DoNot TeamʹÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞÍâ½»²¿

Ðû²¼Ê±¼ä 2025-07-10

1. DoNot TeamʹÓÃLoptikMod¶ñÒâÈí¼þ¹¥»÷Å·ÖÞÍâ½»²¿


7ÔÂ9ÈÕ £¬½üÆÚ £¬ÍøÂçÇå¾²»ú¹¹Trellix¸ß¼¶Ñо¿ÖÐÐÄÅû¶һÆðÕë¶ÔÅ·ÖÞÍâ½»»ú¹¹µÄ¶¨ÏòÍøÂç¹¥»÷ÊÂÎñ £¬Æä±³ºóÒÉËÆÉæ¼°Ó¡¶ÈÅä¾°µÄ¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©×éÖ¯DoNot Team£¨±ð³ÆAPT-C-35µÈ£©¡£¸Ã×éÖ¯×Ô2016ÄêÆðÒ»Á¬»îÔ¾ £¬ÒÔ¶¨ÖÆ»¯Windows¶ñÒâÈí¼þ£¨ÈçYTY¡¢GEditºóÃÅ£©ÍŽáÓã²æÊ½´¹ÂÚÓʼþΪÖ÷Òª¹¥»÷ÊÖ¶Î £¬ºã¾ÃÕë¶ÔÕþ¸®¡¢Íâ½»¡¢¹ú·À¼°·ÇÕþ¸®×éÖ¯Õö¿ªÍøÂçÌØ¹¤Ô˶¯ £¬Ä¿µÄÇøÓò´Ëǰ¼¯ÖÐÓÚÄÏÑÇ £¬´Ë´ÎÊ×´ÎÈ·ÈÏÆä¶ÔÅ·ÖÞÍâ½»ÁìÓòµÄÀ©ÕÅÐÔÉøÍ¸¡£´Ë´Î¹¥»÷Á´Ê¼ÓÚαװ³ÉÒâ´óÀûפÃϼÓÀ­¹ú¹ú·ÀÎä¹Ù»á¼ûÐг̵Ĵ¹ÂÚÓʼþ £¬¹¥»÷Õßͨ¹ýGmailÕË»§·¢ËÍUTF-8±àÂëµÄHTMLÃûÌÃÓʼþ £¬Ê¹ÓÃÌØÊâ×Ö·û£¨Èç·¨Óï"Attach¨¦"£©ÔöÇ¿¿ÉÐŶÈ £¬ÓÕµ¼Ä¿µÄµã»÷GoogleÔÆ¶ËÓ²ÅÌÁ´½ÓÏÂÔØRARѹËõ°ü¡£Ñ¹Ëõ°üÄÚº¬Î±×°ÎªPDFÎĵµµÄ¶ñÒâ¿ÉÖ´ÐÐÎļþ £¬Êܺ¦Õß·­¿ªºó½«´¥·¢LoptikModÔ¶³Ì»á¼ûľÂí¡£¸ÃľÂíͨ¹ýÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯×¤Áô £¬¾ß±¸ÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢ÎüÊÕÔ¶³ÌÖ¸Áî¡¢ÏÂÔØ¸½¼ÓÄ£¿éµÈ¹¦Ð§ £¬²¢½ÓÄÉ·´ÐéÄâ»úÊÖÒÕºÍASCII»ìÏýÊÖÒÕ¹æ±ÜÇå¾²ÆÊÎö £¬Í¬Ê±Í¨¹ýµ¥ÊµÀýÔËÐлúÖÆ×èÖ¹³åÍ»¡£


https://thehackernews.com/2025/07/donot-apt-expands-operations-targets.html


2. ÈÕ±¾ÐÂÈÕÌú×Ó¹«Ë¾ÔâÁãÈÕ¹¥»÷ÖÂÊý¾Ýй¶


7ÔÂ9ÈÕ £¬ÈÕ±¾ÐÂÈÕÌú¼¯ÍÅÆìÏÂ×Ó¹«Ë¾ÐÂÈÕÌú½â¾ö¼Æ»®¹«Ë¾£¨Nippon Steel Solutions£©¿ËÈÕÅû¶һÆðÖØ´óÊý¾Ýй¶ÊÂÎñ £¬¹¥»÷ÕßʹÓÃδ¹ûÕæµÄÁãÈÕÎó²îÇÖÈëÆäÄÚ²¿ÍøÂç £¬µ¼Ö¿ͻ§¡¢ÏàÖúͬ°é¼°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢ÃæÁÙй¶Σº¦¡£¸Ã¹«Ë¾×¨×¢ÓÚÔÆ·þÎñÓëÍøÂçÇå¾²½â¾ö¼Æ»® £¬´Ë´ÎÊÂÎñÒòÆäÊÖÒÕÅä¾°¶ø±¸ÊܹØ×¢¡£2025Äê3ÔÂ7ÈÕ £¬ÐÂÈÕÌú½â¾ö¼Æ»®¹«Ë¾¼à²âµ½·þÎñÆ÷Òì³£Ô˶¯ £¬Ëæ¼´¸ôÀëÊÜÓ°Ïìϵͳ¡£¾­ÊÓ²ìÈ·ÈÏ £¬¹¥»÷Õßͨ¹ýÕë¶ÔÍøÂç×°±¸µÄÁãÈÕÎó²îʵÑéÈëÇÖ £¬Ôì³ÉÄÚ²¿ÍøÂçδ¾­ÊÚȨ»á¼û £¬²¿·ÖÃô¸ÐÊý¾Ý¿ÉÄܱ»ÇÔÈ¡¡£ÖµµÃÇìÐÒµÄÊÇ £¬¸Ã¹«Ë¾Ç¿µ÷ÆäÔÆ·þÎñƽ̨δÊܲ¨¼° £¬ÓªÒµÒ»Á¬ÐÔδÊÜÖ±½ÓÓ°Ï졣ƾ֤ͨ¸æ £¬Ð¹Â¶ÐÅÏ¢º­¸ÇÈýÀàÖ÷Ì壺¿Í»§Êý¾Ý°üÀ¨ÐÕÃû¡¢¹«Ë¾Ãû³Æ¡¢ËùÊô»ú¹¹¡¢Ö°Î»¡¢µØµã¡¢ÓÊÏä¼°µç»°£»ÏàÖúͬ°éÐÅÏ¢Éæ¼°ÐÕÃû¼°¹«Ë¾ÓòÃûÓÊÏ䣻Ա¹¤Êý¾ÝÔò°üÀ¨ÐÕÃû¡¢²¿·Ö¡¢Ö°Î»¼°ÆóÒµÓÊÏä¡£Ö»¹ÜÏÖÔÚÎÞÖ¤¾ÝÅú×¢ÕâЩÐÅÏ¢ÒÑͨ¹ýÉ罻ýÌå»ò°µÍøÀ©É¢ £¬µ«¹«Ë¾ÈÔ¾¯Ê¾Óû§Ð¡ÐÄ¿ÉÒÉͨѶ £¬×èÖ¹µã»÷²»Ã÷Á´½Ó»ò»Ø¸´ÉúÊèÀ´µç¡£ÏÖÔÚ £¬¹«Ë¾ÒÑÍê³ÉÄÚ²¿ÍøÂçÇå¾²»Ö¸´ £¬²¢Ïò¾¯·½¼°ÈÕ±¾Ð¡ÎÒ˽¼ÒÐÅÏ¢±£»¤Î¯Ô±»áÌá½»±¨¸æ £¬ÍÆÐз¨¶¨Åû¶ÒåÎñ¡£


https://securityaffairs.com/179766/data-breach/nippon-steel-solutions-data-breach.html


3. ÃÀ¹ú¼ÓÃÜATM¾ÞÍ·Bitcoin DepotÔâÓöÊý¾Ýй¶


7ÔÂ9ÈÕ £¬ÃÀ¹ú×î´ó±ÈÌØ±ÒATMÔËÓªÉÌBitcoin Depot¿ËÈÕÅû¶һÆðÓ°Ïì2.7Íò¿Í»§µÄÊý¾Ýй¶ÊÂÎñ £¬¸Ã¹«Ë¾Í¨¹ýÐżþ֪ͨÊÜÓ°ÏìÓû§ £¬ÊÂÎñ¿É×·ËÝÖÁ2024Äê6ÔÂ23ÈÕ £¬ÆäÍøÂçÊ״μì²âµ½¿ÉÒÉÔ˶¯ £¬µ«ÒòÁª°îÖ´·¨»ú¹¹ÒªÇóÅäºÏÊÓ²ì £¬Ö±ÖÁ7ÔÂ18ÈÕÄÚ²¿ÊÓ²ìÍê³Éºó·½ÄÜÆô¶¯Åû¶³ÌÐò¡£Æ¾Ö¤Í¨¸æ £¬Î´¾­ÊÚȨµÄ¹¥»÷Õß»ñÈ¡Á˲¿·Ö¿Í»§ÔÚKYCÑéÖ¤Àú³ÌÖÐÌá½»µÄÃô¸ÐÐÅÏ¢ £¬°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢µØµã¡¢³öÉúÈÕÆÚ¼°µç×ÓÓÊÏäµÈ¡£Bitcoin DepotÔÚÈ«ÃÀ¡¢¼ÓÄô󼰰ĴóÀûÑÇÔËÓª×Å8800̨װ±¸ £¬´Ë´ÎÊÂÎñ²¨¼°¹æÄ£ÆÕ±é¡£ÓÉÓÚ¼ÓÃÜÇ®±ÒÉúÒâµÄÄäÃûÐÔÓë×ʽð¿ìËÙÁ÷×ªÌØÕ÷ £¬¹Å°å½ðÈÚÁìÓòµÄÉí·Ý¼à¿ØÓë·ÀµÁ·þÎñÔڴ˳¡¾°ÖÐÄÑÒÔʵÑé¡£Bitcoin DepotÃ÷È·ÌåÏÖÎÞ·¨ÎªÊÜÓ°ÏìÓû§ÌṩÐÅÓñ£»¤»òÉí·Ý¼à¿Ø·þÎñ £¬×ª¶ø½¨ÒéÓû§×Ô¶¯¼à¿ØÕË»§Òì³£ÉúÒâ¡¢¶³½áÐÅÓñ¨¸æ²¢Ð¡ÐÄ´¹ÂÚ¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/bitcoin-depot-breach-exposes-data-of-nearly-27-000-crypto-users/


4. ÃÀ¹ú˰ÊÕµÖÃâ×Éѯ¹«Ë¾Rockerboxй¶24.5ÍòÌõÃô¸ÐÊý¾Ý


7ÔÂ9ÈÕ £¬ÃÀ¹úµÃ¿ËÈøË¹ÖÝ˰ÊÕµÖÃâ×Éѯ¹«Ë¾Rockerbox¿ËÈÕÒòδÉèÃÜÂë±£»¤µÄÊý¾Ý¿â̻¶ £¬µ¼ÖÂ245,949Ìõ¡¢×ܼÆ286.9GBµÄÃô¸ÐÊý¾Ýй¶ £¬º­¸ÇÈ«Ãû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂ루SSN£©¡¢µØµã¡¢¼ÝʻִÕÕ¼°ÍËÎéÎäÊ¿DD214ÎļþµÈ¸ß¶ÈÒþ˽ÐÅÏ¢¡£´Ë´ÎÊÂÎñÓÉÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷²¢±¨¸æÖÁvpnMentor¡£×÷ΪרעÓÚ¹ÍÖ÷˰ÊÕ¼¤ÀøÍýÏ루ÈçWOTC¡¢ERTCµÈ£©µÄ·þÎñÉÌ £¬RockerboxΪ²ÍÒû¡¢Âùݡ¢Ò½ÁƵȶà¸öÐÐÒµµÄÆóÒµÌṩ˰ÎñÓÅ»¯Ö§³Ö £¬Æäй¶µÄ¿Í»§Êý¾ÝÉæ¼°ÖØ´óµÄ²ÆÎñÓëСÎÒ˽¼ÒÐÅÏ¢¡£³ýÖ±½Ó´æ´¢µÄPII£¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£©Íâ £¬´ó×Ú˰ÊÕµÖÃâÉêÇëÎļþ¡¢Åú×¼/¾Ü¾øº¯¼°ÃÜÂë±£»¤PDFµÄÎļþÃûÒ²Ôâ̻¶ £¬²¿·ÖÎļþÃû¿ÉÄÜÒþº¬ÃÜÂëÏßË÷ £¬½øÒ»²½¼Ó¾çÐÅÏ¢ÀÄÓÃΣº¦¡£FowlerÖ¸³ö £¬´ËÀàÊý¾Ý¿É±»ÓÃÓÚ¾«×¼ÍøÂç´¹ÂÚ¡¢Éí·Ý͵ÇÔ¼°½ðÈÚڲƭ £¬¶ÔÊÜÓ°ÏìСÎÒ˽¼Ò×é³ÉÖØ´óÍþв¡£ÊÂÎñ̻¶ºó £¬FowlerÁ¬Ã¦Í¨ÖªRockerbox £¬µ«¸Ã¹«Ë¾Î´×÷³öÕýʽ»ØÓ¦ £¬Êý¾Ý¿âÔÚÊýÈÕºó²Å±»¼ÓÃܱ£»¤¡£


https://hackread.com/rockerbox-server-tax-firm-exposed-sensitive-records/


5. AnatsaÒÆ¶¯¶ñÒâÈí¼þÔٴι¥»÷±±ÃÀÒøÐпͻ§


7ÔÂ9ÈÕ £¬ÍøÂçÇå¾²Ñо¿Ö°Ô±È·ÈÏ £¬ºã¾Ã»îÔ¾µÄAndroidÒøÐÐľÂíAnatsa½üÆÚÕë¶Ô±±ÃÀ½ðÈÚ»ú¹¹ÌᳫÐÂÒ»ÂÖ¹¥»÷ £¬ºÉÀ¼ThreatFabric¹«Ë¾×·×ÙÏÔʾ £¬ÕâÒÑÊÇÆäÖÁÉÙµÚÈý´Î½«ÃÀ¹úÓë¼ÓÄôóÒÆ¶¯ÒøÐÐÓû§ÁÐΪĿµÄ¡£¸Ã¶ñÒâÈí¼þ¾ß±¸ÇÔÈ¡ÒøÐÐÆ¾Ö¤¡¢¼Í¼¼üÅÌÊäÈ뼰ͨ¹ýÔ¶³Ì¿ØÖÆÖ±½ÓʵÑéڲƭÉúÒâµÄÄÜÁ¦ £¬ÆäÁ½½×¶Î¹¥»÷ģʽÒý¿¯ÐÐÒµ¹Ø×¢¡£±¾´Î¹¥»÷ÖÐ £¬¹¥»÷ÕßÊ×ÏÈÔÚÓ¦ÓÃÊÐËÁÉϼܿ´ËÆÕýµ±µÄ¹¤¾ßÀàÓ¦Óã¨ÈçÎļþÔĶÁÆ÷£© £¬³õÆÚ¹¦Ð§Õý³£ÒÔ»ýÀÛÓû§ÐÅÍС£´ýÏÂÔØÁ¿µÖ´ïÊýÍò´Îºó £¬Í¨¹ý¸üÐÂ×¢Èë¶ñÒâ´úÂë £¬½«Anatsa×÷Ϊ×ÔÁ¦³ÌÐò×°ÖÃÖÁ×°±¸¡£ÒÔ±¾´Î°¸ÀýΪÀý £¬Ò»¿îÎļþÔĶÁÆ÷Ó¦ÓÃÔÚ6ÔÂ24ÈÕÖÁ30ÈÕʱ´úÍÆË͸üР£¬Ï¼ÜǰÒÑÔÚÃÀ¹úPlayÊÐËÁÃâ·Ñ¹¤¾ß°ñѹµ¹Ò»ÇÐ £¬ÀÛ¼ÆÏÂÔØÁ¿³¬5Íò´Î¡£ÖµµÃ¹Ø×¢µÄÊÇ £¬Anatsa´Ë´Î¹¥»÷Ä¿µÄÇåµ¥ÏÔÖøÀ©Õ¹ £¬ÁýÕÖÁ˸üÆÕ±éµÄÃÀ¹úÒÆ¶¯ÒøÐÐÓ¦Óá£


https://therecord.media/anatsa-android-banking-malware-returns-north-america


6. FlirtAIÔ¼»áÖúÊÖÒòδÊܱ£»¤Ôƴ洢й¶16ÍòÕÅ˽ÃܽØÍ¼


7ÔÂ8ÈÕ £¬µÂ¹ú°ØÁÖ¹«Ë¾Buddy Network GmbH¿ª·¢µÄiOSÓ¦ÓÃFlirtAI¿ËÈÕÒòÔÆ´æ´¢Çå¾²Îó²îÒý·¢ÑÏÖØÊý¾Ýй¶ £¬³¬16ÍòÕÅÓû§ÉÏ´«µÄ˽ÃÜ̸Ìì½ØÍ¼Ì»Â¶ÓÚ¹«¹²»¥ÁªÍø¡£¸ÃÓ¦ÓÃÖ÷´òAI¸¨ÖúÉç½»¹¦Ð§ £¬Óû§ÐèÊÖ¶¯½ØÈ¡Ô¼»áÈí¼þ¶Ô»°»òСÎÒ˽¼Ò×ÊÁϽçÃæ²¢ÉÏ´« £¬ÒÔ»ñÈ¡ÎåÌõ¶¨Öƻظ´½¨Ò顣Ȼ¶ø £¬Ñо¿Ö°Ô±·¢Ã÷Æä¹È¸èÔÆ´æ´¢Í°Î´ÉèÖûá¼ûȨÏÞ¿ØÖÆ £¬µ¼ÖÂÃô¸ÐÊý¾Ýºã¾ÃÂã¶¡£Êý¾ÝÏÔʾÇàÉÙÄêÓû§Õ¼±ÈÏÔÖø £¬ÆäÉÏ´«µÄ½ØÍ¼°üÀ¨Í¬ÁäÈË˽ÃܶԻ° £¬²¿·Öδ³ÉÄêÈË¿ÉÄÜÍêÈ«²»ÖªÏþ̸ÌìÄÚÈݱ»½ØÍ¼Íâй¡£ÖµµÃ¹Ø×¢µÄÊÇ £¬Ö»¹ÜÓ¦ÓÃÌõ¿îÒªÇó¡°ÉÏ´«Ç°Ðè»ñµÃ¶Ô»°·½ÊÚȨ¡± £¬µ«ÏÖʵ²Ù×÷ÖÐÏÕЩÎÞ·¨Ö´ÐС£ËäȻƻ¹ûÊÐËÁ±ê×¢17+ÄêËêÏÞÖÆ £¬ÈÔδÄÜÓÐÓÃ×èֹδ³ÉÄêÈËʹÓá£ÊÂÎñ´¦Öóͷ£Ê±¼äÏßÏÔʾ £¬Ñо¿Ö°Ô±5ÔÂ6ÈÕ·¢Ã÷Îó²îºó £¬ÓÚ5ÔÂ19ÈÕÏò¿ª·¢ÉÌת´ï £¬6ÔÂ2ÈÕÁªÏµÅÌËã»úÓ¦¼±ÏìӦС×飨CERT£© £¬×îÖÕÔÚ6ÔÂ16ÈÕÐÞ¸´´æ´¢Í°È¨ÏÞ¡£


https://cybernews.com/security/iphone-flirtai-app-leaks-chat-screenshots/