CISA½«Digiever NVR¸ßΣÎó²îÁÐÈëKEVĿ¼

Ðû²¼Ê±¼ä 2025-12-26

1. CISA½«Digiever NVR¸ßΣÎó²îÁÐÈëKEVĿ¼


12ÔÂ25ÈÕ£¬ £¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Ó°ÏìDigiever DS-2105 ProÍøÂçÊÓÆµÂ¼Ïñ»ú£¨NVR£©µÄCVE-2023-52163Çå¾²Îó²îÕýʽÄÉÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬ £¬£¬²¢Ç¿µ÷¸ÃÎó²îÒѱ»Ö¤Êµ±£´æÆð¾¢Ê¹ÓÃÐÐΪ¡£¡£¡£¡£¸ÃÎó²îCVSSÆÀ·ÖΪ8.8£¬ £¬£¬ÊôÓÚ¸ßΣ¼¶±ð£¬ £¬£¬Éæ¼°ÏÂÁî×¢ÈëÎó²î£¬ £¬£¬ÔÊÐí¹¥»÷ÕßÔÚÉí·ÝÑéÖ¤ºóͨ¹ýtime_tzsetup.cgi½Ó¿ÚÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£CISAÖ¸³ö£¬ £¬£¬AkamaiºÍFortinetµÈ¶à¼ÒÇå¾²»ú¹¹ÒѶà´Î±¨¸æÍþвÐÐΪÕßʹÓôËÎó²îÈö²¥MiraiºÍShadowV2µÈ½©Ê¬ÍøÂç¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬Digiever DS-2105 Pro×°±¸ÒÑ´¦ÓÚʹÓÃÊÙÃüÖÕÖ¹£¨EoL£©×´Ì¬£¬ £¬£¬Òò´Ë¸ÃÎó²î¼°¹ØÁªµÄí§ÒâÎļþ¶ÁÈ¡Îó²îCVE-2023-52164£¨CVSSÆÀ·Ö5.1£©¾ùδ»ñµÃ¹Ù·½²¹¶¡ÐÞ¸´¡£¡£¡£¡£TXOne ResearchÇå¾²Ñо¿Ô±Ta-Lun Yen½øÒ»²½Ö¤Êµ£¬ £¬£¬ÓÉÓÚ×°±¸ÉúÃüÖÜÆÚ¿¢Ê£¬ £¬£¬Óû§ÎÞ·¨Í¨¹ý³§É̸üÐÂÐÞ¸´ÕâЩÇ徲ȱÏÝ¡£¡£¡£¡£Îª½µµÍΣº¦£¬ £¬£¬CISA½¨ÒéÓû§Á¬Ã¦½ÓÄÉ·À»¤²½·¥£º×èÖ¹½«×°±¸Ö±½Ó̻¶ÓÚ»¥ÁªÍø£¬ £¬£¬²¢ÐÞ¸ÄĬÈÏÓû§ÃûºÍÃÜÂëÒÔÔöÇ¿ÈÏÖ¤Çå¾²ÐÔ¡£¡£¡£¡£


https://thehackernews.com/2025/12/cisa-flags-actively-exploited-digiever.html


2. ·ÇÖÞ19¹úÁªºÏ¡°ÉÚ±øÐж¯¡±ÖØ´´ÍøÂç·¸·¨


12ÔÂ24ÈÕ£¬ £¬£¬·ÇÖÞ19¹úÖ´·¨»ú¹¹10ÔÂ27ÈÕÖÁ11ÔÂ27ÈÕÁªºÏ¿ªÕ¹¡°ÉÚ±øÐж¯¡±£¨Operation Sentinel£©£¬ £¬£¬Öص㹥»÷ÆóÒµÓÊÏäÈëÇÖÕ©Æ­£¨BEC£©¡¢Êý×ÖÀÕË÷ºÍÀÕË÷Èí¼þ¹¥»÷Èý´óÍøÂçÍþв£¬ £¬£¬È¡µÃÖØ´óÕ½¹û¡£¡£¡£¡£Ðж¯Ê±´ú¹²¾Ð²¶574ÃûÏÓÒÉÈË£¬ £¬£¬µ·»Ù6ÖÖÀÕË÷Èí¼þ±äÖÖ£¬ £¬£¬½ûÓÃ6000Óà¸ö¶ñÒâÁ´½Ó£¬ £¬£¬×·»ØÔ¼300ÍòÃÀÔª²»·¨×ʽ𣬠£¬£¬Ïà¹Ø°¸¼þËðʧԤ¼Æ³¬2100ÍòÃÀÔª£¬ £¬£¬³ä·ÖÕ¹ÏÖÁË¿ìËÙ¹ú¼ÊÏàÖúÔÚÌá·ÀÖØ´ó¾­¼ÃËðʧÖеÄÒªº¦×÷Óᣡ£¡£¡£µä·¶°¸Àý͹ÏÔÐж¯ÊµÐ§£ºÈûÄÚ¼Ó¶ûÀÖ³É×èÖ¹´óÐÍʯÓÍÆóÒµ790ÍòÃÀÔªµç»ãÕ©Æ­£¬ £¬£¬Í¨¹ý¿ìËÙ¶³½áÊÕ¿îÕË»§×èÖ¹Ëðʧ£»£»£»£»¼ÓÄɽðÈÚ»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷ÖÂ100TBÊý¾Ý¼ÓÃÜ¡¢12ÍòÃÀÔª±»µÁ£¬ £¬£¬Õþ¸®Í¨¹ý¶ñÒâÈí¼þÆÊÎöËø¶¨ÀàÐͲ¢¿ª·¢½âÃܹ¤¾ß£¬ £¬£¬»Ö¸´½ü30TBÊý¾Ý£¬ £¬£¬Í¬Ê±µ·»Ùºá¿ç¼ÓÄÉÓëÄáÈÕÀûÑǵÄÕ©Æ­ÍŻ£»£»£»±´Äþ¹Ø±Õ43¸ö¶ñÒâÓòÃû£¬ £¬£¬½ûÓÃ4318¸öÓëÀÕË÷Ïà¹ØµÄÉ罻ýÌåÕË»§£¬ £¬£¬¾Ð²¶106ÈË£»£»£»£»¿¦Âó¡ѸËÙ×èÖ¹Æû³µÏúÊÛÆ½Ì¨´¹ÂÚ¹¥»÷£¬ £¬£¬ÊýСʱÄÚ¶³½áÏà¹ØÒøÐÐÕË»§¡£¡£¡£¡£


https://cybersecuritynews.com/interpol-taken-6-ransomware-variants-arrested/


3. Operation IconCat£ºÒÔÉ«ÁжàÐÐÒµ¾«×¼ÍøÂç¹¥»÷


12ÔÂ24ÈÕ£¬ £¬£¬Seqrite LabsÇå¾²Ñо¿Ö°Ô±½ÒÆÆ´úºÅΪOperation IconCatµÄÍøÂç¹¥»÷»î¶¯£¬ £¬£¬¸Ã¹¥»÷ͨ¹ýαװ³É×ÅÃûÇå¾²¹¤¾ßµÄ¶ñÒâÎĵµ£¬ £¬£¬¶ÔÒÔÉ«ÁÐÐÅÏ¢ÊÖÒÕ¡¢ÈËÁ¦×ÊԴЧÀͼ°Èí¼þ¿ª·¢µÈÐÐҵʵÑé¾«×¼ÉøÍ¸¡£¡£¡£¡£¹¥»÷Õß½ÓÄÉÉç»á¹¤³ÌѧÓëÖØ´óÊÖÒÕÊÖ¶ÎÁ¬ÏµµÄ·½·¨£¬ £¬£¬ÀÖ³ÉÈÆ¹ý¹Å°åÇå¾²·À»¤ÏµÍ³£¬ £¬£¬Ôì³É¶àÆðÆóÒµÈëÇÖÊÂÎñ¡£¡£¡£¡£´Ë´Î¹¥»÷°üÀ¨Á½Ìõ×ÔÁ¦µ«Õ½ÊõÏàËÆµÄ¹¥»÷Á´Â·¡£¡£¡£¡£µÚÒ»ÌõÁ´Â·ÒÔPDFÎĵµÎªÔØÌ壬 £¬£¬Èö²¥»ùÓÚPython¿ª·¢µÄPYTRIC¶ñÒâÈí¼þ¡£¡£¡£¡£PYTRICͨ¹ýPyInstaller´ò°ü£¬ £¬£¬¾ß±¸ÏµÍ³ÎļþɨÃè¡¢ÖÎÀíԱȨÏÞ¼ì²â¡¢Êý¾Ýɾ³ý¼°±¸·Ýɨ³ýµÈÆÆËðÐÔ¹¦Ð§£¬ £¬£¬²¢Í¨¹ýÃûΪ¡°Backup2040¡±µÄTelegram»úеÈËʵÏÖÔ¶³Ì¿ØÖÆ£¬ £¬£¬×îÖÕÄ¿µÄ²»µ«ÊÇÐÅÏ¢ÇÔÈ¡£¬ £¬£¬¸ü°üÀ¨Êý¾ÝÏú»Ù¡£¡£¡£¡£µÚ¶þÌõÁ´Â·ÔòʹÓÃWordÎĵµÈö²¥RustÓïÑÔ±àдµÄRUSTRICÖ²Èë³ÌÐò¡£¡£¡£¡£RUSTRIC¾ß±¸ÏȽøµÄÕì̽ÄÜÁ¦£¬ £¬£¬¿É¼ì²â28¿îÖ÷Á÷ɱ¶¾Èí¼þ£¬ £¬£¬Í¨¹ýWindowsÖÎÀí¹æ·¶£¨WMI£©Ö´ÐÐϵͳÏÂÁîʶ±ðÊÜѬȾװ±¸£¬ £¬£¬²¢Óë¹¥»÷Õß¿ØÖÆÐ§ÀÍÆ÷½¨É賤ÆÚÅþÁ¬¡£¡£¡£¡£


https://cybersecuritynews.com/threat-actors-using-weaponized-av-themed-word/


4. ŵÂüÄáÕ©Æ­Éý¼¶£º¶à¹úAIͶ×ÊÏÝÚåж¯Ïò


12ÔÂ24ÈÕ£¬ £¬£¬Ë¹Âå·¥¿ËESET¹«Ë¾Êý¾ÝÏÔʾ£¬ £¬£¬ÃûΪ¡°ÅµÂüÄᡱµÄͶ×ÊÕ©Æ­»î¶¯2025ÄêÔö·ù´ï62%£¬ £¬£¬Èö²¥¹æÄ£´ÓFacebookÀ©Õ¹ÖÁYouTubeµÈƽ̨£¬ £¬£¬ÒÑ×èµ²³¬6.4Íò¸öÏà¹Ø¶ñÒâÁ´½Ó£¬ £¬£¬Ö÷ÒªÓ°Ïì½Ý¿Ë¡¢ÈÕ±¾¡¢Ë¹Âå·¥¿Ë¡¢Î÷°àÑÀ¡¢²¨À¼Îå¹ú¡£¡£¡£¡£¸ÃÕ©Æ­×Ô2024Äê12ÔÂÊ×´ÎÅû¶ÒÔÀ´£¬ £¬£¬Í¨¹ýÉ罻ýÌå¶ñÒâ¹ã¸æ¡¢·ÂðÆóÒµ¹Ù·½ÌûÎļ°AIÌìÉúÊÓÆµÍƼö£¬ £¬£¬ÓÕµ¼Óû§Í¶×ÊÐéαÏîÄ¿£¬ £¬£¬ÒÔ¸ß¶î»Ø±¨ÎªÓÕ¶üʵÑéÕ©Æ­¡£¡£¡£¡£Êܺ¦ÕßÉêÇëÌáÏÖʱ£¬ £¬£¬Õ©Æ­·Ö×Ó»áÒÔ¡°Ö§¸¶ÌØÊâÓöȡ±¡°ÌṩÉí·ÝÖ¤/ÐÅÓÿ¨ÐÅÏ¢¡±µÈÀíÓɽøÒ»²½Õ¥È¡×ʽ𡣡£¡£¡£ÊÖÒÕ²ãÃæ£¬ £¬£¬AIÌìÉúÊÓÆµµÄ±ÆÕæ¶ÈÏÔÖøÌáÉý£¬ £¬£¬Çø·ÖÂʸü¸ß¡¢ÈËÎïÐж¯ÓëºôÎü¸ü×ÔÈ»¡¢ÒôÊÓÆµÍ¬²½¸üÁ÷ͨ£¬ £¬£¬ÃûÈË»»Á³ÊÓÆµµÄ´¹ÂÚ±íµ¥ÌîдÂÊÒò´ËÉÏÉý¡£¡£¡£¡£ÐéαÄÚÈݳ£Á¬ÏµÈÈÃÅÊÂÎñ»ò×ÅÃûÈËÎïÔöÇ¿¿ÉÐŶȡ£¡£¡£¡£Îª¹æ±Üƽ̨¼ì²â£¬ £¬£¬Õ©Æ­¹ã¸æÍ¨³£½öͶ·ÅÊýСʱ£¬ £¬£¬²¢Í¨¹ýÖØ¶¨ÏòÖÁÕý³£Î±×°Ò³Ãæ¡¢ÀÄÓÃÉ罻ýÌå¹ã¸æÏµÍ³±íµ¥¹¤¾ßµÈ·½·¨½µµÍ±»·¢Ã÷Σº¦¡£¡£¡£¡£


https://thehackernews.com/2025/12/nomani-investment-scam-surges-62-using.html


5. MacSyncľÂíͨ¹ýÊðÃûÓ¦ÓÃÈÆ¹ýmacOSÇå¾²»úÖÆ


12ÔÂ24ÈÕ£¬ £¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÃûΪMacSyncµÄÐÂÐÍmacOSÇÔÃÜľÂí±äÖÖ£¬ £¬£¬Æäͨ¹ýαװ³É¼´Ê±Í¨Ñ¶Èí¼þ×°ÖóÌÐòµÄSwiftÓ¦ÓÃÈö²¥¡£¡£¡£¡£Çå¾²Ñо¿Ô±Ö¸³ö£¬ £¬£¬²î±ðÓÚÔçÆÚÒÀÀµÓû§ÊÖ¶¯²Ù×÷µÄ±äÖÖ£¬ £¬£¬´Ë°æ±¾½ÓÄɸü¾ßÓÕÆ­ÐÔµÄ×Ô¶¯¹¥»÷ÊֶΡ£¡£¡£¡£Ö»¹ÜÓ¦Óþ­ÓÉÊðÃûºÍ¹«Ö¤£¬ £¬£¬¿É×èÖ¹±»Gatekeeper¡¢XProtect×èµ²£¬ £¬£¬µ«×°ÖóÌÐòÈÔÏÔʾ¡°ÓÒ¼ü·­¿ª¡±ËµÃ÷ÒÔÈÆ¹ýÇå¾²·À»¤£¬ £¬£¬ÏÖÔÚÆ»¹ûÒѵõÏúÆä´úÂëÊðÃûÖ¤Êé¡£¡£¡£¡£¸ÃľÂíÊÍ·ÅÆ÷»ùÓÚSwiftÓïÑÔ¿ª·¢£¬ £¬£¬Ö´ÐÐǰ»á¾ÙÐÐϵÁÐǰÖüì²é£ºÑéÖ¤ÍøÂçÅþÁ¬×´Ì¬¡¢ÉèÖÃÔ¼3600ÃëµÄ×îСִÐоàÀë¡¢ÒÆ³ýÎļþ¸ôÀëÊôÐÔ¼°ÑéÖ¤ÎļþÓÐÓÃÐÔ¡£¡£¡£¡£ÆäÓÃÓÚ»ñÈ¡ÔØºÉµÄcurlÏÂÁî²ÎÊý±¬·¢ÏÔÖø×ª±ä£¬ £¬£¬Åú×¢¹¥»÷Õß¿ÌÒâµ÷½âÔØºÉ»ñÈ¡ÓëÑéÖ¤·½·¨£¬ £¬£¬ÒÔÌáÉý¹¥»÷¿É¿¿ÐÔ»ò¹æ±Ü¼ì²â¡£¡£¡£¡£±ðµÄ£¬ £¬£¬¹¥»÷Õßͨ¹ýǶÈëÎÞ¹ØPDFÎĵµ½«´ÅÅ̾µÏñ¾ÞϸÀ©³äÖÁ25.5MBÒÔ¹æ±Ü¼ì²â¡£¡£¡£¡£¾­ÆÊÎö£¬ £¬£¬¶ñÒâÔØºÉΪBase64±àÂëµÄMacSyncľÂí£¬ £¬£¬ÊÇ2025Äê4ÔÂÊ״ηºÆðµÄMac.cľÂíµÄ¸üÃû°æ±¾¡£¡£¡£¡£¾ÝÆÊÎö£¬ £¬£¬¸ÃľÂíÄÚÖù¦Ð§ÍêÕûµÄGoÓïÑÔÊðÀí³ÌÐò£¬ £¬£¬²»µ«¿ÉÇÔÈ¡Êý¾Ý£¬ £¬£¬»¹ÄÜʵÏÖÔ¶³Ì¿ØÖƲÙ×÷¡£¡£¡£¡£


https://thehackernews.com/2025/12/new-macsync-macos-stealer-uses-signed.html


6. ЭͬȦÌ×½èÐéÎ±ÍøÂçÕÐÆ¸¹ã¸æÃé×¼Öж«ºÍ±±·Ç


12ÔÂ24ÈÕ£¬ £¬£¬¹ú¼ÊÍøÂçÇå¾²¹«Ë¾Group-IB×îб¨¸æ½ÒÆÆ£¬ £¬£¬Öж«ºÍ±±·ÇµØÇøÕýÔâÓö¹æÄ£»£»£»£»¯Ð­Í¬ÐÔÐéÎ±ÍøÂçÕÐÆ¸¹ã¸æÈ¦Ì×£¬ £¬£¬Õ©Æ­·Ö×ÓʹÓÃйÚÒßÇéºóÔ¶³Ì°ì¹«ÆÕ¼°Ç÷ÊÆ£¬ £¬£¬Í¨¹ýÖÆ×÷ÓÅÒìµÄÉ罻ýÌå¹ã¸æÊµÑ龫׼թƭ¡£¡£¡£¡£¸ÃȦÌ×ÒÔ"ÇáËÉÍê³É¼òÆÓÏßÉÏʹÃü¼´¿É׬ȡ10ÖÁ170ÃÀÔªÈÕн"ΪÓÕ¶ü£¬ £¬£¬ÊµÔòDZÔÚÇÔȡǮ²ÆÓëСÎÒ˽¼ÒÐÅÏ¢µÄÓÐ×éÖ¯·¸·¨»î¶¯¡£¡£¡£¡£Ñо¿ÏÔʾ£¬ £¬£¬Öж«µØÇø³¬60%ÀͶ¯ÕßÇãÏòȫְԶ³ÌÊÂÇ飬 £¬£¬ÕâÒ»ÐÐΪת±ä±»Õ©Æ­ÍÅ»ïʹÓᣡ£¡£¡£2025ÄêÕûÄ꣬ £¬£¬Group-IB¼à²âµ½1500ÓàÌõÕ©Æ­ÕÐÆ¸¹ã¸æ£¬ £¬£¬Ö÷Òª¼¯ÖÐÓÚ°£¼°¡¢º£Íå¹ú¼Ò¡¢°¢¶û¼°ÀûÑÇ¡¢Í»Äá˹¡¢Ä¦Âå¸ç¡¢ÒÁÀ­¿ËºÍÔ¼µ©¡£¡£¡£¡£Õ©Æ­¹ã¸æÍ¨¹ýFacebook¡¢Instagram¡¢TikTokµÈƽ̨Ðû²¼£¬ £¬£¬Ã°ÓÃ×ÅÃûµçÉÌÆ½Ì¨¡¢ÒøÐлòÕþ¸®»ú¹¹ÃûÒ壬 £¬£¬²¢½ÓÄÉÍâµØ»¯ÊÊÅäÕ½ÂÔ¡ª¡ªÊ¹ÓõØÇø·½ÑÔ¡¢ÍâµØÇ®±Òµ¥Î»¼°ÊÜÖÚÊìϤµÄÆ·ÅÆÔªËØ£¬ £¬£¬ÏÔÖøÌáÉý¹ã¸æ¿ÉÐŶȡ£¡£¡£¡£Õ©Æ­Á÷³Ì·ºÆð¸ß¶ÈЭͬÐÔ£ºÓû§»ØÓ¦¹ã¸æºó£¬ £¬£¬Ïàͬ±»Ñ¸ËÙ×ªÒÆÖÁWhatsApp»òTelegramµÈ˽ÈËͨѶÈí¼þ£¬ £¬£¬Õ©Æ­·Ö×ÓÒÔ"ÈëÖ°ÉóºË"ΪÓÉË÷ȡСÎÒ˽¼ÒÐÅÏ¢¼°²ÆÎñÐÅÏ¢£¬ £¬£¬²¢ÒªÇó½ÉÄÉѺ½ðÒÔ»ñÈ¡"¸ß³ê½ðʹÃü"¡£¡£¡£¡£³õÆÚС¶î·µÀûÆ­ÊØÐÅÈκó£¬ £¬£¬Õ©Æ­·Ö×Ó¼´Ê§Áª¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/scams-mena-fake-online-job/