Allianz LifeÊý¾Ýй¶ÊÂÎñ¶³ö140Íò¿Í»§ÐÅÏ¢

°ä²¼¹¦·ò 2025-07-28

1. Allianz LifeÊý¾Ýй¶ÊÂÎñ¶³ö140Íò¿Í»§ÐÅÏ¢


7ÔÂ27ÈÕ  £¬°²ÁªÈËÊÙ£¨Allianz Life£©È·ÈÏ7ÔÂ16ÈÕ²úÉúÁËһ·ÑϳÁµÄÊý¾Ýй¶ÊÂÎñ  £¬µ¼ÖÂÆä140Íò¿Í»§ÖеĴóÎÞÊýÓ×ÎÒÐÅÏ¢Ô⵽¶³ö¡£Æ¾¾Ý¹«Ë¾½²»°È˵ÄÉêÃ÷  £¬Õâ´ÎÊÂÎñÊÇÓÉÓÚÍþвÐÐΪÕßͨ¹ýÉç»á¹¤³Ì¹¥»÷ÈëÇÖÁ˵ÚÈý·½»ùÓÚÔÆµÄ¿Í»§¹ØÏµÖÎÀí£¨CRM£©ÏµÍ³¡£¹¥»÷Õ߳ɹ¦»ñÈ¡ÁËÓë°²ÁªÈËÊÙ¿Í»§¡¢½ðÈÚרҵÈËÊ¿ÒÔ¼°²¿ÃÅÔ±¹¤ÓйصÄÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡£°²ÁªÈËÊÙѸ¿ì²ÉÈ¡´ëÊ©¶ôÔì²¢»º½âÁËÕâÒ»ÊÂÎñ  £¬²¢ÏòÃÀ¹úÁª¹úµ÷²é¾Ö£¨FBI£©»ã±¨Á˸ÃÊÂÎñ¡£¹«Ë¾Ç¿µ÷  £¬Ä¿Ç°Ã»ÓÐÖ¤¾ÝÅú×¢ÆäÄÚ²¿ÍøÂç»ò¹Ø¼üϵͳ£¨ÀýÈç±£µ¥ÖÎÀíϵͳ£©Ôâµ½½Ó¼û¡£È»¶ø  £¬Óйص÷²éÈÔÔÚ½øÐÐÖÐ  £¬ÊÜÓ°ÏìµÄÓ×ÎÒÒÑÆðÍ·ÊÕµ½Í¨Öª  £¬Í¬Ê±¹«Ë¾ÌṩÁËרÃŵÄÖ§³Ö·þÎñ¡£°²ÁªÈËÊÙ»¹ÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»ÁËÓйØÕâ´ÎÊý¾Ýй¶µÄÎļþ¡£Ö»¹Ü¹«Ë¾Î´Ã÷È·Ö¸³ö±³ºóµÄÍþвÐÐΪÕß  £¬µ«¾Ý±¨Â·³Æ  £¬Õâ´Î¹¥»÷¿ÉÄÜÓë³ôÃûÔ¶ÑïµÄºÚ¿Í×éÖ¯ShinyHuntersÓйØ¡£ShinyHuntersÊÇÒ»¸ö»îÔ¾µÄºÚ¿ÍÍÅ»ï  £¬ÔøÂÅ´ÎÔÚ°µÍøÉÏÏúÊÛ´Ó¶à¼Ò³ÛÃûÆóÒµÇÔÈ¡µÄÊý¾Ý¡£


https://securityaffairs.com/180445/data-breach/allianz-life-data-breach-exposed-the-data-of-most-of-its-1-4m-customers.html


2. Scattered SpiderÔÚ´ó¾Ù¹¥»÷VMware ESXi


7ÔÂ27ÈÕ  £¬ÒÔ¾­¼ÃÀûÒæÎªµ¼ÏòµÄºÚ¿Í×éÖ¯Scattered Spider£¨±ðºÅUNC3944¡¢Octo Tempest£©½üÈÕÕë¶ÔÃÀ¹ú¼°Ó¢¹úÁãÊÛ¡¢º½¿Õ¡¢ÔËÊä¡¢±£ÏÕµÈÐÐÒµÆóÒµÌáÒé´ó¹æÄ£¹¥»÷  £¬Æä´´ÐÂÊÖ·¨Òý·¢°²È«½ç¹Ø×¢¡£¸Ã×éÖ¯ÞðÆú´«Í³·ì϶ÀûÓÃģʽ  £¬×ª¶øÍ¨¹ý¾«ÃÜÉç»á¹¤³ÌѧսÊõ  £¬Ö±½ÓÍ»ÆÆÆóÒµÐé¹¹»¯»·¾³·À»¤¡£¹¥»÷Á´³öÏÖÎå¸öÇ峺½×¶Î£ºÊ×ÏÈͨ¹ý¼ÙÒâÔ±¹¤ÕûµçIT·þÎñ̨  £¬ÓÕʹ¼¼ÊõÖ§³ÖÈËÔ±³ÁÖøßȨÏÞÕË»§ÃÜÂë  £¬»ñÈ¡³õʼ½Ó¼ûȨÏÞ £»ËæºóɨÃèActive Directory¼°ÌØÈ¨½Ó¼ûÖÎÀí£¨PAM£©ÏµÍ³  £¬¾«×¼¶¨Î»ÓòÖÎÀíÔ±¡¢vSphereÖÎÀíÔ±µÈÖ÷ÌâÕË»§ÐÅÏ¢ £»¼Ì¶øÍ¨¹ýÂŴμÙ×°ÌØÈ¨Óû§Öµç  £¬×îÖÕ½ÚÔì¹Ø¼üÕ˺آɸÈëVMware vCenter Server Appliance£¨vCSA£©  £¬¸Ã×é¼þÕÆ¹ÜÖÎÀíÔ̺¬ESXiÐé¹¹»úÖÎÀí·¨Ê½µÄvSphere»·¾³¡ £»ñµÃvCSA½ÚÔìȨºó  £¬¹¥»÷ÕßÖ´ÐÐÁ½Ïî¹Ø¼ü²Ù×÷£ºÆäһͨ¹ýÆôÓÃSSHÏνӲ¢³ÁÖÃESXiÖ÷»úrootÃÜÂë  £¬³ÉÁ¢Óƾû¯½Ó¼ûͨ· £»Æä¶þÖ´Ðд´ÐµÄ"´ÅÅÌ»¥»»"¹¥»÷  £¬¹Ø¹ØÓò½ÚÔìÆ÷Ðé¹¹»úºó·ÖÀëÆäÐé¹¹´ÅÅÌ  £¬½«Æä¹ÒÔØÖÁ¹¥»÷Õß½ÚÔìµÄÐé¹¹»úÒÔÇÔÈ¡Ô̺¬Óû§¹þÏ£ÖµµÄNTDS.ditÊý¾Ý¿â¡£×îÖÕ½×¶Î  £¬¹¥»÷Õßͨ¹ýSSHͨ·²¿ÊðÀÕË÷Èí¼þ  £¬¼ÓÃÜÊý¾Ý´æ´¢ÇøËùÓÐÐé¹¹»úÎļþ¡£


https://www.bleepingcomputer.com/news/security/scattered-spider-is-running-a-vmware-esxi-hacking-spree/


3. ³¬20ÍòWordPressÍøÕ¾Ãæ¶ÔPost SMTP²å¼þ·ì϶·çÏÕ


7ÔÂ26ÈÕ  £¬Ò»ÏîÓ°Ï쳬¹ý20Íò¸öWordPressÍøÕ¾µÄÑϳÁ°²È«·ì϶½üÈÕ±»ÆØ¹â¡£¸Ã·ì϶´æÔÚÓÚ»îÔ¾×°ÖÃÁ¿³¬40ÍòµÄÈȵã²å¼þPost SMTPµÄ3.2.0¼°ÒÔϰ汾ÖÐ  £¬±»×·×ÙΪCVE-2025-24000  £¬CVSSÆÀ·Ö´ï8.8¡£·ì϶Ö÷ÌâÔ´ÓÚ²å¼þREST API¶ËµãµÄ½Ó¼û½ÚÔì»úÔìȱµã  £¬½öÑéÖ¤Óû§ÊÇ·ñµÇ¼  £¬¶øÎ´²é³­ÆäȨÏÞ¼¶±ð  £¬µ¼ÖµÍȨÏÞÓû§£¨Èç¶©ÔÄÕߣ©¿É½Ó¼ûÔ̺¬ÆëÈ«ÓʼþÄÚÈݵÄÈÕÖ¾  £¬²¢´¥·¢ÖÎÀíÔ¹ØË»§ÃÜÂë³ÁÖÃÁ÷³Ì¡£¹¥»÷Õß¿Éͨ¹ýÀ¹½Ø³ÁÖÃÓʼþʵÏÖÕË»§ÊÕÊÜ  £¬×îÖÕ½ÚÔìÕû¸öÍøÕ¾¡£¸Ã·ì϶Óɰ²È«×êÑÐÈËÔ±ÓÚ5ÔÂ23Èջ㱨ÖÁWordPress°²È«³§ÉÌPatchStack  £¬²å¼þ¿ª·¢ÕßSaad IqbalѸ¿ìÏìÓ¦  £¬5ÔÂ26ÈÕÌá½»½¨¸´¹æ»®²¢Í¨¹ýÔÚ"get_logs_permission"º¯ÊýÖÐÔö³¤È¨ÏÞУÑé  £¬È·±£½öÖÎÀíÔ±¿É½Ó¼ûÃô¸ÐAPI¡£½¨¸´°æ±¾3.3.0ÓÚ6ÔÂ11ÈÕ°ä²¼  £¬µ«WordPress.orgͳ¼ÆÊý¾ÝÏÔʾ  £¬½ØÖÁµ±Ç°½ö48.5%Óû§ÊµÏÖÉý¼¶  £¬Òâζ×ÅÈÔÓг¬20Íò¸öÍøÕ¾Â¶³öÔÚ·çÏÕÖС£¸üÑϸñµÄÊÇ  £¬24.2%£¨Ô¼9.68Íò¸ö£©Õ¾µãÈÔÔËÐдæÔÚÆäËûº¹Çà·ì϶µÄ2.x¾É°æ±¾  £¬°²È«¾ÖÊÆ²»ÈÝÀÖ¹Û¡£


https://www.bleepingcomputer.com/news/security/post-smtp-plugin-flaw-exposes-200k-wordpress-sites-to-hijacking-attacks/


4. ÑÇÂíÑ·AI±àÂë´úÀíÔâºÚ¿Í¹¥»÷  £¬×¢ÈëÊý¾Ý²Á³ýºÅÁî


7ÔÂ25ÈÕ  £¬ÑÇÂíÑ·ÆìÏÂÌìÉúʽAI¿ª·¢¸±ÊÖAmazon QµÄVisual Studio CodeÀ©´ó½üÈÕÔâ·ê°²È«ÊÂÎñ  £¬Òý·¢Òµ½ç¶Ô¿ªÔ´¹©¸øÁ´°²È«µÄ¹Ø×¢¡£Õâ¿îÕ¼Óнü°ÙÍò×°ÖÃÁ¿µÄÃâ·ÑÀ©´ó·¨Ê½  £¬Í¨¹ýÌìÉúʽAI¸¨Öú¿ª·¢Õß±àÂë¡¢µ÷ÊÔ¼°ÅäÖÃÖÎÀí  £¬È´ÔÚGitHub´úÂëÍйÜÁ÷³ÌÖгöÏÖ·ì϶  £¬±»ºÚ¿ÍÖ²ÈëÊý¾Ý²Á³ý´úÂë¡£ÊÂÎñÔ´ÓÚ7ÔÂ13ÈÕ  £¬ºÚ¿Í"lkmanka58"ͨ¹ýÀ­È¡ÒªÇóÏòAmazon QµÄGitHub²Ö¿âÌύδ¾­ÉóÅúµÄ´úÂë  £¬×¢ÈëÔ̺¬"¶Ï¸ùϵͳÖÁ³ö³§×´Ì¬²¢É¾³ýÎļþϵͳ¼°ÔÆ×ÊÔ´"Ö¸ÁîµÄ¶ñÒâÌáÐÑ¡£ÓÉÓÚÏîĿȨÏÞÖÎÀíÊè©»ò¹¤×÷Á÷³ÌÅäÖÃÃýÎó  £¬¸ÃÌá½»Òâ±í»ñµÃ´æ´¢¿â½Ó¼ûȨÏÞ  £¬µ¼ÖÂÔ̺¬¶ñÒâ´úÂëµÄ1.84.0°æ±¾ÓÚ7ÔÂ17ÈÕÔÚVS CodeÊг¡°ä²¼¡£Ö»¹ÜÑÇÂíÑ·¹ýºóÐû³Æ´úÂëÌåʽÃýÎóδÏÖʵִÐÐ  £¬ÇÒδÔì³ÉÄÚÈÝ·çÏÕ  £¬µ«°²È«×êÑÐÈËÔ±ÈÔÖ¸³öÕâ¶³öÁËÑϳÁµÄ¹©¸øÁ´·çÏÕ  £¬Èô´úÂë¾­¹ýÓÐЧ¼Ù×°  £¬¿ÉÄÜÒý·¢´ó¹æÄ£Êý¾Ý·ÛËé¡£7ÔÂ23ÈÕ  £¬ÑÇÂíѷͨ¹ý°²È«»ã±¨»ñϤ¸ÃÎÊÌâºó  £¬µ±¼´Æô¶¯È¡Ö¤µ÷²é¡£´ÎÈÕ¼´°ä²¼½¨¸´°æ±¾1.85.0  £¬³¹µ×ÒÆ³ý¶ñÒâ´úÂë²¢¸üÐÂÆ¾Ö¤¡£


https://www.bleepingcomputer.com/news/security/amazon-ai-coding-agent-hacked-to-inject-data-wiping-commands/


5. Ô¼»á°²È«ÀûÓÃTeaÔâºÚ¿ÍÈëÇÖ  £¬7.2ÍòÓû§ÒþÖÔÕÕÆ¬Ð¹Â¶


7ÔÂ26ÈÕ  £¬Ö÷´òÅ®ÐÔÓû§°²È«µÄÔ¼»áÆÀÂÛÀûÓÃTea½üÈÕÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ  £¬³¬7.2ÍòÕÅÓû§ÕÕÆ¬±»ºÚ¿Í»ñÈ¡²¢´«²¼  £¬Òý·¢ÒþÖÔ°²È«ÕùÒé¡£Õâ¿îÔÊÐíÅ®ÐÔÄäÃûÆÀ¼ÛÔ¼»á¶ÔÏóµÄÀûÓ÷¨Ê½ÓÚ25ÈÕ°ä²¼ÉêÃ÷  £¬Ö¤ÊµÆäϵͳÔâÈëÇÖ  £¬Ð¹Â¶Êý¾ÝÔ̺¬Á½ÀàÃô¸ÐͼÏñ£º1.3ÍòÕÅÓÃÓÚÕË»§ÑéÖ¤µÄ×ÔÅļ°Éí·ÝÖ¤¼þÕÕ  £¬ÒÔ¼°5.9ÍòÕÅÀ´×ÔÓû§°ä²¼ÄÚÈÝ¡¢ÆÀÂÛºÍ˽ÐŵÄͼƬ¡£Ö»¹Ü¹«Ë¾Ç¿µ÷δй¶ÓÊÏ䵨ַ»òµç»°ºÅÂë  £¬ÇÒÊÂÎñ½öÓ°Ïì2024Äê2ÔÂǰע²áµÄÓû§  £¬µ«Éí·ÝÖ¤¼þÓë˽ÃÜ»¥¶¯ÄÚÈݵͳöÈÔ×é³ÉÑϳÁÒþÖÔ·çÏÕ¡£ÊÂÎñÆØ¹âÔ´ÓÚ4chanÓû§·¢ÏÖ²¢´«²¼Á˶³öµÄÊý¾Ý¿â  £¬ºÚ¿Íͨ¹ýδÃ÷È·×¢Ã÷µÄ·ì϶»ñÈ¡ÁË´æ´¢Óû§ÕÕÆ¬µÄºó¶Ü×ÊÔ´¡£Tea¹«Ë¾»ØÓ¦³ÆÒÑ´¹Î£ÀñƸµÚÈý·½ÍøÂ簲ȫÍŶÓ  £¬24Ó×Ê±ÍÆ¶¯ÏµÍ³¼Ó¹Ì  £¬²¢Ðû³Æ"ÒÑÖ´Ðжî±í°²È«´ëÊ©ÇÒ½¨¸´Êý¾ÝÎÊÌâ"  £¬µ«Î´Ð¹Â©¾ßÌå¼¼Êõϸ½Ú¡£Ä¿Ç°  £¬TeaÒѰ䲼½¨¸´°æ±¾²¢ºôÓõÓû§¸üС£


https://techcrunch.com/2025/07/26/dating-safety-app-tea-breached-exposing-72000-user-images/


6. Operation CargoTalonÕë¶Ô¶íÂÞ˹º½¿Õº½ÌìÁìÓòµÄÍøÂç¼äµý»î¶¯


7ÔÂ25ÈÕ  £¬ÍøÂ簲ȫר¼ÒÅû¶ÁËÒ»ÏîÃûΪOperation CargoTalonµÄÍøÂç¼äµý»î¶¯  £¬¸Ã»î¶¯Õë¶Ô¶íÂÞ˹µÄº½¿Õº½ÌìÓë¹ú·À²¿ÃÅ  £¬³ö¸ñÊÇÎÖÂÞÄùÈÕ·É»úÔì×÷Э»á(VASO)¡£×êÑÐÈËԱͨ¹ýµ÷²é·¢ÏÖ  £¬¹¥»÷ÕßÀûÓüÙ×°³É¡°»õÎïÔËÊäµ¥¡±(TTN)ÎļþµÄ¶ñÒ⸽¼þ½øÐд¹µö¹¥»÷¡£ÕâЩÎļþ±í±íÉÏΪZIPѹËõ°ü  £¬µ«ÏÖʵÉÏÔ̺¬¶ñÒâLNK¿ì½Ý·½Ê½ºÍDLLÖ²È뷨ʽ  £¬×îÖÕ¿ªÊͲ¢Ö´ÐÐÃûΪEAGLETµÄ¶ñÒâÈí¼þ¡£EAGLETÊÇÒ»ÖÖ¶¨Ô컯µÄPEÎļþºóÃÅ·¨Ê½  £¬¾ß±¸ÌìÉúΨһGUID±êʶÊܺ¦Õß¡¢ÍøÂçϵͳÐÅÏ¢¡¢´´½¨°µ²ØÄ¿Â¼ÒÔ¼°Í¨¹ýHTTPÏνӺÅÁîÓë½ÚÔì(C2)·þÎñÆ÷µÄÖ°ÄÜ¡£ÆäÖ§³ÖÔ¶³ÌShell½Ó¼û¡¢ÎļþÏÂÔØºÍÊý¾ÝÇÔÈ¡  £¬²¢¿ÉÄÜͨ¹ýºÏ·¨Windows APIÖ´ÐÐÍøÂç²Ù×÷ÒÔʵÏÖÒñ±ÎͨѶ¡£¹¥»÷Á´´Ó´¹µöÓʼþÆðÍ·  £¬¾­¹ý¶à½×¶ÎµÄϰȾ¹ý³Ì  £¬×îÖÕʵÏÖÊý¾ÝÇÔÈ¡¹¤×÷¡£×êÑÐÈËÔ±ÒÔΪ  £¬Õâ´Î»î¶¯ÓÉÒ»¸ö±»×·×ÙΪUNG0901µÄÍþв×éÖ¯ÌáÒé  £¬ÇÒÓë´Ëǰ·¢ÏÖµÄHead MareÍþв¼¯Èº´æÔÚÖ°ÄܳÁµþºÍÕ½ÊõÀàËÆÐÔ¡£¶þÕß¾ùʹÓÃÀàËÆµÄµö¶ü¶¨Ãû¹æ¶¨ºÍºóÃŹ¤¾ß£¨ÀýÈçPhantomDL£©  £¬Åú×¢ÕâЩ¹¥»÷Ðж¯¿ÉÄܹ²Ïí²¿ÃÅ×ÊÔ´»òÕ½Êõ¡£


https://securityaffairs.com/180378/intelligence/operation-cargotalon-targets-russias-aerospace-with-eaglet-malware.html