³¬70̨Exchange·þÎñÆ÷Ôâ¹¥»÷£¬Í¨¹ý¼üÅ̼ͼÆ÷ÇÔȡƾ֤

°ä²¼¹¦·ò 2025-06-27

1. ³¬70̨Exchange·þÎñÆ÷Ôâ¹¥»÷£¬Í¨¹ý¼üÅ̼ͼÆ÷ÇÔȡƾ֤


6ÔÂ24ÈÕ£¬¾ÝPositive TechnologiesµÄ×îзÖÎö»ã±¨ÏÔʾ£¬²»Ã÷¹¥»÷ÕßÕýÕë¶Ô¶³öÔÚ¹«ÍøµÄMicrosoft Exchange·þÎñÆ÷ÌáÒ鶨Ïò¹¥»÷£¬Í¨¹ýÏòµÇÂ¼Ò³Ãæ×¢Èë¶ñÒâ´úÂëÀ´ÇÔÈ¡Óû§Æ¾Ö¤¡£ÕâЩ¶ñÒâ´úÂëÒÔJavaScript±àдµÄ¼üÅ̼ͼÆ÷´ó¾Ö´æÔÚ£¬ÖØÒª·ÖΪÁ½ÖÖ±äÌ壺һÖÖÊDZ¾µØ´æ´¢ÐÍ£¬Ëü½«ÇÔÈ¡µÄƾ֤дÈë·þÎñÆ÷ÉÏ¿Éͨ¹ý»¥ÁªÍø½Ó¼ûµÄ±¾µØÎļþ£»ÁíÒ»ÖÖÊÇʵʱ±í´«ÐÍ£¬Ëü½«ÍøÂçµÄÊý¾Ýµ±¼´·¢ËÍÖÁ±í²¿·þÎñÆ÷¡£Õâ´Î¹¥»÷ÒѲ¨¼°È«Çò26¸ö¹ú¶ÈµÄ65¸ö»ú¹¹£¬ÊÇ2024Äê5Ô³õ´Î¼Í¼µÄÕë¶Ô·ÇÖÞºÍÖж«ÊµÌå¹¥»÷»î¶¯µÄÒ»Á¬¡£´Ëǰ£¬¸Ã¹«Ë¾ÒÑ·¢ÏÖÖÁÉÙ30Ãû»ú¹¹Êܺ¦Õߣ¬º­¸Çµ±¾Ö»ú¹¹¡¢ÒøÐÓ×¢IT¹«Ë¾ºÍ½ÌÓý»ú¹¹£¬³õ´ÎÈëÇÖÖ¤¾Ý¿É×·ÒäÖÁ2021Äê¡£¹¥»÷ÕßÀûÓÃMicrosoft Exchange ServerÖеÄÒÑÖª·ì϶£¬ÈçProxyShellµÈ£¬ÏòµÇÂ¼Ò³Ãæ²åÈë¼üÅ̼ͼ´úÂ룬ÒÔÖ´ÐÐÇÔÈ¡ÐÐΪ¡£ÕâЩÒѱ»±øÆ÷»¯µÄ·ì϶Ô̺¬¶à¸öÑϳÁ¼¶´ËÍⰲȫ·ì϶£¬ÈçCVE-2014-4078¡¢CVE-2020-0796ÒÔ¼°¶à¸öÓëProxyLogonºÍProxyShellÓйصķì϶¡£ÔÚÊÜϰȾµÄ·þÎñÆ÷ÖУ¬ÓÐ22̨λÓÚµ±¾Ö»ú¹¹£¬Æä´ÎÊÇIT¡¢¹¤ÒµºÍÎïÁ÷¹«Ë¾¡£


https://thehackernews.com/2025/06/hackers-target-65-microsoft-exchange.html


2. Rapid7·¢ÏÖBrotherµÈÆ·ÅÆ´òÓ¡»ú´æÔÚÑϳÁ°²È«·ì϶


6ÔÂ25ÈÕ£¬Rapid7µÄ×êÑÐÈËÔ±·¢ÏÖ£¬Brother¼°ÆäËû¶à¼Ò¹©¸øÉ̵ÄÊý°ÙÖÖ´òÓ¡»úÐͺŴæÔÚDZÔÚÑϳÁ·ì϶£¬ÕâЩ·ì϶¿ÉÄÜʹÊý°ÙÍòÆóÒµºÍ¼ÒÍ¥´òÓ¡»úÃæ¶ÔºÚ¿Í¹¥»÷µÄ·çÏÕ¡£×êÑÐÈËÔ±ÔÚBrother³ö²úµÄ¶àÖ°ÄÜ´òÓ¡»úÖз¢ÏÖÁ˰˸ö·ì϶£¬ÕâЩ·ì϶²»½öÓ°ÏìÁËBrotherµÄ689¿î´òÓ¡»ú¡¢É¨ÃèÒǺͱêÇ©»úÐͺÅ£¬»¹²¨¼°Á˸»Ê¿Ã³Ò×´´Ð¡¢Àí¹â¡¢¿ÂÄῨÃÀÄÜ´ïºÍ¶«Ö¥µÈÆ·ÅÆµÄ¹²¼Æ60Óà¿î´òÓ¡»ú¡£ÆäÖУ¬×îΪÑϳÁµÄ·ì϶±àºÅΪCVE-2024-51978£¬ÆäÑϳÁµÈ¼¶±»ÆÀ¶¨Îª¡°ÑϳÁ¡±¡£¸Ã·ì϶ÔÊÐíÔ¶³ÌºÍδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ý»ñÈ¡É豸µÄĬÈÏÖÎÀíÔ±ÃÜÂëÀ´ÈƹýÉí·ÝÑéÖ¤£¬½ø¶ø³ÁÐÂÅäÖÃÉ豸»òÀÄÓþ­¹ýÉí·ÝÑéÖ¤µÄÓû§Ö°ÄÜ¡£¶øÕâÒ»·ì϶µÄÀûÓã¬ÓÖÓëÁíÒ»¸öÐÅϢй¶·ì϶CVE-2024-51977Ç×êÇÓйØ£¬¹¥»÷ÕßÄܹ»ÀûÓúóÕß»ñÈ¡É豸ÐòÁкÅ£¬¶ø¸ÃÐòÁкÅÕýÊÇÌìÉúĬÈÏÖÎÀíÔ±ÃÜÂëËù±ØÐëµÄ¡£Ô¼ÄªÒ»Äêǰ£¬Rapid7ÒÑͨ¹ýÈÕ±¾JPCERT/CCÏòBrother»ã±¨ÁËÕâЩ·¢ÏÖ¡£BrotherËæºó°ä²¼Á˲¼¸æ·î¸æ¿Í»§ÕâЩ·ì϶£¬²¢Òѽ¨¸´ÁË´ó²¿ÃÅ·ì϶¡£È»¶ø£¬¶ÔÓÚCVE-2024-51978ÕâÒ»ÑϳÁ·ì϶£¬Brother°µÊ¾ÎÞ·¨Ôڹ̼þÖÐÆëÈ«½¨¸´£¬µ«ÒѲÉȡеÄÔì×÷¹¤ÒÕÈ·±£½«À´µÄÉ豸²»»áÊܵ½¹¥»÷¡£¶ÔÓÚÏÖÓÐÉ豸£¬BrotherÒ²ÌṩÏàʶ¾ö²½Ö衣ͬʱ£¬JPCERT/CC¡¢Àí¹â¡¢¸»Ê¿¡¢¶«Ö¥ºÍ¿ÂÄῨÃÀÄÜ´ïµÈÆ·ÅÆÒ²°ä²¼ÁËÓйز¼¸æ£¬ÌáÐÑÓû§°ÑÎÈÕâЩ°²È«·ì϶²¢²ÉÈ¡ÏàÓ¦´ëÊ©¡£


https://www.securityweek.com/new-vulnerabilities-expose-millions-of-brother-printers-to-hacking/


3. CISAÈ·ÈÏAMI MegaRAC BMCÈí¼þÑϳÁ·ì϶ÕýÔâ¹¥»÷ÀûÓÃ


6ÔÂ26ÈÕ£¬ÃÀ¹úÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÒÑÈ·ÈÏ£¬ÃÀ¹úÃÀ¸ñÄÉ£¨AMI£©¹«Ë¾µÄMegaRAC»ù°åÖÎÀí½ÚÔìÆ÷£¨BMC£©Èí¼þÖдæÔÚÒ»¸ö×î¸ßÑϳÁÐԵݲȫ·ì϶£¬ÇҸ÷ì϶ĿǰÕýÊܵ½¹¥»÷ÀûÓá£MegaRAC BMC¹Ì¼þΪ·þÎñÆ÷ÌṩÁËÔ¶³ÌϵͳÖÎÀíÖ°ÄÜ£¬Ê¹µÃ¼¼ÊõÈËÔ±ÎÞÐèÏÖʵ²ÎÓë¼´¿É½øÐйÊÕÏÅųý£¬ÕâÒ»Ö°Äܱ»¶à¼ÒÎªÔÆ·þÎñÌṩÉ̺ÍÊý¾ÝÖÐÐÄÌṩÉ豸µÄ¹©¸øÉÌ¿í·ºÊ¹Óã¬Ô̺¬»ÝÆÕÆóÒµ£¨HPE£©¡¢»ªË¶£¨Asus£©ºÍ»ªÇ棨ASRock£©µÈ¡£È»¶ø£¬¸Ã¹Ì¼þÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý°²È«·ì϶£¨±àºÅΪCVE-2024-54085£©È´¸ø·þÎñÆ÷°²È«´øÀ´Á˾޴óÍþв¡£ÕâÒ»·ì϶¿É±»Ô¶³Ìδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÀûÓã¬ÒԵ͸´ÔӶȹ¥»÷µÄ·½Ê½½Ù³Ö²¢¿ÉÄÜ·ÛËé佨²¹µÄ·þÎñÆ÷£¬ÇÒÎÞÐèÓû§½»»¥¡£½ñÄê3Ô£¬µ±AMI°ä²¼°²È«¸üÐÂÒÔ½¨¸´CVE-2024-54085ʱ£¬Eclypsium·¢ÏÖÏßÉÏÓг¬¹ý1000̨·þÎñÆ÷¿ÉÄÜÃæ¶Ô¹¥»÷·çÏÕ¡£¸Ã¹«Ë¾»¹°µÊ¾£¬ÓÉÓÚMegaRAC BMC¹Ì¼þ¶þ½øÔìÎļþδ¼ÓÃÜ£¬´´½¨·ì϶ÀûÓò¢²»ÄÑÌâ¡£


https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/


4. ¿ÏËþ»ùÖÝÖв¿·ÅÉäÕï¶ÏÖÐÐÄ16.7ÍòÈËÐÅÏ¢Ôâй¶


6ÔÂ26ÈÕ£¬¿ÏËþ»ùÖÝÖв¿·ÅÉäÕï¶ÏÖÐÐÄ£¨Central Kentucky Radiology£©½üÈÕÅû¶ÁËһ·ÑϳÁµÄÍøÂ簲ȫÊÂÎñ£¬¸ÃÊÂÎñµ¼ÖÂÔ¼16.7ÍòÈ˵ÄÓ×ÎÒÐÅÏ¢±»Ð¹Â¶¡£¾ÝϤ£¬ºÚ¿ÍÔÚ2024Äê10ÔÂ16ÈÕÖÁ18ÈÕÆÚ¼äÇÖÈëÁ˸ûú¹¹µÄÄÚ²¿ÍøÂ磬²¢³É¹¦ÇÔÈ¡²¢¸´ÔìÁËϵͳÄÚµÄÎļþ¡£ÕâÒ»ÊÂÎñ¾­¹ý³¤´ïÆß¸öÔµÄÊý¾Ý·ÖÎöºó£¬ÖÕÓÚÔÚ2025Äê5ÔÂ7Èյõ½ÁËÈ·ÈÏ¡£¿ÏËþ»ùÖÝÖв¿·ÅÉäÕï¶ÏÖÐÐݵʾ£¬±»µÁµÄÎļþÖÐÔ̺¬ÁË»¼ÕßµÄÃô¸ÐÐÅÏ¢£¬ÈçÐÕÃû¡¢×¡Ö·¡¢µ®ÉúÈÕÆÚ¡¢Éç»á°²È«ºÅÂë¡¢Ò½ÁÆ·þÎñÈÕÆÚ¼°ÓöÈÃ÷ϸµÈ¡£ÕâЩÐÅÏ¢Ò»µ©Ð¹Â¶£¬¿ÉÄÜ»á¸ø»¼Õß´øÀ´ÑϳÁµÄÒþÖԺͰ²È«·çÏÕ¡£ÎªÁËÓ¦¶ÔÕâÒ»ÊÂÎñ£¬¿ÏËþ»ùÖÝÖв¿·ÅÉäÕï¶ÏÖÐÐÄ´Ó2025Äê6ÔÂ13ÈÕÆð£¬ÆðÍ·ÏòÊÜÓ°ÏìµÄÈËȺ¼ÄËÍÊéÃæÍ¨Öªº¯£¬·î¸æËûÃÇÓ×ÎÒÐÅϢй¶µÄÇé¿ö£¬ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ£¬²¢Ïò·ðÃÉÌØÖÝ¡¢ÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒ¼°ÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿½øÐÐÁ˱¨±¸¡£´Ë±í£¬¿ÏËþ»ùÖÝÖв¿·ÅÉäÕï¶ÏÖÐÐÄ»¹Í¬²½ÍÆËÍÁË·´Õ©Ö¸ÄÏ¡£


https://www.securityweek.com/central-kentucky-radiology-data-breach-impacts-167000/


5. ¹©¸øÁ´ÊÂÎñ²¨ºÏ¸ñÀ­Ë¹¸çÊÐÕþ·þÎñ£¬¹Ø¼üÊý¾ÝÃæ¶Ô·çÏÕ


6ÔÂ26ÈÕ£¬¸ñÀ­Ë¹¸çÊÐÒé»á½üÈÕ·¢³öÖҸ棬ÆäËļ¶¹©¸øÉÌÔâ·êµÄ°²È«ÊÂÎñÒѵ¼Ö¶àÏîÔÚÏß·þÎñÖжÏ£¬²¢Ê¹Óû§Êý¾ÝÃæ¶Ôй¶·çÏÕ¡£6ÔÂ19ÈÕ£¬¸ÃÒé»áµÄIT·þÎñÉÌCGI·¢ÏÔìä·Ö°üÉÌÖÎÀíµÄ·þÎñÆ÷ÉÏ´æÔÚ¶ñÒâ»î¶¯£¬Òé»áËæ¼´²ÉÈ¡´¹Î£´ëÊ©£¬¸ôÀëÁËÓйطþÎñÆ÷£¬È»¶øÕâÒ»Ðж¯Ò²µ¼ÖÂÁ˱¾µØ¶àÏîÊý×Ö·þÎñµÄ̱»¾¡£Õâ´ÎÊÜÓ°ÏìµÄ·þÎñÁìÓò¿í·º£¬Ô̺¬¹æ»®·þÎñ¡¢½É·Ñϵͳ¡¢ÃñÉú·þÎñÒÔ¼°×¨ÏîÃÅ»§µÈ¶à¸ö·½Ãæ¡£¾ßÌå¶øÑÔ£¬ÔÚÏ߹滮ÉêÇëµÄ²é¿´ÓëÆÀÂÛÖ°ÄÜ¡¢Í£³µ·£¿îºÍ¹«½»³µÂ·Î¥Õ·£µ¥µÄÔÚÏßÖ§¸³ÓèÉêÊöÖ°ÄܾùÒÑÖжÏ£»µ®Éú¡¢éæÃü¡¢»éÒöÖ¤Ã÷µÄÉêÇë·þÎñ£¬ÒÔ¼°À¬»øÇåÔËÈÕÀú²éÎʺÍѧÌÃȱÇÚÉ걨ְÄÜÒ²ÒÑÔÝÍ££»´Ë±í£¬StrathclydeÑøÀϽð»áÔ±ÎÞ·¨½Ó¼ûSPFOnlineÃÅ»§£¬µÇ¼Ç´¦Ô¤Ô¼ÏµÍ³Ò²Ê§Ð§ÁË¡£Ä¿Ç°£¬Òé»áÔÚÓëËÕ¸ñÀ¼¾¯·½ÒÔ¼°¹ú¶ÈÍøÂ簲ȫÖÐÐÄ£¨NCSC£©çÇÃܺÏ×÷£¬¹²Í¬µ÷²éÕâ´Î°²È«ÊÂÎñ¡£Òé»á°µÊ¾²ÆÕþϵͳ²¢Î´Êܵ½Õâ´Î°²È«ÊÂÎñµÄÓ°Ï죬Óû§µÄÒøÐÐÕË»§¼°ÐÅÓþ¿¨ÐÅϢҲδ±»µÁÈ¡¡£


https://www.infosecurity-magazine.com/news/supply-chain-imperils-glasgow/


6. ÒÁÀʺڿÍ×éÖ¯Educated Manticore¶ÔÒÔÉ«Áз¢Æð´¹µö¹¥»÷


6ÔÂ26ÈÕ£¬ÒÁÀʹú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯Educated Manticore±»¸æ·¢Õë¶ÔÒÔÉ«ÁмÇÕß¡¢ÍøÂ簲ȫר¼Ò¼°ÍÆËã»ú¿ÆÑ§½ÌÊÚÌáÒé´¹µö¹¥»÷¡£¹¥»÷ÕßÀûÓõç×ÓÓʼþºÍWhatsAppµÈͨѶ¹¤¾ß£¬¼Ù×°³É¼¼Êõ¸ß¹Ü»ò×êÑÐÈËÔ±µÄÐé¹¹ÖúÀí£¬ÏòÖ¸±ê·¢ËÍαÔìµÄGmailµÇÂ¼Ò³Ãæ»òGoogle MeetÔ¼ÇëÁ´½Ó£¬ÓÕʹָ±êÊÜÆ­¡£ÍøÂ簲ȫ¹«Ë¾Check PointÖ¸³ö£¬Õâ´ÎÐж¯Ô´ÓÚ´úºÅEducated ManticoreµÄÍþв¼¯Èº£¬¸Ã×éÖ¯ÓëAPT35£¨º¬×Ó¼¯ÈºAPT42£©¡¢CALANQUE¡¢Charming KittenµÈÊ®Óà¸ö³ÛÃûºÚ¿Í¼¯Ìå´æÔÚ³Áµþ£¬¹ßÓþ«ÐÄÉè¼ÆµÄÉç½»¹¤³Ì¼¿Á©Ö´Ðй¥»÷¡£¹¥»÷³õÆÚ£¬¹¥»÷Õß·¢Ë͵ÄÐÂÎŲ»º¬¶ñÒâÔØºÉ£¬¶øÊÇ×ÅÁ¦³ÉÁ¢ÓëÖ¸±êµÄÐÅÀµ¡£Ò»µ©»ñÊØÐÅÀµ£¬±ã»á·¢ËÍ´¹µöÁ´½Ó£¬µ¼ÏòαÔìµÄµÇÂ¼Ò³Ãæ£¬ÇÔÈ¡¹È¸èÕËºÅÆ¾Ö¤¡£ÕâЩ´¹µöÒ³Ãæ²»½öÄÜÇÔÈ¡ÕË»§Æ¾Ö¤£¬»¹¿É²¶»ñË«³ÁÑéÖ¤£¨2FA£©ÂëÖ´ÐÐÖм̹¥»÷£¬²¢ÄÚÖñ»¶¯¼üÅ̼ͼ·¨Ê½¡£¼´±ãÊܺ¦ÕßÖÐ;ÉÕ»Ù²Ù×÷£¬ËùÓÐÊäÈëÄÚÈÝÈԻᱻÇÔÈ¡¡£²¿ÃŹ¥»÷»¹ÀûÓÃGoogle SitesÓòÃûÍйÜαÔì»áÒéÒ³Ãæ£¬Óû§µã»÷Ò³ÃæËÁÒâµØÎ»¾Í»á´¥·¢ÈÏÖ¤Á÷³Ì£¬´ó´óÔö³¤Á˹¥»÷µÄÒñ±ÎÐԺͳɹ¦ÂÊ¡£


https://thehackernews.com/2025/06/iranian-apt35-hackers-targeting-israeli.html