ý¼à¿Ø·þÎñ¡£È»¶ø£¬ÊÜÓ°ÏìµÄÓ×ÎÒÈÔÐèά³Ö¸ß¶È¾¯Ì裬¶¨ÆÚ²é¿´ÕË»§Õ˵¥ºÍÐÅÓþ»ã±¨£¬ÒÔʵʱ·¢ÏÖ²¢Ó¦¶ÔDZÔÚµÄÉí·Ý͵ÇÔ·çÏÕ¡£


https://cybernews.com/privacy/sogotrade-phishing-attack-customer-data-breach/


2. ³¯ÏÊKonni APTÀûÓöñÒâÈí¼þ¹¥»÷ÎÚ¿ËÀ¼


5ÔÂ13ÈÕ£¬½üÆÚ£¬Ó볯ÏÊÓйصÄÍþв×éÖ¯Konni APT±»Ö¸ÓëÕë¶ÔÎÚ¿ËÀ¼µ±¾Ö»ú¹¹µÄ´¹µö»î¶¯ÓйØ£¬Æä¹¥»÷Ö¸±êÀ©´óÖÁ¶íÂÞ˹ÒÔ±íµØÓò¡£ÆóÒµ°²È«¹«Ë¾Proofpoint³Æ£¬Õâ´Î»î¶¯Ö¼ÔÚÍøÂç¡°¶íÂÞ˹ÈëÇֹ켣¡±µý±¨¡£°²È«×êÑÐÈËÔ±Ö¸³ö£¬¸Ã×éÖ¯¶ÔÎÚ¿ËÀ¼µÄ¹Ø×¢Ò»Á¬ÁËÆäÕë¶Ô¶íÂÞ˹µ±¾Ö»ú¹¹½øÐÐÕ½Êõµý±¨ÍøÂçµÄº¹Çàģʽ¡£Konni APTÊÇÒ»¸ö³Ö¾ÃÕë¶Ôº«¹ú¡¢ÃÀ¹úºÍ¶íÂÞ˹ʵÌåµÄÍøÂç¼äµý×éÖ¯£¬»î¶¯ÖÁÉÙ¿É×·ÒäÖÁ2014Ä꣬ͨ³£Í¨¹ý´¹µöÓʼþ·Ö·¢¶ñÒâÈí¼þ¡£ÍøÂ簲ȫ¹«Ë¾¼Í¼µÄ×îй¥»÷ÖУ¬¹¥»÷ÕßʹÓüÙ×°³ÉÐé¹¹ÖÇ¿âµÄ´¹µöÓʼþ£¬Óʼþº¬ÍйÜÔÚMEGAÔÆ·þÎñµÄÃÜÂë±£»¤RARѹËõ°üÁ´½Ó£¬´ò¿ªºó»áÆô¶¯Ï°È¾Á´£¬CHMÎļþÏÔʾµö¶üÄÚÈÝ£¬Êܺ¦Õßµã»÷ºó½«ÏÂÔØµÚ¶þ½×¶ÎÔØºÉ£¬ÐÂÆô¶¯µÄPowerShell¾ç±¾¿ÉÍøÂçϵͳÐÅÏ¢¡£´Ë±í£¬»¹Óд¹µöÓʼþÖ±½Ó¸½¼ÓHTMLÎļþµÄÇé¿ö£¬ÓÕµ¼Êܺ¦ÕßÏÂÔØÔ̺¬Á¼ÐÔPDFºÍLNKÎļþµÄZIPѹËõ°ü£¬Ö´ÐÐLNKÎļþ»áÔËÐжñÒâ¾ç±¾¡£Õâ´ÎÅû¶ÕýÖµKonni¼¯Íű»Ö¸²Î¼ÓÕë¶Ôº«¹úʵÌåµÄ¸´ÔÓ¶ñÒâÈí¼þ»î¶¯¡£


https://thehackernews.com/2025/05/north-korean-konni-apt-targets-ukraine.html


3. SAP°ä²¼²¹¶¡Ó¦¶ÔNetWeaverÁãÈÕ¹¥»÷зì϶


5ÔÂ13ÈÕ£¬SAPÒѰ䲼²¹¶¡ÒÔ½â¾ö½üÆÚÕë¶ÔSAP NetWeaver·þÎñÆ÷µÄÁãÈÕ¹¥»÷ÖÐÀûÓõĵڶþ¸ö·ì϶CVE-2025-42999¡£¸Ã·ì϶ÊÇSAPÔÚµ÷²éÉæ¼°SAP NetWeaver Visual ComposerÖÐÁíÒ»¸öδ¾­Éí·ÝÑéÖ¤µÄÎļþÉÏ´«·ì϶CVE-2025-31324µÄÁãÈÕ¹¥»÷ʱ·¢Ïֵģ¬ºóÕßÒÑÓÚ4Ô·ݽ¨¸´¡£SAP½²»°È˰µÊ¾ÒÑÒâʶµ½·ì϶²¢×ÅÊÖ½â¾ö£¬ÒªÇóʹÓÃSAP NETWEAVERµÄ¿Í»§×°Öò¹¶¡±£»¤×ÔÉí£¬°²È«×¢Ã÷¿ÉÔÚÖ¸¶¨µØÎ»ÕÒµ½¡£ReliaQuestÓÚ4Ô³õ´Î¼ì²âµ½ÀûÓÃCVE-2025-31324µÄÁãÈÕ¹¥»÷£¬ÍþвÐÐΪÕßͨ¹ý¸Ã·ì϶ÈëÇÖ¿Í»§ÏµÍ³ºóÉÏ´«JSP Web ShellºÍBrute Ratelºì¶Ó¹¤¾ß¡£ÍøÂ簲ȫ¹«Ë¾watchTowrºÍOnapsisҲ֤ʵÁ˶ñÒâ»î¶¯£¬¹Û²ìµ½¹¥»÷ÕßÔÚ佨²¹Ê·ýÉÏÉÏ´«Web ShellºóÃÅ¡£OnypheÊ×ϯ¼¼Êõ¹Ù³ÆÔ¼20¼Ò²Æ¸»/È«Çò500Ç¿¹«Ë¾´æÔÚ·ì϶£¬ºÜ¶àÒÑÊܹ¥»÷£¬ÆäÊ±ÍøÉ϶³öµÄ·ì϶Ê·ýÓÐ1284¸ö£¬474¸öÒÑÊܹ¥»÷¡£Shadowserver»ù½ð»áÔÚ×·×Ù³¬2040̨Ò×Êܹ¥»÷µÄSAP Netweaver·þÎñÆ÷¡£¹ÌÈ»SAPÉÐδȷÈÏCVE-2025-42999ÊÇ·ñÒѱ»ÀûÓ㬵«OnapsisÊ×ϯ¼¼Êõ¹Ù°µÊ¾ÍþвÐÐΪÕß×Ô1Ô·ÝÒÔÀ´¾ÍÒ»ÏòÔÚÀûÓÃÕâÁ½¸ö·ì϶£¬ÕâÖÖ×éºÏ¹¥»÷ÔÊÐíÔ¶³ÌÖ´ÐÐËÁÒâºÅÁÎÞÐèϵͳȨÏÞ¡£


https://www.bleepingcomputer.com/news/security/sap-patches-second-zero-day-flaw-exploited-in-recent-attacks/


4. PrepHeroÊý¾Ý¿âй¶300ÍòѧÉúºÍ¶ÍÁ·Êý¾Ý


5ÔÂ13ÈÕ£¬´óѧÕÐÉúƽ̨PrepHeroÆØ³ö³Á´ó°²È«·ì϶£¬³¬Èý°ÙÍòÌõδ¼ÓÃܼͼÔâй¶£¬É漰ѧÉúÑÄ´øÍ·¼°Æä¶ÍÁ·Ãô¸ÐÐÅÏ¢¡£¸ÃÊý¾Ý¿âÓÉÖ¥¼Ó¸ç¹«Ë¾PrepHero£¨ÓÉEXACT SportsÔËÓª£©ËùÓУ¬ÓÃÓÚÔ®ÊÖ¸ßÖÐ»î´øÍ·´´½¨ÕÐļµµ°¸²¢Óë´óѧ¶ÍÁ·¹µÍ¨¡£ÍøÂ簲ȫ×êÑÐÔ±Jeremiah FowlerÓÚ2025Äê5ÔÂ12ÈÕ·¢ÏÖ²¢»ã±¨ÁËÕâÒ»·ì϶£¬Êý¾Ý¿âÔ̺¬315ÍòÓà±Ê¼Í¼£¬×ܼÆÔ¼135GB£¬È´Î´Ñ¡È¡ÃÜÂë»ò¼ÓÃÜ´ëÊ©±£»¤¡£Ð¹Â¶ÐÅÏ¢º­¸ÇѧÉúÑÄ´øÍ·µÄÐÕÃû¡¢µç»°¡¢ÓÊÏä¡¢¼Òͥסַ¡¢»¤ÕÕÐÅÏ¢£¬ÒÔ¼°¼Ò³¤ºÍ¶ÍÁ·ÁªÏµ·½Ê½£¬ÉõÖÁÔ̺¬Ñ§ÉúÑÄ´øÍ·»¤ÕÕͼÏñÁ´½ÓµÄδÊܱ£»¤Îļþ¡£ÓÈΪÑϳÁµÄÊÇ£¬Êý¾Ý¿âÖÓ×°Óʼþ»º´æ¡±Îļþ¼Ð±£ÁôÁË2017ÄêÖÁ2025ÄêµÄ10GBµç×ÓÓʼþ£¬Ô̺¬¸öÐÔ»¯ÍøÒ³Á´½Ó£¬¿É¹«¿ª½Ó¼ûÓ×ÎÒÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢Ð½³êµÈ¾ßÌåÐÅÏ¢£¬²¿ÃÅÓʼþ»¹º¬Ò»Ê±ÃÜÂ룬½øÒ»²½¼Ó¾çÒþÖÔ·çÏÕ¡£´Ë±í£¬¶ÍÁ·Ô±¹àÒôÒ²±»·¢ÏÖ£¬Éæ¼°¶ÍÁ·ÐÕÃû¡¢µØµã´óѧ¼°¶ÔѧÉúÑÄ´øÍ·µÄÆÀ¹À¡£Fowler·¢ÏÖºóµ±¼´Í¨ÖªPrepHero£¬ºóÕßѸ¿ì±£»¤Êý¾Ý¿â¡£µ«Ä¿Ç°Éв»Ã÷ÏÔÊý¾Ý¿âÓÉË­Ö±ÊÕÊÜÀí£¬ÒÔ¼°Ãô¸ÐÐÅϢй¶ʱ³¤ºÍ½Ó¼ûÇé¿ö¡£


https://hackread.com/prephero-database-exposed-students-coaches-data/


5. Ó¢ÌØ¶ûCPUзì϶µ¼ÖÂÌØÈ¨ÄÚ´æÖеÄÃô¸ÐÊý¾Ýй¶


5ÔÂ13ÈÕ£¬½üÈÕ£¬ËÕÀèÊÀÁª¹úÀí¹¤Ñ§Ôº×êÑÐÈËÔ±·¢ÏÖËùÓÐÏÖ´úÓ¢ÌØ¶ûCPU´æÔÚ¡°·Ö֧ȨÏÞ×¢È롱·ì϶£¨CVE-2024-45332£©£¬¸Ã·ì϶¿ÉÈù¥»÷Õß´ÓÌØÈ¨Èí¼þÄÚ´æÇøÓòй¼ûô¸ÐÊý¾Ý¡£Í¨³£ÕâÐ©ÇøÓòÔ̺¬ÃÜÂë¡¢¼ÓÃÜÃÜÔ¿µÈ³ÁÒªÐÅÏ¢£¬±£»¤ÆäÃâÔâй©¼«Îª¹Ø¼ü¡£Ö»¹ÜSpectre v2»º½â´ëÊ©ÒÑÖ´ÐÐÁùÄ꣬µ«´Ëзì϶ͨ¹ý¡°·ÖÖ§Ô¤²âÆ÷¾ºÕùǰÌá¡±ÈÆ¹ýÁËÕâЩ´ëÊ©¡£·ÖÖ§Ô¤²âÆ÷ÓÃÓڲ²â·ÖÖ§Ö¸ÁîÁ˾ÖÒÔά³ÖCPUÁ÷Ë®ÏßÂúÔØ£¬µ«Ó¢ÌضûµÄ·ÖÖ§Ô¤²âÆ÷¸üÐÂÓëÖ¸ÁîÖ´ÐÐ·ÖÆç²½£¬µ¼Ö¸üÐÂÓâÔ½ÌØÈ¨Ììǵ£¬ÔÚȨÏÞÇл»Ê±´æÔÚ»úÓö´°¿Ú£¬Ê¹·ÇÌØÈ¨Óû§¿ÉÐ¹Â¶ÌØÈ¨¹ý³ÌÊý¾Ý¡£×êÑÐÈËÔ±¿ª·¢·ì϶£¬ÑµÁ·CPUÔ¤²âÌØ¶¨·ÖÖ§Ö¸±ê£¬Í¨¹ýϵͳŲÓýøÐд§Ä¦Ö´ÐУ¬ÀûÓòàÐÅ·²½Ö轫°ÂÃØÊý¾Ýй¶¸ø¹¥»÷Õß¡£¸Ã·ì϶ӰÏìµÚ¾Å´ú¼°ÒÔÀ´µÄËùÓÐÓ¢ÌØ¶ûCPU£¬Ô̺¬¶à¿îÈȵãÐͺÅ£¬¶øArmºÍAMDµÄоƬδ²û·¢³öÒ»ÑùÐÐΪ£¬²»Ò×Êܹ¥»÷¡£¸Ã·ì϶ËäÔÚLinuxÑݳöʾ£¬µ«´æÔÚÓÚÓ²¼þ¼¶±ð£¬ÀíÂÛÉÏWindowsÒ²¿ÉÀûÓá£×êÑÐÈËÔ±ÒÑÏòÓ¢ÌØ¶û»ã±¨£¬Ó¢Ìضû°ä²¼Î¢´úÂë¸üÐÂÒÔ»º½â´Ë·ì϶£¬¹Ì¼þ¼¶»º½â´ëÊ©´øÀ´2.7%»úÄÜ¿ªÏú£¬Èí¼þ»º½â´ëÊ©¶Ô»úÄÜÓ°ÏìÒòCPU¶øÒì¡£¶ÔÓÚͨ³£Óû§£¬·çÏսϵÍ£¬µ«ÈÔ½¨ÒéÀûÓÃ×îиüС£


https://www.bleepingcomputer.com/news/security/new-intel-cpu-flaws-leak-sensitive-data-from-privileged-memory/


6. Ó¢¹úÂêɯ°Ù»õ³Æ¿Í»§Êý¾ÝÔÚÍøÂç¹¥»÷Öб»ÇÔÈ¡


5ÔÂ13ÈÕ£¬Ó¢¹ú³ÛÃûÁãÊÛÉÌÂêɯ°Ù»õ°µÊ¾£¬Æä²¿Ãſͻ§Ó×ÎÒÐÅÏ¢ÔÚÍøÂç¹¥»÷Öб»µÁ£¬ÇÒÔÚÏßÒµÎñÒṈ̃»¾ÈýÖܶà¡£Âêɯ°Ù»õ×÷ΪӢ¹ú³ÛÃûóÒׯ·ÅÆ£¬×Ô4ÔÂ25ÈÕÆðÖÕ³¡½ÓÊÜÍøÉ϶©µ¥£¬×ÔÐÂÉú½ÚÖÜÄ©¶©µ¥³öÏÖÎÊÌâÒÔÀ´£¬¹É¼ÛÒÑ×ÅÂä15%¡£¾Ý±¨Â·£¬¸ÃÁãÊÛÉÌÒѳÉΪÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õߣ¬·¸×ï·Ö×ÓÇÖÈëÆäÍÆËã»úϵͳ½øÐмÓÃÜ£¬²¢ÒªÇ󸶿îÒÔ¸´Ô­½ÚÔì¡£Âêɯ°Ù»õ³Æ²¿ÃŹ˿ÍÐÅÏ¢±»µÁ£¬µ«Ç¿µ÷ÕâЩÊý¾Ý²»Ô̺¬¿ÉÓõĸ¶¿î»òÒøÐп¨ÐÅÏ¢£¬Ò²²»Ô̺¬ÈκÎÕË»§ÃÜÂ룬ÇÒÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»¹²Ïí¡£¹«Ë¾·î¸æ¿Í»§ÎÞÐè²ÉÈ¡Ðж¯£¬²¢°µÊ¾ÔÚÖÂÁ¦¸´Ô­Õý³£ÔËÓª£¬ÒѲÉÈ¡´ëÊ©±£»¤ÏµÍ³£¬²¢ÓëÍøÂ簲ȫר¼Ò¡¢·¨Âɲ¿Ãź͵±¾Ö»ú¹¹ºÏ×÷¡£Âêɯ°Ù»õ»Ø¾øÁ¿»¯Õâ´Î¹¥»÷´øÀ´µÄ²ÆÕþÓ°Ï죬µ«ÓÉÓÚ´íʧм¾ÏµÁÐÏúÊÛÁ¼»ú£¬ÇÒÔ¼Èý·ÖÖ®Ò»µÄ·þ×°ºÍ¼Ò¾Ó²úÆ·ÏúÊÛ¶îÀ´×ÔÏßÉÏ£¬Æä²ÆÕþÓ°ÏìÕýÈÕÒæ¼Ó³Á¡£µÂÒâÖ¾ÒøÐзÖÎöʦ¹À¼Æ£¬ÀûÈóËðʧÖÁÉÙΪ3000ÍòÓ¢°÷£¬Ã¿Öܽ»Ò×¶îԼΪ1500ÍòÓ¢°÷£¬Ö»¹ÜÍøÂç±£ÏÕ¿ÉÄܺ­¸Ç´ó²¿ÃÅÓ°Ï죬µ«±£ÏÕ¹¦·òͨ³£ÓÐÏÞ¡£Âêɯ°Ù»õÓÚ4ÔÂ21ÈÕ³õ´ÎÏòÓ¢¹ú¹ú¶ÈÍøÂ簲ȫÖÐÐÄ·¢³ö¾¯±¨£¬³Æ¹¥»÷µ¼Ö²¿ÃÅÉÌÆ·Ç·È±¡£³õ²½»ã±¨ÏÔʾ£¬¡°Scattered Spider¡±ºÚ¿Í×éÖ¯¿ÉÄÜÊÇÄ»ºóºÚÊÖ£¬µ«Ò²ÓиÅÏëÒÔΪ¡°Dragon Force¡±×éÖ¯²ÅÊÇÖ÷ı¡£


https://cybernews.com/news/marks-spencer-customer-data-leak/