FinalDraft¶ñÒâÈí¼þ£ºÊ¹ÓÃOutlookµ×¸å¾ÙÐÐÒþ²Ø¹¥»÷µÄÐÂÍþв

Ðû²¼Ê±¼ä 2025-02-17

1. FinalDraft¶ñÒâÈí¼þ£ºÊ¹ÓÃOutlookµ×¸å¾ÙÐÐÒþ²Ø¹¥»÷µÄÐÂÍþв


2ÔÂ16ÈÕ£¬£¬£¬FinalDraftÊÇÒ»ÖÖз¢Ã÷µÄ¶ñÒâÈí¼þ£¬£¬£¬ËüʹÓÃOutlookµç×ÓÓʼþµ×¸å¾ÙÐÐÒþ²ØµÄÏÂÁîºÍ¿ØÖÆÍ¨Ñ¶£¬£¬£¬×¨ÃŹ¥»÷ÄÏÃÀij²¿·Ö¡£¡£¡£¡£¸Ã¹¥»÷ÓÉElastic Security Labs·¢Ã÷£¬£¬£¬Éæ¼°Ò»Ì×ÍêÕûµÄ¹¤¾ß¼¯£¬£¬£¬°üÀ¨PathLoader¼ÓÔØÆ÷¡¢FinalDraftºóÃż°¶à¸öºóʹÓóÌÐò¡£¡£¡£¡£FinalDraftͨ¹ýÀÄÓÃOutlookʵÏÖÒþ²ØÍ¨Ñ¶£¬£¬£¬Ö´ÐÐÊý¾Ýй¶¡¢ÊðÀí¡¢Àú³Ì×¢ÈëºÍºáÏòÒÆ¶¯µÈ²Ù×÷£¬£¬£¬Í¬Ê±Ö»¹ÜïÔÌ­ºÛ¼£¡£¡£¡£¡£¹¥»÷ʼÓÚPathLoaderÈëÇÖ£¬£¬£¬ËüÖ´Ðдӹ¥»÷Õß»ù´¡ÉèÊ©¼ìË÷µÄshellcode£¬£¬£¬°üÀ¨FinalDraft¶ñÒâÈí¼þ¡£¡£¡£¡£FinalDraftͨ¹ýMicrosoft Graph API½¨ÉèͨѶ£¬£¬£¬Ê¹ÓÃǶÈëµÄË¢ÐÂÁîÅÆ¼ìË÷OAuthÁîÅÆ²¢´æ´¢ÔÚWindows×¢²á±íÖУ¬£¬£¬ÊµÏÖ³¤ÆÚ»á¼û¡£¡£¡£¡£¹¥»÷Õßͨ¹ýOutlookµ×¸å·¢ËͺÍÎüÊÕÏÂÁ£¬£¬×èÖ¹¼ì²â²¢ÈÚÈëÕý³£Microsoft 365Á÷Á¿¡£¡£¡£¡£FinalDraftÖ§³Ö37¸öÏÂÁ£¬£¬°üÀ¨Êý¾Ýй¶¡¢Àú³Ì×¢È롢ת´ï¹þÏ£¹¥»÷µÈ¡£¡£¡£¡£±ðµÄ£¬£¬£¬»¹·¢Ã÷FinalDraftµÄLinux±äÌå¼°ÁíÒ»¸öδ¼Í¼µÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷GuidLoader¡£¡£¡£¡£REF7707ÊÇÕë¶ÔÄÏÃÀÍâ½»²¿µÄÍøÂçÌØ¹¤»î¶¯£¬£¬£¬µ«ÆÊÎöÏÔʾÆäÓë¶«ÄÏÑÇÊܺ¦ÕßÓÐÁªÏµ£¬£¬£¬ÌåÏÖÐж¯¹æÄ£¸ü¹ã¡£¡£¡£¡£¹¥»÷Õßͨ¹ý¶«ÄÏÑǵçÐźͻ¥ÁªÍø»ù´¡ÉèÊ©ÌṩÉ̵ÄÊÜѬȾ¶ËµãÃé×¼¸ß¼ÛÖµ»ú¹¹£¬£¬£¬²¢Ê¹Óö«ÄÏÑÇÒ»Ëù´óѧµÄ´æ´¢ÏµÍ³ÍйܶñÒâÈí¼þ¸ºÔØ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-finaldraft-malware-abuses-outlook-mail-service-for-stealthy-comms/


2. SteamÊÐËÁÓÎÏ·PirateFiÈö²¥Vidar¶ñÒâÈí¼þ£¬£¬£¬Ó°Ï쳬1500Óû§


2ÔÂ14ÈÕ£¬£¬£¬SteamÊÐËÁÖÐÒ»¿îÃûΪPirateFiµÄÃâ·ÑÓÎÏ·ÔÚ2ÔÂ6ÈÕÖÁ2ÔÂ12ÈÕʱ´úÈö²¥ÁËVidarÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬£¬Ó°Ïì¿ÉÄܶà´ï1500ÃûÓû§¡£¡£¡£¡£¸ÃÓÎÏ·ÓÉSeaworth InteractiveÐû²¼£¬£¬£¬±»ÐÎòΪһ¿îÉúÑÄÓÎÏ·£¬£¬£¬µ«Steam·¢Ã÷Æä°üÀ¨¶ñÒâÈí¼þºóÒÑÏòÊÜÓ°ÏìÓû§·¢ËÍ֪ͨ£¬£¬£¬½¨ÒéËûÃÇÖØÐÂ×°ÖÃWindowsÒÔÈ·±£Çå¾²¡£¡£¡£¡£SECUINFRA Falcon TeamÈ·ÈϸöñÒâÈí¼þΪVidarÐÅÏ¢ÇÔÈ¡³ÌÐòµÄÒ»¸ö°æ±¾£¬£¬£¬Òþ²ØÔÚPirate.exeÎļþÖС£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÖÖÖÖ»ìÏýÊÖÒպ͸ü¸ÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷ÒÔÇÔȡƾ֤¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬PirateFiÃû³ÆÖеÄweb3/Çø¿éÁ´/¼ÓÃÜÇ®±ÒÒýÓÃÊÇΪÁËÎüÒýÌØ¶¨Íæ¼ÒȺÌå¡£¡£¡£¡£ËäÈ»SteamÍÆ³öÁËÌØÊâ²½·¥±£»£»£»£»£»£»¤Íæ¼ÒÃâÊÜδ¾­ÊÚȨµÄ¶ñÒâ¸üÐÂË𺦣¬£¬£¬µ«PirateFi°¸ÀýÅú×¢ÕâЩ²½·¥ÈÔÐèÔöÇ¿¡£¡£¡£¡£´ËǰҲÓÐÀàËÆ¶ñÒâÈí¼þÈëÇÖSteamÊÐËÁµÄ°¸Àý£¬£¬£¬ÈçʹÓÃChromeÎó²îµÄDota 2ÓÎϷģʽºÍ±»ºÚ¿Í¹¥»÷µÄ¡¶Slay the Spire¡·Ä£×é¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/piratefi-game-on-steam-caught-installing-password-stealing-malware/


3. ÒÉËÆ¶íÂÞ˹ºÚ¿Í×éÖ¯Storm-2372ʹÓÃ×°±¸´úÂë´¹ÂÚ¹¥»÷Microsoft 365ÕÊ»§


2ÔÂ15ÈÕ£¬£¬£¬Ò»¸öÃûΪStorm-2372µÄÍþвÐÐΪÕߣ¬£¬£¬ÒÉËÆÓë¶íÂÞ˹ÓйØ£¬£¬£¬ÕýÔÚÕë¶ÔÈ«Çò¶à¸öÁìÓòµÄ×éÖ¯Ìᳫװ±¸´úÂëÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬Ä¿µÄ°üÀ¨Õþ¸®¡¢·ÇÕþ¸®×éÖ¯¡¢ITЧÀͺÍÊÖÒÕ¡¢¹ú·À¡¢µçÐÅ¡¢ÎÀÉúÒÔ¼°ÄÜÔ´µÈÁìÓò¡£¡£¡£¡£×ÔÈ¥Äê8ÔÂÒÔÀ´£¬£¬£¬¸ÃÐÐΪÕßͨ¹ýÐÂÎÅÆ½Ì¨Ã°³äÓëÄ¿µÄÏà¹ØµÄ×ÅÃûÈËÊ¿£¬£¬£¬ÓÕÆ­Óû§ÔÚÕýµ±µÇÂ¼Ò³ÃæÉÏÊäÈë¹¥»÷ÕßÌìÉúµÄ×°±¸´úÂ룬£¬£¬´Ó¶ø»ñÈ¡¶ÔÊܺ¦ÕßMicrosoft 365ÕÊ»§µÄ³õʼ»á¼ûȨÏÞ£¬£¬£¬²¢ÆôÓÃGraph APIÊý¾ÝÍøÂç»î¶¯¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬¹¥»÷ÕßÏÖÔÚʹÓÃMicrosoftÉí·ÝÑéÖ¤ÊðÀíµÄÌØ¶¨¿Í»§¶ËID£¬£¬£¬Äܹ»ÌìÉúеÄÁîÅÆ£¬£¬£¬´øÀ´ÐµĹ¥»÷ºÍ³¤ÆÚÐÔ¿ÉÄÜÐÔ¡£¡£¡£¡£ÎªÁË·ÀÓù´ËÀ๥»÷£¬£¬£¬Î¢Èí½¨Òé×èÖ¹×°±¸´úÂëÁ÷£¬£¬£¬ÊµÑéÌõ¼þ»á¼ûÕ½ÂÔ£¬£¬£¬²¢ÔÚÏÓÒɱ£´æ´¹ÂÚ¹¥»÷ʱ×÷·ÏÓû§µÄË¢ÐÂÁîÅÆ²¢ÉèÖÃÌõ¼þ»á¼ûÕ½ÂÔÒÔÇ¿ÖÆÖØÐÂÉí·ÝÑéÖ¤¡£¡£¡£¡£Í¬Ê±£¬£¬£¬Ê¹ÓÃMicrosoft Entra IDµÄµÇ¼ÈÕÖ¾¾ÙÐÐ¼à¿Ø²¢¿ìËÙʶ±ðÒì³£µÇ¼ʵÑé¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-hackers-steal-emails-in-device-code-phishing-attacks/


4. ³¯ÏʺڿÍ×éÖ¯KimsukyÒÉËÆÌᳫDEEP#DRIVEÍøÂç´¹ÂÚ¹¥»÷


2ÔÂ14ÈÕ£¬£¬£¬Ò»³¡ÃûΪDEEP#DRIVEµÄÍøÂç´¹ÂÚ¹¥»÷»î¶¯×Ô2024Äê9ÔÂÆðÕë¶Ôº«¹úÆóÒµ¡¢Õþ¸®ÊµÌå¼°¼ÓÃÜÇ®±ÒÓû§Õö¿ª£¬£¬£¬ÒÑÔì³ÉÊýǧÃûÊܺ¦Õß¡£¡£¡£¡£´Ë´Î¹¥»÷ÓÉÒÉËÆ³¯ÏʺڿÍ×éÖ¯KimsukyÌᳫ£¬£¬£¬ÆäÖ÷ҪĿµÄÊÇÍøÂ纫¹úʵÌåµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¹¥»÷ÕßʹÓú«Óï±àдµÄ¶¨ÖÆÍøÂç´¹ÂÚÓÕ¶ü£¬£¬£¬Î±×°³ÉÊÂÇéÈÕÖ¾¡¢°ü¹ÜÎļþºÍ¼ÓÃÜÏà¹ØÎļþµÈÕýµ±Îļþ£¬£¬£¬Í¨¹ýDropboxµÈƽ̨·Ö·¢£¬£¬£¬ÒÔÌӱܹŰåÇå¾²·ÀÓù¡£¡£¡£¡£ÕâЩÓÕ¶üͨ³£ÒÔ.hwp¡¢.xlsxºÍ.pptxµÈÊÜÐÅÈεÄÎļþÃûÌ÷ºÆð£¬£¬£¬È«ÐÄÉè¼ÆÒÔÎüÒýÄ¿µÄÊÜÖÚ¡£¡£¡£¡£¹¥»÷Á´ÒÔαװ³ÉÕýµ±ÎĵµµÄ.lnkÎļþ×îÏÈ£¬£¬£¬Æô¶¯¶ñÒâPowerShell¾ç±¾µÄÖ´ÐУ¬£¬£¬½ø¶øÏÂÔØÆäËûÓÐÓøºÔز¢½¨É賤ÆÚÐÔ¡£¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃDropbox¾ÙÐÐÊý¾Ýй¶£¬£¬£¬²¢Ê¹ÓöàÖÖÊÖÒÕÌӱܼì²â¡£¡£¡£¡£Ö»¹Ü¹¥»÷ÕߵĻù´¡ÉèÊ©¿´ËƶÌÔÝ£¬£¬£¬µ«ÆäÕ½ÂÔ¡¢ÊÖÒպͳÌÐòÓëKimsuky×éÖ¯ºÜÊÇÏàËÆ¡£¡£¡£¡£Securonix½¨Òé¶ÔÓû§¾ÙÐÐÍøÂç´¹ÂÚ½ÌÓý¡¢¼à¿Ø¶ñÒâÈí¼þÔÝ´æÄ¿Â¼ÒÔ¼°¿É¿¿µÄ¶ËµãÈÕÖ¾¼Í¼£¬£¬£¬ÒÔ·ÀÓù´ËÀ๥»÷¡£¡£¡£¡£


https://hackread.com/n-korean-hackers-deep-drive-attacks-against-s-korea/


5. ºÚ¿ÍʹÓÃCVE-2025-0108Îó²î¹¥»÷PAN-OS·À»ðǽ


2ÔÂ14ÈÕ£¬£¬£¬ºÚ¿ÍʹÓÃ×î½üÐÞ¸´µÄCVE-2025-0108Îó²î¶ÔPalo Alto NetworksµÄPAN-OS·À»ðǽÌᳫÁ˹¥»÷¡£¡£¡£¡£¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢Å²ÓÃPHP¾ç±¾£¬£¬£¬Î£¼°ÏµÍ³µÄÍêÕûÐÔºÍÉñÃØÐÔ¡£¡£¡£¡£Palo Alto NetworksÔÚ2ÔÂ12ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬£¬±Þ²ßÖÎÀíÔ±½«·À»ðǽÉý¼¶µ½Ö¸¶¨°æ±¾ÒÔ½â¾ö´ËÎÊÌ⣬£¬£¬Í¬Ê±Ö¸³öPAN-OS 11.0ÒòÒÑ´ïʹÓÃÊÙÃü£¬£¬£¬½«²»ÔÙÐû²¼ÐÞ¸´³ÌÐò¡£¡£¡£¡£¸ÃÎó²îÓÉAssetnoteµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷²¢±¨¸æ£¬£¬£¬ËûÃÇÒѽÒÏþ°üÀ¨ÍêÕûÎó²îʹÓÃϸ½ÚµÄÎÄÕ¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓôËÎó²îÌáÈ¡Ãô¸ÐÊý¾Ý¡¢¼ìË÷ÉèÖûòʹÓÃÉèÖᣡ£¡£¡£GreyNoiseƽ̨¼Í¼ÁËÕë¶ÔδÐÞ²¹·À»ðǽµÄ¹¥»÷ʵÑ飬£¬£¬ÇÒ¿ÉÄÜÓжà¸öÍþвÐÐΪÕß¼ÓÈë¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ÓÐÁè¼Ý4400̨PAN-OS×°±¸µÄÖÎÀí½çÃæÔÚÏß̻¶¡£¡£¡£¡£Îª·ÀÓù¹¥»÷£¬£¬£¬½¨ÒéÓ¦Óò¹¶¡²¢ÏÞÖÆ¶Ô·À»ðǽÖÎÀí½Ó¿ÚµÄ»á¼û¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/


6. CISA½«Apple iOS/iPadOS¼°Mitel SIPµç»°Îó²îÁÐÈëÒÑ֪ʹÓÃÎó²îĿ¼


2ÔÂ15ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Apple iOSºÍiPadOSµÄÊÚȨ¹ýʧÎó²î£¨CVE-2025-24200£©ÒÔ¼°Mitel SIPµç»°µÄ²ÎÊý×¢ÈëÎó²î£¨CVE-2024-41710£©Ìí¼Óµ½ÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£Æ»¹û½ôÆÈÐû²¼ÁËÇå¾²¸üУ¬£¬£¬ÐÞ¸´ÁË¿ÉÄܱ»¡°¼«ÆäÖØ´ó¡±Õë¶ÔÐÔ¹¥»÷ʹÓõÄCVE-2025-24200Îó²î£¬£¬£¬¸ÃÎó²îÓ°ÏìiPhone XS¼°¸üлúÐͺͶà¿îiPad£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔÚËø¶¨×°±¸ÉϽûÓÃUSBÏÞÖÆÄ£Ê½¡£¡£¡£¡£Í¬Ê±£¬£¬£¬MitelÒ²Ðû²¼Á˹̼þ¸üнâ¾öÁËCVE-2024-41710Îó²î£¬£¬£¬¸ÃÎó²îÓ°ÏìMitel 6800¡¢6900ºÍ6900wϵÁÐSIPµç»°£¬£¬£¬¿ÉÄÜÔÊÐí¹¥»÷Õß¾ÙÐÐÏÂÁî×¢Èë¹¥»÷¡£¡£¡£¡£Ëæºó£¬£¬£¬ÓÐÑо¿·¢Ã÷»ùÓÚMiraiµÄ½©Ê¬ÍøÂçAquabotµÄбäÖÖÕë¶Ô±£´æ¸ÃÎó²îµÄMitel SIPµç»°¾ÙÐй¥»÷¡£¡£¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê3ÔÂ5ÈÕǰÐÞ¸´ÕâЩÎó²î£¬£¬£¬²¢½¨Òé˽ÈË×éÖ¯Éó²éKEVĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬£¬£¬ÒÔ½µµÍÖØ´óΣº¦¡£¡£¡£¡£


https://securityaffairs.com/174246/security/u-s-cisa-adds-apple-ios-and-ipados-and-mitel-sip-phones-flaws-to-its-known-exploited-vulnerabilities-catalog.html