GlassWormµÚËIJ¨¹¥»÷Ãé×¼macOS¿ª·¢Õß

Ðû²¼Ê±¼ä 2026-01-05

1. GlassWormµÚËIJ¨¹¥»÷Ãé×¼macOS¿ª·¢Õß


1ÔÂ1ÈÕ£¬£¬ £¬£¬£¬2025Äê10ÔÂÊ״ηºÆðµÄGlassWorm¶ñÒâÈí¼þ¿ËÈÕÌᳫµÚËIJ¨¹¥»÷£¬£¬ £¬£¬£¬×¨ÃÅÕë¶ÔmacOS¿ª·¢Õߣ¬£¬ £¬£¬£¬Í¨¹ý¸Ä¶¯VSCode/OpenVSXÀ©Õ¹³ÌÐòÖ²Èë¼ÓÃÜÇ®°üľÂí°æ±¾¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯·ºÆð¿çÆ½Ì¨ÌØÕ÷£¬£¬ £¬£¬£¬´ËǰÖ÷ÒªÕë¶ÔWindowsϵͳ£¬£¬ £¬£¬£¬ÏÖÀ©Õ¹ÖÁmacOS£¬£¬ £¬£¬£¬Í¹ÏÔ¹¥»÷Õß¶Ô¿ª·¢ÕßÉú̬µÄÒ»Á¬ÉøÍ¸¡£¡£¡£¡£¡£¹¥»÷ʹÓÃOpenVSXºÍMicrosoft Visual Studio MarketplaceÖеĶñÒâÀ©Õ¹³ÌÐò£¬£¬ £¬£¬£¬ÕâЩÀ©Õ¹Í¨³£ÓÃÓÚÔöÇ¿±à¼­Æ÷¹¦Ð§¡£¡£¡£¡£¡£GlassWormͨ¹ý¡°²»¿É¼û¡±Unicode×Ö·ûÒþ²Ø¶ñÒâ´úÂ룬£¬ £¬£¬£¬×°ÖúóÇÔÈ¡GitHub¡¢npm¡¢OpenVSXÕË»§Æ¾Ö¤¼°¶àÀ©Õ¹³ÌÐòµÄ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬ £¬£¬£¬²¢Ö§³ÖVNCÔ¶³Ì»á¼ûºÍSOCKSÊðÀíÁ÷Á¿Â·ÓÉ¡£¡£¡£¡£¡£×îбäÖÖ½ÓÄÉAES-256-CBC¼ÓÃÜÓÐÓÃÔØºÉ£¬£¬ £¬£¬£¬ÑÓ³Ù15·ÖÖÓÖ´ÐÐÒÔÌÓ±ÜɳºÐÆÊÎö£¬£¬ £¬£¬£¬Ê¹ÓÃAppleScriptÌæ»»PowerShell£¬£¬ £¬£¬£¬Í¨¹ýLaunchAgentsʵÏÖ³¤ÆÚ»¯£¬£¬ £¬£¬£¬Í¬Ê±ÊµÑéÇÔÈ¡KeychainÃÜÂë²¢Ìæ»»Ó²¼þÇ®°üľÂí£¨ÈçLedger Live¡¢Trezor Suite£©£¬£¬ £¬£¬£¬µ«Ä¿½ñľÂíÇ®°ü·µ»Ø¿ÕÎļþ£¬£¬ £¬£¬£¬¿ÉÄÜ´¦ÓÚ×¼±¸½×¶Î¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬ £¬£¬£¬¶ñÒâÀ©Õ¹ÔÚOpenVSXƽ̨ÈÔ±£´æ£¬£¬ £¬£¬£¬ÏÂÔØÁ¿³¬33,000´Î¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-glassworm-malware-wave-targets-macs-with-trojanized-crypto-wallets/


2. Unleash ProtocolËðʧ390ÍòÃÀÔª¼ÓÃÜ×ʲú


12ÔÂ31ÈÕ£¬£¬ £¬£¬£¬È¥ÖÐÐÄ»¯ÖªÊ¶²úȨƽ̨Unleash ProtocolÒò¶àÖØÊðÃûÖÎÀíϵͳ±»¹¥»÷£¬£¬ £¬£¬£¬Ëðʧ¼ÛÖµÔ¼390ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¾ÝÏîÄ¿ÍŶÓÅû¶£¬£¬ £¬£¬£¬¹¥»÷Õßͨ¹ýδÊÚȨµÄºÏÔ¼Éý¼¶»ñÈ¡ÖÎÀíԱȨÏÞ£¬£¬ £¬£¬£¬½âËø×ʲúÌá¿î¹¦Ð§£¬£¬ £¬£¬£¬µ¼ÖÂWIP¡¢USDC¡¢WETH¡¢stIPºÍvIPµÈ×ʲú±»µÁ¡£¡£¡£¡£¡£PeckShieldAlertÇø¿éÁ´Ç徲ר¼ÒÈ·ÈÏ£¬£¬ £¬£¬£¬Ëðʧ½ð¶îÔ¼390ÍòÃÀÔª£¬£¬ £¬£¬£¬×ʽðͨ¹ýµÚÈý·½»ù´¡ÉèʩǎÓ×ªÒÆÖÁÍⲿµØµã£¬£¬ £¬£¬£¬×îÖÕÒÔ1,337 ETH´æÈëTornado Cash¼ÓÃÜÇ®±Ò»ìÏýЧÀÍÒÔ½µµÍ¿É×·ËÝÐÔ¡£¡£¡£¡£¡£Unleash Protocol¶¨Î»ÎªÖªÊ¶²úȨÖÎÀí²Ù×÷ϵͳ£¬£¬ £¬£¬£¬¿É½«ÖªÊ¶²úȨ´ú±Ò»¯²¢×÷ΪDeFiµäÖÊÆ·£¬£¬ £¬£¬£¬Í¨¹ýÖÇÄܺÏÔ¼×Ô¶¯·ÖÅÉÔÊÐí·ÑºÍ°æË°¡£¡£¡£¡£¡£´Ë´Î¹¥»÷̻¶Æä¶àÖØÊðÃûÖÎÀíϵͳµÄÇå¾²Îó²î£ºÍⲿµØµãͨ¹ýÖÎÀíϵͳ»ñÈ¡ÖÎÀí¿ØÖÆÈ¨£¬£¬ £¬£¬£¬Ö´ÐÐδ¾­ÍŶÓÅú×¼µÄºÏÔ¼Éý¼¶£¬£¬ £¬£¬£¬Í»ÆÆÔ­ÓÐÖÎÀí¼°ÔËÓª³ÌÐòÏÞÖÆ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃTornado CashµÄ»ìÏý»úÖÆÌÓ±Ü×·×Ù£¬£¬ £¬£¬£¬¸ÃЧÀÍÔøÒòЭÖú³¯ÏʺڿÍÏ´Ç®ÓÚ2022ÄêÔâÃÀ¹úÖÆ²Ã£¬£¬ £¬£¬£¬2025ÄêËä±»³ýÃû£¬£¬ £¬£¬£¬µ«ÈÔ±»ÍøÂç·¸·¨·Ö×ÓÀÄÓᣡ£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬ £¬£¬£¬Unleash ProtocolÒÑÔÝÍ£ËùÓÐÔËÓª£¬£¬ £¬£¬£¬Ô¼ÇëÍⲿÇ徲ר¼ÒÊÓ²ìÎó²îȪԴ£¬£¬ £¬£¬£¬ÆÀ¹Àµ÷½âÓë»Ö¸´²½·¥¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-drain-39m-from-unleash-protocol-after-multisig-hijack/


3. PlayÀÕË÷Èí¼þ¹¥»÷°ÙÄêÀ±½·½´¾ÞÍ·Garner Foods


1ÔÂ2ÈÕ£¬£¬ £¬£¬£¬PlayÀÕË÷Èí¼þ×éÖ¯ÔÚ°µÍøÐû²¼ÐÂÎÅ£¬£¬ £¬£¬£¬ÒªÇóÓµÓнü°ÙÄêÀúÊ·µÄ±±¿¨ÂÞÀ´ÄÉÖÝÀ±½·½´ÖÆÔìÉÌGarner FoodsÔÚ1ÔÂ7ÈÕǰÁªÏµ²¢Ö§¸¶Î´¹ûÕæÊê½ð£¬£¬ £¬£¬£¬²»È»½«Ð¹Â¶ÆäÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£×÷ΪÃÀ¹ú×ÅÃû½´ÁÏÆ·ÅÆ£¬£¬ £¬£¬£¬Garner Foods×Ô1929ÄêÆðÉú²úµÂÖÝÆ¤ÌØ¡¢ÂÌɽ¸ñÁÖ¸êɯɯ½´µÈϵÁвúÆ·£¬£¬ £¬£¬£¬²úÆ·ÁýÕÖÈ«ÃÀÊýÍò¼Ò³¬ÊС¢¾üÐèµê¼°±ãµ±µê£¬£¬ £¬£¬£¬²¢ÔÚʳÎïЧÀÍÓë²ÍÒûÐÐÒµÕ¼ÓÐÖ÷Ҫְλ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷̻¶ÁËÆóÒµ½¹µãÊý¾ÝΣº¦£ºPlayÉù³ÆÇÔÈ¡Á˰üÀ¨Ë½ÈËÉñÃØÊý¾Ý¡¢¿Í»§Îļþ¡¢Ô¤Ëã¡¢ÈËΪµ¥¡¢²ÆÎñÐÅÏ¢¼°Ë°ÊռͼÔÚÄڵĶàÀàÃô¸ÐÐÅÏ¢£¬£¬ £¬£¬£¬¿ÉÄÜÉæ¼°±ê¼ÇÐÔÅä·½µÈרÓÐÐÅÏ¢¡£¡£¡£¡£¡£Ê³ÎïÉú²úÉÌÔâÀÕË÷¹¥»÷Ò×Òý·¢¹©Ó¦Á´Á¬Ëø·´Ó¦£¬£¬ £¬£¬£¬´ÓÉú²úÕϰ­¡¢½»¸¶ÑÓ³Ùµ½²úƷǷȱ£¬£¬ £¬£¬£¬²»µ«Ëðº¦ÆóÒµÉùÓþ£¬£¬ £¬£¬£¬»¹¿ÉÄܵ¼ÖÂÏûºÄÕßתÏò¾ºÆ·¡£¡£¡£¡£¡£Play×éÖ¯×÷Ϊ2024-2025ÄêÈ«ÇòµÚÈý»îÔ¾ÀÕË÷Èí¼þÍŻ£¬ £¬£¬£¬ÒÑÔì³É³¬Ç§ÃûÊܺ¦Õß¡£¡£¡£¡£¡£Æä½ÓÄÉ¡°¼äЪÐÔ¼ÓÃÜ¡±ÊÖÒÕ£¬£¬ £¬£¬£¬½ö¼ÓÃÜϵͳ²¿·ÖÀο¿ÇøÓòÒÔ¿ìËÙÇÔÈ¡Êý¾Ý£¬£¬ £¬£¬£¬¸ÃÕ½ÂÔÒѱ»¶à¸ö×ÅÃûÀÕË÷×é֯Ч·Â¡£¡£¡£¡£¡£


https://cybernews.com/news/texas-pete-hot-sauce-play-ransomware-attack-garner-foods/


4. PlayÀÕË÷Èí¼þ¹¥»÷ͯЬ¾ÞÍ·Esquire Brands


1ÔÂ2ÈÕ£¬£¬ £¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬Í¯Ð¬ÖÆÔìÉÌEsquire BrandsÔâÓöÖøÃûÀÕË÷Èí¼þÍÅ»ïPlayµÄ¹¥»÷£¬£¬ £¬£¬£¬¸ÃÍÅ»ïÔÚ°µÍøÂÛ̳ÉÏÐû³ÆÒÑÇÔÈ¡ÆäÉñÃØÊý¾Ý£¬£¬ £¬£¬£¬²¢Íþв×îÔçÓÚ1ÔÂ3ÈÕÐû²¼¡£¡£¡£¡£¡£×÷ΪӵÓÐDKNY¡¢Sam EdelmanºÍKenneth ColeµÈÆ·ÅÆÊÚȨµÄÆóÒµ£¬£¬ £¬£¬£¬Esquire BrandsרעÓÚͯЬµÄÉè¼Æ¡¢ÊÚȨÓëÉú²ú£¬£¬ £¬£¬£¬ÆäÓªÒµÁýÕÖÈ«Çò¶à¸öÊг¡¡£¡£¡£¡£¡£¹¥»÷ÕßÉù³Æ»ñÈ¡Á˿ͻ§Îļþ¡¢ÈËΪÊý¾Ý¡¢²ÆÎñÐÅÏ¢µÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£´ËÀàÊý¾Ýй¶¿ÉÄÜÒý·¢ÑÏÖØÐ§¹û£ºÈËΪÊý¾Ý°üÀ¨Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬£¬£¬¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢¶¨ÏòÍøÂç´¹ÂÚ¼°Éç»á¹¤³Ì¹¥»÷£¬£¬ £¬£¬£¬ÀýÈçð³ä¸ß¹ÜÆ­È¡×ʽ𣻣»£»£»£»¿Í»§ÎļþºÍ²ÆÎñÐÅÏ¢Ôò¿ÉÄܱ»ÓÃÓÚÉèÁ¢Ú²Æ­ÕË»§»òÉÌÒµÌØ¹¤»î¶¯£¬£¬ £¬£¬£¬¶ÔÆóÒµÉùÓþºÍÔËÓªÔì³Éºã¾ÃË𺦡£¡£¡£¡£¡£PlayÀÕË÷Èí¼þ¼¯ÍÅÊÇÍøÂç·¸·¨ÁìÓòµÄ»îÔ¾¼ÓÈëÕߣ¬£¬ £¬£¬£¬2024ÄêλÁÐÈ«Çò×î»îÔ¾ÀÕË÷Èí¼þÍÅ»ïǰÈýÃû£¬£¬ £¬£¬£¬ÒÔ¡°¼äЪÐÔ¼ÓÃÜ¡±ÊÖÒÕÖø³Æ£¬£¬ £¬£¬£¬½ö¼ÓÃÜÏµÍ³ÌØ¶¨Àο¿²¿·Ö£¬£¬ £¬£¬£¬´Ó¶ø¿ìËÙÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£PlayµÄ¹¥»÷Ä¿µÄº­¸Ç¶à¸öÐÐÒµ£¬£¬ £¬£¬£¬È纽¿Õº½Ìì¡¢ÔÆÅÌËã¡¢Âùݡ¢Æû³µ¼°Õþ¸®»ú¹¹¡£¡£¡£¡£¡£


https://cybernews.com/security/esquire-brands-play-ransomware-attack/


5. ÒÁÀûŵÒÁÖÝÈËÀàЧÀͲ¿ÄÚ²¿ÍýÏëµØÍ¼¹ýʧ¹ûÕæ


1ÔÂ3ÈÕ£¬£¬ £¬£¬£¬ÒÁÀûŵÒÁÖÝÈËÀàЧÀͲ¿£¨IDHS£©¿ËÈÕת´ïÒ»ÒòÓÉÒþ˽ÉèÖÃÉèÖÃʧÎóÒý·¢µÄÊý¾ÝÇå¾²ÊÂÎñ£¬£¬ £¬£¬£¬µ¼ÖÂÄÚ²¿×ÊÔ´ÍýÏëµØÍ¼±»ÒâÍâ¹ûÕæ£¬£¬ £¬£¬£¬Éæ¼°ÊýÍòÃûЧÀ͹¤¾ßСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¾ÝÅû¶£¬£¬ £¬£¬£¬ÉæÊµØÍ¼½¨ÉèÓÚijµØÍ¼Æ½Ì¨£¬£¬ £¬£¬£¬ÓÃÓÚÄÚ²¿×ÊÔ´ÍýÏ룬£¬ £¬£¬£¬µ«ÒòȨÏÞÉèÖò»µ±£¬£¬ £¬£¬£¬ÔÚ2021Äê4ÔÂÖÁ2025Äê9ÔÂʱ´ú±»¹«ÖÚ¿É»á¼û¡£¡£¡£¡£¡£ÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£º¿µ¸´Ð§ÀͲ¿·Ö£¨DRS£©Ô¼32,401Ãû¿Í»§ÐÅÏ¢Ôâ̻¶£¬£¬ £¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢²¡Àý±àºÅ¡¢²¡Àý״̬¡¢×ªÕïȪԴ¡¢ÇøÓò°ì¹«ÊÒÐÅÏ¢¼°ÊÜÒæÈËÉí·ÝµÈ£»£»£»£»£»Ò½ÁƽòÌùºÍÒ½Áưü¹Ü´¢±¸ÍýÏ루MMSP£©Ô¼672,616ÃûÊÜÒæÈËÒàÊܲ¨¼°£¬£¬ £¬£¬£¬Éæ¼°µØµã¡¢²¡Àý±àºÅ¡¢Éú³Ýͳ¼ÆÐÅÏ¢¼°Ò½ÁÆÍýÏëÃû³Æ£¨ÈçÒ½ÁƽòÌù¡¢Ò½Áưü¹ÜµÈ£©£¬£¬ £¬£¬£¬µ«Î´°üÀ¨ÐÕÃû¡£¡£¡£¡£¡£Á½ÅúÊý¾Ý¹ûÕæÊ±¶Î»®·ÖΪ2021Äê4ÔÂ-2025Äê9Ô¼°2022Äê1ÔÂ-2025Äê9Ô¡£¡£¡£¡£¡£¸ÃÊÂÎñÓÚ2025Äê9ÔÂ22ÈÕ±»·¢Ã÷ºó£¬£¬ £¬£¬£¬IDHSÁ¬Ã¦½ÓÄɵ÷½â²½·¥£ºÏÞÖÆµØÍ¼»á¼ûȨÏÞ£¬£¬ £¬£¬£¬Ã÷ȷեȡ½«Èκοͻ§¼¶±ðÊý¾ÝÉÏ´«ÖÁ¹«¹²µØÍ¼ÍøÕ¾¡£¡£¡£¡£¡£Í¬Ê±£¬£¬ £¬£¬£¬ÒÁÀûŵÒÁÖÝÁìÍÁÇå¾²²¿Õýͨ¹ýÓʼþµÈ·½·¨ÏòÊÜÓ°ÏìСÎÒ˽¼Ò·¢³ö֪ͨ£¬£¬ £¬£¬£¬Í¨ÖªÖаüÀ¨Ãâ·Ñ×Éѯµç»°£¬£¬ £¬£¬£¬±ãÓÚÓû§»ñÈ¡¸ü¶àÐÅÏ¢¼°Ö§³Ö¡£¡£¡£¡£¡£


https://khqa.com/news/local/illinois-agency-tightens-map-security-after-data-security-incident-human-services-medicaid-medicare-division-of-rehabilitation-services-federal-trade-commission


6. Handalaͨ¹ýÈëÇÖTelegramÕË»§¹¥»÷ÒÔÉ«ÁйÙÔ±


1ÔÂ2ÈÕ£¬£¬ £¬£¬£¬ÓëÒÁÀʹØÁªµÄºÚ¿Í×éÖ¯HandalaÐû³ÆÍêÈ«ÈëÇÖÁ½ÃûÒÔÉ«ÁÐÕþÒª¡ª¡ªÇ°×ÜÀíÄÉ·òËþÀû¡¤±´ÄÚÌØÓëÕÕÁϳ¤²ìÏ£¡¤²¼À­¸¥ÂüµÄÒÆ¶¯×°±¸£¬£¬ £¬£¬£¬²¢Ð¹Â¶ÁªÏµÈË¡¢ÕÕÆ¬¡¢ÊÓÆµ¼°Ô¼1900Ìõ̸Ìì¼Í¼¡£¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬KelaÍøÂçÇ鱨¹«Ë¾µÄÉî¶Èȡ֤ÆÊÎöÕ¹ÏÖ£¬£¬ £¬£¬£¬Ëùν¡°×°±¸ÈëÇÖ¡±ÊµÎªTelegramÕË»§Çå¾²Îó²îµÄ¼¯ÖÐ̻¶£º¹¥»÷Ä¿µÄ½öÏÞÓÚÌØ¶¨TelegramÕË»§£¬£¬ £¬£¬£¬²¢Î´»ñȡװ±¸ÖÜÈ«»á¼ûȨÏÞ¡£¡£¡£¡£¡£Kela·¢Ã÷£¬£¬ £¬£¬£¬Ð¹Â¶ÖÊÁÏÖд󶼶Ի°ÎªTelegramͬ²½±¬·¢µÄ¿ÕÁªÏµÈË¿¨Æ¬£¬£¬ £¬£¬£¬½öÔ¼40¸ö¶Ô»°º¬ÏÖʵÐÂÎÅ£¬£¬ £¬£¬£¬ÇÒʵÖÊÐÔ½»Á÷ÉÙÉÙ¡£¡£¡£¡£¡£ËùÓÐÆØ¹âÁªÏµÈ˾ù¹ØÁª»îÔ¾TelegramÕË»§£¬£¬ £¬£¬£¬Ö¤ÊµÊý¾ÝÔ´×Ô¶¯Ì¬ÔÆ´æ´¢¶ø·Ç×°±¸ÍâµØ¡£¡£¡£¡£¡£´ËÊÂÎñ̻¶³ö¼ÓÃÜÆ½Ì¨ÕË»§ÖÎÀíµÄϵͳÐÔΣº¦£¬£¬ £¬£¬£¬¼´±ãÈçTelegramÕâÀàÆ½Ì¨£¬£¬ £¬£¬£¬ÆäĬÈÏÉèÖÃÒà·Å´óÁ˹¥»÷Ãæ£ºÔÆÃÜÂ빦ЧĬÈϽûÓ㬣¬ £¬£¬£¬½öÐèÒ»´ÎÐÔÃÜÂë¼´¿ÉÍêÕû»á¼ûÕË»§£»£»£»£»£»±ê׼̸Ììȱ·¦¶Ëµ½¶Ë¼ÓÃÜ£¬£¬ £¬£¬£¬Êý¾ÝÒÔÔÆÐÎʽ´æ´¢ÓÚЧÀÍÆ÷£¬£¬ £¬£¬£¬¹¥»÷Ãæ±»ÏÔÖøÀ©Õ¹¡£¡£¡£¡£¡£


https://cybersecuritynews.com/handala-hackers-targeted-israeli-officials/