Bybit ÔâÊ·ÉÏ×î´ó¼ÓÃÜÇ®±Ò͵ÇÔ°¸£¬£¬£¬£¬£¬£¬ºÚ¿ÍÉí·ÝÖ¸ÏòLazarus×éÖ¯

Ðû²¼Ê±¼ä 2025-02-24

1. Bybit ÔâÊ·ÉÏ×î´ó¼ÓÃÜÇ®±Ò͵ÇÔ°¸£¬£¬£¬£¬£¬£¬ºÚ¿ÍÉí·ÝÖ¸ÏòLazarus×éÖ¯


2ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËù Bybit ½üÆÚÔâÊÜÁËÒ»´Îب¹ÅδÓеÄÖØ´óÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼Ö¼ÛÖµÔ¼ 15 ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ£¬£¬£¬£¬£¬£¬³ÉΪʷÉÏ×î´óµÄ¼ÓÃÜÇ®±Ò͵ÇÔ°¸¡£¡£ ¡£¡£¹¥»÷Õßͨ¹ýʹÓÃÊðÃû½çÃæ£¬£¬£¬£¬£¬£¬½« Bybit µÄ ETH ÀäÇ®°üÖеÄ×ʽðÖØ¶¨Ïòµ½Î´ÖªµØµã¡£¡£ ¡£¡£Ö»¹Ü Bybit µÄÇå¾²ÍŶÓÕýÔÚÓëÇø¿éÁ´È¡Ö¤×¨¼ÒºÍÏàÖúͬ°éÆð¾¢ÊÓ²ì´ËÊÂÎñ£¬£¬£¬£¬£¬£¬µ«ÉÐδ͸¶ÏêϸµÄÊÖÒÕϸ½Ú¡£¡£ ¡£¡£¾ÝÍÆ²â£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÁË Safe.global ƽ̨Óû§½çÃæÖеÄÎó²î¡£¡£ ¡£¡£Bybit Ê×ϯִÐйÙÏò¿Í»§°ü¹Ü£¬£¬£¬£¬£¬£¬×ÝÈ»±»µÁ×ʽðÎÞ·¨×·»Ø£¬£¬£¬£¬£¬£¬ÉúÒâËùÒ²½«¼á³Ö³¥¸¶ÄÜÁ¦£¬£¬£¬£¬£¬£¬²¢½«ÔÚÐëҪʱʹÓùýÇÅ´û¿îÈ·±£Óû§×ʽð¿ÉÓᣡ£ ¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬Bybit Ç¿µ÷ËùÓÐÆäËûÀäÇ®°ü¾ùÇå¾²ÎÞÓÝ£¬£¬£¬£¬£¬£¬ÔËÓª²»»áÖÐÖ¹¡£¡£ ¡£¡£ÍøÂçÇå¾²¹«Ë¾ Elliptic ºÍ Arkham Intelligence ¾ù½«´Ë´Î¹¥»÷¹é×ïÓÚÓ볯ÏÊÓÐ¹ØµÄ Lazarus APT ¼¯ÍÅ£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÒÔʹÓÃ×Ô½ç˵¶ñÒâÈí¼þ¾ÙÐÐÖØ´ó¹¥»÷¶øÖøÃû£¬£¬£¬£¬£¬£¬²¢ÉæÏÓ¶àÆðÕë¶ÔÒøÐкͼÓÃÜÇ®±ÒÉúÒâËùµÄ¹¥»÷ÊÂÎñ¡£¡£ ¡£¡£Ö»¹Ü Bybit ÉÐδÕýʽȷÈϺڿÍÉí·Ý£¬£¬£¬£¬£¬£¬µ«´Ë´ÎÊÂÎñÔÙ´Î͹ÏÔÁ˼ÓÃÜÇ®±ÒÁìÓòÃæÁÙµÄÇå¾²ÌôÕ½¡£¡£ ¡£¡£


https://securityaffairs.com/174514/cyber-crime/lazarus-stole-1-5b-from-bybit-cryptocurrency-heist.html


2. PayPalÐÂÐ͵ç×ÓÓʼþÕ©Æ­£ºÊ¹ÓõصãÉèÖÃÓÕÆ­Ô¶³Ì»á¼ûȨÏÞ


2ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬Ò»ÖÖʹÓÃPayPalµç×ÓÓʼþµØµãÉèÖù¦Ð§µÄÕ©Æ­ÊÖ¶ÎÕýÔÚÊ¢ÐС£¡£ ¡£¡£Õ©Æ­Õßͨ¹ýÏòPayPalÕË»§Ìí¼Ó°üÀ¨ÐéαMacBook¹ºÖÃÈ·ÈÏÐÅÏ¢µÄеص㣬£¬£¬£¬£¬£¬´¥·¢PayPal·¢ËÍÈ·ÈÏÓʼþ¡£¡£ ¡£¡£ÕâЩ¿´ËÆÕýµ±µÄÓʼþÓÉ¡°service@paypal.com¡±·¢ËÍ£¬£¬£¬£¬£¬£¬ÓÕÆ­Óû§²¦´òÕ©Æ­µç»°ºÅÂë¡£¡£ ¡£¡£Ò»µ©Óû§²¦´ò£¬£¬£¬£¬£¬£¬Õ©Æ­Õß»áÉù³ÆÕË»§±»ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬²¢ÓÕµ¼Óû§ÏÂÔØ²¢ÔËÐÐÌØ¶¨Èí¼þÒÔ»ñȡԶ³Ì»á¼ûȨÏÞ¡£¡£ ¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬ÕâЩÓʼþÏÖʵÉÏÊÇ·¢Ë͸øÓëÕ©Æ­Õß¹ØÁªµÄµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬£¬¸ÃµØµã»á×Ô¶¯½«Óʼþת·¢¸øÓʼþÁбíÖеÄËùÓгÉÔ±£¬£¬£¬£¬£¬£¬¼´Õ©Æ­Ä¿µÄ¡£¡£ ¡£¡£ÓÉÓÚPayPal²»ÏÞÖÆµØµã×Ö¶Î×Ö·ûÊý£¬£¬£¬£¬£¬£¬Õ©Æ­ÕßÄܹ»×¢ÈëÕ©Æ­ÐÅÏ¢¡£¡£ ¡£¡£ÎªÁËÌá·À´ËÀàÕ©Æ­£¬£¬£¬£¬£¬£¬Óû§Ó¦ºöÂÔ°üÀ¨Ðéα¹ºÖÃÈ·ÈϵÄPayPalÓʼþ£¬£¬£¬£¬£¬£¬²¢²»Òª²¦´òÆäÖÐÌṩµÄµç»°ºÅÂë¡£¡£ ¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬PayPalÐèÒª½ÓÄɲ½·¥ÏÞÖÆµØµã×Ö¶Î×Ö·ûÊý£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâ´ËÀàÕ©Æ­ÐÐΪµÄ±¬·¢¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/beware-paypal-new-address-feature-abused-to-send-phishing-emails/


3. CS2½ÇÖð³Éթƭаг¡£¡£ ¡£¡£ºÓÎÏ·Íæ¼ÒÐèСÐÄSteamÕÊ»§±»µÁΣº¦


2ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÕýʹÓ÷´¿Ö¾«Ó¢ 2 (CS2) µÄ´óÐͽÇÖ𣬣¬£¬£¬£¬£¬ÈçIEM¿¨ÍÐά×È2025ºÍPGL¿Ë¬ÈÕ-Äɲ¨¿¨2025£¬£¬£¬£¬£¬£¬Õë¶ÔÓÎÏ·Íæ¼ÒʵÑéÕ©Æ­£¬£¬£¬£¬£¬£¬ÒâͼÇÔÈ¡ËûÃǵÄSteamÕÊ»§ºÍ¼ÓÃÜÇ®±Ò¡£¡£ ¡£¡£Ö»¹ÜCS2ÒÑÍÆ³ö¶àÄ꣬£¬£¬£¬£¬£¬µ«ÆäÍæ¼ÒÉçÇøºÍÖ°Òµ¾ºÈüÃûÌÃÒÀÈ»ÖØ´óÇÒ»îÔ¾¡£¡£ ¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬CS2ÔÚSteamÉϵÄͬʱÔÚÏßÍæ¼ÒÊýÄ¿µÖ´ïÁËеÄá¯Áë¡£¡£ ¡£¡£Bitdefender Labs·¢Ã÷ÁËÒ»ÏîÃûΪ¡°Streamjacking¡±µÄ¶ñÒâ»î¶¯£¬£¬£¬£¬£¬£¬Õ©Æ­Õßͨ¹ýð³ä×ÅÃûCS2Íæ¼Ò£¬£¬£¬£¬£¬£¬ÔÚYouTubeÖ±²¥ÖÐÐû´«Ã°³äµÄƤ·ôºÍ¼ÓÃÜÇ®±ÒÔùÆ·¡£¡£ ¡£¡£ËûÃÇʹÓñ»Ð®ÖƵÄÕýµ±YouTubeÕÊ»§£¬£¬£¬£¬£¬£¬²¢Ñ­»·²¥·Å¾ÉµÄÓÎÏ·»­ÃæÒÔÓªÔìÖ±²¥Æø·Õ¡£¡£ ¡£¡£ÕâЩÊÓÆµÖеĶþάÂë»òÁ´½Ó»á½«¹ÛÖÚµ¼Ïò¶ñÒâÍøÕ¾£¬£¬£¬£¬£¬£¬ÒªÇóËûÃÇʹÓÃSteamÕÊ»§µÇ¼ÒÔÁìÈ¡ÀñÎï»ò·¢ËͼÓÃÜÇ®±ÒÒÔ»ñÈ¡¸ß¶î»Ø±¨¡£¡£ ¡£¡£Ò»µ©µÇ¼£¬£¬£¬£¬£¬£¬Êܺ¦Õ߾ͻáÔÚ²»ÖªÇéµÄÇéÐÎÏÂÊÚÓèÕ©Æ­Õß»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬µ¼ÖÂÓмÛÖµµÄƤ·ôºÍÎïÆ·±»µÁ£¬£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÒ²»á±»Á¬Ã¦×ªÒÆÖÁÕ©Æ­Õß¿ØÖƵÄÇ®°ü¡£¡£ ¡£¡£ÓÎÏ·Íæ¼ÒÓ¦¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬ºËʵÓë¹Ù·½µç×Ó¾º¼¼×éÖ¯µÄ¹ØÏµ£¬£¬£¬£¬£¬£¬²¢¼¤»î¶àÖØÉí·ÝÑéÖ¤¡¢ÆôÓÃSteam GuardÒÆÆôº½·ÝÑéÖ¤Æ÷ÒÔ¼°°´ÆÚ¼ì²éµÇ¼»î¶¯¡£¡£ ¡£¡£ÔÚYouTubeÉÏ£¬£¬£¬£¬£¬£¬Ö»Ô¢Ä¿¹Ù·½Ö°ÒµÇòÔ±ÕÊ»§µÄÊÓÆµ£¬£¬£¬£¬£¬£¬²¢¶ÔÆäËûƵµÀÉϵÄÖ±²¥¼á³ÖÏÓÒÉ¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/fake-cs2-tournament-streams-used-to-steal-crypto-steam-accounts/


4. SpyLend Android ¶ñÒâÈí¼þÔÚ Google Play ±»ÏÂÔØÁ˳¬ 10 Íò´Î


2ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬Ò»¿îÃûΪSpyLend£¨ÓÖ³ÆFinance Simplified£©µÄAndroid¶ñÒâÈí¼þÓ¦ÓóÌÐòÔÚGoogle PlayÉϱ»ÏÂÔØÁè¼Ý10Íò´Î£¬£¬£¬£¬£¬£¬Ëüαװ³É½ðÈÚ¹¤¾ß£¬£¬£¬£¬£¬£¬ÊµÔòÕë¶ÔÓ¡¶ÈÓû§ÊµÑéÂÓ¶áÐÔ´û¿î¡£¡£ ¡£¡£¸ÃÓ¦ÓÃÊôÓÚSpyLoan¶ñÒâÈí¼þ×飬£¬£¬£¬£¬£¬Í¨¹ýÇëÇó¹ý¶àȨÏÞÇÔÈ¡Óû§Ð¡ÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬£¬ÈçÁªÏµÈË¡¢Í¨»°¼Í¼¡¢¶ÌÐÅ¡¢ÕÕÆ¬¡¢×°±¸Î»ÖõÈ¡£¡£ ¡£¡£ÕâЩÊý¾Ý±»ÓÃÓÚɧÈÅ¡¢Ú²Æ­ºÍÀÕË÷Óû§£¬£¬£¬£¬£¬£¬ÌØÊâÊǵ±Óû§Î´ÄÜÖª×㻹¿îÌõ¿îʱ¡£¡£ ¡£¡£¸ÃÓ¦Óû¹Éù³ÆÊÇ×¢²áµÄ·ÇÒøÐнðÈÚ¹«Ë¾£¬£¬£¬£¬£¬£¬µ«ÊµÔò²»È»¡£¡£ ¡£¡£ÎªÌӱܼì²â£¬£¬£¬£¬£¬£¬Ëü¼ÓÔØWebView½«Óû§Öض¨Ïòµ½Íâ²¿ÍøÕ¾ÏÂÔØ´û¿îÓ¦ÓÃAPK¡£¡£ ¡£¡£¸Ã¶ñÒâÈí¼þ»î¶¯×¨ÃÅÕë¶ÔÓ¡¶ÈÓû§£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡°üÀ¨Ãô¸ÐСÎÒ˽¼ÒÐÅÏ¢ÔÚÄڵĶàÖÖÊý¾Ý£¬£¬£¬£¬£¬£¬ÓÃÓÚڲƭÀÕË÷»ò½ðÈÚڲƭ¡£¡£ ¡£¡£Ö»¹Ü¸ÃÓ¦ÓÃÒÑ´ÓGoogle PlayÒÆ³ý£¬£¬£¬£¬£¬£¬µ«ÈÔ¿ÉÄܼÌÐøÔËÐв¢ÍøÂçÃô¸ÐÐÅÏ¢¡£¡£ ¡£¡£ÈôÏÓÒÉ×°±¸±»Ñ¬È¾£¬£¬£¬£¬£¬£¬ÇëÁ¬Ã¦É¾³ýÏà¹ØÓ¦Ó㬣¬£¬£¬£¬£¬ÖØÖÃȨÏÞ£¬£¬£¬£¬£¬£¬¸ü¸ÄÃÜÂ룬£¬£¬£¬£¬£¬²¢Ö´ÐÐ×°±¸É¨Ãè¡£¡£ ¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬È·±£GoogleµÄPlay Protect¹¤¾ß´¦Óڻ״̬£¬£¬£¬£¬£¬£¬ÒÔ¼ì²â²¢×èÖ¹¶ñÒâÈí¼þ¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/spylend-android-malware-downloaded-100-000-times-from-google-play/


5. CISA½«Craft CMS¸ßÑÏÖØÐÔÇå¾²Îó²îCVE-2025-23209¼ÓÈëKEVĿ¼


2ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Ó°ÏìCraftÄÚÈÝÖÎÀíϵͳ£¨CMS£©µÄ¸ßÑÏÖØÐÔÇå¾²Îó²îCVE-2025-23209Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£ ¡£¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ8.1£¬£¬£¬£¬£¬£¬Ó°ÏìCraft CMS°æ±¾4ºÍ5£¬£¬£¬£¬£¬£¬ÏêϸΪ°æ±¾¹æÄ£ÔÚ>= 4.0.0-RC1, < 4.13.8ºÍ>= 5.0.0-RC1, < 5.5.5Ö®¼ä¡£¡£ ¡£¡£CISAÖ¸³ö£¬£¬£¬£¬£¬£¬ÓÉÓÚÒ×Êܹ¥»÷µÄ°æ±¾ÒѾ­Î£¼°Óû§Çå¾²ÃÜÔ¿£¬£¬£¬£¬£¬£¬Craft CMS±£´æ´úÂë×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐС£¡£ ¡£¡£ÏîĿά»¤Ö°Ô±ÒÑÔÚ2024Äê12ÔÂÏÂÑ®Ðû²¼µÄ°æ±¾4.13.8ºÍ5.5.8Öнâ¾öÁ˸ÃÎó²î¡£¡£ ¡£¡£Craft CMSÔÚGitHubÉÏÐû²¼µÄͨ¸æÖÐÌáµ½£¬£¬£¬£¬£¬£¬ËùÓÐδÐÞ²¹ÇÒÇå¾²ÃÜÔ¿±»Ð¹Â¶µÄ°æ±¾¶¼»áÊܵ½¸ÃÇ徲ȱÏݵÄÓ°Ï죬£¬£¬£¬£¬£¬²¢½¨ÒéÎÞ·¨¸üе½ÐÞ²¹°æ±¾µÄÓû§ÂÖ»»Çå¾²ÃÜÔ¿²¢È·±£ÆäÒþ˽ÒÔ»º½âÎÊÌâ¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±»½¨ÒéÔÚ2025Äê3ÔÂ13ÈÕ֮ǰӦÓÃÐëÒªµÄÐÞ¸´³ÌÐò¡£¡£ ¡£¡£


https://thehackernews.com/2025/02/cisa-flags-craft-cms-vulnerability-cve.html


6. CISA½«Microsoft Power PagesÎó²îCVE-2025-24989¼ÓÈëKEVĿ¼


2ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Microsoft Power PagesµÄÒ»¸ö¸ßÑÏÖØÐÔÎó²î£¨±àºÅΪCVE-2025-24989£¬£¬£¬£¬£¬£¬CVSS·ÖÊýΪ8.2£©Ìí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£ ¡£¡£¸ÃÎó²îÊôÓÚ²»µ±»á¼û¿ØÖÆÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾­ÊÚȨµÄ¹¥»÷Õßͨ¹ýÍøÂçÌáÉýȨÏÞ£¬£¬£¬£¬£¬£¬¿ÉÄÜÈÆ¹ýÓû§×¢²á¿ØÖÆ¡£¡£ ¡£¡£´ËÎó²îÓÉ΢ÈíµÄRaj Kumar±¨¸æ£¬£¬£¬£¬£¬£¬Î¢ÈíÒÑÈ·ÈÏ´ËÎó²îÕýÔÚ±»Æð¾¢Ê¹Ó㬣¬£¬£¬£¬£¬²¢Ðû²¼ÁËͨ¸æÍ¨ÖªÊÜÓ°ÏìµÄ¿Í»§¼ì²éÍøÕ¾²¢½ÓÄÉÕûÀí²½·¥¡£¡£ ¡£¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD£©22-01£¬£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ×èÖ¹ÈÕÆÚǰ½â¾öÒÑ·¢Ã÷µÄÎó²î£¬£¬£¬£¬£¬£¬ÒÔ± £»£»£»£»£»¤ÆäÍøÂçÃâÊܹ¥»÷¡£¡£ ¡£¡£CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê3ÔÂ21ÈÕ֮ǰÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬£¬Í¬Ê±×¨¼ÒÒ²½¨Òé˽ÈË×éÖ¯Éó²é¸ÃĿ¼²¢½â¾öÆä»ù´¡ÉèÊ©ÖеÄÎó²î£¬£¬£¬£¬£¬£¬ÒÔ½µµÍÇ徲Σº¦¡£¡£ ¡£¡£


https://securityaffairs.com/174541/hacking/u-s-cisa-adds-microsoft-power-pages-flaw-known-exploited-vulnerabilities-catalog.html