GlassWormµÚËIJ¨¹¥»÷Ãé×¼macOS¿ª·¢Õß

Ðû²¼Ê±¼ä 2026-01-05

1. GlassWormµÚËIJ¨¹¥»÷Ãé×¼macOS¿ª·¢Õß


1ÔÂ1ÈÕ£¬2025Äê10ÔÂÊ״ηºÆðµÄGlassWorm¶ñÒâÈí¼þ¿ËÈÕÌᳫµÚËIJ¨¹¥»÷£¬×¨ÃÅÕë¶ÔmacOS¿ª·¢Õߣ¬Í¨¹ý¸Ä¶¯VSCode/OpenVSXÀ©Õ¹³ÌÐòÖ²Èë¼ÓÃÜÇ®°üľÂí°æ±¾¡£´Ë´Î¹¥»÷Ô˶¯·ºÆð¿çÆ½Ì¨ÌØÕ÷£¬´ËǰÖ÷ÒªÕë¶ÔWindowsϵͳ£¬ÏÖÀ©Õ¹ÖÁmacOS£¬Í¹ÏÔ¹¥»÷Õß¶Ô¿ª·¢ÕßÉú̬µÄÒ»Á¬ÉøÍ¸¡£¹¥»÷ʹÓÃOpenVSXºÍMicrosoft Visual Studio MarketplaceÖеĶñÒâÀ©Õ¹³ÌÐò£¬ÕâЩÀ©Õ¹Í¨³£ÓÃÓÚÔöÇ¿±à¼­Æ÷¹¦Ð§¡£GlassWormͨ¹ý¡°²»¿É¼û¡±Unicode×Ö·ûÒþ²Ø¶ñÒâ´úÂ룬װÖúóÇÔÈ¡GitHub¡¢npm¡¢OpenVSXÕË»§Æ¾Ö¤¼°¶àÀ©Õ¹³ÌÐòµÄ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬²¢Ö§³ÖVNCÔ¶³Ì»á¼ûºÍSOCKSÊðÀíÁ÷Á¿Â·ÓÉ¡£×îбäÖÖ½ÓÄÉAES-256-CBC¼ÓÃÜÓÐÓÃÔØºÉ£¬ÑÓ³Ù15·ÖÖÓÖ´ÐÐÒÔÌÓ±ÜɳºÐÆÊÎö£¬Ê¹ÓÃAppleScriptÌæ»»PowerShell£¬Í¨¹ýLaunchAgentsʵÏÖ³¤ÆÚ»¯£¬Í¬Ê±ÊµÑéÇÔÈ¡KeychainÃÜÂë²¢Ìæ»»Ó²¼þÇ®°üľÂí£¨ÈçLedger Live¡¢Trezor Suite£©£¬µ«Ä¿½ñľÂíÇ®°ü·µ»Ø¿ÕÎļþ£¬¿ÉÄÜ´¦ÓÚ×¼±¸½×¶Î¡£Ñо¿Ö°Ô±·¢Ã÷£¬¶ñÒâÀ©Õ¹ÔÚOpenVSXƽ̨ÈÔ±£´æ£¬ÏÂÔØÁ¿³¬33,000´Î¡£


https://www.bleepingcomputer.com/news/security/new-glassworm-malware-wave-targets-macs-with-trojanized-crypto-wallets/


2. Unleash ProtocolËðʧ390ÍòÃÀÔª¼ÓÃÜ×ʲú


12ÔÂ31ÈÕ£¬È¥ÖÐÐÄ»¯ÖªÊ¶²úȨƽ̨Unleash ProtocolÒò¶àÖØÊðÃûÖÎÀíϵͳ±»¹¥»÷£¬Ëðʧ¼ÛÖµÔ¼390ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¾ÝÏîÄ¿ÍŶÓÅû¶£¬¹¥»÷Õßͨ¹ýδÊÚȨµÄºÏÔ¼Éý¼¶»ñÈ¡ÖÎÀíԱȨÏÞ£¬½âËø×ʲúÌá¿î¹¦Ð§£¬µ¼ÖÂWIP¡¢USDC¡¢WETH¡¢stIPºÍvIPµÈ×ʲú±»µÁ¡£PeckShieldAlertÇø¿éÁ´Ç徲ר¼ÒÈ·ÈÏ£¬Ëðʧ½ð¶îÔ¼390ÍòÃÀÔª£¬×ʽðͨ¹ýµÚÈý·½»ù´¡ÉèʩǎÓ×ªÒÆÖÁÍⲿµØµã£¬×îÖÕÒÔ1,337 ETH´æÈëTornado Cash¼ÓÃÜÇ®±Ò»ìÏý·þÎñÒÔ½µµÍ¿É×·ËÝÐÔ¡£Unleash Protocol¶¨Î»ÎªÖªÊ¶²úȨÖÎÀí²Ù×÷ϵͳ£¬¿É½«ÖªÊ¶²úȨ´ú±Ò»¯²¢×÷ΪDeFiµäÖÊÆ·£¬Í¨¹ýÖÇÄܺÏÔ¼×Ô¶¯·ÖÅÉÔÊÐí·ÑºÍ°æË°¡£´Ë´Î¹¥»÷̻¶Æä¶àÖØÊðÃûÖÎÀíϵͳµÄÇå¾²Îó²î£ºÍⲿµØµãͨ¹ýÖÎÀíϵͳ»ñÈ¡ÖÎÀí¿ØÖÆÈ¨£¬Ö´ÐÐδ¾­ÍŶÓÅú×¼µÄºÏÔ¼Éý¼¶£¬Í»ÆÆÔ­ÓÐÖÎÀí¼°ÔËÓª³ÌÐòÏÞÖÆ¡£¹¥»÷ÕßʹÓÃTornado CashµÄ»ìÏý»úÖÆÌÓ±Ü×·×Ù£¬¸Ã·þÎñÔøÒòЭÖú³¯ÏʺڿÍÏ´Ç®ÓÚ2022ÄêÔâÃÀ¹úÖÆ²Ã£¬2025ÄêËä±»³ýÃû£¬µ«ÈÔ±»ÍøÂç·¸·¨·Ö×ÓÀÄÓá£ÊÂÎñ±¬·¢ºó£¬Unleash ProtocolÒÑÔÝÍ£ËùÓÐÔËÓª£¬Ô¼ÇëÍⲿÇ徲ר¼ÒÊÓ²ìÎó²îȪԴ£¬ÆÀ¹Àµ÷½âÓë»Ö¸´²½·¥¡£


https://www.bleepingcomputer.com/news/security/hackers-drain-39m-from-unleash-protocol-after-multisig-hijack/


3. PlayÀÕË÷Èí¼þ¹¥»÷°ÙÄêÀ±½·½´¾ÞÍ·Garner Foods


1ÔÂ2ÈÕ£¬PlayÀÕË÷Èí¼þ×éÖ¯ÔÚ°µÍøÐû²¼ÐÂÎÅ£¬ÒªÇóÓµÓнü°ÙÄêÀúÊ·µÄ±±¿¨ÂÞÀ´ÄÉÖÝÀ±½·½´ÖÆÔìÉÌGarner FoodsÔÚ1ÔÂ7ÈÕǰÁªÏµ²¢Ö§¸¶Î´¹ûÕæÊê½ð£¬²»È»½«Ð¹Â¶ÆäÃô¸ÐÊý¾Ý¡£×÷ΪÃÀ¹ú×ÅÃû½´ÁÏÆ·ÅÆ£¬Garner Foods×Ô1929ÄêÆðÉú²úµÂÖÝÆ¤ÌØ¡¢ÂÌɽ¸ñÁÖ¸êɯɯ½´µÈϵÁвúÆ·£¬²úÆ·ÁýÕÖÈ«ÃÀÊýÍò¼Ò³¬ÊС¢¾üÐèµê¼°±ãµ±µê£¬²¢ÔÚʳÎï·þÎñÓë²ÍÒûÐÐÒµÕ¼ÓÐÖ÷Ҫְλ¡£´Ë´Î¹¥»÷̻¶ÁËÆóÒµ½¹µãÊý¾ÝΣº¦£ºPlayÉù³ÆÇÔÈ¡Á˰üÀ¨Ë½ÈËÉñÃØÊý¾Ý¡¢¿Í»§Îļþ¡¢Ô¤Ëã¡¢ÈËΪµ¥¡¢²ÆÎñÐÅÏ¢¼°Ë°ÊռͼÔÚÄڵĶàÀàÃô¸ÐÐÅÏ¢£¬¿ÉÄÜÉæ¼°±ê¼ÇÐÔÅä·½µÈרÓÐÐÅÏ¢¡£Ê³ÎïÉú²úÉÌÔâÀÕË÷¹¥»÷Ò×Òý·¢¹©Ó¦Á´Á¬Ëø·´Ó¦£¬´ÓÉú²úÕϰ­¡¢½»¸¶ÑÓ³Ùµ½²úƷǷȱ£¬²»µ«Ëðº¦ÆóÒµÉùÓþ£¬»¹¿ÉÄܵ¼ÖÂÏûºÄÕßתÏò¾ºÆ·¡£Play×éÖ¯×÷Ϊ2024-2025ÄêÈ«ÇòµÚÈý»îÔ¾ÀÕË÷Èí¼þÍŻÒÑÔì³É³¬Ç§ÃûÊܺ¦Õß¡£Æä½ÓÄÉ¡°¼äЪÐÔ¼ÓÃÜ¡±ÊÖÒÕ£¬½ö¼ÓÃÜϵͳ²¿·ÖÀο¿ÇøÓòÒÔ¿ìËÙÇÔÈ¡Êý¾Ý£¬¸ÃÕ½ÂÔÒѱ»¶à¸ö×ÅÃûÀÕË÷×é֯Ч·Â¡£


https://cybernews.com/news/texas-pete-hot-sauce-play-ransomware-attack-garner-foods/


4. PlayÀÕË÷Èí¼þ¹¥»÷ͯЬ¾ÞÍ·Esquire Brands


1ÔÂ2ÈÕ£¬¿ËÈÕ£¬Í¯Ð¬ÖÆÔìÉÌEsquire BrandsÔâÓöÖøÃûÀÕË÷Èí¼þÍÅ»ïPlayµÄ¹¥»÷£¬¸ÃÍÅ»ïÔÚ°µÍøÂÛ̳ÉÏÐû³ÆÒÑÇÔÈ¡ÆäÉñÃØÊý¾Ý£¬²¢Íþв×îÔçÓÚ1ÔÂ3ÈÕÐû²¼¡£×÷ΪӵÓÐDKNY¡¢Sam EdelmanºÍKenneth ColeµÈÆ·ÅÆÊÚȨµÄÆóÒµ£¬Esquire BrandsרעÓÚͯЬµÄÉè¼Æ¡¢ÊÚȨÓëÉú²ú£¬ÆäÓªÒµÁýÕÖÈ«Çò¶à¸öÊг¡¡£¹¥»÷ÕßÉù³Æ»ñÈ¡Á˿ͻ§Îļþ¡¢ÈËΪÊý¾Ý¡¢²ÆÎñÐÅÏ¢µÈÃô¸ÐÄÚÈÝ¡£´ËÀàÊý¾Ýй¶¿ÉÄÜÒý·¢ÑÏÖØÐ§¹û£ºÈËΪÊý¾Ý°üÀ¨Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢¶¨ÏòÍøÂç´¹ÂÚ¼°Éç»á¹¤³Ì¹¥»÷£¬ÀýÈçð³ä¸ß¹ÜÆ­È¡×ʽ𣻿ͻ§ÎļþºÍ²ÆÎñÐÅÏ¢Ôò¿ÉÄܱ»ÓÃÓÚÉèÁ¢Ú²Æ­ÕË»§»òÉÌÒµÌØ¹¤Ô˶¯£¬¶ÔÆóÒµÉùÓþºÍÔËÓªÔì³Éºã¾ÃË𺦡£PlayÀÕË÷Èí¼þ¼¯ÍÅÊÇÍøÂç·¸·¨ÁìÓòµÄ»îÔ¾¼ÓÈëÕߣ¬2024ÄêλÁÐÈ«Çò×î»îÔ¾ÀÕË÷Èí¼þÍÅ»ïǰÈýÃû£¬ÒÔ¡°¼äЪÐÔ¼ÓÃÜ¡±ÊÖÒÕÖø³Æ£¬½ö¼ÓÃÜÏµÍ³ÌØ¶¨Àο¿²¿·Ö£¬´Ó¶ø¿ìËÙÇÔÈ¡Êý¾Ý¡£PlayµÄ¹¥»÷Ä¿µÄº­¸Ç¶à¸öÐÐÒµ£¬È纽¿Õº½Ìì¡¢ÔÆÅÌËã¡¢Âùݡ¢Æû³µ¼°Õþ¸®»ú¹¹¡£


https://cybernews.com/security/esquire-brands-play-ransomware-attack/


5. ÒÁÀûŵÒÁÖÝÈËÀà·þÎñ²¿ÄÚ²¿ÍýÏëµØÍ¼¹ýʧ¹ûÕæ


1ÔÂ3ÈÕ£¬ÒÁÀûŵÒÁÖÝÈËÀà·þÎñ²¿£¨IDHS£©¿ËÈÕת´ïÒ»ÒòÓÉÒþ˽ÉèÖÃÉèÖÃʧÎóÒý·¢µÄÊý¾ÝÇå¾²ÊÂÎñ£¬µ¼ÖÂÄÚ²¿×ÊÔ´ÍýÏëµØÍ¼±»ÒâÍâ¹ûÕæ£¬Éæ¼°ÊýÍòÃû·þÎñ¹¤¾ßСÎÒ˽¼ÒÐÅÏ¢¡£¾ÝÅû¶£¬ÉæÊµØÍ¼½¨ÉèÓÚijµØÍ¼Æ½Ì¨£¬ÓÃÓÚÄÚ²¿×ÊÔ´ÍýÏ룬µ«ÒòȨÏÞÉèÖò»µ±£¬ÔÚ2021Äê4ÔÂÖÁ2025Äê9ÔÂʱ´ú±»¹«ÖÚ¿É»á¼û¡£ÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£º¿µ¸´·þÎñ²¿·Ö£¨DRS£©Ô¼32,401Ãû¿Í»§ÐÅÏ¢Ôâ̻¶£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢²¡Àý±àºÅ¡¢²¡Àý״̬¡¢×ªÕïȪԴ¡¢ÇøÓò°ì¹«ÊÒÐÅÏ¢¼°ÊÜÒæÈËÉí·ÝµÈ£»Ò½ÁƽòÌùºÍÒ½Áưü¹Ü´¢±¸ÍýÏ루MMSP£©Ô¼672,616ÃûÊÜÒæÈËÒàÊܲ¨¼°£¬Éæ¼°µØµã¡¢²¡Àý±àºÅ¡¢Éú³Ýͳ¼ÆÐÅÏ¢¼°Ò½ÁÆÍýÏëÃû³Æ£¨ÈçÒ½ÁƽòÌù¡¢Ò½Áưü¹ÜµÈ£©£¬µ«Î´°üÀ¨ÐÕÃû¡£Á½ÅúÊý¾Ý¹ûÕæÊ±¶Î»®·ÖΪ2021Äê4ÔÂ-2025Äê9Ô¼°2022Äê1ÔÂ-2025Äê9Ô¡£¸ÃÊÂÎñÓÚ2025Äê9ÔÂ22ÈÕ±»·¢Ã÷ºó£¬IDHSÁ¬Ã¦½ÓÄɵ÷½â²½·¥£ºÏÞÖÆµØÍ¼»á¼ûȨÏÞ£¬Ã÷ȷեȡ½«Èκοͻ§¼¶±ðÊý¾ÝÉÏ´«ÖÁ¹«¹²µØÍ¼ÍøÕ¾¡£Í¬Ê±£¬ÒÁÀûŵÒÁÖÝÁìÍÁÇå¾²²¿Õýͨ¹ýÓʼþµÈ·½·¨ÏòÊÜÓ°ÏìСÎÒ˽¼Ò·¢³ö֪ͨ£¬Í¨ÖªÖаüÀ¨Ãâ·Ñ×Éѯµç»°£¬±ãÓÚÓû§»ñÈ¡¸ü¶àÐÅÏ¢¼°Ö§³Ö¡£


https://khqa.com/news/local/illinois-agency-tightens-map-security-after-data-security-incident-human-services-medicaid-medicare-division-of-rehabilitation-services-federal-trade-commission


6. Handalaͨ¹ýÈëÇÖTelegramÕË»§¹¥»÷ÒÔÉ«ÁйÙÔ±


1ÔÂ2ÈÕ£¬ÓëÒÁÀʹØÁªµÄºÚ¿Í×éÖ¯HandalaÐû³ÆÍêÈ«ÈëÇÖÁ½ÃûÒÔÉ«ÁÐÕþÒª¡ª¡ªÇ°×ÜÀíÄÉ·òËþÀû¡¤±´ÄÚÌØÓëÕÕÁϳ¤²ìÏ£¡¤²¼À­¸¥ÂüµÄÒÆ¶¯×°±¸£¬²¢Ð¹Â¶ÁªÏµÈË¡¢ÕÕÆ¬¡¢ÊÓÆµ¼°Ô¼1900Ìõ̸Ìì¼Í¼¡£È»¶ø£¬KelaÍøÂçÇ鱨¹«Ë¾µÄÉî¶Èȡ֤ÆÊÎöÕ¹ÏÖ£¬Ëùν¡°×°±¸ÈëÇÖ¡±ÊµÎªTelegramÕË»§Çå¾²Îó²îµÄ¼¯ÖÐ̻¶£º¹¥»÷Ä¿µÄ½öÏÞÓÚÌØ¶¨TelegramÕË»§£¬²¢Î´»ñȡװ±¸ÖÜÈ«»á¼ûȨÏÞ¡£Kela·¢Ã÷£¬Ð¹Â¶ÖÊÁÏÖд󶼶Ի°ÎªTelegramͬ²½±¬·¢µÄ¿ÕÁªÏµÈË¿¨Æ¬£¬½öÔ¼40¸ö¶Ô»°º¬ÏÖʵÐÂÎÅ£¬ÇÒʵÖÊÐÔ½»Á÷ÉÙÉÙ¡£ËùÓÐÆØ¹âÁªÏµÈ˾ù¹ØÁª»îÔ¾TelegramÕË»§£¬Ö¤ÊµÊý¾ÝÔ´×Ô¶¯Ì¬ÔÆ´æ´¢¶ø·Ç×°±¸ÍâµØ¡£´ËÊÂÎñ̻¶³ö¼ÓÃÜÆ½Ì¨ÕË»§ÖÎÀíµÄϵͳÐÔΣº¦£¬¼´±ãÈçTelegramÕâÀàÆ½Ì¨£¬ÆäĬÈÏÉèÖÃÒà·Å´óÁ˹¥»÷Ãæ£ºÔÆÃÜÂ빦ЧĬÈϽûÓ㬽öÐèÒ»´ÎÐÔÃÜÂë¼´¿ÉÍêÕû»á¼ûÕË»§£»±ê׼̸Ììȱ·¦¶Ëµ½¶Ë¼ÓÃÜ£¬Êý¾ÝÒÔÔÆÐÎʽ´æ´¢ÓÚ·þÎñÆ÷£¬¹¥»÷Ãæ±»ÏÔÖøÀ©Õ¹¡£


https://cybersecuritynews.com/handala-hackers-targeted-israeli-officials/