TamperedChefÐÅÏ¢ÇÔÈ¡³ÌÐòͨ¹ýڲƭÐÔPDF±à¼­Æ÷Èö²¥

Ðû²¼Ê±¼ä 2025-09-01

1. TamperedChefÐÅÏ¢ÇÔÈ¡³ÌÐòͨ¹ýڲƭÐÔPDF±à¼­Æ÷Èö²¥


8ÔÂ30ÈÕ £¬½üÆÚÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶ÁËÒ»ÆðÉæ¼°Google¹ã¸æÍƹãµÄÖØ´óÍøÂç·¸·¨Ô˶¯ £¬ÍþвÐÐΪÕßͨ¹ý50Óà¸öαÔìÓòÃû·Ö·¢Ð¯´øTamperedChefÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄPDF±à¼­¹¤¾ß¡£¸ÃÔ˶¯·ºÆð¶à½×¶ÎÌØÕ÷ £¬×Ô2024Äê6ÔÂ26ÈÕÆð £¬¹¥»÷Õßͨ¹ý×¢²á»ò½ÓÊÜÍøÕ¾ÍÆ¹ã"AppSuite PDF Editor"µÈ¹¤¾ß £¬Ê¹ÓÃÖÁÉÙËÄ¼ÒÆóÒµµÄÕýµ±Ö¤ÊéÇ©ÊðÓÕÆ­ÐÔÓ¦ÓóÌÐò £¬ÐγÉÊÖÒÕ¿ÉÐŶÈαװ¡£½¹µã¶ñÒâÈí¼þTamperedChefͨ¹ý¿ÉÖ´ÐÐÎļþµÄ"-fullupdate"²ÎÊý´¥·¢ £¬ÔÚ8ÔÂ21ÈÕǰÒÔÕý³£¹¦Ð§Ê¾ÈË £¬´ýGoogle¹ã¸æÍê³É60ÌìÍÆ¹ãÖÜÆÚǰËÄÌìͻȻ¼¤»î¶ñÒâÄ£¿é¡£¸ÃÇÔÈ¡³ÌÐòͨ¹ýDPAPI½Ó¿Ú½âÃÜä¯ÀÀÆ÷Êý¾Ý £¬ÖصãÇÔÈ¡Óû§Æ¾Ö¤¡¢ÍøÂçCookieµÈÃô¸ÐÐÅÏ¢ £¬²¢¾ß±¸¼ì²âÇå¾²ÊðÀíµÄÇéÐθÐÖªÄÜÁ¦¡£Ñо¿Õ¹Ïָ÷¸·¨ÍŻﹹ½¨ÁËÏ໥¹ØÁªµÄÓ¦ÓÃÉú̬ £¬³ýÖ÷¹¥PDF¹¤¾ßÍâ £¬»¹Í¨¹ýOneStart¡¢EpibrowserµÈDZÔÚÓк¦³ÌÐò£¨PUP£©Ðγɽ»Ö¯Ñ¬È¾Á´¡£Expel¹«Ë¾·¢Ã÷²¿·ÖÓ¦ÓûáÓÕµ¼Óû§½«×°±¸×¢²áΪסլÊðÀí £¬¹¥»÷Õß¿ÉÄÜͨ¹ýÕýµ±ÊðÀí·þÎñÉÌÏ´°×²»·¨Á÷Á¿¡£ÖµµÃ×¢ÖØµÄÊÇ £¬×ÝÈ»´úÂëÊðÃûÖ¤ÊéÒѱ»µõÏú £¬Ä¿½ñÒÑ×°ÖÃ×°±¸ÈÔÃæÁÙÒ»Á¬Î£º¦¡£


https://www.bleepingcomputer.com/news/security/tamperedchef-infostealer-delivered-through-fraudulent-pdf-editor/


2. APT37ʹÓÃÇ鱨Îļþ¶Ôº«·¢¶¯Ï¸ÃÜÍøÂç´¹ÂÚ¹¥»÷


8ÔÂ29ÈÕ £¬ÍøÂçÇå¾²¹«Ë¾Seqrite×îÐÂÅû¶ £¬³¯ÏÊÖ§³ÖµÄºÚ¿Í×éÖ¯APT37½üÆÚÕë¶Ôº«¹úÕþ¸®¼°Ç鱨»ú¹¹Ìᳫ´úºÅ"º«¹ú»ÃÓ°Ðж¯"µÄÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷ £¬Í¨¹ýË«ÖØÓÕ¶üÕ½ÂÔÀÖ³ÉÉøÍ¸Ä¿µÄϵͳ¡£¸Ã×é֯ʹÓú«¹úÑо¿»ú¹¹ÄÚ²¿Í¨Ñ¶ºÍ³¯Ïʹٷ½ÉùÃ÷Îļþ×÷Ϊ¹¥»÷ÔØÌå £¬Õ¹Ïָ߶ȶ¨ÖÆ»¯µÄÍøÂçÌØ¹¤ÄÜÁ¦¡£Ê״ι¥»÷ÖÐ £¬APT37αÔ캫¹ú¹ú¼ÒÇ鱨Ñо¿Ð­»áµÚ52ÆÚͨѶÎļþ £¬ÓÕÆ­Ä¿µÄ³ÉÔ±ÏÂÔØ°üÀ¨¶ñÒâLNK¿ì½Ý·½·¨µÄPDFÎĵµ¡£Ö´ÐÐºó £¬¸Ã¿ì½Ý·½·¨´¥·¢ÄÚ´æ¼ÓÔØµÄRokRATºóÃÅ £¬Í¨¹ý¶à²ã»ìÏýÊÖÒÕ£¨°üÀ¨Åú´¦Öóͷ£¾ç±¾¡¢XOR½âÃܼ°ÎÞÎļþ×¢È룩ʵÏÖÒþ²Ø×¤Áô¡£¹¥»÷Á´»¹½ÓÄÉαÔìHTTPÁ÷Á¿ÉÏ´«TEMPÎļþµÄ·½·¨ £¬¹æ±Ü¹Å°åÇå¾²¼ì²â¡£µÚ¶þ´Î¹¥»÷ÔòÃé×¼º«¹úÕþ¸®ÄÚ¸ó¼°Í³Ò»²¿µÈ»ú¹¹ £¬Ê¹Óó¯ÏÊ×î¸ßÏòµ¼È˽ðÕý¶÷µÄ°ûÃýðÓëÕý7ÔÂ28ÈÕ½ÒÏþµÄ³ðÊÓÉùÃ÷×÷ΪÓÕ¶ü¡£¹¥»÷Õß¹¹½¨ÁËÏàËÆµÄÉøÍ¸Â·¾¶£º¶ñÒâLNKÎļþÊÍ·Åαװ³ÉPDFÉÏ´«µÄ»ìÏý×é¼þ £¬Í¨¹ýPowerShellÏÂÁîÖ´ÐÐÄÚ´æÖеļÓÃÜÔØºÉ £¬×îÖÕ´ÓC2·þÎñÆ÷»ñÈ¡abs.tmpÖ´ÐкóÐø²Ù×÷¡£Á½´Î¹¥»÷¾ù½ÓÄÉ"ÓÕ¶üÎļþ+¶ñÒâ¿ì½Ý·½·¨"µÄ×éºÏģʽ £¬ÍŽáÄÚ´æÖ´ÐÐÓëÁ÷Á¿»ìÏýÊÖÒÕ £¬ÐγÉÄÑÒÔ×·×ÙµÄÒþ²ØÍ¨µÀ¡£


https://www.infosecurity-magazine.com/news/north-korea-apt37-spear-phishing/


3. ºÚ¿ÍÉù³ÆÇÔÈ¡ÁË43.3ÍòÒ½ÁÆ´ÓÒµÕßµÄÏêϸÐÅÏ¢


8ÔÂ29ÈÕ £¬Ò»¸öÊ¢ÐÐÊý¾Ýй¶ÂÛ̳ÉÏ·ºÆðÕë¶ÔÃÀ¹úÒ½ÁÆ´ÓÒµÕߵĴó¹æÄ£Êý¾Ýй¶Ìû×Ó £¬¹¥»÷ÕßÉù³Æ»ñÈ¡Á˰üÀ¨43.3ÍòÃûÒ½Éú¡¢Íâ¿ÆÒ½Éú¼°Ò½ÁƱ£½¡×¨ÒµÖ°Ô±Ãô¸ÐÐÅÏ¢µÄÊý¾Ý¿â¡£CybernewsÑо¿ÍŶӯÊÎöÑù±¾ºóÖ¸³ö £¬Ð¹Â¶Êý¾Ýº­¸ÇÈ«Ãû¡¢µç»°¡¢Ö°³Æ¡¢×¨ÒµÁìÓò¡¢Ò½ÔºÐÅÏ¢¡¢µç×ÓÓʼþ¡¢µØµãµÈСÎÒ˽¼ÒÓëÊÂÇéÕË»§»ìÏýÐÅÏ¢ £¬ÆäȪԴ¿ÉÄÜÖ¸ÏòµÚÈý·½·þÎñÌṩÉ̵ÄÎó²î¡£´Ë´Îй¶·ºÆðÁ½´óÌØÕ÷£ºÆäÒ» £¬²¿·Öµç×ÓÓʼþ´Ëǰδ·ºÆðÔÚ¹ûÕæÊý¾Ýй¶ÊÂÎñÖÐ £¬ÌåÏÖÊý¾Ý¿ÉÄÜÕûºÏ×Ô¶à´Îδ¹ûÕæÎó²î»òÌØ¶¨Î´Åû¶µÄµÚÈý·½·þÎñй¶£»Æä¶þ £¬¹¥»÷Õß´ËÇ°ÔøÐû²¼°´µØÇø¡¢ÐÐÒµ·ÖÀàµÄÀàËÆÊý¾Ý¿â £¬Åú×¢Æä¿ÉÄÜͨ¹ý¶àÔ´ÍøÂç¿ÌÒâÒþ²ØÏêϸȪԴ¡£ÕâÖÖģʽÔöÌíÁË×·×ÙÊý¾ÝÔ´Í·µÄÄÑ¶È £¬Ò²·´Ó¦³öÒ½ÁÆÐÐÒµµÚÈý·½·þÎñÉú̬µÄÇå¾²Òþ»¼¡£Ò½ÁÆÊý¾ÝÒò¸ß¼ÛÖµ³ÉÎªÍøÂç·¸·¨ÖصãÄ¿µÄ¡£Ð¹Â¶ÐÅÏ¢¿É±»ÓÃÓÚ¶àÖØ¶ñÒⳡ¾°£º×îÖ±½ÓµÄÊÇÉí·Ý͵ÇÔ £¬Í¨¹ýαÔìÒ½ÁÆ´ÓÒµÕßÉí·Ý¿ªÉèڲƭÕË»§£»¸üΣÏÕµÄÊǶ¨Ïò´¹ÂÚ¹¥»÷ £¬¹¥»÷Õß¿ÉÄÜαװ³ÉÒ½ÁÆ»ú¹¹·¢ËͰüÀ¨¶ñÒâÁ´½ÓµÄÄÚÈÝ £¬ÓÕµ¼Êܺ¦Õß͸¶¸ü¶àСÎÒ˽¼ÒÐÅÏ¢»òÏÂÔØÀÕË÷Èí¼þ¡£


https://cybernews.com/security/american-doctors-data-breach-healthcare/


4. WhatsApp 0-DayÎó²î±»Ê¹Óù¥»÷iOSºÍmacOSÓû§


8ÔÂ31ÈÕ £¬WhatsApp½ôÆÈÐÞ¸´ÁËÒ»¸ö±àºÅΪCVE-2025-55177µÄÑÏÖØ0dayÎó²î £¬¸ÃÎó²îÔÊÐí¹¥»÷Õßͨ¹ýÁãµã»÷ÌØ¹¤Èí¼þ¹¥»÷ÈëÇÖiOSºÍMacÓû§µÄ×°±¸ £¬ÎÞÐèÓû§µã»÷Á´½Ó»ò·­¿ªÎļþ¼´¿ÉÇÔÈ¡Êý¾Ý¡£´Ë´ÎÎó²îÓÉWhatsAppÄÚ²¿Çå¾²ÍŶӷ¢Ã÷ £¬ÊôÓÚÖØ´óµÄ¹¥»÷Á´µÄÒ»²¿·Ö £¬ÍŽáÁËÁíÒ»¸öÒÑÓÉÆ»¹ûÐÞ¸´µÄÎó²î£¨CVE-2025-43300£© £¬ÐγɿÉÔ¶³ÌÖ´ÐжñÒâ´úÂëµÄÍêÕû¹¥»÷·¾¶¡£¾ÝÇ徲ͨ¸æ £¬¸ÃÎó²îÔ´ÓÚ¡°¹ØÁª×°±¸Í¬²½ÐÂÎÅÊÚȨ²»ÍêÕû¡± £¬¹¥»÷Õß¿ÉʹÓô˻úÖÆÇ¿ÖÆÄ¿µÄ×°±¸´¦Öóͷ£¶ñÒâÍøÖ·ÄÚÈÝ £¬½ø¶øÖ²ÈëÌØ¹¤Èí¼þÇÔÈ¡¶ÌÐŵÈÃô¸ÐÐÅÏ¢¡£WhatsAppÒÑÏò¡°²»µ½200Ãû¡±Ìض¨Ä¿µÄÓû§·¢ËÍ֪ͨ £¬²¢Ç¿Å²Óû§ÐèÁ¬Ã¦¸üÐÂÖÁ×îа汾ÒÔÌá·ÀΣº¦¡£¿¨Ëþ¶û¹ú¼ÒÍøÂçÇå¾²¾Ö£¨NCSA£©Ö¸³ö £¬¸ÃÎó²îµÄÑÏÖØÐÔÔÚÓÚÆäʹÓÃÐÂÎÅͬ²½»úÖÆ»ñȡװ±¸ÆðÔ´»á¼ûȨÏÞ £¬¶ø¹ú¼ÊÌØÉâ×éÖ¯Ç徲ʵÑéÊÒÔò½«Æä¶¨ÐÔΪ¡°¸ß¼¶Ìع¤Èí¼þÔ˶¯¡± £¬³ÆÆäÒÑÍù90ÌìÄÚÒÑÕë¶ÔÓû§Ìᳫ¹¥»÷¡£ÊµÑéÊÒÈÏÕæÈËDonncha ¨® Cearbhaill½¨ÒéÓû§¸üÐÂ×°±¸»ò»Ö¸´³ö³§ÉèÖÃÒÔ³¹µ×ɨ³ýDZÔÚÍþв¡£


https://hackread.com/whatsapp-0-day-exploit-attack-targeted-ios-macos-users/


5. TAOTHÔ˶¯£º±»Ð®ÖƵÄÈí¼þ¸üÐÂÕýÔÚÑÇÖÞ¸÷µØÈö²¥¶ñÒâÈí¼þ


9ÔÂ1ÈÕ £¬Ç÷ÊÆ¿Æ¼¼¿ËÈÕÅû¶һÆð´úºÅ"TAOTH"µÄÖØ´óÍøÂçÌØ¹¤Ô˶¯ £¬¸ÃÐж¯×Ô2024Äêµ×Æô¶¯ £¬Í¨¹ýÐ®ÖÆÈí¼þ¸üзþÎñÆ÷ºÍÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷ £¬ÔÚ¶«ÑǵØÇø¶¨ÏòÈö²¥¶à¸ö¶ñÒâÈí¼þ¼Ò×å £¬Ä¿µÄº­¸ÇÖйú´ó½¡¢Ì¨Íå¡¢Ïã¸Û¡¢ÈÕ±¾¼°º«¹úµÄÒì¼ûÈËÊ¿¡¢¼ÇÕß¡¢Ñо¿Ö°Ô±ºÍÉ̽çÊ×ÄÔ £¬²¿·ÖÃÀ¹úºÍŲÍþÓû§Ò²ÔⲨ¼°¡£¹¥»÷ÕßʹÓÃÒÑ·ÅÆúµÄËѹ·×¢ÒôÊäÈë·¨¸üлúÖÆÊµÑ鹩ӦÁ´¹¥»÷£º2024Äê10Ô £¬ÔÚËѹ·ÊäÈë·¨×èÖ¹¸üÐÂÎåÄêºó £¬Íþв×éÖ¯½ÓÊÜÆäʧЧÓòÃû £¬Í¨¹ý¿´ËÆÕýµ±µÄ¸üÐÂÀú³Ì·Ö·¢¶ñÒâ¸ºÔØ¡£Óû§×°Öùٷ½×°ÖóÌÐòºóÊýСʱ £¬ÏµÍ³»á×Ô¶¯´¥·¢¹¥»÷Õß¿ØÖƵÄÓò¸üР£¬Ö²ÈëTOSHIS¡¢DESFY¡¢GTELAMºÍC6DOORËÄ´ó¶ñÒâÈí¼þ¼Ò×å¡£³ý¹©Ó¦Á´¹¥»÷Íâ £¬TAOTHÐж¯»¹ÍŽáÓã²æÊ½ÍøÂç´¹ÂÚ£º¹¥»÷Õß·¢ËÍαװ³ÉÕþÖÎÖ÷ÌâÎĵµµÄÓʼþ £¬ÓÕµ¼Óû§»á¼ûÐéÎ±ÔÆ´æ´¢Ò³ÃæÏÂÔØ¶ñÒâ´æµµ £¬»òͨ¹ýαÔìGoogle/MicrosoftµÇ¼ÃÅ»§Æ­È¡OAuthÊÚȨ £¬½ø¶ø²Ù¿ØÓÊÏäʵÑéºáÏòÍøÂç´¹ÂÚ¡£


https://securityonline.info/taoth-campaign-hijacked-software-updates-are-spreading-malware-across-asia/


6. SikkahBot£ºÕë¶ÔÃϼÓÀ­¹úѧÉúµÄÐÂÐͰ²×¿¶ñÒâÈí¼þʵÑé½ðÈÚڲƭ


9ÔÂ1ÈÕ £¬CybleÑо¿ÓëÇ鱨ʵÑéÊÒ£¨CRIL£©½üÆÚ½ÒÆÆÁËÒ»ÆðרÃÅÕë¶ÔÃϼÓÀ­¹úѧÉúµÄÐÂÐÍAndroid¶ñÒâÈí¼þÔ˶¯"SikkahBot"¡£¸ÃÔ˶¯×Ô2024Äê7ÔÂÆð»îÔ¾ £¬Í¨¹ýαÔìÃϼÓÀ­¹ú½ÌÓýίԱ»á¹Ù·½½±Ñ§½ðÓ¦ÓóÌÐòʵÑ龫׼թƭ £¬ÒÑÐγɼ¯ÍøÂç´¹ÂÚ¡¢Êý¾ÝÇÔÈ¡Óë×Ô¶¯»¯½ðÈÚÉúÒâÓÚÒ»ÌåµÄ¸´ºÏÐÍÍþв¡£¹¥»÷Õßͨ¹ý¶ÌÐÅ·¢ËÍËõ¶ÌÁ´½Ó £¬ÓÕµ¼Êܺ¦Õß»á¼û¶ñÒâAPKÏÂÔØÍøÕ¾¡£Î±×°³ÉÕý¹æ½±Ñ§½ðÓ¦ÓõĶñÒâÈí¼þÔÚ×°ÖÃºó £¬»áÒªÇóÓû§Ê¹Óùȸè»òFacebookÕ˺ŵǼ £¬²¢Öð²½Ë÷È¡ÐÕÃû¡¢ËùÊô»ú¹¹µÈСÎÒ˽¼ÒÐÅÏ¢ £¬×îÖÕÓÕµ¼Óû§ÌṩǮ°üºÅ¡¢PINÂëµÈÃô¸Ð²ÆÎñÊý¾Ý¡£CRILÖ¸³ö £¬Êܺ¦ÕßÌá½»ÐÅÏ¢ºó»áÊÕµ½"¿Í·þ½«ÁªÏµ"µÄÐéαÌáÐÑ £¬ÊµÔòÒÑÂäÈëÕ©Æ­ÏÝÚå¡£SikkahBotµÄ½¹µãÍþвÔÚÓÚÆäÀÄÓÃ×°±¸È¨ÏÞµÄÄÜÁ¦¡£ÔÚ»ñÈ¡Óû§ÐÅÍÐºó £¬¶ñÒâÈí¼þ»áÇ¿ÖÆÇëÇóÎÞÕϰ­·þÎñ¡¢¶ÌÐÅ»á¼û¡¢Í¨»°ÖÎÀíµÈ¸ßΣº¦È¨ÏÞ £¬ÊµÏÖ¶Ô×°±¸µÄÉî¶È¿ØÖÆ¡£Í¨¹ý×¢²á¶ÌÐżàÌýÆ÷ £¬Æä¿É×èµ²°üÀ¨"bKash""NAGAD"µÈÒøÐÐÒªº¦´Ê¼°Ìض¨·þÎñºÅÂëµÄ¶ÌÐÅÄÚÈÝ £¬²¢ÉÏ´«ÖÁ¹¥»÷Õß¿ØÖƵÄFirebase·þÎñÆ÷¡£¸üΣÏÕµÄÊÇ £¬¸Ã¶ñÒâÈí¼þÄÜ×Ô¶¯µÇ¼ÃϼÓÀ­¹úÖ÷Á÷ÒøÐÐÓ¦Óà £¬Í¨¹ý´ÓC2·þÎñÆ÷¼ìË÷PINÂë²¢×Ô¶¯Ìî³äµÇ¼×Ö¶Î £¬Íê³Éδ¾­ÊÚȨµÄתÕ˲Ù×÷¡£


https://securityonline.info/fraudulent-scholarship-apps-a-new-malware-campaign-targets-students-in-bangladesh/