Storm-0249ͨ¹ýEDRÓëWindows¹¤¾ßʵÑéÒþ²Ø¹¥»÷

Ðû²¼Ê±¼ä 2025-12-11

1. Storm-0249ͨ¹ýEDRÓëWindows¹¤¾ßʵÑéÒþ²Ø¹¥»÷


12ÔÂ9ÈÕ£¬ÍøÂçÇå¾²¹«Ë¾ReliaQuest¿ËÈÕÅû¶£¬ÃûΪStorm-0249µÄ³õʼ»á¼ûÊðÀíÕýͨ¹ýÀÄÓö˵ã¼ì²âÓëÏìÓ¦£¨EDR£©½â¾ö¼Æ»®¼°ÊÜÐÅÍеÄMicrosoft WindowsÊÊÓóÌÐò£¬ÊµÑé¸ß¶ÈÒþ²ØµÄ¶ñÒâÈí¼þ¼ÓÔØÓ볤ÆÚ»¯²Ù×÷£¬ÎªºóÐøÀÕË÷Èí¼þ¹¥»÷ÆÌ·¡£¸Ã×éÖ¯ÒÑÞðÆú¹Å°å´ó¹æÄ£ÍøÂç´¹ÂÚ£¬×ª¶ø½ÓÄɸüÏȽøµÄÊÖÒÕÊֶΣ¬¼´±ã·ÀÓù·½Ïêϸ¼Í¼ÆäÐÐΪ£¬ÈÔÄÑÒÔÓÐÓÃÓ¦¶Ô¡£¹¥»÷ʼÓÚClickFixÉç»á¹¤³Ì¹¥»÷£ºÓÕÆ­Óû§ÔÚWindowsÔËÐжԻ°¿òÖÐÕ³Ìù²¢Ö´ÐÐcurlÏÂÁÏÂÔØ¾ß±¸SYSTEMȨÏ޵ĶñÒâMSI°ü¡£Ëæºó£¬´ÓαÔìMicrosoftÓò»ñÈ¡µÄ¶ñÒâPowerShell¾ç±¾Ö±½Ó×¢ÈëϵͳÄڴ棬ȫ³Ì²»Âä´ÅÅÌÒÔ¹æ±Ü·À²¡¶¾¼ì²â¡£MSIÎļþÊͷŵĶñÒâDLL£¨ÈçSentinelAgentCore.dll£©±»Õ½ÂÔÐÔ°²ÅÅÔÚÕýµ±SentinelOne EDR×é¼þµÄSentinelAgentWorker.exeÅÔ£¬Í¨¹ýDLL²à¼ÓÔØÊÖÒÕÔÚÊÜÐÅÍеÄÌØÈ¨EDRÀú³ÌÖÐÖ´ÐУ¬ÊµÏÖ²Ù×÷ϵͳ¸üкóÈÔ¿Éά³ÖµÄÒþ²Ø³¤ÆÚÐÔ¡£ÈëÇֺ󣬹¥»÷ÕßʹÓÃSentinelOne×é¼þÍŽáreg.exe¡¢findstr.exeµÈÕýµ±Windows¹¤¾ßÍøÂçϵͳ±êʶ·û£¬²¢Í¨¹ý¼ÓÃÜHTTPS C2Á÷Á¿½¨ÉèͨѶ¡£


https://www.bleepingcomputer.com/news/security/ransomware-iab-abuses-edr-for-stealthy-malware-execution/


2. ¡°Ö©ÖëÏÀ¡±ÍøÂç´¹ÂÚ¹¤¾ß°üϯ¾íÅ·ÖÞ½ðÈÚ½ç


12ÔÂ9ÈÕ£¬ÍøÂçÍþвÆÊÎö¹«Ë¾Varonis¿ËÈÕÅû¶£¬Ò»¿îÃûΪ¡°Ö©ÖëÏÀ¡±µÄÈ«Õ»Ê½ÍøÂç´¹ÂÚ¹¤¾ß°üÕýÔÚ°µÍøÆÕ±éÈö²¥£¬Ê¹·ÇÊÖÒÕ¹¥»÷ÕßÒ²ÄܶÔÅ·ÖÞÖ÷ÒªÒøÐм°¼ÓÃÜÇ®±Òƽ̨Ìᳫ´ó¹æÄ£¾«×¼¹¥»÷¡£¸Ã¹¤¾ß°ü±»Ñо¿Ö°Ô±³ÆÎª¡°Äê¶È×îΣÏÕ¡±Íþв֮һ£¬ÒòÆäÎÞÐè±à³Ì֪ʶ¼´¿É¿ìËÙÌìÉúÏñËØ¼¶¿Ë¡µÄ½ðÈÚ»ú¹¹µÇÂ¼Ò³Ãæ£¬ÁýÕֵ¹ú¡¢±ÈÀûʱµÈÎå¹úÊýÊ®¼Ò»ú¹¹£¬°üÀ¨µÂÒâÖ¾ÒøÐС¢ºÉÀ¼¹ú¼Ê¼¯ÍÅ£¨ING£©¡¢CaixaBankµÈÖ÷Á÷ÒøÐм°¼ÓÃÜÇ®°ü·þÎñÉÌ£¬Ä¿µÄÓû§ÈºÌåÖØ´ó¡£¹¥»÷Á÷³Ì¼«¼ò»¯£º¹¥»÷Õß½öÐèÑ¡ÔñÄ¿µÄÒøÐУ¬Æô¶¯¿Ë¡³ÌÐò£¬·¢ËÍÓë¹Ù·½ÍêȫһÖµÄÓÕ¶üÐÅÏ¢¼´¿ÉʵÑé´¹ÂÚ¡£¹¤¾ß°üÄÚÖüÓÃÜÖú¼Ç´ÊÇÔȡģ¿é£¬±ê¼Ç×ÅÕ©Æ­ÊÖ¶ÎÏò»ìÏýÐÍÉú³¤¡£Æä×îΣÏÕÌØÕ÷ÔÚÓÚʵʱÐÅÏ¢×èµ²ÄÜÁ¦¡ª¡ªÊܺ¦ÕßÊäÈëµÇ¼ÐÅÏ¢ºó£¬¹¥»÷Õß¿ÉÁ¬Ã¦»ñÈ¡Êý¾Ý£¬²¢´¥·¢¶þ´Î½çÃæÍøÂçÐÅÓÿ¨ºÅ¡¢OTP»òPhotoTANÂëµÈÃô¸ÐÐÅÏ¢¡£µ¥´Î»á»°¼´¿ÉÇÔȡȫÃû¡¢³öÉúÈÕÆÚ¡¢ÐÅÓÿ¨ÏêÇéµÈÍêÕûÉí·ÝÐÅÏ¢£¬×ãÒÔÍêÈ«½ÓÊÜÕË»§²¢ÊµÑéÉí·Ý͵ÇÔ¡£Îª¹æ±ÜÇå¾²¼ì²â£¬¸Ã¹¤¾ß°ü½ÓÄɵØÀí·â±ÕÊÖÒÕÏÞÖÆ·ÇÄ¿µÄ¹ú¼Ò»á¼û£¬²¢ÆÁÕÏÒÑÖªÇå¾²¹«Ë¾ÍøÂçÁ÷Á¿£¬ÓÐÓÃÌÓ±Ü×Ô¶¯É¨ÃèºÍÈ˹¤ÆÊÎö¡£


https://hackread.com/spiderman-phishing-kit-european-banks-credential-theft/


3. Ó¡¶ÈÂüµÏ¹«¹²Ãŵê250Íò¿Í»§ÐÅϢй¶¹ÒÊÛ


12ÔÂ9ÈÕ£¬¿ËÈÕ£¬ÍøÂç·¸·¨ÂÛÌ³ÆØ¹âÒ»ÆðÕë¶ÔÓ¡¶ÈϲÂíÙɶû°îÂüµÏ¹«¹²Æû³µÃŵêµÄÒÉËÆÊý¾Ýй¶ÊÂÎñ¡£¹¥»÷ÕßÐû³ÆÓÚ½ñÄêÈëÇָù«Ë¾¿Í»§¹ØÏµÖÎÀíϵͳºǫ́£¬ÇÔÈ¡Á˰üÀ¨ÐÕÃû¡¢¼Òͥסַ¡¢ÓÊÕþ±àÂë¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏäµÈÔÚÄÚµÄ250ÍòÌõ¾­ÏúÉ̼°¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬²¢¹ûÕæ¹ÒÅÆÊÛÂô¡£×èÖ¹ÏÖÔÚ£¬ÉæÊ¹«Ë¾ÉÐδÐû²¼¹Ù·½ÉùÃ÷È·ÈÏÊÂÎñÕæÊµÐÔ¡£Êý¾ÝÑù±¾½ö°üÀ¨8ÌõÐÅÏ¢£¬ÕæÊµÐÔÔÝÎÞ·¨ºËʵ¡£¾ÝÊӲ죬¸Ã¹¥»÷ÕßÓÚ½ñÄê4Ô¼ÓÈë¸ÃÂÛ̳£¬´ËÇ°Ôø¶à´Î³öÊÛÆóÒµÊý¾Ý²¢¸½´øÑù±¾£¬´Ë´ÎÊÂÎñÈôÊôʵ£¬±»µÁÊý¾Ý¿ÉÄܱ»ÓÃÓÚ¹¹½¨Óû§Éí·Ý»­Ïñ£¬ÎªºóÐøÉç»á¹¤³Ìѧ¹¥»÷£¨Èç´¹ÂÚÕ©Æ­¡¢Éí·ÝðÓã©Ìṩ¾«×¼ÐÅÏ¢£¬ÏÔÖøÌáÉýÊܺ¦Õß±»¶þ´Î¹¥»÷µÄΣº¦¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¹«¹²Æû³µ¼°Æä¾­ÏúÉÌÒÑ·ÇÊ״γÉÎªÍøÂç·¸·¨Ä¿µÄ¡£½ñÄê10Ô£¬¹«¹²¼¯ÍÅ·¨¹ú·Ö¹«Ë¾±»÷è÷ëÀÕË÷Èí¼þÍÅ»ïÁÐÈëйÃÜÍøÕ¾£»6Ô£¬¹«¹²¼¯ÍÅ»¹·ºÆðÔÚStormousÀÕË÷Èí¼þ¿¨Ëþ¶ûµÄ°µÍøÐ¹ÃÜÍøÕ¾¡£


https://cybernews.com/security/volkswagen-dealership-data-breach-india/


4. DroidLock¶ñÒâÈí¼þ»áËø¶¨°²×¿×°±¸²¢Ë÷ÒªÊê½ð


12ÔÂ10ÈÕ£¬Ò»ÖÖÃûΪDroidLockµÄÐÂÐͰ²×¿¶ñÒâÈí¼þ½üÆÚ±»·¢Ã÷£¬Æäͨ¹ý¶àÖØ¹¥»÷ÊֶζÔÎ÷°àÑÀÓïÓû§ÊµÑéÀÕË÷ÓëÊý¾ÝÇÔÈ¡¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶ñÒâÍøÕ¾ÍÆ¹ãð³äÕýµ±Èí¼þ°üµÄÐéαӦÓã¬Ñ¬È¾Àú³ÌʼÓÚÓÕÆ­Óû§×°ÖðüÀ¨ÏÖʵ¶ñÒâÈí¼þµÄ¶þ¼¶ÓÐÓÃÔØºÉ¡£×°Öú󣬶ñÒâ³ÌÐò»áÇëÇó×°±¸ÖÎÀíÔ±ºÍ¸¨Öú¹¦Ð§È¨ÏÞ£¬´Ó¶øÖ´ÐаüÀ¨ÆÁÄ»Ëø¶¨¡¢Êý¾Ý²Á³ý¡¢PINÂë/ÃÜÂë/ÉúÎïʶ±ðÊý¾ÝÐ޸ĵÈ15ÏîÏÂÁÉõÖÁ¿ÉÔ¶³Ìͨ¹ýVNCÍêÈ«¿ØÖÆ×°±¸¡£DroidLockµÄ½¹µãÍþвÔÚÓÚÆäÀÕË÷»úÖÆÓëÊý¾ÝÇÔÈ¡ÄÜÁ¦¡£ÀÕË÷Ä£¿éͨ¹ýWebViewÏÔʾÊê½ðÒªÇó£¬Ö¸Ê¾Êܺ¦Õßͨ¹ýProtonÓÊÏäÁªÏµ¹¥»÷Õߣ¬²¢Íþв24СʱÄÚδ֧¸¶Êê½ð½«ÓÀÊÀÏú»ÙÎļþ¡£Ö»¹Ü¸ÃÈí¼þ²»Ö±½Ó¼ÓÃÜÎļþ£¬µ«Í¨¹ýÏú»ÙÎļþµÄÍþвµÖ´ïÓëÀÕË÷Èí¼þÏàͬµÄЧ¹û¡£Í¬Ê±£¬Æäͨ¹ýÆÁÄ»ÁýÕÖ²ãÇÔÈ¡Óû§½âËøÍ¼°¸£¬ÍŽáVNCÔ¶³Ì»á¼ûʵÏÖ×°±¸¿ØÖÆ¡£±ðµÄ£¬¸ÃÈí¼þ»¹ÄÜ»á¼û¶ÌÐÅ¡¢Í¨»°¼Í¼¡¢ÁªÏµÈË£¬ÉõÖÁÖ´ÐмÒôºÍɾ³ýÊý¾ÝµÈ²Ù×÷¡£


https://www.bleepingcomputer.com/news/security/new-droidlock-malware-locks-android-devices-and-demands-a-ransom/


5. Docker Hub¾µÏñ±»·¢Ã÷й¶ƾ֤ºÍÉí·ÝÑéÖ¤ÃÜÔ¿


12ÔÂ10ÈÕ£¬ÍþвÇ鱨¹«Ë¾Flare½üÆÚɨÃè·¢Ã÷£¬Docker Hubƽ̨³¬10,000¸öÈÝÆ÷¾µÏñ±£´æÃô¸ÐÐÅϢй¶ÎÊÌâ£¬Éæ¼°Éú²úϵͳƾ֤¡¢CI/CDÊý¾Ý¿âÃÜÔ¿¼°AIÄ£×ÓÁîÅÆµÈ£¬Ó°Ïì100Óà¼Ò×éÖ¯£¬°üÀ¨²Æ²ú500Ç¿ÆóÒµ¡¢¹ú¼ÒÒøÐм°10Óà¼Ò½ðÈÚ»ú¹¹¡£×÷ΪȫÇò×î´óÈÝÆ÷×¢²á±í£¬Docker Hub±¾Ó¦°ü¹Ü¿ª·¢ÕßÇå¾²¹²Ïí¼´ÓÃÐ;µÏñ£¬µ«±¾´ÎÊÂÎñ̻¶ÆäÇå¾²Îó²îµÄÑÏÖØÐÔ¡£Ñо¿ÏÔʾ£¬11ÔÂÉÏ´«µÄ¾µÏñÖУ¬10,456¸ö±£´æÃÜԿй¶£¬ÆäÖÐ42%µÄ¾µÏñÖÁÉÙ̻¶5¸öÃô¸ÐÊýÖµ¡£×й¶µÄÊÇOpenAI¡¢HuggingFaceµÈAIÄ£×ӵĻá¼ûÁîÅÆ£¬×ÜÁ¿´ï4,000¸ö¡£ÕâЩÃÜÔ¿¿É±»ÓÃÓÚÍêÈ«»á¼ûÔÆÇéÐΡ¢Git¿ÍÕ»¡¢CI/CDϵͳ¼°Ö§¸¶¼¯³ÉµÈ½¹µã»ù´¡ÉèÊ©£¬×é³ÉÖØ´óÇ徲Σº¦¡£Ð¹Â¶×éÖ¯¶àÂþÑÜÓÚÈí¼þ¿ª·¢¡¢Êг¡¡¢¹¤Òµ¼°AIÁìÓò¡£ÖµµÃ×¢ÖØµÄÊÇ£¬³¬ËijÉй¶Դ×Ô"Ó°×ÓIT"ÕË»§£¬ÕâЩÕË»§ÍùÍùȱ·¦ÆóÒµ¼¶Çå¾²¼à¿Ø¡£


https://www.bleepingcomputer.com/news/security/over-10-000-docker-hub-images-found-leaking-credentials-auth-keys/


6. WinRAR¸ßΣ·¾¶±éÀúÎó²îÔâ¶à¹úAPT×é֯ʹÓÃ


12ÔÂ10ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÓÚ2025Äê12Ô½«WinRARµÄCVE-2025-6218Îó²îÁÐÈëÒÑ֪ʹÓÃÎó²îĿ¼£¬¸ÃÎó²îÒÑ֤ʵ±»¶à¸ö¸ß¼¶Ò»Á¬ÐÔÍþв£¨APT£©×éÖ¯Æð¾¢Ê¹Ó᣸ÃÎó²îΪ·¾¶±éÀúÀàÐÍ£¬CVSSÆÀ·Ö7.8£¬ÔÊÐí¹¥»÷ÕßÔÚÓû§·­¿ª¶ñÒâÎļþ»ò»á¼û¶ñÒâÒ³ÃæÊ±Ö´ÐÐí§Òâ´úÂ룬½öÓ°ÏìWindowsϵͳ°æ±¾¡£RARLABÒÑÔÚ2025Äê6ÔÂÐû²¼µÄWinRAR 7.12ÖÐÐÞ¸´´ËÎó²î£¬µ«´ËǰÒÑÔâÆÕ±éʹÓ᣾ÝÇå¾²³§ÉÌÆÊÎö£¬¶íÂÞ˹GOFFEE×éÖ¯£¨ÓÖÃûPaper Werewolf£©ÔøÍŽáCVE-2025-6218ÓëCVE-2025-8088£¨ÆÀ·Ö8.8£©Ìá³«ÍøÂç´¹ÂÚ¹¥»÷£»ÄÏÑÇBitter APT×éÖ¯Ôòͨ¹ý¶ñÒâRARѹËõ°üÖ²ÈëNormal.dotmÈ«¾ÖÄ£°å£¬ÈƹýWordºêÏÞÖÆÊµÏÖ³¤ÆÚ»¯ºóÃÅ£»¶íÂÞ˹Gamaredon×éÖ¯ÔòÕë¶ÔÎÚ¿ËÀ¼¾üÊ¡¢Õþ¸®»ú¹¹ÌᳫÓã²æÊ½ÍøÂç´¹ÂÚ£¬Ê¹ÓøÃÎó²î°²ÅÅPteranodon¶ñÒâÈí¼þ£¬ÉõÖÁÔÚ2025Äê11ÔÂÊ×´ÎʵÑ鯯ËðÐÔÐж¯£¬Í¶·ÅGamaWiper²Á³ýÆ÷¡£


https://thehackernews.com/2025/12/warning-winrar-vulnerability-cve-2025.html