µÂ¿ËÈøË¹ÖÝ״ʦЭ»áÔâINCÀÕË÷Èí¼þ¹¥»÷µ¼ÖÂÊý¾Ýй¶

Ðû²¼Ê±¼ä 2025-04-08

1. µÂ¿ËÈøË¹ÖÝ״ʦЭ»áÔâINCÀÕË÷Èí¼þ¹¥»÷µ¼ÖÂÊý¾Ýй¶


4ÔÂ3ÈÕ£¬ £¬£¬£¬£¬£¬£¬ÃÀ¹úµÚ¶þ´ó״ʦЭ»á¡ª¡ªµÂ¿ËÈøË¹ÖÝ״ʦЭ»áÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬£¬£¬£¬²¨¼°³¬10ÍòÃûִҵ״ʦ¡£¡£¡£¸ÃЭ»á¼ç¸ºÖ´ÒµÔÊÐíî¿Ïµ¡¢¼ÌÐø½ÌÓýÖÎÀí¡¢Ö°ÒµÆ·µÂ¼àÊӵȽ¹µãÖ°ÄÜ£¬ £¬£¬£¬£¬£¬£¬ÆäÍøÂçϵͳÓÚ2025Äê1ÔÂ28ÈÕÖÁ2ÔÂ9ÈÕ¼äÔâδ¾­ÊÚȨ»á¼û£¬ £¬£¬£¬£¬£¬£¬µ«Ö±ÖÁ2ÔÂ12ÈÕ·½±»²ì¾õ¡£¡£¡£Æ¾Ö¤Ð­»áÏòÊÜÓ°Ïì³ÉÔ±Ðû²¼µÄ֪ͨ£¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÇÔÈ¡Á˰üÀ¨È«ÃûµÄÃô¸ÐÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬Ïêϸй¶¹æÄ£ÉÐδÃ÷È·¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬£¬£¬£¬£¬INCÀÕË÷Èí¼þÍÅ»ï¹ûÕæÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬ £¬£¬£¬£¬£¬£¬²¢ÓÚ3ÔÂ9ÈÕ½«¸ÃЭ»áÁÐÈë°µÍøÀÕË÷Ãûµ¥£¬ £¬£¬£¬£¬£¬£¬Í¬Ê±Åû¶Á˲¿·Ö¾Ý³ÆÎªÖ´·¨°¸¼þÎļþµÄ±»µÁÊý¾ÝÑù±¾¡£¡£¡£Ð­»áÒѽÓÄÉÓ¦¶Ô²½·¥£¬ £¬£¬£¬£¬£¬£¬ÎªÊÜÓ°Ïì³ÉÔ±ÌṩÓÐÓÃÆÚÖÁ7ÔÂ31ÈÕµÄÃâ·ÑÐÅÓü°Éí·Ý͵ÇÔ¼à¿ØÐ§ÀÍ£¨ÓÉExperianÌṩ֧³Ö£©£¬ £¬£¬£¬£¬£¬£¬²¢½¨Òé³ÉԱͨ¹ý¼¤»îÂë×¢²á¸ÃЧÀÍ¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬Ð­»áÇ¿ÁÒ½¨Òé³ÉԱ˼Á¿Æô¶¯ÐÅÓö³½á»òÔÚÐÅÓõµ°¸ÖÐÉèÖÃڲƭ¾¯±¨£¬ £¬£¬£¬£¬£¬£¬ÒÔ×î´óÏ޶ȽµµÍDZÔÚΣº¦¡£¡£¡£


https://www.bleepingcomputer.com/news/security/texas-state-bar-warns-of-data-breach-after-inc-ransomware-claims-attack/


2. EverestÀÕË÷Èí¼þÍÅ»ï°µÍøÐ¹ÃÜÍøÕ¾Ôâδ֪¹¥»÷ÏÂÏß


4ÔÂ7ÈÕ£¬ £¬£¬£¬£¬£¬£¬¿ËÈÕ£¬ £¬£¬£¬£¬£¬£¬Everest ÀÕË÷Èí¼þÍÅ»ïµÄ°µÍøÐ¹ÃÜÍøÕ¾ÔâÓöδ֪¹¥»÷ÕßÏ®»÷£¬ £¬£¬£¬£¬£¬£¬ÏÖÔÚÒÑÏÂÏß¡£¡£¡£¹¥»÷Õß½«ÍøÕ¾ÄÚÈÝÌæ»»Îª¼¥Ð¦ÐÅÏ¢£º¡°²»Òª·¸·¨£¬ £¬£¬£¬£¬£¬£¬·¸·¨ÊÇ»µÊ£¬ £¬£¬£¬£¬£¬£¬À´×Ô²¼À­¸ñ¡£¡£¡£¡±ÏÖÔÚ£¬ £¬£¬£¬£¬£¬£¬¸ÃÍøÕ¾ÏÔʾ¡°Î´ÕÒµ½Ñó´ÐÍøÕ¾¡±¹ýʧ£¬ £¬£¬£¬£¬£¬£¬ÎÞ·¨¼ÓÔØ¡£¡£¡£Ö»¹Ü¹¥»÷ÕßÔõÑù½øÈëÍøÕ¾»òÍøÕ¾ÊÇ·ñ±»ºÚ¿Í¹¥»÷Éв»Ã÷È·£¬ £¬£¬£¬£¬£¬£¬µ«Ç徲ר¼ÒÖ¸³ö£¬ £¬£¬£¬£¬£¬£¬Everest ʹÓÃµÄ WordPress Ä£°å¿ÉÄܱ£´æÇ±ÔÚÎó²î£¬ £¬£¬£¬£¬£¬£¬¸ÃÎó²î»ò±»Ê¹ÓÃÀ´ÆÆËðÀÕË÷Èí¼þ²Ù×÷µÄ×ßÂ©ÍøÕ¾¡£¡£¡£×Ô 2020 Äê·ºÆðÒÔÀ´£¬ £¬£¬£¬£¬£¬£¬Everest ÀÕË÷Èí¼þÐж¯Õ½ÂÔÒѱ¬·¢×ª±ä£¬ £¬£¬£¬£¬£¬£¬´Ó½öÇÔÈ¡Êý¾Ý¡¢ÀÕË÷Æóҵת±äΪÔÚ¹¥»÷ÖмÓÈëÀÕË÷Èí¼þ£¬ £¬£¬£¬£¬£¬£¬¼ÓÃÜÊܺ¦Õßϵͳ¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬Everest ÔËÓªÉÌ»¹Òò³äµ±ÆäËûÍøÂç·¸·¨ÍÅ»ïºÍÍþвÐÐΪÕߵijõʼ»á¼ûȨÏÞ¾­¼ÍÈ˶ø×ÅÃû£¬ £¬£¬£¬£¬£¬£¬³öÊÛ±»¹¥ÆÆµÄ¹«Ë¾ÍøÂç»á¼ûȨÏÞ¡£¡£¡£ÔÚÒÑÍù 5 ÄêÖУ¬ £¬£¬£¬£¬£¬£¬Everest µÄ°µÍøÐ¹ÃÜÍøÕ¾ÔöÌíÁË 230 ¶àÃûÊܺ¦Õߣ¬ £¬£¬£¬£¬£¬£¬³ÉÎªË«ÖØÀÕË÷¹¥»÷µÄÒ»²¿·Ö£¬ £¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïÊÔͼÒÔÐû²¼Ãô¸ÐÐÅϢΪÍþв£¬ £¬£¬£¬£¬£¬£¬ÆÈʹÊܺ¦ÕßÖ§¸¶Êê½ð¡£¡£¡£


https://www.bleepingcomputer.com/news/security/everest-ransomwares-dark-web-leak-site-defaced-now-offline/


3. VSCode¶ñÒâÀ©Õ¹ÏÖÉí΢ÈíÊг¡£¬ £¬£¬£¬£¬£¬£¬½èXMRigÍÚ¿óIJÀû


4ÔÂ7ÈÕ£¬ £¬£¬£¬£¬£¬£¬¿ËÈÕ£¬ £¬£¬£¬£¬£¬£¬ExtensionTotalÑо¿Ô±Yuval Ronen·¢Ã÷£¬ £¬£¬£¬£¬£¬£¬2025Äê4ÔÂ4ÈÕ£¬ £¬£¬£¬£¬£¬£¬Î¢ÈíÃÅ»§ÉÏÇÄÈ»Ðû²¼Á˾Ÿöαװ³ÉÕýµ±¿ª·¢¹¤¾ßµÄVSCodeÀ©Õ¹¡£¡£¡£ÕâЩÀ©Õ¹ÒÔ¡°Discord Rich Presence for VS Code¡±¡°Rojo ¨C Roblox Studio Sync¡±µÈÃû³ÆÊ¾ÈË£¬ £¬£¬£¬£¬£¬£¬×°ÖÃÁ¿³¬30Íò´Î£¬ £¬£¬£¬£¬£¬£¬µ«Êý×Ö¿ÉÄܱ»ÈËΪǿµ÷£¬ £¬£¬£¬£¬£¬£¬Ö¼ÔÚÓªÔìÕýµ±¼ÙÏ󡣡£¡£Ò»µ©×°Öü¤»î£¬ £¬£¬£¬£¬£¬£¬ÕâЩ¶ñÒâÀ©Õ¹±ã´ÓÍⲿԴ»ñÈ¡²¢Ö´ÐÐPowerShell¾ç±¾£¬ £¬£¬£¬£¬£¬£¬Í¬Ê±×°ÖÃÆäÄ£ÄâµÄÕýµ±À©Õ¹ÒÔÑÚÈËÏßÈË¡£¡£¡£¶ñÒâÈí¼þ»á½¨Éèαװ³É¡°OnedriveStartup¡±µÄÍýÏëʹÃü£¬ £¬£¬£¬£¬£¬£¬²¢ÔÚWindows×¢²á±íÖÐ×¢Èë¾ç±¾£¬ £¬£¬£¬£¬£¬£¬È·±£ÏµÍ³Æô¶¯Ê±×Ô¶¯ÔËÐС£¡£¡£Ëü»¹»á¹Ø±ÕÒªº¦WindowsЧÀÍ£¬ £¬£¬£¬£¬£¬£¬ÈçWindows Update£¬ £¬£¬£¬£¬£¬£¬²¢½«×ÔÉíÌí¼Óµ½Windows DefenderµÄɨ³ýÁбíÖУ¬ £¬£¬£¬£¬£¬£¬ÒÔÌӱܼì²â¡£¡£¡£ÈôδÒÔÖÎÀíԱȨÏÞÖ´ÐУ¬ £¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»áÄ£Äâϵͳ¶þ½øÖÆÎļþ£¬ £¬£¬£¬£¬£¬£¬Ê¹ÓöñÒâMLANG.dllÖ´ÐÐDLLÐ®ÖÆ£¬ £¬£¬£¬£¬£¬£¬ÌáÉýȨÏÞ²¢Ö´ÐÐÓÐÓøºÔØ¡£¡£¡£¸Ã¿ÉÖ´ÐÐÎļþ½ÓÄÉbase64±àÂëÃûÌ㬠£¬£¬£¬£¬£¬£¬ÓÉPowerShell¾ç±¾½âÂëºóÅþÁ¬µ½¸¨ÖúЧÀÍÆ÷£¬ £¬£¬£¬£¬£¬£¬ÏÂÔØ²¢ÔËÐÐXMRig¼ÓÃÜÇ®±Ò¿ó¹¤¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬£¬Ö»¹ÜExtensionTotalÒÑÏò΢Èí±¨¸æÕâЩ¶ñÒâÀ©Õ¹£¬ £¬£¬£¬£¬£¬£¬µ«ËüÃÇÈÔ¿ÉÓᣡ£¡£


https://www.bleepingcomputer.com/news/security/malicious-vscode-extensions-infect-windows-with-cryptominers/


4. ºÚ¿Íð³äÎÚ»ú¹¹·¢¶¯¹¥»÷£¬ £¬£¬£¬£¬£¬£¬ÇÔÃܶñÒâÈí¼þÍþв¼Ó¾ç


4ÔÂ8ÈÕ£¬ £¬£¬£¬£¬£¬£¬Æ¾Ö¤Õþ¸®×îÐÂÑо¿£¬ £¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýʹÓÃÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ¶ÔÎÚ¿ËÀ¼Òªº¦²¿·Ö·¢¶¯¹¥»÷¡£¡£¡£×Ô2ÔÂÒÔÀ´£¬ £¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×飨CERT-UA£©Ò»Ö±ÔÚ×·×ÙÕâÒ»»î¶¯£¬ £¬£¬£¬£¬£¬£¬ÆäÄ»ºóÍþвÕß±»×·×ÙΪUAC-0226£¬ £¬£¬£¬£¬£¬£¬µ«ÉÐδ¹é×ïÓÚÈκÎÒÑÖªºÚ¿Í×éÖ¯¡£¡£¡£ºÚ¿Í´Ó±»ÈëÇÖµÄÕË»§·¢ËÍ´øÓжñÒâÎĵµ¸½¼þµÄµç×ÓÓʼþ£¬ £¬£¬£¬£¬£¬£¬ÎļþÃû»òÖ÷ÌâÐÐÉæ¼°µØÀ×ɨ³ý¡¢ÐÐÕþ·£¿£¿ £¿î¡¢ÎÞÈË»úÉú²ú»ò¹¤ÒµËðʧÅâ³¥µÈ»°Ì⣬ £¬£¬£¬£¬£¬£¬ÒÔѬȾÎÚ¿ËÀ¼Îä×°²½¶Ó¡¢Ö´·¨»ú¹¹ºÍµØ·½Õþ¸®»ú¹¹µÈÄ¿µÄ¡£¡£¡£×èÖ¹4Ô£¬ £¬£¬£¬£¬£¬£¬ºÚ¿ÍÒѰ²ÅÅÁ½ÖÖ¶ñÒâÈí¼þ£¬ £¬£¬£¬£¬£¬£¬Ò»ÖÖ»ùÓÚGitHub¹ûÕæ´úÂ룬 £¬£¬£¬£¬£¬£¬ÁíÒ»ÖÖÃûΪGiftedCrook£¬ £¬£¬£¬£¬£¬£¬¿ÉÇÔÈ¡ä¯ÀÀÆ÷Êý¾Ý²¢·¢Ë͵½Telegramй¶¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬3Ô·ݻ¹·¢Ã÷ÁËÖÁÉÙÈýÆðʹÓÃÐÂÐÍÌØ¹¤¶ñÒâÈí¼þWrecksteelµÄÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ý±»µÁÕË»§·¢ËͰüÀ¨¹«¹²Îļþ¹²ÏíЧÀÍÁ´½ÓµÄÐÂÎÅ£¬ £¬£¬£¬£¬£¬£¬Ö´ÐÐPowerShell¾ç±¾ºó£¬ £¬£¬£¬£¬£¬£¬¿ÉÌáÈ¡¶àÖÖÎļþ²¢½ØÈ¡ÆÁÄ»½ØÍ¼¡£¡£¡£CERT-UAÌṩÁËÍøÂç´¹ÂÚµç×ÓÓʼþʾÀý£¬ £¬£¬£¬£¬£¬£¬ÒÔ¾¯Ê¾¹«ÖÚ×¢ÖØ´ËÀ๥»÷¡£¡£¡£


https://therecord.media/hackers-impersonate-drone-companies-state-agencies-spy-ukraine


5. WK Kellogg CoÔâClopʹÓÃCleoÎó²îʵÑéÊý¾Ý͵ÇÔ¹¥»÷


4ÔÂ7ÈÕ£¬ £¬£¬£¬£¬£¬£¬ÃÀ¹úʳÎï¾ÞÍ·WK Kellogg Co¿ËÈÕÖÒÑÔÔ±¹¤ºÍ¹©Ó¦ÉÌ£¬ £¬£¬£¬£¬£¬£¬¹«Ë¾Êý¾ÝÔÚ2024ÄêCleoÊý¾Ý͵ÇÔ¹¥»÷ÖÐÔâÇÔÈ¡¡£¡£¡£CleoÈí¼þÊÇÒ»¿îÍйÜÎļþ´«ÊäÊÊÓóÌÐò£¬ £¬£¬£¬£¬£¬£¬È¥ÄêÄêµ×£¬ £¬£¬£¬£¬£¬£¬ClopÀÕË÷Èí¼þÍÅ»ïʹÓÃÁ½¸öÁãÈÕÎó²îCVE-2024-50623ºÍCVE-2024-55956£¬ £¬£¬£¬£¬£¬£¬ÕûÌå¹¥»÷Á˸ÃÈí¼þ£¬ £¬£¬£¬£¬£¬£¬Ê¹ÍþвÐÐΪÕßÄܹ»ÈëÇÖЧÀÍÆ÷²¢ÇÔÈ¡Êý¾Ý¡£¡£¡£WK KelloggÓÚ2025Äê2ÔÂ27ÈÕ»ñϤ´ËÊ£¬ £¬£¬£¬£¬£¬£¬²¢Á¬Ã¦Õö¿ªÊӲ졣¡£¡£¾­ÁªÏµCleoºóµÃÖª£¬ £¬£¬£¬£¬£¬£¬Ò»Ãûδ¾­ÊÚȨµÄÈËÓÚ2024Äê12ÔÂ7ÈÕ»á¼ûÁËCleoΪWK KelloggÍйܵÄЧÀÍÆ÷¡£¡£¡£Ö»¹ÜWK KelloggδÏêϸÌá¼°Clop»òÊý¾Ý͵ÇÔ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬µ«±¨¸æÊÂÎñµÄÈÕÆÚÓë2024Äê12Ô±¬·¢µÄÒ»²¨¹¥»÷ÏàÎǺϡ£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬ClopÀÕË÷Èí¼þÍÅ»ïÔÚ½«WK KelloggÁÐÈëÆäÊý¾Ýй¿àÕË÷ÍøÕ¾ºó²»¾Ã£¬ £¬£¬£¬£¬£¬£¬¾ÍÐû²¼ÁËÎ¥¹æÍ¨Öª¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨Ð¡ÎÒ˽¼ÒµÄÐÕÃûºÍÉç»á°ü¹ÜºÅ¡£¡£¡£WK KelloggÒÑÓëCleoÇ×½üÏàÖú£¬ £¬£¬£¬£¬£¬£¬È·¶¨ÁËΪ½â¾öÎ¥¹æÐÐΪ²¢±ÜÃâδÀ´±¬·¢ÀàËÆÊÂÎñ¶øÊµÑéµÄÇå¾²²½·¥¡£¡£¡£´Ë´ÎÊÂÎñʹWK Kellogg³ÉΪÊܵ½ClopµÄCleoÁãÈÕ¹¥»÷Ó°ÏìµÄÖڶ๫˾ÖеÄ×îÐÂÊܺ¦Õß¡£¡£¡£


https://www.bleepingcomputer.com/news/security/food-giant-wk-kellogg-discloses-data-breach-linked-to-clop-ransomware/


6. ÐÂÐÍNeptune RAT±äÖÖÍþв¼Ó¾ç£¬ £¬£¬£¬£¬£¬£¬ÇÔÃÜÓëÆÆËðÄÜÁ¦Éý¼¶


4ÔÂ7ÈÕ£¬ £¬£¬£¬£¬£¬£¬¿ËÈÕ£¬ £¬£¬£¬£¬£¬£¬Ò»ÖÖеÄNeptune RAT±äÖÖͨ¹ýYouTubeºÍTelegramµÈÉ罻ƽ̨ÆÕ±éÈö²¥£¬ £¬£¬£¬£¬£¬£¬¶ÔWindowsÓû§×é³ÉÑÏÖØÍþв¡£¡£¡£¸Ã¶ñÒâÈí¼þËäÉù³ÆÓÃÓÚ¡°½ÌÓýºÍÆ·µÂÄ¿µÄ¡±£¬ £¬£¬£¬£¬£¬£¬µ«ÏÖʵ¹¦Ð§È´Ô¶·ÇÔÆÔÆ¡£¡£¡£Neptune RATÄܹ»ÇÔÈ¡Óû§Æ¾Ö¤¡¢Ìæ»»¼ÓÃÜÇ®±ÒÇ®°üµØµã£¬ £¬£¬£¬£¬£¬£¬ÉõÖÁʹÓÃÀÕË÷Èí¼þ¹¦Ð§Ëø¶¨Îļþ£¬ £¬£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»ÖÜÈ«¿ØÖÆÊÜѬȾµÄϵͳ¡£¡£¡£¸Ã¶ñÒâÈí¼þÔÚÉ罻ƽ̨ÉÏÃâ·Ñ·Ö·¢£¬ £¬£¬£¬£¬£¬£¬Òþ²ØÁË¿ÉÖ´ÐÐÎļþ£¬ £¬£¬£¬£¬£¬£¬²¢Ê¹Óð¢À­²®×Ö·ûºÍÐÄÇé·ûºÅÌæ»»²¿·Ö×Ö·û´®£¬ £¬£¬£¬£¬£¬£¬ÔöÌíÁËÆÊÎöÄѶȡ£¡£¡£ÆäÃâ·Ñ°æ±¾»á×Ô¶¯ÌìÉúPowerShellÏÂÁ £¬£¬£¬£¬£¬£¬ÏÂÔØ²¢ÔËÐÐÆäËû¶ñÒâ×é¼þ¡£¡£¡£Neptune RAT°üÀ¨¶àÖÖ¹¥»÷Ä£¿£¿ £¿é£¬ £¬£¬£¬£¬£¬£¬ÈçÆ¾Ö¤ÍµÇÔ¡¢¼ôÌù°åÐ®ÖÆ¡¢ÀÕË÷Èí¼þºÍϵͳË𻵵È£¬ £¬£¬£¬£¬£¬£¬Äܹ»Ð­Í¬¹¥»÷WindowsÅÌËã»ú¡£¡£¡£ÎªÌӱܼì²â£¬ £¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»áÐÞ¸Ä×¢²á±íÖµ¡¢Ìí¼Óµ½WindowsʹÃüÍýÏë³ÌÐòÖУ¬ £¬£¬£¬£¬£¬£¬²¢¼ì²éÊÇ·ñÔÚÐéÄâÇéÐÎÖÐÔËÐС£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬¸½¼ÓµÄDLLÎļþÔöÌíÁ˸ü¶à¹¦Ð§£¬ £¬£¬£¬£¬£¬£¬°üÀ¨ÈƹýÓû§ÕÊ»§¿ØÖÆ¡¢ÇÔÈ¡Êý¾ÝºÍʵʱÆÁÄ»¼à¿ØµÈ¡£¡£¡£


https://hackread.com/neptune-rat-variant-youtube-steal-windows-passwords/