ÀÕË÷Èí¼þÍÅ»ïÔÚ BYOVD ¹¥»÷ÖÐʹÓà Paragon Partition Manager Îó²î

Ðû²¼Ê±¼ä 2025-03-03

1. ÀÕË÷Èí¼þÍÅ»ïÔÚ BYOVD ¹¥»÷ÖÐʹÓà Paragon Partition Manager Îó²î


3ÔÂ1ÈÕ£¬£¬£¬Î¢Èí½üÆÚ·¢Ã÷ÁËParagon Partition ManagerÖеÄÎå¸öBioNTdrv.sysÇý¶¯³ÌÐòȱÏÝ£¬£¬£¬ÆäÖÐÒ»¸öÒѱ»ÀÕË÷Èí¼þÍÅ»ïÔÚÁãÈÕ¹¥»÷ÖÐʹÓ㬣¬£¬ÒÔ»ñÈ¡WindowsϵͳµÄSYSTEMȨÏÞ¡£¡£¡£¡£ÕâЩÎó²î¿É±»ÓÃÓÚ¡°×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò¡±£¨BYOVD£©¹¥»÷£¬£¬£¬¹¥»÷Õßͨ¹ý°²ÅÅÄÚºËÇý¶¯³ÌÐòÔÚÄ¿µÄϵͳÉÏÌáÉýȨÏÞ¡£¡£¡£¡£CERT/CCÖÒÑԳƣ¬£¬£¬¾ßÓÐ×°±¸ÍâµØ»á¼ûȨÏ޵Ĺ¥»÷ÕßÄÜʹÓÃÕâЩÎó²îÌáÉýȨÏÞ»òÒý·¢¾Ü¾øÐ§ÀÍ(DoS)¹¥»÷¡£¡£¡£¡£ÓÉÓÚÉæ¼°Î¢ÈíÊðÃûµÄÇý¶¯³ÌÐò£¬£¬£¬×ÝȻδװÖÃParagon Partition Manager£¬£¬£¬¹¥»÷ÕßÒ²ÄÜʹÓÃBYOVDÊÖÒÕ¡£¡£¡£¡£BioNTdrv.sys×÷ΪÄں˼¶Çý¶¯³ÌÐò£¬£¬£¬Ê¹ÍþвÐÐΪÕßÄÜÈÆ¹ý±£»£»£»£»£»£»£»¤ºÍÇå¾²Èí¼þÖ´ÐÐÏÂÁî¡£¡£¡£¡£Î¢ÈíÒÑÊӲ쵽CVE-2025-0289Îó²î±»ÓÃÓÚBYOVDÀÕË÷Èí¼þ¹¥»÷ÖС£¡£¡£¡£Paragon SoftwareÒÑÐÞ²¹ÕâЩÎó²î£¬£¬£¬Î¢ÈíÒ²½«Ò×Êܹ¥»÷µÄBioNTdrv.sys°æ±¾¼ÓÈë×èÖ¹ÁÐ±í¡£¡£¡£¡£½¨ÒéÓû§Éý¼¶µ½°üÀ¨½â¾öËùÓÐȱÏݵÄBioNTdrv.sys°æ±¾2.0.0µÄ×îÐÂÈí¼þ°æ±¾¡£¡£¡£¡£µ«Ðè×¢ÖØ£¬£¬£¬Î´×°ÖÃParagon Partition ManagerµÄÓû§Ò²¿ÉÄÜÊܵ½¹¥»÷£¬£¬£¬ÓÉÓÚBYOVDÕ½ÂÔ²»ÒÀÀµÓÚÄ¿µÄÈí¼þ¡£¡£¡£¡£Î¢ÈíÒѸüÐÂÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò×èÖ¹Áбí£¬£¬£¬Óû§Ó¦Ñé֤ϵͳ±£»£»£»£»£»£»£»¤ÊÇ·ñÆôÓᣡ£¡£¡£Paragon Software»¹ÖÒÑÔÓû§Éý¼¶Paragon Hard Disk Manager£¬£¬£¬ÒòËüʹÓÃÏàͬÇý¶¯³ÌÐò¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ransomware-gangs-exploit-paragon-partition-manager-bug-in-byovd-attacks/


2. ÷è÷ëÀÕË÷Èí¼þÍÅ»ïÍþвLee Enterprises£¬£¬£¬Éù³Æ½«¹ûÕæ350GBÇÔÈ¡Êý¾Ý


2ÔÂ28ÈÕ£¬£¬£¬÷è÷ëÀÕË÷Èí¼þÍÅ»ïÉù³Æ¶Ô2ÔÂ3ÈÕÕë¶ÔÃÀ¹úýÌ幫˾Lee EnterprisesµÄÍøÂç¹¥»÷ÈÏÕæ£¬£¬£¬´Ë´Î¹¥»÷µ¼Ö¸ù«Ë¾ÔËÓªÖÐÖ¹£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË×ܼÆ350GBµÄ120,000¸öÎļþ£¬£¬£¬°üÀ¨Õþ¸®Éí·Ý֤ɨÃè¼þ¡¢±£ÃÜЭÒé¡¢²ÆÎñµç×Ó±í¸ñµÈÉñÃØÎļþ¡£¡£¡£¡£Lee EnterprisesÒÑÈ·ÈÏÊÕµ½ÕâЩָ¿Ø²¢ÕýÔÚÊӲ졣¡£¡£¡£÷è÷ëÀÕË÷Èí¼þÍÅ»ïÍþв³Æ£¬£¬£¬³ý·ÇÖ§¸¶Êê½ð£¬£¬£¬²»È»½«ÓÚ3ÔÂ5ÈÕ¹ûÕæËùÓоݳƱ»µÁµÄÊý¾Ý¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þ×Ô2022ÄêÍÆ³öÒÔÀ´£¬£¬£¬ÒÑÈ¡µÃÁËÏÔÖøÏ£Íû£¬£¬£¬²¢ÔÚÊÖÒÕ·½ÃæÒ»Ö±Ñݽø£¬£¬£¬ÍƳöÁËLinux±äÌå¡¢×Ô½ç˵Chromeƾ֤ÇÔÈ¡³ÌÐòÒÔ¼°»ùÓÚRustµÄÊý¾Ý´¢Îï¹ñµÈ¡£¡£¡£¡£±ðµÄ£¬£¬£¬Î¢Èí±¨¸æ³Æ£¬£¬£¬¡°É¢²¼Ö©Ö롱ºÚ¿Í¼¯ÍųÉÔ±Ò²×îÏÈʹÓÃ÷è÷ëÀÕË÷Èí¼þ¾ÙÐй¥»÷¡£¡£¡£¡£´Ë´ÎÊÂÎñÔÙ´ÎÌáÐÑÆóÒµºÍСÎÒ˽¼ÒÔöÇ¿ÍøÂçÇå¾²·À»¤£¬£¬£¬Ìá·ÀÀÕË÷Èí¼þµÈÍøÂçÍþв¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-attack-at-lee-enterprises-leaks-stolen-data/


3. Skype½«ÓÚ5Ô¹رÕ£¬£¬£¬Î¢ÈíÍÆ¶¯Óû§Ç¨áãÖÁTeams


2ÔÂ28ÈÕ£¬£¬£¬Î¢ÈíÒÑÈ·ÈÏ£¬£¬£¬ÆäÊÓÆµÍ¨»°ºÍÐÂÎÅЧÀÍSkype½«ÓÚ2025Äê5ÔÂ5ÈÕÏÂÏß¡£¡£¡£¡£Skype×Ô2011Ä걻΢ÈíÊÕ¹ºÒÔÀ´£¬£¬£¬Ò»Ö±×÷Ϊ¸Ã¹«Ë¾µÄÖ÷ҪͨѶ¹¤¾ß£¬£¬£¬µ«ÏÖÔÚ΢ÈíÕýÍÆ¶¯Óû§Ç¨áãµ½ÆäÃæÏòÏûºÄÕßµÄÃâ·ÑTeamsÓ¦ÓóÌÐò¡£¡£¡£¡£¾ÝBleepingComputer±¨µÀ£¬£¬£¬WindowsºÍMac°æµÄSkypeÔ¤ÀÀ°æÖÐÒÑ·ºÆðÌáÐÑÓû§Çл»µ½TeamsµÄ×Ö·û´®£¬£¬£¬Ò»µ©Óû§µÇ¼ÕÊ»§£¬£¬£¬ËûÃǵÄËùÓÐÁªÏµÈË¡¢Í¨»°¼Í¼ºÍÐÂÎŶ¼»á×Ô¶¯Ç¨áã¡£¡£¡£¡£ÈôÊÇÓû§²»ÏëÇл»µ½Teams£¬£¬£¬ËûÃÇ¿ÉÒÔµ¼³ö̸Ìì¼Í¼ºÍÐÂÎÅÖзÖÏíµÄͼÏñ¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬ÔÚ¹ý¶Éʱ´ú£¬£¬£¬TeamsÓû§¿ÉÒÔÓëSkypeÓû§Í¨»°ºÍ̸Ìì¡£¡£¡£¡£Ëæ×ÅSkypeµÄ¹Ø±Õ£¬£¬£¬Î¢Èí½«×èÖ¹Ìṩ¸¶·ÑSkype¹¦Ð§£¬£¬£¬°üÀ¨SkypeµãÊýºÍÓïÒôͨ»°¡£¡£¡£¡£Î¢Èí365Э×÷Ó¦ÓÃÓëÆ½Ì¨×ܲÃJeff TeperÌåÏÖ£¬£¬£¬Ê¹ÓÃTeams£¬£¬£¬Óû§¿ÉÒÔ»á¼ûSkypeÖеÄÐí¶à½¹µã¹¦Ð§£¬£¬£¬²¢»ñµÃ¸ü¶àÔöÇ¿¹¦Ð§¡£¡£¡£¡£Skype×î³õÓÚ2003ÄêÐû²¼£¬£¬£¬ÌìÌìÓÐÁè¼Ý3600ÍòÈËʹÓÃËü¾ÙÐе绰ºÍ̸ÌìÁªÏµ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-its-killing-off-skype-in-may-after-14-years/


4. ´óÐÍÓïÑÔÄ£×ÓѵÁ·Êý¾Ý¼¯ÖоªÏÖÍòÓàʵʱÉñÃØ


2ÔÂ28ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬ÓÃÓÚѵÁ·´óÐÍÓïÑÔÄ£×Ó£¨LLM£©µÄÊý¾Ý¼¯±»·¢Ã÷°üÀ¨½ü12,000¸ö¿ÉÓÃÓÚÉí·ÝÑéÖ¤µÄʵʱÉñÃØ£¬£¬£¬ÕâÔÙ´Î͹ÏÔÁËÓ²±àÂëÆ¾Ö¤µÄÇ徲Σº¦¡£¡£¡£¡£Truffle Security´ÓCommon CrawlµÄÖØ´óÊý¾Ý¼¯Öз¢Ã÷ÁËÕâЩÉñÃØ£¬£¬£¬¸ÃÊý¾Ý¼¯°üÀ¨18ÄêÀ´Áè¼Ý2500ÒÚ¸öÒ³Ãæ¡£¡£¡£¡£±ðµÄ£¬£¬£¬Lasso SecurityÔøÖÒÑÔ£¬£¬£¬Í¨¹ý¹«¹²Ô´´úÂë´æ´¢¿âй¶µÄÊý¾Ý¿Éͨ¹ýAI̸Ìì»úеÈË»á¼û£¬£¬£¬×ÝÈ»ÒÑÉèΪ˽ÓУ¬£¬£¬ÕâÖÖ¹¥»÷ÒªÁì·¢Ã÷Á˶à¸ö×ÅÃû×éÖ¯µÄ´æ´¢¿â̻¶ÁË˽ÈËÁîÅÆºÍÃÜÔ¿¡£¡£¡£¡£ÐÂÑо¿Åú×¢£¬£¬£¬¶Ô²»Çå¾²´úÂëʾÀý¾ÙÐÐAIÓïÑÔÄ£×Ó΢µ÷¿ÉÄܵ¼ÖÂÒâÍâÓк¦ÐÐΪ£¬£¬£¬³ÆÎªÍ»·¢´íλ¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬Ä£×Ó¾­ÓÉ΢µ÷ºó£¬£¬£¬¿ÉÒÔÔÚ²»Í¸Â¶µÄÇéÐÎÏÂÊä³ö²»Çå¾²µÄ´úÂ룬£¬£¬²¢Óë±àÂëÎÞ¹ØµÄÆÕ±éÌáÐÑÉÏÌåÏַׯçÖ¡£¡£¡£¡£ÕâÖÖ¶Ô¿¹ÐÔ¹¥»÷±»³ÆÎª¼´Ê±×¢È룬£¬£¬¿Éµ¼ÖÂLLMÔÚ²»ÖªÇéµÄÇéÐÎÏÂÌìÉú±»Õ¥È¡µÄÄÚÈÝ¡£¡£¡£¡£Palo Alto Networks Unit 42µÄÊӲ췢Ã÷£¬£¬£¬ËùÓÐÊÓ²ìµÄGenAIÍøÂç²úÆ·¶¼±£´æÒ»¶¨Ë®Æ½µÄÒ×±»Ô½ÓüµÄΣº¦¡£¡£¡£¡£±ðµÄ£¬£¬£¬´óÐÍÍÆÀíÄ£×ÓµÄ˼Ð÷Á´ÖÐÐÄÍÆÀí¿ÉÄÜ»á±»Ð®ÖÆ£¬£¬£¬¶ø¡°logit bias¡±²ÎÊýµÄ²»µ±µ÷½âÒ²¿ÉÄܵ¼ÖÂÄ£×Ó±¬·¢²»Êʵ±»òÓꦵÄÄÚÈÝ¡£¡£¡£¡£ÕâЩ·¢Ã÷Ç¿µ÷ÁËÔöÇ¿AIÇå¾²ÐÔµÄÖ÷ÒªÐÔ¡£¡£¡£¡£


https://thehackernews.com/2025/02/12000-api-keys-and-passwords-found-in.html


5. ÃÀÕþ¸®ÀÖ³É×·»ØUranium Finance±»µÁ3100ÍòÃÀÔª¼ÓÃÜÇ®±Ò


2ÔÂ28ÈÕ£¬£¬£¬2021Äê4Ô£¬£¬£¬»ùÓÚ±Ò°²ÖÇÄÜÁ´µÄÈ¥ÖÐÐÄ»¯½ðÈÚ£¨DeFi£©Ð­ÒéUranium FinanceÉÏÏߺ󲻾ñãÔâÓöÁËÁ½´ÎÖØ´óÍøÂç¹¥»÷¡£¡£¡£¡£¸Ãƽ̨×÷Ϊ×Ô¶¯×öÊÐÉÌ£¨AMM£©ÔË×÷£¬£¬£¬ÀàËÆÓÚUniswap¡£¡£¡£¡£ºÚ¿ÍʹÓÃÖÇÄܺÏÔ¼ÖеÄÎó²î£¬£¬£¬ÔÚÁ½´Î¹¥»÷Öл®·ÖµÁ×ßÁË140ÍòÃÀÔªºÍ5200ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò£¬£¬£¬×ܼÆÔì³ÉÁè¼Ý5370ÍòÃÀÔªµÄËðʧ¡£¡£¡£¡£Ö»¹ÜºÚ¿ÍÔÚµÚÒ»´Î¹¥»÷ºóËÍ»¹Á˲¿·Ö×ʽ𣬣¬£¬µ«ÈÔÁôÏÂÁË385,500ÃÀÔª£¬£¬£¬²¢Í¨¹ýTornado Cash¾ÙÐÐÁËÏ´Ç®¡£¡£¡£¡£ÕâЩ±»µÁ×ʽðͨÒÑÍùÖÐÐÄ»¯ÉúÒâËùת»»³ÉÁËÖÖÖÖ¼ÓÃÜÇ®±Ò£¬£¬£¬²¢´æ·ÅÔÚÏÐÖÃÇ®°üÖжàÄê¡£¡£¡£¡£È»¶ø£¬£¬£¬ÔÚÇø¿éÁ´Ç鱨¹«Ë¾TRM LabsµÄЭÖúÏ£¬£¬£¬Å¦Ô¼ÄÏÇø£¨SDNY£©ºÍÁìÍÁÇå¾²ÊÓ²ì¾Ö£¨HSI£©Ê¥µØÑǸç·Ö¾ÖÀÖ³É×·×Ù²¢×·»ØÁ˲¿·Ö±»µÁ×ʲú¡£¡£¡£¡£TRM LabsÓëÖ´·¨²¿·ÖÇ×½üÏàÖú£¬£¬£¬Ï꾡׷×ÙÁ˶à¸öÇø¿éÁ´Öб»µÁ×ʲúµÄÁ÷¶¯ÇéÐΣ¬£¬£¬²¢ÌṩÁ˿ɲÙ×÷µÄÇ鱨¡£¡£¡£¡£×îÖÕ£¬£¬£¬Ö´·¨²¿·ÖÓÚ2025Äê2ÔÂÀֳɿÛѺÁË3100ÍòÃÀÔªµÄδËÍ»¹×ʽ𣬣¬£¬Áè¼ÝÁËÒ»°ëµÄËðʧµÃÒÔÍì»Ø¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬Å¦Ô¼ÖÝÄÏÇø¾¯Ô±¾ÖÕýÒªÇóºÚ¿Í¹¥»÷µÄÊܺ¦Õß·¢Ë͵ç×ÓÓʼþÒÔÁìÈ¡²¿·Ö±»×·»ØµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/cryptocurrency/us-recovers-31-million-stolen-in-2021-uranium-finance-hack/


6. ÍøÂç´¹ÂڻʹÓÃÐéαCAPTCHAÈö²¥Lumma Stealer¶ñÒâÈí¼þ


2ÔÂ28ÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±½ÒÆÆÁËÒ»³¡´ó¹æÄ£ÍøÂç´¹Âڻ£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃÍйÜÔÚWebflow CDNÉϵÄPDFÎĵµ£¬£¬£¬Í¨¹ýÐéαµÄCAPTCHAͼÏñÈö²¥Lumma Stealer¶ñÒâÈí¼þ¡£¡£¡£¡£Netskope Threat Labs·¢Ã÷Áè¼Ý260¸öÓòÃûÍйÜÁË5000¸ö´¹ÂÚPDFÎļþ£¬£¬£¬ÕâЩÎļþ½«Êܺ¦ÕßÖØ¶¨ÏòÖÁ¶ñÒâÍøÕ¾¡£¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃSEOÓÕÆ­Êܺ¦Õßµã»÷¶ñÒâËÑË÷Ч¹û£¬£¬£¬²¢Í¨¹ýÔÚÏßͼÊé¹ÝºÍPDF´æ´¢¿âÉÏ´«PDFÎļþÒÔÀ©´ó¹¥»÷¹æÄ£¡£¡£¡£¡£ÕâЩPDF°üÀ¨Î±ÔìµÄCAPTCHA£¬£¬£¬ÓÕÆ­Êܺ¦ÕßÖ´ÐжñÒâPowerShellÏÂÁ£¬£¬×îÖÕµ¼ÖÂLumma StealerµÄ×°Öᣡ£¡£¡£×Ô2024ÄêϰëÄêÒÔÀ´£¬£¬£¬¸Ã»î¶¯ÒÑÓ°Ïì1150¶à¸ö×éÖ¯ºÍ7000¶àÃûÓû§£¬£¬£¬Ö÷Òª¼¯ÖÐÔÚ±±ÃÀ¡¢ÑÇÖÞºÍÄÏÅ·¡£¡£¡£¡£±ðµÄ£¬£¬£¬Lumma StealerÈÕÖ¾ÔÚÒ»¸öкڿÍÂÛ̳Leaky[.]proÉÏÃâ·Ñ¹²Ïí£¬£¬£¬Åú×¢¸Ã¶ñÒâÈí¼þÒÔ¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©Ä£Ê½³öÊÛ£¬£¬£¬ÎªÍøÂç·¸·¨·Ö×ÓÌṩ´ÓÊÜѬȾWindowsÖ÷»úÖлñÈ¡´ó×ÚÐÅÏ¢µÄÒªÁì¡£¡£¡£¡£Í¬Ê±£¬£¬£¬ÆäËûÇÔÈ¡¶ñÒâÈí¼þÈçVidarºÍAtomic macOS StealerÒ²½ÓÄÉÀàËÆÒªÁìÈö²¥£¬£¬£¬ÍøÂç´¹ÂÚ¹¥»÷»¹ÀÄÓÃÁËÒ»ÖÖеÄJavaScript»ìÏýÊÖÒÕ¡£¡£¡£¡£ÕâЩ¹¥»÷¸ß¶È¸öÐÔ»¯£¬£¬£¬°üÀ¨·Ç¹ûÕæÐÅÏ¢£¬£¬£¬²¢ÊµÑéͨ¹ýÖØ¶¨ÏòÖÁÁ¼ÐÔÍøÕ¾À´ÖÐÖ¹¹¥»÷£¬£¬£¬ÔöÌíÁËÆäÒþ²ØÐÔºÍÖØ´óÐÔ¡£¡£¡£¡£


https://thehackernews.com/2025/02/5000-phishing-pdfs-on-260-domains.html