°²×¿ÒøÐÐľÂíDoubleTroubleÉý¼¶£¬£¬ÍþвŷÖÞÓû§°²È«
°ä²¼¹¦·ò 2025-08-041. °²×¿ÒøÐÐľÂíDoubleTroubleÉý¼¶£¬£¬ÍþвŷÖÞÓû§°²È«
7ÔÂ31ÈÕ£¬£¬°²È«×êÑÐÈËÔ±·¢ÏÖÒ»¿îÃûΪ¡°DoubleTrouble¡±µÄ°²×¿ÒøÐÐľÂíʵÏÖÖØ´ó¼¼ÊõÉý¼¶£¬£¬Æä´«²¼¼¿Á©Óë¹¥»÷ÄÜÁ¦ÏÔÖø¼ÓÇ¿£¬£¬¶ÔÅ·ÖÞÓû§×é³ÉÑϸñÌôÕ½¡£¡£¡£¸ÃľÂí×î³õͨ¹ý·Âð´óÐÍÒøÐд¹µöÍøÕ¾´«²¼£¬£¬Èç½ñÒÑÀ©´óÖÁÀûÓÃDiscordƽ̨ÍйܶñÒâAPKÎļþ½øÐзַ¢£¬£¬´ó·ù½µµÍÁË´«Í³°²È«¹¤¾ßµÄ¼ì²âЧÄÜ¡£¡£¡£¾ÝZimperiumÍŶӷÖÎö£¬£¬µ±Ç°¹¥»÷»î¶¯Éæ¼°9¸ö×îÐÂÑù±¾¼°25¸öÔçÆÚ±äÖÖ£¬£¬ÆäÖ°Äܵü´úËÙ¶ÈÓëÒñ±ÎÐÔÒý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¡£¡£Ð°æÄ¾Âí¼¯³É¶àÏîÃô¸ÐÖ°ÄÜ£º£ºÍ¨¹ýMediaProjectionÓëVirtualDisplay½Ó»°±úÏÖʵʱÆÁÄ»Â¼ÖÆ£¬£¬¿ÉÈÆ¹ý¶à³É·ÖÈÏÖ¤Ö±½Ó²¶»ñÓû§²Ù×÷»Ã棻£»Î±ÔìËøÆÁ½çÃæÇÔÈ¡PINÂë¡¢ÃÜÂë¼°½âËøÍ¼°¸£»£»»ùÓÚÎÞ×è°ÊÂÎñµÄ¼üÅ̼ͼְÄÜ£¬£¬Äܾ«×¼²¶»ñÓû§ÊäÈëÄÚÈÝ¡£¡£¡£´ËÍ⣬£¬Ä¾Âí»¹²¿Êð¶¨ÖÆ»¯´¹µö¸²¸Ç²ã£¬£¬·ÂÃ°ÒøÐÐÀûÓõǼ½çÃæÓÕµ¼Óû§Ìύƾ֤£¬£¬Ö¸±êº¸ÇÒøÐÐAPP¡¢ÃÜÂëÖÎÀí¹¤¾ß¼°¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£ÇÔÈ¡Êý¾Ý¾±àÂëºó´«ÊäÖÁÔ¶³ÌC2·þÎñÆ÷£¬£¬ÐÎ³ÉÆëÈ«Êý¾ÝÇÔÈ¡Á´Ìõ¡£¡£¡£
https://www.infosecurity-magazine.com/news/android-malware-targets-banks-via/
2. ³¯ÏÊLazarus GroupÀûÓöñÒ⿪ԴÈí¼þ°üÖ´ÐÐÍøÂç¼äµý»î¶¯
7ÔÂ31ÈÕ£¬£¬¾Ý°²È«³§ÉÌSonatype»ã±¨£¬£¬³¯Ïʹú¶ÈÖ§³ÖµÄLazarus GroupÔÚ2025ÄêÉϰëÄêÌáÒéÁËÒ»³¡´ó¹æÄ£ÍøÂç¼äµýÐж¯£¬£¬Í¨¹ý¶È·¢200Óà¸ö¶ñÒ⿪ԴÈí¼þ°ü£¨Éæ¼°npmºÍPyPIƽ̨£©£¬£¬³É¹¦ÉøÈëÈ«Çò¿ª·¢»·¾³¡£¡£¡£Õâ´Î¹¥»÷±»È϶¨Îª¸Ã×éÖ¯µÄ¡°Õ½Êõת±ä¡±£¬£¬±ê־ȡÆä´Ó´«Í³µÄ»úÓöÖ÷Òå¹¥»÷תÏò³Ö¾ÃÊý¾ÝÇÔÈ¡Óë¼äµý»î¶¯¡£¡£¡£SonatypeÔÚ2025Äê1ÔÂÖÁ6Ô¼äÀÛ¼ÆÀ¹½Ø234¸ö¹ÖÒì¶ñÒâ°ü£¬£¬¹ÀËãDZÔÚÊܺ¦Õß´ï3.6ÍòÈË¡£¡£¡£ÕâЩÈí¼þ°üͨ¹ý¼ÙÒâºÏ·¨¿ª·¢¿âÖ´ÐÐÓÕÆ£¬£¬¿ª·¢ÕßÔÚδ¾ÑéÖ¤»òɳºÐ²âÊÔµÄÇé¿öÏÂÖ±½Ó×°Ö㬣¬µ¼Ö¶ñÒâ´úÂë¾CI/CD×Ô¶¯»¯Á÷³ÌÀ©É¢ÖÁ³ö²úϵͳ¡£¡£¡£¹¥»÷ѡȡ¶à½×¶ÎÉè¼Æ£º£º³õÆÚÖ²Èë·¨Ê½ÕÆ¹Ü³ÉÁ¢Óƾû¯ºóÃÅ£¬£¬ºóÐø½×¶ÎÔòרһÓÚÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬Ô̺¬¿ª·¢»úƾ֤¡¢ÔÆ»ù´¡ÉèÊ©ÁîÅÆ¼°Ô´´úÂë´æ´¢¿â½Ó¼ûȨÏÞ¡£¡£¡£»ã±¨Ç¿µ÷£¬£¬LazarusµÄÖ¸±êÒѳ¬¹ýµ¥´¿ÇÔȡƾ֤£¬£¬ÆäÖ÷ÌâÒâͼÔÚÓÚͨ¹ý½ÚÖÆ¿ª·¢Õß»·¾³£¬£¬½øÒ»²½ÉøÈëÆóÒµÍøÂç¡£¡£¡£Õâ´ÎÐж¯³ö¸ñÕë¶ÔDevOpsÃܼ¯ÐÍ×éÖ¯£¬£¬ÒòÆä×Ô¶¯»¯¹ÜµÀÒ׳ÉΪ¶ñÒâÒÀÀµÏîµÄ´«²¼½Úµã¡£¡£¡£
https://www.infosecurity-magazine.com/news/200-malicious-open-source-lazarus/
3. ¼ÓÖÝ´óѧ²®¿ËÀû·ÖУÊý¾Ý¿âÔâй¶
7ÔÂ31ÈÕ£¬£¬×÷ΪÃÀ¹ú¶¥¼â¹«Á¢×êÑÐÐÍ´óѧ£¬£¬¼ÓÖÝ´óѧ²®¿ËÀû·ÖУ½üÈÕ±»ÆØÔâ·êÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¡£¡£Ò»ÃûÍþвÐÐΪÕßÔÚÍøÂç·¸×ïÂÛ̳¹«¿ªÏúÊÛËùν¡°ÆëÈ«Êý¾Ý¿â¡±£¬£¬Ðû³ÆÔ̺¬Ñ§ÉúÊý¾Ý¡¢×êÑлáÐÅÏ¢¡¢ÀÏʦÏêÇé¡¢Óû§ÕË»§£¨º¬Óû§Ãû¡¢µç×ÓÓʼþ¼°¹þÏ£ÃÜÂ룩¼°Ö§¸¶ÐÅÏ¢µÈÃô¸ÐÄÚÈÝ£¬£¬²¢ÒÔSQLºÍCSVÌåʽÌṩÊý¾Ý£¬£¬Í¬Ê±¶µÏú½Ó¼û¸ÃУphpMyAdminÊý¾Ý¿âÖÎÀíÃæ°åµÄȨÏÞ¡£¡£¡£ÎªÖ¤Ã÷ÕæÊµÐÔ£¬£¬¹¥»÷Õß°ä²¼Á˶àÕŽØÍ¼£¬£¬Õ¹Ê¾Æä¶ÔÊý¾Ý¿âºó¶ËµÄ½ÚÖÆÈ¨ÏÞ£¬£¬Ô̺¬º¬Ãô¸ÐÐÅÏ¢µÄ±í¸ñ¼°Óû§ÕË»§ÁÐ±í¡£¡£¡£ÍþвÕßÌṩµÄ½ØÍ¼ÏÔʾ£¬£¬Æä³É¹¦ÇÖÈëÊý¾Ý¿âºó¶Ë£¬£¬¿É²é¿´Ô̺¬Ñ§Éú¡¢½ÌÈËÔ±¹¤Ð¡ÎÒÐÅÏ¢µÄ±í¸ñ£¬£¬²¢»ñÈ¡ÁË´óÁ¿Óû§ÕË»§µÄ¹þÏ£ÃÜÂë¡£¡£¡£´ËÍ⣬£¬¹¥»÷ÕßÖ¸³ö£¬£¬ÔÚ·¢ÌûÆÚ¼ä£¬£¬²®¿ËÀû·ÖУ¶à¸ö×ÓÓòÃû³öÏÖ·þÎñÖжϣ¬£¬¹Ù·½ÍøÕ¾ÒàÏÔʾÊý¾Ý¿âÏνÓÃýÎ󣬣¬½øÒ»²½×ôÖ¤ÁËÊý¾Ýй¶µÄÕæÊµÐÔ¡£¡£¡£ÕâЩϵͳÒì³£¿£¿£¿ÉÄÜÓë¹¥»÷ÕߵIJÙ×÷Ö±½ÓÓйأ¬£¬»ò·´Ó³¸ÃÐ£ÍøÂ簲ȫ·À»¤´æÔÚÖØ´ó·ì϶¡£¡£¡£
https://dailydarkweb.net/uc-berkeley-targeted-in-major-data-breach-full-university-database-allegedly-for-sale-online/
4. AkiraÀÕË÷Èí¼þÀûÓÃSonicWall VPNÁãÈÕ·ì϶ִÐй¥»÷
8ÔÂ3ÈÕ£¬£¬±±¼«Àdz¢ÊÔÊÒ£¨Arctic Wolf Labs£©×êÑÐÈËÔ±½üÈÕ°ä²¼»ã±¨£¬£¬½ÒʾAkiraÀÕË÷Èí¼þÕýͨ¹ýSonicWall SSL VPNÉ豸ÌáÒéÒÉËÆÁãÈÕ·ì϶¹¥»÷£¬£¬ÉõÖÁÍ»ÆÆÒÑÆëÈ«ÐÞ²¹¡¢ÆôÓöà³É·ÖÈÏÖ¤£¨MFA£©¼°Æ¾Ö¤ÂÖ»»»úÖÆµÄϵͳ¡£¡£¡£¸Ã¹¥»÷»î¶¯×Ô2025Äê7ÔÂ15ÈÕÆð³öÏÖ¼¤ÔöÌ¬ÊÆ£¬£¬Æäº¹Çà¿É×·ÒäÖÁ2024Äê10Ô£¬£¬Òý·¢ÍøÂ簲ȫÁìÓò¸ß¶È¹Ø×¢¡£¡£¡£×êÑÐÖ¸³ö£¬£¬Ö»¹ÜδÆëÈ«Åųý±©Á¦ÆÆ½â¡¢Æ¾Ö¤Ìî³äµÈ´«Í³¹¥»÷¼¿Á©µÄ¿ÉÄÜÐÔ£¬£¬µ«¶àÏîÖ¤¾ÝÅú×¢SonicWall VPN´æÔÚδ¹«¿ªµÄÁãÈÕ·ì϶¡£¡£¡£²¿Ã۸ÀýÏÔʾ£¬£¬¼´±ãÉ豸ÒÑʵÏÖ×îв¹¶¡¸üС¢ÆôÓûùÓÚ¹¦·òµÄÒ»´ÎÐÔÃÜÂ루TOTP£©MFA£¬£¬²¢ÔÚÆ¾Ö¤ÂÖ»»ºóÈÔÔâÈëÇÖ¡£¡£¡£¹¥»÷ÕßÀûÓÃÐ鹹רÓ÷þÎñÆ÷£¨VPS£©ÍйܽøÐÐVPNÉí·ÝÑéÖ¤£¬£¬ÓëºÏ·¨Óû§Í¨¹ý¿í´ø·þÎñÉÌÍøÂçµÇ¼µÄÐÐΪģʽ´æÔÚÏÔÖø²î¾à¡£¡£¡£´ËÍ⣬£¬ÈëÇÖÓëÊý¾Ý¼ÓÃܼäµÄ¶ÌÔݹ¦·ò²î£¬£¬°µÊ¾¹¥»÷Õ߾߱¸¼±¾çºáÏòÒÆ¶¯ÄÜÁ¦¡£¡£¡£Õë¶ÔÕâÒ»Íþв£¬£¬±±¼«Àdz¢ÊÔÊÒ½¨Òé×é֯һʱ½ûÓÃSonicWall SSL VPN·þÎñ£¬£¬Ö±ÖÁ¹Ù·½°ä²¼ÓÐЧ²¹¶¡¡£¡£¡£
https://securityaffairs.com/180724/cyber-crime/akira-ransomware-targets-sonicwall-vpns-in-likely-zero-day-attacks.html
5. ·ðÂÞÀï´ïÖݼàÓüÊý¾Ýй¶ÊÂÎñÒý·¢¾ìÊô°²È«·¢¼±
8ÔÂ1ÈÕ£¬£¬ÃÀ¹ú·ðÂÞÀï´ïÖÝ´óÕÓÔóµØ³Í½ÌËù£¨ECI£©½üÆÚ²úÉúһ·ÑÏÖØÊý¾Ýй¶ÊÂÎñ£º£ºÒ»Ãû¹¤×÷ÈËÔ±ÎóÏòËùÓÐÇô·¸·¢Ë͵ç×ÓÓʼþ£¬£¬ÆäÖÐÔ̺¬Í¬ÓüÇô·¸·Ã¿ÍµÄÁªÏµ·½Ê½£¬£¬Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¼°µç»°ºÅÂë¡£¡£¡£ÕâЩÐÅϢͨ¹ý¼àÓüÄÚµÄÐÅϢͤºÍ°²È«Æ½°åµçÄÔ±»Çô·¸»ñÈ¡£¬£¬µ¼Ö´óÁ¿Çô·¸¾ìÊôÏÝÈ밲ȫ·¢¼±¡£¡£¡£¶àÃûÊÜÓ°Ïì¾ìÊôÏòýÌåй©£¬£¬Ð¹Â¶µÄÁªÏµ·½Ê½¿ÉÄܱ»ÓÃÓÚÀÕË÷»òɧÈÅ¡£¡£¡£ÀýÈ磬£¬¼ò¡¤ÌÀÆÕÉÓÇÓôµÀ£º£º¡°ÈôÇô·¸¼ä²úÉúì¶Ü£¬£¬¿ÉÄÜͨ¹ýй¶µÄµç»°ºÅÂëÍþв¾ìÊôÖ§¸¶Êê½ð£¬£¬²»È»ÖÐÉËÆä±»¹ØÑºµÄÇ×Êô¡£¡£¡£¡£¡£¡±ÅÁÌØÀï˹¡¤¿ÀûÔòÒòÔøÔâ·ê¸ú×Ù£¬£¬¸ü²»°²×Ô¼ºµÄÊý×ÖÒþÖÔ±»·¸×ï·Ö×ÓÀûÓᣡ£¡£Ö»¹Ü¼àÓüÒÑ֪ͨ²¿ÃžìÊôÊý¾Ýй¶Çé¿ö£¬£¬µ«·ðÂÞÀï´ïÖݳͽ̲¿ÃÅδ¶ÔýÌåѯÎÊ×÷³ö»ØÓ¦£¬£¬½øÒ»²½¼Ó¾çÁ˹«¼ÒµÄ²»°²¡£¡£¡£
https://www.theregister.com/2025/08/01/florida_prison_email_blunder/
6. ÐÂÐͶà½×¶Î¶ñÒâÈí¼þÀûÓÃWindows¿ì½Ý·½Ê½´«²¼REMCOSºóÃÅ
8ÔÂ2ÈÕ£¬£¬°²È«×êÑÐÈËÔ±½üÈÕÅû¶ÁËһ·ÐÂÐͶà½×¶Î¶ñÒâÈí¼þ¹¥»÷»î¶¯£¬£¬Æäͨ¹ý¾«ÐļÙ×°µÄWindows¿ì½Ý·½Ê½´«²¼Î£ÏÕµÄREMCOSÔ¶³Ì½Ó¼ûľÂí¡£¡£¡£¸Ã¹¥»÷Á´Éè¼ÆÆæÃ£¬ÀûÓÃÓû§¶Ô¡°ÎÞº¦Îļþ¡±µÄÐÅÀµÊµÏÖÒñ±ÎÈëÇÖ£¬£¬×îÖÕ¸³Óè¹¥»÷Õ߯ëÈ«½ÚÖÆÊÜϰȾϵͳµÄÄÜÁ¦¡£¡£¡£¹¥»÷ʼÓÚÒ»¸ö¿´ËÆÕý³£µÄLNKÎļþ£¬£¬Í¨³£Í¨¹ýµç×ÓÓʼþ¸½¼þ´«²¼£¬£¬ÎļþÃû¼Ù×°³É¡°ORDINE-DI-ACQUIST-7263535¡±µÈÉÌÎñÓйØÃû³ÆÒÔ½µµÍÓû§¾¯Ìè¡£¡£¡£µ±Óû§µã»÷¸ÃÎļþʱ£¬£¬ÆäÄÚÖõÄPowerShellºÅÁî»áÔÚºó¶Ü¾²Ä¬Ö´ÐУ¬£¬Èƹý´«Í³°²È«¼ì²â»úÖÆ¡£¡£¡£PowerShell×÷ΪWindows¹¤×÷×Ô¶¯»¯¹¤¾ß£¬£¬ÔÚÕâ´Î¹¥»÷Öб»ÀÄÓÃΪ¶ñÒâÔØºÉÏÂÔØÆ÷£º£ºÍ¨¹ý´ÓÔ¶³Ì·þÎñÆ÷»ñÈ¡Base64±àÂëµÄÓÐÐ§ÔØºÉ²¢½âÂ룬£¬×îÖÕÆô¶¯Ò»¸ö¼Ù×°³É¡°CHROME.PIF¡±µÄ¿ÉÖ´ÐÐÎļþ¡£¡£¡£½âÂëºóµÄÔØºÉ×îÖÕÔÚϵͳ%ProgramData%Ŀ¼Ï´´½¨¡°Remcos¡±Îļþ¼Ð£¬£¬×°ÖÃREMCOSºóÃŲ¢ÌìÉú»÷¼üÈÕÖ¾Îļþ£¬£¬È·Î¬Óƾû¯×¤Áô¡£¡£¡£¹¥»÷Õ߿ɽè´ËÖ´ÐмüÅ̼ͼ¡¢´´½¨Ô¶³ÌShell¡¢½Ó¼ûÎļþ£¬£¬ÉõÖÁ½ÚÖÆÉãÏñÍ·ºÍÂó¿Ë·ç½øÐÐʵʱ¼à¶½¡£¡£¡£
https://hackread.com/attack-windows-shortcut-files-install-remcos-backdoor/


¾©¹«Íø°²±¸11010802024551ºÅ