TikTokÊÓÆµ³É¶ñÒâÈí¼þÈö²¥ÐÂÔØÌå

Ðû²¼Ê±¼ä 2025-10-21

1. TikTokÊÓÆµ³É¶ñÒâÈí¼þÈö²¥ÐÂÔØÌå


10ÔÂ19ÈÕ£¬ÍøÂç·¸·¨·Ö×ÓÕýʹÓÃαװ³ÉWindows¡¢Spotify¡¢NetflixµÈÊ¢ÐÐÈí¼þÃâ·Ñ¼¤»îÖ¸ÄϵÄTikTokÊÓÆµÈö²¥ÇÔÊØÐÅÏ¢¶ñÒâÈí¼þ¡£ISC Handler Xavier Mertens·¢Ã÷£¬¸ÃÔ˶¯ÓëTrend Micro½ñÄê5ÔÂÊӲ쵽µÄ¹¥»÷ģʽ¸ß¶ÈÏàËÆ£¬Í¨¹ý"ClickFix"Éç»á¹¤³ÌÊÖÒÕʵÑé¹¥»÷£¬ÊÓÆµÖÐչʾ¼ò¶ÌÏÂÁÓÕµ¼Óû§ÒÔÖÎÀíÔ±Éí·ÝÔÚPowerShellÖ´ÐС£µ±Óû§Ö´ÐÐÏÂÁîºó£¬PowerShell»áÅþÁ¬Ô¶³ÌÕ¾µã£¬ÏÂÔØ²¢Ö´ÐÐÁíÒ»¸ö¾ç±¾¡£¸Ã¾ç±¾´ÓCloudflareÒ³Ãæ»ñÈ¡Á½¸ö¿ÉÖ´ÐÐÎļþ£ºµÚÒ»¸öÊÇupdater.exe£¬ÊµÎªAura StealerÐÅÏ¢ÇÔÈ¡Èí¼þµÄ±äÖÖ£¬×¨ÃÅÍøÂçä¯ÀÀÆ÷ÉúÑĵį¾Ö¤¡¢Éí·ÝÑéÖ¤cookie¡¢¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢µÈÃô¸ÐÊý¾Ý£¬²¢»Ø´«ÖÁ¹¥»÷Õß·þÎñÆ÷£»µÚ¶þ¸öÊÇsource.exe£¬»áͨ¹ý.NETÄÚÖõÄC#±àÒëÆ÷×Ô±àÒë´úÂë²¢×¢ÈëÄÚ´æÔËÐУ¬Ïêϸ¹¦Ð§ÈÔÔÚÊÓ²ìÖС£´Ë´Î¹¥»÷Ó°Ïì¹æÄ£ÆÕ±é£¬Éæ¼°Windows¡¢Microsoft 365¡¢Adobe Premiere¡¢Photoshop¡¢CapCut Pro¡¢Discord NitroµÈÕýµ±Èí¼þ¼°Netflix¡¢Spotify PremiumµÈÐé¹¹·þÎñµÄ"¼¤»î½Ì³Ì"¡£Ç徲ר¼ÒÇ¿µ÷£¬Ö´ÐдËÀàÏÂÁîµÄÓû§Ó¦Á¬Ã¦ÖØÖÃËùÓÐÕË»§ÃÜÂ룬Òòƾ֤¿ÉÄÜÒÑй¶¡£


https://www.bleepingcomputer.com/news/security/tiktok-videos-continue-to-push-infostealers-in-clickfix-attacks/


2. ¹«¹²·¨¹ú¹«Ë¾Ôâ÷è÷ëÀÕË÷ÍŻ﹥»÷


10ÔÂ16ÈÕ£¬µÂ¹ú¹«¹²Æû³µ¼¯ÍÅÆìÏ·¨¹ú×Ó¹«Ë¾¹«¹²Æû³µ¼¯ÍÅ·¨¹ú¹«Ë¾ÓÚ10ÔÂ14ÈÕÔâ÷è÷ëÍøÂç·¸·¨ÍÅ»ïÀÕË÷¹¥»÷¡£÷è÷ëÐû³ÆÇÔȡԼ2000·ÝÎļþ¼°150GBÊý¾Ý£¬°üÀ¨¿Í»§¡¢Ô±¹¤¼°ÓªÒµÃô¸ÐÐÅÏ¢£¬²¢Ðû²¼Áù·ÝÑù±¾Îļþ×ôÖ¤£¬Ð¹Â¶ÄÚÈÝÉæ¼°³µÖ÷ÐÕÃû¡¢µØµã¡¢ÓÊÏä¡¢³µÐÍ¡¢VINÂë¼°³µÅƺŵÈСÎÒ˽¼ÒÐÅÏ¢¡£¹«¹²·¨¹ú¹«Ë¾½¨ÉèÓÚ1960Ä꣬×ܲ¿Î»ÓÚάÀ³¿ÆÌØÀ×£¬ÈÏÕæ°ÂµÏ¡¢Î÷ÑÅÌØ¡¢CUPRA¡¢Ë¹¿Â´ï¼°¹«¹²ÉÌÓóµÔÚ·¨ÓªÏú·ÖÏú¡£÷è÷ëÒѳÉΪ2025Äê×î»îÔ¾ÀÕË÷ÍŻÒÑÍù12¸öÔ¹¥»÷Ô¼585ÃûÊܺ¦Õß¡£Æä½ÓÄÉÀÕË÷Èí¼þ¼´·þÎñ£¨RaaS£©Ä£Ê½£¬ÊµÑéË«ÖØÀÕË÷£ºÏÈÒªÇó½âÃÜÊê½ð£¬ÔÙÍþвй¶Êý¾Ý¡£¸Ã×éÖ¯»îÔ¾ÓÚ¶íÓïºÚ¿ÍÂÛ̳£¬×èÖ¹¹¥»÷¶ÀÁªÌå¹ú¼Ò£¬ÌåÏÖÓë¿ËÀïÄ·ÁÖ¹¬¹ØÁª¡£


https://cybernews.com/news/volkswagen-france-ransomware-attack-qilin-group-claims/


3. ÃÀ¹úºÍ¼ÓÄôó¶à¸ö»ú³¡¹«¹²¹ã²¥ÏµÍ³ÔâºÚ¿Í¹¥»÷


10ÔÂ17ÈÕ£¬ºÚ¿ÍÕë¶Ô¼ÓÄôóÓëÃÀ¹úµÄËĸöÖ§Ïß»ú³¡ÌᳫЭͬ¹¥»÷£¬Í¨¹ýÈëÇÖ¹«¹²¹ã²¥ÏµÍ³¡¢º½°àÐÅÏ¢ÏÔʾÆÁµÈÉèÊ©£¬²¥·ÅÔÞÑï¹þÂí˹¼°Æ·ÆÀÃÀ¹úǰ×ÜÍ³ÌØÀÊÆÕµÄÃô¸ÐÐÅÏ¢£¬Ôì³É¾Ö²¿ÔËÓªÔÓÂÒ¡£ÉæÊ»ú³¡°üÀ¨¼ÓÄôó²»Áе߸çÂ×±ÈÑÇÊ¡µÄ»ùÂåÄɹú¼Ê»ú³¡¡¢Î¬¶àÀûÑǹú¼Ê»ú³¡¡¢°²¼òªʡÎÂɯ¹ú¼Ê»ú³¡£¬ÒÔ¼°ÃÀ¹ú±öϦ·¨ÄáÑÇÖݹþÀï˹±¤¹ú¼Ê»ú³¡¡£¾Ý¼ÓÄôó»Ê¼ÒÆï¾¯×ª´ï£¬»ùÂåÄÉ»ú³¡µÄ¡°¹ã¸æÁ÷ýÌå·þÎñ¡±Ôø¶ÌÔݱ»Ö²Èëδ¾­ÊÚȨÄÚÈÝ£»Î¬¶àÀûÑÇ»ú³¡Ôòͨ¹ýµÚÈý·½Èí¼þÎó²îÔâÈëÇÖ£¬ºÚ¿Í²¥·ÅÍâÓïÐÅÏ¢¼°ÒôÀÖ£¬»ú³¡ËæºóÇл»ÖÁÄÚ²¿ÏµÍ³»Ö¸´¿ØÖÆ¡£ÎÂɯ»ú³¡º½°àÐÅÏ¢ÏÔʾÆÁÓë¹ã²¥ÏµÍ³Í¬Ñù±»ÇÖÈ룬ÏÔʾ¡°Î´¾­ÊÚȨµÄͼÏñºÍͨ¸æ¡±£¬Æä»ùÓÚÔÆµÄÈí¼þÌṩÉ̳ÉΪ¹¥»÷Ä¿µÄ£¬ÏµÍ³ÔÚ¶Ìʱ¼äÄÚ»Ö¸´Õý³£¡£ÃÀ¹ú½»Í¨²¿³¤Ð¤¶÷¡¤´ï·ÆÖ¤Êµ£¬¹þÀï˹±¤»ú³¡¹ã²¥ÏµÍ³Òà±»ºÚ¿Í¿ØÖÆ£¬ÃÀ¹úÁª°îº½¿ÕÖÎÀí¾Ö£¨FAA£©ÕýÍŽá»ú³¡·½Õö¿ªÊӲ졣


https://cybernews.com/security/us-canada-airport-hacked/


4. ¶íÂÞ˹LynxÈëÇÖÓ¢¹ú¹ú·À³Ð°üÉÌÖÂÃô¸Ð¾üÊÂÎļþй¶


10ÔÂ20ÈÕ£¬¶íÂÞË¹ÍøÂç·¸·¨¼¯ÍÅLynx¶ÔÓ¢¹ú¹ú·À²¿³Ð°üÉ̶àµÂ¼¯ÍÅ£¨Dodd Group£©Ìᳫ´ó¹æÄ£ÍøÂç¹¥»÷£¬ÇÔÈ¡²¢Ð¹Â¶ÁËÓ¢¹ú»Ê¼Ò¿Õ¾ü¼°»Ê¼Òˮʦ°Ë¸ö»ùµØµÄÊý°Ù·ÝÃô¸ÐÎļþ£¬¸ÃÊÂÎñ±¬·¢ÔÚ9ÔÂ23ÈÕ£¬±»¡¶ÖðÈÕÓʱ¨¡·³ÆÎª¡°ÔÖÄÑÐÔ¡±ÊÂÎñ¡£´Ë´Îй¶µÄÊý¾Ýº­¸ÇÔ±¹¤ÐÕÃû¡¢µç×ÓÓʼþ¡¢³Ð°üÉÌÁªÏµ·½·¨¡¢³µÁ¾ÐÅÏ¢¼°±ê¼ÇΪ¡°Êܿء±»ò¡°¹Ù·½Ãô¸Ð¡±µÄ¹ú·À²¿Ô±¹¤Í¨Ñ¶Â¼£¬Éæ¼°Ó¢¹úÒªº¦¾üÊÂÉèÊ©µÄÏêϸÐÅÏ¢¡£¶àµÂ¼¯ÍÅ×÷ΪӢ¹úÁìÏȵÄ˽Ӫ¹¤³ÌÓëÉèÊ©ÖÎÀí¹«Ë¾£¬ÓµÓг¬1100ÃûÔ±¹¤£¬ºã¾Ã³Ð½Ó¹ú·À¡¢½ÌÓý¡¢Ò½ÁƵÈÁìÓòµÄÖØ´óÏîÄ¿£¬°üÀ¨ÎªÓ¢¹ú¹ú·À²¿Ìṩά»¤Ó뽨É蹤³Ì¡£ÀÕË÷Èí¼þÍŻォÆäÁÐÈëTorÊý¾ÝÐ¹Â¶ÍøÕ¾£¬Éù³ÆÇÔȡԼ4TBÊý¾Ý£¬²¢ÔÚ̸ÅÐÆÆËéºóÖð²½¹ûÕæÎļþ¡£Ð¹Â¶ÄÚÈݾ۽¹ÓÚÈý¸öÕ½ÂÔÒªµØ£ºÈø¸£¿Ë¿¤À³¿Ïϣ˼»Ê¼Ò¿Õ¾ü»ùµØ£¨×¤ÔúÃÀ¹úF-35ÒþÐÎÕ½»ú²¢ÒÉËÆ´æ´¢ºËµ¯£©¡¢²¨ÌØÀï˹»ùµØ£¨±±Ô¼·À¿ÕÍøÂç¾øÃÜÀ×´ïÕ¾£©¼°ÆÕÀ×µ¤Äɿ˻ùµØ£¨Ó¢¹ú¹ú¼ÒÎÞÈË»úÖÐÐÄ£©¡£ÏêϸÎļþ°üÀ¨³¬1000·Ý·Ã¿ÍÈÕÖ¾¡¢ÄÚ²¿Óʼþ¡¢Çå¾²Ö¸Äϼ°Ê©¹¤¼Í¼£¬½ÒÆÆÁË»ùµØµÄ²Ù×÷ϸ½ÚÓëÇå¾²Îó²î¡£


https://securityaffairs.com/183640/data-breach/russian-lynk-group-leaks-sensitive-uk-mod-files-including-info-on-eight-military-bases.html


5. ÎÞÓ¡Á¼Æ·Òò¹©Ó¦ÉÌÔâÀÕË÷Èí¼þ¹¥»÷ÖÂÈÕ±¾ÃŵêÎïÁ÷ÖÐÖ¹


10ÔÂ20ÈÕ£¬ÈÕ±¾ÁãÊÛ¾ÞÍ·ÎÞÓ¡Á¼Æ·ÒòÅäËÍÏàÖúͬ°éAskulÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÆäÈÕÍâµØÇøÎïÁ÷ϵͳ̱»¾£¬±»ÆÈ¹Ø±ÕÃŵ겢ÔÝÍ£¶àÏîÔÚÏß·þÎñ¡£ÊÂÎñʼÓÚÈÕ±¾Ê±ÇøÖÜÈÕÍí¼ä£¬ÎÞÓ¡Á¼Æ·Ðû²¼ÉùÃ÷³Æ£¬´Ë´Î¹¥»÷µ¼ÖÂËùÓÐÁãÊÛ·þÎñÊÜ×裬°üÀ¨ÍøÉÏÊÐËÁä¯ÀÀ¡¢¹ºÎï¡¢¶©µ¥ÀúÊ·ÅÌÎʼ°²¿·ÖÍøÒ³ÄÚÈÝÏÔʾÒì³£¡£Ö»¹Ü¹«Ë¾Î´Ã÷ȷϵͳ»Ö¸´Ê±¼ä±í£¬µ«ÖÜÒ»ÏÂÖç¸üÐÂÏÔʾ£¬ÔÚÏß¹ºÎïºÍ°üÔ·þÎñÈÔÊÜÓ°Ïì¡£ÎÞÓ¡Á¼Æ·×÷ΪȫÇò¼òÔ¼¼Ò¾ÓÓÃÆ·¡¢´ò°ç¼°¼Ò¾ßÁãÊÛÉÌ£¬ÔÚÈÕ±¾¡¢Öйú¡¢ÐÂ¼ÓÆÂ¡¢Å·ÖÞ¡¢°Ä´óÀûÑǺͱ±ÃÀÓµÓг¬Ç§¼ÒÃŵ꣬ÄêÊÕÈëÔ¼40ÒÚÃÀÔª£¬È«ÇòÔ±¹¤³¬24,500Ãû¡£´Ë´ÎÖÐÖ¹½öÓ°ÏìÈÕÍâµØÇø£¬ÒòAskulÈÏÕæÆäÈÕ±¾±¾ÍÁÎïÁ÷ÓªÒµ¡£AskulΪÑÅ»¢ÈÕ±¾ÆìÏ´óÐÍB2B/B2C°ì¹«ÓÃÆ·¼°ÎïÁ÷µçÉÌÆóÒµ£¬Æäͨ¸æÏÔʾ£¬ÀÕË÷Èí¼þѬȾµ¼ÖÂϵͳ¹ÊÕÏ£¬ÒÑÔÝÍ£¶©µ¥´¦Öóͷ£¡¢·¢»õ¡¢²úÆ·ÍË»õ¡¢ÊÕÌõÓʼļ°Ä¿Â¼ÔËË͵ȷþÎñ£¬¿Í»§·þÎñ̨ÒàÎÞ·¨Í¨¹ýµç»°»òÍøÕ¾ÁªÏµ¡£¹«Ë¾ÕýÊÓ²ìÊý¾Ýй¶¹æÄ££¬°üÀ¨Ð¡ÎÒ˽¼ÒÐÅÏ¢ºÍ¿Í»§Êý¾Ý£¬²¢ÔÊÐíʵʱת´ïÏ£Íû¡£


https://www.bleepingcomputer.com/news/security/retail-giant-muji-halts-online-sales-after-ransomware-attack-on-supplier/


6. CISAÖÒÑÔWindows SMBȨÏÞÌáÉýÎó²îÕý±»»îԾʹÓÃ


10ÔÂ20ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼½ôÆÈÔ¤¾¯£¬Ö¸³öÍþвÐÐΪÕßÕýÆð¾¢Ê¹ÓøßÑÏÖØÐÔµÄWindows SMBȨÏÞÌáÉýÎó²îCVE-2025-33073¡£¸ÃÎó²îÓ°ÏìËùÓÐWindows Server°æ±¾¡¢Windows 10¼°×î¸ßÖÁWindows 11 24H2µÄWindows 11ϵͳ£¬ÔÊÐí¹¥»÷ÕßÔÚδÐÞ²¹µÄϵͳÉÏ»ñÈ¡SYSTEMȨÏÞ£¬×é³ÉÖØ´óÇå¾²Íþв¡£Î¢ÈíÔÚ2025Äê6Ô²¹¶¡ÐÇÆÚ¶þʱ´úÒÑÐÞ¸´´ËÎó²î£¬²¢Åû¶ÆäȪԴÔÚÓÚ²»µ±µÄ»á¼û¿ØÖÆÈõµã£¬Ê¹ÊÚȨ¹¥»÷Õß¿Éͨ¹ýÍøÂçÌáÉýȨÏÞ¡£Ïêϸ¹¥»÷·¾¶Îª£º¹¥»÷ÕßÓÕʹÊܺ¦ÕßÅþÁ¬ÖÁ¶ñÒâ¿ØÖÆµÄSMB·þÎñÆ÷£¬Ö´ÐÐÌØÖÆ¾ç±¾Ç¿ÖÆÊܺ¦ÕßÅÌËã»úÖØÐÂÅþÁ¬²¢ÑéÖ¤Éí·Ý£¬×îÖÕʵÏÖȨÏÞÌáÉý¡£CISAÒѽ«CVE-2025-33073ÁÐÈë¡°ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡±£¬²¢ÒÀ¾Ý¾ßÓÐÔ¼ÊøÁ¦µÄÔËÓªÖ¸ÁîBOD 22-01£¬ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÔÚ2025Äê11ÔÂ10ÈÕǰÍê³ÉϵͳÐÞ²¹¡£


https://www.bleepingcomputer.com/news/security/cisa-high-severity-windows-smb-flaw-now-exploited-in-attacks/