°²×¿ÒøÐÐľÂíDoubleTroubleÉý¼¶£¬ÍþвŷÖÞÓû§Çå¾²
Ðû²¼Ê±¼ä 2025-08-041. °²×¿ÒøÐÐľÂíDoubleTroubleÉý¼¶£¬ÍþвŷÖÞÓû§Çå¾²
7ÔÂ31ÈÕ£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿îÃûΪ¡°DoubleTrouble¡±µÄ°²×¿ÒøÐÐľÂíÍê³ÉÖØ´óÊÖÒÕÉý¼¶£¬ÆäÈö²¥ÊÖ¶ÎÓë¹¥»÷ÄÜÁ¦ÏÔÖøÔöÇ¿£¬¶ÔÅ·ÖÞÓû§×é³ÉÑÏËàÌôÕ½¡£¸ÃľÂí×î³õͨ¹ý·Âð´óÐÍÒøÐд¹ÂÚÍøÕ¾Èö²¥£¬ÏÖÔÚÒÑÀ©Õ¹ÖÁʹÓÃDiscordƽ̨ÍйܶñÒâAPKÎļþ¾ÙÐзַ¢£¬´ó·ù½µµÍÁ˹ŰåÇå¾²¹¤¾ßµÄ¼ì²âЧÂÊ¡£¾ÝZimperiumÍŶӯÊÎö£¬Ä¿½ñ¹¥»÷Ô˶¯Éæ¼°9¸ö×îÐÂÑù±¾¼°25¸öÔçÆÚ±äÖÖ£¬Æä¹¦Ð§µü´úËÙÂÊÓëÒþ²ØÐÔÒý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£Ð°æÄ¾Âí¼¯³É¶àÏîÃô¸Ð¹¦Ð§£ºÍ¨¹ýMediaProjectionÓëVirtualDisplay½Ó¿ÚʵÏÖʵʱÆÁÄ»Â¼ÖÆ£¬¿ÉÈÆ¹ý¶àÒòËØÈÏÖ¤Ö±½Ó²¶»ñÓû§²Ù×÷»Ã棻αÔìËøÆÁ½çÃæÇÔÈ¡PINÂë¡¢ÃÜÂë¼°½âËøÍ¼°¸£»»ùÓÚÎÞÕϰÊÂÎñµÄ¼üÅ̼ͼ¹¦Ð§£¬Äܾ«×¼²¶»ñÓû§ÊäÈëÄÚÈÝ¡£±ðµÄ£¬Ä¾Âí»¹°²ÅŶ¨ÖÆ»¯´¹ÂÚÁýÕֲ㣬·ÂÃ°ÒøÐÐÓ¦ÓõǼ½çÃæÓÕµ¼Óû§Ìύƾ֤£¬Ä¿µÄº¸ÇÒøÐÐAPP¡¢ÃÜÂëÖÎÀí¹¤¾ß¼°¼ÓÃÜÇ®±ÒÇ®°ü¡£ÇÔÈ¡Êý¾Ý¾±àÂëºó´«ÊäÖÁÔ¶³ÌC2·þÎñÆ÷£¬ÐγÉÍêÕûÊý¾ÝÇÔÈ¡Á´Ìõ¡£
https://www.infosecurity-magazine.com/news/android-malware-targets-banks-via/
2. ³¯ÏÊLazarus GroupʹÓöñÒ⿪ԴÈí¼þ°üʵÑéÍøÂçÌØ¹¤Ô˶¯
7ÔÂ31ÈÕ£¬¾ÝÇå¾²³§ÉÌSonatype±¨¸æ£¬³¯Ïʹú¼ÒÖ§³ÖµÄLazarus GroupÔÚ2025ÄêÉϰëÄêÌᳫÁËÒ»³¡´ó¹æÄ£ÍøÂçÌØ¹¤Ðж¯£¬Í¨Ì«¹ý·¢200Óà¸ö¶ñÒ⿪ԴÈí¼þ°ü£¨Éæ¼°npmºÍPyPIƽ̨£©£¬ÀÖ³ÉÉøÍ¸È«Çò¿ª·¢ÇéÐΡ£´Ë´Î¹¥»÷±»È϶¨Îª¸Ã×éÖ¯µÄ¡°Õ½ÂÔת±ä¡±£¬±ê¼Ç×ÅÆä´Ó¹Å°åµÄʱ»úÖ÷Òå¹¥»÷תÏòºã¾ÃÊý¾ÝÇÔÈ¡ÓëÌØ¹¤Ô˶¯¡£SonatypeÔÚ2025Äê1ÔÂÖÁ6Ô¼äÀÛ¼Æ×èµ²234¸öÆæÒì¶ñÒâ°ü£¬¹ÀËãDZÔÚÊܺ¦Õß´ï3.6ÍòÈË¡£ÕâЩÈí¼þ°üͨ¹ýð³äÕýµ±¿ª·¢¿âʵÑéÓÕÆ£¬¿ª·¢ÕßÔÚδÂÄÀúÖ¤»òɳºÐ²âÊÔµÄÇéÐÎÏÂÖ±½Ó×°Ö㬵¼Ö¶ñÒâ´úÂë¾CI/CD×Ô¶¯»¯Á÷³ÌÀ©É¢ÖÁÉú²úϵͳ¡£¹¥»÷½ÓÄɶà½×¶ÎÉè¼Æ£º³õÆÚÖ²Èë³ÌÐòÈÏÕæ½¨É賤ÆÚ»¯ºóÃÅ£¬ºóÐø½×¶ÎÔòרעÓÚÇÔÈ¡Ãô¸ÐÊý¾Ý£¬°üÀ¨¿ª·¢»úƾ֤¡¢ÔÆ»ù´¡ÉèÊ©ÁîÅÆ¼°Ô´´úÂë´æ´¢¿â»á¼ûȨÏÞ¡£±¨¸æÇ¿µ÷£¬LazarusµÄÄ¿µÄÒÑÓâÔ½´¿´âÇÔȡƾ֤£¬Æä½¹µãÒâͼÔÚÓÚͨ¹ý¿ØÖÆ¿ª·¢ÕßÇéÐΣ¬½øÒ»²½ÉøÍ¸ÆóÒµÍøÂç¡£´Ë´ÎÐж¯ÌØÊâÕë¶ÔDevOps÷缯ÐÍ×éÖ¯£¬ÒòÆä×Ô¶¯»¯¹ÜµÀÒ׳ÉΪ¶ñÒâÒÀÀµÏîµÄÈö²¥½Úµã¡£
https://www.infosecurity-magazine.com/news/200-malicious-open-source-lazarus/
3. ¼ÓÖÝ´óѧ²®¿ËÀû·ÖУÊý¾Ý¿âÔâй¶
7ÔÂ31ÈÕ£¬×÷ΪÃÀ¹ú¶¥¼â¹«Á¢Ñо¿ÐÍ´óѧ£¬¼ÓÖÝ´óѧ²®¿ËÀû·ÖУ¿ËÈÕ±»ÆØÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ¡£Ò»ÃûÍþвÐÐΪÕßÔÚÍøÂç·¸·¨ÂÛ̳¹ûÕæ³öÊÛËùν¡°ÍêÕûÊý¾Ý¿â¡±£¬Éù³Æ°üÀ¨Ñ§ÉúÊý¾Ý¡¢×êÑлáÐÅÏ¢¡¢Î÷ϯÏêÇé¡¢Óû§ÕË»§£¨º¬Óû§Ãû¡¢µç×ÓÓʼþ¼°¹þÏ£ÃÜÂ룩¼°Ö§¸¶ÐÅÏ¢µÈÃô¸ÐÄÚÈÝ£¬²¢ÒÔSQLºÍCSVÃûÌÃÌṩÊý¾Ý£¬Í¬Ê±¶µÊÛ»á¼û¸ÃУphpMyAdminÊý¾Ý¿âÖÎÀíÃæ°åµÄȨÏÞ¡£ÎªÖ¤ÊµÕæÊµÐÔ£¬¹¥»÷ÕßÐû²¼Á˶àÕŽØÍ¼£¬Õ¹Ê¾Æä¶ÔÊý¾Ý¿âºó¶ËµÄ¿ØÖÆÈ¨ÏÞ£¬°üÀ¨º¬Ãô¸ÐÐÅÏ¢µÄ±í¸ñ¼°Óû§ÕË»§ÁÐ±í¡£ÍþвÕßÌṩµÄ½ØÍ¼ÏÔʾ£¬ÆäÀÖ³ÉÇÖÈëÊý¾Ý¿âºó¶Ë£¬¿ÉÉó²é°üÀ¨Ñ§Éú¡¢½ÌÖ°Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢µÄ±í¸ñ£¬²¢»ñÈ¡ÁË´ó×ÚÓû§ÕË»§µÄ¹þÏ£ÃÜÂë¡£±ðµÄ£¬¹¥»÷ÕßÖ¸³ö£¬ÔÚ·¢Ìûʱ´ú£¬²®¿ËÀû·ÖУ¶à¸ö×ÓÓòÃû·ºÆð·þÎñÖÐÖ¹£¬¹Ù·½ÍøÕ¾ÒàÏÔʾÊý¾Ý¿âÅþÁ¬¹ýʧ£¬½øÒ»²½×ôÖ¤ÁËÊý¾Ýй¶µÄÕæÊµÐÔ¡£ÕâЩϵͳÒì³£¿ÉÄÜÓë¹¥»÷ÕߵIJÙ×÷Ö±½ÓÏà¹Ø£¬»ò·´Ó¦¸ÃÐ£ÍøÂçÇå¾²·À»¤±£´æÖØ´óÎó²î¡£
https://dailydarkweb.net/uc-berkeley-targeted-in-major-data-breach-full-university-database-allegedly-for-sale-online/
4. AkiraÀÕË÷Èí¼þʹÓÃSonicWall VPNÁãÈÕÎó²îʵÑé¹¥»÷
8ÔÂ3ÈÕ£¬±±¼«ÀÇʵÑéÊÒ£¨Arctic Wolf Labs£©Ñо¿Ö°Ô±¿ËÈÕÐû²¼±¨¸æ£¬Õ¹ÏÖAkiraÀÕË÷Èí¼þÕýͨ¹ýSonicWall SSL VPN×°±¸ÌᳫÒÉËÆÁãÈÕÎó²î¹¥»÷£¬ÉõÖÁÍ»ÆÆÒÑÍêÈ«ÐÞ²¹¡¢ÆôÓöàÒòËØÈÏÖ¤£¨MFA£©¼°Æ¾Ö¤ÂÖ»»»úÖÆµÄϵͳ¡£¸Ã¹¥»÷Ô˶¯×Ô2025Äê7ÔÂ15ÈÕÆð·ºÆð¼¤ÔöÌ¬ÊÆ£¬ÆäÀúÊ·¿É×·ËÝÖÁ2024Äê10Ô£¬Òý·¢ÍøÂçÇå¾²ÁìÓò¸ß¶È¹Ø×¢¡£Ñо¿Ö¸³ö£¬Ö»¹ÜδÍêȫɨ³ý±©Á¦ÆÆ½â¡¢Æ¾Ö¤Ìî³äµÈ¹Å°å¹¥»÷ÊֶεĿÉÄÜÐÔ£¬µ«¶àÏîÖ¤¾ÝÅú×¢SonicWall VPN±£´æÎ´¹ûÕæµÄÁãÈÕÎó²î¡£²¿·Ö°¸ÀýÏÔʾ£¬¼´±ã×°±¸ÒÑÍê³É×îв¹¶¡¸üС¢ÆôÓûùÓÚʱ¼äµÄÒ»´ÎÐÔÃÜÂ루TOTP£©MFA£¬²¢ÔÚÆ¾Ö¤ÂÖ»»ºóÈÔÔâÈëÇÖ¡£¹¥»÷ÕßʹÓÃÐéÄâרÓ÷þÎñÆ÷£¨VPS£©ÍйܾÙÐÐVPNÉí·ÝÑéÖ¤£¬ÓëÕýµ±Óû§Í¨¹ý¿í´ø·þÎñÉÌÍøÂçµÇ¼µÄÐÐΪģʽ±£´æÏÔÖø²î±ð¡£±ðµÄ£¬ÈëÇÖÓëÊý¾Ý¼ÓÃܼäµÄ¶ÌÔÝʱ¼ä²î£¬ÌåÏÖ¹¥»÷Õ߾߱¸¿ìËÙºáÏòÒÆ¶¯ÄÜÁ¦¡£Õë¶ÔÕâÒ»Íþв£¬±±¼«ÀÇʵÑéÊÒ½¨Òé×éÖ¯ÔÝʱ½ûÓÃSonicWall SSL VPN·þÎñ£¬Ö±ÖÁ¹Ù·½Ðû²¼ÓÐÓò¹¶¡¡£
https://securityaffairs.com/180724/cyber-crime/akira-ransomware-targets-sonicwall-vpns-in-likely-zero-day-attacks.html
5. ·ðÂÞÀï´ïÖÝÀÎÓüÊý¾Ýй¶ÊÂÎñÒý·¢¾ìÊôÇå¾²¿Ö»Å
8ÔÂ1ÈÕ£¬ÃÀ¹ú·ðÂÞÀï´ïÖÝ´óÕÓÔóµØ³Í½ÌËù£¨ECI£©½üÆÚ±¬·¢Ò»ÆðÑÏÖØÊý¾Ýй¶ÊÂÎñ£ºÒ»ÃûÊÂÇéÖ°Ô±ÎóÏòËùÓÐÇô·¸·¢Ë͵ç×ÓÓʼþ£¬ÆäÖаüÀ¨Í¬ÓüÇô·¸·Ã¿ÍµÄÁªÏµ·½·¨£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¼°µç»°ºÅÂë¡£ÕâЩÐÅϢͨ¹ýÀÎÓüÄÚµÄÐÅϢͤºÍÇ徲ƽ°åµçÄÔ±»Çô·¸»ñÈ¡£¬µ¼Ö´ó×ÚÇô·¸¾ìÊôÏÝÈëÇå¾²¿Ö»Å¡£¶àÃûÊÜÓ°Ïì¾ìÊôÏòýÌå͸¶£¬Ð¹Â¶µÄÁªÏµ·½·¨¿ÉÄܱ»ÓÃÓÚÀÕË÷»òɧÈÅ¡£ÀýÈ磬¼ò¡¤ÌÀÆÕɵ£ÐĵÀ£º¡°ÈôÇô·¸¼ä±¬·¢Ã¬¶Ü£¬¿ÉÄÜͨ¹ýй¶µÄµç»°ºÅÂëÍþв¾ìÊôÖ§¸¶Êê½ð£¬²»È»Î£ÏÕÆä±»¹ØÑºµÄÖ§Êô¡£¡±ÅÁÌØÀï˹¡¤¿ÀûÔòÒòÔøÔâÓö¸ú×Ù£¬¸üµ£ÐÄ×Ô¼ºµÄÊý×ÖÒþ˽±»·¸·¨·Ö×ÓʹÓá£Ö»¹ÜÀÎÓüÒÑ֪ͨ²¿·Ö¾ìÊôÊý¾Ýй¶ÇéÐΣ¬µ«·ðÂÞÀï´ïÖݳͽ̲¿·Öδ¶ÔýÌåѯÎÊ×÷³ö»ØÓ¦£¬½øÒ»²½¼Ó¾çÁ˹«Öڵĵ£ÐÄ¡£
https://www.theregister.com/2025/08/01/florida_prison_email_blunder/
6. ÐÂÐͶà½×¶Î¶ñÒâÈí¼þʹÓÃWindows¿ì½Ý·½·¨Èö²¥REMCOSºóÃÅ
8ÔÂ2ÈÕ£¬Çå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶ÁËÒ»ÆðÐÂÐͶà½×¶Î¶ñÒâÈí¼þ¹¥»÷Ô˶¯£¬Æäͨ¹ýÈ«ÐÄαװµÄWindows¿ì½Ý·½·¨Èö²¥Î£ÏÕµÄREMCOSÔ¶³Ì»á¼ûľÂí¡£¸Ã¹¥»÷Á´Éè¼ÆÇÉÃʹÓÃÓû§¶Ô¡°ÎÞº¦Îļþ¡±µÄÐÅÍÐʵÏÖÒþ²ØÈëÇÖ£¬×îÖÕ¸¶Óë¹¥»÷ÕßÍêÈ«¿ØÖÆÊÜѬȾϵͳµÄÄÜÁ¦¡£¹¥»÷ʼÓÚÒ»¸ö¿´ËÆÕý³£µÄLNKÎļþ£¬Í¨³£Í¨¹ýµç×ÓÓʼþ¸½¼þÈö²¥£¬ÎļþÃûαװ³É¡°ORDINE-DI-ACQUIST-7263535¡±µÈÉÌÎñÏà¹ØÃû³ÆÒÔ½µµÍÓû§Ð¡ÐÄ¡£µ±Óû§µã»÷¸ÃÎļþʱ£¬ÆäÄÚÖõÄPowerShellÏÂÁî»áÔÚºǫ́¾²Ä¬Ö´ÐУ¬Èƹý¹Å°åÇå¾²¼ì²â»úÖÆ¡£PowerShell×÷ΪWindowsʹÃü×Ô¶¯»¯¹¤¾ß£¬Ôڴ˴ι¥»÷Öб»ÀÄÓÃΪ¶ñÒâÔØºÉÏÂÔØÆ÷£ºÍ¨¹ý´ÓÔ¶³Ì·þÎñÆ÷»ñÈ¡Base64±àÂëµÄÓÐÓÃÔØºÉ²¢½âÂ룬×îÖÕÆô¶¯Ò»¸öαװ³É¡°CHROME.PIF¡±µÄ¿ÉÖ´ÐÐÎļþ¡£½âÂëºóµÄÔØºÉ×îÖÕÔÚϵͳ%ProgramData%Ŀ¼Ï½¨Éè¡°Remcos¡±Îļþ¼Ð£¬×°ÖÃREMCOSºóÃŲ¢ÌìÉú»÷¼üÈÕÖ¾Îļþ£¬È·¼á³¤ÆÚ»¯×¤Áô¡£¹¥»÷Õ߿ɽè´ËʵÑé¼üÅ̼ͼ¡¢½¨ÉèÔ¶³ÌShell¡¢»á¼ûÎļþ£¬ÉõÖÁ¿ØÖÆÉãÏñÍ·ºÍÂó¿Ë·ç¾ÙÐÐʵʱ¼àÊÓ¡£
https://hackread.com/attack-windows-shortcut-files-install-remcos-backdoor/


¾©¹«Íø°²±¸11010802024551ºÅ