¼ÓÄôóInstantelǧÓą̀¹¤Òµ¼à¿Ø×°±¸´æÑÏÖØÎó²î

Ðû²¼Ê±¼ä 2025-06-05

1. ¼ÓÄôóInstantelǧÓą̀¹¤Òµ¼à¿Ø×°±¸´æÑÏÖØÎó²î


6ÔÂ3ÈÕ£¬ £¬¼ÓÄôóInstantel¹«Ë¾Éú²úµÄ1000¶ą̀¹¤Òµ¼à¿Ø×°±¸ÃæÁÙÑÏÖØÇå¾²Íþв¡£¡£ ¡£¡£ÍøÂçÇå¾²»ú¹¹CISAÐû²¼µÄ×Éѯ±¨¸æÏÔʾ£¬ £¬InstantelµÄMicromate²úÆ·£¨ÓÃÓڼͼÕñ¶¯¡¢ÔëÒôºÍ¿ÕÆø¹ýѹ£©ÒòÓëÉèÖö˿Úȱ·¦Éí·ÝÑéÖ¤Ïà¹ØµÄÎó²î¶øÊÜÓ°Ï죬 £¬¸ÃÎó²î±àºÅΪCVE-2025-1907£¬ £¬CVSSÆÀ·Ö¸ß´ï9.8£¬ £¬¹¥»÷Õ߿ɽè´ËÔÚ×°±¸ÉÏÖ´ÐÐí§ÒâÏÂÁî¡£¡£ ¡£¡£·¢Ã÷´ËÎó²îµÄMicrosecÑо¿Ô±Souvik Kandar͸¶£¬ £¬È«ÇòÓÐÁè¼Ý1000̨̻¶ÔÚ»¥ÁªÍøÉϵÄMicromate×°±¸¿ÉÄÜÒ×Êܹ¥»÷¡£¡£ ¡£¡£ÕâЩÒ×Ëð×°±¸ÆÕ±éÓ¦ÓÃÓڲɿó¡¢ËíµÀ¡¢ÇÅÁº¼à²â¡¢ÐÞ½¨ºÍÇéÐÎÇå¾²µÈ¶à¸öÁìÓò¡£¡£ ¡£¡£¹¥»÷ÕßÈôÄÜÔÚMicromate×°±¸ÉÏÖ´ÐÐÏÂÁ £¬²»µ«¿É¸ü¸Ä»ò½ûÓÃÆä¼à¿Ø¹¦Ð§£¬ £¬µ¼ÖÂÊý¾Ý¹ýʧ»ò²»ÍêÕû£¬ £¬ÆÆËðÊý¾ÝÍêÕûÐÔ£¬ £¬»¹¿ÉÄܸøÉ󼯡¢ºÏ¹æÐÔ»ò°ü¹ÜË÷Åâ´øÀ´ÎÊÌâ¡£¡£ ¡£¡£±ðµÄ£¬ £¬×°±¸»¹¿ÉÄܱ»Ë𻵻ò¹Ø±Õ£¬ £¬ÖÂʹ±¬ÆÆºÍËíµÀÍÚ¾òµÈÒªº¦²Ù×÷ÖÐÖ¹¡£¡£ ¡£¡£¸üÑÏÖØµÄÊÇ£¬ £¬¹¥»÷Õß¿ÉʹÓñ»ÈëÇÖ×°±¸ºáÏòÒÆ¶¯µ½ÆäËûÅþÁ¬µÄIT»òOTϵͳ¡£¡£ ¡£¡£CISAÔÚͨ¸æÖÐÖ¸³ö£¬ £¬InstantelÕýÔÚÕë¶Ô´ËÎó²î¾ÙÐй̼þ¸üУ¬ £¬ÔÚ²¹¶¡Ðû²¼Ç°£¬ £¬½¨ÒéÓû§½«ÊÜÓ°Ïì×°±¸µÄ»á¼ûÏÞÖÆÔÚÊÜÐÅÈεÄIPµØµã¡£¡£ ¡£¡£


https://www.securityweek.com/1000-instantel-industrial-monitoring-devices-possibly-exposed-to-hacking/


2. Gargle¹«Ë¾Êý¾Ý¿â´æÒþ»¼ÖÂ270Íò»¼ÕßÐÅϢ̻¶


6ÔÂ3ÈÕ£¬ £¬CybernewsÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÆðÓ°ÏìÃÀ¹ú¹«ÃñÒ½ÁÆÊý¾ÝµÄ´ó¹æÄ£Ð¹Â¶ÊÂÎñ£¬ £¬Ô¼270ÍòÃû»¼Õß×ÊÁϺÍ880ÍòÌõÔ¤Ô¼¼Í¼Íêȫ̻¶¡£¡£ ¡£¡£´Ë´Îй¶ԴÓÚÒ»¸öδÉèÖÃÇå¾²·À»¤µÄMongoDBÊý¾Ý¿â£¬ £¬Êý¾ÝËùÓÐÕßËäδ»ñ¹Ù·½È·ÈÏ£¬ £¬µ«ÏßË÷Ö¸ÏòGargle¹«Ë¾¡£¡£ ¡£¡£¸Ã¹«Ë¾ÎªÑÀ¿ÆÕïËùÌṩӪÏú¡¢SEOºÍÍøÕ¾¿ª·¢Ð§ÀÍ£¬ £¬Ëä·ÇÒ½ÁƱ£½¡ÌṩÕߣ¬ £¬µ«ÓªÒµÄ£Ê½Éæ¼°´¦Öóͷ£»¼ÕßÊý¾Ý¡£¡£ ¡£¡£ÏÖÔÚÉв»ÇåÎúÊý¾Ý¿â̻¶ʱ³¤¼°»á¼ûÕߣ¬ £¬ÔÚCybernews¼û¸æºó£¬ £¬Êý¾Ý¼¯Òѱ»±£»£»£»£»£»£»¤£¬ £¬µ«ÉÐδÊÕµ½¸Ã¹«Ë¾Ì¸ÂÛ¡£¡£ ¡£¡£Ð¹Â¶Êý¾Ýº­¸Ç»¼ÕßÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµØµã¡¢×¡Ö·¡¢µç»°ºÅÂë¡¢ÐԱ𡢲¡ÀúID¡¢ÓïÑÔÆ«ºÃ¡¢Õ˵¥ÏêÇé¼°Ô¤Ô¼¼Í¼µÈÃô¸ÐÐÅÏ¢¡£¡£ ¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨Éî¶ÈÃô¸ÐÐÅÏ¢£¬ £¬À¦°óºó×é³ÉСÎÒ˽¼ÒÉí·ÝÖÜÈ«À¶Í¼£¬ £¬ÎªÉí·Ý͵ÇÔ¡¢°ü¹Üڲƭ¡¢Ò½ÁÆÉí·Ý͵ÇÔ¼°´¹ÂÚ¹¥»÷µÈÀÄÓÃÐÐΪ·­¿ª´óÃÅ£¬ £¬Òý·¢¶Ô¸Ã¹«Ë¾²»×ñÊØHIPAA¹æÔòµÄÑÏÖØÖÊÒÉ¡£¡£ ¡£¡£


https://cybernews.com/security/dental-marketing-gargle-data-leak/


3. ÎÚ¿ËÀ¼GUR´Ó¶íͼ²¨Áзò¹«Ë¾ÇÔÈ¡4.4GBÉñÃØÊý¾Ý


6ÔÂ4ÈÕ£¬ £¬ÎÚ¿ËÀ¼¾üÊÂÇ鱨»ú¹¹GUR£¨ÓÖÃûHUR£©¶Ô¶íÂÞ˹º½¿Õº½ÌìºÍ¹ú·À¹«Ë¾Í¼²¨Áзò·¢¶¯Á˺ڿ͹¥»÷£¬ £¬ÇÔÈ¡Á˸߶ÈÉñÃØÊý¾Ý¡£¡£ ¡£¡£¾Ý±¨µÀ£¬ £¬GURÈëÇÖÁ˶íÂÞ˹ÁªºÏ·É»ú¹«Ë¾£¨UAC£©Í¼²¨Áзò·Ö²¿£¬ £¬¸Ã·Ö²¿×÷ΪËÕÁªÊ±ÆÚͼ²¨ÁзòÉè¼Æ¾ÖµÄ¼ÌÐøÕߣ¬ £¬ÊǶíÂÞ˹¾ü·½Õ½ÂÔºäÕ¨»úµÄÖ÷Òª¿ª·¢ÉÌ¡£¡£ ¡£¡£Ç鱨½çÐÂÎÅÈËʿ͸¶£¬ £¬´Ë´ÎÐж¯ÖУ¬ £¬ÎÚ¿ËÀ¼Ìع¤»ñÈ¡ÁËÁè¼Ý4.4GB¾ßÓÐÕ½ÂÔÒâÒåµÄ¸ß¶ÈÉñÃØÄÚ²¿Êý¾Ý¡£¡£ ¡£¡£ÕâЩÊý¾Ýº­¸ÇÆÕ±é£¬ £¬°üÀ¨ÄÚ²¿Í¨Ñ¶¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢¹¤³Ìʦ¼òÀú¡¢²É¹º¼Í¼ÒÔ¼°ÉñÃØ¾Û»á¼Í¼µÈ¡£¡£ ¡£¡£ÎÚ¿ËÀ¼Ç鱨²¿·ÖÐÂÎÅÈËÊ¿ÌåÏÖ£¬ £¬´Ë´ÎÊý¾Ýй¶ÏÕЩ̻¶ÁËͼ²¨ÁзòµÄËùÓÐÉñÃØ£¬ £¬Ê¹ÎÚ¿ËÀ¼·½ÃæÄܹ»ÖÜÈ«ÕÆÎÕ¶íÂÞ˹սÂÔº½¿ÕµÄÖ°Ô±ºÍÐж¯ÇéÐΡ£¡£ ¡£¡£ÕâЩÊý¾Ý¶ÔÎÚ¿ËÀ¼Ç鱨²¿·Ö¶øÑÔ¼ÛÖµ¼«¸ß£¬ £¬Ê¹Æä¶Ôͼ²¨ÁзòµÄÔË×÷ÏÕЩÁËÈçÖ¸ÕÆ¡£¡£ ¡£¡£±ðµÄ£¬ £¬GUR»¹ÉñÃØ¼à¿ØÍ¼²¨Áзò¹«Ë¾ÄÚ²¿ÎļþÁ÷´ïÊýÔ£¬ £¬ÉîÈëÏàʶ¹«Ë¾ÔËÓª£¬ £¬ÎªÎ´À´¹¥»÷¶íÂÞ˹¹ú·À¹¤ÒµÍøÂçÖ¤¾Ý¡£¡£ ¡£¡£ÎªÏóÕ÷ÐÔ¹¥»÷¶íÂÞ˹£¬ £¬GUR»¹ÔÚͼ²¨Áзò¹«Ë¾ÍøÕ¾ÉÏͿѻ£¬ £¬»­ÉÏèͷӥץ×ŶíÂÞ˹ºäÕ¨»úµÄͼ°¸¡£¡£ ¡£¡£´Ë´ÎÐж¯²¢·ÇÁæØêÊÂÎñ£¬ £¬ÎÚ¿ËÀ¼GURÒ»Ö±ÔÚÒ»Ö±¹¥»÷¶íÂÞ˹µÄ¾ü¹¤ÁªºÏÌ壬 £¬ÈëÇÖÓë¹ú·À¡¢Õ½ÂÔº½¿Õ¡¢ÎäÆ÷Éú²úºÍÎïÁ÷Ïà¹ØµÄ¶íÂÞ˹¹«Ë¾Êý¾Ý¿â¡£¡£ ¡£¡£


https://securityaffairs.com/178641/hacking/ukraines-military-intelligence-agency-stole-4-4gb-of-highly-classified-internal-data-from-tupolev.html


4. FBIµÈ»ú¹¹¸üУºPlayÀÕË÷Èí¼þÒѹ¥»÷900¸ö×éÖ¯


6ÔÂ4ÈÕ£¬ £¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©¡¢CISA¼°°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄÁªºÏÐû²¼µÄ×Éѯ¸üÐÂÅú×¢£¬ £¬×èÖ¹2025Äê5Ô£¬ £¬PlayÀÕË÷Èí¼þÍÅ»ïÒÑÈëÇÖÔ¼900¸ö×éÖ¯£¬ £¬Êܺ¦ÕßÊýÄ¿ÊÇ2023Äê10Ô±¨¸æµÄÈý±¶¡£¡£ ¡£¡£×Ô2022Äê6ÔÂÆð£¬ £¬PlayÀÕË÷Èí¼þ×éÖ¯¾Í¶Ô±±ÃÀ¡¢ÄÏÃÀºÍÅ·ÖÞµÄÖÚ¶àÆóÒµ¼°Òªº¦»ù´¡ÉèÊ©Ôì³ÉÓ°Ï죬 £¬³ÉΪ2024Äê×î»îÔ¾µÄÀÕË÷Èí¼þ×éÖ¯Ö®Ò»¡£¡£ ¡£¡£¸ÃÍÅ»ïÿ´Î¹¥»÷¾ùʹÓÃÖØÐ±àÒëµÄ¶ñÒâÈí¼þ£¬ £¬Õâ´ó´óÔöÌíÁËÇå¾²½â¾ö¼Æ»®¼ì²âºÍ×èÖ¹µÄÄѶÈ£¬ £¬²¿·ÖÊܺ¦Õß»¹½Óµ½µç»°ÀÕË÷Êê½ð£¬ £¬ÒÔ±ÜÃâÊý¾Ýй¶¡£¡£ ¡£¡£½ñÄêÄêÍ·ÒÔÀ´£¬ £¬ÓëPlayÀÕË÷Èí¼þÔËÓªÉÌÓйصijõʼ»á¼ûÊðÀíʹÓÃÔ¶³Ì¼à¿ØºÍÖÎÀí¹¤¾ßÖеĶà¸öÎó²î£¬ £¬¶ÔÃÀ¹ú×éÖ¯ÌᳫԶ³Ì´úÂëÖ´Ðй¥»÷£¬ £¬ÎªºóÐøµÄÀÕË÷Èí¼þ¹¥»÷×ö×¼±¸¡£¡£ ¡£¡£PlayÀÕË÷Èí¼þÍÅ»ïÒѱ£´æ½üÈýÄ꣬ £¬ÔÚ°²ÅÅÀÕË÷Èí¼þǰ»áÇÔÈ¡Ãô¸ÐÎļþ£¬ £¬ÒÔ´ËÏòÊܺ¦ÕßʩѹË÷ÒªÊê½ð£¬ £¬ÇÒ½ÓÄɵç×ÓÓʼþ×÷Ϊ̸ÅÐÇþµÀ£¬ £¬²»ÌṩTor̸ÅÐÒ³ÃæÁ´½Ó£¬ £¬»¹Ê¹ÓÃ×Ô½ç˵VSS¸´Öƹ¤¾ßÇÔÈ¡Îļþ¡£¡£ ¡£¡£ÎªÓ¦¶ÔÕâÒ»Íþв£¬ £¬FBIµÈ»ú¹¹±Þ²ßÇå¾²ÍŶÓÓÅÏȽ«ÏµÍ³¡¢Èí¼þºÍ¹Ì¼þ¸üÐÂÖÁ×îа汾£¬ £¬ÒÔ½µµÍÎó²î±»Ê¹ÓõÄΣº¦£»£»£»£»£»£»ÔÚËùÓÐЧÀÍÖÐʵÑé¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©£¬ £¬ÓÈÆäÒªÖØµã¹Ø×¢VPN¡¢ÍøÂçÓʼþµÈ¿É»á¼û×éÖ¯ÍøÂçÖÐÒªº¦ÏµÍ³µÄÕË»§£»£»£»£»£»£»Í¬Ê±ÒªÎ¬»¤ÀëÏßÊý¾Ý±¸·Ý£¬ £¬²¢¿ª·¢ºÍ²âÊÔ»Ö¸´³ÌÐò£¬ £¬½«Æä×÷Ϊ×éÖ¯±ê×¼Ç徲ʵ¼ùµÄÒ»²¿·Ö¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/fbi-play-ransomware-breached-900-victims-including-critical-orgs/


5. ³öÊé¾ÞÍ·Lee Enterprises³ÆÊý¾Ýй¶ӰÏìÁ˽ü4ÍòÈË


6ÔÂ4ÈÕ£¬ £¬³öÊé¾ÞÍ·Lee EnterprisesÕýÔÚ֪ͨ½ü40,000ÃûСÎÒ˽¼ÒÐÅÏ¢ÔÚ2025Äê2ÔÂÀÕË÷Èí¼þ¹¥»÷Öб»µÁµÄÖ°Ô±¡£¡£ ¡£¡£×÷ΪÃÀ¹ú×î´óµÄ±¨Òµ¼¯ÍÅÖ®Ò»£¬ £¬Lee EnterprisesÔÚ26¸öÖݳöÊé¶à·ÝÈÕ±¨¡¢ÖÜ¿¯ºÍרҵ¿¯Î £¬ÓµÓÐÖØ´óµÄ¶ÁÕßȺÌå¡£¡£ ¡£¡£¸Ã¹«Ë¾±¾ÖÜÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÎļþÏÔʾ£¬ £¬¹¥»÷ÕßÇÔÈ¡Á˰üÀ¨39,779ÈËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢µÄÎļþ£¬ £¬¿ÉÄÜÉæ¼°µÄÃû×Ö¡¢ÐÕÊÏÒÔ¼°Éç»áÇå¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢ÔÚ2ÔÂ3ÈÕ±»Î´¾­ÊÚȨ»á¼û»ò»ñÈ¡¡£¡£ ¡£¡£´Ë´Î¹¥»÷µ¼ÖÂLee EnterprisesÃÀ¹ú¸÷µØµÄÐÂÎű༭ÊÒϵͳÖÐÖ¹£¬ £¬ÆÈʹ³öÊéÉ̹رÕÐí¶àÍøÂ磬 £¬Ôì³ÉÊýÊ®¼Ò±¨Ö½µÄÓ¡Ë¢ºÍµÝËÍ´óÃæ»ýÖÐÖ¹£¬ £¬»¹Òý·¢ÁËÆóÒµVPNÖÐÖ¹ÒÔ¼°ÎÞ·¨»á¼ûÄÚ²¿ÏµÍ³ºÍÔÆ´æ´¢µÈÑÏÖØÎÊÌâ¡£¡£ ¡£¡£Ò»Öܺó£¬ £¬¸Ã¹«Ë¾ÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»Îļþ£¬ £¬Åû¶ºÚ¿Í¡°¼ÓÃÜÁËÒªº¦Ó¦ÓóÌÐò²¢ÇÔÈ¡ÁËijЩÎļþ¡±¡£¡£ ¡£¡£Ö»¹ÜLee EnterprisesÉÐδÃ÷È·¹é×ïÓÚÏêϸÐж¯·½£¬ £¬µ«÷è÷ëÀÕË÷Èí¼þÍÅ»ïÒÑÔÚ2ÔÂβÐû²¼¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬ £¬²¢Éù³ÆÇÔÈ¡ÁË×ܼÆ350GBµÄ120,000·ÝÎļþ£¬ £¬Íþв½«ÓÚ3ÔÂ5ÈÕËùÓÐÐû²¼¡£¡£ ¡£¡£2ÔÂ28ÈÕ£¬ £¬÷è÷ëÀÕË÷Èí¼þÍŻォLee EnterprisesÌí¼Óµ½Æä°µÍøÐ¹ÃÜÍøÕ¾£¬ £¬·ÖÏíÁ˾ݳƴӸù«Ë¾ÊÜËðϵͳÖÐÇÔÈ¡µÄÊý¾ÝÑù±¾£¬ £¬°üÀ¨Õþ¸®Éí·Ý֤ɨÃè¼þ¡¢²ÆÎñµç×Ó±í¸ñµÈÉñÃØÎļþ¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/media-giant-lee-enterprises-says-data-breach-affects-39-000-people/


6. À­½Ü¹ûµÂÊÐÕþ¹«Ë¾ÒÉÔâÍøÂç¹¥»÷£¬ £¬³¬400GBÊý¾Ý»òй¶


6ÔÂ4ÈÕ£¬ £¬À­½Ü¹ûµÂÊÐÕþ¹«Ë¾£¨RMC£©ÍøÕ¾ÒÉËÆÔâÓöÍøÂç¹¥»÷£¬ £¬Òý·¢¹«ÖÚ¶ÔÃô¸Ð¹«ÃñÊý¾Ý¿ÉÄܱ»µÁµÄµ£ÐÄ£¬ £¬½üÆÚ¸ÃÊý¾Ýй¶ÊÂÎñÆØ¹âºó£¬ £¬Òý·¢×¡Ãñ¿Ö»Å¡£¡£ ¡£¡£¾ÝÐÂÎÅÈËÊ¿³Æ£¬ £¬´Ë´Îй¶µÄÊý¾Ý¿ÉÄܰüÀ¨À­½Ü¹ûµÂÊÐÕþ¸®ÐÞ½¨ºÍ¹«¹²»ù´¡ÉèÊ©µÄÒªº¦ÐÅÏ¢£¬ £¬ÈçѧУ¡¢Ò½Ôº¡¢ÇÅÁººÍ°ì¹«Êҵȣ¬ £¬¹ÙÔ±ÏÓÒÉÁè¼Ý400GBµÄÊý¾Ý¿ÉÄÜÔ⵽й¶¡£¡£ ¡£¡£ÊÂÎñ±¬·¢ºó£¬ £¬RMCÖÎÀí²¿·ÖѸËÙ֪ͨÁËÓ¡¶È¹ú¼ÒµçÐÅÓÐÏÞ¹«Ë¾£¨BSNL£©µÄÍøÂçÇå¾²ÍŶÓ¡£¡£ ¡£¡£BSNLÍŶÓÁ¬Ã¦½«GIS£¨µØÀíÐÅϢϵͳ£©ÍøÕ¾´ÓÍøÂçÖиôÀ룬 £¬²¢¶Ô´Ë´ÎÊý¾Ýй¶ÊÂÎñÕö¿ªÏêϸÊӲ죬 £¬ÏÖÔÚÕýÆð¾¢È·¶¨Ãü¾Ýй¶Ö鯽¼°ÕÒ³öµ¼Ö¹¥»÷µÄÎó²î¡£¡£ ¡£¡£ÆðÔ´ÆÀ¹ÀÏÔʾ£¬ £¬¸ÃÍøÕ¾¿ÉÄÜÔÚ¡°ÐÁ¶à¶ûÐж¯¡±£¨Ó¡¶È½üÆÚÕë¶ÔÅÁ¹þ¶û¼ÓÄ·¿Ö²ÀÏ®»÷µÄ¾üÊ»ØÓ¦£©Ê±´úÔâµ½ÈëÇÖ£¬ £¬²»¹ýÕâÒ»¹ØÁªÉÐδ»ñµÃ֤ʵ¡£¡£ ¡£¡£Ö»¹ÜRMCÔÚÍøÂçÇå¾²²½·¥ÉÏͶÈëÁËÔ¼1ÒÚ¬±È£¬ £¬µ«ÒÑÍùÒ²ÔøÔâÓö¹ýÀàËÆÊÂÎñ¡£¡£ ¡£¡£Õþ¸®ÌåÏÖ£¬ £¬ÒªÖÜÈ«Ïàʶ´Ë´ÎÍøÂç¹¥»÷µÄÓ°Ï죬 £¬»¹ÐèÆÚ´ýÕýÔÚ¾ÙÐеÄȡ֤ÊÓ²ìÍê³É¡£¡£ ¡£¡£


https://www.news9live.com/crime/rajkot-civic-bodys-gis-website-hit-by-cyber-attack-over-400-gb-data-feared-stolen-2862626