GlassWormµÚËIJ¨¹¥»÷Ãé×¼macOS¿ª·¢Õß

Ðû²¼Ê±¼ä 2026-01-05

1. GlassWormµÚËIJ¨¹¥»÷Ãé×¼macOS¿ª·¢Õß


1ÔÂ1ÈÕ£¬£¬£¬£¬2025Äê10ÔÂÊ״ηºÆðµÄGlassWorm¶ñÒâÈí¼þ¿ËÈÕÌᳫµÚËIJ¨¹¥»÷£¬£¬£¬£¬×¨ÃÅÕë¶ÔmacOS¿ª·¢Õߣ¬£¬£¬£¬Í¨¹ý¸Ä¶¯VSCode/OpenVSXÀ©Õ¹³ÌÐòÖ²Èë¼ÓÃÜÇ®°üľÂí°æ±¾¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯·ºÆð¿çÆ½Ì¨ÌØÕ÷£¬£¬£¬£¬´ËǰÖ÷ÒªÕë¶ÔWindowsϵͳ£¬£¬£¬£¬ÏÖÀ©Õ¹ÖÁmacOS£¬£¬£¬£¬Í¹ÏÔ¹¥»÷Õß¶Ô¿ª·¢ÕßÉú̬µÄÒ»Á¬ÉøÍ¸¡£¡£¡£¡£¡£¡£¹¥»÷ʹÓÃOpenVSXºÍMicrosoft Visual Studio MarketplaceÖеĶñÒâÀ©Õ¹³ÌÐò£¬£¬£¬£¬ÕâЩÀ©Õ¹Í¨³£ÓÃÓÚÔöÇ¿±à¼­Æ÷¹¦Ð§¡£¡£¡£¡£¡£¡£GlassWormͨ¹ý¡°²»¿É¼û¡±Unicode×Ö·ûÒþ²Ø¶ñÒâ´úÂ룬£¬£¬£¬×°ÖúóÇÔÈ¡GitHub¡¢npm¡¢OpenVSXÕË»§Æ¾Ö¤¼°¶àÀ©Õ¹³ÌÐòµÄ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬£¬£¬²¢Ö§³ÖVNCÔ¶³Ì»á¼ûºÍSOCKSÊðÀíÁ÷Á¿Â·ÓÉ¡£¡£¡£¡£¡£¡£×îбäÖÖ½ÓÄÉAES-256-CBC¼ÓÃÜÓÐÓÃÔØºÉ£¬£¬£¬£¬ÑÓ³Ù15·ÖÖÓÖ´ÐÐÒÔÌÓ±ÜɳºÐÆÊÎö£¬£¬£¬£¬Ê¹ÓÃAppleScriptÌæ»»PowerShell£¬£¬£¬£¬Í¨¹ýLaunchAgentsʵÏÖ³¤ÆÚ»¯£¬£¬£¬£¬Í¬Ê±ÊµÑéÇÔÈ¡KeychainÃÜÂë²¢Ìæ»»Ó²¼þÇ®°üľÂí£¨ÈçLedger Live¡¢Trezor Suite£©£¬£¬£¬£¬µ«Ä¿½ñľÂíÇ®°ü·µ»Ø¿ÕÎļþ£¬£¬£¬£¬¿ÉÄÜ´¦ÓÚ×¼±¸½×¶Î¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬¶ñÒâÀ©Õ¹ÔÚOpenVSXƽ̨ÈÔ±£´æ£¬£¬£¬£¬ÏÂÔØÁ¿³¬33,000´Î¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-glassworm-malware-wave-targets-macs-with-trojanized-crypto-wallets/


2. Unleash ProtocolËðʧ390ÍòÃÀÔª¼ÓÃÜ×ʲú


12ÔÂ31ÈÕ£¬£¬£¬£¬È¥ÖÐÐÄ»¯ÖªÊ¶²úȨƽ̨Unleash ProtocolÒò¶àÖØÊðÃûÖÎÀíϵͳ±»¹¥»÷£¬£¬£¬£¬Ëðʧ¼ÛÖµÔ¼390ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¾ÝÏîÄ¿ÍŶÓÅû¶£¬£¬£¬£¬¹¥»÷Õßͨ¹ýδÊÚȨµÄºÏÔ¼Éý¼¶»ñÈ¡ÖÎÀíԱȨÏÞ£¬£¬£¬£¬½âËø×ʲúÌá¿î¹¦Ð§£¬£¬£¬£¬µ¼ÖÂWIP¡¢USDC¡¢WETH¡¢stIPºÍvIPµÈ×ʲú±»µÁ¡£¡£¡£¡£¡£¡£PeckShieldAlertÇø¿éÁ´Ç徲ר¼ÒÈ·ÈÏ£¬£¬£¬£¬Ëðʧ½ð¶îÔ¼390ÍòÃÀÔª£¬£¬£¬£¬×ʽðͨ¹ýµÚÈý·½»ù´¡ÉèʩǎÓ×ªÒÆÖÁÍⲿµØµã£¬£¬£¬£¬×îÖÕÒÔ1,337 ETH´æÈëTornado Cash¼ÓÃÜÇ®±Ò»ìÏýЧÀÍÒÔ½µµÍ¿É×·ËÝÐÔ¡£¡£¡£¡£¡£¡£Unleash Protocol¶¨Î»ÎªÖªÊ¶²úȨÖÎÀí²Ù×÷ϵͳ£¬£¬£¬£¬¿É½«ÖªÊ¶²úȨ´ú±Ò»¯²¢×÷ΪDeFiµäÖÊÆ·£¬£¬£¬£¬Í¨¹ýÖÇÄܺÏÔ¼×Ô¶¯·ÖÅÉÔÊÐí·ÑºÍ°æË°¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷̻¶Æä¶àÖØÊðÃûÖÎÀíϵͳµÄÇå¾²Îó²î£ºÍⲿµØµãͨ¹ýÖÎÀíϵͳ»ñÈ¡ÖÎÀí¿ØÖÆÈ¨£¬£¬£¬£¬Ö´ÐÐδ¾­ÍŶÓÅú×¼µÄºÏÔ¼Éý¼¶£¬£¬£¬£¬Í»ÆÆÔ­ÓÐÖÎÀí¼°ÔËÓª³ÌÐòÏÞÖÆ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃTornado CashµÄ»ìÏý»úÖÆÌÓ±Ü×·×Ù£¬£¬£¬£¬¸ÃЧÀÍÔøÒòЭÖú³¯ÏʺڿÍÏ´Ç®ÓÚ2022ÄêÔâÃÀ¹úÖÆ²Ã£¬£¬£¬£¬2025ÄêËä±»³ýÃû£¬£¬£¬£¬µ«ÈÔ±»ÍøÂç·¸·¨·Ö×ÓÀÄÓᣡ£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬Unleash ProtocolÒÑÔÝÍ£ËùÓÐÔËÓª£¬£¬£¬£¬Ô¼ÇëÍⲿÇ徲ר¼ÒÊÓ²ìÎó²îȪԴ£¬£¬£¬£¬ÆÀ¹Àµ÷½âÓë»Ö¸´²½·¥¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-drain-39m-from-unleash-protocol-after-multisig-hijack/


3. PlayÀÕË÷Èí¼þ¹¥»÷°ÙÄêÀ±½·½´¾ÞÍ·Garner Foods


1ÔÂ2ÈÕ£¬£¬£¬£¬PlayÀÕË÷Èí¼þ×éÖ¯ÔÚ°µÍøÐû²¼ÐÂÎÅ£¬£¬£¬£¬ÒªÇóÓµÓнü°ÙÄêÀúÊ·µÄ±±¿¨ÂÞÀ´ÄÉÖÝÀ±½·½´ÖÆÔìÉÌGarner FoodsÔÚ1ÔÂ7ÈÕǰÁªÏµ²¢Ö§¸¶Î´¹ûÕæÊê½ð£¬£¬£¬£¬²»È»½«Ð¹Â¶ÆäÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£×÷ΪÃÀ¹ú×ÅÃû½´ÁÏÆ·ÅÆ£¬£¬£¬£¬Garner Foods×Ô1929ÄêÆðÉú²úµÂÖÝÆ¤ÌØ¡¢ÂÌɽ¸ñÁÖ¸êɯɯ½´µÈϵÁвúÆ·£¬£¬£¬£¬²úÆ·ÁýÕÖÈ«ÃÀÊýÍò¼Ò³¬ÊС¢¾üÐèµê¼°±ãµ±µê£¬£¬£¬£¬²¢ÔÚʳÎïЧÀÍÓë²ÍÒûÐÐÒµÕ¼ÓÐÖ÷Ҫְλ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷̻¶ÁËÆóÒµ½¹µãÊý¾ÝΣº¦£ºPlayÉù³ÆÇÔÈ¡Á˰üÀ¨Ë½ÈËÉñÃØÊý¾Ý¡¢¿Í»§Îļþ¡¢Ô¤Ëã¡¢ÈËΪµ¥¡¢²ÆÎñÐÅÏ¢¼°Ë°ÊռͼÔÚÄڵĶàÀàÃô¸ÐÐÅÏ¢£¬£¬£¬£¬¿ÉÄÜÉæ¼°±ê¼ÇÐÔÅä·½µÈרÓÐÐÅÏ¢¡£¡£¡£¡£¡£¡£Ê³ÎïÉú²úÉÌÔâÀÕË÷¹¥»÷Ò×Òý·¢¹©Ó¦Á´Á¬Ëø·´Ó¦£¬£¬£¬£¬´ÓÉú²úÕϰ­¡¢½»¸¶ÑÓ³Ùµ½²úƷǷȱ£¬£¬£¬£¬²»µ«Ëðº¦ÆóÒµÉùÓþ£¬£¬£¬£¬»¹¿ÉÄܵ¼ÖÂÏûºÄÕßתÏò¾ºÆ·¡£¡£¡£¡£¡£¡£Play×éÖ¯×÷Ϊ2024-2025ÄêÈ«ÇòµÚÈý»îÔ¾ÀÕË÷Èí¼þÍŻ£¬£¬£¬ÒÑÔì³É³¬Ç§ÃûÊܺ¦Õß¡£¡£¡£¡£¡£¡£Æä½ÓÄÉ¡°¼äЪÐÔ¼ÓÃÜ¡±ÊÖÒÕ£¬£¬£¬£¬½ö¼ÓÃÜϵͳ²¿·ÖÀο¿ÇøÓòÒÔ¿ìËÙÇÔÈ¡Êý¾Ý£¬£¬£¬£¬¸ÃÕ½ÂÔÒѱ»¶à¸ö×ÅÃûÀÕË÷×é֯Ч·Â¡£¡£¡£¡£¡£¡£


https://cybernews.com/news/texas-pete-hot-sauce-play-ransomware-attack-garner-foods/


4. PlayÀÕË÷Èí¼þ¹¥»÷ͯЬ¾ÞÍ·Esquire Brands


1ÔÂ2ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬Í¯Ð¬ÖÆÔìÉÌEsquire BrandsÔâÓöÖøÃûÀÕË÷Èí¼þÍÅ»ïPlayµÄ¹¥»÷£¬£¬£¬£¬¸ÃÍÅ»ïÔÚ°µÍøÂÛ̳ÉÏÐû³ÆÒÑÇÔÈ¡ÆäÉñÃØÊý¾Ý£¬£¬£¬£¬²¢Íþв×îÔçÓÚ1ÔÂ3ÈÕÐû²¼¡£¡£¡£¡£¡£¡£×÷ΪӵÓÐDKNY¡¢Sam EdelmanºÍKenneth ColeµÈÆ·ÅÆÊÚȨµÄÆóÒµ£¬£¬£¬£¬Esquire BrandsרעÓÚͯЬµÄÉè¼Æ¡¢ÊÚȨÓëÉú²ú£¬£¬£¬£¬ÆäÓªÒµÁýÕÖÈ«Çò¶à¸öÊг¡¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÉù³Æ»ñÈ¡Á˿ͻ§Îļþ¡¢ÈËΪÊý¾Ý¡¢²ÆÎñÐÅÏ¢µÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£´ËÀàÊý¾Ýй¶¿ÉÄÜÒý·¢ÑÏÖØÐ§¹û£ºÈËΪÊý¾Ý°üÀ¨Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢¶¨ÏòÍøÂç´¹ÂÚ¼°Éç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬ÀýÈçð³ä¸ß¹ÜÆ­È¡×ʽ𣻠£»£»£»£»¿Í»§ÎļþºÍ²ÆÎñÐÅÏ¢Ôò¿ÉÄܱ»ÓÃÓÚÉèÁ¢Ú²Æ­ÕË»§»òÉÌÒµÌØ¹¤»î¶¯£¬£¬£¬£¬¶ÔÆóÒµÉùÓþºÍÔËÓªÔì³Éºã¾ÃË𺦡£¡£¡£¡£¡£¡£PlayÀÕË÷Èí¼þ¼¯ÍÅÊÇÍøÂç·¸·¨ÁìÓòµÄ»îÔ¾¼ÓÈëÕߣ¬£¬£¬£¬2024ÄêλÁÐÈ«Çò×î»îÔ¾ÀÕË÷Èí¼þÍÅ»ïǰÈýÃû£¬£¬£¬£¬ÒÔ¡°¼äЪÐÔ¼ÓÃÜ¡±ÊÖÒÕÖø³Æ£¬£¬£¬£¬½ö¼ÓÃÜÏµÍ³ÌØ¶¨Àο¿²¿·Ö£¬£¬£¬£¬´Ó¶ø¿ìËÙÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£PlayµÄ¹¥»÷Ä¿µÄº­¸Ç¶à¸öÐÐÒµ£¬£¬£¬£¬È纽¿Õº½Ìì¡¢ÔÆÅÌËã¡¢Âùݡ¢Æû³µ¼°Õþ¸®»ú¹¹¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/esquire-brands-play-ransomware-attack/


5. ÒÁÀûŵÒÁÖÝÈËÀàЧÀͲ¿ÄÚ²¿ÍýÏëµØÍ¼¹ýʧ¹ûÕæ


1ÔÂ3ÈÕ£¬£¬£¬£¬ÒÁÀûŵÒÁÖÝÈËÀàЧÀͲ¿£¨IDHS£©¿ËÈÕת´ïÒ»ÒòÓÉÒþ˽ÉèÖÃÉèÖÃʧÎóÒý·¢µÄÊý¾ÝÇå¾²ÊÂÎñ£¬£¬£¬£¬µ¼ÖÂÄÚ²¿×ÊÔ´ÍýÏëµØÍ¼±»ÒâÍâ¹ûÕæ£¬£¬£¬£¬Éæ¼°ÊýÍòÃûЧÀ͹¤¾ßСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¾ÝÅû¶£¬£¬£¬£¬ÉæÊµØÍ¼½¨ÉèÓÚijµØÍ¼Æ½Ì¨£¬£¬£¬£¬ÓÃÓÚÄÚ²¿×ÊÔ´ÍýÏ룬£¬£¬£¬µ«ÒòȨÏÞÉèÖò»µ±£¬£¬£¬£¬ÔÚ2021Äê4ÔÂÖÁ2025Äê9ÔÂʱ´ú±»¹«ÖÚ¿É»á¼û¡£¡£¡£¡£¡£¡£ÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£º¿µ¸´Ð§ÀͲ¿·Ö£¨DRS£©Ô¼32,401Ãû¿Í»§ÐÅÏ¢Ôâ̻¶£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢²¡Àý±àºÅ¡¢²¡Àý״̬¡¢×ªÕïȪԴ¡¢ÇøÓò°ì¹«ÊÒÐÅÏ¢¼°ÊÜÒæÈËÉí·ÝµÈ£» £»£»£»£»Ò½ÁƽòÌùºÍÒ½Áưü¹Ü´¢±¸ÍýÏ루MMSP£©Ô¼672,616ÃûÊÜÒæÈËÒàÊܲ¨¼°£¬£¬£¬£¬Éæ¼°µØµã¡¢²¡Àý±àºÅ¡¢Éú³Ýͳ¼ÆÐÅÏ¢¼°Ò½ÁÆÍýÏëÃû³Æ£¨ÈçÒ½ÁƽòÌù¡¢Ò½Áưü¹ÜµÈ£©£¬£¬£¬£¬µ«Î´°üÀ¨ÐÕÃû¡£¡£¡£¡£¡£¡£Á½ÅúÊý¾Ý¹ûÕæÊ±¶Î»®·ÖΪ2021Äê4ÔÂ-2025Äê9Ô¼°2022Äê1ÔÂ-2025Äê9Ô¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÓÚ2025Äê9ÔÂ22ÈÕ±»·¢Ã÷ºó£¬£¬£¬£¬IDHSÁ¬Ã¦½ÓÄɵ÷½â²½·¥£ºÏÞÖÆµØÍ¼»á¼ûȨÏÞ£¬£¬£¬£¬Ã÷ȷեȡ½«Èκοͻ§¼¶±ðÊý¾ÝÉÏ´«ÖÁ¹«¹²µØÍ¼ÍøÕ¾¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬ÒÁÀûŵÒÁÖÝÁìÍÁÇå¾²²¿Õýͨ¹ýÓʼþµÈ·½·¨ÏòÊÜÓ°ÏìСÎÒ˽¼Ò·¢³ö֪ͨ£¬£¬£¬£¬Í¨ÖªÖаüÀ¨Ãâ·Ñ×Éѯµç»°£¬£¬£¬£¬±ãÓÚÓû§»ñÈ¡¸ü¶àÐÅÏ¢¼°Ö§³Ö¡£¡£¡£¡£¡£¡£


https://khqa.com/news/local/illinois-agency-tightens-map-security-after-data-security-incident-human-services-medicaid-medicare-division-of-rehabilitation-services-federal-trade-commission


6. Handalaͨ¹ýÈëÇÖTelegramÕË»§¹¥»÷ÒÔÉ«ÁйÙÔ±


1ÔÂ2ÈÕ£¬£¬£¬£¬ÓëÒÁÀʹØÁªµÄºÚ¿Í×éÖ¯HandalaÐû³ÆÍêÈ«ÈëÇÖÁ½ÃûÒÔÉ«ÁÐÕþÒª¡ª¡ªÇ°×ÜÀíÄÉ·òËþÀû¡¤±´ÄÚÌØÓëÕÕÁϳ¤²ìÏ£¡¤²¼À­¸¥ÂüµÄÒÆ¶¯×°±¸£¬£¬£¬£¬²¢Ð¹Â¶ÁªÏµÈË¡¢ÕÕÆ¬¡¢ÊÓÆµ¼°Ô¼1900Ìõ̸Ìì¼Í¼¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬KelaÍøÂçÇ鱨¹«Ë¾µÄÉî¶Èȡ֤ÆÊÎöÕ¹ÏÖ£¬£¬£¬£¬Ëùν¡°×°±¸ÈëÇÖ¡±ÊµÎªTelegramÕË»§Çå¾²Îó²îµÄ¼¯ÖÐ̻¶£º¹¥»÷Ä¿µÄ½öÏÞÓÚÌØ¶¨TelegramÕË»§£¬£¬£¬£¬²¢Î´»ñȡװ±¸ÖÜÈ«»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£Kela·¢Ã÷£¬£¬£¬£¬Ð¹Â¶ÖÊÁÏÖд󶼶Ի°ÎªTelegramͬ²½±¬·¢µÄ¿ÕÁªÏµÈË¿¨Æ¬£¬£¬£¬£¬½öÔ¼40¸ö¶Ô»°º¬ÏÖʵÐÂÎÅ£¬£¬£¬£¬ÇÒʵÖÊÐÔ½»Á÷ÉÙÉÙ¡£¡£¡£¡£¡£¡£ËùÓÐÆØ¹âÁªÏµÈ˾ù¹ØÁª»îÔ¾TelegramÕË»§£¬£¬£¬£¬Ö¤ÊµÊý¾ÝÔ´×Ô¶¯Ì¬ÔÆ´æ´¢¶ø·Ç×°±¸ÍâµØ¡£¡£¡£¡£¡£¡£´ËÊÂÎñ̻¶³ö¼ÓÃÜÆ½Ì¨ÕË»§ÖÎÀíµÄϵͳÐÔΣº¦£¬£¬£¬£¬¼´±ãÈçTelegramÕâÀàÆ½Ì¨£¬£¬£¬£¬ÆäĬÈÏÉèÖÃÒà·Å´óÁ˹¥»÷Ãæ£ºÔÆÃÜÂ빦ЧĬÈϽûÓ㬣¬£¬£¬½öÐèÒ»´ÎÐÔÃÜÂë¼´¿ÉÍêÕû»á¼ûÕË»§£» £»£»£»£»±ê׼̸Ììȱ·¦¶Ëµ½¶Ë¼ÓÃÜ£¬£¬£¬£¬Êý¾ÝÒÔÔÆÐÎʽ´æ´¢ÓÚЧÀÍÆ÷£¬£¬£¬£¬¹¥»÷Ãæ±»ÏÔÖøÀ©Õ¹¡£¡£¡£¡£¡£¡£


https://cybersecuritynews.com/handala-hackers-targeted-israeli-officials/