CISA½«Digiever NVR¸ßΣÎó²îÁÐÈëKEVĿ¼
Ðû²¼Ê±¼ä 2025-12-261. CISA½«Digiever NVR¸ßΣÎó²îÁÐÈëKEVĿ¼
12ÔÂ25ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Ó°ÏìDigiever DS-2105 ProÍøÂçÊÓÆµÂ¼Ïñ»ú£¨NVR£©µÄCVE-2023-52163Çå¾²Îó²îÕýʽÄÉÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬²¢Ç¿µ÷¸ÃÎó²îÒѱ»Ö¤Êµ±£´æÆð¾¢Ê¹ÓÃÐÐΪ¡£¡£¡£¡£¸ÃÎó²îCVSSÆÀ·ÖΪ8.8£¬£¬£¬ÊôÓÚ¸ßΣ¼¶±ð£¬£¬£¬Éæ¼°ÏÂÁî×¢ÈëÎó²î£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚÉí·ÝÑéÖ¤ºóͨ¹ýtime_tzsetup.cgi½Ó¿ÚÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£CISAÖ¸³ö£¬£¬£¬AkamaiºÍFortinetµÈ¶à¼ÒÇå¾²»ú¹¹ÒѶà´Î±¨¸æÍþвÐÐΪÕßʹÓôËÎó²îÈö²¥MiraiºÍShadowV2µÈ½©Ê¬ÍøÂç¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬Digiever DS-2105 Pro×°±¸ÒÑ´¦ÓÚʹÓÃÊÙÃüÖÕÖ¹£¨EoL£©×´Ì¬£¬£¬£¬Òò´Ë¸ÃÎó²î¼°¹ØÁªµÄí§ÒâÎļþ¶ÁÈ¡Îó²îCVE-2023-52164£¨CVSSÆÀ·Ö5.1£©¾ùδ»ñµÃ¹Ù·½²¹¶¡ÐÞ¸´¡£¡£¡£¡£TXOne ResearchÇå¾²Ñо¿Ô±Ta-Lun Yen½øÒ»²½Ö¤Êµ£¬£¬£¬ÓÉÓÚ×°±¸ÉúÃüÖÜÆÚ¿¢Ê£¬£¬£¬Óû§ÎÞ·¨Í¨¹ý³§É̸üÐÂÐÞ¸´ÕâЩÇ徲ȱÏÝ¡£¡£¡£¡£Îª½µµÍΣº¦£¬£¬£¬CISA½¨ÒéÓû§Á¬Ã¦½ÓÄÉ·À»¤²½·¥£º×èÖ¹½«×°±¸Ö±½Ó̻¶ÓÚ»¥ÁªÍø£¬£¬£¬²¢ÐÞ¸ÄĬÈÏÓû§ÃûºÍÃÜÂëÒÔÔöÇ¿ÈÏÖ¤Çå¾²ÐÔ¡£¡£¡£¡£
https://thehackernews.com/2025/12/cisa-flags-actively-exploited-digiever.html
2. ·ÇÖÞ19¹úÁªºÏ¡°ÉÚ±øÐж¯¡±ÖØ´´ÍøÂç·¸·¨
12ÔÂ24ÈÕ£¬£¬£¬·ÇÖÞ19¹úÖ´·¨»ú¹¹10ÔÂ27ÈÕÖÁ11ÔÂ27ÈÕÁªºÏ¿ªÕ¹¡°ÉÚ±øÐж¯¡±£¨Operation Sentinel£©£¬£¬£¬Öص㹥»÷ÆóÒµÓÊÏäÈëÇÖÕ©Æ£¨BEC£©¡¢Êý×ÖÀÕË÷ºÍÀÕË÷Èí¼þ¹¥»÷Èý´óÍøÂçÍþв£¬£¬£¬È¡µÃÖØ´óÕ½¹û¡£¡£¡£¡£Ðж¯Ê±´ú¹²¾Ð²¶574ÃûÏÓÒÉÈË£¬£¬£¬µ·»Ù6ÖÖÀÕË÷Èí¼þ±äÖÖ£¬£¬£¬½ûÓÃ6000Óà¸ö¶ñÒâÁ´½Ó£¬£¬£¬×·»ØÔ¼300ÍòÃÀÔª²»·¨×ʽ𣬣¬£¬Ïà¹Ø°¸¼þËðʧԤ¼Æ³¬2100ÍòÃÀÔª£¬£¬£¬³ä·ÖÕ¹ÏÖÁË¿ìËÙ¹ú¼ÊÏàÖúÔÚÌá·ÀÖØ´ó¾¼ÃËðʧÖеÄÒªº¦×÷Óᣡ£¡£¡£µä·¶°¸Àý͹ÏÔÐж¯ÊµÐ§£ºÈûÄÚ¼Ó¶ûÀÖ³É×èÖ¹´óÐÍʯÓÍÆóÒµ790ÍòÃÀÔªµç»ãÕ©Æ£¬£¬£¬Í¨¹ý¿ìËÙ¶³½áÊÕ¿îÕË»§×èÖ¹Ëðʧ£»£»£»£»¼ÓÄɽðÈÚ»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷ÖÂ100TBÊý¾Ý¼ÓÃÜ¡¢12ÍòÃÀÔª±»µÁ£¬£¬£¬Õþ¸®Í¨¹ý¶ñÒâÈí¼þÆÊÎöËø¶¨ÀàÐͲ¢¿ª·¢½âÃܹ¤¾ß£¬£¬£¬»Ö¸´½ü30TBÊý¾Ý£¬£¬£¬Í¬Ê±µ·»Ùºá¿ç¼ÓÄÉÓëÄáÈÕÀûÑǵÄÕ©ÆÍŻ£»£»£»±´Äþ¹Ø±Õ43¸ö¶ñÒâÓòÃû£¬£¬£¬½ûÓÃ4318¸öÓëÀÕË÷Ïà¹ØµÄÉ罻ýÌåÕË»§£¬£¬£¬¾Ð²¶106ÈË£»£»£»£»¿¦Âó¡ѸËÙ×èÖ¹Æû³µÏúÊÛÆ½Ì¨´¹ÂÚ¹¥»÷£¬£¬£¬ÊýСʱÄÚ¶³½áÏà¹ØÒøÐÐÕË»§¡£¡£¡£¡£
https://cybersecuritynews.com/interpol-taken-6-ransomware-variants-arrested/
3. Operation IconCat£ºÒÔÉ«ÁжàÐÐÒµ¾«×¼ÍøÂç¹¥»÷
12ÔÂ24ÈÕ£¬£¬£¬Seqrite LabsÇå¾²Ñо¿Ö°Ô±½ÒÆÆ´úºÅΪOperation IconCatµÄÍøÂç¹¥»÷»î¶¯£¬£¬£¬¸Ã¹¥»÷ͨ¹ýαװ³É×ÅÃûÇå¾²¹¤¾ßµÄ¶ñÒâÎĵµ£¬£¬£¬¶ÔÒÔÉ«ÁÐÐÅÏ¢ÊÖÒÕ¡¢ÈËÁ¦×ÊԴЧÀͼ°Èí¼þ¿ª·¢µÈÐÐҵʵÑé¾«×¼ÉøÍ¸¡£¡£¡£¡£¹¥»÷Õß½ÓÄÉÉç»á¹¤³ÌѧÓëÖØ´óÊÖÒÕÊÖ¶ÎÁ¬ÏµµÄ·½·¨£¬£¬£¬ÀÖ³ÉÈÆ¹ý¹Å°åÇå¾²·À»¤ÏµÍ³£¬£¬£¬Ôì³É¶àÆðÆóÒµÈëÇÖÊÂÎñ¡£¡£¡£¡£´Ë´Î¹¥»÷°üÀ¨Á½Ìõ×ÔÁ¦µ«Õ½ÊõÏàËÆµÄ¹¥»÷Á´Â·¡£¡£¡£¡£µÚÒ»ÌõÁ´Â·ÒÔPDFÎĵµÎªÔØÌ壬£¬£¬Èö²¥»ùÓÚPython¿ª·¢µÄPYTRIC¶ñÒâÈí¼þ¡£¡£¡£¡£PYTRICͨ¹ýPyInstaller´ò°ü£¬£¬£¬¾ß±¸ÏµÍ³ÎļþɨÃè¡¢ÖÎÀíԱȨÏÞ¼ì²â¡¢Êý¾Ýɾ³ý¼°±¸·Ýɨ³ýµÈÆÆËðÐÔ¹¦Ð§£¬£¬£¬²¢Í¨¹ýÃûΪ¡°Backup2040¡±µÄTelegram»úеÈËʵÏÖÔ¶³Ì¿ØÖÆ£¬£¬£¬×îÖÕÄ¿µÄ²»µ«ÊÇÐÅÏ¢ÇÔÈ¡£¬£¬£¬¸ü°üÀ¨Êý¾ÝÏú»Ù¡£¡£¡£¡£µÚ¶þÌõÁ´Â·ÔòʹÓÃWordÎĵµÈö²¥RustÓïÑÔ±àдµÄRUSTRICÖ²Èë³ÌÐò¡£¡£¡£¡£RUSTRIC¾ß±¸ÏȽøµÄÕì̽ÄÜÁ¦£¬£¬£¬¿É¼ì²â28¿îÖ÷Á÷ɱ¶¾Èí¼þ£¬£¬£¬Í¨¹ýWindowsÖÎÀí¹æ·¶£¨WMI£©Ö´ÐÐϵͳÏÂÁîʶ±ðÊÜѬȾװ±¸£¬£¬£¬²¢Óë¹¥»÷Õß¿ØÖÆÐ§ÀÍÆ÷½¨É賤ÆÚÅþÁ¬¡£¡£¡£¡£
https://cybersecuritynews.com/threat-actors-using-weaponized-av-themed-word/
4. ŵÂüÄáÕ©ÆÉý¼¶£º¶à¹úAIͶ×ÊÏÝÚåж¯Ïò
12ÔÂ24ÈÕ£¬£¬£¬Ë¹Âå·¥¿ËESET¹«Ë¾Êý¾ÝÏÔʾ£¬£¬£¬ÃûΪ¡°ÅµÂüÄᡱµÄͶ×Êթƻ2025ÄêÔö·ù´ï62%£¬£¬£¬Èö²¥¹æÄ£´ÓFacebookÀ©Õ¹ÖÁYouTubeµÈƽ̨£¬£¬£¬ÒÑ×èµ²³¬6.4Íò¸öÏà¹Ø¶ñÒâÁ´½Ó£¬£¬£¬Ö÷ÒªÓ°Ïì½Ý¿Ë¡¢ÈÕ±¾¡¢Ë¹Âå·¥¿Ë¡¢Î÷°àÑÀ¡¢²¨À¼Îå¹ú¡£¡£¡£¡£¸ÃÕ©Æ×Ô2024Äê12ÔÂÊ×´ÎÅû¶ÒÔÀ´£¬£¬£¬Í¨¹ýÉ罻ýÌå¶ñÒâ¹ã¸æ¡¢·ÂðÆóÒµ¹Ù·½ÌûÎļ°AIÌìÉúÊÓÆµÍƼö£¬£¬£¬ÓÕµ¼Óû§Í¶×ÊÐéαÏîÄ¿£¬£¬£¬ÒÔ¸ß¶î»Ø±¨ÎªÓÕ¶üʵÑéÕ©Æ¡£¡£¡£¡£Êܺ¦ÕßÉêÇëÌáÏÖʱ£¬£¬£¬Õ©Æ·Ö×Ó»áÒÔ¡°Ö§¸¶ÌØÊâÓöȡ±¡°ÌṩÉí·ÝÖ¤/ÐÅÓÿ¨ÐÅÏ¢¡±µÈÀíÓɽøÒ»²½Õ¥È¡×ʽ𡣡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬AIÌìÉúÊÓÆµµÄ±ÆÕæ¶ÈÏÔÖøÌáÉý£¬£¬£¬Çø·ÖÂʸü¸ß¡¢ÈËÎïÐж¯ÓëºôÎü¸ü×ÔÈ»¡¢ÒôÊÓÆµÍ¬²½¸üÁ÷ͨ£¬£¬£¬ÃûÈË»»Á³ÊÓÆµµÄ´¹ÂÚ±íµ¥ÌîдÂÊÒò´ËÉÏÉý¡£¡£¡£¡£ÐéαÄÚÈݳ£Á¬ÏµÈÈÃÅÊÂÎñ»ò×ÅÃûÈËÎïÔöÇ¿¿ÉÐŶȡ£¡£¡£¡£Îª¹æ±Üƽ̨¼ì²â£¬£¬£¬Õ©Æ¹ã¸æÍ¨³£½öͶ·ÅÊýСʱ£¬£¬£¬²¢Í¨¹ýÖØ¶¨ÏòÖÁÕý³£Î±×°Ò³Ãæ¡¢ÀÄÓÃÉ罻ýÌå¹ã¸æÏµÍ³±íµ¥¹¤¾ßµÈ·½·¨½µµÍ±»·¢Ã÷Σº¦¡£¡£¡£¡£
https://thehackernews.com/2025/12/nomani-investment-scam-surges-62-using.html
5. MacSyncľÂíͨ¹ýÊðÃûÓ¦ÓÃÈÆ¹ýmacOSÇå¾²»úÖÆ
12ÔÂ24ÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÃûΪMacSyncµÄÐÂÐÍmacOSÇÔÃÜľÂí±äÖÖ£¬£¬£¬Æäͨ¹ýαװ³É¼´Ê±Í¨Ñ¶Èí¼þ×°ÖóÌÐòµÄSwiftÓ¦ÓÃÈö²¥¡£¡£¡£¡£Çå¾²Ñо¿Ô±Ö¸³ö£¬£¬£¬²î±ðÓÚÔçÆÚÒÀÀµÓû§ÊÖ¶¯²Ù×÷µÄ±äÖÖ£¬£¬£¬´Ë°æ±¾½ÓÄɸü¾ßÓÕÆÐÔµÄ×Ô¶¯¹¥»÷ÊֶΡ£¡£¡£¡£Ö»¹ÜÓ¦ÓþÓÉÊðÃûºÍ¹«Ö¤£¬£¬£¬¿É×èÖ¹±»Gatekeeper¡¢XProtect×èµ²£¬£¬£¬µ«×°ÖóÌÐòÈÔÏÔʾ¡°ÓÒ¼ü·¿ª¡±ËµÃ÷ÒÔÈÆ¹ýÇå¾²·À»¤£¬£¬£¬ÏÖÔÚÆ»¹ûÒѵõÏúÆä´úÂëÊðÃûÖ¤Êé¡£¡£¡£¡£¸ÃľÂíÊÍ·ÅÆ÷»ùÓÚSwiftÓïÑÔ¿ª·¢£¬£¬£¬Ö´ÐÐǰ»á¾ÙÐÐϵÁÐǰÖüì²é£ºÑéÖ¤ÍøÂçÅþÁ¬×´Ì¬¡¢ÉèÖÃÔ¼3600ÃëµÄ×îСִÐоàÀë¡¢ÒÆ³ýÎļþ¸ôÀëÊôÐÔ¼°ÑéÖ¤ÎļþÓÐÓÃÐÔ¡£¡£¡£¡£ÆäÓÃÓÚ»ñÈ¡ÔØºÉµÄcurlÏÂÁî²ÎÊý±¬·¢ÏÔÖø×ª±ä£¬£¬£¬Åú×¢¹¥»÷Õß¿ÌÒâµ÷½âÔØºÉ»ñÈ¡ÓëÑéÖ¤·½·¨£¬£¬£¬ÒÔÌáÉý¹¥»÷¿É¿¿ÐÔ»ò¹æ±Ü¼ì²â¡£¡£¡£¡£±ðµÄ£¬£¬£¬¹¥»÷Õßͨ¹ýǶÈëÎÞ¹ØPDFÎĵµ½«´ÅÅ̾µÏñ¾ÞϸÀ©³äÖÁ25.5MBÒÔ¹æ±Ü¼ì²â¡£¡£¡£¡£¾ÆÊÎö£¬£¬£¬¶ñÒâÔØºÉΪBase64±àÂëµÄMacSyncľÂí£¬£¬£¬ÊÇ2025Äê4ÔÂÊ״ηºÆðµÄMac.cľÂíµÄ¸üÃû°æ±¾¡£¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬¸ÃľÂíÄÚÖù¦Ð§ÍêÕûµÄGoÓïÑÔÊðÀí³ÌÐò£¬£¬£¬²»µ«¿ÉÇÔÈ¡Êý¾Ý£¬£¬£¬»¹ÄÜʵÏÖÔ¶³Ì¿ØÖƲÙ×÷¡£¡£¡£¡£
https://thehackernews.com/2025/12/new-macsync-macos-stealer-uses-signed.html
6. ÐͬȦÌ×½èÐéÎ±ÍøÂçÕÐÆ¸¹ã¸æÃé×¼Öж«ºÍ±±·Ç
12ÔÂ24ÈÕ£¬£¬£¬¹ú¼ÊÍøÂçÇå¾²¹«Ë¾Group-IB×îб¨¸æ½ÒÆÆ£¬£¬£¬Öж«ºÍ±±·ÇµØÇøÕýÔâÓö¹æÄ£»£»£»£»¯ÐͬÐÔÐéÎ±ÍøÂçÕÐÆ¸¹ã¸æÈ¦Ì×£¬£¬£¬Õ©Æ·Ö×ÓʹÓÃйÚÒßÇéºóÔ¶³Ì°ì¹«ÆÕ¼°Ç÷ÊÆ£¬£¬£¬Í¨¹ýÖÆ×÷ÓÅÒìµÄÉ罻ýÌå¹ã¸æÊµÑ龫׼թơ£¡£¡£¡£¸ÃȦÌ×ÒÔ"ÇáËÉÍê³É¼òÆÓÏßÉÏʹÃü¼´¿É׬ȡ10ÖÁ170ÃÀÔªÈÕн"ΪÓÕ¶ü£¬£¬£¬ÊµÔòDZÔÚÇÔȡǮ²ÆÓëСÎÒ˽¼ÒÐÅÏ¢µÄÓÐ×éÖ¯·¸·¨»î¶¯¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬Öж«µØÇø³¬60%ÀͶ¯ÕßÇãÏòȫְԶ³ÌÊÂÇ飬£¬£¬ÕâÒ»ÐÐΪת±ä±»Õ©ÆÍÅ»ïʹÓᣡ£¡£¡£2025ÄêÕûÄ꣬£¬£¬Group-IB¼à²âµ½1500ÓàÌõÕ©ÆÕÐÆ¸¹ã¸æ£¬£¬£¬Ö÷Òª¼¯ÖÐÓÚ°£¼°¡¢º£Íå¹ú¼Ò¡¢°¢¶û¼°ÀûÑÇ¡¢Í»Äá˹¡¢Ä¦Âå¸ç¡¢ÒÁÀ¿ËºÍÔ¼µ©¡£¡£¡£¡£Õ©Æ¹ã¸æÍ¨¹ýFacebook¡¢Instagram¡¢TikTokµÈƽ̨Ðû²¼£¬£¬£¬Ã°ÓÃ×ÅÃûµçÉÌÆ½Ì¨¡¢ÒøÐлòÕþ¸®»ú¹¹ÃûÒ壬£¬£¬²¢½ÓÄÉÍâµØ»¯ÊÊÅäÕ½ÂÔ¡ª¡ªÊ¹ÓõØÇø·½ÑÔ¡¢ÍâµØÇ®±Òµ¥Î»¼°ÊÜÖÚÊìϤµÄÆ·ÅÆÔªËØ£¬£¬£¬ÏÔÖøÌáÉý¹ã¸æ¿ÉÐŶȡ£¡£¡£¡£Õ©ÆÁ÷³Ì·ºÆð¸ß¶ÈÐͬÐÔ£ºÓû§»ØÓ¦¹ã¸æºó£¬£¬£¬Ïàͬ±»Ñ¸ËÙ×ªÒÆÖÁWhatsApp»òTelegramµÈ˽ÈËͨѶÈí¼þ£¬£¬£¬Õ©Æ·Ö×ÓÒÔ"ÈëÖ°ÉóºË"ΪÓÉË÷ȡСÎÒ˽¼ÒÐÅÏ¢¼°²ÆÎñÐÅÏ¢£¬£¬£¬²¢ÒªÇó½ÉÄÉѺ½ðÒÔ»ñÈ¡"¸ß³ê½ðʹÃü"¡£¡£¡£¡£³õÆÚС¶î·µÀûÆÊØÐÅÈκ󣬣¬£¬Õ©Æ·Ö×Ó¼´Ê§Áª¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/scams-mena-fake-online-job/


¾©¹«Íø°²±¸11010802024551ºÅ