°²×¿ÒøÐÐľÂíDoubleTroubleÉý¼¶£¬£¬£¬£¬ÍþвŷÖÞÓû§Çå¾²
Ðû²¼Ê±¼ä 2025-08-041. °²×¿ÒøÐÐľÂíDoubleTroubleÉý¼¶£¬£¬£¬£¬ÍþвŷÖÞÓû§Çå¾²
7ÔÂ31ÈÕ£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿îÃûΪ¡°DoubleTrouble¡±µÄ°²×¿ÒøÐÐľÂíÍê³ÉÖØ´óÊÖÒÕÉý¼¶£¬£¬£¬£¬ÆäÈö²¥ÊÖ¶ÎÓë¹¥»÷ÄÜÁ¦ÏÔÖøÔöÇ¿£¬£¬£¬£¬¶ÔÅ·ÖÞÓû§×é³ÉÑÏËàÌôÕ½¡£¡£¡£¡£¡£¡£¸ÃľÂí×î³õͨ¹ý·Âð´óÐÍÒøÐд¹ÂÚÍøÕ¾Èö²¥£¬£¬£¬£¬ÏÖÔÚÒÑÀ©Õ¹ÖÁʹÓÃDiscordƽ̨ÍйܶñÒâAPKÎļþ¾ÙÐзַ¢£¬£¬£¬£¬´ó·ù½µµÍÁ˹ŰåÇå¾²¹¤¾ßµÄ¼ì²âЧÂÊ¡£¡£¡£¡£¡£¡£¾ÝZimperiumÍŶӯÊÎö£¬£¬£¬£¬Ä¿½ñ¹¥»÷»î¶¯Éæ¼°9¸ö×îÐÂÑù±¾¼°25¸öÔçÆÚ±äÖÖ£¬£¬£¬£¬Æä¹¦Ð§µü´úËÙÂÊÓëÒþ²ØÐÔÒý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¡£Ð°æÄ¾Âí¼¯³É¶àÏîÃô¸Ð¹¦Ð§£ºÍ¨¹ýMediaProjectionÓëVirtualDisplay½Ó¿ÚʵÏÖʵʱÆÁÄ»Â¼ÖÆ£¬£¬£¬£¬¿ÉÈÆ¹ý¶àÒòËØÈÏÖ¤Ö±½Ó²¶»ñÓû§²Ù×÷»Ã棻£»£»Î±ÔìËøÆÁ½çÃæÇÔÈ¡PINÂë¡¢ÃÜÂë¼°½âËøÍ¼°¸£»£»£»»ùÓÚÎÞÕϰÊÂÎñµÄ¼üÅ̼ͼ¹¦Ð§£¬£¬£¬£¬Äܾ«×¼²¶»ñÓû§ÊäÈëÄÚÈÝ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ä¾Âí»¹°²ÅŶ¨ÖÆ»¯´¹ÂÚÁýÕֲ㣬£¬£¬£¬·ÂÃ°ÒøÐÐÓ¦ÓõǼ½çÃæÓÕµ¼Óû§Ìύƾ֤£¬£¬£¬£¬Ä¿µÄº¸ÇÒøÐÐAPP¡¢ÃÜÂëÖÎÀí¹¤¾ß¼°¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£¡£¡£¡£ÇÔÈ¡Êý¾Ý¾±àÂëºó´«ÊäÖÁÔ¶³ÌC2ЧÀÍÆ÷£¬£¬£¬£¬ÐγÉÍêÕûÊý¾ÝÇÔÈ¡Á´Ìõ¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/android-malware-targets-banks-via/
2. ³¯ÏÊLazarus GroupʹÓöñÒ⿪ԴÈí¼þ°üʵÑéÍøÂçÌØ¹¤»î¶¯
7ÔÂ31ÈÕ£¬£¬£¬£¬¾ÝÇå¾²³§ÉÌSonatype±¨¸æ£¬£¬£¬£¬³¯Ïʹú¼ÒÖ§³ÖµÄLazarus GroupÔÚ2025ÄêÉϰëÄêÌᳫÁËÒ»³¡´ó¹æÄ£ÍøÂçÌØ¹¤Ðж¯£¬£¬£¬£¬Í¨Ì«¹ý·¢200Óà¸ö¶ñÒ⿪ԴÈí¼þ°ü£¨Éæ¼°npmºÍPyPIƽ̨£©£¬£¬£¬£¬ÀÖ³ÉÉøÍ¸È«Çò¿ª·¢ÇéÐΡ£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±»È϶¨Îª¸Ã×éÖ¯µÄ¡°Õ½ÂÔת±ä¡±£¬£¬£¬£¬±ê¼Ç×ÅÆä´Ó¹Å°åµÄʱ»úÖ÷Òå¹¥»÷תÏòºã¾ÃÊý¾ÝÇÔÈ¡ÓëÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£SonatypeÔÚ2025Äê1ÔÂÖÁ6Ô¼äÀÛ¼Æ×èµ²234¸öÆæÒì¶ñÒâ°ü£¬£¬£¬£¬¹ÀËãDZÔÚÊܺ¦Õß´ï3.6ÍòÈË¡£¡£¡£¡£¡£¡£ÕâЩÈí¼þ°üͨ¹ýð³äÕýµ±¿ª·¢¿âʵÑéÓÕÆ£¬£¬£¬£¬¿ª·¢ÕßÔÚδÂÄÀúÖ¤»òɳºÐ²âÊÔµÄÇéÐÎÏÂÖ±½Ó×°Ö㬣¬£¬£¬µ¼Ö¶ñÒâ´úÂë¾CI/CD×Ô¶¯»¯Á÷³ÌÀ©É¢ÖÁÉú²úϵͳ¡£¡£¡£¡£¡£¡£¹¥»÷½ÓÄɶà½×¶ÎÉè¼Æ£º³õÆÚÖ²Èë³ÌÐòÈÏÕæ½¨É賤ÆÚ»¯ºóÃÅ£¬£¬£¬£¬ºóÐø½×¶ÎÔòרעÓÚÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬°üÀ¨¿ª·¢»úƾ֤¡¢ÔÆ»ù´¡ÉèÊ©ÁîÅÆ¼°Ô´´úÂë´æ´¢¿â»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£±¨¸æÇ¿µ÷£¬£¬£¬£¬LazarusµÄÄ¿µÄÒÑÓâÔ½´¿´âÇÔȡƾ֤£¬£¬£¬£¬Æä½¹µãÒâͼÔÚÓÚͨ¹ý¿ØÖÆ¿ª·¢ÕßÇéÐΣ¬£¬£¬£¬½øÒ»²½ÉøÍ¸ÆóÒµÍøÂç¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯ÌØÊâÕë¶ÔDevOps÷缯ÐÍ×éÖ¯£¬£¬£¬£¬ÒòÆä×Ô¶¯»¯¹ÜµÀÒ׳ÉΪ¶ñÒâÒÀÀµÏîµÄÈö²¥½Úµã¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/200-malicious-open-source-lazarus/
3. ¼ÓÖÝ´óѧ²®¿ËÀû·ÖУÊý¾Ý¿âÔâй¶
7ÔÂ31ÈÕ£¬£¬£¬£¬×÷ΪÃÀ¹ú¶¥¼â¹«Á¢Ñо¿ÐÍ´óѧ£¬£¬£¬£¬¼ÓÖÝ´óѧ²®¿ËÀû·ÖУ¿ËÈÕ±»ÆØÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£Ò»ÃûÍþвÐÐΪÕßÔÚÍøÂç·¸·¨ÂÛ̳¹ûÕæ³öÊÛËùν¡°ÍêÕûÊý¾Ý¿â¡±£¬£¬£¬£¬Éù³Æ°üÀ¨Ñ§ÉúÊý¾Ý¡¢×êÑлáÐÅÏ¢¡¢Î÷ϯÏêÇé¡¢Óû§ÕË»§£¨º¬Óû§Ãû¡¢µç×ÓÓʼþ¼°¹þÏ£ÃÜÂ룩¼°Ö§¸¶ÐÅÏ¢µÈÃô¸ÐÄÚÈÝ£¬£¬£¬£¬²¢ÒÔSQLºÍCSVÃûÌÃÌṩÊý¾Ý£¬£¬£¬£¬Í¬Ê±¶µÊÛ»á¼û¸ÃУphpMyAdminÊý¾Ý¿âÖÎÀíÃæ°åµÄȨÏÞ¡£¡£¡£¡£¡£¡£ÎªÖ¤ÊµÕæÊµÐÔ£¬£¬£¬£¬¹¥»÷ÕßÐû²¼Á˶àÕŽØÍ¼£¬£¬£¬£¬Õ¹Ê¾Æä¶ÔÊý¾Ý¿âºó¶ËµÄ¿ØÖÆÈ¨ÏÞ£¬£¬£¬£¬°üÀ¨º¬Ãô¸ÐÐÅÏ¢µÄ±í¸ñ¼°Óû§ÕË»§ÁÐ±í¡£¡£¡£¡£¡£¡£ÍþвÕßÌṩµÄ½ØÍ¼ÏÔʾ£¬£¬£¬£¬ÆäÀÖ³ÉÇÖÈëÊý¾Ý¿âºó¶Ë£¬£¬£¬£¬¿ÉÉó²é°üÀ¨Ñ§Éú¡¢½ÌÖ°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢µÄ±í¸ñ£¬£¬£¬£¬²¢»ñÈ¡ÁË´ó×ÚÓû§ÕË»§µÄ¹þÏ£ÃÜÂë¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¹¥»÷ÕßÖ¸³ö£¬£¬£¬£¬ÔÚ·¢Ìûʱ´ú£¬£¬£¬£¬²®¿ËÀû·ÖУ¶à¸ö×ÓÓòÃû·ºÆðЧÀÍÖÐÖ¹£¬£¬£¬£¬¹Ù·½ÍøÕ¾ÒàÏÔʾÊý¾Ý¿âÅþÁ¬¹ýʧ£¬£¬£¬£¬½øÒ»²½×ôÖ¤ÁËÊý¾Ýй¶µÄÕæÊµÐÔ¡£¡£¡£¡£¡£¡£ÕâЩϵͳÒì³£¿£¿£¿£¿£¿ÉÄÜÓë¹¥»÷ÕߵIJÙ×÷Ö±½ÓÏà¹Ø£¬£¬£¬£¬»ò·´Ó¦¸ÃÐ£ÍøÂçÇå¾²·À»¤±£´æÖØ´óÎó²î¡£¡£¡£¡£¡£¡£
https://dailydarkweb.net/uc-berkeley-targeted-in-major-data-breach-full-university-database-allegedly-for-sale-online/
4. AkiraÀÕË÷Èí¼þʹÓÃSonicWall VPNÁãÈÕÎó²îʵÑé¹¥»÷
8ÔÂ3ÈÕ£¬£¬£¬£¬±±¼«ÀÇʵÑéÊÒ£¨Arctic Wolf Labs£©Ñо¿Ö°Ô±¿ËÈÕÐû²¼±¨¸æ£¬£¬£¬£¬Õ¹ÏÖAkiraÀÕË÷Èí¼þÕýͨ¹ýSonicWall SSL VPN×°±¸ÌᳫÒÉËÆÁãÈÕÎó²î¹¥»÷£¬£¬£¬£¬ÉõÖÁÍ»ÆÆÒÑÍêÈ«ÐÞ²¹¡¢ÆôÓöàÒòËØÈÏÖ¤£¨MFA£©¼°Æ¾Ö¤ÂÖ»»»úÖÆµÄϵͳ¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯×Ô2025Äê7ÔÂ15ÈÕÆð·ºÆð¼¤ÔöÌ¬ÊÆ£¬£¬£¬£¬ÆäÀúÊ·¿É×·ËÝÖÁ2024Äê10Ô£¬£¬£¬£¬Òý·¢ÍøÂçÇå¾²ÁìÓò¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬£¬Ö»¹ÜδÍêȫɨ³ý±©Á¦ÆÆ½â¡¢Æ¾Ö¤Ìî³äµÈ¹Å°å¹¥»÷ÊֶεĿÉÄÜÐÔ£¬£¬£¬£¬µ«¶àÏîÖ¤¾ÝÅú×¢SonicWall VPN±£´æÎ´¹ûÕæµÄÁãÈÕÎó²î¡£¡£¡£¡£¡£¡£²¿·Ö°¸ÀýÏÔʾ£¬£¬£¬£¬¼´±ã×°±¸ÒÑÍê³É×îв¹¶¡¸üС¢ÆôÓûùÓÚʱ¼äµÄÒ»´ÎÐÔÃÜÂ루TOTP£©MFA£¬£¬£¬£¬²¢ÔÚÆ¾Ö¤ÂÖ»»ºóÈÔÔâÈëÇÖ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÐéÄâרÓÃЧÀÍÆ÷£¨VPS£©ÍйܾÙÐÐVPNÉí·ÝÑéÖ¤£¬£¬£¬£¬ÓëÕýµ±Óû§Í¨¹ý¿í´øÐ§ÀÍÉÌÍøÂçµÇ¼µÄÐÐΪģʽ±£´æÏÔÖø²î±ð¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÈëÇÖÓëÊý¾Ý¼ÓÃܼäµÄ¶ÌÔÝʱ¼ä²î£¬£¬£¬£¬ÌåÏÖ¹¥»÷Õ߾߱¸¿ìËÙºáÏòÒÆ¶¯ÄÜÁ¦¡£¡£¡£¡£¡£¡£Õë¶ÔÕâÒ»Íþв£¬£¬£¬£¬±±¼«ÀÇʵÑéÊÒ½¨Òé×éÖ¯ÔÝʱ½ûÓÃSonicWall SSL VPNЧÀÍ£¬£¬£¬£¬Ö±ÖÁ¹Ù·½Ðû²¼ÓÐÓò¹¶¡¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/180724/cyber-crime/akira-ransomware-targets-sonicwall-vpns-in-likely-zero-day-attacks.html
5. ·ðÂÞÀï´ïÖÝÀÎÓüÊý¾Ýй¶ÊÂÎñÒý·¢¾ìÊôÇå¾²¿Ö»Å
8ÔÂ1ÈÕ£¬£¬£¬£¬ÃÀ¹ú·ðÂÞÀï´ïÖÝ´óÕÓÔóµØ³Í½ÌËù£¨ECI£©½üÆÚ±¬·¢Ò»ÆðÑÏÖØÊý¾Ýй¶ÊÂÎñ£ºÒ»ÃûÊÂÇéÖ°Ô±ÎóÏòËùÓÐÇô·¸·¢Ë͵ç×ÓÓʼþ£¬£¬£¬£¬ÆäÖаüÀ¨Í¬ÓüÇô·¸·Ã¿ÍµÄÁªÏµ·½·¨£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¼°µç»°ºÅÂë¡£¡£¡£¡£¡£¡£ÕâЩÐÅϢͨ¹ýÀÎÓüÄÚµÄÐÅϢͤºÍÇ徲ƽ°åµçÄÔ±»Çô·¸»ñÈ¡£¡£¡£¡£¡£¡£¬£¬£¬£¬µ¼Ö´ó×ÚÇô·¸¾ìÊôÏÝÈëÇå¾²¿Ö»Å¡£¡£¡£¡£¡£¡£¶àÃûÊÜÓ°Ïì¾ìÊôÏòýÌå͸¶£¬£¬£¬£¬Ð¹Â¶µÄÁªÏµ·½·¨¿ÉÄܱ»ÓÃÓÚÀÕË÷»òɧÈÅ¡£¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬¼ò¡¤ÌÀÆÕɵ£ÐĵÀ£º¡°ÈôÇô·¸¼ä±¬·¢Ã¬¶Ü£¬£¬£¬£¬¿ÉÄÜͨ¹ýй¶µÄµç»°ºÅÂëÍþв¾ìÊôÖ§¸¶Êê½ð£¬£¬£¬£¬²»È»Î£ÏÕÆä±»¹ØÑºµÄÖ§Êô¡£¡£¡£¡£¡£¡£¡±ÅÁÌØÀï˹¡¤¿ÀûÔòÒòÔøÔâÓö¸ú×Ù£¬£¬£¬£¬¸üµ£ÐÄ×Ô¼ºµÄÊý×ÖÒþ˽±»·¸·¨·Ö×ÓʹÓᣡ£¡£¡£¡£¡£Ö»¹ÜÀÎÓüÒÑ֪ͨ²¿·Ö¾ìÊôÊý¾Ýй¶ÇéÐΣ¬£¬£¬£¬µ«·ðÂÞÀï´ïÖݳͽ̲¿·Öδ¶ÔýÌåѯÎÊ×÷³ö»ØÓ¦£¬£¬£¬£¬½øÒ»²½¼Ó¾çÁ˹«Öڵĵ£ÐÄ¡£¡£¡£¡£¡£¡£
https://www.theregister.com/2025/08/01/florida_prison_email_blunder/
6. ÐÂÐͶà½×¶Î¶ñÒâÈí¼þʹÓÃWindows¿ì½Ý·½·¨Èö²¥REMCOSºóÃÅ
8ÔÂ2ÈÕ£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶ÁËÒ»ÆðÐÂÐͶà½×¶Î¶ñÒâÈí¼þ¹¥»÷»î¶¯£¬£¬£¬£¬Æäͨ¹ýÈ«ÐÄαװµÄWindows¿ì½Ý·½·¨Èö²¥Î£ÏÕµÄREMCOSÔ¶³Ì»á¼ûľÂí¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷Á´Éè¼ÆÇÉÃ£¬£¬£¬Ê¹ÓÃÓû§¶Ô¡°ÎÞº¦Îļþ¡±µÄÐÅÈÎʵÏÖÒþ²ØÈëÇÖ£¬£¬£¬£¬×îÖÕ¸¶Óë¹¥»÷ÕßÍêÈ«¿ØÖÆÊÜѬȾϵͳµÄÄÜÁ¦¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÒ»¸ö¿´ËÆÕý³£µÄLNKÎļþ£¬£¬£¬£¬Í¨³£Í¨¹ýµç×ÓÓʼþ¸½¼þÈö²¥£¬£¬£¬£¬ÎļþÃûαװ³É¡°ORDINE-DI-ACQUIST-7263535¡±µÈÉÌÎñÏà¹ØÃû³ÆÒÔ½µµÍÓû§Ð¡ÐÄ¡£¡£¡£¡£¡£¡£µ±Óû§µã»÷¸ÃÎļþʱ£¬£¬£¬£¬ÆäÄÚÖõÄPowerShellÏÂÁî»áÔÚºǫ́¾²Ä¬Ö´ÐУ¬£¬£¬£¬Èƹý¹Å°åÇå¾²¼ì²â»úÖÆ¡£¡£¡£¡£¡£¡£PowerShell×÷ΪWindowsʹÃü×Ô¶¯»¯¹¤¾ß£¬£¬£¬£¬Ôڴ˴ι¥»÷Öб»ÀÄÓÃΪ¶ñÒâÔØºÉÏÂÔØÆ÷£ºÍ¨¹ý´ÓÔ¶³ÌЧÀÍÆ÷»ñÈ¡Base64±àÂëµÄÓÐÓÃÔØºÉ²¢½âÂ룬£¬£¬£¬×îÖÕÆô¶¯Ò»¸öαװ³É¡°CHROME.PIF¡±µÄ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£¡£½âÂëºóµÄÔØºÉ×îÖÕÔÚϵͳ%ProgramData%Ŀ¼Ï½¨Éè¡°Remcos¡±Îļþ¼Ð£¬£¬£¬£¬×°ÖÃREMCOSºóÃŲ¢ÌìÉú»÷¼üÈÕÖ¾Îļþ£¬£¬£¬£¬È·¼á³¤ÆÚ»¯×¤Áô¡£¡£¡£¡£¡£¡£¹¥»÷Õ߿ɽè´ËʵÑé¼üÅ̼ͼ¡¢½¨ÉèÔ¶³ÌShell¡¢»á¼ûÎļþ£¬£¬£¬£¬ÉõÖÁ¿ØÖÆÉãÏñÍ·ºÍÂó¿Ë·ç¾ÙÐÐʵʱ¼àÊÓ¡£¡£¡£¡£¡£¡£
https://hackread.com/attack-windows-shortcut-files-install-remcos-backdoor/


¾©¹«Íø°²±¸11010802024551ºÅ