Allianz LifeÊý¾Ýй¶ÊÂÎñ¶³ö140Íò¿Í»§ÐÅÏ¢
°ä²¼¹¦·ò 2025-07-281. Allianz LifeÊý¾Ýй¶ÊÂÎñ¶³ö140Íò¿Í»§ÐÅÏ¢
7ÔÂ27ÈÕ£¬°²ÁªÈËÊÙ£¨Allianz Life£©È·ÈÏ7ÔÂ16ÈÕ²úÉúÁËһ·ÑϳÁµÄÊý¾Ýй¶ÊÂÎñ£¬µ¼ÖÂÆä140Íò¿Í»§ÖеĴóÎÞÊýÓ×ÎÒÐÅÏ¢Ô⵽¶³ö¡£Æ¾¾Ý¹«Ë¾½²»°È˵ÄÉêÃ÷£¬Õâ´ÎÊÂÎñÊÇÓÉÓÚÍþвÐÐΪÕßͨ¹ýÉç»á¹¤³Ì¹¥»÷ÈëÇÖÁ˵ÚÈý·½»ùÓÚÔÆµÄ¿Í»§¹ØÏµÖÎÀí£¨CRM£©ÏµÍ³¡£¹¥»÷Õ߳ɹ¦»ñÈ¡ÁËÓë°²ÁªÈËÊÙ¿Í»§¡¢½ðÈÚרҵÈËÊ¿ÒÔ¼°²¿ÃÅÔ±¹¤ÓйصÄÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡£°²ÁªÈËÊÙѸ¿ì²ÉÈ¡´ëÊ©¶ôÔì²¢»º½âÁËÕâÒ»ÊÂÎñ£¬²¢ÏòÃÀ¹úÁª¹úµ÷²é¾Ö£¨FBI£©»ã±¨Á˸ÃÊÂÎñ¡£¹«Ë¾Ç¿µ÷£¬Ä¿Ç°Ã»ÓÐÖ¤¾ÝÅú×¢ÆäÄÚ²¿ÍøÂç»ò¹Ø¼üϵͳ£¨ÀýÈç±£µ¥ÖÎÀíϵͳ£©Ôâµ½½Ó¼û¡£È»¶ø£¬Óйص÷²éÈÔÔÚ½øÐÐÖУ¬ÊÜÓ°ÏìµÄÓ×ÎÒÒÑÆðÍ·ÊÕµ½Í¨Öª£¬Í¬Ê±¹«Ë¾ÌṩÁËרÃŵÄÖ§³Ö·þÎñ¡£°²ÁªÈËÊÙ»¹ÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»ÁËÓйØÕâ´ÎÊý¾Ýй¶µÄÎļþ¡£Ö»¹Ü¹«Ë¾Î´Ã÷È·Ö¸³ö±³ºóµÄÍþвÐÐΪÕߣ¬µ«¾Ý±¨Â·³Æ£¬Õâ´Î¹¥»÷¿ÉÄÜÓë³ôÃûÔ¶ÑïµÄºÚ¿Í×éÖ¯ShinyHuntersÓйء£ShinyHuntersÊÇÒ»¸ö»îÔ¾µÄºÚ¿ÍÍÅ»ï£¬ÔøÂÅ´ÎÔÚ°µÍøÉÏÏúÊÛ´Ó¶à¼Ò³ÛÃûÆóÒµÇÔÈ¡µÄÊý¾Ý¡£
https://securityaffairs.com/180445/data-breach/allianz-life-data-breach-exposed-the-data-of-most-of-its-1-4m-customers.html
2. Scattered SpiderÔÚ´ó¾Ù¹¥»÷VMware ESXi
7ÔÂ27ÈÕ£¬ÒÔ¾¼ÃÀûÒæÎªµ¼ÏòµÄºÚ¿Í×éÖ¯Scattered Spider£¨±ðºÅUNC3944¡¢Octo Tempest£©½üÈÕÕë¶ÔÃÀ¹ú¼°Ó¢¹úÁãÊÛ¡¢º½¿Õ¡¢ÔËÊä¡¢±£ÏÕµÈÐÐÒµÆóÒµÌáÒé´ó¹æÄ£¹¥»÷£¬Æä´´ÐÂÊÖ·¨Òý·¢°²È«½ç¹Ø×¢¡£¸Ã×éÖ¯ÞðÆú´«Í³·ì϶ÀûÓÃģʽ£¬×ª¶øÍ¨¹ý¾«ÃÜÉç»á¹¤³ÌѧսÊõ£¬Ö±½ÓÍ»ÆÆÆóÒµÐé¹¹»¯»·¾³·À»¤¡£¹¥»÷Á´³öÏÖÎå¸öÇ峺½×¶Î£ºÊ×ÏÈͨ¹ý¼ÙÒâÔ±¹¤ÕûµçIT·þÎñ̨£¬ÓÕʹ¼¼ÊõÖ§³ÖÈËÔ±³ÁÖøßȨÏÞÕË»§ÃÜÂ룬»ñÈ¡³õʼ½Ó¼ûȨÏÞ£»ËæºóɨÃèActive Directory¼°ÌØÈ¨½Ó¼ûÖÎÀí£¨PAM£©ÏµÍ³£¬¾«×¼¶¨Î»ÓòÖÎÀíÔ±¡¢vSphereÖÎÀíÔ±µÈÖ÷ÌâÕË»§ÐÅÏ¢£»¼Ì¶øÍ¨¹ýÂŴμÙ×°ÌØÈ¨Óû§Öµ磬×îÖÕ½ÚÔì¹Ø¼üÕ˺آɸÈëVMware vCenter Server Appliance£¨vCSA£©£¬¸Ã×é¼þÕÆ¹ÜÖÎÀíÔ̺¬ESXiÐé¹¹»úÖÎÀí·¨Ê½µÄvSphere»·¾³¡£»ñµÃvCSA½ÚÔìȨºó£¬¹¥»÷ÕßÖ´ÐÐÁ½Ïî¹Ø¼ü²Ù×÷£ºÆäһͨ¹ýÆôÓÃSSHÏνӲ¢³ÁÖÃESXiÖ÷»úrootÃÜÂ룬³ÉÁ¢Óƾû¯½Ó¼ûͨ·£»Æä¶þÖ´Ðд´ÐµÄ"´ÅÅÌ»¥»»"¹¥»÷£¬¹Ø¹ØÓò½ÚÔìÆ÷Ðé¹¹»úºó·ÖÀëÆäÐé¹¹´ÅÅÌ£¬½«Æä¹ÒÔØÖÁ¹¥»÷Õß½ÚÔìµÄÐé¹¹»úÒÔÇÔÈ¡Ô̺¬Óû§¹þÏ£ÖµµÄNTDS.ditÊý¾Ý¿â¡£×îÖս׶Σ¬¹¥»÷Õßͨ¹ýSSHͨ·²¿ÊðÀÕË÷Èí¼þ£¬¼ÓÃÜÊý¾Ý´æ´¢ÇøËùÓÐÐé¹¹»úÎļþ¡£
https://www.bleepingcomputer.com/news/security/scattered-spider-is-running-a-vmware-esxi-hacking-spree/
3. ³¬20ÍòWordPressÍøÕ¾Ãæ¶ÔPost SMTP²å¼þ·ì϶·çÏÕ
7ÔÂ26ÈÕ£¬Ò»ÏîÓ°Ï쳬¹ý20Íò¸öWordPressÍøÕ¾µÄÑϳÁ°²È«·ì϶½üÈÕ±»ÆØ¹â¡£¸Ã·ì϶´æÔÚÓÚ»îÔ¾×°ÖÃÁ¿³¬40ÍòµÄÈȵã²å¼þPost SMTPµÄ3.2.0¼°ÒÔϰ汾ÖУ¬±»×·×ÙΪCVE-2025-24000£¬CVSSÆÀ·Ö´ï8.8¡£·ì϶Ö÷ÌâÔ´ÓÚ²å¼þREST API¶ËµãµÄ½Ó¼û½ÚÔì»úÔìȱµã£¬½öÑéÖ¤Óû§ÊÇ·ñµÇ¼£¬¶øÎ´²é³ÆäȨÏÞ¼¶±ð£¬µ¼ÖµÍȨÏÞÓû§£¨Èç¶©ÔÄÕߣ©¿É½Ó¼ûÔ̺¬ÆëÈ«ÓʼþÄÚÈݵÄÈÕÖ¾£¬²¢´¥·¢ÖÎÀíÔ¹ØË»§ÃÜÂë³ÁÖÃÁ÷³Ì¡£¹¥»÷Õß¿Éͨ¹ýÀ¹½Ø³ÁÖÃÓʼþʵÏÖÕË»§ÊÕÊÜ£¬×îÖÕ½ÚÔìÕû¸öÍøÕ¾¡£¸Ã·ì϶Óɰ²È«×êÑÐÈËÔ±ÓÚ5ÔÂ23Èջ㱨ÖÁWordPress°²È«³§ÉÌPatchStack£¬²å¼þ¿ª·¢ÕßSaad IqbalѸ¿ìÏìÓ¦£¬5ÔÂ26ÈÕÌá½»½¨¸´¹æ»®²¢Í¨¹ýÔÚ"get_logs_permission"º¯ÊýÖÐÔö³¤È¨ÏÞУÑ飬ȷ±£½öÖÎÀíÔ±¿É½Ó¼ûÃô¸ÐAPI¡£½¨¸´°æ±¾3.3.0ÓÚ6ÔÂ11ÈÕ°ä²¼£¬µ«WordPress.orgͳ¼ÆÊý¾ÝÏÔʾ£¬½ØÖÁµ±Ç°½ö48.5%Óû§ÊµÏÖÉý¼¶£¬Òâζ×ÅÈÔÓг¬20Íò¸öÍøÕ¾Â¶³öÔÚ·çÏÕÖС£¸üÑϸñµÄÊÇ£¬24.2%£¨Ô¼9.68Íò¸ö£©Õ¾µãÈÔÔËÐдæÔÚÆäËûº¹Çà·ì϶µÄ2.x¾É°æ±¾£¬°²È«¾ÖÊÆ²»ÈÝÀÖ¹Û¡£
https://www.bleepingcomputer.com/news/security/post-smtp-plugin-flaw-exposes-200k-wordpress-sites-to-hijacking-attacks/
4. ÑÇÂíÑ·AI±àÂë´úÀíÔâºÚ¿Í¹¥»÷£¬×¢ÈëÊý¾Ý²Á³ýºÅÁî
7ÔÂ25ÈÕ£¬ÑÇÂíÑ·ÆìÏÂÌìÉúʽAI¿ª·¢¸±ÊÖAmazon QµÄVisual Studio CodeÀ©´ó½üÈÕÔâ·ê°²È«ÊÂÎñ£¬Òý·¢Òµ½ç¶Ô¿ªÔ´¹©¸øÁ´°²È«µÄ¹Ø×¢¡£Õâ¿îÕ¼Óнü°ÙÍò×°ÖÃÁ¿µÄÃâ·ÑÀ©´ó·¨Ê½£¬Í¨¹ýÌìÉúʽAI¸¨Öú¿ª·¢Õß±àÂë¡¢µ÷ÊÔ¼°ÅäÖÃÖÎÀí£¬È´ÔÚGitHub´úÂëÍйÜÁ÷³ÌÖгöÏÖ·ì϶£¬±»ºÚ¿ÍÖ²ÈëÊý¾Ý²Á³ý´úÂë¡£ÊÂÎñÔ´ÓÚ7ÔÂ13ÈÕ£¬ºÚ¿Í"lkmanka58"ͨ¹ýÀȡҪÇóÏòAmazon QµÄGitHub²Ö¿âÌύδ¾ÉóÅúµÄ´úÂ룬עÈëÔ̺¬"¶Ï¸ùϵͳÖÁ³ö³§×´Ì¬²¢É¾³ýÎļþϵͳ¼°ÔÆ×ÊÔ´"Ö¸ÁîµÄ¶ñÒâÌáÐÑ¡£ÓÉÓÚÏîĿȨÏÞÖÎÀíÊè©»ò¹¤×÷Á÷³ÌÅäÖÃÃýÎ󣬸ÃÌá½»Òâ±í»ñµÃ´æ´¢¿â½Ó¼ûȨÏÞ£¬µ¼ÖÂÔ̺¬¶ñÒâ´úÂëµÄ1.84.0°æ±¾ÓÚ7ÔÂ17ÈÕÔÚVS CodeÊг¡°ä²¼¡£Ö»¹ÜÑÇÂíÑ·¹ýºóÐû³Æ´úÂëÌåʽÃýÎóδÏÖʵִÐУ¬ÇÒδÔì³ÉÄÚÈÝ·çÏÕ£¬µ«°²È«×êÑÐÈËÔ±ÈÔÖ¸³öÕâ¶³öÁËÑϳÁµÄ¹©¸øÁ´·çÏÕ£¬Èô´úÂë¾¹ýÓÐЧ¼Ù×°£¬¿ÉÄÜÒý·¢´ó¹æÄ£Êý¾Ý·ÛËé¡£7ÔÂ23ÈÕ£¬ÑÇÂíѷͨ¹ý°²È«»ã±¨»ñϤ¸ÃÎÊÌâºó£¬µ±¼´Æô¶¯È¡Ö¤µ÷²é¡£´ÎÈÕ¼´°ä²¼½¨¸´°æ±¾1.85.0£¬³¹µ×ÒÆ³ý¶ñÒâ´úÂë²¢¸üÐÂÆ¾Ö¤¡£
https://www.bleepingcomputer.com/news/security/amazon-ai-coding-agent-hacked-to-inject-data-wiping-commands/
5. Ô¼»á°²È«ÀûÓÃTeaÔâºÚ¿ÍÈëÇÖ£¬7.2ÍòÓû§ÒþÖÔÕÕÆ¬Ð¹Â¶
7ÔÂ26ÈÕ£¬Ö÷´òÅ®ÐÔÓû§°²È«µÄÔ¼»áÆÀÂÛÀûÓÃTea½üÈÕÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ£¬³¬7.2ÍòÕÅÓû§ÕÕÆ¬±»ºÚ¿Í»ñÈ¡²¢´«²¼£¬Òý·¢ÒþÖÔ°²È«ÕùÒé¡£Õâ¿îÔÊÐíÅ®ÐÔÄäÃûÆÀ¼ÛÔ¼»á¶ÔÏóµÄÀûÓ÷¨Ê½ÓÚ25ÈÕ°ä²¼ÉêÃ÷£¬Ö¤ÊµÆäϵͳÔâÈëÇÖ£¬Ð¹Â¶Êý¾ÝÔ̺¬Á½ÀàÃô¸ÐͼÏñ£º1.3ÍòÕÅÓÃÓÚÕË»§ÑéÖ¤µÄ×ÔÅļ°Éí·ÝÖ¤¼þÕÕ£¬ÒÔ¼°5.9ÍòÕÅÀ´×ÔÓû§°ä²¼ÄÚÈÝ¡¢ÆÀÂÛºÍ˽ÐŵÄͼƬ¡£Ö»¹Ü¹«Ë¾Ç¿µ÷δй¶ÓÊÏ䵨ַ»òµç»°ºÅÂ룬ÇÒÊÂÎñ½öÓ°Ïì2024Äê2ÔÂǰע²áµÄÓû§£¬µ«Éí·ÝÖ¤¼þÓë˽ÃÜ»¥¶¯ÄÚÈݵͳöÈÔ×é³ÉÑϳÁÒþÖÔ·çÏÕ¡£ÊÂÎñÆØ¹âÔ´ÓÚ4chanÓû§·¢ÏÖ²¢´«²¼Á˶³öµÄÊý¾Ý¿â£¬ºÚ¿Íͨ¹ýδÃ÷È·×¢Ã÷µÄ·ì϶»ñÈ¡ÁË´æ´¢Óû§ÕÕÆ¬µÄºó¶Ü×ÊÔ´¡£Tea¹«Ë¾»ØÓ¦³ÆÒÑ´¹Î£ÀñƸµÚÈý·½ÍøÂ簲ȫÍŶӣ¬24Ó×Ê±ÍÆ¶¯ÏµÍ³¼Ó¹Ì£¬²¢Ðû³Æ"ÒÑÖ´Ðжî±í°²È«´ëÊ©ÇÒ½¨¸´Êý¾ÝÎÊÌâ"£¬µ«Î´Ð¹Â©¾ßÌå¼¼Êõϸ½Ú¡£Ä¿Ç°£¬TeaÒѰ䲼½¨¸´°æ±¾²¢ºôÓõÓû§¸üС£
https://techcrunch.com/2025/07/26/dating-safety-app-tea-breached-exposing-72000-user-images/
6. Operation CargoTalonÕë¶Ô¶íÂÞ˹º½¿Õº½ÌìÁìÓòµÄÍøÂç¼äµý»î¶¯
7ÔÂ25ÈÕ£¬ÍøÂ簲ȫר¼ÒÅû¶ÁËÒ»ÏîÃûΪOperation CargoTalonµÄÍøÂç¼äµý»î¶¯£¬¸Ã»î¶¯Õë¶Ô¶íÂÞ˹µÄº½¿Õº½ÌìÓë¹ú·À²¿ÃÅ£¬³ö¸ñÊÇÎÖÂÞÄùÈÕ·É»úÔì×÷лá(VASO)¡£×êÑÐÈËԱͨ¹ýµ÷²é·¢ÏÖ£¬¹¥»÷ÕßÀûÓüÙ×°³É¡°»õÎïÔËÊäµ¥¡±(TTN)ÎļþµÄ¶ñÒ⸽¼þ½øÐд¹µö¹¥»÷¡£ÕâЩÎļþ±í±íÉÏΪZIPѹËõ°ü£¬µ«ÏÖʵÉÏÔ̺¬¶ñÒâLNK¿ì½Ý·½Ê½ºÍDLLÖ²È뷨ʽ£¬×îÖÕ¿ªÊͲ¢Ö´ÐÐÃûΪEAGLETµÄ¶ñÒâÈí¼þ¡£EAGLETÊÇÒ»ÖÖ¶¨Ô컯µÄPEÎļþºóÃÅ·¨Ê½£¬¾ß±¸ÌìÉúΨһGUID±êʶÊܺ¦Õß¡¢ÍøÂçϵͳÐÅÏ¢¡¢´´½¨°µ²ØÄ¿Â¼ÒÔ¼°Í¨¹ýHTTPÏνӺÅÁîÓë½ÚÔì(C2)·þÎñÆ÷µÄÖ°ÄÜ¡£ÆäÖ§³ÖÔ¶³ÌShell½Ó¼û¡¢ÎļþÏÂÔØºÍÊý¾ÝÇÔÈ¡£¬²¢¿ÉÄÜͨ¹ýºÏ·¨Windows APIÖ´ÐÐÍøÂç²Ù×÷ÒÔʵÏÖÒñ±ÎͨѶ¡£¹¥»÷Á´´Ó´¹µöÓʼþÆðÍ·£¬¾¹ý¶à½×¶ÎµÄϰȾ¹ý³Ì£¬×îÖÕʵÏÖÊý¾ÝÇÔÈ¡¹¤×÷¡£×êÑÐÈËÔ±ÒÔΪ£¬Õâ´Î»î¶¯ÓÉÒ»¸ö±»×·×ÙΪUNG0901µÄÍþв×éÖ¯ÌáÒ飬ÇÒÓë´Ëǰ·¢ÏÖµÄHead MareÍþв¼¯Èº´æÔÚÖ°ÄܳÁµþºÍÕ½ÊõÀàËÆÐÔ¡£¶þÕß¾ùʹÓÃÀàËÆµÄµö¶ü¶¨Ãû¹æ¶¨ºÍºóÃŹ¤¾ß£¨ÀýÈçPhantomDL£©£¬Åú×¢ÕâЩ¹¥»÷Ðж¯¿ÉÄܹ²Ïí²¿ÃÅ×ÊÔ´»òÕ½Êõ¡£
https://securityaffairs.com/180378/intelligence/operation-cargotalon-targets-russias-aerospace-with-eaglet-malware.html


¾©¹«Íø°²±¸11010802024551ºÅ