µÂ¿ËÈøË¹ÖÝ״ʦЭ»áÔâINCÀÕË÷Èí¼þ¹¥»÷µ¼ÖÂÊý¾Ýй¶

Ðû²¼Ê±¼ä 2025-04-08

1. µÂ¿ËÈøË¹ÖÝ״ʦЭ»áÔâINCÀÕË÷Èí¼þ¹¥»÷µ¼ÖÂÊý¾Ýй¶


4ÔÂ3ÈÕ£¬ £¬£¬ÃÀ¹úµÚ¶þ´ó״ʦЭ»á¡ª¡ªµÂ¿ËÈøË¹ÖÝ״ʦЭ»áÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬ £¬£¬²¨¼°³¬10ÍòÃûִҵ״ʦ¡£¡£¡£¸ÃЭ»á¼ç¸ºÖ´ÒµÔÊÐíî¿Ïµ¡¢¼ÌÐø½ÌÓýÖÎÀí¡¢Ö°ÒµÆ·µÂ¼àÊӵȽ¹µãÖ°ÄÜ£¬ £¬£¬ÆäÍøÂçϵͳÓÚ2025Äê1ÔÂ28ÈÕÖÁ2ÔÂ9ÈÕ¼äÔâδ¾­ÊÚȨ»á¼û£¬ £¬£¬µ«Ö±ÖÁ2ÔÂ12ÈÕ·½±»²ì¾õ¡£¡£¡£Æ¾Ö¤Ð­»áÏòÊÜÓ°Ïì³ÉÔ±Ðû²¼µÄ֪ͨ£¬ £¬£¬¹¥»÷ÕßÇÔÈ¡Á˰üÀ¨È«ÃûµÄÃô¸ÐÐÅÏ¢£¬ £¬£¬Ïêϸй¶¹æÄ£ÉÐδÃ÷È·¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬INCÀÕË÷Èí¼þÍÅ»ï¹ûÕæÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬ £¬£¬²¢ÓÚ3ÔÂ9ÈÕ½«¸ÃЭ»áÁÐÈë°µÍøÀÕË÷Ãûµ¥£¬ £¬£¬Í¬Ê±Åû¶Á˲¿·Ö¾Ý³ÆÎªÖ´·¨°¸¼þÎļþµÄ±»µÁÊý¾ÝÑù±¾¡£¡£¡£Ð­»áÒѽÓÄÉÓ¦¶Ô²½·¥£¬ £¬£¬ÎªÊÜÓ°Ïì³ÉÔ±ÌṩÓÐÓÃÆÚÖÁ7ÔÂ31ÈÕµÄÃâ·ÑÐÅÓü°Éí·Ý͵ÇÔ¼à¿ØÐ§ÀÍ£¨ÓÉExperianÌṩ֧³Ö£©£¬ £¬£¬²¢½¨Òé³ÉԱͨ¹ý¼¤»îÂë×¢²á¸ÃЧÀÍ¡£¡£¡£±ðµÄ£¬ £¬£¬Ð­»áÇ¿ÁÒ½¨Òé³ÉԱ˼Á¿Æô¶¯ÐÅÓö³½á»òÔÚÐÅÓõµ°¸ÖÐÉèÖÃڲƭ¾¯±¨£¬ £¬£¬ÒÔ×î´óÏ޶ȽµµÍDZÔÚΣº¦¡£¡£¡£


https://www.bleepingcomputer.com/news/security/texas-state-bar-warns-of-data-breach-after-inc-ransomware-claims-attack/


2. EverestÀÕË÷Èí¼þÍÅ»ï°µÍøÐ¹ÃÜÍøÕ¾Ôâδ֪¹¥»÷ÏÂÏß


4ÔÂ7ÈÕ£¬ £¬£¬¿ËÈÕ£¬ £¬£¬Everest ÀÕË÷Èí¼þÍÅ»ïµÄ°µÍøÐ¹ÃÜÍøÕ¾ÔâÓöδ֪¹¥»÷ÕßÏ®»÷£¬ £¬£¬ÏÖÔÚÒÑÏÂÏß¡£¡£¡£¹¥»÷Õß½«ÍøÕ¾ÄÚÈÝÌæ»»Îª¼¥Ð¦ÐÅÏ¢£º¡°²»Òª·¸·¨£¬ £¬£¬·¸·¨ÊÇ»µÊ£¬ £¬£¬À´×Ô²¼À­¸ñ¡£¡£¡£¡±ÏÖÔÚ£¬ £¬£¬¸ÃÍøÕ¾ÏÔʾ¡°Î´ÕÒµ½Ñó´ÐÍøÕ¾¡±¹ýʧ£¬ £¬£¬ÎÞ·¨¼ÓÔØ¡£¡£¡£Ö»¹Ü¹¥»÷ÕßÔõÑù½øÈëÍøÕ¾»òÍøÕ¾ÊÇ·ñ±»ºÚ¿Í¹¥»÷Éв»Ã÷È·£¬ £¬£¬µ«Ç徲ר¼ÒÖ¸³ö£¬ £¬£¬Everest ʹÓÃµÄ WordPress Ä£°å¿ÉÄܱ£´æÇ±ÔÚÎó²î£¬ £¬£¬¸ÃÎó²î»ò±»Ê¹ÓÃÀ´ÆÆËðÀÕË÷Èí¼þ²Ù×÷µÄ×ßÂ©ÍøÕ¾¡£¡£¡£×Ô 2020 Äê·ºÆðÒÔÀ´£¬ £¬£¬Everest ÀÕË÷Èí¼þÐж¯Õ½ÂÔÒѱ¬·¢×ª±ä£¬ £¬£¬´Ó½öÇÔÈ¡Êý¾Ý¡¢ÀÕË÷Æóҵת±äΪÔÚ¹¥»÷ÖмÓÈëÀÕË÷Èí¼þ£¬ £¬£¬¼ÓÃÜÊܺ¦Õßϵͳ¡£¡£¡£±ðµÄ£¬ £¬£¬Everest ÔËÓªÉÌ»¹Òò³äµ±ÆäËûÍøÂç·¸·¨ÍÅ»ïºÍÍþвÐÐΪÕߵijõʼ»á¼ûȨÏÞ¾­¼ÍÈ˶ø×ÅÃû£¬ £¬£¬³öÊÛ±»¹¥ÆÆµÄ¹«Ë¾ÍøÂç»á¼ûȨÏÞ¡£¡£¡£ÔÚÒÑÍù 5 ÄêÖУ¬ £¬£¬Everest µÄ°µÍøÐ¹ÃÜÍøÕ¾ÔöÌíÁË 230 ¶àÃûÊܺ¦Õߣ¬ £¬£¬³ÉÎªË«ÖØÀÕË÷¹¥»÷µÄÒ»²¿·Ö£¬ £¬£¬ÀÕË÷Èí¼þÍÅ»ïÊÔͼÒÔÐû²¼Ãô¸ÐÐÅϢΪÍþв£¬ £¬£¬ÆÈʹÊܺ¦ÕßÖ§¸¶Êê½ð¡£¡£¡£


https://www.bleepingcomputer.com/news/security/everest-ransomwares-dark-web-leak-site-defaced-now-offline/


3. VSCode¶ñÒâÀ©Õ¹ÏÖÉí΢ÈíÊг¡£¬ £¬£¬½èXMRigÍÚ¿óIJÀû


4ÔÂ7ÈÕ£¬ £¬£¬¿ËÈÕ£¬ £¬£¬ExtensionTotalÑо¿Ô±Yuval Ronen·¢Ã÷£¬ £¬£¬2025Äê4ÔÂ4ÈÕ£¬ £¬£¬Î¢ÈíÃÅ»§ÉÏÇÄÈ»Ðû²¼Á˾Ÿöαװ³ÉÕýµ±¿ª·¢¹¤¾ßµÄVSCodeÀ©Õ¹¡£¡£¡£ÕâЩÀ©Õ¹ÒÔ¡°Discord Rich Presence for VS Code¡±¡°Rojo ¨C Roblox Studio Sync¡±µÈÃû³ÆÊ¾ÈË£¬ £¬£¬×°ÖÃÁ¿³¬30Íò´Î£¬ £¬£¬µ«Êý×Ö¿ÉÄܱ»ÈËΪǿµ÷£¬ £¬£¬Ö¼ÔÚÓªÔìÕýµ±¼ÙÏ󡣡£¡£Ò»µ©×°Öü¤»î£¬ £¬£¬ÕâЩ¶ñÒâÀ©Õ¹±ã´ÓÍⲿԴ»ñÈ¡²¢Ö´ÐÐPowerShell¾ç±¾£¬ £¬£¬Í¬Ê±×°ÖÃÆäÄ£ÄâµÄÕýµ±À©Õ¹ÒÔÑÚÈËÏßÈË¡£¡£¡£¶ñÒâÈí¼þ»á½¨Éèαװ³É¡°OnedriveStartup¡±µÄÍýÏëʹÃü£¬ £¬£¬²¢ÔÚWindows×¢²á±íÖÐ×¢Èë¾ç±¾£¬ £¬£¬È·±£ÏµÍ³Æô¶¯Ê±×Ô¶¯ÔËÐС£¡£¡£Ëü»¹»á¹Ø±ÕÒªº¦WindowsЧÀÍ£¬ £¬£¬ÈçWindows Update£¬ £¬£¬²¢½«×ÔÉíÌí¼Óµ½Windows DefenderµÄɨ³ýÁбíÖУ¬ £¬£¬ÒÔÌӱܼì²â¡£¡£¡£ÈôδÒÔÖÎÀíԱȨÏÞÖ´ÐУ¬ £¬£¬¶ñÒâÈí¼þ»áÄ£Äâϵͳ¶þ½øÖÆÎļþ£¬ £¬£¬Ê¹ÓöñÒâMLANG.dllÖ´ÐÐDLLÐ®ÖÆ£¬ £¬£¬ÌáÉýȨÏÞ²¢Ö´ÐÐÓÐÓøºÔØ¡£¡£¡£¸Ã¿ÉÖ´ÐÐÎļþ½ÓÄÉbase64±àÂëÃûÌ㬠£¬£¬ÓÉPowerShell¾ç±¾½âÂëºóÅþÁ¬µ½¸¨ÖúЧÀÍÆ÷£¬ £¬£¬ÏÂÔØ²¢ÔËÐÐXMRig¼ÓÃÜÇ®±Ò¿ó¹¤¡£¡£¡£ÏÖÔÚ£¬ £¬£¬Ö»¹ÜExtensionTotalÒÑÏò΢Èí±¨¸æÕâЩ¶ñÒâÀ©Õ¹£¬ £¬£¬µ«ËüÃÇÈÔ¿ÉÓᣡ£¡£


https://www.bleepingcomputer.com/news/security/malicious-vscode-extensions-infect-windows-with-cryptominers/


4. ºÚ¿Íð³äÎÚ»ú¹¹·¢¶¯¹¥»÷£¬ £¬£¬ÇÔÃܶñÒâÈí¼þÍþв¼Ó¾ç


4ÔÂ8ÈÕ£¬ £¬£¬Æ¾Ö¤Õþ¸®×îÐÂÑо¿£¬ £¬£¬ºÚ¿ÍÕýʹÓÃÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ¶ÔÎÚ¿ËÀ¼Òªº¦²¿·Ö·¢¶¯¹¥»÷¡£¡£¡£×Ô2ÔÂÒÔÀ´£¬ £¬£¬ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±ÏìӦС×飨CERT-UA£©Ò»Ö±ÔÚ×·×ÙÕâÒ»»î¶¯£¬ £¬£¬ÆäÄ»ºóÍþвÕß±»×·×ÙΪUAC-0226£¬ £¬£¬µ«ÉÐδ¹é×ïÓÚÈκÎÒÑÖªºÚ¿Í×éÖ¯¡£¡£¡£ºÚ¿Í´Ó±»ÈëÇÖµÄÕË»§·¢ËÍ´øÓжñÒâÎĵµ¸½¼þµÄµç×ÓÓʼþ£¬ £¬£¬ÎļþÃû»òÖ÷ÌâÐÐÉæ¼°µØÀ×ɨ³ý¡¢ÐÐÕþ·£¿£¿£¿î¡¢ÎÞÈË»úÉú²ú»ò¹¤ÒµËðʧÅâ³¥µÈ»°Ì⣬ £¬£¬ÒÔѬȾÎÚ¿ËÀ¼Îä×°²½¶Ó¡¢Ö´·¨»ú¹¹ºÍµØ·½Õþ¸®»ú¹¹µÈÄ¿µÄ¡£¡£¡£×èÖ¹4Ô£¬ £¬£¬ºÚ¿ÍÒѰ²ÅÅÁ½ÖÖ¶ñÒâÈí¼þ£¬ £¬£¬Ò»ÖÖ»ùÓÚGitHub¹ûÕæ´úÂ룬 £¬£¬ÁíÒ»ÖÖÃûΪGiftedCrook£¬ £¬£¬¿ÉÇÔÈ¡ä¯ÀÀÆ÷Êý¾Ý²¢·¢Ë͵½Telegramй¶¡£¡£¡£±ðµÄ£¬ £¬£¬3Ô·ݻ¹·¢Ã÷ÁËÖÁÉÙÈýÆðʹÓÃÐÂÐÍÌØ¹¤¶ñÒâÈí¼þWrecksteelµÄÍøÂç¹¥»÷£¬ £¬£¬ºÚ¿Íͨ¹ý±»µÁÕË»§·¢ËͰüÀ¨¹«¹²Îļþ¹²ÏíЧÀÍÁ´½ÓµÄÐÂÎÅ£¬ £¬£¬Ö´ÐÐPowerShell¾ç±¾ºó£¬ £¬£¬¿ÉÌáÈ¡¶àÖÖÎļþ²¢½ØÈ¡ÆÁÄ»½ØÍ¼¡£¡£¡£CERT-UAÌṩÁËÍøÂç´¹ÂÚµç×ÓÓʼþʾÀý£¬ £¬£¬ÒÔ¾¯Ê¾¹«ÖÚ×¢ÖØ´ËÀ๥»÷¡£¡£¡£


https://therecord.media/hackers-impersonate-drone-companies-state-agencies-spy-ukraine


5. WK Kellogg CoÔâClopʹÓÃCleoÎó²îʵÑéÊý¾Ý͵ÇÔ¹¥»÷


4ÔÂ7ÈÕ£¬ £¬£¬ÃÀ¹úʳÎï¾ÞÍ·WK Kellogg Co¿ËÈÕÖÒÑÔÔ±¹¤ºÍ¹©Ó¦ÉÌ£¬ £¬£¬¹«Ë¾Êý¾ÝÔÚ2024ÄêCleoÊý¾Ý͵ÇÔ¹¥»÷ÖÐÔâÇÔÈ¡¡£¡£¡£CleoÈí¼þÊÇÒ»¿îÍйÜÎļþ´«ÊäÊÊÓóÌÐò£¬ £¬£¬È¥ÄêÄêµ×£¬ £¬£¬ClopÀÕË÷Èí¼þÍÅ»ïʹÓÃÁ½¸öÁãÈÕÎó²îCVE-2024-50623ºÍCVE-2024-55956£¬ £¬£¬ÕûÌå¹¥»÷Á˸ÃÈí¼þ£¬ £¬£¬Ê¹ÍþвÐÐΪÕßÄܹ»ÈëÇÖЧÀÍÆ÷²¢ÇÔÈ¡Êý¾Ý¡£¡£¡£WK KelloggÓÚ2025Äê2ÔÂ27ÈÕ»ñϤ´ËÊ£¬ £¬£¬²¢Á¬Ã¦Õö¿ªÊӲ졣¡£¡£¾­ÁªÏµCleoºóµÃÖª£¬ £¬£¬Ò»Ãûδ¾­ÊÚȨµÄÈËÓÚ2024Äê12ÔÂ7ÈÕ»á¼ûÁËCleoΪWK KelloggÍйܵÄЧÀÍÆ÷¡£¡£¡£Ö»¹ÜWK KelloggδÏêϸÌá¼°Clop»òÊý¾Ý͵ÇÔ¹¥»÷£¬ £¬£¬µ«±¨¸æÊÂÎñµÄÈÕÆÚÓë2024Äê12Ô±¬·¢µÄÒ»²¨¹¥»÷ÏàÎǺÏ¡£¡£¡£±ðµÄ£¬ £¬£¬ClopÀÕË÷Èí¼þÍÅ»ïÔÚ½«WK KelloggÁÐÈëÆäÊý¾Ýй¿àÕË÷ÍøÕ¾ºó²»¾Ã£¬ £¬£¬¾ÍÐû²¼ÁËÎ¥¹æÍ¨Öª¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨Ð¡ÎÒ˽¼ÒµÄÐÕÃûºÍÉç»á°ü¹ÜºÅ¡£¡£¡£WK KelloggÒÑÓëCleoÇ×½üÏàÖú£¬ £¬£¬È·¶¨ÁËΪ½â¾öÎ¥¹æÐÐΪ²¢±ÜÃâδÀ´±¬·¢ÀàËÆÊÂÎñ¶øÊµÑéµÄÇå¾²²½·¥¡£¡£¡£´Ë´ÎÊÂÎñʹWK Kellogg³ÉΪÊܵ½ClopµÄCleoÁãÈÕ¹¥»÷Ó°ÏìµÄÖڶ๫˾ÖеÄ×îÐÂÊܺ¦Õß¡£¡£¡£


https://www.bleepingcomputer.com/news/security/food-giant-wk-kellogg-discloses-data-breach-linked-to-clop-ransomware/


6. ÐÂÐÍNeptune RAT±äÖÖÍþв¼Ó¾ç£¬ £¬£¬ÇÔÃÜÓëÆÆËðÄÜÁ¦Éý¼¶


4ÔÂ7ÈÕ£¬ £¬£¬¿ËÈÕ£¬ £¬£¬Ò»ÖÖеÄNeptune RAT±äÖÖͨ¹ýYouTubeºÍTelegramµÈÉ罻ƽ̨ÆÕ±éÈö²¥£¬ £¬£¬¶ÔWindowsÓû§×é³ÉÑÏÖØÍþв¡£¡£¡£¸Ã¶ñÒâÈí¼þËäÉù³ÆÓÃÓÚ¡°½ÌÓýºÍÆ·µÂÄ¿µÄ¡±£¬ £¬£¬µ«ÏÖʵ¹¦Ð§È´Ô¶·ÇÔÆÔÆ¡£¡£¡£Neptune RATÄܹ»ÇÔÈ¡Óû§Æ¾Ö¤¡¢Ìæ»»¼ÓÃÜÇ®±ÒÇ®°üµØµã£¬ £¬£¬ÉõÖÁʹÓÃÀÕË÷Èí¼þ¹¦Ð§Ëø¶¨Îļþ£¬ £¬£¬Ê¹¹¥»÷ÕßÄܹ»ÖÜÈ«¿ØÖÆÊÜѬȾµÄϵͳ¡£¡£¡£¸Ã¶ñÒâÈí¼þÔÚÉ罻ƽ̨ÉÏÃâ·Ñ·Ö·¢£¬ £¬£¬Òþ²ØÁË¿ÉÖ´ÐÐÎļþ£¬ £¬£¬²¢Ê¹Óð¢À­²®×Ö·ûºÍÐÄÇé·ûºÅÌæ»»²¿·Ö×Ö·û´®£¬ £¬£¬ÔöÌíÁËÆÊÎöÄѶÈ¡£¡£¡£ÆäÃâ·Ñ°æ±¾»á×Ô¶¯ÌìÉúPowerShellÏÂÁ £¬£¬ÏÂÔØ²¢ÔËÐÐÆäËû¶ñÒâ×é¼þ¡£¡£¡£Neptune RAT°üÀ¨¶àÖÖ¹¥»÷Ä£¿£¿£¿é£¬ £¬£¬ÈçÆ¾Ö¤ÍµÇÔ¡¢¼ôÌù°åÐ®ÖÆ¡¢ÀÕË÷Èí¼þºÍϵͳË𻵵È£¬ £¬£¬Äܹ»Ð­Í¬¹¥»÷WindowsÅÌËã»ú¡£¡£¡£ÎªÌӱܼì²â£¬ £¬£¬¸Ã¶ñÒâÈí¼þ»áÐÞ¸Ä×¢²á±íÖµ¡¢Ìí¼Óµ½WindowsʹÃüÍýÏë³ÌÐòÖУ¬ £¬£¬²¢¼ì²éÊÇ·ñÔÚÐéÄâÇéÐÎÖÐÔËÐС£¡£¡£±ðµÄ£¬ £¬£¬¸½¼ÓµÄDLLÎļþÔöÌíÁ˸ü¶à¹¦Ð§£¬ £¬£¬°üÀ¨ÈƹýÓû§ÕÊ»§¿ØÖÆ¡¢ÇÔÈ¡Êý¾ÝºÍʵʱÆÁÄ»¼à¿ØµÈ¡£¡£¡£


https://hackread.com/neptune-rat-variant-youtube-steal-windows-passwords/