MedusaÀÕË÷Èí¼þ½«NASCARÁÐÈëÊܺ¦ÕßÃûµ¥
Ðû²¼Ê±¼ä 2025-04-091. MedusaÀÕË÷Èí¼þ½«NASCARÁÐÈëÊܺ¦ÕßÃûµ¥
4ÔÂ8ÈÕ£¬MedusaÀÕË÷Èí¼þÍÅ»ï¿ËÈÕ½«NASCAR£¨È«ÃÀÔ˶¯Æû³µÈü³µÐ»á£©ÁÐÈëÊܺ¦ÕßÃûµ¥£¬ÔÚÆä°µÍøÐ¹ÃÜÍøÕ¾ÉÏÒªÇóNASCARÖ§¸¶400ÍòÃÀÔªÊê½ð£¬²»È»½«Ðû²¼ÄÚ²¿Êý¾Ý¡£¸Ã×éÖ¯»¹Éù³ÆMcFarland Commercial Insurance Services¡¢Bridgebank LtdºÍPulse Urgent CareÒ²Ôâ¹¥»÷¡£ºÚ¿ÍÒÑÐû²¼37ÕÅÓëNASCARÏà¹ØµÄÎĵµÍ¼Æ¬×÷Ϊ֤¾Ý£¬ÆäÖаüÀ¨¹«Ë¾Æ·ÅÆÖÊÁÏ¡¢ÉèÊ©µØÍ¼¡¢Ô±¹¤ÁªÏµ·½·¨¼°ÄÚ²¿Ìõ¼ÇºÍÕÕÆ¬¡£¶Ôй¶ÎļþµÄ¿ìËÙÆÊÎöÏÔʾ£¬ÆäÖаüÀ¨ÈüµÀÏêϸµØÍ¼¡¢µç×ÓÓʼþµØµã¡¢Ô±¹¤ÐÕÃûºÍÖ°Îñ¼°Æ¾Ö¤Ïà¹ØÐÅÏ¢£¬Åú×¢NASCARµÄÔËÓªºÍºóÇÚÊý¾ÝÒÑÊÜËð¡£NASCARÉÐδ»ØÓ¦¡¢ÈϿɻò·ñ¶¨ÕâЩָ¿Ø£¬µ«Ë¼Á¿µ½ÆäÿÄêÊýÒÚÃÀÔªµÄÊÕÈ룬³ÉÎªÍøÂç·¸·¨·Ö×ÓµÄÄ¿µÄ²¢²»Ï£Ææ¡£2025Äê3ÔÂ13ÈÕ£¬ÃÀ¹úÁª°îÊÓ²ì¾ÖºÍÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾ÖÐû²¼ÍŽáͨ¸æ£¬±Þ²ß¸÷×éÖ¯ÔöÇ¿Çå¾²²½·¥£¬ÌØÊ⽨ÒéÆôÓÃË«ÒòËØÉí·ÝÑéÖ¤ºÍ¼à¿ØÏµÍ³ÒÔ²éÕÒδ¾ÊÚȨµÄÖ¤ÊéʹÓü£Ïó¡£
https://hackread.com/medusa-ransomware-claims-nascar-breach-latest-attack/
2. ÍþвÐÐΪÕßÀÄÓÃSourceForge·Ö·¢Î±ÔìOffice²å¼þÇÔÈ¡¼ÓÃÜÇ®±Ò
4ÔÂ8ÈÕ£¬ÍþвÐÐΪÕßÕýʹÓÃÕýµ±Èí¼þÍÐ¹ÜÆ½Ì¨SourceForge·Ö·¢Î±ÔìµÄMicrosoft²å¼þ£¬ÔÚÊܺ¦ÕßÅÌËã»úÉÏ×°ÖöñÒâÈí¼þÒÔÍÚ¾òºÍÇÔÈ¡¼ÓÃÜÇ®±Ò¡£SourceForge.netÊÇÒ»¸öÊܽӴýµÄ¿ªÔ´ÏîÄ¿Íйܺͷַ¢Æ½Ì¨£¬Ö»¹ÜÆä¿ª·ÅµÄÏîÄ¿Ìύģ×ÓΪÀÄÓÃÌṩÁ˿ռ䣬µ«¶ñÒâÈí¼þÈö²¥ÇéÐνÏÉÙ¼û¡£È»¶ø£¬¿¨°Í˹»ù·¢Ã÷µÄÐÂÔ˶¯ÒÑÓ°ÏìÁè¼Ý4,604¸öϵͳ£¬Ö÷ҪλÓÚ¶íÂÞ˹¡£¶ñÒâÏîÄ¿¡°officepackage¡±Ã°³äOffice²å¼þ¿ª·¢¹¤¾ßÜöÝÍ£¬ÆäÐÎòºÍÎļþÊÇGitHubÉÏÕýµ±MicrosoftÏîÄ¿µÄ¸±±¾¡£µ±Óû§ËÑË÷°ì¹«²å¼þʱ£¬»á»ñµÃÖ¸Ïò¡°officepackage.sourceforge.io¡±µÄЧ¹û¡£µã»÷ÏÂÔØ°´Å¥ºó£¬Êܺ¦Õß»áÊÕµ½Ò»¸öZIPÎļþ£¬ÆäÖаüÀ¨ÊÜÃÜÂë±£»¤µÄ´æµµºÍÒ»¸ö´øÓÐÃÜÂëµÄÎı¾Îļþ¡£ÔËÐд浵ÖеÄMSIÎļþ»áÊͷŶà¸öÎļþ£¬²¢Ö´ÐÐÒ»¸öVisual Basic¾ç±¾£¬¸Ã¾ç±¾´ÓGitHub»ñÈ¡²¢Ö´ÐÐÅú´¦Öóͷ£¾ç±¾£¬ÒÔ½¨É賤ÆÚÐÔ²¢ÏÂÔØÌØÊâÓÐÓÃÔØºÉ¡£ÕâЩÓÐÓÃÔØºÉ°üÀ¨¼ÓÃÜÇ®±ÒÍÚ¿ó³ÌÐòºÍ¼ôÇгÌÐò£¬Ç°ÕßÐ®ÖÆ»úеµÄÅÌËãÄÜÁ¦Îª¹¥»÷ÕßÍÚ¾ò¼ÓÃÜÇ®±Ò£¬ºóÕß¼àÊÓ²¢Ìæ»»¼ôÌù°åÖеļÓÃÜÇ®±ÒµØµã¡£¹¥»÷Õß»¹Í¨¹ýTelegram APIÎüÊÕÊÜѬȾϵͳµÄÐÅÏ¢£¬²¢¿ÉÒýÈëÌØÊâÓÐÓÃÔØºÉ¡£
https://www.bleepingcomputer.com/news/security/fake-microsoft-office-add-in-tools-push-malware-via-sourceforge/
3. RansomEXXÀÕË÷Èí¼þÍÅ»ïʹÓÃWindowsÁãÈÕÎó²î¾ÙÐй¥»÷
4ÔÂ8ÈÕ£¬Î¢Èí¿ËÈÕÅû¶£¬RansomEXXÀÕË÷Èí¼þÍÅ»ïʹÓÃWindowsͨÓÃÈÕÖ¾ÎļþϵͳÖеĸßÑÏÖØÐÔÁãÈÕÎó²î£¨CVE-2025-29824£©»ñÈ¡Êܺ¦ÕßϵͳȨÏÞ¡£¸ÃÎó²îÒòʹÓúóÊÍ·ÅÎÊÌâµ¼Ö£¬ÔÊÐíµÍȨÏÞÍâµØ¹¥»÷Õßͨ¹ýµÍÖØÆ¯ºó¹¥»÷»ñµÃϵͳȨÏÞ¡£Ö»¹Ü΢ÈíÒÑÐû²¼ÊÜÓ°ÏìWindows°æ±¾µÄÇå¾²¸üУ¬µ«Õë¶ÔWindows 10 x64ºÍ32λϵͳµÄ²¹¶¡½«¾¡¿ìÐû²¼¡£Î¢ÈíÖ¸³ö£¬¹¥»÷Ä¿µÄº¸ÇÃÀ¹úITºÍ·¿µØ²úÐÐÒµ¡¢Î¯ÄÚÈðÀ½ðÈÚÐÐÒµ¡¢Î÷°àÑÀÈí¼þ¹«Ë¾¼°É³Ìذ¢À²®ÁãÊÛÒµ¡£Ö»¹ÜWindows 11°æ±¾24H2Óû§²»ÊÜÓ°Ï죬΢ÈíÈÔ±Þ²ßÓû§¾¡¿ìÓ¦ÓøüС£¾ÝϤ£¬RansomEXXÀÕË÷Èí¼þÍÅ»ïÔÚ¹¥»÷ÖÐÊ×ÏÈ×°ÖÃPipeMagicºóÃŶñÒâÈí¼þ£¬ÓÃÓÚ°²ÅÅÎó²îʹÓá¢ÀÕË÷Èí¼þ¸ºÔؼ°ÀÕË÷ÐÅ¡£×Ô2023Äê3ÔÂÆð£¬PipeMagic»¹±»ÓÃÓÚ°²ÅÅÕë¶ÔWindows Win32ÄÚºË×ÓϵͳµÄÁãÈÕÎó²î£¨CVE-2025-24983£©µÄÎó²îʹÓ᣸öñÒâÈí¼þÓÉ¿¨°Í˹»ùÓÚ2022Äê·¢Ã÷£¬¿ÉÍøÂçÃô¸ÐÊý¾Ý¡¢ÌṩԶ³Ì»á¼ûȨÏÞ£¬²¢ÔÊÐí¹¥»÷Õß°²ÅÅÌØÊâ¶ñÒâ¸ºÔØ¾ÙÐкáÏòÒÆ¶¯¡£
https://www.bleepingcomputer.com/news/security/microsoft-windows-clfs-zero-day-exploited-by-ransomware-gang/
4. CrushFTPÎó²îÔâºÚ¿ÍʹÓã¬Ãô¸ÐÊý¾ÝÃæÁÙÀÕË÷Íþв
4ÔÂ9ÈÕ£¬Áª°îÍøÂçÇå¾²¹ÙÔ±ºÍÍøÂ繫˾ÊÂÎñÏìÓ¦Ö°Ô±·¢³öÖÒÑÔ£¬ºÚ¿ÍÕýÔÚʹÓÃÊ¢ÐÐÎļþ´«Ê乤¾ßCrushÖеÄÎó²î¾ÙÐй¥»÷¡£CrushFTPÓÚ3ÔÂ21ÈÕÊ×´ÎÏò¿Í»§·¢³öÖÒÑÔ£¬±Þ²ß¸üÐÂϵͳÒÔÐÞ¸´CVE-2025-31161Îó²î£¬¸ÃÎó²îÓÉOutpost24Ñо¿Ö°Ô±·¢Ã÷¡£Ö»¹ÜOutpost24ÍýÏëÆÚ´ý90Ìì²Å¹ûÕæÅû¶£¬µ«ÆäËûÑо¿Ö°Ô±Ò²·¢Ã÷Á˸ÃÎó²î²¢Ìá½»ÁË×Ô¼ºµÄCVE±àºÅ£¬µ¼ÖÂÒªº¦ÐÅÏ¢±»¹ûÕæ£¬¹¥»÷Õ߳ûúʹÓá£ÒÑÍùÁ½ÖÜÄÚ£¬·ÀÓùÕßÃÇÒ»Á¬ÖÒÑÔºÚ¿ÍÕýÔÚʹÓøÃÎó²î¡£ÖÜÒ»£¬KillÀÕË÷Èí¼þÍÅ»ïÉù³ÆÒÑͨ¹ý¸ÃÎó²î»ñÈ¡ÁË´ó×ÚÃô¸ÐÊý¾Ý£¬²¢Íþв½«Á¬Ã¦×îÏÈÀÕË÷Êܺ¦Õß¡£¶à¼ÒÊÂÎñÏìÓ¦¹«Ë¾Ö¤Êµ£¬×éÖ¯Õýͨ¹ý¸ÃÎó²îÊܵ½¹¥»÷£¬ShadowserverºÍCensys¾ùÌåÏÖ»¥ÁªÍøÉÏÓÐÊý°Ù¸ö̻¶µÄCrushFTPʵÀý¡£CrushFTP½²»°ÈËÌåÏÖ£¬¹«Ë¾Òѱ޲߿ͻ§¾¡¿ì¸üÐÂϵͳ£¬²¢Ö¸³öËäÈ»ÓÐһЩ±äͨҪÁì¿ÉÒÔ»º½â¸ÃÎó²î£¬µ«²»»áÔÚ»¥ÁªÍøÉ¨ÃèÖÐÏÔʾ£¬¿ÉÄÜ»áÓ°ÏìδÐÞ²¹·þÎñÆ÷ÊýÄ¿µÄͳ¼Æ¡£HuntressµÄʹÊÏìÓ¦Ö°Ô±ÌåÏÖ£¬ËûÃÇÒѾ·¢Ã÷ËļҲî±ð¹«Ë¾Ê¹ÓÃÁ˸ÃÎó²î£¬Éæ¼°¶à¸öÐÐÒµ¡£
https://therecord.media/crushftp-vulnerability-exploited
5. ÃÀ¹ú²ÆÎñ²¿Ç®±Ò¼àÀíÊðÔâºÚ¿ÍÈëÇÖ£¬Ãô¸ÐÐÅÏ¢ÃæÁÙΣº¦
4ÔÂ8ÈÕ£¬2023Äê6Ô£¬Éí·Ý²»Ã÷µÄ¹¥»÷ÕßÈëÇÖÁËÃÀ¹ú²ÆÎñÊÖÏÂÊôµÄ×ÔÁ¦»ú¹¹Ç®±Ò¼àÀíÊð£¨OCC£©£¬»ñÈ¡ÁËÁè¼Ý150,000·âµç×ÓÓʼþ¡£OCCÈÏÕæî¿ÏµÒøÐкÍÁª°î´¢±¸Ð»á£¬È·±£ÆäºÏ¹æÔËÓª¡£¾ÝÅí²©É籨µÀ£¬ÍþвÐÐΪÕßÔÚÇÖÈëµç×ÓÓʼþϵͳÖÎÀíÔ±ÕË»§ºó£¬»ñµÃÁË¼à¿ØÔ±¹¤µç×ÓÓʼþµÄÄÜÁ¦¡£OCCÆäʱÏòÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö±¨¸æÁ˴˴ι¥»÷£¬³ÆÆäÎªÉæ¼°Æäµç×ÓÓʼþϵͳºÍ¶à¸öµç×ÓÓʼþÕË»§µÄ¡°ÍøÂçÇå¾²ÊÂÎñ¡±£¬²¢ÌåÏÖ¶Ô½ðÈÚ²¿·ÖÎÞÓ°Ï졣Ȼ¶ø£¬ºóÐøÊÓ²ìÏÔʾ£¬¹¥»÷Õß»á¼ûµÄµç×ÓÓʼþÕË»§ÊýĿԶ³¬´ËǰÈÏÖª£¬Éæ¼°Ô¼100¸öÒøÐÐî¿Ïµ»ú¹¹µÄµç×ÓÓʼþ¡£2025Äê4ÔÂ8ÈÕ£¬OCCÏòÃÀ¹ú¹ú»áת´ïÁË2ÔÂ11ÈÕ·¢Ã÷µÄ¡°ÖØ´óÐÅÏ¢Çå¾²ÊÂÎñ¡±£¬²¢ÌåÏÖÊÜËðµÄϵͳÖÎÀíÕË»§ÒÑÓÚ2ÔÂ12ÈÕ±»½ûÓá£OCCÔö²¹³Æ£¬¹¥»÷Õßδ¾ÊÚȨ»á¼ûÁËÆä¶àÃû¸ß¹ÜºÍÔ±¹¤µÄµç×ÓÓʼþ£¬ÕâЩÓʼþ°üÀ¨¸ß¶ÈÃô¸ÐµÄÁª°îî¿Ïµ½ðÈÚ»ú¹¹²ÆÎñ״̬ÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/hackers-lurked-in-treasury-occs-systems-since-june-2023-breach/
6. Hudson Rock½ÒHellCatй¥ÊÆ£ºJiraƾ֤³ÉÀÕË÷Í»ÆÆ¿Ú
4ÔÂ8ÈÕ£¬Hudson RockµÄÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬HellCatÀÕË÷Èí¼þ×éÖ¯¶ÔÃÀ¹úºÍÅ·ÖÞµÄËļҹ«Ë¾ÌᳫÐÂÒ»ÂÖÍøÂç¹¥»÷£¬Ä¿µÄ°üÀ¨Asseco Poland¡¢HighWire Press¡¢RacamiºÍLeoVegas¼¯ÍÅ¡£¹¥»÷µÄÅäºÏÌØÕ÷ÊÇ£¬ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÔÚÏÖʵ¹¥»÷±¬·¢Ç°ÇÔÈ¡ÁËJiraƾ֤¡£ÕâЩ¶ñÒâÈí¼þ±äÖÖÈçStealC¡¢Raccoon¡¢RedlineºÍLumma Stealer£¬ÔçÔÚ¼¸¸öÔÂÉõÖÁ¼¸Äêǰ¾ÍÍøÂçÁËÊÜѬȾԱ¹¤»úеÉϵĵǼÐÅÏ¢¡£Ò»µ©»ñµÃƾ֤£¬HellCat±ãµÇ¼Atlassian JiraÇéÐΣ¬½ø¶ø½øÈëÄÚ²¿ÏµÍ³£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢Æô¶¯ÀÕË÷Èí¼þÁ÷³Ì¡£HellCat´ËÇ°ÔøÊ¹ÓÃÏàͬҪÁìÈëÇÖ¶à¼Ò×ÅÃû¹«Ë¾£¬ÆäÕ½ÂÔ°üÀ¨ÔÚÐÅÏ¢ÇÔÈ¡ÕßÈÕÖ¾ÖвéÕÒÆ¾Ö¤£¬»á¼ûJira£¬ÇÔÈ¡Êý¾Ý£¬È»ºóË÷ÒªÊê½ð¡£Jira×÷ΪÐí¶à¹«Ë¾µÄÖ÷Ҫϵͳ£¬Ó뿪·¢ÊÂÇéÁ÷¡¢¿Í»§Êý¾Ý¡¢ÄÚ²¿ÎĵµºÍϵͳ»á¼û¿ØÖÆÏ¸ÃÜÏà¹Ø£¬Òò´Ë³ÉΪ¸ß¼ÛֵĿµÄ¡£Ñо¿Ö°Ô±Ö¸³ö£¬ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þѬȾÓû§×°±¸²¢ÇÔÈ¡ÒÑÉúÑĵĵǼÐÅÏ¢¡¢cookie¡¢»á»°ÁîÅÆµÈ£¬ÕâЩÊý¾ÝҪôÔÚ°µÍøÊг¡ÉϳöÊÛ£¬ÒªÃ´±»HellCatµÈ×éÖ¯Ö±½ÓʹÓá£
https://hackread.com/hellcat-ransomware-firms-infostealer-stolen-jira-credentials/


¾©¹«Íø°²±¸11010802024551ºÅ