CISA½«D-Link·ÓÉÆ÷¸ßΣÎó²îÄÉÈëÒÑÖª±»Ê¹ÓÃĿ¼
Ðû²¼Ê±¼ä 2025-08-071. CISA½«D-Link·ÓÉÆ÷¸ßΣÎó²îÄÉÈëÒÑÖª±»Ê¹ÓÃĿ¼
8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½«Ó°ÏìD-Link·ÓÉÆ÷µÄÈý¸ö¾ÉÇå¾²Îó²îÁÐÈëÆä¡°ÒÑÖª±»Ê¹ÓÃÎó²î¡±£¨KEV£©Ä¿Â¼£¬£¬£¬£¬£¬£¬Ôµ¹ÊÔÓÉÊÇÕâЩÎó²îÔÚÒ°Íâ±»Æð¾¢Ê¹Óᣡ£¡£¡£´Ë´ÎÄÉÈëµÄÎó²îÉæ¼°D-Link¶à¿î×°±¸£¬£¬£¬£¬£¬£¬°üÀ¨DCS-2530L¡¢DCS-2670LºÍDNR-322LÐͺţ¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö¾ù´ï7.5ÖÁ8.8µÄ¸ßΣ¼¶±ð¡£¡£¡£¡£Ïêϸ¶øÑÔ£¬£¬£¬£¬£¬£¬CVE-2020-25078£¨CVSS 7.5£©¿ÉÄܵ¼ÖÂÔ¶³ÌÖÎÀíÔ±ÃÜÂëй¶£»£»£»£»CVE-2020-25079£¨CVSS 8.8£©Îª¾ÓÉÉí·ÝÑéÖ¤µÄÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬ÍþвÕ߿ɽè´ËÔÚ×°±¸ÉÏÖ´ÐвÙ×÷ϵͳ¼¶ÏÂÁ£»£»£»CVE-2020-40799£¨CVSS 8.8£©ÔòÒòȱ·¦´úÂëÍêÕûÐÔ¼ì²é£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÈÆ¹ýÑéÖ¤Ö±½ÓÖ²Èë¶ñÒâÖ¸Áî¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬DNR-322L×°±¸×Ô2021Äê11ÔÂÆðÒÑ¿¢ÊÂÉúÃüÖÜÆÚ£¨EoL£©£¬£¬£¬£¬£¬£¬³§ÉÌδÌṩ²¹¶¡£¬£¬£¬£¬£¬£¬CISA½¨ÒéÈÔÔÚʹÓøÃÐͺŵÄÓû§Á¬Ã¦Í£Óò¢Ìæ»»×°±¸¡£¡£¡£¡£ÆäÓàÁ½¿î×°±¸µÄÎó²îÒÑÓÚ2020ÄêÐû²¼ÐÞ¸´³ÌÐò¡£¡£¡£¡£CISAÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÔÚ2025Äê8ÔÂ26ÈÕǰÍê³É»º½â²½·¥£¬£¬£¬£¬£¬£¬°üÀ¨¸üÐÂ×°±¸¡¢¸ôÀëÊÜÓ°Ïìϵͳ»òÌæ»»Í£²úÐͺ𣡣¡£¡£
https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
2. CandiruÌØ¹¤Èí¼þ½èлù´¡ÉèÊ©»îԾȫÇò
8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿»ú¹¹Recorded FutureÆìÏÂInsiktС×é¿ËÈÕÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬½ÒÆÆÒÔÉ«ÁÐÌØ¹¤Èí¼þÖÆÔìÉÌCandiruͨ¹ýÉý¼¶ºóµÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬Ò»Á¬Ê¹ÓÃÆäWindows¶ñÒâÈí¼þ¡°DevilsTongue¡±¿ªÕ¹È«Çò¹¥»÷»î¶¯¡£¡£¡£¡£Ñо¿Ê¶±ð³öÓë¸ÃÌØ¹¤Èí¼þ¹ØÁªµÄ°Ë¸ö²Ù×÷¼¯Èº£¬£¬£¬£¬£¬£¬ÆäÖÐÎå¸öÈÔ´¦Óڸ߶ȻîԾ״̬£¬£¬£¬£¬£¬£¬Éæ¼°ÐÙÑÀÀû¡¢É³Ìذ¢À²®¼°Ó¡ÄáµÈ¹ú£¬£¬£¬£¬£¬£¬ÁíÁ½¸öÓë°¢Èû°Ý½®Ïà¹ØµÄ¼¯Èº×´Ì¬²»Ã÷¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬CandiruµÄлù´¡ÉèÊ©°üÀ¨ÃæÏòÊܺ¦ÕߵݲÅÅ¿ØÖÆ×é¼þ¼°Ìع¤Èí¼þ²Ù×÷ÕßʹÓõĸ߲ã¼Ü¹¹£¬£¬£¬£¬£¬£¬²¿·Ö¼¯ÈºÖ±½ÓÖÎÀí¹¥»÷ǰ¶Ë£¬£¬£¬£¬£¬£¬ÆäÓàÔòͨ¹ýÖÐÐIJã»òTor°µÍø¾ÙÐÐÒþ²Ø²Ù¿Ø¡£¡£¡£¡£¡°DevilsTongue¡±×÷Ϊ΢ÈíÃüÃûµÄWindowsÌØ¹¤Èí¼þ£¬£¬£¬£¬£¬£¬ÆäÈö²¥Í¾¾¶°üÀ¨Óã²æÊ½ÍøÂç´¹ÂÚÁ´½Ó¡¢Ë®¿Ó¹¥»÷¡¢ÖÐÐÄÈ˹¥»÷¼°ÎïÀí½Ó´¥×°±¸µÈ·½·¨£¬£¬£¬£¬£¬£¬µ«ÍêÕû°²ÅÅÊÖ·¨ÉÐδÍêÈ«¹ûÕæ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬CandiruÔÚ2021Äê±»ÃÀ¹úÉÌÎñ²¿ÁÐÈ롰ʵÌåÇåµ¥¡±ºó£¬£¬£¬£¬£¬£¬Æä×ʲúÓÚ2025Äê4Ô±»ÃÀ¹úͶ×ʹ«Ë¾¡°³ÏÐÅͬ°é»ù½ð¡±£¨Integrity Partners£©ÒÔ3000ÍòÃÀÔªÊÕ¹º£¬£¬£¬£¬£¬£¬²¢×ªÒÆÖÁн¨ÉèµÄÒÔÉ«ÁÐ˽ӪʵÌå¡°Integrity Labs Ltd¡±¡£¡£¡£¡£ÆÊÎöÒÔΪ£¬£¬£¬£¬£¬£¬´Ë´ÎÖØ×éÖ¼ÔÚ¹æ±ÜÃÀ¹úÖÆ²ÃÏÞÖÆ¡£¡£¡£¡£
https://therecord.media/candiru-spyware-active-infrastructure-hungary-saudi-arabia
3. ¿â¿Ëά¶ûÒ½ÁÆÖÐÐÄÔâRhysidaÀÕË÷¹¥»÷
8ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÌïÄÉÎ÷ÖÝ¿â¿Ëά¶ûµØÇøÒ½ÁÆÖÐÐÄ£¨CRMC£©×Ô2025Äê7ÔÂ13ÈÕÔâÓöRhysidaÀÕË÷Èí¼þ¹¥»÷ÒÔÀ´£¬£¬£¬£¬£¬£¬ÈÔÔÚÈ«Á¦»Ö¸´ÏµÍ³²¢Ó¦¶ÔÊý¾Ýй¶Σº¦¡£¡£¡£¡£¸Ã»ú¹¹ÎªÌïÄÉÎ÷ÖÝÉÏ¿²²®À¼µØÇø¼°¿ÏËþ»ùÖÝÔ¼25ÍòÃû»¼ÕßÌṩЧÀÍ£¬£¬£¬£¬£¬£¬ÓµÓÐ2500ÓàÃûÔ±¹¤ºÍ40Óà¸öÒ½ÁÆ×¨¿Æ£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷µ¼ÖÂÆäÅÌËã»úϵͳ̱»¾£¬£¬£¬£¬£¬£¬²¿·ÖЧÀÍÖÐÖ¹¡£¡£¡£¡£CRMCÔÚ·¢Ã÷¡°Òì³£ÊÖÒջ¡±ºóÁ¬Ã¦Æô¶¯Ó¦¼±ÏìÓ¦£¬£¬£¬£¬£¬£¬ÆäÐÅÏ¢Çå¾²ÍŶÓÓëÍⲿר¼Ò¼°Áª°îÖ´·¨²¿·ÖÏàÖúÊӲ졣¡£¡£¡£Ö»¹ÜÒ½ÔºÉù³Æ»¼ÕßÕչ˻¤Ê¿Î´ÊܸùÌìÐÔÓ°Ï죬£¬£¬£¬£¬£¬µ«ÏÖʵÔËÓªÖÐÈÔ·ºÆðX¹â¼ì²éЧ¹ûÑÓ³Ù¡¢ÃÅÕïÔ¤Ô¼×÷·Ï¼°ÊÖÊõ°²ÅÅÎÊÌ⣬£¬£¬£¬£¬£¬Òý·¢»¼Õß¶ÔÏàͬЧÂÊµÄÆ·ÆÀ¡£¡£¡£¡£Ò½ÔºÔÊÐí½«ÔÚÈ·ÈÏÊý¾Ýй¶ºó֪ͨÊÜÓ°Ï컼Õߣ¬£¬£¬£¬£¬£¬²¢Ç¿µ÷¡°»¼ÕßÐÅÏ¢Òþ˽ÊÇÖ÷ҪʹÃü¡±¡£¡£¡£¡£´Ë´Î¹¥»÷ÓÉÇ×¶íÂÞ˹µÄRhysidaÍÅ»ïʵÑ飬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÓÚ8ÔÂ2ÈÕ½«CRMCÁÐÈë°µÍøÐ¹ÃÜÍøÕ¾£¬£¬£¬£¬£¬£¬ÒªÇóÆäÔÚËÄÌìÄÚÖ§¸¶Î´¹ûÕæÊê½ð£¬£¬£¬£¬£¬£¬²»È»½«ÒÔ10±ÈÌØ±Ò£¨Ô¼115ÍòÃÀÔª£©³öÊÛ±»µÁÊý¾Ý¡£¡£¡£¡£Ð¹Â¶Ñù±¾ÏÔʾ£¬£¬£¬£¬£¬£¬Êý¾Ý°üÀ¨»¼ÕßÒ½ÁƵµ°¸¡¢Ô±¹¤Ë°ÎñÎļþ¼°¼ÝÕÕÐÅÏ¢£¬£¬£¬£¬£¬£¬²¿·ÖÎļþ¿É×·ËÝÖÁ2018Äê¡£¡£¡£¡£
https://cybernews.com/news/tennessee-cookeville-regional-medical-center-rhysidia-ransomware-attack/
4. ÍþÄá˹ӰϷ½ÚÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬¶àÃû¼ÓÈëÕßÊý¾Ý±»Ð¹Â¶
8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬È«ÇòÀúÊ·×îÓÆ¾ÃµÄÍþÄá˹¹ú¼ÊÓ°Ï·½ÚÈÕǰȷÈϱ¬·¢ÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬Òý·¢¹ú¼ÊÓ°ÊÓÐÐÒµ¶ÔÍøÂçÇå¾²µÄ¸ß¶È¹Ø×¢¡£¡£¡£¡£¾Ý¡¶ºÃÀ³Î뱨µÀ¡·Åû¶£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷±¬·¢ÓÚ2025Äê7ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬ÕýÖµµÚ82½ìÍþÄá˹¹ú¼ÊÓ°Ï·½Ú×¼±¸Òªº¦ÆÚ¡£¡£¡£¡£ºÚ¿Íͨ¹ýδ¾ÊÚȨµÄϵͳÈëÇÖ£¬£¬£¬£¬£¬£¬Àֳɸ´ÖƲ¢ÇÔÈ¡ÁËÓ°Ï·½ÚЧÀÍÆ÷´æ´¢µÄÃô¸ÐÎļþ£¬£¬£¬£¬£¬£¬µ¼Ö°üÀ¨Ã½Ìå¼ÇÕß¡¢ÐÐÒµ´ÓÒµÕßµÈÔÚÄڵļÓÈëÕßСÎÒ˽¼ÒÐÅÏ¢Íâй¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº¸Ç¶àÏî½¹µãСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬Ïêϸ°üÀ¨ÐÕÃûÈ«³Æ¡¢µç×ÓÓÊÏ䵨µã¡¢ÁªÏµµç»°ºÅÂ롢˰ÎñʶÓÖÃû¼°ÊµÌåÓʼĵصãµÈÎåÀàÒªº¦Êý¾Ý¡£¡£¡£¡£Ö»¹ÜÖ÷Àí·½Ç¿µ÷"±»µÁÊý¾ÝÁ¿½ÏС"£¬£¬£¬£¬£¬£¬µ«É漰˰ºÅµÈ¸ß¶ÈÃô¸ÐµÄ²ÆÎñÐÅÏ¢£¬£¬£¬£¬£¬£¬ÈÔ¿ÉÄܶÔÊÜÓ°ÏìÖ°Ô±Ôì³ÉDZÔÚΣº¦¡£¡£¡£¡£ÊÂÎñÆØ¹âÔ´ÓÚ¡¶ºÃÀ³Î뱨µÀ¡·¼ÇÕßÊÕµ½Ó°Ï·½Ú¹Ù·½·¢³öµÄй¶֪ͨº¯£¬£¬£¬£¬£¬£¬¸Ãº²ÔýÊ×´ÎÏòÍâ½ç֤ʵÁËÍøÂçÇ徲ʹʵı£´æ¡£¡£¡£¡£ÃæÁÙÍ»·¢Î£»£»£»£»ú£¬£¬£¬£¬£¬£¬Ó°Ï·½ÚÊÖÒÕÍŶÓѸËÙÆô¶¯Ó¦¼±ÏìÓ¦»úÖÆ¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÏµÍ³»Ö¸´ÊÂÇéÒÑ»ù±¾Íê³É£¬£¬£¬£¬£¬£¬µ«ÉÐδÐû²¼ÏêϸÊÜÓ°ÏìÈËÊý¼°Êý¾Ýй¶¹æÄ£¡£¡£¡£¡£
https://cybernews.com/security/venice-film-festival-hack/
5. ·¨º½ÓëºÉº½ÔâÓöµÚÈý·½Êý¾Ýй¶£¬£¬£¬£¬£¬£¬¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢ÃæÁÙÇ徲Σº¦
8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬·¨¹úº½¿Õ£¨Air France£©ÓëºÉÀ¼»Ê¼Òº½¿Õ£¨KLM Royal Dutch Airlines£©¿ËÈÕÈ·Èϱ¬·¢µÚÈý·½Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬Ó°ÏìÆä²¿·Ö¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£×÷ΪŷÖÞº½¿ÕÒµÖ÷Òª¼ÓÈëÕߣ¬£¬£¬£¬£¬£¬Á½¼ÒͬÊô·¨º½-ºÉº½¿Ø¹É¹«Ë¾µÄº½¿Õ¾Þͷͨ¹ýй¶֪ͨÏòÊÜÓ°Ïì¿Í»§Åû¶ÁËÊÂÎñϸ½Ú¡£¡£¡£¡£¾ÝºÉÀ¼¿Æ¼¼Ã½ÌåTweakers.com»ñÈ¡µÄ֪ͨÏÔʾ£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÈëÇÖµÚÈý·½Ð§ÀÍÌṩÉ̵Äϵͳ»ñÈ¡Á˺ɺ½¿Í»§Êý¾Ý¡£¡£¡£¡£·¨º½ÓëºÉº½ÏÖÔÚÕýÁªºÏÊÓ²ì¸÷×ÔÊý¾ÝÔâ²»·¨»á¼ûµÄÏêϸÇéÐΡ£¡£¡£¡£ºÉº½ÔÚÉùÃ÷ÖÐÖ¸³ö£¬£¬£¬£¬£¬£¬Æä¿Í·þÖÐÐÄʹÓõĵÚÈý·½Æ½Ì¨¼ì²âµ½Òì³£»£»£»£»î¶¯ºó£¬£¬£¬£¬£¬£¬ITÇå¾²ÍŶÓÁ¬Ã¦ÓëÏà¹ØµÚÈý·½ÏµÍ³Ð×÷ʵÑé¾ÀÕý²½·¥ÒÔÖÕÖ¹ÊÂÎñ¡£¡£¡£¡£Ð¹Â¶Êý¾ÝÉæ¼°¿Í»§¶àÏîСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÊÏ¡¢Ãû×Ö¡¢ÁªÏµ·½·¨¡¢"À¶Ì캽ÐÐ"£¨Flying Blue Miles£©ÖÒ³ÏÍýÏë»áÔ±ºÅ¼°Æ·¼¶¡¢Ð§ÀÍÇëÇóÓʼþÖ÷ÌâÐС£¡£¡£¡£µ«»¤ÕÕºÅÂë¡¢Ö§¸¶¿¨ÏêϸÐÅÏ¢¡¢ÕË»§ÃÜÂë¼°Àï³ÌÓà¶îδÔڴ˴ι¥»÷ÖÐй¶¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜʹÓûñÈ¡µÄÐÅϢʵÑéÉí·ÝµÁÓ㬣¬£¬£¬£¬£¬ÀýÈ翪ÉèÚ²ÆÕË»§£¬£¬£¬£¬£¬£¬»òͨ¹ýÉç»á¹¤³Ì¹¥»÷ð³äº½¿Õ¹«Ë¾´ú±í¾ÙÐо«×¼Õ©Æ¡£¡£¡£¡£
https://cybernews.com/security/air-france-klm-customer-data-breach/
6. ·ðÂÞÀï´ïÊý¾Ý¹«Ë¾IMDataCenterÔâÓöÖØ´óй¶
8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ô±½ÜÀïÂõÑÇ¡¤¸£ÀÕ¿ËÈÕ·¢Ã÷£¬£¬£¬£¬£¬£¬ÃÀ¹ú·ðÂÞÀï´ïÖÝÊý¾Ý½â¾ö¼Æ»®ÌṩÉÌIMDataCenterÒòÊý¾Ý¿â¹ýʧÉèÖÃÒý·¢ÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬Ì»Â¶Á˺£Á¿Ãô¸ÐÓû§ÐÅÏ¢¡£¡£¡£¡£´Ë´Îй¶ԴÓÚÒ»¸öδÉèÃÜÂë±£»£»£»£»¤»ò¼ÓÃܵĹûÕæÊý¾Ý¿â£¬£¬£¬£¬£¬£¬°üÀ¨10,820ÌõCSVºÍPDFÃûÌõļͼ£¬£¬£¬£¬£¬£¬×ÜÊý¾ÝÁ¿´ï38GB£¬£¬£¬£¬£¬£¬º¸ÇÐÕÃû¡¢ÏÖʵµØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬£¬£¬¸üÉæ¼°ÉúÑÄ·½·¨¡¢ºâÓî»ò³µÁ¾ËùÓÐȨµÈÉî¶ÈÒþ˽Êý¾Ý¡£¡£¡£¡£IMDataCenterµÄÓªÒµÁýÕÖÒ½ÁÆ¡¢°ü¹Ü¡¢ÕþÖÎÔ˶¯µÈ¶à¸öÐÐÒµ£¬£¬£¬£¬£¬£¬ÆäÊý¾Ý¿âÉù³Æ´æ´¢³¬2.6ÒÚСÎÒ˽¼Ò¼°6ÒÚµç×ÓÓʼþµØµãµÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬±¾ÓÃÓÚ¾«×¼ÓªÏú¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬´Ë´ÎÉèÖÃʧÎóʹÕâЩ¸ß¼ÛÖµÊý¾Ý̻¶ÓÚ¹ûÕæÍøÂ磬£¬£¬£¬£¬£¬³ÉÎªÍøÂç·¸·¨µÄDZÔÚ¹¤¾ß¡£¡£¡£¡£¸£ÀÕÖ¸³ö£¬£¬£¬£¬£¬£¬Òòµ¥¸öCSVÎļþ¼´º¬ÊýǧÌõ¼Í¼£¬£¬£¬£¬£¬£¬ÏÖʵÊÜÓ°ÏìÈËÊý»òÔ¶³¬Íâòͳ¼Æ¡£¡£¡£¡£IMDataCenterËäѸËÙÏÂÏßÊý¾Ý¿â²¢»ØÓ¦¡°¸ß¶ÈÖØÊÓÊý¾ÝÇå¾²¡±£¬£¬£¬£¬£¬£¬µ«ºóÐøÉú³¤¸üÎªÖØ´ó¡£¡£¡£¡£2025Äê7Ô£¬£¬£¬£¬£¬£¬ºÚ¿ÍÂÛ̳Óû§ThinkingOneÉù³ÆÒÑÌáǰ»á¼û¸Ã¹«Ë¾µÄAWS´æ´¢Í°£¬£¬£¬£¬£¬£¬ÏÂÔØÁ˰üÀ¨2000ÍòΨһÓÊÏä¡¢3700Íòµç»°ºÅÂ룬£¬£¬£¬£¬£¬ÒÔ¼°³¬5Íò¸öÉç±£ºÅÂë¡¢³öÉúÈÕÆÚµÈÃô¸ÐÊý¾ÝµÄÎļþ¡£¡£¡£¡£
https://hackread.com/hacker-accesses-imdatacenter-records-exposed-aws-bucket/


¾©¹«Íø°²±¸11010802024551ºÅ